Commit Graph

4094 Commits

Author SHA1 Message Date
Bjørn Forsman
aeaf887dcb nixos/deconz: update URL to hardware products
There are multiple products/versions, so replace the "version 2" URL
with a landing page for all products.
2024-08-01 16:48:38 +02:00
Michele Guerini Rocco
de8d752e98
Merge pull request #319188 from buckley310/2024-06-11-wpa-supplicant
nixos/wireless: fix quotes in config path
2024-08-01 09:32:05 +02:00
euxane
4f2da6c9c1 nixos/fcgiwrap: add option migration instruction errors
This adds migration instructions for the removed global shared instance
configuration of fcgiwrap.

Adding those explicit messages to the previous options requires moving
the newly defined options from `services.fcgiwrap.*` to
`services.fcgiwrap.instances.*` due to an option namespace clash.

`mkRenamedOptionModule` was not used because the previous options do
not directly map to the new ones. In particular, `user` and `group`
were described as setting the socket's permission, but were actually
setting the process' running user.

Co-authored-by: Minijackson <minijackson@riseup.net>
2024-07-31 11:02:37 +02:00
zimbatm
5a353f15cc nixos/nar-serve: add domain option 2024-07-31 09:57:37 +02:00
zimbatm
ed47bba9ad nixos/nar-serve: add package option 2024-07-31 09:57:36 +02:00
K900
7f2ec487cc nixos/i2pd: actually fix, clean up a little bit 2024-07-30 11:07:37 +03:00
K900
268299ad04 nixos/i2pd: fix warning 2024-07-29 23:36:08 +03:00
Jörg Thalheim
5356420466 treewide: remove unused with statements from maintainer lists
$ find -type f -name '*.nix' -print0 | xargs -P "$(nproc)" -0 sed -i \
  -e 's!with lib.maintainers; \[ *\];![ ];!' \
  -e 's!with maintainers; \[ *\];![ ];!'
2024-07-29 10:06:20 +08:00
Sergei Zimmerman
e3e6e94010
nixos/rathole: init module
Adds a module for rathole package. The package itself
and this module is very similar to frp, so the options
and tests are not very far off from those for frp.
2024-07-28 01:25:01 +03:00
Florian Klink
21e3a4214f nixos/wvdial: init module 2024-07-27 19:11:02 +03:00
Aleksana
577a9c43f3
Merge pull request #330042 from Sigmanificient/remove-leading-space-description
treewide: remove trailing space in description
2024-07-26 23:48:02 +08:00
Dennis Stengele
6f3ba8d714
nixos/zeronsd: init module and package (#253610)
* zeronsd: init at 0.5.2

* nixos/zeronsd: init at 0.5.2

This is the module for the new zeronsd package.
2024-07-26 15:20:56 +02:00
Sigmanificient
543cd40ecc treewide: remove trailing space in description
Done using `grep -rP 'description\s+=\s+"[^"]+[ ]";' | cut -d ':' -f 1 |
xargs -i nvim {}` and sorting the opened files by hand, avoiding
generated packages list
2024-07-26 03:38:50 +02:00
Masum Reza
81cb83b07f
Merge pull request #290008 from eum3l/add-opengfw
opengfw: init at 0.4.0 (+NixOS module)
2024-07-24 20:39:41 +05:30
eum3l
86ae0fca93 nixos/opengfw: init 2024-07-24 15:11:23 +02:00
Silvan Mosberger
473e469d5a
Merge pull request #328381 from tie/map-attrs-flatten 2024-07-24 13:32:34 +02:00
Franz Pletz
b12aaa9f9b
Merge pull request #316139 from Luflosi/bind-service-wait-for-ready-status 2024-07-23 00:19:53 +02:00
Jörg Thalheim
f09ab69a7e nixos/zerotierone: clean up local.conf symlinks unconditionally 2024-07-20 16:39:56 +02:00
Ivan Trubach
7919709a23 nixos/modules: use mapAttrsToList instead of mapAttrsFlatten 2024-07-19 11:39:39 +03:00
Guanran Wang
782e8513d3
nixos/cloudflare-dyndns: introduce package option 2024-07-19 14:45:09 +08:00
Matthew Croughan
be9599e3d4
nixos/scion: introduce package option (#327765) 2024-07-19 02:30:10 +02:00
Darragh Elliott
61820de2d4 ddns-updater: Add module, test, update script 2024-07-17 21:56:05 +00:00
Shiva Kaul
04967c307f nixos/spiped: remove broken chmod's from preStart
Remove `chmod`s which were (1) broken and (2) no longer considered good Nix practice.
2024-07-14 22:04:53 +10:00
Martin Weinelt
e62de266ad
Merge pull request #326149 from mguentner/remove_mxisd_ma1sd
nixos/mxisd: remove module
2024-07-12 13:15:11 +02:00
Maximilian Güntner
23e62062bc
nixos/mxisd: remove module
mxisd and ma1sd are both unmaintained
2024-07-12 11:44:59 +02:00
Masum Reza
ae20d8d61a
Merge pull request #325951 from mjoerg/magic-wormhole-python-3.12
magic-wormhole: make usable with Python 3.12
2024-07-11 15:32:13 +05:30
Sandro
24cefb01b3
Merge pull request #284419 from ocfox/realm 2024-07-11 10:46:47 +02:00
Trey Fortmuller
7b32ea9abb
nixos/cloudflare-warp: init
Co-authored-by: John Titor <50095635+JohnRTitor@users.noreply.github.com>
removed `with lib;` at the top level
cleanup
2024-07-10 22:48:57 +05:30
ocfox
86ce0733d2
nixos/realm: init
Co-authored-by: Nick Cao <nickcao@nichi.co>
Co-authored-by: oluceps <i@oluceps.uk>
2024-07-10 16:43:17 +02:00
Martin Joerg
a85c314882 nixos/magic-wormhole-mailbox-server: use Python 3.11, adopt
magic-wormhole-mailbox-server is not yet supported with Python 3.12.
https://github.com/magic-wormhole/magic-wormhole-mailbox-server/issues/41
2024-07-09 22:22:56 +00:00
Martin Joerg
12de9a7469 nixos/magic-wormhole-mailbox-server: nixfmt 2024-07-09 22:22:56 +00:00
Franz Pletz
f1d54d49b9
Merge pull request #325459 from numinit/nebula-module-tweaks
nixos/nebula: support non-path host keys
2024-07-09 16:59:35 +02:00
Franz Pletz
31c99a61da
Merge pull request #325286 from bjornfor/nixos-deconz-fix-service-stop
nixos/deconz: treat SIGTERM exit status as success
2024-07-09 15:07:36 +02:00
matthewcroughan
c53e5201f4 nixos/scion: make storing path database optional
Storing the SCION path sqlite databases persistently on disk is a valid
setup that improves performance, but may have outstanding bugs that need
to be investigated, so this makes persisent storage optional, off by
default.
2024-07-08 13:26:30 +02:00
Morgan Jones
de5e0cf11b
nixos/nebula: add numinit as maintainer
I maintain the package and coauthored this module, so should be on it.
:-)
2024-07-08 01:06:58 -07:00
Morgan Jones
95f1ebd2aa
nixos/nebula: loosen ProtectSystem
"strict" may be too strict for some PKCS#11 providers.
2024-07-08 01:04:15 -07:00
Morgan Jones
b81827b992
nixos/nebula: allow string or path for keys
Nebula will be getting PKCS#11 support soon, and this will allow
keys to be specified as PKCS#11 URIs instead of paths.
2024-07-08 01:03:40 -07:00
Felix Buehler
72a4f148f9 nixos/bee: prefer 'install' over 'chmod' 2024-07-07 17:47:28 +02:00
Bjørn Forsman
5aab6344c2 nixos/deconz: treat SIGTERM exit status as success
deconz doesn't handle SIGTERM and terminates with code 143 (128 + 15
(SIGTERM) instead of 0. This results in systemd marking the service as
failed when a user stops it (with `systemctl stop deconz`). Fix it by
treating code 143 as success.
2024-07-07 16:11:11 +02:00
Aaron Andersen
6fa3ecdc73
Merge pull request #324464 from hraban/cloudflare-dyndns-frequency
cloudflare-dyndns: configurable systemd frequency
2024-07-04 21:02:43 -04:00
Masum Reza
9ec0508f83
Merge pull request #171855 from ju1m/prosody
nixos/prosody: support mod_http_file_share
2024-07-04 21:59:29 +05:30
Hraban Luyat
406351b470 cloudflare-dyndns: configurable systemd frequency 2024-07-03 22:50:45 -04:00
Tomas Kala
6930dd3dee nixos/blocky: Add an option for the package to be used
Previously, the blocky package was hardcoded to the one in pkgs. This
change allows to set it, so the user can configure the blocky service to
run blocky from nixpkgs-unstable, for example.
2024-07-03 13:42:34 +02:00
Thomas Gerbet
8ddb1bb721
Merge pull request #318599 from pacien/nixos-fcgiwrap-isolation
nixos/fcgiwrap: refactor to fix permissions
2024-07-02 21:52:33 +02:00
Sandro
15705830ce
Merge pull request #321061 from SomeoneSerge/prosody-logs
nixos/prosody: provide an (internal) escape hatch for overriding the …
2024-07-02 20:36:07 +02:00
Sandro
230c213fae
Merge pull request #314767 from Guanran928/mihomo
nixos/mihomo: add assertion for configFile
2024-07-02 20:27:36 +02:00
Cat
ed1b6699c0
nixos/syncthing: implement folder type (#308832)
* Syncthing: implemented folder type

* Syncthing: fix syntax (via @johnhamelink )

This commit should be rebased/squashed into the previous one if ofborg cleares it!

Co-authored-by: John Hamelink <me@johnhame.link>

---------

Co-authored-by: John Hamelink <me@johnhame.link>
2024-07-02 19:49:03 +08:00
Janik H.
76cd1d2211 maintainers: drop janik
I guess my time has come as well...

With this commit, I'm not just dropping my maintainer entry, but I'm also
resigning from my duties as a board observer and NixCon project lead.
I also terminated my Summer of Nix contract today.
I'll also stop hosting the local NixOS meetup.

The only "project" I'll finish under the NixOS Foundation umbrella is
Google Summer of Code because the mentees aren't even remotely
responsible for why I'm leaving, and it would be unfair to leave them
hanging.

