aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@protonmail.com>2023-07-26 08:59:33 -0400
committerLibravatar netblue30 <netblue30@protonmail.com>2023-07-26 08:59:33 -0400
commit6d4bb95948363263e220dc475db71a9341f1294e (patch)
tree5c66a28720ee7fd78683a219717d3d7e40eed265
parentnetlock/nettrace cleanup (diff)
parentspotify: D-Bus hardening (#5923) (diff)
downloadfirejail-6d4bb95948363263e220dc475db71a9341f1294e.tar.gz
firejail-6d4bb95948363263e220dc475db71a9341f1294e.tar.zst
firejail-6d4bb95948363263e220dc475db71a9341f1294e.zip
Merge branch 'master' of ssh://github.com/netblue30/firejail
-rw-r--r--etc/firejail.config4
-rw-r--r--etc/inc/disable-interpreters.inc3
-rw-r--r--etc/inc/disable-programs.inc2
-rw-r--r--etc/profile-a-l/1password.profile2
-rw-r--r--etc/profile-a-l/abrowser.profile1
-rw-r--r--etc/profile-a-l/audacious.profile13
-rw-r--r--etc/profile-a-l/basilisk.profile1
-rw-r--r--etc/profile-a-l/brave.profile4
-rw-r--r--etc/profile-a-l/cachy-browser.profile11
-rw-r--r--etc/profile-a-l/cliqz.profile1
-rw-r--r--etc/profile-a-l/cyberfox.profile2
-rw-r--r--etc/profile-a-l/discord-ptb.profile14
-rw-r--r--etc/profile-a-l/firedragon.profile1
-rw-r--r--etc/profile-a-l/firefox-common-addons.profile1
-rw-r--r--etc/profile-a-l/firefox-common.profile5
-rw-r--r--etc/profile-a-l/firefox.profile9
-rw-r--r--etc/profile-a-l/gnome-calendar.profile2
-rw-r--r--etc/profile-a-l/icecat.profile1
-rw-r--r--etc/profile-a-l/krunner.profile6
-rw-r--r--etc/profile-a-l/kube.profile19
-rw-r--r--etc/profile-a-l/librewolf.profile9
-rw-r--r--etc/profile-m-z/minetest.profile5
-rw-r--r--etc/profile-m-z/mov-cli.profile4
-rw-r--r--etc/profile-m-z/mpv.profile2
-rw-r--r--etc/profile-m-z/nodejs-common.profile2
-rw-r--r--etc/profile-m-z/noprofile.profile15
-rw-r--r--etc/profile-m-z/palemoon.profile2
-rw-r--r--etc/profile-m-z/pingus.profile3
-rw-r--r--etc/profile-m-z/rtin.profile2
-rw-r--r--etc/profile-m-z/signal-desktop.profile8
-rw-r--r--etc/profile-m-z/sniffnet.profile49
-rw-r--r--etc/profile-m-z/spotify.profile11
-rw-r--r--etc/profile-m-z/steam.profile4
-rw-r--r--etc/profile-m-z/thunderbird.profile3
-rw-r--r--etc/profile-m-z/tin.profile4
-rw-r--r--etc/profile-m-z/trojita.profile11
-rw-r--r--etc/profile-m-z/waterfox.profile1
-rw-r--r--src/firecfg/firecfg.config1
38 files changed, 156 insertions, 82 deletions
diff --git a/etc/firejail.config b/etc/firejail.config
index e8bf45751..c3c355e3d 100644
--- a/etc/firejail.config
+++ b/etc/firejail.config
@@ -163,12 +163,12 @@
163# Xpra server command extra parameters. None by default; this is an example. 163# Xpra server command extra parameters. None by default; this is an example.
164# xpra-extra-params --dpi 96 164# xpra-extra-params --dpi 96
165 165
166# Screen size for --x11=xvfb, default 800x600x24. The third dimension is 166# Screen size for --x11=xvfb, default 800x600x24. The third dimension is
167# color depth; use 24 unless you know exactly what you're doing. 167# color depth; use 24 unless you know exactly what you're doing.
168# xvfb-screen 640x480x24 168# xvfb-screen 640x480x24
169# xvfb-screen 800x600x24 169# xvfb-screen 800x600x24
170# xvfb-screen 1024x768x24 170# xvfb-screen 1024x768x24
171# xvfb-screen 1280x1024x24 171# xvfb-screen 1280x1024x24
172 172
173# Xvfb command extra parameters. None by default; this is an example. 173# Xvfb command extra parameters. None by default; this is an example.
174# xvfb-extra-params -pixdepths 8 24 32 174# xvfb-extra-params -pixdepths 8 24 32
diff --git a/etc/inc/disable-interpreters.inc b/etc/inc/disable-interpreters.inc
index 4e3590fed..e4497f832 100644
--- a/etc/inc/disable-interpreters.inc
+++ b/etc/inc/disable-interpreters.inc
@@ -44,8 +44,7 @@ blacklist /usr/share/perl*
44# it is needed so that Firefox can run applications with Terminal=true in 44# it is needed so that Firefox can run applications with Terminal=true in
45# their .desktop file (depending on what is installed). The reason is that 45# their .desktop file (depending on what is installed). The reason is that
46# this is done via glib, which currently uses a hardcoded list of terminal 46# this is done via glib, which currently uses a hardcoded list of terminal
47# emulators: 47# emulators: https://gitlab.gnome.org/GNOME/glib/-/issues/338.
48# https://gitlab.gnome.org/GNOME/glib/-/issues/338
49# And in this list, rxvt comes before xterm. 48# And in this list, rxvt comes before xterm.
50blacklist ${PATH}/rxvt 49blacklist ${PATH}/rxvt
51 50
diff --git a/etc/inc/disable-programs.inc b/etc/inc/disable-programs.inc
index 29d5a8700..b0d1b7a66 100644
--- a/etc/inc/disable-programs.inc
+++ b/etc/inc/disable-programs.inc
@@ -547,6 +547,7 @@ blacklist ${HOME}/.config/midori
547blacklist ${HOME}/.config/mirage 547blacklist ${HOME}/.config/mirage
548blacklist ${HOME}/.config/monero-project 548blacklist ${HOME}/.config/monero-project
549blacklist ${HOME}/.config/mono 549blacklist ${HOME}/.config/mono
550blacklist ${HOME}/.config/mov-cli
550blacklist ${HOME}/.config/mpDris2 551blacklist ${HOME}/.config/mpDris2
551blacklist ${HOME}/.config/mpd 552blacklist ${HOME}/.config/mpd
552blacklist ${HOME}/.config/mps-youtube 553blacklist ${HOME}/.config/mps-youtube
@@ -623,6 +624,7 @@ blacklist ${HOME}/.config/slimjet
623blacklist ${HOME}/.config/smplayer 624blacklist ${HOME}/.config/smplayer
624blacklist ${HOME}/.config/smtube 625blacklist ${HOME}/.config/smtube
625blacklist ${HOME}/.config/smuxi 626blacklist ${HOME}/.config/smuxi
627blacklist ${HOME}/.config/sniffnet
626blacklist ${HOME}/.config/snox 628blacklist ${HOME}/.config/snox
627blacklist ${HOME}/.config/sound-juicer 629blacklist ${HOME}/.config/sound-juicer
628blacklist ${HOME}/.config/specialmailcollectionsrc 630blacklist ${HOME}/.config/specialmailcollectionsrc
diff --git a/etc/profile-a-l/1password.profile b/etc/profile-a-l/1password.profile
index 690086099..63a04330b 100644
--- a/etc/profile-a-l/1password.profile
+++ b/etc/profile-a-l/1password.profile
@@ -13,7 +13,7 @@ whitelist ${HOME}/.config/1Password
13 13
14private-etc @tls-ca 14private-etc @tls-ca
15 15
16# Needed for keychain things, talking to Firefox, possibly other things? Not sure how to narrow down 16# Needed for keychain things, talking to Firefox, possibly other things?
17ignore dbus-user none 17ignore dbus-user none
18 18
19# Redirect 19# Redirect
diff --git a/etc/profile-a-l/abrowser.profile b/etc/profile-a-l/abrowser.profile
index 2e6e8f1af..8b70756ba 100644
--- a/etc/profile-a-l/abrowser.profile
+++ b/etc/profile-a-l/abrowser.profile
@@ -12,6 +12,7 @@ mkdir ${HOME}/.cache/mozilla/abrowser
12mkdir ${HOME}/.mozilla 12mkdir ${HOME}/.mozilla
13whitelist ${HOME}/.cache/mozilla/abrowser 13whitelist ${HOME}/.cache/mozilla/abrowser
14whitelist ${HOME}/.mozilla 14whitelist ${HOME}/.mozilla
15whitelist /usr/share/abrowser
15 16
16# private-etc must first be enabled in firefox-common.profile 17# private-etc must first be enabled in firefox-common.profile
17#private-etc abrowser 18#private-etc abrowser
diff --git a/etc/profile-a-l/audacious.profile b/etc/profile-a-l/audacious.profile
index b31f3f1b2..6abd87c92 100644
--- a/etc/profile-a-l/audacious.profile
+++ b/etc/profile-a-l/audacious.profile
@@ -14,6 +14,7 @@ include disable-common.inc
14include disable-devel.inc 14include disable-devel.inc
15include disable-exec.inc 15include disable-exec.inc
16include disable-interpreters.inc 16include disable-interpreters.inc
17include disable-proc.inc
17include disable-programs.inc 18include disable-programs.inc
18include disable-xdg.inc 19include disable-xdg.inc
19 20
@@ -26,6 +27,7 @@ netfilter
26nogroups 27nogroups
27noinput 28noinput
28nonewprivs 29nonewprivs
30noprinters
29noroot 31noroot
30notv 32notv
31nou2f 33nou2f
@@ -39,8 +41,13 @@ private-cache
39private-dev 41private-dev
40private-tmp 42private-tmp
41 43
42# dbus needed for MPRIS 44dbus-user filter
43# dbus-user none 45dbus-user.own org.atheme.audacious
44# dbus-system none 46dbus-user.own org.mpris.MediaPlayer2.audacious
47dbus-user.talk ca.desrt.dconf
48dbus-user.talk org.freedesktop.Notifications
49dbus-user.talk org.gtk.vfs.UDisks2VolumeMonitor
50dbus-user.talk org.mpris.MediaPlayer2.Player
51dbus-system none
45 52
46restrict-namespaces 53restrict-namespaces
diff --git a/etc/profile-a-l/basilisk.profile b/etc/profile-a-l/basilisk.profile
index a962bfe02..7d2fe143c 100644
--- a/etc/profile-a-l/basilisk.profile
+++ b/etc/profile-a-l/basilisk.profile
@@ -12,6 +12,7 @@ mkdir ${HOME}/.cache/moonchild productions/basilisk
12mkdir ${HOME}/.moonchild productions 12mkdir ${HOME}/.moonchild productions
13whitelist ${HOME}/.cache/moonchild productions/basilisk 13whitelist ${HOME}/.cache/moonchild productions/basilisk
14whitelist ${HOME}/.moonchild productions 14whitelist ${HOME}/.moonchild productions
15whitelist /usr/share/basilisk
15 16
16# Basilisk can use the full firejail seccomp filter (unlike firefox >= 60) 17# Basilisk can use the full firejail seccomp filter (unlike firefox >= 60)
17seccomp 18seccomp
diff --git a/etc/profile-a-l/brave.profile b/etc/profile-a-l/brave.profile
index 071a279b0..b3994c974 100644
--- a/etc/profile-a-l/brave.profile
+++ b/etc/profile-a-l/brave.profile
@@ -9,8 +9,8 @@ include globals.local
9# noexec /tmp is included in chromium-common.profile and breaks Brave 9# noexec /tmp is included in chromium-common.profile and breaks Brave
10ignore noexec /tmp 10ignore noexec /tmp
11# TOR is installed in ${HOME}. 11# TOR is installed in ${HOME}.
12# NOTE: chromium-common.profile enables apparmor. To keep that intact 12# Note: chromium-common.profile enables apparmor. To keep that intact,
13# you will need to uncomment the 'brave + tor' rule in /etc/apparmor.d/local/firejail-default. 13# uncomment the 'brave + tor' rule in /etc/apparmor.d/local/firejail-default.
14# Alternatively you can add 'ignore apparmor' to your brave.local. 14# Alternatively you can add 'ignore apparmor' to your brave.local.
15ignore noexec ${HOME} 15ignore noexec ${HOME}
16# Causes slow starts (#4604) 16# Causes slow starts (#4604)
diff --git a/etc/profile-a-l/cachy-browser.profile b/etc/profile-a-l/cachy-browser.profile
index 7a14d9464..05e1a69f1 100644
--- a/etc/profile-a-l/cachy-browser.profile
+++ b/etc/profile-a-l/cachy-browser.profile
@@ -13,26 +13,21 @@ mkdir ${HOME}/.cache/cachy
13mkdir ${HOME}/.cachy 13mkdir ${HOME}/.cachy
14whitelist ${HOME}/.cache/cachy 14whitelist ${HOME}/.cache/cachy
15whitelist ${HOME}/.cachy 15whitelist ${HOME}/.cachy
16whitelist /usr/share/cachy-browser
16 17
17# Add the next lines to your cachy-browser.local if you want to use the migration wizard. 18# Add the next lines to your cachy-browser.local if you want to use the migration wizard.
18#noblacklist ${HOME}/.mozilla 19#noblacklist ${HOME}/.mozilla
19#whitelist ${HOME}/.mozilla 20#whitelist ${HOME}/.mozilla
20 21
21# To enable KeePassXC Plugin add one of the following lines to your cachy-browser.local. 22# To enable KeePassXC Plugin add one of the following lines to your cachy-browser.local.
22# NOTE: start KeePassXC before CachyBrowser and keep it open to allow communication between them. 23# Note: Start KeePassXC before CachyBrowser and keep it open to allow communication between them.
23#whitelist ${RUNUSER}/kpxc_server 24#whitelist ${RUNUSER}/kpxc_server
24#whitelist ${RUNUSER}/org.keepassxc.KeePassXC.BrowserServer 25#whitelist ${RUNUSER}/org.keepassxc.KeePassXC.BrowserServer
25 26
26whitelist /usr/share/doc
27whitelist /usr/share/gtk-doc/html
28whitelist /usr/share/mozilla
29whitelist /usr/share/webext
30include whitelist-usr-share-common.inc
31
32# Add the next line to your cachy-browser.local to enable private-bin (Arch Linux). 27# Add the next line to your cachy-browser.local to enable private-bin (Arch Linux).
33#private-bin dbus-launch,dbus-send,cachy-browser,sh 28#private-bin dbus-launch,dbus-send,cachy-browser,sh
34# Add the next line to your cachy-browser.local to enable private-etc. 29# Add the next line to your cachy-browser.local to enable private-etc.
35# NOTE: private-etc must first be enabled in firefox-common.local. 30# Note: private-etc must first be enabled in firefox-common.local.
36#private-etc cachy-browser 31#private-etc cachy-browser
37 32
38dbus-user filter 33dbus-user filter
diff --git a/etc/profile-a-l/cliqz.profile b/etc/profile-a-l/cliqz.profile
index d0b8cc0ef..d0bf9797e 100644
--- a/etc/profile-a-l/cliqz.profile
+++ b/etc/profile-a-l/cliqz.profile
@@ -15,6 +15,7 @@ mkdir ${HOME}/.config/cliqz
15whitelist ${HOME}/.cache/cliqz 15whitelist ${HOME}/.cache/cliqz
16whitelist ${HOME}/.cliqz 16whitelist ${HOME}/.cliqz
17whitelist ${HOME}/.config/cliqz 17whitelist ${HOME}/.config/cliqz
18whitelist /usr/share/cliqz
18 19
19# private-etc must first be enabled in firefox-common.profile 20# private-etc must first be enabled in firefox-common.profile
20#private-etc cliqz 21#private-etc cliqz
diff --git a/etc/profile-a-l/cyberfox.profile b/etc/profile-a-l/cyberfox.profile
index d1fff0004..a303c5979 100644
--- a/etc/profile-a-l/cyberfox.profile
+++ b/etc/profile-a-l/cyberfox.profile
@@ -12,6 +12,8 @@ mkdir ${HOME}/.8pecxstudios
12mkdir ${HOME}/.cache/8pecxstudios 12mkdir ${HOME}/.cache/8pecxstudios
13whitelist ${HOME}/.8pecxstudios 13whitelist ${HOME}/.8pecxstudios
14whitelist ${HOME}/.cache/8pecxstudios 14whitelist ${HOME}/.cache/8pecxstudios
15whitelist /usr/share/8pecxstudios
16whitelist /usr/share/cyberfox
15 17
16# private-bin cyberfox,dbus-launch,dbus-send,env,sh,which 18# private-bin cyberfox,dbus-launch,dbus-send,env,sh,which
17# private-etc must first be enabled in firefox-common.profile 19# private-etc must first be enabled in firefox-common.profile
diff --git a/etc/profile-a-l/discord-ptb.profile b/etc/profile-a-l/discord-ptb.profile
index c39c0d843..265bf5615 100644
--- a/etc/profile-a-l/discord-ptb.profile
+++ b/etc/profile-a-l/discord-ptb.profile
@@ -1,17 +1,17 @@
1# Firejail profile for discord-ptb 1# Firejail profile for discord-ptb
2# This file is overwritten after every install/update 2# This file is overwritten after every install/update
3# Persistent local customizations 3# Persistent local customizations
4include discord-ptb.local 4include discord-ptb.local
5# Persistent global definitions 5# Persistent global definitions
6include globals.local 6include globals.local
7 7
8noblacklist ${HOME}/.config/discordptb 8noblacklist ${HOME}/.config/discordptb
9 9
10mkdir ${HOME}/.config/discordptb 10mkdir ${HOME}/.config/discordptb
11whitelist ${HOME}/.config/discordptb 11whitelist ${HOME}/.config/discordptb
12 12
13private-bin discord-ptb,DiscordPTB 13private-bin discord-ptb,DiscordPTB
14private-opt discord-ptb,DiscordPTB 14private-opt discord-ptb,DiscordPTB
15 15
16# Redirect 16# Redirect
17include discord-common.profile 17include discord-common.profile
diff --git a/etc/profile-a-l/firedragon.profile b/etc/profile-a-l/firedragon.profile
index 77487161e..3177fb989 100644
--- a/etc/profile-a-l/firedragon.profile
+++ b/etc/profile-a-l/firedragon.profile
@@ -13,6 +13,7 @@ mkdir ${HOME}/.cache/firedragon
13mkdir ${HOME}/.firedragon 13mkdir ${HOME}/.firedragon
14whitelist ${HOME}/.cache/firedragon 14whitelist ${HOME}/.cache/firedragon
15whitelist ${HOME}/.firedragon 15whitelist ${HOME}/.firedragon
16whitelist /usr/share/firedragon
16 17
17# Add the next lines to your firedragon.local if you want to use the migration wizard. 18# Add the next lines to your firedragon.local if you want to use the migration wizard.
