Commit graph

4682 commits

Author SHA1 Message Date
K900 d9e165e9af
Revert "nixos/xrdp: use --replace-fail with substituteInPlace" 2025-03-23 21:58:08 +03:00
Pol Dellaiera 4ef28312db
Revert "nixos/syncthing: missing --fail to curl" (#392178) 2025-03-23 19:39:58 +01:00
Sandro Jäckel 3d0f2b0606
nixos/xrdp: use --replace-fail with substituteInPlace 2025-03-22 22:29:55 +01:00
Bjørn Forsman d0e369e425 Revert "nixos/syncthing: missing --fail to curl"
This reverts commit a8b8f8f8c7.

It introduced a failure in the syncthing service, where it hangs at the
curl step, repeatedly printing this:

  l3ijkvb20h5nnffg5q25i4nmcsbf7glx-merge-syncthing-config[1458]: curl: (22) The requested URL returned error: 404
  l3ijkvb20h5nnffg5q25i4nmcsbf7glx-merge-syncthing-config[1458]: curl: (22) The requested URL returned error: 404
  l3ijkvb20h5nnffg5q25i4nmcsbf7glx-merge-syncthing-config[1458]: curl: (22) The requested URL returned error: 404
  [...]

This is unfortunately not detected by `nix-build -A syncthing.tests`.

Ref https://github.com/NixOS/nixpkgs/pull/390742
2025-03-22 20:05:16 +01:00
nixpkgs-ci[bot] 3b3300fdd1
Merge staging-next into staging 2025-03-22 12:05:57 +00:00
jopejoe1 e267d07816
nixos/shairport-sync: add freeform config (#363739) 2025-03-22 09:01:54 +01:00
nixpkgs-ci[bot] 56654a8868
Merge staging-next into staging 2025-03-22 06:05:08 +00:00
Austin Horstman 469f2ca232
clatd: 1.6 -> 2.1.0 (#390764) 2025-03-21 23:46:50 -05:00
nixpkgs-ci[bot] c060400edc
Merge staging-next into staging 2025-03-22 00:15:18 +00:00
Nick Cao d2fcc2fd84
python312Packages.rtslib: 2.2.0 -> 2.2.2 (#389871) 2025-03-21 18:40:32 -04:00
Sirio Balmelli 40567b6b8d
nixos/nebula: add DNS options
Add the options:

- lighthouse.serve_dns
- lighthouse.dns.host
- lighthouse.dns.port

Improve systemd capabilities handling:

- do not give CAP_NET_ADMIN when tunnel interface is disabled
- give CAP_NET_BIND_SERVICE when DNS is enabled

Add self as maintainer: I'm using Nebula on NixOS in prod.

Signed-off-by: Sirio Balmelli <sirio@b-ad.ch>
2025-03-21 13:21:45 +01:00
nixpkgs-ci[bot] 529326e679
Merge staging-next into staging 2025-03-21 12:06:31 +00:00
Jared Baur 300efce181
nixos/clatd: allow AF_UNIX communication
This is needed since clatd will use networkctl to attempt to obtain the
PLAT prefix, and networkctl uses UNIX domain sockets to communicate with
the systemd-networkd daemon over DBus.
2025-03-21 01:12:13 -07:00
schnusch bc72dc08f2 nixos/vdirsyncer: only use ProtectHome=yes with DynamicUser=yes
If a user is given it seems likely that their home directory is accessed.
2025-03-21 01:51:20 +01:00
nixpkgs-ci[bot] 1cf5157bf0
Merge staging-next into staging 2025-03-20 18:05:48 +00:00
Kerstin aaf715153c
nixos/radicale: assertion so that users set settings.auth.type explictly (#391531) 2025-03-20 18:22:31 +01:00
Kerstin Humm c48d0033f7
nixos/radicale: assertion so that users set settings.auth.type explicitly 2025-03-20 11:15:20 +01:00
K900 85b2817da5 Merge remote-tracking branch 'origin/staging-next' into staging 2025-03-20 13:14:18 +03:00
Jeremy Fleischman 9c02a1e422
services/cloudflare-dyndns: require that apiTokenFile be an api token
Previously, this option was supposed to be a file of the form
`CLOUDFLARE_API_TOKEN=...`, which has a few problems:

- That's not an api token. It's an env file fit for passing to systemd's
  `EnvironmentFile` option. The user could typo the variable name, or
  intentionally/unintentionally include unrelated environment variables.
- It's not how secret files usually work in NixOS. Secret files are
  usually just the secret, and don't leak details about how the secret
  is passed to the service.
- This increases friction for people switching between cloudflare dyndns
  services, such as `services.cloudflare-dyndns` and
  `services.cfdyndns`, which both have a `apiToken` option, but (before
  this change) with different semantics.
2025-03-19 18:19:29 -05:00
nixpkgs-ci[bot] 3a7baab73a
Merge staging-next into staging 2025-03-19 18:05:59 +00:00
Adam C. Stephens 476618066b
nixos/firezone: init module and packages (#374647) 2025-03-19 13:50:47 -04:00
nixpkgs-ci[bot] cd31c04e18
Merge staging-next into staging 2025-03-19 00:15:59 +00:00
Dawid Ciężarkiewicz 07a3793105 nixos/syncthing: make it easier to debug incorrect IDs
In case of an incorrect ID, the behavior of this script
is quite tricky. See:

https://github.com/NixOS/nixpkgs/issues/326704#issuecomment-2730819822

for more info.
2025-03-18 19:10:10 +01:00
Dawid Ciężarkiewicz a8b8f8f8c7 nixos/syncthing: missing --fail to curl 2025-03-18 19:10:10 +01:00
nixpkgs-ci[bot] e8240407b0
Merge staging-next into staging 2025-03-18 18:05:35 +00:00
Preston Pan 437ae0fb4e
nixos/ircd-hybrid: fix bug in which fails to substitute iproute2 (#390833) 2025-03-18 17:46:55 +01:00
oddlama 6c888f4911
nixos/firezone: init modules 2025-03-17 20:21:00 +01:00
nixpkgs-ci[bot] dcc32e006f
Merge staging-next into staging 2025-03-17 18:05:40 +00:00
Sandro b96c9e3a68
gokapi: init at 1.9.6 (#372911) 2025-03-17 16:12:38 +01:00
Sandro Jäckel 2581a40544
bird: change alias to throw to avoid confusion 2025-03-17 15:02:38 +01:00
Will Fancher bbf66d50a2
Fix systemd-ssh changes (#390565) 2025-03-17 05:21:36 -04:00
Will Fancher 4dcde98327 nixos/sshd: Fix socket activated SSH connections entering failed state.
In afeb76d628, sshd.service and
sshd@.service were switched to Type=notify. This apparently works for
sshd.service, but not for sshd@.service. Given that the reason for
this working with sshd.service isn't exactly clear, let's revert it
for both of them for now, and revisit Type=notify later.
2025-03-16 23:02:22 -04:00
Darragh Elliott 46666bba62 gokapi: add module, test, release docs
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2025-03-16 14:41:28 +00:00
Philip Taron f4dd3ba6e0
systemd: make systemd-ssh-generator work (#372979) 2025-03-15 21:59:59 -07:00
Pol Dellaiera b29c5b7119
treewide: add documentation for nixos systemd units (#389283) 2025-03-15 21:30:08 +01:00
jopejoe1 c38c901915 nixos/shairport-sync: use conf file instead of arguments 2025-03-15 21:07:35 +01:00
jopejoe1 9246d8f727 nixos/shairport-sync: add freeform config 2025-03-15 21:06:13 +01:00
Marie Ramlow 0ea1aedc4d nixos/sshd: enable root ssh authorized_keys provisioning
This enables provisioning of root ssh keys with systemd credentials
(e.g. passed in via smbios strings or kernel params)
2025-03-15 20:15:44 +01:00
Pedro Alves 994c56c881 nixos/cloudflared: remove assertion for certificateFile
While it is probably a mistake in configuration to have declarative
routes configured but no certificate file, it is not always necessary to
have a working set up, so the assertion was removed.

The documentation for the certificateFile setting was reworked to
describe this.
2025-03-15 11:47:13 +00:00
Gaetan Lepage 6e79d0d383 targetcli: rename to targetcli-fb 2025-03-15 12:16:57 +01:00
Gaetan Lepage 68c06a055a python312Packages.rtslib: rename to rtslib-fb 2025-03-15 12:16:57 +01:00
jopejoe1 dca7e827b3
nixos: Replace custom cfg format handling with pkgs.formats (#314933) 2025-03-14 21:08:14 +01:00
Marie Ramlow afeb76d628 nixos/sshd: always ship a sshd@.service unit for systemd-ssh-generator(1) 2025-03-14 18:34:50 +01:00
Marie Ramlow 63842ed333 nixos/sshd: move key generation into its own systemd unit 2025-03-14 18:34:50 +01:00
Luka Blašković 4fb937aabc
nats: fix infinite recursion when validating config (#389440) 2025-03-13 04:17:06 -07:00
GiggleSquid 461be7d8c8
nixos/searx: add configuration for favicons settings
see searxng docs: https://docs.searxng.org/admin/searx.favicons.html
2025-03-13 03:58:21 +00:00
h7x4 ab0564bd10
treewide: add documentation for nixos systemd units 2025-03-12 18:00:38 +01:00
K900 0463010189 nixos/hostapd: fix hostapd_cli 2025-03-12 13:22:28 +03:00
DSeeLP 65bc040a6f nixos/hickory-dns: combine Hint and Forward zone types into one
In 0.25.0-alpha.5 the Hint and Forward zone types where combined into External
2025-03-11 14:03:01 +01:00
Gaétan Lepage ff2d12d11d
nixos/cloudflared: add option for cert.pem and use dynamic user (#383499) 2025-03-10 11:15:06 +01:00
Sandro 90c9004407
hylafaxplus: 7.0.9 -> 7.0.10, misc improvements (also module) (#376418) 2025-03-08 22:39:47 +01:00
Yt b97d92aaef
nixos/cloudflare-dyndns: fix missing home error (#386211) 2025-03-08 09:15:24 -05:00
shelvacu 1a4575f9db
nixos/modules: Add security.pki.caBundle option and make all services use it for CA bundles (#352244)
Previously some modules used `config.environment.etc."ssl/certs/ca-certificates.crt".source`, some used `"/etc/ssl/certs/ca-certificates.crt"`, and some used `"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"`. These were all bad in one way or another:

- `config.environment.etc."ssl/certs/ca-certificates.crt".source` relies on `source` being set; if `text` is set instead this breaks, introducing a weird undocumented requirement
- `"/etc/ssl/certs/ca-certificates.crt"` is probably okay but very un-nix. It's a magic string, and the path doesn't change when the file changes (and so you can't trigger service reloads, for example, when the contents change in a new system activation)
- `"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"` silently doesn't include the options from `security.pki`

Co-authored-by: Shelvacu <git@shelvacu.com>
2025-03-08 08:41:08 +00:00
misuzu f3b9f47891
nixos/umurmur: init (#387580) 2025-03-07 17:46:10 +02:00
3JlOy_PYCCKUI 095da00b2d nixos/umurmur: init 2025-03-07 12:07:53 +03:00
Philip Taron 9ab61b2537
nixos/doc: convert links to manpages (#383975) 2025-03-06 09:37:51 -08:00
7c6f434c fe36c0e045
Squid: 6.13 -> 7.0.1 (#384972) 2025-03-06 17:17:08 +00:00
Joshua Kobschätzki 019f100d17 squid: add inverse test 2025-03-06 11:36:17 +01:00
Pedro Alves 4f644e0b31 nixos/cloudflared: add option for cert.pem and use dynamic user
Make the cloudflared tunnel service use systemd credentials and dynamic
users, removing the services.cloudflared.user and .group option.

Also add an option to provide the cert.pem file, without which tunnels
defined declaratively would not work.

Additionally, add an assertion checking that the certificate file is
provided if there are declarative routes defined.
2025-03-05 13:33:04 +00:00
Jonas Heinrich 370bcffd35
nixos/networkd-dispatcher: added missing enum value "enslaved" to option "onState" (#382574) 2025-03-05 10:52:31 +01:00
Jakob Klepp 7bffbf3c4c
nixos/nats: add option validateConfig (#387048)
As discussed in the comments of https://github.com/NixOS/nixpkgs/pull/322035
and in the issue https://github.com/NixOS/nixpkgs/issues/333119
config validation fails at build time when the config
references files unavailable during build time

nixos/nats: nixfmt 'nixos/modules/services/networking/nats.nix'
2025-03-04 17:51:09 -08:00
Sandro 4f8cf45715
nixos/inadyn: fix defaultText (#384773) 2025-03-04 19:02:20 +01:00
happysalada 4fac925299 nixos/cloudflare-dyndns: fix missing home error 2025-03-01 16:03:52 -05:00
Faye Duxovni 87806c913c
nixos/syncthing: prevent enabling overrideFolders and autoAcceptFolders simultaneously (#321872)
* syncthing: prevent enabling overrideFolders and autoAcceptFolders simultaneously

* Fix href in services.syncthing.overrideFolders default text
2025-03-01 14:36:50 +01:00
Sandro 511e62f5ec
nixos/soju: add option to overwrite generated configFile (#340583) 2025-02-27 23:34:58 +01:00
Sandro 291fe081dc
netclient: add network-online dependency to get rid of warning (#371276) 2025-02-27 23:28:17 +01:00
Michele Guerini Rocco af8642b189
nixos/hostapd: add passwordFile to structured SAE entries (#365727) 2025-02-27 13:51:23 +01:00
Sandro 245441e2a2 nixos/avahi: only enable ipv6 when networking.enableIPv6 is true 2025-02-24 17:19:55 +01:00
Weijia Wang 1c4fe4d409
services.flannel: add an extraNetworkConfig configuration, add missing kernel module (#365317) 2025-02-24 15:54:44 +01:00
Sandro 9d2e28a82e
nixos/inadyn: fix defaultText 2025-02-24 14:40:05 +01:00
Yarek b30f23ae54
cato: init at 5.2.1.1 2025-02-23 11:17:22 +00:00
Peder Bergebakken Sundt d525eb5838 treewide: fix typos
done with `fd \\\.md$ . --type f -x typos --write-changes`
2025-02-22 02:02:07 +01:00
Peter Lehmann 13ff2e0395
nixos/routinator: fix service being always enabled 2025-02-21 23:48:43 +01:00
Martin Weinelt bf25eae002
nixos/routinator: init module (#380046) 2025-02-21 23:07:21 +01:00
Peter Lehmann c468f4e261
nixos/routinator: init module 2025-02-21 19:10:18 +01:00
Peder Bergebakken Sundt 527be14321 nixos/doc: convert links to manpages 2025-02-21 16:31:09 +01:00
Solomon 6cd88104d7
nixos/openssh: allow post-quantum KexAlgorithms introduced in v9.9 (#378875)
`mlkem768x25519-sha256` and the vendor-neutral `sntrup761x25519-sha512`
name are new in OpenSSH 9.9 <https://www.openssh.com/txt/release-9.9>

