lix/tests/nixos
alois31 f047e4357b libstore/build: always enable seccomp filtering and no-new-privileges
Seccomp filtering and the no-new-privileges functionality improve the security
of the sandbox, and have been enabled by default for a long time. In
lix-project/lix#265 it was decided that they
should be enabled unconditionally. Accordingly, remove the allow-new-privileges
(which had weird behavior anyway) and filter-syscall settings, and force the
security features on. Syscall filtering can still be enabled at build time to
support building on architectures libseccomp doesn't support.

Change-Id: Iedbfa18d720ae557dee07a24f69b2520f30119cb
2024-05-24 21:19:29 +00:00
..
ca-fd-leak
containers
coredumps Allow enabling core dumps from builds for nix & child processes 2024-05-16 17:11:21 -07:00
fetch-git
no-new-privileges libstore/build: always enable seccomp filtering and no-new-privileges 2024-05-24 21:19:29 +00:00
setuid
authorization.nix
broken-userns.nix
default.nix libstore/build: always enable seccomp filtering and no-new-privileges 2024-05-24 21:19:29 +00:00
github-flakes.nix Deprecate the online flake registries and vendor the default registry 2024-05-18 12:27:23 +10:00
nix-copy-closure.nix
nix-copy.nix
nix-upgrade-nix.nix
nss-preload.nix
remote-builds-ssh-ng.nix
remote-builds.nix
sourcehut-flakes.nix
symlink-resolvconf.nix
tarball-flakes.nix
util.nix Allow enabling core dumps from builds for nix & child processes 2024-05-16 17:11:21 -07:00