Commit Graph

4941 Commits

Author SHA1 Message Date
24c70c3683 feeds: switch acoup.blog to the database type feed
at some point my feed script became capable of understanding his RSS :)
2024-01-28 12:37:38 +00:00
bfec531fa2 sandbox a bunch more apps 2024-01-28 11:43:05 +00:00
de11edffa5 programs/assorted: remove more unused programs 2024-01-28 11:34:33 +00:00
294f167df0 sane-sandboxed: fix CLI escaping with capsh 2024-01-28 11:11:07 +00:00
e536e3c718 programs/assorted.nix: remove unused tree-sitter package 2024-01-28 11:03:09 +00:00
17d14dbac2 programs/assorted.nix: uninstall some programs i don't frequently use 2024-01-28 10:40:57 +00:00
94981ef335 vim: sandbox 2024-01-28 10:39:08 +00:00
3cd244be76 git: sandbox with bwrap 2024-01-28 10:36:19 +00:00
f100595257 modules/programs: properly forward autodetectCliPaths to the sandboxer 2024-01-28 10:31:07 +00:00
e84da827c2 sane-sandboxed: fix typo in add-pwd flag 2024-01-28 09:17:12 +00:00
42f9fa029d modules/programs: fix that whitelistPwd wasnt passed into the sandbox profile 2024-01-28 09:04:27 +00:00
40fee97b06 modules/programs: make-sandboxed: disallowReferences to the fake sane-sandboxed used during checkPhase 2024-01-28 08:58:13 +00:00
3cc8292d8b modules/programs: make-sandboxed: support packages with checkPhase by bypassing the sandbox 2024-01-28 07:45:08 +00:00
9261d30a34 modules/programs: reformatting 2024-01-28 05:58:08 +00:00
3eb3a8db5a modules/programs: add a whitelistPwd option to grant the program access to the directory it was called from 2024-01-28 05:57:30 +00:00
97129268f0 modules/programs: sandbox: add "capshonly" as a valid sandbox.method 2024-01-28 05:57:11 +00:00
fa39a965ca TODO: investigate sane.programs as a contributor to nixos-rebuild times 2024-01-28 05:55:32 +00:00
7da979503b bubblewrap: explicitly disable sandboxing 2024-01-27 17:20:40 +00:00
3b32c26026 zsh: explicitly disable sandboxing 2024-01-27 17:20:24 +00:00
cad25306e7 alacritty: explicitly disable sandbox 2024-01-27 17:20:11 +00:00
4d7414c941 programs: introduce and use "autodetectCliPaths" nix config 2024-01-27 17:19:48 +00:00
b29b8bdec7 wireshark: specify capabilities via sandbox.capabilities config 2024-01-27 17:12:40 +00:00
a7d081bfcb modules/programs: add a sane.strictSandboxing option 2024-01-27 17:11:07 +00:00
5ca208d07f modules/programs: sandbox: add enable flag and capabilities structured config 2024-01-27 17:08:27 +00:00
6c605944c5 pkgs: firefox-extensions: update to latest 2024-01-27 15:50:47 +00:00
02b6e17449 nicotine-plus: disable
now i have no firejail programs; no more setuid wrapper in /run/wrappers :)
2024-01-27 15:37:43 +00:00
770db96ec6 go2tv: sandbox with bwrap 2024-01-27 15:31:08 +00:00
ff356fdd49 playerctl: sandbox with bwrap 2024-01-27 15:18:56 +00:00
eec89e2cc1 librewolf: sandbox with bwrap 2024-01-27 15:16:53 +00:00
d69d8f64f3 tor-browser: sandbox with bwrap; remove useHardenedMalloc patch 2024-01-27 15:04:22 +00:00
4ee2562202 programs: tidy: prefer "sandbox.extraHomePaths" over "fs" for external deps 2024-01-27 14:54:17 +00:00
08b1ece56e programs: gnome-weather: sandbox with bwrap 2024-01-27 14:53:38 +00:00
26b978dcf2 modules/programs: sandbox: fix "inline" -> "inplace" typo 2024-01-27 14:42:25 +00:00
b22c2e094c koreader: sandbox with bwrap 2024-01-27 14:39:22 +00:00
b40775f97c koreader-from-src: document FTP configuration 2024-01-27 14:39:02 +00:00
a27a72646c koreader-from-src: fix non-cross build 2024-01-27 14:38:52 +00:00
100ddad40e wike: link to issue about state directory 2024-01-27 14:27:02 +00:00
d8b6d419b6 modules/programs: sandboxing: add wrapperType = "wrappedDerivation" to wrap without rebuilding the whole package 2024-01-27 14:26:41 +00:00
1bde38bf72 cozy: sandbox with bwrap 2024-01-27 13:11:22 +00:00
a06c81643c sane-sandboxed: don't error if ~ files aren't available to be bound 2024-01-27 12:48:58 +00:00
15fd7bf4a5 sane-sandboxed: implement a "capshonly" backend 2024-01-27 12:39:36 +00:00
0a25ef544f wike: sandbox with bwrap 2024-01-27 12:29:58 +00:00
a6b824d3c4 modules/programs/sandbox: add an "embedProfile" option to source sandbox settings from the package instead of the system 2024-01-27 12:23:25 +00:00
79ee47bada firefox: get away with linking slightly less into the sandbox 2024-01-27 11:41:18 +00:00
be06e61bfb programs: geary: fix sandboxing
this is an UGLY one. geary itself uses bwrap, and that fails if it's sandboxed AT ALL in landlock (i.e. even with just / landlocked as RW).

maybe this has to do with what landlock-sandboxer considers 'read/write' to be, and there's actually more file ops i need to enable on /
2024-01-27 11:28:08 +00:00
3b4884fcf1 sane-sandbox: fix secret binding 2024-01-27 11:26:10 +00:00
4319dc58eb programs: landlock: restrict the capabilities of sandboxed processes 2024-01-27 09:49:51 +00:00
3122434908 programs: add an option to configure extra home paths to make accessible in the sandbox 2024-01-27 09:11:32 +00:00
dae7785ee2 wireshark: remove dead code 2024-01-27 09:04:08 +00:00
d54f8b1e93 programs: fix so environment variables make it onto user sessions 2024-01-27 09:02:55 +00:00