Commit graph

1150 commits

Author SHA1 Message Date
Wolfgang Walther 91a8fee3aa
treewide: remove redundant parentheses
Auto-fixed by nixf-diagnose.
2025-10-05 10:52:03 +02:00
Wolfgang Walther c283f32d29
treewide: remove unused with
Auto-fixed by nixf-diagnose.
2025-10-05 10:50:41 +02:00
Sandro 6c4f138b35
nixos/ipa: cleanup (#448060) 2025-10-04 02:11:39 +00:00
Marcel 0afff2b7a7
nixos/ipa: cleanup 2025-10-04 03:58:39 +02:00
Aleksana 9d3f5fcfcc
dn42-cacert: init at 0-unstable-2016-01-16 (#415051) 2025-09-29 15:12:49 +00:00
Benjamin Staffin b558c287b2
nixos/ipa: fix path to ldap.conf (#435054) 2025-09-25 12:54:22 +00:00
Wolfgang Walther 9b54e00268
google-guest-oslogin: 20230831.00 -> 20250821.00; nixos/google_oslogin: run as root (#445029) 2025-09-25 09:59:22 +00:00
h7x4 4ba3f60b8a
various: use mkPackageOption 2025-09-22 02:46:54 +02:00
Michael Daniels b385068794
nixos/google_oslogin: run as root
This is needed in order to read the files in /var/google-users.d, as the program
sets the permissions to 750 and the user and group to root.

See: https://github.com/GoogleCloudPlatform/guest-oslogin/blob/20250821.00/src/oslogin_utils.cc#L1337-L1338
2025-09-21 14:57:04 -04:00
Cryolitia PukNgae 43a1f18c34
nixos/pki: change certificateFiles's example to DN42 root cert
The original example is not a good example, `pkgs.cacert` does not need to appear in `security.pki.certificateFiles`, instead, `certificateFiles` will eventually override the input of pkgs.cacert to build the final `caBundle`. Replacing the example with DN42 will both remind users that we are now packaging DN42's root certificates and eliminate the confusion in the previous example.
2025-09-13 15:54:39 +08:00
Johannes Kirschbauer 3e38f2bd53
nixos/modules: agnos use correct type in freeformType 2025-09-05 18:04:32 +02:00
Marie Ramlow e6393736cb nixos/sudo-rs: add sudoedit wrapper 2025-08-26 10:35:55 +02:00
Adam C. Stephens 8aaa86b149
sudo-rs: add pam.services.su-l for su -l (#431219) 2025-08-24 16:58:52 -04:00
nixpkgs-ci[bot] 53fe08332e
Merge master into staging-next 2025-08-21 20:43:13 +00:00
K900 35d0bafabf nixos/treewide: clean up Plasma 5 references
Preparing to drop.
2025-08-21 22:31:56 +03:00
Benjamin Staffin 579ef71b96 nixos/ipa: fix path to ldap.conf
I don't know when this changed, but the openldap client looks for
/etc/ldap.conf now, not /etc/openldap/ldap.conf.
2025-08-19 13:26:29 -04:00
Fabián Heredia Montiel 675812fca5 Merge remote-tracking branch 'origin/master' into staging-next 2025-08-14 09:23:01 -06:00
Leona Maroni 9b8ea589ea
nixos/acme: improve scalability - reduce superfluous unit activations (#422076) 2025-08-14 16:06:06 +02:00
Christian Theune 2c111ce343 nixos/acme: update release notes and documentation 2025-08-13 14:34:53 +02:00
K900 a6809ffcc6
nixos/pam: enable lastlog2 import service if any pam service uses lastlog (#432567) 2025-08-11 13:22:51 +03:00
Grimmauld a1d47a4ca3
nixos/pam: fix lastlog2 import service 2025-08-11 10:37:49 +02:00
nikstur 0d9a5c2059 nixos/fuse: add enable option
Fuse is stil enabled by default so the default behaviour of NixOS
doesn't change. However, now it's possible to actively exclude fuse when
you don't need it.
2025-08-10 22:43:39 +02:00
nikstur d5ae87bdeb
Revert "nixos: allow more things to be disabled" 2025-08-10 22:22:08 +02:00
nixpkgs-ci[bot] d50fd904cb
Merge master into staging-next 2025-08-10 18:05:04 +00:00
Arian van Putten 1bb040fae8
nixos: allow more things to be disabled (#429695) 2025-08-10 19:49:52 +02:00
Grimmauld f3cd67c5b7
nixos/pam: enable lastlog2 import service if any pam service uses lastlog 2025-08-10 18:55:04 +02:00
K900 801b363af8
nixos/pam: switch to lastlog2 (#429203) 2025-08-10 11:13:57 +03:00
nikstur 439d68b58d nixos/audit: fix journald test
Makes the audit module responsible for setting up the audit subsystem of
the kernel. The auditd module is now only responsible for setting up the
daemon.

Enable the audit subsystem early via kernelParams.

Increase the default audit backlog limit so that it works out of the box
for a normal system.

