aboutsummaryrefslogtreecommitdiffstats
path: root/etc
diff options
context:
space:
mode:
authorLibravatar pirate486743186 <>2023-03-16 02:30:52 +0100
committerLibravatar pirate486743186 <>2023-03-16 15:00:37 +0100
commit47e3c82ab58b0d0c02066666aea3f7a04078c86b (patch)
tree10d06366bb00a50209ea0c24366e599061cff53a /etc
parentfirejail.txt: remove extraneous endif (diff)
downloadfirejail-47e3c82ab58b0d0c02066666aea3f7a04078c86b.tar.gz
firejail-47e3c82ab58b0d0c02066666aea3f7a04078c86b.tar.zst
firejail-47e3c82ab58b0d0c02066666aea3f7a04078c86b.zip
create blink-common.profile
Diffstat (limited to 'etc')
-rw-r--r--etc/profile-a-l/blink-common-hardened.inc.profile11
-rw-r--r--etc/profile-a-l/blink-common.profile40
-rw-r--r--etc/profile-a-l/chromium-common-hardened.inc.profile17
-rw-r--r--etc/profile-a-l/chromium-common.profile25
-rw-r--r--etc/profile-a-l/electron-common.profile25
5 files changed, 65 insertions, 53 deletions
diff --git a/etc/profile-a-l/blink-common-hardened.inc.profile b/etc/profile-a-l/blink-common-hardened.inc.profile
new file mode 100644
index 000000000..c092a9746
--- /dev/null
+++ b/etc/profile-a-l/blink-common-hardened.inc.profile
@@ -0,0 +1,11 @@
1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include blink-common-hardened.inc.local
4
5caps.drop all
6nonewprivs
7noroot
8protocol unix,inet,inet6,netlink
9seccomp !chroot
10
11#restrict-namespaces
diff --git a/etc/profile-a-l/blink-common.profile b/etc/profile-a-l/blink-common.profile
new file mode 100644
index 000000000..ff17dc479
--- /dev/null
+++ b/etc/profile-a-l/blink-common.profile
@@ -0,0 +1,40 @@
1# Firejail profile for blink-common
2# Description: Common profile for Blink-based applications
3# This file is overwritten after every install/update
4# Persistent local customizations
5include blink-common.local
6# Persistent global definitions
7# added by caller profile
8#include globals.local
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17whitelist ${DOWNLOADS}
18include whitelist-common.inc
19#include whitelist-run-common.inc
20include whitelist-runuser-common.inc
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23
24# If your kernel allows the creation of user namespaces by unprivileged users
25# (for example, if running `unshare -U echo enabled` prints "enabled"), you
26# can add the next line to your blink-common.local.
27#include blink-common-hardened.inc.profile
28
29apparmor
30caps.keep sys_admin,sys_chroot
31netfilter
32nodvd
33nogroups
34noinput
35notv
36
37disable-mnt
38private-cache
39
40dbus-system none
diff --git a/etc/profile-a-l/chromium-common-hardened.inc.profile b/etc/profile-a-l/chromium-common-hardened.inc.profile
index c3944bd65..0e0416de1 100644
--- a/etc/profile-a-l/chromium-common-hardened.inc.profile
+++ b/etc/profile-a-l/chromium-common-hardened.inc.profile
@@ -1,11 +1,10 @@
1# This file is overwritten during software install. 1# Firejail profile alias for blink-common-hardened.inc
2# Persistent customizations should go in a .local file. 2# This file is overwritten after every install/update
3# Persistent local customizations
3include chromium-common-hardened.inc.local 4include chromium-common-hardened.inc.local
5# Persistent global definitions
6# added by caller profile
7#include globals.local
4 8
5caps.drop all 9# Redirect
6nonewprivs 10include blink-common-hardened.inc.profile
7noroot
8protocol unix,inet,inet6,netlink
9seccomp !chroot
10
11#restrict-namespaces
diff --git a/etc/profile-a-l/chromium-common.profile b/etc/profile-a-l/chromium-common.profile
index f1f2f5f68..878e0fe1d 100644
--- a/etc/profile-a-l/chromium-common.profile
+++ b/etc/profile-a-l/chromium-common.profile
@@ -17,42 +17,21 @@ noblacklist /usr/lib/chromium/chrome-sandbox
17# to have access to Gnome extensions (extensions.gnome.org) via browser connector 17# to have access to Gnome extensions (extensions.gnome.org) via browser connector
18#include allow-python3.inc 18#include allow-python3.inc
19 19
20include disable-common.inc
21include disable-devel.inc
22include disable-exec.inc
23include disable-interpreters.inc
24include disable-programs.inc
25include disable-xdg.inc
26
27mkdir ${HOME}/.local/share/pki 20mkdir ${HOME}/.local/share/pki
28mkdir ${HOME}/.pki 21mkdir ${HOME}/.pki
29whitelist ${DOWNLOADS}
30whitelist ${HOME}/.local/share/pki 22whitelist ${HOME}/.local/share/pki
31whitelist ${HOME}/.pki 23whitelist ${HOME}/.pki
32whitelist /usr/share/mozilla/extensions 24whitelist /usr/share/mozilla/extensions
33whitelist /usr/share/webext 25whitelist /usr/share/webext
34include whitelist-common.inc
35include whitelist-run-common.inc 26include whitelist-run-common.inc
36include whitelist-runuser-common.inc
37include whitelist-usr-share-common.inc
38include whitelist-var-common.inc
39 27
40# If your kernel allows the creation of user namespaces by unprivileged users 28# If your kernel allows the creation of user namespaces by unprivileged users
41# (for example, if running `unshare -U echo enabled` prints "enabled"), you 29# (for example, if running `unshare -U echo enabled` prints "enabled"), you
42# can add the next line to your chromium-common.local. 30# can add the next line to your chromium-common.local.
