aboutsummaryrefslogtreecommitdiffstats
path: root/etc
diff options
context:
space:
mode:
Diffstat (limited to 'etc')
-rw-r--r--etc/7z.profile2
-rw-r--r--etc/allow-common-devel.inc16
-rw-r--r--etc/allow-gjs.inc10
-rw-r--r--etc/allow-java.inc7
-rw-r--r--etc/allow-lua.inc4
-rw-r--r--etc/allow-perl.inc6
-rw-r--r--etc/allow-php.inc7
-rw-r--r--etc/allow-python2.inc4
-rw-r--r--etc/allow-python3.inc5
-rw-r--r--etc/allow-ruby.inc4
-rw-r--r--etc/anki.profile3
-rw-r--r--etc/ar.profile2
-rw-r--r--etc/aria2c.profile4
-rw-r--r--etc/artha.profile1
-rw-r--r--etc/atool.profile2
-rw-r--r--etc/audio-recorder.profile1
-rw-r--r--etc/baobab.profile3
-rw-r--r--etc/beaker.profile1
-rw-r--r--etc/bibtex.profile12
-rw-r--r--etc/bsdtar.profile2
-rw-r--r--etc/celluloid.profile5
-rw-r--r--etc/checkbashisms.profile2
-rw-r--r--etc/chromium-common.profile2
-rw-r--r--etc/clamav.profile2
-rw-r--r--etc/claws-mail.profile45
-rw-r--r--etc/clipgrab.profile45
-rw-r--r--etc/cmus.profile2
-rw-r--r--etc/cpio.profile2
-rw-r--r--etc/curl.profile5
-rw-r--r--etc/dconf.profile2
-rw-r--r--etc/ddgtk.profile1
-rw-r--r--etc/devhelp.profile2
-rw-r--r--etc/devilspie.profile3
-rw-r--r--etc/devilspie2.profile48
-rw-r--r--etc/dig.profile5
-rw-r--r--etc/digikam.profile3
-rw-r--r--etc/disable-common.inc7
-rw-r--r--etc/disable-interpreters.inc9
-rw-r--r--etc/disable-programs.inc18
-rw-r--r--etc/dnscrypt-proxy.profile8
-rw-r--r--etc/dnsmasq.profile1
-rw-r--r--etc/easystroke.profile5
-rw-r--r--etc/elinks.profile1
-rw-r--r--etc/email-common.profile68
-rw-r--r--etc/enchant.profile6
-rw-r--r--etc/ephemeral.profile2
-rw-r--r--etc/et.profile11
-rw-r--r--etc/evince.profile1
-rw-r--r--etc/exfalso.profile1
-rw-r--r--etc/exiftool.profile2
-rw-r--r--etc/feedreader.profile2
-rw-r--r--etc/ffmpeg.profile2
-rw-r--r--etc/file.profile2
-rw-r--r--etc/firefox-common.profile4
-rw-r--r--etc/firefox-x11.profile10
-rw-r--r--etc/firefox.profile3
-rw-r--r--etc/firejail.config6
-rw-r--r--etc/freecad.profile6
-rw-r--r--etc/gconf-editor.profile3
-rw-r--r--etc/gconf.profile2
-rw-r--r--etc/gedit.profile3
-rw-r--r--etc/geekbench.profile2
-rw-r--r--etc/gfeeds.profile3
-rw-r--r--etc/gimp.profile3
-rw-r--r--etc/gist.profile1
-rw-r--r--etc/git.profile1
-rw-r--r--etc/gjs.profile3
-rw-r--r--etc/gnome-books.profile3
-rw-r--r--etc/gnome-characters.profile3
-rw-r--r--etc/gnome-documents.profile3
-rw-r--r--etc/gnome-maps.profile3
-rw-r--r--etc/gnome-passwordsafe.profile56
-rw-r--r--etc/gnome-sound-recorder.profile3
-rw-r--r--etc/gnome-weather.profile3
-rw-r--r--etc/gpg-agent.profile1
-rw-r--r--etc/gpg.profile1
-rw-r--r--etc/gtk-update-icon-cache.profile2
-rw-r--r--etc/gummi.profile19
-rw-r--r--etc/gzip.profile2
-rw-r--r--etc/hashcat.profile2
-rw-r--r--etc/hexchat.profile4
-rw-r--r--etc/highlight.profile2
-rw-r--r--etc/i2prouter.profile18
-rw-r--r--etc/img2txt.profile2
-rw-r--r--etc/keepass.profile2
-rw-r--r--etc/latex-common.profile39
-rw-r--r--etc/latex.profile12
-rw-r--r--etc/less.profile2
-rw-r--r--etc/links.profile1
-rw-r--r--etc/lynx.profile1
-rw-r--r--etc/mediainfo.profile2
-rw-r--r--etc/meld.profile4
-rw-r--r--etc/midori.profile7
-rw-r--r--etc/mp3splt.profile2
-rw-r--r--etc/multimc.profile5
-rw-r--r--etc/musescore.profile3
-rw-r--r--etc/mutt.profile1
-rw-r--r--etc/nano.profile2
-rw-r--r--etc/ncdu.profile2
-rw-r--r--etc/odt2txt.profile2
-rw-r--r--etc/pandoc.profile2
-rw-r--r--etc/patch.profile2
-rw-r--r--etc/pdflatex.profile12
-rw-r--r--etc/pdftotext.profile4
-rw-r--r--etc/pngquant.profile2
-rw-r--r--etc/polari.profile2
-rw-r--r--etc/psi-plus.profile4
-rw-r--r--etc/quassel.profile3
-rw-r--r--etc/rsync-download_only.profile1
-rw-r--r--etc/rtv.profile56
-rw-r--r--etc/server.profile1
-rw-r--r--etc/shellcheck.profile2
-rw-r--r--etc/shotcut.profile1
-rw-r--r--etc/signal-cli.profile1
-rw-r--r--etc/spectre-meltdown-checker.profile2
-rw-r--r--etc/ssh-agent.profile1
-rw-r--r--etc/standardnotes-desktop.profile2
-rw-r--r--etc/start-tor-browser.profile2
-rw-r--r--etc/strings.profile2
-rw-r--r--etc/sylpheed.profile11
-rw-r--r--etc/tar.profile2
-rw-r--r--etc/teams-for-linux.profile23
-rw-r--r--etc/templates/profile.template6
-rw-r--r--etc/tex.profile12
-rw-r--r--etc/thunderbird.profile45
-rw-r--r--etc/torbrowser-launcher.profile2
-rw-r--r--etc/tracker.profile1
-rw-r--r--etc/transmission-common.profile4
-rw-r--r--etc/transmission-daemon.profile2
-rw-r--r--etc/tvbrowser.profile51
-rw-r--r--etc/udiskie.profile2
-rw-r--r--etc/unbound.profile1
-rw-r--r--etc/unf.profile4
-rw-r--r--etc/unrar.profile2
-rw-r--r--etc/unzip.profile2
-rw-r--r--etc/uudeview.profile2
-rw-r--r--etc/w3m.profile1
-rw-r--r--etc/wget.profile1
-rw-r--r--etc/whalebird.profile21
-rw-r--r--etc/whitelist-usr-share-common.inc2
-rw-r--r--etc/whois.profile5
-rw-r--r--etc/wire-desktop.profile29
-rw-r--r--etc/wpp.profile14
-rw-r--r--etc/wps.profile47
-rw-r--r--etc/wpspdf.profile11
-rw-r--r--etc/xzdec.profile2
-rw-r--r--etc/yelp.profile1
-rw-r--r--etc/youtube-dl.profile1
-rw-r--r--etc/zathura.profile17
-rw-r--r--etc/zstd.profile2
150 files changed, 895 insertions, 213 deletions
diff --git a/etc/7z.profile b/etc/7z.profile
index 5ff02e1c0..b60bb9ee9 100644
--- a/etc/7z.profile
+++ b/etc/7z.profile
@@ -7,6 +7,8 @@ include 7z.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10include disable-common.inc 12include disable-common.inc
11include disable-devel.inc 13include disable-devel.inc
12include disable-exec.inc 14include disable-exec.inc
diff --git a/etc/allow-common-devel.inc b/etc/allow-common-devel.inc
index 1d794462c..63174eda6 100644
--- a/etc/allow-common-devel.inc
+++ b/etc/allow-common-devel.inc
@@ -1,17 +1,21 @@
1# Rust 1# This file is overwritten during software install.
2noblacklist ${HOME}/.cargo/config 2# Persistent customizations should go in a .local file.
3noblacklist ${HOME}/.cargo/registry 3include allow-common-devel.local
4 4
5# Git 5# Git
6noblacklist ${HOME}/.config/git 6noblacklist ${HOME}/.config/git
7noblacklist ${HOME}/.gitconfig 7noblacklist ${HOME}/.gitconfig
8noblacklist ${HOME}/.git-credentials 8noblacklist ${HOME}/.git-credentials
9 9
10# Java
11noblacklist ${HOME}/.gradle
12noblacklist ${HOME}/.java
13
10# Python 14# Python
11noblacklist ${HOME}/.python-history 15noblacklist ${HOME}/.python-history
12noblacklist ${HOME}/.python_history 16noblacklist ${HOME}/.python_history
13noblacklist ${HOME}/.pythonhist 17noblacklist ${HOME}/.pythonhist
14 18
15# Java 19# Rust
16noblacklist ${HOME}/.gradle 20noblacklist ${HOME}/.cargo/config
17noblacklist ${HOME}/.java 21noblacklist ${HOME}/.cargo/registry
diff --git a/etc/allow-gjs.inc b/etc/allow-gjs.inc
new file mode 100644
index 000000000..f552ede9d
--- /dev/null
+++ b/etc/allow-gjs.inc
@@ -0,0 +1,10 @@
1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include allow-gjs.local
4
5noblacklist ${PATH}/gjs
6noblacklist ${PATH}/gjs-console
7noblacklist /usr/lib/gjs
8noblacklist /usr/lib64/gjs
9noblacklist /usr/lib/libgjs*
10noblacklist /usr/lib64/libgjs*
diff --git a/etc/allow-java.inc b/etc/allow-java.inc
index 5204d2dea..24d18fb77 100644
--- a/etc/allow-java.inc
+++ b/etc/allow-java.inc
@@ -1,6 +1,9 @@
1noblacklist ${HOME}/.java 1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include allow-java.local
2 4
5noblacklist ${HOME}/.java
3noblacklist ${PATH}/java 6noblacklist ${PATH}/java
4noblacklist /usr/lib/java
5noblacklist /etc/java 7noblacklist /etc/java
8noblacklist /usr/lib/java
6noblacklist /usr/share/java 9noblacklist /usr/share/java
diff --git a/etc/allow-lua.inc b/etc/allow-lua.inc
index 51d76f9b1..fbdee22ee 100644
--- a/etc/allow-lua.inc
+++ b/etc/allow-lua.inc
@@ -1,3 +1,7 @@
1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include allow-lua.local
4
1noblacklist ${PATH}/lua* 5noblacklist ${PATH}/lua*
2noblacklist /usr/include/lua* 6noblacklist /usr/include/lua*
3noblacklist /usr/lib/lua 7noblacklist /usr/lib/lua
diff --git a/etc/allow-perl.inc b/etc/allow-perl.inc
index d37328936..f44e1e3cc 100644
--- a/etc/allow-perl.inc
+++ b/etc/allow-perl.inc
@@ -1,5 +1,9 @@
1noblacklist ${PATH}/cpan* 1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include allow-perl.local
4
2noblacklist ${PATH}/core_perl 5noblacklist ${PATH}/core_perl
6noblacklist ${PATH}/cpan*
3noblacklist ${PATH}/perl 7noblacklist ${PATH}/perl
4noblacklist ${PATH}/site_perl 8noblacklist ${PATH}/site_perl
5noblacklist ${PATH}/vendor_perl 9noblacklist ${PATH}/vendor_perl
diff --git a/etc/allow-php.inc b/etc/allow-php.inc
new file mode 100644
index 000000000..a0950dc26
--- /dev/null
+++ b/etc/allow-php.inc
@@ -0,0 +1,7 @@
1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include allow-php.local
4
5noblacklist ${PATH}/php*
6noblacklist /usr/lib/php*
7noblacklist /usr/share/php*
diff --git a/etc/allow-python2.inc b/etc/allow-python2.inc
index 8ea61648b..b0525e2e1 100644
--- a/etc/allow-python2.inc
+++ b/etc/allow-python2.inc
@@ -1,3 +1,7 @@
1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include allow-python2.local
4
1noblacklist ${PATH}/python2* 5noblacklist ${PATH}/python2*
2noblacklist /usr/include/python2* 6noblacklist /usr/include/python2*
3noblacklist /usr/lib/python2* 7noblacklist /usr/lib/python2*
diff --git a/etc/allow-python3.inc b/etc/allow-python3.inc
index 91c7ffca4..d968886b0 100644
--- a/etc/allow-python3.inc
+++ b/etc/allow-python3.inc
@@ -1,5 +1,10 @@
1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include allow-python3.local
4
1noblacklist ${PATH}/python3* 5noblacklist ${PATH}/python3*
2noblacklist /usr/include/python3* 6noblacklist /usr/include/python3*
3noblacklist /usr/lib/python3* 7noblacklist /usr/lib/python3*
8noblacklist /usr/lib64/python3*
4noblacklist /usr/local/lib/python3* 9noblacklist /usr/local/lib/python3*
5noblacklist /usr/share/python3* 10noblacklist /usr/share/python3*
diff --git a/etc/allow-ruby.inc b/etc/allow-ruby.inc
index 3165a981a..a8c701219 100644
--- a/etc/allow-ruby.inc
+++ b/etc/allow-ruby.inc
@@ -1,2 +1,6 @@
1# This file is overwritten during software install.
2# Persistent customizations should go in a .local file.
