aboutsummaryrefslogtreecommitdiffstats
path: root/contrib
diff options
context:
space:
mode:
authorLibravatar rusty-snake <41237666+rusty-snake@users.noreply.github.com>2020-12-12 09:58:56 +0100
committerLibravatar rusty-snake <41237666+rusty-snake@users.noreply.github.com>2020-12-12 09:58:56 +0100
commitffa82e068fd7b77fd7fec733d899f53b8b33c532 (patch)
tree625b639e8fd420f3a4ee7956d9469919eab15303 /contrib
parentCreate firejail-welcome.s (diff)
downloadfirejail-ffa82e068fd7b77fd7fec733d899f53b8b33c532.tar.gz
firejail-ffa82e068fd7b77fd7fec733d899f53b8b33c532.tar.zst
firejail-ffa82e068fd7b77fd7fec733d899f53b8b33c532.zip
Update firejail-welcome.sh
typos, spelling and other fixes. thanks @reinerh for all these
Diffstat (limited to 'contrib')
-rwxr-xr-xcontrib/firejail-welcome.sh31
1 files changed, 20 insertions, 11 deletions
diff --git a/contrib/firejail-welcome.sh b/contrib/firejail-welcome.sh
index 21425562d..2943983e5 100755
--- a/contrib/firejail-welcome.sh
+++ b/contrib/firejail-welcome.sh
@@ -1,9 +1,18 @@
1#!/bin/bash 1#!/bin/bash
2 2
3# This file is part of Firejail project 3# This file is part of Firejail project
4# Copyright (C) 2014-2020 Firejail Authors 4# Copyright (C) 2020 Firejail Authors
5# License GPL v2 5# License GPL v2
6 6
7if ! command -v zenity >/dev/null; then
8 echo "Please install zenity."
9 exit 1
10fi
11if ! command -v sudo >/dev/null; then
12 echo "Please install sudo."
13 exit 1
14fi
15
7export LANG=en_US.UTF8 16export LANG=en_US.UTF8
8 17
9zenity --title=firejail-welcome.sh --text-info --width=750 --height=500 <<EOM 18zenity --title=firejail-welcome.sh --text-info --width=750 --height=500 <<EOM
@@ -12,14 +21,14 @@ Welcome to firejail!
12This is a quick setup guide for newbies. 21This is a quick setup guide for newbies.
13 22
14Profiles for programs can be found in /etc/firejail. Own customizations should go in a file named 23Profiles for programs can be found in /etc/firejail. Own customizations should go in a file named
15<proile-name>.local in ~/.config/firejal. 24<profile-name>.local in ~/.config/firejal.
16 25
17Firejails own configuration can be found at /etc/firejail/firejail.config. 26Firejail's own configuration can be found at /etc/firejail/firejail.config.
18 27
19Please note that running this script a second time can set new options, but does not unset options 28Please note that running this script a second time can set new options, but does not unset options
20set in a previous run. 29set in a previous run.
21 30
22Webiste: https://firejail.wordpress.com 31Website: https://firejail.wordpress.com
23Bug-Tracker: https://github.com/netblue30/firejail/issues 32Bug-Tracker: https://github.com/netblue30/firejail/issues
24Documentation: 33Documentation:
25- https://github.com/netblue30/firejail/wiki 34- https://github.com/netblue30/firejail/wiki
@@ -27,7 +36,7 @@ Documentation:
27- https://firejail.wordpress.com/documentation-2 36- https://firejail.wordpress.com/documentation-2
28- man:firejail(1) and man:firejail-profile(5) 37- man:firejail(1) and man:firejail-profile(5)
29 38
30PS: If you have any improvements for this script, open a issues or pull request. 39PS: If you have any improvements for this script, open an issue or pull request.
31EOM 40EOM
32[[ $? -eq 1 ]] && exit 0 41[[ $? -eq 1 ]] && exit 0
33 42
@@ -40,14 +49,14 @@ EOM
40read -r -d $'\0' MSG_Q_BROWSER_ALLOW_DRM <<EOM 49read -r -d $'\0' MSG_Q_BROWSER_ALLOW_DRM <<EOM
41<big><b>Should browsers be able to play DRM content?</b></big> 50<big><b>Should browsers be able to play DRM content?</b></big>
42 51
43\$HOME is noexec,nodev,nosuid by default for the most sandboxes. This means that executing ELFs which are located in \$HOME, 52\$HOME is noexec,nodev,nosuid by default for the most sandboxes. This means that executing programs which are located in \$HOME,
44is forbidden, the setuid attribute on files is ignored and device files inside \$HOME don't work. Browsers install proprietary 53is forbidden, the setuid attribute on files is ignored and device files inside \$HOME don't work. Browsers install proprietary
45DRM plug-ins such as Widevine under \$HOME by default. In order to use them, \$HOME must be mounted exec inside the sandbox to 54DRM plug-ins such as Widevine under \$HOME by default. In order to use them, \$HOME must be mounted exec inside the sandbox to
46allow there execution. Clearly, this may help an attacker to start malicious code. 55allow their execution. Clearly, this may help an attacker to start malicious code.
47 56
48NOTE: Other software written in an interpreter language such as bash, python or java can always started from \$HOME. 57NOTE: Other software written in an interpreter language such as bash, python or java can always be started from \$HOME.
49 58
50TIPP: If <tt>/home</tt> has its own partition, you can mount it <tt>nodev,nosuid</tt> for all programs. 59HINT: If <tt>/home</tt> has its own partition, you can mount it <tt>nodev,nosuid</tt> for all programs.
51EOM 60EOM
52 61
53read -r -d $'\0' MSG_L_ADVANCED_OPTIONS <<EOM 62read -r -d $'\0' MSG_L_ADVANCED_OPTIONS <<EOM
@@ -55,11 +64,11 @@ You maybe want to set some of these advanced options.
55EOM 64EOM
56 65
57read -r -d $'\0' MSG_Q_RUN_FIRECFG <<EOM 66read -r -d $'\0' MSG_Q_RUN_FIRECFG <<EOM
58<big><b>Should the most programs started in firejail by default?</b></big> 67<big><b>Should most programs be started in firejail by default?</b></big>
59EOM 68EOM
60 69
61read -r -d $'\0' MSG_I_ROOT_REQUIRED <<EOM 70read -r -d $'\0' MSG_I_ROOT_REQUIRED <<EOM
62In order to apply these changes, root right are required. 71In order to apply these changes, root privileges are required.
63You will now be asked to enter your password. 72You will now be asked to enter your password.
64EOM 73EOM
65 74