Closed nidamanx closed 3 years ago
I found the answer https://discourse.appimage.org/t/image-wont-install-steuid-sandbox-is-not-running-as-root/1705/2
I think, for safety reasons, could be better to add --no-sandbox while launch
./out/Google_Chrome-*-x86_64.AppImage --no-sandbox
btw, i'm searching a way to use firejail and sandbox the AppImage
Proper solution:
sysctl kernel.unprivileged_userns_clone=1
like Ubuntu does by default.
Proper solution:
sysctl kernel.unprivileged_userns_clone=1
like Ubuntu does by default.
Thanks very much. That seems the only way to use firejail and, without firejail, I would not open that kernel param at all (as Debian does by default). I'm evaluating the best choice for the super very seldom usage of that application. Thanks again
sudo sysctl kernel.unprivileged_userns_clone=1
worked for me on Debian last time I tried.
sudo sysctl kernel.unprivileged_userns_clone=1
worked for me on Debian last time I tried.
Yes, it work fine. It's only related to my way to behave. I prefer to not open something potentially dangerous only for one application (Chrome in this case). Even more for a Closed Source one. Who knows what is doing in background.
About your software. I think it's absolutely and totally great! Could be even better if there will be a way to keep all in a sandbox and with kernel privileges on.
Hi,
I followed your official procedure to install and build
The last command to run Google Chrome fails with the following error
Thanks!