Merge pull request #85567 from Izorkin/nginx-sandbox
This commit is contained in:
		
						commit
						6c437ef1bb
					
				@ -235,7 +235,16 @@ php.override {
 | 
			
		||||
       Be aware that backwards state migrations are not supported by Deluge.
 | 
			
		||||
     </para>
 | 
			
		||||
   </listitem>
 | 
			
		||||
 | 
			
		||||
   <listitem>
 | 
			
		||||
     <para>
 | 
			
		||||
       Add option <literal>services.nginx.enableSandbox</literal> to starting Nginx web server with additional sandbox/hardening options.
 | 
			
		||||
       By default, write access to <literal>services.nginx.stateDir</literal> is allowed. To allow writing to other folders,
 | 
			
		||||
       use <literal>systemd.services.nginx.serviceConfig.ReadWritePaths</literal>
 | 
			
		||||
       <programlisting>
 | 
			
		||||
systemd.services.nginx.serviceConfig.ReadWritePaths = [ "/var/www" ];
 | 
			
		||||
       </programlisting>
 | 
			
		||||
     </para>
 | 
			
		||||
   </listitem>
 | 
			
		||||
   <listitem>
 | 
			
		||||
    <para>
 | 
			
		||||
      The NixOS options <literal>nesting.clone</literal> and
 | 
			
		||||
 | 
			
		||||
@ -463,6 +463,14 @@ in
 | 
			
		||||
        '';
 | 
			
		||||
      };
 | 
			
		||||
 | 
			
		||||
      enableSandbox = mkOption {
 | 
			
		||||
        default = false;
 | 
			
		||||
        type = types.bool;
 | 
			
		||||
        description = ''
 | 
			
		||||
          Starting Nginx web server with additional sandbox/hardening options.
 | 
			
		||||
        '';
 | 
			
		||||
      };
 | 
			
		||||
 | 
			
		||||
      user = mkOption {
 | 
			
		||||
        type = types.str;
 | 
			
		||||
        default = "nginx";
 | 
			
		||||
@ -710,6 +718,27 @@ in
 | 
			
		||||
        LogsDirectoryMode = "0750";
 | 
			
		||||
        # Capabilities
 | 
			
		||||
        AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" "CAP_SYS_RESOURCE" ];
 | 
			
		||||
        CapabilityBoundingSet = [ "CAP_NET_BIND_SERVICE" "CAP_SYS_RESOURCE" ];
 | 
			
		||||
        # Security
 | 
			
		||||
        NoNewPrivileges = true;
 | 
			
		||||
      } // optionalAttrs cfg.enableSandbox {
 | 
			
		||||
        # Sandboxing
 | 
			
		||||
        ProtectSystem = "strict";
 | 
			
		||||
        ProtectHome = mkDefault true;
 | 
			
		||||
        PrivateTmp = true;
 | 
			
		||||
        PrivateDevices = true;
 | 
			
		||||
        ProtectHostname = true;
 | 
			
		||||
        ProtectKernelTunables = true;
 | 
			
		||||
        ProtectKernelModules = true;
 | 
			
		||||
        ProtectControlGroups = true;
 | 
			
		||||
        RestrictAddressFamilies = [ "AF_UNIX" "AF_INET" "AF_INET6" ];
 | 
			
		||||
        LockPersonality = true;
 | 
			
		||||
        MemoryDenyWriteExecute = !(builtins.any (mod: (mod.allowMemoryWriteExecute or false)) pkgs.nginx.modules);
 | 
			
		||||
        RestrictRealtime = true;
 | 
			
		||||
        RestrictSUIDSGID = true;
 | 
			
		||||
        PrivateMounts = true;
 | 
			
		||||
        # System Call Filtering
 | 
			
		||||
        SystemCallArchitectures = "native";
 | 
			
		||||
      };
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -225,6 +225,7 @@ in
 | 
			
		||||
  nginx = handleTest ./nginx.nix {};
 | 
			
		||||
  nginx-etag = handleTest ./nginx-etag.nix {};
 | 
			
		||||
  nginx-pubhtml = handleTest ./nginx-pubhtml.nix {};
 | 
			
		||||
  nginx-sandbox = handleTestOn ["x86_64-linux"] ./nginx-sandbox.nix {};
 | 
			
		||||
  nginx-sso = handleTest ./nginx-sso.nix {};
 | 
			
		||||
  nix-ssh-serve = handleTest ./nix-ssh-serve.nix {};
 | 
			
		||||
  nixos-generate-config = handleTest ./nixos-generate-config.nix {};
 | 
			
		||||
 | 
			
		||||
@ -2,6 +2,7 @@ import ./make-test-python.nix {
 | 
			
		||||
  name = "nginx-pubhtml";
 | 
			
		||||
 | 
			
		||||
  machine = { pkgs, ... }: {
 | 
			
		||||
    systemd.services.nginx.serviceConfig.ProtectHome = "read-only";
 | 
			
		||||
    services.nginx.enable = true;
 | 
			
		||||
    services.nginx.virtualHosts.localhost = {
 | 
			
		||||
      locations."~ ^/\\~([a-z0-9_]+)(/.*)?$".alias = "/home/$1/public_html$2";
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										66
									
								
								nixos/tests/nginx-sandbox.nix
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										66
									
