aboutsummaryrefslogtreecommitdiffstats
path: root/etc/profile-m-z
diff options
context:
space:
mode:
authorLibravatar netblue30 <netblue30@yahoo.com>2020-04-21 08:24:28 -0400
committerLibravatar netblue30 <netblue30@yahoo.com>2020-04-21 08:24:28 -0400
commit018d75775eab4a0f045949a9d069c57686ca2686 (patch)
treeaac3a1a65cca0d4875795c55109a5c3e35efdefb /etc/profile-m-z
parentsmall fixes (diff)
downloadfirejail-018d75775eab4a0f045949a9d069c57686ca2686.tar.gz
firejail-018d75775eab4a0f045949a9d069c57686ca2686.tar.zst
firejail-018d75775eab4a0f045949a9d069c57686ca2686.zip
reorganize github etc directory
Diffstat (limited to 'etc/profile-m-z')
-rw-r--r--etc/profile-m-z/Maelstrom.profile45
-rw-r--r--etc/profile-m-z/Maps.profile6
-rw-r--r--etc/profile-m-z/Mathematica.profile30
-rw-r--r--etc/profile-m-z/Natron.profile5
-rw-r--r--etc/profile-m-z/PPSSPPQt.profile9
-rw-r--r--etc/profile-m-z/QMediathekView.profile58
-rw-r--r--etc/profile-m-z/QOwnNotes.profile54
-rw-r--r--etc/profile-m-z/Screenshot.profile6
-rw-r--r--etc/profile-m-z/Telegram.profile5
-rw-r--r--etc/profile-m-z/Thunar.profile33
-rw-r--r--etc/profile-m-z/Viber.profile38
-rw-r--r--etc/profile-m-z/VirtualBox.profile6
-rw-r--r--etc/profile-m-z/XMind.profile38
-rw-r--r--etc/profile-m-z/Xephyr.profile42
-rw-r--r--etc/profile-m-z/Xvfb.profile46
-rw-r--r--etc/profile-m-z/macrofusion.profile44
-rw-r--r--etc/profile-m-z/magicor.profile51
-rw-r--r--etc/profile-m-z/makepkg.profile61
-rw-r--r--etc/profile-m-z/manaplus.profile50
-rw-r--r--etc/profile-m-z/masterpdfeditor.profile41
-rw-r--r--etc/profile-m-z/masterpdfeditor4.profile11
-rw-r--r--etc/profile-m-z/masterpdfeditor5.profile11
-rw-r--r--etc/profile-m-z/mate-calc.profile53
-rw-r--r--etc/profile-m-z/mate-calculator.profile5
-rw-r--r--etc/profile-m-z/mate-color-select.profile39
-rw-r--r--etc/profile-m-z/mate-dictionary.profile44
-rw-r--r--etc/profile-m-z/mathematica.profile5
-rw-r--r--etc/profile-m-z/mcabber.profile33
-rw-r--r--etc/profile-m-z/mediainfo.profile50
-rw-r--r--etc/profile-m-z/mediathekview.profile49
-rw-r--r--etc/profile-m-z/megaglest.profile46
-rw-r--r--etc/profile-m-z/megaglest_editor.profile5
-rw-r--r--etc/profile-m-z/meld.profile74
-rw-r--r--etc/profile-m-z/mencoder.profile35
-rw-r--r--etc/profile-m-z/mendeleydesktop.profile50
-rw-r--r--etc/profile-m-z/meteo-qt.profile53
-rw-r--r--etc/profile-m-z/midori.profile65
-rw-r--r--etc/profile-m-z/min.profile15
-rw-r--r--etc/profile-m-z/mindless.profile50
-rw-r--r--etc/profile-m-z/minetest.profile51
-rw-r--r--etc/profile-m-z/mirrormagic.profile50
-rw-r--r--etc/profile-m-z/mousepad.profile39
-rw-r--r--etc/profile-m-z/mp3splt-gtk.profile43
-rw-r--r--etc/profile-m-z/mp3splt.profile53
-rw-r--r--etc/profile-m-z/mp3wrap.profile9
-rw-r--r--etc/profile-m-z/mpDris2.profile57
-rw-r--r--etc/profile-m-z/mpd.profile44
-rw-r--r--etc/profile-m-z/mpg123-alsa.profile9
-rw-r--r--etc/profile-m-z/mpg123-id3dump.profile12
-rw-r--r--etc/profile-m-z/mpg123-jack.profile9
-rw-r--r--etc/profile-m-z/mpg123-nas.profile9
-rw-r--r--etc/profile-m-z/mpg123-openal.profile9
-rw-r--r--etc/profile-m-z/mpg123-oss.profile9
-rw-r--r--etc/profile-m-z/mpg123-portaudio.profile9
-rw-r--r--etc/profile-m-z/mpg123-pulse.profile9
-rw-r--r--etc/profile-m-z/mpg123-strip.profile9
-rw-r--r--etc/profile-m-z/mpg123.bin.profile9
-rw-r--r--etc/profile-m-z/mpg123.profile41
-rw-r--r--etc/profile-m-z/mplayer.profile39
-rw-r--r--etc/profile-m-z/mpsyt.profile70
-rw-r--r--etc/profile-m-z/mpv.profile56
-rw-r--r--etc/profile-m-z/mrrescue.profile49
-rw-r--r--etc/profile-m-z/ms-excel.profile13
-rw-r--r--etc/profile-m-z/ms-office.profile43
-rw-r--r--etc/profile-m-z/ms-onenote.profile13
-rw-r--r--etc/profile-m-z/ms-outlook.profile13
-rw-r--r--etc/profile-m-z/ms-powerpoint.profile13
-rw-r--r--etc/profile-m-z/ms-skype.profile16
-rw-r--r--etc/profile-m-z/ms-word.profile13
-rw-r--r--etc/profile-m-z/multimc.profile5
-rw-r--r--etc/profile-m-z/multimc5.profile48
-rw-r--r--etc/profile-m-z/mumble.profile46
-rw-r--r--etc/profile-m-z/mupdf-gl.profile13
-rw-r--r--etc/profile-m-z/mupdf-x11-curl.profile18
-rw-r--r--etc/profile-m-z/mupdf-x11.profile14
-rw-r--r--etc/profile-m-z/mupdf.profile43
-rw-r--r--etc/profile-m-z/mupen64plus.profile35
-rw-r--r--etc/profile-m-z/muraster.profile11
-rw-r--r--etc/profile-m-z/musescore.profile43
-rw-r--r--etc/profile-m-z/musixmatch.profile36
-rw-r--r--etc/profile-m-z/mutool.profile11
-rw-r--r--etc/profile-m-z/mutt.profile61
-rw-r--r--etc/profile-m-z/mypaint-ora-thumbnailer.profile5
-rw-r--r--etc/profile-m-z/mypaint.profile50
-rw-r--r--etc/profile-m-z/nano.profile55
-rw-r--r--etc/profile-m-z/natron.profile38
-rw-r--r--etc/profile-m-z/nautilus.profile44
-rw-r--r--etc/profile-m-z/ncdu.profile36
-rw-r--r--etc/profile-m-z/nemo.profile38
-rw-r--r--etc/profile-m-z/netactview.profile54
-rw-r--r--etc/profile-m-z/nethack-vultures.profile45
-rw-r--r--etc/profile-m-z/nethack.profile47
-rw-r--r--etc/profile-m-z/netsurf.profile34
-rw-r--r--etc/profile-m-z/neverball.profile39
-rw-r--r--etc/profile-m-z/neverputt.profile11
-rw-r--r--etc/profile-m-z/newsbeuter.profile21
-rw-r--r--etc/profile-m-z/newsboat.profile50
-rw-r--r--etc/profile-m-z/nheko.profile41
-rw-r--r--etc/profile-m-z/nicotine.profile55
-rw-r--r--etc/profile-m-z/nitroshare-cli.profile6
-rw-r--r--etc/profile-m-z/nitroshare-nmh.profile6
-rw-r--r--etc/profile-m-z/nitroshare-send.profile6
-rw-r--r--etc/profile-m-z/nitroshare-ui.profile6
-rw-r--r--etc/profile-m-z/nitroshare.profile52
-rw-r--r--etc/profile-m-z/nomacs.profile47
-rw-r--r--etc/profile-m-z/nslookup.profile56
-rw-r--r--etc/profile-m-z/nylas.profile38
-rw-r--r--etc/profile-m-z/nyx.profile53
-rw-r--r--etc/profile-m-z/obs.profile43
-rw-r--r--etc/profile-m-z/ocenaudio.profile54
-rw-r--r--etc/profile-m-z/odt2txt.profile46
-rw-r--r--etc/profile-m-z/oggsplt.profile9
-rw-r--r--etc/profile-m-z/okular.profile63
-rw-r--r--etc/profile-m-z/onionshare-gui.profile41
-rw-r--r--etc/profile-m-z/ooffice.profile5
-rw-r--r--etc/profile-m-z/ooviewdoc.profile5
-rw-r--r--etc/profile-m-z/open-invaders.profile42
-rw-r--r--etc/profile-m-z/openarena.profile45
-rw-r--r--etc/profile-m-z/openbox.profile20
-rw-r--r--etc/profile-m-z/opencity.profile47
-rw-r--r--etc/profile-m-z/openclonk.profile48
-rw-r--r--etc/profile-m-z/openoffice.org.profile5
-rw-r--r--etc/profile-m-z/openshot-qt.profile5
-rw-r--r--etc/profile-m-z/openshot.profile42
-rw-r--r--etc/profile-m-z/openttd.profile47
-rw-r--r--etc/profile-m-z/opera-beta.profile17
-rw-r--r--etc/profile-m-z/opera.profile21
-rw-r--r--etc/profile-m-z/orage.profile39
-rw-r--r--etc/profile-m-z/ostrichriders.profile47
-rw-r--r--etc/profile-m-z/out123.profile9
-rw-r--r--etc/profile-m-z/p7zip.profile12
-rw-r--r--etc/profile-m-z/palemoon.profile26
-rw-r--r--etc/profile-m-z/pandoc.profile56
-rw-r--r--etc/profile-m-z/parole.profile30
-rw-r--r--etc/profile-m-z/patch.profile50
-rw-r--r--etc/profile-m-z/pavucontrol-qt.profile19
-rw-r--r--etc/profile-m-z/pavucontrol.profile56
-rw-r--r--etc/profile-m-z/pcmanfm.profile35
-rw-r--r--etc/profile-m-z/pdfchain.profile43
-rw-r--r--etc/profile-m-z/pdflatex.profile12
-rw-r--r--etc/profile-m-z/pdfmod.profile44
-rw-r--r--etc/profile-m-z/pdfsam.profile44
-rw-r--r--etc/profile-m-z/pdftotext.profile53
-rw-r--r--etc/profile-m-z/peek.profile43
-rw-r--r--etc/profile-m-z/penguin-command.profile41
-rw-r--r--etc/profile-m-z/picard.profile43
-rw-r--r--etc/profile-m-z/pidgin.profile45
-rw-r--r--etc/profile-m-z/ping.profile56
-rw-r--r--etc/profile-m-z/pingus.profile42
-rw-r--r--etc/profile-m-z/pinta.profile41
-rw-r--r--etc/profile-m-z/pioneer.profile46
-rw-r--r--etc/profile-m-z/pithos.profile42
-rw-r--r--etc/profile-m-z/pitivi.profile42
-rw-r--r--etc/profile-m-z/pix.profile36
-rw-r--r--etc/profile-m-z/planmaker18.profile10
-rw-r--r--etc/profile-m-z/planmaker18free.profile10
-rw-r--r--etc/profile-m-z/playonlinux.profile37
-rw-r--r--etc/profile-m-z/pluma.profile53
-rw-r--r--etc/profile-m-z/pngquant.profile53
-rw-r--r--etc/profile-m-z/polari.profile51
-rw-r--r--etc/profile-m-z/ppsspp.profile42
-rw-r--r--etc/profile-m-z/pragha.profile38
-rw-r--r--etc/profile-m-z/presentations18.profile11
-rw-r--r--etc/profile-m-z/presentations18free.profile10
-rw-r--r--etc/profile-m-z/profanity.profile52
-rw-r--r--etc/profile-m-z/psi-plus.profile45
-rw-r--r--etc/profile-m-z/pybitmessage.profile46
-rw-r--r--etc/profile-m-z/pycharm-community.profile38
-rw-r--r--etc/profile-m-z/pycharm-professional.profile7
-rw-r--r--etc/profile-m-z/pzstd.profile5
-rw-r--r--etc/profile-m-z/qbittorrent.profile61
-rw-r--r--etc/profile-m-z/qemu-launcher.profile29
-rw-r--r--etc/profile-m-z/qemu-system-x86_64.profile28
-rw-r--r--etc/profile-m-z/qgis.profile59
-rw-r--r--etc/profile-m-z/qlipper.profile38
-rw-r--r--etc/profile-m-z/qmmp.profile38
-rw-r--r--etc/profile-m-z/qpdfview.profile45
-rw-r--r--etc/profile-m-z/qt-faststart.profile14
-rw-r--r--etc/profile-m-z/qtox.profile51
-rw-r--r--etc/profile-m-z/quassel.profile26
-rw-r--r--etc/profile-m-z/quiterss.profile54
-rw-r--r--etc/profile-m-z/qupzilla.profile25
-rw-r--r--etc/profile-m-z/qutebrowser.profile40
-rw-r--r--etc/profile-m-z/rambox.profile38
-rw-r--r--etc/profile-m-z/ranger.profile44
-rw-r--r--etc/profile-m-z/redeclipse.profile39
-rw-r--r--etc/profile-m-z/redshift.profile53
-rw-r--r--etc/profile-m-z/regextester.profile57
-rw-r--r--etc/profile-m-z/remmina.profile40
-rw-r--r--etc/profile-m-z/rhythmbox-client.profile11
-rw-r--r--etc/profile-m-z/rhythmbox.profile52
-rw-r--r--etc/profile-m-z/ricochet.profile41
-rw-r--r--etc/profile-m-z/riot-desktop.profile13
-rw-r--r--etc/profile-m-z/riot-web.profile17
-rw-r--r--etc/profile-m-z/ripperx.profile43
-rw-r--r--etc/profile-m-z/ristretto.profile42
-rw-r--r--etc/profile-m-z/rnano.profile12
-rw-r--r--etc/profile-m-z/rocketchat.profile16
-rw-r--r--etc/profile-m-z/rsync-download_only.profile59
-rw-r--r--etc/profile-m-z/rtorrent.profile33
-rw-r--r--etc/profile-m-z/rtv.profile58
-rw-r--r--etc/profile-m-z/runenpass.sh.profile5
-rw-r--r--etc/profile-m-z/rview.profile10
-rw-r--r--etc/profile-m-z/rvim.profile10
-rw-r--r--etc/profile-m-z/sayonara.profile35
-rw-r--r--etc/profile-m-z/scallion.profile44
-rw-r--r--etc/profile-m-z/scorched3d-wrapper.profile7
-rw-r--r--etc/profile-m-z/scorched3d.profile46
-rw-r--r--etc/profile-m-z/scorchwentbonkers.profile49
-rw-r--r--etc/profile-m-z/scp.profile12
-rw-r--r--etc/profile-m-z/scribus.profile64
-rw-r--r--etc/profile-m-z/sdat2img.profile43
-rw-r--r--etc/profile-m-z/seahorse-adventures.profile50
-rw-r--r--etc/profile-m-z/seahorse-daemon.profile14
-rw-r--r--etc/profile-m-z/seahorse-tool.profile15
-rw-r--r--etc/profile-m-z/seahorse.profile63
-rw-r--r--etc/profile-m-z/seamonkey-bin.profile5
-rw-r--r--etc/profile-m-z/seamonkey.profile55
-rw-r--r--etc/profile-m-z/secret-tool.profile11
-rw-r--r--etc/profile-m-z/server.profile77
-rw-r--r--etc/profile-m-z/sftp.profile12
-rw-r--r--etc/profile-m-z/shellcheck.profile54
-rw-r--r--etc/profile-m-z/shortwave.profile50
-rw-r--r--etc/profile-m-z/shotcut.profile38
-rw-r--r--etc/profile-m-z/signal-cli.profile51
-rw-r--r--etc/profile-m-z/signal-desktop.profile44
-rw-r--r--etc/profile-m-z/silentarmy.profile39
-rw-r--r--etc/profile-m-z/simple-scan.profile41
-rw-r--r--etc/profile-m-z/simplescreenrecorder.profile39
-rw-r--r--etc/profile-m-z/simutrans.profile42
-rw-r--r--etc/profile-m-z/skanlite.profile37
-rw-r--r--etc/profile-m-z/skypeforlinux.profile31
-rw-r--r--etc/profile-m-z/slack.profile34
-rw-r--r--etc/profile-m-z/slashem.profile47
-rw-r--r--etc/profile-m-z/smplayer.profile49
-rw-r--r--etc/profile-m-z/smtube.profile48
-rw-r--r--etc/profile-m-z/snox.profile19
-rw-r--r--etc/profile-m-z/soffice.profile5
-rw-r--r--etc/profile-m-z/sol.profile46
-rw-r--r--etc/profile-m-z/sound-juicer.profile43
-rw-r--r--etc/profile-m-z/soundconverter.profile50
-rw-r--r--etc/profile-m-z/spectre-meltdown-checker.profile54
-rw-r--r--etc/profile-m-z/spotify.profile54
-rw-r--r--etc/profile-m-z/sqlitebrowser.profile49
-rw-r--r--etc/profile-m-z/ssh-agent.profile38
-rw-r--r--etc/profile-m-z/ssh.profile52
-rw-r--r--etc/profile-m-z/standardnotes-desktop.profile44
-rw-r--r--etc/profile-m-z/start-tor-browser.desktop.profile76
-rw-r--r--etc/profile-m-z/start-tor-browser.profile42
-rw-r--r--etc/profile-m-z/steam-native.profile5
-rw-r--r--etc/profile-m-z/steam.profile112
-rw-r--r--etc/profile-m-z/stellarium.profile45
-rw-r--r--etc/profile-m-z/strings.profile56
-rw-r--r--etc/profile-m-z/studio.sh.profile5
-rw-r--r--etc/profile-m-z/subdownloader.profile53
-rw-r--r--etc/profile-m-z/supertux2.profile43
-rw-r--r--etc/profile-m-z/supertuxkart.profile57
-rw-r--r--etc/profile-m-z/surf.profile39
-rw-r--r--etc/profile-m-z/swell-foop.profile21
-rw-r--r--etc/profile-m-z/sylpheed.profile17
-rw-r--r--etc/profile-m-z/synfigstudio.profile39
-rw-r--r--etc/profile-m-z/sysprof-cli.profile20
-rw-r--r--etc/profile-m-z/sysprof.profile52
-rw-r--r--etc/profile-m-z/tar.profile55
-rw-r--r--etc/profile-m-z/tb-starter-wrapper.profile19
-rw-r--r--etc/profile-m-z/tcpdump.profile45
-rw-r--r--etc/profile-m-z/teams-for-linux.profile36
-rw-r--r--etc/profile-m-z/teams.profile38
-rw-r--r--etc/profile-m-z/teamspeak3.profile42
-rw-r--r--etc/profile-m-z/teeworlds.profile46
-rw-r--r--etc/profile-m-z/telegram-desktop.profile6
-rw-r--r--etc/profile-m-z/telegram.profile29
-rw-r--r--etc/profile-m-z/terasology.profile48
-rw-r--r--etc/profile-m-z/tex.profile12
-rw-r--r--etc/profile-m-z/textmaker18.profile11
-rw-r--r--etc/profile-m-z/textmaker18free.profile11
-rw-r--r--etc/profile-m-z/thunar.profile6
-rw-r--r--etc/profile-m-z/thunderbird-beta.profile7
-rw-r--r--etc/profile-m-z/thunderbird-wayland.profile10
-rw-r--r--etc/profile-m-z/thunderbird.profile63
-rw-r--r--etc/profile-m-z/tilp.profile35
-rw-r--r--etc/profile-m-z/tor-browser-ar.profile10
-rw-r--r--etc/profile-m-z/tor-browser-ca.profile10
-rw-r--r--etc/profile-m-z/tor-browser-cs.profile10
-rw-r--r--etc/profile-m-z/tor-browser-da.profile10
-rw-r--r--etc/profile-m-z/tor-browser-de.profile10
-rw-r--r--etc/profile-m-z/tor-browser-el.profile10
-rw-r--r--etc/profile-m-z/tor-browser-en-us.profile10
-rw-r--r--etc/profile-m-z/tor-browser-en.profile10
-rw-r--r--etc/profile-m-z/tor-browser-es-es.profile10
-rw-r--r--etc/profile-m-z/tor-browser-es.profile10
-rw-r--r--etc/profile-m-z/tor-browser-fa.profile10
-rw-r--r--etc/profile-m-z/tor-browser-fr.profile10
-rw-r--r--etc/profile-m-z/tor-browser-ga-ie.profile10
-rw-r--r--etc/profile-m-z/tor-browser-he.profile10
-rw-r--r--etc/profile-m-z/tor-browser-hu.profile10
-rw-r--r--etc/profile-m-z/tor-browser-id.profile10
-rw-r--r--etc/profile-m-z/tor-browser-is.profile10
-rw-r--r--etc/profile-m-z/tor-browser-it.profile10
-rw-r--r--etc/profile-m-z/tor-browser-ja.profile10
-rw-r--r--etc/profile-m-z/tor-browser-ka.profile10
-rw-r--r--etc/profile-m-z/tor-browser-ko.profile10
-rw-r--r--etc/profile-m-z/tor-browser-nb.profile10
-rw-r--r--etc/profile-m-z/tor-browser-nl.profile10
-rw-r--r--etc/profile-m-z/tor-browser-pl.profile10
-rw-r--r--etc/profile-m-z/tor-browser-pt-br.profile10
-rw-r--r--etc/profile-m-z/tor-browser-ru.profile10
-rw-r--r--etc/profile-m-z/tor-browser-sv-se.profile10
-rw-r--r--etc/profile-m-z/tor-browser-tr.profile10
-rw-r--r--etc/profile-m-z/tor-browser-vi.profile10
-rw-r--r--etc/profile-m-z/tor-browser-zh-cn.profile10
-rw-r--r--etc/profile-m-z/tor-browser-zh-tw.profile10
-rw-r--r--etc/profile-m-z/tor-browser.profile10
-rw-r--r--etc/profile-m-z/tor-browser_ar.profile10
-rw-r--r--etc/profile-m-z/tor-browser_ca.profile10
-rw-r--r--etc/profile-m-z/tor-browser_cs.profile10
-rw-r--r--etc/profile-m-z/tor-browser_da.profile10
-rw-r--r--etc/profile-m-z/tor-browser_de.profile10
-rw-r--r--etc/profile-m-z/tor-browser_el.profile10
-rw-r--r--etc/profile-m-z/tor-browser_en-US.profile10
-rw-r--r--etc/profile-m-z/tor-browser_en.profile10
-rw-r--r--etc/profile-m-z/tor-browser_es-ES.profile10
-rw-r--r--etc/profile-m-z/tor-browser_es.profile10
-rw-r--r--etc/profile-m-z/tor-browser_fa.profile10
-rw-r--r--etc/profile-m-z/tor-browser_fr.profile10
-rw-r--r--etc/profile-m-z/tor-browser_ga-IE.profile10
-rw-r--r--etc/profile-m-z/tor-browser_he.profile10
-rw-r--r--etc/profile-m-z/tor-browser_hu.profile10
-rw-r--r--etc/profile-m-z/tor-browser_id.profile10
-rw-r--r--etc/profile-m-z/tor-browser_is.profile10
-rw-r--r--etc/profile-m-z/tor-browser_it.profile10
-rw-r--r--etc/profile-m-z/tor-browser_ja.profile10
-rw-r--r--etc/profile-m-z/tor-browser_ka.profile10
-rw-r--r--etc/profile-m-z/tor-browser_ko.profile10
-rw-r--r--etc/profile-m-z/tor-browser_nb.profile10
-rw-r--r--etc/profile-m-z/tor-browser_nl.profile10
-rw-r--r--etc/profile-m-z/tor-browser_pl.profile10
-rw-r--r--etc/profile-m-z/tor-browser_pt-BR.profile10
-rw-r--r--etc/profile-m-z/tor-browser_ru.profile10
-rw-r--r--etc/profile-m-z/tor-browser_sv-SE.profile10
-rw-r--r--etc/profile-m-z/tor-browser_tr.profile10
-rw-r--r--etc/profile-m-z/tor-browser_vi.profile10
-rw-r--r--etc/profile-m-z/tor-browser_zh-CN.profile10
-rw-r--r--etc/profile-m-z/tor-browser_zh-TW.profile10
-rw-r--r--etc/profile-m-z/tor.profile51
-rw-r--r--etc/profile-m-z/torbrowser-launcher.profile56
-rw-r--r--etc/profile-m-z/torcs.profile45
-rw-r--r--etc/profile-m-z/totem.profile47
-rw-r--r--etc/profile-m-z/tracker.profile39
-rw-r--r--etc/profile-m-z/transgui.profile54
-rw-r--r--etc/profile-m-z/transmission-cli.profile14
-rw-r--r--etc/profile-m-z/transmission-common.profile53
-rw-r--r--etc/profile-m-z/transmission-create.profile13
-rw-r--r--etc/profile-m-z/transmission-daemon.profile26
-rw-r--r--etc/profile-m-z/transmission-edit.profile13
-rw-r--r--etc/profile-m-z/transmission-gtk.profile17
-rw-r--r--etc/profile-m-z/transmission-qt.profile18
-rw-r--r--etc/profile-m-z/transmission-remote-cli.profile17
-rw-r--r--etc/profile-m-z/transmission-remote-gtk.profile22
-rw-r--r--etc/profile-m-z/transmission-remote.profile14
-rw-r--r--etc/profile-m-z/transmission-show.profile14
-rw-r--r--etc/profile-m-z/tremulous.profile46
-rw-r--r--etc/profile-m-z/truecraft.profile39
-rw-r--r--etc/profile-m-z/ts3client_runscript.sh.profile19
-rw-r--r--etc/profile-m-z/tshark.profile46
-rw-r--r--etc/profile-m-z/tuxguitar.profile45
-rw-r--r--etc/profile-m-z/tvbrowser.profile53
-rw-r--r--etc/profile-m-z/udiskie.profile45
-rw-r--r--etc/profile-m-z/uefitool.profile39
-rw-r--r--etc/profile-m-z/uget-gtk.profile37
-rw-r--r--etc/profile-m-z/unbound.profile52
-rw-r--r--etc/profile-m-z/uncompress.profile11
-rw-r--r--etc/profile-m-z/unf.profile58
-rw-r--r--etc/profile-m-z/unknown-horizons.profile44
-rw-r--r--etc/profile-m-z/unlzma.profile7
-rw-r--r--etc/profile-m-z/unrar.profile45
-rw-r--r--etc/profile-m-z/unxz.profile7
-rw-r--r--etc/profile-m-z/unzip.profile47
-rw-r--r--etc/profile-m-z/unzstd.profile5
-rw-r--r--etc/profile-m-z/utox.profile48
-rw-r--r--etc/profile-m-z/uudeview.profile46
-rw-r--r--etc/profile-m-z/uzbl-browser.profile40
-rw-r--r--etc/profile-m-z/viewnior.profile51
-rw-r--r--etc/profile-m-z/viking.profile37
-rw-r--r--etc/profile-m-z/vim.profile34
-rw-r--r--etc/profile-m-z/vimcat.profile10
-rw-r--r--etc/profile-m-z/vimdiff.profile10
-rw-r--r--etc/profile-m-z/vimpager.profile11
-rw-r--r--etc/profile-m-z/vimtutor.profile10
-rw-r--r--etc/profile-m-z/virtualbox.profile32
-rw-r--r--etc/profile-m-z/vivaldi-beta.profile5
-rw-r--r--etc/profile-m-z/vivaldi-snapshot.profile17
-rw-r--r--etc/profile-m-z/vivaldi-stable.profile5
-rw-r--r--etc/profile-m-z/vivaldi.profile31
-rw-r--r--etc/profile-m-z/vlc.profile45
-rw-r--r--etc/profile-m-z/vscodium.profile7
-rw-r--r--etc/profile-m-z/vulturesclaw.profile8
-rw-r--r--etc/profile-m-z/vultureseye.profile8
-rw-r--r--etc/profile-m-z/vym.profile36
-rw-r--r--etc/profile-m-z/w3m.profile45
-rw-r--r--etc/profile-m-z/warmux.profile55
-rw-r--r--etc/profile-m-z/warsow.profile51
-rw-r--r--etc/profile-m-z/warzone2100.profile46
-rw-r--r--etc/profile-m-z/waterfox-classic.profile7
-rw-r--r--etc/profile-m-z/waterfox-current.profile7
-rw-r--r--etc/profile-m-z/waterfox.profile27
-rw-r--r--etc/profile-m-z/webstorm.profile41
-rw-r--r--etc/profile-m-z/webui-aria2.profile38
-rw-r--r--etc/profile-m-z/weechat-curses.profile5
-rw-r--r--etc/profile-m-z/weechat.profile29
-rw-r--r--etc/profile-m-z/wesnoth.profile38
-rw-r--r--etc/profile-m-z/wget.profile59
-rw-r--r--etc/profile-m-z/whalebird.profile39
-rw-r--r--etc/profile-m-z/whois.profile57
-rw-r--r--etc/profile-m-z/widelands.profile47
-rw-r--r--etc/profile-m-z/wine.profile39
-rw-r--r--etc/profile-m-z/wire-desktop.profile36
-rw-r--r--etc/profile-m-z/wireshark-gtk.profile6
-rw-r--r--etc/profile-m-z/wireshark-qt.profile6
-rw-r--r--etc/profile-m-z/wireshark.profile50
-rw-r--r--etc/profile-m-z/wordwarvi.profile51
-rw-r--r--etc/profile-m-z/wpp.profile14
-rw-r--r--etc/profile-m-z/wps.profile49
-rw-r--r--etc/profile-m-z/wpspdf.profile11
-rw-r--r--etc/profile-m-z/x-terminal-emulator.profile22
-rw-r--r--etc/profile-m-z/x2goclient.profile49
-rw-r--r--etc/profile-m-z/xbill.profile53
-rw-r--r--etc/profile-m-z/xcalc.profile42
-rw-r--r--etc/profile-m-z/xchat.profile23
-rw-r--r--etc/profile-m-z/xed.profile53
-rw-r--r--etc/profile-m-z/xfburn.profile32
-rw-r--r--etc/profile-m-z/xfce4-dict.profile40
-rw-r--r--etc/profile-m-z/xfce4-mixer.profile53
-rw-r--r--etc/profile-m-z/xfce4-notes.profile42
-rw-r--r--etc/profile-m-z/xiphos.profile50
-rw-r--r--etc/profile-m-z/xlinks.profile21
-rw-r--r--etc/profile-m-z/xmms.profile31
-rw-r--r--etc/profile-m-z/xmr-stak.profile45
-rw-r--r--etc/profile-m-z/xonotic-glx.profile5
-rw-r--r--etc/profile-m-z/xonotic-sdl.profile5
-rw-r--r--etc/profile-m-z/xonotic.profile43
-rw-r--r--etc/profile-m-z/xournal.profile49
-rw-r--r--etc/profile-m-z/xpdf.profile45
-rw-r--r--etc/profile-m-z/xplayer-audio-preview.profile10
-rw-r--r--etc/profile-m-z/xplayer-video-thumbnailer.profile10
-rw-r--r--etc/profile-m-z/xplayer.profile46
-rw-r--r--etc/profile-m-z/xpra.profile54
-rw-r--r--etc/profile-m-z/xreader-previewer.profile10
-rw-r--r--etc/profile-m-z/xreader-thumbnailer.profile10
-rw-r--r--etc/profile-m-z/xreader.profile45
-rw-r--r--etc/profile-m-z/xviewer.profile48
-rw-r--r--etc/profile-m-z/xxd.profile12
-rw-r--r--etc/profile-m-z/xz.profile7
-rw-r--r--etc/profile-m-z/xzcat.profile7
-rw-r--r--etc/profile-m-z/xzcmp.profile7
-rw-r--r--etc/profile-m-z/xzdec.profile41
-rw-r--r--etc/profile-m-z/xzdiff.profile7
-rw-r--r--etc/profile-m-z/xzegrep.profile7
-rw-r--r--etc/profile-m-z/xzfgrep.profile7
-rw-r--r--etc/profile-m-z/xzgrep.profile6
-rw-r--r--etc/profile-m-z/xzless.profile6
-rw-r--r--etc/profile-m-z/xzmore.profile7
-rw-r--r--etc/profile-m-z/yandex-browser.profile23
-rw-r--r--etc/profile-m-z/yelp.profile57
-rw-r--r--etc/profile-m-z/youtube-dl.profile66
-rw-r--r--etc/profile-m-z/zaproxy.profile47
-rw-r--r--etc/profile-m-z/zart.profile37
-rw-r--r--etc/profile-m-z/zathura.profile59
-rw-r--r--etc/profile-m-z/zcat.profile11
-rw-r--r--etc/profile-m-z/zcmp.profile11
-rw-r--r--etc/profile-m-z/zdiff.profile11
-rw-r--r--etc/profile-m-z/zeal.profile58
-rw-r--r--etc/profile-m-z/zegrep.profile11
-rw-r--r--etc/profile-m-z/zfgrep.profile11
-rw-r--r--etc/profile-m-z/zforce.profile11
-rw-r--r--etc/profile-m-z/zgrep.profile11
-rw-r--r--etc/profile-m-z/zless.profile11
-rw-r--r--etc/profile-m-z/zmore.profile11
-rw-r--r--etc/profile-m-z/znew.profile11
-rw-r--r--etc/profile-m-z/zoom.profile33
-rw-r--r--etc/profile-m-z/zpaq.profile15
-rw-r--r--etc/profile-m-z/zstd.profile43
-rw-r--r--etc/profile-m-z/zstdcat.profile5
-rw-r--r--etc/profile-m-z/zstdgrep.profile5
-rw-r--r--etc/profile-m-z/zstdless.profile5
-rw-r--r--etc/profile-m-z/zstdmt.profile5
-rw-r--r--etc/profile-m-z/zulip.profile47
487 files changed, 14560 insertions, 0 deletions
diff --git a/etc/profile-m-z/Maelstrom.profile b/etc/profile-m-z/Maelstrom.profile
new file mode 100644
index 000000000..5cf570f80
--- /dev/null
+++ b/etc/profile-m-z/Maelstrom.profile
@@ -0,0 +1,45 @@
1# Firejail profile for Maelstrom
2# Description: A space combat game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include Maelstrom.local
6# Persistent global definitions
7include globals.local
8
9noblacklist /var/lib/games/Maelstrom-Scores
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19whitelist /var/lib/games
20include whitelist-common.inc
21include whitelist-var-common.inc
22
23caps.drop all
24ipc-namespace
25net none
26nodvd
27nogroups
28#nonewprivs
29#noroot
30notv
31nou2f
32novideo
33#protocol unix
34#seccomp
35shell none
36tracelog
37
38disable-mnt
39private-bin Maelstrom
40private-cache
41private-dev
42private-tmp
43
44dbus-user none
45dbus-system none
diff --git a/etc/profile-m-z/Maps.profile b/etc/profile-m-z/Maps.profile
new file mode 100644
index 000000000..c52d2f2da
--- /dev/null
+++ b/etc/profile-m-z/Maps.profile
@@ -0,0 +1,6 @@
1# Firejail profile for gnome-maps
2# This file is overwritten after every install/update
3
4# Temporary fix for https://github.com/netblue30/firejail/issues/2624
5# Redirect
6include gnome-maps.profile
diff --git a/etc/profile-m-z/Mathematica.profile b/etc/profile-m-z/Mathematica.profile
new file mode 100644
index 000000000..c2734b1c1
--- /dev/null
+++ b/etc/profile-m-z/Mathematica.profile
@@ -0,0 +1,30 @@
1# Firejail profile for Mathematica
2# This file is overwritten after every install/update
3# Persistent local customizations
4include Mathematica.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.Mathematica
9noblacklist ${HOME}/.Wolfram Research
10
11include disable-common.inc
12include disable-devel.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17mkdir ${HOME}/.Mathematica
18mkdir ${HOME}/.Wolfram Research
19mkdir ${HOME}/Documents/Wolfram Mathematica
20whitelist ${HOME}/.Mathematica
21whitelist ${HOME}/.Wolfram Research
22whitelist ${HOME}/Documents/Wolfram Mathematica
23include whitelist-common.inc
24
25caps.drop all
26nodvd
27nonewprivs
28noroot
29notv
30seccomp
diff --git a/etc/profile-m-z/Natron.profile b/etc/profile-m-z/Natron.profile
new file mode 100644
index 000000000..42c22bf67
--- /dev/null
+++ b/etc/profile-m-z/Natron.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for natron
2# This file is overwritten after every install/update
3
4# Redirect
5include natron.profile
diff --git a/etc/profile-m-z/PPSSPPQt.profile b/etc/profile-m-z/PPSSPPQt.profile
new file mode 100644
index 000000000..c5592f99c
--- /dev/null
+++ b/etc/profile-m-z/PPSSPPQt.profile
@@ -0,0 +1,9 @@
1# Firejail profile for PPSSPPQt
2# This file is overwritten after every install/update
3# Persistent local customizations
4include PPSSPPQt.local
5# added by included profile
6#include globals.local
7
8# Redirect
9include ppsspp.profile
diff --git a/etc/profile-m-z/QMediathekView.profile b/etc/profile-m-z/QMediathekView.profile
new file mode 100644
index 000000000..d1548a864
--- /dev/null
+++ b/etc/profile-m-z/QMediathekView.profile
@@ -0,0 +1,58 @@
1# Firejail profile for QMediathekView
2# Description: Search, download or stream files from mediathek.de
3# This file is overwritten after every install/update
4# Persistent local customizations
5include QMediathekView.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/QMediathekView
10noblacklist ${HOME}/.local/share/QMediathekView
11
12noblacklist ${HOME}/.config/mpv
13noblacklist ${HOME}/.config/smplayer
14noblacklist ${HOME}/.config/totem
15noblacklist ${HOME}/.config/vlc
16noblacklist ${HOME}/.config/xplayer
17noblacklist ${HOME}/.local/share/totem
18noblacklist ${HOME}/.local/share/xplayer
19noblacklist ${HOME}/.mplayer
20noblacklist ${VIDEOS}
21
22include disable-common.inc
23include disable-devel.inc
24include disable-exec.inc
25include disable-interpreters.inc
26include disable-passwdmgr.inc
27include disable-programs.inc
28include disable-xdg.inc
29
30whitelist /usr/share/qtchooser
31include whitelist-usr-share-common.inc
32include whitelist-var-common.inc
33
34caps.drop all
35netfilter
36# no3d
37nodvd
38nogroups
39nonewprivs
40noroot
41notv
42nou2f
43novideo
44protocol unix,inet,inet6,netlink
45seccomp
46shell none
47tracelog
48
49disable-mnt
50private-bin mplayer,mpv,QMediathekView,smplayer,totem,vlc,xplayer
51private-cache
52private-dev
53private-tmp
54
55# dbus-user none
56# dbus-system none
57
58#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-m-z/QOwnNotes.profile b/etc/profile-m-z/QOwnNotes.profile
new file mode 100644
index 000000000..8157cdff4
--- /dev/null
+++ b/etc/profile-m-z/QOwnNotes.profile
@@ -0,0 +1,54 @@
1# Firejail profile for QOwnNotes
2# Description: Plain-text file notepad with markdown support and ownCloud integration
3# This file is overwritten after every install/update
4# Persistent local customizations
5include QOwnNotes.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${DOCUMENTS}
10noblacklist ${HOME}/Nextcloud/Notes
11noblacklist ${HOME}/.config/PBE
12noblacklist ${HOME}/.local/share/PBE
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22mkdir ${HOME}/Nextcloud/Notes
23mkdir ${HOME}/.config/PBE
24mkdir ${HOME}/.local/share/PBE
25whitelist ${DOCUMENTS}
26whitelist ${HOME}/Nextcloud/Notes
27whitelist ${HOME}/.config/PBE
28whitelist ${HOME}/.local/share/PBE
29include whitelist-common.inc
30include whitelist-var-common.inc
31
32caps.drop all
33machine-id
34netfilter
35no3d
36nodvd
37nogroups
38nonewprivs
39noroot
40nosound
41notv
42nou2f
43novideo
44protocol unix,inet,inet6,netlink
45seccomp
46shell none
47tracelog
48
49disable-mnt
50private-bin gio,QOwnNotes
51private-dev
52private-etc alternatives,ca-certificates,crypto-policies,fonts,host.conf,hosts,ld.so.cache,machine-id,nsswitch.conf,pki,pulse,resolv.conf,ssl
53private-tmp
54
diff --git a/etc/profile-m-z/Screenshot.profile b/etc/profile-m-z/Screenshot.profile
new file mode 100644
index 000000000..d4b083736
--- /dev/null
+++ b/etc/profile-m-z/Screenshot.profile
@@ -0,0 +1,6 @@
1# Firejail profile for gnome-screenshot
2# This file is overwritten after every install/update
3
4# Temporary fix for https://github.com/netblue30/firejail/issues/2624
5# Redirect
6include gnome-screenshot.profile
diff --git a/etc/profile-m-z/Telegram.profile b/etc/profile-m-z/Telegram.profile
new file mode 100644
index 000000000..310e0237e
--- /dev/null
+++ b/etc/profile-m-z/Telegram.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for telegram
2# This file is overwritten after every install/update
3
4# Redirect
5include telegram.profile
diff --git a/etc/profile-m-z/Thunar.profile b/etc/profile-m-z/Thunar.profile
new file mode 100644
index 000000000..761440ccc
--- /dev/null
+++ b/etc/profile-m-z/Thunar.profile
@@ -0,0 +1,33 @@
1# Firejail profile for Thunar
2# Description: File Manager for Xfce
3# This file is overwritten after every install/update
4# Persistent local customizations
5include Thunar.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/Trash
10noblacklist ${HOME}/.config/Thunar
11noblacklist ${HOME}/.config/xfce4/xfconf/xfce-perchannel-xml/thunar.xml
12
13include disable-common.inc
14include disable-devel.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17# include disable-programs.inc
18
19allusers
20caps.drop all
21netfilter
22no3d
23nodvd
24nogroups
25nonewprivs
26noroot
27nosound
28notv
29novideo
30protocol unix
31seccomp
32shell none
33tracelog
diff --git a/etc/profile-m-z/Viber.profile b/etc/profile-m-z/Viber.profile
new file mode 100644
index 000000000..3195e39fa
--- /dev/null
+++ b/etc/profile-m-z/Viber.profile
@@ -0,0 +1,38 @@
1# Firejail profile for Viber
2# This file is overwritten after every install/update
3# Persistent local customizations
4include Viber.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.ViberPC
9noblacklist ${PATH}/dig
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.ViberPC
19whitelist ${DOWNLOADS}
20whitelist ${HOME}/.ViberPC
21include whitelist-common.inc
22
23caps.drop all
24ipc-namespace
25netfilter
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31protocol unix,inet,inet6
32seccomp !chroot
33shell none
34
35disable-mnt
36private-bin awk,bash,dig,sh,Viber
37private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,hosts,localtime,machine-id,mailcap,nsswitch.conf,pki,proxychains.conf,pulse,resolv.conf,ssl,X11
38private-tmp
diff --git a/etc/profile-m-z/VirtualBox.profile b/etc/profile-m-z/VirtualBox.profile
new file mode 100644
index 000000000..4c99ae9a3
--- /dev/null
+++ b/etc/profile-m-z/VirtualBox.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for virtualbox
2# Description: x86 virtualization solution
3# This file is overwritten after every install/update
4
5# Redirect
6include virtualbox.profile
diff --git a/etc/profile-m-z/XMind.profile b/etc/profile-m-z/XMind.profile
new file mode 100644
index 000000000..7e7c0c3cd
--- /dev/null
+++ b/etc/profile-m-z/XMind.profile
@@ -0,0 +1,38 @@
1# Firejail profile for XMind
2# This file is overwritten after every install/update
3# Persistent local customizations
4include XMind.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.xmind
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17mkdir ${HOME}/.xmind
18whitelist ${HOME}/.xmind
19whitelist ${DOWNLOADS}
20include whitelist-common.inc
21
22caps.drop all
23netfilter
24nodvd
25nogroups
26nonewprivs
27noroot
28notv
29nou2f
30protocol unix,inet,inet6
31seccomp
32shell none
33
34disable-mnt
35private-bin cp,sh,XMind
36private-tmp
37private-dev
38
diff --git a/etc/profile-m-z/Xephyr.profile b/etc/profile-m-z/Xephyr.profile
new file mode 100644
index 000000000..ab5fdf942
--- /dev/null
+++ b/etc/profile-m-z/Xephyr.profile
@@ -0,0 +1,42 @@
1# Firejail profile for Xephyr
2# This file is overwritten after every install/update
3# Persistent local customizations
4quiet
5include Xephyr.local
6# Persistent global definitions
7include globals.local
8
9#
10# This profile will sandbox Xephyr server itself when used with firejail --x11=xephyr.
11# To enable it, create a firejail-Xephyr symlink in /usr/local/bin:
12#
13# $ sudo ln -s /usr/bin/firejail /usr/local/bin/Xephyr
14#
15# or run "sudo firecfg"
16#
17
18whitelist /var/lib/xkb
19include whitelist-common.inc
20
21caps.drop all
22# Xephyr needs to be allowed access to the abstract Unix socket namespace.
23nodvd
24nogroups
25nonewprivs
26# In noroot mode, Xephyr cannot create a socket in the real /tmp/.X11-unix.
27# noroot
28nosound
29notv
30nou2f
31protocol unix
32seccomp
33shell none
34
35disable-mnt
36# using a private home directory
37private
38# private-bin sh,Xephyr,xkbcomp
39# private-bin bash,cat,ls,sh,strace,Xephyr,xkbcomp
40private-dev
41# private-etc alternatives,gai.conf,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,nsswitch.conf,resolv.conf
42#private-tmp
diff --git a/etc/profile-m-z/Xvfb.profile b/etc/profile-m-z/Xvfb.profile
new file mode 100644
index 000000000..937d02d60
--- /dev/null
+++ b/etc/profile-m-z/Xvfb.profile
@@ -0,0 +1,46 @@
1# Firejail profile for Xvfb
2# Description: Virtual Framebuffer 'fake' X server
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include Xvfb.local
7# Persistent global definitions
8include globals.local
9
10#
11# This profile will sandbox Xvfb server itself when used with firejail --x11=xvfb.
12# The target program is sandboxed with its own profile. By default the this functionality
13# is disabled. To enable it, create a firejail-Xvfb symlink in /usr/local/bin:
14#
15# $ sudo ln -s /usr/bin/firejail /usr/local/bin/Xvfb
16#
17# We have this functionality disabled by default because it creates problems on
18# some Linux distributions. Also, older versions of Xpra use Xvfb.
19#
20
21whitelist /var/lib/xkb
22include whitelist-common.inc
23
24caps.drop all
25# Xvfb needs to be allowed access to the abstract Unix socket namespace.
26nodvd
27nogroups
28nonewprivs
29# In noroot mode, Xvfb cannot create a socket in the real /tmp/.X11-unix.
30#noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38
39disable-mnt
40# using a private home directory
41private
42# private-bin sh,xkbcomp,Xvfb
43# private-bin bash,cat,ls,sh,strace,xkbcomp,Xvfb
44private-dev
45private-etc alternatives,gai.conf,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,nsswitch.conf,resolv.conf
46private-tmp
diff --git a/etc/profile-m-z/macrofusion.profile b/etc/profile-m-z/macrofusion.profile
new file mode 100644
index 000000000..3eef22f98
--- /dev/null
+++ b/etc/profile-m-z/macrofusion.profile
@@ -0,0 +1,44 @@
1# Firejail profile for macrofusion
2# This file is overwritten after every install/update
3# Persistent local customizations
4include macrofusion.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/mfusion
9noblacklist ${PICTURES}
10
11# Allow python (blacklisted by disable-interpreters.inc)
12include allow-python2.inc
13include allow-python3.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23caps.drop all
24ipc-namespace
25net none
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37
38private-bin align_image_stack,enfuse,env,exiftool,macrofusion,python*
39private-cache
40private-dev
41private-tmp
42
43dbus-user none
44dbus-system none
diff --git a/etc/profile-m-z/magicor.profile b/etc/profile-m-z/magicor.profile
new file mode 100644
index 000000000..380a59957
--- /dev/null
+++ b/etc/profile-m-z/magicor.profile
@@ -0,0 +1,51 @@
1# Firejail profile for magicor
2# Description: Push ice blocks around to extinguish all fires
3# This file is overwritten after every install/update
4# Persistent local customizations
5include magicor.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.magicor
10
11# Allow python (blacklisted by disable-interpreters.inc)
12include allow-python2.inc
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22mkdir ${HOME}/.magicor
23whitelist ${HOME}/.magicor
24whitelist /usr/share/magicor
25include whitelist-common.inc
26include whitelist-usr-share-common.inc
27include whitelist-var-common.inc
28
29apparmor
30caps.drop all
31net none
32nodvd
33nogroups
34nonewprivs
35notv
36nou2f
37novideo
38protocol unix
39seccomp
40shell none
41tracelog
42
43disable-mnt
44private-bin magicor,python2*
45private-cache
46private-dev
47private-etc machine-id
48private-tmp
49
50dbus-user none
51dbus-system none
diff --git a/etc/profile-m-z/makepkg.profile b/etc/profile-m-z/makepkg.profile
new file mode 100644
index 000000000..513fcae55
--- /dev/null
+++ b/etc/profile-m-z/makepkg.profile
@@ -0,0 +1,61 @@
1# Firejail profile for makepkg
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include makepkg.local
6# Persistent global definitions
7include globals.local
8
9blacklist /tmp/.X11-unix
10blacklist ${RUNUSER}/wayland-*
11
12# Note: see this Arch forum discussion https://bbs.archlinux.org/viewtopic.php?pid=1743138
13# for potential issues and their solutions when Firejailing makepkg
14
15# This profile could be significantly strengthened by adding the following to makepkg.local
16# whitelist ${HOME}/<Your Build Folder>
17# whitelist ${HOME}/.gnupg
18
19# Enable severely restricted access to ${HOME}/.gnupg
20noblacklist ${HOME}/.gnupg
21read-only ${HOME}/.gnupg/gpg.conf
22read-only ${HOME}/.gnupg/trustdb.gpg
23read-only ${HOME}/.gnupg/pubring.kbx
24blacklist ${HOME}/.gnupg/random_seed
25blacklist ${HOME}/.gnupg/pubring.kbx~
26blacklist ${HOME}/.gnupg/private-keys-v1.d
27blacklist ${HOME}/.gnupg/crls.d
28blacklist ${HOME}/.gnupg/openpgp-revocs.d
29
30# Arch Linux (based distributions) need access to /var/lib/pacman. As we drop all capabilities this is automatically read-only.
31noblacklist /var/lib/pacman
32
33include disable-common.inc
34include disable-exec.inc
35include disable-passwdmgr.inc
36include disable-programs.inc
37
38caps.drop all
39machine-id
40ipc-namespace
41netfilter
42no3d
43nodvd
44nogroups
45nonewprivs
46# noroot is only disabled to allow the creation of kernel headers from an official PKGBUILD.
47#noroot
48nosound
49nou2f
50notv
51novideo
52protocol unix,inet,inet6
53seccomp
54shell none
55tracelog
56
57disable-mnt
58private-cache
59private-tmp
60
61memory-deny-write-execute
diff --git a/etc/profile-m-z/manaplus.profile b/etc/profile-m-z/manaplus.profile
new file mode 100644
index 000000000..b29a489a6
--- /dev/null
+++ b/etc/profile-m-z/manaplus.profile
@@ -0,0 +1,50 @@
1# Firejail profile for manaplus
2# Description: 2D MMORPG client for Evol Online and The Mana World
3# This file is overwritten after every install/update
4# Persistent local customizations
5include manaplus.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/mana
10noblacklist ${HOME}/.local/share/mana
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20mkdir ${HOME}/.config/mana
21mkdir ${HOME}/.config/mana/mana
22mkdir ${HOME}/.local/share/mana
23whitelist ${HOME}/.config/mana
24whitelist ${HOME}/.local/share/mana
25include whitelist-common.inc
26include whitelist-var-common.inc
27
28caps.drop all
29ipc-namespace
30netfilter
31nodvd
32nogroups
33nonewprivs
34noroot
35notv
36nou2f
37novideo
38protocol unix,inet,inet6
39seccomp
40shell none
41tracelog
42
43disable-mnt
44private-bin manaplus
45private-cache
46private-dev
47private-tmp
48
49dbus-user none
50dbus-system none
diff --git a/etc/profile-m-z/masterpdfeditor.profile b/etc/profile-m-z/masterpdfeditor.profile
new file mode 100644
index 000000000..e4da0c66a
--- /dev/null
+++ b/etc/profile-m-z/masterpdfeditor.profile
@@ -0,0 +1,41 @@
1# Firejail profile for masterpdfeditor
2# Description: A complete solution for creating and editing PDF files
3# This file is overwritten after every install/update
4# Persistent local customizations
5include masterpdfeditor.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Code Industry
10noblacklist ${HOME}/.masterpdfeditor
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19include whitelist-var-common.inc
20
21apparmor
22caps.drop all
23machine-id
24nodvd
25nogroups
26nonewprivs
27noroot
28nosound
29notv
30nou2f
31novideo
32protocol unix
33seccomp
34shell none
35tracelog
36
37private-cache
38private-dev
39private-etc alternatives,fonts
40private-tmp
41
diff --git a/etc/profile-m-z/masterpdfeditor4.profile b/etc/profile-m-z/masterpdfeditor4.profile
new file mode 100644
index 000000000..84e78171f
--- /dev/null
+++ b/etc/profile-m-z/masterpdfeditor4.profile
@@ -0,0 +1,11 @@
1# Firejail profile for masterpdfeditor4
2# Description: A complete solution for creating and editing PDF files
3# This file is overwritten after every install/update
4# Persistent local customizations
5include masterpdfeditor4.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include masterpdfeditor.profile
diff --git a/etc/profile-m-z/masterpdfeditor5.profile b/etc/profile-m-z/masterpdfeditor5.profile
new file mode 100644
index 000000000..057d343dd
--- /dev/null
+++ b/etc/profile-m-z/masterpdfeditor5.profile
@@ -0,0 +1,11 @@
1# Firejail profile for masterpdfeditor5
2# Description: A complete solution for creating and editing PDF files
3# This file is overwritten after every install/update
4# Persistent local customizations
5include masterpdfeditor5.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include masterpdfeditor.profile
diff --git a/etc/profile-m-z/mate-calc.profile b/etc/profile-m-z/mate-calc.profile
new file mode 100644
index 000000000..ce418d68f
--- /dev/null
+++ b/etc/profile-m-z/mate-calc.profile
@@ -0,0 +1,53 @@
1# Firejail profile for mate-calc
2# Description: MATE desktop calculator
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mate-calc.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/mate-calc
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.cache/mate-calc
19mkdir ${HOME}/.config/caja
20mkdir ${HOME}/.config/mate-menu
21whitelist ${HOME}/.cache/mate-calc
22whitelist ${HOME}/.config/caja
23whitelist ${HOME}/.config/mate-menu
24include whitelist-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29net none
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix
40seccomp
41shell none
42
43disable-mnt
44private-bin mate-calc,mate-calculator
45private-etc alternatives,dconf,fonts,gtk-3.0
46private-dev
47private-opt none
48private-tmp
49
50dbus-user none
51dbus-system none
52
53memory-deny-write-execute
diff --git a/etc/profile-m-z/mate-calculator.profile b/etc/profile-m-z/mate-calculator.profile
new file mode 100644
index 000000000..bb438f5f0
--- /dev/null
+++ b/etc/profile-m-z/mate-calculator.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for mate-calc
2# This file is overwritten after every install/update
3
4# Redirect
5include mate-calc.profile
diff --git a/etc/profile-m-z/mate-color-select.profile b/etc/profile-m-z/mate-color-select.profile
new file mode 100644
index 000000000..f1a7ca18f
--- /dev/null
+++ b/etc/profile-m-z/mate-color-select.profile
@@ -0,0 +1,39 @@
1# Firejail profile for mate-color-select
2# This file is overwritten after every install/update
3# Persistent local customizations
4include mate-color-select.local
5# Persistent global definitions
6include globals.local
7
8include disable-common.inc
9include disable-devel.inc
10include disable-exec.inc
11include disable-interpreters.inc
12include disable-passwdmgr.inc
13include disable-programs.inc
14
15include whitelist-common.inc
16
17caps.drop all
18netfilter
19no3d
20nodvd
21nogroups
22nonewprivs
23noroot
24nosound
25notv
26nou2f
27novideo
28protocol unix
29seccomp
30shell none
31
32disable-mnt
33private-bin mate-color-select
34private-etc alternatives,fonts
35private-dev
36private-lib
37private-tmp
38
39memory-deny-write-execute
diff --git a/etc/profile-m-z/mate-dictionary.profile b/etc/profile-m-z/mate-dictionary.profile
new file mode 100644
index 000000000..59f439c91
--- /dev/null
+++ b/etc/profile-m-z/mate-dictionary.profile
@@ -0,0 +1,44 @@
1# Firejail profile for mate-dictionary
2# This file is overwritten after every install/update
3# Persistent local customizations
4include mate-dictionary.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/mate/mate-dictionary
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17mkdir ${HOME}/.config/mate/mate-dictionary
18whitelist ${HOME}/.config/mate/mate-dictionary
19include whitelist-common.inc
20
21apparmor
22caps.drop all
23netfilter
24no3d
25nodvd
26nogroups
27nonewprivs
28noroot
29nosound
30notv
31nou2f
32novideo
33protocol unix,inet,inet6
34seccomp
35shell none
36
37disable-mnt
38private-bin mate-dictionary
39private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,resolv.conf,ssl
40private-opt mate-dictionary
41private-dev
42private-tmp
43
44memory-deny-write-execute
diff --git a/etc/profile-m-z/mathematica.profile b/etc/profile-m-z/mathematica.profile
new file mode 100644
index 000000000..964060350
--- /dev/null
+++ b/etc/profile-m-z/mathematica.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for Mathematica
2# This file is overwritten after every install/update
3
4# Redirect
5include Mathematica.profile
diff --git a/etc/profile-m-z/mcabber.profile b/etc/profile-m-z/mcabber.profile
new file mode 100644
index 000000000..134a6ae63
--- /dev/null
+++ b/etc/profile-m-z/mcabber.profile
@@ -0,0 +1,33 @@
1# Firejail profile for mcabber
2# Description: Small Jabber (XMPP) console client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mcabber.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.mcabber
10noblacklist ${HOME}/.mcabberrc
11
12include disable-common.inc
13include disable-devel.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18caps.drop all
19netfilter
20nodvd
21nonewprivs
22noroot
23nosound
24notv
25nou2f
26novideo
27protocol inet,inet6
28seccomp
29shell none
30
31private-bin mcabber
32private-dev
33private-etc alternatives,ca-certificates,crypto-policies,pki,ssl
diff --git a/etc/profile-m-z/mediainfo.profile b/etc/profile-m-z/mediainfo.profile
new file mode 100644
index 000000000..c62d3f6d5
--- /dev/null
+++ b/etc/profile-m-z/mediainfo.profile
@@ -0,0 +1,50 @@
1# Firejail profile for mediainfo
2# Description: Command-line utility for reading information from audio/video files
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mediainfo.local
6# Persistent global definitions
7include globals.local
8
9blacklist ${RUNUSER}/wayland-*
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18include whitelist-usr-share-common.inc
19include whitelist-var-common.inc
20
21apparmor
22caps.drop all
23ipc-namespace
24machine-id
25net none
26no3d
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38tracelog
39x11 none
40
41private-bin mediainfo
42private-cache
43private-dev
44private-etc alternatives
45private-tmp
46
47dbus-user none
48dbus-system none
49
50memory-deny-write-execute
diff --git a/etc/profile-m-z/mediathekview.profile b/etc/profile-m-z/mediathekview.profile
new file mode 100644
index 000000000..95cd673c6
--- /dev/null
+++ b/etc/profile-m-z/mediathekview.profile
@@ -0,0 +1,49 @@
1# Firejail profile for mediathekview
2# Description: View streams from German public television stations
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mediathekview.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/mpv
10noblacklist ${HOME}/.config/smplayer
11noblacklist ${HOME}/.config/totem
12noblacklist ${HOME}/.config/vlc
13noblacklist ${HOME}/.config/xplayer
14noblacklist ${HOME}/.local/share/totem
15noblacklist ${HOME}/.local/share/xplayer
16noblacklist ${HOME}/.mediathek3
17noblacklist ${HOME}/.mplayer
18noblacklist ${VIDEOS}
19
20# Allow java (blacklisted by disable-devel.inc)
21include allow-java.inc
22
23include disable-common.inc
24include disable-devel.inc
25include disable-exec.inc
26include disable-interpreters.inc
27include disable-passwdmgr.inc
28include disable-programs.inc
29include disable-xdg.inc
30
31include whitelist-var-common.inc
32
33caps.drop all
34netfilter
35nodvd
36nogroups
37nonewprivs
38noroot
39notv
40nou2f
41novideo
42protocol unix,inet,inet6
43seccomp
44tracelog
45
46private-cache
47private-dev
48private-tmp
49
diff --git a/etc/profile-m-z/megaglest.profile b/etc/profile-m-z/megaglest.profile
new file mode 100644
index 000000000..86e7f129e
--- /dev/null
+++ b/etc/profile-m-z/megaglest.profile
@@ -0,0 +1,46 @@
1# Firejail profile for megaglest
2# Description: 3D multi-player real time strategy game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include megaglest.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.megaglest
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.megaglest
20whitelist ${HOME}/.megaglest
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24caps.drop all
25ipc-namespace
26netfilter
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix,inet,inet6,netlink
35seccomp
36shell none
37tracelog
38
39disable-mnt
40private-bin megaglest,megaglest_editor,megaglest_g3dviewer
41private-cache
42private-dev
43private-tmp
44
45dbus-user none
46dbus-system none
diff --git a/etc/profile-m-z/megaglest_editor.profile b/etc/profile-m-z/megaglest_editor.profile
new file mode 100644
index 000000000..02aad8084
--- /dev/null
+++ b/etc/profile-m-z/megaglest_editor.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for megaglest
2# This file is overwritten after every install/update
3
4# Redirect
5include megaglest.profile
diff --git a/etc/profile-m-z/meld.profile b/etc/profile-m-z/meld.profile
new file mode 100644
index 000000000..be13e9643
--- /dev/null
+++ b/etc/profile-m-z/meld.profile
@@ -0,0 +1,74 @@
1# Firejail profile for meld
2# Description: Graphical tool to diff and merge files
3# This file is overwritten after every install/update
4# Persistent local customizations
5include meld.local
6# Persistent global definitions
7include globals.local
8
9# If you want to use meld as git-mergetool (and maybe some other VCS integrations) you need
10# to bypass firejail, you can do this by removing the symlink or calling it by its absolute path
11# Removing the symlink:
12# sudo rm /usr/local/bin/meld
13# Calling by its absolute path (example for git-mergetool):
14# git config --global mergetool.meld.cmd /usr/bin/meld
15
16noblacklist ${HOME}/.config/meld
17noblacklist ${HOME}/.config/git
18noblacklist ${HOME}/.gitconfig
19noblacklist ${HOME}/.git-credentials
20noblacklist ${HOME}/.local/share/meld
21noblacklist ${HOME}/.ssh
22noblacklist ${HOME}/.subversion
23
24# Allow python (blacklisted by disable-interpreters.inc)
25include allow-python3.inc
26
27# Python 2 is EOL (see #3164). Uncomment the next line (or put it into your meld.local) if you understand the risks but want python 2 support for older meld versions.
28#include allow-python2.inc
29
30# Uncomment the next line (or put it into your meld.local) if you don't need to compare files in disable-common.inc.
31#include disable-common.inc
32include disable-devel.inc
33include disable-exec.inc
34include disable-interpreters.inc
35include disable-passwdmgr.inc
36# Uncomment the next line (or put it into your meld.local) if you don't need to compare files in disable-programs.inc.
37#include disable-programs.inc
38
39include whitelist-runuser-common.inc
40
41# Uncomment the next lines (or put it into your meld.local) if you don't need to compare files in /usr/share.
42#whitelist /usr/share/meld
43#include whitelist-usr-share-common.inc
44
45# Uncomment the next line (or put it into your meld.local) if you don't need to compare files in /var.
46#include whitelist-var-common.inc
47
48apparmor
49caps.drop all
50ipc-namespace
51machine-id
52netfilter
53no3d
54nodvd
55nogroups
56nonewprivs
57noroot
58nosound
59notv
60nou2f
61novideo
62protocol unix,inet,inet6
63seccomp
64shell none
65tracelog
66
67private-bin bzr,cvs,git,hg,meld,python*,svn
68private-cache
69private-dev
70# Uncomment the next line (or put it into your meld.local) if you don't need to compare in /etc.
71#private-etc alternatives,ca-certificates,crypto-policies,fonts,hostname,hosts,pki,resolv.conf,ssl,subversion
72private-tmp
73
74read-only ${HOME}/.ssh
diff --git a/etc/profile-m-z/mencoder.profile b/etc/profile-m-z/mencoder.profile
new file mode 100644
index 000000000..caf238785
--- /dev/null
+++ b/etc/profile-m-z/mencoder.profile
@@ -0,0 +1,35 @@
1# Firejail profile for mencoder
2# Description: Free command line video decoding, encoding and filtering tool
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mencoder.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# added by included profile
11#include disable-common.inc
12#include disable-devel.inc
13#include disable-interpreters.inc
14#include disable-passwdmgr.inc
15#include disable-programs.inc
16
17ipc-namespace
18machine-id
19net none
20no3d
21nosound
22notv
23protocol unix
24tracelog
25x11 none
26
27private-bin mencoder
28
29dbus-user none
30dbus-system none
31
32memory-deny-write-execute
33
34# Redirect
35include mplayer.profile
diff --git a/etc/profile-m-z/mendeleydesktop.profile b/etc/profile-m-z/mendeleydesktop.profile
new file mode 100644
index 000000000..6022b110a
--- /dev/null
+++ b/etc/profile-m-z/mendeleydesktop.profile
@@ -0,0 +1,50 @@
1# Firejail profile for Mendeley
2# Description: Academic software for managing and sharing research papers.
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mendeleydesktop.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${DOCUMENTS}
10noblacklist ${HOME}/.cache/Mendeley Ltd.
11noblacklist ${HOME}/.config/Mendeley Ltd.
12noblacklist ${HOME}/.local/share/Mendeley Ltd.
13noblacklist ${HOME}/.local/share/data/Mendeley Ltd.
14noblacklist ${HOME}/.pki
15noblacklist ${HOME}/.local/share/pki
16
17# Allow python (blacklisted by disable-interpreters.inc)
18include allow-python2.inc
19include allow-python3.inc
20
21include disable-common.inc
22include disable-devel.inc
23include disable-exec.inc
24include disable-interpreters.inc
25include disable-passwdmgr.inc
26include disable-programs.inc
27
28include whitelist-var-common.inc
29
30caps.drop all
31netfilter
32nodvd
33nogroups
34nonewprivs
35noroot
36notv
37nou2f
38novideo
39protocol unix,inet,inet6,netlink
40seccomp
41shell none
42tracelog
43
44disable-mnt
45private-bin cat,env,gconftool-2,ln,mendeleydesktop,python*,sh,update-desktop-database,which
46private-dev
47private-tmp
48
49dbus-user none
50dbus-system none
diff --git a/etc/profile-m-z/meteo-qt.profile b/etc/profile-m-z/meteo-qt.profile
new file mode 100644
index 000000000..f9466eb61
--- /dev/null
+++ b/etc/profile-m-z/meteo-qt.profile
@@ -0,0 +1,53 @@
1# Firejail profile for meteo-qt
2# Description: System tray application for weather status information
3# This file is overwritten after every install/update
4# Persistent local customizations
5include meteo-qt.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/autostart
10noblacklist ${HOME}/.config/meteo-qt
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python3.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23mkdir ${HOME}/.config/meteo-qt
24whitelist ${HOME}/.config/autostart
25whitelist ${HOME}/.config/meteo-qt
26include whitelist-common.inc
27include whitelist-var-common.inc
28
29caps.drop all
30netfilter
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix,inet,inet6
40seccomp
41shell none
42tracelog
43
44disable-mnt
45private-bin meteo-qt,python*
46private-cache
47private-dev
48private-tmp
49
50dbus-user none
51dbus-system none
52
53memory-deny-write-execute
diff --git a/etc/profile-m-z/midori.profile b/etc/profile-m-z/midori.profile
new file mode 100644
index 000000000..e15259608
--- /dev/null
+++ b/etc/profile-m-z/midori.profile
@@ -0,0 +1,65 @@
1# Firejail profile for midori
2# Description: Lightweight web browser
3# This file is overwritten after every install/update
4# Persistent local customizations
5include midori.local
6# Persistent global definitions
7include globals.local
8
9# noexec ${HOME} breaks DRM binaries.
10?BROWSER_ALLOW_DRM: ignore noexec ${HOME}
11
12noblacklist ${HOME}/.cache/midori
13noblacklist ${HOME}/.config/midori
14noblacklist ${HOME}/.local/share/midori
15# noblacklist ${HOME}/.local/share/webkit
16# noblacklist ${HOME}/.local/share/webkitgtk
17noblacklist ${HOME}/.pki
18noblacklist ${HOME}/.local/share/pki
19
20noblacklist ${HOME}/.cache/gnome-mplayer
21noblacklist ${HOME}/.config/gnome-mplayer
22noblacklist ${HOME}/.lastpass
23
24include disable-common.inc
25include disable-devel.inc
26include disable-exec.inc
27include disable-interpreters.inc
28#include disable-passwdmgr.inc
29include disable-programs.inc
30include disable-xdg.inc
31
32mkdir ${HOME}/.cache/midori
33mkdir ${HOME}/.config/midori
34mkdir ${HOME}/.local/share/midori
35mkdir ${HOME}/.local/share/webkit
36mkdir ${HOME}/.local/share/webkitgtk
37mkdir ${HOME}/.pki
38mkdir ${HOME}/.local/share/pki
39whitelist ${DOWNLOADS}
40whitelist ${HOME}/.cache/gnome-mplayer/plugin
41whitelist ${HOME}/.cache/midori
42whitelist ${HOME}/.config/gnome-mplayer
43whitelist ${HOME}/.config/midori
44whitelist ${HOME}/.lastpass
45whitelist ${HOME}/.local/share/midori
46whitelist ${HOME}/.local/share/webkit
47whitelist ${HOME}/.local/share/webkitgtk
48whitelist ${HOME}/.pki
49whitelist ${HOME}/.local/share/pki
50include whitelist-common.inc
51include whitelist-var-common.inc
52
53apparmor
54caps.drop all
55netfilter
56nodvd
57nonewprivs
58# noroot - problems on Ubuntu 14.04
59notv
60protocol unix,inet,inet6,netlink
61seccomp
62tracelog
63
64disable-mnt
65private-tmp
diff --git a/etc/profile-m-z/min.profile b/etc/profile-m-z/min.profile
new file mode 100644
index 000000000..7f3aeab44
--- /dev/null
+++ b/etc/profile-m-z/min.profile
@@ -0,0 +1,15 @@
1# Firejail profile for min
2# Description: A faster, smarter web browser.
3# This file is overwritten after every install/update
4# Persistent local customizations
5include min.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Min
10
11mkdir ${HOME}/.config/Min
12whitelist ${HOME}/.config/Min
13
14# Redirect
15include chromium-common.profile
diff --git a/etc/profile-m-z/mindless.profile b/etc/profile-m-z/mindless.profile
new file mode 100644
index 000000000..e6ea54522
--- /dev/null
+++ b/etc/profile-m-z/mindless.profile
@@ -0,0 +1,50 @@
1# Firejail profile for mindless
2# Description: figure out the secret code
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mindless.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17whitelist /usr/share/mindless
18include whitelist-usr-share-common.inc
19include whitelist-var-common.inc
20
21apparmor
22caps.drop all
23machine-id
24net none
25no3d
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37tracelog
38
39disable-mnt
40private
41private-bin mindless
42private-cache
43private-dev
44private-etc fonts
45private-tmp
46
47dbus-user none
48dbus-system none
49
50memory-deny-write-execute
diff --git a/etc/profile-m-z/minetest.profile b/etc/profile-m-z/minetest.profile
new file mode 100644
index 000000000..619173024
--- /dev/null
+++ b/etc/profile-m-z/minetest.profile
@@ -0,0 +1,51 @@
1# Firejail profile for minetest
2# Description: Multiplayer infinite-world block sandbox
3# This file is overwritten after every install/update
4# Persistent local customizations
5include minetest.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/minetest
10noblacklist ${HOME}/.minetest
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20mkdir ${HOME}/.cache/minetest
21mkdir ${HOME}/.minetest
22whitelist ${HOME}/.cache/minetest
23whitelist ${HOME}/.minetest
24include whitelist-common.inc
25include whitelist-var-common.inc
26
27caps.drop all
28ipc-namespace
29netfilter
30nodvd
31nogroups
32nonewprivs
33noroot
34notv
35nou2f
36novideo
37protocol unix,inet,inet6
38seccomp
39shell none
40tracelog
41
42disable-mnt
43private-bin minetest
44private-cache
45private-dev
46# private-etc needs to be updated, see #1702
47#private-etc alternatives,asound.conf,ca-certificates,crypto-policies,drirc,fonts,group,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,localtime,machine-id,nsswitch.conf,passwd,pki,pulse,resolv.conf,ssl
48private-tmp
49
50dbus-user none
51dbus-system none
diff --git a/etc/profile-m-z/mirrormagic.profile b/etc/profile-m-z/mirrormagic.profile
new file mode 100644
index 000000000..ef0748436
--- /dev/null
+++ b/etc/profile-m-z/mirrormagic.profile
@@ -0,0 +1,50 @@
1# Firejail profile for mirrormagic
2# Description: Puzzle game where you steer a beam of light using mirrors
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mirrormagic.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.mirrormagic
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.mirrormagic
20whitelist ${HOME}/.mirrormagic
21whitelist /usr/share/mirrormagic
22include whitelist-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28net none
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol unix,netlink
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private
43private-bin mirrormagic
44private-cache
45private-dev
46private-etc machine-id
47private-tmp
48
49dbus-user none
50dbus-system none
diff --git a/etc/profile-m-z/mousepad.profile b/etc/profile-m-z/mousepad.profile
new file mode 100644
index 000000000..868313c40
--- /dev/null
+++ b/etc/profile-m-z/mousepad.profile
@@ -0,0 +1,39 @@
1# Firejail profile for mousepad
2# Description: Simple Xfce oriented text editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mousepad.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Mousepad
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18include whitelist-var-common.inc
19
20apparmor
21caps.drop all
22net none
23nodvd
24nogroups
25nonewprivs
26noroot
27nosound
28notv
29nou2f
30novideo
31protocol unix
32seccomp
33shell none
34tracelog
35
36private-bin mousepad
37private-dev
38private-lib
39private-tmp
diff --git a/etc/profile-m-z/mp3splt-gtk.profile b/etc/profile-m-z/mp3splt-gtk.profile
new file mode 100644
index 000000000..bf6077395
--- /dev/null
+++ b/etc/profile-m-z/mp3splt-gtk.profile
@@ -0,0 +1,43 @@
1# Firejail profile for mp3splt-gtk
2# Description: Gtk utility for mp3/ogg splitting without decoding
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mp3splt-gtk.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.mp3splt-gtk
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18include whitelist-var-common.inc
19
20apparmor
21caps.drop all
22net none
23no3d
24nodvd
25nogroups
26nonewprivs
27noroot
28notv
29nou2f
30novideo
31protocol unix
32seccomp
33shell none
34tracelog
35
36private-bin mp3splt-gtk
37private-cache
38private-dev
39private-etc alsa,alternatives,asound.conf,dconf,fonts,gtk-3.0,machine-id,openal,pulse
40private-tmp
41
42dbus-user none
43dbus-system none
diff --git a/etc/profile-m-z/mp3splt.profile b/etc/profile-m-z/mp3splt.profile
new file mode 100644
index 000000000..c65754a03
--- /dev/null
+++ b/etc/profile-m-z/mp3splt.profile
@@ -0,0 +1,53 @@
1# Firejail profile for mp3splt
2# Description: utility for mp3 splitting without decoding
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mp3splt.local
6# Persistent global definitions
7include globals.local
8
9blacklist ${RUNUSER}/wayland-*
10
11noblacklist ${MUSIC}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25ipc-namespace
26machine-id
27net none
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40tracelog
41x11 none
42
43disable-mnt
44private-bin flacsplt,mp3splt,mp3wrap,oggsplt
45private-cache
46private-dev
47private-etc alternatives
48private-tmp
49
50memory-deny-write-execute
51
52dbus-user none
53dbus-system none
diff --git a/etc/profile-m-z/mp3wrap.profile b/etc/profile-m-z/mp3wrap.profile
new file mode 100644
index 000000000..9e48f7807
--- /dev/null
+++ b/etc/profile-m-z/mp3wrap.profile
@@ -0,0 +1,9 @@
1# Firejail profile for mp3wrap
2# This file is overwritten after every install/update
3include mp3wrap.local
4# Persistent global definitions
5# added by included profile
6#include globals.local
7
8# Redirect
9include mp3splt.profile
diff --git a/etc/profile-m-z/mpDris2.profile b/etc/profile-m-z/mpDris2.profile
new file mode 100644
index 000000000..fd0351db0
--- /dev/null
+++ b/etc/profile-m-z/mpDris2.profile
@@ -0,0 +1,57 @@
1# Firejail profile for mpDris2
2# Description: MPRIS2 support for MPD
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mpDris2.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/mpDris2
10
11# Allow python (blacklisted by disable-interpreters.inc)
12include allow-python2.inc
13include allow-python3.inc
14
15noblacklist ${MUSIC}
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25whitelist ${MUSIC}
26
27mkdir ${HOME}/.config/mpDris2
28whitelist ${HOME}/.config/mpDris2
29include whitelist-usr-share-common.inc
30include whitelist-var-common.inc
31
32caps.drop all
33machine-id
34netfilter
35no3d
36nodvd
37nogroups
38nonewprivs
39noroot
40nosound
41notv
42nou2f
43novideo
44protocol unix,inet,inet6
45seccomp
46shell none
47
48private-bin mpDris2,notify-send,python*
49private-cache
50private-dev
51private-etc alternatives,hosts,nsswitch.conf
52private-lib libdbus-1.so.*,libdbus-glib-1.so.*,libgirepository-1.0.so.*,libnotify.so.*,libpython*,python2*,python3*
53private-tmp
54
55#memory-deny-write-execute - breaks on Arch (see issue #1803)
56
57read-only ${HOME}
diff --git a/etc/profile-m-z/mpd.profile b/etc/profile-m-z/mpd.profile
new file mode 100644
index 000000000..3fda87a48
--- /dev/null
+++ b/etc/profile-m-z/mpd.profile
@@ -0,0 +1,44 @@
1# Firejail profile for mpd
2# Description: Music Player Daemon
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mpd.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/mpd
10noblacklist ${HOME}/.mpd
11noblacklist ${HOME}/.mpdconf
12noblacklist ${MUSIC}
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24
25caps.drop all
26netfilter
27no3d
28nodvd
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix,inet,inet6
35# blacklisting of ioprio_set system calls breaks auto-updating of
36# MPD's database when files in music_directory are changed
37seccomp !ioprio_set
38shell none
39
40#private-bin bash,mpd
41private-cache
42private-dev
43private-tmp
44
diff --git a/etc/profile-m-z/mpg123-alsa.profile b/etc/profile-m-z/mpg123-alsa.profile
new file mode 100644
index 000000000..378435af1
--- /dev/null
+++ b/etc/profile-m-z/mpg123-alsa.profile
@@ -0,0 +1,9 @@
1# Firejail profile for mpg123-alsa
2# Persistent local customizations
3include mpg123-alsa.local
4# Persistent global definitions
5# added by included profile
6#include globals.local
7
8# Redirect
9include mpg123.profile
diff --git a/etc/profile-m-z/mpg123-id3dump.profile b/etc/profile-m-z/mpg123-id3dump.profile
new file mode 100644
index 000000000..370a57b3c
--- /dev/null
+++ b/etc/profile-m-z/mpg123-id3dump.profile
@@ -0,0 +1,12 @@
1# Firejail profile for mpg123-id3dump
2# Persistent local customizations
3include mpg123-id3dump.local
4# Persistent global definitions
5# added by included profile
6#include globals.local
7
8machine-id
9nosound
10
11# Redirect
12include mpg123.profile
diff --git a/etc/profile-m-z/mpg123-jack.profile b/etc/profile-m-z/mpg123-jack.profile
new file mode 100644
index 000000000..e36a2e5b3
--- /dev/null
+++ b/etc/profile-m-z/mpg123-jack.profile
@@ -0,0 +1,9 @@
1# Firejail profile for mpg123-jack
2# Persistent local customizations
3include mpg123-jack.local
4# Persistent global definitions
5# added by included profile
6#include globals.local
7
8# Redirect
9include mpg123.profile
diff --git a/etc/profile-m-z/mpg123-nas.profile b/etc/profile-m-z/mpg123-nas.profile
new file mode 100644
index 000000000..cdbf0b1d2
--- /dev/null
+++ b/etc/profile-m-z/mpg123-nas.profile
@@ -0,0 +1,9 @@
1# Firejail profile for mpg123-nas
2# Persistent local customizations
3include mpg123-nas.local
4# Persistent global definitions
5# added by included profile
6#include globals.local
7
8# Redirect
9include mpg123.profile
diff --git a/etc/profile-m-z/mpg123-openal.profile b/etc/profile-m-z/mpg123-openal.profile
new file mode 100644
index 000000000..e5585feaa
--- /dev/null
+++ b/etc/profile-m-z/mpg123-openal.profile
@@ -0,0 +1,9 @@
1# Firejail profile for mpg123-openal
2# Persistent local customizations
3include mpg123-openal.local
4# Persistent global definitions
5# added by included profile
6#include globals.local
7
8# Redirect
9include mpg123.profile
diff --git a/etc/profile-m-z/mpg123-oss.profile b/etc/profile-m-z/mpg123-oss.profile
new file mode 100644
index 000000000..dcb92ecd6
--- /dev/null
+++ b/etc/profile-m-z/mpg123-oss.profile
@@ -0,0 +1,9 @@
1# Firejail profile for mpg123-oss
2# Persistent local customizations
3include mpg123-oss.local
4# Persistent global definitions
5# added by included profile
6#include globals.local
7
8# Redirect
9include mpg123.profile
diff --git a/etc/profile-m-z/mpg123-portaudio.profile b/etc/profile-m-z/mpg123-portaudio.profile
new file mode 100644
index 000000000..319843504
--- /dev/null
+++ b/etc/profile-m-z/mpg123-portaudio.profile
@@ -0,0 +1,9 @@
1# Firejail profile for mpg123-portaudio
2# Persistent local customizations
3include mpg123-portaudio.local
4# Persistent global definitions
5# added by included profile
6#include globals.local
7
8# Redirect
9include mpg123.profile
diff --git a/etc/profile-m-z/mpg123-pulse.profile b/etc/profile-m-z/mpg123-pulse.profile
new file mode 100644
index 000000000..31063a96b
--- /dev/null
+++ b/etc/profile-m-z/mpg123-pulse.profile
@@ -0,0 +1,9 @@
1# Firejail profile for mpg123-pulse
2# Persistent local customizations
3include mpg123-pulse.local
4# Persistent global definitions
5# added by included profile
6#include globals.local
7
8# Redirect
9include mpg123.profile
diff --git a/etc/profile-m-z/mpg123-strip.profile b/etc/profile-m-z/mpg123-strip.profile
new file mode 100644
index 000000000..62de57c22
--- /dev/null
+++ b/etc/profile-m-z/mpg123-strip.profile
@@ -0,0 +1,9 @@
1# Firejail profile for mpg123-strip
2# Persistent local customizations
3include mpg123-strip.local
4# Persistent global definitions
5# added by included profile
6#include globals.local
7
8# Redirect
9include mpg123.profile
diff --git a/etc/profile-m-z/mpg123.bin.profile b/etc/profile-m-z/mpg123.bin.profile
new file mode 100644
index 000000000..0a01d0829
--- /dev/null
+++ b/etc/profile-m-z/mpg123.bin.profile
@@ -0,0 +1,9 @@
1# Firejail profile for mpg123.bin
2# Persistent local customizations
3include mpg123.bin.local
4# Persistent global definitions
5# added by included profile
6#include globals.local
7
8# Redirect
9include mpg123.profile
diff --git a/etc/profile-m-z/mpg123.profile b/etc/profile-m-z/mpg123.profile
new file mode 100644
index 000000000..6e18aa401
--- /dev/null
+++ b/etc/profile-m-z/mpg123.profile
@@ -0,0 +1,41 @@
1# Firejail profile for mpg123
2# Description: MPEG audio player/decoder
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mpg123.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${MUSIC}
10noblacklist ${VIDEOS}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-usr-share-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25netfilter
26nogroups
27nonewprivs
28noroot
29nou2f
30protocol unix,inet,inet6,netlink
31seccomp
32shell none
33
34#private-bin mpg123*
35private-dev
36private-tmp
37
38memory-deny-write-execute
39
40dbus-user none
41dbus-system none
diff --git a/etc/profile-m-z/mplayer.profile b/etc/profile-m-z/mplayer.profile
new file mode 100644
index 000000000..cd25d6c0b
--- /dev/null
+++ b/etc/profile-m-z/mplayer.profile
@@ -0,0 +1,39 @@
1# Firejail profile for mplayer
2# Description: Movie player for Unix-like systems
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mplayer.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.mplayer
10noblacklist ${MUSIC}
11noblacklist ${VIDEOS}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26# net none - mplayer can be used for streaming.
27netfilter
28# nogroups
29nonewprivs
30noroot
31nou2f
32protocol unix,inet,inet6,netlink
33seccomp
34shell none
35
36private-bin mplayer
37private-dev
38private-tmp
39
diff --git a/etc/profile-m-z/mpsyt.profile b/etc/profile-m-z/mpsyt.profile
new file mode 100644
index 000000000..f30fd48eb
--- /dev/null
+++ b/etc/profile-m-z/mpsyt.profile
@@ -0,0 +1,70 @@
1# Firejail profile for mpsyt
2# Description: Terminal based YouTube player and downloader
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mpsyt.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/mps-youtube
10noblacklist ${HOME}/.config/mpv
11noblacklist ${HOME}/.config/youtube-dl
12noblacklist ${HOME}/.mplayer
13noblacklist ${HOME}/.netrc
14noblacklist ${HOME}/mps
15
16# Allow python (blacklisted by disable-interpreters.inc)
17include allow-python2.inc
18include allow-python3.inc
19
20noblacklist ${MUSIC}
21noblacklist ${VIDEOS}
22
23include disable-common.inc
24include disable-devel.inc
25include disable-exec.inc
26include disable-interpreters.inc
27include disable-passwdmgr.inc
28include disable-programs.inc
29include disable-xdg.inc
30
31mkdir ${HOME}/.config/mps-youtube
32mkdir ${HOME}/.config/mpv
33mkdir ${HOME}/.config/youtube-dl
34mkdir ${HOME}/.mplayer
35mkdir ${HOME}/mps
36whitelist ${HOME}/.config/mps-youtube
37whitelist ${HOME}/.config/mpv
38whitelist ${HOME}/.config/youtube-dl
39whitelist ${HOME}/.mplayer
40whitelist ${HOME}/.netrc
41whitelist ${HOME}/mps
42whitelist ${DOWNLOADS}
43whitelist ${MUSIC}
44whitelist ${VIDEOS}
45include whitelist-common.inc
46include whitelist-var-common.inc
47
48apparmor
49caps.drop all
50netfilter
51nodvd
52# Seems to cause issues with Nvidia drivers sometimes
53nogroups
54nonewprivs
55noroot
56notv
57nou2f
58novideo
59protocol unix,inet,inet6
60seccomp
61shell none
62tracelog
63
64private-bin env,ffmpeg,mplayer,mpsyt,mpv,python*,youtube-dl
65#private-cache
66private-dev
67private-tmp
68
69dbus-user none
70dbus-system none
diff --git a/etc/profile-m-z/mpv.profile b/etc/profile-m-z/mpv.profile
new file mode 100644
index 000000000..8c463e7db
--- /dev/null
+++ b/etc/profile-m-z/mpv.profile
@@ -0,0 +1,56 @@
1# Firejail profile for mpv
2# Description: Video player based on MPlayer/mplayer2
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include mpv.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${HOME}/.config/mpv
11noblacklist ${HOME}/.config/youtube-dl
12noblacklist ${HOME}/.netrc
13
14# Allow lua (blacklisted by disable-interpreters.inc)
15include allow-lua.inc
16# Allow python (blacklisted by disable-interpreters.inc)
17include allow-python2.inc
18include allow-python3.inc
19
20noblacklist ${MUSIC}
21noblacklist ${PICTURES}
22noblacklist ${VIDEOS}
23
24include disable-common.inc
25include disable-devel.inc
26include disable-exec.inc
27include disable-interpreters.inc
28include disable-passwdmgr.inc
29include disable-programs.inc
30include disable-xdg.inc
31
32whitelist /usr/share/vulkan
33include whitelist-usr-share-common.inc
34include whitelist-var-common.inc
35
36apparmor
37caps.drop all
38netfilter
39
40# Seems to cause issues with Nvidia drivers sometimes
41nogroups
42nonewprivs
43noroot
44nou2f
45protocol unix,inet,inet6,netlink
46seccomp
47shell none
48tracelog
49
50private-bin env,mpv,python*,youtube-dl
51# Causes slow OSD, see #2838
52#private-cache
53private-dev
54
55dbus-user none
56dbus-system none
diff --git a/etc/profile-m-z/mrrescue.profile b/etc/profile-m-z/mrrescue.profile
new file mode 100644
index 000000000..f02a4f357
--- /dev/null
+++ b/etc/profile-m-z/mrrescue.profile
@@ -0,0 +1,49 @@
1# Firejail profile for mrrescue
2# Description: Arcade-style fire fighting game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mrrescue.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/love
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.local/share/love
20whitelist ${HOME}/.local/share/love
21whitelist /usr/share/mrrescue
22include whitelist-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28net none
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol unix,netlink
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private-bin love,mrrescue,sh
43private-cache
44private-dev
45private-etc machine-id
46private-tmp
47
48dbus-user none
49dbus-system none
diff --git a/etc/profile-m-z/ms-excel.profile b/etc/profile-m-z/ms-excel.profile
new file mode 100644
index 000000000..db24e8f9b
--- /dev/null
+++ b/etc/profile-m-z/ms-excel.profile
@@ -0,0 +1,13 @@
1# Firejail profile for Microsoft Office Online - Excel
2# This file is overwritten after every install/update
3# Persistent local customizations
4include ms-excel.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9noblacklist ${HOME}/.cache/ms-excel-online
10private-bin ms-excel
11
12# Redirect
13include ms-office.profile
diff --git a/etc/profile-m-z/ms-office.profile b/etc/profile-m-z/ms-office.profile
new file mode 100644
index 000000000..a6892d698
--- /dev/null
+++ b/etc/profile-m-z/ms-office.profile
@@ -0,0 +1,43 @@
1# Firejail profile for Microsoft Office Online
2# This file is overwritten after every install/update
3# Persistent local customizations
4include ms-office.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/ms-office-online
9noblacklist ${HOME}/.jak
10
11# Allow python (blacklisted by disable-interpreters.inc)
12include allow-python2.inc
13include allow-python3.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22caps.drop all
23netfilter
24nodvd
25nogroups
26nonewprivs
27noroot
28notv
29nou2f
30novideo
31protocol unix,inet,inet6
32seccomp
33shell none
34tracelog
35
36disable-mnt
37private-bin bash,env,fonts,jak,ms-office,python*,sh
38private-etc alternatives,ca-certificates,crypto-policies,pki,resolv.conf,ssl
39private-dev
40private-tmp
41
42dbus-user none
43dbus-system none
diff --git a/etc/profile-m-z/ms-onenote.profile b/etc/profile-m-z/ms-onenote.profile
new file mode 100644
index 000000000..9ea0637bd
--- /dev/null
+++ b/etc/profile-m-z/ms-onenote.profile
@@ -0,0 +1,13 @@
1# Firejail profile for Microsoft Office Online - Onenote
2# This file is overwritten after every install/update
3# Persistent local customizations
4include ms-onenote.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9noblacklist ${HOME}/.cache/ms-onenote-online
10private-bin ms-onenote
11
12# Redirect
13include ms-office.profile
diff --git a/etc/profile-m-z/ms-outlook.profile b/etc/profile-m-z/ms-outlook.profile
new file mode 100644
index 000000000..fc3e7c009
--- /dev/null
+++ b/etc/profile-m-z/ms-outlook.profile
@@ -0,0 +1,13 @@
1# Firejail profile for Microsoft Office Online - Outlook
2# This file is overwritten after every install/update
3# Persistent local customizations
4include ms-outlook.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9noblacklist ${HOME}/.cache/ms-outlook-online
10private-bin ms-outlook
11
12# Redirect
13include ms-office.profile
diff --git a/etc/profile-m-z/ms-powerpoint.profile b/etc/profile-m-z/ms-powerpoint.profile
new file mode 100644
index 000000000..dadcd5b1e
--- /dev/null
+++ b/etc/profile-m-z/ms-powerpoint.profile
@@ -0,0 +1,13 @@
1# Firejail profile for Microsoft Office Online - Powerpoint
2# This file is overwritten after every install/update
3# Persistent local customizations
4include ms-powerpoint.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9noblacklist ${HOME}/.cache/ms-powerpoint-online
10private-bin ms-powerpoint
11
12# Redirect
13include ms-office.profile
diff --git a/etc/profile-m-z/ms-skype.profile b/etc/profile-m-z/ms-skype.profile
new file mode 100644
index 000000000..df1618361
--- /dev/null
+++ b/etc/profile-m-z/ms-skype.profile
@@ -0,0 +1,16 @@
1# Firejail profile for Microsoft Office Online - Skype
2# This file is overwritten after every install/update
3# Persistent local customizations
4include ms-skype.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9ignore novideo
10
11noblacklist ${HOME}/.cache/ms-skype-online
12
13private-bin ms-skype
14
15# Redirect
16include ms-office.profile
diff --git a/etc/profile-m-z/ms-word.profile b/etc/profile-m-z/ms-word.profile
new file mode 100644
index 000000000..5a617a893
--- /dev/null
+++ b/etc/profile-m-z/ms-word.profile
@@ -0,0 +1,13 @@
1# Firejail profile for Microsoft Office Online - Word
2# This file is overwritten after every install/update
3# Persistent local customizations
4include ms-word.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9noblacklist ${HOME}/.cache/ms-word-online
10private-bin ms-word
11
12# Redirect
13include ms-office.profile
diff --git a/etc/profile-m-z/multimc.profile b/etc/profile-m-z/multimc.profile
new file mode 100644
index 000000000..338f494c9
--- /dev/null
+++ b/etc/profile-m-z/multimc.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for multimc5
2# This file is overwritten after every install/update
3
4# Redirect
5include multimc5.profile
diff --git a/etc/profile-m-z/multimc5.profile b/etc/profile-m-z/multimc5.profile
new file mode 100644
index 000000000..475307418
--- /dev/null
+++ b/etc/profile-m-z/multimc5.profile
@@ -0,0 +1,48 @@
1# Firejail profile for multimc5
2# This file is overwritten after every install/update
3# Persistent local customizations
4include multimc5.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.local/share/multimc
9noblacklist ${HOME}/.local/share/multimc5
10noblacklist ${HOME}/.multimc5
11
12# Allow java (blacklisted by disable-devel.inc)
13include allow-java.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22mkdir ${HOME}/.local/share/multimc
23mkdir ${HOME}/.local/share/multimc5
24mkdir ${HOME}/.multimc5
25whitelist ${HOME}/.local/share/multimc
26whitelist ${HOME}/.local/share/multimc5
27whitelist ${HOME}/.multimc5
28include whitelist-common.inc
29
30caps.drop all
31netfilter
32nodvd
33nogroups
34nonewprivs
35noroot
36notv
37nou2f
38novideo
39protocol unix,inet,inet6
40# seccomp
41shell none
42
43disable-mnt
44# private-bin works, but causes weirdness
45# private-bin apt-file,awk,bash,chmod,dirname,dnf,grep,java,kdialog,ldd,mkdir,multimc5,pfl,pkgfile,readlink,sort,valgrind,which,yum,zenity,zypper
46private-dev
47private-tmp
48
diff --git a/etc/profile-m-z/mumble.profile b/etc/profile-m-z/mumble.profile
new file mode 100644
index 000000000..a16934806
--- /dev/null
+++ b/etc/profile-m-z/mumble.profile
@@ -0,0 +1,46 @@
1# Firejail profile for mumble
2# Description: Low latency encrypted VoIP client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mumble.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Mumble
10noblacklist ${HOME}/.local/share/data/Mumble
11noblacklist ${HOME}/.local/share/Mumble
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20mkdir ${HOME}/.config/Mumble
21mkdir ${HOME}/.local/share/data/Mumble
22mkdir ${HOME}/.local/share/Mumble
23whitelist ${HOME}/.config/Mumble
24whitelist ${HOME}/.local/share/data/Mumble
25whitelist ${HOME}/.local/share/Mumble
26include whitelist-common.inc
27include whitelist-var-common.inc
28
29caps.drop all
30netfilter
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36notv
37protocol unix,inet,inet6,netlink
38seccomp
39shell none
40tracelog
41
42disable-mnt
43private-bin mumble
44private-tmp
45
46#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-m-z/mupdf-gl.profile b/etc/profile-m-z/mupdf-gl.profile
new file mode 100644
index 000000000..be94a9083
--- /dev/null
+++ b/etc/profile-m-z/mupdf-gl.profile
@@ -0,0 +1,13 @@
1# Firejail profile for mupdf-gl
2# Description: Lightweight PDF viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mupdf-gl.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10noblacklist ${HOME}/.mupdf.history
11
12# Redirect
13include mupdf.profile
diff --git a/etc/profile-m-z/mupdf-x11-curl.profile b/etc/profile-m-z/mupdf-x11-curl.profile
new file mode 100644
index 000000000..a04d386a2
--- /dev/null
+++ b/etc/profile-m-z/mupdf-x11-curl.profile
@@ -0,0 +1,18 @@
1# Firejail profile for mupdf-x11-curl
2# Description: Lightweight PDF viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mupdf-x11-curl.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10ignore net none
11
12netfilter
13protocol unix,inet,inet6
14
15private-etc ca-certificates,crypto-policies,hosts,nsswitch.conf,pki,resolv.conf,ssl
16
17# Redirect
18include mupdf.profile
diff --git a/etc/profile-m-z/mupdf-x11.profile b/etc/profile-m-z/mupdf-x11.profile
new file mode 100644
index 000000000..256201d0c
--- /dev/null
+++ b/etc/profile-m-z/mupdf-x11.profile
@@ -0,0 +1,14 @@
1# Firejail profile for mupdf-x11
2# Description: Lightweight PDF viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mupdf-x11.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10memory-deny-write-execute
11read-only ${HOME}
12
13# Redirect
14include mupdf.profile
diff --git a/etc/profile-m-z/mupdf.profile b/etc/profile-m-z/mupdf.profile
new file mode 100644
index 000000000..a3e56170a
--- /dev/null
+++ b/etc/profile-m-z/mupdf.profile
@@ -0,0 +1,43 @@
1# Firejail profile for mupdf
2# Description: Lightweight PDF viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mupdf.local
6# Persistent global definitions
7#include globals.local
8
9noblacklist ${DOCUMENTS}
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19include whitelist-var-common.inc
20
21apparmor
22caps.drop all
23machine-id
24net none
25nodvd
26nogroups
27nonewprivs
28noroot
29nosound
30notv
31nou2f
32novideo
33protocol unix
34seccomp
35shell none
36tracelog
37
38private-dev
39private-etc alternatives,fonts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload
40private-tmp
41
42dbus-user none
43dbus-system none
diff --git a/etc/profile-m-z/mupen64plus.profile b/etc/profile-m-z/mupen64plus.profile
new file mode 100644
index 000000000..00983a8f3
--- /dev/null
+++ b/etc/profile-m-z/mupen64plus.profile
@@ -0,0 +1,35 @@
1# Firejail profile for mupen64plus
2# Description: Nintendo64 Emulator
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mupen64plus.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/mupen64plus
10noblacklist ${HOME}/.local/share/mupen64plus
11
12include disable-common.inc
13include disable-devel.inc
14include disable-passwdmgr.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18# you'll need to manually whitelist ROM files
19mkdir ${HOME}/.config/mupen64plus
20mkdir ${HOME}/.local/share/mupen64plus
21whitelist ${HOME}/.config/mupen64plus
22whitelist ${HOME}/.local/share/mupen64plus
23include whitelist-common.inc
24
25caps.drop all
26net none
27nodvd
28nonewprivs
29noroot
30notv
31novideo
32seccomp
33
34dbus-user none
35dbus-system none
diff --git a/etc/profile-m-z/muraster.profile b/etc/profile-m-z/muraster.profile
new file mode 100644
index 000000000..90e3f2050
--- /dev/null
+++ b/etc/profile-m-z/muraster.profile
@@ -0,0 +1,11 @@
1# Firejail profile for muraster
2# Description: Lightweight PDF viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include muraster.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include mupdf.profile
diff --git a/etc/profile-m-z/musescore.profile b/etc/profile-m-z/musescore.profile
new file mode 100644
index 000000000..679e82ae8
--- /dev/null
+++ b/etc/profile-m-z/musescore.profile
@@ -0,0 +1,43 @@
1# Firejail profile for musescore
2# Description: Free music composition and notation software
3# This file is overwritten after every install/update
4# Persistent local customizations
5include musescore.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/MusE
10noblacklist ${HOME}/.config/MuseScore
11noblacklist ${HOME}/.local/share/data/MusE
12noblacklist ${HOME}/.local/share/data/MuseScore
13noblacklist ${DOCUMENTS}
14noblacklist ${MUSIC}
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28netfilter
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34notv
35novideo
36protocol unix,inet,inet6
37# QtWebengine needs chroot to set up its own sandbox
38seccomp !chroot
39shell none
40tracelog
41
42# private-bin musescore,mscore
43private-tmp
diff --git a/etc/profile-m-z/musixmatch.profile b/etc/profile-m-z/musixmatch.profile
new file mode 100644
index 000000000..a6b85a8e4
--- /dev/null
+++ b/etc/profile-m-z/musixmatch.profile
@@ -0,0 +1,36 @@
1# Firejail profile for Musixmatch
2# This file is overwritten after every install/update
3# Persistent local customizations
4include musixmatch.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${MUSIC}
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17caps.drop all
18ipc-namespace
19netfilter
20no3d
21nodvd
22nogroups
23nonewprivs
24noroot
25nogroups
26nosound
27notv
28nou2f
29novideo
30protocol unix,inet,inet6,netlink
31seccomp
32
33disable-mnt
34private-dev
35private-etc alternatives,asound.conf,ca-certificates,crypto-policies,machine-id,pki,pulse,ssl
36
diff --git a/etc/profile-m-z/mutool.profile b/etc/profile-m-z/mutool.profile
new file mode 100644
index 000000000..e61f4665d
--- /dev/null
+++ b/etc/profile-m-z/mutool.profile
@@ -0,0 +1,11 @@
1# Firejail profile for mutool
2# Description: Lightweight PDF viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mutool.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include mupdf.profile
diff --git a/etc/profile-m-z/mutt.profile b/etc/profile-m-z/mutt.profile
new file mode 100644
index 000000000..8ff547b52
--- /dev/null
+++ b/etc/profile-m-z/mutt.profile
@@ -0,0 +1,61 @@
1# Firejail profile for mutt
2# Description: Text-based mailreader supporting MIME, GPG, PGP and threading
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mutt.local
6# Persistent global definitions
7include globals.local
8
9noblacklist /var/mail
10noblacklist /var/spool/mail
11noblacklist ${HOME}/.Mail
12noblacklist ${HOME}/.bogofilter
13noblacklist ${HOME}/.cache/mutt
14noblacklist ${HOME}/.config/nano
15noblacklist ${HOME}/.elinks
16noblacklist ${HOME}/.emacs
17noblacklist ${HOME}/.emacs.d
18noblacklist ${HOME}/.gnupg
19noblacklist ${HOME}/.mail
20noblacklist ${HOME}/.msmtprc
21noblacklist ${HOME}/.mutt
22noblacklist ${HOME}/.muttrc
23noblacklist ${HOME}/.nanorc
24noblacklist ${HOME}/.signature
25noblacklist ${HOME}/.vim
26noblacklist ${HOME}/.viminfo
27noblacklist ${HOME}/.vimrc
28noblacklist ${HOME}/.w3m
29noblacklist ${HOME}/Mail
30noblacklist ${HOME}/mail
31noblacklist ${HOME}/postponed
32noblacklist ${HOME}/sent
33
34blacklist /tmp/.X11-unix
35blacklist ${RUNUSER}/wayland-*
36
37include disable-common.inc
38include disable-devel.inc
39include disable-interpreters.inc
40include disable-passwdmgr.inc
41include disable-programs.inc
42
43include whitelist-runuser-common.inc
44
45caps.drop all
46netfilter
47no3d
48nodvd
49nogroups
50nonewprivs
51noroot
52nosound
53notv
54nou2f
55novideo
56protocol unix,inet,inet6
57seccomp
58shell none
59
60private-dev
61writable-run-user
diff --git a/etc/profile-m-z/mypaint-ora-thumbnailer.profile b/etc/profile-m-z/mypaint-ora-thumbnailer.profile
new file mode 100644
index 000000000..59b3024ed
--- /dev/null
+++ b/etc/profile-m-z/mypaint-ora-thumbnailer.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for mypaint-ora-thumbnailer
2# This file is overwritten after every install/update
3
4# Redirect
5include mypaint.profile
diff --git a/etc/profile-m-z/mypaint.profile b/etc/profile-m-z/mypaint.profile
new file mode 100644
index 000000000..c592e8477
--- /dev/null
+++ b/etc/profile-m-z/mypaint.profile
@@ -0,0 +1,50 @@
1# Firejail profile for mypaint
2# Description: A fast and easy graphics application for digital painters
3# This file is overwritten after every install/update
4# Persistent local customizations
5include mypaint.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/mypaint
10noblacklist ${HOME}/.config/mypaint
11noblacklist ${HOME}/.local/share/mypaint
12noblacklist ${PICTURES}
13
14# Allow python (blacklisted by disable-interpreters.inc)
15include allow-python2.inc
16include allow-python3.inc
17
18include disable-common.inc
19include disable-devel.inc
20include disable-exec.inc
21include disable-interpreters.inc
22include disable-passwdmgr.inc
23include disable-programs.inc
24include disable-xdg.inc
25
26apparmor
27caps.drop all
28machine-id
29net none
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix
40seccomp
41shell none
42tracelog
43
44private-cache
45private-dev
46private-etc alternatives,dconf,fonts,gtk-3.0
47private-tmp
48
49dbus-user none
50dbus-system none
diff --git a/etc/profile-m-z/nano.profile b/etc/profile-m-z/nano.profile
new file mode 100644
index 000000000..2a4625896
--- /dev/null
+++ b/etc/profile-m-z/nano.profile
@@ -0,0 +1,55 @@
1# Firejail profile for nano
2# Description: nano is an easy text editor for the terminal
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include nano.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12noblacklist ${HOME}/.config/nano
13noblacklist ${HOME}/.nanorc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22whitelist /usr/share/nano
23include whitelist-usr-share-common.inc
24
25apparmor
26caps.drop all
27ipc-namespace
28machine-id
29net none
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix
40seccomp
41shell none
42tracelog
43x11 none
44
45# disable-mnt
46private-bin nano,rnano
47private-cache
48private-dev
49# Comment the next line if you want to edit files in /etc directly
50private-etc alternatives,nanorc
51
52dbus-user none
53dbus-system none
54
55memory-deny-write-execute
diff --git a/etc/profile-m-z/natron.profile b/etc/profile-m-z/natron.profile
new file mode 100644
index 000000000..5bf152f84
--- /dev/null
+++ b/etc/profile-m-z/natron.profile
@@ -0,0 +1,38 @@
1# Firejail profile for natron
2# This file is overwritten after every install/update
3# Persistent local customizations
4include natron.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.Natron
9noblacklist ${HOME}/.cache/INRIA/Natron
10noblacklist ${HOME}/.config/INRIA
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22
23caps.drop all
24net none
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31protocol unix
32seccomp
33shell none
34
35private-bin natron,Natron,NatronRenderer
36
37dbus-user none
38dbus-system none
diff --git a/etc/profile-m-z/nautilus.profile b/etc/profile-m-z/nautilus.profile
new file mode 100644
index 000000000..e003488de
--- /dev/null
+++ b/etc/profile-m-z/nautilus.profile
@@ -0,0 +1,44 @@
1# Firejail profile for nautilus
2# Description: File manager and graphical shell for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include nautilus.local
6# Persistent global definitions
7include globals.local
8
9# Nautilus is started by systemd on most systems. Therefore it is not firejailed by default. Since there
10# is already a nautilus process running on gnome desktops firejail will have no effect.
