Commit Graph

3422 Commits

Author SHA1 Message Date
Lassulus
52bbee772a
Merge pull request #232019 from 4z3/master-wireguard 2023-05-16 22:29:17 +02:00
Doron Behar
9b0a03fc88
Merge pull request #226088 from Xyz00777/master
nixos/syncthing: applied rfc42 and added some additional options
2023-05-16 13:29:36 +03:00
tv
50b845c5a6 nixos/wireguard: allow customizing peer unit name 2023-05-16 10:28:24 +02:00
Xyz00777
32866f8d58 nixos/syncthing: use rfc42 style settings 2023-05-15 14:38:56 +02:00
Ryan Lahfa
e3bd7faa18
Merge pull request #226830 from Janik-Haag/birdwatcher
birdwatcher: init at 2.2.4, alice-lg: init at 6.0.0, nixos/birdwatcher: init, nixos/alice-lg: init
2023-05-15 08:42:10 +02:00
Janik H
40136a1f7f nixos/birdwatcher: init 2023-05-15 02:52:06 +02:00
Janik H
8ed86700a2 nixos/alice-lg: init 2023-05-15 02:52:06 +02:00
Katze
dfb8a2a7c4
nixos/syncplay: add saltFile and extraArgs option (#220096)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2023-05-12 18:01:33 +02:00
Martin Weinelt
537d611a75 nixos/sshd: Remove algorithms that do MAC-then-encrypt
Algorithms with the -etm suffix calculate the MAC after encryption,
which is generally considered safer.
2023-05-11 12:54:32 +02:00
Ilan Joselevich
7ecf20b490
nixos/harmonia: adjust module and test to upstream 2023-05-10 22:28:03 +03:00
Jörg Thalheim
76ffeaf06c nixos/harmonia: init service 2023-05-10 14:52:31 +02:00
Bruno Adelé
7af8ace239
nixos/smokeping: Format smokeping source code 2023-05-05 22:46:30 +02:00
Sandro
5d0d352833
Merge pull request #220761 from elesiuta/picosnitch-init 2023-04-30 01:52:10 +02:00
Thomas Gerbet
b4e503a783 strongswan: 5.9.8 -> 5.9.10
Fixes CVE-2023-26463: https://www.strongswan.org/blog/2023/03/02/strongswan-vulnerability-%28cve-2023-26463%29.html

Release notes:
https://www.strongswan.org/blog/2023/03/02/strongswan-5.9.10-released.html
https://www.strongswan.org/blog/2023/01/03/strongswan-5.9.9-released.html
2023-04-26 01:08:29 +02:00
Moritz 'e1mo' Fromm
3dc05fbe40 nixos/bird-lg: Add support for traceroute-flags 2023-04-25 12:00:44 +02:00
Moritz 'e1mo' Fromm
a2e2972ff3 nixos/bird-lg: Add maintainers 2023-04-25 10:41:35 +02:00
Moritz 'e1mo' Fromm
b63e0d77b8 nixos/bird-lg: Rework command attribute generation
Prior to this change, arguments were not escaped nor was the possiblity
for arguments to be empty accounted for. This led to a kinda broken
startup script were arguments were "shifted", e.g. leaving allowedIPs
empty in order to use the default would cause `--bird` (the following
arguments key) to be used as the value. This was also observable when
e.g. the navbarBrand had a space in it where only everything until the
first space would show up.

With the new approach, all arguments are consistently escaped and empty
ones left out.

`extraConfig` now supports and prefers lists of strings instead of
lines (still supported but warned). This is due to the fragility with
respect to e.g. forgetting trailing backslashes after each line.
`frontend.{servers,domain}` are unset by default since the frontend
needs (the upstream project itself has no empty defaults here) needs
them to be set. If not set, an error is caused at build-time.

`proxy.birdSocket` has a new default: The projects README[^1] states
`/var/run/bird/bird.ctl` as the current default value. And bird2 on
NixOS does use this path too.

[^1]: https://github.com/xddxdd/bird-lg-go#proxy
2023-04-25 10:41:35 +02:00
Sandro
90e2a0670d
Merge pull request #225829 from IndeedNotJames/nixos.consul 2023-04-23 23:50:14 +02:00
Will Fancher
5c46e6f4e3 systemd-stage-1: Add assertions for unsupported options. 2023-04-21 13:05:12 -04:00
Nick Cao
515da5b664
Merge pull request #227243 from misuzu/netbird-update
netbird: 0.14.6 -> 0.16.0
2023-04-21 13:55:29 +08:00
IndeedNotJames
6ad64af778
nixos/consul: use lib.getExe where possible
which allows the use of custom packages, that may not have binaries called `consul` or `consul-alerts` in their `/bin/*` (though arguably pretty unlikely to be ever used)
2023-04-21 03:46:54 +02:00
IndeedNotJames
9c1f292155
nixos/consul: fix package reference in service $PATH 2023-04-21 03:46:54 +02:00
Artturi
b83db86a9e
Merge pull request #222080 from Stunkymonkey/nixos-optionalString 2023-04-20 16:07:30 +03:00
misuzu
d5bb5259e4 nixos/netbird: allow configuring dns 2023-04-20 14:22:19 +03:00
Ryan Lahfa
2fa5e844de
Merge pull request #223749 from Alexis211/add-wgautomesh
wgautomesh: init at 0.1.0
2023-04-19 08:26:09 +02:00
Sandro
ce4159b4cd
Merge pull request #226514 from AtaraxiaSjel/update/ivpn 2023-04-19 00:57:19 +02:00
Dmitriy Kholkin
706060e47d
nixos/ivpn: init 2023-04-18 22:11:10 +03:00
Artturin
eac28f38d6 treewide: fix lints
Arg to lib.optional is a list

build time tool in buildInputs

*Flags not a list

https://github.com/nix-community/nixpkgs-lint
2023-04-18 20:20:56 +03:00
Alex Auvolat
a727a3d676 nixos/wgautomesh: init at 0.1.0 2023-04-17 12:37:18 +02:00
Sandro
d85555f9ac
Merge pull request #224996 from SuperSandro2000/smokeping-ln-f 2023-04-16 23:05:25 +02:00
Janne Heß
ee0bfeddf7
Merge pull request #226010 from helsinki-systems/drop/deprecated-ssh-files
nixos/openssh: Drop deprecated locations
2023-04-15 11:41:16 +02:00
Eric Lesiuta
acfed64224 nixos/picosnitch: init 2023-04-14 22:09:48 -04:00
Aidan Gauland
0135b7a556 nixos/peroxide: correct option doc
Correct the description for the option services.peroxide.enable.
2023-04-14 14:47:55 +02:00
Janne Heß
98c3d190b2
nixos/openssh: Drop deprecated locations
The changelog entry should give a good indication why I don't think this
is necessary anymore.
2023-04-13 20:31:18 +02:00
Martin Weinelt
130be87c8d
Merge pull request #224549 from mweinelt/go-neb-unit-permissions
nixos/go-neb: Replace PermissionsStartOnly with executable prefix
2023-04-12 22:59:41 +02:00
Sandro Jäckel
fdbd0834b2
nixos/smokeping: use ln with -f 2023-04-12 22:47:21 +02:00
Martin Weinelt
7a5a2fa8a4
Merge pull request #225785 from helsinki-systems/warn-dhcpd-eol
nixos/dhcpd: warn of pending removal
2023-04-12 00:08:42 +02:00
ajs124
e3702c0788 nixos/dhcpd: warn of pending removal 2023-04-11 23:47:40 +02:00
Sandro
fd04c0caf0
Merge pull request #221380 from Majiir/ddclient-fix-permissions 2023-04-11 01:31:53 +02:00
Felix Buehler
327b0cff7a treewide: use more lib.optionalString 2023-04-07 13:38:33 +02:00
mrobbetts
3c1c5600e8
bind: replace hard-coded allow-query zone setting with a real zone parameter. (#224776) 2023-04-07 06:55:09 +02:00
alyaeanyx
bd573376ad nixos/wstunnel: init 2023-04-06 09:51:30 +02:00
Florian Klink
aa158ed243
Merge pull request #219496 from f2k1de/smokeping-css-js-fix
smokeping: fix css and js symlink
2023-04-05 21:56:33 +02:00
Florian Klink
ea7dd83b0d
Merge pull request #224833 from flokli/smokeping-config
nixos/smokeping: use /etc/smokeping.conf
2023-04-05 21:54:57 +02:00
Florian Klink
9de75c8bbe nixos/smokeping: use /etc/smokeping.conf
This allows other services to refer to the generated smokeping config,
which is e.g. necessary to run smokeping with nginx as frontend, rather
than thttpd.
2023-04-05 16:51:26 +02:00
Yureka
53c20eae38
Revert "bind: remove hard-coded allow-query config setting" 2023-04-04 23:35:11 +02:00
Martin Weinelt
34464d6044
nixos/go-neb: Replace PermissionsStartOnly with executable prefix
This should work as a drop-in replacement and satisfy #53852.
2023-04-04 01:01:49 +02:00
Kerstin Humm
0b0cc93e79
remove myself (erictapen) from packages which I don't use anymore 2023-04-03 17:07:16 +02:00
Sandro
ef6206c3ee
Merge pull request #224170 from mvnetbiz/ddclient 2023-04-02 01:29:59 +02:00
Izorkin
3ab26f9f00
nixos/dhcpcd: add IPv6rs option 2023-04-01 13:52:38 +03:00
Matt Votava
ee88bac7be nixos/ddclient: add iproute2 to unit path if using "if" method 2023-03-31 21:54:21 -07:00
Peter Simons
7942e2e38f
Merge pull request #221108 from mrobbetts/bind_remove_allow_query
bind: remove hard-coded `allow-query` config setting
2023-03-29 07:50:47 +02:00
Christoph Heiss
c9c9abc608 openssh: fix 'undefined variable' error
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-03-22 22:38:14 +01:00
Ryan Lahfa
5b88469c21
Merge pull request #217366 from puppe/fix-yggdrasil
nixos/yggdrasil: fix configFile option
2023-03-22 20:18:25 +01:00
K900
d0f7d224da nixos/firewall-nftables: avoid using wildcards
Those were added in kernel 5.13, which is newer than our oldest supported.
2023-03-22 17:45:05 +03:00
K900
5bf9765c0a
Merge pull request #217482 from motiejus/headscale_oidc_client_secret
headscale: natively support oidc.client_secret_path
2023-03-22 14:30:03 +03:00
Aidan Gauland
7fb4aae81f
nixos/peroxide: add module for peroxide service 2023-03-18 07:43:59 +13:00
Sandro
7ec767ff54
Merge pull request #173697 from jmbaur/avahi-daemon-deny-interfaces
nixos/avahi: add denyInterfaces option
2023-03-17 17:11:49 +01:00
Weijia Wang
32f39395a7
Merge pull request #210101 from helsinki-systems/upd/jitsi
Update of all Jitsi Meet components
2023-03-17 12:23:14 +02:00
Bernardo Meurer
6e55733359
Merge pull request #219747 from Stunkymonkey/deprecate-isNull 2023-03-16 11:10:22 -03:00
Majiir Paktu
1021a7d928 nixos/ddclient: fix permissions warning 2023-03-15 17:47:08 -04:00
Matthew Robbetts
f5b754881d bind: remove hard-coded allow-query config file entry, so it can be customized via extraConfig 2023-03-13 20:47:02 -07:00
Lassulus
47233b27c9
Merge pull request #167319 from schnusch/cgit 2023-03-13 09:51:08 +07:00
Ben Wolsieffer
b92dae961c nixos/chrony: allow @chown syscall set
The module was allowing specific chown syscalls, which is brittle because
there are several and different ones are used by glibc on different
architectures. For example, fchownat was already added to the allowlist for
aarch64, while on armv6l chrony crashes because chown32 is not in the
allowlist.

