Commit graph

4793 commits

Author SHA1 Message Date
Tom Fitzhenry 235d103ff7 nixos/clatd: add enableNetworkManagerIntegration option 2024-11-17 20:38:55 +11:00
jopejoe1 95b30da133
nixos/shairport-sync: add package option (#355985) 2024-11-16 03:12:02 +01:00
Yaroslav Bolyukin 4b8fee2274
nixos/netbird: fix coturn configuration 2024-11-15 21:05:56 +01:00
Weijia Wang cedd087b81
globalprotect-openconnect: Reinstate v1 (#355758) 2024-11-15 18:25:57 +01:00
Colin c00cdccd00
nixos/teleport: add required utils to path (#332810) 2024-11-15 13:16:39 +00:00
Jordan Williams 697fa78c9a
nixos/shairport-sync: add package option 2024-11-15 06:47:24 -06:00
bb2020 93d38a29e0 nixos/minidlna: add option 2024-11-15 15:18:54 +03:00
bb2020 547251956b nixos/minidlna: remove with lib 2024-11-15 15:18:43 +03:00
Guilhem Saurel 39e22be299 nixos/mptcpd: init
Co-authored-by: Martin Weinelt <mweinelt@users.noreply.github.com>
2024-11-15 08:53:01 +01:00
Colin 9bd0271b22
nixos/minidlna: add package option (#345770) 2024-11-15 06:29:43 +00:00
Rahul Rameshbabu b6bac07973
globalprotect-openconnect: Reformat expressions using RFC style
The original work did not use the new nixfmt style.

Signed-off-by: Rahul Rameshbabu <sergeantsagara@protonmail.com>
2024-11-14 09:28:04 -08:00
Rahul Rameshbabu 8f2fa04fd9
Revert "globalprotect-openconnect: remove deprecated 1.x package"
This reverts commit b08d6a664f.

Signed-off-by: Rahul Rameshbabu <sergeantsagara@protonmail.com>
2024-11-13 13:41:34 -08:00
Franz Pletz bb6d800c3a
iwd: update settings documentation (#352989) 2024-11-06 12:17:24 +01:00
Guilhem Saurel 71f467fc88 iwd: update settings documentation
The link https://iwd.wiki.kernel.org/networkconfigurationsettings is
currently broken, as it redirect to the 404
https://archive.kernel.org/oldwiki/iwd.wiki.kernel.org/networkconfigurationsettings ; the correct link is
https://archive.kernel.org/oldwiki/iwd.wiki.kernel.org/networkconfigurationsettings.html but it is marked as obsolete, and tell the user to read the iwd.network(5) man.

Co-authored-by: Franz Pletz <fpletz@fnordicwalking.de>
2024-11-06 11:10:42 +01:00
Sandro a633b5fb12
OpenVPN: don't fail to restart stopped units (#345993) 2024-11-06 01:16:43 +01:00
Sandro Jäckel 22fea14d11
nixos/tftpd: cleanup 2024-11-04 15:55:13 +01:00
Sandro Jäckel 8440f6cc6f
nixos/tftpd: format with nixmft-rfc-style 2024-11-04 15:54:39 +01:00
Sandro Jäckel 7e6a0edf64
nixos/tftpd: remove with lib 2024-11-04 15:49:59 +01:00
PAEPCKE, Michael a58c8fee1e
nixos/wg-access-server: bugfix dns.enabled (yaml) 2024-11-01 17:09:34 +00:00
Nico Felbinger 9e608d46a9
nixos/suricata: add description fields for configuration 2024-11-01 14:42:53 +01:00
Yureka 959cb6b020 nixos/fastnetmon-advanced: set dbus implementation to dbus-broker
Fixes "Failed to restart gobgp.service: Transport endpoint is not connected"

Fixes the nixos test

Change-Id: I96fe6ce8e69ec3038b349d45a8046ed93333dddb
2024-10-31 01:50:34 +01:00
DCsunset acda73926d nixos/murmur: support setting user and group for service 2024-10-30 08:21:48 +00:00
DCsunset 2f0c3c88cb nixos/murmur: support setting custom state directory 2024-10-30 08:21:48 +00:00
Aleksana dbe33f99b7
nixos/soju: use message-store instead of deprecated log in config (#338650) 2024-10-29 17:37:21 +08:00
Aleksana 5fd2f5aac6
tailscaled: Add option to disable Taildrop (#346957) 2024-10-29 17:19:31 +08:00
Nico Felbinger 32d516c84d
nixos/radicale: fix links to documentation 2024-10-28 19:56:12 +01:00
Felix Bühler 3f8d6caed2
nixos/xl2tpd: prefer 'install' over 'chmod/chown' (#302388) 2024-10-27 19:21:21 +01:00
Martin Weinelt 5e10c1522b
nixos/avahi-daemon: set up sandboxing (#348406) 2024-10-26 16:22:04 +02:00
Martin Weinelt ca4f13857c
nixos/coturn: set up sandboxing (#348396) 2024-10-26 16:21:46 +02:00
Michele Guerini Rocco 9a415c28ae
dhcpcd: fix more permissions errors (#351225) 2024-10-26 02:00:23 +02:00
rnhmjoj 483e44684d
dhcpcd: fix permissions error with secondary IPv4 addresses
If dhcpcd receives a secondary IPv4 address from the DHCP server it
tries to enable automatic promotion from secondary to primary by writing
`1` to /proc/sys/net/ipv4/conf/%s/promote_secondaries.
2024-10-25 21:33:30 +02:00
Felix Bühler 29cdb4373e
pptpd: prefer 'install' over 'chmod/chown' (#308085) 2024-10-25 20:48:22 +02:00
Aadniz 4b44081827 nixos/searxng: limiter.toml reference moved
fd814aac86 (diff-c33cdfa4503c019bc49259acad45fc0a895a127b20ae3ffefaa12b7c439d4aa2)
2024-10-25 14:27:12 +02:00
Sefa Eyeoglu 15aad9d3a1
nixos/ntpd: cleanup; add tests (#349633) 2024-10-24 15:21:01 +02:00
Martin Weinelt 8a2439f1c2
nixos/avahi-daemon: set up sandboxing 2024-10-24 15:04:14 +02:00
rcerc 42d887adbf nixos/supplicant: Always provide a first configuration file argument
`wpa_supplicant` refuses to start when `configFile.path == null` because this
omits the `-c` (‘Configuration file’) option, which it requires even if the
`-I` (‘additional configuration file’) option is provided. If `configFile.path
== null`, pass `extraConfFile` with `-c` instead of `-I` to prevent this.
2024-10-24 08:25:02 +02:00
Kerstin Humm b12bcabd24
maintainers: remove erictapen from packages that I don't really maintain anymore 2024-10-22 12:32:29 +02:00
K900 099cde3a92
Revert "nixos/ssh: disable authorizedKeysInHomedir by default" 2024-10-20 21:32:29 +03:00
Jake Hillion ba01c8bab3 nixos/resilio: set rslsync gid 2024-10-20 17:51:14 +01:00
nicoo 06929a6fb0
nixos/ssh: disable authorizedKeysInHomedir by default (#309025) 2024-10-20 16:19:25 +00:00
Tomo 8d642257fb
nodePackages.shout: drop (#349715) 2024-10-19 18:46:30 -07:00
Pyrox 4e632e9c3f
nixos/ntpd: Add hardening 2024-10-19 14:26:17 -04:00
Pyrox 53bc9450bc
nixos/ntpd: Use StateDirectory instead of a preStart script 2024-10-19 14:26:00 -04:00
Tomo 76c7c2dd88 nodePackages.shout: drop
shout has been deprecated since 2016:
90a62c56af

Also, move the top-level `shout` alias to `pkgs/top-level/aliases.nix`.

Part of #229475
2024-10-19 17:53:20 +00:00
Nick Cao f8b17f235e
nixos/sing-box: generate config file into RuntimeDirectory (#338457) 2024-10-19 10:11:00 -04:00
Pyrox 297f21e357
nixos/ntpd: format with nixfmt-rfc-style 2024-10-19 04:39:16 -04:00
Peder Bergebakken Sundt 03d8f52dc6
nixos/tailscale: document tailscale-autoconnect (#347881) 2024-10-19 07:01:26 +02:00
Peder Bergebakken Sundt 465201822e
nixos/mihomo: fix option type and test (#345891) 2024-10-19 06:58:41 +02:00
Sandro f0bc4f6bbf
nixos-firewall-tool: add nftables support (#324615) 2024-10-18 23:57:39 +02:00
HackerNCoder 63cd2b8e03 nixos/bind: rndc-confgen should not chown file 2024-10-18 22:23:28 +02:00
nicoo 6c62fbf539 nixos/sshd: warn if no authorized keys, and no authentication method other than pubkeys, were configured 2024-10-18 20:23:02 +00:00
nicoo 1f08575e3a nixos/sshd: Disable authorizedKeysInHomedir if stateVersion >= 24.11
Co-authored-by: Valentin Gagarin <valentin@gagarin.work>
2024-10-18 20:21:12 +00:00
Stanisław Pitucha 87c458e3ce
nixos/go-camo: fix shellcheck findings with enableStrictShellChecks enabled (#349557) 2024-10-19 06:22:18 +11:00
jmir1 858b5c6762 nixos/ddclient: Fix ip command with usev4 and usev6 2024-10-18 20:32:16 +02:00
Gary Guo cabbab19e2
nixos-firewall-tool: add nftables support
Co-authored-by: Rvfg <i@rvf6.com>
2024-10-18 20:16:27 +02:00
HackerNCoder 4855723c87 nixos/bind: Make ProtectSystem strict, add missing SystemCallFilters
ReadWritePaths now gets the directory of zone files
2024-10-18 19:36:10 +02:00
HackerNCoder 1cb6d22386 nixos/bind: harden systemd service 2024-10-18 16:38:30 +02:00
Vladimír Čunát a8f84a9dff
nixos/kresd: add link to upstream doc (#311915) 2024-10-18 10:22:18 +02:00
David McFarland cd286b21e4
resolvconf: use correct output files when used with dnsmasq (#349320) 2024-10-17 16:44:18 -03:00
David McFarland 403604ca66 resolvconf: use correct output files when used with dnsmasq 2024-10-17 14:20:57 -03:00
Adam Stephens bece21421b
nixos/atticd: wants network-online.target
fixes:

trace: evaluation warning: atticd.service is ordered after 'network-online.target' but doesn't depend on it
2024-10-16 12:36:19 -04:00
K900 70cc7b62f2
nixos/murmur: Set UMask to 027 (#348652) 2024-10-16 05:16:09 +03:00
Robert Schütz fb2d897809
nixos/headscale: don't set deprecated options in config (#347991) 2024-10-15 16:22:18 -07:00
Azat Bahawi e2337957df
nixos/zapret: init (#347805) 2024-10-15 20:37:40 +00:00
Dmitry Voronin 5a5c04d1ea
nixos/zapret: init 2024-10-15 21:51:53 +03:00
Peder Bergebakken Sundt 13bf1d6259
nixos/resilio: add package option (#346427) 2024-10-15 20:38:41 +02:00
Martin Weinelt 72dd22a02d
nixos/coturn: reindent, unclutter
Make the module slightly easier to browse.
2024-10-15 18:31:52 +02:00
Martin Weinelt 6d9089c67d
nixos/coturn: set up sandboxing 2024-10-15 18:31:52 +02:00
Felix Singer 13f6e2d85f nixos/murmur: Set UMask to 027
Group only needs limited access, while other users don't need access at
all. So set the UMask to 027.

Signed-off-by: Felix Singer <felixsinger@posteo.net>
2024-10-15 02:43:42 +02:00
Sandro Jäckel db12279890
nixos/go-camo: fix shellcheck findings with enableStrictShellChecks enabled 2024-10-14 18:21:30 +02:00
Michele Guerini Rocco 35618d0b14
nixos/dhcpcd: fix race between namespace setup and resolvconf (#348305) 2024-10-14 15:44:32 +02:00
Adam C. Stephens 86420f4ee8
nixos/atticd: init module (#347749) 2024-10-14 09:33:35 -04:00
Vladimír Čunát 46954f61c6
nixos/knotd: extend SystemCallFilter
It was breaking knot-dns.tests.knot
New knotd uses fchown to cover cases where user changes during startup.
In typical Linux cases the user is kept the same and there are
capabilities instead, but the syscall still happens and got caught here.
2024-10-14 10:26:46 +02:00
rnhmjoj 52e2e7027d
dhcpcd: fix race between namespace setup and resolvconf
systemd requires paths in `ReadWritePaths=` to exist before setting up
the service sandbox, so dhcpcd should be ordered after resolvconf.
Making resolvconf a oneshot service ensure `After=resolvconf.service`
works correctly.
2024-10-14 08:02:46 +02:00
Adam Stephens 8d4f3f2b3e
nixos/atticd: init module
Copied from 1b29816235/nixos/atticd.nix and modified
2024-10-13 08:23:34 -04:00
Robert Schütz cc4d29d353 nixos/headscale: assert that dns.base_domain is set when using MagicDNS 2024-10-12 18:28:17 -07:00
Robert Schütz 0673e98248 nixos/headscale: update option descriptions 2024-10-11 20:17:15 -07:00
Robert Schütz dfb0f00fc9 nixos/headscale: don't set deprecated options in config
We cannot use `mkRenamedOptionModule` or `mkRemovedOptionModule` inside
a freeform option. Thus we have to manually assert these deprecated
options aren't used rather than aliasing them to their replacement.
2024-10-11 20:05:29 -07:00
Robert Schütz d4ae06c73b nixos/headscale: assert that server_url does not contain base_domain 2024-10-11 13:29:04 -07:00
Peder Bergebakken Sundt 233d422887 nixos/tailscale: document tailscale-autoconnect 2024-10-11 10:59:49 +02:00
github-actions[bot] aa2334f4a8
Merge master into staging-next 2024-10-11 00:14:02 +00:00
h7x4 e49f3574ab
nixos/fedimintd: make nginx url forwarding path configurable (#347604) 2024-10-10 21:14:20 +02:00
github-actions[bot] a5883bc172
Merge master into staging-next 2024-10-10 12:05:39 +00:00
Franz Pletz 1479e0c4de
nixos/frr: refactor (#327099) 2024-10-10 12:55:34 +02:00
Pol Dellaiera a72a8bcfb3
treewide: fix typo chown -> chmod (#347678) 2024-10-10 10:55:34 +02:00
r-vdp 9f1d2e97af
nixos/shorewall: Fix typo, chown -> chmod 2024-10-10 09:02:58 +02:00
Dawid Ciężarkiewicz 570454c295
nixos/fedimintd: make nginx url forwarding path configurable
Some users would like to customize it.

Also, in current versions of fedimint p2p port in the URL
must be set, due to some bug, so update the example value
to reflect that.
2024-10-09 14:28:51 -07:00
Frank Doepper ecdfb14ef9 nixos/frr: refactor
- use upstream service and scripts
- switch to integrated-vtysh-config, abandon per-daemon config
- use always daemon names in options (e.g. ospf -> ospfd)
- zebra, mgmtd and staticd are always enabled
- abandon vtyListenAddress, vtyListenPort options; use
  just "extraOptions" or "options" instead, respectively
- extend test to test staticd
- update release-notes
- pkgs.servers.frr: fix sbindir and remove FHS PATH
- introduce services.frr.openFilesLimit option
2024-10-09 22:49:50 +02:00
K900 0717a4da77 Merge remote-tracking branch 'origin/master' into staging-next 2024-10-09 21:08:25 +03:00
Franz Pletz ca912828ba
nixos/dhcpcd: allow jemalloc and mimalloc memory allocators (#346938) 2024-10-09 17:27:26 +02:00
Franz Pletz 689b9903ac
nixos/tailscale-derper: init (#306533) 2024-10-09 17:05:01 +02:00
Franz Pletz ae4102c9f3
headscale (module and package): 0.22.3 -> 0.23.0 (#340054) 2024-10-09 17:01:18 +02:00
K900 956f9243c0 Merge remote-tracking branch 'origin/master' into staging-next 2024-10-08 21:15:13 +03:00
Izorkin c3e32a04ae
nixos/dhcpcd: allow jemalloc and mimalloc memory allocators 2024-10-08 14:12:27 +03:00
Florian Klink 146e83d76b
dhcpcd: enable sandboxing options (#208780) 2024-10-08 13:09:11 +03:00
github-actions[bot] 5fa43e7396
Merge master into staging-next 2024-10-07 06:05:15 +00:00
Emily 1a53b400e5
mongodb: mongodb-5_0 -> mongodb-7_0; mongodb-5_0: drop; unifi: unifi7 -> unifi8; unifi{7,-video}: drop (#345625) 2024-10-07 01:38:54 +01:00
Emily b0395df085 unifi7: drop 2024-10-06 22:47:41 +01:00
Dionysis Grigoropoulos 8e9ae86774
tailscaled: Add option to disable Taildrop 2024-10-07 00:22:59 +03:00
Izorkin 611b1d53b7
dhcpcd: enable sandboxing options 2024-10-06 23:46:18 +03:00
github-actions[bot] 7ab01e096c
Merge master into staging-next 2024-10-06 18:03:58 +00:00
Sandro 020c26717f
nixos/quorum: fix geth args, fix test (#341181) 2024-10-06 14:06:31 +02:00
github-actions[bot] ff851b037d
Merge master into staging-next 2024-10-06 00:15:37 +00:00
Nick Cao 9e012ecbf2
nixos/sing-box: generate config file into RuntimeDirectory 2024-10-05 18:18:23 -04:00
h7x4 25f2846361
nixos/bind: set type of zones.*.extraConfig to lines (#346424) 2024-10-05 21:07:26 +02:00
github-actions[bot] 94cb2166da
Merge master into staging-next 2024-10-05 12:05:30 +00:00
r-vdp 94532d1530 nixos/syncthing: remove syncthing-resume service
It was removed upstream in https://github.com/syncthing/syncthing/pull/9611
and the stub generated by nixos now prints an error in the logs due to
it not having a ExecStart line.
2024-10-05 12:55:39 +02:00
github-actions[bot] e9c8665026
Merge master into staging-next 2024-10-05 00:14:01 +00:00
Anthony Roussel 17fd7e3eea
nixos/gns3-server: fix ubridge support (#303442) 2024-10-04 22:16:13 +02:00
Peder Bergebakken Sundt f0ad87bdd7 nixos/resilio: add package option 2024-10-04 15:13:04 +02:00
Felix Stupp 6de4d04fdb
nixos/bind: set type of zones.*.extraConfig to lines
allowing multiple definitions of that option to be merged, because:
- their order should be irrelevant
- it might make sense to declare multiples of them at different locations
2024-10-04 14:49:12 +02:00
github-actions[bot] 579054c806
Merge master into staging-next 2024-10-04 00:14:14 +00:00
h7x4 c760c830d4
nixos/fedimintd: init service (#322815) 2024-10-03 23:53:30 +02:00
Nico Felbinger 924ee0c2bc nixos/suricata: init module 2024-10-03 22:50:30 +02:00
Dawid Ciężarkiewicz ba727987d4
nixos/fedimintd: init services 2024-10-03 13:05:12 -07:00
Sandro Jäckel d82d689716
nixos/tailscale-derper: init 2024-10-03 22:04:40 +02:00
github-actions[bot] 0e9a6f22a1
Merge master into staging-next 2024-10-03 00:14:11 +00:00
lassulus def08aa2e3
jitsi-meet: Default NAT harvester, Excalidraw Caddy, Prosody lockdown (#280615) 2024-10-02 21:08:06 +01:00
Adam Dinwoodie 2a15702bc8 nixos/openvpn: don't fail to restart stopped units
The current OpenVPN restart-after-sleep script will return a non-zero
exit code if the system resumes from sleep and there are no active
OpenVPN units, resulting in systemd reporting the system as degraded.
Avoid that by only attempting to restart OpenVPN programs that are
actually running at the time.  This also means that any user-managed
OpenVPN sessions won't be affected by NixOS's OpenVPN handling.
2024-10-02 19:36:48 +01:00
aktaboot 15119b8244 nixos/mullvad-vpn: remove unneeded hacks
iproute2 rt_tables are no longer used upstream

and loose Reverse-Path seems to no longer be needed, according to my local test
2024-10-02 17:20:21 +02:00
github-actions[bot] 58677f23e2
Merge master into staging-next 2024-10-02 12:05:45 +00:00
Peder Bergebakken Sundt ed72e91db1 nixos/mihomo: fix option type 2024-10-02 10:57:28 +02:00
Daniel Nagy 1d8136e1ae
nixos/i2pd: fix build 2024-10-02 09:45:00 +02:00
Gautier DI FOLCO 5970720f1c
nixos/minidlna: add package option 2024-10-01 23:39:36 +02:00
Kristoffer Dalby abb3b0089b
nixos/headscale: update module to headscale 0.23.0
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2024-10-01 21:53:33 +02:00
Kristoffer Dalby 5dd728a081
nixos/headscale: modernize
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2024-10-01 20:40:19 +02:00
K900 3f7da3dfa9 Merge remote-tracking branch 'origin/master' into staging-next 2024-10-01 08:44:24 +03:00
h7x4 636185e25a
seafile: 10.0.1 -> 11.0.12 (#318727) 2024-09-30 23:53:02 +02:00
K900 b29cb6c1f9 Merge remote-tracking branch 'origin/master' into staging-next 2024-09-30 20:23:25 +03:00
Erin Yuki Schlarb 61cf88212d jitsi-videobridge: Set configurable default NAT harvester address to make the
service work behind NAT without additional manual configuration
2024-09-30 18:19:33 +02:00
Martin Weinelt b47b572e21
nixos/freeradius: fix group assignment for radius user 2024-09-30 15:50:13 +02:00
Alyssa Ross ac037f0b18
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
	pkgs/development/compilers/llvm/common/default.nix
2024-09-29 20:10:12 +02:00
Naïm Camille Favier 7cba8410f7
nixos/networkmanager: set up /etc/ipsec.secrets as required by the L2TP plugin (#340325) 2024-09-29 18:56:59 +02:00
github-actions[bot] 8e5ca58e0a
Merge master into staging-next 2024-09-29 12:05:05 +00:00
Bruno Bigras 1336b64235
Add veilid module (#330585) 2024-09-29 04:30:44 -04:00
Michele Guerini Rocco a08c2e29b9
nixos/monero: remove with lib; (#343474) 2024-09-29 09:36:21 +02:00
github-actions[bot] 080ddac139
Merge master into staging-next 2024-09-29 00:15:45 +00:00
melvyn 073099d0f7
nixos/seafile: add persistent user, configurable storage path, gc service 2024-09-28 19:09:58 -04:00
melvyn d3b5dc8da1
nixos/seafile: add persistent user, configurable storage path, gc service 2024-09-28 17:57:02 -04:00
Franz Pletz e8486ebc7f
freeradius: add option to compile with postgres (#265762) 2024-09-28 22:56:08 +02:00
Daniel Nagy 6512103dfe
nixos/monero: remove with lib; 2024-09-28 22:30:00 +02:00
github-actions[bot] 8693fc15c4
Merge master into staging-next 2024-09-28 18:04:13 +00:00
Franz Pletz 79a01a8631
pleroma: 2.6.3 -> 2.7.0 (#333283) 2024-09-28 15:36:27 +02:00
Franz Pletz 1ee99a4837
tailscaled: after NetworkManager-wait-online (#344678) 2024-09-28 15:26:00 +02:00
Franz Pletz a3f79b7d63
tailscale: add su to path (#344947) 2024-09-28 15:22:40 +02:00
github-actions[bot] aef46265d9
Merge master into staging-next 2024-09-28 12:05:16 +00:00
Jörg Thalheim 076f2f69f3
sshd: fix shellcheck warnings in prestart script (#340484) 2024-09-28 09:49:25 +02:00
github-actions[bot] 9badc90a26
Merge master into staging-next 2024-09-28 00:13:56 +00:00
Mikilio 938d190ed2
tailscale: add su to path
this adds access to `su` via security wrappers
2024-09-27 23:05:20 +02:00
Atemu e8d40a7f34
nixos/i2pd: remove with lib; (#343476) 2024-09-27 21:58:59 +02:00
Gary Guo 162f0719e9 nixos/freeradius: fix radius group
A group must be selected since it no longer defaults to nogroup
2024-09-27 20:11:57 +01:00
Gary Guo d0481239c1 nixos/freeradius: add option to override package 2024-09-27 20:11:56 +01:00
Picnoir 50ffaf03bb nixos/pleroma: format module with nixfmt 2024-09-27 19:30:14 +02:00
Picnoir aa666ce8f1 nixos/pleroma: move migrations to their own systemd unit
Running the migrations in a systemd execStartPre was a mistake. The
migrations can be pretty long to run and easily time-out.

