Sandro
25301c0bc3
pihole: 6.1 -> 6.1.4 ( #414796 )
2025-09-08 15:53:45 +02:00
Haylin Moore
cf540f8c98
treewide/nixos: move number typed port options to types.port
2025-09-08 15:27:19 +02:00
Majiir Paktu
76e269a01c
nixos/nebula: add reload support
2025-09-07 17:19:27 -04:00
averyv
82a3e70b2d
pihole-ftl: Add basic test
2025-09-07 17:21:58 +01:00
6543
ef415e5892
nixos/connman: remove with usage ( #440928 )
...
services.connman: remove with usage
2025-09-07 18:03:54 +02:00
averyv
88c7de53bb
pihole-ftl: Use piholePackage instead of pkgs.pihole
...
To allow user overrides.
2025-09-06 19:28:18 +01:00
averyv
83d3cc8a98
pihole: 6.1 -> 6.1.4
2025-09-06 18:14:47 +01:00
Wael Nasreddine
414c23facc
ncps: Add support for the --cache-temp-path flag
2025-09-04 23:45:17 -07:00
Wael Nasreddine
a0817f37f2
ncps: Add support for the --prometheus-enabled flag
2025-09-04 23:45:17 -07:00
06kellyjac
110edff547
llama-swap: init module
...
Co-authored-by: podium868909 <89096245@proton.me>
2025-09-03 22:15:38 +02:00
Sandro Jäckel
1aacf9c84a
treewide: use lib.getExe' for config.services.postfix.package
2025-09-03 13:12:31 +02:00
Sandro Jäckel
b5b97a6670
nixos/postfix: add a package option and use it treewide
2025-09-02 18:01:01 +02:00
Wolfgang Walther
27520fe100
nixos/seafile: drop ( #435059 )
2025-09-02 13:48:23 +00:00
melvyn
fb9709ef29
nixos/seafile: drop
2025-09-02 09:33:13 -04:00
isabel
601099ee4e
syncthing: 1.30.0 -> 2.0.3; nixos/synthing: fix flags against 2.0 ( #436432 )
2025-09-02 08:45:00 +01:00
Sandro
bfd2ff3310
headscale: support PKCE verifier ( #427132 )
2025-09-02 00:18:06 +02:00
dotlambda
3ffc3eb5db
nixos/pihole-ftl: fix privacyLevel option ( #439311 )
2025-09-01 14:39:08 -07:00
averyv
7f99e08ccb
nixos/pihole-ftl: fix privacyLevel option
...
It's currently setting the wrong TOML value
2025-09-01 22:28:18 +01:00
Sandro
88e2e5af84
ifstate: init at 2.0.0 ( #431047 )
2025-09-01 17:44:24 +02:00
Wolfgang Walther
f09f724ef8
maintainers: drop ehmry
...
This user is blocked since May 2025, thus can't maintain any packages
anymore.
2025-08-31 16:53:44 +02:00
isabel
063267b711
nixos/syncthing: fix flags against 2.0 release
2025-08-31 09:02:19 +01:00
andre4ik3
b95b91c956
nixos/dnscrypt-proxy: rename from dnscrypt-proxy2
...
Renames the `dnscrypt-proxy2` module (back) to `dnscrypt-proxy`, to
match the package, which was renamed in 2023.
The systemd service is also renamed to `dnscrypt-proxy`, but an alias to
`dnscrypt-proxy2` is provided for backwards compatibility.
2025-08-31 00:17:07 +00:00
Ali Rizvi
93d55d06c8
nixos/networkmanager: add frontear as maintainer
2025-08-29 15:08:07 -04:00
Ali Rizvi
65a973951d
nixos/networkmanager: fix serializing an invalid wifi.powersave=null
...
NetworkManager does not define `null` as a valid value for `wifi.powersave`, and while strangely it doesn't seem to report any errors upon encountering it, it's a weird value and shouldn't be here. This is actually very similar to how the module used to work before the refactor in https://github.com/NixOS/nixpkgs/pull/118308 (see this [snippet](https://github.com/NixOS/nixpkgs/pull/118308/files#diff-0a708e7b053cf5df7620b5262936553af2242d2ce9dabde5bbeba221ece0a021L45-L46 ) from the PR changes).
2025-08-29 14:19:04 -04:00
dish
970dcca69c
treewide: Fix links in module documentation
2025-08-25 12:55:11 -04:00
Hoang Nguyen
cc1251b631
nixos/iwd: fix DriverQuirks.DefaultInterface config option
...
[DriverQuirks].DefaultInterface option accepts a comma-separated list of drivers
or glob matches as its value.
2025-08-25 13:43:31 +07:00
David McFarland
b37d301416
technitium-dns-server: fix inaccessible state directory ( #383225 )
2025-08-24 09:44:51 -03:00
David McFarland
6994d6098e
technitium-dns-server: fix inaccessible state directory
2025-08-22 14:50:15 -03:00
wrrrzr
cf9404b315
nixos/byedpi: init
2025-08-22 16:30:40 +03:00
Weijia Wang
945594a980
Remove ataraxiasjel maintainer from ivpn and mullvad-vpn ( #435616 )
2025-08-22 09:40:09 +02:00
Jade Lovelace
602cc45c09
nixos/gateone: remove
...
The package is literally gone, this could never work.
2025-08-21 21:39:45 -07:00
averyv
9b2783fae9
pihole-ftl: Fix log deleter service creating an empty database
...
If it runs before the main service itself, the sqlite command may create an
empty database, causing the main service to not run the initial database setup.
