misuzu
d5bb5259e4
nixos/netbird: allow configuring dns
2023-04-20 14:22:19 +03:00
Ryan Lahfa
2fa5e844de
Merge pull request #223749 from Alexis211/add-wgautomesh
...
wgautomesh: init at 0.1.0
2023-04-19 08:26:09 +02:00
Sandro
ce4159b4cd
Merge pull request #226514 from AtaraxiaSjel/update/ivpn
2023-04-19 00:57:19 +02:00
Dmitriy Kholkin
706060e47d
nixos/ivpn: init
2023-04-18 22:11:10 +03:00
Artturin
eac28f38d6
treewide: fix lints
...
Arg to lib.optional is a list
build time tool in buildInputs
*Flags not a list
https://github.com/nix-community/nixpkgs-lint
2023-04-18 20:20:56 +03:00
Alex Auvolat
a727a3d676
nixos/wgautomesh: init at 0.1.0
2023-04-17 12:37:18 +02:00
Sandro
d85555f9ac
Merge pull request #224996 from SuperSandro2000/smokeping-ln-f
2023-04-16 23:05:25 +02:00
Janne Heß
ee0bfeddf7
Merge pull request #226010 from helsinki-systems/drop/deprecated-ssh-files
...
nixos/openssh: Drop deprecated locations
2023-04-15 11:41:16 +02:00
Eric Lesiuta
acfed64224
nixos/picosnitch: init
2023-04-14 22:09:48 -04:00
Aidan Gauland
0135b7a556
nixos/peroxide: correct option doc
...
Correct the description for the option services.peroxide.enable.
2023-04-14 14:47:55 +02:00
Janne Heß
98c3d190b2
nixos/openssh: Drop deprecated locations
...
The changelog entry should give a good indication why I don't think this
is necessary anymore.
2023-04-13 20:31:18 +02:00
Martin Weinelt
130be87c8d
Merge pull request #224549 from mweinelt/go-neb-unit-permissions
...
nixos/go-neb: Replace PermissionsStartOnly with executable prefix
2023-04-12 22:59:41 +02:00
Sandro Jäckel
fdbd0834b2
nixos/smokeping: use ln with -f
2023-04-12 22:47:21 +02:00
Martin Weinelt
7a5a2fa8a4
Merge pull request #225785 from helsinki-systems/warn-dhcpd-eol
...
nixos/dhcpd: warn of pending removal
2023-04-12 00:08:42 +02:00
ajs124
e3702c0788
nixos/dhcpd: warn of pending removal
2023-04-11 23:47:40 +02:00
Sandro
fd04c0caf0
Merge pull request #221380 from Majiir/ddclient-fix-permissions
2023-04-11 01:31:53 +02:00
Felix Buehler
327b0cff7a
treewide: use more lib.optionalString
2023-04-07 13:38:33 +02:00
mrobbetts
3c1c5600e8
bind: replace hard-coded allow-query zone setting with a real zone parameter. ( #224776 )
2023-04-07 06:55:09 +02:00
alyaeanyx
bd573376ad
nixos/wstunnel: init
2023-04-06 09:51:30 +02:00
Florian Klink
aa158ed243
Merge pull request #219496 from f2k1de/smokeping-css-js-fix
...
smokeping: fix css and js symlink
2023-04-05 21:56:33 +02:00
Florian Klink
ea7dd83b0d
Merge pull request #224833 from flokli/smokeping-config
...
nixos/smokeping: use /etc/smokeping.conf
2023-04-05 21:54:57 +02:00
Florian Klink
9de75c8bbe
nixos/smokeping: use /etc/smokeping.conf
...
This allows other services to refer to the generated smokeping config,
which is e.g. necessary to run smokeping with nginx as frontend, rather
than thttpd.
2023-04-05 16:51:26 +02:00
Yureka
53c20eae38
Revert "bind: remove hard-coded allow-query config setting"
2023-04-04 23:35:11 +02:00
Martin Weinelt
34464d6044
nixos/go-neb: Replace PermissionsStartOnly with executable prefix
...
This should work as a drop-in replacement and satisfy #53852 .
2023-04-04 01:01:49 +02:00
Kerstin Humm
0b0cc93e79
remove myself (erictapen) from packages which I don't use anymore
2023-04-03 17:07:16 +02:00
Sandro
ef6206c3ee
Merge pull request #224170 from mvnetbiz/ddclient
2023-04-02 01:29:59 +02:00
Izorkin
3ab26f9f00
nixos/dhcpcd: add IPv6rs option
2023-04-01 13:52:38 +03:00
Matt Votava
ee88bac7be
nixos/ddclient: add iproute2 to unit path if using "if" method
2023-03-31 21:54:21 -07:00
Peter Simons
7942e2e38f
Merge pull request #221108 from mrobbetts/bind_remove_allow_query
...
bind: remove hard-coded `allow-query` config setting
2023-03-29 07:50:47 +02:00
Christoph Heiss
c9c9abc608
openssh: fix 'undefined variable' error
...
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-03-22 22:38:14 +01:00
Ryan Lahfa
5b88469c21
Merge pull request #217366 from puppe/fix-yggdrasil
...
nixos/yggdrasil: fix configFile option
2023-03-22 20:18:25 +01:00
K900
d0f7d224da
nixos/firewall-nftables: avoid using wildcards
...
Those were added in kernel 5.13, which is newer than our oldest supported.
2023-03-22 17:45:05 +03:00
K900
5bf9765c0a
Merge pull request #217482 from motiejus/headscale_oidc_client_secret
...
headscale: natively support oidc.client_secret_path
2023-03-22 14:30:03 +03:00
Aidan Gauland
7fb4aae81f
nixos/peroxide: add module for peroxide service
2023-03-18 07:43:59 +13:00
Sandro
7ec767ff54
Merge pull request #173697 from jmbaur/avahi-daemon-deny-interfaces
...
nixos/avahi: add denyInterfaces option
2023-03-17 17:11:49 +01:00
Weijia Wang
32f39395a7
Merge pull request #210101 from helsinki-systems/upd/jitsi
...
Update of all Jitsi Meet components
2023-03-17 12:23:14 +02:00
Bernardo Meurer
6e55733359
Merge pull request #219747 from Stunkymonkey/deprecate-isNull
2023-03-16 11:10:22 -03:00
Majiir Paktu
1021a7d928
nixos/ddclient: fix permissions warning
2023-03-15 17:47:08 -04:00
Matthew Robbetts
f5b754881d
bind: remove hard-coded allow-query config file entry, so it can be customized via extraConfig
2023-03-13 20:47:02 -07:00
Lassulus
47233b27c9
Merge pull request #167319 from schnusch/cgit
2023-03-13 09:51:08 +07:00
Ben Wolsieffer
b92dae961c
nixos/chrony: allow @chown syscall set
...
The module was allowing specific chown syscalls, which is brittle because
there are several and different ones are used by glibc on different
architectures. For example, fchownat was already added to the allowlist for
aarch64, while on armv6l chrony crashes because chown32 is not in the
allowlist.
systemd provides the @chown syscall set, which includes all the chown
syscalls and avoids this brittleness. I believe the syscalls would all be
equivalent from an attacker's perspective, so there is unlikely to be any
security impact.
2023-03-12 18:10:56 -05:00
Jonas Heinrich
9f10a2e82a
Merge pull request #218633 from onny/networkd-dispatcher-rules
...
nixos/networkd-dispatcher: add rules option
2023-03-08 20:41:06 +01:00
K900
23b0152ffb
Merge pull request #218530 from K900/murmur-dbus
...
nixos/murmur: expose dbus
2023-03-08 18:35:56 +03:00
K900
d8d8b55e7d
nixos/murmur: expose dbus
2023-03-08 18:03:51 +03:00
Motiejus Jakštys
2b168ba3f0
headscale: rename oidc.client_secret_file to oidc.client_secret_path
...