3include allow-ruby.local
4
1noblacklist ${PATH}/ruby 5noblacklist ${PATH}/ruby
2noblacklist /usr/lib/ruby 6noblacklist /usr/lib/ruby
diff --git a/etc/anki.profile b/etc/anki.profile
index c349376ff..a0a79ef48 100644
--- a/etc/anki.profile
+++ b/etc/anki.profile
@@ -42,7 +42,8 @@ notv
42nou2f 42nou2f
43novideo 43novideo
44protocol unix,inet,inet6 44protocol unix,inet,inet6
45seccomp 45# QtWebengine needs chroot to set up its own sandbox
46seccomp !chroot
46shell none 47shell none
47tracelog 48tracelog
48 49
diff --git a/etc/ar.profile b/etc/ar.profile
index 6b1fb830c..e28370450 100644
--- a/etc/ar.profile
+++ b/etc/ar.profile
@@ -7,6 +7,8 @@ include ar.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10include disable-common.inc 12include disable-common.inc
11include disable-devel.inc 13include disable-devel.inc
12include disable-exec.inc 14include disable-exec.inc
diff --git a/etc/aria2c.profile b/etc/aria2c.profile
index 2fb6dd25f..7819300af 100644
--- a/etc/aria2c.profile
+++ b/etc/aria2c.profile
@@ -7,8 +7,11 @@ include aria2c.local
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.aria2 9noblacklist ${HOME}/.aria2
10noblacklist ${HOME}/.config/aria2
11noblacklist ${HOME}/.netrc
10 12
11blacklist /tmp/.X11-unix 13blacklist /tmp/.X11-unix
14blacklist ${RUNUSER}/wayland-*
12 15
13include disable-common.inc 16include disable-common.inc
14include disable-devel.inc 17include disable-devel.inc
@@ -37,6 +40,7 @@ seccomp
37shell none 40shell none
38 41
39# disable-mnt 42# disable-mnt
43# Add your custom event hook commands to 'private-bin' in your aria2c.local
40private-bin aria2c,gzip 44private-bin aria2c,gzip
41# Uncomment the next line (or put 'private-cache' in your aria2c.local) if you don't use Lutris/winetricks (see issue #2772) 45# Uncomment the next line (or put 'private-cache' in your aria2c.local) if you don't use Lutris/winetricks (see issue #2772)
42#private-cache 46#private-cache
diff --git a/etc/artha.profile b/etc/artha.profile
index 31f8887c4..aaaede7ee 100644
--- a/etc/artha.profile
+++ b/etc/artha.profile
@@ -11,6 +11,7 @@ noblacklist ${HOME}/.config/artha.log
11noblacklist ${HOME}/.config/enchant 11noblacklist ${HOME}/.config/enchant
12 12
13blacklist /tmp/.X11-unix 13blacklist /tmp/.X11-unix
14blacklist ${RUNUSER}/wayland-*
14 15
15include disable-common.inc 16include disable-common.inc
16include disable-devel.inc 17include disable-devel.inc
diff --git a/etc/atool.profile b/etc/atool.profile
index fb75c8408..0250451fc 100644
--- a/etc/atool.profile
+++ b/etc/atool.profile
@@ -7,6 +7,8 @@ include atool.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10# Allow perl (blacklisted by disable-interpreters.inc) 12# Allow perl (blacklisted by disable-interpreters.inc)
11include allow-perl.inc 13include allow-perl.inc
12 14
diff --git a/etc/audio-recorder.profile b/etc/audio-recorder.profile
index afd1033de..b2ed3b030 100644
--- a/etc/audio-recorder.profile
+++ b/etc/audio-recorder.profile
@@ -40,7 +40,6 @@ protocol unix
40seccomp 40seccomp
41shell none 41shell none
42tracelog 42tracelog
43x11 none
44 43
45disable-mnt 44disable-mnt
46# private-bin audio-recorder 45# private-bin audio-recorder
diff --git a/etc/baobab.profile b/etc/baobab.profile
index e8287b448..18c862a4d 100644
--- a/etc/baobab.profile
+++ b/etc/baobab.profile
@@ -12,6 +12,7 @@ include disable-exec.inc
12include disable-interpreters.inc 12include disable-interpreters.inc
13include disable-passwdmgr.inc 13include disable-passwdmgr.inc
14# include disable-programs.inc 14# include disable-programs.inc
15# include disable-xdg.inc
15 16
16caps.drop all 17caps.drop all
17net none 18net none
@@ -32,3 +33,5 @@ shell none
32private-bin baobab 33private-bin baobab
33private-dev 34private-dev
34private-tmp 35private-tmp
36
37read-only ${HOME}
diff --git a/etc/beaker.profile b/etc/beaker.profile
index 21eeac4b3..cc1886a49 100644
--- a/etc/beaker.profile
+++ b/etc/beaker.profile
@@ -13,7 +13,6 @@ include disable-interpreters.inc
13 13
14mkdir ${HOME}/.config/Beaker Browser 14mkdir ${HOME}/.config/Beaker Browser
15whitelist ${HOME}/.config/Beaker Browser 15whitelist ${HOME}/.config/Beaker Browser
16whitelist ${DOWNLOADS}
17include whitelist-common.inc 16include whitelist-common.inc
18 17
19# Redirect 18# Redirect
diff --git a/etc/bibtex.profile b/etc/bibtex.profile
new file mode 100644
index 000000000..e868dcbab
--- /dev/null
+++ b/etc/bibtex.profile
@@ -0,0 +1,12 @@
1# Firejail profile for bibtex
2# This file is overwritten after every install/update
3# Persistent local customizations
4include bibtex.local
5# Persistent global definitions
6include globals.local
7
8private-bin bibtex
9
10# Redirect
11include latex-common.profile
12
diff --git a/etc/bsdtar.profile b/etc/bsdtar.profile
index 17c67ed26..5ce9b6406 100644
--- a/etc/bsdtar.profile
+++ b/etc/bsdtar.profile
@@ -6,6 +6,8 @@ include bsdtar.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist ${RUNUSER}/wayland-*
10
9include disable-common.inc 11include disable-common.inc
10# include disable-devel.inc 12# include disable-devel.inc
11include disable-exec.inc 13include disable-exec.inc
diff --git a/etc/celluloid.profile b/etc/celluloid.profile
index ab68c7f13..d099ba11e 100644
--- a/etc/celluloid.profile
+++ b/etc/celluloid.profile
@@ -24,12 +24,13 @@ include disable-passwdmgr.inc
24include disable-programs.inc 24include disable-programs.inc
25include disable-xdg.inc 25include disable-xdg.inc
26 26
27include whitelist-usr-share-common.inc
27include whitelist-var-common.inc 28include whitelist-var-common.inc
28 29
29apparmor 30apparmor
30caps.drop all 31caps.drop all
31netfilter 32netfilter
32# nodbus -- uses dconf 33# nodbus -- uses dconf, MPRIS
33nogroups 34nogroups
34nonewprivs 35nonewprivs
35noroot 36noroot
@@ -45,3 +46,5 @@ private-etc alternatives,ca-certificates,crypto-policies,dconf,drirc,fonts,gtk-3
45private-dev 46private-dev
46private-tmp 47private-tmp
47 48
49read-only ${HOME}
50read-write ${HOME}/.config/celluloid
diff --git a/etc/checkbashisms.profile b/etc/checkbashisms.profile
index c66776b9f..e15131dca 100644
--- a/etc/checkbashisms.profile
+++ b/etc/checkbashisms.profile
@@ -7,6 +7,8 @@ include checkbashisms.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10noblacklist ${DOCUMENTS} 12noblacklist ${DOCUMENTS}
11 13
12# Allow perl (blacklisted by disable-interpreters.inc) 14# Allow perl (blacklisted by disable-interpreters.inc)
diff --git a/etc/chromium-common.profile b/etc/chromium-common.profile
index 7b88e417a..c54fb0e19 100644
--- a/etc/chromium-common.profile
+++ b/etc/chromium-common.profile
@@ -37,7 +37,7 @@ notv
37shell none 37shell none
38 38
39disable-mnt 39disable-mnt
40private-dev 40?BROWSER_DISABLE_U2F: private-dev
41# private-tmp - problems with multiple browser sessions 41# private-tmp - problems with multiple browser sessions
42 42
43# the file dialog needs to work without d-bus 43# the file dialog needs to work without d-bus
diff --git a/etc/clamav.profile b/etc/clamav.profile
index 45e7723eb..51bc58108 100644
--- a/etc/clamav.profile
+++ b/etc/clamav.profile
@@ -7,6 +7,8 @@ include clamav.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10include disable-exec.inc 12include disable-exec.inc
11 13
12caps.drop all 14caps.drop all
diff --git a/etc/claws-mail.profile b/etc/claws-mail.profile
index f07e2039b..24954b2d8 100644
--- a/etc/claws-mail.profile
+++ b/etc/claws-mail.profile
@@ -7,43 +7,16 @@ include claws-mail.local
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.claws-mail 9noblacklist ${HOME}/.claws-mail
10noblacklist ${HOME}/.gnupg
11noblacklist ${HOME}/.signature
12# when storing mail outside the default ${HOME}/Mail path, 'noblacklist' the custom path in your claws-mail.local
13# and 'blacklist' it in your disable-common.local too so it is kept hidden from other applications
14noblacklist ${HOME}/Mail
15 10
16include disable-common.inc 11mkdir ${HOME}/.claws-mail
17include disable-devel.inc 12whitelist ${HOME}/.claws-mail
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21 13
22whitelist /usr/share/doc/claws-mail 14# If you use python-based plugins you need to uncomment the below (or put them in your claws-mail.local)
23whitelist /usr/share/gnupg 15# Allow python (blacklisted by disable-interpreters.inc)
24whitelist /usr/share/gnupg2 16#include allow-python2.inc
25include whitelist-usr-share-common.inc 17#include allow-python3.inc
26
27caps.drop all
28netfilter
29no3d
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix,inet,inet6
39seccomp
40shell none
41 18
42private-cache 19whitelist /usr/share/doc/claws-mail
43private-dev
44private-tmp
45 20
46# If you want to read local mail stored in /var/mail, add the following to claws-mail.local: 21# Redirect
47# noblacklist /var/mail 22include email-common.profile
48# noblacklist /var/spool/mail
49# writable-var
diff --git a/etc/clipgrab.profile b/etc/clipgrab.profile
new file mode 100644
index 000000000..786d1c866
--- /dev/null
+++ b/etc/clipgrab.profile
@@ -0,0 +1,45 @@
1# Firejail profile for clipgrab
2# Description: A free video downloader and converter
3# This file is overwritten after every install/update
4# Persistent local customizations
5include clipgrab.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/Philipp Schmieder
10noblacklist ${HOME}/.pki
11noblacklist ${VIDEOS}
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19include disable-xdg.inc
20
21include whitelist-usr-share-common.inc
22include whitelist-var-common.inc
23
24apparmor
25caps.drop all
26machine-id
27netfilter
28# Breaks tray-icon, uncommend or add to clipgrab.local if you don't need it.
29#nodbus
30nodvd
31nogroups
32nonewprivs
33noroot
34nosound
35notv
36nou2f
37novideo
38protocol unix,inet,inet6,netlink
39seccomp !chroot
40shell none
41
42disable-mnt
43private-cache
44private-dev
45private-tmp
diff --git a/etc/cmus.profile b/etc/cmus.profile
index 7e12a06de..fa1e5d722 100644
--- a/etc/cmus.profile
+++ b/etc/cmus.profile
@@ -27,4 +27,4 @@ seccomp
27shell none 27shell none
28 28
29private-bin cmus 29private-bin cmus
30private-etc alternatives,asound.conf,ca-certificates,crypto-policies,group,machine-id,pki,pulse,ssl 30private-etc alternatives,asound.conf,ca-certificates,crypto-policies,group,machine-id,pki,pulse,resolv.conf,ssl
diff --git a/etc/cpio.profile b/etc/cpio.profile
index 17a765700..1156b7439 100644
--- a/etc/cpio.profile
+++ b/etc/cpio.profile
@@ -7,6 +7,8 @@ include cpio.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10noblacklist /sbin 12noblacklist /sbin
11noblacklist /usr/sbin 13noblacklist /usr/sbin
12 14
diff --git a/etc/curl.profile b/etc/curl.profile
index 2624e5545..3f93e5f7e 100644
--- a/etc/curl.profile
+++ b/etc/curl.profile
@@ -9,10 +9,14 @@ include globals.local
9 9
10noblacklist ${HOME}/.curlrc 10noblacklist ${HOME}/.curlrc
11 11
12blacklist /tmp/.X11-unix
13
12include disable-common.inc 14include disable-common.inc
13include disable-exec.inc 15include disable-exec.inc
14include disable-passwdmgr.inc 16include disable-passwdmgr.inc
15include disable-programs.inc 17include disable-programs.inc
18# depending on workflow you can uncomment the below or put 'include disable-xdg.inc' in your curl.local
19#include disable-xdg.inc
16 20
17include whitelist-usr-share-common.inc 21include whitelist-usr-share-common.inc
18 22
@@ -33,6 +37,7 @@ novideo
33protocol inet,inet6 37protocol inet,inet6
34seccomp 38seccomp
35shell none 39shell none
40tracelog
36 41
37# private-bin curl 42# private-bin curl
38private-cache 43private-cache
diff --git a/etc/dconf.profile b/etc/dconf.profile
index ebb362fb6..2ee573463 100644
--- a/etc/dconf.profile
+++ b/etc/dconf.profile
@@ -6,6 +6,8 @@ include dconf.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist ${RUNUSER}/wayland-*
10
9include disable-common.inc 11include disable-common.inc
10include disable-devel.inc 12include disable-devel.inc
11include disable-exec.inc 13include disable-exec.inc
diff --git a/etc/ddgtk.profile b/etc/ddgtk.profile
index ef65046e1..3dfc657bc 100644
--- a/etc/ddgtk.profile
+++ b/etc/ddgtk.profile
@@ -43,7 +43,6 @@ protocol unix
43seccomp 43seccomp
44shell none 44shell none
45tracelog 45tracelog
46x11 none
47 46
48disable-mnt 47disable-mnt
49private-bin bash,dd,ddgtk,grep,lsblk,python*,sed,sh,tr 48private-bin bash,dd,ddgtk,grep,lsblk,python*,sed,sh,tr
diff --git a/etc/devhelp.profile b/etc/devhelp.profile
index 5c1935835..cc9553e73 100644
--- a/etc/devhelp.profile
+++ b/etc/devhelp.profile
@@ -16,6 +16,8 @@ include disable-programs.inc
16include disable-xdg.inc 16include disable-xdg.inc
17 17
18whitelist /usr/share/devhelp 18whitelist /usr/share/devhelp
19whitelist /usr/share/doc
20whitelist /usr/share/gtk-doc/html
19include whitelist-common.inc 21include whitelist-common.inc
20include whitelist-usr-share-common.inc 22include whitelist-usr-share-common.inc
21 23
diff --git a/etc/devilspie.profile b/etc/devilspie.profile
index ad891ffaf..b561787d8 100644
--- a/etc/devilspie.profile
+++ b/etc/devilspie.profile
@@ -6,6 +6,8 @@ include devilspie.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist ${RUNUSER}/wayland-*
10
9noblacklist ${HOME}/.devilspie 11noblacklist ${HOME}/.devilspie
10 12
11include disable-common.inc 13include disable-common.inc
@@ -41,6 +43,7 @@ protocol unix
41seccomp 43seccomp
42shell none 44shell none
43tracelog 45tracelog
46x11 none
44 47
45disable-mnt 48disable-mnt
46private-bin devilspie 49private-bin devilspie
diff --git a/etc/devilspie2.profile b/etc/devilspie2.profile
index f2bacda9a..9eab3f536 100644
--- a/etc/devilspie2.profile
+++ b/etc/devilspie2.profile
@@ -4,55 +4,21 @@
4# Persistent local customizations 4# Persistent local customizations
5include devilspie2.local 5include devilspie2.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7#include globals.local
8
9blacklist ${HOME}/.devilspie
10
11blacklist ${RUNUSER}/wayland-*
8 12
9noblacklist ${HOME}/.config/devilspie2 13noblacklist ${HOME}/.config/devilspie2
10 14
11# Allow lua (blacklisted by disable-interpreters.inc) 15# Allow lua (blacklisted by disable-interpreters.inc)
12include allow-lua.inc 16include allow-lua.inc
13 17
14include disable-common.inc
15include disable-devel.inc
16include disable-exec.inc
17include disable-interpreters.inc
18include disable-passwdmgr.inc
19include disable-programs.inc
20include disable-xdg.inc
21
22mkdir ${HOME}/.config/devilspie2 18mkdir ${HOME}/.config/devilspie2
23whitelist ${HOME}/.config/devilspie2 19whitelist ${HOME}/.config/devilspie2
24include whitelist-common.inc
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27 20
28apparmor
29caps.drop all
30ipc-namespace
31machine-id
32net none
33no3d
34nodbus
35nodvd
36nogroups
37nonewprivs
38noroot
39nosound
40notv
41nou2f
42novideo
43protocol unix
44seccomp
45shell none
46tracelog
47
48disable-mnt
49private-bin devilspie2 21private-bin devilspie2
50private-cache
51private-dev
52private-etc alternatives
53private-lib gconv
54private-tmp
55
56memory-deny-write-execute
57 22
58read-only ${HOME} 23# Redirect
24include devilspie.profile
diff --git a/etc/dig.profile b/etc/dig.profile
index af71ff17f..054e4891d 100644
--- a/etc/dig.profile
+++ b/etc/dig.profile
@@ -9,6 +9,8 @@ include globals.local
9 9
10noblacklist ${HOME}/.digrc 10noblacklist ${HOME}/.digrc
11 11
12blacklist /tmp/.X11-unix
13
12include disable-common.inc 14include disable-common.inc
13# include disable-devel.inc 15# include disable-devel.inc
14include disable-exec.inc 16include disable-exec.inc
@@ -24,7 +26,7 @@ include whitelist-usr-share-common.inc
24include whitelist-var-common.inc 26include whitelist-var-common.inc
25 27
26caps.drop all 28caps.drop all
27# ipc-namespace 29ipc-namespace
28machine-id 30machine-id
29netfilter 31netfilter
30no3d 32no3d
@@ -40,6 +42,7 @@ novideo
40protocol unix,inet,inet6 42protocol unix,inet,inet6
41seccomp 43seccomp
42shell none 44shell none
45tracelog
43 46
44disable-mnt 47disable-mnt
45private 48private
diff --git a/etc/digikam.profile b/etc/digikam.profile
index 1b80981f7..e66434444 100644
--- a/etc/digikam.profile
+++ b/etc/digikam.profile
@@ -32,7 +32,8 @@ nonewprivs
32noroot 32noroot
33notv 33notv
34protocol unix,inet,inet6,netlink 34protocol unix,inet,inet6,netlink
35seccomp 35# QtWebengine needs chroot to set up its own sandbox
36seccomp !chroot
36shell none 37shell none
37 38
38# private-dev - prevents libdc1394 loading; this lib is used to connect to a camera device 39# private-dev - prevents libdc1394 loading; this lib is used to connect to a camera device
diff --git a/etc/disable-common.inc b/etc/disable-common.inc
index f50e10a00..9f351a673 100644
--- a/etc/disable-common.inc
+++ b/etc/disable-common.inc
@@ -151,6 +151,11 @@ blacklist /var/lib/systemd
151# blacklist /var/run/systemd 151# blacklist /var/run/systemd
152# creates problems on Arch where /etc/resolv.conf is a symlink to /var/run/systemd/resolve/resolv.conf 152# creates problems on Arch where /etc/resolv.conf is a symlink to /var/run/systemd/resolve/resolv.conf
153 153
154# openrc
155blacklist /etc/runlevels/
156blacklist /etc/init.d/
157blacklist /etc/rc.conf
158
154# VirtualBox 159# VirtualBox
155blacklist ${HOME}/.VirtualBox 160blacklist ${HOME}/.VirtualBox
156blacklist ${HOME}/.config/VirtualBox 161blacklist ${HOME}/.config/VirtualBox
@@ -193,7 +198,7 @@ blacklist /var/lib/mysqld/mysql.sock
193blacklist /var/lib/pacman 198blacklist /var/lib/pacman
194blacklist /var/lib/upower 199blacklist /var/lib/upower
195# blacklist /var/log - a virtual /var/log directory (mostly empty) is build up by default for 200# blacklist /var/log - a virtual /var/log directory (mostly empty) is build up by default for
196# every sandbox, unless --writeble-var-log switch is activated 201# every sandbox, unless --writable-var-log switch is activated
197blacklist /var/mail 202blacklist /var/mail
198blacklist /var/opt 203blacklist /var/opt
199blacklist /var/run/acpid.socket 204blacklist /var/run/acpid.socket
diff --git a/etc/disable-interpreters.inc b/etc/disable-interpreters.inc
index 4c4eed25d..ae539e1bc 100644
--- a/etc/disable-interpreters.inc
+++ b/etc/disable-interpreters.inc
@@ -2,6 +2,14 @@
2# Persistent customizations should go in a .local file. 2# Persistent customizations should go in a .local file.
