aboutsummaryrefslogtreecommitdiffstats
path: root/etc/uudeview.profile
Commit message (Collapse)AuthorAge
* reorganize github etc directoryLibravatar netblue302020-04-21
|
* Replace `nodbus` with dbus-* filtersLibravatar Fred Barclay2020-04-07
| | | | | | | | | | | | | See - 07fac581f6b9b5ed068f4c54a9521b51826375c5 for new dbus filters - https://github.com/netblue30/firejail/pull/3326#issuecomment-610423183 Except for ocenaudio, access/restrictions on dbus options should be unchanged Ocenaudio profile: dbus filters were sandboxed (initially `nodbus` was enabled) since comments indicated blocking dbus meant preferences were broken
* add 'blacklist ${RUNUSER}/wayland-*' to all profi…Libravatar rusty-snake2020-01-18
| | | | …les with 'x11 none'
* Add wusc to more profiles (#3005)Libravatar glitsj162019-10-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add qt/qt4 support to wusc * Add wusc to more profiles * Add wusc to more profiles * Update enchant.profile * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add wusc to more profiles * Add /usr/share/ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc * Add ca-certs to wusc
* use 'x11 none' optionLibravatar smitsohu2019-06-18
| | | | | | | ... instead of just blacklisting the X11 socket. Systematically added to all profiles with 'net none' and 'blacklist /tmp/.X11-unix', and a few more
* hostname reordering (#2740)Libravatar glitsj162019-06-03
| | | | | | * hostname reordering for unzip * hostname reordering for uudeview
* many profile cleanups (2)Libravatar rusty-snake2019-06-02
|
* Streamline Include comment for relevant profiles (#2474)Libravatar glitsj162019-02-25
| | | | | | | | | | | | | | | | | | | | * Streamline include comment for 7z.profile * Streamline include comment for gzip.profile * Streamline include comment for less.profile * Streamline include comment for strings.profile * Streamline include comment for tar.profile * Streamline include comment for unrar.profile * Streamline include comment for unzip.profile * Streamline include comment for uudeview.profile * Streamline include comment for xzdec.profile
* Add alternatives to private-etc for profiles in etc/Libravatar Fred-Barclay2019-02-17
| | | | See discussion in #2399
* Merge pull request #2201 from SkewedZeppelin/u2f-apLibravatar netblue302018-10-17
|\ | | | | Add nou2f to all profiles
| * Add nou2f to all profilesLibravatar Tad2018-10-15
| | | | | | | | - Closes #2194
* | Remove "/etc/firejail/" from all include paths, now that profile_read will ↵Libravatar Glenn Washburn2018-10-17
|/ | | | search for the file.
* Cleanup descriptionsLibravatar Tad2018-08-13
|
* Add descriptions to profiles, pulled from Ubuntu 18.04Libravatar Tad2018-08-13
|
* don't include globals.local twice (take two) (#2010)Libravatar glitsj162018-06-24
| | | | | | | | | | | | | | | | | | | | * avoid including globals.local twice * avoid including globals.local twice * avoid including globals.local twice * avoid including globals.local twice * avoid including globals.local twice * avoid including globals.local twice * avoid including globals.local twice * avoid including globals.local twice * avoid including globals.local twice
* Add private-cache to many profilesLibravatar Tad2018-06-14
| | | | grep "cache" -L $(grep "redirect" -iL $(grep "whitelist" -RL))
* recalibrate dbus access, deploy nodbus optionLibravatar smitsohu2018-03-28
| | | | | | | see #1822 and #1825. also systematically replaces 'blacklist /run/user/*/bus' with 'nodbus'. with contributions from @Fred-Barclay
* disable non-abstract session bus addressLibravatar smitsohu2017-10-22
| | | | | systematically blacklist /run/user/*/bus in all profiles with 'net none'. targets distros like Fedora
* profile enhancements (mostly novideo)Libravatar smitsohu2017-08-29
|
* Fix nodvd placementLibravatar Tad2017-08-13
|
* added nodvd to most profilesLibravatar netblue302017-08-13
|
* Fix notv placementLibravatar Tad2017-08-11
|
* added notv to most profilesLibravatar netblue302017-08-11
|
* Unify all profilesLibravatar Tad2017-08-07
|
* fix quiet in profilesLibravatar netblue302017-06-08
|
* added /etc/firejail/globals.local for global customizationsLibravatar netblue302017-05-23
|
* persistent support for all profile filesLibravatar netblue302017-02-09
|
* fixes #1032Libravatar Fred Barclay2017-01-23
|
* quiet fixLibravatar netblue302016-11-29
|
* squash attempt 2Libravatar Fred-Barclay2016-10-24
|
* removed private-tmp from sysutilsLibravatar netblue302016-10-03
|
* profile cleanupLibravatar netblue302016-09-28
|
* added quiet profile commandLibravatar netblue302016-08-01
|
* Add profile for uudeviewLibravatar Thomas Jarosch2016-07-28
uudeview might access unsafe email content, therefore restrict it as much as possible. In fact it's best to call firejail with a private home dir, too.