Co-authored-by: Mynacol <Mynacol@users.noreply.github.com>
2025-02-19 22:04:03 +01:00
a-kenji fdbcd907e9 nixos/syncthing: Fix typos 2025-02-19 15:44:05 +07:00
Christian Stoitner 224f7fc478 nixos/networkd-dispatcher: added missing enum value "enslaved" to option "onState" 2025-02-16 15:01:31 +01:00
Jared Baur 846779bc8e nixos/yggdrasil: use exec to replace bash instance 2025-02-14 11:58:45 +05:30
dish 6aa47a42fe nixos/zerotierone: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish f3acac425d nixos/wg-access-server: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish af8af80782 nixos/opengfw: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 3dd73303bb nixos/headscale: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish f53cf94cab nixos/firewall: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 70c805c634 nixos/epmd: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 5d48ee0d4b nixos/deconz: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 91980b93cf nixos/ddns-updater: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 7e6083be99 nixos/ddclient: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 85ca769c72 nixos/coturn: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish ce335f7a6c nixos/atticd: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 5fb7bc8c5f nixos/3proxy: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 961e7dd1db nixos/nghttpx: fix documentation link formatting 2025-02-12 21:03:21 +01:00
misuzu 2bf51f5ddf
nixos/nats: make config validation friendly to cross compilation (#379405) 2025-02-10 20:13:37 +02:00
Azat Bahawi 0589bd307d
nixos/{wg-quick,wireguard}: add AmneziaWG support (#341663) 2025-02-09 10:03:27 +03:00
AveryanAlex 3896639b27
nixos/wireguard-networkd: add assertion for type == "wireguard" 2025-02-08 14:28:31 +03:00
Tom Herbers 5abb11bbe7
nixos/bird: rename bird2 to bird, switch to bird3 by default
This is done in view of the Release of the new v3 of Bird.

Switch to the bird3 package for the `services.bird.package` option.

Switch the `bird` package alias to bird3.
2025-02-06 16:35:44 +01:00
Tom Herbers 7d67acbe4a
nixos/bird: add package option
This is done to allows to easier change which bird package should be used
2025-02-06 16:29:01 +01:00
Yarny0 39003ad9d7 nixos/hylafax: add package option 2025-02-06 12:11:23 +01:00
Yarny0 eb52347d8c nixos/hylafax: use toGNUCommandLine
...and `escapeShellArgs` for spool area program command lines.
The new function `mkSpoolCmd` adds the `-q` option
by default as it is needed by all such programs.
2025-02-06 12:11:06 +01:00
Yarny0 6e51b48777 nixos/hylafax: use concatLines
...instead of `concatStringsSep "\n"`
2025-02-06 12:11:06 +01:00
Yarny0 455c195fe4 nixos/hylafax: use getExe'
...for a few coreutils invocations.
2025-02-06 12:11:06 +01:00
Yarny0 8378491df3 nixos/hylafax: unify lib imports 2025-02-06 12:11:06 +01:00
Jared Baur d4549901c8
nixos/nats: make config validation friendly to cross compilation 2025-02-04 12:08:41 -08:00
Sandro b1b6a16499
nixos/tailscale-derper: drop nginx upstream to improve reliability (#377640) 2025-02-02 22:18:04 +01:00
nikstur 9015a21afc
g3proxy: init at 1.10.4 (#378059) 2025-02-01 22:45:13 +01:00
Raito Bezarius f0652b5dff nixos/services/networking/g3proxy: init
This adds a simple hardened systemd-based module for g3proxy, a generic
purpose forward proxy.

