Conversation
Fixes Permission Error when writing to a 666 /dev/null.
DISPLAY=:0 RW_BIND=/tmp/.X11-unix/X0 ./sandbox-run4
2523e48 to
281d5c3
Compare
|
I just stumbled across sandbox-run and it looks quite useful! Of course, running random scripts off GitHub can be as much a problem as running The implementation in this PR makes for a different first impression. It's still very good for shell code, backed by rigorous application of shellcheck and a test suite. I just can't help but ask: what did bubblewrap do wrong that made you decide you'd rather maintain hundreds of lines of shell script? |
8923c51 to
ad9c6a9
Compare
|
@keturn Hey! Thanks for the kind words. Indeed, the recent proliferation of installation steps comprising Then somebody hinted at Considering the two versions functionally equivalent (a huge assumption as I'm a real kernel noob), I now like this one somewhat better. But you too are right, as the length and ordering of the commit log in this PR confirms, shell certainly is full of biting gremlins. I thought of putting the old version in a branch/tag, but your unexpected comment raises legitimate questions whether the two versions can be maintained side by side ...
Would appreciate a more thorough review! 😝 * New additional features in this PR:
|
For whatever reason, this doesn't run bash interactive: unshare bash <&0 & https://en.wikipedia.org/wiki/SIGTTIN
1de1afd to
41ff71c
Compare
This only worked in Bash and Zsh, but not dash, POSIX or fish. Fixes #1
"30% faster too!"
Reimplementation based on
unsharefromutil-linuxpackage. Dropsbwrapas a dependency.