diff options
author | Kelvin M. Klann <kmk3.code@protonmail.com> | 2023-11-17 19:55:15 -0300 |
---|---|---|
committer | Kelvin M. Klann <kmk3.code@protonmail.com> | 2023-11-28 15:42:17 -0300 |
commit | a45f3ad7053187a0b80807c63ca64c52f66b1371 (patch) | |
tree | b92ca0da53b412207d55c8f785e46f58f0e8e6a3 | |
parent | landlock: fix profile entries processed in reverse (diff) | |
download | firejail-landlock_v4.tar.gz firejail-landlock_v4.tar.zst firejail-landlock_v4.zip |
landlock: fix incomplete zsh completionlandlock_v4
This amends commit 13b2c566d ("feature: add Landlock support",
2023-10-24).
-rw-r--r-- | src/zsh_completion/_firejail.in | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/src/zsh_completion/_firejail.in b/src/zsh_completion/_firejail.in index 89cb1b84c..ac0554bc5 100644 --- a/src/zsh_completion/_firejail.in +++ b/src/zsh_completion/_firejail.in | |||
@@ -106,11 +106,14 @@ _firejail_args=( | |||
106 | '--keep-fd[inherit open file descriptors to sandbox]: :' | 106 | '--keep-fd[inherit open file descriptors to sandbox]: :' |
107 | '--keep-shell-rc[do not copy shell rc files from /etc/skel]' | 107 | '--keep-shell-rc[do not copy shell rc files from /etc/skel]' |
108 | '--keep-var-tmp[/var/tmp directory is untouched]' | 108 | '--keep-var-tmp[/var/tmp directory is untouched]' |
109 | #ifdef HAVE_LANDLOCK | ||
110 | '--landlock[add basic rules to the Landlock ruleset]' | ||
109 | '--landlock.proc=-[add an access rule for /proc to the Landlock ruleset]: :(no ro rw)' | 111 | '--landlock.proc=-[add an access rule for /proc to the Landlock ruleset]: :(no ro rw)' |
110 | '--landlock.read=-[add a read access rule for the path to the Landlock ruleset]: :_files' | 112 | '--landlock.read=-[add a read access rule for the path to the Landlock ruleset]: :_files' |
111 | '--landlock.write=-[add a write access rule for the path to the Landlock ruleset]: :_files' | 113 | '--landlock.write=-[add a write access rule for the path to the Landlock ruleset]: :_files' |
112 | '--landlock.special=-[add an access rule for the path to the Landlock ruleset for creating block/char devices, named pipes and sockets]: :_files' | 114 | '--landlock.special=-[add an access rule for the path to the Landlock ruleset for creating block/char devices, named pipes and sockets]: :_files' |
113 | '--landlock.execute=-[add an execute access rule for the path to the Landlock ruleset]: :_files' | 115 | '--landlock.execute=-[add an execute access rule for the path to the Landlock ruleset]: :_files' |
116 | #endif | ||
114 | '--machine-id[spoof /etc/machine-id with a random id]' | 117 | '--machine-id[spoof /etc/machine-id with a random id]' |
115 | '--memory-deny-write-execute[seccomp filter to block attempts to create memory mappings that are both writable and executable]' | 118 | '--memory-deny-write-execute[seccomp filter to block attempts to create memory mappings that are both writable and executable]' |
116 | '*--mkdir=-[create a directory]:' | 119 | '*--mkdir=-[create a directory]:' |