Always allow builds to use unix domain sockets in Darwin sandbox
This commit is contained in:
parent
72cd52c3cd
commit
bc6b3f7e8f
1 changed files with 8 additions and 1 deletions
|
@ -22,7 +22,14 @@
|
||||||
(allow signal (target same-sandbox))
|
(allow signal (target same-sandbox))
|
||||||
|
|
||||||
; Access to /tmp.
|
; Access to /tmp.
|
||||||
(allow file* process-exec (literal "/tmp") (subpath TMPDIR))
|
; The network-outbound/network-inbound ones are for unix domain sockets, which
|
||||||
|
; we allow access to in TMPDIR (but if we allow them more broadly, you could in
|
||||||
|
; theory escape the sandbox)
|
||||||
|
(allow file* process-exec network-outbound network-inbound
|
||||||
|
(literal "/tmp") (subpath TMPDIR))
|
||||||
|
|
||||||
|
; Always allow unix domain sockets, since they can't hurt purity or security
|
||||||
|
|
||||||
|
|
||||||
; Some packages like to read the system version.
|
; Some packages like to read the system version.
|
||||||
(allow file-read* (literal "/System/Library/CoreServices/SystemVersion.plist"))
|
(allow file-read* (literal "/System/Library/CoreServices/SystemVersion.plist"))
|
||||||
|
|
Loading…
Reference in a new issue