summary refs log tree commit diff
path: root/nixos/modules/services/networking
Commit message (Collapse)AuthorAge
* dnscrypt-proxy service: systemd notification under apparmorJoachim Fasting2017-03-24
|
* vsftpd: Expose the no_anon_password flag.Michael Walker2017-03-19
|
* nixos/treewide: remove boolean examples for optionsFranz Pletz2017-03-17
| | | | | | | They contain no useful information and increase the length of the autogenerated options documentation. See discussion in #18816.
* nixos/dnscrypt-proxy: log resolver list verification failureJoachim Fasting2017-03-15
| | | | | | Otherwise, the service unit just fails for no discernable reason. Verifcation failure is bad so it ought to be easily discoverable.
* nixos/dnscrypt-proxy: get resolver list from githubJoachim Fasting2017-03-15
| | | | | The list has disappeared from its ordinary location at download.dnscrypt.org.
* nixos/dnscrypt-proxy: remove the resolverList optionJoachim Fasting2017-03-15
| | | | | | | | | This option was initially added to make it easier to use an up-to-date list, but now that we always use an up-to-date list from upstream, there's no point to the option. From now on, you can either use a resolver listed by dnscrypt upstream or a custom resolver.
* nixos/dnscrypt-proxy: add example of how to use the cache pluginJoachim Fasting2017-03-15
|
* nixos/dnscrypt-proxy: replace unimportant options with extraArgsJoachim Fasting2017-03-15
| | | | | | | | | | | Removes tcpOnly and ephemeralKeys: reifying them as nixos options adds little beyond improved discoverability. Until 17.09 we'll automatically translate these options into extraArgs for convenience. Unless reifying an option is necessary for conditional computation or greatly simplifies configuration/reduces risk of misconfiguration, it should go into extraArgs instead.
* nixos/dnscrypt-proxy: simplify module logic related to apparmorJoachim Fasting2017-03-15
|
* nixos/dnscrypt-proxy: support reloadJoachim Fasting2017-03-15
|
* nixos/dnscrypt-proxy: grant daemon access to load pluginsJoachim Fasting2017-03-10
|
* nixos/dnscrypt-proxy docs: reword section on forwardingJoachim Fasting2017-03-10
| | | | | | Newer versions of DNSCrypt proxy *can* cache lookups (via plugin); make the wording more neutral wrt. why one might want to run the proxy in a forwarding setup.
* nixos/dnscrypt-proxy: inline option renamingsJoachim Fasting2017-03-10
| | | | In an effort to make the module more self-contained.
* nixos/dnscrypt-proxy: inline top-level binding (cleanup)Joachim Fasting2017-03-10
|
* nixos/dnscrypt-proxy: use example.com in example valuesJoachim Fasting2017-03-10
| | | | It is the canonical example domain after all.
* nixos/dnscrypt-proxy: indicate update statusJoachim Fasting2017-03-08
| | | | | Make it easier for the user to tell when the list is updated and, at their option, see what changed.
* nixos/dnscrypt-proxy: more fs isolation for the updaterJoachim Fasting2017-03-08
| | | | | | | It'd be better to do the update as an unprivileged user; for now, we do our best to minimize the surface available. We filter mount syscalls to prevent the process from undoing the fs isolation.
* nixos/dnscrypt-proxy: support updating before nss is upJoachim Fasting2017-03-08
| | | | | | | | | | | | | | Resolve download.dnscrypt.org using hostip with a bootstrap resolver (hard-coded to Google Public DNS for now), to ensure that we can get an up-to-date resolver list without working name service lookups. This makes us more robust to the upstream resolver list getting out of date and other DNS configuration problems. We use the curl --resolver switch to allow https cert validation (we'd need to do --insecure if using just the ip addr). Note that we don't rely on https for security but it's nice to have it ...
* nixos/dnscrypt-proxy: refactoringJoachim Fasting2017-03-08
| | | | | | Use mkMerge to make the code a little more ergonomic and easier to follow (to my eyes, anyway ...). Also take the opportunity to do some minor cleanups & tweaks, but no functional changes.
* ddclient: Make verbose logging deactivatable.Daniel Ehlers2017-03-07
|
* nixos/modules: use defaultText/literalExample where applicableJoachim Fasting2017-03-07
| | | | | Primarily to fix rendering of default values/examples but also to avoid unnecessary work.
* search module: add missing typesJoachim Fasting2017-03-07
|
* networkmanager service: support changing the mac-address (#23464)Tom2017-03-07
| | | | | | | | | | | | Set `networking.networkmanager.wifi.macAddress` or `networking.networkmanager.ethernet.macAddress` to one of these values to change your macAddress. * "XX:XX:XX:XX:XX:XX": set the MAC address of the interface. * "permanent": use the permanent MAC address of the device. * "preserve": don’t change the MAC address of the device upon activation. * "random": generate a randomized value upon each connect. * "stable": generate a stable, hashed MAC address. See https://blogs.gnome.org/thaller/2016/08/26/mac-address-spoofing-in-networkmanager-1-4-0/ for more information
* btsync module: remove redundant exampleJoachim Fasting2017-03-06
| | | | | The default value already gives a good example of what values to put here.
