Skip to content

Conversation

shiftkey
Copy link
Owner

@shiftkey shiftkey commented Apr 14, 2020

A partial fix for #222, but as we've uncovered in that issue the full fix requires:

  • sudo sysctl kernel.unprivileged_userns_clone=1 to enable unprivileged user namespaces (specifically disabled in Debian and other distros), or
  • passing --no-sandbox when launching the app (which effectively disables some of Chromium's security features)

This change will be applied for both deb and rpm packages, but I think it's low risk. Will verify in a test at some stage.

  • test RPM on Fedora and confirm defaults work as expected

@jfgordon2
Copy link

If you want to compare your solution to electron's builder, check out updateSandboxHelperPermissions

@shiftkey shiftkey force-pushed the set-file-mode-for-sandbox branch from 7e361de to 8fbd606 Compare April 16, 2020 15:16
@shiftkey
Copy link
Owner Author

If you want to compare your solution to electron's builder, check out updateSandboxHelperPermissions

@jfgordon2 yep, that's the one I used for inspiration for this change

@shiftkey shiftkey marked this pull request as ready for review April 16, 2020 16:42
@shiftkey
Copy link
Owner Author

Looks like electron-builder was already setting this for the current RPM release, so I think this is good to merge.

@shiftkey shiftkey merged this pull request into linux Apr 16, 2020
@shiftkey shiftkey deleted the set-file-mode-for-sandbox branch April 16, 2020 16:45
theofficialgman pushed a commit to theofficialgman/desktop that referenced this pull request Jul 18, 2025
…shiftkey#496)

Co-Authored-By: Brendan Forster <github@brendanforster.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants