aboutsummaryrefslogtreecommitdiff
path: root/test
diff options
context:
space:
mode:
authorjc_gargma <jc_gargma@iserlohn-fortress.net>2017-09-11 05:03:09 -0700
committerjc_gargma <jc_gargma@iserlohn-fortress.net>2017-09-11 05:03:09 -0700
commit21717840fa72c25d57f1b283e12b9fb6c6e1a092 (patch)
tree12ba9e575d5c972f7ea188b47a25ff36f0a8d1d5 /test
parentReload/Stop NavigationButton class (diff)
downloadsmolbote-21717840fa72c25d57f1b283e12b9fb6c6e1a092.tar.xz
Updated firejail profile
Diffstat (limited to 'test')
-rw-r--r--test/poi.profile27
1 files changed, 20 insertions, 7 deletions
diff --git a/test/poi.profile b/test/poi.profile
index 94305e2..9e28868 100644
--- a/test/poi.profile
+++ b/test/poi.profile
@@ -1,31 +1,38 @@
-# Persistent global definitions go here
+# Firejail profile for poi
+# This file is overwritten after every install/update
+# Persistent local customizations
+include /etc/firejail/poi.local
+# Persistent global definitions
include /etc/firejail/globals.local
-# This file is overwritten during software install.
-# Persistent customizations should go in a .local file.
-include /etc/firejail/poi.local
noblacklist ~/.cache/smolbote
noblacklist ~/.config/smolbote
+noblacklist ~/.local/share/smolbote
include /etc/firejail/disable-common.inc
include /etc/firejail/disable-devel.inc
include /etc/firejail/disable-passwdmgr.inc
include /etc/firejail/disable-programs.inc
+
whitelist ${DOWNLOADS}
mkdir ~/.cache/smolbote
whitelist ~/.cache/smolbote
-mkdir ~/.config/smolbote/
-whitelist ~/.config/smolbote/
+mkdir ~/.config/smolbote
+whitelist ~/.config/smolbote
+mkdir ~/.local/share/smolbote
+whitelist ~/.local/share/smolbote
## caps.drop all - Removes the ability to call programs usually run only by root. Ex - chown, setuid
caps.drop all
## netfilter - Creates a simple but restrictive iptables firewall for any --net device created. Does nothing if --net is not used.
-## Commented out because netfliter somehow breaks smolbote if used alone.
netfilter
+## nodvd - Disable access to optical disk drives.
+nodvd
+
## nogroups - The program can only see the current user's main group. Always applied if the program is run as root.
nogroups
@@ -35,6 +42,9 @@ nonewprivs
## noroot - The program can only see the current user. Requires kernel 3.8 or higher. Mutually exclusive with --chroot or --overlay or running as root.
noroot
+## notv - Disable access to DVB TV devices.
+notv
+
## protocol - Only allows sockets of the following types. Not supported on i386 architecture.
protocol unix,inet,inet6,netlink
@@ -48,6 +58,9 @@ shell none
tracelog
+## disable-mnt - Deny access to /mnt, /media, /run/mount, and /run/media
+disable-mnt
+
## private-bin - Creates a virtual /bin directory containing only temporary copies of the following executables.
# bash required to launch from kde kickoff menu
#private-bin bash,poi