summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--etc/Viber.profile38
-rw-r--r--etc/amule.profile33
-rw-r--r--etc/ardour5.profile36
-rw-r--r--etc/brackets.profile31
-rw-r--r--etc/calligra.profile37
-rw-r--r--etc/calligraauthor.profile5
-rw-r--r--etc/calligraconverter.profile5
-rw-r--r--etc/calligraflow.profile5
-rw-r--r--etc/calligraplan.profile5
-rw-r--r--etc/calligraplanwork.profile5
-rw-r--r--etc/calligrasheets.profile5
-rw-r--r--etc/calligrastage.profile5
-rw-r--r--etc/calligrawords.profile5
-rw-r--r--etc/cin.profile32
-rw-r--r--etc/fetchmail.profile31
-rw-r--r--etc/freecad.profile36
-rw-r--r--etc/freecadcmd.profile5
-rw-r--r--etc/google-earth.profile32
-rw-r--r--etc/imagej.profile34
-rw-r--r--etc/kdenlive.profile32
-rw-r--r--etc/linphone.profile22
-rw-r--r--etc/lmms.profile32
-rw-r--r--etc/macrofusion.profile28
-rw-r--r--etc/mpd.profile26
-rw-r--r--etc/natron.profile34
-rw-r--r--etc/ricochet.profile30
-rw-r--r--etc/shotcut.profile28
-rw-r--r--etc/tor-browser-en.profile41
-rw-r--r--etc/tor.profile38
-rw-r--r--etc/x-terminal-emulator.profile25
-rw-r--r--etc/zart.profile27
31 files changed, 748 insertions, 0 deletions
diff --git a/etc/Viber.profile b/etc/Viber.profile
new file mode 100644
index 000000000..5de92f36f
--- /dev/null
+++ b/etc/Viber.profile
@@ -0,0 +1,38 @@
1# Firejail profile for Viber
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/Viber.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8
9whitelist ${DOWNLOADS}
10whitelist ${HOME}/.ViberPC
11whitelist /dev/dri
12whitelist /dev/full
13whitelist /dev/null
14whitelist /dev/ptmx
15whitelist /dev/pts
16whitelist /dev/random
17whitelist /dev/shm
18whitelist /dev/snd
19whitelist /dev/tty
20whitelist /dev/urandom
21whitelist /dev/video0
22whitelist /dev/zero
23whitelist /opt/viber
24include /etc/firejail/whitelist-common.inc
25
26caps.drop all
27ipc-namespace
28nogroups
29noroot
30seccomp
31shell none
32
33private-bin sh,dig,awk
34private-etc hosts,fonts,mailcap,resolv.conf,X11,pulse,alternatives,localtime,nsswitch.conf,ssl,proxychains.conf
35private-tmp
36
37noexec ${HOME}
38noexec /tmp
diff --git a/etc/amule.profile b/etc/amule.profile
new file mode 100644
index 000000000..5cd6e613e
--- /dev/null
+++ b/etc/amule.profile
@@ -0,0 +1,33 @@
1# Firejail profile for amule
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/amule.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /boot
9blacklist /media
10blacklist /mnt
11blacklist /opt
12blacklist /usr/local/bin
13blacklist /usr/local/sbin
14
15whitelist ${DOWNLOADS}
16whitelist ${HOME}/.aMule
17whitelist ${HOME}/.gtkrc-2.0
18whitelist ${HOME}/.gtkrc.mine
19whitelist ${HOME}/.themes
20include /etc/firejail/whitelist-common.inc
21
22caps.drop all
23ipc-namespace
24nogroups
25nonewprivs
26noroot
27seccomp
28shell none
29
30private-bin amule
31private-dev
32private-etc fonts,hosts
33private-tmp
diff --git a/etc/ardour5.profile b/etc/ardour5.profile
new file mode 100644
index 000000000..f17c74e2b
--- /dev/null
+++ b/etc/ardour5.profile
@@ -0,0 +1,36 @@
1# Firejail profile for ardour5
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/ardour5.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /boot
9blacklist /media
10blacklist /mnt
11blacklist /opt
12blacklist /usr/local/bin
13
14whitelist ${DOWNLOADS}
15whitelist ${HOME}/.config/ardour4
16whitelist ${HOME}/.config/ardour5
17whitelist ${HOME}/.lv2
18whitelist ${HOME}/.vst
19whitelist ${HOME}/Documents
20include /etc/firejail/whitelist-common.inc
21
22caps.drop all
23ipc-namespace
24net none
25nogroups
26noroot
27seccomp
28shell none
29
30private-bin sh,ardour5,ardour5-copy-mixer,ardour5-export,ardour5-fix_bbtppq,grep,sed,ldd,nm
31private-dev
32private-etc pulse,X11,alternatives,ardour4,ardour5,fonts
33private-tmp
34
35noexec /home
36noexec /tmp
diff --git a/etc/brackets.profile b/etc/brackets.profile
new file mode 100644
index 000000000..3c7622435
--- /dev/null
+++ b/etc/brackets.profile
@@ -0,0 +1,31 @@
1# Firejail profile for brackets
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/brackets.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /boot
9blacklist /media
10blacklist /mnt
11
12whitelist ${DOWNLOADS}
13whitelist ${HOME}/.config/Brackets
14whitelist ${HOME}/.gtkrc-2.0
15whitelist ${HOME}/.themes
16whitelist ${HOME}/Documents
17whitelist /opt/brackets/
18whitelist /opt/google/
19whitelist /tmp/.X11-unix
20include /etc/firejail/whitelist-common.inc
21
22caps.drop all
23# Comment out or use --ignore=net if you want to install extensions or themes
24net none
25# Disable these if you use live preview (until I figure out a workaround)
26# Doing so should be relatively safe since there is no network access
27noroot
28seccomp
29
30private-bin bash,brackets,readlink,dirname,google-chrome,cat
31private-dev
diff --git a/etc/calligra.profile b/etc/calligra.profile
new file mode 100644
index 000000000..260097560
--- /dev/null
+++ b/etc/calligra.profile
@@ -0,0 +1,37 @@
1# Firejail profile for calligra
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/calligra.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /boot
9blacklist /media
10blacklist /mnt
11blacklist /opt
12
13whitelist ${DOWNLOADS}
14whitelist ${HOME}/.config/Trolltech.conf
15whitelist ${HOME}/.gtkrc-2.0
16whitelist ${HOME}/.kde
17whitelist ${HOME}/.themes
18whitelist ${HOME}/Documents
19whitelist /tmp/.X11-unix
20# DBus is forced to use an ordinary unix socket
21whitelist /tmp/dbus_session_socket
22include /etc/firejail/whitelist-common.inc
23
24caps.drop all
25ipc-namespace
26net none
27nogroups
28noroot
29seccomp
30shell none
31
32private-bin calligra,calligraauthor,calligraconverter,calligraflow,calligraplan,calligraplanwork,calligrasheets,calligrastage,calligrawords,dbus-launch
33private-dev
34private-etc fonts,passwd,alternatives,X11
35
36noexec /home
37noexec /tmp
diff --git a/etc/calligraauthor.profile b/etc/calligraauthor.profile
new file mode 100644
index 000000000..2b005c5c9
--- /dev/null
+++ b/etc/calligraauthor.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4
5include ${HOME}/.config/firejail/calligra.profile
diff --git a/etc/calligraconverter.profile b/etc/calligraconverter.profile
new file mode 100644
index 000000000..2b005c5c9
--- /dev/null
+++ b/etc/calligraconverter.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4
5include ${HOME}/.config/firejail/calligra.profile
diff --git a/etc/calligraflow.profile b/etc/calligraflow.profile
new file mode 100644
index 000000000..2b005c5c9
--- /dev/null
+++ b/etc/calligraflow.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4
5include ${HOME}/.config/firejail/calligra.profile
diff --git a/etc/calligraplan.profile b/etc/calligraplan.profile
new file mode 100644
index 000000000..2b005c5c9
--- /dev/null
+++ b/etc/calligraplan.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4
5include ${HOME}/.config/firejail/calligra.profile
diff --git a/etc/calligraplanwork.profile b/etc/calligraplanwork.profile
new file mode 100644
index 000000000..2b005c5c9
--- /dev/null
+++ b/etc/calligraplanwork.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4
5include ${HOME}/.config/firejail/calligra.profile
diff --git a/etc/calligrasheets.profile b/etc/calligrasheets.profile
new file mode 100644
index 000000000..2b005c5c9
--- /dev/null
+++ b/etc/calligrasheets.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4
5include ${HOME}/.config/firejail/calligra.profile
