aboutsummaryrefslogtreecommitdiffstats
path: root/etc/caja.profile
diff options
context:
space:
mode:
authorLibravatar Tad <tad@spotco.us>2017-08-07 01:22:08 -0400
committerLibravatar Tad <tad@spotco.us>2017-08-07 01:22:08 -0400
commit9e3ba319be6b9546d7e8f450ca419ee2f3f4040b (patch)
tree0aebe82de78a61877c267f4dcb2ebcc13a2e37c9 /etc/caja.profile
parentvarious profile fixes (#1433) (diff)
downloadfirejail-9e3ba319be6b9546d7e8f450ca419ee2f3f4040b.tar.gz
firejail-9e3ba319be6b9546d7e8f450ca419ee2f3f4040b.tar.zst
firejail-9e3ba319be6b9546d7e8f450ca419ee2f3f4040b.zip
Unify all profiles
Diffstat (limited to 'etc/caja.profile')
-rw-r--r--etc/caja.profile27
1 files changed, 13 insertions, 14 deletions
diff --git a/etc/caja.profile b/etc/caja.profile
index a724e76b1..adbcc09b9 100644
--- a/etc/caja.profile
+++ b/etc/caja.profile
@@ -1,24 +1,18 @@
1# Persistent global definitions go here 1# Firejail profile for caja
2include /etc/firejail/globals.local 2# This file is overwritten after every install/update
3 3# Persistent local customizations
4# This file is overwritten during software install.
5# Persistent customizations should go in a .local file.
6include /etc/firejail/caja.local 4include /etc/firejail/caja.local
7 5# Persistent global definitions
8# Caja profile for Firejail 6include /etc/firejail/globals.local
9
10# Caja is started by systemd on most systems. Therefore it is not firejailed by default. Since there
11# is already a caja process running on MATE desktops firejail will have no effect.
12 7
13noblacklist ~/.config/caja 8noblacklist ~/.config/caja
14noblacklist ~/.local/share/caja-python
15noblacklist ~/.local/share/Trash 9noblacklist ~/.local/share/Trash
10noblacklist ~/.local/share/caja-python
16 11
17include /etc/firejail/disable-common.inc 12include /etc/firejail/disable-common.inc
18# caja needs to be able to start arbitrary applications so we cannot blacklist their files
19#include /etc/firejail/disable-programs.inc
20include /etc/firejail/disable-devel.inc 13include /etc/firejail/disable-devel.inc
21include /etc/firejail/disable-passwdmgr.inc 14include /etc/firejail/disable-passwdmgr.inc
15# include /etc/firejail/disable-programs.inc
22 16
23caps.drop all 17caps.drop all
24netfilter 18netfilter
@@ -31,6 +25,11 @@ shell none
31tracelog 25tracelog
32 26
33# private-bin caja 27# private-bin caja
34# private-tmp
35# private-dev 28# private-dev
36# private-etc fonts 29# private-etc fonts
30# private-tmp
31
32# CLOBBERED COMMENTS
33# Caja is started by systemd on most systems. Therefore it is not firejailed by default. Since there
34# caja needs to be able to start arbitrary applications so we cannot blacklist their files
35# is already a caja process running on MATE desktops firejail will have no effect.