summary refs log tree commit diff
path: root/nixos/modules/services/web-servers/unit/default.nix
diff options
context:
space:
mode:
authorIzorkin <izorkin@elven.pw>2020-04-14 16:07:30 +0300
committerIzorkin <izorkin@elven.pw>2020-05-06 12:27:12 +0300
commit3eb6012b64bc8ef243168ea8edce6c417cb8ad03 (patch)
tree71b306d0ef270d36d9a4198a380bd7bf5b1238c5 /nixos/modules/services/web-servers/unit/default.nix
parent91a7f33b640183c6e665932ad14ff5b9972226f8 (diff)
downloadnixpkgs-3eb6012b64bc8ef243168ea8edce6c417cb8ad03.tar
nixpkgs-3eb6012b64bc8ef243168ea8edce6c417cb8ad03.tar.gz
nixpkgs-3eb6012b64bc8ef243168ea8edce6c417cb8ad03.tar.bz2
nixpkgs-3eb6012b64bc8ef243168ea8edce6c417cb8ad03.tar.lz
nixpkgs-3eb6012b64bc8ef243168ea8edce6c417cb8ad03.tar.xz
nixpkgs-3eb6012b64bc8ef243168ea8edce6c417cb8ad03.tar.zst
nixpkgs-3eb6012b64bc8ef243168ea8edce6c417cb8ad03.zip
nixos/unit: update sandboxing mode
Diffstat (limited to 'nixos/modules/services/web-servers/unit/default.nix')
-rw-r--r--nixos/modules/services/web-servers/unit/default.nix13
1 files changed, 10 insertions, 3 deletions
diff --git a/nixos/modules/services/web-servers/unit/default.nix b/nixos/modules/services/web-servers/unit/default.nix
index 9620d2b67b2..59f03c923e6 100644
--- a/nixos/modules/services/web-servers/unit/default.nix
+++ b/nixos/modules/services/web-servers/unit/default.nix
@@ -113,23 +113,30 @@ in {
         Group = cfg.group;
         # Capabilities
         AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" "CAP_SETGID" "CAP_SETUID" ];
+        # Runtime directory and mode
+        RuntimeDirectory = "unit";
+        RuntimeDirectoryMode = "0750";
+        # Access write directories
+        ReadWritePaths = [ cfg.stateDir cfg.logDir ];
         # Security
         NoNewPrivileges = true;
         # Sandboxing
-        ProtectSystem = "full";
+        ProtectSystem = "strict";
         ProtectHome = true;
-        RuntimeDirectory = "unit";
-        RuntimeDirectoryMode = "0750";
         PrivateTmp = true;
         PrivateDevices = true;
         ProtectHostname = true;
         ProtectKernelTunables = true;
         ProtectKernelModules = true;
         ProtectControlGroups = true;
+        RestrictAddressFamilies = [ "AF_UNIX" "AF_INET" "AF_INET6" ];
         LockPersonality = true;
         MemoryDenyWriteExecute = true;
         RestrictRealtime = true;
+        RestrictSUIDSGID = true;
         PrivateMounts = true;
+        # System Call Filtering
+        SystemCallArchitectures = "native";
       };
     };