systemd provides the @chown syscall set, which includes all the chown
syscalls and avoids this brittleness. I believe the syscalls would all be
equivalent from an attacker's perspective, so there is unlikely to be any
security impact.
2023-03-12 18:10:56 -05:00
Jonas Heinrich
9f10a2e82a
Merge pull request #218633 from onny/networkd-dispatcher-rules
nixos/networkd-dispatcher: add rules option
2023-03-08 20:41:06 +01:00
K900
23b0152ffb
Merge pull request #218530 from K900/murmur-dbus
nixos/murmur: expose dbus
2023-03-08 18:35:56 +03:00
K900
d8d8b55e7d nixos/murmur: expose dbus 2023-03-08 18:03:51 +03:00
Motiejus Jakštys
2b168ba3f0 headscale: rename oidc.client_secret_file to oidc.client_secret_path
Headscale now supports passing the OIDC client secret via a file, as
added in [juanfont/headscale#1127][1127]. Lets use that.

The headscale option is `client_secret_path`; let's make it consistent
and rename the Nix option to this. Note that I wasn't able to do this:

    mkRenamedOptionModule [ ... "client_secret_file" ] [ ... "client_secret_path" ]

I get such error:

    error: evaluation aborted with the following error message: 'cannot find attribute `services.headscale.settings.oidc.client_secret_file''

[1127]: https://github.com/juanfont/headscale/pull/1127
2023-03-08 11:26:45 +02:00
Jonas Heinrich
26e14e57af nixos/networkd-dispatcher: add rules option 2023-03-08 10:20:47 +01:00
Felix Buehler
d10e69c86b treewide: deprecate isNull
https://nixos.org/manual/nix/stable/language/builtins.html#builtins-isNull
2023-03-06 22:40:04 +01:00
SEIAROTg
5a4dc2128e
nixos/wireguard: fix mtu after switching netns.
mtu is set after switching netns and thus the new netns should be used.
2023-03-04 18:51:12 +00:00
Isa
8225d6db3a smokeping: fix css and js symlink 2023-03-04 14:39:43 +01:00
K900
18f85de76d nixos/firewall: assert that the kernel supports conntrack helper auto-loading 2023-03-04 10:53:47 +03:00
Arian van Putten
17ca3dd2a6
Merge pull request #217852 from justinas/teleport-12
teleport: 11.3.4 -> 12.0.2, reintroduce teleport_11
2023-03-02 11:18:24 +01:00
Yureka
55da71c10e
nixos/nftables: add checkRuleset option (#216531)
* nixos/nftables: add checkRuleset option

* lkl: 2022-05-18 -> 2023-01-27
2023-03-02 10:28:01 +01:00
Justinas Stankevicius
31b5597cbd nixos/teleport: add "package" option 2023-02-28 13:22:50 +02:00
Jared Baur
ea0dc2c5eb
nixos/avahi: add denyInterfaces option 2023-02-27 15:41:53 -08:00
Daniel Olsen
ea31ef91af nixos/headscale: update oidc options 2023-02-27 15:17:16 +01:00
Robert Schütz
9e1d4dff3e nixos/openvpn: use writeShellScript
Previously the upScript would fail with

    Syntax error: "(" unexpected (expecting "done")

on line 7 if /bin/sh is not bash.
2023-02-26 10:12:28 -08:00
Naïm Favier
129b6f7812
Merge pull request #216504 from ncfavier/unbound-state-dir-writable
nixos/unbound: make stateDir writable
2023-02-23 14:23:53 +01:00
Robert Schütz
89c8ef30a6 nixos/imaginary: bind to localhost by default 2023-02-22 17:37:36 -08:00
Sandro
5b7d323435
Merge pull request #216909 from emilytrau/tailscale-tweaks 2023-02-21 23:21:09 +01:00
Martin Puppe
8bc615d0e0 nixos/yggdrasil: correct documentation
The option `LinkLocalTCPPort` does not exist anymore in recent versions
of Yggdrasil. The port for incoming link-local connections is now
configured as part of the `MulticastInterfaces` option. Our
documentation should reflect that.
2023-02-20 23:10:54 +01:00
Martin Puppe
cf8b1fb85e nixos/yggdrasil: support HJSON files as configFile
Yggdrasil uses HJSON as its configuration file format. The NixOS module
meanwhile only supports pure JSON. This commit adds support for HJSON
files.
2023-02-20 23:10:54 +01:00
Martin Puppe
78ac812356 nixos/yggdrasil: fix configFile option
As far as I can tell the configFile option cannot have worked as
intended. The Yggdrasil systemd service uses a dynamic user. As it was,
there was no way to set the correct permissions on a config file
beforehand which would allow the dynamic user to read the config file
without making it readable for all users. But since the config file can
contain a private key it *must not* be world-readable.

The file must only be readable by root. The file has to be copied and
the permissions have to be fixed during service startup. This can either
be done in a ExecStartPre directive with the '+' prefix (which executes
that command with elevated privileges), or it can be done more
declarative with the LoadCredential directive. I have chosen the latter
approach because it delegates more work to systemd itself. It should be
noted that this has the minor tradeoff that the config file must not be
larger than 1 MB. This is a limit which systemd imposes on credential
files. But I think 1 MB ought to be enough for anybody ;).
2023-02-20 23:04:24 +01:00
Martin Puppe
9b2e2e8006 nixos/yggdrasil: nixpkgs-fmt 2023-02-20 22:02:59 +01:00
Jonas Heinrich
553c376a49 nixos/networkd-dispatcher: init 2023-02-19 04:42:25 -05:00
Nick Cao
a1291d0d02
Merge pull request #205784 from Eliot00/v2raya-fix
v2raya: v2rayA should start after nftables
2023-02-19 15:08:29 +08:00
Emily Trau
949b1df785 nixos/tailscale: fix config priority conflict 2023-02-18 13:28:04 +11:00
pennae
047bd73c5e nixos/wireguard: make publicKeys singleLineStrs
using readFile instead of fileContents (or using indented strings) can
leave a trailing newline that causes build errors in systemd units and
has previously caused runtime errors in wireguard scripts. use
singleLineStr to strip a trailing newline if it exists, and to fail if
more than one is present.
2023-02-16 11:56:12 +01:00
Naïm Favier
5cf311c036
nixos/unbound: make stateDir writable 2023-02-15 18:14:58 +01:00
Robert Schütz
7b60fce843
Merge pull request #215222 from dotlambda/nixos-imaginary-init
nixos/imaginary: init
2023-02-12 08:42:19 -08:00
Andreas Stührk
8dade1f713 nixos/envoy: add option requireValidConfig to make config validation errors non-fatal
Co-authored-by: Vincent Haupert <vincent@yaxi.tech>
2023-02-11 18:21:21 +01:00
Vincent Haupert
84220a7098 nixos/envoy: add package option 2023-02-11 18:21:21 +01:00
Vincent Haupert
3c3da8768b nixos/envoy: further service hardening 2023-02-11 18:21:21 +01:00
Vincent Haupert
8fff553f7e nixos/envoy: sort serviceConfig entries 2023-02-11 18:21:21 +01:00
Vincent Haupert
989a1a6ef5 nixos/envoy: use lists in serviceConfig where appropriate
Using type `list` instead of `str` in `serviceConfig` entries which
accept multiple values allows easier extension of the unit
configuration.
2023-02-11 18:21:21 +01:00
Robert Schütz
efee1b5234 nixos/imaginary: init 2023-02-11 09:18:42 -08:00
Naïm Favier
86a387351a
Merge branch 'master' into nixos/hostapd 2023-02-11 14:03:56 +01:00
bb2020
76bf633dc2 nixos/minidlna: minor changes 2023-02-09 21:11:20 +03:00
pennae
bf4c0c1900 nixos/*: remove trailing period in mkEnableOptions
those are added by mkEnableOption, and .. is replaced to … by markdown
processing.
2023-02-08 15:23:34 +01:00
Will Fancher
1406dd02a9 sshd: Cyphers -> Ciphers 2023-02-07 13:54:36 -05:00
Sandro
98a5726add
Merge pull request #204390 from gbtb/openvpn_client_restart_after_suspend
Resolves https://github.com/NixOS/nixpkgs/issues/52528
2023-02-07 01:06:24 +01:00
Matthieu Coudron
ef5da70d66
services.openssh: rename several settings (#211991)
* services.openssh: rename several settings

... to match the sshd config format (makes transition smoother), namely:
services.openssh.forwardX11 -> services.openssh.settings.X11Forwarding
services.openssh.cyphers -> services.openssh.settings.Cyphers
services.openssh.macs -> services.openssh.settings.Macs
services.openssh.kexAlgorithms -> services.openssh.settings.KexAlgorithms
services.openssh.gatewayPorts -> services.openssh.settings.GatewayPorts

* release-notes: mention openssh renaming

* chore: regenerated release-notes
2023-02-07 00:11:18 +01:00
Sandro
d47709d1ef
Merge pull request #208189 from numinit/update-nebula-module 2023-02-06 23:14:58 +01:00
Robert Obryk
0a6dd02620 nixos/firefox-syncserver: enable recommendedProxySettings
The syncserver requires a Host header identical to the one provided by
the client.
2023-02-05 23:47:19 +01:00
Malte Voos
3449f83618 maintainers/malvo: update information 2023-02-05 15:05:51 +01:00
Morgan Jones
e99f342f11 nixos/nebula: harden systemd unit 2023-02-04 16:24:45 -08:00
Morgan Jones
9d649fd78c nixos/nebula: add tests for relays; clean up nebula passthru test 2023-02-04 16:24:45 -08:00
Morgan Jones
90581c977f nixos/nebula: don't run as root; support relays 2023-02-04 16:24:45 -08:00
Elliot
e78f2115bf
v2raya: v2rayA should start after nftables 2023-02-03 10:22:23 +08:00
Sebastian Sellmeier
f531b17f7d
avahi-daemon: add ConfigurationDirectory to ensure "avahi/services" exists 2023-02-01 21:43:29 +01:00
ajs124
adc59137e9 nixos/jicofo: fix after update
2943c21ff7
removed the cli parameters

migrate from legacy config while we're at it
2023-02-01 16:32:23 +01:00
Izorkin
59dbe319ce nixos/gitea: update SystemCallFilter 2023-01-31 10:08:32 -06:00
Izorkin
48ecda0962 nixos/chrony: disable PrivateDevices setting 2023-01-31 10:08:32 -06:00
Weijia Wang
5f83b5d199
Merge pull request #208801 from LeSuisse/multipath-tools-0.9.4
multipath-tools: 0.9.3 -> 0.9.4
2023-01-31 14:57:49 +01:00
Nick Cao
db77921d65
Merge pull request #205118 from SharzyL/fix-openconnect-protocol
nixos/openconnect: support alternative protocol
2023-01-31 19:53:53 +08:00
schnusch
45f06d9712 nixos/cgit: add package option 2023-01-31 12:13:56 +01:00
schnusch
218c7795a6 nixos/cgit: init 2023-01-31 12:06:12 +01:00
pennae
5b6dcece88
Merge pull request #212684 from pennae/nixos-render-docs
nixos-render-docs: init, use for some manual rendering to docbook
2023-01-30 19:26:07 +01:00
Michele Guerini Rocco
72c6c848ee
Merge pull request #212685 from rnhmjoj/pr-connman
nixos/wireless: fix failure on missing config file
2023-01-30 13:32:58 +01:00
pennae
0a6e6cf7e6 nixos/manual: render module chapters with nixos-render-docs
this converts meta.doc into an md pointer, not an xml pointer. since we
no longer need xml for manual chapters we can also remove support for
manual chapters from md-to-db.sh

since pandoc converts smart quotes to docbook quote elements and our
nixos-render-docs does not we lose this distinction in the rendered
output. that's probably not that bad, our stylesheet didn't make use of
this anyway (and pre-23.05 versions of the chapters didn't use quote
elements either).

also updates the nixpkgs manual to clarify that option docs support all
extensions (although it doesn't support headings at all, so heading
anchors don't work by extension).
2023-01-27 20:07:34 +01:00
rnhmjoj
688d658a96
nixos/wireless: fix failure on missing config file
This change prevents doing the secret substitution when the config is
missing, which would result in an error.

The service can be useful even without configuration; for example
connman controls wpa_supplicant using dbus and as such it does not need
a config file nor any other declarative options.
2023-01-26 00:31:21 +01:00
Sandro
e3d6edd75f
Merge pull request #209045 from Izorkin/update-dhcpcd-ipv6rs 2023-01-23 23:25:03 +01:00
Bernardo Meurer
271dbd928e
nixos/blocky: restart on failure 2023-01-23 11:45:56 -05:00
pennae
e067d9e33e nixos/redsocks: fix option description formatting 2023-01-22 17:50:09 +01:00
Nick Cao
c2de985844
Merge pull request #211559 from GTrunSec/nomad-credential
nixos/nomad: add LoadCredential option
2023-01-22 08:27:44 +08:00
Naïm Favier
8bf63a5ed4
Merge pull request #211992 from ncfavier/remove-stray-spaces 2023-01-21 21:51:52 +01:00
Naïm Favier
3aa1337a71
nixos: remove stray spaces 2023-01-21 21:46:53 +01:00
Naïm Favier
363158603a nixos: fix backticks in Markdown descriptions 2023-01-21 18:08:38 +01:00
guangtao
6c46078aad nixos/nomad: add LoadCredential option 2023-01-21 06:09:22 -08:00
guangtao
b5a3f795c3 nixos/nomad: fix multi-plugin-dir path 2023-01-18 22:22:43 -08:00
maifel-maifel
4dbc2fe873
nixos/syncthing: point out pitfalls with extraOptions (#210208)
Co-authored-by: digital <git-voopaipa@dinid.net>
2023-01-16 13:12:12 +01:00
Sandro
6fecd5a257
Merge pull request #204342 from anpandey/znc 2023-01-16 02:07:30 +01:00
Matthieu Coudron
293de575cb modules.openssh: provide default settings
else evaluation fails
2023-01-16 00:11:53 +01:00
Matthieu Coudron
83e2f6f3da services.openssh: fix doc 2023-01-16 00:06:40 +01:00
Ryan Lahfa
b42ea74b96
Merge pull request #206655 from vlinkz/distroname
nixos/version: add system.nixos.distroName and system.nixos.distroId options
2023-01-15 17:39:55 +01:00
Matthieu Coudron
cf10d7aef8
services.openssh: support freeform settings (#193757)
* services.openssh: support freeform settings

Keep "extraConfig" but introduces "settings".

Also renames several options

(mkRenamedOptionModule [ "services" "openssh" "kbdInteractiveAuthentication" ] [  "services" "openssh" "settings" "KbdInteractiveAuthentication" ])
(mkRenamedOptionModule [ "services" "openssh" "passwordAuthentication" ] [  "services" "openssh" "settings" "PasswordAuthentication" ])
(mkRenamedOptionModule [ "services" "openssh" "useDns" ] [  "services" "openssh" "settings" "UseDns" ])
(mkRenamedOptionModule [ "services" "openssh" "permitRootLogin" ] [  "services" "openssh" "settings" "PermitRootLogin" ])

* updated doc
* regen doc
2023-01-15 16:32:46 +01:00
Victor Fuentes
d3528cdc3d
nixos/version: add config.system.nixos.distroName and config.system.nixos.distroId 2023-01-14 16:19:06 -05:00
github-actions[bot]
49722fd14a
Merge master into staging-next 2023-01-13 18:01:34 +00:00
Izorkin
0e9cb9fcfd
nixos/dhcpcd: don't solicit or accept ipv6 router advertisements if use static addresses 2023-01-12 09:57:17 +03:00
pennae
53fc887582 nixos/manual: move "edit the MD file" comments to generated XML 2023-01-10 12:34:37 +01:00
pennae
bf92eaebe4 nixos/manual: generate module chapters with md-to-db.sh 2023-01-10 10:32:00 +01:00
pennae
dc7788efb8 nixos/manual: regenerate chapter xml files
apparently pandoc has changed behavior over the past releases, so the
files are no longer in sync. occasionally this requires edits
to the markdown source to not remove an anchor that was there
before (albeit wth a very questionable id), or where things were simply
being misrendered due to syntax errors.
2023-01-10 10:31:59 +01:00
pennae
23ea73b416 nixos/manual: enable smart quotes for all MD chapters 2023-01-10 10:31:59 +01:00
pennae
e4897cdf16 nixos/yggdrasil: convert manual chapter to MD 2023-01-10 10:31:57 +01:00
pennae
963c6f54aa nixos/prosody: convert manual chapter to MD 2023-01-10 10:31:57 +01:00
pennae
5917123885 nixos/pleroma: convert manual chapter to MD 2023-01-10 10:31:57 +01:00
pennae
0715ecf936 nixos/manual: normalize <programlisting>
makes sure that program listing tags are separated from their contents
by exactly a newline character. this makes the markdown translation
easier to verify (since no new newlines need to be inserted), and
there's no rendering difference anyway.
2023-01-10 10:31:52 +01:00
pennae
80a78f2e1e nixos/manual: remove links from program listings
markdown cannot represent those links. remove them all now instead of in
each chapter conversion to keep the diff for each chapter small and more
understandable.
2023-01-10 10:31:52 +01:00
github-actions[bot]
e4fc9a910a
Merge master into staging-next 2023-01-09 12:01:24 +00:00
Naïm Favier
bff4bb5540
Merge pull request #208762 from ncfavier/link-manpages-options-doc 2023-01-09 11:57:01 +01:00
github-actions[bot]
e3480cf1cc
Merge master into staging-next 2023-01-06 00:02:28 +00:00
Thiago Kenji Okada
1deddf959c
Merge pull request #209175 from gador/unifi-fix-monogdb-version
nixos/unifi: fix mongodb to a stable version
2023-01-05 20:39:14 +00:00
Florian Brandes
45d27d43c4 nixos/unifi: fix mongodb to a stable version
Otherwise unifi might break on a next big update
just like https://github.com/NixOS/nixpkgs/pull/207382#issuecomment-1371303817

