diff options
author | obadz <obadz-git@obadz.com> | 2016-08-06 09:13:20 +0100 |
---|---|---|
committer | obadz <obadz-git@obadz.com> | 2016-08-06 10:27:47 +0100 |
commit | 66d5edf654c6c98e3835dbee4f208794fc03c81d (patch) | |
tree | 5d10a31b734a3870a09ae060d573d3e55127241d /nixos/modules/security/chromium-suid-sandbox.nix | |
parent | 41b8c6d5a9523598d33e81e0ce7a70d02d748bb3 (diff) | |
download | nixpkgs-66d5edf654c6c98e3835dbee4f208794fc03c81d.tar nixpkgs-66d5edf654c6c98e3835dbee4f208794fc03c81d.tar.gz nixpkgs-66d5edf654c6c98e3835dbee4f208794fc03c81d.tar.bz2 nixpkgs-66d5edf654c6c98e3835dbee4f208794fc03c81d.tar.lz nixpkgs-66d5edf654c6c98e3835dbee4f208794fc03c81d.tar.xz nixpkgs-66d5edf654c6c98e3835dbee4f208794fc03c81d.tar.zst nixpkgs-66d5edf654c6c98e3835dbee4f208794fc03c81d.zip |
chromium: add nixos module security.chromiumSuidSandbox
Closes #17460 Changed the wrapper derivation to produce a second output containing the sandbox. Add a launch wrapper to try and locate the sandbox (either in /var/setuid-wrappers or in /nix/store). This launch wrapper also sheds libredirect.so from LD_PRELOAD as Chromium does not tolerate it. Does not trigger a Chromium rebuild. cc @cleverca22 @joachifm @jasom
Diffstat (limited to 'nixos/modules/security/chromium-suid-sandbox.nix')
-rw-r--r-- | nixos/modules/security/chromium-suid-sandbox.nix | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/nixos/modules/security/chromium-suid-sandbox.nix b/nixos/modules/security/chromium-suid-sandbox.nix new file mode 100644 index 00000000000..b517e879f04 --- /dev/null +++ b/nixos/modules/security/chromium-suid-sandbox.nix @@ -0,0 +1,28 @@ +{ config, lib, pkgs, ... }: + +with lib; + +let + cfg = config.security.chromiumSuidSandbox; + sandbox = pkgs.chromium.sandbox; +in +{ + options.security.chromiumSuidSandbox.enable = mkEnableOption '' + Whether to install the Chromium SUID sandbox which is an executable that + Chromium may use in order to achieve sandboxing. + + If you get the error "The SUID sandbox helper binary was found, but is not + configured correctly.", turning this on might help. + + Also, if the URL chrome://sandbox tells you that "You are not adequately + sandboxed!", turning this on might resolve the issue. + + Finally, if you have <option>security.grsecurity</option> enabled and you + use Chromium, you probably need this. + ''; + + config = mkIf cfg.enable { + environment.systemPackages = [ sandbox ]; + security.setuidPrograms = [ sandbox.passthru.sandboxExecutableName ]; + }; +} |