Bindings to various methods in the kernel for enforcing security restrictions. AppArmor can apply mandatory access control (MAC) policies on a given task (process) via security profiles with detailed ACL definitions. In addition the package has kernel bindings for setting the process hardware resource limits (rlimit), uid, gid, affinity and priority. The high level R function 'eval.secure' builds on these methods to do dynamic sandboxing: it evaluates a single R expression within a temporary fork which acts as a sandbox by enforcing fine grained restrictions without affecting the main R process. Recent versions on this package can also be installed on systems without libapparmor, in which case some features are automatically disabled.

Maintainer: Jeroen Ooms <jeroen.ooms at stat.ucla.edu>

Author(s): Jeroen Ooms

Install package and any missing dependencies by running this line in your R console:

install.packages("RAppArmor")

Depends tools
Imports parallel
Suggests testthat, R.rsp
Enhances
Linking to
Reverse
depends
Reverse
imports
Reverse
suggests
Reverse
enhances
Reverse
linking to

Package RAppArmor
Materials
URL http://www.jstatsoft.org/v55/i07/ http://github.com/jeroenooms/RAppArmor#readme
Task Views
Version 2.0.2
Published 2016-05-17
License Apache License (== 2.0)
BugReports http://github.com/jeroenooms/RAppArmor/issues
SystemRequirements linux (>= 3.0), libapparmor-dev (optional)
NeedsCompilation yes
Citation
CRAN checks RAppArmor check results
Package source RAppArmor_2.0.2.tar.gz