pennae
5c5aaaaaae
maintainers: remove pennae
...
https://discourse.nixos.org/t/nca-jonringer-joint-announcement/48231
https://web.archive.org/web/20240701165505/https://discourse.nixos.org/t/nca-jonringer-joint-announcement/48231
we had little faith in the NCA process, but this is going deep, *deep*
into the territory of wilfully insulting all those had placed even a
modicum of trust in that process.
have you fucking nazi bar.
2024-07-01 18:56:40 +02:00
Someone Serge
12c6d79e72
nixos/prosody: provide an escape hatch for overriding the logging configuration
2024-07-01 01:24:19 +00:00
tomberek
079457313a
Merge pull request #321930 from jtbx-prs/oink-after-network
...
nixos/oink: wait for network.target
2024-06-29 20:42:03 -04:00
Eman Lear
6c00b71662
Merge branch 'master' into master
2024-06-30 02:19:21 +08:00
Matthew Croughan
d76ad79b4d
nixos/scion: use RuntimeDirectory instead of StateDirectory ( #323200 )
...
It was wrong to use StateDirectory to keep the scion-control and
scion-router runtime databases on disk for the next run. I observed that
doing this means a reboot, or power outage can corrupt the temporary
runtime databases for the next service start, leading scion ping and
other functionality to stop working permanently, since those files are
not managed in an atomic manner by the golang code.
2024-06-28 22:16:36 +02:00
Silvan Mosberger
c8dec6df38
Merge pull request #322801 from eclairevoyant/discourage-mkpackageoptionmd
...
lib: deprecate mkPackageOptionMD
2024-06-27 20:15:08 +02:00
matthewcroughan
23c24527dc
nixos/scion: add scion package when scion.enable = true
2024-06-27 11:52:04 +02:00
matthewcroughan
973108d3ed
nixos/scion: use recursiveUpdate instead of //
2024-06-27 11:51:28 +02:00
éclairevoyant
aeee4fc133
treewide: replace mkPackageOptionMD with mkPackageOption
2024-06-26 23:05:42 -04:00
Sandro
33f83c6252
Merge pull request #316977 from eclairevoyant/fix-mkEnableOption
...
treewide: fix mkEnableOption usage
2024-06-25 22:42:16 +02:00
Sandro
1813936aff
Merge pull request #272895 from xanderio/wg-access-server-0.10.1
...
wg-access-server: init at 0.12.1
2024-06-25 21:21:19 +02:00
Alexander Sieg
369cfec06d
nixos/wg-access-server: init module
2024-06-25 10:59:30 +02:00
Jonathan Davies
5ea0207b73
nixos/nats: Implemented configuration verification
2024-06-23 21:56:59 +01:00
Ryze
10962c7ca2
nixos/zerotierone: fix default value for localConf
2024-06-23 18:10:59 +03:00
Jeremy Baxter
923a86602e
nixos/oink: wait for network.target
2024-06-23 21:34:40 +12:00
Gooxey
d3140c11a5
nixos/antennas: removed WorkingDirectory setting
...
Antennas could not start because the specifed directory did not exist
2024-06-23 09:23:42 +02:00
euxane
3d10deb7a5
nixos/cgit: fix GIT_PROJECT_ROOT ownership
...
The GIT_PROJECT_ROOT directory is now created at runtime instead of
being assembled at build time.
This fixes ownership issues which prevented those repositories to be
read by users other than root. This also avoids creating symlinks in
the nix store pointing to the outside.
2024-06-22 19:45:25 +02:00
euxane
2d8626bf0a
nixos/cgit: configurable user instead of root
...
This allows running cgit instances using dedicated users instead of
root. This is now set to "cgit" by default.
2024-06-22 19:45:25 +02:00
euxane
c5dc3e2034
nixos/fcgiwrap: adapt consumer modules and tests
2024-06-22 19:45:25 +02:00
euxane
8101ae41f8
nixos/fcgiwrap: adapt consumer modules and tests
2024-06-22 19:45:25 +02:00
euxane
bf2ad6f48c
nixos/fcgiwrap: adapt consumer modules and tests
...
This also fixes the gitolite-fcgiwrap test by running git through
fcgiwrap as the proper user.
2024-06-22 19:45:25 +02:00
Jörg Thalheim
9f180c5438
Merge pull request #280517 from Mic92/zerotierone
...
nixos/zerotierone: make localConf mergeable
2024-06-21 15:32:05 +02:00
Jörg Thalheim
09ead1f6eb
nixos/zerotierone: make localConf mergeable
2024-06-21 15:17:45 +02:00
Tom Hubrecht
938372e46e
nixos/netbird: Remove thubrecht as maintainer
2024-06-21 09:32:46 +02:00
res0Nanz
16d8c11a33
nixos/networkd-dispatcher: fix links in doc
...
Ill-formatted markdown links fixed.
2024-06-20 00:52:12 +08:00
res0Nanz
ae96067a6d
nixos/cloudflared: fix links in doc
...
Ill-formatted markdown links fixed.
2024-06-20 00:49:01 +08:00
h7x4
4c7c3ceb12
nixosTests.wstunnel: init
...
Co-authored-by: r-vdp <ramses@well-founded.dev>
2024-06-18 11:07:06 +03:00
r-vdp
53e7bea45c
nixos/wstunnel: update the wstunnel module to work with the new rust implementation
...
Co-authored-by: h7x4 <h7x4@nani.wtf>
2024-06-18 11:07:06 +03:00
Tim Häring
7a7060c5bf
nixos/aria2: fix missing default
2024-06-15 12:55:06 +02:00
Tim Häring
f6d3113164
nixos/aria2: fix remove not needed code
2024-06-15 12:51:29 +02:00
éclairevoyant
7d8742da87
treewide: fix mkEnableOption usage
2024-06-14 02:41:42 -04:00
Nick Cao
06b68ac5a3
Merge pull request #317840 from NeverBehave/pkg-ws-tunnel-rust
...
wstunnel: 0.5.1.0 -> 9.6.1
2024-06-13 13:31:08 -04:00
NeverBehave
3fb0e045a5
nixos/wstunnel: adopt rust new cli flags
2024-06-13 00:58:02 +00:00
Pol Dellaiera
7d270d53b9
Merge pull request #303429 from timhae/aria2-module
...
Aria2 module settings
2024-06-12 19:23:44 +02:00
Sean Buckley
36175fb9ad
nixos/wireless: fix quotes in config path
2024-06-11 20:45:04 -04:00
Sandro
da3214b120
Merge pull request #309551 from aca/master
2024-06-10 15:48:32 +02:00
Weijia Wang
9520d06979
Merge pull request #266450 from CRTified/adguardhome-fix-246461
...
nixos/adguardhome: run --check-config before merging
2024-06-10 12:46:26 +02:00
Guanran928
e27092e106
metacubexd: init at 1.140.0 ( #297721 )
...
* metacubexd: init at 1.140.0
* nixos/mihomo: add example for cfg.webui
2024-06-10 12:45:19 +02:00
Florian Klink
6a3a382d5b
nixos/mycelium: add mycelium binary to systemPackages
...
It's now possible to invoke `mycelium {routes,peers} list`.
2024-06-08 15:01:32 +03:00
Thomas Churchman
d226935fd7
nixos/ddclient: deprecate use
, implement use{v4,v6}
...
Upstream replaced `use` with `use{v4,v6}`:
4a1b06630b/ChangeLog.md (new-features)
2024-06-07 17:28:25 +02:00
Keith Pine
6fda200fa4
nixos/inadyn: fix cache directory path
...
The CacheDirectory subdirectory is already part of $CACHE_DIRECTORY.
2024-06-07 09:03:24 +02:00
PatrickDaG
0fdf6e2917
nixos/netbird: fix defaults ( #314656 )
...
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-06-07 00:02:06 +02:00
rnhmjoj
3c12ef3f21
nixos/firewall: fix reverse path check failures with IPsec
...
The endpoint of an IPsec tunnel receives encrypted IPsec packets that
are first decrypted and then forwarded to the intended destination.
The decrypted traffic appears to originate from the same interface it
came in from, so in most cases these packets will fail the reverse path
check even if legitimate.
This change adds an exception to not reject packets that were previously
IPsec-encrypted, meaning the have been accepted, decrypted and are in
the process of being forwarded to their final destinal.
Sources:
- https://www.kernel.org/doc/Documentation/networking/xfrm_device.txt
- https://git.netfilter.org/nftables/commit/?id=49f6e9a846c6c8325b95debe04d5ebc3c01246fb
- https://git.netfilter.org/nftables/commit/?id=8f55ed41d007061bd8aae94fee2bda172c0e8996
- https://thermalcircle.de/doku.php?id=blog:linux:nftables_demystifying_ipsec_expressions
2024-06-05 15:18:35 +02:00
Thomas Gerbet
ef6fea2d86
openssh: move Kerberos support into a dedicated package
...
The `openssh` and `openssh_hpn` packages are now built without
the Kerberos support by default in an effort to reduce the attack surface.
The Kerberos support is likely used only by a fraction of the total users
(I'm guessing mainly users integrating SSH in an Active Directory env) so
dropping it should not impact too many users. It should also be noted that
the Kerberos/GSSAPI auth is disabled by default in the configuration.
`opensshWithKerberos` and `openssh_hpnWithKerberos` are added in order
to provide an easy migration path for users needing this support.
The `openssh_gssapi` package is kept untouched.
2024-06-05 19:45:31 +10:00
Sandro Jäckel
41452802cb
treewide: fix all obviously wrong mkEnableOptions
2024-06-03 13:20:32 +02:00
Guanran Wang
818fe57b73
nixos/mihomo: format using nixfmt
2024-06-03 10:20:58 +08:00
Guanran Wang
f1034cab06
nixos/mihomo: drop default value from cfg.configFile
2024-06-03 10:20:58 +08:00
Ryan Horiguchi
ea63e59edc
nixos/adguardhome: fix typo
2024-06-02 21:01:11 +02:00
Sandro
c6c60cca65
Merge pull request #315112 from sikmir/git-daemon
2024-06-02 17:08:43 +02:00
Julien Moutinho
d4954e0df2
nixos/prosody: support mod_http_file_share
2024-06-01 22:23:20 +02:00
Luflosi
8e945401d5
bind: make systemd service wait for BIND to be ready
...
Without this change, the systemd unit will be marked as ready even though BIND has not finished starting yet.
This causes other units that depend on BIND to start even though BIND is not ready yet.
From https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900788 : "Bind9 will daemonize itself _when it is ready_."
Also modify the NixOS test. With this change, waiting for the unit alone will ensure that BIND is ready to accept queries. I would have expected to see the test failing without this commit but with the `machine.wait_for_open_port(53)` line removed but I found this to not be the case most of the time. This is probably the case because the situation is inherently racy and on my machine BIND happens to start in time most of the time.
2024-05-31 13:33:29 +02:00
Franz Pletz
4e1b4397d9
Merge pull request #312472 from Ma27/networkd-option-rename
...
nixos/networkd: get rid of *Config attributes in lists
2024-05-30 04:06:01 +02:00
Martin Weinelt
e0f4e4b535
Merge pull request #274425 from woffs/fix-274286
...
nixos/frr: adapt to frr-9
2024-05-30 02:33:26 +02:00
lassulus
d6f07be682
Merge pull request #314889 from DavHau/pr_sshd
...
nixos/openssh: allow removing settings
2024-05-30 01:01:07 +02:00
Frank Doepper
4df955130e
nixos/frr: adapt to frr-9
...
- fix #274286
- remove `-f configfile` from ExecStart
- use /etc/frr/${service}d.conf
- enable mgmtd when staticd is enabled
- don't frr-reload.py mgmtd
- remove obsolete lib.mdDoc
2024-05-29 11:07:39 +02:00
Nikolay Korotkiy
ecddd99c6a
nixos/gitDaemon: add package option
2024-05-27 18:50:15 +04:00
Thomas Gerbet
00015f3ef9
Merge pull request #309036 from tomfitzhenry/sshd-package
...
nixos/ssh: add services.openssh.package
2024-05-27 09:40:31 +02:00
DavHau
3fe773a174
nixos/openssh: allow removing settings
...
# Motivation
So far it was not possible to configure sshd to allow password authentication only for a specific user. This is because in the generated config a `Match User xxx` section would be required before the global `PasswordAuthentication` is defined, as otherwise the global option always takes precedence.
The same problem occurs with multiple other options under `settings`.
# Done
This PR fixes that issue for all settings by simply allowing them to be overridden with `null`, which leads to a removal of that setting from the config.
The user can then correctly configure user specific settings using extraConfig, like this:
```
Match User user1
PasswordAuthentication yes
Match all
PasswordAuthentication no
```
2024-05-26 18:46:27 +02:00
Isabelle
56141e2236
nixos/wireguard: add option preShutdown for commands called before interface deletion ( #310345 )
2024-05-23 13:53:45 +02:00
Martin Weinelt
5d515c373e
nixos/kea: make ctrl-agent want network-online.target
...
If it wants to run after it, it needs to want it for it to be there.
2024-05-23 10:31:30 +02:00
Jeremy Baxter
20fc095a1c
nixos/oink: init module
2024-05-23 10:12:53 +12:00
Maximilian Bosch
c4fd7cf16d
nixos/networkd: get rid of *Config attributes in lists
...
This patch is about removing `wireguardPeerConfig`,
`dhcpServerStaticLeaseConfig` - a.k.a. the
AbstractSingletonProxyFactoryBean of nixpkgs - and friends.
As a former colleague said
> worst abstraction ever
I second that. I've written enough networkd config for NixOS systems so
far to have a strong dislike. In fact, these don't even make sense:
`netdevs.wireguardPeers._.wireguardPeerConfig` will be rendered into
the key `[WireGuardPeer]` and every key from `wireguardPeerConfig` is in
there. Since it's INI, there's no place where sections on the same level
as wireguardPeerConfig fit into. Hence, get rid of it all.
For the transition, using the old way is still allowed, but gives a
warning. I think we could drop this after one release.
The tests of rosenpass and systemd-networkd-dhcpserver-static-leases
were broken on the rev before, hence they were updated, but are still
not building.
2024-05-20 17:26:42 +02:00
Marie Ramlow
6478f80b17
nixos/rosenpass: move preStart into script to workaround systemd bug
...
Because of a systemd bug, using both ExecStartPre and ExecStart will fill up the systemd credentials directory,
which leads to rosenpass failing to start.
This will be fixed in systemd v256, see https://github.com/systemd/systemd/pull/31202
Related issue: https://github.com/NixOS/nixpkgs/issues/258371
2024-05-15 17:52:45 +02:00
Raghav Sood
ec2f5e1cb9
Merge pull request #309615 from mkienitz/fix/vsftpd-assertion
...
Fix/vsftpd assertion
2024-05-15 23:09:28 +08:00
Tom Fitzhenry
54ba3732f1
hostapd: add "wpa2-sha1" to authentication.mode enum
...
This is required for some Kindles (e.g. Kindle Paperwhite 7th Gen),
and printers (e.g. Brother MFC-J4440DW).
OpenWRT typically adds "wpa_key_mgmt = WPA-PSK", per 3f28c422ba/package/network/config/wifi-scripts/files/lib/netifd/hostapd.sh (L44-L71)
2024-05-14 19:28:15 +10:00
Florian Klink
aff6a121a3
Merge pull request #311039 from DavHau/pr_smokeping
...
nixos/smokeping: use nginx instead of thttpd
2024-05-13 01:11:59 +02:00
Franz Pletz
ef26d99b37
Merge pull request #310873 from ivan/radvd-debuglevel
...
nixos/radvd: add debugLevel option
2024-05-12 22:23:24 +02:00
Andreas Rammhold
d157db3480
Merge pull request #307051 from hax404/modules/tayga/mappings
...
nixos/tayga: add mappings option
2024-05-12 21:16:26 +02:00
DavHau
0b6c484848
nixos/smokeping: use nginx instead of thttpd
...
Motivation:
fixes #265953
Changes:
- deprecate `services.smokeping.port` in favor of the niginx native option
- mention in release notes
2024-05-12 13:31:11 +02:00
Bjørn Forsman
7909e0f7d6
nixos/pixiecore: fix apiServer example
...
Add missing http:// scheme. Without it pixiecore logs this and never
contacts the API server:
[DHCP] Couldn't get bootspec for [REDACTED_MAC_ADDR]: Get "localhost:8080/v1/boot/[REDACTED_MAC_ADDR]": unsupported protocol scheme "localhost"
2024-05-11 23:01:35 +02:00
Ivan Kozik
0482e54050
nixos/radvd: add debugLevel option
2024-05-11 14:59:09 +00:00
Kyungrok Chung
81a58be20b
nixos/tailscale: add extraSetFlags to configure daemon
2024-05-11 03:01:54 +09:00
Maximilian Kienitz
aa93972d0b
nixos/vsftpd: fix invalid implication in assertions
2024-05-06 23:26:09 +02:00
nicoo
db5f88c41a
nixos/ssh: Make ~/.ssh/authorized_keys
optional in AuthorizedKeysFiles ( #279894 )
2024-05-06 01:11:03 +00:00
Sandro
bdd2e6b121
Merge pull request #309324 from evenbrenden/move-jotta-cli
...
nixos/jotta-cli: move to services.jotta-cli
2024-05-05 23:17:24 +02:00
Georg Haas
e83b8cfd43
nixos/tayga: add mappings option
2024-05-05 21:10:51 +02:00
André Silva
7142a2dec9
Merge pull request #306655 from devusb/sunshine-update
...
sunshine: 0.23.0 -> 0.23.1
2024-05-05 19:14:28 +01:00
Even Brenden
9fa89d0e2c
nixos/jotta-cli: move to services.jotta-cli
2024-05-05 19:30:16 +02:00
Weijia Wang
9ed8582721
Merge pull request #308622 from jmbaur/jbaur/clatd-minor-cleanup
...
Minor cleanups for clatd module and release notes
2024-05-04 19:25:11 +02:00
Tom Fitzhenry
ff1c82ee07
nixos/ssh: add services.openssh.package
...
Motivation: Allow the sshd package to be built differently to the ssh
package (programs.ssh.package). For example, build sshd(1) without
openssl, but built ssh(1) with OpenSSL support.
Set the default to be programs.ssh.package, to preserve compatibility.
2024-05-04 23:14:47 +10:00
Carl Richard Theodor Schneider
3e86aba9d2
nixos/adguardhome: run --check-config before merging
...
To prevent merging configurations on different `schema_version`,
we will now check the existing configuration, which has the side-effect of
updating the `schema_version`.
Fixes #246461 as described in https://github.com/NixOS/nixpkgs/issues/246461#issuecomment-1667663556
2024-05-03 20:15:02 +02:00
éclairevoyant
512b6d9ad2
Merge pull request #308531 from sanxus/fix-extraConfig
...
nixos/networkmanager: fix incorrect documention about `extraConfig`
2024-05-03 18:08:44 +00:00
sanxus
6b7692c8f5
nixos/networkmanager: fix incorrect documention about extraConfig
2024-05-04 01:04:51 +08:00
Jared Baur
09073330e0
nixos/clatd: remove invalid startLimitIntervalSec
...
