diff options
author | Izorkin <izorkin@elven.pw> | 2020-04-14 16:07:30 +0300 |
---|---|---|
committer | Izorkin <izorkin@elven.pw> | 2020-05-06 12:27:12 +0300 |
commit | 3eb6012b64bc8ef243168ea8edce6c417cb8ad03 (patch) | |
tree | 71b306d0ef270d36d9a4198a380bd7bf5b1238c5 /nixos/modules/services/web-servers/unit/default.nix | |
parent | 91a7f33b640183c6e665932ad14ff5b9972226f8 (diff) | |
download | nixpkgs-3eb6012b64bc8ef243168ea8edce6c417cb8ad03.tar nixpkgs-3eb6012b64bc8ef243168ea8edce6c417cb8ad03.tar.gz nixpkgs-3eb6012b64bc8ef243168ea8edce6c417cb8ad03.tar.bz2 nixpkgs-3eb6012b64bc8ef243168ea8edce6c417cb8ad03.tar.lz nixpkgs-3eb6012b64bc8ef243168ea8edce6c417cb8ad03.tar.xz nixpkgs-3eb6012b64bc8ef243168ea8edce6c417cb8ad03.tar.zst nixpkgs-3eb6012b64bc8ef243168ea8edce6c417cb8ad03.zip |
nixos/unit: update sandboxing mode
Diffstat (limited to 'nixos/modules/services/web-servers/unit/default.nix')
-rw-r--r-- | nixos/modules/services/web-servers/unit/default.nix | 13 |
1 files changed, 10 insertions, 3 deletions
diff --git a/nixos/modules/services/web-servers/unit/default.nix b/nixos/modules/services/web-servers/unit/default.nix index 9620d2b67b2..59f03c923e6 100644 --- a/nixos/modules/services/web-servers/unit/default.nix +++ b/nixos/modules/services/web-servers/unit/default.nix @@ -113,23 +113,30 @@ in { Group = cfg.group; # Capabilities AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" "CAP_SETGID" "CAP_SETUID" ]; + # Runtime directory and mode + RuntimeDirectory = "unit"; + RuntimeDirectoryMode = "0750"; + # Access write directories + ReadWritePaths = [ cfg.stateDir cfg.logDir ]; # Security NoNewPrivileges = true; # Sandboxing - ProtectSystem = "full"; + ProtectSystem = "strict"; ProtectHome = true; - RuntimeDirectory = "unit"; - RuntimeDirectoryMode = "0750"; PrivateTmp = true; PrivateDevices = true; ProtectHostname = true; ProtectKernelTunables = true; ProtectKernelModules = true; ProtectControlGroups = true; + RestrictAddressFamilies = [ "AF_UNIX" "AF_INET" "AF_INET6" ]; LockPersonality = true; MemoryDenyWriteExecute = true; RestrictRealtime = true; + RestrictSUIDSGID = true; PrivateMounts = true; + # System Call Filtering + SystemCallArchitectures = "native"; }; }; |