Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feature: add --disable-sandbox-check configure flag #6592

Conversation

powerjungle
Copy link
Contributor

@powerjungle powerjungle commented Dec 27, 2024

This flag disables the code which checks whether the current instance of
firejail is running within a sandbox like LXC, chroot or firejail itself.
If we want to develop firejail inside of a sandbox, to keep the "host system"
clean of unnecessary installed dependencies and changes to the system,
we might want to force firejail to run normally, so that we can test different
profiles inside of the sandbox. This is only meant for people who are working
on the firejail code, not someone attempting to run firejail inside of a
sandbox as a user, because it needs to run as root and it can escape the
sandbox easily.

@kmk3 kmk3 changed the title feat: build: new flag --disable-sandbox-check to configure file feature: build: add --disable-sandbox-check configure flag Dec 28, 2024
@kmk3 kmk3 added the enhancement New feature request label Dec 28, 2024
@powerjungle powerjungle force-pushed the feat/run-firejail-in-sandbox-for-testing branch 3 times, most recently from 1f7e9d6 to 422c544 Compare December 28, 2024 16:05
@powerjungle powerjungle force-pushed the feat/run-firejail-in-sandbox-for-testing branch from 422c544 to 5f36f03 Compare December 29, 2024 22:51
This flag disables the code which checks whether the current instance of
firejail is running within a sandbox like LXC, chroot or firejail itself.
If we want to develop firejail inside of a sandbox, to keep the "host system"
clean of unnecessary installed dependencies and changes to the system,
we might want to force firejail to run normally, so that we can test different
profiles inside of the sandbox. This is only meant for people who are working
on the firejail code, not someone attempting to run firejail inside of a
sandbox as a user, because it needs to run as root and it can escape the
sandbox easily.
@powerjungle powerjungle force-pushed the feat/run-firejail-in-sandbox-for-testing branch from 5f36f03 to 108327c Compare December 30, 2024 00:27
@netblue30 netblue30 merged commit 26c0f8a into netblue30:master Jan 12, 2025
13 checks passed
@netblue30
Copy link
Owner

Merging in, thanks!

@kmk3 kmk3 changed the title feature: build: add --disable-sandbox-check configure flag feature: add --disable-sandbox-check configure flag Jan 13, 2025
kmk3 added a commit that referenced this pull request Jan 13, 2025
It is not used in the man pages.

This amends commit 108327c ("feature: build: add
--disable-sandbox-check configure flag", 2024-12-27) / PR #6592.
kmk3 added a commit that referenced this pull request Jan 13, 2025
This amends commit 108327c ("feature: build: add
--disable-sandbox-check configure flag", 2024-12-27) / PR #6592.
kmk3 added a commit that referenced this pull request Jan 15, 2025
Make it match the other `AC_ARG_ENABLE` code.

This amends commit a53de49 ("build: improve --disable-sandbox-check
help string", 2025-01-13).

Relates to #6592.
kmk3 added a commit that referenced this pull request Jan 16, 2025
This reverts commit 5c6fa6a.

The commit in question causes `HAVE_SANDBOX_CHECK` to always be unset
(instead of only when `--disable-sandbox-check` is used), as its value
was being passed to the compiler through `MANFLAGS`.  Move the macro
back into `MANFLAGS` for simplicity.

Also, using `--disable-sandbox-check` breaks the tests and thus also
breaks CI (see #6619).

Relates to #6592.
kmk3 added a commit that referenced this pull request Jan 16, 2025
Clarify that it is only intended for development (and thus that it may
potentially cause issues).

Relates to #6592 #6619.
@powerjungle powerjungle deleted the feat/run-firejail-in-sandbox-for-testing branch January 18, 2025 12:48
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature request
Projects
Status: Done (on RELNOTES)
Development

Successfully merging this pull request may close these issues.

3 participants