aboutsummaryrefslogtreecommitdiffstats
path: root/etc
Commit message (Collapse)AuthorAge
* starting 0.9.62.2, included profile-fixes.patch and apparmor-include.patch ↵Libravatar netblue302020-08-07
| | | | from Debian sid (firejail 0.9.62-3)
* Add appimage fix to electrum.profile0.9.62Libravatar glitsj162019-12-29
|
* Update private-bin in tar.profileLibravatar glitsj162019-12-26
|
* Add login.defs to private-etcLibravatar glitsj162019-12-26
|
* Fix private-lib in gconf.profileLibravatar glitsj162019-12-25
|
* Create ephemeral.profileLibravatar glitsj162019-12-24
|
* Add description in 7zr.profileLibravatar glitsj162019-12-24
|
* Add description in 7za.profileLibravatar glitsj162019-12-24
|
* Add description to 7z.profileLibravatar glitsj162019-12-24
|
* Update description in p7zip.profileLibravatar glitsj162019-12-24
|
* Update brave.profile to support native sandboxingLibravatar glitsj162019-12-21
|
* Support Brave's native sandboxingLibravatar glitsj162019-12-21
|
* Fix comments in thunderbird.profileLibravatar glitsj162019-12-21
|
* Create brave-browser-stable.profileLibravatar glitsj162019-12-21
|
* Create brave-browser-nightly.profileLibravatar glitsj162019-12-21
|
* Create brave-browser-dev.profileLibravatar glitsj162019-12-21
|
* Create brave-browser-beta.profileLibravatar glitsj162019-12-21
|
* Create znew.profileLibravatar glitsj162019-12-21
|
* Create zmore.profileLibravatar glitsj162019-12-21
|
* Create zless.profileLibravatar glitsj162019-12-21
|
* Create zgrep.profileLibravatar glitsj162019-12-21
|
* Create zforce.profileLibravatar glitsj162019-12-21
|
* Create zfgrep.profileLibravatar glitsj162019-12-21
|
* Create zegrep.profileLibravatar glitsj162019-12-21
|
* Create zdiff.profileLibravatar glitsj162019-12-21
|
* Create zcmp.profileLibravatar glitsj162019-12-21
|
* Create zcat.profileLibravatar glitsj162019-12-21
|
* Create uncompress.profileLibravatar glitsj162019-12-21
|
* Create gzexe.profileLibravatar glitsj162019-12-21
|
* fix seahorse-toolLibravatar rusty-snake2019-12-21
| | | | | squashed: Fix private-etc ordering in seahorse-tool Thanks to @glitsj16 for this fixup
* Fix Brave's native sandbox (#3087)Libravatar glitsj162019-12-21
| | | | | | | | | | * Allow user access to /proc/config.gz * Fix Brave's native sandbox * Move /proc/config.gz to disable-common.inc * Move /proc/config.gz to disable-common.inc
* wine: enable allow-debuggers by default - #446Libravatar smitsohu2019-12-11
|
* gpg additions (#3077)Libravatar glitsj162019-12-10
| | | | | | | | * Add 'quiet' to gpg.profile * Add 'quiet' to gpg-agent.profile * Create gpg2.profile
* Fix DeVeDe-NG exportLibravatar rusty-snake2019-12-06
| | | | It is better to comment wusc in ffmpeg?
* fix braseroLibravatar rusty-snake2019-12-06
|
* Merge pull request #3065 from the-antz/profile-thunderbird-waylandLibravatar smitsohu2019-12-03
|\ | | | | Minor profile tweaks.
| * Minor profile tweaks.Libravatar Antz2019-11-26
| | | | | | | | thunderbird-wayland profile did not include thunderbird-wayland.local
* | libreoffice aliasenLibravatar rusty-snake2019-11-28
| |
* | Fix profile: ffmpeg (#3064)Libravatar the-antz2019-11-27
|/ | | Fix broken libx265 encoding (needs the set_mempolicy syscall).
* blacklist /tmp/.X11-unix in gist.profileLibravatar glitsj162019-11-25
| | | Thanks to @rusty-snake for requesting this in https://github.com/netblue30/firejail/pull/3061.
* Add redirect profile for gist-paste (#3062)Libravatar glitsj162019-11-25
|
* Add new profile: gist (#3061)Libravatar glitsj162019-11-25
| | | | | | | | | | | | * Create gist.profile * Add gist config to disable-programs.inc * Add gist to firecfg.config * Update RELNOTES * Update README.md
* blacklist gksu, gksudo, kdesudoLibravatar rusty-snake2019-11-25
|
* various fixupsLibravatar rusty-snake2019-11-25
|
* apparmor: misc fix for pcscdLibravatar Vincent432019-11-24
|
* apparmor: don't allow mounts and paths manipulationLibravatar Vincent432019-11-24
| | | | | | | | | | | | | AppArmor security relies on path based rules and rewriting paths may allow to bypass them. Those actions are priveliged so vast majority of apps shouldn't need them anyway. If some app need those rules then it's better to consider them as unsuitable for apparmor option rather than weaken generic profile for all apps. See related issue reported by apparmor usage in snap: https://bugs.launchpad.net/snapd/+bug/1791711
* apparmor: allow access to pcscd socket (smartcards)Libravatar Vincent432019-11-24
|
* Add new profile: unf (#3060)Libravatar glitsj162019-11-24
| | | | | | * Create unf.profile * Add unf to firecfg.config
* Add new profile: gmpc (#3059)Libravatar glitsj162019-11-24
| | | | | | | | * Create gmpc.profile * Add gmpc config to disable-programs.inc * Add gmpc to firecfg.config
* Add new profile: drawio (#3058)Libravatar glitsj162019-11-24
| | | | | | | | * Create drawio.profile * Add drawio config to disable-programs.inc * Add drawio to firecfg.config