Commit graph

5038 commits

Author SHA1 Message Date
Krzysztof Nazarewski 70e91e0956
nixos/netbird: openFirewall for remote DNS resolver 2025-06-26 14:13:05 +02:00
Wolfgang Walther 41c5662cbe
nixos/postgresql: move postStart into separate unit
This avoids restarting the postgresql server, when only ensureDatabases
or ensureUsers have been changed. It will also allow to properly wait
for recovery to finish later.

To wait for "postgresql is ready" in other services, we now provide a
postgresql.target.

Resolves #400018

Co-authored-by: Marcel <me@m4rc3l.de>
2025-06-24 15:26:47 +02:00
K900 c732ad18a8 Merge remote-tracking branch 'origin/staging-next' into staging 2025-06-24 10:22:21 +03:00
Philip Taron cd233b3496
nixos/sshd: don't set KDF rounds for host keys (#415385) 2025-06-23 15:58:06 -07:00
K900 a10dfa1005 Merge remote-tracking branch 'origin/staging-next' into staging 2025-06-23 21:07:45 +03:00
Martin Weinelt aefa79cfc9 nixos/livekit{,-ingress}: automatically configure redis for locally distributed setups 2025-06-23 18:35:25 +03:00
K900 f19355f5ed nixos/livekit-ingress: init 2025-06-23 18:35:24 +03:00
Greizgh fd3d596a1c
seafile: remove myself from maintainers
I do not use seafile anymore and won't spend energy working on it.
2025-06-23 14:57:48 +02:00
nixpkgs-ci[bot] b68b849d07
Merge staging-next into staging 2025-06-22 18:06:41 +00:00
Sandro f565429fb3
nixos/seafile: update outdated https links in package metadata (#412349) 2025-06-22 19:26:47 +02:00
Hannes Graf 09124156ca nixos/seafile: update outdated https links 2025-06-22 15:36:29 +02:00
nixpkgs-ci[bot] d9f7cbb224
Merge staging-next into staging 2025-06-22 00:20:02 +00:00
Wolfgang Walther e80ca91f80
net-tools: rename from nettools (#416056) 2025-06-21 18:29:34 +00:00
Jakob Kukla db7efc1412
nixos/atticd: fix user and group documentation mixup 2025-06-21 20:20:30 +02:00
zimbatm 39c01d22bf net-tools: rename from nettools
By being in sync with the pname, it makes it easier to walk back from
the pname that shows in the /nix/store back to the attribute.

This change should not cause any rebuild.
2025-06-21 19:57:36 +02:00
Aleksana 4e4c90af3a
nixos/stunnel: give up maintainerhsip (#418234) 2025-06-22 00:05:21 +08:00
Franz Pletz 5fecf8770b
nixos/chrony: add systemd service notify support (#416715) 2025-06-21 08:38:17 +02:00
Pavol Rusnak 4fab5e9fe9
fedimint: 0.5.1 -> 0.7.1 (#397967) 2025-06-20 21:28:34 +02:00
Dawid Ciężarkiewicz c0f52c28cd fedimint: 0.5.1 -> 0.7.1
0.7 release of Fedimint includes deployment changes. Notably:

* Experimental Iroh p2p connectivity support (uses UDP)
* built-in admin UI
2025-06-20 09:22:50 -07:00
Leon Schuermann 5fe0a4bef6 nixos/stunnel: give up maintainerhsip 2025-06-19 14:55:25 -04:00
r-vdp 3c853295d9
nixos/wstunnel: convert to RFC42-style settings 2025-06-18 17:31:13 +02:00
Matthew Croughan e9eb7be1d6
nixos/scion: upgrade to 0.12 and fix module accordingly (#417777) 2025-06-18 13:29:02 +01:00
Aleksana b95bc4d285
pihole-ftl: fix settings.webserver.tls.cert (#415532) 2025-06-18 17:10:37 +08:00
matthewcroughan b1b384ccb3 nixos/scion: changes for 0.12
These are the necessary changes for updating to 0.12, which supports dispatcherless operation by foregoing the dispatcher's unix socket in favour of UDP
2025-06-18 09:24:15 +01:00
Peder Bergebakken Sundt 42d7266f38
firezone-gui-client: 1.4.12 -> 1.5.1 (#414765) 2025-06-17 03:42:41 +02:00
Morgan Jones 41ace86393
services: openvpn: servers: authUserPass: allow to be a path (#395982) 2025-06-15 17:04:13 -07:00
Jacob Birkett 5f33d95144 services: openvpn: servers: authUserPass: allow to be a path
This allows using an agenix file.
2025-06-15 16:47:21 -07:00
Martin Weinelt ac4ce03274
nixos/pdns-recursor: configure as local resolver
When pdns-recursor is enabled it should ideally be the default resolver
for the host as well. This is probably good for 95% of the use-cases out
there, and the default for unbound and kresd, but also bind and dnsmasq.
2025-06-15 19:02:27 +02:00
Franz Pletz b333d60710
nixos/tests/chrony: not compatible with graphene-hardened anymore
Version 4.7 introduced the incompatibility, see #416005.
2025-06-14 16:56:34 +02:00
Franz Pletz 7a6c67e796
nixos/chrony: add systemd service notify support 2025-06-14 16:47:44 +02:00
Aleksana 5625b7eff6
nixos/doc: explain how to use the ff sync module with ff android (#413380) 2025-06-11 19:44:46 +08:00
Guillaume Girol a975ab0752 nixos/doc: explain how to use the ff sync module with ff android
source https://mozilla-services.readthedocs.io/en/latest/howtos/run-sync-1.5.html#howto-run-sync15

Quotation:

```
Firefox for Android (“Daylight”, versions 79 and later) does support using a non-Mozilla-hosted Sync server. Before logging in, go to App Menu > Settings > About Firefox and click the logo 5 times. You should see a “debug menu enabled” notification. Go back to the main menu and you will see two options for a custom account server and a custom Sync server. Set the Sync server to the URL given above and then log in.

To configure Android Firefox 44 up to 78 to talk to your new Sync server, just set the “identity.sync.tokenserver.uri” exactly as above before signing in to Mozilla accounts and Sync on your Android device.

Important: after creating the Android account, changes to “identity.sync.tokenserver.uri” will be ignored. (If you need to change the URI, delete the Android account using the Settings > Sync > Disconnect… menu item, update the pref, and sign in again.) Non-default TokenServer URLs are displayed in the Settings > Sync panel in Firefox for Android, so you should be able to verify your URL there.
```

the /token/ prefix is experimentally wrong.
2025-06-11 12:00:00 +00:00
Leon 8941989f24
pihole-ftl: fix settings.webserver.tls.cert 2025-06-10 11:34:48 +02:00
Yarny0 6acf53f654 nixos/sshd: don't use -a (KDF rounds) on host keys
The nixos `sshd.nix` module contains a
mechanism to generate ssh host keys prior to
starting sshd if those host keys are missing.
The option `services.openssh.hostKeys` is used to
configure which host keys should exist or be created.
It also declares the key type and other key-related options.

One of those options is `rounds`.
That one is then forwarded to the
`ssh-keygen` program with the `-a` option.
It defines how many rounds of a key derivation function
are to be used on the key's passphrase before the result
is used to en-/decrypt the private key; cf. ssh-keygen(1).

ssh host keys are passwordless;
they are solely protected by filesystem access modes.
Hence, the `-a` option is irrelevant
and silently ignored by `ssh-keygen`.

The commit at hand therefore removes this option from
the host key generation script and the option examples.
2025-06-09 21:06:20 +02:00
oddlama b2b1a8c052
nixos/firezone-gui-client: adjust to renamed tunnel service binary 2025-06-08 16:56:26 +02:00
Michele Guerini Rocco b16827a225
nixos/dhcpcd: specify withUdev when overriding the package for no udev (#414724) 2025-06-08 12:21:11 +02:00
Pol Dellaiera d7ed3c0dce
pihole-ftl: 6.1 -> 6.2.2 (#414788) 2025-06-08 09:51:06 +02:00
Peter Lehmann c586196e17 nixos/pdns-recursor: reload service on config change 2025-06-07 19:13:07 +02:00
williamvds e8b98ec709
pihole-ftl: update 6.1 -> 6.2.2
Apply some review suggestions by @dotlambda
2025-06-07 17:46:46 +01:00
7c6f434c 63eb46dcd5 nixos/dhcpcd: specify withUdev when overriding the package for no udev 2025-06-07 16:24:30 +02:00
Lin Jian 2302f3c9bd
nixos/dnscrypt-proxy2: add package option (#411451) 2025-06-06 21:21:30 +08:00
MidAutumnMoon 101965187e
nixos/dnscrypt-proxy2: add package option
nixos/dnscrypt-proxy2: remove `with lib;`

Co-authored-by: Sizhe Zhao <prc.zhao@outlook.com>
2025-06-06 18:15:30 +08:00
Felix Singer 31d18149ad nixos/murmur: Drop warnings regarding renamed/removed options
These warnings were added around 5 years ago. That's long enough. So
drop them.

Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-06-06 07:52:35 +02:00
Felix Singer b6c81af12d nixos/murmur: Get rid global lib expansion
Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-06-06 07:52:35 +02:00
Felix Singer 1c9df5c6de nixos/murmur: Use lib.mkEnableOption where possible
While on it, replace occurrences of "Murmur" with "Mumble server" of
touched options.

Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-06-06 07:52:35 +02:00
williamvds 82b8a1e117
maintainers: rename williamvds -> averyvigolo 2025-06-04 21:27:11 +01:00
John Wiegley 8922d4f099
pihole: init at various (#361571)
Adds pihole-ftl.service and pihole-ftl-log-deleter.service.

Authored-By: williamvds <william@williamvds.me>
2025-06-04 08:12:30 -07:00
Paul Haerle ea34fcd8ae
nixos/tailscale-auth: restart on-failure and wait for tailscaled (#393038) 2025-06-04 13:50:31 +02:00
williamvds 8f5d24c1b2
nixos/pihole-ftl: init
Add a module for pihole-ftl, which allows declaratively defining the
pihole.toml config file.

Also provide options for adlists to use, which can be added through the pihole
script (packaged as "pihole"). Other state such as clients and groups require
complex database operations, which is normally performed by the pihole
webapp (packaged as "pihole-web").

Extend the dnsmasq module to avoid duplication, since pihole-ftl is a soft-fork
of dnsmasq which maintains compatibility.

Provide the pihole script in `environment.systemPackages` so pihole-ftl can be
easily administrated.
2025-06-03 23:15:18 +01:00
williamvds 4bdf75f1cb
dnsmasq: pass through config file as an option
So that the pihole module reuse it. pihole-ftl is a fork of dnsmasq and its
configuration file is compatible.
2025-06-03 23:15:17 +01:00
K900 716d4db111
Revert "nixos/murmur: Get rid of global lib expansion" 2025-06-03 09:13:00 +03:00
Arne Keller 8cc1462f3c
dsnet: init at 0.8.1, nixos/dsnet: init (#408421) 2025-06-02 23:14:24 +02:00
Linus Heckemann 2ce1d06baf nixos/kresd: don't explicitly set group id
null is the default, but setting it explicitly rather than relying on
the default results in collisions if users want to set their own gid.
Requiring mkForce here shouldn't be necessary when the module doesn't
specifically rely on the auto-allocation behaviour.

Change-Id: Ia541ac4e9c4d85b240386049b9947c607674a2f5
2025-06-02 22:26:20 +02:00
Callan Bryant eb01e02bd5 dsnet: init at 0.8.1 and init module 2025-06-02 20:41:52 +01:00
Felix Bühler 02abb271ea
nixos/murmur: Get rid of global lib expansion (#412693) 2025-06-02 21:04:25 +02:00
Pol Dellaiera 6d9d3014ba
treewide: fix typos in comments (#413240) 2025-06-02 18:43:07 +02:00
Peder Bergebakken Sundt c77ac9dfc3 treewide: fix typos 2025-06-02 16:07:07 +02:00
Michele Guerini Rocco 0e0842c978
nixos/monero: add an option to use ip ban-list (#412522) 2025-06-02 09:17:36 +02:00
alyaeanyx bdd58823ab maintainers: rename alyaeanyx -> pentane 2025-06-01 09:27:14 +02:00
Felix Singer 7c7c839a26 nixos/murmur: Drop warnings regarding renamed/removed options
These warnings were added around 5 years ago. That's long enough. So
drop them.

Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-05-31 21:15:21 +02:00
Felix Singer f13ada1223 nixos/murmur: Get rid global lib expansion
Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-05-31 21:15:21 +02:00
Felix Singer 9bca318775 nixos/murmur: Use lib.mkEnableOption where possible
While on it, replace occurrences of "Murmur" with "Mumble server" of
touched options.

Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-05-31 21:15:21 +02:00
nat 1ffc904284
nixos/monero: add an option to use ip ban-list 2025-05-31 13:02:50 +02:00
nat 6617c167f7
nixos/monero: use lib.getExe 2025-05-31 02:05:50 +02:00
Kristoffer Dalby 0dd5cdaa3b
headscale: 0.25.1 -> 0.26.0, update nixos module and test accordingly
Co-authored-by: Sandro <7258858+SuperSandro2000@users.noreply.github.com>
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2025-05-28 16:20:41 +02:00
Matthias Beyer c84ce50209
adguardhome: Build from source (#411034) 2025-05-27 11:50:16 +02:00
Aleksana 938e3fa749
nixos/networkmanager: add an enableDefaultPlugins option (#366842) 2025-05-26 20:34:24 +08:00
Aleksana 05ea790f13
nixos/anubis: Apply some more hardening settings (#410041) 2025-05-26 17:42:25 +08:00
Golbinex 6e99825c18 nixos/adguardhome: Update binary path
The compiled binary filename has upper cases
2025-05-26 07:24:42 +00:00
Aleksana f974b3e433
nixos/zeronsd: fix acl permissions (#391231) 2025-05-26 12:53:46 +08:00
Aleksana dcf345f2e9
nixos/syncthing: fix cert/key permission error (#408664) 2025-05-26 12:49:53 +08:00
Ryan Horiguchi 454aecb8c6 nixos/bind: add port option 2025-05-23 19:01:22 +02:00
Felix Singer 959c8e9311 nixos/anubis: Apply some more hardening settings
Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-05-23 07:12:59 +02:00
Pop 017276a4aa
netbird: fix typo in warning message (#406819) 2025-05-23 11:32:04 +08:00
Sveske_Juice 3303249ed2 nixos/syncthing: fix cert/key permission error 2025-05-19 11:51:47 +02:00
Michele Guerini Rocco eebd349fdd
nixos/pdns-recursor: deprecate settings, add yaml-settings (#406534) 2025-05-19 10:30:07 +02:00
patka 92ceb4a51c
nixos/polipo: drop
Upstream hasn't seen activity since 2014 and archived the project in 2021. There's no longer a need for HTTP proxies
2025-05-18 09:19:45 +02:00
Adam C. Stephens d25ea431bd
Headscale service wait before restart (#400053) 2025-05-16 08:30:08 -04:00
lassulus 84049bd248
nixos/syncthing: define and handle encryptionPassword option (#383442) 2025-05-15 19:44:22 +02:00
isabel 84c1069ebe
nixos/cloudflared: fix cert.pem installation (#407128) 2025-05-15 15:32:56 +01:00
Sandro 5077b9edb6
nixos/headscale: fix derp.auto_update_enabled option (#406108) 2025-05-15 11:04:01 +02:00
Pedro Alves 75c7d0908e nixos/cloudflared: fix cert.pem installation
There was a typo in the systemd service definition for cloudflared which
meant that the cert.pem file was not being correctly exposed.
2025-05-14 20:13:42 +01:00
Arne Keller 2264d87679
cato-client: init at 5.2.1.1, nixos/cato-client: init (#339533) 2025-05-13 17:36:06 +02:00
rnhmjoj b71d4f5fb3
nixos/pdns-recursor: deprecate settings, add yaml-settings 2025-05-12 20:27:02 +02:00
Patrick Steinhardt 8578bd1117 nixos/headscale: fix derp.auto_update_enabled option
The options part of "services.headscale.settings" get rendered directly
into a JSON file. As such, any declared values need to match the actual
config key that upstream uses or they are ineffective.

One such key is "derp.auto_update_enable", which controls whether or not
auto-updates for the DERP map are enabled. This key is misspellt though:
the config is called "derp.auto_update_enabled", and that has always
been the case since the config has been introduced in 57f46ded (Split
derp into its own config struct, 2021-10-22). Any unknown key is simply
ignored by Headscale, and as such the setting is ineffective.

Fix this by renaming the option.
2025-05-11 20:12:05 +02:00
Patrick 7a564cf0cd
nixos/networkd-dispatcher: use writeShellApplication to ease use 2025-05-11 11:53:45 +02:00
isabel 92d64400d5
nixos/anubis: Fix defaultOptions not applying user-defined settings (#398790) 2025-05-11 08:56:46 +01:00
Gary Guo 7dd8c5b602 unifi8: drop
This was an alias to the unifi package, which has been updated to v9.
To avoid confusion, remove this alias.
2025-05-10 14:47:52 +01:00
sudoforge 8aa7a07653
nixos/iwd: move General.UseDefaultInterface to DriverQuirks.DefaultInterface
`General.UseDefaultInterface` was deprecated last year, with a
recommendation to move to `DriverQuirks.DefaultInterface` [0] [1] [2].

[0]: https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=5c7777ff0fbcdee3c5d3a3cf6b1f375f2e820644
[1]: https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=d223f49fbc622e5b2f270711619ecbd542bed12e
[2]: https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=a27b7823df12c5d185b39aa7777c546843c1c96f
2025-05-08 21:35:40 -07:00
Franz Pletz 2634ca8249
nixos/ntpd-rs: Handle configuring NTP pools (#403903) 2025-05-08 18:28:32 +02:00
Johannes Kirschbauer 5ee93d2532
lib: refactor lib.attrsets.{mapAttrs', mapAttrsToList} and mapAttrs'' in the strongswan-swanctl module (#403581) 2025-05-08 09:42:40 +02:00
ccicnce113424 4551258940 lib: refactor lib.attrsets.{mapAttrs', mapAttrsToList} and mapAttrs'' in the strongswan-swanctl module
The new implementation of `mapAttrsToList` is simpler than the previous one, avoiding an extra string conversion. Benchmarking shows a slight performance improvement. See the discussion here: https://discourse.nixos.org/t/another-implementation-of-mapattrstolist

Additionally, I searched nixpkgs for expressions equivalent to the old `mapAttrsToList` and replaced them with direct calls to the new implementation.
2025-05-08 13:58:54 +08:00
fleaz d69eadeb94
nixos/r53-ddns: Add new option for record ttl 2025-05-07 22:23:19 +02:00
Wolfgang Walther c8d2eca963
.editorconfig: move subfolder config into separate .editorconfig files
This avoids paths in the top-level file getting out-of-sync, because the
.editorconfig files would be moved together with the files they target.
2025-05-07 20:01:35 +02:00
rnhmjoj 66db09eb62
nixos/dhcpcd: add option to allow setuid binaries
The promise in the networking.dhcpcd.runHook description was broken by
further restrictions added in 21bb7ea9.
2025-05-05 22:00:20 +02:00
rnhmjoj 54a6949722
nixos/tests/networking: test hostname via DHCP 2025-05-05 21:59:33 +02:00
rnhmjoj bf1cf6bffc
nixos/dhcpcd: fix hostname via DHCP 2025-05-05 21:53:45 +02:00
h7x4 beb9d5230c
coturn: add systemd support (#394670) 2025-05-05 12:53:47 +02:00
Jonathan Davies 86d94b2d88
nixos/ntpd-rs: Handle configuring timeserver FQDN as a pool 2025-05-04 14:30:12 +00:00
Henry-Hiles f2cdf605c3
nixos/livekit: Fix docs issues 2025-05-03 21:52:26 -04:00
Jeremy Fleischman 1b7b89c4ef
Demonstration of an alternate way to embed secrets into syncthing config 2025-05-03 12:43:42 -07:00
Wael Nasreddine c2dcf9be27
nixos/ncps: delete failing secretKeyPath assertion and wait for network-online.target (#396901) 2025-05-01 14:33:24 -07:00
Edward Hesketh 414b7c5a01
nixos/ncps: wait for network-online, remove failing assertion
- Start after network-online as ncps requires all upstreams to be online
  and reachable when starting
- Remove a bad assertion causing failures at eval time when using
  secrets management systems
2025-04-30 19:57:31 +01:00
Martin Weinelt 7cd06772e3
nixos/livekit: init, nixos/lk-jwt-service: init (#399627) 2025-04-29 12:44:07 +02:00
Vladimír Čunát 85f896ec76
nixos/kresd: add kresd-cli wrapper script (#388290) 2025-04-28 17:58:22 +02:00
r-vdp 58013c9fb2
nixos/mycelium: pull in network-online.target
The test was failing because it waits for network-online.target which
was not part of the transaction.
2025-04-28 10:42:15 +02:00
NullCube b2714cd757 nixos/anubis: adjust provided options 2025-04-26 15:22:26 -07:00
NullCube f826658cb4 nixos/anubis: fix user-defined defaultOptions not applying to instances 2025-04-26 15:22:26 -07:00
Jeremy Fleischman 7161a83931
services(cloudflare-dyndns): use new CLOUDFLARE_API_TOKEN_FILE setting
We recently upgraded to cloudflare-dyndns 5.3:
24f9910708,
so we can now use this new `CLOUDFLARE_API_TOKEN_FILE` feature that
landed in v5.2: 1d563d2752
2025-04-24 18:25:32 -07:00
NullCube a47513760e nixos/anubis: add nullcube as maintainer 2025-04-24 17:38:49 -07:00
Morgan Jones 36cddaaa6f
nixos/kismet: init module
Use vwifi to write a proper test for Kismet. This test demonstrates how
to simulate wireless networks in NixOS tests, and extract meaningful
data by putting an interface in monitor mode using Kismet.
2025-04-20 15:39:23 -07:00
Morgan Jones 583a74d8ad
nixos/vwifi: init module
This module does not currently have its own test suite: it is intended
to be used in test suites for other modules that use wifi.
2025-04-20 15:39:22 -07:00
Henry-Hiles d237673ba4
nixos/livekit: init 2025-04-20 12:22:51 -04:00
Nico Felbinger e0d1b49a46
chore: move meta option to top level in many modules 2025-04-19 18:27:48 +02:00
bornav 43ead788f9
Made service restart after 5s 2025-04-19 12:09:28 +02:00
Sandro Jäckel 52525af4aa
nixos/kresd: add kresd-cli wrapper script 2025-04-18 20:53:20 +02:00
Robert James Hernandez 9b70561e15 nixos/ax25/axlisten: init 2025-04-15 23:54:45 +00:00
Robert James Hernandez 4001d9db5d nixos/ax25/axports: init 2025-04-15 23:54:45 +00:00
nixpkgs-ci[bot] 049254d36c
Merge master into staging-next 2025-04-11 12:06:12 +00:00
Michael van Straten a890891acc nixos/godns: init module
Initial implementation of the GoDNS service module. This module allows users to enable and configure the GoDNS service on their NixOS system. It includes options for specifying the GoDNS package and the path to the configuration file.
2025-04-11 11:25:47 +02:00
nixpkgs-ci[bot] b66e31c26a
Merge master into staging-next 2025-04-09 16:04:15 +00:00
Adam C. Stephens f2200ca6ee
nixos/anubis: init module (#392018) 2025-04-09 09:23:35 -04:00
nixpkgs-ci[bot] 6c98e107c7
Merge master into staging-next 2025-04-09 00:15:45 +00:00
Ivan Trubach bcd6066a34
centrifugo: 5.4.9 -> 6.1.0 (#396824) 2025-04-09 00:03:46 +03:00
Vincent Breitmoser ffcc12d192 centrifugo: add release note and assertion for compatibility 2025-04-08 14:21:46 +02:00
K900 0842b11f2b Merge remote-tracking branch 'origin/master' into staging-next 2025-04-08 09:29:48 +03:00
Tristan Ross 3789fbc4fc
nixos/nebula: add CAP_NET_BIND_SERVICE when lighthouse node serves DNS (#353665) 2025-04-07 17:27:03 -07:00
K900 05bc93a58a Merge remote-tracking branch 'origin/master' into staging-next 2025-04-06 11:20:16 +03:00
Leona Maroni cfc266b7e3
nixos/bird-lg: Remove deprecation warnings (#394010) 2025-04-06 09:59:29 +02:00
fredrikr79 0e68b25955 nixos/coturn: allow unix socket
hardening previously disallowed unix socket, which is used for the
systemd notify communication.
2025-04-05 16:50:08 +02:00
fredrikr79 1a1b233998 nixos/coturn: switch systemd service type to notify 2025-04-05 16:50:08 +02:00
Cassie Cheung cadf4cfc83
nixos/anubis: init module 2025-04-05 21:48:39 +08:00
nixpkgs-ci[bot] 276f9ec976
Merge master into staging-next 2025-04-04 00:15:35 +00:00
Pol Dellaiera 03bf44b9ea
nixos/freenet: refactor, migrate to runTest (#391886) 2025-04-03 21:03:40 +02:00
nixpkgs-ci[bot] 51d40a0f08
Merge staging-next into staging 2025-04-03 12:06:39 +00:00
Daniel Nagy 0604d0aedd
nixos/freenet: refactor 2025-04-03 10:15:00 +02:00
Vojtěch Káně b25b9e656a nixos/dhcpcd: fix typo in documentation
The manpage of dhcpcd says:

