aboutsummaryrefslogtreecommitdiffstats
path: root/etc/profile-a-l
diff options
context:
space:
mode:
Diffstat (limited to 'etc/profile-a-l')
-rw-r--r--etc/profile-a-l/1password.profile2
-rw-r--r--etc/profile-a-l/brave.profile4
-rw-r--r--etc/profile-a-l/cachy-browser.profile4
-rw-r--r--etc/profile-a-l/discord-ptb.profile14
-rw-r--r--etc/profile-a-l/firefox.profile4
-rw-r--r--etc/profile-a-l/gnome-calendar.profile2
-rw-r--r--etc/profile-a-l/krunner.profile6
-rw-r--r--etc/profile-a-l/librewolf.profile4
8 files changed, 20 insertions, 20 deletions
diff --git a/etc/profile-a-l/1password.profile b/etc/profile-a-l/1password.profile
index 690086099..63a04330b 100644
--- a/etc/profile-a-l/1password.profile
+++ b/etc/profile-a-l/1password.profile
@@ -13,7 +13,7 @@ whitelist ${HOME}/.config/1Password
13 13
14private-etc @tls-ca 14private-etc @tls-ca
15 15
16# Needed for keychain things, talking to Firefox, possibly other things? Not sure how to narrow down 16# Needed for keychain things, talking to Firefox, possibly other things?
17ignore dbus-user none 17ignore dbus-user none
18 18
19# Redirect 19# Redirect
diff --git a/etc/profile-a-l/brave.profile b/etc/profile-a-l/brave.profile
index 071a279b0..b3994c974 100644
--- a/etc/profile-a-l/brave.profile
+++ b/etc/profile-a-l/brave.profile
@@ -9,8 +9,8 @@ include globals.local
9# noexec /tmp is included in chromium-common.profile and breaks Brave 9# noexec /tmp is included in chromium-common.profile and breaks Brave
10ignore noexec /tmp 10ignore noexec /tmp
11# TOR is installed in ${HOME}. 11# TOR is installed in ${HOME}.
12# NOTE: chromium-common.profile enables apparmor. To keep that intact 12# Note: chromium-common.profile enables apparmor. To keep that intact,
13# you will need to uncomment the 'brave + tor' rule in /etc/apparmor.d/local/firejail-default. 13# uncomment the 'brave + tor' rule in /etc/apparmor.d/local/firejail-default.
14# Alternatively you can add 'ignore apparmor' to your brave.local. 14# Alternatively you can add 'ignore apparmor' to your brave.local.
15ignore noexec ${HOME} 15ignore noexec ${HOME}
16# Causes slow starts (#4604) 16# Causes slow starts (#4604)
diff --git a/etc/profile-a-l/cachy-browser.profile b/etc/profile-a-l/cachy-browser.profile
index 4b486913e..05e1a69f1 100644
--- a/etc/profile-a-l/cachy-browser.profile
+++ b/etc/profile-a-l/cachy-browser.profile
@@ -20,14 +20,14 @@ whitelist /usr/share/cachy-browser
20#whitelist ${HOME}/.mozilla 20#whitelist ${HOME}/.mozilla
21 21
22# To enable KeePassXC Plugin add one of the following lines to your cachy-browser.local. 22# To enable KeePassXC Plugin add one of the following lines to your cachy-browser.local.
23# NOTE: start KeePassXC before CachyBrowser and keep it open to allow communication between them. 23# Note: Start KeePassXC before CachyBrowser and keep it open to allow communication between them.
24#whitelist ${RUNUSER}/kpxc_server 24#whitelist ${RUNUSER}/kpxc_server
25#whitelist ${RUNUSER}/org.keepassxc.KeePassXC.BrowserServer 25#whitelist ${RUNUSER}/org.keepassxc.KeePassXC.BrowserServer
26 26
27# Add the next line to your cachy-browser.local to enable private-bin (Arch Linux). 27# Add the next line to your cachy-browser.local to enable private-bin (Arch Linux).
28#private-bin dbus-launch,dbus-send,cachy-browser,sh 28#private-bin dbus-launch,dbus-send,cachy-browser,sh
29# Add the next line to your cachy-browser.local to enable private-etc. 29# Add the next line to your cachy-browser.local to enable private-etc.
30# NOTE: private-etc must first be enabled in firefox-common.local. 30# Note: private-etc must first be enabled in firefox-common.local.
31#private-etc cachy-browser 31#private-etc cachy-browser
32 32
33dbus-user filter 33dbus-user filter
diff --git a/etc/profile-a-l/discord-ptb.profile b/etc/profile-a-l/discord-ptb.profile
index c39c0d843..265bf5615 100644
--- a/etc/profile-a-l/discord-ptb.profile
+++ b/etc/profile-a-l/discord-ptb.profile
@@ -1,17 +1,17 @@
1# Firejail profile for discord-ptb 1# Firejail profile for discord-ptb
2# This file is overwritten after every install/update 2# This file is overwritten after every install/update
3# Persistent local customizations 3# Persistent local customizations
4include discord-ptb.local 4include discord-ptb.local
5# Persistent global definitions 5# Persistent global definitions
6include globals.local 6include globals.local
7 7
8noblacklist ${HOME}/.config/discordptb 8noblacklist ${HOME}/.config/discordptb
9 9
10mkdir ${HOME}/.config/discordptb 10mkdir ${HOME}/.config/discordptb
11whitelist ${HOME}/.config/discordptb 11whitelist ${HOME}/.config/discordptb
12 12
13private-bin discord-ptb,DiscordPTB 13private-bin discord-ptb,DiscordPTB
14private-opt discord-ptb,DiscordPTB 14private-opt discord-ptb,DiscordPTB
15 15
16# Redirect 16# Redirect
17include discord-common.profile 17include discord-common.profile
diff --git a/etc/profile-a-l/firefox.profile b/etc/profile-a-l/firefox.profile
index c5fb15f74..659519ca8 100644
--- a/etc/profile-a-l/firefox.profile
+++ b/etc/profile-a-l/firefox.profile
@@ -6,7 +6,7 @@ include firefox.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# NOTE: sandboxing web browsers is as important as it is complex. Users might be 9# Note: Sandboxing web browsers is as important as it is complex. Users might be
10# interested in creating custom profiles depending on use case (e.g. one for 10# interested in creating custom profiles depending on use case (e.g. one for
11# general browsing, another for banking, ...). Consult our FAQ/issue tracker for more 11# general browsing, another for banking, ...). Consult our FAQ/issue tracker for more
12# info. Here are a few links to get you going. 12# info. Here are a few links to get you going.
@@ -30,7 +30,7 @@ whitelist ${HOME}/.cache/mozilla/firefox
30whitelist ${HOME}/.mozilla 30whitelist ${HOME}/.mozilla
31 31
32# Add one of the following whitelist options to your firefox.local to enable KeePassXC Plugin support. 32# Add one of the following whitelist options to your firefox.local to enable KeePassXC Plugin support.
33# NOTE: start KeePassXC before Firefox and keep it open to allow communication between them. 33# Note: Start KeePassXC before Firefox and keep it open to allow communication between them.
34#whitelist ${RUNUSER}/kpxc_server 34#whitelist ${RUNUSER}/kpxc_server
35#whitelist ${RUNUSER}/org.keepassxc.KeePassXC.BrowserServer 35#whitelist ${RUNUSER}/org.keepassxc.KeePassXC.BrowserServer
36 36
diff --git a/etc/profile-a-l/gnome-calendar.profile b/etc/profile-a-l/gnome-calendar.profile
index 70a302138..ddfe57879 100644
--- a/etc/profile-a-l/gnome-calendar.profile
+++ b/etc/profile-a-l/gnome-calendar.profile
@@ -53,7 +53,7 @@ dbus-user.talk ca.desrt.dconf
53dbus-user.talk org.gnome.evolution.dataserver.* 53dbus-user.talk org.gnome.evolution.dataserver.*
54#dbus-user.talk org.gnome.OnlineAccounts 54#dbus-user.talk org.gnome.OnlineAccounts
55#dbus-user.talk org.gnome.ControlCenter 55#dbus-user.talk org.gnome.ControlCenter
56# NOTE: dbus-system none fails, filter without rules works. 56# Note: dbus-system none fails, filter without rules works.
57dbus-system filter 57dbus-system filter
58#dbus-system.talk org.freedesktop.timedate1 58#dbus-system.talk org.freedesktop.timedate1
59#dbus-system.talk org.freedesktop.login1 59#dbus-system.talk org.freedesktop.login1
diff --git a/etc/profile-a-l/krunner.profile b/etc/profile-a-l/krunner.profile
index 27feccf40..a0244ef47 100644
--- a/etc/profile-a-l/krunner.profile
+++ b/etc/profile-a-l/krunner.profile
@@ -6,9 +6,9 @@ include krunner.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# - programs started in krunner run with this generic profile 9# Programs started in krunner run with this generic profile.
10# - when a file is opened in krunner, the file viewer runs in its own sandbox 10# When a file is opened in krunner, the file viewer runs in its own sandbox
11# with its own profile, if it is sandboxed automatically 11# with its own profile, if it is sandboxed automatically.
12 12
13# noblacklist ${HOME}/.cache/krunner 13# noblacklist ${HOME}/.cache/krunner
14# noblacklist ${HOME}/.cache/krunnerbookmarkrunnerfirefoxdbfile.sqlite* 14# noblacklist ${HOME}/.cache/krunnerbookmarkrunnerfirefoxdbfile.sqlite*
diff --git a/etc/profile-a-l/librewolf.profile b/etc/profile-a-l/librewolf.profile
index 7ddbda18c..65a4a3787 100644
--- a/etc/profile-a-l/librewolf.profile
+++ b/etc/profile-a-l/librewolf.profile
@@ -19,7 +19,7 @@ whitelist ${HOME}/.librewolf
19#whitelist ${HOME}/.mozilla 19#whitelist ${HOME}/.mozilla
20 20
21# To enable KeePassXC Plugin add one of the following lines to your librewolf.local. 21# To enable KeePassXC Plugin add one of the following lines to your librewolf.local.
22# NOTE: start KeePassXC before Librewolf and keep it open to allow communication between them. 22# Note: Start KeePassXC before Librewolf and keep it open to allow communication between them.
23#whitelist ${RUNUSER}/kpxc_server 23#whitelist ${RUNUSER}/kpxc_server
24#whitelist ${RUNUSER}/org.keepassxc.KeePassXC.BrowserServer 24#whitelist ${RUNUSER}/org.keepassxc.KeePassXC.BrowserServer
25 25
@@ -28,7 +28,7 @@ whitelist /usr/share/librewolf
28# Add the next line to your librewolf.local to enable private-bin (Arch Linux). 28# Add the next line to your librewolf.local to enable private-bin (Arch Linux).
29#private-bin dbus-launch,dbus-send,librewolf,sh 29#private-bin dbus-launch,dbus-send,librewolf,sh
30# Add the next line to your librewolf.local to enable private-etc. 30# Add the next line to your librewolf.local to enable private-etc.
31# NOTE: private-etc must first be enabled in firefox-common.local. 31# Note: private-etc must first be enabled in firefox-common.local.
32#private-etc librewolf 32#private-etc librewolf
33 33
34dbus-user filter 34dbus-user filter