aboutsummaryrefslogtreecommitdiffstats
path: root/etc
diff options
context:
space:
mode:
Diffstat (limited to 'etc')
-rw-r--r--etc/0ad.profile1
-rw-r--r--etc/7z.profile6
-rw-r--r--etc/7za.profile1
-rw-r--r--etc/7zr.profile1
-rw-r--r--etc/QMediathekView.profile1
-rw-r--r--etc/QOwnNotes.profile2
-rw-r--r--etc/Viber.profile4
-rw-r--r--etc/Xephyr.profile1
-rw-r--r--etc/Xvfb.profile2
-rw-r--r--etc/acat.profile1
-rw-r--r--etc/adiff.profile1
-rw-r--r--etc/akonadi_control.profile5
-rw-r--r--etc/akregator.profile2
-rw-r--r--etc/allow-common-devel.inc17
-rw-r--r--etc/als.profile1
-rw-r--r--etc/android-studio.profile8
-rw-r--r--etc/aosp.profile8
-rw-r--r--etc/apack.profile1
-rw-r--r--etc/arepack.profile1
-rw-r--r--etc/asunder.profile1
-rw-r--r--etc/atom.profile15
-rw-r--r--etc/atool.profile2
-rw-r--r--etc/aunpack.profile1
-rw-r--r--etc/baloo_file.profile2
-rw-r--r--etc/baobab.profile2
-rw-r--r--etc/basilisk.profile2
-rw-r--r--etc/bibletime.profile2
-rw-r--r--etc/brackets.profile12
-rw-r--r--etc/bsdtar.profile2
-rw-r--r--etc/bunzip2.profile1
-rw-r--r--etc/bzcat.profile15
-rw-r--r--etc/bzip2.profile1
-rw-r--r--etc/checkbashisms.profile2
-rw-r--r--etc/clementine.profile2
-rw-r--r--etc/code.profile12
-rw-r--r--etc/conplay.profile2
-rw-r--r--etc/dconf-editor.profile2
-rw-r--r--etc/devhelp.profile2
-rw-r--r--etc/dig.profile2
-rw-r--r--etc/dino.profile1
-rw-r--r--etc/disable-common.inc9
-rw-r--r--etc/disable-programs.inc38
-rw-r--r--etc/dnscrypt-proxy.profile1
-rw-r--r--etc/dnsmasq.profile1
-rw-r--r--etc/emacs.profile8
-rw-r--r--etc/eo-common.profile2
-rw-r--r--etc/etr.profile2
-rw-r--r--etc/falkon.profile3
-rw-r--r--etc/feedreader.profile1
-rw-r--r--etc/ffmpegthumbnailer.profile1
-rw-r--r--etc/ffplay.profile1
-rw-r--r--etc/ffprobe.profile1
-rw-r--r--etc/file-roller.profile2
-rw-r--r--etc/file.profile5
-rw-r--r--etc/firefox-common.profile2
-rw-r--r--etc/firefox.profile2
-rw-r--r--etc/firejail.config3
-rw-r--r--etc/frozen-bubble.profile1
-rw-r--r--etc/geany.profile10
-rw-r--r--etc/gedit.profile10
-rw-r--r--etc/ghostwriter.profile6
-rw-r--r--etc/gimp.profile2
-rw-r--r--etc/git.profile1
-rw-r--r--etc/gitg.profile4
-rw-r--r--etc/gnome-builder.profile15
-rw-r--r--etc/gnome-character-map.profile1
-rw-r--r--etc/gnome-photos.profile1
-rw-r--r--etc/gnome-schedule.profile15
-rw-r--r--etc/gnome-system-log.profile2
-rw-r--r--etc/gunzip.profile1
-rw-r--r--etc/gwenview.profile2
-rw-r--r--etc/hedgewars.profile1
-rw-r--r--etc/i2prouter.profile71
-rw-r--r--etc/idea.sh.profile8
-rw-r--r--etc/itch.profile3
-rw-r--r--etc/kiwix-desktop.profile49
-rw-r--r--etc/kmail.profile2
-rw-r--r--etc/kwin_x11.profile3
-rw-r--r--etc/less.profile4
-rw-r--r--etc/libreoffice.profile1
-rw-r--r--etc/lrunzip.profile1
-rw-r--r--etc/lrz.profile1
-rw-r--r--etc/lrzcat.profile1
-rw-r--r--etc/lrzip.profile1
-rw-r--r--etc/lrztar.profile1
-rw-r--r--etc/lrzuntar.profile1
-rw-r--r--etc/mencoder.profile1
-rw-r--r--etc/mousepad.profile1
-rw-r--r--etc/mpd.profile2
-rw-r--r--etc/mpsyt.profile6
-rw-r--r--etc/mpv.profile1
-rw-r--r--etc/mutt.profile1
-rw-r--r--etc/nano.profile1
-rw-r--r--etc/nethack-vultures.profile1
-rw-r--r--etc/okular.profile2
-rw-r--r--etc/open-invaders.profile1
-rw-r--r--etc/p7zip.profile1
-rw-r--r--etc/palemoon.profile2
-rw-r--r--etc/pdftotext.profile1
-rw-r--r--etc/ping.profile1
-rw-r--r--etc/pingus.profile1
-rw-r--r--etc/pluma.profile10
-rw-r--r--etc/ppsspp.profile2
-rw-r--r--etc/pycharm-community.profile7
-rw-r--r--etc/pzstd.profile5
-rw-r--r--etc/qemu-system-x86_64.profile1
-rw-r--r--etc/qgis.profile2
-rw-r--r--etc/qt-faststart.profile1
-rw-r--r--etc/qupzilla.profile23
-rw-r--r--etc/qutebrowser.profile4
-rw-r--r--etc/riot-desktop.profile3
-rw-r--r--etc/rnano.profile1
-rw-r--r--etc/rsync-download_only.profile55
-rw-r--r--etc/scallion.profile1
-rw-r--r--etc/scp.profile1
-rw-r--r--etc/seahorse-daemon.profile1
-rw-r--r--etc/seahorse-tool.profile2
-rw-r--r--etc/seahorse.profile1
-rw-r--r--etc/sftp.profile1
-rw-r--r--etc/shotcut.profile1
-rw-r--r--etc/simple-scan.profile2
-rw-r--r--etc/simutrans.profile1
-rw-r--r--etc/skanlite.profile2
-rw-r--r--etc/skypeforlinux.profile2
-rw-r--r--etc/slack.profile3
-rw-r--r--etc/sqlitebrowser.profile2
-rw-r--r--etc/ssh-agent.profile1
-rw-r--r--etc/ssh.profile1
-rw-r--r--etc/standardnotes-desktop.profile2
-rw-r--r--etc/start-tor-browser.desktop.profile3
-rw-r--r--etc/start-tor-browser.profile2
-rw-r--r--etc/steam.profile2
-rw-r--r--etc/strings.profile2
-rw-r--r--etc/subdownloader.profile1
-rw-r--r--etc/supertux2.profile2
-rw-r--r--etc/supertuxkart.profile2
-rw-r--r--etc/tb-starter-wrapper.profile2
-rw-r--r--etc/teamspeak3.profile2
-rw-r--r--etc/templates/profile.template3
-rw-r--r--etc/templates/syscalls.txt26
-rw-r--r--etc/tor-browser.profile10
-rw-r--r--etc/torbrowser-launcher.profile6
-rw-r--r--etc/transmission-cli.profile35
-rw-r--r--etc/transmission-common.profile46
-rw-r--r--etc/transmission-create.profile8
-rw-r--r--etc/transmission-daemon.profile40
-rw-r--r--etc/transmission-edit.profile8
-rw-r--r--etc/transmission-gtk.profile45
-rw-r--r--etc/transmission-qt.profile45
-rw-r--r--etc/transmission-remote-cli.profile16
-rw-r--r--etc/transmission-remote-gtk.profile22
-rw-r--r--etc/transmission-remote.profile35
-rw-r--r--etc/transmission-show.profile35
-rw-r--r--etc/unknown-horizons.profile1
-rw-r--r--etc/unzstd.profile5
-rw-r--r--etc/vim.profile7
-rw-r--r--etc/virtualbox.profile2
-rw-r--r--etc/warzone2100.profile1
-rw-r--r--etc/webstorm.profile7
-rw-r--r--etc/wesnoth.profile1
-rw-r--r--etc/whalebird.profile45
-rw-r--r--etc/whois.profile2
-rw-r--r--etc/wine.profile2
-rw-r--r--etc/xed.profile1
-rw-r--r--etc/xmr-stak.profile1
-rw-r--r--etc/xpra.profile1
-rw-r--r--etc/youtube-dl.profile2
-rw-r--r--etc/zathura.profile1
-rw-r--r--etc/zpaq.profile1
-rw-r--r--etc/zstd.profile42
-rw-r--r--etc/zstdcat.profile5
-rw-r--r--etc/zstdgrep.profile5
-rw-r--r--etc/zstdless.profile5
-rw-r--r--etc/zstdmt.profile5
-rw-r--r--etc/zulip.profile47
175 files changed, 743 insertions, 453 deletions
diff --git a/etc/0ad.profile b/etc/0ad.profile
index 88c9c453b..565d42567 100644
--- a/etc/0ad.profile
+++ b/etc/0ad.profile
@@ -24,6 +24,7 @@ whitelist ${HOME}/.cache/0ad
24whitelist ${HOME}/.config/0ad 24whitelist ${HOME}/.config/0ad
25whitelist ${HOME}/.local/share/0ad 25whitelist ${HOME}/.local/share/0ad
26include whitelist-common.inc 26include whitelist-common.inc
27include whitelist-var-common.inc
27 28
28caps.drop all 29caps.drop all
29netfilter 30netfilter
diff --git a/etc/7z.profile b/etc/7z.profile
index 15e99e936..284aa37a2 100644
--- a/etc/7z.profile
+++ b/etc/7z.profile
@@ -13,7 +13,9 @@ include disable-interpreters.inc
13include disable-passwdmgr.inc 13include disable-passwdmgr.inc
14include disable-programs.inc 14include disable-programs.inc
15 15
16apparmor
16caps.drop all 17caps.drop all
18hostname 7z
17ipc-namespace 19ipc-namespace
18machine-id 20machine-id
19net none 21net none
@@ -33,4 +35,8 @@ shell none
33tracelog 35tracelog
34x11 none 36x11 none
35 37
38#private-bin 7z,7z*,p7zip
39private-cache
36private-dev 40private-dev
41
42memory-deny-write-execute
diff --git a/etc/7za.profile b/etc/7za.profile
index 28e483a8c..14188e1f0 100644
--- a/etc/7za.profile
+++ b/etc/7za.profile
@@ -1,5 +1,6 @@
1# Firejail profile for 7za 1# Firejail profile for 7za
2# This file is overwritten after every install/update 2# This file is overwritten after every install/update
3quiet
3# Persistent local customizations 4# Persistent local customizations
4include 7za.local 5include 7za.local
5# Persistent global definitions 6# Persistent global definitions
diff --git a/etc/7zr.profile b/etc/7zr.profile
index 1b85badbc..2cb42fa40 100644
--- a/etc/7zr.profile
+++ b/etc/7zr.profile
@@ -1,5 +1,6 @@
1# Firejail profile for 7zr 1# Firejail profile for 7zr
2# This file is overwritten after every install/update 2# This file is overwritten after every install/update
3quiet
3# Persistent local customizations 4# Persistent local customizations
4include 7zr.local 5include 7zr.local
5# Persistent global definitions 6# Persistent global definitions
diff --git a/etc/QMediathekView.profile b/etc/QMediathekView.profile
index ece681c35..eb21349a9 100644
--- a/etc/QMediathekView.profile
+++ b/etc/QMediathekView.profile
@@ -39,6 +39,7 @@ nonewprivs
39noroot 39noroot
40notv 40notv
41nou2f 41nou2f
42novideo
42protocol unix,inet,inet6,netlink 43protocol unix,inet,inet6,netlink
43seccomp 44seccomp
44shell none 45shell none
diff --git a/etc/QOwnNotes.profile b/etc/QOwnNotes.profile
index c774f3a60..af7c10448 100644
--- a/etc/QOwnNotes.profile
+++ b/etc/QOwnNotes.profile
@@ -20,7 +20,7 @@ include disable-programs.inc
20include disable-xdg.inc 20include disable-xdg.inc
21 21
22mkdir ${HOME}/Nextcloud/Notes 22mkdir ${HOME}/Nextcloud/Notes
23mkdir ${HOME}.config/PBE 23mkdir ${HOME}/.config/PBE
24mkdir ${HOME}/.local/share/PBE 24mkdir ${HOME}/.local/share/PBE
25whitelist ${DOCUMENTS} 25whitelist ${DOCUMENTS}
26whitelist ${HOME}/Nextcloud/Notes 26whitelist ${HOME}/Nextcloud/Notes
diff --git a/etc/Viber.profile b/etc/Viber.profile
index ecc500769..925e130de 100644
--- a/etc/Viber.profile
+++ b/etc/Viber.profile
@@ -28,12 +28,10 @@ nonewprivs
28noroot 28noroot
29notv 29notv
30protocol unix,inet,inet6 30protocol unix,inet,inet6
31seccomp 31seccomp !chroot
32shell none 32shell none
33 33
34disable-mnt 34disable-mnt
35private-bin awk,bash,dig,sh,Viber 35private-bin awk,bash,dig,sh,Viber
36private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,hosts,localtime,machine-id,mailcap,nsswitch.conf,pki,proxychains.conf,pulse,resolv.conf,ssl,X11 36private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,hosts,localtime,machine-id,mailcap,nsswitch.conf,pki,proxychains.conf,pulse,resolv.conf,ssl,X11
37private-tmp 37private-tmp
38
39env QTWEBENGINE_DISABLE_SANDBOX=1
diff --git a/etc/Xephyr.profile b/etc/Xephyr.profile
index 5ef75022b..ab5fdf942 100644
--- a/etc/Xephyr.profile
+++ b/etc/Xephyr.profile
@@ -1,6 +1,7 @@
1# Firejail profile for Xephyr 1# Firejail profile for Xephyr
2# This file is overwritten after every install/update 2# This file is overwritten after every install/update
3# Persistent local customizations 3# Persistent local customizations
4quiet
4include Xephyr.local 5include Xephyr.local
5# Persistent global definitions 6# Persistent global definitions
6include globals.local 7include globals.local
diff --git a/etc/Xvfb.profile b/etc/Xvfb.profile
index 3ecda698e..937d02d60 100644
--- a/etc/Xvfb.profile
+++ b/etc/Xvfb.profile
@@ -1,6 +1,7 @@
1# Firejail profile for Xvfb 1# Firejail profile for Xvfb
2# Description: Virtual Framebuffer 'fake' X server 2# Description: Virtual Framebuffer 'fake' X server
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include Xvfb.local 6include Xvfb.local
6# Persistent global definitions 7# Persistent global definitions
@@ -30,6 +31,7 @@ nonewprivs
30nosound 31nosound
31notv 32notv
32nou2f 33nou2f
34novideo
33protocol unix 35protocol unix
34seccomp 36seccomp
35shell none 37shell none
diff --git a/etc/acat.profile b/etc/acat.profile
index f35adf3dc..522d8db4e 100644
--- a/etc/acat.profile
+++ b/etc/acat.profile
@@ -1,5 +1,6 @@
1# Firejail profile for acat 1# Firejail profile for acat
2# This file is overwritten after every install/update 2# This file is overwritten after every install/update
3quiet
3# Persistent local customizations 4# Persistent local customizations
4include acat.local 5include acat.local
5# Persistent global definitions 6# Persistent global definitions
diff --git a/etc/adiff.profile b/etc/adiff.profile
index f22a27e79..a80886d56 100644
--- a/etc/adiff.profile
+++ b/etc/adiff.profile
@@ -1,5 +1,6 @@
1# Firejail profile for adiff 1# Firejail profile for adiff
2# This file is overwritten after every install/update 2# This file is overwritten after every install/update
3quiet
3# Persistent local customizations 4# Persistent local customizations
4include adiff.local 5include adiff.local
5# Persistent global definitions 6# Persistent global definitions
diff --git a/etc/akonadi_control.profile b/etc/akonadi_control.profile
index 1c16f940e..ffc613f1e 100644
--- a/etc/akonadi_control.profile
+++ b/etc/akonadi_control.profile
@@ -17,6 +17,7 @@ noblacklist ${HOME}/.local/share/apps/korganizer
17noblacklist ${HOME}/.local/share/contacts 17noblacklist ${HOME}/.local/share/contacts
18noblacklist ${HOME}/.local/share/local-mail 18noblacklist ${HOME}/.local/share/local-mail
19noblacklist ${HOME}/.local/share/notes 19noblacklist ${HOME}/.local/share/notes
20noblacklist /sbin
20noblacklist /tmp/akonadi-* 21noblacklist /tmp/akonadi-*
21noblacklist /usr/sbin 22noblacklist /usr/sbin
22 23
@@ -45,8 +46,8 @@ nosound
45notv 46notv
46nou2f 47nou2f
47novideo 48novideo
48# protocol unix,inet,inet6 49# protocol unix,inet,inet6,netlink
49# seccomp.drop @cpu-emulation,@debug,@obsolete,@privileged,@resources,add_key,fanotify_init,io_cancel,io_destroy,kcmp,keyctl,name_to_handle_at,ni_syscall,open_by_handle_at,personality,process_vm_readv,ptrace,remap_file_pages,request_key,syslog,umount,userfaultfd,vmsplice 50# seccomp !io_getevents,!io_setup,!io_submit,!ioprio_set
50tracelog 51tracelog
51 52
52private-dev 53private-dev
diff --git a/etc/akregator.profile b/etc/akregator.profile
index 466eff22d..34933f283 100644
--- a/etc/akregator.profile
+++ b/etc/akregator.profile
@@ -36,7 +36,7 @@ nou2f
36novideo 36novideo
37protocol unix,inet,inet6,netlink 37protocol unix,inet,inet6,netlink
38# chroot syscalls are needed for setting up the built-in sandbox 38# chroot syscalls are needed for setting up the built-in sandbox
39seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice 39seccomp !chroot
40shell none 40shell none
41 41
42disable-mnt 42disable-mnt
diff --git a/etc/allow-common-devel.inc b/etc/allow-common-devel.inc
new file mode 100644
index 000000000..1d794462c
--- /dev/null
+++ b/etc/allow-common-devel.inc
@@ -0,0 +1,17 @@
1# Rust
2noblacklist ${HOME}/.cargo/config
3noblacklist ${HOME}/.cargo/registry
4
5# Git
6noblacklist ${HOME}/.config/git
7noblacklist ${HOME}/.gitconfig
8noblacklist ${HOME}/.git-credentials
9
10# Python
11noblacklist ${HOME}/.python-history
12noblacklist ${HOME}/.python_history
13noblacklist ${HOME}/.pythonhist
14
15# Java
16noblacklist ${HOME}/.gradle
17noblacklist ${HOME}/.java
diff --git a/etc/als.profile b/etc/als.profile
index aa7f29337..5eae228b6 100644
--- a/etc/als.profile
+++ b/etc/als.profile
@@ -1,5 +1,6 @@
1# Firejail profile for als 1# Firejail profile for als
2# This file is overwritten after every install/update 2# This file is overwritten after every install/update
3quiet
3# Persistent local customizations 4# Persistent local customizations
4include als.local 5include als.local
5# Persistent global definitions 6# Persistent global definitions
diff --git a/etc/android-studio.profile b/etc/android-studio.profile
index ff7fb6711..2e4e564dd 100644
--- a/etc/android-studio.profile
+++ b/etc/android-studio.profile
@@ -7,17 +7,15 @@ include globals.local
7 7
8noblacklist ${HOME}/.AndroidStudio* 8noblacklist ${HOME}/.AndroidStudio*
9noblacklist ${HOME}/.android 9noblacklist ${HOME}/.android
10noblacklist ${HOME}/.config/git
11noblacklist ${HOME}/.gitconfig
12noblacklist ${HOME}/.git-credentials
13noblacklist ${HOME}/.gradle
14noblacklist ${HOME}/.jack-server 10noblacklist ${HOME}/.jack-server
15noblacklist ${HOME}/.jack-settings 11noblacklist ${HOME}/.jack-settings
16noblacklist ${HOME}/.java
17noblacklist ${HOME}/.local/share/JetBrains 12noblacklist ${HOME}/.local/share/JetBrains
18noblacklist ${HOME}/.ssh 13noblacklist ${HOME}/.ssh
19noblacklist ${HOME}/.tooling 14noblacklist ${HOME}/.tooling
20 15
16# Allows files commonly used by IDEs
17include allow-common-devel.inc
18
21include disable-common.inc 19include disable-common.inc
22include disable-passwdmgr.inc 20include disable-passwdmgr.inc
23include disable-programs.inc 21include disable-programs.inc
diff --git a/etc/aosp.profile b/etc/aosp.profile
index 701bf4733..a5b1ba9f1 100644
--- a/etc/aosp.profile
+++ b/etc/aosp.profile
@@ -7,18 +7,16 @@ include globals.local
7 7
8noblacklist ${HOME}/.android 8noblacklist ${HOME}/.android
9noblacklist ${HOME}/.bash_history 9noblacklist ${HOME}/.bash_history
10noblacklist ${HOME}/.config/git
11noblacklist ${HOME}/.gitconfig
12noblacklist ${HOME}/.git-credentials
13noblacklist ${HOME}/.gradle
14noblacklist ${HOME}/.jack-server 10noblacklist ${HOME}/.jack-server
15noblacklist ${HOME}/.jack-settings 11noblacklist ${HOME}/.jack-settings
16noblacklist ${HOME}/.java
17noblacklist ${HOME}/.repo_.gitconfig.json 12noblacklist ${HOME}/.repo_.gitconfig.json
18noblacklist ${HOME}/.repoconfig 13noblacklist ${HOME}/.repoconfig
19noblacklist ${HOME}/.ssh 14noblacklist ${HOME}/.ssh
20noblacklist ${HOME}/.tooling 15noblacklist ${HOME}/.tooling
21 16
17# Allows files commonly used by IDEs
18include allow-common-devel.inc
19
22include disable-common.inc 20include disable-common.inc
23include disable-passwdmgr.inc 21include disable-passwdmgr.inc
24include disable-programs.inc 22include disable-programs.inc
diff --git a/etc/apack.profile b/etc/apack.profile
index b09d3d718..9fef911af 100644
--- a/etc/apack.profile
+++ b/etc/apack.profile
@@ -1,5 +1,6 @@
1# Firejail profile for apack 1# Firejail profile for apack
2# This file is overwritten after every install/update 2# This file is overwritten after every install/update
3quiet
3# Persistent local customizations 4# Persistent local customizations
4include apack.local 5include apack.local
5# Persistent global definitions 6# Persistent global definitions
diff --git a/etc/arepack.profile b/etc/arepack.profile
index d23fc21db..012f2f049 100644
--- a/etc/arepack.profile
+++ b/etc/arepack.profile
@@ -1,5 +1,6 @@
1# Firejail profile for arepack 1# Firejail profile for arepack
2# This file is overwritten after every install/update 2# This file is overwritten after every install/update
3quiet
3# Persistent local customizations 4# Persistent local customizations
4include arepack.local 5include arepack.local
5# Persistent global definitions 6# Persistent global definitions
diff --git a/etc/asunder.profile b/etc/asunder.profile
index fc10739aa..1f3acd735 100644
--- a/etc/asunder.profile
+++ b/etc/asunder.profile
@@ -30,6 +30,7 @@ nodbus
30nonewprivs 30nonewprivs
31noroot 31noroot
32nou2f 32nou2f
33novideo
33protocol unix,inet,inet6 34protocol unix,inet,inet6
34seccomp 35seccomp
35shell none 36shell none
diff --git a/etc/atom.profile b/etc/atom.profile
index 8928baf5d..b9cb49d08 100644
--- a/etc/atom.profile
+++ b/etc/atom.profile
@@ -8,18 +8,9 @@ include globals.local
8 8
9noblacklist ${HOME}/.atom 9noblacklist ${HOME}/.atom
10noblacklist ${HOME}/.config/Atom 10noblacklist ${HOME}/.config/Atom
11# allow rust 11
12noblacklist ${HOME}/.cargo/config 12# Allows files commonly used by IDEs
13noblacklist ${HOME}/.cargo/registry 13include allow-common-devel.inc
14# allow git config files
15noblacklist ${HOME}/.config/git
16noblacklist ${HOME}/.gitconfig
17noblacklist ${HOME}/.git-credentials
18# allow python dev files
19noblacklist ${HOME}/.python-history
20noblacklist ${HOME}/.python_history
21noblacklist ${HOME}/.pythonhist
22noblacklist ${HOME}/.pythonrc.py
23 14
24include disable-common.inc 15include disable-common.inc
25include disable-exec.inc 16include disable-exec.inc
diff --git a/etc/atool.profile b/etc/atool.profile
index c9d950259..fb75c8408 100644
--- a/etc/atool.profile
+++ b/etc/atool.profile
@@ -1,7 +1,7 @@
1# Firejail profile for atool 1# Firejail profile for atool
2# Description: Tool for managing file archives of various types 2# Description: Tool for managing file archives of various types
3quiet
4# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations 5# Persistent local customizations
6include atool.local 6include atool.local
7# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/aunpack.profile b/etc/aunpack.profile
index c119ed9ad..6ce4aa491 100644
--- a/etc/aunpack.profile
+++ b/etc/aunpack.profile
@@ -1,5 +1,6 @@
1# Firejail profile for aunpack 1# Firejail profile for aunpack
2# This file is overwritten after every install/update 2# This file is overwritten after every install/update
3quiet
3# Persistent local customizations 4# Persistent local customizations
4include aunpack.local 5include aunpack.local
5# Persistent global definitions 6# Persistent global definitions
diff --git a/etc/baloo_file.profile b/etc/baloo_file.profile
index f46987cc7..6f7638fa3 100644
--- a/etc/baloo_file.profile
+++ b/etc/baloo_file.profile
@@ -39,7 +39,7 @@ nou2f
39novideo 39novideo
40protocol unix 40protocol unix
41# blacklisting of ioprio_set system calls breaks baloo_file 41# blacklisting of ioprio_set system calls breaks baloo_file
42seccomp.drop @cpu-emulation,@debug,@obsolete,@privileged,@resources,add_key,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,kcmp,keyctl,name_to_handle_at,ni_syscall,open_by_handle_at,personality,process_vm_readv,ptrace,remap_file_pages,request_key,syslog,umount,userfaultfd,vmsplice 42seccomp !ioprio_set
43shell none 43shell none
44# x11 xorg 44# x11 xorg
45 45
diff --git a/etc/baobab.profile b/etc/baobab.profile
index d2980f75c..c419aa202 100644
--- a/etc/baobab.profile
+++ b/etc/baobab.profile
@@ -32,5 +32,3 @@ shell none
32private-bin baobab 32private-bin baobab
33private-dev 33private-dev
34private-tmp 34private-tmp
35
36#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/basilisk.profile b/etc/basilisk.profile
index 5bc91dc74..8dc3847a0 100644
--- a/etc/basilisk.profile
+++ b/etc/basilisk.profile
@@ -14,8 +14,8 @@ whitelist ${HOME}/.cache/moonchild productions/basilisk
14whitelist ${HOME}/.moonchild productions 14whitelist ${HOME}/.moonchild productions
15 15
16# Basilisk can use the full firejail seccomp filter (unlike firefox >= 60) 16# Basilisk can use the full firejail seccomp filter (unlike firefox >= 60)
17ignore seccomp.drop
18seccomp 17seccomp
18ignore seccomp
19 19
20#private-bin basilisk 20#private-bin basilisk
21# private-etc must first be enabled in firefox-common.profile 21# private-etc must first be enabled in firefox-common.profile
diff --git a/etc/bibletime.profile b/etc/bibletime.profile
index 4f1b05c88..0de3bc480 100644
--- a/etc/bibletime.profile
+++ b/etc/bibletime.profile
@@ -42,7 +42,7 @@ notv
42nou2f 42nou2f
43novideo 43novideo
44protocol unix,inet,inet6,netlink 44protocol unix,inet,inet6,netlink
45seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice 45seccomp !chroot
46shell none 46shell none
47 47
48disable-mnt 48disable-mnt
diff --git a/etc/brackets.profile b/etc/brackets.profile
index 3e157d841..13a3bef79 100644
--- a/etc/brackets.profile
+++ b/etc/brackets.profile
@@ -8,13 +8,9 @@ include globals.local
8noblacklist ${HOME}/.config/Brackets 8noblacklist ${HOME}/.config/Brackets
9#noblacklist /opt/brackets/ 9#noblacklist /opt/brackets/
10#noblacklist /opt/google/ 10#noblacklist /opt/google/
11# Uncomment the next two lines if you are developing rust. 11
12# or put it in your brackets.local 12# Allows files commonly used by IDEs
13#noblacklist ${HOME}/.cargo/config 13include allow-common-devel.inc
14#noblacklist ${HOME}/.cargo/registry
15noblacklist ${HOME}/.config/git
16noblacklist ${HOME}/.gitconfig
17noblacklist ${HOME}/.git-credentials
18 14
19include disable-common.inc 15include disable-common.inc
20include disable-passwdmgr.inc 16include disable-passwdmgr.inc
@@ -31,7 +27,7 @@ notv
31nou2f 27nou2f
32novideo 28novideo
33protocol unix,inet,inet6,netlink 29protocol unix,inet,inet6,netlink
34seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,iopl,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,pciconfig_iobase,pciconfig_read,pciconfig_write,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,s390_mmio_read,s390_mmio_write,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice 30seccomp !chroot,!ioperm
35shell none 31shell none
36 32
37private-cache 33private-cache
diff --git a/etc/bsdtar.profile b/etc/bsdtar.profile
index 1411ce7bd..17c67ed26 100644
--- a/etc/bsdtar.profile
+++ b/etc/bsdtar.profile
@@ -20,8 +20,8 @@ ipc-namespace
20machine-id 20machine-id
21net none 21net none
22no3d 22no3d
23nodvd
24nodbus 23nodbus
24nodvd
25nogroups 25nogroups
26nonewprivs 26nonewprivs
27# noroot 27# noroot
diff --git a/etc/bunzip2.profile b/etc/bunzip2.profile
index ff86cbdfc..37b47c2ce 100644
--- a/etc/bunzip2.profile
+++ b/etc/bunzip2.profile
@@ -1,6 +1,7 @@
1# Firejail profile for bunzip2 1# Firejail profile for bunzip2
2# Description: A high-quality data compression program 2# Description: A high-quality data compression program
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include bunzip2.local 6include bunzip2.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/bzcat.profile b/etc/bzcat.profile
new file mode 100644
index 000000000..edefb6bb8
--- /dev/null
+++ b/etc/bzcat.profile
@@ -0,0 +1,15 @@
1# Firejail profile for bzcat
2# Description: A high-quality data compression program
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include bzcat.local
7# Persistent global definitions
8# added by included profile
9#include globals.local
10
11ignore read-write
12read-only ${HOME}
13
14# Redirect
15include gzip.profile
diff --git a/etc/bzip2.profile b/etc/bzip2.profile
index 0f2fdd35a..0756e0537 100644
--- a/etc/bzip2.profile
+++ b/etc/bzip2.profile
@@ -1,6 +1,7 @@
1# Firejail profile for bzip2 1# Firejail profile for bzip2
2# Description: A high-quality data compression program 2# Description: A high-quality data compression program
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include bzip2.local 6include bzip2.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/checkbashisms.profile b/etc/checkbashisms.profile
index fe3202cea..7b2d344e5 100644
--- a/etc/checkbashisms.profile
+++ b/etc/checkbashisms.profile
@@ -44,7 +44,7 @@ x11 none
44 44
45private-cache 45private-cache
46private-dev 46private-dev
47private-lib perl* 47private-lib libfreebl3.so,perl*
48private-tmp 48private-tmp
49 49
50memory-deny-write-execute 50memory-deny-write-execute
diff --git a/etc/clementine.profile b/etc/clementine.profile
index 147b0de4b..4d92157d0 100644
--- a/etc/clementine.profile
+++ b/etc/clementine.profile
@@ -27,7 +27,7 @@ nou2f
27novideo 27novideo
28protocol unix,inet,inet6 28protocol unix,inet,inet6
29# blacklisting of ioprio_set system calls breaks clementine 29# blacklisting of ioprio_set system calls breaks clementine
30seccomp.drop @cpu-emulation,@debug,@obsolete,@privileged,@resources,add_key,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,kcmp,keyctl,name_to_handle_at,ni_syscall,open_by_handle_at,personality,process_vm_readv,ptrace,remap_file_pages,request_key,syslog,umount,userfaultfd,vmsplice 30seccomp !ioprio_set
31 31
32private-dev 32private-dev
33private-tmp 33private-tmp
diff --git a/etc/code.profile b/etc/code.profile
index 6faf429e1..7ac4e1619 100644
--- a/etc/code.profile
+++ b/etc/code.profile
@@ -5,20 +5,14 @@ include code.local
5# Persistent global definitions 5# Persistent global definitions
6include globals.local 6include globals.local
7 7
8noblacklist ${HOME}/.cargo/config
9noblacklist ${HOME}/.cargo/registry
10noblacklist ${HOME}/.config/Code 8noblacklist ${HOME}/.config/Code
11noblacklist ${HOME}/.config/Code - OSS 9noblacklist ${HOME}/.config/Code - OSS
12noblacklist ${HOME}/.config/git
13noblacklist ${HOME}/.gitconfig
14noblacklist ${HOME}/.git-credentials
15noblacklist ${HOME}/.python-history
16noblacklist ${HOME}/.python_history
17noblacklist ${HOME}/.pythonhist
18noblacklist ${HOME}/.pythonrc.py
19noblacklist ${HOME}/.vscode 10noblacklist ${HOME}/.vscode
20noblacklist ${HOME}/.vscode-oss 11noblacklist ${HOME}/.vscode-oss
21 12
13# Allows files commonly used by IDEs
14include allow-common-devel.inc
15
22include disable-common.inc 16include disable-common.inc
23include disable-passwdmgr.inc 17include disable-passwdmgr.inc
24include disable-programs.inc 18include disable-programs.inc
diff --git a/etc/conplay.profile b/etc/conplay.profile
index 101ce2f17..d0ad7c753 100644
--- a/etc/conplay.profile
+++ b/etc/conplay.profile
@@ -1,4 +1,6 @@
1# Firejail profile for conplay 1# Firejail profile for conplay
2# Description: MPEG audio player/decoder
3# This file is overwritten after every install/update
2# Persistent local customizations 4# Persistent local customizations
3include conplay.local 5include conplay.local
4# Persistent global definitions 6# Persistent global definitions
diff --git a/etc/dconf-editor.profile b/etc/dconf-editor.profile
index 7cd39ca6a..29f676535 100644
--- a/etc/dconf-editor.profile
+++ b/etc/dconf-editor.profile
@@ -41,5 +41,3 @@ private-dev
41private-etc alternatives,dconf,fonts,gtk-3.0,machine-id 41private-etc alternatives,dconf,fonts,gtk-3.0,machine-id
42private-lib 42private-lib
43private-tmp 43private-tmp
44
45# memory-deny-write-execute
diff --git a/etc/devhelp.profile b/etc/devhelp.profile
index 60bebb0c9..02b752b5f 100644
--- a/etc/devhelp.profile
+++ b/etc/devhelp.profile
@@ -41,6 +41,6 @@ private-dev
41private-etc alternatives,dconf,fonts,ld.so.cache,machine-id,ssl 41private-etc alternatives,dconf,fonts,ld.so.cache,machine-id,ssl
42private-tmp 42private-tmp
43 43
44#memory-deny-write-execute - breaks on Arch (see issue 1803) 44#memory-deny-write-execute - breaks on Arch (see issue #1803)
45 45
46read-only ${HOME} 46read-only ${HOME}
diff --git a/etc/dig.profile b/etc/dig.profile
index 6f2c1f755..611cbf026 100644
--- a/etc/dig.profile
+++ b/etc/dig.profile
@@ -1,7 +1,7 @@
1# Firejail profile for dig 1# Firejail profile for dig
2# Description: DNS lookup utility 2# Description: DNS lookup utility
3quiet
4# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations 5# Persistent local customizations
6include dig.local 6include dig.local
7# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/dino.profile b/etc/dino.profile
index f7b220936..82ddf2819 100644
--- a/etc/dino.profile
+++ b/etc/dino.profile
@@ -1,4 +1,5 @@
1# Firejail profile for dino 1# Firejail profile for dino
2# Description: Modern XMPP Chat Client using GTK+/Vala
2# This file is overwritten after every install/update 3# This file is overwritten after every install/update
3# Persistent local customizations 4# Persistent local customizations
4include dino.local 5include dino.local
diff --git a/etc/disable-common.inc b/etc/disable-common.inc
index 7ca5a6b89..fe49ce2f4 100644
--- a/etc/disable-common.inc
+++ b/etc/disable-common.inc
@@ -67,6 +67,7 @@ blacklist ${HOME}/.config/khotkeysrc
67blacklist ${HOME}/.config/krunnerrc 67blacklist ${HOME}/.config/krunnerrc
68blacklist ${HOME}/.config/kscreenlockerrc 68blacklist ${HOME}/.config/kscreenlockerrc
69blacklist ${HOME}/.config/ksslcertificatemanager 69blacklist ${HOME}/.config/ksslcertificatemanager
70blacklist ${HOME}/.config/kwalletrc
70blacklist ${HOME}/.config/kwinrc 71blacklist ${HOME}/.config/kwinrc
71blacklist ${HOME}/.config/kwinrulesrc 72blacklist ${HOME}/.config/kwinrulesrc
72blacklist ${HOME}/.config/plasma-org.kde.plasma.desktop-appletsrc 73blacklist ${HOME}/.config/plasma-org.kde.plasma.desktop-appletsrc
@@ -79,6 +80,7 @@ blacklist ${HOME}/.kde/share/config/khotkeysrc
79blacklist ${HOME}/.kde/share/config/krunnerrc 80blacklist ${HOME}/.kde/share/config/krunnerrc
