aboutsummaryrefslogtreecommitdiffstats
path: root/etc
diff options
context:
space:
mode:
authorLibravatar Fred Barclay <Fred-Barclay@users.noreply.github.com>2019-04-18 11:15:33 -0500
committerLibravatar Fred Barclay <Fred-Barclay@users.noreply.github.com>2019-04-18 11:15:33 -0500
commit5f7f3a5e26bbac22934daab982b4099b6cd5c492 (patch)
tree53ffe95a5931df229ffd9d380efcf7ba4e36da20 /etc
parentAllow access to .pythonrc.py -- see #2651 (diff)
parentMerge pull request #2641 from rusty-snake/add-cheese (diff)
downloadfirejail-5f7f3a5e26bbac22934daab982b4099b6cd5c492.tar.gz
firejail-5f7f3a5e26bbac22934daab982b4099b6cd5c492.tar.zst
firejail-5f7f3a5e26bbac22934daab982b4099b6cd5c492.zip
Merge branch 'master' of https://github.com/netblue30/firejail
Diffstat (limited to 'etc')
-rw-r--r--etc/Cheese.profile7
-rw-r--r--etc/authenticator.profile10
-rw-r--r--etc/cheese.profile43
-rw-r--r--etc/chromium-common.profile2
-rw-r--r--etc/disable-programs.inc4
-rw-r--r--etc/evince.profile2
-rw-r--r--etc/firefox-common.profile2
-rw-r--r--etc/firejail.config9
-rw-r--r--etc/freeoffice-planmaker.profile38
-rw-r--r--etc/freeoffice-presentations.profile38
-rw-r--r--etc/freeoffice-textmaker.profile38
-rw-r--r--etc/gajim.profile2
-rw-r--r--etc/gramps.profile53
-rw-r--r--etc/midori.profile2
-rw-r--r--etc/min.profile2
-rw-r--r--etc/mpv.profile2
-rw-r--r--etc/newsboat.profile47
17 files changed, 287 insertions, 14 deletions
diff --git a/etc/Cheese.profile b/etc/Cheese.profile
new file mode 100644
index 000000000..4bfce53a9
--- /dev/null
+++ b/etc/Cheese.profile
@@ -0,0 +1,7 @@
1# Firejail profile for cheese
2# This file is overwritten after every install/update
3
4
5# Temporary fix for https://github.com/netblue30/firejail/issues/2624
6# Redirect
7include cheese.profile
diff --git a/etc/authenticator.profile b/etc/authenticator.profile
index f989ab1ba..5f1c64682 100644
--- a/etc/authenticator.profile
+++ b/etc/authenticator.profile
@@ -6,6 +6,7 @@ include authenticator.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.cache/Authenticator
9noblacklist ${HOME}/.config/Authenticator 10noblacklist ${HOME}/.config/Authenticator
10 11
11# Allow python (blacklisted by disable-interpreters.inc) 12# Allow python (blacklisted by disable-interpreters.inc)
@@ -25,7 +26,7 @@ include disable-programs.inc
25 26
26# apparmor 27# apparmor
27caps.drop all 28caps.drop all
28net none 29netfilter
29no3d 30no3d
30# nodbus - makes settings immutable 31# nodbus - makes settings immutable
31nodvd 32nodvd
@@ -36,15 +37,14 @@ nosound
36notv 37notv
37nou2f 38nou2f
38# novideo 39# novideo
39protocol unix 40protocol unix,inet,inet6
40seccomp 41seccomp
41shell none 42shell none
42 43
43disable-mnt 44disable-mnt
44# private-bin authenticator 45# private-bin authenticator,python*
45private-cache
46private-dev 46private-dev
47private-etc alternatives,fonts,ld.so.cache 47private-etc alternatives,ca-certificates,fonts,ld.so.cache,ssl
48private-tmp 48private-tmp
49 49
50# memory-deny-write-execute - breaks on Arch 50# memory-deny-write-execute - breaks on Arch
diff --git a/etc/cheese.profile b/etc/cheese.profile
new file mode 100644
index 000000000..b6cb0c9ce
--- /dev/null
+++ b/etc/cheese.profile
@@ -0,0 +1,43 @@
1# Firejail profile for cheese
2# Description: taking pictures and movies from a webcam
3# This file is overwritten after every install/update
4# Persistent local customizations
5include cheese.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${VIDEOS}
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19whitelist ${VIDEOS}
20include whitelist-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25machine-id
26net none
27nodbus
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33nou2f
34protocol unix
35seccomp
36shell none
37tracelog
38
39disable-mnt
40private-bin cheese
41private-cache
42private-etc alternatives,fonts,drirc,clutter-1.0,gtk-3.0,dconf
43private-tmp
diff --git a/etc/chromium-common.profile b/etc/chromium-common.profile
index 3c7423316..63983d93b 100644
--- a/etc/chromium-common.profile
+++ b/etc/chromium-common.profile
@@ -7,7 +7,7 @@ include chromium-common.local
7#include globals.local 7#include globals.local
8 8
9# noexec ${HOME} breaks DRM binaries. 9# noexec ${HOME} breaks DRM binaries.
10ignore noexec ${HOME} 10?BROWSER_ALLOW_DRM: ignore noexec ${HOME}
11 11
12noblacklist ${HOME}/.pki 12noblacklist ${HOME}/.pki
13noblacklist ${HOME}/.local/share/pki 13noblacklist ${HOME}/.local/share/pki
diff --git a/etc/disable-programs.inc b/etc/disable-programs.inc
index 96fd80daf..7e12b97b2 100644
--- a/etc/disable-programs.inc
+++ b/etc/disable-programs.inc
@@ -5,6 +5,7 @@ include disable-programs.local
5blacklist ${HOME}/Arduino 5blacklist ${HOME}/Arduino
6blacklist ${HOME}/Monero/wallets 6blacklist ${HOME}/Monero/wallets
7blacklist ${HOME}/Nextcloud/Notes 7blacklist ${HOME}/Nextcloud/Notes
8blacklist ${HOME}/SoftMaker
8blacklist ${HOME}/Standard Notes Backups 9blacklist ${HOME}/Standard Notes Backups
9blacklist ${HOME}/wallet.dat 10blacklist ${HOME}/wallet.dat
10blacklist ${HOME}/.*coin 11blacklist ${HOME}/.*coin
@@ -339,6 +340,7 @@ blacklist ${HOME}/.googleearth/Temp/
339blacklist ${HOME}/.googleearth/myplaces.backup.kml 340blacklist ${HOME}/.googleearth/myplaces.backup.kml
340blacklist ${HOME}/.googleearth/myplaces.kml 341blacklist ${HOME}/.googleearth/myplaces.kml
341blacklist ${HOME}/.gradle 342blacklist ${HOME}/.gradle
343blacklist ${HOME}/.gramps
342blacklist ${HOME}/.guayadeque 344blacklist ${HOME}/.guayadeque
343blacklist ${HOME}/.hashcat 345blacklist ${HOME}/.hashcat
344blacklist ${HOME}/.hedgewars 346blacklist ${HOME}/.hedgewars
@@ -549,6 +551,7 @@ blacklist ${HOME}/.multimc5
549blacklist ${HOME}/.nanorc 551blacklist ${HOME}/.nanorc
550blacklist ${HOME}/.netactview 552blacklist ${HOME}/.netactview
551blacklist ${HOME}/.neverball 553blacklist ${HOME}/.neverball
554blacklist ${HOME}/.newsboat
552blacklist ${HOME}/.nv 555blacklist ${HOME}/.nv
553blacklist ${HOME}/.nylas-mail 556blacklist ${HOME}/.nylas-mail
554blacklist ${HOME}/.opencity 557blacklist ${HOME}/.opencity
@@ -625,6 +628,7 @@ blacklist /tmp/ssh-*
625# ${HOME}/.cache directory 628# ${HOME}/.cache directory
626blacklist ${HOME}/.cache/0ad 629blacklist ${HOME}/.cache/0ad
627blacklist ${HOME}/.cache/8pecxstudios 630blacklist ${HOME}/.cache/8pecxstudios
631blacklist ${HOME}/.cache/Authenticator
628blacklist ${HOME}/.cache/Clementine 632blacklist ${HOME}/.cache/Clementine
629blacklist ${HOME}/.cache/Enox 633blacklist ${HOME}/.cache/Enox
630blacklist ${HOME}/.cache/Franz 634blacklist ${HOME}/.cache/Franz
diff --git a/etc/evince.profile b/etc/evince.profile
index b1f984784..1a429d673 100644
--- a/etc/evince.profile
+++ b/etc/evince.profile
@@ -43,7 +43,7 @@ private-bin evince,evince-previewer,evince-thumbnailer
43private-cache 43private-cache
44private-dev 44private-dev
45private-etc alternatives,fonts,group,machine-id,passwd 45private-etc alternatives,fonts,group,machine-id,passwd
46private-lib evince,gdk-pixbuf-2.*,gio,gvfs/libgvfscommon.so,libdjvulibre.so.*,libgconf-2.so.*,libpoppler-glib.so.*,librsvg-2.so.*,gconv 46private-lib evince,gdk-pixbuf-2.*,gio,gvfs/libgvfscommon.so,libdjvulibre.so.*,libgconf-2.so.*,libpoppler-glib.so.*,librsvg-2.so.*,libspectre.so.*,gconv
47private-tmp 47private-tmp
48 48
49# memory-deny-write-execute - might break application (https://github.com/netblue30/firejail/issues/1803) 49# memory-deny-write-execute - might break application (https://github.com/netblue30/firejail/issues/1803)
diff --git a/etc/firefox-common.profile b/etc/firefox-common.profile
index a2a34f33f..080d9e81a 100644
--- a/etc/firefox-common.profile
+++ b/etc/firefox-common.profile
@@ -7,7 +7,7 @@ include firefox-common.local
7#include globals.local 7#include globals.local
8 8
9# noexec ${HOME} breaks DRM binaries. 9# noexec ${HOME} breaks DRM binaries.