2025-08-21 23:35:51 +01:00
Nick Cao
09950e401c
sing-box: 1.11.15 -> 1.12.3, nixos/sing-box: add user and group, nixosTests.sing-box: migrate config ( #430835 )
2025-08-21 16:49:42 -04:00
Dmitriy Kholkin
a511e49d42
nixos/ivpn: remove ataraxiasjel as maintainer
2025-08-21 19:48:54 +03:00
Marcel
8d8c9633bf
nixos/ifstate: init
2025-08-21 17:44:54 +02:00
Sandro
338cbf9e54
nixos/prosody: substitute environment variables to allow securely loa… ( #431286 )
2025-08-21 15:02:56 +02:00
Sizhe Zhao
b69da1bd4f
nixos/sing-box: add user and group
2025-08-21 13:30:56 +08:00
Sizhe Zhao
40ba3d54dd
nixos/sing-box: add prince213 to maintainers
2025-08-21 13:30:56 +08:00
Sandro
b1516743c7
nixos/prosody: add muc_moderation ( #431289 )
2025-08-20 16:00:44 +02:00
Sandro Jäckel
cea3dfac9e
nixos/prosody: add muc_moderation
2025-08-20 15:55:15 +02:00
Aaron VerDow
a4177afa8d
nixos/x2goserver: add package option
2025-08-19 07:52:42 -05:00
Lan Tian
6ee67461ae
nixos/asterisk: fix reloading command
2025-08-17 11:18:16 -07:00
Leona Maroni
9b8ea589ea
nixos/acme: improve scalability - reduce superfluous unit activations ( #422076 )
2025-08-14 16:06:06 +02:00
Sandro
a9b58022f0
nixos/xl2tpd: deprecate phases ( #433195 )
2025-08-14 14:02:10 +02:00
Sandro
e00d0068d5
nixos/pptpd: deprecate phases ( #433194 )
2025-08-14 14:01:51 +02:00
Sandro
4ff3ec314a
nixos/netbird: deprecate phases ( #433198 )
2025-08-13 15:42:11 +02:00
Felix Buehler
864a873db9
nixos/netbird: deprecate phases
2025-08-12 22:40:22 +02:00
Felix Buehler
7b39ce457f
nixos/pptpd: deprecate phases
2025-08-12 22:39:09 +02:00
Felix Buehler
08cdd881e8
nixos/xl2tpd: deprecate phases
2025-08-12 22:38:50 +02:00
misuzu
9b6b7bf551
nixos/wireguard-networkd: fix 'cannot find device' error ( #430762 )
2025-08-12 19:00:25 +03:00
Paul Haerle
086d855355
netbird: 0.49.0 -> 0.54.0 + split up + relicense ( #431976 )
2025-08-11 22:10:25 +02:00
Krzysztof Nazarewski
f1277e5434
netbird: 0.49.0 -> 0.54.0 + split up + relicense
...
- 0.53.0+ relicensed the server components
- as a result split into per-component packages
- adds missing 2 upload & relay components
- the tested behavior has changed
2025-08-11 20:46:42 +02:00
Robert James Hernandez
249a3dcd5e
nixos/ax25/axports: ax25 kernel module check
2025-08-10 18:11:55 +00:00
Luke Granger-Brown
7f552ff771
tayga: 0.9.2 -> 0.9.5 ( #432528 )
2025-08-10 17:50:45 +02:00
Pol Dellaiera
4594192170
nixos/netbird: fix desktop file name pattern ( #432535 )
2025-08-10 17:18:12 +02:00
lassulus
5316ba88a5
nixos/prosody: remove erronous spaces in module names
2025-08-10 17:09:16 +02:00
Luke Granger-Brown
4548324aae
nixos/tayga: add option to allow toggling WKPF strict compliance
...
The RFC requires that we don't allow access to non-global v4 addresses
using the well-known 64:ff9b:: prefix, but there are some deployments
where it's convenient to permit this.
To make this work in tests, disable wkpf-strictness via the config
option introduced in bc18503e2ff1ee48ac472a67ba982dae76a5c2d3.
Tayga added 100.64.0.0 to the set of WKPF in
4dff17ef61821f5bc1996ce687a3dc317fd4fa50.
2025-08-10 17:00:13 +02:00
Luke Granger-Brown
b45ba94a0e
nixos/tayga: add log option
...
This allows configuring logging in tayga, and enables it for the NixOS
test.
2025-08-10 16:37:42 +02:00
Florian Klink
73582e4158
nixos/tayga: fix config reload
...
Use a trampoline at /etc/tayga.conf for the config, so reload actually
picks up a changed config file.
2025-08-10 16:30:52 +02:00
Rohan Verma
4c2b315075
nixos/netbird: fix desktop file name pattern
...
The desktop file substitution was looking for 'Name=NetBird' but the
actual desktop file contains 'Name=Netbird' (with lowercase 'b').
Fixes #432454
2025-08-10 19:49:14 +05:30
lassulus
cb771a25a1
jitsi-meet: fix infinite recursion with prosody package ( #432371 )
2025-08-10 09:34:49 +02:00
Dionysis Grigoropoulos
0bb6676d74
nixos/tailscale: Add option to disable upstream debug logging
...
Tailscale by default sends logs upstream to a centralized logging
service. We can disable this by adding an env var
https://tailscale.com/kb/1011/log-mesh-traffic?tab=linux#opting-out-of-client-logging
2025-08-10 05:19:04 +03:00
lassulus
804919a7f4
nixos/prosody: fix serialization error if httpFileShare is null
2025-08-10 01:03:49 +02:00
Christian Theune
2d0a489125
nixos/acme: improve scalability - reduce superfluous unit activations
...
The previous setup caused all renewal units to be triggered upon
ever so slight changes in config. In larger setups (100+ certificates)
adding a new certificate caused high system load and/or large memory
consumption issues. The memory issues are already a alleviated with
the locking mechanism. However, this then causes long delays upwards
of multiple minutes depending on individual runs and also caused
superfluous activations.
In this change we streamline the overall setup of units:
1. The unit that other services can depend upon is 'acme-{cert}.service'.
We call this the 'base unit'. As this one as `RemainAfterExit` set
the `acme-finished-{cert}` targets are not required any longer.
2. We now always generate initial self-signed certificates to simplify
the dependency structure. This deprecates the `preliminarySelfsigned`
option.
3. The `acme-order-renew-{cert}` service gets activated after the base
unit and services using certificates have started and performs all acme
interactions. When it finishes others services (like web servers) will
be notified through the `reloadServices` option or they can use
`wantedBy` and `after` dependencies if they implement their own reload
units.
The renewal timer also triggers this unit.
4. The timer unit is explicitly blocked from being started by s-t-c.
5. Permission management has been cleaned up a bit: there was an
inconsistency between having the .lego files set to 600 vs 640
on the exposed side. This is unified to 640 now.
