mirror of
https://github.com/hyprwm/wlroots-hyprland.git
synced 2024-11-12 16:35:58 +01:00
906c0766df
This is simply a false sense of security, and is worse than just using setuid. CAP_SYS_ADMIN is an extremely serious capability that is effectively as powerful as root. It also required users to be in the input group, which allows any process to keylog the entire system.
8 lines
879 B
Meson
8 lines
879 B
Meson
option('logind', type: 'feature', value: 'auto', description: 'Enable support for rootless session via logind')
|
|
option('logind-provider', type: 'combo', choices: ['auto', 'systemd', 'elogind'], value: 'auto', description: 'Provider of logind support library')
|
|
option('xcb-errors', type: 'feature', value: 'auto', description: 'Use xcb-errors util library')
|
|
option('xcb-icccm', type: 'feature', value: 'auto', description: 'Use xcb-icccm util library')
|
|
option('xwayland', type: 'feature', value: 'auto', yield: true, description: 'Enable support for X11 applications')
|
|
option('x11-backend', type: 'feature', value: 'auto', description: 'Enable X11 backend')
|
|
option('examples', type: 'boolean', value: true, description: 'Build example applications')
|
|
option('icon_directory', description: 'Location used to look for cursors (default: ${datadir}/icons)', type: 'string', value: '')
|