-
Hi all, 👋 I´m trying to create a firejail profile for
But it seems to be of no use as the GUI always gives me an "empty" window, as if no VMs were installed in If I use a dedicated profile containing just:
and nothing else, the installed VMs can be seen by Plus: closing the
That would also be the case when issuing the command Can anyone help? Many thanks in advance and many greetings from Rosika 🙂 |
Beta Was this translation helpful? Give feedback.
Replies: 6 comments 14 replies
-
Hi Rosika, just a few quick pointers.
If it was me I'd try to get some inspiration by looking at a profile for a program that offers That's all for now, need to get the children from school. |
Beta Was this translation helpful? Give feedback.
-
Hi @glitsj16: 👋 thanks so much for your advice. ❤️ So I took the virtualbox.profile and looked at the points you mentioned.
I added
for my purposes and also tried all variations with the other settings by commenting them out. The only thing I didn´t do was:
The options I added are:
Those paths already exist. So would I still need to make mkdir and mkfile for those paths ❓ Thank you very much for your kind help. Cheers from Rosika 🙂 P.S.:
That´s really nice of you. 👍 ❤️ |
Beta Was this translation helpful? Give feedback.
-
Previouds attempt #1139 (comment) |
Beta Was this translation helpful? Give feedback.
-
I've installed gnome-boxes on a Ubuntu 22.04 LTS and with Here's a working profile - left it logically ordered for now - and functionally it seems to do the job: $ cat ~/.config/firejail/gnome-boxes
# Firejail profile for gnome-boxes
# Description: Simple GNOME application to access virtual systems
# This file is overwritten after every install/update
# Persistent local customizations
include gnome-boxes.local
# Persistent global definitions
include globals.local
# GNOME Boxes
noblacklist ${HOME}/.cache/gnome-boxes
noblacklist ${HOME}/.config/gnome-boxes
noblacklist ${HOME}/.local/share/gnome-boxes
# libvirt
noblacklist ${HOME}/.cache/libvirt
noblacklist ${HOME}/.config/libvirt
noblacklist ${RUNUSER}/libvirt
noblacklist /var/cache/libvirt
noblacklist /var/lib/libvirt
noblacklist /var/log/libvirt
noblacklist ${HOME}/.local/share/gvfs-metadata
noblacklist /sbin
#noblacklist /usr/local/sbin
noblacklist /usr/sbin
# for @Rosika2 only:
# if you never blacklisted the below path (like in a disable-common.local) the line can be dropped
# otherwise uncomment it
#noblacklist /media/rosika/f14a27c2-0b49-4607-94ea-2e56bbf76fe1/für_qemu2
include disable-common.inc
include disable-devel.inc
include disable-exec.inc
include disable-interpreters.inc
# breaks app
#include disable-proc.inc
include disable-programs.inc
include disable-xdg.inc
# GNOME Boxes
mkdir ${HOME}/.cache/gnome-boxes
mkdir ${HOME}/.config/gnome-boxes
mkdir ${HOME}/.local/share/gnome-boxes
whitelist ${HOME}/.cache/gnome-boxes
whitelist ${HOME}/.config/gnome-boxes
whitelist ${HOME}/.local/share/gnome-boxes
# libvirt
mkdir ${HOME}/.cache/libvirt
mkdir ${HOME}/.config/libvirt
whitelist ${HOME}/.cache/libvirt
whitelist ${HOME}/.config/libvirt
whitelist ${RUNUSER}/libvirt
whitelist /run/libvirt
whitelist ${DOWNLOADS}
# for @Rosika2 only:
# uncomment the below while testing this profile
#whitelist /media/rosika/f14a27c2-0b49-4607-94ea-2e56bbf76fe1/für_qemu2
whitelist /usr/share/gnome-boxes
whitelist /usr/share/libvirt
whitelist /usr/share/qemu
whitelist /usr/share/seabios
whitelist /usr/share/vala*
include whitelist-common.inc
include whitelist-run-common.inc
include whitelist-runuser-common.inc
include whitelist-usr-share-common.inc
include whitelist-var-common.inc
# For host-only network sys_admin is needed. See https://github.com/netblue30/firejail/issues/2868#issuecomment-518647630
apparmor
caps.keep net_raw,sys_nice
netfilter
nodvd
notv
tracelog
#disable-mnt
#private-bin gnome-boxes,libvirtd,qemu*
private-cache
# uncomment the below if you're on 0.9.72
#private-etc alsa,alternatives,asound.conf,ca-certificates,conf.d,crypto-policies,dconf,fonts,hostname,hosts,ld.so.cache,ld.so.preload,localtime,pki,pulse,resolv.conf,ssl
# uncomment the below if you're on 0.9.73 (firejail-git)
#private-etc @network,@sound,@tls-ca,@x11
private-tmp
dbus-user filter
dbus-user.own org.gnome.Boxes
dbus-user.talk ca.desrt.dconf
dbus-system none
deterministic-shutdown
restrict-namespaces
#writable-var I'll do some more testing, but my hardware is limited. HTH! |
Beta Was this translation helpful? Give feedback.
-
Hi @glitsj16, 👋 thank you so much for your persistent help. ❤️
Thanks for the info.
You´re very welcome. But it´s rather me who has to be thankful for the great help I´m getting from you. Here´s some new info: When running
Still, boxes work as expected this way. Now I modified
Alas the outcome seem to be the same. Here are
No idea whether it helps at all... 🤔 But the fact remains: Curious thing: what kind of "timeout" might be at work here? That´s really beyond me. Thank you so much for your kind help, dear @glitsj16 . It´s greatly appreciated. ❤️ Many greetings from Rosika 🙂 P.S.:
Me neither. So we can rule out this one. |
Beta Was this translation helpful? Give feedback.
-
Hi @glitsj16 👋 Thanks so much for the hard work you put into the new profile. ❤️
O.K. I´ll gladly do that.... O.K. In the meantime I tested it. Here´s your latest profile and I added my personal noblacklist and whitelist path to my VMs:
Well, I´m sorry to say I´m back to the initial problem again. 🙍♀️ I diffed the two profiles after having sorted them. Here are the differences:
No idea if it helps. 😐 Thanks again and many greetings from Rosika 🙂 |
Beta Was this translation helpful? Give feedback.
Ohh, we can fix that! I took another shot at it and changed some of the earlier options. If you're still up for another round of testing, please do. I think we nailed it 👯 You can add your specifics for 0.9.72 and /media/rosika/... exactly like above.
Here's the
improved
version (downloads are also working properly with this one):$ cat ~/.config/firejail/gnome-boxes.profile