Ensure that /dev/std* streams have appropriate sandbox permission for
authorZac Medico <zmedico@gentoo.org>
Sun, 18 Oct 2009 03:23:21 +0000 (03:23 -0000)
committerZac Medico <zmedico@gentoo.org>
Sun, 18 Oct 2009 03:23:21 +0000 (03:23 -0000)
bug #288863. This can be removed after sandbox is fixed and portage
depends on the fixed version. (trunk r14612)

svn path=/main/branches/2.1.7/; revision=14641

bin/ebuild.sh

index 0c7553933770d112926b48955b79f63cab4ef920..b1ddd63c68572ff11800c5ca2cc6b6ca92868cb5 100755 (executable)
@@ -6,6 +6,12 @@
 PORTAGE_BIN_PATH="${PORTAGE_BIN_PATH:-/usr/lib/portage/bin}"
 PORTAGE_PYM_PATH="${PORTAGE_PYM_PATH:-/usr/lib/portage/pym}"
 
+# Ensure that /dev/std* streams have appropriate sandbox permission for
+# bug #288863. This can be removed after sandbox is fixed and portage
+# depends on the fixed version.
+export SANDBOX_WRITE="${SANDBOX_WRITE:+${SANDBOX_WRITE}:}/dev/stdout:/dev/stderr"
+export SANDBOX_READ="${SANDBOX_READ:+${SANDBOX_READ}:}/dev/stdin"
+
 # Don't use sandbox's BASH_ENV for new shells because it does
 # 'source /etc/profile' which can interfere with the build
 # environment by modifying our PATH.