Commit Graph

4258 Commits

Author SHA1 Message Date
Felix Buehler
15edaa6e16 nixos/networking.firewall.iptables: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler
f12d3df878 nixos/services.fireqos: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler
17f8650ace nixos/services.ferm: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler
abc0a6e035 nixos/services.expressvpn: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler
19e88959ef nixos/services.eternal-terminal: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler
6233a59db3 nixos/services.epmd: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler
a09250d8ab nixos/services.envoy: remove with lib; 2024-09-15 10:43:54 +02:00
Felix Buehler
aa2c039ab0 nixos/services.ejabberd: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler
e59cdc8e99 nixos/services.doh-proxy-rust: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler
504abe12d1 nixos/services.dnsmasq: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler
3a05a07ef7 nixos/services.dnsdist: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler
56576f90e3 nixos/services.dnscache: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler
630754ae20 nixos/networking.dhcpcd: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler
8681b42c62 nixos/services.ddclient: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler
657cd334e6 nixos/services.dante: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler
4589149299 nixos/services.create_ap: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler
7fcd972c94 nixos/services.coturn: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler
bd2d5c89ce nixos/services.corerad: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler
c4bbbbbb10 nixos/services.coredns: remove with lib; 2024-09-15 10:43:53 +02:00
Felix Buehler
6c6b5e7f80 nixos/services.consul: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler
5438332690 nixos/services.cntlm: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler
5506afac27 nixos/services.cloudflared: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler
14f2d0a94b nixos/services.cloudflare-dyndns: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler
a3c69c111e nixos/services.clatd: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler
742185f18c nixos/services.cjdns: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler
f6077c6bcd nixos/services.chisel-server: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler
87c989da08 nixos/services.cgit: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler
8e6795a029 nixos/services.blocky: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler
939ba8a2c3 nixos/services.blockbook-frontend: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler
d9c47dac16 nixos/services.bitlbee: remove with lib; 2024-09-15 10:43:52 +02:00
Felix Buehler
416649cbe6 nixos/services.birdwatcher: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler
c666e7b2dd nixos/services.bird-lg: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler
9ce866bc9b nixos/services.bind: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler
42facf73b7 nixos/services.biboumi: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler
6bf37cd201 nixos/services.bee: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler
7da36d70ff nixos/services.babeld: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler
eb8d4ed264 nixos/services.avahi: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler
d861803952 nixos/services.autossh: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler
06032d6956 nixos/services.atftpd: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler
681161adb6 nixos/services.asterisk: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler
d63146859b nixos/services.amule: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler
46dc82d477 nixos/services.alice-lg: remove with lib; 2024-09-15 10:43:51 +02:00
Felix Buehler
b1bbe81c8d nixos/services.adguardhome: remove with lib; 2024-09-15 10:43:50 +02:00
Felix Buehler
02bb53fbc3 nixos/services._3proxy: remove with lib; 2024-09-15 10:43:50 +02:00
figboy9
ca5cb00a4c nixos/veilid: format with nixfmt-rfc-style 2024-09-15 10:37:36 +09:00
figboy9
a01561ab26 nixos/veilid: add a description of options 2024-09-15 10:35:52 +09:00
rnhmjoj
016f6f9f58
dnscrypt-wrapper: remove package and NixOS modules 2024-09-14 17:22:48 +02:00
figboy9
16002b1628 fix systemd service based on veilid package 2024-09-14 18:25:26 +09:00
figboy9
55a594468a change dataDir 2024-09-14 18:20:01 +09:00
figboy9
0ea2046bc5 make opening the firewall optional 2024-09-14 18:15:14 +09:00
figboy9
318014034a reduce options 2024-09-14 18:03:02 +09:00
Michael Hoang
d25d241e38
Update nixos/modules/services/networking/tailscale.nix
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-09-12 23:06:23 +10:00
Aaron Andersen
768f41fcf0
Revert "nixos/openvpn: add extraArgs option" (#341223) 2024-09-12 06:34:16 -04:00
Michele Guerini Rocco
b94f259714
nixos/wireless: reimplement secrets using ext_password_backend (#180872) 2024-09-11 19:58:36 +02:00
Aaron Andersen
45dd09667f
Revert "nixos/openvpn: add extraArgs option" 2024-09-11 12:59:03 -04:00
ghpzin
5ab2ff7a7a
nixos/quorum: update geth flags
- upstream commit changing ws args:
c989bca173
- upstream commit changing minerthreads arg:
f0998415ba
2024-09-11 13:25:32 +03:00
John Titor
1c7e6a2de9
nixos/shairport-sync: Add pulse group also for pipewire
Works according to https://github.com/mikebrady/shairport-sync/issues/1171

From 0e4664b497
2024-09-11 15:21:14 +05:30
Aaron Andersen
7398438255
nixos/openvpn: add extraArgs option (#339016) 2024-09-10 19:36:32 -04:00
h7x4
c2090cb303
wstunnel: the ping frequency can now also be configured for the server (#339232) 2024-09-10 10:27:42 +02:00
r-vdp
342b5a8b85
sshd: fix shellcheck warnings in prestart script 2024-09-08 12:24:00 +02:00
Naïm Favier
6840ba251c
nixos/networkmanager: set up /etc/ipsec.secrets as required by the L2TP plugin
The networkmanager-l2tp plugin expects /etc/ipsec.secrets to include /etc/ipsec.d/ipsec.nm-l2tp.secrets;
see https://github.com/NixOS/nixpkgs/issues/64965

In order for this to continue working if the strongswan module is
enabled, we use `"ipsec.secrets".text` instead of `.source` so that the
configurations of both modules are concatenated.
2024-09-07 17:28:25 +02:00
Gabriel Fontes
13f6e6da35
nixos/matterbridge: add services.matterbridge.package option 2024-09-06 17:07:41 -03:00
Sachi King
361fde84f9 Revert "nixos/firewall: fix reverse path check failures with IPsec"
The inclusion of the "meta ipsec" rule in the default reverse path
filtering breaks systems not built with specific XFRM kernel config
options.  Specifically CONFIG_XFRM must be set, which gets selected
by CONFIG_NFT_XFRM, which is hidden behind CONFIG_XFRM_USER.

These options are not selected by default in most defconfig's provided
by the kernel with the exception of some device-specific defconfigs.

These options are not set by the nix kernel common_config, and I would
argue that IPSec support does not belong in a minimal kernel as that
elevates its support status above other in-kernel VPN interfaces.

The contributor of this feature does not seem interested in working
towards a solution that does not break systems running kernels built
with "autoModules = false" while supporting this feature, and as this
silently breaks firewalls into an insecure state and poses an immediate
security issue I propose this be reverted until a solution that does not
break such systems is proposed.
https://github.com/NixOS/nixpkgs/pull/310857#discussion_r1742834970

Devices used as firewalls, if they do not have the required kernel
config, will fail to load the new firewall rules and will upon boot pass
traffic without any filtering into the internal network.

Devices exposed directly to the internet, after reboot, will boot
without filtering potentially exposing services not intended to be
exposed to the internet, such as databases.

The following platforms in nixpkgs appear to be impacted:
 - pc_simplekernel
 - pogoplug4
 - sheevaplug
 - zero-gravitas
 - zero-sugar
 - utilite
 - guruplug
 - beaglebone
 - fuloong2f_n32

References to hardware without autoModules can be found in
nixos-hardware, as well as in active third-party repos on github.

I suspect there are other users impacted that do not have their configurations
public, as autoModules = true leads to long compile times when targeting
kernels to less standard hardware or hardware with quirks that require
patches that cannot be upstreamed.

This reverts commit 3c12ef3f21.
2024-09-04 11:51:15 +10:00
r-vdp
20291241fd
wstunnel: the ping frequency can now also be configured for the server
See: https://github.com/erebe/wstunnel/pull/338
2024-09-03 10:38:43 +02:00
Pol Dellaiera
930e12b9e8
nixos/services.openssh: remove with lib; (#339092) 2024-09-03 10:18:32 +02:00
Assistant
8119ec6478 nixos/syncplay: add missing options
Exposes all currently available command-line arguments that were
missing, including some that were impossible to use with the catch-all
option `extraArgs` alone, requiring changes to other parts of the
system.
Those are now all self-contained in the module.
The service now uses systemd's `DynamicUsers`.
2024-09-02 22:26:11 -04:00
Felix Buehler
5f8696e39c nixos/services.openssh: remove with lib; 2024-09-02 22:31:36 +02:00
Aaron Andersen
5e8cc27962 nixos/openvpn: add extraArgs option 2024-09-02 09:49:02 -04:00
ilmari-lauhakangas
930f82eaf3
nixos/soju: use message-store instead of deprecated log in config
From message-store section in https://soju.im/doc/soju.1.html :
"(log is a deprecated alias for this directive.)"
2024-08-31 19:05:42 +03:00
Felix Buehler
97070a2ea6 nixos/services.libreswan: remove with lib; 2024-08-30 23:01:18 +02:00
Felix Buehler
92f17f012d nixos/services.kresd: remove with lib; 2024-08-30 23:01:16 +02:00
Felix Buehler
5960372742 nixos/services.kea: remove with lib; 2024-08-30 23:00:56 +02:00
Felix Buehler
717fa0dea5 nixos/services.dnscrypt-wrapper: remove with lib; 2024-08-30 23:00:56 +02:00
Michael Hoang
185948bd01 tailscale: only autoconnect after backend is up
Previously, if this service started before the backend is up,
`StatusText` would be empty leading to the service trying to run
`tailscale up` even if this device is already logged in.
2024-08-30 01:27:40 +10:00
Philip Taron
f26f92db9a
nixos/services.mosquitto: remove with lib; (#338022) 2024-08-28 15:05:19 -07:00
Felix Buehler
481df957a6 nixos/services.mosquitto: remove with lib; 2024-08-28 22:53:06 +02:00
Florian Klink
c8912137a3
wstunnel: 9.7.4 -> 10.0.1 (#335185) 2024-08-28 10:56:59 +02:00
Herwig Hochleitner
98ce61be57
nixos/smokeping: do homedir management with systemd.tmpfiles (#332050)
- ensures that everything in /var/lib/smokeping belongs to the service
- add nginx user to smokeping group, instead of allowing world to cd
  into somkeping homedir
2024-08-27 14:37:34 +02:00
Emily
1162c1ed62
{tvheadend,antennas}: drop (#336395) 2024-08-27 02:47:56 +01:00
Maciej Krüger
00f536f650
Merge pull request #310857 from rnhmjoj/pr-firewall
nixos/firewall: fix reverse path check failures with IPsec
2024-08-25 15:06:49 +02:00
rnhmjoj
89eb93dc3f
nixos/wireless: link config to /etc by default
This links the generated configuration to /etc/wpa_supplicant.conf
unless `allowAuxiliaryImperativeNetworks`. In the latter case the
file in /etc should be writable and the generated one remains only
in the Nix store.
2024-08-22 21:46:05 +02:00
Emily
a565cfeac3 antennas: drop 2024-08-22 15:51:27 +01:00
Emily
6fa5767e07 tvheadend: drop
Closes: #332259
2024-08-22 15:51:27 +01:00
r-vdp
6cac9e409c
wstunnel: reformat with nixfmt 2024-08-21 10:46:04 +02:00
Jörg Thalheim
c43e67f69b
Merge pull request #335344 from Mic92/harmonia
nixos/harmonia: switch to non-deprecated SIGN_KEY_PATHS
2024-08-21 07:01:22 +02:00
Emily
25bdc22ac8
Merge pull request #334495 from Sigmanificient/liboop
{liboop,lsh}: drop
2024-08-20 19:02:29 +01:00
Sigmanificient
e959525e15 lsh: drop 2024-08-20 12:02:12 +02:00
euxane
1768115589 nixos/cgit: handle list setting type
The cgitrc file allows list of values to be set for some keys as
multiple definition lines.

