2017-05-31 18:23:27 +03:00
|
|
|
(define TMPDIR (param "_GLOBAL_TMP_DIR"))
|
2015-11-21 23:40:24 +02:00
|
|
|
|
2017-06-06 19:44:49 +03:00
|
|
|
(deny default)
|
|
|
|
|
2017-05-31 18:23:27 +03:00
|
|
|
; Disallow creating setuid/setgid binaries, since that
|
|
|
|
; would allow breaking build user isolation.
|
|
|
|
(deny file-write-setugid)
|
2015-11-21 23:40:24 +02:00
|
|
|
|
2017-05-31 18:23:27 +03:00
|
|
|
; Allow forking.
|
|
|
|
(allow process-fork)
|
2015-11-21 23:40:24 +02:00
|
|
|
|
2017-05-31 18:23:27 +03:00
|
|
|
; Allow reading system information like #CPUs, etc.
|
|
|
|
(allow sysctl-read)
|
2015-11-21 23:40:24 +02:00
|
|
|
|
2017-05-31 18:23:27 +03:00
|
|
|
; Allow POSIX semaphores and shared memory.
|
|
|
|
(allow ipc-posix*)
|
2015-11-21 23:40:24 +02:00
|
|
|
|
2017-05-31 18:23:27 +03:00
|
|
|
; Allow socket creation.
|
|
|
|
(allow system-socket)
|
2015-11-21 23:40:24 +02:00
|
|
|
|
2017-05-31 18:23:27 +03:00
|
|
|
; Allow sending signals within the sandbox.
|
|
|
|
(allow signal (target same-sandbox))
|
2015-11-21 23:40:24 +02:00
|
|
|
|
2017-11-03 11:50:49 +02:00
|
|
|
; Allow getpwuid.
|
|
|
|
(allow mach-lookup (global-name "com.apple.system.opendirectoryd.libinfo"))
|
|
|
|
|
2017-05-31 18:23:27 +03:00
|
|
|
; Access to /tmp.
|
2017-10-31 14:16:51 +02:00
|
|
|
; The network-outbound/network-inbound ones are for unix domain sockets, which
|
|
|
|
; we allow access to in TMPDIR (but if we allow them more broadly, you could in
|
|
|
|
; theory escape the sandbox)
|
|
|
|
(allow file* process-exec network-outbound network-inbound
|
|
|
|
(literal "/tmp") (subpath TMPDIR))
|
|
|
|
|
2017-05-31 18:23:27 +03:00
|
|
|
; Some packages like to read the system version.
|
|
|
|
(allow file-read* (literal "/System/Library/CoreServices/SystemVersion.plist"))
|
2015-11-21 23:40:24 +02:00
|
|
|
|
2017-05-31 18:23:27 +03:00
|
|
|
; Without this line clang cannot write to /dev/null, breaking some configure tests.
|
|
|
|
(allow file-read-metadata (literal "/dev"))
|
2015-11-21 23:40:24 +02:00
|
|
|
|
2017-10-30 18:25:41 +02:00
|
|
|
; Many packages like to do local networking in their test suites, but let's only
|
|
|
|
; allow it if the package explicitly asks for it.
|
|
|
|
(if (param "_ALLOW_LOCAL_NETWORKING")
|
|
|
|
(begin
|
|
|
|
(allow network* (local ip) (local tcp) (local udp))
|
|
|
|
|
|
|
|
; Allow access to /etc/resolv.conf (which is a symlink to
|
|
|
|
; /private/var/run/resolv.conf).
|
|
|
|
; TODO: deduplicate with sandbox-network.sb
|
|
|
|
(allow file-read-metadata
|
|
|
|
(literal "/var")
|
|
|
|
(literal "/etc")
|
|
|
|
(literal "/etc/resolv.conf")
|
|
|
|
(literal "/private/etc/resolv.conf"))
|
|
|
|
|
|
|
|
(allow file-read*
|
|
|
|
(literal "/private/var/run/resolv.conf"))
|
|
|
|
|
|
|
|
; Allow DNS lookups. This is even needed for localhost, which lots of tests rely on
|
|
|
|
(allow file-read-metadata (literal "/etc/hosts"))
|
|
|
|
(allow file-read* (literal "/private/etc/hosts"))
|
|
|
|
(allow network-outbound (remote unix-socket (path-literal "/private/var/run/mDNSResponder")))))
|
|
|
|
|
2017-05-31 18:23:27 +03:00
|
|
|
; Standard devices.
|
|
|
|
(allow file*
|
|
|
|
(literal "/dev/null")
|
|
|
|
(literal "/dev/random")
|
|
|
|
(literal "/dev/stdin")
|
|
|
|
(literal "/dev/stdout")
|
|
|
|
(literal "/dev/tty")
|
|
|
|
(literal "/dev/urandom")
|
|
|
|
(literal "/dev/zero")
|
|
|
|
(subpath "/dev/fd"))
|
2015-11-21 23:40:24 +02:00
|
|
|
|
2020-03-20 22:58:45 +02:00
|
|
|
; Allow pseudo-terminals.
|
|
|
|
(allow file*
|
|
|
|
(literal "/dev/ptmx")
|
|
|
|
(regex #"^/dev/pty[a-z]+")
|
|
|
|
(regex #"^/dev/ttys[0-9]+"))
|
|
|
|
|
2017-05-31 18:23:27 +03:00
|
|
|
; Does nothing, but reduces build noise.
|
|
|
|
(allow file* (literal "/dev/dtracehelper"))
|
2017-05-30 18:40:12 +03:00
|
|
|
|
2017-05-31 18:23:27 +03:00
|
|
|
; Allow access to zoneinfo since libSystem needs it.
|
|
|
|
(allow file-read* (subpath "/usr/share/zoneinfo"))
|
|
|
|
|
|
|
|
(allow file-read* (subpath "/usr/share/locale"))
|
|
|
|
|
|
|
|
; This is mostly to get more specific log messages when builds try to
|
|
|
|
; access something in /etc or /var.
|
|
|
|
(allow file-read-metadata
|
|
|
|
(literal "/etc")
|
|
|
|
(literal "/var")
|
2017-10-30 18:25:41 +02:00
|
|
|
(literal "/private/var/tmp"))
|
2020-03-20 23:12:30 +02:00
|
|
|
|
|
|
|
; This is used by /bin/sh on macOS 10.15 and later.
|
|
|
|
(allow file*
|
|
|
|
(literal "/private/var/select/sh"))
|