I'm grateful for all the things I was able to learn, for all the experiences
I could gather, and for all the friends I made along the way.
NixOS is what makes computers bearable for me, so I'll go and work on
some fork (*something something* you always meet twice in life).
2024-07-02 02:36:42 +02:00
Jasper Woudenberg
71e88077ca maintainers: remove jwoudenberg 2024-07-02 01:35:17 +02:00
Marcus Ramberg
a449a2a14a
Merge pull request #321079 from res0Nanz/master
nixos/cloudflared: fix links in doc
2024-07-01 23:39:57 +02:00
pennae
5c5aaaaaae maintainers: remove pennae
https://discourse.nixos.org/t/nca-jonringer-joint-announcement/48231
https://web.archive.org/web/20240701165505/https://discourse.nixos.org/t/nca-jonringer-joint-announcement/48231

we had little faith in the NCA process, but this is going deep, *deep*
into the territory of wilfully insulting all those had placed even a
modicum of trust in that process.

have you fucking nazi bar.
2024-07-01 18:56:40 +02:00
Someone Serge
12c6d79e72 nixos/prosody: provide an escape hatch for overriding the logging configuration 2024-07-01 01:24:19 +00:00
tomberek
079457313a
Merge pull request #321930 from jtbx-prs/oink-after-network
nixos/oink: wait for network.target
2024-06-29 20:42:03 -04:00
Eman Lear
6c00b71662
Merge branch 'master' into master 2024-06-30 02:19:21 +08:00
Matthew Croughan
d76ad79b4d
nixos/scion: use RuntimeDirectory instead of StateDirectory (#323200)
It was wrong to use StateDirectory to keep the scion-control and
scion-router runtime databases on disk for the next run. I observed that
doing this means a reboot, or power outage can corrupt the temporary
runtime databases for the next service start, leading scion ping and
other functionality to stop working permanently, since those files are
not managed in an atomic manner by the golang code.
2024-06-28 22:16:36 +02:00
Silvan Mosberger
c8dec6df38
Merge pull request #322801 from eclairevoyant/discourage-mkpackageoptionmd
lib: deprecate mkPackageOptionMD
2024-06-27 20:15:08 +02:00
matthewcroughan
23c24527dc nixos/scion: add scion package when scion.enable = true 2024-06-27 11:52:04 +02:00
matthewcroughan
973108d3ed nixos/scion: use recursiveUpdate instead of // 2024-06-27 11:51:28 +02:00
éclairevoyant
aeee4fc133
treewide: replace mkPackageOptionMD with mkPackageOption 2024-06-26 23:05:42 -04:00
Sandro
33f83c6252
Merge pull request #316977 from eclairevoyant/fix-mkEnableOption
treewide: fix mkEnableOption usage
2024-06-25 22:42:16 +02:00
Sandro
1813936aff
Merge pull request #272895 from xanderio/wg-access-server-0.10.1
wg-access-server: init at 0.12.1
2024-06-25 21:21:19 +02:00
Alexander Sieg
369cfec06d
nixos/wg-access-server: init module 2024-06-25 10:59:30 +02:00
Jonathan Davies
5ea0207b73
nixos/nats: Implemented configuration verification 2024-06-23 21:56:59 +01:00
Ryze
10962c7ca2
nixos/zerotierone: fix default value for localConf 2024-06-23 18:10:59 +03:00
Jeremy Baxter
923a86602e nixos/oink: wait for network.target 2024-06-23 21:34:40 +12:00
Gooxey
d3140c11a5 nixos/antennas: removed WorkingDirectory setting
Antennas could not start because the specifed directory did not exist
2024-06-23 09:23:42 +02:00
euxane
3d10deb7a5 nixos/cgit: fix GIT_PROJECT_ROOT ownership
The GIT_PROJECT_ROOT directory is now created at runtime instead of
being assembled at build time.

