aboutsummaryrefslogtreecommitdiff
path: root/etc
Commit message (Collapse)AuthorAgeFilesLines
* NOCOLOR -> NO_COLORSam James10 days1-2/+2
| | | | | | | | See https://no-color.org/. We already switched Portage and gentoolkit. Bug: https://bugs.gentoo.org/898224 Bug: https://bugs.gentoo.org/902551 Signed-off-by: Sam James <sam@gentoo.org>
* namespaces: add support for cgroup & timeMike Frysinger2021-10-211-0/+2
| | | | Signed-off-by: Mike Frysinger <vapier@gentoo.org>
* libsandbox: add SANDBOX_METHOD settingMike Frysinger2021-10-181-0/+11
| | | | | | | | | | This allows people to disable use of ptrace if their configuration does not support it. This forces older sandbox behavior where we cannot protect against static or set*id programs. Bug: https://bugs.gentoo.org/648516 Bug: https://bugs.gentoo.org/771360 Signed-off-by: Mike Frysinger <vapier@gentoo.org>
* etc/sandbox.conf: allow /usr/tmp/ for writeSergei Trofimovich2021-03-111-1/+1
| | | | | | | | | | | | | | | | | In bug #737220 sandbox was denying write access to /usr/tmp (a symlink to /var/tmp) for statically linked binaries. It happens because erealpath() helper conservatively does not resolve any symlink for external traced processes (to avoid symlink confusion via /proc/ that could refer to tracer and not tracee). Instead of fixing erealpath() to handle more cases of symlinks let's just allow /usr/tmp as if it was /var/tmp. Reported-by: Kirill Chibisov Bug: https://bugs.gentoo.org/737220 Signed-off-by: Sergei Trofimovich <slyfox@gentoo.org>
* Flatten data, etc & scripts MakefilesMichał Górny2019-01-132-7/+0
| | | | Signed-off-by: Michał Górny <mgorny@gentoo.org>
* sandbox: enable support for linux namespacesv2.9Mike Frysinger2015-09-271-0/+20
| | | | | | | | This initial version doesn't enable their use by default. URL: https://bugs.gentoo.org/512794 Reported-by: Matthew Thode <prometheanfire@gentoo.org> Signed-off-by: Mike Frysinger <vapier@gentoo.org>
* sandbox.conf: allow writing to /dev/ptmxMike Frysinger2015-09-201-1/+1
| | | | | | | | | | | | We implicitly permit write access to this node by not catching functions like openpty and posix_openpt, but when projects try to access the node directly (due to legacy/fallback logic), the sandbox would reject them. Make access to the node explicit since it's generally harmless. URL: https://bugs.gentoo.org/413327 URL: https://bugs.gentoo.org/550650 URL: https://bugs.gentoo.org/550670 Signed-off-by: Mike Frysinger <vapier@gentoo.org>
* sandbox: drop beep supportMike Frysinger2012-06-231-6/+0
| | | | | | | | Almost no one has beep support turned on anymore, and ebeep in the main tree has been deprecated (meaning it wasn't found useful while building packages). So punt support for it from sandbox too. Signed-off-by: Mike Frysinger <vapier@gentoo.org>
* 00default: fix installMike Frysinger2010-08-181-1/+2
| | | | | | | | | | The previous commit to fix duplicate dist inclusion broke the install of the generated file. So try again but hopefully this time get it right: - include only 00default.in in the dist - install only 00default URL: http://bugs.gentoo.org/333131 Signed-off-by: Mike Frysinger <vapier@gentoo.org>
* 00default: fix duplicate dist targetMike Frysinger2010-08-151-1/+1
| | | | | | | Make sure we only bundle 00default.in in the dist tarball rather than also including the generated 00default. Signed-off-by: Mike Frysinger <vapier@gentoo.org>
* 00default: set default paths based on @prefix@Mike Frysinger2009-06-241-1/+1
| | | | | | | | | | | Rather than hardcode /usr, assume that the prefix sandbox is configured with is the same prefix that other packages in the system will be configured with. This isn't entirely correct, but covers all of the common and realistic use cases. URL: http://bugs.gentoo.org/275064 Signed-off-by: Mike Frysinger <vapier@gentoo.org> Reported-by: Michael Haubenwallner <haubi@gentoo.org>
* setup local sandbox.d for running tests to avoid /etc/sandbox.dMike Frysinger2009-04-263-4/+4
| | | | | | | Always use local sandbox.d copy to avoid random /etc/sandbox.d issues like it doesn't exist, or has permission problems, or anything else. Signed-off-by: Mike Frysinger <vapier@gentoo.org>
* sandbox.d: drop settings that packages should be handlingv1.3.3Mike Frysinger2009-01-261-16/+0
| | | | Signed-off-by: Mike Frysinger <vapier@gentoo.org>
* Add comment about SANDBOX_WORKDIR.Martin Schlemmer2006-07-061-0/+4
| | | | Signed-off-by: Martin Schlemmer <azarah@gentoo.org>
* Move default SANDBOX_PREDICT value from sandbox.conf to 00default.Martin Schlemmer2006-07-062-2/+3
| | | | Signed-off-by: Martin Schlemmer <azarah@gentoo.org>
* Set default values via a config file. Also support sandbox.dMartin Schlemmer2006-07-063-0/+115
config directory for package specific configuration files. Signed-off-by: Martin Schlemmer <azarah@gentoo.org>