summaryrefslogtreecommitdiff
path: root/modules/security/sandbox/default.nix
diff options
context:
space:
mode:
authorWeijia Wang <9713184+wegank@users.noreply.github.com>2024-04-14 23:02:32 +0200
committerWeijia Wang <9713184+wegank@users.noreply.github.com>2024-04-19 04:05:50 +0200
commitdef1e23be848848400d1d097d4f044e3c401f9dd (patch)
tree7a69686dea36e304c788531fda90bc3edeee86fd /modules/security/sandbox/default.nix
parent99b3f9a1f5d2604d542f367d38001dfa40eea7b9 (diff)
treewide: remove lib.mdDoc
Diffstat (limited to 'modules/security/sandbox/default.nix')
-rw-r--r--modules/security/sandbox/default.nix14
1 files changed, 7 insertions, 7 deletions
diff --git a/modules/security/sandbox/default.nix b/modules/security/sandbox/default.nix
index a80c9f6..d6987e6 100644
--- a/modules/security/sandbox/default.nix
+++ b/modules/security/sandbox/default.nix
@@ -27,37 +27,37 @@ let
type = types.listOf types.package;
default = [ ];
apply = paths: pkgs.closureInfo { rootPaths = paths; };
- description = lib.mdDoc "List of store paths to make accessible.";
+ description = "List of store paths to make accessible.";
};
readablePaths = mkOption {
type = types.listOf types.path;
default = [ ];
- description = lib.mdDoc "List of paths that should be read-only inside the sandbox.";
+ description = "List of paths that should be read-only inside the sandbox.";
};
writablePaths = mkOption {
type = types.listOf types.path;
default = [ ];
- description = lib.mdDoc "List of paths that should be read/write inside the sandbox.";
+ description = "List of paths that should be read/write inside the sandbox.";
};
allowSystemPaths = mkOption {
type = types.bool;
default = false;
- description = lib.mdDoc "Whether to allow read access to FHS paths like /etc and /var.";
+ description = "Whether to allow read access to FHS paths like /etc and /var.";
};
allowLocalNetworking = mkOption {
type = types.bool;
default = false;
- description = lib.mdDoc "Whether to allow localhost network access inside the sandbox.";
+ description = "Whether to allow localhost network access inside the sandbox.";
};
allowNetworking = mkOption {
type = types.bool;
default = false;
- description = lib.mdDoc "Whether to allow network access inside the sandbox.";
+ description = "Whether to allow network access inside the sandbox.";
};
};
@@ -133,7 +133,7 @@ in
security.sandbox.profiles = mkOption {
type = types.attrsOf (types.submodule profile);
default = { };
- description = lib.mdDoc "Definition of sandbox profiles.";
+ description = "Definition of sandbox profiles.";
};
};