80blacklist ${HOME}/.kde/share/config/kscreensaverrc 81blacklist ${HOME}/.kde/share/config/kscreensaverrc
81blacklist ${HOME}/.kde/share/config/ksslcertificatemanager 82blacklist ${HOME}/.kde/share/config/ksslcertificatemanager
83blacklist ${HOME}/.kde/share/config/kwalletrc
82blacklist ${HOME}/.kde/share/config/kwinrc 84blacklist ${HOME}/.kde/share/config/kwinrc
83blacklist ${HOME}/.kde/share/config/kwinrulesrc 85blacklist ${HOME}/.kde/share/config/kwinrulesrc
84blacklist ${HOME}/.kde/share/config/plasma-desktop-appletsrc 86blacklist ${HOME}/.kde/share/config/plasma-desktop-appletsrc
@@ -89,6 +91,7 @@ blacklist ${HOME}/.kde4/share/config/khotkeysrc
89blacklist ${HOME}/.kde4/share/config/krunnerrc 91blacklist ${HOME}/.kde4/share/config/krunnerrc
90blacklist ${HOME}/.kde4/share/config/kscreensaverrc 92blacklist ${HOME}/.kde4/share/config/kscreensaverrc
91blacklist ${HOME}/.kde4/share/config/ksslcertificatemanager 93blacklist ${HOME}/.kde4/share/config/ksslcertificatemanager
94blacklist ${HOME}/.kde4/share/config/kwalletrc
92blacklist ${HOME}/.kde4/share/config/kwinrc 95blacklist ${HOME}/.kde4/share/config/kwinrc
93blacklist ${HOME}/.kde4/share/config/kwinrulesrc 96blacklist ${HOME}/.kde4/share/config/kwinrulesrc
94blacklist ${HOME}/.kde4/share/config/plasma-desktop-appletsrc 97blacklist ${HOME}/.kde4/share/config/plasma-desktop-appletsrc
@@ -281,8 +284,7 @@ read-only ${HOME}/bin
281read-only ${HOME}/.bin 284read-only ${HOME}/.bin
282read-only ${HOME}/.local/bin 285read-only ${HOME}/.local/bin
283read-only ${HOME}/.cargo/bin 286read-only ${HOME}/.cargo/bin
284blacklist ${HOME}/.cargo/registry 287read-only ${HOME}/.cargo/env
285blacklist ${HOME}/.cargo/config
286 288
287# Write-protection for desktop entries 289# Write-protection for desktop entries
288read-only ${HOME}/.config/menus 290read-only ${HOME}/.config/menus
@@ -297,11 +299,14 @@ blacklist ${HOME}/*.kdbx
297blacklist ${HOME}/*.key 299blacklist ${HOME}/*.key
298blacklist ${HOME}/.Private 300blacklist ${HOME}/.Private
299blacklist ${HOME}/.caff 301blacklist ${HOME}/.caff
302blacklist ${HOME}/.cargo/credentials
300blacklist ${HOME}/.cert 303blacklist ${HOME}/.cert
301blacklist ${HOME}/.config/keybase 304blacklist ${HOME}/.config/keybase
302blacklist ${HOME}/.davfs2/secrets 305blacklist ${HOME}/.davfs2/secrets
303blacklist ${HOME}/.ecryptfs 306blacklist ${HOME}/.ecryptfs
304blacklist ${HOME}/.fetchmailrc 307blacklist ${HOME}/.fetchmailrc
308blacklist ${HOME}/.git-credential-cache
309blacklist ${HOME}/.git-credentials
305blacklist ${HOME}/.gnome2/keyrings 310blacklist ${HOME}/.gnome2/keyrings
306blacklist ${HOME}/.gnupg 311blacklist ${HOME}/.gnupg
307blacklist ${HOME}/.config/hub 312blacklist ${HOME}/.config/hub
diff --git a/etc/disable-programs.inc b/etc/disable-programs.inc
index cc6877693..e54b651a6 100644
--- a/etc/disable-programs.inc
+++ b/etc/disable-programs.inc
@@ -3,6 +3,7 @@
3include disable-programs.local 3include disable-programs.local
4 4
5blacklist ${HOME}/Arduino 5blacklist ${HOME}/Arduino
6blacklist ${HOME}/i2p
6blacklist ${HOME}/Monero/wallets 7blacklist ${HOME}/Monero/wallets
7blacklist ${HOME}/Nextcloud/Notes 8blacklist ${HOME}/Nextcloud/Notes
8blacklist ${HOME}/SoftMaker 9blacklist ${HOME}/SoftMaker
@@ -28,9 +29,9 @@ blacklist ${HOME}/.Steam
28blacklist ${HOME}/.Steampath 29blacklist ${HOME}/.Steampath
29blacklist ${HOME}/.Steampid 30blacklist ${HOME}/.Steampid
30blacklist ${HOME}/.TelegramDesktop 31blacklist ${HOME}/.TelegramDesktop
32blacklist ${HOME}/.VSCodium
31blacklist ${HOME}/.ViberPC 33blacklist ${HOME}/.ViberPC
32blacklist ${HOME}/.VirtualBox 34blacklist ${HOME}/.VirtualBox
33blacklist ${HOME}/.VSCodium
34blacklist ${HOME}/.WebStorm* 35blacklist ${HOME}/.WebStorm*
35blacklist ${HOME}/.Wolfram Research 36blacklist ${HOME}/.Wolfram Research
36blacklist ${HOME}/.ZAP 37blacklist ${HOME}/.ZAP
@@ -51,6 +52,8 @@ blacklist ${HOME}/.bibletime
51blacklist ${HOME}/.bitcoin 52blacklist ${HOME}/.bitcoin
52blacklist ${HOME}/.bogofilter 53blacklist ${HOME}/.bogofilter
53blacklist ${HOME}/.bzf 54blacklist ${HOME}/.bzf
55blacklist ${HOME}/.cargo/registry
56blacklist ${HOME}/.cargo/config
54blacklist ${HOME}/.claws-mail 57blacklist ${HOME}/.claws-mail
55blacklist ${HOME}/.cliqz 58blacklist ${HOME}/.cliqz
56blacklist ${HOME}/.clonk 59blacklist ${HOME}/.clonk
@@ -94,9 +97,9 @@ blacklist ${HOME}/.config/MusicBrainz
94blacklist ${HOME}/.config/Nathan Osman 97blacklist ${HOME}/.config/Nathan Osman
95blacklist ${HOME}/.config/Nylas Mail 98blacklist ${HOME}/.config/Nylas Mail
96blacklist ${HOME}/.config/PBE 99blacklist ${HOME}/.config/PBE
97blacklist ${HOME}/.config/Qlipper
98blacklist ${HOME}/.config/QGIS 100blacklist ${HOME}/.config/QGIS
99blacklist ${HOME}/.config/QMediathekView 101blacklist ${HOME}/.config/QMediathekView
102blacklist ${HOME}/.config/Qlipper
100blacklist ${HOME}/.config/QuiteRss 103blacklist ${HOME}/.config/QuiteRss
101blacklist ${HOME}/.config/QuiteRssrc 104blacklist ${HOME}/.config/QuiteRssrc
102blacklist ${HOME}/.config/Rambox 105blacklist ${HOME}/.config/Rambox
@@ -179,10 +182,11 @@ blacklist ${HOME}/.config/ghb
179blacklist ${HOME}/.config/ghostwriter 182blacklist ${HOME}/.config/ghostwriter
180blacklist ${HOME}/.config/git 183blacklist ${HOME}/.config/git
181blacklist ${HOME}/.config/globaltime 184blacklist ${HOME}/.config/globaltime
185blacklist ${HOME}/.config/gnome-builder
182blacklist ${HOME}/.config/gnome-mplayer 186blacklist ${HOME}/.config/gnome-mplayer
183blacklist ${HOME}/.config/gnome-mpv 187blacklist ${HOME}/.config/gnome-mpv
184blacklist ${HOME}/.config/godot
185blacklist ${HOME}/.config/gnome-pie 188blacklist ${HOME}/.config/gnome-pie
189blacklist ${HOME}/.config/godot
186blacklist ${HOME}/.config/google-chrome 190blacklist ${HOME}/.config/google-chrome
187blacklist ${HOME}/.config/google-chrome-beta 191blacklist ${HOME}/.config/google-chrome-beta
188blacklist ${HOME}/.config/google-chrome-unstable 192blacklist ${HOME}/.config/google-chrome-unstable
@@ -190,6 +194,7 @@ blacklist ${HOME}/.config/gpicview
190blacklist ${HOME}/.config/gthumb 194blacklist ${HOME}/.config/gthumb
191blacklist ${HOME}/.config/gwenviewrc 195blacklist ${HOME}/.config/gwenviewrc
192blacklist ${HOME}/.config/hexchat 196blacklist ${HOME}/.config/hexchat
197blacklist ${HOME}/.config/i2p
193blacklist ${HOME}/.config/inkscape 198blacklist ${HOME}/.config/inkscape
194blacklist ${HOME}/.config/inox 199blacklist ${HOME}/.config/inox
195blacklist ${HOME}/.config/iridium 200blacklist ${HOME}/.config/iridium
@@ -231,8 +236,8 @@ blacklist ${HOME}/.config/meteo-qt
231blacklist ${HOME}/.config/mfusion 236blacklist ${HOME}/.config/mfusion
232blacklist ${HOME}/.config/midori 237blacklist ${HOME}/.config/midori
233blacklist ${HOME}/.config/mono 238blacklist ${HOME}/.config/mono
234blacklist ${HOME}/.config/mpd
235blacklist ${HOME}/.config/mpDris2 239blacklist ${HOME}/.config/mpDris2
240blacklist ${HOME}/.config/mpd
236blacklist ${HOME}/.config/mps-youtube 241blacklist ${HOME}/.config/mps-youtube
237blacklist ${HOME}/.config/mpv 242blacklist ${HOME}/.config/mpv
238blacklist ${HOME}/.config/mupen64plus 243blacklist ${HOME}/.config/mupen64plus
@@ -253,8 +258,8 @@ blacklist ${HOME}/.config/opera
253blacklist ${HOME}/.config/opera-beta 258blacklist ${HOME}/.config/opera-beta
254blacklist ${HOME}/.config/orage 259blacklist ${HOME}/.config/orage
255blacklist ${HOME}/.config/org.kde.gwenviewrc 260blacklist ${HOME}/.config/org.kde.gwenviewrc
256blacklist ${HOME}/.config/pavucontrol.ini
257blacklist ${HOME}/.config/pavucontrol-qt 261blacklist ${HOME}/.config/pavucontrol-qt
262blacklist ${HOME}/.config/pavucontrol.ini
258blacklist ${HOME}/.config/pcmanfm 263blacklist ${HOME}/.config/pcmanfm
259blacklist ${HOME}/.config/pdfmod 264blacklist ${HOME}/.config/pdfmod
260blacklist ${HOME}/.config/Pinta 265blacklist ${HOME}/.config/Pinta
@@ -302,6 +307,7 @@ blacklist ${HOME}/.config/vivaldi
302blacklist ${HOME}/.config/vivaldi-snapshot 307blacklist ${HOME}/.config/vivaldi-snapshot
303blacklist ${HOME}/.config/vlc 308blacklist ${HOME}/.config/vlc
304blacklist ${HOME}/.config/wesnoth 309blacklist ${HOME}/.config/wesnoth
310blacklist ${HOME}/.config/Whalebird
305blacklist ${HOME}/.config/wireshark 311blacklist ${HOME}/.config/wireshark
306blacklist ${HOME}/.config/xchat 312blacklist ${HOME}/.config/xchat
307blacklist ${HOME}/.config/xed 313blacklist ${HOME}/.config/xed
@@ -322,6 +328,7 @@ blacklist ${HOME}/.config/yelp
322blacklist ${HOME}/.config/youtube-dl 328blacklist ${HOME}/.config/youtube-dl
323blacklist ${HOME}/.config/zathura 329blacklist ${HOME}/.config/zathura
324blacklist ${HOME}/.config/zoomus.conf 330blacklist ${HOME}/.config/zoomus.conf
331blacklist ${HOME}/.config/Zulip
325blacklist ${HOME}/.conkeror.mozdev.org 332blacklist ${HOME}/.conkeror.mozdev.org
326blacklist ${HOME}/.crawl 333blacklist ${HOME}/.crawl
327blacklist ${HOME}/.curlrc 334blacklist ${HOME}/.curlrc
@@ -350,8 +357,6 @@ blacklist ${HOME}/.freecol
350blacklist ${HOME}/.freemind 357blacklist ${HOME}/.freemind
351blacklist ${HOME}/.frozen-bubble 358blacklist ${HOME}/.frozen-bubble
352blacklist ${HOME}/.gimp* 359blacklist ${HOME}/.gimp*
353blacklist ${HOME}/.git-credentials
354blacklist ${HOME}/.git-credential-cache
355blacklist ${HOME}/.gitconfig 360blacklist ${HOME}/.gitconfig
356blacklist ${HOME}/.gnome/gnome-schedule 361blacklist ${HOME}/.gnome/gnome-schedule
357blacklist ${HOME}/.googleearth/Cache/ 362blacklist ${HOME}/.googleearth/Cache/
@@ -364,9 +369,11 @@ blacklist ${HOME}/.guayadeque
364blacklist ${HOME}/.hashcat 369blacklist ${HOME}/.hashcat
365blacklist ${HOME}/.hedgewars 370blacklist ${HOME}/.hedgewars
366blacklist ${HOME}/.hugin 371blacklist ${HOME}/.hugin
372blacklist ${HOME}/.i2p
367blacklist ${HOME}/.icedove 373blacklist ${HOME}/.icedove
368blacklist ${HOME}/.imagej 374blacklist ${HOME}/.imagej
369blacklist ${HOME}/.inkscape 375blacklist ${HOME}/.inkscape
376blacklist ${HOME}/.itch
370blacklist ${HOME}/.jack-server 377blacklist ${HOME}/.jack-server
371blacklist ${HOME}/.jack-settings 378blacklist ${HOME}/.jack-settings
372blacklist ${HOME}/.jak 379blacklist ${HOME}/.jak
@@ -409,13 +416,13 @@ blacklist ${HOME}/.kde4/share/apps/kaffeine
409blacklist ${HOME}/.kde4/share/apps/kcookiejar 416blacklist ${HOME}/.kde4/share/apps/kcookiejar
410blacklist ${HOME}/.kde4/share/apps/kget 417blacklist ${HOME}/.kde4/share/apps/kget
411blacklist ${HOME}/.kde4/share/apps/khtml 418blacklist ${HOME}/.kde4/share/apps/khtml
412blacklist ${HOME}/.kde4/share/apps/konqueror
413blacklist ${HOME}/.kde4/share/apps/konqsidebartng 419blacklist ${HOME}/.kde4/share/apps/konqsidebartng
420blacklist ${HOME}/.kde4/share/apps/konqueror
414blacklist ${HOME}/.kde4/share/apps/kopete 421blacklist ${HOME}/.kde4/share/apps/kopete
415blacklist ${HOME}/.kde4/share/apps/ktorrent 422blacklist ${HOME}/.kde4/share/apps/ktorrent
416blacklist ${HOME}/.kde4/share/apps/okular 423blacklist ${HOME}/.kde4/share/apps/okular
417blacklist ${HOME}/.kde4/share/config/baloorc
418blacklist ${HOME}/.kde4/share/config/baloofilerc 424blacklist ${HOME}/.kde4/share/config/baloofilerc
425blacklist ${HOME}/.kde4/share/config/baloorc
419blacklist ${HOME}/.kde4/share/config/digikam 426blacklist ${HOME}/.kde4/share/config/digikam
420blacklist ${HOME}/.kde4/share/config/gwenviewrc 427blacklist ${HOME}/.kde4/share/config/gwenviewrc
421blacklist ${HOME}/.kde4/share/config/k3brc 428blacklist ${HOME}/.kde4/share/config/k3brc
@@ -438,9 +445,9 @@ blacklist ${HOME}/.kinorc
438blacklist ${HOME}/.klatexformula 445blacklist ${HOME}/.klatexformula
439blacklist ${HOME}/.kodi 446blacklist ${HOME}/.kodi
440blacklist ${HOME}/.lincity-ng 447blacklist ${HOME}/.lincity-ng
448blacklist ${HOME}/.links
441blacklist ${HOME}/.linphone-history.db 449blacklist ${HOME}/.linphone-history.db
442blacklist ${HOME}/.linphonerc 450blacklist ${HOME}/.linphonerc
443blacklist ${HOME}/.links
444blacklist ${HOME}/.lmmsrc.xml 451blacklist ${HOME}/.lmmsrc.xml
445blacklist ${HOME}/.local/lib/vivaldi 452blacklist ${HOME}/.local/lib/vivaldi
446blacklist ${HOME}/.local/share/0ad 453blacklist ${HOME}/.local/share/0ad
@@ -494,6 +501,7 @@ blacklist ${HOME}/.local/share/geeqie
494blacklist ${HOME}/.local/share/gitg 501blacklist ${HOME}/.local/share/gitg
495blacklist ${HOME}/.local/share/gnome-2048 502blacklist ${HOME}/.local/share/gnome-2048
496blacklist ${HOME}/.local/share/gnome-chess 503blacklist ${HOME}/.local/share/gnome-chess
504blacklist ${HOME}/.local/share/gnome-builder
497blacklist ${HOME}/.local/share/gnome-music 505blacklist ${HOME}/.local/share/gnome-music
498blacklist ${HOME}/.local/share/gnome-photos 506blacklist ${HOME}/.local/share/gnome-photos
499blacklist ${HOME}/.local/share/gnome-recipes 507blacklist ${HOME}/.local/share/gnome-recipes
@@ -502,10 +510,13 @@ blacklist ${HOME}/.local/share/gnome-twitch
502blacklist ${HOME}/.local/share/godot 510blacklist ${HOME}/.local/share/godot
503blacklist ${HOME}/.local/share/gradio 511blacklist ${HOME}/.local/share/gradio
504blacklist ${HOME}/.local/share/gwenview 512blacklist ${HOME}/.local/share/gwenview
513blacklist ${HOME}/.local/share/i2p
505blacklist ${HOME}/.local/share/kaffeine 514blacklist ${HOME}/.local/share/kaffeine
506blacklist ${HOME}/.local/share/kate 515blacklist ${HOME}/.local/share/kate
507blacklist ${HOME}/.local/share/kdenlive 516blacklist ${HOME}/.local/share/kdenlive
508blacklist ${HOME}/.local/share/kget 517blacklist ${HOME}/.local/share/kget
518blacklist ${HOME}/.local/share/kiwix
519blacklist ${HOME}/.local/share/kiwix-desktop
509blacklist ${HOME}/.local/share/klavaro 520blacklist ${HOME}/.local/share/klavaro
510blacklist ${HOME}/.local/share/kmail2 521blacklist ${HOME}/.local/share/kmail2
511blacklist ${HOME}/.local/share/knotes 522blacklist ${HOME}/.local/share/knotes
@@ -626,8 +637,7 @@ blacklist ${HOME}/.teeworlds
626blacklist ${HOME}/.thunderbird 637blacklist ${HOME}/.thunderbird
627blacklist ${HOME}/.tilp 638blacklist ${HOME}/.tilp
628blacklist ${HOME}/.tooling 639blacklist ${HOME}/.tooling
629blacklist ${HOME}/.tor-browser-* 640blacklist ${HOME}/.tor-browser*
630blacklist ${HOME}/.tor-browser_*
631blacklist ${HOME}/.torcs 641blacklist ${HOME}/.torcs
632blacklist ${HOME}/.tremulous 642blacklist ${HOME}/.tremulous
633blacklist ${HOME}/.ts3client 643blacklist ${HOME}/.ts3client
@@ -635,6 +645,8 @@ blacklist ${HOME}/.tuxguitar*
635blacklist ${HOME}/.unknown-horizons 645blacklist ${HOME}/.unknown-horizons
636blacklist ${HOME}/.viking 646blacklist ${HOME}/.viking
637blacklist ${HOME}/.viking-maps 647blacklist ${HOME}/.viking-maps
648blacklist ${HOME}/.vim
649blacklist ${HOME}/.vimrc
638blacklist ${HOME}/.vscode 650blacklist ${HOME}/.vscode
639blacklist ${HOME}/.vscode-oss 651blacklist ${HOME}/.vscode-oss
640blacklist ${HOME}/.vst 652blacklist ${HOME}/.vst
@@ -704,6 +716,7 @@ blacklist ${HOME}/.cache/godot
704blacklist ${HOME}/.cache/google-chrome 716blacklist ${HOME}/.cache/google-chrome
705blacklist ${HOME}/.cache/google-chrome-beta 717blacklist ${HOME}/.cache/google-chrome-beta
706blacklist ${HOME}/.cache/google-chrome-unstable 718blacklist ${HOME}/.cache/google-chrome-unstable
719blacklist ${HOME}/.cache/gnome-builder
707blacklist ${HOME}/.cache/gnome-recipes 720blacklist ${HOME}/.cache/gnome-recipes
708blacklist ${HOME}/.cache/gnome-twitch 721blacklist ${HOME}/.cache/gnome-twitch
709blacklist ${HOME}/.cache/gradio 722blacklist ${HOME}/.cache/gradio
@@ -726,6 +739,7 @@ blacklist ${HOME}/.cache/libgweather
726blacklist ${HOME}/.cache/liferea 739blacklist ${HOME}/.cache/liferea
727blacklist ${HOME}/.cache/Mendeley Ltd. 740blacklist ${HOME}/.cache/Mendeley Ltd.
728blacklist ${HOME}/.cache/midori 741blacklist ${HOME}/.cache/midori
742blacklist ${HOME}/.cache/minetest
729blacklist ${HOME}/.cache/moonchild productions/basilisk 743blacklist ${HOME}/.cache/moonchild productions/basilisk
730blacklist ${HOME}/.cache/moonchild productions/pale moon 744blacklist ${HOME}/.cache/moonchild productions/pale moon
731blacklist ${HOME}/.cache/mozilla 745blacklist ${HOME}/.cache/mozilla
diff --git a/etc/dnscrypt-proxy.profile b/etc/dnscrypt-proxy.profile
index c04451373..bba94e3cb 100644
--- a/etc/dnscrypt-proxy.profile
+++ b/etc/dnscrypt-proxy.profile
@@ -1,6 +1,7 @@
1# Firejail profile for dnscrypt-proxy 1# Firejail profile for dnscrypt-proxy
2# Description: Tool for securing communications between a client and a DNS resolver 2# Description: Tool for securing communications between a client and a DNS resolver
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include dnscrypt-proxy.local 6include dnscrypt-proxy.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/dnsmasq.profile b/etc/dnsmasq.profile
index daf4795c3..dfb1b61c1 100644
--- a/etc/dnsmasq.profile
+++ b/etc/dnsmasq.profile
@@ -1,6 +1,7 @@
1# Firejail profile for dnsmasq 1# Firejail profile for dnsmasq
2# Description: Small caching DNS proxy and DHCP/TFTP server 2# Description: Small caching DNS proxy and DHCP/TFTP server
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include dnsmasq.local 6include dnsmasq.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/emacs.profile b/etc/emacs.profile
index f8b451f02..ab378105e 100644
--- a/etc/emacs.profile
+++ b/etc/emacs.profile
@@ -11,10 +11,9 @@ noblacklist ${HOME}/.emacs.d
11# if you need gpg uncomment the following line 11# if you need gpg uncomment the following line
12# or put it into your emacs.local 12# or put it into your emacs.local
13#noblacklist ${HOME}/.gnupg 13#noblacklist ${HOME}/.gnupg
14noblacklist ${HOME}/.python-history 14
15noblacklist ${HOME}/.python_history 15# Allows files commonly used by IDEs
16noblacklist ${HOME}/.pythonhist 16include allow-common-devel.inc
17noblacklist ${HOME}/.pythonrc.py
18 17
19include disable-common.inc 18include disable-common.inc
20include disable-passwdmgr.inc 19include disable-passwdmgr.inc
@@ -27,5 +26,6 @@ nogroups
27nonewprivs 26nonewprivs
28noroot 27noroot
29notv 28notv
29novideo
30protocol unix,inet,inet6 30protocol unix,inet,inet6
31seccomp 31seccomp
diff --git a/etc/eo-common.profile b/etc/eo-common.profile
index f4b263f50..c4ad8ced4 100644
--- a/etc/eo-common.profile
+++ b/etc/eo-common.profile
@@ -43,5 +43,3 @@ private-dev
43private-etc alternatives,dconf,fonts,gtk-3.0 43private-etc alternatives,dconf,fonts,gtk-3.0
44private-lib eog,eom,gdk-pixbuf-2.*,gio,girepository-1.*,gvfs,libgconf-2.so.* 44private-lib eog,eom,gdk-pixbuf-2.*,gio,girepository-1.*,gvfs,libgconf-2.so.*
45private-tmp 45private-tmp
46
47#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/etr.profile b/etc/etr.profile
index d93d3de63..97a43bb59 100644
--- a/etc/etr.profile
+++ b/etc/etr.profile
@@ -1,4 +1,5 @@
1# Firejail profile for etr 1# Firejail profile for etr
2# Description: High speed arctic racing game
2# This file is overwritten after every install/update 3# This file is overwritten after every install/update
3# Persistent local customizations 4# Persistent local customizations
4include etr.local 5include etr.local
@@ -29,6 +30,7 @@ nonewprivs
29noroot 30noroot
30notv 31notv
31nou2f 32nou2f
33novideo
32protocol unix,netlink 34protocol unix,netlink
33seccomp 35seccomp
34shell none 36shell none
diff --git a/etc/falkon.profile b/etc/falkon.profile
index cabf5aeba..0024b6660 100644
--- a/etc/falkon.profile
+++ b/etc/falkon.profile
@@ -34,9 +34,10 @@ notv
34nou2f 34nou2f
35protocol unix,inet,inet6,netlink 35protocol unix,inet,inet6,netlink
36# blacklisting of chroot system calls breaks falkon 36# blacklisting of chroot system calls breaks falkon
37seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice 37seccomp !chroot
38# tracelog 38# tracelog
39 39
40private-dev 40private-dev
41# private-etc alternatives,passwd,group,hostname,hosts,localtime,nsswitch.conf,resolv.conf,gtk-2.0,pango,fonts,adobe,mime.types,mailcap,asound.conf,pulse,machine-id,ca-certificates,ssl,pki,crypto-policies
41# private-tmp - interferes with the opening of downloaded files 42# private-tmp - interferes with the opening of downloaded files
42 43
diff --git a/etc/feedreader.profile b/etc/feedreader.profile
index e453cc611..e381b12d6 100644
--- a/etc/feedreader.profile
+++ b/etc/feedreader.profile
@@ -15,6 +15,7 @@ include disable-exec.inc
15include disable-interpreters.inc 15include disable-interpreters.inc
16include disable-passwdmgr.inc 16include disable-passwdmgr.inc
17include disable-programs.inc 17include disable-programs.inc
18include disable-xdg.inc
18 19
19mkdir ${HOME}/.cache/feedreader 20mkdir ${HOME}/.cache/feedreader
20mkdir ${HOME}/.local/share/feedreader 21mkdir ${HOME}/.local/share/feedreader
diff --git a/etc/ffmpegthumbnailer.profile b/etc/ffmpegthumbnailer.profile
index 3681c40f1..6d72c3b99 100644
--- a/etc/ffmpegthumbnailer.profile
+++ b/etc/ffmpegthumbnailer.profile
@@ -1,6 +1,7 @@
1# Firejail profile for ffmpegthumbnailer 1# Firejail profile for ffmpegthumbnailer
2# Description: FFmpeg-based video thumbnailer 2# Description: FFmpeg-based video thumbnailer
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include ffmpegthumbnailer.local 6include ffmpegthumbnailer.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/ffplay.profile b/etc/ffplay.profile
index b42cc29bc..71187a5b5 100644
--- a/etc/ffplay.profile
+++ b/etc/ffplay.profile
@@ -1,6 +1,7 @@
1# Firejail profile for ffplay 1# Firejail profile for ffplay
2# Description: FFmpeg-based media player 2# Description: FFmpeg-based media player
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include ffplay.local 6include ffplay.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/ffprobe.profile b/etc/ffprobe.profile
index bd8643206..cb24a7d05 100644
--- a/etc/ffprobe.profile
+++ b/etc/ffprobe.profile
@@ -1,6 +1,7 @@
1# Firejail profile for ffprobe 1# Firejail profile for ffprobe
2# Description: FFmpeg-based media prober 2# Description: FFmpeg-based media prober
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include ffprobe.local 6include ffprobe.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/file-roller.profile b/etc/file-roller.profile
index db1426f36..496152540 100644
--- a/etc/file-roller.profile
+++ b/etc/file-roller.profile
@@ -37,5 +37,3 @@ tracelog
37# private-bin file-roller 37# private-bin file-roller
38private-dev 38private-dev
39# private-tmp 39# private-tmp
40
41# memory-deny-write-execute
diff --git a/etc/file.profile b/etc/file.profile
index 69fa7d8cd..37c7ee9e7 100644
--- a/etc/file.profile
+++ b/etc/file.profile
@@ -33,10 +33,11 @@ shell none
33tracelog 33tracelog
34x11 none 34x11 none
35 35
36#private-bin file 36#private-bin bzip2,file,gzip,lrzip,lz4,lzip,xz,zstd
37private-cache 37private-cache
38private-dev 38private-dev
39private-etc alternatives,localtime,magic,magic.mgc 39private-etc alternatives,localtime,magic,magic.mgc
40private-lib libarchive.so.*,libfakeroot,libmagic.so.* 40private-lib file,libarchive.so.*,libfakeroot,libmagic.so.*
41 41
42memory-deny-write-execute 42memory-deny-write-execute
43read-only ${HOME}
diff --git a/etc/firefox-common.profile b/etc/firefox-common.profile
index 6ad4a9bc2..02d6199a0 100644
--- a/etc/firefox-common.profile
+++ b/etc/firefox-common.profile
@@ -46,7 +46,7 @@ notv
46?BROWSER_DISABLE_U2F: nou2f 46?BROWSER_DISABLE_U2F: nou2f
47protocol unix,inet,inet6,netlink 47protocol unix,inet,inet6,netlink
48# The below seccomp configuration still permits chroot syscall. See https://github.com/netblue30/firejail/issues/2506 for possible workarounds. 48# The below seccomp configuration still permits chroot syscall. See https://github.com/netblue30/firejail/issues/2506 for possible workarounds.
49seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice 49seccomp !chroot
50shell none 50shell none
51# Disable tracelog, it breaks or causes major issues with many firefox based browsers, see https://github.com/netblue30/firejail/issues/1930. 51# Disable tracelog, it breaks or causes major issues with many firefox based browsers, see https://github.com/netblue30/firejail/issues/1930.
52#tracelog 52#tracelog
diff --git a/etc/firefox.profile b/etc/firefox.profile
index 84c647cb9..8d90a0917 100644
--- a/etc/firefox.profile
+++ b/etc/firefox.profile
@@ -16,6 +16,8 @@ whitelist ${HOME}/.mozilla
16 16
17# firefox requires a shell to launch on Arch. 17# firefox requires a shell to launch on Arch.
18#private-bin bash,dbus-launch,dbus-send,env,firefox,sh,which 18#private-bin bash,dbus-launch,dbus-send,env,firefox,sh,which
19# Fedora use shell scripts to launch firefox, at least this is required
20#private-bin awk,basename,bash,cat,dbus-launch,dbus-send,dirname,env,expr,false,firefox,firefox-wayland,ln,mkdir,pidof,rm,rmdir,sed,sh,tclsh,true,uname,which
19# private-etc must first be enabled in firefox-common.profile 21# private-etc must first be enabled in firefox-common.profile
20#private-etc firefox 22#private-etc firefox
21 23
diff --git a/etc/firejail.config b/etc/firejail.config
index 1f80cedee..565796d5a 100644
--- a/etc/firejail.config
+++ b/etc/firejail.config
@@ -2,9 +2,6 @@
2# keyword-argument pairs, one per line. Most features are enabled by default. 2# keyword-argument pairs, one per line. Most features are enabled by default.
3# Use 'yes' or 'no' as configuration values. 3# Use 'yes' or 'no' as configuration values.
4 4
5# Resolve symbolic links in path of user home directories, default disabled.
6# homedir-symlink no
7
8# Enable AppArmor functionality, default enabled. 5# Enable AppArmor functionality, default enabled.
9# apparmor yes 6# apparmor yes
10 7
diff --git a/etc/frozen-bubble.profile b/etc/frozen-bubble.profile
index 3931aa64a..6cef181c8 100644
--- a/etc/frozen-bubble.profile
+++ b/etc/frozen-bubble.profile
@@ -31,6 +31,7 @@ nonewprivs
31noroot 31noroot
32notv 32notv
33nou2f 33nou2f
34novideo
34protocol unix,netlink 35protocol unix,netlink
35seccomp 36seccomp
36shell none 37shell none
diff --git a/etc/geany.profile b/etc/geany.profile
index 2cffb8777..31599e32a 100644
--- a/etc/geany.profile
+++ b/etc/geany.profile
@@ -7,13 +7,9 @@ include geany.local
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.config/geany 9noblacklist ${HOME}/.config/geany
10noblacklist ${HOME}/.config/git 10
11noblacklist ${HOME}/.gitconfig 11# Allows files commonly used by IDEs
12noblacklist ${HOME}/.git-credentials 12include allow-common-devel.inc
13noblacklist ${HOME}/.python-history
14noblacklist ${HOME}/.python_history
15noblacklist ${HOME}/.pythonhist
16noblacklist ${HOME}/.pythonrc.py
17 13
18include disable-common.inc 14include disable-common.inc
19include disable-passwdmgr.inc 15include disable-passwdmgr.inc
diff --git a/etc/gedit.profile b/etc/gedit.profile
index ed6efc3b6..837396654 100644
--- a/etc/gedit.profile
+++ b/etc/gedit.profile
@@ -8,13 +8,9 @@ include globals.local
8 8
9noblacklist ${HOME}/.config/enchant 9noblacklist ${HOME}/.config/enchant
10noblacklist ${HOME}/.config/gedit 10noblacklist ${HOME}/.config/gedit
11noblacklist ${HOME}/.config/git 11
12noblacklist ${HOME}/.gitconfig 12# Allows files commonly used by IDEs
13noblacklist ${HOME}/.git-credentials 13include allow-common-devel.inc
14noblacklist ${HOME}/.python-history
15noblacklist ${HOME}/.python_history
16noblacklist ${HOME}/.pythonhist
17noblacklist ${HOME}/.pythonrc.py
18 14
19include disable-common.inc 15include disable-common.inc
20# include disable-devel.inc 16# include disable-devel.inc
diff --git a/etc/ghostwriter.profile b/etc/ghostwriter.profile
index 1fb2d8f58..2479ec16d 100644
--- a/etc/ghostwriter.profile
+++ b/etc/ghostwriter.profile
@@ -35,9 +35,9 @@ protocol unix,inet,inet6,netlink
35shell none 35shell none
36#tracelog -- breaks 36#tracelog -- breaks
37 37
38# Breaks Translation 38private-bin gettext,ghostwriter,pandoc
39#private-bin ghostwriter,pandoc
40private-cache 39private-cache
41private-dev 40private-dev
42private-etc alternatives,ca-certificates,crypto-policies,dbus-1,dconf,fonts,gconf,groups,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,login.defs,machine-id,mime.types,nsswitch.conf,pango,passwd,pki,protocols,resolv.conf,rpc,services,ssl,Trolltech.conf,X11,xdg 41# passwd,login.defs,firejail are a temporary workaround for #2877 and can be removed once it is fixed
42private-etc alternatives,ca-certificates,crypto-policies,dbus-1,dconf,firejail,fonts,gconf,groups,gtk-2.0,gtk-3.0,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,login.defs,machine-id,mime.types,nsswitch.conf,pango,passwd,pki,protocols,resolv.conf,rpc,services,ssl,Trolltech.conf,X11,xdg
43private-tmp 43private-tmp
diff --git a/etc/gimp.profile b/etc/gimp.profile
index 762e743c8..fab7fa123 100644
--- a/etc/gimp.profile
+++ b/etc/gimp.profile
@@ -8,7 +8,7 @@ include globals.local
8 8
9# gimp plugins are installed by the user in ${HOME}/.gimp-2.8/plug-ins/ directory 9# gimp plugins are installed by the user in ${HOME}/.gimp-2.8/plug-ins/ directory
10# if you are not using external plugins, you can comment 'ignore noexec' statement below 10# if you are not using external plugins, you can comment 'ignore noexec' statement below
11# or put 'ignore ignore noexec ${HOME}' in your gimp.local 11# or put 'noexec ${HOME}' in your gimp.local
12ignore noexec ${HOME} 12ignore noexec ${HOME}
13 13
14noblacklist ${HOME}/.config/GIMP 14noblacklist ${HOME}/.config/GIMP
diff --git a/etc/git.profile b/etc/git.profile
index f7c812e65..8b1c81ca4 100644
--- a/etc/git.profile
+++ b/etc/git.profile
@@ -15,7 +15,6 @@ noblacklist ${HOME}/.gitconfig
15noblacklist ${HOME}/.git-credentials 15noblacklist ${HOME}/.git-credentials
16noblacklist ${HOME}/.gnupg 16noblacklist ${HOME}/.gnupg
17noblacklist ${HOME}/.nanorc 17noblacklist ${HOME}/.nanorc
18noblacklist ${HOME}/.oh-my-zsh
19noblacklist ${HOME}/.ssh 18noblacklist ${HOME}/.ssh
20noblacklist ${HOME}/.vim 19noblacklist ${HOME}/.vim
21noblacklist ${HOME}/.viminfo 20noblacklist ${HOME}/.viminfo
diff --git a/etc/gitg.profile b/etc/gitg.profile
index f6f51ef6f..08c1c94b6 100644
--- a/etc/gitg.profile
+++ b/etc/gitg.profile
@@ -22,6 +22,7 @@ include disable-programs.inc
22include whitelist-var-common.inc 22include whitelist-var-common.inc
23 23
24caps.drop all 24caps.drop all
25netfilter
25no3d 26no3d
26nodvd 27nodvd
27nogroups 28nogroups
@@ -39,6 +40,3 @@ private-bin git,gitg,ssh
39private-cache 40private-cache
40private-dev 41private-dev
41private-tmp 42private-tmp
42
43# mdwe breaks diff in older versions
44#memory-deny-write-execute
diff --git a/etc/gnome-builder.profile b/etc/gnome-builder.profile
index dfa1a5da8..726a74089 100644
--- a/etc/gnome-builder.profile
+++ b/etc/gnome-builder.profile
@@ -6,15 +6,12 @@ include gnome-builder.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.cargo/config 9noblacklist ${HOME}/.cache/gnome-builder
10noblacklist ${HOME}/.cargo/registry 10noblacklist ${HOME}/.config/gnome-builder
11noblacklist ${HOME}/.config/git 11noblacklist ${HOME}/.local/share/gnome-builder
12noblacklist ${HOME}/.gitconfig 12
13noblacklist ${HOME}/.git-credentials 13# Allows files commonly used by IDEs
14noblacklist ${HOME}/.python-history 14include allow-common-devel.inc
15noblacklist ${HOME}/.python_history
16noblacklist ${HOME}/.pythonhist
17noblacklist ${HOME}/.pythonrc.py
18 15
19include disable-common.inc 16include disable-common.inc
20include disable-passwdmgr.inc 17include disable-passwdmgr.inc
diff --git a/etc/gnome-character-map.profile b/etc/gnome-character-map.profile
index 35db448f2..27804fdd0 100644
--- a/etc/gnome-character-map.profile
+++ b/etc/gnome-character-map.profile
@@ -6,4 +6,5 @@ include gnome-character-map.local
6# added by included profile 6# added by included profile
7#include globals.local 7#include globals.local
8 8
9# Redirect
9include gucharmap.profile 10include gucharmap.profile
diff --git a/etc/gnome-photos.profile b/etc/gnome-photos.profile
index 3bbad67bb..aa0b7dbe3 100644
--- a/etc/gnome-photos.profile
+++ b/etc/gnome-photos.profile
@@ -28,6 +28,7 @@ noroot
28nosound 28nosound
29notv 29notv
30nou2f 30nou2f
31novideo
31protocol unix 32protocol unix
32seccomp 33seccomp
33shell none 34shell none
diff --git a/etc/gnome-schedule.profile b/etc/gnome-schedule.profile
index 6c9c83e5f..cbeb82465 100644
--- a/etc/gnome-schedule.profile
+++ b/etc/gnome-schedule.profile
@@ -13,15 +13,9 @@ noblacklist ${PATH}/at
13noblacklist ${PATH}/crontab 13noblacklist ${PATH}/crontab
14 14
15# Needs access to these files/dirs 15# Needs access to these files/dirs
16noblacklist /etc/at.allow
17noblacklist /etc/at.deny
18noblacklist /etc/cron.allow 16noblacklist /etc/cron.allow
19noblacklist /etc/cron.deny 17noblacklist /etc/cron.deny
20noblacklist /etc/fonts
21noblacklist /etc/ld.so.preload
22noblacklist /etc/pam.d
23noblacklist /etc/shadow 18noblacklist /etc/shadow
24noblacklist /var/spool/at
25noblacklist /var/spool/cron 19noblacklist /var/spool/cron
26 20
27# cron job testing needs a terminal, resulting in sandbox escape (see disable-common.inc) 21# cron job testing needs a terminal, resulting in sandbox escape (see disable-common.inc)
@@ -41,14 +35,6 @@ include disable-xdg.inc
41 35
42mkfile ${HOME}/.gnome/gnome-schedule 36mkfile ${HOME}/.gnome/gnome-schedule
43whitelist ${HOME}/.gnome/gnome-schedule 37whitelist ${HOME}/.gnome/gnome-schedule
44whitelist /etc/at.allow
45whitelist /etc/at.deny
46whitelist /etc/cron.allow
47whitelist /etc/cron.deny
48whitelist /etc/fonts
49whitelist /etc/pam.d
50whitelist /etc/ld.so.preload
51whitelist /etc/shadow
52whitelist /var/spool/atd 38whitelist /var/spool/atd
53whitelist /var/spool/cron 39whitelist /var/spool/cron
54include whitelist-common.inc 40include whitelist-common.inc
@@ -72,5 +58,6 @@ tracelog
72disable-mnt 58disable-mnt
73private-cache 59private-cache
74private-dev 60private-dev
61private-etc at.allow,at.deny,cron.allow,cron.deny,fonts,ld.so.preload,pam.d,shadow
75writable-var 62writable-var
76 63
diff --git a/etc/gnome-system-log.profile b/etc/gnome-system-log.profile
index f1347a8dc..b2907b32c 100644
--- a/etc/gnome-system-log.profile
+++ b/etc/gnome-system-log.profile
@@ -6,8 +6,6 @@ include gnome-system-log.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9noblacklist /var/log
10
11include disable-common.inc 9include disable-common.inc
12include disable-devel.inc 10include disable-devel.inc
13include disable-exec.inc 11include disable-exec.inc
diff --git a/etc/gunzip.profile b/etc/gunzip.profile
index aff990ec0..6e97c6b78 100644
--- a/etc/gunzip.profile
+++ b/etc/gunzip.profile
@@ -1,5 +1,6 @@
1# Firejail profile for gunzip 1# Firejail profile for gunzip
2# This file is overwritten after every install/update 2# This file is overwritten after every install/update
3quiet
3# Persistent local customizations 4# Persistent local customizations
4include gunzip.local 5include gunzip.local
5# Persistent global definitions 6# Persistent global definitions
diff --git a/etc/gwenview.profile b/etc/gwenview.profile
index 489be3931..5a5d81378 100644
--- a/etc/gwenview.profile
+++ b/etc/gwenview.profile
@@ -45,6 +45,6 @@ shell none
45 45
46private-bin gimp*,gwenview,kbuildsycoca4,kdeinit4 46private-bin gimp*,gwenview,kbuildsycoca4,kdeinit4
47private-dev 47private-dev
48private-etc alternatives,fonts,gimp,gtk-2.0,kde4rc,kde5rc,ld.so.cache,machine-id,pulse,xdg 48private-etc alternatives,fonts,gimp,gtk-2.0,kde4rc,kde5rc,ld.so.cache,machine-id,passwd,pulse,xdg
49 49
50# memory-deny-write-execute 50# memory-deny-write-execute
diff --git a/etc/hedgewars.profile b/etc/hedgewars.profile
index 1e9f898e0..898a07a5f 100644
--- a/etc/hedgewars.profile
+++ b/etc/hedgewars.profile
@@ -26,6 +26,7 @@ nonewprivs
26noroot 26noroot
27notv 27notv
28nou2f 28nou2f
29novideo
29seccomp 30seccomp
30tracelog 31tracelog
31 32
diff --git a/etc/i2prouter.profile b/etc/i2prouter.profile
new file mode 100644
index 000000000..e46fb3317
--- /dev/null
+++ b/etc/i2prouter.profile
@@ -0,0 +1,71 @@
1# Firejail profile for I2P
2# Description: A distributed anonymous network
3# This file is overwritten after every install/update
4# Persistent local customizations
5include i2prouter.local
6# Persistent global definitions
7include globals.local
8
9# Notice: default browser will not be able to automatically open, due to sandbox.