>If any interface reports a working carrier then dhcpcd will try to
>obtain a lease before forking to the background, otherwise it will fork
>right away.
2025-04-03 10:10:37 +02:00
Silvan Mosberger e52d633a63 Merge remote-tracking branch 'upstream/staging-next' into staging 2025-04-02 18:30:54 +02:00
Aurimas Blažulionis d8b850d88f
syncthing: expose encryptionPassword
- Change `folder.devices` type into `oneOf [(listOf str) (attrsOf
  (submodule { ... }))]`.
- Expose `encryptionPassord` within the attrSet of the devices option.

This allows the user to set the encrpyption password use to share the
folder's data with. We do this by file path, as opposed to string
literal, because we do not want to embed the encrpyption password into
the nix store.
2025-04-01 14:20:31 -05:00
Aurimas Blažulionis 848e754b81
syncthing: handle encryptionPassword secret
Rewrite the syncthing config update script to embed secrets into the
json request. Specifically, we handle the `encryptionPassword` secret.
With this code, the user can embed path to the encrpyption password for
a given device the folder is shared with, and have it loaded in, without
touching the nix store.
2025-04-01 14:20:31 -05:00
K900 30edc74585 Merge remote-tracking branch 'origin/staging-next' into staging 2025-04-01 21:12:38 +03:00
Silvan Mosberger 374e6bcc40 treewide: Format all Nix files
Format all Nix files using the officially approved formatter,
making the CI check introduced in the previous commit succeed:

  nix-build ci -A fmt.check

This is the next step of the of the [implementation](https://github.com/NixOS/nixfmt/issues/153)
of the accepted [RFC 166](https://github.com/NixOS/rfcs/pull/166).

This commit will lead to merge conflicts for a number of PRs,
up to an estimated ~1100 (~33%) among the PRs with activity in the past 2
months, but that should be lower than what it would be without the previous
[partial treewide format](https://github.com/NixOS/nixpkgs/pull/322537).

Merge conflicts caused by this commit can now automatically be resolved while rebasing using the
[auto-rebase script](8616af08d9/maintainers/scripts/auto-rebase).

If you run into any problems regarding any of this, please reach out to the
[formatting team](https://nixos.org/community/teams/formatting/) by
pinging @NixOS/nix-formatting.
2025-04-01 20:10:43 +02:00
Tanya Arora 8125d74e21
nixos/dnsmasq: Fix failure on read-only /etc when resolveLocalQueries=false (#391738) 2025-04-01 17:59:21 +02:00
e1mo 6764561f3e
nixos/bird-lg: Remove deprecation warnings
The deprecation warning has been in place for quite some time now, so it
should be safe to get rid of it and clean the module up a bit.
2025-03-28 14:49:05 +01:00
nixpkgs-ci[bot] 3ed34914ea
Merge staging-next into staging 2025-03-28 00:15:57 +00:00
lassulus 3e7ce75dc1
jitsi-meet and prosody Added ownerallowkick patch and all_owners module (#155755) 2025-03-27 16:18:08 -07:00
Pol Dellaiera 952001e9bb
blocky: bugfix, add systemd hardening, log, adjust: startup targets (#388962) 2025-03-27 21:46:59 +01:00
Marcel Novotny 2411e6eecd Added Allowners muc module to prosody and jitsi-meet 2025-03-25 23:17:58 +01:00
Bouke van der Bijl 133974d017
nixos/tailscale-auth: restart on-failure and wait for tailscaled 2025-03-25 11:08:23 +01:00
PAEPCKE, Michael 00a39d3964
blocky: add systemd hardening, add log, readjust startup targets 2025-03-24 06:11:33 +00:00
nixpkgs-ci[bot] 080d906664
Merge staging-next into staging 2025-03-24 06:05:33 +00:00
Adam C. Stephens f0b334dde5
nixos/hickory-dns: combine Hint and Forward zone types into one (#388980) 2025-03-23 22:32:51 -04:00
nixpkgs-ci[bot] b4d0fe2499
Merge staging-next into staging 2025-03-24 00:16:41 +00:00
Sandro Jäckel 8fd6f73140
nixos/xrdp: use --replace-fail with substituteInPlace, try #2 2025-03-23 21:59:29 +01:00
K900 d9e165e9af
Revert "nixos/xrdp: use --replace-fail with substituteInPlace" 2025-03-23 21:58:08 +03:00
Pol Dellaiera 4ef28312db
Revert "nixos/syncthing: missing --fail to curl" (#392178) 2025-03-23 19:39:58 +01:00
Sandro Jäckel 3d0f2b0606
nixos/xrdp: use --replace-fail with substituteInPlace 2025-03-22 22:29:55 +01:00
Bjørn Forsman d0e369e425 Revert "nixos/syncthing: missing --fail to curl"
This reverts commit a8b8f8f8c7.

It introduced a failure in the syncthing service, where it hangs at the
curl step, repeatedly printing this:

  l3ijkvb20h5nnffg5q25i4nmcsbf7glx-merge-syncthing-config[1458]: curl: (22) The requested URL returned error: 404
  l3ijkvb20h5nnffg5q25i4nmcsbf7glx-merge-syncthing-config[1458]: curl: (22) The requested URL returned error: 404
  l3ijkvb20h5nnffg5q25i4nmcsbf7glx-merge-syncthing-config[1458]: curl: (22) The requested URL returned error: 404
  [...]

This is unfortunately not detected by `nix-build -A syncthing.tests`.

Ref https://github.com/NixOS/nixpkgs/pull/390742
2025-03-22 20:05:16 +01:00
nixpkgs-ci[bot] 3b3300fdd1
Merge staging-next into staging 2025-03-22 12:05:57 +00:00
jopejoe1 e267d07816
nixos/shairport-sync: add freeform config (#363739) 2025-03-22 09:01:54 +01:00
nixpkgs-ci[bot] 56654a8868
Merge staging-next into staging 2025-03-22 06:05:08 +00:00
Austin Horstman 469f2ca232
clatd: 1.6 -> 2.1.0 (#390764) 2025-03-21 23:46:50 -05:00
nixpkgs-ci[bot] c060400edc
Merge staging-next into staging 2025-03-22 00:15:18 +00:00
Nick Cao d2fcc2fd84
python312Packages.rtslib: 2.2.0 -> 2.2.2 (#389871) 2025-03-21 18:40:32 -04:00
Sirio Balmelli 40567b6b8d
nixos/nebula: add DNS options
Add the options:

- lighthouse.serve_dns
- lighthouse.dns.host
- lighthouse.dns.port

Improve systemd capabilities handling:

- do not give CAP_NET_ADMIN when tunnel interface is disabled
- give CAP_NET_BIND_SERVICE when DNS is enabled

Add self as maintainer: I'm using Nebula on NixOS in prod.

