about summary refs log tree commit diff
path: root/nixos/modules/services/networking
Commit message (Collapse)AuthorAge
* Merge pull request #2790 from ehmry/unboundPeter Simons2014-05-30
|\ | | | | unbound: update from 1.4.21 to 1.4.22, service from Upstart to systemd
| * unbound: update from 1.4.21 to 1.4.22, service from Upstart to systemdEmery Hemingway2014-05-29
| |
* | Add TeamSpeak 3 server & service module (close #2056)Alexei Robyn2014-05-27
|/ | | | | | Conflicts (trivial): lib/maintainers.nix nixos/modules/misc/ids.nix
* Merge pull request #2424 from wkennington/cache.sshKeyMichael Raskin2014-05-27
|\ | | | | ssh: Support knownHost public keys as strings
| * sshd: Fix typing for options which take pathsWilliam A. Kennington III2014-05-01
| |
| * ssh: Support knownHost public keys as stringsWilliam A. Kennington III2014-05-01
| |
* | notbit: Add additional options to the daemonWilliam A. Kennington III2014-05-13
| |
* | notbit: Don't include unecessary notbit binaries in the environmentWilliam A. Kennington III2014-05-13
| |
* | notbit: Use the correct default portWilliam A. Kennington III2014-05-13
| |
* | dhcpcd: Allow adding hook codeWout Mertens2014-05-12
| |
* | Containers: Use systemd-nspawn's --network-veth flagEelco Dolstra2014-05-07
| | | | | | | | | | Note that this causes the name of the host-side interface to change from c-<name> to ve-<name>.
* | btsync: Default to no login/password for the Web UIAustin Seipp2014-05-02
| | | | | | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | btsync: remove unneeded assertionAustin Seipp2014-05-01
|/ | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* wpa_supplicant: Restart when wlan devices (dis)appearEelco Dolstra2014-04-28
|
* nixos: only enable spipe when user specifiesAustin Seipp2014-04-25
| | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* Remove outdated remarkEelco Dolstra2014-04-24
|
* dhcpcd: Fix segfaultsEelco Dolstra2014-04-24
| | | | | | | | | | | | | | This fixes several problems in the dhcpcd service: * A segfault during startup, due to a race with udev (dhcpcd would get an ADD event from udev, causing it to re-add an interface that it already had, leading to a segfault later on). * A hang/segfault processing "dhcpcd rebind" (which NixOS calls after waking up from suspend). Also, add "lo" to the list of ignored interfaces. It usually ignores "lo", but apparently not when it gets an ADD event from udev.
* Remove some dead codeEelco Dolstra2014-04-24
|
* sshd: Add support for socket activationEelco Dolstra2014-04-22
| | | | | | | | | By enabling ‘services.openssh.startWhenNeeded’, sshd is started on-demand by systemd using socket activation. This is particularly useful if you have a zillion containers and don't want to have sshd running permanently. Note that socket activation is not noticeable slower, contrary to what the manpage for ‘sshd -i’ says, so we might want to make this the default one day.
* sshd: Always start a sessionEelco Dolstra2014-04-22
| | | | | | Partially reverts 70a4c7b1dfdb238d3729c3f71127538943a43afd. Whether to start a session is independent of whether we're running in a container.
* openvpn: Add systemd startup notificationEelco Dolstra2014-04-22
| | | | | | | | | | | | | This causes OpenVPN services to reach the "active" state when the VPN connection is up (i.e., after OpenVPN prints "Initialization Sequence Completed"). This allows units to be ordered correctly after openvpn-* units, and makes systemctl present a password prompt: $ start openvpn-foo Enter Private Key Password: ************* (I first tried to implement this by calling "systemd-notify --ready" from the "up" script, but systemd-notify is not reliable.)
* Firewall: Only start if we have CAP_NET_ADMINEelco Dolstra2014-04-19
|
* Set $LOCALE_ARCHIVE in all systemd unitsEelco Dolstra2014-04-18
| | | | | | This variable used to be inherited implicitly from the stage-2 script, but systemd now clears the environment. So we need to set it explicitly.
* Remove dhcpcd_without_udev attributeEelco Dolstra2014-04-18
|
* Work around apparent dhcpcd bugEelco Dolstra2014-04-18
|
* Slight test speedupEelco Dolstra2014-04-18
| | | | Don't do a pointless ARP check in dhcpcd.