10# Auto-opening default browser can be disabled in the I2P router console.
11# This profile will not currently work with any Arch User Repository i2p packages,
12# use the distro-independent official java installer instead
13
14# Only needed if i2prouter binary is in home directory, java installer does this
15ignore noexec ${HOME}
16
17noblacklist ${HOME}/.config/i2p
18noblacklist ${HOME}/.i2p
19noblacklist ${HOME}/.local/share/i2p
20noblacklist ${HOME}/i2p
21# Only needed if wrapper is placed in /usr/sbin/, ubuntu official ppa package does this
22noblacklist /usr/sbin
23
24# Allow java (blacklisted by disable-devel.inc)
25include allow-java.inc
26
27include disable-common.inc
28include disable-devel.inc
29include disable-exec.inc
30include disable-interpreters.inc
31include disable-passwdmgr.inc
32include disable-programs.inc
33include disable-xdg.inc
34
35mkdir ${HOME}/.config/i2p
36mkdir ${HOME}/.i2p
37mkdir ${HOME}/.local/share/i2p
38mkdir ${HOME}/i2p
39whitelist ${HOME}/.config/i2p
40whitelist ${HOME}/.i2p
41whitelist ${HOME}/.local/share/i2p
42whitelist ${HOME}/i2p
43# Only needed if wrapper is placed in /usr/sbin/, ubuntu official ppa package does this
44whitelist /usr/sbin/wrapper*
45
46include whitelist-common.inc
47
48# May break I2P if wrapper is placed in the home directory
49# If using ubuntu official ppa, this should be fine to uncomment, as it puts wrapper in /usr/sbin/
50#apparmor
51caps.drop all
52ipc-namespace
53machine-id
54netfilter
55no3d
56nodvd
57nogroups
58nonewprivs
59nosound
60notv
61nou2f
62novideo
63protocol unix,inet,inet6
64seccomp
65shell none
66
67disable-mnt
68private-cache
69private-dev
70private-etc alternatives,ca-certificates,crypto-policies,i2p,java-8-openjdk,pki,ssl
71private-tmp
diff --git a/etc/idea.sh.profile b/etc/idea.sh.profile
index 4f3047e08..a7d0d531f 100644
--- a/etc/idea.sh.profile
+++ b/etc/idea.sh.profile
@@ -7,17 +7,15 @@ include globals.local
7 7
8noblacklist ${HOME}/.IdeaIC* 8noblacklist ${HOME}/.IdeaIC*
9noblacklist ${HOME}/.android 9noblacklist ${HOME}/.android
10noblacklist ${HOME}/.config/git
11noblacklist ${HOME}/.gitconfig
12noblacklist ${HOME}/.git-credentials
13noblacklist ${HOME}/.gradle
14noblacklist ${HOME}/.jack-server 10noblacklist ${HOME}/.jack-server
15noblacklist ${HOME}/.jack-settings 11noblacklist ${HOME}/.jack-settings
16noblacklist ${HOME}/.java
17noblacklist ${HOME}/.local/share/JetBrains 12noblacklist ${HOME}/.local/share/JetBrains
18noblacklist ${HOME}/.ssh 13noblacklist ${HOME}/.ssh
19noblacklist ${HOME}/.tooling 14noblacklist ${HOME}/.tooling
20 15
16# Allows files commonly used by IDEs
17include allow-common-devel.inc
18
21include disable-common.inc 19include disable-common.inc
22include disable-passwdmgr.inc 20include disable-passwdmgr.inc
23include disable-programs.inc 21include disable-programs.inc
diff --git a/etc/itch.profile b/etc/itch.profile
index c0b4fe6ce..b3c78c810 100644
--- a/etc/itch.profile
+++ b/etc/itch.profile
@@ -8,6 +8,7 @@ include globals.local
8# itch.io has native firejail/sandboxing support bundled in 8# itch.io has native firejail/sandboxing support bundled in
9# See https://itch.io/docs/itch/using/sandbox/linux.html 9# See https://itch.io/docs/itch/using/sandbox/linux.html
10 10
11noblacklist ${HOME}/.itch
11noblacklist ${HOME}/.config/itch 12noblacklist ${HOME}/.config/itch
12 13
13include disable-common.inc 14include disable-common.inc
@@ -16,7 +17,9 @@ include disable-interpreters.inc
16include disable-passwdmgr.inc 17include disable-passwdmgr.inc
17include disable-programs.inc 18include disable-programs.inc
18 19
20mkdir ${HOME}/.itch
19mkdir ${HOME}/.config/itch 21mkdir ${HOME}/.config/itch
22whitelist ${HOME}/.itch
20whitelist ${HOME}/.config/itch 23whitelist ${HOME}/.config/itch
21include whitelist-common.inc 24include whitelist-common.inc
22 25
diff --git a/etc/kiwix-desktop.profile b/etc/kiwix-desktop.profile
new file mode 100644
index 000000000..8b7b12882
--- /dev/null
+++ b/etc/kiwix-desktop.profile
@@ -0,0 +1,49 @@
1# Firejail profile for kiwix-desktop
2# Description: view/manage ZIM files
3# This file is overwritten after every install/update
4# Persistent local customizations
5include kiwix-desktop.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.local/share/kiwix
10noblacklist ${HOME}/.local/share/kiwix-desktop
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18include disable-xdg.inc
19
20mkdir ${HOME}/.local/share/kiwix
21mkdir ${HOME}/.local/share/kiwix-desktop
22whitelist ${HOME}/.local/share/kiwix
23whitelist ${HOME}/.local/share/kiwix-desktop
24include whitelist-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29ipc-namespace
30netfilter
31# no3d
32nodbus
33nodvd
34nogroups
35nonewprivs
36noroot
37# nosound
38notv
39nou2f
40novideo
41protocol unix,inet,inet6,netlink
42seccomp !chroot
43shell none
44
45disable-mnt
46private-cache
47private-dev
48private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,hostname,hosts,ld.so.cache,machine-id,pki,pulse,resolv.conf,ssl
49private-tmp
diff --git a/etc/kmail.profile b/etc/kmail.profile
index 0b602c79a..198b05a11 100644
--- a/etc/kmail.profile
+++ b/etc/kmail.profile
@@ -51,7 +51,7 @@ nou2f
51novideo 51novideo
52protocol unix,inet,inet6,netlink 52protocol unix,inet,inet6,netlink
53# we need to allow chroot, io_getevents, ioprio_set, io_setup, io_submit system calls 53# we need to allow chroot, io_getevents, ioprio_set, io_setup, io_submit system calls
54seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice 54seccomp !chroot,!io_getevents,!io_setup,!io_submit,!ioprio_set
55# tracelog 55# tracelog
56 56
57private-dev 57private-dev
diff --git a/etc/kwin_x11.profile b/etc/kwin_x11.profile
index ee07636d3..d512dd100 100644
--- a/etc/kwin_x11.profile
+++ b/etc/kwin_x11.profile
@@ -5,6 +5,9 @@ include kwin_x11.local
5# Persistent global definitions 5# Persistent global definitions
6include globals.local 6include globals.local
7 7
8# fix automatical kwin_x11 sandboxing:
9# echo KDEWM=kwin_x11 >> ~/.pam_environment
10
8noblacklist ${HOME}/.cache/kwin 11noblacklist ${HOME}/.cache/kwin
9noblacklist ${HOME}/.config/kwinrc 12noblacklist ${HOME}/.config/kwinrc
10noblacklist ${HOME}/.config/kwinrulesrc 13noblacklist ${HOME}/.config/kwinrulesrc
diff --git a/etc/less.profile b/etc/less.profile
index 0f31d344b..282b033a6 100644
--- a/etc/less.profile
+++ b/etc/less.profile
@@ -8,8 +8,6 @@ include less.local
8include globals.local 8include globals.local
9 9
10noblacklist ${HOME}/.lesshst 10noblacklist ${HOME}/.lesshst
11read-only ${HOME}
12read-write ${HOME}/.lesshst
13 11
14include disable-devel.inc 12include disable-devel.inc
15include disable-exec.inc 13include disable-exec.inc
@@ -45,3 +43,5 @@ private-dev
45writable-var-log 43writable-var-log
46 44
47memory-deny-write-execute 45memory-deny-write-execute
46read-only ${HOME}
47read-write ${HOME}/.lesshst
diff --git a/etc/libreoffice.profile b/etc/libreoffice.profile
index b8a6201b2..aa113883e 100644
--- a/etc/libreoffice.profile
+++ b/etc/libreoffice.profile
@@ -34,6 +34,7 @@ nonewprivs
34noroot 34noroot
35notv 35notv
36nou2f 36nou2f
37novideo
37# comment the protocol line when using the ubuntu 18.04/debian 10 apparmor profile 38# comment the protocol line when using the ubuntu 18.04/debian 10 apparmor profile
38protocol unix,inet,inet6 39protocol unix,inet,inet6
39# comment seccomp when using the ubuntu 18.04/debian 10 apparmor profile 40# comment seccomp when using the ubuntu 18.04/debian 10 apparmor profile
diff --git a/etc/lrunzip.profile b/etc/lrunzip.profile
index 72abec8bb..c010cbd96 100644
--- a/etc/lrunzip.profile
+++ b/etc/lrunzip.profile
@@ -1,6 +1,7 @@
1# Firejail profile for lrunzip 1# Firejail profile for lrunzip
2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq 2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include lrunzip.local 6include lrunzip.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/lrz.profile b/etc/lrz.profile
index c1f928bde..8077be945 100644
--- a/etc/lrz.profile
+++ b/etc/lrz.profile
@@ -1,6 +1,7 @@
1# Firejail profile for lrz 1# Firejail profile for lrz
2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq 2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include lrz.local 6include lrz.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/lrzcat.profile b/etc/lrzcat.profile
index edcd7f8cd..d05ee7aae 100644
--- a/etc/lrzcat.profile
+++ b/etc/lrzcat.profile
@@ -1,6 +1,7 @@
1# Firejail profile for lrzcat 1# Firejail profile for lrzcat
2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq 2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include lrzcat.local 6include lrzcat.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/lrzip.profile b/etc/lrzip.profile
index a69096e28..3767767f6 100644
--- a/etc/lrzip.profile
+++ b/etc/lrzip.profile
@@ -1,6 +1,7 @@
1# Firejail profile for lrzip 1# Firejail profile for lrzip
2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq 2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include lrzip.local 6include lrzip.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/lrztar.profile b/etc/lrztar.profile
index 54b04b4ec..673e9f62e 100644
--- a/etc/lrztar.profile
+++ b/etc/lrztar.profile
@@ -1,6 +1,7 @@
1# Firejail profile for lrztar 1# Firejail profile for lrztar
2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq 2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include lrztar.local 6include lrztar.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/lrzuntar.profile b/etc/lrzuntar.profile
index f21169b24..245d1c669 100644
--- a/etc/lrzuntar.profile
+++ b/etc/lrzuntar.profile
@@ -1,6 +1,7 @@
1# Firejail profile for lrzuntar 1# Firejail profile for lrzuntar
2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq 2# Description: Multi-threaded compression with rzip/lzma, lzo and zpaq
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include lrzuntar.local 6include lrzuntar.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/mencoder.profile b/etc/mencoder.profile
index 136412d11..aac394a59 100644
--- a/etc/mencoder.profile
+++ b/etc/mencoder.profile
@@ -25,4 +25,5 @@ shell none
25 25
26private-bin mencoder 26private-bin mencoder
27 27
28# Redirect
28include mplayer.profile 29include mplayer.profile
diff --git a/etc/mousepad.profile b/etc/mousepad.profile
index 3b9807b28..20370a5b5 100644
--- a/etc/mousepad.profile
+++ b/etc/mousepad.profile
@@ -26,6 +26,7 @@ noroot
26nosound 26nosound
27notv 27notv
28nou2f 28nou2f
29novideo
29protocol unix 30protocol unix
30seccomp 31seccomp
31shell none 32shell none
diff --git a/etc/mpd.profile b/etc/mpd.profile
index 0b5ebf705..6c5963793 100644
--- a/etc/mpd.profile
+++ b/etc/mpd.profile
@@ -31,7 +31,7 @@ novideo
31protocol unix,inet,inet6 31protocol unix,inet,inet6
32# blacklisting of ioprio_set system calls breaks auto-updating of 32# blacklisting of ioprio_set system calls breaks auto-updating of
33# MPD's database when files in music_directory are changed 33# MPD's database when files in music_directory are changed
34seccomp.drop @cpu-emulation,@debug,@obsolete,@privileged,@resources,add_key,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,kcmp,keyctl,name_to_handle_at,ni_syscall,open_by_handle_at,personality,process_vm_readv,ptrace,remap_file_pages,request_key,syslog,umount,userfaultfd,vmsplice 34seccomp !ioprio_set
35shell none 35shell none
36 36
37#private-bin bash,mpd 37#private-bin bash,mpd
diff --git a/etc/mpsyt.profile b/etc/mpsyt.profile
index 878a5f654..546755ecb 100644
--- a/etc/mpsyt.profile
+++ b/etc/mpsyt.profile
@@ -48,16 +48,22 @@ include whitelist-var-common.inc
48apparmor 48apparmor
49caps.drop all 49caps.drop all
50netfilter 50netfilter
51nodbus
52nodvd
51# Seems to cause issues with Nvidia drivers sometimes 53# Seems to cause issues with Nvidia drivers sometimes
52nogroups 54nogroups
53nonewprivs 55nonewprivs
54noroot 56noroot
57notv
58nou2f
59novideo
55protocol unix,inet,inet6 60protocol unix,inet,inet6
56seccomp 61seccomp
57shell none 62shell none
58tracelog 63tracelog
59 64
60private-bin env,ffmpeg,mplayer,mpsyt,mpv,python*,youtube-dl 65private-bin env,ffmpeg,mplayer,mpsyt,mpv,python*,youtube-dl
66#private-cache
61private-dev 67private-dev
62private-tmp 68private-tmp
63 69
diff --git a/etc/mpv.profile b/etc/mpv.profile
index d8163d20a..289a3cd5d 100644
--- a/etc/mpv.profile
+++ b/etc/mpv.profile
@@ -16,6 +16,7 @@ include allow-python2.inc
16include allow-python3.inc 16include allow-python3.inc
17 17
18noblacklist ${MUSIC} 18noblacklist ${MUSIC}
19noblacklist ${PICTURES}
19noblacklist ${VIDEOS} 20noblacklist ${VIDEOS}
20 21
21include disable-common.inc 22include disable-common.inc
diff --git a/etc/mutt.profile b/etc/mutt.profile
index c424dbb85..92babd50f 100644
--- a/etc/mutt.profile
+++ b/etc/mutt.profile
@@ -17,7 +17,6 @@ noblacklist ${HOME}/.emacs
17noblacklist ${HOME}/.emacs.d 17noblacklist ${HOME}/.emacs.d
18noblacklist ${HOME}/.gnupg 18noblacklist ${HOME}/.gnupg
19noblacklist ${HOME}/.mail 19noblacklist ${HOME}/.mail
20noblacklist ${HOME}/.mailcap
21noblacklist ${HOME}/.msmtprc 20noblacklist ${HOME}/.msmtprc
22noblacklist ${HOME}/.mutt 21noblacklist ${HOME}/.mutt
23noblacklist ${HOME}/.muttrc 22noblacklist ${HOME}/.muttrc
diff --git a/etc/nano.profile b/etc/nano.profile
index 30a6e03e7..9965d8a6b 100644
--- a/etc/nano.profile
+++ b/etc/nano.profile
@@ -1,6 +1,7 @@
1# Firejail profile for nano 1# Firejail profile for nano
2# Description: nano is an easy text editor for the terminal 2# Description: nano is an easy text editor for the terminal
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include nano.local 6include nano.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/nethack-vultures.profile b/etc/nethack-vultures.profile
index e1294153b..079f44ee7 100644
--- a/etc/nethack-vultures.profile
+++ b/etc/nethack-vultures.profile
@@ -7,7 +7,6 @@ include nethack.local
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.vultures 9noblacklist ${HOME}/.vultures
10noblacklist /var/log
11 10
12include disable-common.inc 11include disable-common.inc
13include disable-devel.inc 12include disable-devel.inc
diff --git a/etc/okular.profile b/etc/okular.profile
index 99357934d..56fd21fc8 100644
--- a/etc/okular.profile
+++ b/etc/okular.profile
@@ -49,7 +49,7 @@ tracelog
49 49
50private-bin kbuildsycoca4,kdeinit4,lpr,okular 50private-bin kbuildsycoca4,kdeinit4,lpr,okular
51private-dev 51private-dev
52private-etc alternatives,cups,fonts,kde4rc,kde5rc,ld.so.cache,machine-id,xdg 52private-etc alternatives,cups,fonts,kde4rc,kde5rc,ld.so.cache,machine-id,passwd,xdg
53# private-tmp - on KDE we need access to the real /tmp for data exchange with email clients 53# private-tmp - on KDE we need access to the real /tmp for data exchange with email clients
54 54
55# memory-deny-write-execute 55# memory-deny-write-execute
diff --git a/etc/open-invaders.profile b/etc/open-invaders.profile
index d80b3d351..5925ccc09 100644
--- a/etc/open-invaders.profile
+++ b/etc/open-invaders.profile
@@ -27,6 +27,7 @@ nonewprivs
27noroot 27noroot
28notv 28notv
29nou2f 29nou2f
30novideo
30protocol unix,netlink 31protocol unix,netlink
31seccomp 32seccomp
32shell none 33shell none
diff --git a/etc/p7zip.profile b/etc/p7zip.profile
index 644292f2b..7e0069afc 100644
--- a/etc/p7zip.profile
+++ b/etc/p7zip.profile
@@ -1,6 +1,7 @@
1# Firejail profile for p7zip 1# Firejail profile for p7zip
2# Description: 7zr file archiver with high compression ratio 2# Description: 7zr file archiver with high compression ratio
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include p7zip.local 6include p7zip.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/palemoon.profile b/etc/palemoon.profile
index 11464e6cf..acb2ce176 100644
--- a/etc/palemoon.profile
+++ b/etc/palemoon.profile
@@ -14,8 +14,8 @@ whitelist ${HOME}/.cache/moonchild productions/pale moon
14whitelist ${HOME}/.moonchild productions 14whitelist ${HOME}/.moonchild productions
15 15
16# Palemoon can use the full firejail seccomp filter (unlike firefox >= 60) 16# Palemoon can use the full firejail seccomp filter (unlike firefox >= 60)
17ignore seccomp.drop
18seccomp 17seccomp
18ignore seccomp
19 19
20#private-bin palemoon 20#private-bin palemoon
21# private-etc must first be enabled in firefox-common.profile 21# private-etc must first be enabled in firefox-common.profile
diff --git a/etc/pdftotext.profile b/etc/pdftotext.profile
index c5016201d..f1a5741d0 100644
--- a/etc/pdftotext.profile
+++ b/etc/pdftotext.profile
@@ -1,4 +1,5 @@
1# Firejail profile for pdftotext 1# Firejail profile for pdftotext
2# Description: Portable Document Format (PDF) to text converter
2# This file is overwritten after every install/update 3# This file is overwritten after every install/update
3# Persistent local customizations 4# Persistent local customizations
4include pdftotext.local 5include pdftotext.local
diff --git a/etc/ping.profile b/etc/ping.profile
index 00ac45c5a..4ff5250d7 100644
--- a/etc/ping.profile
+++ b/etc/ping.profile
@@ -1,4 +1,5 @@
1# Firejail profile for ping 1# Firejail profile for ping
2# Description: send ICMP ECHO_REQUEST to network hosts
2# This file is overwritten after every install/update 3# This file is overwritten after every install/update
3quiet 4quiet
4# Persistent local customizations 5# Persistent local customizations
diff --git a/etc/pingus.profile b/etc/pingus.profile
index 782ee200d..a3adc55a2 100644
--- a/etc/pingus.profile
+++ b/etc/pingus.profile
@@ -27,6 +27,7 @@ nonewprivs
27noroot 27noroot
28notv 28notv
29nou2f 29nou2f
30novideo
30protocol unix,netlink 31protocol unix,netlink
