summary refs log tree commit diff
path: root/nixos/modules/services
Commit message (Collapse)AuthorAge
* symlinkJoin: accept set as an argument with additional optionsNikolay Amiantov2016-04-26
|
* Merge pull request #14977 from jerith666/crashplan-46-r3Arseniy Seroka2016-04-25
|\ | | | | Crashplan: 4.6.0-r2 -> 4.6.0-r3
| * crashplan: always overwrite binaries in /var/lib/ to ensure that updates are ↵Matt McHenry2016-04-25
| | | | | | | | applied fully
* | treewide: Use correct output of config.nix.package in non-string contextsTuomas Tynkkynen2016-04-25
| |
* | treewide: Use correct output in ${config.nix.package}/binTuomas Tynkkynen2016-04-25
| |
* | nix-daemon service: Don't have the output in the `nix.package' optionTuomas Tynkkynen2016-04-25
| | | | | | | | | | | | 1) It unnecessarily exposes implementation details. 2) It breaks all existing configs that have e.g. `nix.package = pkgs.nixUnstable;`.
* | zerobin service : initThéophane Hufschmitt2016-04-25
| |
* | nixos: rename chroot* to sandbox*Vladimír Čunát2016-04-25
| | | | | | | | | | On Nix side this was done months ago: https://github.com/NixOS/nix/pull/682
* | kerberos_server: fix evaluation (closes #14928)David Guibert2016-04-24
| |
* | redshift service: run as user serviceFranz Pletz2016-04-24
| | | | | | | | Fixes #14882.
* | Merge pull request #14915 from elitak/unifiJoachim Fasting2016-04-23
|\ \ | | | | | | unifi, mfi: closure-size fix, relocatable data dir
| * | unifi: relocatable data dirEric Litak2016-04-22
| | |
| * | mfi: relocatable data dirEric Litak2016-04-22
| | |
| * | unifi: fix for closure-size changesEric Litak2016-04-22
| | |
* | | emby service: new serviceTristan Helmich2016-04-23
| | |
* | | Merge pull request #14888 from dezgeg/pr-kill-module-init-toolsTuomas Tynkkynen2016-04-23
|\ \ \ | |/ / |/| | Delete all usages of module_init_tools and remove the package
| * | treewide: Replace module_init_tools -> kmodTuomas Tynkkynen2016-04-22
| | | | | | | | | | | | | | | The former is deprecated and doesn't handle compressed kernel modules, so all current usages of it are broken.
* | | Merge branch 'staging'Vladimír Čunát2016-04-22
|\ \ \ | | | | | | | | | | | | | | | | This includes a fix to closure-size regression that moved share/doc/*/ to share/doc/
| * | | kde5.startkde: init at 5.5.5Thomas Tuegel2016-04-20
| |/ /
* | | quassel: use qt4 version of the daemon because as of now qt5 version fails ↵Evgeny Egorochkin2016-04-22
| | | | | | | | | | | | to use proxies(connection refused)
* | | hoogle service: fixupsJoachim Fasting2016-04-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Basic hardening - Run as nobody:nogroup with a private /tmp, /home & /run/user - Create working directory under /run (hoogle insists on writing to cwd and otherwise returns "something went wrong" to every query) Option tweaks - Provide a default for the haskellPackage option - Set text values for defaults - Move hoogleEnv to the top-level & simplify it
* | | hoogle service: initWilliam Casarin2016-04-22
|/ /
* | nghttp2: 1.8.0 -> 1.9.2, unify with libnghttp2, and use multiple outputsEelco Dolstra2016-04-18
| | | | | | | | | | | | Note: I ignored the C++ libraries, but it appears we're not currently using them. Once we do, we'll probably want to put them in a separate output as well (to prevent non-C++ users from depending on Boost).
* | nix: Add a "dev" outputEelco Dolstra2016-04-18
| | | | | | | | | | This gets rid of boehm-dev in the closure (as well as Nix's own headers).
* | cups service: use cups.out everywhereJoachim Fasting2016-04-16
| | | | | | | | | | Seeing as the dev output is the default, we probably want cups.out everywhere.
* | cups service: fix missing upstream systemd units caused by output splittingJoachim Fasting2016-04-16
| | | | | | | | | | | | | | | | Need to pass `cups.out` to `systemd.packages`, lest we end up with an invalid generated unit containing only directives set in the service module. This patch gives us a valid cups.service unit but, vexingly, does not fix the test failure at NixOS/nixpkgs#14748
* | dnscrypt-proxy service: fix references to libcap & attrJoachim Fasting2016-04-15
| |
* | Merge pull request #14579 from elitak/factoriojoachifm2016-04-15
|\ \ | | | | | | factorio: 0.12.29 headless + server module
| * | factorio: headless server moduleEric Litak2016-04-14
| | |
* | | fix eval (explicit is better than implicit)Domen Kožar2016-04-15
|/ /
* | nixos/taskserver: Fix reference to certtool.aszlig2016-04-15
| | | | | | | | | | | | | | | | | | | | | | With the merge of the closure-size branch, most packages now have multiple outputs. One of these packages is gnutls, so previously everything that we needed was to reference "${gnutls}/bin/..." and now we need to use "${gnutls.bin}/bin/...". So it's not a very big issue to fix. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* | Merge pull request #14476 (taskserver)aszlig2016-04-15
|\ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This adds a Taskserver module along with documentation and a small helper tool which eases managing a custom CA along with Taskserver organisations, users and groups. Taskserver is the server component of Taskwarrior, a TODO list application for the command line. The work has been started by @matthiasbeyer back in mid 2015 and I have continued to work on it recently, so this merge contains commits from both of us. Thanks particularly to @nbp and @matthiasbeyer for reviewing and suggesting improvements. I've tested this with the new test (nixos/tests/taskserver.nix) this branch adds and it fails because of the changes introduced by the closure-size branch, so we need to do additional work on base of this.
| * | nixos/taskserver/doc: Improve example org nameaszlig2016-04-14
| | | | | | | | | | | | | | | | | | | | | | | | | | | Suggested by @nbp: "Choose a better organization name in this example, such that it is less confusing. Maybe something like my-company" Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver/helper: Fix docstring of add_useraszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | We have already revamped the CLI subcommands in commit e2383b84f88e0e7d35f6a3a846b54c69e3bee6ee. This was just an artifact that was left because of this. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver: Fix wrong option doc referencesaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The options client.allow and client.deny are gone since the commit 8b793d1916387c67f8eeb137789b1b41a1f94537, so let's fix that. No feature changes, only fixes the descriptions of allowedClientIDs and disallowedClientIDs. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver: Restart service on failureaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | This is the recommended way for long-running services and ensures that Taskserver will keep running until it has been stopped manually. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver: Improve service dependenciesaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Using requiredBy is a bad idea for the initialisation units, because whenever the Taskserver service is restarted the initialisation units get restarted as well. Also, make sure taskserver-init.service will be ordered *before* taskserver.service. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver: Set up service namespacesaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | | | | The Taskserver doesn't need access to the full /dev nor does it need a shared /tmp. In addition, the initialisation services don't need network access, so let's constrain them to the loopback device. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver: Finish module documentationaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | | | | Apart from the options manual, this should cover the basics for setting up a Taskserver. I am not a native speaker so this can and (probably) should be improved, especially the wording/grammar. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver/helper: Improve CLI subcommandsaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | Try to match the subcommands to act more like the subcommands from the taskd binary and also add a subcommand to list groups. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver: Set allowedTCPPorts accordinglyaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | As suggested by @matthiasbeyer: "We might add a short note that this port has to be opened in the firewall, or is this done by the service automatically?" This commit now adds the listenPort to networking.firewall.allowedTCPPorts as soon as the listenHost is not "localhost". In addition to that, this is now also documented in the listenHost option declaration and I have removed disabling of the firewall from the VM test. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver: Reorder into one mkMergeaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | No changes in functionality but rather just restructuring the module definitions to be one mkMerge, which now uses mkIf from the top-level scope of the CA initialization service so we can better abstract additional options we might need there. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver/helper: Assert CA existenceaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We want to make sure that the helper tool won't work if the automatic CA wasn't properly set up. This not only avoids race conditions if the tool is started before the actual service is running but it also fails if something during CA setup has failed so the user can investigate what went wrong. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver: Setup CA before main serviceaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | We need to explicitly make sure the CA is created before we actually launch the main Taskserver service in order to avoid race conditions where the preStart phase of the main service could possibly corrupt certificates if it would be started in parallel. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver: Introduce an extraConfig optionaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is simply to add configuration lines to the generated configuration file. The reason why I didn't went for an attribute set is that the taskdrc file format doesn't map very well on Nix attributes, for example the following can be set in taskdrc: server = somestring server.key = anotherstring In order to use a Nix attribute set for that, it would be way too complicated, for example if we want to represent the mentioned example we'd have to do something like this: { server._top = somestring; server.key = anotherstring; } Of course, this would work as well but nothing is more simple than just appending raw strings. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver: Allow to specify expiration/bitsaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | At least this should allow for some customisation of how the certificates and keys are created. We now have two sub-namespaces within PKI so it should be more clear which options you have to set if you want to either manage your own CA or let the module create it automatically. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver: Don't change imperative usersaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Whenever the nixos-taskserver tool was invoked manually for creating an organisation/group/user we now add an empty file called .imperative to the data directory. During the preStart of the Taskserver service, we use process-json which in turn now checks whether those .imperative files exist and if so, it doesn't do anything with it. This should now ensure that whenever there is a manually created user, it doesn't get killed off by the declarative configuration in case it shouldn't exist within that configuration. In addition, we also add a small subtest to check whether this is happening or not and fail if the imperatively created user got deleted by process-json. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver: Silence certtool everywhereaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We only print the output whenever there is an error, otherwise let's shut it up because it only shows information the user can gather through other means. For example by invoking certtool manually, or by just looking at private key files (the whole blurb it's outputting is in there as well). Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver/helper: Implement deletionaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Now we finally can delete organisations, groups and users along with certificate revocation. The new subtests now make sure that the client certificate is also revoked (both when removing the whole organisation and just a single user). If we use the imperative way to add and delete users, we have to restart the Taskserver in order for the CRL to be effective. However, by using the declarative configuration we now get this for free, because removing a user will also restart the service and thus its client certificate will end up in the CRL. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
| * | nixos/taskserver: Add a command to reload serviceaszlig2016-04-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Unfortunately we don't have a better way to check whether the reload has been done successfully, but at least we now *can* reload it without figuring out the exact signal to send to the process. Note that on reload, Taskserver will not reload the CRL file. For that to work, a full restart needs to be done. Signed-off-by: aszlig <aszlig@redmoonstudios.org>