* firewall: Order after systemd-modules-load.serviceEelco Dolstra2014-04-17
| | | | This ensures that connection tracking modules are loaded on time.
* nixos: add spiped service moduleAustin Seipp2014-04-15
| | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* Rewrite ‘with pkgs.lib’ -> ‘with lib’Eelco Dolstra2014-04-14
| | | | | | | | Using pkgs.lib on the spine of module evaluation is problematic because the pkgs argument depends on the result of module evaluation. To prevent an infinite recursion, pkgs and some of the modules are evaluated twice, which is inefficient. Using ‘with lib’ prevents this problem.
* Fix tests broken due to the firewall being enabled by defaultEelco Dolstra2014-04-11
|
* Use iptables' ‘-w’ flagEelco Dolstra2014-04-11
| | | | | | | This prevents errors like "Another app is currently holding the xtables lock" if the firewall and NAT services are starting in parallel. (Longer term, we should probably move to a single service for managing the iptables rules.)
* Fix NAT moduleEelco Dolstra2014-04-11
|
* Merge branch 'containers'Eelco Dolstra2014-04-10
|\ | | | | | | Fixes #2105.
| * Add option networking.nat.internalInterfacesEelco Dolstra2014-04-10
| | | | | | | | This allows applying NAT to an interface, rather than an IP range.
| * Add support for running a container with a private network interfaceEelco Dolstra2014-03-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | For example, the following sets up a container named ‘foo’. The container will have a single network interface eth0, with IP address 10.231.136.2. The host will have an interface c-foo with IP address 10.231.136.1. systemd.containers.foo = { privateNetwork = true; hostAddress = "10.231.136.1"; localAddress = "10.231.136.2"; config = { services.openssh.enable = true; }; }; With ‘privateNetwork = true’, the container has the CAP_NET_ADMIN capability, allowing it to do arbitrary network configuration, such as setting up firewall rules. This is secure because it cannot touch the interfaces of the host. The helper program ‘run-in-netns’ is needed at the moment because ‘ip netns exec’ doesn't quite do the right thing (it remounts /sys without bind-mounting the original /sys/fs/cgroups).
* | Merge pull request #2199 from offlinehacker/nixos/ntp/containers_fixPeter Simons2014-04-10
|\ \ | | | | | | nixos: disable ntp on containers by default
| * | nixos: disable ntp on containers by defaultJaka Hudoklin2014-04-10
| | |
* | | cjdns: update to 20130303Emery Hemingway2014-04-09
|/ / | | | | | | | | build system is now nodejs based new nixos module to start cjdns
* | Enable the firewall by defaultEelco Dolstra2014-04-08
| | | | | | | | Fixes #2135.
* | Merge branch 'murmur' of git://github.com/thoughtpolice/nixpkgsShea Levy2014-04-05
|\ \ | | | | | | | | | | | | | | | | | | nixos: add Murmur module (Mumble chat) Conflicts: nixos/modules/misc/ids.nix
| * | nixos: murmur serviceAustin Seipp2014-04-02
| | | | | | | | | | | | | | | | | | Murmur is the headless server component of the Mumble chat system. Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | | syncthing: add preStart script to create dataDirDomen Kožar2014-04-04
| | |
* | | syncthing: new package and nixos moduleMatej Cotman2014-04-04
|/ /
* | Merge branch 'nixos/containers/fix1' of git://github.com/offlinehacker/nixpkgsShea Levy2014-03-28
|\ \ | | | | | | | | | nixos: fix linux containers (systemd-nspawn, lxc, lxc-libvirt)
| * | nixos: fix linux containers (systemd-nspawn, lxc, lxc-libvirt)Jaka Hudoklin2014-03-24
| |/ | | | | | | | | | | - Make dhcp work, use dhcpcd without udev in container - Make login shell work, patch getty to not wait for /dev/tty0 - Make ssh work, sshd/pam do not start session
* | nixos: add BitTorrent Sync service moduleAustin Seipp2014-03-20
| | | | | | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | Add ngircd moduleShea Levy2014-03-19
|/
* notbit: Add systemd service for a system daemonWilliam A. Kennington III2014-03-15
|
* firewall: Allow setting rate limits for pingsShea Levy2014-03-14
|
* UID/GID fix for kippoThomas Bereknyei2014-03-12
|