Commit Graph

4094 Commits

Author SHA1 Message Date
pennae
5c5aaaaaae maintainers: remove pennae
https://discourse.nixos.org/t/nca-jonringer-joint-announcement/48231
https://web.archive.org/web/20240701165505/https://discourse.nixos.org/t/nca-jonringer-joint-announcement/48231

we had little faith in the NCA process, but this is going deep, *deep*
into the territory of wilfully insulting all those had placed even a
modicum of trust in that process.

have you fucking nazi bar.
2024-07-01 18:56:40 +02:00
Someone Serge
12c6d79e72 nixos/prosody: provide an escape hatch for overriding the logging configuration 2024-07-01 01:24:19 +00:00
tomberek
079457313a
Merge pull request #321930 from jtbx-prs/oink-after-network
nixos/oink: wait for network.target
2024-06-29 20:42:03 -04:00
Eman Lear
6c00b71662
Merge branch 'master' into master 2024-06-30 02:19:21 +08:00
Matthew Croughan
d76ad79b4d
nixos/scion: use RuntimeDirectory instead of StateDirectory (#323200)
It was wrong to use StateDirectory to keep the scion-control and
scion-router runtime databases on disk for the next run. I observed that
doing this means a reboot, or power outage can corrupt the temporary
runtime databases for the next service start, leading scion ping and
other functionality to stop working permanently, since those files are
not managed in an atomic manner by the golang code.
2024-06-28 22:16:36 +02:00
Silvan Mosberger
c8dec6df38
Merge pull request #322801 from eclairevoyant/discourage-mkpackageoptionmd
lib: deprecate mkPackageOptionMD
2024-06-27 20:15:08 +02:00
matthewcroughan
23c24527dc nixos/scion: add scion package when scion.enable = true 2024-06-27 11:52:04 +02:00
matthewcroughan
973108d3ed nixos/scion: use recursiveUpdate instead of // 2024-06-27 11:51:28 +02:00
éclairevoyant
aeee4fc133
treewide: replace mkPackageOptionMD with mkPackageOption 2024-06-26 23:05:42 -04:00
Sandro
33f83c6252
Merge pull request #316977 from eclairevoyant/fix-mkEnableOption
treewide: fix mkEnableOption usage
2024-06-25 22:42:16 +02:00
Sandro
1813936aff
Merge pull request #272895 from xanderio/wg-access-server-0.10.1
wg-access-server: init at 0.12.1
2024-06-25 21:21:19 +02:00
Alexander Sieg
369cfec06d
nixos/wg-access-server: init module 2024-06-25 10:59:30 +02:00
Jonathan Davies
5ea0207b73
nixos/nats: Implemented configuration verification 2024-06-23 21:56:59 +01:00
Ryze
10962c7ca2
nixos/zerotierone: fix default value for localConf 2024-06-23 18:10:59 +03:00
Jeremy Baxter
923a86602e nixos/oink: wait for network.target 2024-06-23 21:34:40 +12:00
Gooxey
d3140c11a5 nixos/antennas: removed WorkingDirectory setting
Antennas could not start because the specifed directory did not exist
2024-06-23 09:23:42 +02:00
euxane
3d10deb7a5 nixos/cgit: fix GIT_PROJECT_ROOT ownership
The GIT_PROJECT_ROOT directory is now created at runtime instead of
being assembled at build time.

This fixes ownership issues which prevented those repositories to be
read by users other than root. This also avoids creating symlinks in
the nix store pointing to the outside.
2024-06-22 19:45:25 +02:00
euxane
2d8626bf0a nixos/cgit: configurable user instead of root
This allows running cgit instances using dedicated users instead of
root. This is now set to "cgit" by default.
2024-06-22 19:45:25 +02:00
euxane
c5dc3e2034 nixos/fcgiwrap: adapt consumer modules and tests 2024-06-22 19:45:25 +02:00
euxane
8101ae41f8 nixos/fcgiwrap: adapt consumer modules and tests 2024-06-22 19:45:25 +02:00
euxane
bf2ad6f48c nixos/fcgiwrap: adapt consumer modules and tests
This also fixes the gitolite-fcgiwrap test by running git through
fcgiwrap as the proper user.
2024-06-22 19:45:25 +02:00
Jörg Thalheim
9f180c5438
Merge pull request #280517 from Mic92/zerotierone
nixos/zerotierone: make localConf mergeable
2024-06-21 15:32:05 +02:00
Jörg Thalheim
09ead1f6eb nixos/zerotierone: make localConf mergeable 2024-06-21 15:17:45 +02:00
Tom Hubrecht
938372e46e nixos/netbird: Remove thubrecht as maintainer 2024-06-21 09:32:46 +02:00
res0Nanz
16d8c11a33 nixos/networkd-dispatcher: fix links in doc
Ill-formatted markdown links fixed.
2024-06-20 00:52:12 +08:00
res0Nanz
ae96067a6d nixos/cloudflared: fix links in doc
Ill-formatted markdown links fixed.
2024-06-20 00:49:01 +08:00
h7x4
4c7c3ceb12
nixosTests.wstunnel: init
Co-authored-by: r-vdp <ramses@well-founded.dev>
2024-06-18 11:07:06 +03:00
r-vdp
53e7bea45c
nixos/wstunnel: update the wstunnel module to work with the new rust implementation
Co-authored-by: h7x4 <h7x4@nani.wtf>
2024-06-18 11:07:06 +03:00
Tim Häring
7a7060c5bf
nixos/aria2: fix missing default 2024-06-15 12:55:06 +02:00
Tim Häring
f6d3113164
nixos/aria2: fix remove not needed code 2024-06-15 12:51:29 +02:00
éclairevoyant
7d8742da87
treewide: fix mkEnableOption usage 2024-06-14 02:41:42 -04:00
Nick Cao
06b68ac5a3
Merge pull request #317840 from NeverBehave/pkg-ws-tunnel-rust
wstunnel: 0.5.1.0 -> 9.6.1
2024-06-13 13:31:08 -04:00
NeverBehave
3fb0e045a5 nixos/wstunnel: adopt rust new cli flags 2024-06-13 00:58:02 +00:00
Pol Dellaiera
7d270d53b9
Merge pull request #303429 from timhae/aria2-module
Aria2 module settings
2024-06-12 19:23:44 +02:00
Sean Buckley
36175fb9ad nixos/wireless: fix quotes in config path 2024-06-11 20:45:04 -04:00
Sandro
da3214b120
Merge pull request #309551 from aca/master 2024-06-10 15:48:32 +02:00
Weijia Wang
9520d06979
Merge pull request #266450 from CRTified/adguardhome-fix-246461
nixos/adguardhome: run --check-config before merging
2024-06-10 12:46:26 +02:00
Guanran928
e27092e106
metacubexd: init at 1.140.0 (#297721)
* metacubexd: init at 1.140.0

* nixos/mihomo: add example for cfg.webui
2024-06-10 12:45:19 +02:00
Florian Klink
6a3a382d5b nixos/mycelium: add mycelium binary to systemPackages
It's now possible to invoke `mycelium {routes,peers} list`.
2024-06-08 15:01:32 +03:00
Thomas Churchman
d226935fd7 nixos/ddclient: deprecate use, implement use{v4,v6}
Upstream replaced `use` with `use{v4,v6}`:
4a1b06630b/ChangeLog.md (new-features)
2024-06-07 17:28:25 +02:00
Keith Pine
6fda200fa4 nixos/inadyn: fix cache directory path
The CacheDirectory subdirectory is already part of $CACHE_DIRECTORY.
2024-06-07 09:03:24 +02:00
PatrickDaG
0fdf6e2917
nixos/netbird: fix defaults (#314656)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-06-07 00:02:06 +02:00
rnhmjoj
3c12ef3f21
nixos/firewall: fix reverse path check failures with IPsec
The endpoint of an IPsec tunnel receives encrypted IPsec packets that
are first decrypted and then forwarded to the intended destination.
The decrypted traffic appears to originate from the same interface it
came in from, so in most cases these packets will fail the reverse path
check even if legitimate.

This change adds an exception to not reject packets that were previously
IPsec-encrypted, meaning the have been accepted, decrypted and are in
the process of being forwarded to their final destinal.

Sources:

  - https://www.kernel.org/doc/Documentation/networking/xfrm_device.txt
  - https://git.netfilter.org/nftables/commit/?id=49f6e9a846c6c8325b95debe04d5ebc3c01246fb
  - https://git.netfilter.org/nftables/commit/?id=8f55ed41d007061bd8aae94fee2bda172c0e8996
  - https://thermalcircle.de/doku.php?id=blog:linux:nftables_demystifying_ipsec_expressions
2024-06-05 15:18:35 +02:00
Thomas Gerbet
ef6fea2d86 openssh: move Kerberos support into a dedicated package
The `openssh` and `openssh_hpn` packages are now built without
the Kerberos support by default in an effort to reduce the attack surface.

The Kerberos support is likely used only by a fraction of the total users
(I'm guessing mainly users integrating SSH in an Active Directory env) so
dropping it should not impact too many users. It should also be noted that
the Kerberos/GSSAPI auth is disabled by default in the configuration.
`opensshWithKerberos` and `openssh_hpnWithKerberos` are added in order
to provide an easy migration path for users needing this support.

The `openssh_gssapi` package is kept untouched.
2024-06-05 19:45:31 +10:00
Sandro Jäckel
41452802cb
treewide: fix all obviously wrong mkEnableOptions 2024-06-03 13:20:32 +02:00
Guanran Wang
818fe57b73
nixos/mihomo: format using nixfmt 2024-06-03 10:20:58 +08:00
Guanran Wang
f1034cab06
nixos/mihomo: drop default value from cfg.configFile 2024-06-03 10:20:58 +08:00
Ryan Horiguchi
ea63e59edc nixos/adguardhome: fix typo 2024-06-02 21:01:11 +02:00
Sandro
c6c60cca65
Merge pull request #315112 from sikmir/git-daemon 2024-06-02 17:08:43 +02:00
Julien Moutinho
d4954e0df2 nixos/prosody: support mod_http_file_share 2024-06-01 22:23:20 +02:00
Luflosi
8e945401d5
bind: make systemd service wait for BIND to be ready
Without this change, the systemd unit will be marked as ready even though BIND has not finished starting yet.
This causes other units that depend on BIND to start even though BIND is not ready yet.
From https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900788: "Bind9 will daemonize itself _when it is ready_."

Also modify the NixOS test. With this change, waiting for the unit alone will ensure that BIND is ready to accept queries. I would have expected to see the test failing without this commit but with the `machine.wait_for_open_port(53)` line removed but I found this to not be the case most of the time. This is probably the case because the situation is inherently racy and on my machine BIND happens to start in time most of the time.
2024-05-31 13:33:29 +02:00
Franz Pletz
4e1b4397d9
Merge pull request #312472 from Ma27/networkd-option-rename
nixos/networkd: get rid of *Config attributes in lists
2024-05-30 04:06:01 +02:00
Martin Weinelt
e0f4e4b535
Merge pull request #274425 from woffs/fix-274286
nixos/frr: adapt to frr-9
2024-05-30 02:33:26 +02:00
lassulus
d6f07be682
Merge pull request #314889 from DavHau/pr_sshd
nixos/openssh: allow removing settings
2024-05-30 01:01:07 +02:00
Frank Doepper
4df955130e nixos/frr: adapt to frr-9
- fix #274286
- remove `-f configfile` from ExecStart
- use /etc/frr/${service}d.conf
- enable mgmtd when staticd is enabled
- don't frr-reload.py mgmtd
- remove obsolete lib.mdDoc
2024-05-29 11:07:39 +02:00
Nikolay Korotkiy
ecddd99c6a
nixos/gitDaemon: add package option 2024-05-27 18:50:15 +04:00
Thomas Gerbet
00015f3ef9
Merge pull request #309036 from tomfitzhenry/sshd-package
nixos/ssh: add services.openssh.package
2024-05-27 09:40:31 +02:00
DavHau
3fe773a174 nixos/openssh: allow removing settings
# Motivation
So far it was not possible to configure sshd to allow password authentication only for a specific user. This is because in the generated config a `Match User xxx` section would be required before the global `PasswordAuthentication` is defined, as otherwise the global option always takes precedence.
The same problem occurs with multiple other options under `settings`.

# Done
This PR fixes that issue for all settings by simply allowing them to be overridden with `null`, which leads to a removal of that setting from the config.
The user can then correctly configure user specific settings using extraConfig, like this:
```
    Match User user1
    PasswordAuthentication yes
    Match all
    PasswordAuthentication no
```
2024-05-26 18:46:27 +02:00
Isabelle
56141e2236
nixos/wireguard: add option preShutdown for commands called before interface deletion (#310345) 2024-05-23 13:53:45 +02:00
Martin Weinelt
5d515c373e
nixos/kea: make ctrl-agent want network-online.target
If it wants to run after it, it needs to want it for it to be there.
2024-05-23 10:31:30 +02:00
Jeremy Baxter
20fc095a1c nixos/oink: init module 2024-05-23 10:12:53 +12:00
Maximilian Bosch
c4fd7cf16d
nixos/networkd: get rid of *Config attributes in lists
This patch is about removing `wireguardPeerConfig`,
`dhcpServerStaticLeaseConfig` - a.k.a. the
AbstractSingletonProxyFactoryBean of nixpkgs - and friends.

As a former colleague said

> worst abstraction ever

I second that. I've written enough networkd config for NixOS systems so
far to have a strong dislike. In fact, these don't even make sense:
`netdevs.wireguardPeers._.wireguardPeerConfig` will be rendered into
the key `[WireGuardPeer]` and every key from `wireguardPeerConfig` is in
there. Since it's INI, there's no place where sections on the same level
as wireguardPeerConfig fit into. Hence, get rid of it all.

For the transition, using the old way is still allowed, but gives a
warning. I think we could drop this after one release.

The tests of rosenpass and systemd-networkd-dhcpserver-static-leases
were broken on the rev before, hence they were updated, but are still
not building.
2024-05-20 17:26:42 +02:00
Marie Ramlow
6478f80b17 nixos/rosenpass: move preStart into script to workaround systemd bug
Because of a systemd bug, using both ExecStartPre and ExecStart will fill up the systemd credentials directory,
which leads to rosenpass failing to start.
This will be fixed in systemd v256, see https://github.com/systemd/systemd/pull/31202

Related issue: https://github.com/NixOS/nixpkgs/issues/258371
2024-05-15 17:52:45 +02:00
Raghav Sood
ec2f5e1cb9
Merge pull request #309615 from mkienitz/fix/vsftpd-assertion
Fix/vsftpd assertion
2024-05-15 23:09:28 +08:00
Tom Fitzhenry
54ba3732f1 hostapd: add "wpa2-sha1" to authentication.mode enum
This is required for some Kindles (e.g. Kindle Paperwhite 7th Gen),
and printers (e.g. Brother MFC-J4440DW).

OpenWRT typically adds "wpa_key_mgmt = WPA-PSK", per 3f28c422ba/package/network/config/wifi-scripts/files/lib/netifd/hostapd.sh (L44-L71)
2024-05-14 19:28:15 +10:00
Florian Klink
aff6a121a3
Merge pull request #311039 from DavHau/pr_smokeping
nixos/smokeping: use nginx instead of thttpd
2024-05-13 01:11:59 +02:00
Franz Pletz
ef26d99b37
Merge pull request #310873 from ivan/radvd-debuglevel
nixos/radvd: add debugLevel option
2024-05-12 22:23:24 +02:00
Andreas Rammhold
d157db3480
Merge pull request #307051 from hax404/modules/tayga/mappings
nixos/tayga: add mappings option
2024-05-12 21:16:26 +02:00
DavHau
0b6c484848 nixos/smokeping: use nginx instead of thttpd
Motivation:
fixes #265953

Changes:
- deprecate `services.smokeping.port` in favor of the niginx native option
- mention in release notes
2024-05-12 13:31:11 +02:00
Bjørn Forsman
7909e0f7d6 nixos/pixiecore: fix apiServer example
Add missing http:// scheme. Without it pixiecore logs this and never
contacts the API server:

  [DHCP] Couldn't get bootspec for [REDACTED_MAC_ADDR]: Get "localhost:8080/v1/boot/[REDACTED_MAC_ADDR]": unsupported protocol scheme "localhost"
2024-05-11 23:01:35 +02:00
Ivan Kozik
0482e54050 nixos/radvd: add debugLevel option 2024-05-11 14:59:09 +00:00
Kyungrok Chung
81a58be20b nixos/tailscale: add extraSetFlags to configure daemon 2024-05-11 03:01:54 +09:00
Maximilian Kienitz
aa93972d0b nixos/vsftpd: fix invalid implication in assertions 2024-05-06 23:26:09 +02:00
nicoo
db5f88c41a
nixos/ssh: Make ~/.ssh/authorized_keys optional in AuthorizedKeysFiles (#279894) 2024-05-06 01:11:03 +00:00
Sandro
bdd2e6b121
Merge pull request #309324 from evenbrenden/move-jotta-cli
nixos/jotta-cli: move to services.jotta-cli
2024-05-05 23:17:24 +02:00
Georg Haas
e83b8cfd43
nixos/tayga: add mappings option 2024-05-05 21:10:51 +02:00
André Silva
7142a2dec9
Merge pull request #306655 from devusb/sunshine-update
sunshine: 0.23.0 -> 0.23.1
2024-05-05 19:14:28 +01:00
Even Brenden
9fa89d0e2c nixos/jotta-cli: move to services.jotta-cli 2024-05-05 19:30:16 +02:00
Weijia Wang
9ed8582721
Merge pull request #308622 from jmbaur/jbaur/clatd-minor-cleanup
Minor cleanups for clatd module and release notes
2024-05-04 19:25:11 +02:00
Tom Fitzhenry
ff1c82ee07 nixos/ssh: add services.openssh.package
Motivation: Allow the sshd package to be built differently to the ssh
package (programs.ssh.package). For example, build sshd(1) without
openssl, but built ssh(1) with OpenSSL support.

Set the default to be programs.ssh.package, to preserve compatibility.
2024-05-04 23:14:47 +10:00
Carl Richard Theodor Schneider
3e86aba9d2 nixos/adguardhome: run --check-config before merging
To prevent merging configurations on different `schema_version`,
we will now check the existing configuration, which has the side-effect of
updating the `schema_version`.

Fixes #246461 as described in https://github.com/NixOS/nixpkgs/issues/246461#issuecomment-1667663556
2024-05-03 20:15:02 +02:00
éclairevoyant
512b6d9ad2
Merge pull request #308531 from sanxus/fix-extraConfig
nixos/networkmanager: fix incorrect documention about `extraConfig`
2024-05-03 18:08:44 +00:00
sanxus
6b7692c8f5
nixos/networkmanager: fix incorrect documention about extraConfig 2024-05-04 01:04:51 +08:00
Jared Baur
09073330e0
nixos/clatd: remove invalid startLimitIntervalSec
The `startLimitIntervalSec` option is not valid under `serviceConfig`.
2024-05-02 14:16:12 -07:00
nicoo
480b871f2d
Merge #305844: add clatd module and nixos test 2024-05-02 14:00:06 +00:00
Colin Sane
6034d354d7
nixos/trust-dns: fix invalid default for settings.zones option (#308513)
and fix a few documentation typos while here.
2024-05-02 12:34:04 +00:00
Sandro
2e9d7dca27
Merge pull request #302570 from evenbrenden/jottad-service 2024-05-02 10:25:30 +02:00
Weijia Wang
f6a18241dd
Merge pull request #247828 from rhoriguchi/nixos/adguardhome
nixos/adguardhome: update config to match new schema, update package and fix update script
2024-04-30 16:44:10 +02:00
Georg Haas
0c42398c9d
nixos/clatd: init 2024-04-29 23:29:29 +02:00
Even Brenden
021a0ffe57 nixos/jotta-cli: init jotta-cli
See https://github.com/NixOS/nixpkgs/issues/300063.
2024-04-29 09:14:47 +02:00
Vladimír Čunát
5cb7aa5ec9
nixos/knot: use a more precise type for .settings
See discussion on PR #304373
2024-04-28 10:26:09 +02:00
Tom
97bb1199c0 maintainers: remove twitchyliquid64
Yall won't miss me. The packages I leave orphaned are trivially updated as dependents need the new versions.

But passively endorsing the direction this organization and its leadership is something I can't do.

To those who still have faith in turning this around, you da real MVP 🖖
2024-04-26 22:48:31 -07:00
Sarah Brofeldt
75541131ef
Merge pull request #306608 from Tom-Hubrecht/netbird-coturn
nixos/netbird: Fix configuration of coturn server
2024-04-27 07:35:02 +02:00
Dave Anderson
308cb342c9 maintainers: drop danderson 2024-04-26 11:36:50 -07:00
北雁 Cryolitia
13e6ece470
nixos/sunshine: add autoStart attr 2024-04-25 16:53:24 +08:00
Morgan Helton
34b255b69b nixos/sunshine: add literalExpression for examples 2024-04-24 19:17:57 -05:00
Tom Hubrecht
5ad0ea1aaf nixos/netbird: Fix configuration of coturn server 2024-04-24 20:35:32 +02:00
Thomas Gerbet
ecd2d35be0
Merge pull request #305742 from tomfitzhenry/ssh-no-pam
nixos/ssh: expose UsePAM and PrintMotd as options
2024-04-24 09:40:24 +02:00
Tom Fitzhenry
3fd9ef4b40 nixos/ssh: allow PrintMotd to be enabled 2024-04-23 22:53:09 +10:00
Tom Fitzhenry
2e51a2fd03 nixos/ssh: allow UsePAM to be disabled 2024-04-23 22:40:58 +10:00
Maximilian Bosch
2ee96a1738
nixos: fix manual build
`mdDoc` is deprecated!
2024-04-21 23:28:46 +02:00
Pol Dellaiera
95d8be4d3c
Merge pull request #301514 from r-vdp/nftables-rpfilter-extra-rules
nixos/firewall-nftables: allow adding additional rules to the rpfilter chain
2024-04-21 23:02:01 +02:00
Sandro
04a3a2a8fe
Merge pull request #260962 from lunik1/inadyn-module
nixos/inadyn: init
2024-04-21 21:38:22 +02:00
Michele Guerini Rocco
8b93a430dc
Merge pull request #305689 from rnhmjoj/pr-fix-wpa-secrets
nixos/wireless: correctly handle secrets containing &
2024-04-21 16:07:42 +02:00
rnhmjoj
89a1bde018
nixos/wireless: correctly handle secrets containing &
In the replacement arg of gsub() the & symbol is a special character
that need to be escaped. To avoid this, and further issues due to the
variable name possibly being interpreted as a regex, we do a normal
substring replacement.

This fixes issues #279803.
2024-04-21 09:58:26 +02:00
rnhmjoj
4fa107f1c9
nixos/wireless: create empty config for imperative setup
If allowAuxiliaryImperativeNetworks is enabled, the wpa_supplicant
daemon complains fails to start if /etc/wpa_supplicant.conf does not
exist. As this can be created using wpa_cli (or similar) later, it
shouldn't matter, so let's create an empty one.

This fixes issues #157537, #299466.
2024-04-21 02:10:32 +02:00
Sandro
5bfe2b6964
Merge pull request #294641 from devusb/sunshine-module
nixos/sunshine: init
2024-04-20 21:32:50 +02:00
Bjørn Forsman
c7ab550bbc nixos/deconz: fix curl redirect option in postStart
It should be curl -L (follow redirects), not curl -l (FTP directory
listing option). I know because it's my mistake.

Fixes: d4b989cafc ("nixos/deconz: delay signalling service readiness until it's actually up")
2024-04-20 20:24:39 +02:00
Ryan Lahfa
21bd30ea2f
Merge pull request #247118 from Tom-Hubrecht/netbird-server
nixos/netbird-server: init module
2024-04-20 11:21:10 +02:00
Ryan Horiguchi
c60dd90d1f nixos/adguardhome: update config to match new schema 2024-04-19 18:42:52 +02:00
Martin Weinelt
666b73468d
Merge pull request #304373 from SuperSandro2000/knot-settings
nixos/knot: use module system to combine settings option
2024-04-19 17:26:53 +02:00
Tim Häring
31c9eec061
nixos/aria2: add settings option
I also took the liberty to add myself as module maintainer
2024-04-18 21:04:27 +02:00
Tom Hubrecht
6d91c95fce nixos/netbird-server: init module 2024-04-18 15:33:18 +02:00
Sandro
f417891699
Merge pull request #293954 from Dan-Theriault/refactor-tailscale-auth 2024-04-18 15:14:01 +02:00
Lily Foster
59742f6f72
Merge pull request #292472 from Janik-Haag/networkmanager-tests
nixosTests.networking: refactor and add NetworkManager support
2024-04-18 06:38:37 -04:00
Atemu
3bdc0e7715
Merge pull request #304810 from ju1m/dnscrypt-proxy2
nixos/dnscrypt-proxy2: fix cross-compiling
2024-04-18 09:04:41 +02:00
Bjørn Forsman
d4b989cafc nixos/deconz: delay signalling service readiness until it's actually up
Fixes test flakiness (`nix-build -A nixosTests.deconz`).
2024-04-17 22:32:15 +02:00
Janik H.
8612ed1ee9
nixos/networkmanager: change config generation to use the ini generator 2024-04-17 21:20:11 +02:00
Julien Moutinho
6fd2d4b541 nixos/dnscrypt-proxy2: fix cross-compiling 2024-04-17 16:41:51 +02:00
Pascal Wittmann
6ae4216336
Merge pull request #303890 from oluceps/ss-module
nixos/shadowsocks: ensure password be set
2024-04-17 11:17:23 +02:00
Dan Theriault
3cf6c4ddb3 nixos/tailscale-auth: init module
This additional module allows the tailscale auth proxy to be configured
independently of nginx. The tailscale auth proxy works with both caddy
and traefik. All prior nginx/tailscale-auth options are retained as
aliases.
2024-04-16 19:06:08 -04:00
oluceps
c2c632ff31
nixos/shadowsocks: ensure password be set
Co-authored-by: Pascal Wittmann <mail@pascal-wittmann.de>
2024-04-16 13:34:08 +00:00
Christoph Hrdinka
19dd20aa06
Merge pull request #299581 from Stunkymonkey/nsd-chmod-install
nixos/nsd: prefer 'install' over 'chmod'
2024-04-16 08:59:47 +02:00
Sandro Jäckel
490ba58dd7
nixos/knot: use module system to combine settings option 2024-04-15 23:19:45 +02:00
Felix Buehler
3e2f0bc0b4 nixos/nsd: prefer 'install' over 'chmod' 2024-04-14 20:56:19 +02:00
stuebinm
c0c2f2903f lib.mdDoc: remove and replace with warning 2024-04-13 10:07:35 -07:00
stuebinm
6afb255d97 nixos: remove all uses of lib.mdDoc
these changes were generated with nixq 0.0.2, by running

  nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix
  nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix
  nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix

two mentions of the mdDoc function remain in nixos/, both of which
are inside of comments.

Since lib.mdDoc is already defined as just id, this commit is a no-op as
far as Nix (and the built manual) is concerned.
2024-04-13 10:07:35 -07:00
Weijia Wang
11f3e0c15d mongodb-4_4: drop 2024-04-12 12:30:40 +02:00
Sandro
5c26e13e2a
Merge pull request #266109 from linsui/i2p 2024-04-11 15:51:57 +02:00
Jared Baur
c1d5363ecc
nixos/cloudflared: fix docs for tlsTimeout
The URL and link text were swapped.
2024-04-10 21:12:51 -07:00
Rick van Schijndel
067e519281
Merge pull request #302858 from tweag/infinisil-maintainer
treewide: Drop infinisil as maintainer from most packages
2024-04-10 08:50:38 +02:00
Silvan Mosberger
ea5dfeab93 treewide: Drop infinisil as maintainer from most packages
I'm not going anywhere, I'm focusing my energy on other issues, and
getting pinged as a maintainer for packages is a bit distracting (also
I'm not using most of these packages anyways!)
2024-04-09 21:43:39 +02:00
Jörg Thalheim
fb158384bd
Merge pull request #289270 from Mic92/nixos-tinc
nixos/tinc: fix user to not include . in its name
2024-04-09 19:43:48 +02:00
Florian Klink
1dab5d7c77
Merge pull request #302228 from xzfc/bind-ipv6
bind: allow recursive queries from IPv6 loopback
2024-04-08 18:35:18 +03:00
linsui
1f761a49ce i2p: cleanup and build jbigi from source 2024-04-08 22:29:23 +08:00
Sandro
b32f206faa
Merge pull request #258520 from Benjamin-L/soju-admin-socket 2024-04-08 10:20:31 +02:00
Benjamin Lee
d772ac182f
nixos/soju: add sojuctl wrapper with config path
The config is a in an arbitrary nix store path, and is necessary to
invoke sojuctl. Without the wrapper, you have to read the systemd unit
or use a similar trick to find it.
2024-04-07 13:45:47 -07:00
Benjamin Lee
5207bb723a
nixos/soju: add adminSocket.enable option 2024-04-07 13:45:19 -07:00
Benjamin Lee
4959d7bcd8
nixos/soju: add package option 2024-04-07 13:45:17 -07:00
Guanran Wang
63c0c98167
nixos/mihomo: fix option description 2024-04-07 21:47:03 +08:00
Albert Safin
9b383de757 bind: allow recursive queries from IPv6 loopback 2024-04-07 01:14:38 +00:00
Silvan Mosberger
a448a21521
Merge pull request #301556 from edef1c/lib-xor
lib: add xor
2024-04-04 22:03:53 +02:00
edef
725bb4e48c lib: add xor
This gets clumsily reimplemented in various places, to no useful end.
2024-04-04 19:46:58 +00:00
r-vdp
1eb26d4140
nixos/firewall-nftables: allow adding additional rules to the rpfilter chain 2024-04-04 13:07:52 +02:00
Pol Dellaiera
537d34da58
Merge branch 'master' into technitium-dns-server-module 2024-04-04 08:25:51 +02:00
FabianRig
f126a02f2f nixos/technitium-dns-server: init module 2024-04-04 07:41:52 +02:00
Aleksana
cd6f498571
Merge pull request #301084 from LostAttractor/fix/v2raya
nixos/v2raya: fix nftables support
2024-04-03 22:09:33 +08:00
ChaosAttractor
865f976ddd
nixos/v2raya: fix nftables support 2024-04-03 16:07:02 +08:00
Christoph Hrdinka
04b315de7b
Merge pull request #290510 from melvyn2/nsd-options
nixos/nsd: add multi-master-check and zonefiles-write options
2024-04-03 09:07:06 +02:00
melvyn
46232e9f23
nixos/nsd: add multi-master-check, zonefiles-write, remove database options
The database option and functionality was completely removed in nsd 4.8.0
Also remove obselete lib.mdDoc option strings
2024-04-02 10:11:40 -07:00
Felix Buehler
43f956227e nixos/cjdns: prefer 'install' over 'chmod' 2024-04-02 08:43:20 +00:00
lunik1
121490461b
nixos/inadyn: init 2024-04-01 01:24:46 +01:00
Morgan Helton
dd2c6f1840 nixos/sunshine: init 2024-03-30 20:07:35 -05:00
Alessandro Labate
43521f9021
nixos/networkmanager: correct example (#295439)
The example pertinent to `fccUnlockScripts` contains wrong (maybe old) key names possibly leading to trial/error while configuring the option. This issue can be avoided updating the example.
2024-03-29 14:42:14 +01:00
r-vdp
b9fc0a8f67
nixos/mycelium: allow specifying extra args to mycelium 2024-03-29 13:38:59 +01:00
Janne Heß
fcc95ff817 treewide: Fix all Nix ASTs in all markdown files
This allows for correct highlighting and maybe future automatic
formatting. The AST was verified to work with nixfmt only.
2024-03-28 09:28:12 +01:00
Janne Heß
bc77c7a973 treewide: Mark Nix blocks in markdown as Nix
This should help us with highlighting and future formatting.
2024-03-28 09:28:12 +01:00
Matthieu Coudron
ee1604d8c7 networking.wireguard: generate leaner units 2024-03-27 00:49:32 +01:00
matthewcroughan
99e488e2df nixos/scion: init 2024-03-26 15:54:09 +00:00
Casey Link
cef226e553
nixos/microsocks: init 2024-03-26 07:52:41 +01:00
Sandro
dabaa7ac65
Merge pull request #288033 from diogotcorreia/module-dnsproxy
nixos/dnsproxy: init module
2024-03-24 21:52:09 +01:00
Florian Klink
21721e4196 nixos/mycelium: description updates
- Slight rewordings and typo fixes.
 - Use documentation prefixes for addresses, rather than 1.2.3.4, and
   add IPv6 examples.
 - Fix description for `keyFile` (`/var/lib/mycelium/key{,.bin}`).
 - Some formatting by my editor
2024-03-23 12:36:49 +01:00
Doron Behar
2897be360b
Merge pull request #287966 from Guanran928/clash-meta
nixos/mihomo: init
2024-03-21 10:40:10 +02:00
github-actions[bot]
36232fff71
Merge master into staging-next 2024-03-20 18:01:02 +00:00
Dmitry Bogatov
5bb92281f5 nixos/dnscache: Provide explicit group for "dnscache" user
Without this patch the module refuses to evaluate, complaining that
default "nogroup" is no longer supported.
2024-03-20 16:45:50 +01:00
github-actions[bot]
90461ffe37
Merge master into staging-next 2024-03-20 12:01:15 +00:00
lassulus
b82a5ef764 nixos/mycelium: init 2024-03-20 03:56:58 +01:00
github-actions[bot]
ac91cf83c1
Merge master into staging-next 2024-03-18 00:02:20 +00:00
Sandro
1f212fd6e6
Merge pull request #289025 from tcheronneau/issue-288907
nixos/tinyproxy: fix the quotes around the filter path
2024-03-17 23:33:42 +01:00
github-actions[bot]
60fbf92c10
Merge master into staging-next 2024-03-16 18:01:00 +00:00
Janik H.
847a53742c
nixos/networkmanager: ensure-profiles, make sure networkmanager is running 2024-03-16 18:11:58 +01:00
github-actions[bot]
cecf050e96
Merge master into staging-next 2024-03-13 12:01:25 +00:00
Pol Dellaiera
55251f1ffc
Merge pull request #295547 from Janik-Haag/unbound
nixos/unbound: drop networkmanager since it doesn't support unbound anymore
2024-03-13 10:33:52 +01:00
Janik H.
4147e50f18
nixos/unbound: drop networkmanager since it doesn't support unbound anymore 2024-03-13 09:50:56 +01:00
Pol Dellaiera
c35c016e5d
Merge pull request #295529 from Janik-Haag/networkmanager-drop-unbound
nixos/networkmanager: drop unbound form dns servers
2024-03-13 09:04:58 +01:00
Janik H.
a97e56ae28
nixos/networkmanager: drop unbound form dns servers
upstream dropped unbound in 5da17c689b
2024-03-13 08:31:52 +01:00
annalee
8e038835fe
Merge remote-tracking branch 'upstream/master' into staging-next 2024-03-13 00:38:07 +00:00
Felix Buehler
1e22e7d75e nixos/murmur: fix writing registerPassword to config 2024-03-12 21:19:24 +01:00
github-actions[bot]
06e5eb63d3
Merge staging-next into staging 2024-03-11 18:01:53 +00:00
Sandro
869ec01e56
Merge pull request #294286 from SuperSandro2000/unbound-remote-config-check 2024-03-11 16:06:31 +01:00
Pierre Allix
cf625fe5f0 nixos/networkmanager: add doc about nm profiles interaction with resolvconf 2024-03-11 12:55:27 +01:00
Guanran Wang
a6857b00fe
nixos/mihomo: init 2024-03-11 09:51:36 +08:00
github-actions[bot]
973ef4b818
Merge staging-next into staging 2024-03-10 06:01:30 +00:00
Peder Bergebakken Sundt
4a4a70ca31
Merge pull request #280836 from numinit/nebula-port-zero
nixos/nebula: default to port 0 for hosts other than lighthouse/relay
2024-03-10 05:01:04 +01:00
Sandro Jäckel
67c1193fab
nixos/unbound: disable checkconf when remote-control is used
Closes #293001
2024-03-08 15:34:00 +01:00
maxine
d231374084
Merge pull request #288873 from amaxine/networkmanager_1.46
networkmanager: 1.44.2 → 1.46.0
2024-03-08 09:52:14 +00:00
Diogo Correia
9b7e02dd4b
nixos/dnsproxy: init module 2024-03-07 23:26:59 +00:00
Guillaume Girol
dc9a74e61e
Merge pull request #291934 from e1mo/bird-lg-1-3-5
bird-lg: 1.3.1 -> 1.3.5
2024-03-03 15:50:42 +01:00
Sandro
5ad27da222
Merge pull request #291907 from SuperSandro2000/tailscaled-flags 2024-03-01 13:54:54 +01:00
Sandro
daa33a4bf7
Merge pull request #287299 from SuperSandro2000/unbound-checkconf
nixos/unbound: check validity of config file
2024-03-01 00:33:36 +01:00
Robert Schütz
3330e3c9c3 nixos/searx: use lib.getExe 2024-02-28 17:51:24 -08:00
pennae
b71ca1c90a
Merge pull request #291922 from NixOS/mosquitto-2
nixos/mosquitto: remove stutter in acl file name
2024-02-28 02:06:01 +01:00
e1mo
43fee5401d
nixos/bird-lg: Update option description to indicate new features
In release v1.3.3[0] support for CIDRs was added, thus updated the
option description to indicate the new support for that.

[0]: https://github.com/xddxdd/bird-lg-go/releases/tag/v1.3.3
2024-02-27 23:54:21 +01:00
Sandro
f9477e3a75
Merge pull request #209506 from Izorkin/update-dhcpcd-exit-hook
nixos/dhcpcd: optimize exitHook
2024-02-27 23:01:22 +01:00
Sandro
4c88c797b8
nixos/mosquitto: remove stutter in acl file name 2024-02-27 22:15:43 +01:00
Sandro Jäckel
6753857664
nixos/tailscale: add option to pass flags to tailscaled 2024-02-27 20:08:08 +01:00
pennae
13aff9b34c
Merge pull request #259937 from charmoniumQ/patch-1
nixos/mosquitto: fix ACL permissions
2024-02-26 22:58:40 +01:00
Pol Dellaiera
f9ef0053c5
Merge pull request #288401 from katexochen/bees/refactor
bee: refactor & update; bee{-unstable,-clef}: remove; maintainers: remove attila-lendvai
2024-02-23 20:12:41 +01:00
Maxine Aubrey
e1863b4f79
nixos/networkmanager: support stable-ssid for cloned MAC addresses 2024-02-22 18:37:13 +01:00
Adam C. Stephens
d1e2847664
Merge pull request #281000 from cablespaghetti/master
sabnzbd: Add configurability of state directory owner and firewall
2024-02-21 08:37:46 -05:00
Morgan Jones
32f56d7266
nixos/nebula: fix port resolution for firewall rules 2024-02-17 15:07:27 -08:00
Stanisław Pitucha
2eed715fbf
nixos/go-camo: init 2024-02-17 20:45:49 +01:00
Jörg Thalheim
5c84f89310 nixos/tinc: fix user to not include . in its name
sysusers does not like . in the user name.
2024-02-16 13:36:28 +01:00
Izorkin
1293f046b5
nixos/dhcpcd: optimize exitHook 2024-02-16 10:12:52 +03:00
Thomas
149fb601dd
nixos/tinyproxy: add quotes around the filter path
Using already existing function
2024-02-15 16:25:04 +01:00
Vladimír Čunát
aaca7a186f
Merge #286596: nixos/knot: add support for XDP setups 2024-02-15 09:19:59 +01:00
Michele Guerini Rocco
cd02351ae0
Merge pull request #233017 from koenw/libreswan-StateDirectory
nixos/libreswan: Use StateDirectory to setup ipsec/nss
2024-02-14 14:36:43 +01:00
Michele Guerini Rocco
dc91f91987
Merge pull request #286393 from oddlama/fix-hostapd-utf8-ssid
nixos/hostapd: fix utf8Ssid setting not properly honored
2024-02-14 14:08:46 +01:00
Martin Weinelt
ec89463a61
nixos/knot: refactor
- Stop using `with lib`
- Drop `lib.mdDoc`
- Use `escaepSystemdExecArgs` for escaping
2024-02-13 13:44:32 +01:00
Martin Weinelt
d1d8dd3e55
nixos/knot: add support for XDP setups
The Express Data Path (XDP) is a way to circumvent the traditional Linux
networking stack and instead run an eBPF program on your NIC, that makes
the decision to provide Knot with certain packets. This is way faster
and more scalable but comes at the cost of reduced introspection.

Unfortunately the `knotc conf-check` command fails hard with missing
interfaces or IP addresses configured in `xdp.listen`, so we disable it
for now, once the `xdp` config section is set. We also promote the config
check condition to a proper option, so our conditions become public
documentation, and we allow users to deal with corner cases, that we have
not thought of yet.

We follow the pre-requisites documented in the Knot 3.3 manual, and set
up the required capabilities and allow the AF_XDP address family.

But on top of that, due to our strict hardening, we found two more
requirements, that were communicated upstream while debugging this.

- There is a requirement on AF_NETLINK, likely to query for and configure
  the relevant network interface
- Running eBPF programs requires access to the `bpf` syscall, which we
  deny through the `~@privileged` configuration.

In summary We now conditionally loosen the hardening of the unit once we
detect that an XDP configuration is wanted. And since we cannot
introspect arbitrary files from the `settingsFiles` option, we expose XDP
support through the `enableXDP` toggle option on the module.
2024-02-13 13:44:31 +01:00
Paul Meyer
ce0a47cd2c maintainers: remove attila-lendvai 2024-02-12 23:10:03 +01:00
Paul Meyer
11eef97f3c bee-clef: remove 2024-02-12 23:10:03 +01:00
Sandro Jäckel
80e79ded15
nixos/unbound: check validity of config file 2024-02-12 22:49:03 +01:00
Sam Weston
c49e6bf8b8 nixos/sabnzbd: use stateDirectory and mkIf-ify user/group creation 2024-02-11 16:49:08 +00:00
Sam Weston
d3d5b72c65 nixos/sabnzbd: add openFirewall 2024-02-11 16:48:05 +00:00
Lin Jian
f3a93440fb
Merge pull request #285813 from jerrita/nft-precheck-flatten
nixos/nftables: add option for flattening rulesetFile
2024-02-11 10:41:17 +08:00
Peder Bergebakken Sundt
6f55f021df
Merge pull request #287304 from ambroisie/pyload-user-group
nixos/pyload: add user/group options
2024-02-10 14:59:23 +01:00
Peder Bergebakken Sundt
5caded32fe
Merge pull request #277189 from anpin/fix/cloudflared-service
cloudflared: fixed missing configuration options
2024-02-10 12:45:08 +01:00
Silvan Mosberger
11cd405226
Merge pull request #280322 from h7x4/add-hocon-format-generator
pkgs.formats: Add HOCON format generator
2024-02-10 03:07:51 +01:00
Silvan Mosberger
5de4385620
Merge pull request #285833 from 360ied/murmur-hardened
nixos/murmur: systemd service hardening
2024-02-10 02:48:46 +01:00
github-actions[bot]
b64b4f2d6a
Merge master into staging-next 2024-02-09 18:01:06 +00:00
Will Fancher
0cf1e24f32
Merge pull request #284627 from Trundle/nftables-ordering
nixos/nftables: remove default systemd dependencies
2024-02-09 12:29:24 -05:00
h7x4
39a779e269
treewide: use formats.hocon 2024-02-09 16:40:22 +01:00
Bruno BELANYI
c14f029dae nixos/pyload: add user/group options 2024-02-08 20:27:14 +00:00
github-actions[bot]
03dd2b9470
Merge master into staging-next 2024-02-07 12:01:11 +00:00
Sergei Trofimovich
275855d632 nixos: hostapd: drop unused crda package import 2024-02-06 22:45:01 +00:00
jerrita
e686847d20
nixos/nftables: add option for flattening rulesetFile
Co-authored-by: Lin Jian <me@linj.tech>
2024-02-05 11:27:16 +08:00
360ied
11cf6ab0dd nixos/murmur: systemd service hardening
Murmur provides an official systemd service file in their repo,
which contains various service hardening settings:

c4b5858d14/auxiliary_files/config_files/mumble-server.service.in (L7)

The service configuration in nixpkgs does not include these hardening settings.

This commit adds the hardening settings to the murmur service in nixpkgs.
This drops the `systemd-analyze security` score of murmur.service from 9.2 (UNSAFE) to 2.1 (OK).
2024-02-04 21:23:34 -05:00
oddlama
b7f29692c0
nixos/hostapd: fix utf8Ssid setting not properly honored 2024-02-05 00:52:08 +01:00
Martin Weinelt
27fa02d0f1
Merge remote-tracking branch 'origin/staging-next' into staging
Conflicts:
-	pkgs/development/compilers/llvm/10/clang/default.nix
- pkgs/development/compilers/llvm/8/clang/default.nix
2024-02-01 12:25:11 +01:00
Andreas Stührk
fc6c92faf3 nixos/nftables: remove default systemd dependencies
With DefaultDependencies enabled, systemd adds "After=basic.target" to
service units. `basic.target` has a dependency on `sockets.target`, so
the `nftables` has (amongst others) the following order constraints:

* Before=network-pre.target
* After=sockets.target

Those constraints are often unsatisfiable. For example, `systemd-networkd`
has a dependency `After=network-pre.target`. When a socket unit now uses
`BindToDevice=` on a device managed by `networkd`, a timeout occurs
because `networkd` waits for `network-pre.target`, but
`network-pre.target` depends (through nftables) on `sockets.target`, but
the device to bind the socket to is never brought up, as this would
happen through `networkd`.

This is fixed by removing the implicit dependency on `basic.target`.
2024-01-31 23:26:05 +01:00
Peder Bergebakken Sundt
19159ced3e
Merge pull request #249523 from greizgh/seafile-10
Seafile 10
2024-01-31 17:13:54 +01:00
Peder Bergebakken Sundt
9118823ed3
Merge pull request #226532 from SuperSandro2000/dhcpcd
dhcpcd: change files after patching; nixos/dhcpcd: link dhcpcd.conf to /etc/ to fix dhcpcd -k
2024-01-31 16:43:54 +01:00
Yureka
a6c64fbd39
nixos/strongswan-swanctl: add includes option for secrets (#284742) 2024-01-30 12:47:33 +01:00
h7x4
ba5f81a6b6
Merge pull request #276547 from ambroisie/pyload-module
nixos/pyload: init module
2024-01-30 12:29:46 +01:00
Franz Pletz
3432be07e4
Merge pull request #278555 from leona-ya/kresd-port-only-regex 2024-01-30 00:41:53 +01:00
Sandro Jäckel
1af95a24c1
nixos/dhcpcd: link dhcpcd.conf to /etc/ to fix dhcpcd -k 2024-01-27 18:12:55 +01:00
Thomas Gerbet
117fd19a77
Merge pull request #276306 from ambroisie/aria2-rpc-secret-file
nixos/aria2: implement 'rpcSecretFile'
2024-01-27 00:46:56 +01:00
maxine
642317d03f
Merge pull request #283618 from SuperSandro2000/tailscale-resoleconf
nixos/tailscale: make resolvconf package depending on enablement of module
2024-01-26 22:41:14 +01:00
Lassulus
da25b2382d
Merge pull request #280373 from h7x4/treewide-use-new-tmpfiles-api
treewide: use new tmpfiles API
2024-01-26 10:47:18 +01:00
Robert Schütz
8433938f9b
Merge pull request #283617 from SuperSandro2000/headscale
nixos/headscale: install package system wide
2024-01-25 13:40:29 -08:00
Bruno BELANYI
d3a1465196 nixos/aria2: implement 'rpcSecretFile'
Since this is supposed to be a secret, use a file path as an input
instead of making it part of the expression, which would expose it in
the nix store.
2024-01-25 21:36:21 +00:00
Ryan Lahfa
6fe2736c6f
Merge pull request #246055 from Tom-Hubrecht/netbird
nixos/netbird: Allow running multiple netbird networks in parallel
2024-01-25 20:08:58 +01:00
rnhmjoj
1a1b91b3b9
nixos/dnsdist: add options for dnscrypt 2024-01-25 18:25:40 +01:00
Tom Hubrecht
c2d822e6b0 nixos/netbird: Allow running multiple netbird networks in parallel 2024-01-25 17:25:59 +01:00
Sandro Jäckel
922351ec86
nixos/tailscale: make resolvconf package depending on enablement of module
If resolvconf is not enabled, trying to use it always fails because
/etc/resolvconf.conf contains an `exit 1`.
2024-01-25 15:50:36 +01:00
Sandro Jäckel
9f395dae71
nixos/headscale: install package system wide
this is required to confirm nodes and generally manage everything
2024-01-24 23:00:54 +01:00
Vladimír Čunát
7f979aeb86
nixos/knot: allow specifying the clear section
It was added in 3.3.4.  I'm not sure if it will be useful with NixOS
services, but I added it in the usual way anyway.
2024-01-24 10:33:55 +01:00
h7x4
f5d513c573
treewide: use new tmpfiles api 2024-01-24 05:13:17 +01:00
Bruno BELANYI
70d0a6e547 nixos/pyload: init 2024-01-23 15:04:44 +00:00