# Firejail profile for chromium-common # This file is overwritten after every install/update # Persistent local customizations include chromium-common.local # Persistent global definitions # added by caller profile #include globals.local # noexec ${HOME} breaks DRM binaries. ?BROWSER_ALLOW_DRM: ignore noexec ${HOME} noblacklist ${HOME}/.local/share/pki noblacklist ${HOME}/.pki noblacklist /usr/lib/chromium/chrome-sandbox # Add the next line to your chromium-common.local if you want Google Chrome/Chromium browser # to have access to Gnome extensions (extensions.gnome.org) via browser connector #include allow-python3.inc mkdir ${HOME}/.local/share/pki mkdir ${HOME}/.pki whitelist ${HOME}/.local/share/pki whitelist ${HOME}/.pki whitelist /usr/share/mozilla/extensions whitelist /usr/share/webext include whitelist-run-common.inc # If your kernel allows the creation of user namespaces by unprivileged users # (for example, if running `unshare -U echo enabled` prints "enabled"), you # can add the next line to your chromium-common.local. #include chromium-common-hardened.inc.profile ?BROWSER_DISABLE_U2F: nou2f ?BROWSER_DISABLE_U2F: private-dev #private-tmp # issues when using multiple browser sessions blacklist ${PATH}/curl blacklist ${PATH}/wget blacklist ${PATH}/wget2 # This prevents access to passwords saved in GNOME Keyring and KWallet, also # breaks Gnome connector. #dbus-user none # The file dialog needs to work without d-bus. ?HAS_NODBUS: env NO_CHROME_KDE_FILE_DIALOG=1 # Redirect include blink-common.profile