aboutsummaryrefslogtreecommitdiffstats
path: root/etc/flashpeak-slimjet.profile
diff options
context:
space:
mode:
authorLibravatar SkewedZeppelin <8296104+SkewedZeppelin@users.noreply.github.com>2018-02-12 22:37:05 -0500
committerLibravatar GitHub <noreply@github.com>2018-02-12 22:37:05 -0500
commit22c9c5c7fd4ca6f8090ede7f4c8859a148db1cce (patch)
tree20ff230c2d28d311441c83c7d5cca910f130b287 /etc/flashpeak-slimjet.profile
parentupdate various application blacklists (diff)
parentFurther unify private-etc in Firefox-based browsers (diff)
downloadfirejail-22c9c5c7fd4ca6f8090ede7f4c8859a148db1cce.tar.gz
firejail-22c9c5c7fd4ca6f8090ede7f4c8859a148db1cce.tar.zst
firejail-22c9c5c7fd4ca6f8090ede7f4c8859a148db1cce.zip
Merge pull request #1774 from SkewedZeppelin/1773
Unify all Chromium and Firefox based browser profiles
Diffstat (limited to 'etc/flashpeak-slimjet.profile')
-rw-r--r--etc/flashpeak-slimjet.profile26
1 files changed, 2 insertions, 24 deletions
diff --git a/etc/flashpeak-slimjet.profile b/etc/flashpeak-slimjet.profile
index d9be8b9c5..63f9d19a9 100644
--- a/etc/flashpeak-slimjet.profile
+++ b/etc/flashpeak-slimjet.profile
@@ -5,35 +5,13 @@ include /etc/firejail/flashpeak-slimjet.local
5# Persistent global definitions 5# Persistent global definitions
6include /etc/firejail/globals.local 6include /etc/firejail/globals.local
7 7
8# This is a whitelisted profile, the internal browser sandbox
9# is disabled because it requires sudo password. The command
10# to run it is as follows:
11# firejail flashpeak-slimjet --no-sandbox
12
13noblacklist ${HOME}/.cache/slimjet 8noblacklist ${HOME}/.cache/slimjet
14noblacklist ${HOME}/.config/slimjet 9noblacklist ${HOME}/.config/slimjet
15noblacklist ${HOME}/.pki
16
17include /etc/firejail/disable-common.inc
18include /etc/firejail/disable-devel.inc
19include /etc/firejail/disable-programs.inc
20 10
21mkdir ${HOME}/.cache/slimjet 11mkdir ${HOME}/.cache/slimjet
22mkdir ${HOME}/.config/slimjet 12mkdir ${HOME}/.config/slimjet
23mkdir ${HOME}/.pki
24whitelist ${DOWNLOADS}
25whitelist ${HOME}/.cache/slimjet 13whitelist ${HOME}/.cache/slimjet
26whitelist ${HOME}/.config/slimjet 14whitelist ${HOME}/.config/slimjet
27whitelist ${HOME}/.pki
28include /etc/firejail/whitelist-common.inc
29
30caps.drop all
31netfilter
32nodvd
33nonewprivs
34noroot
35notv
36protocol unix,inet,inet6,netlink
37seccomp
38 15
39disable-mnt 16# Redirect
17include /etc/firejail/chromium-common.profile