Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Qubes packages (Its alive!) #341215

Draft
wants to merge 33 commits into
base: master
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from 25 commits
Commits
Show all changes
33 commits
Select commit Hold shift + click to select a range
c781c8e
qubes-core-vchan-xen: 4.1.4 -> 4.2.4
CertainLach Sep 28, 2024
925a8f3
qubes-core-qubesdb: init at 4.2.6
CertainLach Sep 28, 2024
e775521
qubes-core-qrexec: init at 4.2.22
CertainLach Sep 28, 2024
c768b80
qubes-core-admin: init at 4.3.6
CertainLach Sep 28, 2024
b8bf343
qubes-core-admin-client: init at 4.3.4
CertainLach Sep 28, 2024
cfd59ac
qubes-manager: init at 4.2.9-1
CertainLach Sep 28, 2024
a3b6bbf
nixos/qubes: init module
CertainLach Sep 28, 2024
d72a9b7
python3Packages.xen: init
CertainLach Sep 28, 2024
29c5562
qubes-linux-utils: init at 4.3.4
CertainLach Sep 28, 2024
91fdda4
python3Packages.qubes-imgconverter: init
CertainLach Sep 28, 2024
8f0cf22
python3Packages.qubes-desktop-linux-common: init at 4.2.12
CertainLach Sep 28, 2024
39f9d10
qubes-core-libvirt: init at 10.5.0-1
CertainLach Sep 28, 2024
37b9bb1
qubes-vmm-xen: init at 4.19.0-3
SigmaSquadron Sep 28, 2024
d9574b1
qemu_qubes: init at 4.19.0-3
SigmaSquadron Sep 28, 2024
8499a24
qubes-seabios: init at 4.2.0
CertainLach Sep 28, 2024
46f8f67
qubes-vmm-linux-stubdom: init at 4.3.0-1
CertainLach Sep 28, 2024
07f2bac
plasma6: use xwayland module
CertainLach Sep 28, 2024
1473215
qubes-gui-common: init at 4.2.5
CertainLach Sep 28, 2024
e980e18
qubes-app-linux-usb-proxy: init at 1.3.1
CertainLach Sep 28, 2024
474ac83
qubes-desktop-linux-kde: init at 4.2.0
CertainLach Sep 28, 2024
8b53192
qubes-core-admin-linux: init at 4.3.2
CertainLach Sep 28, 2024
7062fb8
qubes-core-agent-linux: init at 4.2.37
CertainLach Sep 28, 2024
28ee223
qubes-artwork: init at 4.3.2-1
CertainLach Sep 28, 2024
e03d0d1
usbguard: packages option
CertainLach Sep 28, 2024
5e6f44b
pkgs.symlinkJoin: ability to remove prefix from tree
CertainLach Sep 28, 2024
4d5b1f5
fixup! pick seabios changes from https://github.com/NixOS/nixpkgs/pul…
CertainLach Sep 30, 2024
1d0b8e6
qubes-core-admin: drop lvm patch
CertainLach Sep 30, 2024
030f9f9
qubes-core-admin: add meta
CertainLach Sep 30, 2024
df424fa
qubes-manager: add meta
CertainLach Sep 30, 2024
ac7f235
qubes-gui-daemon: less aggressive library loading fix
CertainLach Sep 30, 2024
004d2a9
qubes-gui-daemon: use python3Packages
CertainLach Sep 30, 2024
bd8d1ba
qubes-gui-daemon: nixfmt
CertainLach Sep 30, 2024
19915eb
qubes-core-admin: fixup missing patch
CertainLach Sep 30, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions nixos/modules/misc/ids.nix
Original file line number Diff line number Diff line change
Expand Up @@ -689,6 +689,8 @@ in
# References:
# https://www.debian.org/doc/debian-policy/ch-opersys.html#uid-and-gid-classes

qubes = 999; # Qubes dom0 expects gid 999

onepassword = 31001; # 1Password requires that its GID be larger than 1000
onepassword-cli = 31002; # 1Password requires that its GID be larger than 1000

Expand Down
1 change: 1 addition & 0 deletions nixos/modules/module-list.nix
Original file line number Diff line number Diff line change
Expand Up @@ -1716,6 +1716,7 @@
./virtualisation/parallels-guest.nix
./virtualisation/podman/default.nix
./virtualisation/qemu-guest-agent.nix
./virtualisation/qubes-dom0.nix
./virtualisation/rosetta.nix
./virtualisation/spice-usb-redirection.nix
./virtualisation/virtualbox-guest.nix
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/desktop-managers/plasma6.nix
Original file line number Diff line number Diff line change
Expand Up @@ -58,6 +58,7 @@ in {
];

qt.enable = true;
programs.xwayland.enable = true;
environment.systemPackages = with kdePackages; let
requiredPackages = [
qtwayland # Hack? To make everything run on Wayland
Expand Down Expand Up @@ -87,7 +88,6 @@ in {

# Core Plasma parts
kwin
pkgs.xwayland
kscreen
libkscreen
kscreenlocker
Expand Down
26 changes: 26 additions & 0 deletions nixos/modules/services/security/usbguard.nix
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,8 @@ let
daemonConf = ''
# generated by nixos/modules/services/security/usbguard.nix
RuleFile=${ruleFile}
# usual configuration
RuleFolder=/etc/usbguard/rules.d
ImplicitPolicyTarget=${cfg.implicitPolicyTarget}
PresentDevicePolicy=${cfg.presentDevicePolicy}
PresentControllerPolicy=${cfg.presentControllerPolicy}
Expand All @@ -24,6 +26,7 @@ let
IPCAllowedGroups=${concatStringsSep " " cfg.IPCAllowedGroups}
IPCAccessControlFiles=/var/lib/usbguard/IPCAccessControl.d/
DeviceRulesWithPort=${boolToString cfg.deviceRulesWithPort}
AuditBackend=${cfg.AuditBackend}
# HACK: that way audit logs still land in the journal
AuditFilePath=/dev/null
'';
Expand Down Expand Up @@ -149,6 +152,15 @@ in
'';
};

AuditBackend = mkOption {
type = types.enum ["FileAudit" "LinuxAudit"];
default = "FileAudit";
example = "LinuxAudit";
description = ''
USBGuard audit events log backend.
'';
};

deviceRulesWithPort = mkOption {
type = types.bool;
default = false;
Expand All @@ -157,6 +169,14 @@ in
'';
};

packages = mkOption {
type = types.listOf types.package;
default = [ ];
description = ''
Packages containing USBGuard rules in `/etc/usbguard/rules.d`
'';
};

dbus.enable = mkEnableOption "USBGuard dbus daemon";
};
};
Expand Down Expand Up @@ -252,6 +272,12 @@ in
}
});
'';

environment.etc."usbguard/rules.d".source = pkgs.symlinkJoin {
name = "rules.d";
paths = cfg.packages;
stripPrefix = "/etc/usbguard/rules.d";
};
};
imports = [
(mkRemovedOptionModule [ "services" "usbguard" "IPCAccessControlFiles" ] "The usbguard module now hardcodes IPCAccessControlFiles to /var/lib/usbguard/IPCAccessControl.d.")
Expand Down
Loading
Loading