aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAge
...
* | Update READMELibravatar glitsj162021-01-08
| |
* | Update README.mdLibravatar glitsj162021-01-08
| |
* | Add profile for npm (#3866)Libravatar Aidan Gauland2021-01-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Add profile for npm * Apply suggestions from code review * Remove redundant blacklisting of Wayland. * Remove unnecessary noblacklist lines for nodejs. * Replace absolute paths to .inc files with filenames. * Remove unneeded dbus whitelisting. Co-authored-by: rusty-snake <41237666+rusty-snake@users.noreply.github.com> * Remove empty line To keep consistent with other profiles, remove the blank line after the header comment. Co-authored-by: rusty-snake <41237666+rusty-snake@users.noreply.github.com> * Add npm files to add-common-devel So that our addition of npm paths to disable-programs.inc dose not break IDEs, we need to unblacklist these same paths in allow-common-devel.inc. * Remove extra blank line * Add common whitelist includes to npm profile * Tighten npm profile Include disable-exec.inc, but allowing ${HOME}. * Remove whitelist-common.inc from npm profile whitelist-common breaks npm, and since we don't know where the user's npm projects will be, leave the whitelist-common include in a comment with a note about how to enable it for their setup. * Fix inverted commands Co-authored-by: rusty-snake <41237666+rusty-snake@users.noreply.github.com> * Fixes for whitelisting * Add login.defs to npm profile's private-etc Co-authored-by: Aidan Gauland <aidalgol+git@fastmail.net> Co-authored-by: rusty-snake <41237666+rusty-snake@users.noreply.github.com>
* | fbuilder: check Yama permissionsLibravatar smitsohu2021-01-08
| | | | | | | | closes #3237
* | fbuilder: whitelist-common.inc processingLibravatar smitsohu2021-01-08
| |
* | simplify clean_pathname functionLibravatar smitsohu2021-01-08
| |
* | electron redirect fixes (#3875)Libravatar glitsj162021-01-07
| | | | | | | | | | * drop doubled netfilter in atom.profile * drop doubled disable-mnt in tutanota-desktop.profile
* | harden liferea (#3873)Libravatar glitsj162021-01-06
| | | | | | | | | | | | | | * harden liferea * dbus fixes On closer investigation it seems wiser to tighten D-Bus filtering as Liferea implements stuff via plugins that are disabled by default.
* | mount private-lib directories read-onlyLibravatar smitsohu2021-01-06
| | | | | | | | avoids creating holes in the basic read-only filesystem
* | join: misc improvementsLibravatar smitsohu2021-01-06
| | | | | | | | | | | | | | | | | | * don't mess with umask of root, it could be more strict than user umask and relaxing it may catch root by surprise * join needs execveat syscall, need to drop it post-exec * make things more explicit
* | fix preview in apostropheLibravatar rusty-snake2021-01-05
| |
* | new profile: tutanota-desktop (#3870)Libravatar glitsj162021-01-05
| | | | | | | | | | | | | | | | | | * new profile: tutanota-desktop * add tutanota-desktop to firecfg * blacklist tutanota-desktop files * Create tutanota-desktop.profile
* | drop doubled disable-exec in signal-desktop (#3869)Libravatar glitsj162021-01-05
|/
* fix #3859 (#3863)Libravatar glitsj162021-01-01
| | | | | | | * fix #3859 * fix #3859 * fix #3859
* really fix running kernel config check (#3859)Libravatar glitsj162020-12-31
| | | | | | | | | | | | | * really fix running kernel config check archiver-common.inc includes `disable-shell.inc`, breaking $ zcat /proc/config.gz Cannot start application: Permission denied * really fix running kernel config check archiver-common.inc includes `disable-shell.inc`, breaking $ zgrep -c "CONFIG_USER_NS=y" /proc/config.gz Cannot start application: Permission denied
* Merge pull request #3760 from kmk3/fix-keepassxcLibravatar netblue302020-12-30
|\ | | | | keepassxc.profile: Fix hang due to seccomp
| * keepassxc.profile: Fix hang due to seccompLibravatar Kelvin M. Klann2020-11-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | With the current profile, keepassxc hangs on startup, before showing the main window: $ uname -r -m 5.9.1-artix1-1 x86_64 $ firejail --version | head -n 1 firejail version 0.9.64 $ firejail --quiet keepassxc --version KeePassXC 2.6.2 $ firejail --quiet keepassxc # (nothing happens) ^C Seccomp debugging as explained on etc/templates/syscalls.txt: $ sudo grep -Eo 'keepassxc.* syscall=[0-9]+' /var/log/messages.log | tail -n 1 keepassxc" exe="/usr/bin/keepassxc" sig=31 arch=c000003e syscall=303 $ firejail --debug-syscalls | grep 303 303 - name_to_handle_at So allow the name_to_handle_at syscall. Relates to #3549.