This allows setting multiple "css" files to include or multiple
"readme" branch and file lookup paths to be set.
2024-08-19 08:13:49 +02:00
rnhmjoj
f235dda87f
nixos/wireless: reimplement secrets using ext_password_backend
This replaces the current implementation (splicing the secrets into the
configuration file using environment variables) with the new built-in
mechanism ext_password_backend.

With some minor syntax changes, it works exactly as before, except the
heavy lifting is done by wpa_supplicant and probably less error-prone.
2024-08-18 08:46:00 +02:00
Jörg Thalheim
aa994dd296 harmonia: switch to non-deprecated SIGN_KEY_PATHS 2024-08-17 13:11:06 +02:00
Morgan Jones
99714ac2fc
nixos/nebula: add missing with maintainers 2024-08-16 12:13:40 -07:00
Franz Pletz
4bd91be1ad
Merge pull request #333462 from Luflosi/nixos-iperf3-package-option 2024-08-16 14:46:53 +02:00
Jörg Thalheim
d9e8fc4b72
Merge pull request #323785 from Mic92/zerotier
nixos/zerotierone: clean up local.conf symlinks unconditionally
2024-08-16 09:35:35 +02:00
a-kenji
0f13d8a4ba nixos/unbound: fix typos in description and comment 2024-08-14 23:53:58 +02:00
Adam C. Stephens
0536436018
Merge pull request #316466 from uninsane/rebrand-trust-dns
hickory-dns: rename from trust-dns
2024-08-11 07:35:03 -04:00
Colin
f9df9508f4 hickory-dns: rename from trust-dns 2024-08-11 07:59:32 +00:00
Rob Sears
bdcd19eff5
package reference was removed in 03d57d7 (#333504) 2024-08-09 21:42:42 +02:00
Sandro
03d57d7420
Merge pull request #332806 from isabelroses/fix/wpa_supplicant 2024-08-09 18:19:56 +02:00
Luflosi
d80d811a6f
nixos/iperf3: add package option 2024-08-09 16:01:01 +02:00
Bjørn Forsman
4265f4354c nixos/mosquitto: fix "listeners" option default
The option type is listOf, so the default should be an empty list, not
empty attrset.
2024-08-08 23:59:36 +02:00
isabel
78a5508605
nixos/wpa_supplicant: don't use removed wpa_supplicant_ro_ssids 2024-08-06 20:33:23 +01:00
Sandro
8b43ee5545
Merge pull request #330522 from xokdvium/dev/init-rathole
nixos/rathole: init module
2024-08-05 18:07:25 +02:00
Lin Jian
48966eacad
Merge pull request #328365 from Guanran928/cloudflare-dyndns
nixos/cloudflare-dyndns: introduce package option
2024-08-03 15:10:25 +08:00
Lin Jian
7b9ef31afd
Merge pull request #331800 from Guanran928/treewide/remove-periods-from-lib-mkenableoption
treewide: remove periods from lib.mkEnableOption
2024-08-03 12:53:41 +08:00
Felix Uhl
57d30c7a61
nixos/wg-quick: add generatePrivateKeyFile option (#331253)
This option is already present in the wireguard module, but missing from
the wg-quick module. This is very annoying, because it means you can't
easily get a safe and valid configuration on first boot when using
wg-quick.

This change adds the same option with the same description text and the
same script, but instead of generating an entire systemd unit dedicated
to creating the key file, it adds the script as a PreUp script, which
is a much simpler solution.

I've tested this in my own configuration, and it does indeed work.
wg-quick allows multiple PreUp scripts, which are run in order, and
all PreUp scripts are run before the private key is read from disk,
see `man wg-quick`.
2024-08-03 00:07:27 +04:00
Guanran Wang
ea6f4d5e86
treewide: remove periods from lib.mkEnableOption
Co-authored-by: éclairevoyant <848000+eclairevoyant@users.noreply.github.com>
2024-08-02 23:55:32 +08:00
tomberek
3758fa1f50
Merge pull request #299339 from teto/teto/wireguard-compact-unit
networking.wireguard: generate leaner units
2024-08-02 03:18:16 -04:00
tomberek
7d29722746
Merge pull request #322035 from jpds/nixos-nats-validate-config
nixos/nats: Implemented configuration verification
2024-08-02 02:37:48 -04:00
Bjørn Forsman
849492e6e2 nixos/deconz: mention RaspBee hardware 2024-08-01 16:48:38 +02:00
Bjørn Forsman
aeaf887dcb nixos/deconz: update URL to hardware products
There are multiple products/versions, so replace the "version 2" URL
with a landing page for all products.
2024-08-01 16:48:38 +02:00
Michele Guerini Rocco
de8d752e98
Merge pull request #319188 from buckley310/2024-06-11-wpa-supplicant
nixos/wireless: fix quotes in config path
2024-08-01 09:32:05 +02:00
euxane
4f2da6c9c1 nixos/fcgiwrap: add option migration instruction errors
This adds migration instructions for the removed global shared instance
configuration of fcgiwrap.

Adding those explicit messages to the previous options requires moving
the newly defined options from `services.fcgiwrap.*` to
`services.fcgiwrap.instances.*` due to an option namespace clash.

`mkRenamedOptionModule` was not used because the previous options do
not directly map to the new ones. In particular, `user` and `group`
were described as setting the socket's permission, but were actually
setting the process' running user.

Co-authored-by: Minijackson <minijackson@riseup.net>
2024-07-31 11:02:37 +02:00
zimbatm
5a353f15cc nixos/nar-serve: add domain option 2024-07-31 09:57:37 +02:00
zimbatm
ed47bba9ad nixos/nar-serve: add package option 2024-07-31 09:57:36 +02:00
K900
7f2ec487cc nixos/i2pd: actually fix, clean up a little bit 2024-07-30 11:07:37 +03:00
K900
268299ad04 nixos/i2pd: fix warning 2024-07-29 23:36:08 +03:00
Jörg Thalheim
5356420466 treewide: remove unused with statements from maintainer lists
$ find -type f -name '*.nix' -print0 | xargs -P "$(nproc)" -0 sed -i \
  -e 's!with lib.maintainers; \[ *\];![ ];!' \
  -e 's!with maintainers; \[ *\];![ ];!'
2024-07-29 10:06:20 +08:00
figboy9
67b152a087 Add figboy9 to module maintainers 2024-07-28 14:42:12 +09:00
figboy9
69c6e3352d nixos/veilid: Add veilid service module 2024-07-28 14:03:49 +09:00
Sergei Zimmerman
e3e6e94010
nixos/rathole: init module
Adds a module for rathole package. The package itself
and this module is very similar to frp, so the options
and tests are not very far off from those for frp.
2024-07-28 01:25:01 +03:00
Florian Klink
21e3a4214f nixos/wvdial: init module 2024-07-27 19:11:02 +03:00
Aleksana
577a9c43f3
Merge pull request #330042 from Sigmanificient/remove-leading-space-description
treewide: remove trailing space in description
2024-07-26 23:48:02 +08:00
Dennis Stengele
6f3ba8d714
nixos/zeronsd: init module and package (#253610)
* zeronsd: init at 0.5.2

* nixos/zeronsd: init at 0.5.2

This is the module for the new zeronsd package.
2024-07-26 15:20:56 +02:00
Sigmanificient
543cd40ecc treewide: remove trailing space in description
Done using `grep -rP 'description\s+=\s+"[^"]+[ ]";' | cut -d ':' -f 1 |
xargs -i nvim {}` and sorting the opened files by hand, avoiding
generated packages list
2024-07-26 03:38:50 +02:00
Masum Reza
81cb83b07f
Merge pull request #290008 from eum3l/add-opengfw
opengfw: init at 0.4.0 (+NixOS module)
2024-07-24 20:39:41 +05:30
eum3l
86ae0fca93 nixos/opengfw: init 2024-07-24 15:11:23 +02:00
Silvan Mosberger
473e469d5a
Merge pull request #328381 from tie/map-attrs-flatten 2024-07-24 13:32:34 +02:00
Franz Pletz
b12aaa9f9b
Merge pull request #316139 from Luflosi/bind-service-wait-for-ready-status 2024-07-23 00:19:53 +02:00
Jörg Thalheim
f09ab69a7e nixos/zerotierone: clean up local.conf symlinks unconditionally 2024-07-20 16:39:56 +02:00
Ivan Trubach
7919709a23 nixos/modules: use mapAttrsToList instead of mapAttrsFlatten 2024-07-19 11:39:39 +03:00
Guanran Wang
782e8513d3
nixos/cloudflare-dyndns: introduce package option 2024-07-19 14:45:09 +08:00
Matthew Croughan
be9599e3d4
nixos/scion: introduce package option (#327765) 2024-07-19 02:30:10 +02:00
Darragh Elliott
61820de2d4 ddns-updater: Add module, test, update script 2024-07-17 21:56:05 +00:00
Shiva Kaul
04967c307f nixos/spiped: remove broken chmod's from preStart
Remove `chmod`s which were (1) broken and (2) no longer considered good Nix practice.
2024-07-14 22:04:53 +10:00
Martin Weinelt
e62de266ad
Merge pull request #326149 from mguentner/remove_mxisd_ma1sd
nixos/mxisd: remove module
2024-07-12 13:15:11 +02:00
Maximilian Güntner
23e62062bc
nixos/mxisd: remove module
mxisd and ma1sd are both unmaintained
2024-07-12 11:44:59 +02:00
Masum Reza
ae20d8d61a
Merge pull request #325951 from mjoerg/magic-wormhole-python-3.12
magic-wormhole: make usable with Python 3.12
2024-07-11 15:32:13 +05:30
Sandro
24cefb01b3
Merge pull request #284419 from ocfox/realm 2024-07-11 10:46:47 +02:00
Trey Fortmuller
7b32ea9abb
nixos/cloudflare-warp: init
Co-authored-by: John Titor <50095635+JohnRTitor@users.noreply.github.com>
removed `with lib;` at the top level
cleanup
2024-07-10 22:48:57 +05:30
ocfox
86ce0733d2
nixos/realm: init
Co-authored-by: Nick Cao <nickcao@nichi.co>
Co-authored-by: oluceps <i@oluceps.uk>
2024-07-10 16:43:17 +02:00
Martin Joerg
a85c314882 nixos/magic-wormhole-mailbox-server: use Python 3.11, adopt
magic-wormhole-mailbox-server is not yet supported with Python 3.12.
https://github.com/magic-wormhole/magic-wormhole-mailbox-server/issues/41
2024-07-09 22:22:56 +00:00
Martin Joerg
12de9a7469 nixos/magic-wormhole-mailbox-server: nixfmt 2024-07-09 22:22:56 +00:00
Franz Pletz
f1d54d49b9
Merge pull request #325459 from numinit/nebula-module-tweaks
nixos/nebula: support non-path host keys
2024-07-09 16:59:35 +02:00
Franz Pletz
31c99a61da
Merge pull request #325286 from bjornfor/nixos-deconz-fix-service-stop
nixos/deconz: treat SIGTERM exit status as success
2024-07-09 15:07:36 +02:00
matthewcroughan
c53e5201f4 nixos/scion: make storing path database optional
Storing the SCION path sqlite databases persistently on disk is a valid
setup that improves performance, but may have outstanding bugs that need
to be investigated, so this makes persisent storage optional, off by
default.
2024-07-08 13:26:30 +02:00
Morgan Jones
de5e0cf11b
nixos/nebula: add numinit as maintainer
I maintain the package and coauthored this module, so should be on it.
:-)
2024-07-08 01:06:58 -07:00
Morgan Jones
95f1ebd2aa
nixos/nebula: loosen ProtectSystem
"strict" may be too strict for some PKCS#11 providers.
2024-07-08 01:04:15 -07:00
Morgan Jones
b81827b992
nixos/nebula: allow string or path for keys
Nebula will be getting PKCS#11 support soon, and this will allow
keys to be specified as PKCS#11 URIs instead of paths.
2024-07-08 01:03:40 -07:00
Felix Buehler
72a4f148f9 nixos/bee: prefer 'install' over 'chmod' 2024-07-07 17:47:28 +02:00
Bjørn Forsman
5aab6344c2 nixos/deconz: treat SIGTERM exit status as success
deconz doesn't handle SIGTERM and terminates with code 143 (128 + 15
(SIGTERM) instead of 0. This results in systemd marking the service as
failed when a user stops it (with `systemctl stop deconz`). Fix it by
treating code 143 as success.
2024-07-07 16:11:11 +02:00
Aaron Andersen
6fa3ecdc73
Merge pull request #324464 from hraban/cloudflare-dyndns-frequency
cloudflare-dyndns: configurable systemd frequency
2024-07-04 21:02:43 -04:00
Masum Reza
9ec0508f83
Merge pull request #171855 from ju1m/prosody
nixos/prosody: support mod_http_file_share
2024-07-04 21:59:29 +05:30
Hraban Luyat
406351b470 cloudflare-dyndns: configurable systemd frequency 2024-07-03 22:50:45 -04:00
Tomas Kala
6930dd3dee nixos/blocky: Add an option for the package to be used
Previously, the blocky package was hardcoded to the one in pkgs. This
change allows to set it, so the user can configure the blocky service to
run blocky from nixpkgs-unstable, for example.
2024-07-03 13:42:34 +02:00
Thomas Gerbet
8ddb1bb721
Merge pull request #318599 from pacien/nixos-fcgiwrap-isolation
nixos/fcgiwrap: refactor to fix permissions
2024-07-02 21:52:33 +02:00
Sandro
15705830ce
Merge pull request #321061 from SomeoneSerge/prosody-logs
nixos/prosody: provide an (internal) escape hatch for overriding the …
2024-07-02 20:36:07 +02:00
Sandro
230c213fae
Merge pull request #314767 from Guanran928/mihomo
nixos/mihomo: add assertion for configFile
2024-07-02 20:27:36 +02:00
Cat
ed1b6699c0
nixos/syncthing: implement folder type (#308832)
* Syncthing: implemented folder type

* Syncthing: fix syntax (via @johnhamelink )

This commit should be rebased/squashed into the previous one if ofborg cleares it!

Co-authored-by: John Hamelink <me@johnhame.link>

---------

Co-authored-by: John Hamelink <me@johnhame.link>
2024-07-02 19:49:03 +08:00
Janik H.
76cd1d2211 maintainers: drop janik
I guess my time has come as well...

With this commit, I'm not just dropping my maintainer entry, but I'm also
resigning from my duties as a board observer and NixCon project lead.
I also terminated my Summer of Nix contract today.
I'll also stop hosting the local NixOS meetup.

The only "project" I'll finish under the NixOS Foundation umbrella is
Google Summer of Code because the mentees aren't even remotely
responsible for why I'm leaving, and it would be unfair to leave them
hanging.

I'm grateful for all the things I was able to learn, for all the experiences
I could gather, and for all the friends I made along the way.
NixOS is what makes computers bearable for me, so I'll go and work on
some fork (*something something* you always meet twice in life).
2024-07-02 02:36:42 +02:00
Jasper Woudenberg
71e88077ca maintainers: remove jwoudenberg 2024-07-02 01:35:17 +02:00
Marcus Ramberg
a449a2a14a
Merge pull request #321079 from res0Nanz/master
nixos/cloudflared: fix links in doc
2024-07-01 23:39:57 +02:00
pennae
5c5aaaaaae maintainers: remove pennae
https://discourse.nixos.org/t/nca-jonringer-joint-announcement/48231
https://web.archive.org/web/20240701165505/https://discourse.nixos.org/t/nca-jonringer-joint-announcement/48231

we had little faith in the NCA process, but this is going deep, *deep*
into the territory of wilfully insulting all those had placed even a
modicum of trust in that process.

have you fucking nazi bar.
2024-07-01 18:56:40 +02:00
Someone Serge
12c6d79e72 nixos/prosody: provide an escape hatch for overriding the logging configuration 2024-07-01 01:24:19 +00:00
tomberek
079457313a
Merge pull request #321930 from jtbx-prs/oink-after-network
nixos/oink: wait for network.target
2024-06-29 20:42:03 -04:00
Eman Lear
6c00b71662
Merge branch 'master' into master 2024-06-30 02:19:21 +08:00
Matthew Croughan
d76ad79b4d
nixos/scion: use RuntimeDirectory instead of StateDirectory (#323200)
It was wrong to use StateDirectory to keep the scion-control and
scion-router runtime databases on disk for the next run. I observed that
doing this means a reboot, or power outage can corrupt the temporary
runtime databases for the next service start, leading scion ping and
other functionality to stop working permanently, since those files are
not managed in an atomic manner by the golang code.
2024-06-28 22:16:36 +02:00
Silvan Mosberger
c8dec6df38
Merge pull request #322801 from eclairevoyant/discourage-mkpackageoptionmd
lib: deprecate mkPackageOptionMD
2024-06-27 20:15:08 +02:00
matthewcroughan
23c24527dc nixos/scion: add scion package when scion.enable = true 2024-06-27 11:52:04 +02:00
matthewcroughan
973108d3ed nixos/scion: use recursiveUpdate instead of // 2024-06-27 11:51:28 +02:00
éclairevoyant
aeee4fc133
treewide: replace mkPackageOptionMD with mkPackageOption 2024-06-26 23:05:42 -04:00
Sandro
33f83c6252
Merge pull request #316977 from eclairevoyant/fix-mkEnableOption
treewide: fix mkEnableOption usage
2024-06-25 22:42:16 +02:00
Sandro
1813936aff
Merge pull request #272895 from xanderio/wg-access-server-0.10.1
wg-access-server: init at 0.12.1
2024-06-25 21:21:19 +02:00
Alexander Sieg
369cfec06d
nixos/wg-access-server: init module 2024-06-25 10:59:30 +02:00
Jonathan Davies
5ea0207b73
nixos/nats: Implemented configuration verification 2024-06-23 21:56:59 +01:00
Ryze
10962c7ca2
nixos/zerotierone: fix default value for localConf 2024-06-23 18:10:59 +03:00
Jeremy Baxter
923a86602e nixos/oink: wait for network.target 2024-06-23 21:34:40 +12:00
Gooxey
d3140c11a5 nixos/antennas: removed WorkingDirectory setting
Antennas could not start because the specifed directory did not exist
2024-06-23 09:23:42 +02:00
euxane
3d10deb7a5 nixos/cgit: fix GIT_PROJECT_ROOT ownership
The GIT_PROJECT_ROOT directory is now created at runtime instead of
being assembled at build time.

This fixes ownership issues which prevented those repositories to be
read by users other than root. This also avoids creating symlinks in
the nix store pointing to the outside.
2024-06-22 19:45:25 +02:00
euxane
2d8626bf0a nixos/cgit: configurable user instead of root
This allows running cgit instances using dedicated users instead of
root. This is now set to "cgit" by default.
2024-06-22 19:45:25 +02:00
euxane
c5dc3e2034 nixos/fcgiwrap: adapt consumer modules and tests 2024-06-22 19:45:25 +02:00
euxane
8101ae41f8 nixos/fcgiwrap: adapt consumer modules and tests 2024-06-22 19:45:25 +02:00
euxane
bf2ad6f48c nixos/fcgiwrap: adapt consumer modules and tests
This also fixes the gitolite-fcgiwrap test by running git through
fcgiwrap as the proper user.
2024-06-22 19:45:25 +02:00
Jörg Thalheim
9f180c5438
Merge pull request #280517 from Mic92/zerotierone
nixos/zerotierone: make localConf mergeable
2024-06-21 15:32:05 +02:00
Jörg Thalheim
09ead1f6eb nixos/zerotierone: make localConf mergeable 2024-06-21 15:17:45 +02:00
Tom Hubrecht
938372e46e nixos/netbird: Remove thubrecht as maintainer 2024-06-21 09:32:46 +02:00
res0Nanz
16d8c11a33 nixos/networkd-dispatcher: fix links in doc
Ill-formatted markdown links fixed.
2024-06-20 00:52:12 +08:00
res0Nanz
ae96067a6d nixos/cloudflared: fix links in doc
Ill-formatted markdown links fixed.
2024-06-20 00:49:01 +08:00
h7x4
4c7c3ceb12
nixosTests.wstunnel: init
Co-authored-by: r-vdp <ramses@well-founded.dev>
2024-06-18 11:07:06 +03:00
r-vdp
53e7bea45c
nixos/wstunnel: update the wstunnel module to work with the new rust implementation
Co-authored-by: h7x4 <h7x4@nani.wtf>
2024-06-18 11:07:06 +03:00
Tim Häring
7a7060c5bf
nixos/aria2: fix missing default 2024-06-15 12:55:06 +02:00
Tim Häring
f6d3113164
nixos/aria2: fix remove not needed code 2024-06-15 12:51:29 +02:00
éclairevoyant
7d8742da87
treewide: fix mkEnableOption usage 2024-06-14 02:41:42 -04:00
Nick Cao
06b68ac5a3
Merge pull request #317840 from NeverBehave/pkg-ws-tunnel-rust
wstunnel: 0.5.1.0 -> 9.6.1
2024-06-13 13:31:08 -04:00
NeverBehave
3fb0e045a5 nixos/wstunnel: adopt rust new cli flags 2024-06-13 00:58:02 +00:00
Pol Dellaiera
7d270d53b9
Merge pull request #303429 from timhae/aria2-module
Aria2 module settings
2024-06-12 19:23:44 +02:00
Sean Buckley
36175fb9ad nixos/wireless: fix quotes in config path 2024-06-11 20:45:04 -04:00
Sandro
da3214b120
Merge pull request #309551 from aca/master 2024-06-10 15:48:32 +02:00
Weijia Wang
9520d06979
Merge pull request #266450 from CRTified/adguardhome-fix-246461
nixos/adguardhome: run --check-config before merging
2024-06-10 12:46:26 +02:00
Guanran928
e27092e106
metacubexd: init at 1.140.0 (#297721)
* metacubexd: init at 1.140.0

* nixos/mihomo: add example for cfg.webui
2024-06-10 12:45:19 +02:00
Florian Klink
6a3a382d5b nixos/mycelium: add mycelium binary to systemPackages
It's now possible to invoke `mycelium {routes,peers} list`.
2024-06-08 15:01:32 +03:00
Thomas Churchman
d226935fd7 nixos/ddclient: deprecate use, implement use{v4,v6}
Upstream replaced `use` with `use{v4,v6}`:
4a1b06630b/ChangeLog.md (new-features)
2024-06-07 17:28:25 +02:00
Keith Pine
6fda200fa4 nixos/inadyn: fix cache directory path
The CacheDirectory subdirectory is already part of $CACHE_DIRECTORY.
2024-06-07 09:03:24 +02:00
PatrickDaG
0fdf6e2917
nixos/netbird: fix defaults (#314656)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-06-07 00:02:06 +02:00
rnhmjoj
3c12ef3f21
nixos/firewall: fix reverse path check failures with IPsec
The endpoint of an IPsec tunnel receives encrypted IPsec packets that
are first decrypted and then forwarded to the intended destination.
The decrypted traffic appears to originate from the same interface it
came in from, so in most cases these packets will fail the reverse path
check even if legitimate.

This change adds an exception to not reject packets that were previously
IPsec-encrypted, meaning the have been accepted, decrypted and are in
the process of being forwarded to their final destinal.

