about summary refs log tree commit diff
path: root/nixos/modules/services/security
Commit message (Collapse)AuthorAge
* nixos/esdm: simplify moduleMarkus Theil2024-03-11
| | | | | | | | | | | | | | | ESDM 1.0.1 fixed bugs related to Linux compatibility layer with CUSE. During these fixes, the compatibility layer was simplified behind a target in order to start the necessary services together or none of them (services.esdm.linuxCompatServices). Furthermore, a small helper was added to ESDM 1.0.1 in order to deal with resume/suspend/hibernate (FUSE needs to be unblocked). Removed options are marked. Signed-off-by: Markus Theil <theil.markus@gmail.com>
* nixos/yubikey-agent: fix eval errorFlorian Klink2024-03-10
| | | | | This has been refactored in https://github.com/NixOS/nixpkgs/ pull/133542, but this reference wasn't updated.
* Merge pull request #133542 from fpletz/refactor/pinentry-remove-multiple-outputsSandro2024-03-09
|\ | | | | pinentry: remove multiple outputs
| * pinentry: remove multiple outputs packageFranz Pletz2024-03-02
| | | | | | | | fixes #133156 #124753
* | nixos/vaultwarden: set meta.maintainers to package maintainerSandro Jäckel2024-03-04
| |
* | nixos/vaultwarden: drop aliasesSandro Jäckel2024-03-02
|/
* Merge pull request #280628 from ↵Kerstin2024-02-29
|\ | | | | | | | | h7x4/nixos-module-update-kanidm-add-backup-dir-to-bindpaths nixos/kanidm: declare `online_backup` options
| * nixos/kanidm: declare `online_backup` optionsh7x42024-01-12
| |
* | opensnitch: 1.6.4 -> 1.6.5, opensnitch-ui: 1.6.4 -> 1.6.5.1Jonas Heinrich2024-02-12
| |
* | kanidm: 1.1.0-rc.15 -> 1.1.0-rc.16Tom Hubrecht2024-02-07
| | | | | | | | Release notes: https://github.com/kanidm/kanidm/releases/tag/v1.1.0-rc.16
* | nixos/intune: initRhys Davies2024-02-02
| |
* | Bitwarden directory connector: fix bad preStartBrendan Golden2024-01-28
| |
* | nixos/clamav: fix network-online requires asserthappysalada2024-01-21
| |
* | nixos: fix a bunch of services missing dep on network-online.targetJade Lovelace2024-01-19
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This was done by generating a truly hilarious configuration: rg 'services\.[^.]+\.enable\t' opts-tags | cut -f1 > allonconfig.nix The following were not tested due to other evaluation errors. They should probably be manually audited. services.amule services.castopod services.ceph services.chatgpt-retrieval-plugin services.clamsmtp services.clight services.dante services.dex services.discourse services.dwm-status services.engelsystem services.foundationdb services.frigate services.frp services.grocy services.guacamole-client services.hedgedoc services.home-assistant services.honk services.imaginary services.jitsi-meet services.kerberos_server services.limesurvey services.mastodon services.mediawiki services.mobilizon services.moodle services.mosquitto services.nextcloud services.nullmailer services.patroni services.pfix-srsd services.pgpkeyserver-lite services.postfixadmin services.roundcube services.schleuder services.self-deploy services.slskd services.spacecookie services.statsd services.step-ca services.sympa services.tsmBackup services.vdirsyncer services.vikunja services.yandex-disk services.zabbixWeb
* | Merge pull request #259849 from Scrumplex/nixos/vaultwarden/backupDirCreateNick Cao2024-01-08
|\ \ | |/ |/| nixos/vaultwarden: create backupDir using tmpfiles.d
| * nixos/vaultwarden: add example value for backupDirSefa Eyeoglu2024-01-03
| | | | | | | | Signed-off-by: Sefa Eyeoglu <contact@scrumplex.net>
| * nixos/vaultwarden: create backupDir using tmpfiles.dSefa Eyeoglu2024-01-03
| | | | | | | | Signed-off-by: Sefa Eyeoglu <contact@scrumplex.net>
* | Merge pull request #265783 from Silver-Golden/bitwarden-directory-connector_pkgsNick Cao2024-01-07
|\ \ | |/ |/| Bitwarden directory connector: init
| * nixos/bitwarden-directory-connector: init at versionBrendan Golden2024-01-07
| | | | | | | | Added the module to use bitwarden-directory-connector.
* | Merge pull request #276159 from AtaraxiaSjel/fix/tor-obfs4proxyNick Cao2024-01-01
|\ \ | |/ |/| nixos/tor: fix transport plugin exe name
| * nixos/tor: fix transport plugin exe nameDmitriy Kholkin2023-12-29
| |
* | Merge pull request #275080 from SomeoneSerge/feat/munge-systemdmarkuskowa2023-12-30
|\ \ | |/ |/| nixos/munge: update the systemd service
| * nixos/munge: restart "on-failure" (the default was "no")Someone Serge2023-12-17
| |
| * nixos/munge: run in foreground instead of using pidfileSomeone Serge2023-12-17
| | | | | | | | Confuse systemd less
| * nixos/munge: ask for the optional time-sync.targetSomeone Serge2023-12-17
| |
| * nixos/munge: ask for network-online instead of network.targetSomeone Serge2023-12-17
| |
* | nixos.shibboleth-sp: remove jammerful from meta.maintainersAnderson Torres2023-12-09
|/
* nixos/clamav: add scanner servicehappysalada2023-12-05
|
* nixos/clamav: fix /run/clamav being removedhappysalada2023-12-05
|
* treewide: replace `mkPackageOptionMD` with `mkPackageOption`h7x42023-11-30
|
* Merge pull request #261702 from h7x4/replace-mkoption-with-mkpackageoptionWeijia Wang2023-11-30
|\ | | | | treewide: use `mkPackageOption`
| * treewide: use `mkPackageOption`h7x42023-11-27
| | | | | | | | | | This commit replaces a lot of usages of `mkOption` with the package type, to be `mkPackageOption`, in order to reduce the amount of code.
* | nixos/fail2ban: fix default value for banaction-allportsfasheng2023-11-29
| | | | | | | | | | It's iptables-allports instead of iptables-allport. https://github.com/fail2ban/fail2ban/tree/master/config/action.d
* | nixos/clamav: ensure freshclam starts before clamav (if enabled)Someone Serge2023-11-28
|/
* nixos/clamav: add fangfrisch updaterhappysalada2023-11-24
|
* nixos/clamav: run as clamav user not roothappysalada2023-11-22
|
* nixos/clamav: use state and runtime directoryhappysalada2023-11-22
|
* nixos/postgresql: drop ensurePermissions, fix ensureUsers for postgresql15Maximilian Bosch2023-11-13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Closes #216989 First of all, a bit of context: in PostgreSQL, newly created users don't have the CREATE privilege on the public schema of a database even with `ALL PRIVILEGES` granted via `ensurePermissions` which is how most of the DB users are currently set up "declaratively"[1]. This means e.g. a freshly deployed Nextcloud service will break early because Nextcloud itself cannot CREATE any tables in the public schema anymore. The other issue here is that `ensurePermissions` is a mere hack. It's effectively a mixture of SQL code (e.g. `DATABASE foo` is relying on how a value is substituted in a query. You'd have to parse a subset of SQL to actually know which object are permissions granted to for a user). After analyzing the existing modules I realized that in every case with a single exception[2] the UNIX system user is equal to the db user is equal to the db name and I don't see a compelling reason why people would change that in 99% of the cases. In fact, some modules would even break if you'd change that because the declarations of the system user & the db user are mixed up[3]. So I decided to go with something new which restricts the ways to use `ensure*` options rather than expanding those[4]. Effectively this means that * The DB user _must_ be equal to the DB name. * Permissions are granted via `ensureDBOwnerhip` for an attribute-set in `ensureUsers`. That way, the user is actually the owner and can perform `CREATE`. * For such a postgres user, a database must be declared in `ensureDatabases`. For anything else, a custom state management should be implemented. This can either be `initialScript`, doing it manual, outside of the module or by implementing proper state management for postgresql[5], but the current state of `ensure*` isn't even declarative, but a convergent tool which is what Nix actually claims to _not_ do. Regarding existing setups: there are effectively two options: * Leave everything as-is (assuming that system user == db user == db name): then the DB user will automatically become the DB owner and everything else stays the same. * Drop the `createDatabase = true;` declarations: nothing will change because a removal of `ensure*` statements is ignored, so it doesn't matter at all whether this option is kept after the first deploy (and later on you'd usually restore from backups anyways). The DB user isn't the owner of the DB then, but for an existing setup this is irrelevant because CREATE on the public schema isn't revoked from existing users (only not granted for new users). [1] not really declarative though because removals of these statements are simply ignored for instance: https://github.com/NixOS/nixpkgs/issues/206467 [2] `services.invidious`: I removed the `ensure*` part temporarily because it IMHO falls into the category "manage the state on your own" (see the commit message). See also https://github.com/NixOS/nixpkgs/pull/265857 [3] e.g. roundcube had `"DATABASE ${cfg.database.username}" = "ALL PRIVILEGES";` [4] As opposed to other changes that are considered a potential fix, but also add more things like collation for DBs or passwords that are _never_ touched again when changing those. [5] As suggested in e.g. https://github.com/NixOS/nixpkgs/issues/206467
* privacyidea: removeMaximilian Bosch2023-10-31
| | | | | | | | | | | | | | | | | Related to #262907 (Django3 removal from nixpkgs). This package already required an unreasonable amount of maintenance regularly for a such small leaf-package. It has a few highly outdated dependencies (e.g. flask 1, jinja2 2.11, sqlalchemy 1.3). After at least each Python package-set update one had to fix up a lot of dependencies to fix the package itself, so it was only useful on stable branches. And having so much outdated software in a security-sensitive piece of software seems questionable. Finally, globin and I won't be available for maintaining this now that Mayflower is migrating to another solution (and we'll do that as well) and I'd expect this to bitrot extremely quick if we both bail out.
* Merge pull request #260275 from thillux/jitterentropy-rngdnikstur2023-10-21
|\ | | | | jitterentropy-rngd: init at 1.2.8
| * jitterentropy-rngd: init at 1.2.8Markus Theil2023-10-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Add jitterentropy-rngd, a tool similar to rng-tools. While not necessarily needed, it is useful for those who want to strengthen their kernel entropy input pool by periodic insertion of an independent source. The entropy source is a NIST SP800-90B compliant non-physical true RNG source on most systems. See the jitterentropy documentation for details (http://chronox.de/jent/doc/CPU-Jitter-NPTRNG.pdf). Signed-off-by: Markus Theil <theil.markus@gmail.com>
* | nixos/fail2ban: change bantime default to not be config breakingSandro Jäckel2023-10-21
| |
* | nixos/opensnitch: fix typo and enable new system rulesChristopher Crouse2023-10-17
| | | | | | | | | | Fixed typo to enable [new system rules](https://github.com/evilsocket/opensnitch/wiki/System-rules#upgrading-from-previous-versions) Fixes: https://github.com/NixOS/nixpkgs/issues/256290
* | nixos/fail2ban: also inherit bantime (#244688)Artturi2023-10-17
|\ \ | | | | | | nixos/fail2ban: also inherit bantime
| * | also inherit bantimeTim2023-07-21
| | |
* | | nixos/tang: create module for tang server (#247037)Jean-François Roche2023-10-16
| |/ |/| | | This commit adds a module for the tang server and the related nixos test.
* | nixos/usbguard: don't use path literal for pure evaluationAndreas Wiese2023-09-27
| | | | | | | | | | | | | | | | PR#256295 reintroduced ruleFile option, but set the default as a path literal, which was a "string path" previously. This breaks evaluation for being impure: error: access to absolute path '/var/lib/usbguard/rules.conf' is forbidden in pure eval mode (use '--impure' to override)
* | Merge pull request #256295 from Janik-Haag/usbguard0x4A6F2023-09-25
|\ \ | | | | | | nixos/usbguard: restore ruleFile option
| * | nixos/usbguard: restore ruleFile optionJanik H.2023-09-20
| | |
* | | nixos/vaultwarden: Fix doubly-nested `config` value. Fixes evaluationNiklas Hambüchen2023-09-19
|/ /