nixpkgs/nixos/modules/security
2025-07-30 19:39:09 +02:00
..
acme treewide: run nixfmt 1.0.0 2025-07-24 13:55:40 +02:00
apparmor treewide: run nixfmt 1.0.0 2025-07-24 13:55:40 +02:00
krb5 treewide: run nixfmt 1.0.0 2025-07-24 13:55:40 +02:00
wrappers nixos/{tmpfiles, wrappers}: explicitly set RestrictSUIDSGID false (#426882) 2025-07-30 04:31:21 -04:00
agnos.nix nixos/agnos: init 2025-04-06 19:53:26 +03:00
apparmor.nix treewide: run nixfmt 1.0.0 2025-07-24 13:55:40 +02:00
audit.nix nixos/audit: add proper enable flag 2025-07-30 17:26:09 +02:00
auditd.nix nixos/auditd: align with upstream 2025-07-30 17:26:09 +02:00
ca.nix
chromium-suid-sandbox.nix
default.nix nixos/security: add landlock, yama, and bpf defaults 2025-05-16 20:56:19 -07:00
dhparams.nix treewide: run nixfmt 1.0.0 2025-07-24 13:55:40 +02:00
doas.nix
duosec.nix treewide: run nixfmt 1.0.0 2025-07-24 13:55:40 +02:00
google_oslogin.nix
ipa.nix
isolate.nix chore: move meta option to top level in many modules 2025-04-19 18:27:48 +02:00
lock-kernel-modules.nix
misc.nix
oath.nix
pam.nix nixos/pam: point to systemd.settings.Manager 2025-07-28 11:24:16 +02:00
pam_mount.nix treewide: run nixfmt 1.0.0 2025-07-24 13:55:40 +02:00
please.nix chore: move meta option to top level in many modules 2025-04-19 18:27:48 +02:00
polkit.nix
rngd.nix
rtkit.nix
soteria.nix
sudo-rs.nix sudo-rs: refactor module 2025-04-23 21:31:50 -03:00
sudo.nix sudo: 1.9.17p1 -> 1.9.17p2 2025-07-29 23:24:42 +02:00
systemd-confinement.nix
tpm2.nix nixos/tpm2: default pkcs#11 module based on abrmd config 2025-05-21 01:07:34 -07:00