mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #5937] Profile report: Visual Studio Code #3137
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#3137
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @krokodyl1220 on GitHub (Aug 2, 2023).
Original GitHub issue: https://github.com/netblue30/firejail/issues/5937
As a follow-up from the previous issue I wanted to report on configuration from the
codeprofile. For reference, these are the lines from the default profile (as of 0.9.72) fromcode.profile:My test scenario / use case for verification:
firecfgIn my code.local file I also added hardening options from the previous discussions:
Below is the list of options that I enabled and did not notice any issues during a few days of work:
Below is the list of options that have some side-effects when using VS Code as a full IDE, but may be suitable if one is to use the software only as a text editor:
And finally, below is the list of options that have undesireable effects:
If any more information or testing is required please let me know.
@ghost commented on GitHub (Aug 2, 2023):
Thanks for taking the time to test and report, much appreciated.
Both these includes don't make much sense in VS Code, we'll keep them disabled.
Adding
ignore noexec ${HOME}and maybe alsoignore noexec ${RUNUSER}should cover this.An additional
whitelist ${DOCUMENTS}could take care of that. But as your other remarks indicate, it seems that trying to implement a whitelisting profile for VS Code is probably not a very good idea.Let's wait a bit to give fellow collaborators the time to reflect on your observations. In any case we have a much better view on the best way forward now thanks to your efforts.
Regards
@rusty-snake commented on GitHub (Aug 2, 2023):
noexec ${HOME}The rest sounds leggit.