The `startLimitIntervalSec` option is not valid under `serviceConfig`.
2024-05-02 14:16:12 -07:00
nicoo
480b871f2d
Merge #305844 : add clatd module and nixos test
2024-05-02 14:00:06 +00:00
Colin Sane
6034d354d7
nixos/trust-dns: fix invalid default for settings.zones
option ( #308513 )
...
and fix a few documentation typos while here.
2024-05-02 12:34:04 +00:00
Sandro
2e9d7dca27
Merge pull request #302570 from evenbrenden/jottad-service
2024-05-02 10:25:30 +02:00
Weijia Wang
f6a18241dd
Merge pull request #247828 from rhoriguchi/nixos/adguardhome
...
nixos/adguardhome: update config to match new schema, update package and fix update script
2024-04-30 16:44:10 +02:00
Georg Haas
0c42398c9d
nixos/clatd: init
2024-04-29 23:29:29 +02:00
Even Brenden
021a0ffe57
nixos/jotta-cli: init jotta-cli
...
See https://github.com/NixOS/nixpkgs/issues/300063 .
2024-04-29 09:14:47 +02:00
Vladimír Čunát
5cb7aa5ec9
nixos/knot: use a more precise type for .settings
...
See discussion on PR #304373
2024-04-28 10:26:09 +02:00
Tom
97bb1199c0
maintainers: remove twitchyliquid64
...
Yall won't miss me. The packages I leave orphaned are trivially updated as dependents need the new versions.
But passively endorsing the direction this organization and its leadership is something I can't do.
To those who still have faith in turning this around, you da real MVP 🖖
2024-04-26 22:48:31 -07:00
Sarah Brofeldt
75541131ef
Merge pull request #306608 from Tom-Hubrecht/netbird-coturn
...
nixos/netbird: Fix configuration of coturn server
2024-04-27 07:35:02 +02:00
Dave Anderson
308cb342c9
maintainers: drop danderson
2024-04-26 11:36:50 -07:00
北雁 Cryolitia
13e6ece470
nixos/sunshine: add autoStart attr
2024-04-25 16:53:24 +08:00
Morgan Helton
34b255b69b
nixos/sunshine: add literalExpression for examples
2024-04-24 19:17:57 -05:00
Tom Hubrecht
5ad0ea1aaf
nixos/netbird: Fix configuration of coturn server
2024-04-24 20:35:32 +02:00
Thomas Gerbet
ecd2d35be0
Merge pull request #305742 from tomfitzhenry/ssh-no-pam
...
nixos/ssh: expose UsePAM and PrintMotd as options
2024-04-24 09:40:24 +02:00
Tom Fitzhenry
3fd9ef4b40
nixos/ssh: allow PrintMotd to be enabled
2024-04-23 22:53:09 +10:00
Tom Fitzhenry
2e51a2fd03
nixos/ssh: allow UsePAM to be disabled
2024-04-23 22:40:58 +10:00
Maximilian Bosch
2ee96a1738
nixos: fix manual build
...
`mdDoc` is deprecated!
2024-04-21 23:28:46 +02:00
Pol Dellaiera
95d8be4d3c
Merge pull request #301514 from r-vdp/nftables-rpfilter-extra-rules
...
nixos/firewall-nftables: allow adding additional rules to the rpfilter chain
2024-04-21 23:02:01 +02:00
Sandro
04a3a2a8fe
Merge pull request #260962 from lunik1/inadyn-module
...
nixos/inadyn: init
2024-04-21 21:38:22 +02:00
Michele Guerini Rocco
8b93a430dc
Merge pull request #305689 from rnhmjoj/pr-fix-wpa-secrets
...
nixos/wireless: correctly handle secrets containing &
2024-04-21 16:07:42 +02:00
rnhmjoj
89a1bde018
nixos/wireless: correctly handle secrets containing &
...
In the replacement arg of gsub() the & symbol is a special character
that need to be escaped. To avoid this, and further issues due to the
variable name possibly being interpreted as a regex, we do a normal
substring replacement.
This fixes issues #279803 .
2024-04-21 09:58:26 +02:00
rnhmjoj
4fa107f1c9
nixos/wireless: create empty config for imperative setup
...
If allowAuxiliaryImperativeNetworks is enabled, the wpa_supplicant
daemon complains fails to start if /etc/wpa_supplicant.conf does not
exist. As this can be created using wpa_cli (or similar) later, it
shouldn't matter, so let's create an empty one.
This fixes issues #157537 , #299466 .
2024-04-21 02:10:32 +02:00
Sandro
5bfe2b6964
Merge pull request #294641 from devusb/sunshine-module
...
nixos/sunshine: init
2024-04-20 21:32:50 +02:00
Bjørn Forsman
c7ab550bbc
nixos/deconz: fix curl redirect option in postStart
...
It should be curl -L (follow redirects), not curl -l (FTP directory
listing option). I know because it's my mistake.
Fixes: d4b989cafc
("nixos/deconz: delay signalling service readiness until it's actually up")
2024-04-20 20:24:39 +02:00
Ryan Lahfa
21bd30ea2f
Merge pull request #247118 from Tom-Hubrecht/netbird-server
...
nixos/netbird-server: init module
2024-04-20 11:21:10 +02:00
Ryan Horiguchi
c60dd90d1f
nixos/adguardhome: update config to match new schema
2024-04-19 18:42:52 +02:00
Martin Weinelt
666b73468d
Merge pull request #304373 from SuperSandro2000/knot-settings
...
nixos/knot: use module system to combine settings option
2024-04-19 17:26:53 +02:00
Tim Häring
31c9eec061
nixos/aria2: add settings option
...
I also took the liberty to add myself as module maintainer
2024-04-18 21:04:27 +02:00
Tom Hubrecht
6d91c95fce
nixos/netbird-server: init module
2024-04-18 15:33:18 +02:00
Sandro
f417891699
Merge pull request #293954 from Dan-Theriault/refactor-tailscale-auth
2024-04-18 15:14:01 +02:00
Lily Foster
59742f6f72
Merge pull request #292472 from Janik-Haag/networkmanager-tests
...
nixosTests.networking: refactor and add NetworkManager support
2024-04-18 06:38:37 -04:00
Atemu
3bdc0e7715
Merge pull request #304810 from ju1m/dnscrypt-proxy2
...
nixos/dnscrypt-proxy2: fix cross-compiling
2024-04-18 09:04:41 +02:00
Bjørn Forsman
d4b989cafc
nixos/deconz: delay signalling service readiness until it's actually up
...
Fixes test flakiness (`nix-build -A nixosTests.deconz`).
2024-04-17 22:32:15 +02:00
Janik H.
8612ed1ee9
nixos/networkmanager: change config generation to use the ini generator
2024-04-17 21:20:11 +02:00
Julien Moutinho
6fd2d4b541
nixos/dnscrypt-proxy2: fix cross-compiling
2024-04-17 16:41:51 +02:00
Pascal Wittmann
6ae4216336
Merge pull request #303890 from oluceps/ss-module
...
nixos/shadowsocks: ensure password be set
2024-04-17 11:17:23 +02:00
Dan Theriault
3cf6c4ddb3
nixos/tailscale-auth: init module
...
This additional module allows the tailscale auth proxy to be configured
independently of nginx. The tailscale auth proxy works with both caddy
and traefik. All prior nginx/tailscale-auth options are retained as
aliases.
2024-04-16 19:06:08 -04:00
oluceps
c2c632ff31
nixos/shadowsocks: ensure password be set
...
Co-authored-by: Pascal Wittmann <mail@pascal-wittmann.de>
2024-04-16 13:34:08 +00:00
Christoph Hrdinka
19dd20aa06
Merge pull request #299581 from Stunkymonkey/nsd-chmod-install
...
nixos/nsd: prefer 'install' over 'chmod'
2024-04-16 08:59:47 +02:00
Sandro Jäckel
490ba58dd7
nixos/knot: use module system to combine settings option
2024-04-15 23:19:45 +02:00
Felix Buehler
3e2f0bc0b4
nixos/nsd: prefer 'install' over 'chmod'
2024-04-14 20:56:19 +02:00
stuebinm
c0c2f2903f
lib.mdDoc: remove and replace with warning
2024-04-13 10:07:35 -07:00
stuebinm
6afb255d97
nixos: remove all uses of lib.mdDoc
...
these changes were generated with nixq 0.0.2, by running
nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix
nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix
nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix
two mentions of the mdDoc function remain in nixos/, both of which
are inside of comments.
Since lib.mdDoc is already defined as just id, this commit is a no-op as
far as Nix (and the built manual) is concerned.
2024-04-13 10:07:35 -07:00
Weijia Wang
11f3e0c15d
mongodb-4_4: drop
2024-04-12 12:30:40 +02:00
Sandro
5c26e13e2a
Merge pull request #266109 from linsui/i2p
2024-04-11 15:51:57 +02:00
Jared Baur
c1d5363ecc
nixos/cloudflared: fix docs for tlsTimeout
...
The URL and link text were swapped.
2024-04-10 21:12:51 -07:00
Rick van Schijndel
067e519281
Merge pull request #302858 from tweag/infinisil-maintainer
...
treewide: Drop infinisil as maintainer from most packages
2024-04-10 08:50:38 +02:00
Silvan Mosberger
ea5dfeab93
treewide: Drop infinisil as maintainer from most packages
...
I'm not going anywhere, I'm focusing my energy on other issues, and
getting pinged as a maintainer for packages is a bit distracting (also
I'm not using most of these packages anyways!)
2024-04-09 21:43:39 +02:00
Jörg Thalheim
fb158384bd
Merge pull request #289270 from Mic92/nixos-tinc
...
nixos/tinc: fix user to not include . in its name
2024-04-09 19:43:48 +02:00
Florian Klink
1dab5d7c77
Merge pull request #302228 from xzfc/bind-ipv6
...
bind: allow recursive queries from IPv6 loopback
2024-04-08 18:35:18 +03:00
linsui
1f761a49ce
i2p: cleanup and build jbigi from source
2024-04-08 22:29:23 +08:00
Sandro
b32f206faa
Merge pull request #258520 from Benjamin-L/soju-admin-socket
2024-04-08 10:20:31 +02:00
Benjamin Lee
d772ac182f
nixos/soju: add sojuctl wrapper with config path
...
The config is a in an arbitrary nix store path, and is necessary to
invoke sojuctl. Without the wrapper, you have to read the systemd unit
or use a similar trick to find it.
2024-04-07 13:45:47 -07:00
Benjamin Lee
5207bb723a
nixos/soju: add adminSocket.enable option
2024-04-07 13:45:19 -07:00
Benjamin Lee
4959d7bcd8
nixos/soju: add package option
2024-04-07 13:45:17 -07:00
Guanran Wang
63c0c98167
nixos/mihomo: fix option description
2024-04-07 21:47:03 +08:00
Albert Safin
9b383de757
bind: allow recursive queries from IPv6 loopback
2024-04-07 01:14:38 +00:00
Silvan Mosberger
a448a21521
Merge pull request #301556 from edef1c/lib-xor
...
lib: add xor
2024-04-04 22:03:53 +02:00
edef
725bb4e48c
lib: add xor
...
This gets clumsily reimplemented in various places, to no useful end.
2024-04-04 19:46:58 +00:00
r-vdp
1eb26d4140
nixos/firewall-nftables: allow adding additional rules to the rpfilter chain
2024-04-04 13:07:52 +02:00
Pol Dellaiera
537d34da58
Merge branch 'master' into technitium-dns-server-module
2024-04-04 08:25:51 +02:00
FabianRig
f126a02f2f
nixos/technitium-dns-server: init module
2024-04-04 07:41:52 +02:00
Aleksana
cd6f498571
Merge pull request #301084 from LostAttractor/fix/v2raya
...
nixos/v2raya: fix nftables support
2024-04-03 22:09:33 +08:00
ChaosAttractor
865f976ddd
nixos/v2raya: fix nftables support
2024-04-03 16:07:02 +08:00
Christoph Hrdinka
04b315de7b
Merge pull request #290510 from melvyn2/nsd-options
...
nixos/nsd: add multi-master-check and zonefiles-write options
2024-04-03 09:07:06 +02:00
melvyn
46232e9f23
nixos/nsd: add multi-master-check, zonefiles-write, remove database options
...
The database option and functionality was completely removed in nsd 4.8.0
Also remove obselete lib.mdDoc option strings
2024-04-02 10:11:40 -07:00
Felix Buehler
43f956227e
nixos/cjdns: prefer 'install' over 'chmod'
2024-04-02 08:43:20 +00:00
lunik1
121490461b
nixos/inadyn: init
2024-04-01 01:24:46 +01:00
Morgan Helton
dd2c6f1840
nixos/sunshine: init
2024-03-30 20:07:35 -05:00
Alessandro Labate
43521f9021
nixos/networkmanager: correct example ( #295439 )
...
The example pertinent to `fccUnlockScripts` contains wrong (maybe old) key names possibly leading to trial/error while configuring the option. This issue can be avoided updating the example.
2024-03-29 14:42:14 +01:00
r-vdp
b9fc0a8f67
nixos/mycelium: allow specifying extra args to mycelium
2024-03-29 13:38:59 +01:00
Janne Heß
fcc95ff817
treewide: Fix all Nix ASTs in all markdown files
...
This allows for correct highlighting and maybe future automatic
formatting. The AST was verified to work with nixfmt only.
2024-03-28 09:28:12 +01:00
Janne Heß
bc77c7a973
treewide: Mark Nix blocks in markdown as Nix
...
This should help us with highlighting and future formatting.
2024-03-28 09:28:12 +01:00
Matthieu Coudron
ee1604d8c7
networking.wireguard: generate leaner units
2024-03-27 00:49:32 +01:00
matthewcroughan
99e488e2df
nixos/scion: init
2024-03-26 15:54:09 +00:00
Casey Link
cef226e553
nixos/microsocks: init
2024-03-26 07:52:41 +01:00
Sandro
dabaa7ac65
Merge pull request #288033 from diogotcorreia/module-dnsproxy
...
nixos/dnsproxy: init module
2024-03-24 21:52:09 +01:00
Florian Klink
21721e4196
nixos/mycelium: description updates
...
- Slight rewordings and typo fixes.
- Use documentation prefixes for addresses, rather than 1.2.3.4, and
add IPv6 examples.
- Fix description for `keyFile` (`/var/lib/mycelium/key{,.bin}`).
- Some formatting by my editor
2024-03-23 12:36:49 +01:00
Doron Behar
2897be360b
Merge pull request #287966 from Guanran928/clash-meta
...
nixos/mihomo: init
2024-03-21 10:40:10 +02:00
github-actions[bot]
36232fff71
Merge master into staging-next
2024-03-20 18:01:02 +00:00
Dmitry Bogatov
5bb92281f5
nixos/dnscache: Provide explicit group for "dnscache" user
...
Without this patch the module refuses to evaluate, complaining that
default "nogroup" is no longer supported.
2024-03-20 16:45:50 +01:00
github-actions[bot]
90461ffe37
Merge master into staging-next
2024-03-20 12:01:15 +00:00
lassulus
b82a5ef764
nixos/mycelium: init
2024-03-20 03:56:58 +01:00
github-actions[bot]
ac91cf83c1
Merge master into staging-next
2024-03-18 00:02:20 +00:00
Sandro
1f212fd6e6
Merge pull request #289025 from tcheronneau/issue-288907
...
nixos/tinyproxy: fix the quotes around the filter path
2024-03-17 23:33:42 +01:00
github-actions[bot]
60fbf92c10
Merge master into staging-next
2024-03-16 18:01:00 +00:00
Janik H.
847a53742c
nixos/networkmanager: ensure-profiles, make sure networkmanager is running
2024-03-16 18:11:58 +01:00
github-actions[bot]
cecf050e96
Merge master into staging-next
2024-03-13 12:01:25 +00:00
Pol Dellaiera
55251f1ffc
Merge pull request #295547 from Janik-Haag/unbound
...
nixos/unbound: drop networkmanager since it doesn't support unbound anymore
2024-03-13 10:33:52 +01:00
Janik H.
4147e50f18
nixos/unbound: drop networkmanager since it doesn't support unbound anymore
2024-03-13 09:50:56 +01:00
Pol Dellaiera
c35c016e5d
Merge pull request #295529 from Janik-Haag/networkmanager-drop-unbound
...
nixos/networkmanager: drop unbound form dns servers
2024-03-13 09:04:58 +01:00
Janik H.
a97e56ae28
nixos/networkmanager: drop unbound form dns servers
...
upstream dropped unbound in 5da17c689b
2024-03-13 08:31:52 +01:00
annalee
8e038835fe
Merge remote-tracking branch 'upstream/master' into staging-next
2024-03-13 00:38:07 +00:00
Felix Buehler
1e22e7d75e
nixos/murmur: fix writing registerPassword to config
2024-03-12 21:19:24 +01:00
github-actions[bot]
06e5eb63d3
Merge staging-next into staging
2024-03-11 18:01:53 +00:00
Sandro
869ec01e56
Merge pull request #294286 from SuperSandro2000/unbound-remote-config-check
2024-03-11 16:06:31 +01:00
Pierre Allix
cf625fe5f0
nixos/networkmanager: add doc about nm profiles interaction with resolvconf
2024-03-11 12:55:27 +01:00
Guanran Wang
a6857b00fe
nixos/mihomo: init
2024-03-11 09:51:36 +08:00
github-actions[bot]
973ef4b818
Merge staging-next into staging
2024-03-10 06:01:30 +00:00
Peder Bergebakken Sundt
4a4a70ca31
Merge pull request #280836 from numinit/nebula-port-zero
...
nixos/nebula: default to port 0 for hosts other than lighthouse/relay
2024-03-10 05:01:04 +01:00
Sandro Jäckel
67c1193fab
nixos/unbound: disable checkconf when remote-control is used
...
Closes #293001
2024-03-08 15:34:00 +01:00
maxine
d231374084
Merge pull request #288873 from amaxine/networkmanager_1.46
...
networkmanager: 1.44.2 → 1.46.0
2024-03-08 09:52:14 +00:00
Diogo Correia
9b7e02dd4b
nixos/dnsproxy: init module
2024-03-07 23:26:59 +00:00
Guillaume Girol
dc9a74e61e
Merge pull request #291934 from e1mo/bird-lg-1-3-5
...
bird-lg: 1.3.1 -> 1.3.5
2024-03-03 15:50:42 +01:00
Sandro
5ad27da222
Merge pull request #291907 from SuperSandro2000/tailscaled-flags
2024-03-01 13:54:54 +01:00
Sandro
daa33a4bf7
Merge pull request #287299 from SuperSandro2000/unbound-checkconf
...
nixos/unbound: check validity of config file
2024-03-01 00:33:36 +01:00
Robert Schütz
3330e3c9c3
nixos/searx: use lib.getExe
2024-02-28 17:51:24 -08:00
pennae
b71ca1c90a
Merge pull request #291922 from NixOS/mosquitto-2
...
nixos/mosquitto: remove stutter in acl file name
2024-02-28 02:06:01 +01:00
e1mo
43fee5401d
nixos/bird-lg: Update option description to indicate new features
...
In release v1.3.3[0] support for CIDRs was added, thus updated the
option description to indicate the new support for that.
[0]: https://github.com/xddxdd/bird-lg-go/releases/tag/v1.3.3
2024-02-27 23:54:21 +01:00
Sandro
f9477e3a75
Merge pull request #209506 from Izorkin/update-dhcpcd-exit-hook
...
nixos/dhcpcd: optimize exitHook
2024-02-27 23:01:22 +01:00
Sandro
4c88c797b8
nixos/mosquitto: remove stutter in acl file name
2024-02-27 22:15:43 +01:00
Sandro Jäckel
6753857664
nixos/tailscale: add option to pass flags to tailscaled
2024-02-27 20:08:08 +01:00
pennae
13aff9b34c
Merge pull request #259937 from charmoniumQ/patch-1
...
nixos/mosquitto: fix ACL permissions
2024-02-26 22:58:40 +01:00
Pol Dellaiera
f9ef0053c5
Merge pull request #288401 from katexochen/bees/refactor
...
bee: refactor & update; bee{-unstable,-clef}: remove; maintainers: remove attila-lendvai
2024-02-23 20:12:41 +01:00
Maxine Aubrey
e1863b4f79
nixos/networkmanager: support stable-ssid for cloned MAC addresses
2024-02-22 18:37:13 +01:00
Adam C. Stephens
d1e2847664
Merge pull request #281000 from cablespaghetti/master
...
sabnzbd: Add configurability of state directory owner and firewall
2024-02-21 08:37:46 -05:00
Morgan Jones
32f56d7266
nixos/nebula: fix port resolution for firewall rules
2024-02-17 15:07:27 -08:00
Stanisław Pitucha
2eed715fbf
nixos/go-camo: init
2024-02-17 20:45:49 +01:00
Jörg Thalheim
5c84f89310
nixos/tinc: fix user to not include . in its name
...
sysusers does not like . in the user name.
2024-02-16 13:36:28 +01:00
Izorkin
1293f046b5
nixos/dhcpcd: optimize exitHook
2024-02-16 10:12:52 +03:00
Thomas
149fb601dd
nixos/tinyproxy: add quotes around the filter path
...
Using already existing function
2024-02-15 16:25:04 +01:00
Vladimír Čunát
aaca7a186f
Merge #286596 : nixos/knot: add support for XDP setups
2024-02-15 09:19:59 +01:00
Michele Guerini Rocco
cd02351ae0
Merge pull request #233017 from koenw/libreswan-StateDirectory
...
nixos/libreswan: Use StateDirectory to setup ipsec/nss
2024-02-14 14:36:43 +01:00
Michele Guerini Rocco
dc91f91987
Merge pull request #286393 from oddlama/fix-hostapd-utf8-ssid
...
nixos/hostapd: fix utf8Ssid setting not properly honored
2024-02-14 14:08:46 +01:00
Martin Weinelt
ec89463a61
nixos/knot: refactor
...
- Stop using `with lib`
- Drop `lib.mdDoc`
- Use `escaepSystemdExecArgs` for escaping
2024-02-13 13:44:32 +01:00
Martin Weinelt
d1d8dd3e55
nixos/knot: add support for XDP setups
...
The Express Data Path (XDP) is a way to circumvent the traditional Linux
networking stack and instead run an eBPF program on your NIC, that makes
the decision to provide Knot with certain packets. This is way faster
and more scalable but comes at the cost of reduced introspection.
Unfortunately the `knotc conf-check` command fails hard with missing
interfaces or IP addresses configured in `xdp.listen`, so we disable it
for now, once the `xdp` config section is set. We also promote the config
check condition to a proper option, so our conditions become public
documentation, and we allow users to deal with corner cases, that we have
not thought of yet.
We follow the pre-requisites documented in the Knot 3.3 manual, and set
up the required capabilities and allow the AF_XDP address family.
But on top of that, due to our strict hardening, we found two more
requirements, that were communicated upstream while debugging this.
- There is a requirement on AF_NETLINK, likely to query for and configure
the relevant network interface
- Running eBPF programs requires access to the `bpf` syscall, which we
deny through the `~@privileged` configuration.
In summary We now conditionally loosen the hardening of the unit once we
detect that an XDP configuration is wanted. And since we cannot
introspect arbitrary files from the `settingsFiles` option, we expose XDP
support through the `enableXDP` toggle option on the module.
2024-02-13 13:44:31 +01:00
Paul Meyer
ce0a47cd2c
maintainers: remove attila-lendvai
2024-02-12 23:10:03 +01:00
Paul Meyer
11eef97f3c
bee-clef: remove
2024-02-12 23:10:03 +01:00
Sandro Jäckel
80e79ded15
nixos/unbound: check validity of config file
2024-02-12 22:49:03 +01:00
Sam Weston
c49e6bf8b8
nixos/sabnzbd: use stateDirectory and mkIf-ify user/group creation
2024-02-11 16:49:08 +00:00
Sam Weston
d3d5b72c65
nixos/sabnzbd: add openFirewall
2024-02-11 16:48:05 +00:00
Lin Jian
f3a93440fb
Merge pull request #285813 from jerrita/nft-precheck-flatten
...
nixos/nftables: add option for flattening rulesetFile
2024-02-11 10:41:17 +08:00
Peder Bergebakken Sundt
6f55f021df
Merge pull request #287304 from ambroisie/pyload-user-group
...
nixos/pyload: add user/group options
2024-02-10 14:59:23 +01:00
Peder Bergebakken Sundt
5caded32fe
Merge pull request #277189 from anpin/fix/cloudflared-service
...
cloudflared: fixed missing configuration options
2024-02-10 12:45:08 +01:00
Silvan Mosberger
11cd405226
Merge pull request #280322 from h7x4/add-hocon-format-generator
...
pkgs.formats: Add HOCON format generator
2024-02-10 03:07:51 +01:00
Silvan Mosberger
5de4385620
Merge pull request #285833 from 360ied/murmur-hardened
...
nixos/murmur: systemd service hardening
2024-02-10 02:48:46 +01:00
github-actions[bot]
b64b4f2d6a
Merge master into staging-next
2024-02-09 18:01:06 +00:00
Will Fancher
0cf1e24f32
Merge pull request #284627 from Trundle/nftables-ordering
...
nixos/nftables: remove default systemd dependencies
2024-02-09 12:29:24 -05:00
h7x4
39a779e269
treewide: use formats.hocon
2024-02-09 16:40:22 +01:00
Bruno BELANYI
c14f029dae
nixos/pyload: add user/group options
2024-02-08 20:27:14 +00:00
github-actions[bot]
03dd2b9470
Merge master into staging-next
2024-02-07 12:01:11 +00:00
Sergei Trofimovich
275855d632
nixos: hostapd: drop unused crda
package import
2024-02-06 22:45:01 +00:00
jerrita
e686847d20
nixos/nftables: add option for flattening rulesetFile
...
Co-authored-by: Lin Jian <me@linj.tech>
2024-02-05 11:27:16 +08:00
360ied
11cf6ab0dd
nixos/murmur: systemd service hardening
...
Murmur provides an official systemd service file in their repo,
which contains various service hardening settings:
c4b5858d14/auxiliary_files/config_files/mumble-server.service.in (L7)
The service configuration in nixpkgs does not include these hardening settings.
This commit adds the hardening settings to the murmur service in nixpkgs.
This drops the `systemd-analyze security` score of murmur.service from 9.2 (UNSAFE) to 2.1 (OK).
2024-02-04 21:23:34 -05:00
oddlama
b7f29692c0
nixos/hostapd: fix utf8Ssid setting not properly honored
2024-02-05 00:52:08 +01:00
Martin Weinelt
27fa02d0f1
Merge remote-tracking branch 'origin/staging-next' into staging
...
Conflicts:
- pkgs/development/compilers/llvm/10/clang/default.nix
- pkgs/development/compilers/llvm/8/clang/default.nix
2024-02-01 12:25:11 +01:00
Andreas Stührk
fc6c92faf3
nixos/nftables: remove default systemd dependencies
...
With DefaultDependencies enabled, systemd adds "After=basic.target" to
service units. `basic.target` has a dependency on `sockets.target`, so
the `nftables` has (amongst others) the following order constraints:
* Before=network-pre.target
* After=sockets.target
Those constraints are often unsatisfiable. For example, `systemd-networkd`
has a dependency `After=network-pre.target`. When a socket unit now uses
`BindToDevice=` on a device managed by `networkd`, a timeout occurs
because `networkd` waits for `network-pre.target`, but
`network-pre.target` depends (through nftables) on `sockets.target`, but
the device to bind the socket to is never brought up, as this would
happen through `networkd`.
This is fixed by removing the implicit dependency on `basic.target`.
2024-01-31 23:26:05 +01:00
Peder Bergebakken Sundt
19159ced3e
Merge pull request #249523 from greizgh/seafile-10
...
Seafile 10
2024-01-31 17:13:54 +01:00
Peder Bergebakken Sundt
9118823ed3
Merge pull request #226532 from SuperSandro2000/dhcpcd
...
dhcpcd: change files after patching; nixos/dhcpcd: link dhcpcd.conf to /etc/ to fix dhcpcd -k
2024-01-31 16:43:54 +01:00
Yureka
a6c64fbd39
nixos/strongswan-swanctl: add includes option for secrets ( #284742 )
2024-01-30 12:47:33 +01:00
h7x4
ba5f81a6b6
Merge pull request #276547 from ambroisie/pyload-module
...
nixos/pyload: init module
2024-01-30 12:29:46 +01:00
Franz Pletz
3432be07e4
Merge pull request #278555 from leona-ya/kresd-port-only-regex
2024-01-30 00:41:53 +01:00
Sandro Jäckel
1af95a24c1
nixos/dhcpcd: link dhcpcd.conf to /etc/ to fix dhcpcd -k
2024-01-27 18:12:55 +01:00
Thomas Gerbet
117fd19a77
Merge pull request #276306 from ambroisie/aria2-rpc-secret-file
...
nixos/aria2: implement 'rpcSecretFile'
2024-01-27 00:46:56 +01:00
maxine
642317d03f
Merge pull request #283618 from SuperSandro2000/tailscale-resoleconf
...
nixos/tailscale: make resolvconf package depending on enablement of module
2024-01-26 22:41:14 +01:00
Lassulus
da25b2382d
Merge pull request #280373 from h7x4/treewide-use-new-tmpfiles-api
...
treewide: use new tmpfiles API
2024-01-26 10:47:18 +01:00
Robert Schütz
8433938f9b
Merge pull request #283617 from SuperSandro2000/headscale
...
nixos/headscale: install package system wide
2024-01-25 13:40:29 -08:00
Bruno BELANYI
d3a1465196
nixos/aria2: implement 'rpcSecretFile'
...
Since this is supposed to be a secret, use a file path as an input
instead of making it part of the expression, which would expose it in
the nix store.
2024-01-25 21:36:21 +00:00
Ryan Lahfa
6fe2736c6f
Merge pull request #246055 from Tom-Hubrecht/netbird
...
nixos/netbird: Allow running multiple netbird networks in parallel
2024-01-25 20:08:58 +01:00
rnhmjoj
1a1b91b3b9
nixos/dnsdist: add options for dnscrypt
2024-01-25 18:25:40 +01:00
Tom Hubrecht
c2d822e6b0
nixos/netbird: Allow running multiple netbird networks in parallel
2024-01-25 17:25:59 +01:00
Sandro Jäckel
922351ec86
nixos/tailscale: make resolvconf package depending on enablement of module
...
If resolvconf is not enabled, trying to use it always fails because
/etc/resolvconf.conf contains an `exit 1`.
2024-01-25 15:50:36 +01:00
Sandro Jäckel
9f395dae71
nixos/headscale: install package system wide
...
this is required to confirm nodes and generally manage everything
2024-01-24 23:00:54 +01:00
Vladimír Čunát
7f979aeb86
nixos/knot: allow specifying the clear
section
...
It was added in 3.3.4. I'm not sure if it will be useful with NixOS
services, but I added it in the usual way anyway.
2024-01-24 10:33:55 +01:00
h7x4
f5d513c573
treewide: use new tmpfiles api
2024-01-24 05:13:17 +01:00
Bruno BELANYI
70d0a6e547
nixos/pyload: init
2024-01-23 15:04:44 +00:00