nix-files/hosts/common/programs/wireshark.nix

27 lines
885 B
Nix
Raw Normal View History

2024-01-22 13:12:10 +00:00
{ config, lib, ... }:
let
cfg = config.sane.programs.wireshark;
in
2023-05-10 04:52:12 +00:00
{
2024-01-22 13:12:10 +00:00
sane.programs.wireshark = {
sandbox.method = "firejail";
sandbox.extraFirejailConfig = ''
# somehow needs `setpcap` (makes these bounding capabilities also be inherited?)
# else no interfaces appear on the main page
ignore caps.keep dac_override,dac_read_search,net_admin,net_raw
caps.keep dac_override,dac_read_search,net_admin,net_raw,setpcap
'';
slowToBuild = true;
};
2024-01-22 13:12:10 +00:00
programs.wireshark = lib.mkIf cfg.enabled {
# adds a SUID wrapper for wireshark's `dumpcap` program
enable = true;
package = cfg.package;
};
# the SUID wrapper can't also be a firejail (idk why? it might be that the binary's already *too* restricted).
security.wrappers = lib.mkIf cfg.enabled {
dumpcap.source = lib.mkForce "${cfg.package}/bin/.dumpcap-firejailed";
};
2023-05-10 04:52:12 +00:00
}