Unverified Commit 53589667 authored by Izorkin's avatar Izorkin
Browse files

nixos/nginx: remove option enableSandbox

parent 940195c0
Loading
Loading
Loading
Loading
+2 −2
Original line number Diff line number Diff line
@@ -427,8 +427,8 @@ php.override {
   </listitem>
   <listitem>
     <para>
       Add option <literal>services.nginx.enableSandbox</literal> to starting Nginx web server with additional sandbox/hardening options.
       By default, write access to <literal>services.nginx.stateDir</literal> is allowed. To allow writing to other folders,
       Nginx web server now starting with additional sandbox/hardening options. By default, write access
       to <literal>services.nginx.stateDir</literal> is allowed. To allow writing to other folders,
       use <literal>systemd.services.nginx.serviceConfig.ReadWritePaths</literal>
       <programlisting>
systemd.services.nginx.serviceConfig.ReadWritePaths = [ "/var/www" ];
+0 −9
Original line number Diff line number Diff line
@@ -463,14 +463,6 @@ in
        '';
      };

      enableSandbox = mkOption {
        default = false;
        type = types.bool;
        description = ''
          Starting Nginx web server with additional sandbox/hardening options.
        '';
      };

      user = mkOption {
        type = types.str;
        default = "nginx";
@@ -728,7 +720,6 @@ in
        CapabilityBoundingSet = [ "CAP_NET_BIND_SERVICE" "CAP_SYS_RESOURCE" ];
        # Security
        NoNewPrivileges = true;
      } // optionalAttrs cfg.enableSandbox {
        # Sandboxing
        ProtectSystem = "strict";
        ProtectHome = mkDefault true;
+0 −1
Original line number Diff line number Diff line
@@ -18,7 +18,6 @@ import ./make-test-python.nix ({ pkgs, ... }: {
    ];
    services.nginx.enable = true;
    services.nginx.package = pkgs.nginx-lua;
    services.nginx.enableSandbox = true;
    services.nginx.virtualHosts.localhost = {
      extraConfig = ''
        location /test1-write {