3include disable-interpreters.local 3include disable-interpreters.local
4 4
5# gjs
6blacklist ${PATH}/gjs
7blacklist ${PATH}/gjs-console
8blacklist /usr/lib/gjs
9blacklist /usr/lib64/gjs
10blacklist /usr/lib/libgjs*
11blacklist /usr/lib64/libgjs*
12
5# Lua 13# Lua
6blacklist ${PATH}/lua* 14blacklist ${PATH}/lua*
7blacklist /usr/include/lua* 15blacklist /usr/include/lua*
@@ -47,5 +55,6 @@ blacklist /usr/share/python2*
47blacklist ${PATH}/python3* 55blacklist ${PATH}/python3*
48blacklist /usr/include/python3* 56blacklist /usr/include/python3*
49blacklist /usr/lib/python3* 57blacklist /usr/lib/python3*
58blacklist /usr/lib64/python3*
50blacklist /usr/local/lib/python3* 59blacklist /usr/local/lib/python3*
51blacklist /usr/share/python3* 60blacklist /usr/share/python3*
diff --git a/etc/disable-programs.inc b/etc/disable-programs.inc
index 1c97ed8d6..baa9c3fab 100644
--- a/etc/disable-programs.inc
+++ b/etc/disable-programs.inc
@@ -85,6 +85,7 @@ blacklist ${HOME}/.config/Gpredict
85blacklist ${HOME}/.config/INRIA 85blacklist ${HOME}/.config/INRIA
86blacklist ${HOME}/.config/InSilmaril 86blacklist ${HOME}/.config/InSilmaril
87blacklist ${HOME}/.config/Kid3 87blacklist ${HOME}/.config/Kid3
88blacklist ${HOME}/.config/Kingsoft
88blacklist ${HOME}/.config/Luminance 89blacklist ${HOME}/.config/Luminance
89blacklist ${HOME}/.config/Meltytech 90blacklist ${HOME}/.config/Meltytech
90blacklist ${HOME}/.config/Mendeley Ltd. 91blacklist ${HOME}/.config/Mendeley Ltd.
@@ -97,6 +98,7 @@ blacklist ${HOME}/.config/MusicBrainz
97blacklist ${HOME}/.config/Nathan Osman 98blacklist ${HOME}/.config/Nathan Osman
98blacklist ${HOME}/.config/Nylas Mail 99blacklist ${HOME}/.config/Nylas Mail
99blacklist ${HOME}/.config/PBE 100blacklist ${HOME}/.config/PBE
101blacklist ${HOME}/.config/Philipp Schmieder
100blacklist ${HOME}/.config/QGIS 102blacklist ${HOME}/.config/QGIS
101blacklist ${HOME}/.config/QMediathekView 103blacklist ${HOME}/.config/QMediathekView
102blacklist ${HOME}/.config/Qlipper 104blacklist ${HOME}/.config/Qlipper
@@ -118,6 +120,7 @@ blacklist ${HOME}/.config/akonadi*
118blacklist ${HOME}/.config/akregatorrc 120blacklist ${HOME}/.config/akregatorrc
119blacklist ${HOME}/.config/ardour4 121blacklist ${HOME}/.config/ardour4
120blacklist ${HOME}/.config/ardour5 122blacklist ${HOME}/.config/ardour5
123blacklist ${HOME}/.config/aria2
121blacklist ${HOME}/.config/arkrc 124blacklist ${HOME}/.config/arkrc
122blacklist ${HOME}/.config/artha.conf 125blacklist ${HOME}/.config/artha.conf
123blacklist ${HOME}/.config/artha.log 126blacklist ${HOME}/.config/artha.log
@@ -198,6 +201,7 @@ blacklist ${HOME}/.config/google-chrome-beta
198blacklist ${HOME}/.config/google-chrome-unstable 201blacklist ${HOME}/.config/google-chrome-unstable
199blacklist ${HOME}/.config/gpicview 202blacklist ${HOME}/.config/gpicview
200blacklist ${HOME}/.config/gthumb 203blacklist ${HOME}/.config/gthumb
204blacklist ${HOME}/.config/gummi
201blacklist ${HOME}/.config/gwenviewrc 205blacklist ${HOME}/.config/gwenviewrc
202blacklist ${HOME}/.config/hexchat 206blacklist ${HOME}/.config/hexchat
203blacklist ${HOME}/.config/i2p 207blacklist ${HOME}/.config/i2p
@@ -290,6 +294,7 @@ blacklist ${HOME}/.config/redshift
290blacklist ${HOME}/.config/redshift.conf 294blacklist ${HOME}/.config/redshift.conf
291blacklist ${HOME}/.config/remmina 295blacklist ${HOME}/.config/remmina
292blacklist ${HOME}/.config/ristretto 296blacklist ${HOME}/.config/ristretto
297blacklist ${HOME}/.config/rtv
293blacklist ${HOME}/.config/scribus 298blacklist ${HOME}/.config/scribus
294blacklist ${HOME}/.config/scribusrc 299blacklist ${HOME}/.config/scribusrc
295blacklist ${HOME}/.config/sinew.in 300blacklist ${HOME}/.config/sinew.in
@@ -311,6 +316,7 @@ blacklist ${HOME}/.config/tox
311blacklist ${HOME}/.config/transgui 316blacklist ${HOME}/.config/transgui
312blacklist ${HOME}/.config/transmission 317blacklist ${HOME}/.config/transmission
313blacklist ${HOME}/.config/truecraft 318blacklist ${HOME}/.config/truecraft
319blacklist ${HOME}/.config/tvbrowser
314blacklist ${HOME}/.config/uGet 320blacklist ${HOME}/.config/uGet
315blacklist ${HOME}/.config/uzbl 321blacklist ${HOME}/.config/uzbl
316blacklist ${HOME}/.config/viewnior 322blacklist ${HOME}/.config/viewnior
@@ -454,6 +460,7 @@ blacklist ${HOME}/.kde4/share/config/ktorrentrc
454blacklist ${HOME}/.kde4/share/config/okularpartrc 460blacklist ${HOME}/.kde4/share/config/okularpartrc
455blacklist ${HOME}/.kde4/share/config/okularrc 461blacklist ${HOME}/.kde4/share/config/okularrc
456blacklist ${HOME}/.killingfloor 462blacklist ${HOME}/.killingfloor
463blacklist ${HOME}/.kingsoft
457blacklist ${HOME}/.kino-history 464blacklist ${HOME}/.kino-history
458blacklist ${HOME}/.kinorc 465blacklist ${HOME}/.kinorc
459blacklist ${HOME}/.klatexformula 466blacklist ${HOME}/.klatexformula
@@ -470,6 +477,7 @@ blacklist ${HOME}/.local/share/Anki2
470blacklist ${HOME}/.local/share/Empathy 477blacklist ${HOME}/.local/share/Empathy
471blacklist ${HOME}/.local/share/Enpass 478blacklist ${HOME}/.local/share/Enpass
472blacklist ${HOME}/.local/share/JetBrains 479blacklist ${HOME}/.local/share/JetBrains
480blacklist ${HOME}/.local/share/Kingsoft
473blacklist ${HOME}/.local/share/Mendeley Ltd. 481blacklist ${HOME}/.local/share/Mendeley Ltd.
474blacklist ${HOME}/.local/share/Mumble 482blacklist ${HOME}/.local/share/Mumble
475blacklist ${HOME}/.local/share/PBE 483blacklist ${HOME}/.local/share/PBE
@@ -573,6 +581,7 @@ blacklist ${HOME}/.local/share/qpdfview
573blacklist ${HOME}/.local/share/qutebrowser 581blacklist ${HOME}/.local/share/qutebrowser
574blacklist ${HOME}/.local/share/remmina 582blacklist ${HOME}/.local/share/remmina
575blacklist ${HOME}/.local/share/rhythmbox 583blacklist ${HOME}/.local/share/rhythmbox
584blacklist ${HOME}/.local/share/rtv
576blacklist ${HOME}/.local/share/scribus 585blacklist ${HOME}/.local/share/scribus
577blacklist ${HOME}/.local/share/signal-cli 586blacklist ${HOME}/.local/share/signal-cli
578blacklist ${HOME}/.local/share/spotify 587blacklist ${HOME}/.local/share/spotify
@@ -662,6 +671,7 @@ blacklist ${HOME}/.torcs
662blacklist ${HOME}/.tremulous 671blacklist ${HOME}/.tremulous
663blacklist ${HOME}/.ts3client 672blacklist ${HOME}/.ts3client
664blacklist ${HOME}/.tuxguitar* 673blacklist ${HOME}/.tuxguitar*
674blacklist ${HOME}/.tvbrowser
665blacklist ${HOME}/.unknown-horizons 675blacklist ${HOME}/.unknown-horizons
666blacklist ${HOME}/.viking 676blacklist ${HOME}/.viking
667blacklist ${HOME}/.viking-maps 677blacklist ${HOME}/.viking-maps
@@ -737,15 +747,17 @@ blacklist ${HOME}/.cache/freecol
737blacklist ${HOME}/.cache/gajim 747blacklist ${HOME}/.cache/gajim
738blacklist ${HOME}/.cache/gegl-0.4 748blacklist ${HOME}/.cache/gegl-0.4
739blacklist ${HOME}/.cache/geeqie 749blacklist ${HOME}/.cache/geeqie
750blacklist ${HOME}/.cache/gfeeds
740blacklist ${HOME}/.cache/gimp 751blacklist ${HOME}/.cache/gimp
752blacklist ${HOME}/.cache/gnome-builder
753blacklist ${HOME}/.cache/gnome-recipes
754blacklist ${HOME}/.cache/gnome-twitch
741blacklist ${HOME}/.cache/godot 755blacklist ${HOME}/.cache/godot
742blacklist ${HOME}/.cache/google-chrome 756blacklist ${HOME}/.cache/google-chrome
743blacklist ${HOME}/.cache/google-chrome-beta 757blacklist ${HOME}/.cache/google-chrome-beta
744blacklist ${HOME}/.cache/google-chrome-unstable 758blacklist ${HOME}/.cache/google-chrome-unstable
745blacklist ${HOME}/.cache/gnome-builder
746blacklist ${HOME}/.cache/gnome-recipes
747blacklist ${HOME}/.cache/gnome-twitch
748blacklist ${HOME}/.cache/gradio 759blacklist ${HOME}/.cache/gradio
760blacklist ${HOME}/.cache/gummi
749blacklist ${HOME}/.cache/icedove 761blacklist ${HOME}/.cache/icedove
750blacklist ${HOME}/.cache/INRIA/Natron 762blacklist ${HOME}/.cache/INRIA/Natron
751blacklist ${HOME}/.cache/inkscape 763blacklist ${HOME}/.cache/inkscape
diff --git a/etc/dnscrypt-proxy.profile b/etc/dnscrypt-proxy.profile
index d0430d5ca..6637b8d02 100644
--- a/etc/dnscrypt-proxy.profile
+++ b/etc/dnscrypt-proxy.profile
@@ -7,6 +7,9 @@ include dnscrypt-proxy.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist /tmp/.X11-unix
11blacklist ${RUNUSER}/wayland-*
12
10noblacklist /sbin 13noblacklist /sbin
11noblacklist /usr/sbin 14noblacklist /usr/sbin
12 15
@@ -20,10 +23,13 @@ include disable-xdg.inc
20 23
21whitelist /usr/share/dnscrypt-proxy 24whitelist /usr/share/dnscrypt-proxy
22include whitelist-usr-share-common.inc 25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
23 27
28apparmor
24caps.keep ipc_lock,net_bind_service,setgid,setuid,sys_chroot 29caps.keep ipc_lock,net_bind_service,setgid,setuid,sys_chroot
25ipc-namespace 30ipc-namespace
26machine-id 31machine-id
32netfilter
27no3d 33no3d
28nodbus 34nodbus
29nodvd 35nodvd
@@ -34,6 +40,8 @@ nou2f
34novideo 40novideo
35protocol inet,inet6 41protocol inet,inet6
36seccomp.drop _sysctl,acct,add_key,adjtimex,clock_adjtime,delete_module,fanotify_init,finit_module,get_mempolicy,init_module,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioperm,iopl,kcmp,kexec_file_load,kexec_load,keyctl,lookup_dcookie,mbind,migrate_pages,modify_ldt,mount,move_pages,open_by_handle_at,perf_event_open,perf_event_open,pivot_root,process_vm_readv,process_vm_writev,ptrace,remap_file_pages,request_key,set_mempolicy,swapoff,swapon,sysfs,syslog,umount2,uselib,vmsplice 42seccomp.drop _sysctl,acct,add_key,adjtimex,clock_adjtime,delete_module,fanotify_init,finit_module,get_mempolicy,init_module,io_cancel,io_destroy,io_getevents,io_setup,io_submit,ioperm,iopl,kcmp,kexec_file_load,kexec_load,keyctl,lookup_dcookie,mbind,migrate_pages,modify_ldt,mount,move_pages,open_by_handle_at,perf_event_open,perf_event_open,pivot_root,process_vm_readv,process_vm_writev,ptrace,remap_file_pages,request_key,set_mempolicy,swapoff,swapon,sysfs,syslog,umount2,uselib,vmsplice
43shell none
44tracelog
37 45
38disable-mnt 46disable-mnt
39private 47private
diff --git a/etc/dnsmasq.profile b/etc/dnsmasq.profile
index dfb1b61c1..6db71bd49 100644
--- a/etc/dnsmasq.profile
+++ b/etc/dnsmasq.profile
@@ -11,6 +11,7 @@ noblacklist /sbin
11noblacklist /usr/sbin 11noblacklist /usr/sbin
12 12
13blacklist /tmp/.X11-unix 13blacklist /tmp/.X11-unix
14blacklist ${RUNUSER}/wayland-*
14 15
15include disable-common.inc 16include disable-common.inc
16include disable-devel.inc 17include disable-devel.inc
diff --git a/etc/easystroke.profile b/etc/easystroke.profile
index 623a4cadc..1297f5f40 100644
--- a/etc/easystroke.profile
+++ b/etc/easystroke.profile
@@ -16,7 +16,11 @@ include disable-passwdmgr.inc
16include disable-programs.inc 16include disable-programs.inc
17include disable-xdg.inc 17include disable-xdg.inc
18 18
19mkdir ${HOME}/.easystroke
20whitelist ${HOME}/.easystroke
21include whitelist-common.inc
19include whitelist-usr-share-common.inc 22include whitelist-usr-share-common.inc
23include whitelist-var-common.inc
20 24
21apparmor 25apparmor
22caps.drop all 26caps.drop all
@@ -35,6 +39,7 @@ novideo
35protocol unix 39protocol unix
36seccomp 40seccomp
37shell none 41shell none
42tracelog
38 43
39disable-mnt 44disable-mnt
40# breaks custom shell command functionality 45# breaks custom shell command functionality
diff --git a/etc/elinks.profile b/etc/elinks.profile
index 94f4179c7..82d1ba528 100644
--- a/etc/elinks.profile
+++ b/etc/elinks.profile
@@ -9,6 +9,7 @@ include globals.local
9noblacklist ${HOME}/.elinks 9noblacklist ${HOME}/.elinks
10 10
11blacklist /tmp/.X11-unix 11blacklist /tmp/.X11-unix
12blacklist ${RUNUSER}/wayland-*
12 13
13include disable-common.inc 14include disable-common.inc
14include disable-devel.inc 15include disable-devel.inc
diff --git a/etc/email-common.profile b/etc/email-common.profile
new file mode 100644
index 000000000..f9d96858b
--- /dev/null
+++ b/etc/email-common.profile
@@ -0,0 +1,68 @@
1# Firejail profile for email-common
2# Description: Common profile for claws-mail and sylpheed email clients
3# This file is overwritten after every install/update
4# Persistent local customizations
5include email-common.local
6# Persistent global definitions
7# added by caller profile
8#include globals.local
9
10noblacklist ${HOME}/.gnupg
11noblacklist ${HOME}/.signature
12# when storing mail outside the default ${HOME}/Mail path, 'noblacklist' the custom path in your email-common.local
13# and 'blacklist' it in your disable-common.local too so it is kept hidden from other applications
14noblacklist ${HOME}/Mail
15
16noblacklist ${DOCUMENTS}
17
18include disable-common.inc
19include disable-devel.inc
20include disable-interpreters.inc
21include disable-passwdmgr.inc
22include disable-programs.inc
23include disable-xdg.inc
24
25whitelist ${DOCUMENTS}
26whitelist ${DOWNLOADS}
27mkfile ${HOME}/.config/mimeapps.list
28mkdir ${HOME}/.gnupg
29mkfile ${HOME}/.signature
30whitelist ${HOME}/.config/mimeapps.list
31whitelist ${HOME}/.gnupg
32whitelist ${HOME}/.signature
33# when storing mail outside the default ${HOME}/Mail path, 'whitelist' the custom path in your email-common.local
34whitelist ${HOME}/Mail
35whitelist /usr/share/gnupg
36whitelist /usr/share/gnupg2
37include whitelist-common.inc
38include whitelist-usr-share-common.inc
39include whitelist-var-common.inc
40
41caps.drop all
42netfilter
43no3d
44nodvd
45nogroups
46nonewprivs
47noroot
48nosound
49notv
50nou2f
51novideo
52protocol unix,inet,inet6
53seccomp
54shell none
55tracelog
56
57private-cache
58private-dev
59private-tmp
60
61# encrypting and signing email
62read-only ${HOME}/.config/mimeapps.list
63writable-run-user
64
65# If you want to read local mail stored in /var/mail, add the following to email-common.local:
66# whitelist /var/mail
67# whitelist /var/spool/mail
68# writable-var
diff --git a/etc/enchant.profile b/etc/enchant.profile
index d276cec84..fa556c7d2 100644
--- a/etc/enchant.profile
+++ b/etc/enchant.profile
@@ -6,6 +6,8 @@ include enchant.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist ${RUNUSER}/wayland-*
10
9noblacklist ${HOME}/.config/enchant 11noblacklist ${HOME}/.config/enchant
10 12
11include disable-common.inc 13include disable-common.inc
@@ -16,7 +18,11 @@ include disable-passwdmgr.inc
16include disable-programs.inc 18include disable-programs.inc
17include disable-xdg.inc 19include disable-xdg.inc
18 20
21mkdir ${HOME}/.config/enchant
22whitelist ${HOME}/.config/enchant
23include whitelist-common.inc
19include whitelist-usr-share-common.inc 24include whitelist-usr-share-common.inc
25include whitelist-var-common.inc
20 26
21apparmor 27apparmor
22caps.drop all 28caps.drop all
diff --git a/etc/ephemeral.profile b/etc/ephemeral.profile
index fa7746da5..c688c2324 100644
--- a/etc/ephemeral.profile
+++ b/etc/ephemeral.profile
@@ -55,7 +55,7 @@ tracelog
55 55
56disable-mnt 56disable-mnt
57private-cache 57private-cache
58private-dev 58?BROWSER_DISABLE_U2F: private-dev
59# private-etc below works fine on most distributions. There are some problems on CentOS. 59# private-etc below works fine on most distributions. There are some problems on CentOS.
60#private-etc alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,group,gtk-2.0,gtk-3.0,hostname,hosts,ld.so.cache,localtime,login.defs,machine-id,mailcap,mime.types,nsswitch.conf,os-release,pango,passwd,pki,pulse,resolv.conf,selinux,ssl,X11,xdg 60#private-etc alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,group,gtk-2.0,gtk-3.0,hostname,hosts,ld.so.cache,localtime,login.defs,machine-id,mailcap,mime.types,nsswitch.conf,os-release,pango,passwd,pki,pulse,resolv.conf,selinux,ssl,X11,xdg
61private-tmp 61private-tmp
diff --git a/etc/et.profile b/etc/et.profile
new file mode 100644
index 000000000..4e70bb114
--- /dev/null
+++ b/etc/et.profile
@@ -0,0 +1,11 @@
1# Firejail profile for et
2# Description: WPS Office - Spreadsheets
3# This file is overwritten after every install/update
4# Persistent local customizations
5include et.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include wps.profile
diff --git a/etc/evince.profile b/etc/evince.profile
index 570d7d63d..143a347e6 100644
--- a/etc/evince.profile
+++ b/etc/evince.profile
@@ -17,6 +17,7 @@ include disable-passwdmgr.inc
17include disable-programs.inc 17include disable-programs.inc
18include disable-xdg.inc 18include disable-xdg.inc
19 19
20whitelist /usr/share/doc
20whitelist /usr/share/evince 21whitelist /usr/share/evince
21whitelist /usr/share/poppler 22whitelist /usr/share/poppler
22whitelist /usr/share/tracker 23whitelist /usr/share/tracker
diff --git a/etc/exfalso.profile b/etc/exfalso.profile
index 7d91f2854..04bafdde4 100644
--- a/etc/exfalso.profile
+++ b/etc/exfalso.profile
@@ -31,6 +31,7 @@ include whitelist-usr-share-common.inc
31include whitelist-var-common.inc 31include whitelist-var-common.inc
32 32
33caps.drop all 33caps.drop all
34ipc-namespace
34machine-id 35machine-id
35netfilter 36netfilter
36no3d 37no3d
diff --git a/etc/exiftool.profile b/etc/exiftool.profile
index e9c7d290a..9316a0585 100644
--- a/etc/exiftool.profile
+++ b/etc/exiftool.profile
@@ -6,6 +6,8 @@ include exiftool.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist ${RUNUSER}/wayland-*
10
9# Allow perl (blacklisted by disable-interpreters.inc) 11# Allow perl (blacklisted by disable-interpreters.inc)
10include allow-perl.inc 12include allow-perl.inc
11 13
diff --git a/etc/feedreader.profile b/etc/feedreader.profile
index c12ab2399..5a72b60ea 100644
--- a/etc/feedreader.profile
+++ b/etc/feedreader.profile
@@ -40,8 +40,10 @@ novideo
40protocol unix,inet,inet6 40protocol unix,inet,inet6
41seccomp 41seccomp
42shell none 42shell none
43tracelog
43 44
44disable-mnt 45disable-mnt
46private-cache
45private-dev 47private-dev
46private-tmp 48private-tmp
47 49
diff --git a/etc/ffmpeg.profile b/etc/ffmpeg.profile
index 67c0ed311..b392087e8 100644
--- a/etc/ffmpeg.profile
+++ b/etc/ffmpeg.profile
@@ -47,7 +47,7 @@ tracelog
47private-bin ffmpeg 47private-bin ffmpeg
48private-cache 48private-cache
49private-dev 49private-dev
50private-etc alternatives,ca-certificates,hosts,pkcs11,pki,resolv.conf,ssl 50private-etc alternatives,ca-certificates,crypto-policies,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,nsswitch.conf,pkcs11,pki,resolv.conf,ssl
51private-tmp 51private-tmp
52 52
53# memory-deny-write-execute - it breaks old versions of ffmpeg 53# memory-deny-write-execute - it breaks old versions of ffmpeg
diff --git a/etc/file.profile b/etc/file.profile
index 37c7ee9e7..9b21818f8 100644
--- a/etc/file.profile
+++ b/etc/file.profile
@@ -7,6 +7,8 @@ include file.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10include disable-common.inc 12include disable-common.inc
11include disable-exec.inc 13include disable-exec.inc
12include disable-passwdmgr.inc 14include disable-passwdmgr.inc
diff --git a/etc/firefox-common.profile b/etc/firefox-common.profile
index 7777d07ce..323070289 100644
--- a/etc/firefox-common.profile
+++ b/etc/firefox-common.profile
@@ -52,7 +52,7 @@ shell none
52#tracelog 52#tracelog
53 53
54disable-mnt 54disable-mnt
55private-dev 55?BROWSER_DISABLE_U2F: private-dev
56# private-etc below works fine on most distributions. There are some problems on CentOS. 56# private-etc below works fine on most distributions. There are some problems on CentOS.
57#private-etc alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,group,gtk-2.0,gtk-3.0,hostname,hosts,ld.so.cache,localtime,machine-id,mailcap,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,selinux,ssl,X11,xdg 57#private-etc alternatives,asound.conf,ca-certificates,crypto-policies,dconf,fonts,group,gtk-2.0,gtk-3.0,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,localtime,machine-id,mailcap,mime.types,nsswitch.conf,pango,passwd,pki,pulse,resolv.conf,selinux,ssl,X11,xdg
58private-tmp 58private-tmp
diff --git a/etc/firefox-x11.profile b/etc/firefox-x11.profile
new file mode 100644
index 000000000..ffd64aad7
--- /dev/null
+++ b/etc/firefox-x11.profile
@@ -0,0 +1,10 @@
1# Firejail profile alias for firefox-x11
2# This file is overwritten after every install/update
3# Persistent local customizations
4include firefox-x11.local
5# Persistent global definitions
6# added by included profile
7#include globals.local
8
9# Redirect
10include firefox.profile
diff --git a/etc/firefox.profile b/etc/firefox.profile
index 0278c70f2..0530516d8 100644
--- a/etc/firefox.profile
+++ b/etc/firefox.profile
@@ -14,7 +14,10 @@ mkdir ${HOME}/.mozilla
14whitelist ${HOME}/.cache/mozilla/firefox 14whitelist ${HOME}/.cache/mozilla/firefox
15whitelist ${HOME}/.mozilla 15whitelist ${HOME}/.mozilla
16 16
17whitelist /usr/share/doc
18whitelist /usr/share/gtk-doc/html
17whitelist /usr/share/mozilla 19whitelist /usr/share/mozilla
20whitelist /usr/share/webext
18include whitelist-usr-share-common.inc 21include whitelist-usr-share-common.inc
19 22
20# firefox requires a shell to launch on Arch. 23# firefox requires a shell to launch on Arch.
diff --git a/etc/firejail.config b/etc/firejail.config
index 3bff2f7ed..6fb7d829a 100644
--- a/etc/firejail.config
+++ b/etc/firejail.config
@@ -62,9 +62,9 @@
62# root user can always join sandboxes. 62# root user can always join sandboxes.
63# join yes 63# join yes
64 64
65# Timeout when joining a sandbox, default five seconds. Wait up to 65# Timeout when joining a sandbox, default five seconds. It is not
66# the specified period of time to allow sandbox setup to finish. 66# possible to join a sandbox while it is still starting up. Wait up
67# It is not possible to join a sandbox while it is still starting up. 67# to the specified period of time to allow sandbox setup to finish.
68# join-timeout 5 68# join-timeout 5
69 69
70# Enable or disable sandbox name change, default enabled. 70# Enable or disable sandbox name change, default enabled.
diff --git a/etc/freecad.profile b/etc/freecad.profile
index 079c85fb1..6f0f52a55 100644
--- a/etc/freecad.profile
+++ b/etc/freecad.profile
@@ -9,6 +9,10 @@ include globals.local
9noblacklist ${HOME}/.config/FreeCAD 9noblacklist ${HOME}/.config/FreeCAD
10noblacklist ${DOCUMENTS} 10noblacklist ${DOCUMENTS}
11 11
12# Allow python (blacklisted by disable-interpreters.inc)
13include allow-python2.inc
14include allow-python3.inc
15
12include disable-common.inc 16include disable-common.inc
13include disable-devel.inc 17include disable-devel.inc
14include disable-exec.inc 18include disable-exec.inc
@@ -33,7 +37,7 @@ protocol unix
33seccomp 37seccomp
34shell none 38shell none
35 39
36private-bin freecad,freecadcmd 40private-bin freecad,freecadcmd,python*
37private-cache 41private-cache
38private-dev 42private-dev
39private-tmp 43private-tmp
diff --git a/etc/gconf-editor.profile b/etc/gconf-editor.profile
index a2c441a20..cb39174e5 100644
--- a/etc/gconf-editor.profile
+++ b/etc/gconf-editor.profile
@@ -9,7 +9,8 @@ include gconf-editor.local
9 9
10blacklist /tmp/.X11-unix 10blacklist /tmp/.X11-unix
11 11
12ignore net none 12whitelist /usr/share/gconf-editor
13
13ignore x11 none 14ignore x11 none
14 15
15# Redirect 16# Redirect
diff --git a/etc/gconf.profile b/etc/gconf.profile
index 25145c77d..f070e6944 100644
--- a/etc/gconf.profile
+++ b/etc/gconf.profile
@@ -6,6 +6,8 @@ include gconf.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist ${RUNUSER}/wayland-*
10
9noblacklist ${HOME}/.config/gconf 11noblacklist ${HOME}/.config/gconf
10 12
11# Allow python (blacklisted by disable-interpreters.inc) 13# Allow python (blacklisted by disable-interpreters.inc)
diff --git a/etc/gedit.profile b/etc/gedit.profile
index 7dd6f270e..a4471077a 100644
--- a/etc/gedit.profile
+++ b/etc/gedit.profile
@@ -42,6 +42,7 @@ tracelog
42 42
43# private-bin gedit 43# private-bin gedit
44private-dev 44private-dev
45private-lib aspell,gconv,gedit,libgspell-1.so.*,libgtksourceview-*,libpeas-gtk-1.0.so.*,libreadline.so.*,libtinfo.so.* 45# private-lib breaks python plugins, uncomment or add to your gedit.local if you don't use them.
46#private-lib aspell,gconv,gedit,libgspell-1.so.*,libgtksourceview-*,libpeas-gtk-1.0.so.*,libreadline.so.*,libtinfo.so.*
46private-tmp 47private-tmp
47 48
diff --git a/etc/geekbench.profile b/etc/geekbench.profile
index bf9d27788..36f9f2a55 100644
--- a/etc/geekbench.profile
+++ b/etc/geekbench.profile
@@ -43,7 +43,7 @@ private-bin bash,geekbenc*,sh
43private-cache 43private-cache
44private-dev 44private-dev
45private-etc alternatives,group,lsb-release,passwd 45private-etc alternatives,group,lsb-release,passwd
46private-lib libstdc++.so.* 46private-lib gcc/*/*/libstdc++.so.*
47private-opt none 47private-opt none
48private-tmp 48private-tmp
49 49
diff --git a/etc/gfeeds.profile b/etc/gfeeds.profile
index dcb33bc38..d332c1bbe 100644
--- a/etc/gfeeds.profile
+++ b/etc/gfeeds.profile
@@ -6,6 +6,7 @@ include gfeeds.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9noblacklist ${HOME}/.cache/gfeeds
9noblacklist ${HOME}/.cache/org.gabmus.gfeeds 10noblacklist ${HOME}/.cache/org.gabmus.gfeeds
10noblacklist ${HOME}/.config/org.gabmus.gfeeds.json 11noblacklist ${HOME}/.config/org.gabmus.gfeeds.json
11 12
@@ -20,8 +21,10 @@ include disable-passwdmgr.inc
20include disable-programs.inc 21include disable-programs.inc
21include disable-xdg.inc 22include disable-xdg.inc
22 23
24mkdir ${HOME}/.cache/gfeeds
23mkdir ${HOME}/.cache/org.gabmus.gfeeds 25mkdir ${HOME}/.cache/org.gabmus.gfeeds
24mkfile ${HOME}/.config/org.gabmus.gfeeds.json 26mkfile ${HOME}/.config/org.gabmus.gfeeds.json
27whitelist ${HOME}/.cache/gfeeds
25whitelist ${HOME}/.cache/org.gabmus.gfeeds 28whitelist ${HOME}/.cache/org.gabmus.gfeeds
26whitelist ${HOME}/.config/org.gabmus.gfeeds.json 29whitelist ${HOME}/.config/org.gabmus.gfeeds.json
27whitelist /usr/share/gfeeds 30whitelist /usr/share/gfeeds
diff --git a/etc/gimp.profile b/etc/gimp.profile
index 5c0631eb2..57cea28f9 100644
--- a/etc/gimp.profile
+++ b/etc/gimp.profile
@@ -21,6 +21,7 @@ noblacklist ${PICTURES}
21 21
22include disable-common.inc 22include disable-common.inc
23include disable-exec.inc 23include disable-exec.inc
24include disable-devel.inc
24include disable-passwdmgr.inc 25include disable-passwdmgr.inc
25include disable-programs.inc 26include disable-programs.inc
26include disable-xdg.inc 27include disable-xdg.inc
@@ -44,7 +45,7 @@ nosound
44notv 45notv
45nou2f 46nou2f
46protocol unix 47protocol unix
47seccomp 48seccomp !mbind
48shell none 49shell none
49tracelog 50tracelog
50 51
diff --git a/etc/gist.profile b/etc/gist.profile
index 7413238c8..59fcb2775 100644
--- a/etc/gist.profile
+++ b/etc/gist.profile
@@ -8,6 +8,7 @@ include gist.local
8include globals.local 8include globals.local
9 9
10blacklist /tmp/.X11-unix 10blacklist /tmp/.X11-unix
11blacklist ${RUNUSER}/wayland-*
11 12
12noblacklist ${HOME}/.gist 13noblacklist ${HOME}/.gist
13 14
diff --git a/etc/git.profile b/etc/git.profile
index dbaaefcc4..da55f8744 100644
--- a/etc/git.profile
+++ b/etc/git.profile
@@ -20,6 +20,7 @@ noblacklist ${HOME}/.vim
20noblacklist ${HOME}/.viminfo 20noblacklist ${HOME}/.viminfo
21 21
22blacklist /tmp/.X11-unix 22blacklist /tmp/.X11-unix
23blacklist ${RUNUSER}/wayland-*
23 24
24include disable-common.inc 25include disable-common.inc
25include disable-exec.inc 26include disable-exec.inc
diff --git a/etc/gjs.profile b/etc/gjs.profile
index 871020ae0..aba020bc7 100644
--- a/etc/gjs.profile
+++ b/etc/gjs.profile
@@ -13,6 +13,9 @@ noblacklist ${HOME}/.cache/org.gnome.Books
13noblacklist ${HOME}/.config/libreoffice 13noblacklist ${HOME}/.config/libreoffice
14noblacklist ${HOME}/.local/share/gnome-photos 14noblacklist ${HOME}/.local/share/gnome-photos
15 15
16# Allow gjs (blacklisted by disable-interpreters.inc)
17include allow-gjs.inc
18
16include disable-common.inc 19include disable-common.inc
17include disable-devel.inc 20include disable-devel.inc
18include disable-interpreters.inc 21include disable-interpreters.inc
diff --git a/etc/gnome-books.profile b/etc/gnome-books.profile
index 25cd94f0c..84e38d0e1 100644
--- a/etc/gnome-books.profile
+++ b/etc/gnome-books.profile
@@ -10,6 +10,9 @@ include globals.local
10noblacklist ${HOME}/.cache/org.gnome.Books 10noblacklist ${HOME}/.cache/org.gnome.Books
11noblacklist ${DOCUMENTS} 11noblacklist ${DOCUMENTS}
12 12
13# Allow gjs (blacklisted by disable-interpreters.inc)
14include allow-gjs.inc
15
13include disable-common.inc 16include disable-common.inc
14include disable-devel.inc 17include disable-devel.inc
15include disable-exec.inc 18include disable-exec.inc
diff --git a/etc/gnome-characters.profile b/etc/gnome-characters.profile
index c3e9466d7..2d4724610 100644
--- a/etc/gnome-characters.profile
+++ b/etc/gnome-characters.profile
@@ -6,6 +6,9 @@ include gnome-characters.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# Allow gjs (blacklisted by disable-interpreters.inc)
10include allow-gjs.inc
11
9include disable-common.inc 12include disable-common.inc
10include disable-devel.inc 13include disable-devel.inc
11include disable-exec.inc 14include disable-exec.inc
diff --git a/etc/gnome-documents.profile b/etc/gnome-documents.profile
index 078e8c34e..705fe624e 100644
--- a/etc/gnome-documents.profile
+++ b/etc/gnome-documents.profile
@@ -11,6 +11,9 @@ include globals.local
11noblacklist ${HOME}/.config/libreoffice 11noblacklist ${HOME}/.config/libreoffice
12noblacklist ${DOCUMENTS} 12noblacklist ${DOCUMENTS}
13 13
14# Allow gjs (blacklisted by disable-interpreters.inc)
15include allow-gjs.inc
16
14include disable-common.inc 17include disable-common.inc
15include disable-devel.inc 18include disable-devel.inc
16include disable-exec.inc 19include disable-exec.inc
diff --git a/etc/gnome-maps.profile b/etc/gnome-maps.profile
index 78f5ddc3a..6540186fe 100644
--- a/etc/gnome-maps.profile
+++ b/etc/gnome-maps.profile
@@ -13,6 +13,9 @@ noblacklist ${HOME}/.cache/org.gnome.Maps
13noblacklist ${HOME}/.local/share/flatpak 13noblacklist ${HOME}/.local/share/flatpak
14noblacklist ${HOME}/.local/share/maps-places.json 14noblacklist ${HOME}/.local/share/maps-places.json
15 15
16# Allow gjs (blacklisted by disable-interpreters.inc)
17include allow-gjs.inc
18
16include disable-common.inc 19include disable-common.inc
17include disable-devel.inc 20include disable-devel.inc
18include disable-exec.inc 21include disable-exec.inc
diff --git a/etc/gnome-passwordsafe.profile b/etc/gnome-passwordsafe.profile
new file mode 100644
index 000000000..685a5cc3f
--- /dev/null
+++ b/etc/gnome-passwordsafe.profile
@@ -0,0 +1,56 @@
1# Firejail profile for gnome-passwordsafe
2# Description: Password manager for GNOME
3# This file is overwritten after every install/update
4# Persistent local customizations
5include gnome-passwordsafe.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${DOCUMENTS}
10noblacklist ${HOME}/*.kdb
11noblacklist ${HOME}/*.kdbx
12
13# Allow python (blacklisted by disable-interpreters.inc)
14include allow-python3.inc
15
16include disable-common.inc
17include disable-devel.inc
18include disable-exec.inc
19include disable-interpreters.inc
20include disable-passwdmgr.inc
21include disable-programs.inc
22include disable-xdg.inc
23
24whitelist ${RUNUSER}/bus
25whitelist ${RUNUSER}/wayland-?
