Rename namespace-sandbox/-runner to linux-sandbox.

--
MOS_MIGRATED_REVID=127538990
diff --git a/src/BUILD b/src/BUILD
index 0547c5f..392c944 100644
--- a/src/BUILD
+++ b/src/BUILD
@@ -26,7 +26,7 @@
         ":libunix",
         "//src/main/tools:build-runfiles",
         "//src/main/tools:process-wrapper",
-        "//src/main/tools:namespace-sandbox",
+        "//src/main/tools:linux-sandbox",
         "//src/main/tools:build_interface_so",
         "//src/tools/xcode/xcodelocator:xcode-locator",
     ] + embedded_tools,
@@ -183,7 +183,7 @@
         "//src/main/tools:build-runfiles",
         "//src/main/tools:process-wrapper",
         "//src/main/tools:jdk-support",
-        "//src/main/tools:namespace-sandbox",
+        "//src/main/tools:linux-sandbox",
         "//src/main/tools:build_interface_so",
         "//src/tools/xcode/xcodelocator:xcode-locator",
         ":java-version",
diff --git a/src/main/java/com/google/devtools/build/lib/sandbox/BUILD b/src/main/java/com/google/devtools/build/lib/sandbox/BUILD
index 1fe3fba..6071bfc 100644
--- a/src/main/java/com/google/devtools/build/lib/sandbox/BUILD
+++ b/src/main/java/com/google/devtools/build/lib/sandbox/BUILD
@@ -6,7 +6,7 @@
     name = "sandbox",
     srcs = glob(["*.java"]),
     data = [
-        "//src/main/tools:namespace-sandbox",
+        "//src/main/tools:linux-sandbox",
     ],
     deps = [
         "//src/main/java/com/google/devtools/build/lib:build-base",
diff --git a/src/main/java/com/google/devtools/build/lib/sandbox/NamespaceSandboxRunner.java b/src/main/java/com/google/devtools/build/lib/sandbox/LinuxSandboxRunner.java
similarity index 94%
rename from src/main/java/com/google/devtools/build/lib/sandbox/NamespaceSandboxRunner.java
rename to src/main/java/com/google/devtools/build/lib/sandbox/LinuxSandboxRunner.java
index 9516fe2..bae4ec9 100644
--- a/src/main/java/com/google/devtools/build/lib/sandbox/NamespaceSandboxRunner.java
+++ b/src/main/java/com/google/devtools/build/lib/sandbox/LinuxSandboxRunner.java
@@ -31,7 +31,6 @@
 import com.google.devtools.build.lib.vfs.FileSystemUtils;
 import com.google.devtools.build.lib.vfs.Path;
 import com.google.devtools.build.lib.vfs.PathFragment;
-
 import java.io.File;
 import java.io.IOException;
 import java.nio.charset.StandardCharsets;
@@ -40,12 +39,11 @@
 import java.util.List;
 
 /**
- * Helper class for running the namespace sandbox. This runner prepares environment inside the
- * sandbox, handles sandbox output, performs cleanup and changes invocation if necessary.
+ * Helper class for running the Linux sandbox. This runner prepares environment inside the sandbox,
+ * handles sandbox output, performs cleanup and changes invocation if necessary.
  */
-public class NamespaceSandboxRunner {
-  private static final String NAMESPACE_SANDBOX =
-      "namespace-sandbox" + OsUtils.executableExtension();
+public class LinuxSandboxRunner {
+  private static final String LINUX_SANDBOX = "linux-sandbox" + OsUtils.executableExtension();
   private static final String SANDBOX_TIP =
       "\n\nSandboxed execution failed, which may be legitimate (e.g. a compiler error), "
           + "or due to missing dependencies. To enter the sandbox environment for easier debugging,"
@@ -60,7 +58,7 @@
   private final boolean verboseFailures;
   private final boolean sandboxDebug;
 
-  public NamespaceSandboxRunner(
+  public LinuxSandboxRunner(
       Path execRoot,
       Path sandboxPath,
       ImmutableMap<Path, Path> mounts,
@@ -82,7 +80,7 @@
     Path execRoot = commandEnv.getExecRoot();
 
     PathFragment embeddedTool =
-        commandEnv.getBlazeWorkspace().getBinTools().getExecPath(NAMESPACE_SANDBOX);
+        commandEnv.getBlazeWorkspace().getBinTools().getExecPath(LINUX_SANDBOX);
     if (embeddedTool == null) {
       // The embedded tool does not exist, meaning that we don't support sandboxing (e.g., while
       // bootstrapping).
@@ -135,7 +133,7 @@
     List<String> fileArgs = new ArrayList<>();
     List<String> commandLineArgs = new ArrayList<>();
 
-    commandLineArgs.add(execRoot.getRelative("_bin/namespace-sandbox").getPathString());
+    commandLineArgs.add(execRoot.getRelative("_bin/linux-sandbox").getPathString());
 
     if (sandboxDebug) {
       fileArgs.add("-D");
diff --git a/src/main/java/com/google/devtools/build/lib/sandbox/LinuxSandboxedStrategy.java b/src/main/java/com/google/devtools/build/lib/sandbox/LinuxSandboxedStrategy.java
index dadd569..9a04ed8 100644
--- a/src/main/java/com/google/devtools/build/lib/sandbox/LinuxSandboxedStrategy.java
+++ b/src/main/java/com/google/devtools/build/lib/sandbox/LinuxSandboxedStrategy.java
@@ -49,7 +49,6 @@
 import com.google.devtools.build.lib.vfs.PathFragment;
 import com.google.devtools.build.lib.vfs.SearchPath;
 import com.google.devtools.build.lib.vfs.Symlinks;
-
 import java.io.File;
 import java.io.IOException;
 import java.nio.charset.StandardCharsets;
@@ -155,8 +154,8 @@
     }
 
     try {
-      final NamespaceSandboxRunner runner =
-          new NamespaceSandboxRunner(
+      final LinuxSandboxRunner runner =
+          new LinuxSandboxRunner(
               execRoot,
               sandboxPath,
               mounts,
@@ -217,7 +216,7 @@
   /**
    * Most programs expect certain directories to be present, e.g. /tmp. Make sure they are.
    *
-   * <p>Note that $HOME is handled by namespace-sandbox.c, because it changes user to nobody and the
+   * <p>Note that $HOME is handled by linux-sandbox.c, because it changes user to nobody and the
    * home directory of that user is not known by us.
    */
   private ImmutableSet<Path> createImportantDirs(Map<String, String> env) {
diff --git a/src/main/java/com/google/devtools/build/lib/sandbox/SandboxModule.java b/src/main/java/com/google/devtools/build/lib/sandbox/SandboxModule.java
index 04f6169..be3dc04 100644
--- a/src/main/java/com/google/devtools/build/lib/sandbox/SandboxModule.java
+++ b/src/main/java/com/google/devtools/build/lib/sandbox/SandboxModule.java
@@ -27,7 +27,6 @@
 import com.google.devtools.build.lib.util.OS;
 import com.google.devtools.build.lib.util.Preconditions;
 import com.google.devtools.common.options.OptionsBase;
-
 import java.util.concurrent.ExecutorService;
 import java.util.concurrent.Executors;
 
@@ -50,7 +49,7 @@
 
   private synchronized boolean isSandboxingSupported(CommandEnvironment env) {
     if (sandboxingSupported == null) {
-      sandboxingSupported = NamespaceSandboxRunner.isSupported(env);
+      sandboxingSupported = LinuxSandboxRunner.isSupported(env);
     }
     return sandboxingSupported.booleanValue();
   }
diff --git a/src/main/tools/BUILD b/src/main/tools/BUILD
index de5ec21..ead4168 100644
--- a/src/main/tools/BUILD
+++ b/src/main/tools/BUILD
@@ -29,13 +29,13 @@
 )
 
 cc_binary(
-    name = "namespace-sandbox",
+    name = "linux-sandbox",
     srcs = select({
-        "//src:darwin": ["namespace-sandbox-dummy.c"],
-        "//src:darwin_x86_64": ["namespace-sandbox-dummy.c"],
-        "//src:freebsd": ["namespace-sandbox-dummy.c"],
-        "//src:windows": ["namespace-sandbox-dummy.c"],
-        "//conditions:default": ["namespace-sandbox.c"],
+        "//src:darwin": ["dummy-sandbox.c"],
+        "//src:darwin_x86_64": ["dummy-sandbox.c"],
+        "//src:freebsd": ["dummy-sandbox.c"],
+        "//src:windows": ["dummy-sandbox.c"],
+        "//conditions:default": ["linux-sandbox.c"],
     }),
     copts = ["-std=c99"],
     linkopts = ["-lm"],
diff --git a/src/main/tools/namespace-sandbox-dummy.c b/src/main/tools/dummy-sandbox.c
similarity index 62%
rename from src/main/tools/namespace-sandbox-dummy.c
rename to src/main/tools/dummy-sandbox.c
index 8c082c5..e8ba6b5 100644
--- a/src/main/tools/namespace-sandbox-dummy.c
+++ b/src/main/tools/dummy-sandbox.c
@@ -12,12 +12,11 @@
 // See the License for the specific language governing permissions and
 // limitations under the License.
 
-// This is a dummy file to compile on platforms where namespace sandboxing
-// doesn't work (ie. other than Linux). We need this for main/tools/BUILD file
-// - we can't restrict visibility of namespace-sandbox based on platform;
-// instead bazel build main/tools:namespace-sandbox is a no-op on non supported
-// platforms (if we didn't have this file, it would fail with a non-informative
-// message)
+// This is a dummy file to compile on platforms where sandboxing doesn't work.
+// We need this for main/tools/BUILD file - we can't restrict visibility of
+// linux-sandbox based on platform; instead bazel build
+// main/tools:linux-sandbox is a no-op on non supported platforms (if we didn't
+// have this file, it would fail with a non-informative message)
 
 int main(int argc, char *argv[]) {
   return 1;
diff --git a/src/main/tools/namespace-sandbox.c b/src/main/tools/linux-sandbox.c
similarity index 100%
rename from src/main/tools/namespace-sandbox.c
rename to src/main/tools/linux-sandbox.c
diff --git a/src/test/java/com/google/devtools/build/lib/BUILD b/src/test/java/com/google/devtools/build/lib/BUILD
index 42b06d7..446712a 100644
--- a/src/test/java/com/google/devtools/build/lib/BUILD
+++ b/src/test/java/com/google/devtools/build/lib/BUILD
@@ -21,7 +21,7 @@
     data = [
         "//src/main/tools:build-runfiles",
         "//src/main/tools:build_interface_so",
-        "//src/main/tools:namespace-sandbox",
+        "//src/main/tools:linux-sandbox",
         "//src/main/tools:process-wrapper",
     ],
 )
diff --git a/src/test/java/com/google/devtools/build/lib/sandbox/LocalLinuxSandboxedStrategyTest.java b/src/test/java/com/google/devtools/build/lib/sandbox/LocalLinuxSandboxedStrategyTest.java
index 34ce54f..bd3e830 100644
--- a/src/test/java/com/google/devtools/build/lib/sandbox/LocalLinuxSandboxedStrategyTest.java
+++ b/src/test/java/com/google/devtools/build/lib/sandbox/LocalLinuxSandboxedStrategyTest.java
@@ -29,17 +29,15 @@
 import com.google.devtools.build.lib.testutil.TestSpec;
 import com.google.devtools.build.lib.util.OS;
 import com.google.devtools.build.lib.vfs.Path;
-
+import java.util.Arrays;
+import java.util.Map;
 import org.junit.Test;
 import org.junit.runner.RunWith;
 import org.junit.runners.JUnit4;
 
-import java.util.Arrays;
-import java.util.Map;
-
 /**
- * Tests for {@code LinuxSandboxedStrategy} that must run locally, because they need to actually
- * run the namespace-sandbox binary.
+ * Tests for {@code LinuxSandboxedStrategy} that must run locally, because they need to actually run
+ * the linux-sandbox binary.
  */
 @TestSpec(localOnly = true, supportedOs = OS.LINUX)
 @RunWith(JUnit4.class)
diff --git a/src/test/java/com/google/devtools/build/lib/testutil/TestConstants.java b/src/test/java/com/google/devtools/build/lib/testutil/TestConstants.java
index b240a65..8db1105 100644
--- a/src/test/java/com/google/devtools/build/lib/testutil/TestConstants.java
+++ b/src/test/java/com/google/devtools/build/lib/testutil/TestConstants.java
@@ -33,7 +33,7 @@
   public static final ImmutableList<String> EMBEDDED_TOOLS = ImmutableList.of(
       "build_interface_so",
       "build-runfiles",
-      "namespace-sandbox",
+      "linux-sandbox",
       "process-wrapper",
       "xcode-locator");
 
diff --git a/src/test/shell/bazel/BUILD b/src/test/shell/bazel/BUILD
index f70d852..7e1f4e6 100644
--- a/src/test/shell/bazel/BUILD
+++ b/src/test/shell/bazel/BUILD
@@ -65,7 +65,7 @@
         "//src/java_tools/buildjar/java/com/google/devtools/build/buildjar/genclass:GenClass_deploy.jar",
         "//src/java_tools/junitrunner/java/com/google/testing/junit/runner:Runner_deploy.jar",
         "//src/java_tools/singlejar:SingleJar_deploy.jar",
-        "//src/main/tools:namespace-sandbox",
+        "//src/main/tools:linux-sandbox",
         "//src/main/tools:process-wrapper",
         "//src/test/shell:bashunit",
         "//third_party:srcs",
@@ -283,9 +283,9 @@
 )
 
