summaryrefslogtreecommitdiff
path: root/sys-apps/firejail/metadata.xml
diff options
context:
space:
mode:
Diffstat (limited to 'sys-apps/firejail/metadata.xml')
-rw-r--r--sys-apps/firejail/metadata.xml12
1 files changed, 8 insertions, 4 deletions
diff --git a/sys-apps/firejail/metadata.xml b/sys-apps/firejail/metadata.xml
index 07938ac97ea4..a41213b778f7 100644
--- a/sys-apps/firejail/metadata.xml
+++ b/sys-apps/firejail/metadata.xml
@@ -2,8 +2,12 @@
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<maintainer type="person">
- <email>expeditioneer@gentoo.org</email>
- <name>Dennis Lamm</name>
+ <email>hlein@korelogic.com</email>
+ <name>Hank Leininger</name>
+ </maintainer>
+ <maintainer type="project">
+ <email>proxy-maint@gentoo.org</email>
+ <name>Proxy Maintainers</name>
</maintainer>
<longdescription lang="en">
Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of
@@ -21,14 +25,14 @@
<flag name="apparmor">Enable support for custom AppArmor profiles</flag>
<flag name="chroot">Enable chrooting to custom directory</flag>
<flag name="contrib">Install contrib scripts</flag>
+ <flag name="dbusproxy">Enable DBus proxying to filter access in supporting profiles</flag>
<flag name="file-transfer">Enable file transfers between sandboxes and the host system</flag>
<flag name="globalcfg">Enable global config file</flag>
<flag name="network">Enable networking features</flag>
<flag name="overlayfs">Enable overlayfs</flag>
<flag name="private-home">Enable private home feature</flag>
- <flag name="seccomp">Enable system call filtering</flag>
<flag name="userns">Enable attaching a new user namespace to a sandbox (--noroot option)</flag>
<flag name="whitelist">Enable whitelist</flag>
- <flag name="x11">Enable X11 sandboxing</flag>
+ <flag name="X">Enable X11 sandboxing</flag>
</use>
</pkgmetadata>