diff options
author | Fred Barclay <Fred-Barclay@users.noreply.github.com> | 2020-06-13 12:02:53 -0500 |
---|---|---|
committer | Fred Barclay <Fred-Barclay@users.noreply.github.com> | 2020-06-13 12:05:17 -0500 |
commit | 55906959a9cbf6a9d53273c5bd875174ab1a6d51 (patch) | |
tree | c36b520f3f6846c398e1a6b9947eb9690277063e /etc-fixes/0.9.52/atom.profile | |
parent | Fix #3464 (diff) | |
download | firejail-55906959a9cbf6a9d53273c5bd875174ab1a6d51.tar.gz firejail-55906959a9cbf6a9d53273c5bd875174ab1a6d51.tar.zst firejail-55906959a9cbf6a9d53273c5bd875174ab1a6d51.zip |
More fixes for #3464
Backporting fixes for Atom 1.48 to firejail 0.9.52, 0.9.58, and 0.9.60
Summary:
- remove nonewprivs, noroot, protocol, and seccomp
- update caps filter to keep sys_admin and sys_chroot
Without these changes Atom 1.48 breaks and refuses to start (due to
Electron sandboxing)
Diffstat (limited to 'etc-fixes/0.9.52/atom.profile')
-rw-r--r-- | etc-fixes/0.9.52/atom.profile | 31 |
1 files changed, 31 insertions, 0 deletions
diff --git a/etc-fixes/0.9.52/atom.profile b/etc-fixes/0.9.52/atom.profile new file mode 100644 index 000000000..87ffdced9 --- /dev/null +++ b/etc-fixes/0.9.52/atom.profile | |||
@@ -0,0 +1,31 @@ | |||
1 | # Firejail profile for atom | ||
2 | # This file is overwritten after every install/update | ||
3 | # Persistent local customizations | ||
4 | include /etc/firejail/atom.local | ||
5 | # Persistent global definitions | ||
6 | include /etc/firejail/globals.local | ||
7 | |||
8 | # blacklist /run/user/*/bus | ||
9 | |||
10 | noblacklist ${HOME}/.atom | ||
11 | noblacklist ${HOME}/.config/Atom | ||
12 | |||
13 | include /etc/firejail/disable-common.inc | ||
14 | include /etc/firejail/disable-passwdmgr.inc | ||
15 | include /etc/firejail/disable-programs.inc | ||
16 | |||
17 | caps.keep sys_admin,sys_chroot | ||
18 | # net none | ||
19 | netfilter | ||
20 | nodvd | ||
21 | nogroups | ||
22 | nosound | ||
23 | notv | ||
24 | novideo | ||
25 | shell none | ||
26 | |||
27 | private-dev | ||
28 | private-tmp | ||
29 | |||
30 | noexec ${HOME} | ||
31 | noexec /tmp | ||