31seccomp 32seccomp
32shell none 33shell none
diff --git a/etc/pluma.profile b/etc/pluma.profile
index 81b2b1481..dadfcc44e 100644
--- a/etc/pluma.profile
+++ b/etc/pluma.profile
@@ -6,11 +6,11 @@ include pluma.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.config/enchant
9noblacklist ${HOME}/.config/pluma 10noblacklist ${HOME}/.config/pluma
10noblacklist ${HOME}/.python-history 11
11noblacklist ${HOME}/.python_history 12# Allows files commonly used by IDEs
12noblacklist ${HOME}/.pythonhist 13include allow-common-devel.inc
13noblacklist ${HOME}/.pythonrc.py
14 14
15include disable-common.inc 15include disable-common.inc
16include disable-devel.inc 16include disable-devel.inc
@@ -42,7 +42,7 @@ tracelog
42 42
43private-bin pluma 43private-bin pluma
44private-dev 44private-dev
45private-lib pluma 45private-lib aspell,gconv,libgspell-1.so.*,libreadline.so.*,libtinfo.so.*,pluma
46private-tmp 46private-tmp
47 47
48memory-deny-write-execute 48memory-deny-write-execute
diff --git a/etc/ppsspp.profile b/etc/ppsspp.profile
index 116698312..970290002 100644
--- a/etc/ppsspp.profile
+++ b/etc/ppsspp.profile
@@ -8,8 +8,6 @@ include globals.local
8 8
9noblacklist ${HOME}/.config/ppsspp 9noblacklist ${HOME}/.config/ppsspp
10noblacklist ${DOCUMENTS} 10noblacklist ${DOCUMENTS}
11# with >=llvm-4 mesa drivers need llvm stuff
12noblacklist /usr/lib/llvm*
13 11
14include disable-common.inc 12include disable-common.inc
15include disable-devel.inc 13include disable-devel.inc
diff --git a/etc/pycharm-community.profile b/etc/pycharm-community.profile
index 17218adee..9ee426a95 100644
--- a/etc/pycharm-community.profile
+++ b/etc/pycharm-community.profile
@@ -6,14 +6,13 @@ include pycharm-community.local
6include globals.local 6include globals.local
7 7
8noblacklist ${HOME}/.PyCharmCE* 8noblacklist ${HOME}/.PyCharmCE*
9noblacklist ${HOME}/.python-history
10noblacklist ${HOME}/.python_history
11noblacklist ${HOME}/.pythonhist
12noblacklist ${HOME}/.pythonrc.py
13 9
14# Allow java (blacklisted by disable-devel.inc) 10# Allow java (blacklisted by disable-devel.inc)
15include allow-java.inc 11include allow-java.inc
16 12
13# Allows files commonly used by IDEs
14include allow-common-devel.inc
15
17include disable-common.inc 16include disable-common.inc
18include disable-devel.inc 17include disable-devel.inc
19include disable-passwdmgr.inc 18include disable-passwdmgr.inc
diff --git a/etc/pzstd.profile b/etc/pzstd.profile
new file mode 100644
index 000000000..ce9af3286
--- /dev/null
+++ b/etc/pzstd.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for zstd
2# This file is overwritten after every install/update
3
4# Redirect
5include zstd.profile
diff --git a/etc/qemu-system-x86_64.profile b/etc/qemu-system-x86_64.profile
index 1399328d3..47b9d6a9a 100644
--- a/etc/qemu-system-x86_64.profile
+++ b/etc/qemu-system-x86_64.profile
@@ -1,4 +1,5 @@
1# Firejail profile for qemu-system-x86_64 1# Firejail profile for qemu-system-x86_64
2# Description: QEMU system emulator for x86_64
2# This file is overwritten after every install/update 3# This file is overwritten after every install/update
3# Persistent local customizations 4# Persistent local customizations
4include qemu-system-x86_64.local 5include qemu-system-x86_64.local
diff --git a/etc/qgis.profile b/etc/qgis.profile
index 80a10efce..88ed0cd81 100644
--- a/etc/qgis.profile
+++ b/etc/qgis.profile
@@ -45,7 +45,7 @@ notv
45nou2f 45nou2f
46novideo 46novideo
47# blacklisting of mbind system calls breaks old version 47# blacklisting of mbind system calls breaks old version
48seccomp.drop @cpu-emulation,@debug,@obsolete,@privileged,add_key,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,migrate_pages,mincore,move_pages,name_to_handle_at,ni_syscall,open_by_handle_at,remap_file_pages,request_key,set_mempolicy,syslog,umount,userfaultfd,vmsplice 48seccomp !mbind
49protocol unix,inet,inet6,netlink 49protocol unix,inet,inet6,netlink
50shell none 50shell none
51tracelog 51tracelog
diff --git a/etc/qt-faststart.profile b/etc/qt-faststart.profile
index cf459472a..2cdff33a6 100644
--- a/etc/qt-faststart.profile
+++ b/etc/qt-faststart.profile
@@ -1,6 +1,7 @@
1# Firejail profile for qt-faststart 1# Firejail profile for qt-faststart
2# Description: FFmpeg-based media utility 2# Description: FFmpeg-based media utility
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include qt-faststart.local 6include qt-faststart.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/qupzilla.profile b/etc/qupzilla.profile
index 954b1a3b4..3f3270dd6 100644
--- a/etc/qupzilla.profile
+++ b/etc/qupzilla.profile
@@ -3,7 +3,8 @@
3# Persistent local customizations 3# Persistent local customizations
4include qupzilla.local 4include qupzilla.local
5# Persistent global definitions 5# Persistent global definitions
6include globals.local 6# added by included profile
7#include globals.local
7 8
8noblacklist ${HOME}/.cache/qupzilla 9noblacklist ${HOME}/.cache/qupzilla
9noblacklist ${HOME}/.config/qupzilla 10noblacklist ${HOME}/.config/qupzilla
@@ -17,26 +18,10 @@ include disable-programs.inc
17 18
18mkdir ${HOME}/.cache/qupzilla 19mkdir ${HOME}/.cache/qupzilla
19mkdir ${HOME}/.config/qupzilla 20mkdir ${HOME}/.config/qupzilla
20whitelist ${DOWNLOADS}
21whitelist ${HOME}/.cache/qupzilla 21whitelist ${HOME}/.cache/qupzilla
22whitelist ${HOME}/.config/qupzilla 22whitelist ${HOME}/.config/qupzilla
23include whitelist-common.inc
24include whitelist-var-common.inc
25 23
26caps.drop all
27netfilter
28nodvd
29nogroups
30nonewprivs
31noroot
32notv
33nou2f
34protocol unix,inet,inet6,netlink
35# blacklisting of chroot system calls breaks qupzilla
36seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice
37# tracelog
38
39private-dev
40# private-etc alternatives,passwd,group,hostname,hosts,localtime,nsswitch.conf,resolv.conf,gtk-2.0,pango,fonts,adobe,mime.types,mailcap,asound.conf,pulse,machine-id,ca-certificates,ssl,pki,crypto-policies
41# private-tmp - interferes with the opening of downloaded files 24# private-tmp - interferes with the opening of downloaded files
42 25
26# Redirect
27include falkon.profile
diff --git a/etc/qutebrowser.profile b/etc/qutebrowser.profile
index e556ecf1f..95c189458 100644
--- a/etc/qutebrowser.profile
+++ b/etc/qutebrowser.profile
@@ -9,8 +9,6 @@ include globals.local
9noblacklist ${HOME}/.cache/qutebrowser 9noblacklist ${HOME}/.cache/qutebrowser
10noblacklist ${HOME}/.config/qutebrowser 10noblacklist ${HOME}/.config/qutebrowser
11noblacklist ${HOME}/.local/share/qutebrowser 11noblacklist ${HOME}/.local/share/qutebrowser
12# with >=llvm-4 mesa drivers need llvm stuff
13noblacklist /usr/lib/llvm*
14 12
15# Allow python (blacklisted by disable-interpreters.inc) 13# Allow python (blacklisted by disable-interpreters.inc)
16include allow-python2.inc 14include allow-python2.inc
@@ -38,5 +36,5 @@ noroot
38notv 36notv
39protocol unix,inet,inet6,netlink 37protocol unix,inet,inet6,netlink
40# blacklisting of chroot system calls breaks qt webengine 38# blacklisting of chroot system calls breaks qt webengine
41seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice 39seccomp !chroot
42# tracelog 40# tracelog
diff --git a/etc/riot-desktop.profile b/etc/riot-desktop.profile
index e6af4c2cb..4372fabe1 100644
--- a/etc/riot-desktop.profile
+++ b/etc/riot-desktop.profile
@@ -7,8 +7,7 @@ include riot-desktop.local
7# added by included profile 7# added by included profile
8#include globals.local 8#include globals.local
9 9
10ignore seccomp 10seccomp !chroot
11seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,mincore,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,pivot_root,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice
12 11
13# Redirect 12# Redirect
14include riot-web.profile 13include riot-web.profile
diff --git a/etc/rnano.profile b/etc/rnano.profile
index 565c957e0..d9048982a 100644
--- a/etc/rnano.profile
+++ b/etc/rnano.profile
@@ -1,6 +1,7 @@
1# Firejail profile for rnano 1# Firejail profile for rnano
2# Description: A restricted nano 2# Description: A restricted nano
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include rnano.local 6include rnano.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/rsync-download_only.profile b/etc/rsync-download_only.profile
new file mode 100644
index 000000000..bda3bca92
--- /dev/null
+++ b/etc/rsync-download_only.profile
@@ -0,0 +1,55 @@
1# Firejail profile for rsync
2# Description: a fast, versatile, remote (and local) file-copying tool
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include rsync.local
7# Persistent global definitions
8include globals.local
9
10# Warning: This profile is writte to use rsync as an client for downloading,
11# it is not writen to use rsync as an daemon (rsync --daemon) or to create backups.
12
13# Usage: firejail --profile=rsync-download_only rsync
14
15blacklist /tmp/.X11-unix
16
17include disable-common.inc
18include disable-devel.inc
19include disable-exec.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25# Uncomment or add to rsync.local to enable extra hardening
26#whitelist ${DOWNLOADS}
27include whitelist-var-common.inc
28
29caps.drop all
30ipc-namespace
31machine-id
32netfilter
33no3d
34nodbus
35nodvd
36nogroups
37nonewprivs
38noroot
39nosound
40notv
41nou2f
42novideo
43protocol unix,inet,inet6
44seccomp
45shell none
46tracelog
47
48disable-mnt
49private-bin rsync
50private-cache
51private-dev
52private-etc alternatives,ca-certificates,crypto-policies,host.conf,hostname,hosts,nsswitch.conf,pki,protocols,resolv.conf,rpc,services,ssl
53private-tmp
54
55memory-deny-write-execute
diff --git a/etc/scallion.profile b/etc/scallion.profile
index 232ec4346..dee9e1f40 100644
--- a/etc/scallion.profile
+++ b/etc/scallion.profile
@@ -7,7 +7,6 @@ include scallion.local
7include globals.local 7include globals.local
8 8
9noblacklist ${PATH}/llvm* 9noblacklist ${PATH}/llvm*
10noblacklist /usr/lib/llvm*
11noblacklist ${PATH}/openssl 10noblacklist ${PATH}/openssl
12noblacklist ${PATH}/openssl-1.0 11noblacklist ${PATH}/openssl-1.0
13noblacklist ${DOCUMENTS} 12noblacklist ${DOCUMENTS}
diff --git a/etc/scp.profile b/etc/scp.profile
index ca902061c..287b8029a 100644
--- a/etc/scp.profile
+++ b/etc/scp.profile
@@ -1,6 +1,7 @@
1# Firejail profile for scp 1# Firejail profile for scp
2# Description: Secure shell copy 2# Description: Secure shell copy
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include scp.local 6include scp.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/seahorse-daemon.profile b/etc/seahorse-daemon.profile
index 7c0e59c74..6410da4d8 100644
--- a/etc/seahorse-daemon.profile
+++ b/etc/seahorse-daemon.profile
@@ -1,6 +1,7 @@
1# Firejail profile for seahorse-daemon 1# Firejail profile for seahorse-daemon
2# Description: PGP encryption and signing 2# Description: PGP encryption and signing
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include seahorse-daemon.local 6include seahorse-daemon.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/seahorse-tool.profile b/etc/seahorse-tool.profile
index 96f365a4b..4bf23c512 100644
--- a/etc/seahorse-tool.profile
+++ b/etc/seahorse-tool.profile
@@ -7,8 +7,6 @@ include seahorse-tool.local
7# added by included profile 7# added by included profile
8#include globals.local 8#include globals.local
9 9
10noblacklist ${DOWNLOADS}
11
12private-tmp 10private-tmp
13 11
14memory-deny-write-execute 12memory-deny-write-execute
diff --git a/etc/seahorse.profile b/etc/seahorse.profile
index 0c824e95b..b9a0fd149 100644
--- a/etc/seahorse.profile
+++ b/etc/seahorse.profile
@@ -8,7 +8,6 @@ include globals.local
8 8
9blacklist /tmp/.X11-unix 9blacklist /tmp/.X11-unix
10 10
11noblacklist ${HOME}/.config/dconf
12noblacklist ${HOME}/.gnupg 11noblacklist ${HOME}/.gnupg
13noblacklist ${HOME}/.ssh 12noblacklist ${HOME}/.ssh
14noblacklist /tmp/ssh-* 13noblacklist /tmp/ssh-*
diff --git a/etc/sftp.profile b/etc/sftp.profile
index c980e1751..66dc2a57b 100644
--- a/etc/sftp.profile
+++ b/etc/sftp.profile
@@ -1,6 +1,7 @@
1# Firejail profile for sftp 1# Firejail profile for sftp
2# Description: Secure file transport protocol 2# Description: Secure file transport protocol
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include sftp.local 6include sftp.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/shotcut.profile b/etc/shotcut.profile
index e6c48561f..5b3c5439d 100644
--- a/etc/shotcut.profile
+++ b/etc/shotcut.profile
@@ -1,4 +1,5 @@
1# Firejail profile for shotcut 1# Firejail profile for shotcut
2# Description: A free, open source, cross-platform video editor
2# This file is overwritten after every install/update 3# This file is overwritten after every install/update
3# Persistent local customizations 4# Persistent local customizations
4include shotcut.local 5include shotcut.local
diff --git a/etc/simple-scan.profile b/etc/simple-scan.profile
index 64441483d..a0c9e8303 100644
--- a/etc/simple-scan.profile
+++ b/etc/simple-scan.profile
@@ -27,7 +27,7 @@ notv
27# novideo 27# novideo
28protocol unix,inet,inet6,netlink 28protocol unix,inet,inet6,netlink
29# blacklisting of ioperm system calls breaks simple-scan 29# blacklisting of ioperm system calls breaks simple-scan
30seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@reboot,@resources,@swap,acct,add_key,bpf,chroot,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,iopl,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,pciconfig_iobase,pciconfig_read,pciconfig_write,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,s390_mmio_read,s390_mmio_write,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice 30seccomp !ioperm
31shell none 31shell none
32tracelog 32tracelog
33 33
diff --git a/etc/simutrans.profile b/etc/simutrans.profile
index 7febcde46..c6f5f70b0 100644
--- a/etc/simutrans.profile
+++ b/etc/simutrans.profile
@@ -27,6 +27,7 @@ nonewprivs
27noroot 27noroot
28notv 28notv
29nou2f 29nou2f
30novideo
30protocol unix 31protocol unix
31seccomp 32seccomp
32shell none 33shell none
diff --git a/etc/skanlite.profile b/etc/skanlite.profile
index c10be717b..6f9bfd201 100644
--- a/etc/skanlite.profile
+++ b/etc/skanlite.profile
@@ -27,7 +27,7 @@ notv
27# novideo 27# novideo
28protocol unix,inet,inet6,netlink 28protocol unix,inet,inet6,netlink
29# blacklisting of ioperm system calls breaks skanlite 29# blacklisting of ioperm system calls breaks skanlite
30seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@reboot,@resources,@swap,acct,add_key,bpf,chroot,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,iopl,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,pciconfig_iobase,pciconfig_read,pciconfig_write,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,s390_mmio_read,s390_mmio_write,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice 30seccomp !ioperm
31shell none 31shell none
32 32
33# private-bin kbuildsycoca4,kdeinit4,skanlite 33# private-bin kbuildsycoca4,kdeinit4,skanlite
diff --git a/etc/skypeforlinux.profile b/etc/skypeforlinux.profile
index eae7dada0..fe9ededa4 100644
--- a/etc/skypeforlinux.profile
+++ b/etc/skypeforlinux.profile
@@ -25,7 +25,7 @@ nonewprivs
25noroot 25noroot
26notv 26notv
27protocol unix,inet,inet6,netlink 27protocol unix,inet,inet6,netlink
28seccomp 28seccomp !chroot
29shell none 29shell none
30 30
31disable-mnt 31disable-mnt
diff --git a/etc/slack.profile b/etc/slack.profile
index 5c10ef0ba..8b5338fa7 100644
--- a/etc/slack.profile
+++ b/etc/slack.profile
@@ -20,7 +20,6 @@ include whitelist-common.inc
20include whitelist-var-common.inc 20include whitelist-var-common.inc
21 21
22caps.drop all 22caps.drop all
23name slack
24netfilter 23netfilter
25nodvd 24nodvd
26nogroups 25nogroups
@@ -35,5 +34,5 @@ shell none
35disable-mnt 34disable-mnt
36private-bin locale,slack 35private-bin locale,slack
37private-dev 36private-dev
38private-etc alternatives,asound.conf,ca-certificates,crypto-policies,fonts,group,ld.so.cache,ld.so.conf,localtime,machine-id,passwd,pki,pulse,resolv.conf,ssl 37private-etc alternatives,asound.conf,ca-certificates,crypto-policies,debian_version,fedora-release,fonts,group,ld.so.cache,ld.so.conf,localtime,machine-id,os-release,passwd,pki,pulse,redhat-release,resolv.conf,ssl,system-release,system-release-cpe
39private-tmp 38private-tmp
diff --git a/etc/sqlitebrowser.profile b/etc/sqlitebrowser.profile
index 9cba69a77..d423bb65c 100644
--- a/etc/sqlitebrowser.profile
+++ b/etc/sqlitebrowser.profile
@@ -42,4 +42,4 @@ private-dev
42private-etc alternatives,ca-certificates,crypto-policies,fonts,group,machine-id,passwd,pki,ssl 42private-etc alternatives,ca-certificates,crypto-policies,fonts,group,machine-id,passwd,pki,ssl
43private-tmp 43private-tmp
44 44
45#memory-deny-write-execute - breaks on Arch 45#memory-deny-write-execute - breaks on Arch (see issue #1803)
diff --git a/etc/ssh-agent.profile b/etc/ssh-agent.profile
index 15e2de9b0..9934e92b0 100644
--- a/etc/ssh-agent.profile
+++ b/etc/ssh-agent.profile
@@ -24,6 +24,7 @@ nodvd
24nonewprivs 24nonewprivs
25noroot 25noroot
26notv 26notv
27novideo
27protocol unix,inet,inet6 28protocol unix,inet,inet6
28seccomp 29seccomp
29shell none 30shell none
diff --git a/etc/ssh.profile b/etc/ssh.profile
index 7a9bb5abe..6949299af 100644
--- a/etc/ssh.profile
+++ b/etc/ssh.profile
@@ -30,6 +30,7 @@ nonewprivs
30nosound 30nosound
31notv 31notv
32nou2f 32nou2f
33novideo
33protocol unix,inet,inet6 34protocol unix,inet,inet6
34seccomp 35seccomp
35shell none 36shell none
diff --git a/etc/standardnotes-desktop.profile b/etc/standardnotes-desktop.profile
index 5703f932a..aa6902854 100644
