Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Bug]: "No usable sandbox!" with user namespace cloning enabled #12818

Closed
lewistg opened this issue Jul 24, 2024 · 14 comments
Closed

[Bug]: "No usable sandbox!" with user namespace cloning enabled #12818

lewistg opened this issue Jul 24, 2024 · 14 comments

Comments

@lewistg
Copy link

lewistg commented Jul 24, 2024

Minimal, reproducible example

import puppeteer from 'puppeteer';

const browser = await puppeteer.launch(); // Fails

const page = await browser.newPage();
await page.setContent('<div>test</div>');

Background

The troubleshoot page discourages --no-sandbox in favor of user namespace cloning, but I'm having trouble getting it to work.

I'm using Ubuntu 24.04 (kernel 6.8.0-38-generic).

As far as I can tell namespace cloning is enabled: sudo sysctl kernel.unprivileged_userns_clone outputs kernel.unprivileged_userns_clone = 1.

(From what I understand, Ubuntu 24.04 has implemented stronger restrictions around unprivileged user namespaces, but I can only guess at if this issue is a side-effect effect of those changes.)

Expectation

Browser launches

Reality

Am getting the following error:

file:///home/dev/puppeteer-test/node_modules/@puppeteer/browsers/lib/esm/launch.js:301
                reject(new Error([
                       ^

Error: Failed to launch the browser process!
[421602:421602:0723/183305.941550:FATAL:zygote_host_impl_linux.cc(126)] No usable sandbox! Update your kernel or see https://chromium.googlesource.com/chromium/src/+/main/docs/linux/suid_sandbox_development.md for more information on developing with the SUID sandbox. If you want to live dangerously and need an immediate workaround, you can try using --no-sandbox.


TROUBLESHOOTING: https://pptr.dev/troubleshooting

    at ChildProcess.onClose (file:///home/dev/puppeteer-test/node_modules/@puppeteer/browsers/lib/esm/launch.js:301:24)
    at ChildProcess.emit (node:events:529:35)
    at ChildProcess._handle.onexit (node:internal/child_process:292:12)

Node.js v18.19.1

Puppeteer configuration file (if used)

No response

Puppeteer version

22.13.1

Node version

18.19.1

Package manager

yarn

Package manager version

1.15.2

Operating system

Linux

@OrKoN
Copy link
Collaborator

OrKoN commented Jul 24, 2024

I am not very familiar with how to set that up on Ubuntu and I think it's worth reaching out to an Ubuntu-specific forum if the changes in Ubuntu are the cause. Are you running Chrome for Testing or Chromium? Could you please provide a Dockerfile that demonstrates the issue since I do not have an Ubuntu available?

@johannespfrang
Copy link

johannespfrang commented Jul 24, 2024

@lewistg I'm pretty sure you need to either install the browser to the path whitelisted in /etc/apparmor.d/chrome, or create a new AppArmor profile with the actual install path. See also this article about the same issue regarding Firefox:
https://support.mozilla.org/en-US/kb/install-firefox-linux#w_security-features-warning (the formatting of the file quoted there is broken; refer to the format of the files on your machine and described in the man page)

This is how /etc/apparmor.d/chrome looks on my Ubuntu 24.04 installation:

# This profile allows everything and only exists to give the
# application a name instead of having the label "unconfined"

abi <abi/4.0>,
include <tunables/global>

profile chrome /opt/google/chrome/chrome flags=(unconfined) {
  userns,

  # Site-specific additions and overrides. See local/README for details.
  include if exists <local/chrome>
}

Note that the path also allows globbing (see the linked man page).

@lewistg
Copy link
Author

lewistg commented Jul 25, 2024

@johannespfrang Thank you for pointing me in the right direction. That was helpful information, and I've got something working now.

Here is a little extra context: My real use case involves running Chrome/puppeteer in the context of the bazel build tool. Bazel has its own sandboxing mechanism, so when the puppeteer test gets run it will be trying to launch a Chrome binary copied to a semi-dynamic location within bazel's sandbox directory structure. I might be able to handle this with the some careful globbing, but so far I've had some luck using the app-exec command with a simple wrapper script like this one:

#!/bin/bash

# Run chrome from dynamic location using the default "chrome" profile from `/etc/apparmor.d/chrome`
aa-exec -p chrome -- "$DYNAMIC_PATH/chrome" "$@"

If you happen to know of any issues with this approach, please let me know.

@OrKoN Thanks for the quick response. I did attempt to set up a Dockerfile in case you wanted to look further. I wasn't successful, though. I might just not know enough, but I gather AppArmor and these new security features are implemented at layers below containers.

