commit
13d21e94ca
@ -0,0 +1,43 @@
|
||||
const path = require('path');
|
||||
const fs = require('fs');
|
||||
const util = require('util');
|
||||
|
||||
const renameAsync = util.promisify(fs.rename);
|
||||
const unlinkAsync = util.promisify(fs.unlink);
|
||||
|
||||
module.exports = async function(context) {
|
||||
// Replace the app launcher on linux only.
|
||||
if (process.platform !== 'linux') {
|
||||
return;
|
||||
}
|
||||
const isAppImage = context.targets.find(target => target.name === 'appImage');
|
||||
if (!isAppImage) {
|
||||
return;
|
||||
}
|
||||
// eslint-disable-next-line no-console
|
||||
console.log('afterPack hook triggered', context);
|
||||
|
||||
const executableName = context.packager.executableName;
|
||||
const sourceExecutable = path.join(context.appOutDir, executableName);
|
||||
const targetExecutable = path.join(
|
||||
context.appOutDir,
|
||||
`${executableName}-bin`
|
||||
);
|
||||
const launcherScript = path.join(
|
||||
context.appOutDir,
|
||||
'resources',
|
||||
'launcher-script.sh'
|
||||
);
|
||||
const chromeSandbox = path.join(context.appOutDir, 'chrome-sandbox');
|
||||
|
||||
return Promise.all([
|
||||
// rename session-desktop to session-desktop-bin
|
||||
renameAsync(sourceExecutable, targetExecutable),
|
||||
|
||||
// rename launcher script to session-desktop
|
||||
renameAsync(launcherScript, sourceExecutable),
|
||||
|
||||
// remove the chrome-sandbox file since we explicitly disable it
|
||||
unlinkAsync(chromeSandbox),
|
||||
]);
|
||||
};
|
@ -0,0 +1,12 @@
|
||||
#!/usr/bin/env bash
|
||||
set -e
|
||||
|
||||
# Some distributions do not have unprivileged_userns_clone disabled.
|
||||
# If that's the case, and we run an AppImage (deb is not impacted by this),
|
||||
# the app won't start unless we start it with --no-sandbox.
|
||||
# This bash script is the launcher script for AppImage only, and will at runtime check
|
||||
# if we need to add the --no-sandbox before running the AppImage itself.
|
||||
|
||||
UNPRIVILEGED_USERNS_ENABLED=$(cat /proc/sys/kernel/unprivileged_userns_clone 2>/dev/null)
|
||||
SCRIPT_DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
|
||||
exec "$SCRIPT_DIR/session-desktop-bin" "$([[ $UNPRIVILEGED_USERNS_ENABLED == 0 ]] && echo '--no-sandbox')" "$@"
|
Loading…
Reference in New Issue