Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add mempool #1

Open
wants to merge 91 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
91 commits
Select commit Hold shift + click to select a range
570e271
clightning-plugins: bump to latest git
jb55 Jan 22, 2022
b852472
lnd: point out SCB functionality more clearly
nixbitcoin Feb 14, 2022
1338e82
Merge fort-nix/nix-bitcoin#454: lnd: point out SCB functionality more…
jonasnick Feb 20, 2022
71eccb7
python-packages/runes: init at 0.4.0
jb55 Feb 21, 2022
80312ba
python-packages/sha256: init at 0.1
jb55 Feb 21, 2022
380ec3b
clightning-plugins: add commando
jb55 Feb 21, 2022
0bede27
clightning-plugins/commando: add module
erikarvstedt Feb 23, 2022
2d6c4e8
readme: fix monitor c-lightning plugin link
jb55 Feb 24, 2022
ee4cdb0
pyln-proto: relax pycparser constraint
jb55 Feb 26, 2022
2618af7
Merge fort-nix/nix-bitcoin#445: clightning-plugins: add commando plugin
jonasnick Feb 27, 2022
59bf027
pkgs: add groups, sort alphabetically
erikarvstedt Dec 20, 2021
2493c8c
liquidd: add service timeouts like in bitcoind
erikarvstedt Feb 28, 2022
19abacc
Merge fort-nix/nix-bitcoin#458: liquidd: add service timeouts like in…
jonasnick Mar 1, 2022
16daaaf
update nixpkgs{,-unstable}
jonasnick Mar 5, 2022
6629e9a
joinmarket: bump secp256k1 to version used upstream
nixbitcoin Mar 3, 2022
5bee663
backups: bring in line with upstream duplicity
nixbitcoin Mar 3, 2022
96de786
Merge fort-nix/nix-bitcoin#459: joinmarket: bump secp256k1 to version…
jonasnick Mar 6, 2022
952a499
Merge fort-nix/nix-bitcoin#460: backups: bring in line with upstream …
jonasnick Mar 6, 2022
9dab0ae
Merge fort-nix/nix-bitcoin#461: update nixpkgs{,-unstable}
jonasnick Mar 6, 2022
4f45266
rtl: 0.12.1 -> 0.12.2
nixbitcoin Mar 9, 2022
16b37a1
Merge fort-nix/nix-bitcoin#463: rtl: 0.12.1 -> 0.12.2
jonasnick Mar 10, 2022
91203d8
secrets: fix secrets setup warning
erikarvstedt Mar 10, 2022
ac3cee0
Merge fort-nix/nix-bitcoin#464: secrets: fix secrets setup warning
jonasnick Mar 12, 2022
1185956
update nixpkgs{,-unstable}
jonasnick Mar 12, 2022
2365163
Merge fort-nix/nix-bitcoin#465: update nixpkgs{,-unstable}
jonasnick Mar 13, 2022
77b3495
cl-rest: 0.6.1 -> 0.7.0
erikarvstedt Mar 29, 2022
4f74690
joinmarket: 0.9.4 -> 0.9.5
nixbitcoin Feb 22, 2022
bdccaa3
Add SECURITY.md
nixbitcoin Feb 22, 2022
05b8c63
Merge fort-nix/nix-bitcoin#457: Add nix-bitcoin security fund informa…
jonasnick Mar 30, 2022
16e65d2
Merge fort-nix/nix-bitcoin#467: cl-rest: 0.6.1 -> 0.7.0
jonasnick Apr 3, 2022
54f8f2d
Merge fort-nix/nix-bitcoin#468: joinmarket: 0.9.4 -> 0.9.5
jonasnick Apr 3, 2022
e793a34
lndinit: init at 0.1.3-beta
erikarvstedt Mar 29, 2022
a4a5c72
lnd: use `lndinit` for wallet creation
erikarvstedt Mar 29, 2022
d394a07
update nixpkgs{,-unstable}
jonasnick Apr 4, 2022
26bba2c
Merge fort-nix/nix-bitcoin#471: update nixpkgs{,-unstable}
jonasnick Apr 4, 2022
06d4a22
Merge fort-nix/nix-bitcoin#469: lnd: Use `lndinit` for wallet creation
jonasnick Apr 11, 2022
3b4cf66
clboss: 0.11B -> 0.11E
erikarvstedt Apr 25, 2022
f08b83b
clboss: update module
erikarvstedt Apr 25, 2022
77aa0ec
Merge fort-nix/nix-bitcoin#473: Update clboss
jonasnick Apr 26, 2022
dd2dcad
clboss: 0.11E -> 0.12
erikarvstedt Apr 30, 2022
4197932
Merge fort-nix/nix-bitcoin#475: clboss: 0.11E -> 0.12
jonasnick May 2, 2022
66b1940
clboss: fix clboss being enabled by default
erikarvstedt May 5, 2022
1111624
Merge fort-nix/nix-bitcoin#479: clboss: fix clboss being enabled by d…
jonasnick May 5, 2022
29d2ffc
defaultHardening: allow `clone3` system call
erikarvstedt Apr 30, 2022
7de56b0
nbxplorer: use postgresql
