Commit graph

20972 commits

Author SHA1 Message Date
Sandro 44fe73efbe
Merge pull request #165868 from LibreCybernetics/remove-python2-dependencies-from-gnome 2022-03-28 14:38:17 +02:00
Sandro 2f1e03cb2b
Merge pull request #165691 from lucc/github-removed-unencrypted-git 2022-03-28 12:47:42 +02:00
Roland Synnestvedt 60e62c36df nixos/unifi-video: clean up indentation and formatting 2022-03-27 13:39:19 -07:00
github-actions[bot] 36198fe197
Merge staging-next into staging 2022-03-27 18:01:40 +00:00
Fabián Heredia Montiel a3954182ba nixos/gnome: change telepathy service from default true to default false 2022-03-27 09:24:46 -06:00
Sandro d7270ac953
Merge pull request #165492 from Artturin/removelocatefromfindutils 2022-03-27 16:59:48 +02:00
Martin Weinelt d68657af92 Merge remote-tracking branch 'origin/master' into staging-next 2022-03-27 15:54:05 +02:00
Jelle Besseling afcb2d4145
minecraft-server: correct java options (#157978) 2022-03-27 15:09:46 +02:00
Janne Heß 452102db8f
nixos/stage-2-init: Clean up legacy commands
We can perform most of the mkdir/ln/rm using systemd-tmpfiles
instead which cleans up the script.

/bin and /home are created by their activation script snippets

usbfs is deprecated and unused.

hwclock seems to be automatically executed by systemd on startup.

The mkswap to prevent hibernation cycles seems to be executed by systemd
as well since the provided regression tests succeeds.
2022-03-27 13:51:02 +02:00
Janne Heß 158a2972eb
nixos/filesystems: Move options into the fs module
This was probably forgotten during a refactoring. The module is where
the values of the options are actually used.
2022-03-27 13:23:44 +02:00
Sandro b9ddfd63b7
Merge pull request #162996 from alyssais/resolvconf-disable 2022-03-27 12:25:14 +02:00
Jörg Thalheim de698b740b
Merge pull request #156678 from Alexnortung/autorandr-module
nixos/autorandr: refactor
2022-03-27 07:46:09 +01:00
github-actions[bot] ec92b288e2
Merge staging-next into staging 2022-03-27 06:01:57 +00:00
Roland Synnestvedt 95a3f6ad26 nixos/unifi-video: rename openPorts to openFirewall 2022-03-26 17:59:54 -07:00
Roland Synnestvedt cb1c5dbb15 nixos/unifi-video: convert int to string in default command 2022-03-26 17:53:26 -07:00
Martin Weinelt 7be28200e2 Merge remote-tracking branch 'origin/master' into staging-next 2022-03-27 01:45:13 +01:00
Artturin c3c0444949 findutils: move {locate,updatedb} to a separate $locate output
https://github.com/NixOS/nixpkgs/issues/53925
2022-03-26 21:55:19 +02:00
linj 1e32d28824 nixos/dendrite: always substitute environment variables in config
Before this patch, services.dendrite.environmentFile is used for
secrets and environment variable substitution only happens when this
option is used.

systemd-247 provides a mechanism called LoadCredential for secrets and
it is better than environment file. See the section of Environment=
in the manual of systemd.exec for more information.

This patch always substitute environment variables, which enables the
usage of systemd LoadCredential.
2022-03-26 12:54:45 -07:00
github-actions[bot] 77dc421883
Merge staging-next into staging 2022-03-26 18:01:56 +00:00
github-actions[bot] 3b6f03e497
Merge master into staging-next 2022-03-26 18:01:22 +00:00
Janne Heß a34c788e30
Merge pull request #163230 from helsinki-systems/feat/misc-prometheus-varnis
nixos/prometheus/exporters/varnish: improve some defaults
2022-03-26 18:32:30 +01:00
Alexander Nortung 7844c87ab7 Merge branch 'master' into autorandr-module 2022-03-26 14:18:23 +01:00
github-actions[bot] b2fc63a844
Merge staging-next into staging 2022-03-26 12:02:50 +00:00
github-actions[bot] 811b90f085
Merge master into staging-next 2022-03-26 12:01:14 +00:00
Jan Tojnar 95968e616c
Merge pull request #165231 from K900/the-unplumbening
nixos/pipewire: unbreak mixed Pulse/Pipewire setups
2022-03-26 11:42:15 +01:00
Vladimír Čunát a42ca0678b
Merge branch 'master' into staging-next 2022-03-26 09:20:38 +01:00
Vladimír Čunát b9eab51eed
Merge #160343: GNOME: 41 -> 42 2022-03-26 09:16:07 +01:00
K900 435a5b675b nixos/pipewire: introduce an explicit option to use Pipewire as audio server 2022-03-26 08:54:18 +03:00
Mihai-Drosi Câju 3186c367ce nixos/waydroid: Misc fixes
* With the upgrade to waydroid to 1.2.0, dependencies that previously
  were shipped in the service's path have been moved to the waydroid
  package.

* Make sure /var/lib/misc exists when starting waydroid. As required
  by dnsmasq
2022-03-25 19:51:41 -07:00
Michael Hoang d1ac88811f nixos/_1password: init 2022-03-26 13:22:56 +11:00
github-actions[bot] 7e0fb26e96
Merge staging-next into staging 2022-03-26 00:02:59 +00:00
github-actions[bot] 880c50a133
Merge master into staging-next 2022-03-26 00:02:23 +00:00
maxine [they] 65f39165eb
Merge pull request #165479 from savannidgerinel/savanni/1password-browsersupport
nixos/1password-gui: init at 8.6.0
2022-03-25 21:48:31 +01:00
Daniel Kilimnik 206e030ce2 installer/cd-dvd/iso-image: add syslinuxTheme config option
It was not possible to change the theme used by syslinux when building an iso image.
2022-03-25 21:37:20 +01:00
github-actions[bot] 84962daf66
Merge staging-next into staging 2022-03-25 18:01:48 +00:00
github-actions[bot] c6dd9fd65d
Merge master into staging-next 2022-03-25 18:01:14 +00:00
Antoine Martin 16f80139f0 nixos/paperless-ng: fix mail importer
The private network setting was placed on the wrong service
2022-03-25 18:26:38 +01:00
Emery Hemingway 4ec35ff6d6 nixos: init programs/nncp module
The NNCP utilities read a configuration at "/etc/nncp.hjson" by
default. Add a NixOS module for generating this configuration.
2022-03-25 16:30:13 +00:00
Emery Hemingway ad15abe7ff squid: 4.17 -> 5.4.1
* enable HTCP
* enable systemd support
* add NixOS option "services.squid.package"
2022-03-25 15:59:05 +00:00
notgne2 863773970c
nixos/oauth2_proxy: add user group 2022-03-25 08:35:30 -07:00
Boris Sukholitko 6af3e61632 nixos/qemu-vm: allow booting VM with the custom kernel
While doing kernel development with the nixos testing infrastructure, it
is useful to quickly compile the kernel on the side and boot it in the testing VM.

This patch allows overriding the kernel through the environment
variable. For example, the following:

$ NIXPKGS_QEMU_KERNEL_testvm=$LINUX_SRC/arch/x86/boot/bzImage $VM/bin/nixos-test-driver

runs testvm testing VM with the fresh kernel compiled in $LINUX_SRC.

Co-authored-by: Robert Hensing <roberth@users.noreply.github.com>
2022-03-25 17:38:19 +03:00
Maciej Krüger 511e56d76c
Merge pull request #140406 from mkg20001/mvn 2022-03-25 15:08:44 +01:00
Jan Tojnar 87d18174d3 nixos/gdm: fix accessibility menu icon
GNOME Shell 42 switched an icon for the accessibility menu in the top panel
to one from gnome-control-center instead of a legacy one from adwaita-icon-theme:
https://gitlab.gnome.org/GNOME/gnome-shell/-/merge_requests/2155

Let’s add that dependency to the systemd unit since installing it
through `environment.systemPackages` is not enough due to environment isolation.
2022-03-25 15:02:49 +01:00
Bobby Rong 5a00ac1b08 pantheon.gnome-bluetooth-contract: mark as broken
Sendto device selection is removed in gnome-bluetooth 42.
I decide it is not worth to maintain a legacy gnome-bluetooth
package for the contract.
This should also be broken in elementary OS 7.
2022-03-25 15:02:43 +01:00
Bobby Rong b214aa70b4 pantheon.evince: drop
The vanilla evince already support dark style
preference in Pantheon, so no need to keep the patch.
2022-03-25 15:02:43 +01:00
Bobby Rong 0f97d73b74 pantheon.file-roller: drop
The vanilla file-roller already support dark style
preference in Pantheon, so no need to keep the package.
2022-03-25 15:02:33 +01:00
Jan Tojnar 7addb1c0ec nixos/gnome: install gnome-console (kgx) instead of gnome-terminal
https://gitlab.gnome.org/GNOME/gnome-build-meta/-/issues/457
2022-03-25 15:02:32 +01:00
Jan Tojnar f828b189d9 nixos/gnome: do not install gnome-screenshot
It has been replaced by a tool built into GNOME Shell:

b281beb124
2022-03-25 15:02:32 +01:00
Jan Tojnar 185522691f nixos/gnome: Remove realtime scheduling option
It is now accomplished using rtkit rather than setcap wrapper:
https://gitlab.gnome.org/GNOME/mutter/-/merge_requests/2060

Replace the option with `security.rtkit.enable`.

Closes: https://github.com/NixOS/nixpkgs/issues/90201
Closes: https://github.com/NixOS/nixpkgs/issues/86730
2022-03-25 15:02:32 +01:00
Jan Tojnar 1ced655c91 nixos/gnome: switch from gedit to gnome-text-editor
This is the new editor.

https://gitlab.gnome.org/GNOME/gnome-build-meta/-/merge_requests/1321
2022-03-25 15:02:31 +01:00
github-actions[bot] 8357b101a5
Merge staging-next into staging 2022-03-25 12:02:05 +00:00
talyz 068c5a0c80
nixos/discourse: Update redis server settings...
...to match the updated redis module.
2022-03-25 12:06:01 +01:00
talyz 04afc69a29
discourse: 2.9.0.beta1 -> 2.9.0.beta3 2022-03-25 12:05:48 +01:00
Lucas Hoffmann f3bda2f2c0 docs: replace defunct git://github.com urls with https:// 2022-03-25 11:21:42 +01:00
Vladimír Čunát 0a8b4eddd2
Merge branch 'master' into staging-next 2022-03-25 10:16:56 +01:00
Luflosi ec415055ba nixos/ipfs: improve how the commandline flags are generated
Use `utils.escapeSystemdExecArgs` instead of relying on the exact way in which `toString` formats a list.
In https://github.com/NixOS/nixpkgs/pull/156706#discussion_r795867283 a suggestion was made and then implemented to replace `toString` with `concatStringsSep " "`.
@pennae then suggested to use `utils.escapeSystemdExecArgs` instead in https://github.com/NixOS/nixpkgs/pull/164846#issuecomment-1073001848.
2022-03-24 20:42:07 +00:00
Guillaume Girol 57b4185159
Merge pull request #164091 from Pascal-Vtx/fix/graylog-module
nixos/graylog: fix group creation
2022-03-24 20:13:55 +00:00
Florian Klink e3083decc4 systemd-initrd, systemd-lib: drop initrdServiceToUnit
We can just use serviceToUnit here.
2022-03-24 18:57:16 +01:00
Florian Klink 74bae06748 systemd-initrd: use pkgs.fakeNss, document why we need libnss_files.so 2022-03-24 18:51:32 +01:00
Robert Hensing ce5a33e62b
Merge pull request #164660 from ncfavier/tests-restrict-arguments
nixos/testing: restrict arguments to makeTest
2022-03-24 17:01:47 +01:00
Savanni D'Gerinel 7f1f6eeffb nixos/1password-gui: init at 8.6.0
Browser Integration requires setgid and setuid programs, which needs to be done in the system configuration.

This is cleaner than the ad-hoc ways we have to set things up for platforms without a global configuration file.
2022-03-24 10:13:43 -04:00
Doron Behar 4a02c56a7d
Merge pull request #164746 from ncfavier/makeWrapper-chdir 2022-03-24 13:51:27 +02:00
pennae 67281c4d29
Merge pull request #165285 from jpathy/patch-2
networking.greTunnels: Add ttl option
2022-03-24 08:10:23 +00:00
Peter Hoeg 39a6621150 nixos/https-dns-proxy: init module 2022-03-24 15:36:28 +08:00
Naïm Favier a8296e7537
nixos/earlyoom: bring the module up to date (#163663)
* nixos/earlyoom: bring the module up to date

Removes deprecated option `ignoreOOMScoreAdjust`, introduces `killHook`
as a replacement for `notificationsCommand`, and adds an `extraArgs`
option for things not covered by the module.

* nixos/earlyoom: add nixos test

* nixos/earlyoom: add reportInterval

Allows setting the interval for logging a memory report. Defaults to
3600 following upstream
     (https://github.com/rfjakob/earlyoom/blob/master/earlyoom.default#L5)
to avoid flooding logs.

* nixos/earlyoom: add free{Mem,Swap}KillThreshold

Fixes https://github.com/NixOS/nixpkgs/issues/83504
2022-03-24 15:34:09 +08:00
Silvan Mosberger bc4631d8f0 nixos/syncplay: Add server password support 2022-03-24 04:46:26 +01:00
Bernardo Meurer 25d1efa97e
Merge pull request #165386 from zhaofengli/moonraker-2022-03-10
moonraker: unstable-2021-12-05 -> unstable-2022-03-10
2022-03-23 10:33:10 -07:00
InternetUnexplorer 2e7cf56e45 kde/plasma5: 5.24.0 -> 5.24.3 2022-03-23 18:19:33 +08:00
Will Fancher 5bfe213315 Clarify suppressed units description 2022-03-22 21:28:51 -04:00
Will Fancher 213de9b108 systemd-initrd: autoFormat and autoResize in initrd 2022-03-22 21:28:51 -04:00
Will Fancher 1abf154179 systemd-initrd: Add PATH to everything 2022-03-22 21:28:50 -04:00
Will Fancher be10e86c95 systemd-initrd: Partially fix qemu-vm
TODO: Auto formatting / partitioning / resizing
2022-03-22 21:28:50 -04:00
Will Fancher 2d4ebf1259 initrd: Optional systemd-based initrd 2022-03-22 21:28:43 -04:00
Zhaofeng Li 0527ccaca7 nixos/moonraker: Grant polkit permissions for system-level operations 2022-03-22 15:35:38 -07:00
Zhaofeng Li 787aaea68e nixos/moonraker: Add iproute2 to path 2022-03-22 15:35:38 -07:00
jpathy 19bb72c070 networking.greTunnels: Add ttl option 2022-03-23 00:24:44 +05:30
github-actions[bot] 9d35f2cd19
Merge staging-next into staging 2022-03-22 18:10:54 +00:00
Benjamin Staffin d6f50a5c8e keycloak: fix a missing newline when using plugins 2022-03-22 12:36:14 -04:00
Sivizius b4c2ffaffa
nixos/wg-quick: add autostart option to interfaces (#162219)
This adds the option `networking.wg-quick.interfaces.<name>.autostart`, which defaults to `true`, which is the previous behavior. With this option set to `false`, the systemd-unit will no longer be set to `wantedBy = [ "multi-user.target" ]` and therefore the tunnel has to be enabled/disabled via `systemctl start/stop wg-quick-<name>`.

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>
2022-03-22 13:25:57 +00:00
Kevin Cox 954f445608
Merge pull request #165252 from Luflosi/ipfs-hardening
nixos/ipfs: add systemd hardening
2022-03-22 08:10:01 -04:00
github-actions[bot] e452d308f5
Merge staging-next into staging 2022-03-22 12:02:02 +00:00
Luflosi 38f1576ba9
nixos/ipfs: use lib.recursiveUpdate instead of // operator
Use `recursiveUpdate` instead of the // operator, as recommended in https://nix.dev/anti-patterns/language#attr1-attr2-merge-operator. Without this change, setting `services.ipfs.extraConfig.Addresses.NoAnnounce` for example will cause `services.ipfs.apiAddress`, `services.ipfs.gatewayAddress` and `services.ipfs.swarmAddress` to be ignored.
2022-03-22 13:01:35 +01:00
Peter Hoeg 052632fd15 nixos/iwd: workaround for race condition where wlan device disappears 2022-03-22 19:36:51 +08:00
Will Fancher 25113740a5 nixos: systemd-lib: Make generateUnits general with default args 2022-03-22 07:02:23 -04:00
Luflosi 41d45d674a
nixos/ipfs: add systemd hardening
Use the hardened systemd unit from upstream.
2022-03-22 11:12:14 +01:00
K900 1dbc26d995 nixos/pipewire: unbreak mixed Pulse/Pipewire setups
Fixes #163066
2022-03-22 11:29:46 +03:00
github-actions[bot] c62314becb
Merge staging-next into staging 2022-03-22 06:01:42 +00:00
Artturi 6134c2f891
Merge pull request #161034 from andr1an/fix/nixos-generate-config-absolute-root-path 2022-03-22 02:35:06 +02:00
github-actions[bot] 03c279d7ea
Merge staging-next into staging 2022-03-22 00:02:58 +00:00
Benjamin Staffin 34006ebc9d Merge remote-tracking branch 'origin/master' into mvn 2022-03-21 18:37:45 -04:00
Robert Hensing 6c469679f6 Merge remote-tracking branch 'upstream/master' into tests-restrict-arguments 2022-03-21 23:17:17 +01:00
Robert Hensing eb8b70c020 nixos: Make config.nix.enable pass test 2022-03-21 23:14:10 +01:00
Kevin Cox 18307675b9
Merge pull request #153091 from GoogleBot42/master
nvidia: Fix AMD APU for Prime Sync
2022-03-21 15:04:38 -04:00
Vladimír Čunát 6facca010b
Merge #164644: nixos/nix-daemon: workaround NixOS/nix#6285
...into staging
2022-03-21 19:53:28 +01:00
Jörg Thalheim 9b2939da63
Merge pull request #164260 from Mic92/nix-ld
nix-ld: init at 1.0.0 + nixos module
2022-03-21 18:42:38 +00:00
Pascal Bach 4c3c80df54
Merge pull request #114393 from DarkDNA/feature/samba/network-online
nixos/samba: Add a wants=network-online.target to the target.
2022-03-21 19:25:50 +01:00
github-actions[bot] 6ae26bb3c8
Merge staging-next into staging 2022-03-21 18:07:51 +00:00
Googlebot 4007aa201b Merge remote-tracking branch 'upstream/master' 2022-03-21 11:32:36 -04:00
Will Fancher 52c98fc3e9 nixos: systemd: Split unit types into separate module 2022-03-21 10:25:27 -04:00
Kevin Cox 8ce16fcf62
Merge pull request #163451 from hercules-ci/stop-premature-warnings
Stop premature warnings, including `nix.settings` migration
2022-03-21 10:10:40 -04:00
github-actions[bot] de642acb2e
Merge staging-next into staging 2022-03-21 12:10:50 +00:00
Florian Klink 9427a17ccb
Merge pull request #164016 from bobvanderlinden/pr-refactor-systemd-module
nixos: systemd: split module up into multiple files
2022-03-21 13:03:55 +01:00
Bob van der Linden 397b8257a0
nixos: systemd-user: fix additionalUpstreamUserUnits description
Co-authored-by: Martin Weinelt <mweinelt@users.noreply.github.com>
2022-03-21 12:30:37 +01:00
Janne Heß 8e60f86840
Merge pull request #164034 from helsinki-systems/clean/stc
nixos/switch-to-configuration: Major script cleanup
2022-03-21 12:13:23 +01:00
Vladimír Čunát a519740b4c
Merge branch 'staging-next' into staging 2022-03-21 11:57:43 +01:00
Florian Klink 0d198e7a52 nixos/nix-daemon: workaround NixOS/nix#6285
The Nix-provided `nix-daemon.socket` file has a

> ConditionPathIsReadWrite=/nix/var/nix/daemon-socket/socket

line, to skip that unit if /nix/var/nix/daemon-socket/socket is
read-only (which is the case in some nixos-containers with that folder
bind-ro-mounted from the host).

In these cases, the unit was skipped.

Systemd 250 (rightfully) started to also skip in these cases:

> [ 237.187747] systemd[1]: Nix Daemon Socket was skipped because of a failed condition check (ConditionPathIsReadWrite=/nix/var/nix/daemon-socket).

However, systemd < 250 didn't skip if /nix/var/nix/daemon-socket/socket
didn't /exist at all/, and we were relying on this bug in the case for
fresh NixOS systems, to have /nix/var/nix/daemon-socket/socket created
initially.

Move the creation of that folder to systemd-tmpfiles, by shipping an
appropriate file in `${nixPackage}/lib/tmpfiles.d/nix-daemon.conf`
(NixOS/nix#6285).

In the meantime, set a systemd tmpfiles rule manually in NixOS.

This has been tested to still work with read-only bind-mounted
/nix/var/nix/daemon-socket/socket in containers, it'll keep them
read-only ;-)
2022-03-21 11:43:38 +01:00
Jörg Thalheim a98ea7e6f8 nix-ld: init at 1.0.0 + nixos module 2022-03-21 11:15:32 +01:00
Sandro 3d48fda6f5
Merge pull request #164330 from Luflosi/fix-tor-client-disable 2022-03-20 19:51:30 +01:00
Benjamin Staffin 81b63b6ef6
nixos/oauth2_proxy: add missing oidc providers (#164632)
- Add adfs and keycloak-oidc providrs
- Sort the list alphabetically
2022-03-20 13:31:43 -04:00
Bob van der Linden 92af44e04d
nixos: systemd: remove unhelpful comments in additionalUpstreamSystemUnits
Co-authored-by: Janne Heß <janne@hess.ooo>
2022-03-20 16:14:13 +01:00
Janne Heß 85874efcb0
nixos/switch-to-configuration: Make perlcritic happy 2022-03-20 13:04:23 +01:00
Janne Heß 9c494b5773
nixos/switch-to-configuration: Snake-case all variables
Also add a lot of comments and reorder some assignments
2022-03-20 13:03:39 +01:00
Janne Heß 67f84b4b87
nixos/switch-to-configuration: Snake-case all subroutines and add comments 2022-03-20 13:03:19 +01:00
Janne Heß 23ea9965bb
nixos/switch-to-configuration: Enforce consistent quoting 2022-03-20 13:01:11 +01:00
Janne Heß bdcd558812
nixos/switch-to-configuration: Get rid of all postfixes and unlesses 2022-03-20 13:01:11 +01:00
pennae 5b1fde773a
Merge pull request #163860 from delroth/synapse-rl-fix
matrix-synapse: fix release notes and doc for #158605 changes
2022-03-20 08:49:46 +00:00
Alexandre Iooss 92349ece0f
nixos/galene: systemd unit hardening 2022-03-20 09:24:52 +01:00
github-actions[bot] 3df8e35539
Merge staging-next into staging 2022-03-20 00:02:45 +00:00
Martin Weinelt f4f3622cb1 Merge remote-tracking branch 'origin/staging-next' into staging 2022-03-20 00:00:32 +01:00
Vladimír Čunát 02f6f9c363
Merge #164895: nixos displayManager.session: drop type 2022-03-19 21:51:08 +01:00
Ninjatrappeur 05417a66e7
Merge pull request #164398 from NinjaTrappeur/nin/pleroma-wrappers 2022-03-19 21:28:40 +01:00
Vladimír Čunát fd609f9233
nixos services.xserver.displayManager.session: drop type
For now at least.  I expect someone will find a working type later.
It's incorrect and was causing bad issues.  Example test case:
nix-instantiate nixos/release.nix -A tests.xfce.x86_64-linux --dry-run

This is a partial revert of commit b2d803c from PR #162271.
2022-03-19 21:11:41 +01:00
Martino Fontana fb6dbccbfa joycond: don't use dkms hid-nintendo on kernel 5.16 or newer
The module has since been mainlined into the kernel. See #163929.
2022-03-19 16:38:09 +01:00
Bob van der Linden 6514bb4620
nixos: systemd-user: make additionalUpstreamUserUnits internal 2022-03-19 12:06:56 +01:00
Bob van der Linden 66759cea7d
nixos: systemd-user: expand on additionalUpstreamUserUnits description 2022-03-19 12:06:43 +01:00
Naïm Favier 9160044f5f
treewide/makeWrapper: replace --run cd with --chdir
Lay the groundwork for switching to binary wrappers by reducing uses
of `--run` (which is not supported by `makeBinaryWrapper`).
2022-03-19 09:46:31 +01:00
Artturi 2768178711
Merge pull request #164735 from lopsided98/nixos-enter-cleanup
nixos/nixos-enter: fix resolv.conf error handling and cleanup
2022-03-19 03:09:03 +02:00
pennae e9f17a9f45 nixos/ssh: undeprecate knownHosts.«name».hostNames
hostNames being deprecated makes configuring hosts with multiple keys a
pain. including the attr name of the entry in the host name list is a
nice convenience though, so we'll retain it and clarify the
documentation on how the actual host name list for an entry is put
together.
2022-03-19 01:36:59 +01:00
Artturin 611b8c4472 nixos/nixos-generate-config: fix specifying --root /mnt --dir adir
it should save to `$PWD/adir` instead of `/mnt/adir`
and --dir adir should save to `$PWD/adir` instead of `/adir`
2022-03-18 23:16:19 +02:00
andr1an 00487b5a87 nixos/nixos-generate-config: resolve abspath to root 2022-03-18 23:16:06 +02:00
Ben Wolsieffer 69cff425e6 nixos/nixos-enter: cleanup resolv.conf handling 2022-03-18 12:19:09 -04:00
Ben Wolsieffer 1ee3d9477b nixos/nixos-enter: fix resolv.conf error handling 2022-03-18 12:19:02 -04:00
pennae e8bfc4d4a8
Merge pull request #164367 from jpathy/patch-2
networking.greTunnels: support ip6gre*
2022-03-18 15:43:03 +00:00
github-actions[bot] 588298ee0a
Merge staging-next into staging 2022-03-18 12:01:57 +00:00
Artturi 7958394022
Merge pull request #164624 from mart-w/fix/nixos/paperless-ng-fix-164615-consumation-bug
nixos/paperless-ng: fix #164615
2022-03-18 13:30:08 +02:00
github-actions[bot] 691557fc47
Merge staging-next into staging 2022-03-18 00:03:09 +00:00
Linus Heckemann 51f78ade78 nixos/jira: set home for jira user
Some plugins rely on being able to write to the user's home directory.
2022-03-18 00:01:41 +01:00
Silvan Mosberger 839b9b8ddc
Merge pull request #77622 from R-VdP/nixos-upgrade-reboot-window
NixOS/auto-upgrade: offer the possibility to define a reboot window during which the system may be automatically rebooted
2022-03-17 23:50:53 +01:00
Bob van der Linden 753b911708
nixos: systemd-tmpfiles: use cfg shorthand 2022-03-17 23:16:38 +01:00
Bob van der Linden 38d043de9c
nixos: systemd: split off systemd-tmpfiles into separate module 2022-03-17 23:16:37 +01:00
Bob van der Linden 0e665d1815
nixos: systemd-user: allow additional upstream user units
Currently it is only possible to add upstream _system_ units. The option
systemd.additionalUpstreamSystemUnits can be used for this.

However, this was not yet possible for systemd.user. In a similar
fashion this was added to systemd-user.nix.

This is intended to have other modules add upstream units.
2022-03-17 23:16:37 +01:00
Bob van der Linden b6d50528dd
nixos: systemd-user: use cfg shorthand 2022-03-17 23:16:37 +01:00
Bob van der Linden 022b4209a3
nixos: systemd: split off systemd-user into separate module 2022-03-17 23:16:37 +01:00
Bob van der Linden cae8ef1232
nixos: systemd-coredump: use cfg shorthand 2022-03-17 23:16:30 +01:00
Bob van der Linden ccfcb78a50
nixos: systemd: split off coredump into separate module 2022-03-17 23:15:49 +01:00
Bob van der Linden 7adc8ecac3
nixos: systemd-journald: use cfg shorthand 2022-03-17 23:13:36 +01:00
Bob van der Linden fee1e24b3b
nixos: systemd: split off journald into separate module 2022-03-17 23:13:36 +01:00
Bob van der Linden e2cb8903da
nixos: systemd-logind: use cfg shorthand 2022-03-17 23:13:27 +01:00
Bob van der Linden c647002a94
nixos: systemd: split off logind into separate module 2022-03-17 23:12:00 +01:00
Bob van der Linden 0c94a512dd
nixos: systemd: avoid using "with systemdUtils.lib" 2022-03-17 21:52:54 +01:00
Bob van der Linden 3420dba80a
nixos: systemd: move systemd-nspawn to systemd/nspawn 2022-03-17 21:52:37 +01:00
Maciej Krüger 0340236668
nixos/matrix-synapse: Fix configFile type
This is now a derivation as pkg.formats is used,
therefore this should be of type path
2022-03-17 19:53:30 +01:00
Martin Wurm fd2215b20c nixos/paperless-ng: fix #164615
Add an exception to the `paperless-ng-server` service's
`SystemCallFilter` as the `mbind` syscall is needed when consuming a
document while having a classification model present.
2022-03-17 19:35:20 +01:00
github-actions[bot] 739cf04cb7
Merge staging-next into staging 2022-03-17 18:02:05 +00:00
Félix Baylac-Jacqué b205832efe nixos/pleroma: regenerate empty release cookie files
Since b9cfbcafdf, the lack of hexdump in
the closure lead to the generation of empty cookie files. This empty
cookie file is making pleroma to crash at startup now we correctly
read it.

