Bindings to kernel methods for enforcing security restrictions. AppArmor can apply mandatory access control (MAC) policies on a given task (process) via security profiles with detailed ACL definitions. In addition this package implements bindings for setting process resource limits (rlimit), uid, gid, affinity and priority. The high level R function 'eval.secure' builds on these methods to perform dynamic sandboxing: it evaluates a single R expression within a temporary fork which acts as a sandbox by enforcing fine grained restrictions without affecting the main R process. A portable version of this function is now available in the 'unix' package.
Version: | 3.2.2 |
Depends: | unix (≥ 1.4) |
Suggests: | testthat, R.rsp |
OS_type: | unix |
Published: | 2020-12-11 |
Author: | Jeroen Ooms [aut, cre] |
Maintainer: | Jeroen Ooms <jeroen at berkeley.edu> |
BugReports: | https://github.com/jeroen/RAppArmor/issues |
License: | Apache License 2.0 |
URL: | https://www.jstatsoft.org/v55/i07/ (paper), https://github.com/jeroen/RAppArmor#readme (devel) |
NeedsCompilation: | yes |
SystemRequirements: | linux (>= 3.0), libapparmor-dev |
Language: | en-US |
Citation: | RAppArmor citation info |
Materials: | NEWS |
CRAN checks: | RAppArmor results |
Reference manual: | RAppArmor.pdf |
Vignettes: |
Enforcing Security Policies Using Dynamic Sandboxing on Linux |
Package source: | RAppArmor_3.2.2.tar.gz |
Windows binaries: | r-devel: not available, r-release: not available, r-oldrel: not available |
macOS binaries: | r-release (arm64): RAppArmor_3.2.2.tgz, r-oldrel (arm64): RAppArmor_3.2.2.tgz, r-release (x86_64): RAppArmor_3.2.2.tgz, r-oldrel (x86_64): RAppArmor_3.2.2.tgz |
Old sources: | RAppArmor archive |
Please use the canonical form https://CRAN.R-project.org/package=RAppArmor to link to this page.