aboutsummaryrefslogtreecommitdiffstats
path: root/etc/profile-a-l
diff options
context:
space:
mode:
Diffstat (limited to 'etc/profile-a-l')
-rw-r--r--etc/profile-a-l/7z.profile41
-rw-r--r--etc/profile-a-l/alacarte.profile64
-rw-r--r--etc/profile-a-l/ar.profile40
-rw-r--r--etc/profile-a-l/atom.profile32
-rw-r--r--etc/profile-a-l/atool.profile37
-rw-r--r--etc/profile-a-l/authenticator-rs.profile55
-rw-r--r--etc/profile-a-l/balsa.profile2
-rw-r--r--etc/profile-a-l/beaker.profile21
-rw-r--r--etc/profile-a-l/brave.profile4
-rw-r--r--etc/profile-a-l/bsdtar.profile39
-rw-r--r--etc/profile-a-l/celluloid.profile2
-rw-r--r--etc/profile-a-l/chromium-common.profile1
-rw-r--r--etc/profile-a-l/chromium.profile1
-rw-r--r--etc/profile-a-l/com.github.bleakgrey.tootle.profile55
-rw-r--r--etc/profile-a-l/cower.profile1
-rw-r--r--etc/profile-a-l/cpio.profile35
-rw-r--r--etc/profile-a-l/curl.profile7
-rw-r--r--etc/profile-a-l/default.profile5
-rw-r--r--etc/profile-a-l/devhelp.profile1
-rw-r--r--etc/profile-a-l/devilspie.profile1
-rw-r--r--etc/profile-a-l/dig.profile1
-rw-r--r--etc/profile-a-l/discord-common.profile37
-rw-r--r--etc/profile-a-l/dolphin-emu.profile63
-rw-r--r--etc/profile-a-l/drill.profile55
-rw-r--r--etc/profile-a-l/electron.profile28
-rw-r--r--etc/profile-a-l/element-desktop.profile8
-rw-r--r--etc/profile-a-l/falkon.profile15
-rw-r--r--etc/profile-a-l/feh.profile1
-rw-r--r--etc/profile-a-l/file.profile1
-rw-r--r--etc/profile-a-l/firefox.profile2
-rw-r--r--etc/profile-a-l/fractal.profile4
-rw-r--r--etc/profile-a-l/freeoffice-planmaker.profile2
-rw-r--r--etc/profile-a-l/freeoffice-presentations.profile2
-rw-r--r--etc/profile-a-l/freeoffice-textmaker.profile2
-rw-r--r--etc/profile-a-l/freetube.profile13
-rw-r--r--etc/profile-a-l/geekbench.profile1
-rw-r--r--etc/profile-a-l/ghostwriter.profile2
-rw-r--r--etc/profile-a-l/gimp.profile2
-rw-r--r--etc/profile-a-l/github-desktop.profile46
-rw-r--r--etc/profile-a-l/gnome-system-log.profile3
-rw-r--r--etc/profile-a-l/godot.profile2
-rw-r--r--etc/profile-a-l/gtk-straw-viewer.profile14
-rw-r--r--etc/profile-a-l/gtk-youtube-viewer.profile (renamed from etc/profile-a-l/gtk-youtube-viewer)10
-rw-r--r--etc/profile-a-l/gtk2-youtube-viewer.profile (renamed from etc/profile-a-l/gtk2-youtube-viewer)7
-rw-r--r--etc/profile-a-l/gtk3-youtube-viewer.profile (renamed from etc/profile-a-l/gtk3-youtube-viewer)7
-rw-r--r--etc/profile-a-l/gzip.profile38
-rw-r--r--etc/profile-a-l/highlight.profile1
-rw-r--r--etc/profile-a-l/homebank.profile2
-rw-r--r--etc/profile-a-l/jitsi-meet-desktop.profile22
-rw-r--r--etc/profile-a-l/kazam.profile8
-rw-r--r--etc/profile-a-l/keepassxc.profile7
-rw-r--r--etc/profile-a-l/kube.profile2
-rw-r--r--etc/profile-a-l/less.profile1
-rw-r--r--etc/profile-a-l/librewolf.profile28
-rw-r--r--etc/profile-a-l/links.profile1
-rw-r--r--etc/profile-a-l/lutris.profile74
-rw-r--r--etc/profile-a-l/lynx.profile1
-rw-r--r--etc/profile-a-l/lyx.profile2
58 files changed, 569 insertions, 390 deletions
diff --git a/etc/profile-a-l/7z.profile b/etc/profile-a-l/7z.profile
index 02a2e7ea0..5e1c17b28 100644
--- a/etc/profile-a-l/7z.profile
+++ b/etc/profile-a-l/7z.profile
@@ -7,41 +7,6 @@ include 7z.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-* 10noblacklist ${PATH}/bash
11 11noblacklist ${PATH}/sh
12include disable-common.inc 12include archiver-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19apparmor
20caps.drop all
21hostname 7z
22ipc-namespace
23machine-id
24net none
25no3d
26nodvd
27#nogroups
28nonewprivs
29#noroot
30nosound
31notv
32nou2f
33novideo
34protocol unix
35seccomp
36shell none
37tracelog
38x11 none
39
40#private-bin 7z,7z*,p7zip
41private-cache
42private-dev
43
44dbus-user none
45dbus-system none
46
47memory-deny-write-execute
diff --git a/etc/profile-a-l/alacarte.profile b/etc/profile-a-l/alacarte.profile
new file mode 100644
index 000000000..98188d2a7
--- /dev/null
+++ b/etc/profile-a-l/alacarte.profile
@@ -0,0 +1,64 @@
1# Firejail profile for alacarte
2# Description: Create desktop and menu launchers easily
3# This file is overwritten after every install/update
4# Persistent local customizations
5include alacarte.local
6# Persistent global definitions
7include globals.local
8
9include allow-python2.inc
10include allow-python3.inc
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-programs.inc
17include disable-passwdmgr.inc
18include disable-xdg.inc
19
20# Whitelist your system icon directory,varies by distro
21whitelist /usr/share/alacarte
22whitelist /usr/share/app-info
23whitelist /usr/share/desktop-directories
24whitelist /usr/share/icons
25whitelist /var/lib/app-info/icons
26whitelist /var/lib/flatpak/exports/share/applications
27whitelist /var/lib/flatpak/exports/share/icons
28include whitelist-runuser-common.inc
29include whitelist-usr-share-common.inc
30include whitelist-var-common.inc
31
32apparmor
33caps.drop all
34machine-id
35net none
36nodvd
37no3d
38nogroups
39nonewprivs
40noroot
41nosound
42notv
43nou2f
44novideo
45protocol unix
46seccomp
47seccomp.block-secondary
48shell none
49tracelog
50
51disable-mnt
52# private-bin alacarte,bash,python*,sh
53private-cache
54private-dev
55private-etc alternatives,dconf,fonts,gtk-3.0,locale.alias,locale.conf,login.defs,mime.types,nsswitch.conf,passwd,pki,X11,xdg
56private-tmp
57
58dbus-user none
59dbus-system none
60
61read-write ${HOME}/.config/menus
62read-write ${HOME}/.gnome/apps
63read-write ${HOME}/.local/share/applications
64read-write ${HOME}/.local/share/flatpak/exports
diff --git a/etc/profile-a-l/ar.profile b/etc/profile-a-l/ar.profile
index 183587ff8..c2b215807 100644
--- a/etc/profile-a-l/ar.profile
+++ b/etc/profile-a-l/ar.profile
@@ -7,42 +7,4 @@ include ar.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-* 10include archiver-common.inc
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-shell.inc
19
20apparmor
21caps.drop all
22hostname ar
23ipc-namespace
24machine-id
25net none
26no3d
27nodvd
28nogroups
29nonewprivs
30#noroot
31nosound
32notv
33nou2f
34novideo
35protocol unix
36seccomp
37shell none
38tracelog
39x11 none
40
41private-bin ar
42private-cache
43private-dev
44
45dbus-user none
46dbus-system none
47
48memory-deny-write-execute
diff --git a/etc/profile-a-l/atom.profile b/etc/profile-a-l/atom.profile
index cf0a5a42b..f21a5febf 100644
--- a/etc/profile-a-l/atom.profile
+++ b/etc/profile-a-l/atom.profile
@@ -6,31 +6,27 @@ include atom.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# Disabled until someone reported positive feedback
10ignore include disable-devel.inc
11ignore include disable-interpreters.inc
12ignore include disable-xdg.inc
13ignore whitelist ${DOWNLOADS}
14ignore include whitelist-common.inc
15ignore include whitelist-runuser-common.inc
16ignore include whitelist-usr-share-common.inc
17ignore include whitelist-var-common.inc
18ignore apparmor
19ignore disable-mnt
20
9noblacklist ${HOME}/.atom 21noblacklist ${HOME}/.atom
10noblacklist ${HOME}/.config/Atom 22noblacklist ${HOME}/.config/Atom
11 23
12# Allows files commonly used by IDEs 24# Allows files commonly used by IDEs
13include allow-common-devel.inc 25include allow-common-devel.inc
14 26
15include disable-common.inc
16include disable-exec.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20caps.keep sys_admin,sys_chroot
21# net none 27# net none
22netfilter 28netfilter
23nodvd
24nogroups
25nosound 29nosound
26notv
27nou2f
28novideo
29shell none
30
31private-cache
32private-dev
33private-tmp
34 30
35dbus-user none 31# Redirect
36dbus-system none 32include electron.profile
diff --git a/etc/profile-a-l/atool.profile b/etc/profile-a-l/atool.profile
index e501e956c..34af47df2 100644
--- a/etc/profile-a-l/atool.profile
+++ b/etc/profile-a-l/atool.profile
@@ -7,47 +7,12 @@ include atool.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
12# Allow perl (blacklisted by disable-interpreters.inc) 10# Allow perl (blacklisted by disable-interpreters.inc)
13include allow-perl.inc 11include allow-perl.inc
12include archiver-common.inc
14 13
15include disable-common.inc
16# include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22apparmor
23caps.drop all
24hostname atool
25ipc-namespace
26machine-id
27net none
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot 14noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40tracelog
41x11 none
42 15
43# private-bin atool,perl
44private-cache
45private-dev
46# without login.defs atool complains and uses UID/GID 1000 by default 16# without login.defs atool complains and uses UID/GID 1000 by default
47private-etc alternatives,group,login.defs,passwd 17private-etc alternatives,group,login.defs,passwd
48private-tmp 18private-tmp
49
50dbus-user none
51dbus-system none
52
53memory-deny-write-execute
diff --git a/etc/profile-a-l/authenticator-rs.profile b/etc/profile-a-l/authenticator-rs.profile
new file mode 100644
index 000000000..fb12018f5
--- /dev/null
+++ b/etc/profile-a-l/authenticator-rs.profile
@@ -0,0 +1,55 @@
1# Firejail profile for authenticator-rs
2# Description: Rust based 2FA authentication program
3# This file is overwritten after every install/update
4# Persistent local customizations
5include authenticator-rs.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/authenticator-rs
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-shell.inc
18include disable-xdg.inc
19
20mkdir ${HOME}/.local/share/authenticator-rs
21whitelist ${HOME}/.local/share/authenticator-rs
22whitelist ${DOWNLOADS}
23whitelist /usr/share/uk.co.grumlimited.authenticator-rs
24include whitelist-common.inc
25include whitelist-runuser-common.inc
26include whitelist-usr-share-common.inc
27include whitelist-var-common.inc
28
29apparmor
30caps.drop all
31netfilter
32no3d
33nodvd
34nogroups
35nonewprivs
36noroot
37nosound
38notv
39nou2f
40novideo
41protocol unix,inet,inet6
42seccomp
43shell none
44tracelog
45
46disable-mnt
47private-bin authenticator-rs
48private-cache
49private-dev
50private-etc alternatives,ca-certificates,crypto-policies,dconf,fonts,gtk-2.0,gtk-3.0,pki,resolv.conf,ssl,xdg
51private-tmp
52
53dbus-user filter
54dbus-user.talk ca.desrt.dconf
55dbus-system none
diff --git a/etc/profile-a-l/balsa.profile b/etc/profile-a-l/balsa.profile
index a401ac592..cda6b1aa0 100644
--- a/etc/profile-a-l/balsa.profile
+++ b/etc/profile-a-l/balsa.profile
@@ -58,7 +58,7 @@ shell none
58tracelog 58tracelog
59 59
60# disable-mnt 60# disable-mnt
61# Add "gpg,gpg2,gpg-agent,pinentry-curses,pinentry-emacs,pinentry-fltk,pinentry-gnome3,pinentry-gtk,pinentry-gtk2,pinentry-gtk-2,pinentry-qt,pinentry-qt4,pinentry-tty,pinentry-x2go,pinentry-kwallet" for gpg 61# Add "gpg,gpg2,gpg-agent,pinentry-curses,pinentry-emacs,pinentry-fltk,pinentry-gnome3,pinentry-gtk,pinentry-gtk2,pinentry-gtk-2,pinentry-qt,pinentry-qt4,pinentry-tty,pinentry-x2go,pinentry-kwallet" for gpg
62# Add "ignore private-bin" for hyperlinks or have a look at the private-bins in firefox.profile and firefox-common.profile. 62# Add "ignore private-bin" for hyperlinks or have a look at the private-bins in firefox.profile and firefox-common.profile.
63private-bin balsa,balsa-ab 63private-bin balsa,balsa-ab
64private-cache 64private-cache
diff --git a/etc/profile-a-l/beaker.profile b/etc/profile-a-l/beaker.profile
index cc1886a49..f3a9568bd 100644
--- a/etc/profile-a-l/beaker.profile
+++ b/etc/profile-a-l/beaker.profile
@@ -3,17 +3,26 @@
3# Persistent local customizations 3# Persistent local customizations
4include beaker.local 4include beaker.local
5# Persistent global definitions 5# Persistent global definitions
6# added by included profile 6include globals.local
7#include globals.local
8 7
9noblacklist ${HOME}/.config/Beaker Browser 8# Disabled until someone reported positive feedback
9ignore include disable-exec.inc
10ignore include disable-xdg.inc
11ignore include whitelist-runuser-common.inc
12ignore include whitelist-usr-share-common.inc
13ignore include whitelist-var-common.inc
14ignore nou2f
15ignore novideo
16ignore shell none
17ignore disable-mnt
18ignore private-cache
19ignore private-dev
20ignore private-tmp
10 21
11include disable-devel.inc 22noblacklist ${HOME}/.config/Beaker Browser
12include disable-interpreters.inc
13 23
14mkdir ${HOME}/.config/Beaker Browser 24mkdir ${HOME}/.config/Beaker Browser
15whitelist ${HOME}/.config/Beaker Browser 25whitelist ${HOME}/.config/Beaker Browser
16include whitelist-common.inc
17 26
18# Redirect 27# Redirect
19include electron.profile 28include electron.profile
diff --git a/etc/profile-a-l/brave.profile b/etc/profile-a-l/brave.profile
index 904d3e94f..5a5e9eacd 100644
--- a/etc/profile-a-l/brave.profile
+++ b/etc/profile-a-l/brave.profile
@@ -10,10 +10,6 @@ include globals.local
10ignore noexec /tmp 10ignore noexec /tmp
11# TOR is installed in ${HOME} 11# TOR is installed in ${HOME}
12ignore noexec ${HOME} 12ignore noexec ${HOME}
13# Disable for now, see https://github.com/netblue30/firejail/pull/3688#issuecomment-718711565
14ignore whitelist /usr/share/chromium
15ignore include whitelist-runuser-common.inc
16ignore include whitelist-usr-share-common.inc
17 13
18noblacklist ${HOME}/.cache/BraveSoftware 14noblacklist ${HOME}/.cache/BraveSoftware
19noblacklist ${HOME}/.config/BraveSoftware 15noblacklist ${HOME}/.config/BraveSoftware
diff --git a/etc/profile-a-l/bsdtar.profile b/etc/profile-a-l/bsdtar.profile
index 08e51f3c1..c37f4071e 100644
--- a/etc/profile-a-l/bsdtar.profile
+++ b/etc/profile-a-l/bsdtar.profile
@@ -6,43 +6,6 @@ include bsdtar.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist ${RUNUSER}/wayland-* 9include archiver-common.inc
10 10
11include disable-common.inc
12# include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17
18apparmor
19caps.drop all
20hostname bsdtar
21ipc-namespace
22machine-id
23net none
24no3d
25nodvd
26nogroups
27nonewprivs
28# noroot
29nosound
30notv
31nou2f
32novideo
33protocol unix
34seccomp
35shell none
36tracelog
37x11 none
38
39# support compressed archives
40private-bin bash,bsdcat,bsdcpio,bsdtar,bzip2,compress,gtar,gzip,lbzip2,libarchive,lz4,lzip,lzma,lzop,sh,xz
41private-cache
42private-dev
43private-etc alternatives,group,localtime,passwd 11private-etc alternatives,group,localtime,passwd
44
45dbus-user none
46dbus-system none
47
48memory-deny-write-execute
diff --git a/etc/profile-a-l/celluloid.profile b/etc/profile-a-l/celluloid.profile
