Commit graph

3995 commits

Author SHA1 Message Date
Aaron Andersen 768f41fcf0
Revert "nixos/openvpn: add extraArgs option" (#341223) 2024-09-12 06:34:16 -04:00
Michele Guerini Rocco b94f259714
nixos/wireless: reimplement secrets using ext_password_backend (#180872) 2024-09-11 19:58:36 +02:00
Aaron Andersen 45dd09667f
Revert "nixos/openvpn: add extraArgs option" 2024-09-11 12:59:03 -04:00
Aaron Andersen 7398438255
nixos/openvpn: add extraArgs option (#339016) 2024-09-10 19:36:32 -04:00
h7x4 c2090cb303
wstunnel: the ping frequency can now also be configured for the server (#339232) 2024-09-10 10:27:42 +02:00
Gabriel Fontes 13f6e6da35
nixos/matterbridge: add services.matterbridge.package option 2024-09-06 17:07:41 -03:00
Sachi King 361fde84f9 Revert "nixos/firewall: fix reverse path check failures with IPsec"
The inclusion of the "meta ipsec" rule in the default reverse path
filtering breaks systems not built with specific XFRM kernel config
options.  Specifically CONFIG_XFRM must be set, which gets selected
by CONFIG_NFT_XFRM, which is hidden behind CONFIG_XFRM_USER.

These options are not selected by default in most defconfig's provided
by the kernel with the exception of some device-specific defconfigs.

These options are not set by the nix kernel common_config, and I would
argue that IPSec support does not belong in a minimal kernel as that
elevates its support status above other in-kernel VPN interfaces.

The contributor of this feature does not seem interested in working
towards a solution that does not break systems running kernels built
with "autoModules = false" while supporting this feature, and as this
silently breaks firewalls into an insecure state and poses an immediate
security issue I propose this be reverted until a solution that does not
break such systems is proposed.
https://github.com/NixOS/nixpkgs/pull/310857#discussion_r1742834970

Devices used as firewalls, if they do not have the required kernel
config, will fail to load the new firewall rules and will upon boot pass
traffic without any filtering into the internal network.

Devices exposed directly to the internet, after reboot, will boot
without filtering potentially exposing services not intended to be
exposed to the internet, such as databases.

The following platforms in nixpkgs appear to be impacted:
 - pc_simplekernel
 - pogoplug4
 - sheevaplug
 - zero-gravitas
 - zero-sugar
 - utilite
 - guruplug
 - beaglebone
 - fuloong2f_n32

References to hardware without autoModules can be found in
nixos-hardware, as well as in active third-party repos on github.

I suspect there are other users impacted that do not have their configurations
public, as autoModules = true leads to long compile times when targeting
kernels to less standard hardware or hardware with quirks that require
patches that cannot be upstreamed.

This reverts commit 3c12ef3f21.
2024-09-04 11:51:15 +10:00
r-vdp 20291241fd
wstunnel: the ping frequency can now also be configured for the server
See: https://github.com/erebe/wstunnel/pull/338
2024-09-03 10:38:43 +02:00
Pol Dellaiera 930e12b9e8
nixos/services.openssh: remove with lib; (#339092) 2024-09-03 10:18:32 +02:00
Assistant 8119ec6478 nixos/syncplay: add missing options
Exposes all currently available command-line arguments that were
missing, including some that were impossible to use with the catch-all
option `extraArgs` alone, requiring changes to other parts of the
system.
Those are now all self-contained in the module.
The service now uses systemd's `DynamicUsers`.
2024-09-02 22:26:11 -04:00
Felix Buehler 5f8696e39c nixos/services.openssh: remove with lib; 2024-09-02 22:31:36 +02:00
Aaron Andersen 5e8cc27962 nixos/openvpn: add extraArgs option 2024-09-02 09:49:02 -04:00
Felix Buehler 97070a2ea6 nixos/services.libreswan: remove with lib; 2024-08-30 23:01:18 +02:00
Felix Buehler 92f17f012d nixos/services.kresd: remove with lib; 2024-08-30 23:01:16 +02:00
Felix Buehler 5960372742 nixos/services.kea: remove with lib; 2024-08-30 23:00:56 +02:00
Felix Buehler 717fa0dea5 nixos/services.dnscrypt-wrapper: remove with lib; 2024-08-30 23:00:56 +02:00
Philip Taron f26f92db9a
nixos/services.mosquitto: remove with lib; (#338022) 2024-08-28 15:05:19 -07:00
Felix Buehler 481df957a6 nixos/services.mosquitto: remove with lib; 2024-08-28 22:53:06 +02:00
Florian Klink c8912137a3
wstunnel: 9.7.4 -> 10.0.1 (#335185) 2024-08-28 10:56:59 +02:00
Herwig Hochleitner 98ce61be57
nixos/smokeping: do homedir management with systemd.tmpfiles (#332050)
- ensures that everything in /var/lib/smokeping belongs to the service
- add nginx user to smokeping group, instead of allowing world to cd
  into somkeping homedir
2024-08-27 14:37:34 +02:00
Emily 1162c1ed62
{tvheadend,antennas}: drop (#336395) 2024-08-27 02:47:56 +01:00
Maciej Krüger 00f536f650
Merge pull request #310857 from rnhmjoj/pr-firewall
nixos/firewall: fix reverse path check failures with IPsec
2024-08-25 15:06:49 +02:00
rnhmjoj 89eb93dc3f
nixos/wireless: link config to /etc by default
This links the generated configuration to /etc/wpa_supplicant.conf
unless `allowAuxiliaryImperativeNetworks`. In the latter case the
file in /etc should be writable and the generated one remains only
in the Nix store.
2024-08-22 21:46:05 +02:00
Emily a565cfeac3 antennas: drop 2024-08-22 15:51:27 +01:00
Emily 6fa5767e07 tvheadend: drop
Closes: #332259
2024-08-22 15:51:27 +01:00
r-vdp 6cac9e409c
wstunnel: reformat with nixfmt 2024-08-21 10:46:04 +02:00
Jörg Thalheim c43e67f69b
Merge pull request #335344 from Mic92/harmonia
nixos/harmonia: switch to non-deprecated SIGN_KEY_PATHS
2024-08-21 07:01:22 +02:00
Emily 25bdc22ac8
Merge pull request #334495 from Sigmanificient/liboop
{liboop,lsh}: drop
2024-08-20 19:02:29 +01:00
Sigmanificient e959525e15 lsh: drop 2024-08-20 12:02:12 +02:00
euxane 1768115589 nixos/cgit: handle list setting type
The cgitrc file allows list of values to be set for some keys as
multiple definition lines.

