summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/rangehttpserver
diff options
context:
space:
mode:
authorMartin Weinelt <hexa@darmstadt.ccc.de>2024-07-20 19:42:43 +0200
committerMartin Weinelt <hexa@darmstadt.ccc.de>2024-07-22 14:51:39 +0200
commit809ea5c6bd44535e02e93ae4277c01e1c0d1b46d (patch)
tree06632eb41b3a4fc27adc8b76254e873fa6297e7a /pkgs/development/python-modules/rangehttpserver
parent3df9f56eabed1504b7cd108fdffe88526eba9730 (diff)
nixos/ollama: replace flawed sandboxing option
The ollama module in its default configuration relies on systemd's `DynamicUser=` feature for user allocation. In #305076 that allocation was made conditional and tied to the `sandboxing` option, that was intended to fix access to model directories outside the allocated state directory. However, by disabling sandboxing ollama would inadvertently run as root, given that `User=` and `Group=` are not required to be set. The correct way to grant access to other paths is to allocate static user and group, and grant permissions to the destination path to that allocation. We therefore replace the sandboxing option user and group options, that default to `null`, which means they default to `DynamicUser=`, but can be replaced with a statically allocated user/group, and thereby a stable uid/gid. Fixes: 552eb759 ("nixos/ollama: add options to bypass sandboxing")
Diffstat (limited to 'pkgs/development/python-modules/rangehttpserver')
0 files changed, 0 insertions, 0 deletions