-
-
Notifications
You must be signed in to change notification settings - Fork 83
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
socket perms for system-wide access ? #231
Comments
adding suid to rpm post-install
so that, with above config,
does the trick. if only as a workaround ... |
Can you share your working branch or code so I can try to reproduce it over here? |
fwiw, very WIP for builds @ Fedora, https://pagure.io/pgnd/ydotool-pgnd/tree/main seems to behave as built --- with the 'expanded' socket perms, as above. biggest issue is assigning a 'hotkey' trigger in KDE to ydotool scripts; but that appears to be a KDE problem ... |
i've built/installed ydotool from src
i'm working on the required socket perms, hoping to harden access
it's launched via systemd
it's up
my local desktop and
ydotool
users have been added to theinput
groupat shell, as my user,
fails with
if i open the sock's perms
then exec of
types, as intended,
also,
users
ydotool
&pgnd
, both as members ofinput
group, should have equivalent r/w perms for the socket, no?am i missing a config/assumption re: needed perms?
The text was updated successfully, but these errors were encountered: