Déan comparáid idir tiomáintí
3 Tiomáintí
67189f34c6
...
v0.2
Údar | SHA1 | Dáta | |
---|---|---|---|
fc92b963d4 | |||
9acbd5dccf | |||
87ebc137d5 |
11
.gitignore
curtha ar fáil
Comhad gnáth
11
.gitignore
curtha ar fáil
Comhad gnáth
@ -0,0 +1,11 @@
|
||||
.user
|
||||
.o
|
||||
*.user
|
||||
*.o
|
||||
*.a
|
||||
moc_*.cpp
|
||||
moc_*.h
|
||||
Makefile
|
||||
cli/looqs
|
||||
gui/looqs-gui
|
||||
qrc_*
|
@ -1,5 +1,10 @@
|
||||
# looqs: Release notes
|
||||
|
||||
## 2022-06-07 - v0.2
|
||||
CHANGES:
|
||||
- Sandboxing: Add environment variable `LOOQS_DISABLE_SANDBOXING` to disable sandboxing. This is intended for troubleshooting
|
||||
- Sandboxing: Fix issue where activation failed on kernels without landlock
|
||||
|
||||
## 2022-06-06 - v0.1
|
||||
The first release comes with basic functionality. It's a start that can be considered useful to some degree.
|
||||
|
||||
|
@ -12,6 +12,8 @@ The architecture ensures that the parsing of documents and the preview generatio
|
||||
|
||||
Qt code is considered trusted in this model. While one may critize this, it was the only practical solution. looqs uses its serialization mechanism and other classes to communicate between the non-sandboxed GUI process and the sandboxed processes.
|
||||
|
||||
Set the enviornment variable `LOOQS_DISABLE_SANDBOX=1` to disable sandboxing. It's intended for troublehshooting.
|
||||
|
||||
## Database
|
||||
The heart is sqlite, with the FTS5 extensions behind the full-text search. I definitly did not
|
||||
want to run some heavy Java based solutions. I explored other options like Postgresql, I've discard them due to some limitations back then.
|
||||
|
@ -30,7 +30,7 @@ There is no need to write the long form of filters. There are also booleans avai
|
||||
|
||||
|
||||
## Current status
|
||||
Last version: 2022-06-06, v0.1
|
||||
Last version: 2022-06-07, v0.2
|
||||
|
||||
Please see [Changelog](CHANGELOG.md) for a human readable list of changes.
|
||||
|
||||
|
@ -58,7 +58,14 @@ int main(int argc, char *argv[])
|
||||
if(arg == "ipc")
|
||||
{
|
||||
Common::setupAppInfo();
|
||||
enableIpcSandbox();
|
||||
if(Common::noSandboxModeRequested())
|
||||
{
|
||||
qInfo() << "Launching with no sandbox!" << Qt::endl;
|
||||
}
|
||||
else
|
||||
{
|
||||
enableIpcSandbox();
|
||||
}
|
||||
QApplication a(argc, argv);
|
||||
|
||||
IpcServer *ipcserver = new IpcServer();
|
||||
|
@ -157,6 +157,16 @@ QString Common::databasePath()
|
||||
return env;
|
||||
}
|
||||
|
||||
bool Common::noSandboxModeRequested()
|
||||
{
|
||||
QString env = getenv("LOOQS_DISABLE_SANDBOX");
|
||||
if(env == "1")
|
||||
{
|
||||
return true;
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
QString Common::ipcSocketPath()
|
||||
{
|
||||
return "/tmp/.looqs/looqs-ipc-socket";
|
||||
|
@ -15,6 +15,7 @@ QStringList excludedPaths();
|
||||
QStringList mountPaths();
|
||||
bool isTextFile(QFileInfo fileInfo);
|
||||
bool isMountPath(QString path);
|
||||
bool noSandboxModeRequested();
|
||||
QString versionText();
|
||||
} // namespace Common
|
||||
#endif
|
||||
|
@ -27,6 +27,11 @@ static QMap<QString, Processor *> processors{
|
||||
|
||||
void SandboxedProcessor::enableSandbox(QString readablePath)
|
||||
{
|
||||
if(Common::noSandboxModeRequested())
|
||||
{
|
||||
qInfo() << "Sandbox is disabled!" << Qt::endl;
|
||||
return;
|
||||
}
|
||||
struct exile_policy *policy = exile_init_policy();
|
||||
if(policy == NULL)
|
||||
{
|
||||
|
Tagairt in Eagrán Nua
Cuir bac ar úsáideoir