-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Explore sandboxed build scripts #108
Comments
This issue is intended for status updates only. For general questions or comments, please contact the owner(s) directly. |
Key developments:Have been looking into different sandbox runtime choices. Here is a simple version of the comparison of three potential choices:
There are prior research on cross-over between each of these options. I've been busy these two weeks. Will update a more detail post for prior arts afterward. The biggest challenge I am seeing now is spawning external processes. Most build script usages invoke some external binaries, like The other huge headache is setting library search paths. We cannot know every possible path of system libraries ahead of time, but we need to grant access to the runtime. Blockers:None. Help wanted:None. |
Having a family urgency. I will be back after RustConf. |
Key developments:Building a workable version of wasm-based build script (not yet done). There are some technical difficulties. Not blocking but need to be addressed.
In order to make the development independent of Cargo,
Some compatibility issues came up when integrating with Cargo:
Blockers:None. Help wanted:None. |
Summary
Explore different strategies for sandboxing build script executions in Cargo.
Tasks and status
The text was updated successfully, but these errors were encountered: