Sadly actioneer is not a real word.
#ifdef PRIVSEP
struct passwd *ps_user; /* struct passwd for privsep user */
pid_t ps_root_pid;
- int ps_root_fd; /* Privileged Actioneer commands */
+ int ps_root_fd; /* Privileged Proxy commands */
int ps_log_fd; /* chroot logging */
int ps_data_fd; /* Data from root spawned processes */
struct eloop *ps_eloop; /* eloop for polling root data */
/* SPDX-License-Identifier: BSD-2-Clause */
/*
- * Privilege Separation for dhcpcd, privileged actioneer
+ * Privilege Separation for dhcpcd, privileged proxy
* Copyright (c) 2006-2021 Roy Marples <roy@marples.name>
* All rights reserved
struct dhcpcd_ctx *ctx = arg;
if (ctx->options & DHCPCD_MANAGER)
- setproctitle("[privileged actioneer]");
+ setproctitle("[privileged proxy]");
else
- setproctitle("[privileged actioneer] %s%s%s",
+ setproctitle("[privileged proxy] %s%s%s",
ctx->ifv[0],
ctx->options & DHCPCD_IPV4 ? " [ip4]" : "",
ctx->options & DHCPCD_IPV6 ? " [ip6]" : "");
* or address specific listener.
* Spawn an unpriv process to send/receive common network data.
* Then drop all privs and start running.
- * Every process aside from the privileged actioneer is chrooted.
+ * Every process aside from the privileged proxy is chrooted.
* All privsep processes ignore signals - only the manager process accepts them.
*
* dhcpcd will maintain the config file in the chroot, no need to handle
case 0:
return 0;
default:
- logdebugx("spawned privileged actioneer on PID %d", pid);
+ logdebugx("spawned privileged proxy on PID %d", pid);
}
/* No point in spawning the generic network listener if we're
ret = r;
/* We've been chrooted, so we need to tell the
- * privileged actioneer to remove the pidfile. */
+ * privileged proxy to remove the pidfile. */
if (ps_root_unlink(ctx, ctx->pidfile) == -1)
ret = -1;