 sh_test(
-    name = "namespace_runner_test",
+    name = "linux_sandbox_test",
     size = "large",
-    srcs = ["namespace-runner_test.sh"],
+    srcs = ["linux-sandbox_test.sh"],
     data = [":test-deps"],
 )
 
diff --git a/src/test/shell/bazel/bazel_sandboxing_test_utils.sh b/src/test/shell/bazel/bazel_sandboxing_test_utils.sh
index 77e17f5..f442ece 100755
--- a/src/test/shell/bazel/bazel_sandboxing_test_utils.sh
+++ b/src/test/shell/bazel/bazel_sandboxing_test_utils.sh
@@ -23,7 +23,7 @@
 }
 
 function check_sandbox_allowed {
-  $namespace_sandbox -C || {
+  $linux_sandbox -C || {
     echo "Sandboxing disabled or not supported on this system, skipping..."
     return 1
   }
diff --git a/src/test/shell/bazel/namespace-runner_test.sh b/src/test/shell/bazel/linux-sandbox_test.sh
similarity index 70%
rename from src/test/shell/bazel/namespace-runner_test.sh
rename to src/test/shell/bazel/linux-sandbox_test.sh
index da6857b..ad2b4ae 100755
--- a/src/test/shell/bazel/namespace-runner_test.sh
+++ b/src/test/shell/bazel/linux-sandbox_test.sh
@@ -49,66 +49,66 @@
 }
 
 function test_basic_functionality() {
-  $namespace_sandbox $SANDBOX_DEFAULT_OPTS -l $OUT -L $ERR -- /bin/echo hi there || fail
+  $linux_sandbox $SANDBOX_DEFAULT_OPTS -l $OUT -L $ERR -- /bin/echo hi there || fail
   assert_output "hi there" ""
 }
 
 function test_default_user_is_nobody() {
-  $namespace_sandbox $SANDBOX_DEFAULT_OPTS -l $OUT -L $ERR -- /usr/bin/id || fail
+  $linux_sandbox $SANDBOX_DEFAULT_OPTS -l $OUT -L $ERR -- /usr/bin/id || fail
   assert_output "uid=65534 gid=65534 groups=65534" ""
 }
 
 function test_user_switched_to_root() {
-  $namespace_sandbox $SANDBOX_DEFAULT_OPTS -r -l $OUT -L $ERR -- /usr/bin/id || fail
+  $linux_sandbox $SANDBOX_DEFAULT_OPTS -r -l $OUT -L $ERR -- /usr/bin/id || fail
   assert_contains "uid=0 gid=0" "$OUT"
 }
 
 function test_network_namespace() {
-  $namespace_sandbox $SANDBOX_DEFAULT_OPTS -n -l $OUT -L $ERR  -- /bin/ip link ls || fail
+  $linux_sandbox $SANDBOX_DEFAULT_OPTS -n -l $OUT -L $ERR  -- /bin/ip link ls || fail
   assert_contains "LOOPBACK,UP" "$OUT"
 }
 
 function test_ping_loopback() {
-  $namespace_sandbox $SANDBOX_DEFAULT_OPTS -n -r -l $OUT -L $ERR  -- /bin/ping -c 1 127.0.0.1 || fail
+  $linux_sandbox $SANDBOX_DEFAULT_OPTS -n -r -l $OUT -L $ERR  -- /bin/ping -c 1 127.0.0.1 || fail
   assert_contains "1 received" "$OUT"
 }
 
 function test_to_stderr() {
-  $namespace_sandbox $SANDBOX_DEFAULT_OPTS -l $OUT -L $ERR -- /bin/bash -c "/bin/echo hi there >&2" || fail
+  $linux_sandbox $SANDBOX_DEFAULT_OPTS -l $OUT -L $ERR -- /bin/bash -c "/bin/echo hi there >&2" || fail
   assert_output "" "hi there"
 }
 
 function test_exit_code() {
-  $namespace_sandbox $SANDBOX_DEFAULT_OPTS -l $OUT -L $ERR -- /bin/bash -c "exit 71" || code=$?
+  $linux_sandbox $SANDBOX_DEFAULT_OPTS -l $OUT -L $ERR -- /bin/bash -c "exit 71" || code=$?
   assert_equals 71 "$code"
 }
 
 function test_signal_death() {
-  $namespace_sandbox $SANDBOX_DEFAULT_OPTS -l $OUT -L $ERR -- /bin/bash -c 'kill -ABRT $$' || code=$?
+  $linux_sandbox $SANDBOX_DEFAULT_OPTS -l $OUT -L $ERR -- /bin/bash -c 'kill -ABRT $$' || code=$?
   assert_equals 134 "$code" # SIGNAL_BASE + SIGABRT = 128 + 6
 }
 
 function test_signal_catcher() {
-  $namespace_sandbox $SANDBOX_DEFAULT_OPTS -T 2 -t 3 -l $OUT -L $ERR -- /bin/bash -c \
+  $linux_sandbox $SANDBOX_DEFAULT_OPTS -T 2 -t 3 -l $OUT -L $ERR -- /bin/bash -c \
     'trap "echo later; exit 0" SIGINT SIGTERM SIGALRM; sleep 1000' || code=$?
   assert_equals 142 "$code" # SIGNAL_BASE + SIGALRM = 128 + 14
   assert_stdout "later"
 }
 
 function test_basic_timeout() {
-  $namespace_sandbox $SANDBOX_DEFAULT_OPTS -T 3 -t 3 -l $OUT -L $ERR -- /bin/bash -c "echo before; sleep 1000; echo after" && fail
+  $linux_sandbox $SANDBOX_DEFAULT_OPTS -T 3 -t 3 -l $OUT -L $ERR -- /bin/bash -c "echo before; sleep 1000; echo after" && fail
   assert_output "before" ""
 }
 
 function test_timeout_grace() {
-  $namespace_sandbox $SANDBOX_DEFAULT_OPTS -T 2 -t 3 -l $OUT -L $ERR -- /bin/bash -c \
+  $linux_sandbox $SANDBOX_DEFAULT_OPTS -T 2 -t 3 -l $OUT -L $ERR -- /bin/bash -c \
     'trap "echo -n before; sleep 1; echo -n after; exit 0" SIGINT SIGTERM SIGALRM; sleep 1000' || code=$?
   assert_equals 142 "$code" # SIGNAL_BASE + SIGALRM = 128 + 14
   assert_stdout "beforeafter"
 }
 
 function test_timeout_kill() {
-  $namespace_sandbox $SANDBOX_DEFAULT_OPTS -T 2 -t 3 -l $OUT -L $ERR -- /bin/bash -c \
+  $linux_sandbox $SANDBOX_DEFAULT_OPTS -T 2 -t 3 -l $OUT -L $ERR -- /bin/bash -c \
     'trap "echo before; sleep 1000; echo after; exit 0" SIGINT SIGTERM SIGALRM; sleep 1000' || code=$?
   assert_equals 142 "$code" # SIGNAL_BASE + SIGALRM = 128 + 14
   assert_stdout "before"
@@ -116,7 +116,7 @@
 
 function test_debug_logging() {
   touch ${TEST_TMPDIR}/testfile
-  $namespace_sandbox $SANDBOX_DEFAULT_OPTS -D -M ${TEST_TMPDIR}/testfile -m /tmp/sandboxed_testfile -l $OUT -L $ERR -- /bin/true || code=$?
+  $linux_sandbox $SANDBOX_DEFAULT_OPTS -D -M ${TEST_TMPDIR}/testfile -m /tmp/sandboxed_testfile -l $OUT -L $ERR -- /bin/true || code=$?
   assert_contains "mount: /usr/bin\$" "$ERR"
   assert_contains "mount: ${TEST_TMPDIR}/testfile -> <sandbox>/tmp/sandboxed_testfile\$" "$ERR"
 }
@@ -125,4 +125,4 @@
 check_supported_platform || exit 0
 check_sandbox_allowed || exit 0
 
-run_suite "namespace-runner"
+run_suite "linux-sandbox"
diff --git a/src/test/shell/bazel/testenv.sh b/src/test/shell/bazel/testenv.sh
index 594a826..b38251f 100755
--- a/src/test/shell/bazel/testenv.sh
+++ b/src/test/shell/bazel/testenv.sh
@@ -76,7 +76,7 @@
 
 # Sandbox tools
 process_wrapper="${BAZEL_RUNFILES}/src/main/tools/process-wrapper"
-namespace_sandbox="${BAZEL_RUNFILES}/src/main/tools/namespace-sandbox"
+linux_sandbox="${BAZEL_RUNFILES}/src/main/tools/linux-sandbox"
 
 # iOS and Objective-C tooling
 iossim_path="${BAZEL_RUNFILES}/third_party/iossim/iossim"