erikarvstedt Apr 30, 2022
aa21fb4
tests: disable `btcpayserver.lbtc` for regtest
erikarvstedt Apr 30, 2022
408486a
tests: update nbxplorer
erikarvstedt Apr 30, 2022
43ee766
joinmarket: explicitly create no descriptor wallet
jonasnick May 5, 2022
ca834cc
joinmarket: simplify pkgs
erikarvstedt May 5, 2022
900836f
joinmarket: add private python package set
erikarvstedt May 5, 2022
6bdf0ac
update nixpkgs{,-unstable}
jonasnick May 5, 2022
f234e59
nbPython3Packages: fix clightning pkgs
erikarvstedt May 5, 2022
e31e578
Merge fort-nix/nix-bitcoin#478: Update nixpkgs
jonasnick May 6, 2022
c30aa33
cl-rest: rename pkg to clightning-rest
erikarvstedt May 1, 2022
acf5fe6
add standalone `clightning-rest` service
erikarvstedt May 5, 2022
e2fee4b
lnd-rest-onion-service.nix: move to lndconnect-onion.nix, add clightn…
erikarvstedt May 5, 2022
20c0194
readme: add hint about github table of contents button
erikarvstedt May 5, 2022
8e1ad6e
docs/services: update Zeus usage section, add clightning
erikarvstedt May 5, 2022
2e537fb
Merge fort-nix/nix-bitcoin#477: Add standalone `clightning-rest` serv…
jonasnick May 6, 2022
4b80060
add `release` branch
erikarvstedt May 6, 2022
4df8d94
Merge fort-nix/nix-bitcoin#480: push-release.sh: add push to `release…
jonasnick May 6, 2022
e6bb281
services: set systemd list options as list values
erikarvstedt May 7, 2022
24c3d68
Merge fort-nix/nix-bitcoin#481: services: set systemd list options as…
jonasnick May 7, 2022
472bcf1
pkgs-unstable: inherit system from stable pkgs
erikarvstedt May 11, 2022
cae0ff4
Merge fort-nix/nix-bitcoin#483: pkgs-unstable: inherit system from st…
jonasnick May 11, 2022
4c2d908
rtl: 0.12.2-beta -> 0.12.3-beta
erikarvstedt May 14, 2022
beae9f8
clightning-rest: 0.7.0 -> 0.7.2
erikarvstedt May 14, 2022
ff228a6
rtl: change `nodes` options
erikarvstedt May 14, 2022
3755b3e
rtl: add option `extraConfig` for nodes
erikarvstedt May 14, 2022
b2ac602
update nixpkgs
jonasnick May 16, 2022
14dec60
Merge fort-nix/nix-bitcoin#485: update nixpkgs
jonasnick May 17, 2022
63b3eec
push-release.sh: fix pushing to master branch
erikarvstedt May 17, 2022
84fe731
treewide: curl: exit with error status on HTTP errors
erikarvstedt May 17, 2022
15288d5
lnd: rename var `mnemonic` -> `seed`
erikarvstedt May 17, 2022
e2721a9
examples/configuration.nix: update system.stateVersion
erikarvstedt May 17, 2022
107ee27
docs/configuration: improve wording
erikarvstedt May 17, 2022
3d32c0a
docs/configuration: clarify description
erikarvstedt May 17, 2022
9649785
docs/configuration: improve formatting
erikarvstedt May 17, 2022
571983a
docs/services: improve lndconnect section
erikarvstedt May 6, 2022
ef93a9a
rtl: formatting
erikarvstedt May 18, 2022
19d44c6
Merge fort-nix/nix-bitcoin#486: Minor improvements
jonasnick May 20, 2022
041162d
clightning-plugins: update to latest rev
erikarvstedt May 22, 2022
ae94665
clightning: add `package` option
erikarvstedt May 22, 2022
df1585c
Merge fort-nix/nix-bitcoin#488: Update `clightning-plugins`
jonasnick May 23, 2022
ebaa9a3
Merge fort-nix/nix-bitcoin#484: Update RTL
jonasnick May 25, 2022
37a19fa
helper: add start-bash-session.sh
erikarvstedt Dec 20, 2021
b5913f3
fulcrum: init at bcccf76f (2022-02-24)
erikarvstedt Feb 25, 2022
11d895a
bitcoind-rpc-public-whitelist: add `ping`
erikarvstedt Feb 25, 2022
a2ae537
fulcrum: add module
erikarvstedt Feb 25, 2022
f034a25
mempool: init at 2.3.1
nixbitcoin Feb 17, 2022
15a4220
mempool: add module
nixbitcoin Feb 17, 2022
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
15 changes: 12 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -49,6 +49,9 @@ Get started