Moving this to a proper oneshot service solves this issue and makes
this fits better the systemd execution model. We can now easily filter
the migrations logs.
2024-09-27 19:29:41 +02:00
github-actions[bot] c8c18095f9
Merge master into staging-next 2024-09-26 18:04:33 +00:00
Marin 0d822ccdbc tailscaled: after NetworkManager-wait-online
The wait will only be enabled on machines with NetworkManager enabled.

Closes #180175
2024-09-26 12:12:46 -04:00
Lucas Chaim 9e6338ffaf nixos/tailscale: add authKeyParameters
Adds `config.services.tailscale.authKeyParameters`
2024-09-26 07:28:19 -03:00
K900 a9128ce2f2 Merge remote-tracking branch 'origin/master' into staging-next 2024-09-25 21:07:19 +03:00
Robert James Hernandez 6c527bf0fb nixos/scion: init scion-ip-gateway module 2024-09-25 19:08:33 +02:00
Artturin f0e657f3b1 Merge branch 'master' into staging-next 2024-09-25 06:05:01 +03:00
Artturin e0464e4788 treewide: replace stdenv.is with stdenv.hostPlatform.is
In preparation for the deprecation of `stdenv.isX`.

These shorthands are not conducive to cross-compilation because they
hide the platforms.

Darwin might get cross-compilation for which the continued usage of `stdenv.isDarwin` will get in the way

One example of why this is bad and especially affects compiler packages
https://www.github.com/NixOS/nixpkgs/pull/343059

There are too many files to go through manually but a treewide should
get users thinking when they see a `hostPlatform.isX` in a place where it
doesn't make sense.

```
fd --type f "\.nix" | xargs sd --fixed-strings "stdenv.is" "stdenv.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "stdenv'.is" "stdenv'.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "clangStdenv.is" "clangStdenv.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "gccStdenv.is" "gccStdenv.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "stdenvNoCC.is" "stdenvNoCC.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "inherit (stdenv) is" "inherit (stdenv.hostPlatform) is"
fd --type f "\.nix" | xargs sd --fixed-strings "buildStdenv.is" "buildStdenv.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "effectiveStdenv.is" "effectiveStdenv.hostPlatform.is"
fd --type f "\.nix" | xargs sd --fixed-strings "originalStdenv.is" "originalStdenv.hostPlatform.is"
```
2024-09-25 00:04:37 +03:00
Anthony ROUSSEL c1104aee4d nixos/gns3-server: disable SystemD hardening 2024-09-23 20:46:18 +02:00
Anthony Roussel 77edd2b066 nixos/gns3-server: disable SystemD DisableUser
Usage of DynamicUser is compatible with SUID wrappers.
GNS3 needs to call ubridge via its SUID Wrapper to work.
2024-09-23 20:46:17 +02:00
Anthony Roussel 46044101f3 nixos/gns3-server: fix ubridge_path 2024-09-23 20:46:17 +02:00
github-actions[bot] 9a6f63ebed
Merge master into staging-next 2024-09-23 18:04:34 +00:00
Daniel Nagy 201d35822e
nixos/nar-serve: remove with lib; (#343472) 2024-09-23 15:40:56 +02:00
figboy9 56f8f810ae nixos/veilid: fix description link 2024-09-23 13:30:38 +09:00
github-actions[bot] 6bb2408295
Merge master into staging-next 2024-09-22 12:05:17 +00:00
Weijia Wang 84cd38f778
globalprotect-openconnect: add core logic and packages for 2.x releases (#316526) 2024-09-22 12:07:33 +02:00
Felix Singer 421d1b8974 nixos/{redmine,murmur}: Add Felix Singer as maintainer
I'm maintaining the associated packages. So it makes sense to add myself
to their modules as well.

Signed-off-by: Felix Singer <felixsinger@posteo.net>
2024-09-22 08:35:08 +02:00
Rahul Rameshbabu b08d6a664f
globalprotect-openconnect: remove deprecated 1.x package
The 1.x iteration of globalprotect-openconnect is no longer being
developed. Remove related components from nixpkgs.

Signed-off-by: Rahul Rameshbabu <sergeantsagara@protonmail.com>
2024-09-21 10:20:21 -07:00
Daniel Nagy 06791fce8f
nixos/nbd: remove with lib; 2024-09-21 16:00:00 +02:00
github-actions[bot] d3ae261fc3
Merge master into staging-next 2024-09-21 12:05:16 +00:00
Daniel Nagy 608bd15ce5
nixos/i2pd: remove with lib; 2024-09-21 12:45:00 +02:00
Sandro a2fe2c872a
tailscale: only autoconnect after backend is up (#338210) 2024-09-21 11:27:18 +02:00
Daniel Nagy 991fd5f462 nixos/yggdrasil: add nagy as maintainer 2024-09-21 06:30:54 +00:00
Daniel Nagy cb7635612e nixos/yggdrasil: remove with lib; 2024-09-21 06:30:54 +00:00
github-actions[bot] 754402a237
Merge staging-next into staging 2024-09-21 00:13:41 +00:00
Ryan Horiguchi c26ca03c4d nixos/dnsmasq: remove deprecated option "extraConfig" 2024-09-20 22:44:16 +02:00
K900 d8a54461fc Merge remote-tracking branch 'origin/staging-next' into staging 2024-09-20 07:27:56 +03:00
rnhmjoj 7efc956510
Revert "nixos/wireless: link config to /etc by default"
This reverts commit 89eb93dc3f.

It broken setups where /etc/wpa_supplicant.conf is configured
imperatively and reloading of the service on configuration changes.
2024-09-19 16:36:34 +02:00
github-actions[bot] b638e02a58
Merge staging-next into staging 2024-09-18 00:13:59 +00:00
h7x4 f954d6185c
wstunnel: exclude TLS arguments when enableHTTPS is false (#342203) 2024-09-17 21:30:58 +02:00
K900 87cbfcba1c Merge remote-tracking branch 'origin/staging-next' into staging 2024-09-17 21:07:02 +03:00
Michele Guerini Rocco e3191b8ded
nixos/dhcpcd: harden and run as unprivileged user (#336988) 2024-09-17 19:21:11 +02:00
K900 1047f0a6bf nixos/hostapd: set default channel to auto
The current default, 7, is, to put it nicely, absolutely ridiculous.

On 2.4 GHz, the only channels you should use are 1, 6 and 11, because
every other channel overlaps one of those and causes interference.

On 5/6 GHz, channel 7 does not exist at all.

Also, it's 2024, most things will support automatic channel selection,
and those that don't will likely need extra care to support prehistoric
hardware anyway.
2024-09-17 19:07:47 +03:00
Raymond Douglas e868bfa5b1
wstunnel: exclude TLS arguments when enableHTTPS is false 2024-09-16 14:27:42 -07:00
Felix Buehler 4cbff7e5d4 nixos/services.cloudflared: fix filterConfig 2024-09-16 20:47:07 +02:00
Sandro fd3ddb6b60
dnscrypt-wrapper: remove package and NixOS modules (#341838) 2024-09-16 11:25:30 +02:00
rnhmjoj 234b7541be
dhcpcd: move database to /var/lib 2024-09-16 08:07:56 +02:00
rnhmjoj b447fd58c7
nixos/dhcpcd: harden and run as unprivileged user 2024-09-16 08:07:55 +02:00
rnhmjoj aff5d1d523
nixos/dhcpcd: remove ntpd workaround
This workaround for NTP daemons has been there for 12 years and is most
likely not needed anymore.
2024-09-16 08:07:55 +02:00
rnhmjoj a432668acf
dhcpcd: disable privsep by default
The priviledge separation mode has several downsides:

  - it's incompatible with alternative memory allocators, including
    graphene-hardened;

  - it needs an unreleased patch to fix a crash;

  - it results in none less than 6 subprocesses running at any time,
    increasing the memory usage;

  - the privileged process (albeit not doing any networking related
    tasks) is still running as root, so it has complete access to the
    system.

