Commit graph

5038 commits

Author SHA1 Message Date
Jade Lovelace 602cc45c09 nixos/gateone: remove
The package is literally gone, this could never work.
2025-08-21 21:39:45 -07:00
averyv 9b2783fae9
pihole-ftl: Fix log deleter service creating an empty database
If it runs before the main service itself, the sqlite command may create an
empty database, causing the main service to not run the initial database setup.
2025-08-21 23:35:51 +01:00
Nick Cao 09950e401c
sing-box: 1.11.15 -> 1.12.3, nixos/sing-box: add user and group, nixosTests.sing-box: migrate config (#430835) 2025-08-21 16:49:42 -04:00
Dmitriy Kholkin a511e49d42
nixos/ivpn: remove ataraxiasjel as maintainer 2025-08-21 19:48:54 +03:00
Marcel 8d8c9633bf
nixos/ifstate: init 2025-08-21 17:44:54 +02:00
Sandro 338cbf9e54
nixos/prosody: substitute environment variables to allow securely loa… (#431286) 2025-08-21 15:02:56 +02:00
Sizhe Zhao b69da1bd4f
nixos/sing-box: add user and group 2025-08-21 13:30:56 +08:00
Sizhe Zhao 40ba3d54dd
nixos/sing-box: add prince213 to maintainers 2025-08-21 13:30:56 +08:00
Sandro b1516743c7
nixos/prosody: add muc_moderation (#431289) 2025-08-20 16:00:44 +02:00
Sandro Jäckel cea3dfac9e
nixos/prosody: add muc_moderation 2025-08-20 15:55:15 +02:00
Aaron VerDow a4177afa8d nixos/x2goserver: add package option 2025-08-19 07:52:42 -05:00
Lan Tian 6ee67461ae
nixos/asterisk: fix reloading command 2025-08-17 11:18:16 -07:00
Leona Maroni 9b8ea589ea
nixos/acme: improve scalability - reduce superfluous unit activations (#422076) 2025-08-14 16:06:06 +02:00
Sandro a9b58022f0
nixos/xl2tpd: deprecate phases (#433195) 2025-08-14 14:02:10 +02:00
Sandro e00d0068d5
nixos/pptpd: deprecate phases (#433194) 2025-08-14 14:01:51 +02:00
Sandro 4ff3ec314a
nixos/netbird: deprecate phases (#433198) 2025-08-13 15:42:11 +02:00
Felix Buehler 864a873db9 nixos/netbird: deprecate phases 2025-08-12 22:40:22 +02:00
Felix Buehler 7b39ce457f nixos/pptpd: deprecate phases 2025-08-12 22:39:09 +02:00
Felix Buehler 08cdd881e8 nixos/xl2tpd: deprecate phases 2025-08-12 22:38:50 +02:00
misuzu 9b6b7bf551
nixos/wireguard-networkd: fix 'cannot find device' error (#430762) 2025-08-12 19:00:25 +03:00
Paul Haerle 086d855355
netbird: 0.49.0 -> 0.54.0 + split up + relicense (#431976) 2025-08-11 22:10:25 +02:00
Krzysztof Nazarewski f1277e5434
netbird: 0.49.0 -> 0.54.0 + split up + relicense
- 0.53.0+ relicensed the server components
  - as a result split into per-component packages
- adds missing 2 upload & relay components
- the tested behavior has changed
2025-08-11 20:46:42 +02:00
Robert James Hernandez 249a3dcd5e nixos/ax25/axports: ax25 kernel module check 2025-08-10 18:11:55 +00:00
Luke Granger-Brown 7f552ff771
tayga: 0.9.2 -> 0.9.5 (#432528) 2025-08-10 17:50:45 +02:00
Pol Dellaiera 4594192170
nixos/netbird: fix desktop file name pattern (#432535) 2025-08-10 17:18:12 +02:00
lassulus 5316ba88a5 nixos/prosody: remove erronous spaces in module names 2025-08-10 17:09:16 +02:00
Luke Granger-Brown 4548324aae nixos/tayga: add option to allow toggling WKPF strict compliance
The RFC requires that we don't allow access to non-global v4 addresses
using the well-known 64:ff9b:: prefix, but there are some deployments
where it's convenient to permit this.

To make this work in tests, disable wkpf-strictness via the config
option introduced in bc18503e2ff1ee48ac472a67ba982dae76a5c2d3.

Tayga added 100.64.0.0 to the set of WKPF in
4dff17ef61821f5bc1996ce687a3dc317fd4fa50.
2025-08-10 17:00:13 +02:00
Luke Granger-Brown b45ba94a0e nixos/tayga: add log option
This allows configuring logging in tayga, and enables it for the NixOS
test.
2025-08-10 16:37:42 +02:00
Florian Klink 73582e4158 nixos/tayga: fix config reload
Use a trampoline at /etc/tayga.conf for the config, so reload actually
picks up a changed config file.
2025-08-10 16:30:52 +02:00
Rohan Verma 4c2b315075 nixos/netbird: fix desktop file name pattern
The desktop file substitution was looking for 'Name=NetBird' but the
actual desktop file contains 'Name=Netbird' (with lowercase 'b').

