summaryrefslogtreecommitdiffstats
path: root/etc/knotes.profile
diff options
context:
space:
mode:
authorLibravatar smitsohu <smitsohu@gmail.com>2018-03-24 17:00:18 +0100
committerLibravatar smitsohu <smitsohu@gmail.com>2018-03-24 17:00:18 +0100
commitecbf5ddb450ba0ad86d9a892e9bc14d52ad86fa4 (patch)
tree7670af2ab2133a5d2a90ae8321d4eced1e8b9395 /etc/knotes.profile
parentharden openbox profile (diff)
downloadfirejail-ecbf5ddb450ba0ad86d9a892e9bc14d52ad86fa4.tar.gz
firejail-ecbf5ddb450ba0ad86d9a892e9bc14d52ad86fa4.tar.zst
firejail-ecbf5ddb450ba0ad86d9a892e9bc14d52ad86fa4.zip
add basic akonadi integration
as it is now, there is no support for a full akonadi session inside the knotes sandbox, but knotes can connect to akonadi and should work fine
Diffstat (limited to 'etc/knotes.profile')
-rw-r--r--etc/knotes.profile10
1 files changed, 8 insertions, 2 deletions
diff --git a/etc/knotes.profile b/etc/knotes.profile
index 94ada7855..091c3a8e5 100644
--- a/etc/knotes.profile
+++ b/etc/knotes.profile
@@ -5,10 +5,12 @@ include /etc/firejail/knotes.local
5# Persistent global definitions 5# Persistent global definitions
6include /etc/firejail/globals.local 6include /etc/firejail/globals.local
7 7
8noblacklist ${HOME}/.config/akonadi*
8noblacklist ${HOME}/.config/knotesrc 9noblacklist ${HOME}/.config/knotesrc
10noblacklist ${HOME}/.local/share/akonadi/*
9 11
10include /etc/firejail/disable-common.inc 12include /etc/firejail/disable-common.inc
11# include /etc/firejail/disable-devel.inc 13include /etc/firejail/disable-devel.inc
12include /etc/firejail/disable-passwdmgr.inc 14include /etc/firejail/disable-passwdmgr.inc
13include /etc/firejail/disable-programs.inc 15include /etc/firejail/disable-programs.inc
14 16
@@ -22,10 +24,14 @@ nonewprivs
22noroot 24noroot
23nosound 25nosound
24notv 26notv
27novideo
25protocol unix 28protocol unix
26seccomp 29seccomp
27shell none 30shell none
28tracelog 31tracelog
29 32
30private-dev 33private-dev
31#private-tmp - problems on kubuntu 17.04 34# private-tmp - interrupts connection to akonadi
35
36noexec ${HOME}
37noexec /tmp