-
Notifications
You must be signed in to change notification settings - Fork 43
FreeBSD support #38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
(I was just writing this in servo/servo#11625 … :D) Gaol is designed around a syscall filtering model like seccomp/pledge, not an object-capability model like Capsicum. (I made a little crate that's better suited for Capsicum — including the awesome I can add a Capsicum backend for Gaol that disallows everything :) but Servo would have to pass all the descriptors from a privileged process or open them beforehand. Looks like the content process sandbox only needs |
Actually |
Add FreeBSD Capsicum support Fixes #38.
The text was updated successfully, but these errors were encountered: