aboutsummaryrefslogtreecommitdiffstats
path: root/etc/profile-a-l
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@yahoo.com>2020-04-21 08:24:28 -0400
committerLibravatar netblue30 <netblue30@yahoo.com>2020-04-21 08:24:28 -0400
commit018d75775eab4a0f045949a9d069c57686ca2686 (patch)
treeaac3a1a65cca0d4875795c55109a5c3e35efdefb /etc/profile-a-l
parentsmall fixes (diff)
downloadfirejail-018d75775eab4a0f045949a9d069c57686ca2686.tar.gz
firejail-018d75775eab4a0f045949a9d069c57686ca2686.tar.zst
firejail-018d75775eab4a0f045949a9d069c57686ca2686.zip
reorganize github etc directory
Diffstat (limited to 'etc/profile-a-l')
-rw-r--r--etc/profile-a-l/0ad.profile53
-rw-r--r--etc/profile-a-l/2048-qt.profile43
-rw-r--r--etc/profile-a-l/7z.profile47
-rw-r--r--etc/profile-a-l/7za.profile12
-rw-r--r--etc/profile-a-l/7zr.profile12
-rw-r--r--etc/profile-a-l/Builder.profile6
-rw-r--r--etc/profile-a-l/Cheese.profile6
-rw-r--r--etc/profile-a-l/Cryptocat.profile31
-rw-r--r--etc/profile-a-l/Cyberfox.profile5
-rw-r--r--etc/profile-a-l/Discord.profile17
-rw-r--r--etc/profile-a-l/DiscordCanary.profile17
-rw-r--r--etc/profile-a-l/Documents.profile6
-rw-r--r--etc/profile-a-l/FossaMail.profile5
-rw-r--r--etc/profile-a-l/Fritzing.profile39
-rw-r--r--etc/profile-a-l/Gitter.profile5
-rw-r--r--etc/profile-a-l/JDownloader.profile48
-rw-r--r--etc/profile-a-l/Logs.profile6
-rw-r--r--etc/profile-a-l/abiword.profile48
-rw-r--r--etc/profile-a-l/abrowser.profile20
-rw-r--r--etc/profile-a-l/acat.profile11
-rw-r--r--etc/profile-a-l/adiff.profile11
-rw-r--r--etc/profile-a-l/akonadi_control.profile55
-rw-r--r--etc/profile-a-l/akregator.profile46
-rw-r--r--etc/profile-a-l/als.profile11
-rw-r--r--etc/profile-a-l/amarok.profile35
-rw-r--r--etc/profile-a-l/amule.profile42
-rw-r--r--etc/profile-a-l/amuled.profile13
-rw-r--r--etc/profile-a-l/android-studio.profile41
-rw-r--r--etc/profile-a-l/anki.profile57
-rw-r--r--etc/profile-a-l/anydesk.profile35
-rw-r--r--etc/profile-a-l/aosp.profile42
-rw-r--r--etc/profile-a-l/apack.profile11
-rw-r--r--etc/profile-a-l/apktool.profile38
-rw-r--r--etc/profile-a-l/ar.profile47
-rw-r--r--etc/profile-a-l/arch-audit.profile51
-rw-r--r--etc/profile-a-l/archaudit-report.profile40
-rw-r--r--etc/profile-a-l/ardour4.profile5
-rw-r--r--etc/profile-a-l/ardour5.profile43
-rw-r--r--etc/profile-a-l/arduino.profile40
-rw-r--r--etc/profile-a-l/arepack.profile11
-rw-r--r--etc/profile-a-l/aria2c.profile55
-rw-r--r--etc/profile-a-l/ark.profile45
-rw-r--r--etc/profile-a-l/arm.profile48
-rw-r--r--etc/profile-a-l/artha.profile65
-rw-r--r--etc/profile-a-l/assogiate.profile52
-rw-r--r--etc/profile-a-l/asunder.profile48
-rw-r--r--etc/profile-a-l/atom-beta.profile10
-rw-r--r--etc/profile-a-l/atom.profile40
-rw-r--r--etc/profile-a-l/atool.profile53
-rw-r--r--etc/profile-a-l/atril-previewer.profile10
-rw-r--r--etc/profile-a-l/atril-thumbnailer.profile10
-rw-r--r--etc/profile-a-l/atril.profile52
-rw-r--r--etc/profile-a-l/audacious.profile44
-rw-r--r--etc/profile-a-l/audacity.profile45
-rw-r--r--etc/profile-a-l/audio-recorder.profile50
-rw-r--r--etc/profile-a-l/aunpack.profile11
-rw-r--r--etc/profile-a-l/authenticator.profile49
-rw-r--r--etc/profile-a-l/autokey-common.profile42
-rw-r--r--etc/profile-a-l/autokey-gtk.profile10
-rw-r--r--etc/profile-a-l/autokey-qt.profile10
-rw-r--r--etc/profile-a-l/autokey-run.profile10
-rw-r--r--etc/profile-a-l/autokey-shell.profile10
-rw-r--r--etc/profile-a-l/aweather.profile39
-rw-r--r--etc/profile-a-l/awesome.profile19
-rw-r--r--etc/profile-a-l/baloo_file.profile54
-rw-r--r--etc/profile-a-l/baloo_filemetadata_temp_extractor.profile14
-rw-r--r--etc/profile-a-l/baobab.profile42
-rw-r--r--etc/profile-a-l/barrier.profile45
-rw-r--r--etc/profile-a-l/basilisk.profile26
-rw-r--r--etc/profile-a-l/beaker.profile19
-rw-r--r--etc/profile-a-l/bibletime.profile58
-rw-r--r--etc/profile-a-l/bibtex.profile12
-rw-r--r--etc/profile-a-l/bitcoin-qt.profile49
-rw-r--r--etc/profile-a-l/bitlbee.profile40
-rw-r--r--etc/profile-a-l/bitwarden.profile57
-rw-r--r--etc/profile-a-l/blackbox.profile18
-rw-r--r--etc/profile-a-l/bleachbit.profile42
-rw-r--r--etc/profile-a-l/blender-2.8.profile5
-rw-r--r--etc/profile-a-l/blender.profile41
-rw-r--r--etc/profile-a-l/bless.profile42
-rw-r--r--etc/profile-a-l/blobwars.profile49
-rw-r--r--etc/profile-a-l/bluefish.profile40
-rw-r--r--etc/profile-a-l/bnox.profile17
-rw-r--r--etc/profile-a-l/brackets.profile34
-rw-r--r--etc/profile-a-l/brasero.profile37
-rw-r--r--etc/profile-a-l/brave-browser-beta.profile5
-rw-r--r--etc/profile-a-l/brave-browser-dev.profile5
-rw-r--r--etc/profile-a-l/brave-browser-nightly.profile5
-rw-r--r--etc/profile-a-l/brave-browser-stable.profile5
-rw-r--r--etc/profile-a-l/brave-browser.profile5
-rw-r--r--etc/profile-a-l/brave.profile32
-rw-r--r--etc/profile-a-l/bsdcat.profile5
-rw-r--r--etc/profile-a-l/bsdcpio.profile5
-rw-r--r--etc/profile-a-l/bsdtar.profile48
-rw-r--r--etc/profile-a-l/bunzip2.profile12
-rw-r--r--etc/profile-a-l/bzcat.profile15
-rw-r--r--etc/profile-a-l/bzflag.profile46
-rw-r--r--etc/profile-a-l/bzip2.profile12
-rw-r--r--etc/profile-a-l/caja.profile43
-rw-r--r--etc/profile-a-l/calibre.profile38
-rw-r--r--etc/profile-a-l/calligra.profile37
-rw-r--r--etc/profile-a-l/calligraauthor.profile5
-rw-r--r--etc/profile-a-l/calligraconverter.profile5
-rw-r--r--etc/profile-a-l/calligraflow.profile5
-rw-r--r--etc/profile-a-l/calligraplan.profile5
-rw-r--r--etc/profile-a-l/calligraplanwork.profile5
-rw-r--r--etc/profile-a-l/calligrasheets.profile5
-rw-r--r--etc/profile-a-l/calligrastage.profile5
-rw-r--r--etc/profile-a-l/calligrawords.profile5
-rw-r--r--etc/profile-a-l/cameramonitor.profile55
-rw-r--r--etc/profile-a-l/cantata.profile39
-rw-r--r--etc/profile-a-l/catfish.profile50
-rw-r--r--etc/profile-a-l/celluloid.profile54
-rw-r--r--etc/profile-a-l/checkbashisms.profile56
-rw-r--r--etc/profile-a-l/cheese.profile47
-rw-r--r--etc/profile-a-l/cherrytree.profile43
-rw-r--r--etc/profile-a-l/chromium-browser.profile5
-rw-r--r--etc/profile-a-l/chromium-common.profile44
-rw-r--r--etc/profile-a-l/chromium.profile22
-rw-r--r--etc/profile-a-l/cin.profile37
-rw-r--r--etc/profile-a-l/cinelerra.profile5
-rw-r--r--etc/profile-a-l/clamav.profile39
-rw-r--r--etc/profile-a-l/clamdscan.profile5
-rw-r--r--etc/profile-a-l/clamdtop.profile5
-rw-r--r--etc/profile-a-l/clamscan.profile5
-rw-r--r--etc/profile-a-l/clamtk.profile29
-rw-r--r--etc/profile-a-l/claws-mail.profile22
-rw-r--r--etc/profile-a-l/clawsker.profile55
-rw-r--r--etc/profile-a-l/clementine.profile33
-rw-r--r--etc/profile-a-l/clion.profile38
-rw-r--r--etc/profile-a-l/clipgrab.profile47
-rw-r--r--etc/profile-a-l/clipit.profile50
-rw-r--r--etc/profile-a-l/cliqz.profile23
-rw-r--r--etc/profile-a-l/clocks.profile6
-rw-r--r--etc/profile-a-l/cmus.profile30
-rw-r--r--etc/profile-a-l/code-oss.profile10
-rw-r--r--etc/profile-a-l/code.profile42
-rw-r--r--etc/profile-a-l/com.github.dahenson.agenda.profile60
-rw-r--r--etc/profile-a-l/com.github.johnfactotum.Foliate.profile62
-rw-r--r--etc/profile-a-l/conkeror.profile36
-rw-r--r--etc/profile-a-l/conky.profile46
-rw-r--r--etc/profile-a-l/conplay.profile18
-rw-r--r--etc/profile-a-l/corebird.profile37
-rw-r--r--etc/profile-a-l/cower.profile49
-rw-r--r--etc/profile-a-l/cpio.profile46
-rw-r--r--etc/profile-a-l/crawl-tiles.profile7
-rw-r--r--etc/profile-a-l/crawl.profile47
-rw-r--r--etc/profile-a-l/crow.profile45
-rw-r--r--etc/profile-a-l/cryptocat.profile5
-rw-r--r--etc/profile-a-l/curl.profile52
-rw-r--r--etc/profile-a-l/cvlc.profile13
-rw-r--r--etc/profile-a-l/cyberfox.profile21
-rw-r--r--etc/profile-a-l/d-feet.profile55
-rw-r--r--etc/profile-a-l/darktable.profile38
-rw-r--r--etc/profile-a-l/dconf-editor.profile46
-rw-r--r--etc/profile-a-l/dconf.profile53
-rw-r--r--etc/profile-a-l/ddgtk.profile55
-rw-r--r--etc/profile-a-l/deadbeef.profile35
-rw-r--r--etc/profile-a-l/default.profile59
-rw-r--r--etc/profile-a-l/deluge.profile46
-rw-r--r--etc/profile-a-l/desktopeditors.profile45
-rw-r--r--etc/profile-a-l/devhelp.profile53
-rw-r--r--etc/profile-a-l/devilspie.profile60
-rw-r--r--etc/profile-a-l/devilspie2.profile24
-rw-r--r--etc/profile-a-l/dex2jar.profile42
-rw-r--r--etc/profile-a-l/dia.profile47
-rw-r--r--etc/profile-a-l/dig.profile60
-rw-r--r--etc/profile-a-l/digikam.profile43
-rw-r--r--etc/profile-a-l/dillo.profile37
-rw-r--r--etc/profile-a-l/dino.profile43
-rw-r--r--etc/profile-a-l/discord-canary.profile17
-rw-r--r--etc/profile-a-l/discord-common.profile38
-rw-r--r--etc/profile-a-l/discord.profile17
-rw-r--r--etc/profile-a-l/display.profile46
-rw-r--r--etc/profile-a-l/dnox.profile17
-rw-r--r--etc/profile-a-l/dnscrypt-proxy.profile54
-rw-r--r--etc/profile-a-l/dnsmasq.profile37
-rw-r--r--etc/profile-a-l/dolphin.profile42
-rw-r--r--etc/profile-a-l/dooble-qt4.profile5
-rw-r--r--etc/profile-a-l/dooble.profile41
-rw-r--r--etc/profile-a-l/dosbox.profile37
-rw-r--r--etc/profile-a-l/dragon.profile40
-rw-r--r--etc/profile-a-l/drawio.profile53
-rw-r--r--etc/profile-a-l/dropbox.profile46
-rw-r--r--etc/profile-a-l/easystroke.profile56
-rw-r--r--etc/profile-a-l/ebook-viewer.profile11
-rw-r--r--etc/profile-a-l/electron-mail.profile55
-rw-r--r--etc/profile-a-l/electron.profile27
-rw-r--r--etc/profile-a-l/electrum.profile53
-rw-r--r--etc/profile-a-l/elinks.profile43
-rw-r--r--etc/profile-a-l/emacs.profile31
-rw-r--r--etc/profile-a-l/email-common.profile68
-rw-r--r--etc/profile-a-l/empathy.profile26
-rw-r--r--etc/profile-a-l/enchant-2.profile10
-rw-r--r--etc/profile-a-l/enchant-lsmod-2.profile10
-rw-r--r--etc/profile-a-l/enchant-lsmod.profile10
-rw-r--r--etc/profile-a-l/enchant.profile58
-rw-r--r--etc/profile-a-l/engrampa.profile42
-rw-r--r--etc/profile-a-l/enox.profile19
-rw-r--r--etc/profile-a-l/enpass.profile62
-rw-r--r--etc/profile-a-l/eo-common.profile47
-rw-r--r--etc/profile-a-l/eog.profile19
-rw-r--r--etc/profile-a-l/eom.profile19
-rw-r--r--etc/profile-a-l/ephemeral.profile63
-rw-r--r--etc/profile-a-l/epiphany.profile36
-rw-r--r--etc/profile-a-l/et.profile11
-rw-r--r--etc/profile-a-l/etr.profile46
-rw-r--r--etc/profile-a-l/evince-previewer.profile10
-rw-r--r--etc/profile-a-l/evince-thumbnailer.profile10
-rw-r--r--etc/profile-a-l/evince.profile56
-rw-r--r--etc/profile-a-l/evolution.profile46
-rw-r--r--etc/profile-a-l/exfalso.profile60
-rw-r--r--etc/profile-a-l/exiftool.profile57
-rw-r--r--etc/profile-a-l/falkon.profile43
-rw-r--r--etc/profile-a-l/fbreader.profile38
-rw-r--r--etc/profile-a-l/fdns.profile50
-rw-r--r--etc/profile-a-l/feedreader.profile50
-rw-r--r--etc/profile-a-l/feh.profile43
-rw-r--r--etc/profile-a-l/ferdi.profile46
-rw-r--r--etc/profile-a-l/fetchmail.profile34
-rw-r--r--etc/profile-a-l/ffmpeg.profile55
-rw-r--r--etc/profile-a-l/ffmpegthumbnailer.profile18
-rw-r--r--etc/profile-a-l/ffplay.profile20
-rw-r--r--etc/profile-a-l/ffprobe.profile14
-rw-r--r--etc/profile-a-l/file-roller.profile44
-rw-r--r--etc/profile-a-l/file.profile48
-rw-r--r--etc/profile-a-l/filezilla.profile40
-rw-r--r--etc/profile-a-l/firefox-beta.profile10
-rw-r--r--etc/profile-a-l/firefox-common.profile60
-rw-r--r--etc/profile-a-l/firefox-developer-edition.profile11
-rw-r--r--etc/profile-a-l/firefox-esr.profile12
-rw-r--r--etc/profile-a-l/firefox-nightly.profile10
-rw-r--r--etc/profile-a-l/firefox-wayland.profile10
-rw-r--r--etc/profile-a-l/firefox-x11.profile10
-rw-r--r--etc/profile-a-l/firefox.profile32
-rw-r--r--etc/profile-a-l/five-or-more.profile21
-rw-r--r--etc/profile-a-l/flacsplt.profile6
-rw-r--r--etc/profile-a-l/flameshot.profile46
-rw-r--r--etc/profile-a-l/flashpeak-slimjet.profile17
-rw-r--r--etc/profile-a-l/flowblade.profile38
-rw-r--r--etc/profile-a-l/fluxbox.profile18
-rw-r--r--etc/profile-a-l/font-manager.profile56
-rw-r--r--etc/profile-a-l/fontforge.profile41
-rw-r--r--etc/profile-a-l/fossamail.profile23
-rw-r--r--etc/profile-a-l/four-in-a-row.profile19
-rw-r--r--etc/profile-a-l/franz.profile46
-rw-r--r--etc/profile-a-l/freecad.profile45
-rw-r--r--etc/profile-a-l/freecadcmd.profile5
-rw-r--r--etc/profile-a-l/freeciv-gtk3.profile5
-rw-r--r--etc/profile-a-l/freeciv-mp-gtk3.profile5
-rw-r--r--etc/profile-a-l/freeciv.profile47
-rw-r--r--etc/profile-a-l/freecol.profile58
-rw-r--r--etc/profile-a-l/freemind.profile53
-rw-r--r--etc/profile-a-l/freeoffice-planmaker.profile10
-rw-r--r--etc/profile-a-l/freeoffice-presentations.profile10
-rw-r--r--etc/profile-a-l/freeoffice-textmaker.profile9
-rw-r--r--etc/profile-a-l/freshclam.profile35
-rw-r--r--etc/profile-a-l/frogatto.profile49
-rw-r--r--etc/profile-a-l/frozen-bubble.profile46
-rw-r--r--etc/profile-a-l/gajim-history-manager.profile5
-rw-r--r--etc/profile-a-l/gajim.profile55
-rw-r--r--etc/profile-a-l/galculator.profile52
-rw-r--r--etc/profile-a-l/gcalccmd.profile13
-rw-r--r--etc/profile-a-l/gcloud.profile42
-rw-r--r--etc/profile-a-l/gconf-editor.profile17
-rw-r--r--etc/profile-a-l/gconf-merge-schema.profile11
-rw-r--r--etc/profile-a-l/gconf-merge-tree.profile11
-rw-r--r--etc/profile-a-l/gconf.profile61
-rw-r--r--etc/profile-a-l/gconfpkg.profile11
-rw-r--r--etc/profile-a-l/gconftool-2.profile11
-rw-r--r--etc/profile-a-l/geany.profile35
-rw-r--r--etc/profile-a-l/geary.profile33
-rw-r--r--etc/profile-a-l/gedit.profile51
-rw-r--r--etc/profile-a-l/geekbench.profile55
-rw-r--r--etc/profile-a-l/geeqie.profile33
-rw-r--r--etc/profile-a-l/gfeeds.profile62
-rw-r--r--etc/profile-a-l/ghb.profile5
-rw-r--r--etc/profile-a-l/ghostwriter.profile50
-rw-r--r--etc/profile-a-l/gimp-2.10.profile5
-rw-r--r--etc/profile-a-l/gimp-2.8.profile5
-rw-r--r--etc/profile-a-l/gimp.profile55
-rw-r--r--etc/profile-a-l/gist-paste.profile12
-rw-r--r--etc/profile-a-l/gist.profile61
-rw-r--r--etc/profile-a-l/git.profile59
-rw-r--r--etc/profile-a-l/gitg.profile54
-rw-r--r--etc/profile-a-l/github-desktop.profile48
-rw-r--r--etc/profile-a-l/gitter.profile44
-rw-r--r--etc/profile-a-l/gjs.profile45
-rw-r--r--etc/profile-a-l/globaltime.profile37
-rw-r--r--etc/profile-a-l/gmpc.profile55
-rw-r--r--etc/profile-a-l/gnome-2048.profile19
-rw-r--r--etc/profile-a-l/gnome-books.profile46
-rw-r--r--etc/profile-a-l/gnome-builder.profile36
-rw-r--r--etc/profile-a-l/gnome-calculator.profile53
-rw-r--r--etc/profile-a-l/gnome-character-map.profile10
-rw-r--r--etc/profile-a-l/gnome-characters.profile59
-rw-r--r--etc/profile-a-l/gnome-chess.profile49
-rw-r--r--etc/profile-a-l/gnome-clocks.profile46
-rw-r--r--etc/profile-a-l/gnome-contacts.profile39
-rw-r--r--etc/profile-a-l/gnome-documents.profile44
-rw-r--r--etc/profile-a-l/gnome-font-viewer.profile37
-rw-r--r--etc/profile-a-l/gnome-hexgl.profile50
-rw-r--r--etc/profile-a-l/gnome-keyring-3.profile11
-rw-r--r--etc/profile-a-l/gnome-keyring.profile57
-rw-r--r--etc/profile-a-l/gnome-klotski.profile19
-rw-r--r--etc/profile-a-l/gnome-latex.profile51
-rw-r--r--etc/profile-a-l/gnome-logs.profile57
-rw-r--r--etc/profile-a-l/gnome-mahjongg.profile16
-rw-r--r--etc/profile-a-l/gnome-maps.profile64
-rw-r--r--etc/profile-a-l/gnome-mines.profile20
-rw-r--r--etc/profile-a-l/gnome-mplayer.profile34
-rw-r--r--etc/profile-a-l/gnome-mpv.profile5
-rw-r--r--etc/profile-a-l/gnome-music.profile47
-rw-r--r--etc/profile-a-l/gnome-nettool.profile48
-rw-r--r--etc/profile-a-l/gnome-nibbles.profile23
-rw-r--r--etc/profile-a-l/gnome-passwordsafe.profile53
-rw-r--r--etc/profile-a-l/gnome-photos.profile42
-rw-r--r--etc/profile-a-l/gnome-pie.profile41
-rw-r--r--etc/profile-a-l/gnome-pomodoro.profile51
-rw-r--r--etc/profile-a-l/gnome-recipes.profile52
-rw-r--r--etc/profile-a-l/gnome-ring.profile34
-rw-r--r--etc/profile-a-l/gnome-robots.profile19
-rw-r--r--etc/profile-a-l/gnome-schedule.profile65
-rw-r--r--etc/profile-a-l/gnome-screenshot.profile44
-rw-r--r--etc/profile-a-l/gnome-sound-recorder.profile43
-rw-r--r--etc/profile-a-l/gnome-sudoku.profile19
-rw-r--r--etc/profile-a-l/gnome-system-log.profile58
-rw-r--r--etc/profile-a-l/gnome-taquin.profile19
-rw-r--r--etc/profile-a-l/gnome-tetravex.profile14
-rw-r--r--etc/profile-a-l/gnome-todo.profile51
-rw-r--r--etc/profile-a-l/gnome-twitch.profile40
-rw-r--r--etc/profile-a-l/gnome-weather.profile48
-rw-r--r--etc/profile-a-l/gnome_games-common.profile47
-rw-r--r--etc/profile-a-l/godot.profile45
-rw-r--r--etc/profile-a-l/goobox.profile35
-rw-r--r--etc/profile-a-l/google-chrome-beta.profile17
-rw-r--r--etc/profile-a-l/google-chrome-stable.profile5
-rw-r--r--etc/profile-a-l/google-chrome-unstable.profile17
-rw-r--r--etc/profile-a-l/google-chrome.profile17
-rw-r--r--etc/profile-a-l/google-earth-pro.profile7
-rw-r--r--etc/profile-a-l/google-earth.profile51
-rw-r--r--etc/profile-a-l/google-play-music-desktop-player.profile42
-rw-r--r--etc/profile-a-l/gpa.profile33
-rw-r--r--etc/profile-a-l/gpg-agent.profile52
-rw-r--r--etc/profile-a-l/gpg.profile54
-rw-r--r--etc/profile-a-l/gpg2.profile13
-rw-r--r--etc/profile-a-l/gpicview.profile50
-rw-r--r--etc/profile-a-l/gpredict.profile40
-rw-r--r--etc/profile-a-l/gradio.profile40
-rw-r--r--etc/profile-a-l/gramps.profile51
-rw-r--r--etc/profile-a-l/gravity-beams-and-evaporating-stars.profile46
-rw-r--r--etc/profile-a-l/gsettings-data-convert.profile11
-rw-r--r--etc/profile-a-l/gsettings-schema-convert.profile11
-rw-r--r--etc/profile-a-l/gsettings.profile11
-rw-r--r--etc/profile-a-l/gtar.profile5
-rw-r--r--etc/profile-a-l/gthumb.profile36
-rw-r--r--etc/profile-a-l/gtk-update-icon-cache.profile55
-rw-r--r--etc/profile-a-l/guayadeque.profile34
-rw-r--r--etc/profile-a-l/gucharmap.profile52
-rw-r--r--etc/profile-a-l/gummi.profile19
-rw-r--r--etc/profile-a-l/gunzip.profile11
-rw-r--r--etc/profile-a-l/gwenview.profile52
-rw-r--r--etc/profile-a-l/gzexe.profile11
-rw-r--r--etc/profile-a-l/gzip.profile49
-rw-r--r--etc/profile-a-l/handbrake-gtk.profile5
-rw-r--r--etc/profile-a-l/handbrake.profile39
-rw-r--r--etc/profile-a-l/hashcat.profile46
-rw-r--r--etc/profile-a-l/hedgewars.profile35
-rw-r--r--etc/profile-a-l/hexchat.profile52
-rw-r--r--etc/profile-a-l/highlight.profile41
-rw-r--r--etc/profile-a-l/host.profile52
-rw-r--r--etc/profile-a-l/hugin.profile41
-rw-r--r--etc/profile-a-l/hyperrogue.profile50
-rw-r--r--etc/profile-a-l/i2prouter.profile71
-rw-r--r--etc/profile-a-l/i3.profile18
-rw-r--r--etc/profile-a-l/iagno.profile39
-rw-r--r--etc/profile-a-l/icecat.profile20
-rw-r--r--etc/profile-a-l/icedove.profile28
-rw-r--r--etc/profile-a-l/iceweasel.profile13
-rw-r--r--etc/profile-a-l/idea.profile10
-rw-r--r--etc/profile-a-l/idea.sh.profile40
-rw-r--r--etc/profile-a-l/ideaIC.profile10
-rw-r--r--etc/profile-a-l/imagej.profile41
-rw-r--r--etc/profile-a-l/img2txt.profile52
-rw-r--r--etc/profile-a-l/impressive.profile57
-rw-r--r--etc/profile-a-l/inkscape.profile61
-rw-r--r--etc/profile-a-l/inkview.profile11
-rw-r--r--etc/profile-a-l/inox.profile17
-rw-r--r--etc/profile-a-l/iridium-browser.profile5
-rw-r--r--etc/profile-a-l/iridium.profile17
-rw-r--r--etc/profile-a-l/itch.profile42
-rw-r--r--etc/profile-a-l/jd-gui.profile44
-rw-r--r--etc/profile-a-l/jdownloader.profile10
-rw-r--r--etc/profile-a-l/jerry.profile43
-rw-r--r--etc/profile-a-l/jitsi-meet-desktop.profile39
-rw-r--r--etc/profile-a-l/jitsi.profile32
-rw-r--r--etc/profile-a-l/jumpnbump-menu.profile15
-rw-r--r--etc/profile-a-l/jumpnbump.profile49
-rw-r--r--etc/profile-a-l/k3b.profile37
-rw-r--r--etc/profile-a-l/kaffeine.profile42
-rw-r--r--etc/profile-a-l/kalgebra.profile49
-rw-r--r--etc/profile-a-l/kalgebramobile.profile5
-rw-r--r--etc/profile-a-l/karbon.profile5
-rw-r--r--etc/profile-a-l/kate.profile53
-rw-r--r--etc/profile-a-l/kcalc.profile49
-rw-r--r--etc/profile-a-l/kdeinit4.profile36
-rw-r--r--etc/profile-a-l/kdenlive.profile40
-rw-r--r--etc/profile-a-l/keepass.profile44
-rw-r--r--etc/profile-a-l/keepass2.profile5
-rw-r--r--etc/profile-a-l/keepassx.profile50
-rw-r--r--etc/profile-a-l/keepassx2.profile6
-rw-r--r--etc/profile-a-l/keepassxc-cli.profile11
-rw-r--r--etc/profile-a-l/keepassxc-proxy.profile10
-rw-r--r--etc/profile-a-l/keepassxc.profile62
-rw-r--r--etc/profile-a-l/kfind.profile47
-rw-r--r--etc/profile-a-l/kget.profile41
-rw-r--r--etc/profile-a-l/kid3-cli.profile6
-rw-r--r--etc/profile-a-l/kid3-qt.profile8
-rw-r--r--etc/profile-a-l/kid3.profile47
-rw-r--r--etc/profile-a-l/kino.profile37
-rw-r--r--etc/profile-a-l/kiwix-desktop.profile51
-rw-r--r--etc/profile-a-l/klatexformula.profile45
-rw-r--r--etc/profile-a-l/klatexformula_cmdl.profile5
-rw-r--r--etc/profile-a-l/klavaro.profile54
-rw-r--r--etc/profile-a-l/kmail.profile60
-rw-r--r--etc/profile-a-l/kmplayer.profile41
-rw-r--r--etc/profile-a-l/knotes.profile17
-rw-r--r--etc/profile-a-l/kodi.profile44
-rw-r--r--etc/profile-a-l/konversation.profile42
-rw-r--r--etc/profile-a-l/kopete.profile38
-rw-r--r--etc/profile-a-l/krita.profile51
-rw-r--r--etc/profile-a-l/krunner.profile38
-rw-r--r--etc/profile-a-l/ktorrent.profile60
-rw-r--r--etc/profile-a-l/ktouch.profile52
-rw-r--r--etc/profile-a-l/kwin_x11.profile45
-rw-r--r--etc/profile-a-l/kwrite.profile53
-rw-r--r--etc/profile-a-l/latex-common.profile41
-rw-r--r--etc/profile-a-l/latex.profile12
-rw-r--r--etc/profile-a-l/lbunzip2.profile6
-rw-r--r--etc/profile-a-l/lbzcat.profile6
-rw-r--r--etc/profile-a-l/lbzip2.profile6
-rw-r--r--etc/profile-a-l/leafpad.profile40
-rw-r--r--etc/profile-a-l/less.profile52
-rw-r--r--etc/profile-a-l/libreoffice.profile49
-rw-r--r--etc/profile-a-l/liferea.profile53
-rw-r--r--etc/profile-a-l/lightsoff.profile16
-rw-r--r--etc/profile-a-l/lincity-ng.profile47
-rw-r--r--etc/profile-a-l/links.profile66
-rw-r--r--etc/profile-a-l/linphone.profile43
-rw-r--r--etc/profile-a-l/lmms.profile40
-rw-r--r--etc/profile-a-l/lobase.profile5
-rw-r--r--etc/profile-a-l/localc.profile5
-rw-r--r--etc/profile-a-l/lodraw.profile5
-rw-r--r--etc/profile-a-l/loffice.profile5
-rw-r--r--etc/profile-a-l/lofromtemplate.profile5
-rw-r--r--etc/profile-a-l/loimpress.profile5
-rw-r--r--etc/profile-a-l/lollypop.profile42
-rw-r--r--etc/profile-a-l/lomath.profile5
-rw-r--r--etc/profile-a-l/loweb.profile5
-rw-r--r--etc/profile-a-l/lowriter.profile5
-rw-r--r--etc/profile-a-l/lrunzip.profile12
-rw-r--r--etc/profile-a-l/lrz.profile12
-rw-r--r--etc/profile-a-l/lrzcat.profile12
-rw-r--r--etc/profile-a-l/lrzip.profile12
-rw-r--r--etc/profile-a-l/lrztar.profile12
-rw-r--r--etc/profile-a-l/lrzuntar.profile12
-rw-r--r--etc/profile-a-l/lugaru.profile51
-rw-r--r--etc/profile-a-l/luminance-hdr.profile39
-rw-r--r--etc/profile-a-l/lximage-qt.profile38
-rw-r--r--etc/profile-a-l/lxmusic.profile40
-rw-r--r--etc/profile-a-l/lynx.profile41
-rw-r--r--etc/profile-a-l/lzcat.profile7
-rw-r--r--etc/profile-a-l/lzcmp.profile7
-rw-r--r--etc/profile-a-l/lzdiff.profile6
-rw-r--r--etc/profile-a-l/lzegrep.profile7
-rw-r--r--etc/profile-a-l/lzfgrep.profile7
-rw-r--r--etc/profile-a-l/lzgrep.profile7
-rw-r--r--etc/profile-a-l/lzip.profile7
-rw-r--r--etc/profile-a-l/lzless.profile7
-rw-r--r--etc/profile-a-l/lzma.profile7
-rw-r--r--etc/profile-a-l/lzmadec.profile6
-rw-r--r--etc/profile-a-l/lzmainfo.profile7
-rw-r--r--etc/profile-a-l/lzmore.profile7
483 files changed, 15478 insertions, 0 deletions
diff --git a/etc/profile-a-l/0ad.profile b/etc/profile-a-l/0ad.profile
new file mode 100644
index 000000000..6869ea631
--- /dev/null
+++ b/etc/profile-a-l/0ad.profile
@@ -0,0 +1,53 @@
1# Firejail profile for 0ad
2# Description: Real-time strategy game of ancient warfare
3# This file is overwritten after every install/update
4# Persistent local customizations
5include 0ad.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/0ad
10noblacklist ${HOME}/.config/0ad
11noblacklist ${HOME}/.local/share/0ad
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20mkdir ${HOME}/.cache/0ad
21mkdir ${HOME}/.config/0ad
22mkdir ${HOME}/.local/share/0ad
23whitelist ${HOME}/.cache/0ad
24whitelist ${HOME}/.config/0ad
25whitelist ${HOME}/.local/share/0ad
26whitelist /usr/share/0ad
27whitelist /usr/share/games
28include whitelist-common.inc
29include whitelist-usr-share-common.inc
30include whitelist-var-common.inc
31
32caps.drop all
33netfilter
34nodvd
35nogroups
36nonewprivs
37noroot
38notv
39nou2f
40novideo
41protocol unix,inet,inet6
42seccomp
43shell none
44tracelog
45
46disable-mnt
47private-bin 0ad,pyrogenesis,sh,which
48private-cache
49private-dev
50private-tmp
51
52dbus-user none
53dbus-system none
diff --git a/etc/profile-a-l/2048-qt.profile b/etc/profile-a-l/2048-qt.profile
new file mode 100644
index 000000000..12268706a
--- /dev/null
+++ b/etc/profile-a-l/2048-qt.profile
@@ -0,0 +1,43 @@
1# Firejail profile for 2048-qt
2# Description: Mathematics based puzzle game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include 2048-qt.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/2048-qt
10noblacklist ${HOME}/.config/xiaoyong
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19mkdir ${HOME}/.config/2048-qt
20mkdir ${HOME}/.config/xiaoyong
21whitelist ${HOME}/.config/2048-qt
22whitelist ${HOME}/.config/xiaoyong
23include whitelist-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28net none
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40
41disable-mnt
42private-dev
43private-tmp
diff --git a/etc/profile-a-l/7z.profile b/etc/profile-a-l/7z.profile
new file mode 100644
index 000000000..02a2e7ea0
--- /dev/null
+++ b/etc/profile-a-l/7z.profile
@@ -0,0 +1,47 @@
1# Firejail profile for 7z
2# Description: File archiver with high compression ratio
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include 7z.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19apparmor
20caps.drop all
21hostname 7z
22ipc-namespace
23machine-id
24net none
25no3d
26nodvd
27#nogroups
28nonewprivs
29#noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37tracelog
38x11 none
39
40#private-bin 7z,7z*,p7zip
41private-cache
42private-dev
43
44dbus-user none
45dbus-system none
46
47memory-deny-write-execute
diff --git a/etc/profile-a-l/7za.profile b/etc/profile-a-l/7za.profile
new file mode 100644
index 000000000..9cd04cad1
--- /dev/null
+++ b/etc/profile-a-l/7za.profile
@@ -0,0 +1,12 @@
1# Firejail profile for 7za
2# Description: File archiver with high compression ratio
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include 7za.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include 7z.profile
diff --git a/etc/profile-a-l/7zr.profile b/etc/profile-a-l/7zr.profile
new file mode 100644
index 000000000..bd3842900
--- /dev/null
+++ b/etc/profile-a-l/7zr.profile
@@ -0,0 +1,12 @@
1# Firejail profile for 7zr
2# Description: File archiver with high compression ratio
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include 7zr.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include 7z.profile
diff --git a/etc/profile-a-l/Builder.profile b/etc/profile-a-l/Builder.profile
new file mode 100644
index 000000000..54b437441
--- /dev/null
+++ b/etc/profile-a-l/Builder.profile
@@ -0,0 +1,6 @@
1# Firejail profile for gnome-builder
2# This file is overwritten after every install/update
3
4# Temporary fix for https://github.com/netblue30/firejail/issues/2624
5# Redirect
6include gnome-builder.profile
diff --git a/etc/profile-a-l/Cheese.profile b/etc/profile-a-l/Cheese.profile
new file mode 100644
index 000000000..5bb5064f0
--- /dev/null
+++ b/etc/profile-a-l/Cheese.profile
@@ -0,0 +1,6 @@
1# Firejail profile for cheese
2# This file is overwritten after every install/update
3
4# Temporary fix for https://github.com/netblue30/firejail/issues/2624
5# Redirect
6include cheese.profile
diff --git a/etc/profile-a-l/Cryptocat.profile b/etc/profile-a-l/Cryptocat.profile
new file mode 100644
index 000000000..e9cc07bd7
--- /dev/null
+++ b/etc/profile-a-l/Cryptocat.profile
@@ -0,0 +1,31 @@
1# Firejail profile for Cryptocat
2# This file is overwritten after every install/update
3# Persistent local customizations
4include Cryptocat.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/Cryptocat
9
10include disable-common.inc
11include disable-devel.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15
16caps.drop all
17netfilter
18nodvd
19nogroups
20nonewprivs
21noroot
22nosound
23notv
24nou2f
25protocol unix,inet,inet6,netlink
26seccomp
27shell none
28
29private-cache
30private-dev
31private-tmp
diff --git a/etc/profile-a-l/Cyberfox.profile b/etc/profile-a-l/Cyberfox.profile
new file mode 100644
index 000000000..26a4348c9
--- /dev/null
+++ b/etc/profile-a-l/Cyberfox.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for cyberfox
2# This file is overwritten after every install/update
3
4# Redirect
5include cyberfox.profile
diff --git a/etc/profile-a-l/Discord.profile b/etc/profile-a-l/Discord.profile
new file mode 100644
index 000000000..3f274b21c
--- /dev/null
+++ b/etc/profile-a-l/Discord.profile
@@ -0,0 +1,17 @@
1# Firejail profile for Discord
2# This file is overwritten after every install/update
3# Persistent local customizations
4include Discord.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/discord
9
10mkdir ${HOME}/.config/discord
11whitelist ${HOME}/.config/discord
12
13private-bin Discord
14private-opt Discord
15
16# Redirect
17include discord-common.profile
diff --git a/etc/profile-a-l/DiscordCanary.profile b/etc/profile-a-l/DiscordCanary.profile
new file mode 100644
index 000000000..d24e73ed8
--- /dev/null
+++ b/etc/profile-a-l/DiscordCanary.profile
@@ -0,0 +1,17 @@
1# Firejail profile for DiscordCanary
2# This file is overwritten after every install/update
3# Persistent local customizations
4include DiscordCanary.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/discordcanary
9
10mkdir ${HOME}/.config/discordcanary
11whitelist ${HOME}/.config/discordcanary
12
13private-bin DiscordCanary
14private-opt DiscordCanary
15
16# Redirect
17include discord-common.profile
diff --git a/etc/profile-a-l/Documents.profile b/etc/profile-a-l/Documents.profile
new file mode 100644
index 000000000..171ab4357
--- /dev/null
+++ b/etc/profile-a-l/Documents.profile
@@ -0,0 +1,6 @@
1# Firejail profile for gnome-documents
2# This file is overwritten after every install/update
3
4# Temporary fix for https://github.com/netblue30/firejail/issues/2624
5# Redirect
6include gnome-documents.profile
diff --git a/etc/profile-a-l/FossaMail.profile b/etc/profile-a-l/FossaMail.profile
new file mode 100644
index 000000000..9e1f61421
--- /dev/null
+++ b/etc/profile-a-l/FossaMail.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for fossamail
2# This file is overwritten after every install/update
3
4# Redirect
5include fossamail.profile
diff --git a/etc/profile-a-l/Fritzing.profile b/etc/profile-a-l/Fritzing.profile
new file mode 100644
index 000000000..d318da885
--- /dev/null
+++ b/etc/profile-a-l/Fritzing.profile
@@ -0,0 +1,39 @@
1# Firejail profile for fritzing
2# Description: Easy-to-use electronic design software
3# This file is overwritten after every install/update
4# Persistent local customizations
5include Fritzing.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Fritzing
10noblacklist ${DOCUMENTS}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-var-common.inc
21
22caps.drop all
23ipc-namespace
24netfilter
25nodvd
26nogroups
27nonewprivs
28noroot
29nosound
30notv
31nou2f
32novideo
33protocol unix,inet,inet6
34seccomp
35shell none
36
37private-dev
38private-tmp
39
diff --git a/etc/profile-a-l/Gitter.profile b/etc/profile-a-l/Gitter.profile
new file mode 100644
index 000000000..a8bcb6a54
--- /dev/null
+++ b/etc/profile-a-l/Gitter.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for Gitter
2# This file is overwritten after every install/update
3
4# Redirect
5include gitter.profile
diff --git a/etc/profile-a-l/JDownloader.profile b/etc/profile-a-l/JDownloader.profile
new file mode 100644
index 000000000..45ec71e63
--- /dev/null
+++ b/etc/profile-a-l/JDownloader.profile
@@ -0,0 +1,48 @@
1# Firejail profile for JDownloader
2# This file is overwritten after every install/update
3# Persistent local customizations
4include JDownloader.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.jd
9
10# Allow java (blacklisted by disable-devel.inc)
11include allow-java.inc
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21mkdir ${HOME}/.jd
22whitelist ${HOME}/.jd
23whitelist ${DOWNLOADS}
24include whitelist-common.inc
25include whitelist-var-common.inc
26
27caps.drop all
28ipc-namespace
29netfilter
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix,inet,inet6
40seccomp
41shell none
42
43private-cache
44private-dev
45private-tmp
46
47dbus-user none
48dbus-system none
diff --git a/etc/profile-a-l/Logs.profile b/etc/profile-a-l/Logs.profile
new file mode 100644
index 000000000..431439f17
--- /dev/null
+++ b/etc/profile-a-l/Logs.profile
@@ -0,0 +1,6 @@
1# Firejail profile for gnome-logs
2# This file is overwritten after every install/update
3
4# Temporary fix for https://github.com/netblue30/firejail/issues/2624
5# Redirect
6include gnome-logs.profile
diff --git a/etc/profile-a-l/abiword.profile b/etc/profile-a-l/abiword.profile
new file mode 100644
index 000000000..948d3774a
--- /dev/null
+++ b/etc/profile-a-l/abiword.profile
@@ -0,0 +1,48 @@
1# Firejail profile for abiword
2# Description: flexible cross-platform word processor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include abiword.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/abiword
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18whitelist /usr/share/abiword-3.0
19include whitelist-usr-share-common.inc
20include whitelist-runuser-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25machine-id
26net none
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39tracelog
40
41private-bin abiword
42private-cache
43private-dev
44private-etc fonts,gtk-3.0,passwd
45private-tmp
46
47# dbus-user none
48# dbus-system none
diff --git a/etc/profile-a-l/abrowser.profile b/etc/profile-a-l/abrowser.profile
new file mode 100644
index 000000000..2e6e8f1af
--- /dev/null
+++ b/etc/profile-a-l/abrowser.profile
@@ -0,0 +1,20 @@
1# Firejail profile for abrowser
2# This file is overwritten after every install/update
3# Persistent local customizations
4include abrowser.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/mozilla
9noblacklist ${HOME}/.mozilla
10
11mkdir ${HOME}/.cache/mozilla/abrowser
12mkdir ${HOME}/.mozilla
13whitelist ${HOME}/.cache/mozilla/abrowser
14whitelist ${HOME}/.mozilla
15
16# private-etc must first be enabled in firefox-common.profile
17#private-etc abrowser
18
19# Redirect
20include firefox-common.profile
diff --git a/etc/profile-a-l/acat.profile b/etc/profile-a-l/acat.profile
new file mode 100644
index 000000000..522d8db4e
--- /dev/null
+++ b/etc/profile-a-l/acat.profile
@@ -0,0 +1,11 @@
1# Firejail profile for acat
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include acat.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include atool.profile
diff --git a/etc/profile-a-l/adiff.profile b/etc/profile-a-l/adiff.profile
new file mode 100644
index 000000000..a80886d56
--- /dev/null
+++ b/etc/profile-a-l/adiff.profile
@@ -0,0 +1,11 @@
1# Firejail profile for adiff
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include adiff.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include atool.profile
diff --git a/etc/profile-a-l/akonadi_control.profile b/etc/profile-a-l/akonadi_control.profile
new file mode 100644
index 000000000..ffc613f1e
--- /dev/null
+++ b/etc/profile-a-l/akonadi_control.profile
@@ -0,0 +1,55 @@
1# Firejail profile for akonadi_control
2# Persistent local customizations
3include akonadi_control.local
4# Persistent global definitions
5include globals.local
6
7noblacklist ${HOME}/.cache/akonadi*
8noblacklist ${HOME}/.config/akonadi*
9noblacklist ${HOME}/.config/baloorc
10noblacklist ${HOME}/.config/emaildefaults
11noblacklist ${HOME}/.config/emailidentities
12noblacklist ${HOME}/.config/kmail2rc
13noblacklist ${HOME}/.config/mailtransports
14noblacklist ${HOME}/.config/specialmailcollectionsrc
15noblacklist ${HOME}/.local/share/akonadi*
16noblacklist ${HOME}/.local/share/apps/korganizer
17noblacklist ${HOME}/.local/share/contacts
18noblacklist ${HOME}/.local/share/local-mail
19noblacklist ${HOME}/.local/share/notes
20noblacklist /sbin
21noblacklist /tmp/akonadi-*
22noblacklist /usr/sbin
23
24include disable-common.inc
25include disable-devel.inc
26include disable-exec.inc
27include disable-interpreters.inc
28include disable-passwdmgr.inc
29include disable-programs.inc
30
31include whitelist-var-common.inc
32
33# disabled options below are not compatible with the apparmor profile for mysqld-akonadi.
34# this affects ubuntu and debian currently
35
36# apparmor
37caps.drop all
38ipc-namespace
39netfilter
40no3d
41nodvd
42nogroups
43# nonewprivs
44noroot
45nosound
46notv
47nou2f
48novideo
49# protocol unix,inet,inet6,netlink
50# seccomp !io_getevents,!io_setup,!io_submit,!ioprio_set
51tracelog
52
53private-dev
54# private-tmp - breaks programs that depend on akonadi
55
diff --git a/etc/profile-a-l/akregator.profile b/etc/profile-a-l/akregator.profile
new file mode 100644
index 000000000..34933f283
--- /dev/null
+++ b/etc/profile-a-l/akregator.profile
@@ -0,0 +1,46 @@
1# Firejail profile for akregator
2# Description: RSS/Atom feed aggregator
3# This file is overwritten after every install/update
4# Persistent local customizations
5include akregator.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/akregatorrc
10noblacklist ${HOME}/.local/share/akregator
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19mkfile ${HOME}/.config/akregatorrc
20mkdir ${HOME}/.local/share/akregator
21whitelist ${HOME}/.config/akregatorrc
22whitelist ${HOME}/.local/share/akregator
23whitelist ${HOME}/.local/share/kssl
24include whitelist-common.inc
25include whitelist-var-common.inc
26
27caps.drop all
28netfilter
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34notv
35nou2f
36novideo
37protocol unix,inet,inet6,netlink
38# chroot syscalls are needed for setting up the built-in sandbox
39seccomp !chroot
40shell none
41
42disable-mnt
43private-bin akregator,akregatorstorageexporter,dbus-launch,kdeinit4,kdeinit4_shutdown,kdeinit4_wrapper,kdeinit5,kdeinit5_shutdown,kdeinit5_wrapper,kshell4,kshell5
44private-dev
45private-tmp
46
diff --git a/etc/profile-a-l/als.profile b/etc/profile-a-l/als.profile
new file mode 100644
index 000000000..5eae228b6
--- /dev/null
+++ b/etc/profile-a-l/als.profile
@@ -0,0 +1,11 @@
1# Firejail profile for als
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include als.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include atool.profile
diff --git a/etc/profile-a-l/amarok.profile b/etc/profile-a-l/amarok.profile
new file mode 100644
index 000000000..0b974e9ac
--- /dev/null
+++ b/etc/profile-a-l/amarok.profile
@@ -0,0 +1,35 @@
1# Firejail profile for amarok
2# Description: Easy to use media player based on the KDE Platform
3# This file is overwritten after every install/update
4# Persistent local customizations
5include amarok.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${MUSIC}
10
11include disable-common.inc
12include disable-devel.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16include disable-xdg.inc
17
18include whitelist-var-common.inc
19
20caps.drop all
21netfilter
22nogroups
23nonewprivs
24noroot
25notv
26nou2f
27novideo
28protocol unix,inet,inet6
29# seccomp
30shell none
31
32# private-bin amarok
33private-dev
34# private-etc alternatives,asound.conf,ca-certificates,crypto-policies,machine-id,pki,pulse,ssl
35private-tmp
diff --git a/etc/profile-a-l/amule.profile b/etc/profile-a-l/amule.profile
new file mode 100644
index 000000000..feb4a5e7e
--- /dev/null
+++ b/etc/profile-a-l/amule.profile
@@ -0,0 +1,42 @@
1# Firejail profile for amule
2# Description: Client for the eD2k and Kad networks, like eMule
3# This file is overwritten after every install/update
4# Persistent local customizations
5include amule.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.aMule
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.aMule
19whitelist ${DOWNLOADS}
20whitelist ${HOME}/.aMule
21include whitelist-common.inc
22
23caps.drop all
24ipc-namespace
25netfilter
26no3d
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix,inet,inet6
36seccomp
37shell none
38
39private-bin amule
40private-dev
41private-tmp
42
diff --git a/etc/profile-a-l/amuled.profile b/etc/profile-a-l/amuled.profile
new file mode 100644
index 000000000..58b796875
--- /dev/null
+++ b/etc/profile-a-l/amuled.profile
@@ -0,0 +1,13 @@
1# Firejail profile for amuled
2# Description: Daemon for amule
3# This file is overwritten after every install/update
4# Persistent local customizations
5include amule.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10private-bin amuled
11
12# Redirect
13include amule.profile
diff --git a/etc/profile-a-l/android-studio.profile b/etc/profile-a-l/android-studio.profile
new file mode 100644
index 000000000..2e4e564dd
--- /dev/null
+++ b/etc/profile-a-l/android-studio.profile
@@ -0,0 +1,41 @@
1# Firejail profile for android-studio
2# This file is overwritten after every install/update
3# Persistent local customizations
4include android-studio.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.AndroidStudio*
9noblacklist ${HOME}/.android
10noblacklist ${HOME}/.jack-server
11noblacklist ${HOME}/.jack-settings
12noblacklist ${HOME}/.local/share/JetBrains
13noblacklist ${HOME}/.ssh
14noblacklist ${HOME}/.tooling
15
16# Allows files commonly used by IDEs
17include allow-common-devel.inc
18
19include disable-common.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22
23include whitelist-var-common.inc
24
25caps.drop all
26netfilter
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32novideo
33protocol unix,inet,inet6
34seccomp
35shell none
36
37private-cache
38# private-tmp
39
40# noexec /tmp breaks 'Android Profiler'
41#noexec /tmp
diff --git a/etc/profile-a-l/anki.profile b/etc/profile-a-l/anki.profile
new file mode 100644
index 000000000..fa688f1a5
--- /dev/null
+++ b/etc/profile-a-l/anki.profile
@@ -0,0 +1,57 @@
1# Firejail profile for anki
2# Description: flexible, intelligent flashcard program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include anki.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${DOCUMENTS}
10noblacklist ${HOME}/.local/share/Anki2
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24mkdir ${HOME}/.local/share/Anki2
25whitelist ${DOCUMENTS}
26whitelist ${HOME}/.local/share/Anki2
27include whitelist-common.inc
28include whitelist-var-common.inc
29
30apparmor
31caps.drop all
32machine-id
33netfilter
34no3d
35nodvd
36nogroups
37nonewprivs
38noroot
39nosound
40notv
41nou2f
42novideo
43protocol unix,inet,inet6
44# QtWebengine needs chroot to set up its own sandbox
45seccomp !chroot
46shell none
47tracelog
48
49disable-mnt
50private-bin anki,python*
51private-cache
52private-dev
53private-etc alternatives,ca-certificates,fonts,gtk-2.0,hostname,hosts,machine-id,pki,resolv.conf,ssl,Trolltech.conf
54private-tmp
55
56dbus-user none
57dbus-system none
diff --git a/etc/profile-a-l/anydesk.profile b/etc/profile-a-l/anydesk.profile
new file mode 100644
index 000000000..35b18bab4
--- /dev/null
+++ b/etc/profile-a-l/anydesk.profile
@@ -0,0 +1,35 @@
1# Firejail profile for AnyDesk
2# This file is overwritten after every install/update
3# Persistent local customizations
4include anydesk.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.anydesk
9
10include disable-common.inc
11include disable-devel.inc
12include disable-passwdmgr.inc
13include disable-programs.inc
14include disable-interpreters.inc
15
16mkdir ${HOME}/.anydesk
17whitelist ${HOME}/.anydesk
18include whitelist-common.inc
19
20caps.drop all
21netfilter
22nodvd
23nogroups
24nonewprivs
25noroot
26notv
27nou2f
28protocol unix,inet,inet6
29seccomp
30shell none
31
32disable-mnt
33private-bin anydesk
34private-dev
35private-tmp
diff --git a/etc/profile-a-l/aosp.profile b/etc/profile-a-l/aosp.profile
new file mode 100644
index 000000000..a5b1ba9f1
--- /dev/null
+++ b/etc/profile-a-l/aosp.profile
@@ -0,0 +1,42 @@
1# Firejail profile for aosp
2# This file is overwritten after every install/update
3# Persistent local customizations
4include aosp.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.android
9noblacklist ${HOME}/.bash_history
10noblacklist ${HOME}/.jack-server
11noblacklist ${HOME}/.jack-settings
12noblacklist ${HOME}/.repo_.gitconfig.json
13noblacklist ${HOME}/.repoconfig
14noblacklist ${HOME}/.ssh
15noblacklist ${HOME}/.tooling
16
17# Allows files commonly used by IDEs
18include allow-common-devel.inc
19
20include disable-common.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25include whitelist-var-common.inc
26
27caps.drop all
28ipc-namespace
29netfilter
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37novideo
38protocol unix,inet,inet6
39#seccomp
40shell none
41
42private-tmp
diff --git a/etc/profile-a-l/apack.profile b/etc/profile-a-l/apack.profile
new file mode 100644
index 000000000..9fef911af
--- /dev/null
+++ b/etc/profile-a-l/apack.profile
@@ -0,0 +1,11 @@
1# Firejail profile for apack
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include apack.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include atool.profile
diff --git a/etc/profile-a-l/apktool.profile b/etc/profile-a-l/apktool.profile
new file mode 100644
index 000000000..39c5da9ab
--- /dev/null
+++ b/etc/profile-a-l/apktool.profile
@@ -0,0 +1,38 @@
1# Firejail profile for apktool
2# Description: Tool for reverse engineering Android apk files
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include apktool.local
7# Persistent global definitions
8include globals.local
9
10include disable-common.inc
11include disable-exec.inc
12include disable-passwdmgr.inc
13include disable-programs.inc
14include disable-xdg.inc
15
16include whitelist-var-common.inc
17
18caps.drop all
19net none
20no3d
21nodvd
22nogroups
23nonewprivs
24noroot
25nosound
26notv
27nou2f
28novideo
29protocol unix
30seccomp
31shell none
32
33private-bin apktool,basename,bash,dirname,expr,java,sh
34private-cache
35private-dev
36
37dbus-user none
38dbus-system none
diff --git a/etc/profile-a-l/ar.profile b/etc/profile-a-l/ar.profile
new file mode 100644
index 000000000..6ed60ffe5
--- /dev/null
+++ b/etc/profile-a-l/ar.profile
@@ -0,0 +1,47 @@
1# Firejail profile for ar
2# Description: Create, modify, and extract from archives
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include ar.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19apparmor
20caps.drop all
21hostname ar
22ipc-namespace
23machine-id
24net none
25no3d
26nodvd
27nogroups
28nonewprivs
29#noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37tracelog
38x11 none
39
40private-bin ar
41private-cache
42private-dev
43
44dbus-user none
45dbus-system none
46
47memory-deny-write-execute
diff --git a/etc/profile-a-l/arch-audit.profile b/etc/profile-a-l/arch-audit.profile
new file mode 100644
index 000000000..324730bde
--- /dev/null
+++ b/etc/profile-a-l/arch-audit.profile
@@ -0,0 +1,51 @@
1# Firejail profile for arch-audit
2# Description: A utility like pkg-audit based on Arch CVE Monitoring Team data
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include arch-audit.local
7# Persistent global definitions
8include globals.local
9
10noblacklist /var/lib/pacman
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20whitelist /usr/share/arch-audit
21include whitelist-usr-share-common.inc
22
23apparmor
24caps.drop all
25ipc-namespace
26machine-id
27netfilter
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol inet,inet6
38seccomp
39shell none
40
41disable-mnt
42private
43private-bin arch-audit
44private-cache
45private-dev
46private-tmp
47
48dbus-user none
49dbus-system none
50
51memory-deny-write-execute
diff --git a/etc/profile-a-l/archaudit-report.profile b/etc/profile-a-l/archaudit-report.profile
new file mode 100644
index 000000000..19c37f90e
--- /dev/null
+++ b/etc/profile-a-l/archaudit-report.profile
@@ -0,0 +1,40 @@
1# Firejail profile for archaudit-report
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include archaudit-report.local
6# Persistent global definitions
7include globals.local
8
9noblacklist /var/lib/pacman
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19caps.drop all
20ipc-namespace
21netfilter
22no3d
23nodvd
24nogroups
25nonewprivs
26noroot
27nosound
28notv
29novideo
30protocol unix,inet,inet6
31seccomp
32shell none
33
34disable-mnt
35private
36private-bin arch-audit,archaudit-report,bash,cat,comm,cut,date,fold,grep,pacman,pactree,rm,sed,sort,whoneeds
37#private-dev
38private-tmp
39
40memory-deny-write-execute
diff --git a/etc/profile-a-l/ardour4.profile b/etc/profile-a-l/ardour4.profile
new file mode 100644
index 000000000..4ad8dd456
--- /dev/null
+++ b/etc/profile-a-l/ardour4.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for ardour5
2# This file is overwritten after every install/update
3
4# Redirect
5include ardour5.profile
diff --git a/etc/profile-a-l/ardour5.profile b/etc/profile-a-l/ardour5.profile
new file mode 100644
index 000000000..a27cb4f6e
--- /dev/null
+++ b/etc/profile-a-l/ardour5.profile
@@ -0,0 +1,43 @@
1# Firejail profile for ardour5
2# This file is overwritten after every install/update
3# Persistent local customizations
4include ardour5.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/ardour4
9noblacklist ${HOME}/.config/ardour5
10noblacklist ${HOME}/.lv2
11noblacklist ${HOME}/.vst
12noblacklist ${DOCUMENTS}
13noblacklist ${MUSIC}
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23caps.drop all
24ipc-namespace
25net none
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31nou2f
32protocol unix
33seccomp
34shell none
35
36#private-bin ardour4,ardour5,ardour5-copy-mixer,ardour5-export,ardour5-fix_bbtppq,grep,ldd,nm,sed,sh
37private-cache
38private-dev
39#private-etc alternatives,ardour4,ardour5,asound.conf,fonts,machine-id,pulse,X11
40private-tmp
41
42dbus-user none
43dbus-system none
diff --git a/etc/profile-a-l/arduino.profile b/etc/profile-a-l/arduino.profile
new file mode 100644
index 000000000..fd1ca9a09
--- /dev/null
+++ b/etc/profile-a-l/arduino.profile
@@ -0,0 +1,40 @@
1# Firejail profile for arduino
2# Description: AVR development board IDE and built-in libraries
3# This file is overwritten after every install/update
4# Persistent local customizations
5include arduino.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.arduino15
10noblacklist ${HOME}/Arduino
11noblacklist ${DOCUMENTS}
12
13# Allow java (blacklisted by disable-devel.inc)
14include allow-java.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24caps.drop all
25netfilter
26no3d
27nodvd
28# nogroups
29nonewprivs
30noroot
31nosound
32notv
33novideo
34protocol unix,inet,inet6
35seccomp
36shell none
37
38private-cache
39private-tmp
40
diff --git a/etc/profile-a-l/arepack.profile b/etc/profile-a-l/arepack.profile
new file mode 100644
index 000000000..012f2f049
--- /dev/null
+++ b/etc/profile-a-l/arepack.profile
@@ -0,0 +1,11 @@
1# Firejail profile for arepack
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include arepack.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include atool.profile
diff --git a/etc/profile-a-l/aria2c.profile b/etc/profile-a-l/aria2c.profile
new file mode 100644
index 000000000..d2dcaace1
--- /dev/null
+++ b/etc/profile-a-l/aria2c.profile
@@ -0,0 +1,55 @@
1# Firejail profile for aria2c
2# Description: Download utility that supports HTTP(S), FTP, BitTorrent and Metalink
3# This file is overwritten after every install/update
4# Persistent local customizations
5include aria2c.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.aria2
10noblacklist ${HOME}/.config/aria2
11noblacklist ${HOME}/.netrc
12
13blacklist /tmp/.X11-unix
14blacklist ${RUNUSER}/wayland-*
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26caps.drop all
27ipc-namespace
28netfilter
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix,inet,inet6,netlink
39seccomp
40shell none
41
42# disable-mnt
43# Add your custom event hook commands to 'private-bin' in your aria2c.local
44private-bin aria2c,gzip
45# Uncomment the next line (or put 'private-cache' in your aria2c.local) if you don't use Lutris/winetricks (see issue #2772)
46#private-cache
47private-dev
48private-etc alternatives,ca-certificates,crypto-policies,groups,login.defs,machine-id,nsswitch.conf,passwd,pki,resolv.conf,ssl
49private-lib libreadline.so.*
50private-tmp
51
52dbus-user none
53dbus-system none
54
55memory-deny-write-execute
diff --git a/etc/profile-a-l/ark.profile b/etc/profile-a-l/ark.profile
new file mode 100644
index 000000000..01004d772
--- /dev/null
+++ b/etc/profile-a-l/ark.profile
@@ -0,0 +1,45 @@
1# Firejail profile for ark
2# Description: Archive utility
3# This file is overwritten after every install/update
4# Persistent local customizations
5include ark.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/arkrc
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18whitelist /usr/share/ark
19include whitelist-usr-share-common.inc
20include whitelist-var-common.inc
21
22apparmor
23caps.drop all
24# net none
25netfilter
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37
38private-bin 7z,ark,bash,lrzip,lsar,lz4,lzop,p7zip,rar,sh,tclsh,unar,unrar,unzip,zip,zipinfo
39#private-etc alternatives,drirc,fonts,group,kde5rc,mtab,passwd,samba,smb.conf,xdg
40
41private-dev
42private-tmp
43
44# dbus-user none
45# dbus-system none
diff --git a/etc/profile-a-l/arm.profile b/etc/profile-a-l/arm.profile
new file mode 100644
index 000000000..51dad94d1
--- /dev/null
+++ b/etc/profile-a-l/arm.profile
@@ -0,0 +1,48 @@
1# Firejail profile for arm
2# Description: Terminal status monitor for Tor relays
3# This file is overwritten after every install/update
4# Persistent local customizations
5include arm.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.arm
10
11# Allow python (blacklisted by disable-interpreters.inc)
12include allow-python2.inc
13include allow-python3.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22mkdir ${HOME}/.arm
23whitelist ${HOME}/.arm
24include whitelist-common.inc
25
26caps.drop all
27ipc-namespace
28netfilter
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix,inet,inet6
39seccomp
40shell none
41tracelog
42
43disable-mnt
44private-bin arm,bash,ldconfig,lsof,ps,python*,sh,tor
45private-dev
46private-etc alternatives,ca-certificates,crypto-policies,passwd,pki,ssl,tor
47private-tmp
48
diff --git a/etc/profile-a-l/artha.profile b/etc/profile-a-l/artha.profile
new file mode 100644
index 000000000..19a4771aa
--- /dev/null
+++ b/etc/profile-a-l/artha.profile
@@ -0,0 +1,65 @@
1# Firejail profile for artha
2# Description: A free cross-platform English thesaurus based on WordNet
3# This file is overwritten after every install/update
4# Persistent local customizations
5include artha.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/artha.conf
10noblacklist ${HOME}/.config/artha.log
11noblacklist ${HOME}/.config/enchant
12
13blacklist /tmp/.X11-unix
14blacklist ${RUNUSER}/wayland-*
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24# whitelisting in ${HOME} makes settings immutable, see #3112
25#mkfile ${HOME}/.config/artha.conf
26#mkdir ${HOME}/.config/enchant
27#whitelist ${HOME}/.config/artha.conf
28#whitelist ${HOME}/.config/artha.log
29#whitelist ${HOME}/.config/enchant
30whitelist /usr/share/artha
31whitelist /usr/share/wordnet
32#include whitelist-common.inc
33include whitelist-usr-share-common.inc
34include whitelist-var-common.inc
35
36apparmor
37caps.drop all
38ipc-namespace
39# net none - breaks on Ubuntu
40no3d
41nodvd
42nogroups
43nonewprivs
44noroot
45nosound
46notv
47nou2f
48novideo
49protocol unix
50seccomp
51shell none
52tracelog
53
54disable-mnt
55private-bin artha,enchant,notify-send
56private-cache
57private-dev
58private-etc alternatives,fonts,machine-id
59private-lib libnotify.so.*
60private-tmp
61
62# dbus-user none
63# dbus-system none
64
65memory-deny-write-execute
diff --git a/etc/profile-a-l/assogiate.profile b/etc/profile-a-l/assogiate.profile
new file mode 100644
index 000000000..da72a4a73
--- /dev/null
+++ b/etc/profile-a-l/assogiate.profile
@@ -0,0 +1,52 @@
1# Firejail profile for assogiate
2# Description: An editor of the MIME file types database for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include assogiate.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${PICTURES}
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19whitelist ${PICTURES}
20include whitelist-common.inc
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26machine-id
27net none
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40tracelog
41
42disable-mnt
43private-bin assogiate,gtk-update-icon-cache,update-mime-database
44private-cache
45private-dev
46private-lib gnome-vfs-2.0,libacl.so.*,libattr.so.*,libfam.so.*
47private-tmp
48
49dbus-user none
50dbus-system none
51
52memory-deny-write-execute
diff --git a/etc/profile-a-l/asunder.profile b/etc/profile-a-l/asunder.profile
new file mode 100644
index 000000000..33dd4103f
--- /dev/null
+++ b/etc/profile-a-l/asunder.profile
@@ -0,0 +1,48 @@
1# Firejail profile for asounder
2# Description: Graphical audio CD ripper and encoder
3# This file is overwritten after every install/update
4# Persistent local customizations
5include asunder.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/asunder
10noblacklist ${HOME}/.asunder_album_genre
11noblacklist ${HOME}/.asunder_album_title
12noblacklist ${HOME}/.asunder_album_artist
13noblacklist ${MUSIC}
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28netfilter
29no3d
30# nogroups
31nonewprivs
32noroot
33nou2f
34notv
35novideo
36protocol unix,inet,inet6
37seccomp
38shell none
39
40private-cache
41private-dev
42private-tmp
43
44dbus-user none
45dbus-system none
46
47# mdwe is disabled due to breaking hardware accelerated decoding
48# memory-deny-write-execute
diff --git a/etc/profile-a-l/atom-beta.profile b/etc/profile-a-l/atom-beta.profile
new file mode 100644
index 000000000..c0ee2c492
--- /dev/null
+++ b/etc/profile-a-l/atom-beta.profile
@@ -0,0 +1,10 @@
1# Firejail profile for atom-beta
2# This file is overwritten after every install/update
3# Persistent local customizations
4include atom-beta.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include atom.profile
diff --git a/etc/profile-a-l/atom.profile b/etc/profile-a-l/atom.profile
new file mode 100644
index 000000000..fceef9579
--- /dev/null
+++ b/etc/profile-a-l/atom.profile
@@ -0,0 +1,40 @@
1# Firejail profile for atom
2# Description: A hackable text editor for the 21st Century
3# This file is overwritten after every install/update
4# Persistent local customizations
5include atom.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.atom
10noblacklist ${HOME}/.config/Atom
11
12# Allows files commonly used by IDEs
13include allow-common-devel.inc
14
15include disable-common.inc
16include disable-exec.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20caps.drop all
21# net none
22netfilter
23nodvd
24nogroups
25nonewprivs
26noroot
27nosound
28notv
29nou2f
30novideo
31protocol unix,inet,inet6,netlink
32seccomp
33shell none
34
35private-cache
36private-dev
37private-tmp
38
39dbus-user none
40dbus-system none
diff --git a/etc/profile-a-l/atool.profile b/etc/profile-a-l/atool.profile
new file mode 100644
index 000000000..e501e956c
--- /dev/null
+++ b/etc/profile-a-l/atool.profile
@@ -0,0 +1,53 @@
1# Firejail profile for atool
2# Description: Tool for managing file archives of various types
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include atool.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12# Allow perl (blacklisted by disable-interpreters.inc)
13include allow-perl.inc
14
15include disable-common.inc
16# include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22apparmor
23caps.drop all
24hostname atool
25ipc-namespace
26machine-id
27net none
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40tracelog
41x11 none
42
43# private-bin atool,perl
44private-cache
45private-dev
46# without login.defs atool complains and uses UID/GID 1000 by default
47private-etc alternatives,group,login.defs,passwd
48private-tmp
49
50dbus-user none
51dbus-system none
52
53memory-deny-write-execute
diff --git a/etc/profile-a-l/atril-previewer.profile b/etc/profile-a-l/atril-previewer.profile
new file mode 100644
index 000000000..7f4697357
--- /dev/null
+++ b/etc/profile-a-l/atril-previewer.profile
@@ -0,0 +1,10 @@
1# Firejail profile for atril-previewer
2# This file is overwritten after every install/update
3# Persistent local customizations
4include atril-previewer.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include atril.profile
diff --git a/etc/profile-a-l/atril-thumbnailer.profile b/etc/profile-a-l/atril-thumbnailer.profile
new file mode 100644
index 000000000..8f6129ea6
--- /dev/null
+++ b/etc/profile-a-l/atril-thumbnailer.profile
@@ -0,0 +1,10 @@
1# Firejail profile for atril-thumbnailer
2# This file is overwritten after every install/update
3# Persistent local customizations
4include atril-thumbnailer.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include atril.profile
diff --git a/etc/profile-a-l/atril.profile b/etc/profile-a-l/atril.profile
new file mode 100644
index 000000000..adca38cb5
--- /dev/null
+++ b/etc/profile-a-l/atril.profile
@@ -0,0 +1,52 @@
1# Firejail profile for atril
2# Description: MATE document viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include atril.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/atril
10noblacklist ${HOME}/.config/atril
11noblacklist ${DOCUMENTS}
12
13#noblacklist ${HOME}/.local/share
14# it seems to use only ${HOME}/.local/share/webkitgtk
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24include whitelist-var-common.inc
25
26# apparmor
27caps.drop all
28machine-id
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix
39seccomp
40shell none
41tracelog
42
43private-bin atril,atril-previewer,atril-thumbnailer
44private-dev
45private-etc alternatives,fonts,ld.so.cache
46# atril uses webkit gtk to display epub files
47# waiting for globbing support in private-lib; for now hardcoding it to webkit2gtk-4.0
48#private-lib webkit2gtk-4.0 - problems on Arch with the new version of WebKit
49private-tmp
50
51# webkit gtk killed by memory-deny-write-execute
52#memory-deny-write-execute
diff --git a/etc/profile-a-l/audacious.profile b/etc/profile-a-l/audacious.profile
new file mode 100644
index 000000000..2e1f6f32a
--- /dev/null
+++ b/etc/profile-a-l/audacious.profile
@@ -0,0 +1,44 @@
1# Firejail profile for audacious
2# Description: Small and fast audio player which supports lots of formats
3# This file is overwritten after every install/update
4# Persistent local customizations
5include audacious.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Audaciousrc
10noblacklist ${HOME}/.config/audacious
11noblacklist ${MUSIC}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25netfilter
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix,inet,inet6
33seccomp
34shell none
35tracelog
36
37# private-bin audacious
38private-cache
39private-dev
40private-tmp
41
42# dbus needed for MPRIS
43# dbus-user none
44# dbus-system none
diff --git a/etc/profile-a-l/audacity.profile b/etc/profile-a-l/audacity.profile
new file mode 100644
index 000000000..5a454d31d
--- /dev/null
+++ b/etc/profile-a-l/audacity.profile
@@ -0,0 +1,45 @@
1# Firejail profile for audacity
2# Description: Fast, cross-platform audio editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include audacity.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.audacity-data
10noblacklist ${DOCUMENTS}
11noblacklist ${MUSIC}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25net none
26no3d
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37tracelog
38
39private-bin audacity
40private-dev
41private-tmp
42
43# problems on Fedora 27
44# dbus-user none
45# dbus-system none
diff --git a/etc/profile-a-l/audio-recorder.profile b/etc/profile-a-l/audio-recorder.profile
new file mode 100644
index 000000000..b2ed3b030
--- /dev/null
+++ b/etc/profile-a-l/audio-recorder.profile
@@ -0,0 +1,50 @@
1# Firejail profile for audio-recorder
2# Description: Audio Recorder Application
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include audio-recorder.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${MUSIC}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20whitelist ${MUSIC}
21whitelist ${DOWNLOADS}
22whitelist /usr/share/audio-recorder
23include whitelist-common.inc
24include whitelist-usr-share-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29ipc-namespace
30net none
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36notv
37nou2f
38novideo
39protocol unix
40seccomp
41shell none
42tracelog
43
44disable-mnt
45# private-bin audio-recorder
46private-cache
47private-etc alternatives,fonts
48private-tmp
49
50# memory-deny-write-execute - breaks on Arch
diff --git a/etc/profile-a-l/aunpack.profile b/etc/profile-a-l/aunpack.profile
new file mode 100644
index 000000000..6ce4aa491
--- /dev/null
+++ b/etc/profile-a-l/aunpack.profile
@@ -0,0 +1,11 @@
1# Firejail profile for aunpack
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include aunpack.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include atool.profile
diff --git a/etc/profile-a-l/authenticator.profile b/etc/profile-a-l/authenticator.profile
new file mode 100644
index 000000000..131b20c70
--- /dev/null
+++ b/etc/profile-a-l/authenticator.profile
@@ -0,0 +1,49 @@
1# Firejail profile for authenticator
2# Description: 2FA code generator for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include authenticator.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/Authenticator
10noblacklist ${HOME}/.config/Authenticator
11
12# Allow python (blacklisted by disable-interpreters.inc)
13#include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22
23# apparmor
24caps.drop all
25netfilter
26no3d
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34# novideo
35protocol unix,inet,inet6
36seccomp
37shell none
38
39disable-mnt
40# private-bin authenticator,python*
41private-dev
42private-etc alternatives,ca-certificates,crypto-policies,fonts,ld.so.cache,pki,resolv.conf,ssl
43private-tmp
44
45# makes settings immutable
46# dbus-user none
47# dbus-system none
48
49#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-a-l/autokey-common.profile b/etc/profile-a-l/autokey-common.profile
new file mode 100644
index 000000000..b1a77c0a4
--- /dev/null
+++ b/etc/profile-a-l/autokey-common.profile
@@ -0,0 +1,42 @@
1# Firejail profile for autokey
2# Description: Desktop automation utility
3# This file is overwritten after every install/update
4# Persistent local customizations
5include autokey-common.local
6# Persistent global definitions
7# added by caller profile
8#include globals.local
9
10noblacklist ${HOME}/.config/autokey
11noblacklist ${HOME}/.local/share/autokey
12
13# Allow python (blacklisted by disable-interpreters.inc)
14include allow-python2.inc
15include allow-python3.inc
16
17include disable-common.inc
18include disable-devel.inc
19# disable-exec.inc might break scripting functionality
20#include disable-exec.inc
21include disable-interpreters.inc
22include disable-passwdmgr.inc
23include disable-programs.inc
24include whitelist-var-common.inc
25
26caps.drop all
27netfilter
28no3d
29nogroups
30nonewprivs
31noroot
32nou2f
33protocol unix,inet,inet6
34seccomp
35shell none
36tracelog
37
38private-cache
39private-dev
40private-tmp
41
42#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-a-l/autokey-gtk.profile b/etc/profile-a-l/autokey-gtk.profile
new file mode 100644
index 000000000..e16449064
--- /dev/null
+++ b/etc/profile-a-l/autokey-gtk.profile
@@ -0,0 +1,10 @@
1# Firejail profile for autokey-gtk
2# Description: Desktop automation utility (GTK version)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include autokey-gtk.local
6# Persistent global definitions
7include globals.local
8
9# Redirect
10include autokey-common.profile
diff --git a/etc/profile-a-l/autokey-qt.profile b/etc/profile-a-l/autokey-qt.profile
new file mode 100644
index 000000000..b6f1210dd
--- /dev/null
+++ b/etc/profile-a-l/autokey-qt.profile
@@ -0,0 +1,10 @@
1# Firejail profile for autokey-qt
2# Description: Desktop automation utility (Qt version)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include autokey-qt.local
6# Persistent global definitions
7include globals.local
8
9# Redirect
10include autokey-common.profile
diff --git a/etc/profile-a-l/autokey-run.profile b/etc/profile-a-l/autokey-run.profile
new file mode 100644
index 000000000..05669351a
--- /dev/null
+++ b/etc/profile-a-l/autokey-run.profile
@@ -0,0 +1,10 @@
1# Firejail profile for autokey-run
2# Description: Desktop automation utility (CLI version)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include autokey-run.local
6# Persistent global definitions
7include globals.local
8
9# Redirect
10include autokey-common.profile
diff --git a/etc/profile-a-l/autokey-shell.profile b/etc/profile-a-l/autokey-shell.profile
new file mode 100644
index 000000000..dfbd8759f
--- /dev/null
+++ b/etc/profile-a-l/autokey-shell.profile
@@ -0,0 +1,10 @@
1# Firejail profile for autokey-shell
2# Description: Desktop automation utility (CLI shell)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include autokey-shell.local
6# Persistent global definitions
7include globals.local
8
9# Redirect
10include autokey-common.profile
diff --git a/etc/profile-a-l/aweather.profile b/etc/profile-a-l/aweather.profile
new file mode 100644
index 000000000..d7228570f
--- /dev/null
+++ b/etc/profile-a-l/aweather.profile
@@ -0,0 +1,39 @@
1# Firejail profile for aweather
2# Description: Advanced Weather Monitoring Program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include aweather.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/aweather
10
11include disable-common.inc
12include disable-devel.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17mkdir ${HOME}/.config/aweather
18whitelist ${HOME}/.config/aweather
19include whitelist-common.inc
20include whitelist-var-common.inc
21
22caps.drop all
23netfilter
24nodvd
25nogroups
26nonewprivs
27noroot
28nosound
29notv
30nou2f
31novideo
32protocol unix,inet,inet6
33seccomp
34shell none
35tracelog
36
37private-bin aweather
38private-dev
39private-tmp
diff --git a/etc/profile-a-l/awesome.profile b/etc/profile-a-l/awesome.profile
new file mode 100644
index 000000000..5d1bf5071
--- /dev/null
+++ b/etc/profile-a-l/awesome.profile
@@ -0,0 +1,19 @@
1# Firejail profile for awesome
2# Description: Standards-compliant, fast, light-weight and extensible window manager
3# This file is overwritten after every install/update
4# Persistent local customizations
5include awesome.local
6# Persistent global definitions
7include globals.local
8
9# all applications started in awesome will run in this profile
10noblacklist ${HOME}/.config/awesome
11include disable-common.inc
12
13caps.drop all
14netfilter
15noroot
16protocol unix,inet,inet6
17seccomp
18
19read-only ${HOME}/.config/awesome/autorun.sh
diff --git a/etc/profile-a-l/baloo_file.profile b/etc/profile-a-l/baloo_file.profile
new file mode 100644
index 000000000..785e37a16
--- /dev/null
+++ b/etc/profile-a-l/baloo_file.profile
@@ -0,0 +1,54 @@
1# Firejail profile for baloo_file
2# This file is overwritten after every install/update
3# Persistent local customizations
4include baloo_file.local
5# Persistent global definitions
6include globals.local
7
8# Make home directory read-only and allow writing only to ${HOME}/.local/share/baloo
9# Note: Baloo will not be able to update the "first run" key in its configuration files.
10# mkdir ${HOME}/.local/share/baloo
11# read-only ${HOME}
12# read-write ${HOME}/.local/share/baloo
13# ignore read-write
14
15noblacklist ${HOME}/.config/baloofilerc
16noblacklist ${HOME}/.kde/share/config/baloofilerc
17noblacklist ${HOME}/.kde/share/config/baloorc
18noblacklist ${HOME}/.kde4/share/config/baloofilerc
19noblacklist ${HOME}/.kde4/share/config/baloorc
20noblacklist ${HOME}/.local/share/baloo
21
22include disable-common.inc
23include disable-devel.inc
24include disable-exec.inc
25include disable-interpreters.inc
26include disable-passwdmgr.inc
27include disable-programs.inc
28
29include whitelist-var-common.inc
30
31apparmor
32caps.drop all
33machine-id
34# net none
35netfilter
36no3d
37nodvd
38nogroups
39nonewprivs
40noroot
41nosound
42notv
43nou2f
44novideo
45protocol unix
46# blacklisting of ioprio_set system calls breaks baloo_file
47seccomp !ioprio_set
48shell none
49# x11 xorg
50
51private-bin baloo_file,baloo_file_extractor,baloo_filemetadata_temp_extractor,kbuildsycoca4
52private-cache
53private-dev
54private-tmp
diff --git a/etc/profile-a-l/baloo_filemetadata_temp_extractor.profile b/etc/profile-a-l/baloo_filemetadata_temp_extractor.profile
new file mode 100644
index 000000000..ff10e9965
--- /dev/null
+++ b/etc/profile-a-l/baloo_filemetadata_temp_extractor.profile
@@ -0,0 +1,14 @@
1# Firejail profile for baloo_filemetadata_temp_extractor
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include baloo_filemetadata_temp_extractor.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10ignore read-write
11read-only ${HOME}
12
13# Redirect
14include baloo_file.profile
diff --git a/etc/profile-a-l/baobab.profile b/etc/profile-a-l/baobab.profile
new file mode 100644
index 000000000..50f7531c0
--- /dev/null
+++ b/etc/profile-a-l/baobab.profile
@@ -0,0 +1,42 @@
1# Firejail profile for baobab
2# Description: GNOME disk usage analyzer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include baobab.local
6# Persistent global definitions
7include globals.local
8
9# include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14# include disable-programs.inc
15# include disable-xdg.inc
16
17include whitelist-runuser-common.inc
18
19caps.drop all
20net none
21no3d
22nodvd
23nogroups
24nonewprivs
25noroot
26nosound
27notv
28nou2f
29novideo
30protocol unix
31seccomp
32shell none
33tracelog
34
35private-bin baobab
36private-dev
37private-tmp
38
39# dbus-user none
40# dbus-system none
41
42read-only ${HOME}
diff --git a/etc/profile-a-l/barrier.profile b/etc/profile-a-l/barrier.profile
new file mode 100644
index 000000000..f5da3782e
--- /dev/null
+++ b/etc/profile-a-l/barrier.profile
@@ -0,0 +1,45 @@
1# Firejail profile for barrier
2# Description: Keyboard and mouse sharing application
3# This file is overwritten after every install/update
4# Persistent local customizations
5include barrier.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Debauchee/Barrier.conf
10noblacklist ${HOME}/.local/share/barrier
11noblacklist ${PATH}/openssl
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-var-common.inc
22
23caps.drop all
24machine-id
25netfilter
26no3d
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix,inet,inet6,netlink
36seccomp
37shell none
38tracelog
39
40disable-mnt
41private-dev
42private-cache
43private-tmp
44
45memory-deny-write-execute
diff --git a/etc/profile-a-l/basilisk.profile b/etc/profile-a-l/basilisk.profile
new file mode 100644
index 000000000..8dc3847a0
--- /dev/null
+++ b/etc/profile-a-l/basilisk.profile
@@ -0,0 +1,26 @@
1# Firejail profile for basilisk
2# This file is overwritten after every install/update
3# Persistent local customizations
4include basilisk.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/moonchild productions/basilisk
9noblacklist ${HOME}/.moonchild productions/basilisk
10
11mkdir ${HOME}/.cache/moonchild productions/basilisk
12mkdir ${HOME}/.moonchild productions
13whitelist ${HOME}/.cache/moonchild productions/basilisk
14whitelist ${HOME}/.moonchild productions
15
16# Basilisk can use the full firejail seccomp filter (unlike firefox >= 60)
17seccomp
18ignore seccomp
19
20#private-bin basilisk
21# private-etc must first be enabled in firefox-common.profile
22#private-etc basilisk
23#private-opt basilisk
24
25# Redirect
26include firefox-common.profile
diff --git a/etc/profile-a-l/beaker.profile b/etc/profile-a-l/beaker.profile
new file mode 100644
index 000000000..cc1886a49
--- /dev/null
+++ b/etc/profile-a-l/beaker.profile
@@ -0,0 +1,19 @@
1# Firejail profile for beaker
2# This file is overwritten after every install/update
3# Persistent local customizations
4include beaker.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9noblacklist ${HOME}/.config/Beaker Browser
10
11include disable-devel.inc
12include disable-interpreters.inc
13
14mkdir ${HOME}/.config/Beaker Browser
15whitelist ${HOME}/.config/Beaker Browser
16include whitelist-common.inc
17
18# Redirect
19include electron.profile
diff --git a/etc/profile-a-l/bibletime.profile b/etc/profile-a-l/bibletime.profile
new file mode 100644
index 000000000..99e2802eb
--- /dev/null
+++ b/etc/profile-a-l/bibletime.profile
@@ -0,0 +1,58 @@
1# Firejail profile for bibletime
2# Description: Bible study tool
3# This file is overwritten after every install/update
4# Persistent local customizations
5include bibletime.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.bibletime
10noblacklist ${HOME}/.sword
11noblacklist ${HOME}/.local/share/bibletime
12
13blacklist ${HOME}/.bashrc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22mkdir ${HOME}/.bibletime
23mkdir ${HOME}/.sword
24mkdir ${HOME}/.local/share/bibletime
25whitelist ${HOME}/.bibletime
26whitelist ${HOME}/.sword
27whitelist ${HOME}/.local/share/bibletime
28whitelist /usr/share/bibletime
29whitelist /usr/share/sword
30include whitelist-common.inc
31include whitelist-usr-share-common.inc
32include whitelist-var-common.inc
33
34apparmor
35caps.drop all
36machine-id
37netfilter
38nodvd
39nogroups
40nonewprivs
41noroot
42nosound
43notv
44nou2f
45novideo
46protocol unix,inet,inet6,netlink
47seccomp !chroot
48shell none
49
50disable-mnt
51# private-bin bibletime,qt5ct
52private-cache
53private-dev
54private-etc alternatives,ca-certificates,crypto-policies,fonts,login.defs,machine-id,passwd,pki,resolv.conf,ssl,sword,sword.conf
55private-tmp
56
57dbus-user none
58dbus-system none
diff --git a/etc/profile-a-l/bibtex.profile b/etc/profile-a-l/bibtex.profile
new file mode 100644
index 000000000..e868dcbab
--- /dev/null
+++ b/etc/profile-a-l/bibtex.profile
@@ -0,0 +1,12 @@
1# Firejail profile for bibtex
2# This file is overwritten after every install/update
3# Persistent local customizations
4include bibtex.local
5# Persistent global definitions
6include globals.local
7
8private-bin bibtex
9
10# Redirect
11include latex-common.profile
12
diff --git a/etc/profile-a-l/bitcoin-qt.profile b/etc/profile-a-l/bitcoin-qt.profile
new file mode 100644
index 000000000..ac1e21ba7
--- /dev/null
+++ b/etc/profile-a-l/bitcoin-qt.profile
@@ -0,0 +1,49 @@
1# Firejail profile for bitcoin-qt
2# Description: Bitcoin is a peer-to-peer network based digital currency
3# This file is overwritten after every install/update
4# Persistent local customizations
5include bitcoin-qt.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.bitcoin
10noblacklist ${HOME}/.config/Bitcoin
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19mkdir ${HOME}/.bitcoin
20mkdir ${HOME}/.config/Bitcoin
21whitelist ${HOME}/.bitcoin
22whitelist ${HOME}/.config/Bitcoin
23include whitelist-common.inc
24include whitelist-var-common.inc
25
26caps.drop all
27machine-id
28netfilter
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix,inet,inet6
39seccomp
40shell none
41tracelog
42
43private-bin bitcoin-qt
44private-dev
45# Causes problem with loading of libGL.so
46#private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl
47private-tmp
48
49memory-deny-write-execute
diff --git a/etc/profile-a-l/bitlbee.profile b/etc/profile-a-l/bitlbee.profile
new file mode 100644
index 000000000..62eeb88f3
--- /dev/null
+++ b/etc/profile-a-l/bitlbee.profile
@@ -0,0 +1,40 @@
1# Firejail profile for bitlbee
2# Description: IRC to other chat networks gateway
3# This file is overwritten after every install/update
4# Persistent local customizations
5include bitlbee.local
6# Persistent global definitions
7include globals.local
8
9ignore noexec ${HOME}
10
11noblacklist /sbin
12noblacklist /usr/sbin
13# noblacklist /var/log
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23netfilter
24no3d
25nodvd
26nonewprivs
27nosound
28notv
29nou2f
30novideo
31protocol unix,inet,inet6
32seccomp
33
34disable-mnt
35private
36private-cache
37private-dev
38private-tmp
39
40read-write /var/lib/bitlbee
diff --git a/etc/profile-a-l/bitwarden.profile b/etc/profile-a-l/bitwarden.profile
new file mode 100644
index 000000000..3095e7505
--- /dev/null
+++ b/etc/profile-a-l/bitwarden.profile
@@ -0,0 +1,57 @@
1# Firejail profile for bitwarden
2# Description: A secure and free password manager for all of your devices
3# This file is overwritten after every install/update.
4# Persistent local customisations
5include bitwarden.local
6# Persistent global definitions
7include globals.local
8
9ignore noexec /tmp
10
11noblacklist ${HOME}/.config/Bitwarden
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21mkdir ${HOME}/.config/Bitwarden
22whitelist ${HOME}/.config/Bitwarden
23whitelist ${DOWNLOADS}
24include whitelist-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29machine-id
30netfilter
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix,inet,inet6,netlink
41seccomp !chroot
42shell none
43#tracelog - breaks on Arch
44
45private-bin bitwarden
46private-cache
47?HAS_APPIMAGE: ignore private-dev
48private-dev
49private-etc alternatives,ca-certificates,crypto-policies,fonts,hosts,nsswitch.conf,pki,resolv.conf,ssl
50private-opt Bitwarden
51private-tmp
52
53# breaks appindicator (tray) functionality
54# dbus-user none
55# dbus-system none
56
57#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-a-l/blackbox.profile b/etc/profile-a-l/blackbox.profile
new file mode 100644
index 000000000..13e83493d
--- /dev/null
+++ b/etc/profile-a-l/blackbox.profile
@@ -0,0 +1,18 @@
1# Firejail profile for blackbox
2# Description: Standards-compliant, fast, light-weight and extensible window manager
3# This file is overwritten after every install/update
4# Persistent local customizations
5include blackbox.local
6# Persistent global definitions
7include globals.local
8
9# all applications started in awesome will run in this profile
10noblacklist ${HOME}/.blackbox
11include disable-common.inc
12
13caps.drop all
14netfilter
15noroot
16protocol unix,inet,inet6
17seccomp
18
diff --git a/etc/profile-a-l/bleachbit.profile b/etc/profile-a-l/bleachbit.profile
new file mode 100644
index 000000000..8f230a413
--- /dev/null
+++ b/etc/profile-a-l/bleachbit.profile
@@ -0,0 +1,42 @@
1# Firejail profile for bleachbit
2# Description: Delete unnecessary files from the system
3# This file is overwritten after every install/update
4# Persistent local customizations
5include bleachbit.local
6# Persistent global definitions
7include globals.local
8
9# Allow python (blacklisted by disable-interpreters.inc)
10include allow-python2.inc
11include allow-python3.inc
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18# include disable-programs.inc
19
20caps.drop all
21net none
22no3d
23nodvd
24nogroups
25nonewprivs
26noroot
27nosound
28notv
29nou2f
30novideo
31protocol unix
32seccomp
33shell none
34
35private-dev
36# private-tmp
37
38dbus-user none
39dbus-system none
40
41# memory-deny-write-execute breaks some systems, see issue #1850
42# memory-deny-write-execute
diff --git a/etc/profile-a-l/blender-2.8.profile b/etc/profile-a-l/blender-2.8.profile
new file mode 100644
index 000000000..b7242c443
--- /dev/null
+++ b/etc/profile-a-l/blender-2.8.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for blender
2# This file is overwritten after every install/update
3
4# Redirect
5include blender.profile
diff --git a/etc/profile-a-l/blender.profile b/etc/profile-a-l/blender.profile
new file mode 100644
index 000000000..6a72fb602
--- /dev/null
+++ b/etc/profile-a-l/blender.profile
@@ -0,0 +1,41 @@
1# Firejail profile for blender
2# Description: Very fast and versatile 3D modeller/renderer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include blender.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/blender
10
11# Allow python (blacklisted by disable-interpreters.inc)
12include allow-python2.inc
13include allow-python3.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22# Allow usage of AMD GPU by OpenCL
23noblacklist /sys/module
24whitelist /sys/module/amdgpu
25read-only /sys/module/amdgpu
26
27caps.drop all
28netfilter
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35protocol unix,inet,inet6,netlink
36seccomp
37shell none
38
39private-dev
40private-tmp
41
diff --git a/etc/profile-a-l/bless.profile b/etc/profile-a-l/bless.profile
new file mode 100644
index 000000000..216e86109
--- /dev/null
+++ b/etc/profile-a-l/bless.profile
@@ -0,0 +1,42 @@
1# Firejail profile for bless
2# Description: A full featured hexadecimal editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include bless.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/bless
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18include whitelist-var-common.inc
19
20caps.drop all
21net none
22no3d
23nodvd
24nogroups
25nonewprivs
26noroot
27nosound
28notv
29nou2f
30novideo
31protocol unix
32seccomp
33shell none
34
35# private-bin bash,bless,mono,sh
36private-cache
37private-dev
38private-etc alternatives,fonts,mono
39private-tmp
40
41dbus-user none
42dbus-system none
diff --git a/etc/profile-a-l/blobwars.profile b/etc/profile-a-l/blobwars.profile
new file mode 100644
index 000000000..2a56bdf94
--- /dev/null
+++ b/etc/profile-a-l/blobwars.profile
@@ -0,0 +1,49 @@
1# Firejail profile for blobwars
2# Description: Mission and Objective based 2D Platform Game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include blobwars.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.parallelrealities/blobwars
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.parallelrealities/blobwars
20whitelist ${HOME}/.parallelrealities/blobwars
21whitelist /usr/share/blobwars
22include whitelist-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28net none
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol unix,netlink
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private-bin blobwars
43private-cache
44private-dev
45private-etc machine-id
46private-tmp
47
48dbus-user none
49dbus-system none
diff --git a/etc/profile-a-l/bluefish.profile b/etc/profile-a-l/bluefish.profile
new file mode 100644
index 000000000..88ac9c0ed
--- /dev/null
+++ b/etc/profile-a-l/bluefish.profile
@@ -0,0 +1,40 @@
1# Firejail profile for bluefish
2# Description: Advanced Gtk+ text editor for web and software development
3# This file is overwritten after every install/update
4# Persistent local customizations
5include bluefish.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15
16include whitelist-var-common.inc
17
18apparmor
19caps.drop all
20net none
21no3d
22nodvd
23nogroups
24nonewprivs
25noroot
26nosound
27notv
28nou2f
29novideo
30protocol unix
31seccomp
32shell none
33tracelog
34
35private-bin bluefish
36private-dev
37private-tmp
38
39dbus-user none
40dbus-system none
diff --git a/etc/profile-a-l/bnox.profile b/etc/profile-a-l/bnox.profile
new file mode 100644
index 000000000..031f3f4bd
--- /dev/null
+++ b/etc/profile-a-l/bnox.profile
@@ -0,0 +1,17 @@
1# Firejail profile for bnox
2# This file is overwritten after every install/update
3# Persistent local customizations
4include bnox.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/bnox
9noblacklist ${HOME}/.config/bnox
10
11mkdir ${HOME}/.cache/bnox
12mkdir ${HOME}/.config/bnox
13whitelist ${HOME}/.cache/bnox
14whitelist ${HOME}/.config/bnox
15
16# Redirect
17include chromium-common.profile
diff --git a/etc/profile-a-l/brackets.profile b/etc/profile-a-l/brackets.profile
new file mode 100644
index 000000000..70f62813e
--- /dev/null
+++ b/etc/profile-a-l/brackets.profile
@@ -0,0 +1,34 @@
1# Firejail profile for brackets
2# This file is overwritten after every install/update
3# Persistent local customizations
4include brackets.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/Brackets
9#noblacklist /opt/brackets
10#noblacklist /opt/google
11
12# Allows files commonly used by IDEs
13include allow-common-devel.inc
14
15include disable-common.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19caps.drop all
20netfilter
21nodvd
22nogroups
23nonewprivs
24noroot
25nosound
26notv
27nou2f
28novideo
29protocol unix,inet,inet6,netlink
30seccomp !chroot,!ioperm
31shell none
32
33private-cache
34private-dev
diff --git a/etc/profile-a-l/brasero.profile b/etc/profile-a-l/brasero.profile
new file mode 100644
index 000000000..417a6b3e0
--- /dev/null
+++ b/etc/profile-a-l/brasero.profile
@@ -0,0 +1,37 @@
1# Firejail profile for brasero
2# Description: CD/DVD burning application for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include brasero.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/brasero
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18include whitelist-var-common.inc
19
20apparmor
21caps.drop all
22net none
23nogroups
24nonewprivs
25noroot
26nosound
27notv
28novideo
29protocol unix
30seccomp
31shell none
32tracelog
33
34# private-bin brasero
35private-cache
36# private-dev
37# private-tmp
diff --git a/etc/profile-a-l/brave-browser-beta.profile b/etc/profile-a-l/brave-browser-beta.profile
new file mode 100644
index 000000000..528a6402d
--- /dev/null
+++ b/etc/profile-a-l/brave-browser-beta.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for brave (beta channel)
2# This file is overwritten after every install/update
3
4# Redirect
5include brave.profile
diff --git a/etc/profile-a-l/brave-browser-dev.profile b/etc/profile-a-l/brave-browser-dev.profile
new file mode 100644
index 000000000..4601de119
--- /dev/null
+++ b/etc/profile-a-l/brave-browser-dev.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for brave (development channel)
2# This file is overwritten after every install/update
3
4# Redirect
5include brave.profile
diff --git a/etc/profile-a-l/brave-browser-nightly.profile b/etc/profile-a-l/brave-browser-nightly.profile
new file mode 100644
index 000000000..43d3cc724
--- /dev/null
+++ b/etc/profile-a-l/brave-browser-nightly.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for brave (nightly channel)
2# This file is overwritten after every install/update
3
4# Redirect
5include brave.profile
diff --git a/etc/profile-a-l/brave-browser-stable.profile b/etc/profile-a-l/brave-browser-stable.profile
new file mode 100644
index 000000000..06d33dea4
--- /dev/null
+++ b/etc/profile-a-l/brave-browser-stable.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for brave (release channel)
2# This file is overwritten after every install/update
3
4# Redirect
5include brave.profile
diff --git a/etc/profile-a-l/brave-browser.profile b/etc/profile-a-l/brave-browser.profile
new file mode 100644
index 000000000..e223ecf87
--- /dev/null
+++ b/etc/profile-a-l/brave-browser.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for brave
2# This file is overwritten after every install/update
3
4# Redirect
5include brave.profile
diff --git a/etc/profile-a-l/brave.profile b/etc/profile-a-l/brave.profile
new file mode 100644
index 000000000..35c59f5a3
--- /dev/null
+++ b/etc/profile-a-l/brave.profile
@@ -0,0 +1,32 @@
1# Firejail profile for brave
2# Description: Web browser that blocks ads and trackers by default.
3# This file is overwritten after every install/update
4# Persistent local customizations
5include brave.local
6# Persistent global definitions
7include globals.local
8
9# noexec /tmp is included in chromium-common.profile and breaks Brave
10ignore noexec /tmp
11
12noblacklist ${HOME}/.cache/BraveSoftware
13noblacklist ${HOME}/.config/BraveSoftware
14noblacklist ${HOME}/.config/brave
15noblacklist ${HOME}/.config/brave-flags.conf
16# brave uses gpg for built-in password manager
17noblacklist ${HOME}/.gnupg
18
19mkdir ${HOME}/.cache/BraveSoftware
20mkdir ${HOME}/.config/BraveSoftware
21mkdir ${HOME}/.config/brave
22whitelist ${HOME}/.cache/BraveSoftware
23whitelist ${HOME}/.config/BraveSoftware
24whitelist ${HOME}/.config/brave
25whitelist ${HOME}/.config/brave-flags.conf
26whitelist ${HOME}/.gnupg
27
28# Brave sandbox needs read access to /proc/config.gz
29noblacklist /proc/config.gz
30
31# Redirect
32include chromium-common.profile
diff --git a/etc/profile-a-l/bsdcat.profile b/etc/profile-a-l/bsdcat.profile
new file mode 100644
index 000000000..5271ee5d6
--- /dev/null
+++ b/etc/profile-a-l/bsdcat.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for bsdtar
2# This file is overwritten after every install/update
3
4# Redirect
5include bsdtar.profile
diff --git a/etc/profile-a-l/bsdcpio.profile b/etc/profile-a-l/bsdcpio.profile
new file mode 100644
index 000000000..5271ee5d6
--- /dev/null
+++ b/etc/profile-a-l/bsdcpio.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for bsdtar
2# This file is overwritten after every install/update
3
4# Redirect
5include bsdtar.profile
diff --git a/etc/profile-a-l/bsdtar.profile b/etc/profile-a-l/bsdtar.profile
new file mode 100644
index 000000000..08e51f3c1
--- /dev/null
+++ b/etc/profile-a-l/bsdtar.profile
@@ -0,0 +1,48 @@
1# Firejail profile for bsdtar
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include bsdtar.local
6# Persistent global definitions
7include globals.local
8
9blacklist ${RUNUSER}/wayland-*
10
11include disable-common.inc
12# include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18apparmor
19caps.drop all
20hostname bsdtar
21ipc-namespace
22machine-id
23net none
24no3d
25nodvd
26nogroups
27nonewprivs
28# noroot
29nosound
30notv
31nou2f
32novideo
33protocol unix
34seccomp
35shell none
36tracelog
37x11 none
38
39# support compressed archives
40private-bin bash,bsdcat,bsdcpio,bsdtar,bzip2,compress,gtar,gzip,lbzip2,libarchive,lz4,lzip,lzma,lzop,sh,xz
41private-cache
42private-dev
43private-etc alternatives,group,localtime,passwd
44
45dbus-user none
46dbus-system none
47
48memory-deny-write-execute
diff --git a/etc/profile-a-l/bunzip2.profile b/etc/profile-a-l/bunzip2.profile
new file mode 100644
index 000000000..37b47c2ce
--- /dev/null
+++ b/etc/profile-a-l/bunzip2.profile
@@ -0,0 +1,12 @@
1# Firejail profile for bunzip2
2# Description: A high-quality data compression program
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include bunzip2.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include gzip.profile
diff --git a/etc/profile-a-l/bzcat.profile b/etc/profile-a-l/bzcat.profile
new file mode 100644
index 000000000..edefb6bb8
--- /dev/null
+++ b/etc/profile-a-l/bzcat.profile
@@ -0,0 +1,15 @@
1# Firejail profile for bzcat
2# Description: A high-quality data compression program
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include bzcat.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11ignore read-write
12read-only ${HOME}
13
14# Redirect
15include gzip.profile
diff --git a/etc/profile-a-l/bzflag.profile b/etc/profile-a-l/bzflag.profile
new file mode 100644
index 000000000..1f56d5169
--- /dev/null
+++ b/etc/profile-a-l/bzflag.profile
@@ -0,0 +1,46 @@
1# Firejail profile for bzflag
2# Description: 3D multi-player tank battle game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include bzflag.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.bzf
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.bzf
20whitelist ${HOME}/.bzf
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24caps.drop all
25ipc-namespace
26netfilter
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix,inet,inet6
35seccomp
36shell none
37tracelog
38
39disable-mnt
40private-bin bzadmin,bzflag,bzflag-wrapper,bzfs
41private-cache
42private-dev
43private-tmp
44
45dbus-user none
46dbus-system none
diff --git a/etc/profile-a-l/bzip2.profile b/etc/profile-a-l/bzip2.profile
new file mode 100644
index 000000000..0756e0537
--- /dev/null
+++ b/etc/profile-a-l/bzip2.profile
@@ -0,0 +1,12 @@
1# Firejail profile for bzip2
2# Description: A high-quality data compression program
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include bzip2.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include gzip.profile
diff --git a/etc/profile-a-l/caja.profile b/etc/profile-a-l/caja.profile
new file mode 100644
index 000000000..7bf901ae3
--- /dev/null
+++ b/etc/profile-a-l/caja.profile
@@ -0,0 +1,43 @@
1# Firejail profile for caja
2# Description: File manager for the MATE desktop
3# This file is overwritten after every install/update
4# Persistent local customizations
5include caja.local
6# Persistent global definitions
7include globals.local
8
9# Caja is started by systemd on most systems. Therefore it is not firejailed by default. Since there
10# is already a caja process running on MATE desktops firejail will have no effect.
11
12noblacklist ${HOME}/.local/share/Trash
13# noblacklist ${HOME}/.config/caja - disable-programs.inc is disabled, see below
14# noblacklist ${HOME}/.local/share/caja-python
15
16# Allow python (blacklisted by disable-interpreters.inc)
17include allow-python2.inc
18include allow-python3.inc
19
20include disable-common.inc
21include disable-devel.inc
22include disable-interpreters.inc
23include disable-passwdmgr.inc
24# include disable-programs.inc
25
26allusers
27caps.drop all
28netfilter
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34novideo
35protocol unix
36seccomp
37shell none
38tracelog
39
40# caja needs to be able to start arbitrary applications so we cannot blacklist their files
41# private-bin caja
42# private-dev
43# private-tmp
diff --git a/etc/profile-a-l/calibre.profile b/etc/profile-a-l/calibre.profile
new file mode 100644
index 000000000..d17cfa85f
--- /dev/null
+++ b/etc/profile-a-l/calibre.profile
@@ -0,0 +1,38 @@
1# Firejail profile for calibre
2# Description: Powerful and easy to use e-book manager
3# This file is overwritten after every install/update
4# Persistent local customizations
5include calibre.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/calibre
10noblacklist ${HOME}/.config/calibre
11noblacklist ${DOCUMENTS}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-var-common.inc
21
22apparmor
23caps.drop all
24netfilter
25nodvd
26nogroups
27nonewprivs
28noroot
29nosound
30notv
31nou2f
32novideo
33protocol unix,inet,inet6,netlink
34seccomp !chroot
35shell none
36
37private-dev
38private-tmp
diff --git a/etc/profile-a-l/calligra.profile b/etc/profile-a-l/calligra.profile
new file mode 100644
index 000000000..489036e39
--- /dev/null
+++ b/etc/profile-a-l/calligra.profile
@@ -0,0 +1,37 @@
1# Firejail profile for calligra
2# Description: Extensive productivity and creative suite
3# This file is overwritten after every install/update
4# Persistent local customizations
5include calligra.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-interpreters.inc
12include disable-passwdmgr.inc
13include disable-programs.inc
14
15caps.drop all
16ipc-namespace
17# net none
18netfilter
19nodvd
20nogroups
21nonewprivs
22noroot
23notv
24nou2f
25novideo
26protocol unix
27seccomp
28shell none
29
30private-bin calligra,calligraauthor,calligraconverter,calligraflow,calligraplan,calligraplanwork,calligrasheets,calligrastage,calligrawords,dbus-launch,kbuildsycoca4,kdeinit4
31private-dev
32
33# dbus-user none
34# dbus-system none
35
36# noexec ${HOME}
37noexec /tmp
diff --git a/etc/profile-a-l/calligraauthor.profile b/etc/profile-a-l/calligraauthor.profile
new file mode 100644
index 000000000..7804a3b97
--- /dev/null
+++ b/etc/profile-a-l/calligraauthor.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4# Redirect
5include calligra.profile
diff --git a/etc/profile-a-l/calligraconverter.profile b/etc/profile-a-l/calligraconverter.profile
new file mode 100644
index 000000000..7804a3b97
--- /dev/null
+++ b/etc/profile-a-l/calligraconverter.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4# Redirect
5include calligra.profile
diff --git a/etc/profile-a-l/calligraflow.profile b/etc/profile-a-l/calligraflow.profile
new file mode 100644
index 000000000..7804a3b97
--- /dev/null
+++ b/etc/profile-a-l/calligraflow.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4# Redirect
5include calligra.profile
diff --git a/etc/profile-a-l/calligraplan.profile b/etc/profile-a-l/calligraplan.profile
new file mode 100644
index 000000000..7804a3b97
--- /dev/null
+++ b/etc/profile-a-l/calligraplan.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4# Redirect
5include calligra.profile
diff --git a/etc/profile-a-l/calligraplanwork.profile b/etc/profile-a-l/calligraplanwork.profile
new file mode 100644
index 000000000..7804a3b97
--- /dev/null
+++ b/etc/profile-a-l/calligraplanwork.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4# Redirect
5include calligra.profile
diff --git a/etc/profile-a-l/calligrasheets.profile b/etc/profile-a-l/calligrasheets.profile
new file mode 100644
index 000000000..7804a3b97
--- /dev/null
+++ b/etc/profile-a-l/calligrasheets.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4# Redirect
5include calligra.profile
diff --git a/etc/profile-a-l/calligrastage.profile b/etc/profile-a-l/calligrastage.profile
new file mode 100644
index 000000000..7804a3b97
--- /dev/null
+++ b/etc/profile-a-l/calligrastage.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4# Redirect
5include calligra.profile
diff --git a/etc/profile-a-l/calligrawords.profile b/etc/profile-a-l/calligrawords.profile
new file mode 100644
index 000000000..7804a3b97
--- /dev/null
+++ b/etc/profile-a-l/calligrawords.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4# Redirect
5include calligra.profile
diff --git a/etc/profile-a-l/cameramonitor.profile b/etc/profile-a-l/cameramonitor.profile
new file mode 100644
index 000000000..f48cc43a1
--- /dev/null
+++ b/etc/profile-a-l/cameramonitor.profile
@@ -0,0 +1,55 @@
1# Firejail profile for cameramonitor
2# Description: A little monitor to check your webcam status
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include cameramonitor.local
7# Persistent global definitions
8include globals.local
9
10# Allow python (blacklisted by disable-interpreters.inc)
11include allow-python2.inc
12include allow-python3.inc
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22whitelist /usr/share/cameramonitor
23include whitelist-common.inc
24include whitelist-usr-share-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29ipc-namespace
30machine-id
31net none
32no3d
33nodvd
34nogroups
35nonewprivs
36noroot
37nosound
38notv
39nou2f
40novideo
41protocol unix
42seccomp
43shell none
44tracelog
45
46disable-mnt
47private-bin cameramonitor,python*
48private-cache
49private-etc alternatives,fonts
50private-tmp
51
52# dbus-user none
53# dbus-system none
54
55# memory-deny-write-execute - breaks on Arch
diff --git a/etc/profile-a-l/cantata.profile b/etc/profile-a-l/cantata.profile
new file mode 100644
index 000000000..c44d56b90
--- /dev/null
+++ b/etc/profile-a-l/cantata.profile
@@ -0,0 +1,39 @@
1# Firejail profile for Cantata
2# Description: Multimedia player - Qt5 client for the music Player daemon (MPD)
3# This file is overwritten during software install.
4# Persistent local customizations
5include cantata.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/cantata
10noblacklist ${HOME}/.config/cantata
11noblacklist ${HOME}/.local/share/cantata
12noblacklist ${MUSIC}
13
14# Allow perl (blacklisted by disable-interpreters.inc)
15include allow-perl.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25# apparmor
26caps.drop all
27ipc-namespace
28netfilter
29nonewprivs
30noroot
31nou2f
32novideo
33protocol unix,inet,inet6,netlink
34seccomp
35shell none
36
37# private-etc drirc,fonts,gcrypt,hosts,kde5rc,mpd.conf,passwd,samba,ssl,xdg
38private-bin cantata,mpd,perl
39private-dev
diff --git a/etc/profile-a-l/catfish.profile b/etc/profile-a-l/catfish.profile
new file mode 100644
index 000000000..009d3a049
--- /dev/null
+++ b/etc/profile-a-l/catfish.profile
@@ -0,0 +1,50 @@
1# Firejail profile for catfish
2# Description: File searching tool
3# This file is overwritten after every install/update
4# Persistent local customizations
5include catfish.local
6# Persistent global definitions
7include globals.local
8
9# We can't blacklist much since catfish
10# is for finding files/content
11
12noblacklist ${HOME}/.config/catfish
13
14# Allow python (blacklisted by disable-interpreters.inc)
15include allow-python2.inc
16include allow-python3.inc
17
18# include disable-common.inc
19# include disable-devel.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22# include disable-programs.inc
23
24whitelist /var/lib/mlocate
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29net none
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37novideo
38protocol unix
39seccomp
40shell none
41tracelog
42
43# These options work but are disabled in case
44# a users wants to search in these directories.
45# private-bin bash,catfish,env,locate,ls,mlocate,python*
46# private-dev
47# private-tmp
48
49dbus-user none
50dbus-system none
diff --git a/etc/profile-a-l/celluloid.profile b/etc/profile-a-l/celluloid.profile
new file mode 100644
index 000000000..9be6b1631
--- /dev/null
+++ b/etc/profile-a-l/celluloid.profile
@@ -0,0 +1,54 @@
1# Firejail profile for celluloid
2# Description: Simple GTK+ frontend for mpv
3# This file is overwritten after every install/update
4# Persistent local customizations
5include celluloid.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/celluloid
10noblacklist ${HOME}/.config/gnome-mpv
11noblacklist ${HOME}/.config/youtube-dl
12noblacklist ${MUSIC}
13noblacklist ${VIDEOS}
14
15# Allow python (blacklisted by disable-interpreters.inc)
16include allow-python2.inc
17include allow-python3.inc
18
19include disable-common.inc
20include disable-devel.inc
21include disable-exec.inc
22include disable-interpreters.inc
23include disable-passwdmgr.inc
24include disable-programs.inc
25include disable-xdg.inc
26
27include whitelist-runuser-common.inc
28include whitelist-usr-share-common.inc
29include whitelist-var-common.inc
30
31apparmor
32caps.drop all
33netfilter
34nogroups
35nonewprivs
36noroot
37nou2f
38protocol unix,inet,inet6
39seccomp
40shell none
41tracelog
42
43private-bin celluloid,env,gnome-mpv,python*,youtube-dl
44private-cache
45private-etc alternatives,ca-certificates,crypto-policies,dconf,drirc,fonts,gtk-3.0,hosts,ld.so.cache,libva.conf,localtime,machine-id,pkcs11,pki,resolv.conf,selinux,ssl,xdg
46private-dev
47private-tmp
48
49# uses dconf, MPRIS
50# dbus-user none
51# dbus-system none
52
53read-only ${HOME}
54read-write ${HOME}/.config/celluloid
diff --git a/etc/profile-a-l/checkbashisms.profile b/etc/profile-a-l/checkbashisms.profile
new file mode 100644
index 000000000..93f61091b
--- /dev/null
+++ b/etc/profile-a-l/checkbashisms.profile
@@ -0,0 +1,56 @@
1# Firejail profile for checkbashisms
2# Description: Lint tool for shell scripts
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include checkbashisms.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12noblacklist ${DOCUMENTS}
13
14# Allow perl (blacklisted by disable-interpreters.inc)
15include allow-perl.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25whitelist /usr/share/perl5
26include whitelist-usr-share-common.inc
27include whitelist-var-common.inc
28
29apparmor
30caps.drop all
31ipc-namespace
32machine-id
33net none
34no3d
35nodvd
36nogroups
37nonewprivs
38noroot
39nosound
40notv
41nou2f
42novideo
43protocol unix
44seccomp
45shell none
46x11 none
47
48private-cache
49private-dev
50private-lib libfreebl3.so,perl*
51private-tmp
52
53dbus-user none
54dbus-system none
55
56memory-deny-write-execute
diff --git a/etc/profile-a-l/cheese.profile b/etc/profile-a-l/cheese.profile
new file mode 100644
index 000000000..337117c4a
--- /dev/null
+++ b/etc/profile-a-l/cheese.profile
@@ -0,0 +1,47 @@
1# Firejail profile for cheese
2# Description: taking pictures and movies from a webcam
3# This file is overwritten after every install/update
4# Persistent local customizations
5include cheese.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${VIDEOS}
10noblacklist ${PICTURES}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20whitelist ${VIDEOS}
21whitelist ${PICTURES}
22include whitelist-common.inc
23include whitelist-var-common.inc
24
25apparmor
26caps.drop all
27machine-id
28net none
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35protocol unix
36seccomp
37shell none
38tracelog
39
40disable-mnt
41private-bin cheese
42private-cache
43private-etc alternatives,clutter-1.0,dconf,drirc,fonts,gtk-3.0
44private-tmp
45
46dbus-user none
47dbus-system none
diff --git a/etc/profile-a-l/cherrytree.profile b/etc/profile-a-l/cherrytree.profile
new file mode 100644
index 000000000..70dea5bd9
--- /dev/null
+++ b/etc/profile-a-l/cherrytree.profile
@@ -0,0 +1,43 @@
1# Firejail profile for cherrytree
2# Description: Hierarchical note taking application
3# This file is overwritten after every install/update
4# Persistent local customizations
5include cherrytree.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/cherrytree
10noblacklist ${DOCUMENTS}
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24caps.drop all
25net none
26no3d
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38tracelog
39
40private-cache
41private-dev
42private-tmp
43
diff --git a/etc/profile-a-l/chromium-browser.profile b/etc/profile-a-l/chromium-browser.profile
new file mode 100644
index 000000000..f83052d9a
--- /dev/null
+++ b/etc/profile-a-l/chromium-browser.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for chromium
2# This file is overwritten after every install/update
3
4# Redirect
5include chromium.profile
diff --git a/etc/profile-a-l/chromium-common.profile b/etc/profile-a-l/chromium-common.profile
new file mode 100644
index 000000000..c54fb0e19
--- /dev/null
+++ b/etc/profile-a-l/chromium-common.profile
@@ -0,0 +1,44 @@
1# Firejail profile for chromium-common
2# This file is overwritten after every install/update
3# Persistent local customizations
4include chromium-common.local
5# Persistent global definitions
6# added by caller profile
7#include globals.local
8
9# noexec ${HOME} breaks DRM binaries.
10?BROWSER_ALLOW_DRM: ignore noexec ${HOME}
11
12noblacklist ${HOME}/.pki
13noblacklist ${HOME}/.local/share/pki
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-programs.inc
20
21mkdir ${HOME}/.pki
22mkdir ${HOME}/.local/share/pki
23whitelist ${DOWNLOADS}
24whitelist ${HOME}/.pki
25whitelist ${HOME}/.local/share/pki
26include whitelist-common.inc
27include whitelist-var-common.inc
28
29apparmor
30caps.keep sys_admin,sys_chroot
31netfilter
32# nodbus - prevents access to passwords saved in GNOME Keyring and KWallet, also breaks Gnome connector
33nodvd
34nogroups
35notv
36?BROWSER_DISABLE_U2F: nou2f
37shell none
38
39disable-mnt
40?BROWSER_DISABLE_U2F: private-dev
41# private-tmp - problems with multiple browser sessions
42
43# the file dialog needs to work without d-bus
44?HAS_NODBUS: env NO_CHROME_KDE_FILE_DIALOG=1
diff --git a/etc/profile-a-l/chromium.profile b/etc/profile-a-l/chromium.profile
new file mode 100644
index 000000000..dab9ce449
--- /dev/null
+++ b/etc/profile-a-l/chromium.profile
@@ -0,0 +1,22 @@
1# Firejail profile for chromium
2# Description: A web browser built for speed, simplicity, and security
3# This file is overwritten after every install/update
4# Persistent local customizations
5include chromium.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/chromium
10noblacklist ${HOME}/.config/chromium
11noblacklist ${HOME}/.config/chromium-flags.conf
12
13mkdir ${HOME}/.cache/chromium
14mkdir ${HOME}/.config/chromium
15whitelist ${HOME}/.cache/chromium
16whitelist ${HOME}/.config/chromium
17whitelist ${HOME}/.config/chromium-flags.conf
18
19# private-bin chromium,chromium-browser,chromedriver
20
21# Redirect
22include chromium-common.profile
diff --git a/etc/profile-a-l/cin.profile b/etc/profile-a-l/cin.profile
new file mode 100644
index 000000000..8c3fb42d1
--- /dev/null
+++ b/etc/profile-a-l/cin.profile
@@ -0,0 +1,37 @@
1# Firejail profile for cin
2# This file is overwritten after every install/update
3# Persistent local customizations
4include cin.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.bcast5
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17caps.drop all
18ipc-namespace
19net none
20nodvd
21#nogroups
22nonewprivs
23notv
24nou2f
25noroot
26protocol unix
27
28# if an 1-1.2% gap per thread hurts you, comment seccomp
29seccomp
30shell none
31
32#private-bin cin,ffmpeg
33private-cache
34private-dev
35
36dbus-user none
37dbus-system none
diff --git a/etc/profile-a-l/cinelerra.profile b/etc/profile-a-l/cinelerra.profile
new file mode 100644
index 000000000..88a65037e
--- /dev/null
+++ b/etc/profile-a-l/cinelerra.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for cin
2# This file is overwritten after every install/update
3
4# Redirect
5include cin.profile
diff --git a/etc/profile-a-l/clamav.profile b/etc/profile-a-l/clamav.profile
new file mode 100644
index 000000000..2726ab5af
--- /dev/null
+++ b/etc/profile-a-l/clamav.profile
@@ -0,0 +1,39 @@
1# Firejail profile for clamav
2# Description: Anti-virus utility for Unix
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include clamav.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12include disable-exec.inc
13
14caps.drop all
15ipc-namespace
16net none
17no3d
18nodvd
19nogroups
20nonewprivs
21noroot
22nosound
23notv
24nou2f
25novideo
26protocol unix
27seccomp
28shell none
29tracelog
30x11 none
31
32private-dev
33
34dbus-user none
35dbus-system none
36
37read-only ${HOME}
38
39memory-deny-write-execute
diff --git a/etc/profile-a-l/clamdscan.profile b/etc/profile-a-l/clamdscan.profile
new file mode 100644
index 000000000..4c6c56c5f
--- /dev/null
+++ b/etc/profile-a-l/clamdscan.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for clamav
2# This file is overwritten after every install/update
3
4# Redirect
5include clamav.profile
diff --git a/etc/profile-a-l/clamdtop.profile b/etc/profile-a-l/clamdtop.profile
new file mode 100644
index 000000000..4c6c56c5f
--- /dev/null
+++ b/etc/profile-a-l/clamdtop.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for clamav
2# This file is overwritten after every install/update
3
4# Redirect
5include clamav.profile
diff --git a/etc/profile-a-l/clamscan.profile b/etc/profile-a-l/clamscan.profile
new file mode 100644
index 000000000..4c6c56c5f
--- /dev/null
+++ b/etc/profile-a-l/clamscan.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for clamav
2# This file is overwritten after every install/update
3
4# Redirect
5include clamav.profile
diff --git a/etc/profile-a-l/clamtk.profile b/etc/profile-a-l/clamtk.profile
new file mode 100644
index 000000000..4425a2bd0
--- /dev/null
+++ b/etc/profile-a-l/clamtk.profile
@@ -0,0 +1,29 @@
1# Firejail profile for clamtk
2# This file is overwritten after every install/update
3# Persistent local customizations
4include clamtk.local
5# Persistent global definitions
6include globals.local
7
8include disable-exec.inc
9
10caps.drop all
11ipc-namespace
12net none
13no3d
14nodvd
15nogroups
16nonewprivs
17noroot
18nosound
19notv
20nou2f
21novideo
22protocol unix
23seccomp
24shell none
25
26private-dev
27
28dbus-user none
29dbus-system none
diff --git a/etc/profile-a-l/claws-mail.profile b/etc/profile-a-l/claws-mail.profile
new file mode 100644
index 000000000..24954b2d8
--- /dev/null
+++ b/etc/profile-a-l/claws-mail.profile
@@ -0,0 +1,22 @@
1# Firejail profile for claws-mail
2# Description: Fast, lightweight and user-friendly GTK+2 based email client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include claws-mail.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.claws-mail
10
11mkdir ${HOME}/.claws-mail
12whitelist ${HOME}/.claws-mail
13
14# If you use python-based plugins you need to uncomment the below (or put them in your claws-mail.local)
15# Allow python (blacklisted by disable-interpreters.inc)
16#include allow-python2.inc
17#include allow-python3.inc
18
19whitelist /usr/share/doc/claws-mail
20
21# Redirect
22include email-common.profile
diff --git a/etc/profile-a-l/clawsker.profile b/etc/profile-a-l/clawsker.profile
new file mode 100644
index 000000000..12ce47401
--- /dev/null
+++ b/etc/profile-a-l/clawsker.profile
@@ -0,0 +1,55 @@
1# Firejail profile for clawsker
2# Description: An applet to edit Claws Mail's hidden preferences
3# This file is overwritten after every install/update
4# Persistent local customizations
5include clawsker.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.claws-mail
10
11# Allow perl (blacklisted by disable-interpreters.inc)
12include allow-perl.inc
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21mkdir ${HOME}/.claws-mail
22whitelist ${HOME}/.claws-mail
23whitelist /usr/share/perl5
24include whitelist-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30net none
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix
41seccomp
42shell none
43
44disable-mnt
45private-bin bash,clawsker,perl,sh,which
46private-cache
47private-dev
48private-etc alternatives,fonts
49private-lib girepository-1.*,libdbus-glib-1.so.*,libetpan.so.*,libgirepository-1.*,libgtk-x11-2.0.so.*,libstartup-notification-1.so.*,perl*
50private-tmp
51
52dbus-user none
53dbus-system none
54
55#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-a-l/clementine.profile b/etc/profile-a-l/clementine.profile
new file mode 100644
index 000000000..4d92157d0
--- /dev/null
+++ b/etc/profile-a-l/clementine.profile
@@ -0,0 +1,33 @@
1# Firejail profile for clementine
2# Description: Modern music player and library organizer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include clementine.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/Clementine
10noblacklist ${HOME}/.config/Clementine
11noblacklist ${MUSIC}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-var-common.inc
21
22caps.drop all
23nonewprivs
24noroot
25notv
26nou2f
27novideo
28protocol unix,inet,inet6
29# blacklisting of ioprio_set system calls breaks clementine
30seccomp !ioprio_set
31
32private-dev
33private-tmp
diff --git a/etc/profile-a-l/clion.profile b/etc/profile-a-l/clion.profile
new file mode 100644
index 000000000..b27d93684
--- /dev/null
+++ b/etc/profile-a-l/clion.profile
@@ -0,0 +1,38 @@
1# Firejail profile for CLion
2# This file is overwritten after every install/update
3# Persistent local customizations
4include clion.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.CLion*
9noblacklist ${HOME}/.config/git
10noblacklist ${HOME}/.gitconfig
11noblacklist ${HOME}/.git-credentials
12noblacklist ${HOME}/.java
13noblacklist ${HOME}/.local/share/JetBrains
14noblacklist ${HOME}/.ssh
15noblacklist ${HOME}/.tooling
16
17include disable-common.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21caps.drop all
22netfilter
23nodvd
24nogroups
25nonewprivs
26noroot
27notv
28nou2f
29novideo
30protocol unix,inet,inet6
31seccomp
32shell none
33
34private-cache
35private-dev
36# private-tmp
37
38noexec /tmp
diff --git a/etc/profile-a-l/clipgrab.profile b/etc/profile-a-l/clipgrab.profile
new file mode 100644
index 000000000..dace5e83e
--- /dev/null
+++ b/etc/profile-a-l/clipgrab.profile
@@ -0,0 +1,47 @@
1# Firejail profile for clipgrab
2# Description: A free video downloader and converter
3# This file is overwritten after every install/update
4# Persistent local customizations
5include clipgrab.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Philipp Schmieder
10noblacklist ${HOME}/.pki
11noblacklist ${VIDEOS}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26machine-id
27netfilter
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix,inet,inet6,netlink
37seccomp !chroot
38shell none
39
40disable-mnt
41private-cache
42private-dev
43private-tmp
44
45# Breaks tray icon, uncomment or add to clipgrab.local if you don't need it
46# dbus-user none
47# dbus-system none
diff --git a/etc/profile-a-l/clipit.profile b/etc/profile-a-l/clipit.profile
new file mode 100644
index 000000000..66b5fc859
--- /dev/null
+++ b/etc/profile-a-l/clipit.profile
@@ -0,0 +1,50 @@
1# Firejail profile for clipit
2# Description: Lightweight GTK+ clipboard manager
3# This file is overwritten after every install/update
4# Persistent local customizations
5include clipit.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/clipit
10noblacklist ${HOME}/.local/share/clipit
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20mkdir ${HOME}/.config/clipit
21mkdir ${HOME}/.local/share/clipit
22whitelist ${HOME}/.config/clipit
23whitelist ${HOME}/.local/share/clipit
24include whitelist-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30ipc-namespace
31machine-id
32net none
33no3d
34nodvd
35nogroups
36nonewprivs
37noroot
38nosound
39notv
40nou2f
41novideo
42protocol unix
43seccomp
44shell none
45
46disable-mnt
47private-cache
48private-dev
49private-tmp
50
diff --git a/etc/profile-a-l/cliqz.profile b/etc/profile-a-l/cliqz.profile
new file mode 100644
index 000000000..d0b8cc0ef
--- /dev/null
+++ b/etc/profile-a-l/cliqz.profile
@@ -0,0 +1,23 @@
1# Firejail profile for cliqz
2# This file is overwritten after every install/update
3# Persistent local customizations
4include cliqz.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/cliqz
9noblacklist ${HOME}/.cliqz
10noblacklist ${HOME}/.config/cliqz
11
12mkdir ${HOME}/.cache/cliqz
13mkdir ${HOME}/.cliqz
14mkdir ${HOME}/.config/cliqz
15whitelist ${HOME}/.cache/cliqz
16whitelist ${HOME}/.cliqz
17whitelist ${HOME}/.config/cliqz
18
19# private-etc must first be enabled in firefox-common.profile
20#private-etc cliqz
21
22# Redirect
23include firefox-common.profile
diff --git a/etc/profile-a-l/clocks.profile b/etc/profile-a-l/clocks.profile
new file mode 100644
index 000000000..da50e7d49
--- /dev/null
+++ b/etc/profile-a-l/clocks.profile
@@ -0,0 +1,6 @@
1# Firejail profile for gnome-clocks
2# This file is overwritten after every install/update
3
4# Temporary fix for https://github.com/netblue30/firejail/issues/2624
5# Redirect
6include gnome-clocks.profile
diff --git a/etc/profile-a-l/cmus.profile b/etc/profile-a-l/cmus.profile
new file mode 100644
index 000000000..fa1e5d722
--- /dev/null
+++ b/etc/profile-a-l/cmus.profile
@@ -0,0 +1,30 @@
1# Firejail profile for cmus
2# Description: Lightweight ncurses audio player
3# This file is overwritten after every install/update
4# Persistent local customizations
5include cmus.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/cmus
10noblacklist ${MUSIC}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19caps.drop all
20netfilter
21nonewprivs
22noroot
23notv
24novideo
25protocol unix,inet,inet6
26seccomp
27shell none
28
29private-bin cmus
30private-etc alternatives,asound.conf,ca-certificates,crypto-policies,group,machine-id,pki,pulse,resolv.conf,ssl
diff --git a/etc/profile-a-l/code-oss.profile b/etc/profile-a-l/code-oss.profile
new file mode 100644
index 000000000..6d45d5994
--- /dev/null
+++ b/etc/profile-a-l/code-oss.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for Visual Studio Code
2# This file is overwritten after every install/update
3# Persistent local customizations
4include code-oss.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include code.profile
diff --git a/etc/profile-a-l/code.profile b/etc/profile-a-l/code.profile
new file mode 100644
index 000000000..6f8a25211
--- /dev/null
+++ b/etc/profile-a-l/code.profile
@@ -0,0 +1,42 @@
1# Firejail profile for Visual Studio Code
2# This file is overwritten after every install/update
3# Persistent local customizations
4include code.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/Code
9noblacklist ${HOME}/.config/Code - OSS
10noblacklist ${HOME}/.vscode
11noblacklist ${HOME}/.vscode-oss
12
13# Allows files commonly used by IDEs
14include allow-common-devel.inc
15
16include disable-common.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20caps.drop all
21netfilter
22nodvd
23nogroups
24nonewprivs
25noroot
26nosound
27notv
28nou2f
29novideo
30protocol unix,inet,inet6,netlink
31seccomp
32shell none
33
34private-cache
35private-dev
36private-tmp
37
38# Disabling noexec ${HOME} for now since it will
39# probably interfere with running some programmes
40# in VS Code
41# noexec ${HOME}
42noexec /tmp
diff --git a/etc/profile-a-l/com.github.dahenson.agenda.profile b/etc/profile-a-l/com.github.dahenson.agenda.profile
new file mode 100644
index 000000000..ea5370649
--- /dev/null
+++ b/etc/profile-a-l/com.github.dahenson.agenda.profile
@@ -0,0 +1,60 @@
1# Firejail profile for com.github.dahenson.agenda
2# Description: Simple, fast, no-nonsense to-do (task) list
3# This file is overwritten after every install/update
4# Persistent local customizations
5include com.github.dahenson.agenda.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/agenda
10noblacklist ${HOME}/.config/agenda
11noblacklist ${HOME}/.local/share/agenda
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21mkdir ${HOME}/.cache/agenda
22mkdir ${HOME}/.config/agenda
23mkdir ${HOME}/.local/share/agenda
24whitelist ${HOME}/.cache/agenda
25whitelist ${HOME}/.config/agenda
26whitelist ${HOME}/.local/share/agenda
27include whitelist-common.inc
28include whitelist-usr-share-common.inc
29include whitelist-runuser-common.inc
30include whitelist-var-common.inc
31
32apparmor
33caps.drop all
34machine-id
35net none
36no3d
37nodvd
38nogroups
39nonewprivs
40noroot
41nosound
42notv
43nou2f
44novideo
45protocol unix
46seccomp
47shell none
48tracelog
49
50disable-mnt
51private-bin com.github.dahenson.agenda
52private-cache
53private-dev
54private-etc dconf,fonts,gtk-3.0
55private-tmp
56
57read-only ${HOME}
58read-write ${HOME}/.cache/agenda
59read-write ${HOME}/.config/agenda
60read-write ${HOME}/.local/share/agenda
diff --git a/etc/profile-a-l/com.github.johnfactotum.Foliate.profile b/etc/profile-a-l/com.github.johnfactotum.Foliate.profile
new file mode 100644
index 000000000..39a9a360d
--- /dev/null
+++ b/etc/profile-a-l/com.github.johnfactotum.Foliate.profile
@@ -0,0 +1,62 @@
1# Firejail profile for foliate
2# Description: Simple and modern GTK eBook reader
3# This file is overwritten after every install/update
4# Persistent local customizations
5include foliate.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${DOCUMENTS}
10noblacklist ${HOME}/.cache/com.github.johnfactotum.Foliate
11noblacklist ${HOME}/.local/share/com.github.johnfactotum.Foliate
12
13# Allow gjs (blacklisted by disable-interpreters.inc)
14include allow-gjs.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24mkdir ${HOME}/.cache/com.github.johnfactotum.Foliate
25mkdir ${HOME}/.local/share/com.github.johnfactotum.Foliate
26whitelist ${HOME}/.cache/com.github.johnfactotum.Foliate
27whitelist ${HOME}/.local/share/com.github.johnfactotum.Foliate
28whitelist ${DOCUMENTS}
29whitelist ${DOWNLOADS}
30whitelist /usr/share/com.github.johnfactotum.Foliate
31whitelist /usr/share/hyphen
32include whitelist-common.inc
33include whitelist-usr-share-common.inc
34include whitelist-var-common.inc
35
36apparmor
37caps.drop all
38machine-id
39net none
40nodvd
41nogroups
42nonewprivs
43noroot
44nosound
45notv
46nou2f
47novideo
48protocol unix
49seccomp
50shell none
51tracelog
52
53disable-mnt
54private-bin com.github.johnfactotum.Foliate,gjs
55private-cache
56private-dev
57private-etc dconf,fonts,gconf,gtk-3.0
58private-tmp
59
60read-only ${HOME}
61read-write ${HOME}/.cache/com.github.johnfactotum.Foliate
62read-write ${HOME}/.local/share/com.github.johnfactotum.Foliate
diff --git a/etc/profile-a-l/conkeror.profile b/etc/profile-a-l/conkeror.profile
new file mode 100644
index 000000000..38edf0d21
--- /dev/null
+++ b/etc/profile-a-l/conkeror.profile
@@ -0,0 +1,36 @@
1# Firejail profile for conkeror
2# This file is overwritten after every install/update
3# Persistent local customizations
4include conkeror.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.conkeror.mozdev.org
9
10include disable-common.inc
11include disable-programs.inc
12
13mkdir ${HOME}/.conkeror.mozdev.org
14mkfile ${HOME}/.conkerorrc
15whitelist ${HOME}/.conkeror.mozdev.org
16whitelist ${HOME}/.conkerorrc
17whitelist ${HOME}/.lastpass
18whitelist ${HOME}/.pentadactyl
19whitelist ${HOME}/.pentadactylrc
20whitelist ${HOME}/.vimperator
21whitelist ${HOME}/.vimperatorrc
22whitelist ${HOME}/.zotero
23whitelist ${HOME}/dwhelper
24whitelist ${DOWNLOADS}
25include whitelist-common.inc
26
27caps.drop all
28netfilter
29nodvd
30nonewprivs
31noroot
32notv
33protocol unix,inet,inet6
34seccomp
35
36disable-mnt
diff --git a/etc/profile-a-l/conky.profile b/etc/profile-a-l/conky.profile
new file mode 100644
index 000000000..e5cd7085a
--- /dev/null
+++ b/etc/profile-a-l/conky.profile
@@ -0,0 +1,46 @@
1# Firejail profile for conky
2# Description: Highly configurable system monitor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include conky.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${PICTURES}
10
11# Allow lua (blacklisted by disable-interpreters.inc)
12include allow-lua.inc
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24
25caps.drop all
26ipc-namespace
27netfilter
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix,inet,inet6
38seccomp
39shell none
40
41disable-mnt
42private-cache
43private-dev
44private-tmp
45
46memory-deny-write-execute
diff --git a/etc/profile-a-l/conplay.profile b/etc/profile-a-l/conplay.profile
new file mode 100644
index 000000000..8d9f3324f
--- /dev/null
+++ b/etc/profile-a-l/conplay.profile
@@ -0,0 +1,18 @@
1# Firejail profile for conplay
2# Description: MPEG audio player/decoder
3# This file is overwritten after every install/update
4# Persistent local customizations
5include conplay.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10## system-wide profile
11#+ overrides
12# Allow perl (blacklisted by disable-interpreters.inc)
13include allow-perl.inc
14
15whitelist /usr/share/perl5
16
17# Redirect
18include mpg123.profile
diff --git a/etc/profile-a-l/corebird.profile b/etc/profile-a-l/corebird.profile
new file mode 100644
index 000000000..dbb043c17
--- /dev/null
+++ b/etc/profile-a-l/corebird.profile
@@ -0,0 +1,37 @@
1# Firejail profile for corebird
2# Description: Native Gtk+ Twitter client for the Linux desktop
3# This file is overwritten after every install/update
4# Persistent local customizations
5include corebird.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/corebird
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19include whitelist-var-common.inc
20
21caps.drop all
22netfilter
23nodvd
24nogroups
25nonewprivs
26noroot
27notv
28nou2f
29novideo
30protocol unix,inet,inet6
31seccomp
32shell none
33
34private-bin corebird
35private-dev
36private-tmp
37
diff --git a/etc/profile-a-l/cower.profile b/etc/profile-a-l/cower.profile
new file mode 100644
index 000000000..8efe48240
--- /dev/null
+++ b/etc/profile-a-l/cower.profile
@@ -0,0 +1,49 @@
1# Firejail profile for cower
2# Description: a simple AUR agent with a pretentious name
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include cower.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${HOME}/.config/cower
11noblacklist /var/lib/pacman
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21# This profile could be significantly strengthened by adding the following to cower.local
22# whitelist ${HOME}/<Your Build Folder>
23# whitelist ${HOME}/.config/cower
24
25caps.drop all
26ipc-namespace
27netfilter
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix,inet,inet6
38seccomp
39shell none
40
41disable-mnt
42private-bin cower
43private-cache
44private-dev
45private-tmp
46
47memory-deny-write-execute
48
49read-only ${HOME}/.config/cower/config
diff --git a/etc/profile-a-l/cpio.profile b/etc/profile-a-l/cpio.profile
new file mode 100644
index 000000000..087a5b2bb
--- /dev/null
+++ b/etc/profile-a-l/cpio.profile
@@ -0,0 +1,46 @@
1# Firejail profile for cpio
2# Description: A program to manage archives of files
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include cpio.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12noblacklist /sbin
13noblacklist /usr/sbin
14
15include disable-common.inc
16# include disable-devel.inc
17include disable-exec.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21apparmor
22caps.drop all
23hostname cpio
24ipc-namespace
25machine-id
26net none
27no3d
28nodvd
29nogroups
30nonewprivs
31nosound
32notv
33nou2f
34novideo
35seccomp
36shell none
37tracelog
38x11 none
39
40private-cache
41private-dev
42
43dbus-user none
44dbus-system none
45
46memory-deny-write-execute
diff --git a/etc/profile-a-l/crawl-tiles.profile b/etc/profile-a-l/crawl-tiles.profile
new file mode 100644
index 000000000..39151865e
--- /dev/null
+++ b/etc/profile-a-l/crawl-tiles.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for crawl
2# This file is overwritten after every install/update
3
4ignore no3d
5
6# Redirect
7include crawl.profile
diff --git a/etc/profile-a-l/crawl.profile b/etc/profile-a-l/crawl.profile
new file mode 100644
index 000000000..3da2413d9
--- /dev/null
+++ b/etc/profile-a-l/crawl.profile
@@ -0,0 +1,47 @@
1# Firejail profile for crawl-tiles
2# Description: Roguelike dungeon exploration game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include crawl-tiles.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.crawl
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.crawl
20whitelist ${HOME}/.crawl
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24caps.drop all
25ipc-namespace
26net none
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39
40disable-mnt
41private-bin crawl,crawl-tiles
42private-cache
43private-dev
44private-tmp
45
46dbus-user none
47dbus-system none
diff --git a/etc/profile-a-l/crow.profile b/etc/profile-a-l/crow.profile
new file mode 100644
index 000000000..755b6e9f8
--- /dev/null
+++ b/etc/profile-a-l/crow.profile
@@ -0,0 +1,45 @@
1# Firejail profile for crow
2# Description: A translator that allows to translate and say selected text using Google, Yandex and Bing translate API
3# This file is overwritten after every install/update
4# Persistent local customizations
5include crow.local
6# Persistent global definitions
7include globals.local
8
9mkdir ${HOME}/.config/crow
10mkdir ${HOME}/.cache/gstreamer-1.0
11whitelist ${HOME}/.config/crow
12whitelist ${HOME}/.cache/gstreamer-1.0
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22include whitelist-common.inc
23
24caps.drop all
25netfilter
26no3d
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix,inet,inet6,netlink
35seccomp
36shell none
37
38disable-mnt
39private-bin crow
40private-dev
41private-etc alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,machine-id,nsswitch.conf,pki,pulse,resolv.conf,ssl
42private-opt none
43private-tmp
44private-srv none
45
diff --git a/etc/profile-a-l/cryptocat.profile b/etc/profile-a-l/cryptocat.profile
new file mode 100644
index 000000000..69aa39de2
--- /dev/null
+++ b/etc/profile-a-l/cryptocat.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for Cryptocat
2# This file is overwritten after every install/update
3
4# Redirect
5include Cryptocat.profile
diff --git a/etc/profile-a-l/curl.profile b/etc/profile-a-l/curl.profile
new file mode 100644
index 000000000..996ff51d3
--- /dev/null
+++ b/etc/profile-a-l/curl.profile
@@ -0,0 +1,52 @@
1# Firejail profile for curl
2# Description: Command line tool for transferring data with URL syntax
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include curl.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${HOME}/.curlrc
11
12blacklist /tmp/.X11-unix
13blacklist ${RUNUSER}/wayland-*
14blacklist ${RUNUSER}
15
16include disable-common.inc
17include disable-exec.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20# depending on workflow you can uncomment the below or put 'include disable-xdg.inc' in your curl.local
21#include disable-xdg.inc
22
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28ipc-namespace
29machine-id
30netfilter
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol inet,inet6
41seccomp
42shell none
43tracelog
44
45# private-bin curl
46private-cache
47private-dev
48# private-etc alternatives,ca-certificates,crypto-policies,pki,resolv.conf,ssl
49private-tmp
50
51dbus-user none
52dbus-system none
diff --git a/etc/profile-a-l/cvlc.profile b/etc/profile-a-l/cvlc.profile
new file mode 100644
index 000000000..56c0d965c
--- /dev/null
+++ b/etc/profile-a-l/cvlc.profile
@@ -0,0 +1,13 @@
1# Firejail profile for cvlc
2# This file is overwritten after every install/update
3# Persistent local customizations
4include cvlc.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# cvlc doesn't like private-bin
10ignore private-bin
11
12# Redirect
13include vlc.profile
diff --git a/etc/profile-a-l/cyberfox.profile b/etc/profile-a-l/cyberfox.profile
new file mode 100644
index 000000000..d1fff0004
--- /dev/null
+++ b/etc/profile-a-l/cyberfox.profile
@@ -0,0 +1,21 @@
1# Firejail profile for cyberfox
2# This file is overwritten after every install/update
3# Persistent local customizations
4include cyberfox.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.8pecxstudios
9noblacklist ${HOME}/.cache/8pecxstudios
10
11mkdir ${HOME}/.8pecxstudios
12mkdir ${HOME}/.cache/8pecxstudios
13whitelist ${HOME}/.8pecxstudios
14whitelist ${HOME}/.cache/8pecxstudios
15
16# private-bin cyberfox,dbus-launch,dbus-send,env,sh,which
17# private-etc must first be enabled in firefox-common.profile
18#private-etc cyberfox
19
20# Redirect
21include firefox-common.profile
diff --git a/etc/profile-a-l/d-feet.profile b/etc/profile-a-l/d-feet.profile
new file mode 100644
index 000000000..51df7b455
--- /dev/null
+++ b/etc/profile-a-l/d-feet.profile
@@ -0,0 +1,55 @@
1# Firejail profile for d-feet
2# Description: D-Bus debugger for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include d-feet.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/d-feet
10
11# Allow python (disabled by disable-interpreters.inc)
12include allow-python2.inc
13include allow-python3.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23mkdir ${HOME}/.config/d-feet
24whitelist ${HOME}/.config/d-feet
25whitelist /usr/share/d-feet
26include whitelist-common.inc
27include whitelist-runuser-common.inc
28include whitelist-usr-share-common.inc
29include whitelist-var-common.inc
30
31apparmor
32caps.drop all
33ipc-namespace
34# net none - breaks on Ubuntu
35no3d
36nodvd
37nogroups
38nonewprivs
39noroot
40nosound
41notv
42nou2f
43novideo
44protocol unix
45seccomp
46shell none
47
48disable-mnt
49private-bin d-feet,python*
50private-cache
51private-dev
52private-etc alternatives,dbus-1,fonts,machine-id
53private-tmp
54
55#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-a-l/darktable.profile b/etc/profile-a-l/darktable.profile
new file mode 100644
index 000000000..2a71ad11c
--- /dev/null
+++ b/etc/profile-a-l/darktable.profile
@@ -0,0 +1,38 @@
1# Firejail profile for darktable
2# Description: Virtual lighttable and darkroom for photographers
3# This file is overwritten after every install/update
4# Persistent local customizations
5include darktable.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/darktable
10noblacklist ${HOME}/.config/darktable
11noblacklist ${PICTURES}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21caps.drop all
22netfilter
23nodvd
24nogroups
25nonewprivs
26noroot
27nosound
28notv
29nou2f
30novideo
31protocol unix,inet,inet6
32seccomp
33shell none
34
35#private-bin darktable
36private-dev
37private-tmp
38
diff --git a/etc/profile-a-l/dconf-editor.profile b/etc/profile-a-l/dconf-editor.profile
new file mode 100644
index 000000000..e7cc66e32
--- /dev/null
+++ b/etc/profile-a-l/dconf-editor.profile
@@ -0,0 +1,46 @@
1# Firejail profile for dconf-editor
2# Description: dconf configuration editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include dconf-editor.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17whitelist ${HOME}/.local/share/glib-2.0
18include whitelist-common.inc
19include whitelist-runuser-common.inc
20include whitelist-usr-share-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25# net none - breaks application on older versions
26no3d
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38tracelog
39
40disable-mnt
41private-bin dconf-editor
42private-cache
43private-dev
44private-etc alternatives,dconf,fonts,gtk-3.0,machine-id
45private-lib
46private-tmp
diff --git a/etc/profile-a-l/dconf.profile b/etc/profile-a-l/dconf.profile
new file mode 100644
index 000000000..ea19b2209
--- /dev/null
+++ b/etc/profile-a-l/dconf.profile
@@ -0,0 +1,53 @@
1# Firejail profile for dconf
2# Description: Configuration database system
3# This file is overwritten after every install/update
4# Persistent local customizations
5include dconf.local
6# Persistent global definitions
7include globals.local
8
9blacklist ${RUNUSER}/wayland-*
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19whitelist ${HOME}/.local/share/glib-2.0
20# dconf paths are whitelisted by the following
21include whitelist-common.inc
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24
25apparmor
26caps.drop all
27ipc-namespace
28machine-id
29net none
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix
40seccomp
41shell none
42tracelog
43x11 none
44
45disable-mnt
46private-bin dconf,gsettings
47private-cache
48private-dev
49private-etc alternatives,dconf
50private-lib
51private-tmp
52
53memory-deny-write-execute
diff --git a/etc/profile-a-l/ddgtk.profile b/etc/profile-a-l/ddgtk.profile
new file mode 100644
index 000000000..5b95b74be
--- /dev/null
+++ b/etc/profile-a-l/ddgtk.profile
@@ -0,0 +1,55 @@
1# Firejail profile for ddgtk
2# Description: A frontend GUI to dd for making bootable USB disks
3# This file is overwritten after every install/update
4# Persistent local customizations
5include ddgtk.local
6# Persistent global definitions
7include globals.local
8
9# Allow python (blacklisted by disable-interpreters.inc)
10include allow-python2.inc
11include allow-python3.inc
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21whitelist ${DOWNLOADS}
22whitelist /usr/share/ddgtk
23include whitelist-common.inc
24include whitelist-usr-share-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29ipc-namespace
30machine-id
31net none
32no3d
33nodvd
34nogroups
35nonewprivs
36noroot
37nosound
38notv
39nou2f
40novideo
41protocol unix
42seccomp
43shell none
44tracelog
45
46disable-mnt
47private-bin bash,dd,ddgtk,grep,lsblk,python*,sed,sh,tr
48private-cache
49private-etc alternatives,fonts
50private-tmp
51
52dbus-user none
53dbus-system none
54
55# memory-deny-write-execute - breaks on Arch
diff --git a/etc/profile-a-l/deadbeef.profile b/etc/profile-a-l/deadbeef.profile
new file mode 100644
index 000000000..8e67d9daa
--- /dev/null
+++ b/etc/profile-a-l/deadbeef.profile
@@ -0,0 +1,35 @@
1# Firejail profile for deadbeef
2# Description: A GTK+ audio player for GNU/Linux
3# This file is overwritten after every install/update
4# Persistent local customizations
5include deadbeef.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/deadbeef
10noblacklist ${MUSIC}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20caps.drop all
21netfilter
22no3d
23nogroups
24nonewprivs
25noroot
26notv
27nou2f
28novideo
29protocol unix,inet,inet6
30seccomp
31shell none
32
33private-dev
34private-tmp
35
diff --git a/etc/profile-a-l/default.profile b/etc/profile-a-l/default.profile
new file mode 100644
index 000000000..74314cf92
--- /dev/null
+++ b/etc/profile-a-l/default.profile
@@ -0,0 +1,59 @@
1# Firejail profile for default
2# This file is overwritten after every install/update
3# Persistent local customizations
4include default.local
5# Persistent global definitions
6include globals.local
7
8# generic gui profile
9# depending on your usage, you can enable some of the commands below:
10
11include disable-common.inc
12# include disable-devel.inc
13# include disable-exec.inc
14# include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17# include disable-xdg.inc
18
19# include whitelist-common.inc
20# include whitelist-usr-share-common.inc
21# include whitelist-runuser-common.inc
22# include whitelist-var-common.inc
23
24# apparmor
25caps.drop all
26# ipc-namespace
27# machine-id
28# net none
29netfilter
30# no3d
31# nodvd
32# nogroups
33nonewprivs
34noroot
35# nosound
36# notv
37# nou2f
38# novideo
39protocol unix,inet,inet6
40seccomp
41# shell none
42# tracelog
43
44# disable-mnt
45# private
46# private-bin program
47# private-cache
48# private-dev
49# see /usr/share/doc/firejail/profile.template for more common private-etc paths.