@kblok
Copy link
Contributor

kblok commented Oct 15, 2024

@OrKoN I started getting this in puppeteer-sharp. Do you know why we might not getting this in puppeteer builds? We both are using ubuntu-latest

@OrKoN
Copy link
Collaborator

OrKoN commented Oct 15, 2024

@OrKoN I started getting this in puppeteer-sharp. Do you know why we might not getting this in puppeteer builds? We both are using ubuntu-latest

no idea, unfortuantely

@prettyClouds
Copy link

ubuntu-latest was pointing to 22.04 but as of today (10/15/2024) it is pointing to 24.04. I am running puppeteer in a GitHub Action and was able to see the version change in the logs.

I downgraded my action to run against 22.04 (ubuntu-latest -> ubuntu-22.04). That seems to have 'fixed' the error for now or at least buys some time for me to investigate and decide how to work with the changes in ubuntu.

@OrKoN
Copy link
Collaborator

OrKoN commented Oct 16, 2024

It seems that puppeteer CI is still on 22.04.5.

@OrKoN
Copy link
Collaborator

OrKoN commented Oct 16, 2024

Opened a PR to test with 24.04 #13196

@OrKoN
Copy link
Collaborator

OrKoN commented Oct 16, 2024

It fails as well. The error message seems to include instructions for Ubuntu:

[2423:2423:1016/062159.567901:FATAL:zygote_host_impl_linux.cc(128)] No usable sandbox! If you are running on Ubuntu 23.10+ or another Linux distro that has disabled unprivileged user namespaces with AppArmor, see https://chromium.googlesource.com/chromium/src/+/main/docs/security/apparmor-userns-restrictions.md. Otherwise seehttps://chromium.googlesource.com/chromium/src/+/main/docs/linux/suid_sandbox_development.md for more information on developing with the (older) SUID sandbox. If you want to live dangerously and need an immediate workaround, you can try using --no-sandbox.

@OrKoN
Copy link
Collaborator

OrKoN commented Oct 16, 2024

Filed https://crbug.com/373753919

@mathiasbynens
Copy link
Member

For GitHub Actions, I can confirm (after testing on some hobby projects) that the temporary workaround to replace runs-on: ubuntu-latest with runs-on: ubuntu-22.04 works.

@ZETECdev
Copy link

I solved this editing file etc/apparmor.d/unprivileged_userns

profile unprivileged_userns {
#audit deny capability, <-- commented

and adding
capability sys_admin,
capability sys_chroot,
capability sys_ptrace,
capability ipc_lock,
capability sys_resource,

FabulousCupcake added a commit to sphiria/gbf-wiki-opengraph that referenced this issue Dec 16, 2024
• ubuntu-latest now points to ubuntu-24
• ubuntu 23 and onwards now restricts unprivileged user namespace using Canonical's AppArmor system and this disallows Chromium from setting up its sandbox.
• Presently neither Chromium, Ubuntu, GitHub Actions, nor Puppeteer has included a fix.

The fix requires superuser or passing --no-sandbox flag somewhere I don't want to figure out, and this should be resolved by one of the parties above, so I am pinning to ubuntu-22 for now.

puppeteer/puppeteer#12818
https://chromium.googlesource.com/chromium/src/+/main/docs/security/apparmor-userns-restrictions.md
FabulousCupcake added a commit to sphiria/gbf-wiki-opengraph that referenced this issue Dec 16, 2024
• ubuntu-latest now points to ubuntu-24
• ubuntu 23 and onwards now restricts unprivileged user namespace using Canonical's AppArmor system and this disallows Chromium from setting up its sandbox.
• Presently neither Chromium, Ubuntu, GitHub Actions, nor Puppeteer has included a fix.

The fix requires superuser or passing --no-sandbox flag somewhere I don't want to figure out, and this should be resolved by one of the parties above, so I am pinning to ubuntu-22 for now.

puppeteer/puppeteer#12818
https://chromium.googlesource.com/chromium/src/+/main/docs/security/apparmor-userns-restrictions.md
Tellus pushed a commit to qualweb/qualweb that referenced this issue Dec 17, 2024
kategengler added a commit to ember-learn/super-rentals-tutorial that referenced this issue Dec 17, 2024
kategengler added a commit to ember-learn/super-rentals-tutorial that referenced this issue Dec 17, 2024
SudharakaP added a commit to OpenArchitex/Caerus that referenced this issue Dec 20, 2024
kategengler added a commit to emberjs/ember.js that referenced this issue Jan 17, 2025
kategengler added a commit to emberjs/ember.js that referenced this issue Jan 18, 2025
kategengler added a commit to emberjs/ember.js that referenced this issue Jan 18, 2025
bencevans added a commit to node-influx/node-influx that referenced this issue Jan 22, 2025
github-merge-queue bot pushed a commit to node-influx/node-influx that referenced this issue Jan 22, 2025
* ci: pin browser tests to ubuntu-22.04 (puppeteer/puppeteer#12818)

* ci: bump prettier_action

* style: prettier code

---------

Co-authored-by: bencevans <[email protected]>
NMFR added a commit to NMFR/cv that referenced this issue Jan 24, 2025
…mpl_linux.cc(128)] No usable sandbox! If you are running on Ubuntu 23.10+ or another Linux distro that has disabled unprivileged user namespaces with AppArmor

puppeteer/puppeteer#12818 (comment)
domoritz added a commit to vega/vega-lite that referenced this issue Jan 29, 2025
SkYNewZ added a commit to SkYNewZ/mft that referenced this issue Jan 30, 2025
@Kamiikaze
Copy link

was going crazy with this bug. can confirm that this also worked for me. Thanks!

For GitHub Actions, I can confirm (after testing on some hobby projects) that the temporary workaround to replace runs-on: ubuntu-latest with runs-on: ubuntu-22.04 works.

Kamiikaze added a commit to danielptv/bookmark-bar-switcher that referenced this issue Feb 26, 2025
issue with puppeteer + ubuntu latest. See more: puppeteer/puppeteer#12818
Kamiikaze added a commit to danielptv/bookmark-bar-switcher that referenced this issue Feb 26, 2025
* ci: update package-lock.json for dependency version bumps

This commit updates the `package-lock.json` file to reflect minor and patch version upgrades for various dependencies, including @babel/runtime, @devicefarmer/adbkit, and @rollup packages, among others. These updates include improvements in licenses, integrity checks, and engine requirements.

* ci: update dependencies

- fixes #492
- fixes #441
- fixes #494
- fixes #411
- fixes #490
- bump vitest from 1.3.1 to 1.6.1
- bump unplugin-vue-components from 0.26.0 to 0.28.0
- bump typescript from 5.3.3 to 5.7.3
- bump @vitejs/plugin-vue from 5.0.4 to 5.2.1
- bump vite from 6.1.0 to 6.2.0
- bump vitest from 1.6.1 to 3.0.7
- bumped min node version from >=21.4.0 to >= 22.0.0 as needed for vite ^6.0.0

* fix: updated node version in test action

* fix: changed workflow ubuntu version

issue with puppeteer + ubuntu latest. See more: puppeteer/puppeteer#12818
MarkusBordihn added a commit to google/coding-with-chrome that referenced this issue Mar 21, 2025
hockeybuggy added a commit to hockeybuggy/hockeybuggy.com that referenced this issue Apr 2, 2025
We were seeing CI failing with the following error:

```
Failed to launch the browser process!
  [2228:2228:0202/151712.047998:FATAL:zygote_host_impl_linux.cc(128)] No usable sandbox! If you are running on Ubuntu 23.10+ or
  another Linux distro that has disabled unprivileged user namespaces with AppArmor, see
  https://chromium.googlesource.com/chromium/src/+/main/docs/security/apparmor-userns-restrictions.md. Otherwise see
  https://chromium.googlesource.com/chromium/src/+/main/docs/linux/suid_sandbox_development.md for more information on developing
  with the (older) SUID sandbox. If you want to live dangerously and need an immediate workaround, you can try using --no-sandbox.
  [0202/151712.056196:ERROR:file_io_posix.cc(145)] open /sys/devices/system/cpu/cpu0/cpufreq/scaling_cur_freq: No such file or
  directory (2)
  [0202/151712.056237:ERROR:file_io_posix.cc(145)] open /sys/devices/system/cpu/cpu0/cpufreq/scaling_max_freq: No such file or
  directory (2)

  TROUBLESHOOTING: https://pptr.dev/troubleshooting

      at ChildProcess.onClose (/home/runner/.yarn/berry/cache/@puppeteer-browsers-npm-2.4.1-11273f57b7-10c0.zip/node_modules/@puppete
  er/browsers/lib/cjs/launch.js:314:24)
      at ChildProcess.emit (node:events:531:35)
      at ChildProcess._handle.onexit (node:internal/child_process:294:12)
```

This commit is using the workaround described here and using an older version of the ubuntu image: puppeteer/puppeteer#12818 (comment)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

9 participants