Commit graph

3340 commits

Author SHA1 Message Date
Kelvin M. Klann
265b3e0e28 ipcalc-ng.profile: fix double globals.local include
And add missing redirect comment.

See etc/templates/redirect_alias-profile.template.
2021-02-22 18:27:43 -03:00
netblue30
f2b7ec0bfe more calibre profiles 2021-02-22 07:48:24 -05:00
zupatisc
edf4407fcf
Fix patch-util not having access to libdl.so (#4000)
* Fix patch-util not having access to libdl.so

* Update etc/profile-m-z/patch.profile

Co-authored-by: Kelvin M. Klann <kmk3.code@protonmail.com>
2021-02-22 01:36:11 +01:00
netblue30
3fbdc9f59a apparmor capabilities fix 2021-02-21 08:47:45 -05:00
Reiner Herrmann
836989bf18 run sort.py 2021-02-20 14:47:33 +01:00
netblue30
c499e49e20 fix ipcalc 2021-02-19 21:26:00 -05:00
netblue30
b24501b14e adding ipcalc, ipcalc-ng 2021-02-19 09:00:00 -05:00
smitsohu
f767f82bd5 refresh capabilities (#3945) 2021-02-19 00:40:46 +01:00
glitsj16
9b51592378
Merge pull request #3993 from glitsj16/template
fixes for profile.template
2021-02-17 16:20:10 +00:00
glitsj16
9aff09b521
fix Common-Extra
See https://github.com/netblue30/firejail/pull/3993/files/660bc3435b43e32d156d9bb5bee2dbad2f84cf36#r577366805.
2021-02-17 07:22:52 +00:00
glitsj16
17b762cf63
fix private-bin in jitsi-meet-desktop 2021-02-17 04:18:13 +00:00
glitsj16
660bc3435b
fix ordering in profile.template 2021-02-16 21:30:23 +00:00
glitsj16
38a18b1b4d
miscellaneous fixes to profile.template 2021-02-16 21:27:25 +00:00
glitsj16
03f0dadc99
adapt to apparmor being opt-in for torbrowser-launcher 2021-02-15 21:19:02 +00:00
glitsj16
307692f1e2
make apparmor opt-in 2021-02-15 21:14:58 +00:00
glitsj16
029a67a089
add note for torbrowser-launcher opt-in 2021-02-15 21:07:43 +00:00
glitsj16
47e3e450bb
revert torbrowser-launcher rule
See https://github.com/netblue30/firejail/pull/3990#discussion_r576404417.
2021-02-15 21:05:04 +00:00
glitsj16
970d679d85
Avoid doubled include globals.local
The final profile in the include chain - torbrowser-launcher.profile - already includes globals.local. Unless there's some kind of potential race condition that needs to be avoided by changing  this 'logic' we should avoid doubled includes.
2021-02-15 07:31:07 +00:00
glitsj16
b3fb4cbe5f
Avoid doubled include globals.local
The final profile in the include chain - torbrowser-launcher.profile - already includes globals.local. Unless there's some kind of potential race condition that needs to be avoided by changing  this 'logic' we should avoid doubled includes.
2021-02-15 07:26:30 +00:00
glitsj16
5789d97945
Allow access to torbrowser-launcher under ${HOME}
Follow up for https://github.com/netblue30/firejail/pull/3988. We need to allow access to torbrowser-launcher executables installed under ${HOME}. Thanks @rusty-snake and @Vincent43 for motivational input.
2021-02-15 07:20:02 +00:00
netblue30
39bc161133 fix tor browser 2021-02-14 13:11:56 -05:00
netblue30
6bc9251a9a disable .ssh and .gnupg in kdiff3 profile 2021-02-14 09:28:02 -05:00
glitsj16
cc4c3ea153
add apparmor to torbrowser-launcher 2021-02-14 05:13:09 +00:00
rusty-snake
bb9107e2ae Revert "Merge pull request #3607 from kortewegdevries/wemail"
This reverts commit bd1819a864, reversing
changes made to 807af3dce0.

The hole PR looks like a single crap, it is not even syntactically
correct. Has anyone at least started kmail with this profile before it
was merged? See #3979, thanks @creideiki for reporting.

> First, there are syntax errors. Several mkdir lines have file names containing asterisks.
> This gives the following error:
>
>    Error: "${HOME}/.cache/akonadi*" is an invalid filename: rejected character: "*"
>
> I am not sure what they intend to do, but whatever it is it's not working.
> Especially confusing is the line
>
>    mkdir /tmp/akonadi-*
>
> Yes, Akonadi creates a directory in /tmp, but its name is random and seems to have been created
> using mkstemp(3) or similar. I'm not sure how Firejail is supposed to be able to pre-create it.
>
> Removing the asterisks makes Firejail at least accept the profile syntactically and try to run
> the program.

It is rejected by syntax. Has anyone tested?

> At startup, Firejail now prints the following warning:
>
>     ***
>     *** Warning: cannot whitelist ${DOCUMENTS} directory
>     *** Any file saved in this directory will be lost when the sandbox is closed.
>     ***

Why was 'include disable-xdg.inc' added together with 'whitelist ${DOCUMENTS}', but
no 'nobalcklist ${DOCUMENTS}'? It can not work.

> The actual error is that PostgreSQL needs access to /usr/lib64/postgresql-13/ in order to run.
> Adding the following line to kmail.profile fixes that:
>
>     whitelist /usr/share/postgresql*

Again, has anyone thested this?

> The next problem is this message on the console:
>
>     kf.config.core: Couldn't write "/home/creideiki/.config/kmail2rc" . Disk full?
>
> Which may have something to do with the profile creating a directory with that name:
>
>     mkdir ${HOME}/.config/kmail2rc
>
> when it's supposed to be a file:
>
>     $ stat ~/.config/kmail2rc
>      File: /home/creideiki/.config/kmail2rc
>      Size: 24660           Blocks: 56         IO Block: 4096   regular file

Has anyone tested this or is this just a blind copy of the noblacklist
from above with noblacklist replaced by mkdir?

> However, the error message
>
>     kf.config.core: Couldn't write "/home/creideiki/.config/kmail2rc" . Disk full?
>
>  still appears.

Looks like #1793. HAS ANYONE TESTED THIS PROFILE??!

> Finally, when exiting KMail, it crashes with a SIGSEGV:
>
>     *** KMail got signal 11 (Exiting)
>     *** Dead letters dumped.
>     KCrash: crashing... crashRecursionCounter = 2
>     KCrash: Application Name = kmail path = /usr/bin pid = 20
>     KCrash: Arguments: /usr/bin/kmail

Has any...

> I tried restoring an older kmail.profile, from commit 319f2dc, and it has none of the above problems.

... I give up asking if anyone tested this.

> Given the multitude of problems with commit 5532fbd, I'd suggest reverting it until it can be fixed.

Yes, definitely.
2021-02-12 12:34:20 +01:00
netblue30
3710a68742 display-im6.q16 2021-02-11 08:04:42 -05:00
glitsj16
1f4d3742cb
add support for faccessat2 syscall 2021-02-10 22:13:01 +00:00
Albin Kauffmann
f4e00840b1
Update etc/profile-a-l/firefox.profile
Co-authored-by: Kelvin M. Klann <kmk3.code@protonmail.com>
2021-02-09 21:27:22 +01:00
Albin Kauffmann
3d6915d56e
Update etc/profile-a-l/chromium-common.profile
Co-authored-by: Kelvin M. Klann <kmk3.code@protonmail.com>
2021-02-09 21:27:14 +01:00
Albin Kauffmann
8ad2807297 Add a comment to some profiles to allow screen sharing
This configuration is to be applied in order to get screen sharing
working under Wayland (via pipewire and a xdg-desktop-portal backend).
Note that {chrome|chromium} does not need the dbus filters (at least
as of today) because dbus filtering is not enabled (dbus-user not set
to none).
2021-02-09 19:57:12 +01:00
Kelvin M. Klann
8e8346f865 Revert "etc: use ${DOCUMENTS} macro where appropriate"
This reverts commit 5df1f27c63.

That commit breaks things, as pointed out by @rusty-snake[1]:

> @kmk3 @glitsj16 The xdg macros are treated literally if they have sub
> components (#2359):
>
> ```
> Error: "${DOCUMENTS}/KeePassXC" is an invalid filename: rejected character: "{"
> ```

[1]: 3fa2927c3c (commitcomment-46913219)
2021-02-09 17:27:33 +00:00
netblue30
0b818f13fd
Merge pull request #3849 from bbhtt/email
Email part (2)
2021-02-09 08:37:40 -05:00
Fred Barclay
ad0b7fc886 Housekeeping: strip extra whitespace
Just `find . -not \( -name .git -prune -o -name *.AppImage -prune \) -type f -print0 | xargs -0 perl -pi -e 's/ +$//'`
and filter to avoid unwanted changes (especially .md files)
2021-02-08 17:24:28 -06:00
Kelvin M. Klann
5df1f27c63 etc: use ${DOCUMENTS} macro where appropriate
Currently, some paths are hard-coded:

    $ grep -Fnr '${HOME}/Documents' etc etc-fixes
    etc/profile-m-z/Mathematica.profile:19:mkdir ${HOME}/Documents/Wolfram Mathematica
    etc/profile-m-z/Mathematica.profile:22:whitelist ${HOME}/Documents/Wolfram Mathematica
    etc/profile-a-l/keepassxc.profile:34:# If you do so, you MUST store your database under ${HOME}/Documents/KeePassXC/foo.kdbx
    etc/profile-a-l/keepassxc.profile:35:#mkdir ${HOME}/Documents/KeePassXC
    etc/profile-a-l/keepassxc.profile:36:#whitelist ${HOME}/Documents/KeePassXC

Commands used to search and replace:

    $ find etc etc-fixes/ -type f -exec \
      sed -i.bak -e 's|\${HOME}/Documents|${DOCUMENTS}|' '{}' +

Related to that, the (lack of) usage of ${DOWNLOADS} has been recently
fixed on commit deae31301 ("use ${DOWNLOADS} in lutris.profile
(#3955)").

