Commit graph

250202 commits

Author SHA1 Message Date
Andreas Rammhold 2aa64e5df5
nixos/unbound: add option to configure the local control socket path
This option allows users to specify a local UNIX control socket to
"remote control" the daemon. System users, that should be permitted to
access the daemon, must be in the `unbound` group in order to access the
socket. When a socket path is configured we are also creating the
required group.

Currently this only supports the UNIX socket mode while unbound actually
supports more advanced types. Users are still able to configure more
complex scenarios via the `extraConfig` attribute.

When this option is set to `null` (the default) it doesn't affect the
system configuration at all. The unbound defaults for control sockets
apply and no additional groups are created.
2020-11-03 19:21:25 +01:00
Andreas Rammhold b67cc6298e
nixos/tests/unbound: add test to verify control sockets work 2020-11-03 19:21:24 +01:00
Andreas Rammhold a040a8a2e3
nixos/tests/unbound: init 2020-11-03 19:21:24 +01:00
Andreas Rammhold aadc07618a
nixos/unbound: drop ReadWritePaths from systemd unit configuration
Both of the configured paths should be implicit due to RuntimeDirectory
& StateDirectory.
2020-11-03 19:21:24 +01:00
Andreas Rammhold 72fbf05c17
nixos/unbound: note about the AmbientCapabilities 2020-11-03 19:21:24 +01:00
Andreas Rammhold 5e602f88d1
nixos/modules/services/networking/unbound: update systemd unit
Previously we just applied a very minimal set of restrictions and
trusted unbound to properly drop root privs and capabilities.

With this change I am (for the most part) just using the upstream
example unit file for unbound. The main difference is that we start
unbound was `unbound` user with the required capabilities instead of
letting unbound do the chroot & uid/gid changes.

The upstream unit configuration this is based on is a lot stricter with
all kinds of permissions then our previous variant. It also came with
the default of having the `Type` set to `notify`, therefore we are also
using the `unbound-with-systemd` package here. Unbound will start up,
read the configuration files and start listening on the configured ports
before systemd will declare the unit "running". This will likely help
with startup order and the occasional race condition during system
activation where the DNS service is started but not yet ready to answer
queries.

Aditionally to the much stricter runtime environmet I removed the
`/dev/urandom` mount lines we previously had in the code (that would
randomly fail during `stop`-phase).

The `preStart` script is now only required if we enabled the trust
anchor updates (which are still enabled by default).

Another beneefit of the refactoring is that we can now issue reloads via
either `pkill -HUP unbound` or `systemctl reload unbound` to reload the
running configuration without taking the daemon offline. A prerequisite
of this was that unbound configuration is available on a well known path
on the file system. I went for /etc/unbound/unbound.conf as that is the
default in the CLI tooling which in turn enables us to use
`unbound-control` without passing a custom configuration location.
2020-11-03 19:21:24 +01:00
Andreas Rammhold f6d570b258
unbound-with-systemd: init
This introduces an unbound variant that is built with systemd support.
That means it is able to signal readiness to systemd once it did start
or finished reloading. This likely allows us to close a small gap during
bootup where the service is assumed up but doesn't respond to DNS
queries just yet.
2020-11-03 13:15:54 +01:00
Andreas Rammhold c07ce093ec
unbound: allow building with systemd support
Systemd has to remain an optional (non-default) dependency as otherwise
we will have an unpleasant bootstrap cycle. Most (if not all) of the
(lib)unbound consumers will likely not care about unbound's systemd
integration that only affects the daemon mode, anyway.
2020-11-03 13:15:53 +01:00
Daniël de Kok d33642978c
Merge pull request #102412 from freezeboy/remove-flvtool2
flvtool2: remove (broken since 2018)
2020-11-03 13:14:43 +01:00
Joachim F a3c92172a7
Merge pull request #102540 from yurkobb/master
tor-browser-bundle-bin: mark as broken
2020-11-03 11:26:52 +00:00
StigP 350f2c2189
Merge pull request #102612 from r-ryantm/auto-update/munin
munin: 2.0.64 -> 2.0.65
2020-11-03 11:18:48 +00:00
R. RyanTM db0d5e59e7 munin: 2.0.64 -> 2.0.65 2020-11-03 11:03:14 +00:00
freezeboy 2c233e06d8 flvtool2: remove (broken since 2018) 2020-11-03 11:43:07 +01:00
Matthieu Coudron 72c32ad3d7
Merge pull request #102605 from teto/vimAlias
neovim: take into account vi(m)Alias
2020-11-03 11:41:03 +01:00
StigP c0d9244cc0
Merge pull request #102593 from r-ryantm/auto-update/memcached
memcached: 1.6.6 -> 1.6.8
2020-11-03 10:37:20 +00:00
Doron Behar 65f4c39a40
Merge pull request #100695 from anpryl/operator-sdk-1.1.0 2020-11-03 11:19:25 +02:00
Doron Behar 155a59ec6f
Merge pull request #102599 from r-ryantm/auto-update/mpd
mpd: 0.22.1 -> 0.22.2
2020-11-03 10:38:29 +02:00
Matthieu Coudron cd6040869a .github/CODEOWNERS: add teto to neovim 2020-11-03 09:38:14 +01:00
Matthieu Coudron 86d7ed8d10 neovim: take into account vi(m)Alias
restore feature broken by compatibility layer
2020-11-03 09:31:56 +01:00
Doron Behar 27e4b4df95
Merge pull request #102414 from freezeboy/unbreak-kdecoration
plasma5.kdecoration: unbreak
2020-11-03 10:13:42 +02:00
Doron Behar 7dd6d9fa5e
Merge pull request #102569 from jonringer/joringer-neovim-codeowner
.github/CODEOWNERS: add jonringer to neovim
2020-11-03 10:08:37 +02:00
Peter Simons a1d7a28026
Merge pull request #98964 from woffs/shotcut-20.09.27
shotcut: 20.09.13 -> 20.10.31
2020-11-03 09:07:56 +01:00
R. RyanTM 74dcd27d78 mpd: 0.22.1 -> 0.22.2 2020-11-03 07:55:26 +00:00
Jan Tojnar 7ee179143f
Merge pull request #102553 from r-ryantm/auto-update/libjcat
libjcat: 0.1.3 -> 0.1.4
2020-11-03 08:28:07 +01:00
Sarah Brofeldt 9d9235e146
Merge pull request #101551 from moben/ceph.glibc2.32
ceph: Fix build with glibc 2.32
2020-11-03 08:26:53 +01:00
Jan Tojnar 1ff0990a4d
Merge pull request #102517 from r-ryantm/auto-update/libfprint
libfprint: 1.90.2 -> 1.90.3
2020-11-03 08:26:43 +01:00
R. RyanTM 1c63f35993 memcached: 1.6.6 -> 1.6.8 2020-11-03 07:13:06 +00:00
Sarah Brofeldt 36a0c931ff
Merge pull request #102574 from marsam/update-git-absorb
gitAndTools.git-absorb: 0.6.5 -> 0.6.6
2020-11-03 06:51:20 +01:00
R. RyanTM 428701ba39 krename: 5.0.0 -> 5.0.1 2020-11-03 11:24:29 +08:00
Ryan Mulligan 9f7d8570b9
Merge pull request #102561 from r-ryantm/auto-update/libgpiod
libgpiod: 1.5.2 -> 1.6
2020-11-02 19:17:24 -08:00
Mario Rodas 76ff5a73c7 gitAndTools.git-absorb: 0.6.5 -> 0.6.6 2020-11-02 22:00:00 -05:00
Mario Rodas 34ad166a83
Merge pull request #102316 from marsam/update-grpc
grpc: 1.32.0 -> 1.33.2
2020-11-02 21:18:15 -05:00
Ryan Mulligan f6d2d10bef
Merge pull request #102560 from r-ryantm/auto-update/kubeseal
kubeseal: 0.12.6 -> 0.13.1
2020-11-02 18:07:10 -08:00
Jonathan Ringer e2b32e0567
.github/CODEOWNERS: add jonringer to neovim 2020-11-02 17:55:44 -08:00
Martin Weinelt 3df0f1ef3c
Merge pull request #102153 from mweinelt/home-assistant
homeassistant: 0.117.0 -> 0.117.2
2020-11-03 02:28:37 +01:00
StigP 7ab3a6fd8a
Merge pull request #102335 from r-ryantm/auto-update/flameshot
flameshot: 0.8.4 -> 0.8.5
2020-11-03 01:22:22 +00:00
StigP 08251935f7
Merge pull request #102019 from SuperSandro2000/ssh-audit-2.3.1
ssh-audit: 2.3.0 -> 2.3.1
2020-11-03 01:09:35 +00:00
Maciej Krüger d527b63262
Merge pull request #102565 from r-ryantm/auto-update/libavif
libavif: 0.8.1 -> 0.8.2
2020-11-03 02:00:58 +01:00
StigP 25eb2e3edd
Merge pull request #102149 from braunse/gsoap-update
gsoap: 2.8.53 -> 2.8.108
2020-11-03 00:56:11 +00:00
R. RyanTM 573dde99db libavif: 0.8.1 -> 0.8.2 2020-11-03 00:54:29 +00:00
StigP 90609ba9e4
Merge pull request #102498 from r-ryantm/auto-update/keepass
keepass: 2.45 -> 2.46
2020-11-03 00:30:58 +00:00
R. RyanTM b55e445494 libgpiod: 1.5.2 -> 1.6 2020-11-03 00:30:15 +00:00
R. RyanTM 76acdc7bf4 kubeseal: 0.12.6 -> 0.13.1 2020-11-03 00:23:10 +00:00
Silvan Mosberger 8a7ea52173
Merge pull request #99019 from sumnerevans/master
Add ability to configure executable for redshift service
2020-11-03 01:00:40 +01:00
Silvan Mosberger 93fc868d7c
Merge pull request #101971 from RonanMacF/master
update tmux-resurrect and tmux-continuum
2020-11-03 00:49:07 +01:00
Silvan Mosberger aeaf78adb8
Merge pull request #102204 from danderson/danderson/transmission-dir
nixos/transmission: point at the settings dir in cfg.home.
2020-11-03 00:45:04 +01:00
Mario Rodas 4f5156fdb9
Merge pull request #100746 from dtzWill/update/agave-30
agave: 22 -> 30
2020-11-02 18:35:54 -05:00
R. RyanTM 89dd2293cc libjcat: 0.1.3 -> 0.1.4 2020-11-02 23:35:04 +00:00
Mario Rodas 345a1843e2
Merge pull request #102522 from Chili-Man/aws-okta-1.0.6-update
aws-okta: 1.0.5 -> 1.0.6
2020-11-02 18:25:58 -05:00
Mario Rodas 0c885dfa2d
Merge pull request #102447 from r-ryantm/auto-update/jx
jx: 2.1.138 -> 2.1.149
2020-11-02 18:22:59 -05:00