11
12noblacklist ${HOME}/.config/nautilus
13noblacklist ${HOME}/.local/share/Trash
14noblacklist ${HOME}/.local/share/nautilus
15noblacklist ${HOME}/.local/share/nautilus-python
16
17# Allow python (blacklisted by disable-interpreters.inc)
18include allow-python2.inc
19include allow-python3.inc
20
21include disable-common.inc
22include disable-devel.inc
23include disable-interpreters.inc
24include disable-passwdmgr.inc
25# include disable-programs.inc
26
27allusers
28caps.drop all
29netfilter
30nodvd
31nogroups
32nonewprivs
33noroot
34notv
35novideo
36protocol unix
37seccomp
38shell none
39tracelog
40
41# nautilus needs to be able to start arbitrary applications so we cannot blacklist their files
42# private-bin nautilus
43# private-dev
44# private-tmp
diff --git a/etc/profile-m-z/ncdu.profile b/etc/profile-m-z/ncdu.profile
new file mode 100644
index 000000000..651804bf1
--- /dev/null
+++ b/etc/profile-m-z/ncdu.profile
@@ -0,0 +1,36 @@
1# Firejail profile for ncdu
2# Description: Ncurses disk usage viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include ncdu.local
6# Persistent global definitions
7include globals.local
8
9blacklist ${RUNUSER}/wayland-*
10
11include disable-exec.inc
12
13caps.drop all
14ipc-namespace
15net none
16no3d
17nodvd
18nogroups
19nonewprivs
20noroot
21nosound
22notv
23nou2f
24novideo
25protocol unix
26seccomp
27shell none
28x11 none
29
30private-dev
31# private-tmp
32
33dbus-user none
34dbus-system none
35
36memory-deny-write-execute
diff --git a/etc/profile-m-z/nemo.profile b/etc/profile-m-z/nemo.profile
new file mode 100644
index 000000000..6a62a3a0c
--- /dev/null
+++ b/etc/profile-m-z/nemo.profile
@@ -0,0 +1,38 @@
1# Firejail profile for nemo
2# Description: File manager and graphical shell for Cinnamon
3# This file is overwritten after every install/update
4# Persistent local customizations
5include nemo.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/nemo
10noblacklist ${HOME}/.local/share/Trash
11noblacklist ${HOME}/.local/share/nemo
12noblacklist ${HOME}/.local/share/nemo-python
13
14# Allow python (blacklisted by disable-interpreters.inc)
15include allow-python2.inc
16include allow-python3.inc
17
18include disable-common.inc
19include disable-devel.inc
20include disable-exec.inc
21include disable-interpreters.inc
22include disable-passwdmgr.inc
23
24allusers
25caps.drop all
26netfilter
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34novideo
35protocol unix,inet,inet6
36seccomp
37shell none
38
diff --git a/etc/profile-m-z/netactview.profile b/etc/profile-m-z/netactview.profile
new file mode 100644
index 000000000..cbf0d235d
--- /dev/null
+++ b/etc/profile-m-z/netactview.profile
@@ -0,0 +1,54 @@
1# Firejail profile for netactview
2# Description: A graphical network connections viewer similar in functionality to netstat
3# This file is overwritten after every install/update
4# Persistent local customizations
5include netactview.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.netactview
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkfile ${HOME}/.netactview
20whitelist ${HOME}/.netactview
21whitelist /usr/share/netactview
22include whitelist-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28ipc-namespace
29machine-id
30netfilter
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40seccomp
41shell none
42
43disable-mnt
44private-bin netactview,netactview_polkit
45private-cache
46private-dev
47private-etc alternatives,fonts
48private-lib
49private-tmp
50
51dbus-user none
52dbus-system none
53
54memory-deny-write-execute
diff --git a/etc/profile-m-z/nethack-vultures.profile b/etc/profile-m-z/nethack-vultures.profile
new file mode 100644
index 000000000..4daa8054b
--- /dev/null
+++ b/etc/profile-m-z/nethack-vultures.profile
@@ -0,0 +1,45 @@
1# Firejail profile for nethack-vultures
2# Description: A rogue-like single player dungeon exploration game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include nethack.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.vultures
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.vultures
19whitelist ${HOME}/.vultures
20whitelist /var/log/vultures
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24caps.drop all
25ipc-namespace
26net none
27nodvd
28nogroups
29#nonewprivs
30#noroot
31notv
32novideo
33#protocol unix,netlink
34#seccomp
35shell none
36
37disable-mnt
38#private
39private-cache
40private-dev
41private-tmp
42writable-var
43
44dbus-user none
45dbus-system none
diff --git a/etc/profile-m-z/nethack.profile b/etc/profile-m-z/nethack.profile
new file mode 100644
index 000000000..c8c927db2
--- /dev/null
+++ b/etc/profile-m-z/nethack.profile
@@ -0,0 +1,47 @@
1# Firejail profile for nethack
2# Description: A rogue-like single player dungeon exploration game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include nethack.local
6# Persistent global definitions
7include globals.local
8
9noblacklist /var/games/nethack
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18whitelist /var/games/nethack
19include whitelist-common.inc
20include whitelist-var-common.inc
21
22caps.drop all
23ipc-namespace
24net none
25no3d
26nodvd
27nogroups
28#nonewprivs
29#noroot
30nosound
31notv
32novideo
33#protocol unix,netlink
34#seccomp
35shell none
36
37disable-mnt
38#private
39private-cache
40private-dev
41private-tmp
42writable-var
43
44dbus-user none
45dbus-system none
46
47#memory-deny-write-execute
diff --git a/etc/profile-m-z/netsurf.profile b/etc/profile-m-z/netsurf.profile
new file mode 100644
index 000000000..0ddb7bbbe
--- /dev/null
+++ b/etc/profile-m-z/netsurf.profile
@@ -0,0 +1,34 @@
1# Firejail profile for netsurf
2# Description: Lightweight and fast web browser
3# This file is overwritten after every install/update
4# Persistent local customizations
5include netsurf.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/netsurf
10noblacklist ${HOME}/.config/netsurf
11
12include disable-common.inc
13include disable-devel.inc
14include disable-interpreters.inc
15include disable-programs.inc
16
17mkdir ${HOME}/.cache/netsurf
18mkdir ${HOME}/.config/netsurf
19whitelist ${DOWNLOADS}
20whitelist ${HOME}/.cache/netsurf
21whitelist ${HOME}/.config/netsurf
22include whitelist-common.inc
23
24caps.drop all
25netfilter
26nodvd
27nonewprivs
28noroot
29notv
30protocol unix,inet,inet6,netlink
31seccomp
32tracelog
33
34disable-mnt
diff --git a/etc/profile-m-z/neverball.profile b/etc/profile-m-z/neverball.profile
new file mode 100644
index 000000000..84c634549
--- /dev/null
+++ b/etc/profile-m-z/neverball.profile
@@ -0,0 +1,39 @@
1# Firejail profile for neverball
2# Description: 3D floor-tilting game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include neverball.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.neverball
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.neverball
19whitelist ${HOME}/.neverball
20include whitelist-common.inc
21
22caps.drop all
23netfilter
24nodvd
25nogroups
26nonewprivs
27noroot
28notv
29nou2f
30novideo
31protocol unix,netlink
32seccomp
33shell none
34
35disable-mnt
36private-bin neverball
37private-dev
38private-tmp
39
diff --git a/etc/profile-m-z/neverputt.profile b/etc/profile-m-z/neverputt.profile
new file mode 100644
index 000000000..d370d1218
--- /dev/null
+++ b/etc/profile-m-z/neverputt.profile
@@ -0,0 +1,11 @@
1# Firejail profile for neverputt
2# This file is overwritten after every install/update
3# Persistent local customizations
4include neverputt.local
5# added by included profile
6#include globals.local
7
8private-bin neverputt
9
10# Redirect
11include neverball.profile
diff --git a/etc/profile-m-z/newsbeuter.profile b/etc/profile-m-z/newsbeuter.profile
new file mode 100644
index 000000000..85581a2f0
--- /dev/null
+++ b/etc/profile-m-z/newsbeuter.profile
@@ -0,0 +1,21 @@
1# Firejail profile for Newsbeuter
2# Description: Text based Atom/RSS feed reader
3# This file is overwritten after every install/update
4# Persistent local customizations
5include newsbeuter.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10noblacklist ${HOME}/.config/newsbeuter
11noblacklist ${HOME}/.newsbeuter
12
13mkdir ${HOME}/.config/newsbeuter
14mkdir ${HOME}/.newsbeuter
15whitelist ${HOME}/.config/newsbeuter
16whitelist ${HOME}/.newsbeuter
17
18private-bin newsbeuter
19
20# Redirect
21include newsboat.profile
diff --git a/etc/profile-m-z/newsboat.profile b/etc/profile-m-z/newsboat.profile
new file mode 100644
index 000000000..a7bac6286
--- /dev/null
+++ b/etc/profile-m-z/newsboat.profile
@@ -0,0 +1,50 @@
1# Firejail profile for Newsboat
2# Description: RSS program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include newsboat.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.newsboat
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.newsboat
20whitelist ${HOME}/.newsboat
21include whitelist-common.inc
22include whitelist-runuser-common.inc
23include whitelist-var-common.inc
24
25caps.drop all
26ipc-namespace
27netfilter
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol inet,inet6
37seccomp
38shell none
39
40disable-mnt
41private-bin newsboat
42private-cache
43private-dev
44private-etc alternatives,ca-certificates,crypto-policies,pki,resolv.conf,ssl,terminfo
45private-tmp
46
47dbus-user none
48dbus-system none
49
50memory-deny-write-execute
diff --git a/etc/profile-m-z/nheko.profile b/etc/profile-m-z/nheko.profile
new file mode 100644
index 000000000..119b30239
--- /dev/null
+++ b/etc/profile-m-z/nheko.profile
@@ -0,0 +1,41 @@
1# Firejail profile for nheko
2# Description: Desktop IM client for the Matrix protocol
3# This file is overwritten after every install/update
4# Persistent local customizations
5include nheko.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/nheko
10noblacklist ${HOME}/.cache/nheko/nheko
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19mkdir ${HOME}/.config/nheko
20mkdir ${HOME}/.cache/nheko/nheko
21whitelist ${HOME}/.config/nheko
22whitelist ${HOME}/.cache/nheko/nheko
23whitelist ${DOWNLOADS}
24include whitelist-common.inc
25
26caps.drop all
27netfilter
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33protocol unix,inet,inet6
34seccomp
35shell none
36tracelog
37
38disable-mnt
39private-bin nheko
40private-tmp
41
diff --git a/etc/profile-m-z/nicotine.profile b/etc/profile-m-z/nicotine.profile
new file mode 100644
index 000000000..7764edffb
--- /dev/null
+++ b/etc/profile-m-z/nicotine.profile
@@ -0,0 +1,55 @@
1# Firejail profile for Nicotine Plus
2# Description: Soulseek music-sharing client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include nicotine.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.nicotine
10
11include allow-python2.inc
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21mkdir ${HOME}/.nicotine
22whitelist ${DOWNLOADS}
23whitelist ${HOME}/.nicotine
24whitelist /usr/share/GeoIP
25include whitelist-common.inc
26include whitelist-runuser-common.inc
27include whitelist-usr-share-common.inc
28include whitelist-var-common.inc
29
30apparmor
31caps.drop all
32#ipc-namespace
33netfilter
34no3d
35nodvd
36nogroups
37nonewprivs
38noroot
39nosound
40notv
41nou2f
42novideo
43protocol unix,inet,inet6
44seccomp
45shell none
46tracelog
47
48disable-mnt
49private-bin nicotine,python2*
50private-cache
51private-dev
52private-tmp
53
54dbus-user none
55dbus-system none
diff --git a/etc/profile-m-z/nitroshare-cli.profile b/etc/profile-m-z/nitroshare-cli.profile
new file mode 100644
index 000000000..d9cb2edc5
--- /dev/null
+++ b/etc/profile-m-z/nitroshare-cli.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for nitroshare
2# Description: Network File Transfer Application
3# This file is overwritten after every install/update
4
5# Redirect
6include nitroshare.profile
diff --git a/etc/profile-m-z/nitroshare-nmh.profile b/etc/profile-m-z/nitroshare-nmh.profile
new file mode 100644
index 000000000..d9cb2edc5
--- /dev/null
+++ b/etc/profile-m-z/nitroshare-nmh.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for nitroshare
2# Description: Network File Transfer Application
3# This file is overwritten after every install/update
4
5# Redirect
6include nitroshare.profile
diff --git a/etc/profile-m-z/nitroshare-send.profile b/etc/profile-m-z/nitroshare-send.profile
new file mode 100644
index 000000000..d9cb2edc5
--- /dev/null
+++ b/etc/profile-m-z/nitroshare-send.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for nitroshare
2# Description: Network File Transfer Application
3# This file is overwritten after every install/update
4
5# Redirect
6include nitroshare.profile
diff --git a/etc/profile-m-z/nitroshare-ui.profile b/etc/profile-m-z/nitroshare-ui.profile
new file mode 100644
index 000000000..d9cb2edc5
--- /dev/null
+++ b/etc/profile-m-z/nitroshare-ui.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for nitroshare
2# Description: Network File Transfer Application
3# This file is overwritten after every install/update
4
5# Redirect
6include nitroshare.profile
diff --git a/etc/profile-m-z/nitroshare.profile b/etc/profile-m-z/nitroshare.profile
new file mode 100644
index 000000000..1743a771e
--- /dev/null
+++ b/etc/profile-m-z/nitroshare.profile
@@ -0,0 +1,52 @@
1# Firejail profile for nitroshare
2# Description: Network File Transfer Application
3# This file is overwritten after every install/update
4# Persistent local customizations
5include nitroshare.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Nathan Osman
10noblacklist ${HOME}/.config/NitroShare
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26caps.drop all
27netfilter
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix,inet,inet6,netlink
38seccomp
39shell none
40
41disable-mnt
42private-bin awk,grep,nitroshare,nitroshare-cli,nitroshare-nmh,nitroshare-send,nitroshare-ui
43private-cache
44private-dev
45private-etc alternatives,ca-certificates,dconf,fonts,hostname,hosts,ld.so.cache,machine-id,nsswitch.conf,ssl
46# private-lib libnitroshare.so.*,libqhttpengine.so.*,libqmdnsengine.so.*,nitroshare
47private-tmp
48
49# dbus-user none
50# dbus-system none
51
52# memory-deny-write-execute
diff --git a/etc/profile-m-z/nomacs.profile b/etc/profile-m-z/nomacs.profile
new file mode 100644
index 000000000..7a7ff504a
--- /dev/null
+++ b/etc/profile-m-z/nomacs.profile
@@ -0,0 +1,47 @@
1# Firejail profile for nomacs
2# Description: a fast and small image viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include nomacs.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/nomacs
10noblacklist ${HOME}/.local/share/nomacs
11noblacklist ${HOME}/.local/share/data/nomacs
12noblacklist ${PICTURES}
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26machine-id
27netfilter
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix,inet,inet6,netlink
37seccomp
38shell none
39tracelog
40
41#private-bin nomacs
42private-cache
43private-dev
44private-etc alternatives,ca-certificates,crypto-policies,dconf,drirc,fonts,gtk-3.0,hosts,login.defs,machine-id,pki,resolv.conf,ssl
45private-tmp
46
47memory-deny-write-execute
diff --git a/etc/profile-m-z/nslookup.profile b/etc/profile-m-z/nslookup.profile
new file mode 100644
index 000000000..a8e0ddd89
--- /dev/null
+++ b/etc/profile-m-z/nslookup.profile
@@ -0,0 +1,56 @@
1# Firejail profile for nslookup
2# Description: DNS lookup utility
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include nslookup.local
7# Persistent global definitions
8include globals.local
9
10blacklist /tmp/.X11-unix
11blacklist ${RUNUSER}/wayland-*
12blacklist ${RUNUSER}
13
14noblacklist ${PATH}/nslookup
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24whitelist ${HOME}/.nslookuprc
25include whitelist-common.inc
26include whitelist-usr-share-common.inc
27include whitelist-var-common.inc
28
29apparmor
30caps.drop all
31ipc-namespace
32machine-id
33netfilter
34no3d
35nodvd
36nogroups
37nonewprivs
38noroot
39nosound
40notv
41nou2f
42novideo
43protocol unix,inet,inet6
44seccomp
45shell none
46tracelog
47
48disable-mnt
49private-bin bash,nslookup,sh
50private-dev
51private-tmp
52
53dbus-user none
54dbus-system none
55
56memory-deny-write-execute
diff --git a/etc/profile-m-z/nylas.profile b/etc/profile-m-z/nylas.profile
new file mode 100644
index 000000000..c959eb991
--- /dev/null
+++ b/etc/profile-m-z/nylas.profile
@@ -0,0 +1,38 @@
1# Firejail profile for nylas
2# This file is overwritten after every install/update
3# Persistent local customizations
4include nylas.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/Nylas Mail
9noblacklist ${HOME}/.nylas-mail
10
11include disable-common.inc
12include disable-devel.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17mkdir ${HOME}/.config/Nylas Mail
18mkdir ${HOME}/.nylas-mail
19whitelist ${DOWNLOADS}
20whitelist ${HOME}/.config/Nylas Mail
21whitelist ${HOME}/.nylas-mail
22include whitelist-common.inc
23
24caps.drop all
25netfilter
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix,inet,inet6,netlink
35seccomp
36shell none
37
38private-dev
diff --git a/etc/profile-m-z/nyx.profile b/etc/profile-m-z/nyx.profile
new file mode 100644
index 000000000..df214ff20
--- /dev/null
+++ b/etc/profile-m-z/nyx.profile
@@ -0,0 +1,53 @@
1# Firejail profile for nyx
2# Description: Command-line status monitor for tor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include nyx.local
6# Persistent global definitions
7include globals.local
8
9# Allow python (blacklisted by disable-interpreters.inc)
10include allow-python2.inc
11include allow-python3.inc
12
13noblacklist ${HOME}/.nyx
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23mkdir ${HOME}/.nyx
24whitelist ${HOME}/.nyx
25include whitelist-common.inc
26include whitelist-var-common.inc
27
28caps.drop all
29netfilter
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix,inet,inet6
40seccomp
41shell none
42
43disable-mnt
44private-bin nyx,python*
45private-cache
46private-dev
47private-etc alternatives,fonts,passwd,tor
48private-opt none
49private-srv none
50private-tmp
51
52dbus-user none
53dbus-system none
diff --git a/etc/profile-m-z/obs.profile b/etc/profile-m-z/obs.profile
new file mode 100644
index 000000000..4277bdab3
--- /dev/null
+++ b/etc/profile-m-z/obs.profile
@@ -0,0 +1,43 @@
1# Firejail profile for obs
2# This file is overwritten after every install/update
3# Persistent local customizations
4include obs.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/obs-studio
9noblacklist ${MUSIC}
10noblacklist ${PICTURES}
11noblacklist ${VIDEOS}
12
13# Allow python (blacklisted by disable-interpreters.inc)
14include allow-python2.inc
15include allow-python3.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25include whitelist-var-common.inc
26
27caps.drop all
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33nou2f
34protocol unix,inet,inet6
35seccomp
36shell none
37tracelog
38
39private-bin bash,obs,obs-ffmpeg-mux,python*,sh
40private-cache
41private-dev
42private-tmp
43
diff --git a/etc/profile-m-z/ocenaudio.profile b/etc/profile-m-z/ocenaudio.profile
new file mode 100644
index 000000000..61fe14c08
--- /dev/null
+++ b/etc/profile-m-z/ocenaudio.profile
@@ -0,0 +1,54 @@
1# Firejail profile for ocenaudio
2# Description: Cross-platform, easy to use, fast and functional audio editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include ocenaudio.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/ocenaudio
10noblacklist ${DOCUMENTS}
11noblacklist ${MUSIC}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26ipc-namespace
27# net none - breaks update functionality and AppArmor on Ubuntu systems
28# uncomment (or put 'net none' in your ocenaudio.local) when needed
29#net none
30netfilter
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36notv
37nou2f
38novideo
39protocol unix
40seccomp
41shell none
42tracelog
43
44private-bin ocenaudio
45private-cache
46private-dev
47private-etc alternatives,asound.conf,fonts,ld.so.cache,pulse
48private-tmp
49
50# breaks preferences
51# dbus-user none
52# dbus-system none
53
54#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-m-z/odt2txt.profile b/etc/profile-m-z/odt2txt.profile
new file mode 100644
index 000000000..3e4bd94b6
--- /dev/null
+++ b/etc/profile-m-z/odt2txt.profile
@@ -0,0 +1,46 @@
1# Firejail profile for odt2txt
2# Description: Simple converter from OpenDocument Text to plain text
3# This file is overwritten after every install/update
4# Persistent local customizations
5include odt2txt.local
6# Persistent global definitions
7include globals.local
8
9blacklist ${RUNUSER}/wayland-*
10
11noblacklist ${DOCUMENTS}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20caps.drop all
21net none
22no3d
23nodvd
24nogroups
25nonewprivs
26noroot
27nosound
28notv
29nou2f
30novideo
31protocol unix
32seccomp
33shell none
34tracelog
35x11 none
36
37private-bin odt2txt
38private-cache
39private-dev
40private-etc alternatives
41private-tmp
42
43dbus-user none
44dbus-system none
45
46read-only ${HOME}
diff --git a/etc/profile-m-z/oggsplt.profile b/etc/profile-m-z/oggsplt.profile
new file mode 100644
index 000000000..5aedadde9
--- /dev/null
+++ b/etc/profile-m-z/oggsplt.profile
@@ -0,0 +1,9 @@
1# Firejail profile for oggsplt
2# This file is overwritten after every install/update
3include oggsplt.local
4# Persistent global definitions
5# added by included profile
6#include globals.local
7
8# Redirect
9include mp3splt.profile
diff --git a/etc/profile-m-z/okular.profile b/etc/profile-m-z/okular.profile
new file mode 100644
index 000000000..de82f8266
--- /dev/null
+++ b/etc/profile-m-z/okular.profile
@@ -0,0 +1,63 @@
1# Firejail profile for okular
2# Description: Universal document viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include okular.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/okular
10noblacklist ${HOME}/.config/okularpartrc
11noblacklist ${HOME}/.config/okularrc
12noblacklist ${HOME}/.kde/share/apps/okular
13noblacklist ${HOME}/.kde/share/config/okularpartrc
14noblacklist ${HOME}/.kde/share/config/okularrc
15noblacklist ${HOME}/.kde4/share/apps/okular
16noblacklist ${HOME}/.kde4/share/config/okularpartrc
17noblacklist ${HOME}/.kde4/share/config/okularrc
18noblacklist ${HOME}/.local/share/okular
19noblacklist ${DOCUMENTS}
20
21include disable-common.inc
22include disable-devel.inc
23include disable-exec.inc
24include disable-interpreters.inc
25include disable-passwdmgr.inc
26include disable-programs.inc
27include disable-xdg.inc
28
29whitelist /usr/share/config.kcfg
30whitelist /usr/share/okular
31whitelist /usr/share/poppler
32include whitelist-usr-share-common.inc
33include whitelist-var-common.inc
34
35apparmor
36caps.drop all
37machine-id
38# net none
39netfilter
40nodvd
41nogroups
42nonewprivs
43noroot
44nosound
45notv
46nou2f
47novideo
48protocol unix
49seccomp
50shell none
51tracelog
52
53private-bin kbuildsycoca4,kdeinit4,lpr,okular
54private-dev
55private-etc alternatives,cups,fonts,kde4rc,kde5rc,ld.so.cache,machine-id,passwd,xdg
56# private-tmp - on KDE we need access to the real /tmp for data exchange with email clients
57
58# dbus-user none
59# dbus-system none
60
61# memory-deny-write-execute
62
63join-or-start okular
diff --git a/etc/profile-m-z/onionshare-gui.profile b/etc/profile-m-z/onionshare-gui.profile
new file mode 100644
index 000000000..5bfcd0527
--- /dev/null
+++ b/etc/profile-m-z/onionshare-gui.profile
@@ -0,0 +1,41 @@
1# Firejail profile for onionshare-gui
2# This file is overwritten after every install/update
3# Persistent local customizations
4include onionshare-gui.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/onionshare
9
10# Allow python (blacklisted by disable-interpreters.inc)
11include allow-python3.inc
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20include whitelist-var-common.inc
21
22caps.drop all
23ipc-namespace
24netfilter
25no3d
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix,inet,inet6
35seccomp
36shell none
37
38private-dev
39private-tmp
40
41memory-deny-write-execute
diff --git a/etc/profile-m-z/ooffice.profile b/etc/profile-m-z/ooffice.profile
new file mode 100644
index 000000000..8348a57fe
--- /dev/null
+++ b/etc/profile-m-z/ooffice.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for libreoffice
2# This file is overwritten after every install/update
3
4# Redirect
5include libreoffice.profile
diff --git a/etc/profile-m-z/ooviewdoc.profile b/etc/profile-m-z/ooviewdoc.profile
new file mode 100644
index 000000000..8348a57fe
--- /dev/null
+++ b/etc/profile-m-z/ooviewdoc.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for libreoffice
2# This file is overwritten after every install/update
3
4# Redirect
5include libreoffice.profile
diff --git a/etc/profile-m-z/open-invaders.profile b/etc/profile-m-z/open-invaders.profile
new file mode 100644
index 000000000..de1ef7800
--- /dev/null
+++ b/etc/profile-m-z/open-invaders.profile
@@ -0,0 +1,42 @@
1# Firejail profile for open-invaders
2# Description: Space Invaders clone
3# This file is overwritten after every install/update
4# Persistent local customizations
5include open-invaders.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.openinvaders
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.openinvaders
19whitelist ${HOME}/.openinvaders
20include whitelist-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25net none
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31nou2f
32novideo
33protocol unix,netlink
34seccomp
35shell none
36
37private-bin open-invaders
38private-dev
39private-tmp
40
41dbus-user none
42dbus-system none
diff --git a/etc/profile-m-z/openarena.profile b/etc/profile-m-z/openarena.profile
new file mode 100644
index 000000000..3b15a6e42
--- /dev/null
+++ b/etc/profile-m-z/openarena.profile
@@ -0,0 +1,45 @@
1# Firejail profile for OpenArena
2# Description: deathmatch FPS game based on GPL idTech3 technology
3# This file is overwritten after every install/update
4# Persistent local customizations
5include openarena.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.openarena
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19include whitelist-var-common.inc
20
21apparmor
22caps.drop all
23# ipc-namespace
24# netfilter
25# nodvd
26# nogroups
27nonewprivs
28noroot
29notv
30# nou2f
31novideo
32protocol unix,inet,inet6,netlink
33seccomp
34shell none
35# tracelog
36
37# disable-mnt
38# private-bin openarena
39private-cache
40private-dev
41# private-etc drirc,machine-id,openal,passwd,selinux,udev,xdg
42private-tmp
43
44# dbus-user none
45# dbus-system none
diff --git a/etc/profile-m-z/openbox.profile b/etc/profile-m-z/openbox.profile
new file mode 100644
index 000000000..1fb93c79c
--- /dev/null
+++ b/etc/profile-m-z/openbox.profile
@@ -0,0 +1,20 @@
1# Firejail profile for openbox
2# Description: Standards-compliant, fast, light-weight and extensible window manager
3# This file is overwritten after every install/update
4# Persistent local customizations
5include openbox.local
6# Persistent global definitions
7include globals.local
8
9# all applications started in OpenBox will run in this profile
10noblacklist ${HOME}/.config/openbox
11include disable-common.inc
12
13caps.drop all
14netfilter
15noroot
16protocol unix,inet,inet6
17seccomp
18
19read-only ${HOME}/.config/openbox/autostart
20read-only ${HOME}/.config/openbox/environment
diff --git a/etc/profile-m-z/opencity.profile b/etc/profile-m-z/opencity.profile
new file mode 100644
index 000000000..59a2d1055
--- /dev/null
+++ b/etc/profile-m-z/opencity.profile
@@ -0,0 +1,47 @@
1# Firejail profile for opencity
2# Description: Full 3D city simulator game project
3# This file is overwritten after every install/update
4# Persistent local customizations
5include opencity.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.opencity
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.opencity
20whitelist ${HOME}/.opencity
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26ipc-namespace
27net none
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38tracelog
39
40disable-mnt
41private-bin opencity
42private-cache
43private-dev
44private-tmp
45
46dbus-user none
47dbus-system none
diff --git a/etc/profile-m-z/openclonk.profile b/etc/profile-m-z/openclonk.profile
new file mode 100644
index 000000000..37f046df2
--- /dev/null
+++ b/etc/profile-m-z/openclonk.profile
@@ -0,0 +1,48 @@
1# Firejail profile for openclonk
2# Description: Multiplayer action, tactics and skill game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include openclonk.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.clonk
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.clonk
20whitelist ${HOME}/.clonk
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26ipc-namespace
27# net none - networked game
28netfilter
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private-bin c4group,openclonk
43private-cache
44private-dev
45private-tmp
46
47dbus-user none
48dbus-system none
diff --git a/etc/profile-m-z/openoffice.org.profile b/etc/profile-m-z/openoffice.org.profile
new file mode 100644
index 000000000..8348a57fe
--- /dev/null
+++ b/etc/profile-m-z/openoffice.org.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for libreoffice
2# This file is overwritten after every install/update
3
4# Redirect
5include libreoffice.profile
diff --git a/etc/profile-m-z/openshot-qt.profile b/etc/profile-m-z/openshot-qt.profile
new file mode 100644
index 000000000..2f886d2ac
--- /dev/null
+++ b/etc/profile-m-z/openshot-qt.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for openshot
2# This file is overwritten after every install/update
3
4# Redirect
5include openshot.profile
diff --git a/etc/profile-m-z/openshot.profile b/etc/profile-m-z/openshot.profile
new file mode 100644
index 000000000..e1839c724
--- /dev/null
+++ b/etc/profile-m-z/openshot.profile
@@ -0,0 +1,42 @@
1# Firejail profile for openshot
2# Description: Create and edit videos and movies
3# This file is overwritten after every install/update
4# Persistent local customizations
5include openshot.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.openshot
10noblacklist ${HOME}/.openshot_qt
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python3.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26net none
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33protocol unix,inet,inet6,netlink
34seccomp
35shell none
36tracelog
37
38private-dev
39private-tmp
40
41dbus-user none
42dbus-system none
diff --git a/etc/profile-m-z/openttd.profile b/etc/profile-m-z/openttd.profile
new file mode 100644
index 000000000..57e3787aa
--- /dev/null
+++ b/etc/profile-m-z/openttd.profile
@@ -0,0 +1,47 @@
1# Firejail profile for openttd
2# Description: Transport system simulation game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include openttd.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.openttd
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.openttd
20whitelist ${HOME}/.openttd
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26ipc-namespace
27net none
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33nou2f
34novideo
35protocol unix,inet,inet6
36seccomp
37shell none
38tracelog
39
40disable-mnt
41private-bin openttd
42private-cache
43private-dev
44private-tmp
45
46dbus-user none
47dbus-system none
diff --git a/etc/profile-m-z/opera-beta.profile b/etc/profile-m-z/opera-beta.profile
new file mode 100644
index 000000000..8658d30c6
--- /dev/null
+++ b/etc/profile-m-z/opera-beta.profile
@@ -0,0 +1,17 @@
1# Firejail profile for opera-beta
2# This file is overwritten after every install/update
3# Persistent local customizations
4include opera-beta.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/opera
9noblacklist ${HOME}/.config/opera-beta
10
11mkdir ${HOME}/.cache/opera
12mkdir ${HOME}/.config/opera-beta
13whitelist ${HOME}/.cache/opera
14whitelist ${HOME}/.config/opera-beta
15
16# Redirect
17include chromium-common.profile
diff --git a/etc/profile-m-z/opera.profile b/etc/profile-m-z/opera.profile
new file mode 100644
index 000000000..b342b3961
--- /dev/null
+++ b/etc/profile-m-z/opera.profile
@@ -0,0 +1,21 @@
1# Firejail profile for opera
2# Description: A fast and secure web browser
3# This file is overwritten after every install/update
4# Persistent local customizations
5include opera.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/opera
10noblacklist ${HOME}/.config/opera
11noblacklist ${HOME}/.opera
12
13mkdir ${HOME}/.cache/opera
14mkdir ${HOME}/.config/opera
15mkdir ${HOME}/.opera
16whitelist ${HOME}/.cache/opera
17whitelist ${HOME}/.config/opera
18whitelist ${HOME}/.opera
19
20# Redirect
21include chromium-common.profile
diff --git a/etc/profile-m-z/orage.profile b/etc/profile-m-z/orage.profile
new file mode 100644
index 000000000..4e12892d6
--- /dev/null
+++ b/etc/profile-m-z/orage.profile
@@ -0,0 +1,39 @@
1# Firejail profile for orage
2# Description: Calendar for Xfce Desktop Environment
3# This file is overwritten after every install/update
4# Persistent local customizations
5include orage.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/orage
10noblacklist ${HOME}/.local/share/orage
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20caps.drop all
21netfilter
22no3d
23nodvd
24nogroups
25nonewprivs
26noroot
27# nosound - calendar application, It must be able to play sound to wake you up.
28notv
29nou2f
30novideo
31protocol unix
32seccomp
33shell none
34
35disable-mnt
36private-cache
37private-dev
38private-tmp
39
diff --git a/etc/profile-m-z/ostrichriders.profile b/etc/profile-m-z/ostrichriders.profile
new file mode 100644
index 000000000..378d267f6
--- /dev/null
+++ b/etc/profile-m-z/ostrichriders.profile
@@ -0,0 +1,47 @@
1# Firejail profile for ostrichriders
2# Description: Knights flying on ostriches compete against other riders
3# This file is overwritten after every install/update
4# Persistent local customizations
5include ostrichriders.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.ostrichriders
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.ostrichriders
20whitelist ${HOME}/.ostrichriders
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24caps.drop all
25ipc-namespace
26net none
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix,netlink
35seccomp
36shell none
37tracelog
38
39disable-mnt
40private-bin ostrichriders
41private-cache
42# private-dev should be commented for controllers
43private-dev
44private-tmp
45
46dbus-user none
47dbus-system none
diff --git a/etc/profile-m-z/out123.profile b/etc/profile-m-z/out123.profile
new file mode 100644
index 000000000..4754c05ba
--- /dev/null
+++ b/etc/profile-m-z/out123.profile
@@ -0,0 +1,9 @@
1# Firejail profile for out123
2# Persistent local customizations
3include out123.local
4# Persistent global definitions
5# added by included profile
6#include globals.local
7
8# Redirect
9include mpg123.profile
diff --git a/etc/profile-m-z/p7zip.profile b/etc/profile-m-z/p7zip.profile
new file mode 100644
index 000000000..652fac7bd
--- /dev/null
+++ b/etc/profile-m-z/p7zip.profile
@@ -0,0 +1,12 @@
1# Firejail profile for p7zip
2# Description: File archiver with high compression ratio
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include p7zip.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include 7z.profile
diff --git a/etc/profile-m-z/palemoon.profile b/etc/profile-m-z/palemoon.profile
new file mode 100644
index 000000000..acb2ce176
--- /dev/null
+++ b/etc/profile-m-z/palemoon.profile
@@ -0,0 +1,26 @@
1# Firejail profile for palemoon
2# This file is overwritten after every install/update
3# Persistent local customizations
4include palemoon.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/moonchild productions/pale moon
9noblacklist ${HOME}/.moonchild productions/pale moon
10
11mkdir ${HOME}/.cache/moonchild productions/pale moon
12mkdir ${HOME}/.moonchild productions
13whitelist ${HOME}/.cache/moonchild productions/pale moon
14whitelist ${HOME}/.moonchild productions
15
16# Palemoon can use the full firejail seccomp filter (unlike firefox >= 60)
17seccomp
18ignore seccomp
19
20#private-bin palemoon
21# private-etc must first be enabled in firefox-common.profile
22#private-etc palemoon
23#private-opt palemoon
24
25# Redirect
26include firefox-common.profile
diff --git a/etc/profile-m-z/pandoc.profile b/etc/profile-m-z/pandoc.profile
new file mode 100644
index 000000000..354f6eab8
--- /dev/null
+++ b/etc/profile-m-z/pandoc.profile
@@ -0,0 +1,56 @@
1# Firejail profile for pandoc
2# Description: general markup converter
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include pandoc.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11blacklist ${RUNUSER}
12
13noblacklist ${DOCUMENTS}
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23# breaks pdf output
24#include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28ipc-namespace
29machine-id
30net none
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix
41seccomp
42shell none
43tracelog
44x11 none
45
46disable-mnt
47private-bin context,latex,mktexfmt,pandoc,pdflatex,pdfroff,prince,weasyprint,wkhtmltopdf
48private-cache
49private-dev
50private-etc alternatives,texlive
51private-tmp
52
53dbus-user none
54dbus-system none
55
56memory-deny-write-execute
diff --git a/etc/profile-m-z/parole.profile b/etc/profile-m-z/parole.profile
new file mode 100644
index 000000000..e7a0694ed
--- /dev/null
+++ b/etc/profile-m-z/parole.profile
@@ -0,0 +1,30 @@
1# Firejail profile for parole
2# Description: Media player based on GStreamer framework
3# This file is overwritten after every install/update
4# Persistent local customizations
5include parole.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${MUSIC}
10noblacklist ${VIDEOS}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19caps.drop all
20netfilter
21nonewprivs
22noroot
23notv
24protocol unix,inet,inet6
25seccomp
26shell none
27
28private-bin dbus-launch,parole
29private-cache
30private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,group,machine-id,passwd,pki,pulse,ssl
diff --git a/etc/profile-m-z/patch.profile b/etc/profile-m-z/patch.profile
new file mode 100644
index 000000000..2bb85e3c6
--- /dev/null
+++ b/etc/profile-m-z/patch.profile
@@ -0,0 +1,50 @@
1# Firejail profile for patch
2# Description: Apply a diff file to an original
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include patch.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11blacklist ${RUNUSER}
12
13noblacklist ${DOCUMENTS}
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-xdg.inc
21
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24
25caps.drop all
26ipc-namespace
27net none
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40tracelog
41x11 none
42
43private-bin patch,red
44private-dev
45private-lib libfakeroot
46
47dbus-user none
48dbus-system none
49
50memory-deny-write-execute
diff --git a/etc/profile-m-z/pavucontrol-qt.profile b/etc/profile-m-z/pavucontrol-qt.profile
new file mode 100644
index 000000000..f96ba14d2
--- /dev/null
+++ b/etc/profile-m-z/pavucontrol-qt.profile
@@ -0,0 +1,19 @@
1# Firejail profile for pavucontrol-qt
2# Description: PulseAudio Volume Control [Qt]
3# This file is overwritten after every install/update
4# Persistent local customizations
5include pavucontrol-qt.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10noblacklist ${HOME}/.config/pavucontrol-qt
11
12mkdir ${HOME}/.config/pavucontrol-qt
13whitelist ${HOME}/.config/pavucontrol-qt
14
15private-bin pavucontrol-qt
16ignore private-lib
17
18# Redirect
19include pavucontrol.profile
diff --git a/etc/profile-m-z/pavucontrol.profile b/etc/profile-m-z/pavucontrol.profile
new file mode 100644
index 000000000..f7d3576da
--- /dev/null
+++ b/etc/profile-m-z/pavucontrol.profile
@@ -0,0 +1,56 @@
1# Firejail profile for pavucontrol
2# Description: PulseAudio Volume Control [GTK]
3# This file is overwritten after every install/update
4# Persistent local customizations
5include pavucontrol.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/pavucontrol.ini
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19# whitelisting in ${HOME} is broken, see #3112
20#mkfile ${HOME}/.config/pavucontrol.ini
21#whitelist ${HOME}/.config/pavucontrol.ini
22whitelist /usr/share/pavucontrol
23whitelist /usr/share/pavucontrol-qt
24#include whitelist-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30netfilter
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36notv
37nou2f
38novideo
39protocol unix,inet,inet6
40seccomp
41shell none
42tracelog
43
44disable-mnt
45private-bin pavucontrol
46private-cache
47private-dev
48private-etc alternatives,asound.conf,avahi,fonts,machine-id,pulse
49private-lib
50private-tmp
51
52dbus-user none
53dbus-system none
54
55# mdwe is broken under Wayland, but works under Xorg.
56#memory-deny-write-execute
diff --git a/etc/profile-m-z/pcmanfm.profile b/etc/profile-m-z/pcmanfm.profile
new file mode 100644
index 000000000..4e53f9d6e
--- /dev/null
+++ b/etc/profile-m-z/pcmanfm.profile
@@ -0,0 +1,35 @@
1# Firejail profile for pcmanfm
2# Description: Extremely fast and lightweight file manager
3# This file is overwritten after every install/update
4# Persistent local customizations
5include pcmanfm.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/Trash
10# noblacklist ${HOME}/.config/libfm - disable-programs.inc is disabled, see below
11# noblacklist ${HOME}/.config/pcmanfm
12
13include disable-common.inc
14include disable-devel.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17# include disable-programs.inc
18
19allusers
20caps.drop all
21# net none - see issue #1467, computer:/// location broken
22no3d
23nodvd
24nonewprivs
25noroot
26nosound
27notv
28novideo
29protocol unix
30seccomp
31shell none
32tracelog
33
34# dbus-user none
35# dbus-system none
diff --git a/etc/profile-m-z/pdfchain.profile b/etc/profile-m-z/pdfchain.profile
new file mode 100644
index 000000000..4b6da4d6f
--- /dev/null
+++ b/etc/profile-m-z/pdfchain.profile
@@ -0,0 +1,43 @@
1# Firejail profile for pdfchain
2# This file is overwritten after every install/update
3# Persistent local customizations
4include pdfchain.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${DOCUMENTS}
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16include disable-xdg.inc
17
18include whitelist-var-common.inc
19
20caps.drop all
21ipc-namespace
22net none
23no3d
24nogroups
25nonewprivs
26noroot
27nosound
28notv
29nou2f
30novideo
31protocol unix
32seccomp
33shell none
34
35private-bin pdfchain,pdftk,sh
36private-dev
37private-etc alternatives,dconf,fonts,gtk-3.0,xdg
38private-tmp
39
40dbus-user none
41dbus-system none
42
43memory-deny-write-execute
diff --git a/etc/profile-m-z/pdflatex.profile b/etc/profile-m-z/pdflatex.profile
new file mode 100644
index 000000000..caf980d4d
--- /dev/null
+++ b/etc/profile-m-z/pdflatex.profile
@@ -0,0 +1,12 @@
1# Firejail profile for pdflatex
2# This file is overwritten after every install/update
3# Persistent local customizations
4include pdflatex.local
5# Persistent global definitions
6include globals.local
7
8private-bin pdflatex
9
10# Redirect
11include latex-common.profile
12
diff --git a/etc/profile-m-z/pdfmod.profile b/etc/profile-m-z/pdfmod.profile
new file mode 100644
index 000000000..fb3c42526
--- /dev/null
+++ b/etc/profile-m-z/pdfmod.profile
@@ -0,0 +1,44 @@
1# Firejail profile for pdfmod
2# Description: Simple tool for modifying PDF documents
3# This file is overwritten after every install/update
4# Persistent local customizations
5include pdfmod.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/pdfmod
10noblacklist ${HOME}/.config/pdfmod
11noblacklist ${DOCUMENTS}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-var-common.inc
22
23caps.drop all
24ipc-namespace
25machine-id
26net none
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39
40private-dev
41private-tmp
42
43dbus-user none
44dbus-system none
diff --git a/etc/profile-m-z/pdfsam.profile b/etc/profile-m-z/pdfsam.profile
new file mode 100644
index 000000000..2f4227159
--- /dev/null
+++ b/etc/profile-m-z/pdfsam.profile
@@ -0,0 +1,44 @@
1# Firejail profile for pdfsam
2# Description: PDF Split and Merge
3# This file is overwritten after every install/update
4# Persistent local customizations
5include pdfsam.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${DOCUMENTS}
10
11# Allow java (blacklisted by disable-devel.inc)
12include allow-java.inc
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22caps.drop all
23machine-id
24net none
25no3d
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37
38private-bin archlinux-java,awk,bash,dirname,expr,find,grep,java,java-config,ls,pdfsam,readlink,sh,sort,uname,which
39private-cache
40private-dev
41private-tmp
42
43dbus-user none
44dbus-system none
diff --git a/etc/profile-m-z/pdftotext.profile b/etc/profile-m-z/pdftotext.profile
new file mode 100644
index 000000000..d9e4aedfb
--- /dev/null
+++ b/etc/profile-m-z/pdftotext.profile
@@ -0,0 +1,53 @@
1# Firejail profile for pdftotext
2# Description: Portable Document Format (PDF) to text converter
3# This file is overwritten after every install/update
4# Persistent local customizations
5include pdftotext.local
6# Persistent global definitions
7include globals.local
8
9blacklist ${RUNUSER}/wayland-*
10blacklist ${RUNUSER}
11
12noblacklist ${DOCUMENTS}
13
14include disable-common.inc
15include disable-devel.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21whitelist ${DOCUMENTS}
22whitelist ${DOWNLOADS}
23whitelist /usr/share/poppler
24include whitelist-usr-share-common.inc
25include whitelist-var-common.inc
26
27caps.drop all
28ipc-namespace
29machine-id
30net none
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix
41seccomp
42shell none
43tracelog
44x11 none
45
46private-bin pdftotext
47private-cache
48private-dev
49private-etc alternatives
50private-tmp
51
52dbus-user none
53dbus-system none
diff --git a/etc/profile-m-z/peek.profile b/etc/profile-m-z/peek.profile
new file mode 100644
index 000000000..66fdd6496
--- /dev/null
+++ b/etc/profile-m-z/peek.profile
@@ -0,0 +1,43 @@
1# Firejail profile for peek
2# This file is overwritten after every install/update
3# Persistent local customizations
4include peek.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/peek
9noblacklist ${PICTURES}
10noblacklist ${VIDEOS}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20caps.drop all
21net none
22no3d
23nodvd
24nogroups
25nonewprivs
26noroot
27nosound
28notv
29nou2f
30novideo
31protocol unix
32seccomp
33shell none
34
35# private-bin breaks gif mode, mp4 and webm mode work fine however
36# private-bin convert,ffmpeg,peek
37private-dev
38private-tmp
39
40dbus-user none
41dbus-system none
42
43memory-deny-write-execute
diff --git a/etc/profile-m-z/penguin-command.profile b/etc/profile-m-z/penguin-command.profile
new file mode 100644
index 000000000..d4d3e914d
--- /dev/null
+++ b/etc/profile-m-z/penguin-command.profile
@@ -0,0 +1,41 @@
1# Firejail profile for open-invaders
2# Description: Space Invaders clone
3# This file is overwritten after every install/update
4# Persistent local customizations
5include penguin-command.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.penguin-command
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18whitelist ${HOME}/.penguin-command
19include whitelist-common.inc
20include whitelist-var-common.inc
21
22apparmor
23caps.drop all
24net none
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix,netlink
33seccomp
34shell none
35
36private-bin penguin-command
37private-dev
38private-tmp
39
40dbus-user none
41dbus-system none
diff --git a/etc/profile-m-z/picard.profile b/etc/profile-m-z/picard.profile
new file mode 100644
index 000000000..15fc7a454
--- /dev/null
+++ b/etc/profile-m-z/picard.profile
@@ -0,0 +1,43 @@
1# Firejail profile for picard
2# Description: Next-Generation MusicBrainz audio files tagger
3# This file is overwritten after every install/update
4# Persistent local customizations
5include picard.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/MusicBrainz
10noblacklist ${HOME}/.config/MusicBrainz
11noblacklist ${MUSIC}
12
13# Allow python (blacklisted by disable-interpreters.inc)
14include allow-python2.inc
15include allow-python3.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25include whitelist-var-common.inc
26
27caps.drop all
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix,inet,inet6
38seccomp
39shell none
40
41private-dev
42private-tmp
43
diff --git a/etc/profile-m-z/pidgin.profile b/etc/profile-m-z/pidgin.profile
new file mode 100644
index 000000000..2e4215744
--- /dev/null
+++ b/etc/profile-m-z/pidgin.profile
@@ -0,0 +1,45 @@
1# Firejail profile for pidgin
2# Description: Graphical multi-protocol instant messaging client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include pidgin.local
6# Persistent global definitions
7include globals.local
8
9ignore noexec ${RUNUSER}
10ignore noexec /dev/shm
11
12noblacklist ${HOME}/.purple
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22mkdir ${HOME}/.purple
23whitelist ${HOME}/.purple
24include whitelist-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30netfilter
31nodvd
32nogroups
33nonewprivs
34noroot
35notv
36nou2f
37protocol unix,inet,inet6
38seccomp
39# shell none
40tracelog
41
42# private-bin pidgin
43private-cache
44private-dev
45private-tmp
diff --git a/etc/profile-m-z/ping.profile b/etc/profile-m-z/ping.profile
new file mode 100644
index 000000000..3ef8ad64a
--- /dev/null
+++ b/etc/profile-m-z/ping.profile
@@ -0,0 +1,56 @@
1# Firejail profile for ping
2# Description: send ICMP ECHO_REQUEST to network hosts
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include ping.local
7# Persistent global definitions
8include globals.local
9
10blacklist /tmp/.X11-unix
11blacklist ${RUNUSER}/wayland-*
12blacklist ${RUNUSER}
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22include whitelist-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.keep net_raw
28ipc-namespace
29#net tun0
30#netfilter /etc/firejail/ping.net
31netfilter
32no3d
33nodvd
34nogroups
35# ping needs to rise privileges, noroot and nonewprivs will kill it
36#nonewprivs
37#noroot
38nosound
39notv
40nou2f
41novideo
42# protocol command is built using seccomp; nonewprivs will kill it
43#protocol unix,inet,inet6,netlink,packet
44# killed by no-new-privs
45#seccomp
46
47disable-mnt
48private
49#private-bin has mammoth problems with execvp: "No such file or directory"
50private-dev
51# /etc/hosts is required in private-etc; however, just adding it to the list doesn't solve the problem!
