all messages for Guix-related lists mirrored at yhetil.org
 help / color / mirror / code / Atom feed
From: Christopher Lemmer Webber <cwebber@dustycloud.org>
To: guix-devel@gnu.org
Subject: Installing packages auto-container'ed
Date: Wed, 01 Jul 2020 15:41:15 -0400	[thread overview]
Message-ID: <877dvn10ro.fsf@dustycloud.org> (raw)

Would it be possible to make launching applications in Guix with minimum
permissions even easier?  Here's just a sketch of an idea.

Borrowing from the new containerizing an application example in the
manual...

In my manifest.scm, what if instead of listing the browser package
eolie, I listed the following:

  (define containerized-eolie
    (wrap-containerized eolie
                        #:network? #t
                        ;; Not sure if this line would be needed.
                        #:other-packages (list coreutils nss-certs dbus)
                        #:expose '("/etc/machine-id")
                        #:share '(("/home/cwebber/tmp/shared-with-browser"
                                   . "/home/cwebber/shared"))
                        #:share-env '("DISPLAY")))

  ;; now here's my list of packages
  (list emacs
        containerized-eolie
        ...)

The idea here is that containerized-eolie actually generates a new
package that "wraps" every binary that would be installed, as well as
all common launchers, to use a script that actually launches them in a
container with the above restrictions.
                      
I'm not sure how feasible or easy this is, but it seems like a good
idea.

If the process of containerizing something tricky like icecat is fairly
common, we could abstract that into a procedure, like
(make-containerized-icecat ...) or something.

Thoughts?

 - Chris


             reply	other threads:[~2020-07-01 19:41 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-07-01 19:41 Christopher Lemmer Webber [this message]
2020-07-01 20:17 ` Installing packages auto-container'ed Pierre Neidhardt
2020-07-01 22:31 ` Ludovic Courtès
2020-07-02  9:20 ` L p R n d n

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=877dvn10ro.fsf@dustycloud.org \
    --to=cwebber@dustycloud.org \
    --cc=guix-devel@gnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this external index

	https://git.savannah.gnu.org/cgit/guix.git

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.