Commit graph

4793 commits

Author SHA1 Message Date
rnhmjoj 54a6949722
nixos/tests/networking: test hostname via DHCP 2025-05-05 21:59:33 +02:00
rnhmjoj bf1cf6bffc
nixos/dhcpcd: fix hostname via DHCP 2025-05-05 21:53:45 +02:00
h7x4 beb9d5230c
coturn: add systemd support (#394670) 2025-05-05 12:53:47 +02:00
Jonathan Davies 86d94b2d88
nixos/ntpd-rs: Handle configuring timeserver FQDN as a pool 2025-05-04 14:30:12 +00:00
Henry-Hiles f2cdf605c3
nixos/livekit: Fix docs issues 2025-05-03 21:52:26 -04:00
Jeremy Fleischman 1b7b89c4ef
Demonstration of an alternate way to embed secrets into syncthing config 2025-05-03 12:43:42 -07:00
Wael Nasreddine c2dcf9be27
nixos/ncps: delete failing secretKeyPath assertion and wait for network-online.target (#396901) 2025-05-01 14:33:24 -07:00
Edward Hesketh 414b7c5a01
nixos/ncps: wait for network-online, remove failing assertion
- Start after network-online as ncps requires all upstreams to be online
  and reachable when starting
- Remove a bad assertion causing failures at eval time when using
  secrets management systems
2025-04-30 19:57:31 +01:00
Martin Weinelt 7cd06772e3
nixos/livekit: init, nixos/lk-jwt-service: init (#399627) 2025-04-29 12:44:07 +02:00
Vladimír Čunát 85f896ec76
nixos/kresd: add kresd-cli wrapper script (#388290) 2025-04-28 17:58:22 +02:00
r-vdp 58013c9fb2
nixos/mycelium: pull in network-online.target
The test was failing because it waits for network-online.target which
was not part of the transaction.
2025-04-28 10:42:15 +02:00
NullCube b2714cd757 nixos/anubis: adjust provided options 2025-04-26 15:22:26 -07:00
NullCube f826658cb4 nixos/anubis: fix user-defined defaultOptions not applying to instances 2025-04-26 15:22:26 -07:00
Jeremy Fleischman 7161a83931
services(cloudflare-dyndns): use new CLOUDFLARE_API_TOKEN_FILE setting
We recently upgraded to cloudflare-dyndns 5.3:
24f9910708,
so we can now use this new `CLOUDFLARE_API_TOKEN_FILE` feature that
landed in v5.2: 1d563d2752
2025-04-24 18:25:32 -07:00
NullCube a47513760e nixos/anubis: add nullcube as maintainer 2025-04-24 17:38:49 -07:00
Morgan Jones 36cddaaa6f
nixos/kismet: init module
Use vwifi to write a proper test for Kismet. This test demonstrates how
to simulate wireless networks in NixOS tests, and extract meaningful
data by putting an interface in monitor mode using Kismet.
2025-04-20 15:39:23 -07:00
Morgan Jones 583a74d8ad
nixos/vwifi: init module
This module does not currently have its own test suite: it is intended
to be used in test suites for other modules that use wifi.
2025-04-20 15:39:22 -07:00
Henry-Hiles d237673ba4
nixos/livekit: init 2025-04-20 12:22:51 -04:00
Nico Felbinger e0d1b49a46
chore: move meta option to top level in many modules 2025-04-19 18:27:48 +02:00
bornav 43ead788f9
Made service restart after 5s 2025-04-19 12:09:28 +02:00
Sandro Jäckel 52525af4aa
nixos/kresd: add kresd-cli wrapper script 2025-04-18 20:53:20 +02:00
Robert James Hernandez 9b70561e15 nixos/ax25/axlisten: init 2025-04-15 23:54:45 +00:00
Robert James Hernandez 4001d9db5d nixos/ax25/axports: init 2025-04-15 23:54:45 +00:00
nixpkgs-ci[bot] 049254d36c
Merge master into staging-next 2025-04-11 12:06:12 +00:00
Michael van Straten a890891acc nixos/godns: init module
Initial implementation of the GoDNS service module. This module allows users to enable and configure the GoDNS service on their NixOS system. It includes options for specifying the GoDNS package and the path to the configuration file.
2025-04-11 11:25:47 +02:00
nixpkgs-ci[bot] b66e31c26a
Merge master into staging-next 2025-04-09 16:04:15 +00:00
Adam C. Stephens f2200ca6ee
nixos/anubis: init module (#392018) 2025-04-09 09:23:35 -04:00
nixpkgs-ci[bot] 6c98e107c7
Merge master into staging-next 2025-04-09 00:15:45 +00:00
Ivan Trubach bcd6066a34
centrifugo: 5.4.9 -> 6.1.0 (#396824) 2025-04-09 00:03:46 +03:00
Vincent Breitmoser ffcc12d192 centrifugo: add release note and assertion for compatibility 2025-04-08 14:21:46 +02:00
K900 0842b11f2b Merge remote-tracking branch 'origin/master' into staging-next 2025-04-08 09:29:48 +03:00
Tristan Ross 3789fbc4fc
nixos/nebula: add CAP_NET_BIND_SERVICE when lighthouse node serves DNS (#353665) 2025-04-07 17:27:03 -07:00
K900 05bc93a58a Merge remote-tracking branch 'origin/master' into staging-next 2025-04-06 11:20:16 +03:00
Leona Maroni cfc266b7e3
nixos/bird-lg: Remove deprecation warnings (#394010) 2025-04-06 09:59:29 +02:00
fredrikr79 0e68b25955 nixos/coturn: allow unix socket
hardening previously disallowed unix socket, which is used for the
systemd notify communication.
2025-04-05 16:50:08 +02:00
fredrikr79 1a1b233998 nixos/coturn: switch systemd service type to notify 2025-04-05 16:50:08 +02:00
Cassie Cheung cadf4cfc83
nixos/anubis: init module 2025-04-05 21:48:39 +08:00
nixpkgs-ci[bot] 276f9ec976
Merge master into staging-next 2025-04-04 00:15:35 +00:00
Pol Dellaiera 03bf44b9ea
nixos/freenet: refactor, migrate to runTest (#391886) 2025-04-03 21:03:40 +02:00
nixpkgs-ci[bot] 51d40a0f08
Merge staging-next into staging 2025-04-03 12:06:39 +00:00
Daniel Nagy 0604d0aedd
nixos/freenet: refactor 2025-04-03 10:15:00 +02:00
Vojtěch Káně b25b9e656a nixos/dhcpcd: fix typo in documentation
The manpage of dhcpcd says:

