summaryrefslogtreecommitdiff
path: root/buildstream/sandbox/_mount.py
Commit message (Collapse)AuthorAgeFilesLines
* element: Make "--sysroot" take a bare directoryJonathan Maw2018-10-301-1/+1
| | | | | | | | | | | | | | | | | | i.e. instead of taking a directory that must contain "root" and "scratch", and treating "root" as the root, use the directory directly. In element.py: * __sandbox takes the `bare_sandbox` arg, to pass into the sandbox's constructor In sandbox.py: * If bare_sandbox, `_root` is the passed-in directory, and `__scratch` is None. * Trying to use `__scratch` when bare_sandbox is True is a bug. In _mount.py: * Don't get the value of `__scratch` if it's not needed. This is part of #539
* sandbox/_mount.py: Do not use dict literals in argument defaultsDaniel Silverstone2018-10-251-3/+6
| | | | | | | The use of dictionary literals in argument defaults is disrecommended due to the way that they are static and thus potentially very confusing. Signed-off-by: Daniel Silverstone <daniel.silverstone@codethink.co.uk>
* Fix spelling of it's and itsRichard Dale2018-10-161-1/+1
|
* FUSE: Mount with -odev in chroot sandboxRichard Maw2018-09-181-5/+6
| | | | | | | | | | | | | This is needed to permit access to the device nodes added to /dev on Linux when FUSE is used as root. The chroot sandbox only works with all privileges, so there's no explicit check for being root or having the appropriate capabilities. A check for whether it's running as root isn't needed on Linux with bubblewrap because /dev or its devices are mounted on top of the FUSE layer, so device nodes are accessed directly rather than through the FUSE layer.
* Convert uses of external_directory to get_underlying_directory()Jim MacArthur2018-08-151-2/+4
|
* sandbox: Remove instances of get_directoryJim MacArthur2018-08-011-1/+2
| | | | | sandbox/_mount.py, sandbox/_sandboxbwrap.py: Remove instances of get_directory
* Remove shebangs from python filesGökçen Nurlu2018-06-191-1/+0
| | | | Fixes #424
* buildstream/sandbox/_mount.py: Fixing unused variablesTristan Van Berkom2018-04-191-1/+1
|
* sandbox/_mount.py: Ensure file existence for bind mountsTristan Van Berkom2018-02-281-1/+17
| | | | | | | This logic existed but is now a bit more complex with the addition of allowing explicit bind mounts to be defined for the shell; the change is that now files can also be mounted into the sandbox instead of just directories.
* sandbox: Refactoring, moving accidentally public MountMap into it's own fileTristan Van Berkom2017-11-061-0/+127
|
* sandbox/_mount.py: Renamed _mounter.pyTristan Van Berkom2017-11-061-125/+0
| | | | | Disambiguate with the Mount and MountMap classes, which were accidentally added to public API.
* Refactoring: Move exceptions module to be privateTristan Van Berkom2017-11-061-1/+1
| | | | Hide all of buildstream's internal exceptions from the API surface.
* Refactoring: Move ElementError and SourceError to their respective classes, ↵Tristan Van Berkom2017-11-061-3/+3
| | | | | | | | | | create SandboxError These errors are a part of public facing API, and the exceptions module contains a lot of internal details to be hidden from public API. This move required creating SandboxError because sandbox related code had previously been hijacking the ElementError and raising that.
* Move sandboxes to separate directoryTristan Maat2017-09-281-0/+125