mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #4627] Impossible to inclure tutanota-desktop-linux.AppImage in a sandbox with firejail with Linux Mint 20.2 #2733
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#2733
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @CocoR55 on GitHub (Oct 20, 2021).
Original GitHub issue: https://github.com/netblue30/firejail/issues/4627
Description
** Warning: dropping all Linux capabilities and setting NO_NEW_PRIVS prctl **
Mounting appimage type 2
Warning: skipping tutanota-desktop for private /opt
Private /opt installed in 2.54 ms
Warning: An abstract unix socket for session D-BUS might still be available. Use --net or remove unix from --protocol set.
Warning: skipping crypto-policies for private /etc
Private /etc installed in 225.95 ms
Private /usr/etc installed in 0.01 ms
Child process initialized in 704.99 ms
the monkey has been patched
(node:16) [DEP0005] DeprecationWarning: Buffer() is deprecated due to security and usability issues. Please use the Buffer.alloc(), Buffer.allocUnsafe(), or Buffer.from() methods instead.
(Use
tutanota-desktop --trace-deprecation ...to show where the warning was created)version: 3.88.4
libva error: vaGetDriverNameByIndex() failed with unknown libva error, driver_name = (null)
(tutanota-desktop:16): libappindicator-WARNING **: 13:30:31.453: Unable to get the session bus: Could not connect: Permission denied
(tutanota-desktop:16): LIBDBUSMENU-GLIB-WARNING **: 13:30:31.454: Unable to get session bus: Could not connect: Permission denied
config up to date
scheduling to check sse in 1 seconds
[ApplicationWindow] startFile: file:///run/firejail/appimage/resources/app.asar/index-desktop.html
[DownloadManager] getting dictionaries from: https://mail.tutanota.com/desktop/dictionaries/
default mailto handler: false
[DownloadManager] spellcheck-dictionary-initialized fr
scheduling to check sse in 10 seconds
sse info not available, skip reconnect
Webapp ready
autoUpdater info:
Checking for update
autoUpdater info:
checking-for-update
/home/leloup/.local/share/applications/tutanota-desktop.desktop does not exist, checking for permission to ask for permission...
....
chmod 777 tutanota-desktop.desktop. Nevertheless, this is the same.
I found that:
leloup@leloup-VirtualBox:/etc/firejail$ cat disable-common.inc | grep -i .local/share/app
read-only ${HOME}/.local/share/applications.
Question: How to fix?
Regards,
CocoR55
Steps to Reproduce
Steps to reproduce the behavior
LC_ALL=C firejail PROGRAM(LC_ALL=Cto get a consistent output in English that can be understood by everybody)ERRORExpected behavior
What you expected to happen
Actual behavior
What actually happened
Behavior without a profile
What changed calling
LC_ALL=C firejail --noprofile /path/to/programin a terminal?Additional context
Any other detail that may help to understand/debug the problem
Environment
firejail --version) 0.9.66git rev-parse HEAD).Checklist
/usr/bin/vlc) "fixes" it).https://github.com/netblue30/firejail/issues/1139)browser-allow-drm yes/browser-disable-u2f noinfirejail.configto allow DRM/U2F in browsers.--profile=PROFILENAMEto set the right profile. (Only relevant for AppImages)Log
Output of
LC_ALL=C firejail /path/to/programOutput of
LC_ALL=C firejail --debug /path/to/program@rusty-snake commented on GitHub (Oct 20, 2021):
You can not use electron AIs with firejail [edit] if your kernel does not support unprivileged userns.
@CocoR55 commented on GitHub (Oct 20, 2021):
Bonjour rusty-snake
Could you clarify? Do you mean electron? Alsa..?
Regards,
Leloup
@rusty-snake commented on GitHub (Oct 20, 2021):
AIs: AppImages@CocoR55 commented on GitHub (Oct 20, 2021):
'To give more precision leloup@leloup-VirtualBox firejail --appimage --profile=/etc/firejail/tutanota-desktop.profile /home/leloup/Tutanota/tutanota-desktop-linux.AppImage that does not works.
leloup@leloup-VirtualBox firejail --appimage -noprofile /home/leloup/Tutanota/tutanota-desktop-linux.AppImage that works but no any sandbox is created.'
@CocoR55 commented on GitHub (Oct 20, 2021):
I am not convinced. There is no shortage of them to make it work
@CocoR55 commented on GitHub (Oct 20, 2021):
noblacklist ${HOME}/.config/ is to allow acces to .config.
read-only ${HOME}/.local/share/applications is to allow read-only file.
What command is to alllow read-write ${HOME}/.local/share/applications?
@CocoR55 commented on GitHub (Oct 20, 2021):
In the Error window, it is written: " Could not access secret storage " Please see FAQ at tutanota.com/faq/#secretstorage
I don't find...
@CocoR55 commented on GitHub (Oct 20, 2021):
When I say it doesn't work, it's not quite right.
The Tutanota window opens and tutanota.appimage is in the firejail --list but I can only get it from the command line for now and the error message above doesn't make it clean
@rusty-snake commented on GitHub (Oct 20, 2021):
Just two FYIs (I still don't get what you are trying and what works and what not).
~/.local/share/applicationsonce, the resulting desktop file will run tutanota-desktop unsandboxed. (And if you allow it always, you've open one more hole in the sbox).@rusty-snake commented on GitHub (Jun 8, 2022):
I'm closing here due to inactivity, please fell free to request to reopen if you still have this issue.