>If any interface reports a working carrier then dhcpcd will try to
>obtain a lease before forking to the background, otherwise it will fork
>right away.
2025-04-03 10:10:37 +02:00
Silvan Mosberger e52d633a63 Merge remote-tracking branch 'upstream/staging-next' into staging 2025-04-02 18:30:54 +02:00
Aurimas Blažulionis d8b850d88f
syncthing: expose encryptionPassword
- Change `folder.devices` type into `oneOf [(listOf str) (attrsOf
  (submodule { ... }))]`.
- Expose `encryptionPassord` within the attrSet of the devices option.

This allows the user to set the encrpyption password use to share the
folder's data with. We do this by file path, as opposed to string
literal, because we do not want to embed the encrpyption password into
the nix store.
2025-04-01 14:20:31 -05:00
Aurimas Blažulionis 848e754b81
syncthing: handle encryptionPassword secret
Rewrite the syncthing config update script to embed secrets into the
json request. Specifically, we handle the `encryptionPassword` secret.
With this code, the user can embed path to the encrpyption password for
a given device the folder is shared with, and have it loaded in, without
touching the nix store.
2025-04-01 14:20:31 -05:00
K900 30edc74585 Merge remote-tracking branch 'origin/staging-next' into staging 2025-04-01 21:12:38 +03:00
Silvan Mosberger 374e6bcc40 treewide: Format all Nix files
Format all Nix files using the officially approved formatter,
making the CI check introduced in the previous commit succeed:

  nix-build ci -A fmt.check

This is the next step of the of the [implementation](https://github.com/NixOS/nixfmt/issues/153)
of the accepted [RFC 166](https://github.com/NixOS/rfcs/pull/166).

This commit will lead to merge conflicts for a number of PRs,
up to an estimated ~1100 (~33%) among the PRs with activity in the past 2
months, but that should be lower than what it would be without the previous
[partial treewide format](https://github.com/NixOS/nixpkgs/pull/322537).

Merge conflicts caused by this commit can now automatically be resolved while rebasing using the
[auto-rebase script](8616af08d9/maintainers/scripts/auto-rebase).

If you run into any problems regarding any of this, please reach out to the
[formatting team](https://nixos.org/community/teams/formatting/) by
pinging @NixOS/nix-formatting.
2025-04-01 20:10:43 +02:00
Tanya Arora 8125d74e21
nixos/dnsmasq: Fix failure on read-only /etc when resolveLocalQueries=false (#391738) 2025-04-01 17:59:21 +02:00
e1mo 6764561f3e
nixos/bird-lg: Remove deprecation warnings
The deprecation warning has been in place for quite some time now, so it
should be safe to get rid of it and clean the module up a bit.
2025-03-28 14:49:05 +01:00
nixpkgs-ci[bot] 3ed34914ea
Merge staging-next into staging 2025-03-28 00:15:57 +00:00
lassulus 3e7ce75dc1
jitsi-meet and prosody Added ownerallowkick patch and all_owners module (#155755) 2025-03-27 16:18:08 -07:00
Pol Dellaiera 952001e9bb
blocky: bugfix, add systemd hardening, log, adjust: startup targets (#388962) 2025-03-27 21:46:59 +01:00
Marcel Novotny 2411e6eecd Added Allowners muc module to prosody and jitsi-meet 2025-03-25 23:17:58 +01:00
Bouke van der Bijl 133974d017
nixos/tailscale-auth: restart on-failure and wait for tailscaled 2025-03-25 11:08:23 +01:00
PAEPCKE, Michael 00a39d3964
blocky: add systemd hardening, add log, readjust startup targets 2025-03-24 06:11:33 +00:00
nixpkgs-ci[bot] 080d906664
Merge staging-next into staging 2025-03-24 06:05:33 +00:00
Adam C. Stephens f0b334dde5
nixos/hickory-dns: combine Hint and Forward zone types into one (#388980) 2025-03-23 22:32:51 -04:00
nixpkgs-ci[bot] b4d0fe2499
Merge staging-next into staging 2025-03-24 00:16:41 +00:00
Sandro Jäckel 8fd6f73140
nixos/xrdp: use --replace-fail with substituteInPlace, try #2 2025-03-23 21:59:29 +01:00
K900 d9e165e9af
Revert "nixos/xrdp: use --replace-fail with substituteInPlace" 2025-03-23 21:58:08 +03:00
Pol Dellaiera 4ef28312db
Revert "nixos/syncthing: missing --fail to curl" (#392178) 2025-03-23 19:39:58 +01:00
Sandro Jäckel 3d0f2b0606
nixos/xrdp: use --replace-fail with substituteInPlace 2025-03-22 22:29:55 +01:00
Bjørn Forsman d0e369e425 Revert "nixos/syncthing: missing --fail to curl"
This reverts commit a8b8f8f8c7.

It introduced a failure in the syncthing service, where it hangs at the
curl step, repeatedly printing this:

  l3ijkvb20h5nnffg5q25i4nmcsbf7glx-merge-syncthing-config[1458]: curl: (22) The requested URL returned error: 404
  l3ijkvb20h5nnffg5q25i4nmcsbf7glx-merge-syncthing-config[1458]: curl: (22) The requested URL returned error: 404
  l3ijkvb20h5nnffg5q25i4nmcsbf7glx-merge-syncthing-config[1458]: curl: (22) The requested URL returned error: 404
  [...]

This is unfortunately not detected by `nix-build -A syncthing.tests`.

Ref https://github.com/NixOS/nixpkgs/pull/390742
2025-03-22 20:05:16 +01:00
nixpkgs-ci[bot] 3b3300fdd1
Merge staging-next into staging 2025-03-22 12:05:57 +00:00
jopejoe1 e267d07816
nixos/shairport-sync: add freeform config (#363739) 2025-03-22 09:01:54 +01:00
nixpkgs-ci[bot] 56654a8868
Merge staging-next into staging 2025-03-22 06:05:08 +00:00
Austin Horstman 469f2ca232
clatd: 1.6 -> 2.1.0 (#390764) 2025-03-21 23:46:50 -05:00
nixpkgs-ci[bot] c060400edc
Merge staging-next into staging 2025-03-22 00:15:18 +00:00
Nick Cao d2fcc2fd84
python312Packages.rtslib: 2.2.0 -> 2.2.2 (#389871) 2025-03-21 18:40:32 -04:00
Sirio Balmelli 40567b6b8d
nixos/nebula: add DNS options
Add the options:

- lighthouse.serve_dns
- lighthouse.dns.host
- lighthouse.dns.port

Improve systemd capabilities handling:

- do not give CAP_NET_ADMIN when tunnel interface is disabled
- give CAP_NET_BIND_SERVICE when DNS is enabled

Add self as maintainer: I'm using Nebula on NixOS in prod.

