profile torbrowser_firefox @{torbrowser_firefox_executable} {
#include <abstractions/audio>
#include <abstractions/gnome>
+ #include <abstractions/ibus>
+ #include if exists <abstractions/vulkan>
# Uncomment the following lines if you want to give the Tor Browser read-write
# access to most of your personal files.
/dev/ r,
/dev/shm/ r,
+ owner @{PROC}/@{pid}/cgroup r,
owner @{PROC}/@{pid}/environ r,
owner @{PROC}/@{pid}/fd/ r,
owner @{PROC}/@{pid}/mountinfo r,
/sys/devices/system/cpu/present r,
/sys/devices/system/node/ r,
/sys/devices/system/node/node[0-9]*/meminfo r,
+ /sys/fs/cgroup/cpu,cpuacct/{,user.slice/}cpu.cfs_quota_us r,
deny /sys/devices/virtual/block/*/uevent r,
# Should use abstractions/gstreamer instead once merged upstream
deny /sys/devices/system/cpu/*/cache/index[0-9]*/size r,
deny /run/user/[0-9]*/dconf/user rw,
deny /usr/bin/lsb_release x,
- deny capability sys_admin,
# Silence denial logs about PulseAudio
deny /etc/pulse/client.conf r,
# Yubikey NEO also needs this:
/sys/devices/**/hidraw/hidraw*/uevent r,
+ # Needed for Firefox sandboxing via unprivileged user namespaces
+ capability sys_admin,
+ capability sys_chroot,
+ owner @{PROC}/@{pid}/{gid,uid}_map w,
+ owner @{PROC}/@{pid}/setgroups w,
+
#include <local/torbrowser.Browser.firefox>
}
available_languages = [
"ar",
"ca",
+ "cs",
"da",
"de",
+ "el",
"en-US",
+ "es-AR",
"es-ES",
"fa",
"fr",
"ga-IE",
"he",
+ "hu",
"id",
"is",
"it",
"ja",
+ "ka",
"ko",
+ "lt",
+ "mk",
+ "ms",
+ "my",
"nb-NO",
"nl",
"pl",
"pt-BR",
+ "ro",
"ru",
"sv-SE",
+ "th",
"tr",
"vi",
"zh-CN",
self.set_gui(
"error", _("Error creating {0}").format(homedir), [], False
)
- if not os.access(homedir, os.W_OK):
- self.set_gui("error", _("{0} is not writable").format(homedir), [], False)
tbb_config = '{0}/torbrowser'.format(self.get_env('XDG_CONFIG_HOME', '{0}/.config'.format(homedir)))
tbb_cache = '{0}/torbrowser'.format(self.get_env('XDG_CACHE_HOME', '{0}/.cache'.format(homedir)))