about summary refs log tree commit diff
path: root/nixos/modules
AgeCommit message (Collapse)AuthorFilesLines
2024-05-15Revert "nixos/garage: drop replication_mode setting"Yureka1-18/+7
2024-05-15Merge pull request #275485 from Ex-32/binfmt-emulatedsystems-fixPol Dellaiera1-1/+1
nixos/binfmt: added assertion to prevent emulation of current system
2024-05-14Merge pull request #311307 from michaelpj/mpj/remove-some-maintenncePol Dellaiera2-2/+2
Remove myself from some packages I no longer use
2024-05-14Merge pull request #311376 from SuperSandro2000/display-managers-miscNick Cao1-2/+2
nixos/display.managers: use cfg where possible
2024-05-14Merge pull request #300564 from Cynerd/bcg-fixAleksana1-3/+3
nixos/bcg: fix usage without environment files
2024-05-14hostapd: add "wpa2-sha1" to authentication.mode enumTom Fitzhenry1-6/+11
This is required for some Kindles (e.g. Kindle Paperwhite 7th Gen), and printers (e.g. Brother MFC-J4440DW). OpenWRT typically adds "wpa_key_mgmt = WPA-PSK", per https://github.com/openwrt/openwrt/blob/3f28c422ba7ca06efd41686fd2f9e664f7e8a12e/package/network/config/wifi-scripts/files/lib/netifd/hostapd.sh#L44-L71
2024-05-13Merge pull request #310199 from symphorien/borg_ignore_warnings_masterGuillaume Girol1-6/+26
nixos/borgbackup: add an option to ignore warnings
2024-05-13Merge pull request #310786 from K900/greetd-plymouthK9001-1/+13
nixos/greetd: add option to make greetd not stop Plymouth early
2024-05-13nixos/display.managers: use cfg where possibleSandro Jäckel1-2/+2
2024-05-13Merge pull request #310926 from Gerg-L/display-managerSandro1-3/+0
2024-05-13Merge pull request #303745 from quantenzitrone/ydotoolCosima Neidahl2-0/+84
ydotool: refactor ; nixos/ydotool: init module & nixosTest
2024-05-13Merge pull request #308801 from jmbaur/switch-to-configuration-rsFlorian Klink1-34/+75
nixos/switch-to-configuration: add new implementation
2024-05-13Merge pull request #305286 from cafkafk/devpi-server-initChristina Rust2-0/+129
nixos/devpi-server: init
2024-05-13Merge pull request #309643 from flokli/garage-replication_modeFlorian Klink1-7/+18
nixos/garage: drop replication_mode setting
2024-05-13nixos/ydotool: init moduleQuantenzitrone2-0/+84
Co-authored-by: Cosima Neidahl <opna2608@protonmail.com>
2024-05-13nixos/devpi-server: initChristina Sørensen2-0/+129
Signed-off-by: Christina Sørensen <christina@cafkafk.com>
2024-05-13Merge pull request #310350 from oddlama/fix-oauth2-proxyK9001-3/+3
nixos/oauth2-proxy: fix invalid comparison between list and attrset
2024-05-13tzupdate: remove michaelpj as maintainerMichael Peyton Jones1-1/+1
2024-05-13arbtt: remove michaeplj as maintainerMichael Peyton Jones1-1/+1
2024-05-13Merge pull request #310819 from ilya-epifanov/thermald-config-fixFranz Pletz1-2/+2
thermald: fixed handling of an external config
2024-05-13Merge pull request #307076 from flokli/caddy-reloadJörg Thalheim1-1/+1
nixos/caddy: don't set ExecReload if enableReload is disabled
2024-05-13nixos/zsh: remove `lib.lib`Florian Klink1-1/+1
This fails my NixOS configuration: ``` error: attribute 'lib' missing at /nix/store/ninrqc3pblnmqgh489cbr9rq5pijcpd6-nixpkgs-src/nixos/modules/programs/zsh/zsh-syntax-highlighting.nix:90:7: 89| programs.zsh.interactiveShellInit = 90| lib.lib.mkAfter (lib.concatStringsSep "\n" ([ | ^ 91| "source ${pkgs.zsh-syntax-highlighting}/share/zsh-syntax-highlighting/zsh-syntax-highlighting.zsh" ```
2024-05-13Merge pull request #309115 from NyCodeGHG/nixos/miniflux-sd-notifyMartin Weinelt1-4/+11
nixos/miniflux: use systemd notify and watchdog
2024-05-13nixos/garage: add assertion for replication_factorYureka1-0/+18
2024-05-13Merge pull request #311197 from endocrimes/dani/fish-boogalooMartin Weinelt1-6/+6
nixos/fish: Fix more lib references
2024-05-13nixos/fish: Fix more lib referencesDanielle Lancashire1-6/+6
2024-05-13Merge pull request #311039 from DavHau/pr_smokepingFlorian Klink1-33/+30
nixos/smokeping: use nginx instead of thttpd
2024-05-13nixos/fish: fix reference to mapAttrsFlattenDanielle Lancashire1-1/+1
2024-05-13nixos/confinement: Use prio 100 for RootDirectoryaszlig1-1/+1
One of the module that already supports the systemd-confinement module is public-inbox. However with the changes to support DynamicUser and ProtectSystem, the module will now fail at runtime if confinement is enabled (it's optional and you'll need to override it via another module). The reason is that the RootDirectory is set to /var/empty in the public-inbox module, which doesn't work well with the InaccessiblePaths directive we now use to support DynamicUser/ProtectSystem. To make this issue more visible, I decided to just change the priority of the RootDirectory option definiton the default override priority so that whenever another different option is defined, we'll get a conflict at evaluation time. Signed-off-by: aszlig <aszlig@nix.build>
2024-05-13nixos/systemd-confinement: Make / read-onlyaszlig1-0/+1
Our more thorough parametrised tests uncovered that with the changes for supporting DynamicUser, we now have the situation that for static users the root directory within the confined environment is now writable for the user in question. This is obviously not what we want and I'd consider that a regression. However while discussing this with @ju1m and my suggestion being to set TemporaryFileSystem to "/" (as we had previously), they had an even better idea[1]: > The goal is to deny write access to / to non-root users, > > * TemporaryFileSystem=/ gives us that through the ownership of / by > root (instead of the service's user inherited from > RuntimeDirectory=). > * ProtectSystem=strict gives us that by mounting / read-only (while > keeping its ownership to the service's user). > > To avoid the incompatibilities of TemporaryFileSystem=/ mentioned > above, I suggest to mount / read-only in all cases with > ReadOnlyPaths = [ "+/" ]: > > ... > > I guess this would require at least two changes to the current tests: > > 1. to no longer expect root to be able to write to some paths (like > /bin) (at least not without first remounting / in read-write > mode). > 2. to no longer expect non-root users to fail to write to certain > paths with a "permission denied" error code, but with a > "read-only file system" error code. I like the solution with ReadOnlyPaths even more because it further reduces the attack surface if the user is root. In chroot-only mode this is especially useful, since if there are no other bind-mounted paths involved in the unit configuration, the whole file system within the confined environment is read-only. [1]: https://github.com/NixOS/nixpkgs/pull/289593#discussion_r1586794215 Signed-off-by: aszlig <aszlig@nix.build>
2024-05-13nixos/systemd-confinement: support ProtectSystem=/DynamicUser=Julien Moutinho1-14/+21
See https://discourse.nixos.org/t/hardening-systemd-services/17147/14
2024-05-12Merge pull request #310873 from ivan/radvd-debuglevelFranz Pletz1-1/+12
nixos/radvd: add debugLevel option
2024-05-12Merge pull request #310348 from ehmry/nginx-validateConfigFilePol Dellaiera1-1/+8
nixos/nginx: add validateConfigFile option
2024-05-12Merge pull request #304773 from acid-bong/no-libsWeijia Wang118-1269/+1053
treewide: remove file-wide `with lib;` uses in nixos/modules/programs
2024-05-12Merge pull request #307051 from hax404/modules/tayga/mappingsAndreas Rammhold1-2/+24
nixos/tayga: add mappings option
2024-05-12Merge pull request #310880 from presto8/warn-xss-lockMarek Fajkus1-0/+5
nixos/xss-lock: add warning for startx
2024-05-12nixos/caddy: don't set ExecReload if enableReload is disabledFlorian Klink1-1/+1
Otherwise, setting services.caddy.enableReload to false fails in a very bad fashion: The reload command still gets executed, but fails: ``` Apr 26 21:23:01 n1-rk1 systemd[1]: Reloading Caddy... Apr 26 21:23:01 n1-rk1 caddy[70793]: {"level":"info","ts":1714166581.733018,"msg":"using provided configuration","config_file":"/etc/caddy/caddy_config","config_adapter":"caddyfile"} Apr 26 21:23:01 n1-rk1 caddy[70793]: {"level":"warn","ts":1714166581.7353032,"msg":"Caddyfile input is not formatted; run 'caddy fmt --overwrite' to fix inconsistencies","adapter":"caddyfile","file":"/etc/caddy/caddy_config","line":3} Apr 26 21:23:01 n1-rk1 caddy[70793]: Error: sending configuration to instance: performing request: Post "http://localhost:2019/load": dial tcp [::1]:2019: connect: connection refused Apr 26 21:23:01 n1-rk1 systemd[1]: caddy.service: Control process exited, code=exited, status=1/FAILURE Apr 26 21:23:01 n1-rk1 systemd[1]: Reload failed for Caddy. ``` … and the server is not restarted either, as a ExecReload= command is specified. Fix this, by only setting ExecReload if the reload exists. The first empty string is still necessary to reset the old option.
2024-05-12Merge pull request #311074 from bobby285271/upd/mate-glib-networkingBobby Rong1-0/+1
nixos/mate: enable services.gnome.glib-networking cc #53700
2024-05-12nixos/mate: enable services.gnome.glib-networkingBobby Rong1-0/+1
This is already done in the 5 other desktop environments I maintain, I decided that I don't mind adding another one.
2024-05-12nixos/smokeping: use nginx instead of thttpdDavHau1-33/+30
Motivation: fixes #265953 Changes: - deprecate `services.smokeping.port` in favor of the niginx native option - mention in release notes
2024-05-12Merge pull request #305586 from drupol/private-gpt/initPol Dellaiera2-0/+122
private-gpt: init at 0.5.0
2024-05-12treewide: remove file-wide `with lib;` in nixos/modules/programsAcid Bong118-1269/+1053
2024-05-11nixos/pixiecore: fix apiServer exampleBjørn Forsman1-2/+2
Add missing http:// scheme. Without it pixiecore logs this and never contacts the API server: [DHCP] Couldn't get bootspec for [REDACTED_MAC_ADDR]: Get "localhost:8080/v1/boot/[REDACTED_MAC_ADDR]": unsupported protocol scheme "localhost"
2024-05-11nixos/private-gpt: initPol Dellaiera2-0/+122
2024-05-11nixos/xserver: remove duplicate display-manager.script declarationGerg-L1-3/+0
2024-05-11nixos/xss-lock: add warning for startxPreston Hunt1-0/+5
2024-05-11nixos/radvd: add debugLevel optionIvan Kozik1-1/+12
2024-05-11thermald: fixed handling of an external configIlya Epifanov1-2/+2
2024-05-11nixos/greetd: add option to make greetd not stop Plymouth earlyK9001-1/+13
2024-05-10nixos/switch-to-configuration: add new implementationJared Baur1-34/+75
This adds an implementation of switch-to-configuration that allows for closer interaction with the lifecycle of systemd units by using DBus APIs directly instead of using systemctl. It is disabled by default, but can be enabled by specifying `{ system.switch = { enable = false; enableNg = true; }; }`.