10ignore noexec ${HOME} 10?BROWSER_ALLOW_DRM: ignore noexec ${HOME}
11 11
12# Uncomment the following line to allow access to common programs/addons/plugins. 12# Uncomment the following line to allow access to common programs/addons/plugins.
13#include firefox-common-addons.inc 13#include firefox-common-addons.inc
diff --git a/etc/firejail.config b/etc/firejail.config
index b37edf7a5..497d9633e 100644
--- a/etc/firejail.config
+++ b/etc/firejail.config
@@ -5,9 +5,6 @@
5# Enable AppArmor functionality, default enabled. 5# Enable AppArmor functionality, default enabled.
6# apparmor yes 6# apparmor yes
7 7
8# Disable U2F in browsers, default enabled.
9# browser-disable-u2f yes
10
11# Number of ARP probes sent when assigning an IP address for --net option, 8# Number of ARP probes sent when assigning an IP address for --net option,
12# default 2. This is a partial implementation of RFC 5227. A 0.5 seconds 9# default 2. This is a partial implementation of RFC 5227. A 0.5 seconds
13# timeout is implemented for each probe. Increase this number to 4 if your 10# timeout is implemented for each probe. Increase this number to 4 if your
@@ -18,6 +15,12 @@
18# Enable or disable bind support, default enabled. 15# Enable or disable bind support, default enabled.
19# bind yes 16# bind yes
20 17
18# Allow (DRM) execution in browsers, default disabled.
19# browser-allow-drm no
20
21# Disable U2F in browsers, default enabled.
22# browser-disable-u2f yes
23
21# Enable or disable cgroup support, default enabled. 24# Enable or disable cgroup support, default enabled.
22# cgroup yes 25# cgroup yes
23 26
diff --git a/etc/freeoffice-planmaker.profile b/etc/freeoffice-planmaker.profile
new file mode 100644
index 000000000..8a53c63e3
--- /dev/null
+++ b/etc/freeoffice-planmaker.profile
@@ -0,0 +1,38 @@
1# Firejail profile for freeoffice-planmaker
2# This file is overwritten after every install/update
3# Persistent local customizations
4include freeoffice-planmaker.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/SoftMaker
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16# include disable-xdg.inc
17
18apparmor
19caps.drop all
20ipc-namespace
21netfilter
22no3d
23nodbus
24nodvd
25nogroups
26nonewprivs
27noroot
28notv
29nou2f
30novideo
31protocol unix,inet,inet6
32seccomp
33shell none
34tracelog
35
36private-cache
37private-dev
38private-tmp
diff --git a/etc/freeoffice-presentations.profile b/etc/freeoffice-presentations.profile
new file mode 100644
index 000000000..63be4da7f
--- /dev/null
+++ b/etc/freeoffice-presentations.profile
@@ -0,0 +1,38 @@
1# Firejail profile for freeoffice-presentations
2# This file is overwritten after every install/update
3# Persistent local customizations
4include freeoffice-presentations.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/SoftMaker
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16# include disable-xdg.inc
17
18apparmor
19caps.drop all
20ipc-namespace
21netfilter
22no3d
23nodbus
24nodvd
25nogroups
26nonewprivs
27noroot
28notv
29nou2f
30novideo
31protocol unix,inet,inet6
32seccomp
33shell none
34tracelog
35
36private-cache
37private-dev
38private-tmp
diff --git a/etc/freeoffice-textmaker.profile b/etc/freeoffice-textmaker.profile
new file mode 100644
index 000000000..4bca5a98c
--- /dev/null
+++ b/etc/freeoffice-textmaker.profile
@@ -0,0 +1,38 @@
1# Firejail profile for freeoffice-textmaker
2# This file is overwritten after every install/update
3# Persistent local customizations
4include freeoffice-textmaker.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/SoftMaker
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16# include disable-xdg.inc
17
18apparmor
19caps.drop all
20ipc-namespace
21netfilter
22no3d
23nodbus
24nodvd
25nogroups
26nonewprivs
27noroot
28notv
29nou2f
30novideo
31protocol unix,inet,inet6
32seccomp
33shell none
34tracelog
35
36private-cache
37private-dev
38private-tmp
diff --git a/etc/gajim.profile b/etc/gajim.profile
index 36121c4b9..ee84a0994 100644
--- a/etc/gajim.profile
+++ b/etc/gajim.profile
@@ -42,7 +42,7 @@ nonewprivs
42noroot 42noroot
43notv 43notv
44nou2f 44nou2f
45protocol unix,inet,inet6 45protocol unix,inet,inet6,netlink
46seccomp 46seccomp
47shell none 47shell none
48tracelog 48tracelog
diff --git a/etc/gramps.profile b/etc/gramps.profile
new file mode 100644
index 000000000..764c14b60
--- /dev/null
+++ b/etc/gramps.profile
@@ -0,0 +1,53 @@
1# Firejail profile for gramps
2# Description: genealogy program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gramps.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.gramps
10
11# Allow python (blacklisted by disable-interpreters.inc)
12#noblacklist ${PATH}/python2*
13noblacklist ${PATH}/python3*
14#noblacklist /usr/lib/python2*
15noblacklist /usr/lib/python3*
16#noblacklist /usr/local/lib/python2*
17noblacklist /usr/local/lib/python3*
18
19include disable-common.inc
20include disable-devel.inc
21include disable-exec.inc
22include disable-interpreters.inc
23include disable-passwdmgr.inc
24include disable-programs.inc
25include disable-xdg.inc
26
27mkdir ${HOME}/.gramps
28whitelist ${HOME}/.gramps
29include whitelist-common.inc
30include whitelist-var-common.inc
31
32apparmor
33caps.drop all
34ipc-namespace
35netfilter
36no3d
37nodbus
38nodvd
39nogroups
40nonewprivs
41noroot
42nosound
43notv
44nou2f
45novideo
46protocol unix,inet,inet6
47seccomp
48shell none
49
50disable-mnt
51private-cache
52private-dev
53private-tmp
diff --git a/etc/midori.profile b/etc/midori.profile
index d59a6a16b..e4d39cd70 100644
--- a/etc/midori.profile
+++ b/etc/midori.profile
@@ -14,7 +14,7 @@ noblacklist ${HOME}/.pki
14noblacklist ${HOME}/.local/share/pki 14noblacklist ${HOME}/.local/share/pki
15 15
16# noexec ${HOME} breaks DRM binaries. 16# noexec ${HOME} breaks DRM binaries.
17ignore noexec ${HOME} 17?BROWSER_ALLOW_DRM: ignore noexec ${HOME}
18 18
19include disable-common.inc 19include disable-common.inc
20include disable-devel.inc 20include disable-devel.inc
diff --git a/etc/min.profile b/etc/min.profile
index eec81677d..c89df0a95 100644
--- a/etc/min.profile
+++ b/etc/min.profile
@@ -12,7 +12,7 @@ noblacklist ${HOME}/.pki
12noblacklist ${HOME}/.local/share/pki 12noblacklist ${HOME}/.local/share/pki
13 13
14# noexec ${HOME} breaks DRM binaries. 14# noexec ${HOME} breaks DRM binaries.
15ignore noexec ${HOME} 15?BROWSER_ALLOW_DRM: ignore noexec ${HOME}
16 16
17include disable-common.inc 17include disable-common.inc
18include disable-devel.inc 18include disable-devel.inc
diff --git a/etc/mpv.profile b/etc/mpv.profile
index c2ae9c6f9..34542b11b 100644
--- a/etc/mpv.profile
+++ b/etc/mpv.profile
@@ -1,6 +1,7 @@
1# Firejail profile for mpv 1# Firejail profile for mpv
2# Description: Video player based on MPlayer/mplayer2 2# Description: Video player based on MPlayer/mplayer2
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include mpv.local 6include mpv.local
6# Persistent global definitions 7# Persistent global definitions
@@ -44,4 +45,5 @@ shell none
44tracelog 45tracelog
45 46
46private-bin mpv,youtube-dl,python*,env 47private-bin mpv,youtube-dl,python*,env
48private-cache
47private-dev 49private-dev
diff --git a/etc/newsboat.profile b/etc/newsboat.profile
new file mode 100644
index 000000000..e063abe53
--- /dev/null
+++ b/etc/newsboat.profile
@@ -0,0 +1,47 @@
1# Firejail profile for Newsboat
2# Description: RSS program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include newsboat.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.newsboat
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.newsboat
20whitelist ${HOME}/.newsboat
21include whitelist-common.inc
22include whitelist-var-common.inc
23
24caps.drop all
25ipc-namespace
26netfilter
27no3d
28nodbus
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol inet,inet6
37seccomp
38shell none
39
40disable-mnt
41private-bin newsboat
42private-cache
43private-dev
44private-etc alternatives,ca-certificates,crypto-policies,pki,resolv.conf,ssl,terminfo
45private-tmp
46
47memory-deny-write-execute