-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: "No usable sandbox!" with user namespace cloning enabled #12818
Comments
I am not very familiar with how to set that up on Ubuntu and I think it's worth reaching out to an Ubuntu-specific forum if the changes in Ubuntu are the cause. Are you running Chrome for Testing or Chromium? Could you please provide a Dockerfile that demonstrates the issue since I do not have an Ubuntu available? |
@lewistg I'm pretty sure you need to either install the browser to the path whitelisted in This is how
Note that the path also allows globbing (see the linked man page). |
@johannespfrang Thank you for pointing me in the right direction. That was helpful information, and I've got something working now. Here is a little extra context: My real use case involves running Chrome/puppeteer in the context of the bazel build tool. Bazel has its own sandboxing mechanism, so when the puppeteer test gets run it will be trying to launch a Chrome binary copied to a semi-dynamic location within bazel's sandbox directory structure. I might be able to handle this with the some careful globbing, but so far I've had some luck using the
If you happen to know of any issues with this approach, please let me know. @OrKoN Thanks for the quick response. I did attempt to set up a Dockerfile in case you wanted to look further. I wasn't successful, though. I might just not know enough, but I gather AppArmor and these new security features are implemented at layers below containers. |
@OrKoN I started getting this in puppeteer-sharp. Do you know why we might not getting this in puppeteer builds? We both are using |
no idea, unfortuantely |
ubuntu-latest was pointing to 22.04 but as of today (10/15/2024) it is pointing to 24.04. I am running puppeteer in a GitHub Action and was able to see the version change in the logs. I downgraded my action to run against 22.04 (ubuntu-latest -> ubuntu-22.04). That seems to have 'fixed' the error for now or at least buys some time for me to investigate and decide how to work with the changes in ubuntu. |
It seems that puppeteer CI is still on 22.04.5. |
Opened a PR to test with 24.04 #13196 |
It fails as well. The error message seems to include instructions for Ubuntu: [2423:2423:1016/062159.567901:FATAL:zygote_host_impl_linux.cc(128)] No usable sandbox! If you are running on Ubuntu 23.10+ or another Linux distro that has disabled unprivileged user namespaces with AppArmor, see https://chromium.googlesource.com/chromium/src/+/main/docs/security/apparmor-userns-restrictions.md. Otherwise seehttps://chromium.googlesource.com/chromium/src/+/main/docs/linux/suid_sandbox_development.md for more information on developing with the (older) SUID sandbox. If you want to live dangerously and need an immediate workaround, you can try using --no-sandbox. |
For GitHub Actions, I can confirm (after testing on some hobby projects) that the temporary workaround to replace |
I solved this editing file etc/apparmor.d/unprivileged_userns profile unprivileged_userns { and adding |
• ubuntu-latest now points to ubuntu-24 • ubuntu 23 and onwards now restricts unprivileged user namespace using Canonical's AppArmor system and this disallows Chromium from setting up its sandbox. • Presently neither Chromium, Ubuntu, GitHub Actions, nor Puppeteer has included a fix. The fix requires superuser or passing --no-sandbox flag somewhere I don't want to figure out, and this should be resolved by one of the parties above, so I am pinning to ubuntu-22 for now. puppeteer/puppeteer#12818 https://chromium.googlesource.com/chromium/src/+/main/docs/security/apparmor-userns-restrictions.md
• ubuntu-latest now points to ubuntu-24 • ubuntu 23 and onwards now restricts unprivileged user namespace using Canonical's AppArmor system and this disallows Chromium from setting up its sandbox. • Presently neither Chromium, Ubuntu, GitHub Actions, nor Puppeteer has included a fix. The fix requires superuser or passing --no-sandbox flag somewhere I don't want to figure out, and this should be resolved by one of the parties above, so I am pinning to ubuntu-22 for now. puppeteer/puppeteer#12818 https://chromium.googlesource.com/chromium/src/+/main/docs/security/apparmor-userns-restrictions.md
See Puppeteer issue here: puppeteer/puppeteer#12818
puppeteer/puppeteer#12818 --- Commit: ember-learn/super-rentals-tutorial@9de8f5f Script: https://github.com/ember-learn/super-rentals-tutorial/blob/9de8f5f791454f54e6bbb04422c5c6892590f084/.github/workflows/build.yml Logs: https://github.com/ember-learn/super-rentals-tutorial/commit/9de8f5f791454f54e6bbb04422c5c6892590f084/checks
puppeteer/puppeteer#12818 --- Commit: ember-learn/super-rentals-tutorial@9de8f5f Script: https://github.com/ember-learn/super-rentals-tutorial/blob/9de8f5f791454f54e6bbb04422c5c6892590f084/.github/workflows/build.yml Logs: https://github.com/ember-learn/super-rentals-tutorial/commit/9de8f5f791454f54e6bbb04422c5c6892590f084/checks
Usable Sandbox!" See puppeteer/puppeteer#12818 (cherry picked from commit 9321b59)
Usable Sandbox!" See puppeteer/puppeteer#12818 (cherry picked from commit 9321b59)
* ci: pin browser tests to ubuntu-22.04 (puppeteer/puppeteer#12818) * ci: bump prettier_action * style: prettier code --------- Co-authored-by: bencevans <[email protected]>
…mpl_linux.cc(128)] No usable sandbox! If you are running on Ubuntu 23.10+ or another Linux distro that has disabled unprivileged user namespaces with AppArmor puppeteer/puppeteer#12818 (comment)
was going crazy with this bug. can confirm that this also worked for me. Thanks!