26whitelist ${RUNUSER}/gdm/Xauthority
27
28whitelist /usr/share/cracklib
29whitelist /usr/share/passwordsafe
30include whitelist-usr-share-common.inc
31include whitelist-var-common.inc
32
33apparmor
34caps.drop all
35machine-id
36net none
37no3d
38nodvd
39nogroups
40nonewprivs
41noroot
42nosound
43notv
44nou2f
45novideo
46protocol unix
47seccomp
48shell none
49tracelog
50
51disable-mnt
52private-bin gnome-passwordsafe,python3*
53private-cache
54private-dev
55private-etc dconf,fonts,gtk-3.0,passwd
56private-tmp
diff --git a/etc/gnome-sound-recorder.profile b/etc/gnome-sound-recorder.profile
index 135106c1e..7f8fc8a0c 100644
--- a/etc/gnome-sound-recorder.profile
+++ b/etc/gnome-sound-recorder.profile
@@ -10,6 +10,9 @@ noblacklist ${MUSIC}
10noblacklist ${HOME}/.local/share/flatpak 10noblacklist ${HOME}/.local/share/flatpak
11noblacklist ${HOME}/.local/share/Trash 11noblacklist ${HOME}/.local/share/Trash
12 12
13# Allow gjs (blacklisted by disable-interpreters.inc)
14include allow-gjs.inc
15
13include disable-common.inc 16include disable-common.inc
14include disable-devel.inc 17include disable-devel.inc
15include disable-exec.inc 18include disable-exec.inc
diff --git a/etc/gnome-weather.profile b/etc/gnome-weather.profile
index a43db7e2f..10db6296b 100644
--- a/etc/gnome-weather.profile
+++ b/etc/gnome-weather.profile
@@ -10,6 +10,9 @@ include globals.local
10 10
11noblacklist ${HOME}/.cache/libgweather 11noblacklist ${HOME}/.cache/libgweather
12 12
13# Allow gjs (blacklisted by disable-interpreters.inc)
14include allow-gjs.inc
15
13include disable-common.inc 16include disable-common.inc
14include disable-devel.inc 17include disable-devel.inc
15include disable-exec.inc 18include disable-exec.inc
diff --git a/etc/gpg-agent.profile b/etc/gpg-agent.profile
index c11773147..2710ac88e 100644
--- a/etc/gpg-agent.profile
+++ b/etc/gpg-agent.profile
@@ -10,6 +10,7 @@ include globals.local
10noblacklist ${HOME}/.gnupg 10noblacklist ${HOME}/.gnupg
11 11
12blacklist /tmp/.X11-unix 12blacklist /tmp/.X11-unix
13blacklist ${RUNUSER}/wayland-*
13 14
14include disable-common.inc 15include disable-common.inc
15include disable-devel.inc 16include disable-devel.inc
diff --git a/etc/gpg.profile b/etc/gpg.profile
index 5eb18a0bc..a60d42cf8 100644
--- a/etc/gpg.profile
+++ b/etc/gpg.profile
@@ -10,6 +10,7 @@ include globals.local
10noblacklist ${HOME}/.gnupg 10noblacklist ${HOME}/.gnupg
11 11
12blacklist /tmp/.X11-unix 12blacklist /tmp/.X11-unix
13blacklist ${RUNUSER}/wayland-*
13 14
14include disable-common.inc 15include disable-common.inc
15include disable-devel.inc 16include disable-devel.inc
diff --git a/etc/gtk-update-icon-cache.profile b/etc/gtk-update-icon-cache.profile
index fd35a563b..668a48f9a 100644
--- a/etc/gtk-update-icon-cache.profile
+++ b/etc/gtk-update-icon-cache.profile
@@ -7,6 +7,8 @@ include gtk-update-icon-cache.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10include disable-common.inc 12include disable-common.inc
11include disable-devel.inc 13include disable-devel.inc
12include disable-exec.inc 14include disable-exec.inc
diff --git a/etc/gummi.profile b/etc/gummi.profile
new file mode 100644
index 000000000..922b2cbde
--- /dev/null
+++ b/etc/gummi.profile
@@ -0,0 +1,19 @@
1# Firejail profile for gummi
2# This file is overwritten after every install/update
3# Persistent local customizations
4include gummi.local
5# Persistent global definitions
6include globals.local
7
8noblacklist ${HOME}/.cache/gummi
9noblacklist ${HOME}/.config/gummi
10
11include allow-lua.inc
12include allow-perl.inc
13include allow-python3.inc
14
15private-bin dvipdf,dvips,env,gummi,latex,latexmk,lua*,lualatex,luatex,pdflatex,pdftex,perl,ps2pdf,python3*,rubber,synctex,tex,xelatex,xetex
16
17# Redirect
18include latex-common.profile
19
diff --git a/etc/gzip.profile b/etc/gzip.profile
index 48e495c60..1af15d227 100644
--- a/etc/gzip.profile
+++ b/etc/gzip.profile
@@ -7,6 +7,8 @@ include gzip.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10# Arch Linux (based distributions) need access to /var/lib/pacman. As we drop all capabilities this is automatically read-only. 12# Arch Linux (based distributions) need access to /var/lib/pacman. As we drop all capabilities this is automatically read-only.
11noblacklist /var/lib/pacman 13noblacklist /var/lib/pacman
12 14
diff --git a/etc/hashcat.profile b/etc/hashcat.profile
index da59984d7..b4d6d52f0 100644
--- a/etc/hashcat.profile
+++ b/etc/hashcat.profile
@@ -7,6 +7,8 @@ include hashcat.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10noblacklist ${HOME}/.hashcat 12noblacklist ${HOME}/.hashcat
11noblacklist /usr/include 13noblacklist /usr/include
12noblacklist ${DOCUMENTS} 14noblacklist ${DOCUMENTS}
diff --git a/etc/hexchat.profile b/etc/hexchat.profile
index d032c93e6..7723cbd6b 100644
--- a/etc/hexchat.profile
+++ b/etc/hexchat.profile
@@ -19,6 +19,7 @@ include disable-exec.inc
19include disable-interpreters.inc 19include disable-interpreters.inc
20include disable-passwdmgr.inc 20include disable-passwdmgr.inc
21include disable-programs.inc 21include disable-programs.inc
22include disable-xdg.inc
22 23
23mkdir ${HOME}/.config/hexchat 24mkdir ${HOME}/.config/hexchat
24whitelist ${HOME}/.config/hexchat 25whitelist ${HOME}/.config/hexchat
@@ -26,14 +27,13 @@ include whitelist-common.inc
26include whitelist-var-common.inc 27include whitelist-var-common.inc
27 28
28caps.drop all 29caps.drop all
29machine-id 30#machine-id -- breaks sound
30netfilter 31netfilter
31no3d 32no3d
32nodvd 33nodvd
33nogroups 34nogroups
34nonewprivs 35nonewprivs
35noroot 36noroot
36nosound
37notv 37notv
38nou2f 38nou2f
39novideo 39novideo
diff --git a/etc/highlight.profile b/etc/highlight.profile
index 249d5cd17..036de8d99 100644
--- a/etc/highlight.profile
+++ b/etc/highlight.profile
@@ -6,6 +6,8 @@ include highlight.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist ${RUNUSER}/wayland-*
10
9include disable-common.inc 11include disable-common.inc
10include disable-devel.inc 12include disable-devel.inc
11include disable-interpreters.inc 13include disable-interpreters.inc
diff --git a/etc/i2prouter.profile b/etc/i2prouter.profile
index e46fb3317..9ffdb9e9b 100644
--- a/etc/i2prouter.profile
+++ b/etc/i2prouter.profile
@@ -6,19 +6,19 @@ include i2prouter.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# Notice: default browser will not be able to automatically open, due to sandbox. 9# Notice: default browser will most likely not be able to automatically open, due to sandbox.
10# Auto-opening default browser can be disabled in the I2P router console. 10# Auto-opening default browser can be disabled in the I2P router console.
11# This profile will not currently work with any Arch User Repository i2p packages, 11# This profile will not currently work with any Arch User Repository I2P packages,
12# use the distro-independent official java installer instead 12# use the distro-independent official I2P java installer instead
13 13
14# Only needed if i2prouter binary is in home directory, java installer does this 14# Only needed if i2prouter binary is in home directory, official I2P java installer does this
15ignore noexec ${HOME} 15ignore noexec ${HOME}
16 16
17noblacklist ${HOME}/.config/i2p 17noblacklist ${HOME}/.config/i2p
18noblacklist ${HOME}/.i2p 18noblacklist ${HOME}/.i2p
19noblacklist ${HOME}/.local/share/i2p 19noblacklist ${HOME}/.local/share/i2p
20noblacklist ${HOME}/i2p 20noblacklist ${HOME}/i2p
21# Only needed if wrapper is placed in /usr/sbin/, ubuntu official ppa package does this 21# Only needed if wrapper is placed in /usr/sbin/, ubuntu official I2P ppa package does this
22noblacklist /usr/sbin 22noblacklist /usr/sbin
23 23
24# Allow java (blacklisted by disable-devel.inc) 24# Allow java (blacklisted by disable-devel.inc)
@@ -40,13 +40,13 @@ whitelist ${HOME}/.config/i2p
40whitelist ${HOME}/.i2p 40whitelist ${HOME}/.i2p
41whitelist ${HOME}/.local/share/i2p 41whitelist ${HOME}/.local/share/i2p
42whitelist ${HOME}/i2p 42whitelist ${HOME}/i2p
43# Only needed if wrapper is placed in /usr/sbin/, ubuntu official ppa package does this 43# Only needed if wrapper is placed in /usr/sbin/, ubuntu official I2P ppa package does this
44whitelist /usr/sbin/wrapper* 44whitelist /usr/sbin/wrapper*
45 45
46include whitelist-common.inc 46include whitelist-common.inc
47 47
48# May break I2P if wrapper is placed in the home directory 48# May break I2P if wrapper is placed in the home directory; official I2P java installer does this
49# If using ubuntu official ppa, this should be fine to uncomment, as it puts wrapper in /usr/sbin/ 49# If using ubuntu official I2P ppa, this should be fine to uncomment, as it puts wrapper in /usr/sbin/
50#apparmor 50#apparmor
51caps.drop all 51caps.drop all
52ipc-namespace 52ipc-namespace
@@ -67,5 +67,5 @@ shell none
67disable-mnt 67disable-mnt
68private-cache 68private-cache
69private-dev 69private-dev
70private-etc alternatives,ca-certificates,crypto-policies,i2p,java-8-openjdk,pki,ssl 70private-etc alternatives,ca-certificates,crypto-policies,dconf,group,hostname,hosts,i2p,java-10-openjdk,java-11-openjdk,java-12-openjdk,java-13-openjdk,java-8-openjdk,java-9-openjdk,java-openjdk,ld.so.cache,localtime,machine-id,nsswitch.conf,passwd,pki,resolv.conf,ssl
71private-tmp 71private-tmp
diff --git a/etc/img2txt.profile b/etc/img2txt.profile
index c17e82870..419da765d 100644
--- a/etc/img2txt.profile
+++ b/etc/img2txt.profile
@@ -5,6 +5,8 @@ include img2txt.local
5# Persistent global definitions 5# Persistent global definitions
6include globals.local 6include globals.local
7 7
8blacklist ${RUNUSER}/wayland-*
9
8noblacklist ${DOCUMENTS} 10noblacklist ${DOCUMENTS}
9noblacklist ${PICTURES} 11noblacklist ${PICTURES}
10 12
diff --git a/etc/keepass.profile b/etc/keepass.profile
index 57a24d821..9852f8a79 100644
--- a/etc/keepass.profile
+++ b/etc/keepass.profile
@@ -34,7 +34,7 @@ nosound
34notv 34notv
35nou2f 35nou2f
36novideo 36novideo
37protocol unix,inet,inet6 37protocol unix,inet,inet6,netlink
38seccomp 38seccomp
39shell none 39shell none
40 40
diff --git a/etc/latex-common.profile b/etc/latex-common.profile
new file mode 100644
index 000000000..712ada722
--- /dev/null
+++ b/etc/latex-common.profile
@@ -0,0 +1,39 @@
1# Firejail profile for latex-common
2# This file is overwritten after every install/update
3# Persistent local customizations
4include latex-common.local
5# Persistent global definitions
6# added by caller profile
7#include globals.local
8
9include disable-common.inc
10include disable-devel.inc
11include disable-exec.inc
12include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15
16whitelist /var/lib
17include whitelist-var-common.inc
18
19caps.drop all
20net none
21no3d
22nodbus
23nodvd
24nogroups
25nonewprivs
26noroot
27nosound
28notv
29nou2f
30novideo
31protocol unix
32seccomp
33shell none
34tracelog
35
36private-cache
37private-dev
38private-tmp
39
diff --git a/etc/latex.profile b/etc/latex.profile
new file mode 100644
index 000000000..2230dd570
--- /dev/null
+++ b/etc/latex.profile
@@ -0,0 +1,12 @@
1# Firejail profile for latex
2# This file is overwritten after every install/update
3# Persistent local customizations
4include latex.local
5# Persistent global definitions
6include globals.local
7
8private-bin latex
9
10# Redirect
11include latex-common.profile
12
diff --git a/etc/less.profile b/etc/less.profile
index 282b033a6..00624e0f1 100644
--- a/etc/less.profile
+++ b/etc/less.profile
@@ -7,6 +7,8 @@ include less.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10noblacklist ${HOME}/.lesshst 12noblacklist ${HOME}/.lesshst
11 13
12include disable-devel.inc 14include disable-devel.inc
diff --git a/etc/links.profile b/etc/links.profile
index bd0b0cc92..a31001c87 100644
--- a/etc/links.profile
+++ b/etc/links.profile
@@ -9,6 +9,7 @@ include globals.local
9noblacklist ${HOME}/.links 9noblacklist ${HOME}/.links
10 10
11blacklist /tmp/.X11-unix 11blacklist /tmp/.X11-unix
12blacklist ${RUNUSER}/wayland-*
12 13
13include disable-common.inc 14include disable-common.inc
14include disable-devel.inc 15include disable-devel.inc
diff --git a/etc/lynx.profile b/etc/lynx.profile
index 063285316..fb6fe94ec 100644
--- a/etc/lynx.profile
+++ b/etc/lynx.profile
@@ -7,6 +7,7 @@ include lynx.local
7include globals.local 7include globals.local
8 8
9blacklist /tmp/.X11-unix 9blacklist /tmp/.X11-unix
10blacklist ${RUNUSER}/wayland-*
10 11
11include disable-common.inc 12include disable-common.inc
12include disable-devel.inc 13include disable-devel.inc
diff --git a/etc/mediainfo.profile b/etc/mediainfo.profile
index 00730c00b..fb8db3e3d 100644
--- a/etc/mediainfo.profile
+++ b/etc/mediainfo.profile
@@ -6,6 +6,8 @@ include mediainfo.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist ${RUNUSER}/wayland-*
10
9include disable-common.inc 11include disable-common.inc
10include disable-devel.inc 12include disable-devel.inc
11include disable-exec.inc 13include disable-exec.inc
diff --git a/etc/meld.profile b/etc/meld.profile
index 22ec2b999..f360b1ded 100644
--- a/etc/meld.profile
+++ b/etc/meld.profile
@@ -22,8 +22,8 @@ noblacklist ${HOME}/.ssh
22noblacklist ${HOME}/.subversion 22noblacklist ${HOME}/.subversion
23 23
24# Allow python (blacklisted by disable-interpreters.inc) 24# Allow python (blacklisted by disable-interpreters.inc)
25include allow-python2.inc 25# Python 2 is EOL (see #3164). Uncomment the next line (or put it into your meld.local) if you understand the risks but want python 2 support for older meld versions.
26include allow-python3.inc 26#include allow-python3.inc
27 27
28# Uncomment the next line (or put it into your meld.local) if you don't need to compare files in disable-common.inc. 28# Uncomment the next line (or put it into your meld.local) if you don't need to compare files in disable-common.inc.
29#include disable-common.inc 29#include disable-common.inc
diff --git a/etc/midori.profile b/etc/midori.profile
index ffae4919f..e11e2acaa 100644
--- a/etc/midori.profile
+++ b/etc/midori.profile
@@ -9,6 +9,7 @@ include globals.local
9# noexec ${HOME} breaks DRM binaries. 9# noexec ${HOME} breaks DRM binaries.
10?BROWSER_ALLOW_DRM: ignore noexec ${HOME} 10?BROWSER_ALLOW_DRM: ignore noexec ${HOME}
11 11
12noblacklist ${HOME}/.cache/midori
12noblacklist ${HOME}/.config/midori 13noblacklist ${HOME}/.config/midori
13noblacklist ${HOME}/.local/share/midori 14noblacklist ${HOME}/.local/share/midori
14# noblacklist ${HOME}/.local/share/webkit 15# noblacklist ${HOME}/.local/share/webkit
@@ -16,11 +17,17 @@ noblacklist ${HOME}/.local/share/midori
16noblacklist ${HOME}/.pki 17noblacklist ${HOME}/.pki
17noblacklist ${HOME}/.local/share/pki 18noblacklist ${HOME}/.local/share/pki
18 19
20noblacklist ${HOME}/.cache/gnome-mplayer
21noblacklist ${HOME}/.config/gnome-mplayer
22noblacklist ${HOME}/.lastpass
23
19include disable-common.inc 24include disable-common.inc
20include disable-devel.inc 25include disable-devel.inc
21include disable-exec.inc 26include disable-exec.inc
22include disable-interpreters.inc 27include disable-interpreters.inc
28#include disable-passwdmgr.inc
23include disable-programs.inc 29include disable-programs.inc
30include disable-xdg.inc
24 31
25mkdir ${HOME}/.cache/midori 32mkdir ${HOME}/.cache/midori
26mkdir ${HOME}/.config/midori 33mkdir ${HOME}/.config/midori
diff --git a/etc/mp3splt.profile b/etc/mp3splt.profile
index 95173a890..7754d276b 100644
--- a/etc/mp3splt.profile
+++ b/etc/mp3splt.profile
@@ -6,6 +6,8 @@ include mp3splt.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist ${RUNUSER}/wayland-*
10
9noblacklist ${MUSIC} 11noblacklist ${MUSIC}
10 12
11include disable-common.inc 13include disable-common.inc
diff --git a/etc/multimc.profile b/etc/multimc.profile
new file mode 100644
index 000000000..338f494c9
--- /dev/null
+++ b/etc/multimc.profile
@@ -0,0 +1,5 @@
1# Firejail profile alias for multimc5
2# This file is overwritten after every install/update
3
4# Redirect
5include multimc5.profile
diff --git a/etc/musescore.profile b/etc/musescore.profile
index 9750a31f4..b3693c956 100644
--- a/etc/musescore.profile
+++ b/etc/musescore.profile
@@ -33,7 +33,8 @@ noroot
33notv 33notv
34novideo 34novideo
35protocol unix,inet,inet6 35protocol unix,inet,inet6
36seccomp 36# QtWebengine needs chroot to set up its own sandbox
37seccomp !chroot
37shell none 38shell none
38tracelog 39tracelog
39 40
diff --git a/etc/mutt.profile b/etc/mutt.profile
index 92babd50f..1fc412955 100644
--- a/etc/mutt.profile
+++ b/etc/mutt.profile
@@ -32,6 +32,7 @@ noblacklist ${HOME}/postponed
32noblacklist ${HOME}/sent 32noblacklist ${HOME}/sent
33 33
34blacklist /tmp/.X11-unix 34blacklist /tmp/.X11-unix
35blacklist ${RUNUSER}/wayland-*
35 36
36include disable-common.inc 37include disable-common.inc
37include disable-devel.inc 38include disable-devel.inc
diff --git a/etc/nano.profile b/etc/nano.profile
index af6fcc3fe..bc8c3dde0 100644
--- a/etc/nano.profile
+++ b/etc/nano.profile
@@ -7,6 +7,8 @@ include nano.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10noblacklist ${HOME}/.config/nano 12noblacklist ${HOME}/.config/nano
11noblacklist ${HOME}/.nanorc 13noblacklist ${HOME}/.nanorc
12 14
diff --git a/etc/ncdu.profile b/etc/ncdu.profile
index 0d7915839..9fda6ebe0 100644
--- a/etc/ncdu.profile
+++ b/etc/ncdu.profile
@@ -6,6 +6,8 @@ include ncdu.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist ${RUNUSER}/wayland-*
10
9include disable-exec.inc 11include disable-exec.inc
10 12
11caps.drop all 13caps.drop all
diff --git a/etc/odt2txt.profile b/etc/odt2txt.profile
index 719753c87..c0c5b671c 100644
--- a/etc/odt2txt.profile
+++ b/etc/odt2txt.profile
@@ -6,6 +6,8 @@ include odt2txt.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist ${RUNUSER}/wayland-*
10
9noblacklist ${DOCUMENTS} 11noblacklist ${DOCUMENTS}
10 12
11include disable-common.inc 13include disable-common.inc
diff --git a/etc/pandoc.profile b/etc/pandoc.profile
index 57b5d7e39..9a8d82a96 100644
--- a/etc/pandoc.profile
+++ b/etc/pandoc.profile
@@ -7,6 +7,8 @@ include pandoc.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10noblacklist ${DOCUMENTS} 12noblacklist ${DOCUMENTS}
11 13
12include disable-common.inc 14include disable-common.inc
diff --git a/etc/patch.profile b/etc/patch.profile
index 03f5a4b71..4a3365378 100644
--- a/etc/patch.profile
+++ b/etc/patch.profile
@@ -7,6 +7,8 @@ include patch.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10noblacklist ${DOCUMENTS} 12noblacklist ${DOCUMENTS}
11 13
12include disable-common.inc 14include disable-common.inc
diff --git a/etc/pdflatex.profile b/etc/pdflatex.profile
new file mode 100644
index 000000000..caf980d4d
--- /dev/null
+++ b/etc/pdflatex.profile
@@ -0,0 +1,12 @@
1# Firejail profile for pdflatex
2# This file is overwritten after every install/update
3# Persistent local customizations
4include pdflatex.local
5# Persistent global definitions
6include globals.local
7
8private-bin pdflatex
9
10# Redirect
11include latex-common.profile
12
diff --git a/etc/pdftotext.profile b/etc/pdftotext.profile
index e9572d914..73ebf4615 100644
--- a/etc/pdftotext.profile
+++ b/etc/pdftotext.profile
@@ -6,6 +6,8 @@ include pdftotext.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist ${RUNUSER}/wayland-*
10
9noblacklist ${DOCUMENTS} 11noblacklist ${DOCUMENTS}
10 12
11include disable-common.inc 13include disable-common.inc
@@ -22,6 +24,7 @@ include whitelist-usr-share-common.inc
22include whitelist-var-common.inc 24include whitelist-var-common.inc
23 25
24caps.drop all 26caps.drop all
27ipc-namespace
25machine-id 28machine-id
26net none 29net none
27no3d 30no3d
@@ -41,6 +44,7 @@ tracelog
41x11 none 44x11 none
42 45
43private-bin pdftotext 46private-bin pdftotext
47private-cache
44private-dev 48private-dev
45private-etc alternatives 49private-etc alternatives
46private-tmp 50private-tmp
diff --git a/etc/pngquant.profile b/etc/pngquant.profile
index 8c06cef1a..f9ce43c4c 100644
--- a/etc/pngquant.profile
+++ b/etc/pngquant.profile
@@ -7,6 +7,8 @@ include pngquant.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10include disable-common.inc 12include disable-common.inc
11include disable-devel.inc 13include disable-devel.inc
12include disable-exec.inc 14include disable-exec.inc
diff --git a/etc/polari.profile b/etc/polari.profile
index b9f81eece..939e2537e 100644
--- a/etc/polari.profile
+++ b/etc/polari.profile
@@ -6,6 +6,8 @@ include polari.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# Allow gjs (blacklisted by disable-interpreters.inc)
10include allow-gjs.inc
9 11
10include disable-common.inc 12include disable-common.inc
11include disable-devel.inc 13include disable-devel.inc
diff --git a/etc/psi-plus.profile b/etc/psi-plus.profile
index 087f90966..16fffe517 100644
--- a/etc/psi-plus.profile
+++ b/etc/psi-plus.profile
@@ -36,10 +36,10 @@ notv
36nou2f 36nou2f
37novideo 37novideo
38protocol unix,inet,inet6 38protocol unix,inet,inet6
39seccomp 39# QtWebengine needs chroot to set up its own sandbox
40seccomp !chroot
40shell none 41shell none
41 42
42disable-mnt 43disable-mnt
43private-dev 44private-dev
44private-tmp 45private-tmp
45
diff --git a/etc/quassel.profile b/etc/quassel.profile
index a78d1edcd..c65089e20 100644
--- a/etc/quassel.profile
+++ b/etc/quassel.profile
@@ -19,7 +19,8 @@ nonewprivs
19noroot 19noroot
20notv 20notv
21protocol unix,inet,inet6 21protocol unix,inet,inet6
22seccomp 22# QtWebengine needs chroot to set up its own sandbox
23seccomp !chroot
23 24
24private-cache 25private-cache
25private-tmp 26private-tmp
diff --git a/etc/rsync-download_only.profile b/etc/rsync-download_only.profile
index bda3bca92..84147f0a5 100644
--- a/etc/rsync-download_only.profile
+++ b/etc/rsync-download_only.profile
@@ -13,6 +13,7 @@ include globals.local
13# Usage: firejail --profile=rsync-download_only rsync 13# Usage: firejail --profile=rsync-download_only rsync
14 14
15blacklist /tmp/.X11-unix 15blacklist /tmp/.X11-unix
16blacklist ${RUNUSER}/wayland-*
16 17
17include disable-common.inc 18include disable-common.inc
18include disable-devel.inc 19include disable-devel.inc
diff --git a/etc/rtv.profile b/etc/rtv.profile
new file mode 100644
index 000000000..af4b7e94b
--- /dev/null
+++ b/etc/rtv.profile
@@ -0,0 +1,56 @@
1# Firejail profile for rtv
2# Description: Browse Reddit from your terminal
3# This file is overwritten after every install/update
4# Persistent local customizations
5include rtv.local
6# Persistent global definitions
7include globals.local
8
9blacklist /tmp/.X11-unix
10blacklist ${RUNUSER}/wayland-*
11
12noblacklist ${HOME}/.config/rtv
13noblacklist ${HOME}/.local/share/rtv
14
15# Allow python (blacklisted by disable-interpreters.inc)
16include allow-python2.inc
17include allow-python3.inc
18
19include disable-common.inc
20include disable-devel.inc
21include disable-exec.inc
22include disable-interpreters.inc
23include disable-passwdmgr.inc
24include disable-programs.inc
25include disable-xdg.inc
26
27mkdir ${HOME}/.config/rtv
28mkdir ${HOME}/.local/share/rtv
29whitelist ${HOME}/.config/rtv
30whitelist ${HOME}/.local/share/rtv
31include whitelist-var-common.inc
32
33apparmor
34caps.drop all
35machine-id
36netfilter
37no3d
38nodbus
39nodvd
40nogroups
41nonewprivs
42noroot
43nosound
44notv
45nou2f
46novideo
47protocol unix,inet,inet6
48seccomp
49shell none
50tracelog
51
52disable-mnt
53private-bin python*,rtv,sh,xdg-settings
54private-cache
55private-dev
56private-etc alternatives,ca-certificates,crypto-policies,host.conf,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,locale,locale.alias,locale.conf,localtime,mime.types,nsswitch.conf,pki,protocols,resolv.conf,rpc,services,ssl,terminfo,xdg
diff --git a/etc/server.profile b/etc/server.profile
index 6e077ff84..ce318a828 100644
--- a/etc/server.profile
+++ b/etc/server.profile
@@ -14,6 +14,7 @@ noblacklist /usr/sbin
14# noblacklist /var/opt 14# noblacklist /var/opt
15 15
16blacklist /tmp/.X11-unix 16blacklist /tmp/.X11-unix
17blacklist ${RUNUSER}/wayland-*
17 18
18include disable-common.inc 19include disable-common.inc
19# include disable-devel.inc 20# include disable-devel.inc
diff --git a/etc/shellcheck.profile b/etc/shellcheck.profile
index d26096c77..f8744bdf8 100644
--- a/etc/shellcheck.profile
+++ b/etc/shellcheck.profile
@@ -7,6 +7,8 @@ include shellcheck.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10noblacklist ${DOCUMENTS} 12noblacklist ${DOCUMENTS}
11 13
12include disable-common.inc 14include disable-common.inc
diff --git a/etc/shotcut.profile b/etc/shotcut.profile
index 5b3c5439d..072cc2c0d 100644
--- a/etc/shotcut.profile
+++ b/etc/shotcut.profile
@@ -29,6 +29,7 @@ nou2f
29protocol unix 29protocol unix
30seccomp 30seccomp
31shell none 31shell none
32tracelog
32 33
33#private-bin melt,nice,qmelt,shotcut 34#private-bin melt,nice,qmelt,shotcut
34private-cache 35private-cache
diff --git a/etc/signal-cli.profile b/etc/signal-cli.profile
index bb1bf732d..6a2f5c434 100644
--- a/etc/signal-cli.profile
+++ b/etc/signal-cli.profile
@@ -7,6 +7,7 @@ include signal-cli.local
7include globals.local 7include globals.local
8 8
9blacklist /tmp/.X11-unix 9blacklist /tmp/.X11-unix
10blacklist ${RUNUSER}/wayland-*
10 11
11noblacklist ${HOME}/.local/share/signal-cli 12noblacklist ${HOME}/.local/share/signal-cli
12 13
diff --git a/etc/spectre-meltdown-checker.profile b/etc/spectre-meltdown-checker.profile
index 3306181e4..e27df4cc8 100644
--- a/etc/spectre-meltdown-checker.profile
+++ b/etc/spectre-meltdown-checker.profile
@@ -6,6 +6,8 @@ include spectre-meltdown-checker.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9blacklist ${RUNUSER}/wayland-*
10
9noblacklist ${PATH}/mount 11noblacklist ${PATH}/mount
10noblacklist ${PATH}/umount 12noblacklist ${PATH}/umount
11 13
diff --git a/etc/ssh-agent.profile b/etc/ssh-agent.profile
index 8e355a176..cf509852a 100644
--- a/etc/ssh-agent.profile
+++ b/etc/ssh-agent.profile
@@ -11,6 +11,7 @@ noblacklist /tmp/ssh-*
11noblacklist ${HOME}/.ssh 11noblacklist ${HOME}/.ssh
12 12
13blacklist /tmp/.X11-unix 13blacklist /tmp/.X11-unix
14blacklist ${RUNUSER}/wayland-*
14 15
15include disable-common.inc 16include disable-common.inc
16include disable-passwdmgr.inc 17include disable-passwdmgr.inc
diff --git a/etc/standardnotes-desktop.profile b/etc/standardnotes-desktop.profile
index aa6902854..a402aca5a 100644
--- a/etc/standardnotes-desktop.profile
+++ b/etc/standardnotes-desktop.profile
@@ -39,5 +39,5 @@ seccomp !chroot
39disable-mnt 39disable-mnt
40private-dev 40private-dev
41private-tmp 41private-tmp
42private-etc alternatives,ca-certificates,crypto-policies,fonts,host.conf,hostname,hosts,pki,resolv.conf,ssl,xdg 42private-etc alternatives,ca-certificates,crypto-policies,fonts,host.conf,hostname,hosts,ld.so.cache,pki,resolv.conf,ssl,xdg
43 43
diff --git a/etc/start-tor-browser.profile b/etc/start-tor-browser.profile
index a8b5d109e..f9daf8f09 100644
--- a/etc/start-tor-browser.profile
+++ b/etc/start-tor-browser.profile
@@ -36,5 +36,5 @@ shell none
36disable-mnt 36disable-mnt
37private-bin bash,cat,cp,cut,dirname,env,getconf,gpg,grep,gxmessage,id,kdialog,ln,mkdir,pwd,readlink,realpath,rm,sed,sh,tail,test,update-desktop-database,xmessage,zenity 37private-bin bash,cat,cp,cut,dirname,env,getconf,gpg,grep,gxmessage,id,kdialog,ln,mkdir,pwd,readlink,realpath,rm,sed,sh,tail,test,update-desktop-database,xmessage,zenity
38private-dev 38private-dev
39private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,hostname,hosts,ld.so.cache,machine-id,pki,pulse,resolv.conf,ssl 39private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,hostname,hosts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,machine-id,pki,pulse,resolv.conf,ssl
40private-tmp 40private-tmp
diff --git a/etc/strings.profile b/etc/strings.profile
index 52b762108..7dc453b1f 100644
--- a/etc/strings.profile
+++ b/etc/strings.profile
@@ -7,6 +7,8 @@ include strings.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10#include disable-common.inc 12#include disable-common.inc
11include disable-devel.inc 13include disable-devel.inc
12include disable-exec.inc 14include disable-exec.inc
diff --git a/etc/sylpheed.profile b/etc/sylpheed.profile
index 8e99fe1d6..4344fe73a 100644
--- a/etc/sylpheed.profile
+++ b/etc/sylpheed.profile
@@ -4,17 +4,14 @@
4# Persistent local customizations 4# Persistent local customizations
5include sylpheed.local 5include sylpheed.local
6# Persistent global definitions 6# Persistent global definitions
7# added by included profile 7include globals.local
8#include globals.local
9 8
10noblacklist ${HOME}/.sylpheed-2.0 9noblacklist ${HOME}/.sylpheed-2.0
11# when storing mail outside the default ${HOME}/Mail path, 'noblacklist' the custom path in your sylpheed.local
12# and 'blacklist' it in your disable-common.local too so it is kept hidden from other applications
13 10
14blacklist ${HOME}/.claws-mail 11mkdir ${HOME}/.sylpheed-2.0
12whitelist ${HOME}/.sylpheed-2.0
15 13
16nowhitelist /usr/share/doc/claws-mail
17whitelist /usr/share/sylpheed 14whitelist /usr/share/sylpheed
18 15
19# Redirect 16# Redirect
20include claws-mail.profile 17include email-common.profile
diff --git a/etc/tar.profile b/etc/tar.profile
index 455a370de..0858dcb26 100644
--- a/etc/tar.profile
+++ b/etc/tar.profile
@@ -7,6 +7,8 @@ include tar.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10# Arch Linux (based distributions) need access to /var/lib/pacman. As we drop all capabilities this is automatically read-only. 12# Arch Linux (based distributions) need access to /var/lib/pacman. As we drop all capabilities this is automatically read-only.