* nixos, dhcpd: make machines assignableEdward Tjörnhammar2017-02-27
|
* nftables: make default configuration nullJörg Thalheim2017-02-26
| | | | | | | | | reason: - We currently have an open discussion regarding a more modular firewall (https://github.com/NixOS/nixpkgs/issues/23181) and leaving null makes future extension easier. - the current default might not cover all use cases (different ssh port) and might break setups, if applied blindly
* nftables module: Add new module for nftables firewall settingsJookia2017-02-26
| | | | fixes #18842
* prosody service: needs working network connectivityFranz Pletz2017-02-23
|
* dhcpcd service: fix network-online.target integrationFranz Pletz2017-02-23
| | | | | | | | | | When dhcpcd instead of networkd is used, the network-online.target behaved the same as network.target, resulting in broken services that need a working network connectivity when being started. This commit makes dhcpcd wait for a lease and makes it wanted by network-online.target. In turn, network-online.target is now wanted by multi-user.target, so it will be activated at every boot.
* nixos.openntpd: don't spam systemd journalRicardo M. Correia2017-02-20
| | | | | Starting `ntpd` with the `-d` option spams the systemd journal. Instead, let the server fork.
* Merge pull request #20456 from ericsagnes/feat/loaf-dep-1Joachim F2017-02-19
|\ | | | | Use attrsOf in place of loaOf when relevant
| * znc module: networks option loaOf -> attrsOfEric Sagnes2016-11-16
| |
| * tinc module: networks, hosts option loaOf -> attrsOfEric Sagnes2016-11-16
| |
* | Fix typo introduced by #22677Kier Davis2017-02-15
| |
* | Merging against upstream masterParnell Springmeyer2017-02-13
|\ \
| * | nixos: drop references to kde4Graham Christensen2017-02-11
| | | | | | | | | | | | Excluding modules/programs/environment.nix for PATHand QT_PLUGIN_PATH to allow the programs to continue running.
| * | modules/searx: add package option (#22636)Profpatsch2017-02-10
| | | | | | | | | The user should be able to specify a patched version of searx.
| * | libreswan service: make EnvironmentFile optional (#22591)afranchuk2017-02-10
| | | | | | | | | Recent versions of libreswan seem to omit this file, but it may be added/changed in the future. It is silly to have the service fail because a file is missing that only enriches the environment.
| * | Merge pull request #22356 from Ekleog/redsocksJoachim F2017-02-09
| |\ \ | | | | | | | | Redsocks
| | * | redsocks module: initializeLéo Gaspard2017-02-09
| | | | | | | | | | | | | | | | redsocks module: use separate user for redsocks daemon
| * | | nixos.chrony: remove generatecommandkey optionRicardo M. Correia2017-02-07
| | | | | | | | | | | | | | | | It's deprecated and no longer used.
| * | | nixos.chrony: add extraFlags config optionRicardo M. Correia2017-02-07
| | | |
| * | | nixos.chrony: pass config file directly to daemonRicardo M. Correia2017-02-07
| | | | | | | | | | | | | | | | | | | | | | | | This fixes an issue where `nixops deploy` wouldn't restart the chrony service when the chrony configuration changed, because it wouldn't detect that `/etc/chrony.conf` was a dependency of the chrony service.
| * | | firewall: Fix check for rpfilter on manual-config kernelsShea Levy2017-02-06
| | | |
| * | | supplicant nixos module: Allow not specifying the configFile pathShea Levy2017-02-05
| | | |
| * | | cjdns service: allow daemon to drop privilegesJoachim Fasting2017-02-05
| | | | | | | | | | | | | | | | | | | | The service can run certain components with reduced privileges, but for that it needs the setuid capability.
| * | | cjdns service: allow writing keys to /etcJoachim Fasting2017-02-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 20e81f7c0d56e0b179115ca72a85b81ff637d909 prevented key generation in `preStart`, leaving the service broken for the case where the user has no pre-existing key. Eventually, we ought to store the state elsewhere so that `/etc` can be read-only but for now we fix this the easy way.
| * | | namecoind: refactor nixos modulernhmjoj2017-02-03
| | | |
| * | | dnschain service: overhaul option interface & implementationrnhmjoj2017-02-03
| | | | | | | | | | | | | | | | Closes https://github.com/NixOS/nixpkgs/pull/22041
| * | | Merge pull request #22303 from abbradar/nfs4Nikolay Amiantov2017-02-03
| |\ \ \ | | | | | | | | | | NFS improvements