Headscale now supports passing the OIDC client secret via a file, as
added in [juanfont/headscale#1127 ][1127]. Lets use that.
The headscale option is `client_secret_path`; let's make it consistent
and rename the Nix option to this. Note that I wasn't able to do this:
mkRenamedOptionModule [ ... "client_secret_file" ] [ ... "client_secret_path" ]
I get such error:
error: evaluation aborted with the following error message: 'cannot find attribute `services.headscale.settings.oidc.client_secret_file''
[1127]: https://github.com/juanfont/headscale/pull/1127
2023-03-08 11:26:45 +02:00
Jonas Heinrich
26e14e57af
nixos/networkd-dispatcher: add rules option
2023-03-08 10:20:47 +01:00
Felix Buehler
d10e69c86b
treewide: deprecate isNull
...
https://nixos.org/manual/nix/stable/language/builtins.html#builtins-isNull
2023-03-06 22:40:04 +01:00
SEIAROTg
5a4dc2128e
nixos/wireguard: fix mtu after switching netns.
...
mtu is set after switching netns and thus the new netns should be used.
2023-03-04 18:51:12 +00:00
Isa
8225d6db3a
smokeping: fix css and js symlink
2023-03-04 14:39:43 +01:00
K900
18f85de76d
nixos/firewall: assert that the kernel supports conntrack helper auto-loading
2023-03-04 10:53:47 +03:00
Arian van Putten
17ca3dd2a6
Merge pull request #217852 from justinas/teleport-12
...
teleport: 11.3.4 -> 12.0.2, reintroduce teleport_11
2023-03-02 11:18:24 +01:00
Yureka
55da71c10e
nixos/nftables: add checkRuleset option ( #216531 )
...
* nixos/nftables: add checkRuleset option
* lkl: 2022-05-18 -> 2023-01-27
2023-03-02 10:28:01 +01:00
Justinas Stankevicius
31b5597cbd
nixos/teleport: add "package" option
2023-02-28 13:22:50 +02:00
Jared Baur
ea0dc2c5eb
nixos/avahi: add denyInterfaces option
2023-02-27 15:41:53 -08:00
Daniel Olsen
ea31ef91af
nixos/headscale: update oidc options
2023-02-27 15:17:16 +01:00
Robert Schütz
9e1d4dff3e
nixos/openvpn: use writeShellScript
...
Previously the upScript would fail with
Syntax error: "(" unexpected (expecting "done")
on line 7 if /bin/sh is not bash.
2023-02-26 10:12:28 -08:00
Naïm Favier
129b6f7812
Merge pull request #216504 from ncfavier/unbound-state-dir-writable
...
nixos/unbound: make stateDir writable
2023-02-23 14:23:53 +01:00
Robert Schütz
89c8ef30a6
nixos/imaginary: bind to localhost by default
2023-02-22 17:37:36 -08:00
Sandro
5b7d323435
Merge pull request #216909 from emilytrau/tailscale-tweaks
2023-02-21 23:21:09 +01:00
Martin Puppe
8bc615d0e0
nixos/yggdrasil: correct documentation
...
The option `LinkLocalTCPPort` does not exist anymore in recent versions
of Yggdrasil. The port for incoming link-local connections is now
configured as part of the `MulticastInterfaces` option. Our
documentation should reflect that.
2023-02-20 23:10:54 +01:00
Martin Puppe
cf8b1fb85e
nixos/yggdrasil: support HJSON files as configFile
...
Yggdrasil uses HJSON as its configuration file format. The NixOS module
meanwhile only supports pure JSON. This commit adds support for HJSON
files.
2023-02-20 23:10:54 +01:00
Martin Puppe
78ac812356
nixos/yggdrasil: fix configFile option
...
As far as I can tell the configFile option cannot have worked as
intended. The Yggdrasil systemd service uses a dynamic user. As it was,
there was no way to set the correct permissions on a config file
beforehand which would allow the dynamic user to read the config file
without making it readable for all users. But since the config file can
contain a private key it *must not* be world-readable.