6. Exempt the account target from being restarted by s-t-c. This will
happen automatically if something relevant to the account changes.
2025-08-08 16:28:42 +02:00
Krzysztof Nazarewski (kdn)
c55a801cfe
nixos/netbird: clarify routing features & brand adjustments
2025-08-08 11:13:41 +02:00
Pol Dellaiera
7587a3c7a1
nixos/netbird: add useRoutingFeatures option ( #431681 )
2025-08-08 10:21:45 +02:00
Sandro
e25c3a4a45
nixos/tailscale-derper: drop unused keepalive_timeout, bump proxy_rea… ( #430791 ) in
2025-08-07 17:21:26 +02:00
Sandro
d00a33c9df
nixos/dnsmasq: make dnsmasq --test actually test the config file ( #426004 )
2025-08-07 15:08:19 +02:00
Pol Dellaiera
8b5c57b674
nixos/netbird: add useRoutingFeatures option
...
Similar to what the NixOS Tailscale service has.
Hope this will help a bunch of users struggling to make the "exit node" feature working.
2025-08-07 10:10:53 +02:00
liberodark
a9cd681b8d
nixos/ntpd-rs: hardening
2025-08-07 11:36:09 +05:30
Doron Behar
cddd032189
nixos/i2pd: add ntcp2 options for ssu2 ( #428035 )
2025-08-06 09:22:26 +03:00
Sandro Jäckel
68bcdbfc9e
nixos/prosody: substitute environment variables to allow securely loading secrets
2025-08-06 00:49:58 +02:00
Sandro Jäckel
b5475346e2
nixos/tailscale-derper: drop unused keepalive_timeout, bump proxy_read_timeout to an hour
...
Otherwise derper reconnects every 60s which still works good enough but
spams the logs with lots of noise and it probably improves stability, too.
2025-08-04 20:03:15 +02:00
Sandro Jäckel
e42cceb90c
nixos/prosody: fix message reactions and moderation in muc's
...
It took us over 3 hours to figure this out, I want to cry :,(
2025-08-04 00:58:50 +02:00
Sandro Jäckel
dfa4ce2923
nixos/prosody: add support for httpFileShare.http_host
2025-08-04 00:58:49 +02:00
Majiir Paktu
e338c7b8dc
nixos/wireguard-networkd: fix 'cannot find device' error
...
In some situations, the dynamic refresh can fail to bring up the
wireguard interface. If that happens, all subsequent refresh attempts
will fail because the 'ip link delete' command fails with "Cannot find
device". If this happens, we now proceed with the networkctl reload
anyway.
2025-08-03 17:10:05 -04:00
Sandro Jäckel
76224149c1
nixos/prosody: fix certs directory missing error
...
Prosody starts without it but not lay false leads for others to debug.
2025-08-03 21:35:33 +02:00
Sandro Jäckel
a302465e0e
nixos/prosody: wire up modules.mam option
2025-08-03 21:35:33 +02:00
Sandro Jäckel
445cd5701d
nixos/prosody: enable admin_shell to fix tests
2025-08-03 21:35:32 +02:00
Sandro Jäckel
3ea8513fb5
nixos/prosody: disable http_files per default as it requires configuration to not break http_file_share
2025-08-03 21:35:32 +02:00
Sandro Jäckel
c8094c2f03
nixos/prosody: fix logged error that /etc/mime.types cannot be found
2025-08-03 21:35:30 +02:00
Sandro Jäckel
d323803eee
nixos/prosody: minor formatting cleanup
2025-08-03 21:35:30 +02:00
Sandro Jäckel
4e12c9b92e
nixos/prosody: remove obsoloted http_upload and replace it with http_file_share
2025-08-03 21:35:30 +02:00
Sandro Jäckel
c26ed9f391
nixos/prosody: remove vcard_muc as it has been obsoloted
...
Sadly I did not find a way to use lib.mkRemovedOptionModule for this
option that did not break eval. :(
2025-08-03 21:35:29 +02:00
Sandro Jäckel
246e3fbf0f
nixos/prosody: allow listening on port 80
...
Co-authored-by: mirror230469 <215964377+mirror230469@users.noreply.github.com>
2025-08-03 21:35:28 +02:00
Sandro Jäckel
e46dcd7074
prosody: 0.12.5 -> 13.0.2, nixos/prosody: fix startup
...
Co-authored-by: mirror230469 <215964377+mirror230469@users.noreply.github.com>
2025-08-03 21:35:28 +02:00
Pavol Rusnak
ffba411e71
cjdns: 21.4 -> 22.1 ( #426168 )
2025-08-03 11:54:24 +02:00
sternenseemann
0515216cef
nixos/inspircd: sync with upstream systemd.service file
...
We could in theory just re-use the upstream one, but it sets User=root
which I'm not entirely comfortable with. Instead, add the settings we
were missing from that file here. Sadly, upstream doesn't configure a
syscall filter or similar.
2025-08-03 02:53:03 +02:00
sternenseemann
0f56042556
inspircd: 3.18.0 -> 4.7.0
...
https://docs.inspircd.org/4/breaking-changes/
https://docs.inspircd.org/4/overview/
https://docs.inspircd.org/4/change-log/#inspircd-401
https://docs.inspircd.org/4/change-log/#inspircd-410
https://docs.inspircd.org/4/change-log/#inspircd-420
https://docs.inspircd.org/4/change-log/#inspircd-430
https://docs.inspircd.org/4/change-log/#inspircd-440
https://docs.inspircd.org/4/change-log/#inspircd-450
https://docs.inspircd.org/4/change-log/#inspircd-460
https://docs.inspircd.org/4/change-log/#inspircd-470
Packaging-relevant changes:
- inspircd no longer has the start subcommand, but needs to be invoked
directly.
