aboutsummaryrefslogtreecommitdiffstats
path: root/etc/profile-a-l
diff options
context:
space:
mode:
Diffstat (limited to 'etc/profile-a-l')
-rw-r--r--etc/profile-a-l/apostrophe.profile14
-rw-r--r--etc/profile-a-l/brave.profile5
-rw-r--r--etc/profile-a-l/dbus-send.profile2
-rw-r--r--etc/profile-a-l/discord-canary.profile2
-rw-r--r--etc/profile-a-l/etr.profile2
-rw-r--r--etc/profile-a-l/exfalso.profile54
-rw-r--r--etc/profile-a-l/file-roller.profile4
-rw-r--r--etc/profile-a-l/firedragon.profile26
-rw-r--r--etc/profile-a-l/flameshot.profile8
-rw-r--r--etc/profile-a-l/librewolf-nightly.profile3
-rw-r--r--etc/profile-a-l/librewolf.profile34
-rw-r--r--etc/profile-a-l/sway.profile19
12 files changed, 111 insertions, 62 deletions
diff --git a/etc/profile-a-l/apostrophe.profile b/etc/profile-a-l/apostrophe.profile
index 4986ac63a..f265c8406 100644
--- a/etc/profile-a-l/apostrophe.profile
+++ b/etc/profile-a-l/apostrophe.profile
@@ -6,15 +6,22 @@ include apostrophe.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.texlive20*
9noblacklist ${DOCUMENTS} 10noblacklist ${DOCUMENTS}
10noblacklist ${PICTURES} 11noblacklist ${PICTURES}
11 12
12# Allow lua (blacklisted by disable-interpreters.inc) 13# Allow lua (blacklisted by disable-interpreters.inc)
13include allow-lua.inc 14include allow-lua.inc
14 15
16# Allow perl (blacklisted by disable-interpreters.inc)
17include allow-perl.inc
18
15# Allow python (blacklisted by disable-interpreters.inc) 19# Allow python (blacklisted by disable-interpreters.inc)
16include allow-python3.inc 20include allow-python3.inc
17 21
22# Allow /bin/sh (blacklisted by disable-shell.inc)
23include allow-bin-sh.inc
24
18include disable-common.inc 25include disable-common.inc
19include disable-devel.inc 26include disable-devel.inc
20include disable-exec.inc 27include disable-exec.inc
@@ -25,7 +32,10 @@ include disable-shell.inc
25include disable-xdg.inc 32include disable-xdg.inc
26 33
27whitelist /usr/share/apostrophe 34whitelist /usr/share/apostrophe
35whitelist /usr/share/texlive
36whitelist /usr/share/texmf
28whitelist /usr/share/pandoc-* 37whitelist /usr/share/pandoc-*
38whitelist /usr/share/perl5
29include whitelist-runuser-common.inc 39include whitelist-runuser-common.inc
30include whitelist-usr-share-common.inc 40include whitelist-usr-share-common.inc
31include whitelist-var-common.inc 41include whitelist-var-common.inc
@@ -49,10 +59,10 @@ shell none
49tracelog 59tracelog
50 60
51disable-mnt 61disable-mnt
52private-bin apostrophe,pandoc,python3* 62private-bin apostrophe,fmtutil,kpsewhich,mktexfmt,pandoc,pdftex,perl,python3*,sh,xdvipdfmx,xelatex,xetex
53private-cache 63private-cache
54private-dev 64private-dev
55private-etc alternatives,dconf,fonts,gtk-3.0,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,pango,X11 65private-etc alternatives,dconf,fonts,gtk-3.0,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,pango,texlive,X11
56private-tmp 66private-tmp
57 67
58dbus-user filter 68dbus-user filter
diff --git a/etc/profile-a-l/brave.profile b/etc/profile-a-l/brave.profile
index 5a5e9eacd..09548c761 100644
--- a/etc/profile-a-l/brave.profile
+++ b/etc/profile-a-l/brave.profile
@@ -8,7 +8,10 @@ include globals.local
8 8
9# noexec /tmp is included in chromium-common.profile and breaks Brave 9# noexec /tmp is included in chromium-common.profile and breaks Brave
10ignore noexec /tmp 10ignore noexec /tmp
11# TOR is installed in ${HOME} 11# TOR is installed in ${HOME}.
12# NOTE: chromium-common.profile enables apparmor. To keep that intact
13# you will need to uncomment the 'brave + tor' rule in /etc/apparmor.d/local/firejail-default.
14# Alternatively you can add 'ignore apparmor' to your brave.local.
