security: don't restrict process info by default for module users

This commit is contained in:
Erik Arvstedt 2020-08-20 13:11:10 +02:00
parent a36789b468
commit 44de5064cd
No known key found for this signature in database
GPG Key ID: 33312B944DD97846
2 changed files with 36 additions and 31 deletions

View File

@ -42,8 +42,7 @@ in {
networking.firewall.enable = true; networking.firewall.enable = true;
# hideProcessInformation even if hardened kernel profile is disabled nix-bitcoin.security.hideProcessInformation = true;
security.hideProcessInformation = true;
# Tor # Tor
services.tor = { services.tor = {

View File

@ -1,6 +1,11 @@
{ config, lib, pkgs, ... }: { config, lib, pkgs, options, ... }:
{ {
options = {
nix-bitcoin.security.hideProcessInformation = options.security.hideProcessInformation;
};
config = lib.mkIf config.nix-bitcoin.security.hideProcessInformation {
# Only show the current user's processes in /proc. # Only show the current user's processes in /proc.
# Users with group 'proc' can still access all processes. # Users with group 'proc' can still access all processes.
security.hideProcessInformation = true; security.hideProcessInformation = true;
@ -30,4 +35,5 @@
</busconfig> </busconfig>
'') '')
]; ];
};
} }