Docs
---
Hint: To show a table of contents, click the button (![Github TOC button](docs/img/github-table-of-contents.svg)) in the
top left corner of the documents.

* [Hardware requirements](docs/hardware.md)
* [Installation](docs/install.md)
* [Configuration and maintenance](docs/configuration.md)
Expand All @@ -66,17 +69,19 @@ NixOS modules ([src](modules/modules.nix))
* [clightning](https://github.com/ElementsProject/lightning) with support for announcing an onion service\
Available plugins:
* [clboss](https://github.com/ZmnSCPxj/clboss): automated C-Lightning Node Manager
* [commando](https://github.com/lightningd/plugins/tree/master/commando): control your node over lightning
* [helpme](https://github.com/lightningd/plugins/tree/master/helpme): walks you through setting up a fresh c-lightning node
* [monitor](https://github.com/renepickhardt/plugins/tree/master/monitor): helps you analyze the health of your peers and channels
* [monitor](https://github.com/lightningd/plugins/tree/master/monitor): helps you analyze the health of your peers and channels
* [prometheus](https://github.com/lightningd/plugins/tree/master/prometheus): lightning node exporter for the prometheus timeseries server
* [rebalance](https://github.com/lightningd/plugins/tree/master/rebalance): keeps your channels balanced
* [summary](https://github.com/lightningd/plugins/tree/master/summary): print a nice summary of the node status
* [zmq](https://github.com/lightningd/plugins/tree/master/zmq): publishes notifications via ZeroMQ to configured endpoints
* [lnd](https://github.com/lightningnetwork/lnd) with support for announcing an onion service
* [clightning-rest](https://github.com/Ride-The-Lightning/c-lightning-REST): REST server for clightning
* [lnd](https://github.com/lightningnetwork/lnd) with support for announcing an onion service and [static channel backups](https://github.com/lightningnetwork/lnd/blob/master/docs/recovery.md)
* [Lightning Loop](https://github.com/lightninglabs/loop)
* [Lightning Pool](https://github.com/lightninglabs/pool)
* [charge-lnd](https://github.com/accumulator/charge-lnd): policy-based channel fee manager
* [lndconnect](https://github.com/LN-Zap/lndconnect) via a REST onion service
* [lndconnect](https://github.com/LN-Zap/lndconnect): connect your wallet to lnd or clightning via a REST onion service
* [Ride The Lightning](https://github.com/Ride-The-Lightning/RTL): web interface for `lnd` and `clightning`
* [spark-wallet](https://github.com/shesek/spark-wallet)
* [electrs](https://github.com/romanz/electrs)
Expand All @@ -93,6 +98,10 @@ NixOS modules ([src](modules/modules.nix))

Security
---
See [SECURITY.md](SECURITY.md) for the security policy and how to report a vulnerability.

nix-bitcoin aims to achieve a high degree of security by building on the following principles:

* **Simplicity:** Only services enabled in `configuration.nix` and their dependencies are installed, support for [doas](https://github.com/Duncaen/OpenDoas) ([sudo alternative](https://lobste.rs/s/efsvqu/heap_based_buffer_overflow_sudo_cve_2021#c_c6fcfa)), code is continuously reviewed and refined.
* **Integrity:** The Nix package manager guarantees that all dependencies are exactly specified, packages can be built from source to reduce reliance on binary caches, nix-bitcoin merge commits are signed, all commits are approved by multiple nix-bitcoin developers, upstream packages are cryptographically verified where possible, we use this software ourselves.
* **Principle of Least Privilege:** Services operate with least privileges; they each have their own user and are restricted further with [systemd features](pkgs/lib.nix), [RPC whitelisting](modules/bitcoind-rpc-public-whitelist.nix) and [netns-isolation](modules/netns-isolation.nix). There's a non-root user *operator* to interact with the various services.
Expand Down
103 changes: 103 additions & 0 deletions SECURITY.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,103 @@
# Security Policy

## Reporting a Vulnerability

To report security issues send an encrypted email to the following nix-bitcoin developers or contact them via [matrix](https://matrix.org/).

| Name | GPG Fingerprint | Email | Matrix |
|---------------|----------------------------------------------------|-------------------------|------------------------------------------------------------------------------------|
| Jonas Nick | 36C7 1A37 C9D9 88BD E825 08D9 B1A7 0E4F 8DCD 0366 | [email protected] | [@nickler:nixbitcoin.org](https://matrix.to/#/@nickler:nixbitcoin.org) |
| Erik Arvstedt | 4E28 0A8C 1B33 4C86 C26B C134 3331 2B94 4DD9 7846 | [email protected] | [@erikarvstedt:matrix.org](https://matrix.to/#/@erikarvstedt:matrix.org) |
| nixbitcoindev | 577A 3452 7F3E 2A85 E80F E164 DD11 F9AD 5308 B3BA | [email protected] | [@nixbitcoindev:nixbitcoin.org](https://matrix.to/#/@nixbitcoindev:nixbitcoin.org) |

You can import a GPG key by running the following command with that individual’s fingerprint: `gpg --keyserver hkps://keys.openpgp.org --recv-keys "<fingerprint>"`. Ensure that you put quotes around fingerprints containing spaces.

[Responsible disclosures](https://en.wikipedia.org/wiki/Coordinated_vulnerability_disclosure) may qualify for a reward from the nix-bitcoin security fund (see [below](#nix-bitcoin-security-fund)).

## Wall of Fame

*empty*


## nix-bitcoin security fund

The nix-bitcoin security fund is a collection of funds held on the following 2/3
bitcoin multisig address which is used to reward security researchers who
discover and report vulnerabilities in nix-bitcoin or its upstream dependencies.
Rewards are paid out as percentages of the total fund, rather than as fixed
amounts.

```
bc1qrpnz05n0yznaj6yw82wy8dhwuqz86s87vdlhq4cu92fus9qal25s555wsy
```
([View balance](https://mempool.nixbitcoin.org/address/bc1qrpnz05n0yznaj6yw82wy8dhwuqz86s87vdlhq4cu92fus9qal25s555wsy))

The nix-bitcoin developers [listed above](#reporting-a-vulnerability) each hold
one key to the multisig address and collectively form the nix-bitcoin developer
quorum:

### Eligible Vulnerabilities

The following types of vulnerabilities qualify for rewards, to the exclusion of
all other security vulnerabilities.