50# private-etc alternatives,fonts,machine-id
51# private-lib
52# private-opt none
53# private-tmp
54
55# dbus-user none
56# dbus-system none
57
58# memory-deny-write-execute
59# read-only ${HOME}
diff --git a/etc/profile-a-l/deluge.profile b/etc/profile-a-l/deluge.profile
new file mode 100644
index 000000000..17c5059f5
--- /dev/null
+++ b/etc/profile-a-l/deluge.profile
@@ -0,0 +1,46 @@
1# Firejail profile for deluge
2# Description: BitTorrent client written in Python/PyGTK
3# This file is overwritten after every install/update
4# Persistent local customizations
5include deluge.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/deluge
10
11# Allow python (blacklisted by disable-interpreters.inc)
12include allow-python2.inc
13include allow-python3.inc
14
15include disable-common.inc
16# include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22mkdir ${HOME}/.config/deluge
23whitelist ${DOWNLOADS}
24whitelist ${HOME}/.config/deluge
25include whitelist-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30machine-id
31netfilter
32nodvd
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix,inet,inet6
40seccomp
41shell none
42
43# deluge is using python on Debian
44private-bin deluge,deluge-console,deluge-gtk,deluge-web,deluged,python*,sh,uname
45private-dev
46private-tmp
diff --git a/etc/profile-a-l/desktopeditors.profile b/etc/profile-a-l/desktopeditors.profile
new file mode 100644
index 000000000..9a98c4933
--- /dev/null
+++ b/etc/profile-a-l/desktopeditors.profile
@@ -0,0 +1,45 @@
1# Firejail profile for desktopeditors
2# Description: ONLYOFFICE DesktopEditors
3# This file is overwritten after every install/update
4# Persistent local customizations
5include desktopeditors.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/onlyoffice
10noblacklist ${HOME}/.local/share/onlyoffice
11noblacklist ${HOME}/.pki
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20include whitelist-usr-share-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25ipc-namespace
26netfilter
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix,inet,inet6,netlink
35seccomp
36shell none
37tracelog
38
39private-bin desktopeditors,sh
40private-cache
41private-dev
42private-tmp
43
44dbus-user none
45dbus-system none
diff --git a/etc/profile-a-l/devhelp.profile b/etc/profile-a-l/devhelp.profile
new file mode 100644
index 000000000..f3c012acb
--- /dev/null
+++ b/etc/profile-a-l/devhelp.profile
@@ -0,0 +1,53 @@
1# Firejail profile for devhelp
2# Description: API documentation browser for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include devhelp.local
6# Persistent global definitions
7include globals.local
8
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16include disable-xdg.inc
17
18whitelist /usr/share/devhelp
19whitelist /usr/share/doc
20whitelist /usr/share/gtk-doc/html
21include whitelist-common.inc
22include whitelist-usr-share-common.inc
23
24apparmor
25caps.drop all
26# net none - makes settings immutable
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38tracelog
39
40disable-mnt
41private-bin devhelp
42private-cache
43private-dev
44private-etc alternatives,dconf,fonts,ld.so.cache,machine-id,ssl
45private-tmp
46
47# makes settings immutable
48# dbus-user none
49# dbus-system none
50
51#memory-deny-write-execute - breaks on Arch (see issue #1803)
52
53read-only ${HOME}
diff --git a/etc/profile-a-l/devilspie.profile b/etc/profile-a-l/devilspie.profile
new file mode 100644
index 000000000..1ab10a6f6
--- /dev/null
+++ b/etc/profile-a-l/devilspie.profile
@@ -0,0 +1,60 @@
1# Firejail profile for devilspie
2# Description: Window matching daemon
3# This file is overwritten after every install/update
4# Persistent local customizations
5include devilspie.local
6# Persistent global definitions
7include globals.local
8
9blacklist ${RUNUSER}/wayland-*
10
11noblacklist ${HOME}/.devilspie
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21mkdir ${HOME}/.devilspie
22whitelist ${HOME}/.devilspie
23include whitelist-common.inc
24include whitelist-usr-share-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29ipc-namespace
30machine-id
31net none
32no3d
33nodvd
34nogroups
35nonewprivs
36noroot
37nosound
38notv
39nou2f
40novideo
41protocol unix
42seccomp
43shell none
44tracelog
45x11 none
46
47disable-mnt
48private-bin devilspie
49private-cache
50private-dev
51private-etc alternatives
52private-lib gconv
53private-tmp
54
55dbus-user none
56dbus-system none
57
58memory-deny-write-execute
59
60read-only ${HOME}
diff --git a/etc/profile-a-l/devilspie2.profile b/etc/profile-a-l/devilspie2.profile
new file mode 100644
index 000000000..9eab3f536
--- /dev/null
+++ b/etc/profile-a-l/devilspie2.profile
@@ -0,0 +1,24 @@
1# Firejail profile for devilspie2
2# Description: Window matching daemon (Lua)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include devilspie2.local
6# Persistent global definitions
7#include globals.local
8
9blacklist ${HOME}/.devilspie
10
11blacklist ${RUNUSER}/wayland-*
12
13noblacklist ${HOME}/.config/devilspie2
14
15# Allow lua (blacklisted by disable-interpreters.inc)
16include allow-lua.inc
17
18mkdir ${HOME}/.config/devilspie2
19whitelist ${HOME}/.config/devilspie2
20
21private-bin devilspie2
22
23# Redirect
24include devilspie.profile
diff --git a/etc/profile-a-l/dex2jar.profile b/etc/profile-a-l/dex2jar.profile
new file mode 100644
index 000000000..7a59c5d73
--- /dev/null
+++ b/etc/profile-a-l/dex2jar.profile
@@ -0,0 +1,42 @@
1# Firejail profile for dex2jar
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include dex2jar.local
6# Persistent global definitions
7include globals.local
8
9# Allow java (blacklisted by disable-devel.inc)
10include allow-java.inc
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-var-common.inc
21
22caps.drop all
23net none
24no3d
25nodvd
26nogroups
27nonewprivs
28noroot
29nosound
30notv
31nou2f
32novideo
33protocol unix
34seccomp
35shell none
36
37private-bin bash,dex2jar,dirname,expr,grep,java,ls,sh,uname
38private-cache
39private-dev
40
41dbus-user none
42dbus-system none
diff --git a/etc/profile-a-l/dia.profile b/etc/profile-a-l/dia.profile
new file mode 100644
index 000000000..52bf1c7f8
--- /dev/null
+++ b/etc/profile-a-l/dia.profile
@@ -0,0 +1,47 @@
1# Firejail profile for dia
2# Description: Diagram editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include dia.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.dia
10noblacklist ${DOCUMENTS}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include allow-python2.inc
16include allow-python3.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26net none
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39
40disable-mnt
41#private-bin dia
42private-cache
43private-dev
44private-tmp
45
46dbus-user none
47dbus-system none
diff --git a/etc/profile-a-l/dig.profile b/etc/profile-a-l/dig.profile
new file mode 100644
index 000000000..152dfd980
--- /dev/null
+++ b/etc/profile-a-l/dig.profile
@@ -0,0 +1,60 @@
1# Firejail profile for dig
2# Description: DNS lookup utility
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include dig.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${HOME}/.digrc
11noblacklist ${PATH}/dig
12
13blacklist /tmp/.X11-unix
14blacklist ${RUNUSER}/wayland-*
15blacklist ${RUNUSER}
16
17include disable-common.inc
18# include disable-devel.inc
19include disable-exec.inc
20# include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25#mkfile ${HOME}/.digrc -- see #903
26whitelist ${HOME}/.digrc
27include whitelist-common.inc
28include whitelist-usr-share-common.inc
29include whitelist-var-common.inc
30
31apparmor
32caps.drop all
33ipc-namespace
34machine-id
35netfilter
36no3d
37nodvd
38nogroups
39nonewprivs
40noroot
41nosound
42notv
43nou2f
44novideo
45protocol unix,inet,inet6
46seccomp
47shell none
48tracelog
49
50disable-mnt
51private-bin bash,dig,sh
52private-dev
53# Uncomment the next line (or put 'private-lib' in your dig.local) on non Debian/Ubuntu OS (see issue #3038)
54#private-lib
55private-tmp
56
57dbus-user none
58dbus-system none
59
60memory-deny-write-execute
diff --git a/etc/profile-a-l/digikam.profile b/etc/profile-a-l/digikam.profile
new file mode 100644
index 000000000..ae4a63c62
--- /dev/null
+++ b/etc/profile-a-l/digikam.profile
@@ -0,0 +1,43 @@
1# Firejail profile for digikam
2# Description: Digital photo management application for KDE
3# This file is overwritten after every install/update
4# Persistent local customizations
5include digikam.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/digikam
10noblacklist ${HOME}/.config/digikamrc
11noblacklist ${HOME}/.kde/share/apps/digikam
12noblacklist ${HOME}/.kde4/share/apps/digikam
13noblacklist ${PICTURES}
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23include whitelist-var-common.inc
24
25apparmor
26caps.drop all
27netfilter
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33protocol unix,inet,inet6,netlink
34# QtWebengine needs chroot to set up its own sandbox
35seccomp !chroot
36shell none
37
38# private-dev - prevents libdc1394 loading; this lib is used to connect to a camera device
39# private-etc alternatives,ca-certificates,crypto-policies,pki,ssl
40private-tmp
41
42# dbus-user none
43# dbus-system none
diff --git a/etc/profile-a-l/dillo.profile b/etc/profile-a-l/dillo.profile
new file mode 100644
index 000000000..7103d0285
--- /dev/null
+++ b/etc/profile-a-l/dillo.profile
@@ -0,0 +1,37 @@
1# Firejail profile for dillo
2# Description: Small and fast web browser
3# This file is overwritten after every install/update
4# Persistent local customizations
5include dillo.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.dillo
10
11include disable-common.inc
12include disable-devel.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17mkdir ${HOME}/.dillo
18mkdir ${HOME}/.fltk
19whitelist ${DOWNLOADS}
20whitelist ${HOME}/.dillo
21whitelist ${HOME}/.fltk
22include whitelist-common.inc
23include whitelist-var-common.inc
24
25caps.drop all
26netfilter
27nodvd
28nonewprivs
29noroot
30notv
31nou2f
32protocol unix,inet,inet6
33seccomp
34tracelog
35
36private-dev
37private-tmp
diff --git a/etc/profile-a-l/dino.profile b/etc/profile-a-l/dino.profile
new file mode 100644
index 000000000..82ddf2819
--- /dev/null
+++ b/etc/profile-a-l/dino.profile
@@ -0,0 +1,43 @@
1# Firejail profile for dino
2# Description: Modern XMPP Chat Client using GTK+/Vala
3# This file is overwritten after every install/update
4# Persistent local customizations
5include dino.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/dino
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.local/share/dino
19whitelist ${HOME}/.local/share/dino
20whitelist ${DOWNLOADS}
21include whitelist-common.inc
22
23caps.drop all
24netfilter
25no3d
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix,inet,inet6
35seccomp
36shell none
37
38disable-mnt
39private-bin dino
40private-dev
41# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl -- breaks server connection
42private-tmp
43
diff --git a/etc/profile-a-l/discord-canary.profile b/etc/profile-a-l/discord-canary.profile
new file mode 100644
index 000000000..3e9dacd1e
--- /dev/null
+++ b/etc/profile-a-l/discord-canary.profile
@@ -0,0 +1,17 @@
1# Firejail profile for discord-canary
2# This file is overwritten after every install/update
3# Persistent local customizations
4include discord-canary.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/discordcanary
9
10mkdir ${HOME}/.config/discordcanary
11whitelist ${HOME}/.config/discordcanary
12
13private-bin discord-canary
14private-opt discord-canary
15
16# Redirect
17include discord-common.profile
diff --git a/etc/profile-a-l/discord-common.profile b/etc/profile-a-l/discord-common.profile
new file mode 100644
index 000000000..cbeef798f
--- /dev/null
+++ b/etc/profile-a-l/discord-common.profile
@@ -0,0 +1,38 @@
1# Firejail profile for discord
2# This file is overwritten after every install/update
3# Persistent local customizations
4include discord-common.local
5# Persistent global definitions
6# added by caller profile
7#include globals.local
8
9ignore noexec ${HOME}
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17whitelist ${DOWNLOADS}
18whitelist ${HOME}/.config/BetterDiscord
19whitelist ${HOME}/.local/share/betterdiscordctl
20include whitelist-common.inc
21include whitelist-var-common.inc
22
23caps.drop all
24netfilter
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix,inet,inet6,netlink
33seccomp !chroot
34
35private-bin bash,cut,echo,egrep,grep,head,sed,sh,tclsh,tr,xdg-mime,xdg-open,zsh
36private-dev
37private-etc alternatives,ca-certificates,crypto-policies,fonts,group,ld.so.cache,localtime,login.defs,machine-id,password,pki,resolv.conf,ssl
38private-tmp
diff --git a/etc/profile-a-l/discord.profile b/etc/profile-a-l/discord.profile
new file mode 100644
index 000000000..8ef02a30f
--- /dev/null
+++ b/etc/profile-a-l/discord.profile
@@ -0,0 +1,17 @@
1# Firejail profile for discord
2# This file is overwritten after every install/update
3# Persistent local customizations
4include discord.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/discord
9
10mkdir ${HOME}/.config/discord
11whitelist ${HOME}/.config/discord
12
13private-bin discord
14private-opt discord
15
16# Redirect
17include discord-common.profile
diff --git a/etc/profile-a-l/display.profile b/etc/profile-a-l/display.profile
new file mode 100644
index 000000000..2ae4edced
--- /dev/null
+++ b/etc/profile-a-l/display.profile
@@ -0,0 +1,46 @@
1# Firejail profile for display
2# This file is overwritten after every install/update
3# Persistent local customizations
4include display.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${PICTURES}
9
10# Allow python (blacklisted by disable-interpreters.inc)
11include allow-python2.inc
12include allow-python3.inc
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24
25caps.drop all
26net none
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34protocol unix
35seccomp
36shell none
37# x11 xorg - problems on kubuntu 17.04
38
39private-bin display,python*
40private-dev
41# On Debian-based systems, display is a symlink in /etc/alternatives
42private-etc alternatives
43private-tmp
44
45dbus-user none
46dbus-system none
diff --git a/etc/profile-a-l/dnox.profile b/etc/profile-a-l/dnox.profile
new file mode 100644
index 000000000..e02395771
--- /dev/null
+++ b/etc/profile-a-l/dnox.profile
@@ -0,0 +1,17 @@
1# Firejail profile for dnox
2# This file is overwritten after every install/update
3# Persistent local customizations
4include dnox.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/dnox
9noblacklist ${HOME}/.config/dnox
10
11mkdir ${HOME}/.cache/dnox
12mkdir ${HOME}/.config/dnox
13whitelist ${HOME}/.cache/dnox
14whitelist ${HOME}/.config/dnox
15
16# Redirect
17include chromium-common.profile
diff --git a/etc/profile-a-l/dnscrypt-proxy.profile b/etc/profile-a-l/dnscrypt-proxy.profile
new file mode 100644
index 000000000..e48e9d1ac
--- /dev/null
+++ b/etc/profile-a-l/dnscrypt-proxy.profile
@@ -0,0 +1,54 @@
1# Firejail profile for dnscrypt-proxy
2# Description: Tool for securing communications between a client and a DNS resolver
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include dnscrypt-proxy.local
7# Persistent global definitions
8include globals.local
9
10blacklist /tmp/.X11-unix
11blacklist ${RUNUSER}/wayland-*
12
13noblacklist /sbin
14noblacklist /usr/sbin
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24whitelist /usr/share/dnscrypt-proxy
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.keep ipc_lock,net_bind_service,setgid,setuid,sys_chroot
30ipc-namespace
31machine-id
32netfilter
33no3d
34nodvd
35nonewprivs
36nosound
37notv
38nou2f
39novideo
40protocol inet,inet6
41seccomp.drop _sysctl,acct,add_key,adjtimex,clock_adjtime,delete_module,fanotify_init,finit_module,get_mempolicy,init_module,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioperm,iopl,kcmp,kexec_file_load,kexec_load,keyctl,lookup_dcookie,mbind,migrate_pages,modify_ldt,mount,move_pages,open_by_handle_at,perf_event_open,perf_event_open,pivot_root,process_vm_readv,process_vm_writev,ptrace,remap_file_pages,request_key,set_mempolicy,swapoff,swapon,sysfs,syslog,umount2,uselib,vmsplice
42shell none
43tracelog
44
45disable-mnt
46private
47private-cache
48private-dev
49
50dbus-user none
51dbus-system none
52
53# mdwe can break modules/plugins
54memory-deny-write-execute
diff --git a/etc/profile-a-l/dnsmasq.profile b/etc/profile-a-l/dnsmasq.profile
new file mode 100644
index 000000000..6db71bd49
--- /dev/null
+++ b/etc/profile-a-l/dnsmasq.profile
@@ -0,0 +1,37 @@
1# Firejail profile for dnsmasq
2# Description: Small caching DNS proxy and DHCP/TFTP server
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include dnsmasq.local
7# Persistent global definitions
8include globals.local
9
10noblacklist /sbin
11noblacklist /usr/sbin
12
13blacklist /tmp/.X11-unix
14blacklist ${RUNUSER}/wayland-*
15
16include disable-common.inc
17include disable-devel.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23caps.keep net_admin,net_bind_service,net_raw,setgid,setuid
24no3d
25nodvd
26nonewprivs
27nosound
28notv
29nou2f
30novideo
31protocol unix,inet,inet6,netlink
32seccomp
33
34disable-mnt
35private
36private-cache
37private-dev
diff --git a/etc/profile-a-l/dolphin.profile b/etc/profile-a-l/dolphin.profile
new file mode 100644
index 000000000..d264470af
--- /dev/null
+++ b/etc/profile-a-l/dolphin.profile
@@ -0,0 +1,42 @@
1# Firejail profile for dolphin
2# Description: File manager
3# This file is overwritten after every install/update
4# Persistent local customizations
5include dolphin.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/Trash
10# noblacklist ${HOME}/.cache/dolphin - disable-programs.inc is disabled, see below
11# noblacklist ${HOME}/.config/dolphinrc
12# noblacklist ${HOME}/.local/share/dolphin
13
14# Allow lua (blacklisted by disable-interpreters.inc)
15include allow-lua.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21# dolphin needs to be able to start arbitrary applications so we cannot blacklist their files
22# include disable-programs.inc
23
24allusers
25caps.drop all
26# net none
27netfilter
28nodvd
29nogroups
30nonewprivs
31# Comment the next line (or put 'ignore noroot' in your dolphin.local) if you use MPV+Vulkan (see issue #3012)
32noroot
33notv
34novideo
35protocol unix,inet,inet6,netlink
36seccomp
37shell none
38
39private-dev
40# private-tmp
41
42join-or-start dolphin
diff --git a/etc/profile-a-l/dooble-qt4.profile b/etc/profile-a-l/dooble-qt4.profile
new file mode 100644
index 000000000..70a21e11c
--- /dev/null
+++ b/etc/profile-a-l/dooble-qt4.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for dooble
2# This file is overwritten after every install/update
3
4# Redirect
5include dooble.profile
diff --git a/etc/profile-a-l/dooble.profile b/etc/profile-a-l/dooble.profile
new file mode 100644
index 000000000..bc197b223
--- /dev/null
+++ b/etc/profile-a-l/dooble.profile
@@ -0,0 +1,41 @@
1# Firejail profile for dooble
2# This file is overwritten after every install/update
3# Persistent local customizations
4include dooble.local
5# Backward compatibility
6include dooble-qt4.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${HOME}/.dooble
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19mkdir ${HOME}/.dooble
20whitelist ${DOWNLOADS}
21whitelist ${HOME}/.dooble
22include whitelist-common.inc
23
24caps.drop all
25netfilter
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31nou2f
32novideo
33protocol unix,inet,inet6,netlink
34seccomp
35shell none
36tracelog
37
38disable-mnt
39private-dev
40private-tmp
41
diff --git a/etc/profile-a-l/dosbox.profile b/etc/profile-a-l/dosbox.profile
new file mode 100644
index 000000000..17ccc9b9a
--- /dev/null
+++ b/etc/profile-a-l/dosbox.profile
@@ -0,0 +1,37 @@
1# Firejail profile for dosbox
2# Description: x86 emulator with Tandy/Herc/CGA/EGA/VGA/SVGA graphics, sound and DOS
3# This file is overwritten after every install/update
4# Persistent local customizations
5include dosbox.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.dosbox
10noblacklist ${DOCUMENTS}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19include whitelist-var-common.inc
20
21caps.drop all
22netfilter
23nodvd
24nogroups
25nonewprivs
26noroot
27notv
28nou2f
29novideo
30protocol unix,inet,inet6
31seccomp
32shell none
33tracelog
34
35private-bin dosbox
36private-dev
37private-tmp
diff --git a/etc/profile-a-l/dragon.profile b/etc/profile-a-l/dragon.profile
new file mode 100644
index 000000000..df839cc47
--- /dev/null
+++ b/etc/profile-a-l/dragon.profile
@@ -0,0 +1,40 @@
1# Firejail profile for dragon
2# Description: A multimedia player where the focus is on simplicity, instead of features
3# This file is overwritten after every install/update
4# Persistent local customizations
5include dragon.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/dragonplayerrc
10noblacklist ${MUSIC}
11noblacklist ${VIDEOS}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21whitelist /usr/share/dragonplayer
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24
25caps.drop all
26netfilter
27nogroups
28nonewprivs
29noroot
30notv
31nou2f
32novideo
33protocol unix,inet,inet6
34seccomp
35shell none
36
37private-bin dragon
38private-dev
39private-tmp
40
diff --git a/etc/profile-a-l/drawio.profile b/etc/profile-a-l/drawio.profile
new file mode 100644
index 000000000..4132caa4f
--- /dev/null
+++ b/etc/profile-a-l/drawio.profile
@@ -0,0 +1,53 @@
1# Firejail profile for drawio
2# Description: Diagram drawing application built on web technology - desktop version
3# This file is overwritten after every install/update
4# Persistent local customizations
5include drawio.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/draw.io
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.config/draw.io
20whitelist ${HOME}/.config/draw.io
21whitelist ${DOWNLOADS}
22include whitelist-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28ipc-namespace
29machine-id
30net none
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix
40seccomp !chroot
41shell none
42# tracelog - breaks on Arch
43
44private-bin drawio
45private-cache
46private-dev
47private-etc alternatives,fonts
48private-tmp
49
50dbus-user none
51dbus-system none
52
53# memory-deny-write-execute - breaks on Arch
diff --git a/etc/profile-a-l/dropbox.profile b/etc/profile-a-l/dropbox.profile
new file mode 100644
index 000000000..1b242d422
--- /dev/null
+++ b/etc/profile-a-l/dropbox.profile
@@ -0,0 +1,46 @@
1# Firejail profile for dropbox
2# This file is overwritten after every install/update
3# Persistent local customizations
4include dropbox.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/autostart
9noblacklist ${HOME}/.dropbox
10noblacklist ${HOME}/.dropbox-dist
11
12include disable-common.inc
13include disable-devel.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.dropbox
19mkdir ${HOME}/.dropbox-dist
20mkdir ${HOME}/Dropbox
21mkfile ${HOME}/.config/autostart/dropbox.desktop
22whitelist ${HOME}/.config/autostart/dropbox.desktop
23whitelist ${HOME}/.dropbox
24whitelist ${HOME}/.dropbox-dist
25whitelist ${HOME}/Dropbox
26include whitelist-common.inc
27
28caps.drop all
29netfilter
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix,inet,inet6
40seccomp
41shell none
42
43private-dev
44private-tmp
45
46noexec /tmp
diff --git a/etc/profile-a-l/easystroke.profile b/etc/profile-a-l/easystroke.profile
new file mode 100644
index 000000000..bb711b1bf
--- /dev/null
+++ b/etc/profile-a-l/easystroke.profile
@@ -0,0 +1,56 @@
1# Firejail profile for easystroke
2# Description: Control your desktop using mouse gestures
3# This file is overwritten after every install/update
4# Persistent local customizations
5include easystroke.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.easystroke
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.easystroke
20whitelist ${HOME}/.easystroke
21include whitelist-common.inc
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24
25apparmor
26caps.drop all
27machine-id
28net none
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix
39seccomp
40shell none
41tracelog
42
43disable-mnt
44# breaks custom shell command functionality
45#private-bin bash,easystroke,sh
46private-cache
47private-dev
48private-etc alternatives,fonts,group,passwd
49# breaks custom shell command functionality
50#private-lib gdk-pixbuf-2.*,gio,gvfs/libgvfscommon.so,libgconf-2.so.*,librsvg-2.so.*
51private-tmp
52
53# dbus-user none
54# dbus-system none
55
56memory-deny-write-execute
diff --git a/etc/profile-a-l/ebook-viewer.profile b/etc/profile-a-l/ebook-viewer.profile
new file mode 100644
index 000000000..706aec737
--- /dev/null
+++ b/etc/profile-a-l/ebook-viewer.profile
@@ -0,0 +1,11 @@
1# Firejail profile alias for calibre
2# This file is overwritten after every install/update
3# Persistent local customizations
4include ebook-viewer.local
5
6net none
7dbus-user none
8dbus-system none
9
10# Redirect
11include calibre.profile
diff --git a/etc/profile-a-l/electron-mail.profile b/etc/profile-a-l/electron-mail.profile
new file mode 100644
index 000000000..d5def68c2
--- /dev/null
+++ b/etc/profile-a-l/electron-mail.profile
@@ -0,0 +1,55 @@
1# Firejail profile for electron-mail
2# Description: Unofficial desktop app for several E2E encrypted email providers
3# This file is overwritten after every install/update
4# Persistent local customizations
5include electron-mail.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/electron-mail
10
11whitelist ${DOWNLOADS}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21mkdir ${HOME}/.config/electron-mail
22whitelist ${HOME}/.config/electron-mail
23
24include whitelist-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30netfilter
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36notv
37nou2f
38novideo
39protocol unix,inet,inet6,netlink
40seccomp !chroot
41shell none
42# tracelog - breaks on Arch
43
44private-bin electron-mail
45private-cache
46private-dev
47private-etc alternatives,fonts
48private-opt ElectronMail
49private-tmp
50
51# breaks tray functionality
52# dbus-user none
53# dbus-system none
54
55# memory-deny-write-execute - breaks on Arch
diff --git a/etc/profile-a-l/electron.profile b/etc/profile-a-l/electron.profile
new file mode 100644
index 000000000..9b99c7ffb
--- /dev/null
+++ b/etc/profile-a-l/electron.profile
@@ -0,0 +1,27 @@
1# Firejail profile for electron
2# Description: Build cross platform desktop apps with web technologies
3# This file is overwritten after every install/update
4# Persistent local customizations
5include electron.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-passwdmgr.inc
11include disable-programs.inc
12
13whitelist ${DOWNLOADS}
14
15apparmor
16caps.drop all
17netfilter
18nodvd
19nogroups
20nonewprivs
21noroot
22notv
23protocol unix,inet,inet6,netlink
24seccomp
25
26dbus-user none
27dbus-system none
diff --git a/etc/profile-a-l/electrum.profile b/etc/profile-a-l/electrum.profile
new file mode 100644
index 000000000..bcc84ddb8
--- /dev/null
+++ b/etc/profile-a-l/electrum.profile
@@ -0,0 +1,53 @@
1# Firejail profile for electrum
2# Description: Lightweight Bitcoin wallet
3# This file is overwritten after every install/update
4# Persistent local customizations
5include electrum.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.electrum
10
11# Allow python (blacklisted by disable-interpreters.inc)
12include allow-python2.inc
13include allow-python3.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23mkdir ${HOME}/.electrum
24whitelist ${HOME}/.electrum
25include whitelist-common.inc
26include whitelist-var-common.inc
27
28caps.drop all
29ipc-namespace
30netfilter
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix,inet,inet6
41seccomp
42shell none
43
44disable-mnt
45private-bin electrum,python*
46private-cache
47?HAS_APPIMAGE: ignore private-dev
48private-dev
49private-etc alternatives,ca-certificates,crypto-policies,dconf,fonts,machine-id,pki,resolv.conf,ssl
50private-tmp
51
52# dbus-user none
53# dbus-system none
diff --git a/etc/profile-a-l/elinks.profile b/etc/profile-a-l/elinks.profile
new file mode 100644
index 000000000..2a306d704
--- /dev/null
+++ b/etc/profile-a-l/elinks.profile
@@ -0,0 +1,43 @@
1# Firejail profile for elinks
2# Description: Advanced text-mode WWW browser
3# This file is overwritten after every install/update
4# Persistent local customizations
5include elinks.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.elinks
10
11blacklist /tmp/.X11-unix
12blacklist ${RUNUSER}/wayland-*
13
14include disable-common.inc
15include disable-devel.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-runuser-common.inc
22
23caps.drop all
24netfilter
25no3d
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix,inet,inet6
35seccomp
36shell none
37tracelog
38
39# private-bin elinks
40private-cache
41private-dev
42# private-etc alternatives,ca-certificates,crypto-policies,pki,ssl
43private-tmp
diff --git a/etc/profile-a-l/emacs.profile b/etc/profile-a-l/emacs.profile
new file mode 100644
index 000000000..ab378105e
--- /dev/null
+++ b/etc/profile-a-l/emacs.profile
@@ -0,0 +1,31 @@
1# Firejail profile for emacs
2# Description: GNU Emacs editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include emacs.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.emacs
10noblacklist ${HOME}/.emacs.d
11# if you need gpg uncomment the following line
12# or put it into your emacs.local
13#noblacklist ${HOME}/.gnupg
14
15# Allows files commonly used by IDEs
16include allow-common-devel.inc
17
18include disable-common.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22caps.drop all
23netfilter
24nodvd
25nogroups
26nonewprivs
27noroot
28notv
29novideo
30protocol unix,inet,inet6
31seccomp
diff --git a/etc/profile-a-l/email-common.profile b/etc/profile-a-l/email-common.profile
new file mode 100644
index 000000000..f9d96858b
--- /dev/null
+++ b/etc/profile-a-l/email-common.profile
@@ -0,0 +1,68 @@
1# Firejail profile for email-common
2# Description: Common profile for claws-mail and sylpheed email clients
3# This file is overwritten after every install/update
4# Persistent local customizations
5include email-common.local
6# Persistent global definitions
7# added by caller profile
8#include globals.local
9
10noblacklist ${HOME}/.gnupg
11noblacklist ${HOME}/.signature
12# when storing mail outside the default ${HOME}/Mail path, 'noblacklist' the custom path in your email-common.local
13# and 'blacklist' it in your disable-common.local too so it is kept hidden from other applications
14noblacklist ${HOME}/Mail
15
16noblacklist ${DOCUMENTS}
17
18include disable-common.inc
19include disable-devel.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25whitelist ${DOCUMENTS}
26whitelist ${DOWNLOADS}
27mkfile ${HOME}/.config/mimeapps.list
28mkdir ${HOME}/.gnupg
29mkfile ${HOME}/.signature
30whitelist ${HOME}/.config/mimeapps.list
31whitelist ${HOME}/.gnupg
32whitelist ${HOME}/.signature
33# when storing mail outside the default ${HOME}/Mail path, 'whitelist' the custom path in your email-common.local
34whitelist ${HOME}/Mail
35whitelist /usr/share/gnupg
36whitelist /usr/share/gnupg2
37include whitelist-common.inc
38include whitelist-usr-share-common.inc
39include whitelist-var-common.inc
40
41caps.drop all
42netfilter
43no3d
44nodvd
45nogroups
46nonewprivs
47noroot
48nosound
49notv
50nou2f
51novideo
52protocol unix,inet,inet6
53seccomp
54shell none
55tracelog
56
57private-cache
58private-dev
59private-tmp
60
61# encrypting and signing email
62read-only ${HOME}/.config/mimeapps.list
63writable-run-user
64
65# If you want to read local mail stored in /var/mail, add the following to email-common.local:
66# whitelist /var/mail
67# whitelist /var/spool/mail
68# writable-var
diff --git a/etc/profile-a-l/empathy.profile b/etc/profile-a-l/empathy.profile
new file mode 100644
index 000000000..5ca640d30
--- /dev/null
+++ b/etc/profile-a-l/empathy.profile
@@ -0,0 +1,26 @@
1# Firejail profile for empathy
2# Description: GNOME multi-protocol chat and call client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include empathy.local
6# Persistent global definitions
7include globals.local
8
9
10include disable-common.inc
11include disable-devel.inc
12include disable-interpreters.inc
13include disable-programs.inc
14
15caps.drop all
16netfilter
17nodvd
18nogroups
19nonewprivs
20noroot
21notv
22protocol unix,inet,inet6
23seccomp
24
25private-cache
26private-tmp
diff --git a/etc/profile-a-l/enchant-2.profile b/etc/profile-a-l/enchant-2.profile
new file mode 100644
index 000000000..32cc0e691
--- /dev/null
+++ b/etc/profile-a-l/enchant-2.profile
@@ -0,0 +1,10 @@
1# Firejail profile for enchant-2
2# This file is overwritten after every install/update
3# Persistent local customizations
4include enchant-2.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include enchant.profile
diff --git a/etc/profile-a-l/enchant-lsmod-2.profile b/etc/profile-a-l/enchant-lsmod-2.profile
new file mode 100644
index 000000000..a7199955e
--- /dev/null
+++ b/etc/profile-a-l/enchant-lsmod-2.profile
@@ -0,0 +1,10 @@
1# Firejail profile for enchant-lsmod-2
2# This file is overwritten after every install/update
3# Persistent local customizations
4include enchant-lsmod-2.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include enchant.profile
diff --git a/etc/profile-a-l/enchant-lsmod.profile b/etc/profile-a-l/enchant-lsmod.profile
new file mode 100644
index 000000000..ba4353d15
--- /dev/null
+++ b/etc/profile-a-l/enchant-lsmod.profile
@@ -0,0 +1,10 @@
1# Firejail profile for enchant-lsmod
2# This file is overwritten after every install/update
3# Persistent local customizations
4include enchant-lsmod.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include enchant.profile
diff --git a/etc/profile-a-l/enchant.profile b/etc/profile-a-l/enchant.profile
new file mode 100644
index 000000000..2b5de799f
--- /dev/null
+++ b/etc/profile-a-l/enchant.profile
@@ -0,0 +1,58 @@
1# Firejail profile for enchant
2# Description: Wrapper for various spell checker engines
3# This file is overwritten after every install/update
4# Persistent local customizations
5include enchant.local
6# Persistent global definitions
7include globals.local
8
9blacklist ${RUNUSER}/wayland-*
10
11noblacklist ${HOME}/.config/enchant
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21mkdir ${HOME}/.config/enchant
22whitelist ${HOME}/.config/enchant
23include whitelist-common.inc
24include whitelist-runuser-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30ipc-namespace
31machine-id
32net none
33no3d
34nodvd
35nogroups
36nonewprivs
37noroot
38nosound
39notv
40nou2f
41novideo
42protocol unix
43seccomp
44shell none
45tracelog
46x11 none
47
48private-bin enchant,enchant-*
49private-cache
50private-dev
51private-etc alternatives
52private-lib
53private-tmp
54
55dbus-user none
56dbus-system none
57
58memory-deny-write-execute
diff --git a/etc/profile-a-l/engrampa.profile b/etc/profile-a-l/engrampa.profile
new file mode 100644
index 000000000..6c0892c56
--- /dev/null
+++ b/etc/profile-a-l/engrampa.profile
@@ -0,0 +1,42 @@
1# Firejail profile for engrampa
2# Description: Archive manager for MATE
3# This file is overwritten after every install/update
4# Persistent local customizations
5include engrampa.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15
16include whitelist-var-common.inc
17
18apparmor
19caps.drop all
20net none
21no3d
22nodvd
23nogroups
24nonewprivs
25noroot
26nosound
27notv
28nou2f
29novideo
30protocol unix
31seccomp
32shell none
33tracelog
34
35# private-bin engrampa
36private-dev
37# private-tmp
38
39dbus-user none
40dbus-system none
41
42memory-deny-write-execute
diff --git a/etc/profile-a-l/enox.profile b/etc/profile-a-l/enox.profile
new file mode 100644
index 000000000..d8ac8b24a
--- /dev/null
+++ b/etc/profile-a-l/enox.profile
@@ -0,0 +1,19 @@
1# Firejail profile for enox
2# This file is overwritten after every install/update
3# Persistent local customizations
4include enox.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/Enox
9noblacklist ${HOME}/.config/Enox
10
11#mkdir ${HOME}/.cache/dnox
12#mkdir ${HOME}/.config/dnox
13mkdir ${HOME}/.cache/Enox
14mkdir ${HOME}/.config/Enox
15whitelist ${HOME}/.cache/Enox
16whitelist ${HOME}/.config/Enox
17
18# Redirect
19include chromium-common.profile
diff --git a/etc/profile-a-l/enpass.profile b/etc/profile-a-l/enpass.profile
new file mode 100644
index 000000000..68113e294
--- /dev/null
+++ b/etc/profile-a-l/enpass.profile
@@ -0,0 +1,62 @@
1# Firejail profile for enpass
2# Description: A multiplatform password manager
3# This file is overwritten after every install/update.
4# Persistent local customisations
5include enpass.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/Enpass
10noblacklist ${HOME}/.config/sinew.in
11noblacklist ${HOME}/.config/Sinew Software Systems
12noblacklist ${HOME}/.local/share/Enpass
13noblacklist ${DOCUMENTS}
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23mkdir ${HOME}/.cache/Enpass
24mkfile ${HOME}/.config/sinew.in
25mkdir ${HOME}/.config/Sinew Software Systems
26mkdir ${HOME}/.local/share/Enpass
27whitelist ${HOME}/.cache/Enpass
28whitelist ${HOME}/.config/sinew.in
29whitelist ${HOME}/.config/Sinew Software Systems
30whitelist ${HOME}/.local/share/Enpass
31whitelist ${DOCUMENTS}
32include whitelist-common.inc
33include whitelist-var-common.inc
34
35# machine-id and nosound break audio notification functionality
36# comment both if you need that functionality or put 'ignore machine-id'
37# and 'ignore nosound' in your enpass.local
38
39caps.drop all
40machine-id
41netfilter
42no3d
43nodvd
44nogroups
45nonewprivs
46noroot
47nosound
48notv
49nou2f
50novideo
51protocol unix,inet,inet6,netlink
52seccomp
53shell none
54tracelog
55
56private-bin dirname,Enpass,importer_enpass,readlink,sh
57?HAS_APPIMAGE: ignore private-dev
58private-dev
59private-opt Enpass
60private-tmp
61
62#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-a-l/eo-common.profile b/etc/profile-a-l/eo-common.profile
new file mode 100644
index 000000000..80c704c6b
--- /dev/null
+++ b/etc/profile-a-l/eo-common.profile
@@ -0,0 +1,47 @@
1# Firejail profile for eo-common
2# Description: Common profile for Eye of GNOME/MATE graphics viewer program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include eo-common.local
6# Persistent global definitions
7# added by caller profile
8#include globals.local
9
10noblacklist ${HOME}/.local/share/Trash
11noblacklist ${HOME}/.Steam
12noblacklist ${HOME}/.steam
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21include whitelist-runuser-common.inc
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24
25apparmor
26caps.drop all
27ipc-namespace
28machine-id
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix,netlink
39seccomp
40shell none
41tracelog
42
43private-cache
44private-dev
45private-etc alternatives,dconf,fonts,gtk-3.0
46private-lib eog,eom,gdk-pixbuf-2.*,gio,girepository-1.*,gvfs,libgconf-2.so.*
47private-tmp
diff --git a/etc/profile-a-l/eog.profile b/etc/profile-a-l/eog.profile
new file mode 100644
index 000000000..6690b33ca
--- /dev/null
+++ b/etc/profile-a-l/eog.profile
@@ -0,0 +1,19 @@
1# Firejail profile for eog
2# Description: Eye of GNOME graphics viewer program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include eog.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/eog
10
11whitelist /usr/share/eog
12
13# private-bin, private-etc and private-lib break 'Open With' / 'Open in file manager'
14# comment those if you need that functionality
15# or put 'ignore private-bin', 'ignore private-etc' and 'ignore private-lib' in your eog.local
16private-bin eog
17
18# Redirect
19include eo-common.profile
diff --git a/etc/profile-a-l/eom.profile b/etc/profile-a-l/eom.profile
new file mode 100644
index 000000000..5bfeb8c8f
--- /dev/null
+++ b/etc/profile-a-l/eom.profile
@@ -0,0 +1,19 @@
1# Firejail profile for eom
2# Description: Eye of MATE graphics viewer program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include eom.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/mate/eom
10
11whitelist /usr/share/eom
12
13# private-bin, private-etc and private-lib break 'Open With' / 'Open in file manager'
14# comment those if you need that functionality
15# or put 'ignore private-bin', 'ignore private-etc' and 'ignore private-lib' in your eom.local
16private-bin eom
17
18# Redirect
19include eo-common.profile
diff --git a/etc/profile-a-l/ephemeral.profile b/etc/profile-a-l/ephemeral.profile
new file mode 100644
index 000000000..029f613c6
--- /dev/null
+++ b/etc/profile-a-l/ephemeral.profile
@@ -0,0 +1,63 @@
1# Firejail profile for ephemeral
2# Description: The always-incognito web browser
3# This file is overwritten after every install/update
4# Persistent local customizations
5include ephemeral.local
6# Persistent global definitions
7include globals.local
8
9# enforce private-cache
10#noblacklist ${HOME}/.cache/ephemeral
11
12noblacklist ${HOME}/.pki
13noblacklist ${HOME}/.local/share/pki
14
15# noexec ${HOME} breaks DRM binaries.
16?BROWSER_ALLOW_DRM: ignore noexec ${HOME}
17
18include disable-common.inc
19include disable-devel.inc
20include disable-exec.inc
21include disable-interpreters.inc
22include disable-programs.inc
23
24# enforce private-cache
25#mkdir ${HOME}/.cache/ephemeral
26mkdir ${HOME}/.pki
27mkdir ${HOME}/.local/share/pki
28# enforce private-cache
29#whitelist ${HOME}/.cache/ephemeral
30whitelist ${HOME}/.pki
31whitelist ${HOME}/.local/share/pki
32whitelist ${DOWNLOADS}
33include whitelist-common.inc
34include whitelist-usr-share-common.inc
35include whitelist-var-common.inc
36
37apparmor
38caps.drop all
39# machine-id breaks pulse audio; it should work fine in setups where sound is not required.
40#machine-id
41netfilter
42nodvd
43nogroups
44nonewprivs
45# noroot breaks GTK_USE_PORTAL=1 usage, see https://github.com/netblue30/firejail/issues/2506.
46noroot
47notv
48?BROWSER_DISABLE_U2F: nou2f
49protocol unix,inet,inet6,netlink
50seccomp
51shell none
52tracelog
53
54disable-mnt
55private-cache
56?BROWSER_DISABLE_U2F: private-dev
57# private-etc below works fine on most distributions. There are some problems on CentOS.
58#private-etc alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,group,gtk-2.0,gtk-3.0,hostname,hosts,ld.so.cache,localtime,login.defs,machine-id,mailcap,mime.types,nsswitch.conf,os-release,pango,passwd,pki,pulse,resolv.conf,selinux,ssl,X11,xdg
59private-tmp
60
61# breaks preferences
62# dbus-user none
63# dbus-system none
diff --git a/etc/profile-a-l/epiphany.profile b/etc/profile-a-l/epiphany.profile
new file mode 100644
index 000000000..225811226
--- /dev/null
+++ b/etc/profile-a-l/epiphany.profile
@@ -0,0 +1,36 @@
1# Firejail profile for epiphany
2# Description: The GNOME Web browser
3# This file is overwritten after every install/update
4# Persistent local customizations
5include epiphany.local
6# Persistent global definitions
7include globals.local
8
9# Note: Epiphany use bwrap since 3.34 and can not be firejailed any more.
10# See https://github.com/netblue30/firejail/issues/2995
11
12noblacklist ${HOME}/.cache/epiphany
13noblacklist ${HOME}/.config/epiphany
14noblacklist ${HOME}/.local/share/epiphany
15
16include disable-common.inc
17include disable-devel.inc
18include disable-interpreters.inc
19include disable-programs.inc
20
21mkdir ${HOME}/.cache/epiphany
22mkdir ${HOME}/.config/epiphany
23mkdir ${HOME}/.local/share/epiphany
24whitelist ${DOWNLOADS}
25whitelist ${HOME}/.cache/epiphany
26whitelist ${HOME}/.config/epiphany
27whitelist ${HOME}/.local/share/epiphany
28include whitelist-common.inc
29
30caps.drop all
31netfilter
32nodvd
33nonewprivs
34notv
35protocol unix,inet,inet6
36seccomp
diff --git a/etc/profile-a-l/et.profile b/etc/profile-a-l/et.profile
new file mode 100644
index 000000000..4e70bb114
--- /dev/null
+++ b/etc/profile-a-l/et.profile
@@ -0,0 +1,11 @@
1# Firejail profile for et
2# Description: WPS Office - Spreadsheets
3# This file is overwritten after every install/update
4# Persistent local customizations
5include et.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include wps.profile
diff --git a/etc/profile-a-l/etr.profile b/etc/profile-a-l/etr.profile
new file mode 100644
index 000000000..7afcd01d7
--- /dev/null
+++ b/etc/profile-a-l/etr.profile
@@ -0,0 +1,46 @@
1# Firejail profile for etr
2# Description: High speed arctic racing game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include etr.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.etr
10
11include disable-common.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16include disable-xdg.inc
17
18mkdir ${HOME}/.etr
19whitelist ${HOME}/.etr
20include whitelist-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25net none
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31nou2f
32novideo
33protocol unix,netlink
34seccomp
35shell none
36tracelog
37
38disable-mnt
39private-bin etr
40private-cache
41private-dev
42# private-etc alternatives,drirc,machine-id,openal
43private-tmp
44
45dbus-user none
46dbus-system none
diff --git a/etc/profile-a-l/evince-previewer.profile b/etc/profile-a-l/evince-previewer.profile
new file mode 100644
index 000000000..3857d6f7b
--- /dev/null
+++ b/etc/profile-a-l/evince-previewer.profile
@@ -0,0 +1,10 @@
1# Firejail profile for evince-previewer
2# This file is overwritten after every install/update
3# Persistent local customizations
4include evince-previewer.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include evince.profile
diff --git a/etc/profile-a-l/evince-thumbnailer.profile b/etc/profile-a-l/evince-thumbnailer.profile
new file mode 100644
index 000000000..080a04a52
--- /dev/null
+++ b/etc/profile-a-l/evince-thumbnailer.profile
@@ -0,0 +1,10 @@
1# Firejail profile for evince-thumbnailer
2# This file is overwritten after every install/update
3# Persistent local customizations
4include evince-thumbnailer.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include evince.profile
diff --git a/etc/profile-a-l/evince.profile b/etc/profile-a-l/evince.profile
new file mode 100644
index 000000000..04964ce33
--- /dev/null
+++ b/etc/profile-a-l/evince.profile
@@ -0,0 +1,56 @@
1# Firejail profile for evince
2# Description: Document (PostScript, PDF) viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include evince.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/evince
10noblacklist ${DOCUMENTS}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20whitelist /usr/share/doc
21whitelist /usr/share/evince
22whitelist /usr/share/poppler
23whitelist /usr/share/tracker
24include whitelist-runuser-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28caps.drop all
29machine-id
30# net none - breaks AppArmor on Ubuntu systems
31netfilter
32no3d
33nodvd
34nogroups
35nonewprivs
36noroot
37nosound
38notv
39nou2f
40novideo
41protocol unix
42seccomp
43shell none
44tracelog
45
46private-bin evince,evince-previewer,evince-thumbnailer
47private-cache
48private-dev
49private-etc alternatives,fonts,group,ld.so.cache,machine-id,passwd
50# private-lib might break two-page-view on some systems
51private-lib evince,gcc/*/*/libgcc_s.so.*,gcc/*/*/libstdc++.so.*,gconv,gdk-pixbuf-2.*,gio,gvfs/libgvfscommon.so,libdjvulibre.so.*,libgconf-2.so.*,libgraphite2.so.*,libpoppler-glib.so.*,librsvg-2.so.*,libspectre.so.*
52private-tmp
53
54# might break two-page-view on some systems
55dbus-user none
56dbus-system none
diff --git a/etc/profile-a-l/evolution.profile b/etc/profile-a-l/evolution.profile
new file mode 100644
index 000000000..4740bf935
--- /dev/null
+++ b/etc/profile-a-l/evolution.profile
@@ -0,0 +1,46 @@
1# Firejail profile for evolution
2# Description: Groupware suite with mail client and organizer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include evolution.local
6# Persistent global definitions
7include globals.local
8
9noblacklist /var/mail
10noblacklist /var/spool/mail
11noblacklist ${HOME}/.bogofilter
12noblacklist ${HOME}/.cache/evolution
13noblacklist ${HOME}/.config/evolution
14noblacklist ${HOME}/.gnupg
15noblacklist ${HOME}/.local/share/evolution
16noblacklist ${HOME}/.pki
17noblacklist ${HOME}/.local/share/pki
18
19include disable-common.inc
20include disable-devel.inc
21include disable-exec.inc
22include disable-interpreters.inc
23include disable-passwdmgr.inc
24include disable-programs.inc
25
26include whitelist-runuser-common.inc
27
28caps.drop all
29netfilter
30# no3d breaks under wayland
31#no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix,inet,inet6
41seccomp
42shell none
43
44private-dev
45private-tmp
46
diff --git a/etc/profile-a-l/exfalso.profile b/etc/profile-a-l/exfalso.profile
new file mode 100644
index 000000000..0b961f534
--- /dev/null
+++ b/etc/profile-a-l/exfalso.profile
@@ -0,0 +1,60 @@
1# Firejail profile for exfalso
2# Description: GTK audio tag editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include exfalso.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.quodlibet
10noblacklist ${MUSIC}
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16whitelist ${DOWNLOADS}
17whitelist ${MUSIC}
18
19include disable-common.inc
20include disable-devel.inc
21include disable-exec.inc
22include disable-interpreters.inc
23include disable-passwdmgr.inc
24include disable-programs.inc
25include disable-xdg.inc
26
27mkdir ${HOME}/.quodlibet
28whitelist ${HOME}/.quodlibet
29include whitelist-common.inc
30include whitelist-usr-share-common.inc
31include whitelist-var-common.inc
32
33caps.drop all
34ipc-namespace
35machine-id
36netfilter
37no3d
38nodvd
39nogroups
40nonewprivs
41noroot
42nosound
43notv
44nou2f
45novideo
46protocol unix,inet,inet6
47seccomp
48shell none
49
50private-bin exfalso,python*
51private-cache
52private-dev
53private-etc alternatives,fonts,group,passwd
54private-lib libatk-1.0.so.*,libgdk-3.so.*,libgdk_pixbuf-2.0.so.*,libgirepository-1.0.so.*,libgstreamer-1.0.so.*,libgtk-3.so.*,libgtksourceview-3.0.so.*,libpango-1.0.so.*,libpython*,libreadline.so.*,libsoup-2.4.so.*,libssl.so.1.*,python2*,python3*
55private-tmp
56
57dbus-user none
58dbus-system none
59
60#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-a-l/exiftool.profile b/etc/profile-a-l/exiftool.profile
new file mode 100644
index 000000000..90d8a0fc2
--- /dev/null
+++ b/etc/profile-a-l/exiftool.profile
@@ -0,0 +1,57 @@
1# Firejail profile for exiftool
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include exiftool.local
6# Persistent global definitions
7include globals.local
8
9blacklist ${RUNUSER}/wayland-*
10
11# Allow perl (blacklisted by disable-interpreters.inc)
12include allow-perl.inc
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21whitelist /usr/share/perl5
22whitelist /usr/share/perl-image-exiftool
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28ipc-namespace
29machine-id
30net none
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix
41seccomp
42shell none
43tracelog
44x11 none
45
46# To support exiftool in private-bin on Arch Linux (and derivatives), symlink /usr/bin/vendor_perl/exiftool to /usr/bin/exiftool and uncomment the below.
47# Users on non-Arch Linux distributions can safely uncomment (or put in exiftool.local) the line below to enable extra hardening.
48#private-bin exiftool,perl
49private-cache
50private-dev
51private-etc alternatives
52private-tmp
53
54dbus-user none
55dbus-system none
56
57memory-deny-write-execute
diff --git a/etc/profile-a-l/falkon.profile b/etc/profile-a-l/falkon.profile
new file mode 100644
index 000000000..0024b6660
--- /dev/null
+++ b/etc/profile-a-l/falkon.profile
@@ -0,0 +1,43 @@
1# Firejail profile for falkon
2# Description: Lightweight web browser based on Qt WebEngine
3# This file is overwritten after every install/update
4# Persistent local customizations
5include falkon.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/falkon
10noblacklist ${HOME}/.config/falkon
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19mkdir ${HOME}/.cache/falkon
20mkdir ${HOME}/.config/falkon
21whitelist ${DOWNLOADS}
22whitelist ${HOME}/.cache/falkon
23whitelist ${HOME}/.config/falkon
24include whitelist-common.inc
25include whitelist-var-common.inc
26
27caps.drop all
28netfilter
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35protocol unix,inet,inet6,netlink
36# blacklisting of chroot system calls breaks falkon
37seccomp !chroot
38# tracelog
39
40private-dev
41# private-etc alternatives,passwd,group,hostname,hosts,localtime,nsswitch.conf,resolv.conf,gtk-2.0,pango,fonts,adobe,mime.types,mailcap,asound.conf,pulse,machine-id,ca-certificates,ssl,pki,crypto-policies
42# private-tmp - interferes with the opening of downloaded files
43
diff --git a/etc/profile-a-l/fbreader.profile b/etc/profile-a-l/fbreader.profile
new file mode 100644
index 000000000..af670cee2
--- /dev/null
+++ b/etc/profile-a-l/fbreader.profile
@@ -0,0 +1,38 @@
1# Firejail profile for fbreader
2# Description: E-book reader
3# This file is overwritten after every install/update
4# Persistent local customizations
5include fbreader.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.FBReader
10noblacklist ${DOCUMENTS}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-var-common.inc
21
22apparmor
23caps.drop all
24net none
25nodvd
26nonewprivs
27noroot
28nosound
29notv
30nou2f
31novideo
32protocol unix,inet,inet6
33seccomp
34shell none
35
36private-bin fbreader,FBReader
37private-dev
38private-tmp
diff --git a/etc/profile-a-l/fdns.profile b/etc/profile-a-l/fdns.profile
new file mode 100644
index 000000000..179540806
--- /dev/null
+++ b/etc/profile-a-l/fdns.profile
@@ -0,0 +1,50 @@
1# Firejail profile for server
2# This file is overwritten after every install/update
3# Persistent local customizations
4include fdns.local
5# Persistent global definitions
6include globals.local
7
8noblacklist /sbin
9noblacklist /usr/sbin
10
11blacklist /tmp/.X11-unix
12blacklist ${RUNUSER}/wayland-*
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22#include whitelist-usr-share-common.inc
23#include whitelist-var-common.inc
24
25caps.keep kill,net_bind_service,setgid,setuid,sys_admin,sys_chroot
26ipc-namespace
27# netfilter /etc/firejail/webserver.net
28no3d
29nodvd
30nogroups
31nonewprivs
32# noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix,inet,inet6
38#seccomp
39#shell none
40
41disable-mnt
42private
43private-bin bash,fdns,sh
44# private-cache
45private-dev
46private-etc ca-certificates,crypto-policies,fdns,ld.so.cache,ld.so.preload,localtime,nsswitch.conf,passwd,pki,ssl
47# private-lib
48private-tmp
49
50memory-deny-write-execute
diff --git a/etc/profile-a-l/feedreader.profile b/etc/profile-a-l/feedreader.profile
new file mode 100644
index 000000000..7d3c7a8f4
--- /dev/null
+++ b/etc/profile-a-l/feedreader.profile
@@ -0,0 +1,50 @@
1# Firejail profile for feedreader
2# Description: RSS client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include feedreader.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/feedreader
10noblacklist ${HOME}/.local/share/feedreader
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20mkdir ${HOME}/.cache/feedreader
21mkdir ${HOME}/.local/share/feedreader
22whitelist ${HOME}/.cache/feedreader
23whitelist ${HOME}/.local/share/feedreader
24whitelist /usr/share/feedreader
25include whitelist-common.inc
26include whitelist-runuser-common.inc
27include whitelist-usr-share-common.inc
28include whitelist-var-common.inc
29
30caps.drop all
31netfilter
32# no3d
33nodvd
34nogroups
35nonewprivs
36noroot
37# nosound
38notv
39nou2f
40novideo
41protocol unix,inet,inet6
42seccomp
43shell none
44tracelog
45
46disable-mnt
47private-cache
48private-dev
49private-tmp
50
diff --git a/etc/profile-a-l/feh.profile b/etc/profile-a-l/feh.profile
new file mode 100644
index 000000000..91123fa0e
--- /dev/null
+++ b/etc/profile-a-l/feh.profile
@@ -0,0 +1,43 @@
1# Firejail profile for feh
2# Description: imlib2 based image viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include feh.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15
16# This profile disables network access
17# In order to enable network access,
18# uncomment the following or put it in your feh.local:
19# include feh-network.inc
20
21caps.drop all
22net none
23no3d
24nodvd
25nogroups
26nonewprivs
27noroot
28nosound
29notv
30nou2f
31novideo
32protocol unix
33seccomp
34shell none
35
36private-bin feh,jpegexiforient,jpegtran
37private-cache
38private-dev
39private-etc alternatives,feh
40private-tmp
41
42dbus-user none
43dbus-system none
diff --git a/etc/profile-a-l/ferdi.profile b/etc/profile-a-l/ferdi.profile
new file mode 100644
index 000000000..9b4c5f114
--- /dev/null
+++ b/etc/profile-a-l/ferdi.profile
@@ -0,0 +1,46 @@
1# Firejail profile for ferdi
2# This file is overwritten after every install/update
3# Persistent local customizations
4include ferdi.local
5# Persistent global definitions
6include globals.local
7
8ignore noexec /tmp
9
10noblacklist ${HOME}/.cache/Ferdi
11noblacklist ${HOME}/.config/Ferdi
12noblacklist ${HOME}/.pki
13noblacklist ${HOME}/.local/share/pki
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-programs.inc
20
21mkdir ${HOME}/.cache/Ferdi
22mkdir ${HOME}/.config/Ferdi
23mkdir ${HOME}/.pki
24mkdir ${HOME}/.local/share/pki
25whitelist ${DOWNLOADS}
26whitelist ${HOME}/.cache/Ferdi
27whitelist ${HOME}/.config/Ferdi
28whitelist ${HOME}/.pki
29whitelist ${HOME}/.local/share/pki
30include whitelist-common.inc
31
32caps.drop all
33netfilter
34nodvd
35nogroups
36nonewprivs
37noroot
38notv
39nou2f
40protocol unix,inet,inet6,netlink
41seccomp !chroot
42shell none
43
44disable-mnt
45private-dev
46private-tmp
diff --git a/etc/profile-a-l/fetchmail.profile b/etc/profile-a-l/fetchmail.profile
new file mode 100644
index 000000000..d64fe830f
--- /dev/null
+++ b/etc/profile-a-l/fetchmail.profile
@@ -0,0 +1,34 @@
1# Firejail profile for fetchmail
2# Description: SSL enabled POP3, APOP, IMAP mail gatherer/forwarder
3# This file is overwritten after every install/update
4# Persistent local customizations
5include fetchmail.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.fetchmailrc
10noblacklist ${HOME}/.netrc
11
12include disable-common.inc
13include disable-devel.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18caps.drop all
19netfilter
20no3d
21nodvd
22nogroups
23nonewprivs
24noroot
25nosound
26notv
27nou2f
28novideo
29protocol unix,inet,inet6
30seccomp
31shell none
32
33#private-bin bash,chmod,fetchmail,procmail
34private-dev
diff --git a/etc/profile-a-l/ffmpeg.profile b/etc/profile-a-l/ffmpeg.profile
new file mode 100644
index 000000000..37c46e7d6
--- /dev/null
+++ b/etc/profile-a-l/ffmpeg.profile
@@ -0,0 +1,55 @@
1# Firejail profile for ffmpeg
2# Description: Tools for transcoding, streaming and playing of multimedia files
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include ffmpeg.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${MUSIC}
11noblacklist ${VIDEOS}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21whitelist /usr/share/devedeng
22whitelist /usr/share/ffmpeg
23whitelist /usr/share/qtchooser
24include whitelist-usr-share-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29ipc-namespace
30machine-id
31netfilter
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol inet,inet6
41# allow set_mempolicy, which is required to encode using libx265
42seccomp !set_mempolicy
43shell none
44tracelog
45
46private-bin ffmpeg
47private-cache
48private-dev
49private-etc alternatives,ca-certificates,crypto-policies,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,nsswitch.conf,pkcs11,pki,resolv.conf,ssl
50private-tmp
51
52dbus-user none
53dbus-system none
54
55# memory-deny-write-execute - it breaks old versions of ffmpeg
diff --git a/etc/profile-a-l/ffmpegthumbnailer.profile b/etc/profile-a-l/ffmpegthumbnailer.profile
new file mode 100644
index 000000000..6d72c3b99
--- /dev/null
+++ b/etc/profile-a-l/ffmpegthumbnailer.profile
@@ -0,0 +1,18 @@
1# Firejail profile for ffmpegthumbnailer
2# Description: FFmpeg-based video thumbnailer
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include ffmpegthumbnailer.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11private-bin ffmpegthumbnailer
12private-lib libffmpegthumbnailer.so.*
13
14# fix for ranger video thumbnails
15ignore private-cache
16
17# Redirect
18include ffmpeg.profile
diff --git a/etc/profile-a-l/ffplay.profile b/etc/profile-a-l/ffplay.profile
new file mode 100644
index 000000000..04134cbf4
--- /dev/null
+++ b/etc/profile-a-l/ffplay.profile
@@ -0,0 +1,20 @@
1# Firejail profile for ffplay
2# Description: FFmpeg-based media player
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include ffplay.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11protocol unix,inet,inet6
12ignore ipc-namespace
13ignore nogroups
14ignore nosound
15
16private-bin ffplay
17private-etc alsa,asound.conf,group
18
19# Redirect
20include ffmpeg.profile
diff --git a/etc/profile-a-l/ffprobe.profile b/etc/profile-a-l/ffprobe.profile
new file mode 100644
index 000000000..e7c9f678d
--- /dev/null
+++ b/etc/profile-a-l/ffprobe.profile
@@ -0,0 +1,14 @@
1# Firejail profile for ffprobe
2# Description: FFmpeg-based media prober
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include ffprobe.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11ignore private-bin
12
13# Redirect
14include ffmpeg.profile
diff --git a/etc/profile-a-l/file-roller.profile b/etc/profile-a-l/file-roller.profile
new file mode 100644
index 000000000..70dd030ee
--- /dev/null
+++ b/etc/profile-a-l/file-roller.profile
@@ -0,0 +1,44 @@
1# Firejail profile for file-roller
2# Description: Archive manager for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include file-roller.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15
16whitelist /usr/share/file-roller
17include whitelist-runuser-common.inc
18include whitelist-usr-share-common.inc
19include whitelist-var-common.inc
20
21apparmor
22caps.drop all
23#ipc-namespace - causing issues launching on archlinux
24machine-id
25# net none - breaks on older Ubuntu versions
26no3d
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38tracelog
39
40private-bin 7z,7za,7zr,ar,arj,bash,brotli,bzip2,compress,cpio,dpkg-deb,file-roller,gtar,gzip,isoinfo,lha,lrzip,lsar,lz4,lzip,lzma,lzop,p7zip,rar,rzip,sh,tar,unace,unalz,unar,uncompress,unrar,unsquashfs,unstuff,unzip,xz,zip,zoo
41private-cache
42private-dev
43private-etc dconf,fonts,gtk-3.0,xdg
44# private-tmp
diff --git a/etc/profile-a-l/file.profile b/etc/profile-a-l/file.profile
new file mode 100644
index 000000000..74620d4cd
--- /dev/null
+++ b/etc/profile-a-l/file.profile
@@ -0,0 +1,48 @@
1# Firejail profile for file
2# Description: Recognize the type of data in a file using "magic" numbers
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include file.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11blacklist ${RUNUSER}
12
13include disable-common.inc
14include disable-exec.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18apparmor
19caps.drop all
20hostname file
21ipc-namespace
22machine-id
23net none
24no3d
25nodvd
26nogroups
27nonewprivs
28nosound
29notv
30nou2f
31novideo
32protocol unix
33seccomp
34shell none
35tracelog
36x11 none
37
38#private-bin bzip2,file,gzip,lrzip,lz4,lzip,xz,zstd
39private-cache
40private-dev
41#private-etc alternatives,localtime,magic,magic.mgc
42#private-lib file,libarchive.so.*,libfakeroot,libmagic.so.*,libseccomp.so.*
43
44dbus-user none
45dbus-system none
46
47memory-deny-write-execute
48read-only ${HOME}
diff --git a/etc/profile-a-l/filezilla.profile b/etc/profile-a-l/filezilla.profile
new file mode 100644
index 000000000..6c7ab8f0d
--- /dev/null
+++ b/etc/profile-a-l/filezilla.profile
@@ -0,0 +1,40 @@
1# Firejail profile for filezilla
2# Description: Full-featured graphical FTP/FTPS/SFTP client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include filezilla.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/filezilla
10noblacklist ${HOME}/.filezilla
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-interpreters.inc
19include disable-programs.inc
20
21include whitelist-runuser-common.inc
22include whitelist-var-common.inc
23
24caps.drop all
25netfilter
26nodvd
27nonewprivs
28noroot
29nosound
30notv
31nou2f
32novideo
33protocol unix,inet,inet6
34seccomp
35shell none
36
37# private-bin breaks --join if the user has zsh set as $SHELL - adding zsh on private-bin
38private-bin bash,filezilla,fzputtygen,fzsftp,lsb_release,python*,sh,uname,zsh
39private-dev
40private-tmp
diff --git a/etc/profile-a-l/firefox-beta.profile b/etc/profile-a-l/firefox-beta.profile
new file mode 100644
index 000000000..fa8bbb1f5
--- /dev/null
+++ b/etc/profile-a-l/firefox-beta.profile
@@ -0,0 +1,10 @@
1# Firejail profile for firefox-beta
2# This file is overwritten after every install/update
3# Persistent local customizations
4include firefox-beta.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include firefox.profile
diff --git a/etc/profile-a-l/firefox-common.profile b/etc/profile-a-l/firefox-common.profile
new file mode 100644
index 000000000..7c343c26d
--- /dev/null
+++ b/etc/profile-a-l/firefox-common.profile
@@ -0,0 +1,60 @@
1# Firejail profile for firefox-common
2# This file is overwritten after every install/update
3# Persistent local customizations
4include firefox-common.local
5# Persistent global definitions
6# added by caller profile
7#include globals.local
8
9# noexec ${HOME} breaks DRM binaries.