Let's disable this by default and instead run dhcpcd as an unpriviledge
user with only the necessary capabilities.
2024-09-16 01:23:54 +02:00
azahi 94c62f5036
nixos/networking.firewall: fix refactor regression
This fixes a regression that was introduced in #335631
2024-09-16 01:10:55 +03:00
Masum Reza a5cfe01240
nixos/shairport-sync: Add pulse group also for pipewire (#341172) 2024-09-15 23:39:57 +05:30
misuzu 2505777e0c nixos/netbird: remove misuzu as maintainer 2024-09-15 12:57:13 +00:00
Felix Buehler 1cd7970bb8 nixos/services.matterbridge: remove with lib; 2024-09-15 10:43:57 +02:00
Felix Buehler 252e9bb1e7 nixos/services.lxd-image-server: remove with lib; 2024-09-15 10:43:57 +02:00
Felix Buehler 2e30f07cc0 nixos/services.logmein-hamachi: remove with lib; 2024-09-15 10:43:57 +02:00
Felix Buehler 196a14a174 nixos/services.lldpd: remove with lib; 2024-09-15 10:43:57 +02:00
Felix Buehler 0d57426bae nixos/services.lambdabot: remove with lib; 2024-09-15 10:43:57 +02:00
Felix Buehler 081c71df4b nixos/services.keybase: remove with lib; 2024-09-15 10:43:57 +02:00
Felix Buehler f3bb24eb64 nixos/services.jotta-cli: remove with lib; 2024-09-15 10:43:57 +02:00
Felix Buehler 6c50168c7c nixos/services.jitsi-videobridge: remove with lib; 2024-09-15 10:43:57 +02:00
Felix Buehler fee0a07c28 nixos/services.jigasi: remove with lib; 2024-09-15 10:43:57 +02:00
Felix Buehler 0cca8e9756 nixos/services.jicofo: remove with lib; 2024-09-15 10:43:56 +02:00
Felix Buehler 050c81941d nixos/services.ivpn: remove with lib; 2024-09-15 10:43:56 +02:00
Felix Buehler aa27551b00 nixos/services.iodine: remove with lib; 2024-09-15 10:43:56 +02:00
Felix Buehler b610b3cac2 nixos/services.inadyn: remove with lib; 2024-09-15 10:43:56 +02:00
Felix Buehler f69dd2df9a nixos/services.i2p: remove with lib; 2024-09-15 10:43:56 +02:00
Felix Buehler 49224ecc3b nixos/services.htpdate: remove with lib; 2024-09-15 10:43:56 +02:00
Felix Buehler 9ceab680a6 nixos/services.haproxy: remove with lib; 2024-09-15 10:43:56 +02:00
Felix Buehler f30e72ffbb nixos/services.hans: remove with lib; 2024-09-15 10:43:56 +02:00
Felix Buehler a811ef8255 nixos/services.gobgpd: remove with lib; 2024-09-15 10:43:56 +02:00
Felix Buehler 90a98fc103 nixos/services.go-shadowsocks2: remove with lib; 2024-09-15 10:43:55 +02:00
Felix Buehler 2ec70782ab nixos/services.go-neb: remove with lib; 2024-09-15 10:43:55 +02:00
Felix Buehler 9ca9ac0b51 nixos/services.go-autoconfig: remove with lib; 2024-09-15 10:43:55 +02:00
Felix Buehler 3e72e14a6d nixos/services.gnunet: remove with lib; 2024-09-15 10:43:55 +02:00
Felix Buehler 7a65f58698 nixos/services.globalprotect: remove with lib; 2024-09-15 10:43:55 +02:00
Felix Buehler 878c5dc6eb nixos/services.gitDaemon: remove with lib; 2024-09-15 10:43:55 +02:00
Felix Buehler 0b865525e8 nixos/services.gdomap: remove with lib; 2024-09-15 10:43:55 +02:00
Felix Buehler d0901224e1 nixos/services.gateone: remove with lib; 2024-09-15 10:43:55 +02:00
Felix Buehler 191b68cd26 nixos/services.frr: remove with lib; 2024-09-15 10:43:55 +02:00
Felix Buehler fdcec053e6 nixos/services.frp: remove with lib; 2024-09-15 10:43:55 +02:00
Felix Buehler 7cc95389d1 nixos/services.freeradius: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler a49fa6ee3b nixos/services.freenet: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler 688b08939c nixos/services.flannel: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler 00d0e3ba98 nixos/networking.firewall: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler e915ced804 nixos/networking.firewall.nftables: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler 15edaa6e16 nixos/networking.firewall.iptables: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler f12d3df878 nixos/services.fireqos: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler 17f8650ace nixos/services.ferm: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler abc0a6e035 nixos/services.expressvpn: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler 19e88959ef nixos/services.eternal-terminal: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler 6233a59db3 nixos/services.epmd: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler a09250d8ab nixos/services.envoy: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler aa2c039ab0 nixos/services.ejabberd: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler e59cdc8e99 nixos/services.doh-proxy-rust: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler 504abe12d1 nixos/services.dnsmasq: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler 3a05a07ef7 nixos/services.dnsdist: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler 56576f90e3 nixos/services.dnscache: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler 630754ae20 nixos/networking.dhcpcd: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler 8681b42c62 nixos/services.ddclient: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler 657cd334e6 nixos/services.dante: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler 4589149299 nixos/services.create_ap: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler 7fcd972c94 nixos/services.coturn: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler bd2d5c89ce nixos/services.corerad: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler c4bbbbbb10 nixos/services.coredns: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler 6c6b5e7f80 nixos/services.consul: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler 5438332690 nixos/services.cntlm: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler 5506afac27 nixos/services.cloudflared: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler 14f2d0a94b nixos/services.cloudflare-dyndns: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler a3c69c111e nixos/services.clatd: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler 742185f18c nixos/services.cjdns: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler f6077c6bcd nixos/services.chisel-server: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler 87c989da08 nixos/services.cgit: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler 8e6795a029 nixos/services.blocky: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler 939ba8a2c3 nixos/services.blockbook-frontend: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler d9c47dac16 nixos/services.bitlbee: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler 416649cbe6 nixos/services.birdwatcher: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler c666e7b2dd nixos/services.bird-lg: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler 9ce866bc9b nixos/services.bind: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler 42facf73b7 nixos/services.biboumi: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler 6bf37cd201 nixos/services.bee: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler 7da36d70ff nixos/services.babeld: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler eb8d4ed264 nixos/services.avahi: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler d861803952 nixos/services.autossh: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler 06032d6956 nixos/services.atftpd: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler 681161adb6 nixos/services.asterisk: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler d63146859b nixos/services.amule: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler 46dc82d477 nixos/services.alice-lg: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler b1bbe81c8d nixos/services.adguardhome: remove with lib; 2024-09-15 10:43:50 +02:00
Felix Buehler 02bb53fbc3 nixos/services._3proxy: remove with lib; 2024-09-15 10:43:50 +02:00
figboy9 ca5cb00a4c nixos/veilid: format with nixfmt-rfc-style 2024-09-15 10:37:36 +09:00
figboy9 a01561ab26 nixos/veilid: add a description of options 2024-09-15 10:35:52 +09:00
rnhmjoj 016f6f9f58
dnscrypt-wrapper: remove package and NixOS modules 2024-09-14 17:22:48 +02:00
figboy9 16002b1628 fix systemd service based on veilid package 2024-09-14 18:25:26 +09:00
figboy9 55a594468a change dataDir 2024-09-14 18:20:01 +09:00
figboy9 0ea2046bc5 make opening the firewall optional 2024-09-14 18:15:14 +09:00
figboy9 318014034a reduce options 2024-09-14 18:03:02 +09:00
Michael Hoang d25d241e38
Update nixos/modules/services/networking/tailscale.nix
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-09-12 23:06:23 +10:00
Aaron Andersen 768f41fcf0
Revert "nixos/openvpn: add extraArgs option" (#341223) 2024-09-12 06:34:16 -04:00
Michele Guerini Rocco b94f259714
nixos/wireless: reimplement secrets using ext_password_backend (#180872) 2024-09-11 19:58:36 +02:00
Aaron Andersen 45dd09667f
Revert "nixos/openvpn: add extraArgs option" 2024-09-11 12:59:03 -04:00
ghpzin 5ab2ff7a7a
nixos/quorum: update geth flags
- upstream commit changing ws args:
c989bca173
- upstream commit changing minerthreads arg:
f0998415ba
2024-09-11 13:25:32 +03:00
John Titor 1c7e6a2de9
nixos/shairport-sync: Add pulse group also for pipewire
Works according to https://github.com/mikebrady/shairport-sync/issues/1171

From 0e4664b497
2024-09-11 15:21:14 +05:30
Aaron Andersen 7398438255
nixos/openvpn: add extraArgs option (#339016) 2024-09-10 19:36:32 -04:00
h7x4 c2090cb303
wstunnel: the ping frequency can now also be configured for the server (#339232) 2024-09-10 10:27:42 +02:00
r-vdp 342b5a8b85
sshd: fix shellcheck warnings in prestart script 2024-09-08 12:24:00 +02:00
Naïm Favier 6840ba251c
nixos/networkmanager: set up /etc/ipsec.secrets as required by the L2TP plugin
The networkmanager-l2tp plugin expects /etc/ipsec.secrets to include /etc/ipsec.d/ipsec.nm-l2tp.secrets;
see https://github.com/NixOS/nixpkgs/issues/64965

In order for this to continue working if the strongswan module is
enabled, we use `"ipsec.secrets".text` instead of `.source` so that the
configurations of both modules are concatenated.
2024-09-07 17:28:25 +02:00
Gabriel Fontes 13f6e6da35
nixos/matterbridge: add services.matterbridge.package option 2024-09-06 17:07:41 -03:00
Sachi King 361fde84f9 Revert "nixos/firewall: fix reverse path check failures with IPsec"
The inclusion of the "meta ipsec" rule in the default reverse path
filtering breaks systems not built with specific XFRM kernel config
options.  Specifically CONFIG_XFRM must be set, which gets selected
by CONFIG_NFT_XFRM, which is hidden behind CONFIG_XFRM_USER.

These options are not selected by default in most defconfig's provided
by the kernel with the exception of some device-specific defconfigs.

These options are not set by the nix kernel common_config, and I would
argue that IPSec support does not belong in a minimal kernel as that
elevates its support status above other in-kernel VPN interfaces.

The contributor of this feature does not seem interested in working
towards a solution that does not break systems running kernels built
with "autoModules = false" while supporting this feature, and as this
silently breaks firewalls into an insecure state and poses an immediate
security issue I propose this be reverted until a solution that does not
break such systems is proposed.
https://github.com/NixOS/nixpkgs/pull/310857#discussion_r1742834970

Devices used as firewalls, if they do not have the required kernel
config, will fail to load the new firewall rules and will upon boot pass
traffic without any filtering into the internal network.

Devices exposed directly to the internet, after reboot, will boot
without filtering potentially exposing services not intended to be
exposed to the internet, such as databases.

The following platforms in nixpkgs appear to be impacted:
 - pc_simplekernel
 - pogoplug4
 - sheevaplug
 - zero-gravitas
 - zero-sugar
 - utilite
 - guruplug
 - beaglebone
 - fuloong2f_n32

References to hardware without autoModules can be found in
nixos-hardware, as well as in active third-party repos on github.

I suspect there are other users impacted that do not have their configurations
public, as autoModules = true leads to long compile times when targeting
kernels to less standard hardware or hardware with quirks that require
patches that cannot be upstreamed.

This reverts commit 3c12ef3f21.
2024-09-04 11:51:15 +10:00
r-vdp 20291241fd
wstunnel: the ping frequency can now also be configured for the server
See: https://github.com/erebe/wstunnel/pull/338
2024-09-03 10:38:43 +02:00
Pol Dellaiera 930e12b9e8
nixos/services.openssh: remove with lib; (#339092) 2024-09-03 10:18:32 +02:00
Assistant 8119ec6478 nixos/syncplay: add missing options
Exposes all currently available command-line arguments that were
missing, including some that were impossible to use with the catch-all
option `extraArgs` alone, requiring changes to other parts of the
system.
Those are now all self-contained in the module.
The service now uses systemd's `DynamicUsers`.
2024-09-02 22:26:11 -04:00
Felix Buehler 5f8696e39c nixos/services.openssh: remove with lib; 2024-09-02 22:31:36 +02:00
Aaron Andersen 5e8cc27962 nixos/openvpn: add extraArgs option 2024-09-02 09:49:02 -04:00
ilmari-lauhakangas 930f82eaf3
nixos/soju: use message-store instead of deprecated log in config
From message-store section in https://soju.im/doc/soju.1.html :
"(log is a deprecated alias for this directive.)"
2024-08-31 19:05:42 +03:00
Felix Buehler 97070a2ea6 nixos/services.libreswan: remove with lib; 2024-08-30 23:01:18 +02:00
Felix Buehler 92f17f012d nixos/services.kresd: remove with lib; 2024-08-30 23:01:16 +02:00
Felix Buehler 5960372742 nixos/services.kea: remove with lib; 2024-08-30 23:00:56 +02:00
Felix Buehler 717fa0dea5 nixos/services.dnscrypt-wrapper: remove with lib; 2024-08-30 23:00:56 +02:00
Michael Hoang 185948bd01 tailscale: only autoconnect after backend is up
Previously, if this service started before the backend is up,
`StatusText` would be empty leading to the service trying to run
`tailscale up` even if this device is already logged in.
2024-08-30 01:27:40 +10:00
Philip Taron f26f92db9a
nixos/services.mosquitto: remove with lib; (#338022) 2024-08-28 15:05:19 -07:00
Felix Buehler 481df957a6 nixos/services.mosquitto: remove with lib; 2024-08-28 22:53:06 +02:00
Florian Klink c8912137a3
wstunnel: 9.7.4 -> 10.0.1 (#335185) 2024-08-28 10:56:59 +02:00
Herwig Hochleitner 98ce61be57
nixos/smokeping: do homedir management with systemd.tmpfiles (#332050)
- ensures that everything in /var/lib/smokeping belongs to the service
- add nginx user to smokeping group, instead of allowing world to cd
  into somkeping homedir
2024-08-27 14:37:34 +02:00
Emily 1162c1ed62
{tvheadend,antennas}: drop (#336395) 2024-08-27 02:47:56 +01:00
Maciej Krüger 00f536f650
Merge pull request #310857 from rnhmjoj/pr-firewall
nixos/firewall: fix reverse path check failures with IPsec
2024-08-25 15:06:49 +02:00
rnhmjoj 89eb93dc3f
nixos/wireless: link config to /etc by default
This links the generated configuration to /etc/wpa_supplicant.conf
unless `allowAuxiliaryImperativeNetworks`. In the latter case the
file in /etc should be writable and the generated one remains only
in the Nix store.
2024-08-22 21:46:05 +02:00
Emily a565cfeac3 antennas: drop 2024-08-22 15:51:27 +01:00
Emily 6fa5767e07 tvheadend: drop
Closes: #332259
2024-08-22 15:51:27 +01:00
r-vdp 6cac9e409c
wstunnel: reformat with nixfmt 2024-08-21 10:46:04 +02:00
Jörg Thalheim c43e67f69b
Merge pull request #335344 from Mic92/harmonia
nixos/harmonia: switch to non-deprecated SIGN_KEY_PATHS
2024-08-21 07:01:22 +02:00
Emily 25bdc22ac8
Merge pull request #334495 from Sigmanificient/liboop
{liboop,lsh}: drop
2024-08-20 19:02:29 +01:00
Sigmanificient e959525e15 lsh: drop 2024-08-20 12:02:12 +02:00
euxane 1768115589 nixos/cgit: handle list setting type
The cgitrc file allows list of values to be set for some keys as
multiple definition lines.

This allows setting multiple "css" files to include or multiple
"readme" branch and file lookup paths to be set.
2024-08-19 08:13:49 +02:00
rnhmjoj f235dda87f
nixos/wireless: reimplement secrets using ext_password_backend
This replaces the current implementation (splicing the secrets into the
configuration file using environment variables) with the new built-in
mechanism ext_password_backend.

With some minor syntax changes, it works exactly as before, except the
heavy lifting is done by wpa_supplicant and probably less error-prone.
2024-08-18 08:46:00 +02:00
Jörg Thalheim aa994dd296 harmonia: switch to non-deprecated SIGN_KEY_PATHS 2024-08-17 13:11:06 +02:00
Morgan Jones 99714ac2fc
nixos/nebula: add missing with maintainers 2024-08-16 12:13:40 -07:00
Franz Pletz 4bd91be1ad
Merge pull request #333462 from Luflosi/nixos-iperf3-package-option 2024-08-16 14:46:53 +02:00
Jörg Thalheim d9e8fc4b72
Merge pull request #323785 from Mic92/zerotier
nixos/zerotierone: clean up local.conf symlinks unconditionally
2024-08-16 09:35:35 +02:00
iopq 16782bd556 v2raya: add cliPackage option
v2raya can now be run using the xray cli package as well
2024-08-16 15:31:59 +08:00
a-kenji 0f13d8a4ba nixos/unbound: fix typos in description and comment 2024-08-14 23:53:58 +02:00
Adam C. Stephens 0536436018
Merge pull request #316466 from uninsane/rebrand-trust-dns
hickory-dns: rename from trust-dns
2024-08-11 07:35:03 -04:00
Colin f9df9508f4 hickory-dns: rename from trust-dns 2024-08-11 07:59:32 +00:00
Rob Sears bdcd19eff5
package reference was removed in 03d57d7 (#333504) 2024-08-09 21:42:42 +02:00
Sandro 03d57d7420
Merge pull request #332806 from isabelroses/fix/wpa_supplicant 2024-08-09 18:19:56 +02:00
Luflosi d80d811a6f
nixos/iperf3: add package option 2024-08-09 16:01:01 +02:00
Bjørn Forsman 4265f4354c nixos/mosquitto: fix "listeners" option default
The option type is listOf, so the default should be an empty list, not
empty attrset.
2024-08-08 23:59:36 +02:00
Justinas Stankevicius 3fa182e7ec nixos/teleport: add required utils to path 2024-08-06 22:43:34 +03:00
isabel 78a5508605
nixos/wpa_supplicant: don't use removed wpa_supplicant_ro_ssids 2024-08-06 20:33:23 +01:00
Sandro 8b43ee5545
Merge pull request #330522 from xokdvium/dev/init-rathole
nixos/rathole: init module
2024-08-05 18:07:25 +02:00
Lin Jian 48966eacad
Merge pull request #328365 from Guanran928/cloudflare-dyndns
nixos/cloudflare-dyndns: introduce package option
2024-08-03 15:10:25 +08:00
Lin Jian 7b9ef31afd
Merge pull request #331800 from Guanran928/treewide/remove-periods-from-lib-mkenableoption
treewide: remove periods from lib.mkEnableOption
2024-08-03 12:53:41 +08:00
Felix Uhl 57d30c7a61
nixos/wg-quick: add generatePrivateKeyFile option (#331253)
This option is already present in the wireguard module, but missing from
the wg-quick module. This is very annoying, because it means you can't
easily get a safe and valid configuration on first boot when using
wg-quick.

This change adds the same option with the same description text and the
same script, but instead of generating an entire systemd unit dedicated
to creating the key file, it adds the script as a PreUp script, which
is a much simpler solution.

I've tested this in my own configuration, and it does indeed work.
wg-quick allows multiple PreUp scripts, which are run in order, and
all PreUp scripts are run before the private key is read from disk,
see `man wg-quick`.
2024-08-03 00:07:27 +04:00
Guanran Wang ea6f4d5e86
treewide: remove periods from lib.mkEnableOption
Co-authored-by: éclairevoyant <848000+eclairevoyant@users.noreply.github.com>
2024-08-02 23:55:32 +08:00
tomberek 3758fa1f50
Merge pull request #299339 from teto/teto/wireguard-compact-unit
networking.wireguard: generate leaner units
2024-08-02 03:18:16 -04:00
tomberek 7d29722746
Merge pull request #322035 from jpds/nixos-nats-validate-config
nixos/nats: Implemented configuration verification
2024-08-02 02:37:48 -04:00
Bjørn Forsman 849492e6e2 nixos/deconz: mention RaspBee hardware 2024-08-01 16:48:38 +02:00
Bjørn Forsman aeaf887dcb nixos/deconz: update URL to hardware products
There are multiple products/versions, so replace the "version 2" URL
with a landing page for all products.
2024-08-01 16:48:38 +02:00
Michele Guerini Rocco de8d752e98
Merge pull request #319188 from buckley310/2024-06-11-wpa-supplicant
nixos/wireless: fix quotes in config path
2024-08-01 09:32:05 +02:00
euxane 4f2da6c9c1 nixos/fcgiwrap: add option migration instruction errors
This adds migration instructions for the removed global shared instance
configuration of fcgiwrap.

Adding those explicit messages to the previous options requires moving
the newly defined options from `services.fcgiwrap.*` to
`services.fcgiwrap.instances.*` due to an option namespace clash.

`mkRenamedOptionModule` was not used because the previous options do
not directly map to the new ones. In particular, `user` and `group`
were described as setting the socket's permission, but were actually
setting the process' running user.

Co-authored-by: Minijackson <minijackson@riseup.net>
2024-07-31 11:02:37 +02:00
zimbatm 5a353f15cc nixos/nar-serve: add domain option 2024-07-31 09:57:37 +02:00
zimbatm ed47bba9ad nixos/nar-serve: add package option 2024-07-31 09:57:36 +02:00
K900 7f2ec487cc nixos/i2pd: actually fix, clean up a little bit 2024-07-30 11:07:37 +03:00
K900 268299ad04 nixos/i2pd: fix warning 2024-07-29 23:36:08 +03:00
Jörg Thalheim 5356420466 treewide: remove unused with statements from maintainer lists
$ find -type f -name '*.nix' -print0 | xargs -P "$(nproc)" -0 sed -i \
  -e 's!with lib.maintainers; \[ *\];![ ];!' \
  -e 's!with maintainers; \[ *\];![ ];!'
2024-07-29 10:06:20 +08:00
figboy9 67b152a087 Add figboy9 to module maintainers 2024-07-28 14:42:12 +09:00
figboy9 69c6e3352d nixos/veilid: Add veilid service module 2024-07-28 14:03:49 +09:00
Sergei Zimmerman e3e6e94010
nixos/rathole: init module
Adds a module for rathole package. The package itself
and this module is very similar to frp, so the options
and tests are not very far off from those for frp.
2024-07-28 01:25:01 +03:00
Florian Klink 21e3a4214f nixos/wvdial: init module 2024-07-27 19:11:02 +03:00
Aleksana 577a9c43f3
Merge pull request #330042 from Sigmanificient/remove-leading-space-description
treewide: remove trailing space in description
2024-07-26 23:48:02 +08:00
Dennis Stengele 6f3ba8d714
nixos/zeronsd: init module and package (#253610)
* zeronsd: init at 0.5.2

* nixos/zeronsd: init at 0.5.2

This is the module for the new zeronsd package.
2024-07-26 15:20:56 +02:00
Sigmanificient 543cd40ecc treewide: remove trailing space in description
Done using `grep -rP 'description\s+=\s+"[^"]+[ ]";' | cut -d ':' -f 1 |
xargs -i nvim {}` and sorting the opened files by hand, avoiding
generated packages list
2024-07-26 03:38:50 +02:00
Masum Reza 81cb83b07f
Merge pull request #290008 from eum3l/add-opengfw
opengfw: init at 0.4.0 (+NixOS module)
2024-07-24 20:39:41 +05:30
eum3l 86ae0fca93 nixos/opengfw: init 2024-07-24 15:11:23 +02:00
Silvan Mosberger 473e469d5a
Merge pull request #328381 from tie/map-attrs-flatten 2024-07-24 13:32:34 +02:00
Franz Pletz b12aaa9f9b
Merge pull request #316139 from Luflosi/bind-service-wait-for-ready-status 2024-07-23 00:19:53 +02:00
Jörg Thalheim f09ab69a7e nixos/zerotierone: clean up local.conf symlinks unconditionally 2024-07-20 16:39:56 +02:00
Ivan Trubach 7919709a23 nixos/modules: use mapAttrsToList instead of mapAttrsFlatten 2024-07-19 11:39:39 +03:00
Guanran Wang 782e8513d3
nixos/cloudflare-dyndns: introduce package option 2024-07-19 14:45:09 +08:00
Matthew Croughan be9599e3d4
nixos/scion: introduce package option (#327765) 2024-07-19 02:30:10 +02:00
Darragh Elliott 61820de2d4 ddns-updater: Add module, test, update script 2024-07-17 21:56:05 +00:00
Shiva Kaul 04967c307f nixos/spiped: remove broken chmod's from preStart
Remove `chmod`s which were (1) broken and (2) no longer considered good Nix practice.
2024-07-14 22:04:53 +10:00
Martin Weinelt e62de266ad
Merge pull request #326149 from mguentner/remove_mxisd_ma1sd
nixos/mxisd: remove module
2024-07-12 13:15:11 +02:00
Maximilian Güntner 23e62062bc
nixos/mxisd: remove module
mxisd and ma1sd are both unmaintained
2024-07-12 11:44:59 +02:00
Masum Reza ae20d8d61a
Merge pull request #325951 from mjoerg/magic-wormhole-python-3.12
magic-wormhole: make usable with Python 3.12
2024-07-11 15:32:13 +05:30
Sandro 24cefb01b3
Merge pull request #284419 from ocfox/realm 2024-07-11 10:46:47 +02:00
Trey Fortmuller 7b32ea9abb
nixos/cloudflare-warp: init
Co-authored-by: John Titor <50095635+JohnRTitor@users.noreply.github.com>
removed `with lib;` at the top level
cleanup
2024-07-10 22:48:57 +05:30
ocfox 86ce0733d2
nixos/realm: init
Co-authored-by: Nick Cao <nickcao@nichi.co>
Co-authored-by: oluceps <i@oluceps.uk>
2024-07-10 16:43:17 +02:00
Martin Joerg a85c314882 nixos/magic-wormhole-mailbox-server: use Python 3.11, adopt
magic-wormhole-mailbox-server is not yet supported with Python 3.12.
https://github.com/magic-wormhole/magic-wormhole-mailbox-server/issues/41
2024-07-09 22:22:56 +00:00
Martin Joerg 12de9a7469 nixos/magic-wormhole-mailbox-server: nixfmt 2024-07-09 22:22:56 +00:00
Franz Pletz f1d54d49b9
Merge pull request #325459 from numinit/nebula-module-tweaks
nixos/nebula: support non-path host keys
2024-07-09 16:59:35 +02:00
Franz Pletz 31c99a61da
Merge pull request #325286 from bjornfor/nixos-deconz-fix-service-stop
nixos/deconz: treat SIGTERM exit status as success
2024-07-09 15:07:36 +02:00
matthewcroughan c53e5201f4 nixos/scion: make storing path database optional
Storing the SCION path sqlite databases persistently on disk is a valid
setup that improves performance, but may have outstanding bugs that need
to be investigated, so this makes persisent storage optional, off by
default.
2024-07-08 13:26:30 +02:00
Morgan Jones de5e0cf11b
nixos/nebula: add numinit as maintainer
I maintain the package and coauthored this module, so should be on it.
:-)
2024-07-08 01:06:58 -07:00
Morgan Jones 95f1ebd2aa
nixos/nebula: loosen ProtectSystem
"strict" may be too strict for some PKCS#11 providers.
2024-07-08 01:04:15 -07:00
Morgan Jones b81827b992
nixos/nebula: allow string or path for keys
Nebula will be getting PKCS#11 support soon, and this will allow
keys to be specified as PKCS#11 URIs instead of paths.
2024-07-08 01:03:40 -07:00
Felix Buehler 72a4f148f9 nixos/bee: prefer 'install' over 'chmod' 2024-07-07 17:47:28 +02:00
Bjørn Forsman 5aab6344c2 nixos/deconz: treat SIGTERM exit status as success
deconz doesn't handle SIGTERM and terminates with code 143 (128 + 15
(SIGTERM) instead of 0. This results in systemd marking the service as
failed when a user stops it (with `systemctl stop deconz`). Fix it by
treating code 143 as success.
2024-07-07 16:11:11 +02:00
Aaron Andersen 6fa3ecdc73
Merge pull request #324464 from hraban/cloudflare-dyndns-frequency
cloudflare-dyndns: configurable systemd frequency
2024-07-04 21:02:43 -04:00
Masum Reza 9ec0508f83
Merge pull request #171855 from ju1m/prosody
nixos/prosody: support mod_http_file_share
2024-07-04 21:59:29 +05:30
Hraban Luyat 406351b470 cloudflare-dyndns: configurable systemd frequency 2024-07-03 22:50:45 -04:00
Tomas Kala 6930dd3dee nixos/blocky: Add an option for the package to be used
Previously, the blocky package was hardcoded to the one in pkgs. This
change allows to set it, so the user can configure the blocky service to
run blocky from nixpkgs-unstable, for example.
2024-07-03 13:42:34 +02:00
Thomas Gerbet 8ddb1bb721
Merge pull request #318599 from pacien/nixos-fcgiwrap-isolation
nixos/fcgiwrap: refactor to fix permissions
2024-07-02 21:52:33 +02:00
Sandro 15705830ce
Merge pull request #321061 from SomeoneSerge/prosody-logs
nixos/prosody: provide an (internal) escape hatch for overriding the …
2024-07-02 20:36:07 +02:00
Sandro 230c213fae
Merge pull request #314767 from Guanran928/mihomo
nixos/mihomo: add assertion for configFile
2024-07-02 20:27:36 +02:00
Cat ed1b6699c0
nixos/syncthing: implement folder type (#308832)
* Syncthing: implemented folder type

