feat: harden some systemd units
This commit is contained in:
parent
1f43ca5d2c
commit
7e524df309
9 changed files with 106 additions and 27 deletions
|
@ -1,16 +1,25 @@
|
||||||
{ lib, config, ... }:
|
{
|
||||||
|
pkgs,
|
||||||
|
lib,
|
||||||
|
osConfig,
|
||||||
|
...
|
||||||
|
}:
|
||||||
let
|
let
|
||||||
package = config.services.cliphist.package;
|
cfg = osConfig.modules.services.cliphist;
|
||||||
|
exec = pkgs.writers.writeBash "rofi-cliphist" {
|
||||||
|
makeWrapperArgs = [
|
||||||
|
"--prefix"
|
||||||
|
"PATH"
|
||||||
|
":"
|
||||||
|
"${lib.makeBinPath [ pkgs.cliphist ]}"
|
||||||
|
];
|
||||||
|
} "cliphist-rofi-img";
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
config = lib.mkIf config.services.cliphist.enable {
|
config = lib.mkIf cfg.enable {
|
||||||
programs.rofi = {
|
programs.rofi = {
|
||||||
enable = true;
|
enable = true;
|
||||||
extraConfig = {
|
extraConfig.modes = [ "clipboard:${exec}" ];
|
||||||
modes = [
|
|
||||||
"clipboard:${lib.my.checkPath package "cliphist-rofi-img"}"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,4 +1,10 @@
|
||||||
{ self, pkgs, ... }:
|
{
|
||||||
|
self,
|
||||||
|
lib,
|
||||||
|
pkgs,
|
||||||
|
config,
|
||||||
|
...
|
||||||
|
}:
|
||||||
{
|
{
|
||||||
systemd.user.services.swww = {
|
systemd.user.services.swww = {
|
||||||
Install.WantedBy = [ "graphical-session.target" ];
|
Install.WantedBy = [ "graphical-session.target" ];
|
||||||
|
@ -10,22 +16,17 @@
|
||||||
Service = {
|
Service = {
|
||||||
Type = "simple";
|
Type = "simple";
|
||||||
ExecStart = "${pkgs.swww}/bin/swww-daemon";
|
ExecStart = "${pkgs.swww}/bin/swww-daemon";
|
||||||
|
ExecStartPost = "${pkgs.swww}/bin/swww img ${self + "/assets/landscape-pink-pastel.jpg"} -t wipe";
|
||||||
|
|
||||||
Restart = "on-failure";
|
Restart = "on-failure";
|
||||||
};
|
ProtectHome = "tmpfs";
|
||||||
};
|
BindPaths = "/run/user /home/${config.home.username}/.cache/swww";
|
||||||
|
ProtectProc = "noaccess";
|
||||||
systemd.user.services.swww-set-background = {
|
RestrictNamespaces = true;
|
||||||
Install.WantedBy = [ "graphical-session.target" ];
|
CapabilityBoundingSet = "";
|
||||||
|
PrivateUsers = true;
|
||||||
Unit = {
|
RestrictAddressFamilies = "AF_UNIX";
|
||||||
Wants = [ "graphical-session.target" ];
|
} // lib.my.systemdHardening;
|
||||||
After = [ "graphical-session.target" ];
|
|
||||||
};
|
|
||||||
|
|
||||||
Service = {
|
|
||||||
Type = "oneshot";
|
|
||||||
ExecStart = "${pkgs.swww}/bin/swww img ${self + "/assets/landscape-pink-pastel.jpg"} -t wipe";
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
|
||||||
home.packages = [ pkgs.swww ];
|
home.packages = [ pkgs.swww ];
|
||||||
|
|
|
@ -38,6 +38,7 @@
|
||||||
};
|
};
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
|
cliphist.enable = true;
|
||||||
nysh.enable = true;
|
nysh.enable = true;
|
||||||
tailscale = {
|
tailscale = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
@ -60,7 +61,10 @@
|
||||||
};
|
};
|
||||||
media.enableAll = true;
|
media.enableAll = true;
|
||||||
};
|
};
|
||||||
|
documentation = {
|
||||||
|
doc.enable = false;
|
||||||
|
man.generateCaches = false;
|
||||||
|
};
|
||||||
services = {
|
services = {
|
||||||
displayManager.sddm.enable = true;
|
displayManager.sddm.enable = true;
|
||||||
dbus.enable = true;
|
dbus.enable = true;
|
||||||
|
|
|
@ -31,7 +31,6 @@
|
||||||
services = {
|
services = {
|
||||||
blueman-applet.enable = true;
|
blueman-applet.enable = true;
|
||||||
syncthing.enable = true;
|
syncthing.enable = true;
|
||||||
cliphist.enable = true;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
home = {
|
home = {
|
||||||
|
|
|
@ -24,6 +24,7 @@
|
||||||
};
|
};
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
|
cliphist.enable = true;
|
||||||
nysh.enable = true;
|
nysh.enable = true;
|
||||||
tailscale = {
|
tailscale = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
|
@ -40,7 +40,6 @@
|
||||||
services = {
|
services = {
|
||||||
blueman-applet.enable = true;
|
blueman-applet.enable = true;
|
||||||
syncthing.enable = true;
|
syncthing.enable = true;
|
||||||
cliphist.enable = true;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
home = {
|
home = {
|
||||||
|
|
44
options/services/cliphist.nix
Normal file
44
options/services/cliphist.nix
Normal file
|
@ -0,0 +1,44 @@
|
||||||
|
{
|
||||||
|
lib,
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
|
||||||
|
}:
|
||||||
|
let
|
||||||
|
inherit (lib) mkEnableOption mkIf;
|
||||||
|
cfg = config.modules.services.cliphist;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options.modules.services.cliphist = {
|
||||||
|
enable = mkEnableOption "cliphist, a clipboard history manager for wayland";
|
||||||
|
package = lib.mkPackageOption pkgs "cliphist" { };
|
||||||
|
extraOptions = lib.mkOption {
|
||||||
|
type = with lib.types; listOf str;
|
||||||
|
default = [
|
||||||
|
"-max-items"
|
||||||
|
"250"
|
||||||
|
];
|
||||||
|
description = ''
|
||||||
|
Flags to append to the cliphist command.
|
||||||
|
'';
|
||||||
|
apply = lib.escapeShellArgs;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = mkIf cfg.enable {
|
||||||
|
systemd.user.services.cliphist = {
|
||||||
|
description = "Clipboard management daemon";
|
||||||
|
partOf = [ "graphical-session.target" ];
|
||||||
|
wantedBy = [ "graphical-session.target" ];
|
||||||
|
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "simple";
|
||||||
|
ExecStart = "${pkgs.wl-clipboard}/bin/wl-paste --watch ${cfg.package}/bin/cliphist ${cfg.extraOptions} store";
|
||||||
|
Restart = "on-failure";
|
||||||
|
} // lib.my.systemdHardening;
|
||||||
|
|
||||||
|
postStop = "${cfg.package}/bin/cliphist wipe";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
|
@ -3,5 +3,6 @@
|
||||||
./nysh.nix
|
./nysh.nix
|
||||||
./tailscale.nix
|
./tailscale.nix
|
||||||
./rsync-backup
|
./rsync-backup
|
||||||
|
./cliphist.nix
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
|
@ -8,6 +8,27 @@ let
|
||||||
inherit (lib) mkOption;
|
inherit (lib) mkOption;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
|
||||||
|
systemdHardening = {
|
||||||
|
IPAddressDeny = "any";
|
||||||
|
NoNewPrivileges = true;
|
||||||
|
ProtectSystem = "full";
|
||||||
|
PrivateDevices = true;
|
||||||
|
ProtectKernelTunables = true;
|
||||||
|
ProtectHostname = true;
|
||||||
|
ProtectKernelLogs = true;
|
||||||
|
ProtectKernelModules = true;
|
||||||
|
MemoryDenyWriteExecute = true;
|
||||||
|
PrivateTmp = true;
|
||||||
|
LockPersonality = true;
|
||||||
|
RestrictRealtime = true;
|
||||||
|
DevicePolicy = "closed";
|
||||||
|
ProtectClock = true;
|
||||||
|
PrivateNetwork = true;
|
||||||
|
ProtectControlGroups = true;
|
||||||
|
SystemCallArchitectures = "native";
|
||||||
|
};
|
||||||
|
|
||||||
# Verify the existence of a binary inside of a derivation.
|
# Verify the existence of a binary inside of a derivation.
|
||||||
# Returns the path to the binary or throws.
|
# Returns the path to the binary or throws.
|
||||||
checkPath =
|
checkPath =
|
||||||
|
|
Loading…
Add table
Reference in a new issue