diff options
Diffstat (limited to 'sys-apps/firejail/metadata.xml')
-rw-r--r-- | sys-apps/firejail/metadata.xml | 24 |
1 files changed, 11 insertions, 13 deletions
diff --git a/sys-apps/firejail/metadata.xml b/sys-apps/firejail/metadata.xml index 3af2a06d7a1d..ee1cc2f6e7bb 100644 --- a/sys-apps/firejail/metadata.xml +++ b/sys-apps/firejail/metadata.xml @@ -1,36 +1,34 @@ <?xml version="1.0" encoding="UTF-8"?> -<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<!DOCTYPE pkgmetadata SYSTEM "https://www.gentoo.org/dtd/metadata.dtd"> <pkgmetadata> - <maintainer type="person"> - <email>expeditioneer@gentoo.org</email> - <name>Dennis Lamm</name> + <maintainer type="person" proxied="yes"> + <email>hlein@korelogic.com</email> + <name>Hank Leininger</name> + </maintainer> + <maintainer type="project" proxied="proxy"> + <email>proxy-maint@gentoo.org</email> + <name>Proxy Maintainers</name> </maintainer> <longdescription lang="en"> Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf. It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table, mount table. - - This is the regular version. For a long term support version see sys-apps/firejail-lts. </longdescription> <upstream> + <remote-id type="cpe">cpe:/a:firejail_project:firejail</remote-id> <remote-id type="github">netblue30/firejail</remote-id> </upstream> <use> <flag name="apparmor">Enable support for custom AppArmor profiles</flag> - <flag name="bind">Enable custom bind mounts</flag> <flag name="chroot">Enable chrooting to custom directory</flag> <flag name="contrib">Install contrib scripts</flag> + <flag name="dbusproxy">Enable DBus proxying to filter access in supporting profiles</flag> <flag name="file-transfer">Enable file transfers between sandboxes and the host system</flag> <flag name="globalcfg">Enable global config file</flag> <flag name="network">Enable networking features</flag> - <flag name="network-restricted">Grant access to --interface, --net=ethXXX and --netfilter only to root user; - regular users are only allowed --net=none</flag> - <flag name="overlayfs">Enable overlayfs</flag> <flag name="private-home">Enable private home feature</flag> - <flag name="seccomp">Enable system call filtering</flag> <flag name="userns">Enable attaching a new user namespace to a sandbox (--noroot option)</flag> - <flag name="whitelist">Enable whitelist</flag> - <flag name="x11">Enable X11 sandboxing</flag> + <flag name="X">Enable X11 sandboxing</flag> </use> </pkgmetadata> |