- New extra modules: log_syslog and log_json
- Removed extra modules: regex_tre, regex_pcre, ssl_mbedtls
You probably should not use them anymore, but they can be
obtained via the module manager in theory — though I doubt it works
with Nix (another item for the todo list, I guess):
https://docs.inspircd.org/4/module-manager/
2025-08-03 02:53:03 +02:00
jaredmontoya
25750b264d
nixos/i2pd: add ssu2 options
2025-08-02 22:46:40 +02:00
Aleksana
5f4f85bb00
nixos/cgit: use alias option for assets ( #390448 )
2025-08-01 23:24:46 +08:00
Sandro Jäckel
a5e26447d7
nixos/prosody: fix empty config check output, fix some errors which are not fatal
2025-08-01 05:17:37 +02:00
Sandro Jäckel
e2e3e77ab0
nixos/prosody: add config check option
2025-08-01 04:10:49 +02:00
Sandro Jäckel
8c9a0efe30
nixos/prosody: deadnix, remove extra new lines, minor cleanup
2025-08-01 03:12:29 +02:00
Benedikt von Blomberg
4f6691c9ff
nixos/ddclient: added assertions for passwordFile and secretsFile
...
nix fmt
2025-07-29 15:17:35 +02:00
Benedikt von Blomberg
38a03fc480
nixos/services.ddclient: make username optional
2025-07-29 15:17:35 +02:00
Benedikt von Blomberg
a1ed19f38d
nixos/services.ddclient: add secretsFile option
2025-07-29 15:17:35 +02:00
Axel Karjalainen
d634694bdd
nixos/cgit: use alias option for assets
...
This makes it easier to replace an asset by just setting the Nginx
virtual host's `locations."= robots.txt".alias`. Previously you had to
either replace the extraConfig with mkForce or clear it and use the
`alias` option.
2025-07-29 15:20:24 +03:00
Martin Weinelt
5dd6d1d43b
kea: 2.6.3 -> 3.0.0 ( #428872 )
2025-07-29 03:51:17 +02:00
Martin Weinelt
66e035f411
kea: 2.6.3 -> 3.0.0
...
https://gitlab.isc.org/isc-projects/kea/-/wikis/Release-Notes/release-notes-3.0.0
2025-07-29 03:43:54 +02:00
Amadej Kastelic
7476494b3b
nixos/cjdns: update for cjdns 22.1 compatibility
2025-07-27 15:28:40 +02:00
Ryan Horiguchi
51b0961214
nixos/dnsmasq: add config option to retrive config file path
2025-07-27 00:49:28 +02:00
Sandro
a9b0143df6
speedify: init at 15.6.4-12495 ( #415937 )
2025-07-26 13:20:51 +02:00
Sandro
ce6b0611ca
searxng: 0-unstable-2025-07-16 -> 0-unstable-2025-07-18 ( #426391 )
2025-07-26 02:21:09 +02:00
Philip Taron
d392f98f00
services.openssh: use notify-reload for sshd ( #427620 )
2025-07-25 16:02:49 -07:00
Martin Weinelt
fde8885198
kea: 2.6.2 -> 2.6.3
...
https://downloads.isc.org/isc/kea/2.6.3/Kea-2.6.3-ReleaseNotes.txt
https://kb.isc.org/docs/cve-2025-32801
https://kb.isc.org/docs/cve-2025-32802
https://kb.isc.org/docs/cve-2025-32803
Fixes: CVE-2025-32801, CVE-2025-32802, CVE-2025-32803
2025-07-25 14:12:39 +02:00
Zahrun
1c26e0e7a9
speedify: init at 15.6.4-12495
...
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
Co-authored-by: emaryn <197520219+emaryn@users.noreply.github.com>
2025-07-25 15:54:44 +05:30
Sandro Jäckel
04e7d4607d
searxng: 0-unstable-2025-07-16 -> 0-unstable-2025-07-18
2025-07-24 22:55:01 +02:00
Wolfgang Walther
5a0711127c
treewide: run nixfmt 1.0.0
2025-07-24 13:55:40 +02:00
Wolfgang Walther
62fe016519
treewide: run treefmt with mdcr/nixfmt
2025-07-24 13:52:31 +02:00
Wolfgang Walther
6c47e7d5da
treewide: fix syntax errors in nix code blocks
...
Fixes all code blocks with "nix" language in markdown files for syntax
errors to be able to run nixfmt in the next step.
2025-07-24 13:52:29 +02:00
Michele Guerini Rocco
2e7f98d013
nixos/searx: use envsubst instead of sed for reading environment variables ( #419149 )
2025-07-23 22:21:01 +02:00
ssoss
edadf6cc0f
services.openssh: use notify-reload for sshd
2025-07-23 01:24:58 +00:00
mivorasu
d80ed4cb91
treewide: conform descriptions to the standards
...
Co-authored-by: Pol Dellaiera <pol.dellaiera@protonmail.com>
2025-07-22 23:44:23 +00:00
Moonsn
99e4bf5792
nixos/tailscale-derper: add enableNginx option to make nginx optional ( #425734 )
2025-07-22 23:45:10 +02:00
Vladimír Čunát
998f38e992
nixos/kresd: don't explicitly set group id ( #413360 )
2025-07-22 13:49:53 +02:00
Matthew Croughan
530db85404
nixos/atalkd: init ( #425554 )
2025-07-21 18:29:33 +01:00
matthewcroughan
75929b4612
nixos/atalkd: init
2025-07-21 18:16:26 +01:00
Andrey Albershteyn
13a041b174
headscale: support PKCE verifier
...
The headscale 0.24.0 introduced support for PKCE verifier. Add options
to set these parameters in the config.
2025-07-21 16:48:18 +02:00
Marie Ramlow
f0e5db7021
nixos/g3proxy: run proxy with --systemd --control-dir %t/g3proxy
2025-07-20 01:35:21 +02:00
Sean Behan
ca88da9ce3
nixos/searx: use envsubst instead of sed for reading environment variables
...
- use envsubst instead of sed for reading in environment variables
- update usage examples
- add release notes
2025-07-18 15:51:03 +02:00
Aleksana
03b3a97679
nixos/newt: init ( #414337 )
2025-07-18 19:07:59 +08:00
Glen Huang
9d50f2dd2f
nixos/dnsmasq: make dnsmasq --test test the config file
...
