diff --git a/nixos/modules/services/misc/taskserver/default.nix b/nixos/modules/services/misc/taskserver/default.nix
index c5c3600c1a61..4dc5027b4bda 100644
--- a/nixos/modules/services/misc/taskserver/default.nix
+++ b/nixos/modules/services/misc/taskserver/default.nix
@@ -44,7 +44,7 @@ let
${mkConfLine "server.crl" cfg.pki.crl}
# certificates
- ${mkConfLine "trust" cfg.pki.trust}
+ ${mkConfLine "trust" cfg.trust}
${if needToCreateCA then ''
ca.cert = ${cfg.dataDir}/keys/ca.cert
server.cert = ${cfg.dataDir}/keys/server.cert
@@ -261,6 +261,19 @@ in {
'';
};
+ trust = mkOption {
+ type = types.enum [ "allow all" "strict" ];
+ default = "strict";
+ description = ''
+ Determines how client certificates are validated.
+
+ The value allow all performs no client
+ certificate validation. This is not recommended. The value
+ strict causes the client certificate to be
+ validated against a CA.
+ '';
+ };
+
pki = {
cert = mkOption {
type = types.nullOr types.path;
@@ -292,19 +305,6 @@ in {
a configuration file reload before the next request is handled.
'';
};
-
- trust = mkOption {
- type = types.enum [ "allow all" "strict" ];
- default = "strict";
- description = ''
- Determines how client certificates are validated.
-
- The value allow all performs no client
- certificate validation. This is not recommended. The value
- strict causes the client certificate to be
- validated against a CA.
- '';
- };
};
};
};