nixpkgs/pkgs/os-specific/linux/firejail/default.nix

82 lines
2.9 KiB
Nix
Raw Normal View History

2021-01-28 19:00:49 +00:00
{ lib, stdenv, fetchFromGitHub, fetchpatch, which, xdg-dbus-proxy, nixosTests }:
stdenv.mkDerivation rec {
pname = "firejail";
2021-02-07 23:40:58 +00:00
version = "0.9.64.4";
2021-01-28 19:00:49 +00:00
src = fetchFromGitHub {
owner = "netblue30";
repo = "firejail";
rev = version;
2021-02-07 23:40:58 +00:00
sha256 = "sha256-q/XL8cznHlUXdubUEptEAVma1jRUqFb5XcLAV0RVCzs=";
};
2021-01-28 19:00:49 +00:00
buildInputs = [ which ];
patches = [
# Adds the /nix directory when using an overlay.
# Required to run any programs under this mode.
./mount-nix-dir-on-overlay.patch
# By default fbuilder hardcodes the firejail binary to the install path.
# On NixOS the firejail binary is a setuid wrapper available in $PATH.
./fbuilder-call-firejail-on-path.patch
];
2017-07-25 11:25:40 +00:00
prePatch = ''
# Allow whitelisting ~/.nix-profile
substituteInPlace etc/firejail.config --replace \
'# follow-symlink-as-user yes' \
'follow-symlink-as-user no'
# Fix the path to 'xdg-dbus-proxy' hardcoded in the 'common.h' file
substituteInPlace src/include/common.h \
--replace '/usr/bin/xdg-dbus-proxy' '${xdg-dbus-proxy}/bin/xdg-dbus-proxy'
2017-07-25 11:25:40 +00:00
'';
preConfigure = ''
sed -e 's@/bin/bash@${stdenv.shell}@g' -i $( grep -lr /bin/bash .)
2016-02-14 13:49:27 +00:00
sed -e "s@/bin/cp@$(which cp)@g" -i $( grep -lr /bin/cp .)
'';
2014-11-02 19:59:32 +00:00
preBuild = ''
2017-06-28 19:29:17 +00:00
sed -e "s@/etc/@$out/etc/@g" -e "/chmod u+s/d" -i Makefile
2014-11-02 19:59:32 +00:00
'';