52#private-etc ca-certificates,crypto-policies,hosts,pki,resolv.conf,ssl
53private-tmp
54
55# memory-deny-write-execute is built using seccomp; nonewprivs will kill it
56#memory-deny-write-execute
diff --git a/etc/profile-m-z/pingus.profile b/etc/profile-m-z/pingus.profile
new file mode 100644
index 000000000..cfe45b9c9
--- /dev/null
+++ b/etc/profile-m-z/pingus.profile
@@ -0,0 +1,42 @@
1# Firejail profile for pingus
2# Description: Free Lemmings(TM) clone
3# This file is overwritten after every install/update
4# Persistent local customizations
5include pingus.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.pingus
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.pingus
19whitelist ${HOME}/.pingus
20include whitelist-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25net none
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31nou2f
32novideo
33protocol unix,netlink
34seccomp
35shell none
36
37# private-bin pingus
38private-dev
39private-tmp
40
41dbus-user none
42dbus-system none
diff --git a/etc/profile-m-z/pinta.profile b/etc/profile-m-z/pinta.profile
new file mode 100644
index 000000000..7d94972c4
--- /dev/null
+++ b/etc/profile-m-z/pinta.profile
@@ -0,0 +1,41 @@
1# Firejail profile for pinta
2# Description: Simple drawing/painting program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include pinta.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Pinta
10noblacklist ${DOCUMENTS}
11noblacklist ${PICTURES}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21caps.drop all
22ipc-namespace
23net none
24nodvd
25nogroups
26nonewprivs
27noroot
28nosound
29notv
30nou2f
31novideo
32protocol unix
33seccomp
34shell none
35
36private-dev
37private-cache
38private-tmp
39
40dbus-user none
41dbus-system none
diff --git a/etc/profile-m-z/pioneer.profile b/etc/profile-m-z/pioneer.profile
new file mode 100644
index 000000000..8b1c5afb8
--- /dev/null
+++ b/etc/profile-m-z/pioneer.profile
@@ -0,0 +1,46 @@
1# Firejail profile for pioneer
2# Description: A game of lonely space adventure
3# This file is overwritten after every install/update
4# Persistent local customizations
5include pioneer.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.pioneer
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.pioneer
20whitelist ${HOME}/.pioneer
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24caps.drop all
25ipc-namespace
26net none
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix,netlink
35seccomp
36shell none
37tracelog
38
39disable-mnt
40private-bin modelcompiler,pioneer,savegamedump
41private-cache
42private-dev
43private-tmp
44
45dbus-user none
46dbus-system none
diff --git a/etc/profile-m-z/pithos.profile b/etc/profile-m-z/pithos.profile
new file mode 100644
index 000000000..ad56ce525
--- /dev/null
+++ b/etc/profile-m-z/pithos.profile
@@ -0,0 +1,42 @@
1# Firejail profile for pithos
2# Description: Pandora Radio client for the GNOME desktop
3# This file is overwritten after every install/update
4# Persistent local customizations
5include pithos.local
6# Persistent global definitions
7include globals.local
8
9# Allow python (blacklisted by disable-interpreters.inc)
10include allow-python2.inc
11include allow-python3.inc
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24caps.drop all
25netfilter
26no3d
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix,inet,inet6
35seccomp
36shell none
37
38disable-mnt
39private-bin env,pithos,python*
40private-dev
41private-tmp
42
diff --git a/etc/profile-m-z/pitivi.profile b/etc/profile-m-z/pitivi.profile
new file mode 100644
index 000000000..c722e29b4
--- /dev/null
+++ b/etc/profile-m-z/pitivi.profile
@@ -0,0 +1,42 @@
1# Firejail profile for pitivi
2# Description: Non-linear audio/video editor using GStreamer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include pitivi.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/pitivi
10
11# Allow python (blacklisted by disable-interpreters.inc)
12include allow-python2.inc
13include allow-python3.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22include whitelist-runuser-common.inc
23include whitelist-var-common.inc
24
25apparmor
26caps.drop all
27ipc-namespace
28net none
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39
40private-dev
41private-tmp
42
diff --git a/etc/profile-m-z/pix.profile b/etc/profile-m-z/pix.profile
new file mode 100644
index 000000000..9864ed718
--- /dev/null
+++ b/etc/profile-m-z/pix.profile
@@ -0,0 +1,36 @@
1# Firejail profile for pix
2# This file is overwritten after every install/update
3# Persistent local customizations
4include pix.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/pix
9noblacklist ${HOME}/.local/share/pix
10noblacklist ${HOME}/.Steam
11noblacklist ${HOME}/.steam
12
13include disable-common.inc
14include disable-devel.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19caps.drop all
20nodvd
21nogroups
22nonewprivs
23noroot
24nosound
25notv
26nou2f
27novideo
28protocol unix
29seccomp
30shell none
31tracelog
32
33private-bin pix
34private-cache
35private-dev
36private-tmp
diff --git a/etc/profile-m-z/planmaker18.profile b/etc/profile-m-z/planmaker18.profile
new file mode 100644
index 000000000..2ba8e86c0
--- /dev/null
+++ b/etc/profile-m-z/planmaker18.profile
@@ -0,0 +1,10 @@
1# Firejail profile for planmaker18
2# Description: SoftMaker Office - spreadsheet program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include planmaker18.local
6# Persistent global definitions
7include globals.local
8
9# Redirect
10include softmaker-common.inc
diff --git a/etc/profile-m-z/planmaker18free.profile b/etc/profile-m-z/planmaker18free.profile
new file mode 100644
index 000000000..d0bce44f5
--- /dev/null
+++ b/etc/profile-m-z/planmaker18free.profile
@@ -0,0 +1,10 @@
1# Firejail profile for planmaker18free
2# Description: SoftMaker FreeOffice - spreadsheet program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include planmaker18free.local
6# Persistent global definitions
7include globals.local
8
9# Redirect
10include softmaker-common.inc
diff --git a/etc/profile-m-z/playonlinux.profile b/etc/profile-m-z/playonlinux.profile
new file mode 100644
index 000000000..03091af6d
--- /dev/null
+++ b/etc/profile-m-z/playonlinux.profile
@@ -0,0 +1,37 @@
1# Firejail profile for playonlinux
2# Description: Front-end for Wine
3# This file is overwritten after every install/update
4# Persistent local customizations
5include playonlinux.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.Steam
10noblacklist ${HOME}/.local/share/Steam
11noblacklist ${HOME}/.local/share/steam
12noblacklist ${HOME}/.steam
13noblacklist ${HOME}/.PlayOnLinux
14
15# nc is needed to run playonlinux
16noblacklist ${PATH}/nc
17
18# Allow python (blacklisted by disable-interpreters.inc)
19include allow-python2.inc
20include allow-python3.inc
21
22# Allow perl (blacklisted by disable-interpreters.inc)
23include allow-perl.inc
24
25include disable-common.inc
26include disable-devel.inc
27include disable-interpreters.inc
28include disable-programs.inc
29
30caps.drop all
31netfilter
32nodvd
33nogroups
34nonewprivs
35noroot
36notv
37seccomp
diff --git a/etc/profile-m-z/pluma.profile b/etc/profile-m-z/pluma.profile
new file mode 100644
index 000000000..ea8550bda
--- /dev/null
+++ b/etc/profile-m-z/pluma.profile
@@ -0,0 +1,53 @@
1# Firejail profile for pluma
2# Description: Official text editor of the MATE desktop environment
3# This file is overwritten after every install/update
4# Persistent local customizations
5include pluma.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/enchant
10noblacklist ${HOME}/.config/pluma
11
12# Allows files commonly used by IDEs
13include allow-common-devel.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22include whitelist-var-common.inc
23
24# apparmor - makes settings immutable
25caps.drop all
26machine-id
27# net none - makes settings immutable
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40tracelog
41
42private-bin pluma
43private-dev
44private-lib aspell,gconv,libgspell-1.so.*,libreadline.so.*,libtinfo.so.*,pluma
45private-tmp
46
47# makes settings immutable
48# dbus-user none
49# dbus-system none
50
51memory-deny-write-execute
52
53join-or-start pluma
diff --git a/etc/profile-m-z/pngquant.profile b/etc/profile-m-z/pngquant.profile
new file mode 100644
index 000000000..e9338d4b9
--- /dev/null
+++ b/etc/profile-m-z/pngquant.profile
@@ -0,0 +1,53 @@
1# Firejail profile for pngquant
2# Description: PNG converter and lossy image compressor
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include pngquant.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19include whitelist-runuser-common.inc
20include whitelist-usr-share-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25ipc-namespace
26machine-id
27net none
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37# protocol can be empty, but this is not yet supported see #639
38protocol inet
39seccomp
40shell none
41tracelog
42x11 none
43
44private-bin pngquant
45private-cache
46private-dev
47private-etc alternatives
48private-tmp
49
50dbus-user none
51dbus-system none
52
53memory-deny-write-execute
diff --git a/etc/profile-m-z/polari.profile b/etc/profile-m-z/polari.profile
new file mode 100644
index 000000000..87a53775f
--- /dev/null
+++ b/etc/profile-m-z/polari.profile
@@ -0,0 +1,51 @@
1# Firejail profile for polari
2# Description: Internet Relay Chat (IRC) client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include polari.local
6# Persistent global definitions
7include globals.local
8
9# Allow gjs (blacklisted by disable-interpreters.inc)
10include allow-gjs.inc
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.cache/telepathy
19mkdir ${HOME}/.config/telepathy-account-widgets
20mkdir ${HOME}/.local/share/Empathy
21mkdir ${HOME}/.local/share/TpLogger
22mkdir ${HOME}/.local/share/telepathy
23mkdir ${HOME}/.purple
24whitelist ${HOME}/.cache/telepathy
25whitelist ${HOME}/.config/telepathy-account-widgets
26whitelist ${HOME}/.local/share/Empathy
27whitelist ${HOME}/.local/share/TpLogger
28whitelist ${HOME}/.local/share/telepathy
29whitelist ${HOME}/.purple
30include whitelist-common.inc
31include whitelist-runuser-common.inc
32
33caps.drop all
34netfilter
35no3d
36nodvd
37nogroups
38nonewprivs
39noroot
40nosound
41notv
42nou2f
43protocol unix,inet,inet6
44seccomp
45shell none
46tracelog
47
48disable-mnt
49private-dev
50private-tmp
51
diff --git a/etc/profile-m-z/ppsspp.profile b/etc/profile-m-z/ppsspp.profile
new file mode 100644
index 000000000..c62e53151
--- /dev/null
+++ b/etc/profile-m-z/ppsspp.profile
@@ -0,0 +1,42 @@
1# Firejail profile for ppsspp
2# Description: A PSP emulator written in C++
3# This file is overwritten after every install/update
4# Persistent local customizations
5include ppsspp.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/ppsspp
10noblacklist ${DOCUMENTS}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-var-common.inc
21
22caps.drop all
23ipc-namespace
24net none
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30novideo
31protocol unix,netlink
32seccomp
33shell none
34
35# private-dev is disabled to allow controller support
36#private-dev
37private-etc alternatives,asound.conf,ca-certificates,crypto-policies,drirc,fonts,group,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,localtime,machine-id,nsswitch.conf,passwd,pki,pulse,resolv.conf,ssl
38private-opt ppsspp
39private-tmp
40
41dbus-user none
42dbus-system none
diff --git a/etc/profile-m-z/pragha.profile b/etc/profile-m-z/pragha.profile
new file mode 100644
index 000000000..019c1a547
--- /dev/null
+++ b/etc/profile-m-z/pragha.profile
@@ -0,0 +1,38 @@
1# Firejail profile for pragha
2# Description: A lightweight GTK music player
3# This file is overwritten after every install/update
4# Persistent local customizations
5include pragha.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/pragha
10noblacklist ${MUSIC}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-var-common.inc
21
22caps.drop all
23netfilter
24no3d
25nogroups
26nonewprivs
27noroot
28notv
29nou2f
30novideo
31protocol unix,inet,inet6
32seccomp
33shell none
34
35private-dev
36private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-3.0,host.conf,hostname,hosts,machine-id,pki,pulse,resolv.conf,ssl,xdg
37private-tmp
38
diff --git a/etc/profile-m-z/presentations18.profile b/etc/profile-m-z/presentations18.profile
new file mode 100644
index 000000000..d4f531060
--- /dev/null
+++ b/etc/profile-m-z/presentations18.profile
@@ -0,0 +1,11 @@
1# Firejail profile for presentations18
2# Description: SoftMaker Office - presentations software
3# This file is overwritten after every install/update
4# Persistent local customizations
5include presentations18.local
6# Persistent global definitions
7include globals.local
8
9# Redirect
10include softmaker-common.inc
11
diff --git a/etc/profile-m-z/presentations18free.profile b/etc/profile-m-z/presentations18free.profile
new file mode 100644
index 000000000..e2319f13f
--- /dev/null
+++ b/etc/profile-m-z/presentations18free.profile
@@ -0,0 +1,10 @@
1# Firejail profile for presentations18free
2# Description: SoftMaker FreeOffice - presentations software
3# This file is overwritten after every install/update
4# Persistent local customizations
5include presentations18free.local
6# Persistent global definitions
7include globals.local
8
9# Redirect
10include softmaker-common.inc
diff --git a/etc/profile-m-z/profanity.profile b/etc/profile-m-z/profanity.profile
new file mode 100644
index 000000000..b7aa2bf52
--- /dev/null
+++ b/etc/profile-m-z/profanity.profile
@@ -0,0 +1,52 @@
1# Firejail profile for profanity
2# Description: profanity is an XMPP chat client for the terminal
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include profanity.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${HOME}/.config/profanity
11noblacklist ${HOME}/.local/share/profanity
12
13# Allow Python
14include allow-python2.inc
15include allow-python3.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28caps.drop all
29netfilter
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix,inet,inet6
40seccomp
41shell none
42
43private-bin profanity
44private-cache
45private-dev
46private-etc alternatives,ca-certificates,crypto-policies,localtime,mime.types,nsswitch.conf,pki,resolv.conf,ssl
47private-tmp
48
49dbus-user none
50dbus-system none
51
52memory-deny-write-execute
diff --git a/etc/profile-m-z/psi-plus.profile b/etc/profile-m-z/psi-plus.profile
new file mode 100644
index 000000000..16fffe517
--- /dev/null
+++ b/etc/profile-m-z/psi-plus.profile
@@ -0,0 +1,45 @@
1# Firejail profile for psi-plus
2# Description: Qt-based XMPP/Jabber client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include psi-plus.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/psi+
10noblacklist ${HOME}/.local/share/psi+
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19mkdir ${HOME}/.cache/psi+
20mkdir ${HOME}/.config/psi+
21mkdir ${HOME}/.local/share/psi+
22whitelist ${DOWNLOADS}
23whitelist ${HOME}/.cache/psi+
24whitelist ${HOME}/.config/psi+
25whitelist ${HOME}/.local/share/psi+
26include whitelist-common.inc
27
28caps.drop all
29netfilter
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35notv
36nou2f
37novideo
38protocol unix,inet,inet6
39# QtWebengine needs chroot to set up its own sandbox
40seccomp !chroot
41shell none
42
43disable-mnt
44private-dev
45private-tmp
diff --git a/etc/profile-m-z/pybitmessage.profile b/etc/profile-m-z/pybitmessage.profile
new file mode 100644
index 000000000..034c144c7
--- /dev/null
+++ b/etc/profile-m-z/pybitmessage.profile
@@ -0,0 +1,46 @@
1# Firejail profile for pybitmessage
2# This file is overwritten after every install/update
3# Persistent local customizations
4include pybitmessage.local
5# Persistent global definitions
6include globals.local
7
8noblacklist /sbin
9noblacklist /usr/local/sbin
10noblacklist /usr/sbin
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-interpreters.inc
22
23include whitelist-var-common.inc
24
25caps.drop all
26ipc-namespace
27netfilter
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix,inet,inet6,netlink
38seccomp
39shell none
40
41disable-mnt
42private-bin bash,env,ldconfig,pybitmessage,python*,sh,stat
43private-dev
44private-etc alternatives,ca-certificates,crypto-policies,fonts,gtk-2.0,hosts,ld.so.cache,ld.so.preload,localtime,pki,pki,PyBitmessage,PyBitmessage.conf,resolv.conf,selinux,sni-qt.conf,ssl,system-fips,Trolltech.conf,xdg
45private-tmp
46
diff --git a/etc/profile-m-z/pycharm-community.profile b/etc/profile-m-z/pycharm-community.profile
new file mode 100644
index 000000000..9ee426a95
--- /dev/null
+++ b/etc/profile-m-z/pycharm-community.profile
@@ -0,0 +1,38 @@
1# Firejail profile for pycharm-community
2# This file is overwritten after every install/update
3# Persistent local customizations
4include pycharm-community.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.PyCharmCE*
9
10# Allow java (blacklisted by disable-devel.inc)
11include allow-java.inc
12
13# Allows files commonly used by IDEs
14include allow-common-devel.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21caps.drop all
22machine-id
23nodvd
24nogroups
25nosound
26notv
27nou2f
28novideo
29shell none
30tracelog
31
32# private-etc alternatives,fonts,passwd - minimal required to run but will probably break
33# program!
34private-cache
35private-dev
36private-tmp
37
38noexec /tmp
diff --git a/etc/profile-m-z/pycharm-professional.profile b/etc/profile-m-z/pycharm-professional.profile
new file mode 100644
index 000000000..a14d0268b
--- /dev/null
+++ b/etc/profile-m-z/pycharm-professional.profile
@@ -0,0 +1,7 @@
1# Firejail profilen alias for pycharm-professional
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.PyCharm*
5
6# Redirect
7include pycharm-community.profile
diff --git a/etc/profile-m-z/pzstd.profile b/etc/profile-m-z/pzstd.profile
new file mode 100644
index 000000000..ce9af3286
--- /dev/null
+++ b/etc/profile-m-z/pzstd.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for zstd
2# This file is overwritten after every install/update
3
4# Redirect
5include zstd.profile
diff --git a/etc/profile-m-z/qbittorrent.profile b/etc/profile-m-z/qbittorrent.profile
new file mode 100644
index 000000000..820dc7214
--- /dev/null
+++ b/etc/profile-m-z/qbittorrent.profile
@@ -0,0 +1,61 @@
1# Firejail profile for qbittorrent
2# Description: BitTorrent client based on libtorrent-rasterbar with a Qt5 GUI
3# This file is overwritten after every install/update
4# Persistent local customizations
5include qbittorrent.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/qBittorrent
10noblacklist ${HOME}/.config/qBittorrent
11noblacklist ${HOME}/.config/qBittorrentrc
12noblacklist ${HOME}/.local/share/data/qBittorrent
13
14# Allow python (blacklisted by disable-interpreters.inc)
15include allow-python2.inc
16include allow-python3.inc
17
18include disable-common.inc
19include disable-devel.inc
20include disable-exec.inc
21include disable-interpreters.inc
22include disable-passwdmgr.inc
23include disable-programs.inc
24
25mkdir ${HOME}/.cache/qBittorrent
26mkdir ${HOME}/.config/qBittorrent
27mkfile ${HOME}/.config/qBittorrentrc
28mkdir ${HOME}/.local/share/data/qBittorrent
29whitelist ${DOWNLOADS}
30whitelist ${HOME}/.cache/qBittorrent
31whitelist ${HOME}/.config/qBittorrent
32whitelist ${HOME}/.config/qBittorrentrc
33whitelist ${HOME}/.local/share/data/qBittorrent
34include whitelist-common.inc
35include whitelist-var-common.inc
36
37apparmor
38caps.drop all
39machine-id
40netfilter
41nodvd
42nogroups
43nonewprivs
44noroot
45nosound
46notv
47nou2f
48novideo
49protocol unix,inet,inet6,netlink
50seccomp
51shell none
52
53private-bin python*,qbittorrent
54private-dev
55# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,resolv.conf,ssl,X11,xdg
56private-tmp
57
58dbus-user none
59dbus-system none
60
61# memory-deny-write-execute - problems on Arch, see #1690 on GitHub repo
diff --git a/etc/profile-m-z/qemu-launcher.profile b/etc/profile-m-z/qemu-launcher.profile
new file mode 100644
index 000000000..ac60384fd
--- /dev/null
+++ b/etc/profile-m-z/qemu-launcher.profile
@@ -0,0 +1,29 @@
1# Firejail profile for qemu-launcher
2# This file is overwritten after every install/update
3# Persistent local customizations
4include qemu-launcher.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.qemu-launcher
9
10include disable-common.inc
11include disable-passwdmgr.inc
12include disable-programs.inc
13
14caps.drop all
15netfilter
16nodvd
17nogroups
18nonewprivs
19noroot
20notv
21protocol unix,inet,inet6
22seccomp
23shell none
24tracelog
25
26private-cache
27private-tmp
28
29noexec /tmp
diff --git a/etc/profile-m-z/qemu-system-x86_64.profile b/etc/profile-m-z/qemu-system-x86_64.profile
new file mode 100644
index 000000000..d7d7905dd
--- /dev/null
+++ b/etc/profile-m-z/qemu-system-x86_64.profile
@@ -0,0 +1,28 @@
1# Firejail profile for qemu-system-x86_64
2# Description: QEMU system emulator for x86_64
3# This file is overwritten after every install/update
4# Persistent local customizations
5include qemu-system-x86_64.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-passwdmgr.inc
11include disable-programs.inc
12
13caps.drop all
14netfilter
15nodvd
16nogroups
17nonewprivs
18noroot
19notv
20protocol unix,inet,inet6
21seccomp
22shell none
23tracelog
24
25private-cache
26private-tmp
27
28noexec /tmp
diff --git a/etc/profile-m-z/qgis.profile b/etc/profile-m-z/qgis.profile
new file mode 100644
index 000000000..eee538383
--- /dev/null
+++ b/etc/profile-m-z/qgis.profile
@@ -0,0 +1,59 @@
1# Firejail profile for qgis
2# Description: GIS application
3# This file is overwritten after every install/update
4# Persistent local customizations
5include qgis.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/QGIS
10noblacklist ${HOME}/.local/share/QGIS
11noblacklist ${HOME}/.qgis2
12noblacklist ${DOCUMENTS}
13
14# Allow python (blacklisted by disable-interpreters.inc)
15include allow-python3.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25mkdir ${HOME}/.local/share/QGIS
26mkdir ${HOME}/.qgis2
27mkdir ${HOME}/.config/QGIS
28whitelist ${HOME}/.local/share/QGIS
29whitelist ${HOME}/.qgis2
30whitelist ${HOME}/.config/QGIS
31whitelist ${DOCUMENTS}
32include whitelist-common.inc
33include whitelist-var-common.inc
34
35caps.drop all
36netfilter
37machine-id
38nodvd
39nogroups
40nonewprivs
41noroot
42nosound
43notv
44nou2f
45novideo
46# blacklisting of mbind system calls breaks old version
47seccomp !mbind
48protocol unix,inet,inet6,netlink
49shell none
50tracelog
51
52disable-mnt
53private-cache
54private-dev
55private-etc alternatives,ca-certificates,crypto-policies,fonts,machine-id,pki,QGIS,QGIS.conf,resolv.conf,ssl,Trolltech.conf
56private-tmp
57
58dbus-user none
59dbus-system none
diff --git a/etc/profile-m-z/qlipper.profile b/etc/profile-m-z/qlipper.profile
new file mode 100644
index 000000000..fb9dca48f
--- /dev/null
+++ b/etc/profile-m-z/qlipper.profile
@@ -0,0 +1,38 @@
1# Firejail profile for qlipper
2# Description: Lightweight and cross-platform clipboard history applet
3# This file is overwritten after every install/update
4# Persistent local customizations
5include qlipper.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Qlipper
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19caps.drop all
20netfilter
21no3d
22nodvd
23nogroups
24nonewprivs
25noroot
26nosound
27notv
28nou2f
29novideo
30protocol unix
31seccomp
32shell none
33
34disable-mnt
35private-cache
36private-dev
37private-tmp
38
diff --git a/etc/profile-m-z/qmmp.profile b/etc/profile-m-z/qmmp.profile
new file mode 100644
index 000000000..4dc6b6784
--- /dev/null
+++ b/etc/profile-m-z/qmmp.profile
@@ -0,0 +1,38 @@
1# Firejail profile for qmmp
2# Description: Feature-rich audio player with support of many formats
3# This file is overwritten after every install/update
4# Persistent local customizations
5include qmmp.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.qmmp
10noblacklist ${MUSIC}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19caps.drop all
20netfilter
21# no3d
22nogroups
23nonewprivs
24noroot
25notv
26nou2f
27novideo
28protocol unix,inet,inet6
29seccomp
30shell none
31tracelog
32
33private-bin bzip2,gzip,qmmp,tar,unzip
34private-dev
35private-tmp
36
37dbus-user none
38dbus-system none
diff --git a/etc/profile-m-z/qpdfview.profile b/etc/profile-m-z/qpdfview.profile
new file mode 100644
index 000000000..c082762ad
--- /dev/null
+++ b/etc/profile-m-z/qpdfview.profile
@@ -0,0 +1,45 @@
1# Firejail profile for qpdfview
2# Description: Tabbed document viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include qpdfview.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/qpdfview
10noblacklist ${HOME}/.local/share/qpdfview
11noblacklist ${DOCUMENTS}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25machine-id
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37tracelog
38
39private-bin qpdfview
40private-dev
41private-tmp
42
43# needs D-Bus when started from a file manager
44# dbus-user none
45# dbus-system none
diff --git a/etc/profile-m-z/qt-faststart.profile b/etc/profile-m-z/qt-faststart.profile
new file mode 100644
index 000000000..2cdff33a6
--- /dev/null
+++ b/etc/profile-m-z/qt-faststart.profile
@@ -0,0 +1,14 @@
1# Firejail profile for qt-faststart
2# Description: FFmpeg-based media utility
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include qt-faststart.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11private-bin qt-faststart
12
13# Redirect
14include ffmpeg.profile
diff --git a/etc/profile-m-z/qtox.profile b/etc/profile-m-z/qtox.profile
new file mode 100644
index 000000000..c8b77123d
--- /dev/null
+++ b/etc/profile-m-z/qtox.profile
@@ -0,0 +1,51 @@
1# Firejail profile for qtox
2# Description: Powerful Tox client written in C++/Qt that follows the Tox design guidelines
3# This file is overwritten after every install/update
4# Persistent local customizations
5include qtox.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/Tox
10noblacklist ${HOME}/.config/tox
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20mkdir ${HOME}/.config/tox
21whitelist ${DOWNLOADS}
22whitelist ${HOME}/.config/tox
23include whitelist-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28ipc-namespace
29netfilter
30nodvd
31nogroups
32nonewprivs
33noroot
34notv
35nou2f
36protocol unix,inet,inet6
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private-bin qtox
43private-cache
44private-dev
45private-etc alternatives,ca-certificates,crypto-policies,fonts,ld.so.cache,localtime,machine-id,pki,pulse,resolv.conf,ssl
46private-tmp
47
48dbus-user none
49dbus-system none
50
51#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-m-z/quassel.profile b/etc/profile-m-z/quassel.profile
new file mode 100644
index 000000000..c65089e20
--- /dev/null
+++ b/etc/profile-m-z/quassel.profile
@@ -0,0 +1,26 @@
1# Firejail profile for quassel
2# Description: Distributed IRC client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include quassel.local
6# Persistent global definitions
7include globals.local
8
9
10include disable-common.inc
11include disable-devel.inc
12include disable-interpreters.inc
13include disable-programs.inc
14
15caps.drop all
16netfilter
17nodvd
18nonewprivs
19noroot
20notv
21protocol unix,inet,inet6
22# QtWebengine needs chroot to set up its own sandbox
23seccomp !chroot
24
25private-cache
26private-tmp
diff --git a/etc/profile-m-z/quiterss.profile b/etc/profile-m-z/quiterss.profile
new file mode 100644
index 000000000..8dbdffdc8
--- /dev/null
+++ b/etc/profile-m-z/quiterss.profile
@@ -0,0 +1,54 @@
1# Firejail profile for quiterss
2# Description: RSS/Atom news feeds reader
3# This file is overwritten after every install/update
4# Persistent local customizations
5include quiterss.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/QuiteRss
10noblacklist ${HOME}/.config/QuiteRss
11noblacklist ${HOME}/.config/QuiteRssrc
12noblacklist ${HOME}/.local/share/QuiteRss
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21mkdir ${HOME}/.cache/QuiteRss
22mkdir ${HOME}/.config/QuiteRss
23mkdir ${HOME}/.local/share/data
24mkdir ${HOME}/.local/share/data/QuiteRss
25mkdir ${HOME}/.local/share/QuiteRss
26mkfile ${HOME}/quiterssfeeds.opml
27whitelist ${HOME}/.cache/QuiteRss
28whitelist ${HOME}/.config/QuiteRss
29whitelist ${HOME}/.config/QuiteRssrc
30whitelist ${HOME}/.local/share/data/QuiteRss
31whitelist ${HOME}/.local/share/QuiteRss
32whitelist ${HOME}/quiterssfeeds.opml
33include whitelist-common.inc
34
35caps.drop all
36netfilter
37nodvd
38nogroups
39nonewprivs
40noroot
41nosound
42notv
43nou2f
44novideo
45protocol unix,inet,inet6
46seccomp
47shell none
48tracelog
49
50disable-mnt
51private-bin quiterss
52private-dev
53# private-etc alternatives,ca-certificates,crypto-policies,pki,ssl,X11
54
diff --git a/etc/profile-m-z/qupzilla.profile b/etc/profile-m-z/qupzilla.profile
new file mode 100644
index 000000000..7aa71c848
--- /dev/null
+++ b/etc/profile-m-z/qupzilla.profile
@@ -0,0 +1,25 @@
1# Firejail profile for qupzilla
2# This file is overwritten after every install/update
3# Persistent local customizations
4include qupzilla.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9noblacklist ${HOME}/.cache/qupzilla
10noblacklist ${HOME}/.config/qupzilla
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19mkdir ${HOME}/.cache/qupzilla
20mkdir ${HOME}/.config/qupzilla
21whitelist ${HOME}/.cache/qupzilla
22whitelist ${HOME}/.config/qupzilla
23
24# Redirect
25include falkon.profile
diff --git a/etc/profile-m-z/qutebrowser.profile b/etc/profile-m-z/qutebrowser.profile
new file mode 100644
index 000000000..fc910b589
--- /dev/null
+++ b/etc/profile-m-z/qutebrowser.profile
@@ -0,0 +1,40 @@
1# Firejail profile for qutebrowser
2# Description: Keyboard-driven, vim-like browser based on PyQt5
3# This file is overwritten after every install/update
4# Persistent local customizations
5include qutebrowser.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/qutebrowser
10noblacklist ${HOME}/.config/qutebrowser
11noblacklist ${HOME}/.local/share/qutebrowser
12
13# Allow python (blacklisted by disable-interpreters.inc)
14include allow-python2.inc
15include allow-python3.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-interpreters.inc
20include disable-programs.inc
21
22mkdir ${HOME}/.cache/qutebrowser
23mkdir ${HOME}/.config/qutebrowser
24mkdir ${HOME}/.local/share/qutebrowser
25whitelist ${DOWNLOADS}
26whitelist ${HOME}/.cache/qutebrowser
27whitelist ${HOME}/.config/qutebrowser
28whitelist ${HOME}/.local/share/qutebrowser
29include whitelist-common.inc
30
31caps.drop all
32netfilter
33nodvd
34nonewprivs
35noroot
36notv
37protocol unix,inet,inet6,netlink
38# blacklisting of chroot system calls breaks qt webengine
39seccomp !chroot,!name_to_handle_at
40# tracelog
diff --git a/etc/profile-m-z/rambox.profile b/etc/profile-m-z/rambox.profile
new file mode 100644
index 000000000..ffa2022ee
--- /dev/null
+++ b/etc/profile-m-z/rambox.profile
@@ -0,0 +1,38 @@
1# Firejail profile for rambox
2# Description: Free and Open Source messaging and emailing app that combines common web applications into one (Electron-based)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include rambox.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Rambox
10noblacklist ${HOME}/.pki
11noblacklist ${HOME}/.local/share/pki
12
13include disable-common.inc
14include disable-devel.inc
15include disable-interpreters.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.config/Rambox
19mkdir ${HOME}/.pki
20mkdir ${HOME}/.local/share/pki
21whitelist ${DOWNLOADS}
22whitelist ${HOME}/.config/Rambox
23whitelist ${HOME}/.pki
24whitelist ${HOME}/.local/share/pki
25include whitelist-common.inc
26
27caps.drop all
28netfilter
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34protocol unix,inet,inet6,netlink
35# electron-based application, needing chroot
36#seccomp
37seccomp !chroot
38# tracelog
diff --git a/etc/profile-m-z/ranger.profile b/etc/profile-m-z/ranger.profile
new file mode 100644
index 000000000..af033af1a
--- /dev/null
+++ b/etc/profile-m-z/ranger.profile
@@ -0,0 +1,44 @@
1# Firejail profile for ranger
2# Description: File manager with an ncurses frontend written in Python
3# This file is overwritten after every install/update
4# Persistent local customizations
5include ranger.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/nano
10noblacklist ${HOME}/.config/ranger
11noblacklist ${HOME}/.nanorc
12
13# Allow python (blacklisted by disable-interpreters.inc)
14include allow-python2.inc
15include allow-python3.inc
16
17# Allow perl
18include allow-perl.inc
19
20include disable-common.inc
21include disable-devel.inc
22include disable-interpreters.inc
23include disable-passwdmgr.inc
24include disable-programs.inc
25
26allusers
27caps.drop all
28net none
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39#x11 none
40
41private-dev
42
43dbus-user none
44dbus-system none
diff --git a/etc/profile-m-z/redeclipse.profile b/etc/profile-m-z/redeclipse.profile
new file mode 100644
index 000000000..bb1ad56d3
--- /dev/null
+++ b/etc/profile-m-z/redeclipse.profile
@@ -0,0 +1,39 @@
1# Firejail profile for redeclipse
2# Description: Free, casual arena shooter
3# This file is overwritten after every install/update
4# Persistent local customizations
5include redeclipse.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.redeclipse
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.redeclipse
19whitelist ${HOME}/.redeclipse
20include whitelist-common.inc
21include whitelist-var-common.inc
22
23caps.drop all
24netfilter
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix,inet,inet6
33seccomp
34shell none
35
36disable-mnt
37private-dev
38private-tmp
39
diff --git a/etc/profile-m-z/redshift.profile b/etc/profile-m-z/redshift.profile
new file mode 100644
index 000000000..298ab1902
--- /dev/null
+++ b/etc/profile-m-z/redshift.profile
@@ -0,0 +1,53 @@
1# Firejail profile for redshift
2# Description: Adjusts the color temperature of your screen according to your surroundings
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include redshift.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${HOME}/.config/redshift
11noblacklist ${HOME}/.config/redshift.conf
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-passwdmgr.inc
17include disable-interpreters.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21mkdir ${HOME}/.config/redshift
22whitelist ${HOME}/.config/redshift
23whitelist ${HOME}/.config/redshift.conf
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28ipc-namespace
29machine-id
30netfilter
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix,inet,inet6
41seccomp
42shell none
43tracelog
44
45disable-mnt
46private-cache
47private-dev
48private-tmp
49
50dbus-user none
51dbus-system none
52
53memory-deny-write-execute
diff --git a/etc/profile-m-z/regextester.profile b/etc/profile-m-z/regextester.profile
new file mode 100644
index 000000000..207156ba5
--- /dev/null
+++ b/etc/profile-m-z/regextester.profile
@@ -0,0 +1,57 @@
1# Firejail profile for regextester
2# Description: A simple regex tester built for Pantheon Shell
3# This file is overwritten after every install/update
4# Persistent local customizations
5include regextester.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-passwdmgr.inc
13include disable-interpreters.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17whitelist /usr/share/com.github.artemanufrij.regextester
18include whitelist-usr-share-common.inc
19
20include whitelist-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25ipc-namespace
26machine-id
27net none
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40tracelog
41
42disable-mnt
43private-bin regextester
44private-cache
45private-dev
46private-etc alternatives,fonts
47private-lib libgranite.so.*
48private-tmp
49
50# makes settings immutable
51# dbus-user none
52# dbus-system none
53
54memory-deny-write-execute
55
56# never write anything
57read-only ${HOME}
diff --git a/etc/profile-m-z/remmina.profile b/etc/profile-m-z/remmina.profile
new file mode 100644
index 000000000..6311c91df
--- /dev/null
+++ b/etc/profile-m-z/remmina.profile
@@ -0,0 +1,40 @@
1# Firejail profile for remmina
2# Description: GTK+ Remote Desktop Client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include remmina.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.remmina
10noblacklist ${HOME}/.config/remmina
11noblacklist ${HOME}/.local/share/remmina
12noblacklist ${HOME}/.ssh
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22include whitelist-runuser-common.inc
23include whitelist-var-common.inc
24
25caps.drop all
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31nou2f
32novideo
33protocol unix,inet,inet6
34seccomp
35shell none
36
37private-cache
38private-dev
39private-tmp
40
diff --git a/etc/profile-m-z/rhythmbox-client.profile b/etc/profile-m-z/rhythmbox-client.profile
new file mode 100644
index 000000000..29e65d716
--- /dev/null
+++ b/etc/profile-m-z/rhythmbox-client.profile
@@ -0,0 +1,11 @@
1# Firejail profile for rhythmbox-client
2# Description: controls a running instance of rhythmbox
3# This file is overwritten after every install/update
4# Persistent local customizations
5include rhythmbox-client.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include rhythmbox.profile
diff --git a/etc/profile-m-z/rhythmbox.profile b/etc/profile-m-z/rhythmbox.profile
new file mode 100644
index 000000000..e8f964383
--- /dev/null
+++ b/etc/profile-m-z/rhythmbox.profile
@@ -0,0 +1,52 @@
1# Firejail profile for rhythmbox
2# Description: Music player and organizer for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include rhythmbox.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${MUSIC}
10noblacklist ${HOME}/.cache/rhythmbox
11noblacklist ${HOME}/.local/share/rhythmbox
12
13# Allow python (blacklisted by disable-interpreters.inc)
14include allow-python2.inc
15include allow-python3.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25whitelist /usr/share/rhythmbox
26whitelist /usr/share/lua
27whitelist /usr/share/libquvi-scripts
28include whitelist-runuser-common.inc
29include whitelist-usr-share-common.inc
30include whitelist-var-common.inc
31
32apparmor
33caps.drop all
34netfilter
35nogroups
36nonewprivs
37noroot
38notv
39nou2f
40novideo
41protocol unix,inet,inet6,netlink
42seccomp
43shell none
44tracelog
45
46private-bin rhythmbox,rhythmbox-client
47private-dev
48private-tmp
49
50# makes settings immutable
51# dbus-user none
52# dbus-system none
diff --git a/etc/profile-m-z/ricochet.profile b/etc/profile-m-z/ricochet.profile
new file mode 100644
index 000000000..1b8fbbc97
--- /dev/null
+++ b/etc/profile-m-z/ricochet.profile
@@ -0,0 +1,41 @@
1# Firejail profile for ricochet
2# This file is overwritten after every install/update
3# Persistent local customizations
4include ricochet.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.local/share/Ricochet
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17mkdir ${HOME}/.local/share/Ricochet
18whitelist ${DOWNLOADS}
19whitelist ${HOME}/.local/share/Ricochet
20include whitelist-common.inc
21
22caps.drop all
23ipc-namespace
24netfilter
25no3d
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31nou2f
32novideo
33protocol unix,inet,inet6
34seccomp
35shell none
36
37disable-mnt
38private-bin ricochet,tor
39private-dev
40#private-etc alternatives,alternatives,ca-certificates,crypto-policies,fonts,pki,ssl,tor,X11
41
diff --git a/etc/profile-m-z/riot-desktop.profile b/etc/profile-m-z/riot-desktop.profile
new file mode 100644
index 000000000..4372fabe1
--- /dev/null
+++ b/etc/profile-m-z/riot-desktop.profile
@@ -0,0 +1,13 @@
1# Firejail profile for riot-desktop
2# Description: A glossy Matrix collaboration client for the desktop
3# This file is overwritten after every install/update
4# Persistent local customizations
5include riot-desktop.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10seccomp !chroot
11
12# Redirect
13include riot-web.profile
diff --git a/etc/profile-m-z/riot-web.profile b/etc/profile-m-z/riot-web.profile
new file mode 100644
index 000000000..b930adf2b
--- /dev/null
+++ b/etc/profile-m-z/riot-web.profile
@@ -0,0 +1,17 @@
1# Firejail profile for riot-web
2# Description: A glossy Matrix collaboration client for the web
3# This file is overwritten after every install/update
4# Persistent local customizations
5include riot-web.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10noblacklist ${HOME}/.config/Riot
11
12mkdir ${HOME}/.config/Riot
13whitelist ${HOME}/.config/Riot
14include whitelist-common.inc
15
16# Redirect
17include electron.profile
diff --git a/etc/profile-m-z/ripperx.profile b/etc/profile-m-z/ripperx.profile
new file mode 100644
index 000000000..cf6daada5
--- /dev/null
+++ b/etc/profile-m-z/ripperx.profile
@@ -0,0 +1,43 @@
1# Firejail profile for mpv
2# Description: Graphical audio CD ripper and encoder
3# This file is overwritten after every install/update
4# Persistent local customizations
5include ripperx.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.ripperXrc
10noblacklist ${MUSIC}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-usr-share-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25netfilter
26no3d
27nogroups
28nonewprivs
29noroot
30nou2f
31notv
32novideo
33protocol unix,inet,inet6
34seccomp
35shell none
36tracelog
37
38private-cache
39private-dev
40private-tmp
41
42dbus-user none
43dbus-system none
diff --git a/etc/profile-m-z/ristretto.profile b/etc/profile-m-z/ristretto.profile
new file mode 100644
index 000000000..a1cbdf16c
--- /dev/null
+++ b/etc/profile-m-z/ristretto.profile
@@ -0,0 +1,42 @@
1# Firejail profile for ristretto
2# Description: Lightweight picture-viewer for the Xfce desktop environment
3# This file is overwritten after every install/update
4# Persistent local customizations
5include ristretto.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/ristretto
10noblacklist ${HOME}/.Steam
11noblacklist ${HOME}/.steam
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20include whitelist-var-common.inc
21
22apparmor
23caps.drop all
24net none
25netfilter
26no3d
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38
39private-cache
40private-dev
41private-tmp
42
diff --git a/etc/profile-m-z/rnano.profile b/etc/profile-m-z/rnano.profile
new file mode 100644
index 000000000..d9048982a
--- /dev/null
+++ b/etc/profile-m-z/rnano.profile
@@ -0,0 +1,12 @@
1# Firejail profile for rnano
2# Description: A restricted nano
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include rnano.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include nano.profile
diff --git a/etc/profile-m-z/rocketchat.profile b/etc/profile-m-z/rocketchat.profile
new file mode 100644
index 000000000..a574e4e8b
--- /dev/null
+++ b/etc/profile-m-z/rocketchat.profile
@@ -0,0 +1,16 @@
1# Firejail profile for rocketchat
2# This file is overwritten after every install/update
3# Persistent local customizations
4include rocketchat.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9noblacklist ${HOME}/.config/Rocket.Chat
10
11mkdir ${HOME}/.config/Rocket.Chat
12whitelist ${HOME}/.config/Rocket.Chat
13include whitelist-common.inc
14
15# Redirect
16include electron.profile
diff --git a/etc/profile-m-z/rsync-download_only.profile b/etc/profile-m-z/rsync-download_only.profile
new file mode 100644
index 000000000..a39ff759a
--- /dev/null
+++ b/etc/profile-m-z/rsync-download_only.profile
@@ -0,0 +1,59 @@
1# Firejail profile for rsync
2# Description: a fast, versatile, remote (and local) file-copying tool
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include rsync.local
7# Persistent global definitions
8include globals.local
9
10# Warning: This profile is writte to use rsync as an client for downloading,
11# it is not writen to use rsync as an daemon (rsync --daemon) or to create backups.
