[GH-ISSUE #2670] How to automatically get the applications to point to firejail after installation #1686

Closed
opened 2026-05-05 08:19:51 -06:00 by gitea-mirror · 15 comments
Owner

Originally created by @Raj2032 on GitHub (May 1, 2019).
Original GitHub issue: https://github.com/netblue30/firejail/issues/2670

I already installed Firejail on Manjaro KDE. Now I want to set up a system where when I install an application, when I run the application it will automatically open up in firejail, how do I do this?

Originally created by @Raj2032 on GitHub (May 1, 2019). Original GitHub issue: https://github.com/netblue30/firejail/issues/2670 I already installed Firejail on Manjaro KDE. Now I want to set up a system where when I install an application, when I run the application it will automatically open up in firejail, how do I do this?
gitea-mirror 2026-05-05 08:19:51 -06:00
Author
Owner

@rusty-snake commented on GitHub (May 1, 2019):

@Raj2032 you know about firecfg?

<!-- gh-comment-id:488229031 --> @rusty-snake commented on GitHub (May 1, 2019): @Raj2032 you know about `firecfg`?
Author
Owner

@Raj2032 commented on GitHub (May 1, 2019):

@rusty-snake Nope, please teach me?

<!-- gh-comment-id:488233019 --> @Raj2032 commented on GitHub (May 1, 2019): @rusty-snake Nope, please teach me?
Author
Owner
<!-- gh-comment-id:488236706 --> @rusty-snake commented on GitHub (May 1, 2019): https://www.mankier.com/1/firecfg https://github.com/netblue30/firejail#desktop-integration
Author
Owner

@Raj2032 commented on GitHub (May 1, 2019):

sudo firecfg Does this make all the applications sandboxed upon application startup, as I want to only specify which sort of applications should be sandboxed? And how would I change which permissions each application can have, for example firefox should have access to my Downloads folder but vlc player can only have access inside my Desktop?

<!-- gh-comment-id:488242081 --> @Raj2032 commented on GitHub (May 1, 2019): `sudo firecfg` Does this make all the applications sandboxed upon application startup, as I want to only specify which sort of applications should be sandboxed? And how would I change which permissions each application can have, for example firefox should have access to my Downloads folder but vlc player can only have access inside my Desktop?
Author
Owner

@rusty-snake commented on GitHub (May 1, 2019):

All applications in https://github.com/netblue30/firejail/blob/master/src/firecfg/firecfg.config they are installed, will be sandboxed with the associated profile in https://github.com/netblue30/firejail/tree/master/etc.

<!-- gh-comment-id:488263424 --> @rusty-snake commented on GitHub (May 1, 2019): All applications in https://github.com/netblue30/firejail/blob/master/src/firecfg/firecfg.config they are installed, will be sandboxed with the associated profile in https://github.com/netblue30/firejail/tree/master/etc.
Author
Owner

@Raj2032 commented on GitHub (May 1, 2019):

@rusty-snake I think I am ready now, but just one last little question.

All applications in https://github.com/netblue30/firejail/blob/master/src/firecfg/firecfg.config

Where is the config file located in, which directory?

with the associated profile in https://github.com/netblue30/firejail/tree/master/etc.

And where is the config file for this located on Linux?

<!-- gh-comment-id:488266187 --> @Raj2032 commented on GitHub (May 1, 2019): @rusty-snake I think I am ready now, but just one last little question. > All applications in https://github.com/netblue30/firejail/blob/master/src/firecfg/firecfg.config Where is the config file located in, which directory? > with the associated profile in https://github.com/netblue30/firejail/tree/master/etc. And where is the config file for this located on Linux?
Author
Owner

@rusty-snake commented on GitHub (May 1, 2019):

On my System: /usr/lib64/firejail/firecfg.config and /etc/firejail.

<!-- gh-comment-id:488270777 --> @rusty-snake commented on GitHub (May 1, 2019): On my System: `/usr/lib64/firejail/firecfg.config` and `/etc/firejail`.
Author
Owner

@Raj2032 commented on GitHub (May 1, 2019):

Cool thanks.

<!-- gh-comment-id:488271050 --> @Raj2032 commented on GitHub (May 1, 2019): Cool thanks.
Author
Owner

@Raj2032 commented on GitHub (May 1, 2019):

@rusty-snake I am sorry if I am being annoying but I need to understand something. So by default, if I click on chromium on KDE its going to open it up without it being sandboxed, right? By typing in firetool chromium it is going to open up chromium in a sandbox, correct?

Now I want by default I want to click on chromium in the taskbar and it will sandbox it without having to use firejail nor firetools. I could have used firecfg but that would make all applications sandboxed. I only want to make chromium sandboxed when I launch it in KDE, what will I type in the console or using firetools?

My next question is with chromium how would I build a custom profile to only allow a specific set if directories it can access using both firejail and firetools?

<!-- gh-comment-id:488290550 --> @Raj2032 commented on GitHub (May 1, 2019): @rusty-snake I am sorry if I am being annoying but I need to understand something. So by default, if I click on chromium on KDE its going to open it up without it being sandboxed, right? By typing in `firetool chromium` it is going to open up chromium in a sandbox, correct? Now I want by default I want to click on chromium in the taskbar and it will sandbox it without having to use firejail nor firetools. I could have used firecfg but that would make all applications sandboxed. I only want to make chromium sandboxed when I launch it in KDE, what will I type in the console or using firetools? My next question is with chromium how would I build a custom profile to only allow a specific set if directories it can access using both firejail and firetools?
Author
Owner

@rusty-snake commented on GitHub (May 1, 2019):

  1. firetools is only a GUI-wrapper for firejail.
  2. the cmd firejail chromium is better
  3. I only want to make chromium sandboxed

sudo firecfg --clean
sudo ln -s /usr/bin/firejail /usr/local/bin/chromium

<!-- gh-comment-id:488295667 --> @rusty-snake commented on GitHub (May 1, 2019): 1. firetools is only a GUI-wrapper for firejail. 2. the cmd `firejail chromium` is better 3. > I only want to make chromium sandboxed `sudo firecfg --clean` `sudo ln -s /usr/bin/firejail /usr/local/bin/chromium`
Author
Owner

@rusty-snake commented on GitHub (May 1, 2019):

My next question is with chromium how would I build a custom profile to only allow a specific set if directories it can access using both firejail and firetools?

  1. The chromium profile is a whitelisting profile. (1, 2)
    => I think that this is not needed
  2. Profiles for browsers are very difficult because browsers are big software.
    if you didn't write any firejail-profile before, it is maybe better to start writing own firejail-profiles with easyer applications.
  3. see man firejail-profiles for the syntax for firejail profiles.
  4. If your FJ-version supports it, I would prefer to use a .local file instead of an .profile file.
<!-- gh-comment-id:488296863 --> @rusty-snake commented on GitHub (May 1, 2019): > My next question is with chromium how would I build a custom profile to only allow a specific set if directories it can access using both firejail and firetools? 1. The chromium profile is a whitelisting profile. ([1](https://github.com/netblue30/firejail/blob/master/etc/chromium.profile), [2](https://github.com/netblue30/firejail/blob/master/etc/chromium-common.profile)) => I think that this is not needed 2. Profiles for browsers are very difficult because browsers are big software. if you didn't write any firejail-profile before, it is maybe better to start writing own firejail-profiles with easyer applications. 3. see `man firejail-profiles` for the syntax for firejail profiles. 4. If your FJ-version supports it, I would prefer to use a .local file instead of an .profile file.
Author
Owner

@Raj2032 commented on GitHub (May 2, 2019):

@rusty-snake

sudo firecfg --clean
sudo ln -s /usr/bin/firejail /usr/local/bin/chromium

I literally typed in these two commands, first of all this directory /usr/local/bin/chromium didn't seem to exist for me so I typed /usr/bin/chromium instead and it created the soft link. But when clicking on Chromium in the KDE taskbar it does not sandbox it at all. Only when I type firejail chromium.

Also how can I customize a sandboxed environment for chromium?

<!-- gh-comment-id:488527457 --> @Raj2032 commented on GitHub (May 2, 2019): @rusty-snake > `sudo firecfg --clean` `sudo ln -s /usr/bin/firejail /usr/local/bin/chromium` I literally typed in these two commands, first of all this directory `/usr/local/bin/chromium` didn't seem to exist for me so I typed `/usr/bin/chromium` instead and it created the soft link. But when clicking on Chromium in the KDE taskbar it does not sandbox it at all. Only when I type `firejail chromium`. Also how can I customize a sandboxed environment for chromium?
Author
Owner

@rusty-snake commented on GitHub (May 2, 2019):

sudo ln -s /usr/bin/firejail /usr/local/bin/chromium should be right. If it doesn't exists, can you past the output from echo $PATH.

<!-- gh-comment-id:488640071 --> @rusty-snake commented on GitHub (May 2, 2019): `sudo ln -s /usr/bin/firejail /usr/local/bin/chromium` should be right. If it doesn't exists, can you past the output from `echo $PATH`.
Author
Owner

@chiraag-nataraj commented on GitHub (May 29, 2019):

@Raj2032 What was the output from echo $PATH?

<!-- gh-comment-id:497091196 --> @chiraag-nataraj commented on GitHub (May 29, 2019): @Raj2032 What was the output from `echo $PATH`?
Author
Owner

@rusty-snake commented on GitHub (Jun 26, 2019):

@Raj2032 I'm going to close this for now because of inactivity. Please fell free to reopen if you still have this issue.

<!-- gh-comment-id:505769883 --> @rusty-snake commented on GitHub (Jun 26, 2019): @Raj2032 I'm going to close this for now because of inactivity. Please fell free to reopen if you still have this issue.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#1686
No description provided.