• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

boustrophedon / extrasafe
78%
master: 78%

Build:
Build:
LAST BUILD BRANCH: combined
DEFAULT BRANCH: master
Repo Added 10 Jan 2022 04:07AM UTC
Files 19
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

LAST BUILD ON BRANCH bindmounts_in_newroot
branch: bindmounts_in_newroot
CHANGE BRANCH
x
Reset
  • bindmounts_in_newroot
  • bundled
  • capabilities
  • ci_fixup
  • ci_run_examples
  • cleanups
  • clippy-no-deps
  • docupdate
  • github-actions
  • ipc_coverage
  • ipc_coverage-rebase
  • ipc_server_ci
  • isolate
  • landlock
  • llvm-cov-coverage
  • manual_workflow_trigger
  • master
  • networking_coverage
  • pedantic_clippy
  • reexport_syscalls
  • refs/tags/v0.1.4
  • refs/tags/v0.2.0
  • refs/tags/v0.3.0
  • refs/tags/v0.4.0
  • refs/tags/v0.5.0
  • refs/tags/v0.5.1
  • rel_v0.1.4
  • release-0.3
  • release-v0.4.0
  • release-v0.5.1
  • remove_time_set
  • tarpaulin-conf
  • tarpaulin_missing_coverage_subprocess
  • time_test
  • use_seccompiler
  • user-guide
  • userguide-update
  • v0.2.0
  • warn_fd_close

18 Apr 2024 01:40AM UTC coverage: 77.506% (-0.2%) from 77.703%
8731126530

Pull #43

github

boustrophedon
Prohibit . and .. in bindmounts

I'm not really sure if this could actually be exploited in any way, but
it also prevents accidentally making bindmounts outside the root
directory as well.

Also update the docstring for add_bind_mount
Pull Request #43: Prohibit . and .. in bindmounts

0 of 3 new or added lines in 1 file covered. (0.0%)

920 of 1187 relevant lines covered (77.51%)

96.02 hits per line

Relevant lines Covered
Build:
Build:
1187 RELEVANT LINES 920 COVERED LINES
96.02 HITS PER LINE
Source Files on bindmounts_in_newroot
  • Tree
  • List 13
  • Changed 3
  • Source Changed 0
  • Coverage Changed 2
Coverage ∆ File Lines Relevant Covered Missed Hits/Line

Recent builds

Builds Branch Commit Type Ran Committer Via Coverage
8731126530 bindmounts_in_newroot Prohibit . and .. in bindmounts I'm not really sure if this could actually be exploited in any way, but it also prevents accidentally making bindmounts outside the root directory as well. Also update the docstring for add_bind_mount Pull #43 18 Apr 2024 01:41AM UTC boustrophedon github
77.51
8731119566 bindmounts_in_newroot Prohibit . and .. in bindmounts I'm not really sure if this could actually be exploited in any way, but it also prevents accidentally making bindmounts outside the root directory as well. Also update the docstring for add_bind_mount push 18 Apr 2024 01:41AM UTC boustrophedon github
77.51
See All Builds (194)
  • Repo on GitHub
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc