summary refs log tree commit diff
path: root/nixos/modules/module-list.nix
Commit message (Collapse)AuthorAge
* nixos: add spiped service moduleAustin Seipp2014-04-15
| | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* nixos: add grsecurity module (#1875)Austin Seipp2014-04-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This module implements a significant refactoring in grsecurity configuration for NixOS, making it far more usable by default and much easier to configure. - New security.grsecurity NixOS attributes. - All grsec kernels supported - Allows default 'auto' grsec configuration, or custom config - Supports custom kernel options through kernelExtraConfig - Defaults to high-security - user must choose kernel, server/desktop mode, and any virtualisation software. That's all. - kptr_restrict is fixed under grsecurity (it's unwriteable) - grsecurity patch creation is now significantly abstracted - only need revision, version, and SHA1 - kernel version requirements are asserted for sanity - built kernels can have the uname specify the exact grsec version for development or bug reports. Off by default (requires `security.grsecurity.config.verboseVersion = true;`) - grsecurity sysctl support - By default, disabled. - For people who enable it, NixOS deploys a 'grsec-lock' systemd service which runs at startup. You are expected to configure sysctl through NixOS like you regularly would, which will occur before the service is started. As a result, changing sysctl settings requires a reboot. - New default group: 'grsecurity' - Root is a member by default - GRKERNSEC_PROC_GID is implicitly set to the 'grsecurity' GID, making it possible to easily add users to this group for /proc access - AppArmor is now automatically enabled where it wasn't before, despite implying features.apparmor = true The most trivial example of enabling grsecurity in your kernel is by specifying: security.grsecurity.enable = true; security.grsecurity.testing = true; # testing 3.13 kernel security.grsecurity.config.system = "desktop"; # or "server" This specifies absolutely no virtualisation support. In general, you probably at least want KVM host support, which is a little more work. So: security.grsecurity.enable = true; security.grsecurity.stable = true; # enable stable 3.2 kernel security.grsecurity.config = { system = "server"; priority = "security"; virtualisationConfig = "host"; virtualisationSoftware = "kvm"; hardwareVirtualisation = true; } This module has primarily been tested on Hetzner EX40 & VQ7 servers using NixOps. Signed-off-by: Austin Seipp <aseipp@pobox.com>
* Merge branch 'containers'Eelco Dolstra2014-04-10
|\ | | | | | | Fixes #2105.
| * container-login.nix -> container-config.nixEelco Dolstra2014-04-03
| |
| * Always enable container loginsEelco Dolstra2014-04-03
| |
* | Merge branch 'cjdns' of git://github.com/ehmry/nixpkgsShea Levy2014-04-09
|\ \ | | | | | | | | | cjdns: update to 20130303
| * | cjdns: update to 20130303Emery Hemingway2014-04-09
| | | | | | | | | | | | | | | build system is now nodejs based new nixos module to start cjdns
* | | at-spi2-core: add dbus module, enabled on gnome3 by defaultLuca Bruno2014-04-09
| | |
* | | telepathy-mission-control: add dbus service, enabled by default on gnome3Luca Bruno2014-04-09
| | |
* | | evolution-data-server: fix gsettings schemas and add dbus serviceLuca Bruno2014-04-09
| | |
* | | sushi: new packageLuca Bruno2014-04-08
| | | | | | | | | | | | | | | | | | A quick previewer for Nautilus http://en.wikipedia.org/wiki/Sushi_(software)
* | | accountservice: add dbus and systemd servicesLuca Bruno2014-04-08
|/ / | | | | | | Enable by default with gnome3.
* | Merge branch 'murmur' of git://github.com/thoughtpolice/nixpkgsShea Levy2014-04-05
|\ \ | | | | | | | | | | | | | | | | | | nixos: add Murmur module (Mumble chat) Conflicts: nixos/modules/misc/ids.nix
| * | nixos: murmur serviceAustin Seipp2014-04-02
| | | | | | | | | | | | | | | | | | Murmur is the headless server component of the Mumble chat system. Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | | Merge branch 'rippled' of git://github.com/ehmry/nixpkgsShea Levy2014-04-05
|\ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | rippled: initial pkg and module expressions Had to change the rippled uid. Conflicts: nixos/modules/misc/ids.nix
| * | | rippled: initial pkg and module expressionsEmery Hemingway2014-03-29
| |/ / | | | | | | | | | | | | rippled is the Ripple P2P payment network reference server https://ripple.com
* | | Merge pull request #2095 from geo-kollias/masterEelco Dolstra2014-04-04
|\ \ \ | | | | | | | | Added MonetDB NixOS module.
| * | | Added MonetDB NixOS module.George Kollias2014-04-01
| |/ /
* / / syncthing: new package and nixos moduleMatej Cotman2014-04-04
|/ /
* | nixos: add minecraft-server serviceAustin Seipp2014-03-29
| | | | | | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | nixos: add BitTorrent Sync service moduleAustin Seipp2014-03-20
| | | | | | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | Add ngircd moduleShea Levy2014-03-19
|/
* Merge pull request #1775 from thoughtpolice/duo_unixmornfall2014-03-16
|\ | | | | Duo Security module and uid/gid support for /etc files
| * nixos: add Duo Security moduleAustin Seipp2014-03-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This module adds the security.duosec attributes, which you can use to enable simple two-factor authentication for NixOS logins. The module currently provides PAM and SSH support, although the PAM unix system configuration isn't automatically dealt with (although the configuration is automatically built). Enabling it is as easy as saying: security.duosec.ssh.enable = true; security.duosec.ikey = "XXXXXXXX..."; security.duosec.skey = "XXXXXXXX..."; security.duosec.host = "api-XXXXXXX.duosecurity.com"; security.duosec.group = "duosec"; which will enforce two-factor authentication for SSH logins for users in the 'duosec' group. This requires uid/gid support in the environment.etc module. Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | notbit: Add systemd service for a system daemonWilliam A. Kennington III2014-03-15
| |
* | remove users.jenkins config start on slave config.Corey O'Connor2014-03-13
| | | | | | | | | | | | Uses standard NixOS user config merging. Work in progress: The slave config does not actually start the slave agent. This just configures a jenkins user if required. Bare minimum to enable a nice jenkins SSH slave.
* | Add jenkins continuous integration server and user.Corey O'Connor2014-03-13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | By default the jenkins server is executed under the user "jenkins". Which can be configured using users.jenkins.* options. If a different user is requested by changing services.jenkins.user then none of the users.jenkins options apply. This patch does not include jenkins slave configuration. Some config options will probably change when this is implemented. Aspects like the user and environment are typically identical between slave and master. The service configs are different. The design is for users.jenkins to cover the shared aspects while services.jenkins and services.jenkins-slave cover the master and slave specific aspects, respectively. Another option would be to place everything under services.jenkins and have a config that selects master vs slave.
* | New NixOS module: services.solr, for running a solr serverRickard Nilsson2014-03-13
| |
* | New NixOS module: services.winstone, for running instances of the Winstone ↵Rickard Nilsson2014-03-12
| | | | | | | | Java Servlet container
* | Add phpfpm NixOS service moduleRickard Nilsson2014-03-12
| |
* | searx: add moduleMatej Cotman2014-03-09
| |
* | nixos: add Tarsnap backup service moduleAustin Seipp2014-03-07
| | | | | | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | update couchdb to 1.5.0(current latest) and add service for itRok Garbas2014-02-27
| |
* | D'ohShea Levy2014-02-26
|/
* Add module to enable the server for the ssh substituterShea Levy2014-02-20
|
* Upgrade bumblebee and add nixos moduleTomasz Kontusz2014-02-09
| | | | | | | | | | * Bump bumblebee to 3.2.1 * Remove config.patch - options it added can be passed to ./configure now * Remove the provided xorg.conf Provided xorg.conf was causing problems for some users, and Bumblebee provides its own default configuration anyway. * Make secondary X11 log to /var/log/X.bumblebee.log * Add a module for bumblebee
* services.mesa -> hardware.openglShea Levy2014-02-08
| | | | Signed-off-by: Shea Levy <shea@shealevy.com>
* nixos: Add a dictd service.Petr Rockai2014-01-25
|
* Adds a service for haveged, the entropy daemonAlexei Robyn2014-01-17
| | | | | | Includes configuration option for the threshold beneath which to refill the entropy pool - defaults to 1024 bits as this is the number used in other distro's existing service files I looked at.
