 d22b3ed4bc
			
		
	
	
		d22b3ed4bc
		
	
	
	
	
		
			
			See https://www.redhat.com/sysadmin/fedora-31-control-group-v2 for details on why this is desirable, and how it impacts containers. Users that need to keep using the old cgroup hierarchy can re-enable it by setting `systemd.unifiedCgroupHierarchy` to `false`. Well-known candidates not supporting that hierarchy, like docker and hidepid=… will disable it automatically. Fixes #73800
		
			
				
	
	
		
			32 lines
		
	
	
		
			869 B
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			32 lines
		
	
	
		
			869 B
		
	
	
	
		
			Nix
		
	
	
	
	
	
| { config, lib, ... }:
 | |
| with lib;
 | |
| 
 | |
| {
 | |
|   meta = {
 | |
|     maintainers = [ maintainers.joachifm ];
 | |
|     doc = ./hidepid.xml;
 | |
|   };
 | |
| 
 | |
|   options = {
 | |
|     security.hideProcessInformation = mkOption {
 | |
|       type = types.bool;
 | |
|       default = false;
 | |
|       description = ''
 | |
|         Restrict process information to the owning user.
 | |
|       '';
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   config = mkIf config.security.hideProcessInformation {
 | |
|     users.groups.proc.gid = config.ids.gids.proc;
 | |
|     users.groups.proc.members = [ "polkituser" ];
 | |
| 
 | |
|     boot.specialFileSystems."/proc".options = [ "hidepid=2" "gid=${toString config.ids.gids.proc}" ];
 | |
|     systemd.services.systemd-logind.serviceConfig.SupplementaryGroups = [ "proc" ];
 | |
| 
 | |
|     # Disable cgroupsv2, which doesn't work with hidepid.
 | |
|     # https://github.com/NixOS/nixpkgs/pull/104094#issuecomment-729996203
 | |
|     systemd.enableUnifiedCgroupHierarchy = false;
 | |
|   };
 | |
| }
 |