Fixes #432454
2025-08-10 19:49:14 +05:30
lassulus cb771a25a1
jitsi-meet: fix infinite recursion with prosody package (#432371) 2025-08-10 09:34:49 +02:00
Dionysis Grigoropoulos 0bb6676d74
nixos/tailscale: Add option to disable upstream debug logging
Tailscale by default sends logs upstream to a centralized logging
service. We can disable this by adding an env var
https://tailscale.com/kb/1011/log-mesh-traffic?tab=linux#opting-out-of-client-logging
2025-08-10 05:19:04 +03:00
lassulus 804919a7f4 nixos/prosody: fix serialization error if httpFileShare is null 2025-08-10 01:03:49 +02:00
Christian Theune 2d0a489125 nixos/acme: improve scalability - reduce superfluous unit activations
The previous setup caused all renewal units to be triggered upon
ever so slight changes in config. In larger setups (100+ certificates)
adding a new certificate caused high system load and/or large memory
consumption issues. The memory issues are already a alleviated with
the locking mechanism. However, this then causes long delays upwards
of multiple minutes depending on individual runs and also caused
superfluous activations.

In this change we streamline the overall setup of units:

1. The unit that other services can depend upon is 'acme-{cert}.service'.
We call this the 'base unit'. As this one as `RemainAfterExit` set
the `acme-finished-{cert}` targets are not required any longer.

2. We now always generate initial self-signed certificates to simplify
the dependency structure. This deprecates the `preliminarySelfsigned`
option.

3. The `acme-order-renew-{cert}` service gets activated after the base
unit and services using certificates have started and performs all acme
interactions. When it finishes others services (like web servers) will
be notified through the `reloadServices` option or they can use
`wantedBy` and `after` dependencies if they implement their own reload
units.

The renewal timer also triggers this unit.

4. The timer unit is explicitly blocked from being started by s-t-c.

5. Permission management has been cleaned up a bit: there was an
   inconsistency between having the .lego files set to 600 vs 640
   on the exposed side. This is unified to 640 now.

6. Exempt the account target from being restarted by s-t-c. This will
   happen automatically if something relevant to the account changes.
2025-08-08 16:28:42 +02:00
Krzysztof Nazarewski (kdn) c55a801cfe
nixos/netbird: clarify routing features & brand adjustments 2025-08-08 11:13:41 +02:00
Pol Dellaiera 7587a3c7a1
nixos/netbird: add useRoutingFeatures option (#431681) 2025-08-08 10:21:45 +02:00
Sandro e25c3a4a45
nixos/tailscale-derper: drop unused keepalive_timeout, bump proxy_rea… (#430791) in 2025-08-07 17:21:26 +02:00
Sandro d00a33c9df
nixos/dnsmasq: make dnsmasq --test actually test the config file (#426004) 2025-08-07 15:08:19 +02:00
Pol Dellaiera 8b5c57b674 nixos/netbird: add useRoutingFeatures option
Similar to what the NixOS Tailscale service has.
Hope this will help a bunch of users struggling to make the "exit node" feature working.
2025-08-07 10:10:53 +02:00
liberodark a9cd681b8d nixos/ntpd-rs: hardening 2025-08-07 11:36:09 +05:30
Doron Behar cddd032189
nixos/i2pd: add ntcp2 options for ssu2 (#428035) 2025-08-06 09:22:26 +03:00
Sandro Jäckel 68bcdbfc9e
nixos/prosody: substitute environment variables to allow securely loading secrets 2025-08-06 00:49:58 +02:00
Sandro Jäckel b5475346e2
nixos/tailscale-derper: drop unused keepalive_timeout, bump proxy_read_timeout to an hour
Otherwise derper reconnects every 60s which still works good enough but
spams the logs with lots of noise and it probably improves stability, too.
2025-08-04 20:03:15 +02:00
Sandro Jäckel e42cceb90c
nixos/prosody: fix message reactions and moderation in muc's
It took us over 3 hours to figure this out, I want to cry :,(
2025-08-04 00:58:50 +02:00
Sandro Jäckel dfa4ce2923
nixos/prosody: add support for httpFileShare.http_host 2025-08-04 00:58:49 +02:00
Majiir Paktu e338c7b8dc nixos/wireguard-networkd: fix 'cannot find device' error
In some situations, the dynamic refresh can fail to bring up the
wireguard interface. If that happens, all subsequent refresh attempts
will fail because the 'ip link delete' command fails with "Cannot find
device". If this happens, we now proceed with the networkctl reload
anyway.
2025-08-03 17:10:05 -04:00
Sandro Jäckel 76224149c1
nixos/prosody: fix certs directory missing error
Prosody starts without it but not lay false leads for others to debug.
2025-08-03 21:35:33 +02:00
Sandro Jäckel a302465e0e
nixos/prosody: wire up modules.mam option 2025-08-03 21:35:33 +02:00
Sandro Jäckel 445cd5701d
nixos/prosody: enable admin_shell to fix tests 2025-08-03 21:35:32 +02:00
Sandro Jäckel 3ea8513fb5
nixos/prosody: disable http_files per default as it requires configuration to not break http_file_share 2025-08-03 21:35:32 +02:00
Sandro Jäckel c8094c2f03
nixos/prosody: fix logged error that /etc/mime.types cannot be found 2025-08-03 21:35:30 +02:00
Sandro Jäckel d323803eee
nixos/prosody: minor formatting cleanup 2025-08-03 21:35:30 +02:00
Sandro Jäckel 4e12c9b92e
nixos/prosody: remove obsoloted http_upload and replace it with http_file_share 2025-08-03 21:35:30 +02:00
Sandro Jäckel c26ed9f391
nixos/prosody: remove vcard_muc as it has been obsoloted
Sadly I did not find a way to use lib.mkRemovedOptionModule for this
option that did not break eval. :(
2025-08-03 21:35:29 +02:00
Sandro Jäckel 246e3fbf0f
nixos/prosody: allow listening on port 80
Co-authored-by: mirror230469 <215964377+mirror230469@users.noreply.github.com>
2025-08-03 21:35:28 +02:00
Sandro Jäckel e46dcd7074
prosody: 0.12.5 -> 13.0.2, nixos/prosody: fix startup
Co-authored-by: mirror230469 <215964377+mirror230469@users.noreply.github.com>
2025-08-03 21:35:28 +02:00
Pavol Rusnak ffba411e71
cjdns: 21.4 -> 22.1 (#426168) 2025-08-03 11:54:24 +02:00
sternenseemann 0515216cef nixos/inspircd: sync with upstream systemd.service file
We could in theory just re-use the upstream one, but it sets User=root
which I'm not entirely comfortable with. Instead, add the settings we
were missing from that file here. Sadly, upstream doesn't configure a
syscall filter or similar.
2025-08-03 02:53:03 +02:00
sternenseemann 0f56042556 inspircd: 3.18.0 -> 4.7.0
https://docs.inspircd.org/4/breaking-changes/
https://docs.inspircd.org/4/overview/

