| .. |
|
acme
|
treewide: run nixfmt 1.0.0
|
2025-07-24 13:55:40 +02:00 |
|
apparmor
|
treewide: run nixfmt 1.0.0
|
2025-07-24 13:55:40 +02:00 |
|
krb5
|
treewide: run nixfmt 1.0.0
|
2025-07-24 13:55:40 +02:00 |
|
wrappers
|
nixos/{tmpfiles, wrappers}: explicitly set RestrictSUIDSGID false (#426882)
|
2025-07-30 04:31:21 -04:00 |
|
agnos.nix
|
nixos/agnos: init
|
2025-04-06 19:53:26 +03:00 |
|
apparmor.nix
|
treewide: run nixfmt 1.0.0
|
2025-07-24 13:55:40 +02:00 |
|
audit.nix
|
nixos/audit: add proper enable flag
|
2025-07-30 17:26:09 +02:00 |
|
auditd.nix
|
nixos/auditd: align with upstream
|
2025-07-30 17:26:09 +02:00 |
|
ca.nix
|
|
|
|
chromium-suid-sandbox.nix
|
|
|
|
default.nix
|
nixos/security: add landlock, yama, and bpf defaults
|
2025-05-16 20:56:19 -07:00 |
|
dhparams.nix
|
treewide: run nixfmt 1.0.0
|
2025-07-24 13:55:40 +02:00 |
|
doas.nix
|
|
|
|
duosec.nix
|
treewide: run nixfmt 1.0.0
|
2025-07-24 13:55:40 +02:00 |
|
google_oslogin.nix
|
|
|
|
ipa.nix
|
|
|
|
isolate.nix
|
chore: move meta option to top level in many modules
|
2025-04-19 18:27:48 +02:00 |
|
lock-kernel-modules.nix
|
|
|
|
misc.nix
|
|
|
|
oath.nix
|
|
|
|
pam.nix
|
nixos/pam: point to systemd.settings.Manager
|
2025-07-28 11:24:16 +02:00 |
|
pam_mount.nix
|
treewide: run nixfmt 1.0.0
|
2025-07-24 13:55:40 +02:00 |
|
please.nix
|
chore: move meta option to top level in many modules
|
2025-04-19 18:27:48 +02:00 |
|
polkit.nix
|
|
|
|
rngd.nix
|
|
|
|
rtkit.nix
|
|
|
|
soteria.nix
|
|
|
|
sudo-rs.nix
|
sudo-rs: refactor module
|
2025-04-23 21:31:50 -03:00 |
|
sudo.nix
|
sudo: 1.9.17p1 -> 1.9.17p2
|
2025-07-29 23:24:42 +02:00 |
|
systemd-confinement.nix
|
|
|
|
tpm2.nix
|
nixos/tpm2: default pkcs#11 module based on abrmd config
|
2025-05-21 01:07:34 -07:00 |