diff options
Diffstat (limited to 'src/firejail/firejail.h')
-rw-r--r-- | src/firejail/firejail.h | 7 |
1 files changed, 5 insertions, 2 deletions
diff --git a/src/firejail/firejail.h b/src/firejail/firejail.h index 315a8c7f4..116bd404a 100644 --- a/src/firejail/firejail.h +++ b/src/firejail/firejail.h | |||
@@ -28,6 +28,7 @@ | |||
28 | #define MNT_DIR "/tmp/firejail/mnt" | 28 | #define MNT_DIR "/tmp/firejail/mnt" |
29 | #define HOME_DIR "/tmp/firejail/mnt/home" | 29 | #define HOME_DIR "/tmp/firejail/mnt/home" |
30 | #define ETC_DIR "/tmp/firejail/mnt/etc" | 30 | #define ETC_DIR "/tmp/firejail/mnt/etc" |
31 | #define WHITELIST_HOME_DIR "/tmp/firejail/mnt/whome" | ||
31 | #define DEFAULT_USER_PROFILE "generic" | 32 | #define DEFAULT_USER_PROFILE "generic" |
32 | #define DEFAULT_ROOT_PROFILE "server" | 33 | #define DEFAULT_ROOT_PROFILE "server" |
33 | #define MAX_INCLUDE_LEVEL 6 | 34 | #define MAX_INCLUDE_LEVEL 6 |
@@ -146,6 +147,7 @@ extern int arg_shell_none; // run the program directly without a shell | |||
146 | extern int arg_private_dev; // private dev directory | 147 | extern int arg_private_dev; // private dev directory |
147 | extern int arg_private_etc; // private etc directory | 148 | extern int arg_private_etc; // private etc directory |
148 | extern int arg_scan; // arp-scan all interfaces | 149 | extern int arg_scan; // arp-scan all interfaces |
150 | extern int arg_whitelist; // whitelist commad | ||
149 | 151 | ||
150 | extern int parent_to_child_fds[2]; | 152 | extern int parent_to_child_fds[2]; |
151 | extern int child_to_parent_fds[2]; | 153 | extern int child_to_parent_fds[2]; |
@@ -186,8 +188,7 @@ void fs_build_firejail_dir(void); | |||
186 | // build /tmp/firejail/mnt directory | 188 | // build /tmp/firejail/mnt directory |
187 | void fs_build_mnt_dir(void); | 189 | void fs_build_mnt_dir(void); |
188 | // blacklist files or directoies by mounting empty files on top of them | 190 | // blacklist files or directoies by mounting empty files on top of them |
189 | void fs_blacklist(const char *homedir); | 191 | void fs_blacklist(void); |
190 | //void fs_blacklist(char **blacklist, const char *homedir); | ||
191 | // remount a directory read-only | 192 | // remount a directory read-only |
192 | void fs_rdonly(const char *dir); | 193 | void fs_rdonly(const char *dir); |
193 | // mount /proc and /sys directories | 194 | // mount /proc and /sys directories |
@@ -366,5 +367,7 @@ void run_no_sandbox(int argc, char **argv); | |||
366 | void env_store(const char *str); | 367 | void env_store(const char *str); |
367 | void env_apply(void); | 368 | void env_apply(void); |
368 | 369 | ||
370 | // fs_whitelist.c | ||
371 | |||
369 | #endif | 372 | #endif |
370 | 373 | ||