								
								nixos/tests/nginx-sandbox.nix
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,66 @@
 | 
			
		||||
import ./make-test-python.nix ({ pkgs, ... }: {
 | 
			
		||||
  name = "nginx-sandbox";
 | 
			
		||||
  meta = with pkgs.stdenv.lib.maintainers; {
 | 
			
		||||
    maintainers = [ izorkin ];
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  # This test checks the creation and reading of a file in sandbox mode. Used simple lua script.
 | 
			
		||||
 | 
			
		||||
  machine = { pkgs, ... }: {
 | 
			
		||||
    nixpkgs.overlays = [
 | 
			
		||||
      (self: super: {
 | 
			
		||||
        nginx-lua = super.nginx.override {
 | 
			
		||||
          modules = [
 | 
			
		||||
            pkgs.nginxModules.lua
 | 
			
		||||
          ];
 | 
			
		||||
        };
 | 
			
		||||
      })
 | 
			
		||||
    ];
 | 
			
		||||
    services.nginx.enable = true;
 | 
			
		||||
    services.nginx.package = pkgs.nginx-lua;
 | 
			
		||||
    services.nginx.enableSandbox = true;
 | 
			
		||||
    services.nginx.virtualHosts.localhost = {
 | 
			
		||||
      extraConfig = ''
 | 
			
		||||
        location /test1-write {
 | 
			
		||||
          content_by_lua_block {
 | 
			
		||||
            local create = os.execute('${pkgs.coreutils}/bin/mkdir /tmp/test1-read')
 | 
			
		||||
            local create = os.execute('${pkgs.coreutils}/bin/touch /tmp/test1-read/foo.txt')
 | 
			
		||||
            local echo = os.execute('${pkgs.coreutils}/bin/echo worked > /tmp/test1-read/foo.txt')
 | 
			
		||||
          }
 | 
			
		||||
        }
 | 
			
		||||
        location /test1-read {
 | 
			
		||||
          root /tmp;
 | 
			
		||||
        }
 | 
			
		||||
        location /test2-write {
 | 
			
		||||
          content_by_lua_block {
 | 
			
		||||
            local create = os.execute('${pkgs.coreutils}/bin/mkdir /var/web/test2-read')
 | 
			
		||||
            local create = os.execute('${pkgs.coreutils}/bin/touch /var/web/test2-read/bar.txt')
 | 
			
		||||
            local echo = os.execute('${pkgs.coreutils}/bin/echo error-worked > /var/web/test2-read/bar.txt')
 | 
			
		||||
          }
 | 
			
		||||
        }
 | 
			
		||||
        location /test2-read {
 | 
			
		||||
          root /var/web;
 | 
			
		||||
        }
 | 
			
		||||
      '';
 | 
			
		||||
    };
 | 
			
		||||
    users.users.foo.isNormalUser = true;
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  testScript = ''
 | 
			
		||||
    machine.wait_for_unit("nginx")
 | 
			
		||||
    machine.wait_for_open_port(80)
 | 
			
		||||
 | 
			
		||||
    # Checking write in temporary folder
 | 
			
		||||
    machine.succeed("$(curl -vvv http://localhost/test1-write)")
 | 
			
		||||
    machine.succeed('test "$(curl -fvvv http://localhost/test1-read/foo.txt)" = worked')
 | 
			
		||||
 | 
			
		||||
    # Checking write in protected folder. In sandbox mode for the nginx service, the folder /var/web is mounted
 | 
			
		||||
    # in read-only mode.
 | 
			
		||||
    machine.succeed("mkdir -p /var/web")
 | 
			
		||||
    machine.succeed("chown nginx:nginx /var/web")
 | 
			
		||||
    machine.succeed("$(curl -vvv http://localhost/test2-write)")
 | 
			
		||||
    assert "404 Not Found" in machine.succeed(
 | 
			
		||||
        "curl -vvv -s http://localhost/test2-read/bar.txt"
 | 
			
		||||
    )
 | 
			
		||||
  '';
 | 
			
		||||
})
 | 
			
		||||
@ -140,6 +140,7 @@ in
 | 
			
		||||
      export LUAJIT_LIB="${pkgs.luajit}/lib"
 | 
			
		||||
      export LUAJIT_INC="${pkgs.luajit}/include/luajit-2.0"
 | 
			
		||||
    '';
 | 
			
		||||
    allowMemoryWriteExecute = true;
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  lua-upstream = {
 | 
			
		||||
@ -150,6 +151,7 @@ in
 | 
			
		||||
      sha256 = "1gqccg8airli3i9103zv1zfwbjm27h235qjabfbfqk503rjamkpk";
 | 
			
		||||
    };
 | 
			
		||||
    inputs = [ pkgs.luajit ];
 | 
			
		||||
    allowMemoryWriteExecute = true;
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
  modsecurity = {
 | 
			
		||||
@ -246,6 +248,7 @@ in
 | 
			
		||||
    in {
 | 
			
		||||
      src = ngx_pagespeed;
 | 
			
		||||
      inputs = [ pkgs.zlib pkgs.libuuid ]; # psol deps
 | 
			
		||||
      allowMemoryWriteExecute = true;
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
  pam = {
 | 
			
		||||
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user