I haven't seen that, Archanfel80HUN. That does sound frustrating.
Please report that to Brave directly - this is simply a repackaged version of what they produce.
Git Clone URL: | https://aur.archlinux.org/brave-nightly-bin.git (read-only, click to copy) |
---|---|
Package Base: | brave-nightly-bin |
Description: | Web browser that blocks ads and trackers by default (nightly binary release). |
Upstream URL: | https://brave.com/download-nightly |
Keywords: | brave |
Licenses: | MPL2 |
Provides: | brave-nightly-bin, brave-nightly-browser |
Submitter: | gregbunk |
Maintainer: | brave-prerelease |
Last Packager: | brave-prerelease |
Votes: | 34 |
Popularity: | 3.00 |
First Submitted: | 2019-03-28 14:18 (UTC) |
Last Updated: | 2025-03-31 15:15 (UTC) |
I haven't seen that, Archanfel80HUN. That does sound frustrating.
Please report that to Brave directly - this is simply a repackaged version of what they produce.
In the latest 2-3 updates i noticed a nasty bug. Its have a memory leak which is consumed all the available Xsocket connection. Once the maximum connection of Xorg sockets depleted nothing starts anymore and the whole system become unresponsive. The log files full of this: cannot open display: :0.0 Maximum number of clients reached
According to xrestop brave eats 190+ connection and eventually the default 256 limit reached. Revert back to the non nightly version the problem is gone.
Not seeing any glitches here, but am seeing the (annoying) warning. It appears that brave is setting that itself, when it starts the renderer processes.
I'll keep poking around.
What is going on with the latest version (1.33.25-2) since I get a warning when opening the browser:
You are using an unsupported command-line flag: --translate-security-origin=https://translate.brave.com. Stability and security will suffer."
Stability definitely suffered since the browser has weird glitches now.
Thanks gregbunk!
Thanks, wknapik. Added the chmod. It should be all set.
Doesn't work with linux-hardened, presumably because of CONFIG_USER_NS_UNPRIVILEGED!=y.
% zgrep CONFIG_USER_NS_UNPRIVILEGED /proc/config.gz
# CONFIG_USER_NS_UNPRIVILEGED is not set
% brave-nightly
[77169:77169:1021/004906.293351:FATAL:setuid_sandbox_host.cc(158)] The SUID sandbox helper binary was found, but is not configured correctly. Rather than run without sandboxing I'm aborting now. You need to make sure that /opt/brave.com/brave-nightly/chrome-sandbox is owned by root and has mode 4755.
/opt/brave.com/brave-nightly/brave-browser: line 48: 77169 Trace/breakpoint trap (core dumped) "$HERE/brave" "$@"
% ls -l /opt/brave.com/brave-nightly/chrome-sandbox
-rwxr-xr-x 1 root root 237728 Oct 20 23:31 /opt/brave.com/brave-nightly/chrome-sandbox
%
The stable package brave-bin addresses this here https://aur.archlinux.org/cgit/aur.git/tree/PKGBUILD?h=brave-bin#n51 with
# allow firejail users to get the suid sandbox working
chmod 4755 "$pkgdir/usr/lib/brave-bin/chrome-sandbox"
@gregbunk Awesome! Thanks
Sure. Added. Thanks!
Hi. Can you add custom flags support? Maybe like in brave-bin
package (https://aur.archlinux.org/cgit/aur.git/tree/brave-bin.sh?h=brave-bin)
#!/usr/bin/env bash
XDG_CONFIG_HOME="${XDG_CONFIG_HOME:-$HOME/.config}"
# Allow users to override command-line options
USER_FLAGS_FILE="$XDG_CONFIG_HOME/brave-nightly-flags.conf"
if [[ -f $USER_FLAGS_FILE ]]; then
USER_FLAGS="$(cat $USER_FLAGS_FILE | sed 's/#.*//')"
fi
exec /opt/brave.com/brave-nightly/brave-browser "$USER_FLAGS" "$BRAVE_FLAGS" "$FLAG" "$@"
Pinned Comments
brave-prerelease commented on 2025-02-06 13:55 (UTC)