With the above change, all macros other than ${DOCUMENTS} seem to be
already used appropriately:

    $ grep -Fnr '${HOME}/Desktop' etc etc-fixes
    $ grep -Fnr '${HOME}/Downloads' etc etc-fixes
    $ grep -Fnr '${HOME}/Music' etc etc-fixes
    $ grep -Fnr '${HOME}/Pictures' etc etc-fixes
    $ grep -Fnr '${HOME}/Videos' etc etc-fixes

See src/firejail/macros.c for details.
2021-02-08 18:47:21 -03:00
Kelvin M. Klann
3d0f6668bf archivers: wrap comments 2021-02-08 19:22:57 +00:00
Kelvin M. Klann
c2e40c6d4e archivers: move archiver-common.inc include to the bottom
And mark it as a redirect profile.

This is done so when including other *-common.inc profiles, such as
firefox-common.profile.
2021-02-08 19:22:57 +00:00
glitsj16
deae31301f
use ${DOWNLOADS} in lutris.profile (#3955) 2021-02-07 18:25:32 +00:00
Neo00001
b59bdbdf18
Add profile for Gemini (#3946)
* Update disable-programs.inc

* Create calligragemini.profile

* Update calligra.profile

* Update calligra.profile

* Update firecfg.config
2021-02-07 15:02:00 +00:00
Kelvin M. Klann
0ddc8160bf disable-interpreters.inc: blacklist the other libmozjs
And sort the paths on allow-gjs.inc.

    $ pacman -Q js78
    js78 78.6.0-1
    $ pacman -Qlq js78 | grep -v /usr/include/
    /usr/
    /usr/bin/
    /usr/bin/js78
    /usr/bin/js78-config
    /usr/lib/
    /usr/lib/libmozjs-78.so
    /usr/lib/pkgconfig/
    /usr/lib/pkgconfig/mozjs-78.pc

This appears to be the only counterpart path missing when looking at the
current lib64 entries with:

    $ grep -Fnr lib64 etc
2021-02-06 20:13:15 -03:00
Kelvin M. Klann
cd6f7aff11 disable-interpreters.inc: sort paths 2021-02-06 20:02:44 -03:00
Anton Shestakov
f5a9ca5365 add a /usr/share whitelist item for uim
uim is a multilingual input method framework, so any program that takes user input potentially needs it to work.
2021-02-05 16:35:52 +00:00
rusty-snake
34cec53a4e fixup! Add profile for vmware-view
damn, forgotten to add
2021-02-04 17:47:39 +01:00
Neo00001
2b2a6a32ca Update spectacle.profile 2021-02-04 16:46:25 +00:00
rusty-snake
00a17b055e Add profile for vmware-view
blacklist ${HOME}/.vwmare is already in disable-programs.inc
I did not add it to firecfg.config because it has many extra features
such as usb-redirection that I could not test.
2021-02-04 17:42:52 +01:00
rusty-snake
69968ee981 keepassxc: allow all browser, not just firefox
ungoogled-chromium won't work with keepassxc (#3941)
2021-02-02 12:31:16 +01:00
Neo00001
f6d86439d9
Add profile for avidemux (#3935)
* Update disable-programs.inc

* Update disable-programs.inc

* Update firecfg.config

* Create avidemux.profile

* Update avidemux.profile
2021-01-31 16:37:35 +00:00
rusty-snake
a6084bb054 Disable the webkit2gtk-4.0 sandbox in bijiben
webkit2gtk uses a bwrap based sandbox by default since 4.0, see #3647.
This is good as it means more security by default on for linux system.
Unfortunately is it not possible to run bwrap inside firejail if bwrap
is started with --unshare-pid --proc /proc at all. In general we should
exclude a program from firecfg until a final solution is found. But
bijiben is special, while epiphany or evolution display random stuff
from the internet is webkit2gtk in bijiben used to display local files
create by the user. Bijiben has a thight profile (net none, whitelist,
private-bin, ...) therefore my decision here was to disable the
webkit2gtk sandbox rather then firejail.
2021-01-31 08:11:34 +00:00
glitsj16
d3330c1a9d
add quiet to lzdiff/lzmadec (#3932)
* add quiet to lzdiff

* add quiet to lzmadec
2021-01-30 21:36:26 +00:00
glitsj16
a0fce216e7
Merge pull request #3931 from glitsj16/follow-up-3914
follow-up fixes for #3914
2021-01-30 18:54:52 +00:00
glitsj16
dbd8925fd9
Merge pull request #3885 from kmk3/fix-ssh
ssh: Refactor, fix bugs & harden
2021-01-30 00:37:01 +00:00
rusty-snake
8ed72fe369 Fix #3925 -- telegram-desktop launch browser for …
…open URL (after update to 0.9.64.2)
2021-01-29 18:04:50 +01:00