Signed-off-by: Sirio Balmelli <sirio@b-ad.ch>
2025-03-21 13:21:45 +01:00
nixpkgs-ci[bot] 529326e679
Merge staging-next into staging 2025-03-21 12:06:31 +00:00
Jared Baur 300efce181
nixos/clatd: allow AF_UNIX communication
This is needed since clatd will use networkctl to attempt to obtain the
PLAT prefix, and networkctl uses UNIX domain sockets to communicate with
the systemd-networkd daemon over DBus.
2025-03-21 01:12:13 -07:00
schnusch bc72dc08f2 nixos/vdirsyncer: only use ProtectHome=yes with DynamicUser=yes
If a user is given it seems likely that their home directory is accessed.
2025-03-21 01:51:20 +01:00
nixpkgs-ci[bot] 1cf5157bf0
Merge staging-next into staging 2025-03-20 18:05:48 +00:00
Kerstin aaf715153c
nixos/radicale: assertion so that users set settings.auth.type explictly (#391531) 2025-03-20 18:22:31 +01:00
Kerstin Humm c48d0033f7
nixos/radicale: assertion so that users set settings.auth.type explicitly 2025-03-20 11:15:20 +01:00
K900 85b2817da5 Merge remote-tracking branch 'origin/staging-next' into staging 2025-03-20 13:14:18 +03:00
Jeremy Fleischman 9c02a1e422
services/cloudflare-dyndns: require that apiTokenFile be an api token
Previously, this option was supposed to be a file of the form
`CLOUDFLARE_API_TOKEN=...`, which has a few problems:

- That's not an api token. It's an env file fit for passing to systemd's
  `EnvironmentFile` option. The user could typo the variable name, or
  intentionally/unintentionally include unrelated environment variables.
- It's not how secret files usually work in NixOS. Secret files are
  usually just the secret, and don't leak details about how the secret
  is passed to the service.
- This increases friction for people switching between cloudflare dyndns
  services, such as `services.cloudflare-dyndns` and
  `services.cfdyndns`, which both have a `apiToken` option, but (before
  this change) with different semantics.
2025-03-19 18:19:29 -05:00
nixpkgs-ci[bot] 3a7baab73a
Merge staging-next into staging 2025-03-19 18:05:59 +00:00
Adam C. Stephens 476618066b
nixos/firezone: init module and packages (#374647) 2025-03-19 13:50:47 -04:00
ferres 41f1eadb73 nixos/zeronsd: fix acl permissions 2025-03-19 12:16:10 +03:00
nixpkgs-ci[bot] cd31c04e18
Merge staging-next into staging 2025-03-19 00:15:59 +00:00
Dawid Ciężarkiewicz 07a3793105 nixos/syncthing: make it easier to debug incorrect IDs
In case of an incorrect ID, the behavior of this script
is quite tricky. See:

https://github.com/NixOS/nixpkgs/issues/326704#issuecomment-2730819822

for more info.
2025-03-18 19:10:10 +01:00
Dawid Ciężarkiewicz a8b8f8f8c7 nixos/syncthing: missing --fail to curl 2025-03-18 19:10:10 +01:00
nixpkgs-ci[bot] e8240407b0
Merge staging-next into staging 2025-03-18 18:05:35 +00:00
Preston Pan 437ae0fb4e
nixos/ircd-hybrid: fix bug in which fails to substitute iproute2 (#390833) 2025-03-18 17:46:55 +01:00
oddlama 6c888f4911
nixos/firezone: init modules 2025-03-17 20:21:00 +01:00
nixpkgs-ci[bot] dcc32e006f
Merge staging-next into staging 2025-03-17 18:05:40 +00:00
Sandro b96c9e3a68
gokapi: init at 1.9.6 (#372911) 2025-03-17 16:12:38 +01:00
Sandro Jäckel 2581a40544
bird: change alias to throw to avoid confusion 2025-03-17 15:02:38 +01:00
Will Fancher bbf66d50a2
Fix systemd-ssh changes (#390565) 2025-03-17 05:21:36 -04:00
Will Fancher 4dcde98327 nixos/sshd: Fix socket activated SSH connections entering failed state.
In afeb76d628, sshd.service and
sshd@.service were switched to Type=notify. This apparently works for
sshd.service, but not for sshd@.service. Given that the reason for
this working with sshd.service isn't exactly clear, let's revert it
for both of them for now, and revisit Type=notify later.
2025-03-16 23:02:22 -04:00
Darragh Elliott 46666bba62 gokapi: add module, test, release docs
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2025-03-16 14:41:28 +00:00
Philip Taron f4dd3ba6e0
systemd: make systemd-ssh-generator work (#372979) 2025-03-15 21:59:59 -07:00
Pol Dellaiera b29c5b7119
treewide: add documentation for nixos systemd units (#389283) 2025-03-15 21:30:08 +01:00
jopejoe1 c38c901915 nixos/shairport-sync: use conf file instead of arguments 2025-03-15 21:07:35 +01:00
jopejoe1 9246d8f727 nixos/shairport-sync: add freeform config 2025-03-15 21:06:13 +01:00
Marie Ramlow 0ea1aedc4d nixos/sshd: enable root ssh authorized_keys provisioning
This enables provisioning of root ssh keys with systemd credentials
(e.g. passed in via smbios strings or kernel params)
2025-03-15 20:15:44 +01:00
Pedro Alves 994c56c881 nixos/cloudflared: remove assertion for certificateFile
While it is probably a mistake in configuration to have declarative
routes configured but no certificate file, it is not always necessary to
have a working set up, so the assertion was removed.

The documentation for the certificateFile setting was reworked to
describe this.
2025-03-15 11:47:13 +00:00
Gaetan Lepage 6e79d0d383 targetcli: rename to targetcli-fb 2025-03-15 12:16:57 +01:00
Gaetan Lepage 68c06a055a python312Packages.rtslib: rename to rtslib-fb 2025-03-15 12:16:57 +01:00
jopejoe1 dca7e827b3
nixos: Replace custom cfg format handling with pkgs.formats (#314933) 2025-03-14 21:08:14 +01:00
Marie Ramlow afeb76d628 nixos/sshd: always ship a sshd@.service unit for systemd-ssh-generator(1) 2025-03-14 18:34:50 +01:00
Marie Ramlow 63842ed333 nixos/sshd: move key generation into its own systemd unit 2025-03-14 18:34:50 +01:00
Luka Blašković 4fb937aabc
nats: fix infinite recursion when validating config (#389440) 2025-03-13 04:17:06 -07:00
GiggleSquid 461be7d8c8
nixos/searx: add configuration for favicons settings
see searxng docs: https://docs.searxng.org/admin/searx.favicons.html
2025-03-13 03:58:21 +00:00
h7x4 ab0564bd10
treewide: add documentation for nixos systemd units 2025-03-12 18:00:38 +01:00
K900 0463010189 nixos/hostapd: fix hostapd_cli 2025-03-12 13:22:28 +03:00
DSeeLP 65bc040a6f nixos/hickory-dns: combine Hint and Forward zone types into one
In 0.25.0-alpha.5 the Hint and Forward zone types where combined into External
2025-03-11 14:03:01 +01:00
Gaétan Lepage ff2d12d11d
nixos/cloudflared: add option for cert.pem and use dynamic user (#383499) 2025-03-10 11:15:06 +01:00
Sandro 90c9004407
hylafaxplus: 7.0.9 -> 7.0.10, misc improvements (also module) (#376418) 2025-03-08 22:39:47 +01:00
Yt b97d92aaef
nixos/cloudflare-dyndns: fix missing home error (#386211) 2025-03-08 09:15:24 -05:00
shelvacu 1a4575f9db
nixos/modules: Add security.pki.caBundle option and make all services use it for CA bundles (#352244)
Previously some modules used `config.environment.etc."ssl/certs/ca-certificates.crt".source`, some used `"/etc/ssl/certs/ca-certificates.crt"`, and some used `"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"`. These were all bad in one way or another:

- `config.environment.etc."ssl/certs/ca-certificates.crt".source` relies on `source` being set; if `text` is set instead this breaks, introducing a weird undocumented requirement
- `"/etc/ssl/certs/ca-certificates.crt"` is probably okay but very un-nix. It's a magic string, and the path doesn't change when the file changes (and so you can't trigger service reloads, for example, when the contents change in a new system activation)
- `"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"` silently doesn't include the options from `security.pki`

Co-authored-by: Shelvacu <git@shelvacu.com>
2025-03-08 08:41:08 +00:00
misuzu f3b9f47891
nixos/umurmur: init (#387580) 2025-03-07 17:46:10 +02:00
3JlOy_PYCCKUI 095da00b2d nixos/umurmur: init 2025-03-07 12:07:53 +03:00
Philip Taron 9ab61b2537
nixos/doc: convert links to manpages (#383975) 2025-03-06 09:37:51 -08:00
7c6f434c fe36c0e045
Squid: 6.13 -> 7.0.1 (#384972) 2025-03-06 17:17:08 +00:00
Joshua Kobschätzki 019f100d17 squid: add inverse test 2025-03-06 11:36:17 +01:00
Pedro Alves 4f644e0b31 nixos/cloudflared: add option for cert.pem and use dynamic user
Make the cloudflared tunnel service use systemd credentials and dynamic
users, removing the services.cloudflared.user and .group option.

Also add an option to provide the cert.pem file, without which tunnels
defined declaratively would not work.

Additionally, add an assertion checking that the certificate file is
provided if there are declarative routes defined.
2025-03-05 13:33:04 +00:00
Jonas Heinrich 370bcffd35
nixos/networkd-dispatcher: added missing enum value "enslaved" to option "onState" (#382574) 2025-03-05 10:52:31 +01:00
Jakob Klepp 7bffbf3c4c
nixos/nats: add option validateConfig (#387048)
As discussed in the comments of https://github.com/NixOS/nixpkgs/pull/322035
and in the issue https://github.com/NixOS/nixpkgs/issues/333119
config validation fails at build time when the config
references files unavailable during build time

nixos/nats: nixfmt 'nixos/modules/services/networking/nats.nix'
2025-03-04 17:51:09 -08:00
Sandro 4f8cf45715
nixos/inadyn: fix defaultText (#384773) 2025-03-04 19:02:20 +01:00
happysalada 4fac925299 nixos/cloudflare-dyndns: fix missing home error 2025-03-01 16:03:52 -05:00
Faye Duxovni 87806c913c
nixos/syncthing: prevent enabling overrideFolders and autoAcceptFolders simultaneously (#321872)
* syncthing: prevent enabling overrideFolders and autoAcceptFolders simultaneously

* Fix href in services.syncthing.overrideFolders default text
2025-03-01 14:36:50 +01:00
Sandro 511e62f5ec
nixos/soju: add option to overwrite generated configFile (#340583) 2025-02-27 23:34:58 +01:00
Sandro 291fe081dc
netclient: add network-online dependency to get rid of warning (#371276) 2025-02-27 23:28:17 +01:00
Michele Guerini Rocco af8642b189
nixos/hostapd: add passwordFile to structured SAE entries (#365727) 2025-02-27 13:51:23 +01:00
Sandro 245441e2a2 nixos/avahi: only enable ipv6 when networking.enableIPv6 is true 2025-02-24 17:19:55 +01:00
Weijia Wang 1c4fe4d409
services.flannel: add an extraNetworkConfig configuration, add missing kernel module (#365317) 2025-02-24 15:54:44 +01:00
Sandro 9d2e28a82e
nixos/inadyn: fix defaultText 2025-02-24 14:40:05 +01:00
Yarek b30f23ae54
cato: init at 5.2.1.1 2025-02-23 11:17:22 +00:00
Peder Bergebakken Sundt d525eb5838 treewide: fix typos
done with `fd \\\.md$ . --type f -x typos --write-changes`
2025-02-22 02:02:07 +01:00
Peter Lehmann 13ff2e0395
nixos/routinator: fix service being always enabled 2025-02-21 23:48:43 +01:00
Martin Weinelt bf25eae002
nixos/routinator: init module (#380046) 2025-02-21 23:07:21 +01:00
Peter Lehmann c468f4e261
nixos/routinator: init module 2025-02-21 19:10:18 +01:00
Peder Bergebakken Sundt 527be14321 nixos/doc: convert links to manpages 2025-02-21 16:31:09 +01:00
Solomon 6cd88104d7
nixos/openssh: allow post-quantum KexAlgorithms introduced in v9.9 (#378875)
`mlkem768x25519-sha256` and the vendor-neutral `sntrup761x25519-sha512`
name are new in OpenSSH 9.9 <https://www.openssh.com/txt/release-9.9>

Co-authored-by: Mynacol <Mynacol@users.noreply.github.com>
2025-02-19 22:04:03 +01:00
a-kenji fdbcd907e9 nixos/syncthing: Fix typos 2025-02-19 15:44:05 +07:00
Christian Stoitner 224f7fc478 nixos/networkd-dispatcher: added missing enum value "enslaved" to option "onState" 2025-02-16 15:01:31 +01:00
Jared Baur 846779bc8e nixos/yggdrasil: use exec to replace bash instance 2025-02-14 11:58:45 +05:30
dish 6aa47a42fe nixos/zerotierone: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish f3acac425d nixos/wg-access-server: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish af8af80782 nixos/opengfw: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 3dd73303bb nixos/headscale: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish f53cf94cab nixos/firewall: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 70c805c634 nixos/epmd: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 5d48ee0d4b nixos/deconz: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 91980b93cf nixos/ddns-updater: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 7e6083be99 nixos/ddclient: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 85ca769c72 nixos/coturn: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish ce335f7a6c nixos/atticd: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 5fb7bc8c5f nixos/3proxy: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 961e7dd1db nixos/nghttpx: fix documentation link formatting 2025-02-12 21:03:21 +01:00
misuzu 2bf51f5ddf
nixos/nats: make config validation friendly to cross compilation (#379405) 2025-02-10 20:13:37 +02:00
Azat Bahawi 0589bd307d
nixos/{wg-quick,wireguard}: add AmneziaWG support (#341663) 2025-02-09 10:03:27 +03:00
AveryanAlex 3896639b27
nixos/wireguard-networkd: add assertion for type == "wireguard" 2025-02-08 14:28:31 +03:00
Tom Herbers 5abb11bbe7
nixos/bird: rename bird2 to bird, switch to bird3 by default
This is done in view of the Release of the new v3 of Bird.

Switch to the bird3 package for the `services.bird.package` option.

Switch the `bird` package alias to bird3.
2025-02-06 16:35:44 +01:00
Tom Herbers 7d67acbe4a
nixos/bird: add package option
This is done to allows to easier change which bird package should be used
2025-02-06 16:29:01 +01:00
Yarny0 39003ad9d7 nixos/hylafax: add package option 2025-02-06 12:11:23 +01:00
Yarny0 eb52347d8c nixos/hylafax: use toGNUCommandLine
...and `escapeShellArgs` for spool area program command lines.
The new function `mkSpoolCmd` adds the `-q` option
by default as it is needed by all such programs.
2025-02-06 12:11:06 +01:00
Yarny0 6e51b48777 nixos/hylafax: use concatLines
...instead of `concatStringsSep "\n"`
2025-02-06 12:11:06 +01:00
Yarny0 455c195fe4 nixos/hylafax: use getExe'
...for a few coreutils invocations.
2025-02-06 12:11:06 +01:00
Yarny0 8378491df3 nixos/hylafax: unify lib imports 2025-02-06 12:11:06 +01:00
Jared Baur d4549901c8
nixos/nats: make config validation friendly to cross compilation 2025-02-04 12:08:41 -08:00
Sandro b1b6a16499
nixos/tailscale-derper: drop nginx upstream to improve reliability (#377640) 2025-02-02 22:18:04 +01:00
nikstur 9015a21afc
g3proxy: init at 1.10.4 (#378059) 2025-02-01 22:45:13 +01:00
Raito Bezarius f0652b5dff nixos/services/networking/g3proxy: init
This adds a simple hardened systemd-based module for g3proxy, a generic
purpose forward proxy.

