···385385386386- Lisp gained a [manual section](https://nixos.org/manual/nixpkgs/stable/#lisp), documenting a new and backwards incompatible interface. The previous interface will be removed in a future release.
387387388388+- The `bind` module now allows the per-zone `allow-query` setting to be configured (previously it was hard-coded to `any`; it still defaults to `any` to retain compatibility).
389389+388390## Detailed migration information {#sec-release-23.05-migration}
389391390392### Pipewire configuration overrides {#sec-release-23.05-migration-pipewire}
+16-3
nixos/modules/services/networking/bind.nix
···3636 description = lib.mdDoc "Addresses who may request zone transfers.";
3737 default = [ ];
3838 };
3939+ allowQuery = mkOption {
4040+ type = types.listOf types.str;
4141+ description = lib.mdDoc ''
4242+ List of address ranges allowed to query this zone. Instead of the address(es), this may instead
4343+ contain the single string "any".
4444+4545+ NOTE: This overrides the global-level `allow-query` setting, which is set to the contents
4646+ of `cachenetworks`.
4747+ '';
4848+ default = [ "any" ];
4949+ };
3950 extraConfig = mkOption {
4051 type = types.str;
4152 description = lib.mdDoc "Extra zone config to be appended at the end of the zone section.";
···6980 ${cfg.extraConfig}
70817182 ${ concatMapStrings
7272- ({ name, file, master ? true, slaves ? [], masters ? [], extraConfig ? "" }:
8383+ ({ name, file, master ? true, slaves ? [], masters ? [], allowQuery ? [], extraConfig ? "" }:
7384 ''
7485 zone "${name}" {
7586 type ${if master then "master" else "slave"};
···8798 };
8899 ''
89100 }
9090- allow-query { any; };
101101+ allow-query { ${concatMapStrings (ip: "${ip}; ") allowQuery}};
91102 ${extraConfig}
92103 };
93104 '')
···120131 description = lib.mdDoc ''
121132 What networks are allowed to use us as a resolver. Note
122133 that this is for recursive queries -- all networks are
123123- allowed to query zones configured with the `zones` option.
134134+ allowed to query zones configured with the `zones` option
135135+ by default (although this may be overridden within each
136136+ zone's configuration, via the `allowQuery` option).
124137 It is recommended that you limit cacheNetworks to avoid your
125138 server being used for DNS amplification attacks.
126139 '';