summaryrefslogtreecommitdiff
path: root/chrome-wrapper
diff options
context:
space:
mode:
Diffstat (limited to 'chrome-wrapper')
-rw-r--r--chrome-wrapper38
1 files changed, 38 insertions, 0 deletions
diff --git a/chrome-wrapper b/chrome-wrapper
new file mode 100644
index 0000000..10e983d
--- /dev/null
+++ b/chrome-wrapper
@@ -0,0 +1,38 @@
+#!/bin/bash
+#
+# Copyright (c) 2011 The Chromium Authors. All rights reserved.
+# Use of this source code is governed by a BSD-style license that can be
+# found in the LICENSE file.
+
+# Let the wrapped binary know that it has been run through the wrapper.
+export CHROME_WRAPPER="`readlink -f "$0"`"
+
+HERE="`dirname "$CHROME_WRAPPER"`"
+
+# Always use our versions of ffmpeg libs.
+# This also makes RPMs find the compatibly-named library symlinks.
+export LD_LIBRARY_PATH="$HERE${LD_LIBRARY_PATH:+:$LD_LIBRARY_PATH}"
+
+export CHROME_VERSION_EXTRA="stable"
+
+# We don't want bug-buddy intercepting our crashes. http://crbug.com/24120
+export GNOME_DISABLE_CRASH_DIALOG=SET_BY_GOOGLE_CHROME
+
+# Allow root usage
+no_sandbox=
+if [ "`id -u`" == "0" ]; then
+ no_sandbox=--no-sandbox
+fi
+# If uname is riscv64, then allow usage too
+if [ "`uname -m`" == "riscv64" ]; then
+ no_sandbox=--no-sandbox
+fi
+
+# Sanitize std{in,out,err} because they'll be shared with untrusted child
+# processes (http://crbug.com/376567).
+exec < /dev/null
+exec > >(exec cat)
+exec 2> >(exec cat >&2)
+
+# Note: exec -a below is a bashism.
+exec -a "$0" "$HERE/chrome" $no_sandbox "$@"