Commit Graph

33752 Commits

Author SHA1 Message Date
Franz Pletz
af7b205640
nixos/localtimed: set time.timeZone to null to avoid silent overriding (#347221) 2024-10-10 13:44:36 +02:00
Franz Pletz
1479e0c4de
nixos/frr: refactor (#327099) 2024-10-10 12:55:34 +02:00
Pol Dellaiera
a72a8bcfb3
treewide: fix typo chown -> chmod (#347678) 2024-10-10 10:55:34 +02:00
r-vdp
9f1d2e97af
nixos/shorewall: Fix typo, chown -> chmod 2024-10-10 09:02:58 +02:00
r-vdp
11d9033d85
nixos/ec2: Fix typo, chown -> chmod 2024-10-10 09:02:06 +02:00
Masum Reza
cb9ac608fc
nixos/{bcache,lvm}: enable when using systemd in stage 1 initrd (#343760) 2024-10-10 12:16:31 +05:30
Masum Reza
83965777ed
nixos/hypridle: make hypridle start with graphical-session.target (#347662) 2024-10-10 12:14:27 +05:30
John Titor
5eee20f731
nixos/hypridle: make hypridle start with graphical-session.target
If we don't add the dependency explicitly, the service won't be pulled in
at runtime. Link: https://github.com/NixOS/nixpkgs/pull/340874#issuecomment-2365302744

Closes: https://github.com/NixOS/nixpkgs/issues/347651
2024-10-10 10:32:48 +05:30
Aaron Andersen
50a0ea2eb6
nixos/redmine: Apply initial hardening using the systemd unit (#346554) 2024-10-09 18:47:58 -04:00
Frank Doepper
ecdfb14ef9 nixos/frr: refactor
- use upstream service and scripts
- switch to integrated-vtysh-config, abandon per-daemon config
- use always daemon names in options (e.g. ospf -> ospfd)
- zebra, mgmtd and staticd are always enabled
- abandon vtyListenAddress, vtyListenPort options; use
  just "extraOptions" or "options" instead, respectively
- extend test to test staticd
- update release-notes
- pkgs.servers.frr: fix sbindir and remove FHS PATH
- introduce services.frr.openFilesLimit option
2024-10-09 22:49:50 +02:00
Robert Schütz
db4fd8f4e3
nodePackages.npm: drop (#346536) 2024-10-09 12:01:42 -07:00
Franz Pletz
ca912828ba
nixos/dhcpcd: allow jemalloc and mimalloc memory allocators (#346938) 2024-10-09 17:27:26 +02:00
Matthew Croughan
4eb19953b6
node-red: move from nodePackages (#347018) 2024-10-09 16:11:38 +01:00
Franz Pletz
689b9903ac
nixos/tailscale-derper: init (#306533) 2024-10-09 17:05:01 +02:00
Franz Pletz
ae4102c9f3
headscale (module and package): 0.22.3 -> 0.23.0 (#340054) 2024-10-09 17:01:18 +02:00
Franz Pletz
be6a26cae7
nixos/libvirtd: add startDelay and shutdownTimeout option (#347023) 2024-10-09 16:58:16 +02:00
Emery Hemingway
7f63bcba36 nixos/nncp: refactor configuration merging
The NNCP utilities have poor support for configuration merging so
use jq and hjson-cli instead.
2024-10-09 09:07:11 +00:00
Florian Klink
2ec88eb10b
nixos/systemd: allow running shellcheck on generated systemd scripts (#311394) 2024-10-08 22:24:49 +03:00
Robert Schütz
b129e21ffd node-red: move from nodePackages 2024-10-08 08:29:56 -07:00
Izorkin
c3e32a04ae
nixos/dhcpcd: allow jemalloc and mimalloc memory allocators 2024-10-08 14:12:27 +03:00
Florian Klink
146e83d76b
dhcpcd: enable sandboxing options (#208780) 2024-10-08 13:09:11 +03:00
r-vdp
2b224f0e3c
nixos/systemd: allow using writeShellApplication for systemd unit scripts 2024-10-08 12:01:48 +02:00
Robert Hensing
2d11924c9a
macos-builder: readd Nix CLI for debugging (#347205) 2024-10-08 09:58:17 +02:00
Sebastián Zavala Villagómez
1c5727cdf7 nixos/localtimed: set time.timeZone to null to avoid silent overriding
Currently if a timezone was selected explicitly, the service will
silently override the value, essentially ignoring what is meant to be a
a deliberate choice of option. This may cause confusion as to why the
option is not doing anything when this service is enabled, particularly
in more complex set-ups after some time.

This will simply make the choice deliberate from the user's part, either
by having to remove the option or lowering its priority as a recognition
that it may be ignored.

This change was inspired by the `services.tzupdate` module, which does
the same.

[1]: <https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/services/misc/tzupdate.nix#L24>
2024-10-07 23:40:49 -04:00
Michael Hoang
10bad16926 macos-builder: readd Nix CLI for debugging
See https://github.com/NixOS/nixpkgs/pull/268574#discussion_r1788966194
2024-10-08 12:41:55 +11:00
Thomas Gerbet
16caf1231b cups-filters: remove support for legacy CUPS browsing and for LDAP
Fixes CVE-2024-47176 and CVE-2024-47850. NixOS is not affected by these security issues by
default because we do not ship the default configuration file so it fallbacks to `BrowseRemoteProtocols dnssd`.

631/udp is removed from the open firewall ports, it was by the CUPS
browsing protocol.
2024-10-07 22:28:12 +02:00
Sandro
0538ecd092
rss-bridge: Remove pkg patch, adapt nixos service (#331295) 2024-10-07 18:57:22 +02:00
Peder Bergebakken Sundt
cd9a00431c
ec2: shellcheck fixes (#340489) 2024-10-07 15:39:38 +02:00
Cosima Neidahl
a825406b15
lomiri.lomiri: Replace NIXOS_XKB_LAYOUTS envvar with file (#345288) 2024-10-07 09:33:40 +02:00
codgician
2a848b3732
nixos/libvirtd: add startDelay and shutdownTimeout option 2024-10-07 14:43:45 +08:00
Florian Klink
9c13bad7ca
nixos/tmpfiles: only setup nix-related tmpfiles if nix is enabled (#343784) 2024-10-07 09:11:46 +03:00
Emily
85c36fecfc
xen: nuke, move to by-name. (#345192) 2024-10-07 03:48:37 +01:00
Emily
1a53b400e5
mongodb: mongodb-5_0 -> mongodb-7_0; mongodb-5_0: drop; unifi: unifi7 -> unifi8; unifi{7,-video}: drop (#345625) 2024-10-07 01:38:54 +01:00
Will Fancher
aad455b434
nixos/usbStorage: apply upstream (#284334) 2024-10-06 19:39:07 -04:00
Emily
b0395df085 unifi7: drop 2024-10-06 22:47:41 +01:00
Will Fancher
c00fc8bd1a
nixos/unl0kr: add settings to the unl0kr module (#339787) 2024-10-06 17:44:55 -04:00
Izorkin
611b1d53b7
dhcpcd: enable sandboxing options 2024-10-06 23:46:18 +03:00
Fernando Rodrigues
251dc99c70
nixos/xen: simplify package options
Signed-off-by: Fernando Rodrigues <alpha@sigmasquadron.net>
2024-10-06 20:24:29 +00:00
Kevin Cox
fb9b5c806b
mautrix-meta: drop maintainership Rutherther (#346916) 2024-10-06 14:45:10 -04:00
Kevin Cox
b8fc5855fb
nixos.mautrix-meta: Update config to 0.4 format (#343606) 2024-10-06 14:44:41 -04:00
Rutherther
379ca4e67f mautrix-meta: drop maintainership Rutherther 2024-10-06 20:33:42 +02:00
Bjørn Forsman
40bfbe3226 nixos/scrutiny: wait until ready
Add postStart code that waits until Scrutiny has opened its port. This
fixes a race condition against scrutiny-collector, which can start (and
fail) before scrutiny is ready.
2024-10-06 20:07:45 +02:00
Maximilian Bosch
5ee80e8120
Merge: nixos/nginx: remove shortand from defaultText (#346767) 2024-10-06 17:13:51 +02:00
Sandro
020c26717f
nixos/quorum: fix geth args, fix test (#341181) 2024-10-06 14:06:31 +02:00
Sandro
00461d0fcb
nixos/nginx: fix double slash in example (#346774) 2024-10-06 13:58:54 +02:00
Sandro Jäckel
dd7ef21afc
nixos/nginx: fix double slash in example 2024-10-06 03:45:51 +02:00
Sandro
b64b2d25c2
nixos/nginx: remove shortand from defaultText 2024-10-06 03:19:07 +02:00
Nick Cao
5f821de20c
keycloak: 25.0.6 -> 26.0.0 (#346439) 2024-10-05 18:14:45 -04:00
Felix Singer
0f599d1e68 nixos/redmine: Apply initial hardening using the systemd unit
These options are a good start for sandboxing the service. It's planned
to set `ProtectSystem` to `strict` instead of `full`, but that requires
specific directories to be configured as writable. It's also planned to
filter system calls. However, that requires more testing but it
shouldn't prevent us from applying these options for now and add others
later.

In my tests, Redmine only bound to an IPv4 address and Unix socket,
which is why I restricted the address families to these both.

The command `systemd-analyze security redmine.service` reports an
overall exposure level of 2.9 with this patch.

Signed-off-by: Felix Singer <felixsinger@posteo.net>
2024-10-05 22:13:37 +02:00
h7x4
25f2846361
nixos/bind: set type of zones.*.extraConfig to lines (#346424) 2024-10-05 21:07:26 +02:00