Always allow builds to use unix domain sockets in Darwin sandbox

This commit is contained in:
Dan Peebles 2017-10-31 13:16:51 +01:00
parent 72cd52c3cd
commit bc6b3f7e8f

View file

@ -22,7 +22,14 @@
(allow signal (target same-sandbox))
; Access to /tmp.
(allow file* process-exec (literal "/tmp") (subpath TMPDIR))
; The network-outbound/network-inbound ones are for unix domain sockets, which
; we allow access to in TMPDIR (but if we allow them more broadly, you could in
; theory escape the sandbox)
(allow file* process-exec network-outbound network-inbound
(literal "/tmp") (subpath TMPDIR))
; Always allow unix domain sockets, since they can't hurt purity or security
; Some packages like to read the system version.
(allow file-read* (literal "/System/Library/CoreServices/SystemVersion.plist"))