The file must only be readable by root. The file has to be copied and
the permissions have to be fixed during service startup. This can either
be done in a ExecStartPre directive with the '+' prefix (which executes
that command with elevated privileges), or it can be done more
declarative with the LoadCredential directive. I have chosen the latter
approach because it delegates more work to systemd itself. It should be
noted that this has the minor tradeoff that the config file must not be
larger than 1 MB. This is a limit which systemd imposes on credential
files. But I think 1 MB ought to be enough for anybody ;).
2023-02-20 23:04:24 +01:00
Martin Puppe
9b2e2e8006
nixos/yggdrasil: nixpkgs-fmt
2023-02-20 22:02:59 +01:00
Jonas Heinrich
553c376a49
nixos/networkd-dispatcher: init
2023-02-19 04:42:25 -05:00
Nick Cao
a1291d0d02
Merge pull request #205784 from Eliot00/v2raya-fix
...
v2raya: v2rayA should start after nftables
2023-02-19 15:08:29 +08:00
Emily Trau
949b1df785
nixos/tailscale: fix config priority conflict
2023-02-18 13:28:04 +11:00
pennae
047bd73c5e
nixos/wireguard: make publicKeys singleLineStrs
...
using readFile instead of fileContents (or using indented strings) can
leave a trailing newline that causes build errors in systemd units and
has previously caused runtime errors in wireguard scripts. use
singleLineStr to strip a trailing newline if it exists, and to fail if
more than one is present.
2023-02-16 11:56:12 +01:00
Naïm Favier
5cf311c036
nixos/unbound: make stateDir writable
2023-02-15 18:14:58 +01:00
Robert Schütz
7b60fce843
Merge pull request #215222 from dotlambda/nixos-imaginary-init
...
nixos/imaginary: init
2023-02-12 08:42:19 -08:00
Andreas Stührk
8dade1f713
nixos/envoy: add option requireValidConfig to make config validation errors non-fatal
...
Co-authored-by: Vincent Haupert <vincent@yaxi.tech>
2023-02-11 18:21:21 +01:00
Vincent Haupert
84220a7098
nixos/envoy: add package option
2023-02-11 18:21:21 +01:00
Vincent Haupert
3c3da8768b
nixos/envoy: further service hardening
2023-02-11 18:21:21 +01:00
Vincent Haupert
8fff553f7e
nixos/envoy: sort serviceConfig entries
2023-02-11 18:21:21 +01:00
Vincent Haupert
989a1a6ef5
nixos/envoy: use lists in serviceConfig where appropriate
...
Using type `list` instead of `str` in `serviceConfig` entries which
accept multiple values allows easier extension of the unit
configuration.
2023-02-11 18:21:21 +01:00
Robert Schütz
efee1b5234
nixos/imaginary: init
2023-02-11 09:18:42 -08:00
Naïm Favier
86a387351a
Merge branch 'master' into nixos/hostapd
2023-02-11 14:03:56 +01:00
bb2020
76bf633dc2
nixos/minidlna: minor changes
2023-02-09 21:11:20 +03:00
pennae
bf4c0c1900
nixos/*: remove trailing period in mkEnableOptions
...
those are added by mkEnableOption, and .. is replaced to … by markdown
processing.
2023-02-08 15:23:34 +01:00
Will Fancher
1406dd02a9
sshd: Cyphers -> Ciphers
2023-02-07 13:54:36 -05:00
Sandro
98a5726add
Merge pull request #204390 from gbtb/openvpn_client_restart_after_suspend
...
Resolves https://github.com/NixOS/nixpkgs/issues/52528
2023-02-07 01:06:24 +01:00
Matthieu Coudron
ef5da70d66
services.openssh: rename several settings ( #211991 )
...
* services.openssh: rename several settings
... to match the sshd config format (makes transition smoother), namely:
services.openssh.forwardX11 -> services.openssh.settings.X11Forwarding
services.openssh.cyphers -> services.openssh.settings.Cyphers
services.openssh.macs -> services.openssh.settings.Macs
services.openssh.kexAlgorithms -> services.openssh.settings.KexAlgorithms
services.openssh.gatewayPorts -> services.openssh.settings.GatewayPorts
* release-notes: mention openssh renaming
* chore: regenerated release-notes
2023-02-07 00:11:18 +01:00
Sandro
d47709d1ef
Merge pull request #208189 from numinit/update-nebula-module
2023-02-06 23:14:58 +01:00
Robert Obryk
0a6dd02620
nixos/firefox-syncserver: enable recommendedProxySettings
...
The syncserver requires a Host header identical to the one provided by
the client.
2023-02-05 23:47:19 +01:00
Malte Voos
3449f83618
maintainers/malvo: update information
2023-02-05 15:05:51 +01:00
Morgan Jones
e99f342f11
nixos/nebula: harden systemd unit
2023-02-04 16:24:45 -08:00
Morgan Jones
9d649fd78c
nixos/nebula: add tests for relays; clean up nebula passthru test
2023-02-04 16:24:45 -08:00
Morgan Jones
90581c977f
nixos/nebula: don't run as root; support relays
2023-02-04 16:24:45 -08:00
Elliot
e78f2115bf
v2raya: v2rayA should start after nftables
2023-02-03 10:22:23 +08:00
Sebastian Sellmeier
f531b17f7d
avahi-daemon: add ConfigurationDirectory to ensure "avahi/services" exists
2023-02-01 21:43:29 +01:00
ajs124
adc59137e9
nixos/jicofo: fix after update
...
2943c21ff7
removed the cli parameters
migrate from legacy config while we're at it
2023-02-01 16:32:23 +01:00
Izorkin
59dbe319ce
nixos/gitea: update SystemCallFilter
2023-01-31 10:08:32 -06:00
Izorkin
48ecda0962
nixos/chrony: disable PrivateDevices setting
2023-01-31 10:08:32 -06:00
Weijia Wang
5f83b5d199
Merge pull request #208801 from LeSuisse/multipath-tools-0.9.4
...
multipath-tools: 0.9.3 -> 0.9.4
2023-01-31 14:57:49 +01:00
Nick Cao
db77921d65
Merge pull request #205118 from SharzyL/fix-openconnect-protocol
...
nixos/openconnect: support alternative protocol
2023-01-31 19:53:53 +08:00
schnusch
45f06d9712
nixos/cgit: add package option
2023-01-31 12:13:56 +01:00
schnusch
218c7795a6
nixos/cgit: init
2023-01-31 12:06:12 +01:00
pennae
5b6dcece88
Merge pull request #212684 from pennae/nixos-render-docs
...
nixos-render-docs: init, use for some manual rendering to docbook
2023-01-30 19:26:07 +01:00
Michele Guerini Rocco
72c6c848ee
Merge pull request #212685 from rnhmjoj/pr-connman
...
nixos/wireless: fix failure on missing config file
2023-01-30 13:32:58 +01:00
pennae
0a6e6cf7e6
nixos/manual: render module chapters with nixos-render-docs
...
this converts meta.doc into an md pointer, not an xml pointer. since we
no longer need xml for manual chapters we can also remove support for
manual chapters from md-to-db.sh
since pandoc converts smart quotes to docbook quote elements and our
nixos-render-docs does not we lose this distinction in the rendered
output. that's probably not that bad, our stylesheet didn't make use of
this anyway (and pre-23.05 versions of the chapters didn't use quote
elements either).
also updates the nixpkgs manual to clarify that option docs support all
extensions (although it doesn't support headings at all, so heading
anchors don't work by extension).
2023-01-27 20:07:34 +01:00
rnhmjoj
688d658a96
nixos/wireless: fix failure on missing config file
...
This change prevents doing the secret substitution when the config is
missing, which would result in an error.
The service can be useful even without configuration; for example
connman controls wpa_supplicant using dbus and as such it does not need
a config file nor any other declarative options.
2023-01-26 00:31:21 +01:00