Merge changes I2e370952,I811cc8e1
* changes: Remove TEMPORARY_DISABLE_PATH_RESTRICTIONS nsjail: Always remount /tmp before src/out/dist
This commit is contained in:
commit
f39f6a4772
3 changed files with 9 additions and 15 deletions
|
@ -53,14 +53,7 @@ func main() {
|
|||
os.Exit(1)
|
||||
}
|
||||
|
||||
disableError := false
|
||||
if e, ok := os.LookupEnv("TEMPORARY_DISABLE_PATH_RESTRICTIONS"); ok {
|
||||
disableError = e == "1" || e == "y" || e == "yes" || e == "on" || e == "true"
|
||||
}
|
||||
|
||||
exitCode, err := Main(os.Stdout, os.Stderr, interposer, os.Args, mainOpts{
|
||||
disableError: disableError,
|
||||
|
||||
sendLog: paths.SendLog,
|
||||
config: paths.GetConfig,
|
||||
lookupParents: lookupParents,
|
||||
|
@ -79,8 +72,6 @@ If a tool isn't in the allowed list, a log will be posted to the unix domain
|
|||
socket at <interposer>_log.`)
|
||||
|
||||
type mainOpts struct {
|
||||
disableError bool
|
||||
|
||||
sendLog func(logSocket string, entry *paths.LogEntry, done chan interface{})
|
||||
config func(name string) paths.PathConfig
|
||||
lookupParents func() []paths.LogProcess
|
||||
|
@ -131,7 +122,7 @@ func Main(stdout, stderr io.Writer, interposer string, args []string, opts mainO
|
|||
}, waitForLog)
|
||||
defer func() { <-waitForLog }()
|
||||
}
|
||||
if config.Error && !opts.disableError {
|
||||
if config.Error {
|
||||
return 1, fmt.Errorf("%q is not allowed to be used. See https://android.googlesource.com/platform/build/+/master/Changes.md#PATH_Tools for more information.", base)
|
||||
}
|
||||
}
|
||||
|
|
|
@ -177,9 +177,12 @@ func SetupPath(ctx Context, config Config) {
|
|||
execs = append(execs, parsePathDir(pathEntry)...)
|
||||
}
|
||||
|
||||
allowAllSymlinks := config.Environment().IsEnvTrue("TEMPORARY_DISABLE_PATH_RESTRICTIONS")
|
||||
if config.Environment().IsEnvTrue("TEMPORARY_DISABLE_PATH_RESTRICTIONS") {
|
||||
ctx.Fatalln("TEMPORARY_DISABLE_PATH_RESTRICTIONS was a temporary migration method, and is now obsolete.")
|
||||
}
|
||||
|
||||
for _, name := range execs {
|
||||
if !paths.GetConfig(name).Symlink && !allowAllSymlinks {
|
||||
if !paths.GetConfig(name).Symlink {
|
||||
continue
|
||||
}
|
||||
|
||||
|
|
|
@ -181,15 +181,15 @@ func (c *Cmd) wrapSandbox() {
|
|||
// For now, just map everything. Make most things readonly.
|
||||
"-R", "/",
|
||||
|
||||
// Mount a writable tmp dir
|
||||
"-B", "/tmp",
|
||||
|
||||
// Mount source are read-write
|
||||
"-B", sandboxConfig.srcDir,
|
||||
|
||||
//Mount out dir as read-write
|
||||
"-B", sandboxConfig.outDir,
|
||||
|
||||
// Mount a writable tmp dir
|
||||
"-B", "/tmp",
|
||||
|
||||
// Disable newcgroup for now, since it may require newer kernels
|
||||
// TODO: try out cgroups
|
||||
"--disable_clone_newcgroup",
|
||||
|
|
Loading…
Reference in a new issue