aboutsummaryrefslogtreecommitdiffstats
path: root/etc/kmail.profile
diff options
context:
space:
mode:
authorLibravatar smitsohu <smitsohu@gmail.com>2018-03-24 17:00:18 +0100
committerLibravatar smitsohu <smitsohu@gmail.com>2018-03-24 17:00:18 +0100
commitecbf5ddb450ba0ad86d9a892e9bc14d52ad86fa4 (patch)
tree7670af2ab2133a5d2a90ae8321d4eced1e8b9395 /etc/kmail.profile
parentharden openbox profile (diff)
downloadfirejail-ecbf5ddb450ba0ad86d9a892e9bc14d52ad86fa4.tar.gz
firejail-ecbf5ddb450ba0ad86d9a892e9bc14d52ad86fa4.tar.zst
firejail-ecbf5ddb450ba0ad86d9a892e9bc14d52ad86fa4.zip
add basic akonadi integration
as it is now, there is no support for a full akonadi session inside the knotes sandbox, but knotes can connect to akonadi and should work fine
Diffstat (limited to 'etc/kmail.profile')
-rw-r--r--etc/kmail.profile21
1 files changed, 18 insertions, 3 deletions
diff --git a/etc/kmail.profile b/etc/kmail.profile
index ca774f4ec..1b3255d61 100644
--- a/etc/kmail.profile
+++ b/etc/kmail.profile
@@ -5,6 +5,18 @@ include /etc/firejail/kmail.local
5# Persistent global definitions 5# Persistent global definitions
6include /etc/firejail/globals.local 6include /etc/firejail/globals.local
7 7
8# akonadi with mysql backend fails to run inside this sandbox
9# and should be started in advance
10
11noblacklist ${HOME}/.cache/akonadi*
12noblacklist ${HOME}/.config/akonadi*
13noblacklist ${HOME}/.config/baloorc
14noblacklist ${HOME}/.config/emailidentities
15noblacklist ${HOME}/.config/kmail2rc
16noblacklist ${HOME}/.local/share/akonadi/*
17noblacklist ${HOME}/.local/share/contacts
18noblacklist ${HOME}/.local/share/kmail2
19noblacklist ${HOME}/.local/share/local-mail
8noblacklist ${HOME}/.gnupg 20noblacklist ${HOME}/.gnupg
9 21
10include /etc/firejail/disable-common.inc 22include /etc/firejail/disable-common.inc
@@ -22,11 +34,14 @@ nosound
22notv 34notv
23novideo 35novideo
24protocol unix,inet,inet6,netlink 36protocol unix,inet,inet6,netlink
25# blacklisting of chroot system calls breaks kmail 37# we need to allow chroot and ioprio_set system calls
26seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice 38seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice
27# tracelog 39# tracelog
28# writable-run-user is needed for signing and encrypting emails 40# writable-run-user is needed for signing and encrypting emails
29writable-run-user 41writable-run-user
30 42
31private-dev 43private-dev
32# private-tmp - breaks akonadi and opening of email attachments 44# private-tmp - interrupts connection to akonadi, breaks opening of email attachments
45
46noexec ${HOME}
47noexec /tmp