- bwrap_flags("--unshare-all", "--share-net", "--hostname", "bubblebox"),
+ # cannot unshare IPC as that breaks some wine applications
+ bwrap_flags("--unshare-user", "--unshare-pid", "--unshare-cgroup"),
+ # A different hostname is useful to be able to see when we are inside the sandbox.
+ # However, some applications will not like this unless the hostname also exists in `/etc/hosts`!
+ bwrap_flags("--unshare-uts", "--hostname", "bubblebox"),
+ # Make sure the sandbox cannot inject commands into the host terminal.
+ # TODO: This flag breaks some CLI applications, like job control in shells.
+ # Consider using SECCOMP instead.
+ # Possible code to use for that: <https://gist.github.com/sloonz/4b7f5f575a96b6fe338534dbc2480a5d#file-sandbox-py-L129>
+ # There is also a good list of possible-syscalls-to-block at
+ # <https://github.com/flatpak/flatpak/blob/f16e064fd9454fb8f754b769ad1ffce0e42b51db/common/flatpak-run.c#L1791>.
+ bwrap_flags("--new-session"),