RAppArmor: Bindings to AppArmor and Security Related Linux Tools

Bindings to kernel methods for enforcing security restrictions. AppArmor can apply mandatory access control (MAC) policies on a given task (process) via security profiles with detailed ACL definitions. In addition this package implements bindings for setting process resource limits (rlimit), uid, gid, affinity and priority. The high level R function 'eval.secure' builds on these methods to perform dynamic sandboxing: it evaluates a single R expression within a temporary fork which acts as a sandbox by enforcing fine grained restrictions without affecting the main R process. A portable version of this function is now available in the 'unix' package.

Version: 3.2
Depends: unix (≥ 1.4)
Suggests: testthat, R.rsp
OS_type: unix
Published: 2019-03-16
Author: Jeroen Ooms ORCID iD [aut, cre]
Maintainer: Jeroen Ooms <jeroen at berkeley.edu>
BugReports: http://github.com/jeroen/RAppArmor/issues
License: Apache License 2.0
URL: http://www.jstatsoft.org/v55/i07/ (paper), http://github.com/jeroen/RAppArmor#readme (devel)
NeedsCompilation: yes
SystemRequirements: linux (>= 3.0), libapparmor-dev
Language: en-US
Citation: RAppArmor citation info
Materials: NEWS
CRAN checks: RAppArmor results

Downloads:

Reference manual: RAppArmor.pdf
Vignettes: Enforcing Security Policies Using Dynamic Sandboxing on Linux
Package source: RAppArmor_3.2.tar.gz
Windows binaries: r-devel: not available, r-release: not available, r-oldrel: not available
OS X binaries: r-release: RAppArmor_3.2.tgz, r-oldrel: RAppArmor_3.2.tgz
Old sources: RAppArmor archive

Linking:

Please use the canonical form https://CRAN.R-project.org/package=RAppArmor to link to this page.