-
-
Notifications
You must be signed in to change notification settings - Fork 14.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
nixos/kmonad: add new option enableHardening #370437
Conversation
6899906
to
406935a
Compare
Before ```console $ systemd-analyze security kmonad-foo.service | tail -n 1 β Overall exposure level for kmonad-foo.service: 8.2 EXPOSED π ``` After ```console $ systemd-analyze security kmonad-foo.service | tail -n 1 β Overall exposure level for kmonad-foo.service: 0.4 SAFE π ```
406935a
to
37e6624
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I just resolved the merge conflicts.
(I promise this is the last thing of kmonad module on my TODO list. π )
@@ -41,6 +41,19 @@ let | |||
''; | |||
}; | |||
|
|||
enableHardening = lib.mkOption { | |||
type = lib.types.bool; | |||
default = true; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do you think enabling hardening is a good idea even if hardening may make some shell commands fail?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it makes sense to have these options by default. For people that want to use cmd-button
, they can disable this and add the options that are compatible with their macros themselves.
I will test it on my system and come back to you.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Tested on my system, seems to work well!
Thanks! |
Before
After
Things done
nix.conf
? (See Nix manual)sandbox = relaxed
sandbox = true
nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)Add a π reaction to pull requests you find important.