10?BROWSER_ALLOW_DRM: ignore noexec ${HOME}
11
12# Uncomment the following line (or put it in your firefox-common.local) to allow access to common programs/addons/plugins.
13#include firefox-common-addons.inc
14
15noblacklist ${HOME}/.pki
16noblacklist ${HOME}/.local/share/pki
17
18include disable-common.inc
19include disable-devel.inc
20include disable-exec.inc
21include disable-interpreters.inc
22include disable-programs.inc
23
24mkdir ${HOME}/.pki
25mkdir ${HOME}/.local/share/pki
26whitelist ${DOWNLOADS}
27whitelist ${HOME}/.pki
28whitelist ${HOME}/.local/share/pki
29include whitelist-common.inc
30include whitelist-var-common.inc
31
32apparmor
33caps.drop all
34# machine-id breaks pulse audio; it should work fine in setups where sound is not required.
35#machine-id
36netfilter
37nodvd
38nogroups
39nonewprivs
40# noroot breaks GTK_USE_PORTAL=1 usage, see https://github.com/netblue30/firejail/issues/2506.
41noroot
42notv
43?BROWSER_DISABLE_U2F: nou2f
44protocol unix,inet,inet6,netlink
45# The below seccomp configuration still permits chroot syscall. See https://github.com/netblue30/firejail/issues/2506 for possible workarounds.
46seccomp !chroot
47shell none
48# Disable tracelog, it breaks or causes major issues with many firefox based browsers, see https://github.com/netblue30/firejail/issues/1930.
49#tracelog
50
51disable-mnt
52?BROWSER_DISABLE_U2F: private-dev
53# private-etc below works fine on most distributions. There are some problems on CentOS.
54#private-etc alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,group,gtk-2.0,gtk-3.0,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,localtime,machine-id,mailcap,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,selinux,ssl,X11,xdg
55private-tmp
56
57# breaks various desktop integration features
58# among other things global menus, native notifications, Gnome connector, KDE connect and power management on KDE Plasma
59dbus-user none
60dbus-system none
diff --git a/etc/profile-a-l/firefox-developer-edition.profile b/etc/profile-a-l/firefox-developer-edition.profile
new file mode 100644
index 000000000..8c7ca3887
--- /dev/null
+++ b/etc/profile-a-l/firefox-developer-edition.profile
@@ -0,0 +1,11 @@
1# Firejail profile for firefox-developer-edition
2# Description: Developer Edition of the popular Firefox web browser
3# This file is overwritten after every install/update
4# Persistent local customizations
5include firefox-developer-edition.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include firefox.profile
diff --git a/etc/profile-a-l/firefox-esr.profile b/etc/profile-a-l/firefox-esr.profile
new file mode 100644
index 000000000..5e69fdb51
--- /dev/null
+++ b/etc/profile-a-l/firefox-esr.profile
@@ -0,0 +1,12 @@
1# Firejail profile for firefox-esr
2# This file is overwritten after every install/update
3# Persistent local customizations
4include firefox-esr.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9whitelist /usr/share/firefox-esr
10
11# Redirect
12include firefox.profile
diff --git a/etc/profile-a-l/firefox-nightly.profile b/etc/profile-a-l/firefox-nightly.profile
new file mode 100644
index 000000000..96d2bf898
--- /dev/null
+++ b/etc/profile-a-l/firefox-nightly.profile
@@ -0,0 +1,10 @@
1# Firejail profile for firefox-nightly
2# This file is overwritten after every install/update
3# Persistent local customizations
4include firefox-nightly.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include firefox.profile
diff --git a/etc/profile-a-l/firefox-wayland.profile b/etc/profile-a-l/firefox-wayland.profile
new file mode 100644
index 000000000..17c9f059e
--- /dev/null
+++ b/etc/profile-a-l/firefox-wayland.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for firefox-wayland
2# This file is overwritten after every install/update
3# Persistent local customizations
4include firefox-wayland.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include firefox.profile
diff --git a/etc/profile-a-l/firefox-x11.profile b/etc/profile-a-l/firefox-x11.profile
new file mode 100644
index 000000000..ffd64aad7
--- /dev/null
+++ b/etc/profile-a-l/firefox-x11.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for firefox-x11
2# This file is overwritten after every install/update
3# Persistent local customizations
4include firefox-x11.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include firefox.profile
diff --git a/etc/profile-a-l/firefox.profile b/etc/profile-a-l/firefox.profile
new file mode 100644
index 000000000..4a2cb260f
--- /dev/null
+++ b/etc/profile-a-l/firefox.profile
@@ -0,0 +1,32 @@
1# Firejail profile for firefox
2# Description: Safe and easy web browser from Mozilla
3# This file is overwritten after every install/update
4# Persistent local customizations
5include firefox.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/mozilla
10noblacklist ${HOME}/.mozilla
11
12mkdir ${HOME}/.cache/mozilla/firefox
13mkdir ${HOME}/.mozilla
14whitelist ${HOME}/.cache/mozilla/firefox
15whitelist ${HOME}/.mozilla
16
17whitelist /usr/share/doc
18whitelist /usr/share/firefox
19whitelist /usr/share/gtk-doc/html
20whitelist /usr/share/mozilla
21whitelist /usr/share/webext
22include whitelist-usr-share-common.inc
23
24# firefox requires a shell to launch on Arch.
25#private-bin bash,dbus-launch,dbus-send,env,firefox,sh,which
26# Fedora use shell scripts to launch firefox, at least this is required
27#private-bin basename,bash,cat,dirname,expr,false,firefox,firefox-wayland,ln,mkdir,pidof,rm,rmdir,sed,sh,tclsh,true,uname
28# private-etc must first be enabled in firefox-common.profile
29#private-etc firefox
30
31# Redirect
32include firefox-common.profile
diff --git a/etc/profile-a-l/five-or-more.profile b/etc/profile-a-l/five-or-more.profile
new file mode 100644
index 000000000..2c86d3ac7
--- /dev/null
+++ b/etc/profile-a-l/five-or-more.profile
@@ -0,0 +1,21 @@
1# Firejail profile for five-or-more
2# Description: GNOME port of the once-popular Colour Lines game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include five-or-more.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/five-or-more
10
11mkdir ${HOME}/.local/share/five-or-more
12whitelist ${HOME}/.local/share/five-or-more
13
14whitelist /usr/share/five-or-more
15
16private-bin five-or-more
17
18dbus-user.own org.gnome.five-or-more
19
20# Redirect
21include gnome_games-common.profile
diff --git a/etc/profile-a-l/flacsplt.profile b/etc/profile-a-l/flacsplt.profile
new file mode 100644
index 000000000..2efef0f22
--- /dev/null
+++ b/etc/profile-a-l/flacsplt.profile
@@ -0,0 +1,6 @@
1# Firejail profile for flacsplt
2# This file is overwritten after every install/update
3include flacsplt.local
4
5# Redirect
6include mp3splt.profile
diff --git a/etc/profile-a-l/flameshot.profile b/etc/profile-a-l/flameshot.profile
new file mode 100644
index 000000000..5a69684b5
--- /dev/null
+++ b/etc/profile-a-l/flameshot.profile
@@ -0,0 +1,46 @@
1# Firejail profile for flameshot
2# Description: Powerful yet simple-to-use screenshot software
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include flameshot.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${PICTURES}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-runuser-common.inc
21
22caps.drop all
23ipc-namespace
24netfilter
25no3d
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix,inet,inet6
35seccomp
36shell none
37
38disable-mnt
39private-bin flameshot
40private-cache
41private-etc alternatives,ca-certificates,crypto-policies,fonts,ld.so.conf,pki,resolv.conf,ssl
42private-dev
43private-tmp
44
45# dbus-user none
46# dbus-system none
diff --git a/etc/profile-a-l/flashpeak-slimjet.profile b/etc/profile-a-l/flashpeak-slimjet.profile
new file mode 100644
index 000000000..b841bce75
--- /dev/null
+++ b/etc/profile-a-l/flashpeak-slimjet.profile
@@ -0,0 +1,17 @@
1# Firejail profile for flashpeak-slimjet
2# This file is overwritten after every install/update
3# Persistent local customizations
4include flashpeak-slimjet.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/slimjet
9noblacklist ${HOME}/.config/slimjet
10
11mkdir ${HOME}/.cache/slimjet
12mkdir ${HOME}/.config/slimjet
13whitelist ${HOME}/.cache/slimjet
14whitelist ${HOME}/.config/slimjet
15
16# Redirect
17include chromium-common.profile
diff --git a/etc/profile-a-l/flowblade.profile b/etc/profile-a-l/flowblade.profile
new file mode 100644
index 000000000..40472ab93
--- /dev/null
+++ b/etc/profile-a-l/flowblade.profile
@@ -0,0 +1,38 @@
1# Firejail profile for flowblade
2# Description: Non-linear video editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include flowblade.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/flowblade
10noblacklist ${HOME}/.flowblade
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22
23caps.drop all
24netfilter
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31protocol unix,inet,inet6,netlink
32seccomp
33shell none
34
35private-cache
36private-dev
37private-tmp
38
diff --git a/etc/profile-a-l/fluxbox.profile b/etc/profile-a-l/fluxbox.profile
new file mode 100644
index 000000000..c296c0491
--- /dev/null
+++ b/etc/profile-a-l/fluxbox.profile
@@ -0,0 +1,18 @@
1# Firejail profile for fluxbox
2# Description: Standards-compliant, fast, light-weight and extensible window manager
3# This file is overwritten after every install/update
4# Persistent local customizations
5include fluxbox.local
6# Persistent global definitions
7include globals.local
8
9# all applications started in awesome will run in this profile
10noblacklist ${HOME}/.fluxbox
11include disable-common.inc
12
13caps.drop all
14netfilter
15noroot
16protocol unix,inet,inet6
17seccomp
18
diff --git a/etc/profile-a-l/font-manager.profile b/etc/profile-a-l/font-manager.profile
new file mode 100644
index 000000000..ae0e32d1e
--- /dev/null
+++ b/etc/profile-a-l/font-manager.profile
@@ -0,0 +1,56 @@
1# Firejail profile for font-manager
2# Description: A simple font management application for GTK desktop environments
3# This file is overwritten after every install/update
4# Persistent local customizations
5include font-manager.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/font-manager
10noblacklist ${HOME}/.config/font-manager
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24mkdir ${HOME}/.cache/font-manager
25mkdir ${HOME}/.config/font-manager
26whitelist ${HOME}/.cache/font-manager
27whitelist ${HOME}/.config/font-manager
28whitelist /usr/share/font-manager
29include whitelist-common.inc
30include whitelist-usr-share-common.inc
31include whitelist-var-common.inc
32
33apparmor
34caps.drop all
35machine-id
36# net none - issues on older versions
37no3d
38nodvd
39nogroups
40nonewprivs
41noroot
42nosound
43notv
44nou2f
45novideo
46protocol unix
47seccomp
48shell none
49tracelog
50
51disable-mnt
52private-bin font-manager,python*,yelp
53private-dev
54private-tmp
55
56#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-a-l/fontforge.profile b/etc/profile-a-l/fontforge.profile
new file mode 100644
index 000000000..6d305e2af
--- /dev/null
+++ b/etc/profile-a-l/fontforge.profile
@@ -0,0 +1,41 @@
1# Firejail profile for fontforge
2# Description: Font editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include fontforge.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.FontForge
10noblacklist ${DOCUMENTS}
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24caps.drop all
25netfilter
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37
38private-cache
39private-dev
40private-tmp
41
diff --git a/etc/profile-a-l/fossamail.profile b/etc/profile-a-l/fossamail.profile
new file mode 100644
index 000000000..2d700d336
--- /dev/null
+++ b/etc/profile-a-l/fossamail.profile
@@ -0,0 +1,23 @@
1# Firejail profile for fossamail
2# This file is overwritten after every install/update
3# Persistent local customizations
4include fossamail.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9noblacklist ${HOME}/.cache/fossamail
10noblacklist ${HOME}/.fossamail
11noblacklist ${HOME}/.gnupg
12
13mkdir ${HOME}/.cache/fossamail
14mkdir ${HOME}/.fossamail
15mkdir ${HOME}/.gnupg
16whitelist ${HOME}/.cache/fossamail
17whitelist ${HOME}/.fossamail
18whitelist ${HOME}/.gnupg
19include whitelist-common.inc
20
21# allow browsers
22# Redirect
23include firefox.profile
diff --git a/etc/profile-a-l/four-in-a-row.profile b/etc/profile-a-l/four-in-a-row.profile
new file mode 100644
index 000000000..eb0c43ca5
--- /dev/null
+++ b/etc/profile-a-l/four-in-a-row.profile
@@ -0,0 +1,19 @@
1# Firejail profile for four-in-a-row
2# Description: four-in-a-row game for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include four-in-a-row.local
6# Persistent global definitions
7include globals.local
8
9ignore machine-id
10ignore nosound
11
12whitelist /usr/share/four-in-a-row
13
14private-bin four-in-a-row
15
16dbus-user.own org.gnome.Four-in-a-row
17
18# Redirect
19include gnome_games-common.profile
diff --git a/etc/profile-a-l/franz.profile b/etc/profile-a-l/franz.profile
new file mode 100644
index 000000000..344804ca9
--- /dev/null
+++ b/etc/profile-a-l/franz.profile
@@ -0,0 +1,46 @@
1# Firejail profile for franz
2# This file is overwritten after every install/update
3# Persistent local customizations
4include franz.local
5# Persistent global definitions
6include globals.local
7
8ignore noexec /tmp
9
10noblacklist ${HOME}/.cache/Franz
11noblacklist ${HOME}/.config/Franz
12noblacklist ${HOME}/.pki
13noblacklist ${HOME}/.local/share/pki
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-programs.inc
20
21mkdir ${HOME}/.cache/Franz
22mkdir ${HOME}/.config/Franz
23mkdir ${HOME}/.pki
24mkdir ${HOME}/.local/share/pki
25whitelist ${DOWNLOADS}
26whitelist ${HOME}/.cache/Franz
27whitelist ${HOME}/.config/Franz
28whitelist ${HOME}/.pki
29whitelist ${HOME}/.local/share/pki
30include whitelist-common.inc
31
32caps.drop all
33netfilter
34nodvd
35nogroups
36nonewprivs
37noroot
38notv
39nou2f
40protocol unix,inet,inet6,netlink
41seccomp !chroot
42shell none
43
44disable-mnt
45private-dev
46private-tmp
diff --git a/etc/profile-a-l/freecad.profile b/etc/profile-a-l/freecad.profile
new file mode 100644
index 000000000..0a1d4a750
--- /dev/null
+++ b/etc/profile-a-l/freecad.profile
@@ -0,0 +1,45 @@
1# Firejail profile for freecad
2# Description: Extensible Open Source CAx program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include freecad.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/FreeCAD
10noblacklist ${DOCUMENTS}
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24caps.drop all
25ipc-namespace
26net none
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38
39private-bin freecad,freecadcmd,python*
40private-cache
41private-dev
42private-tmp
43
44dbus-user none
45dbus-system none
diff --git a/etc/profile-a-l/freecadcmd.profile b/etc/profile-a-l/freecadcmd.profile
new file mode 100644
index 000000000..44bf62cfe
--- /dev/null
+++ b/etc/profile-a-l/freecadcmd.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for freecad
2# This file is overwritten after every install/update
3
4# Redirect
5include freecad.profile
diff --git a/etc/profile-a-l/freeciv-gtk3.profile b/etc/profile-a-l/freeciv-gtk3.profile
new file mode 100644
index 000000000..fa36459e7
--- /dev/null
+++ b/etc/profile-a-l/freeciv-gtk3.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for freeciv
2# This file is overwritten after every install/update
3
4# Redirect
5include freeciv.profile
diff --git a/etc/profile-a-l/freeciv-mp-gtk3.profile b/etc/profile-a-l/freeciv-mp-gtk3.profile
new file mode 100644
index 000000000..fa36459e7
--- /dev/null
+++ b/etc/profile-a-l/freeciv-mp-gtk3.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for freeciv
2# This file is overwritten after every install/update
3
4# Redirect
5include freeciv.profile
diff --git a/etc/profile-a-l/freeciv.profile b/etc/profile-a-l/freeciv.profile
new file mode 100644
index 000000000..0fe933478
--- /dev/null
+++ b/etc/profile-a-l/freeciv.profile
@@ -0,0 +1,47 @@
1# Firejail profile for freeciv
2# Description: A multi-player strategy game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include freeciv.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.freeciv
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.freeciv
20whitelist ${HOME}/.freeciv
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26ipc-namespace
27netfilter
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33nou2f
34novideo
35protocol unix,inet,inet6
36seccomp
37shell none
38tracelog
39
40disable-mnt
41private-bin freeciv-gtk3,freeciv-manual,freeciv-mp-gtk3,freeciv-server
42private-cache
43private-dev
44private-tmp
45
46dbus-user none
47dbus-system none
diff --git a/etc/profile-a-l/freecol.profile b/etc/profile-a-l/freecol.profile
new file mode 100644
index 000000000..3cbd2ff53
--- /dev/null
+++ b/etc/profile-a-l/freecol.profile
@@ -0,0 +1,58 @@
1# Firejail profile for freecol
2# Description: Turn-based multi-player strategy game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include freecol.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.freecol
10noblacklist ${HOME}/.cache/freecol
11noblacklist ${HOME}/.config/freecol
12noblacklist ${HOME}/.local/share/freecol
13
14# Allow java (blacklisted by disable-devel.inc)
15include allow-java.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25mkdir ${HOME}/.java
26mkdir ${HOME}/.cache/freecol
27mkdir ${HOME}/.config/freecol
28mkdir ${HOME}/.local/share/freecol
29whitelist ${HOME}/.freecol
30whitelist ${HOME}/.java
31whitelist ${HOME}/.cache/freecol
32whitelist ${HOME}/.config/freecol
33whitelist ${HOME}/.local/share/freecol
34include whitelist-common.inc
35include whitelist-var-common.inc
36
37caps.drop all
38ipc-namespace
39netfilter
40nodvd
41nogroups
42nonewprivs
43noroot
44notv
45nou2f
46novideo
47protocol unix,inet,inet6
48seccomp
49shell none
50tracelog
51
52disable-mnt
53private-cache
54private-dev
55private-tmp
56
57dbus-user none
58dbus-system none
diff --git a/etc/profile-a-l/freemind.profile b/etc/profile-a-l/freemind.profile
new file mode 100644
index 000000000..0ffb5c54d
--- /dev/null
+++ b/etc/profile-a-l/freemind.profile
@@ -0,0 +1,53 @@
1# Firejail profile for freemind
2# Description: Free mind mapping software
3# This file is overwritten after every install/update
4# Persistent local customizations
5include freemind.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${DOCUMENTS}
10noblacklist ${HOME}/.freemind
11
12# Allow java (blacklisted by disable-devel.inc)
13include allow-java.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23include whitelist-var-common.inc
24
25apparmor
26caps.drop all
27machine-id
28netfilter
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix,inet,inet6
39seccomp
40shell none
41tracelog
42
43disable-mnt
44private-bin bash,cp,dirname,dpkg,echo,freemind,grep,java,lsb_release,mkdir,readlink,rpm,sed,sh,uname,which
45private-cache
46private-dev
47#private-etc alternatives,fonts,java
48private-tmp
49private-opt none
50private-srv none
51
52dbus-user none
53dbus-system none
diff --git a/etc/profile-a-l/freeoffice-planmaker.profile b/etc/profile-a-l/freeoffice-planmaker.profile
new file mode 100644
index 000000000..9449e7c48
--- /dev/null
+++ b/etc/profile-a-l/freeoffice-planmaker.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for freeoffice-planmaker
2# Description: SoftMaker FreeOffice - spreadsheet program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include freeoffice-planmaker.local
6# Persistent global definitions
7include globals.local
8
9# Redirect
10include softmaker-common.inc
diff --git a/etc/profile-a-l/freeoffice-presentations.profile b/etc/profile-a-l/freeoffice-presentations.profile
new file mode 100644
index 000000000..636868e2e
--- /dev/null
+++ b/etc/profile-a-l/freeoffice-presentations.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for freeoffice-presentations
2# Description: SoftMaker FreeOffice - presentations software
3# This file is overwritten after every install/update
4# Persistent local customizations
5include freeoffice-presentations.local
6# Persistent global definitions
7include globals.local
8
9# Redirect
10include softmaker-common.inc
diff --git a/etc/profile-a-l/freeoffice-textmaker.profile b/etc/profile-a-l/freeoffice-textmaker.profile
new file mode 100644
index 000000000..5d98d1cc6
--- /dev/null
+++ b/etc/profile-a-l/freeoffice-textmaker.profile
@@ -0,0 +1,9 @@
1# Firejail profile alias for freeoffice-textmaker
2# Description: SoftMaker Office - word processor
3# This file is overwritten after every install/update
4include freeoffice-textmaker.local
5# Persistent global definitions
6include globals.local
7
8# Redirect
9include softmaker-common.inc
diff --git a/etc/profile-a-l/freshclam.profile b/etc/profile-a-l/freshclam.profile
new file mode 100644
index 000000000..2bab79e2e
--- /dev/null
+++ b/etc/profile-a-l/freshclam.profile
@@ -0,0 +1,35 @@
1# Firejail profile for freshclam
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include clamav.local
6# Persistent global definitions
7include globals.local
8
9include disable-exec.inc
10
11caps.keep setgid,setuid
12ipc-namespace
13netfilter
14no3d
15nodvd
16nogroups
17nonewprivs
18nosound
19notv
20nou2f
21novideo
22protocol unix,inet,inet6
23seccomp
24shell none
25tracelog
26
27disable-mnt
28private
29private-cache
30private-dev
31private-tmp
32writable-var
33writable-var-log
34
35memory-deny-write-execute
diff --git a/etc/profile-a-l/frogatto.profile b/etc/profile-a-l/frogatto.profile
new file mode 100644
index 000000000..06f13e8c6
--- /dev/null
+++ b/etc/profile-a-l/frogatto.profile
@@ -0,0 +1,49 @@
1# Firejail profile for frogatto
2# Description: 2D platformer game starring a quixotic frog
3# This file is overwritten after every install/update
4# Persistent local customizations
5include frogatto.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.frogatto
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.frogatto
20whitelist ${HOME}/.frogatto
21whitelist /usr/share/frogatto
22include whitelist-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28net none
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private-bin frogatto,sh
43private-cache
44private-dev
45private-etc machine-id
46private-tmp
47
48dbus-user none
49dbus-system none
diff --git a/etc/profile-a-l/frozen-bubble.profile b/etc/profile-a-l/frozen-bubble.profile
new file mode 100644
index 000000000..d1dc64bb9
--- /dev/null
+++ b/etc/profile-a-l/frozen-bubble.profile
@@ -0,0 +1,46 @@
1# Firejail profile for frozen-bubble
2# Description: Cool game where you pop out the bubbles
3# This file is overwritten after every install/update
4# Persistent local customizations
5include frozen-bubble.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.frozen-bubble
10
11# Allow perl (blacklisted by disable-interpreters.inc)
12include allow-perl.inc
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21mkdir ${HOME}/.frozen-bubble
22whitelist ${HOME}/.frozen-bubble
23include whitelist-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28net none
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol unix,netlink
37seccomp
38shell none
39
40disable-mnt
41# private-bin frozen-bubble
42private-dev
43private-tmp
44
45dbus-user none
46dbus-system none
diff --git a/etc/profile-a-l/gajim-history-manager.profile b/etc/profile-a-l/gajim-history-manager.profile
new file mode 100644
index 000000000..2ae6dd9d8
--- /dev/null
+++ b/etc/profile-a-l/gajim-history-manager.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for gajim-history-manager
2# This file is overwritten after every install/update
3
4# Redirect
5include gajim.profile
diff --git a/etc/profile-a-l/gajim.profile b/etc/profile-a-l/gajim.profile
new file mode 100644
index 000000000..85d9b9bd9
--- /dev/null
+++ b/etc/profile-a-l/gajim.profile
@@ -0,0 +1,55 @@
1# Firejail profile for gajim
2# Description: GTK+-based Jabber client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gajim.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/gajim
10noblacklist ${HOME}/.config/gajim
11noblacklist ${HOME}/.local/share/gajim
12
13# Allow python (blacklisted by disable-interpreters.inc)
14#include allow-python2.inc
15include allow-python3.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23# Comment the following line if you need to whitelist other folders than ~/Downloads
24include disable-xdg.inc
25
26mkdir ${HOME}/.cache/gajim
27mkdir ${HOME}/.config/gajim
28mkdir ${HOME}/.local/share/gajim
29whitelist ${HOME}/.cache/gajim
30whitelist ${HOME}/.config/gajim
31whitelist ${HOME}/.local/share/gajim
32whitelist ${DOWNLOADS}
33include whitelist-common.inc
34include whitelist-var-common.inc
35
36caps.drop all
37netfilter
38nodvd
39nogroups
40nonewprivs
41noroot
42notv
43nou2f
44protocol unix,inet,inet6,netlink
45seccomp
46shell none
47tracelog
48
49disable-mnt
50private-bin bash,gajim,gajim-history-manager,gpg,gpg2,paplay,python,python3,sh,zsh
51private-dev
52private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,group,hostname,hosts,ld.so.cache,ld.so.conf,localtime,machine-id,passwd,pki,pulse,resolv.conf,ssl
53private-tmp
54
55join-or-start gajim
diff --git a/etc/profile-a-l/galculator.profile b/etc/profile-a-l/galculator.profile
new file mode 100644
index 000000000..404d89742
--- /dev/null
+++ b/etc/profile-a-l/galculator.profile
@@ -0,0 +1,52 @@
1# Firejail profile for galculator
2# Description: Scientific calculator
3# This file is overwritten after every install/update
4# Persistent local customizations
5include galculator.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/galculator
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.config/galculator
20whitelist ${HOME}/.config/galculator
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26#hostname galculator - breaks Arch Linux
27#ipc-namespace
28net none
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40tracelog
41
42private-bin galculator
43private-cache
44private-dev
45private-etc alternatives,fonts
46private-lib
47private-tmp
48
49dbus-user none
50dbus-system none
51
52#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-a-l/gcalccmd.profile b/etc/profile-a-l/gcalccmd.profile
new file mode 100644
index 000000000..691d6b0c4
--- /dev/null
+++ b/etc/profile-a-l/gcalccmd.profile
@@ -0,0 +1,13 @@
1# Firejail profile for gcalccmd
2# Description: GNOME console calculator
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gcalccmd.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10private-bin gcalccmd
11
12# Redirect
13include gnome-calculator.profile
diff --git a/etc/profile-a-l/gcloud.profile b/etc/profile-a-l/gcloud.profile
new file mode 100644
index 000000000..46a862a21
--- /dev/null
+++ b/etc/profile-a-l/gcloud.profile
@@ -0,0 +1,42 @@
1# Firejail profile for gcloud
2# This file is overwritten after every install/update
3# Persistent local customizations
4include gcloud.local
5# Persistent global definitions
6include globals.local
7
8# noexec ${HOME} will break user-local installs of gcloud tooling
9ignore noexec ${HOME}
10
11noblacklist ${HOME}/.boto
12noblacklist ${HOME}/.config/gcloud
13noblacklist /var/run/docker.sock
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-programs.inc
19
20apparmor
21caps.drop all
22machine-id
23netfilter
24nodvd
25# required for sudo-free docker
26#nogroups
27nonewprivs
28noroot
29notv
30nou2f
31protocol unix,inet,inet6
32seccomp
33shell none
34tracelog
35
36disable-mnt
37private-dev
38private-etc alternatives,ca-certificates,crypto-policies,hosts,ld.so.cache,localtime,nsswitch.conf,pki,resolv.conf,ssl
39private-tmp
40
41dbus-user none
42dbus-system none
diff --git a/etc/profile-a-l/gconf-editor.profile b/etc/profile-a-l/gconf-editor.profile
new file mode 100644
index 000000000..cb39174e5
--- /dev/null
+++ b/etc/profile-a-l/gconf-editor.profile
@@ -0,0 +1,17 @@
1# Firejail profile for gconf-editor
2# Description: Graphical gconf registry editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gconf-editor.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10blacklist /tmp/.X11-unix
11
12whitelist /usr/share/gconf-editor
13
14ignore x11 none
15
16# Redirect
17include gconf.profile
diff --git a/etc/profile-a-l/gconf-merge-schema.profile b/etc/profile-a-l/gconf-merge-schema.profile
new file mode 100644
index 000000000..619f801b0
--- /dev/null
+++ b/etc/profile-a-l/gconf-merge-schema.profile
@@ -0,0 +1,11 @@
1# Firejail profile for gconf-merge-schema
2# Description: An obsolete configuration database system (CLI utility)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gconf-merge-schema.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gconf.profile
diff --git a/etc/profile-a-l/gconf-merge-tree.profile b/etc/profile-a-l/gconf-merge-tree.profile
new file mode 100644
index 000000000..2f6bfe5e5
--- /dev/null
+++ b/etc/profile-a-l/gconf-merge-tree.profile
@@ -0,0 +1,11 @@
1# Firejail profile for gconf-merge-tree
2# Description: An obsolete configuration database system (CLI utility)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gconf-merge-tree.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gconf.profile
diff --git a/etc/profile-a-l/gconf.profile b/etc/profile-a-l/gconf.profile
new file mode 100644
index 000000000..96848575d
--- /dev/null
+++ b/etc/profile-a-l/gconf.profile
@@ -0,0 +1,61 @@
1# Firejail profile for gconf
2# Description: An obsolete configuration database system
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gconf.local
6# Persistent global definitions
7include globals.local
8
9blacklist ${RUNUSER}/wayland-*
10
11noblacklist ${HOME}/.config/gconf
12
13# Allow python (blacklisted by disable-interpreters.inc)
14include allow-python2.inc
15#include allow-python3.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25mkdir ${HOME}/.config/gconf
26whitelist ${HOME}/.config/gconf
27whitelist /usr/share/GConf
28whitelist /usr/share/gconf
29include whitelist-common.inc
30include whitelist-usr-share-common.inc
31include whitelist-var-common.inc
32
33apparmor
34caps.drop all
35ipc-namespace
36machine-id
37net none
38no3d
39nodvd
40nogroups
41nonewprivs
42noroot
43nosound
44notv
45nou2f
46novideo
47protocol unix
48seccomp
49shell none
50tracelog
51x11 none
52
53disable-mnt
54private-bin gconf-editor,gconf-merge-*,gconfpkg,gconftool-2,gsettings-*-convert,python2*
55private-cache
56private-dev
57private-etc alternatives,fonts,gconf
58private-lib GConf,libpython*,python2*
59private-tmp
60
61memory-deny-write-execute
diff --git a/etc/profile-a-l/gconfpkg.profile b/etc/profile-a-l/gconfpkg.profile
new file mode 100644
index 000000000..5bfc1250a
--- /dev/null
+++ b/etc/profile-a-l/gconfpkg.profile
@@ -0,0 +1,11 @@
1# Firejail profile for gconfpkg
2# Description: An obsolete configuration database system (CLI utility)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gconfpkg.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gconf.profile
diff --git a/etc/profile-a-l/gconftool-2.profile b/etc/profile-a-l/gconftool-2.profile
new file mode 100644
index 000000000..947e4252f
--- /dev/null
+++ b/etc/profile-a-l/gconftool-2.profile
@@ -0,0 +1,11 @@
1# Firejail profile for gconftool-2
2# Description: An obsolete configuration database system (CLI utility)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gconftool-2.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gconf.profile
diff --git a/etc/profile-a-l/geany.profile b/etc/profile-a-l/geany.profile
new file mode 100644
index 000000000..31599e32a
--- /dev/null
+++ b/etc/profile-a-l/geany.profile
@@ -0,0 +1,35 @@
1# Firejail profile for geany
2# Description: Fast and lightweight IDE
3# This file is overwritten after every install/update
4# Persistent local customizations
5include geany.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/geany
10
11# Allows files commonly used by IDEs
12include allow-common-devel.inc
13
14include disable-common.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18caps.drop all
19netfilter
20no3d
21nodvd
22nogroups
23nonewprivs
24noroot
25nosound
26notv
27nou2f
28novideo
29protocol unix,inet,inet6
30seccomp
31shell none
32
33private-cache
34private-dev
35private-tmp
diff --git a/etc/profile-a-l/geary.profile b/etc/profile-a-l/geary.profile
new file mode 100644
index 000000000..fa01d04b7
--- /dev/null
+++ b/etc/profile-a-l/geary.profile
@@ -0,0 +1,33 @@
1# Firejail profile for geary
2# Description: Lightweight email client designed for the GNOME desktop
3# This file is overwritten after every install/update
4# Persistent local customizations
5include geary.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Users have Geary set to open a browser by clicking a link in an email
11# We are not allowed to blacklist browser-specific directories
12
13ignore dbus-user none
14ignore dbus-system none
15ignore private-tmp
16
17noblacklist ${HOME}/.gnupg
18noblacklist ${HOME}/.local/share/geary
19
20mkdir ${HOME}/.gnupg
21mkdir ${HOME}/.config/geary
22mkdir ${HOME}/.local/share/geary
23whitelist ${HOME}/.gnupg
24whitelist ${HOME}/.config/geary
25whitelist ${HOME}/.local/share/geary
26
27read-only ${HOME}/.config/mimeapps.list
28
29whitelist /usr/share/geary
30
31# allow Mozilla browsers
32# Redirect
33include firefox.profile
diff --git a/etc/profile-a-l/gedit.profile b/etc/profile-a-l/gedit.profile
new file mode 100644
index 000000000..17b7ad563
--- /dev/null
+++ b/etc/profile-a-l/gedit.profile
@@ -0,0 +1,51 @@
1# Firejail profile for gedit
2# Description: Official text editor of the GNOME desktop environment
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gedit.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/enchant
10noblacklist ${HOME}/.config/gedit
11
12# Allows files commonly used by IDEs
13include allow-common-devel.inc
14
15include disable-common.inc
16# include disable-devel.inc
17include disable-exec.inc
18# include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22include whitelist-runuser-common.inc
23include whitelist-var-common.inc
24
25# apparmor - makes settings immutable
26caps.drop all
27machine-id
28# net none - makes settings immutable
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix
39seccomp
40shell none
41tracelog
42
43# private-bin gedit
44private-dev
45# private-lib breaks python plugins, uncomment or add to your gedit.local if you don't use them.
46#private-lib aspell,gconv,gedit,libgspell-1.so.*,libgtksourceview-*,libpeas-gtk-1.0.so.*,libreadline.so.*,libtinfo.so.*
47private-tmp
48
49# makes settings immutable
50# dbus-user none
51# dbus-system none
diff --git a/etc/profile-a-l/geekbench.profile b/etc/profile-a-l/geekbench.profile
new file mode 100644
index 000000000..e06a9afad
--- /dev/null
+++ b/etc/profile-a-l/geekbench.profile
@@ -0,0 +1,55 @@
1# Firejail profile for geekbench
2# Description: A cross-platform benchmark that measures processor and memory performance
3# This file is overwritten after every install/update
4# Persistent local customizations
5include geekbench.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17include whitelist-common.inc
18include whitelist-usr-share-common.inc
19include whitelist-var-common.inc
20
21apparmor
22caps.drop all
23hostname geekbench
24ipc-namespace
25machine-id
26netfilter
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix,inet,inet6
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private-bin bash,geekbenc*,sh
43private-cache
44private-dev
45private-etc alternatives,group,lsb-release,passwd
46private-lib gcc/*/*/libstdc++.so.*
47private-opt none
48private-tmp
49
50dbus-user none
51dbus-system none
52
53#memory-deny-write-execute - breaks on Arch (see issue #1803)
54
55read-only ${HOME}
diff --git a/etc/profile-a-l/geeqie.profile b/etc/profile-a-l/geeqie.profile
new file mode 100644
index 000000000..8810ca161
--- /dev/null
+++ b/etc/profile-a-l/geeqie.profile
@@ -0,0 +1,33 @@
1# Firejail profile for geeqie
2# Description: Image viewer using GTK+
3# This file is overwritten after every install/update
4# Persistent local customizations
5include geeqie.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/geeqie
10noblacklist ${HOME}/.config/geeqie
11noblacklist ${HOME}/.local/share/geeqie
12
13include disable-common.inc
14include disable-devel.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19caps.drop all
20nodvd
21nogroups
22nonewprivs
23noroot
24nosound
25notv
26nou2f
27novideo
28protocol unix
29seccomp
30shell none
31
32# private-bin geeqie
33private-dev
diff --git a/etc/profile-a-l/gfeeds.profile b/etc/profile-a-l/gfeeds.profile
new file mode 100644
index 000000000..e7913f5e4
--- /dev/null
+++ b/etc/profile-a-l/gfeeds.profile
@@ -0,0 +1,62 @@
1# Firejail profile for gfeeds
2# Description: RSS/Atom feed reader for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gfeeds.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/gfeeds
10noblacklist ${HOME}/.cache/org.gabmus.gfeeds
11noblacklist ${HOME}/.config/org.gabmus.gfeeds.json
12
13# Allow python (blacklisted by disable-interpreters.inc)
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24mkdir ${HOME}/.cache/gfeeds
25mkdir ${HOME}/.cache/org.gabmus.gfeeds
26mkfile ${HOME}/.config/org.gabmus.gfeeds.json
27whitelist ${HOME}/.cache/gfeeds
28whitelist ${HOME}/.cache/org.gabmus.gfeeds
29whitelist ${HOME}/.config/org.gabmus.gfeeds.json
30whitelist /usr/share/gfeeds
31include whitelist-common.inc
32include whitelist-runuser-common.inc
33include whitelist-usr-share-common.inc
34include whitelist-var-common.inc
35
36apparmor
37caps.drop all
38machine-id
39netfilter
40no3d
41nodvd
42nogroups
43nonewprivs
44noroot
45nosound
46notv
47nou2f
48novideo
49protocol unix,inet,inet6
50seccomp
51shell none
52tracelog
53
54disable-mnt
55private-bin gfeeds,python3*
56# private-cache -- feeds are stored in ~/.cache
57private-dev
58private-etc alternatives,ca-certificates,crypto-policies,dbus-1,dconf,fonts,gconf,group,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,machine-id,mime.types,nsswitch.conf,pango,passwd,pki,protocols,resolv.conf,rpc,services,ssl,X11,xdg
59private-tmp
60
61# dbus-user none
62# dbus-system none
diff --git a/etc/profile-a-l/ghb.profile b/etc/profile-a-l/ghb.profile
new file mode 100644
index 000000000..1e7ce2350
--- /dev/null
+++ b/etc/profile-a-l/ghb.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for handbrake
2# This file is overwritten after every install/update
3
4# Redirect
5include handbrake.profile
diff --git a/etc/profile-a-l/ghostwriter.profile b/etc/profile-a-l/ghostwriter.profile
new file mode 100644
index 000000000..c18a6b72e
--- /dev/null
+++ b/etc/profile-a-l/ghostwriter.profile
@@ -0,0 +1,50 @@
1# Firejail profile for ghostwriter
2# Description: Cross-platform, aesthetic, distraction-free Markdown editor.
3# This file is overwritten after every install/update
4# Persistent local customizations
5include ghostwriter.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/ghostwriter
10noblacklist ${HOME}/.local/share/ghostwriter
11noblacklist ${DOCUMENTS}
12noblacklist ${PICTURES}
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22whitelist /usr/share/ghostwriter
23whitelist /usr/share/mozilla-dicts
24whitelist /usr/share/texlive
25whitelist /usr/share/pandoc*
26include whitelist-usr-share-common.inc
27
28apparmor
29caps.drop all
30machine-id
31netfilter
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix,inet,inet6,netlink
41seccomp !chroot
42shell none
43#tracelog -- breaks
44
45private-bin context,gettext,ghostwriter,latex,mktexfmt,pandoc,pdflatex,pdfroff,prince,weasyprint,wkhtmltopdf
46private-cache
47private-dev
48# passwd,login.defs,firejail are a temporary workaround for #2877 and can be removed once it is fixed
49private-etc alternatives,ca-certificates,crypto-policies,dbus-1,dconf,firejail,fonts,gconf,groups,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,login.defs,machine-id,mime.types,nsswitch.conf,pango,passwd,pki,protocols,resolv.conf,rpc,services,ssl,texlive,Trolltech.conf,X11,xdg
50private-tmp
diff --git a/etc/profile-a-l/gimp-2.10.profile b/etc/profile-a-l/gimp-2.10.profile
new file mode 100644
index 000000000..dbf49ac22
--- /dev/null
+++ b/etc/profile-a-l/gimp-2.10.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for gimp
2# This file is overwritten after every install/update
3
4# Redirect
5include gimp.profile
diff --git a/etc/profile-a-l/gimp-2.8.profile b/etc/profile-a-l/gimp-2.8.profile
new file mode 100644
index 000000000..dbf49ac22
--- /dev/null
+++ b/etc/profile-a-l/gimp-2.8.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for gimp
2# This file is overwritten after every install/update
3
4# Redirect
5include gimp.profile
diff --git a/etc/profile-a-l/gimp.profile b/etc/profile-a-l/gimp.profile
new file mode 100644
index 000000000..8093c0c39
--- /dev/null
+++ b/etc/profile-a-l/gimp.profile
@@ -0,0 +1,55 @@
1# Firejail profile for gimp
2# Description: GNU Image Manipulation Program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gimp.local
6# Persistent global definitions
7include globals.local
8
9# gimp plugins are installed by the user in ${HOME}/.gimp-2.8/plug-ins/ directory
10# if you are not using external plugins, you can comment 'ignore noexec' statement below
11# or put 'noexec ${HOME}' in your gimp.local
12ignore noexec ${HOME}
13
14noblacklist ${HOME}/.cache/babl
15noblacklist ${HOME}/.cache/gegl-0.4
16noblacklist ${HOME}/.cache/gimp
17noblacklist ${HOME}/.config/GIMP
18noblacklist ${HOME}/.gimp*
19noblacklist ${DOCUMENTS}
20noblacklist ${PICTURES}
21
22include disable-common.inc
23include disable-exec.inc
24include disable-devel.inc
25include disable-passwdmgr.inc
26include disable-programs.inc
27include disable-xdg.inc
28
29whitelist /usr/share/gegl-0.4
30whitelist /usr/share/gimp
31whitelist /usr/share/mypaint-data
32whitelist /usr/share/lensfun
33include whitelist-usr-share-common.inc
34include whitelist-var-common.inc
35
36apparmor
37caps.drop all
38net none
39nodvd
40nogroups
41nonewprivs
42noroot
43nosound
44notv
45nou2f
46protocol unix
47seccomp
48shell none
49tracelog
50
51private-dev
52private-tmp
53
54dbus-user none
55dbus-system none
diff --git a/etc/profile-a-l/gist-paste.profile b/etc/profile-a-l/gist-paste.profile
new file mode 100644
index 000000000..56b3176ed
--- /dev/null
+++ b/etc/profile-a-l/gist-paste.profile
@@ -0,0 +1,12 @@
1# Firejail profile for gist-paste
2# Description: Potentially the best command line gister
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include gist-paste.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include gist.profile
diff --git a/etc/profile-a-l/gist.profile b/etc/profile-a-l/gist.profile
new file mode 100644
index 000000000..681fc2829
--- /dev/null
+++ b/etc/profile-a-l/gist.profile
@@ -0,0 +1,61 @@
1# Firejail profile for gist
2# Description: Potentially the best command line gister
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include gist.local
7# Persistent global definitions
8include globals.local
9
10blacklist /tmp/.X11-unix
11blacklist ${RUNUSER}/wayland-*
12
13noblacklist ${HOME}/.gist
14
15# Allow ruby (blacklisted by disable-interpreters.inc)
16include allow-ruby.inc
17
18include disable-common.inc
19include disable-devel.inc
20include disable-exec.inc
21include disable-interpreters.inc
22include disable-passwdmgr.inc
23include disable-programs.inc
24include disable-xdg.inc
25
26mkdir ${HOME}/.gist
27whitelist ${HOME}/.gist
28whitelist ${DOWNLOADS}
29include whitelist-common.inc
30include whitelist-usr-share-common.inc
31include whitelist-var-common.inc
32
33apparmor
34caps.drop all
35ipc-namespace
36machine-id
37netfilter
38no3d
39nodvd
40nogroups
41nonewprivs
42noroot
43nosound
44notv
45nou2f
46novideo
47protocol unix,inet,inet6
48seccomp
49shell none
50tracelog
51
52disable-mnt
53private-cache
54private-dev
55private-etc alternatives
56private-tmp
57
58dbus-user none
59dbus-system none
60
61memory-deny-write-execute
diff --git a/etc/profile-a-l/git.profile b/etc/profile-a-l/git.profile
new file mode 100644
index 000000000..e5a2f3985
--- /dev/null
+++ b/etc/profile-a-l/git.profile
@@ -0,0 +1,59 @@
1# Firejail profile for git
2# Description: Fast, scalable, distributed revision control system
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include git.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${HOME}/.config/git
11noblacklist ${HOME}/.config/nano
12noblacklist ${HOME}/.emacs
13noblacklist ${HOME}/.emacs.d
14noblacklist ${HOME}/.gitconfig
15noblacklist ${HOME}/.git-credentials
16noblacklist ${HOME}/.gnupg
17noblacklist ${HOME}/.nanorc
18noblacklist ${HOME}/.ssh
19noblacklist ${HOME}/.vim
20noblacklist ${HOME}/.viminfo
21
22blacklist /tmp/.X11-unix
23blacklist ${RUNUSER}/wayland-*
24
25include disable-common.inc
26include disable-exec.inc
27include disable-passwdmgr.inc
28include disable-programs.inc
29
30whitelist /usr/share/git
31whitelist /usr/share/git-core
32whitelist /usr/share/gitgui
33whitelist /usr/share/gitweb
34whitelist /usr/share/nano
35include whitelist-usr-share-common.inc
36include whitelist-var-common.inc
37
38apparmor
39caps.drop all
40ipc-namespace
41machine-id
42netfilter
43no3d
44nodvd
45nogroups
46nonewprivs
47noroot
48nosound
49notv
50nou2f
51novideo
52protocol unix,inet,inet6
53seccomp
54shell none
55
56private-cache
57private-dev
58
59memory-deny-write-execute
diff --git a/etc/profile-a-l/gitg.profile b/etc/profile-a-l/gitg.profile
new file mode 100644
index 000000000..68f38c3ce
--- /dev/null
+++ b/etc/profile-a-l/gitg.profile
@@ -0,0 +1,54 @@
1# Firejail profile for gitg
2# Description: Git repository viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gitg.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/git
10noblacklist ${HOME}/.gitconfig
11noblacklist ${HOME}/.git-credentials
12noblacklist ${HOME}/.local/share/gitg
13noblacklist ${HOME}/.ssh
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22#whitelist ${HOME}/YOUR_GIT_PROJECTS_DIRECTORY
23#whitelist ${HOME}/.config/git
24#whitelist ${HOME}/.gitconfig
25#whitelist ${HOME}/.git-credentials
26#whitelist ${HOME}/.local/share/gitg
27#whitelist ${HOME}/.ssh
28#include whitelist-common.inc
29
30whitelist /usr/share/gitg
31include whitelist-runuser-common.inc
32include whitelist-usr-share-common.inc
33include whitelist-var-common.inc
34
35caps.drop all
36netfilter
37no3d
38nodvd
39nogroups
40nonewprivs
41noroot
42nosound
43notv
44nou2f
45novideo
46protocol unix,inet,inet6
47seccomp
48shell none
49tracelog
50
51private-bin git,gitg,ssh
52private-cache
53private-dev
54private-tmp
diff --git a/etc/profile-a-l/github-desktop.profile b/etc/profile-a-l/github-desktop.profile
new file mode 100644
index 000000000..b25b138ad
--- /dev/null
+++ b/etc/profile-a-l/github-desktop.profile
@@ -0,0 +1,48 @@
1# Firejail profile for github-desktop
2# Description: Extend your GitHub workflow beyond your browser with GitHub Desktop
3# This file is overwritten after every install/update
4# Persistent local customizations
5include github-desktop.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/GitHub Desktop
10noblacklist ${HOME}/.config/git
11noblacklist ${HOME}/.gitconfig
12noblacklist ${HOME}/.git-credentials
13
14include disable-common.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20
21caps.drop all
22netfilter
23# no3d
24nodvd
25nogroups
26nonewprivs
27noroot
28nosound
29notv
30nou2f
31novideo
32protocol unix,inet,inet6,netlink
33seccomp
34
35# Note: On debian-based distributions the binary might be located in
36# /opt/GitHub Desktop/github-desktop, and therefore not be in PATH.