Signed-off-by: Sirio Balmelli <sirio@b-ad.ch>
2025-03-21 13:21:45 +01:00
nixpkgs-ci[bot] 529326e679
Merge staging-next into staging 2025-03-21 12:06:31 +00:00
Jared Baur 300efce181
nixos/clatd: allow AF_UNIX communication
This is needed since clatd will use networkctl to attempt to obtain the
PLAT prefix, and networkctl uses UNIX domain sockets to communicate with
the systemd-networkd daemon over DBus.
2025-03-21 01:12:13 -07:00
schnusch bc72dc08f2 nixos/vdirsyncer: only use ProtectHome=yes with DynamicUser=yes
If a user is given it seems likely that their home directory is accessed.
2025-03-21 01:51:20 +01:00
nixpkgs-ci[bot] 1cf5157bf0
Merge staging-next into staging 2025-03-20 18:05:48 +00:00
Kerstin aaf715153c
nixos/radicale: assertion so that users set settings.auth.type explictly (#391531) 2025-03-20 18:22:31 +01:00
Kerstin Humm c48d0033f7
nixos/radicale: assertion so that users set settings.auth.type explicitly 2025-03-20 11:15:20 +01:00
K900 85b2817da5 Merge remote-tracking branch 'origin/staging-next' into staging 2025-03-20 13:14:18 +03:00
Jeremy Fleischman 9c02a1e422
services/cloudflare-dyndns: require that apiTokenFile be an api token
Previously, this option was supposed to be a file of the form
`CLOUDFLARE_API_TOKEN=...`, which has a few problems:

- That's not an api token. It's an env file fit for passing to systemd's
  `EnvironmentFile` option. The user could typo the variable name, or
  intentionally/unintentionally include unrelated environment variables.
- It's not how secret files usually work in NixOS. Secret files are
  usually just the secret, and don't leak details about how the secret
  is passed to the service.
- This increases friction for people switching between cloudflare dyndns
  services, such as `services.cloudflare-dyndns` and
  `services.cfdyndns`, which both have a `apiToken` option, but (before
  this change) with different semantics.
2025-03-19 18:19:29 -05:00
nixpkgs-ci[bot] 3a7baab73a
Merge staging-next into staging 2025-03-19 18:05:59 +00:00
Adam C. Stephens 476618066b
nixos/firezone: init module and packages (#374647) 2025-03-19 13:50:47 -04:00
ferres 41f1eadb73 nixos/zeronsd: fix acl permissions 2025-03-19 12:16:10 +03:00
nixpkgs-ci[bot] cd31c04e18
Merge staging-next into staging 2025-03-19 00:15:59 +00:00
Dawid Ciężarkiewicz 07a3793105 nixos/syncthing: make it easier to debug incorrect IDs
In case of an incorrect ID, the behavior of this script
is quite tricky. See:

https://github.com/NixOS/nixpkgs/issues/326704#issuecomment-2730819822

for more info.
2025-03-18 19:10:10 +01:00
Dawid Ciężarkiewicz a8b8f8f8c7 nixos/syncthing: missing --fail to curl 2025-03-18 19:10:10 +01:00
nixpkgs-ci[bot] e8240407b0
Merge staging-next into staging 2025-03-18 18:05:35 +00:00
Preston Pan 437ae0fb4e
nixos/ircd-hybrid: fix bug in which fails to substitute iproute2 (#390833) 2025-03-18 17:46:55 +01:00
oddlama 6c888f4911
nixos/firezone: init modules 2025-03-17 20:21:00 +01:00
nixpkgs-ci[bot] dcc32e006f
Merge staging-next into staging 2025-03-17 18:05:40 +00:00
Sandro b96c9e3a68
gokapi: init at 1.9.6 (#372911) 2025-03-17 16:12:38 +01:00
Sandro Jäckel 2581a40544
bird: change alias to throw to avoid confusion 2025-03-17 15:02:38 +01:00
Will Fancher bbf66d50a2
Fix systemd-ssh changes (#390565) 2025-03-17 05:21:36 -04:00
Will Fancher 4dcde98327 nixos/sshd: Fix socket activated SSH connections entering failed state.
In afeb76d628, sshd.service and
sshd@.service were switched to Type=notify. This apparently works for
sshd.service, but not for sshd@.service. Given that the reason for
this working with sshd.service isn't exactly clear, let's revert it
for both of them for now, and revisit Type=notify later.
2025-03-16 23:02:22 -04:00
Darragh Elliott 46666bba62 gokapi: add module, test, release docs
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2025-03-16 14:41:28 +00:00
Philip Taron f4dd3ba6e0
systemd: make systemd-ssh-generator work (#372979) 2025-03-15 21:59:59 -07:00
Pol Dellaiera b29c5b7119
treewide: add documentation for nixos systemd units (#389283) 2025-03-15 21:30:08 +01:00
jopejoe1 c38c901915 nixos/shairport-sync: use conf file instead of arguments 2025-03-15 21:07:35 +01:00
jopejoe1 9246d8f727 nixos/shairport-sync: add freeform config 2025-03-15 21:06:13 +01:00
Marie Ramlow 0ea1aedc4d nixos/sshd: enable root ssh authorized_keys provisioning
This enables provisioning of root ssh keys with systemd credentials
(e.g. passed in via smbios strings or kernel params)
2025-03-15 20:15:44 +01:00
Pedro Alves 994c56c881 nixos/cloudflared: remove assertion for certificateFile
While it is probably a mistake in configuration to have declarative
routes configured but no certificate file, it is not always necessary to
have a working set up, so the assertion was removed.

