mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-12-14 01:33:10 +00:00
ef553788d0
The default, which is /tmp, has a few issues associated with it: One being that it makes it easy for users on the system to spoof a PostgreSQL server if it's not running, causing applications to connect to their provided sockets instead of just failing to connect. Another one is that it makes sandboxing of PostgreSQL and other services unnecessarily difficult. This is already the case if only PrivateTmp is used in a systemd service, so in order for such a service to be able to connect to PostgreSQL, a bind mount needs to be done from /tmp to some other path, so the service can access it. This pretty much defeats the whole purpose of PrivateTmp. We regularily run into issues with this in the past already (one example would be https://github.com/NixOS/nixpkgs/pull/24317) and with the new systemd-confinement mode upcoming in https://github.com/NixOS/nixpkgs/pull/57519, it makes it even more tedious to sandbox services. I've tested this change against all the postgresql NixOS VM tests and they still succeed and I also grepped through the source tree to replace other occasions where we might have /tmp hardcoded. Luckily there were very few occasions. Signed-off-by: aszlig <aszlig@nix.build> Cc: @ocharles, @thoughtpolice, @danbst |
||
---|---|---|
.. | ||
4store-endpoint.nix | ||
4store.nix | ||
aerospike.nix | ||
cassandra.nix | ||
clickhouse.nix | ||
cockroachdb.nix | ||
couchdb.nix | ||
firebird.nix | ||
foundationdb.nix | ||
foundationdb.xml | ||
hbase.nix | ||
influxdb.nix | ||
memcached.nix | ||
monetdb.nix | ||
mongodb.nix | ||
mysql.nix | ||
neo4j.nix | ||
openldap.nix | ||
opentsdb.nix | ||
pgmanage.nix | ||
postgresql.nix | ||
postgresql.xml | ||
redis.nix | ||
rethinkdb.nix | ||
riak-cs.nix | ||
riak.nix | ||
stanchion.nix | ||
virtuoso.nix |