37# If that's the case you can start GitHub Desktop with firejail via
38# `firejail "/opt/GitHub Desktop/github-desktop"`.
39
40disable-mnt
41# private-bin github-desktop
42private-cache
43?HAS_APPIMAGE: ignore private-dev
44private-dev
45# private-lib
46private-tmp
47
48# memory-deny-write-execute
diff --git a/etc/profile-a-l/gitter.profile b/etc/profile-a-l/gitter.profile
new file mode 100644
index 000000000..017b1765a
--- /dev/null
+++ b/etc/profile-a-l/gitter.profile
@@ -0,0 +1,44 @@
1# Firejail profile for gitter
2# This file is overwritten after every install/update
3# Persistent local customizations
4include gitter.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/autostart
9noblacklist ${HOME}/.config/Gitter
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.config/Gitter
19whitelist ${DOWNLOADS}
20whitelist ${HOME}/.config/autostart
21whitelist ${HOME}/.config/Gitter
22include whitelist-var-common.inc
23
24caps.drop all
25machine-id
26netfilter
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34protocol unix,inet,inet6,netlink
35seccomp
36shell none
37
38disable-mnt
39private-bin bash,env,gitter
40private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,pulse,resolv.conf,ssl
41private-opt Gitter
42private-dev
43private-tmp
44
diff --git a/etc/profile-a-l/gjs.profile b/etc/profile-a-l/gjs.profile
new file mode 100644
index 000000000..9c8848b8a
--- /dev/null
+++ b/etc/profile-a-l/gjs.profile
@@ -0,0 +1,45 @@
1# Firejail profile for gjs
2# Description: Mozilla-based javascript bindings for the GNOME platform
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gjs.local
6# Persistent global definitions
7include globals.local
8
9# when gjs apps are started via gnome-shell, firejail is not applied because systemd will start them
10
11noblacklist ${HOME}/.cache/libgweather
12noblacklist ${HOME}/.cache/org.gnome.Books
13noblacklist ${HOME}/.config/libreoffice
14noblacklist ${HOME}/.local/share/gnome-photos
15
16# Allow gjs (blacklisted by disable-interpreters.inc)
17include allow-gjs.inc
18
19include disable-common.inc
20include disable-devel.inc
21include disable-interpreters.inc
22include disable-passwdmgr.inc
23include disable-programs.inc
24
25include whitelist-runuser-common.inc
26include whitelist-usr-share-common.inc
27include whitelist-var-common.inc
28
29caps.drop all
30netfilter
31nodvd
32nogroups
33nonewprivs
34noroot
35notv
36nou2f
37protocol unix,inet,inet6
38seccomp
39shell none
40tracelog
41
42# private-bin gjs,gnome-books,gnome-documents,gnome-maps,gnome-photos,gnome-weather
43private-dev
44# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl
45private-tmp
diff --git a/etc/profile-a-l/globaltime.profile b/etc/profile-a-l/globaltime.profile
new file mode 100644
index 000000000..bb78a608e
--- /dev/null
+++ b/etc/profile-a-l/globaltime.profile
@@ -0,0 +1,37 @@
1# Firejail profile for globaltime
2# This file is overwritten after every install/update
3# Persistent local customizations
4include globaltime.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/globaltime
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16include disable-xdg.inc
17
18caps.drop all
19netfilter
20no3d
21nodvd
22nogroups
23nonewprivs
24noroot
25nosound
26notv
27nou2f
28novideo
29protocol unix,inet,inet6
30seccomp
31shell none
32
33disable-mnt
34private-cache
35private-dev
36private-tmp
37
diff --git a/etc/profile-a-l/gmpc.profile b/etc/profile-a-l/gmpc.profile
new file mode 100644
index 000000000..b3aad8b2c
--- /dev/null
+++ b/etc/profile-a-l/gmpc.profile
@@ -0,0 +1,55 @@
1# Firejail profile for gmpc
2# Description: MPD client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gmpc.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/gmpc
10noblacklist ${MUSIC}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20mkdir ${HOME}/.config/gmpc
21whitelist ${HOME}/.config/gmpc
22whitelist ${MUSIC}
23whitelist /usr/share/gmpc
24include whitelist-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30ipc-namespace
31netfilter
32no3d
33nodvd
34nogroups
35nonewprivs
36noroot
37notv
38nou2f
39novideo
40protocol unix,inet,inet6
41seccomp
42shell none
43tracelog
44
45disable-mnt
46#private-bin gmpc
47private-cache
48private-etc alternatives,fonts
49private-tmp
50writable-run-user
51
52# dbus-user none
53# dbus-system none
54
55# memory-deny-write-execute - breaks on Arch
diff --git a/etc/profile-a-l/gnome-2048.profile b/etc/profile-a-l/gnome-2048.profile
new file mode 100644
index 000000000..777c81dbe
--- /dev/null
+++ b/etc/profile-a-l/gnome-2048.profile
@@ -0,0 +1,19 @@
1# Firejail profile for gnome-2048
2# Description: Sliding tile puzzle game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-2048.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/gnome-2048
10
11mkdir ${HOME}/.local/share/gnome-2048
12whitelist ${HOME}/.local/share/gnome-2048
13
14private-bin gnome-2048
15
16dbus-user.own org.gnome.TwentyFortyEight
17
18# Redirect
19include gnome_games-common.profile
diff --git a/etc/profile-a-l/gnome-books.profile b/etc/profile-a-l/gnome-books.profile
new file mode 100644
index 000000000..998109ca7
--- /dev/null
+++ b/etc/profile-a-l/gnome-books.profile
@@ -0,0 +1,46 @@
1# Firejail profile for gnome-books
2# This file is overwritten after every install/update
3# Persistent local customizations
4include gnome-books.local
5# Persistent global definitions
6include globals.local
7
8# when gjs apps are started via gnome-shell, firejail is not applied because systemd will start them
9
10noblacklist ${HOME}/.cache/org.gnome.Books
11noblacklist ${DOCUMENTS}
12
13# Allow gjs (blacklisted by disable-interpreters.inc)
14include allow-gjs.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28net none
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix
39seccomp
40shell none
41tracelog
42
43# private-bin gjs,gnome-books
44private-dev
45private-tmp
46
diff --git a/etc/profile-a-l/gnome-builder.profile b/etc/profile-a-l/gnome-builder.profile
new file mode 100644
index 000000000..7a684dd59
--- /dev/null
+++ b/etc/profile-a-l/gnome-builder.profile
@@ -0,0 +1,36 @@
1# Firejail profile for gnome-builder
2# Description: IDE for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-builder.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/gnome-builder
10noblacklist ${HOME}/.config/gnome-builder
11noblacklist ${HOME}/.local/share/gnome-builder
12
13# Allows files commonly used by IDEs
14include allow-common-devel.inc
15
16include disable-common.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20include whitelist-runuser-common.inc
21
22caps.drop all
23ipc-namespace
24netfilter
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix,inet,inet6
33seccomp
34shell none
35
36private-dev
diff --git a/etc/profile-a-l/gnome-calculator.profile b/etc/profile-a-l/gnome-calculator.profile
new file mode 100644
index 000000000..a18a123d3
--- /dev/null
+++ b/etc/profile-a-l/gnome-calculator.profile
@@ -0,0 +1,53 @@
1# Firejail profile for gnome-calculator
2# Description: GNOME desktop calculator
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include gnome-calculator.local
7# Persistent global definitions
8include globals.local
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-passwdmgr.inc
14include disable-interpreters.inc
15include disable-programs.inc
16include disable-xdg.inc
17
18include whitelist-common.inc
19include whitelist-runuser-common.inc
20include whitelist-usr-share-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25ipc-namespace
26machine-id
27# net none
28netfilter
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix,inet,inet6
39seccomp
40shell none
41
42disable-mnt
43private-bin gnome-calculator
44private-cache
45private-dev
46#private-lib gdk-pixbuf-2.*,gio,girepository-1.*,gvfs,libgconf-2.so.*,libgnutls.so.*,libproxy.so.*,librsvg-2.so.*,libxml2.so.*
47private-tmp
48
49# makes settings immutable
50# dbus-user none
51# dbus-system none
52
53# memory-deny-write-execute
diff --git a/etc/profile-a-l/gnome-character-map.profile b/etc/profile-a-l/gnome-character-map.profile
new file mode 100644
index 000000000..27804fdd0
--- /dev/null
+++ b/etc/profile-a-l/gnome-character-map.profile
@@ -0,0 +1,10 @@
1# Firejail profile for gnome-character-map
2# This file is overwritten after every install/update
3# Persistent local customizations
4include gnome-character-map.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include gucharmap.profile
diff --git a/etc/profile-a-l/gnome-characters.profile b/etc/profile-a-l/gnome-characters.profile
new file mode 100644
index 000000000..3d7a2e4a6
--- /dev/null
+++ b/etc/profile-a-l/gnome-characters.profile
@@ -0,0 +1,59 @@
1# Firejail profile for gnome-characters
2# Description: Character map application for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-characters.local
6# Persistent global definitions
7include globals.local
8
9# Allow gjs (blacklisted by disable-interpreters.inc)
10include allow-gjs.inc
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20whitelist /usr/share/org.gnome.Characters
21include whitelist-common.inc
22include whitelist-runuser-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28machine-id
29net none
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix
40seccomp
41shell none
42tracelog
43
44disable-mnt
45# Uncomment the next line (or add it to your gnome-characters.local)
46# if you don't need recently used chars
47#private
48private-bin gjs,gnome-characters
49private-cache
50private-dev
51private-etc alternatives,dconf,fonts,gconf,gtk-2.0,gtk-3.0,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,mime.types,pango,X11,xdg
52private-tmp
53
54# Uncomment the next lines (or add it to your gnome-characters.local)
55# if you don't need recently used chars
56# dbus-user none
57# dbus-system none
58
59read-only ${HOME}
diff --git a/etc/profile-a-l/gnome-chess.profile b/etc/profile-a-l/gnome-chess.profile
new file mode 100644
index 000000000..2e2e86ac9
--- /dev/null
+++ b/etc/profile-a-l/gnome-chess.profile
@@ -0,0 +1,49 @@
1# Firejail profile for gnome-chess
2# Description: Simple chess game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-chess.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/gnome-chess
10noblacklist ${HOME}/.local/share/gnome-chess
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20whitelist /usr/share/gnuchess
21whitelist /usr/share/gnome-chess
22include whitelist-runuser-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28machine-id
29net none
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix
40seccomp
41shell none
42tracelog
43
44disable-mnt
45private-bin fairymax,gnome-chess,gnuchess,hoichess
46private-cache
47private-dev
48private-etc alternatives,dconf,fonts,gnome-chess,gtk-3.0
49private-tmp
diff --git a/etc/profile-a-l/gnome-clocks.profile b/etc/profile-a-l/gnome-clocks.profile
new file mode 100644
index 000000000..b865423c5
--- /dev/null
+++ b/etc/profile-a-l/gnome-clocks.profile
@@ -0,0 +1,46 @@
1# Firejail profile for gnome-clocks
2# Description: Simple GNOME app with stopwatch, timer, and world clock support
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-clocks.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17whitelist /usr/share/gnome-clocks
18whitelist /usr/share/libgweather
19include whitelist-common.inc
20include whitelist-runuser-common.inc
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26netfilter
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33nou2f
34novideo
35protocol unix,inet,inet6
36seccomp
37shell none
38tracelog
39
40disable-mnt
41private-bin gnome-clocks,gsound-play
42private-cache
43private-dev
44private-etc alternatives,ca-certificates,crypto-policies,dconf,fonts,gtk-3.0,hosts,localtime,machine-id,pkcs11,pki,ssl
45private-tmp
46
diff --git a/etc/profile-a-l/gnome-contacts.profile b/etc/profile-a-l/gnome-contacts.profile
new file mode 100644
index 000000000..7c1e4bb58
--- /dev/null
+++ b/etc/profile-a-l/gnome-contacts.profile
@@ -0,0 +1,39 @@
1# Firejail profile for gnome-contacts
2# Description: Contacts manager for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-contacts.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${DOCUMENTS}
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19include whitelist-common.inc
20include whitelist-runuser-common.inc
21include whitelist-var-common.inc
22
23caps.drop all
24netfilter
25no3d
26nodvd
27nonewprivs
28noroot
29nosound
30notv
31nou2f
32novideo
33protocol unix,inet,inet6,netlink
34seccomp
35
36disable-mnt
37private-dev
38private-tmp
39
diff --git a/etc/profile-a-l/gnome-documents.profile b/etc/profile-a-l/gnome-documents.profile
new file mode 100644
index 000000000..705fe624e
--- /dev/null
+++ b/etc/profile-a-l/gnome-documents.profile
@@ -0,0 +1,44 @@
1# Firejail profile for gnome-documents
2# Description: Document manager for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-documents.local
6# Persistent global definitions
7include globals.local
8
9# when gjs apps are started via gnome-shell, firejail is not applied because systemd will start them
10
11noblacklist ${HOME}/.config/libreoffice
12noblacklist ${DOCUMENTS}
13
14# Allow gjs (blacklisted by disable-interpreters.inc)
15include allow-gjs.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25caps.drop all
26netfilter
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39tracelog
40
41private-cache
42private-dev
43private-tmp
44
diff --git a/etc/profile-a-l/gnome-font-viewer.profile b/etc/profile-a-l/gnome-font-viewer.profile
new file mode 100644
index 000000000..b2327133c
--- /dev/null
+++ b/etc/profile-a-l/gnome-font-viewer.profile
@@ -0,0 +1,37 @@
1# Firejail profile for gnome-font-viewer
2# Description: Font viewer for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-font-viewer.local
6# Persistent global definitions
7include globals.local
8
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16include disable-xdg.inc
17
18include whitelist-var-common.inc
19
20apparmor
21caps.drop all
22net none
23no3d
24nodvd
25nonewprivs
26noroot
27nosound
28notv
29nou2f
30novideo
31protocol unix,inet,inet6
32seccomp
33
34disable-mnt
35private-dev
36private-tmp
37
diff --git a/etc/profile-a-l/gnome-hexgl.profile b/etc/profile-a-l/gnome-hexgl.profile
new file mode 100644
index 000000000..873a47ea9
--- /dev/null
+++ b/etc/profile-a-l/gnome-hexgl.profile
@@ -0,0 +1,50 @@
1# Firejail profile for gnome-hexgl
2# Description: Gthree port of HexGL
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-hexgl.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17mkdir ${HOME}/.cache/mesa_shader_cache
18whitelist /usr/share/gnome-hexgl
19include whitelist-runuser-common.inc
20include whitelist-usr-share-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25net none
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31nou2f
32novideo
33protocol unix
34seccomp
35shell none
36tracelog
37
38disable-mnt
39private
40private-bin gnome-hexgl
41private-cache
42private-dev
43private-etc machine-id
44private-tmp
45
46dbus-user none
47dbus-system none
48
49read-only ${HOME}
50read-write ${HOME}/.cache/mesa_shader_cache
diff --git a/etc/profile-a-l/gnome-keyring-3.profile b/etc/profile-a-l/gnome-keyring-3.profile
new file mode 100644
index 000000000..e9961e4f0
--- /dev/null
+++ b/etc/profile-a-l/gnome-keyring-3.profile
@@ -0,0 +1,11 @@
1# Firejail profile for gnome-keyring-3
2# Description: Stores passwords and encryption keys
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-keyring-3.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gnome-keyring.profile
diff --git a/etc/profile-a-l/gnome-keyring.profile b/etc/profile-a-l/gnome-keyring.profile
new file mode 100644
index 000000000..ecbb74158
--- /dev/null
+++ b/etc/profile-a-l/gnome-keyring.profile
@@ -0,0 +1,57 @@
1# Firejail profile for gnome-keyring
2# Description: Stores passwords and encryption keys
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include gnome-keyring.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${HOME}/.gnupg
11
12whitelist ${HOME}/.gnupg
13whitelist ${DOWNLOADS}
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-passwdmgr.inc
18include disable-interpreters.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22whitelist /usr/share/gnupg
23whitelist /usr/share/gnupg2
24include whitelist-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30ipc-namespace
31machine-id
32netfilter
33no3d
34nodvd
35nogroups
36nonewprivs
37noroot
38nosound
39notv
40nou2f
41novideo
42protocol unix,inet,inet6
43seccomp
44shell none
45tracelog
46
47disable-mnt
48#private-bin gnome-keyrin*,secret-tool
49private-cache
50private-dev
51#private-lib alternatives,gnome-keyring,libsecret-1.so.*,pkcs11,security
52private-tmp
53
54# dbus-user none
55# dbus-system none
56
57memory-deny-write-execute
diff --git a/etc/profile-a-l/gnome-klotski.profile b/etc/profile-a-l/gnome-klotski.profile
new file mode 100644
index 000000000..c67a5c0da
--- /dev/null
+++ b/etc/profile-a-l/gnome-klotski.profile
@@ -0,0 +1,19 @@
1# Firejail profile for gnome-klotski
2# Description: Sliding block puzzles game for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-klotski.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/gnome-klotski
10
11mkdir ${HOME}/.local/share/gnome-klotski
12whitelist ${HOME}/.local/share/gnome-klotski
13
14private-bin gnome-klotski
15
16dbus-user.own org.gnome.Klotski
17
18# Redirect
19include gnome_games-common.profile
diff --git a/etc/profile-a-l/gnome-latex.profile b/etc/profile-a-l/gnome-latex.profile
new file mode 100644
index 000000000..ea4151137
--- /dev/null
+++ b/etc/profile-a-l/gnome-latex.profile
@@ -0,0 +1,51 @@
1# Firejail profile for gnome-latex
2# Description: LaTeX editor for the GNOME desktop
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-latex.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/gnome-latex
10noblacklist ${HOME}/.local/share/gnome-latex
11
12# Allow perl (blacklisted by disable-interpreters.inc)
13include allow-perl.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22whitelist /usr/share/gnome-latex
23whitelist /usr/share/perl5
24whitelist /usr/share/texlive
25include whitelist-runuser-common.inc
26include whitelist-usr-share-common.inc
27# May cause issues.
28#include whitelist-var-common.inc
29
30apparmor
31caps.drop all
32machine-id
33net none
34no3d
35nodvd
36nogroups
37nonewprivs
38noroot
39nosound
40notv
41nou2f
42novideo
43protocol unix
44seccomp
45shell none
46tracelog
47
48private-cache
49private-dev
50# passwd,login.defs,firejail are a temporary workaround for #2877 and can be removed once it is fixed
51private-etc alternatives,dconf,fonts,gtk-3.0,latexmk.conf,login.defs,passwd,texlive
diff --git a/etc/profile-a-l/gnome-logs.profile b/etc/profile-a-l/gnome-logs.profile
new file mode 100644
index 000000000..4b6453015
--- /dev/null
+++ b/etc/profile-a-l/gnome-logs.profile
@@ -0,0 +1,57 @@
1# Firejail profile for gnome-logs
2# Description: Viewer for the systemd journal
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-logs.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17whitelist /var/log/journal
18include whitelist-runuser-common.inc
19include whitelist-usr-share-common.inc
20include whitelist-var-common.inc
21
22apparmor
23caps.drop all
24ipc-namespace
25net none
26no3d
27nodvd
28# When using 'volatile' storage (https://www.freedesktop.org/software/systemd/man/journald.conf.html),
29# comment both 'nogroups' and 'noroot'
30# or put 'ignore nogroups' and 'ignore noroot' in your gnome-logs.local.
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix
39seccomp
40shell none
41tracelog
42
43disable-mnt
44private-bin gnome-logs
45private-cache
46private-dev
47private-etc alternatives,fonts,localtime,machine-id
48private-lib gdk-pixbuf-2.*,gio,gvfs/libgvfscommon.so,libgconf-2.so.*,librsvg-2.so.*
49private-tmp
50writable-var-log
51
52dbus-user none
53dbus-system none
54
55# comment this if you export logs to a file in your ${HOME}
56# or put 'ignore read-only ${HOME}' in your gnome-logs.local.
57read-only ${HOME}
diff --git a/etc/profile-a-l/gnome-mahjongg.profile b/etc/profile-a-l/gnome-mahjongg.profile
new file mode 100644
index 000000000..42409dce8
--- /dev/null
+++ b/etc/profile-a-l/gnome-mahjongg.profile
@@ -0,0 +1,16 @@
1# Firejail profile for gnome-mahjongg
2# Description: A matching game played with Mahjongg tiles
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-mahjongg.local
6# Persistent global definitions
7include globals.local
8
9whitelist /usr/share/gnome-mahjongg
10
11private-bin gnome-mahjongg
12
13dbus-user.own org.gnome.Mahjongg
14
15# Redirect
16include gnome_games-common.profile
diff --git a/etc/profile-a-l/gnome-maps.profile b/etc/profile-a-l/gnome-maps.profile
new file mode 100644
index 000000000..bf263efa9
--- /dev/null
+++ b/etc/profile-a-l/gnome-maps.profile
@@ -0,0 +1,64 @@
1# Firejail profile for gnome-maps
2# Description: Map application for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-maps.local
6# Persistent global definitions
7include globals.local
8
9# Some distributions use gapplications to start gnome-maps over D-Bus. As firecfg cannot handle that, you need to run the following command.
10# sed -e "s/Exec=gapplication launch org.gnome.Maps %U/Exec=gnome-maps %U/" -e "s/DBusActivatable=true/DBusActivatable=false/" "/usr/share/applications/org.gnome.Maps.desktop" > "~/.local/share/applications/org.gnome.Maps.desktop"
11
12# when gjs apps are started via gnome-shell, firejail is not applied because systemd will start them
13
14noblacklist ${HOME}/.cache/champlain
15noblacklist ${HOME}/.cache/org.gnome.Maps
16noblacklist ${HOME}/.local/share/maps-places.json
17
18# Allow gjs (blacklisted by disable-interpreters.inc)
19include allow-gjs.inc
20
21include disable-common.inc
22include disable-devel.inc
23include disable-exec.inc
24include disable-interpreters.inc
25include disable-passwdmgr.inc
26include disable-programs.inc
27include disable-xdg.inc
28
29mkdir ${HOME}/.cache/champlain
30mkfile ${HOME}/.local/share/maps-places.json
31whitelist ${HOME}/.cache/champlain
32whitelist ${HOME}/.local/share/maps-places.json
33whitelist ${DOWNLOADS}
34whitelist ${PICTURES}
35whitelist /usr/share/gnome-maps
36whitelist /usr/share/libgweather
37include whitelist-common.inc
38include whitelist-runuser-common.inc
39include whitelist-usr-share-common.inc
40include whitelist-var-common.inc
41
42apparmor
43caps.drop all
44machine-id
45netfilter
46nodvd
47nogroups
48nonewprivs
49noroot
50nosound
51notv
52nou2f
53novideo
54protocol unix,inet,inet6
55seccomp
56shell none
57tracelog
58
59disable-mnt
60private-bin gjs,gnome-maps
61# private-cache -- gnome-maps cache all maps/satelite-images
62private-dev
63private-etc alternatives,ca-certificates,clutter-1.0,crypto-policies,dconf,drirc,fonts,gconf,gcrypt,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,mime.types,nsswitch.conf,pango,pkcs11,pki,protocols,resolv.conf,rpc,services,ssl,X11,xdg
64private-tmp
diff --git a/etc/profile-a-l/gnome-mines.profile b/etc/profile-a-l/gnome-mines.profile
new file mode 100644
index 000000000..4fe8986c2
--- /dev/null
+++ b/etc/profile-a-l/gnome-mines.profile
@@ -0,0 +1,20 @@
1# Firejail profile for gnome-mines
2# Description: The popular logic puzzle minesweeper
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-mines.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/gnome-mines
10
11mkdir ${HOME}/.local/share/gnome-mines
12whitelist ${HOME}/.local/share/gnome-mines
13whitelist /usr/share/gnome-mines
14
15private-bin gnome-mines
16
17dbus-user.own org.gnome.Mines
18
19# Redirect
20include gnome_games-common.profile
diff --git a/etc/profile-a-l/gnome-mplayer.profile b/etc/profile-a-l/gnome-mplayer.profile
new file mode 100644
index 000000000..12bee6448
--- /dev/null
+++ b/etc/profile-a-l/gnome-mplayer.profile
@@ -0,0 +1,34 @@
1# Firejail profile for gnome-mplayer
2# Description: GTK/Gnome interface around MPlayer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-mplayer.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/gnome-mplayer
10noblacklist ${MUSIC}
11noblacklist ${VIDEOS}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21caps.drop all
22nogroups
23nonewprivs
24noroot
25nou2f
26protocol unix,inet,inet6
27seccomp
28shell none
29
30# private-bin gnome-mplayer,mplayer
31private-cache
32private-dev
33private-tmp
34
diff --git a/etc/profile-a-l/gnome-mpv.profile b/etc/profile-a-l/gnome-mpv.profile
new file mode 100644
index 000000000..f5d652732
--- /dev/null
+++ b/etc/profile-a-l/gnome-mpv.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for celluloid (formerly GNOME MPV)
2# This file is overwritten after every install/update
3
4# Redirect
5include celluloid.profile
diff --git a/etc/profile-a-l/gnome-music.profile b/etc/profile-a-l/gnome-music.profile
new file mode 100644
index 000000000..36b46897c
--- /dev/null
+++ b/etc/profile-a-l/gnome-music.profile
@@ -0,0 +1,47 @@
1# Firejail profile for gnome-music
2# Description: GNOME music player
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-music.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/gnome-music
10noblacklist ${MUSIC}
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24include whitelist-runuser-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29netfilter
30no3d
31nogroups
32nonewprivs
33noroot
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40tracelog
41
42# private-bin calls a file manager - whatever is installed!
43#private-bin env,gio-launch-desktop,gnome-music,python*,yelp
44private-dev
45private-etc alternatives,asound.conf,dconf,fonts,fonts,gtk-3.0,machine-id,pulse,selinux,xdg
46private-tmp
47
diff --git a/etc/profile-a-l/gnome-nettool.profile b/etc/profile-a-l/gnome-nettool.profile
new file mode 100644
index 000000000..33eb9c81a
--- /dev/null
+++ b/etc/profile-a-l/gnome-nettool.profile
@@ -0,0 +1,48 @@
1# Firejail profile for gnome-nettool
2# Description: Graphical interface for various networking tools
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-nettool.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17whitelist /usr/share/gnome-nettool
18#include whitelist-common.inc -- see #903
19include whitelist-runuser-common.inc
20include whitelist-usr-share-common.inc
21include whitelist-var-common.inc
22
23caps.keep net_raw
24ipc-namespace
25machine-id
26netfilter
27no3d
28nodvd
29nogroups
30# ping needs to elevate privileges, noroot and nonewprivs will kill it
31#nonewprivs
32#noroot
33nosound
34notv
35nou2f
36novideo
37#seccomp
38#shell none
39
40disable-mnt
41private
42private-cache
43private-dev
44private-lib libbind9.so.*,libcrypto.so.*,libdns.so.*,libgtk-3.so.*,libgtop*,libirs.so.*,liblua.so.*,libssh2.so.*,libssl.so.*
45private-tmp
46
47dbus-user none
48dbus-system none
diff --git a/etc/profile-a-l/gnome-nibbles.profile b/etc/profile-a-l/gnome-nibbles.profile
new file mode 100644
index 000000000..b22810d34
--- /dev/null
+++ b/etc/profile-a-l/gnome-nibbles.profile
@@ -0,0 +1,23 @@
1# Firejail profile for gnome-nibbles
2# Description: A worm game for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-nibbles.local
6# Persistent global definitions
7include globals.local
8
9ignore machine-id
10ignore nosound
11
12noblacklist ${HOME}/.local/share/gnome-nibbles
13
14mkdir ${HOME}/.local/share/gnome-nibbles
15whitelist ${HOME}/.local/share/gnome-nibbles
16whitelist /usr/share/gnome-nibbles
17
18private-bin gnome-nibbles
19
20dbus-user.own org.gnome.Nibbles
21
22# Redirect
23include gnome_games-common.profile
diff --git a/etc/profile-a-l/gnome-passwordsafe.profile b/etc/profile-a-l/gnome-passwordsafe.profile
new file mode 100644
index 000000000..555a59d93
--- /dev/null
+++ b/etc/profile-a-l/gnome-passwordsafe.profile
@@ -0,0 +1,53 @@
1# Firejail profile for gnome-passwordsafe
2# Description: Password manager for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-passwordsafe.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${DOCUMENTS}
10noblacklist ${HOME}/*.kdb
11noblacklist ${HOME}/*.kdbx
12
13# Allow python (blacklisted by disable-interpreters.inc)
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24whitelist /usr/share/cracklib
25whitelist /usr/share/passwordsafe
26include whitelist-runuser-common.inc
27include whitelist-usr-share-common.inc
28include whitelist-var-common.inc
29
30apparmor
31caps.drop all
32machine-id
33net none
34no3d
35nodvd
36nogroups
37nonewprivs
38noroot
39nosound
40notv
41nou2f
42novideo
43protocol unix
44seccomp
45shell none
46tracelog
47
48disable-mnt
49private-bin gnome-passwordsafe,python3*
50private-cache
51private-dev
52private-etc dconf,fonts,gtk-3.0,passwd
53private-tmp
diff --git a/etc/profile-a-l/gnome-photos.profile b/etc/profile-a-l/gnome-photos.profile
new file mode 100644
index 000000000..2af406af9
--- /dev/null
+++ b/etc/profile-a-l/gnome-photos.profile
@@ -0,0 +1,42 @@
1# Firejail profile for gnome-photos
2# Description: Access, organize and share your photos with GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-photos.local
6# Persistent global definitions
7include globals.local
8
9# when gjs apps are started via gnome-shell, firejail is not applied because systemd will start them
10
11noblacklist ${HOME}/.local/share/gnome-photos
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20include whitelist-runuser-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25netfilter
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37tracelog
38
39# private-bin gjs,gnome-photos
40private-dev
41private-tmp
42
diff --git a/etc/profile-a-l/gnome-pie.profile b/etc/profile-a-l/gnome-pie.profile
new file mode 100644
index 000000000..c1d2dae35
--- /dev/null
+++ b/etc/profile-a-l/gnome-pie.profile
@@ -0,0 +1,41 @@
1# Firejail profile for gnome-pie
2# Description: Alternative AppMenu
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-pie.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/gnome-pie
10
11#include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14#include disable-interpreters.inc
15include disable-passwdmgr.inc
16#include disable-programs.inc
17
18caps.drop all
19ipc-namespace
20# net none - breaks dbus
21no3d
22nodvd
23nogroups
24nonewprivs
25noroot
26nosound
27notv
28nou2f
29novideo
30protocol unix
31seccomp
32shell none
33
34disable-mnt
35private-cache
36private-dev
37private-etc alternatives,fonts,machine-id
38private-lib gdk-pixbuf-2.*,gio,gvfs/libgvfscommon.so,libgconf-2.so.*,librsvg-2.so.*
39private-tmp
40
41memory-deny-write-execute
diff --git a/etc/profile-a-l/gnome-pomodoro.profile b/etc/profile-a-l/gnome-pomodoro.profile
new file mode 100644
index 000000000..f8be23f07
--- /dev/null
+++ b/etc/profile-a-l/gnome-pomodoro.profile
@@ -0,0 +1,51 @@
1# Firejail profile for gnome-pomodoro
2# Description: time management utility for GNOME based on the pomodoro technique
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-pomodoro.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/gnome-pomodoro
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.local/share/gnome-pomodoro
20whitelist ${HOME}/.local/share/gnome-pomodoro
21whitelist /usr/share/gnome-pomodoro
22include whitelist-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-runuser-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29net none
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35notv
36nou2f
37novideo
38protocol unix
39seccomp
40shell none
41tracelog
42
43disable-mnt
44private-bin gnome-pomodoro
45private-cache
46private-dev
47private-etc dconf,fonts,gtk-3.0,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,localtime,machine-id
48private-tmp
49
50read-only ${HOME}
51read-write ${HOME}/.local/share/gnome-pomodoro
diff --git a/etc/profile-a-l/gnome-recipes.profile b/etc/profile-a-l/gnome-recipes.profile
new file mode 100644
index 000000000..20c355371
--- /dev/null
+++ b/etc/profile-a-l/gnome-recipes.profile
@@ -0,0 +1,52 @@
1# Firejail profile for gnome-recipes
2# Description: Recipe application for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-recipes.local
6# Persistent global definitions
7include globals.local
8
9
10noblacklist ${HOME}/.cache/gnome-recipes
11noblacklist ${HOME}/.local/share/gnome-recipes
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20mkdir ${HOME}/.cache/gnome-recipes
21mkdir ${HOME}/.local/share/gnome-recipes
22whitelist ${HOME}/.cache/gnome-recipes
23whitelist ${HOME}/.local/share/gnome-recipes
24whitelist /usr/share/gnome-recipes
25include whitelist-common.inc
26include whitelist-usr-share-common.inc
27include whitelist-var-common.inc
28
29apparmor
30caps.drop all
31ipc-namespace
32machine-id
33netfilter
34nodvd
35nogroups
36nonewprivs
37noroot
38nosound
39notv
40nou2f
41novideo
42protocol unix,inet,inet6
43seccomp
44shell none
45
46disable-mnt
47private-bin gnome-recipes,tar
48private-dev
49private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl
50private-lib gdk-pixbuf-2.0,gio,gvfs/libgvfscommon.so,libgconf-2.so.*,libgnutls.so.*,libjpeg.so.*,libp11-kit.so.*,libproxy.so.*,librsvg-2.so.*
51private-tmp
52
diff --git a/etc/profile-a-l/gnome-ring.profile b/etc/profile-a-l/gnome-ring.profile
new file mode 100644
index 000000000..78ceb9c4f
--- /dev/null
+++ b/etc/profile-a-l/gnome-ring.profile
@@ -0,0 +1,34 @@
1# Firejail profile for gnome-ring
2# This file is overwritten after every install/update
3# Persistent local customizations
4include gnome-ring.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.local/share/gnome-ring
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17include whitelist-var-common.inc
18
19caps.drop all
20ipc-namespace
21netfilter
22nodvd
23nogroups
24nonewprivs
25noroot
26notv
27protocol unix,inet,inet6,netlink
28seccomp
29shell none
30
31disable-mnt
32# private-dev
33private-tmp
34
diff --git a/etc/profile-a-l/gnome-robots.profile b/etc/profile-a-l/gnome-robots.profile
new file mode 100644
index 000000000..8835f2b93
--- /dev/null
+++ b/etc/profile-a-l/gnome-robots.profile
@@ -0,0 +1,19 @@
1# Firejail profile for gnome-robots
2# Description: Based on classic BSD Robots
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-robots.local
6# Persistent global definitions
7include globals.local
8
9ignore machine-id
10ignore nosound
11
12whitelist /usr/share/gnome-robots
13
14private-bin gnome-robots
15
16dbus-user.own org.gnome.Robots
17
18# Redirect
19include gnome_games-common.profile
diff --git a/etc/profile-a-l/gnome-schedule.profile b/etc/profile-a-l/gnome-schedule.profile
new file mode 100644
index 000000000..55913a2d7
--- /dev/null
+++ b/etc/profile-a-l/gnome-schedule.profile
@@ -0,0 +1,65 @@
1# Firejail profile for gnome-schedule
2# Description: Graphical interface to crontab and at for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-schedule.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.gnome/gnome-schedule
10
11# Needs at and crontab to read/write user cron
12noblacklist ${PATH}/at
13noblacklist ${PATH}/crontab
14
15# Needs access to these files/dirs
16noblacklist /etc/cron.allow
17noblacklist /etc/cron.deny
18noblacklist /etc/shadow
19noblacklist /var/spool/cron
20
21# cron job testing needs a terminal, resulting in sandbox escape (see disable-common.inc)
22# add 'noblacklist ${PATH}/your-terminal' to gnome-schedule.local if you need that functionality
23
24# Allow python (blacklisted by disable-interpreters.inc)
25include allow-python2.inc
26include allow-python3.inc
27
28include disable-common.inc
29include disable-devel.inc
30include disable-exec.inc
31include disable-interpreters.inc
32include disable-passwdmgr.inc
33include disable-programs.inc
34include disable-xdg.inc
35
36mkfile ${HOME}/.gnome/gnome-schedule
37whitelist ${HOME}/.gnome/gnome-schedule
38whitelist /usr/share/gnome-schedule
39whitelist /var/spool/atd
40whitelist /var/spool/cron
41include whitelist-common.inc
42include whitelist-runuser-common.inc
43include whitelist-usr-share-common.inc
44include whitelist-var-common.inc
45
46apparmor
47caps.keep chown,dac_override,setgid,setuid
48ipc-namespace
49machine-id
50#net none - breaks on Ubuntu
51no3d
52nodvd
53nogroups
54nosound
55notv
56nou2f
57novideo
58shell none
59tracelog
60
61disable-mnt
62private-cache
63private-dev
64writable-var
65
diff --git a/etc/profile-a-l/gnome-screenshot.profile b/etc/profile-a-l/gnome-screenshot.profile
new file mode 100644
index 000000000..cc5efb161
--- /dev/null
+++ b/etc/profile-a-l/gnome-screenshot.profile
@@ -0,0 +1,44 @@
1# Firejail profile for gnome-screenshot
2# Description: GNOME screenshot tool
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-screenshot.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${PICTURES}
10noblacklist ${HOME}/.cache/gnome-screenshot
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-usr-share-common.inc
21include whitelist-runuser-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26net none
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38tracelog
39
40disable-mnt
41private-bin gnome-screenshot
42private-dev
43private-etc dconf,fonts,gtk-3.0,localtime,machine-id
44private-tmp
diff --git a/etc/profile-a-l/gnome-sound-recorder.profile b/etc/profile-a-l/gnome-sound-recorder.profile
new file mode 100644
index 000000000..a64ec25a9
--- /dev/null
+++ b/etc/profile-a-l/gnome-sound-recorder.profile
@@ -0,0 +1,43 @@
1# Firejail profile for gnome-sound-recorder
2# Description: simple sound recordings for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-sound-recorder.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${MUSIC}
10noblacklist ${HOME}/.local/share/Trash
11
12# Allow gjs (blacklisted by disable-interpreters.inc)
13include allow-gjs.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23include whitelist-var-common.inc
24
25caps.drop all
26net none
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37tracelog
38
39disable-mnt
40private-cache
41private-dev
42private-etc alsa,asound.conf,dconf,fonts,gtk-2.0,gtk-3.0,machine-id,openal,pango,pulse,xdg
43private-tmp
diff --git a/etc/profile-a-l/gnome-sudoku.profile b/etc/profile-a-l/gnome-sudoku.profile
new file mode 100644
index 000000000..12fd48a86
--- /dev/null
+++ b/etc/profile-a-l/gnome-sudoku.profile
@@ -0,0 +1,19 @@
1# Firejail profile for gnome-sudoku
2# Description: puzzle game for the popular Japanese sudoku logic puzzle
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-sudoku.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/gnome-sudoku
10
11mkdir ${HOME}/.local/share/gnome-sudoku
12whitelist ${HOME}/.local/share/gnome-sudoku
13
14private-bin gnome-sudoku
15
16dbus-user.own org.gnome.Sudoku
17
18# Redirect
19include gnome_games-common.profile
diff --git a/etc/profile-a-l/gnome-system-log.profile b/etc/profile-a-l/gnome-system-log.profile
new file mode 100644
index 000000000..f597f5cd3
--- /dev/null
+++ b/etc/profile-a-l/gnome-system-log.profile
@@ -0,0 +1,58 @@
1# Firejail profile for gnome-system-log
2# Description: View your system logs
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-system-log.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17whitelist /var/log
18include whitelist-common.inc
19include whitelist-usr-share-common.inc
20include whitelist-var-common.inc
21
22apparmor
23caps.drop all
24ipc-namespace
25# net none - breaks dbus
26no3d
27nodvd
28# When using 'volatile' storage (https://www.freedesktop.org/software/systemd/man/journald.conf.html),
29# comment both 'nogroups' and 'noroot'
30# or put 'ignore nogroups' and 'ignore noroot' in your gnome-system-log.local.
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix
39seccomp
40shell none
41
42disable-mnt
43private-bin gnome-system-log
44private-cache
45private-dev
46private-etc alternatives,fonts,localtime,machine-id
47private-lib
48private-tmp
49writable-var-log
50
51# dbus-user none
52# dbus-system none
53
54memory-deny-write-execute
55
56# comment this if you export logs to a file in your ${HOME}
57# or put 'ignore read-only ${HOME}' in your gnome-system-log.local
58read-only ${HOME}
diff --git a/etc/profile-a-l/gnome-taquin.profile b/etc/profile-a-l/gnome-taquin.profile
new file mode 100644
index 000000000..2341334f7
--- /dev/null
+++ b/etc/profile-a-l/gnome-taquin.profile
@@ -0,0 +1,19 @@
1# Firejail profile for gnome-taquin
2# Description: A sliding puzzle game for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-taquin.local
6# Persistent global definitions
7include globals.local
8
9ignore machine-id
10ignore nosound
11
12whitelist /usr/share/gnome-taquin
13
14private-bin gnome-taquin
15
16dbus-user.own org.gnome.Taquin
17
18# Redirect
19include gnome_games-common.profile
diff --git a/etc/profile-a-l/gnome-tetravex.profile b/etc/profile-a-l/gnome-tetravex.profile
new file mode 100644
index 000000000..6e820dd70
--- /dev/null
+++ b/etc/profile-a-l/gnome-tetravex.profile
@@ -0,0 +1,14 @@
1# Firejail profile for gnome-tetravex
2# Description: A simple puzzle game for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-tetravex.local
6# Persistent global definitions
7include globals.local
8
9private-bin gnome-tetravex
10
11dbus-user.own org.gnome.Tetravex
12
13# Redirect
14include gnome_games-common.profile
diff --git a/etc/profile-a-l/gnome-todo.profile b/etc/profile-a-l/gnome-todo.profile
new file mode 100644
index 000000000..6240cce65
--- /dev/null
+++ b/etc/profile-a-l/gnome-todo.profile
@@ -0,0 +1,51 @@
1# Firejail profile for gnome-todo
2# Description: Personal task manager for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-todo.local
6# Persistent global definitions
7include globals.local
8
9# Allow python (blacklisted by disable-interpreters.inc)
10include allow-python3.inc
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20whitelist /usr/share/gnome-todo
21include whitelist-common.inc
22include whitelist-usr-share-common.inc
23include whitelist-runuser-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28machine-id
29net none
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix
39seccomp
40shell none
41tracelog
42
43disable-mnt
44#private
45private-bin gnome-todo
46private-cache
47private-dev
48private-etc dconf,fonts,gtk-3.0,localtime,passwd,xdg
49private-tmp
50
51read-only ${HOME}
diff --git a/etc/profile-a-l/gnome-twitch.profile b/etc/profile-a-l/gnome-twitch.profile
new file mode 100644
index 000000000..5e8153035
--- /dev/null
+++ b/etc/profile-a-l/gnome-twitch.profile
@@ -0,0 +1,40 @@
1# Firejail profile for gnome-twitch
2# Description: GNOME Twitch app for watching Twitch.tv streams without a browser or flash
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-twitch.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/gnome-twitch
10noblacklist ${HOME}/.local/share/gnome-twitch
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19mkdir ${HOME}/.cache/gnome-twitch
20mkdir ${HOME}/.local/share/gnome-twitch
21whitelist ${HOME}/.cache/gnome-twitch
22whitelist ${HOME}/.local/share/gnome-twitch
23include whitelist-common.inc
24
25caps.drop all
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31nou2f
32novideo
33protocol unix,inet,inet6
34seccomp
35shell none
36
37disable-mnt
38private-dev
39private-tmp
40
diff --git a/etc/profile-a-l/gnome-weather.profile b/etc/profile-a-l/gnome-weather.profile
new file mode 100644
index 000000000..a181f1b9e
--- /dev/null
+++ b/etc/profile-a-l/gnome-weather.profile
@@ -0,0 +1,48 @@
1# Firejail profile for gnome-weather
2# Description: Access current conditions and forecasts
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-weather.local
6# Persistent global definitions
7include globals.local
8
9# when gjs apps are started via gnome-shell, firejail is not applied because systemd will start them
10
11noblacklist ${HOME}/.cache/libgweather
12
13# Allow gjs (blacklisted by disable-interpreters.inc)
14include allow-gjs.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24include whitelist-runuser-common.inc
25include whitelist-var-common.inc
26
27caps.drop all
28netfilter
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix,inet,inet6
39seccomp
40shell none
41tracelog
42
43disable-mnt
44# private-bin gjs,gnome-weather
45private-dev
46# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl
47private-tmp
48
diff --git a/etc/profile-a-l/gnome_games-common.profile b/etc/profile-a-l/gnome_games-common.profile
new file mode 100644
index 000000000..5a17d0ff8
--- /dev/null
+++ b/etc/profile-a-l/gnome_games-common.profile
@@ -0,0 +1,47 @@
1# Firejail profile for gnome_games-common
2# This file is overwritten after every install/update
3# Persistent local customizations
4include gnome_games-common.local
5# Persistent global definitions
6# added by caller profile
7#include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17include whitelist-common.inc
18include whitelist-runuser-common.inc
19include whitelist-usr-share-common.inc
20include whitelist-var-common.inc
21
22apparmor
23caps.drop all
24machine-id
25net none
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37tracelog
38
39disable-mnt
40private-cache
41private-dev
42private-etc dconf,fonts,gconf,gtk-2.0,gtk-3.0,machine-id,pango,passwd,X11
43private-tmp
44
45dbus-user filter
46dbus-user.talk ca.desrt.dconf
47dbus-system none
diff --git a/etc/profile-a-l/godot.profile b/etc/profile-a-l/godot.profile
new file mode 100644
index 000000000..8324a4eb5
--- /dev/null
+++ b/etc/profile-a-l/godot.profile
@@ -0,0 +1,45 @@
1# Firejail profile for godot
2# Description: multi-platform 2D and 3D game engine with a feature-rich editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include godot.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/godot
10noblacklist ${HOME}/.config/godot
11noblacklist ${HOME}/.local/share/godot
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-var-common.inc
22
23caps.drop all
24netfilter
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix,inet,inet6,netlink
33seccomp
34shell none
35tracelog
36
37
38# private-bin godot
39private-cache
40private-dev
41private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,drirc,fonts,machine-id,nsswitch.conf,openal,pki,pulse,resolv.conf,ssl
42private-tmp
43
44dbus-user none
45dbus-system none
diff --git a/etc/profile-a-l/goobox.profile b/etc/profile-a-l/goobox.profile
new file mode 100644
index 000000000..c932ad528
--- /dev/null
+++ b/etc/profile-a-l/goobox.profile
@@ -0,0 +1,35 @@
1# Firejail profile for goobox
2# Description: CD player and ripper with GNOME 3 integration
3# This file is overwritten after every install/update
4# Persistent local customizations
5include goobox.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${MUSIC}
10
11include disable-common.inc
12include disable-devel.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16include disable-xdg.inc
17
18caps.drop all
19netfilter
20no3d
21nogroups
22nonewprivs
23noroot
24notv
25nou2f
26novideo
27protocol unix,inet,inet6
28seccomp
29shell none
30tracelog
31
32# private-bin goobox
33private-dev
34# private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,machine-id,pki,pulse,ssl
35# private-tmp
diff --git a/etc/profile-a-l/google-chrome-beta.profile b/etc/profile-a-l/google-chrome-beta.profile
new file mode 100644
index 000000000..73101f509
--- /dev/null
+++ b/etc/profile-a-l/google-chrome-beta.profile
@@ -0,0 +1,17 @@
1# Firejail profile for google-chrome-beta
2# This file is overwritten after every install/update
3# Persistent local customizations
4include google-chrome-beta.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/google-chrome-beta
9noblacklist ${HOME}/.config/google-chrome-beta
10
11mkdir ${HOME}/.cache/google-chrome-beta
12mkdir ${HOME}/.config/google-chrome-beta
13whitelist ${HOME}/.cache/google-chrome-beta
14whitelist ${HOME}/.config/google-chrome-beta
15
16# Redirect
17include chromium-common.profile
diff --git a/etc/profile-a-l/google-chrome-stable.profile b/etc/profile-a-l/google-chrome-stable.profile
new file mode 100644
index 000000000..a456e8d61
--- /dev/null
+++ b/etc/profile-a-l/google-chrome-stable.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for google-chrome
2# This file is overwritten after every install/update
3
4# Redirect
5include google-chrome.profile
diff --git a/etc/profile-a-l/google-chrome-unstable.profile b/etc/profile-a-l/google-chrome-unstable.profile
new file mode 100644
index 000000000..50e9923aa
--- /dev/null
+++ b/etc/profile-a-l/google-chrome-unstable.profile
@@ -0,0 +1,17 @@
1# Firejail profile for google-chrome-unstable
2# This file is overwritten after every install/update
3# Persistent local customizations
4include google-chrome-unstable.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/google-chrome-unstable
9noblacklist ${HOME}/.config/google-chrome-unstable
10
11mkdir ${HOME}/.cache/google-chrome-unstable
12mkdir ${HOME}/.config/google-chrome-unstable
13whitelist ${HOME}/.cache/google-chrome-unstable
14whitelist ${HOME}/.config/google-chrome-unstable
15
16# Redirect
17include chromium-common.profile
diff --git a/etc/profile-a-l/google-chrome.profile b/etc/profile-a-l/google-chrome.profile
new file mode 100644
index 000000000..c69e98271
--- /dev/null
+++ b/etc/profile-a-l/google-chrome.profile
@@ -0,0 +1,17 @@
1# Firejail profile for google-chrome
2# This file is overwritten after every install/update
3# Persistent local customizations
4include google-chrome.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/google-chrome
9noblacklist ${HOME}/.config/google-chrome
10
11mkdir ${HOME}/.cache/google-chrome
12mkdir ${HOME}/.config/google-chrome
13whitelist ${HOME}/.cache/google-chrome
14whitelist ${HOME}/.config/google-chrome
15
16# Redirect
17include chromium-common.profile
diff --git a/etc/profile-a-l/google-earth-pro.profile b/etc/profile-a-l/google-earth-pro.profile
new file mode 100644
index 000000000..c1f919769
--- /dev/null
+++ b/etc/profile-a-l/google-earth-pro.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for google-earth
2# This file is overwritten after every install/update
3
4private-bin google-earth-pro
5
6# Redirect
7include google-earth.profile
diff --git a/etc/profile-a-l/google-earth.profile b/etc/profile-a-l/google-earth.profile
new file mode 100644
index 000000000..a331ef8d2
--- /dev/null
+++ b/etc/profile-a-l/google-earth.profile
@@ -0,0 +1,51 @@
1# Firejail profile for google-earth
2# This file is overwritten after every install/update
3# Persistent local customizations
4include google-earth.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/Google
9noblacklist ${HOME}/.googleearth/Cache
10noblacklist ${HOME}/.googleearth/Temp
11noblacklist ${HOME}/.googleearth/myplaces.backup.kml
12noblacklist ${HOME}/.googleearth/myplaces.kml
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21mkdir ${HOME}/.config/Google
22mkdir ${HOME}/.googleearth/Cache
23mkdir ${HOME}/.googleearth/Temp
24mkfile ${HOME}/.googleearth/myplaces.backup.kml
25mkfile ${HOME}/.googleearth/myplaces.kml
26whitelist ${HOME}/.config/Google
27whitelist ${HOME}/.googleearth/Cache
28whitelist ${HOME}/.googleearth/Temp
29whitelist ${HOME}/.googleearth/myplaces.backup.kml
30whitelist ${HOME}/.googleearth/myplaces.kml
31include whitelist-common.inc
32
33caps.drop all
34ipc-namespace
35netfilter
36nodvd
37nogroups
38nonewprivs
39noroot
40notv
41nou2f
42novideo
43protocol unix,inet,inet6
44seccomp
45shell none
46
47disable-mnt
48private-bin bash,dirname,google-earth,grep,ls,sed,sh
49private-dev
50private-opt google
51
diff --git a/etc/profile-a-l/google-play-music-desktop-player.profile b/etc/profile-a-l/google-play-music-desktop-player.profile
new file mode 100644
index 000000000..daa385234
--- /dev/null
+++ b/etc/profile-a-l/google-play-music-desktop-player.profile
@@ -0,0 +1,42 @@
1# Firejail profile for google-play-music-desktop-player
2# This file is overwritten after every install/update
3# Persistent local customizations
4include google-play-music-desktop-player.local
5# Persistent global definitions
6include globals.local
7
8# noexec /tmp breaks mpris support
9ignore noexec /tmp
10
11noblacklist ${HOME}/.config/Google Play Music Desktop Player
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20mkdir ${HOME}/.config/Google Play Music Desktop Player
21# whitelist ${HOME}/.config/pulse
22# whitelist ${HOME}/.pulse
23whitelist ${HOME}/.config/Google Play Music Desktop Player
24include whitelist-common.inc
25
26caps.drop all
27netfilter
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol unix,inet,inet6,netlink
37seccomp
38shell none
39
40disable-mnt
41private-dev
42private-tmp
diff --git a/etc/profile-a-l/gpa.profile b/etc/profile-a-l/gpa.profile
new file mode 100644
index 000000000..ce7c8496d
--- /dev/null
+++ b/etc/profile-a-l/gpa.profile
@@ -0,0 +1,33 @@
1# Firejail profile for gpa
2# Description: GNU Privacy Assistant (GPA)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gpa.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.gnupg
10
11include disable-common.inc
12include disable-devel.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17caps.drop all
18netfilter
19nodvd
20nogroups
21nonewprivs
22noroot
23nosound
24notv
25nou2f
26novideo
27protocol unix,inet,inet6
28seccomp
29shell none
30tracelog
31
32# private-bin gpa,gpg
33private-dev
diff --git a/etc/profile-a-l/gpg-agent.profile b/etc/profile-a-l/gpg-agent.profile
new file mode 100644
index 000000000..adc8957e6
--- /dev/null
+++ b/etc/profile-a-l/gpg-agent.profile
@@ -0,0 +1,52 @@
1# Firejail profile for gpg-agent
2# Description: GNU privacy guard - cryptographic agent
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include gpg-agent.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${HOME}/.gnupg
11
12blacklist /tmp/.X11-unix
13blacklist ${RUNUSER}/wayland-*
14
15include disable-common.inc
16include disable-devel.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22mkdir ${HOME}/.gnupg
23whitelist ${HOME}/.gnupg
24whitelist ${RUNUSER}/gnupg
25whitelist ${RUNUSER}/keyring
26whitelist /usr/share/gnupg
27whitelist /usr/share/gnupg2
28include whitelist-common.inc
29include whitelist-runuser-common.inc
30include whitelist-usr-share-common.inc
31include whitelist-var-common.inc
32
33caps.drop all
34machine-id
35netfilter
36no3d
37nodvd
38nogroups
39nonewprivs
40noroot
41nosound
42notv
43nou2f
44novideo
45protocol unix,inet,inet6
46seccomp
47shell none
48tracelog
49
50# private-bin gpg-agent,gpg
51private-cache
52private-dev
diff --git a/etc/profile-a-l/gpg.profile b/etc/profile-a-l/gpg.profile
new file mode 100644
index 000000000..787f35f9e
--- /dev/null
+++ b/etc/profile-a-l/gpg.profile
@@ -0,0 +1,54 @@
1# Firejail profile for gpg
2# Description: GNU Privacy Guard -- minimalist public key operations
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include gpg.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${HOME}/.gnupg
11
12blacklist /tmp/.X11-unix
13blacklist ${RUNUSER}/wayland-*
14
15include disable-common.inc
16include disable-devel.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21whitelist ${RUNUSER}/gnupg
22whitelist ${RUNUSER}/keyring
23whitelist /usr/share/gnupg
24whitelist /usr/share/gnupg2
25whitelist /usr/share/pacman/keyrings
26include whitelist-runuser-common.inc
27include whitelist-usr-share-common.inc
28include whitelist-var-common.inc
29
30caps.drop all
31netfilter
32no3d
33nodvd
34nogroups
35nonewprivs
36noroot
37nosound
38notv
39nou2f
40novideo
41protocol unix,inet,inet6
42seccomp
43shell none
44tracelog
45
46# private-bin gpg,gpg-agent
47private-cache
48private-dev
49
50# On Arch 'archlinux-keyring' needs read-write access to /etc/pacman.d/gnupg
51# and /usr/share/pacman/keyrings. Although this works, it makes
52# installing/upgrading archlinux-keyring extremely slow.
