aboutsummaryrefslogtreecommitdiffstats
path: root/etc
diff options
context:
space:
mode:
Diffstat (limited to 'etc')
-rw-r--r--etc/baloo_file.profile2
-rw-r--r--etc/baloo_filemetadata_temp_extractor.profile11
-rw-r--r--etc/bitlbee.profile1
-rw-r--r--etc/clion.profile34
-rw-r--r--etc/disable-common.inc6
-rw-r--r--etc/disable-programs.inc3
-rw-r--r--etc/discord.profile4
-rw-r--r--etc/firefox-common-addons.inc13
-rw-r--r--etc/firejail-default10
-rw-r--r--etc/flowblade.profile6
-rw-r--r--etc/less.profile2
-rw-r--r--etc/musixmatch.profile1
-rw-r--r--etc/openshot.profile6
-rw-r--r--etc/ppsspp.profile42
-rw-r--r--etc/ranger.profile10
-rw-r--r--etc/scallion.profile42
-rw-r--r--etc/skypeforlinux.profile2
-rw-r--r--etc/uzbl-browser.profile7
-rw-r--r--etc/zathura.profile3
19 files changed, 188 insertions, 17 deletions
diff --git a/etc/baloo_file.profile b/etc/baloo_file.profile
index b71f66ba5..240573f44 100644
--- a/etc/baloo_file.profile
+++ b/etc/baloo_file.profile
@@ -35,7 +35,7 @@ seccomp.drop @cpu-emulation,@debug,@obsolete,@privileged,@resources,add_key,fano
35shell none 35shell none
36# x11 xorg 36# x11 xorg
37 37
38private-bin baloo_file,baloo_file_extractor,kbuildsycoca4 38private-bin baloo_file,baloo_file_extractor,baloo_filemetadata_temp_extractor,kbuildsycoca4
39private-dev 39private-dev
40private-tmp 40private-tmp
41 41
diff --git a/etc/baloo_filemetadata_temp_extractor.profile b/etc/baloo_filemetadata_temp_extractor.profile
new file mode 100644
index 000000000..6d09ecf40
--- /dev/null
+++ b/etc/baloo_filemetadata_temp_extractor.profile
@@ -0,0 +1,11 @@
1# Firejail profile for baloo_filemetadata_temp_extractor
2# This file is overwritten after every install/update
3# Persistent local customizations
4quiet
5include /etc/firejail/baloo_filemetadata_temp_extractor.local
6# Persistent global definitions
7include /etc/firejail/globals.local
8
9
10# Redirect
11include /etc/firejail/baloo_file.profile
diff --git a/etc/bitlbee.profile b/etc/bitlbee.profile
index b6baa66bc..1cd5d6a69 100644
--- a/etc/bitlbee.profile
+++ b/etc/bitlbee.profile
@@ -28,7 +28,6 @@ seccomp
28disable-mnt 28disable-mnt
29private 29private
30private-dev 30private-dev
31private-dev
32private-tmp 31private-tmp
33read-write /var/lib/bitlbee 32read-write /var/lib/bitlbee
34 33
diff --git a/etc/clion.profile b/etc/clion.profile
new file mode 100644
index 000000000..115df72c4
--- /dev/null
+++ b/etc/clion.profile
@@ -0,0 +1,34 @@
1# Firejail profile for CLion
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/clion.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8noblacklist ${HOME}/.CLion*
9noblacklist ${HOME}/.gitconfig
10noblacklist ${HOME}/.java
11noblacklist ${HOME}/.local/share/JetBrains
12noblacklist ${HOME}/.ssh
13noblacklist ${HOME}/.tooling
14
15include /etc/firejail/disable-common.inc
16include /etc/firejail/disable-passwdmgr.inc
17include /etc/firejail/disable-programs.inc
18
19caps.drop all
20netfilter
21nodvd
22nogroups
23nonewprivs
24noroot
25notv
26novideo
27protocol unix,inet,inet6
28seccomp
29shell none
30
31private-dev
32# private-tmp
33
34noexec /tmp
diff --git a/etc/disable-common.inc b/etc/disable-common.inc
index ff5dc7b6b..71d4ad97b 100644
--- a/etc/disable-common.inc
+++ b/etc/disable-common.inc
@@ -116,6 +116,10 @@ blacklist /run/user/*/kdeinit5__*
116# blacklist /tmp/ksocket-*/kdeinit4__* 116# blacklist /tmp/ksocket-*/kdeinit4__*
117# - causes issues when kdeinit4 gets killed; enable on KDE Plasma 4 117# - causes issues when kdeinit4 gets killed; enable on KDE Plasma 4
118 118
119# gnome
120# contains extensions, last used times of applications, and notifications
121blacklist ${HOME}/.local/share/gnome-shell
122
119# systemd 123# systemd
120blacklist ${HOME}/.config/systemd 124blacklist ${HOME}/.config/systemd
121blacklist ${HOME}/.local/share/systemd 125blacklist ${HOME}/.local/share/systemd
@@ -160,7 +164,7 @@ blacklist /var/lib/mysql/mysql.sock
160blacklist /var/lib/mysqld/mysql.sock 164blacklist /var/lib/mysqld/mysql.sock
161blacklist /var/lib/pacman 165blacklist /var/lib/pacman
162blacklist /var/lib/upower 166blacklist /var/lib/upower
163# blacklist /var/log - a virtual /var/log directory (mostly empty) is buid up by default for 167# blacklist /var/log - a virtual /var/log directory (mostly empty) is build up by default for
164# every sandbox, unless --writeble-var-log switch is activated 168# every sandbox, unless --writeble-var-log switch is activated
165blacklist /var/mail 169blacklist /var/mail
166blacklist /var/opt 170blacklist /var/opt
diff --git a/etc/disable-programs.inc b/etc/disable-programs.inc
index b68dde0c4..d3dc87089 100644
--- a/etc/disable-programs.inc
+++ b/etc/disable-programs.inc
@@ -8,6 +8,7 @@ blacklist ${HOME}/.*coin
8blacklist ${HOME}/.8pecxstudios 8blacklist ${HOME}/.8pecxstudios
9blacklist ${HOME}/.AndroidStudio* 9blacklist ${HOME}/.AndroidStudio*
10blacklist ${HOME}/.Atom 10blacklist ${HOME}/.Atom
11blacklist ${HOME}/.CLion*
11blacklist ${HOME}/.FBReader 12blacklist ${HOME}/.FBReader
12blacklist ${HOME}/.FontForge 13blacklist ${HOME}/.FontForge
13blacklist ${HOME}/.IdeaIC* 14blacklist ${HOME}/.IdeaIC*
@@ -188,6 +189,7 @@ blacklist ${HOME}/.config/Pinta
188blacklist ${HOME}/.config/pitivi 189blacklist ${HOME}/.config/pitivi
189blacklist ${HOME}/.config/pix 190blacklist ${HOME}/.config/pix
190blacklist ${HOME}/.config/pluma 191blacklist ${HOME}/.config/pluma
192blacklist ${HOME}/.config/ppsspp
191blacklist ${HOME}/.config/psi+ 193blacklist ${HOME}/.config/psi+
192blacklist ${HOME}/.config/qBittorrent 194blacklist ${HOME}/.config/qBittorrent
193blacklist ${HOME}/.config/qBittorrentrc 195blacklist ${HOME}/.config/qBittorrentrc
@@ -429,6 +431,7 @@ blacklist ${HOME}/.local/share/telepathy
429blacklist ${HOME}/.local/share/terasology 431blacklist ${HOME}/.local/share/terasology
430blacklist ${HOME}/.local/share/torbrowser 432blacklist ${HOME}/.local/share/torbrowser
431blacklist ${HOME}/.local/share/totem 433blacklist ${HOME}/.local/share/totem
434blacklist ${HOME}/.local/share/uzbl
432blacklist ${HOME}/.local/share/vlc 435blacklist ${HOME}/.local/share/vlc
433blacklist ${HOME}/.local/share/vpltd 436blacklist ${HOME}/.local/share/vpltd
434blacklist ${HOME}/.local/share/vulkan 437blacklist ${HOME}/.local/share/vulkan
diff --git a/etc/discord.profile b/etc/discord.profile
index bb59ed42d..40deae2fc 100644
--- a/etc/discord.profile
+++ b/etc/discord.profile
@@ -24,9 +24,9 @@ novideo
24protocol unix,inet,inet6,netlink 24protocol unix,inet,inet6,netlink
25seccomp 25seccomp
26 26
27private-bin discord,sh,xdg-mime 27private-bin discord,sh,xdg-mime,tr,sed,echo,head,cut,xdg-open,grep,egrep
28private-dev 28private-dev
29private-etc fonts 29private-etc fonts,machine-id
