sys-apps/firejail (gentoo)

Search

Package Information

Description:
Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf. It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table, mount table.
Homepage:
https://firejail.wordpress.com/

Versions

Version EAPI Keywords Slot
0.9.76 8 amd64 ~arm arm64 ~x86 0
0.9.74 8 amd64 ~arm arm64 ~x86 0
0.9.72 8 amd64 ~arm arm64 ~x86 0

Metadata

Description

Maintainers

Upstream

Raw Metadata XML
<pkgmetadata>
	<maintainer type="person" proxied="yes">
		<email>hlein@korelogic.com</email>
		<name>Hank Leininger</name>
	</maintainer>
	<maintainer type="project" proxied="proxy">
		<email>proxy-maint@gentoo.org</email>
		<name>Proxy Maintainers</name>
	</maintainer>
	<longdescription lang="en">
		Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of
		untrusted applications using Linux namespaces and seccomp-bpf. It allows a process and all its descendants to 
		have their own private view of the globally shared kernel resources, such as the network stack, process table,
		mount table.
	</longdescription>
	<use>
		<flag name="apparmor">Enable support for custom AppArmor profiles</flag>
		<flag name="chroot">Enable chrooting to custom directory</flag>
		<flag name="contrib">Install contrib scripts</flag>
		<flag name="dbusproxy">Enable DBus proxying to filter access in supporting profiles</flag>
		<flag name="file-transfer">Enable file transfers between sandboxes and the host system</flag>
		<flag name="globalcfg">Enable global config file</flag>
		<flag name="network">Enable networking features</flag>
		<flag name="private-home">Enable private home feature</flag>
		<flag name="userns">Enable attaching a new user namespace to a sandbox (--noroot option)</flag>
		<flag name="X">Enable X11 sandboxing</flag>
	</use>
	<upstream>
		<remote-id type="cpe">cpe:/a:firejail_project:firejail</remote-id>
		<remote-id type="github">netblue30/firejail</remote-id>
	</upstream>
</pkgmetadata>

Lint Warnings

USE Flags

Flag Description 0.9.76 0.9.74 0.9.72
X Enable X11 sandboxing
apparmor Enable support for custom AppArmor profiles
chroot Enable chrooting to custom directory
contrib Install contrib scripts
dbusproxy Enable DBus proxying to filter access in supporting profiles
file-transfer Enable file transfers between sandboxes and the host system
globalcfg Enable global config file
network Enable networking features
private-home Enable private home feature
selinux !!internal use only!! Security Enhanced Linux support, this must be set by the selinux profile or breakage will occur
test Enable dependencies and/or preparations necessary to run tests (usually controlled by FEATURES=test but can be toggled independently)
userns Enable attaching a new user namespace to a sandbox (--noroot option)

Files

Manifest

Type File Size Versions
DIST firejail-0.9.72.tar.xz 503192 bytes 0.9.72
DIST firejail-0.9.74.tar.xz 527640 bytes 0.9.74
DIST firejail-0.9.76.tar.xz 526972 bytes 0.9.76
Unmatched Entries
Type File Size