Change-Id: I8c6e5d2cc8a9faa2aea8c5df3af56756ffed542d
Signed-off-by: Raito Bezarius <masterancpp@gmail.com>
Co-authored-by: Elias Coppens <elias.coppens@ens.fr>
2025-02-01 22:34:53 +01:00
Nick Cao 45d60dfce5
nixos/sing-box: add assertions for deprecated geoip and geosite options 2025-02-01 09:23:52 -05:00
Nick Cao 3a661055bb
nixos/sing-box: unset deprecated geoip and geosite options by default 2025-02-01 09:23:36 -05:00
Michele Guerini Rocco 2e4d19a429
nixos/wireless: fix indentation of extraConfig (#377482) 2025-01-29 14:14:10 +01:00
wrvsrx fbf6812275
nixos/wireless: fix indentation of extraConfig 2025-01-29 16:15:13 +08:00
Sandro Jäckel 0405f0270c
nixos/tailscale-derper: drop nginx upstream to improve reliability
When I initially tested this, the upstream seemed a good idea and worked
as expected but it no longer does and disconnects clients every 60
seconds indicated by the following line in tailscaled on the client:

magicsock: [0xc00444a640] derp.Recv(derp-901): derp.Recv: EOF

By connecting directly things work more reliable and there are no
connection resets every 60 seconds anymore.
2025-01-29 00:25:11 +01:00
Krzysztof Nazarewski 9962b33f51 nixos/netbird: update docs & release notes 2025-01-28 12:34:55 +01:00
Krzysztof Nazarewski 49a26eda2a nixos/netbird: harden and extend options 2025-01-28 12:34:55 +01:00
Peder Bergebakken Sundt 75b2b7e946 nixos/*: undo manual linking to known manpage urls
Made with:

jq <doc/manpage-urls.json 'to_entries[] | "rg -F \"[\(.key)](\(.value))\" nixos/ -l | xe sd -F \"[\(.key)](\(.value))\" \"{manpage}`\(.key)`\""' -r  | tr \" \' | bash -x

(requires ripgrep, sd and xe)
2025-01-27 02:47:02 +01:00
Peder Bergebakken Sundt 953f72e76e nixos/*: tag manpage references 2025-01-27 02:47:01 +01:00
Michele Guerini Rocco 6f20987865
nixos/wireless: remove patch warning from allowAuxiliaryImperativeNetworks option (#374666) 2025-01-26 09:43:17 +01:00
Weijia Wang f6a5227d48
nixos/gdomap: fix eval (#376828) 2025-01-26 00:37:14 +01:00
Weijia Wang 614404df3e nixos/gdomap: fix eval 2025-01-26 00:30:30 +01:00
Christian Kögler 99c172d777
services.xray: pass the settings file with systemd loadCredential (#368763) 2025-01-25 22:29:58 +01:00
Joshua Kobschätzki bb1993232d squid: add config validation
Inspired by NGINX config validation with pkgs.writers
2025-01-25 18:49:34 +01:00
Anderson Torres bc80114502 various: remove AndersonTorres from modules maintainership 2025-01-22 21:47:09 -03:00
Kerstin f4e3779598
nixos/radicale: Allow AF_UNIX for systemd log (#373893) 2025-01-21 12:43:28 +01:00
Slava 167d6634f8 services.xray: pass the settings file with systemd loadCredential
It enables passing a sops-nix secret as a `settingsFile`
@see https://github.com/Mic92/sops-nix/issues/198.

By default sops-nix secrets are accessible by only root. We can change owner to another user, but the xray service is defined with `dynamicUser=true`, which means, there is no user in the compile time.

Systemd `loadCredential` passes the secret file to the service, which is exactly what we need here.
2025-01-20 15:52:14 +05:00
Remy D. Farley b99293177b nixos/yggdrasil-jumper: init 2025-01-19 09:45:46 +00:00
DCsunset f00f508bdb nixos/soju: add option to overwrite generated configFile 2025-01-18 03:59:10 +00:00
June Stepp c01d4db064
nixos/wireless: remove patch warning from allowAuxiliaryImperativeNetworks option
The patch was removed in #330386.
2025-01-17 16:53:44 -06:00
nixpkgs-ci[bot] df5a154f88
Merge master into staging-next 2025-01-17 18:04:22 +00:00
Motiejus Jakštys de0a499a56 nixos/headscale: remove much-loosened-up server_url check
server_url check [has been loosened upstream][1] and backported to
NixOS[2]. The new, much looser check, is not practical to be implemented
in Nix (you are welcome to give it a try; I've implemented the original
one).

Since the surface area is much smaller now (and the scenario much less
common), I think we can remove this assertion altogether.

[1]: https://github.com/juanfont/headscale/pull/2248
[2]: https://github.com/NixOS/nixpkgs/pull/358255
2025-01-17 08:03:26 +02:00
Flakebi 8f4bc44f88
nixos/radicale: Allow AF_UNIX for systemd log
radicale tries to connect to the systemd unix socket for logging. This
currently fails because it is not allowed to open sockets, then it falls
back to logging to stdout (printing a warning).

Allow radical to open unix sockets to fix this. This gives slightly
better logging experience (e.g. errors are marked red when sent through
the systemd log socket).
2025-01-15 01:09:54 +01:00
github-actions[bot] 74a6c68160
Merge master into staging-next 2025-01-12 18:04:11 +00:00
Nick Cao 57f5199439
nixos/strongswan-swanctl: link strongswan.conf to /etc 2025-01-11 11:03:29 -05:00
oddlama 19e38587b2
nixos/hostapd: run nixfmt-rfc-stylenixos/hostapd: add passwordFile option for structured sae password settings 2025-01-10 00:28:47 +01:00
oddlama 6f23ec7323
nixos/hostapd: run nixfmt-rfc-style 2025-01-10 00:28:45 +01:00
github-actions[bot] ded5a5e552
Merge master into staging-next 2025-01-09 00:14:35 +00:00
piegames 31777a589c
More string fixes (#367757) 2025-01-08 20:12:26 +01:00
github-actions[bot] 224fa5b082
Merge master into staging-next 2025-01-08 00:14:35 +00:00
Dict Xiong 165e372a15 nixos/doh-server: init 2025-01-07 23:37:47 +01:00
piegames dd7d5339f7 treewide: Fix incorrect string indentations 2025-01-07 19:49:28 +01:00
piegames 603733851b treewide: Fix incorrect string escapes 2025-01-07 19:49:28 +01:00
github-actions[bot] a0509da074
Merge master into staging-next 2025-01-07 18:04:37 +00:00
Izorkin 21bb7ea948
nixos/dhcpcd: update sandboxing options 2025-01-06 22:24:56 +03:00
K900 9e51fd8b02 Merge remote-tracking branch 'origin/master' into staging-next 2025-01-06 21:13:31 +03:00
Matthieu Coudron 55c0a30825
mptcpd: init at 0.13 (#355928) 2025-01-06 18:27:11 +01:00
Bjørn Forsman cc5645c6e0 nixos/dhcpcd: fix updating resolv.conf when using systemd-resolved
Fix the regression between NixOS 24.05 and 24.11 where using dhcpcd
(e.g. networking.useDHCP) and systemd-resolved
(services.resolved.enable) result in no "search" entry getting added to
/etc/resolv.conf, and dhcpcd logging the following error:

  $ systemctl status dhcpcd
  [...] dhcpcd[2896]: Failed to set DNS configuration: Interactive authentication required.

Fix it by adding a polkit rule that gives the required permissions to
the 'dhcpcd' user to manipulate resolved. The rule was made by using
polkit logging and allowing each action.id until the above error went
away, and /etc/resolv.conf got the correct search entry.
2025-01-06 18:07:52 +01:00
github-actions[bot] a65d8c74cd
Merge staging-next into staging 2025-01-06 06:05:48 +00:00
Pol Dellaiera 942e79dbd2
nixos/netbird: fix state directory mode (#371315) 2025-01-06 07:01:42 +01:00
Patrick 8e44bd9c66
nixos/netbird: fix state directory mode 2025-01-06 02:14:42 +01:00
William P 391398af52
add network-online dependency to netclient module to get rid of warning 2025-01-05 16:56:27 -05:00
github-actions[bot] 16abba216f
Merge staging-next into staging 2025-01-05 18:04:38 +00:00
Martin Weinelt 538b8b43e2
nixos/wstunnel: improve assertions (#368755) 2025-01-05 18:18:52 +01:00
Peder Bergebakken Sundt dbee3b0e98 Merge remote-tracking branch 'upstream/staging-next' into fix-merge-conflict-1735949935 2025-01-04 01:24:46 +01:00
Weijia Wang 3a21ca23ab
unifi-controller: patchelf unifi's sdnotify, nixos/unifi: enable sd_notify, always restart service (#361945) 2025-01-04 01:09:06 +01:00
github-actions[bot] d9159d2b18
Merge staging-next into staging 2025-01-03 00:14:58 +00:00
Wael Nasreddine 87b42d403e nixos/ncps: init service 2025-01-02 15:08:12 -08:00
github-actions[bot] 666690fdf4
Merge staging-next into staging 2025-01-01 18:05:06 +00:00
Martin Weinelt 269d596970
nixos/coturn: restore logging functionality
Due to undetermined hardening changes logging to syslog does not work
anymore, but we don't need it. We're running in a systemd unit so allow
logging to stdout instead.
2025-01-01 02:33:23 +01:00
github-actions[bot] 3588b4d239
Merge staging-next into staging 2024-12-31 18:04:49 +00:00
toinux a2c878df50
nixos/keepalived: add package option (#346462)
KeepAlived: Support pkg override without overlaying

