summaryrefslogtreecommitdiff
path: root/sandbox.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Minor tweak.Gravatar grunfink2025-06-041-2/+3
|
* Don't enable unveil() and pledge() for sendmail spawn if "smtp_url" is set.Gravatar grunfink2025-06-041-0/+5
|
* Fixed regression while sending email via pipe on OpenBSD.Gravatar grunfink2025-06-031-0/+8
|
* allow sandbox to work with changed config valuesGravatar shtrophic2025-04-291-5/+4
|
* Merge remote-tracking branch 'upstream/master' into curl-smtpGravatar shtrophic2025-01-241-1/+8
|\
| * Sandbox fixesGravatar shtrophic2025-01-231-1/+8
| | | | | | | | | | | | - allow reading `/dev/urandom` as it is shown as a failed syscall when tracing - resolve `/etc/ssl/cert.pem` in case it is a symlink
* | add port parsing for sandboxingGravatar shtrophic2025-01-201-16/+15
|/
* Don't fail Linux sandboxing if /usr/sbin/sendmail does not exist.Gravatar default2025-01-061-1/+1
|
* Minor rework to sandbox code.Gravatar default2025-01-061-61/+59
|
* Fixed sandboxing of the unix socket.Gravatar default2025-01-061-2/+8
|
* Disable sandboxing by default for now.Gravatar default2025-01-051-5/+10
|
* Fixed crash in sandbox code under OpenBSD.Gravatar default2025-01-051-1/+0
|
* More sandbox compilation tweaks under Alpine Linux.Gravatar default2025-01-051-0/+2
|
* Added some autodetection for Linux landlocking on older systems.Gravatar default2025-01-051-4/+15
|
* New compilation variable WITHOUT_SANDBOX, to disable all sandboxing.Gravatar default2025-01-051-0/+12
|
* Minor sandbox fix for Debian stable.Gravatar default2025-01-051-2/+4
|
* use correct macros for compatibilityGravatar shtrophic2024-12-301-9/+9
|
* use compat macros to compile on kernels without LANDLOCK_ACCESS_NET_*Gravatar shtrophic2024-12-261-3/+3
|
* don't try to make files directory-readableGravatar shtrophic2024-12-081-22/+22
|
* make log output specific to landlock statusGravatar shtrophic2024-12-081-3/+4
|
* cleanup rulesGravatar shtrophic2024-12-081-23/+29
|
* import landloc.hGravatar shtrophic2024-12-051-129/+44
|
* make sendmail executable if configuredGravatar shtrophic2024-11-191-1/+4
|
* only rwc /dev/shm when WITHOUT_SHM is undefinedGravatar shtrophic2024-11-191-0/+2
|
* remove unused headersGravatar shtrophic2024-11-161-2/+1
|
* add distinction between RWC with directories and without, include FS_REFER ↵Gravatar shtrophic2024-11-161-11/+14
| | | | permission
* sandboxing port to linux via landlockGravatar shtrophic2024-11-161-0/+184