| Type | Description | Examples |
| :-: | :-: | :-: |
| Outright Vulnerabilities | Vulnerabilities in nix-bitcoin specific tooling (except CI tooling) | privilege escalation in SUID binary `netns-exec`, improper release signature verification through `fetch-release` |
| Violations of [PoLP](https://en.wikipedia.org/wiki/Principle_of_least_privilege) | nix-bitcoin services are given too much privilege over the system or unnecessary access to other nix-bitcoin services, or one of the nix-bitcoin isolation measures is incorrectly implemented | `netns-isolation` doesn't work, spark-wallet has access to bitcoin RPC interface or files |
| Vulnerabilities in Dependencies | A vulnerability in any dependency of a nix-bitcoin installation with a configuration consisting of any combination of the following services: bitcoind, clightning, lnd, electrs, joinmarket, btcpayserver, liquidd.<br />**Note:** The vulnerability must first be reported to and handled by the maintainers of the dependency before it qualifies for a reward| Compromised NixOS expression pulls in malicious package, JoinMarket pulls in a python dependency with a known severe vulnerability |
| Bad Documentation | Our documentation suggests blatantly insecure things | `install.md` tells you to add our SSH keys to your root user |
| Compromise of Signing Key | Compromise of the nix-bitcoin signing key, i.e., `0xB1A70E4F8DCD0366` | Leaking the key, managing to sign something with it |

### Reward

Researchers qualify for a maximum reward[^1] of 10% of the total fund holdings for
reporting any vulnerability that matches the above eligibility requirements. If
a vulnerability or any combination of a number of vulnerabilities that meet the
above-described eligibility requirements can lead to a realistic attack on
nix-bitcoin users, researchers qualify for a higher maximum reward[^1] depending
the final outcome of the attack scenario:

| Outcome | Description | Maximum Reward of Total Fund[^1] |
| :-: | :-: | :-: |
| Loss of Funds | Attack allows stealing or destroying user's funds | 50 % |
| Loss of Privacy | Attack allows exfiltrating sensitive information or otherwise attributing a user's real world identity to his nix-bitcoin node or funds held/managed thereon without the user specifically opting-in to this (e.g., by disabling the `secure-node` preset) | 25 % |
| Denial of Service | Attack allows crashing a service or otherwise denying a user service from his node | 25 % |

All other reported vulnerabilities which meet the above requirements without a
clear and plausible attack scenario receive a maximum reward[^1] of 10% of the
fund.

[^1]: Rewards are subject to a discount at the discretion of the nix-bitcoin
developer quorum for reasons such as insignificance of the vulnerability or
obscurity of the victim's required configuration, as well as simple mitigation
(i.e. the attack should have been mitigated anyway by common-sense security
measures) or complex/unlikely attack execution.

### Policy

* Vulnerabilities must be [responsibly
disclosed](https://en.wikipedia.org/wiki/Coordinated_vulnerability_disclosure).
* E2EE: Vulnerabilities must be disclosed via end-to-end encrypted communication
methods, such as PGP E-Mail or Matrix.
* Wall of Fame: In addition to the above rewards, security researchers will also
be added to the Wall of Fame, unless, of course, they wish to remain
anonymous.
* First come, first serve: Rewards are awarded strictly on a first come, first
serve basis from the date they were responsibly disclosed in their entirety.
Multiple reports from the same researcher can either be bundled for a higher
likelihood of receiving the full maximum reward or rewarded individually,
proportional to the remaining amount.
* Exclusion of dependencies with existing bug bounty programms: Software which
is covered by an existing bug bounty program is not eligible for rewards under
the "Vulnerabilities in Dependencies" category.
* Exclusion of dependencies with known vulnerabilities that are in the process
of being patched: Software with a known vulnerability where there is reason to
believe that the patch is still under development or simply has not yet been
ported to NixOS, due to the relative recency of the patch, is not eligible for
rewards under the "Vulnerabilities in Dependencies" category.
* Termination: The fund can be terminated at any time by the quorum of key
holders in which case the holdings are donated to non-profit organizations.
* This document may be updated over time to ensure smooth and purposeful
operation of the fund as an incentive for security researchers to investigate
and report vulnerabilities in the nix-bitcoin ecosystem.
7 changes: 3 additions & 4 deletions docs/configuration.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,8 +22,7 @@ This fetches the latest release, verifies its signatures and updates `nix-bitcoi
## Get started with Nix

See [Nix - A One Pager](https://github.com/tazjin/nix-1p) for a short guide
to Nix, the language used in `configuration.nix`.

to Nix, the language used in `configuration.nix`.\
You can follow along this guide by running command `nix repl` which allows you to interactively
evaluate Nix expressions.

