[GH-ISSUE #1107] Temporary specific folders #757

Closed
opened 2026-05-05 06:35:26 -06:00 by gitea-mirror · 4 comments
Owner

Originally created by @ghost on GitHub (Feb 18, 2017).
Original GitHub issue: https://github.com/netblue30/firejail/issues/1107

Is there any way I can have temporary specific folders ? For example an application A needs 3 folders to run .config/A .cache/A and .local/share/A. I want the last two to behave in a similar way to the home folder in the --private option. This can be done with a simple script I'm just wondering if I can do this with firejail by default.

There's --private-home=.config/A but I can't get it to work.

firejail version 0.9.44.8

Compile time support:
- AppArmor support is disabled
- AppImage support is enabled
- bind support is enabled
- chroot support is enabled
- file and directory whitelisting support is enabled
- file transfer support is enabled
- networking support is enabled
- overlayfs support is enabled
- private-home support is enabled
- seccomp-bpf support is enabled
- user namespace support is enabled
- X11 sandboxing support is enabled

Originally created by @ghost on GitHub (Feb 18, 2017). Original GitHub issue: https://github.com/netblue30/firejail/issues/1107 Is there any way I can have temporary specific folders ? For example an application A needs 3 folders to run .config/A .cache/A and .local/share/A. I want the last two to behave in a similar way to the home folder in the --private option. This can be done with a simple script I'm just wondering if I can do this with firejail by default. There's --private-home=.config/A but I can't get it to work. firejail version 0.9.44.8 Compile time support: - AppArmor support is disabled - AppImage support is enabled - bind support is enabled - chroot support is enabled - file and directory whitelisting support is enabled - file transfer support is enabled - networking support is enabled - overlayfs support is enabled - private-home support is enabled - seccomp-bpf support is enabled - user namespace support is enabled - X11 sandboxing support is enabled
gitea-mirror 2026-05-05 06:35:26 -06:00
Author
Owner

@netblue30 commented on GitHub (Feb 19, 2017):

I'll try to bring something in using --tmpfs for directories such as ~/.cache/A and ~/.local/share/A.

<!-- gh-comment-id:280923450 --> @netblue30 commented on GitHub (Feb 19, 2017): I'll try to bring something in using --tmpfs for directories such as ~/.cache/A and ~/.local/share/A.
Author
Owner

@netblue30 commented on GitHub (Mar 10, 2017):

All done on mainline git:

$ firejail --tmpfs=~/.cache firefox --no-remote
<!-- gh-comment-id:285694205 --> @netblue30 commented on GitHub (Mar 10, 2017): All done on mainline git: ````` $ firejail --tmpfs=~/.cache firefox --no-remote `````
Author
Owner

@ghost commented on GitHub (Apr 29, 2017):

I've been using this ever since i saw the commit but I forgot about right after.
Thank you.

<!-- gh-comment-id:298198010 --> @ghost commented on GitHub (Apr 29, 2017): I've been using this ever since i saw the commit but I forgot about right after. Thank you.
Author
Owner

@netblue30 commented on GitHub (May 1, 2017):

No problem.

<!-- gh-comment-id:298380276 --> @netblue30 commented on GitHub (May 1, 2017): No problem.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: github-starred/firejail#757
No description provided.