Commit graph

250203 commits

Author SHA1 Message Date
Andreas Rammhold
5c16c31e06
nixos/unbound: add release notes for the changes that were introduced
As part of this patch series a few changes have been made to the unbound
serivce the deserve proper documentation.
2020-11-03 19:21:25 +01:00
Andreas Rammhold
2aa64e5df5
nixos/unbound: add option to configure the local control socket path
This option allows users to specify a local UNIX control socket to
"remote control" the daemon. System users, that should be permitted to
access the daemon, must be in the `unbound` group in order to access the
socket. When a socket path is configured we are also creating the
required group.

Currently this only supports the UNIX socket mode while unbound actually
supports more advanced types. Users are still able to configure more
complex scenarios via the `extraConfig` attribute.

When this option is set to `null` (the default) it doesn't affect the
system configuration at all. The unbound defaults for control sockets
apply and no additional groups are created.
2020-11-03 19:21:25 +01:00
Andreas Rammhold
b67cc6298e
nixos/tests/unbound: add test to verify control sockets work 2020-11-03 19:21:24 +01:00
Andreas Rammhold
a040a8a2e3
nixos/tests/unbound: init 2020-11-03 19:21:24 +01:00
Andreas Rammhold
aadc07618a
nixos/unbound: drop ReadWritePaths from systemd unit configuration
Both of the configured paths should be implicit due to RuntimeDirectory
& StateDirectory.
2020-11-03 19:21:24 +01:00
Andreas Rammhold
72fbf05c17
nixos/unbound: note about the AmbientCapabilities 2020-11-03 19:21:24 +01:00
Andreas Rammhold
5e602f88d1
nixos/modules/services/networking/unbound: update systemd unit
Previously we just applied a very minimal set of restrictions and
trusted unbound to properly drop root privs and capabilities.

With this change I am (for the most part) just using the upstream
example unit file for unbound. The main difference is that we start
unbound was `unbound` user with the required capabilities instead of
letting unbound do the chroot & uid/gid changes.

The upstream unit configuration this is based on is a lot stricter with
all kinds of permissions then our previous variant. It also came with
the default of having the `Type` set to `notify`, therefore we are also
using the `unbound-with-systemd` package here. Unbound will start up,
read the configuration files and start listening on the configured ports
before systemd will declare the unit "running". This will likely help
with startup order and the occasional race condition during system
activation where the DNS service is started but not yet ready to answer
queries.

Aditionally to the much stricter runtime environmet I removed the
`/dev/urandom` mount lines we previously had in the code (that would
randomly fail during `stop`-phase).

The `preStart` script is now only required if we enabled the trust
anchor updates (which are still enabled by default).

Another beneefit of the refactoring is that we can now issue reloads via
either `pkill -HUP unbound` or `systemctl reload unbound` to reload the
running configuration without taking the daemon offline. A prerequisite
of this was that unbound configuration is available on a well known path
on the file system. I went for /etc/unbound/unbound.conf as that is the
default in the CLI tooling which in turn enables us to use
`unbound-control` without passing a custom configuration location.
2020-11-03 19:21:24 +01:00
Andreas Rammhold
f6d570b258
unbound-with-systemd: init
This introduces an unbound variant that is built with systemd support.
That means it is able to signal readiness to systemd once it did start
or finished reloading. This likely allows us to close a small gap during
bootup where the service is assumed up but doesn't respond to DNS
queries just yet.
2020-11-03 13:15:54 +01:00
Andreas Rammhold
c07ce093ec
unbound: allow building with systemd support
Systemd has to remain an optional (non-default) dependency as otherwise
we will have an unpleasant bootstrap cycle. Most (if not all) of the
(lib)unbound consumers will likely not care about unbound's systemd
integration that only affects the daemon mode, anyway.
2020-11-03 13:15:53 +01:00
Daniël de Kok
d33642978c
Merge pull request #102412 from freezeboy/remove-flvtool2
flvtool2: remove (broken since 2018)
2020-11-03 13:14:43 +01:00
Joachim F
a3c92172a7
Merge pull request #102540 from yurkobb/master
tor-browser-bundle-bin: mark as broken
2020-11-03 11:26:52 +00:00
StigP
350f2c2189
Merge pull request #102612 from r-ryantm/auto-update/munin
munin: 2.0.64 -> 2.0.65
2020-11-03 11:18:48 +00:00
R. RyanTM
db0d5e59e7 munin: 2.0.64 -> 2.0.65 2020-11-03 11:03:14 +00:00
freezeboy
2c233e06d8 flvtool2: remove (broken since 2018) 2020-11-03 11:43:07 +01:00
Matthieu Coudron
72c32ad3d7
Merge pull request #102605 from teto/vimAlias
neovim: take into account vi(m)Alias
2020-11-03 11:41:03 +01:00
StigP
c0d9244cc0
Merge pull request #102593 from r-ryantm/auto-update/memcached
memcached: 1.6.6 -> 1.6.8
2020-11-03 10:37:20 +00:00
Doron Behar
65f4c39a40
Merge pull request #100695 from anpryl/operator-sdk-1.1.0 2020-11-03 11:19:25 +02:00
Doron Behar
155a59ec6f
Merge pull request #102599 from r-ryantm/auto-update/mpd
mpd: 0.22.1 -> 0.22.2
2020-11-03 10:38:29 +02:00
Matthieu Coudron
cd6040869a .github/CODEOWNERS: add teto to neovim 2020-11-03 09:38:14 +01:00
Matthieu Coudron
86d7ed8d10 neovim: take into account vi(m)Alias
restore feature broken by compatibility layer
2020-11-03 09:31:56 +01:00
Doron Behar
27e4b4df95
Merge pull request #102414 from freezeboy/unbreak-kdecoration
plasma5.kdecoration: unbreak
2020-11-03 10:13:42 +02:00
Doron Behar
7dd6d9fa5e
Merge pull request #102569 from jonringer/joringer-neovim-codeowner
.github/CODEOWNERS: add jonringer to neovim
2020-11-03 10:08:37 +02:00
Peter Simons
a1d7a28026
Merge pull request #98964 from woffs/shotcut-20.09.27
shotcut: 20.09.13 -> 20.10.31
2020-11-03 09:07:56 +01:00
R. RyanTM
74dcd27d78 mpd: 0.22.1 -> 0.22.2 2020-11-03 07:55:26 +00:00
Jan Tojnar
7ee179143f
Merge pull request #102553 from r-ryantm/auto-update/libjcat
libjcat: 0.1.3 -> 0.1.4
2020-11-03 08:28:07 +01:00
Sarah Brofeldt
9d9235e146
Merge pull request #101551 from moben/ceph.glibc2.32
ceph: Fix build with glibc 2.32
2020-11-03 08:26:53 +01:00
Jan Tojnar
1ff0990a4d
Merge pull request #102517 from r-ryantm/auto-update/libfprint
libfprint: 1.90.2 -> 1.90.3
2020-11-03 08:26:43 +01:00
R. RyanTM
1c63f35993 memcached: 1.6.6 -> 1.6.8 2020-11-03 07:13:06 +00:00
Sarah Brofeldt
36a0c931ff
Merge pull request #102574 from marsam/update-git-absorb
gitAndTools.git-absorb: 0.6.5 -> 0.6.6
2020-11-03 06:51:20 +01:00
R. RyanTM
428701ba39 krename: 5.0.0 -> 5.0.1 2020-11-03 11:24:29 +08:00
Ryan Mulligan
9f7d8570b9
Merge pull request #102561 from r-ryantm/auto-update/libgpiod
libgpiod: 1.5.2 -> 1.6
2020-11-02 19:17:24 -08:00
Mario Rodas
76ff5a73c7 gitAndTools.git-absorb: 0.6.5 -> 0.6.6 2020-11-02 22:00:00 -05:00
Mario Rodas
34ad166a83
Merge pull request #102316 from marsam/update-grpc
grpc: 1.32.0 -> 1.33.2
2020-11-02 21:18:15 -05:00
Ryan Mulligan
f6d2d10bef
Merge pull request #102560 from r-ryantm/auto-update/kubeseal
kubeseal: 0.12.6 -> 0.13.1
2020-11-02 18:07:10 -08:00
Jonathan Ringer
e2b32e0567
.github/CODEOWNERS: add jonringer to neovim 2020-11-02 17:55:44 -08:00
Martin Weinelt
3df0f1ef3c
Merge pull request #102153 from mweinelt/home-assistant
homeassistant: 0.117.0 -> 0.117.2
2020-11-03 02:28:37 +01:00
StigP
7ab3a6fd8a
Merge pull request #102335 from r-ryantm/auto-update/flameshot
flameshot: 0.8.4 -> 0.8.5
2020-11-03 01:22:22 +00:00
StigP
08251935f7
Merge pull request #102019 from SuperSandro2000/ssh-audit-2.3.1
ssh-audit: 2.3.0 -> 2.3.1
2020-11-03 01:09:35 +00:00
Maciej Krüger
d527b63262
Merge pull request #102565 from r-ryantm/auto-update/libavif
libavif: 0.8.1 -> 0.8.2
2020-11-03 02:00:58 +01:00
StigP
25eb2e3edd
Merge pull request #102149 from braunse/gsoap-update
gsoap: 2.8.53 -> 2.8.108
2020-11-03 00:56:11 +00:00
R. RyanTM
573dde99db libavif: 0.8.1 -> 0.8.2 2020-11-03 00:54:29 +00:00
StigP
90609ba9e4
Merge pull request #102498 from r-ryantm/auto-update/keepass
keepass: 2.45 -> 2.46
2020-11-03 00:30:58 +00:00
R. RyanTM
b55e445494 libgpiod: 1.5.2 -> 1.6 2020-11-03 00:30:15 +00:00
R. RyanTM
76acdc7bf4 kubeseal: 0.12.6 -> 0.13.1 2020-11-03 00:23:10 +00:00
Silvan Mosberger
8a7ea52173
Merge pull request #99019 from sumnerevans/master
Add ability to configure executable for redshift service
2020-11-03 01:00:40 +01:00
Silvan Mosberger
93fc868d7c
Merge pull request #101971 from RonanMacF/master
update tmux-resurrect and tmux-continuum
2020-11-03 00:49:07 +01:00
Silvan Mosberger
aeaf78adb8
Merge pull request #102204 from danderson/danderson/transmission-dir
nixos/transmission: point at the settings dir in cfg.home.
2020-11-03 00:45:04 +01:00
Mario Rodas
4f5156fdb9
Merge pull request #100746 from dtzWill/update/agave-30
agave: 22 -> 30
2020-11-02 18:35:54 -05:00
R. RyanTM
89dd2293cc libjcat: 0.1.3 -> 0.1.4 2020-11-02 23:35:04 +00:00
Mario Rodas
345a1843e2
Merge pull request #102522 from Chili-Man/aws-okta-1.0.6-update
aws-okta: 1.0.5 -> 1.0.6
2020-11-02 18:25:58 -05:00