https://docs.inspircd.org/4/change-log/#inspircd-401
https://docs.inspircd.org/4/change-log/#inspircd-410
https://docs.inspircd.org/4/change-log/#inspircd-420
https://docs.inspircd.org/4/change-log/#inspircd-430
https://docs.inspircd.org/4/change-log/#inspircd-440
https://docs.inspircd.org/4/change-log/#inspircd-450
https://docs.inspircd.org/4/change-log/#inspircd-460
https://docs.inspircd.org/4/change-log/#inspircd-470

Packaging-relevant changes:

- inspircd no longer has the start subcommand, but needs to be invoked
  directly.
- New extra modules: log_syslog and log_json
- Removed extra modules: regex_tre, regex_pcre, ssl_mbedtls
  You probably should not use them anymore, but they can be
  obtained via the module manager in theory — though I doubt it works
  with Nix (another item for the todo list, I guess):
  https://docs.inspircd.org/4/module-manager/
2025-08-03 02:53:03 +02:00
jaredmontoya 25750b264d nixos/i2pd: add ssu2 options 2025-08-02 22:46:40 +02:00
Aleksana 5f4f85bb00
nixos/cgit: use alias option for assets (#390448) 2025-08-01 23:24:46 +08:00
Sandro Jäckel a5e26447d7
nixos/prosody: fix empty config check output, fix some errors which are not fatal 2025-08-01 05:17:37 +02:00
Sandro Jäckel e2e3e77ab0
nixos/prosody: add config check option 2025-08-01 04:10:49 +02:00
Sandro Jäckel 8c9a0efe30
nixos/prosody: deadnix, remove extra new lines, minor cleanup 2025-08-01 03:12:29 +02:00
Benedikt von Blomberg 4f6691c9ff nixos/ddclient: added assertions for passwordFile and secretsFile
nix fmt
2025-07-29 15:17:35 +02:00
Benedikt von Blomberg 38a03fc480 nixos/services.ddclient: make username optional 2025-07-29 15:17:35 +02:00
Benedikt von Blomberg a1ed19f38d nixos/services.ddclient: add secretsFile option 2025-07-29 15:17:35 +02:00
Axel Karjalainen d634694bdd nixos/cgit: use alias option for assets
This makes it easier to replace an asset by just setting the Nginx
virtual host's `locations."= robots.txt".alias`. Previously you had to
either replace the extraConfig with mkForce or clear it and use the
`alias` option.
2025-07-29 15:20:24 +03:00
Martin Weinelt 5dd6d1d43b
kea: 2.6.3 -> 3.0.0 (#428872) 2025-07-29 03:51:17 +02:00
Martin Weinelt 66e035f411
kea: 2.6.3 -> 3.0.0
https://gitlab.isc.org/isc-projects/kea/-/wikis/Release-Notes/release-notes-3.0.0
2025-07-29 03:43:54 +02:00
Amadej Kastelic 7476494b3b
nixos/cjdns: update for cjdns 22.1 compatibility 2025-07-27 15:28:40 +02:00
Ryan Horiguchi 51b0961214 nixos/dnsmasq: add config option to retrive config file path 2025-07-27 00:49:28 +02:00
Sandro a9b0143df6
speedify: init at 15.6.4-12495 (#415937) 2025-07-26 13:20:51 +02:00
Sandro ce6b0611ca
searxng: 0-unstable-2025-07-16 -> 0-unstable-2025-07-18 (#426391) 2025-07-26 02:21:09 +02:00
Philip Taron d392f98f00
services.openssh: use notify-reload for sshd (#427620) 2025-07-25 16:02:49 -07:00
Martin Weinelt fde8885198
kea: 2.6.2 -> 2.6.3
https://downloads.isc.org/isc/kea/2.6.3/Kea-2.6.3-ReleaseNotes.txt

