aboutsummaryrefslogtreecommitdiffstats
path: root/etc
diff options
context:
space:
mode:
authorLibravatar pirate486743186 <okgomdjgbmoij@gmail.com>2021-05-31 20:44:46 +0200
committerLibravatar GitHub <noreply@github.com>2021-05-31 18:44:46 +0000
commitc3c52ef0a64cc04676a551d8bbb4d80a8ac61954 (patch)
tree64dba1165997a3858e9e2ed69f442fbc837d846d /etc
parent--debug takes precedence over --quiet (#2743) (diff)
downloadfirejail-c3c52ef0a64cc04676a551d8bbb4d80a8ac61954.tar.gz
firejail-c3c52ef0a64cc04676a551d8bbb4d80a8ac61954.tar.zst
firejail-c3c52ef0a64cc04676a551d8bbb4d80a8ac61954.zip
reorganizing links browsers (#4320)
* Create links-common.profile * Update links.profile * Create links2.profile * Update links.profile * Update links2.profile * Update elinks.profile * Update elinks.profile * links2 * Update firecfg.config * Update xlinks.profile * .xlinks * add dbus and whitelist-usr-share-common * .xlinks doesn't exist * revert * Create xlinks2 * xlinks2 * Update xlinks2 * Update xlinks.profile * no wayland * no wayland * doesn't use /tmp/.X11-unix * doesn't use /tmp/.X11-unix * noblacklist /tmp/.X11-unix * noblacklist /tmp/.X11-unix
Diffstat (limited to 'etc')
-rw-r--r--etc/inc/disable-programs.inc1
-rw-r--r--etc/profile-a-l/elinks.profile38
-rw-r--r--etc/profile-a-l/links-common.profile63
-rw-r--r--etc/profile-a-l/links.profile54
-rw-r--r--etc/profile-a-l/links2.profile18
-rw-r--r--etc/profile-m-z/xlinks.profile1
-rw-r--r--etc/profile-m-z/xlinks220
7 files changed, 111 insertions, 84 deletions
diff --git a/etc/inc/disable-programs.inc b/etc/inc/disable-programs.inc
index 518587957..18d1978fc 100644
--- a/etc/inc/disable-programs.inc
+++ b/etc/inc/disable-programs.inc
@@ -589,6 +589,7 @@ blacklist ${HOME}/.kodi
589blacklist ${HOME}/.librewolf 589blacklist ${HOME}/.librewolf
590blacklist ${HOME}/.lincity-ng 590blacklist ${HOME}/.lincity-ng
591blacklist ${HOME}/.links 591blacklist ${HOME}/.links
592blacklist ${HOME}/.links2
592blacklist ${HOME}/.linphone-history.db 593blacklist ${HOME}/.linphone-history.db
593blacklist ${HOME}/.linphonerc 594blacklist ${HOME}/.linphonerc
594blacklist ${HOME}/.lmmsrc.xml 595blacklist ${HOME}/.lmmsrc.xml
diff --git a/etc/profile-a-l/elinks.profile b/etc/profile-a-l/elinks.profile
index 8120725d2..5a29eb24b 100644
--- a/etc/profile-a-l/elinks.profile
+++ b/etc/profile-a-l/elinks.profile
@@ -1,6 +1,7 @@
1# Firejail profile for elinks 1# Firejail profile for elinks
2# Description: Advanced text-mode WWW browser 2# Description: Advanced text-mode WWW browser
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include elinks.local 6include elinks.local
6# Persistent global definitions 7# Persistent global definitions
@@ -8,37 +9,10 @@ include globals.local
8 9
9noblacklist ${HOME}/.elinks 10noblacklist ${HOME}/.elinks
10 11
11blacklist /tmp/.X11-unix 12mkdir ${HOME}/.elinks
12blacklist ${RUNUSER}/wayland-* 13whitelist ${HOME}/.elinks
13 14
14include disable-common.inc 15private-bin elinks
15include disable-devel.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20 16
21include whitelist-runuser-common.inc 17# Redirect
22 18include links-common.profile
23caps.drop all
24netfilter
25no3d
26nodvd
27nogroups
28noinput
29nonewprivs
30noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix,inet,inet6
36seccomp
37shell none
38tracelog
39
40# private-bin elinks
41private-cache
42private-dev
43# private-etc alternatives,ca-certificates,crypto-policies,pki,ssl
44private-tmp
diff --git a/etc/profile-a-l/links-common.profile b/etc/profile-a-l/links-common.profile
new file mode 100644
index 000000000..cd885b1d4
--- /dev/null
+++ b/etc/profile-a-l/links-common.profile
@@ -0,0 +1,63 @@
1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include links-common.local
4
5# common profile for links browsers
6
7blacklist /tmp/.X11-unix
8blacklist ${RUNUSER}/wayland-*
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15# Additional noblacklist files/directories (blacklisted in disable-programs.inc)
16# used as associated programs can be added in your links-common.local.
17include disable-programs.inc
18include disable-xdg.inc
19
20whitelist ${DOWNLOADS}
21include whitelist-runuser-common.inc
22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
24
25caps.drop all
26ipc-namespace
27# Add 'ignore machine-id' to your links-common.local if you want to restrict access to
28# the user-configured associated media player.
29machine-id
30netfilter
31# Add 'ignore no3d' to your links-common.local if you want to restrict access to
32# the user-configured associated media player.
33no3d
34nodvd
35nogroups
36noinput
37nonewprivs
38noroot
39# Add 'ignore nosound' to your links-common.local if you want to restrict access to
40# the user-configured associated media player.
41nosound
42notv
43nou2f
44novideo
45protocol unix,inet,inet6
46seccomp
47shell none
48tracelog
49
50disable-mnt
51# Add 'private-bin PROGRAM1,PROGRAM2' to your links-common.local if you want to use user-configured programs.
52private-bin sh
53private-cache
54private-dev
55private-etc alternatives,ca-certificates,crypto-policies,nsswitch.conf,pki,resolv.conf,ssl
56# Add the next line to your links-common.local to allow external media players.
57# private-etc alsa,asound.conf,machine-id,openal,pulse
58private-tmp
59
60dbus-user none
61dbus-system none
62
63memory-deny-write-execute
diff --git a/etc/profile-a-l/links.profile b/etc/profile-a-l/links.profile
index a1eeda14a..8ce39cc7f 100644
--- a/etc/profile-a-l/links.profile
+++ b/etc/profile-a-l/links.profile
@@ -9,58 +9,10 @@ include globals.local
9 9
10noblacklist ${HOME}/.links 10noblacklist ${HOME}/.links
11 11
12blacklist /tmp/.X11-unix
13blacklist ${RUNUSER}/wayland-*
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20# Additional noblacklist files/directories (blacklisted in disable-programs.inc)
21# used as associated programs can be added in your links.local.
22include disable-programs.inc
23include disable-xdg.inc
24
25mkdir ${HOME}/.links 12mkdir ${HOME}/.links
26whitelist ${HOME}/.links 13whitelist ${HOME}/.links
27whitelist ${DOWNLOADS}
28include whitelist-runuser-common.inc
29include whitelist-var-common.inc
30
31caps.drop all
32ipc-namespace
33# Add 'ignore machine-id' to your links.local if you want to restrict access to
34# the user-configured associated media player.
35machine-id
36netfilter
37# Add 'ignore no3d' to your links.local if you want to restrict access to
38# the user-configured associated media player.
39no3d
40nodvd
41nogroups
42noinput
43nonewprivs
44noroot
45# Add 'ignore nosound' to your links.local if you want to restrict access to
46# the user-configured associated media player.
47nosound
48notv
49nou2f
50novideo
51protocol unix,inet,inet6
52seccomp
53shell none
54tracelog
55 14
56disable-mnt 15private-bin links
57# Add 'private-bin PROGRAM1,PROGRAM2' to your links.local if you want to use user-configured programs.
58private-bin links,sh
59private-cache
60private-dev
61private-etc alternatives,ca-certificates,crypto-policies,nsswitch.conf,pki,resolv.conf,ssl
62# Add the next line to your links.local to allow external media players.
63# private-etc alsa,asound.conf,machine-id,openal,pulse
64private-tmp
65 16
66memory-deny-write-execute 17# Redirect
18include links-common.profile
diff --git a/etc/profile-a-l/links2.profile b/etc/profile-a-l/links2.profile
new file mode 100644
index 000000000..5f91dfcd2
--- /dev/null
+++ b/etc/profile-a-l/links2.profile
@@ -0,0 +1,18 @@
1# Firejail profile for links2
2# Description: Text WWW browser with a graphic version
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include links2.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${HOME}/.links2
11
12mkdir ${HOME}/.links2
13whitelist ${HOME}/.links2
14
15private-bin links2
16
17# Redirect
18include links-common.profile
diff --git a/etc/profile-m-z/xlinks.profile b/etc/profile-m-z/xlinks.profile
index 7987af280..d5e25cfe7 100644
--- a/etc/profile-m-z/xlinks.profile
+++ b/etc/profile-m-z/xlinks.profile
@@ -8,7 +8,6 @@ include xlinks.local
8#include globals.local 8#include globals.local
9 9
10noblacklist /tmp/.X11-unix 10noblacklist /tmp/.X11-unix
11noblacklist ${HOME}/.links
12 11
13include whitelist-common.inc 12include whitelist-common.inc
14 13
diff --git a/etc/profile-m-z/xlinks2 b/etc/profile-m-z/xlinks2
new file mode 100644
index 000000000..1ae6a60ca
--- /dev/null
+++ b/etc/profile-m-z/xlinks2
@@ -0,0 +1,20 @@
1# Firejail profile for xlinks2
2# Description: Text WWW browser (X11)
3# This file is overwritten after every install/update
4# Persistent local customizations
5include xlinks2.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10noblacklist /tmp/.X11-unix
11
12include whitelist-common.inc
13
14# if you want to use user-configured programs add 'private-bin PROGRAM1,PROGRAM2'
15# to your xlinks.local or append 'PROGRAM1,PROGRAM2' to this private-bin line
16private-bin xlinks2
17private-etc fonts
18
19# Redirect
20include links2.profile