mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #4120] How to allow access to other home directories? #2543
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#2543
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @muziker on GitHub (Mar 20, 2021).
Original GitHub issue: https://github.com/netblue30/firejail/issues/4120
Not a bug, but i couldn't find any information anywhere else. How do i allow a profile to access a /home/otheruser directory, assuming it is usually accessible? I've tried whitelist, but it looks like all other home directories are dropped.
@rusty-snake commented on GitHub (Mar 20, 2021):
allusers@muziker commented on GitHub (Mar 20, 2021):
But only one specific directory, and to maintain the id:group ownership, since if it is nobody:nogroup, the user will not be able to access it.
@rusty-snake commented on GitHub (Mar 20, 2021):
Sorry I don't fully get you, but If the files are owned by an other user and you have only access to it via group, your supplemetray groups needs to preserved and the other user must be present:
@muziker commented on GitHub (Mar 20, 2021):
Thanks that helps ! The noroot was ensuring only one user was on the system. ignore noroot allowed the traditional permissions model to work.