|
issue with puppeteer + ubuntu latest. See more: puppeteer/puppeteer#12818
* ci: update package-lock.json for dependency version bumps This commit updates the `package-lock.json` file to reflect minor and patch version upgrades for various dependencies, including @babel/runtime, @devicefarmer/adbkit, and @rollup packages, among others. These updates include improvements in licenses, integrity checks, and engine requirements. * ci: update dependencies - fixes #492 - fixes #441 - fixes #494 - fixes #411 - fixes #490 - bump vitest from 1.3.1 to 1.6.1 - bump unplugin-vue-components from 0.26.0 to 0.28.0 - bump typescript from 5.3.3 to 5.7.3 - bump @vitejs/plugin-vue from 5.0.4 to 5.2.1 - bump vite from 6.1.0 to 6.2.0 - bump vitest from 1.6.1 to 3.0.7 - bumped min node version from >=21.4.0 to >= 22.0.0 as needed for vite ^6.0.0 * fix: updated node version in test action * fix: changed workflow ubuntu version issue with puppeteer + ubuntu latest. See more: puppeteer/puppeteer#12818
We were seeing CI failing with the following error: ``` Failed to launch the browser process! [2228:2228:0202/151712.047998:FATAL:zygote_host_impl_linux.cc(128)] No usable sandbox! If you are running on Ubuntu 23.10+ or another Linux distro that has disabled unprivileged user namespaces with AppArmor, see https://chromium.googlesource.com/chromium/src/+/main/docs/security/apparmor-userns-restrictions.md. Otherwise see https://chromium.googlesource.com/chromium/src/+/main/docs/linux/suid_sandbox_development.md for more information on developing with the (older) SUID sandbox. If you want to live dangerously and need an immediate workaround, you can try using --no-sandbox. [0202/151712.056196:ERROR:file_io_posix.cc(145)] open /sys/devices/system/cpu/cpu0/cpufreq/scaling_cur_freq: No such file or directory (2) [0202/151712.056237:ERROR:file_io_posix.cc(145)] open /sys/devices/system/cpu/cpu0/cpufreq/scaling_max_freq: No such file or directory (2) TROUBLESHOOTING: https://pptr.dev/troubleshooting at ChildProcess.onClose (/home/runner/.yarn/berry/cache/@puppeteer-browsers-npm-2.4.1-11273f57b7-10c0.zip/node_modules/@puppete er/browsers/lib/cjs/launch.js:314:24) at ChildProcess.emit (node:events:531:35) at ChildProcess._handle.onexit (node:internal/child_process:294:12) ``` This commit is using the workaround described here and using an older version of the ubuntu image: puppeteer/puppeteer#12818 (comment)
Minimal, reproducible example
Background
The troubleshoot page discourages
--no-sandbox
in favor of user namespace cloning, but I'm having trouble getting it to work.I'm using Ubuntu 24.04 (kernel
6.8.0-38-generic
).As far as I can tell namespace cloning is enabled:
sudo sysctl kernel.unprivileged_userns_clone
outputskernel.unprivileged_userns_clone = 1
.(From what I understand, Ubuntu 24.04 has implemented stronger restrictions around unprivileged user namespaces, but I can only guess at if this issue is a side-effect effect of those changes.)
Expectation
Browser launches
Reality
Am getting the following error:
Puppeteer configuration file (if used)
No response
Puppeteer version
22.13.1
Node version
18.19.1
Package manager
yarn
Package manager version
1.15.2
Operating system
Linux
The text was updated successfully, but these errors were encountered: