Skip to content
This repository has been archived by the owner on May 12, 2021. It is now read-only.

Please avoid the setuid chome-sandbox #1236

Closed
madduck opened this issue Jan 9, 2020 · 4 comments
Closed

Please avoid the setuid chome-sandbox #1236

madduck opened this issue Jan 9, 2020 · 4 comments

Comments

@madduck
Copy link

madduck commented Jan 9, 2020

I can start an AppImage of Patchwork as non-root, so I don't understand why the Debian packaged version requires a setuid-root chrome-sandbox. Especially since I must assume that this is a Google-provided binary, there is no way I will give root permissions to this code.

@black-puppydog
Copy link
Contributor

that's a huge (and ongoing?) discussion: electron/electron#17972
I don't think anyone's really happy about the situation...

@black-puppydog
Copy link
Contributor

Actually I'd say we close this as duplicate of #1217 and rename that one to be more informative.

@christianbundy
Copy link
Contributor

Sorry you're bumping into this too @madduck. Please see Patchwork's documentation on the sandbox problem and feel free to chime in with potential solutions in #1217. I'd love all the help we can get.

@madduck
Copy link
Author

madduck commented Jan 11, 2020

Thanks guys!

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

3 participants