aboutsummaryrefslogtreecommitdiffstats
path: root/etc/gnome-logs.profile
Commit message (Collapse)AuthorAge
* reorganize github etc directoryLibravatar netblue302020-04-21
|
* Replace `nodbus` with dbus-* filtersLibravatar Fred Barclay2020-04-07
| | | | | | | | | | | | | See - 07fac581f6b9b5ed068f4c54a9521b51826375c5 for new dbus filters - https://github.com/netblue30/firejail/pull/3326#issuecomment-610423183 Except for ocenaudio, access/restrictions on dbus options should be unchanged Ocenaudio profile: dbus filters were sandboxed (initially `nodbus` was enabled) since comments indicated blocking dbus meant preferences were broken
* Whitelist runuser common (#3286)Libravatar rusty-snake2020-03-31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * introduce whitelist-runuser-common.inc * If an applications does not need a whitelist it can/should be nowhitelisted. Example: nowhitelist ${RUNUSER}/pulse include whitelist-runuser-common.inc * ${RUNUSER}/bus is inaccessible with nodbus regardless of the whitelist. (as it should) * strange wayland setups with an second wayland-compostior need to whitelist ${RUNUSER}/wayland-1, ${RUNUSER}/wayland-2 and so on. * some display-manager store there Xauthority file in ${RUNUSER}. test results with fedora 31: - ssdm: ~/.Xauthority is used - lightdm: /run/lightdm/USER/Xauthority - gdm: /run/user/UID/gdm/Xauthority * IMPORTANT: ATM we can only enable this for non-graphical and GTK3 programs because mutter (GNOMEs window-manger) stores the Xauthority file for Xwayland under /run/user/UID/.mutter-Xwaylandauth.XXXXXX where XXXXXX is random. Until we have whitelist globbing we can't whitelist this file. QT/KDE and other toolkits without full wayland support won't be able to start. * wru update 1 - add wru to more profiles. - blacklist ${RUNUSER} works for the most cli programs too. * add wruc to more profiles * fixes * fixes * wruc: hide pulse pid * update * remove wruc from all the x11 profiles * fixes * fix ordering * read-only * revert read-only * update *
* add tracelog to some profilesLibravatar rusty-snake2019-10-13
|
* whitelist-usr-share-common.inc (#2972)Libravatar rusty-snake2019-10-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Work on whitelist-usr-share-common * sorting; add Modules + QT/KDE stuff * add wusc.inc to more profiles [needs testing] * update * gitg, firefox, evince * /usr/share/{p11-kit,pixmaps,pki,qt5,tcl8.6,terminfo} * more profiles * remove wusc.inc from feedreader Even with 'whitelist /usr/share/*', feedreader trys to dereference a NULL pointer. * more profiles * whitelist /usr/share breaks wget even with whitelist /usr/share/* * extend wusc.inc * update * Add alsa,crypto-policies and zoneinfo * readd wusc.inc to wget and feedreader * update * testing results: Debian Buster with KDE * more KDE stuff * fix tb
* Comment fixes (#2674)Libravatar glitsj162019-05-02
| | | | | | | | | | * Fix comments in eom.profile * Fix comments in eog.profile * Fix comments in gnome-system-log.profile * Fix comments in gnome-logs.profile
* Fix gnome-logs.profile (#2630)Libravatar rusty-snake2019-03-31
| | | | | | * Fix gnome-logs.profile * supplemented comment for using gnome-logs.local
* add disable-exec.inc to all profiles with apparmor (#2576)Libravatar smitsohu2019-03-12
| | | | | | * add disable-exec.inc to all profiles with apparmor - #2385 #2505 * drop disable-exec.inc from generic electron.profile
* Harden gnome-logs.profile (#2461)Libravatar glitsj162019-02-24
|
* Add alternatives to private-etc for profiles in etc/Libravatar Fred-Barclay2019-02-17
| | | | See discussion in #2399
* Merge pull request #2201 from SkewedZeppelin/u2f-apLibravatar netblue302018-10-17
|\ | | | | Add nou2f to all profiles
| * Add nou2f to all profilesLibravatar Tad2018-10-15
| | | | | | | | - Closes #2194
* | Remove "/etc/firejail/" from all include paths, now that profile_read will ↵Libravatar Glenn Washburn2018-10-17
|/ | | | search for the file.
* Cleanup descriptionsLibravatar Tad2018-08-13
|
* Add descriptions to profiles, pulled from Ubuntu 18.04Libravatar Tad2018-08-13
|
* Initial adding of disable-xdg.incLibravatar Tad2018-07-24
|
* globbing support in private-libLibravatar netblue302018-05-25
|
* add note for 'volatile' staorage supportLibravatar glitsj162018-05-04
|
* add disable-interpreters.inc to gnome-logs (#1923)Libravatar glitsj162018-05-03
| | | | | | | | * add disable-interpreters.inc to gnome-logs Besides adding `include /etc/firejail/disable-interpreters.inc`, enabling both `private-etc` and `private-lib` (tested with systemd default storage and volatile journal). * Add localtime to private-etc
* Cleanup gnome-logsLibravatar Tad2018-04-01
|
* Fixup gnome-logsLibravatar Tad2018-04-01
|
* Create gnome-logs.profileLibravatar glitsj162018-04-01
New profile. A few harmless warnings do show, but nothing that doesn't also show without firejail.