about summary refs log tree commit diff
path: root/pkgs/build-support/build-sandbox/src/setup.h
diff options
context:
space:
mode:
authoraszlig <aszlig@nix.build>2018-07-02 03:42:45 +0200
committeraszlig <aszlig@nix.build>2018-07-02 03:42:45 +0200
commitcd8bde1c98543236ec0ceb4375c03eb55aa8e56d (patch)
tree3d7dd314c3e2caeef580938e2db8d2a0c657d5de /pkgs/build-support/build-sandbox/src/setup.h
parent72abbc69b13dcf40bac429147dc18a8b8c8bae7b (diff)
pkgs/sandbox: Add flag to bind-mount read-only
While the Nix store should be read-only by default, we can't guarantee
this as the Nix store could be mounted read-write (for example on
non-NixOS systems).

For paths other than store directories, I took a conservative approach
here where only /etc is mounted read-only, for all the pseudo-
filesystems such as /proc, /sys or /dev write access might still be
needed, for example to write to a hardware device exposed via /dev (eg.
a gamepad with rumble support).

Signed-off-by: aszlig <aszlig@nix.build>
Diffstat (limited to 'pkgs/build-support/build-sandbox/src/setup.h')
-rw-r--r--pkgs/build-support/build-sandbox/src/setup.h2
1 files changed, 1 insertions, 1 deletions
diff --git a/pkgs/build-support/build-sandbox/src/setup.h b/pkgs/build-support/build-sandbox/src/setup.h
index fe882dc5..2ef05482 100644
--- a/pkgs/build-support/build-sandbox/src/setup.h
+++ b/pkgs/build-support/build-sandbox/src/setup.h
@@ -6,7 +6,7 @@
 #include "nix-query.h"
 
 bool write_maps(pid_t parent_pid);
-bool bind_mount(const char *path, bool restricted, bool resolve);
+bool bind_mount(const char *path, bool rdonly, bool restricted, bool resolve);
 bool extra_mount(const char *path, bool is_required);
 bool mount_from_path_var(struct query_state *qs, const char *name);
 bool setup_sandbox(void);