View previous topic :: View next topic |
Author |
Message |
BraniggansLaw n00b
Joined: 17 Sep 2022 Posts: 10
|
Posted: Sat Dec 03, 2022 1:22 am Post subject: Seatd, Pipewire and Vivaldi |
|
|
So for autistic reasons I'm running a mostly systemd-less system (just udev). I use sway with seatd and pipewire with the sound-server and pipewire-alsa use flags set (no elogind/pulseaudio flag). Pulseaudio and elogind are not installed. The pipewire daemon is started the usual way in my Sway config. Audio works for mpv (built with pipewire suport) however it does not work for vivaldi. My asoundrc is correctly set up.
I suspected this was due to the lack of elogind with pipewire to allow vivaldi access to my audio devices (though I don't really have a good understanding of how such things work). So I altered the seatd init.d script to start it with the user owning the seatd socket rather than the video group (which is the default). Now sound works on vivaldi but I feel like this is probably a bad/insecure solution to the problem.
Any advice on whether or not I should continue to run my laptop like this? Is it safe? Or should I be able to have audio on vivaldi without having to jump through such hoops? |
|
Back to top |
|
|
RayDude Advocate
Joined: 29 May 2004 Posts: 2052 Location: San Jose, CA
|
Posted: Mon Dec 05, 2022 6:09 pm Post subject: |
|
|
Just a stab in the dark here.
Is your regular user in the audio group?
me@threads ~ $ groups
disk uucp audio dialout video netdev qemu kvm libvirt usb users portage plugdev vboxusers locate _________________ Some day there will only be free software. |
|
Back to top |
|
|
BraniggansLaw n00b
Joined: 17 Sep 2022 Posts: 10
|
Posted: Fri Dec 09, 2022 11:58 pm Post subject: |
|
|
Yes, though I'm not in the plugdev group. |
|
Back to top |
|
|
Hu Moderator
Joined: 06 Mar 2007 Posts: 21490
|
Posted: Sat Dec 10, 2022 12:10 am Post subject: |
|
|
RayDude wrote: | me@threads ~ $ groups
disk | This is dangerous. Membership in the disk group allows users to bypass access controls and write to raw disk devices. This can be used to bypass security on unencrypted disks, by directly rewriting suid files. |
|
Back to top |
|
|
RayDude Advocate
Joined: 29 May 2004 Posts: 2052 Location: San Jose, CA
|
Posted: Sat Dec 10, 2022 5:06 pm Post subject: |
|
|
Hu wrote: | RayDude wrote: | me@threads ~ $ groups
disk | This is dangerous. Membership in the disk group allows users to bypass access controls and write to raw disk devices. This can be used to bypass security on unencrypted disks, by directly rewriting suid files. |
Thanks.
I set that up because I was writing external drives used in ARM development.
I don't need it anymore and I'll remove it. _________________ Some day there will only be free software. |
|
Back to top |
|
|
|