nixpkgs/nixos/modules/security/apparmor.nix

60 lines
1.7 KiB
Nix
Raw Normal View History

{ config, lib, pkgs, ... }:
2013-05-13 15:13:06 +02:00
2012-07-17 01:47:41 +02:00
let
inherit (lib) mkIf mkOption types concatMapStrings;
2012-07-17 01:47:41 +02:00
cfg = config.security.apparmor;
in
2012-07-17 01:47:41 +02:00
{
options = {
security.apparmor = {
enable = mkOption {
type = types.bool;
default = false;
description = "Enable the AppArmor Mandatory Access Control system.";
};
profiles = mkOption {
type = types.listOf types.path;
default = [];
description = "List of files containing AppArmor profiles.";
};
2017-01-10 22:47:23 +01:00
packages = mkOption {
type = types.listOf types.package;
default = [];
description = "List of packages to be added to apparmor's include path";
};
};
};
config = mkIf cfg.enable {
environment.systemPackages = [ pkgs.apparmor-utils ];
boot.kernelParams = [ "apparmor=1" "security=apparmor" ];
2017-01-10 22:47:23 +01:00
systemd.services.apparmor = let
paths = concatMapStrings (s: " -I ${s}/etc/apparmor.d")
([ pkgs.apparmor-profiles ] ++ cfg.packages);
in {
after = [ "local-fs.target" ];
before = [ "sysinit.target" ];
wantedBy = [ "multi-user.target" ];
unitConfig = {
DefaultDependencies = "no";
};
serviceConfig = {
Type = "oneshot";
RemainAfterExit = "yes";
2017-01-10 22:47:23 +01:00
ExecStart = map (p:
''${pkgs.apparmor-parser}/bin/apparmor_parser -rKv ${paths} "${p}"''
) cfg.profiles;
2017-01-10 22:47:23 +01:00
ExecStop = map (p:
''${pkgs.apparmor-parser}/bin/apparmor_parser -Rv "${p}"''
) cfg.profiles;
ExecReload = map (p:
''${pkgs.apparmor-parser}/bin/apparmor_parser --reload ${paths} "${p}"''
) cfg.profiles;
};
};
};
2012-07-17 01:47:41 +02:00
}