The documentation for the certificateFile setting was reworked to
describe this.
2025-03-15 11:47:13 +00:00
Gaetan Lepage 6e79d0d383 targetcli: rename to targetcli-fb 2025-03-15 12:16:57 +01:00
Gaetan Lepage 68c06a055a python312Packages.rtslib: rename to rtslib-fb 2025-03-15 12:16:57 +01:00
jopejoe1 dca7e827b3
nixos: Replace custom cfg format handling with pkgs.formats (#314933) 2025-03-14 21:08:14 +01:00
Marie Ramlow afeb76d628 nixos/sshd: always ship a sshd@.service unit for systemd-ssh-generator(1) 2025-03-14 18:34:50 +01:00
Marie Ramlow 63842ed333 nixos/sshd: move key generation into its own systemd unit 2025-03-14 18:34:50 +01:00
Luka Blašković 4fb937aabc
nats: fix infinite recursion when validating config (#389440) 2025-03-13 04:17:06 -07:00
GiggleSquid 461be7d8c8
nixos/searx: add configuration for favicons settings
see searxng docs: https://docs.searxng.org/admin/searx.favicons.html
2025-03-13 03:58:21 +00:00
h7x4 ab0564bd10
treewide: add documentation for nixos systemd units 2025-03-12 18:00:38 +01:00
K900 0463010189 nixos/hostapd: fix hostapd_cli 2025-03-12 13:22:28 +03:00
DSeeLP 65bc040a6f nixos/hickory-dns: combine Hint and Forward zone types into one
In 0.25.0-alpha.5 the Hint and Forward zone types where combined into External
2025-03-11 14:03:01 +01:00
Gaétan Lepage ff2d12d11d
nixos/cloudflared: add option for cert.pem and use dynamic user (#383499) 2025-03-10 11:15:06 +01:00
Sandro 90c9004407
hylafaxplus: 7.0.9 -> 7.0.10, misc improvements (also module) (#376418) 2025-03-08 22:39:47 +01:00
Yt b97d92aaef
nixos/cloudflare-dyndns: fix missing home error (#386211) 2025-03-08 09:15:24 -05:00
shelvacu 1a4575f9db
nixos/modules: Add security.pki.caBundle option and make all services use it for CA bundles (#352244)
Previously some modules used `config.environment.etc."ssl/certs/ca-certificates.crt".source`, some used `"/etc/ssl/certs/ca-certificates.crt"`, and some used `"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"`. These were all bad in one way or another:

- `config.environment.etc."ssl/certs/ca-certificates.crt".source` relies on `source` being set; if `text` is set instead this breaks, introducing a weird undocumented requirement
- `"/etc/ssl/certs/ca-certificates.crt"` is probably okay but very un-nix. It's a magic string, and the path doesn't change when the file changes (and so you can't trigger service reloads, for example, when the contents change in a new system activation)
- `"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"` silently doesn't include the options from `security.pki`

Co-authored-by: Shelvacu <git@shelvacu.com>
2025-03-08 08:41:08 +00:00
misuzu f3b9f47891
nixos/umurmur: init (#387580) 2025-03-07 17:46:10 +02:00
3JlOy_PYCCKUI 095da00b2d nixos/umurmur: init 2025-03-07 12:07:53 +03:00
Philip Taron 9ab61b2537
nixos/doc: convert links to manpages (#383975) 2025-03-06 09:37:51 -08:00
7c6f434c fe36c0e045
Squid: 6.13 -> 7.0.1 (#384972) 2025-03-06 17:17:08 +00:00
Joshua Kobschätzki 019f100d17 squid: add inverse test 2025-03-06 11:36:17 +01:00
Pedro Alves 4f644e0b31 nixos/cloudflared: add option for cert.pem and use dynamic user
Make the cloudflared tunnel service use systemd credentials and dynamic
users, removing the services.cloudflared.user and .group option.

