From: kiasoc5 via Guix-patches via <guix-patches@gnu.org>
To: 64199@debbugs.gnu.org
Cc: kiasoc5 <kiasoc5@disroot.org>, Leo Famulari <leo@famulari.name>,
Tobias Geerinckx-Rice <me@tobias.gr>
Subject: [bug#64199] [PATCH] gnu: Add firejail.
Date: Tue, 20 Jun 2023 20:54:48 -0400 [thread overview]
Message-ID: <9d5b11ec067f815f252235b8d67050a865b98727.1687308888.git.kiasoc5@disroot.org> (raw)
Firejail compiles ok, but I'm currently unable to test this on Guix system, so I don't know if any other patching is required to make it work as expected.
* gnu/packages/linux.scm (firejail): New variable.
---
gnu/packages/linux.scm | 29 +++++++++++++++++++++++++++++
1 file changed, 29 insertions(+)
diff --git a/gnu/packages/linux.scm b/gnu/packages/linux.scm
index 52fb883467..fe22412fbc 100644
--- a/gnu/packages/linux.scm
+++ b/gnu/packages/linux.scm
@@ -10135,6 +10135,35 @@ (define-public kconfig-hardened-check
This tool supports checking Kconfig options and kernel cmdline parameters.")
(license license:gpl3)))
+(define-public firejail
+ (package
+ (name "firejail")
+ (version "0.9.72")
+ (source (origin
+ (method url-fetch)
+ (uri (string-append "https://github.com/netblue30/firejail/releases/download/" version
+ "/firejail-" version
+ ".tar.xz" ))
+ (sha256
+ (base32
+ "1x77xy1mwfgjrcsymdda82bjnqgl7z2yymcb10mzd1zwik27gqc2"))))
+ (arguments
+ (list #:phases
+ #~(modify-phases %standard-phases
+ (replace 'check
+ (lambda* (#:key tests? #:allow-other-keys)
+ (when tests?
+ (with-directory-excursion "test"
+ (invoke "make"))))))))
+ (build-system gnu-build-system)
+ (inputs
+ (list apparmor xdg-dbus-proxy))
+ (synopsis "Linux namespaces sandbox program")
+ (description
+ "Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces, seccomp-bpf and Linux capabilities. The software includes sandbox profiles for a number of common Linux programs. Firejail should be added to the list of setuid programs in the system configuration to work properly.")
+ (home-page "https://github.com/netblue30/firejail")
+ (license license:gpl2)))
+
(define-public edac-utils
(package
(name "edac-utils")
base-commit: 1a0ff5cd83d3257efcab64740a1322de51fbc4a1
--
2.41.0
next reply other threads:[~2023-06-21 0:59 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-06-21 0:54 kiasoc5 via Guix-patches via [this message]
2023-06-21 1:00 ` [bug#64199] [PATCH v2] gnu: Add firejail kiasoc5 via Guix-patches via
2023-07-18 12:05 ` bug#64199: [PATCH] " Ludovic Courtès
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
List information: https://guix.gnu.org/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=9d5b11ec067f815f252235b8d67050a865b98727.1687308888.git.kiasoc5@disroot.org \
--to=guix-patches@gnu.org \
--cc=64199@debbugs.gnu.org \
--cc=kiasoc5@disroot.org \
--cc=leo@famulari.name \
--cc=me@tobias.gr \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://git.savannah.gnu.org/cgit/guix.git
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).