| Commit message (Collapse) | Author | Age |
| |
|
| |
|
|
|
|
|
|
| |
* add disable-exec.inc to all profiles with apparmor - #2385 #2505
* drop disable-exec.inc from generic electron.profile
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Update atril.profile
Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
* Revert machine-id comment
|
| |
|
|\
| |
| | |
Add nou2f to all profiles
|
| |
| |
| |
| | |
- Closes #2194
|
|/
|
|
| |
search for the file.
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Use path variable instead of full path when blacklisting devel tools.
* Part 1: blacklist python, perl, ruby, etc in disable-interpreters.inc
* Part 2: allow access to java as needed
* Typo: missing blacklist
* Part 3: allow perl access as needed
* typo
* Add xreader thumbnailer and previewer profiles
* Add xplayer audio-preview and thumbnailer profiles
* Add atril thumbnailer and previewer profiles
* More fixups after adding disable-interpreters.inc
* Blacklist javac
* More javac noblacklisting
* Remove javac from dex2jar, libreoffice, multimc5, and pdfsam profiles
* --nodbus, first draft for #1825
* dbus.c
* rework akonadi integration
the usr.sbin.mysqld-akonadi apparmor profile, enforced by default in ubuntu and
debian testing (and probably opensuse), doesn't play well with a number of firejail options.
the reason for this is that once the no_new_privs bit is set, apparmor profile
transitions are forbidden.
enforcing our own apparmor policy instead is also no solution, because
these programs don't even start without d-bus.
relaxing the kmail profile was necessary so that kmail can fire up akonadi itself,
just in case akonadi has not been started earlier already by another program.
this is always an issue when kmail is the only installed akonadi client, but
there may be more circumstances. for reasons outlined above this doesn't help
debian and ubuntu (opensuse?) users though :-/
a brief summary of the seccomp exceptions: chroot is needed for qt webengine,
io_prioset for the akonadi indexing agent, io_getevents, io_submit, io_setup
are needed for mysqld. when akonadi has an sqlite3 backend, less exceptions
to the seccomp filter are necessary, but mysqld is the default.
in the future all kontact suite profiles (itm only kmail, knotes) should
probably be redirections to akonadi_control, but the issues with apparmor
make this somewhat impractical for now (options like 'protocol' couldn't go to
akonadi_control.local any more, if current kmail redirected to there).
* Add nodbus to some profiles - part 1
* Spotify works with nodbus on Arch
* Enable nodbus for keepassx and keepassxc profiles.
I've tested on keepassxc but should work for keepassx as well. Settings are not immutable.
* recalibrate dbus access, deploy nodbus option
see #1822 and #1825. also systematically replaces
'blacklist /run/user/*/bus' with 'nodbus'.
with contributions from @Fred-Barclay
* various blacklist additions
* Add a profile for ncdu, enable private-etc in Steam again, and fixup gnome-recipes
* comment nodbus where it interferes with dconf
pending further discussion
* Add a disabled and extensive private-bin for Steam
* Further improve private-bin in steam
* comment apparmor, net where they interfere with dconf - #1843
* gnome-calculator fixup
* spectre support for clang compiler
* spectre clang support
* enable/disable dbus handling in /etc/firejail/firejail.config
* nodbus man pages, etc.
* redirect knotes to kmail, some tweaks
* testing
* gimp fixup
* Even more fixups after adding disable-interpreters.inc
* AWS and GCP store credentials in local directories as part of project setup.
Configuration for cloud providers is sensitive information; it should be
in the default block list. I didn't see profiles for gcloud or awscli,
so haven't added any exclusions.
boto and kubectl are not provider-specific, but also store credentials for
whichever platforms they happen to be being used with.
* testing
* consolidate makefiles
* gitignore
* Use path variable instead of full path when blacklisting devel tools.
* Part 1: blacklist python, perl, ruby, etc in disable-interpreters.inc
* Part 2: allow access to java as needed
* Typo: missing blacklist
* Part 3: allow perl access as needed
* typo
* More fixups after adding disable-interpreters.inc
* Blacklist javac
* More javac noblacklisting
* Remove javac from dex2jar, libreoffice, multimc5, and pdfsam profiles
* Cleanup rebase leftovers
* imagej doesn't need javac access
* Add cc to blacklisted compilers
* Use wildcards when blacklisting some gcc paths
* Blacklist lua in disable-interpreters
* Correct blacklist for node.js
* Fred Barclay note: some of these commits (all of the ones that don't affect files inside etc/) aren't mine but were added during a rebase + squash
|
|
|
|
|
|
|
| |
see #1822 and #1825. also systematically replaces
'blacklist /run/user/*/bus' with 'nodbus'.
with contributions from @Fred-Barclay
|
| |
|
| |
|
|
|
|
| |
fixes registration of d-bus services, closes #1391
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
Without it, recent okular versions (here 17.12.0-1 on Arch Linux) crash with
mprotect failed in ExecutableAllocator::makeExecutable: Permission denied
due to the noexec constraints in the firejail profile.
|
| |
|
| |
|
| |
|
|
|
| |
# 1629
|
|
|
| |
#1629
|
|
|
|
|
| |
and whitelist kioslaverc because we don't know if kdeinit
will run outside or inside the sandbox.
|
| |
|
|
|
|
|
|
|
| |
* okular needs kdeinit4 for open file dialog since recently
* memory-deny-write-execute should be a safe addition for
desktop use of dnscrypt and unbound
* cleanup works
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* add novideo
* add novideo
* add novideo
* put noexec last
* blacklist Clementine configuration and database
* blacklist Clementine configuration and database
* add novideo
* add novideo, permit access to ~/.java
* add novideo
* spoof machine-id
* mimeapps.list is already in whitelist-common.inc
* ~/.local/share/applications is already read-only
see disable-common.inc
* mimeapps.list is already in whitelist-common.inc
* ~/.local/share/applications is already read-only
see disable-common.inc
* drop machine-id option
private-etc hides it anyway
|
| |
|
| |
|
|
|
|
| |
See https://github.com/netblue30/firejail/pull/1367#issuecomment-315793729
|
|
|
|
|
|
|
|
| |
- Added 'disable-devel.conf' to many profiles
- Added 'disable-mnt' to many profiles
- Added 'noexec' to many profiles
- Removed 'netfilter' and 'net none' from profiles with 'protocol unix'
- Cleaned up profiles using defaults
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* okular private-bin update
confirmed that lpr is required for printing, as suggested in #421
* update gwenview private-bin
only for KDE4 builds, patch is not necessary for recent gwenview versions
* blacklist baloo
* update blacklist (okular)
* update noblacklist
* update noblacklist (okular)
* tidy up
* update noblacklist/whitelist (okular)
* update blacklist (k3b)
* uncomment private-bin, shell none
|
|
|
|
|
|
|
|
|
|
| |
* update noblacklist
* blacklist local plasma overrides, plasmoids
* add more KDE configuration (kdeglobals, plasmoids)
* kdeglobals now in disable-common.inc
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* private-dev breaks playing CDs
* reenable services
* blacklist kservices5 folder
* blacklist nautilus scripts
* blacklist ~/.kde4 files, k3b config, nautilus/nemo
* sort
* update noblacklisting
* update blacklisting
* update blacklisting/whitelisting (okular)
|
| |
|
| |
|
| |
|
|
|
| |
Gives Okular read-only access to kdeglobals file to fix theme issue
|
| |
|
| |
|
| |
|