This is a pre-production deployment of Warehouse, however changes made here WILL affect the production instance of PyPI.
Latest Version Dependencies status unknown Test status unknown Test coverage unknown
Project Description

Firectl

Firectl is a tool to integrate firejail sandboxing in the Linux desktop. Enable firejail for an application and enjoy a more secure desktop.

Usage

To see which applications you can enable:

firectl status

To enable firejail for a program:

sudo firectl enable firefox

To disable firejail for a program:

sudo firectl disable firefox

After enabling a program, it will start within a firejail when launched via the menu or the file manager. To test if it’s working: open a terminal and execute watch firejail --list. This lists all active firejail sandboxes. Then start an enabled application and look for it in that terminal. Note that applications launched from the terminal or from scripts will not be in a firejail, unless explicitly done so.

Alternative

Firectl was made before Firejail had its own tool for desktop integration. Now firejail ships with a tool called firecfg. Look at its manual: man firecfg and decide if you still need firectl or if firecfg is enough.

Debian/Ubuntu

For Debian and Ubuntu systems install the deb at https://github.com/rahiel/firectl/releases.

Other distro’s

Restoring

Firectl works by modifying the system’s desktop files, the files that tell the system which user applications are installed and how to run them. When these applications are updated, the desktop files are also updated, disabling firejail. The firectl settings need to be restored. (Note that for Debian/Ubuntu systems, installing the deb file takes care of this and no manual restoring is necessary.)

For now you have to manually restore firejail settings after upgrades:

sudo firectl restore

Install

Install firectl with pip:

sudo pip3 install firectl

Uninstall

To uninstall firectl:

sudo firectl disable all
sudo pip3 uninstall firectl
sudo rm /etc/firejail/firectl.conf

More security

If you require even more security, the next sensible step is to use an operating system that is built from the ground-up with security in mind. Notable examples are Subgraph OS and Qubes OS.

Release History

Release History

1.0.1

This version

History Node

TODO: Figure out how to actually get changelog content.

Changelog content for this version goes here.

Donec et mollis dolor. Praesent et diam eget libero egestas mattis sit amet vitae augue. Nam tincidunt congue enim, ut porta lorem lacinia consectetur. Donec ut libero sed arcu vehicula ultricies a non tortor. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Show More

1.0

History Node

TODO: Figure out how to actually get changelog content.

Changelog content for this version goes here.

Donec et mollis dolor. Praesent et diam eget libero egestas mattis sit amet vitae augue. Nam tincidunt congue enim, ut porta lorem lacinia consectetur. Donec ut libero sed arcu vehicula ultricies a non tortor. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Show More

0.2.5

History Node

TODO: Figure out how to actually get changelog content.

Changelog content for this version goes here.

Donec et mollis dolor. Praesent et diam eget libero egestas mattis sit amet vitae augue. Nam tincidunt congue enim, ut porta lorem lacinia consectetur. Donec ut libero sed arcu vehicula ultricies a non tortor. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Show More

0.2.4

History Node

TODO: Figure out how to actually get changelog content.

Changelog content for this version goes here.

Donec et mollis dolor. Praesent et diam eget libero egestas mattis sit amet vitae augue. Nam tincidunt congue enim, ut porta lorem lacinia consectetur. Donec ut libero sed arcu vehicula ultricies a non tortor. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Show More

0.1

History Node

TODO: Figure out how to actually get changelog content.

Changelog content for this version goes here.

Donec et mollis dolor. Praesent et diam eget libero egestas mattis sit amet vitae augue. Nam tincidunt congue enim, ut porta lorem lacinia consectetur. Donec ut libero sed arcu vehicula ultricies a non tortor. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Show More

Download Files

Download Files

TODO: Brief introduction on what you do with files - including link to relevant help section.

File Name & Checksum SHA256 Checksum Help Version File Type Upload Date
firectl-1.0.1-py3-none-any.whl (7.0 kB) Copy SHA256 Checksum SHA256 py3 Wheel Feb 1, 2017
firectl-1.0.1.tar.gz (4.5 kB) Copy SHA256 Checksum SHA256 Source Feb 1, 2017

Supported By

WebFaction WebFaction Technical Writing Elastic Elastic Search Pingdom Pingdom Monitoring Dyn Dyn DNS Sentry Sentry Error Logging CloudAMQP CloudAMQP RabbitMQ Heroku Heroku PaaS Kabu Creative Kabu Creative UX & Design Fastly Fastly CDN DigiCert DigiCert EV Certificate Rackspace Rackspace Cloud Servers DreamHost DreamHost Log Hosting