From 759dc6ade2bcb7408dbbf3dc31230fc7534ca29d Mon Sep 17 00:00:00 2001 From: netblue30 Date: Mon, 19 Dec 2016 10:24:25 -0500 Subject: testing --- src/firejail/usage.c | 4 ++-- src/man/firejail.txt | 9 +++++++++ 2 files changed, 11 insertions(+), 2 deletions(-) (limited to 'src') diff --git a/src/firejail/usage.c b/src/firejail/usage.c index 1131abe5f..9f4dfd44c 100644 --- a/src/firejail/usage.c +++ b/src/firejail/usage.c @@ -30,8 +30,8 @@ void usage(void) { printf("Options:\n"); printf(" -- - signal the end of options and disables further option processing.\n"); printf(" --allow-debuggers - allow tools such as strace and gdb inside the sandbox.\n"); - printf(" --allow-private-blacklist - allow blacklisting things in private\n"); - printf("\tdirectories.\n"); + printf(" --allow-private-blacklist - allow blacklisting files in private\n"); + printf("\thome directories.\n"); printf(" --allusers - all user home directories are visible inside the sandbox.\n"); printf(" --apparmor - enable AppArmor confinement.\n"); printf(" --appimage - sandbox an AppImage application.\n"); diff --git a/src/man/firejail.txt b/src/man/firejail.txt index 5b43b1ca5..60c21cbc1 100644 --- a/src/man/firejail.txt +++ b/src/man/firejail.txt @@ -84,6 +84,15 @@ Example: .br $ firejail --allow-debuggers --profile=/etc/firejail/firefox.profile strace -f firefox .TP +\fB\-\-allow-private-blacklist +Allow blacklisting files in private home directory. By default these blacklists are disabled. +.br + +.br +Example: +.br +$ firejail --allow-private-blacklist --private=~/priv-dir --blacklist=~/.mozilla +.TP \fB\-\-allusers All directories under /home are visible inside the sandbox. By default, only current user home directory is visible. .br -- cgit v1.2.3-54-g00ecf