Remove a superfluous and pointless test case.
2025-08-09 15:00:41 +02:00
Christian Theune 98ecc9035d nixos/acme: switch concurrency limit to a runtime-based implementation
The previous implementation caused triggers on many units when adding
or removing certificates because the baked-in lock file assignments
changed.
2025-08-08 16:28:57 +02:00
Christian Theune 2d0a489125 nixos/acme: improve scalability - reduce superfluous unit activations
The previous setup caused all renewal units to be triggered upon
ever so slight changes in config. In larger setups (100+ certificates)
adding a new certificate caused high system load and/or large memory
consumption issues. The memory issues are already a alleviated with
the locking mechanism. However, this then causes long delays upwards
of multiple minutes depending on individual runs and also caused
superfluous activations.

In this change we streamline the overall setup of units:

1. The unit that other services can depend upon is 'acme-{cert}.service'.
We call this the 'base unit'. As this one as `RemainAfterExit` set
the `acme-finished-{cert}` targets are not required any longer.

2. We now always generate initial self-signed certificates to simplify
the dependency structure. This deprecates the `preliminarySelfsigned`
option.

3. The `acme-order-renew-{cert}` service gets activated after the base
unit and services using certificates have started and performs all acme
interactions. When it finishes others services (like web servers) will
be notified through the `reloadServices` option or they can use
`wantedBy` and `after` dependencies if they implement their own reload
units.

The renewal timer also triggers this unit.

4. The timer unit is explicitly blocked from being started by s-t-c.

5. Permission management has been cleaned up a bit: there was an
   inconsistency between having the .lego files set to 600 vs 640
   on the exposed side. This is unified to 640 now.

6. Exempt the account target from being restarted by s-t-c. This will
   happen automatically if something relevant to the account changes.
2025-08-08 16:28:42 +02:00
Adam C. Stephens 7404c06f30
sudo-rs: add pam.services.su-l for su -l 2025-08-05 12:39:29 -04:00
Grimmauld ee774bb624
nixos/auditd: add built-in plugins (default disabled) 2025-08-03 22:19:26 +02:00
Grimmauld 2c77ad7e9e
nixos/auditd: add plugin support 2025-08-03 22:19:23 +02:00
Grimmauld 51a2caecf4
nixos/auditd: support configuring service through nix 2025-08-03 22:19:20 +02:00
nikstur eca55074cb nixos/fuse: add enable option
Fuse is stil enabled by default so the default behaviour of NixOS
doesn't change. However, now it's possible to actively exclude fuse when
you don't need it.
2025-07-31 20:42:36 +02:00
Grimmauld d30eeb3ef4
nixos/pam: switch to lastlog2
Adaptation of #282337 to use `util-linux` as `lastlog2` provider

Co-Authored-By: Maxine Aubrey <35892750+amaxine@users.noreply.github.com>
2025-07-31 16:58:55 +02:00
nikstur 796b80f340
Improve security.audit{,d} (#429553) 2025-07-30 19:39:09 +02:00
nikstur 50243c5d78 nixos/auditd: align with upstream
Remove config that doesn't make senes at all or on NixOS specifically.
2025-07-30 17:26:09 +02:00
nikstur 774f6ed203 nixos/audit: add proper enable flag
Align with upstream and also remove unnecessary dependency on bash along
the way.
2025-07-30 17:26:09 +02:00
Will Fancher 0a53886700
nixos/{tmpfiles, wrappers}: explicitly set RestrictSUIDSGID false (#426882) 2025-07-30 04:31:21 -04:00
Thomas Gerbet a3a0962f23 sudo: 1.9.17p1 -> 1.9.17p2
Changes:
https://www.sudo.ws/releases/stable/#1.9.17p2
2025-07-29 23:24:42 +02:00
Grimmauld 9142cadd5e
nixos/pam: point to systemd.settings.Manager 2025-07-28 11:24:16 +02:00
Wolfgang Walther 5a0711127c
treewide: run nixfmt 1.0.0 2025-07-24 13:55:40 +02:00
Wolfgang Walther 62fe016519
treewide: run treefmt with mdcr/nixfmt 2025-07-24 13:52:31 +02:00
Grimmauld 5e872a4974
nixos/wrappers: explicitly set RestrictSUIDSGID = false
This ensures the wrapper setup service has permissions
to create suid/sgid files, even if `DefaultRestrictSUIDSGID`
is set in system.conf. `DefaultRestrictSUIDSGID` is
a new feature coming in systemd 258 [1].

[1] https://github.com/systemd/systemd/pull/38126
2025-07-20 12:37:37 +02:00
Pol Dellaiera a3e8ba327e
Google Authenticator 2FA support over XRDP (#407736) 2025-05-28 17:57:00 +00:00
Tristan Ross a6c170910f
nixos/security: add landlock, yama, and bpf defaults (#407748) 2025-05-24 06:37:19 -07:00
Morgan Jones 9c1564e395
nixos/tpm2: default pkcs#11 module based on abrmd config
Since there are now variants of tpm2-pkcs11 with and without ABRMD
support (for the kernel resource manager), ensure we pick the correct
default.

Fixes an accidental backwards incompatibility with the module.
2025-05-21 01:07:34 -07:00
Antonio 8331187976 Google Authenticator 2FA support over XRDP 2025-05-17 22:43:14 +02:00
Martin Weinelt f462e2564d
acme: Add csr option (#376334) 2025-05-17 11:24:08 +02:00