This fixes ownership issues which prevented those repositories to be
read by users other than root. This also avoids creating symlinks in
the nix store pointing to the outside.
2024-06-22 19:45:25 +02:00
euxane
2d8626bf0a nixos/cgit: configurable user instead of root
This allows running cgit instances using dedicated users instead of
root. This is now set to "cgit" by default.
2024-06-22 19:45:25 +02:00
euxane
c5dc3e2034 nixos/fcgiwrap: adapt consumer modules and tests 2024-06-22 19:45:25 +02:00
euxane
8101ae41f8 nixos/fcgiwrap: adapt consumer modules and tests 2024-06-22 19:45:25 +02:00
euxane
bf2ad6f48c nixos/fcgiwrap: adapt consumer modules and tests
This also fixes the gitolite-fcgiwrap test by running git through
fcgiwrap as the proper user.
2024-06-22 19:45:25 +02:00
Jörg Thalheim
9f180c5438
Merge pull request #280517 from Mic92/zerotierone
nixos/zerotierone: make localConf mergeable
2024-06-21 15:32:05 +02:00
Jörg Thalheim
09ead1f6eb nixos/zerotierone: make localConf mergeable 2024-06-21 15:17:45 +02:00
Tom Hubrecht
938372e46e nixos/netbird: Remove thubrecht as maintainer 2024-06-21 09:32:46 +02:00
res0Nanz
16d8c11a33 nixos/networkd-dispatcher: fix links in doc
Ill-formatted markdown links fixed.
2024-06-20 00:52:12 +08:00
res0Nanz
ae96067a6d nixos/cloudflared: fix links in doc
Ill-formatted markdown links fixed.
2024-06-20 00:49:01 +08:00
h7x4
4c7c3ceb12
nixosTests.wstunnel: init
Co-authored-by: r-vdp <ramses@well-founded.dev>
2024-06-18 11:07:06 +03:00
r-vdp
53e7bea45c
nixos/wstunnel: update the wstunnel module to work with the new rust implementation
Co-authored-by: h7x4 <h7x4@nani.wtf>
2024-06-18 11:07:06 +03:00
Tim Häring
7a7060c5bf
nixos/aria2: fix missing default 2024-06-15 12:55:06 +02:00
Tim Häring
f6d3113164
nixos/aria2: fix remove not needed code 2024-06-15 12:51:29 +02:00
éclairevoyant
7d8742da87
treewide: fix mkEnableOption usage 2024-06-14 02:41:42 -04:00
Nick Cao
06b68ac5a3
Merge pull request #317840 from NeverBehave/pkg-ws-tunnel-rust
wstunnel: 0.5.1.0 -> 9.6.1
2024-06-13 13:31:08 -04:00
NeverBehave
3fb0e045a5 nixos/wstunnel: adopt rust new cli flags 2024-06-13 00:58:02 +00:00
Pol Dellaiera
7d270d53b9
Merge pull request #303429 from timhae/aria2-module
Aria2 module settings
2024-06-12 19:23:44 +02:00
Sean Buckley
36175fb9ad nixos/wireless: fix quotes in config path 2024-06-11 20:45:04 -04:00
Sandro
da3214b120
Merge pull request #309551 from aca/master 2024-06-10 15:48:32 +02:00
Weijia Wang
9520d06979
Merge pull request #266450 from CRTified/adguardhome-fix-246461
nixos/adguardhome: run --check-config before merging
2024-06-10 12:46:26 +02:00
Guanran928
e27092e106
metacubexd: init at 1.140.0 (#297721)
* metacubexd: init at 1.140.0

* nixos/mihomo: add example for cfg.webui
2024-06-10 12:45:19 +02:00
Florian Klink
6a3a382d5b nixos/mycelium: add mycelium binary to systemPackages
It's now possible to invoke `mycelium {routes,peers} list`.
2024-06-08 15:01:32 +03:00
Thomas Churchman
d226935fd7 nixos/ddclient: deprecate use, implement use{v4,v6}
Upstream replaced `use` with `use{v4,v6}`:
4a1b06630b/ChangeLog.md (new-features)
2024-06-07 17:28:25 +02:00
Keith Pine
6fda200fa4 nixos/inadyn: fix cache directory path
The CacheDirectory subdirectory is already part of $CACHE_DIRECTORY.
2024-06-07 09:03:24 +02:00
PatrickDaG
0fdf6e2917
nixos/netbird: fix defaults (#314656)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-06-07 00:02:06 +02:00
rnhmjoj
3c12ef3f21
nixos/firewall: fix reverse path check failures with IPsec
The endpoint of an IPsec tunnel receives encrypted IPsec packets that
are first decrypted and then forwarded to the intended destination.
The decrypted traffic appears to originate from the same interface it
came in from, so in most cases these packets will fail the reverse path
check even if legitimate.

This change adds an exception to not reject packets that were previously
IPsec-encrypted, meaning the have been accepted, decrypted and are in
the process of being forwarded to their final destinal.

Sources:

  - https://www.kernel.org/doc/Documentation/networking/xfrm_device.txt
  - https://git.netfilter.org/nftables/commit/?id=49f6e9a846c6c8325b95debe04d5ebc3c01246fb
  - https://git.netfilter.org/nftables/commit/?id=8f55ed41d007061bd8aae94fee2bda172c0e8996
  - https://thermalcircle.de/doku.php?id=blog:linux:nftables_demystifying_ipsec_expressions
2024-06-05 15:18:35 +02:00
Thomas Gerbet
ef6fea2d86 openssh: move Kerberos support into a dedicated package
The `openssh` and `openssh_hpn` packages are now built without
the Kerberos support by default in an effort to reduce the attack surface.

The Kerberos support is likely used only by a fraction of the total users
(I'm guessing mainly users integrating SSH in an Active Directory env) so
dropping it should not impact too many users. It should also be noted that
the Kerberos/GSSAPI auth is disabled by default in the configuration.
`opensshWithKerberos` and `openssh_hpnWithKerberos` are added in order
to provide an easy migration path for users needing this support.

The `openssh_gssapi` package is kept untouched.
2024-06-05 19:45:31 +10:00
Sandro Jäckel
41452802cb
treewide: fix all obviously wrong mkEnableOptions 2024-06-03 13:20:32 +02:00
Guanran Wang
818fe57b73
nixos/mihomo: format using nixfmt 2024-06-03 10:20:58 +08:00
Guanran Wang
f1034cab06
nixos/mihomo: drop default value from cfg.configFile 2024-06-03 10:20:58 +08:00
Ryan Horiguchi
ea63e59edc nixos/adguardhome: fix typo 2024-06-02 21:01:11 +02:00
Sandro
c6c60cca65
Merge pull request #315112 from sikmir/git-daemon 2024-06-02 17:08:43 +02:00
Julien Moutinho
d4954e0df2 nixos/prosody: support mod_http_file_share 2024-06-01 22:23:20 +02:00
Luflosi
8e945401d5
bind: make systemd service wait for BIND to be ready
Without this change, the systemd unit will be marked as ready even though BIND has not finished starting yet.
This causes other units that depend on BIND to start even though BIND is not ready yet.
From https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900788: "Bind9 will daemonize itself _when it is ready_."

Also modify the NixOS test. With this change, waiting for the unit alone will ensure that BIND is ready to accept queries. I would have expected to see the test failing without this commit but with the `machine.wait_for_open_port(53)` line removed but I found this to not be the case most of the time. This is probably the case because the situation is inherently racy and on my machine BIND happens to start in time most of the time.
2024-05-31 13:33:29 +02:00
Franz Pletz
4e1b4397d9
Merge pull request #312472 from Ma27/networkd-option-rename
nixos/networkd: get rid of *Config attributes in lists
2024-05-30 04:06:01 +02:00
Martin Weinelt
e0f4e4b535
Merge pull request #274425 from woffs/fix-274286
nixos/frr: adapt to frr-9
2024-05-30 02:33:26 +02:00
lassulus
d6f07be682
Merge pull request #314889 from DavHau/pr_sshd
nixos/openssh: allow removing settings
2024-05-30 01:01:07 +02:00
Frank Doepper
4df955130e nixos/frr: adapt to frr-9
- fix #274286
- remove `-f configfile` from ExecStart
- use /etc/frr/${service}d.conf
- enable mgmtd when staticd is enabled
- don't frr-reload.py mgmtd
- remove obsolete lib.mdDoc
2024-05-29 11:07:39 +02:00
Nikolay Korotkiy
ecddd99c6a
nixos/gitDaemon: add package option 2024-05-27 18:50:15 +04:00
Thomas Gerbet
00015f3ef9
Merge pull request #309036 from tomfitzhenry/sshd-package
nixos/ssh: add services.openssh.package
2024-05-27 09:40:31 +02:00
DavHau
3fe773a174 nixos/openssh: allow removing settings
# Motivation
So far it was not possible to configure sshd to allow password authentication only for a specific user. This is because in the generated config a `Match User xxx` section would be required before the global `PasswordAuthentication` is defined, as otherwise the global option always takes precedence.
The same problem occurs with multiple other options under `settings`.

# Done
This PR fixes that issue for all settings by simply allowing them to be overridden with `null`, which leads to a removal of that setting from the config.
The user can then correctly configure user specific settings using extraConfig, like this:
```
    Match User user1
    PasswordAuthentication yes
    Match all
    PasswordAuthentication no
```
2024-05-26 18:46:27 +02:00
Isabelle
56141e2236
nixos/wireguard: add option preShutdown for commands called before interface deletion (#310345) 2024-05-23 13:53:45 +02:00
Martin Weinelt
5d515c373e
nixos/kea: make ctrl-agent want network-online.target
If it wants to run after it, it needs to want it for it to be there.
2024-05-23 10:31:30 +02:00
Jeremy Baxter
20fc095a1c nixos/oink: init module 2024-05-23 10:12:53 +12:00
Maximilian Bosch
c4fd7cf16d
nixos/networkd: get rid of *Config attributes in lists
This patch is about removing `wireguardPeerConfig`,
`dhcpServerStaticLeaseConfig` - a.k.a. the
AbstractSingletonProxyFactoryBean of nixpkgs - and friends.

As a former colleague said

> worst abstraction ever

I second that. I've written enough networkd config for NixOS systems so
far to have a strong dislike. In fact, these don't even make sense:
`netdevs.wireguardPeers._.wireguardPeerConfig` will be rendered into
the key `[WireGuardPeer]` and every key from `wireguardPeerConfig` is in
there. Since it's INI, there's no place where sections on the same level
as wireguardPeerConfig fit into. Hence, get rid of it all.

For the transition, using the old way is still allowed, but gives a
warning. I think we could drop this after one release.

The tests of rosenpass and systemd-networkd-dhcpserver-static-leases
were broken on the rev before, hence they were updated, but are still
not building.
2024-05-20 17:26:42 +02:00
Marie Ramlow
6478f80b17 nixos/rosenpass: move preStart into script to workaround systemd bug
Because of a systemd bug, using both ExecStartPre and ExecStart will fill up the systemd credentials directory,
which leads to rosenpass failing to start.
This will be fixed in systemd v256, see https://github.com/systemd/systemd/pull/31202

Related issue: https://github.com/NixOS/nixpkgs/issues/258371
2024-05-15 17:52:45 +02:00
Raghav Sood
ec2f5e1cb9
Merge pull request #309615 from mkienitz/fix/vsftpd-assertion
Fix/vsftpd assertion
2024-05-15 23:09:28 +08:00
Tom Fitzhenry
54ba3732f1 hostapd: add "wpa2-sha1" to authentication.mode enum
This is required for some Kindles (e.g. Kindle Paperwhite 7th Gen),
and printers (e.g. Brother MFC-J4440DW).

OpenWRT typically adds "wpa_key_mgmt = WPA-PSK", per 3f28c422ba/package/network/config/wifi-scripts/files/lib/netifd/hostapd.sh (L44-L71)
2024-05-14 19:28:15 +10:00
Florian Klink
aff6a121a3
Merge pull request #311039 from DavHau/pr_smokeping
nixos/smokeping: use nginx instead of thttpd
2024-05-13 01:11:59 +02:00
Franz Pletz
ef26d99b37
Merge pull request #310873 from ivan/radvd-debuglevel
nixos/radvd: add debugLevel option
2024-05-12 22:23:24 +02:00
Andreas Rammhold
d157db3480
Merge pull request #307051 from hax404/modules/tayga/mappings
nixos/tayga: add mappings option
2024-05-12 21:16:26 +02:00
DavHau
0b6c484848 nixos/smokeping: use nginx instead of thttpd
Motivation:
fixes #265953

Changes:
- deprecate `services.smokeping.port` in favor of the niginx native option
- mention in release notes
2024-05-12 13:31:11 +02:00
Bjørn Forsman
7909e0f7d6 nixos/pixiecore: fix apiServer example
Add missing http:// scheme. Without it pixiecore logs this and never
contacts the API server:

  [DHCP] Couldn't get bootspec for [REDACTED_MAC_ADDR]: Get "localhost:8080/v1/boot/[REDACTED_MAC_ADDR]": unsupported protocol scheme "localhost"
2024-05-11 23:01:35 +02:00
Ivan Kozik
0482e54050 nixos/radvd: add debugLevel option 2024-05-11 14:59:09 +00:00
Kyungrok Chung
81a58be20b nixos/tailscale: add extraSetFlags to configure daemon 2024-05-11 03:01:54 +09:00
Maximilian Kienitz
aa93972d0b nixos/vsftpd: fix invalid implication in assertions 2024-05-06 23:26:09 +02:00
nicoo
db5f88c41a
nixos/ssh: Make ~/.ssh/authorized_keys optional in AuthorizedKeysFiles (#279894) 2024-05-06 01:11:03 +00:00
Sandro
bdd2e6b121
Merge pull request #309324 from evenbrenden/move-jotta-cli
nixos/jotta-cli: move to services.jotta-cli
2024-05-05 23:17:24 +02:00
Georg Haas
e83b8cfd43
nixos/tayga: add mappings option 2024-05-05 21:10:51 +02:00
André Silva
7142a2dec9
Merge pull request #306655 from devusb/sunshine-update
sunshine: 0.23.0 -> 0.23.1
2024-05-05 19:14:28 +01:00
Even Brenden
9fa89d0e2c nixos/jotta-cli: move to services.jotta-cli 2024-05-05 19:30:16 +02:00
Weijia Wang
9ed8582721
Merge pull request #308622 from jmbaur/jbaur/clatd-minor-cleanup
Minor cleanups for clatd module and release notes
2024-05-04 19:25:11 +02:00
Tom Fitzhenry
ff1c82ee07 nixos/ssh: add services.openssh.package
Motivation: Allow the sshd package to be built differently to the ssh
package (programs.ssh.package). For example, build sshd(1) without
openssl, but built ssh(1) with OpenSSL support.

Set the default to be programs.ssh.package, to preserve compatibility.
2024-05-04 23:14:47 +10:00
Carl Richard Theodor Schneider
3e86aba9d2 nixos/adguardhome: run --check-config before merging
To prevent merging configurations on different `schema_version`,
we will now check the existing configuration, which has the side-effect of
updating the `schema_version`.

Fixes #246461 as described in https://github.com/NixOS/nixpkgs/issues/246461#issuecomment-1667663556
2024-05-03 20:15:02 +02:00
éclairevoyant
512b6d9ad2
Merge pull request #308531 from sanxus/fix-extraConfig
nixos/networkmanager: fix incorrect documention about `extraConfig`
2024-05-03 18:08:44 +00:00
sanxus
6b7692c8f5
nixos/networkmanager: fix incorrect documention about extraConfig 2024-05-04 01:04:51 +08:00
Jared Baur
09073330e0
nixos/clatd: remove invalid startLimitIntervalSec
The `startLimitIntervalSec` option is not valid under `serviceConfig`.
2024-05-02 14:16:12 -07:00
nicoo
480b871f2d
Merge #305844: add clatd module and nixos test 2024-05-02 14:00:06 +00:00
Colin Sane
6034d354d7
nixos/trust-dns: fix invalid default for settings.zones option (#308513)
and fix a few documentation typos while here.
2024-05-02 12:34:04 +00:00
Sandro
2e9d7dca27
Merge pull request #302570 from evenbrenden/jottad-service 2024-05-02 10:25:30 +02:00
Weijia Wang
f6a18241dd
Merge pull request #247828 from rhoriguchi/nixos/adguardhome
nixos/adguardhome: update config to match new schema, update package and fix update script
2024-04-30 16:44:10 +02:00
Georg Haas
0c42398c9d
nixos/clatd: init 2024-04-29 23:29:29 +02:00
Even Brenden
021a0ffe57 nixos/jotta-cli: init jotta-cli
See https://github.com/NixOS/nixpkgs/issues/300063.
2024-04-29 09:14:47 +02:00
Vladimír Čunát
5cb7aa5ec9
nixos/knot: use a more precise type for .settings
See discussion on PR #304373
2024-04-28 10:26:09 +02:00
Tom
97bb1199c0 maintainers: remove twitchyliquid64
Yall won't miss me. The packages I leave orphaned are trivially updated as dependents need the new versions.

But passively endorsing the direction this organization and its leadership is something I can't do.

