-
Notifications
You must be signed in to change notification settings - Fork 585
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
nogroups still drops audio group and all other supplementary groups. #4951
Comments
I don't know why you expect that. That's not what I would expect, and it's also documented differently:
I don't think |
Lines 32 to 35 in 271edbb
👍 |
Thanks. Somehow I missed that change. We should at least fix the manpage to document this new behaviour then. |
@rusty-snake commented on Feb 16:
I should have made it clearer in there that this only applies to systems not
Again, on a system where (e)logind is running, there should be no extra group When To reiterate, udev only applies seat-based ACLs if it detects that (e)logind is Before 0.9.68, every user of e.g.: seatd would have to put I think it would be easier to explain if everyone just read the code. The Handling https://github.com/netblue30/firejail/blob/0.9.66/src/firejail/main.c#L3091-L3111 Dropping supplementary groups: https://github.com/netblue30/firejail/blob/0.9.66/src/firejail/util.c#L119-L146 This is what disables https://github.com/netblue30/firejail/blob/0.9.66/src/firejail/profile.c#L413-L422 This is what disables https://github.com/netblue30/firejail/blob/0.9.68/src/firejail/util.c#L106-L139 What do you want to do then? Drop both workarounds, including the nvidia one? That might make the code and the documentation simpler, but personally I don't |
Suddenly,
This issue occurs with librewolf.profile.
|
Suddenly, librewolf stopped requiring
|
https://git.sr.ht/~kennylevinsen/pam_uaccess replaces logind's uaccess functionality. |
This is still a problem. I use seatd and have to have It seems to me that |
I think Lines 107 to 127 in f95bbb6
is the problem. Despite my efforts to disable elogind on my system, it is still installed and running alongside seatd. However, seat-based ACL doesn't seem to be working because sway is using seatd on gentoo linux for seat management. |
elogind is not launched automatically during boot and sway login. But, it was launched at some point by some program? |
I finally figured out what launched elogind. dino.profile has the following lines that cause system d-bus to launch elogind.
After elogind appears, appimage loses access to ALSA devices and input devices with or without
in After killing elogind and deleting |
Adding
to |
What should we do about this? |
Glad that at least a workaround was found.
Checking for a path related to (e)logind is kind of a hack; it considers only The more fool-proof way to do it would be to detect whether dynamic user ACLs / Though no idea what would be the proper way to check for it. The following excerpts explain how the permissions are supposed to work with From https://wiki.archlinux.org/title/udev#Allowing_regular_users_to_use_devices:
From https://wiki.archlinux.org/title/Users_and_groups#Pre-systemd_groups:
Related:
Also, keep in mind that this may be used instead:
|
Today, I discovered that I saw
with qutebrowser.profile. mpv.profile doesn't require |
It turns out that qutebrowser.profile was dropping supplementary groups with Adding Why are supplementary groups so fragile? |
Description
I thought nogroups wasn't going to drop audio group on firejail 0.9.68.
But, I was wrong.
Steps to Reproduce
Expected behavior
Relevant supplementary groups should be preserved.
Actual behavior
Only user's primary group is preserved.
Behavior without a profile
The same
Environment
The text was updated successfully, but these errors were encountered: