diff options
author | smitsohu <smitsohu@gmail.com> | 2018-03-26 18:59:29 +0200 |
---|---|---|
committer | smitsohu <smitsohu@gmail.com> | 2018-03-26 18:59:29 +0200 |
commit | 1bc84f3e53f66abf4ee246e89f20f72626a199de (patch) | |
tree | a805f3b7068bbddddaa4efc8dfab3c1d03f0421e /etc/akonadi_control.profile | |
parent | dbus.c (diff) | |
download | firejail-1bc84f3e53f66abf4ee246e89f20f72626a199de.tar.gz firejail-1bc84f3e53f66abf4ee246e89f20f72626a199de.tar.zst firejail-1bc84f3e53f66abf4ee246e89f20f72626a199de.zip |
rework akonadi integration
the usr.sbin.mysqld-akonadi apparmor profile, enforced by default in ubuntu and
debian testing (and probably opensuse), doesn't play well with a number of firejail options.
the reason for this is that once the no_new_privs bit is set, apparmor profile
transitions are forbidden.
enforcing our own apparmor policy instead is also no solution, because
these programs don't even start without d-bus.
relaxing the kmail profile was necessary so that kmail can fire up akonadi itself,
just in case akonadi has not been started earlier already by another program.
this is always an issue when kmail is the only installed akonadi client, but
there may be more circumstances. for reasons outlined above this doesn't help
debian and ubuntu (opensuse?) users though :-/
a brief summary of the seccomp exceptions: chroot is needed for qt webengine,
io_prioset for the akonadi indexing agent, io_getevents, io_submit, io_setup
are needed for mysqld. when akonadi has an sqlite3 backend, less exceptions
to the seccomp filter are necessary, but mysqld is the default.
in the future all kontact suite profiles (itm only kmail, knotes) should
probably be redirections to akonadi_control, but the issues with apparmor
make this somewhat impractical for now (options like 'protocol' couldn't go to
akonadi_control.local any more, if current kmail redirected to there).
Diffstat (limited to 'etc/akonadi_control.profile')
-rw-r--r-- | etc/akonadi_control.profile | 12 |
1 files changed, 8 insertions, 4 deletions
diff --git a/etc/akonadi_control.profile b/etc/akonadi_control.profile index 0443774dd..296b25b83 100644 --- a/etc/akonadi_control.profile +++ b/etc/akonadi_control.profile | |||
@@ -7,9 +7,13 @@ include /etc/firejail/globals.local | |||
7 | noblacklist ${HOME}/.cache/akonadi* | 7 | noblacklist ${HOME}/.cache/akonadi* |
8 | noblacklist ${HOME}/.config/akonadi* | 8 | noblacklist ${HOME}/.config/akonadi* |
9 | noblacklist ${HOME}/.config/baloorc | 9 | noblacklist ${HOME}/.config/baloorc |
10 | noblacklist ${HOME}/.local/share/akonadi/* | 10 | noblacklist ${HOME}/.config/emailidentities |
11 | noblacklist ${HOME}/.config/kmail2rc | ||
12 | noblacklist ${HOME}/.local/share/akonadi* | ||
11 | noblacklist ${HOME}/.local/share/contacts | 13 | noblacklist ${HOME}/.local/share/contacts |
12 | noblacklist ${HOME}/.local/share/local-mail | 14 | noblacklist ${HOME}/.local/share/local-mail |
15 | noblacklist ${HOME}/.local/share/notes | ||
16 | noblacklist /tmp/akonadi-* | ||
13 | noblacklist /usr/sbin | 17 | noblacklist /usr/sbin |
14 | 18 | ||
15 | include /etc/firejail/disable-common.inc | 19 | include /etc/firejail/disable-common.inc |
@@ -19,8 +23,8 @@ include /etc/firejail/disable-programs.inc | |||
19 | 23 | ||
20 | include /etc/firejail/whitelist-var-common.inc | 24 | include /etc/firejail/whitelist-var-common.inc |
21 | 25 | ||
22 | # depending on your setup it might be possible to | 26 | # the default mysqld-akonadi apparmor profile in debian and ubuntu |
23 | # enable some of the commented options below | 27 | # is not compatible with the commented options below |
24 | 28 | ||
25 | # apparmor | 29 | # apparmor |
26 | caps.drop all | 30 | caps.drop all |
@@ -30,7 +34,7 @@ netfilter | |||
30 | nodvd | 34 | nodvd |
31 | nogroups | 35 | nogroups |
32 | # nonewprivs | 36 | # nonewprivs |
33 | # noroot | 37 | noroot |
34 | nosound | 38 | nosound |
35 | notv | 39 | notv |
36 | novideo | 40 | novideo |