Expand Down Expand Up @@ -178,7 +177,7 @@ Some services require extra steps:

# Use bitcoind from another node

Use a bitcoind instance running on another node within a nix-bitcoin config.
Here's how to use a bitcoind instance running on another node within a nix-bitcoin config:

```nix
imports = [ <nix-bitcoin/modules/presets/bitcoind-remote.nix> ];
Expand Down Expand Up @@ -226,7 +225,7 @@ $secretsDir/bitcoin-rpcpassword-public
```
See: [Secrets dir](#secrets-dir)

Restart `bitcoind` after updating the secrets: `systemctl restart bitcoind`.
Afterwards, restart `bitcoind`: `systemctl restart bitcoind`.

# Temporarily disable a service

Expand Down
3 changes: 3 additions & 0 deletions docs/img/github-table-of-contents.svg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
91 changes: 55 additions & 36 deletions docs/services.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,6 +44,61 @@ You can find the `<onion-address>` with command `nodeinfo`.
The default password location is `$secretsDir/rtl-password`.
See: [Secrets dir](./configuration.md#secrets-dir)

# Use LND or clightning with Zeus (mobile wallet) via Tor
1. Install [Zeus](https://zeusln.app)

2. Edit your `configuration.nix`

##### For lnd

Add the following config:
```
services.lnd.lndconnectOnion.enable = true;
```

##### For clightning

Add the following config:
```
services.clightning-rest = {
enable = true;
lndconnectOnion.enable = true;
};
```

3. Deploy your configuration

3. Run the following command on your node (as user `operator`) to create a QR code
with address and authentication information:

##### For lnd
```
lndconnect-onion
```

##### For clightning
```
lndconnect-onion-clightning
```

4. Configure Zeus
- Add a new node
- Select `Scan lndconnect config` (at the bottom) and scan the QR code
- For clightning: Set `Node interface` to `c-lightning-REST`
- Click `Save node config`
- Start sending and stacking sats privately

### Additional lndconnect features
Create plain text URLs or QR code images:
```
lndconnect-onion --url
lndconnect-onion --image
``````
Create a QR code for a custom hostname:
```
lndconnect-onion --host=mynode.org
```

# Connect to spark-wallet
### Requirements
* Android phone
Expand Down Expand Up @@ -87,42 +142,6 @@ See: [Secrets dir](./configuration.md#secrets-dir)
Done
```

# Connect to LND with Zeus
### Requirements
* Android phone
* [Orbot](https://guardianproject.info/apps/orbot/) installed from
[F-Droid](https://guardianproject.info/fdroid) (recommended) or
[Google Play](https://play.google.com/store/apps/details?id=org.torproject.android&hl=en)
* [Zeus](https://zeusln.app/) installed from
[F-Droid](https://f-droid.org/en/packages/app.zeusln.zeus/) (recommended) or
[Google Play](https://play.google.com/store/apps/details?id=app.zeusln.zeus)

1. Enable `restOnionService` in `configuration.nix`

Change
```
# services.lnd.restOnionService.enable = true;
```
to
```
services.lnd.restOnionService.enable = true;
```

2. Deploy new `configuration.nix`

3. Run command `lndconnect-rest-onion` (under `operator` user) to create a QR code for
connecting to LND via the REST onion service.

4. Enable Orbot VPN for Zeus
```
Open Orbot app
Turn on "VPN Mode"
Select Gear icon under "Tor-Enabled Apps"
Toggle checkbox under Zeus icon
```

5. Scan the QR code with your Zeus wallet and start sending Satoshis privately

# Connect to electrs
### Requirements Android
* Android phone
Expand Down
36 changes: 27 additions & 9 deletions examples/configuration.nix
Original file line number Diff line number Diff line change
Expand Up @@ -53,6 +53,17 @@
# == Plugins
# See ../README.md (Features → clightning) for the list of available plugins.
# services.clightning.plugins.prometheus.enable = true;
#
# == REST server
# Set this to create a clightning REST onion service.
# This also adds binary `lndconnect-onion-clightning` to the system environment.
# This binary creates QR codes or URLs for connecting applications to clightning
# via the REST onion service (see ../docs/services.md).
#
# services.clightning-rest = {
# enable = true;
# lndconnectOnion.enable = true;
# };

### LND
# Set this to enable lnd, a lightning implementation written in Go.
Expand All @@ -68,10 +79,10 @@
# nix-bitcoin.onionServices.lnd.public = true;
#
# Set this to create an lnd REST onion service.
# Adds binary `lndconnect-rest-onion` to the system environment.
# This binary generates QR codes or URIs for connecting applications to lnd via the
# REST onion service.
# services.lnd.restOnionService.enable = true;
# This also adds binary `lndconnect-onion` to the system environment.
# This binary generates QR codes or URLs for connecting applications to lnd via the
# REST onion service (see ../docs/services.md).
# services.lnd.lndconnectOnion.enable = true;
#
## WARNING
# If you use lnd, you should manually backup your wallet mnemonic
Expand All @@ -83,24 +94,26 @@
# You should also backup your channel state after opening new channels.
# This will allow you to recover off-chain funds, by force-closing channels.
# scp bitcoin-node:/var/lib/lnd/chain/bitcoin/mainnet/channel.backup ./backups/lnd/
#
# Alternatively, you can have these files backed up by services.backups below.

### RIDE THE LIGHTNING
# Set this to enable RTL, a web interface for lnd and clightning.
# services.rtl.enable = true;
#
# Set this to add a clightning node interface.
# Automatically enables clightning.
# services.rtl.nodes.clightning = true;
# services.rtl.nodes.clightning.enable = true;
#
# Set this to add a lnd node interface.
# Automatically enables lnd.
# services.rtl.nodes.lnd = true;
# services.rtl.nodes.lnd.enable = true;
#
# You can enable both nodes simultaneously.
#
# Set this option to enable swaps with lightning-loop.
# Automatically enables lightning-loop.
# services.rtl.loop = true;
# services.rtl.nodes.lnd.loop = true;

### SPARK WALLET
# Set this to enable spark-wallet, a minimalistic wallet GUI for
Expand Down Expand Up @@ -201,6 +214,11 @@
# Set this to enable the JoinMarket order book watcher.
# services.joinmarket-ob-watcher.enable = true;

### MEMPOOL
# Set this to enable mempool, a fully featured Bitcoin visualizer, explorer, and
# API service.
# services.mempool.enable = true;

### Backups
# Set this to enable nix-bitcoin's own backup service. By default, it
# uses duplicity to incrementally back up all important files in /var/lib to
Expand Down Expand Up @@ -261,10 +279,10 @@
# compatible, in order to avoid breaking some software such as database
# servers. You should change this only after NixOS release notes say you
# should.
system.stateVersion = "21.05"; # Did you read the comment?
system.stateVersion = "21.11"; # Did you read the comment?

# The nix-bitcoin release version that your config is compatible with.
# When upgrading to a backwards-incompatible release, nix-bitcoin will display an
# an error and provide hints for migrating your config to the new release.
nix-bitcoin.configVersion = "0.0.65";
nix-bitcoin.configVersion = "0.0.70";
}
2 changes: 1 addition & 1 deletion examples/flakes/flake.nix
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{
description = "A basic nix-bitcoin node";

inputs.nix-bitcoin.url = "github:fort-nix/nix-bitcoin";
inputs.nix-bitcoin.url = "github:fort-nix/nix-bitcoin/release";

outputs = { self, nix-bitcoin }: {

Expand Down
Loading