# The profile files provided with the firejail distribution include `.local`
# profile files using relative paths. The way firejail works when it comes to
# handling includes is by looking target files up in `~/.config/firejail`
# first, and then trying `SYSCONFDIR`. The latter normally points to
# `/etc/filejail`, but in the case of nixos points to the nix store. This
# makes it effectively impossible to place any profile files in
# `/etc/firejail`.
#
# The workaround applied below is by creating a set of `.local` files which
# only contain respective includes to `/etc/firejail`. This way
# `~/.config/firejail` still takes precedence, but `/etc/firejail` will also
# be searched in second order. This replicates the behaviour from
# non-nixos platforms.
#
# See https://github.com/netblue30/firejail/blob/e4cb6b42743ad18bd11d07fd32b51e8576239318/src/firejail/profile.c#L68-L83
# for the profile file lookup implementation.
postInstall = ''
for local in $(grep -Eh '^include.*local$' $out/etc/firejail/*.profile | awk '{print $2}' | sort | uniq)
do
echo "include /etc/firejail/$local" >$out/etc/firejail/$local
done
'';
firejail: disable parallel building firejail was frequently failing to build on my Hydra machine at -j16, and the error looked like a typical parallel build problem: <3>make[1]: Entering directory '/build/firejail-0.9.56/src/fcopy' <3>gcc -ggdb -O2 -DVERSION='"0.9.56"' -DPREFIX='"/nix/store/0dm1agiwiggn8pmnqkknil7mkh25il0k-firejail-0.9.56"' -DSYSCONFDIR='"/nix/store/0dm1agiwiggn8pmnqkknil7mkh25il0k-firejail-0.9.56/etc/firejail"' -DLIBDIR='"/nix/store/0dm1agiwiggn8pmnqkknil7mkh25il0k-firejail-0.9.56/lib"' -DHAVE_X11 -DHAVE_PRIVATE_HOME -DHAVE_OVERLAYFS -DHAVE_SECCOMP -DHAVE_GLOBALCFG -DHAVE_SECCOMP_H -DHAVE_CHROOT -DHAVE_NETWORK -DHAVE_USERNS -DHAVE_FILE_TRANSFER -DHAVE_WHITELIST -fstack-protector-all -D_FORTIFY_SOURCE=2 -fPIE -pie -Wformat -Wformat-security -mindirect-branch=thunk -c main.c -o main.o <3>gcc -pie -Wl,-z,relro -Wl,-z,now -lpthread -o fcopy main.o <3>make[1]: Leaving directory '/build/firejail-0.9.56/src/fcopy' <3>make -C src/fldd <3>make[1]: Entering directory '/build/firejail-0.9.56/src/fldd' <3>gcc -ggdb -O2 -DVERSION='"0.9.56"' -DPREFIX='"/nix/store/0dm1agiwiggn8pmnqkknil7mkh25il0k-firejail-0.9.56"' -DSYSCONFDIR='"/nix/store/0dm1agiwiggn8pmnqkknil7mkh25il0k-firejail-0.9.56/etc/firejail"' -DLIBDIR='"/nix/store/0dm1agiwiggn8pmnqkknil7mkh25il0k-firejail-0.9.56/lib"' -DHAVE_X11 -DHAVE_PRIVATE_HOME -DHAVE_OVERLAYFS -DHAVE_SECCOMP -DHAVE_GLOBALCFG -DHAVE_SECCOMP_H -DHAVE_CHROOT -DHAVE_NETWORK -DHAVE_USERNS -DHAVE_FILE_TRANSFER -DHAVE_WHITELIST -fstack-protector-all -D_FORTIFY_SOURCE=2 -fPIE -pie -Wformat -Wformat-security -mindirect-branch=thunk -c main.c -o main.o <3>gcc -pie -Wl,-z,relro -Wl,-z,now -lpthread -o fldd main.o ../lib/ldd_utils.o <3>make[1]: Leaving directory '/build/firejail-0.9.56/src/fldd' <3>make -C src/libpostexecseccomp <3>make[1]: Entering directory '/build/firejail-0.9.56/src/libpostexecseccomp' <3>gcc -ggdb -O2 -DVERSION='"0.9.56"' -fstack-protector-all -D_FORTIFY_SOURCE=2 -fPIC -Wformat -Wformat-security -c libpostexecseccomp.c -o libpostexecseccomp.o <3>gcc -pie -Wl,-z,relro -Wl,-z,now -shared -fPIC -z relro -o libpostexecseccomp.so libpostexecseccomp.o -ldl <3>make[1]: Leaving directory '/build/firejail-0.9.56/src/libpostexecseccomp' <3>src/fseccomp/fseccomp default seccomp <3>src/fsec-optimize/fsec-optimize seccomp <3>/nix/store/6abyjgibafsbhlc7v7lab50mb3dj81jg-bash-4.4-p23/bin/bash: src/fsec-optimize/fsec-optimize: No such file or directory <3>make: *** [Makefile:43: filters] Error 127 <3>builder for '/nix/store/30srqmpqrjyr11nhx4jbpr84m9pnmyv5-firejail-0.9.56.drv' failed with exit code 2
2018-12-17 05:55:44 +00:00
# At high parallelism, the build sometimes fails with:
# bash: src/fsec-optimize/fsec-optimize: No such file or directory
enableParallelBuilding = false;
2020-08-07 16:45:20 +00:00
passthru.tests = nixosTests.firejail;
meta = {
description = "Namespace-based sandboxing tool for Linux";
2021-01-28 19:00:49 +00:00
license = lib.licenses.gpl2Plus;
maintainers = [ lib.maintainers.raskin ];
2021-01-15 14:45:37 +00:00
platforms = lib.platforms.linux;
homepage = "https://firejail.wordpress.com/";
};
}