firejail/etc/profile-a-l/archiver-common.profile
glitsj16 06d160fc16
archiver-common: add mkinitcpio support to private-etc (#5656)
mkinitcpio (used to generate initramfs images) supports several
compression formats:
https://gitlab.archlinux.org/archlinux/mkinitcpio/mkinitcpio/-/blob/master/mkinitcpio.conf#L54-L64.

On Arch Linux (based distributions) at least this implies the supported
archivers to have access to mkinitcpio-related files under /etc.

This was no problem before 29da82d added `private-etc` to
`archivers-common.profile`.

This adds the now needed extra private-etc items to
archiver-common.profile, for mkinitcpio's supported compressors (which
seem to be at least cpio, gzip and zstd).

Relates to #5610.
2024-03-05 13:56:57 +00:00

52 lines
1.3 KiB
Text

# This file is overwritten during software install.
# Persistent customizations should go in a .local file.
include archiver-common.local
# common profile for archiver/compression tools
blacklist ${RUNUSER}
# Comment/uncomment the relevant include file(s) in your archiver-common.local
# to (un)restrict file access for **all** archivers. Another option is to do this **per archiver**
# in the relevant <archiver>.local. Beware that things tend to break when overtightening
# profiles. For example, because you only need to (un)compress files in ${DOWNLOADS},
# other applications may need access to ${HOME}/.local/share.
# Add the next line to your archiver-common.local if you don't need to compress files in disable-common.inc.
#include disable-common.inc
include disable-devel.inc
include disable-exec.inc
include disable-interpreters.inc
# Add the next line to your archiver-common.local if you don't need to compress files in disable-programs.inc.
#include disable-programs.inc
include disable-shell.inc
apparmor
caps.drop all
ipc-namespace
machine-id
net none
no3d
nodvd
nogroups
noinput
nonewprivs
#noroot
nosound
notv
nou2f
novideo
protocol unix
seccomp
tracelog
x11 none
private-cache
private-dev
private-etc mkinitcpio*
dbus-user none
dbus-system none
memory-deny-write-execute
restrict-namespaces