We introduce a migration forcing these empty cookies to be
re-generated to something not empty.
2022-03-17 15:22:14 +01:00
Félix Baylac-Jacqué 71d9048f72 nixos/pleroma: inject release cookie path to the pleroma package
We inject the release cookie path to the pleroma derivation in order
to wrap pleroma_ctl with it. Doing this allows us to remove the
systemd-injected RELEASE_COOKIE path, which was sadly
buggy (RELEASE_COOKIE should point to the *content* of the cookie, not
the file containing it).

We take advantage of this to factor out the cookie path.
2022-03-17 15:22:14 +01:00
jpathy 0a62de4cd5 networking.greTunnels: support ip6gre* 2022-03-17 17:59:36 +05:30
Luflosi 47b699fe6c
Revert "nixos/modprobe: add boot.initrd.extraModprobeConfig option"
This reverts commit 1c58cdbeed, since this change was made redundant by 3dc6fab5c9 and in https://github.com/NixOS/nixpkgs/pull/145013 we decided to revert this commit.
2022-03-17 12:56:02 +01:00
Jan Tojnar d2efc3ef70 nixos/networkmanager: Allow overriding installed plug-ins
Now, one can just use `networking.networkmanager.plugins = lib.mkForce [];`
if they want to get rid of the plug-ins.

Co-authored-by: lassulus <lassulus@lassul.us>
2022-03-17 04:50:53 +01:00
Martin Weinelt 8b7ca8bdcb
nixos/prometheus-exporters/kea: wait for kea
Fixes race conditions like this:

> systemd[1]: Started prometheus-kea-exporter.service.
> kea-exporter[927]: Listening on http://0.0.0.0:9547
> kea-exporter[927]: Socket at /run/kea/dhcp4.sock does not exist. Is Kea running?
> systemd[1]: prometheus-kea-exporter.service: Main process exited, code=exited, status=1/FAILURE
2022-03-17 03:27:21 +01:00
github-actions[bot] 2eac3106df
Merge staging-next into staging 2022-03-17 00:02:45 +00:00
Robert Hensing 0395086d0c
Merge pull request #162271 from Infinisil/warn-no-type
Throw an error for options without a type
2022-03-16 22:58:45 +01:00
Sandro 99f75e17d3
Merge pull request #164270 from alyssais/locate-pruneNames 2022-03-16 21:17:48 +01:00
Robert Hensing e98ae78636
Merge pull request #164317 from bobvanderlinden/pr-move-systemd-fns-lib
nixos: systemd: split off helper functions into systemd-lib
2022-03-16 21:05:12 +01:00
github-actions[bot] 177bd4ed53
Merge staging-next into staging 2022-03-16 18:01:43 +00:00
Maximilian Bosch 5226029af8
Merge pull request #164313 from Ma27/drop-nextcloud21
nextcloud21: remove
2022-03-16 17:59:53 +01:00
Artturi b734f40478
Merge pull request #154004 from illustris/hadoop 2022-03-16 14:05:56 +02:00
Alyssa Ross a65930ca21
nixos/locate: disable default findutils pruneNames
It doesn't make sense to have a default value for this that's
incompatible with the default locate implementation.  It means that
just doing services.locate.enable = true; generates a warning, even if
you don't care about pruning anything.  So only use the default prune
list if the locate implementation supports it (i.e., isn't findutils).
2022-03-16 11:06:38 +00:00
zowoq 6431086967 Merge remote-tracking branch 'origin/staging-next' into staging
Conflicts:
	pkgs/development/python-modules/symengine/default.nix
2022-03-16 16:03:43 +10:00
Alexander Bantyev 1e49b301b9
Merge pull request #164068 from cab404/master
os-release: preserve fields from being excessively quoted
2022-03-16 07:46:16 +03:00
Ryan Mulligan 0ab73f9a3f
Merge pull request #162535 from astro/pacemaker
pacemaker: init
2022-03-15 16:06:56 -07:00
Luflosi 1b34039b5f
nixos/tor: fix services.tor.client.enable = false not working
If `services.tor.client.enable` is set to false (the default), the `SOCKSPort` option is not added to the torrc file but since Tor defaults to listening on port 9050 when the option is not specified, the tor client is not actually disabled. To fix this, simply set `SOCKSPort` to 0, which disables the client.
Use `mkForce` to prevent potentially two different `SOCKSPort` options in the torrc file, with one of them being 0 as this would cause Tor to fail to start. When `services.tor.client.enable` is set to false, this should always be disabled.
2022-03-15 23:39:02 +01:00
Bob van der Linden 9bc093b30a
nixos: systemd: split off helper functions into systemd-lib 2022-03-15 21:52:13 +01:00
Maximilian Bosch 15876a546c
nextcloud21: remove
EOLed by upstream in 2022-02[1].

[1] https://docs.nextcloud.com/server/23/admin_manual/release_schedule.html#older-versions
2022-03-15 21:26:46 +01:00
Jan Tojnar 0f94c5b151
Merge pull request #164105 from ncfavier/ibus
ibus: 1.5.24 -> 1.5.26
2022-03-15 21:24:52 +01:00
Luflosi 3c63da7cf8
nixos/tor: allow tor to read resolv.conf when using resolved
When `services.resolved.enable` is set to true, the file /etc/resolv.conf becomes a symlink to /etc/static/resolv.conf, which is a symlink to /run/systemd/resolve/stub-resolv.conf. Without this commit, tor does not have access to this file thanks to systemd confinement. This results in the following warning when tor starts:
```
[warn] Unable to stat resolver configuration in '/etc/resolv.conf': No such file or directory
[warn] Could not read your DNS config from '/etc/resolv.conf' - please investigate your DNS configuration. This is possibly a problem. Meanwhile, falling back to local DNS at 127.0.0.1.
```
To fix this, simply allow read-only access to the file when resolved is in use.
According to https://github.com/NixOS/nixpkgs/pull/161818#discussion_r824820462, the symlink may also point to /run/systemd/resolve/resolv.conf, so allow that as well.
2022-03-15 15:16:14 +01:00
Vladimir Serov 0c68e23f52
nixos/modules/version: remove unnecessary quoting
(In cases it is unnecessary)
2022-03-15 14:17:59 +03:00
Michele Guerini Rocco c0ede26162
Merge pull request #164050 from LunNova/lunnova/disable-lucida-bitmap-fonts
Remove ancient unfree bitmap fonts from fonts.defaultXFonts
2022-03-15 09:42:07 +01:00
Jonathan Ringer 0326d67a58 nixos/nvidia: add vaapi support 2022-03-14 22:35:11 -07:00
Alexander Shpilkin 0d233ebed0
nixos/facetimehd: add option hardware.facetimehd.withCalibration
The new option (disabled by default) pulls in the experimental sensor
calibration files for the Facetime HD camera. These will also be pulled
in by hardware.enableAllFirmware.
2022-03-15 03:42:49 +03:00
Naïm Favier aaad72a37c
nixos/environment: add GTK paths to pathsToLink 2022-03-14 18:01:16 +01:00
Luke Granger-Brown 247a1809a4
Merge pull request #163431 from nazarewk/update-plantuml-server
plantuml-server 1.2021.12 -> 1.2022.2
2022-03-14 13:37:49 +00:00
Alyssa Ross d7e181ff83
Merge remote-tracking branch 'nixpkgs/staging-next' into staging
Conflicts:
	pkgs/development/compilers/ocaml/4.12.nix
	pkgs/development/python-modules/oci/default.nix
	pkgs/tools/admin/bubblewrap/default.nix
2022-03-14 12:33:16 +00:00
Alexander Bantyev 8eb9d6c0d4
Merge pull request #163622 from ilya-fedin/mate-allow-remove-any-package
nixos/mate: allow remove any added package
2022-03-14 15:26:58 +03:00
Pascal VITOUX 045b819959 nixos/graylog: fix group creation
As described in #163571, the graylog group was not created by the
module.
2022-03-14 10:13:15 +01:00
Janne Heß 7668896154
Merge pull request #164060 from ncfavier/fix-installBootLoader
nixos/switch-to-configuration: fix installBootLoader escaping
2022-03-14 09:21:27 +01:00
Maximilian Bosch 0c5586c2f2
Merge pull request #162254 from Ma27/init-dmarc-exporter
prometheus-dmarc-exporter: init at 0.5.1
2022-03-14 09:02:08 +01:00
Bobby Rong f6a48cd9fc
Merge pull request #163960 from bobby285271/pantheon
nixos/pantheon: enable xdg desktop integration
2022-03-14 09:23:42 +08:00
Naïm Favier 9bdd2f852c
nixos/switch-to-configuration: fix installBootLoader escaping
Use a quoted heredoc to inject installBootLoader safely into the script,
and restore the previous invocation of `system` with a single argument so
that shell commands keep working.
2022-03-14 02:12:52 +01:00
Luna Nova 95077158aa
nixos/fonts: Remove ancient bitmap fonts from defaultXFonts
See https://github.com/NixOS/nixpkgs/issues/160740
2022-03-13 15:37:48 -07:00
Sander van der Burg 43543a6bbc
Merge pull request #163716 from svanderburg/fixtomcat
nixos/tomcat: configure default group and fix broken default package …
2022-03-13 21:43:45 +01:00
Luke Granger-Brown 1853015550 nixos/pam: add support for pam-ussh
pam-ussh allows authorizing using an SSH certificate stored in your
SSH agent, in a similar manner to pam-ssh-agent-auth, but for
certificates rather than raw public keys.
2022-03-13 17:31:46 +00:00
Giulio De Pasquale b77494badb nixos/jellyfin: Disable PrivateDevices from hardening to allow GPU endpoints to be accessed 2022-03-13 17:01:10 +00:00
Janne Heß 3148b3d365
Merge pull request #163069 from helsinki-systems/feat/minor-stc-improvements
nixos/switch-to-configuration: Few minor/medium improvements
2022-03-13 17:50:36 +01:00
Luke Granger-Brown 5f81753d1b
Merge pull request #162252 from sternenseemann/systemd-boot-builder-fix-errors
sdboot-builder: fix crash in exception handling
2022-03-13 14:19:54 +00:00
Maëlys Bras de fer 529b09a729 sdboot-builder: fix crash in exception handling 2022-03-13 14:38:01 +01:00
Peter Hoeg d853dc52d8 nixos/squeezelite: add support for PulseAudio version 2022-03-13 21:08:52 +08:00
Sander van der Burg d12186a601 nixos/tomcat: configure default group and fix broken default package reference
Without this fix, evaluating a NixOS configuration with Tomcat enabled and the
default settings results in the following evaluation error:

Failed assertions:
- users.users.tomcat.group is unset. This used to default to
nogroup, but this is unsafe. For example you can create a group
for this user with:
users.users.tomcat.group = "tomcat";
users.groups.tomcat = {};
2022-03-13 14:00:09 +01:00
Peter Hoeg 80b9bfdfb1 nixos/captive-browser: add to menu bar 2022-03-13 20:22:00 +08:00
Peter Hoeg 895090bf89 nixos/earlyoom: use the newly introduced systembus-notify option
Also some cleanups.
2022-03-13 20:21:21 +08:00
Peter Hoeg 27e32bbfde nixos/systembus-notify: add support for system services notifying users 2022-03-13 20:21:21 +08:00
Bobby Rong 65f9112d6b
nixos/pantheon: enable xdg desktop integration
This prevents the embarrassing situation in https://github.com/NixOS/nixpkgs/pull/163828 from happening again.
2022-03-13 12:50:17 +08:00
Luke Granger-Brown c30918d419 nixos/networkd: add support for more WireGuard options (introduced in systemd v250)
As of systemd/systemd@e908434458,
systemd-networkd now automatically configures routes to addresses
specified in AllowedIPs unless explicitly disabled with
"RouteTable=off".
2022-03-13 04:13:03 +00:00
Luke Granger-Brown 8035c513e3
Merge pull request #163673 from lukegb/pomerium
pomerium: 0.15.7 -> 0.17.0
2022-03-13 02:20:38 +00:00
Pierre Bourdon 9fad223ad1
matrix-synapse: fix release notes and doc for #158605 changes 2022-03-12 21:58:26 +01:00
Kevin Cox 3222d8665d
Merge pull request #159865 from midchildan/update/epgstation
epgstation: 1.7.5 -> 2.6.20
2022-03-12 13:42:49 -05:00
Artturi 1389c15b77
Merge pull request #163304 from gravndal/amule-daemon 2022-03-12 16:18:29 +02:00
Ian Kerins 4c6772e2a1 nixos/oci-containers: improve description of imageFile
As a novice to using this module, I found the existing description to be
quite misleading. It does not at all disable pulling from the registry,
it just loads some image archive that may or may not be related to the
container you're specifying. I had thought there was extra magic behind
this option, but it's just a `docker load`. You need foreknowledge of
the contents of the archive so that whatever it contained is actually
used to run the container.

I've reworded the description to hopefully make this behavior clearer.
2022-03-12 11:14:22 +01:00
midchildan 697ea7c69c
epgstation: make updateScript create EditorConfig-compliant files 2022-03-12 15:10:39 +09:00
midchildan 561c0c2851
nixos/rl-2205: add entries for EPGStation v2 2022-03-12 15:10:38 +09:00
midchildan 5e7be6b480
nixos/epgstation: changes for EPGStation v2 2022-03-12 15:10:37 +09:00
Luke Granger-Brown 3004e58f6a nixos/pomerium: avoid blocking when renewing ACME certificates 2022-03-11 14:09:19 +00:00
Ilya Fedin dd510b9053 nixos/mate: allow remove any added package
Only extra packages removable currently, but it's possible to run MATE without packages like caja or yelp
2022-03-11 17:25:24 +04:00
Janne Heß 461c1c9e86
nixos/switch-to-configuration: Use parenthesis on all calls 2022-03-11 14:05:20 +01:00
Janne Heß bc58430068
nixos/switch-to-configuration: Fix reloading of stopped services 2022-03-11 14:05:19 +01:00
Janne Heß 3052d3aa50
nixos/switch-to-configuration: Fix restarting by activation script
This bug is so obscure and unlikely that I was honestly not able to
properly write a test for it. What happens is that we are calling
handleModifiedUnit() with $unitsToStart=\%unitsToRestart. We do this to
make sure that the unit is stopped before it's started again which is
not possible by regular means because the stop phase is already done
when calling the activation script.

recordUnit() still gets $startListFile, however which is the wrong file.
The bug would be triggered if an activation script requests a service
restart for a service that has `stopIfChanged = true` and
switch-to-configuration is killed before the restart phase was run. If
the script is run again, but the activation script is not requesting
more restarts, the unit would be started instead of restarted.
2022-03-11 13:30:03 +01:00
Janne Heß c96180c53f
nixos/switch-to-configuration: Ignore some unit keys
Some unit keys don't need to restart the service to make them effective.
Reduce the amount of service restarts by ignoring these keys
2022-03-11 13:30:03 +01:00
github-actions[bot] ed2c56a3c5
Merge staging-next into staging 2022-03-11 12:01:55 +00:00
Bobby Rong 8a56a49cc7
Merge pull request #162411 from kurnevsky/tox-node-service-fix
tox-node: fix config hash and url
2022-03-11 18:09:35 +08:00
Profpatsch 75b08e3624 modules/github-runner: Improve description of url
We spent a whole afternoon debugging this, because upstream has very
bad software quality and the error messages were incredibly
misleading.

So let’s document it for the sanity of other people.

Btw, I think the implementation of our module is pretty brittle,
especially the part about diffing tokens to check whether they
changed. We should rather just request a new builder registration
every time, it’s not that much overhead, and always set `replace` so
it is idempotent.
2022-03-11 10:26:39 +01:00
illustris e1017adb32 nixos/hadoop: add module options for commonly used service configs 2022-03-11 14:26:57 +05:30
illustris bef71d7c53 nixos/hadoop: use CGroups to enforce container limits by default 2022-03-11 14:18:44 +05:30
illustris 716b0dfaaf nixos/hadoop: add gateway role 2022-03-11 14:18:44 +05:30
illustris d39056d165 nixos/hadoop: fix tests for hadoop 2 and 3.2 2022-03-11 14:18:44 +05:30
illustris 8aeb60f034 nixos/hadoop: use FairScheduler by default 2022-03-11 14:18:44 +05:30
illustris c82d48913f nixos/hadoop: add HADOOP_CONF_DIR to env 2022-03-11 14:18:44 +05:30
illustris 0f97c9ae82 nixos/hadoop: disable openFirewall by default 2022-03-11 14:18:44 +05:30
illustris f6cf1ced33 nixos/hadoop: refactor HDFS configs 2022-03-11 14:18:34 +05:30
Krzysztof Nazarewski 4ea5398d20
plantuml-server 1.2021.12 -> 1.2022.2
- changed JDK version to 17 (11+ required)
- added maven build reproducibility
2022-03-11 09:05:35 +01:00
github-actions[bot] 7a0501594d
Merge staging-next into staging 2022-03-11 06:02:02 +00:00
pennae af0f3944bd
Merge pull request #163009 from scvalex/nbd-service
nbd: add nbd service and test
2022-03-11 01:02:10 +00:00
github-actions[bot] eaea048b2a
Merge staging-next into staging 2022-03-11 00:02:48 +00:00
Martin Weinelt 76721f5e5e
Merge pull request #159986 from NukaDuka/pve_exporter 2022-03-10 22:41:45 +01:00
github-actions[bot] 03c9842a65
Merge staging-next into staging 2022-03-10 18:02:01 +00:00
Giulio De Pasquale 81781c338d
Jellyfin: Disable ProtectClock to allow NVENC, NVDEC acceleration 2022-03-10 00:19:57 +00:00
github-actions[bot] ded44e80ff
Merge staging-next into staging 2022-03-10 00:02:45 +00:00
Evgeny Kurnevsky d94be44526
tox-node: fix config 2022-03-09 23:27:34 +03:00
Giulio De Pasquale 3b944f4c0c
Jellyfin: Fix NVENC, NVDEC usage by allowing AF_UNIX
Fix NVENC, NVDEC usage when transcoding with hardware capabilities
2022-03-09 19:44:06 +00:00
Lassulus 155c02837b
Merge pull request #163383 from Lassulus/tor_newlines
nixos/tor: admit newlines in secret key
2022-03-09 19:19:39 +01:00
github-actions[bot] b4fed0cbba
Merge staging-next into staging 2022-03-09 18:05:08 +00:00
pennae 06c57317c2
Merge pull request #146653 from DarkDNA/nixos/fix-systemd-exporter/extraFlags
nixos/prometheus/systemd: Implement the extraFlags config option.
2022-03-09 16:12:32 +00:00
Googlebot b2068c1248
Merge branch 'NixOS:master' into master 2022-03-09 09:58:39 -05:00
lassulus 236a731da0 nixos/tor: admit newlines in secret key 2022-03-09 15:11:01 +01:00
Robert Hensing 646e888011 nixos/nix-daemon: Stop warning about nix.settings
Out-of-tree modules that use it can not upgrade yet.
There's no real hurry and we should avoid warning fatigue.
2022-03-09 14:53:53 +01:00
github-actions[bot] f6b4a4048a
Merge staging-next into staging 2022-03-09 12:01:59 +00:00
Alexandru Scvortov 252f20aaa2 nbd: add programs.nbd, services.nbd, and test
Changes:

nbd: Update nixos/modules/services/networking/nbd.nix

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>

nbd: Update nixos/modules/services/networking/nbd.nix

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>

nbd: Update nixos/tests/nbd.nix

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>

nbd: generalize options in nbd service

nbd: harden service

nbd: Update nixos/modules/services/networking/nbd.nix

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>

nbd: Update nixos/modules/services/networking/nbd.nix

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>

nbd: refactor code a bit and BindPaths automatically
2022-03-09 12:00:47 +00:00
Alyssa Ross 43aa75b313
Merge remote-tracking branch 'nixpkgs/staging-next' into staging
Conflicts:
	nixos/doc/manual/from_md/release-notes/rl-2205.section.xml
	nixos/doc/manual/release-notes/rl-2205.section.md
2022-03-09 11:20:38 +00:00
Peter Hoeg d44916d12f nixos/activation: allowed quoted values in /etc/os-release 2022-03-09 17:07:48 +08:00
R-VdP 39f3eb3004 NixOS/auto-upgrade: offer the possibility to define a reboot window during which the system may be automatically rebooted
Some systems should not be rebooted at just any time. If the upgrade process takes too long, for instance because of a
slow internet connection, or if the upgrade service is ran during production hours, we want to allow to define a window
outside of which a reboot will not be performed.
The system will then reboot on the next run of the upgrade service which finishes inside the reboot window.

