nix: expose syscall filter policy
Signed-off-by: Ophestra <cat@gensokyo.uk>
This commit is contained in:
parent
134247b57d
commit
8a00a83c71
@ -117,6 +117,9 @@ in
|
||||
dev
|
||||
env
|
||||
;
|
||||
syscall = {
|
||||
inherit (app) devel multiarch bluetooth;
|
||||
};
|
||||
map_real_uid = app.mapRealUid;
|
||||
no_new_session = app.tty;
|
||||
filesystem =
|
||||
|
16
options.nix
16
options.nix
@ -141,16 +141,20 @@ in
|
||||
'';
|
||||
};
|
||||
|
||||
nix = mkEnableOption "nix daemon access within the sandbox";
|
||||
userns = mkEnableOption "userns within the sandbox";
|
||||
mapRealUid = mkEnableOption "mapping to fortify's real UID within the sandbox";
|
||||
dev = mkEnableOption "access to all devices within the sandbox";
|
||||
tty = mkEnableOption "allow access to the controlling terminal";
|
||||
nix = mkEnableOption "nix daemon";
|
||||
userns = mkEnableOption "user namespace";
|
||||
mapRealUid = mkEnableOption "mapping to priv-user uid";
|
||||
dev = mkEnableOption "access to all devices";
|
||||
tty = mkEnableOption "access to the controlling terminal";
|
||||
|
||||
net = mkEnableOption "network access within the sandbox" // {
|
||||
net = mkEnableOption "network access" // {
|
||||
default = true;
|
||||
};
|
||||
|
||||
devel = mkEnableOption "development kernel APIs";
|
||||
multiarch = mkEnableOption "multiarch kernel support";
|
||||
bluetooth = mkEnableOption "AF_BLUETOOTH socket operations";
|
||||
|
||||
gpu = mkOption {
|
||||
type = nullOr bool;
|
||||
default = null;
|
||||
|
Loading…
Reference in New Issue
Block a user