Also this requires an update of the unifi package. With the LTS
version, newer mongodb versions aren't supported. The current supported
version of unifi 7 is mongodb 3.6 acording to
https://community.ui.com/releases/UniFi-Network-Application-7-0-20/3e4a4099-c063-42f6-8e21-5fb2c99fcea9 which isn't even supplied by nixpkgs anymore.

mongodb-4_2 isn't officially supported, but works.

Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2023-01-05 15:16:02 +01:00
github-actions[bot]
0c8280b1c4
Merge staging-next into staging 2023-01-05 06:01:39 +00:00
Aneesh Agrawal
1e94e9146f radicale: Drop self (aneeshusa) from maintainership
I have switched to using etebase/etesync.
2023-01-05 00:14:38 -05:00
pennae
9da5f12ecf modules: add mkPackageOptionMD
another transitional option factory, like mkAliasOptionModuleMD.
2023-01-05 02:33:13 +01:00
pennae
4c1cfbdb84 modules: add mkAliasOptionModuleMD
mkAliasOptionModule should not default to mdDoc descriptions because
that can break out-of-tree users of documentation infrastructure. add an
explicitly-MD variant for now, to be removed some time after the MD
transition is complete.
2023-01-05 02:33:13 +01:00
github-actions[bot]
e076f677a1
Merge staging-next into staging 2023-01-03 18:01:45 +00:00
Izorkin
b943fb24b7 chrony: update sandboxing options 2023-01-03 07:04:55 -06:00
Naïm Favier
4fb500d629
nixos/doc: fix some manpage references 2023-01-03 14:03:35 +01:00
Thomas Gerbet
ad9521e07e multipath-tools: 0.9.3 -> 0.9.4
https://github.com/opensvc/multipath-tools/compare/0.9.3...0.9.4

Fixed a bunch of issues and warnings occuring during the build.
`passthru.tests` is however still broken.
2023-01-02 21:34:35 +01:00
Jan Tojnar
5810109b42 Merge branch 'staging-next' into staging
- readline6 attribute removed from all-packages.nix in d879125d61
- readline attribute was bumped to readline82 in 50adabdd60
2023-01-02 03:04:32 +01:00
Naïm Favier
1596c87bdb
Merge pull request #195945 from ncfavier/wg-quick-nftables 2023-01-01 14:13:01 +01:00
0x4A6F
7e159b1a67 nixos/cloudflared: systemd dependency fix
- also wait for network-online.target:
  fixes startup error on reboot without functioning networking
- restart on-failure (upstream service definition)
2023-01-01 11:01:02 +01:00
Ryan Lahfa
06542b21a0
Merge pull request #205636 from LoveIsGrief/webhook-module
nixos/webhook: add support for a webhook service option
2022-12-31 22:31:38 +01:00
Joel
4c365aa9fc
nixos/cloudfared: fix options that are required having defaults
> ERR Couldn't start tunnel error="The last ingress rule must match all URLs (i.e. it should not have a hostname or path filter)"
2022-12-30 20:54:06 +10:00
Joel
1cee5ecfeb
nixos/cloudflared: fix invalid systemd unit description 2022-12-30 20:54:06 +10:00
alyaeanyx
ebe0608ada nixos/openconnect: fix null cases for user and passwordFile options 2022-12-30 10:10:54 +01:00
Maximilian Bosch
6873c69ada
Merge pull request #207774 from NetaliDev/pdns-secretfile
nixos/powerdns: add secretFile option
2022-12-29 12:28:13 +01:00
Lucas Franceschino
e8e932bc80
nixos/webhook: init 2022-12-29 01:24:46 +01:00
github-actions[bot]
351a07ba79
Merge staging-next into staging 2022-12-29 00:03:11 +00:00
Naïm Favier
e182da8622
Merge pull request #206939 from tavi-vi/tinc-restart-fix 2022-12-28 22:21:41 +01:00
Sergei Trofimovich
092d57c076 Merge remote-tracking branch 'origin/staging-next' into staging
Conflicts:
    pkgs/development/tools/language-servers/ansible-language-server/default.nix
2022-12-28 09:35:37 +00:00
Naïm Favier
dc1e00bd8b
nixos/wg-quick: use networking.firewall.package
Use `nftables` if available.
2022-12-26 10:28:03 +01:00
netali
64a957a7d1
nixos/powerdns: add secretFile option 2022-12-26 02:12:31 +01:00
Maciej Krüger
94373a589b
Merge pull request #203011 from duament/firewall-nftables 2022-12-26 00:57:24 +01:00
github-actions[bot]
583c7499e5
Merge staging-next into staging 2022-12-25 18:01:38 +00:00
Andrew Childs
4ec86b13c9
pleroma: 2.4.4 -> 2.5.0 (#207521) 2022-12-25 13:38:55 +01:00
github-actions[bot]
b48679133a
Merge staging-next into staging 2022-12-25 12:01:40 +00:00
Phosu Parsons
ff9dbe90d7 services.pixiecore: add quick option 2022-12-25 09:33:38 +01:00
Jan Tojnar
72c37eddec Merge branch 'staging-next' into staging 2022-12-25 01:30:47 +01:00
Kristoffer Dalby
571780384a
headscale: Update to 0.17.1, conform module to RFC0042
This commit upgrades headscale to the newest version, 0.17.0 and updates
the module with the current breaking config changes.

In addition, the module is rewritten to conform with RFC0042 to try to
prevent some drift between the module and the upstream.

A new maintainer, Misterio77, is added as maintainer.

Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Co-authored-by: Gabriel Fontes <hi@m7.rs>
Co-authored-by: Geoffrey Huntley <ghuntley@ghuntley.com>
2022-12-23 15:47:53 +01:00
Rvfg
a43c7b2a70
nixos/{firewall, nat}: add a nftables based implementation 2022-12-23 00:49:24 +08:00
Bobby Rong
ce96f00944
Merge pull request #205417 from kurnevsky/tox-node-0.2.0
tox-node: 0.1.1 -> 0.2.0
2022-12-22 23:30:51 +08:00
Evgeny Kurnevsky
d7b2de44c3
tox-node: 0.1.1 -> 0.2.0 2022-12-22 00:38:16 +03:00
Sandro
5b450caa5e
Merge pull request #202245 from tylerjl/rpcbind-tmpfiles-dependency 2022-12-21 20:35:50 +01:00
pennae
4cdcad6b26 nixos/firefox-syncserver: remove unnecessary service option
Stderr does not exist as a systemd option (StandardError would've been
correct), but since "journal" is the default by association this mistake
never had any effect. just remove the key entirely.
2022-12-21 10:29:25 +01:00
pennae
13d725908c syncstorage-rs: 0.12.5 -> 0.13.1
this includes a module update because the package update breaks the
module. would rather not break system bisection if possible.
2022-12-21 10:29:25 +01:00
Tavi
705392e011 nixos/services.tinc: Fix whitespace
Fix indentation for previous commit
2022-12-19 21:19:02 -05:00
Tavi
ca591e7008 nixos/services.tinc: Add all generated /etc/ files to reloadTriggers
Bug fix for issue #66431. Adds all files created as a result of
hostSettings configuration to the created service's reloadTriggers,
or to restartTriggers if the version of tinc isn't 1.1pre or later.
2022-12-19 20:35:00 -05:00
github-actions[bot]
dc7ebb0163
Merge staging-next into staging 2022-12-18 18:01:41 +00:00
figsoda
6bb0dbf91f nixos: fix typos 2022-12-17 19:31:14 -05:00
github-actions[bot]
7984a7dacb
Merge staging-next into staging 2022-12-18 00:05:50 +00:00
github-actions[bot]
887e342eaa
Merge staging-next into staging 2022-12-17 18:01:35 +00:00
Julien Moutinho
15046139d5 nixos/mmsd: init 2022-12-17 17:36:43 +01:00
Michael Hoang
68e514ed1c nixos/tailscale: Add useRoutingFeatures option 2022-12-17 22:38:14 +11:00
github-actions[bot]
f61e6f8d8e
Merge staging-next into staging 2022-12-16 18:02:14 +00:00
Frank Moda
e27e857def nixos/cloudflared: guard config with enable flag 2022-12-16 11:30:44 -05:00