See https://www.redhat.com/sysadmin/fedora-31-control-group-v2 for details on why this is desirable, and how it impacts containers. Users that need to keep using the old cgroup hierarchy can re-enable it by setting `systemd.unifiedCgroupHierarchy` to `false`. Well-known candidates not supporting that hierarchy, like docker and hidepid=… will disable it automatically. Fixes #73800
		
			
				
	
	
		
			32 lines
		
	
	
		
			869 B
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			32 lines
		
	
	
		
			869 B
		
	
	
	
		
			Nix
		
	
	
	
	
	
{ config, lib, ... }:
 | 
						|
with lib;
 | 
						|
 | 
						|
{
 | 
						|
  meta = {
 | 
						|
    maintainers = [ maintainers.joachifm ];
 | 
						|
    doc = ./hidepid.xml;
 | 
						|
  };
 | 
						|
 | 
						|
  options = {
 | 
						|
    security.hideProcessInformation = mkOption {
 | 
						|
      type = types.bool;
 | 
						|
      default = false;
 | 
						|
      description = ''
 | 
						|
        Restrict process information to the owning user.
 | 
						|
      '';
 | 
						|
    };
 | 
						|
  };
 | 
						|
 | 
						|
  config = mkIf config.security.hideProcessInformation {
 | 
						|
    users.groups.proc.gid = config.ids.gids.proc;
 | 
						|
    users.groups.proc.members = [ "polkituser" ];
 | 
						|
 | 
						|
    boot.specialFileSystems."/proc".options = [ "hidepid=2" "gid=${toString config.ids.gids.proc}" ];
 | 
						|
    systemd.services.systemd-logind.serviceConfig.SupplementaryGroups = [ "proc" ];
 | 
						|
 | 
						|
    # Disable cgroupsv2, which doesn't work with hidepid.
 | 
						|
    # https://github.com/NixOS/nixpkgs/pull/104094#issuecomment-729996203
 | 
						|
    systemd.enableUnifiedCgroupHierarchy = false;
 | 
						|
  };
 | 
						|
}
 |