2259fbdf4b
If the config does not exist, then apparmor_parser will throw a warning. To avoid that and make the parser configurable, we now add a new option to it. Signed-off-by: Sascha Grunert <sgrunert@suse.com>
65 lines
1.9 KiB
Nix
65 lines
1.9 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
let
|
|
inherit (lib) mkIf mkOption types concatMapStrings;
|
|
cfg = config.security.apparmor;
|
|
in
|
|
|
|
{
|
|
options = {
|
|
security.apparmor = {
|
|
enable = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = "Enable the AppArmor Mandatory Access Control system.";
|
|
};
|
|
profiles = mkOption {
|
|
type = types.listOf types.path;
|
|
default = [];
|
|
description = "List of files containing AppArmor profiles.";
|
|
};
|
|
packages = mkOption {
|
|
type = types.listOf types.package;
|
|
default = [];
|
|
description = "List of packages to be added to apparmor's include path";
|
|
};
|
|
parserConfig = mkOption {
|
|
type = types.str;
|
|
default = "";
|
|
description = "AppArmor parser configuration file content";
|
|
};
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
environment.systemPackages = [ pkgs.apparmor-utils ];
|
|
environment.etc."apparmor/parser.conf".text = cfg.parserConfig;
|
|
|
|
boot.kernelParams = [ "apparmor=1" "security=apparmor" ];
|
|
|
|
systemd.services.apparmor = let
|
|
paths = concatMapStrings (s: " -I ${s}/etc/apparmor.d")
|
|
([ pkgs.apparmor-profiles ] ++ cfg.packages);
|
|
in {
|
|
after = [ "local-fs.target" ];
|
|
before = [ "sysinit.target" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
unitConfig = {
|
|
DefaultDependencies = "no";
|
|
};
|
|
serviceConfig = {
|
|
Type = "oneshot";
|
|
RemainAfterExit = "yes";
|
|
ExecStart = map (p:
|
|
''${pkgs.apparmor-parser}/bin/apparmor_parser -rKv ${paths} "${p}"''
|
|
) cfg.profiles;
|
|
ExecStop = map (p:
|
|
''${pkgs.apparmor-parser}/bin/apparmor_parser -Rv "${p}"''
|
|
) cfg.profiles;
|
|
ExecReload = map (p:
|
|
''${pkgs.apparmor-parser}/bin/apparmor_parser --reload ${paths} "${p}"''
|
|
) cfg.profiles;
|
|
};
|
|
};
|
|
};
|
|
}
|