- cross-posted to:
- opensource@lemmy.ml
- browsers@lemmy.ml
- technology@lemmy.ml
- cross-posted to:
- opensource@lemmy.ml
- browsers@lemmy.ml
- technology@lemmy.ml
Ive been trying to get this to work on Ubuntu and it seems to not work. Has anyone tried Nyxt?
Ive been trying to get this to work on Ubuntu and it seems to not work. Has anyone tried Nyxt?
In addition, on that website under “Manual>Troubleshooting”, the manual states the following:
Bwrap error on initialization (Ubuntu)
If Nyxt crashes on start due to bwrap, then disable or configure the apparmor service.
This vague wording is terrible advice. Disabling AppArmor outright destroys Snap sandboxing and the general security of your operating system. Configuring AppArmor is a better option, but a specific should be given as an example.
For example, from the readme file on Cromite’s Github repo:
“”" 1. Creating an apparmor profile for cromite
Create
/etc/apparmor.d/chrome
, and write:abi <abi/4.0>,
include <tunables/global>
profile cromite /home/user/cromite/chrome-lin/chrome flags=(unconfined) {
userns,
include if exists <local/chrome>
}
replacing the cromite binary path with where you have placed cromite.
Now, run
sudo apparmor_parser -r /etc/apparmor.d/cromite
to apply the changes.2. Disabling the restriction until next reboot
sudo sysctl -w kernel.apparmor_restrict_unprivileged_userns=0
3. Disabling the restriction permanently
Add
kernel.apparmor_restrict_unprivileged_userns=0
to the file/etc/sysctl.d 60-apparmor-namespace.conf
. Create the file if not exists. “”"EDIT: I hate trying to get Lemmy to format multiline code blocks.