* Syncthing: fix syntax (via @johnhamelink )

This commit should be rebased/squashed into the previous one if ofborg cleares it!

Co-authored-by: John Hamelink <me@johnhame.link>

---------

Co-authored-by: John Hamelink <me@johnhame.link>
2024-07-02 19:49:03 +08:00
Janik H. 76cd1d2211 maintainers: drop janik
I guess my time has come as well...

With this commit, I'm not just dropping my maintainer entry, but I'm also
resigning from my duties as a board observer and NixCon project lead.
I also terminated my Summer of Nix contract today.
I'll also stop hosting the local NixOS meetup.

The only "project" I'll finish under the NixOS Foundation umbrella is
Google Summer of Code because the mentees aren't even remotely
responsible for why I'm leaving, and it would be unfair to leave them
hanging.

I'm grateful for all the things I was able to learn, for all the experiences
I could gather, and for all the friends I made along the way.
NixOS is what makes computers bearable for me, so I'll go and work on
some fork (*something something* you always meet twice in life).
2024-07-02 02:36:42 +02:00
Jasper Woudenberg 71e88077ca maintainers: remove jwoudenberg 2024-07-02 01:35:17 +02:00
Marcus Ramberg a449a2a14a
Merge pull request #321079 from res0Nanz/master
nixos/cloudflared: fix links in doc
2024-07-01 23:39:57 +02:00
pennae 5c5aaaaaae maintainers: remove pennae
https://discourse.nixos.org/t/nca-jonringer-joint-announcement/48231
https://web.archive.org/web/20240701165505/https://discourse.nixos.org/t/nca-jonringer-joint-announcement/48231

we had little faith in the NCA process, but this is going deep, *deep*
into the territory of wilfully insulting all those had placed even a
modicum of trust in that process.

have you fucking nazi bar.
2024-07-01 18:56:40 +02:00
Someone Serge 12c6d79e72 nixos/prosody: provide an escape hatch for overriding the logging configuration 2024-07-01 01:24:19 +00:00
tomberek 079457313a
Merge pull request #321930 from jtbx-prs/oink-after-network
nixos/oink: wait for network.target
2024-06-29 20:42:03 -04:00
Eman Lear 6c00b71662
Merge branch 'master' into master 2024-06-30 02:19:21 +08:00
Matthew Croughan d76ad79b4d
nixos/scion: use RuntimeDirectory instead of StateDirectory (#323200)
It was wrong to use StateDirectory to keep the scion-control and
scion-router runtime databases on disk for the next run. I observed that
doing this means a reboot, or power outage can corrupt the temporary
runtime databases for the next service start, leading scion ping and
other functionality to stop working permanently, since those files are
not managed in an atomic manner by the golang code.
2024-06-28 22:16:36 +02:00
Silvan Mosberger c8dec6df38
Merge pull request #322801 from eclairevoyant/discourage-mkpackageoptionmd
lib: deprecate mkPackageOptionMD
2024-06-27 20:15:08 +02:00
matthewcroughan 23c24527dc nixos/scion: add scion package when scion.enable = true 2024-06-27 11:52:04 +02:00
matthewcroughan 973108d3ed nixos/scion: use recursiveUpdate instead of // 2024-06-27 11:51:28 +02:00
éclairevoyant aeee4fc133
treewide: replace mkPackageOptionMD with mkPackageOption 2024-06-26 23:05:42 -04:00
Sandro 33f83c6252
Merge pull request #316977 from eclairevoyant/fix-mkEnableOption
treewide: fix mkEnableOption usage
2024-06-25 22:42:16 +02:00
Sandro 1813936aff
Merge pull request #272895 from xanderio/wg-access-server-0.10.1
wg-access-server: init at 0.12.1
2024-06-25 21:21:19 +02:00
Alexander Sieg 369cfec06d
nixos/wg-access-server: init module 2024-06-25 10:59:30 +02:00
Jonathan Davies 5ea0207b73
nixos/nats: Implemented configuration verification 2024-06-23 21:56:59 +01:00
Ryze 10962c7ca2
nixos/zerotierone: fix default value for localConf 2024-06-23 18:10:59 +03:00
Jeremy Baxter 923a86602e nixos/oink: wait for network.target 2024-06-23 21:34:40 +12:00
Gooxey d3140c11a5 nixos/antennas: removed WorkingDirectory setting
Antennas could not start because the specifed directory did not exist
2024-06-23 09:23:42 +02:00
euxane 3d10deb7a5 nixos/cgit: fix GIT_PROJECT_ROOT ownership
The GIT_PROJECT_ROOT directory is now created at runtime instead of
being assembled at build time.

This fixes ownership issues which prevented those repositories to be
read by users other than root. This also avoids creating symlinks in
the nix store pointing to the outside.
2024-06-22 19:45:25 +02:00
euxane 2d8626bf0a nixos/cgit: configurable user instead of root
This allows running cgit instances using dedicated users instead of
root. This is now set to "cgit" by default.
2024-06-22 19:45:25 +02:00
euxane c5dc3e2034 nixos/fcgiwrap: adapt consumer modules and tests 2024-06-22 19:45:25 +02:00
euxane 8101ae41f8 nixos/fcgiwrap: adapt consumer modules and tests 2024-06-22 19:45:25 +02:00
euxane bf2ad6f48c nixos/fcgiwrap: adapt consumer modules and tests
This also fixes the gitolite-fcgiwrap test by running git through
fcgiwrap as the proper user.
2024-06-22 19:45:25 +02:00
Jörg Thalheim 9f180c5438
Merge pull request #280517 from Mic92/zerotierone
nixos/zerotierone: make localConf mergeable
2024-06-21 15:32:05 +02:00
Jörg Thalheim 09ead1f6eb nixos/zerotierone: make localConf mergeable 2024-06-21 15:17:45 +02:00
Tom Hubrecht 938372e46e nixos/netbird: Remove thubrecht as maintainer 2024-06-21 09:32:46 +02:00
res0Nanz 16d8c11a33 nixos/networkd-dispatcher: fix links in doc
Ill-formatted markdown links fixed.
2024-06-20 00:52:12 +08:00
res0Nanz ae96067a6d nixos/cloudflared: fix links in doc
Ill-formatted markdown links fixed.
2024-06-20 00:49:01 +08:00
h7x4 4c7c3ceb12
nixosTests.wstunnel: init
Co-authored-by: r-vdp <ramses@well-founded.dev>
2024-06-18 11:07:06 +03:00
r-vdp 53e7bea45c
nixos/wstunnel: update the wstunnel module to work with the new rust implementation
Co-authored-by: h7x4 <h7x4@nani.wtf>
2024-06-18 11:07:06 +03:00
Tim Häring 7a7060c5bf
nixos/aria2: fix missing default 2024-06-15 12:55:06 +02:00
Tim Häring f6d3113164
nixos/aria2: fix remove not needed code 2024-06-15 12:51:29 +02:00
éclairevoyant 7d8742da87
treewide: fix mkEnableOption usage 2024-06-14 02:41:42 -04:00
Nick Cao 06b68ac5a3
Merge pull request #317840 from NeverBehave/pkg-ws-tunnel-rust
wstunnel: 0.5.1.0 -> 9.6.1
2024-06-13 13:31:08 -04:00
NeverBehave 3fb0e045a5 nixos/wstunnel: adopt rust new cli flags 2024-06-13 00:58:02 +00:00
Pol Dellaiera 7d270d53b9
Merge pull request #303429 from timhae/aria2-module
Aria2 module settings
2024-06-12 19:23:44 +02:00
Sean Buckley 36175fb9ad nixos/wireless: fix quotes in config path 2024-06-11 20:45:04 -04:00
Sandro da3214b120
Merge pull request #309551 from aca/master 2024-06-10 15:48:32 +02:00
Weijia Wang 9520d06979
Merge pull request #266450 from CRTified/adguardhome-fix-246461
nixos/adguardhome: run --check-config before merging
2024-06-10 12:46:26 +02:00
Guanran928 e27092e106
metacubexd: init at 1.140.0 (#297721)
* metacubexd: init at 1.140.0

* nixos/mihomo: add example for cfg.webui
2024-06-10 12:45:19 +02:00
Florian Klink 6a3a382d5b nixos/mycelium: add mycelium binary to systemPackages
It's now possible to invoke `mycelium {routes,peers} list`.
2024-06-08 15:01:32 +03:00
Thomas Churchman d226935fd7 nixos/ddclient: deprecate use, implement use{v4,v6}
Upstream replaced `use` with `use{v4,v6}`:
4a1b06630b/ChangeLog.md (new-features)
2024-06-07 17:28:25 +02:00
Keith Pine 6fda200fa4 nixos/inadyn: fix cache directory path
The CacheDirectory subdirectory is already part of $CACHE_DIRECTORY.
2024-06-07 09:03:24 +02:00
PatrickDaG 0fdf6e2917
nixos/netbird: fix defaults (#314656)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-06-07 00:02:06 +02:00
rnhmjoj 3c12ef3f21
nixos/firewall: fix reverse path check failures with IPsec
The endpoint of an IPsec tunnel receives encrypted IPsec packets that
are first decrypted and then forwarded to the intended destination.
The decrypted traffic appears to originate from the same interface it
came in from, so in most cases these packets will fail the reverse path
check even if legitimate.