Currently it's testing an empty configuration
2025-07-17 20:30:39 +08:00
jack
9501130c38
nixos/newt: init
2025-07-17 13:04:13 +02:00
Sandro Jäckel
11ba4eb03e
searxng: 0-unstable-2025-07-08 -> 0-unstable-2025-07-16
2025-07-16 21:07:45 +02:00
Sandro Jäckel
3e32a1a27c
nixos/searx: move faviconcache to /var/cache
2025-07-15 17:41:15 +02:00
Sandro Jäckel
1d42336757
nixos/searx: don't delete /run/searx/ on init service restarts
2025-07-15 17:41:14 +02:00
Sandro Jäckel
8e34970572
nixos/searx: restart uwsgi when searx changes
2025-07-15 17:41:13 +02:00
Sandro Jäckel
e626de7d9a
nixos/searx: add configureNginx setting to automatically configure nginx with uwsgi over a socket
2025-07-15 17:41:12 +02:00
Sandro Jäckel
fe8e665cc3
nixos/searx: fix lsp findings
2025-07-15 17:41:12 +02:00
Sandro Jäckel
d88324eff3
nixos/searx: match maintainers with searxng package
2025-07-15 17:41:11 +02:00
Sandro Jäckel
7e7377e043
nixos/searx: cleanup, sort config
2025-07-15 17:41:11 +02:00
Sandro Jäckel
681b727dc6
nixos/searx: rename runInUwsgi to configureUwsgi
2025-07-15 17:41:10 +02:00
Sandro Jäckel
3497e6a8af
nixos/searx: drop searx compatibility
2025-07-15 17:41:10 +02:00
Aleksana
c19390a96d
nixos/pihole-ftl: fix openFirewall ports ( #424348 )
2025-07-15 10:51:41 +08:00
NullCube
8af12908c2
nixos/anubis: add missing botPolicy option implementation
2025-07-14 08:49:32 -07:00
nixpkgs-ci[bot]
8287b2917e
Merge master into staging-next
2025-07-12 18:05:06 +00:00
Wolfgang Walther
4bfecfb345
r53-ddns: 1.1.0 -> 1.3.0 ( #405048 )
2025-07-12 17:18:18 +00:00
Patrick Gehrsitz
9da74b34fe
nixos/pihole-ftl: add openFirewallDNS to docs example
2025-07-11 17:32:21 +02:00
Patrick Gehrsitz
4883f43d36
nixos/pihole-ftl: add openFirewallDNS ports
2025-07-11 17:19:58 +02:00
Patrick Gehrsitz
1536ddeea9
nixos/pihole-ftl: fix openFirewallDHCP ports
2025-07-11 17:18:22 +02:00
K900
77e81dbfc2
Merge remote-tracking branch 'origin/master' into staging-next
2025-07-11 09:24:31 +03:00
Michele Guerini Rocco
bcb3614b35
nixos/syncthing: get systemd units from cfg.package & install syncthing command and man page ( #422094 )
2025-07-11 00:01:02 +02:00
nixpkgs-ci[bot]
dc26f5f38f
Merge master into staging-next
2025-07-08 06:06:09 +00:00
Franz Pletz
b1c964b557
nixos/tests/chrony: graphene-hardened works without mlock
...
Fix #423330 . Broken by #416715 .
2025-07-08 01:44:35 +02:00
nixpkgs-ci[bot]
07ab953baa
Merge master into staging-next
2025-07-06 16:43:42 +00:00
Michele Guerini Rocco
c2287094ea
nixos/searx: move network.target from wantedBy to after ( #422924 )
2025-07-06 17:00:46 +02:00
nixpkgs-ci[bot]
60677469ef
Merge master into staging-next
2025-07-06 12:06:26 +00:00
provokateurin
bcc1b762e9
nixos/searx: move network.target from wantedBy to after
...
In 623664e84f this part was refactored,
however network.target does not make sense in wantedBy and must be part of after.
2025-07-06 13:49:15 +02:00
Jaco Malan
1fb02bc8f9
nixos/monero: add environmentFile option
2025-07-06 10:33:44 +02:00
nixpkgs-ci[bot]
61be326d8b
Merge master into staging-next
2025-07-05 18:05:00 +00:00
Ivan Dimitrov
ff75103a7c
nixos/monero: allow pruning with option ( #421289 )
2025-07-05 14:28:39 +02:00
nixpkgs-ci[bot]
04de8eaaf8
Merge staging-next into staging
2025-07-04 06:07:14 +00:00
Martin Weinelt
a289362e80
networkmanager: drop hard dependency on openconnect and cleanup plugin handling ( #421042 )
2025-07-04 03:08:40 +02:00
nixpkgs-ci[bot]
4725dc1d5d
Merge staging-next into staging
2025-07-03 18:06:42 +00:00
Sandro Jäckel
f88e1c39e9
treewide: move StartLimitIntervalSec/StartLimitBurst to unitConfig
2025-07-03 15:48:28 +02:00
Jason Yundt
de0be57ef7
nixos/syncthing: install syncthing command and man page
...
Before this change, setting services.syncthing.enable to true would
enable Syncthing, but it wouldn’t add Syncthing’s man page to your
system. This change ensures that the man page is available.
I tested this change using this Nix expression:
let
nixpkgsRepo = /path/to/nixpkgs/repo;
pkgs = import nixpkgsRepo { };
in pkgs.testers.runNixOSTest {
name = "syncthing-man-page-test";
nodes.machine = {
services.syncthing.enable = true;
};
testScript = ''
start_all()
machine.succeed("man syncthing > log.txt")
machine.copy_from_vm("log.txt", ".")
'';
}
2025-07-03 08:19:06 -04:00
Jason Yundt
816afcf9c0
nixos/syncthing: get systemd units from cfg.package
...
Before this change, the syncthing module used two potentially different
packages for Syncthing. Sometimes, it would use cfg.package and
sometimes it would use pkgs.syncthing. This change makes the syncthing
module more consistent by making it always use cfg.package.
The reference to pkgs.syncthing was added in
1026bebee6 . I looked through that commit
message and the thread for the pull request that it came from [1], and I
couldn’t find anything that explained why pkgs.syncthing was used over
cfg.package. I’m guessing that using pkgs.syncthing over cfg.package was
a mistake, but I’m not sure.
[1]: <https://github.com/NixOS/nixpkgs/pull/18973 >
2025-07-03 07:37:23 -04:00
Alyssa Ross
e0910df589
Merge remote-tracking branch 'origin/staging-next' into staging
...
Conflicts:
pkgs/by-name/me/meson/package.nix
2025-07-02 14:49:42 +02:00
Yang, Bo
3f377cfde8
nixos/avahi-daemon: add dependency to ensure /run/avahi-daemon is created before socket activation ( #417635 )
2025-07-02 13:03:14 +02:00
nixpkgs-ci[bot]
536476f3aa
Merge staging-next into staging
2025-07-01 12:08:22 +00:00
Sandro
ace047b8d5
nixos/xrdp: use --replace-fail with substituteInPlace, try #2 ( #392512 )
2025-07-01 11:59:37 +02:00
nixpkgs-ci[bot]
62814d33b6
Merge staging-next into staging
2025-06-30 18:06:45 +00:00
Jonathan Davies
185eba3148
nixos/ntpd-rs: Validate the ntpd-rs.toml file
2025-06-30 15:24:05 +02:00
Martin Weinelt
312015eaaf
networkmanager-strongswan: rename from networkmanager_strongswan
...
This is to follow the same structure as all other nm plugins.
2025-06-30 14:45:37 +02:00
nixpkgs-ci[bot]
eee21ba9fa
Merge staging-next into staging
2025-06-30 12:08:05 +00:00
Martin Weinelt
ccdca43d80
nixos/networkmanager: drop default plugin list and toggle
...
It is unclear where this list originated, but it doesn't make sense to
ship it with all networkmanager installations. The most excessive plugin
is openconnect, that ships a 250 MB closure including webkitgtk.
Instead users now have to specify the plugins they want explicitly. I
updated the option to give hints on how to find them as best as I can.
2025-06-30 08:40:05 +02:00
Jörg Thalheim
34b498526c
nixos/easytier: init module ( #398170 )
2025-06-30 08:13:27 +02:00
Martin Weinelt
6e1cd10adb
nixos/networkmanager: clean up plugin handling
...
There is no point in having a special option to enable strongswan, when
we can just parse the intent from the plugin list instead.
Also pick up relevant runtime dependency information from the plugin
package instead of providing additional options or hardcoding them.
2025-06-29 22:53:27 +02:00
Marcel
14d4a883e8
nixos/bird: print config file with line numbers during config check
...
Bird configuration errors only print the line number without context.
Printing the configuration file with line numbers helps to identify the
faulty expression.
2025-06-29 22:39:24 +02:00
nixpkgs-ci[bot]
ac8cb87605
Merge staging-next into staging
2025-06-29 18:05:51 +00:00
Wolfgang Walther
ff0515b50b
nixos/chrony: fix defaultText rendering of enableMemoryLocking option ( #420789 )
2025-06-29 15:40:25 +00:00
Sandro
48f5657fb9
nixos/chrony: fix defaultText rendering of enableMemoryLocking option
2025-06-28 18:22:12 +02:00
L-Trump
725a756dbb
nixos/easytier: init module
2025-06-28 23:22:51 +08:00
K900
5985f13b69
Merge remote-tracking branch 'origin/staging-next' into staging
2025-06-27 21:07:44 +03:00
Maximilian Bosch
a064abed61
Merge: nixos/postgresql: move postStart into separate unit ( #403645 )
2025-06-27 18:09:54 +02:00
K900
6d81aa24da
Merge remote-tracking branch 'origin/staging-next' into staging
2025-06-27 11:10:05 +03:00
Pol Dellaiera
b5acd6e545
nixos/netbird: robustness improvements ( #420183 )
2025-06-26 19:07:24 +02:00
K900
da21cd73af
livekit-ingress: init ( #409757 )
2025-06-26 19:09:06 +03:00
Krzysztof Nazarewski
17c0c3293d
nixos/netbird: add iptables/nftables for debug bundle handling
2025-06-26 14:13:05 +02:00
Krzysztof Nazarewski
70e91e0956
nixos/netbird: openFirewall for remote DNS resolver
2025-06-26 14:13:05 +02:00
Wolfgang Walther
41c5662cbe
nixos/postgresql: move postStart into separate unit
...
This avoids restarting the postgresql server, when only ensureDatabases
or ensureUsers have been changed. It will also allow to properly wait
for recovery to finish later.
To wait for "postgresql is ready" in other services, we now provide a
postgresql.target.
Resolves #400018
Co-authored-by: Marcel <me@m4rc3l.de>
2025-06-24 15:26:47 +02:00
K900
c732ad18a8
Merge remote-tracking branch 'origin/staging-next' into staging
2025-06-24 10:22:21 +03:00
Philip Taron
cd233b3496
nixos/sshd: don't set KDF rounds for host keys ( #415385 )
2025-06-23 15:58:06 -07:00
K900
a10dfa1005
Merge remote-tracking branch 'origin/staging-next' into staging
2025-06-23 21:07:45 +03:00
Martin Weinelt
aefa79cfc9
nixos/livekit{,-ingress}: automatically configure redis for locally distributed setups
2025-06-23 18:35:25 +03:00
K900
f19355f5ed
nixos/livekit-ingress: init
2025-06-23 18:35:24 +03:00
Greizgh
fd3d596a1c
seafile: remove myself from maintainers
...
I do not use seafile anymore and won't spend energy working on it.
2025-06-23 14:57:48 +02:00
nixpkgs-ci[bot]
b68b849d07
Merge staging-next into staging
2025-06-22 18:06:41 +00:00
Sandro
f565429fb3
nixos/seafile: update outdated https links in package metadata ( #412349 )
2025-06-22 19:26:47 +02:00
Hannes Graf
09124156ca
nixos/seafile: update outdated https links
2025-06-22 15:36:29 +02:00
nixpkgs-ci[bot]
d9f7cbb224
Merge staging-next into staging
2025-06-22 00:20:02 +00:00
Wolfgang Walther
e80ca91f80
net-tools: rename from nettools ( #416056 )
2025-06-21 18:29:34 +00:00
Jakob Kukla
db7efc1412
nixos/atticd: fix user and group documentation mixup
2025-06-21 20:20:30 +02:00
zimbatm
39c01d22bf
net-tools: rename from nettools
...
By being in sync with the pname, it makes it easier to walk back from
the pname that shows in the /nix/store back to the attribute.
This change should not cause any rebuild.
2025-06-21 19:57:36 +02:00
Aleksana
4e4c90af3a
nixos/stunnel: give up maintainerhsip ( #418234 )
2025-06-22 00:05:21 +08:00
Franz Pletz
5fecf8770b
nixos/chrony: add systemd service notify support ( #416715 )
2025-06-21 08:38:17 +02:00
Pavol Rusnak
4fab5e9fe9
fedimint: 0.5.1 -> 0.7.1 ( #397967 )
2025-06-20 21:28:34 +02:00
Dawid Ciężarkiewicz
c0f52c28cd
fedimint: 0.5.1 -> 0.7.1
...
0.7 release of Fedimint includes deployment changes. Notably:
* Experimental Iroh p2p connectivity support (uses UDP)
* built-in admin UI
2025-06-20 09:22:50 -07:00
Leon Schuermann
5fe0a4bef6
nixos/stunnel: give up maintainerhsip
2025-06-19 14:55:25 -04:00
r-vdp
3c853295d9
nixos/wstunnel: convert to RFC42-style settings
2025-06-18 17:31:13 +02:00
Matthew Croughan
e9eb7be1d6
nixos/scion: upgrade to 0.12 and fix module accordingly ( #417777 )
2025-06-18 13:29:02 +01:00
Aleksana
b95bc4d285
pihole-ftl: fix settings.webserver.tls.cert ( #415532 )
2025-06-18 17:10:37 +08:00
matthewcroughan
b1b384ccb3
nixos/scion: changes for 0.12
...
These are the necessary changes for updating to 0.12, which supports dispatcherless operation by foregoing the dispatcher's unix socket in favour of UDP
2025-06-18 09:24:15 +01:00
Peder Bergebakken Sundt
42d7266f38
firezone-gui-client: 1.4.12 -> 1.5.1 ( #414765 )
2025-06-17 03:42:41 +02:00
Morgan Jones
41ace86393
services: openvpn: servers: authUserPass: allow to be a path ( #395982 )
2025-06-15 17:04:13 -07:00
Jacob Birkett
5f33d95144
services: openvpn: servers: authUserPass: allow to be a path
...
This allows using an agenix file.
2025-06-15 16:47:21 -07:00
Martin Weinelt
ac4ce03274
nixos/pdns-recursor: configure as local resolver
...
When pdns-recursor is enabled it should ideally be the default resolver
for the host as well. This is probably good for 95% of the use-cases out
there, and the default for unbound and kresd, but also bind and dnsmasq.
2025-06-15 19:02:27 +02:00
Franz Pletz
b333d60710
nixos/tests/chrony: not compatible with graphene-hardened anymore
...
Version 4.7 introduced the incompatibility, see #416005 .
2025-06-14 16:56:34 +02:00
Franz Pletz
7a6c67e796
nixos/chrony: add systemd service notify support
2025-06-14 16:47:44 +02:00
Aleksana
5625b7eff6
nixos/doc: explain how to use the ff sync module with ff android ( #413380 )
2025-06-11 19:44:46 +08:00
Guillaume Girol
a975ab0752
nixos/doc: explain how to use the ff sync module with ff android
...
source https://mozilla-services.readthedocs.io/en/latest/howtos/run-sync-1.5.html#howto-run-sync15
Quotation:
```
Firefox for Android (“Daylight”, versions 79 and later) does support using a non-Mozilla-hosted Sync server. Before logging in, go to App Menu > Settings > About Firefox and click the logo 5 times. You should see a “debug menu enabled” notification. Go back to the main menu and you will see two options for a custom account server and a custom Sync server. Set the Sync server to the URL given above and then log in.
To configure Android Firefox 44 up to 78 to talk to your new Sync server, just set the “identity.sync.tokenserver.uri” exactly as above before signing in to Mozilla accounts and Sync on your Android device.
Important: after creating the Android account, changes to “identity.sync.tokenserver.uri” will be ignored. (If you need to change the URI, delete the Android account using the Settings > Sync > Disconnect… menu item, update the pref, and sign in again.) Non-default TokenServer URLs are displayed in the Settings > Sync panel in Firefox for Android, so you should be able to verify your URL there.
```
the /token/ prefix is experimentally wrong.
2025-06-11 12:00:00 +00:00
Leon
8941989f24
pihole-ftl: fix settings.webserver.tls.cert
2025-06-10 11:34:48 +02:00
Yarny0
6acf53f654
nixos/sshd: don't use -a (KDF rounds) on host keys
...
The nixos `sshd.nix` module contains a
mechanism to generate ssh host keys prior to
starting sshd if those host keys are missing.
The option `services.openssh.hostKeys` is used to
configure which host keys should exist or be created.
It also declares the key type and other key-related options.
One of those options is `rounds`.
That one is then forwarded to the
`ssh-keygen` program with the `-a` option.
It defines how many rounds of a key derivation function
are to be used on the key's passphrase before the result
is used to en-/decrypt the private key; cf. ssh-keygen(1).
ssh host keys are passwordless;
they are solely protected by filesystem access modes.
Hence, the `-a` option is irrelevant
and silently ignored by `ssh-keygen`.
The commit at hand therefore removes this option from
the host key generation script and the option examples.
2025-06-09 21:06:20 +02:00
oddlama
b2b1a8c052
nixos/firezone-gui-client: adjust to renamed tunnel service binary
2025-06-08 16:56:26 +02:00
Michele Guerini Rocco
b16827a225
nixos/dhcpcd: specify withUdev when overriding the package for no udev ( #414724 )
2025-06-08 12:21:11 +02:00
Pol Dellaiera
d7ed3c0dce
pihole-ftl: 6.1 -> 6.2.2 ( #414788 )
2025-06-08 09:51:06 +02:00
Peter Lehmann
c586196e17
nixos/pdns-recursor: reload service on config change
2025-06-07 19:13:07 +02:00
williamvds
e8b98ec709
pihole-ftl: update 6.1 -> 6.2.2
...
