aboutsummaryrefslogtreecommitdiffstats
path: root/etc/chromium-common.profile
Commit message (Collapse)AuthorAge
* reorganize github etc directoryLibravatar netblue302020-04-21
|
* Browsers: private-dev conditional with BROWSER_DISABLE_U2FLibravatar rusty-snake2020-01-21
| | | | see also #3170
* Streamline redirect profiles (follow-up) (#2803)Libravatar glitsj162019-06-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Streamline redirect profiles (2) * Streamline redirect profiles (2) * Streamline redirect profiles (2) * Streamline redirect profiles (2) * Streamline redirect profiles (2) * Streamline redirect profiles (2) * Streamline redirect profiles (2) * Streamline redirect profiles (2) * Streamline redirect profiles (3) * Streamline redirect profiles (3) * Streamline redirect profiles (3) * Streamline redirect profiles (3) * Streamline redirect profiles (3) * Streamline redirect profiles (3) * Streamline redirect profiles (3)
* chromium-common profile: add nodbus conditionalLibravatar smitsohu2019-06-16
|
* Sort caps.keep and seccomp.drop options (#2780)Libravatar glitsj162019-06-16
| | | | | | | | | | | | * Sort seccomp.drop in unbound.profile * Sort caps.keep in tor.profile * Sort seccomp.drop in qgjs.profile * Sort seccomp.drop in dnscrypt-proxy.profile * Sort caps.keep in chromium-common.profile
* chromium: disable nodbusLibravatar Vincent432019-06-15
| | | | | | | | | | | Unfortunately nodbus prevents access to site passwords if they are stored in GNOME Keyring[1]. According to docs chromium can store password in 3 different ways: GNOME Keyring KWallet 4 plain text As KWallet storage may be broken in a same way, using nodbus will force chromium to store passwords in plain text which isn't best option for security and for firejail default. [1] https://wiki.gnome.org/Projects/GnomeKeyring [2] https://chromium.googlesource.com/chromium/src.git/+/master/docs/linux_password_storage.md
* Add a conditional to control DRM/noexec exception for browsersLibravatar Tad2019-04-13
|
* add disable-exec.inc to all profiles with apparmor (#2576)Libravatar smitsohu2019-03-12
| | | | | | * add disable-exec.inc to all profiles with apparmor - #2385 #2505 * drop disable-exec.inc from generic electron.profile
* Add '$HOME/.local/share/pki' to blacklistLibravatar Vincent432019-02-03
| | | | | Since nss 3.42, '$HOME/.local/share/pki' is supported dir for storing certs https://hg.mozilla.org/projects/nss/rev/da45424cb9a0b4d8e45e5040e2e3b574d994e254
* remove noexec home from chromium-based browsersLibravatar netblue302019-02-02
|
* Add new config option to disable U2F in browsers, enabled by defaultLibravatar Tad2018-11-05
|
* Merge pull request #2201 from SkewedZeppelin/u2f-apLibravatar netblue302018-10-17
|\ | | | | Add nou2f to all profiles
| * Add nou2f to all profilesLibravatar Tad2018-10-15
| | | | | | | | - Closes #2194
* | Remove "/etc/firejail/" from all include paths, now that profile_read will ↵Libravatar Glenn Washburn2018-10-17
|/ | | | search for the file.