12
13# Usage: firejail --profile=rsync-download_only rsync
14
15blacklist /tmp/.X11-unix
16blacklist ${RUNUSER}/wayland-*
17blacklist ${RUNUSER}
18
19include disable-common.inc
20include disable-devel.inc
21include disable-exec.inc
22include disable-interpreters.inc
23include disable-passwdmgr.inc
24include disable-programs.inc
25include disable-xdg.inc
26
27# Uncomment or add to rsync.local to enable extra hardening
28#whitelist ${DOWNLOADS}
29include whitelist-var-common.inc
30
31caps.drop all
32ipc-namespace
33machine-id
34netfilter
35no3d
36nodvd
37nogroups
38nonewprivs
39noroot
40nosound
41notv
42nou2f
43novideo
44protocol unix,inet,inet6
45seccomp
46shell none
47tracelog
48
49disable-mnt
50private-bin rsync
51private-cache
52private-dev
53private-etc alternatives,ca-certificates,crypto-policies,host.conf,hostname,hosts,nsswitch.conf,pki,protocols,resolv.conf,rpc,services,ssl
54private-tmp
55
56dbus-user none
57dbus-system none
58
59memory-deny-write-execute
diff --git a/etc/profile-m-z/rtorrent.profile b/etc/profile-m-z/rtorrent.profile
new file mode 100644
index 000000000..0b4d6e1b1
--- /dev/null
+++ b/etc/profile-m-z/rtorrent.profile
@@ -0,0 +1,33 @@
1# Firejail profile for rtorrent
2# Description: Ncurses BitTorrent client based on LibTorrent from rakshasa
3# This file is overwritten after every install/update
4# Persistent local customizations
5include rtorrent.local
6# Persistent global definitions
7include globals.local
8
9
10include disable-common.inc
11include disable-devel.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15
16caps.drop all
17machine-id
18netfilter
19nodvd
20nonewprivs
21noroot
22nosound
23notv
24nou2f
25novideo
26protocol unix,inet,inet6
27seccomp
28shell none
29
30private-bin rtorrent
31private-cache
32private-dev
33private-tmp
diff --git a/etc/profile-m-z/rtv.profile b/etc/profile-m-z/rtv.profile
new file mode 100644
index 000000000..14740e05f
--- /dev/null
+++ b/etc/profile-m-z/rtv.profile
@@ -0,0 +1,58 @@
1# Firejail profile for rtv
2# Description: Browse Reddit from your terminal
3# This file is overwritten after every install/update
4# Persistent local customizations
5include rtv.local
6# Persistent global definitions
7include globals.local
8
9blacklist /tmp/.X11-unix
10blacklist ${RUNUSER}/wayland-*
11
12noblacklist ${HOME}/.config/rtv
13noblacklist ${HOME}/.local/share/rtv
14
15# Allow python (blacklisted by disable-interpreters.inc)
16include allow-python2.inc
17include allow-python3.inc
18
19include disable-common.inc
20include disable-devel.inc
21include disable-exec.inc
22include disable-interpreters.inc
23include disable-passwdmgr.inc
24include disable-programs.inc
25include disable-xdg.inc
26
27mkdir ${HOME}/.config/rtv
28mkdir ${HOME}/.local/share/rtv
29whitelist ${HOME}/.config/rtv
30whitelist ${HOME}/.local/share/rtv
31include whitelist-var-common.inc
32
33apparmor
34caps.drop all
35machine-id
36netfilter
37no3d
38nodvd
39nogroups
40nonewprivs
41noroot
42nosound
43notv
44nou2f
45novideo
46protocol unix,inet,inet6
47seccomp
48shell none
49tracelog
50
51disable-mnt
52private-bin python*,rtv,sh,xdg-settings
53private-cache
54private-dev
55private-etc alternatives,ca-certificates,crypto-policies,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,mime.types,nsswitch.conf,pki,protocols,resolv.conf,rpc,services,ssl,terminfo,xdg
56
57dbus-user none
58dbus-system none
diff --git a/etc/profile-m-z/runenpass.sh.profile b/etc/profile-m-z/runenpass.sh.profile
new file mode 100644
index 000000000..64432c171
--- /dev/null
+++ b/etc/profile-m-z/runenpass.sh.profile
@@ -0,0 +1,5 @@
1# Firejail alias profile for enpass
2# This file is overwritten after every install/update
3
4# Redirect
5include enpass.profile
diff --git a/etc/profile-m-z/rview.profile b/etc/profile-m-z/rview.profile
new file mode 100644
index 000000000..fb72a00de
--- /dev/null
+++ b/etc/profile-m-z/rview.profile
@@ -0,0 +1,10 @@
1# Firejail profile for rview
2# This file is overwritten after every install/update
3# Persistent local customizations
4include rview.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include vim.profile
diff --git a/etc/profile-m-z/rvim.profile b/etc/profile-m-z/rvim.profile
new file mode 100644
index 000000000..7c6465d3c
--- /dev/null
+++ b/etc/profile-m-z/rvim.profile
@@ -0,0 +1,10 @@
1# Firejail profile for rvim
2# This file is overwritten after every install/update
3# Persistent local customizations
4include rvim.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include vim.profile
diff --git a/etc/profile-m-z/sayonara.profile b/etc/profile-m-z/sayonara.profile
new file mode 100644
index 000000000..8f0544f33
--- /dev/null
+++ b/etc/profile-m-z/sayonara.profile
@@ -0,0 +1,35 @@
1# Firejail profile for sayonara player
2# This file is overwritten after every install/update
3# Persistent local customizations
4include sayonara.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.Sayonara
9noblacklist ${MUSIC}
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16include disable-xdg.inc
17
18caps.drop all
19netfilter
20no3d
21nogroups
22nonewprivs
23noroot
24notv
25nou2f
26novideo
27protocol unix,inet,inet6
28seccomp
29shell none
30tracelog
31
32private-bin sayonara
33private-dev
34private-tmp
35
diff --git a/etc/profile-m-z/scallion.profile b/etc/profile-m-z/scallion.profile
new file mode 100644
index 000000000..0f67d4d09
--- /dev/null
+++ b/etc/profile-m-z/scallion.profile
@@ -0,0 +1,44 @@
1# Firejail profile for scallion
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include scallion.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${PATH}/llvm*
10noblacklist ${PATH}/openssl
11noblacklist ${PATH}/openssl-1.0
12noblacklist ${DOCUMENTS}
13
14include disable-common.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-var-common.inc
22
23caps.drop all
24ipc-namespace
25net none
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37
38disable-mnt
39private
40private-dev
41private-tmp
42
43dbus-user none
44dbus-system none
diff --git a/etc/profile-m-z/scorched3d-wrapper.profile b/etc/profile-m-z/scorched3d-wrapper.profile
new file mode 100644
index 000000000..9cbb19bff
--- /dev/null
+++ b/etc/profile-m-z/scorched3d-wrapper.profile
@@ -0,0 +1,7 @@
1# Firejail profile for scorched3d
2# This file is overwritten after every install/update
3# Persistent local customizations
4include scorched3d-wrapper.local
5
6# Redirect
7include scorched3d.profile
diff --git a/etc/profile-m-z/scorched3d.profile b/etc/profile-m-z/scorched3d.profile
new file mode 100644
index 000000000..b5e51198b
--- /dev/null
+++ b/etc/profile-m-z/scorched3d.profile
@@ -0,0 +1,46 @@
1# Firejail profile for scorched3d
2# Description: Game based loosely on the classic DOS game Scorched Earth
3# This file is overwritten after every install/update
4# Persistent local customizations
5include scorched3d.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.scorched3d
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.scorched3d
20whitelist ${HOME}/.scorched3d
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24caps.drop all
25ipc-namespace
26netfilter
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix,inet,inet6
35seccomp
36shell none
37tracelog
38
39disable-mnt
40private-bin scorched3d,scorched3d-wrapper,scorched3dc,scorched3ds
41private-cache
42private-dev
43private-tmp
44
45dbus-user none
46dbus-system none
diff --git a/etc/profile-m-z/scorchwentbonkers.profile b/etc/profile-m-z/scorchwentbonkers.profile
new file mode 100644
index 000000000..7cb57edce
--- /dev/null
+++ b/etc/profile-m-z/scorchwentbonkers.profile
@@ -0,0 +1,49 @@
1# Firejail profile for scorchwentbonkers
2# Description: Realtime remake of Scorched Earth
3# This file is overwritten after every install/update
4# Persistent local customizations
5include scorchwentbonkers.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.swb.ini
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.swb.ini
20whitelist ${HOME}/.swb.ini
21whitelist /usr/share/scorchwentbonkers
22include whitelist-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28net none
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private-bin scorchwentbonkers
43private-cache
44private-dev
45private-etc alsa,asound.conf,machine-id,pulse
46private-tmp
47
48dbus-user none
49dbus-system none
diff --git a/etc/profile-m-z/scp.profile b/etc/profile-m-z/scp.profile
new file mode 100644
index 000000000..287b8029a
--- /dev/null
+++ b/etc/profile-m-z/scp.profile
@@ -0,0 +1,12 @@
1# Firejail profile for scp
2# Description: Secure shell copy
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include scp.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include ssh.profile
diff --git a/etc/profile-m-z/scribus.profile b/etc/profile-m-z/scribus.profile
new file mode 100644
index 000000000..22cd10737
--- /dev/null
+++ b/etc/profile-m-z/scribus.profile
@@ -0,0 +1,64 @@
1# Firejail profile for scribus
2# Description: Open Source Desktop Page Layout
3# This file is overwritten after every install/update
4# Persistent local customizations
5include scribus.local
6# Persistent global definitions
7include globals.local
8
9# Support for PDF readers comes with Scribus 1.5 and higher
10noblacklist ${HOME}/.cache/okular
11noblacklist ${HOME}/.config/GIMP
12noblacklist ${HOME}/.config/okularpartrc
13noblacklist ${HOME}/.config/okularrc
14noblacklist ${HOME}/.config/scribus
15noblacklist ${HOME}/.config/scribusrc
16noblacklist ${HOME}/.gimp*
17noblacklist ${HOME}/.kde/share/apps/okular
18noblacklist ${HOME}/.kde/share/config/okularpartrc
19noblacklist ${HOME}/.kde/share/config/okularrc
20noblacklist ${HOME}/.kde4/share/apps/okular
21noblacklist ${HOME}/.kde4/share/config/okularpartrc
22noblacklist ${HOME}/.kde4/share/config/okularrc
23noblacklist ${HOME}/.local/share/okular
24noblacklist ${HOME}/.local/share/scribus
25noblacklist ${HOME}/.scribus
26noblacklist ${DOCUMENTS}
27noblacklist ${PICTURES}
28
29# Allow python (blacklisted by disable-interpreters.inc)
30include allow-python2.inc
31include allow-python3.inc
32
33include disable-common.inc
34include disable-devel.inc
35include disable-exec.inc
36include disable-interpreters.inc
37include disable-passwdmgr.inc
38include disable-programs.inc
39include disable-xdg.inc
40
41include whitelist-var-common.inc
42
43apparmor
44caps.drop all
45net none
46nodvd
47nogroups
48nonewprivs
49noroot
50nosound
51notv
52nou2f
53novideo
54protocol unix
55seccomp
56shell none
57tracelog
58
59# private-bin gimp*,gs,scribus
60private-dev
61private-tmp
62
63dbus-user none
64dbus-system none
diff --git a/etc/profile-m-z/sdat2img.profile b/etc/profile-m-z/sdat2img.profile
new file mode 100644
index 000000000..b45eff4cd
--- /dev/null
+++ b/etc/profile-m-z/sdat2img.profile
@@ -0,0 +1,43 @@
1# Firejail profile for sdat2img
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include sdat2img.local
6# Persistent global definitions
7include globals.local
8
9# Allow python (blacklisted by disable-interpreters.inc)
10include allow-python2.inc
11include allow-python3.inc
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-var-common.inc
22
23caps.drop all
24net none
25no3d
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37
38private-bin env,python*,sdat2img
39private-cache
40private-dev
41
42dbus-user none
43dbus-system none
diff --git a/etc/profile-m-z/seahorse-adventures.profile b/etc/profile-m-z/seahorse-adventures.profile
new file mode 100644
index 000000000..895724844
--- /dev/null
+++ b/etc/profile-m-z/seahorse-adventures.profile
@@ -0,0 +1,50 @@
1# Firejail profile for seahorse-adventures
2# Description: Help barbie the seahorse float on bubbles to the moon
3# This file is overwritten after every install/update
4# Persistent local customizations
5include seahorse-adventures.local
6# Persistent global definitions
7include globals.local
8
9# Allow python (blacklisted by disable-interpreters.inc)
10include allow-python2.inc
11include allow-python3.inc
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21whitelist /usr/share/seahorse-adventures
22include whitelist-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28net none
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private
43private-bin python*,seahorse-adventures
44private-cache
45private-dev
46private-etc machine-id
47private-tmp
48
49dbus-user none
50dbus-system none
diff --git a/etc/profile-m-z/seahorse-daemon.profile b/etc/profile-m-z/seahorse-daemon.profile
new file mode 100644
index 000000000..6410da4d8
--- /dev/null
+++ b/etc/profile-m-z/seahorse-daemon.profile
@@ -0,0 +1,14 @@
1# Firejail profile for seahorse-daemon
2# Description: PGP encryption and signing
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include seahorse-daemon.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11memory-deny-write-execute
12
13# Redirect
14include seahorse.profile
diff --git a/etc/profile-m-z/seahorse-tool.profile b/etc/profile-m-z/seahorse-tool.profile
new file mode 100644
index 000000000..96ff74edf
--- /dev/null
+++ b/etc/profile-m-z/seahorse-tool.profile
@@ -0,0 +1,15 @@
1# Firejail profile for seahorse-tool
2# Description: PGP encryption and signing
3# This file is overwritten after every install/update
4# Persistent local customizations
5include seahorse-tool.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# private-etc workaround for: #2877
11private-etc firejail,login.defs,passwd
12private-tmp
13
14# Redirect
15include seahorse.profile
diff --git a/etc/profile-m-z/seahorse.profile b/etc/profile-m-z/seahorse.profile
new file mode 100644
index 000000000..3a69086b5
--- /dev/null
+++ b/etc/profile-m-z/seahorse.profile
@@ -0,0 +1,63 @@
1# Firejail profile for seahorse
2# Description: GNOME application for managing PGP keys
3# This file is overwritten after every install/update
4# Persistent local customizations
5include seahorse.local
6# Persistent global definitions
7include globals.local
8
9blacklist /tmp/.X11-unix
10
11noblacklist ${HOME}/.gnupg
12noblacklist ${HOME}/.ssh
13noblacklist /tmp/ssh-*
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23# whitelisting in ${HOME} breaks file encryption feature of nautilus.
24# once #2882 is fixed this can be uncommented and nowhitelisted in seahorse-tool.profile
25#mkdir ${HOME}/.gnupg
26#mkdir ${HOME}/.ssh
27#whitelist ${HOME}/.gnupg
28#whitelist ${HOME}/.ssh
29whitelist /tmp/ssh-*
30whitelist /usr/share/gnupg
31whitelist /usr/share/gnupg2
32whitelist /usr/share/seahorse
33whitelist /usr/share/seahorse-nautilus
34whitelist ${RUNUSER}/gnupg
35whitelist ${RUNUSER}/keyring
36#include whitelist-common.inc
37include whitelist-runuser-common.inc
38include whitelist-usr-share-common.inc
39include whitelist-var-common.inc
40
41apparmor
42caps.drop all
43machine-id
44netfilter
45no3d
46nodvd
47nogroups
48nonewprivs
49noroot
50nosound
51notv
52nou2f
53novideo
54protocol unix,inet,inet6
55seccomp
56shell none
57tracelog
58
59disable-mnt
60private-cache
61private-dev
62private-etc ca-certificates,crypto-policies,dconf,fonts,gconf,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.preload,nsswitch.conf,pango,pki,protocols,resolv.conf,rpc,services,ssh,ssl,X11
63writable-run-user
diff --git a/etc/profile-m-z/seamonkey-bin.profile b/etc/profile-m-z/seamonkey-bin.profile
new file mode 100644
index 000000000..532294950
--- /dev/null
+++ b/etc/profile-m-z/seamonkey-bin.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for seamonkey
2# This file is overwritten after every install/update
3
4# Redirect
5include seamonkey.profile
diff --git a/etc/profile-m-z/seamonkey.profile b/etc/profile-m-z/seamonkey.profile
new file mode 100644
index 000000000..807effbeb
--- /dev/null
+++ b/etc/profile-m-z/seamonkey.profile
@@ -0,0 +1,55 @@
1# Firejail profile for seamonkey
2# Description: SeaMonkey internet suite
3# This file is overwritten after every install/update
4# Persistent local customizations
5include seamonkey.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/mozilla
10noblacklist ${HOME}/.mozilla
11noblacklist ${HOME}/.pki
12noblacklist ${HOME}/.local/share/pki
13
14include disable-common.inc
15include disable-devel.inc
16include disable-interpreters.inc
17include disable-programs.inc
18
19mkdir ${HOME}/.cache/mozilla
20mkdir ${HOME}/.mozilla
21mkdir ${HOME}/.pki
22mkdir ${HOME}/.local/share/pki
23whitelist ${DOWNLOADS}
24whitelist ${HOME}/.cache/gnome-mplayer/plugin
25whitelist ${HOME}/.cache/mozilla
26whitelist ${HOME}/.config/gnome-mplayer
27whitelist ${HOME}/.config/pipelight-silverlight5.1
28whitelist ${HOME}/.config/pipelight-widevine
29whitelist ${HOME}/.keysnail.js
30whitelist ${HOME}/.lastpass
31whitelist ${HOME}/.mozilla
32whitelist ${HOME}/.pentadactyl
33whitelist ${HOME}/.pentadactylrc
34whitelist ${HOME}/.pki
35whitelist ${HOME}/.local/share/pki
36whitelist ${HOME}/.vimperator
37whitelist ${HOME}/.vimperatorrc
38whitelist ${HOME}/.wine-pipelight
39whitelist ${HOME}/.wine-pipelight64
40whitelist ${HOME}/.zotero
41whitelist ${HOME}/dwhelper
42include whitelist-common.inc
43
44caps.drop all
45netfilter
46nodvd
47nonewprivs
48noroot
49notv
50protocol unix,inet,inet6,netlink
51seccomp
52tracelog
53
54disable-mnt
55# private-etc adobe,alternatives,asound.conf,ca-certificates,crypto-policies,firefox,fonts,group,gtk-2.0,hostname,hosts,iceweasel,localtime,machine-id,mailcap,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,ssl
diff --git a/etc/profile-m-z/secret-tool.profile b/etc/profile-m-z/secret-tool.profile
new file mode 100644
index 000000000..70d9a5b1d
--- /dev/null
+++ b/etc/profile-m-z/secret-tool.profile
@@ -0,0 +1,11 @@
1# Firejail profile for secret-tool
2# Description: Library for storing and retrieving passwords and other secrets
3# This file is overwritten after every install/update
4# Persistent local customizations
5include secret-tool.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gnome-keyring.profile
diff --git a/etc/profile-m-z/server.profile b/etc/profile-m-z/server.profile
new file mode 100644
index 000000000..5bc4735ae
--- /dev/null
+++ b/etc/profile-m-z/server.profile
@@ -0,0 +1,77 @@
1# Generic Firejail profile for servers started as root
2#
3# This profile is used as a default when starting the sandbox as root.
4# Example:
5#
6# $ sudo firejail
7# [sudo] password for netblue:
8# Reading profile /etc/firejail/server.profile
9# Reading profile /etc/firejail/disable-common.inc
10# Reading profile /etc/firejail/disable-passwdmgr.inc
11# Reading profile /etc/firejail/disable-programs.inc
12#
13# ** Note: you can use --noprofile to disable server.profile **
14#
15# Parent pid 5347, child pid 5348
16# The new log directory is /proc/5348/root/var/log
17# Child process initialized in 64.43 ms
18# root@debian:~#
19#
20# Customize the profile as usual. Examples: unbound.profile, fdns.profile.
21# All the rules for regular user profiles apply with the exception of
22# /usr/local/bin symlink redirection and firecfg tool. The redirection is disabled
23# by default for root user.
24
25# This file is overwritten after every install/update
26# Persistent local customizations
27include server.local
28# Persistent global definitions
29include globals.local
30
31# generic server profile
32# it allows /sbin and /usr/sbin directories - this is where servers are installed
33# depending on your usage, you can enable some of the commands below:
34
35noblacklist /sbin
36noblacklist /usr/sbin
37# noblacklist /var/opt
38
39blacklist /tmp/.X11-unix
40blacklist ${RUNUSER}/wayland-*
41
42include disable-common.inc
43# include disable-devel.inc
44# include disable-exec.inc
45# include disable-interpreters.inc
46include disable-passwdmgr.inc
47include disable-programs.inc
48# include disable-xdg.inc
49
50caps
51# ipc-namespace
52# netfilter /etc/firejail/webserver.net
53no3d
54nodvd
55# nogroups
56# nonewprivs
57# noroot
58nosound
59notv
60nou2f
61novideo
62seccomp
63# shell none
64
65# disable-mnt
66private
67# private-bin program
68# private-cache
69private-dev
70# private-etc alternatives
71# private-lib
72private-tmp
73
74# dbus-user none
75# dbus-system none
76
77# memory-deny-write-execute
diff --git a/etc/profile-m-z/sftp.profile b/etc/profile-m-z/sftp.profile
new file mode 100644
index 000000000..66dc2a57b
--- /dev/null
+++ b/etc/profile-m-z/sftp.profile
@@ -0,0 +1,12 @@
1# Firejail profile for sftp
2# Description: Secure file transport protocol
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include sftp.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include ssh.profile
diff --git a/etc/profile-m-z/shellcheck.profile b/etc/profile-m-z/shellcheck.profile
new file mode 100644
index 000000000..6cd70c2ea
--- /dev/null
+++ b/etc/profile-m-z/shellcheck.profile
@@ -0,0 +1,54 @@
1# Firejail profile for shellcheck
2# Description: Lint tool for shell scripts
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include shellcheck.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11blacklist ${RUNUSER}
12
13noblacklist ${DOCUMENTS}
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23whitelist /usr/share/shellcheck
24include whitelist-usr-share-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29ipc-namespace
30machine-id
31net none
32no3d
33nodvd
34nogroups
35nonewprivs
36noroot
37nosound
38notv
39nou2f
40novideo
41protocol unix
42seccomp
43shell none
44tracelog
45x11 none
46
47private-cache
48private-dev
49private-tmp
50
51dbus-user none
52dbus-system none
53
54memory-deny-write-execute
diff --git a/etc/profile-m-z/shortwave.profile b/etc/profile-m-z/shortwave.profile
new file mode 100644
index 000000000..ee2314833
--- /dev/null
+++ b/etc/profile-m-z/shortwave.profile
@@ -0,0 +1,50 @@
1# Firejail profile for shortwave
2# Description: Listen to internet radio
3# This file is overwritten after every install/update
4# Persistent local customizations
5include shortwave.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/Shortwave
10noblacklist ${HOME}/.local/share/Shortwave
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20mkdir ${HOME}/.cache/Shortwave
21mkdir ${HOME}/.local/share/Shortwave
22whitelist ${HOME}/.cache/Shortwave
23whitelist ${HOME}/.local/share/Shortwave
24whitelist /usr/share/shortwave
25include whitelist-common.inc
26include whitelist-runuser-common.inc
27include whitelist-usr-share-common.inc
28include whitelist-var-common.inc
29
30apparmor
31caps.drop all
32netfilter
33nodvd
34nogroups
35nonewprivs
36noroot
37notv
38nou2f
39novideo
40protocol unix,inet,inet6
41seccomp
42shell none
43tracelog
44
45disable-mnt
46private-bin shortwave
47private-cache
48private-dev
49private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,gconf,group,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,machine-id,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,ssl,X11,xdg
50private-tmp
diff --git a/etc/profile-m-z/shotcut.profile b/etc/profile-m-z/shotcut.profile
new file mode 100644
index 000000000..bec0bfbb0
--- /dev/null
+++ b/etc/profile-m-z/shotcut.profile
@@ -0,0 +1,38 @@
1# Firejail profile for shotcut
2# Description: A free, open source, cross-platform video editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include shotcut.local
6# Persistent global definitions
7include globals.local
8
9ignore noexec ${HOME}
10
11noblacklist ${HOME}/.config/Meltytech
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20caps.drop all
21net none
22nodvd
23nogroups
24nonewprivs
25noroot
26notv
27nou2f
28protocol unix
29seccomp
30shell none
31tracelog
32
33#private-bin melt,nice,qmelt,shotcut
34private-cache
35private-dev
36
37dbus-user none
38dbus-system none
diff --git a/etc/profile-m-z/signal-cli.profile b/etc/profile-m-z/signal-cli.profile
new file mode 100644
index 000000000..6a2f5c434
--- /dev/null
+++ b/etc/profile-m-z/signal-cli.profile
@@ -0,0 +1,51 @@
1# Firejail profile for signal-cli
2# Description: signal-cli provides a commandline and dbus interface for signalapp/libsignal-service-java
3# This file is overwritten after every install/update
4# Persistent local customizations
5include signal-cli.local
6# Persistent global definitions
7include globals.local
8
9blacklist /tmp/.X11-unix
10blacklist ${RUNUSER}/wayland-*
11
12noblacklist ${HOME}/.local/share/signal-cli
13
14include allow-java.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24mkdir ${HOME}/.local/share/signal-cli
25whitelist ${HOME}/.local/share/signal-cli
26include whitelist-common.inc
27include whitelist-var-common.inc
28
29caps.drop all
30netfilter
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix,inet,inet6
41seccomp
42shell none
43tracelog
44
45disable-mnt
46private-bin java,sh,signal-cli
47private-cache
48private-dev
49# Does not work with all Java configurations. You will notice immediately, so you might want to give it a try
50#private-etc alternatives,ca-certificates,crypto-policies,dbus-1,host.conf,hostname,hosts,java-10-openjdk,java-7-openjdk,java-8-openjdk,java-9-openjdk,java.conf,machine-id,nsswitch.conf,passwd,pki,protocols,resolv.conf,rpc,services,ssl
51private-tmp
diff --git a/etc/profile-m-z/signal-desktop.profile b/etc/profile-m-z/signal-desktop.profile
new file mode 100644
index 000000000..5d9225705
--- /dev/null
+++ b/etc/profile-m-z/signal-desktop.profile
@@ -0,0 +1,44 @@
1# Firejail profile for signal-desktop
2# This file is overwritten after every install/update
3# Persistent local customizations
4include signal-desktop.local
5# Persistent global definitions
6include globals.local
7
8ignore noexec /tmp
9
10noblacklist ${HOME}/.config/Signal
11
12# These lines are needed to allow Firefox to open links
13noblacklist ${HOME}/.mozilla
14whitelist ${HOME}/.mozilla/firefox/profiles.ini
15read-only ${HOME}/.mozilla/firefox/profiles.ini
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-programs.inc
22include disable-passwdmgr.inc
23
24mkdir ${HOME}/.config/Signal
25whitelist ${DOWNLOADS}
26whitelist ${HOME}/.config/Signal
27include whitelist-common.inc
28include whitelist-var-common.inc
29
30apparmor
31caps.keep sys_admin,sys_chroot
32netfilter
33nodvd
34nogroups
35notv
36nou2f
37shell none
38
39disable-mnt
40private-dev
41private-tmp
42
43dbus-user none
44dbus-system none
diff --git a/etc/profile-m-z/silentarmy.profile b/etc/profile-m-z/silentarmy.profile
new file mode 100644
index 000000000..cfc33d074
--- /dev/null
+++ b/etc/profile-m-z/silentarmy.profile
@@ -0,0 +1,39 @@
1# Firejail profile for silentarmy
2# This file is overwritten after every install/update
3# Persistent local customizations
4include silentarmy.local
5# Persistent global definitions
6include globals.local
7
8
9include disable-common.inc
10# include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17include whitelist-var-common.inc
18
19caps.drop all
20netfilter
21nodvd
22nogroups
23nonewprivs
24noroot
25nosound
26notv
27nou2f
28novideo
29protocol unix,inet,inet6
30seccomp
31shell none
32
33disable-mnt
34private
35private-bin python*,sa-solver,silentarmy
36private-dev
37private-opt none
38private-tmp
39
diff --git a/etc/profile-m-z/simple-scan.profile b/etc/profile-m-z/simple-scan.profile
new file mode 100644
index 000000000..40fe8c566
--- /dev/null
+++ b/etc/profile-m-z/simple-scan.profile
@@ -0,0 +1,41 @@
1# Firejail profile for simple-scan
2# Description: Simple Scanning Utility
3# This file is overwritten after every install/update
4# Persistent local customizations
5include simple-scan.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/simple-scan
10noblacklist ${DOCUMENTS}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19whitelist /usr/share/simple-scan
20include whitelist-usr-share-common.inc
21include whitelist-var-common.inc
22
23caps.drop all
24netfilter
25nodvd
26nogroups
27nonewprivs
28noroot
29nosound
30notv
31# novideo
32protocol unix,inet,inet6,netlink
33# blacklisting of ioperm system calls breaks simple-scan
34seccomp !ioperm
35shell none
36tracelog
37
38# private-bin simple-scan
39# private-dev
40# private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,ssl
41# private-tmp
diff --git a/etc/profile-m-z/simplescreenrecorder.profile b/etc/profile-m-z/simplescreenrecorder.profile
new file mode 100644
index 000000000..edcc2a0f4
--- /dev/null
+++ b/etc/profile-m-z/simplescreenrecorder.profile
@@ -0,0 +1,39 @@
1# Firejail profile for simplescreenrecorder
2# Description: A feature-rich screen recorder that supports X11 and OpenGL
3# This file is overwritten after every install/update
4# Persistent local customizations
5include simplescreenrecorder.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${VIDEOS}
10noblacklist ${HOME}/.ssr
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20whitelist /usr/share/simplescreenrecorder
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31nou2f
32protocol unix
33seccomp
34shell none
35tracelog
36
37private-cache
38private-dev
39private-tmp
diff --git a/etc/profile-m-z/simutrans.profile b/etc/profile-m-z/simutrans.profile
new file mode 100644
index 000000000..1b81f2ea1
--- /dev/null
+++ b/etc/profile-m-z/simutrans.profile
@@ -0,0 +1,42 @@
1# Firejail profile for simutrans
2# Description: Transportation simulator
3# This file is overwritten after every install/update
4# Persistent local customizations
5include simutrans.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.simutrans
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.simutrans
19whitelist ${HOME}/.simutrans
20include whitelist-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25net none
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31nou2f
32novideo
33protocol unix
34seccomp
35shell none
36
37# private-bin simutrans
38private-dev
39private-tmp
40
41dbus-user none
42dbus-system none
diff --git a/etc/profile-m-z/skanlite.profile b/etc/profile-m-z/skanlite.profile
new file mode 100644
index 000000000..093a61398
--- /dev/null
+++ b/etc/profile-m-z/skanlite.profile
@@ -0,0 +1,37 @@
1# Firejail profile for skanlite
2# Description: Image scanner based on the KSane backend
3# This file is overwritten after every install/update
4# Persistent local customizations
5include skanlite.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${DOCUMENTS}
10
11include disable-common.inc
12include disable-devel.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16include disable-xdg.inc
17
18caps.drop all
19netfilter
20nodvd
21nogroups
22nonewprivs
23noroot
24nosound
25notv
26# novideo
27protocol unix,inet,inet6,netlink
28# blacklisting of ioperm system calls breaks skanlite
29seccomp !ioperm
30shell none
31
32# private-bin kbuildsycoca4,kdeinit4,skanlite
33# private-dev
34# private-tmp
35
36# dbus-user none
37# dbus-system none
diff --git a/etc/profile-m-z/skypeforlinux.profile b/etc/profile-m-z/skypeforlinux.profile
new file mode 100644
index 000000000..341c25a95
--- /dev/null
+++ b/etc/profile-m-z/skypeforlinux.profile
@@ -0,0 +1,31 @@
1# Firejail profile for skypeforlinux
2# This file is overwritten after every install/update
3# Persistent local customizations
4include skypeforlinux.local
5# Persistent global definitions
6include globals.local
7
8# breaks Skype
9ignore noexec /tmp
10
11noblacklist ${HOME}/.config/skypeforlinux
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21caps.keep sys_admin,sys_chroot
22netfilter
23nodvd
24nogroups
25notv
26shell none
27
28disable-mnt
29private-cache
30# private-dev - needs /dev/disk
31private-tmp
diff --git a/etc/profile-m-z/slack.profile b/etc/profile-m-z/slack.profile
new file mode 100644
index 000000000..b2828fcb1
--- /dev/null
+++ b/etc/profile-m-z/slack.profile
@@ -0,0 +1,34 @@
1# Firejail profile for slack
2# This file is overwritten after every install/update
3# Persistent local customizations
4include slack.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/Slack
9
10include disable-common.inc
11include disable-devel.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15
16mkdir ${HOME}/.config/Slack
17whitelist ${HOME}/.config/Slack
18whitelist ${DOWNLOADS}
19include whitelist-common.inc
20include whitelist-var-common.inc
21
22caps.keep sys_admin,sys_chroot
23netfilter
24nodvd
25nogroups
26notv
27nou2f
28shell none
29
30disable-mnt
31private-bin locale,slack
32private-cache
33private-dev
34private-etc alternatives,asound.conf,ca-certificates,crypto-policies,debian_version,fedora-release,fonts,group,ld.so.cache,ld.so.conf,localtime,machine-id,os-release,passwd,pki,pulse,redhat-release,resolv.conf,ssl,system-release,system-release-cpe
diff --git a/etc/profile-m-z/slashem.profile b/etc/profile-m-z/slashem.profile
new file mode 100644
index 000000000..ca0516e65
--- /dev/null
+++ b/etc/profile-m-z/slashem.profile
@@ -0,0 +1,47 @@
1# Firejail profile for slashem
2# Description: A rogue-like single player dungeon exploration game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include slashem.local
6# Persistent global definitions
7include globals.local
8
9noblacklist /var/games/slashem
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18whitelist /var/games/slashem
19include whitelist-common.inc
20include whitelist-var-common.inc
21
22caps.drop all
23ipc-namespace
24net none
25no3d
26nodvd
27nogroups
28#nonewprivs
29#noroot
30nosound
31notv
32novideo
33#protocol unix,netlink
34#seccomp
35shell none
36
37disable-mnt
38#private
39private-cache
40private-dev
41private-tmp
42writable-var
43
44dbus-user none
45dbus-system none
46
47#memory-deny-write-execute
diff --git a/etc/profile-m-z/smplayer.profile b/etc/profile-m-z/smplayer.profile
new file mode 100644
index 000000000..ac01c675b
--- /dev/null
+++ b/etc/profile-m-z/smplayer.profile
@@ -0,0 +1,49 @@
1# Firejail profile for smplayer
2# Description: Complete front-end for MPlayer and mpv
3# This file is overwritten after every install/update
4# Persistent local customizations
5include smplayer.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/smplayer
10noblacklist ${HOME}/.config/youtube-dl
11noblacklist ${HOME}/.mplayer
12
13# Allow python (blacklisted by disable-interpreters.inc)
14include allow-python2.inc
15include allow-python3.inc
16
17noblacklist ${MUSIC}
18noblacklist ${VIDEOS}
19
20include disable-common.inc
21include disable-devel.inc
22include disable-exec.inc
23include disable-interpreters.inc
24include disable-passwdmgr.inc
25include disable-programs.inc
26include disable-xdg.inc
27
28whitelist /usr/share/smplayer
29include whitelist-usr-share-common.inc
30include whitelist-var-common.inc
31
32apparmor
33caps.drop all
34netfilter
35# nogroups
36nonewprivs
37noroot
38nou2f
39protocol unix,inet,inet6,netlink
40seccomp
41shell none
42
43private-bin env,mplayer,mpv,python*,smplayer,smtube,youtube-dl
44private-dev
45private-tmp
46
47# problems with KDE
48# dbus-user none
49# dbus-system none
diff --git a/etc/profile-m-z/smtube.profile b/etc/profile-m-z/smtube.profile
new file mode 100644
index 000000000..79bc02979
--- /dev/null
+++ b/etc/profile-m-z/smtube.profile
@@ -0,0 +1,48 @@
1# Firejail profile for smtube
2# Description: YouTube videos browser
3# This file is overwritten after every install/update
4# Persistent local customizations
5include smtube.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/smplayer
10noblacklist ${HOME}/.config/smtube
11noblacklist ${HOME}/.config/mpv
12noblacklist ${HOME}/.mplayer
13noblacklist ${HOME}/.config/vlc
14noblacklist ${HOME}/.local/share/vlc
15noblacklist ${MUSIC}
16noblacklist ${VIDEOS}
17
18include disable-common.inc
19include disable-devel.inc
20include disable-exec.inc
21include disable-interpreters.inc
22include disable-passwdmgr.inc
23include disable-programs.inc
24include disable-xdg.inc
25
26whitelist /usr/share/smplayer
27whitelist /usr/share/smtube
28include whitelist-usr-share-common.inc
29include whitelist-var-common.inc
30
31apparmor
32caps.drop all
33netfilter
34nodvd
35notv
36nou2f
37novideo
38nogroups
39nonewprivs
40noroot
41protocol unix,inet,inet6,netlink
42seccomp
43shell none
44
45#no private-bin because users can add their own players to smtube and that would prevent that
46private-dev
47private-tmp
48
diff --git a/etc/profile-m-z/snox.profile b/etc/profile-m-z/snox.profile
new file mode 100644
index 000000000..3b3fd1ae1
--- /dev/null
+++ b/etc/profile-m-z/snox.profile
@@ -0,0 +1,19 @@
1# Firejail profile for snox
2# This file is overwritten after every install/update
3# Persistent local customizations
4include snox.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/snox
9noblacklist ${HOME}/.config/snox
10
11#mkdir ${HOME}/.cache/dnox
12#mkdir ${HOME}/.config/dnox
13mkdir ${HOME}/.cache/snox
14mkdir ${HOME}/.config/snox
15whitelist ${HOME}/.cache/snox
16whitelist ${HOME}/.config/snox
17
18# Redirect
19include chromium-common.profile
diff --git a/etc/profile-m-z/soffice.profile b/etc/profile-m-z/soffice.profile
new file mode 100644
index 000000000..8348a57fe
--- /dev/null
+++ b/etc/profile-m-z/soffice.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for libreoffice
2# This file is overwritten after every install/update
3
4# Redirect
5include libreoffice.profile
diff --git a/etc/profile-m-z/sol.profile b/etc/profile-m-z/sol.profile
new file mode 100644
index 000000000..8519de6df
--- /dev/null
+++ b/etc/profile-m-z/sol.profile
@@ -0,0 +1,46 @@
1# Firejail profile for default
2# This file is overwritten after every install/update
3# Persistent local customizations
4include sol.local
5# Persistent global definitions
6include globals.local
7
8include disable-common.inc
9include disable-devel.inc
10include disable-exec.inc
11include disable-interpreters.inc
12include disable-passwdmgr.inc
13include disable-programs.inc
14include disable-xdg.inc
15
16# all necessary files in $HOME are in whitelist-common.inc
17include whitelist-common.inc
18include whitelist-var-common.inc
19
20apparmor
21caps.drop all
22ipc-namespace
23net none
24# no3d
25nodvd
26nogroups
27nonewprivs
28noroot
29# nosound
30notv
31nou2f
32novideo
33protocol unix
34seccomp
35shell none
36
37disable-mnt
38private-bin sol
39private-cache
40private-dev
41private-tmp
42
43dbus-user none
44dbus-system none
45
46# memory-deny-write-execute
diff --git a/etc/profile-m-z/sound-juicer.profile b/etc/profile-m-z/sound-juicer.profile
new file mode 100644
index 000000000..b9f3768be
--- /dev/null
+++ b/etc/profile-m-z/sound-juicer.profile
@@ -0,0 +1,43 @@
1# Firejail profile for mpv
2# Description: Graphical audio CD ripper and encoder
3# This file is overwritten after every install/update
4# Persistent local customizations
5include sound-juicer.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/sound-juicer
10noblacklist ${MUSIC}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-var-common.inc
21
22apparmor
23caps.drop all
24netfilter
25no3d
26nogroups
27nonewprivs
28noroot
29nosound
30nou2f
31notv
32novideo
33protocol unix,inet,inet6,netlink
34seccomp
35shell none
36tracelog
37
38private-cache
39private-dev
40private-tmp
41
42# dbus-user none
43# dbus-system none
diff --git a/etc/profile-m-z/soundconverter.profile b/etc/profile-m-z/soundconverter.profile
new file mode 100644
index 000000000..bdd6eb7f5
--- /dev/null
+++ b/etc/profile-m-z/soundconverter.profile
@@ -0,0 +1,50 @@
1# Firejail profile for soundconverter
2# Description: GNOME application to convert audio files into other formats
3# This file is overwritten after every install/update
4# Persistent local customizations
5include soundconverter.local
6# Persistent global definitions
7include globals.local
8
9# Allow python (blacklisted by disable-interpreters.inc)
10include allow-python2.inc
11include allow-python3.inc
12
13noblacklist ${MUSIC}
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23whitelist ${DOWNLOADS}
24whitelist ${MUSIC}
25whitelist /usr/share/soundconverter
26include whitelist-common.inc
27include whitelist-usr-share-common.inc
28include whitelist-var-common.inc
29
30apparmor
31caps.drop all
32ipc-namespace
33machine-id
34no3d
35nodvd
36nogroups
37nonewprivs
38noroot
39nosound
40notv
41nou2f
42novideo
43protocol unix
44seccomp
45shell none
46
47private-cache
48private-dev
49private-tmp
50
diff --git a/etc/profile-m-z/spectre-meltdown-checker.profile b/etc/profile-m-z/spectre-meltdown-checker.profile
new file mode 100644
index 000000000..a0b99abcf
--- /dev/null
+++ b/etc/profile-m-z/spectre-meltdown-checker.profile
@@ -0,0 +1,54 @@
1# Firejail profile for spectre-meltdown-checker
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include spectre-meltdown-checker.local
6# Persistent global definitions
7include globals.local
8
9blacklist ${RUNUSER}/wayland-*
10
11noblacklist ${PATH}/mount
12noblacklist ${PATH}/umount
13
14# Allow perl (blacklisted by disable-interpreters.inc)
15include allow-perl.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25whitelist /usr/share/perl5
26include whitelist-usr-share-common.inc
27include whitelist-var-common.inc
28
29allow-debuggers
30caps.keep sys_rawio
31ipc-namespace
32net none
33no3d
34nodvd
35nogroups
36nonewprivs
37nosound
38notv
39novideo
40protocol unix
41seccomp.drop @clock,@cpu-emulation,@module,@obsolete,@reboot,@resources,@swap
42shell none
43x11 none
44
45disable-mnt
46private
47private-bin awk,bzip2,cat,coreos-install,cpucontrol,cut,dd,dirname,dmesg,dnf,echo,grep,gunzip,gz,gzip,head,id,kldload,kldstat,liblz4-tool,lzop,mktemp,modinfo,modprobe,mount,nm,objdump,od,perl,printf,readelf,rm,sed,seq,sh,sort,spectre-meltdown-checker,spectre-meltdown-checker.sh,stat,strings,sysctl,tail,test,toolbox,tr,uname,which,xz-utils
48private-cache
49private-tmp
50
51dbus-user none
52dbus-system none
53
54memory-deny-write-execute
diff --git a/etc/profile-m-z/spotify.profile b/etc/profile-m-z/spotify.profile
new file mode 100644
index 000000000..1a34cb86d
--- /dev/null
+++ b/etc/profile-m-z/spotify.profile
@@ -0,0 +1,54 @@
1# Firejail profile for spotify
2# This file is overwritten after every install/update
3# Persistent local customizations
4include spotify.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/spotify
9noblacklist ${HOME}/.config/spotify
10noblacklist ${HOME}/.local/share/spotify
11
12blacklist ${HOME}/.bashrc
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21mkdir ${HOME}/.cache/spotify
22mkdir ${HOME}/.config/spotify
23mkdir ${HOME}/.local/share/spotify
24whitelist ${HOME}/.cache/spotify
25whitelist ${HOME}/.config/spotify
26whitelist ${HOME}/.local/share/spotify
27include whitelist-common.inc
28include whitelist-var-common.inc
29
30caps.drop all
31netfilter
32nodvd
33nogroups
34nonewprivs
35noroot
36notv
37nou2f
38protocol unix,inet,inet6,netlink
39seccomp
40shell none
41tracelog
42
43disable-mnt
44private-bin bash,cat,dirname,find,grep,head,rm,sh,spotify,tclsh,touch,zenity
45private-dev
46# Comment the next line or put 'ignore private-etc' in your spotify.local if want to see the albums covers or if you want to use the radio
47private-etc alternatives,ca-certificates,crypto-policies,fonts,group,host.conf,hosts,ld.so.cache,machine-id,nsswitch.conf,pki,pulse,resolv.conf,ssl
48private-opt spotify
49private-srv none
50private-tmp
51
52# dbus needed for MPRIS
53# dbus-user none
54# dbus-system none
diff --git a/etc/profile-m-z/sqlitebrowser.profile b/etc/profile-m-z/sqlitebrowser.profile
new file mode 100644
index 000000000..017120811
--- /dev/null
+++ b/etc/profile-m-z/sqlitebrowser.profile
@@ -0,0 +1,49 @@
1# Firejail profile for sqlitebrowser
2# Description: GUI editor for SQLite databases
3# This file is overwritten after every install/update
4# Persistent local customizations
5include sqlitebrowser.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/sqlitebrowser
10noblacklist ${DOCUMENTS}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-usr-share-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25ipc-namespace
26netfilter
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix,inet,inet6,netlink
36seccomp
37shell none
38
39private-bin sqlitebrowser
40private-cache
41private-dev
42private-etc alternatives,ca-certificates,crypto-policies,fonts,group,machine-id,passwd,pki,ssl
43private-tmp
44
45# breaks proxy creation
46# dbus-user none
47# dbus-system none
48
49#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-m-z/ssh-agent.profile b/etc/profile-m-z/ssh-agent.profile
new file mode 100644
index 000000000..01b63d3ce
--- /dev/null
+++ b/etc/profile-m-z/ssh-agent.profile
@@ -0,0 +1,38 @@
1# Firejail profile for ssh-agent
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include ssh-agent.local
6# Persistent global definitions
7include globals.local
8
9noblacklist /etc/ssh
10noblacklist /tmp/ssh-*
11noblacklist ${HOME}/.ssh
12
13blacklist /tmp/.X11-unix
14blacklist ${RUNUSER}/wayland-*
15
16include disable-common.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20include whitelist-usr-share-common.inc
21
22caps.drop all
23netfilter
24no3d
25nodvd
26nonewprivs
27noroot
28notv
29novideo
30protocol unix,inet,inet6
31seccomp
32shell none
33tracelog
34
35writable-run-user
36
37dbus-user none
38dbus-system none
diff --git a/etc/profile-m-z/ssh.profile b/etc/profile-m-z/ssh.profile
new file mode 100644
index 000000000..5d3458c29
--- /dev/null
+++ b/etc/profile-m-z/ssh.profile
@@ -0,0 +1,52 @@
1# Firejail profile for ssh
2# Description: Secure shell client and server
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include ssh.local
7# Persistent global definitions
8include globals.local
9
10noblacklist /etc/ssh
11noblacklist /tmp/ssh-*
12noblacklist ${HOME}/.ssh
13# nc can be used as ProxyCommand, e.g. when using tor
14noblacklist ${PATH}/nc
15noblacklist ${PATH}/ncat
16
17include disable-common.inc
18include disable-exec.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22whitelist ${RUNUSER}/keyring/ssh
23whitelist ${RUNUSER}/gnupg/S.gpg-agent.ssh
24include whitelist-usr-share-common.inc
25include whitelist-runuser-common.inc
26
27caps.drop all
28ipc-namespace
29netfilter
30no3d
31nodvd
32nogroups
33nonewprivs
34# noroot - see issue #1543
35nosound
36notv
37nou2f
38novideo
39protocol unix,inet,inet6
40seccomp
41shell none
42tracelog
43
44private-cache
45private-dev
46# private-tmp # Breaks when exiting
47writable-run-user
48
49dbus-user none
50dbus-system none
51
52memory-deny-write-execute
diff --git a/etc/profile-m-z/standardnotes-desktop.profile b/etc/profile-m-z/standardnotes-desktop.profile
new file mode 100644
index 000000000..1292b806b
--- /dev/null
+++ b/etc/profile-m-z/standardnotes-desktop.profile
@@ -0,0 +1,44 @@
1# Firejail profile for standardnotes-desktop
2# This file is overwritten after every install/update
3# Persistent local customizations
4include standardnotes-desktop.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/Standard Notes Backups
9noblacklist ${HOME}/.config/Standard Notes
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/Standard Notes Backups
19mkdir ${HOME}/.config/Standard Notes
20whitelist ${HOME}/Standard Notes Backups
21whitelist ${HOME}/.config/Standard Notes
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26machine-id
27netfilter
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35protocol unix,inet,inet6,netlink
36seccomp !chroot
37
38disable-mnt
39private-dev
40private-tmp
41private-etc alternatives,ca-certificates,crypto-policies,fonts,host.conf,hostname,hosts,ld.so.cache,pki,resolv.conf,ssl,xdg
42
43dbus-user none
44dbus-system none
diff --git a/etc/profile-m-z/start-tor-browser.desktop.profile b/etc/profile-m-z/start-tor-browser.desktop.profile
new file mode 100644
index 000000000..2f73c9fee
--- /dev/null
+++ b/etc/profile-m-z/start-tor-browser.desktop.profile
@@ -0,0 +1,76 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3# Persistent local customizations
4include start-tor-browser.desktop.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9noblacklist ${HOME}/.tor-browser*
10
11whitelist ${HOME}/.tor-browser-ar
12whitelist ${HOME}/.tor-browser-ca
13whitelist ${HOME}/.tor-browser-cs
14whitelist ${HOME}/.tor-browser-da
15whitelist ${HOME}/.tor-browser-de
16whitelist ${HOME}/.tor-browser-el
17whitelist ${HOME}/.tor-browser-en
18whitelist ${HOME}/.tor-browser-en-us
19whitelist ${HOME}/.tor-browser-es
20whitelist ${HOME}/.tor-browser-es-es
21whitelist ${HOME}/.tor-browser-fa
22whitelist ${HOME}/.tor-browser-fr
23whitelist ${HOME}/.tor-browser-ga-ie
24whitelist ${HOME}/.tor-browser-he
25whitelist ${HOME}/.tor-browser-hu
26whitelist ${HOME}/.tor-browser-id
27whitelist ${HOME}/.tor-browser-is
28whitelist ${HOME}/.tor-browser-it
29whitelist ${HOME}/.tor-browser-ja
30whitelist ${HOME}/.tor-browser-ka
31whitelist ${HOME}/.tor-browser-ko
32whitelist ${HOME}/.tor-browser-nb
33whitelist ${HOME}/.tor-browser-nl
34whitelist ${HOME}/.tor-browser-pl
35whitelist ${HOME}/.tor-browser-pt-br
36whitelist ${HOME}/.tor-browser-ru
37whitelist ${HOME}/.tor-browser-sv-se
38whitelist ${HOME}/.tor-browser-tr
39whitelist ${HOME}/.tor-browser-vi
40whitelist ${HOME}/.tor-browser-zh-cn
41whitelist ${HOME}/.tor-browser-zh-tw
42
43whitelist ${HOME}/.tor-browser_ar
44whitelist ${HOME}/.tor-browser_ca
45whitelist ${HOME}/.tor-browser_cs
46whitelist ${HOME}/.tor-browser_da
47whitelist ${HOME}/.tor-browser_de
48whitelist ${HOME}/.tor-browser_el
49whitelist ${HOME}/.tor-browser_en
50whitelist ${HOME}/.tor-browser_en_US
51whitelist ${HOME}/.tor-browser_es
52whitelist ${HOME}/.tor-browser_es-ES
53whitelist ${HOME}/.tor-browser_fa
54whitelist ${HOME}/.tor-browser_fr
55whitelist ${HOME}/.tor-browser_ga-IE
56whitelist ${HOME}/.tor-browser_he
57whitelist ${HOME}/.tor-browser_hu
58whitelist ${HOME}/.tor-browser_id
59whitelist ${HOME}/.tor-browser_is
60whitelist ${HOME}/.tor-browser_it
61whitelist ${HOME}/.tor-browser_ja
62whitelist ${HOME}/.tor-browser_ka
63whitelist ${HOME}/.tor-browser_ko
64whitelist ${HOME}/.tor-browser_nb
65whitelist ${HOME}/.tor-browser_nl
66whitelist ${HOME}/.tor-browser_pl
67whitelist ${HOME}/.tor-browser_pt-BR
68whitelist ${HOME}/.tor-browser_ru
69whitelist ${HOME}/.tor-browser_sv-SE
70whitelist ${HOME}/.tor-browser_tr
71whitelist ${HOME}/.tor-browser_vi
72whitelist ${HOME}/.tor-browser_zh-CN
73whitelist ${HOME}/.tor-browser_zh-TW
74
75# Redirect
76include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/start-tor-browser.profile b/etc/profile-m-z/start-tor-browser.profile
new file mode 100644
index 000000000..b62b19101
--- /dev/null
+++ b/etc/profile-m-z/start-tor-browser.profile
@@ -0,0 +1,42 @@
1# Firejail profile for start-tor-browser
2# This file is overwritten after every install/update
3# Persistent local customizations
4include start-tor-browser.local
5# Persistent global definitions
6include globals.local
7
8ignore noexec ${HOME}
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16include disable-xdg.inc
17
18include whitelist-var-common.inc
19
20caps.drop all
21netfilter
22nodvd
23nogroups
24nonewprivs
25noroot
26notv
27nou2f
28novideo
29protocol unix,inet,inet6
30seccomp !chroot
31shell none
32# tracelog may cause issues, see github issue #1930
33#tracelog
34
35disable-mnt
36private-bin bash,cat,cp,cut,dirname,env,getconf,gpg,grep,gxmessage,id,kdialog,ln,mkdir,pwd,readlink,realpath,rm,sed,sh,tail,test,update-desktop-database,xmessage,zenity
37private-dev
38private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,machine-id,pki,pulse,resolv.conf,ssl
39private-tmp
40
41dbus-user none
42dbus-system none
diff --git a/etc/profile-m-z/steam-native.profile b/etc/profile-m-z/steam-native.profile
new file mode 100644
index 000000000..47608ad28
--- /dev/null
+++ b/etc/profile-m-z/steam-native.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for steam
2# This file is overwritten after every install/update
3
4# Redirect
5include steam.profile
diff --git a/etc/profile-m-z/steam.profile b/etc/profile-m-z/steam.profile
new file mode 100644
index 000000000..2463764a7
--- /dev/null
+++ b/etc/profile-m-z/steam.profile
@@ -0,0 +1,112 @@
1# Firejail profile for steam
2# Description: Valve's Steam digital software delivery system
3# This file is overwritten after every install/update
4# Persistent local customizations
5include steam.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.killingfloor
10noblacklist ${HOME}/.local/share/3909/PapersPlease
11noblacklist ${HOME}/.local/share/aspyr-media
12noblacklist ${HOME}/.local/share/cdprojektred
13noblacklist ${HOME}/.local/share/feral-interactive
14noblacklist ${HOME}/.local/share/Steam
15noblacklist ${HOME}/.local/share/SuperHexagon
16noblacklist ${HOME}/.local/share/Terraria
17noblacklist ${HOME}/.local/share/vpltd
18noblacklist ${HOME}/.local/share/vulkan
19noblacklist ${HOME}/.steam
20noblacklist ${HOME}/.steampath
21noblacklist ${HOME}/.steampid
22# needed for STEAM_RUNTIME_PREFER_HOST_LIBRARIES=1 to work
23noblacklist /sbin
24noblacklist /usr/sbin
25
26# Allow java (blacklisted by disable-devel.inc)
27include allow-java.inc
28
29# Allow python (blacklisted by disable-interpreters.inc)
30include allow-python2.inc
31include allow-python3.inc
32
33include disable-common.inc
34include disable-devel.inc
35include disable-interpreters.inc
36include disable-passwdmgr.inc
37include disable-programs.inc
38
39mkdir ${HOME}/.config/unity3d
40mkdir ${HOME}/.killingfloor
41mkdir ${HOME}/.local/share/3909/PapersPlease
42mkdir ${HOME}/.local/share/aspyr-media
43mkdir ${HOME}/.local/share/cdprojektred
44mkdir ${HOME}/.local/share/feral-interactive
45mkdir ${HOME}/.local/share/Paradox Interactive
46mkdir ${HOME}/.local/share/Steam
47mkdir ${HOME}/.local/share/SuperHexagon
48mkdir ${HOME}/.local/share/Terraria
49mkdir ${HOME}/.local/share/vpltd
50mkdir ${HOME}/.local/share/vulkan
51mkdir ${HOME}/.mbwarband
52mkdir ${HOME}/.paradoxinteractive
53mkdir ${HOME}/.steam
54mkfile ${HOME}/.steampath
55mkfile ${HOME}/.steampid
56whitelist ${HOME}/.config/unity3d
57whitelist ${HOME}/.killingfloor
58whitelist ${HOME}/.local/share/3909/PapersPlease
59whitelist ${HOME}/.local/share/aspyr-media
60whitelist ${HOME}/.local/share/cdprojektred
61whitelist ${HOME}/.local/share/feral-interactive
62whitelist ${HOME}/.local/share/Paradox Interactive
63whitelist ${HOME}/.local/share/Steam
64whitelist ${HOME}/.local/share/SuperHexagon
65whitelist ${HOME}/.local/share/Terraria
66whitelist ${HOME}/.local/share/vpltd
67whitelist ${HOME}/.local/share/vulkan
68whitelist ${HOME}/.mbwarband
69whitelist ${HOME}/.paradoxinteractive
70whitelist ${HOME}/.steam
71whitelist ${HOME}/.steampath
72whitelist ${HOME}/.steampid
73whitelist ${HOME}/.steampid
74include whitelist-common.inc
75include whitelist-var-common.inc
76
77caps.drop all
78#ipc-namespace
79netfilter
80nodvd
81# nVidia user may need to comment / ignore nogroups and noroot
82nogroups
83nonewprivs
84noroot
85notv
86nou2f
87# novideo should be commented for VR
88novideo
89protocol unix,inet,inet6,netlink
90# seccomp cause sometimes issues (see #2951, #3267),
91# comment it or add 'ignore seccomp' to steam.local if so.
