diff options
| author | Martin Weinelt <hexa@darmstadt.ccc.de> | 2024-07-20 19:42:43 +0200 |
|---|---|---|
| committer | Martin Weinelt <hexa@darmstadt.ccc.de> | 2024-07-22 14:51:39 +0200 |
| commit | 809ea5c6bd44535e02e93ae4277c01e1c0d1b46d (patch) | |
| tree | 06632eb41b3a4fc27adc8b76254e873fa6297e7a /pkgs/development/python-modules/rangehttpserver | |
| parent | 3df9f56eabed1504b7cd108fdffe88526eba9730 (diff) | |
nixos/ollama: replace flawed sandboxing option
The ollama module in its default configuration relies on systemd's
`DynamicUser=` feature for user allocation. In #305076 that allocation
was made conditional and tied to the `sandboxing` option, that was
intended to fix access to model directories outside the allocated state
directory.
However, by disabling sandboxing ollama would inadvertently run as root,
given that `User=` and `Group=` are not required to be set.
The correct way to grant access to other paths is to allocate static
user and group, and grant permissions to the destination path to that
allocation.
We therefore replace the sandboxing option user and group options, that
default to `null`, which means they default to `DynamicUser=`, but can
be replaced with a statically allocated user/group, and thereby a stable
uid/gid.
Fixes: 552eb759 ("nixos/ollama: add options to bypass sandboxing")
Diffstat (limited to 'pkgs/development/python-modules/rangehttpserver')
0 files changed, 0 insertions, 0 deletions