18#noblacklist ${HOME}/.mozilla 19#noblacklist ${HOME}/.mozilla
diff --git a/etc/profile-a-l/firefox-common-addons.profile b/etc/profile-a-l/firefox-common-addons.profile
index 6dc1fca8a..f12750fda 100644
--- a/etc/profile-a-l/firefox-common-addons.profile
+++ b/etc/profile-a-l/firefox-common-addons.profile
@@ -74,7 +74,6 @@ whitelist ${HOME}/.zotero
74whitelist ${HOME}/dwhelper 74whitelist ${HOME}/dwhelper
75whitelist /usr/share/lua 75whitelist /usr/share/lua
76whitelist /usr/share/lua* 76whitelist /usr/share/lua*
77whitelist /usr/share/vulkan
78 77
79# GNOME Shell integration (chrome-gnome-shell) needs dbus and python 78# GNOME Shell integration (chrome-gnome-shell) needs dbus and python
80noblacklist ${HOME}/.local/share/gnome-shell 79noblacklist ${HOME}/.local/share/gnome-shell
diff --git a/etc/profile-a-l/firefox-common.profile b/etc/profile-a-l/firefox-common.profile
index 42d12c5d9..9c8601e7b 100644
--- a/etc/profile-a-l/firefox-common.profile
+++ b/etc/profile-a-l/firefox-common.profile
@@ -29,9 +29,14 @@ mkdir ${HOME}/.pki
29whitelist ${DOWNLOADS} 29whitelist ${DOWNLOADS}
30whitelist ${HOME}/.local/share/pki 30whitelist ${HOME}/.local/share/pki
31whitelist ${HOME}/.pki 31whitelist ${HOME}/.pki
32whitelist /usr/share/doc
33whitelist /usr/share/gtk-doc/html
34whitelist /usr/share/mozilla
35whitelist /usr/share/webext
32include whitelist-common.inc 36include whitelist-common.inc
33include whitelist-run-common.inc 37include whitelist-run-common.inc
34include whitelist-runuser-common.inc 38include whitelist-runuser-common.inc
39include whitelist-usr-share-common.inc
35include whitelist-var-common.inc 40include whitelist-var-common.inc
36 41
37apparmor 42apparmor
diff --git a/etc/profile-a-l/firefox.profile b/etc/profile-a-l/firefox.profile
index 1fcbf0562..659519ca8 100644
--- a/etc/profile-a-l/firefox.profile
+++ b/etc/profile-a-l/firefox.profile
@@ -6,7 +6,7 @@ include firefox.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# NOTE: sandboxing web browsers is as important as it is complex. Users might be 9# Note: Sandboxing web browsers is as important as it is complex. Users might be
10# interested in creating custom profiles depending on use case (e.g. one for 10# interested in creating custom profiles depending on use case (e.g. one for
11# general browsing, another for banking, ...). Consult our FAQ/issue tracker for more 11# general browsing, another for banking, ...). Consult our FAQ/issue tracker for more
12# info. Here are a few links to get you going. 12# info. Here are a few links to get you going.
@@ -30,19 +30,14 @@ whitelist ${HOME}/.cache/mozilla/firefox
30whitelist ${HOME}/.mozilla 30whitelist ${HOME}/.mozilla
31 31
32# Add one of the following whitelist options to your firefox.local to enable KeePassXC Plugin support. 32# Add one of the following whitelist options to your firefox.local to enable KeePassXC Plugin support.
33# NOTE: start KeePassXC before Firefox and keep it open to allow communication between them. 33# Note: Start KeePassXC before Firefox and keep it open to allow communication between them.
34#whitelist ${RUNUSER}/kpxc_server 34#whitelist ${RUNUSER}/kpxc_server
35#whitelist ${RUNUSER}/org.keepassxc.KeePassXC.BrowserServer 35#whitelist ${RUNUSER}/org.keepassxc.KeePassXC.BrowserServer
36 36
37whitelist /usr/share/doc
38whitelist /usr/share/firefox 37whitelist /usr/share/firefox
39whitelist /usr/share/gnome-shell/search-providers/firefox-search-provider.ini 38whitelist /usr/share/gnome-shell/search-providers/firefox-search-provider.ini
40whitelist /usr/share/gtk-doc/html
41whitelist /usr/share/mozilla
42whitelist /usr/share/webext
43whitelist ${RUNUSER}/*firefox* 39whitelist ${RUNUSER}/*firefox*
44whitelist ${RUNUSER}/psd/*firefox* 40whitelist ${RUNUSER}/psd/*firefox*
45include whitelist-usr-share-common.inc
46 41
47# firefox requires a shell to launch on Arch - add the next line to your firefox.local to enable private-bin. 42# firefox requires a shell to launch on Arch - add the next line to your firefox.local to enable private-bin.
48#private-bin bash,dbus-launch,dbus-send,env,firefox,sh,which 43#private-bin bash,dbus-launch,dbus-send,env,firefox,sh,which
diff --git a/etc/profile-a-l/gnome-calendar.profile b/etc/profile-a-l/gnome-calendar.profile
index 70a302138..ddfe57879 100644
--- a/etc/profile-a-l/gnome-calendar.profile
+++ b/etc/profile-a-l/gnome-calendar.profile
@@ -53,7 +53,7 @@ dbus-user.talk ca.desrt.dconf
53dbus-user.talk org.gnome.evolution.dataserver.* 53dbus-user.talk org.gnome.evolution.dataserver.*
54#dbus-user.talk org.gnome.OnlineAccounts 54#dbus-user.talk org.gnome.OnlineAccounts
55#dbus-user.talk org.gnome.ControlCenter 55#dbus-user.talk org.gnome.ControlCenter
56# NOTE: dbus-system none fails, filter without rules works. 56# Note: dbus-system none fails, filter without rules works.
57dbus-system filter 57dbus-system filter
58#dbus-system.talk org.freedesktop.timedate1 58#dbus-system.talk org.freedesktop.timedate1
59#dbus-system.talk org.freedesktop.login1 59#dbus-system.talk org.freedesktop.login1
diff --git a/etc/profile-a-l/icecat.profile b/etc/profile-a-l/icecat.profile
index 660343a29..b0a42fb77 100644
--- a/etc/profile-a-l/icecat.profile
+++ b/etc/profile-a-l/icecat.profile
@@ -12,6 +12,7 @@ mkdir ${HOME}/.cache/mozilla/icecat
12mkdir ${HOME}/.mozilla 12mkdir ${HOME}/.mozilla
13whitelist ${HOME}/.cache/mozilla/icecat 13whitelist ${HOME}/.cache/mozilla/icecat
14whitelist ${HOME}/.mozilla 14whitelist ${HOME}/.mozilla
15whitelist /usr/share/icecat
15 16
16# private-etc must first be enabled in firefox-common.profile 17# private-etc must first be enabled in firefox-common.profile
17#private-etc icecat 18#private-etc icecat
diff --git a/etc/profile-a-l/krunner.profile b/etc/profile-a-l/krunner.profile
index 27feccf40..a0244ef47 100644
--- a/etc/profile-a-l/krunner.profile
+++ b/etc/profile-a-l/krunner.profile
@@ -6,9 +6,9 @@ include krunner.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# - programs started in krunner run with this generic profile 9# Programs started in krunner run with this generic profile.
