AppArmor only requires a few patches to the 3.2 and 3.4 kernels in order to work properly (with the minor catch grsecurity -stable includes the 3.2 patches.) This adds them to the kernel builds by default, removes features.apparmor (since it's always true) and makes it the default MAC system. Signed-off-by: Austin Seipp <aseipp@pobox.com>
		
			
				
	
	
		
			44 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			44 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
{ config, lib, pkgs, ... }:
 | 
						|
 | 
						|
with lib;
 | 
						|
 | 
						|
let
 | 
						|
  cfg = config.security.apparmor;
 | 
						|
in
 | 
						|
{
 | 
						|
  options = {
 | 
						|
    security.apparmor = {
 | 
						|
      enable = mkOption {
 | 
						|
        type = types.bool;
 | 
						|
        default = false;
 | 
						|
        description = "Enable the AppArmor Mandatory Access Control system.";
 | 
						|
      };
 | 
						|
 | 
						|
      profiles = mkOption {
 | 
						|
        type = types.listOf types.path;
 | 
						|
        default = [];
 | 
						|
        description = "List of files containing AppArmor profiles.";
 | 
						|
      };
 | 
						|
    };
 | 
						|
  };
 | 
						|
 | 
						|
  config = mkIf cfg.enable {
 | 
						|
    environment.systemPackages = [ pkgs.apparmor ];
 | 
						|
    systemd.services.apparmor = {
 | 
						|
      wantedBy = [ "local-fs.target" ];
 | 
						|
      path     = [ pkgs.apparmor ];
 | 
						|
 | 
						|
      serviceConfig = {
 | 
						|
        Type = "oneshot";
 | 
						|
        RemainAfterExit = "yes";
 | 
						|
        ExecStart = concatMapStrings (profile:
 | 
						|
          ''${pkgs.apparmor}/sbin/apparmor_parser -rKv -I ${pkgs.apparmor}/etc/apparmor.d/ "${profile}" ; ''
 | 
						|
        ) cfg.profiles;
 | 
						|
        ExecStop = concatMapStrings (profile:
 | 
						|
          ''${pkgs.apparmor}/sbin/apparmor_parser -Rv -I ${pkgs.apparmor}/etc/apparmor.d/ "${profile}" ; ''
 | 
						|
        ) cfg.profiles;
 | 
						|
      };
 | 
						|
    };
 | 
						|
  };
 | 
						|
}
 |