I assume it doesn’t, but thought I’d ask.
I really like the principles behind both gentoo and flatpak, but right now I can only do the gentoo way or the flatpak way (and I’ve opted for gentoo’s for now).
What I’d love to have from flatpak:
- container like sandboxing and isolation
- customizable sandboxing and permissions
What I’d love to have from gentoo:
- powerful build system building packages from source
- global declarative management of compilation options
- easy patches
- easy to add packages that aren’t in repos
- support for many architectures or setups
I’ve seen NixPak which I think would be just what you want, except that it’s for Nix instead of Gentoo. But Nix has the same features that you say you like in Gentoo.
How about not changing at all your regular packages,and containerizing what you want, or as much as possible through current profiles, through firejail? And couplet that with MAC protection offered by apparmor (one can actually set firejail to always use apparmor, and then tweak particular apps not to use it if it’s too troublesome).
This way you have your provided distro packages (gentoo or sourcemage if source based distros, it doesn’t matter), and have them execute containerized. The only thing is that there are not firejail profiles for every possible piece of SW, but the vanilla list of containers is not small either.
At that point you might as well use a Docker type container in which to build your software from source and deploy in the container.
But Flatpak has its fancy “portals” to connect each app with the specific resource it needs which you don’t get with Docker.
Also if the goal is to limit access of apps you don’t want to fully trust, I think Docker doesn’t have the appropriate security properties. Here’s a quote from the readme for Bubblewrap (the sandboxing tool that Flatpak and Nixpak use),
Many container runtime tools like systemd-nspawn, docker, etc. focus on providing infrastructure for system administrators and orchestration tools (e.g. Kubernetes) to run containers.
These tools are not suitable to give to unprivileged users, because it is trivial to turn such access into a fully privileged root shell on the host.
in theory shouldn’t it be possible to use bubblewrap and the xdg-desktop-portal project to hack together only the sandboxing bits of flatpak while leaving out ostree/distribution
you might run into this though: https://github.com/flatpak/xdg-desktop-portal/issues/737
If you’re willing to spend the time to learn how to write custom policies, SELinux can be used for this, to some extent. It’s highly customizable and can sandbox your apps, but the process of doing so is quite complicated. I wrote a small guide on custom policy management on Gentoo in another comment if you’re interested.
There’s also apparently a “sandbox” feature, but I don’t know much about it. I just write my own policies and make them as strict as possible.
As an example, my web browser can’t access my home directory or anything except its own directories, and nobody (including my own user), except root and a few select processes (gpg, gpg-agent, git, pass) can access my gnupg directory.
This only covers security/permissions, and doesn’t include many of the other benefits of containerization or isolation. You could also try KVM with libvirt and Gentoo VMs; that works pretty well (despite update times) and I did that for a while with some success.
Would running gentoo in a distrobox container work for you?
Build everything you use in podman or lxc
Build everything you use and ackage it in flatpak?
It’s not even that hard to build your own gentoo-based runtimes and install stuff on top of that. Fedora does offer that, too, offering fatpaks based on their own fedora based runtime + rpms.
From my understanding this doesn’t work too well for GUIs