<feed xmlns='http://www.w3.org/2005/Atom'>
<title>mat2/libmat2/subprocess.py, branch master</title>
<subtitle>mat2 is a metadata removal tool, supporting a wide range of commonly used file formats, written in python3: at its core, it's a library, used by an eponymous command-line interface, as well as several file manager extensions.

</subtitle>
<id>http://git.dustri.org/mat2/atom?h=master</id>
<link rel='self' href='http://git.dustri.org/mat2/atom?h=master'/>
<link rel='alternate' type='text/html' href='http://git.dustri.org/mat2/'/>
<updated>2019-10-12T23:13:49Z</updated>
<entry>
<title>Add a way to disable the sandbox</title>
<updated>2019-10-12T23:13:49Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2019-10-12T23:13:49Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/mat2/commit/?id=5f0b3beb46d09af26107fe5f80e63ddccb127a59'/>
<id>urn:sha1:5f0b3beb46d09af26107fe5f80e63ddccb127a59</id>
<content type='text'>
Due to bubblewrap's pickiness, mat2 can now be run
without a sandbox, even if bubblewrap is installed.
</content>
</entry>
<entry>
<title>Mount a new tmpfs on /tmp and drop all capabilities</title>
<updated>2019-10-05T13:21:40Z</updated>
<author>
<name>madaidan</name>
</author>
<published>2019-09-21T13:33:49Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/mat2/commit/?id=58773088ac1ee1fff8a2f1913442d68b2726daf6'/>
<id>urn:sha1:58773088ac1ee1fff8a2f1913442d68b2726daf6</id>
<content type='text'>
This mounts a new tmpfs on /tmp so any files residing there would be hidden
from the sandbox. Many programs store some files in there that might be useful
to an attacker.  It also drops all capabilities incase it is ever run with
extra capabilities for whatever reason.
</content>
</entry>
<entry>
<title>Fix bubblewrap</title>
<updated>2019-09-21T12:14:39Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2019-09-21T12:14:39Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/mat2/commit/?id=37145531854879081fddd6019bdb9ba693210cf2'/>
<id>urn:sha1:37145531854879081fddd6019bdb9ba693210cf2</id>
<content type='text'>
On some machines (like mine), `/proc` has to be mounted.  Also, since
sandboxing with bubblewrap is best effort and assumes that an attacker doesn't
have control outside of the file to clean, it's safe to __try__ to enable some
bubblewrap features, and to silently fail otherwise.
</content>
</entry>
<entry>
<title>Streamline a bit the previous commit</title>
<updated>2019-02-09T14:23:16Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2019-02-09T14:23:16Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/mat2/commit/?id=6e63e03b86916c697e411b9f382f98a4834779ff'/>
<id>urn:sha1:6e63e03b86916c697e411b9f382f98a4834779ff</id>
<content type='text'>
</content>
</entry>
<entry>
<title>bind mount /etc/ld.so.cache to the sandbox</title>
<updated>2019-02-09T08:49:51Z</updated>
<author>
<name>Poncho</name>
</author>
<published>2019-02-09T08:47:40Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/mat2/commit/?id=a71488d4592cef29d6db0981cd0721250eebaff4'/>
<id>urn:sha1:a71488d4592cef29d6db0981cd0721250eebaff4</id>
<content type='text'>
without /etc/ld.so.cache available in the sandbox, tests fail on gentoo with:
/usr/bin/ffmpeg: error while loading shared libraries: libstdc++.so.6:
    cannot open shared object file: No such file or directory
</content>
</entry>
<entry>
<title>Whenever possible, use bwrap for subprocesses</title>
<updated>2019-02-03T18:18:41Z</updated>
<author>
<name>intrigeri</name>
</author>
<published>2019-02-03T09:43:27Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/mat2/commit/?id=e8c1bb0e3c4cae579e81ce6a4b01b829900ff922'/>
<id>urn:sha1:e8c1bb0e3c4cae579e81ce6a4b01b829900ff922</id>
<content type='text'>
This should closes  #90
</content>
</entry>
</feed>