53read-write /etc/pacman.d/gnupg
54read-write /usr/share/pacman/keyrings
diff --git a/etc/profile-a-l/gpg2.profile b/etc/profile-a-l/gpg2.profile
new file mode 100644
index 000000000..b831b0f62
--- /dev/null
+++ b/etc/profile-a-l/gpg2.profile
@@ -0,0 +1,13 @@
1# Firejail profile for gpg2
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include gpg2.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# private-bin gpg2
11
12# Redirect
13include gpg.profile
diff --git a/etc/profile-a-l/gpicview.profile b/etc/profile-a-l/gpicview.profile
new file mode 100644
index 000000000..578ccaef9
--- /dev/null
+++ b/etc/profile-a-l/gpicview.profile
@@ -0,0 +1,50 @@
1# Firejail profile for gpicview
2# Description: Lightweight image viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gpicview.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/gpicview
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18whitelist /usr/share/gpicview
19include whitelist-usr-share-common.inc
20include whitelist-var-common.inc
21
22apparmor
23caps.drop all
24ipc-namespace
25machine-id
26net none
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38tracelog
39
40private-bin gpicview
41private-cache
42private-dev
43private-etc alternatives,fonts,group,passwd
44private-lib
45private-tmp
46
47dbus-user none
48dbus-system none
49
50memory-deny-write-execute
diff --git a/etc/profile-a-l/gpredict.profile b/etc/profile-a-l/gpredict.profile
new file mode 100644
index 000000000..c1f1b53a0
--- /dev/null
+++ b/etc/profile-a-l/gpredict.profile
@@ -0,0 +1,40 @@
1# Firejail profile for gpredict
2# Description: Satellite tracking program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gpredict.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Gpredict
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.config/Gpredict
19whitelist ${HOME}/.config/Gpredict
20include whitelist-common.inc
21
22caps.drop all
23netfilter
24nodvd
25nogroups
26nonewprivs
27noroot
28nosound
29notv
30nou2f
31protocol unix,inet,inet6
32seccomp
33shell none
34tracelog
35
36private-bin gpredict
37private-dev
38private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,resolv.conf,ssl
39private-tmp
40
diff --git a/etc/profile-a-l/gradio.profile b/etc/profile-a-l/gradio.profile
new file mode 100644
index 000000000..82e2504b9
--- /dev/null
+++ b/etc/profile-a-l/gradio.profile
@@ -0,0 +1,40 @@
1# Firejail profile for gradio
2# This file is overwritten after every install/update
3# Persistent local customizations
4include gradio.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/gradio
9noblacklist ${HOME}/.local/share/gradio
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.cache/gradio
19mkdir ${HOME}/.local/share/gradio
20whitelist ${HOME}/.cache/gradio
21whitelist ${HOME}/.local/share/gradio
22include whitelist-common.inc
23include whitelist-var-common.inc
24
25caps.drop all
26netfilter
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33novideo
34protocol unix,inet,inet6
35seccomp
36shell none
37
38private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-3.0,host.conf,hostname,hosts,machine-id,pki,pulse,resolv.conf,ssl,xdg
39private-tmp
40
diff --git a/etc/profile-a-l/gramps.profile b/etc/profile-a-l/gramps.profile
new file mode 100644
index 000000000..427fe2d7a
--- /dev/null
+++ b/etc/profile-a-l/gramps.profile
@@ -0,0 +1,51 @@
1# Firejail profile for gramps
2# Description: genealogy program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gramps.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.gramps
10
11# Allow python (blacklisted by disable-interpreters.inc)
12#include allow-python2.inc
13include allow-python3.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23mkdir ${HOME}/.gramps
24whitelist ${HOME}/.gramps
25include whitelist-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30ipc-namespace
31netfilter
32no3d
33nodvd
34nogroups
35nonewprivs
36noroot
37nosound
38notv
39nou2f
40novideo
41protocol unix,inet,inet6
42seccomp
43shell none
44
45disable-mnt
46private-cache
47private-dev
48private-tmp
49
50dbus-user none
51dbus-system none
diff --git a/etc/profile-a-l/gravity-beams-and-evaporating-stars.profile b/etc/profile-a-l/gravity-beams-and-evaporating-stars.profile
new file mode 100644
index 000000000..7a1a9440e
--- /dev/null
+++ b/etc/profile-a-l/gravity-beams-and-evaporating-stars.profile
@@ -0,0 +1,46 @@
1# Firejail profile for gravity-beams-and-evaporating-stars
2# Description: a game about hurling asteroids into the sun
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gravity-beams-and-evaporating-stars.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17whitelist /usr/share/gravity-beams-and-evaporating-stars
18include whitelist-common.inc
19include whitelist-usr-share-common.inc
20include whitelist-var-common.inc
21
22apparmor
23caps.drop all
24net none
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix
33seccomp
34shell none
35tracelog
36
37disable-mnt
38private
39private-bin gravity-beams-and-evaporating-stars
40private-cache
41private-dev
42private-etc fonts,machine-id
43private-tmp
44
45dbus-user none
46dbus-system none
diff --git a/etc/profile-a-l/gsettings-data-convert.profile b/etc/profile-a-l/gsettings-data-convert.profile
new file mode 100644
index 000000000..6f1d43939
--- /dev/null
+++ b/etc/profile-a-l/gsettings-data-convert.profile
@@ -0,0 +1,11 @@
1# Firejail profile for gsettings-data-convert
2# Description: An obsolete configuration database system (CLI utility)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gsettings-data-convert.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gconf.profile
diff --git a/etc/profile-a-l/gsettings-schema-convert.profile b/etc/profile-a-l/gsettings-schema-convert.profile
new file mode 100644
index 000000000..5c8b0e2e2
--- /dev/null
+++ b/etc/profile-a-l/gsettings-schema-convert.profile
@@ -0,0 +1,11 @@
1# Firejail profile for gsettings-schema-convert
2# Description: An obsolete configuration database system (CLI utility)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gsettings-schema-convert.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gconf.profile
diff --git a/etc/profile-a-l/gsettings.profile b/etc/profile-a-l/gsettings.profile
new file mode 100644
index 000000000..2203fac15
--- /dev/null
+++ b/etc/profile-a-l/gsettings.profile
@@ -0,0 +1,11 @@
1# Firejail profile for gsettings
2# Description: GSettings configuration tool
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gsettings.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include dconf.profile
diff --git a/etc/profile-a-l/gtar.profile b/etc/profile-a-l/gtar.profile
new file mode 100644
index 000000000..2391c121b
--- /dev/null
+++ b/etc/profile-a-l/gtar.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for tar
2# This file is overwritten after every install/update
3
4# Redirect
5include tar.profile
diff --git a/etc/profile-a-l/gthumb.profile b/etc/profile-a-l/gthumb.profile
new file mode 100644
index 000000000..77de59802
--- /dev/null
+++ b/etc/profile-a-l/gthumb.profile
@@ -0,0 +1,36 @@
1# Firejail profile for gthumb
2# Description: Image viewer and browser
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gthumb.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/gthumb
10noblacklist ${HOME}/.Steam
11noblacklist ${HOME}/.steam
12
13include disable-common.inc
14include disable-devel.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19caps.drop all
20nodvd
21nogroups
22nonewprivs
23noroot
24nosound
25notv
26nou2f
27novideo
28protocol unix
29seccomp
30shell none
31tracelog
32
33private-bin gthumb
34private-cache
35private-dev
36private-tmp
diff --git a/etc/profile-a-l/gtk-update-icon-cache.profile b/etc/profile-a-l/gtk-update-icon-cache.profile
new file mode 100644
index 000000000..ac2e9891b
--- /dev/null
+++ b/etc/profile-a-l/gtk-update-icon-cache.profile
@@ -0,0 +1,55 @@
1# Firejail profile for gtk-update-icon-cache
2# Description: Icon theme caching utility
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include gtk-update-icon-cache.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-common.inc
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26ipc-namespace
27machine-id
28net none
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix
39seccomp
40shell none
41tracelog
42x11 none
43
44disable-mnt
45private-bin gtk-update-icon-cache
46private-cache
47private-dev
48private-etc none
49private-lib
50private-tmp
51
52dbus-user none
53dbus-system none
54
55memory-deny-write-execute
diff --git a/etc/profile-a-l/guayadeque.profile b/etc/profile-a-l/guayadeque.profile
new file mode 100644
index 000000000..8ffd7ff58
--- /dev/null
+++ b/etc/profile-a-l/guayadeque.profile
@@ -0,0 +1,34 @@
1# Firejail profile for guayadeque
2# This file is overwritten after every install/update
3# Persistent local customizations
4include guayadeque.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.guayadeque
9noblacklist ${MUSIC}
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19caps.drop all
20netfilter
21nogroups
22nonewprivs
23noroot
24notv
25nou2f
26novideo
27protocol unix,inet,inet6,netlink
28seccomp
29shell none
30
31private-bin guayadeque
32private-dev
33private-tmp
34
diff --git a/etc/profile-a-l/gucharmap.profile b/etc/profile-a-l/gucharmap.profile
new file mode 100644
index 000000000..624914759
--- /dev/null
+++ b/etc/profile-a-l/gucharmap.profile
@@ -0,0 +1,52 @@
1# Firejail profile for gucharmap
2# Description: Unicode character picker and font browser
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gucharmap.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17include whitelist-common.inc
18include whitelist-runuser-common.inc
19include whitelist-usr-share-common.inc
20include whitelist-var-common.inc
21
22apparmor
23caps.drop all
24machine-id
25#net none - breaks dbus
26no3d
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38tracelog
39
40disable-mnt
41private-bin gnome-character-map,gucharmap
42private-cache
43private-dev
44private-etc alternatives,dbus-1,dconf,fonts,gconf,gtk-2.0,gtk-3.0,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,machine-id,mime.types,pango,X11,xdg
45private-lib
46private-tmp
47
48# breaks state saving
49# dbus-user none
50# dbus-system none
51
52read-only ${HOME}
diff --git a/etc/profile-a-l/gummi.profile b/etc/profile-a-l/gummi.profile
new file mode 100644
index 000000000..922b2cbde
--- /dev/null
+++ b/etc/profile-a-l/gummi.profile
@@ -0,0 +1,19 @@
1# Firejail profile for gummi
2# This file is overwritten after every install/update
3# Persistent local customizations
4include gummi.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/gummi
9noblacklist ${HOME}/.config/gummi
10
11include allow-lua.inc
12include allow-perl.inc
13include allow-python3.inc
14
15private-bin dvipdf,dvips,env,gummi,latex,latexmk,lua*,lualatex,luatex,pdflatex,pdftex,perl,ps2pdf,python3*,rubber,synctex,tex,xelatex,xetex
16
17# Redirect
18include latex-common.profile
19
diff --git a/etc/profile-a-l/gunzip.profile b/etc/profile-a-l/gunzip.profile
new file mode 100644
index 000000000..6e97c6b78
--- /dev/null
+++ b/etc/profile-a-l/gunzip.profile
@@ -0,0 +1,11 @@
1# Firejail profile for gunzip
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include gunzip.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gzip.profile
diff --git a/etc/profile-a-l/gwenview.profile b/etc/profile-a-l/gwenview.profile
new file mode 100644
index 000000000..dee0ba9a2
--- /dev/null
+++ b/etc/profile-a-l/gwenview.profile
@@ -0,0 +1,52 @@
1# Firejail profile for gwenview
2# Description: Image viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gwenview.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/GIMP
10noblacklist ${HOME}/.config/gwenviewrc
11noblacklist ${HOME}/.config/org.kde.gwenviewrc
12noblacklist ${HOME}/.gimp*
13noblacklist ${HOME}/.kde/share/apps/gwenview
14noblacklist ${HOME}/.kde/share/config/gwenviewrc
15noblacklist ${HOME}/.kde4/share/apps/gwenview
16noblacklist ${HOME}/.kde4/share/config/gwenviewrc
17noblacklist ${HOME}/.local/share/gwenview
18noblacklist ${HOME}/.local/share/org.kde.gwenview
19
20include disable-common.inc
21include disable-devel.inc
22include disable-exec.inc
23include disable-interpreters.inc
24include disable-passwdmgr.inc
25include disable-programs.inc
26
27include whitelist-var-common.inc
28
29apparmor
30caps.drop all
31# net none
32netfilter
33nodvd
34nogroups
35nonewprivs
36noroot
37notv
38nou2f
39novideo
40protocol unix
41seccomp
42shell none
43# tracelog
44
45private-bin gimp*,gwenview,kbuildsycoca4,kdeinit4
46private-dev
47private-etc alternatives,fonts,gimp,gtk-2.0,kde4rc,kde5rc,ld.so.cache,machine-id,passwd,pulse,xdg
48
49# dbus-user none
50# dbus-system none
51
52# memory-deny-write-execute
diff --git a/etc/profile-a-l/gzexe.profile b/etc/profile-a-l/gzexe.profile
new file mode 100644
index 000000000..bb570d553
--- /dev/null
+++ b/etc/profile-a-l/gzexe.profile
@@ -0,0 +1,11 @@
1# Firejail profile for gzexe
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include gzexe.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gzip.profile
diff --git a/etc/profile-a-l/gzip.profile b/etc/profile-a-l/gzip.profile
new file mode 100644
index 000000000..8ec39d8ca
--- /dev/null
+++ b/etc/profile-a-l/gzip.profile
@@ -0,0 +1,49 @@
1# Firejail profile for gzip
2# Description: GNU compression utilities
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include gzip.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12# Arch Linux (based distributions) need access to /var/lib/pacman. As we drop all capabilities this is automatically read-only.
13noblacklist /var/lib/pacman
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22apparmor
23caps.drop all
24hostname gzip
25ipc-namespace
26machine-id
27net none
28no3d
29nodvd
30nogroups
31nonewprivs
32#noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40tracelog
41x11 none
42
43private-cache
44private-dev
45
46dbus-user none
47dbus-system none
48
49memory-deny-write-execute
diff --git a/etc/profile-a-l/handbrake-gtk.profile b/etc/profile-a-l/handbrake-gtk.profile
new file mode 100644
index 000000000..1e7ce2350
--- /dev/null
+++ b/etc/profile-a-l/handbrake-gtk.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for handbrake
2# This file is overwritten after every install/update
3
4# Redirect
5include handbrake.profile
diff --git a/etc/profile-a-l/handbrake.profile b/etc/profile-a-l/handbrake.profile
new file mode 100644
index 000000000..0539ffcb8
--- /dev/null
+++ b/etc/profile-a-l/handbrake.profile
@@ -0,0 +1,39 @@
1# Firejail profile for handbrake
2# Description: Versatile DVD ripper and video transcoder (GTK+ GUI)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include handbrake.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/ghb
10noblacklist ${MUSIC}
11noblacklist ${VIDEOS}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25net none
26nogroups
27nonewprivs
28noroot
29nou2f
30novideo
31protocol unix,inet,inet6,netlink
32seccomp
33shell none
34
35private-dev
36private-tmp
37
38dbus-user none
39dbus-system none
diff --git a/etc/profile-a-l/hashcat.profile b/etc/profile-a-l/hashcat.profile
new file mode 100644
index 000000000..8ec67ff19
--- /dev/null
+++ b/etc/profile-a-l/hashcat.profile
@@ -0,0 +1,46 @@
1# Firejail profile for hashcat
2# Description: World's fastest and most advanced password recovery utility
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include hashcat.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12noblacklist ${HOME}/.hashcat
13noblacklist /usr/include
14noblacklist ${DOCUMENTS}
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24caps.drop all
25net none
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37x11 none
38
39disable-mnt
40private-bin hashcat
41private-cache
42private-dev
43private-tmp
44
45dbus-user none
46dbus-system none
diff --git a/etc/profile-a-l/hedgewars.profile b/etc/profile-a-l/hedgewars.profile
new file mode 100644
index 000000000..898a07a5f
--- /dev/null
+++ b/etc/profile-a-l/hedgewars.profile
@@ -0,0 +1,35 @@
1# Firejail profile for hedgewars
2# Description: Funny turn-based artillery game, featuring fighting hedgehogs
3# This file is overwritten after every install/update
4# Persistent local customizations
5include hedgewars.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.hedgewars
10
11include disable-common.inc
12include disable-devel.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17mkdir ${HOME}/.hedgewars
18whitelist ${HOME}/.hedgewars
19include whitelist-common.inc
20
21caps.drop all
22netfilter
23nodvd
24nogroups
25nonewprivs
26noroot
27notv
28nou2f
29novideo
30seccomp
31tracelog
32
33disable-mnt
34private-dev
35private-tmp
diff --git a/etc/profile-a-l/hexchat.profile b/etc/profile-a-l/hexchat.profile
new file mode 100644
index 000000000..7723cbd6b
--- /dev/null
+++ b/etc/profile-a-l/hexchat.profile
@@ -0,0 +1,52 @@
1# Firejail profile for hexchat
2# Description: IRC client for X based on X-Chat 2
3# This file is overwritten after every install/update
4# Persistent local customizations
5include hexchat.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/hexchat
10noblacklist /usr/share/perl*
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24mkdir ${HOME}/.config/hexchat
25whitelist ${HOME}/.config/hexchat
26include whitelist-common.inc
27include whitelist-var-common.inc
28
29caps.drop all
30#machine-id -- breaks sound
31netfilter
32no3d
33nodvd
34nogroups
35nonewprivs
36noroot
37notv
38nou2f
39novideo
40protocol unix,inet,inet6
41seccomp
42shell none
43tracelog
44
45disable-mnt
46# debug note: private-bin requires perl, python, etc on some systems
47private-bin hexchat,python*
48private-dev
49#private-lib - python problems
50private-tmp
51
52# memory-deny-write-execute - breaks python
diff --git a/etc/profile-a-l/highlight.profile b/etc/profile-a-l/highlight.profile
new file mode 100644
index 000000000..8d2987b62
--- /dev/null
+++ b/etc/profile-a-l/highlight.profile
@@ -0,0 +1,41 @@
1# Firejail profile for highlight
2# Description: Universal source code to formatted text converter
3# This file is overwritten after every install/update
4# Persistent local customizations
5include highlight.local
6# Persistent global definitions
7include globals.local
8
9blacklist ${RUNUSER}/wayland-*
10blacklist ${RUNUSER}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18caps.drop all
19net none
20no3d
21nodvd
22nogroups
23nonewprivs
24noroot
25nosound
26notv
27nou2f
28novideo
29protocol unix
30seccomp
31shell none
32tracelog
33x11 none
34
35private-bin highlight
36private-cache
37private-dev
38private-tmp
39
40dbus-user none
41dbus-system none
diff --git a/etc/profile-a-l/host.profile b/etc/profile-a-l/host.profile
new file mode 100644
index 000000000..e5a5a7efa
--- /dev/null
+++ b/etc/profile-a-l/host.profile
@@ -0,0 +1,52 @@
1# Firejail profile for host
2# Description: DNS lookup utility
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include host.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}
11noblacklist ${PATH}/host
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26ipc-namespace
27machine-id
28netfilter
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix,inet,inet6
39seccomp
40shell none
41tracelog
42
43disable-mnt
44private
45private-bin bash,host,sh
46private-dev
47private-tmp
48
49dbus-user none
50dbus-system none
51
52memory-deny-write-execute
diff --git a/etc/profile-a-l/hugin.profile b/etc/profile-a-l/hugin.profile
new file mode 100644
index 000000000..f8d9f999d
--- /dev/null
+++ b/etc/profile-a-l/hugin.profile
@@ -0,0 +1,41 @@
1# Firejail profile for hugin
2# Description: Panorama photo stitcher
3# This file is overwritten after every install/update
4# Persistent local customizations
5include hugin.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.hugin
10noblacklist ${DOCUMENTS}
11noblacklist ${PICTURES}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21caps.drop all
22net none
23nodvd
24nogroups
25nonewprivs
26noroot
27nosound
28notv
29nou2f
30novideo
31protocol unix
32seccomp
33shell none
34
35private-bin align_image_stack,autooptimiser,calibrate_lens_gui,celeste_standalone,checkpto,cpclean,cpfind,deghosting_mask,enblend,fulla,geocpset,hugin,hugin_executor,hugin_hdrmerge,hugin_lensdb,hugin_stitch_project,icpfind,linefind,nona,pano_modify,pano_trafo,PTBatcherGUI,pto_gen,pto_lensstack,pto_mask,pto_merge,pto_move,pto_template,pto_var,tca_correct,verdandi,vig_optimize
36private-cache
37private-dev
38private-tmp
39
40dbus-user none
41dbus-system none
diff --git a/etc/profile-a-l/hyperrogue.profile b/etc/profile-a-l/hyperrogue.profile
new file mode 100644
index 000000000..1e3663b8f
--- /dev/null
+++ b/etc/profile-a-l/hyperrogue.profile
@@ -0,0 +1,50 @@
1# Firejail profile for hyperrogue
2# Description: An SDL roguelike in a non-euclidean world
3# This file is overwritten after every install/update
4# Persistent local customizations
5include hyperrogue.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/hyperrogue.ini
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkfile ${HOME}/hyperrogue.ini
20whitelist ${HOME}/hyperrogue.ini
21whitelist /usr/share/hyperrogue
22include whitelist-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28net none
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private-bin hyperrogue
43private-cache
44private-cwd ${HOME}
45private-dev
46private-etc fonts,machine-id
47private-tmp
48
49dbus-user none
50dbus-system none
diff --git a/etc/profile-a-l/i2prouter.profile b/etc/profile-a-l/i2prouter.profile
new file mode 100644
index 000000000..9ffdb9e9b
--- /dev/null
+++ b/etc/profile-a-l/i2prouter.profile
@@ -0,0 +1,71 @@
1# Firejail profile for I2P
2# Description: A distributed anonymous network
3# This file is overwritten after every install/update
4# Persistent local customizations
5include i2prouter.local
6# Persistent global definitions
7include globals.local
8
9# Notice: default browser will most likely not be able to automatically open, due to sandbox.
10# Auto-opening default browser can be disabled in the I2P router console.
11# This profile will not currently work with any Arch User Repository I2P packages,
12# use the distro-independent official I2P java installer instead
13
14# Only needed if i2prouter binary is in home directory, official I2P java installer does this
15ignore noexec ${HOME}
16
17noblacklist ${HOME}/.config/i2p
18noblacklist ${HOME}/.i2p
19noblacklist ${HOME}/.local/share/i2p
20noblacklist ${HOME}/i2p
21# Only needed if wrapper is placed in /usr/sbin/, ubuntu official I2P ppa package does this
22noblacklist /usr/sbin
23
24# Allow java (blacklisted by disable-devel.inc)
25include allow-java.inc
26
27include disable-common.inc
28include disable-devel.inc
29include disable-exec.inc
30include disable-interpreters.inc
31include disable-passwdmgr.inc
32include disable-programs.inc
33include disable-xdg.inc
34
35mkdir ${HOME}/.config/i2p
36mkdir ${HOME}/.i2p
37mkdir ${HOME}/.local/share/i2p
38mkdir ${HOME}/i2p
39whitelist ${HOME}/.config/i2p
40whitelist ${HOME}/.i2p
41whitelist ${HOME}/.local/share/i2p
42whitelist ${HOME}/i2p
43# Only needed if wrapper is placed in /usr/sbin/, ubuntu official I2P ppa package does this
44whitelist /usr/sbin/wrapper*
45
46include whitelist-common.inc
47
48# May break I2P if wrapper is placed in the home directory; official I2P java installer does this
49# If using ubuntu official I2P ppa, this should be fine to uncomment, as it puts wrapper in /usr/sbin/
50#apparmor
51caps.drop all
52ipc-namespace
53machine-id
54netfilter
55no3d
56nodvd
57nogroups
58nonewprivs
59nosound
60notv
61nou2f
62novideo
63protocol unix,inet,inet6
64seccomp
65shell none
66
67disable-mnt
68private-cache
69private-dev
70private-etc alternatives,ca-certificates,crypto-policies,dconf,group,hostname,hosts,i2p,java-10-openjdk,java-11-openjdk,java-12-openjdk,java-13-openjdk,java-8-openjdk,java-9-openjdk,java-openjdk,ld.so.cache,localtime,machine-id,nsswitch.conf,passwd,pki,resolv.conf,ssl
71private-tmp
diff --git a/etc/profile-a-l/i3.profile b/etc/profile-a-l/i3.profile
new file mode 100644
index 000000000..c1ca0e413
--- /dev/null
+++ b/etc/profile-a-l/i3.profile
@@ -0,0 +1,18 @@
1# Firejail profile for i3
2# Description: Standards-compliant, fast, light-weight and extensible window manager
3# This file is overwritten after every install/update
4# Persistent local customizations
5include i3.local
6# Persistent global definitions
7include globals.local
8
9# all applications started in awesome will run in this profile
10noblacklist ${HOME}/.config/i3
11include disable-common.inc
12
13caps.drop all
14netfilter
15noroot
16protocol unix,inet,inet6
17seccomp
18
diff --git a/etc/profile-a-l/iagno.profile b/etc/profile-a-l/iagno.profile
new file mode 100644
index 000000000..a99c603bd
--- /dev/null
+++ b/etc/profile-a-l/iagno.profile
@@ -0,0 +1,39 @@
1# Firejail profile for iagno
2# Description: Reversi clone for Gnome desktop
3# This file is overwritten after every install/update
4# Persistent local customizations
5include iagno.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15
16include whitelist-var-common.inc
17
18apparmor
19caps.drop all
20net none
21nodvd
22nogroups
23nonewprivs
24noroot
25notv
26nou2f
27novideo
28protocol unix
29seccomp
30shell none
31
32disable-mnt
33private
34private-bin iagno
35private-dev
36private-tmp
37
38# dbus-user none
39# dbus-system none
diff --git a/etc/profile-a-l/icecat.profile b/etc/profile-a-l/icecat.profile
new file mode 100644
index 000000000..660343a29
--- /dev/null
+++ b/etc/profile-a-l/icecat.profile
@@ -0,0 +1,20 @@
1# Firejail profile for icecat
2# This file is overwritten after every install/update
3# Persistent local customizations
4include icecat.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/mozilla
9noblacklist ${HOME}/.mozilla
10
11mkdir ${HOME}/.cache/mozilla/icecat
12mkdir ${HOME}/.mozilla
13whitelist ${HOME}/.cache/mozilla/icecat
14whitelist ${HOME}/.mozilla
15
16# private-etc must first be enabled in firefox-common.profile
17#private-etc icecat
18
19# Redirect
20include firefox-common.profile
diff --git a/etc/profile-a-l/icedove.profile b/etc/profile-a-l/icedove.profile
new file mode 100644
index 000000000..19690cd5a
--- /dev/null
+++ b/etc/profile-a-l/icedove.profile
@@ -0,0 +1,28 @@
1# Firejail profile for icedove
2# This file is overwritten after every install/update
3# Persistent local customizations
4include icedove.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Users have icedove set to open a browser by clicking a link in an email
10# We are not allowed to blacklist browser-specific directories
11
12noblacklist ${HOME}/.cache/icedove
13noblacklist ${HOME}/.gnupg
14noblacklist ${HOME}/.icedove
15
16mkdir ${HOME}/.cache/icedove
17mkdir ${HOME}/.gnupg
18mkdir ${HOME}/.icedove
19whitelist ${HOME}/.cache/icedove
20whitelist ${HOME}/.gnupg
21whitelist ${HOME}/.icedove
22include whitelist-common.inc
23
24ignore private-tmp
25
26# allow browsers
27# Redirect
28include firefox.profile
diff --git a/etc/profile-a-l/iceweasel.profile b/etc/profile-a-l/iceweasel.profile
new file mode 100644
index 000000000..badd2648a
--- /dev/null
+++ b/etc/profile-a-l/iceweasel.profile
@@ -0,0 +1,13 @@
1# Firejail profile for iceweasel
2# This file is overwritten after every install/update
3# Persistent local customizations
4include iceweasel.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# private-etc must first be enabled in firefox-common.profile
10#private-etc iceweasel
11
12# Redirect
13include firefox.profile
diff --git a/etc/profile-a-l/idea.profile b/etc/profile-a-l/idea.profile
new file mode 100644
index 000000000..4e43bb629
--- /dev/null
+++ b/etc/profile-a-l/idea.profile
@@ -0,0 +1,10 @@
1# Firejail profile for idea
2# This file is overwritten after every install/update
3# Persistent local customizations
4include idea.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include idea.sh.profile
diff --git a/etc/profile-a-l/idea.sh.profile b/etc/profile-a-l/idea.sh.profile
new file mode 100644
index 000000000..a7d0d531f
--- /dev/null
+++ b/etc/profile-a-l/idea.sh.profile
@@ -0,0 +1,40 @@
1# Firejail profile for idea.sh
2# This file is overwritten after every install/update
3# Persistent local customizations
4include idea.sh.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.IdeaIC*
9noblacklist ${HOME}/.android
10noblacklist ${HOME}/.jack-server
11noblacklist ${HOME}/.jack-settings
12noblacklist ${HOME}/.local/share/JetBrains
13noblacklist ${HOME}/.ssh
14noblacklist ${HOME}/.tooling
15
16# Allows files commonly used by IDEs
17include allow-common-devel.inc
18
19include disable-common.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22
23caps.drop all
24netfilter
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix,inet,inet6
33seccomp
34shell none
35
36private-cache
37private-dev
38# private-tmp
39
40noexec /tmp
diff --git a/etc/profile-a-l/ideaIC.profile b/etc/profile-a-l/ideaIC.profile
new file mode 100644
index 000000000..7e1778f58
--- /dev/null
+++ b/etc/profile-a-l/ideaIC.profile
@@ -0,0 +1,10 @@
1# Firejail profile for ideaIC
2# This file is overwritten after every install/update
3# Persistent local customizations
4include ideaIC.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include idea.sh.profile
diff --git a/etc/profile-a-l/imagej.profile b/etc/profile-a-l/imagej.profile
new file mode 100644
index 000000000..91a60c188
--- /dev/null
+++ b/etc/profile-a-l/imagej.profile
@@ -0,0 +1,41 @@
1# Firejail profile for imagej
2# Description: Image processing program with a focus on microscopy images
3# This file is overwritten after every install/update
4# Persistent local customizations
5include imagej.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.imagej
10
11# Allow java (blacklisted by disable-devel.inc)
12include allow-java.inc
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21caps.drop all
22ipc-namespace
23net none
24nodvd
25nogroups
26nonewprivs
27noroot
28nosound
29notv
30nou2f
31novideo
32protocol unix
33seccomp
34shell none
35
36private-bin awk,basename,bash,cut,free,grep,hostname,imagej,ln,ls,mkdir,rm,sort,tail,touch,tr,uname,update-java-alternatives,whoami,xprop
37private-dev
38private-tmp
39
40dbus-user none
41dbus-system none
diff --git a/etc/profile-a-l/img2txt.profile b/etc/profile-a-l/img2txt.profile
new file mode 100644
index 000000000..ae03fc8bc
--- /dev/null
+++ b/etc/profile-a-l/img2txt.profile
@@ -0,0 +1,52 @@
1# Firejail profile for img2txt
2# This file is overwritten after every install/update
3# Persistent local customizations
4include img2txt.local
5# Persistent global definitions
6include globals.local
7
8blacklist ${RUNUSER}/wayland-*
9
10noblacklist ${DOCUMENTS}
11noblacklist ${PICTURES}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21whitelist /usr/share/imlib2
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24
25apparmor
26caps.drop all
27ipc-namespace
28machine-id
29net none
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix
39seccomp
40shell none
41tracelog
42x11 none
43
44# private-bin img2txt
45private-cache
46private-dev
47private-tmp
48
49dbus-user none
50dbus-system none
51
52memory-deny-write-execute
diff --git a/etc/profile-a-l/impressive.profile b/etc/profile-a-l/impressive.profile
new file mode 100644
index 000000000..af82fb059
--- /dev/null
+++ b/etc/profile-a-l/impressive.profile
@@ -0,0 +1,57 @@
1# Firejail profile for impressive
2# Description: presentation tool with eye candy
3# This file is overwritten after every install/update
4# Persistent local customizations
5include impressive.local
6# Persistent global definitions
7#include globals.local
8
9noblacklist ${DOCUMENTS}
10noblacklist /sbin
11noblacklist /usr/sbin
12
13# Allow python (blacklisted by disable-interpreters.inc)
14#include allow-python2.inc
15include allow-python3.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25mkdir ${HOME}/.cache/mesa_shader_cache
26whitelist /usr/share/opengl-games-utils
27whitelist /usr/share/zenity
28include whitelist-usr-share-common.inc
29include whitelist-var-common.inc
30
31apparmor
32caps.drop all
33ipc-namespace
34machine-id
35net none
36nodvd
37nogroups
38nonewprivs
39noroot
40nosound
41notv
42nou2f
43novideo
44protocol unix
45seccomp
46shell none
47tracelog
48
49private-cache
50private-dev
51private-tmp
52
53dbus-user none
54dbus-system none
55
56read-only ${HOME}
57read-write ${HOME}/.cache/mesa_shader_cache
diff --git a/etc/profile-a-l/inkscape.profile b/etc/profile-a-l/inkscape.profile
new file mode 100644
index 000000000..f14868668
--- /dev/null
+++ b/etc/profile-a-l/inkscape.profile
@@ -0,0 +1,61 @@
1# Firejail profile for inkscape
2# Description: Vector-based drawing program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include inkscape.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/inkscape
10noblacklist ${HOME}/.config/inkscape
11noblacklist ${HOME}/.inkscape
12noblacklist ${DOCUMENTS}
13noblacklist ${PICTURES}
14# Allow exporting .xcf files
15noblacklist ${HOME}/.config/GIMP
16noblacklist ${HOME}/.gimp*
17
18
19# Allow python (blacklisted by disable-interpreters.inc)
20include allow-python2.inc
21include allow-python3.inc
22
23include disable-common.inc
24include disable-devel.inc
25include disable-exec.inc
26include disable-interpreters.inc
27include disable-passwdmgr.inc
28include disable-programs.inc
29include disable-xdg.inc
30
31whitelist /usr/share/inkscape
32include whitelist-usr-share-common.inc
33include whitelist-var-common.inc
34
35apparmor
36caps.drop all
37ipc-namespace
38machine-id
39net none
40nodvd
41nogroups
42nonewprivs
43noroot
44nosound
45notv
46nou2f
47novideo
48protocol unix
49seccomp
50shell none
51tracelog
52
53# private-bin inkscape,potrace,python* - problems on Debian stretch
54private-cache
55private-dev
56private-tmp
57
58dbus-user none
59dbus-system none
60
61# memory-deny-write-execute
diff --git a/etc/profile-a-l/inkview.profile b/etc/profile-a-l/inkview.profile
new file mode 100644
index 000000000..4f88b0258
--- /dev/null
+++ b/etc/profile-a-l/inkview.profile
@@ -0,0 +1,11 @@
1# Firejail profile for inkview
2# Description: an SVG slideshow program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include inkview.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include inkscape.profile
diff --git a/etc/profile-a-l/inox.profile b/etc/profile-a-l/inox.profile
new file mode 100644
index 000000000..1b3db73b4
--- /dev/null
+++ b/etc/profile-a-l/inox.profile
@@ -0,0 +1,17 @@
1# Firejail profile for inox
2# This file is overwritten after every install/update
3# Persistent local customizations
4include inox.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/inox
9noblacklist ${HOME}/.config/inox
10
11mkdir ${HOME}/.cache/inox
12mkdir ${HOME}/.config/inox
13whitelist ${HOME}/.cache/inox
14whitelist ${HOME}/.config/inox
15
16# Redirect
17include chromium-common.profile
diff --git a/etc/profile-a-l/iridium-browser.profile b/etc/profile-a-l/iridium-browser.profile
new file mode 100644
index 000000000..c7ee64d56
--- /dev/null
+++ b/etc/profile-a-l/iridium-browser.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for iridium
2# This file is overwritten after every install/update
3
4# Redirect
5include iridium.profile
diff --git a/etc/profile-a-l/iridium.profile b/etc/profile-a-l/iridium.profile
new file mode 100644
index 000000000..ebb39b0a3
--- /dev/null
+++ b/etc/profile-a-l/iridium.profile
@@ -0,0 +1,17 @@
1# Firejail profile for iridium
2# This file is overwritten after every install/update
3# Persistent local customizations
4include iridium.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/iridium
9noblacklist ${HOME}/.config/iridium
10
11mkdir ${HOME}/.cache/iridium
12mkdir ${HOME}/.config/iridium
13whitelist ${HOME}/.cache/iridium
14whitelist ${HOME}/.config/iridium
15
16# Redirect
17include chromium-common.profile
diff --git a/etc/profile-a-l/itch.profile b/etc/profile-a-l/itch.profile
new file mode 100644
index 000000000..b3c78c810
--- /dev/null
+++ b/etc/profile-a-l/itch.profile
@@ -0,0 +1,42 @@
1# Firejail profile for itch
2# This file is overwritten after every install/update
3# Persistent local customizations
4include itch.local
5# Persistent global definitions
6include globals.local
7
8# itch.io has native firejail/sandboxing support bundled in
9# See https://itch.io/docs/itch/using/sandbox/linux.html
10
11noblacklist ${HOME}/.itch
12noblacklist ${HOME}/.config/itch
13
14include disable-common.inc
15include disable-devel.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20mkdir ${HOME}/.itch
21mkdir ${HOME}/.config/itch
22whitelist ${HOME}/.itch
23whitelist ${HOME}/.config/itch
24include whitelist-common.inc
25
26caps.drop all
27netfilter
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33nou2f
34novideo
35protocol unix,inet,inet6,netlink
36seccomp
37shell none
38
39private-dev
40private-tmp
41
42noexec /tmp
diff --git a/etc/profile-a-l/jd-gui.profile b/etc/profile-a-l/jd-gui.profile
new file mode 100644
index 000000000..0944051e5
--- /dev/null
+++ b/etc/profile-a-l/jd-gui.profile
@@ -0,0 +1,44 @@
1# Firejail profile for jd-gui
2# This file is overwritten after every install/update
3# Persistent local customizations
4include jd-gui.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/jd-gui.cfg
9
10# Allow java (blacklisted by disable-devel.inc)
11include allow-java.inc
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-var-common.inc
22
23caps.drop all
24net none
25no3d
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37
38private-bin bash,jd-gui,sh
39private-cache
40private-dev
41private-tmp
42
43dbus-user none
44dbus-system none
diff --git a/etc/profile-a-l/jdownloader.profile b/etc/profile-a-l/jdownloader.profile
new file mode 100644
index 000000000..b5f892a9d
--- /dev/null
+++ b/etc/profile-a-l/jdownloader.profile
@@ -0,0 +1,10 @@
1# Firejail profile for jdownloader
2# This file is overwritten after every install/update
3# Persistent local customizations
4include jdownloader.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include JDownloader.profile
diff --git a/etc/profile-a-l/jerry.profile b/etc/profile-a-l/jerry.profile
new file mode 100644
index 000000000..b79ae0ee0
--- /dev/null
+++ b/etc/profile-a-l/jerry.profile
@@ -0,0 +1,43 @@
1# Firejail profile for jerry
2# Description: Chess GUI
3# This file is overwritten after every install/update
4# Persistent local customizations
5include jerry.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/dkl
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19caps.drop all
20machine-id
21net none
22no3d
23nodvd
24nogroups
25nonewprivs
26noroot
27nosound
28notv
29novideo
30protocol unix
31seccomp
32shell none
33tracelog
34
35private-bin bash,jerry,sh,stockfish
36private-dev
37private-etc fonts,gtk-2.0,gtk-3.0
38private-tmp
39
40dbus-user none
41dbus-system none
42
43memory-deny-write-execute
diff --git a/etc/profile-a-l/jitsi-meet-desktop.profile b/etc/profile-a-l/jitsi-meet-desktop.profile
new file mode 100644
index 000000000..c4121d835
--- /dev/null
+++ b/etc/profile-a-l/jitsi-meet-desktop.profile
@@ -0,0 +1,39 @@
1# Firejail profile for jitsi-meet-desktop
2# Description: Jitsi Meet desktop application powered by Electron
3# This file is overwritten after every install/update
4# Persistent local customizations
5include jitsi-meet-desktop.local
6# Persistent global definitions
7include globals.local
8
9ignore noexec /tmp
10
11noblacklist ${HOME}/.config/Jitsi Meet
12
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-xdg.inc
17
18nowhitelist ${DOWNLOADS}
19
20mkdir ${HOME}/.config/Jitsi Meet
21
22whitelist ${HOME}/.config/Jitsi Meet
23
24include whitelist-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-runuser-common.inc
27include whitelist-var-common.inc
28
29seccomp !chroot
30
31disable-mnt
32private-bin bash,jitsi-meet-desktop
33private-cache
34private-dev
35private-etc alsa,alternatives,asound.conf,bumblebee,ca-certificates,crypto-policies,drirc,fonts,glvnd,group,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,machine-id,mime.types,nsswitch.conf,nvidia,pango,passwd,pki,protocols,pulse,resolv.conf,rpc,services,ssl,X11,xdg
36private-tmp
37
38# Redirect
39include electron.profile
diff --git a/etc/profile-a-l/jitsi.profile b/etc/profile-a-l/jitsi.profile
new file mode 100644
index 000000000..223c360b8
--- /dev/null
+++ b/etc/profile-a-l/jitsi.profile
@@ -0,0 +1,32 @@
1# Firejail profile for jitsi
2# This file is overwritten after every install/update
3# Persistent local customizations
4include jitsi.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.jitsi
9
10# Allow java (blacklisted by disable-devel.inc)
11include allow-java.inc
12
13include disable-common.inc
14include disable-devel.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19caps.drop all
20nodvd
21nogroups
22nonewprivs
23noroot
24notv
25protocol unix,inet,inet6
26seccomp
27shell none
28tracelog
29
30disable-mnt
31private-cache
32private-tmp
diff --git a/etc/profile-a-l/jumpnbump-menu.profile b/etc/profile-a-l/jumpnbump-menu.profile
new file mode 100644
index 000000000..b1852b015
--- /dev/null
+++ b/etc/profile-a-l/jumpnbump-menu.profile
@@ -0,0 +1,15 @@
1# Firejail profile for jumpnbump-menu
2# Description: Level selection and config menu for the Jump 'n Bump game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include jumpnbump-menu.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10include allow-python3.inc
11
12private-bin jumpnbump-menu,python3*
13
14# Redirect
15include jumpnbump.profile
diff --git a/etc/profile-a-l/jumpnbump.profile b/etc/profile-a-l/jumpnbump.profile
new file mode 100644
index 000000000..daeb54610
--- /dev/null
+++ b/etc/profile-a-l/jumpnbump.profile
@@ -0,0 +1,49 @@
1# Firejail profile for jumpnbump
2# Description: Cute multiplayer platform game with bunnies
3# This file is overwritten after every install/update
4# Persistent local customizations
5include jumpnbump.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.jumpnbump
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.jumpnbump
20whitelist ${HOME}/.jumpnbump
21whitelist /usr/share/jumpnbump
22include whitelist-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28net none
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol unix,netlink
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private-bin jumpnbump
43private-cache
44private-dev
45private-etc none
46private-tmp
47
48dbus-user none
49dbus-system none
diff --git a/etc/profile-a-l/k3b.profile b/etc/profile-a-l/k3b.profile
new file mode 100644
index 000000000..0c1da7ae1
--- /dev/null
+++ b/etc/profile-a-l/k3b.profile
@@ -0,0 +1,37 @@
1# Firejail profile for k3b
2# Description: Sophisticated CD/DVD burning application
3# This file is overwritten after every install/update
4# Persistent local customizations
5include k3b.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/k3brc
10noblacklist ${HOME}/.kde/share/config/k3brc
11noblacklist ${HOME}/.kde4/share/config/k3brc
12noblacklist ${MUSIC}
13
14include disable-common.inc
15include disable-devel.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-var-common.inc
22
23caps.keep ipc_lock,sys_nice,sys_rawio,sys_resource
24# net none
25netfilter
26no3d
27# nonewprivs - breaks privileged helpers
28# noroot - breaks privileged helpers
29nosound
30notv
31novideo
32# protocol unix - breaks privileged helpers
33# seccomp - breaks privileged helpers
34shell none
35
36private-dev
37# private-tmp
diff --git a/etc/profile-a-l/kaffeine.profile b/etc/profile-a-l/kaffeine.profile
new file mode 100644
index 000000000..c7f811939
--- /dev/null
+++ b/etc/profile-a-l/kaffeine.profile
@@ -0,0 +1,42 @@
1# Firejail profile for kaffeine
2# Description: Versatile media player for KDE
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kaffeine.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/kaffeinerc
10noblacklist ${HOME}/.kde/share/apps/kaffeine
11noblacklist ${HOME}/.kde/share/config/kaffeinerc
12noblacklist ${HOME}/.kde4/share/apps/kaffeine
13noblacklist ${HOME}/.kde4/share/config/kaffeinerc
14noblacklist ${HOME}/.local/share/kaffeine
15noblacklist ${MUSIC}
16noblacklist ${VIDEOS}
17
18include disable-common.inc
19include disable-devel.inc
20include disable-exec.inc
21include disable-interpreters.inc
22include disable-passwdmgr.inc
23include disable-programs.inc
24include disable-xdg.inc
25
26include whitelist-var-common.inc
27
28caps.drop all
29netfilter
30nogroups
31nonewprivs
32noroot
33nou2f
34novideo
35protocol unix,inet,inet6
36seccomp
37shell none
38
39# private-bin kaffeine
40private-dev
41private-tmp
42
diff --git a/etc/profile-a-l/kalgebra.profile b/etc/profile-a-l/kalgebra.profile
new file mode 100644
index 000000000..e1e93163b
--- /dev/null
+++ b/etc/profile-a-l/kalgebra.profile
@@ -0,0 +1,49 @@
1# Firejail profile for kalgebra
2# Description: 2D and 3D Graph Calculator
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kalgebra.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/kalgebrarc
10noblacklist ${HOME}/.local/share/kalgebra
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20whitelist /usr/share/kalgebramobile
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26machine-id
27net none
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix,netlink
37seccomp !chroot
38shell none
39# tracelog
40
41disable-mnt
42private-bin kalgebra,kalgebramobile
43private-cache
44private-dev
45private-etc fonts,machine-id
46private-tmp
47
48dbus-user none
49dbus-system none
diff --git a/etc/profile-a-l/kalgebramobile.profile b/etc/profile-a-l/kalgebramobile.profile
new file mode 100644
index 000000000..d2394fe20
--- /dev/null
+++ b/etc/profile-a-l/kalgebramobile.profile
@@ -0,0 +1,5 @@
1# Firejail profile for kalgebramobile
2# This file is overwritten after every install/update
3
4# Redirect
5include kalgebra.profile
diff --git a/etc/profile-a-l/karbon.profile b/etc/profile-a-l/karbon.profile
new file mode 100644
index 000000000..3b2e93b0a
--- /dev/null
+++ b/etc/profile-a-l/karbon.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for krita
2# This file is overwritten after every install/update
3
4# Redirect
5include krita.profile
diff --git a/etc/profile-a-l/kate.profile b/etc/profile-a-l/kate.profile
new file mode 100644
index 000000000..321c4558f
--- /dev/null
+++ b/etc/profile-a-l/kate.profile
@@ -0,0 +1,53 @@
1# Firejail profile for kate
2# Description: Powerful text editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kate.local
6# Persistent global definitions
7include globals.local
8
9ignore noexec ${HOME}
10
11noblacklist ${HOME}/.config/katemetainfos
12noblacklist ${HOME}/.config/katepartrc
13noblacklist ${HOME}/.config/katerc
14noblacklist ${HOME}/.config/kateschemarc
15noblacklist ${HOME}/.config/katesyntaxhighlightingrc
16noblacklist ${HOME}/.config/katevirc
17noblacklist ${HOME}/.local/share/kate
18
19include disable-common.inc
20# include disable-devel.inc
21include disable-exec.inc
22# include disable-interpreters.inc
23include disable-passwdmgr.inc
24include disable-programs.inc
25
26include whitelist-var-common.inc
27
28# apparmor
29caps.drop all
30# net none
31netfilter
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix
41seccomp
42shell none
43tracelog
44
45# private-bin kate,kbuildsycoca4,kdeinit4
46private-dev
47# private-etc alternatives,fonts,kde4rc,kde5rc,ld.so.cache,machine-id,xdg
48private-tmp
49
50# dbus-user none
51# dbus-system none
52
53join-or-start kate
diff --git a/etc/profile-a-l/kcalc.profile b/etc/profile-a-l/kcalc.profile
new file mode 100644
index 000000000..6f94777aa
--- /dev/null
+++ b/etc/profile-a-l/kcalc.profile
@@ -0,0 +1,49 @@
1# Firejail profile for kcalc
2# Description: Simple and scientific calculator
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kcalc.local
6# Persistent global definitions
7include globals.local
8
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17mkfile ${HOME}/.config/kcalcrc
18mkfile ${HOME}/.kde/share/config/kcalcrc
19mkfile ${HOME}/.kde4/share/config/kcalcrc
20whitelist ${HOME}/.config/kcalcrc
21whitelist ${HOME}/.kde/share/config/kcalcrc
22whitelist ${HOME}/.kde4/share/config/kcalcrc
23include whitelist-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28net none
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix
39seccomp
40shell none
41
42disable-mnt
43private-bin kcalc
44private-dev
45# private-lib - problems on Arch
46private-tmp
47
48dbus-user none
49dbus-system none
diff --git a/etc/profile-a-l/kdeinit4.profile b/etc/profile-a-l/kdeinit4.profile
new file mode 100644
index 000000000..082045c62
--- /dev/null
+++ b/etc/profile-a-l/kdeinit4.profile
@@ -0,0 +1,36 @@
1# Firejail profile for kdeinit4
2# This file is overwritten after every install/update
3# Persistent local customizations
4include kdeinit4.local
5# Persistent global definitions
6include globals.local
7
8# use outside KDE Plasma 4
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17include whitelist-var-common.inc
18
19caps.drop all
20netfilter
21no3d
22nogroups
23nonewprivs
24# nosound - disabled for knotify
25noroot
26nou2f
27novideo
28notv
29protocol unix,inet,inet6,netlink
30seccomp
31shell none
32
33private-bin kbuildsycoca4,kded4,kdeinit4,knotify4
34private-dev
35private-tmp
36
diff --git a/etc/profile-a-l/kdenlive.profile b/etc/profile-a-l/kdenlive.profile
new file mode 100644
index 000000000..e3560cb35
--- /dev/null
+++ b/etc/profile-a-l/kdenlive.profile
@@ -0,0 +1,40 @@
1# Firejail profile for kdenlive
2# Description: Non-linear video editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kdenlive.local
6# Persistent global definitions
7include globals.local
8
9ignore noexec ${HOME}
10
11noblacklist ${HOME}/.cache/kdenlive
12noblacklist ${HOME}/.config/kdenliverc
13noblacklist ${HOME}/.local/share/kdenlive
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22apparmor
23caps.drop all
24# net none
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31protocol unix,netlink
32seccomp
33shell none
34
35private-bin dbus-launch,dvdauthor,ffmpeg,ffplay,ffprobe,genisoimage,kdeinit4,kdeinit4_shutdown,kdeinit4_wrapper,kdeinit5,kdeinit5_shutdown,kdeinit5_wrapper,kdenlive,kdenlive_render,kshell4,kshell5,melt,mlt-melt,vlc,xine
36private-dev
37# private-etc alternatives,fonts,kde4rc,kde5rc,ld.so.cache,machine-id,passwd,pulse,X11,xdg
38
39# dbus-user none
40# dbus-system none
diff --git a/etc/profile-a-l/keepass.profile b/etc/profile-a-l/keepass.profile
new file mode 100644
index 000000000..9852f8a79
--- /dev/null
+++ b/etc/profile-a-l/keepass.profile
@@ -0,0 +1,44 @@
1# Firejail profile for keepass
2# Description: An easy-to-use password manager
3# This file is overwritten after every install/update
4# Persistent local customizations
5include keepass.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/*.kdb
10noblacklist ${HOME}/*.kdbx
11noblacklist ${HOME}/.config/KeePass
12noblacklist ${HOME}/.config/keepass
13noblacklist ${HOME}/.keepass
14noblacklist ${HOME}/.local/share/KeePass
15noblacklist ${HOME}/.local/share/keepass
16noblacklist ${DOCUMENTS}
17
18include disable-common.inc
19include disable-devel.inc
20include disable-exec.inc
21include disable-interpreters.inc
22include disable-passwdmgr.inc
23include disable-programs.inc
24include disable-xdg.inc
25
26caps.drop all
27netfilter
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix,inet,inet6,netlink
38seccomp
39shell none
40
41private-cache
42private-dev
43private-tmp
44
diff --git a/etc/profile-a-l/keepass2.profile b/etc/profile-a-l/keepass2.profile
new file mode 100644
index 000000000..aef236ccc
--- /dev/null
+++ b/etc/profile-a-l/keepass2.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for keepass
2# This file is overwritten after every install/update
3
4# Redirect
5include keepass.profile
diff --git a/etc/profile-a-l/keepassx.profile b/etc/profile-a-l/keepassx.profile
new file mode 100644
index 000000000..b8239e140
--- /dev/null
+++ b/etc/profile-a-l/keepassx.profile
@@ -0,0 +1,50 @@
1# Firejail profile for keepassx
2# Description: Cross Platform Password Manager
3# This file is overwritten after every install/update
4# Persistent local customizations
5include keepassx.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/*.kdb
10noblacklist ${HOME}/*.kdbx
11noblacklist ${HOME}/.config/keepassx
12noblacklist ${HOME}/.keepassx
13noblacklist ${DOCUMENTS}
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23include whitelist-var-common.inc
24
25caps.drop all
26machine-id
27net none
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40tracelog
41
42private-bin keepassx,keepassx2
43private-dev
44private-etc alternatives,fonts,machine-id
45private-tmp
46
47dbus-user none
48dbus-system none
49
50memory-deny-write-execute
diff --git a/etc/profile-a-l/keepassx2.profile b/etc/profile-a-l/keepassx2.profile
new file mode 100644
index 000000000..fdd27e9f9
--- /dev/null
+++ b/etc/profile-a-l/keepassx2.profile
@@ -0,0 +1,6 @@
1# Firejail profile for keepassx2
2# Description: Cross platform password manager
3# This file is overwritten after every install/update
4
5# Redirects
6include keepassx.profile
diff --git a/etc/profile-a-l/keepassxc-cli.profile b/etc/profile-a-l/keepassxc-cli.profile
new file mode 100644
index 000000000..925609384
--- /dev/null
+++ b/etc/profile-a-l/keepassxc-cli.profile
@@ -0,0 +1,11 @@
1# Firejail profile for keepassxc-cli
2# Description: command line interface for KeePassXC
3# This file is overwritten after every install/update
4# Persistent local customizations
5include keepassxc-cli.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include keepassxc.profile
diff --git a/etc/profile-a-l/keepassxc-proxy.profile b/etc/profile-a-l/keepassxc-proxy.profile
new file mode 100644
index 000000000..b2b6763ee
--- /dev/null
+++ b/etc/profile-a-l/keepassxc-proxy.profile
@@ -0,0 +1,10 @@
1# Firejail profile for keepassxc-cli
2# This file is overwritten after every install/update
3# Persistent local customizations
4include keepassxc-proxy.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include keepassxc.profile
diff --git a/etc/profile-a-l/keepassxc.profile b/etc/profile-a-l/keepassxc.profile
new file mode 100644
index 000000000..43dbad5f9
--- /dev/null
+++ b/etc/profile-a-l/keepassxc.profile
@@ -0,0 +1,62 @@
1# Firejail profile for keepassxc
2# Description: Cross Platform Password Manager
3# This file is overwritten after every install/update
4# Persistent local customizations
5include keepassxc.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/*.kdb
10noblacklist ${HOME}/*.kdbx
11noblacklist ${HOME}/.config/keepassxc
12noblacklist ${HOME}/.keepassxc
13# 2.2.4 needs this path when compiled with "Native messaging browser extension"
14noblacklist ${HOME}/.mozilla
15noblacklist ${DOCUMENTS}
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25whitelist /usr/share/keepassxc
26include whitelist-usr-share-common.inc
27include whitelist-var-common.inc
28
29caps.drop all
30machine-id
31net none
32no3d
33nodvd
34# Breaks 'Lock database when session is locked or lid is closed' (#2899).
35# Also breaks (Plasma) tray icon,
36# you can safely uncomment it or add to keepassxc.local if you don't need these features.
37#
38nogroups
39nonewprivs
40noroot
41nosound
42notv
43nou2f
44novideo
45protocol unix,netlink
46seccomp
47shell none
48tracelog
49
50private-bin keepassxc,keepassxc-cli,keepassxc-proxy
51private-dev
52private-etc alternatives,fonts,ld.so.cache,machine-id
53private-tmp
54
55# Breaks 'Lock database when session is locked or lid is closed' (#2899).
56# Also breaks (Plasma) tray icon,
57# you can safely uncomment it or add to keepassxc.local if you don't need these features.
58# dbus-user none
59# dbus-system none
60
61# Mutex is stored in /tmp by default, which is broken by private-tmp
62join-or-start keepassxc
diff --git a/etc/profile-a-l/kfind.profile b/etc/profile-a-l/kfind.profile
new file mode 100644
index 000000000..ed815676a
--- /dev/null
+++ b/etc/profile-a-l/kfind.profile
@@ -0,0 +1,47 @@
1# Firejail profile for kfind
2# Description: File search utility
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kfind.local
6# Persistent global definitions
7include globals.local
8
9# searching in blacklisted or masked paths fails silently
10# adjust filesystem restrictions as necessary
11
12# noblacklist ${HOME}/.cache/kfind - disable-programs.inc is disabled, see below
13# noblacklist ${HOME}/.config/kfindrc
14# noblacklist ${HOME}/.kde/share/config/kfindrc
15# noblacklist ${HOME}/.kde4/share/config/kfindrc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22# include disable-programs.inc
23
24apparmor
25caps.drop all
26machine-id
27# net none
28netfilter
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix
39seccomp
40shell none
41
42# private-bin kbuildsycoca4,kdeinit4,kfind
43private-dev
44private-tmp
45
46# dbus-user none
47# dbus-system none
diff --git a/etc/profile-a-l/kget.profile b/etc/profile-a-l/kget.profile
new file mode 100644
index 000000000..485edc1a4
--- /dev/null
+++ b/etc/profile-a-l/kget.profile
@@ -0,0 +1,41 @@
1# Firejail profile for kget
2# Description: Download manager
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kget.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/kgetrc
10noblacklist ${HOME}/.kde/share/apps/kget
11noblacklist ${HOME}/.kde/share/config/kgetrc
12noblacklist ${HOME}/.kde4/share/apps/kget
13noblacklist ${HOME}/.kde4/share/config/kgetrc
14noblacklist ${HOME}/.local/share/kget
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22
23include whitelist-var-common.inc
24
25caps.drop all
26netfilter
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix,inet,inet6
36seccomp
37
38private-dev
39private-tmp
40
41# memory-deny-write-execute
diff --git a/etc/profile-a-l/kid3-cli.profile b/etc/profile-a-l/kid3-cli.profile
new file mode 100644
index 000000000..bee62b5d9
--- /dev/null
+++ b/etc/profile-a-l/kid3-cli.profile
@@ -0,0 +1,6 @@
1# Firejail profile for kid3-cli
2# This file is overwritten after every install/update
3include kid3-cli.local
4
5# Redirect
6include kid3.profile
diff --git a/etc/profile-a-l/kid3-qt.profile b/etc/profile-a-l/kid3-qt.profile
new file mode 100644
index 000000000..9bcede077
--- /dev/null
+++ b/etc/profile-a-l/kid3-qt.profile
@@ -0,0 +1,8 @@
1# Firejail profile for kid3-qt
2# This file is overwritten after every install/update
3include kid3-qt.local
4
5noblacklist ${HOME}/.config/Kid3
6
7# Redirect
8include kid3.profile
diff --git a/etc/profile-a-l/kid3.profile b/etc/profile-a-l/kid3.profile
new file mode 100644
index 000000000..cce92a93f
--- /dev/null
+++ b/etc/profile-a-l/kid3.profile
@@ -0,0 +1,47 @@
1# Firejail profile for kid3
2# Description: Audio Tag Editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kid3.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${MUSIC}
10noblacklist ${HOME}/.config/kid3rc
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-var-common.inc
21
22apparmor
23caps.drop all
24netfilter
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix,inet,inet6,netlink
33seccomp
34shell none
35tracelog
36
37private-cache
38private-dev
39private-etc alternatives,ca-certificates,crypto-policies,dconf,drirc,fonts,gtk-3.0,hostname,hosts,kde5rc,machine-id,pki,pulse,resolv.conf,ssl
40private-tmp
41private-opt none
42private-srv none
43
44dbus-user none
45dbus-system none
46
47memory-deny-write-execute
diff --git a/etc/profile-a-l/kino.profile b/etc/profile-a-l/kino.profile
new file mode 100644
index 000000000..b3ade0dd9
--- /dev/null
+++ b/etc/profile-a-l/kino.profile
@@ -0,0 +1,37 @@
1# Firejail profile for kino
2# Description: Non-linear editor for Digital Video data
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kino.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.kino-history
10noblacklist ${HOME}/.kinorc
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19include whitelist-var-common.inc
20
21apparmor
22caps.drop all
23netfilter
24nogroups
25nonewprivs
26noroot
27notv
28nou2f
29novideo
30protocol unix
31seccomp
32shell none
33
34private-cache
35private-dev
36private-tmp
37
diff --git a/etc/profile-a-l/kiwix-desktop.profile b/etc/profile-a-l/kiwix-desktop.profile
new file mode 100644
index 000000000..d222d6d24
--- /dev/null
+++ b/etc/profile-a-l/kiwix-desktop.profile
@@ -0,0 +1,51 @@
1# Firejail profile for kiwix-desktop
2# Description: view/manage ZIM files
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kiwix-desktop.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/kiwix
10noblacklist ${HOME}/.local/share/kiwix-desktop
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20mkdir ${HOME}/.local/share/kiwix
21mkdir ${HOME}/.local/share/kiwix-desktop
22whitelist ${HOME}/.local/share/kiwix
23whitelist ${HOME}/.local/share/kiwix-desktop
24include whitelist-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29ipc-namespace
30netfilter
31# no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36# nosound
37notv
38nou2f
39novideo
40protocol unix,inet,inet6,netlink
41seccomp !chroot
42shell none
43
44disable-mnt
45private-cache
46private-dev
47private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,hostname,hosts,ld.so.cache,machine-id,pki,pulse,resolv.conf,ssl
48private-tmp
49
50dbus-user none
51dbus-system none
diff --git a/etc/profile-a-l/klatexformula.profile b/etc/profile-a-l/klatexformula.profile
new file mode 100644
index 000000000..10b689ce5
--- /dev/null
+++ b/etc/profile-a-l/klatexformula.profile
@@ -0,0 +1,45 @@
1# Firejail profile for klatexformula
2# Description: generating images from LaTeX equations
3# This file is overwritten after every install/update
4# Persistent local customizations
5include klatexformula.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.kde/share/apps/klatexformula
10noblacklist ${HOME}/.klatexformula
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22
23apparmor
24caps.drop all
25machine-id
26net none
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38tracelog
39
40private-cache
41private-dev
42private-tmp
43
44dbus-user none
45dbus-system none
diff --git a/etc/profile-a-l/klatexformula_cmdl.profile b/etc/profile-a-l/klatexformula_cmdl.profile
new file mode 100644
index 000000000..9137963c4
--- /dev/null
+++ b/etc/profile-a-l/klatexformula_cmdl.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for klatexformula_cmdl
2# This file is overwritten after every install/update
3
4# Redirect
5include klatexformula.profile
diff --git a/etc/profile-a-l/klavaro.profile b/etc/profile-a-l/klavaro.profile
new file mode 100644
index 000000000..c03d75098
--- /dev/null
+++ b/etc/profile-a-l/klavaro.profile
@@ -0,0 +1,54 @@
1# Firejail profile for klavaro
2# Description: Yet another touch typing tutor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include klavaro.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/klavaro
10noblacklist ${HOME}/.local/share/klavaro
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20mkdir ${HOME}/.local/share/klavaro
21mkdir ${HOME}/.config/klavaro
22whitelist ${HOME}/.local/share/klavaro
23whitelist ${HOME}/.config/klavaro
24include whitelist-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29machine-id
30net none
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36notv
37nou2f
38novideo
39protocol unix
40seccomp
41shell none
42tracelog
43
44disable-mnt
45private-bin bash,klavaro,sh,tclsh,tclsh*
46private-cache
47private-dev
48private-etc alternatives,fonts
49private-tmp
50private-opt none
51private-srv none
52
53dbus-user none
54dbus-system none
diff --git a/etc/profile-a-l/kmail.profile b/etc/profile-a-l/kmail.profile
new file mode 100644
index 000000000..198b05a11
--- /dev/null
+++ b/etc/profile-a-l/kmail.profile
@@ -0,0 +1,60 @@
1# Firejail profile for kmail
2# Description: Full featured graphical email client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kmail.local
6# Persistent global definitions
7include globals.local
8
9# kmail has problems launching akonadi in debian and ubuntu.
10# one solution is to have akonadi already running when kmail is started
11
12noblacklist ${HOME}/.cache/akonadi*
13noblacklist ${HOME}/.cache/kmail2
14noblacklist ${HOME}/.config/akonadi*
15noblacklist ${HOME}/.config/baloorc
16noblacklist ${HOME}/.config/emaildefaults
17noblacklist ${HOME}/.config/emailidentities
18noblacklist ${HOME}/.config/kmail2rc
19noblacklist ${HOME}/.config/kmailsearchindexingrc
20noblacklist ${HOME}/.config/mailtransports
21noblacklist ${HOME}/.config/specialmailcollectionsrc
22noblacklist ${HOME}/.gnupg
23noblacklist ${HOME}/.local/share/akonadi*
24noblacklist ${HOME}/.local/share/apps/korganizer
25noblacklist ${HOME}/.local/share/contacts
26noblacklist ${HOME}/.local/share/emailidentities
27noblacklist ${HOME}/.local/share/kmail2
28noblacklist ${HOME}/.local/share/local-mail
29noblacklist ${HOME}/.local/share/notes
30noblacklist /tmp/akonadi-*
31
32include disable-common.inc
33include disable-devel.inc
34include disable-exec.inc
35include disable-interpreters.inc
36include disable-passwdmgr.inc
37include disable-programs.inc
38
39include whitelist-var-common.inc
40
41# apparmor
42caps.drop all
43netfilter
44nodvd
45nogroups
46nonewprivs
47noroot
48nosound
49notv
50nou2f
51novideo
52protocol unix,inet,inet6,netlink
53# we need to allow chroot, io_getevents, ioprio_set, io_setup, io_submit system calls
54seccomp !chroot,!io_getevents,!io_setup,!io_submit,!ioprio_set
55# tracelog
56
57private-dev
58# private-tmp - interrupts connection to akonadi, breaks opening of email attachments
59# writable-run-user is needed for signing and encrypting emails
60writable-run-user
diff --git a/etc/profile-a-l/kmplayer.profile b/etc/profile-a-l/kmplayer.profile
new file mode 100644
index 000000000..7eabde61d
--- /dev/null
+++ b/etc/profile-a-l/kmplayer.profile
@@ -0,0 +1,41 @@
1# Firejail profile for mplayer
2# Description: mplayer KDE GUI (movie player)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kmplayer.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/kmplayerrc
10noblacklist ${HOME}/.kde/share/config/kmplayerrc
11noblacklist ${HOME}/.local/share/kmplayer
12noblacklist ${MUSIC}
13noblacklist ${VIDEOS}
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28netfilter
29nogroups
30nonewprivs
31noroot
32nou2f
33protocol unix,inet,inet6,netlink
34seccomp
35shell none
36
37# private-bin kmplayer,mplayer
38private-cache
39private-dev
40private-tmp
41
diff --git a/etc/profile-a-l/knotes.profile b/etc/profile-a-l/knotes.profile
new file mode 100644
index 000000000..ababfcdb1
--- /dev/null
+++ b/etc/profile-a-l/knotes.profile
@@ -0,0 +1,17 @@
1# Firejail profile for knotes
2# Description: Sticky notes application
3# This file is overwritten after every install/update
4# Persistent local customizations
5include knotes.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# knotes has problems launching akonadi in debian and ubuntu.
11# one solution is to have akonadi already running when knotes is started
12
13noblacklist ${HOME}/.config/knotesrc
14noblacklist ${HOME}/.local/share/knotes
15
16# Redirect
17include kmail.profile
diff --git a/etc/profile-a-l/kodi.profile b/etc/profile-a-l/kodi.profile
new file mode 100644
index 000000000..86afe46b5
--- /dev/null
+++ b/etc/profile-a-l/kodi.profile
@@ -0,0 +1,44 @@
1# Firejail profile for kodi
2# Description: Open Source Home Theatre
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kodi.local
6# Persistent global definitions
7include globals.local
8
9# noexec ${HOME} breaks plugins
10ignore noexec ${HOME}
11
12noblacklist ${HOME}/.kodi
13noblacklist ${MUSIC}
14noblacklist ${PICTURES}
15noblacklist ${VIDEOS}
16
17# Allow python (blacklisted by disable-interpreters.inc)
18include allow-python2.inc
19include allow-python3.inc
20
21include disable-common.inc
22include disable-devel.inc
23include disable-exec.inc
24include disable-interpreters.inc
25include disable-passwdmgr.inc
26include disable-programs.inc
27include disable-xdg.inc
28
29include whitelist-var-common.inc
30
31apparmor
32caps.drop all
33netfilter
34nogroups
35nonewprivs
36noroot
37nou2f
38protocol unix,inet,inet6,netlink
39seccomp
40shell none
41tracelog
42
43private-dev
44private-tmp
diff --git a/etc/profile-a-l/konversation.profile b/etc/profile-a-l/konversation.profile
new file mode 100644
index 000000000..dd3e9617f
--- /dev/null
+++ b/etc/profile-a-l/konversation.profile
@@ -0,0 +1,42 @@
1# Firejail profile for konversation
2# Description: User friendly Internet Relay Chat (IRC) client for KDE
3# This file is overwritten after every install/update
4# Persistent local customizations
5include konversation.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/konversationrc
10noblacklist ${HOME}/.kde/share/config/konversationrc
11noblacklist ${HOME}/.kde4/share/config/konversationrc
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-var-common.inc
22
23caps.drop all
24netfilter
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix,inet,inet6,netlink
33seccomp
34shell none
35tracelog
36
37private-bin kbuildsycoca4,konversation
38private-cache
39private-dev
40private-tmp
41
42# memory-deny-write-execute
diff --git a/etc/profile-a-l/kopete.profile b/etc/profile-a-l/kopete.profile
new file mode 100644
index 000000000..e0bdce059
--- /dev/null
+++ b/etc/profile-a-l/kopete.profile
@@ -0,0 +1,38 @@
1# Firejail profile for kopete
2# Description: Instant messaging and chat application
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kopete.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.kde/share/apps/kopete
10noblacklist ${HOME}/.kde/share/config/kopeterc
11noblacklist ${HOME}/.kde4/share/apps/kopete
12noblacklist ${HOME}/.kde4/share/config/kopeterc
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21whitelist /var/lib/winpopup
22include whitelist-var-common.inc
23
24caps.drop all
25netfilter
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31nou2f
32protocol unix,inet,inet6,netlink
33seccomp
34
35private-dev
36private-tmp
37writable-var
38
diff --git a/etc/profile-a-l/krita.profile b/etc/profile-a-l/krita.profile
new file mode 100644
index 000000000..be9921478
--- /dev/null
+++ b/etc/profile-a-l/krita.profile
@@ -0,0 +1,51 @@
1# Firejail profile for krita
2# Description: Pixel-based image manipulation program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include krita.local
6# Persistent global definitions
7include globals.local
8
9# noexec ${HOME} may break krita, see issue #1953
10ignore noexec ${HOME}
11
12noblacklist ${HOME}/.config/kritarc
13noblacklist ${HOME}/.local/share/krita
14noblacklist ${DOCUMENTS}
15noblacklist ${PICTURES}
16
17# Allow python (blacklisted by disable-interpreters.inc)
18include allow-python2.inc
19include allow-python3.inc
20
21include disable-common.inc
22include disable-devel.inc
23include disable-exec.inc
24include disable-interpreters.inc
25include disable-passwdmgr.inc
26include disable-programs.inc
27include disable-xdg.inc
28
29apparmor
30caps.drop all
31ipc-namespace
32# net none
33netfilter
34nodvd
35nogroups
36nonewprivs
37noroot
38nosound
39notv
40nou2f
41novideo
42protocol unix
43seccomp
44shell none
45
46private-cache
47private-dev
48private-tmp
49
50# dbus-user none
51# dbus-system none
diff --git a/etc/profile-a-l/krunner.profile b/etc/profile-a-l/krunner.profile
new file mode 100644
index 000000000..c64113c15
--- /dev/null
+++ b/etc/profile-a-l/krunner.profile
@@ -0,0 +1,38 @@
1# Firejail profile for krunner
2# Description: Framework for providing different actions given a string query
3# This file is overwritten after every install/update
4# Persistent local customizations
5include krunner.local
6# Persistent global definitions
7include globals.local
8
9# - programs started in krunner run with this generic profile.
10# - when a file is opened in krunner, the file viewer runs in its own sandbox
11# with its own profile, if it is sandboxed automatically.
12
13# noblacklist ${HOME}/.cache/krunner
14# noblacklist ${HOME}/.cache/krunnerbookmarkrunnerfirefoxdbfile.sqlite*
15# noblacklist ${HOME}/.config/chromium
16noblacklist ${HOME}/.config/krunnerrc
17noblacklist ${HOME}/.kde/share/config/krunnerrc
18noblacklist ${HOME}/.kde4/share/config/krunnerrc
19# noblacklist ${HOME}/.local/share/baloo
20# noblacklist ${HOME}/.mozilla
21
22include disable-common.inc
23# include disable-devel.inc
24# include disable-interpreters.inc
25# include disable-passwdmgr.inc
26# include disable-programs.inc
27
28include whitelist-var-common.inc
29
30caps.drop all
31netfilter
32nogroups
33nonewprivs
34noroot
35protocol unix,inet,inet6
36seccomp
37
38# private-cache
diff --git a/etc/profile-a-l/ktorrent.profile b/etc/profile-a-l/ktorrent.profile
new file mode 100644
index 000000000..2eb46a7e8
--- /dev/null
+++ b/etc/profile-a-l/ktorrent.profile
@@ -0,0 +1,60 @@
1# Firejail profile for ktorrent
2# Description: BitTorrent client based on the KDE platform
3# This file is overwritten after every install/update
4# Persistent local customizations
5include ktorrent.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/ktorrentrc
10noblacklist ${HOME}/.kde/share/apps/ktorrent
11noblacklist ${HOME}/.kde/share/config/ktorrentrc
12noblacklist ${HOME}/.kde4/share/apps/ktorrent
13noblacklist ${HOME}/.kde4/share/config/ktorrentrc
14noblacklist ${HOME}/.local/share/ktorrent
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22
23mkdir ${HOME}/.kde/share/apps/ktorrent
24mkdir ${HOME}/.kde4/share/apps/ktorrent
25mkdir ${HOME}/.local/share/ktorrent
26mkfile ${HOME}/.config/ktorrentrc
27mkfile ${HOME}/.kde/share/config/ktorrentrc
28mkfile ${HOME}/.kde4/share/config/ktorrentrc
29whitelist ${DOWNLOADS}
30whitelist ${HOME}/.config/ktorrentrc
31whitelist ${HOME}/.kde/share/apps/ktorrent
32whitelist ${HOME}/.kde/share/config/ktorrentrc
33whitelist ${HOME}/.kde4/share/apps/ktorrent
34whitelist ${HOME}/.kde4/share/config/ktorrentrc
35whitelist ${HOME}/.local/share/ktorrent
36include whitelist-common.inc
37include whitelist-var-common.inc
38
39caps.drop all
40machine-id
41netfilter
42no3d
43nodvd
44nogroups
45nonewprivs
46noroot
47nosound
48notv
49nou2f
50novideo
51protocol unix,inet,inet6,netlink
52seccomp
53shell none
54
55private-bin kbuildsycoca4,kdeinit4,ktorrent
56private-dev
57# private-lib - problems on Arch
58private-tmp
59
60# memory-deny-write-execute
diff --git a/etc/profile-a-l/ktouch.profile b/etc/profile-a-l/ktouch.profile
new file mode 100644
index 000000000..b23b23730
--- /dev/null
+++ b/etc/profile-a-l/ktouch.profile
@@ -0,0 +1,52 @@
1# Firejail profile for KTouch
2# Description: a typing tutor by KDE
3# This file is overwritten after every install/update
4# Persistent local customizations
5include ktouch.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/ktouch2rc
10noblacklist ${HOME}/.local/share/ktouch
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20mkfile ${HOME}/.config/ktouch2rc
21mkdir ${HOME}/.local/share/ktouch
22whitelist ${HOME}/.config/ktouch2rc
23whitelist ${HOME}/.local/share/ktouch
24include whitelist-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29machine-id
30net none
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix,netlink
40seccomp
41shell none
42tracelog
43
44disable-mnt
45private-bin ktouch
46private-cache
47private-dev
48private-etc alternatives,fonts,kde5rc,machine-id
49private-tmp
50
51dbus-user none
52dbus-system none
diff --git a/etc/profile-a-l/kwin_x11.profile b/etc/profile-a-l/kwin_x11.profile
new file mode 100644
index 000000000..d512dd100
--- /dev/null
+++ b/etc/profile-a-l/kwin_x11.profile
@@ -0,0 +1,45 @@
1# Firejail profile for kwin_x11
2# This file is overwritten after every install/update
3# Persistent local customizations
4include kwin_x11.local
5# Persistent global definitions
6include globals.local
7
8# fix automatical kwin_x11 sandboxing:
9# echo KDEWM=kwin_x11 >> ~/.pam_environment
10
11noblacklist ${HOME}/.cache/kwin
12noblacklist ${HOME}/.config/kwinrc
13noblacklist ${HOME}/.config/kwinrulesrc
14noblacklist ${HOME}/.local/share/kwin
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24include whitelist-var-common.inc
25
26caps.drop all
27netfilter
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private-bin kwin_x11
43private-dev
44private-etc alternatives,drirc,fonts,kde5rc,ld.so.cache,machine-id,xdg
45private-tmp
diff --git a/etc/profile-a-l/kwrite.profile b/etc/profile-a-l/kwrite.profile
new file mode 100644
index 000000000..a71e3bfb9
--- /dev/null
+++ b/etc/profile-a-l/kwrite.profile
@@ -0,0 +1,53 @@
1# Firejail profile for kwrite
2# Description: Simple text editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kwrite.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/katepartrc
10noblacklist ${HOME}/.config/katerc
11noblacklist ${HOME}/.config/kateschemarc
12noblacklist ${HOME}/.config/katesyntaxhighlightingrc
13noblacklist ${HOME}/.config/katevirc
14noblacklist ${HOME}/.config/kwriterc
15noblacklist ${HOME}/.local/share/kwrite
16noblacklist ${DOCUMENTS}
17
18include disable-common.inc
19include disable-devel.inc
20include disable-exec.inc
21include disable-interpreters.inc
22include disable-passwdmgr.inc
23include disable-programs.inc
24include disable-xdg.inc
25
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30# net none
31netfilter
32nodvd
33nogroups
34nonewprivs
35noroot
36# nosound - KWrite is using ALSA!
37notv
38nou2f
39novideo
40protocol unix
41seccomp
42shell none
43tracelog
44
45private-bin kbuildsycoca4,kdeinit4,kwrite
46private-dev
47private-etc alternatives,fonts,kde4rc,kde5rc,ld.so.cache,machine-id,pulse,xdg
48private-tmp
49
50# dbus-user none
51# dbus-system none
52
53join-or-start kwrite
diff --git a/etc/profile-a-l/latex-common.profile b/etc/profile-a-l/latex-common.profile
new file mode 100644
index 000000000..b090be726
--- /dev/null
+++ b/etc/profile-a-l/latex-common.profile
@@ -0,0 +1,41 @@
1# Firejail profile for latex-common
2# This file is overwritten after every install/update
3# Persistent local customizations
4include latex-common.local
5# Persistent global definitions
6# added by caller profile
7#include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15
16whitelist /var/lib
17include whitelist-runuser-common.inc
18include whitelist-var-common.inc
19
20caps.drop all
21net none
22no3d
23nodvd
24nogroups
25nonewprivs
26noroot
27nosound
28notv
29nou2f
30novideo
31protocol unix
32seccomp
33shell none
34tracelog
35
36private-cache
37private-dev
38private-tmp
39
40dbus-user none
41dbus-system none
diff --git a/etc/profile-a-l/latex.profile b/etc/profile-a-l/latex.profile
new file mode 100644
index 000000000..2230dd570
--- /dev/null
+++ b/etc/profile-a-l/latex.profile
@@ -0,0 +1,12 @@
1# Firejail profile for latex
2# This file is overwritten after every install/update
3# Persistent local customizations
4include latex.local
5# Persistent global definitions
6include globals.local
7
8private-bin latex
9
10# Redirect
11include latex-common.profile
12
diff --git a/etc/profile-a-l/lbunzip2.profile b/etc/profile-a-l/lbunzip2.profile
new file mode 100644
index 000000000..338d8c8bb
--- /dev/null
+++ b/etc/profile-a-l/lbunzip2.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for gzip
2# Description: GNU compression utilities
3# This file is overwritten after every install/update
4
5# Redirect
6include gzip.profile
diff --git a/etc/profile-a-l/lbzcat.profile b/etc/profile-a-l/lbzcat.profile
new file mode 100644
index 000000000..338d8c8bb
--- /dev/null
+++ b/etc/profile-a-l/lbzcat.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for gzip
2# Description: GNU compression utilities
3# This file is overwritten after every install/update
4
5# Redirect
6include gzip.profile
diff --git a/etc/profile-a-l/lbzip2.profile b/etc/profile-a-l/lbzip2.profile
new file mode 100644
index 000000000..338d8c8bb
--- /dev/null
+++ b/etc/profile-a-l/lbzip2.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for gzip
2# Description: GNU compression utilities
3# This file is overwritten after every install/update
4
5# Redirect
6include gzip.profile
diff --git a/etc/profile-a-l/leafpad.profile b/etc/profile-a-l/leafpad.profile
new file mode 100644
index 000000000..c456541aa
--- /dev/null
+++ b/etc/profile-a-l/leafpad.profile
@@ -0,0 +1,40 @@
1# Firejail profile for leafpad
2# Description: GTK+ based simple text editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include leafpad.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/leafpad
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18include whitelist-var-common.inc
19
20apparmor
21caps.drop all
22net none
23no3d
24nodvd
25nogroups
26nonewprivs
27noroot
28nosound
29notv
30nou2f
31novideo
32protocol unix
33seccomp
34shell none
35
36private-bin leafpad
37private-dev
38private-lib
39private-tmp
40
diff --git a/etc/profile-a-l/less.profile b/etc/profile-a-l/less.profile
new file mode 100644
index 000000000..de6fa67d1
--- /dev/null
+++ b/etc/profile-a-l/less.profile
@@ -0,0 +1,52 @@
1# Firejail profile for less
2# Description: Pager program similar to more
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include less.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11blacklist ${RUNUSER}
12
13noblacklist ${HOME}/.lesshst
14
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19
20apparmor
21caps.drop all
22ipc-namespace
23machine-id
24net none
25no3d
26nodvd
27nonewprivs
28#noroot
29nosound
30notv
31nou2f
32novideo
33protocol unix
34seccomp
35shell none
36tracelog
37x11 none
38
39# The user can have a custom coloring script configured in ${HOME}/.lessfilter.
40# Enable private-bin and private-lib if you are not using any filter.
41# private-bin less
42# private-lib
43private-cache
44private-dev
45writable-var-log
46
47dbus-user none
48dbus-system none
49
50memory-deny-write-execute
51read-only ${HOME}
52read-write ${HOME}/.lesshst
diff --git a/etc/profile-a-l/libreoffice.profile b/etc/profile-a-l/libreoffice.profile
new file mode 100644
index 000000000..aa113883e
--- /dev/null
+++ b/etc/profile-a-l/libreoffice.profile
@@ -0,0 +1,49 @@
1# Firejail profile for libreoffice
2# Description: Office productivity suite
3# This file is overwritten after every install/update
4# Persistent local customizations
5include libreoffice.local
6# Persistent global definitions
7include globals.local
8
9noblacklist /usr/local/sbin
10noblacklist ${HOME}/.config/libreoffice
11
12# libreoffice uses java for some certain operations
13# comment if you don't care about java functionality
14# Allow java (blacklisted by disable-devel.inc)
15include allow-java.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22
23include whitelist-var-common.inc
24
25# ubuntu 18.04 comes with its own apparmor profile, but it is not in enforce mode.
26# comment the next line to use the ubuntu profile instead of firejail's apparmor profile
27apparmor
28caps.drop all
29netfilter
30nodvd
31nogroups
32# comment nonewprivs when using the ubuntu 18.04/debian 10 apparmor profile
33nonewprivs
34noroot
35notv
36nou2f
37novideo
38# comment the protocol line when using the ubuntu 18.04/debian 10 apparmor profile
39protocol unix,inet,inet6
40# comment seccomp when using the ubuntu 18.04/debian 10 apparmor profile
41seccomp
42shell none
43# comment tracelog when using the ubuntu 18.04/debian 10 apparmor profile
44tracelog
45
46private-dev
47private-tmp
48
49join-or-start libreoffice
diff --git a/etc/profile-a-l/liferea.profile b/etc/profile-a-l/liferea.profile
new file mode 100644
index 000000000..7cfd4fc10
--- /dev/null
+++ b/etc/profile-a-l/liferea.profile
@@ -0,0 +1,53 @@
1# Firejail profile for liferea
2# Description: Feed/news/podcast client with plugin support
3# This file is overwritten after every install/update
4# Persistent local customizations
5include liferea.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/liferea
10noblacklist ${HOME}/.config/liferea
11noblacklist ${HOME}/.local/share/liferea
12
13# Allow python (blacklisted by disable-interpreters.inc)
14include allow-python2.inc
15include allow-python3.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23
24mkdir ${HOME}/.cache/liferea
25mkdir ${HOME}/.config/liferea
26mkdir ${HOME}/.local/share/liferea
27whitelist ${HOME}/.cache/liferea
28whitelist ${HOME}/.config/liferea
29whitelist ${HOME}/.local/share/liferea
30whitelist /usr/share/liferea
31include whitelist-common.inc
32include whitelist-usr-share-common.inc
33include whitelist-var-common.inc
34
35caps.drop all
36netfilter
37# no3d
38nodvd
39nogroups
40nonewprivs
41noroot
42# nosound
43notv
44nou2f
45# novideo
46protocol unix,inet,inet6
47seccomp
48shell none
49tracelog
50
51disable-mnt
52private-dev
53private-tmp
diff --git a/etc/profile-a-l/lightsoff.profile b/etc/profile-a-l/lightsoff.profile
new file mode 100644
index 000000000..c065c44a9
--- /dev/null
+++ b/etc/profile-a-l/lightsoff.profile
@@ -0,0 +1,16 @@
1# Firejail profile for lightsoff
2# Description: GNOME Lightsoff game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include lightsoff.local
6# Persistent global definitions
7include globals.local
8
9whitelist /usr/share/lightsoff
10
11private-bin lightsoff
12
13dbus-user.own org.gnome.LightsOff
14
15# Redirect
16include gnome_games-common.profile
diff --git a/etc/profile-a-l/lincity-ng.profile b/etc/profile-a-l/lincity-ng.profile
new file mode 100644
index 000000000..624d4a8bd
--- /dev/null
+++ b/etc/profile-a-l/lincity-ng.profile
@@ -0,0 +1,47 @@
1# Firejail profile for lincity-ng
2# Description: City simulation game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include lincity-ng.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.lincity-ng
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.lincity-ng
20whitelist ${HOME}/.lincity-ng
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26ipc-namespace
27net none
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38tracelog
39
40disable-mnt
41private-bin lincity-ng
42private-cache
43private-dev
44private-tmp
45
46dbus-user none
47dbus-system none
diff --git a/etc/profile-a-l/links.profile b/etc/profile-a-l/links.profile
new file mode 100644
index 000000000..b2f94d3cf
--- /dev/null
+++ b/etc/profile-a-l/links.profile
@@ -0,0 +1,66 @@
1# Firejail profile for links
2# Description: Text WWW browser
3# This file is overwritten after every install/update
4# Persistent local customizations
5include links.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.links
10
11blacklist /tmp/.X11-unix
12blacklist ${RUNUSER}/wayland-*
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19# you may want to noblacklist files/directories blacklisted in
20# disable-programs.inc and used as associated programs
21include disable-programs.inc
22include disable-xdg.inc
23
24mkdir ${HOME}/.links
25whitelist ${HOME}/.links
26whitelist ${DOWNLOADS}
27include whitelist-runuser-common.inc
28include whitelist-var-common.inc
29
30caps.drop all
31ipc-namespace
32# comment machine-id (or put 'ignore machine-id' in your links.local) if you want
33# to allow access only to user-configured associated media player
34machine-id
35netfilter
36# comment no3d (or put 'ignore no3d' in your links.local) if you want
37# to allow access only to user-configured associated media player
38no3d
39nodvd
40nogroups
41nonewprivs
42noroot
43# comment nosound (or put 'ignore nosound' in your links.local) if you want
44# to allow access only to user-configured associated media player
45nosound
46notv
47nou2f
48novideo
49protocol unix,inet,inet6
50seccomp
51shell none
52tracelog
53
54disable-mnt
55# if you want to use user-configured programs add 'private-bin PROGRAM1,PROGRAM2' to your links.local
56# or append 'PROGRAM1,PROGRAM2' to this private-bin line
57private-bin links,sh
58private-cache
59private-dev
60private-etc alternatives,ca-certificates,crypto-policies,nsswitch.conf,pki,resolv.conf,ssl
61# Uncomment the following line (or put it in your links.local) allow external
62# media players
63# private-etc alsa,asound.conf,machine-id,openal,pulse
64private-tmp
65
66memory-deny-write-execute
diff --git a/etc/profile-a-l/linphone.profile b/etc/profile-a-l/linphone.profile
new file mode 100644
index 000000000..dc156b298
--- /dev/null
+++ b/etc/profile-a-l/linphone.profile
@@ -0,0 +1,43 @@
1# Firejail profile for linphone
2# Description: SIP softphone - graphical client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include linphone.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.linphone-history.db
10noblacklist ${HOME}/.linphonerc
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19mkfile ${HOME}/.linphone-history.db
20mkfile ${HOME}/.linphonerc
21whitelist ${HOME}/.linphone-history.db
22whitelist ${HOME}/.linphonerc
23whitelist ${DOWNLOADS}
24include whitelist-common.inc
25
26caps.drop all
27netfilter
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol unix,inet,inet6
37seccomp
38shell none
39
40disable-mnt
41private-dev
42private-tmp
43
diff --git a/etc/profile-a-l/lmms.profile b/etc/profile-a-l/lmms.profile
new file mode 100644
index 000000000..afe1ad635
--- /dev/null
+++ b/etc/profile-a-l/lmms.profile
@@ -0,0 +1,40 @@
1# Firejail profile for lmms
2# Description: Linux Multimedia Studio
3# This file is overwritten after every install/update
4# Persistent local customizations
5include lmms.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.lmmsrc.xml
10noblacklist ${DOCUMENTS}
11noblacklist ${MUSIC}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21caps.drop all
22ipc-namespace
23net none
24no3d
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix
33seccomp
34shell none
35
36private-dev
37private-tmp
38
39dbus-user none
40dbus-system none
diff --git a/etc/profile-a-l/lobase.profile b/etc/profile-a-l/lobase.profile
new file mode 100644
index 000000000..8348a57fe
--- /dev/null
+++ b/etc/profile-a-l/lobase.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for libreoffice
2# This file is overwritten after every install/update
3
4# Redirect
5include libreoffice.profile
diff --git a/etc/profile-a-l/localc.profile b/etc/profile-a-l/localc.profile
new file mode 100644
index 000000000..8348a57fe
--- /dev/null
+++ b/etc/profile-a-l/localc.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for libreoffice
2# This file is overwritten after every install/update
3
4# Redirect
5include libreoffice.profile
diff --git a/etc/profile-a-l/lodraw.profile b/etc/profile-a-l/lodraw.profile
new file mode 100644
index 000000000..8348a57fe
--- /dev/null
+++ b/etc/profile-a-l/lodraw.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for libreoffice
2# This file is overwritten after every install/update
3
4# Redirect
5include libreoffice.profile
diff --git a/etc/profile-a-l/loffice.profile b/etc/profile-a-l/loffice.profile
new file mode 100644
index 000000000..8348a57fe
--- /dev/null
+++ b/etc/profile-a-l/loffice.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for libreoffice
2# This file is overwritten after every install/update
3
4# Redirect
5include libreoffice.profile
diff --git a/etc/profile-a-l/lofromtemplate.profile b/etc/profile-a-l/lofromtemplate.profile
new file mode 100644
index 000000000..8348a57fe
--- /dev/null
+++ b/etc/profile-a-l/lofromtemplate.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for libreoffice
2# This file is overwritten after every install/update
3
4# Redirect
5include libreoffice.profile
diff --git a/etc/profile-a-l/loimpress.profile b/etc/profile-a-l/loimpress.profile
new file mode 100644
index 000000000..8348a57fe
--- /dev/null
+++ b/etc/profile-a-l/loimpress.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for libreoffice
2# This file is overwritten after every install/update
3
4# Redirect
5include libreoffice.profile
diff --git a/etc/profile-a-l/lollypop.profile b/etc/profile-a-l/lollypop.profile
new file mode 100644
index 000000000..1ce83822d
--- /dev/null
+++ b/etc/profile-a-l/lollypop.profile
@@ -0,0 +1,42 @@
1# Firejail profile for lollypop
2# Description: Music player for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include lollypop.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/lollypop
10noblacklist ${MUSIC}
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24include whitelist-var-common.inc
25
26caps.drop all
27netfilter
28no3d
29nogroups
30nonewprivs
31noroot
32notv
33nou2f
34novideo
35protocol unix,inet,inet6
36seccomp
37shell none
38
39private-dev
40private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-3.0,host.conf,hostname,hosts,machine-id,pki,pulse,resolv.conf,ssl,xdg
41private-tmp
42
diff --git a/etc/profile-a-l/lomath.profile b/etc/profile-a-l/lomath.profile
new file mode 100644
index 000000000..8348a57fe
--- /dev/null
+++ b/etc/profile-a-l/lomath.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for libreoffice
2# This file is overwritten after every install/update
3
4# Redirect
5include libreoffice.profile
diff --git a/etc/profile-a-l/loweb.profile b/etc/profile-a-l/loweb.profile
new file mode 100644
index 000000000..8348a57fe
--- /dev/null
+++ b/etc/profile-a-l/loweb.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for libreoffice
2# This file is overwritten after every install/update
3
4# Redirect
5include libreoffice.profile
diff --git a/etc/profile-a-l/lowriter.profile b/etc/profile-a-l/lowriter.profile
new file mode 100644
index 000000000..8348a57fe
--- /dev/null
+++ b/etc/profile-a-l/lowriter.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for libreoffice
2# This file is overwritten after every install/update
3
4# Redirect
5include libreoffice.profile
diff --git a/etc/profile-a-l/lrunzip.profile b/etc/profile-a-l/lrunzip.profile
new file mode 100644
index 000000000..c010cbd96
--- /dev/null
+++ b/etc/profile-a-l/lrunzip.profile
@@ -0,0 +1,12 @@
1# Firejail profile for lrunzip
2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include lrunzip.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include cpio.profile
diff --git a/etc/profile-a-l/lrz.profile b/etc/profile-a-l/lrz.profile
new file mode 100644
index 000000000..8077be945
--- /dev/null
+++ b/etc/profile-a-l/lrz.profile
@@ -0,0 +1,12 @@
1# Firejail profile for lrz
2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include lrz.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include cpio.profile
diff --git a/etc/profile-a-l/lrzcat.profile b/etc/profile-a-l/lrzcat.profile
new file mode 100644
index 000000000..d05ee7aae
--- /dev/null
+++ b/etc/profile-a-l/lrzcat.profile
@@ -0,0 +1,12 @@
1# Firejail profile for lrzcat
2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include lrzcat.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include cpio.profile
diff --git a/etc/profile-a-l/lrzip.profile b/etc/profile-a-l/lrzip.profile
new file mode 100644
index 000000000..3767767f6
--- /dev/null
+++ b/etc/profile-a-l/lrzip.profile
@@ -0,0 +1,12 @@
1# Firejail profile for lrzip
2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include lrzip.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include cpio.profile
diff --git a/etc/profile-a-l/lrztar.profile b/etc/profile-a-l/lrztar.profile
new file mode 100644
index 000000000..673e9f62e
--- /dev/null
+++ b/etc/profile-a-l/lrztar.profile
@@ -0,0 +1,12 @@
1# Firejail profile for lrztar
2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include lrztar.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include cpio.profile
diff --git a/etc/profile-a-l/lrzuntar.profile b/etc/profile-a-l/lrzuntar.profile
new file mode 100644
index 000000000..245d1c669
--- /dev/null
+++ b/etc/profile-a-l/lrzuntar.profile
@@ -0,0 +1,12 @@
1# Firejail profile for lrzuntar
2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include lrzuntar.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include cpio.profile
diff --git a/etc/profile-a-l/lugaru.profile b/etc/profile-a-l/lugaru.profile
new file mode 100644
index 000000000..26157b942
--- /dev/null
+++ b/etc/profile-a-l/lugaru.profile
@@ -0,0 +1,51 @@
1# Firejail profile for lugaru
2# Description: Ninja rabbit fighting game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include lugaru.local
6# Persistent global definitions
7include globals.local
8
9# note: crashes after entering
10
11noblacklist ${HOME}/.config/lugaru
12noblacklist ${HOME}/.local/share/lugaru
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22mkdir ${HOME}/.config/lugaru
23mkdir ${HOME}/.local/share/lugaru
24whitelist ${HOME}/.config/lugaru
25whitelist ${HOME}/.local/share/lugaru
26include whitelist-common.inc
27include whitelist-var-common.inc
28
29caps.drop all
30ipc-namespace
31net none
32nodvd
33nogroups
34nonewprivs
35noroot
36notv
37nou2f
38novideo
39protocol unix,netlink
40seccomp
41shell none
42tracelog
43
44disable-mnt
45private-bin lugaru
46private-cache
47private-dev
48private-tmp
49
50dbus-user none
51dbus-system none
diff --git a/etc/profile-a-l/luminance-hdr.profile b/etc/profile-a-l/luminance-hdr.profile
new file mode 100644
index 000000000..2b0feaa17
--- /dev/null
+++ b/etc/profile-a-l/luminance-hdr.profile
@@ -0,0 +1,39 @@
1# Firejail profile for luminance-hdr
2# Description: Graphical user interface providing a workflow for HDR imaging
3# This file is overwritten after every install/update
4# Persistent local customizations
5include luminance-hdr.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Luminance
10noblacklist ${PICTURES}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20caps.drop all
21netfilter
22nodvd
23nogroups
24nonewprivs
25noroot
26nosound
27notv
28nou2f
29novideo
30protocol unix
31seccomp
32shell none
33tracelog
34
35#private-bin luminance-hdr,luminance-hdr-cli,align_image_stack
36private-cache
37private-dev
38private-tmp
39
diff --git a/etc/profile-a-l/lximage-qt.profile b/etc/profile-a-l/lximage-qt.profile
new file mode 100644
index 000000000..a33ddab78
--- /dev/null
+++ b/etc/profile-a-l/lximage-qt.profile
@@ -0,0 +1,38 @@
1# Firejail profile for lximage-qt
2# Description: Image viewer for LXQt
3# This file is overwritten after every install/update
4# Persistent local customizations
5include lximage-qt.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/lximage-qt
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include whitelist-var-common.inc
18
19apparmor
20caps.drop all
21net none
22no3d
23nodvd
24nogroups
25nonewprivs
26noroot
27nosound
28notv
29nou2f
30novideo
31protocol unix
32seccomp
33shell none
34
35private-cache
36private-dev
37private-tmp
38
diff --git a/etc/profile-a-l/lxmusic.profile b/etc/profile-a-l/lxmusic.profile
new file mode 100644
index 000000000..9094f4377
--- /dev/null
+++ b/etc/profile-a-l/lxmusic.profile
@@ -0,0 +1,40 @@
1# Firejail profile for lxmusic
2# Description: LXDE music player
3# This file is overwritten after every install/update
4# Persistent local customizations
5include lxmusic.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/xmms2
10noblacklist ${HOME}/.config/xmms2
11noblacklist ${MUSIC}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25netfilter
26no3d
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37
38private-dev
39private-tmp
40
diff --git a/etc/profile-a-l/lynx.profile b/etc/profile-a-l/lynx.profile
new file mode 100644
index 000000000..dbd0a61e5
--- /dev/null
+++ b/etc/profile-a-l/lynx.profile
@@ -0,0 +1,41 @@
1# Firejail profile for lynx
2# Description: Classic non-graphical (text-mode) web browser
3# This file is overwritten after every install/update
4# Persistent local customizations
5include lynx.local
6# Persistent global definitions
7include globals.local
8
9blacklist /tmp/.X11-unix
10blacklist ${RUNUSER}/wayland-*
11
12include disable-common.inc
13include disable-devel.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19include whitelist-runuser-common.inc
20
21caps.drop all
22netfilter
23no3d
24nodvd
25nogroups
26nonewprivs
27noroot
28nosound
29notv
30nou2f
31novideo
32protocol unix,inet,inet6
33seccomp
34shell none
35tracelog
36
37# private-bin lynx
38private-cache
39private-dev
40# private-etc alternatives,ca-certificates,crypto-policies,pki,ssl
41private-tmp
diff --git a/etc/profile-a-l/lzcat.profile b/etc/profile-a-l/lzcat.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-a-l/lzcat.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-a-l/lzcmp.profile b/etc/profile-a-l/lzcmp.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-a-l/lzcmp.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-a-l/lzdiff.profile b/etc/profile-a-l/lzdiff.profile
new file mode 100644
index 000000000..f7410b928
--- /dev/null
+++ b/etc/profile-a-l/lzdiff.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4
5# Redirect
6include cpio.profile
diff --git a/etc/profile-a-l/lzegrep.profile b/etc/profile-a-l/lzegrep.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-a-l/lzegrep.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-a-l/lzfgrep.profile b/etc/profile-a-l/lzfgrep.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-a-l/lzfgrep.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-a-l/lzgrep.profile b/etc/profile-a-l/lzgrep.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-a-l/lzgrep.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-a-l/lzip.profile b/etc/profile-a-l/lzip.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-a-l/lzip.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-a-l/lzless.profile b/etc/profile-a-l/lzless.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-a-l/lzless.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-a-l/lzma.profile b/etc/profile-a-l/lzma.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-a-l/lzma.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-a-l/lzmadec.profile b/etc/profile-a-l/lzmadec.profile
new file mode 100644
index 000000000..0c5ec1b09
--- /dev/null
+++ b/etc/profile-a-l/lzmadec.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for xzdec
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4
5# Redirect
6include xzdec.profile
diff --git a/etc/profile-a-l/lzmainfo.profile b/etc/profile-a-l/lzmainfo.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-a-l/lzmainfo.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-a-l/lzmore.profile b/etc/profile-a-l/lzmore.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-a-l/lzmore.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile