@@ -153,12 +153,14 @@ The code for this, when using Flow-IPC, is straighforward. Here's how it might
153
153
// - Specify a safety/permissions policy, so that internally permissions are set as restrictively as possible,
154
154
// but not more.
155
155
// The applications should share this code (so the same statement should execute in the server app also).
156
- const ipc::session::Client_app CLI_APP{ "cacheCli", // Name.
157
- "/usr/bin/cache_client.exec", CLI_UID, GID }; // Safety details.
158
- const ipc::session::Server_app SRV_APP{ { "cacheSrv", "/usr/bin/cache_server.exec", SRV_UID, GID },
159
- { CLI_APP.m_name }, // Which apps may connect to cacheSrv? (cacheCli may.)
160
- "", // (Optional path override; disregard.)
161
- ipc::util::Permissions_level::S_GROUP_ACCESS }; // Safety/permissions selector.
156
+ const ipc::session::Client_app CLI_APP
157
+ { "cacheCli", // Name.
158
+ "/usr/bin/cache_client.exec", CLI_UID, GID }; // Safety details.
159
+ const ipc::session::Server_app SRV_APP
160
+ { { "cacheSrv", "/usr/bin/cache_server.exec", SRV_UID, GID },
161
+ { CLI_APP.m_name }, // Which apps may connect? cacheCli may.
162
+ "", // (Optional path override; disregard.)
163
+ ipc::util::Permissions_level::S_GROUP_ACCESS }; // Safety/permissions selector.
162
164
// ...
163
165
164
166
// Open session e.g. near start of program. A session is the communication context between the processes
0 commit comments