[Pkg-privacy-commits] [torbrowser-launcher] 05/59: AppArmor: create a new profile for Firefox' content rendering processes (plugin-container).
Roger Shimizu
rogershimizu at gmail.com
Mon Jan 29 13:43:56 UTC 2018
This is an automated email from the git hooks/post-receive script.
rosh pushed a commit to branch debian/sid
in repository torbrowser-launcher.
commit a2bc002cbf0f07b16b1b0870b5dcd86ea12c1cf4
Author: intrigeri <intrigeri at boum.org>
Date: Fri Jun 16 16:09:11 2017 +0000
AppArmor: create a new profile for Firefox' content rendering processes (plugin-container).
This profile was copied as-is from torbrowser.Browser.firefox, and I updated the
name of the profile and the corresponding local include only.
---
apparmor/torbrowser.Browser.plugin-container | 111 +++++++++++++++++++++++++++
1 file changed, 111 insertions(+)
diff --git a/apparmor/torbrowser.Browser.plugin-container b/apparmor/torbrowser.Browser.plugin-container
new file mode 100644
index 0000000..2eece62
--- /dev/null
+++ b/apparmor/torbrowser.Browser.plugin-container
@@ -0,0 +1,111 @@
+# Last modified
+#include <tunables/global>
+
+profile torbrowser_plugin_container {
+ #include <abstractions/gnome>
+
+ # Uncomment the following line if you don't want the Tor Browser
+ # to have direct access to your sound hardware. Note that this is not
+ # enough to have working sound support in Tor Browser.
+ # #include <abstractions/audio>
+
+ # Uncomment the following lines if you want to give the Tor Browser read-write
+ # access to most of your personal files.
+ # #include <abstractions/user-download>
+ # @{HOME}/ r,
+
+ #dbus,
+ network tcp,
+
+ deny /etc/host.conf r,
+ deny /etc/hosts r,
+ deny /etc/nsswitch.conf r,
+ deny /etc/resolv.conf r,
+ deny /etc/passwd r,
+ deny /etc/group r,
+ deny /etc/mailcap r,
+
+ deny /etc/machine-id r,
+ deny /var/lib/dbus/machine-id r,
+
+ owner @{PROC}/@{pid}/mountinfo r,
+ owner @{PROC}/@{pid}/stat r,
+ owner @{PROC}/@{pid}/status r,
+ owner @{PROC}/@{pid}/task/*/stat r,
+ @{PROC}/sys/kernel/random/uuid r,
+
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/ r,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/* r,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/.** rwk,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/update.test/ rwk,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/.** rwk,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/ rw,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/** rw,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser.bak/ rwk,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser.bak/** rwk,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/*.so mr,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/components/*.so mr,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/browser/components/*.so mr,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/firefox rix,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/plugin-container Pix,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/{,TorBrowser/UpdateInfo/}updates/[0-9]*/updater ix,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/{,TorBrowser/UpdateInfo/}updates/0/MozUpdater/bgupdate/updater ix,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/TorBrowser/Data/Browser/profiles.ini r,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/TorBrowser/Data/Browser/profile.default/ r,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/TorBrowser/Data/Browser/profile.default/** rwk,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/TorBrowser/Tor/tor px,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/TorBrowser/Tor/libstdc++.so.6 m,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/Desktop/ rw,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/Desktop/** rwk,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/Downloads/ rw,
+ owner @{HOME}/.local/share/torbrowser/tbb/{i686,x86_64}/tor-browser_*/Browser/Downloads/** rwk,
+
+ /etc/mailcap r,
+ /etc/mime.types r,
+
+ /usr/share/ r,
+ /usr/share/mime/ r,
+ /usr/share/themes/ r,
+ /usr/share/applications/** rk,
+ /usr/share/gnome/applications/ r,
+ /usr/share/gnome/applications/kde4/ r,
+ /usr/share/poppler/cMap/ r,
+
+ # Distribution homepage
+ /usr/share/homepage/ r,
+ /usr/share/homepage/** r,
+
+ /sys/devices/system/cpu/ r,
+ /sys/devices/system/cpu/present r,
+ /sys/devices/system/node/ r,
+ /sys/devices/system/node/node[0-9]*/meminfo r,
+ deny /sys/devices/virtual/block/*/uevent r,
+
+ # Should use abstractions/gstreamer instead once merged upstream
+ /etc/udev/udev.conf r,
+ /run/udev/data/+pci:* r,
+ /sys/devices/pci[0-9]*/**/uevent r,
+ owner /{dev,run}/shm/shmfd-* rw,
+
+ # Required for multiprocess Firefox (aka Electrolysis, i.e. e10s)
+ owner /dev/shm/org.chromium.* rw,
+
+ # Deny access to DRM nodes, that's granted by the X abstraction, which is
+ # sourced by the gnome abstraction, that we include.
+ deny /dev/dri/** rwklx,
+
+ # Silence denial logs about permissions we don't need
+ deny /dev/dri/ rwklx,
+ deny @{PROC}/@{pid}/net/route r,
+ deny /sys/devices/system/cpu/cpufreq/policy[0-9]*/cpuinfo_max_freq r,
+ deny /sys/devices/system/cpu/*/cache/index[0-9]*/size r,
+
+ # KDE 4
+ owner @{HOME}/.kde/share/config/* r,
+
+ # Xfce4
+ /etc/xfce4/defaults.list r,
+ /usr/share/xfce4/applications/ r,
+
+ #include <local/torbrowser.Browser.plugin-container>
+}
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-privacy/packages/torbrowser-launcher.git
More information about the Pkg-privacy-commits
mailing list