about summary refs log tree commit diff
path: root/nixos/modules/services/networking
Commit message (Collapse)AuthorAge
* [bot]: remove unreferenced codevolth2018-07-20
|
* Merge pull request #41745 from rvolosatovs/fix/sshdFranz Pletz2018-07-14
|\ | | | | nixos: Add more ssh-keygen params
| * sshd: Add issue references to services.openssh.authorizedKeysFilesRoman Volosatovs2018-06-12
| |
| * sshd: Support more ssh-keygen parametersRoman Volosatovs2018-06-12
| |
* | Merge pull request #38324 from rvl/znc-uri-prefixxeji2018-07-10
|\ \ | | | | | | znc: add uriPrefix option
| * | znc: add uriPrefix optionRodney Lorrimar2018-04-02
| | | | | | | | | | | | | | | | | | | | | Allows the ZNC web interface to be hosted behind a reverse proxy as a subdirectory. https://wiki.znc.in/Reverse_Proxy#As_subdirectory
* | | nixos: Add option networking.networkmanager.dynamicHostsRickard Nilsson2018-07-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | This allows non-privileged users to configure local DNS entries by editing hosts files read by NetworkManager's dnsmasq instance. Cherry-picked from e6c3d5a507909c4e0c0a5013040684cce89c35ce and 5a566004a2b12c3d91bf0acdb704f1b40770c28f.
* | | quagga module: Use a deep merge via imports instead of the shallow mergeGraham Christensen2018-07-05
| | | | | | | | | | | | | | | | | | The deep merge caused all the options to be unset when generating docs, unless quagga was enabled. Using imports, instead, properly allows the documentation to be generated.
* | | supplicant: Fix tiny typo in the documentationIngo Blechschmidt2018-07-04
| | |
* | | Merge pull request #42860 from ldesgoui/fix-murmur-serviceSilvan Mosberger2018-07-03
|\ \ \ | | | | | | | | murmur service: prevent silent launch failure by waiting until network is available
| * | | murmur: prevent silent launch failureldesgoui2018-07-02
| | | |
* | | | Merge pull request #41222 from gnidorah/firewallSilvan Mosberger2018-07-03
|\ \ \ \ | | | | | | | | | | nixos/firewall: per-interface port options
| * | | | nixos/firewall: per-interface port optionsgnidorah2018-06-24
| | | | |
* | | | | Merge pull request #42798 from flokli/users-usersMichael Raskin2018-07-02
|\ \ \ \ \ | |_|/ / / |/| | | | tree-wide: users.extraUsers -> users.users, users.extraGroups -> users.groups
| * | | | nixos/modules: users.(extraUsers|extraGroup->users|group)Florian Klink2018-06-30
| | | | |
* | | | | iwd: set statedir to /var/lib/iwdJörg Thalheim2018-07-01
| | | | |
* | | | | Merge pull request #42709 from jollheef/masteradisbladis2018-06-30
|\ \ \ \ \ | |/ / / / |/| | | | hostapd: use WPA2 instead of WPA1 by default
| * | | | hostapd: use WPA2 instead of WPA1 by defaultMikhail Klementev2018-06-30
| | | | |
* | | | | networkmanager: Expand dns description, integrate with other services (#41898)Benjamin Staffin2018-06-29
| | | | | | | | | | | | | | | | | | | | | | | | | Rather than special-casing the dns options in networkmanager.nix, use the module system to let unbound and systemd-resolved contribute to the newtorkmanager config.
