Add group policies, limit browser access to container filesystem (#579)

Add some default policy settings to disable unneeded Brave features.
Helps a bit with #463, but Brave unfortunately doesn't provide all
mentioned settings as policy options.

Most important changes are in
`config/policies/lockdown-profilebrowser.json` it limits access to the
container filesystem especially during interactive profile browser
creation.
This commit is contained in:
Vinzenz Sinapius 2024-06-05 21:46:49 +02:00 committed by GitHub
parent 757e838832
commit 068ee79288
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
3 changed files with 19 additions and 2 deletions

View file

@ -29,7 +29,7 @@ ADD package.json /app/
ARG REBUILD
# Prefetch tldextract so pywb is able to boot in environments with limited internet access
RUN tldextract --update
RUN tldextract --update
# Download and format ad host blocklist as JSON
RUN mkdir -p /tmp/ads && cd /tmp/ads && \
@ -64,8 +64,11 @@ WORKDIR /crawls
# enable to test custom behaviors build (from browsertrix-behaviors)
# COPY behaviors.js /app/node_modules/browsertrix-behaviors/dist/behaviors.js
# add brave/chromium group policies
RUN mkdir -p /etc/brave/policies/managed/
ADD config/policies /etc/brave/policies/managed/
ADD docker-entrypoint.sh /docker-entrypoint.sh
ENTRYPOINT ["/docker-entrypoint.sh"]
CMD ["crawl"]

View file

@ -0,0 +1,6 @@
{
"BraveRewardsDisabled": true,
"BraveWalletDisabled": true,
"BraveVPNDisabled": 1,
"BraveAIChatEnabled": false
}

View file

@ -0,0 +1,8 @@
{
"IncognitoModeAvailability": 1,
"TorDisabled": true,
"AllowFileSelectionDialogs": false,
"URLBlocklist": [
"file://*"
]
}