nixos/borgmatic: automatically relax systemd hardening when sudo is required

Changed files
+12 -1
nixos
modules
services
backup
+12 -1
nixos/modules/services/backup/borgmatic.nix
···
postgresql = config.services.postgresql.package;
mysql = config.services.mysql.package;
+
requireSudo =
+
s:
+
s ? postgresql_databases
+
&& lib.any (d: d ? username && !(d ? password) && !(d ? pg_dump_command)) s.postgresql_databases;
addRequiredBinaries =
s:
s
···
postgresql_databases = map (
d:
let
-
as_user = if d ? username then "${pkgs.sudo}/bin/sudo -u ${d.username} " else "";
+
as_user = if d ? username && !(d ? password) then "${pkgs.sudo}/bin/sudo -u ${d.username} " else "";
in
{
pg_dump_command =
···
};
cfgfile = settingsFormat.generate "config.yaml" (addRequiredBinaries cfg.settings);
+
+
anycfgRequiresSudo =
+
requireSudo cfg.settings || lib.any requireSudo (lib.attrValues cfg.configurations);
in
{
options.services.borgmatic = {
···
systemd.packages = [ pkgs.borgmatic ];
systemd.services.borgmatic.path = [ pkgs.coreutils ];
+
systemd.services.borgmatic.serviceConfig = lib.optionalAttrs anycfgRequiresSudo {
+
NoNewPrivileges = false;
+
CapabilityBoundingSet = "CAP_DAC_READ_SEARCH CAP_NET_RAW CAP_SETUID CAP_SETGID";
+
};
# Workaround: https://github.com/NixOS/nixpkgs/issues/81138
systemd.timers.borgmatic.wantedBy = [ "timers.target" ];