Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Fix the access of symlinks to host files in the sandbox
#10456 fixed the addition of symlink store paths to the sandbox, but also made it so that the hardcoded sandbox paths (like `/etc/hosts`) were now bind-mounted without following the possible symlinks. This made these files unreadable if there were symlinks (because the sandbox would now contain a symlink to an unreachable file rather than the underlying file). In particular, this broke FOD derivations on NixOS as `/etc/hosts` is a symlink there. Fix that by canonicalizing all these hardcoded sandbox paths before adding them to the sandbox. (cherry picked from commit acbb152) (cherry picked from commit 1cc79f1) # Conflicts: # tests/functional/linux-sandbox.sh
- Loading branch information