| Version | EAPI | Keywords | Slot |
|---|---|---|---|
| 0.9.76 | 8 | amd64 ~arm arm64 ~x86 | 0 |
| 0.9.74 | 8 | amd64 ~arm arm64 ~x86 | 0 |
| 0.9.72 | 8 | amd64 ~arm arm64 ~x86 | 0 |
<pkgmetadata> <maintainer type="person" proxied="yes"> <email>hlein@korelogic.com</email> <name>Hank Leininger</name> </maintainer> <maintainer type="project" proxied="proxy"> <email>proxy-maint@gentoo.org</email> <name>Proxy Maintainers</name> </maintainer> <longdescription lang="en"> Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf. It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table, mount table. </longdescription> <use> <flag name="apparmor">Enable support for custom AppArmor profiles</flag> <flag name="chroot">Enable chrooting to custom directory</flag> <flag name="contrib">Install contrib scripts</flag> <flag name="dbusproxy">Enable DBus proxying to filter access in supporting profiles</flag> <flag name="file-transfer">Enable file transfers between sandboxes and the host system</flag> <flag name="globalcfg">Enable global config file</flag> <flag name="network">Enable networking features</flag> <flag name="private-home">Enable private home feature</flag> <flag name="userns">Enable attaching a new user namespace to a sandbox (--noroot option)</flag> <flag name="X">Enable X11 sandboxing</flag> </use> <upstream> <remote-id type="cpe">cpe:/a:firejail_project:firejail</remote-id> <remote-id type="github">netblue30/firejail</remote-id> </upstream> </pkgmetadata>
| Flag | Description | 0.9.76 | 0.9.74 | 0.9.72 |
|---|---|---|---|---|
| X | Enable X11 sandboxing | ✓ | ✓ | ✓ |
| apparmor | Enable support for custom AppArmor profiles | ✓ | ✓ | ✓ |
| chroot | Enable chrooting to custom directory | ⊕ | ⊕ | ⊕ |
| contrib | Install contrib scripts | ✓ | ✓ | ✓ |
| dbusproxy | Enable DBus proxying to filter access in supporting profiles | ⊕ | ⊕ | ⊕ |
| file-transfer | Enable file transfers between sandboxes and the host system | ⊕ | ⊕ | ⊕ |
| globalcfg | Enable global config file | ⊕ | ⊕ | ⊕ |
| network | Enable networking features | ⊕ | ⊕ | ⊕ |
| private-home | Enable private home feature | ⊕ | ⊕ | ⊕ |
| selinux | !!internal use only!! Security Enhanced Linux support, this must be set by the selinux profile or breakage will occur | ✓ | ✓ | ✓ |
| test | Enable dependencies and/or preparations necessary to run tests (usually controlled by FEATURES=test but can be toggled independently) | ✓ | ✓ | ✓ |
| userns | Enable attaching a new user namespace to a sandbox (--noroot option) | ⊕ | ⊕ | ⊕ |
| Type | File | Size | Versions |
|---|---|---|---|
| DIST | firejail-0.9.72.tar.xz | 503192 bytes | 0.9.72 |
| DIST | firejail-0.9.74.tar.xz | 527640 bytes | 0.9.74 |
| DIST | firejail-0.9.76.tar.xz | 526972 bytes | 0.9.76 |
| Type | File | Size |
|---|