mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-16 23:03:40 +01:00
Remove useless use of undocumented submodules.
This commit is contained in:
parent
013aedffea
commit
43e52ef001
1 changed files with 120 additions and 145 deletions
|
@ -456,156 +456,131 @@ in
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
ratelimit = mkOption {
|
ratelimit = {
|
||||||
type = types.submodule (
|
enable = mkOption {
|
||||||
{ options, ... }:
|
type = types.bool;
|
||||||
{ options = {
|
default = false;
|
||||||
|
description = ''
|
||||||
enable = mkOption {
|
Enable ratelimit capabilities.
|
||||||
type = types.bool;
|
'';
|
||||||
default = false;
|
};
|
||||||
description = ''
|
|
||||||
Enable ratelimit capabilities.
|
size = mkOption {
|
||||||
'';
|
type = types.int;
|
||||||
};
|
default = 1000000;
|
||||||
|
description = ''
|
||||||
size = mkOption {
|
Size of the hashtable. More buckets use more memory but lower
|
||||||
type = types.int;
|
the chance of hash hash collisions.
|
||||||
default = 1000000;
|
'';
|
||||||
description = ''
|
};
|
||||||
Size of the hashtable. More buckets use more memory but lower
|
|
||||||
the chance of hash hash collisions.
|
ratelimit = mkOption {
|
||||||
'';
|
type = types.int;
|
||||||
};
|
default = 200;
|
||||||
|
description = ''
|
||||||
ratelimit = mkOption {
|
Max qps allowed from any query source.
|
||||||
type = types.int;
|
0 means unlimited. With an verbosity of 2 blocked and
|
||||||
default = 200;
|
unblocked subnets will be logged.
|
||||||
description = ''
|
'';
|
||||||
Max qps allowed from any query source.
|
};
|
||||||
0 means unlimited. With an verbosity of 2 blocked and
|
|
||||||
unblocked subnets will be logged.
|
whitelistRatelimit = mkOption {
|
||||||
'';
|
type = types.int;
|
||||||
};
|
default = 2000;
|
||||||
|
description = ''
|
||||||
whitelistRatelimit = mkOption {
|
Max qps allowed from whitelisted sources.
|
||||||
type = types.int;
|
0 means unlimited. Set the rrl-whitelist option for specific
|
||||||
default = 2000;
|
queries to apply this limit instead of the default to them.
|
||||||
description = ''
|
'';
|
||||||
Max qps allowed from whitelisted sources.
|
};
|
||||||
0 means unlimited. Set the rrl-whitelist option for specific
|
|
||||||
queries to apply this limit instead of the default to them.
|
slip = mkOption {
|
||||||
'';
|
type = types.nullOr types.int;
|
||||||
};
|
default = null;
|
||||||
|
description = ''
|
||||||
slip = mkOption {
|
Number of packets that get discarded before replying a SLIP response.
|
||||||
type = types.nullOr types.int;
|
0 disables SLIP responses. 1 will make every response a SLIP response.
|
||||||
default = null;
|
'';
|
||||||
description = ''
|
};
|
||||||
Number of packets that get discarded before replying a SLIP response.
|
|
||||||
0 disables SLIP responses. 1 will make every response a SLIP response.
|
ipv4PrefixLength = mkOption {
|
||||||
'';
|
type = types.nullOr types.int;
|
||||||
};
|
default = null;
|
||||||
|
description = ''
|
||||||
ipv4PrefixLength = mkOption {
|
IPv4 prefix length. Addresses are grouped by netblock.
|
||||||
type = types.nullOr types.int;
|
'';
|
||||||
default = null;
|
};
|
||||||
description = ''
|
|
||||||
IPv4 prefix length. Addresses are grouped by netblock.
|
ipv6PrefixLength = mkOption {
|
||||||
'';
|
type = types.nullOr types.int;
|
||||||
};
|
default = null;
|
||||||
|
description = ''
|
||||||
ipv6PrefixLength = mkOption {
|
IPv6 prefix length. Addresses are grouped by netblock.
|
||||||
type = types.nullOr types.int;
|
'';
|
||||||
default = null;
|
|
||||||
description = ''
|
|
||||||
IPv6 prefix length. Addresses are grouped by netblock.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
};
|
|
||||||
});
|
|
||||||
default = {
|
|
||||||
};
|
};
|
||||||
example = {};
|
|
||||||
description = ''
|
|
||||||
'';
|
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
remoteControl = mkOption {
|
remoteControl = {
|
||||||
type = types.submodule (
|
enable = mkOption {
|
||||||
{ config, options, ... }:
|
type = types.bool;
|
||||||
{ options = {
|
default = false;
|
||||||
|
description = ''
|
||||||
enable = mkOption {
|
Wheter to enable remote control via nsd-control(8).
|
||||||
type = types.bool;
|
'';
|
||||||
default = false;
|
};
|
||||||
description = ''
|
|
||||||
Wheter to enable remote control via nsd-control(8).
|
interfaces = mkOption {
|
||||||
'';
|
type = types.listOf types.str;
|
||||||
};
|
default = [ "127.0.0.1" "::1" ];
|
||||||
|
description = ''
|
||||||
interfaces = mkOption {
|
Which interfaces NSD should bind to for remote control.
|
||||||
type = types.listOf types.str;
|
'';
|
||||||
default = [ "127.0.0.1" "::1" ];
|
};
|
||||||
description = ''
|
|
||||||
Which interfaces NSD should bind to for remote control.
|
port = mkOption {
|
||||||
'';
|
type = types.int;
|
||||||
};
|
default = 8952;
|
||||||
|
description = ''
|
||||||
port = mkOption {
|
Port number for remote control operations (uses TLS over TCP).
|
||||||
type = types.int;
|
'';
|
||||||
default = 8952;
|
};
|
||||||
description = ''
|
|
||||||
Port number for remote control operations (uses TLS over TCP).
|
serverKeyFile = mkOption {
|
||||||
'';
|
type = types.path;
|
||||||
};
|
default = "/etc/nsd/nsd_server.key";
|
||||||
|
description = ''
|
||||||
serverKeyFile = mkOption {
|
Path to the server private key, which is used by the server
|
||||||
type = types.path;
|
but not by nsd-control. This file is generated by nsd-control-setup.
|
||||||
default = "/etc/nsd/nsd_server.key";
|
'';
|
||||||
description = ''
|
};
|
||||||
Path to the server private key, which is used by the server
|
|
||||||
but not by nsd-control. This file is generated by nsd-control-setup.
|
serverCertFile = mkOption {
|
||||||
'';
|
type = types.path;
|
||||||
};
|
default = "/etc/nsd/nsd_server.pem";
|
||||||
|
description = ''
|
||||||
serverCertFile = mkOption {
|
Path to the server self signed certificate, which is used by the server
|
||||||
type = types.path;
|
but and by nsd-control. This file is generated by nsd-control-setup.
|
||||||
default = "/etc/nsd/nsd_server.pem";
|
'';
|
||||||
description = ''
|
};
|
||||||
Path to the server self signed certificate, which is used by the server
|
|
||||||
but and by nsd-control. This file is generated by nsd-control-setup.
|
controlKeyFile = mkOption {
|
||||||
'';
|
type = types.path;
|
||||||
};
|
default = "/etc/nsd/nsd_control.key";
|
||||||
|
description = ''
|
||||||
controlKeyFile = mkOption {
|
Path to the client private key, which is used by nsd-control
|
||||||
type = types.path;
|
but not by the server. This file is generated by nsd-control-setup.
|
||||||
default = "/etc/nsd/nsd_control.key";
|
'';
|
||||||
description = ''
|
};
|
||||||
Path to the client private key, which is used by nsd-control
|
|
||||||
but not by the server. This file is generated by nsd-control-setup.
|
controlCertFile = mkOption {
|
||||||
'';
|
type = types.path;
|
||||||
};
|
default = "/etc/nsd/nsd_control.pem";
|
||||||
|
description = ''
|
||||||
controlCertFile = mkOption {
|
Path to the client certificate signed with the server certificate.
|
||||||
type = types.path;
|
This file is used by nsd-control and generated by nsd-control-setup.
|
||||||
default = "/etc/nsd/nsd_control.pem";
|
'';
|
||||||
description = ''
|
|
||||||
Path to the client certificate signed with the server certificate.
|
|
||||||
This file is used by nsd-control and generated by nsd-control-setup.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
};
|
|
||||||
|
|
||||||
});
|
|
||||||
default = {
|
|
||||||
};
|
};
|
||||||
example = {};
|
|
||||||
description = ''
|
|
||||||
'';
|
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue