Compare commits

..

1 Commits

Author SHA1 Message Date
Oystein Kristoffer Tveit 48752c9549 WIP 2024-08-22 22:56:24 +02:00
3 changed files with 8 additions and 1 deletions

View File

@ -174,6 +174,7 @@
extraConfig = "return 444;"; extraConfig = "return 444;";
}; };
# TODO: upstream
# source: https://github.com/logrotate/logrotate/blob/main/examples/logrotate.service # source: https://github.com/logrotate/logrotate/blob/main/examples/logrotate.service
systemd.services.logrotate = { systemd.services.logrotate = {
documentation = [ "man:logrotate(8)" "man:logrotate.conf(5)" ]; documentation = [ "man:logrotate(8)" "man:logrotate.conf(5)" ];
@ -210,6 +211,8 @@
SystemCallArchitectures = "native"; SystemCallArchitectures = "native";
SystemCallFilter = [ SystemCallFilter = [
"@system-service" "@system-service"
# "~@privileged"
# "~@resources"
]; ];
}; };
}; };

View File

@ -31,7 +31,7 @@ in
PrivateMounts = true; PrivateMounts = true;
ProtectClock = true; ProtectClock = true;
ProtectControlGroups = true; ProtectControlGroups = true;
ProtectHome = true; ProtectHome = true; # Needed to read passwords from /run maybe?
ProtectHostname = true; ProtectHostname = true;
ProtectKernelLogs = true; ProtectKernelLogs = true;
ProtectKernelModules = true; ProtectKernelModules = true;
@ -45,6 +45,8 @@ in
KeyringMode = "private"; KeyringMode = "private";
SystemCallFilter = [ SystemCallFilter = [
"@system-service" "@system-service"
# "~@privileged"
# "~@resources"
]; ];
}; };
}); });

View File

@ -71,6 +71,8 @@ in {
AmbientCapabilities = [ "" ]; AmbientCapabilities = [ "" ];
CapabilityBoundingSet = [ "" ]; CapabilityBoundingSet = [ "" ];
DeviceAllow = [ "" ]; DeviceAllow = [ "" ];
# IPAddressDeny = [ "any" ];
# IPAddressAllow = [ ];
LockPersonality = true; LockPersonality = true;
NoNewPrivileges = true; NoNewPrivileges = true;
# MemoryDenyWriteExecute = true; # MemoryDenyWriteExecute = true;