index 56709a466..d379651c7 100644
--- a/etc/profile-a-l/celluloid.profile
+++ b/etc/profile-a-l/celluloid.profile
@@ -32,7 +32,7 @@ whitelist ${HOME}/.config/celluloid
32whitelist ${HOME}/.config/gnome-mpv 32whitelist ${HOME}/.config/gnome-mpv
33whitelist ${HOME}/.config/youtube-dl 33whitelist ${HOME}/.config/youtube-dl
34include whitelist-common.inc 34include whitelist-common.inc
35include whitelist-players.inc 35include whitelist-player-common.inc
36include whitelist-runuser-common.inc 36include whitelist-runuser-common.inc
37include whitelist-usr-share-common.inc 37include whitelist-usr-share-common.inc
38include whitelist-var-common.inc 38include whitelist-var-common.inc
diff --git a/etc/profile-a-l/chromium-common.profile b/etc/profile-a-l/chromium-common.profile
index 6a9cf99b0..ce9c652c6 100644
--- a/etc/profile-a-l/chromium-common.profile
+++ b/etc/profile-a-l/chromium-common.profile
@@ -25,7 +25,6 @@ mkdir ${HOME}/.local/share/pki
25whitelist ${DOWNLOADS} 25whitelist ${DOWNLOADS}
26whitelist ${HOME}/.pki 26whitelist ${HOME}/.pki
27whitelist ${HOME}/.local/share/pki 27whitelist ${HOME}/.local/share/pki
28whitelist /usr/share/chromium
29include whitelist-common.inc 28include whitelist-common.inc
30include whitelist-runuser-common.inc 29include whitelist-runuser-common.inc
31include whitelist-usr-share-common.inc 30include whitelist-usr-share-common.inc
diff --git a/etc/profile-a-l/chromium.profile b/etc/profile-a-l/chromium.profile
index dab9ce449..14f1bbe64 100644
--- a/etc/profile-a-l/chromium.profile
+++ b/etc/profile-a-l/chromium.profile
@@ -15,6 +15,7 @@ mkdir ${HOME}/.config/chromium
15whitelist ${HOME}/.cache/chromium 15whitelist ${HOME}/.cache/chromium
16whitelist ${HOME}/.config/chromium 16whitelist ${HOME}/.config/chromium
17whitelist ${HOME}/.config/chromium-flags.conf 17whitelist ${HOME}/.config/chromium-flags.conf
18whitelist /usr/share/chromium
18 19
19# private-bin chromium,chromium-browser,chromedriver 20# private-bin chromium,chromium-browser,chromedriver
20 21
diff --git a/etc/profile-a-l/com.github.bleakgrey.tootle.profile b/etc/profile-a-l/com.github.bleakgrey.tootle.profile
new file mode 100644
index 000000000..4de7eb497
--- /dev/null
+++ b/etc/profile-a-l/com.github.bleakgrey.tootle.profile
@@ -0,0 +1,55 @@
1# Firejail profile for com.github.bleakgrey.tootle
2# Description: Gtk Mastodon client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include com.github.bleakgrey.tootle.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/com.github.bleakgrey.tootle
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-shell.inc
18include disable-xdg.inc
19
20mkdir ${HOME}/.config/com.github.bleakgrey.tootle
21whitelist ${DOWNLOADS}
22whitelist ${HOME}/.config/com.github.bleakgrey.tootle
23include whitelist-common.inc
24include whitelist-runuser-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
28apparmor
29caps.drop all
30machine-id
31netfilter
32nodvd
33nogroups
34nonewprivs
35noroot
36notv
37nou2f
38novideo
39protocol unix,inet,inet6
40seccomp
41shell none
42tracelog
43
44disable-mnt
45private-bin com.github.bleakgrey.tootle
46private-cache
47private-dev
48private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,machine-id mime.types,nsswitch.conf,pki,pulse,resolv.conf,ssl,X11,xdg
49private-tmp
50
51# Settings are immutable
52# dbus-user filter
53# dbus-user.own com.github.bleakgrey.tootle
54# dbus-user.talk ca.desrt.dconf
55dbus-system none
diff --git a/etc/profile-a-l/cower.profile b/etc/profile-a-l/cower.profile
index 0ab5a7f78..2c6b15e02 100644
--- a/etc/profile-a-l/cower.profile
+++ b/etc/profile-a-l/cower.profile
@@ -46,5 +46,4 @@ private-dev
46private-tmp 46private-tmp
47 47
48memory-deny-write-execute 48memory-deny-write-execute
49
50read-only ${HOME}/.config/cower/config 49read-only ${HOME}/.config/cower/config
diff --git a/etc/profile-a-l/cpio.profile b/etc/profile-a-l/cpio.profile
index 087a5b2bb..785308ffd 100644
--- a/etc/profile-a-l/cpio.profile
+++ b/etc/profile-a-l/cpio.profile
@@ -7,40 +7,7 @@ include cpio.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
12noblacklist /sbin 10noblacklist /sbin
13noblacklist /usr/sbin 11noblacklist /usr/sbin
14 12
15include disable-common.inc 13include archiver-common.inc
16# include disable-devel.inc
17include disable-exec.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20
21apparmor
22caps.drop all
23hostname cpio
24ipc-namespace
25machine-id
26net none
27no3d
28nodvd
29nogroups
30nonewprivs
31nosound
32notv
33nou2f
34novideo
35seccomp
36shell none
37tracelog
38x11 none
39
40private-cache
41private-dev
42
43dbus-user none
44dbus-system none
45
46memory-deny-write-execute
diff --git a/etc/profile-a-l/curl.profile b/etc/profile-a-l/curl.profile
index 996ff51d3..f8b194044 100644
--- a/etc/profile-a-l/curl.profile
+++ b/etc/profile-a-l/curl.profile
@@ -7,10 +7,15 @@ include curl.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10# curl 7.74.0 introduces experimental support for HSTS cache
11# https://daniel.haxx.se/blog/2020/11/03/hsts-your-curl/
12# technically this file can be anywhere but let's assume users have it in ${HOME}/.curl-hsts
13# if your setup diverts, add 'blacklist /path/to/curl/hsts/file' to your disable-programs.local
14# and 'noblacklist /path/to/curl/hsts/file' to curl.local to keep the sandbox logic intact
15noblacklist ${HOME}/.curl-hsts
10noblacklist ${HOME}/.curlrc 16noblacklist ${HOME}/.curlrc
11 17
12blacklist /tmp/.X11-unix 18blacklist /tmp/.X11-unix
13blacklist ${RUNUSER}/wayland-*
14blacklist ${RUNUSER} 19blacklist ${RUNUSER}
15 20
16include disable-common.inc 21include disable-common.inc
diff --git a/etc/profile-a-l/default.profile b/etc/profile-a-l/default.profile
index 7eb7660dd..2ecf1a45d 100644
--- a/etc/profile-a-l/default.profile
+++ b/etc/profile-a-l/default.profile
@@ -5,7 +5,7 @@ include default.local
5# Persistent global definitions 5# Persistent global definitions
6include globals.local 6include globals.local
7 7
8# generic gui profile 8# generic GUI profile
9# depending on your usage, you can enable some of the commands below: 9# depending on your usage, you can enable some of the commands below:
10 10
11include disable-common.inc 11include disable-common.inc
@@ -14,12 +14,13 @@ include disable-common.inc
14# include disable-interpreters.inc 14# include disable-interpreters.inc
15include disable-passwdmgr.inc 15include disable-passwdmgr.inc
16include disable-programs.inc 16include disable-programs.inc
17# include disable-shell.inc
17# include disable-write-mnt.inc 18# include disable-write-mnt.inc
18# include disable-xdg.inc 19# include disable-xdg.inc
19 20
20# include whitelist-common.inc 21# include whitelist-common.inc
21# include whitelist-usr-share-common.inc
22# include whitelist-runuser-common.inc 22# include whitelist-runuser-common.inc
23# include whitelist-usr-share-common.inc
23# include whitelist-var-common.inc 24# include whitelist-var-common.inc
24 25
25# apparmor 26# apparmor
diff --git a/etc/profile-a-l/devhelp.profile b/etc/profile-a-l/devhelp.profile
index b8b07469d..a47a71feb 100644
--- a/etc/profile-a-l/devhelp.profile
+++ b/etc/profile-a-l/devhelp.profile
@@ -50,5 +50,4 @@ private-tmp
50# dbus-system none 50# dbus-system none
51 51
52#memory-deny-write-execute - breaks on Arch (see issue #1803) 52#memory-deny-write-execute - breaks on Arch (see issue #1803)
53
54read-only ${HOME} 53read-only ${HOME}
diff --git a/etc/profile-a-l/devilspie.profile b/etc/profile-a-l/devilspie.profile
index 1ab10a6f6..7c3ac50ad 100644
--- a/etc/profile-a-l/devilspie.profile
+++ b/etc/profile-a-l/devilspie.profile
@@ -56,5 +56,4 @@ dbus-user none
56dbus-system none 56dbus-system none
57 57
58memory-deny-write-execute 58memory-deny-write-execute
59
60read-only ${HOME} 59read-only ${HOME}
diff --git a/etc/profile-a-l/dig.profile b/etc/profile-a-l/dig.profile
index 152dfd980..80d97a31f 100644
--- a/etc/profile-a-l/dig.profile
+++ b/etc/profile-a-l/dig.profile
@@ -11,7 +11,6 @@ noblacklist ${HOME}/.digrc
11noblacklist ${PATH}/dig 11noblacklist ${PATH}/dig
12 12
13blacklist /tmp/.X11-unix 13blacklist /tmp/.X11-unix
14blacklist ${RUNUSER}/wayland-*
15blacklist ${RUNUSER} 14blacklist ${RUNUSER}
16 15
17include disable-common.inc 16include disable-common.inc
diff --git a/etc/profile-a-l/discord-common.profile b/etc/profile-a-l/discord-common.profile
index 35bea4aaa..e6edbd7eb 100644
--- a/etc/profile-a-l/discord-common.profile
+++ b/etc/profile-a-l/discord-common.profile
@@ -6,33 +6,24 @@ include discord-common.local
6# added by caller profile 6# added by caller profile
7#include globals.local 7#include globals.local
8 8
9ignore noexec ${HOME} 9# Disabled until someone reported positive feedback
10ignore include disable-interpreters.inc
11ignore include disable-xdg.inc
12ignore include whitelist-runuser-common.inc
13ignore include whitelist-usr-share-common.inc
14ignore apparmor
15ignore disable-mnt
16ignore private-cache
17ignore dbus-user none
18ignore dbus-system none
10 19
11include disable-common.inc 20ignore noexec ${HOME}
12include disable-devel.inc
13include disable-exec.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16 21
17whitelist ${DOWNLOADS}
18whitelist ${HOME}/.config/BetterDiscord 22whitelist ${HOME}/.config/BetterDiscord
19whitelist ${HOME}/.local/share/betterdiscordctl 23whitelist ${HOME}/.local/share/betterdiscordctl
20include whitelist-common.inc
21include whitelist-var-common.inc
22
23caps.drop all
24netfilter
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30nou2f
31novideo
32protocol unix,inet,inet6,netlink
33seccomp !chroot
34 24
35private-bin bash,cut,echo,egrep,fish,grep,head,sed,sh,tclsh,tr,xdg-mime,xdg-open,zsh 25private-bin bash,cut,echo,egrep,fish,grep,head,sed,sh,tclsh,tr,xdg-mime,xdg-open,zsh
36private-dev
37private-etc alternatives,ca-certificates,crypto-policies,fonts,group,ld.so.cache,localtime,login.defs,machine-id,password,pki,resolv.conf,ssl 26private-etc alternatives,ca-certificates,crypto-policies,fonts,group,ld.so.cache,localtime,login.defs,machine-id,password,pki,resolv.conf,ssl
38private-tmp 27
28# Redirect
29include electron.profile
diff --git a/etc/profile-a-l/dolphin-emu.profile b/etc/profile-a-l/dolphin-emu.profile
new file mode 100644
index 000000000..13d830b55
--- /dev/null
+++ b/etc/profile-a-l/dolphin-emu.profile
@@ -0,0 +1,63 @@
1# Firejail profile for dolphin-emu
2# Description: An emulator for Gamecube and Wii games
3# This file is overwritten after every install/update
4# Persistent local customizations
5include dolphin-emu.local
6# Persistent global definitions
7include globals.local
8
9# Note: you must whitelist your games folder in a dolphin-emu.local
10
11noblacklist ${HOME}/.cache/dolphin-emu
12noblacklist ${HOME}/.config/dolphin-emu
13noblacklist ${HOME}/.local/share/dolphin-emu
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23mkdir ${HOME}/.cache/dolphin-emu
24mkdir ${HOME}/.config/dolphin-emu
25mkdir ${HOME}/.local/share/dolphin-emu
26whitelist ${HOME}/.cache/dolphin-emu
27whitelist ${HOME}/.config/dolphin-emu
28whitelist ${HOME}/.local/share/dolphin-emu
29whitelist /usr/share/dolphin-emu
30include whitelist-common.inc
31include whitelist-runuser-common.inc
32include whitelist-usr-share-common.inc
33include whitelist-var-common.inc
34
35apparmor
36caps.drop all
37ipc-namespace
38# uncomment the following line if you do not need NetPlay support
39# net none
40netfilter
41# uncomment the following line if you do not need disc support
42#nodvd
43nogroups
44nonewprivs
45noroot
46notv
47nou2f
48novideo
49protocol unix,inet,inet6,netlink,bluetooth
50seccomp
51shell none
52tracelog
53
54private-bin bash,dolphin-emu,dolphin-emu-x11,sh
55private-cache
56# uncomment the following line if you do not need controller support
57#private-dev
58private-etc alsa,alternatives,asound.conf,bumblebee,ca-certificates,crypto-policies,dconf,drirc,fonts,gconf,glvnd,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,kde4rc,kde5rc,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,machine-id,mime.types,nsswitch.conf,nvidia,pango,pki,protocols,pulse,resolv.conf,rpc,services,ssl,Trolltech.conf,X11,xdg
59private-opt none
60private-tmp
61
62dbus-user none
63dbus-system none
diff --git a/etc/profile-a-l/drill.profile b/etc/profile-a-l/drill.profile
new file mode 100644
index 000000000..07f47be5d
--- /dev/null
+++ b/etc/profile-a-l/drill.profile
@@ -0,0 +1,55 @@
1# Firejail profile for drill
2# Description: DNS lookup utility
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include drill.local
7# Persistent global definitions
8include globals.local
9
10noblacklist ${PATH}/drill
11
12blacklist /tmp/.X11-unix
13blacklist ${RUNUSER}
14
15include disable-common.inc
16# include disable-devel.inc
17include disable-exec.inc
18# include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23include whitelist-common.inc
24include whitelist-usr-share-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29ipc-namespace
30machine-id
31netfilter
32no3d
33nodvd
34nogroups
35nonewprivs
36noroot
37nosound
38notv
39nou2f
40novideo
41protocol unix,inet,inet6
42seccomp
43shell none
44tracelog
45
46disable-mnt
47private
48private-bin bash,drill,sh
49private-dev
50private-tmp
51
52dbus-user none
53dbus-system none
54
55memory-deny-write-execute
diff --git a/etc/profile-a-l/electron.profile b/etc/profile-a-l/electron.profile
index 9b99c7ffb..d3be07c9d 100644
--- a/etc/profile-a-l/electron.profile
+++ b/etc/profile-a-l/electron.profile
@@ -3,25 +3,39 @@
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include electron.local 5include electron.local
6# Persistent global definitions
7include globals.local
8 6
9include disable-common.inc 7include disable-common.inc
8include disable-devel.inc
9include disable-exec.inc
10include disable-interpreters.inc
10include disable-passwdmgr.inc 11include disable-passwdmgr.inc
11include disable-programs.inc 12include disable-programs.inc
13include disable-xdg.inc
12 14
13whitelist ${DOWNLOADS} 15whitelist ${DOWNLOADS}
16include whitelist-common.inc
17include whitelist-runuser-common.inc
18include whitelist-usr-share-common.inc
19include whitelist-var-common.inc
20
21# Uncomment the next line (or add it to your chromium-common.local)
22# if your kernel allows unprivileged userns clone.
23#include chromium-common-hardened.inc
14 24
15apparmor 25apparmor
16caps.drop all 26caps.keep sys_admin,sys_chroot
17netfilter 27netfilter
18nodvd 28nodvd
19nogroups 29nogroups
20nonewprivs
21noroot
22notv 30notv
23protocol unix,inet,inet6,netlink 31nou2f
24seccomp 32novideo
33shell none
34
35disable-mnt
36private-cache
37private-dev
38private-tmp
25 39
26dbus-user none 40dbus-user none
27dbus-system none 41dbus-system none
diff --git a/etc/profile-a-l/element-desktop.profile b/etc/profile-a-l/element-desktop.profile
index c1aa821e3..48a826f2e 100644
--- a/etc/profile-a-l/element-desktop.profile
+++ b/etc/profile-a-l/element-desktop.profile
@@ -7,16 +7,18 @@ include element-desktop.local
7# added by included profile 7# added by included profile
8#include globals.local 8#include globals.local
9 9
10ignore dbus-user none
11
10noblacklist ${HOME}/.config/Element 12noblacklist ${HOME}/.config/Element
11noblacklist ${HOME}/.config/Element (Riot)
12 13
13mkdir ${HOME}/.config/Element 14mkdir ${HOME}/.config/Element
14mkdir ${HOME}/.config/Element (Riot)
15whitelist ${HOME}/.config/Element 15whitelist ${HOME}/.config/Element
16whitelist ${HOME}/.config/Element (Riot)
17whitelist /opt/Element 16whitelist /opt/Element
18 17
19private-opt Element 18private-opt Element
20 19
20dbus-user filter
21dbus-user.talk org.freedesktop.secrets
22
21# Redirect 23# Redirect
22include riot-desktop.profile 24include riot-desktop.profile
diff --git a/etc/profile-a-l/falkon.profile b/etc/profile-a-l/falkon.profile
index 0024b6660..640b0e485 100644
--- a/etc/profile-a-l/falkon.profile
+++ b/etc/profile-a-l/falkon.profile
@@ -15,15 +15,20 @@ include disable-exec.inc
15include disable-interpreters.inc 15include disable-interpreters.inc
16include disable-passwdmgr.inc 16include disable-passwdmgr.inc
17include disable-programs.inc 17include disable-programs.inc
18include disable-xdg.inc
18 19
19mkdir ${HOME}/.cache/falkon 20mkdir ${HOME}/.cache/falkon
20mkdir ${HOME}/.config/falkon 21mkdir ${HOME}/.config/falkon
21whitelist ${DOWNLOADS} 22whitelist ${DOWNLOADS}
22whitelist ${HOME}/.cache/falkon 23whitelist ${HOME}/.cache/falkon
23whitelist ${HOME}/.config/falkon 24whitelist ${HOME}/.config/falkon
25whitelist /usr/share/falkon
24include whitelist-common.inc 26include whitelist-common.inc
27include whitelist-runuser-common.inc
28include whitelist-usr-share-common.inc
25include whitelist-var-common.inc 29include whitelist-var-common.inc
26 30
31apparmor
27caps.drop all 32caps.drop all
28netfilter 33netfilter
29nodvd 34nodvd
@@ -37,7 +42,13 @@ protocol unix,inet,inet6,netlink
37seccomp !chroot 42seccomp !chroot
38# tracelog 43# tracelog
39 44
45disable-mnt
46# private-bin falkon
47private-cache
40private-dev 48private-dev
41# private-etc alternatives,passwd,group,hostname,hosts,localtime,nsswitch.conf,resolv.conf,gtk-2.0,pango,fonts,adobe,mime.types,mailcap,asound.conf,pulse,machine-id,ca-certificates,ssl,pki,crypto-policies 49private-etc adobe,alternatives,asound.conf,ati,ca-certificates,crypto-policies,dconf,drirc,fonts,group,gtk-2.0,gtk-3.0,hostname,hosts,localtime,machine-id,mailcap,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,selinux,ssl,xdg
42# private-tmp - interferes with the opening of downloaded files 50private-tmp
43 51
52# dbus-user filter
53# dbus-user.own org.kde.Falkon
54dbus-system none
diff --git a/etc/profile-a-l/feh.profile b/etc/profile-a-l/feh.profile
index 3ee07e559..8ac7755de 100644
--- a/etc/profile-a-l/feh.profile
+++ b/etc/profile-a-l/feh.profile
@@ -1,6 +1,7 @@
1# Firejail profile for feh 1# Firejail profile for feh
2# Description: imlib2 based image viewer 2# Description: imlib2 based image viewer
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include feh.local 6include feh.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/profile-a-l/file.profile b/etc/profile-a-l/file.profile
index 74620d4cd..c02f9e3de 100644
--- a/etc/profile-a-l/file.profile
+++ b/etc/profile-a-l/file.profile
@@ -7,7 +7,6 @@ include file.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11blacklist ${RUNUSER} 10blacklist ${RUNUSER}
12 11
13include disable-common.inc 12include disable-common.inc
diff --git a/etc/profile-a-l/firefox.profile b/etc/profile-a-l/firefox.profile
index 3472ac5c4..772aad7da 100644
--- a/etc/profile-a-l/firefox.profile
+++ b/etc/profile-a-l/firefox.profile
@@ -16,6 +16,7 @@ whitelist ${HOME}/.mozilla
16 16
17whitelist /usr/share/doc 17whitelist /usr/share/doc
18whitelist /usr/share/firefox 18whitelist /usr/share/firefox
19whitelist /usr/share/gnome-shell/search-providers/firefox-search-provider.ini
19whitelist /usr/share/gtk-doc/html 20whitelist /usr/share/gtk-doc/html
20whitelist /usr/share/mozilla 21whitelist /usr/share/mozilla
21whitelist /usr/share/webext 22whitelist /usr/share/webext
@@ -29,6 +30,7 @@ include whitelist-usr-share-common.inc
29#private-etc firefox 30#private-etc firefox
30 31
31dbus-user filter 32dbus-user filter
33dbus-user.own org.mozilla.Firefox.*
32dbus-user.own org.mozilla.firefox.* 34dbus-user.own org.mozilla.firefox.*
33dbus-user.own org.mpris.MediaPlayer2.firefox.* 35dbus-user.own org.mpris.MediaPlayer2.firefox.*
34# Uncomment or put in your firefox.local to enable native notifications. 36# Uncomment or put in your firefox.local to enable native notifications.