92seccomp !kcmp,!ptrace
93shell none
94# tracelog disabled as it breaks integrated browser
95#tracelog
96
97# private-bin is disabled while in testing, but has been tested working with multiple games
98#private-bin awk,basename,bash,bsdtar,bzip2,cat,chmod,cksum,cmp,comm,compress,cp,curl,cut,date,dbus-launch,dbus-send,desktop-file-edit,desktop-file-install,desktop-file-validate,dirname,echo,env,expr,file,find,getopt,grep,gtar,gzip,head,hostname,id,lbzip2,ldconfig,ldd,ln,ls,lsb_release,lsof,lspci,lz4,lzip,lzma,lzop,md5sum,mkdir,mktemp,mv,netstat,ps,pulseaudio,python*,readlink,realpath,rm,sed,sh,sha1sum,sha256sum,sha512sum,sleep,sort,steam,steamdeps,steam-native,steam-runtime,sum,tail,tar,tclsh,test,touch,tr,umask,uname,update-desktop-database,wc,wget,which,whoami,xterm,xz,zenity
99# extra programs are available which might be needed for select games
100#private-bin java,java-config,mono
101# picture viewers are needed for viewing screenshots
102#private-bin eog,eom,gthumb,pix,viewnior,xviewer
103
104# private-dev should be commented for controllers
105private-dev
106# private-etc breaks a small selection of games on some systems, comment to support those
107private-etc alternatives,alternatives,asound.conf,bumblebee,ca-certificates,crypto-policies,dbus-1,drirc,fonts,group,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,localtime,lsb-release,machine-id,mime.types,nvidia,os-release,passwd,pki,pulse,resolv.conf,services,ssl
108private-tmp
109
110# breaks appindicator support
111# dbus-user none
112# dbus-system none
diff --git a/etc/profile-m-z/stellarium.profile b/etc/profile-m-z/stellarium.profile
new file mode 100644
index 000000000..d6df2e0ad
--- /dev/null
+++ b/etc/profile-m-z/stellarium.profile
@@ -0,0 +1,45 @@
1# Firejail profile for stellarium
2# Description: Real-time photo-realistic sky generator
3# This file is overwritten after every install/update
4# Persistent local customizations
5include stellarium.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/stellarium
10noblacklist ${HOME}/.stellarium
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19mkdir ${HOME}/.config/stellarium
20mkdir ${HOME}/.stellarium
21whitelist ${HOME}/.config/stellarium
22whitelist ${HOME}/.stellarium
23include whitelist-common.inc
24include whitelist-var-common.inc
25
26caps.drop all
27machine-id
28netfilter
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36protocol unix,inet,inet6,netlink
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private-bin stellarium
43private-dev
44private-tmp
45
diff --git a/etc/profile-m-z/strings.profile b/etc/profile-m-z/strings.profile
new file mode 100644
index 000000000..31ed5dd3f
--- /dev/null
+++ b/etc/profile-m-z/strings.profile
@@ -0,0 +1,56 @@
1# Firejail profile for strings
2# Description: print the strings of printable characters in files
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include strings.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11blacklist ${RUNUSER}
12
13#include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18#include disable-programs.inc
19#include disable-xdg.inc
20
21#include whitelist-usr-share-common.inc
22#include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26ipc-namespace
27machine-id
28net none
29no3d
30nodvd
31nogroups
32nonewprivs
33#noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix
39seccomp
40shell none
41tracelog
42x11 none
43
44#private
45#private-bin strings
46private-cache
47private-dev
48#private-etc alternatives
49#private-lib libfakeroot
50private-tmp
51
52dbus-user none
53dbus-system none
54
55memory-deny-write-execute
56read-only ${HOME}
diff --git a/etc/profile-m-z/studio.sh.profile b/etc/profile-m-z/studio.sh.profile
new file mode 100644
index 000000000..79e879f36
--- /dev/null
+++ b/etc/profile-m-z/studio.sh.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for Android Studio
2# This file is overwritten after every install/update
3
4# Redirect
5include android-studio.profile
diff --git a/etc/profile-m-z/subdownloader.profile b/etc/profile-m-z/subdownloader.profile
new file mode 100644
index 000000000..428af3737
--- /dev/null
+++ b/etc/profile-m-z/subdownloader.profile
@@ -0,0 +1,53 @@
1# Firejail profile for subdownloader
2# Description: Automatic download/upload of subtitles using fast hashing
3# This file is overwritten after every install/update
4# Persistent local customizations
5include subdownloader.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/SubDownloader
10noblacklist ${VIDEOS}
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24include whitelist-usr-share-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29ipc-namespace
30machine-id
31netfilter
32no3d
33nodvd
34nogroups
35nonewprivs
36noroot
37nosound
38notv
39nou2f
40protocol unix,inet,inet6
41seccomp
42shell none
43tracelog
44
45private-cache
46private-dev
47private-etc alternatives,fonts
48private-tmp
49
50dbus-user none
51dbus-system none
52
53#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-m-z/supertux2.profile b/etc/profile-m-z/supertux2.profile
new file mode 100644
index 000000000..e1cdb114c
--- /dev/null
+++ b/etc/profile-m-z/supertux2.profile
@@ -0,0 +1,43 @@
1# Firejail profile for supertux2
2# Description: Jump'n run like game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include supertux2.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/supertux2
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.local/share/supertux2
19whitelist ${HOME}/.local/share/supertux2
20include whitelist-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25net none
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31nou2f
32novideo
33protocol unix,netlink
34seccomp
35shell none
36
37disable-mnt
38# private-bin supertux2
39private-dev
40private-tmp
41
42dbus-user none
43dbus-system none
diff --git a/etc/profile-m-z/supertuxkart.profile b/etc/profile-m-z/supertuxkart.profile
new file mode 100644
index 000000000..73877b1b5
--- /dev/null
+++ b/etc/profile-m-z/supertuxkart.profile
@@ -0,0 +1,57 @@
1# Firejail profile for supertuxkart
2# Description: Free kart racing game.
3# This file is overwritten after every install/update
4# Persistent local customizations
5include supertuxkart.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/supertuxkart
10noblacklist ${HOME}/.cache/supertuxkart
11noblacklist ${HOME}/.local/share/supertuxkart
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19include disable-interpreters.inc
20
21mkdir ${HOME}/.config/supertuxkart
22mkdir ${HOME}/.cache/supertuxkart
23mkdir ${HOME}/.local/share/supertuxkart
24whitelist ${HOME}/.config/supertuxkart
25whitelist ${HOME}/.cache/supertuxkart
26whitelist ${HOME}/.local/share/supertuxkart
27whitelist /usr/share/supertuxkart
28include whitelist-common.inc
29include whitelist-usr-share-common.inc
30include whitelist-var-common.inc
31
32apparmor
33caps.drop all
34netfilter
35nodvd
36nogroups
37nonewprivs
38noroot
39notv
40nou2f
41novideo
42protocol unix,inet,inet6
43seccomp
44shell none
45tracelog
46
47disable-mnt
48private-bin supertuxkart
49private-cache
50private-dev
51private-etc alternatives,ca-certificates,crypto-policies,drirc,hosts,machine-id,openal,pki,resolv.conf,ssl
52private-tmp
53private-opt none
54private-srv none
55
56dbus-user none
57dbus-system none
diff --git a/etc/profile-m-z/surf.profile b/etc/profile-m-z/surf.profile
new file mode 100644
index 000000000..d4c6d9afc
--- /dev/null
+++ b/etc/profile-m-z/surf.profile
@@ -0,0 +1,39 @@
1# Firejail profile for surf
2# Description: Simple web browser by suckless community
3# This file is overwritten after every install/update
4# Persistent local customizations
5include surf.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.surf
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17mkdir ${HOME}/.surf
18whitelist ${HOME}/.surf
19whitelist ${DOWNLOADS}
20include whitelist-common.inc
21
22caps.drop all
23netfilter
24nodvd
25nonewprivs
26noroot
27notv
28nou2f
29protocol unix,inet,inet6,netlink
30seccomp
31shell none
32tracelog
33
34disable-mnt
35private-bin bash,curl,dmenu,ls,printf,sed,sh,sleep,st,stterm,surf,xargs,xprop
36private-dev
37private-etc alternatives,ca-certificates,crypto-policies,fonts,group,hosts,passwd,pki,resolv.conf,ssl
38private-tmp
39
diff --git a/etc/profile-m-z/swell-foop.profile b/etc/profile-m-z/swell-foop.profile
new file mode 100644
index 000000000..9efae815d
--- /dev/null
+++ b/etc/profile-m-z/swell-foop.profile
@@ -0,0 +1,21 @@
1# Firejail profile for swell-foop
2# Description: GNOME colored tiles puzzle game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include swell-foop.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/swell-foop
10
11mkdir ${HOME}/.local/share/swell-foop
12whitelist ${HOME}/.local/share/swell-foop
13
14whitelist /usr/share/swell-foop
15
16private-bin swell-foop
17
18dbus-user.own org.gnome.SwellFoop
19
20# Redirect
21include gnome_games-common.profile
diff --git a/etc/profile-m-z/sylpheed.profile b/etc/profile-m-z/sylpheed.profile
new file mode 100644
index 000000000..4344fe73a
--- /dev/null
+++ b/etc/profile-m-z/sylpheed.profile
@@ -0,0 +1,17 @@
1# Firejail profile for sylpheed
2# Description: Light weight e-mail client with GTK+
3# This file is overwritten after every install/update
4# Persistent local customizations
5include sylpheed.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.sylpheed-2.0
10
11mkdir ${HOME}/.sylpheed-2.0
12whitelist ${HOME}/.sylpheed-2.0
13
14whitelist /usr/share/sylpheed
15
16# Redirect
17include email-common.profile
diff --git a/etc/profile-m-z/synfigstudio.profile b/etc/profile-m-z/synfigstudio.profile
new file mode 100644
index 000000000..a83080cc3
--- /dev/null
+++ b/etc/profile-m-z/synfigstudio.profile
@@ -0,0 +1,39 @@
1# Firejail profile for synfigstudio
2# Description: Vector-based 2D animation package
3# This file is overwritten after every install/update
4# Persistent local customizations
5include synfigstudio.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/synfig
10noblacklist ${HOME}/.synfig
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19caps.drop all
20net none
21nodvd
22nogroups
23nonewprivs
24noroot
25nosound
26notv
27nou2f
28novideo
29protocol unix
30seccomp
31shell none
32
33#private-bin ffmpeg,synfig,synfigstudio
34private-cache
35private-dev
36private-tmp
37
38dbus-user none
39dbus-system none
diff --git a/etc/profile-m-z/sysprof-cli.profile b/etc/profile-m-z/sysprof-cli.profile
new file mode 100644
index 000000000..8f4de130b
--- /dev/null
+++ b/etc/profile-m-z/sysprof-cli.profile
@@ -0,0 +1,20 @@
1# Firejail profile for sysprof-cli
2# Description: Kernel based performance profiler (CLI)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include sysprof-cli.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# There is no GUI help menu to break in the CLI version
11private-bin sysprof-cli
12private-lib
13
14dbus-user none
15dbus-system none
16
17memory-deny-write-execute
18
19# Redirect
20include sysprof.profile
diff --git a/etc/profile-m-z/sysprof.profile b/etc/profile-m-z/sysprof.profile
new file mode 100644
index 000000000..ad3346285
--- /dev/null
+++ b/etc/profile-m-z/sysprof.profile
@@ -0,0 +1,52 @@
1# Firejail profile for sysprof
2# Description: Kernel based performance profiler (GUI)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include sysprof.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17include whitelist-usr-share-common.inc
18include whitelist-var-common.inc
19
20apparmor
21caps.drop all
22ipc-namespace
23machine-id
24net none
25no3d
26nodvd
27nogroups
28nonewprivs
29# Ubuntu 16.04 version needs root privileges - uncomment or put in sysprof.local if you don't use that
30#noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix,netlink
36shell none
37tracelog
38
39disable-mnt
40#private-bin sysprof - breaks GUI help menu
41private-cache
42private-dev
43private-etc alternatives,fonts,ld.so.cache,machine-id,ssl
44# private-lib breaks GUI help menu
45#private-lib gdk-pixbuf-2.*,gio,gtk3,gvfs/libgvfscommon.so,libgconf-2.so.*,librsvg-2.so.*,libsysprof-2.so,libsysprof-ui-2.so
46private-tmp
47
48# makes settings immutable
49# dbus-user none
50# dbus-system none
51
52# memory-deny-write-execute - Breaks GUI on Arch
diff --git a/etc/profile-m-z/tar.profile b/etc/profile-m-z/tar.profile
new file mode 100644
index 000000000..3a7405305
--- /dev/null
+++ b/etc/profile-m-z/tar.profile
@@ -0,0 +1,55 @@
1# Firejail profile for tar
2# Description: GNU version of the tar archiving utility
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include tar.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12# Arch Linux (based distributions) need access to /var/lib/pacman. As we drop all capabilities this is automatically read-only.
13noblacklist /var/lib/pacman
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22apparmor
23caps.drop all
24hostname tar
25ipc-namespace
26machine-id
27net none
28no3d
29nodvd
30nogroups
31nonewprivs
32#noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40tracelog
41x11 none
42
43# support compressed archives
44private-bin awk,bash,bzip2,compress,firejail,grep,gtar,gzip,lbzip2,lzip,lzma,lzop,sh,tar,xz
45private-cache
46private-dev
47private-etc alternatives,group,localtime,login.defs,passwd
48private-lib libfakeroot
49# Debian based distributions need this for 'dpkg --unpack' (incl. synaptic)
50writable-var
51
52dbus-user none
53dbus-system none
54
55memory-deny-write-execute
diff --git a/etc/profile-m-z/tb-starter-wrapper.profile b/etc/profile-m-z/tb-starter-wrapper.profile
new file mode 100644
index 000000000..ffe9605b6
--- /dev/null
+++ b/etc/profile-m-z/tb-starter-wrapper.profile
@@ -0,0 +1,19 @@
1# Firejail profile for tb-starter-wrapper
2# Description: wrapper-script used by whonix to start the tor browser
3quiet
4# This file is overwritten after every install/update
5# Persistent local customizations
6include tb-starter-wrapper.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11noblacklist ${HOME}/.tb
12
13mkdir ${HOME}/.tb
14whitelist ${HOME}/.tb
15
16private-bin tb-starter-wrapper
17
18# Redirect
19include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tcpdump.profile b/etc/profile-m-z/tcpdump.profile
new file mode 100644
index 000000000..881fbf49e
--- /dev/null
+++ b/etc/profile-m-z/tcpdump.profile
@@ -0,0 +1,45 @@
1# Firejail profile for tcpdump
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include tcpdump.local
6# Persistent global definitions
7include globals.local
8
9noblacklist /sbin
10noblacklist /usr/sbin
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-common.inc
21
22apparmor
23caps.keep net_raw
24ipc-namespace
25#net tun0
26netfilter
27no3d
28nodvd
29#nogroups
30nonewprivs
31#noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix,inet,inet6,netlink,packet
37seccomp
38
39disable-mnt
40#private
41#private-bin tcpdump
42private-dev
43private-tmp
44
45memory-deny-write-execute
diff --git a/etc/profile-m-z/teams-for-linux.profile b/etc/profile-m-z/teams-for-linux.profile
new file mode 100644
index 000000000..a13c92bc3
--- /dev/null
+++ b/etc/profile-m-z/teams-for-linux.profile
@@ -0,0 +1,36 @@
1# Firejail profile for teams-for-linux
2# Description: Unofficial Microsoft Teams client for Linux using Electron.
3# This file is overwritten after every install/update
4# Persistent local customizations
5include teams-for-linux.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10ignore dbus-user none
11ignore dbus-system none
12
13noblacklist ${HOME}/.config/teams-for-linux
14
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18
19mkdir ${HOME}/.config/teams-for-linux
20whitelist ${HOME}/.config/teams-for-linux
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24nou2f
25novideo
26shell none
27
28disable-mnt
29private-bin bash,cut,echo,egrep,grep,head,sed,sh,teams-for-linux,tr,xdg-mime,xdg-open,zsh
30private-cache
31private-dev
32private-etc ca-certificates,crypto-policies,fonts,ld.so.cache,localtime,machine-id,pki,resolv.conf,ssl
33private-tmp
34
35# Redirect
36include electron.profile
diff --git a/etc/profile-m-z/teams.profile b/etc/profile-m-z/teams.profile
new file mode 100644
index 000000000..326b97e4b
--- /dev/null
+++ b/etc/profile-m-z/teams.profile
@@ -0,0 +1,38 @@
1# Firejail profile for teams
2# Description: Official Microsoft Teams client for Linux using Electron.
3# This file is overwritten after every install/update
4# Known issues:
5# * if Teams crashes on startup try using "ignore apparmor" in your local config
6# Persistent local customizations
7include teams.local
8# Persistent global definitions
9# added by included profile
10#include globals.local
11
12ignore dbus-user none
13ignore dbus-system none
14
15noblacklist ${HOME}/.config/teams
16noblacklist ${HOME}/.config/Microsoft
17
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21
22mkdir ${HOME}/.config/teams
23mkdir ${HOME}/.config/Microsoft
24whitelist ${HOME}/.config/teams
25whitelist ${HOME}/.config/Microsoft
26include whitelist-common.inc
27include whitelist-var-common.inc
28
29nou2f
30shell none
31tracelog
32
33disable-mnt
34private-cache
35private-dev
36
37# Redirect
38include electron.profile
diff --git a/etc/profile-m-z/teamspeak3.profile b/etc/profile-m-z/teamspeak3.profile
new file mode 100644
index 000000000..c1c666f58
--- /dev/null
+++ b/etc/profile-m-z/teamspeak3.profile
@@ -0,0 +1,42 @@
1# Firejail profile for teamspeak3
2# Description: TeamSpeak is software for quality voice communication via the Internet
3# This file is overwritten after every install/update
4# Persistent local customizations
5include teamspeak3.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.ts3client
10noblacklist ${PATH}/openssl
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19mkdir ${HOME}/.ts3client
20whitelist ${DOWNLOADS}
21whitelist ${HOME}/.ts3client
22include whitelist-common.inc
23
24caps.drop all
25ipc-namespace
26netfilter
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33nou2f
34novideo
35protocol unix,inet,inet6,netlink
36seccomp !chroot
37shell none
38
39disable-mnt
40private-dev
41private-tmp
42
diff --git a/etc/profile-m-z/teeworlds.profile b/etc/profile-m-z/teeworlds.profile
new file mode 100644
index 000000000..7765703de
--- /dev/null
+++ b/etc/profile-m-z/teeworlds.profile
@@ -0,0 +1,46 @@
1# Firejail profile for teeworlds
2# Description: Online multi-player platform 2D shooter
3# This file is overwritten after every install/update
4# Persistent local customizations
5include teeworlds.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.teeworlds
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.teeworlds
20whitelist ${HOME}/.teeworlds
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24caps.drop all
25ipc-namespace
26netfilter
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix,inet,inet6
35seccomp
36shell none
37tracelog
38
39disable-mnt
40private-bin teeworlds
41private-cache
42private-dev
43private-tmp
44
45dbus-user none
46dbus-system none
diff --git a/etc/profile-m-z/telegram-desktop.profile b/etc/profile-m-z/telegram-desktop.profile
new file mode 100644
index 000000000..0cfa7114b
--- /dev/null
+++ b/etc/profile-m-z/telegram-desktop.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for telegram
2# Description: Official Telegram Desktop client
3# This file is overwritten after every install/update
4
5# Redirect
6include telegram.profile
diff --git a/etc/profile-m-z/telegram.profile b/etc/profile-m-z/telegram.profile
new file mode 100644
index 000000000..e3af5600a
--- /dev/null
+++ b/etc/profile-m-z/telegram.profile
@@ -0,0 +1,29 @@
1# Firejail profile for telegram
2# This file is overwritten after every install/update
3# Persistent local customizations
4include telegram.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.TelegramDesktop
9noblacklist ${HOME}/.local/share/TelegramDesktop
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-programs.inc
16
17caps.drop all
18netfilter
19nodvd
20nonewprivs
21noroot
22notv
23protocol unix,inet,inet6
24seccomp
25
26disable-mnt
27private-cache
28private-tmp
29
diff --git a/etc/profile-m-z/terasology.profile b/etc/profile-m-z/terasology.profile
new file mode 100644
index 000000000..36ce6d469
--- /dev/null
+++ b/etc/profile-m-z/terasology.profile
@@ -0,0 +1,48 @@
1# Firejail profile for terasology
2# This file is overwritten after every install/update
3# Persistent local customizations
4include terasology.local
5# Persistent global definitions
6include globals.local
7
8ignore noexec /tmp
9
10noblacklist ${HOME}/.local/share/terasology
11
12# Allow java (blacklisted by disable-devel.inc)
13include allow-java.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22mkdir ${HOME}/.java
23mkdir ${HOME}/.local/share/terasology
24whitelist ${HOME}/.java
25whitelist ${HOME}/.local/share/terasology
26include whitelist-common.inc
27
28caps.drop all
29ipc-namespace
30net none
31nodvd
32nogroups
33nonewprivs
34noroot
35notv
36nou2f
37novideo
38protocol unix,inet,inet6
39seccomp
40shell none
41
42disable-mnt
43private-dev
44private-etc alternatives,asound.conf,ca-certificates,crypto-policies,dbus-1,drirc,fonts,group,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,java-7-openjdk,java-8-openjdk,ld.so.cache,ld.so.preload,localtime,lsb-release,machine-id,mime.types,passwd,pki,pulse,resolv.conf,ssl
45private-tmp
46
47dbus-user none
48dbus-system none
diff --git a/etc/profile-m-z/tex.profile b/etc/profile-m-z/tex.profile
new file mode 100644
index 000000000..f56c3038e
--- /dev/null
+++ b/etc/profile-m-z/tex.profile
@@ -0,0 +1,12 @@
1# Firejail profile for tex
2# This file is overwritten after every install/update
3# Persistent local customizations
4include tex.local
5# Persistent global definitions
6include globals.local
7
8private-bin tex
9
10# Redirect
11include latex-common.profile
12
diff --git a/etc/profile-m-z/textmaker18.profile b/etc/profile-m-z/textmaker18.profile
new file mode 100644
index 000000000..d28947394
--- /dev/null
+++ b/etc/profile-m-z/textmaker18.profile
@@ -0,0 +1,11 @@
1# Firejail profile for textmaker18
2# Description: SoftMaker Office - word processor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include textmaker18.local
6# Persistent global definitions
7include globals.local
8
9# Redirect
10include softmaker-common.inc
11
diff --git a/etc/profile-m-z/textmaker18free.profile b/etc/profile-m-z/textmaker18free.profile
new file mode 100644
index 000000000..7b4fd5b08
--- /dev/null
+++ b/etc/profile-m-z/textmaker18free.profile
@@ -0,0 +1,11 @@
1# Firejail profile for textmaker18free
2# Description: SoftMaker Office - word processor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include textmaker18free.local
6# Persistent global definitions
7include globals.local
8
9# Redirect
10include softmaker-common.inc
11
diff --git a/etc/profile-m-z/thunar.profile b/etc/profile-m-z/thunar.profile
new file mode 100644
index 000000000..19993016a
--- /dev/null
+++ b/etc/profile-m-z/thunar.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for Thunar
2# Description: Modern file manager for Xfce
3# This file is overwritten after every install/update
4
5# Redirect
6include Thunar.profile
diff --git a/etc/profile-m-z/thunderbird-beta.profile b/etc/profile-m-z/thunderbird-beta.profile
new file mode 100644
index 000000000..6450e40d6
--- /dev/null
+++ b/etc/profile-m-z/thunderbird-beta.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for thunderbird-beta
2# This file is overwritten after every install/update
3
4private-opt thunderbird-beta
5
6# Redirect
7include thunderbird.profile
diff --git a/etc/profile-m-z/thunderbird-wayland.profile b/etc/profile-m-z/thunderbird-wayland.profile
new file mode 100644
index 000000000..9fbb80d29
--- /dev/null
+++ b/etc/profile-m-z/thunderbird-wayland.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for thunderbird-wayland
2# This file is overwritten after every install/update
3# Persistent local customizations
4include thunderbird-wayland.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include thunderbird.profile
diff --git a/etc/profile-m-z/thunderbird.profile b/etc/profile-m-z/thunderbird.profile
new file mode 100644
index 000000000..44ed6e5e0
--- /dev/null
+++ b/etc/profile-m-z/thunderbird.profile
@@ -0,0 +1,63 @@
1# Firejail profile for thunderbird
2# Description: Email, RSS and newsgroup client with integrated spam filter
3# This file is overwritten after every install/update
4# Persistent local customizations
5include thunderbird.local
6# Persistent global definitions
7include globals.local
8
9# writable-run-user and dbus are needed by enigmail
10ignore dbus-user none
11ignore dbus-system none
12writable-run-user
13
14# If you want to read local mail stored in /var/mail, add the following to thunderbird.local:
15#noblacklist /var/mail
16#noblacklist /var/spool/mail
17#whitelist /var/mail
18#whitelist /var/spool/mail
19#writable-var
20
21# These lines are needed to allow Firefox to load your profile when clicking a link in an email
22noblacklist ${HOME}/.mozilla
23whitelist ${HOME}/.mozilla/firefox/profiles.ini
24read-only ${HOME}/.mozilla/firefox/profiles.ini
25
26noblacklist ${HOME}/.cache/thunderbird
27noblacklist ${HOME}/.gnupg
28# noblacklist ${HOME}/.icedove
29noblacklist ${HOME}/.thunderbird
30
31include disable-passwdmgr.inc
32include disable-xdg.inc
33
34# If you have setup Thunderbird to archive emails to a local folder,
35# make sure you add the path to that folder to the mkdir and whitelist
36# rules below. Otherwise they will be deleted when you close Thunderbird.
37# See https://github.com/netblue30/firejail/issues/2357
38mkdir ${HOME}/.cache/thunderbird
39mkdir ${HOME}/.gnupg
40# mkdir ${HOME}/.icedove
41mkdir ${HOME}/.thunderbird
42whitelist ${HOME}/.cache/thunderbird
43whitelist ${HOME}/.gnupg
44# whitelist ${HOME}/.icedove
45whitelist ${HOME}/.thunderbird
46
47whitelist /usr/share/gnupg
48whitelist /usr/share/mozilla
49whitelist /usr/share/thunderbird
50whitelist /usr/share/webext
51include whitelist-usr-share-common.inc
52
53# machine-id breaks audio in browsers; enable or put it in your thunderbird.local when sound is not required
54#machine-id
55novideo
56
57# We need the real /tmp for data exchange when xdg-open handles email attachments on KDE
58ignore private-tmp
59
60read-only ${HOME}/.config/mimeapps.list
61
62# Redirect
63include firefox-common.profile
diff --git a/etc/profile-m-z/tilp.profile b/etc/profile-m-z/tilp.profile
new file mode 100644
index 000000000..4d38d5184
--- /dev/null
+++ b/etc/profile-m-z/tilp.profile
@@ -0,0 +1,35 @@
1# Firejail profile for tilp
2# This file is overwritten after every install/update
3# Persistent local customizations
4include tilp.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.tilp
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17caps.drop all
18net none
19nodvd
20nogroups
21nonewprivs
22noroot
23notv
24novideo
25protocol unix,netlink
26seccomp
27shell none
28tracelog
29
30disable-mnt
31private-bin tilp
32private-cache
33private-etc alternatives,fonts
34private-tmp
35
diff --git a/etc/profile-m-z/tor-browser-ar.profile b/etc/profile-m-z/tor-browser-ar.profile
new file mode 100644
index 000000000..612b2d01b
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-ar.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-ar
5
6mkdir ${HOME}/.tor-browser-ar
7whitelist ${HOME}/.tor-browser-ar
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-ca.profile b/etc/profile-m-z/tor-browser-ca.profile
new file mode 100644
index 000000000..db70a7109
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-ca.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-ca
5
6mkdir ${HOME}/.tor-browser-ca
7whitelist ${HOME}/.tor-browser-ca
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-cs.profile b/etc/profile-m-z/tor-browser-cs.profile
new file mode 100644
index 000000000..77b271b68
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-cs.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-cs
5
6mkdir ${HOME}/.tor-browser-cs
7whitelist ${HOME}/.tor-browser-cs
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-da.profile b/etc/profile-m-z/tor-browser-da.profile
new file mode 100644
index 000000000..3b9fff9a4
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-da.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-da
5
6mkdir ${HOME}/.tor-browser-da
7whitelist ${HOME}/.tor-browser-da
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-de.profile b/etc/profile-m-z/tor-browser-de.profile
new file mode 100644
index 000000000..3b4f7f94f
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-de.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-de
5
6mkdir ${HOME}/.tor-browser-de
7whitelist ${HOME}/.tor-browser-de
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-el.profile b/etc/profile-m-z/tor-browser-el.profile
new file mode 100644
index 000000000..b978b6042
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-el.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-el
5
6mkdir ${HOME}/.tor-browser-el
7whitelist ${HOME}/.tor-browser-el
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-en-us.profile b/etc/profile-m-z/tor-browser-en-us.profile
new file mode 100644
index 000000000..db56dda1b
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-en-us.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-en-us
5
6mkdir ${HOME}/.tor-browser-en-us
7whitelist ${HOME}/.tor-browser-en-us
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-en.profile b/etc/profile-m-z/tor-browser-en.profile
new file mode 100644
index 000000000..ad4110c0e
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-en.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-en
5
6mkdir ${HOME}/.tor-browser-en
7whitelist ${HOME}/.tor-browser-en
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-es-es.profile b/etc/profile-m-z/tor-browser-es-es.profile
new file mode 100644
index 000000000..1aa586658
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-es-es.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-es-es
5
6mkdir ${HOME}/.tor-browser-es-es
7whitelist ${HOME}/.tor-browser-es-es
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-es.profile b/etc/profile-m-z/tor-browser-es.profile
new file mode 100644
index 000000000..a386e3387
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-es.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-es
5
6mkdir ${HOME}/.tor-browser-es
7whitelist ${HOME}/.tor-browser-es
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-fa.profile b/etc/profile-m-z/tor-browser-fa.profile
new file mode 100644
index 000000000..7f847a7c2
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-fa.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-fa
5
6mkdir ${HOME}/.tor-browser-fa
7whitelist ${HOME}/.tor-browser-fa
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-fr.profile b/etc/profile-m-z/tor-browser-fr.profile
new file mode 100644
index 000000000..bce470ec8
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-fr.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-fr
5
6mkdir ${HOME}/.tor-browser-fr
7whitelist ${HOME}/.tor-browser-fr
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-ga-ie.profile b/etc/profile-m-z/tor-browser-ga-ie.profile
new file mode 100644
index 000000000..994897a87
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-ga-ie.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-ga-ie
5
6mkdir ${HOME}/.tor-browser-ga-ie
7whitelist ${HOME}/.tor-browser-ga-ie
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-he.profile b/etc/profile-m-z/tor-browser-he.profile
new file mode 100644
index 000000000..6367b4c0a
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-he.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-he
5
6mkdir ${HOME}/.tor-browser-he
7whitelist ${HOME}/.tor-browser-he
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-hu.profile b/etc/profile-m-z/tor-browser-hu.profile
new file mode 100644
index 000000000..68e79833e
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-hu.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-hu
5
6mkdir ${HOME}/.tor-browser-hu
7whitelist ${HOME}/.tor-browser-hu
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-id.profile b/etc/profile-m-z/tor-browser-id.profile
new file mode 100644
index 000000000..85b455ba2
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-id.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-id
5
6mkdir ${HOME}/.tor-browser-id
7whitelist ${HOME}/.tor-browser-id
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-is.profile b/etc/profile-m-z/tor-browser-is.profile
new file mode 100644
index 000000000..48e88db71
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-is.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-is
5
6mkdir ${HOME}/.tor-browser-is
7whitelist ${HOME}/.tor-browser-is
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-it.profile b/etc/profile-m-z/tor-browser-it.profile
new file mode 100644
index 000000000..3c239ca29
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-it.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-it
5
6mkdir ${HOME}/.tor-browser-it
7whitelist ${HOME}/.tor-browser-it
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-ja.profile b/etc/profile-m-z/tor-browser-ja.profile
new file mode 100644
index 000000000..c52e0f64e
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-ja.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-ja
5
6mkdir ${HOME}/.tor-browser-ja
7whitelist ${HOME}/.tor-browser-ja
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-ka.profile b/etc/profile-m-z/tor-browser-ka.profile
new file mode 100644
index 000000000..173b85e5c
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-ka.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-ka
5
6mkdir ${HOME}/.tor-browser-ka
7whitelist ${HOME}/.tor-browser-ka
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-ko.profile b/etc/profile-m-z/tor-browser-ko.profile
new file mode 100644
index 000000000..8faa5afa1
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-ko.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-ko
5
6mkdir ${HOME}/.tor-browser-ko
7whitelist ${HOME}/.tor-browser-ko
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-nb.profile b/etc/profile-m-z/tor-browser-nb.profile
new file mode 100644
index 000000000..d1352dd80
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-nb.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-nb
5
6mkdir ${HOME}/.tor-browser-nb
7whitelist ${HOME}/.tor-browser-nb
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-nl.profile b/etc/profile-m-z/tor-browser-nl.profile
new file mode 100644
index 000000000..d4443cca2
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-nl.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-nl
5
6mkdir ${HOME}/.tor-browser-nl
7whitelist ${HOME}/.tor-browser-nl
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-pl.profile b/etc/profile-m-z/tor-browser-pl.profile
new file mode 100644
index 000000000..08ddd4ae7
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-pl.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-pl
5
6mkdir ${HOME}/.tor-browser-pl
7whitelist ${HOME}/.tor-browser-pl
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-pt-br.profile b/etc/profile-m-z/tor-browser-pt-br.profile
new file mode 100644
index 000000000..9942a3fe8
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-pt-br.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-pt-br
5
6mkdir ${HOME}/.tor-browser-pt-br
7whitelist ${HOME}/.tor-browser-pt-br
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-ru.profile b/etc/profile-m-z/tor-browser-ru.profile
new file mode 100644
index 000000000..6294f8ca0
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-ru.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-ru
5
6mkdir ${HOME}/.tor-browser-ru
7whitelist ${HOME}/.tor-browser-ru
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-sv-se.profile b/etc/profile-m-z/tor-browser-sv-se.profile
new file mode 100644
index 000000000..c8544262f
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-sv-se.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-sv-se
5
6mkdir ${HOME}/.tor-browser-sv-se
7whitelist ${HOME}/.tor-browser-sv-se
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-tr.profile b/etc/profile-m-z/tor-browser-tr.profile
new file mode 100644
index 000000000..2343fa8de
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-tr.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-tr
5
6mkdir ${HOME}/.tor-browser-tr
7whitelist ${HOME}/.tor-browser-tr
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-vi.profile b/etc/profile-m-z/tor-browser-vi.profile
new file mode 100644
index 000000000..734c38698
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-vi.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-vi
5
6mkdir ${HOME}/.tor-browser-vi
7whitelist ${HOME}/.tor-browser-vi
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-zh-cn.profile b/etc/profile-m-z/tor-browser-zh-cn.profile
new file mode 100644
index 000000000..21e813e45
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-zh-cn.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-zh-cn
5
6mkdir ${HOME}/.tor-browser-zh-cn
7whitelist ${HOME}/.tor-browser-zh-cn
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser-zh-tw.profile b/etc/profile-m-z/tor-browser-zh-tw.profile
new file mode 100644
index 000000000..6fe09c6c1
--- /dev/null
+++ b/etc/profile-m-z/tor-browser-zh-tw.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser-zh-tw
5
6mkdir ${HOME}/.tor-browser-zh-tw
7whitelist ${HOME}/.tor-browser-zh-tw
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser.profile b/etc/profile-m-z/tor-browser.profile
new file mode 100644
index 000000000..0cd84abf5
--- /dev/null
+++ b/etc/profile-m-z/tor-browser.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser
5
6mkdir ${HOME}/.tor-browser
7whitelist ${HOME}/.tor-browser
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_ar.profile b/etc/profile-m-z/tor-browser_ar.profile
new file mode 100644
index 000000000..1e1f5ce35
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_ar.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_ar
5
6mkdir ${HOME}/.tor-browser_ar
7whitelist ${HOME}/.tor-browser_ar
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_ca.profile b/etc/profile-m-z/tor-browser_ca.profile
new file mode 100644
index 000000000..e114b6051
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_ca.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_ca
5
6mkdir ${HOME}/.tor-browser_ca
7whitelist ${HOME}/.tor-browser_ca
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_cs.profile b/etc/profile-m-z/tor-browser_cs.profile
new file mode 100644
index 000000000..498068bc6
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_cs.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_cs
5
6mkdir ${HOME}/.tor-browser_cs
7whitelist ${HOME}/.tor-browser_cs
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_da.profile b/etc/profile-m-z/tor-browser_da.profile
new file mode 100644
index 000000000..5c25c03c8
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_da.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_da
5
6mkdir ${HOME}/.tor-browser_da
7whitelist ${HOME}/.tor-browser_da
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_de.profile b/etc/profile-m-z/tor-browser_de.profile
new file mode 100644
index 000000000..d530e7dbe
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_de.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_de
5
6mkdir ${HOME}/.tor-browser_de
7whitelist ${HOME}/.tor-browser_de
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_el.profile b/etc/profile-m-z/tor-browser_el.profile
new file mode 100644
index 000000000..67d5ab440
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_el.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_el
5
6mkdir ${HOME}/.tor-browser_el
7whitelist ${HOME}/.tor-browser_el
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_en-US.profile b/etc/profile-m-z/tor-browser_en-US.profile
new file mode 100644
index 000000000..b298ab2b8
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_en-US.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_en-US
5
6mkdir ${HOME}/.tor-browser_en-US
7whitelist ${HOME}/.tor-browser_en-US
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_en.profile b/etc/profile-m-z/tor-browser_en.profile
new file mode 100644
index 000000000..6bb0616b1
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_en.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_en
5
6mkdir ${HOME}/.tor-browser_en
7whitelist ${HOME}/.tor-browser_en
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_es-ES.profile b/etc/profile-m-z/tor-browser_es-ES.profile
new file mode 100644
index 000000000..78f57ffe5
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_es-ES.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_es-ES
5
6mkdir ${HOME}/.tor-browser_es-ES
7whitelist ${HOME}/.tor-browser_es-ES
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_es.profile b/etc/profile-m-z/tor-browser_es.profile
new file mode 100644
index 000000000..ea34a07c9
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_es.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_es
5
6mkdir ${HOME}/.tor-browser_es
7whitelist ${HOME}/.tor-browser_es
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_fa.profile b/etc/profile-m-z/tor-browser_fa.profile
new file mode 100644
index 000000000..fbc416ce5
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_fa.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_fa
5
6mkdir ${HOME}/.tor-browser_fa
7whitelist ${HOME}/.tor-browser_fa
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_fr.profile b/etc/profile-m-z/tor-browser_fr.profile
new file mode 100644
index 000000000..caea6db5b
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_fr.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_fr
5
6mkdir ${HOME}/.tor-browser_fr
7whitelist ${HOME}/.tor-browser_fr
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_ga-IE.profile b/etc/profile-m-z/tor-browser_ga-IE.profile
new file mode 100644
index 000000000..6342daebf
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_ga-IE.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_ga-IE
5
6mkdir ${HOME}/.tor-browser_ga-IE
7whitelist ${HOME}/.tor-browser_ga-IE
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_he.profile b/etc/profile-m-z/tor-browser_he.profile
new file mode 100644
index 000000000..cc4150620
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_he.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_he
5
6mkdir ${HOME}/.tor-browser_he
7whitelist ${HOME}/.tor-browser_he
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_hu.profile b/etc/profile-m-z/tor-browser_hu.profile
new file mode 100644
index 000000000..952a0b68a
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_hu.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_hu
5
6mkdir ${HOME}/.tor-browser_hu
7whitelist ${HOME}/.tor-browser_hu
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_id.profile b/etc/profile-m-z/tor-browser_id.profile
new file mode 100644
index 000000000..a006b27c0
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_id.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_id
5
6mkdir ${HOME}/.tor-browser_id
7whitelist ${HOME}/.tor-browser_id
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_is.profile b/etc/profile-m-z/tor-browser_is.profile
new file mode 100644
index 000000000..038e0fabb
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_is.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_is
5
6mkdir ${HOME}/.tor-browser_is
7whitelist ${HOME}/.tor-browser_is
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_it.profile b/etc/profile-m-z/tor-browser_it.profile
new file mode 100644
index 000000000..3d2566994
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_it.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_it
5
6mkdir ${HOME}/.tor-browser_it
7whitelist ${HOME}/.tor-browser_it
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_ja.profile b/etc/profile-m-z/tor-browser_ja.profile
new file mode 100644
index 000000000..08c942bcd
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_ja.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_ja
5
6mkdir ${HOME}/.tor-browser_ja
7whitelist ${HOME}/.tor-browser_ja
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_ka.profile b/etc/profile-m-z/tor-browser_ka.profile
new file mode 100644
index 000000000..97664be4d
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_ka.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_ka
5
6mkdir ${HOME}/.tor-browser_ka
7whitelist ${HOME}/.tor-browser_ka
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_ko.profile b/etc/profile-m-z/tor-browser_ko.profile
new file mode 100644
index 000000000..98cf1e3e1
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_ko.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_ko
5
6mkdir ${HOME}/.tor-browser_ko
7whitelist ${HOME}/.tor-browser_ko
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_nb.profile b/etc/profile-m-z/tor-browser_nb.profile
new file mode 100644
index 000000000..6df840573
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_nb.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_nb
5
6mkdir ${HOME}/.tor-browser_nb
7whitelist ${HOME}/.tor-browser_nb
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_nl.profile b/etc/profile-m-z/tor-browser_nl.profile
new file mode 100644
index 000000000..3f545f888
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_nl.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_nl
5
6mkdir ${HOME}/.tor-browser_nl
7whitelist ${HOME}/.tor-browser_nl
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_pl.profile b/etc/profile-m-z/tor-browser_pl.profile
new file mode 100644
index 000000000..4e04dc027
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_pl.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_pl
5
6mkdir ${HOME}/.tor-browser_pl
7whitelist ${HOME}/.tor-browser_pl
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_pt-BR.profile b/etc/profile-m-z/tor-browser_pt-BR.profile
new file mode 100644
index 000000000..7f864886c
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_pt-BR.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_pt-BR
5
6mkdir ${HOME}/.tor-browser_pt-BR
7whitelist ${HOME}/.tor-browser_pt-BR
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_ru.profile b/etc/profile-m-z/tor-browser_ru.profile
new file mode 100644
index 000000000..2fae6fbe7
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_ru.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_ru
5
6mkdir ${HOME}/.tor-browser_ru
7whitelist ${HOME}/.tor-browser_ru
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_sv-SE.profile b/etc/profile-m-z/tor-browser_sv-SE.profile
new file mode 100644
index 000000000..2157f8d2b
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_sv-SE.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_sv-SE
5
6mkdir ${HOME}/.tor-browser_sv-SE
7whitelist ${HOME}/.tor-browser_sv-SE
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_tr.profile b/etc/profile-m-z/tor-browser_tr.profile
new file mode 100644
index 000000000..20ac246ca
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_tr.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_tr
5
6mkdir ${HOME}/.tor-browser_tr
7whitelist ${HOME}/.tor-browser_tr
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_vi.profile b/etc/profile-m-z/tor-browser_vi.profile
new file mode 100644
index 000000000..4faa06ff6
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_vi.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_vi
5
6mkdir ${HOME}/.tor-browser_vi
7whitelist ${HOME}/.tor-browser_vi
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_zh-CN.profile b/etc/profile-m-z/tor-browser_zh-CN.profile
new file mode 100644
index 000000000..e4d8215e6
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_zh-CN.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_zh-CN
5
6mkdir ${HOME}/.tor-browser_zh-CN
7whitelist ${HOME}/.tor-browser_zh-CN
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor-browser_zh-TW.profile b/etc/profile-m-z/tor-browser_zh-TW.profile
new file mode 100644
index 000000000..8a28015a6
--- /dev/null
+++ b/etc/profile-m-z/tor-browser_zh-TW.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser_zh-TW
5
6mkdir ${HOME}/.tor-browser_zh-TW
7whitelist ${HOME}/.tor-browser_zh-TW
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/profile-m-z/tor.profile b/etc/profile-m-z/tor.profile
new file mode 100644
index 000000000..13d071635
--- /dev/null
+++ b/etc/profile-m-z/tor.profile
@@ -0,0 +1,51 @@
1# Firejail profile for tor
2# Description: Anonymizing overlay network for TCP
3# This file is overwritten after every install/update
4# Persistent local customizations
5include tor.local
6# Persistent global definitions
7include globals.local
8
9# How to use:
10# Create a script called anything (e.g. mytor)
11# with the following contents:
12
13# #!/bin/bash
14# TORCMD="tor --defaults-torrc /usr/share/tor/tor-service-defaults-torrc -f /etc/tor/torrc --RunAsDaemon 1"
15# sudo -b daemon -f -d -- firejail --profile=/home/<username>/.config/firejail/tor.profile $TORCMD
16
17# You'll also likely want to disable the system service (if it exists)
18# Run mytor (or whatever you called the script above) whenever you want to start tor
19
20include disable-common.inc
21include disable-devel.inc
22include disable-exec.inc
23include disable-interpreters.inc
24include disable-passwdmgr.inc
25include disable-programs.inc
26include disable-xdg.inc
27
28caps.keep dac_read_search,net_bind_service,setgid,setuid
29ipc-namespace
30machine-id
31netfilter
32no3d
33nodvd
34nogroups
35nonewprivs
36nosound
37notv
38nou2f
39novideo
40protocol unix,inet,inet6
41seccomp
42shell none
43
44disable-mnt
45private
46private-bin bash,tor
47private-cache
48private-dev
49private-etc alternatives,ca-certificates,crypto-policies,passwd,pki,ssl,tor
50private-tmp
51writable-var
diff --git a/etc/profile-m-z/torbrowser-launcher.profile b/etc/profile-m-z/torbrowser-launcher.profile
new file mode 100644
index 000000000..6bcc51f4d
--- /dev/null
+++ b/etc/profile-m-z/torbrowser-launcher.profile
@@ -0,0 +1,56 @@
1# Firejail profile for torbrowser-launcher
2# Description: Helps download and run the Tor Browser Bundle
3# This file is overwritten after every install/update
4# Persistent local customizations
5include torbrowser-launcher.local
6# Persistent global definitions
7include globals.local
8
9ignore noexec ${HOME}
10
11noblacklist ${HOME}/.config/torbrowser
12noblacklist ${HOME}/.local/share/torbrowser
13
14# Allow python (blacklisted by disable-interpreters.inc)
15include allow-python2.inc
16include allow-python3.inc
17
18include disable-common.inc
19include disable-devel.inc
20include disable-exec.inc
21include disable-interpreters.inc
22include disable-passwdmgr.inc
23include disable-programs.inc
24include disable-xdg.inc
25
26mkdir ${HOME}/.config/torbrowser
27mkdir ${HOME}/.local/share/torbrowser
28whitelist ${DOWNLOADS}
29whitelist ${HOME}/.config/torbrowser
30whitelist ${HOME}/.local/share/torbrowser
31include whitelist-common.inc
32include whitelist-var-common.inc
33
34caps.drop all
35netfilter
36nodvd
37nogroups
38nonewprivs
39noroot
40notv
41nou2f
42novideo
43protocol unix,inet,inet6
44seccomp !chroot
45shell none
46# tracelog may cause issues, see github issue #1930
47#tracelog
48
49disable-mnt
50private-bin bash,cat,cp,cut,dirname,env,expr,file,gpg,grep,gxmessage,id,kdialog,ln,mkdir,mv,python*,rm,sed,sh,tail,tar,tclsh,test,tor-browser,tor-browser-en,torbrowser-launcher,update-desktop-database,xmessage,xz,zenity
51private-dev
52private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,machine-id,pki,pulse,resolv.conf,ssl
53private-tmp
54
55dbus-user none
56dbus-system none
diff --git a/etc/profile-m-z/torcs.profile b/etc/profile-m-z/torcs.profile
new file mode 100644
index 000000000..8dcd7447b
--- /dev/null
+++ b/etc/profile-m-z/torcs.profile
@@ -0,0 +1,45 @@
1# Firejail profile for torcs
2# Description: The Open Racing Car Simulator
3# This file is overwritten after every install/update
4# Persistent local customizations
5include torcs.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.torcs
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.torcs
20whitelist ${HOME}/.torcs
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24caps.drop all
25ipc-namespace
26net none
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37tracelog
38
39disable-mnt
40private-cache
41private-dev
42private-tmp
43
44dbus-user none
45dbus-system none
diff --git a/etc/profile-m-z/totem.profile b/etc/profile-m-z/totem.profile
new file mode 100644
index 000000000..d49ef0cb8
--- /dev/null
+++ b/etc/profile-m-z/totem.profile
@@ -0,0 +1,47 @@
1# Firejail profile for totem
2# Description: Simple media player for the GNOME desktop based on GStreamer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include totem.local
6# Persistent global definitions
7include globals.local
8
9# Allow lua (required for youtube video)
10include allow-lua.inc
11
12noblacklist ${HOME}/.config/totem
13noblacklist ${HOME}/.local/share/totem
14noblacklist ${MUSIC}
15noblacklist ${VIDEOS}
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25include whitelist-var-common.inc
26
27# apparmor - makes settings immutable
28caps.drop all
29netfilter
30nogroups
31nonewprivs
32noroot
33nou2f
34protocol unix,inet,inet6
35seccomp
36shell none
37
38private-bin totem
39# totem needs access to ~/.cache/tracker or it exits
40#private-cache
41private-dev
42# private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,machine-id,pki,pulse,ssl
43private-tmp
44
45# makes settings immutable
46# dbus-user none
47# dbus-system none
diff --git a/etc/profile-m-z/tracker.profile b/etc/profile-m-z/tracker.profile
new file mode 100644
index 000000000..9030b1e01
--- /dev/null
+++ b/etc/profile-m-z/tracker.profile
@@ -0,0 +1,39 @@
1# Firejail profile for tracker
2# Description: Metadata database, indexer and search tool
