diff options
author | Matthew Leeds <matthew.leeds@endlessm.com> | 2019-09-20 13:02:06 -0700 |
---|---|---|
committer | Matthew Leeds <matthew.leeds@endlessm.com> | 2019-09-20 13:02:06 -0700 |
commit | 96822b21e587b3ee8cdab011912edc2eec4ac7cd (patch) | |
tree | 8cd30e21ff9eb03063e7ed9cddf4aa847cba87f2 | |
parent | 0a3963b479bf8f37f35c618d80c4daf343239638 (diff) | |
download | flatpak-96822b21e587b3ee8cdab011912edc2eec4ac7cd.tar.gz |
dir: Fix a typo in a comment
-rw-r--r-- | common/flatpak-dir.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/common/flatpak-dir.c b/common/flatpak-dir.c index f25784e1..c109b0cf 100644 --- a/common/flatpak-dir.c +++ b/common/flatpak-dir.c @@ -7443,7 +7443,7 @@ apply_extra_data (FlatpakDir *self, /* We run the sandbox without caps, but it can still create files owned by itself with * arbitrary permissions, including setuid myself. This is extra risky in the case where * this runs as root in the system helper case. We canonicalize the permissions at the - * end, but do avoid non-canonical permissions leaking out before then we make the + * end, but to avoid non-canonical permissions leaking out before then we make the * toplevel dir only accessible to the user */ if (chmod (flatpak_file_get_path_cached (extra_files), 0700) != 0) { |