Fixing a bunch of issues
This commit is contained in:
parent
af3b9a3d46
commit
a8cb2afa98
|
@ -26,7 +26,7 @@ with lib;
|
|||
|
||||
config = mkIf (config.services.mail.sendmailSetuidWrapper != null) {
|
||||
|
||||
security.wrappers.setuid = [ config.services.mail.sendmailSetuidWrapper ];
|
||||
security.wrappers.sendmail = config.services.mail.sendmailSetuidWrapper;
|
||||
|
||||
};
|
||||
|
||||
|
|
|
@ -141,7 +141,7 @@ in
|
|||
setgid = false;
|
||||
};
|
||||
|
||||
security.wrappers.setuid = [ cfg.setuidWrapper ];
|
||||
security.wrappers.gksign = cfg.setuidWrapper;
|
||||
|
||||
systemd.services.gale-galed = {
|
||||
description = "Gale messaging daemon";
|
||||
|
|
|
@ -42,9 +42,7 @@ in
|
|||
|
||||
config = mkIf cfg.enable {
|
||||
|
||||
security.wrappers.setuid = map (program: {
|
||||
inherit program;
|
||||
|
||||
security.wrappers.setuid = map (program: "${program}" = {
|
||||
source = "${pkgs.atd}/bin/${program}";
|
||||
owner = "atd";
|
||||
group = "atd";
|
||||
|
|
|
@ -61,7 +61,7 @@ in
|
|||
A list of Cron jobs to be appended to the system-wide
|
||||
crontab. See the manual page for crontab for the expected
|
||||
format. If you want to get the results mailed you must setuid
|
||||
sendmail. See <option>security.wrappers.setuid</option>
|
||||
sendmail. See <option>security.wrappers</option>
|
||||
|
||||
If neither /var/cron/cron.deny nor /var/cron/cron.allow exist only root
|
||||
will is allowed to have its own crontab file. The /var/cron/cron.deny file
|
||||
|
|
|
@ -114,15 +114,14 @@ in
|
|||
|
||||
systemd.packages = [ pkgs.dbus.daemon ];
|
||||
|
||||
security.wrappers.setuid = singleton
|
||||
{ program = "dbus-daemon-launch-helper";
|
||||
source = "${pkgs.dbus.daemon}/libexec/dbus-daemon-launch-helper";
|
||||
owner = "root";
|
||||
group = "messagebus";
|
||||
setuid = true;
|
||||
setgid = false;
|
||||
permissions = "u+rx,g+rx,o-rx";
|
||||
};
|
||||
security.wrappers.dbus-daemon-launch-helper = {
|
||||
source = "${pkgs.dbus.daemon}/libexec/dbus-daemon-launch-helper";
|
||||
owner = "root";
|
||||
group = "messagebus";
|
||||
setuid = true;
|
||||
setgid = false;
|
||||
permissions = "u+rx,g+rx,o-rx";
|
||||
};
|
||||
|
||||
services.dbus.packages = [
|
||||
pkgs.dbus.out
|
||||
|
|
|
@ -131,13 +131,7 @@ in
|
|||
'';
|
||||
};
|
||||
|
||||
security.wrappers.setuid = singleton
|
||||
{ program = "kcheckpass";
|
||||
source = "${kde_workspace}/lib/kde4/libexec/kcheckpass";
|
||||
owner = "root";
|
||||
group = "root";
|
||||
setuid = true;
|
||||
};
|
||||
security.wrappers.kcheckpass.source = "${kde_workspace}/lib/kde4/libexec/kcheckpass";
|
||||
|
||||
environment.systemPackages =
|
||||
[ pkgs.kde4.kdelibs
|
||||
|
|
|
@ -68,20 +68,10 @@ in
|
|||
'';
|
||||
};
|
||||
|
||||
security.wrappers.setuid = [
|
||||
{
|
||||
program = "kcheckpass";
|
||||
source = "${kde5.plasma-workspace.out}/lib/libexec/kcheckpass";
|
||||
owner = "root";
|
||||
setuid = true;
|
||||
}
|
||||
{
|
||||
program = "start_kdeinit";
|
||||
source = "${kde5.kinit.out}/lib/libexec/kf5/start_kdeinit";
|
||||
owner = "root";
|
||||
setuid = true;
|
||||
}
|
||||
];
|
||||
security.wrappers = {
|
||||
kcheckpass.source = "${kde5.plasma-workspace.out}/lib/libexec/kcheckpass";
|
||||
"start_kdeinit".source = "${kde5.kinit.out}/lib/libexec/kf5/start_kdeinit";
|
||||
};
|
||||
|
||||
environment.systemPackages =
|
||||
[
|
||||
|
|
|
@ -68,9 +68,8 @@ in
|
|||
boot.extraModulePackages = [ kernelModules ];
|
||||
environment.systemPackages = [ virtualbox ];
|
||||
|
||||
security.wrappers.setuid = let
|
||||
mkSuid = program: {
|
||||
inherit program;
|
||||
security.wrappers = let
|
||||
mkSuid = program: "${program}" = {
|
||||
source = "${virtualbox}/libexec/virtualbox/${program}";
|
||||
owner = "root";
|
||||
group = "vboxusers";
|
||||
|
|
Loading…
Reference in New Issue