* | | | | zerotier: interface names changed; fix no dhcpJesper Geertsen Jonsson2018-06-27
|/ / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | Since ZT v1.2.8: ZT interface names are no longer named zt<sequence number>. Instead they are by default named zt<network hash>. https://www.zerotier.com/blog/2018-05-04-128.shtml
* | | | nixos/strongswan-swanctl: Fix build of manualaszlig2018-06-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Commit 401370287a9b74fc18539fe9c0bdc7ac9df9cf22 introduced a small error where the closing tag of <literal/> was an opening tag instead. Signed-off-by: aszlig <aszlig@nix.build> Cc: @basvandijk, @xeji
* | | | Merge pull request #42518 from LumiGuide/strongswan-swanctl-5.6.3xeji2018-06-25
|\ \ \ \ | | | | | | | | | | strongswan-swanctl: adapt options to strongswan-5.6.3
| * | | | strongswan-swanctl: adapt options to strongswan-5.6.3Bas van Dijk2018-06-24
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This time there was only one change between 5.6.2..5.6.3: https://github.com/strongswan/strongswan/commit/2c7a4b07045786ee493021020e2ad5bd6bb4d045
* | | | | chrony: disable the whole timesyncd module when chronyd is enabledBas van Dijk2018-06-22
|/ / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Peviously only the timesyncd systemd unit was disabled. This meant that when you activate a system that has chronyd enabled the following strange startup behaviour takes place: systemd[1]: Starting chrony NTP daemon... systemd[1]: Stopping Network Time Synchronization... systemd[1]: Stopped chrony NTP daemon. systemd[1]: Starting Network Time Synchronization...
* | | | Merge pull request #41485 from teto/owampMatthew Justin Bauer2018-06-20
|\ \ \ \ | | | | | | | | | | [RDY] Owamp : Get one way (network) latencies between synchronized computers
| * | | | owamp: adding moduleMatthieu Coudron2018-06-05
| |/ / / | | | | | | | | | | | | | | | | You can retrieve the one way latency between your client and the remote host via owping.
* | | | nixos/networkmanager: add extraConfigYegor Timoshenko2018-06-18
| | | |
* | | | nixos/xrdp: add fonts.enableDefaultFontsvolth2018-06-17
| | | |
* | | | Merge pull request #37289 from disassembler/dnsdistxeji2018-06-13
|\ \ \ \ | | | | | | | | | | nixos/dnsdist: init module
| * | | | nixos/dnsdist: initial serviceSamuel Leathers2018-05-02
| | | | |
* | | | | nixos/tinc: minor fixesvolth2018-06-12
| | | | |
* | | | | nixos/nat: optional networking.nat.externalInterface (#41864)volth2018-06-12
| | | | | | | | | | | | | | | to prevent "cannot coerce null to string" raise before the assertions are checked
* | | | | nixos/unbound: add restart (#41885)volth2018-06-12
| | | | |
* | | | | nixos/nat: optional networking.nat.externalInterface (#41758)volth2018-06-10
| | | | |
* | | | | sshd: change location of config file (#41744)Izorkin2018-06-10
| |_|_|/ |/| | | | | | | create symlink /etc/ssh/sshd_config
* | | | nixos/sslh: add transparent proxying support (#41412)volth2018-06-09
| | | | | | | | | | | | | | | | | | | | | | | | [x] Support transparent proxying. This means services behind sslh (Apache, sshd and so on) will see the external IP and ports as if the external world connected directly to them. [x] Run sslh daemon as unprivileged user instead of root (it is not only for security, transparent proxying requires it) [x] Removed pidFile support (it is not compatible with running sslh daemon as unprivileged user) [x] listenAddress default changed from "config.networking.hostName" (which resolves to meaningless "127.0.0.1" as with current /etc/hosts production) to "0.0.0.0" (all addresses)
* | | | Merge pull request #34886 from leenaars/mortyproxyJoachim F2018-06-02
|\ \ \ \ | | | | | | | | | | morty: init -> 0.2.0
| * | | | morty: init as serviceMichiel Leenaars2018-05-30
| | |/ / | |/| |
* | | | Merge pull request #40171 from teto/ntpMatthew Justin Bauer2018-06-01
|\ \ \ \ | | | | | | | | | | [RDY] openntpd: make -s flag work
| * | | | openntpd: make -s flag workMatthieu Coudron2018-05-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | after seeing `adjtime failed: Invalid argument` in my syslog, I tried using `ntpd -s` but it would trigger `/etc/ntpd.conf: No such file or directory` see https://github.com/NixOS/nixpkgs/issues/31885 Instead of running the daemon with a specific config file, use the standard file so that user are able to use the ntp executable without having to look for the current config file.
* | | | | Merge pull request #40692 from Izorkin/sshdMatthew Justin Bauer2018-06-01
|\ \ \ \ \ | | | | | | | | | | | | sshd: add custom options
| * | | | | sshd: add custom optionsIzorkin2018-05-19
| | | | | |
* | | | | | dnscrypt-proxy: make man 8 dnscrypt-proxy work (#41039)coretemp2018-05-31
| | | | | |
* | | | | | nixos/bind: Allow to set extra optionsaszlig2018-05-30
| |_|/ / / |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | BIND doesn't allow the options section (or any section I'd guess) to be defined more than once, so whenever you want to set an additional option you're stuck using weird hacks like this: services.bind.forwarders = lib.mkForce [ "}; empty-zones-enable no; #" ]; This basically exploits the fact that values coming from the module options aren't escaped and thus works in a similar vain to how SQL injection works. Another option would be to just set configFile to a file that includes all the options, including zones. That obviously makes the configuration way less extensible and more awkward to use with the module system. To make sure this change does work correctly I added a small test just for that. The test could use some improvements, but better to have a test rather than none at all. For a future improvement the test could be merged with the NSD test, because both use the same zone file format. This change has been reviewed in #40053 and after not getting any opposition, I'm hereby adding this to master. Signed-off-by: aszlig <aszlig@nix.build> Cc: @peti, @edolstra Closes: #40053
* | | | | Merge pull request #40801 from xeji/test/dnscrypt-proxySamuel Leathers2018-05-19
|\ \ \ \ \ | | | | | | | | | | | | nixos/dnscrypt-proxy: fix apparmor profile and test
| * | | | | nixos/dnscrypt-proxy: fix apparmor profile and testUli Baum2018-05-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Test failed because of an incomplete apparmor profile. - fix apparmor profile - improve test timing, prevent non-deterministic failure
* | | | | | nixos/cjdns: fix service for i686 (#40740)xeji2018-05-20
|/ / / / / | | | | | | | | | | | | | | | service failed to start because of MemoryDenyWriteExecute = true, which seems not to work on i686
* / / / / wireguard: Enable tools on other platformsKirill Elagin2018-05-19
|/ / / / | | | | | | | | | | | | | | | | | | | | Wireguard is now split into two pretty much independent packages: `wireguard` (Linux-specific kernel module) and `wireguard-tools`, which is cross-platform.
* | | | Add stubby resolver daemon service module (#38667)baroncharlus2018-05-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * networking/stubby.nix: implementing systemd service module for stubby This change implements stubby, the DNS-over-TLS stub resolver daemon. The motivation for this change was the desire to use stubby's DNS-over-TLS funcitonality in tandem with unbound, which requires passing certain configuration parameters. This module implements those config parameters by exposing them for use in configuration.nix. * networking/stubby.nix: merging back module list re-merging the module list to remove unecessary changes. * networking/stubby.nix: removing unecessary capabilities flag This change removes the unecessary flag for toggling the capabilities which allows the daemon to bind to low ports. * networking/stubby.nix: adding debug level logging bool Adding the option to turn on debug logging. * networking/stubby.nix: clarifying idleTimeout and adding systemd target Improving docs to note that idleTimeout is expressed in ms. Adding the nss-lookup `before' target to the systemd service definition. * networking/stubby.nix: Restrict options with types.enum This change restricts fallbackProtocol and authenticationMode to accept only valid options instead of any list or str types (respectively). This change also fixes typo in the CapabilityBoundingSet systemd setting. * networking/stubby.nix: cleaning up documentation Cleaning up docs, adding literal tags to settings, and removing whitespace. * networking/stubby.nix: fixing missing linebreak in comments * networking/stubby.nix: cleaning errant comments
* | | | nixos: rename system.{stateVersion,defaultChannel} -> system.nixos.\1Jan Malakhovski2018-05-12
| | | |