Commit Graph

21068 Commits

Author SHA1 Message Date
Franz Pletz
af7b205640
nixos/localtimed: set time.timeZone to null to avoid silent overriding (#347221) 2024-10-10 13:44:36 +02:00
Franz Pletz
1479e0c4de
nixos/frr: refactor (#327099) 2024-10-10 12:55:34 +02:00
Pol Dellaiera
a72a8bcfb3
treewide: fix typo chown -> chmod (#347678) 2024-10-10 10:55:34 +02:00
r-vdp
9f1d2e97af
nixos/shorewall: Fix typo, chown -> chmod 2024-10-10 09:02:58 +02:00
Masum Reza
83965777ed
nixos/hypridle: make hypridle start with graphical-session.target (#347662) 2024-10-10 12:14:27 +05:30
John Titor
5eee20f731
nixos/hypridle: make hypridle start with graphical-session.target
If we don't add the dependency explicitly, the service won't be pulled in
at runtime. Link: https://github.com/NixOS/nixpkgs/pull/340874#issuecomment-2365302744

Closes: https://github.com/NixOS/nixpkgs/issues/347651
2024-10-10 10:32:48 +05:30
Aaron Andersen
50a0ea2eb6
nixos/redmine: Apply initial hardening using the systemd unit (#346554) 2024-10-09 18:47:58 -04:00
Frank Doepper
ecdfb14ef9 nixos/frr: refactor
- use upstream service and scripts
- switch to integrated-vtysh-config, abandon per-daemon config
- use always daemon names in options (e.g. ospf -> ospfd)
- zebra, mgmtd and staticd are always enabled
- abandon vtyListenAddress, vtyListenPort options; use
  just "extraOptions" or "options" instead, respectively
- extend test to test staticd
- update release-notes
- pkgs.servers.frr: fix sbindir and remove FHS PATH
- introduce services.frr.openFilesLimit option
2024-10-09 22:49:50 +02:00
Robert Schütz
db4fd8f4e3
nodePackages.npm: drop (#346536) 2024-10-09 12:01:42 -07:00
Franz Pletz
ca912828ba
nixos/dhcpcd: allow jemalloc and mimalloc memory allocators (#346938) 2024-10-09 17:27:26 +02:00
Matthew Croughan
4eb19953b6
node-red: move from nodePackages (#347018) 2024-10-09 16:11:38 +01:00
Franz Pletz
689b9903ac
nixos/tailscale-derper: init (#306533) 2024-10-09 17:05:01 +02:00
Franz Pletz
ae4102c9f3
headscale (module and package): 0.22.3 -> 0.23.0 (#340054) 2024-10-09 17:01:18 +02:00
Robert Schütz
b129e21ffd node-red: move from nodePackages 2024-10-08 08:29:56 -07:00
Izorkin
c3e32a04ae
nixos/dhcpcd: allow jemalloc and mimalloc memory allocators 2024-10-08 14:12:27 +03:00
Florian Klink
146e83d76b
dhcpcd: enable sandboxing options (#208780) 2024-10-08 13:09:11 +03:00
Sebastián Zavala Villagómez
1c5727cdf7 nixos/localtimed: set time.timeZone to null to avoid silent overriding
Currently if a timezone was selected explicitly, the service will
silently override the value, essentially ignoring what is meant to be a
a deliberate choice of option. This may cause confusion as to why the
option is not doing anything when this service is enabled, particularly
in more complex set-ups after some time.

This will simply make the choice deliberate from the user's part, either
by having to remove the option or lowering its priority as a recognition
that it may be ignored.

This change was inspired by the `services.tzupdate` module, which does
the same.

[1]: <https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/services/misc/tzupdate.nix#L24>
2024-10-07 23:40:49 -04:00
Thomas Gerbet
16caf1231b cups-filters: remove support for legacy CUPS browsing and for LDAP
Fixes CVE-2024-47176 and CVE-2024-47850. NixOS is not affected by these security issues by
default because we do not ship the default configuration file so it fallbacks to `BrowseRemoteProtocols dnssd`.

631/udp is removed from the open firewall ports, it was by the CUPS
browsing protocol.
2024-10-07 22:28:12 +02:00
Sandro
0538ecd092
rss-bridge: Remove pkg patch, adapt nixos service (#331295) 2024-10-07 18:57:22 +02:00
Cosima Neidahl
a825406b15
lomiri.lomiri: Replace NIXOS_XKB_LAYOUTS envvar with file (#345288) 2024-10-07 09:33:40 +02:00
Emily
1a53b400e5
mongodb: mongodb-5_0 -> mongodb-7_0; mongodb-5_0: drop; unifi: unifi7 -> unifi8; unifi{7,-video}: drop (#345625) 2024-10-07 01:38:54 +01:00
Emily
b0395df085 unifi7: drop 2024-10-06 22:47:41 +01:00
Izorkin
611b1d53b7
dhcpcd: enable sandboxing options 2024-10-06 23:46:18 +03:00
Kevin Cox
fb9b5c806b
mautrix-meta: drop maintainership Rutherther (#346916) 2024-10-06 14:45:10 -04:00
Kevin Cox
b8fc5855fb
nixos.mautrix-meta: Update config to 0.4 format (#343606) 2024-10-06 14:44:41 -04:00
Rutherther
379ca4e67f mautrix-meta: drop maintainership Rutherther 2024-10-06 20:33:42 +02:00
Bjørn Forsman
40bfbe3226 nixos/scrutiny: wait until ready
Add postStart code that waits until Scrutiny has opened its port. This
fixes a race condition against scrutiny-collector, which can start (and
fail) before scrutiny is ready.
2024-10-06 20:07:45 +02:00
Maximilian Bosch
5ee80e8120
Merge: nixos/nginx: remove shortand from defaultText (#346767) 2024-10-06 17:13:51 +02:00
Sandro
020c26717f
nixos/quorum: fix geth args, fix test (#341181) 2024-10-06 14:06:31 +02:00
Sandro
00461d0fcb
nixos/nginx: fix double slash in example (#346774) 2024-10-06 13:58:54 +02:00
Sandro Jäckel
dd7ef21afc
nixos/nginx: fix double slash in example 2024-10-06 03:45:51 +02:00
Sandro
b64b2d25c2
nixos/nginx: remove shortand from defaultText 2024-10-06 03:19:07 +02:00
Nick Cao
5f821de20c
keycloak: 25.0.6 -> 26.0.0 (#346439) 2024-10-05 18:14:45 -04:00
Felix Singer
0f599d1e68 nixos/redmine: Apply initial hardening using the systemd unit
These options are a good start for sandboxing the service. It's planned
to set `ProtectSystem` to `strict` instead of `full`, but that requires
specific directories to be configured as writable. It's also planned to
filter system calls. However, that requires more testing but it
shouldn't prevent us from applying these options for now and add others
later.

In my tests, Redmine only bound to an IPv4 address and Unix socket,
which is why I restricted the address families to these both.

The command `systemd-analyze security redmine.service` reports an
overall exposure level of 2.9 with this patch.

Signed-off-by: Felix Singer <felixsinger@posteo.net>
2024-10-05 22:13:37 +02:00
h7x4
25f2846361
nixos/bind: set type of zones.*.extraConfig to lines (#346424) 2024-10-05 21:07:26 +02:00
Robert Schütz
506df4e38e nodePackages.npm: drop 2024-10-05 11:23:49 -07:00
Nick Cao
6069dde181
nixos/keycloak: make initialAdminPassword optional 2024-10-05 08:37:41 -04:00
r-vdp
94532d1530 nixos/syncthing: remove syncthing-resume service
It was removed upstream in https://github.com/syncthing/syncthing/pull/9611
and the stub generated by nixos now prints an error in the logs due to
it not having a ExecStart line.
2024-10-05 12:55:39 +02:00
Bobby Rong
f594475564
nixos/xfce: Fix ambiguous with (#346528) 2024-10-05 09:03:18 +08:00
Sandro Jäckel
9b996f7396
nixos/xfce: Fix ambiguous with
Pull request 345352 introduces `pkgs.exo`, don't pick up that package.
2024-10-05 08:43:24 +08:00
Nick Cao
0cdc3e2a0b
nixos/keycloak: drop removed proxy option
Reference: https://www.keycloak.org/docs/latest/upgrading/index.html#proxy-option-removed
2024-10-04 20:20:46 -04:00
Nick Cao
16cd47369f
nixos/keycloak: KEYCLOAK_ADMIN{,PASSWORD} -> KC_BOOTSTRAP_ADMIN_{USERNAME,PASSWORD}
Reference: https://www.keycloak.org/docs/latest/upgrading/index.html#admin-bootstrapping-and-recovery
2024-10-04 20:08:06 -04:00
Nick Cao
d2ec2d3c29
nixos/keycloak: link $out/lib to KC_HOME_DIR to fix loading optimized app image
Reference: https://www.keycloak.org/docs/latest/upgrading/index.html#additional-validations-on-the-optimized-startup-option
2024-10-04 20:06:08 -04:00
Aaron Andersen
913a23b5e2
nixos/redmine: Allow specifying an IP address Redmine should bind to (#345617) 2024-10-04 18:18:45 -04:00
Anthony Roussel
17fd7e3eea
nixos/gns3-server: fix ubridge support (#303442) 2024-10-04 22:16:13 +02:00
Peder Bergebakken Sundt
986e6d4e3d
tsm-client: 8.1.23.0 -> 8.1.24.0 (#345039) 2024-10-04 18:25:37 +02:00
K900
d5f1752ca9
xdg-desktop-portal-gtk: Enable all default portals unconditionally (#345979) 2024-10-04 18:29:33 +03:00
Mynacol
aa0fc3e8b8 rss-bridge: Remove pkg patch, adapt nixos service
The rss-bridge service changes introduced in f2201789fe
resp. https://github.com/NixOS/nixpkgs/pull/223148 removes the need for
the package patch. This commit removes the patch to ease updating and
maintenance.
Relevant service functionality was also removed (e.g. the setting of
RSSBRIDGE_DATA).

The explicit definition of FileCache.path so users can easily see its
default value and change it, requires to use a freeformType to let users
freely add potentially upcoming config options. This type is restricted
to ini types (although we coerce them to environment variables).
This however makes the list of enabled_bridges impossible. That was
fixed by explicitly introducing this option with a type allowing lists.
The default value however should be unset, which is expressed as `null`,
which further spurred a change in the environment variable generation to
ignore null values (instead of coercing them to an empty string).

A breaking change note was added to highlight this change. A check that
warns users of the not-application of their existing config file is
not easily possible, as people could have only added or changed the
config.ini.php file on the file system without changing a nix variable.
2024-10-04 14:58:15 +02:00
Felix Stupp
6de4d04fdb
nixos/bind: set type of zones.*.extraConfig to lines
allowing multiple definitions of that option to be merged, because:
- their order should be irrelevant
- it might make sense to declare multiples of them at different locations
2024-10-04 14:49:12 +02:00
h7x4
d783411040
nixos: improve systemd slice names (#345990) 2024-10-04 12:08:36 +02:00