--- a/etc/standardnotes-desktop.profile
+++ b/etc/standardnotes-desktop.profile
@@ -34,7 +34,7 @@ nosound
34notv 34notv
35nou2f 35nou2f
36protocol unix,inet,inet6,netlink 36protocol unix,inet,inet6,netlink
37seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,mincore,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,pivot_root,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice 37seccomp !chroot
38 38
39disable-mnt 39disable-mnt
40private-dev 40private-dev
diff --git a/etc/start-tor-browser.desktop.profile b/etc/start-tor-browser.desktop.profile
index 9c3175ad7..2f73c9fee 100644
--- a/etc/start-tor-browser.desktop.profile
+++ b/etc/start-tor-browser.desktop.profile
@@ -6,8 +6,7 @@ include start-tor-browser.desktop.local
6# added by included profile 6# added by included profile
7#include globals.local 7#include globals.local
8 8
9noblacklist ${HOME}/.tor-browser-* 9noblacklist ${HOME}/.tor-browser*
10noblacklist ${HOME}/.tor-browser_*
11 10
12whitelist ${HOME}/.tor-browser-ar 11whitelist ${HOME}/.tor-browser-ar
13whitelist ${HOME}/.tor-browser-ca 12whitelist ${HOME}/.tor-browser-ca
diff --git a/etc/start-tor-browser.profile b/etc/start-tor-browser.profile
index 1c2a2cd10..a8b5d109e 100644
--- a/etc/start-tor-browser.profile
+++ b/etc/start-tor-browser.profile
@@ -28,7 +28,7 @@ notv
28nou2f 28nou2f
29novideo 29novideo
30protocol unix,inet,inet6 30protocol unix,inet,inet6
31seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice 31seccomp !chroot
32shell none 32shell none
33# tracelog may cause issues, see github issue #1930 33# tracelog may cause issues, see github issue #1930
34#tracelog 34#tracelog
diff --git a/etc/steam.profile b/etc/steam.profile
index 569f281a0..654ea825e 100644
--- a/etc/steam.profile
+++ b/etc/steam.profile
@@ -19,8 +19,6 @@ noblacklist ${HOME}/.local/share/vulkan
19noblacklist ${HOME}/.steam 19noblacklist ${HOME}/.steam
20noblacklist ${HOME}/.steampath 20noblacklist ${HOME}/.steampath
21noblacklist ${HOME}/.steampid 21noblacklist ${HOME}/.steampid
22# with >=llvm-4 mesa drivers need llvm stuff
23noblacklist /usr/lib/llvm*
24# needed for STEAM_RUNTIME_PREFER_HOST_LIBRARIES=1 to work 22# needed for STEAM_RUNTIME_PREFER_HOST_LIBRARIES=1 to work
25noblacklist /sbin 23noblacklist /sbin
26noblacklist /usr/sbin 24noblacklist /usr/sbin
diff --git a/etc/strings.profile b/etc/strings.profile
index 621e8e177..0817d7331 100644
--- a/etc/strings.profile
+++ b/etc/strings.profile
@@ -1,4 +1,5 @@
1# Firejail profile for strings 1# Firejail profile for strings
2# Description: print the strings of printable characters in files
2# This file is overwritten after every install/update 3# This file is overwritten after every install/update
3quiet 4quiet
4# Persistent local customizations 5# Persistent local customizations
@@ -43,3 +44,4 @@ private-lib libfakeroot
43private-tmp 44private-tmp
44 45
45memory-deny-write-execute 46memory-deny-write-execute
47read-only ${HOME}
diff --git a/etc/subdownloader.profile b/etc/subdownloader.profile
index d0176a657..6de408740 100644
--- a/etc/subdownloader.profile
+++ b/etc/subdownloader.profile
@@ -31,6 +31,7 @@ nonewprivs
31noroot 31noroot
32notv 32notv
33nou2f 33nou2f
34novideo
34protocol unix,inet,inet6 35protocol unix,inet,inet6
35seccomp 36seccomp
36shell none 37shell none
diff --git a/etc/supertux2.profile b/etc/supertux2.profile
index 287a078b3..4c64ee766 100644
--- a/etc/supertux2.profile
+++ b/etc/supertux2.profile
@@ -1,4 +1,5 @@
1# Firejail profile for supertux2 1# Firejail profile for supertux2
2# Description: Jump'n run like game
2# This file is overwritten after every install/update 3# This file is overwritten after every install/update
3# Persistent local customizations 4# Persistent local customizations
4include supertux2.local 5include supertux2.local
@@ -27,6 +28,7 @@ nonewprivs
27noroot 28noroot
28notv 29notv
29nou2f 30nou2f
31novideo
30protocol unix,netlink 32protocol unix,netlink
31seccomp 33seccomp
32shell none 34shell none
diff --git a/etc/supertuxkart.profile b/etc/supertuxkart.profile
index 2cd5ec3ad..8a48eeac8 100644
--- a/etc/supertuxkart.profile
+++ b/etc/supertuxkart.profile
@@ -47,7 +47,7 @@ disable-mnt
47private-bin supertuxkart 47private-bin supertuxkart
48private-cache 48private-cache
49private-dev 49private-dev
50private-etc alternatives,ca-certificates,crypto-policies,drirc,hosts,machine-id,openal,pki,resolv.conf,selinux,ssl,system-fips,xdg 50private-etc alternatives,ca-certificates,crypto-policies,drirc,hosts,machine-id,openal,pki,resolv.conf,ssl
51private-tmp 51private-tmp
52private-opt none 52private-opt none
53private-srv none 53private-srv none
diff --git a/etc/tb-starter-wrapper.profile b/etc/tb-starter-wrapper.profile
index 8a7d45449..ffe9605b6 100644
--- a/etc/tb-starter-wrapper.profile
+++ b/etc/tb-starter-wrapper.profile
@@ -13,7 +13,7 @@ noblacklist ${HOME}/.tb
13mkdir ${HOME}/.tb 13mkdir ${HOME}/.tb
14whitelist ${HOME}/.tb 14whitelist ${HOME}/.tb
15 15
16x11 xorg 16private-bin tb-starter-wrapper
17 17
18# Redirect 18# Redirect
19include torbrowser-launcher.profile 19include torbrowser-launcher.profile
diff --git a/etc/teamspeak3.profile b/etc/teamspeak3.profile
index 8d5917148..c1c666f58 100644
--- a/etc/teamspeak3.profile
+++ b/etc/teamspeak3.profile
@@ -33,7 +33,7 @@ notv
33nou2f 33nou2f
34novideo 34novideo
35protocol unix,inet,inet6,netlink 35protocol unix,inet,inet6,netlink
36seccomp 36seccomp !chroot
37shell none 37shell none
38 38
39disable-mnt 39disable-mnt
diff --git a/etc/templates/profile.template b/etc/templates/profile.template
index 2fc5c3ef1..0d67e222f 100644
--- a/etc/templates/profile.template
+++ b/etc/templates/profile.template
@@ -87,6 +87,9 @@ include globals.local
87# Allow lua (blacklisted by disable-interpreters.inc) 87# Allow lua (blacklisted by disable-interpreters.inc)
88#include allow-lua.inc 88#include allow-lua.inc
89 89
90# Allows files commonly used by IDEs
91#include allow-common-devel.inc
92
90#include disable-common.inc 93#include disable-common.inc
91#include disable-devel.inc 94#include disable-devel.inc
92#include disable-exec.inc 95#include disable-exec.inc
diff --git a/etc/templates/syscalls.txt b/etc/templates/syscalls.txt
index 30ad6feea..bc45d9f9d 100644
--- a/etc/templates/syscalls.txt
+++ b/etc/templates/syscalls.txt
@@ -1,6 +1,9 @@
1Hints for writing seccomp.drop lines 1Hints for writing seccomp.drop lines
2==================================== 2====================================
3 3
4Definition of groups
5--------------------
6
4@clock=adjtimex,clock_adjtime,clock_settime,settimeofday,stime 7@clock=adjtimex,clock_adjtime,clock_settime,settimeofday,stime
5@module=delete_module,finit_module,init_module 8@module=delete_module,finit_module,init_module
6@raw-io=ioperm,iopl,pciconfig_iobase,pciconfig_read,pciconfig_write,s390_mmio_read,s390_mmio_write 9@raw-io=ioperm,iopl,pciconfig_iobase,pciconfig_read,pciconfig_write,s390_mmio_read,s390_mmio_write
@@ -20,6 +23,8 @@ Hints for writing seccomp.drop lines
20 23
21@default-keep=execve,prctl 24@default-keep=execve,prctl
22 25
26Inheritance of groups
27---------------------
23 28
24+---------+----------------+---------------+ 29+---------+----------------+---------------+
25| @clock | @cpu-emulation | @default-keep | 30| @clock | @cpu-emulation | @default-keep |
@@ -41,7 +46,28 @@ Hints for writing seccomp.drop lines
41| @default-nodebuggers | 46| @default-nodebuggers |
42+----------------------+ 47+----------------------+
43 48
49common used seccomp.drop lines
50------------------------------
44 51
45@default without chroot: @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,pivot_root,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice 52@default without chroot: @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,pivot_root,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice
46 53
47@default-nodebuggers without chroot: @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice 54@default-nodebuggers without chroot: @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice
55
56Building a seccomp.drop line if seccomp breaks a programm
57---------------------------------------------------------
58
59```
60$ journalctl --grep=syscall --follow
61<...> audit[…]: SECCOMP <...> syscall=161 <...>
62$ firejail --debug-syscalls | grep 161
63161 - chroot
64```
65
66TODO: write a short explanation
67TODO: suggest to use `allow-debuggers` instead of `seccomp.drop` if possible
68
69see also
70--------
71
72 - contrib/syscalls.sh
73 - https://firejail.wordpress.com/documentation-2/seccomp-guide/
diff --git a/etc/tor-browser.profile b/etc/tor-browser.profile
new file mode 100644
index 000000000..0cd84abf5
--- /dev/null
+++ b/etc/tor-browser.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for torbrowser-launcher
2# This file is overwritten after every install/update
3
4noblacklist ${HOME}/.tor-browser
5
6mkdir ${HOME}/.tor-browser
7whitelist ${HOME}/.tor-browser
8
9# Redirect
10include torbrowser-launcher.profile
diff --git a/etc/torbrowser-launcher.profile b/etc/torbrowser-launcher.profile
index 75bcb04b4..1183cd2f7 100644
--- a/etc/torbrowser-launcher.profile
+++ b/etc/torbrowser-launcher.profile
@@ -42,13 +42,13 @@ notv
42nou2f 42nou2f
43novideo 43novideo
44protocol unix,inet,inet6 44protocol unix,inet,inet6
45seccomp.drop @clock,@cpu-emulation,@debug,@module,@obsolete,@raw-io,@reboot,@resources,@swap,acct,add_key,bpf,fanotify_init,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioprio_set,kcmp,keyctl,mount,name_to_handle_at,nfsservctl,ni_syscall,open_by_handle_at,personality,pivot_root,process_vm_readv,ptrace,remap_file_pages,request_key,setdomainname,sethostname,syslog,umount,umount2,userfaultfd,vhangup,vmsplice 45seccomp !chroot
46shell none 46shell none
47# tracelog may cause issues, see github issue #1930 47# tracelog may cause issues, see github issue #1930
48#tracelog 48#tracelog
49 49
50disable-mnt 50disable-mnt
51private-bin bash,cat,cp,cut,dirname,env,expr,file,getconf,gpg,grep,gxmessage,id,kdialog,ln,mkdir,pwd,python*,readlink,realpath,rm,sed,sh,tail,tar,tclsh,test,tor-browser-en,torbrowser-launcher,update-desktop-database,xmessage,xz,zenity 51private-bin bash,cat,cp,cut,dirname,env,expr,file,gpg,grep,gxmessage,kdialog,ln,mkdir,mv,python*,rm,sed,sh,tail,tar,tclsh,test,tor-browser,tor-browser-en,torbrowser-launcher,update-desktop-database,xmessage,xz,zenity
52private-dev 52private-dev
53private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,hostname,hosts,ld.so.cache,machine-id,pki,pulse,resolv.conf,ssl 53private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,ld.so.cache,machine-id,pki,pulse,resolv.conf,ssl
54private-tmp 54private-tmp
diff --git a/etc/transmission-cli.profile b/etc/transmission-cli.profile
index 60732bcf2..486be5fe6 100644
--- a/etc/transmission-cli.profile
+++ b/etc/transmission-cli.profile
@@ -7,37 +7,8 @@ include transmission-cli.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10noblacklist ${HOME}/.cache/transmission 10private-bin transmission-cli
11noblacklist ${HOME}/.config/transmission
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20apparmor
21caps.drop all
22machine-id
23netfilter
24nodbus
25nodvd
26nonewprivs
27noroot
28nosound
29notv
30nou2f
31novideo
32protocol inet,inet6
33seccomp
34shell none
35tracelog
36
37# private-bin transmission-cli
38private-dev
39private-etc alternatives,ca-certificates,crypto-policies,nsswitch.conf,pki,resolv.conf,ssl 11private-etc alternatives,ca-certificates,crypto-policies,nsswitch.conf,pki,resolv.conf,ssl
40private-lib
41private-tmp
42 12
43memory-deny-write-execute 13# Redirect
14include transmission-common.profile
diff --git a/etc/transmission-common.profile b/etc/transmission-common.profile
new file mode 100644
index 000000000..1b1fc4af7
--- /dev/null
+++ b/etc/transmission-common.profile
@@ -0,0 +1,46 @@
1# Firejail profile for transmission-common
2# Description: Fast, easy and free BitTorrent client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include transmission-common.local
6
7noblacklist ${HOME}/.cache/transmission
8noblacklist ${HOME}/.config/transmission
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17mkdir ${HOME}/.cache/transmission
18mkdir ${HOME}/.config/transmission
19whitelist ${DOWNLOADS}
20whitelist ${HOME}/.cache/transmission
21whitelist ${HOME}/.config/transmission
22include whitelist-common.inc
23include whitelist-var-common.inc
24
25apparmor
26caps.drop all
27machine-id
28netfilter
29nodbus
30nodvd
31nonewprivs
32noroot
33nosound
34notv
35nou2f
36novideo
37protocol unix,inet,inet6
38seccomp
39shell none
40tracelog
41
42private-dev
43private-lib
44private-tmp
45
46memory-deny-write-execute
diff --git a/etc/transmission-create.profile b/etc/transmission-create.profile
index 9b84bc33a..8220b7887 100644
--- a/etc/transmission-create.profile
+++ b/etc/transmission-create.profile
@@ -1,11 +1,13 @@
1# Firejail profile for transmission-create 1# Firejail profile for transmission-create
2# Description: CLI utility to create BitTorrent .torrent files 2# Description: CLI utility to create BitTorrent .torrent files
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include transmission-create.local 6include transmission-create.local
6# Persistent global definitions 7# Persistent global definitions
7# added by included profile 8include globals.local
8#include globals.local 9
10private-bin transmission-create
9 11
10# Redirect 12# Redirect
11include transmission-cli.profile 13include transmission-common.profile
diff --git a/etc/transmission-daemon.profile b/etc/transmission-daemon.profile
index 9a6052ada..f1e7fcb17 100644
--- a/etc/transmission-daemon.profile
+++ b/etc/transmission-daemon.profile
@@ -7,38 +7,16 @@ include transmission-daemon.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10noblacklist ${HOME}/.cache/transmission 10whitelist /var/lib/transmission
11noblacklist ${HOME}/.config/transmission
12 11
13include disable-common.inc 12caps.keep ipc_lock,net_bind_service,setgid,setuid,sys_chroot
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19 13
20apparmor 14private-bin transmission-daemon
21caps.drop all
22machine-id
23netfilter
24nodbus
25nodvd
26nogroups
27nonewprivs
28noroot
29nosound
30notv
31nou2f
32novideo
33protocol inet,inet6
34seccomp
35shell none
36tracelog
37
38# private-bin transmission-daemon
39private-dev
40private-etc alternatives,ca-certificates,crypto-policies,nsswitch.conf,pki,resolv.conf,ssl 15private-etc alternatives,ca-certificates,crypto-policies,nsswitch.conf,pki,resolv.conf,ssl
41private-lib
42private-tmp
43 16
44memory-deny-write-execute 17read-write /var/lib/transmission
18writable-var-log
19writable-run-user
20
21# Redirect
22include transmission-common.profile
diff --git a/etc/transmission-edit.profile b/etc/transmission-edit.profile
index 07990aa15..df381b5cd 100644
--- a/etc/transmission-edit.profile
+++ b/etc/transmission-edit.profile
@@ -1,11 +1,13 @@
1# Firejail profile for transmission-edit 1# Firejail profile for transmission-edit
2# Description: CLI utility to modify BitTorrent .torrent files' announce URLs 2# Description: CLI utility to modify BitTorrent .torrent files' announce URLs
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include transmission-edit.local 6include transmission-edit.local
6# Persistent global definitions 7# Persistent global definitions
7# added by included profile 8include globals.local
8#include globals.local 9
10private-bin transmission-edit
9 11
10# Redirect 12# Redirect
11include transmission-cli.profile 13include transmission-common.profile
diff --git a/etc/transmission-gtk.profile b/etc/transmission-gtk.profile
index 29df63573..01bdeb4ef 100644
--- a/etc/transmission-gtk.profile
+++ b/etc/transmission-gtk.profile
@@ -1,50 +1,15 @@
1# Firejail profile for transmission-gtk 1# Firejail profile for transmission-gtk
2# Description: Fast, easy and free BitTorrent client (GTK GUI) 2# Description: Fast, easy and free BitTorrent client (GTK GUI)
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include transmission-gtk.local 6include transmission-gtk.local
6# Persistent global definitions 7# Persistent global definitions
7include globals.local 8include globals.local
8 9
9noblacklist ${HOME}/.cache/transmission
10noblacklist ${HOME}/.config/transmission
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19mkdir ${HOME}/.cache/transmission
20mkdir ${HOME}/.config/transmission
21whitelist ${DOWNLOADS}
22whitelist ${HOME}/.cache/transmission
23whitelist ${HOME}/.config/transmission
24include whitelist-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29machine-id
30netfilter
31nodbus
32nodvd
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix,inet,inet6
40seccomp
41shell none
42tracelog
43
44private-bin transmission-gtk 10private-bin transmission-gtk
45private-dev
46private-lib
47private-tmp
48 11
49# Causes freeze during opening file dialog in Archlinux, see issue #1855 12ignore memory-deny-write-execute
50# memory-deny-write-execute 13
14# Redirect
15include transmission-common.profile
diff --git a/etc/transmission-qt.profile b/etc/transmission-qt.profile
index 9fda5245f..94f3c3a20 100644
--- a/etc/transmission-qt.profile
+++ b/etc/transmission-qt.profile
@@ -1,49 +1,18 @@
1# Firejail profile for transmission-qt 1# Firejail profile for transmission-qt
2# Description: Fast, easy and free BitTorrent client (Qt GUI) 2# Description: Fast, easy and free BitTorrent client (Qt GUI)
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include transmission-qt.local 6include transmission-qt.local