30private-tmp 30private-tmp
31 31
32noexec ${HOME} 32noexec ${HOME}
diff --git a/etc/firefox-common-addons.inc b/etc/firefox-common-addons.inc
index b237c3c05..f5fd4aa5b 100644
--- a/etc/firefox-common-addons.inc
+++ b/etc/firefox-common-addons.inc
@@ -16,7 +16,6 @@ noblacklist ${HOME}/.kde4/share/apps/okular
16noblacklist ${HOME}/.kde4/share/config/kgetrc 16noblacklist ${HOME}/.kde4/share/config/kgetrc
17noblacklist ${HOME}/.kde4/share/config/okularpartrc 17noblacklist ${HOME}/.kde4/share/config/okularpartrc
18noblacklist ${HOME}/.kde4/share/config/okularrc 18noblacklist ${HOME}/.kde4/share/config/okularrc
19# noblacklist ${HOME}/.local/share/gnome-shell/extensions
20noblacklist ${HOME}/.local/share/kget 19noblacklist ${HOME}/.local/share/kget
21noblacklist ${HOME}/.local/share/okular 20noblacklist ${HOME}/.local/share/okular
22noblacklist ${HOME}/.local/share/qpdfview 21noblacklist ${HOME}/.local/share/qpdfview
@@ -41,7 +40,6 @@ whitelist ${HOME}/.kde4/share/config/okularpartrc
41whitelist ${HOME}/.kde4/share/config/okularrc 40whitelist ${HOME}/.kde4/share/config/okularrc
42whitelist ${HOME}/.keysnail.js 41whitelist ${HOME}/.keysnail.js
43whitelist ${HOME}/.lastpass 42whitelist ${HOME}/.lastpass
44whitelist ${HOME}/.local/share/gnome-shell/extensions
45whitelist ${HOME}/.local/share/kget 43whitelist ${HOME}/.local/share/kget
46whitelist ${HOME}/.local/share/okular 44whitelist ${HOME}/.local/share/okular
47whitelist ${HOME}/.local/share/qpdfview 45whitelist ${HOME}/.local/share/qpdfview
@@ -53,3 +51,14 @@ whitelist ${HOME}/.wine-pipelight
53whitelist ${HOME}/.wine-pipelight64 51whitelist ${HOME}/.wine-pipelight64
54whitelist ${HOME}/.zotero 52whitelist ${HOME}/.zotero
55whitelist ${HOME}/dwhelper 53whitelist ${HOME}/dwhelper
54
55# GNOME Shell integration (chrome-gnome-shell) needs dbus and python 3 (blacklisted by disable-interpreters.inc)
56noblacklist ${HOME}/.local/share/gnome-shell
57whitelist ${HOME}/.local/share/gnome-shell
58ignore nodbus
59noblacklist ${PATH}/python3*
60noblacklist /usr/lib/python3*
61
62# Flash plugin
63# private-etc must first be enabled in firefox-common.profile and in profiles including it.
64#private-etc adobe
diff --git a/etc/firejail-default b/etc/firejail-default
index 2e48439f5..5cfb1b5ea 100644
--- a/etc/firejail-default
+++ b/etc/firejail-default
@@ -21,10 +21,10 @@ profile firejail-default flags=(attach_disconnected,mediate_deleted) {
21#dbus, 21#dbus,
22 22
23########## 23##########
24# Allows to attach to a running program and modify the process memory. 24# With ptrace it is possible to inspect and hijack running programs. Usually this
25# May be needed by chromium crash handler. Uncomment if you need it. 25# is needed only for debugging. To allow ptrace, uncomment the following line
26########## 26##########
27#ptrace (trace tracedby), 27#ptrace,
28 28
29########## 29##########
30# Line starting with /run/firejail/mnt/oroot deal with --overlay sandboxes 30# Line starting with /run/firejail/mnt/oroot deal with --overlay sandboxes
@@ -133,8 +133,8 @@ network raw,
133signal, 133signal,
134 134
135########## 135##########
136# We let Firejail deal with capabilities, 136# We let Firejail deal with capabilities, but ensure that
137# but mac_admin should be dropped in any case. 137# some AppArmor related capabilities will not be available.
138########## 138##########
139capability chown, 139capability chown,
140capability dac_override, 140capability dac_override,
diff --git a/etc/flowblade.profile b/etc/flowblade.profile
index bad8538cf..e06107f0f 100644
--- a/etc/flowblade.profile
+++ b/etc/flowblade.profile
@@ -8,6 +8,12 @@ include /etc/firejail/globals.local
8noblacklist ${HOME}/.config/flowblade 8noblacklist ${HOME}/.config/flowblade
9noblacklist ${HOME}/.flowblade 9noblacklist ${HOME}/.flowblade
10 10
11# Allow python (blacklisted by disable-interpreters.inc)
12noblacklist ${PATH}/python2*
13noblacklist ${PATH}/python3*
14noblacklist /usr/lib/python2*
15noblacklist /usr/lib/python3*
16
11include /etc/firejail/disable-common.inc 17include /etc/firejail/disable-common.inc
12include /etc/firejail/disable-devel.inc 18include /etc/firejail/disable-devel.inc
13include /etc/firejail/disable-interpreters.inc 19include /etc/firejail/disable-interpreters.inc
diff --git a/etc/less.profile b/etc/less.profile
index e2616ba4f..9b04329f2 100644
--- a/etc/less.profile
+++ b/etc/less.profile
@@ -20,7 +20,7 @@ shell none
20tracelog 20tracelog
21writable-var-log 21writable-var-log
22 22
23# The user can have a custom coloring scritps configured in ${HOME}/.lessfilter. 23# The user can have a custom coloring script configured in ${HOME}/.lessfilter.
24# Enable private-bin and private-lib if you are not using any filter. 24# Enable private-bin and private-lib if you are not using any filter.
25# private-bin less 25# private-bin less
26# private-lib 26# private-lib
diff --git a/etc/musixmatch.profile b/etc/musixmatch.profile
index 1a3ee5e6f..fce60e89e 100644
--- a/etc/musixmatch.profile
+++ b/etc/musixmatch.profile
@@ -24,7 +24,6 @@ notv
24novideo 24novideo
25protocol unix,inet,inet6,netlink 25protocol unix,inet,inet6,netlink
26seccomp 26seccomp
27shell none
28 27
29disable-mnt 28disable-mnt
30private-dev 29private-dev
diff --git a/etc/openshot.profile b/etc/openshot.profile
index 114580f1e..832008564 100644
--- a/etc/openshot.profile
+++ b/etc/openshot.profile
@@ -8,6 +8,12 @@ include /etc/firejail/globals.local
8noblacklist ${HOME}/.openshot 8noblacklist ${HOME}/.openshot
9noblacklist ${HOME}/.openshot_qt 9noblacklist ${HOME}/.openshot_qt
10 10
11# Allow python (blacklisted by disable-interpreters.inc)
12noblacklist ${PATH}/python2*
13noblacklist ${PATH}/python3*
14noblacklist /usr/lib/python2*
15noblacklist /usr/lib/python3*
16
11include /etc/firejail/disable-common.inc 17include /etc/firejail/disable-common.inc
12include /etc/firejail/disable-devel.inc 18include /etc/firejail/disable-devel.inc
13include /etc/firejail/disable-interpreters.inc 19include /etc/firejail/disable-interpreters.inc
diff --git a/etc/ppsspp.profile b/etc/ppsspp.profile
new file mode 100644
index 000000000..e19a7b42a
--- /dev/null
+++ b/etc/ppsspp.profile
@@ -0,0 +1,42 @@
1# Firejail profile for ppsspp
2# This file is overwritten after every install/update
3# Persistent local customizations
4include /etc/firejail/ppsspp.local
5# Persistent global definitions
6include /etc/firejail/globals.local
7
8noblacklist ${HOME}/.config/ppsspp
9# with >=llvm-4 mesa drivers need llvm stuff
10noblacklist /usr/lib/llvm*
11
12include /etc/firejail/disable-common.inc
13include /etc/firejail/disable-devel.inc
14include /etc/firejail/disable-interpreters.inc
15include /etc/firejail/disable-passwdmgr.inc
16include /etc/firejail/disable-programs.inc
17
18include /etc/firejail/whitelist-var-common.inc
19
20caps.drop all
21ipc-namespace
22netfilter
23net none
24nodbus
25nodvd
26nogroups
27nonewprivs
28noroot
29notv
30novideo
31protocol unix,netlink
32seccomp
33shell none
34
35# private-dev is disabled to allow controller support
36#private-dev
37private-etc asound.conf,ca-certificates,drirc,fonts,group,host.conf,hostname,hosts,ld.so.cache,ld.so.preload,localtime,nsswitch.conf,passwd,pulse,resolv.conf,ssl,pki,crypto-policies
38private-opt ppsspp
39private-tmp
40
41noexec ${HOME}
42noexec /tmp
diff --git a/etc/ranger.profile b/etc/ranger.profile
index 94b282669..ff65a057b 100644
--- a/etc/ranger.profile
+++ b/etc/ranger.profile
@@ -5,11 +5,19 @@ include /etc/firejail/ranger.local
5# Persistent global definitions 5# Persistent global definitions
6include /etc/firejail/globals.local 6include /etc/firejail/globals.local
7 7
8noblacklist ${HOME}/.config/ranger
9
10# Allow python (blacklisted by disable-interpreters.inc)
11noblacklist ${PATH}/python2*
12noblacklist ${PATH}/python3*
13noblacklist /usr/lib/python2*
14noblacklist /usr/lib/python3*
15
16# Allow perl
8# noblacklist ${PATH}/cpan* 17# noblacklist ${PATH}/cpan*
9noblacklist ${PATH}/perl 18noblacklist ${PATH}/perl
10noblacklist /usr/lib/perl* 19noblacklist /usr/lib/perl*
11noblacklist /usr/share/perl* 20noblacklist /usr/share/perl*
12noblacklist ${HOME}/.config/ranger
13 21
14include /etc/firejail/disable-common.inc 22include /etc/firejail/disable-common.inc
15include /etc/firejail/disable-devel.inc 23include /etc/firejail/disable-devel.inc
diff --git a/etc/scallion.profile b/etc/scallion.profile
new file mode 100644
index 000000000..645f0423c
--- /dev/null
+++ b/etc/scallion.profile
@@ -0,0 +1,42 @@
1# Firejail profile for scallion
2# This file is overwritten after every install/update
3quiet
4# Persistent local customizations
5include /etc/firejail/scallion.local
6# Persistent global definitions
7include /etc/firejail/globals.local
8
9noblacklist ${PATH}/llvm*
10noblacklist /usr/lib/llvm*
11noblacklist ${PATH}/openssl
12noblacklist ${PATH}/openssl-1.0
13
14include /etc/firejail/disable-common.inc
15include /etc/firejail/disable-interpreters.inc
16include /etc/firejail/disable-passwdmgr.inc
17include /etc/firejail/disable-programs.inc
18
19include /etc/firejail/whitelist-var-common.inc
20
21caps.drop all
22ipc-namespace
23net none
24nodbus
25nodvd
26nogroups
27nonewprivs
28noroot
29nosound
30notv
31novideo
32protocol unix
33seccomp
34shell none
35
36disable-mnt
37private
38private-dev
39private-tmp
40
41noexec ${HOME}
42noexec /tmp
diff --git a/etc/skypeforlinux.profile b/etc/skypeforlinux.profile
index 015709247..c2270ce39 100644
--- a/etc/skypeforlinux.profile
+++ b/etc/skypeforlinux.profile
@@ -25,7 +25,7 @@ seccomp
25shell none 25shell none
26 26
27disable-mnt 27disable-mnt
28#private-dev 28# private-dev - needs /dev/disk
29private-tmp 29private-tmp
30 30
31noexec ${HOME} 31noexec ${HOME}
diff --git a/etc/uzbl-browser.profile b/etc/uzbl-browser.profile
index 0a3549c97..b8a3fa497 100644
--- a/etc/uzbl-browser.profile
+++ b/etc/uzbl-browser.profile
@@ -7,6 +7,13 @@ include /etc/firejail/globals.local
7 7
8noblacklist ${HOME}/.config/uzbl 8noblacklist ${HOME}/.config/uzbl
9noblacklist ${HOME}/.gnupg 9noblacklist ${HOME}/.gnupg
10noblacklist ${HOME}/.local/share/uzbl
11
12# Allow python (blacklisted by disable-interpreters.inc)
13noblacklist ${PATH}/python2*
14noblacklist ${PATH}/python3*
15noblacklist /usr/lib/python2*
16noblacklist /usr/lib/python3*
10 17
11include /etc/firejail/disable-common.inc 18include /etc/firejail/disable-common.inc
12include /etc/firejail/disable-devel.inc 19include /etc/firejail/disable-devel.inc
diff --git a/etc/zathura.profile b/etc/zathura.profile
index b47aeb0da..028e15ef5 100644
--- a/etc/zathura.profile
+++ b/etc/zathura.profile
@@ -15,6 +15,7 @@ include /etc/firejail/disable-passwdmgr.inc
15include /etc/firejail/disable-programs.inc 15include /etc/firejail/disable-programs.inc
16 16
17caps.drop all 17caps.drop all
18machine-id
18# net none 19# net none
19# nodbus 20# nodbus
20nodvd 21nodvd
@@ -29,7 +30,7 @@ shell none
29 30
30private-bin zathura 31private-bin zathura
31private-dev 32private-dev
32private-etc fonts 33private-etc fonts,machine-id
33private-tmp 34private-tmp
34 35
35read-only ${HOME}/ 36read-only ${HOME}/