mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-21 06:45:29 -06:00
48 lines
1.5 KiB
Text
48 lines
1.5 KiB
Text
# Firejail profile for chromium-common
|
|
# This file is overwritten after every install/update
|
|
# Persistent local customizations
|
|
include chromium-common.local
|
|
# Persistent global definitions
|
|
# added by caller profile
|
|
#include globals.local
|
|
|
|
# noexec ${HOME} breaks DRM binaries.
|
|
?BROWSER_ALLOW_DRM: ignore noexec ${HOME}
|
|
|
|
noblacklist ${HOME}/.local/share/pki
|
|
noblacklist ${HOME}/.pki
|
|
noblacklist /usr/lib/chromium/chrome-sandbox
|
|
|
|
# Add the next line to your chromium-common.local if you want Google Chrome/Chromium browser
|
|
# to have access to Gnome extensions (extensions.gnome.org) via browser connector
|
|
#include allow-python3.inc
|
|
|
|
mkdir ${HOME}/.local/share/pki
|
|
mkdir ${HOME}/.pki
|
|
whitelist ${HOME}/.local/share/pki
|
|
whitelist ${HOME}/.pki
|
|
whitelist /usr/share/mozilla/extensions
|
|
whitelist /usr/share/webext
|
|
include whitelist-run-common.inc
|
|
|
|
# If your kernel allows the creation of user namespaces by unprivileged users
|
|
# (for example, if running `unshare -U echo enabled` prints "enabled"), you
|
|
# can add the next line to your chromium-common.local.
|
|
#include chromium-common-hardened.inc.profile
|
|
|
|
?BROWSER_DISABLE_U2F: nou2f
|
|
|
|
?BROWSER_DISABLE_U2F: private-dev
|
|
#private-tmp - issues when using multiple browser sessions
|
|
|
|
blacklist ${PATH}/curl
|
|
blacklist ${PATH}/wget
|
|
blacklist ${PATH}/wget2
|
|
|
|
#dbus-user none - prevents access to passwords saved in GNOME Keyring and KWallet, also breaks Gnome connector.
|
|
|
|
# The file dialog needs to work without d-bus.
|
|
?HAS_NODBUS: env NO_CHROME_KDE_FILE_DIALOG=1
|
|
|
|
# Redirect
|
|
include blink-common.profile
|