forked from lix-project/lix
6cf23c3e8f
This allows builds to call setuid binaries. This was previously possible until we started using seccomp. Turns out that seccomp by default disallows processes from acquiring new privileges. Generally, any use of setuid binaries (except those created by the builder itself) is by definition impure, but some people were relying on this ability for certain tests. Example: $ nix build '(with import <nixpkgs> {}; runCommand "foo" {} "/run/wrappers/bin/ping -c 1 8.8.8.8; exit 1")' --no-allow-new-privileges builder for ‘/nix/store/j0nd8kv85hd6r4kxgnwzvr0k65ykf6fv-foo.drv’ failed with exit code 1; last 2 log lines: cannot raise the capability into the Ambient set : Operation not permitted $ nix build '(with import <nixpkgs> {}; runCommand "foo" {} "/run/wrappers/bin/ping -c 1 8.8.8.8; exit 1")' --allow-new-privileges builder for ‘/nix/store/j0nd8kv85hd6r4kxgnwzvr0k65ykf6fv-foo.drv’ failed with exit code 1; last 6 log lines: PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data. 64 bytes from 8.8.8.8: icmp_seq=1 ttl=46 time=15.2 ms Fixes #1429. |
||
---|---|---|
.. | ||
command-ref.xml | ||
conf-file.xml | ||
env-common.xml | ||
files.xml | ||
main-commands.xml | ||
nix-build.xml | ||
nix-channel.xml | ||
nix-collect-garbage.xml | ||
nix-copy-closure.xml | ||
nix-daemon.xml | ||
nix-env.xml | ||
nix-hash.xml | ||
nix-instantiate.xml | ||
nix-prefetch-url.xml | ||
nix-shell.xml | ||
nix-store.xml | ||
opt-common-syn.xml | ||
opt-common.xml | ||
opt-inst-syn.xml | ||
utilities.xml |