aboutsummaryrefslogtreecommitdiffstats
path: root/etc/profile-a-l/caja.profile
diff options
context:
space:
mode:
Diffstat (limited to 'etc/profile-a-l/caja.profile')
-rw-r--r--etc/profile-a-l/caja.profile34
1 files changed, 3 insertions, 31 deletions
diff --git a/etc/profile-a-l/caja.profile b/etc/profile-a-l/caja.profile
index 7bf901ae3..1af102ca8 100644
--- a/etc/profile-a-l/caja.profile
+++ b/etc/profile-a-l/caja.profile
@@ -9,35 +9,7 @@ include globals.local
9# Caja is started by systemd on most systems. Therefore it is not firejailed by default. Since there 9# Caja is started by systemd on most systems. Therefore it is not firejailed by default. Since there
10# is already a caja process running on MATE desktops firejail will have no effect. 10# is already a caja process running on MATE desktops firejail will have no effect.
11 11
12noblacklist ${HOME}/.local/share/Trash 12# Put 'ignore noroot' in your caja.local if you use MPV+Vulkan (see issue #3012)
13# noblacklist ${HOME}/.config/caja - disable-programs.inc is disabled, see below
14# noblacklist ${HOME}/.local/share/caja-python
15 13
16# Allow python (blacklisted by disable-interpreters.inc) 14# Redirect
17include allow-python2.inc 15include file-manager-common.profile
18include allow-python3.inc
19
20include disable-common.inc
21include disable-devel.inc
22include disable-interpreters.inc
23include disable-passwdmgr.inc
24# include disable-programs.inc
25
26allusers
27caps.drop all
28netfilter
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34novideo
35protocol unix
36seccomp
37shell none
38tracelog
39
40# caja needs to be able to start arbitrary applications so we cannot blacklist their files
41# private-bin caja
42# private-dev
43# private-tmp