This change adds an exception to not reject packets that were previously
IPsec-encrypted, meaning the have been accepted, decrypted and are in
the process of being forwarded to their final destinal.

Sources:

  - https://www.kernel.org/doc/Documentation/networking/xfrm_device.txt
  - https://git.netfilter.org/nftables/commit/?id=49f6e9a846c6c8325b95debe04d5ebc3c01246fb
  - https://git.netfilter.org/nftables/commit/?id=8f55ed41d007061bd8aae94fee2bda172c0e8996
  - https://thermalcircle.de/doku.php?id=blog:linux:nftables_demystifying_ipsec_expressions
2024-06-05 15:18:35 +02:00
Thomas Gerbet ef6fea2d86 openssh: move Kerberos support into a dedicated package
The `openssh` and `openssh_hpn` packages are now built without
the Kerberos support by default in an effort to reduce the attack surface.

The Kerberos support is likely used only by a fraction of the total users
(I'm guessing mainly users integrating SSH in an Active Directory env) so
dropping it should not impact too many users. It should also be noted that
the Kerberos/GSSAPI auth is disabled by default in the configuration.
`opensshWithKerberos` and `openssh_hpnWithKerberos` are added in order
to provide an easy migration path for users needing this support.

The `openssh_gssapi` package is kept untouched.
2024-06-05 19:45:31 +10:00
Sandro Jäckel 41452802cb
treewide: fix all obviously wrong mkEnableOptions 2024-06-03 13:20:32 +02:00
Guanran Wang 818fe57b73
nixos/mihomo: format using nixfmt 2024-06-03 10:20:58 +08:00
Guanran Wang f1034cab06
nixos/mihomo: drop default value from cfg.configFile 2024-06-03 10:20:58 +08:00
Ryan Horiguchi ea63e59edc nixos/adguardhome: fix typo 2024-06-02 21:01:11 +02:00
Sandro c6c60cca65
Merge pull request #315112 from sikmir/git-daemon 2024-06-02 17:08:43 +02:00
Julien Moutinho d4954e0df2 nixos/prosody: support mod_http_file_share 2024-06-01 22:23:20 +02:00
Luflosi 8e945401d5
bind: make systemd service wait for BIND to be ready
Without this change, the systemd unit will be marked as ready even though BIND has not finished starting yet.
This causes other units that depend on BIND to start even though BIND is not ready yet.
From https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900788: "Bind9 will daemonize itself _when it is ready_."

Also modify the NixOS test. With this change, waiting for the unit alone will ensure that BIND is ready to accept queries. I would have expected to see the test failing without this commit but with the `machine.wait_for_open_port(53)` line removed but I found this to not be the case most of the time. This is probably the case because the situation is inherently racy and on my machine BIND happens to start in time most of the time.
2024-05-31 13:33:29 +02:00
Franz Pletz 4e1b4397d9
Merge pull request #312472 from Ma27/networkd-option-rename
nixos/networkd: get rid of *Config attributes in lists
2024-05-30 04:06:01 +02:00
Martin Weinelt e0f4e4b535
Merge pull request #274425 from woffs/fix-274286
nixos/frr: adapt to frr-9
2024-05-30 02:33:26 +02:00
lassulus d6f07be682
Merge pull request #314889 from DavHau/pr_sshd
nixos/openssh: allow removing settings
2024-05-30 01:01:07 +02:00
Frank Doepper 4df955130e nixos/frr: adapt to frr-9
- fix #274286
- remove `-f configfile` from ExecStart
- use /etc/frr/${service}d.conf
- enable mgmtd when staticd is enabled
- don't frr-reload.py mgmtd
- remove obsolete lib.mdDoc
2024-05-29 11:07:39 +02:00
Nikolay Korotkiy ecddd99c6a
nixos/gitDaemon: add package option 2024-05-27 18:50:15 +04:00
Thomas Gerbet 00015f3ef9
Merge pull request #309036 from tomfitzhenry/sshd-package
nixos/ssh: add services.openssh.package
2024-05-27 09:40:31 +02:00
DavHau 3fe773a174 nixos/openssh: allow removing settings
# Motivation
So far it was not possible to configure sshd to allow password authentication only for a specific user. This is because in the generated config a `Match User xxx` section would be required before the global `PasswordAuthentication` is defined, as otherwise the global option always takes precedence.
The same problem occurs with multiple other options under `settings`.

# Done
This PR fixes that issue for all settings by simply allowing them to be overridden with `null`, which leads to a removal of that setting from the config.
The user can then correctly configure user specific settings using extraConfig, like this:
```
    Match User user1
    PasswordAuthentication yes
    Match all
    PasswordAuthentication no
```
2024-05-26 18:46:27 +02:00
Isabelle 56141e2236
nixos/wireguard: add option preShutdown for commands called before interface deletion (#310345) 2024-05-23 13:53:45 +02:00
Martin Weinelt 5d515c373e
nixos/kea: make ctrl-agent want network-online.target
If it wants to run after it, it needs to want it for it to be there.
2024-05-23 10:31:30 +02:00
Jeremy Baxter 20fc095a1c nixos/oink: init module 2024-05-23 10:12:53 +12:00
Maximilian Bosch c4fd7cf16d
nixos/networkd: get rid of *Config attributes in lists
This patch is about removing `wireguardPeerConfig`,
`dhcpServerStaticLeaseConfig` - a.k.a. the
AbstractSingletonProxyFactoryBean of nixpkgs - and friends.

As a former colleague said

> worst abstraction ever

I second that. I've written enough networkd config for NixOS systems so
far to have a strong dislike. In fact, these don't even make sense:
`netdevs.wireguardPeers._.wireguardPeerConfig` will be rendered into
the key `[WireGuardPeer]` and every key from `wireguardPeerConfig` is in
there. Since it's INI, there's no place where sections on the same level
as wireguardPeerConfig fit into. Hence, get rid of it all.

For the transition, using the old way is still allowed, but gives a
warning. I think we could drop this after one release.

The tests of rosenpass and systemd-networkd-dhcpserver-static-leases
were broken on the rev before, hence they were updated, but are still
not building.
2024-05-20 17:26:42 +02:00
Marie Ramlow 6478f80b17 nixos/rosenpass: move preStart into script to workaround systemd bug
Because of a systemd bug, using both ExecStartPre and ExecStart will fill up the systemd credentials directory,
which leads to rosenpass failing to start.
This will be fixed in systemd v256, see https://github.com/systemd/systemd/pull/31202

Related issue: https://github.com/NixOS/nixpkgs/issues/258371
2024-05-15 17:52:45 +02:00
Raghav Sood ec2f5e1cb9
Merge pull request #309615 from mkienitz/fix/vsftpd-assertion
Fix/vsftpd assertion
2024-05-15 23:09:28 +08:00
Sandro e2bfd6e9c3
nixos/kresd: add link to upstream doc 2024-05-15 13:19:21 +02:00
Tom Fitzhenry 54ba3732f1 hostapd: add "wpa2-sha1" to authentication.mode enum
This is required for some Kindles (e.g. Kindle Paperwhite 7th Gen),
and printers (e.g. Brother MFC-J4440DW).

OpenWRT typically adds "wpa_key_mgmt = WPA-PSK", per 3f28c422ba/package/network/config/wifi-scripts/files/lib/netifd/hostapd.sh (L44-L71)
2024-05-14 19:28:15 +10:00
Florian Klink aff6a121a3
Merge pull request #311039 from DavHau/pr_smokeping
nixos/smokeping: use nginx instead of thttpd
2024-05-13 01:11:59 +02:00
Franz Pletz ef26d99b37
Merge pull request #310873 from ivan/radvd-debuglevel
nixos/radvd: add debugLevel option
2024-05-12 22:23:24 +02:00
Andreas Rammhold d157db3480
Merge pull request #307051 from hax404/modules/tayga/mappings
nixos/tayga: add mappings option
2024-05-12 21:16:26 +02:00
DavHau 0b6c484848 nixos/smokeping: use nginx instead of thttpd
Motivation:
fixes #265953

Changes:
- deprecate `services.smokeping.port` in favor of the niginx native option
- mention in release notes
2024-05-12 13:31:11 +02:00
Bjørn Forsman 7909e0f7d6 nixos/pixiecore: fix apiServer example
Add missing http:// scheme. Without it pixiecore logs this and never
contacts the API server:

  [DHCP] Couldn't get bootspec for [REDACTED_MAC_ADDR]: Get "localhost:8080/v1/boot/[REDACTED_MAC_ADDR]": unsupported protocol scheme "localhost"
2024-05-11 23:01:35 +02:00
Ivan Kozik 0482e54050 nixos/radvd: add debugLevel option 2024-05-11 14:59:09 +00:00
Kyungrok Chung 81a58be20b nixos/tailscale: add extraSetFlags to configure daemon 2024-05-11 03:01:54 +09:00
Maximilian Kienitz aa93972d0b nixos/vsftpd: fix invalid implication in assertions 2024-05-06 23:26:09 +02:00
nicoo db5f88c41a
nixos/ssh: Make ~/.ssh/authorized_keys optional in AuthorizedKeysFiles (#279894) 2024-05-06 01:11:03 +00:00
Sandro bdd2e6b121
Merge pull request #309324 from evenbrenden/move-jotta-cli
nixos/jotta-cli: move to services.jotta-cli
2024-05-05 23:17:24 +02:00
Georg Haas e83b8cfd43
nixos/tayga: add mappings option 2024-05-05 21:10:51 +02:00
André Silva 7142a2dec9
Merge pull request #306655 from devusb/sunshine-update
sunshine: 0.23.0 -> 0.23.1
2024-05-05 19:14:28 +01:00
Even Brenden 9fa89d0e2c nixos/jotta-cli: move to services.jotta-cli 2024-05-05 19:30:16 +02:00
Weijia Wang 9ed8582721
Merge pull request #308622 from jmbaur/jbaur/clatd-minor-cleanup
Minor cleanups for clatd module and release notes
2024-05-04 19:25:11 +02:00
Tom Fitzhenry ff1c82ee07 nixos/ssh: add services.openssh.package
Motivation: Allow the sshd package to be built differently to the ssh
package (programs.ssh.package). For example, build sshd(1) without
openssl, but built ssh(1) with OpenSSL support.

Set the default to be programs.ssh.package, to preserve compatibility.
2024-05-04 23:14:47 +10:00
Carl Richard Theodor Schneider 3e86aba9d2 nixos/adguardhome: run --check-config before merging
To prevent merging configurations on different `schema_version`,
we will now check the existing configuration, which has the side-effect of
updating the `schema_version`.

Fixes #246461 as described in https://github.com/NixOS/nixpkgs/issues/246461#issuecomment-1667663556
2024-05-03 20:15:02 +02:00
éclairevoyant 512b6d9ad2
Merge pull request #308531 from sanxus/fix-extraConfig
nixos/networkmanager: fix incorrect documention about `extraConfig`
2024-05-03 18:08:44 +00:00
sanxus 6b7692c8f5
nixos/networkmanager: fix incorrect documention about extraConfig 2024-05-04 01:04:51 +08:00
Jared Baur 09073330e0
nixos/clatd: remove invalid startLimitIntervalSec
The `startLimitIntervalSec` option is not valid under `serviceConfig`.
2024-05-02 14:16:12 -07:00
nicoo 480b871f2d
Merge #305844: add clatd module and nixos test 2024-05-02 14:00:06 +00:00
Colin Sane 6034d354d7
nixos/trust-dns: fix invalid default for settings.zones option (#308513)
and fix a few documentation typos while here.
2024-05-02 12:34:04 +00:00
Sandro 2e9d7dca27
Merge pull request #302570 from evenbrenden/jottad-service 2024-05-02 10:25:30 +02:00
Felix Buehler 39dfdad529 pptpd: prefer 'install' over 'chmod/chown' 2024-04-30 22:33:17 +02:00
Weijia Wang f6a18241dd
Merge pull request #247828 from rhoriguchi/nixos/adguardhome
nixos/adguardhome: update config to match new schema, update package and fix update script
2024-04-30 16:44:10 +02:00
Georg Haas 0c42398c9d
nixos/clatd: init 2024-04-29 23:29:29 +02:00
Even Brenden 021a0ffe57 nixos/jotta-cli: init jotta-cli
See https://github.com/NixOS/nixpkgs/issues/300063.
2024-04-29 09:14:47 +02:00
Vladimír Čunát 5cb7aa5ec9
nixos/knot: use a more precise type for .settings
See discussion on PR #304373
2024-04-28 10:26:09 +02:00
Tom 97bb1199c0 maintainers: remove twitchyliquid64
Yall won't miss me. The packages I leave orphaned are trivially updated as dependents need the new versions.