diff --git a/etc/calligrastage.profile b/etc/calligrastage.profile
new file mode 100644
index 000000000..2b005c5c9
--- /dev/null
+++ b/etc/calligrastage.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4
5include ${HOME}/.config/firejail/calligra.profile
diff --git a/etc/calligrawords.profile b/etc/calligrawords.profile
new file mode 100644
index 000000000..2b005c5c9
--- /dev/null
+++ b/etc/calligrawords.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for calligra
2# This file is overwritten after every install/update
3
4
5include ${HOME}/.config/firejail/calligra.profile
diff --git a/etc/cin.profile b/etc/cin.profile
new file mode 100644
index 000000000..3a8a4d8de
--- /dev/null
+++ b/etc/cin.profile
@@ -0,0 +1,32 @@
1# Firejail profile for cin
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/cin.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /boot
9blacklist /media
10blacklist /mnt
11blacklist /opt
12
13whitelist ${DOWNLOADS}
14whitelist ${HOME}/.bcast5
15whitelist ${HOME}/Videos
16whitelist /tmp/.X11-unix
17include /etc/firejail/whitelist-common.inc
18
19caps.drop all
20ipc-namespace
21net none
22nogroups
23noroot
24seccomp
25shell none
26
27private-bin cin
28private-dev
29private-etc fonts,pulse
30
31noexec /home
32noexec /tmp
diff --git a/etc/fetchmail.profile b/etc/fetchmail.profile
new file mode 100644
index 000000000..dc7f4abc3
--- /dev/null
+++ b/etc/fetchmail.profile
@@ -0,0 +1,31 @@
1# Firejail profile for fetchmail
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/fetchmail.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /boot
9blacklist /media
10blacklist /mnt
11blacklist /opt
12
13# Location of your fetchmailrc - I decrypt it into /tmp/fetchmailrc
14# whitelist ${HOME}/.fetchmailrc.gpg
15whitelist ${HOME}/.procmailrc.brown
16whitelist ${HOME}/.procmailrc.gmail
17whitelist ${HOME}/Mail
18whitelist ${HOME}/scripts/fetchmail-real.sh
19whitelist /tmp/fetchmailrc
20include /etc/firejail/whitelist-common.inc
21
22caps.drop all
23nogroups
24noroot
25nosound
26seccomp
27x11 none
28
29# private-bin fetchmail,procmail,bash,chmod
30private-dev
31# private-etc passwd,hosts,resolv.conf
diff --git a/etc/freecad.profile b/etc/freecad.profile
new file mode 100644
index 000000000..0467edb6d
--- /dev/null
+++ b/etc/freecad.profile
@@ -0,0 +1,36 @@
1# Firejail profile for freecad
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/freecad.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /boot
9blacklist /media
10blacklist /mnt
11blacklist /opt
12blacklist /usr/local/bin
13blacklist /usr/local/sbin
14
15whitelist ${DOWNLOADS}
16whitelist ${HOME}/.config/FreeCAD
17whitelist ${HOME}/Documents
18include /etc/firejail/whitelist-common.inc
19
20caps.drop all
21ipc-namespace
22net none
23nogroups
24noroot
25nosound
26protocol unix
27seccomp
28shell none
29
30private-bin freecad,freecadcmd
31private-dev
32private-etc fonts,passwd,alternatives,X11
33private-tmp
34
35noexec ${HOME}
36noexec /tmp
diff --git a/etc/freecadcmd.profile b/etc/freecadcmd.profile
new file mode 100644
index 000000000..41cfd3fab
--- /dev/null
+++ b/etc/freecadcmd.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for freecad
2# This file is overwritten after every install/update
3
4
5include ${HOME}/.config/firejail/freecad.profile
diff --git a/etc/google-earth.profile b/etc/google-earth.profile
new file mode 100644
index 000000000..a339402e2
--- /dev/null
+++ b/etc/google-earth.profile
@@ -0,0 +1,32 @@
1# Firejail profile for google-earth
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/google-earth.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /boot
9blacklist /media
10blacklist /mnt
11
12whitelist ${HOME}/.config/Google
13whitelist ${HOME}/.googleearth/Cache/
14whitelist ${HOME}/.googleearth/Temp/
15whitelist ${HOME}/.googleearth/myplaces.backup.kml
16whitelist ${HOME}/.googleearth/myplaces.kml
17whitelist /tmp/.X11-unix
18include /etc/firejail/whitelist-common.inc
19
20caps.drop all
21ipc-namespace
22nogroups
23noroot
24seccomp
25shell none
26
27private-bin google-earth,sh,grep,sed,ls,dirname
28private-dev
29private-etc fonts,resolv.conf,X11,alternatives,pulse
30
31noexec /home
32noexec /tmp
diff --git a/etc/imagej.profile b/etc/imagej.profile
new file mode 100644
index 000000000..4404cc9a2
--- /dev/null
+++ b/etc/imagej.profile
@@ -0,0 +1,34 @@
1# Firejail profile for imagej
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/imagej.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /boot
9blacklist /media
10blacklist /mnt
11blacklist /opt
12blacklist /usr/local/bin
13blacklist /usr/local/sbin
14
15whitelist ${DOWNLOADS}
16whitelist ${HOME}/.gtkrc-2.0
17whitelist ${HOME}/.gtkrc.mine
18whitelist ${HOME}/.imagej
19whitelist ${HOME}/.themes
20whitelist ${HOME}/Pictures
21include /etc/firejail/whitelist-common.inc
22
23caps.drop all
24ipc-namespace
25net none
26nogroups
27nonewprivs
28noroot
29seccomp
30
31private-bin imagej,bash,grep,sort,tail,tr,cut,whoami,hostname,uname,mkdir,ls,touch,free,awk,update-java-alternatives,basename,xprop,rm,ln
32private-dev
33# private-etc passwd,alternatives,hosts,fonts,X11
34private-tmp
diff --git a/etc/kdenlive.profile b/etc/kdenlive.profile
new file mode 100644
index 000000000..b982bd045
--- /dev/null
+++ b/etc/kdenlive.profile
@@ -0,0 +1,32 @@
1# Firejail profile for kdenlive
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/kdenlive.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /boot
9blacklist /media
10blacklist /mnt
11blacklist /opt
12
13# Apparently these break kdenlive for some people - they work for me though?
14# whitelist ${DOWNLOADS}
15# whitelist ${HOME}/.config/
16# whitelist ${HOME}/Videos
17# whitelist ${HOME}/kdenlive
18whitelist /tmp/.X11-unix
19# DBus is forced to use an ordinary unix socket
20whitelist /tmp/dbus_session_socket
21include /etc/firejail/whitelist-common.inc
22
23caps.drop all
24net none
25nogroups
26noroot
27seccomp
28shell none
29
30private-bin kdenlive,kdenlive_render,dbus-launch,melt,ffmpeg,ffplay,ffprobe,dvdauthor,genisoimage,vlc,xine,kdeinit5,kshell5,kdeinit5_shutdown,kdeinit5_wrapper,kdeinit4,kshell4,kdeinit4_shutdown,kdeinit4_wrapper
31private-dev
32private-etc fonts,alternatives,X11,pulse,passwd
diff --git a/etc/linphone.profile b/etc/linphone.profile
new file mode 100644
index 000000000..850fcb320
--- /dev/null
+++ b/etc/linphone.profile
@@ -0,0 +1,22 @@
1# Firejail profile for linphone
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/linphone.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /boot
9blacklist /media
10blacklist /mnt
11blacklist /opt
12
13whitelist ${HOME}/.gtkrc-2.0
14whitelist ${HOME}/.gtkrc.mine
15whitelist ${HOME}/.linphone-history.db
16whitelist ${HOME}/.linphonerc
17whitelist ${HOME}/Downloads
18include /etc/firejail/whitelist-common.inc
19
20caps.drop all
21noroot
22seccomp
diff --git a/etc/lmms.profile b/etc/lmms.profile
new file mode 100644
index 000000000..8ac039cc0
--- /dev/null
+++ b/etc/lmms.profile
@@ -0,0 +1,32 @@
1# Firejail profile for lmms
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/lmms.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /boot
9blacklist /media
10blacklist /mnt
11blacklist /opt
12
13whitelist ${DOWNLOADS}
14whitelist ${HOME}/.lmmsrc.xml
15whitelist ${HOME}/Music
16whitelist ${HOME}/lmms
17whitelist /tmp/.X11-unix
18include /etc/firejail/whitelist-common.inc
19
20caps.drop all
21ipc-namespace
22net none
23nogroups
24noroot
25seccomp
26shell none
27
28private-dev
29private-etc fonts,pulse
30
31noexec /home
32noexec /tmp
diff --git a/etc/macrofusion.profile b/etc/macrofusion.profile
new file mode 100644
index 000000000..287a5ea85
--- /dev/null
+++ b/etc/macrofusion.profile
@@ -0,0 +1,28 @@
1# Firejail profile for macrofusion
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/macrofusion.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8
9whitelist ${DOWNLOADS}
10whitelist ${HOME}/.config/gtk-3.0
11whitelist ${HOME}/.config/mfusion
12whitelist ${HOME}/.themes
13whitelist ${HOME}/Pictures
14include /etc/firejail/whitelist-common.inc
15
16caps.drop all
17ipc-namespace
18net none
19nogroups
20nonewprivs
21noroot
22seccomp
23shell none
24
25private-bin python3,macrofusion,env,enfuse,exiftool,align_image_stack
26private-dev
27private-etc fonts
28private-tmp
diff --git a/etc/mpd.profile b/etc/mpd.profile
new file mode 100644
index 000000000..44baab7e9
--- /dev/null
+++ b/etc/mpd.profile
@@ -0,0 +1,26 @@
1# Firejail profile for mpd
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/mpd.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /boot
9blacklist /media
10blacklist /mnt
11blacklist /opt
12
13whitelist ${HOME}/.config/pulse/
14whitelist ${HOME}/.mpdconf
15whitelist ${HOME}/.pulse/
16whitelist ${HOME}/Music
17whitelist ${HOME}/mpd
18include /etc/firejail/whitelist-common.inc
19
20caps.drop all
21noroot
22seccomp
23
24private-bin mpd,bash
25private-dev
26read-only ${HOME}/Music/
diff --git a/etc/natron.profile b/etc/natron.profile
new file mode 100644
index 000000000..6101d1331
--- /dev/null
+++ b/etc/natron.profile
@@ -0,0 +1,34 @@
1# Firejail profile for natron
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/natron.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8# Contributed by triceratops1 (https://github.com/triceratops1)
9
10blacklist /boot
11blacklist /media
12blacklist /mnt
13blacklist /usr/local/bin
14blacklist /usr/local/sbin
15
16whitelist ${DOWNLOADS}
17whitelist ${HOME}/.Natron
18whitelist ${HOME}/.cache/INRIA/Natron/
19whitelist ${HOME}/.config/INRIA/
20whitelist ${HOME}/.gtkrc-2.0
21whitelist ${HOME}/.themes
22whitelist ${HOME}/Videos
23whitelist /opt/natron/
24whitelist /tmp/.X11-unix/
25include /etc/firejail/whitelist-common.inc
26
27ipc-namespace
28shell none
29
30private-bin natron
31private-etc fonts,X11,pulse
32
33noexec ${HOME}
34noexec /tmp
diff --git a/etc/ricochet.profile b/etc/ricochet.profile
new file mode 100644
index 000000000..47b16b30e
--- /dev/null
+++ b/etc/ricochet.profile
@@ -0,0 +1,30 @@
1# Firejail profile for ricochet
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/ricochet.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /boot
9blacklist /media
10blacklist /mnt
11blacklist /opt
12
13whitelist ${DOWNLOADS}
14whitelist ${HOME}/.local/share/Ricochet
15whitelist /tmp/.X11-unix
16include /etc/firejail/whitelist-common.inc
17
18caps.drop all
19ipc-namespace
20nogroups
21noroot
22seccomp
23shell none
24
25private-bin ricochet,tor
26private-dev
27private-etc fonts,tor,X11,alternatives
28
29noexec /home
30noexec /tmp
diff --git a/etc/shotcut.profile b/etc/shotcut.profile
new file mode 100644
index 000000000..2bf3cc2e0
--- /dev/null
+++ b/etc/shotcut.profile
@@ -0,0 +1,28 @@
1# Firejail profile for shotcut
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/shotcut.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /usr/local/bin
9
10whitelist ${DOWNLOADS}
11whitelist ${HOME}/.config/Meltytech
12whitelist ${HOME}/Videos
13whitelist /tmp/.X11-unix
14include /etc/firejail/whitelist-common.inc
15
16caps.drop all
17net none
18nogroups
19noroot
20seccomp
21shell none
22
23private-bin shotcut,melt,qmelt,nice
24private-dev
25private-etc X11,alternatives,pulse,fonts
26
27noexec ${HOME}
28noexec /tmp
diff --git a/etc/tor-browser-en.profile b/etc/tor-browser-en.profile
new file mode 100644
index 000000000..1f0b61c75
--- /dev/null
+++ b/etc/tor-browser-en.profile
@@ -0,0 +1,41 @@
1# Firejail profile for tor-browser-en
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/tor-browser-en.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8blacklist /boot
9blacklist /media
10blacklist /mnt
11blacklist /opt
12blacklist /usr/local/bin
13blacklist /var
14
15whitelist ${HOME}/.tor-browser-en
16whitelist /dev/dri
17whitelist /dev/full
18whitelist /dev/null
19whitelist /dev/ptmx
20whitelist /dev/pts
21whitelist /dev/random
22whitelist /dev/shm
23whitelist /dev/snd
24whitelist /dev/tty
25whitelist /dev/urandom
26whitelist /dev/video0
27whitelist /dev/zero
28include /etc/firejail/whitelist-common.inc
29
30caps.drop all
31noroot
32seccomp
33shell none
34
35private-bin bash,grep,sed,tail,tor-browser-en,env,id,readlink,dirname,test,mkdir,ln,sed,cp,rm,getconf,file,expr
36# FIXME: Spoof D-Bus machine id (tor-browser segfaults when it is missing!)
37# https://github.com/netblue30/firejail/issues/955
38private-etc X11,pulse,machine-id
39private-tmp
40
41noexec /tmp
diff --git a/etc/tor.profile b/etc/tor.profile
new file mode 100644
index 000000000..2e2172cad
--- /dev/null
+++ b/etc/tor.profile
@@ -0,0 +1,38 @@
1# Firejail profile for tor
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/tor.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8# How to use:
9# Create a script called anything (e.g. mytor)
10# with the following contents:
11# #!/bin/bash
12# TORCMD="tor --defaults-torrc /usr/share/tor/tor-service-defaults-torrc -f /etc/tor/torrc --RunAsDaemon 1"
13# sudo -b daemon -f -d -- firejail --profile=/home/<username>/.config/firejail/tor.profile $TORCMD
14
15# You'll also likely want to disable the system service (if it exists)
16# Run mytor (or whatever you called the script above) whenever you want to start tor
17
18blacklist /boot
19blacklist /media
20blacklist /mnt
21blacklist /opt
22
23caps.keep setuid,setgid,net_bind_service,dac_read_search
24ipc-namespace
25no3d
26nogroups
27nonewprivs
28nosound
29seccomp
30shell none
31writable-var
32x11 none
33
34private
35private-bin tor,bash
36private-dev
37private-etc tor,passwd
38private-tmp
diff --git a/etc/x-terminal-emulator.profile b/etc/x-terminal-emulator.profile
new file mode 100644
index 000000000..eb4c58480
--- /dev/null
+++ b/etc/x-terminal-emulator.profile
@@ -0,0 +1,25 @@
1# Firejail profile for x-terminal-emulator
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/x-terminal-emulator.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8
9whitelist /tmp/.X11-unix/X470
10whitelist /tmp/fcitx-socket-:0
11whitelist /tmp/user/1000/
12include /etc/firejail/whitelist-common.inc
13
14caps.drop all
15env DISPLAY=:470
16ipc-namespace
17net none
18netfilter
19nogroups
20noroot
21seccomp
22
23private-dev
24
25noexec /tmp
diff --git a/etc/zart.profile b/etc/zart.profile
new file mode 100644
index 000000000..654679174
--- /dev/null
+++ b/etc/zart.profile
@@ -0,0 +1,27 @@
1# Firejail profile for zart
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/zart.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8# Contributed by triceratops1 (https://github.com/triceratops1)
9
10whitelist ${DOWNLOADS}
11whitelist ${HOME}/Videos
12whitelist /tmp/.X11-unix
13include /etc/firejail/whitelist-common.inc
14
15caps.drop all
16ipc-namespace
17net none
18noroot
19seccomp
20shell none
21
22private-bin zart,ffmpeg,melt,ffprobe,ffplay
23private-dev
24private-etc fonts,X11
25
26noexec ${HOME}
27noexec /tmp