Apply some review suggestions by @dotlambda
2025-06-07 17:46:46 +01:00
7c6f434c
63eb46dcd5
nixos/dhcpcd: specify withUdev when overriding the package for no udev
2025-06-07 16:24:30 +02:00
Lin Jian
2302f3c9bd
nixos/dnscrypt-proxy2: add package option ( #411451 )
2025-06-06 21:21:30 +08:00
MidAutumnMoon
101965187e
nixos/dnscrypt-proxy2: add package option
...
nixos/dnscrypt-proxy2: remove `with lib;`
Co-authored-by: Sizhe Zhao <prc.zhao@outlook.com>
2025-06-06 18:15:30 +08:00
Felix Singer
31d18149ad
nixos/murmur: Drop warnings regarding renamed/removed options
...
These warnings were added around 5 years ago. That's long enough. So
drop them.
Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-06-06 07:52:35 +02:00
Felix Singer
b6c81af12d
nixos/murmur: Get rid global lib expansion
...
Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-06-06 07:52:35 +02:00
Felix Singer
1c9df5c6de
nixos/murmur: Use lib.mkEnableOption where possible
...
While on it, replace occurrences of "Murmur" with "Mumble server" of
touched options.
Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-06-06 07:52:35 +02:00
williamvds
82b8a1e117
maintainers: rename williamvds -> averyvigolo
2025-06-04 21:27:11 +01:00
John Wiegley
8922d4f099
pihole: init at various ( #361571 )
...
Adds pihole-ftl.service and pihole-ftl-log-deleter.service.
Authored-By: williamvds <william@williamvds.me>
2025-06-04 08:12:30 -07:00
Paul Haerle
ea34fcd8ae
nixos/tailscale-auth: restart on-failure and wait for tailscaled ( #393038 )
2025-06-04 13:50:31 +02:00
williamvds
8f5d24c1b2
nixos/pihole-ftl: init
...
Add a module for pihole-ftl, which allows declaratively defining the
pihole.toml config file.
Also provide options for adlists to use, which can be added through the pihole
script (packaged as "pihole"). Other state such as clients and groups require
complex database operations, which is normally performed by the pihole
webapp (packaged as "pihole-web").
Extend the dnsmasq module to avoid duplication, since pihole-ftl is a soft-fork
of dnsmasq which maintains compatibility.
Provide the pihole script in `environment.systemPackages` so pihole-ftl can be
easily administrated.
2025-06-03 23:15:18 +01:00
williamvds
4bdf75f1cb
dnsmasq: pass through config file as an option
...
So that the pihole module reuse it. pihole-ftl is a fork of dnsmasq and its
configuration file is compatible.
2025-06-03 23:15:17 +01:00
K900
716d4db111
Revert "nixos/murmur: Get rid of global lib expansion"
2025-06-03 09:13:00 +03:00
Arne Keller
8cc1462f3c
dsnet: init at 0.8.1, nixos/dsnet: init ( #408421 )
2025-06-02 23:14:24 +02:00
Linus Heckemann
2ce1d06baf
nixos/kresd: don't explicitly set group id
...
null is the default, but setting it explicitly rather than relying on
the default results in collisions if users want to set their own gid.
Requiring mkForce here shouldn't be necessary when the module doesn't
specifically rely on the auto-allocation behaviour.
Change-Id: Ia541ac4e9c4d85b240386049b9947c607674a2f5
2025-06-02 22:26:20 +02:00
Callan Bryant
eb01e02bd5
dsnet: init at 0.8.1 and init module
2025-06-02 20:41:52 +01:00
Felix Bühler
02abb271ea
nixos/murmur: Get rid of global lib expansion ( #412693 )
2025-06-02 21:04:25 +02:00
Pol Dellaiera
6d9d3014ba
treewide: fix typos in comments ( #413240 )
2025-06-02 18:43:07 +02:00
Peder Bergebakken Sundt
c77ac9dfc3
treewide: fix typos
2025-06-02 16:07:07 +02:00
Michele Guerini Rocco
0e0842c978
nixos/monero: add an option to use ip ban-list ( #412522 )
2025-06-02 09:17:36 +02:00
alyaeanyx
bdd58823ab
maintainers: rename alyaeanyx -> pentane
2025-06-01 09:27:14 +02:00
Felix Singer
7c7c839a26
nixos/murmur: Drop warnings regarding renamed/removed options
...
These warnings were added around 5 years ago. That's long enough. So
drop them.
Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-05-31 21:15:21 +02:00
Felix Singer
f13ada1223
nixos/murmur: Get rid global lib expansion
...
Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-05-31 21:15:21 +02:00
Felix Singer
9bca318775
nixos/murmur: Use lib.mkEnableOption where possible
...
While on it, replace occurrences of "Murmur" with "Mumble server" of
touched options.
Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-05-31 21:15:21 +02:00
nat
1ffc904284
nixos/monero: add an option to use ip ban-list
2025-05-31 13:02:50 +02:00
nat
6617c167f7
nixos/monero: use lib.getExe
2025-05-31 02:05:50 +02:00
Kristoffer Dalby
0dd5cdaa3b
headscale: 0.25.1 -> 0.26.0, update nixos module and test accordingly
...
Co-authored-by: Sandro <7258858+SuperSandro2000@users.noreply.github.com>
Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
2025-05-28 16:20:41 +02:00
Matthias Beyer
c84ce50209
adguardhome: Build from source ( #411034 )
2025-05-27 11:50:16 +02:00
Aleksana
938e3fa749
nixos/networkmanager: add an enableDefaultPlugins option ( #366842 )
2025-05-26 20:34:24 +08:00
Aleksana
05ea790f13
nixos/anubis: Apply some more hardening settings ( #410041 )
2025-05-26 17:42:25 +08:00
Golbinex
6e99825c18
nixos/adguardhome: Update binary path
...
The compiled binary filename has upper cases
2025-05-26 07:24:42 +00:00
Aleksana
f974b3e433
nixos/zeronsd: fix acl permissions ( #391231 )
2025-05-26 12:53:46 +08:00