sys-apps/firejail (hossie)

Search

Package Information

Description:
Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf. It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table, mount table.
Homepage:
https://firejail.wordpress.com/
License:
GPL-2

Versions

Version EAPI Keywords Slot
0.9.72_p20241108 8 amd64 ~arm ~arm64 ~x86 0

Metadata

Description

Upstream

Raw Metadata XML
<pkgmetadata>
	<longdescription lang="en">
		Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of
		untrusted applications using Linux namespaces and seccomp-bpf. It allows a process and all its descendants to 
		have their own private view of the globally shared kernel resources, such as the network stack, process table,
		mount table.
	</longdescription>
	<use>
		<flag name="apparmor">Enable support for custom AppArmor profiles</flag>
		<flag name="chroot">Enable chrooting to custom directory</flag>
		<flag name="contrib">Install contrib scripts</flag>
		<flag name="dbusproxy">Enable DBus proxying to filter access in supporting profiles</flag>
		<flag name="file-transfer">Enable file transfers between sandboxes and the host system</flag>
		<flag name="globalcfg">Enable global config file</flag>
		<flag name="network">Enable networking features</flag>
		<flag name="private-home">Enable private home feature</flag>
		<flag name="userns">Enable attaching a new user namespace to a sandbox (--noroot option)</flag>
		<flag name="X">Enable X11 sandboxing</flag>
	</use>
	<upstream>
		<remote-id type="cpe">cpe:/a:firejail_project:firejail</remote-id>
		<remote-id type="github">netblue30/firejail</remote-id>
	</upstream>
</pkgmetadata>

Lint Warnings

USE Flags

Flag Description 0.9.72_p20241108
X Enable X11 sandboxing
apparmor Enable support for custom AppArmor profiles
chroot Enable chrooting to custom directory
contrib Install contrib scripts
dbusproxy Enable DBus proxying to filter access in supporting profiles
file-transfer Enable file transfers between sandboxes and the host system
globalcfg Enable global config file
network Enable networking features
private-home Enable private home feature
selinux ⚠️
test ⚠️
userns Enable attaching a new user namespace to a sandbox (--noroot option)

Files

Manifest

Type File Size Versions
DIST firejail-0.9.72_p20241108.tar.gz 859816 bytes 0.9.72_p20241108
Unmatched Entries
Type File Size
AUX firejail-0.9.70-envlimits.patch 669 bytes
AUX firejail-0.9.72git-firecfg.config.patch 1129 bytes
AUX profile_display.local 158 bytes
AUX profile_patch.local 198 bytes
AUX profile_pdftotext.local 132 bytes
AUX profile_wget.local 128 bytes
EBUILD firejail-0.9.72_p20241108.ebuild 3529 bytes
MISC metadata.xml 1417 bytes