mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 06:06:02 -06:00
[PR #6436] WIP: feature: add support for wayland-security-context-v1 #6018
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#6018
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/netblue30/firejail/pull/6436
Author: @qwertviop
Created: 8/18/2024
Status: 🔄 Open
Base:
master← Head:wayland-security-context📝 Commits (1)
ed80013WIP: add support for wayland-security-context-v1📊 Changes
5 files changed (+37 additions, -1 deletions)
View changed files
📝
src/firejail/checkcfg.c(+6 -0)📝
src/firejail/env.c(+2 -1)📝
src/firejail/firejail.h(+1 -0)📝
src/firejail/main.c(+6 -0)➕
src/firejail/wayland.c(+22 -0)📄 Description
Add support for limiting access to privileged wayland protocols via security-context-v1
To do this firejail needs to create a new wayland socket and attach a security context to it, which it then passes to the sandboxed application.
See also: flatpak#4920
Todo:
HAVE_WAYLAND_SECURITY_CONTEXT--waylandcli flagsecurity-contextglobal and creating a security context for an applicationwaylandfor using a security context, orwayland noneto disable access to wayland)Open Questions:
WAYLAND_SOCKET, see flatpak#5614:sandbox_engineto use. Flatpak usesorg.flatpak, usecom.wordpress.firejail, thanks @rusty-snakeapp_idto use. Flatpak uses the flatpak application ID (e.g.org.signal.Signalfor the Signal messenger app), maybe use the name of the profile in use?instance_idto use. Has to be unique to the currently running sandbox and should never be reused. Just use a (secure) random identifier from/dev/urandomor similar?🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.