https://kb.isc.org/docs/cve-2025-32801
https://kb.isc.org/docs/cve-2025-32802
https://kb.isc.org/docs/cve-2025-32803

Fixes: CVE-2025-32801, CVE-2025-32802, CVE-2025-32803
2025-07-25 14:12:39 +02:00
Zahrun 1c26e0e7a9 speedify: init at 15.6.4-12495
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
Co-authored-by: emaryn <197520219+emaryn@users.noreply.github.com>
2025-07-25 15:54:44 +05:30
Sandro Jäckel 04e7d4607d
searxng: 0-unstable-2025-07-16 -> 0-unstable-2025-07-18 2025-07-24 22:55:01 +02:00
Wolfgang Walther 5a0711127c
treewide: run nixfmt 1.0.0 2025-07-24 13:55:40 +02:00
Wolfgang Walther 62fe016519
treewide: run treefmt with mdcr/nixfmt 2025-07-24 13:52:31 +02:00
Wolfgang Walther 6c47e7d5da
treewide: fix syntax errors in nix code blocks
Fixes all code blocks with "nix" language in markdown files for syntax
errors to be able to run nixfmt in the next step.
2025-07-24 13:52:29 +02:00
Michele Guerini Rocco 2e7f98d013
nixos/searx: use envsubst instead of sed for reading environment variables (#419149) 2025-07-23 22:21:01 +02:00
ssoss edadf6cc0f services.openssh: use notify-reload for sshd 2025-07-23 01:24:58 +00:00
mivorasu d80ed4cb91 treewide: conform descriptions to the standards
Co-authored-by: Pol Dellaiera <pol.dellaiera@protonmail.com>
2025-07-22 23:44:23 +00:00
Moonsn 99e4bf5792
nixos/tailscale-derper: add enableNginx option to make nginx optional (#425734) 2025-07-22 23:45:10 +02:00
Vladimír Čunát 998f38e992
nixos/kresd: don't explicitly set group id (#413360) 2025-07-22 13:49:53 +02:00
Matthew Croughan 530db85404
nixos/atalkd: init (#425554) 2025-07-21 18:29:33 +01:00
matthewcroughan 75929b4612 nixos/atalkd: init 2025-07-21 18:16:26 +01:00
Andrey Albershteyn 13a041b174 headscale: support PKCE verifier
The headscale 0.24.0 introduced support for PKCE verifier. Add options
to set these parameters in the config.
2025-07-21 16:48:18 +02:00
Marie Ramlow f0e5db7021 nixos/g3proxy: run proxy with --systemd --control-dir %t/g3proxy 2025-07-20 01:35:21 +02:00
Sean Behan ca88da9ce3
nixos/searx: use envsubst instead of sed for reading environment variables
- use envsubst instead of sed for reading in environment variables
- update usage examples
- add release notes
2025-07-18 15:51:03 +02:00
Aleksana 03b3a97679
nixos/newt: init (#414337) 2025-07-18 19:07:59 +08:00
Glen Huang 9d50f2dd2f nixos/dnsmasq: make dnsmasq --test test the config file
Currently it's testing an empty configuration
2025-07-17 20:30:39 +08:00
jack 9501130c38 nixos/newt: init 2025-07-17 13:04:13 +02:00
Sandro Jäckel 11ba4eb03e
searxng: 0-unstable-2025-07-08 -> 0-unstable-2025-07-16 2025-07-16 21:07:45 +02:00
Sandro Jäckel 3e32a1a27c
nixos/searx: move faviconcache to /var/cache 2025-07-15 17:41:15 +02:00
Sandro Jäckel 1d42336757
nixos/searx: don't delete /run/searx/ on init service restarts 2025-07-15 17:41:14 +02:00
Sandro Jäckel 8e34970572
nixos/searx: restart uwsgi when searx changes 2025-07-15 17:41:13 +02:00
Sandro Jäckel e626de7d9a
nixos/searx: add configureNginx setting to automatically configure nginx with uwsgi over a socket 2025-07-15 17:41:12 +02:00
Sandro Jäckel fe8e665cc3
nixos/searx: fix lsp findings 2025-07-15 17:41:12 +02:00
Sandro Jäckel d88324eff3
nixos/searx: match maintainers with searxng package 2025-07-15 17:41:11 +02:00
Sandro Jäckel 7e7377e043
nixos/searx: cleanup, sort config 2025-07-15 17:41:11 +02:00
Sandro Jäckel 681b727dc6
nixos/searx: rename runInUwsgi to configureUwsgi 2025-07-15 17:41:10 +02:00
Sandro Jäckel 3497e6a8af
nixos/searx: drop searx compatibility 2025-07-15 17:41:10 +02:00
Aleksana c19390a96d
nixos/pihole-ftl: fix openFirewall ports (#424348) 2025-07-15 10:51:41 +08:00
NullCube 8af12908c2 nixos/anubis: add missing botPolicy option implementation 2025-07-14 08:49:32 -07:00
nixpkgs-ci[bot] 8287b2917e
Merge master into staging-next 2025-07-12 18:05:06 +00:00
Wolfgang Walther 4bfecfb345
r53-ddns: 1.1.0 -> 1.3.0 (#405048) 2025-07-12 17:18:18 +00:00
Patrick Gehrsitz 9da74b34fe
nixos/pihole-ftl: add openFirewallDNS to docs example 2025-07-11 17:32:21 +02:00
Patrick Gehrsitz 4883f43d36
nixos/pihole-ftl: add openFirewallDNS ports 2025-07-11 17:19:58 +02:00
Patrick Gehrsitz 1536ddeea9
nixos/pihole-ftl: fix openFirewallDHCP ports 2025-07-11 17:18:22 +02:00
K900 77e81dbfc2 Merge remote-tracking branch 'origin/master' into staging-next 2025-07-11 09:24:31 +03:00
Michele Guerini Rocco bcb3614b35
nixos/syncthing: get systemd units from cfg.package & install syncthing command and man page (#422094) 2025-07-11 00:01:02 +02:00
nixpkgs-ci[bot] dc26f5f38f
Merge master into staging-next 2025-07-08 06:06:09 +00:00
Franz Pletz b1c964b557
nixos/tests/chrony: graphene-hardened works without mlock
Fix #423330. Broken by #416715.
2025-07-08 01:44:35 +02:00
nixpkgs-ci[bot] 07ab953baa
Merge master into staging-next 2025-07-06 16:43:42 +00:00
Michele Guerini Rocco c2287094ea
nixos/searx: move network.target from wantedBy to after (#422924) 2025-07-06 17:00:46 +02:00
nixpkgs-ci[bot] 60677469ef
Merge master into staging-next 2025-07-06 12:06:26 +00:00
provokateurin bcc1b762e9
nixos/searx: move network.target from wantedBy to after
In 623664e84f this part was refactored,
however network.target does not make sense in wantedBy and must be part of after.
2025-07-06 13:49:15 +02:00
Jaco Malan 1fb02bc8f9
nixos/monero: add environmentFile option 2025-07-06 10:33:44 +02:00
nixpkgs-ci[bot] 61be326d8b
Merge master into staging-next 2025-07-05 18:05:00 +00:00
Ivan Dimitrov ff75103a7c
nixos/monero: allow pruning with option (#421289) 2025-07-05 14:28:39 +02:00
nixpkgs-ci[bot] 04de8eaaf8
Merge staging-next into staging 2025-07-04 06:07:14 +00:00
Martin Weinelt a289362e80
networkmanager: drop hard dependency on openconnect and cleanup plugin handling (#421042) 2025-07-04 03:08:40 +02:00
nixpkgs-ci[bot] 4725dc1d5d
Merge staging-next into staging 2025-07-03 18:06:42 +00:00
Sandro Jäckel f88e1c39e9
treewide: move StartLimitIntervalSec/StartLimitBurst to unitConfig 2025-07-03 15:48:28 +02:00
Jason Yundt de0be57ef7 nixos/syncthing: install syncthing command and man page
Before this change, setting services.syncthing.enable to true would
enable Syncthing, but it wouldn’t add Syncthing’s man page to your
system. This change ensures that the man page is available.

I tested this change using this Nix expression:

  let
    nixpkgsRepo = /path/to/nixpkgs/repo;
    pkgs = import nixpkgsRepo { };
  in pkgs.testers.runNixOSTest {
    name = "syncthing-man-page-test";
    nodes.machine = {
      services.syncthing.enable = true;
    };
    testScript = ''
      start_all()
      machine.succeed("man syncthing > log.txt")
      machine.copy_from_vm("log.txt", ".")
    '';
  }
2025-07-03 08:19:06 -04:00
Jason Yundt 816afcf9c0 nixos/syncthing: get systemd units from cfg.package
Before this change, the syncthing module used two potentially different
packages for Syncthing. Sometimes, it would use cfg.package and
sometimes it would use pkgs.syncthing. This change makes the syncthing
module more consistent by making it always use cfg.package.

