blob: e23358dd6bf81f66c3c97c07b771285b8d787a90 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
|
# Copyright 2018 Gluzskiy Alexandr <sss@sss.chaoslab.ru>
# Distributed under the terms of the GNU General Public License v2
require github [ user=netblue30 tag=${PV} ]
#require autotools [ supported_autoconf=[ 2.5 ] supported_automake=[ 1.15 ] ]
SUMMARY="Firejail is a SUID sandbox program"
DESCRIPTION="Firejail is a SUID sandbox program that reduces the risk of security
breaches by restricting the running environment of untrusted applications using
Linux namespaces, seccomp-bpf and Linux capabilities. It allows a process and
all its descendants to have their own private view of the globally shared kernel
resources, such as the network stack, process table, mount table.
Firejail can work in a SELinux or AppArmor environment,
and it is integrated with Linux Control Groups."
LICENCES="GPL-2"
SLOT="0"
MYOPTIONS="apparmor"
DEPENDENCIES="
build+run:
apparmor? ( security/apparmor )
"
DEFAULT_SRC_CONFIGURE_OPTION_ENABLES=( apparmor )
DEFAULT_SRC_CONFIGURE_PARAMS=(
--hates=disable-dependency-tracking
--hates=disable-silent-rules
--hates=enable-fast-install
)
|