diff options
author | Kelvin M. Klann <kmk3.code@protonmail.com> | 2023-11-17 19:55:15 -0300 |
---|---|---|
committer | Kelvin M. Klann <kmk3.code@protonmail.com> | 2023-12-05 11:30:58 -0300 |
commit | 68f3d2a96aaa8afd97fd028c8947afd679764bf1 (patch) | |
tree | e6f018e29f64f20912727239882cc3153553d108 /src/zsh_completion/_firejail.in | |
parent | README.md: fix Landlock support list (diff) | |
download | firejail-68f3d2a96aaa8afd97fd028c8947afd679764bf1.tar.gz firejail-68f3d2a96aaa8afd97fd028c8947afd679764bf1.tar.zst firejail-68f3d2a96aaa8afd97fd028c8947afd679764bf1.zip |
landlock: fix incomplete zsh completion
Diffstat (limited to 'src/zsh_completion/_firejail.in')
-rw-r--r-- | src/zsh_completion/_firejail.in | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/src/zsh_completion/_firejail.in b/src/zsh_completion/_firejail.in index 89cb1b84c..ac0554bc5 100644 --- a/src/zsh_completion/_firejail.in +++ b/src/zsh_completion/_firejail.in | |||
@@ -106,11 +106,14 @@ _firejail_args=( | |||
106 | '--keep-fd[inherit open file descriptors to sandbox]: :' | 106 | '--keep-fd[inherit open file descriptors to sandbox]: :' |
107 | '--keep-shell-rc[do not copy shell rc files from /etc/skel]' | 107 | '--keep-shell-rc[do not copy shell rc files from /etc/skel]' |
108 | '--keep-var-tmp[/var/tmp directory is untouched]' | 108 | '--keep-var-tmp[/var/tmp directory is untouched]' |
109 | #ifdef HAVE_LANDLOCK | ||
110 | '--landlock[add basic rules to the Landlock ruleset]' | ||
109 | '--landlock.proc=-[add an access rule for /proc to the Landlock ruleset]: :(no ro rw)' | 111 | '--landlock.proc=-[add an access rule for /proc to the Landlock ruleset]: :(no ro rw)' |
110 | '--landlock.read=-[add a read access rule for the path to the Landlock ruleset]: :_files' | 112 | '--landlock.read=-[add a read access rule for the path to the Landlock ruleset]: :_files' |
111 | '--landlock.write=-[add a write access rule for the path to the Landlock ruleset]: :_files' | 113 | '--landlock.write=-[add a write access rule for the path to the Landlock ruleset]: :_files' |
112 | '--landlock.special=-[add an access rule for the path to the Landlock ruleset for creating block/char devices, named pipes and sockets]: :_files' | 114 | '--landlock.special=-[add an access rule for the path to the Landlock ruleset for creating block/char devices, named pipes and sockets]: :_files' |
113 | '--landlock.execute=-[add an execute access rule for the path to the Landlock ruleset]: :_files' | 115 | '--landlock.execute=-[add an execute access rule for the path to the Landlock ruleset]: :_files' |
116 | #endif | ||
114 | '--machine-id[spoof /etc/machine-id with a random id]' | 117 | '--machine-id[spoof /etc/machine-id with a random id]' |
115 | '--memory-deny-write-execute[seccomp filter to block attempts to create memory mappings that are both writable and executable]' | 118 | '--memory-deny-write-execute[seccomp filter to block attempts to create memory mappings that are both writable and executable]' |
116 | '*--mkdir=-[create a directory]:' | 119 | '*--mkdir=-[create a directory]:' |