diff options
author | 2020-02-23 22:57:17 +0100 | |
---|---|---|
committer | 2020-04-06 20:36:12 +0200 | |
commit | 6fc8a559ded2cc8cf263288ef111d8876673e2fb (patch) | |
tree | ba607f654b20ab7036767441103c95a448e4f88c /src/firejail/firejail.h | |
parent | Allow changing error action in seccomp filters (diff) | |
download | firejail-6fc8a559ded2cc8cf263288ef111d8876673e2fb.tar.gz firejail-6fc8a559ded2cc8cf263288ef111d8876673e2fb.tar.zst firejail-6fc8a559ded2cc8cf263288ef111d8876673e2fb.zip |
Add --dbus-user and --dbus-system options
Allow setting a separate policy for the user and system buses.
For now, the filter policy is equivalent to the none (block) policy.
Future commits will add more configuration options and filters.
Diffstat (limited to 'src/firejail/firejail.h')
-rw-r--r-- | src/firejail/firejail.h | 11 |
1 files changed, 9 insertions, 2 deletions
diff --git a/src/firejail/firejail.h b/src/firejail/firejail.h index 1cb8b2d22..ea4012335 100644 --- a/src/firejail/firejail.h +++ b/src/firejail/firejail.h | |||
@@ -340,9 +340,16 @@ extern int arg_memory_deny_write_execute; // block writable and executable memor | |||
340 | extern int arg_notv; // --notv | 340 | extern int arg_notv; // --notv |
341 | extern int arg_nodvd; // --nodvd | 341 | extern int arg_nodvd; // --nodvd |
342 | extern int arg_nou2f; // --nou2f | 342 | extern int arg_nou2f; // --nou2f |
343 | extern int arg_nodbus; // -nodbus | ||
344 | extern int arg_deterministic_exit_code; // always exit with first child's exit status | 343 | extern int arg_deterministic_exit_code; // always exit with first child's exit status |
345 | 344 | ||
345 | typedef enum { | ||
346 | DBUS_POLICY_ALLOW, // Allow unrestricted access to the bus | ||
347 | DBUS_POLICY_FILTER, // Filter with xdg-dbus-proxy | ||
348 | DBUS_POLICY_BLOCK // Block access | ||
349 | } DbusPolicy; | ||
350 | extern DbusPolicy arg_dbus_user; // --dbus-user | ||
351 | extern DbusPolicy arg_dbus_system; // --dbus-system | ||
352 | |||
346 | extern int login_shell; | 353 | extern int login_shell; |
347 | extern int parent_to_child_fds[2]; | 354 | extern int parent_to_child_fds[2]; |
348 | extern int child_to_parent_fds[2]; | 355 | extern int child_to_parent_fds[2]; |
@@ -836,7 +843,7 @@ void set_x11_run_file(pid_t pid, int display); | |||
836 | void set_profile_run_file(pid_t pid, const char *fname); | 843 | void set_profile_run_file(pid_t pid, const char *fname); |
837 | 844 | ||
838 | // dbus.c | 845 | // dbus.c |
839 | void dbus_disable(void); | 846 | void dbus_apply_policy(void); |
840 | 847 | ||
841 | // dhcp.c | 848 | // dhcp.c |
842 | extern pid_t dhclient4_pid; | 849 | extern pid_t dhclient4_pid; |