aboutsummaryrefslogtreecommitdiffstats
path: root/etc/profile-a-l/anki.profile
diff options
context:
space:
mode:
authorLibravatar smitsohu <smitsohu@gmail.com>2021-07-24 15:31:40 +0200
committerLibravatar smitsohu <smitsohu@gmail.com>2021-07-24 15:31:40 +0200
commit1ba2024d8a833eaf93436218fb25943600f303bc (patch)
treeb247db3bde21484c4ce9f5e85db655d9b32c8286 /etc/profile-a-l/anki.profile
parentorganize program startup (diff)
parentComplete 42a03511d0877690276da83bf548635d7e8ca693 (diff)
downloadfirejail-1ba2024d8a833eaf93436218fb25943600f303bc.tar.gz
firejail-1ba2024d8a833eaf93436218fb25943600f303bc.tar.zst
firejail-1ba2024d8a833eaf93436218fb25943600f303bc.zip
Merge branch 'master' of https://github.com/netblue30/firejail
Diffstat (limited to 'etc/profile-a-l/anki.profile')
-rw-r--r--etc/profile-a-l/anki.profile9
1 files changed, 4 insertions, 5 deletions
diff --git a/etc/profile-a-l/anki.profile b/etc/profile-a-l/anki.profile
index ef60e91c2..c1aa18ff3 100644
--- a/etc/profile-a-l/anki.profile
+++ b/etc/profile-a-l/anki.profile
@@ -6,8 +6,8 @@ include anki.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9noblacklist ${DOCUMENTS} 9nodeny ${DOCUMENTS}
10noblacklist ${HOME}/.local/share/Anki2 10nodeny ${HOME}/.local/share/Anki2
11 11
12# Allow python (blacklisted by disable-interpreters.inc) 12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc 13include allow-python2.inc
@@ -23,8 +23,8 @@ include disable-shell.inc
23include disable-xdg.inc 23include disable-xdg.inc
24 24
25mkdir ${HOME}/.local/share/Anki2 25mkdir ${HOME}/.local/share/Anki2
26whitelist ${DOCUMENTS} 26allow ${DOCUMENTS}
27whitelist ${HOME}/.local/share/Anki2 27allow ${HOME}/.local/share/Anki2
28include whitelist-common.inc 28include whitelist-common.inc
29include whitelist-var-common.inc 29include whitelist-var-common.inc
30 30
@@ -46,7 +46,6 @@ protocol unix,inet,inet6
46# QtWebengine needs chroot to set up its own sandbox 46# QtWebengine needs chroot to set up its own sandbox
47seccomp !chroot 47seccomp !chroot
48shell none 48shell none
49tracelog
50 49
51disable-mnt 50disable-mnt
52private-bin anki,python* 51private-bin anki,python*