But passively endorsing the direction this organization and its leadership is something I can't do.

To those who still have faith in turning this around, you da real MVP 🖖
2024-04-26 22:48:31 -07:00
Sarah Brofeldt 75541131ef
Merge pull request #306608 from Tom-Hubrecht/netbird-coturn
nixos/netbird: Fix configuration of coturn server
2024-04-27 07:35:02 +02:00
Dave Anderson 308cb342c9 maintainers: drop danderson 2024-04-26 11:36:50 -07:00
北雁 Cryolitia 13e6ece470
nixos/sunshine: add autoStart attr 2024-04-25 16:53:24 +08:00
Morgan Helton 34b255b69b nixos/sunshine: add literalExpression for examples 2024-04-24 19:17:57 -05:00
Tom Hubrecht 5ad0ea1aaf nixos/netbird: Fix configuration of coturn server 2024-04-24 20:35:32 +02:00
Thomas Gerbet ecd2d35be0
Merge pull request #305742 from tomfitzhenry/ssh-no-pam
nixos/ssh: expose UsePAM and PrintMotd as options
2024-04-24 09:40:24 +02:00
Tom Fitzhenry 3fd9ef4b40 nixos/ssh: allow PrintMotd to be enabled 2024-04-23 22:53:09 +10:00
Tom Fitzhenry 2e51a2fd03 nixos/ssh: allow UsePAM to be disabled 2024-04-23 22:40:58 +10:00
Maximilian Bosch 2ee96a1738
nixos: fix manual build
`mdDoc` is deprecated!
2024-04-21 23:28:46 +02:00
Pol Dellaiera 95d8be4d3c
Merge pull request #301514 from r-vdp/nftables-rpfilter-extra-rules
nixos/firewall-nftables: allow adding additional rules to the rpfilter chain
2024-04-21 23:02:01 +02:00
Sandro 04a3a2a8fe
Merge pull request #260962 from lunik1/inadyn-module
nixos/inadyn: init
2024-04-21 21:38:22 +02:00
Michele Guerini Rocco 8b93a430dc
Merge pull request #305689 from rnhmjoj/pr-fix-wpa-secrets
nixos/wireless: correctly handle secrets containing &
2024-04-21 16:07:42 +02:00
rnhmjoj 89a1bde018
nixos/wireless: correctly handle secrets containing &
In the replacement arg of gsub() the & symbol is a special character
that need to be escaped. To avoid this, and further issues due to the
variable name possibly being interpreted as a regex, we do a normal
substring replacement.

This fixes issues #279803.
2024-04-21 09:58:26 +02:00
rnhmjoj 4fa107f1c9
nixos/wireless: create empty config for imperative setup
If allowAuxiliaryImperativeNetworks is enabled, the wpa_supplicant
daemon complains fails to start if /etc/wpa_supplicant.conf does not
exist. As this can be created using wpa_cli (or similar) later, it
shouldn't matter, so let's create an empty one.

This fixes issues #157537, #299466.
2024-04-21 02:10:32 +02:00
Sandro 5bfe2b6964
Merge pull request #294641 from devusb/sunshine-module
nixos/sunshine: init
2024-04-20 21:32:50 +02:00
Bjørn Forsman c7ab550bbc nixos/deconz: fix curl redirect option in postStart
It should be curl -L (follow redirects), not curl -l (FTP directory
listing option). I know because it's my mistake.

Fixes: d4b989cafc ("nixos/deconz: delay signalling service readiness until it's actually up")
2024-04-20 20:24:39 +02:00
Ryan Lahfa 21bd30ea2f
Merge pull request #247118 from Tom-Hubrecht/netbird-server
nixos/netbird-server: init module
2024-04-20 11:21:10 +02:00
Ryan Horiguchi c60dd90d1f nixos/adguardhome: update config to match new schema 2024-04-19 18:42:52 +02:00
Martin Weinelt 666b73468d
Merge pull request #304373 from SuperSandro2000/knot-settings
nixos/knot: use module system to combine settings option
2024-04-19 17:26:53 +02:00
Tim Häring 31c9eec061
nixos/aria2: add settings option
I also took the liberty to add myself as module maintainer
2024-04-18 21:04:27 +02:00
Tom Hubrecht 6d91c95fce nixos/netbird-server: init module 2024-04-18 15:33:18 +02:00
Sandro f417891699
Merge pull request #293954 from Dan-Theriault/refactor-tailscale-auth 2024-04-18 15:14:01 +02:00
Lily Foster 59742f6f72
Merge pull request #292472 from Janik-Haag/networkmanager-tests
nixosTests.networking: refactor and add NetworkManager support
2024-04-18 06:38:37 -04:00
Atemu 3bdc0e7715
Merge pull request #304810 from ju1m/dnscrypt-proxy2
nixos/dnscrypt-proxy2: fix cross-compiling
2024-04-18 09:04:41 +02:00
Bjørn Forsman d4b989cafc nixos/deconz: delay signalling service readiness until it's actually up
Fixes test flakiness (`nix-build -A nixosTests.deconz`).
2024-04-17 22:32:15 +02:00
Janik H. 8612ed1ee9
nixos/networkmanager: change config generation to use the ini generator 2024-04-17 21:20:11 +02:00
Julien Moutinho 6fd2d4b541 nixos/dnscrypt-proxy2: fix cross-compiling 2024-04-17 16:41:51 +02:00
Pascal Wittmann 6ae4216336
Merge pull request #303890 from oluceps/ss-module
nixos/shadowsocks: ensure password be set
2024-04-17 11:17:23 +02:00
Dan Theriault 3cf6c4ddb3 nixos/tailscale-auth: init module
This additional module allows the tailscale auth proxy to be configured
independently of nginx. The tailscale auth proxy works with both caddy
and traefik. All prior nginx/tailscale-auth options are retained as
aliases.
2024-04-16 19:06:08 -04:00
oluceps c2c632ff31
nixos/shadowsocks: ensure password be set
Co-authored-by: Pascal Wittmann <mail@pascal-wittmann.de>
2024-04-16 13:34:08 +00:00
Christoph Hrdinka 19dd20aa06
Merge pull request #299581 from Stunkymonkey/nsd-chmod-install
nixos/nsd: prefer 'install' over 'chmod'
2024-04-16 08:59:47 +02:00
Sandro Jäckel 490ba58dd7
nixos/knot: use module system to combine settings option 2024-04-15 23:19:45 +02:00
Felix Buehler 3e2f0bc0b4 nixos/nsd: prefer 'install' over 'chmod' 2024-04-14 20:56:19 +02:00
stuebinm c0c2f2903f lib.mdDoc: remove and replace with warning 2024-04-13 10:07:35 -07:00
stuebinm 6afb255d97 nixos: remove all uses of lib.mdDoc
these changes were generated with nixq 0.0.2, by running

  nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix
  nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix
  nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix

two mentions of the mdDoc function remain in nixos/, both of which
are inside of comments.

Since lib.mdDoc is already defined as just id, this commit is a no-op as
far as Nix (and the built manual) is concerned.
2024-04-13 10:07:35 -07:00
Weijia Wang 11f3e0c15d mongodb-4_4: drop 2024-04-12 12:30:40 +02:00
Sandro 5c26e13e2a
Merge pull request #266109 from linsui/i2p 2024-04-11 15:51:57 +02:00
Jared Baur c1d5363ecc
nixos/cloudflared: fix docs for tlsTimeout
The URL and link text were swapped.
2024-04-10 21:12:51 -07:00
Rick van Schijndel 067e519281
Merge pull request #302858 from tweag/infinisil-maintainer
treewide: Drop infinisil as maintainer from most packages
2024-04-10 08:50:38 +02:00
Silvan Mosberger ea5dfeab93 treewide: Drop infinisil as maintainer from most packages
I'm not going anywhere, I'm focusing my energy on other issues, and
getting pinged as a maintainer for packages is a bit distracting (also
I'm not using most of these packages anyways!)
2024-04-09 21:43:39 +02:00
Jörg Thalheim fb158384bd
Merge pull request #289270 from Mic92/nixos-tinc
nixos/tinc: fix user to not include . in its name
2024-04-09 19:43:48 +02:00
Florian Klink 1dab5d7c77
Merge pull request #302228 from xzfc/bind-ipv6
bind: allow recursive queries from IPv6 loopback
2024-04-08 18:35:18 +03:00
linsui 1f761a49ce i2p: cleanup and build jbigi from source 2024-04-08 22:29:23 +08:00
Sandro b32f206faa
Merge pull request #258520 from Benjamin-L/soju-admin-socket 2024-04-08 10:20:31 +02:00
Benjamin Lee d772ac182f
nixos/soju: add sojuctl wrapper with config path
The config is a in an arbitrary nix store path, and is necessary to
invoke sojuctl. Without the wrapper, you have to read the systemd unit
or use a similar trick to find it.
2024-04-07 13:45:47 -07:00
Benjamin Lee 5207bb723a
nixos/soju: add adminSocket.enable option 2024-04-07 13:45:19 -07:00
Benjamin Lee 4959d7bcd8
nixos/soju: add package option 2024-04-07 13:45:17 -07:00
Felix Buehler 25e8a273af nixos/xl2tpd: prefer 'install' over 'chmod/chown' 2024-04-07 18:58:51 +02:00
Guanran Wang 63c0c98167
nixos/mihomo: fix option description 2024-04-07 21:47:03 +08:00
Albert Safin 9b383de757 bind: allow recursive queries from IPv6 loopback 2024-04-07 01:14:38 +00:00
Silvan Mosberger a448a21521
Merge pull request #301556 from edef1c/lib-xor
lib: add xor
2024-04-04 22:03:53 +02:00
edef 725bb4e48c lib: add xor
This gets clumsily reimplemented in various places, to no useful end.
2024-04-04 19:46:58 +00:00
lunik1 2eb085d9b5
nixos/keepalived: remove syslog.target 2024-04-04 16:07:48 +02:00
lunik1 963f17c958
nixos/connman: remove syslog.target 2024-04-04 16:07:48 +02:00
r-vdp 1eb26d4140
nixos/firewall-nftables: allow adding additional rules to the rpfilter chain 2024-04-04 13:07:52 +02:00
Pol Dellaiera 537d34da58
Merge branch 'master' into technitium-dns-server-module 2024-04-04 08:25:51 +02:00
FabianRig f126a02f2f nixos/technitium-dns-server: init module 2024-04-04 07:41:52 +02:00
Aleksana cd6f498571
Merge pull request #301084 from LostAttractor/fix/v2raya
nixos/v2raya: fix nftables support
2024-04-03 22:09:33 +08:00
ChaosAttractor 865f976ddd
nixos/v2raya: fix nftables support 2024-04-03 16:07:02 +08:00
Christoph Hrdinka 04b315de7b
Merge pull request #290510 from melvyn2/nsd-options
nixos/nsd: add multi-master-check and zonefiles-write options
2024-04-03 09:07:06 +02:00
melvyn 46232e9f23
nixos/nsd: add multi-master-check, zonefiles-write, remove database options
The database option and functionality was completely removed in nsd 4.8.0
Also remove obselete lib.mdDoc option strings
2024-04-02 10:11:40 -07:00
Felix Buehler 43f956227e nixos/cjdns: prefer 'install' over 'chmod' 2024-04-02 08:43:20 +00:00
lunik1 121490461b
nixos/inadyn: init 2024-04-01 01:24:46 +01:00
Morgan Helton dd2c6f1840 nixos/sunshine: init 2024-03-30 20:07:35 -05:00