Change-Id: I8c6e5d2cc8a9faa2aea8c5df3af56756ffed542d
Signed-off-by: Raito Bezarius <masterancpp@gmail.com>
Co-authored-by: Elias Coppens <elias.coppens@ens.fr>
2025-02-01 22:34:53 +01:00
Nick Cao 45d60dfce5
nixos/sing-box: add assertions for deprecated geoip and geosite options 2025-02-01 09:23:52 -05:00
Nick Cao 3a661055bb
nixos/sing-box: unset deprecated geoip and geosite options by default 2025-02-01 09:23:36 -05:00
Michele Guerini Rocco 2e4d19a429
nixos/wireless: fix indentation of extraConfig (#377482) 2025-01-29 14:14:10 +01:00
wrvsrx fbf6812275
nixos/wireless: fix indentation of extraConfig 2025-01-29 16:15:13 +08:00
Sandro Jäckel 0405f0270c
nixos/tailscale-derper: drop nginx upstream to improve reliability
When I initially tested this, the upstream seemed a good idea and worked
as expected but it no longer does and disconnects clients every 60
seconds indicated by the following line in tailscaled on the client:

magicsock: [0xc00444a640] derp.Recv(derp-901): derp.Recv: EOF

By connecting directly things work more reliable and there are no
connection resets every 60 seconds anymore.
2025-01-29 00:25:11 +01:00
Krzysztof Nazarewski 9962b33f51 nixos/netbird: update docs & release notes 2025-01-28 12:34:55 +01:00
Krzysztof Nazarewski 49a26eda2a nixos/netbird: harden and extend options 2025-01-28 12:34:55 +01:00
Peder Bergebakken Sundt 75b2b7e946 nixos/*: undo manual linking to known manpage urls
Made with:

jq <doc/manpage-urls.json 'to_entries[] | "rg -F \"[\(.key)](\(.value))\" nixos/ -l | xe sd -F \"[\(.key)](\(.value))\" \"{manpage}`\(.key)`\""' -r  | tr \" \' | bash -x

(requires ripgrep, sd and xe)
2025-01-27 02:47:02 +01:00
Peder Bergebakken Sundt 953f72e76e nixos/*: tag manpage references 2025-01-27 02:47:01 +01:00
Michele Guerini Rocco 6f20987865
nixos/wireless: remove patch warning from allowAuxiliaryImperativeNetworks option (#374666) 2025-01-26 09:43:17 +01:00
Weijia Wang f6a5227d48
nixos/gdomap: fix eval (#376828) 2025-01-26 00:37:14 +01:00
Weijia Wang 614404df3e nixos/gdomap: fix eval 2025-01-26 00:30:30 +01:00
Christian Kögler 99c172d777
services.xray: pass the settings file with systemd loadCredential (#368763) 2025-01-25 22:29:58 +01:00
Joshua Kobschätzki bb1993232d squid: add config validation
Inspired by NGINX config validation with pkgs.writers
2025-01-25 18:49:34 +01:00
Anderson Torres bc80114502 various: remove AndersonTorres from modules maintainership 2025-01-22 21:47:09 -03:00
Kerstin f4e3779598
nixos/radicale: Allow AF_UNIX for systemd log (#373893) 2025-01-21 12:43:28 +01:00
Slava 167d6634f8 services.xray: pass the settings file with systemd loadCredential
It enables passing a sops-nix secret as a `settingsFile`
@see https://github.com/Mic92/sops-nix/issues/198.

By default sops-nix secrets are accessible by only root. We can change owner to another user, but the xray service is defined with `dynamicUser=true`, which means, there is no user in the compile time.

Systemd `loadCredential` passes the secret file to the service, which is exactly what we need here.
2025-01-20 15:52:14 +05:00
Remy D. Farley b99293177b nixos/yggdrasil-jumper: init 2025-01-19 09:45:46 +00:00
DCsunset f00f508bdb nixos/soju: add option to overwrite generated configFile 2025-01-18 03:59:10 +00:00
June Stepp c01d4db064
nixos/wireless: remove patch warning from allowAuxiliaryImperativeNetworks option
The patch was removed in #330386.
2025-01-17 16:53:44 -06:00
nixpkgs-ci[bot] df5a154f88
Merge master into staging-next 2025-01-17 18:04:22 +00:00
Motiejus Jakštys de0a499a56 nixos/headscale: remove much-loosened-up server_url check
server_url check [has been loosened upstream][1] and backported to
NixOS[2]. The new, much looser check, is not practical to be implemented
in Nix (you are welcome to give it a try; I've implemented the original
one).

