Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

"firecfg.conf" with list of disabled profiles #5874

Closed
danielkrajnik opened this issue Jun 29, 2023 · 4 comments
Closed

"firecfg.conf" with list of disabled profiles #5874

danielkrajnik opened this issue Jun 29, 2023 · 4 comments
Labels
duplicate This issue or pull request already exists firecfg Anything related to firecfg and not firejail itself

Comments

@danielkrajnik
Copy link

danielkrajnik commented Jun 29, 2023

Is your feature request related to a problem? Please describe.

Some programs can't be made to work with firejail yet. Until a solution is found user needs to remove symlinks from /usr/local/bin to take them out of firejail. These symlinks however will be recreated on the next run of fiirecfg --clean && firecfg. If a list of "blacklisted" profiles stored in .config/firejail was read on each run of firecfg (to avoid creating them) instead that would be really helpful.

Describe alternatives you've considered

This script by rusty-snake could be used as a manual alternative, but it would be really helpful to have a native support.

@danielkrajnik danielkrajnik changed the title firejail.conf with list of disabled profiles "firejail.conf" with list of disabled profiles Jun 29, 2023
@glitsj16
Copy link
Collaborator

Until someone implements such native support you can use nojail. It is also available in the AUR for people who happen to run Arch Linux (based) OS.

@rusty-snake rusty-snake changed the title "firejail.conf" with list of disabled profiles "firecfg.conf" with list of disabled profiles Jun 30, 2023
@rusty-snake rusty-snake added the firecfg Anything related to firecfg and not firejail itself label Jun 30, 2023
@rusty-snake
Copy link
Collaborator

rusty-snake commented Jun 30, 2023

Related: #5874

There could be a --no-user-profile-discovery option.

If you start firecfg w/o sudo (e.g. pkexec) or use sudo env -u SUDO_USER firecfg you can get this behavior already because firecfg can then not discover your user (this will also affect firejail.login).

There are more alternatives from me 😁 https://github.com/rusty-snake/firecfg.py

@kmk3
Copy link
Collaborator

kmk3 commented Jun 30, 2023

You're in luck, I started working on #2097 yesterday.

The implementation currently works, but there are some API considerations; I'll
post a draft PR later.

Closing in favor of #2097.

@kmk3 kmk3 closed this as not planned Won't fix, can't repro, duplicate, stale Jun 30, 2023
@kmk3 kmk3 added the duplicate This issue or pull request already exists label Jun 30, 2023
@danielkrajnik
Copy link
Author

Oh wow, that's good to hear. Thank you for letting me know. I'm looking forward to see the PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
duplicate This issue or pull request already exists firecfg Anything related to firecfg and not firejail itself
Projects
None yet
Development

No branches or pull requests

4 participants