aboutsummaryrefslogtreecommitdiff
path: root/test
diff options
context:
space:
mode:
authorAqua-sama <aqua@iserlohn-fortress.net>2018-06-17 20:55:38 +0200
committerAqua-sama <aqua@iserlohn-fortress.net>2018-06-17 20:55:38 +0200
commite3b05391d12a7c695153b9ec5a557675fdcf5564 (patch)
tree30395dbaf3ebd79029fea1052e1fa3f670fb6c63 /test
parentWebProfile: cache a list of cookies (diff)
downloadsmolbote-e3b05391d12a7c695153b9ec5a557675fdcf5564.tar.xz
.desktop: add run with firejail action
Diffstat (limited to 'test')
-rw-r--r--test/poi.profile93
1 files changed, 0 insertions, 93 deletions
diff --git a/test/poi.profile b/test/poi.profile
deleted file mode 100644
index acc49a0..0000000
--- a/test/poi.profile
+++ /dev/null
@@ -1,93 +0,0 @@
-# Firejail profile for poi
-# This file is overwritten after every install/update
-# Persistent local customizations
-include /etc/firejail/poi.local
-# Persistent global definitions
-include /etc/firejail/globals.local
-
-
-noblacklist ${HOME}/.cache/smolbote
-noblacklist ${HOME}/.config/smolbote
-noblacklist ${HOME}/.local/share/smolbote
-
-include /etc/firejail/disable-common.inc
-include /etc/firejail/disable-devel.inc
-include /etc/firejail/disable-passwdmgr.inc
-include /etc/firejail/disable-programs.inc
-
-blacklist /run/user/*/bus
-
-mkdir ${HOME}/.cache/smolbote
-mkdir ${HOME}/.config/smolbote
-mkdir ${HOME}/.local/share/smolbote
-
-whitelist ${DOWNLOADS}
-whitelist ${HOME}/.cache/smolbote
-whitelist ${HOME}/.config/smolbote
-whitelist ${HOME}/.local/share/smolbote
-include /etc/firejail/whitelist-common.inc
-
-
-## caps.drop all - Removes the ability to call programs usually run only by root. Ex - chown, setuid
-caps.drop all
-
-## machine-id - Generates a random machine-id each time the program is run, rather than using the static system machine-id.
-# Breaks audio
-# machine-id
-
-## netfilter - Creates a simple but restrictive iptables firewall for any --net device created. Does nothing if --net is not used.
-netfilter
-
-## nodvd - Disable access to optical disk drives.
-nodvd
-
-## nogroups - The program can only see the current user's main group. Always applied if the program is run as root.
-nogroups
-
-## nownewprivs - Prevents Child processes from requesting additional priviledges. If --seccomp is enabled, --nonewprivs is redundant.
-nonewprivs
-
-## noroot - The program can only see the current user. Requires kernel 3.8 or higher. Mutually exclusive with --chroot or --overlay or running as root.
-noroot
-
-## notv - Disable access to DVB TV devices.
-notv
-
-# novideo - Disable access to video devices.
-novideo
-
-## protocol - Only allows sockets of the following types. Not supported on i386 architecture.
-protocol unix,inet,inet6,netlink
-
-## seccomp - Blacklists a large swath of syscalls from being accessible.
-seccomp
-
-## shell - Run the program directly, without a user shell.
-shell none
-
-## tracelog - Log all viloations to syslog
-tracelog
-
-
-## disable-mnt - Deny access to /mnt, /media, /run/mount, and /run/media
-disable-mnt
-
-## private-bin - Creates a virtual /bin directory containing only temporary copies of the following executables.
-# bash required to launch from kde kickoff menu
-# QtWebEngine executes from /usr/lib which prevents usage of this option for now
-#private-bin bash,poi
-
-## private-dev - Create a virtual /dev directory. Only dri, null, full, zero, tty, pts, ptmx, random, snd, urandom, video, log and shm devices are available.
-private-dev
-
-## private-etc - Creates a virtual /etc directory containing only temporary copies of the following files and directories.
-# Experimental support for only fonts, alsa audio, and dns resolution.
-private-etc fonts,machine-id,resolv.conf
-
-## private-tmp - Creates a virtual /tmp directory to prevent the program from accessing the /tmp files from other programs.
-private-tmp
-
-
-## noexec - Prevent execution of files in the specified locations
-noexec ${HOME}
-noexec /tmp