Also add an option to provide the cert.pem file, without which tunnels
defined declaratively would not work.

Additionally, add an assertion checking that the certificate file is
provided if there are declarative routes defined.
2025-03-05 13:33:04 +00:00
Jonas Heinrich 370bcffd35
nixos/networkd-dispatcher: added missing enum value "enslaved" to option "onState" (#382574) 2025-03-05 10:52:31 +01:00
Jakob Klepp 7bffbf3c4c
nixos/nats: add option validateConfig (#387048)
As discussed in the comments of https://github.com/NixOS/nixpkgs/pull/322035
and in the issue https://github.com/NixOS/nixpkgs/issues/333119
config validation fails at build time when the config
references files unavailable during build time

nixos/nats: nixfmt 'nixos/modules/services/networking/nats.nix'
2025-03-04 17:51:09 -08:00
Sandro 4f8cf45715
nixos/inadyn: fix defaultText (#384773) 2025-03-04 19:02:20 +01:00
happysalada 4fac925299 nixos/cloudflare-dyndns: fix missing home error 2025-03-01 16:03:52 -05:00
Faye Duxovni 87806c913c
nixos/syncthing: prevent enabling overrideFolders and autoAcceptFolders simultaneously (#321872)
* syncthing: prevent enabling overrideFolders and autoAcceptFolders simultaneously

* Fix href in services.syncthing.overrideFolders default text
2025-03-01 14:36:50 +01:00
Sandro 511e62f5ec
nixos/soju: add option to overwrite generated configFile (#340583) 2025-02-27 23:34:58 +01:00
Sandro 291fe081dc
netclient: add network-online dependency to get rid of warning (#371276) 2025-02-27 23:28:17 +01:00
Michele Guerini Rocco af8642b189
nixos/hostapd: add passwordFile to structured SAE entries (#365727) 2025-02-27 13:51:23 +01:00
Sandro 245441e2a2 nixos/avahi: only enable ipv6 when networking.enableIPv6 is true 2025-02-24 17:19:55 +01:00
Weijia Wang 1c4fe4d409
services.flannel: add an extraNetworkConfig configuration, add missing kernel module (#365317) 2025-02-24 15:54:44 +01:00
Sandro 9d2e28a82e
nixos/inadyn: fix defaultText 2025-02-24 14:40:05 +01:00
Yarek b30f23ae54
cato: init at 5.2.1.1 2025-02-23 11:17:22 +00:00
Peder Bergebakken Sundt d525eb5838 treewide: fix typos
done with `fd \\\.md$ . --type f -x typos --write-changes`
2025-02-22 02:02:07 +01:00
Peter Lehmann 13ff2e0395
nixos/routinator: fix service being always enabled 2025-02-21 23:48:43 +01:00
Martin Weinelt bf25eae002
nixos/routinator: init module (#380046) 2025-02-21 23:07:21 +01:00
Peter Lehmann c468f4e261
nixos/routinator: init module 2025-02-21 19:10:18 +01:00
Peder Bergebakken Sundt 527be14321 nixos/doc: convert links to manpages 2025-02-21 16:31:09 +01:00
Solomon 6cd88104d7
nixos/openssh: allow post-quantum KexAlgorithms introduced in v9.9 (#378875)
`mlkem768x25519-sha256` and the vendor-neutral `sntrup761x25519-sha512`
name are new in OpenSSH 9.9 <https://www.openssh.com/txt/release-9.9>

Co-authored-by: Mynacol <Mynacol@users.noreply.github.com>
2025-02-19 22:04:03 +01:00
a-kenji fdbcd907e9 nixos/syncthing: Fix typos 2025-02-19 15:44:05 +07:00
Christian Stoitner 224f7fc478 nixos/networkd-dispatcher: added missing enum value "enslaved" to option "onState" 2025-02-16 15:01:31 +01:00
Jared Baur 846779bc8e nixos/yggdrasil: use exec to replace bash instance 2025-02-14 11:58:45 +05:30
dish 6aa47a42fe nixos/zerotierone: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish f3acac425d nixos/wg-access-server: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish af8af80782 nixos/opengfw: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 3dd73303bb nixos/headscale: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish f53cf94cab nixos/firewall: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 70c805c634 nixos/epmd: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 5d48ee0d4b nixos/deconz: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 91980b93cf nixos/ddns-updater: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 7e6083be99 nixos/ddclient: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 85ca769c72 nixos/coturn: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish ce335f7a6c nixos/atticd: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 5fb7bc8c5f nixos/3proxy: fix documentation link formatting 2025-02-12 21:03:21 +01:00
dish 961e7dd1db nixos/nghttpx: fix documentation link formatting 2025-02-12 21:03:21 +01:00
misuzu 2bf51f5ddf
nixos/nats: make config validation friendly to cross compilation (#379405) 2025-02-10 20:13:37 +02:00
Azat Bahawi 0589bd307d
nixos/{wg-quick,wireguard}: add AmneziaWG support (#341663) 2025-02-09 10:03:27 +03:00
AveryanAlex 3896639b27
nixos/wireguard-networkd: add assertion for type == "wireguard" 2025-02-08 14:28:31 +03:00
Tom Herbers 5abb11bbe7
nixos/bird: rename bird2 to bird, switch to bird3 by default
This is done in view of the Release of the new v3 of Bird.