43#include chromium-common-hardened.inc.profile 31#include chromium-common-hardened.inc.profile
44 32
45apparmor
46caps.keep sys_admin,sys_chroot
47netfilter
48nodvd
49nogroups
50noinput
51notv
52?BROWSER_DISABLE_U2F: nou2f 33?BROWSER_DISABLE_U2F: nou2f
53 34
54disable-mnt
55private-cache
56?BROWSER_DISABLE_U2F: private-dev 35?BROWSER_DISABLE_U2F: private-dev
57#private-tmp - issues when using multiple browser sessions 36#private-tmp - issues when using multiple browser sessions
58 37
@@ -61,7 +40,9 @@ blacklist ${PATH}/wget
61blacklist ${PATH}/wget2 40blacklist ${PATH}/wget2
62 41
63#dbus-user none - prevents access to passwords saved in GNOME Keyring and KWallet, also breaks Gnome connector. 42#dbus-user none - prevents access to passwords saved in GNOME Keyring and KWallet, also breaks Gnome connector.
64dbus-system none
65 43
66# The file dialog needs to work without d-bus. 44# The file dialog needs to work without d-bus.
67?HAS_NODBUS: env NO_CHROME_KDE_FILE_DIALOG=1 45?HAS_NODBUS: env NO_CHROME_KDE_FILE_DIALOG=1
46
47# Redirect
48include blink-common.profile
diff --git a/etc/profile-a-l/electron-common.profile b/etc/profile-a-l/electron-common.profile
index 73b6d1067..bb48d6332 100644
--- a/etc/profile-a-l/electron-common.profile
+++ b/etc/profile-a-l/electron-common.profile
@@ -7,40 +7,21 @@ include electron-common.local
7noblacklist ${HOME}/.config/Electron 7noblacklist ${HOME}/.config/Electron
8noblacklist ${HOME}/.config/electron*-flag*.conf 8noblacklist ${HOME}/.config/electron*-flag*.conf
9 9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-programs.inc
15include disable-xdg.inc
16
17whitelist ${DOWNLOADS}
18whitelist ${HOME}/.config/Electron 10whitelist ${HOME}/.config/Electron
19whitelist ${HOME}/.config/electron*-flag*.conf 11whitelist ${HOME}/.config/electron*-flag*.conf
20include whitelist-common.inc
21include whitelist-runuser-common.inc
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24 12
25# If your kernel allows the creation of user namespaces by unprivileged users 13# If your kernel allows the creation of user namespaces by unprivileged users
26# (for example, if running `unshare -U echo enabled` prints "enabled"), you 14# (for example, if running `unshare -U echo enabled` prints "enabled"), you
27# can add the next line to your electron-common.local. 15# can add the next line to your electron-common.local.
28#include electron-common-hardened.inc.profile 16#include electron-common-hardened.inc.profile
29 17
30apparmor
31caps.keep sys_admin,sys_chroot
32netfilter
33nodvd
34nogroups
35noinput
36notv
37nou2f 18nou2f
38novideo 19novideo
39 20
40disable-mnt
41private-cache
42private-dev 21private-dev
43private-tmp 22private-tmp
44 23
45dbus-user none 24dbus-user none
46dbus-system none 25
26# Redirect
27include blink-common.profile