12ignore noexec ${HOME} 15ignore noexec ${HOME}
13 16
14noblacklist ${HOME}/.cache/BraveSoftware 17noblacklist ${HOME}/.cache/BraveSoftware
diff --git a/etc/profile-a-l/dbus-send.profile b/etc/profile-a-l/dbus-send.profile
index 76a14d99b..0000de441 100644
--- a/etc/profile-a-l/dbus-send.profile
+++ b/etc/profile-a-l/dbus-send.profile
@@ -52,7 +52,7 @@ private-bin dbus-send
52private-cache 52private-cache
53private-dev 53private-dev
54private-etc alternatives,dbus-1 54private-etc alternatives,dbus-1
55private-lib libpcre2-8.so.0 55private-lib libpcre*
56private-tmp 56private-tmp
57 57
58memory-deny-write-execute 58memory-deny-write-execute
diff --git a/etc/profile-a-l/discord-canary.profile b/etc/profile-a-l/discord-canary.profile
index 3e9dacd1e..43db95b8a 100644
--- a/etc/profile-a-l/discord-canary.profile
+++ b/etc/profile-a-l/discord-canary.profile
@@ -10,7 +10,7 @@ noblacklist ${HOME}/.config/discordcanary
10mkdir ${HOME}/.config/discordcanary 10mkdir ${HOME}/.config/discordcanary
11whitelist ${HOME}/.config/discordcanary 11whitelist ${HOME}/.config/discordcanary
12 12
13private-bin discord-canary 13private-bin discord-canary,electron,electron[0-9],electron[0-9][0-9]
14private-opt discord-canary 14private-opt discord-canary
15 15
16# Redirect 16# Redirect
diff --git a/etc/profile-a-l/etr.profile b/etc/profile-a-l/etr.profile
index 1c34335d2..f55d23778 100644
--- a/etc/profile-a-l/etr.profile
+++ b/etc/profile-a-l/etr.profile
@@ -44,7 +44,7 @@ disable-mnt
44private-bin etr 44private-bin etr
45private-cache 45private-cache
46private-dev 46private-dev
47# private-etc alternatives,drirc,machine-id,openal 47# private-etc alternatives,drirc,machine-id,openal,passwd
48private-tmp 48private-tmp
49 49
50dbus-user none 50dbus-user none
diff --git a/etc/profile-a-l/exfalso.profile b/etc/profile-a-l/exfalso.profile
index 192858304..92e4395c5 100644
--- a/etc/profile-a-l/exfalso.profile
+++ b/etc/profile-a-l/exfalso.profile
@@ -4,58 +4,12 @@
4# Persistent local customizations 4# Persistent local customizations
5include exfalso.local 5include exfalso.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7# added by included profile
8#include globals.local
8 9
9noblacklist ${HOME}/.quodlibet
10noblacklist ${MUSIC}
11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
16whitelist ${DOWNLOADS}
17whitelist ${MUSIC}
18
19include disable-common.inc
20include disable-devel.inc
21include disable-exec.inc
22include disable-interpreters.inc
23include disable-passwdmgr.inc
24include disable-programs.inc
25include disable-shell.inc
26include disable-xdg.inc
27
28mkdir ${HOME}/.quodlibet
29whitelist ${HOME}/.quodlibet
30include whitelist-common.inc
31include whitelist-usr-share-common.inc
32include whitelist-var-common.inc
33
34caps.drop all
35ipc-namespace
36machine-id
37netfilter
38no3d
39nodvd
40nogroups
41nonewprivs
42noroot
43nosound
44notv
45nou2f
46novideo
47protocol unix,inet,inet6
48seccomp
49shell none
50
51private-bin exfalso,python*
52private-cache
53private-dev
54private-etc alternatives,fonts,group,passwd
55private-lib libatk-1.0.so.*,libgdk-3.so.*,libgdk_pixbuf-2.0.so.*,libgirepository-1.0.so.*,libgstreamer-1.0.so.*,libgtk-3.so.*,libgtksourceview-3.0.so.*,libpango-1.0.so.*,libpython*,libreadline.so.*,libsoup-2.4.so.*,libssl.so.1.*,python2*,python3* 10private-lib libatk-1.0.so.*,libgdk-3.so.*,libgdk_pixbuf-2.0.so.*,libgirepository-1.0.so.*,libgstreamer-1.0.so.*,libgtk-3.so.*,libgtksourceview-3.0.so.*,libpango-1.0.so.*,libpython*,libreadline.so.*,libsoup-2.4.so.*,libssl.so.1.*,python2*,python3*
56private-tmp
57 11
58dbus-user none 12dbus-user none
59dbus-system none
60 13
61#memory-deny-write-execute - breaks on Arch (see issue #1803) 14# Redirect
15include quodlibet.profile
diff --git a/etc/profile-a-l/file-roller.profile b/etc/profile-a-l/file-roller.profile
