Skip to content

Commit 1738bbf

Browse files
author
netblue30
committed
appimage enhancements
1 parent 63d455f commit 1738bbf

File tree

4 files changed

+25
-2
lines changed

4 files changed

+25
-2
lines changed

README.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,20 @@ Use this issue to request new profiles: [#1139](https://github.com/netblue30/fir
9898
`````
9999
# Current development version: 0.9.53
100100

101+
## AppImage development
102+
103+
Support for private-bin, private-lib and shell none has been disabled while running AppImage archives.
104+
This allows us to use our regular profile files for appimages. We don't have a way to extract the name
105+
of the executable, so the profile will have to be passed on the command line. Example:
106+
`````
107+
$ firejail --profile=/etc/firejail/kdenlive.profile --appimage --apparmor ~/bin/Kdenlive-17.12.0d-x86_64.AppImage
108+
`````
109+
Also, we have full AppArmor support for AppImages:
110+
`````
111+
112+
$ firejail --apparmor --appimage ~/bin/Kdenlive-17.12.0d-x86_64.AppImage
113+
`````
114+
101115
## Seccomp development
102116

103117
Replaced the our seccomp disassembler with a real disassembler lifted from

RELNOTES

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,16 @@
11
firejail (0.9.53) baseline; urgency=low
22
* work in progress
3+
* modif: support for private-bin, private-lib and shell none has been
4+
disabled while running AppImage archives in order to be able to use
5+
our regular profile files with AppImages.
36
* modif: restrictions for /proc, /sys and /run/user directories
47
are moved from AppArmor profile into firejail executable
58
* modif: unifying Chromium and Firefox browsers profiles.
69
All users of Firefox-based browsers who use addons and plugins
710
that read/write from ${HOME} will need to uncomment the includes for
811
firefox-common-addons.inc in firefox-common.profile.
912
* AppArmor support for overlayfs and chroot sandboxes
13+
* AppArmor support for AppImages
1014
* Enable AppArmor by default for Firefox, Chromium, Transmission
1115
VLC and mpv
1216
* firejail --apparmor.print option

src/firejail/main.c

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2321,6 +2321,9 @@ int main(int argc, char **argv) {
23212321
cfg.command_name = strdup(argv[i]);
23222322
if (!cfg.command_name)
23232323
errExit("strdup");
2324+
2325+
// disable shell=* for appimages
2326+
arg_shell_none = 0;
23242327
}
23252328
else
23262329
extract_command_name(i, argv);

src/firejail/sandbox.c

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -799,7 +799,8 @@ int sandbox(void* sandbox_arg) {
799799
}
800800
}
801801

802-
if (arg_private_bin) {
802+
// private-bin is disabled for appimages
803+
if (arg_private_bin && !arg_appimage) {
803804
if (cfg.chrootdir)
804805
fwarning("private-bin feature is disabled in chroot\n");
805806
else if (arg_overlay)
@@ -818,7 +819,8 @@ int sandbox(void* sandbox_arg) {
818819
}
819820
}
820821

821-
if (arg_private_lib) {
822+
// private-lib is disabled for appimages
823+
if (arg_private_lib && !arg_appimage) {
822824
if (cfg.chrootdir)
823825
fwarning("private-lib feature is disabled in chroot\n");
824826
else if (arg_overlay)

0 commit comments

Comments
 (0)