summaryrefslogtreecommitdiff
path: root/modules/security
diff options
context:
space:
mode:
authorWeijia Wang <9713184+wegank@users.noreply.github.com>2024-04-14 23:02:32 +0200
committerWeijia Wang <9713184+wegank@users.noreply.github.com>2024-04-19 04:05:50 +0200
commitdef1e23be848848400d1d097d4f044e3c401f9dd (patch)
tree7a69686dea36e304c788531fda90bc3edeee86fd /modules/security
parent99b3f9a1f5d2604d542f367d38001dfa40eea7b9 (diff)
treewide: remove lib.mdDoc
Diffstat (limited to 'modules/security')
-rw-r--r--modules/security/pam.nix2
-rw-r--r--modules/security/pki/default.nix8
-rw-r--r--modules/security/sandbox/default.nix14
-rw-r--r--modules/security/sudo.nix2
4 files changed, 13 insertions, 13 deletions
diff --git a/modules/security/pam.nix b/modules/security/pam.nix
index f0c77dc..69b4c37 100644
--- a/modules/security/pam.nix
+++ b/modules/security/pam.nix
@@ -40,7 +40,7 @@ in
{
options = {
security.pam.enableSudoTouchIdAuth = mkEnableOption "" // {
- description = lib.mdDoc ''
+ description = ''
Enable sudo authentication with Touch ID.
When enabled, this option adds the following line to
diff --git a/modules/security/pki/default.nix b/modules/security/pki/default.nix
index d0f11d4..00d1f98 100644
--- a/modules/security/pki/default.nix
+++ b/modules/security/pki/default.nix
@@ -24,7 +24,7 @@ in
security.pki.installCACerts = mkOption {
type = types.bool;
default = true;
- description = lib.mdDoc ''
+ description = ''
Whether to enable certificate management with nix-darwin.
'';
};
@@ -33,7 +33,7 @@ in
type = types.listOf types.path;
default = [];
example = literalExpression "[ \"\${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt\" ]";
- description = lib.mdDoc ''
+ description = ''
A list of files containing trusted root certificates in PEM
format. These are concatenated to form
{file}`/etc/ssl/certs/ca-certificates.crt`, which is
@@ -57,7 +57,7 @@ in
'''
]
'';
- description = lib.mdDoc ''
+ description = ''
A list of trusted root certificates in PEM format.
'';
};
@@ -70,7 +70,7 @@ in
"CA WoSign ECC Root"
"Certification Authority of WoSign G2"
];
- description = lib.mdDoc ''
+ description = ''
A list of blacklisted CA certificate names that won't be imported from
the Mozilla Trust Store into
{file}`/etc/ssl/certs/ca-certificates.crt`. Use the
diff --git a/modules/security/sandbox/default.nix b/modules/security/sandbox/default.nix
index a80c9f6..d6987e6 100644
--- a/modules/security/sandbox/default.nix
+++ b/modules/security/sandbox/default.nix
@@ -27,37 +27,37 @@ let
type = types.listOf types.package;
default = [ ];
apply = paths: pkgs.closureInfo { rootPaths = paths; };
- description = lib.mdDoc "List of store paths to make accessible.";
+ description = "List of store paths to make accessible.";
};
readablePaths = mkOption {
type = types.listOf types.path;
default = [ ];
- description = lib.mdDoc "List of paths that should be read-only inside the sandbox.";
+ description = "List of paths that should be read-only inside the sandbox.";
};
writablePaths = mkOption {
type = types.listOf types.path;
default = [ ];
- description = lib.mdDoc "List of paths that should be read/write inside the sandbox.";
+ description = "List of paths that should be read/write inside the sandbox.";
};
allowSystemPaths = mkOption {
type = types.bool;
default = false;
- description = lib.mdDoc "Whether to allow read access to FHS paths like /etc and /var.";
+ description = "Whether to allow read access to FHS paths like /etc and /var.";
};
allowLocalNetworking = mkOption {
type = types.bool;
default = false;
- description = lib.mdDoc "Whether to allow localhost network access inside the sandbox.";
+ description = "Whether to allow localhost network access inside the sandbox.";
};
allowNetworking = mkOption {
type = types.bool;
default = false;
- description = lib.mdDoc "Whether to allow network access inside the sandbox.";
+ description = "Whether to allow network access inside the sandbox.";
};
};
@@ -133,7 +133,7 @@ in
security.sandbox.profiles = mkOption {
type = types.attrsOf (types.submodule profile);
default = { };
- description = lib.mdDoc "Definition of sandbox profiles.";
+ description = "Definition of sandbox profiles.";
};
};
diff --git a/modules/security/sudo.nix b/modules/security/sudo.nix
index c0d9597..5ceaea9 100644
--- a/modules/security/sudo.nix
+++ b/modules/security/sudo.nix
@@ -14,7 +14,7 @@ in
security.sudo.extraConfig = mkOption {
type = types.nullOr types.lines;
default = null;
- description = mdDoc ''
+ description = ''
Extra configuration text appended to {file}`sudoers`.
'';
};