Replies: 3 comments 9 replies
-
fixed that for you 😄
A hard dependency is maybe against some packaging guidelines. Although it is more of a emergency compatibility mode. Because all
And the strongest argument pro firejail in firejail vs. bubblewrap discussions.
We could even start with our own packages they don't have any rec/sug/optdep/dep/.. on xdg-dbus-proxy too. https://github.com/netblue30/firejail/tree/master/platform BTW Debian maintainer: https://github.com/reinerh (you know 😉 ) |
Beta Was this translation helpful? Give feedback.
-
I can't really force it to get installed. As long as firejail runs fine in many cases without having xdg-dbus-proxy installed (even if only a subset of features is functional), I can only add it to Recommends (which will cause xdg-dbus-proxy to get installed in automatically in default apt configurations; Recommends are already stronger than Suggests, which are used for dependencies only needed in edge cases).
On Debian (and therefore also Ubuntu) |
Beta Was this translation helpful? Give feedback.
-
The best way to communicate with maintainers is through changelogs and release notes. :-) |
Beta Was this translation helpful? Give feedback.
-
Since implementing the new D-Bus filtering, the importance of having
xdg-dbus-proxy
installed is pretty obvious. Although a CLI warning is thrown when that isn't found, the potential benefits of havingxdg-dbus-proxy
gets lost in translation. IMO it is a pretty vital part of firejail (profiles) these days, allowing for granular control that simply wasn't available before. Besides, users noticing all the dbus-* items in our profiles might be lulled in a false sense of security if they run an OS that doesn't do its best to ensure xdg-dbus-proxy is installed.In that context I wonder if we should try to better communicate the importance of xdg-dbus-proxy to distro package maintainers. After a very brief check I noticed the folloing:
Another case in point is the local
AppArmor
file we provide. That too isn't installed by default it seems. Fedora is excused, as it strictly uses SELinux. But Debian/Ubuntu and Arch Linux both configure firejail for AppArmor support, yet there's no trace of firejail-local (which needs to be installed as firejail-default under /etc/apparmor.d/local) in their firejail package. We have comments in several profiles refering to that file, carrying instructions on how to opt-in to apparmor. IMO this needlessly confuses users. Shouldn't be that hard to at least include a copy of it somehere (e.g. under /usr/share/doc/firejail).I'm obviously not a package maintainer, and I probably overlook something relevant and important here. Hence the Q: how can we improve reaching out to these fine folks that package Firejail for most users out there?
Beta Was this translation helpful? Give feedback.
All reactions