10# - when a file is opened in krunner, the file viewer runs in its own sandbox 10# When a file is opened in krunner, the file viewer runs in its own sandbox
11# with its own profile, if it is sandboxed automatically 11# with its own profile, if it is sandboxed automatically.
12 12
13# noblacklist ${HOME}/.cache/krunner 13# noblacklist ${HOME}/.cache/krunner
14# noblacklist ${HOME}/.cache/krunnerbookmarkrunnerfirefoxdbfile.sqlite* 14# noblacklist ${HOME}/.cache/krunnerbookmarkrunnerfirefoxdbfile.sqlite*
diff --git a/etc/profile-a-l/kube.profile b/etc/profile-a-l/kube.profile
index 5cf30ed40..82336969d 100644
--- a/etc/profile-a-l/kube.profile
+++ b/etc/profile-a-l/kube.profile
@@ -6,11 +6,10 @@ include kube.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.gnupg
10noblacklist ${HOME}/.mozilla
11noblacklist ${HOME}/.cache/kube 9noblacklist ${HOME}/.cache/kube
12noblacklist ${HOME}/.config/kube 10noblacklist ${HOME}/.config/kube
13noblacklist ${HOME}/.config/sink 11noblacklist ${HOME}/.config/sink
12noblacklist ${HOME}/.gnupg
14noblacklist ${HOME}/.local/share/kube 13noblacklist ${HOME}/.local/share/kube
15noblacklist ${HOME}/.local/share/sink 14noblacklist ${HOME}/.local/share/sink
16 15
@@ -22,23 +21,28 @@ include disable-programs.inc
22include disable-shell.inc 21include disable-shell.inc
23include disable-xdg.inc 22include disable-xdg.inc
24 23
25mkdir ${HOME}/.gnupg 24# The lines below are needed to find the default Firefox profile name, to allow
25# opening links in an existing instance of Firefox (note that it still fails if
26# there isn't a Firefox instance running with the default profile; see #5352)
27noblacklist ${HOME}/.mozilla
28whitelist ${HOME}/.mozilla/firefox/profiles.ini
29
26mkdir ${HOME}/.cache/kube 30mkdir ${HOME}/.cache/kube
27mkdir ${HOME}/.config/kube 31mkdir ${HOME}/.config/kube
28mkdir ${HOME}/.config/sink 32mkdir ${HOME}/.config/sink
33mkdir ${HOME}/.gnupg
29mkdir ${HOME}/.local/share/kube 34mkdir ${HOME}/.local/share/kube
30mkdir ${HOME}/.local/share/sink 35mkdir ${HOME}/.local/share/sink
31whitelist ${HOME}/.gnupg
32whitelist ${HOME}/.mozilla/firefox/profiles.ini
33whitelist ${HOME}/.cache/kube 36whitelist ${HOME}/.cache/kube
34whitelist ${HOME}/.config/kube 37whitelist ${HOME}/.config/kube
35whitelist ${HOME}/.config/sink 38whitelist ${HOME}/.config/sink
39whitelist ${HOME}/.gnupg
36whitelist ${HOME}/.local/share/kube 40whitelist ${HOME}/.local/share/kube
37whitelist ${HOME}/.local/share/sink 41whitelist ${HOME}/.local/share/sink
38whitelist ${RUNUSER}/gnupg 42whitelist ${RUNUSER}/gnupg
39whitelist /usr/share/kube
40whitelist /usr/share/gnupg 43whitelist /usr/share/gnupg
41whitelist /usr/share/gnupg2 44whitelist /usr/share/gnupg2
45whitelist /usr/share/kube
42include whitelist-common.inc 46include whitelist-common.inc
43include whitelist-runuser-common.inc 47include whitelist-runuser-common.inc
44include whitelist-usr-share-common.inc 48include whitelist-usr-share-common.inc
@@ -63,7 +67,6 @@ tracelog
63 67
64# disable-mnt 68# disable-mnt
65# Add "gpg,gpg2,gpg-agent,pinentry-curses,pinentry-emacs,pinentry-fltk,pinentry-gnome3,pinentry-gtk,pinentry-gtk2,pinentry-gtk-2,pinentry-qt,pinentry-qt4,pinentry-tty,pinentry-x2go,pinentry-kwallet" for gpg 69# Add "gpg,gpg2,gpg-agent,pinentry-curses,pinentry-emacs,pinentry-fltk,pinentry-gnome3,pinentry-gtk,pinentry-gtk2,pinentry-gtk-2,pinentry-qt,pinentry-qt4,pinentry-tty,pinentry-x2go,pinentry-kwallet" for gpg
66# Add "ignore private-bin" for hyperlinks or have a look at the private-bins in firefox.profile and firefox-common.profile.
67private-bin kube,sink_synchronizer 70private-bin kube,sink_synchronizer
68private-cache 71private-cache
69private-dev 72private-dev
@@ -75,6 +78,8 @@ dbus-user filter
75dbus-user.talk ca.desrt.dconf 78dbus-user.talk ca.desrt.dconf
76dbus-user.talk org.freedesktop.secrets 79dbus-user.talk org.freedesktop.secrets
77dbus-user.talk org.freedesktop.Notifications 80dbus-user.talk org.freedesktop.Notifications
81# allow D-Bus communication with firefox for opening links
82dbus-user.talk org.mozilla.*
78dbus-system none 83dbus-system none
79 84
80restrict-namespaces 85restrict-namespaces
diff --git a/etc/profile-a-l/librewolf.profile b/etc/profile-a-l/librewolf.profile
index b84cbb119..65a4a3787 100644
--- a/etc/profile-a-l/librewolf.profile
+++ b/etc/profile-a-l/librewolf.profile
@@ -19,21 +19,16 @@ whitelist ${HOME}/.librewolf
19#whitelist ${HOME}/.mozilla 19#whitelist ${HOME}/.mozilla
20 20
21# To enable KeePassXC Plugin add one of the following lines to your librewolf.local. 21# To enable KeePassXC Plugin add one of the following lines to your librewolf.local.
22# NOTE: start KeePassXC before Librewolf and keep it open to allow communication between them. 22# Note: Start KeePassXC before Librewolf and keep it open to allow communication between them.
23#whitelist ${RUNUSER}/kpxc_server 23#whitelist ${RUNUSER}/kpxc_server
24#whitelist ${RUNUSER}/org.keepassxc.KeePassXC.BrowserServer 24#whitelist ${RUNUSER}/org.keepassxc.KeePassXC.BrowserServer
25 25
26whitelist /usr/share/doc
27whitelist /usr/share/gtk-doc/html
28whitelist /usr/share/librewolf 26whitelist /usr/share/librewolf
29whitelist /usr/share/mozilla
30whitelist /usr/share/webext
31include whitelist-usr-share-common.inc
32 27
33# Add the next line to your librewolf.local to enable private-bin (Arch Linux). 28# Add the next line to your librewolf.local to enable private-bin (Arch Linux).
34#private-bin dbus-launch,dbus-send,librewolf,sh 29#private-bin dbus-launch,dbus-send,librewolf,sh
35# Add the next line to your librewolf.local to enable private-etc. 30# Add the next line to your librewolf.local to enable private-etc.
36# NOTE: private-etc must first be enabled in firefox-common.local. 31# Note: private-etc must first be enabled in firefox-common.local.
37#private-etc librewolf 32#private-etc librewolf
38 33
39dbus-user filter 34dbus-user filter
diff --git a/etc/profile-m-z/minetest.profile b/etc/profile-m-z/minetest.profile
index 15474c96e..7b0135695 100644
--- a/etc/profile-m-z/minetest.profile
+++ b/etc/profile-m-z/minetest.profile
@@ -6,8 +6,9 @@ include minetest.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# In order to save in-game screenshots to a persistent location edit ~/.minetest/minetest.conf: 9# In order to save in-game screenshots to a persistent location,
10# screenshot_path = /home/<USER>/.minetest/screenshots 10# edit ~/.minetest/minetest.conf:
11# screenshot_path = /home/<USER>/.minetest/screenshots
11 12
12noblacklist ${HOME}/.cache/minetest 13noblacklist ${HOME}/.cache/minetest
13noblacklist ${HOME}/.minetest 14noblacklist ${HOME}/.minetest
diff --git a/etc/profile-m-z/mov-cli.profile b/etc/profile-m-z/mov-cli.profile
index c5f764912..8007b887a 100644
--- a/etc/profile-m-z/mov-cli.profile
+++ b/etc/profile-m-z/mov-cli.profile
@@ -8,9 +8,13 @@ include mov-cli.local
8# added by included profile 8# added by included profile
9#include globals.local 9#include globals.local
10 10
11noblacklist ${HOME}/.config/mov-cli
12
11include disable-proc.inc 13include disable-proc.inc
12include disable-xdg.inc 14include disable-xdg.inc
13 15
16mkdir ${HOME}/.config/mov-cli
17whitelist ${HOME}/.config/mov-cli
14include whitelist-run-common.inc 18include whitelist-run-common.inc
15include whitelist-runuser-common.inc 19include whitelist-runuser-common.inc
16 20
diff --git a/etc/profile-m-z/mpv.profile b/etc/profile-m-z/mpv.profile
index bd01d4082..fd35483be 100644
--- a/etc/profile-m-z/mpv.profile
+++ b/etc/profile-m-z/mpv.profile
@@ -9,7 +9,7 @@ include globals.local
9 9
10# In order to save screenshots to a persistent location, 10# In order to save screenshots to a persistent location,
11# edit ~/.config/mpv/foobar.conf: 11# edit ~/.config/mpv/foobar.conf:
12# screenshot-directory=~/Pictures 12# screenshot-directory=~/Pictures
13 13
14# mpv has a powerful Lua API and some of the Lua scripts interact with 14# mpv has a powerful Lua API and some of the Lua scripts interact with
15# external resources which are blocked by firejail. In such cases you need to 15# external resources which are blocked by firejail. In such cases you need to
diff --git a/etc/profile-m-z/nodejs-common.profile b/etc/profile-m-z/nodejs-common.profile
index f3b0c8a49..4c463521c 100644
--- a/etc/profile-m-z/nodejs-common.profile
+++ b/etc/profile-m-z/nodejs-common.profile
@@ -7,7 +7,7 @@ include nodejs-common.local
7# added by caller profile 7# added by caller profile
8#include globals.local 8#include globals.local
9 9
10# NOTE: gulp, node-gyp, npm, npx, semver and yarn are all node scripts 10# Note: gulp, node-gyp, npm, npx, semver and yarn are all node scripts
11# using the `#!/usr/bin/env node` shebang. By sandboxing node the full 11# using the `#!/usr/bin/env node` shebang. By sandboxing node the full
12# node.js stack will be firejailed. The only exception is nvm, which is implemented 12# node.js stack will be firejailed. The only exception is nvm, which is implemented
13# as a sourced shell function, not an executable binary. Hence it is not 13# as a sourced shell function, not an executable binary. Hence it is not
diff --git a/etc/profile-m-z/noprofile.profile b/etc/profile-m-z/noprofile.profile
index db4113f94..7d0e01d98 100644
--- a/etc/profile-m-z/noprofile.profile
+++ b/etc/profile-m-z/noprofile.profile
@@ -1,17 +1,16 @@
1# This is the weakest possible firejail profile. 1# This is the weakest possible firejail profile.
2# If a program still fail with this profile, it is incompatible with firejail. 2# If a program still fails with this profile, it is incompatible with firejail.
3# (from https://gist.github.com/rusty-snake/bb234cb3e50e1e4e7429f29a7931cc72) 3# (from https://gist.github.com/rusty-snake/bb234cb3e50e1e4e7429f29a7931cc72)
4# 4#
5# Usage: 5# Usage:
6# 1. download 6# $ firejail --profile=noprofile.profile /path/to/program
7# 2. firejail --profile=noprofile.profile /path/to/program
8 7
9# Keep in mind that even with this profile some things are done 8# Keep in mind that even with this profile some things are done
10# which can break the program. 9# which can break the program:
11# - some env-vars are cleared 10# - some env-vars are cleared;
12# - /etc/firejail/firejail.config can contain options such as 'force-nonewprivs yes' 11# - /etc/firejail/firejail.config can contain options such as 'force-nonewprivs yes';
13# - a new private pid-namespace is created 12# - a new private pid-namespace is created;
14# - a minimal hardcoded blacklist is applied 13# - a minimal hardcoded blacklist is applied;
15# - ... 14# - ...
16 15
17noblacklist /sys/fs 16noblacklist /sys/fs
diff --git a/etc/profile-m-z/palemoon.profile b/etc/profile-m-z/palemoon.profile
index 24701b657..ab4e24595 100644
--- a/etc/profile-m-z/palemoon.profile
+++ b/etc/profile-m-z/palemoon.profile
@@ -12,6 +12,8 @@ mkdir ${HOME}/.cache/moonchild productions/pale moon
12mkdir ${HOME}/.moonchild productions 12mkdir ${HOME}/.moonchild productions
13whitelist ${HOME}/.cache/moonchild productions/pale moon 13whitelist ${HOME}/.cache/moonchild productions/pale moon
14whitelist ${HOME}/.moonchild productions 14whitelist ${HOME}/.moonchild productions
15whitelist /usr/share/moonchild productions
16whitelist /usr/share/palemoon
15 17
16# Palemoon can use the full firejail seccomp filter (unlike firefox >= 60) 18# Palemoon can use the full firejail seccomp filter (unlike firefox >= 60)
17seccomp 19seccomp
diff --git a/etc/profile-m-z/pingus.profile b/etc/profile-m-z/pingus.profile
index 3ff033e0b..e274b6443 100644
--- a/etc/profile-m-z/pingus.profile
+++ b/etc/profile-m-z/pingus.profile
@@ -23,8 +23,9 @@ include disable-xdg.inc
23 23
24mkdir ${HOME}/.pingus 24mkdir ${HOME}/.pingus
25whitelist ${HOME}/.pingus 25whitelist ${HOME}/.pingus
26# Debian keeps games data under /usr/share/games
27whitelist /usr/share/games/pingus
26whitelist /usr/share/pingus 28whitelist /usr/share/pingus
27whitelist /usr/share/games/pingus # Debian keeps games data under /usr/share/games
28include whitelist-common.inc 29include whitelist-common.inc
29include whitelist-runuser-common.inc 30include whitelist-runuser-common.inc
30include whitelist-usr-share-common.inc 31include whitelist-usr-share-common.inc
diff --git a/etc/profile-m-z/rtin.profile b/etc/profile-m-z/rtin.profile
index 87aa69bcb..b1acf8b2e 100644
--- a/etc/profile-m-z/rtin.profile
+++ b/etc/profile-m-z/rtin.profile
@@ -1,6 +1,6 @@
1# Firejail profile for rtin 1# Firejail profile for rtin
2# Description: ncurses-based Usenet newsreader 2# Description: ncurses-based Usenet newsreader
3# symlink to tin, same as `tin -r` 3# symlink to tin, same as `tin -r`
4# This file is overwritten after every install/update 4# This file is overwritten after every install/update
5# Persistent local customizations 5# Persistent local customizations
6include rtin.local 6include rtin.local
diff --git a/etc/profile-m-z/signal-desktop.profile b/etc/profile-m-z/signal-desktop.profile
index 3e1899ef3..8cb4e4173 100644
--- a/etc/profile-m-z/signal-desktop.profile
+++ b/etc/profile-m-z/signal-desktop.profile
@@ -11,7 +11,9 @@ ignore noexec /tmp
11 11
12noblacklist ${HOME}/.config/Signal 12noblacklist ${HOME}/.config/Signal
13 13
14# These lines are needed to allow Firefox to open links 14# The lines below are needed to find the default Firefox profile name, to allow
15# opening links in an existing instance of Firefox (note that it still fails if
16# there isn't a Firefox instance running with the default profile; see #5352)
15noblacklist ${HOME}/.mozilla 17noblacklist ${HOME}/.mozilla
16whitelist ${HOME}/.mozilla/firefox/profiles.ini 18whitelist ${HOME}/.mozilla/firefox/profiles.ini
17 19
@@ -21,11 +23,9 @@ whitelist ${HOME}/.config/Signal
21private-etc @tls-ca 23private-etc @tls-ca
22 24
23dbus-user filter 25dbus-user filter
24
25# allow D-Bus notifications 26# allow D-Bus notifications
26dbus-user.talk org.freedesktop.Notifications 27dbus-user.talk org.freedesktop.Notifications
27 28# allow D-Bus communication with firefox for opening links
28# allow D-Bus communication with Firefox browsers for opening links
29dbus-user.talk org.mozilla.* 29dbus-user.talk org.mozilla.*
30 30
31ignore dbus-user none 31ignore dbus-user none
diff --git a/etc/profile-m-z/sniffnet.profile b/etc/profile-m-z/sniffnet.profile
new file mode 100644
index 000000000..eb18c1f01
--- /dev/null
+++ b/etc/profile-m-z/sniffnet.profile
@@ -0,0 +1,49 @@
1# Firejail profile for sniffnet
2# Description: Network traffic monitor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include sniffnet.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/sniffnet
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-proc.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19include whitelist-common.inc
20include whitelist-run-common.inc
21include whitelist-runuser-common.inc
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24
25apparmor
26#caps.drop all
27caps.keep net_admin,net_raw
28netfilter
29nodvd
30nogroups
31noinput
32# nonewprivs - breaks network traffic capture for unprivileged users
33# noroot
34notv
35nou2f
36novideo
37#seccomp
38tracelog
39
40disable-mnt
41#private-bin sniffnet
42# private-dev prevents (some) interfaces from being shown.
43private-etc @network,@tls-ca
44private-tmp
45
46dbus-user none
47dbus-system none
48
49#restrict-namespaces
diff --git a/etc/profile-m-z/spotify.profile b/etc/profile-m-z/spotify.profile
index f07b10319..c893a92fb 100644
--- a/etc/profile-m-z/spotify.profile
+++ b/etc/profile-m-z/spotify.profile
@@ -16,6 +16,7 @@ include disable-common.inc
16include disable-devel.inc 16include disable-devel.inc
17include disable-exec.inc 17include disable-exec.inc
18include disable-interpreters.inc 18include disable-interpreters.inc
19include disable-proc.inc
19include disable-programs.inc 20include disable-programs.inc
20 21
21mkdir ${HOME}/.cache/spotify 22mkdir ${HOME}/.cache/spotify
@@ -34,6 +35,7 @@ nodvd
34nogroups 35nogroups
35noinput 36noinput
36nonewprivs 37nonewprivs
38noprinters
37noroot 39noroot
38notv 40notv
39nou2f 41nou2f
@@ -50,8 +52,11 @@ private-opt spotify
50private-srv none 52private-srv none
51private-tmp 53private-tmp
52 54
53# dbus needed for MPRIS 55dbus-user filter
54# dbus-user none 56dbus-user.own org.mpris.MediaPlayer2.spotify
55# dbus-system none 57dbus-user.talk org.freedesktop.Notifications
58dbus-user.talk org.freedesktop.secrets
59dbus-user.talk org.mpris.MediaPlayer2.Player
60dbus-system none
56 61
57restrict-namespaces 62restrict-namespaces
diff --git a/etc/profile-m-z/steam.profile b/etc/profile-m-z/steam.profile
index 63d629a32..99317c9dc 100644
--- a/etc/profile-m-z/steam.profile
+++ b/etc/profile-m-z/steam.profile
@@ -133,9 +133,9 @@ whitelist ${HOME}/.steampid
133include whitelist-common.inc 133include whitelist-common.inc
134include whitelist-var-common.inc 134include whitelist-var-common.inc
135 135
136# NOTE: The following were intentionally left out as they are alternative 136# Note: The following were intentionally left out as they are alternative
137# (i.e.: unnecessary and/or legacy) paths whose existence may potentially 137# (i.e.: unnecessary and/or legacy) paths whose existence may potentially
138# clobber other paths (see #4225). If you use any, either add the entry to 138# clobber other paths (see #4225). If you use any, either add the entry to
139# steam.local or move the contents to a path listed above (or open an issue if 139# steam.local or move the contents to a path listed above (or open an issue if
140# it's missing above). 140# it's missing above).
141#mkdir ${HOME}/.config/RogueLegacyStorageContainer 141#mkdir ${HOME}/.config/RogueLegacyStorageContainer
diff --git a/etc/profile-m-z/thunderbird.profile b/etc/profile-m-z/thunderbird.profile
index 5df207e25..f2405a7d3 100644
--- a/etc/profile-m-z/thunderbird.profile
+++ b/etc/profile-m-z/thunderbird.profile
@@ -47,10 +47,7 @@ whitelist ${HOME}/.thunderbird
47 47
48whitelist /usr/share/gnupg 48whitelist /usr/share/gnupg
49whitelist /usr/share/gnupg2 49whitelist /usr/share/gnupg2
50whitelist /usr/share/mozilla
51whitelist /usr/share/thunderbird 50whitelist /usr/share/thunderbird
52whitelist /usr/share/webext
53include whitelist-usr-share-common.inc
54 51
55# machine-id breaks audio in browsers; enable or put it in your thunderbird.local when sound is not required 52# machine-id breaks audio in browsers; enable or put it in your thunderbird.local when sound is not required
56#machine-id 53#machine-id
diff --git a/etc/profile-m-z/tin.profile b/etc/profile-m-z/tin.profile
index a03a6caa0..35ff14e88 100644
--- a/etc/profile-m-z/tin.profile
+++ b/etc/profile-m-z/tin.profile
@@ -24,8 +24,8 @@ include disable-xdg.inc
24mkdir ${HOME}/.tin 24mkdir ${HOME}/.tin
25mkfile ${HOME}/.newsrc 25mkfile ${HOME}/.newsrc
26# Note: files/directories directly in ${HOME} can't be whitelisted, as 26# Note: files/directories directly in ${HOME} can't be whitelisted, as
27# tin saves .newsrc by renaming a temporary file, which is not possible for 27# tin saves .newsrc by renaming a temporary file, which is not possible for
28# bind-mounted files. 28# bind-mounted files.
29#whitelist ${HOME}/.newsrc 29#whitelist ${HOME}/.newsrc
30#whitelist ${HOME}/.tin 30#whitelist ${HOME}/.tin
31#include whitelist-common.inc 31#include whitelist-common.inc
diff --git a/etc/profile-m-z/trojita.profile b/etc/profile-m-z/trojita.profile
index ba68ccb53..2578eb0be 100644
--- a/etc/profile-m-z/trojita.profile
+++ b/etc/profile-m-z/trojita.profile
@@ -7,7 +7,6 @@ include trojita.local
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.abook 9noblacklist ${HOME}/.abook
10noblacklist ${HOME}/.mozilla
11noblacklist ${HOME}/.cache/flaska.net/trojita 10noblacklist ${HOME}/.cache/flaska.net/trojita
12noblacklist ${HOME}/.config/flaska.net 11noblacklist ${HOME}/.config/flaska.net
13 12
@@ -19,11 +18,16 @@ include disable-programs.inc
19include disable-shell.inc 18include disable-shell.inc
20include disable-xdg.inc 19include disable-xdg.inc
21 20
21# The lines below are needed to find the default Firefox profile name, to allow
22# opening links in an existing instance of Firefox (note that it still fails if
23# there isn't a Firefox instance running with the default profile; see #5352)
24noblacklist ${HOME}/.mozilla
25whitelist ${HOME}/.mozilla/firefox/profiles.ini
26
22mkdir ${HOME}/.abook 27mkdir ${HOME}/.abook
23mkdir ${HOME}/.cache/flaska.net/trojita 28mkdir ${HOME}/.cache/flaska.net/trojita
24mkdir ${HOME}/.config/flaska.net 29mkdir ${HOME}/.config/flaska.net
25whitelist ${HOME}/.abook 30whitelist ${HOME}/.abook
26whitelist ${HOME}/.mozilla/firefox/profiles.ini
27whitelist ${HOME}/.cache/flaska.net/trojita 31whitelist ${HOME}/.cache/flaska.net/trojita
28whitelist ${HOME}/.config/flaska.net 32whitelist ${HOME}/.config/flaska.net
29include whitelist-common.inc 33include whitelist-common.inc
@@ -49,7 +53,6 @@ seccomp
49tracelog 53tracelog
50 54
51# disable-mnt 55# disable-mnt
52# Add "ignore private-bin" for hyperlinks or have a look at the private-bins in firefox.profile and firefox-common.profile.
53private-bin trojita 56private-bin trojita
54private-cache 57private-cache
55private-dev 58private-dev
@@ -58,6 +61,8 @@ private-tmp
58 61
59dbus-user filter 62dbus-user filter
60dbus-user.talk org.freedesktop.secrets 63dbus-user.talk org.freedesktop.secrets
64# allow D-Bus communication with firefox for opening links
65dbus-user.talk org.mozilla.*
61dbus-system none 66dbus-system none
62 67
63restrict-namespaces 68restrict-namespaces
diff --git a/etc/profile-m-z/waterfox.profile b/etc/profile-m-z/waterfox.profile
index 18f1ca79a..bf6f45e41 100644
--- a/etc/profile-m-z/waterfox.profile
+++ b/etc/profile-m-z/waterfox.profile
@@ -12,6 +12,7 @@ mkdir ${HOME}/.cache/waterfox
12mkdir ${HOME}/.waterfox 12mkdir ${HOME}/.waterfox
13whitelist ${HOME}/.cache/waterfox 13whitelist ${HOME}/.cache/waterfox
14whitelist ${HOME}/.waterfox 14whitelist ${HOME}/.waterfox
15whitelist /usr/share/waterfox
15 16
16# Add the next lines to your watefox.local if you want to use the migration wizard. 17# Add the next lines to your watefox.local if you want to use the migration wizard.
17#noblacklist ${HOME}/.mozilla 18#noblacklist ${HOME}/.mozilla
diff --git a/src/firecfg/firecfg.config b/src/firecfg/firecfg.config
index 8a8833968..ce69738eb 100644
--- a/src/firecfg/firecfg.config
+++ b/src/firecfg/firecfg.config
@@ -774,6 +774,7 @@ slashem
774smplayer 774smplayer
775smtube 775smtube
776smuxi-frontend-gnome 776smuxi-frontend-gnome
777sniffnet
777snox 778snox
778soffice 779soffice
779sol 780sol