summary refs log tree commit diff
path: root/nixos/modules/security/chromium-suid-sandbox.nix
Commit message (Collapse)AuthorAge
* nixos: explicitely set security.wrappers ownershiprnhmjoj2021-09-13
| | | | | This is slightly more verbose and inconvenient, but it forces you to think about what the wrapper ownership and permissions will be.
* nixos/treewide: Move rename.nix imports to their respective modulesSilvan Mosberger2019-12-10
| | | | | | | | A centralized list for these renames is not good because: - It breaks disabledModules for modules that have a rename defined - Adding/removing renames for a module means having to find them in the central file - Merge conflicts due to multiple people editing the central file
* treewide: remove redundant quotesvolth2019-08-26
|
* nixos/chromium-suid-sandbox: remove reference to grsecurityJoachim Fasting2017-09-02
|
* More derpParnell Springmeyer2017-01-29
|
* Addressing PR feedbackParnell Springmeyer2017-01-28
|
* Updatig the chromium-suid-sandbox moduleParnell Springmeyer2016-09-01
|
* chromium-suid-sandbox module: fix descriptionNikolay Amiantov2016-08-08
|
* chromium: add nixos module security.chromiumSuidSandboxobadz2016-08-06
Closes #17460 Changed the wrapper derivation to produce a second output containing the sandbox. Add a launch wrapper to try and locate the sandbox (either in /var/setuid-wrappers or in /nix/store). This launch wrapper also sheds libredirect.so from LD_PRELOAD as Chromium does not tolerate it. Does not trigger a Chromium rebuild. cc @cleverca22 @joachifm @jasom