3# This file is overwritten after every install/update
4# Persistent local customizations
5include tracker.local
6# Persistent global definitions
7include globals.local
8
9# Tracker is started by systemd on most systems. Therefore it is not firejailed by default
10
11blacklist /tmp/.X11-unix
12blacklist ${RUNUSER}/wayland-*
13
14include disable-common.inc
15include disable-devel.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20include whitelist-runuser-common.inc
21
22caps.drop all
23netfilter
24no3d
25nodvd
26nogroups
27nonewprivs
28noroot
29nosound
30notv
31novideo
32protocol unix
33seccomp
34shell none
35tracelog
36
37# private-bin tracker
38# private-dev
39# private-tmp
diff --git a/etc/profile-m-z/transgui.profile b/etc/profile-m-z/transgui.profile
new file mode 100644
index 000000000..cafc6e6d1
--- /dev/null
+++ b/etc/profile-m-z/transgui.profile
@@ -0,0 +1,54 @@
1# Firejail profile for transgui
2# Description: Cross-platform Transmission BitTorrent client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include transgui.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/transgui
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.config/transgui
20whitelist ${HOME}/.config/transgui
21whitelist ${DOWNLOADS}
22include whitelist-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28ipc-namespace
29machine-id
30netfilter
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix,inet,inet6
40seccomp
41shell none
42tracelog
43
44private-bin geoiplookup,geoiplookup6,transgui
45private-cache
46private-dev
47private-etc alternatives,fonts
48private-lib libgdk_pixbuf-2.0.so.*,libGeoIP.so*,libgthread-2.0.so.*,libgtk-x11-2.0.so.*,libX11.so.*
49private-tmp
50
51dbus-user none
52dbus-system none
53
54memory-deny-write-execute
diff --git a/etc/profile-m-z/transmission-cli.profile b/etc/profile-m-z/transmission-cli.profile
new file mode 100644
index 000000000..486be5fe6
--- /dev/null
+++ b/etc/profile-m-z/transmission-cli.profile
@@ -0,0 +1,14 @@
1# Firejail profile for transmission-cli
2# Description: Fast, easy and free BitTorrent client (CLI tools and web client)
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include transmission-cli.local
7# Persistent global definitions
8include globals.local
9
10private-bin transmission-cli
11private-etc alternatives,ca-certificates,crypto-policies,nsswitch.conf,pki,resolv.conf,ssl
12
13# Redirect
14include transmission-common.profile
diff --git a/etc/profile-m-z/transmission-common.profile b/etc/profile-m-z/transmission-common.profile
new file mode 100644
index 000000000..9d2e8e990
--- /dev/null
+++ b/etc/profile-m-z/transmission-common.profile
@@ -0,0 +1,53 @@
1# Firejail profile for transmission-common
2# Description: Fast, easy and free BitTorrent client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include transmission-common.local
6# Persistent global definitions
7# added by caller profile
8#include globals.local
9
10noblacklist ${HOME}/.cache/transmission
11noblacklist ${HOME}/.config/transmission
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20mkdir ${HOME}/.cache/transmission
21mkdir ${HOME}/.config/transmission
22whitelist ${DOWNLOADS}
23whitelist ${HOME}/.cache/transmission
24whitelist ${HOME}/.config/transmission
25include whitelist-common.inc
26include whitelist-usr-share-common.inc
27include whitelist-var-common.inc
28
29apparmor
30caps.drop all
31machine-id
32netfilter
33nodvd
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix,inet,inet6
41seccomp
42shell none
43tracelog
44
45private-cache
46private-dev
47private-lib
48private-tmp
49
50dbus-user none
51dbus-system none
52
53memory-deny-write-execute
diff --git a/etc/profile-m-z/transmission-create.profile b/etc/profile-m-z/transmission-create.profile
new file mode 100644
index 000000000..8220b7887
--- /dev/null
+++ b/etc/profile-m-z/transmission-create.profile
@@ -0,0 +1,13 @@
1# Firejail profile for transmission-create
2# Description: CLI utility to create BitTorrent .torrent files
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include transmission-create.local
7# Persistent global definitions
8include globals.local
9
10private-bin transmission-create
11
12# Redirect
13include transmission-common.profile
diff --git a/etc/profile-m-z/transmission-daemon.profile b/etc/profile-m-z/transmission-daemon.profile
new file mode 100644
index 000000000..363c685e0
--- /dev/null
+++ b/etc/profile-m-z/transmission-daemon.profile
@@ -0,0 +1,26 @@
1# Firejail profile for transmission-daemon
2# Description: Fast, easy and free BitTorrent client (daemon)
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include transmission-daemon.local
7# Persistent global definitions
8include globals.local
9
10ignore caps.drop all
11
12mkdir ${HOME}/.config/transmission-daemon
13whitelist ${HOME}/.config/transmission-daemon
14whitelist /var/lib/transmission
15
16caps.keep ipc_lock,net_bind_service,setgid,setuid,sys_chroot
17
18private-bin transmission-daemon
19private-etc alternatives,ca-certificates,crypto-policies,nsswitch.conf,pki,resolv.conf,ssl
20
21read-write /var/lib/transmission
22writable-var-log
23writable-run-user
24
25# Redirect
26include transmission-common.profile
diff --git a/etc/profile-m-z/transmission-edit.profile b/etc/profile-m-z/transmission-edit.profile
new file mode 100644
index 000000000..df381b5cd
--- /dev/null
+++ b/etc/profile-m-z/transmission-edit.profile
@@ -0,0 +1,13 @@
1# Firejail profile for transmission-edit
2# Description: CLI utility to modify BitTorrent .torrent files' announce URLs
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include transmission-edit.local
7# Persistent global definitions
8include globals.local
9
10private-bin transmission-edit
11
12# Redirect
13include transmission-common.profile
diff --git a/etc/profile-m-z/transmission-gtk.profile b/etc/profile-m-z/transmission-gtk.profile
new file mode 100644
index 000000000..baa970307
--- /dev/null
+++ b/etc/profile-m-z/transmission-gtk.profile
@@ -0,0 +1,17 @@
1# Firejail profile for transmission-gtk
2# Description: Fast, easy and free BitTorrent client (GTK GUI)
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include transmission-gtk.local
7# Persistent global definitions
8include globals.local
9
10include whitelist-runuser-common.inc
11
12private-bin transmission-gtk
13
14ignore memory-deny-write-execute
15
16# Redirect
17include transmission-common.profile
diff --git a/etc/profile-m-z/transmission-qt.profile b/etc/profile-m-z/transmission-qt.profile
new file mode 100644
index 000000000..94f3c3a20
--- /dev/null
+++ b/etc/profile-m-z/transmission-qt.profile
@@ -0,0 +1,18 @@
1# Firejail profile for transmission-qt
2# Description: Fast, easy and free BitTorrent client (Qt GUI)
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include transmission-qt.local
7# Persistent global definitions
8include globals.local
9
10private-bin transmission-qt
11
12# private-lib - breaks on Arch
13ignore private-lib
14
15ignore memory-deny-write-execute
16
17# Redirect
18include transmission-common.profile
diff --git a/etc/profile-m-z/transmission-remote-cli.profile b/etc/profile-m-z/transmission-remote-cli.profile
new file mode 100644
index 000000000..7b9285e66
--- /dev/null
+++ b/etc/profile-m-z/transmission-remote-cli.profile
@@ -0,0 +1,17 @@
1# Firejail profile for transmission-remote-cli
2# Description: A remote control utility for transmission-daemon (CLI)
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include transmission-remote-cli.local
7# Persistent global definitions
8include globals.local
9
10# Allow python (blacklisted by disable-interpreters.inc)
11include allow-python2.inc
12include allow-python3.inc
13
14private-bin python*,transmission-remote-cli
15
16# Redirect
17include transmission-common.profile
diff --git a/etc/profile-m-z/transmission-remote-gtk.profile b/etc/profile-m-z/transmission-remote-gtk.profile
new file mode 100644
index 000000000..a6400e2c0
--- /dev/null
+++ b/etc/profile-m-z/transmission-remote-gtk.profile
@@ -0,0 +1,22 @@
1# Firejail profile for transmission-remote-gtk
2# Description: A remote control utility for transmission-daemon (GTK GUI)
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include transmission-remote-gtk.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${HOME}/.config/transmission-remote-gtk
11
12mkdir ${HOME}/.config/transmission-remote-gtk
13whitelist ${HOME}/.config/transmission-remote-gtk
14
15private-etc fonts,hostname,hosts,resolv.conf
16# Problems with private-lib (see issue #2889)
17ignore private-lib
18
19ignore memory-deny-write-execute
20
21# Redirect
22include transmission-common.profile
diff --git a/etc/profile-m-z/transmission-remote.profile b/etc/profile-m-z/transmission-remote.profile
new file mode 100644
index 000000000..fee4999e6
--- /dev/null
+++ b/etc/profile-m-z/transmission-remote.profile
@@ -0,0 +1,14 @@
1# Firejail profile for transmission-remote
2# Description: A remote control utility for transmission-daemon (CLI)
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include transmission-remote.local
7# Persistent global definitions
8include globals.local
9
10private-bin transmission-remote
11private-etc alternatives,hosts,nsswitch.conf
12
13# Redirect
14include transmission-common.profile
diff --git a/etc/profile-m-z/transmission-show.profile b/etc/profile-m-z/transmission-show.profile
new file mode 100644
index 000000000..5a3c83f58
--- /dev/null
+++ b/etc/profile-m-z/transmission-show.profile
@@ -0,0 +1,14 @@
1# Firejail profile for transmission-show
2# Description: CLI utility to show BitTorrent .torrent file metadata
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include transmission-show.local
7# Persistent global definitions
8include globals.local
9
10private-bin transmission-show
11private-etc alternatives,hosts,nsswitch.conf
12
13# Redirect
14include transmission-common.profile
diff --git a/etc/profile-m-z/tremulous.profile b/etc/profile-m-z/tremulous.profile
new file mode 100644
index 000000000..64bb8cba8
--- /dev/null
+++ b/etc/profile-m-z/tremulous.profile
@@ -0,0 +1,46 @@
1# Firejail profile for tremulous
2# Description: First Person Shooter game based on the Quake 3 engine
3# This file is overwritten after every install/update
4# Persistent local customizations
5include tremulous.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.tremulous
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.tremulous
20whitelist ${HOME}/.tremulous
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24caps.drop all
25ipc-namespace
26netfilter
27nodvd
28nogroups
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix,inet,inet6
35seccomp
36shell none
37tracelog
38
39disable-mnt
40private-bin tremded,tremulous,tremulous-wrapper
41private-cache
42private-dev
43private-tmp
44
45dbus-user none
46dbus-system none
diff --git a/etc/profile-m-z/truecraft.profile b/etc/profile-m-z/truecraft.profile
new file mode 100644
index 000000000..e76d52219
--- /dev/null
+++ b/etc/profile-m-z/truecraft.profile
@@ -0,0 +1,39 @@
1# Firejail profile for truecraft
2# This file is overwritten after every install/update
3# Persistent local customizations
4include truecraft.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/mono
9noblacklist ${HOME}/.config/truecraft
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.config/mono
19mkdir ${HOME}/.config/truecraft
20whitelist ${HOME}/.config/mono
21whitelist ${HOME}/.config/truecraft
22include whitelist-common.inc
23
24caps.drop all
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix,inet,inet6
33seccomp
34shell none
35
36disable-mnt
37private-dev
38private-tmp
39
diff --git a/etc/profile-m-z/ts3client_runscript.sh.profile b/etc/profile-m-z/ts3client_runscript.sh.profile
new file mode 100644
index 000000000..8d4675454
--- /dev/null
+++ b/etc/profile-m-z/ts3client_runscript.sh.profile
@@ -0,0 +1,19 @@
1# Firejail profile alias for teamspeak3
2# Description: TeamSpeak is software for quality voice communication via the Internet
3# This file is overwritten after every install/update
4# Persistent local customizations
5include ts3client_runscript.sh.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10ignore noexec ${HOME}
11
12noblacklist ${HOME}/TeamSpeak3-Client-linux_x86
13noblacklist ${HOME}/TeamSpeak3-Client-linux_amd64
14
15whitelist ${HOME}/TeamSpeak3-Client-linux_x86
16whitelist ${HOME}/TeamSpeak3-Client-linux_amd64
17
18# Redirect
19include teamspeak3.profile
diff --git a/etc/profile-m-z/tshark.profile b/etc/profile-m-z/tshark.profile
new file mode 100644
index 000000000..684a9491d
--- /dev/null
+++ b/etc/profile-m-z/tshark.profile
@@ -0,0 +1,46 @@
1# Firejail profile for tshark
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include tshark.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17whitelist /usr/share/wireshark
18include whitelist-common.inc
19include whitelist-runuser-common.inc
20include whitelist-usr-share-common.inc
21include whitelist-var-common.inc
22
23apparmor
24#caps.keep net_raw
25caps.keep dac_override,net_admin,net_raw
26ipc-namespace
27#net tun0
28netfilter
29no3d
30nodvd
31# nogroups - breaks network traffic capture for unprivileged users
32# nonewprivs - breaks network traffic capture for unprivileged users
33# noroot
34nosound
35notv
36nou2f
37novideo
38#protocol unix,inet,inet6,netlink,packet
39#seccomp
40
41disable-mnt
42#private
43private-cache
44#private-bin tshark
45private-dev
46private-tmp
diff --git a/etc/profile-m-z/tuxguitar.profile b/etc/profile-m-z/tuxguitar.profile
new file mode 100644
index 000000000..d2b13d9ee
--- /dev/null
+++ b/etc/profile-m-z/tuxguitar.profile
@@ -0,0 +1,45 @@
1# Firejail profile for tuxguitar
2# Description: Multitrack guitar tablature editor and player (gp3 to gp5)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include tuxguitar.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.tuxguitar*
10noblacklist ${DOCUMENTS}
11noblacklist ${MUSIC}
12
13# Allow java (blacklisted by disable-devel.inc)
14include allow-java.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28netfilter
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34notv
35nou2f
36novideo
37protocol unix,inet,inet6
38seccomp
39tracelog
40
41private-dev
42private-tmp
43
44# noexec ${HOME} - tuxguitar may fail to launch
45noexec /tmp
diff --git a/etc/profile-m-z/tvbrowser.profile b/etc/profile-m-z/tvbrowser.profile
new file mode 100644
index 000000000..d3dcbfe53
--- /dev/null
+++ b/etc/profile-m-z/tvbrowser.profile
@@ -0,0 +1,53 @@
1# Firejail profile for tvbrowser
2# Description: java tv programm form tvbrowser.org
3# This file is overwritten after every install/update
4# Persistent local customizations
5include tvbrowser.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/tvbrowser
10noblacklist ${HOME}/.tvbrowser
11
12# Allow java (blacklisted by disable-devel.inc)
13include allow-java.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23mkdir ${HOME}/.config/tvbrowser
24mkdir ${HOME}/.tvbrowser
25whitelist ${HOME}/.config/tvbrowser
26whitelist ${HOME}/.tvbrowser
27whitelist /usr/share/tvbrowser
28include whitelist-common.inc
29include whitelist-usr-share-common.inc
30include whitelist-var-common.inc
31
32caps.drop all
33netfilter
34no3d
35nodvd
36nogroups
37nonewprivs
38noroot
39notv
40nou2f
41novideo
42protocol unix,inet,inet6
43seccomp
44shell none
45tracelog
46
47disable-mnt
48private-cache
49private-dev
50private-tmp
51
52dbus-user none
53dbus-system none
diff --git a/etc/profile-m-z/udiskie.profile b/etc/profile-m-z/udiskie.profile
new file mode 100644
index 000000000..265f6429d
--- /dev/null
+++ b/etc/profile-m-z/udiskie.profile
@@ -0,0 +1,45 @@
1# Firejail profile for udiskie
2# Description: Removable disk automounter using udisks
3# This file is overwritten after every install/update
4# Persistent local customizations
5include udiskie.local
6# Persistent global definitions
7include globals.local
8
9# Allow python (blacklisted by disable-interpreters.inc)
10include allow-python3.inc
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-var-common.inc
21
22caps.drop all
23machine-id
24net none
25no3d
26nogroups
27nonewprivs
28noroot
29nosound
30notv
31nou2f
32novideo
33protocol unix
34seccomp !request_key
35shell none
36tracelog
37
38private-bin awk,cut,dbus-send,egrep,file,grep,head,python*,readlink,sed,sh,udiskie,uname,which,xdg-mime,xdg-open,xprop
39# add your configured file browser in udiskie.local, e. g.
40# private-bin nautilus
41# private-bin thunar
42private-cache
43private-dev
44private-etc alternatives,fonts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,mime.types,xdg
45private-tmp
diff --git a/etc/profile-m-z/uefitool.profile b/etc/profile-m-z/uefitool.profile
new file mode 100644
index 000000000..8807b0b2c
--- /dev/null
+++ b/etc/profile-m-z/uefitool.profile
@@ -0,0 +1,39 @@
1# Firejail profile for uefitool
2# This file is overwritten after every install/update
3# Persistent local customizations
4include uefitool.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${DOCUMENTS}
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16include disable-xdg.inc
17
18caps.drop all
19ipc-namespace
20net none
21no3d
22nodvd
23nogroups
24nonewprivs
25noroot
26nosound
27notv
28nou2f
29novideo
30protocol unix
31seccomp
32shell none
33
34private-cache
35private-dev
36private-tmp
37
38dbus-user none
39dbus-system none
diff --git a/etc/profile-m-z/uget-gtk.profile b/etc/profile-m-z/uget-gtk.profile
new file mode 100644
index 000000000..8a2e83a1a
--- /dev/null
+++ b/etc/profile-m-z/uget-gtk.profile
@@ -0,0 +1,37 @@
1# Firejail profile for uget-gtk
2# This file is overwritten after every install/update
3# Persistent local customizations
4include uget-gtk.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/uGet
9
10include disable-common.inc
11include disable-devel.inc
12include disable-interpreters.inc
13include disable-programs.inc
14
15mkdir ${HOME}/.config/uGet
16whitelist ${DOWNLOADS}
17whitelist ${HOME}/.config/uGet
18include whitelist-common.inc
19include whitelist-usr-share-common.inc
20include whitelist-var-common.inc
21
22caps.drop all
23netfilter
24nodvd
25nonewprivs
26noroot
27nosound
28notv
29nou2f
30novideo
31protocol unix,inet,inet6
32seccomp
33shell none
34
35private-bin uget-gtk
36private-dev
37private-tmp
diff --git a/etc/profile-m-z/unbound.profile b/etc/profile-m-z/unbound.profile
new file mode 100644
index 000000000..714a3f2f4
--- /dev/null
+++ b/etc/profile-m-z/unbound.profile
@@ -0,0 +1,52 @@
1# Firejail profile for unbound
2# Description: Validating, recursive, caching DNS resolver
3# This file is overwritten after every install/update
4# Persistent local customizations
5include unbound.local
6# Persistent global definitions
7include globals.local
8
9noblacklist /sbin
10noblacklist /usr/sbin
11
12blacklist /tmp/.X11-unix
13blacklist ${RUNUSER}/wayland-*
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23include whitelist-usr-share-common.inc
24
25whitelist /var/lib/unbound
26whitelist /var/run
27
28caps.keep net_admin,net_bind_service,setgid,setuid,sys_chroot,sys_resource
29ipc-namespace
30machine-id
31netfilter
32no3d
33nodvd
34nonewprivs
35nosound
36notv
37nou2f
38novideo
39protocol inet,inet6
40seccomp.drop _sysctl,acct,add_key,adjtimex,clock_adjtime,delete_module,fanotify_init,finit_module,get_mempolicy,init_module,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioperm,iopl,kcmp,kexec_file_load,kexec_load,keyctl,lookup_dcookie,mbind,migrate_pages,modify_ldt,mount,move_pages,open_by_handle_at,perf_event_open,perf_event_open,pivot_root,process_vm_readv,process_vm_writev,ptrace,remap_file_pages,request_key,set_mempolicy,swapoff,swapon,sysfs,syslog,umount2,uselib,vmsplice
41
42disable-mnt
43private
44private-dev
45private-tmp
46writable-var
47
48dbus-user none
49dbus-system none
50
51# mdwe can break modules/plugins
52memory-deny-write-execute
diff --git a/etc/profile-m-z/uncompress.profile b/etc/profile-m-z/uncompress.profile
new file mode 100644
index 000000000..f659d8e87
--- /dev/null
+++ b/etc/profile-m-z/uncompress.profile
@@ -0,0 +1,11 @@
1# Firejail profile for uncompress
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include uncompress.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gzip.profile
diff --git a/etc/profile-m-z/unf.profile b/etc/profile-m-z/unf.profile
new file mode 100644
index 000000000..fbbe949e9
--- /dev/null
+++ b/etc/profile-m-z/unf.profile
@@ -0,0 +1,58 @@
1# Firejail profile for unf
2# Description: UNixize Filename -- replace annoying anti-unix characters in filenames
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include unf.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20whitelist ${DOWNLOADS}
21include whitelist-common.inc
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24
25apparmor
26caps.drop all
27hostname unf
28ipc-namespace
29machine-id
30net none
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix
41seccomp
42shell none
43tracelog
44x11 none
45
46disable-mnt
47private-bin unf
48private-cache
49?HAS_APPIMAGE: ignore private-dev
50private-dev
51private-etc alternatives
52private-lib gcc/*/*/libgcc_s.so.*
53private-tmp
54
55dbus-user none
56dbus-system none
57
58memory-deny-write-execute
diff --git a/etc/profile-m-z/unknown-horizons.profile b/etc/profile-m-z/unknown-horizons.profile
new file mode 100644
index 000000000..7dc13e284
--- /dev/null
+++ b/etc/profile-m-z/unknown-horizons.profile
@@ -0,0 +1,44 @@
1# Firejail profile for unknown-horizons
2# Description: 2D realtime strategy simulation
3# This file is overwritten after every install/update
4# Persistent local customizations
5include unknown-horizons.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.unknown-horizons
10
11include disable-common.inc
12include disable-exec.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15
16mkdir ${HOME}/.unknown-horizons
17whitelist ${HOME}/.unknown-horizons
18include whitelist-common.inc
19include whitelist-runuser-common.inc
20whitelist /usr/share/unknown-horizons
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31nou2f
32novideo
33protocol unix,inet,inet6,netlink
34seccomp
35shell none
36
37disable-mnt
38# private-bin unknown-horizons
39private-dev
40# private-etc alternatives,ca-certificates,crypto-policies,pki,ssl
41private-tmp
42
43# doesn't work - maybe all Tcl/Tk programs have this problem
44# memory-deny-write-execute
diff --git a/etc/profile-m-z/unlzma.profile b/etc/profile-m-z/unlzma.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-m-z/unlzma.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-m-z/unrar.profile b/etc/profile-m-z/unrar.profile
new file mode 100644
index 000000000..88a753d59
--- /dev/null
+++ b/etc/profile-m-z/unrar.profile
@@ -0,0 +1,45 @@
1# Firejail profile for unrar
2# Description: Unarchiver for .rar files
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include unrar.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19caps.drop all
20hostname unrar
21ipc-namespace
22machine-id
23net none
24no3d
25nodvd
26#nogroups
27nonewprivs
28#noroot
29nosound
30notv
31nou2f
32novideo
33protocol unix
34seccomp
35shell none
36tracelog
37x11 none
38
39private-bin unrar
40private-dev
41private-etc alternatives,group,localtime,passwd
42private-tmp
43
44dbus-user none
45dbus-system none
diff --git a/etc/profile-m-z/unxz.profile b/etc/profile-m-z/unxz.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-m-z/unxz.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-m-z/unzip.profile b/etc/profile-m-z/unzip.profile
new file mode 100644
index 000000000..b4b63882b
--- /dev/null
+++ b/etc/profile-m-z/unzip.profile
@@ -0,0 +1,47 @@
1# Firejail profile for unzip
2# Description: De-archiver for .zip files
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include unzip.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12# GNOME Shell integration (chrome-gnome-shell)
13noblacklist ${HOME}/.local/share/gnome-shell
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22caps.drop all
23hostname unzip
24ipc-namespace
25machine-id
26net none
27no3d
28nodvd
29#nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39tracelog
40x11 none
41
42private-bin unzip
43private-dev
44private-etc alternatives,group,localtime,passwd
45
46dbus-user none
47dbus-system none
diff --git a/etc/profile-m-z/unzstd.profile b/etc/profile-m-z/unzstd.profile
new file mode 100644
index 000000000..ce9af3286
--- /dev/null
+++ b/etc/profile-m-z/unzstd.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for zstd
2# This file is overwritten after every install/update
3
4# Redirect
5include zstd.profile
diff --git a/etc/profile-m-z/utox.profile b/etc/profile-m-z/utox.profile
new file mode 100644
index 000000000..9877ea889
--- /dev/null
+++ b/etc/profile-m-z/utox.profile
@@ -0,0 +1,48 @@
1# Firejail profile for utox
2# Description: Lightweight Tox client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include utox.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/Tox
10noblacklist ${HOME}/.config/tox
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20mkdir ${HOME}/.config/tox
21whitelist ${DOWNLOADS}
22whitelist ${HOME}/.config/tox
23include whitelist-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28ipc-namespace
29netfilter
30nodvd
31nogroups
32nonewprivs
33noroot
34notv
35nou2f
36protocol unix,inet,inet6
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private-bin utox
43private-cache
44private-dev
45private-etc alternatives,ca-certificates,crypto-policies,fonts,ld.so.cache,localtime,machine-id,openal,pki,pulse,resolv.conf,ssl
46private-tmp
47
48memory-deny-write-execute
diff --git a/etc/profile-m-z/uudeview.profile b/etc/profile-m-z/uudeview.profile
new file mode 100644
index 000000000..6b5f14cab
--- /dev/null
+++ b/etc/profile-m-z/uudeview.profile
@@ -0,0 +1,46 @@
1# Firejail profile for uudeview
2# Description: Smart multi-file multi-part decoder
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include uudeview.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19include whitelist-usr-share-common.inc
20
21caps.drop all
22hostname uudeview
23ipc-namespace
24machine-id
25net none
26nodvd
27#nogroups
28nonewprivs
29#noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37tracelog
38x11 none
39
40private-bin uudeview
41private-cache
42private-dev
43private-etc alternatives,ld.so.preload
44
45dbus-user none
46dbus-system none
diff --git a/etc/profile-m-z/uzbl-browser.profile b/etc/profile-m-z/uzbl-browser.profile
new file mode 100644
index 000000000..41487a8f2
--- /dev/null
+++ b/etc/profile-m-z/uzbl-browser.profile
@@ -0,0 +1,40 @@
1# Firejail profile for uzbl-browser
2# This file is overwritten after every install/update
3# Persistent local customizations
4include uzbl-browser.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/uzbl
9noblacklist ${HOME}/.gnupg
10noblacklist ${HOME}/.local/share/uzbl
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-interpreters.inc
19include disable-programs.inc
20
21mkdir ${HOME}/.config/uzbl
22mkdir ${HOME}/.gnupg
23mkdir ${HOME}/.local/share/uzbl
24mkdir ${HOME}/.password-store
25whitelist ${DOWNLOADS}
26whitelist ${HOME}/.config/uzbl
27whitelist ${HOME}/.gnupg
28whitelist ${HOME}/.local/share/uzbl
29whitelist ${HOME}/.password-store
30include whitelist-common.inc
31
32caps.drop all
33netfilter
34nodvd
35nonewprivs
36noroot
37notv
38protocol unix,inet,inet6
39seccomp
40tracelog
diff --git a/etc/profile-m-z/viewnior.profile b/etc/profile-m-z/viewnior.profile
new file mode 100644
index 000000000..f009f6340
--- /dev/null
+++ b/etc/profile-m-z/viewnior.profile
@@ -0,0 +1,51 @@
1# Firejail profile for viewnior
2# Description: Simple, fast and elegant image viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include viewnior.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.Steam
10noblacklist ${HOME}/.config/viewnior
11noblacklist ${HOME}/.steam
12
13blacklist ${HOME}/.bashrc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24
25apparmor
26caps.drop all
27net none
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40tracelog
41
42private-bin viewnior
43private-cache
44private-dev
45private-etc alternatives,fonts,machine-id
46private-tmp
47
48dbus-user none
49dbus-system none
50
51#memory-deny-write-execute - breaks on Arch (see issues #1803 and #1808)
diff --git a/etc/profile-m-z/viking.profile b/etc/profile-m-z/viking.profile
new file mode 100644
index 000000000..5b6228a94
--- /dev/null
+++ b/etc/profile-m-z/viking.profile
@@ -0,0 +1,37 @@
1# Firejail profile for viking
2# Description: GPS data editor, analyzer and viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include viking.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.viking
10noblacklist ${HOME}/.viking-maps
11noblacklist ${DOCUMENTS}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21caps.drop all
22netfilter
23no3d
24nodvd
25nogroups
26nonewprivs
27noroot
28nosound
29notv
30nou2f
31protocol unix,inet,inet6
32seccomp
33shell none
34
35private-dev
36private-tmp
37
diff --git a/etc/profile-m-z/vim.profile b/etc/profile-m-z/vim.profile
new file mode 100644
index 000000000..e9a474239
--- /dev/null
+++ b/etc/profile-m-z/vim.profile
@@ -0,0 +1,34 @@
1# Firejail profile for vim
2# Description: Vi IMproved - enhanced vi editor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include vim.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.vim
10noblacklist ${HOME}/.viminfo
11noblacklist ${HOME}/.vimrc
12
13# Allows files commonly used by IDEs
14include allow-common-devel.inc
15
16include disable-common.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20include whitelist-runuser-common.inc
21
22caps.drop all
23netfilter
24nodvd
25nogroups
26nonewprivs
27noroot
28notv
29nou2f
30novideo
31protocol unix,inet,inet6
32seccomp
33
34private-dev
diff --git a/etc/profile-m-z/vimcat.profile b/etc/profile-m-z/vimcat.profile
new file mode 100644
index 000000000..73b76b5ab
--- /dev/null
+++ b/etc/profile-m-z/vimcat.profile
@@ -0,0 +1,10 @@
1# Firejail profile for vimcat
2# This file is overwritten after every install/update
3# Persistent local customizations
4include vimcat.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include vim.profile
diff --git a/etc/profile-m-z/vimdiff.profile b/etc/profile-m-z/vimdiff.profile
new file mode 100644
index 000000000..f09faf1d6
--- /dev/null
+++ b/etc/profile-m-z/vimdiff.profile
@@ -0,0 +1,10 @@
1# Firejail profile for vimdiff
2# This file is overwritten after every install/update
3# Persistent local customizations
4include vimdiff.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include vim.profile
diff --git a/etc/profile-m-z/vimpager.profile b/etc/profile-m-z/vimpager.profile
new file mode 100644
index 000000000..af7703752
--- /dev/null
+++ b/etc/profile-m-z/vimpager.profile
@@ -0,0 +1,11 @@
1# Firejail profile for vimpager
2# Description: A vim-based script to use as a PAGER
3# This file is overwritten after every install/update
4# Persistent local customizations
5include vimpager.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include vim.profile
diff --git a/etc/profile-m-z/vimtutor.profile b/etc/profile-m-z/vimtutor.profile
new file mode 100644
index 000000000..b9584cc49
--- /dev/null
+++ b/etc/profile-m-z/vimtutor.profile
@@ -0,0 +1,10 @@
1# Firejail profile for vimtutor
2# This file is overwritten after every install/update
3# Persistent local customizations
4include vimtutor.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include vim.profile
diff --git a/etc/profile-m-z/virtualbox.profile b/etc/profile-m-z/virtualbox.profile
new file mode 100644
index 000000000..c0dbc9116
--- /dev/null
+++ b/etc/profile-m-z/virtualbox.profile
@@ -0,0 +1,32 @@
1# Firejail profile for virtualbox
2# Description: x86 virtualization solution
3# This file is overwritten after every install/update
4# Persistent local customizations
5include virtualbox.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.VirtualBox
10noblacklist ${HOME}/.config/VirtualBox
11noblacklist ${HOME}/VirtualBox VMs
12# noblacklist /usr/bin/virtualbox
13noblacklist /usr/lib/virtualbox
14noblacklist /usr/lib64/virtualbox
15
16include disable-common.inc
17include disable-exec.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21mkdir ${HOME}/.config/VirtualBox
22mkdir ${HOME}/VirtualBox VMs
23whitelist ${HOME}/.config/VirtualBox
24whitelist ${HOME}/VirtualBox VMs
25whitelist ${DOWNLOADS}
26include whitelist-common.inc
27include whitelist-var-common.inc
28
29caps.keep net_raw,sys_admin,sys_nice
30netfilter
31nodvd
32notv
diff --git a/etc/profile-m-z/vivaldi-beta.profile b/etc/profile-m-z/vivaldi-beta.profile
new file mode 100644
index 000000000..5de5682a3
--- /dev/null
+++ b/etc/profile-m-z/vivaldi-beta.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for vivaldi
2# This file is overwritten after every install/update
3
4# Redirect
5include vivaldi.profile
diff --git a/etc/profile-m-z/vivaldi-snapshot.profile b/etc/profile-m-z/vivaldi-snapshot.profile
new file mode 100644
index 000000000..ea4a4009f
--- /dev/null
+++ b/etc/profile-m-z/vivaldi-snapshot.profile
@@ -0,0 +1,17 @@
1# Firejail profile for vivaldi-snapshot
2# This file is overwritten after every install/update
3# Persistent local customizations
4include vivaldi-snapshot.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/vivaldi-snapshot
9noblacklist ${HOME}/.config/vivaldi-snapshot
10
11mkdir ${HOME}/.cache/vivaldi-snapshot
12mkdir ${HOME}/.config/vivaldi-snapshot
13whitelist ${HOME}/.cache/vivaldi-snapshot
14whitelist ${HOME}/.config/vivaldi-snapshot
15
16# Redirect
17include chromium-common.profile
diff --git a/etc/profile-m-z/vivaldi-stable.profile b/etc/profile-m-z/vivaldi-stable.profile
new file mode 100644
index 000000000..5de5682a3
--- /dev/null
+++ b/etc/profile-m-z/vivaldi-stable.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for vivaldi
2# This file is overwritten after every install/update
3
4# Redirect
5include vivaldi.profile
diff --git a/etc/profile-m-z/vivaldi.profile b/etc/profile-m-z/vivaldi.profile
new file mode 100644
index 000000000..096ce8a72
--- /dev/null
+++ b/etc/profile-m-z/vivaldi.profile
@@ -0,0 +1,31 @@
1# Firejail profile for vivaldi
2# This file is overwritten after every install/update
3# Persistent local customizations
4include vivaldi.local
5# Persistent global definitions
6include globals.local
7
8# Allow HTML5 Proprietary Media & DRM/EME (Widevine)
9ignore apparmor
10ignore noexec /var
11noblacklist /var/opt
12whitelist /var/opt/vivaldi
13writable-var
14
15noblacklist ${HOME}/.cache/vivaldi
16noblacklist ${HOME}/.config/vivaldi
17noblacklist ${HOME}/.local/lib/vivaldi
18
19mkdir ${HOME}/.cache/vivaldi
20mkdir ${HOME}/.config/vivaldi
21mkdir ${HOME}/.local/lib/vivaldi
22whitelist ${HOME}/.cache/vivaldi
23whitelist ${HOME}/.config/vivaldi
24whitelist ${HOME}/.local/lib/vivaldi
25
26# breaks vivaldi sync
27ignore dbus-user none
28ignore dbus-system none
29
30# Redirect
31include chromium-common.profile
diff --git a/etc/profile-m-z/vlc.profile b/etc/profile-m-z/vlc.profile
new file mode 100644
index 000000000..0069ebeae
--- /dev/null
+++ b/etc/profile-m-z/vlc.profile
@@ -0,0 +1,45 @@
1# Firejail profile for vlc
2# Description: Multimedia player and streamer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include vlc.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/vlc
10noblacklist ${HOME}/.config/vlc
11noblacklist ${HOME}/.local/share/vlc
12noblacklist ${MUSIC}
13noblacklist ${VIDEOS}
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23include whitelist-var-common.inc
24
25#apparmor - on Ubuntu 18.04 it refuses to start without dbus access
26caps.drop all
27netfilter
28nogroups
29nonewprivs
30noroot
31nou2f
32protocol unix,inet,inet6,netlink
33seccomp
34shell none
35
36private-bin cvlc,nvlc,qvlc,rvlc,svlc,vlc
37private-dev
38private-tmp
39
40# dbus needed for MPRIS
41# dbus-user none
42# dbus-system none
43
44# mdwe is disabled due to breaking hardware accelerated decoding
45#memory-deny-write-execute
diff --git a/etc/profile-m-z/vscodium.profile b/etc/profile-m-z/vscodium.profile
new file mode 100644
index 000000000..b4728fb72
--- /dev/null
+++ b/etc/profile-m-z/vscodium.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for Visual Studio Code
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.VSCodium
5
6# Redirect
7include code.profile
diff --git a/etc/profile-m-z/vulturesclaw.profile b/etc/profile-m-z/vulturesclaw.profile
new file mode 100644
index 000000000..2e9078a7b
--- /dev/null
+++ b/etc/profile-m-z/vulturesclaw.profile
@@ -0,0 +1,8 @@
1# Firejail profile alias for nethack-vultures
2# This file is overwritten after every install/update
3
4noblacklist /var/games/vulturesclaw
5whitelist /var/games/vulturesclaw
6
7# Redirect
8include nethack-vultures.profile
diff --git a/etc/profile-m-z/vultureseye.profile b/etc/profile-m-z/vultureseye.profile
new file mode 100644
index 000000000..44c263cfc
--- /dev/null
+++ b/etc/profile-m-z/vultureseye.profile
@@ -0,0 +1,8 @@
1# Firejail profile alias for nethack-vultures
2# This file is overwritten after every install/update
3
4noblacklist /var/games/vultureseye
5whitelist /var/games/vultureseye
6
7# Redirect
8include nethack-vultures.profile
diff --git a/etc/profile-m-z/vym.profile b/etc/profile-m-z/vym.profile
new file mode 100644
index 000000000..fbb53943c
--- /dev/null
+++ b/etc/profile-m-z/vym.profile
@@ -0,0 +1,36 @@
1# Firejail profile for vym
2# Description: Mindmapping tool
3# This file is overwritten after every install/update
4# Persistent local customizations
5include vym.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/InSilmaril
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18caps.drop all
19netfilter
20no3d
21nodvd
22nogroups
23nonewprivs
24noroot
25nosound
26notv
27nou2f
28novideo
29protocol unix
30seccomp
31shell none
32
33disable-mnt
34private-dev
35private-tmp
36
diff --git a/etc/profile-m-z/w3m.profile b/etc/profile-m-z/w3m.profile
new file mode 100644
index 000000000..5215ee6f5
--- /dev/null
+++ b/etc/profile-m-z/w3m.profile
@@ -0,0 +1,45 @@
1# Firejail profile for w3m
2# Description: WWW browsable pager with excellent tables/frames support
3# This file is overwritten after every install/update
4# Persistent local customizations
5include w3m.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.w3m
10
11blacklist /tmp/.X11-unix
12blacklist ${RUNUSER}/wayland-*
13
14include allow-perl.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23include whitelist-runuser-common.inc
24
25caps.drop all
26netfilter
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix,inet,inet6
37seccomp
38shell none
39tracelog
40
41# private-bin w3m
42private-cache
43private-dev
44private-etc alternatives,ca-certificates,crypto-policies,pki,resolv.conf,ssl
45private-tmp
diff --git a/etc/profile-m-z/warmux.profile b/etc/profile-m-z/warmux.profile
new file mode 100644
index 000000000..a3de3d444
--- /dev/null
+++ b/etc/profile-m-z/warmux.profile
@@ -0,0 +1,55 @@
1# Firejail profile for warmux
2# Description: a convivial mass murder game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include warmux.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/wormux
10noblacklist ${HOME}/.local/share/wormux
11noblacklist ${HOME}/.wormux
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21mkdir ${HOME}/.config/wormux
22mkdir ${HOME}/.local/share/wormux
23mkdir ${HOME}/.wormux
24whitelist ${HOME}/.config/wormux
25whitelist ${HOME}/.local/share/wormux
26whitelist ${HOME}/.wormux
27whitelist /usr/share/warmux
28include whitelist-common.inc
29include whitelist-usr-share-common.inc
30include whitelist-var-common.inc
31
32apparmor
33caps.drop all
34netfilter
35nodvd
36nogroups
37nonewprivs
38noroot
39notv
40nou2f
41novideo
42protocol unix,inet,inet6
43seccomp
44shell none
45tracelog
46
47disable-mnt
48private-bin warmux
49private-cache
50private-dev
51private-etc ca-certificates,crypto-policies,host.conf,hostname,hosts,machine-id,nsswitch.conf,pki,protocols,resolv.conf,rpc,services,ssl
52private-tmp
53
54dbus-user none
55dbus-system none
diff --git a/etc/profile-m-z/warsow.profile b/etc/profile-m-z/warsow.profile
new file mode 100644
index 000000000..32d27e1b9
--- /dev/null
+++ b/etc/profile-m-z/warsow.profile
@@ -0,0 +1,51 @@
1# Firejail profile for warsow
2# Description: Fast paced 3D first person shooter
3# This file is overwritten after every install/update
4# Persistent local customizations
5include warsow.local
6# Persistent global definitions
7include globals.local
8
9ignore noexec ${HOME}
10
11noblacklist ${HOME}/.cache/warsow-2.1
12noblacklist ${HOME}/.local/share/warsow-2.1
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22mkdir ${HOME}/.cache/warsow-2.1
23mkdir ${HOME}/.local/share/warsow-2.1
24whitelist ${HOME}/.cache/warsow-2.1
25whitelist ${HOME}/.local/share/warsow-2.1
26include whitelist-common.inc
27include whitelist-var-common.inc
28
29caps.drop all
30ipc-namespace
31netfilter
32nodvd
33nogroups
34nonewprivs
35noroot
36notv
37nou2f
38novideo
39protocol unix,inet,inet6
40seccomp
41shell none
42tracelog
43
44disable-mnt
45private-bin warsow
46private-cache
47private-dev
48private-tmp
49
50dbus-user none
51dbus-system none
diff --git a/etc/profile-m-z/warzone2100.profile b/etc/profile-m-z/warzone2100.profile
new file mode 100644
index 000000000..25f401d85
--- /dev/null
+++ b/etc/profile-m-z/warzone2100.profile
@@ -0,0 +1,46 @@
1# Firejail profile for warzone2100
2# Description: 3D real time strategy game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include warzone2100.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.warzone2100-3.*
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18# mkdir ${HOME}/.warzone2100-3.1
19# mkdir ${HOME}/.warzone2100-3.2
20whitelist ${HOME}/.warzone2100-3.1
21whitelist ${HOME}/.warzone2100-3.2
22whitelist /usr/share/games
23include whitelist-common.inc
24include whitelist-runuser-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30netfilter
31nodvd
32nogroups
33nonewprivs
34noroot
35notv
36nou2f
37novideo
38protocol unix,inet,inet6,netlink
39seccomp
40shell none
41tracelog
42
43disable-mnt
44private-bin warzone2100
45private-dev
46private-tmp
diff --git a/etc/profile-m-z/waterfox-classic.profile b/etc/profile-m-z/waterfox-classic.profile
new file mode 100644
index 000000000..6c7e18a46
--- /dev/null
+++ b/etc/profile-m-z/waterfox-classic.profile
@@ -0,0 +1,7 @@
1# Firejail profile for waterfox-classic
2# This file is overwritten after every install/update
3# Persistent local customizations
4include waterfox-classic.local
5
6# Redirect
7include waterfox.profile
diff --git a/etc/profile-m-z/waterfox-current.profile b/etc/profile-m-z/waterfox-current.profile
new file mode 100644
index 000000000..5e12a6fe3
--- /dev/null
+++ b/etc/profile-m-z/waterfox-current.profile
@@ -0,0 +1,7 @@
1# Firejail profile for waterfox-current
2# This file is overwritten after every install/update
3# Persistent local customizations
4include waterfox-current.local
5
6# Redirect
7include waterfox.profile
diff --git a/etc/profile-m-z/waterfox.profile b/etc/profile-m-z/waterfox.profile
new file mode 100644
index 000000000..c6c940fa3
--- /dev/null
+++ b/etc/profile-m-z/waterfox.profile
@@ -0,0 +1,27 @@
1# Firejail profile for waterfox
2# This file is overwritten after every install/update
3# Persistent local customizations
4include waterfox.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/waterfox
9noblacklist ${HOME}/.waterfox
10
11mkdir ${HOME}/.cache/waterfox
12mkdir ${HOME}/.waterfox
13whitelist ${HOME}/.cache/waterfox
14whitelist ${HOME}/.waterfox
15
16# Uncomment (or add to watefox.local) the following lines if you want to
17# use the migration wizard.
18#noblacklist ${HOME}/.mozilla
19#whitelist ${HOME}/.mozilla
20
21# waterfox requires a shell to launch on Arch. We can possibly remove sh though.
22#private-bin bash,dbus-launch,dbus-send,env,sh,waterfox,waterfox-classic,waterfox-current,which
23# private-etc must first be enabled in firefox-common.profile
24#private-etc waterfox
25
26# Redirect
27include firefox-common.profile
diff --git a/etc/profile-m-z/webstorm.profile b/etc/profile-m-z/webstorm.profile
new file mode 100644
index 000000000..fc4e8e571
--- /dev/null
+++ b/etc/profile-m-z/webstorm.profile
@@ -0,0 +1,41 @@
1# Firejail profile for WebStorm
2# This file is overwritten after every install/update
3# Persistent local customizations
4include webstorm.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.WebStorm*
9noblacklist ${HOME}/.android
10noblacklist ${HOME}/.local/share/JetBrains
11noblacklist ${HOME}/.ssh
12noblacklist ${HOME}/.tooling
13
14# Allows files commonly used by IDEs
15include allow-common-devel.inc
16
17noblacklist ${PATH}/node
18noblacklist ${HOME}/.nvm
19
20include disable-common.inc
21include disable-devel.inc
22include disable-interpreters.inc
23include disable-passwdmgr.inc
24include disable-programs.inc
25
26caps.drop all
27netfilter
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33nou2f
34novideo
35protocol unix,inet,inet6
36seccomp
37shell none
38
39private-cache
40private-dev
41private-tmp
diff --git a/etc/profile-m-z/webui-aria2.profile b/etc/profile-m-z/webui-aria2.profile
new file mode 100644
index 000000000..8928f8116
--- /dev/null
+++ b/etc/profile-m-z/webui-aria2.profile
@@ -0,0 +1,38 @@
1# Firejail profile for webui-aria2
2# Run this with firejail --profile=webui-aria2 node node-server.js
3# This file is overwritten after every install/update
4# Persistent local customizations
5include webui-aria2.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${PATH}/node
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19caps.drop all
20netfilter
21nodvd
22nogroups
23nonewprivs
24noroot
25nosound
26notv
27nou2f
28novideo
29protocol unix,inet,inet6
30seccomp
31shell none
32
33private-cache
34private-dev
35private-tmp
36
37dbus-user none
38dbus-system none
diff --git a/etc/profile-m-z/weechat-curses.profile b/etc/profile-m-z/weechat-curses.profile
new file mode 100644
index 000000000..4719b9788
--- /dev/null
+++ b/etc/profile-m-z/weechat-curses.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for weechat
2# This file is overwritten after every install/update
3
4# Redirect
5include weechat.profile
diff --git a/etc/profile-m-z/weechat.profile b/etc/profile-m-z/weechat.profile
new file mode 100644
index 000000000..800724054
--- /dev/null
+++ b/etc/profile-m-z/weechat.profile
@@ -0,0 +1,29 @@
1# Firejail profile for weechat
2# Description: Fast, light and extensible chat client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include weechat.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.weechat
10
11include disable-common.inc
12include disable-programs.inc
13
14whitelist /usr/share/perl5
15include whitelist-usr-share-common.inc
16include whitelist-var-common.inc
17
18caps.drop all
19netfilter
20nodvd
21nonewprivs
22noroot
23notv
24protocol unix,inet,inet6
25seccomp
26
27# no private-bin support for various reasons:
28# Plugins loaded: alias, aspell, charset, exec, fifo, guile, irc,
29# logger, lua, perl, python, relay, ruby, script, tcl, trigger, xferloading plugins
diff --git a/etc/profile-m-z/wesnoth.profile b/etc/profile-m-z/wesnoth.profile
new file mode 100644
index 000000000..934edfce9
--- /dev/null
+++ b/etc/profile-m-z/wesnoth.profile
@@ -0,0 +1,38 @@
1# Firejail profile for wesnoth
2# Description: Fantasy turn-based strategy game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include wesnoth.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/wesnoth
10noblacklist ${HOME}/.config/wesnoth
11noblacklist ${HOME}/.local/share/wesnoth
12
13include disable-common.inc
14include disable-devel.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19mkdir ${HOME}/.cache/wesnoth
20mkdir ${HOME}/.config/wesnoth
21mkdir ${HOME}/.local/share/wesnoth
22whitelist ${HOME}/.cache/wesnoth
23whitelist ${HOME}/.config/wesnoth
24whitelist ${HOME}/.local/share/wesnoth
25include whitelist-common.inc
26
27caps.drop all
28nodvd
29nonewprivs
30noroot
31notv
32nou2f
33novideo
34protocol unix,inet,inet6
35seccomp
36
37private-dev
38private-tmp
diff --git a/etc/profile-m-z/wget.profile b/etc/profile-m-z/wget.profile
new file mode 100644
index 000000000..65723e68c
--- /dev/null
+++ b/etc/profile-m-z/wget.profile
@@ -0,0 +1,59 @@
1# Firejail profile for wget
2# Description: Retrieves files from the web
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include wget.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${HOME}/.netrc
11noblacklist ${HOME}/.wget-hsts
12noblacklist ${HOME}/.wgetrc
13
14blacklist /tmp/.X11-unix
15blacklist ${RUNUSER}/wayland-*
16blacklist ${RUNUSER}
17
18include disable-common.inc
19include disable-devel.inc
20include disable-exec.inc
21include disable-interpreters.inc
22include disable-passwdmgr.inc
23include disable-programs.inc
24# depending on workflow you can uncomment the below or put 'include disable-xdg.inc' in your wget.local
25#include disable-xdg.inc
26
27include whitelist-usr-share-common.inc
28include whitelist-var-common.inc
29
30apparmor
31caps.drop all
32ipc-namespace
33machine-id
34netfilter
35no3d
36nodvd
37nogroups
38nonewprivs
39noroot
40nosound
41notv
42nou2f
43novideo
44protocol unix,inet,inet6
45seccomp
46shell none
47tracelog
48
49private-bin wget
50private-cache
51private-dev
52# depending on workflow you can uncomment the below or put this private-etc in your wget.local
53#private-etc alternatives,ca-certificates,crypto-policies,pki,resolv.conf,ssl,wgetrc
54#private-tmp
55
56dbus-user none
57dbus-system none
58
59memory-deny-write-execute
diff --git a/etc/profile-m-z/whalebird.profile b/etc/profile-m-z/whalebird.profile
new file mode 100644
index 000000000..187c49ed8
--- /dev/null
+++ b/etc/profile-m-z/whalebird.profile
@@ -0,0 +1,39 @@
1# Firejail profile for whalebird
2# Description: Electron-based Mastodon/Pleroma client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include whalebird.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10ignore dbus-user none
11ignore dbus-system none
12
13noblacklist ${HOME}/.config/Whalebird
14
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-xdg.inc
19
20mkdir ${HOME}/.config/Whalebird
21whitelist ${HOME}/.config/Whalebird
22include whitelist-common.inc
23include whitelist-var-common.inc
24
25no3d
26nou2f
27novideo
28protocol unix,inet,inet6
29shell none
30
31disable-mnt
32private-bin whalebird
33private-cache
34private-dev
35private-etc fonts,machine-id
36private-tmp
37
38# Redirect
39include electron.profile
diff --git a/etc/profile-m-z/whois.profile b/etc/profile-m-z/whois.profile
new file mode 100644
index 000000000..2af1379e0
--- /dev/null
+++ b/etc/profile-m-z/whois.profile
@@ -0,0 +1,57 @@
1# Firejail profile for whois
2# Description: Intelligent WHOIS client
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include whois.local
7# Persistent global definitions
8include globals.local
9
10blacklist /tmp/.X11-unix
11blacklist ${RUNUSER}/wayland-*
12blacklist ${RUNUSER}
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24
25apparmor
26caps.drop all
27hostname whois
28ipc-namespace
29machine-id
30netfilter
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol inet,inet6
41seccomp
42shell none
43tracelog
44
45disable-mnt
46private
47private-bin bash,sh,whois
48private-cache
49private-dev
50private-etc alternatives,hosts,jwhois.conf,resolv.conf,services,whois.conf
51private-lib gconv
52private-tmp
53
54dbus-user none
55dbus-system none
56
57memory-deny-write-execute
diff --git a/etc/profile-m-z/widelands.profile b/etc/profile-m-z/widelands.profile
new file mode 100644
index 000000000..079e4eb96
--- /dev/null
+++ b/etc/profile-m-z/widelands.profile
@@ -0,0 +1,47 @@
1# Firejail profile for widelands
2# Description: Open source realtime-strategy game
3# This file is overwritten after every install/update
4# Persistent local customizations
5include widelands.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.widelands
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.widelands
20whitelist ${HOME}/.widelands
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26ipc-namespace
27netfilter
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33nou2f
34novideo
35protocol unix,inet,inet6,netlink
36seccomp
37shell none
38tracelog
39
40disable-mnt
41private-bin widelands
42private-cache
43private-dev
44private-tmp
45
46dbus-user none
47dbus-system none
diff --git a/etc/profile-m-z/wine.profile b/etc/profile-m-z/wine.profile
new file mode 100644
index 000000000..901340052
--- /dev/null
+++ b/etc/profile-m-z/wine.profile
@@ -0,0 +1,39 @@
1# Firejail profile for wine
2# Description: A compatibility layer for running Windows programs
3# This file is overwritten after every install/update
4# Persistent local customizations
5include wine.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.Steam
10noblacklist ${HOME}/.local/share/Steam
11noblacklist ${HOME}/.local/share/steam
12noblacklist ${HOME}/.steam
13noblacklist ${HOME}/.wine
14noblacklist /tmp/.wine-*
15
16include disable-common.inc
17include disable-devel.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22include whitelist-var-common.inc
23
24# some applications don't need allow-debuggers, comment the next line
25# if it is not necessary (or put 'ignore allow-debuggers' in your wine.local)
26allow-debuggers
27caps.drop all
28# net none
29netfilter
30nodvd
31nogroups
32nonewprivs
33noroot
34# nosound
35notv
36# novideo
37seccomp
38
39private-dev
diff --git a/etc/profile-m-z/wire-desktop.profile b/etc/profile-m-z/wire-desktop.profile
new file mode 100644
index 000000000..c1250b1f0
--- /dev/null
+++ b/etc/profile-m-z/wire-desktop.profile
@@ -0,0 +1,36 @@
1# Firejail profile for wire-desktop
2# Description: End-to-end encrypted messenger with file sharing, voice calls and video conferences
3# This file is overwritten after every install/update
4# Persistent local customizations
5include wire-desktop.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Debian/Ubuntu use /opt/Wire. As that is not in PATH by default, run `firejail /opt/Wire/wire-desktop` to start it.