6# Persistent global definitions 7# Persistent global definitions
7include globals.local 8include globals.local
8 9
9noblacklist ${HOME}/.cache/transmission 10private-bin transmission-qt
10noblacklist ${HOME}/.config/transmission
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19mkdir ${HOME}/.cache/transmission
20mkdir ${HOME}/.config/transmission
21whitelist ${DOWNLOADS}
22whitelist ${HOME}/.cache/transmission
23whitelist ${HOME}/.config/transmission
24include whitelist-common.inc
25include whitelist-var-common.inc
26 11
27apparmor 12# private-lib - breaks on Arch
28caps.drop all 13ignore private-lib
29machine-id
30netfilter
31nodbus
32nodvd
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix,inet,inet6
40seccomp
41shell none
42tracelog
43 14
44private-bin transmission-qt 15ignore memory-deny-write-execute
45private-dev
46# private-lib - problems on Arch
47private-tmp
48 16
49# memory-deny-write-execute - problems on Qt 5.10.0, KDE Frameworks 5.41.0 17# Redirect
18include transmission-common.profile
diff --git a/etc/transmission-remote-cli.profile b/etc/transmission-remote-cli.profile
index 98b875fc5..8b3a966c1 100644
--- a/etc/transmission-remote-cli.profile
+++ b/etc/transmission-remote-cli.profile
@@ -1,25 +1,17 @@
1# Firejail profile for transmission-remote-cli 1# Firejail profile for transmission-remote-cli
2# Description: A remote control utility for transmission-daemon (CLI) 2# Description: A remote control utility for transmission-daemon (CLI)
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include transmission-remote-cli.local 6include transmission-remote-cli.local
6# Persistent global definitions 7# Persistent global definitions
7# added by included profile 8include globals.local
8#include globals.local
9 9
10# Allow python (blacklisted by disable-interpreters.inc) 10# Allow python (blacklisted by disable-interpreters.inc)
11include allow-python2.inc 11include allow-python2.inc
12include allow-python3.inc 12include allow-python3.inc
13 13
14mkdir ${HOME}/.cache/transmission 14private-bin python*,transmission-remote-cli
15mkdir ${HOME}/.config/transmission
16whitelist ${HOME}/.cache/transmission
17whitelist ${HOME}/.config/transmission
18include whitelist-common.inc
19include whitelist-var-common.inc
20
21# private-bin python*
22private-etc fonts
23 15
24# Redirect 16# Redirect
25include transmission-remote.profile 17include transmission-common.profile
diff --git a/etc/transmission-remote-gtk.profile b/etc/transmission-remote-gtk.profile
index b7173def5..a6400e2c0 100644
--- a/etc/transmission-remote-gtk.profile
+++ b/etc/transmission-remote-gtk.profile
@@ -1,20 +1,22 @@
1# Firejail profile for transmission-remote-gtk 1# Firejail profile for transmission-remote-gtk
2# Description: A remote control utility for transmission-daemon (GTK GUI) 2# Description: A remote control utility for transmission-daemon (GTK GUI)
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include transmission-remote-gtk.local 6include transmission-remote-gtk.local
6# Persistent global definitions 7# Persistent global definitions
7# added by included profile 8include globals.local
8#include globals.local
9 9
10mkdir ${HOME}/.cache/transmission 10noblacklist ${HOME}/.config/transmission-remote-gtk
11mkdir ${HOME}/.config/transmission
12whitelist ${HOME}/.cache/transmission
13whitelist ${HOME}/.config/transmission
14include whitelist-common.inc
15include whitelist-var-common.inc
16 11
17private-etc fonts 12mkdir ${HOME}/.config/transmission-remote-gtk
13whitelist ${HOME}/.config/transmission-remote-gtk
14
15private-etc fonts,hostname,hosts,resolv.conf
16# Problems with private-lib (see issue #2889)
17ignore private-lib
18
19ignore memory-deny-write-execute
18 20
19# Redirect 21# Redirect
20include transmission-remote.profile 22include transmission-common.profile
diff --git a/etc/transmission-remote.profile b/etc/transmission-remote.profile
index ddeb9adf9..fee4999e6 100644
--- a/etc/transmission-remote.profile
+++ b/etc/transmission-remote.profile
@@ -7,37 +7,8 @@ include transmission-remote.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10noblacklist ${HOME}/.cache/transmission 10private-bin transmission-remote
11noblacklist ${HOME}/.config/transmission
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20apparmor
21caps.drop all
22machine-id
23netfilter
24nodbus
25nodvd
26nonewprivs
27noroot
28nosound
29notv
30nou2f
31novideo
32protocol inet,inet6
33seccomp
34shell none
35tracelog
36
37# private-bin transmission-remote
38private-dev
39private-etc alternatives,hosts,nsswitch.conf 11private-etc alternatives,hosts,nsswitch.conf
40private-lib
41private-tmp
42 12
43memory-deny-write-execute 13# Redirect
14include transmission-common.profile
diff --git a/etc/transmission-show.profile b/etc/transmission-show.profile
index 779606f04..5a3c83f58 100644
--- a/etc/transmission-show.profile
+++ b/etc/transmission-show.profile
@@ -1,41 +1,14 @@
1# Firejail profile for transmission-show 1# Firejail profile for transmission-show
2# Description: CLI utility to show BitTorrent .torrent file metadata 2# Description: CLI utility to show BitTorrent .torrent file metadata
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include transmission-show.local 6include transmission-show.local
6# Persistent global definitions 7# Persistent global definitions
7include globals.local 8include globals.local
8 9
9noblacklist ${HOME}/.cache/transmission 10private-bin transmission-show
10noblacklist ${HOME}/.config/transmission
11
12include disable-common.inc
13include disable-devel.inc
14include disable-exec.inc
15include disable-interpreters.inc
16include disable-passwdmgr.inc
17include disable-programs.inc
18
19apparmor
20caps.drop all
21machine-id
22netfilter
23nodbus
24nodvd
25nonewprivs
26noroot
27nosound
28notv
29nou2f
30novideo
31protocol inet,inet6
32seccomp
33shell none
34tracelog
35
36private-dev
37private-etc alternatives,hosts,nsswitch.conf 11private-etc alternatives,hosts,nsswitch.conf
38private-lib
39private-tmp
40 12
41memory-deny-write-execute 13# Redirect
14include transmission-common.profile
diff --git a/etc/unknown-horizons.profile b/etc/unknown-horizons.profile
index b62d3111d..7223ea2e1 100644
--- a/etc/unknown-horizons.profile
+++ b/etc/unknown-horizons.profile
@@ -23,6 +23,7 @@ nonewprivs
23noroot 23noroot
24notv 24notv
25nou2f 25nou2f
26novideo
26protocol unix,inet,inet6,netlink 27protocol unix,inet,inet6,netlink
27seccomp 28seccomp
28shell none 29shell none
diff --git a/etc/unzstd.profile b/etc/unzstd.profile
new file mode 100644
index 000000000..ce9af3286
--- /dev/null
+++ b/etc/unzstd.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for zstd
2# This file is overwritten after every install/update
3
4# Redirect
5include zstd.profile
diff --git a/etc/vim.profile b/etc/vim.profile
index 49abb0d44..d27a9a633 100644
--- a/etc/vim.profile
+++ b/etc/vim.profile
@@ -6,14 +6,13 @@ include vim.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.python-history
10noblacklist ${HOME}/.python_history
11noblacklist ${HOME}/.pythonhist
12noblacklist ${HOME}/.pythonrc.py
13noblacklist ${HOME}/.vim 9noblacklist ${HOME}/.vim
14noblacklist ${HOME}/.viminfo 10noblacklist ${HOME}/.viminfo
15noblacklist ${HOME}/.vimrc 11noblacklist ${HOME}/.vimrc
16 12
13# Allows files commonly used by IDEs
14include allow-common-devel.inc
15
17include disable-common.inc 16include disable-common.inc
18include disable-passwdmgr.inc 17include disable-passwdmgr.inc
19include disable-programs.inc 18include disable-programs.inc
diff --git a/etc/virtualbox.profile b/etc/virtualbox.profile
index 45f9949f3..c0dbc9116 100644
--- a/etc/virtualbox.profile
+++ b/etc/virtualbox.profile
@@ -26,7 +26,7 @@ whitelist ${DOWNLOADS}
26include whitelist-common.inc 26include whitelist-common.inc
27include whitelist-var-common.inc 27include whitelist-var-common.inc
28 28
29caps.drop all 29caps.keep net_raw,sys_admin,sys_nice
30netfilter 30netfilter
31nodvd 31nodvd
32notv 32notv
diff --git a/etc/warzone2100.profile b/etc/warzone2100.profile
index 85cbc5e43..e65e0a0c3 100644
--- a/etc/warzone2100.profile
+++ b/etc/warzone2100.profile
@@ -30,6 +30,7 @@ nonewprivs
30noroot 30noroot
31notv 31notv
32nou2f 32nou2f
33novideo
33protocol unix,inet,inet6,netlink 34protocol unix,inet,inet6,netlink
34seccomp 35seccomp
35shell none 36shell none
diff --git a/etc/webstorm.profile b/etc/webstorm.profile
index e820bae00..fc4e8e571 100644
--- a/etc/webstorm.profile
+++ b/etc/webstorm.profile
@@ -7,14 +7,13 @@ include globals.local
7 7
8noblacklist ${HOME}/.WebStorm* 8noblacklist ${HOME}/.WebStorm*
9noblacklist ${HOME}/.android 9noblacklist ${HOME}/.android
10noblacklist ${HOME}/.config/git
11noblacklist ${HOME}/.gitconfig
12noblacklist ${HOME}/.git-credentials
13noblacklist ${HOME}/.gradle
14noblacklist ${HOME}/.local/share/JetBrains 10noblacklist ${HOME}/.local/share/JetBrains
15noblacklist ${HOME}/.ssh 11noblacklist ${HOME}/.ssh
16noblacklist ${HOME}/.tooling 12noblacklist ${HOME}/.tooling
17 13
14# Allows files commonly used by IDEs
15include allow-common-devel.inc
16
18noblacklist ${PATH}/node 17noblacklist ${PATH}/node
19noblacklist ${HOME}/.nvm 18noblacklist ${HOME}/.nvm
20 19
diff --git a/etc/wesnoth.profile b/etc/wesnoth.profile
index a67d3a1b8..934edfce9 100644
--- a/etc/wesnoth.profile
+++ b/etc/wesnoth.profile
@@ -30,6 +30,7 @@ nonewprivs
30noroot 30noroot
31notv 31notv
32nou2f 32nou2f
33novideo
33protocol unix,inet,inet6 34protocol unix,inet,inet6
34seccomp 35seccomp
35 36
diff --git a/etc/whalebird.profile b/etc/whalebird.profile
new file mode 100644
index 000000000..26932b6b3
--- /dev/null
+++ b/etc/whalebird.profile
@@ -0,0 +1,45 @@
1# Firejail profile for whalebird
2# Description: Electron-based Mastodon/Pleroma client
3# This file is overwritten after every install/update
4# Persistent local customizations
5include whalebird.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Whalebird
10
11include disable-common.inc
12include disable-devel.inc
13include disable-exec.inc
14include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc
18
19mkdir ${HOME}/.config/Whalebird
20whitelist ${HOME}/.config/Whalebird
21whitelist ${DOWNLOADS}
22include whitelist-common.inc
23include whitelist-var-common.inc
24
25apparmor
26caps.drop all
27netfilter
28no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f
35novideo
36protocol unix,inet,inet6
37seccomp
38shell none
39
40disable-mnt
41private-bin whalebird
42private-cache
43private-dev
44private-etc fonts,machine-id
45private-tmp
diff --git a/etc/whois.profile b/etc/whois.profile
index f101ee637..859542533 100644
--- a/etc/whois.profile
+++ b/etc/whois.profile
@@ -1,7 +1,7 @@
1# Firejail profile for whois 1# Firejail profile for whois
2# Description: Intelligent WHOIS client 2# Description: Intelligent WHOIS client
3quiet
4# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations 5# Persistent local customizations
6include whois.local 6include whois.local
7# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/wine.profile b/etc/wine.profile
index 34c695cf1..192c375cd 100644
--- a/etc/wine.profile
+++ b/etc/wine.profile
@@ -11,8 +11,6 @@ noblacklist ${HOME}/.local/share/Steam
11noblacklist ${HOME}/.local/share/steam 11noblacklist ${HOME}/.local/share/steam
12noblacklist ${HOME}/.steam 12noblacklist ${HOME}/.steam
13noblacklist ${HOME}/.wine 13noblacklist ${HOME}/.wine
14# with >=llvm-4 mesa drivers need llvm stuff
15noblacklist /usr/lib/llvm*
16 14
17include disable-common.inc 15include disable-common.inc
18include disable-devel.inc 16include disable-devel.inc
diff --git a/etc/xed.profile b/etc/xed.profile
index a02f1ef51..a67230e51 100644
--- a/etc/xed.profile
+++ b/etc/xed.profile
@@ -9,7 +9,6 @@ noblacklist ${HOME}/.config/xed
9noblacklist ${HOME}/.python-history 9noblacklist ${HOME}/.python-history
10noblacklist ${HOME}/.python_history 10noblacklist ${HOME}/.python_history
11noblacklist ${HOME}/.pythonhist 11noblacklist ${HOME}/.pythonhist
12noblacklist ${HOME}/.pythonrc.py
13 12
14# Allow python (blacklisted by disable-interpreters.inc) 13# Allow python (blacklisted by disable-interpreters.inc)
15include allow-python2.inc 14include allow-python2.inc
diff --git a/etc/xmr-stak.profile b/etc/xmr-stak.profile
index 3fbdf66ab..c6ba9bd9d 100644
--- a/etc/xmr-stak.profile
+++ b/etc/xmr-stak.profile
@@ -6,7 +6,6 @@ include xmr-stak.local
6include globals.local 6include globals.local
7 7
8noblacklist ${HOME}/.xmr-stak 8noblacklist ${HOME}/.xmr-stak
9noblacklist /usr/lib/llvm*
10 9
11include disable-common.inc 10include disable-common.inc
12include disable-devel.inc 11include disable-devel.inc
diff --git a/etc/xpra.profile b/etc/xpra.profile
index 6f66b9300..1033a7471 100644
--- a/etc/xpra.profile
+++ b/etc/xpra.profile
@@ -1,6 +1,7 @@
1# Firejail profile for xpra 1# Firejail profile for xpra
2# Description: Tool to detach/reattach running X programs 2# Description: Tool to detach/reattach running X programs
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include xpra.local 6include xpra.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/youtube-dl.profile b/etc/youtube-dl.profile
index 6fc519bee..d87d29ee8 100644
--- a/etc/youtube-dl.profile
+++ b/etc/youtube-dl.profile
@@ -19,6 +19,8 @@ noblacklist ${VIDEOS}
19include allow-python2.inc 19include allow-python2.inc
20include allow-python3.inc 20include allow-python3.inc
21 21
22blacklist /tmp/.X11-unix
23
22include disable-common.inc 24include disable-common.inc
23include disable-devel.inc 25include disable-devel.inc
24include disable-exec.inc 26include disable-exec.inc
diff --git a/etc/zathura.profile b/etc/zathura.profile
index 922284353..db03076be 100644
--- a/etc/zathura.profile
+++ b/etc/zathura.profile
@@ -28,6 +28,7 @@ noroot
28nosound 28nosound
29notv 29notv
30nou2f 30nou2f
31novideo
31protocol unix 32protocol unix
32seccomp 33seccomp
33shell none 34shell none
diff --git a/etc/zpaq.profile b/etc/zpaq.profile
index 6bf3605eb..80329ecfd 100644
--- a/etc/zpaq.profile
+++ b/etc/zpaq.profile
@@ -1,6 +1,7 @@
1# Firejail profile for zpaq 1# Firejail profile for zpaq
2# Description: Programmable file compressor, library and utilities. Based on the PAQ compression algorithm. 2# Description: Programmable file compressor, library and utilities. Based on the PAQ compression algorithm.
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4quiet
4# Persistent local customizations 5# Persistent local customizations
5include zpaq.local 6include zpaq.local
6# Persistent global definitions 7# Persistent global definitions
diff --git a/etc/zstd.profile b/etc/zstd.profile
new file mode 100644
index 000000000..ea7bbfb0d
--- /dev/null
+++ b/etc/zstd.profile
@@ -0,0 +1,42 @@
1# Firejail profile for zstd
2# Description: Zstandard - Fast real-time compression algorithm
3# This file is overwritten after every install/update
4quiet
5# Persistent local customizations
6include zstd.local
7# Persistent global definitions
8include globals.local
9
10include disable-common.inc
11include disable-devel.inc
12include disable-exec.inc
13include disable-interpreters.inc
14include disable-passwdmgr.inc
15include disable-programs.inc
16
17apparmor
18caps.drop all
19hostname zstd
20ipc-namespace
21machine-id
22net none
23no3d
24nodbus
25nodvd
26nogroups
27nonewprivs
28#noroot
29nosound
30notv
31nou2f
32novideo
33protocol unix
34seccomp
35shell none
36tracelog
37x11 none
38
39private-cache
40private-dev
41
42memory-deny-write-execute
diff --git a/etc/zstdcat.profile b/etc/zstdcat.profile
new file mode 100644
index 000000000..ce9af3286
--- /dev/null
+++ b/etc/zstdcat.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for zstd
2# This file is overwritten after every install/update
3
4# Redirect
5include zstd.profile
diff --git a/etc/zstdgrep.profile b/etc/zstdgrep.profile
new file mode 100644
index 000000000..ce9af3286
--- /dev/null
+++ b/etc/zstdgrep.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for zstd
2# This file is overwritten after every install/update
3
4# Redirect
5include zstd.profile
diff --git a/etc/zstdless.profile b/etc/zstdless.profile
new file mode 100644
index 000000000..ce9af3286
--- /dev/null
+++ b/etc/zstdless.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for zstd
2# This file is overwritten after every install/update
3
4# Redirect
5include zstd.profile
diff --git a/etc/zstdmt.profile b/etc/zstdmt.profile
new file mode 100644
index 000000000..ce9af3286
--- /dev/null
+++ b/etc/zstdmt.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for zstd
2# This file is overwritten after every install/update
3
4# Redirect
5include zstd.profile
diff --git a/etc/zulip.profile b/etc/zulip.profile
new file mode 100644
index 000000000..999c2f77a
--- /dev/null
+++ b/etc/zulip.profile
@@ -0,0 +1,47 @@
1# Firejail profile for zulip
2# Description: Real-time team chat based on the email threading model
3# This file is overwritten after every install/update
4# Persistent local customizations
5include zulip.local
6# Persistent global definitions
7include globals.local
8
9ignore noexec /tmp
10
11noblacklist ${HOME}/.config/Zulip
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21mkdir ${HOME}/.config/Zulip
22whitelist ${HOME}/.config/Zulip
23whitelist ${DOWNLOADS}
24include whitelist-common.inc
25include whitelist-var-common.inc
26
27apparmor
28caps.drop all
29netfilter
30no3d
31nodvd
32nogroups
33nonewprivs
34noroot
35notv
36nou2f
37novideo
38protocol unix,inet,inet6
39seccomp
40shell none
41
42disable-mnt
43private-bin locale,zulip
44private-cache
45private-dev
46private-etc asound.conf,fonts,machine-id
47private-tmp