E.g. we can run the update service twice per week, once during the night and once during the day, but reboots are only
allowed during the night. By doing so, a system that is usually shut down during the night will still receive updates
and systems that are turned on 24/7 can be rebooted outside of production hours.

Co-authored-by: Silvan Mosberger <github@infinisil.com>
2022-03-09 08:18:16 +01:00
Astro a60ab35dd6 nixos: init corosync, pacemaker modules 2022-03-08 20:28:56 +01:00
illustris dd5f004b06 nixos/hadoop: refactor HDFS options 2022-03-09 00:06:17 +05:30
illustris 6efa931c51 nixos/hadoop: fix mkenableoption text 2022-03-09 00:06:17 +05:30
Bernardo Meurer e3a73aed43
Merge pull request #163255 from NickCao/nix
nixVersions.stable: 2.6.1 -> 2.7.0
2022-03-08 10:22:51 -08:00
Nick Cao 3c09fec700
nix-fallback-paths.nix: Update to 2.7.0 2022-03-08 22:40:16 +08:00
Sandro a879922e62
Merge pull request #163208 from Izorkin/fix-modsecurity-nginx 2022-03-08 13:11:42 +01:00
Sandro e9183df241
Merge pull request #157923 from tim-tx/update/dendrite-0.6.0 2022-03-08 12:51:04 +01:00
Sandro 1a0b804799
Merge pull request #162866 from euank/k3s-unified-cgroups 2022-03-08 12:39:37 +01:00
Sandro 0ffade9012
Merge pull request #162214 from ncfavier/redis-bind-localhost 2022-03-08 12:38:39 +01:00
Izorkin b672e4dd2c
nginxModules: add option disableIPC
The disableIPC option is required to checking enabled nginxModules
and disable the SystemCallFilter IPC filter.
2022-03-08 14:37:11 +03:00
Gaute Ravndal fe6f628343 nixos/amuled: fix package reference in service definition
The amuleDaemon package was renamed to kebab-case in 81ef57d6.
2022-03-08 12:14:25 +01:00
Artturi 5cd34745f0
Merge pull request #161701 from RyanGibb/zsh-autosuggest-strategy-array 2022-03-08 12:01:07 +02:00
ajs124 a28591680b nixos/prometheus/exporters/varnish: improve some defaults 2022-03-08 01:42:27 +01:00
github-actions[bot] 40d2f7c54e
Merge staging-next into staging 2022-03-08 00:02:45 +00:00
Maciej Krüger a1cbf8cfff
nixos/haste-server: add 2022-03-07 23:38:23 +01:00
Kim Lindberger b71a8e2383
Merge pull request #162095 from midchildan/fix/keycloak-mysql
nixos/keycloak: fix database provisioning issues
2022-03-07 20:13:01 +01:00
github-actions[bot] 4ec6244865
Merge staging-next into staging 2022-03-07 18:01:46 +00:00
Timo Kaufmann 94ea3a8899
Merge pull request #160777 from LunNova/improve-input-remapper-module
nixos/input-remapper: Fix missing [], add more options, add test
2022-03-07 18:51:08 +01:00
Maciej Krüger 75ea3ea9b8
Merge pull request #157438 from sbruder/nitter-package-option 2022-03-07 18:50:27 +01:00
Luna Nova 865e0df2fc
nixos/input-remapper: add nixos test for input-remapper 2022-03-07 08:31:40 -08:00
Luna Nova d8cb494765
nixos/input-remapper: Fix missing [] for package, add enableUdevRules and serviceWantedBy options, add meta.maintainers 2022-03-07 08:31:40 -08:00
Ryan Gibb 34b5dd453b nixos/zsh-autosuggestions: ZSH_AUTOSUGGEST_STRATEGY array
zsh-autosuggestions supports having fallback strategies expressed
through the ZSH_AUTOSUGGEST_STRATEGY array. For example,
`ZSH_AUTOSUGGEST_STRATEGY=(history completion)`. We should also support
this.
2022-03-07 16:29:00 +00:00
Sandro 652aa6df2c
Merge pull request #158015 from j0hax/kclockd-integration 2022-03-07 17:21:08 +01:00
xlambein 54f2cde947 pipewire-media-session: changed options to take defaults from JSON
Currently, default options for media-session are empty, making it harder
to adapt them without fully overwriting them.  This commit sets these
defaults to the content of the JSON files provided with media-session.
2022-03-07 11:25:12 +01:00
Alyssa Ross 70d3697f8c
nixos/resolvconf: allow disabling
For systems without internet connections, it doesn't make sense to
require the existence of an /etc/resolv.conf file to disable
resolvconf, so let's expose networking.resolveconf.enable as a public
option that can be set to false.
2022-03-06 11:47:29 +00:00
Andreas Rammhold d67caf3c89 nixos/timesyncd: initialize clock file with current time
When initializing a system (e.g. first boot / livecd) we have no good
reference source for time. systemd-timesyncd however would revert back
to its configured fallback time (in our case 01.01.1980). Since we
probably don't want to hardcode a specific date as fallback we are now
using the current system time (wherever that might have come from) to
initialize the reference clock file.

The only systems that might be remotely affected by this change are
machines that have highly unreliable RTCs or those where the battery
that backs the RTC is running empty.

Historically these systems always had a tough time with anything time
related and likely required manual intervention.

For stateless systems (those that wipe / between reboots or our
installer CDs) this has the consequence that time will always be reset
to whatever the system comes up with on boot. This is likely the correct
time coming from an RTC. No harm done here the situation is likely
unchanged for them.

For stateful systems (those that retain the / partition across reboots)
there shouldn't be a change at all. They'll provide an initial clock
value once on their lifetime (during first boot / after installation).
From then onwards systemd-timesyncd will update the file with the newer
fallback time (that will be picked up on the next boot).
2022-03-05 21:27:45 +01:00
Euan Kemp e6d1c597f1 nixos/k3s: use the systemd driver for docker + unified cgroups
This is necessary for it to work at all. The single-node-docker test
will fail without this change.

Also add a release note for it.
2022-03-05 11:30:53 -08:00
github-actions[bot] 47494ea53c
Merge staging-next into staging 2022-03-05 18:01:48 +00:00
tim-tx 5a6b36e498 dendrite: 0.5.1 -> 0.6.5 2022-03-05 11:41:31 -05:00
Martin Weinelt 5556fc8f8f
Merge pull request #162407 from mweinelt/zigbee2mqtt 2022-03-05 15:33:57 +01:00
piegames be4a0e6e40
Merge pull request #158605 from mweinelt/synapse-rfc42
nixos/matrix-synapse: migrate to rfc42 settings and formatter
2022-03-05 15:23:52 +01:00
pacien 0091e3198a nixos/taskserver: do not open firewall port implicitly
This adds an option `services.taskserver.openFirewall` to allow the user
to choose whether or not the firewall port should be opened for the
service. This is no longer the case by default.

See also https://github.com/NixOS/nixpkgs/issues/19504.
2022-03-05 15:15:50 +01:00
pacien 9013352e3f nixos/taskserver: port helper-tool to Python 3 2022-03-05 14:54:08 +01:00
piegames cd7e516b26
Merge pull request #156858: nixos/polkit: don't enable by default 2022-03-05 14:48:35 +01:00
Martin Weinelt 8a95d9fede
nixos/flatpak: enable polkit
via https://github.com/NixOS/nixpkgs/pull/156858#issuecomment-1022254342
2022-03-05 13:57:30 +01:00
github-actions[bot] fade30f7b2
Merge staging-next into staging 2022-03-05 12:01:44 +00:00
Johannes Arnold e21874098d nixos/kclock: integrate with dbus 2022-03-05 12:38:36 +01:00
ngerstle 8aaa0699db k3s: enable enableUnifiedCgroupHierarchy 2022-03-05 00:18:17 -08:00
Sandro 13c9be5066
Merge pull request #160482 from jansol/pipewire 2022-03-05 03:08:25 +01:00
Martin Weinelt f799a02bca
nixos/synapse: move into matrix category 2022-03-04 23:57:35 +01:00
Martin Weinelt a483264931
nixos/matrix-synapse: fix registerNewMatrixUser script 2022-03-04 23:57:34 +01:00
Martin Weinelt d918011885
nixos/matrix-synapse: update manual with settings option 2022-03-04 23:57:29 +01:00
Martin Weinelt f7286992d2
nixos/matrix-synapse: migrate to rfc42 settings and formatter 2022-03-04 23:57:28 +01:00
github-actions[bot] d3cf053b7f
Merge staging-next into staging 2022-03-04 18:01:54 +00:00
Pascal Bach b5fa1aa46f
Merge pull request #162496 from Baughn/master
pam: Fix google-authenticator reference
2022-03-04 17:18:17 +01:00
Alyssa Ross c010a19a56
Merge remote-tracking branch 'nixpkgs/staging-next' into staging
Conflicts:
	pkgs/development/python-modules/hypothesmith/default.nix
2022-03-04 14:53:05 +00:00
Yaya 38246ed194 nixos/snowflake-proxy: init
This commit introduces snowflake-proxy [1], a system to circumvent internet
censorship.

[1] https://snowflake.torproject.org/
2022-03-04 08:41:38 -06:00
Naïm Favier 2e46cc1f00 nixos/earlyoom: remove useKernelOOMKiller
This option is deprecated and ignored by earlyoom since 1.2.
2022-03-04 13:04:24 +00:00
Janne Heß 803f7d4af5
Merge pull request #161838 from helsinki-systems/feat/stc-less-socket-restarts
nixos/switch-to-configuration: Document and test handling of socket-activated services
2022-03-04 09:32:55 +01:00
github-actions[bot] c1557eb7f1
Merge staging-next into staging 2022-03-04 06:01:51 +00:00
Jonas Heinrich 9a30f53ffe nixos/firejail: Fix order of extrsArgs before profile wrappedBinaries option 2022-03-03 21:35:37 -05:00
Peter Hoeg bae181d3f0 nixos/os-release: generate from attrset 2022-03-04 09:36:40 +08:00
Janne Heß 1def557525
nixos/switch-to-configuration: Document and test socket-activated services 2022-03-03 20:49:20 +01:00
github-actions[bot] d00621a67c
Merge staging-next into staging 2022-03-03 00:13:12 +00:00
Jonas Heinrich 764670261a nixos/opensnitch: Add options to configure daemon 2022-03-02 18:38:56 -05:00
Renaud 671a068a01
Remove F-PROT package and service module (EoL) (#160372) 2022-03-02 21:51:47 +02:00
aszlig 7286be7e81 nixos/systemd-confinement: Allow shipped unit file
In issue #157787 @martined wrote:

  Trying to use confinement on packages providing their systemd units
  with systemd.packages, for example mpd, fails with the following
  error:

  system-units> ln: failed to create symbolic link
  '/nix/store/...-system-units/mpd.service': File exists

  This is because systemd-confinement and mpd both provide a mpd.service
  file through systemd.packages. (mpd got updated that way recently to
  use upstream's service file)

To address this, we now place the unit file containing the bind-mounted
paths of the Nix closure into a drop-in directory instead of using the
name of a unit file directly.

This does come with the implication that the options set in the drop-in
directory won't apply if the main unit file is missing. In practice
however this should not happen for two reasons:

  * The systemd-confinement module already sets additional options via
    systemd.services and thus we should get a main unit file
  * In the unlikely event that we don't get a main unit file regardless
    of the previous point, the unit would be a no-op even if the options
    of the drop-in directory would apply

Another thing to consider is the order in which those options are
merged, since systemd loads the files from the drop-in directory in
alphabetical order. So given that we have confinement.conf and
overrides.conf, the confinement options are loaded before the NixOS
overrides.

Since we're only setting the BindReadOnlyPaths option, the order isn't
that important since all those paths are merged anyway and we still
don't lose the ability to reset the option since overrides.conf comes
afterwards.

Fixes: https://github.com/NixOS/nixpkgs/issues/157787
Signed-off-by: aszlig <aszlig@nix.build>
2022-03-02 11:42:44 -08:00
Kartik Gokte 6a0b420d94 nixos/prometheus-pve-exporter: init at 2.2.2 2022-03-02 23:59:33 +05:30
github-actions[bot] b50d36a69a
Merge staging-next into staging 2022-03-02 18:11:00 +00:00
Martin Weinelt d78f8c588d
nixos/udisks2: enable polkit 2022-03-02 17:38:36 +01:00
Kevin Cox 79862ae905
Merge pull request #161008 from rhysmdnz/xone
xone: init package and module
2022-03-02 11:26:51 -05:00
Svein Ove Aas cf0f406ed6 pam: Fix google-authenticator reference 2022-03-02 15:18:58 +00:00
Anders Kaseorg abfcc2e0ff mozillavpn: init at 2.7.1
Signed-off-by: Anders Kaseorg <andersk@mit.edu>
2022-03-01 22:41:23 -08:00
Martin Weinelt accca0bd6e
nixos/zigbee2mqtt: move into home-automation category 2022-03-01 19:19:31 +01:00
github-actions[bot] fbd1c5b484
Merge staging-next into staging 2022-03-01 12:11:43 +00:00
Maximilian Bosch 199d4224e9
Merge pull request #155207 from rapenne-s/freshclam_when_internet
clamav: start freshclan after network-online target
2022-03-01 11:14:30 +01:00
Solene Rapenne 317ca6bb4e clamav: remove freshclam service dependency 2022-02-28 22:51:07 +01:00
Silvan Mosberger b2d803ca57 nixos/treewide: Add last missing option types
Co-Authored-By: Janne Heß <janne@hess.ooo>
2022-02-28 22:50:06 +01:00
Maximilian Bosch 5cee9c9ef2
prometheus-dmarc-exporter: init at 0.5.1 2022-02-28 16:50:01 +01:00
Naïm Favier 6e4f5f9aee
nixos/redis: bind on localhost by default 2022-02-28 13:37:47 +01:00
github-actions[bot] f831b62376
Merge staging-next into staging 2022-02-28 12:01:47 +00:00
Janne Heß d32ba3f4b0
Merge pull request #161929 from martinetd/switchTest
logrotate: do not enable logrotate.service itself
2022-02-28 10:19:25 +01:00
Jonathan Ringer 3af9faf36d
Merge pull request #133431 from Ma27/glibc-2.34
glibc: 2.33-108 -> 2.34-115
2022-02-27 18:07:11 -08:00
Rok Garbas 993c35991b
Merge pull request #157693 from Radvendii/zammad
zammad: init at 5.0.2
2022-02-28 00:57:11 +01:00
zowoq 177281ad00 nixos/amazon-image: use 5_10 kernel and add assert 2022-02-27 15:04:37 -08:00
Janne Heß 5ec0477dfc
Merge pull request #161059 from hercules-ci/fix-nix-daemon-socket-availability
nixos/nix-daemon: Ensure continued availability of daemon socket
2022-02-27 17:57:57 +01:00
midchildan dc5bd4b375
nixos/keycloak: fix database provisioning issues
This fixes the following issues with the database provisioning script
included in the services.keycloak module:

- It lacked permission to access the DB password file specified in the
  module option 'services.keycloak.database.passwordFile'.

- It prevented Keycloak from starting after the second time if the user
  chose MySQL for the database.
2022-02-28 00:54:26 +09:00
Maximilian Bosch 1077a6e040
nixos/stage-1: typo fixes 2022-02-27 14:07:31 +01:00
Jörg Thalheim c219935f5e
Merge pull request #162056 from NickCao/bird-reload
nixos/bird: run service as non-root user, add test for reload
2022-02-27 09:48:04 +00:00
Maximilian Bosch da905d4cf9
nixos/stage-1: fix modprobe in initial ramdisk on systems w/glibc-2.34
This effectively fixes the majority of all VM tests which were broken
because `/dev/vda` (or any other block device) wasn't mountable:

      machine # mounting /dev/vda on /...
      machine # mount: mounting /dev/vda on /mnt-root/ failed: No such device[    2.820976] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000100
      machine # [    2.821757] CPU: 0 PID: 1 Comm: init Not tainted 5.10.72 #1-NixOS
      machine # [    2.821757] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
      machine # [    2.821757] Call Trace:
      machine # [    2.821757]  dump_stack+0x6b/0x83
      machine # [    2.821757]  panic+0x101/0x2c8
      machine # [    2.821757]  do_exit.cold+0x14/0xb3
      machine # [    2.821757]  do_group_exit+0x33/0xa0
      machine # [    2.821757]  __x64_sys_exit_group+0x14/0x20
      machine # [    2.821757]  do_syscall_64+0x33/0x40
      machine # [    2.821757]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
      machine # [    2.821757] RIP: 0033:0x7f67ec2800f6
      machine # [    2.821757] Code: 00 4c 8b 0d 2c 5d 11 00 eb 19 66 2e 0f 1f 84 00 00 00 00 00 89 d7 89 f0 0f 05 48 3d 00 f0 ff ff 77 22 f4 89 d7 44 89 c0 0f 05 <48> 3d 00 f0 ff ff 76 e2 f7 d8 64 41 89 01 eb da 66 2e 0f 1f 84 00
      machine # [    2.821757] RSP: 002b:00007fff8f5a71d8 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7
      machine # [    2.821757] RAX: ffffffffffffffda RBX: 0000000000699704 RCX: 00007f67ec2800f6
      machine # [    2.821757] RDX: 0000000000000001 RSI: 000000000000003c RDI: 0000000000000001
      machine # [    2.821757] RBP: 0000000000000004 R08: 00000000000000e7 R09: ffffffffffffff80
      machine # [    2.821757] R10: 00007f67ec33f3e0 R11: 0000000000000202 R12: 000000000000000b
      machine # [    2.821757] R13: 00007fff8f5a75a8 R14: 0000000000000000 R15: 00000000004fc198
      machine # [    2.821757] Kernel Offset: 0x31e00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
      machine # [    2.821757] Rebooting in 1 seconds..

This happened because the kernel failed to load modules such as `ext4`
from `boot.initrd.availableKernelModules`[1] on e.g. a `mount(2)` syscall.