index 2a1eb2001..50d2b923b 100644
--- a/etc/profile-a-l/file-roller.profile
+++ b/etc/profile-a-l/file-roller.profile
@@ -20,9 +20,9 @@ include whitelist-var-common.inc
20 20
21apparmor 21apparmor
22caps.drop all 22caps.drop all
23#ipc-namespace - causing issues launching on archlinux
24machine-id 23machine-id
25# net none - breaks on older Ubuntu versions 24# net none - breaks on older Ubuntu versions
25netfilter
26no3d 26no3d
27nodvd 27nodvd
28nogroups 28nogroups
@@ -38,7 +38,7 @@ seccomp.block-secondary
38shell none 38shell none
39tracelog 39tracelog
40 40
41private-bin 7z,7za,7zr,ar,arj,bash,brotli,bzip2,compress,cpio,dpkg-deb,file-roller,gtar,gzip,isoinfo,lha,lrzip,lsar,lz4,lzip,lzma,lzop,p7zip,rar,rzip,sh,tar,unace,unalz,unar,uncompress,unrar,unsquashfs,unstuff,unzip,xz,zip,zoo 41private-bin 7z,7za,7zr,ar,arj,atool,bash,brotli,bsdtar,bzip2,compress,cp,cpio,dpkg-deb,file-roller,gtar,gzip,isoinfo,lha,lrzip,lsar,lz4,lzip,lzma,lzop,mv,p7zip,rar,rm,rzip,sh,tar,unace,unalz,unar,uncompress,unrar,unsquashfs,unstuff,unzip,unzstd,xz,xzdec,zip,zoo,zstd
42private-cache 42private-cache
43private-dev 43private-dev
44private-etc dconf,fonts,gtk-3.0,xdg 44private-etc dconf,fonts,gtk-3.0,xdg
diff --git a/etc/profile-a-l/firedragon.profile b/etc/profile-a-l/firedragon.profile
new file mode 100644
index 000000000..77487161e
--- /dev/null
+++ b/etc/profile-a-l/firedragon.profile
@@ -0,0 +1,26 @@
1# Firejail profile for FireDragon
2# Description: Librewolf fork with enhanced KDE integration
3# This file is overwritten after every install/update
4# Persistent local customizations
5include firedragon.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.cache/firedragon
10noblacklist ${HOME}/.firedragon
11
12mkdir ${HOME}/.cache/firedragon
13mkdir ${HOME}/.firedragon
14whitelist ${HOME}/.cache/firedragon
15whitelist ${HOME}/.firedragon
16
17# Add the next lines to your firedragon.local if you want to use the migration wizard.
18#noblacklist ${HOME}/.mozilla
19#whitelist ${HOME}/.mozilla
20
21# FireDragon requires a shell to launch on Arch. We can possibly remove sh though.
22# Add the next line to your firedragon.local to enable private-bin.
23#private-bin bash,dbus-launch,dbus-send,env,firedragon,python*,sh,which
24
25# Redirect
26include firefox-common.profile
diff --git a/etc/profile-a-l/flameshot.profile b/etc/profile-a-l/flameshot.profile
index 851a7c747..d1c18e690 100644
--- a/etc/profile-a-l/flameshot.profile
+++ b/etc/profile-a-l/flameshot.profile
@@ -54,9 +54,15 @@ private-bin flameshot
54private-cache 54private-cache
55private-etc alternatives,ca-certificates,crypto-policies,fonts,ld.so.conf,machine-id,pki,resolv.conf,ssl 55private-etc alternatives,ca-certificates,crypto-policies,fonts,ld.so.conf,machine-id,pki,resolv.conf,ssl
56private-dev 56private-dev
57private-tmp 57#private-tmp
58 58
59dbus-user filter 59dbus-user filter
60dbus-user.own org.dharkael.Flameshot 60dbus-user.own org.dharkael.Flameshot
61dbus-user.own org.flameshot.Flameshot 61dbus-user.own org.flameshot.Flameshot
62dbus-user.talk org.freedesktop.Notifications
63dbus-user.talk org.freedesktop.portal.Desktop
64dbus-user.talk org.gnome.Shell
65dbus-user.talk org.kde.KWin
66dbus-user.talk org.kde.StatusNotifierWatcher
67dbus-user.own org.kde.*
62dbus-system none 68dbus-system none
diff --git a/etc/profile-a-l/librewolf-nightly.profile b/etc/profile-a-l/librewolf-nightly.profile
index e6c3da608..72df5a52a 100644
--- a/etc/profile-a-l/librewolf-nightly.profile
+++ b/etc/profile-a-l/librewolf-nightly.profile
@@ -6,5 +6,8 @@ include librewolf-nightly.local
6# added by included profile 6# added by included profile
7#include globals.local 7#include globals.local
8 8
9# Add the next line to your librewolf-nightly.local to enable private-bin.
