diff options
author | Antoine Catton <devel@antoine.catton.fr> | 2023-01-30 23:55:49 +0100 |
---|---|---|
committer | Antoine Catton <devel@antoine.catton.fr> | 2023-02-03 23:11:18 +0100 |
commit | d0a12f27d650ebed63f14102baa671f3655b50c8 (patch) | |
tree | d9acf7ff384a7bae5f8f4fc6ed687241f1af5eff /src/zsh_completion/_firejail.in | |
parent | testing (diff) | |
download | firejail-d0a12f27d650ebed63f14102baa671f3655b50c8.tar.gz firejail-d0a12f27d650ebed63f14102baa671f3655b50c8.tar.zst firejail-d0a12f27d650ebed63f14102baa671f3655b50c8.zip |
feature: add 'keep-shell-rc' flag and option
This fixes #1127.
This allow a user to provide their own zshrc/bashrc inside the jail.
This is very useful when using firejail to develop and prevent bad pip
packages to access your system.
Diffstat (limited to 'src/zsh_completion/_firejail.in')
-rw-r--r-- | src/zsh_completion/_firejail.in | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/src/zsh_completion/_firejail.in b/src/zsh_completion/_firejail.in index 2b67c2a00..37ce7055b 100644 --- a/src/zsh_completion/_firejail.in +++ b/src/zsh_completion/_firejail.in | |||
@@ -104,6 +104,7 @@ _firejail_args=( | |||
104 | '--keep-config-pulse[disable automatic ~/.config/pulse init]' | 104 | '--keep-config-pulse[disable automatic ~/.config/pulse init]' |
105 | '--keep-dev-shm[/dev/shm directory is untouched (even with --private-dev)]' | 105 | '--keep-dev-shm[/dev/shm directory is untouched (even with --private-dev)]' |
106 | '--keep-fd[inherit open file descriptors to sandbox]: :' | 106 | '--keep-fd[inherit open file descriptors to sandbox]: :' |
107 | '--keep-shell-rc[do not copy shell rc files from /etc/skel]' | ||
107 | '--keep-var-tmp[/var/tmp directory is untouched]' | 108 | '--keep-var-tmp[/var/tmp directory is untouched]' |
108 | '--machine-id[spoof /etc/machine-id with a random id]' | 109 | '--machine-id[spoof /etc/machine-id with a random id]' |
109 | '--memory-deny-write-execute[seccomp filter to block attempts to create memory mappings that are both writable and executable]' | 110 | '--memory-deny-write-execute[seccomp filter to block attempts to create memory mappings that are both writable and executable]' |