* nixos: Split mesa setup from xserver.nixShea Levy2014-01-15
| | | | | | | With kmscon, it is now possible to have a system without X that still needs the mesa setup in /run/opengl-driver Signed-off-by: Shea Levy <shea@shealevy.com>
* Add module to use kmscon instead of linux-console for VTsShea Levy2014-01-15
| | | | | | | | | | This required some changes to systemd unit handling: * Add an option to specify that a unit is just a symlink * Allow specified units to overwrite systemd-provided ones * Have gettys.target require autovt@1.service instead of getty@1.service Signed-off-by: Shea Levy <shea@shealevy.com>
* Adds kippo SSH honeypotThomas Bereknyei2014-01-14
|
* connman: new packages ConnMan v1.20 and connman-uiMatej Cotman2014-01-11
|
* nixos: add ntopng serviceBjørn Forsman2013-12-09
| | | | | | | | | | ntopng is a high-speed web-based traffic analysis and flow collection tool. Enable it by adding this to configuration.nix: services.ntopng.enable = true; Open a browser at http://localhost:3000 and login with the default username/password: admin/admin.
* Add support for lightweight NixOS containersEelco Dolstra2013-11-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | You can now say: systemd.containers.foo.config = { services.openssh.enable = true; services.openssh.ports = [ 2022 ]; users.extraUsers.root.openssh.authorizedKeys.keys = [ "ssh-dss ..." ]; }; which defines a NixOS instance with the given configuration running inside a lightweight container. You can also manage the configuration of the container independently from the host: systemd.containers.foo.path = "/nix/var/nix/profiles/containers/foo"; where "path" is a NixOS system profile. It can be created/updated by doing: $ nix-env --set -p /nix/var/nix/profiles/containers/foo \ -f '<nixos>' -A system -I nixos-config=foo.nix The container configuration (foo.nix) should define boot.isContainer = true; to optimise away the building of a kernel and initrd. This is done automatically when using the "config" route. On the host, a lightweight container appears as the service "container-<name>.service". The container is like a regular NixOS (virtual) machine, except that it doesn't have its own kernel. It has its own root file system (by default /var/lib/containers/<name>), but shares the Nix store of the host (as a read-only bind mount). It also has access to the network devices of the host. Currently, if the configuration of the container changes, running "nixos-rebuild switch" on the host will cause the container to be rebooted. In the future we may want to send some message to the container so that it can activate the new container configuration without rebooting. Containers are not perfectly isolated yet. In particular, the host's /sys/fs/cgroup is mounted (writable!) in the guest.
* Add a nix module for AMD Hybrid GraphicsWilliam A. Kennington III2013-11-20
|
* Allow running NixOS services outside of systemdEelco Dolstra2013-11-18
| | | | | | | | | | | | | | | | | | | | | | | | | The attribute ‘config.systemd.services.<service-name>.runner’ generates a script that runs the service outside of systemd. This is useful for testing, and also allows NixOS services to be used outside of NixOS. For instance, given a configuration file foo.nix: { config, pkgs, ... }: { services.postgresql.enable = true; services.postgresql.package = pkgs.postgresql92; services.postgresql.dataDir = "/tmp/postgres"; } you can build and run PostgreSQL as follows: $ nix-build -A config.systemd.services.postgresql.runner -I nixos-config=./foo.nix $ ./result This will run the service's ExecStartPre, ExecStart, ExecStartPost and ExecStopPost commands in an appropriate environment. It doesn't work well yet for "forking" services, since it can't track the main process. It also doesn't work for services that assume they're always executed by root.
* gurobi: RemoveEelco Dolstra2013-11-05
| | | | It's proprietary, non-redistributable software.
* Allow packages to be marked as "broken" by setting meta.brokenEelco Dolstra2013-11-04
| | | | The effect is that they won't show up in "nix-env -qa" anymore.
* Merge pull request #1168 from grwlf/nixos-gnu-screenPeter Simons2013-11-04
|\ | | | | Add GNU Screen program module