summaryrefslogtreecommitdiff
blob: ee1cc2f6e7bbd24f6df162e121cbd75545d4cf64 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE pkgmetadata SYSTEM "https://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
	<maintainer type="person" proxied="yes">
		<email>hlein@korelogic.com</email>
		<name>Hank Leininger</name>
	</maintainer>
	<maintainer type="project" proxied="proxy">
		<email>proxy-maint@gentoo.org</email>
		<name>Proxy Maintainers</name>
	</maintainer>
	<longdescription lang="en">
		Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of
		untrusted applications using Linux namespaces and seccomp-bpf. It allows a process and all its descendants to 
		have their own private view of the globally shared kernel resources, such as the network stack, process table,
		mount table.
	</longdescription>
	<upstream>
		<remote-id type="cpe">cpe:/a:firejail_project:firejail</remote-id>
		<remote-id type="github">netblue30/firejail</remote-id>
	</upstream>
	<use>
		<flag name="apparmor">Enable support for custom AppArmor profiles</flag>
		<flag name="chroot">Enable chrooting to custom directory</flag>
		<flag name="contrib">Install contrib scripts</flag>
		<flag name="dbusproxy">Enable DBus proxying to filter access in supporting profiles</flag>
		<flag name="file-transfer">Enable file transfers between sandboxes and the host system</flag>
		<flag name="globalcfg">Enable global config file</flag>
		<flag name="network">Enable networking features</flag>
		<flag name="private-home">Enable private home feature</flag>
		<flag name="userns">Enable attaching a new user namespace to a sandbox (--noroot option)</flag>
		<flag name="X">Enable X11 sandboxing</flag>
	</use>
</pkgmetadata>