10#private-bin librewolf-nightly
11
9# Redirect 12# Redirect
10include librewolf.profile 13include librewolf.profile
diff --git a/etc/profile-a-l/librewolf.profile b/etc/profile-a-l/librewolf.profile
index 8e891a930..0934e1271 100644
--- a/etc/profile-a-l/librewolf.profile
+++ b/etc/profile-a-l/librewolf.profile
@@ -18,12 +18,40 @@ whitelist ${HOME}/.librewolf
18#noblacklist ${HOME}/.mozilla 18#noblacklist ${HOME}/.mozilla
19#whitelist ${HOME}/.mozilla 19#whitelist ${HOME}/.mozilla
20 20
21# librewolf requires a shell to launch on Arch. We can possibly remove sh though. 21# Uncomment or put in your librewolf.local one of the following whitelist to enable KeePassXC Plugin
22# Add the next line to your librewolf.local to enable private-bin. 22# NOTE: start KeePassXC before Librewolf and keep it open to allow communication between them
23#private-bin bash,dbus-launch,dbus-send,env,librewolf,python*,sh,which 23#whitelist ${RUNUSER}/kpxc_server
24#whitelist ${RUNUSER}/org.keepassxc.KeePassXC.BrowserServer
25
26whitelist /usr/share/doc
27whitelist /usr/share/gtk-doc/html
28whitelist /usr/share/mozilla
29whitelist /usr/share/webext
30include whitelist-usr-share-common.inc
31
32# Add the next line to your librewolf.local to enable private-bin (Arch Linux).
33#private-bin dbus-launch,dbus-send,librewolf,sh
24# Add the next line to your librewolf.local to enable private-etc. Note 34# Add the next line to your librewolf.local to enable private-etc. Note
25# that private-etc must first be enabled in firefox-common.local. 35# that private-etc must first be enabled in firefox-common.local.
26#private-etc librewolf 36#private-etc librewolf
27 37
38dbus-user filter
39# Uncomment or put in your librewolf.local to enable native notifications.
40#dbus-user.talk org.freedesktop.Notifications
41# Uncomment or put in your librewolf.local to allow to inhibit screensavers
42#dbus-user.talk org.freedesktop.ScreenSaver
43# Uncomment or put in your librewolf.local for plasma browser integration
44#dbus-user.own org.mpris.MediaPlayer2.plasma-browser-integration
45#dbus-user.talk org.kde.JobViewServer
46#dbus-user.talk org.kde.kuiserver
47# Uncomment or put in your librewolf.local to allow screen sharing under wayland.
48#whitelist ${RUNUSER}/pipewire-0
49#dbus-user.talk org.freedesktop.portal.*
50# Also uncomment or put in your librewolf.local if screen sharing sharing still
51# does not work with the above lines (might depend on the portal
52# implementation)
53#ignore noroot
54ignore dbus-user none
55
28# Redirect 56# Redirect
29include firefox-common.profile 57include firefox-common.profile
diff --git a/etc/profile-a-l/sway.profile b/etc/profile-a-l/sway.profile
new file mode 100644
index 000000000..4637419bf
--- /dev/null
+++ b/etc/profile-a-l/sway.profile
@@ -0,0 +1,19 @@
1# Firejail profile for Sway
2# Description: i3-compatible Wayland compositor
3# This file is overwritten after every install/update
4# Persistent local customizations
5include sway.local
6# Persistent global definitions
7include globals.local
8
9# all applications started in sway will run in this profile
10noblacklist ${HOME}/.config/sway
11# sway uses ~/.config/i3 as fallback if there is no ~/.config/sway
12noblacklist ${HOME}/.config/i3
13include disable-common.inc
14
15caps.drop all
16netfilter
17noroot
18protocol unix,inet,inet6
19seccomp