mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-15 22:36:23 +01:00
6afb255d97
these changes were generated with nixq 0.0.2, by running nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix two mentions of the mdDoc function remain in nixos/, both of which are inside of comments. Since lib.mdDoc is already defined as just id, this commit is a no-op as far as Nix (and the built manual) is concerned.
96 lines
2.6 KiB
Nix
96 lines
2.6 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
{
|
|
options.services.tetrd.enable = lib.mkEnableOption "tetrd";
|
|
|
|
config = lib.mkIf config.services.tetrd.enable {
|
|
environment = {
|
|
systemPackages = [ pkgs.tetrd ];
|
|
etc."resolv.conf".source = "/etc/tetrd/resolv.conf";
|
|
};
|
|
|
|
systemd = {
|
|
tmpfiles.rules = [ "f /etc/tetrd/resolv.conf - - -" ];
|
|
|
|
services.tetrd = {
|
|
description = pkgs.tetrd.meta.description;
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
serviceConfig = {
|
|
ExecStart = "${pkgs.tetrd}/opt/Tetrd/bin/tetrd";
|
|
Restart = "always";
|
|
RuntimeDirectory = "tetrd";
|
|
RootDirectory = "/run/tetrd";
|
|
DynamicUser = true;
|
|
UMask = "006";
|
|
DeviceAllow = "usb_device";
|
|
LockPersonality = true;
|
|
MemoryDenyWriteExecute = true;
|
|
NoNewPrivileges = true;
|
|
PrivateMounts = true;
|
|
PrivateNetwork = lib.mkDefault false;
|
|
PrivateTmp = true;
|
|
PrivateUsers = lib.mkDefault false;
|
|
ProtectClock = lib.mkDefault false;
|
|
ProtectControlGroups = true;
|
|
ProtectHome = true;
|
|
ProtectHostname = true;
|
|
ProtectKernelLogs = true;
|
|
ProtectKernelModules = true;
|
|
ProtectKernelTunables = true;
|
|
ProtectProc = "invisible";
|
|
ProtectSystem = "strict";
|
|
RemoveIPC = true;
|
|
RestrictAddressFamilies = [ "AF_UNIX" "AF_INET" "AF_INET6" "AF_NETLINK" ];
|
|
RestrictNamespaces = true;
|
|
RestrictRealtime = true;
|
|
RestrictSUIDSGID = true;
|
|
SystemCallArchitectures = "native";
|
|
|
|
SystemCallFilter = [
|
|
"@system-service"
|
|
"~@aio"
|
|
"~@chown"
|
|
"~@clock"
|
|
"~@cpu-emulation"
|
|
"~@debug"
|
|
"~@keyring"
|
|
"~@memlock"
|
|
"~@module"
|
|
"~@mount"
|
|
"~@obsolete"
|
|
"~@pkey"
|
|
"~@raw-io"
|
|
"~@reboot"
|
|
"~@swap"
|
|
"~@sync"
|
|
];
|
|
|
|
BindReadOnlyPaths = [
|
|
builtins.storeDir
|
|
"/etc/ssl"
|
|
"/etc/static/ssl"
|
|
"${pkgs.nettools}/bin/route:/usr/bin/route"
|
|
"${pkgs.nettools}/bin/ifconfig:/usr/bin/ifconfig"
|
|
];
|
|
|
|
BindPaths = [
|
|
"/etc/tetrd/resolv.conf:/etc/resolv.conf"
|
|
"/run"
|
|
"/var/log"
|
|
];
|
|
|
|
CapabilityBoundingSet = [
|
|
"CAP_DAC_OVERRIDE"
|
|
"CAP_NET_ADMIN"
|
|
];
|
|
|
|
AmbientCapabilities = [
|
|
"CAP_DAC_OVERRIDE"
|
|
"CAP_NET_ADMIN"
|
|
];
|
|
};
|
|
};
|
|
};
|
|
};
|
|
}
|