-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Question/Request] Passing custom wayland socket to ego? #168
Comments
Thanks for pointing this out. There's no built in support at the moment. Seems appropriate for ego: https://wayland.app/protocols/security-context-v1 "This is intended to be used by sandboxes. Sandbox engines attach a security context to all connections coming from inside the sandbox. The compositor can then restrict the features that the sandboxed connections can use." However, it's not clear from the protocol description, what isolation improvements (if any) this will enable. If implemented, we should also register a "sandbox engine name" at https://gitlab.freedesktop.org/wayland/wayland-protocols/-/blob/main/staging/security-context/engines.md
I'm not sure. If you have a Unix socket path created by this mechanism, it should work if you point |
There are privileged wayland protocols, such as screencopy which allows for taking full desktop screenshots, and a clipboard manager protocol which allows capturing the clipboard even as an inactive client (wayland spec afaik only allows the active window to capture clipboard content). If you create a socket in a security context, these kinds of privileged protocols are not whitelisted
Works perfectly, thank you! Not sure why I didn't try this before creating the thread 😅 |
After quite a bit of experimenting, I now have a PoC that creates a functional Wayland security context (but does not use it yet). https://github.com/intgr/ego/compare/wayrs-security-context OR https://github.com/intgr/ego/compare/wayland-security-context Still needs some thinking how to properly integrate it...
|
Hello!
Now that my compositor of choice implements the security_context protocol, I'd like to be able to pass the security_context socket that I created to ego so that I can enjoy having that extra layer of security that user separation provides.
Is it possible to do this currently with ego?
If not, please consider implementing an option to maybe pass a custom path to the ego user, when you have the time. Thank you!
The text was updated successfully, but these errors were encountered: