Merge pull request #164330 from Luflosi/fix-tor-client-disable
This commit is contained in:
commit
3d48fda6f5
3 changed files with 17 additions and 0 deletions
|
@ -836,6 +836,16 @@
|
|||
<literal>systemd.nspawn.<name>.execConfig.PrivateUsers = false</literal>
|
||||
</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>
|
||||
The Tor SOCKS proxy is now actually disabled if
|
||||
<literal>services.tor.client.enable</literal> is set to
|
||||
<literal>false</literal> (the default). If you are using this
|
||||
functionality but didn’t change the setting or set it to
|
||||
<literal>false</literal>, you now need to set it to
|
||||
<literal>true</literal>.
|
||||
</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>
|
||||
The terraform 0.12 compatibility has been removed and the
|
||||
|
|
|
@ -324,6 +324,8 @@ In addition to numerous new and upgraded packages, this release has the followin
|
|||
|
||||
- `systemd-nspawn@.service` settings have been reverted to the default systemd behaviour. User namespaces are now activated by default. If you want to keep running nspawn containers without user namespaces you need to set `systemd.nspawn.<name>.execConfig.PrivateUsers = false`
|
||||
|
||||
- The Tor SOCKS proxy is now actually disabled if `services.tor.client.enable` is set to `false` (the default). If you are using this functionality but didn't change the setting or set it to `false`, you now need to set it to `true`.
|
||||
|
||||
- The terraform 0.12 compatibility has been removed and the `terraform.withPlugins` and `terraform-providers.mkProvider` implementations simplified. Providers now need to be stored under
|
||||
`$out/libexec/terraform-providers/<registry>/<owner>/<name>/<version>/<os>_<arch>/terraform-provider-<name>_v<version>` (which mkProvider does).
|
||||
|
||||
|
|
|
@ -910,6 +910,11 @@ in
|
|||
ORPort = mkForce [];
|
||||
PublishServerDescriptor = mkForce false;
|
||||
})
|
||||
(mkIf (!cfg.client.enable) {
|
||||
# Make sure application connections via SOCKS are disabled
|
||||
# when services.tor.client.enable is false
|
||||
SOCKSPort = mkForce [ 0 ];
|
||||
})
|
||||
(mkIf cfg.client.enable (
|
||||
{ SOCKSPort = [ cfg.client.socksListenAddress ];
|
||||
} // optionalAttrs cfg.client.transparentProxy.enable {
|
||||
|
|
Loading…
Reference in a new issue