aboutsummaryrefslogtreecommitdiffstats
path: root/etc/akonadi_control.profile
Commit message (Collapse)AuthorAge
* redirect knotes to kmail, some tweaksLibravatar smitsohu2018-03-30
|
* rework akonadi integrationLibravatar smitsohu2018-03-26
| | | | | | | | | | | | | | | | | | | | | | | | | | the usr.sbin.mysqld-akonadi apparmor profile, enforced by default in ubuntu and debian testing (and probably opensuse), doesn't play well with a number of firejail options. the reason for this is that once the no_new_privs bit is set, apparmor profile transitions are forbidden. enforcing our own apparmor policy instead is also no solution, because these programs don't even start without d-bus. relaxing the kmail profile was necessary so that kmail can fire up akonadi itself, just in case akonadi has not been started earlier already by another program. this is always an issue when kmail is the only installed akonadi client, but there may be more circumstances. for reasons outlined above this doesn't help debian and ubuntu (opensuse?) users though :-/ a brief summary of the seccomp exceptions: chroot is needed for qt webengine, io_prioset for the akonadi indexing agent, io_getevents, io_submit, io_setup are needed for mysqld. when akonadi has an sqlite3 backend, less exceptions to the seccomp filter are necessary, but mysqld is the default. in the future all kontact suite profiles (itm only kmail, knotes) should probably be redirections to akonadi_control, but the issues with apparmor make this somewhat impractical for now (options like 'protocol' couldn't go to akonadi_control.local any more, if current kmail redirected to there).
* fix akonadi_control, enable it in firecfg for a better defaultLibravatar smitsohu2018-03-24
|
* cleanupLibravatar smitsohu2018-03-24
|
* add basic akonadi integrationLibravatar smitsohu2018-03-24
as it is now, there is no support for a full akonadi session inside the knotes sandbox, but knotes can connect to akonadi and should work fine