mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[PR #5274] [MERGED] Add support for custom AppArmor profiles (--apparmor=) #5423
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#5423
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/netblue30/firejail/pull/5274
Author: @ChrysoliteAzalea
Created: 7/25/2022
Status: ✅ Merged
Merged: 8/14/2022
Merged by: @netblue30
Base:
master← Head:master📝 Commits (1)
7f3b6c1Add support for custom AppArmor profiles (--apparmor=)📊 Changes
9 files changed (+39 additions, -7 deletions)
View changed files
📝
contrib/vim/syntax/firejail.vim(+1 -1)📝
src/firejail/firejail.h(+1 -0)📝
src/firejail/main.c(+8 -1)📝
src/firejail/profile.c(+11 -0)📝
src/firejail/sandbox.c(+1 -1)📝
src/firejail/usage.c(+3 -1)📝
src/man/firejail-profile.txt(+5 -1)📝
src/man/firejail.txt(+7 -1)📝
src/zsh_completion/_firejail.in(+2 -1)📄 Description
New command checklist:
Hello everyone!
Firejail currently supports AppArmor confinement with "one-size-fits-all" profile only. However, I think this approach isn't the best when it comes to sandboxing applications. I propose adding a new option that allows a user to choose another (but already loaded) AppArmor profile that can restrict application access better.
Also, in this pull request, aa_change_onexec is replaced by aa_stack_onexec that prevents transition from more-restricted domain to less-restricted domain, and also allows transition with "No New Privileges" restriction enabled.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.