11noblacklist /var/lib/pacman 13noblacklist /var/lib/pacman
12 14
diff --git a/etc/teams-for-linux.profile b/etc/teams-for-linux.profile
index d9e874be2..882d8d0f3 100644
--- a/etc/teams-for-linux.profile
+++ b/etc/teams-for-linux.profile
@@ -1,37 +1,27 @@
1# Firejail profile for teams-for-linux 1# Firejail profile for teams-for-linux
2# Description: Teams for Linux is an Electron application for Microsoft's team collaboration and chat program 2# Description: Unofficial Microsoft Teams client for Linux using Electron.
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include teams-for-linux.local 5include teams-for-linux.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7# added by included profile
8#include globals.local
9
10ignore nodbus
8 11
9noblacklist ${HOME}/.config/teams-for-linux 12noblacklist ${HOME}/.config/teams-for-linux
10 13
11include disable-common.inc
12include disable-devel.inc 14include disable-devel.inc
13include disable-exec.inc 15include disable-exec.inc
14include disable-interpreters.inc 16include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17 17
18mkdir ${HOME}/.config/teams-for-linux 18mkdir ${HOME}/.config/teams-for-linux
19whitelist ${HOME}/.config/teams-for-linux 19whitelist ${HOME}/.config/teams-for-linux
20whitelist ${DOWNLOADS}
21include whitelist-common.inc 20include whitelist-common.inc
22include whitelist-var-common.inc 21include whitelist-var-common.inc
23 22
24caps.drop all
25netfilter
26nodvd
27nogroups
28nonewprivs
29noroot
30notv
31nou2f 23nou2f
32novideo 24novideo
33protocol unix,inet,inet6,netlink
34seccomp
35shell none 25shell none
36 26
37disable-mnt 27disable-mnt
@@ -40,3 +30,6 @@ private-cache
40private-dev 30private-dev
41private-etc ca-certificates,crypto-policies,fonts,ld.so.cache,localtime,machine-id,pki,resolv.conf,ssl 31private-etc ca-certificates,crypto-policies,fonts,ld.so.cache,localtime,machine-id,pki,resolv.conf,ssl
42private-tmp 32private-tmp
33
34# Redirect
35include electron.profile
diff --git a/etc/templates/profile.template b/etc/templates/profile.template
index 7bfc3cf0d..0362b82af 100644
--- a/etc/templates/profile.template
+++ b/etc/templates/profile.template
@@ -42,6 +42,7 @@
42# ${HOME} (user's home) 42# ${HOME} (user's home)
43# ${PATH} (contents of PATH envvar) 43# ${PATH} (contents of PATH envvar)
44# ${MUSIC} 44# ${MUSIC}
45# ${RUNUSER} (/run/user/UID)
45# ${VIDEOS} 46# ${VIDEOS}
46# 47#
47# Check contents of ~/.config/user-dirs.dirs to see how they translate to actual paths. 48# Check contents of ~/.config/user-dirs.dirs to see how they translate to actual paths.
@@ -59,6 +60,8 @@ include globals.local
59##blacklist PATH 60##blacklist PATH
60# Disable X11 (CLI only), see also 'x11 none' below 61# Disable X11 (CLI only), see also 'x11 none' below
61#blacklist /tmp/.X11-unix 62#blacklist /tmp/.X11-unix
63# Disable Wayland
64#blacklist ${RUNUSER}/wayland-*
62 65
63# It is common practice to add files/dirs containing program-specific configuration 66# It is common practice to add files/dirs containing program-specific configuration
64# (often ${HOME}/PROGRAMNAME or ${HOME}/.config/PROGRAMNAME) into disable-programs.inc 67# (often ${HOME}/PROGRAMNAME or ${HOME}/.config/PROGRAMNAME) into disable-programs.inc
@@ -90,6 +93,9 @@ include globals.local
90# Allow ruby (blacklisted by disable-interpreters.inc) 93# Allow ruby (blacklisted by disable-interpreters.inc)
91#include allow-ruby.inc 94#include allow-ruby.inc
92 95
96# Allow gjs (blacklisted by disable-interpreters.inc)
97#include allow-gjs.inc
98
93# Allows files commonly used by IDEs 99# Allows files commonly used by IDEs
94#include allow-common-devel.inc 100#include allow-common-devel.inc
95 101
diff --git a/etc/tex.profile b/etc/tex.profile
new file mode 100644
index 000000000..f56c3038e
--- /dev/null
+++ b/etc/tex.profile
@@ -0,0 +1,12 @@
1# Firejail profile for tex
2# This file is overwritten after every install/update
3# Persistent local customizations
4include tex.local
5# Persistent global definitions
6include globals.local
7
8private-bin tex
9
10# Redirect
11include latex-common.profile
12
diff --git a/etc/thunderbird.profile b/etc/thunderbird.profile
index e30b57498..6e888c163 100644
--- a/etc/thunderbird.profile
+++ b/etc/thunderbird.profile
@@ -6,13 +6,16 @@ include thunderbird.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7include globals.local
8 8
9# Users have thunderbird set to open a browser by clicking a link in an email 9# writable-run-user and dbus are needed by enigmail
10# We are not allowed to blacklist browser-specific directories 10ignore nodbus
11writable-run-user
11 12
12noblacklist ${HOME}/.cache/thunderbird 13# If you want to read local mail stored in /var/mail, add the following to thunderbird.local:
13noblacklist ${HOME}/.gnupg 14#noblacklist /var/mail
14# noblacklist ${HOME}/.icedove 15#noblacklist /var/spool/mail
15noblacklist ${HOME}/.thunderbird 16#whitelist /var/mail
17#whitelist /var/spool/mail
18#writable-var
16 19
17# Uncomment the next 4 lines or put them in your thunderbird.local to 20# Uncomment the next 4 lines or put them in your thunderbird.local to
18# allow Firefox to load your profile when clicking a link in an email 21# allow Firefox to load your profile when clicking a link in an email
@@ -21,6 +24,14 @@ noblacklist ${HOME}/.thunderbird
21#whitelist ${HOME}/.cache/mozilla/firefox 24#whitelist ${HOME}/.cache/mozilla/firefox
22#whitelist ${HOME}/.mozilla 25#whitelist ${HOME}/.mozilla
23 26
27noblacklist ${HOME}/.cache/thunderbird
28noblacklist ${HOME}/.gnupg
29# noblacklist ${HOME}/.icedove
30noblacklist ${HOME}/.thunderbird
31
32include disable-passwdmgr.inc
33include disable-xdg.inc
34
24# If you have setup Thunderbird to archive emails to a local folder, 35# If you have setup Thunderbird to archive emails to a local folder,
25# make sure you add the path to that folder to the mkdir and whitelist 36# make sure you add the path to that folder to the mkdir and whitelist
26# rules below. Otherwise they will be deleted when you close Thunderbird. 37# rules below. Otherwise they will be deleted when you close Thunderbird.
@@ -34,23 +45,19 @@ whitelist ${HOME}/.gnupg
34# whitelist ${HOME}/.icedove 45# whitelist ${HOME}/.icedove
35whitelist ${HOME}/.thunderbird 46whitelist ${HOME}/.thunderbird
36 47
37#whitelist /usr/share/mozilla 48whitelist /usr/share/gnupg
38#include whitelist-usr-share-common.inc 49whitelist /usr/share/mozilla
50whitelist /usr/share/webext
51include whitelist-usr-share-common.inc
52
53# machine-id breaks audio in browsers; enable or put it in your thunderbird.local when sound is not required
54#machine-id
55novideo
39 56
40# We need the real /tmp for data exchange when xdg-open handles email attachments on KDE 57# We need the real /tmp for data exchange when xdg-open handles email attachments on KDE
41ignore private-tmp 58ignore private-tmp
42# machine-id breaks audio in browsers; enable or put it in your thunderbird.local when sound is not required
43# machine-id
44read-only ${HOME}/.config/mimeapps.list
45# writable-run-user and dbus are needed by enigmail
46writable-run-user
47ignore nodbus
48 59
49# If you want to read local mail stored in /var/mail, add the following to thunderbird.local: 60read-only ${HOME}/.config/mimeapps.list
50# noblacklist /var/mail
51# noblacklist /var/spool/mail
52# writable-var
53 61
54# allow browsers
55# Redirect 62# Redirect
56include firefox-common.profile 63include firefox-common.profile
diff --git a/etc/torbrowser-launcher.profile b/etc/torbrowser-launcher.profile
index be03afdb5..72bdf9fa1 100644
--- a/etc/torbrowser-launcher.profile
+++ b/etc/torbrowser-launcher.profile
@@ -50,5 +50,5 @@ shell none
50disable-mnt 50disable-mnt
51private-bin bash,cat,cp,cut,dirname,env,expr,file,gpg,grep,gxmessage,id,kdialog,ln,mkdir,mv,python*,rm,sed,sh,tail,tar,tclsh,test,tor-browser,tor-browser-en,torbrowser-launcher,update-desktop-database,xmessage,xz,zenity 51private-bin bash,cat,cp,cut,dirname,env,expr,file,gpg,grep,gxmessage,id,kdialog,ln,mkdir,mv,python*,rm,sed,sh,tail,tar,tclsh,test,tor-browser,tor-browser-en,torbrowser-launcher,update-desktop-database,xmessage,xz,zenity
52private-dev 52private-dev
53private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,ld.so.cache,machine-id,pki,pulse,resolv.conf,ssl 53private-etc alsa,alternatives,asound.conf,ca-certificates,crypto-policies,fonts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,machine-id,pki,pulse,resolv.conf,ssl
54private-tmp 54private-tmp
diff --git a/etc/tracker.profile b/etc/tracker.profile
index 6e107d99e..d47185b1d 100644
--- a/etc/tracker.profile
+++ b/etc/tracker.profile
@@ -9,6 +9,7 @@ include globals.local
9# Tracker is started by systemd on most systems. Therefore it is not firejailed by default 9# Tracker is started by systemd on most systems. Therefore it is not firejailed by default
10 10
11blacklist /tmp/.X11-unix 11blacklist /tmp/.X11-unix
12blacklist ${RUNUSER}/wayland-*
12 13
13include disable-common.inc 14include disable-common.inc
14include disable-devel.inc 15include disable-devel.inc
diff --git a/etc/transmission-common.profile b/etc/transmission-common.profile
index a8b667e91..b9f49c4a4 100644
--- a/etc/transmission-common.profile
+++ b/etc/transmission-common.profile
@@ -3,6 +3,9 @@
3# This file is overwritten after every install/update 3# This file is overwritten after every install/update
4# Persistent local customizations 4# Persistent local customizations
5include transmission-common.local 5include transmission-common.local
6# Persistent global definitions
7# added by caller profile
8#include globals.local
6 9
7noblacklist ${HOME}/.cache/transmission 10noblacklist ${HOME}/.cache/transmission
8noblacklist ${HOME}/.config/transmission 11noblacklist ${HOME}/.config/transmission
@@ -40,6 +43,7 @@ seccomp
40shell none 43shell none
41tracelog 44tracelog
42 45
46private-cache
43private-dev 47private-dev
44private-lib 48private-lib
45private-tmp 49private-tmp
diff --git a/etc/transmission-daemon.profile b/etc/transmission-daemon.profile
index f1e7fcb17..1841b8ed0 100644
--- a/etc/transmission-daemon.profile
+++ b/etc/transmission-daemon.profile
@@ -7,6 +7,8 @@ include transmission-daemon.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10mkdir ${HOME}/.config/transmission-daemon
11whitelist ${HOME}/.config/transmission-daemon
10whitelist /var/lib/transmission 12whitelist /var/lib/transmission
11 13
12caps.keep ipc_lock,net_bind_service,setgid,setuid,sys_chroot 14caps.keep ipc_lock,net_bind_service,setgid,setuid,sys_chroot
diff --git a/etc/tvbrowser.profile b/etc/tvbrowser.profile
new file mode 100644
index 000000000..6e028b086
--- /dev/null
+++ b/etc/tvbrowser.profile
@@ -0,0 +1,51 @@
1# Firejail profile for tvbrowser
2# Description: java tv programm form tvbrowser.org
3# This file is overwritten after every install/update
4# Persistent local customizations
5include tvbrowser.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.config/tvbrowser
10noblacklist ${HOME}/.tvbrowser
11
12# Allow java (blacklisted by disable-devel.inc)
13include allow-java.inc
14
15include disable-common.inc
16include disable-devel.inc
17include disable-exec.inc
18include disable-interpreters.inc
19include disable-passwdmgr.inc
20include disable-programs.inc
21include disable-xdg.inc
22
23mkdir ${HOME}/.config/tvbrowser
24mkdir ${HOME}/.tvbrowser
25whitelist ${HOME}/.config/tvbrowser
26whitelist ${HOME}/.tvbrowser
27whitelist /usr/share/tvbrowser
28include whitelist-common.inc
29include whitelist-usr-share-common.inc
30include whitelist-var-common.inc
31
32caps.drop all
33netfilter
34no3d
35nodbus
36nodvd
37nogroups
38nonewprivs
39noroot
40notv
41nou2f
42novideo
43protocol unix,inet,inet6
44seccomp
45shell none
46tracelog
47
48disable-mnt
49private-cache
50private-dev
51private-tmp
diff --git a/etc/udiskie.profile b/etc/udiskie.profile
index f6e85d60e..265f6429d 100644
--- a/etc/udiskie.profile
+++ b/etc/udiskie.profile
@@ -31,7 +31,7 @@ notv
31nou2f 31nou2f
32novideo 32novideo
33protocol unix 33protocol unix
34seccomp 34seccomp !request_key
35shell none 35shell none
36tracelog 36tracelog
37 37
diff --git a/etc/unbound.profile b/etc/unbound.profile
index 67448d766..36533a762 100644
--- a/etc/unbound.profile
+++ b/etc/unbound.profile
@@ -10,6 +10,7 @@ noblacklist /sbin
10noblacklist /usr/sbin 10noblacklist /usr/sbin
11 11
12blacklist /tmp/.X11-unix 12blacklist /tmp/.X11-unix
13blacklist ${RUNUSER}/wayland-*
13 14
14include disable-common.inc 15include disable-common.inc
15include disable-devel.inc 16include disable-devel.inc
diff --git a/etc/unf.profile b/etc/unf.profile
index 1f0b2aa32..b8eccf4dc 100644
--- a/etc/unf.profile
+++ b/etc/unf.profile
@@ -7,6 +7,8 @@ include unf.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10include disable-common.inc 12include disable-common.inc
11include disable-devel.inc 13include disable-devel.inc
12include disable-exec.inc 14include disable-exec.inc
@@ -48,7 +50,7 @@ private-cache
48?HAS_APPIMAGE: ignore private-dev 50?HAS_APPIMAGE: ignore private-dev
49private-dev 51private-dev
50private-etc alternatives 52private-etc alternatives
51private-lib libgcc_s.so.* 53private-lib gcc/*/*/libgcc_s.so.*
52private-tmp 54private-tmp
53 55