The reference to pkgs.syncthing was added in
1026bebee6. I looked through that commit
message and the thread for the pull request that it came from [1], and I
couldn’t find anything that explained why pkgs.syncthing was used over
cfg.package. I’m guessing that using pkgs.syncthing over cfg.package was
a mistake, but I’m not sure.

[1]: <https://github.com/NixOS/nixpkgs/pull/18973>
2025-07-03 07:37:23 -04:00
Alyssa Ross e0910df589
Merge remote-tracking branch 'origin/staging-next' into staging
Conflicts:
	pkgs/by-name/me/meson/package.nix
2025-07-02 14:49:42 +02:00
Yang, Bo 3f377cfde8
nixos/avahi-daemon: add dependency to ensure /run/avahi-daemon is created before socket activation (#417635) 2025-07-02 13:03:14 +02:00
nixpkgs-ci[bot] 536476f3aa
Merge staging-next into staging 2025-07-01 12:08:22 +00:00
Sandro ace047b8d5
nixos/xrdp: use --replace-fail with substituteInPlace, try #2 (#392512) 2025-07-01 11:59:37 +02:00
nixpkgs-ci[bot] 62814d33b6
Merge staging-next into staging 2025-06-30 18:06:45 +00:00
Jonathan Davies 185eba3148
nixos/ntpd-rs: Validate the ntpd-rs.toml file 2025-06-30 15:24:05 +02:00
Martin Weinelt 312015eaaf
networkmanager-strongswan: rename from networkmanager_strongswan
This is to follow the same structure as all other nm plugins.
2025-06-30 14:45:37 +02:00
nixpkgs-ci[bot] eee21ba9fa
Merge staging-next into staging 2025-06-30 12:08:05 +00:00
Martin Weinelt ccdca43d80
nixos/networkmanager: drop default plugin list and toggle
It is unclear where this list originated, but it doesn't make sense to
ship it with all networkmanager installations. The most excessive plugin
is openconnect, that ships a 250 MB closure including webkitgtk.

Instead users now have to specify the plugins they want explicitly. I
updated the option to give hints on how to find them as best as I can.
2025-06-30 08:40:05 +02:00
Jörg Thalheim 34b498526c
nixos/easytier: init module (#398170) 2025-06-30 08:13:27 +02:00
Martin Weinelt 6e1cd10adb
nixos/networkmanager: clean up plugin handling
There is no point in having a special option to enable strongswan, when
we can just parse the intent from the plugin list instead.

Also pick up relevant runtime dependency information from the plugin
package instead of providing additional options or hardcoding them.
2025-06-29 22:53:27 +02:00
Marcel 14d4a883e8
nixos/bird: print config file with line numbers during config check
Bird configuration errors only print the line number without context.
Printing the configuration file with line numbers helps to identify the
faulty expression.
2025-06-29 22:39:24 +02:00
nixpkgs-ci[bot] ac8cb87605
Merge staging-next into staging 2025-06-29 18:05:51 +00:00
Wolfgang Walther ff0515b50b
nixos/chrony: fix defaultText rendering of enableMemoryLocking option (#420789) 2025-06-29 15:40:25 +00:00
Sandro 48f5657fb9
nixos/chrony: fix defaultText rendering of enableMemoryLocking option 2025-06-28 18:22:12 +02:00
L-Trump 725a756dbb nixos/easytier: init module 2025-06-28 23:22:51 +08:00
K900 5985f13b69 Merge remote-tracking branch 'origin/staging-next' into staging 2025-06-27 21:07:44 +03:00
Maximilian Bosch a064abed61
Merge: nixos/postgresql: move postStart into separate unit (#403645) 2025-06-27 18:09:54 +02:00
K900 6d81aa24da Merge remote-tracking branch 'origin/staging-next' into staging 2025-06-27 11:10:05 +03:00
Pol Dellaiera b5acd6e545
nixos/netbird: robustness improvements (#420183) 2025-06-26 19:07:24 +02:00
K900 da21cd73af
livekit-ingress: init (#409757) 2025-06-26 19:09:06 +03:00
Krzysztof Nazarewski 17c0c3293d
nixos/netbird: add iptables/nftables for debug bundle handling 2025-06-26 14:13:05 +02:00
Krzysztof Nazarewski 70e91e0956
nixos/netbird: openFirewall for remote DNS resolver 2025-06-26 14:13:05 +02:00
Wolfgang Walther 41c5662cbe
nixos/postgresql: move postStart into separate unit
This avoids restarting the postgresql server, when only ensureDatabases
or ensureUsers have been changed. It will also allow to properly wait
for recovery to finish later.

To wait for "postgresql is ready" in other services, we now provide a
postgresql.target.