diff --git a/etc/profile-a-l/fractal.profile b/etc/profile-a-l/fractal.profile
index ab907eb0d..c3af29e15 100644
--- a/etc/profile-a-l/fractal.profile
+++ b/etc/profile-a-l/fractal.profile
@@ -1,5 +1,5 @@
1# Firejail profile for fractal 1# Firejail profile for fractal
2# Description: Desktop client for Matrix 2# Description: Desktop client for Matrix
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include fractal.local 5include fractal.local
@@ -21,7 +21,7 @@ mkdir ${HOME}/.cache/fractal
21whitelist ${HOME}/.cache/fractal 21whitelist ${HOME}/.cache/fractal
22whitelist ${DOWNLOADS} 22whitelist ${DOWNLOADS}
23include whitelist-common.inc 23include whitelist-common.inc
24include whitelist-runuser-common.inc 24include whitelist-runuser-common.inc
25include whitelist-usr-share-common.inc 25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc 26include whitelist-var-common.inc
27 27
diff --git a/etc/profile-a-l/freeoffice-planmaker.profile b/etc/profile-a-l/freeoffice-planmaker.profile
index 9449e7c48..b6ca167eb 100644
--- a/etc/profile-a-l/freeoffice-planmaker.profile
+++ b/etc/profile-a-l/freeoffice-planmaker.profile
@@ -7,4 +7,4 @@ include freeoffice-planmaker.local
7include globals.local 7include globals.local
8 8
9# Redirect 9# Redirect
10include softmaker-common.inc 10include softmaker-common.profile
diff --git a/etc/profile-a-l/freeoffice-presentations.profile b/etc/profile-a-l/freeoffice-presentations.profile
index 636868e2e..43661028c 100644
--- a/etc/profile-a-l/freeoffice-presentations.profile
+++ b/etc/profile-a-l/freeoffice-presentations.profile
@@ -7,4 +7,4 @@ include freeoffice-presentations.local
7include globals.local 7include globals.local
8 8
9# Redirect 9# Redirect
10include softmaker-common.inc 10include softmaker-common.profile
diff --git a/etc/profile-a-l/freeoffice-textmaker.profile b/etc/profile-a-l/freeoffice-textmaker.profile
index 5d98d1cc6..f7d30eaed 100644
--- a/etc/profile-a-l/freeoffice-textmaker.profile
+++ b/etc/profile-a-l/freeoffice-textmaker.profile
@@ -6,4 +6,4 @@ include freeoffice-textmaker.local
6include globals.local 6include globals.local
7 7
8# Redirect 8# Redirect
9include softmaker-common.inc 9include softmaker-common.profile
diff --git a/etc/profile-a-l/freetube.profile b/etc/profile-a-l/freetube.profile
index 91f0caf87..e6aff533d 100644
--- a/etc/profile-a-l/freetube.profile
+++ b/etc/profile-a-l/freetube.profile
@@ -8,24 +8,13 @@ include globals.local
8 8
9noblacklist ${HOME}/.config/FreeTube 9noblacklist ${HOME}/.config/FreeTube
10 10
11include disable-devel.inc 11include disable-shell.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-shell.inc
15include disable-xdg.inc
16 12
17mkdir ${HOME}/.config/FreeTube 13mkdir ${HOME}/.config/FreeTube
18whitelist ${HOME}/.config/FreeTube 14whitelist ${HOME}/.config/FreeTube
19 15
20seccomp !chroot
21shell none
22
23disable-mnt
24private-bin freetube 16private-bin freetube
25private-cache
26private-dev
27private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,mime.types,nsswitch.conf,pki,pulse,resolv.conf,ssl,X11,xdg 17private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,mime.types,nsswitch.conf,pki,pulse,resolv.conf,ssl,X11,xdg
28private-tmp
29 18
30# Redirect 19# Redirect
31include electron.profile 20include electron.profile
diff --git a/etc/profile-a-l/geekbench.profile b/etc/profile-a-l/geekbench.profile
index e06a9afad..77287769a 100644
--- a/etc/profile-a-l/geekbench.profile
+++ b/etc/profile-a-l/geekbench.profile
@@ -51,5 +51,4 @@ dbus-user none
51dbus-system none 51dbus-system none
52 52
53#memory-deny-write-execute - breaks on Arch (see issue #1803) 53#memory-deny-write-execute - breaks on Arch (see issue #1803)
54
55read-only ${HOME} 54read-only ${HOME}
diff --git a/etc/profile-a-l/ghostwriter.profile b/etc/profile-a-l/ghostwriter.profile
index c15174815..d56d6714e 100644
--- a/etc/profile-a-l/ghostwriter.profile
+++ b/etc/profile-a-l/ghostwriter.profile
@@ -11,6 +11,8 @@ noblacklist ${HOME}/.local/share/ghostwriter
11noblacklist ${DOCUMENTS} 11noblacklist ${DOCUMENTS}
12noblacklist ${PICTURES} 12noblacklist ${PICTURES}
13 13
14include allow-lua.inc
15
14include disable-common.inc 16include disable-common.inc
15include disable-devel.inc 17include disable-devel.inc
16include disable-exec.inc 18include disable-exec.inc
diff --git a/etc/profile-a-l/gimp.profile b/etc/profile-a-l/gimp.profile
index ed27de7f5..bc5ef966c 100644
--- a/etc/profile-a-l/gimp.profile
+++ b/etc/profile-a-l/gimp.profile
@@ -52,7 +52,7 @@ nosound
52notv 52notv
53nou2f 53nou2f
54protocol unix 54protocol unix
55seccomp 55seccomp !mbind
56shell none 56shell none
57tracelog 57tracelog
58 58
diff --git a/etc/profile-a-l/github-desktop.profile b/etc/profile-a-l/github-desktop.profile
index 152396553..325c54ced 100644
--- a/etc/profile-a-l/github-desktop.profile
+++ b/etc/profile-a-l/github-desktop.profile
@@ -6,43 +6,35 @@ include github-desktop.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# Note: On debian-based distributions the binary might be located in
10# /opt/GitHub Desktop/github-desktop, and therefore not be in PATH.
11# If that's the case you can start GitHub Desktop with firejail via
12# `firejail "/opt/GitHub Desktop/github-desktop"`.
13
14# Disabled until someone reported positive feedback
15ignore include disable-xdg.inc
16ignore whitelist ${DOWNLOADS}
17ignore include whitelist-common.inc
18ignore include whitelist-runuser-common.inc
19ignore include whitelist-usr-share-common.inc
20ignore include whitelist-var-common.inc
21ignore apparmor
22ignore dbus-user none
23ignore dbus-system none
24
9noblacklist ${HOME}/.config/GitHub Desktop 25noblacklist ${HOME}/.config/GitHub Desktop
10noblacklist ${HOME}/.config/git 26noblacklist ${HOME}/.config/git
11noblacklist ${HOME}/.gitconfig 27noblacklist ${HOME}/.gitconfig
12noblacklist ${HOME}/.git-credentials 28noblacklist ${HOME}/.git-credentials
13 29
14include disable-common.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20
21caps.drop all
22netfilter
23# no3d 30# no3d
24nodvd
25nogroups
26nonewprivs
27noroot
28nosound 31nosound
29notv
30nou2f
31novideo
32protocol unix,inet,inet6,netlink
33seccomp !chroot
34 32
35# Note: On debian-based distributions the binary might be located in
36# /opt/GitHub Desktop/github-desktop, and therefore not be in PATH.
37# If that's the case you can start GitHub Desktop with firejail via
38# `firejail "/opt/GitHub Desktop/github-desktop"`.
39
40disable-mnt
41# private-bin github-desktop 33# private-bin github-desktop
42private-cache
43?HAS_APPIMAGE: ignore private-dev 34?HAS_APPIMAGE: ignore private-dev
44private-dev
45# private-lib 35# private-lib
46private-tmp
47 36
48# memory-deny-write-execute 37# memory-deny-write-execute
38
39# Redirect
40include electron.profile
diff --git a/etc/profile-a-l/gnome-system-log.profile b/etc/profile-a-l/gnome-system-log.profile
index 14b0f758e..9c0a26a02 100644
--- a/etc/profile-a-l/gnome-system-log.profile
+++ b/etc/profile-a-l/gnome-system-log.profile
@@ -53,7 +53,6 @@ writable-var-log
53# dbus-system none 53# dbus-system none
54 54
55memory-deny-write-execute 55memory-deny-write-execute
56 56# Comment the line below if you export logs to a file in your ${HOME}
57# comment this if you export logs to a file in your ${HOME}
58# or put 'ignore read-only ${HOME}' in your gnome-system-log.local 57# or put 'ignore read-only ${HOME}' in your gnome-system-log.local
59read-only ${HOME} 58read-only ${HOME}
diff --git a/etc/profile-a-l/godot.profile b/etc/profile-a-l/godot.profile
index 8324a4eb5..f37f345ba 100644
--- a/etc/profile-a-l/godot.profile
+++ b/etc/profile-a-l/godot.profile
@@ -38,7 +38,7 @@ tracelog
38# private-bin godot 38# private-bin godot
39private-cache 39private-cache
40private-dev 40private-dev
41private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,drirc,fonts,machine-id,nsswitch.conf,openal,pki,pulse,resolv.conf,ssl 41private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,drirc,fonts,machine-id,mono,nsswitch.conf,openal,pki,pulse,resolv.conf,ssl
42private-tmp 42private-tmp
43 43
44dbus-user none 44dbus-user none
diff --git a/etc/profile-a-l/gtk-straw-viewer.profile b/etc/profile-a-l/gtk-straw-viewer.profile
new file mode 100644
index 000000000..e2721360b
--- /dev/null
+++ b/etc/profile-a-l/gtk-straw-viewer.profile
@@ -0,0 +1,14 @@
1# Firejail profile for gtk-straw-viewer
2# Description: Gtk front-end to straw-viewer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gtk-straw-viewer.local
6# added by included profile
7#include globals.local
8
9ignore quiet
10
11include whitelist-runuser-common.inc
12
13# Redirect
14include straw-viewer.profile
diff --git a/etc/profile-a-l/gtk-youtube-viewer b/etc/profile-a-l/gtk-youtube-viewer.profile
index 023f10d3d..848979b52 100644
--- a/etc/profile-a-l/gtk-youtube-viewer
+++ b/etc/profile-a-l/gtk-youtube-viewer.profile
@@ -3,16 +3,12 @@
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include gtk-youtube-viewer.local 5include gtk-youtube-viewer.local
6# Persistent global definitions 6# added by included profile
7# include globals.local 7#include globals.local
8 8
9ignore quiet 9ignore quiet
10 10
11noblacklist /tmp/.X11-unix
12noblacklist ${RUNUSER}/wayland-*
13noblacklist ${RUNUSER}
14
15include whitelist-runuser-common.inc 11include whitelist-runuser-common.inc
16 12
17# Redirect 13# Redirect
18include youtube-viewer.profile \ No newline at end of file 14include youtube-viewer.profile
diff --git a/etc/profile-a-l/gtk2-youtube-viewer b/etc/profile-a-l/gtk2-youtube-viewer.profile
index 331e73218..787c7bd90 100644
--- a/etc/profile-a-l/gtk2-youtube-viewer
+++ b/etc/profile-a-l/gtk2-youtube-viewer.profile
@@ -3,16 +3,15 @@
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include gtk2-youtube-viewer.local 5include gtk2-youtube-viewer.local
6# Persistent global definitions 6# added by included profile
7# include globals.local 7#include globals.local
8 8
9ignore quiet 9ignore quiet
10 10
11noblacklist /tmp/.X11-unix 11noblacklist /tmp/.X11-unix
12noblacklist ${RUNUSER}/wayland-*
13noblacklist ${RUNUSER} 12noblacklist ${RUNUSER}
14 13
15include whitelist-runuser-common.inc 14include whitelist-runuser-common.inc
16 15
17# Redirect 16# Redirect
18include youtube-viewer.profile \ No newline at end of file 17include youtube-viewer.profile
diff --git a/etc/profile-a-l/gtk3-youtube-viewer b/etc/profile-a-l/gtk3-youtube-viewer.profile
index 4c5bde55f..988882622 100644
--- a/etc/profile-a-l/gtk3-youtube-viewer
+++ b/etc/profile-a-l/gtk3-youtube-viewer.profile
@@ -3,16 +3,15 @@
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include gtk3-youtube-viewer.local 5include gtk3-youtube-viewer.local
6# Persistent global definitions 6# added by included profile
7# include globals.local 7#include globals.local
8 8
9ignore quiet 9ignore quiet
10 10
11noblacklist /tmp/.X11-unix 11noblacklist /tmp/.X11-unix
12noblacklist ${RUNUSER}/wayland-*
13noblacklist ${RUNUSER} 12noblacklist ${RUNUSER}
14 13
15include whitelist-runuser-common.inc 14include whitelist-runuser-common.inc
16 15
17# Redirect 16# Redirect
18include youtube-viewer.profile \ No newline at end of file 17include youtube-viewer.profile
diff --git a/etc/profile-a-l/gzip.profile b/etc/profile-a-l/gzip.profile
index 8ec39d8ca..9b59e57e7 100644
--- a/etc/profile-a-l/gzip.profile
+++ b/etc/profile-a-l/gzip.profile
@@ -7,43 +7,7 @@ include gzip.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
12# Arch Linux (based distributions) need access to /var/lib/pacman. As we drop all capabilities this is automatically read-only. 10# Arch Linux (based distributions) need access to /var/lib/pacman. As we drop all capabilities this is automatically read-only.
13noblacklist /var/lib/pacman 11noblacklist /var/lib/pacman
14 12
15include disable-common.inc 13include archiver-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21
22apparmor
23caps.drop all
24hostname gzip
25ipc-namespace
26machine-id
27net none
28no3d
29nodvd
30nogroups
31nonewprivs
32#noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix
38seccomp
39shell none
40tracelog
41x11 none
42
43private-cache
44private-dev
45
46dbus-user none
47dbus-system none
48
49memory-deny-write-execute
diff --git a/etc/profile-a-l/highlight.profile b/etc/profile-a-l/highlight.profile
index 0761aa2fc..c2812d7f5 100644
--- a/etc/profile-a-l/highlight.profile
+++ b/etc/profile-a-l/highlight.profile
@@ -6,7 +6,6 @@ include highlight.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist ${RUNUSER}/wayland-*
10blacklist ${RUNUSER} 9blacklist ${RUNUSER}
11 10
12include disable-common.inc 11include disable-common.inc
diff --git a/etc/profile-a-l/homebank.profile b/etc/profile-a-l/homebank.profile
index 8e600a2d7..da32de640 100644
--- a/etc/profile-a-l/homebank.profile
+++ b/etc/profile-a-l/homebank.profile
@@ -10,7 +10,7 @@ noblacklist ${HOME}/.config/homebank
10 10
11include disable-common.inc 11include disable-common.inc
12include disable-devel.inc 12include disable-devel.inc
13include disable-exec.inc 13include disable-exec.inc
14include disable-interpreters.inc 14include disable-interpreters.inc
15include disable-programs.inc 15include disable-programs.inc
16include disable-passwdmgr.inc 16include disable-passwdmgr.inc
diff --git a/etc/profile-a-l/jitsi-meet-desktop.profile b/etc/profile-a-l/jitsi-meet-desktop.profile
index c4121d835..e5beb741a 100644
--- a/etc/profile-a-l/jitsi-meet-desktop.profile
+++ b/etc/profile-a-l/jitsi-meet-desktop.profile
@@ -6,34 +6,22 @@ include jitsi-meet-desktop.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# Disabled until someone reported positive feedback
10ignore nou2f
11ignore novideo
12ignore shell none
13
9ignore noexec /tmp 14ignore noexec /tmp
10 15
11noblacklist ${HOME}/.config/Jitsi Meet 16noblacklist ${HOME}/.config/Jitsi Meet
12 17
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-xdg.inc
17
18nowhitelist ${DOWNLOADS} 18nowhitelist ${DOWNLOADS}
19 19
20mkdir ${HOME}/.config/Jitsi Meet 20mkdir ${HOME}/.config/Jitsi Meet
21
22whitelist ${HOME}/.config/Jitsi Meet 21whitelist ${HOME}/.config/Jitsi Meet
23 22
24include whitelist-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-runuser-common.inc
27include whitelist-var-common.inc
28
29seccomp !chroot
30
31disable-mnt
32private-bin bash,jitsi-meet-desktop 23private-bin bash,jitsi-meet-desktop
33private-cache
34private-dev
35private-etc alsa,alternatives,asound.conf,bumblebee,ca-certificates,crypto-policies,drirc,fonts,glvnd,group,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,machine-id,mime.types,nsswitch.conf,nvidia,pango,passwd,pki,protocols,pulse,resolv.conf,rpc,services,ssl,X11,xdg 24private-etc alsa,alternatives,asound.conf,bumblebee,ca-certificates,crypto-policies,drirc,fonts,glvnd,group,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,machine-id,mime.types,nsswitch.conf,nvidia,pango,passwd,pki,protocols,pulse,resolv.conf,rpc,services,ssl,X11,xdg
36private-tmp
37 25
38# Redirect 26# Redirect
39include electron.profile 27include electron.profile
diff --git a/etc/profile-a-l/kazam.profile b/etc/profile-a-l/kazam.profile
index 9899ff195..9c095e106 100644
--- a/etc/profile-a-l/kazam.profile
+++ b/etc/profile-a-l/kazam.profile
@@ -12,12 +12,12 @@ noblacklist ${PICTURES}
12noblacklist ${VIDEOS} 12noblacklist ${VIDEOS}
13noblacklist ${HOME}/.config/kazam 13noblacklist ${HOME}/.config/kazam
14 14
15include allow-python2.inc 15include allow-python2.inc
16include allow-python3.inc 16include allow-python3.inc
17 17
18include disable-common.inc 18include disable-common.inc
19include disable-devel.inc 19include disable-devel.inc
20include disable-exec.inc 20include disable-exec.inc
21include disable-interpreters.inc 21include disable-interpreters.inc
22include disable-programs.inc 22include disable-programs.inc
23include disable-passwdmgr.inc 23include disable-passwdmgr.inc
@@ -25,7 +25,7 @@ include disable-shell.inc
25include disable-xdg.inc 25include disable-xdg.inc
26 26
27whitelist /usr/share/kazam 27whitelist /usr/share/kazam
28include whitelist-runuser-common.inc 28include whitelist-runuser-common.inc
29include whitelist-usr-share-common.inc 29include whitelist-usr-share-common.inc
30include whitelist-var-common.inc 30include whitelist-var-common.inc
31 31
diff --git a/etc/profile-a-l/keepassxc.profile b/etc/profile-a-l/keepassxc.profile
index 6a3b29c9d..a3a1b500a 100644
--- a/etc/profile-a-l/keepassxc.profile
+++ b/etc/profile-a-l/keepassxc.profile
@@ -73,12 +73,11 @@ dbus-user.talk org.freedesktop.login1.Session
73dbus-user.talk org.gnome.ScreenSaver 73dbus-user.talk org.gnome.ScreenSaver
74dbus-user.talk org.gnome.SessionManager 74dbus-user.talk org.gnome.SessionManager
75dbus-user.talk org.gnome.SessionManager.Presence 75dbus-user.talk org.gnome.SessionManager.Presence
76# Uncomment or add to your keepassxc.local to allow Notifications/Tray. 76# Uncomment or add to your keepassxc.local to allow Notifications.
77#dbus-user.talk org.freedesktop.Notifications 77#dbus-user.talk org.freedesktop.Notifications
78# Uncomment or add to your keepassxc.local to allow Tray.
78#dbus-user.talk org.kde.StatusNotifierWatcher 79#dbus-user.talk org.kde.StatusNotifierWatcher
79# These numbers seems to be not stable, see #3713. Play around with them. 80#dbus-user.own org.kde.*
80#dbus-user.own org.kde.StatusNotifierItem-2-2
81#dbus-user.own org.kde.StatusNotifierItem-10-2
82dbus-system none 81dbus-system none
83 82
84# Mutex is stored in /tmp by default, which is broken by private-tmp 83# Mutex is stored in /tmp by default, which is broken by private-tmp
diff --git a/etc/profile-a-l/kube.profile b/etc/profile-a-l/kube.profile
index cf3a69fd7..e0cfb9f24 100644
--- a/etc/profile-a-l/kube.profile
+++ b/etc/profile-a-l/kube.profile
@@ -63,7 +63,7 @@ shell none
63tracelog 63tracelog
64 64
65# disable-mnt 65# disable-mnt
66# Add "gpg,gpg2,gpg-agent,pinentry-curses,pinentry-emacs,pinentry-fltk,pinentry-gnome3,pinentry-gtk,pinentry-gtk2,pinentry-gtk-2,pinentry-qt,pinentry-qt4,pinentry-tty,pinentry-x2go,pinentry-kwallet" for gpg 66# Add "gpg,gpg2,gpg-agent,pinentry-curses,pinentry-emacs,pinentry-fltk,pinentry-gnome3,pinentry-gtk,pinentry-gtk2,pinentry-gtk-2,pinentry-qt,pinentry-qt4,pinentry-tty,pinentry-x2go,pinentry-kwallet" for gpg
67# Add "ignore private-bin" for hyperlinks or have a look at the private-bins in firefox.profile and firefox-common.profile. 67# Add "ignore private-bin" for hyperlinks or have a look at the private-bins in firefox.profile and firefox-common.profile.
68private-bin kube,sink_synchronizer 68private-bin kube,sink_synchronizer
69private-cache 69private-cache
diff --git a/etc/profile-a-l/less.profile b/etc/profile-a-l/less.profile
index de6fa67d1..e1f0bc290 100644
--- a/etc/profile-a-l/less.profile
+++ b/etc/profile-a-l/less.profile
@@ -7,7 +7,6 @@ include less.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11blacklist ${RUNUSER} 10blacklist ${RUNUSER}
12 11
13noblacklist ${HOME}/.lesshst 12noblacklist ${HOME}/.lesshst
diff --git a/etc/profile-a-l/librewolf.profile b/etc/profile-a-l/librewolf.profile
new file mode 100644
index 000000000..5208cb979
--- /dev/null
+++ b/etc/profile-a-l/librewolf.profile
@@ -0,0 +1,28 @@
1# Firejail profile for Librewolf
2# Description: Firefox fork based on privacy
3# This file is overwritten after every install/update
4# Persistent local customizations
5include librewolf.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/librewolf
10noblacklist ${HOME}/.librewolf
11
12mkdir ${HOME}/.cache/librewolf
13mkdir ${HOME}/.librewolf
14whitelist ${HOME}/.cache/librewolf
15whitelist ${HOME}/.librewolf
16
17# Uncomment (or add to librewolf.local) the following lines if you want to
18# use the migration wizard.
19#noblacklist ${HOME}/.mozilla
20#whitelist ${HOME}/.mozilla
21
22# librewolf requires a shell to launch on Arch. We can possibly remove sh though.
23#private-bin bash,dbus-launch,dbus-send,env,librewolf,python*,sh,which
24# private-etc must first be enabled in firefox-common.profile
25#private-etc librewolf
26
27# Redirect
28include firefox-common.profile
diff --git a/etc/profile-a-l/links.profile b/etc/profile-a-l/links.profile
index b2f94d3cf..ccc77f274 100644
--- a/etc/profile-a-l/links.profile
+++ b/etc/profile-a-l/links.profile
@@ -1,6 +1,7 @@
1# Firejail profile for links 1# Firejail profile for links
2# Description: Text WWW browser 2# Description: Text WWW browser
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include links.local 6include links.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/profile-a-l/lutris.profile b/etc/profile-a-l/lutris.profile
new file mode 100644
index 000000000..652f571bb
--- /dev/null
+++ b/etc/profile-a-l/lutris.profile
@@ -0,0 +1,74 @@
1# Firejail profile for lutris
2# Description: Multi-library game handler with special support for Wine
3# This file is overwritten after every install/update
4# Persistent local customizations
5include lutris.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${PATH}/llvm*
10noblacklist ${HOME}/Games
11noblacklist ${HOME}/.cache/lutris
12noblacklist ${HOME}/.cache/winetricks
13noblacklist ${HOME}/.config/lutris
14noblacklist ${HOME}/.local/share/lutris
15# noblacklist ${HOME}/.wine
16noblacklist /tmp/.wine-*
17
18ignore noexec ${HOME}
19
20# Allow python (blacklisted by disable-interpreters.inc)
21include allow-python2.inc
22include allow-python3.inc
23
24include disable-common.inc
25include disable-devel.inc
26include disable-exec.inc
27include disable-interpreters.inc
28include disable-passwdmgr.inc
29include disable-programs.inc
30include disable-xdg.inc
31
32mkdir ${HOME}/Games
33mkdir ${HOME}/.cache/lutris
34mkdir ${HOME}/.cache/winetricks
35mkdir ${HOME}/.config/lutris
36mkdir ${HOME}/.local/share/lutris
37# mkdir ${HOME}/.wine
38whitelist ${HOME}/Downloads
39whitelist ${HOME}/Games
40whitelist ${HOME}/.cache/lutris
41whitelist ${HOME}/.cache/winetricks
42whitelist ${HOME}/.config/lutris
43whitelist ${HOME}/.local/share/lutris
44# whitelist ${HOME}/.wine
45whitelist /usr/share/lutris
46whitelist /usr/share/wine
47include whitelist-common.inc
48include whitelist-usr-share-common.inc
49include whitelist-runuser-common.inc
50include whitelist-var-common.inc
51
52# allow-debuggers
53# apparmor
54caps.drop all
55ipc-namespace
56# net none
57netfilter
58nodvd
59nogroups
60nonewprivs
61noroot
62notv
63nou2f
64novideo
65protocol unix,inet,inet6,netlink
66seccomp
67shell none
68
69# uncomment the following line if you do not need controller support
70# private-dev
71private-tmp
72
73dbus-user none
74dbus-system none
diff --git a/etc/profile-a-l/lynx.profile b/etc/profile-a-l/lynx.profile
index dbd0a61e5..76a0e7ed0 100644
--- a/etc/profile-a-l/lynx.profile
+++ b/etc/profile-a-l/lynx.profile
@@ -1,6 +1,7 @@
1# Firejail profile for lynx 1# Firejail profile for lynx
2# Description: Classic non-graphical (text-mode) web browser 2# Description: Classic non-graphical (text-mode) web browser
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include lynx.local 6include lynx.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/profile-a-l/lyx.profile b/etc/profile-a-l/lyx.profile
index b2c0afbe7..ffde057d5 100644
--- a/etc/profile-a-l/lyx.profile
+++ b/etc/profile-a-l/lyx.profile
@@ -27,7 +27,7 @@ apparmor
27machine-id 27machine-id
28 28
29# private-bin atril,dvilualatex,env,latex,lua*,luatex,lyx,lyxclient,okular,pdf2latex,pdflatex,pdftex,perl*,python*,qpdf,qpdfview,sh,tex2lyx,texmf,xelatex 29# private-bin atril,dvilualatex,env,latex,lua*,luatex,lyx,lyxclient,okular,pdf2latex,pdflatex,pdftex,perl*,python*,qpdf,qpdfview,sh,tex2lyx,texmf,xelatex
30private-etc alternatives,dconf,fonts,gtk-2.0,gtk-3.0,locale,locale.alias,locale.conf,lyx,mime.types,passwd,texmf,X11,xdg 30private-etc alternatives,dconf,fonts,gtk-2.0,gtk-3.0,locale,locale.alias,locale.conf,lyx,machine-id,mime.types,passwd,texmf,X11,xdg
31 31
32# Redirect 32# Redirect
33include latex-common.profile 33include latex-common.profile