unofficial mirror of guix-patches@gnu.org 
 help / color / mirror / code / Atom feed
From: kiasoc5 via Guix-patches via <guix-patches@gnu.org>
To: 64199@debbugs.gnu.org
Cc: kiasoc5 <kiasoc5@disroot.org>, Leo Famulari <leo@famulari.name>,
	Tobias Geerinckx-Rice <me@tobias.gr>
Subject: [bug#64199] [PATCH] gnu: Add firejail.
Date: Tue, 20 Jun 2023 20:54:48 -0400	[thread overview]
Message-ID: <9d5b11ec067f815f252235b8d67050a865b98727.1687308888.git.kiasoc5@disroot.org> (raw)

Firejail compiles ok, but I'm currently unable to test this on Guix system, so I don't know if any other patching is required to make it work as expected.

* gnu/packages/linux.scm (firejail): New variable.
---
 gnu/packages/linux.scm | 29 +++++++++++++++++++++++++++++
 1 file changed, 29 insertions(+)

diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm
index 52fb883467..fe22412fbc 100644
--- a/gnu/packages/linux.scm
+++ b/gnu/packages/linux.scm
@@ -10135,6 +10135,35 @@ (define-public kconfig-hardened-check
 This tool supports checking Kconfig options and kernel cmdline parameters.")
     (license license:gpl3)))
 
+(define-public firejail
+  (package
+    (name "firejail")
+    (version "0.9.72")
+    (source (origin
+              (method url-fetch)
+              (uri (string-append "https://github.com/netblue30/firejail/releases/download/" version
+                                  "/firejail-" version
+                                  ".tar.xz" ))
+              (sha256
+               (base32
+                "1x77xy1mwfgjrcsymdda82bjnqgl7z2yymcb10mzd1zwik27gqc2"))))
+    (arguments
+     (list #:phases
+           #~(modify-phases %standard-phases
+               (replace 'check
+                 (lambda* (#:key tests? #:allow-other-keys)
+                   (when tests?
+                     (with-directory-excursion "test"
+                       (invoke "make"))))))))
+    (build-system gnu-build-system)
+    (inputs
+     (list apparmor xdg-dbus-proxy))
+    (synopsis "Linux namespaces sandbox program")
+    (description
+     "Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces, seccomp-bpf and Linux capabilities.  The software includes sandbox profiles for a number of common Linux programs.  Firejail should be added to the list of setuid programs in the system configuration to work properly.")
+    (home-page "https://github.com/netblue30/firejail")
+    (license license:gpl2)))
+
 (define-public edac-utils
   (package
     (name "edac-utils")

base-commit: 1a0ff5cd83d3257efcab64740a1322de51fbc4a1
-- 
2.41.0





             reply	other threads:[~2023-06-21  0:59 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-06-21  0:54 kiasoc5 via Guix-patches via [this message]
2023-06-21  1:00 ` [bug#64199] [PATCH v2] gnu: Add firejail kiasoc5 via Guix-patches via
2023-07-18 12:05   ` bug#64199: [PATCH] " Ludovic Courtès

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

  List information: https://guix.gnu.org/

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=9d5b11ec067f815f252235b8d67050a865b98727.1687308888.git.kiasoc5@disroot.org \
    --to=guix-patches@gnu.org \
    --cc=64199@debbugs.gnu.org \
    --cc=kiasoc5@disroot.org \
    --cc=leo@famulari.name \
    --cc=me@tobias.gr \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://git.savannah.gnu.org/cgit/guix.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).