Resolves #400018

Co-authored-by: Marcel <me@m4rc3l.de>
2025-06-24 15:26:47 +02:00
K900 c732ad18a8 Merge remote-tracking branch 'origin/staging-next' into staging 2025-06-24 10:22:21 +03:00
Philip Taron cd233b3496
nixos/sshd: don't set KDF rounds for host keys (#415385) 2025-06-23 15:58:06 -07:00
K900 a10dfa1005 Merge remote-tracking branch 'origin/staging-next' into staging 2025-06-23 21:07:45 +03:00
Martin Weinelt aefa79cfc9 nixos/livekit{,-ingress}: automatically configure redis for locally distributed setups 2025-06-23 18:35:25 +03:00
K900 f19355f5ed nixos/livekit-ingress: init 2025-06-23 18:35:24 +03:00
Greizgh fd3d596a1c
seafile: remove myself from maintainers
I do not use seafile anymore and won't spend energy working on it.
2025-06-23 14:57:48 +02:00
nixpkgs-ci[bot] b68b849d07
Merge staging-next into staging 2025-06-22 18:06:41 +00:00
Sandro f565429fb3
nixos/seafile: update outdated https links in package metadata (#412349) 2025-06-22 19:26:47 +02:00
Hannes Graf 09124156ca nixos/seafile: update outdated https links 2025-06-22 15:36:29 +02:00
nixpkgs-ci[bot] d9f7cbb224
Merge staging-next into staging 2025-06-22 00:20:02 +00:00
Wolfgang Walther e80ca91f80
net-tools: rename from nettools (#416056) 2025-06-21 18:29:34 +00:00
Jakob Kukla db7efc1412
nixos/atticd: fix user and group documentation mixup 2025-06-21 20:20:30 +02:00
zimbatm 39c01d22bf net-tools: rename from nettools
By being in sync with the pname, it makes it easier to walk back from
the pname that shows in the /nix/store back to the attribute.

This change should not cause any rebuild.
2025-06-21 19:57:36 +02:00
Aleksana 4e4c90af3a
nixos/stunnel: give up maintainerhsip (#418234) 2025-06-22 00:05:21 +08:00
Franz Pletz 5fecf8770b
nixos/chrony: add systemd service notify support (#416715) 2025-06-21 08:38:17 +02:00
Pavol Rusnak 4fab5e9fe9
fedimint: 0.5.1 -> 0.7.1 (#397967) 2025-06-20 21:28:34 +02:00
Dawid Ciężarkiewicz c0f52c28cd fedimint: 0.5.1 -> 0.7.1
0.7 release of Fedimint includes deployment changes. Notably:

* Experimental Iroh p2p connectivity support (uses UDP)
* built-in admin UI
2025-06-20 09:22:50 -07:00
Leon Schuermann 5fe0a4bef6 nixos/stunnel: give up maintainerhsip 2025-06-19 14:55:25 -04:00
r-vdp 3c853295d9
nixos/wstunnel: convert to RFC42-style settings 2025-06-18 17:31:13 +02:00
Matthew Croughan e9eb7be1d6
nixos/scion: upgrade to 0.12 and fix module accordingly (#417777) 2025-06-18 13:29:02 +01:00
Aleksana b95bc4d285
pihole-ftl: fix settings.webserver.tls.cert (#415532) 2025-06-18 17:10:37 +08:00
matthewcroughan b1b384ccb3 nixos/scion: changes for 0.12
These are the necessary changes for updating to 0.12, which supports dispatcherless operation by foregoing the dispatcher's unix socket in favour of UDP
2025-06-18 09:24:15 +01:00
Peder Bergebakken Sundt 42d7266f38
firezone-gui-client: 1.4.12 -> 1.5.1 (#414765) 2025-06-17 03:42:41 +02:00
Morgan Jones 41ace86393
services: openvpn: servers: authUserPass: allow to be a path (#395982) 2025-06-15 17:04:13 -07:00
Jacob Birkett 5f33d95144 services: openvpn: servers: authUserPass: allow to be a path
This allows using an agenix file.
2025-06-15 16:47:21 -07:00
Martin Weinelt ac4ce03274
nixos/pdns-recursor: configure as local resolver
When pdns-recursor is enabled it should ideally be the default resolver
for the host as well. This is probably good for 95% of the use-cases out
there, and the default for unbound and kresd, but also bind and dnsmasq.
2025-06-15 19:02:27 +02:00
Franz Pletz b333d60710
nixos/tests/chrony: not compatible with graphene-hardened anymore
Version 4.7 introduced the incompatibility, see #416005.
2025-06-14 16:56:34 +02:00
Franz Pletz 7a6c67e796
nixos/chrony: add systemd service notify support 2025-06-14 16:47:44 +02:00
Aleksana 5625b7eff6
nixos/doc: explain how to use the ff sync module with ff android (#413380) 2025-06-11 19:44:46 +08:00
Guillaume Girol a975ab0752 nixos/doc: explain how to use the ff sync module with ff android
source https://mozilla-services.readthedocs.io/en/latest/howtos/run-sync-1.5.html#howto-run-sync15

