Post marked as solved
Click to stop watching this thread.
You have stopped watching this post. Click to start watching again.
Post marked as solved with 4 replies, 0 views
Replied In
allow setugid with sandbox-exec
Ok, I found a way. If sandbox-exec calls Chrome directly, things break, but calling a wrapper that then calls Chrome is ok:
(version 1)
(allow default)
(allow network*)
(deny file* (subpath "/Users/nicolas"))
(allow file-read-metadata (subpath "/Users/nicolas"))
(deny file* (subpath "/Applications"))
(deny file* (subpath "/Users/nicolas/Applications"))
(allow file* (subpath "/Users/nicolas/Library/Application Support"))
(allow process-exec
(literal "/bin/ps")
(literal "/path/to/chrome-runner")
(with no-sandbox)
)
The "chrome runner":
#!/bin/sh
/Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome
$ /usr/bin/sandbox-exec -f ./profile.sb ./chrome-runner
... actually opens Chrome
I know this is a little unorthodox, but thanks for your patience Quinn!