mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-18 19:51:17 +00:00
Merge pull request #163030 from newAM/github-runner-harden
nixos/github-runner: systemd service hardening
This commit is contained in:
commit
c29e523824
|
@ -1263,6 +1263,15 @@
|
|||
<literal>true</literal>.
|
||||
</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>
|
||||
<literal>services.github-runner</literal> has been hardened.
|
||||
Notably address families and system calls have been
|
||||
restricted, which may adversely affect some kinds of testing,
|
||||
e.g. using <literal>AF_BLUETOOTH</literal> to test bluetooth
|
||||
devices.
|
||||
</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>
|
||||
The terraform 0.12 compatibility has been removed and the
|
||||
|
|
|
@ -498,6 +498,10 @@ In addition to numerous new and upgraded packages, this release has the followin
|
|||
|
||||
- The Tor SOCKS proxy is now actually disabled if `services.tor.client.enable` is set to `false` (the default). If you are using this functionality but didn't change the setting or set it to `false`, you now need to set it to `true`.
|
||||
|
||||
- `services.github-runner` has been hardened. Notably address families and
|
||||
system calls have been restricted, which may adversely affect some kinds of
|
||||
testing, e.g. using `AF_BLUETOOTH` to test bluetooth devices.
|
||||
|
||||
- The terraform 0.12 compatibility has been removed and the `terraform.withPlugins` and `terraform-providers.mkProvider` implementations simplified. Providers now need to be stored under
|
||||
`$out/libexec/terraform-providers/<registry>/<owner>/<name>/<version>/<os>_<arch>/terraform-provider-<name>_v<version>` (which mkProvider does).
|
||||
|
||||
|
|
|
@ -299,6 +299,16 @@ in
|
|||
RestrictRealtime = true;
|
||||
RestrictSUIDSGID = true;
|
||||
UMask = "0066";
|
||||
ProtectProc = "invisible";
|
||||
ProcSubset = "pid";
|
||||
SystemCallFilter = [
|
||||
"~@debug"
|
||||
"~@mount"
|
||||
"~@privileged"
|
||||
"~@cpu-emulation"
|
||||
"~@obsolete"
|
||||
];
|
||||
RestrictAddressFamilies = [ "AF_INET" "AF_INET6" "AF_UNIX" "AF_NETLINK" ];
|
||||
|
||||
# Needs network access
|
||||
PrivateNetwork = false;
|
||||
|
|
Loading…
Reference in a new issue