#!/bin/bash # Post-installation script for ClawX on Linux set -e # Update desktop database if command -v update-desktop-database &> /dev/null; then update-desktop-database -q /usr/share/applications || true fi # Update icon cache if command -v gtk-update-icon-cache &> /dev/null; then gtk-update-icon-cache -q /usr/share/icons/hicolor || true fi # Create symbolic link for ClawX app binary if [ -x /opt/ClawX/clawx ]; then ln -sf /opt/ClawX/clawx /usr/local/bin/clawx 2>/dev/null || true fi # Create symbolic link for openclaw CLI OPENCLAW_WRAPPER="/opt/ClawX/resources/cli/openclaw" if [ -f "$OPENCLAW_WRAPPER" ]; then chmod +x "$OPENCLAW_WRAPPER" 2>/dev/null || true ln -sf "$OPENCLAW_WRAPPER" /usr/local/bin/openclaw 2>/dev/null || true fi # Set chrome-sandbox permissions. # On systems without working user namespaces, the SUID bit is required. # On Ubuntu 24.04+, user namespaces are available but blocked by AppArmor; # we rely on the AppArmor profile below instead, so 0755 is correct there. if ! { [[ -L /proc/self/ns/user ]] && unshare --user true; }; then # No user namespace support — fall back to SUID sandbox chmod 4755 '/opt/ClawX/chrome-sandbox' || true else chmod 0755 '/opt/ClawX/chrome-sandbox' || true fi # Install AppArmor profile (Ubuntu 24.04+). # Ubuntu 24.04 enables kernel.apparmor_restrict_unprivileged_userns=1 by default, # which blocks Electron's sandbox. The bundled AppArmor profile grants the 'userns' # permission so the app can create user namespaces without disabling the global policy. # # We first check if AppArmor is enabled and if the running version supports abi/4.0 # (Ubuntu 22.04 does not; it runs fine without the profile, so we skip it there). if apparmor_status --enabled > /dev/null 2>&1; then APPARMOR_PROFILE_SOURCE='/opt/ClawX/resources/apparmor-profile' APPARMOR_PROFILE_TARGET='/etc/apparmor.d/clawx' if apparmor_parser --skip-kernel-load --debug "$APPARMOR_PROFILE_SOURCE" > /dev/null 2>&1; then cp -f "$APPARMOR_PROFILE_SOURCE" "$APPARMOR_PROFILE_TARGET" # Skip live-loading in a chroot environment (e.g. image-building pipelines). if ! { [ -x '/usr/bin/ischroot' ] && /usr/bin/ischroot; } && hash apparmor_parser 2>/dev/null; then apparmor_parser --replace --write-cache --skip-read-cache "$APPARMOR_PROFILE_TARGET" fi else echo "Skipping AppArmor profile installation: this version of AppArmor does not support the bundled profile" fi fi echo "ClawX has been installed successfully."