* | Merge pull request #3850 from smitsohu/smitsohu-shellLibravatar netblue302020-12-30
|\ \ | | | | | | join: add fexecve fallback for shells
| * | join: add fexecve fallback for shellsLibravatar smitsohu2020-12-29
| | | | | | | | | | | | | | | | | | | | | | | | Allows users to join a sandbox and get a shell even if there is none in the sandbox mount namespace. There are few limitations: 1. This will fail with scripted shells (see man 3 fexecve for an explanation) 2. Shell process names are not user friendly
* | | Merge pull request #3852 from rusty-snake/fix-3846Libravatar netblue302020-12-30
|\ \ \ | | | | | | | | Implement netns in profiles, closes #3846
| * | | Implement netns in profiles, closes #3846Libravatar rusty-snake2020-12-29
| | | |
* | | | Merge pull request #3848 from bbhtt/browsersLibravatar Reiner Herrmann2020-12-30
|\ \ \ \ | | | | | | | | | | Add profiles for MS Edge dev build for Linux and Librewolf
| * \ \ \ Merge branch 'master' into browsersLibravatar Reiner Herrmann2020-12-29
| |\ \ \ \ | |/ / / / |/| | | |
* | | | | Merge pull request #3847 from bbhtt/small_fixesLibravatar Reiner Herrmann2020-12-29
|\ \ \ \ \ | | | | | | | | | | | | Small fixes
| * | | | | Put a comment about dbus rules and comment themLibravatar bbhtt2020-12-29
| | | | | |
| * | | | | Fix Nheko cache directoryLibravatar bbhtt2020-12-28
| | | | | |
| * | | | | Add dbus rulesLibravatar bbhtt2020-12-28
| | | | | |
| * | | | | Add whitelists, remove wrong cache whitelist, add dbus rules, apparmorLibravatar bbhtt2020-12-28
| | | | | |
| * | | | | Add quietLibravatar bbhtt2020-12-28
| | | | | |
| * | | | | Calls each program from /bin to populate listLibravatar bbhtt2020-12-28
| | | | | |
| * | | | | Add secret storage dbusLibravatar bbhtt2020-12-28
| | | | | |
* | | | | | profiles: add redirect from matrix-mirage to mirage (#3854)Libravatar Reiner Herrmann2020-12-29
| | | | | |
* | | | | | manpage: /bin/bash -> user's perferred shellLibravatar rusty-snake2020-12-29
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We do not start /bin/bash in the sandbox, we use $SHELL (which is usually /bin/bash). See #3434 and #3844. This commit updates the manpage accordingly until #3434 is resolved with a final solution like using /bin/bash or /bin/sh as hardcoded default. Close #3844. The descriptions of --join* are not updated as there is currenly some work, see #2934 and #3850.
* | | | | | Update keepassxc.profile dbus commentsLibravatar rusty-snake2020-12-29
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - split notifications and tray - fix tray policy
* | | | | | cleanupLibravatar smitsohu2020-12-28
|/ / / / / | | | | | | | | | | case is handled in guess_shell()
| * | | | On Debian/Ubunbtu microsoft-edge redirects to dev-channel right nowLibravatar bbhtt2020-12-29
| | | | |
| * | | | Add profiles for MS Edge dev build for Linux and LibrewolfLibravatar bbhtt2020-12-28
|/ / / /
* | | | shell autoselection fixupLibravatar smitsohu2020-12-22
| | | |
* | | | rework previous commit 45c28b808df9529aca32fdd755ac14e8101af3c1Libravatar smitsohu2020-12-22
| | | |
* | | | noroot option: create mapping of firejail groupLibravatar smitsohu2020-12-21
| | | | | | | | | | | | | | | | | | | | issue #3604 follow-up to a7607e423f3336f67daf2ec296414d55c6740f84
* | | | fix forwarding of login option to restricted shellLibravatar smitsohu2020-12-21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If firejail is the login shell, the SHELL environment variable is set to the path of the firejail executable. This leads to execution of a 'firejail -l' command, but firejail inside the sandbox does not know what to do with the -l option and just starts bash without forwarding this option. Fix this by not checking $SHELL when guessing which shell should be used. run_no_sandbox(), which relies on reading the environment, runs before setting the login_shell variable, and is not affected.
* | | | add mac multicast address check to profile_check_lineLibravatar smitsohu2020-12-21
| | | | | | | | | | | | | | | | | | | | issue #3784 related commit 4bc92b8fd0a5c22c7d4c6f9323378501c60ff149
* | | | minor cleanup, cosmeticsLibravatar smitsohu2020-12-21
|/ / /
* | | remove trailing whitespacesLibravatar rusty-snake2020-12-21
| | |
* | | brave: enable wruc and wuscLibravatar rusty-snake2020-12-21
| | |
* | | move whlist /usr/share/chromium from chomium-comm…Libravatar rusty-snake2020-12-21
| | | | | | | | | | | | | | | | | | | | | | | | …on to chromium, remove the nowhlist from min and its whlist from riot-web. TODO: remove the 'ignore whitelist /usr/share/chomium' from the most profiles with it.
* | | new profile: servoLibravatar rusty-snake2020-12-21
| | |
* | | Merge pull request #3839 from rusty-snake/fix-3838Libravatar smitsohu2020-12-21
|\ \ \ | | | | | | | | x11=none: don't fail on abstract socket if netns …
| * | | x11=none: don't fail on abstract socket if netns …Libravatar rusty-snake2020-12-19
| | | | | | | | | | | | | | | | | | | | | | | | …is used. fix #3838 -- --x11=none --netns=isolated invalidly errors on the abstract X11 socket being accessible
* | | | increase verbosity if masking ~/.config/pulse failsLibravatar smitsohu2020-12-21
| | | | | | | | | | | | | | | | plus very minor cosmetic improvements