summary refs log tree commit diff
path: root/nixos/modules/services/networking
Commit message (Collapse)AuthorAge
* networkmanager_iodine: init at 1.2.0Symphorien Gibol2017-08-30
|
* Merge pull request #27826 from Infinisil/radicaleFranz Pletz2017-08-30
|\ | | | | radicale: update to version 2
| * radicale: 1.1.4 -> 2.1.2Silvan Mosberger2017-08-13
| | | | | | | | | | | | | | | | | | | | | | | | | | This commit readds and updates the 1.x package from 1.1.4 to 1.1.6 which also includes the needed command for migrating to 2.x The module is adjusted to the version change, defaulting to radicale2 if stateVersion >= 17.09 and radicale1 otherwise. It also now uses ExecStart instead of the script service attribute. Some missing dots at the end of sentences were also added. I added a paragraph in the release notes on how to update to a newer version.
* | lldpd: 0.9.7 -> 0.9.8Franz Pletz2017-08-27
| | | | | | | | Now uses the upstream systemd unit which adds lots of hardening flags.
* | Merge pull request #28562 from oxij/nixos/i2pdJoachim F2017-08-26
|\ \ | | | | | | nixos: i2pd: bits and pieces
| * | nixos: i2pd: fix indentJan Malakhovski2017-08-25
| | |
| * | nixos: i2pd: tiny fix in a descriptionJan Malakhovski2017-08-25
| | |
| * | nixos: i2pd: enable ElGamal precomputation by defaultSLNOS2017-08-25
| | |
| * | nixos: i2pd: add logLevelSLNOS2017-08-25
| | |
| * | nixos: i2pd: one fork less, one process lessSLNOS2017-08-25
| | |
| * | nixos: i2pd: rename extIp -> address to harmonize with torSLNOS2017-08-25
| | |
| * | nixos: i2pd: change httpproxy port to its default valueSLNOS2017-08-25
| |/
* | Merge pull request #28189 from Nadrieril/ffsync-non-rootFrederik Rietdijk2017-08-24
|\ \ | |/ |/| firefox syncserver service: run as non-root user by default
| * firefox syncserver service: run as non-root user by defaultNadrieril2017-08-12
| |
* | ddclient nixos module: follow best practice for running daemonsPeter Hoeg2017-08-13
|/ | | | | | | | | | | | | Couple of changes: - move home to /var/lib/ddclient so we can enable ProtectSystem=full - do not stick binary into systemPackages as it will only run as a daemon - run as dedicated user/group - document why we cannot run as type=forking (output is swallowed) - secure things by running with ProtectSystem and PrivateTmp - .pid file goes into /run/ddclient - let nix create the home directory instead of handling it manually - make the interval configurable
* Merge pull request #28188 from Nadrieril/ffsync-fix-pythonpathFrederik Rietdijk2017-08-12
|\ | | | | firefox syncserver service: fix PYTHONPATH
| * firefox syncserver service: fix PYTHONPATHNadrieril2017-08-12
| |
* | Merge pull request #27997 from richardlarocque/mosquitto_hashed_pass_docsJörg Thalheim2017-08-12
|\ \ | | | | | | nixos/mosquitto: Fix instructions for password gen
| * | nixos/mosquitto: Fix instructions for password genRichard Larocque2017-08-06
| |/ | | | | | | | | | | | | | | | | | | | | | | | | Fixes https://github.com/NixOS/nixpkgs/issues/27996. Updates instructions for generating hashes passwords for use in a Mosquitto password file. Using `mosquitto_passwd` to generate these hashes is a little less convenient, but the results are more likely to be compatible with the mosquitto daemon. As far as I can tell, the hashes generated with `mkpassd` did not work as intended. But this may have been hidden by another bug: https://github.com/NixOS/nixpkgs/issues/27130.
* | Merge pull request #27939 from evujumenuk/wireguard-rt_tablesFranz Pletz2017-08-11
|\ \ | | | | | | wireguard: add per-peer routing table option
| * | wireguard: convert "table" to an interface optionevujumenuk2017-08-08
| | | | | | | | | Do the right thing, and use multiple interfaces for policy routing. For example, WireGuard interfaces do not allow multiple routes for the same CIDR range.
| * | wireguard: remove "table" option from exampleevujumenuk2017-08-04
| | | | | | | | | Most users will be served well by the default "table" setting ("main").
| * | wireguard: add per-peer routing table optionevujumenuk2017-08-04
| |/ | | | | This adds a convenient per-peer option to set the routing table that associated routes are added to. This functionality is very useful for isolating interfaces from the kernel's global routing and forcing all traffic of a virtual interface (or a group of processes, via e.g. "ip rule add uidrange 10000-10009 lookup 42") through Wireguard.
* | Merge pull request #28089 from volth/patch-9Joachim F2017-08-11
|\ \ | | | | | | nixos/tinc: do not tell systemd where is pidfile
| * | nixos/tinc: do not tell systemd where is pidfilevolth2017-08-09
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ```Tinc```'s pid file has more info than just a pid ``` # cat /run/tinc.dmz.pid 12209 7BD4A657B4A04364D268D188A0F4AA972A05247D802149246BBE1F1E689CABA1 127.0.0.1 port 656 ``` so ```systemd``` fails to parse it. It results in long (re)start times when ```systemd``` waits for a correct pid file to appear.
* | | nixos/dnscrypt-proxy: default to random upstream resolverJoachim Fasting2017-08-10
|/ /
* | tinc: allow the daemon to write to files in /etc/tinc/${network}/hostsvolth2017-08-10
| | | | | | Follow up https://github.com/NixOS/nixpkgs/pull/27756: tinc daemon may also create new files in ```/etc/tinc/$network/hosts```
* | Merge pull request #27925 from adisbladis/networkmanager_unboundMichael Raskin2017-08-08
|\ \ | |/ |/| networkmanager service: use unbound if enabled
| * networkmanager service: use unbound if enabledadisbladis2017-08-04
| |
* | nixos/networking/nat: add option for protocolPhil2017-08-04
|/ | | | This commit adds an option to allow udp port forwarding (see #24894).
* tlsdate: removeRobin Gloster2017-08-04
| | | | | Dead and does not build with openssl 1.1. Debian has removed it, too.
* unifi: add options to control JVM heap sizeSimon Lackerbauer2017-08-04
| | | | | Our controller was acting very sluggish at times and increasing available RAM for the JVM fixes this.
* avahi-daemon service: add cacheEntriesMax optionFranz Pletz2017-08-04
|
* nat: always flush nixos nat rules on firewall start/reloadMarkus Mueller2017-08-03
| | | | Fixes #27510
* searx: 0.11.0 -> 0.12.0Franz Pletz2017-08-01
|
* tinc: allow the daemon to write to files in /etc/tinc/${network}/hostsVolth2017-07-30
|
* nixos/tinc: remove restartTriggersvolth2017-07-29
| | | ```restartTriggers``` pointed to the constant files in ```/nix/store/``` and had to effect.
* tinc_pre: avoid infinite loop with EBADFD on network restartVolth2017-07-27
|
* tinc service: add CLI tools to the $PATHVolth2017-07-25
| | | | Now user can execute e.g. "sudo tinc.netname dump nodes"
* wireguard: sometimes module tries to re-add the default route, which fails - ↵Aristid Breitkreuz2017-07-23
| | | | use replace to make it succeed
* Merge pull request #26632 from jazmit/nixpkgsJoachim F2017-07-23
|\ | | | | coturn: allow use of ports < 1024
| * coturn: allow use of ports < 1024James2017-06-20
| |
* | wireguard: allow not storing private keys in world-readable /nix/store (#27433)Aristid Breitkreuz2017-07-17
| | | | | | * wireguard: allow not storing private keys in world-readable /nix/store
* | Strongswan after network-online instead of networkFalco Peijnenburg2017-07-17
| | | | | | | | | | | | | | | | The systemd service file shipped with strongswan has strongswan started after `network-online`. It turns out that this is for good reason: failure to connect on boot otherwise. See this thread on the mailing list, which my colleague initiated after finding that our NixOS strongswan config wouldn't connect on boot: https://lists.strongswan.org/pipermail/users/2017-January/010359.html Tested on a local config (which has the strongswan service config overridden).
* | Merge pull request #27057 from Nadrieril/bitlbee-libpurpleJörg Thalheim2017-07-17
|\ \ | | | | | | bitlbee service: Add option to load libpurple plugins into bitlbee
| * | bitlbee service: Add option to load libpurple plugins into bitlbeeNadrieril2017-07-16
| | |
* | | tinc service: BindToAddress and ListenAddress are different options, they ↵Nadrieril2017-07-17
| | | | | | | | | | | | should not be mistaken
* | | Merge pull request #27143 from florianjacob/networkmanager-support-resolvedMichael Raskin2017-07-08
|\ \ \ | |/ / |/| | networkmanager service: use resolved if enabled
| * | networkmanager service: use resolved if enabledFlorian Jacob2017-07-04
| | |
* | | lib: introduce imap0, imap1 (#25543)zimbatm2017-07-04
|/ / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * lib: introduce imap0, imap1 For historical reasons, imap starts counting at 1 and it's not consistent with the rest of the lib. So for now we split imap into imap0 that starts counting at zero and imap1 that starts counting at 1. And imap is marked as deprecated. See https://github.com/NixOS/nixpkgs/commit/c71e2d42359f9900ea2c290d141c0d606471da16#commitcomment-21873221 * replace uses of lib.imap * lib: move imap to deprecated.nix