Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[chrome-headless] The SUID sandbox helper binary was found, but is not configured correctly #40

Closed
zackw opened this issue Oct 25, 2018 · 4 comments · Fixed by #42
Closed

Comments

@zackw
Copy link

zackw commented Oct 25, 2018

Attempting to run the current version of the chrome-headless image fails with this error:

[1:1:1025/214033.788392:FATAL:setuid_sandbox_host.cc(157)] The SUID sandbox helper binary was found, but is not configured correctly. Rather than run without sandboxing I'm aborting now. You need to make sure that /opt/google/chrome/chrome-sandbox is owned by root and has mode 4755.

I believe this is because the Dockerfile forcibly overrides ownership of the contents of /opt/google/chrome and thus clears the set-id bit on /opt/google/chrome/chrome-sandbox. That directory belongs to the google-chrome-stable package, so it shouldn't need its ownership changed.

Deleting the line

&& mkdir -p /opt/google/chrome && chown -R chrome:chrome /opt/google/chrome

(and the backslash at the end of the previous line) from the Dockerfile produces an image that works, at least in --cap-add=SYS_ADMIN mode. (I've never been able to get the seccomp approach to do anything other than crash on startup.)

@dejanzelic
Copy link

Ran into the same thing, your solution worked for me as well

@seyfer
Copy link
Contributor

seyfer commented Dec 30, 2018

docker logs 7f12905ee2a4
[1230/203559.326607:FATAL:setuid_sandbox_host.cc(157)] The SUID sandbox helper binary was found, but is not configured correctly. Rather than run without sandboxing I'm aborting now. You need to make sure that /opt/google/chrome/chrome-sandbox is owned by root and has mode 4755.
Failed to generate minidump.

same for me

seyfer added a commit to seyfer/dockerfiles that referenced this issue Dec 30, 2018
Fix justinribeiro#40

add no interactive mode.
@zantiu
Copy link

zantiu commented Apr 25, 2019

I have the same problem, but only on Centos. On Windows it runs fine. Both in --cap-add=SYS_ADMIN mode.

@zackw
Copy link
Author

zackw commented May 3, 2019

@zantiu Yes, this is a Unix-specific issue. Neither set-uid helper binaries nor --cap-add=SYS_ADMIN are meaningful on Windows, as far as I know.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants