mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #6802] firefox: cannot create PWAs due to read-only ~/.local/share/applications #3376
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#3376
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ipaqmaster on GitHub (Jul 6, 2025).
Original GitHub issue: https://github.com/netblue30/firejail/issues/6802
Description
PWAsForFirefox throws OS error 13 (11) as it attempts to create
${HOME}/.local/share/applications/FFPWA-someuuid.desktopbecause its only accessible as a Read-only filesystem.I tried adding these two lines in
${HOME}/.config/firejail/firefox.localbut nothing has changed:Steps to Reproduce
Steps to reproduce the behavior
Expected behavior
Being able to use this extension while firefox is running in firejail
Actual behavior
The extension almost succeeds with a few other whitelist and noblacklist lines in firefox.local - but ultimately fails when it attempts to create a start menu .desktop file for the web app being installed and gives up trying to install it.
Behavior without a profile
What changed calling
LC_ALL=C firejail --noprofile /path/to/programin aterminal?
Nothing. Works fine without firejail
Additional context
It's frustrating that whitelist and noblacklist overrides aren't always enough to allow certain paths into some of the default profiles
Any other detail that may help to understand/debug the problem
Environment
uname -srm): Linux 6.12.35-1-lts x86_64mesa 1:24.3.3-2"): Mozilla Firefox 140.0.2
firejail --version): firejail version 0.9.74was compiled (
git rev-parse HEAD):Checklist
/usr/bin/vlc) "fixes" it).https://github.com/netblue30/firejail/issues/1139)browser-allow-drm yes/browser-disable-u2f noinfirejail.configto allow DRM/U2F in browsers.--profile=PROFILENAMEto set the right profile. (Only relevant for AppImages)Log
Output of
LC_ALL=C firejail /path/to/programOutput of
LC_ALL=C firejail --debug /path/to/programRelates to:
@ipaqmaster commented on GitHub (Jul 6, 2025):
Attempting to add:
Also does not make the path writable which I think would have fixed this if it worked.
@ipaqmaster commented on GitHub (Jul 6, 2025):
I found the cause. It's because
firefox.profileincludesfirefox-common.profileand that one includesdisable-common.inc, commenting that makes the above work successfully.disable-common.inc has an explicit
read-only ${HOME}/.local/share/applicationsinside which is overriding my firefox.local exception.I'll have to think of a way to keep including
disable-common.incwhile letting the above directories past.@ipaqmaster commented on GitHub (Jul 6, 2025):
Excellent it looks like I can just add the line
ignore read-only ${HOME}/.local/share/applicationsto the firefox.local and now I can add PWAMy full final
${HOME}/.config/firejail/firefox.local:Because of
/etc/firejail/disable-exec.inccontainingnoexec ${HOME}firefox can't run the PWA executable itself (${HOME}/.local/share/firefoxpwa/runtime/firefox), but the start menu shortcut works to launch it outside of firefox@kmk3 commented on GitHub (Jul 8, 2025):
I'm glad that it works, but note that this is dangerous, as it allows creating
a .desktop file that could override the one for an existing program (such as
for firefox) and run arbitrary commands outside of firejail (if the .desktop
file is opened through an application launcher).
See also:
@ipaqmaster commented on GitHub (Jul 9, 2025):
True. It's unusual for a firefox extension to need access for creating start menu entries and this ignore line opens that up as a vector. It also technically allows the modification of desktop shortcuts into anything arbitrary too.