Switch to the bird3 package for the `services.bird.package` option.

Switch the `bird` package alias to bird3.
2025-02-06 16:35:44 +01:00
Tom Herbers 7d67acbe4a
nixos/bird: add package option
This is done to allows to easier change which bird package should be used
2025-02-06 16:29:01 +01:00
Yarny0 39003ad9d7 nixos/hylafax: add package option 2025-02-06 12:11:23 +01:00
Yarny0 eb52347d8c nixos/hylafax: use toGNUCommandLine
...and `escapeShellArgs` for spool area program command lines.
The new function `mkSpoolCmd` adds the `-q` option
by default as it is needed by all such programs.
2025-02-06 12:11:06 +01:00
Yarny0 6e51b48777 nixos/hylafax: use concatLines
...instead of `concatStringsSep "\n"`
2025-02-06 12:11:06 +01:00
Yarny0 455c195fe4 nixos/hylafax: use getExe'
...for a few coreutils invocations.
2025-02-06 12:11:06 +01:00
Yarny0 8378491df3 nixos/hylafax: unify lib imports 2025-02-06 12:11:06 +01:00
Jared Baur d4549901c8
nixos/nats: make config validation friendly to cross compilation 2025-02-04 12:08:41 -08:00
Sandro b1b6a16499
nixos/tailscale-derper: drop nginx upstream to improve reliability (#377640) 2025-02-02 22:18:04 +01:00
nikstur 9015a21afc
g3proxy: init at 1.10.4 (#378059) 2025-02-01 22:45:13 +01:00
Raito Bezarius f0652b5dff nixos/services/networking/g3proxy: init
This adds a simple hardened systemd-based module for g3proxy, a generic
purpose forward proxy.

Change-Id: I8c6e5d2cc8a9faa2aea8c5df3af56756ffed542d
Signed-off-by: Raito Bezarius <masterancpp@gmail.com>
Co-authored-by: Elias Coppens <elias.coppens@ens.fr>
2025-02-01 22:34:53 +01:00
Nick Cao 45d60dfce5
nixos/sing-box: add assertions for deprecated geoip and geosite options 2025-02-01 09:23:52 -05:00
Nick Cao 3a661055bb
nixos/sing-box: unset deprecated geoip and geosite options by default 2025-02-01 09:23:36 -05:00
Michele Guerini Rocco 2e4d19a429
nixos/wireless: fix indentation of extraConfig (#377482) 2025-01-29 14:14:10 +01:00
wrvsrx fbf6812275
nixos/wireless: fix indentation of extraConfig 2025-01-29 16:15:13 +08:00
Sandro Jäckel 0405f0270c
nixos/tailscale-derper: drop nginx upstream to improve reliability
When I initially tested this, the upstream seemed a good idea and worked
as expected but it no longer does and disconnects clients every 60
seconds indicated by the following line in tailscaled on the client:

magicsock: [0xc00444a640] derp.Recv(derp-901): derp.Recv: EOF

By connecting directly things work more reliable and there are no
connection resets every 60 seconds anymore.
2025-01-29 00:25:11 +01:00
Krzysztof Nazarewski 9962b33f51 nixos/netbird: update docs & release notes 2025-01-28 12:34:55 +01:00
Krzysztof Nazarewski 49a26eda2a nixos/netbird: harden and extend options 2025-01-28 12:34:55 +01:00
Peder Bergebakken Sundt 75b2b7e946 nixos/*: undo manual linking to known manpage urls
Made with:

jq <doc/manpage-urls.json 'to_entries[] | "rg -F \"[\(.key)](\(.value))\" nixos/ -l | xe sd -F \"[\(.key)](\(.value))\" \"{manpage}`\(.key)`\""' -r  | tr \" \' | bash -x

(requires ripgrep, sd and xe)
2025-01-27 02:47:02 +01:00
Peder Bergebakken Sundt 953f72e76e nixos/*: tag manpage references 2025-01-27 02:47:01 +01:00
Michele Guerini Rocco 6f20987865
nixos/wireless: remove patch warning from allowAuxiliaryImperativeNetworks option (#374666) 2025-01-26 09:43:17 +01:00
Weijia Wang f6a5227d48
nixos/gdomap: fix eval (#376828) 2025-01-26 00:37:14 +01:00
Weijia Wang 614404df3e nixos/gdomap: fix eval 2025-01-26 00:30:30 +01:00
Christian Kögler 99c172d777
services.xray: pass the settings file with systemd loadCredential (#368763) 2025-01-25 22:29:58 +01:00
Joshua Kobschätzki bb1993232d squid: add config validation
Inspired by NGINX config validation with pkgs.writers
2025-01-25 18:49:34 +01:00
Anderson Torres bc80114502 various: remove AndersonTorres from modules maintainership 2025-01-22 21:47:09 -03:00
Kerstin f4e3779598
nixos/radicale: Allow AF_UNIX for systemd log (#373893) 2025-01-21 12:43:28 +01:00
Slava 167d6634f8 services.xray: pass the settings file with systemd loadCredential
It enables passing a sops-nix secret as a `settingsFile`
@see https://github.com/Mic92/sops-nix/issues/198.

By default sops-nix secrets are accessible by only root. We can change owner to another user, but the xray service is defined with `dynamicUser=true`, which means, there is no user in the compile time.

Systemd `loadCredential` passes the secret file to the service, which is exactly what we need here.
2025-01-20 15:52:14 +05:00
Remy D. Farley b99293177b nixos/yggdrasil-jumper: init 2025-01-19 09:45:46 +00:00
DCsunset f00f508bdb nixos/soju: add option to overwrite generated configFile 2025-01-18 03:59:10 +00:00
June Stepp c01d4db064
nixos/wireless: remove patch warning from allowAuxiliaryImperativeNetworks option
The patch was removed in #330386.
2025-01-17 16:53:44 -06:00
nixpkgs-ci[bot] df5a154f88
Merge master into staging-next 2025-01-17 18:04:22 +00:00
Motiejus Jakštys de0a499a56 nixos/headscale: remove much-loosened-up server_url check
server_url check [has been loosened upstream][1] and backported to
NixOS[2]. The new, much looser check, is not practical to be implemented
in Nix (you are welcome to give it a try; I've implemented the original
one).

Since the surface area is much smaller now (and the scenario much less
common), I think we can remove this assertion altogether.

[1]: https://github.com/juanfont/headscale/pull/2248
[2]: https://github.com/NixOS/nixpkgs/pull/358255
2025-01-17 08:03:26 +02:00
Flakebi 8f4bc44f88
nixos/radicale: Allow AF_UNIX for systemd log
radicale tries to connect to the systemd unix socket for logging. This
currently fails because it is not allowed to open sockets, then it falls
back to logging to stdout (printing a warning).

Allow radical to open unix sockets to fix this. This gives slightly
better logging experience (e.g. errors are marked red when sent through
the systemd log socket).
2025-01-15 01:09:54 +01:00
github-actions[bot] 74a6c68160
Merge master into staging-next 2025-01-12 18:04:11 +00:00
Nick Cao 57f5199439
nixos/strongswan-swanctl: link strongswan.conf to /etc 2025-01-11 11:03:29 -05:00
oddlama 19e38587b2
nixos/hostapd: run nixfmt-rfc-stylenixos/hostapd: add passwordFile option for structured sae password settings 2025-01-10 00:28:47 +01:00
oddlama 6f23ec7323
nixos/hostapd: run nixfmt-rfc-style 2025-01-10 00:28:45 +01:00
github-actions[bot] ded5a5e552
Merge master into staging-next 2025-01-09 00:14:35 +00:00
piegames 31777a589c
More string fixes (#367757) 2025-01-08 20:12:26 +01:00
github-actions[bot] 224fa5b082
Merge master into staging-next 2025-01-08 00:14:35 +00:00
Dict Xiong 165e372a15 nixos/doh-server: init 2025-01-07 23:37:47 +01:00
piegames dd7d5339f7 treewide: Fix incorrect string indentations 2025-01-07 19:49:28 +01:00
piegames 603733851b treewide: Fix incorrect string escapes 2025-01-07 19:49:28 +01:00