11
12ignore caps.drop all
13ignore dbus-user none
14ignore dbus-system none
15
16noblacklist ${HOME}/.config/Wire
17
18include disable-devel.inc
19include disable-interpreters.inc
20
21mkdir ${HOME}/.config/Wire
22whitelist ${HOME}/.config/Wire
23include whitelist-common.inc
24
25caps.keep sys_admin,sys_chroot
26nou2f
27shell none
28
29disable-mnt
30private-bin bash,electron,electron4,electron6,env,sh,wire-desktop
31private-dev
32private-etc alternatives,ca-certificates,crypto-policies,fonts,machine-id,pki,resolv.conf,ssl
33private-tmp
34
35# Redirect
36include electron.profile
diff --git a/etc/profile-m-z/wireshark-gtk.profile b/etc/profile-m-z/wireshark-gtk.profile
new file mode 100644
index 000000000..3e2e1807e
--- /dev/null
+++ b/etc/profile-m-z/wireshark-gtk.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for wireshark
2# Description: Network protocol analyzer
3# This file is overwritten after every install/update
4
5# Redirect
6include wireshark.profile
diff --git a/etc/profile-m-z/wireshark-qt.profile b/etc/profile-m-z/wireshark-qt.profile
new file mode 100644
index 000000000..3e2e1807e
--- /dev/null
+++ b/etc/profile-m-z/wireshark-qt.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for wireshark
2# Description: Network protocol analyzer
3# This file is overwritten after every install/update
4
5# Redirect
6include wireshark.profile
diff --git a/etc/profile-m-z/wireshark.profile b/etc/profile-m-z/wireshark.profile
new file mode 100644
index 000000000..d73e2e279
--- /dev/null
+++ b/etc/profile-m-z/wireshark.profile
@@ -0,0 +1,50 @@
1# Firejail profile for wireshark
2# Description: Network traffic analyzer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include wireshark.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/wireshark
10noblacklist ${HOME}/.wireshark
11noblacklist ${DOCUMENTS}
12
13# Allow lua (blacklisted by disable-interpreters.inc)
14include allow-lua.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24whitelist /usr/share/wireshark
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28apparmor
29# caps.drop all
30caps.keep dac_override,net_admin,net_raw
31netfilter
32no3d
33# nogroups - breaks network traffic capture for unprivileged users
34# nonewprivs - breaks network traffic capture for unprivileged users
35# noroot
36nodvd
37nosound
38notv
39nou2f
40novideo
41# protocol unix,inet,inet6,netlink
42# seccomp - breaks network traffic capture for unprivileged users
43shell none
44tracelog
45
46# private-bin wireshark
47private-dev
48# private-etc alternatives,ca-certificates,crypto-policies,fonts,group,hosts,machine-id,passwd,pki,ssl
49private-tmp
50
diff --git a/etc/profile-m-z/wordwarvi.profile b/etc/profile-m-z/wordwarvi.profile
new file mode 100644
index 000000000..6372654bd
--- /dev/null
+++ b/etc/profile-m-z/wordwarvi.profile
@@ -0,0 +1,51 @@
1# Firejail profile for wordwarvi
2# Description: Old school '80's style side scrolling space shoot'em up game.
3# This file is overwritten after every install/update
4# Persistent local customizations
5include wordwarvi.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.wordwarvi
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.wordwarvi
20whitelist ${HOME}/.wordwarvi
21whitelist /usr/share/wordwarvi
22include whitelist-common.inc
23include whitelist-usr-share-common.inc
24include whitelist-var-common.inc
25
26apparmor
27caps.drop all
28net none
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40tracelog
41
42disable-mnt
43private
44private-bin wordwarvi
45private-cache
46private-dev
47private-etc alsa,asound.conf,machine-id,pulse
48private-tmp
49
50dbus-user none
51dbus-system none
diff --git a/etc/profile-m-z/wpp.profile b/etc/profile-m-z/wpp.profile
new file mode 100644
index 000000000..a219397a9
--- /dev/null
+++ b/etc/profile-m-z/wpp.profile
@@ -0,0 +1,14 @@
1# Firejail profile for wpp
2# Description: WPS Office - Presentation
3# This file is overwritten after every install/update
4# Persistent local customizations
5include wpp.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10ignore machine-id
11ignore nosound
12
13# Redirect
14include wps.profile
diff --git a/etc/profile-m-z/wps.profile b/etc/profile-m-z/wps.profile
new file mode 100644
index 000000000..6e4a313e3
--- /dev/null
+++ b/etc/profile-m-z/wps.profile
@@ -0,0 +1,49 @@
1# Firejail profile for wps
2# Description: WPS Office - Writer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include wps.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.kingsoft
10noblacklist ${HOME}/.config/Kingsoft
11noblacklist ${HOME}/.local/share/Kingsoft
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20include whitelist-usr-share-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25machine-id
26# Uncomment the next line (or add to wps.local) if you don't use network features.
27#net none
28netfilter
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix,inet,inet6
39# seccomp cause some minor issues, if you can live with them enable it.
40#seccomp
41shell none
42tracelog
43
44private-cache
45private-dev
46private-tmp
47
48dbus-user none
49dbus-system none
diff --git a/etc/profile-m-z/wpspdf.profile b/etc/profile-m-z/wpspdf.profile
new file mode 100644
index 000000000..82080acbc
--- /dev/null
+++ b/etc/profile-m-z/wpspdf.profile
@@ -0,0 +1,11 @@
1# Firejail profile for wpspdf
2# Description: Kingsoft Pdf Reader
3# This file is overwritten after every install/update
4# Persistent local customizations
5include et.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include wps.profile
diff --git a/etc/profile-m-z/x-terminal-emulator.profile b/etc/profile-m-z/x-terminal-emulator.profile
new file mode 100644
index 000000000..fe0781336
--- /dev/null
+++ b/etc/profile-m-z/x-terminal-emulator.profile
@@ -0,0 +1,22 @@
1# Firejail profile for x-terminal-emulator
2# This file is overwritten after every install/update
3# Persistent local customizations
4include x-terminal-emulator.local
5# Persistent global definitions
6include globals.local
7
8caps.drop all
9ipc-namespace
10net none
11nogroups
12noroot
13nou2f
14protocol unix
15seccomp
16
17private-dev
18
19dbus-user none
20dbus-system none
21
22noexec /tmp
diff --git a/etc/profile-m-z/x2goclient.profile b/etc/profile-m-z/x2goclient.profile
new file mode 100644
index 000000000..bc9603835
--- /dev/null
+++ b/etc/profile-m-z/x2goclient.profile
@@ -0,0 +1,49 @@
1# Firejail profile for x2goclient
2# Description: Graphical client for X2Go remote desktop system
3# This file is overwritten after every install/update
4# Persistent local customizations
5include x2goclient.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.ssh
10noblacklist ${HOME}/.x2go
11noblacklist ${HOME}/.x2goclient
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20apparmor
21caps.drop all
22ipc-namespace
23netfilter
24#no3d
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix,inet,inet6
33seccomp
34shell none
35tracelog
36
37#private-bin nxproxy,x2goclient
38private-cache
39private-dev
40#private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-3.0,host.conf,hostname,hosts,machine-id,pki,pulse,resolv.conf,ssl,X11,xdg
41#private-lib
42private-opt none
43private-srv none
44private-tmp
45
46dbus-user none
47dbus-system none
48
49#memory-deny-write-execute
diff --git a/etc/profile-m-z/xbill.profile b/etc/profile-m-z/xbill.profile
new file mode 100644
index 000000000..56d3cf40d
--- /dev/null
+++ b/etc/profile-m-z/xbill.profile
@@ -0,0 +1,53 @@
1# Firejail profile for xbill
2# Description: save your computers from Wingdows [TM] virus
3# This file is overwritten after every install/update
4# Persistent local customizations
5include xbill.local
6# Persistent global definitions
7include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17whitelist /usr/share/xbill
18whitelist /var/games/xbill/scores
19include whitelist-common.inc
20include whitelist-usr-share-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25machine-id
26net none
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39tracelog
40
41disable-mnt
42private
43private-bin xbill
44private-cache
45private-dev
46private-etc none
47private-tmp
48
49dbus-user none
50dbus-system none
51
52memory-deny-write-execute
53read-only ${HOME}
diff --git a/etc/profile-m-z/xcalc.profile b/etc/profile-m-z/xcalc.profile
new file mode 100644
index 000000000..294ad7c80
--- /dev/null
+++ b/etc/profile-m-z/xcalc.profile
@@ -0,0 +1,42 @@
1# Firejail profile for xcalc
2# This file is overwritten after every install/update
3# Persistent local customizations
4include xcalc.local
5# Persistent global definitions
6include globals.local
7
8include disable-common.inc
9include disable-devel.inc
10include disable-exec.inc
11include disable-interpreters.inc
12include disable-passwdmgr.inc
13include disable-programs.inc
14include disable-xdg.inc
15
16include whitelist-var-common.inc
17
18apparmor
19caps.drop all
20net none
21no3d
22nodvd
23nogroups
24nonewprivs
25noroot
26nosound
27notv
28nou2f
29novideo
30protocol unix
31seccomp
32shell none
33
34disable-mnt
35private
36private-bin xcalc
37private-dev
38private-lib
39private-tmp
40
41dbus-user none
42dbus-system none
diff --git a/etc/profile-m-z/xchat.profile b/etc/profile-m-z/xchat.profile
new file mode 100644
index 000000000..a94444aab
--- /dev/null
+++ b/etc/profile-m-z/xchat.profile
@@ -0,0 +1,23 @@
1# Firejail profile for xchat
2# Description: IRC client for X similar to AmIRC
3# This file is overwritten after every install/update
4# Persistent local customizations
5include xchat.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/xchat
10
11include disable-common.inc
12include disable-devel.inc
13include disable-programs.inc
14
15caps.drop all
16nodvd
17nonewprivs
18noroot
19notv
20protocol unix,inet,inet6
21seccomp
22
23# private-bin requires perl, python*, etc.
diff --git a/etc/profile-m-z/xed.profile b/etc/profile-m-z/xed.profile
new file mode 100644
index 000000000..64a50083f
--- /dev/null
+++ b/etc/profile-m-z/xed.profile
@@ -0,0 +1,53 @@
1# Firejail profile for xed
2# This file is overwritten after every install/update
3# Persistent local customizations
4include xed.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/xed
9noblacklist ${HOME}/.python-history
10noblacklist ${HOME}/.python_history
11noblacklist ${HOME}/.pythonhist
12
13# Allow python (blacklisted by disable-interpreters.inc)
14include allow-python2.inc
15include allow-python3.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23
24include whitelist-var-common.inc
25
26# apparmor - makes settings immutable
27caps.drop all
28machine-id
29# net none - makes settings immutable
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix
40seccomp
41shell none
42tracelog
43
44private-bin xed
45private-dev
46private-tmp
47
48# makes settings immutable
49# dbus-user none
50# dbus-system none
51
52# xed uses python plugins, memory-deny-write-execute breaks python
53# memory-deny-write-execute
diff --git a/etc/profile-m-z/xfburn.profile b/etc/profile-m-z/xfburn.profile
new file mode 100644
index 000000000..cd9561e74
--- /dev/null
+++ b/etc/profile-m-z/xfburn.profile
@@ -0,0 +1,32 @@
1# Firejail profile for xfburn
2# Description: CD-burner application for Xfce Desktop Environment
3# This file is overwritten after every install/update
4# Persistent local customizations
5include xfburn.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/xfburn
10
11include disable-common.inc
12include disable-devel.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17caps.drop all
18netfilter
19nogroups
20nonewprivs
21noroot
22nosound
23notv
24novideo
25protocol unix
26seccomp
27shell none
28tracelog
29
30# private-bin xfburn
31# private-dev
32# private-tmp
diff --git a/etc/profile-m-z/xfce4-dict.profile b/etc/profile-m-z/xfce4-dict.profile
new file mode 100644
index 000000000..a3e0c4633
--- /dev/null
+++ b/etc/profile-m-z/xfce4-dict.profile
@@ -0,0 +1,40 @@
1# Firejail profile for xfce4-dict
2# Description: Dictionary plugin for Xfce4 panel
3# This file is overwritten after every install/update
4# Persistent local customizations
5include xfce4-dict.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/xfce4-dict
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18include whitelist-var-common.inc
19
20apparmor
21caps.drop all
22netfilter
23no3d
24nodvd
25nogroups
26nonewprivs
27noroot
28nosound
29notv
30nou2f
31novideo
32protocol unix,inet,inet6
33seccomp
34shell none
35
36disable-mnt
37private-cache
38private-dev
39private-tmp
40
diff --git a/etc/profile-m-z/xfce4-mixer.profile b/etc/profile-m-z/xfce4-mixer.profile
new file mode 100644
index 000000000..5707dc443
--- /dev/null
+++ b/etc/profile-m-z/xfce4-mixer.profile
@@ -0,0 +1,53 @@
1# Firejail profile for xfce4-mixer
2# Description: Volume control for Xfce
3# This file is overwritten after every install/update
4# Persistent local customizations
5include xfce4-mixer.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/xfce4/xfconf/xfce-perchannel-xml/xfce4-mixer.xml
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkfile ${HOME}/.config/xfce4/xfconf/xfce-perchannel-xml/xfce4-mixer.xml
20whitelist ${HOME}/.config/xfce4/xfconf/xfce-perchannel-xml/xfce4-mixer.xml
21whitelist /usr/share/xfce4
22whitelist /usr/share/xfce4-mixer
23include whitelist-common.inc
24include whitelist-usr-share-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29ipc-namespace
30netfilter
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36notv
37nou2f
38novideo
39protocol unix
40seccomp
41shell none
42
43disable-mnt
44private-bin xfce4-mixer,xfconf-query
45private-cache
46private-dev
47private-etc alternatives,asound.conf,fonts,machine-id,pulse
48private-tmp
49
50# dbus-user none
51# dbus-system none
52
53memory-deny-write-execute
diff --git a/etc/profile-m-z/xfce4-notes.profile b/etc/profile-m-z/xfce4-notes.profile
new file mode 100644
index 000000000..c3d0930ff
--- /dev/null
+++ b/etc/profile-m-z/xfce4-notes.profile
@@ -0,0 +1,42 @@
1# Firejail profile for xfce4-notes
2# Description: Notes application for the Xfce4 desktop
3# This file is overwritten after every install/update
4# Persistent local customizations
5include xfce4-notes.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/xfce4/xfce4-notes.gtkrc
10noblacklist ${HOME}/.config/xfce4/xfce4-notes.rc
11noblacklist ${HOME}/.local/share/notes
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20include whitelist-var-common.inc
21
22apparmor
23caps.drop all
24netfilter
25no3d
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37
38disable-mnt
39private-cache
40private-dev
41private-tmp
42
diff --git a/etc/profile-m-z/xiphos.profile b/etc/profile-m-z/xiphos.profile
new file mode 100644
index 000000000..7114f0469
--- /dev/null
+++ b/etc/profile-m-z/xiphos.profile
@@ -0,0 +1,50 @@
1# Firejail profile for xiphos
2# Description: Environment for Bible reading, study, and research
3# This file is overwritten after every install/update
4# Persistent local customizations
5include xiphos.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.sword
10noblacklist ${HOME}/.xiphos
11
12blacklist ${HOME}/.bashrc
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21mkdir ${HOME}/.sword
22mkdir ${HOME}/.xiphos
23whitelist ${HOME}/.sword
24whitelist ${HOME}/.xiphos
25include whitelist-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30machine-id
31netfilter
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix,inet,inet6
41seccomp
42shell none
43tracelog
44
45disable-mnt
46private-bin xiphos
47private-cache
48private-dev
49private-etc alternatives,ca-certificates,crypto-policies,fonts,pki,resolv.conf,ssli,sword,sword.conf
50private-tmp
diff --git a/etc/profile-m-z/xlinks.profile b/etc/profile-m-z/xlinks.profile
new file mode 100644
index 000000000..7987af280
--- /dev/null
+++ b/etc/profile-m-z/xlinks.profile
@@ -0,0 +1,21 @@
1# Firejail profile for xlinks
2# Description: Text WWW browser (X11)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include xlinks.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10noblacklist /tmp/.X11-unix
11noblacklist ${HOME}/.links
12
13include whitelist-common.inc
14
15# if you want to use user-configured programs add 'private-bin PROGRAM1,PROGRAM2'
16# to your xlinks.local or append 'PROGRAM1,PROGRAM2' to this private-bin line
17private-bin xlinks
18private-etc fonts
19
20# Redirect
21include links.profile
diff --git a/etc/profile-m-z/xmms.profile b/etc/profile-m-z/xmms.profile
new file mode 100644
index 000000000..7a11e1244
--- /dev/null
+++ b/etc/profile-m-z/xmms.profile
@@ -0,0 +1,31 @@
1# Firejail profile for xmms
2# This file is overwritten after every install/update
3# Persistent local customizations
4include xmms.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.xmms
9noblacklist ${MUSIC}
10
11include disable-common.inc
12include disable-devel.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16include disable-xdg.inc
17
18caps.drop all
19netfilter
20no3d
21nonewprivs
22noroot
23notv
24nou2f
25novideo
26protocol unix,inet,inet6
27seccomp
28shell none
29
30private-bin xmms
31private-dev
diff --git a/etc/profile-m-z/xmr-stak.profile b/etc/profile-m-z/xmr-stak.profile
new file mode 100644
index 000000000..c6ba9bd9d
--- /dev/null
+++ b/etc/profile-m-z/xmr-stak.profile
@@ -0,0 +1,45 @@
1# Firejail profile for xmr-stak
2# This file is overwritten after every install/update
3# Persistent local customizations
4include xmr-stak.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.xmr-stak
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16include disable-xdg.inc
17
18mkdir ${HOME}/.xmr-stak
19include whitelist-var-common.inc
20
21caps.drop all
22ipc-namespace
23netfilter
24nodvd
25nogroups
26nonewprivs
27noroot
28nosound
29notv
30nou2f
31novideo
32protocol unix,inet,inet6
33seccomp
34shell none
35
36disable-mnt
37private ${HOME}/.xmr-stak
38private-bin xmr-stak
39private-dev
40private-etc alternatives,ca-certificates,crypto-policies,nsswitch.conf,pki,resolv.conf,ssl
41#private-lib libxmrstak_opencl_backend,libxmrstak_cuda_backend
42private-opt cuda
43private-tmp
44
45memory-deny-write-execute
diff --git a/etc/profile-m-z/xonotic-glx.profile b/etc/profile-m-z/xonotic-glx.profile
new file mode 100644
index 000000000..abb91e1ec
--- /dev/null
+++ b/etc/profile-m-z/xonotic-glx.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for xonotic
2# This file is overwritten after every install/update
3
4# Redirect
5include xonotic.profile
diff --git a/etc/profile-m-z/xonotic-sdl.profile b/etc/profile-m-z/xonotic-sdl.profile
new file mode 100644
index 000000000..abb91e1ec
--- /dev/null
+++ b/etc/profile-m-z/xonotic-sdl.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for xonotic
2# This file is overwritten after every install/update
3
4# Redirect
5include xonotic.profile
diff --git a/etc/profile-m-z/xonotic.profile b/etc/profile-m-z/xonotic.profile
new file mode 100644
index 000000000..949988c3b
--- /dev/null
+++ b/etc/profile-m-z/xonotic.profile
@@ -0,0 +1,43 @@
1# Firejail profile for xonotic
2# Description: A free, fast-paced crossplatform first-person shooter
3# This file is overwritten after every install/update
4# Persistent local customizations
5include xonotic.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.xonotic
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18mkdir ${HOME}/.xonotic
19whitelist ${HOME}/.xonotic
20include whitelist-common.inc
21include whitelist-var-common.inc
22
23caps.drop all
24netfilter
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix,inet,inet6
33seccomp
34shell none
35
36disable-mnt
37private-bin bash,blind-id,darkplaces-glx,darkplaces-sdl,dirname,grep,ldd,netstat,ps,readlink,sh,uname,xonotic,xonotic-glx,xonotic-linux32-dedicated,xonotic-linux32-glx,xonotic-linux32-sdl,xonotic-linux64-dedicated,xonotic-linux64-glx,xonotic-linux64-sdl,xonotic-sdl
38private-dev
39private-etc alternatives,asound.conf,ca-certificates,crypto-policies,drirc,fonts,group,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,localtime,machine-id,nsswitch.conf,passwd,pki,pulse,resolv.conf,ssl
40private-tmp
41
42dbus-user none
43dbus-system none
diff --git a/etc/profile-m-z/xournal.profile b/etc/profile-m-z/xournal.profile
new file mode 100644
index 000000000..ba41d5bb3
--- /dev/null
+++ b/etc/profile-m-z/xournal.profile
@@ -0,0 +1,49 @@
1# Firejail profile for xournal
2# Description: Note taking and PDF editing
3# This file is overwritten after every install/update
4# Persistent local customizations
5include xournal.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${DOCUMENTS}
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19whitelist /usr/share/xournal
20whitelist /usr/share/poppler
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23
24caps.drop all
25machine-id
26net none
27no3d
28nodvd
29nogroups
30nonewprivs
31noroot
32nosound
33notv
34nou2f
35novideo
36protocol unix
37seccomp
38shell none
39tracelog
40
41private-bin xournal
42private-cache
43private-dev
44private-etc alternatives,fonts,group,machine-id,passwd
45# TODO should use private-lib
46private-tmp
47
48dbus-user none
49dbus-system none
diff --git a/etc/profile-m-z/xpdf.profile b/etc/profile-m-z/xpdf.profile
new file mode 100644
index 000000000..cdffe4eb7
--- /dev/null
+++ b/etc/profile-m-z/xpdf.profile
@@ -0,0 +1,45 @@
1# Firejail profile for xpdf
2# Description: Portable Document Format (PDF) reader
3# This file is overwritten after every install/update
4# Persistent local customizations
5include xpdf.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.xpdfrc
10noblacklist ${DOCUMENTS}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20include whitelist-var-common.inc
21
22apparmor
23caps.drop all
24machine-id
25net none
26no3d
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38
39private-dev
40private-tmp
41
42dbus-user none
43dbus-system none
44
45memory-deny-write-execute
diff --git a/etc/profile-m-z/xplayer-audio-preview.profile b/etc/profile-m-z/xplayer-audio-preview.profile
new file mode 100644
index 000000000..0559b8183
--- /dev/null
+++ b/etc/profile-m-z/xplayer-audio-preview.profile
@@ -0,0 +1,10 @@
1# Firejail profile for xplayer-audio-preview
2# This file is overwritten after every install/update
3# Persistent local customizations
4include xplayer-audio-preview.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include xplayer.profile
diff --git a/etc/profile-m-z/xplayer-video-thumbnailer.profile b/etc/profile-m-z/xplayer-video-thumbnailer.profile
new file mode 100644
index 000000000..6b2878476
--- /dev/null
+++ b/etc/profile-m-z/xplayer-video-thumbnailer.profile
@@ -0,0 +1,10 @@
1# Firejail profile for xplayer-video-thumbnailer
2# This file is overwritten after every install/update
3# Persistent local customizations
4include xplayer-video-thumbnailer.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include xplayer.profile
diff --git a/etc/profile-m-z/xplayer.profile b/etc/profile-m-z/xplayer.profile
new file mode 100644
index 000000000..28df73ea5
--- /dev/null
+++ b/etc/profile-m-z/xplayer.profile
@@ -0,0 +1,46 @@
1# Firejail profile for xplayer
2# This file is overwritten after every install/update
3# Persistent local customizations
4include xplayer.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/xplayer
9noblacklist ${HOME}/.local/share/xplayer
10noblacklist ${MUSIC}
11noblacklist ${VIDEOS}
12
13# Allow python (blacklisted by disable-interpreters.inc)
14include allow-python2.inc
15include allow-python3.inc
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25include whitelist-var-common.inc
26
27# apparmor - makes settings immutable
28caps.drop all
29netfilter
30nogroups
31nonewprivs
32noroot
33nou2f
34protocol unix,inet,inet6
35seccomp
36shell none
37tracelog
38
39private-bin xplayer,xplayer-audio-preview,xplayer-video-thumbnailer
40private-dev
41# private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,machine-id,pki,pulse,ssl
42private-tmp
43
44# makes settings immutable
45# dbus-user none
46# dbus-system none
diff --git a/etc/profile-m-z/xpra.profile b/etc/profile-m-z/xpra.profile
new file mode 100644
index 000000000..1033a7471
--- /dev/null
+++ b/etc/profile-m-z/xpra.profile
@@ -0,0 +1,54 @@
1# Firejail profile for xpra
2# Description: Tool to detach/reattach running X programs
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include xpra.local
7# Persistent global definitions
8include globals.local
9
10#
11# This profile will sandbox Xpra server itself when used with firejail --x11=xpra.
12# To enable it, create a firejail-xpra symlink in /usr/local/bin:
13#
14# $ sudo ln -s /usr/bin/firejail /usr/local/bin/xpra
15#
16# or run "sudo firecfg"
17
18# Allow python (blacklisted by disable-interpreters.inc)
19include allow-python2.inc
20include allow-python3.inc
21
22include disable-common.inc
23include disable-devel.inc
24include disable-interpreters.inc
25include disable-passwdmgr.inc
26include disable-programs.inc
27
28whitelist /var/lib/xkb
29# whitelisting home directory, or including whitelist-common.inc
30# will crash xpra on some platforms
31
32caps.drop all
33# xpra needs to be allowed access to the abstract Unix socket namespace.
34nodvd
35nogroups
36nonewprivs
37# In noroot mode, xpra cannot create a socket in the real /tmp/.X11-unix.
38#noroot
39nosound
40notv
41nou2f
42novideo
43protocol unix
44seccomp
45shell none
46
47disable-mnt
48# private home directory doesn't work on some distros, so we go for a regular home
49# private
50# older Xpra versions also use Xvfb
51# private-bin bash,cat,dbus-launch,ldconfig,ls,pactl,python*,sh,strace,which,xauth,xkbcomp,Xorg,xpra,Xvfb
52private-dev
53# private-etc alternatives,gai.conf,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,machine-id,nsswitch.conf,resolv.conf,X11,xpra
54private-tmp
diff --git a/etc/profile-m-z/xreader-previewer.profile b/etc/profile-m-z/xreader-previewer.profile
new file mode 100644
index 000000000..6e1dcb5d2
--- /dev/null
+++ b/etc/profile-m-z/xreader-previewer.profile
@@ -0,0 +1,10 @@
1# Firejail profile for xreader-previewer
2# This file is overwritten after every install/update
3# Persistent local customizations
4include xreader-previewer.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include xreader.profile
diff --git a/etc/profile-m-z/xreader-thumbnailer.profile b/etc/profile-m-z/xreader-thumbnailer.profile
new file mode 100644
index 000000000..a6925fcde
--- /dev/null
+++ b/etc/profile-m-z/xreader-thumbnailer.profile
@@ -0,0 +1,10 @@
1# Firejail profile for xreader-thumbnailer
2# This file is overwritten after every install/update
3# Persistent local customizations
4include xreader-thumbnailer.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include xreader.profile
diff --git a/etc/profile-m-z/xreader.profile b/etc/profile-m-z/xreader.profile
new file mode 100644
index 000000000..643c5a317
--- /dev/null
+++ b/etc/profile-m-z/xreader.profile
@@ -0,0 +1,45 @@
1# Firejail profile for xreader
2# Description: Document viewer for files like PDF and Postscript. X-Apps Project.
3# This file is overwritten after every install/update
4# Persistent local customizations
5include xreader.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/xreader
10noblacklist ${HOME}/.config/xreader
11noblacklist ${DOCUMENTS}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21# Breaks xreader on Mint 18.3
22# include whitelist-var-common.inc
23
24# apparmor
25caps.drop all
26no3d
27nodvd
28nogroups
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38tracelog
39
40private-bin xreader,xreader-previewer,xreader-thumbnailer
41private-dev
42private-etc alternatives,fonts,ld.so.cache
43private-tmp
44
45memory-deny-write-execute
diff --git a/etc/profile-m-z/xviewer.profile b/etc/profile-m-z/xviewer.profile
new file mode 100644
index 000000000..59c8a44f2
--- /dev/null
+++ b/etc/profile-m-z/xviewer.profile
@@ -0,0 +1,48 @@
1# Firejail profile for xviewer
2# This file is overwritten after every install/update
3# Persistent local customizations
4include xviewer.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.Steam
9noblacklist ${HOME}/.config/xviewer
10noblacklist ${HOME}/.local/share/Trash
11noblacklist ${HOME}/.steam
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20include whitelist-var-common.inc
21
22# apparmor - makes settings immutable
23caps.drop all
24# net none - makes settings immutable
25no3d
26nodvd
27nogroups
28nonewprivs
29noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37tracelog
38
39private-bin xviewer
40private-dev
41private-lib
42private-tmp
43
44# makes settings immutable
45# dbus-user none
46# dbus-system none
47
48memory-deny-write-execute
diff --git a/etc/profile-m-z/xxd.profile b/etc/profile-m-z/xxd.profile
new file mode 100644
index 000000000..864e8ce9c
--- /dev/null
+++ b/etc/profile-m-z/xxd.profile
@@ -0,0 +1,12 @@
1# Firejail profile for xxd
2# Description: Tool to make (or reverse) a hex dump
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include xxd.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# Redirect
12include cpio.profile
diff --git a/etc/profile-m-z/xz.profile b/etc/profile-m-z/xz.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-m-z/xz.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-m-z/xzcat.profile b/etc/profile-m-z/xzcat.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-m-z/xzcat.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-m-z/xzcmp.profile b/etc/profile-m-z/xzcmp.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-m-z/xzcmp.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-m-z/xzdec.profile b/etc/profile-m-z/xzdec.profile
new file mode 100644
index 000000000..542363b57
--- /dev/null
+++ b/etc/profile-m-z/xzdec.profile
@@ -0,0 +1,41 @@
1# Firejail profile for xzdec
2# Description: XZ-format compression utilities - tiny decompressors
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include xzdec.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19caps.drop all
20ipc-namespace
21machine-id
22net none
23no3d
24nodvd
25#nogroups
26nonewprivs
27#noroot
28nosound
29notv
30nou2f
31novideo
32protocol unix
33seccomp
34shell none
35tracelog
36x11 none
37
38private-dev
39
40dbus-user none
41dbus-system none
diff --git a/etc/profile-m-z/xzdiff.profile b/etc/profile-m-z/xzdiff.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-m-z/xzdiff.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-m-z/xzegrep.profile b/etc/profile-m-z/xzegrep.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-m-z/xzegrep.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-m-z/xzfgrep.profile b/etc/profile-m-z/xzfgrep.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-m-z/xzfgrep.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-m-z/xzgrep.profile b/etc/profile-m-z/xzgrep.profile
new file mode 100644
index 000000000..f7410b928
--- /dev/null
+++ b/etc/profile-m-z/xzgrep.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4
5# Redirect
6include cpio.profile
diff --git a/etc/profile-m-z/xzless.profile b/etc/profile-m-z/xzless.profile
new file mode 100644
index 000000000..f7410b928
--- /dev/null
+++ b/etc/profile-m-z/xzless.profile
@@ -0,0 +1,6 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4
5# Redirect
6include cpio.profile
diff --git a/etc/profile-m-z/xzmore.profile b/etc/profile-m-z/xzmore.profile
new file mode 100644
index 000000000..d9c72407f
--- /dev/null
+++ b/etc/profile-m-z/xzmore.profile
@@ -0,0 +1,7 @@
1# Firejail profile alias for cpio
2# Description: Library and command line tools for XZ and LZMA compressed files
3# This file is overwritten after every install/update
4quiet
5
6# Redirect
7include cpio.profile
diff --git a/etc/profile-m-z/yandex-browser.profile b/etc/profile-m-z/yandex-browser.profile
new file mode 100644
index 000000000..680bef677
--- /dev/null
+++ b/etc/profile-m-z/yandex-browser.profile
@@ -0,0 +1,23 @@
1# Firejail profile for yandex-browser
2# This file is overwritten after every install/update
3# Persistent local customizations
4include yandex-browser.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/yandex-browser
9noblacklist ${HOME}/.cache/yandex-browser-beta
10noblacklist ${HOME}/.config/yandex-browser
11noblacklist ${HOME}/.config/yandex-browser-beta
12
13mkdir ${HOME}/.cache/yandex-browser
14mkdir ${HOME}/.cache/yandex-browser-beta
15mkdir ${HOME}/.config/yandex-browser
16mkdir ${HOME}/.config/yandex-browser-beta
17whitelist ${HOME}/.cache/yandex-browser
18whitelist ${HOME}/.cache/yandex-browser-beta
19whitelist ${HOME}/.config/yandex-browser
20whitelist ${HOME}/.config/yandex-browser-beta
21
22# Redirect
23include chromium-common.profile
diff --git a/etc/profile-m-z/yelp.profile b/etc/profile-m-z/yelp.profile
new file mode 100644
index 000000000..7053f98e8
--- /dev/null
+++ b/etc/profile-m-z/yelp.profile
@@ -0,0 +1,57 @@
1# Firejail profile for yelp
2# Description: Help browser for the GNOME desktop
3# This file is overwritten after every install/update
4# Persistent local customizations
5include yelp.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/yelp
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.config/yelp
20whitelist ${HOME}/.config/yelp
21whitelist /usr/share/doc
22whitelist /usr/share/help
23whitelist /usr/share/yelp
24whitelist /usr/share/yelp-xsl
25include whitelist-common.inc
26include whitelist-runuser-common.inc
27include whitelist-usr-share-common.inc
28include whitelist-var-common.inc
29
30apparmor
31caps.drop all
32net none
33nodvd
34nogroups
35nonewprivs
36noroot
37notv
38nou2f
39novideo
40protocol unix
41seccomp
42shell none
43tracelog
44
45disable-mnt
46private-bin yelp
47private-cache
48private-dev
49private-etc alsa,alternatives,asound.conf,crypto-policies,cups,dconf,drirc,fonts,gcrypt,gtk-3.0,machine-id,openal,os-release,pulse,sgml,xml
50private-tmp
51
52# read-only ${HOME} breaks some not necesarry featrues, comment it if
53# you need them or put 'ignore read-only ${HOME}' into your yelp.local.
54# broken features:
55# 1. yelp --editor-mode
56# 2. saving the window geometry
57read-only ${HOME}
diff --git a/etc/profile-m-z/youtube-dl.profile b/etc/profile-m-z/youtube-dl.profile
new file mode 100644
index 000000000..061d873b3
--- /dev/null
+++ b/etc/profile-m-z/youtube-dl.profile
@@ -0,0 +1,66 @@
1# Firejail profile for youtube-dl
2# Description: Downloader of videos from YouTube and other sites
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include youtube-dl.local
7# Persistent global definitions
8include globals.local
9
10# breaks when installed under ${HOME} via `pip install --user` (see #2833)
11ignore noexec ${HOME}
12
13noblacklist ${HOME}/.cache/youtube-dl
14noblacklist ${HOME}/.config/youtube-dl
15noblacklist ${HOME}/.netrc
16noblacklist ${MUSIC}
17noblacklist ${VIDEOS}
18
19# Allow python (blacklisted by disable-interpreters.inc)
20include allow-python2.inc
21include allow-python3.inc
22
23blacklist /tmp/.X11-unix
24blacklist ${RUNUSER}/wayland-*
25blacklist ${RUNUSER}
26
27include disable-common.inc
28include disable-devel.inc
29include disable-exec.inc
30include disable-interpreters.inc
31include disable-passwdmgr.inc
32include disable-programs.inc
33include disable-xdg.inc
34
35include whitelist-usr-share-common.inc
36include whitelist-var-common.inc
37
38apparmor
39caps.drop all
40ipc-namespace
41machine-id
42netfilter
43no3d
44nodvd
45nogroups
46nonewprivs
47noroot
48nosound
49notv
50nou2f
51novideo
52protocol unix,inet,inet6
53seccomp
54shell none
55tracelog
56
57private-bin env,ffmpeg,python*,youtube-dl
58private-cache
59private-dev
60private-etc alternatives,ca-certificates,crypto-policies,hostname,hosts,ld.so.cache,mime.types,pki,resolv.conf,ssl,youtube-dl.conf
61private-tmp
62
63dbus-user none
64dbus-system none
65
66#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/profile-m-z/zaproxy.profile b/etc/profile-m-z/zaproxy.profile
new file mode 100644
index 000000000..6228ff3bd
--- /dev/null
+++ b/etc/profile-m-z/zaproxy.profile
@@ -0,0 +1,47 @@
1# Firejail profile for zaproxy
2# Description: Integrated penetration testing tool for finding vulnerabilities in web applications
3# This file is overwritten after every install/update
4# Persistent local customizations
5include zaproxy.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.ZAP
10
11# Allow java (blacklisted by disable-devel.inc)
12include allow-java.inc
13
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21mkdir ${HOME}/.java
22mkdir ${HOME}/.ZAP
23whitelist ${HOME}/.java
24whitelist ${HOME}/.ZAP
25include whitelist-common.inc
26include whitelist-var-common.inc
27
28caps.drop all
29ipc-namespace
30netfilter
31no3d
32nodvd
33nogroups
34nonewprivs
35noroot
36nosound
37notv
38nou2f
39novideo
40protocol unix,inet,inet6
41seccomp
42shell none
43
44disable-mnt
45private-dev
46private-tmp
47
diff --git a/etc/profile-m-z/zart.profile b/etc/profile-m-z/zart.profile
new file mode 100644
index 000000000..3fe3c8ce8
--- /dev/null
+++ b/etc/profile-m-z/zart.profile
@@ -0,0 +1,37 @@
1# Firejail profile for zart
2# Description: A GUI for G'MIC real-time manipulations on the output of a webcam
3# This file is overwritten after every install/update
4# Persistent local customizations
5include zart.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${DOCUMENTS}
10noblacklist ${PICTURES}
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20caps.drop all
21ipc-namespace
22net none
23nodvd
24nogroups
25nonewprivs
26noroot
27notv
28nou2f
29protocol unix
30seccomp
31shell none
32
33private-bin ffmpeg,ffplay,ffprobe,melt,zart
34private-dev
35
36dbus-user none
37dbus-system none
diff --git a/etc/profile-m-z/zathura.profile b/etc/profile-m-z/zathura.profile
new file mode 100644
index 000000000..ba0ea1032
--- /dev/null
+++ b/etc/profile-m-z/zathura.profile
@@ -0,0 +1,59 @@
1# Firejail profile for zathura
2# Description: Document viewer with a minimalistic interface
3# This file is overwritten after every install/update
4# Persistent local customizations
5include zathura.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/zathura
10noblacklist ${HOME}/.local/share/zathura
11noblacklist ${DOCUMENTS}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21mkdir ${HOME}/.config/zathura
22mkdir ${HOME}/.local/share/zathura
23whitelist /usr/share/doc
24whitelist /usr/share/zathura
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30ipc-namespace
31machine-id
32net none
33nodvd
34nogroups
35nonewprivs
36noroot
37nosound
38notv
39nou2f
40novideo
41protocol unix
42seccomp
43shell none
44tracelog
45
46private-bin zathura
47private-cache
48private-dev
49private-etc alternatives,fonts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,machine-id
50# private-lib has problems on Debian 10
51#private-lib gcc/*/*/libgcc_s.so.*,gcc/*/*/libstdc++.so.*,libarchive.so.*,libdjvulibre.so.*,libgirara-gtk*,libpoppler-glib.so.*,libspectre.so.*,zathura
52private-tmp
53
54dbus-user none
55dbus-system none
56
57read-only ${HOME}
58read-write ${HOME}/.config/zathura
59read-write ${HOME}/.local/share/zathura
diff --git a/etc/profile-m-z/zcat.profile b/etc/profile-m-z/zcat.profile
new file mode 100644
index 000000000..12932ea92
--- /dev/null
+++ b/etc/profile-m-z/zcat.profile
@@ -0,0 +1,11 @@
1# Firejail profile for zcat
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include zcat.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gzip.profile
diff --git a/etc/profile-m-z/zcmp.profile b/etc/profile-m-z/zcmp.profile
new file mode 100644
index 000000000..795cdae2a
--- /dev/null
+++ b/etc/profile-m-z/zcmp.profile
@@ -0,0 +1,11 @@
1# Firejail profile for zcmp
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include zcmp.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gzip.profile
diff --git a/etc/profile-m-z/zdiff.profile b/etc/profile-m-z/zdiff.profile
new file mode 100644
index 000000000..1e75e38fe
--- /dev/null
+++ b/etc/profile-m-z/zdiff.profile
@@ -0,0 +1,11 @@
1# Firejail profile for zdiff
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include zdiff.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gzip.profile
diff --git a/etc/profile-m-z/zeal.profile b/etc/profile-m-z/zeal.profile
new file mode 100644
index 000000000..943d39097
--- /dev/null
+++ b/etc/profile-m-z/zeal.profile
@@ -0,0 +1,58 @@
1# Firejail profile for zeal
2# Description: Offline documentation browser
3# This file is overwritten after every install/update
4# Persistent local customizations
5include zeal.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Zeal
10noblacklist ${HOME}/.cache/Zeal
11noblacklist ${HOME}/.local/share/Zeal
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21mkdir ${HOME}/.config/Zeal
22mkdir ${HOME}/.cache/Zeal
23mkdir ${HOME}/.local/share/Zeal
24whitelist ${HOME}/.config/Zeal
25whitelist ${HOME}/.cache/Zeal
26whitelist ${HOME}/.local/share/Zeal
27include whitelist-common.inc
28include whitelist-var-common.inc
29
30apparmor
31caps.drop all
32machine-id
33netfilter
34no3d
35nodvd
36nogroups
37nonewprivs
38noroot
39nosound
40notv
41nou2f
42novideo
43protocol unix,inet,inet6
44seccomp
45shell none
46tracelog
47
48disable-mnt
49private-bin zeal
50private-cache
51private-dev
52private-etc alternatives,ca-certificates,crypto-policies,fonts,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,mime.types,nsswitch.conf,pango,pki,protocols,resolv.conf,rpc,services,ssl,Trolltech.conf,X11,xdg
53private-tmp
54
55dbus-user none
56dbus-system none
57
58memory-deny-write-execute
diff --git a/etc/profile-m-z/zegrep.profile b/etc/profile-m-z/zegrep.profile
new file mode 100644
index 000000000..54dc6b2a0
--- /dev/null
+++ b/etc/profile-m-z/zegrep.profile
@@ -0,0 +1,11 @@
1# Firejail profile for zegrep
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include zegrep.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gzip.profile
diff --git a/etc/profile-m-z/zfgrep.profile b/etc/profile-m-z/zfgrep.profile
new file mode 100644
index 000000000..73b22f2e8
--- /dev/null
+++ b/etc/profile-m-z/zfgrep.profile
@@ -0,0 +1,11 @@
1# Firejail profile for zfgrep
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include zfgrep.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gzip.profile
diff --git a/etc/profile-m-z/zforce.profile b/etc/profile-m-z/zforce.profile
new file mode 100644
index 000000000..d62e57065
--- /dev/null
+++ b/etc/profile-m-z/zforce.profile
@@ -0,0 +1,11 @@
1# Firejail profile for zforce
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include zforce.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gzip.profile
diff --git a/etc/profile-m-z/zgrep.profile b/etc/profile-m-z/zgrep.profile
new file mode 100644
index 000000000..b39a58420
--- /dev/null
+++ b/etc/profile-m-z/zgrep.profile
@@ -0,0 +1,11 @@
1# Firejail profile for zgrep
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include zgrep.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gzip.profile
diff --git a/etc/profile-m-z/zless.profile b/etc/profile-m-z/zless.profile
new file mode 100644
index 000000000..0a26cda1f
--- /dev/null
+++ b/etc/profile-m-z/zless.profile
@@ -0,0 +1,11 @@
1# Firejail profile for zless
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include zless.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gzip.profile
diff --git a/etc/profile-m-z/zmore.profile b/etc/profile-m-z/zmore.profile
new file mode 100644
index 000000000..3a8f63562
--- /dev/null
+++ b/etc/profile-m-z/zmore.profile
@@ -0,0 +1,11 @@
1# Firejail profile for zmore
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include zmore.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gzip.profile
diff --git a/etc/profile-m-z/znew.profile b/etc/profile-m-z/znew.profile
new file mode 100644
index 000000000..a8593e58e
--- /dev/null
+++ b/etc/profile-m-z/znew.profile
@@ -0,0 +1,11 @@
1# Firejail profile for znew
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include znew.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include gzip.profile
diff --git a/etc/profile-m-z/zoom.profile b/etc/profile-m-z/zoom.profile
new file mode 100644
index 000000000..6eac10703
--- /dev/null
+++ b/etc/profile-m-z/zoom.profile
@@ -0,0 +1,33 @@
1# Firejail profile for zoom
2# This file is overwritten after every install/update
3# Persistent local customizations
4include zoom.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.config/zoomus.conf
9noblacklist ${HOME}/.zoom
10
11include disable-common.inc
12include disable-devel.inc
13include disable-interpreters.inc
14include disable-programs.inc
15
16mkdir ${HOME}/.cache/zoom
17mkfile ${HOME}/.config/zoomus.conf
18mkdir ${HOME}/.zoom
19whitelist ${HOME}/.cache/zoom
20whitelist ${HOME}/.config/zoomus.conf
21whitelist ${HOME}/.zoom
22include whitelist-common.inc
23
24caps.drop all
25netfilter
26nodvd
27nonewprivs
28noroot
29notv
30protocol unix,inet,inet6,netlink
31seccomp !chroot
32
33private-tmp
diff --git a/etc/profile-m-z/zpaq.profile b/etc/profile-m-z/zpaq.profile
new file mode 100644
index 000000000..80329ecfd
--- /dev/null
+++ b/etc/profile-m-z/zpaq.profile
@@ -0,0 +1,15 @@
1# Firejail profile for zpaq
2# Description: Programmable file compressor, library and utilities. Based on the PAQ compression algorithm.
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include zpaq.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11# mdwx breaks 'list' functionality
12ignore memory-deny-write-execute
13
14# Redirect
15include cpio.profile
diff --git a/etc/profile-m-z/zstd.profile b/etc/profile-m-z/zstd.profile
new file mode 100644
index 000000000..be27c10e1
--- /dev/null
+++ b/etc/profile-m-z/zstd.profile
@@ -0,0 +1,43 @@
1# Firejail profile for zstd
2# Description: Zstandard - Fast real-time compression algorithm
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include zstd.local
7# Persistent global definitions
8include globals.local
9
10blacklist ${RUNUSER}/wayland-*
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19apparmor
20caps.drop all
21hostname zstd
22ipc-namespace
23machine-id
24net none
25no3d
26nodvd
27nogroups
28nonewprivs
29#noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37tracelog
38x11 none
39
40private-cache
41private-dev
42
43memory-deny-write-execute
diff --git a/etc/profile-m-z/zstdcat.profile b/etc/profile-m-z/zstdcat.profile
new file mode 100644
index 000000000..ce9af3286
--- /dev/null
+++ b/etc/profile-m-z/zstdcat.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for zstd
2# This file is overwritten after every install/update
3
4# Redirect
5include zstd.profile
diff --git a/etc/profile-m-z/zstdgrep.profile b/etc/profile-m-z/zstdgrep.profile
new file mode 100644
index 000000000..ce9af3286
--- /dev/null
+++ b/etc/profile-m-z/zstdgrep.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for zstd
2# This file is overwritten after every install/update
3
4# Redirect
5include zstd.profile
diff --git a/etc/profile-m-z/zstdless.profile b/etc/profile-m-z/zstdless.profile
new file mode 100644
index 000000000..ce9af3286
--- /dev/null
+++ b/etc/profile-m-z/zstdless.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for zstd
2# This file is overwritten after every install/update
3
4# Redirect
5include zstd.profile
diff --git a/etc/profile-m-z/zstdmt.profile b/etc/profile-m-z/zstdmt.profile
new file mode 100644
index 000000000..ce9af3286
--- /dev/null
+++ b/etc/profile-m-z/zstdmt.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for zstd
2# This file is overwritten after every install/update
3
4# Redirect
5include zstd.profile
diff --git a/etc/profile-m-z/zulip.profile b/etc/profile-m-z/zulip.profile
new file mode 100644
index 000000000..999c2f77a
--- /dev/null
+++ b/etc/profile-m-z/zulip.profile
@@ -0,0 +1,47 @@
1# Firejail profile for zulip
2# Description: Real-time team chat based on the email threading model
3# This file is overwritten after every install/update
4# Persistent local customizations
5include zulip.local
6# Persistent global definitions
7include globals.local
8
9ignore noexec /tmp
10
11noblacklist ${HOME}/.config/Zulip
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21mkdir ${HOME}/.config/Zulip
22whitelist ${HOME}/.config/Zulip
23whitelist ${DOWNLOADS}
24include whitelist-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29netfilter
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35notv
36nou2f
37novideo
38protocol unix,inet,inet6
39seccomp
40shell none
41
42disable-mnt
43private-bin locale,zulip
44private-cache
45private-dev
46private-etc asound.conf,fonts,machine-id
47private-tmp