Commit Graph

1146 Commits

Author SHA1 Message Date
Aleksana
9d3f5fcfcc dn42-cacert: init at 0-unstable-2016-01-16 (#415051) 2025-09-29 15:12:49 +00:00
Benjamin Staffin
b558c287b2 nixos/ipa: fix path to ldap.conf (#435054) 2025-09-25 12:54:22 +00:00
Wolfgang Walther
9b54e00268 google-guest-oslogin: 20230831.00 -> 20250821.00; nixos/google_oslogin: run as root (#445029) 2025-09-25 09:59:22 +00:00
h7x4
4ba3f60b8a various: use mkPackageOption 2025-09-22 02:46:54 +02:00
Michael Daniels
b385068794 nixos/google_oslogin: run as root
This is needed in order to read the files in /var/google-users.d, as the program
sets the permissions to 750 and the user and group to root.

See: https://github.com/GoogleCloudPlatform/guest-oslogin/blob/20250821.00/src/oslogin_utils.cc#L1337-L1338
2025-09-21 14:57:04 -04:00
Cryolitia PukNgae
43a1f18c34 nixos/pki: change certificateFiles's example to DN42 root cert
The original example is not a good example, `pkgs.cacert` does not need to appear in `security.pki.certificateFiles`, instead, `certificateFiles` will eventually override the input of pkgs.cacert to build the final `caBundle`. Replacing the example with DN42 will both remind users that we are now packaging DN42's root certificates and eliminate the confusion in the previous example.
2025-09-13 15:54:39 +08:00
Johannes Kirschbauer
3e38f2bd53 nixos/modules: agnos use correct type in freeformType 2025-09-05 18:04:32 +02:00
Marie Ramlow
e6393736cb nixos/sudo-rs: add sudoedit wrapper 2025-08-26 10:35:55 +02:00
Adam C. Stephens
8aaa86b149 sudo-rs: add pam.services.su-l for su -l (#431219) 2025-08-24 16:58:52 -04:00
nixpkgs-ci[bot]
53fe08332e Merge master into staging-next 2025-08-21 20:43:13 +00:00
K900
35d0bafabf nixos/treewide: clean up Plasma 5 references
Preparing to drop.
2025-08-21 22:31:56 +03:00
Benjamin Staffin
579ef71b96 nixos/ipa: fix path to ldap.conf
I don't know when this changed, but the openldap client looks for
/etc/ldap.conf now, not /etc/openldap/ldap.conf.
2025-08-19 13:26:29 -04:00
Fabián Heredia Montiel
675812fca5 Merge remote-tracking branch 'origin/master' into staging-next 2025-08-14 09:23:01 -06:00
Leona Maroni
9b8ea589ea nixos/acme: improve scalability - reduce superfluous unit activations (#422076) 2025-08-14 16:06:06 +02:00
Christian Theune
2c111ce343 nixos/acme: update release notes and documentation 2025-08-13 14:34:53 +02:00
K900
a6809ffcc6 nixos/pam: enable lastlog2 import service if any pam service uses lastlog (#432567) 2025-08-11 13:22:51 +03:00
Grimmauld
a1d47a4ca3 nixos/pam: fix lastlog2 import service 2025-08-11 10:37:49 +02:00
nikstur
0d9a5c2059 nixos/fuse: add enable option
Fuse is stil enabled by default so the default behaviour of NixOS
doesn't change. However, now it's possible to actively exclude fuse when
you don't need it.
2025-08-10 22:43:39 +02:00
nikstur
d5ae87bdeb Revert "nixos: allow more things to be disabled" 2025-08-10 22:22:08 +02:00
nixpkgs-ci[bot]
d50fd904cb Merge master into staging-next 2025-08-10 18:05:04 +00:00
Arian van Putten
1bb040fae8 nixos: allow more things to be disabled (#429695) 2025-08-10 19:49:52 +02:00
Grimmauld
f3cd67c5b7 nixos/pam: enable lastlog2 import service if any pam service uses lastlog 2025-08-10 18:55:04 +02:00
K900
801b363af8 nixos/pam: switch to lastlog2 (#429203) 2025-08-10 11:13:57 +03:00
nikstur
439d68b58d nixos/audit: fix journald test
Makes the audit module responsible for setting up the audit subsystem of
the kernel. The auditd module is now only responsible for setting up the
daemon.

Enable the audit subsystem early via kernelParams.

Increase the default audit backlog limit so that it works out of the box
for a normal system.

Remove a superfluous and pointless test case.
2025-08-09 15:00:41 +02:00
Christian Theune
98ecc9035d nixos/acme: switch concurrency limit to a runtime-based implementation
The previous implementation caused triggers on many units when adding
or removing certificates because the baked-in lock file assignments
changed.
2025-08-08 16:28:57 +02:00
Christian Theune
2d0a489125 nixos/acme: improve scalability - reduce superfluous unit activations
The previous setup caused all renewal units to be triggered upon
ever so slight changes in config. In larger setups (100+ certificates)
adding a new certificate caused high system load and/or large memory
consumption issues. The memory issues are already a alleviated with
the locking mechanism. However, this then causes long delays upwards
of multiple minutes depending on individual runs and also caused
superfluous activations.

In this change we streamline the overall setup of units:

1. The unit that other services can depend upon is 'acme-{cert}.service'.
We call this the 'base unit'. As this one as `RemainAfterExit` set
the `acme-finished-{cert}` targets are not required any longer.

2. We now always generate initial self-signed certificates to simplify
the dependency structure. This deprecates the `preliminarySelfsigned`
option.

3. The `acme-order-renew-{cert}` service gets activated after the base
unit and services using certificates have started and performs all acme
interactions. When it finishes others services (like web servers) will
be notified through the `reloadServices` option or they can use
`wantedBy` and `after` dependencies if they implement their own reload
units.

The renewal timer also triggers this unit.

4. The timer unit is explicitly blocked from being started by s-t-c.

5. Permission management has been cleaned up a bit: there was an
   inconsistency between having the .lego files set to 600 vs 640
   on the exposed side. This is unified to 640 now.

6. Exempt the account target from being restarted by s-t-c. This will
   happen automatically if something relevant to the account changes.
2025-08-08 16:28:42 +02:00
Adam C. Stephens
7404c06f30 sudo-rs: add pam.services.su-l for su -l 2025-08-05 12:39:29 -04:00
Grimmauld
ee774bb624 nixos/auditd: add built-in plugins (default disabled) 2025-08-03 22:19:26 +02:00
Grimmauld
2c77ad7e9e nixos/auditd: add plugin support 2025-08-03 22:19:23 +02:00
Grimmauld
51a2caecf4 nixos/auditd: support configuring service through nix 2025-08-03 22:19:20 +02:00
nikstur
eca55074cb nixos/fuse: add enable option
Fuse is stil enabled by default so the default behaviour of NixOS
doesn't change. However, now it's possible to actively exclude fuse when
you don't need it.
2025-07-31 20:42:36 +02:00
Grimmauld
d30eeb3ef4 nixos/pam: switch to lastlog2
Adaptation of #282337 to use `util-linux` as `lastlog2` provider

Co-Authored-By: Maxine Aubrey <35892750+amaxine@users.noreply.github.com>
2025-07-31 16:58:55 +02:00
nikstur
796b80f340 Improve security.audit{,d} (#429553) 2025-07-30 19:39:09 +02:00
nikstur
50243c5d78 nixos/auditd: align with upstream
Remove config that doesn't make senes at all or on NixOS specifically.
2025-07-30 17:26:09 +02:00
nikstur
774f6ed203 nixos/audit: add proper enable flag
Align with upstream and also remove unnecessary dependency on bash along
the way.
2025-07-30 17:26:09 +02:00
Will Fancher
0a53886700 nixos/{tmpfiles, wrappers}: explicitly set RestrictSUIDSGID false (#426882) 2025-07-30 04:31:21 -04:00
Thomas Gerbet
a3a0962f23 sudo: 1.9.17p1 -> 1.9.17p2
Changes:
https://www.sudo.ws/releases/stable/#1.9.17p2
2025-07-29 23:24:42 +02:00
Grimmauld
9142cadd5e nixos/pam: point to systemd.settings.Manager 2025-07-28 11:24:16 +02:00
Wolfgang Walther
5a0711127c treewide: run nixfmt 1.0.0 2025-07-24 13:55:40 +02:00
Wolfgang Walther
62fe016519 treewide: run treefmt with mdcr/nixfmt 2025-07-24 13:52:31 +02:00
Grimmauld
5e872a4974 nixos/wrappers: explicitly set RestrictSUIDSGID = false
This ensures the wrapper setup service has permissions
to create suid/sgid files, even if `DefaultRestrictSUIDSGID`
is set in system.conf. `DefaultRestrictSUIDSGID` is
a new feature coming in systemd 258 [1].

[1] https://github.com/systemd/systemd/pull/38126
2025-07-20 12:37:37 +02:00
Pol Dellaiera
a3e8ba327e Google Authenticator 2FA support over XRDP (#407736) 2025-05-28 17:57:00 +00:00
Tristan Ross
a6c170910f nixos/security: add landlock, yama, and bpf defaults (#407748) 2025-05-24 06:37:19 -07:00
Morgan Jones
9c1564e395 nixos/tpm2: default pkcs#11 module based on abrmd config
Since there are now variants of tpm2-pkcs11 with and without ABRMD
support (for the kernel resource manager), ensure we pick the correct
default.

Fixes an accidental backwards incompatibility with the module.
2025-05-21 01:07:34 -07:00
Antonio
8331187976 Google Authenticator 2FA support over XRDP 2025-05-17 22:43:14 +02:00
Martin Weinelt
f462e2564d acme: Add csr option (#376334) 2025-05-17 11:24:08 +02:00
Tristan Ross
22f2e258af nixos/security: add landlock, yama, and bpf defaults 2025-05-16 20:56:19 -07:00
C0D3 M4513R
754412b4ae acme: Add csr option
Signed-off-by: C0D3 M4513R <28912031+C0D3-M4513R@users.noreply.github.com>
2025-05-16 11:45:54 +02:00
nixpkgs-ci[bot]
c376a565f9 Merge staging-next into staging 2025-04-24 18:04:57 +00:00
arthsmn
2c88eb3331 sudo-rs: refactor module 2025-04-23 21:31:50 -03:00