Loading nixos/modules/services/logging/logrotate.nix +5 −3 Original line number Diff line number Diff line Loading @@ -260,6 +260,8 @@ in # hardening CapabilityBoundingSet = [ "CAP_CHOWN" "CAP_DAC_OVERRIDE" "CAP_SETUID" "CAP_SETGID" ]; DevicePolicy = "closed"; Loading @@ -280,16 +282,16 @@ in ProtectSystem = "full"; RestrictNamespaces = true; RestrictRealtime = true; RestrictSUIDSGID = true; RestrictSUIDSGID = false; # can create sgid directories SystemCallArchitectures = "native"; SystemCallFilter = [ "@system-service" "@system-service @setuid" "~@privileged @resources" "@chown" ]; UMask = "0027"; } // lib.optionalAttrs (!cfg.allowNetworking) { PrivateNetwork = true; PrivateNetwork = true; # e.g. mail delivery RestrictAddressFamilies = "none"; }; }; Loading Loading
nixos/modules/services/logging/logrotate.nix +5 −3 Original line number Diff line number Diff line Loading @@ -260,6 +260,8 @@ in # hardening CapabilityBoundingSet = [ "CAP_CHOWN" "CAP_DAC_OVERRIDE" "CAP_SETUID" "CAP_SETGID" ]; DevicePolicy = "closed"; Loading @@ -280,16 +282,16 @@ in ProtectSystem = "full"; RestrictNamespaces = true; RestrictRealtime = true; RestrictSUIDSGID = true; RestrictSUIDSGID = false; # can create sgid directories SystemCallArchitectures = "native"; SystemCallFilter = [ "@system-service" "@system-service @setuid" "~@privileged @resources" "@chown" ]; UMask = "0027"; } // lib.optionalAttrs (!cfg.allowNetworking) { PrivateNetwork = true; PrivateNetwork = true; # e.g. mail delivery RestrictAddressFamilies = "none"; }; }; Loading