Since the surface area is much smaller now (and the scenario much less
common), I think we can remove this assertion altogether.

[1]: https://github.com/juanfont/headscale/pull/2248
[2]: https://github.com/NixOS/nixpkgs/pull/358255
2025-01-17 08:03:26 +02:00
Flakebi 8f4bc44f88
nixos/radicale: Allow AF_UNIX for systemd log
radicale tries to connect to the systemd unix socket for logging. This
currently fails because it is not allowed to open sockets, then it falls
back to logging to stdout (printing a warning).

Allow radical to open unix sockets to fix this. This gives slightly
better logging experience (e.g. errors are marked red when sent through
the systemd log socket).
2025-01-15 01:09:54 +01:00
github-actions[bot] 74a6c68160
Merge master into staging-next 2025-01-12 18:04:11 +00:00
Nick Cao 57f5199439
nixos/strongswan-swanctl: link strongswan.conf to /etc 2025-01-11 11:03:29 -05:00
oddlama 19e38587b2
nixos/hostapd: run nixfmt-rfc-stylenixos/hostapd: add passwordFile option for structured sae password settings 2025-01-10 00:28:47 +01:00
oddlama 6f23ec7323
nixos/hostapd: run nixfmt-rfc-style 2025-01-10 00:28:45 +01:00
github-actions[bot] ded5a5e552
Merge master into staging-next 2025-01-09 00:14:35 +00:00
piegames 31777a589c
More string fixes (#367757) 2025-01-08 20:12:26 +01:00
github-actions[bot] 224fa5b082
Merge master into staging-next 2025-01-08 00:14:35 +00:00
Dict Xiong 165e372a15 nixos/doh-server: init 2025-01-07 23:37:47 +01:00
piegames dd7d5339f7 treewide: Fix incorrect string indentations 2025-01-07 19:49:28 +01:00
piegames 603733851b treewide: Fix incorrect string escapes 2025-01-07 19:49:28 +01:00
github-actions[bot] a0509da074
Merge master into staging-next 2025-01-07 18:04:37 +00:00
Izorkin 21bb7ea948
nixos/dhcpcd: update sandboxing options 2025-01-06 22:24:56 +03:00
K900 9e51fd8b02 Merge remote-tracking branch 'origin/master' into staging-next 2025-01-06 21:13:31 +03:00
Matthieu Coudron 55c0a30825
mptcpd: init at 0.13 (#355928) 2025-01-06 18:27:11 +01:00
Bjørn Forsman cc5645c6e0 nixos/dhcpcd: fix updating resolv.conf when using systemd-resolved
Fix the regression between NixOS 24.05 and 24.11 where using dhcpcd
(e.g. networking.useDHCP) and systemd-resolved
(services.resolved.enable) result in no "search" entry getting added to
/etc/resolv.conf, and dhcpcd logging the following error:

  $ systemctl status dhcpcd
  [...] dhcpcd[2896]: Failed to set DNS configuration: Interactive authentication required.

Fix it by adding a polkit rule that gives the required permissions to
the 'dhcpcd' user to manipulate resolved. The rule was made by using
polkit logging and allowing each action.id until the above error went
away, and /etc/resolv.conf got the correct search entry.
2025-01-06 18:07:52 +01:00
github-actions[bot] a65d8c74cd
Merge staging-next into staging 2025-01-06 06:05:48 +00:00
Pol Dellaiera 942e79dbd2
nixos/netbird: fix state directory mode (#371315) 2025-01-06 07:01:42 +01:00
Patrick 8e44bd9c66
nixos/netbird: fix state directory mode 2025-01-06 02:14:42 +01:00
William P 391398af52
add network-online dependency to netclient module to get rid of warning 2025-01-05 16:56:27 -05:00
github-actions[bot] 16abba216f
Merge staging-next into staging 2025-01-05 18:04:38 +00:00