nixdots/system/shared/security/apparmor.nix

65 lines
1.3 KiB
Nix
Raw Permalink Normal View History

2024-07-26 23:07:07 +00:00
{
config,
pkgs,
...
}: {
2024-04-15 20:13:19 +00:00
services.dbus.apparmor = "enabled";
environment.systemPackages = with pkgs; [
apparmor-pam
apparmor-utils
apparmor-parser
apparmor-profiles
apparmor-bin-utils
apparmor-kernel-patches
libapparmor
];
# apparmor configuration
security.apparmor = {
enable = true;
# whether to enable AppArmor cache
# in /var/cache/apparmor
enableCache = true;
# whether to kill processes which have an AppArmor profile enabled
# but are not confined (AppArmor can only confine new processes)
killUnconfinedConfinables = true;
# packages to be added to AppArmor's include path
packages = [pkgs.apparmor-profiles];
# AppArmor policies
2024-04-16 09:57:05 +00:00
policies = {
2024-04-15 20:13:19 +00:00
"default_deny" = {
enforce = false;
enable = false;
profile = ''
profile default_deny /** {}
'';
};
"sudo" = {
enforce = false;
enable = false;
profile = ''
${pkgs.sudo}/bin/sudo {
file /** rwlkUx
}
'';
};
"nix" = {
enforce = false;
enable = false;
profile = ''
${config.nix.package}/bin/nix {
unconfined
}
'';
};
2024-04-16 09:57:05 +00:00
};
2024-04-15 20:13:19 +00:00
};
}