+7
-10
nixos/modules/services/search/manticore.nix
+7
-10
nixos/modules/services/search/manticore.nix
··················
+22
-25
nixos/modules/services/search/meilisearch.nix
+22
-25
nixos/modules/services/search/meilisearch.nix
···························+EnvironmentFile = lib.mkIf (cfg.masterKeyEnvironmentFile != null) cfg.masterKeyEnvironmentFile;
+6
-9
nixos/modules/services/search/opensearch.nix
+6
-9
nixos/modules/services/search/opensearch.nix
··················
+34
-36
nixos/modules/services/search/qdrant.nix
+34
-36
nixos/modules/services/search/qdrant.nix
······Refer to <https://github.com/qdrant/qdrant/blob/master/config/config.yaml> for details on supported values.······
+5
-8
nixos/modules/services/search/quickwit.nix
+5
-8
nixos/modules/services/search/quickwit.nix
··················
+34
-37
nixos/modules/services/security/certmgr.nix
+34
-37
nixos/modules/services/security/certmgr.nix
······description = "How often to check certificate expirations and how often to update the cert_next_expires metric.";···············Specify paths as specs, if you want to use include auth_key - or use the auth_key_file option."···
+51
-54
nixos/modules/services/security/cfssl.nix
+51
-54
nixos/modules/services/security/cfssl.nix
······description = "CA used to sign the new certificate -- accepts '[file:]fname' or 'env:varname'.";···description = "Path to configuration file. Do not put this in nix-store as it might contain secrets.";description = "Mutual TLS - client certificate to call remote instance requiring client certs.";description = "Mutual TLS - client key to call remote instance requiring client certs. Do not put this in nix-store.";·········
+45
-46
nixos/modules/services/security/clamav.nix
+45
-46
nixos/modules/services/security/clamav.nix
······-(mkRemovedOptionModule [ "services" "clamav" "updater" "config" ] "Use services.clamav.updater.settings instead.")-(mkRemovedOptionModule [ "services" "clamav" "updater" "extraConfig" ] "Use services.clamav.updater.settings instead.")-(mkRemovedOptionModule [ "services" "clamav" "daemon" "extraConfig" ] "Use services.clamav.daemon.settings instead.")+(lib.mkRemovedOptionModule [ "services" "clamav" "updater" "config" ] "Use services.clamav.updater.settings instead.")+(lib.mkRemovedOptionModule [ "services" "clamav" "updater" "extraConfig" ] "Use services.clamav.updater.settings instead.")+(lib.mkRemovedOptionModule [ "services" "clamav" "daemon" "extraConfig" ] "Use services.clamav.daemon.settings instead.")················································
+18
-21
nixos/modules/services/security/endlessh-go.nix
+18
-21
nixos/modules/services/security/endlessh-go.nix
···························
+10
-13
nixos/modules/services/security/endlessh.nix
+10
-13
nixos/modules/services/security/endlessh.nix
··················
+74
-77
nixos/modules/services/security/fail2ban.nix
+74
-77
nixos/modules/services/security/fail2ban.nix
······] "The daemon is now configured through the attribute set `services.fail2ban.daemonSettings`.")"The extra default configuration can now be set using `services.fail2ban.jails.DEFAULT.settings`."······description = "The firewall package used by fail2ban service. Defaults to the package for your firewall (iptables or nftables).";···default = if config.networking.nftables.enable then "nftables-multiport" else "iptables-multiport";-defaultText = literalExpression ''if config.networking.nftables.enable then "nftables-multiport" else "iptables-multiport"'';+defaultText = lib.literalExpression ''if config.networking.nftables.enable then "nftables-multiport" else "iptables-multiport"'';···default = if config.networking.nftables.enable then "nftables-allports" else "iptables-allports";-defaultText = literalExpression ''if config.networking.nftables.enable then "nftables-allports" else "iptables-allports"'';+defaultText = lib.literalExpression ''if config.networking.nftables.enable then "nftables-allports" else "iptables-allports"'';shorewall, etc) for "allports" jails. It is used to define action_* variables. Can be overridden···"bantime.increment" allows to use database for searching of previously banned ip's to increase···"bantime.maxtime" is the max number of seconds using the ban time can reach (don't grows further)"bantime.factor" is a coefficient to calculate exponent growing of the formula or common multiplier,······"bantime.multipliers" used to calculate next value of ban time instead of formula, corresponding···"bantime.overalljails" (if true) specifies the search of IP in the database will be executed···············assertion = cfg.bantime-increment.formula == null || cfg.bantime-increment.multipliers == null;···+warnings = lib.mkIf (!config.networking.firewall.enable && !config.networking.nftables.enable) [······-ignoreip = ''127.0.0.1/8 ${optionalString config.networking.enableIPv6 "::1"} ${concatStringsSep " " cfg.ignoreIP}'';+ignoreip = ''127.0.0.1/8 ${lib.optionalString config.networking.enableIPv6 "::1"} ${lib.concatStringsSep " " cfg.ignoreIP}'';···
+10
-13
nixos/modules/services/security/fprintd.nix
+10
-13
nixos/modules/services/security/fprintd.nix
······-defaultText = literalExpression "if config.services.fprintd.tod.enable then pkgs.fprintd-tod else pkgs.fprintd";+defaultText = lib.literalExpression "if config.services.fprintd.tod.enable then pkgs.fprintd-tod else pkgs.fprintd";·········
+23
-27
nixos/modules/services/security/haka.nix
+23
-27
nixos/modules/services/security/haka.nix
···············
+4
-7
nixos/modules/services/security/haveged.nix
+4
-7
nixos/modules/services/security/haveged.nix
·········# https://github.com/jirka-h/haveged/blob/a4b69d65a8dfc5a9f52ff8505c7f58dcf8b9234f/contrib/Fedora/haveged.service
+7
-10
nixos/modules/services/security/hologram-agent.nix
+7
-10
nixos/modules/services/security/hologram-agent.nix
·········
+31
-34
nixos/modules/services/security/hologram-server.nix
+31
-34
nixos/modules/services/security/hologram-server.nix
······
+5
-8
nixos/modules/services/security/infnoise.nix
+5
-8
nixos/modules/services/security/infnoise.nix
···SUBSYSTEM=="usb", ATTRS{idVendor}=="0403", ATTRS{idProduct}=="6015", SYMLINK+="infnoise", TAG+="systemd", GROUP="dialout", MODE="0664", ENV{SYSTEMD_WANTS}="infnoise.service"
+4
-7
nixos/modules/services/security/munge.nix
+4
-7
nixos/modules/services/security/munge.nix
·········
+5
-8
nixos/modules/services/security/nginx-sso.nix
+5
-8
nixos/modules/services/security/nginx-sso.nix
······
+39
-40
nixos/modules/services/security/opensnitch.nix
+39
-40
nixos/modules/services/security/opensnitch.nix
·································# pkg.opensnitch is referred to elsewhere in the module so we don't need to worry about it being garbage collected···"${pkgs.opensnitch}/bin/opensnitchd --config-file ${format.generate "default-config.json" cfg.settings}"···--not \( ${concatMapStringsSep " -o " ({ local, ... }: "-name '${baseNameOf local}*'") rules} \) \
+4
-7
nixos/modules/services/security/pass-secret-service.nix
+4
-7
nixos/modules/services/security/pass-secret-service.nix
···
+53
-52
nixos/modules/services/security/physlock.nix
+53
-52
nixos/modules/services/security/physlock.nix
··················-++ optional (cfg.lockOn.hibernate || cfg.lockOn.suspend) "systemd-suspend-then-hibernate.service"-ExecStart = "${pkgs.physlock}/bin/physlock -d${optionalString cfg.muteKernelMessages "m"}${optionalString cfg.disableSysRq "s"}${+ExecStart = "${pkgs.physlock}/bin/physlock -d${lib.optionalString cfg.muteKernelMessages "m"}${lib.optionalString cfg.disableSysRq "s"}${
+15
-18
nixos/modules/services/security/sks.nix
+15
-18
nixos/modules/services/security/sks.nix
··················
+25
-28
nixos/modules/services/security/sshguard.nix
+25
-28
nixos/modules/services/security/sshguard.nix
·········Block attackers when their cumulative attack score exceeds threshold. Most attacks have a score of 10.Blacklist an attacker when its score exceeds threshold. Blacklisted addresses are loaded from and added to blacklist-file.Blacklist an attacker when its score exceeds threshold. Blacklisted addresses are loaded from and added to blacklist-file.Block attackers for initially blocktime seconds after exceeding threshold. Subsequent blocks increase by a factor of 1.5.···············
+2
-5
nixos/modules/services/security/sslmate-agent.nix
+2
-5
nixos/modules/services/security/sslmate-agent.nix
······-enable = mkEnableOption "sslmate-agent, a daemon for managing SSL/TLS certificates on a server";+enable = lib.mkEnableOption "sslmate-agent, a daemon for managing SSL/TLS certificates on a server";
+9
-10
nixos/modules/services/security/tang.nix
+9
-10
nixos/modules/services/security/tang.nix
·········
+145
-140
nixos/modules/services/security/tor.nix
+145
-140
nixos/modules/services/security/tor.nix
····································-(mkRemovedOptionModule [ "services" "tor" "relay" "isExit" ] "Use services.tor.relay.role instead.")-(mkRenamedOptionModule [ "services" "tor" "relay" "port" ] [ "services" "tor" "settings" "ORPort" ])···················································options.HiddenServiceMaxStreamsCloseCircuit = optionBool "HiddenServiceMaxStreamsCloseCircuit";······options.ClientPreferIPv6DirPort = optionBool "ClientPreferIPv6DirPort"; # default is null and like "auto"options.ClientPreferIPv6ORPort = optionBool "ClientPreferIPv6ORPort"; # default is null and like "auto"·········options.DormantTimeoutDisabledByIdleStreams = optionBool "DormantTimeoutDisabledByIdleStreams";························
+9
-10
nixos/modules/services/security/torify.nix
+9
-10
nixos/modules/services/security/torify.nix
···············
+19
-22
nixos/modules/services/security/torsocks.nix
+19
-22
nixos/modules/services/security/torsocks.nix
······-defaultText = literalExpression "config.services.tor.enable && config.services.tor.client.enable";+defaultText = lib.literalExpression "config.services.tor.enable && config.services.tor.client.enable";··················environment.systemPackages = [ pkgs.torsocks (wrapTorsocks "torsocks-faster" cfg.fasterServer) ];
+32
-34
nixos/modules/services/security/usbguard.nix
+32
-34
nixos/modules/services/security/usbguard.nix
··········································(lib.concatStrings (map (g: "subject.isInGroup(\"${g}\") || ") cfg.IPCAllowedGroups)) + "false";···"The usbguard module now hardcodes IPCAccessControlFiles to /var/lib/usbguard/IPCAccessControl.d."] "Removed usbguard module audit log files. Audit logs can be found in the systemd journal.")
+17
-20
nixos/modules/services/security/vault-agent.nix
+17
-20
nixos/modules/services/security/vault-agent.nix
······Creates independent `${flavour}-''${name}.service` systemd units for each instance defined here.·····················
+40
-41
nixos/modules/services/security/vault.nix
+40
-41
nixos/modules/services/security/vault.nix
·········++ lib.optional (cfg.dev && cfg.devRootTokenID != null) "-dev-root-token-id=${cfg.devRootTokenID}"···In this mode, Vault runs in-memory and starts unsealed. This option is not meant production but for development and testing i.e. for nixos tests.···if cfg.storageBackend == "file" || cfg.storageBackend == "raft" then "/var/lib/vault" else null;·········assertion = cfg.storageBackend == "inmem" -> (cfg.storagePath == null && cfg.storageConfig == null);······-] ++ optional (config.services.consul.enable && cfg.storageBackend == "consul") "consul.service";+++ lib.optional (config.services.consul.enable && cfg.storageBackend == "consul") "consul.service";restartIfChanged = false; # do not restart on "nixos-rebuild switch". It would seal the storage and disrupt the clients.···
+11
-13
nixos/modules/services/security/yubikey-agent.nix
+11
-13
nixos/modules/services/security/yubikey-agent.nix
·········-systemd.user.services.yubikey-agent = mkIf (config.programs.gnupg.agent.pinentryPackage != null) {
+4
-7
nixos/modules/services/system/automatic-timezoned.nix
+4
-7
nixos/modules/services/system/automatic-timezoned.nix
······
+14
-17
nixos/modules/services/system/cachix-agent/default.nix
+14
-17
nixos/modules/services/system/cachix-agent/default.nix
············
+17
-20
nixos/modules/services/system/cachix-watch-store.nix
+17
-20
nixos/modules/services/system/cachix-watch-store.nix
······
+29
-32
nixos/modules/services/system/cloud-init.nix
+29
-32
nixos/modules/services/system/cloud-init.nix
···························
+5
-8
nixos/modules/services/system/localtimed.nix
+5
-8
nixos/modules/services/system/localtimed.nix
·········+geoclue2Package = lib.mkPackageOption pkgs "Geoclue2" { default = "geoclue2-with-demo-agent"; };
+31
-35
nixos/modules/services/system/nix-daemon.nix
+31
-35
nixos/modules/services/system/nix-daemon.nix
···············-(mkRemovedOptionModule [ "nix" "daemonNiceLevel" ] "Consider nix.daemonCPUSchedPolicy instead.")+(lib.mkRemovedOptionModule [ "nix" "daemonNiceLevel" ] "Consider nix.daemonCPUSchedPolicy instead.")························
+14
-17
nixos/modules/services/system/nscd.nix
+14
-17
nixos/modules/services/system/nscd.nix
·····················
+7
-10
nixos/modules/services/system/saslauthd.nix
+7
-10
nixos/modules/services/system/saslauthd.nix
·········
+3
-6
nixos/modules/services/system/uptimed.nix
+3
-6
nixos/modules/services/system/uptimed.nix
·········
+43
-46
nixos/modules/services/torrent/deluge.nix
+43
-46
nixos/modules/services/torrent/deluge.nix
····································-allowedTCPPortRanges = singleton (listToRange (cfg.config.listen_ports or listenPortsDefault));-allowedUDPPortRanges = singleton (listToRange (cfg.config.listen_ports or listenPortsDefault));+allowedTCPPortRanges = lib.singleton (listToRange (cfg.config.listen_ports or listenPortsDefault));+allowedUDPPortRanges = lib.singleton (listToRange (cfg.config.listen_ports or listenPortsDefault));···
+16
-19
nixos/modules/services/torrent/flexget.nix
+16
-19
nixos/modules/services/torrent/flexget.nix
···description = "When to perform a {command}`flexget` run. See {command}`man 7 systemd.time` for the format.";description = "When true, execute the runs via the flexget-runner.timer. If false, you have to specify the settings yourself in the YML file.";······
+23
-26
nixos/modules/services/torrent/magnetico.nix
+23
-26
nixos/modules/services/torrent/magnetico.nix
······························
+4
-6
nixos/modules/services/torrent/opentracker.nix
+4
-6
nixos/modules/services/torrent/opentracker.nix
···
+8
-11
nixos/modules/services/torrent/peerflix.nix
+8
-11
nixos/modules/services/torrent/peerflix.nix
······