-
-
Notifications
You must be signed in to change notification settings - Fork 14.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
nixos/netbird: harden and extend options #287236
base: master
Are you sure you want to change the base?
Conversation
0cf761f
to
4179661
Compare
Signed-off-by: Krzysztof Nazarewski <gpg@kdn.im>
4179661
to
0a1d920
Compare
0a1d920
to
add2bf7
Compare
add2bf7
to
26373ef
Compare
a734f1e
to
35a7c67
Compare
257f218
to
0a02a10
Compare
0a02a10
to
f2dd2b8
Compare
f2dd2b8
to
dd07ee7
Compare
003fa10
to
b33acd9
Compare
I'd merge but NixOS tests seem to be broken or hanging? @Mic92 how to unblock this? |
(And this still modifies old release notes) |
any idea how to prevent that? nixpkgs is not activatable without this modification |
Fixing the test? I am not using netbird and have currently other things on my list. Sorry. |
I'm not sure if and how the test is even broken. All that's observable is that it's running seemingly forever, and I wondered how to re-trigger it or something. Is any of that ofborg stuff documented anywhere @dasJ? |
I'll adress remaining things this week. Otherwise I didn't touch it apart from rebasing for months already. |
b33acd9
to
c5f469a
Compare
c5f469a
to
c65c0c2
Compare
I have fixed the tests (I did some incompatible changes to the module on the way), but even though I've added option rename, the manual still doesn't build: nixpkgs/nixos/modules/services/networking/netbird.nix Lines 75 to 77 in c65c0c2
|
Description of changes
I have recently extensively tested and fixed all features of Netbird in my own implementation of multi-instance Netbird installations.
While doing so I discovered another multi-instance implementation got merged into nixpkgs #246055 which is slightly different, but still a solid base to upstream the rest of my changes:
DynamicUserit's own user with minimal set of permissionsopenFirewall
by defaultI think it's a pretty good time to upstream, because I will be extensively using it at work: just launched my first Colmena-managed NixOS into GCE.
There are plans to support multi-account connections on the same daemon in Q2/2024 (see the slack message), but it's not known what shape it will take at all.
I decided to implement following significant changes:
tunnels
toclients
, because a wordtunnel
does not exist in Netbird's nomenclature (unlike some other VPNs) and is pretty misleading. Alsoclients.*
play nicely with my plan to implement aserver
in near future.{name, ...}: name
->client: client.name
) because they make the code very hard to follow and update with increased number of options,Things done
nix.conf
? (See Nix manual)sandbox = relaxed
sandbox = true
nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)Add a 👍 reaction to pull requests you find important.