54memory-deny-write-execute 56memory-deny-write-execute
diff --git a/etc/unrar.profile b/etc/unrar.profile
index 428173e7d..bf28746b0 100644
--- a/etc/unrar.profile
+++ b/etc/unrar.profile
@@ -7,6 +7,8 @@ include unrar.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10include disable-common.inc 12include disable-common.inc
11include disable-devel.inc 13include disable-devel.inc
12include disable-exec.inc 14include disable-exec.inc
diff --git a/etc/unzip.profile b/etc/unzip.profile
index 60e447049..7882f2b63 100644
--- a/etc/unzip.profile
+++ b/etc/unzip.profile
@@ -7,6 +7,8 @@ include unzip.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10# GNOME Shell integration (chrome-gnome-shell) 12# GNOME Shell integration (chrome-gnome-shell)
11noblacklist ${HOME}/.local/share/gnome-shell 13noblacklist ${HOME}/.local/share/gnome-shell
12 14
diff --git a/etc/uudeview.profile b/etc/uudeview.profile
index 60a7f0d20..bd2ee01d5 100644
--- a/etc/uudeview.profile
+++ b/etc/uudeview.profile
@@ -7,6 +7,8 @@ include uudeview.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10include disable-common.inc 12include disable-common.inc
11include disable-devel.inc 13include disable-devel.inc
12include disable-exec.inc 14include disable-exec.inc
diff --git a/etc/w3m.profile b/etc/w3m.profile
index 76531d315..97465baa1 100644
--- a/etc/w3m.profile
+++ b/etc/w3m.profile
@@ -9,6 +9,7 @@ include globals.local
9noblacklist ${HOME}/.w3m 9noblacklist ${HOME}/.w3m
10 10
11blacklist /tmp/.X11-unix 11blacklist /tmp/.X11-unix
12blacklist ${RUNUSER}/wayland-*
12 13
13include allow-perl.inc 14include allow-perl.inc
14 15
diff --git a/etc/wget.profile b/etc/wget.profile
index c1f7dfc3f..401926e2d 100644
--- a/etc/wget.profile
+++ b/etc/wget.profile
@@ -12,6 +12,7 @@ noblacklist ${HOME}/.wget-hsts
12noblacklist ${HOME}/.wgetrc 12noblacklist ${HOME}/.wgetrc
13 13
14blacklist /tmp/.X11-unix 14blacklist /tmp/.X11-unix
15blacklist ${RUNUSER}/wayland-*
15 16
16include disable-common.inc 17include disable-common.inc
17include disable-devel.inc 18include disable-devel.inc
diff --git a/etc/whalebird.profile b/etc/whalebird.profile
index 26932b6b3..2e24dd8e0 100644
--- a/etc/whalebird.profile
+++ b/etc/whalebird.profile
@@ -4,37 +4,27 @@
4# Persistent local customizations 4# Persistent local customizations
5include whalebird.local 5include whalebird.local
6# Persistent global definitions 6# Persistent global definitions
7include globals.local 7# added by included profile
8#include globals.local
9
10ignore nodbus
8 11
9noblacklist ${HOME}/.config/Whalebird 12noblacklist ${HOME}/.config/Whalebird
10 13
11include disable-common.inc
12include disable-devel.inc 14include disable-devel.inc
13include disable-exec.inc 15include disable-exec.inc
14include disable-interpreters.inc 16include disable-interpreters.inc
15include disable-passwdmgr.inc
16include disable-programs.inc
17include disable-xdg.inc 17include disable-xdg.inc
18 18
19mkdir ${HOME}/.config/Whalebird 19mkdir ${HOME}/.config/Whalebird
20whitelist ${HOME}/.config/Whalebird 20whitelist ${HOME}/.config/Whalebird
21whitelist ${DOWNLOADS}
22include whitelist-common.inc 21include whitelist-common.inc
23include whitelist-var-common.inc 22include whitelist-var-common.inc
24 23
25apparmor
26caps.drop all
27netfilter
28no3d 24no3d
29nodvd
30nogroups
31nonewprivs
32noroot
33notv
34nou2f 25nou2f
35novideo 26novideo
36protocol unix,inet,inet6 27protocol unix,inet,inet6
37seccomp
38shell none 28shell none
39 29
40disable-mnt 30disable-mnt
@@ -43,3 +33,6 @@ private-cache
43private-dev 33private-dev
44private-etc fonts,machine-id 34private-etc fonts,machine-id
45private-tmp 35private-tmp
36
37# Redirect
38include electron.profile
diff --git a/etc/whitelist-usr-share-common.inc b/etc/whitelist-usr-share-common.inc
index 322bdefe9..710007163 100644
--- a/etc/whitelist-usr-share-common.inc
+++ b/etc/whitelist-usr-share-common.inc
@@ -13,6 +13,7 @@ whitelist /usr/share/distro-info
13whitelist /usr/share/drirc.d 13whitelist /usr/share/drirc.d
14whitelist /usr/share/enchant 14whitelist /usr/share/enchant
15whitelist /usr/share/enchant-2 15whitelist /usr/share/enchant-2
16whitelist /usr/share/file
16whitelist /usr/share/fontconfig 17whitelist /usr/share/fontconfig
17whitelist /usr/share/fonts 18whitelist /usr/share/fonts
18whitelist /usr/share/gir-1.0 19whitelist /usr/share/gir-1.0
@@ -26,6 +27,7 @@ whitelist /usr/share/gtksourceview-4
26whitelist /usr/share/hunspell 27whitelist /usr/share/hunspell
27whitelist /usr/share/hwdata 28whitelist /usr/share/hwdata
28whitelist /usr/share/icons 29whitelist /usr/share/icons
30whitelist /usr/share/icu
29whitelist /usr/share/knotifications5 31whitelist /usr/share/knotifications5
30whitelist /usr/share/kservices5 32whitelist /usr/share/kservices5
31whitelist /usr/share/Kvantum 33whitelist /usr/share/Kvantum
diff --git a/etc/whois.profile b/etc/whois.profile
index bd0870bea..0e60e18ab 100644
--- a/etc/whois.profile
+++ b/etc/whois.profile
@@ -8,6 +8,7 @@ include whois.local
8include globals.local 8include globals.local
9 9
10blacklist /tmp/.X11-unix 10blacklist /tmp/.X11-unix
11blacklist ${RUNUSER}/wayland-*
11 12
12include disable-common.inc 13include disable-common.inc
13include disable-devel.inc 14include disable-devel.inc
@@ -45,8 +46,8 @@ private
45private-bin bash,sh,whois 46private-bin bash,sh,whois
46private-cache 47private-cache
47private-dev 48private-dev
48private-etc alternatives,hosts,jwhois.conf,services,whois.conf 49private-etc alternatives,hosts,jwhois.conf,resolv.conf,services,whois.conf
49private-lib 50private-lib gconv
50private-tmp 51private-tmp
51 52
52memory-deny-write-execute 53memory-deny-write-execute
diff --git a/etc/wire-desktop.profile b/etc/wire-desktop.profile
index 490255fa6..3c783322b 100644
--- a/etc/wire-desktop.profile
+++ b/etc/wire-desktop.profile
@@ -1,40 +1,35 @@
1# Firejail profile for wire-desktop 1# Firejail profile for wire-desktop
2# Description: End-to-end encrypted messenger with file sharing, voice calls and video conferences
2# This file is overwritten after every install/update 3# This file is overwritten after every install/update
3# Persistent local customizations 4# Persistent local customizations
4include wire-desktop.local 5include wire-desktop.local
5# Persistent global definitions 6# Persistent global definitions
6include globals.local 7# added by included profile
8#include globals.local
9
10# Debian/Ubuntu use /opt/Wire. As that is not in PATH by default, run `firejail /opt/Wire/wire-desktop` to start it.
11
12ignore caps.drop all
13ignore nodbus
7 14
8noblacklist ${HOME}/.config/Wire 15noblacklist ${HOME}/.config/Wire
9 16
10include disable-common.inc
11include disable-devel.inc 17include disable-devel.inc
12include disable-interpreters.inc 18include disable-interpreters.inc
13include disable-passwdmgr.inc
14include disable-programs.inc
15 19
16mkdir ${HOME}/.config/Wire 20mkdir ${HOME}/.config/Wire
17whitelist ${HOME}/.config/Wire 21whitelist ${HOME}/.config/Wire
18whitelist ${DOWNLOADS}
19include whitelist-common.inc 22include whitelist-common.inc
20 23
21caps.drop all 24caps.keep sys_admin,sys_chroot
22netfilter
23nodvd
24nogroups
25nonewprivs
26noroot
27notv
28nou2f 25nou2f
29protocol unix,inet,inet6,netlink
30seccomp
31shell none 26shell none
32 27
33# Note: The current version of Wire is located in /opt/wire-desktop/wire-desktop, and therefore
34# it is not in PATH. To use Wire with firejail, run "firejail /opt/wire-desktop/wire-desktop"
35
36disable-mnt 28disable-mnt
37private-bin bash,electron,electron4,env,sh,wire-desktop 29private-bin bash,electron,electron4,env,sh,wire-desktop
38private-dev 30private-dev
39private-etc alternatives,ca-certificates,crypto-policies,fonts,machine-id,pki,resolv.conf,ssl 31private-etc alternatives,ca-certificates,crypto-policies,fonts,machine-id,pki,resolv.conf,ssl
40private-tmp 32private-tmp
33
34# Redirect
35include electron.profile
diff --git a/etc/wpp.profile b/etc/wpp.profile
new file mode 100644
index 000000000..a219397a9
--- /dev/null
+++ b/etc/wpp.profile
@@ -0,0 +1,14 @@
1# Firejail profile for wpp
2# Description: WPS Office - Presentation
3# This file is overwritten after every install/update
4# Persistent local customizations
5include wpp.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10ignore machine-id
11ignore nosound
12
13# Redirect
14include wps.profile
diff --git a/etc/wps.profile b/etc/wps.profile
new file mode 100644
index 000000000..47bba2dda
--- /dev/null
+++ b/etc/wps.profile
@@ -0,0 +1,47 @@
1# Firejail profile for wps
2# Description: WPS Office - Writer
3# This file is overwritten after every install/update
4# Persistent local customizations
5include wps.local
6# Persistent global definitions
7include globals.local
8
9noblacklist ${HOME}/.kingsoft
10noblacklist ${HOME}/.config/Kingsoft
11noblacklist ${HOME}/.local/share/Kingsoft
12
13include disable-common.inc
14include disable-devel.inc
15include disable-exec.inc
16include disable-interpreters.inc
17include disable-passwdmgr.inc
18include disable-programs.inc
19
20include whitelist-usr-share-common.inc
21include whitelist-var-common.inc
22
23apparmor
24caps.drop all
25machine-id
26# Uncomment the next line (or add to wps.local) if you don't use network features.
27#net none
28netfilter
29no3d
30nodbus
31nodvd
32nogroups
33nonewprivs
34noroot
35nosound
36notv
37nou2f
38novideo
39protocol unix,inet,inet6
40# seccomp cause some minor issues, if you can live with them enable it.
41#seccomp
42shell none
43tracelog
44
45private-cache
46private-dev
47private-tmp
diff --git a/etc/wpspdf.profile b/etc/wpspdf.profile
new file mode 100644
index 000000000..82080acbc
--- /dev/null
+++ b/etc/wpspdf.profile
@@ -0,0 +1,11 @@
1# Firejail profile for wpspdf
2# Description: Kingsoft Pdf Reader
3# This file is overwritten after every install/update
4# Persistent local customizations
5include et.local
6# Persistent global definitions
7# added by included profile
8#include globals.local
9
10# Redirect
11include wps.profile
diff --git a/etc/xzdec.profile b/etc/xzdec.profile
index 93c288d6e..ca6aaf1d5 100644
--- a/etc/xzdec.profile
+++ b/etc/xzdec.profile
@@ -7,6 +7,8 @@ include xzdec.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10include disable-common.inc 12include disable-common.inc
11include disable-devel.inc 13include disable-devel.inc
12include disable-exec.inc 14include disable-exec.inc
diff --git a/etc/yelp.profile b/etc/yelp.profile
index 41138cd17..acd483209 100644
--- a/etc/yelp.profile
+++ b/etc/yelp.profile
@@ -18,6 +18,7 @@ include disable-xdg.inc
18 18
19mkdir ${HOME}/.config/yelp 19mkdir ${HOME}/.config/yelp
20whitelist ${HOME}/.config/yelp 20whitelist ${HOME}/.config/yelp
21whitelist /usr/share/doc
21whitelist /usr/share/help 22whitelist /usr/share/help
22whitelist /usr/share/yelp 23whitelist /usr/share/yelp
23whitelist /usr/share/yelp-xsl 24whitelist /usr/share/yelp-xsl
diff --git a/etc/youtube-dl.profile b/etc/youtube-dl.profile
index 5fa72c9dc..19effef47 100644
--- a/etc/youtube-dl.profile
+++ b/etc/youtube-dl.profile
@@ -21,6 +21,7 @@ include allow-python2.inc
21include allow-python3.inc 21include allow-python3.inc
22 22
23blacklist /tmp/.X11-unix 23blacklist /tmp/.X11-unix
24blacklist ${RUNUSER}/wayland-*
24 25
25include disable-common.inc 26include disable-common.inc
26include disable-devel.inc 27include disable-devel.inc
diff --git a/etc/zathura.profile b/etc/zathura.profile
index 68a5701ee..703c8edd4 100644
--- a/etc/zathura.profile
+++ b/etc/zathura.profile
@@ -18,10 +18,18 @@ include disable-passwdmgr.inc
18include disable-programs.inc 18include disable-programs.inc
19include disable-xdg.inc 19include disable-xdg.inc
20 20
21mkdir ${HOME}/.config/zathura
22mkdir ${HOME}/.local/share/zathura
23whitelist /usr/share/doc
24whitelist /usr/share/zathura
25include whitelist-usr-share-common.inc
26include whitelist-var-common.inc
27
21caps.drop all 28caps.drop all
29ipc-namespace
22machine-id 30machine-id
23# net none 31net none
24# nodbus 32nodbus
25nodvd 33nodvd
26nogroups 34nogroups
27nonewprivs 35nonewprivs
@@ -38,11 +46,10 @@ tracelog
38private-bin zathura 46private-bin zathura
39private-cache 47private-cache
40private-dev 48private-dev
41private-etc alternatives,fonts,machine-id 49private-etc alternatives,fonts,ld.so.cache,ld.so.conf,ld.so.conf.d,ld.so.preload,machine-id
50private-lib gcc/*/*/libgcc_s.so.*,gcc/*/*/libstdc++.so.*,libarchive.so.*,libdjvulibre.so.*,libgirara-gtk*,libpoppler-glib.so.*,libspectre.so.*,zathura
42private-tmp 51private-tmp
43 52
44mkdir ${HOME}/.config/zathura
45mkdir ${HOME}/.local/share/zathura
46read-only ${HOME} 53read-only ${HOME}
47read-write ${HOME}/.config/zathura 54read-write ${HOME}/.config/zathura
48read-write ${HOME}/.local/share/zathura 55read-write ${HOME}/.local/share/zathura
diff --git a/etc/zstd.profile b/etc/zstd.profile
index ea7bbfb0d..93b849568 100644
--- a/etc/zstd.profile
+++ b/etc/zstd.profile
@@ -7,6 +7,8 @@ include zstd.local
7# Persistent global definitions 7# Persistent global definitions
8include globals.local 8include globals.local
9 9
10blacklist ${RUNUSER}/wayland-*
11
10include disable-common.inc 12include disable-common.inc
11include disable-devel.inc 13include disable-devel.inc
12include disable-exec.inc 14include disable-exec.inc