Bindings to kernel methods for enforcing security restrictions. AppArmor can apply mandatory access control (MAC) policies on a given task (process) via security profiles with detailed ACL definitions. In addition this package implements bindings for setting process resource limits (rlimit), uid, gid, affinity and priority. The high level R function 'eval.secure' builds on these methods to perform dynamic sandboxing: it evaluates a single R expression within a temporary fork which acts as a sandbox by enforcing fine grained restrictions without affecting the main R process. A portable version of this function is now available in the 'unix' package.
| Version: | 3.2.5 | 
| Depends: | unix (≥ 1.4) | 
| Suggests: | testthat, R.rsp | 
| OS_type: | unix | 
| Published: | 2024-10-04 | 
| DOI: | 10.32614/CRAN.package.RAppArmor | 
| Author: | Jeroen Ooms | 
| Maintainer: | Jeroen Ooms <jeroenooms at gmail.com> | 
| BugReports: | https://github.com/jeroen/RAppArmor/issues | 
| License: | Apache License 2.0 | 
| URL: | https://www.jstatsoft.org/v55/i07/ https://jeroen.r-universe.dev/RAppArmor | 
| NeedsCompilation: | yes | 
| SystemRequirements: | linux (>= 3.0), libapparmor-dev | 
| Language: | en-US | 
| Citation: | RAppArmor citation info | 
| Materials: | NEWS | 
| CRAN checks: | RAppArmor results | 
| Reference manual: | RAppArmor.html , RAppArmor.pdf | 
| Vignettes: | Enforcing Security Policies Using Dynamic Sandboxing on Linux (source) | 
| Package source: | RAppArmor_3.2.5.tar.gz | 
| Windows binaries: | r-devel: not available, r-release: not available, r-oldrel: not available | 
| macOS binaries: | r-release (arm64): RAppArmor_3.2.5.tgz, r-oldrel (arm64): RAppArmor_3.2.5.tgz, r-release (x86_64): RAppArmor_3.2.5.tgz, r-oldrel (x86_64): RAppArmor_3.2.5.tgz | 
| Old sources: | RAppArmor archive | 
Please use the canonical form https://CRAN.R-project.org/package=RAppArmor to link to this page.