Sources:

  - https://www.kernel.org/doc/Documentation/networking/xfrm_device.txt
  - https://git.netfilter.org/nftables/commit/?id=49f6e9a846c6c8325b95debe04d5ebc3c01246fb
  - https://git.netfilter.org/nftables/commit/?id=8f55ed41d007061bd8aae94fee2bda172c0e8996
  - https://thermalcircle.de/doku.php?id=blog:linux:nftables_demystifying_ipsec_expressions
2024-06-05 15:18:35 +02:00
Thomas Gerbet
ef6fea2d86 openssh: move Kerberos support into a dedicated package
The `openssh` and `openssh_hpn` packages are now built without
the Kerberos support by default in an effort to reduce the attack surface.

The Kerberos support is likely used only by a fraction of the total users
(I'm guessing mainly users integrating SSH in an Active Directory env) so
dropping it should not impact too many users. It should also be noted that
the Kerberos/GSSAPI auth is disabled by default in the configuration.
`opensshWithKerberos` and `openssh_hpnWithKerberos` are added in order
to provide an easy migration path for users needing this support.

The `openssh_gssapi` package is kept untouched.
2024-06-05 19:45:31 +10:00
Sandro Jäckel
41452802cb
treewide: fix all obviously wrong mkEnableOptions 2024-06-03 13:20:32 +02:00
Guanran Wang
818fe57b73
nixos/mihomo: format using nixfmt 2024-06-03 10:20:58 +08:00
Guanran Wang
f1034cab06
nixos/mihomo: drop default value from cfg.configFile 2024-06-03 10:20:58 +08:00
Ryan Horiguchi
ea63e59edc nixos/adguardhome: fix typo 2024-06-02 21:01:11 +02:00
Sandro
c6c60cca65
Merge pull request #315112 from sikmir/git-daemon 2024-06-02 17:08:43 +02:00
Julien Moutinho
d4954e0df2 nixos/prosody: support mod_http_file_share 2024-06-01 22:23:20 +02:00
Luflosi
8e945401d5
bind: make systemd service wait for BIND to be ready
Without this change, the systemd unit will be marked as ready even though BIND has not finished starting yet.
This causes other units that depend on BIND to start even though BIND is not ready yet.
From https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900788: "Bind9 will daemonize itself _when it is ready_."

Also modify the NixOS test. With this change, waiting for the unit alone will ensure that BIND is ready to accept queries. I would have expected to see the test failing without this commit but with the `machine.wait_for_open_port(53)` line removed but I found this to not be the case most of the time. This is probably the case because the situation is inherently racy and on my machine BIND happens to start in time most of the time.
2024-05-31 13:33:29 +02:00
Franz Pletz
4e1b4397d9
Merge pull request #312472 from Ma27/networkd-option-rename
nixos/networkd: get rid of *Config attributes in lists
2024-05-30 04:06:01 +02:00
Martin Weinelt
e0f4e4b535
Merge pull request #274425 from woffs/fix-274286
nixos/frr: adapt to frr-9
2024-05-30 02:33:26 +02:00
lassulus
d6f07be682
Merge pull request #314889 from DavHau/pr_sshd
nixos/openssh: allow removing settings
2024-05-30 01:01:07 +02:00
Frank Doepper
4df955130e nixos/frr: adapt to frr-9
- fix #274286
- remove `-f configfile` from ExecStart
- use /etc/frr/${service}d.conf
- enable mgmtd when staticd is enabled
- don't frr-reload.py mgmtd
- remove obsolete lib.mdDoc
2024-05-29 11:07:39 +02:00
Nikolay Korotkiy
ecddd99c6a
nixos/gitDaemon: add package option 2024-05-27 18:50:15 +04:00
Thomas Gerbet
00015f3ef9
Merge pull request #309036 from tomfitzhenry/sshd-package
nixos/ssh: add services.openssh.package
2024-05-27 09:40:31 +02:00
DavHau
3fe773a174 nixos/openssh: allow removing settings
# Motivation
So far it was not possible to configure sshd to allow password authentication only for a specific user. This is because in the generated config a `Match User xxx` section would be required before the global `PasswordAuthentication` is defined, as otherwise the global option always takes precedence.
The same problem occurs with multiple other options under `settings`.

# Done
This PR fixes that issue for all settings by simply allowing them to be overridden with `null`, which leads to a removal of that setting from the config.
The user can then correctly configure user specific settings using extraConfig, like this:
```
    Match User user1
    PasswordAuthentication yes
    Match all
    PasswordAuthentication no
```
2024-05-26 18:46:27 +02:00
Isabelle
56141e2236
nixos/wireguard: add option preShutdown for commands called before interface deletion (#310345) 2024-05-23 13:53:45 +02:00
Martin Weinelt
5d515c373e
nixos/kea: make ctrl-agent want network-online.target
If it wants to run after it, it needs to want it for it to be there.
2024-05-23 10:31:30 +02:00
Jeremy Baxter
20fc095a1c nixos/oink: init module 2024-05-23 10:12:53 +12:00
Maximilian Bosch
c4fd7cf16d
nixos/networkd: get rid of *Config attributes in lists
This patch is about removing `wireguardPeerConfig`,
`dhcpServerStaticLeaseConfig` - a.k.a. the
AbstractSingletonProxyFactoryBean of nixpkgs - and friends.

As a former colleague said

> worst abstraction ever

I second that. I've written enough networkd config for NixOS systems so
far to have a strong dislike. In fact, these don't even make sense:
`netdevs.wireguardPeers._.wireguardPeerConfig` will be rendered into
the key `[WireGuardPeer]` and every key from `wireguardPeerConfig` is in
there. Since it's INI, there's no place where sections on the same level
as wireguardPeerConfig fit into. Hence, get rid of it all.

For the transition, using the old way is still allowed, but gives a
warning. I think we could drop this after one release.

The tests of rosenpass and systemd-networkd-dhcpserver-static-leases
were broken on the rev before, hence they were updated, but are still
not building.
2024-05-20 17:26:42 +02:00
Marie Ramlow
6478f80b17 nixos/rosenpass: move preStart into script to workaround systemd bug
Because of a systemd bug, using both ExecStartPre and ExecStart will fill up the systemd credentials directory,
which leads to rosenpass failing to start.
This will be fixed in systemd v256, see https://github.com/systemd/systemd/pull/31202

Related issue: https://github.com/NixOS/nixpkgs/issues/258371
2024-05-15 17:52:45 +02:00
Raghav Sood
ec2f5e1cb9
Merge pull request #309615 from mkienitz/fix/vsftpd-assertion
Fix/vsftpd assertion
2024-05-15 23:09:28 +08:00
Sandro
e2bfd6e9c3
nixos/kresd: add link to upstream doc 2024-05-15 13:19:21 +02:00
Tom Fitzhenry
54ba3732f1 hostapd: add "wpa2-sha1" to authentication.mode enum
This is required for some Kindles (e.g. Kindle Paperwhite 7th Gen),
and printers (e.g. Brother MFC-J4440DW).

OpenWRT typically adds "wpa_key_mgmt = WPA-PSK", per 3f28c422ba/package/network/config/wifi-scripts/files/lib/netifd/hostapd.sh (L44-L71)
2024-05-14 19:28:15 +10:00
Florian Klink
aff6a121a3
Merge pull request #311039 from DavHau/pr_smokeping
nixos/smokeping: use nginx instead of thttpd
2024-05-13 01:11:59 +02:00
Franz Pletz
ef26d99b37
Merge pull request #310873 from ivan/radvd-debuglevel
nixos/radvd: add debugLevel option
2024-05-12 22:23:24 +02:00
Andreas Rammhold
d157db3480
Merge pull request #307051 from hax404/modules/tayga/mappings
nixos/tayga: add mappings option
2024-05-12 21:16:26 +02:00
DavHau
0b6c484848 nixos/smokeping: use nginx instead of thttpd
Motivation:
fixes #265953

Changes:
- deprecate `services.smokeping.port` in favor of the niginx native option
- mention in release notes
2024-05-12 13:31:11 +02:00
Bjørn Forsman
7909e0f7d6 nixos/pixiecore: fix apiServer example
Add missing http:// scheme. Without it pixiecore logs this and never
contacts the API server:

  [DHCP] Couldn't get bootspec for [REDACTED_MAC_ADDR]: Get "localhost:8080/v1/boot/[REDACTED_MAC_ADDR]": unsupported protocol scheme "localhost"
2024-05-11 23:01:35 +02:00
Ivan Kozik
0482e54050 nixos/radvd: add debugLevel option 2024-05-11 14:59:09 +00:00
Kyungrok Chung
81a58be20b nixos/tailscale: add extraSetFlags to configure daemon 2024-05-11 03:01:54 +09:00
Maximilian Kienitz
aa93972d0b nixos/vsftpd: fix invalid implication in assertions 2024-05-06 23:26:09 +02:00
nicoo
db5f88c41a
nixos/ssh: Make ~/.ssh/authorized_keys optional in AuthorizedKeysFiles (#279894) 2024-05-06 01:11:03 +00:00
Sandro
bdd2e6b121
Merge pull request #309324 from evenbrenden/move-jotta-cli
nixos/jotta-cli: move to services.jotta-cli
2024-05-05 23:17:24 +02:00
Georg Haas
e83b8cfd43
nixos/tayga: add mappings option 2024-05-05 21:10:51 +02:00
André Silva
7142a2dec9
Merge pull request #306655 from devusb/sunshine-update
sunshine: 0.23.0 -> 0.23.1
2024-05-05 19:14:28 +01:00
Even Brenden
9fa89d0e2c nixos/jotta-cli: move to services.jotta-cli 2024-05-05 19:30:16 +02:00
Weijia Wang
9ed8582721
Merge pull request #308622 from jmbaur/jbaur/clatd-minor-cleanup
Minor cleanups for clatd module and release notes
2024-05-04 19:25:11 +02:00
Tom Fitzhenry
ff1c82ee07 nixos/ssh: add services.openssh.package
Motivation: Allow the sshd package to be built differently to the ssh
package (programs.ssh.package). For example, build sshd(1) without
openssl, but built ssh(1) with OpenSSL support.

Set the default to be programs.ssh.package, to preserve compatibility.
2024-05-04 23:14:47 +10:00
Carl Richard Theodor Schneider
3e86aba9d2 nixos/adguardhome: run --check-config before merging
To prevent merging configurations on different `schema_version`,
we will now check the existing configuration, which has the side-effect of
updating the `schema_version`.

Fixes #246461 as described in https://github.com/NixOS/nixpkgs/issues/246461#issuecomment-1667663556
2024-05-03 20:15:02 +02:00
éclairevoyant
512b6d9ad2
Merge pull request #308531 from sanxus/fix-extraConfig
nixos/networkmanager: fix incorrect documention about `extraConfig`
2024-05-03 18:08:44 +00:00
sanxus
6b7692c8f5
nixos/networkmanager: fix incorrect documention about extraConfig 2024-05-04 01:04:51 +08:00
Jared Baur
09073330e0
nixos/clatd: remove invalid startLimitIntervalSec
The `startLimitIntervalSec` option is not valid under `serviceConfig`.
2024-05-02 14:16:12 -07:00
nicoo
480b871f2d
Merge #305844: add clatd module and nixos test 2024-05-02 14:00:06 +00:00
Colin Sane
6034d354d7
nixos/trust-dns: fix invalid default for settings.zones option (#308513)
and fix a few documentation typos while here.
2024-05-02 12:34:04 +00:00
Sandro
2e9d7dca27
Merge pull request #302570 from evenbrenden/jottad-service 2024-05-02 10:25:30 +02:00
Felix Buehler
39dfdad529 pptpd: prefer 'install' over 'chmod/chown' 2024-04-30 22:33:17 +02:00