sandbox: Add examples to man pages
While at it, remove trailing whitespaces. Signed-off-by: Vit Mojzis <vmojzis@redhat.com> Acked-by: Petr Lautrbach <lautrbach@redhat.com>
This commit is contained in:
parent
0b1cb09ad3
commit
535dc2479b
|
@ -89,16 +89,24 @@ $HOME and /tmp, secondary Xserver, defaults to sandbox_x_t
|
|||
\fB\-d\fR \fB\-\-dpi\fR
|
||||
Set the DPI value for the sandbox X Server. Defaults to the current X Sever DPI.
|
||||
.TP
|
||||
\fB\-C\fR \fB\-\-capabilities\fR Use capabilities within the
|
||||
sandbox. By default applications executed within the sandbox will not
|
||||
be allowed to use capabilities (setuid apps), with the \-C flag, you
|
||||
can use programs requiring capabilities.
|
||||
\fB\-C\fR \fB\-\-capabilities\fR
|
||||
Use capabilities within the sandbox. By default applications executed within the sandbox will not be allowed to use capabilities (setuid apps), with the \-C flag, you can use programs requiring capabilities.
|
||||
.PP
|
||||
.SH "SEE ALSO"
|
||||
.TP
|
||||
runcon(1), seunshare(8), selinux(8)
|
||||
.PP
|
||||
|
||||
.SH EXAMPLE
|
||||
.nf
|
||||
Run a graphical application inside the sandbox
|
||||
# sandbox -X evince
|
||||
Run a graphical application that requires the use of network
|
||||
# sandbox ‑X ‑t sandbox_web_t firefox
|
||||
Preserve data from one session to the next
|
||||
# mkdir -p ~/sandbox/home ~/sandbox/tmp
|
||||
# sandbox -H ~/sandbox/home -T ~/sandbox/tmp -X libreoffice --writer
|
||||
|
||||
.SH AUTHOR
|
||||
This manual page was written by
|
||||
.I Dan Walsh <dwalsh@redhat.com>
|
||||
|
|
|
@ -9,29 +9,36 @@ seunshare \- Run cmd with alternate homedir, tmpdir and/or SELinux context
|
|||
.PP
|
||||
Run the
|
||||
.I executable
|
||||
within the specified context, using the alternate home directory and /tmp directory. The seunshare command unshares from the default namespace, then mounts the specified homedir and tmpdir over the default homedir and /tmp. Finally it tells the kernel to execute the application under the specified SELinux context.
|
||||
within the specified context, using custom home directory and /tmp directory. The seunshare command unshares from the default namespace, then mounts the specified homedir and tmpdir over the default homedir and /tmp. Finally it tells the kernel to execute the application under the specified SELinux context.
|
||||
|
||||
.TP
|
||||
\fB\-h homedir\fR
|
||||
Alternate homedir to be used by the application. Homedir must be owned by the user.
|
||||
Alternate homedir to be used by the application. Homedir must be owned by the user
|
||||
.TP
|
||||
\fB\-t\ tmpdir
|
||||
Use alternate temporary directory to mount on /tmp. tmpdir must be owned by the user.
|
||||
Use alternate temporary directory to mount on /tmp. tmpdir must be owned by the user
|
||||
.TP
|
||||
\fB\-r\ runuserdir
|
||||
Use alternate temporary directory to mount on XDG_RUNTIME_DIR (/run/user/$UID). runuserdir must be owned by the user.
|
||||
Use alternate temporary directory to mount on XDG_RUNTIME_DIR (/run/user/$UID). runuserdir must be owned by the user
|
||||
.TP
|
||||
\fB\-C --capabilities\fR
|
||||
Allow apps executed within the namespace to use capabilities. Default is no capabilities.
|
||||
Allow apps executed within the namespace to use capabilities. Default is no capabilities
|
||||
.TP
|
||||
\fB\-k --kill\fR
|
||||
Kill all processes with matching MCS level.
|
||||
Kill all processes with matching MCS level
|
||||
.TP
|
||||
\fB\-Z\ context
|
||||
Use alternate SELinux context while running the executable.
|
||||
Use alternate SELinux context while running the executable
|
||||
.TP
|
||||
\fB\-v\fR
|
||||
Verbose output
|
||||
|
||||
.SH EXAMPLE
|
||||
.nf
|
||||
Run bash with temporary /home and /tmp directory
|
||||
# USERHOMEDIR=`mktemp -d /tmp/home.XXXXXX`; USERTEMPDIR=`mktemp -d /tmp/temp.XXXXXX`
|
||||
# seunshare -v -h ${USERHOMEDIR} -t ${USERTEMPDIR} -- /bin/bash
|
||||
|
||||
.SH "SEE ALSO"
|
||||
.TP
|
||||
runcon(1), sandbox(8), selinux(8)
|
||||
|
|
Loading…
Reference in New Issue