To those who still have faith in turning this around, you da real MVP 🖖
2024-04-26 22:48:31 -07:00
Sarah Brofeldt
75541131ef
Merge pull request #306608 from Tom-Hubrecht/netbird-coturn
nixos/netbird: Fix configuration of coturn server
2024-04-27 07:35:02 +02:00
Dave Anderson
308cb342c9 maintainers: drop danderson 2024-04-26 11:36:50 -07:00
北雁 Cryolitia
13e6ece470
nixos/sunshine: add autoStart attr 2024-04-25 16:53:24 +08:00
Morgan Helton
34b255b69b nixos/sunshine: add literalExpression for examples 2024-04-24 19:17:57 -05:00
Tom Hubrecht
5ad0ea1aaf nixos/netbird: Fix configuration of coturn server 2024-04-24 20:35:32 +02:00
Thomas Gerbet
ecd2d35be0
Merge pull request #305742 from tomfitzhenry/ssh-no-pam
nixos/ssh: expose UsePAM and PrintMotd as options
2024-04-24 09:40:24 +02:00
Tom Fitzhenry
3fd9ef4b40 nixos/ssh: allow PrintMotd to be enabled 2024-04-23 22:53:09 +10:00
Tom Fitzhenry
2e51a2fd03 nixos/ssh: allow UsePAM to be disabled 2024-04-23 22:40:58 +10:00
Maximilian Bosch
2ee96a1738
nixos: fix manual build
`mdDoc` is deprecated!
2024-04-21 23:28:46 +02:00
Pol Dellaiera
95d8be4d3c
Merge pull request #301514 from r-vdp/nftables-rpfilter-extra-rules
nixos/firewall-nftables: allow adding additional rules to the rpfilter chain
2024-04-21 23:02:01 +02:00
Sandro
04a3a2a8fe
Merge pull request #260962 from lunik1/inadyn-module
nixos/inadyn: init
2024-04-21 21:38:22 +02:00
Michele Guerini Rocco
8b93a430dc
Merge pull request #305689 from rnhmjoj/pr-fix-wpa-secrets
nixos/wireless: correctly handle secrets containing &
2024-04-21 16:07:42 +02:00
rnhmjoj
89a1bde018
nixos/wireless: correctly handle secrets containing &
In the replacement arg of gsub() the & symbol is a special character
that need to be escaped. To avoid this, and further issues due to the
variable name possibly being interpreted as a regex, we do a normal
substring replacement.

This fixes issues #279803.
2024-04-21 09:58:26 +02:00
rnhmjoj
4fa107f1c9
nixos/wireless: create empty config for imperative setup
If allowAuxiliaryImperativeNetworks is enabled, the wpa_supplicant
daemon complains fails to start if /etc/wpa_supplicant.conf does not
exist. As this can be created using wpa_cli (or similar) later, it
shouldn't matter, so let's create an empty one.

This fixes issues #157537, #299466.
2024-04-21 02:10:32 +02:00
Sandro
5bfe2b6964
Merge pull request #294641 from devusb/sunshine-module
nixos/sunshine: init
2024-04-20 21:32:50 +02:00
Bjørn Forsman
c7ab550bbc nixos/deconz: fix curl redirect option in postStart
It should be curl -L (follow redirects), not curl -l (FTP directory
listing option). I know because it's my mistake.

Fixes: d4b989cafc ("nixos/deconz: delay signalling service readiness until it's actually up")
2024-04-20 20:24:39 +02:00
Ryan Lahfa
21bd30ea2f
Merge pull request #247118 from Tom-Hubrecht/netbird-server
nixos/netbird-server: init module
2024-04-20 11:21:10 +02:00
Ryan Horiguchi
c60dd90d1f nixos/adguardhome: update config to match new schema 2024-04-19 18:42:52 +02:00
Martin Weinelt
666b73468d
Merge pull request #304373 from SuperSandro2000/knot-settings
nixos/knot: use module system to combine settings option
2024-04-19 17:26:53 +02:00
Tim Häring
31c9eec061
nixos/aria2: add settings option
I also took the liberty to add myself as module maintainer
2024-04-18 21:04:27 +02:00
Tom Hubrecht
6d91c95fce nixos/netbird-server: init module 2024-04-18 15:33:18 +02:00
Sandro
f417891699
Merge pull request #293954 from Dan-Theriault/refactor-tailscale-auth 2024-04-18 15:14:01 +02:00
Lily Foster
59742f6f72
Merge pull request #292472 from Janik-Haag/networkmanager-tests
nixosTests.networking: refactor and add NetworkManager support
2024-04-18 06:38:37 -04:00
Atemu
3bdc0e7715
Merge pull request #304810 from ju1m/dnscrypt-proxy2
nixos/dnscrypt-proxy2: fix cross-compiling
2024-04-18 09:04:41 +02:00
Bjørn Forsman
d4b989cafc nixos/deconz: delay signalling service readiness until it's actually up
Fixes test flakiness (`nix-build -A nixosTests.deconz`).
2024-04-17 22:32:15 +02:00
Janik H.
8612ed1ee9
nixos/networkmanager: change config generation to use the ini generator 2024-04-17 21:20:11 +02:00
Julien Moutinho
6fd2d4b541 nixos/dnscrypt-proxy2: fix cross-compiling 2024-04-17 16:41:51 +02:00
Pascal Wittmann
6ae4216336
Merge pull request #303890 from oluceps/ss-module
nixos/shadowsocks: ensure password be set
2024-04-17 11:17:23 +02:00
Dan Theriault
3cf6c4ddb3 nixos/tailscale-auth: init module
This additional module allows the tailscale auth proxy to be configured
independently of nginx. The tailscale auth proxy works with both caddy
and traefik. All prior nginx/tailscale-auth options are retained as
aliases.
2024-04-16 19:06:08 -04:00
oluceps
c2c632ff31
nixos/shadowsocks: ensure password be set
Co-authored-by: Pascal Wittmann <mail@pascal-wittmann.de>
2024-04-16 13:34:08 +00:00
Christoph Hrdinka
19dd20aa06
Merge pull request #299581 from Stunkymonkey/nsd-chmod-install
nixos/nsd: prefer 'install' over 'chmod'
2024-04-16 08:59:47 +02:00
Sandro Jäckel
490ba58dd7
nixos/knot: use module system to combine settings option 2024-04-15 23:19:45 +02:00
Felix Buehler
3e2f0bc0b4 nixos/nsd: prefer 'install' over 'chmod' 2024-04-14 20:56:19 +02:00
stuebinm
c0c2f2903f lib.mdDoc: remove and replace with warning 2024-04-13 10:07:35 -07:00
stuebinm
6afb255d97 nixos: remove all uses of lib.mdDoc
these changes were generated with nixq 0.0.2, by running

  nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix
  nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix
  nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix

two mentions of the mdDoc function remain in nixos/, both of which
are inside of comments.

Since lib.mdDoc is already defined as just id, this commit is a no-op as
far as Nix (and the built manual) is concerned.
2024-04-13 10:07:35 -07:00
Weijia Wang
11f3e0c15d mongodb-4_4: drop 2024-04-12 12:30:40 +02:00
Sandro
5c26e13e2a
Merge pull request #266109 from linsui/i2p 2024-04-11 15:51:57 +02:00
Jared Baur
c1d5363ecc
nixos/cloudflared: fix docs for tlsTimeout
The URL and link text were swapped.
2024-04-10 21:12:51 -07:00
Rick van Schijndel
067e519281
Merge pull request #302858 from tweag/infinisil-maintainer
treewide: Drop infinisil as maintainer from most packages
2024-04-10 08:50:38 +02:00
Silvan Mosberger
ea5dfeab93 treewide: Drop infinisil as maintainer from most packages
I'm not going anywhere, I'm focusing my energy on other issues, and
getting pinged as a maintainer for packages is a bit distracting (also
I'm not using most of these packages anyways!)
2024-04-09 21:43:39 +02:00
Jörg Thalheim
fb158384bd
Merge pull request #289270 from Mic92/nixos-tinc
nixos/tinc: fix user to not include . in its name
2024-04-09 19:43:48 +02:00
Florian Klink
1dab5d7c77
Merge pull request #302228 from xzfc/bind-ipv6
bind: allow recursive queries from IPv6 loopback
2024-04-08 18:35:18 +03:00
linsui
1f761a49ce i2p: cleanup and build jbigi from source 2024-04-08 22:29:23 +08:00
Sandro
b32f206faa
Merge pull request #258520 from Benjamin-L/soju-admin-socket 2024-04-08 10:20:31 +02:00
Benjamin Lee
d772ac182f
nixos/soju: add sojuctl wrapper with config path
The config is a in an arbitrary nix store path, and is necessary to
invoke sojuctl. Without the wrapper, you have to read the systemd unit
or use a similar trick to find it.
2024-04-07 13:45:47 -07:00
Benjamin Lee
5207bb723a
nixos/soju: add adminSocket.enable option 2024-04-07 13:45:19 -07:00
Benjamin Lee
4959d7bcd8
nixos/soju: add package option 2024-04-07 13:45:17 -07:00
Guanran Wang
63c0c98167
nixos/mihomo: fix option description 2024-04-07 21:47:03 +08:00
Albert Safin
9b383de757 bind: allow recursive queries from IPv6 loopback 2024-04-07 01:14:38 +00:00
Silvan Mosberger
a448a21521
Merge pull request #301556 from edef1c/lib-xor
lib: add xor
2024-04-04 22:03:53 +02:00
edef
725bb4e48c lib: add xor
This gets clumsily reimplemented in various places, to no useful end.
2024-04-04 19:46:58 +00:00
r-vdp
1eb26d4140
nixos/firewall-nftables: allow adding additional rules to the rpfilter chain 2024-04-04 13:07:52 +02:00
Pol Dellaiera
537d34da58
Merge branch 'master' into technitium-dns-server-module 2024-04-04 08:25:51 +02:00
FabianRig
f126a02f2f nixos/technitium-dns-server: init module 2024-04-04 07:41:52 +02:00
Aleksana
cd6f498571
Merge pull request #301084 from LostAttractor/fix/v2raya
nixos/v2raya: fix nftables support
2024-04-03 22:09:33 +08:00
ChaosAttractor
865f976ddd
nixos/v2raya: fix nftables support 2024-04-03 16:07:02 +08:00
Christoph Hrdinka
04b315de7b
Merge pull request #290510 from melvyn2/nsd-options
nixos/nsd: add multi-master-check and zonefiles-write options
2024-04-03 09:07:06 +02:00
melvyn
46232e9f23
nixos/nsd: add multi-master-check, zonefiles-write, remove database options
The database option and functionality was completely removed in nsd 4.8.0
Also remove obselete lib.mdDoc option strings
2024-04-02 10:11:40 -07:00