* Add warning that nodbus + blacklist of python3 breaks Gnome connector (see ↵Libravatar ಚಿರಾಗ್ ನಟರಾಜ್2018-07-11
| | | | #2026)
* avoid including globals.local more than onceLibravatar glitsj162018-06-20
| | | Fixes https://github.com/netblue30/firejail/issues/2006
* WIP: Blacklist common programming interpreters. (#1837)Libravatar Fred Barclay2018-04-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Use path variable instead of full path when blacklisting devel tools. * Part 1: blacklist python, perl, ruby, etc in disable-interpreters.inc * Part 2: allow access to java as needed * Typo: missing blacklist * Part 3: allow perl access as needed * typo * Add xreader thumbnailer and previewer profiles * Add xplayer audio-preview and thumbnailer profiles * Add atril thumbnailer and previewer profiles * More fixups after adding disable-interpreters.inc * Blacklist javac * More javac noblacklisting * Remove javac from dex2jar, libreoffice, multimc5, and pdfsam profiles * --nodbus, first draft for #1825 * dbus.c * rework akonadi integration the usr.sbin.mysqld-akonadi apparmor profile, enforced by default in ubuntu and debian testing (and probably opensuse), doesn't play well with a number of firejail options. the reason for this is that once the no_new_privs bit is set, apparmor profile transitions are forbidden. enforcing our own apparmor policy instead is also no solution, because these programs don't even start without d-bus. relaxing the kmail profile was necessary so that kmail can fire up akonadi itself, just in case akonadi has not been started earlier already by another program. this is always an issue when kmail is the only installed akonadi client, but there may be more circumstances. for reasons outlined above this doesn't help debian and ubuntu (opensuse?) users though :-/ a brief summary of the seccomp exceptions: chroot is needed for qt webengine, io_prioset for the akonadi indexing agent, io_getevents, io_submit, io_setup are needed for mysqld. when akonadi has an sqlite3 backend, less exceptions to the seccomp filter are necessary, but mysqld is the default. in the future all kontact suite profiles (itm only kmail, knotes) should probably be redirections to akonadi_control, but the issues with apparmor make this somewhat impractical for now (options like 'protocol' couldn't go to akonadi_control.local any more, if current kmail redirected to there). * Add nodbus to some profiles - part 1 * Spotify works with nodbus on Arch * Enable nodbus for keepassx and keepassxc profiles. I've tested on keepassxc but should work for keepassx as well. Settings are not immutable. * recalibrate dbus access, deploy nodbus option see #1822 and #1825. also systematically replaces 'blacklist /run/user/*/bus' with 'nodbus'. with contributions from @Fred-Barclay * various blacklist additions * Add a profile for ncdu, enable private-etc in Steam again, and fixup gnome-recipes * comment nodbus where it interferes with dconf pending further discussion * Add a disabled and extensive private-bin for Steam * Further improve private-bin in steam * comment apparmor, net where they interfere with dconf - #1843 * gnome-calculator fixup * spectre support for clang compiler * spectre clang support * enable/disable dbus handling in /etc/firejail/firejail.config * nodbus man pages, etc. * redirect knotes to kmail, some tweaks * testing * gimp fixup * Even more fixups after adding disable-interpreters.inc * AWS and GCP store credentials in local directories as part of project setup. Configuration for cloud providers is sensitive information; it should be in the default block list. I didn't see profiles for gcloud or awscli, so haven't added any exclusions. boto and kubectl are not provider-specific, but also store credentials for whichever platforms they happen to be being used with. * testing * consolidate makefiles * gitignore * Use path variable instead of full path when blacklisting devel tools. * Part 1: blacklist python, perl, ruby, etc in disable-interpreters.inc * Part 2: allow access to java as needed * Typo: missing blacklist * Part 3: allow perl access as needed * typo * More fixups after adding disable-interpreters.inc * Blacklist javac * More javac noblacklisting * Remove javac from dex2jar, libreoffice, multimc5, and pdfsam profiles * Cleanup rebase leftovers * imagej doesn't need javac access * Add cc to blacklisted compilers * Use wildcards when blacklisting some gcc paths * Blacklist lua in disable-interpreters * Correct blacklist for node.js * Fred Barclay note: some of these commits (all of the ones that don't affect files inside etc/) aren't mine but were added during a rebase + squash
* recalibrate dbus access, deploy nodbus optionLibravatar smitsohu2018-03-28
| | | | | | | see #1822 and #1825. also systematically replaces 'blacklist /run/user/*/bus' with 'nodbus'. with contributions from @Fred-Barclay
* Move apparmor option to the top of the options list in all profilesLibravatar Tad2018-03-17
|
* enable apparmor for all firefox and chromium based browsers; enable apparmor ↵Libravatar netblue302018-02-19
| | | | for tranamission-gtk and transmission-qt
* Unify all Chromium and Firefox based browser profiles as part of #1773Libravatar Tad2018-02-11
|
* opera profile reworkLibravatar netblue302015-12-01
|
* create chromium-common.profileLibravatar avoidr2015-12-01