RAppArmor: Bindings to AppArmor and Security Related Linux Tools

Bindings to kernel methods for enforcing security restrictions. AppArmor can apply mandatory access control (MAC) policies on a given task (process) via security profiles with detailed ACL definitions. In addition this package implements bindings for setting process resource limits (rlimit), uid, gid, affinity and priority. The high level R function 'eval.secure' builds on these methods to perform dynamic sandboxing: it evaluates a single R expression within a temporary fork which acts as a sandbox by enforcing fine grained restrictions without affecting the main R process. A portable version of this function is now available in the 'unix' package.

Version: 3.2.4
Depends: unix (≥ 1.4)
Suggests: testthat, R.rsp
OS_type: unix
Published: 2023-12-04
Author: Jeroen Ooms ORCID iD [aut, cre]
Maintainer: Jeroen Ooms <jeroen at berkeley.edu>
BugReports: https://github.com/jeroen/RAppArmor/issues
License: Apache License 2.0
URL: https://www.jstatsoft.org/v55/i07/ https://jeroen.r-universe.dev/RAppArmor
NeedsCompilation: yes
SystemRequirements: linux (>= 3.0), libapparmor-dev
Language: en-US
Citation: RAppArmor citation info
Materials: NEWS
CRAN checks: RAppArmor results

Documentation:

Reference manual: RAppArmor.pdf
Vignettes: Enforcing Security Policies Using Dynamic Sandboxing on Linux

Downloads:

Package source: RAppArmor_3.2.4.tar.gz
Windows binaries: r-devel: not available, r-release: not available, r-oldrel: not available
macOS binaries: r-release (arm64): RAppArmor_3.2.4.tgz, r-oldrel (arm64): RAppArmor_3.2.4.tgz, r-release (x86_64): RAppArmor_3.2.4.tgz
Old sources: RAppArmor archive

Linking:

Please use the canonical form https://CRAN.R-project.org/package=RAppArmor to link to this page.