summary refs log tree commit diff
path: root/nixos/modules/security/chromium-suid-sandbox.nix
diff options
context:
space:
mode:
authorobadz <obadz-git@obadz.com>2016-08-06 09:13:20 +0100
committerobadz <obadz-git@obadz.com>2016-08-06 10:27:47 +0100
commit66d5edf654c6c98e3835dbee4f208794fc03c81d (patch)
tree5d10a31b734a3870a09ae060d573d3e55127241d /nixos/modules/security/chromium-suid-sandbox.nix
parent41b8c6d5a9523598d33e81e0ce7a70d02d748bb3 (diff)
downloadnixpkgs-66d5edf654c6c98e3835dbee4f208794fc03c81d.tar
nixpkgs-66d5edf654c6c98e3835dbee4f208794fc03c81d.tar.gz
nixpkgs-66d5edf654c6c98e3835dbee4f208794fc03c81d.tar.bz2
nixpkgs-66d5edf654c6c98e3835dbee4f208794fc03c81d.tar.lz
nixpkgs-66d5edf654c6c98e3835dbee4f208794fc03c81d.tar.xz
nixpkgs-66d5edf654c6c98e3835dbee4f208794fc03c81d.tar.zst
nixpkgs-66d5edf654c6c98e3835dbee4f208794fc03c81d.zip
chromium: add nixos module security.chromiumSuidSandbox
Closes #17460

Changed the wrapper derivation to produce a second output containing the sandbox.
Add a launch wrapper to try and locate the sandbox (either in /var/setuid-wrappers or in /nix/store).
This launch wrapper also sheds libredirect.so from LD_PRELOAD as Chromium does not tolerate it.

Does not trigger a Chromium rebuild.

cc @cleverca22 @joachifm @jasom
Diffstat (limited to 'nixos/modules/security/chromium-suid-sandbox.nix')
-rw-r--r--nixos/modules/security/chromium-suid-sandbox.nix28
1 files changed, 28 insertions, 0 deletions
diff --git a/nixos/modules/security/chromium-suid-sandbox.nix b/nixos/modules/security/chromium-suid-sandbox.nix
new file mode 100644
index 00000000000..b517e879f04
--- /dev/null
+++ b/nixos/modules/security/chromium-suid-sandbox.nix
@@ -0,0 +1,28 @@
+{ config, lib, pkgs, ... }:
+
+with lib;
+
+let
+  cfg     = config.security.chromiumSuidSandbox;
+  sandbox = pkgs.chromium.sandbox;
+in
+{
+  options.security.chromiumSuidSandbox.enable = mkEnableOption ''
+    Whether to install the Chromium SUID sandbox which is an executable that
+    Chromium may use in order to achieve sandboxing.
+
+    If you get the error "The SUID sandbox helper binary was found, but is not
+    configured correctly.", turning this on might help.
+
+    Also, if the URL chrome://sandbox tells you that "You are not adequately
+    sandboxed!", turning this on might resolve the issue.
+
+    Finally, if you have <option>security.grsecurity</option> enabled and you
+    use Chromium, you probably need this.
+  '';
+
+  config = mkIf cfg.enable {
+    environment.systemPackages = [ sandbox ];
+    security.setuidPrograms    = [ sandbox.passthru.sandboxExecutableName ];
+  };
+}