Always allow builds to use unix domain sockets in Darwin sandbox
This commit is contained in:
		
							parent
							
								
									72cd52c3cd
								
							
						
					
					
						commit
						bc6b3f7e8f
					
				
					 1 changed files with 8 additions and 1 deletions
				
			
		|  | @ -22,7 +22,14 @@ | |||
| (allow signal (target same-sandbox)) | ||||
| 
 | ||||
| ; Access to /tmp. | ||||
| (allow file* process-exec (literal "/tmp") (subpath TMPDIR)) | ||||
| ; The network-outbound/network-inbound ones are for unix domain sockets, which | ||||
| ; we allow access to in TMPDIR (but if we allow them more broadly, you could in | ||||
| ; theory escape the sandbox) | ||||
| (allow file* process-exec network-outbound network-inbound | ||||
|        (literal "/tmp") (subpath TMPDIR)) | ||||
| 
 | ||||
| ; Always allow unix domain sockets, since they can't hurt purity or security | ||||
| 
 | ||||
| 
 | ||||
| ; Some packages like to read the system version. | ||||
| (allow file-read* (literal "/System/Library/CoreServices/SystemVersion.plist")) | ||||
|  |  | |||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue