Make config.machine.firewall an alias of networking.firewall.
This commit is contained in:
parent
5d017ce18f
commit
be5ef36567
6 changed files with 6 additions and 50 deletions
|
@ -59,38 +59,6 @@ with lib;
|
|||
Domain - Service mappings for nginx vHost config.
|
||||
'';
|
||||
};
|
||||
firewall = {
|
||||
allowPing = mkOption {
|
||||
type = types.bool;
|
||||
description = ''
|
||||
See networking.firewall.allowPing.
|
||||
'';
|
||||
};
|
||||
allowedUDPPorts = mkOption {
|
||||
type = types.listOf types.int;
|
||||
description = ''
|
||||
See networking.firewall.allowerdUDPPorts.
|
||||
'';
|
||||
};
|
||||
allowedTCPPorts = mkOption {
|
||||
type = types.listOf types.int;
|
||||
description = ''
|
||||
See networking.firewall.allowedTCPPorts.
|
||||
'';
|
||||
};
|
||||
allowedUDPPortRanges = mkOption {
|
||||
type = types.listOf (types.attrsOf types.int);
|
||||
description = ''
|
||||
See networking.firewall.allowerdUDPPortRanges.
|
||||
'';
|
||||
};
|
||||
allowedTCPPortRanges = mkOption {
|
||||
type = types.listOf (types.attrsOf types.int);
|
||||
description = ''
|
||||
See networking.firewall.allowedTCPPortRanges.
|
||||
'';
|
||||
};
|
||||
};
|
||||
desktop.wms = mkOption {
|
||||
type = types.listOf types.string;
|
||||
default = [];
|
||||
|
@ -99,4 +67,5 @@ with lib;
|
|||
'';
|
||||
};
|
||||
};
|
||||
imports = [(mkAliasOptionModule [ "machine" "firewall" ] [ "networking" "firewall" ])];
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue