guix/nix
Reepca Russelstein 558224140d
daemon: Sanitize failed build outputs prior to exposing them.
The only thing keeping a rogue builder and a local user from collaborating to
usurp control over the builder's user during the build is the fact that
whatever files the builder may produce are not accessible to any other users
yet.  If we're going to make them accessible, we should probably do some
sanity checking to ensure that sort of collaborating can't happen.

Currently this isn't happening when failed build outputs are moved from the
chroot as an aid to debugging.

* nix/libstore/build.cc (secureFilePerms): new function.
  (DerivationGoal::buildDone): use it.

Change-Id: I9dce1e3d8813b31cabd87a0e3219bf9830d8be96
Signed-off-by: Ludovic Courtès <ludo@gnu.org>
2024-10-21 00:09:10 +02:00
..
boost
libstore daemon: Sanitize failed build outputs prior to exposing them. 2024-10-21 00:09:10 +02:00
libutil daemon: Loop over ‘copy_file_range’ upon short writes. 2024-05-13 16:31:34 +02:00
nix-daemon daemon: Implement ‘substitute-urls’ RPC. 2023-12-11 23:18:53 +01:00
.gitignore
AUTHORS
COPYING
local.mk etc: Add explicit ‘--substitute-urls’ in guix-daemon service files. 2024-06-26 22:59:55 +02:00