Co-authored-by: Antoine 'Toinux' Lesieur <toinux@nixos.local>
Co-authored-by: Arne Keller <arne.keller@posteo.de>
2024-12-31 17:28:57 +01:00
github-actions[bot] d8e41027cf
Merge staging-next into staging 2024-12-31 12:05:50 +00:00
Gaétan Lepage 682b8079b6
nixos/biboumi + biboumi: fixup module + make optional libraries optional (#365342) 2024-12-31 09:35:11 +01:00
github-actions[bot] 92be6e3838
Merge staging-next into staging 2024-12-30 18:04:51 +00:00
AveryanAlex 0240773f49
nixos/wireguard: add AmneziaWG support
Co-authored-by: azahi <azat@bahawi.net>
2024-12-30 17:04:17 +03:00
AveryanAlex 1ce7180d60
nixos/wg-quick: add AmneziaWG support
Co-authored-by: azahi <azat@bahawi.net>
2024-12-30 17:04:16 +03:00
nicoo 238b407862
nixos: hardware.pulseaudio → services.pulseaudio (#369391) 2024-12-30 13:46:50 +00:00
github-actions[bot] e7344062a5
Merge staging-next into staging 2024-12-30 12:06:26 +00:00
Markus Kowalewski bea29cd04f
nixos/zenohd: add module and test (#368613) 2024-12-30 12:32:19 +01:00
Jan Tojnar ab44f61ec7 Merge branch 'staging-next' into staging
Merge conflict in `pkgs/by-name/en/envision/package.nix` between efb2d2b815fe9f7d12f4aab42c83e759db5ec716 (staging) and b9d59c4515ea7cd4595d342c9d87877b544e6dbd+de7a60960219b303cc44ad446f9e7ddaf23b9944 (staging-next).
2024-12-30 01:58:08 +01:00
Wolfgang Walther cf127c9dc3
treewide: load structured attributes in all bash builders consistently
It's hard to put the sourcing of ./.attrs.sh into all builder
consistently - mistakes will happen. Thus, load structured attrs once in
make-derivation and then source the remaining builder on top.

This should fix quite a few builders with structured attributes in
principle. Most importantly it helps substitute / substituteAll, which
are required for bootstrap on some platforms.
2024-12-29 18:36:47 +01:00
Franz Pletz 3a3b9dbba3
nixos/minidlna: refactor (#344018) 2024-12-29 16:21:13 +01:00
Arne Keller 5de8c5b941
nixos/chrony: fix memory locking issue with graphene-hardened-light (#356837) 2024-12-29 15:08:43 +01:00
github-actions[bot] 4e1d4f49f2
Merge staging-next into staging 2024-12-29 12:05:32 +00:00
misuzu 1bdf3ca3ad
nixos/wireguard-networkd: fix loading pre shared keys for peers without a custom name (#368684) 2024-12-29 11:33:22 +02:00
github-actions[bot] dcc5662394
Merge staging-next into staging 2024-12-29 00:16:35 +00:00
rnhmjoj 69b630d893
nixos/networkmanager: match upstream units Install sections
The upstream NetworkManager.service unit[1] has this Install section:

  [Install]
  WantedBy=multi-user.target
  Also=NetworkManager-dispatcher.service
  Also=NetworkManager-wait-online.service

Let's just match that in NixOS and don't try to mess with
network.target. The latter should only be used to order units at
shutdown, not when booting.

[1]: https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/blob/main/data/NetworkManager.service.in?ref_type=heads
2024-12-28 12:09:59 +01:00
alyaeanyx 16570980b6 nixos/wstunnel: improve assertions
nixos/wstunnel: run nixfmt on module file
2024-12-28 09:56:22 +01:00
Markus Kowalewski 6298d3e530
nixos/zenohd: add module and test 2024-12-28 02:09:38 +01:00
networkException c1eb3b68f8
nixos/wireguard-networkd: escape backslashes in systemd credential names
This patch fixes loading issues for pre shared keys for
peers without custom names. In this case the peer's public
key would be used in the name for the corresponding pre
shared key credential, causing a loading error.

The networking.wireguard base module already escapes some
base64 characters of the public key with escape sequences
starting with a backslash. This backslash is now replaced
with an underscore for use in the credential names.
2024-12-28 01:34:11 +01:00
networkException e7e42de5a7
nixos/wireguard-networkd: only set PresharedKey credential when given a file
This patch fixes an oversight in the initial implementation
of using systemd credentials in 6bc8dcc630
that would cause a warning to be logged about a missing credential
when presharedKeyFile wasn't set.
2024-12-27 23:14:32 +01:00
github-actions[bot] 455ed0b468
Merge staging-next into staging 2024-12-27 00:14:44 +00:00
Alex Martens 403dfb7c93 nixos/ddclient: fix missing iproute2
When obtaining the IP address from an interface iproute2 is missing:

"Unable to obtain information for 'bond-wan' -- missing ip or ifconfig command"

The prefix check to include iproute2 is incorrect for "usev4" and "usev6".

Currently the NixOS module checks for the "if" prefix.  This prefix is
not valid with "usev4" and "usev6":

"Invalid Value for keyword 'usev4' = 'if'"

"ifv4" must be used with "usev4", and "ifv6" with "usev6".

I updated the nixos module to check for the correct prefix with "usev4"
and "usev6", and include iproute2 as necessary.
2024-12-26 23:59:47 +01:00
Sebastian Sinnlos 7a485e4780 nixos/ddclient: update defaults for usev4/6
Set to future upstream [default](5b104ad116) as current defaults are broken because the
endpoints of dyndns.com only serve http. See [ddclient issue 597](https://github.com/ddclient/ddclient/issues/597)
2024-12-26 20:48:42 +01:00
github-actions[bot] b00dfff9f9
Merge staging-next into staging 2024-12-25 18:04:40 +00:00
misuzu db3422a82f
nixos/hostapd: remove CCMP from recommended ciphers (#367464) 2024-12-25 18:32:44 +02:00
oddlama 8b193d75ac
nixos/hostapd: remove CCMP-256 from recommended ciphers 2024-12-25 16:27:05 +01:00
github-actions[bot] f8f22218c9
Merge staging-next into staging 2024-12-23 00:15:27 +00:00
Stefan Frijters 31942f20f4 nixos/ntpd: fix permissions error when creating drift file
This fixes "frequency file /var/lib/ntp/ntp.drift.TEMP: Permission denied".

Creating a directory via StateDirectory makes that directory /var/lib/ntp owned by root:root.
However, when running ntpd we change to user ntp (see ntpFlags), so the process cannot
actually use that directory.

Actually creating a home directory for the user at that location solves that problem.
2024-12-22 16:20:31 -06:00
oddlama e130769df5
nixos/hostapd: remove unused imports 2024-12-22 22:10:46 +01:00
github-actions[bot] 915adfe15e
Merge staging-next into staging 2024-12-22 00:16:10 +00:00
Arne Keller 8e8d65e1ca
nixos/bind: harden systemd service (#349548) 2024-12-21 17:07:03 +01:00
Arne Keller b59477329f
nixos/mullvad-vpn: remove unneeded hacks (#341992) 2024-12-21 15:48:44 +01:00
K900 81932cf82a Merge remote-tracking branch 'origin/staging-next' into staging 2024-12-20 21:34:46 +03:00
Colin 98c23a61c3 nixos/networkmanager: add an enableDefaultPlugins option
many of these plugins are expensive to build (e.g. they embed webkitgtk
for captive portals) or don't even build for some platform
(`pkgsCross...`), so it's nice to give an easy way to disable them.
2024-12-20 16:47:53 +02:00
Jan Tojnar b1ce176cd1
Merge nixos/networkmanager: add options to supply secrets to connection profiles based on secret files (#352960) 2024-12-20 15:35:15 +01:00
github-actions[bot] f970ef5718
Merge staging-next into staging 2024-12-20 12:06:14 +00:00