mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
The files in this directory are intended to be automatically executed when the user logs in. In which case, granting write access to this directory allows the program to easily escape the sandbox (by autostarting itself outside of firejail, for example). Misc: This was noticed on #6244.
52 lines
1.1 KiB
Text
52 lines
1.1 KiB
Text
# Firejail profile for dropbox
|
|
# This file is overwritten after every install/update
|
|
# Persistent local customizations
|
|
include dropbox.local
|
|
# Persistent global definitions
|
|
include globals.local
|
|
|
|
# To allow the program to autostart, add the following to dropbox.local:
|
|
# Warning: This allows the program to easily escape the sandbox.
|
|
#noblacklist ${HOME}/.config/autostart
|
|
#mkfile ${HOME}/.config/autostart/dropbox.desktop
|
|
#whitelist ${HOME}/.config/autostart/dropbox.desktop
|
|
|
|
noblacklist ${HOME}/.dropbox
|
|
noblacklist ${HOME}/.dropbox-dist
|
|
|
|
# Allow python3 (blacklisted by disable-interpreters.inc)
|
|
include allow-python3.inc
|
|
|
|
include disable-common.inc
|
|
include disable-devel.inc
|
|
include disable-interpreters.inc
|
|
include disable-programs.inc
|
|
|
|
mkdir ${HOME}/.dropbox
|
|
mkdir ${HOME}/.dropbox-dist
|
|
mkdir ${HOME}/Dropbox
|
|
whitelist ${HOME}/.dropbox
|
|
whitelist ${HOME}/.dropbox-dist
|
|
whitelist ${HOME}/Dropbox
|
|
include whitelist-common.inc
|
|
|
|
caps.drop all
|
|
netfilter
|
|
no3d
|
|
nodvd
|
|
nogroups
|
|
noinput
|
|
nonewprivs
|
|
noroot
|
|
nosound
|
|
notv
|
|
nou2f
|
|
novideo
|
|
protocol unix,inet,inet6
|
|
seccomp
|
|
|
|
private-dev
|
|
private-tmp
|
|
|
|
noexec /tmp
|
|
restrict-namespaces
|