Quotation:

```
Firefox for Android (“Daylight”, versions 79 and later) does support using a non-Mozilla-hosted Sync server. Before logging in, go to App Menu > Settings > About Firefox and click the logo 5 times. You should see a “debug menu enabled” notification. Go back to the main menu and you will see two options for a custom account server and a custom Sync server. Set the Sync server to the URL given above and then log in.

To configure Android Firefox 44 up to 78 to talk to your new Sync server, just set the “identity.sync.tokenserver.uri” exactly as above before signing in to Mozilla accounts and Sync on your Android device.

Important: after creating the Android account, changes to “identity.sync.tokenserver.uri” will be ignored. (If you need to change the URI, delete the Android account using the Settings > Sync > Disconnect… menu item, update the pref, and sign in again.) Non-default TokenServer URLs are displayed in the Settings > Sync panel in Firefox for Android, so you should be able to verify your URL there.
```

the /token/ prefix is experimentally wrong.
2025-06-11 12:00:00 +00:00
Leon 8941989f24
pihole-ftl: fix settings.webserver.tls.cert 2025-06-10 11:34:48 +02:00
Yarny0 6acf53f654 nixos/sshd: don't use -a (KDF rounds) on host keys
The nixos `sshd.nix` module contains a
mechanism to generate ssh host keys prior to
starting sshd if those host keys are missing.
The option `services.openssh.hostKeys` is used to
configure which host keys should exist or be created.
It also declares the key type and other key-related options.

One of those options is `rounds`.
That one is then forwarded to the
`ssh-keygen` program with the `-a` option.
It defines how many rounds of a key derivation function
are to be used on the key's passphrase before the result
is used to en-/decrypt the private key; cf. ssh-keygen(1).

ssh host keys are passwordless;
they are solely protected by filesystem access modes.
Hence, the `-a` option is irrelevant
and silently ignored by `ssh-keygen`.

The commit at hand therefore removes this option from
the host key generation script and the option examples.
2025-06-09 21:06:20 +02:00
oddlama b2b1a8c052
nixos/firezone-gui-client: adjust to renamed tunnel service binary 2025-06-08 16:56:26 +02:00
Michele Guerini Rocco b16827a225
nixos/dhcpcd: specify withUdev when overriding the package for no udev (#414724) 2025-06-08 12:21:11 +02:00
Pol Dellaiera d7ed3c0dce
pihole-ftl: 6.1 -> 6.2.2 (#414788) 2025-06-08 09:51:06 +02:00
Peter Lehmann c586196e17 nixos/pdns-recursor: reload service on config change 2025-06-07 19:13:07 +02:00
williamvds e8b98ec709
pihole-ftl: update 6.1 -> 6.2.2
Apply some review suggestions by @dotlambda
2025-06-07 17:46:46 +01:00
7c6f434c 63eb46dcd5 nixos/dhcpcd: specify withUdev when overriding the package for no udev 2025-06-07 16:24:30 +02:00
Lin Jian 2302f3c9bd
nixos/dnscrypt-proxy2: add package option (#411451) 2025-06-06 21:21:30 +08:00
MidAutumnMoon 101965187e
nixos/dnscrypt-proxy2: add package option
nixos/dnscrypt-proxy2: remove `with lib;`

Co-authored-by: Sizhe Zhao <prc.zhao@outlook.com>
2025-06-06 18:15:30 +08:00
Felix Singer 31d18149ad nixos/murmur: Drop warnings regarding renamed/removed options
These warnings were added around 5 years ago. That's long enough. So
drop them.

Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-06-06 07:52:35 +02:00
Felix Singer b6c81af12d nixos/murmur: Get rid global lib expansion
Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-06-06 07:52:35 +02:00
Felix Singer 1c9df5c6de nixos/murmur: Use lib.mkEnableOption where possible
While on it, replace occurrences of "Murmur" with "Mumble server" of
touched options.

Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-06-06 07:52:35 +02:00
williamvds 82b8a1e117
maintainers: rename williamvds -> averyvigolo 2025-06-04 21:27:11 +01:00
John Wiegley 8922d4f099
pihole: init at various (#361571)
Adds pihole-ftl.service and pihole-ftl-log-deleter.service.

Authored-By: williamvds <william@williamvds.me>
2025-06-04 08:12:30 -07:00
Paul Haerle ea34fcd8ae
nixos/tailscale-auth: restart on-failure and wait for tailscaled (#393038) 2025-06-04 13:50:31 +02:00
williamvds 8f5d24c1b2
nixos/pihole-ftl: init
Add a module for pihole-ftl, which allows declaratively defining the
pihole.toml config file.

Also provide options for adlists to use, which can be added through the pihole
script (packaged as "pihole"). Other state such as clients and groups require
complex database operations, which is normally performed by the pihole
webapp (packaged as "pihole-web").

Extend the dnsmasq module to avoid duplication, since pihole-ftl is a soft-fork
of dnsmasq which maintains compatibility.

Provide the pihole script in `environment.systemPackages` so pihole-ftl can be
easily administrated.
2025-06-03 23:15:18 +01:00
williamvds 4bdf75f1cb
dnsmasq: pass through config file as an option
So that the pihole module reuse it. pihole-ftl is a fork of dnsmasq and its
configuration file is compatible.
2025-06-03 23:15:17 +01:00