This allows setting multiple "css" files to include or multiple
"readme" branch and file lookup paths to be set.
2024-08-19 08:13:49 +02:00
rnhmjoj f235dda87f
nixos/wireless: reimplement secrets using ext_password_backend
This replaces the current implementation (splicing the secrets into the
configuration file using environment variables) with the new built-in
mechanism ext_password_backend.

With some minor syntax changes, it works exactly as before, except the
heavy lifting is done by wpa_supplicant and probably less error-prone.
2024-08-18 08:46:00 +02:00
Jörg Thalheim aa994dd296 harmonia: switch to non-deprecated SIGN_KEY_PATHS 2024-08-17 13:11:06 +02:00
Morgan Jones 99714ac2fc
nixos/nebula: add missing with maintainers 2024-08-16 12:13:40 -07:00
Franz Pletz 4bd91be1ad
Merge pull request #333462 from Luflosi/nixos-iperf3-package-option 2024-08-16 14:46:53 +02:00
Jörg Thalheim d9e8fc4b72
Merge pull request #323785 from Mic92/zerotier
nixos/zerotierone: clean up local.conf symlinks unconditionally
2024-08-16 09:35:35 +02:00
a-kenji 0f13d8a4ba nixos/unbound: fix typos in description and comment 2024-08-14 23:53:58 +02:00
Adam C. Stephens 0536436018
Merge pull request #316466 from uninsane/rebrand-trust-dns
hickory-dns: rename from trust-dns
2024-08-11 07:35:03 -04:00
Colin f9df9508f4 hickory-dns: rename from trust-dns 2024-08-11 07:59:32 +00:00
Rob Sears bdcd19eff5
package reference was removed in 03d57d7 (#333504) 2024-08-09 21:42:42 +02:00
Sandro 03d57d7420
Merge pull request #332806 from isabelroses/fix/wpa_supplicant 2024-08-09 18:19:56 +02:00
Luflosi d80d811a6f
nixos/iperf3: add package option 2024-08-09 16:01:01 +02:00
Bjørn Forsman 4265f4354c nixos/mosquitto: fix "listeners" option default
The option type is listOf, so the default should be an empty list, not
empty attrset.
2024-08-08 23:59:36 +02:00
isabel 78a5508605
nixos/wpa_supplicant: don't use removed wpa_supplicant_ro_ssids 2024-08-06 20:33:23 +01:00
Sandro 8b43ee5545
Merge pull request #330522 from xokdvium/dev/init-rathole
nixos/rathole: init module
2024-08-05 18:07:25 +02:00
Lin Jian 48966eacad
Merge pull request #328365 from Guanran928/cloudflare-dyndns
nixos/cloudflare-dyndns: introduce package option
2024-08-03 15:10:25 +08:00
Lin Jian 7b9ef31afd
Merge pull request #331800 from Guanran928/treewide/remove-periods-from-lib-mkenableoption
treewide: remove periods from lib.mkEnableOption
2024-08-03 12:53:41 +08:00
Felix Uhl 57d30c7a61
nixos/wg-quick: add generatePrivateKeyFile option (#331253)
This option is already present in the wireguard module, but missing from
the wg-quick module. This is very annoying, because it means you can't
easily get a safe and valid configuration on first boot when using
wg-quick.

This change adds the same option with the same description text and the
same script, but instead of generating an entire systemd unit dedicated
to creating the key file, it adds the script as a PreUp script, which
is a much simpler solution.

I've tested this in my own configuration, and it does indeed work.
wg-quick allows multiple PreUp scripts, which are run in order, and
all PreUp scripts are run before the private key is read from disk,
see `man wg-quick`.
2024-08-03 00:07:27 +04:00
Guanran Wang ea6f4d5e86
treewide: remove periods from lib.mkEnableOption
Co-authored-by: éclairevoyant <848000+eclairevoyant@users.noreply.github.com>
2024-08-02 23:55:32 +08:00
tomberek 3758fa1f50
Merge pull request #299339 from teto/teto/wireguard-compact-unit
networking.wireguard: generate leaner units
2024-08-02 03:18:16 -04:00
tomberek 7d29722746
Merge pull request #322035 from jpds/nixos-nats-validate-config
nixos/nats: Implemented configuration verification
2024-08-02 02:37:48 -04:00