From e934c66dba83d30fbfdbe16c8d64406f6c2e6bd3 Mon Sep 17 00:00:00 2001 From: glitsj16 Date: Tue, 5 Mar 2019 07:06:21 +0000 Subject: Refactor Transmission profiles (#2516) * Harden transmission-cli.profile * Harden transmission-gtk.profile * Harden transmission-qt.profile * Harden transmission-show.profile * Create transmission-create.profile * Create transmission-daemon.profile * Create transmission-edit.profile * Create transmission-remote.profile * Create transmission-remote-cli.profile * Create transmission-remote-gtk.profile * Fix spacing in transmission-remote-cli.profile * Add transmission-daemon to firecfg --- etc/transmission-remote.profile | 44 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 44 insertions(+) create mode 100644 etc/transmission-remote.profile (limited to 'etc/transmission-remote.profile') diff --git a/etc/transmission-remote.profile b/etc/transmission-remote.profile new file mode 100644 index 000000000..7e6f67317 --- /dev/null +++ b/etc/transmission-remote.profile @@ -0,0 +1,44 @@ +# Firejail profile for transmission-remote +# Description: A remote control utility for transmission-daemon (CLI) +# This file is overwritten after every install/update +quiet +# Persistent local customizations +include transmission-remote.local +# Persistent global definitions +include globals.local + +noblacklist ${HOME}/.cache/transmission +noblacklist ${HOME}/.config/transmission + +include disable-common.inc +include disable-devel.inc +include disable-interpreters.inc +include disable-passwdmgr.inc +include disable-programs.inc + +apparmor +caps.drop all +machine-id +net none +nodbus +nodvd +nonewprivs +noroot +nosound +notv +nou2f +novideo +protocol unix +seccomp +shell none +tracelog + +# private-bin transmission-remote +private-dev +private-etc alternatives +private-lib +private-tmp + +memory-deny-write-execute +noexec ${HOME} +noexec /tmp -- cgit v1.2.3-54-g00ecf