The problem is that `kmod` isn't linked against `libpthread.so.0`
anymore because it got merged into `libc.so.6` (however, the .so still
exists), but still needs it:

      machine # newfstatat(AT_FDCWD, "/nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-glibc-2.34-36/lib/x86_64", 0x7ffd951114c0, 0) = -1 ENOENT (No such file or directory)
      machine # openat(AT_FDCWD, "/nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-glibc-2.34-36/lib/x86_64/libpthread.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
      machine # newfstatat(AT_FDCWD, "/nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-glibc-2.34-36/lib/x86_64", 0x7ffd951114c0, 0) = -1 ENOENT (No such file or directory)
      machine # openat(AT_FDCWD, "/nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-glibc-2.34-36/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
      machine # newfstatat(AT_FDCWD, "/nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-glibc-2.34-36/lib", 0x7ffd951114c0, 0) = -1 ENOENT (No such file or directory)
      machine # openat(AT_FDCWD, "/nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-glibc-2.34-36/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
      machine # writev(2, [{iov_base="/nix/store/kdc9n48ksdc1a8y8w512w"..., iov_len=69}, {iov_base=": ", iov_len=2}, {iov_base="error while loading shared libra"..., iov_len=36}, {iov_base=": ", iov_len=2}, {iov_base="libpthread.so.0", iov_len=15}, {iov_base=": ", iov_len=2}, {iov_base="cy
      machine # ) = 184
      machine # exit_group(127)                         = ?
      machine # +++ exited with 127 +++
      machine # mount: mounting /dev/vda on /mnt-root/ failed: No such device
      machine # [   19.167180] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000100
      machine # [   19.167711] CPU: 0 PID: 1 Comm: init Not tainted 5.10.72 #1-NixOS

This is not a problem

* inside stage-1 because `LD_LIBRARY_PATH` points to `$out/lib` of
  extra-utils where `libpthread.so.6` also exists.
* on a running system because `${pkgs.glibc}/lib` is part of kmod's
  rpath.

However this is a problem inside the kernel which calls `modprobe` (in
our case `kmod`) to load modules and doesn't know about
`LD_LIBRARY_PATH`. Also, the rpath-reference was nuked.

To work around this, the kernel's `modprobe`
(i.e. `/proc/sys/kernel/modprobe`) now points to a wrapper which
explicitly declares `LD_LIBRARY_PATH`. We can't use `makeWrapper` here
because `modprobe` itself must not be renamed. Otherwise, `kmod` (which
is the link-target of `modprobe`) won't work because it expects
`argv[0] == "modprobe"` to perform modprobe's tasks.

[1] https://nixos.org/manual/nixos/stable/options.html#opt-boot.initrd.availableKernelModules
2022-02-27 10:26:51 +01:00
Nick Cao 6e389e6367
nixos/bird: run service as non-root user, add test for reload 2022-02-27 16:19:22 +08:00
Dominique Martinet 0dadec45d8 logrotate/systemd: add 'minsize = 1M' to wtmp/btmp rotation
align with upstream logrotate which added the minsize rule at some point.
This avoids needlessly rotating the files too often as brought up in
https://github.com/NixOS/nixpkgs/pull/159187#issuecomment-1052426774
2022-02-27 07:20:26 +09:00
Martin Weinelt 308403c329
Merge pull request #161663 from felixsinger/update/pkgs/mumble 2022-02-26 22:38:26 +01:00
Felix Singer c267e9ce37 mumble,murmur: 1.3.4 -> 1.4.231
Update version to 1.4.231.

Build 231 points to a specific commit from the 1.4.x branch adding many
fixes and improvements. Since this version is an unofficial release, add
an unstable prefix to the version string in Nixpkgs.

Signed-off-by: Felix Singer <felixsinger@posteo.net>
Signed-off-by: Franz Pletz <fpletz@fnordicwalking.de>
2022-02-26 22:08:22 +01:00
Maciej Krüger 42a5831e62
nixos/pgadmin: init 2022-02-26 14:30:14 +01:00
Dominique Martinet 4d12b79cd7 logrotate: do not enable logrotate.service itself
logrotate.timer is enough for rotating logs. Enabling logrotate.service would
make the service start on every configuration switch, leading to tests failure when
logrotate is enabled.

Also update test to make sure the timer is active and runs the service
on date change.
2022-02-26 19:13:12 +09:00
K900 cb2cfba6f7 treewide: switch all desktop file generators to new API
Notably:
- remove explicit arguments that match the defaults
- convert everything to the right Nix types
2022-02-25 13:40:38 -08:00
Luflosi 0eb1d070c8 ipfs-migrator: 1.7.1 -> 2.0.2
https://github.com/ipfs/fs-repo-migrations/releases/tag/v2.0.2

This is pretty much a complete rewrite of the ipfs-migrator package.
In version 2.0.0 a major change was made to the way the migrator works. Before, there was one binary that contained every migration. Now every migration has its own binary. If fs-repo-migrations can't find a required binary in the PATH, it will download it off the internet. To prevent that, build every migration individually, symlink them all into one package and then wrap fs-repo-migrations so it finds the package with all the migrations.
The change to the IPFS NixOS module and the IPFS package is needed because without explicitly specifying a repo version to migrate to, fs-repo-migrations will query the internet to find the latest version. This fails in the sandbox, for example when testing the ipfs passthru tests.
While it may seem like the repoVersion and IPFS version are in sync and the code could be simplified, this is not the case. See https://github.com/ipfs/fs-repo-migrations#when-should-i-migrate for a table with the IPFS versions and corresponding repo versions.
Go 1.17 breaks the migrations, so use Go 1.16 instead. This is also the Go version used in their CI, see 3dc218e300/.github/workflows/test.yml (L4). See https://github.com/ipfs/fs-repo-migrations/pull/140#issuecomment-982715907 for a previous mention of this issue. The issue manifests itself when doing anything with a migration, for example `fs-repo-11-to-12 --help`:
```
panic: qtls.ClientHelloInfo doesn't match

goroutine 1 [running]:
github.com/marten-seemann/qtls-go1-15.init.0()
	github.com/marten-seemann/qtls-go1-15@v0.1.1/unsafe.go:20 +0x132
```
Also add myself as a maintainer for this package.
This fixes the test failure discovered in https://github.com/NixOS/nixpkgs/pull/160914.
See https://github.com/ipfs/fs-repo-migrations/issues/148 to read some of my struggles with updating this package.
2022-02-25 11:12:19 -08:00
0x4A6F 7ad39a4125
Merge pull request #161193 from Mic92/bird1
bird: drop bird1 package & modules; hardening
2022-02-25 17:03:09 +01:00
Jörg Thalheim a9252603d5
Merge pull request #160195 from illustris/proxmox-lxc
nixos/proxmox-lxc: init
2022-02-25 14:49:48 +00:00
Stig c1f6adfaa8
Merge pull request #154109 from Izorkin/update-peertube
peertube: 3.4.1 -> 4.1.0
2022-02-25 14:38:15 +01:00
Martin Weinelt f45ba367d9
Merge pull request #161735 from fooker/pr/snapserver-config-fix 2022-02-25 11:41:30 +01:00
Jörg Thalheim ad16194460
nixos/bird: improve systemd hardening / capability set
aligned with https://github.com/archlinux/svntogit-packages/blob/packages/bird/trunk/bird.service#L20-L21
2022-02-25 11:39:34 +01:00
Jörg Thalheim 9abf72f229
bird1: drop package + modules
reason: no longer maintained upstream.
2022-02-25 11:39:34 +01:00
zowoq ec2028eb3c nixos/kubernetes: use kubectl from kubernetes
- also clarify kubectl wrapper naming
2022-02-25 19:22:30 +10:00
Dustin Frisch ec10d9a836
nixos/snapserver: fix argument handling.
The argument parser used by snapserver behaves differntly for optional
arguments with existing defaults. In such cases, the standalone argument
name is a valid input and a following value is interpreted as a
positional argument. Therefore the argument and the value must be
provided as a single argument seperated by equals sign.
2022-02-24 23:11:58 +01:00
Samuel Dionne-Riel 0adf99aee4
Merge pull request #156005 from zhaofengli/pi02
Update Raspberry Pi packages
2022-02-24 15:05:23 -05:00
Izorkin e0616741d1
nixos/peertube: add python path 2022-02-24 22:34:01 +03:00
Izorkin c2296c3ec2
nixos/peertube: fix youtube-dl import 2022-02-24 22:34:01 +03:00
Markus Kowalewski 5721945070 nixos/tetrd: add to module list and fix enable description
The module was dangling and and not listed.
2022-02-24 09:44:57 -08:00
Dustin Frisch 5f9b2148b7
nixos/k40-whisperer: module init 2022-02-24 16:03:09 +01:00
lewo 49fa262cda
Merge pull request #161388 from nlewo/fix-openstack-metadata-fetcher
openstack-metadata-fetcher: do not fail if no user-data is provided
2022-02-24 10:16:44 +01:00
Thiago Kenji Okada e22d349e67
Merge pull request #159546 from K900/the-plumbening
[RFC] [RFT] nixos/pipewire: default to wireplumber
2022-02-24 08:49:45 +00:00
ajs124 9748295636
Merge pull request #160237 from helsinki-systems/drop/virtuoso
virtuoso: drop
2022-02-23 23:48:52 +01:00
Pascal Wittmann 65f66dd4d2
Merge pull request #161056 from dywedir/nixos/vaultwarden
nixos/vaultwarden: fix evaluation
2022-02-23 22:27:58 +01:00
Taeer Bar-Yam 13e35662cc add a defaultText 2022-02-23 16:19:10 -05:00
Pascal Bach 66ddd69bdc
Merge pull request #158375 from afreakk/plex-example
plex: extraPlugins example
2022-02-23 17:39:15 +01:00
Taeer Bar-Yam b5ec72fc13 tweaks 2022-02-23 10:41:28 -05:00
Taeer Bar-Yam 005769ee13 whitespace 2022-02-23 10:41:28 -05:00
Taeer Bar-Yam 74dcaf5784 zammad: test passes! 2022-02-23 10:41:28 -05:00
Taeer Bar-Yam 00e74ad907 minor changes 2022-02-23 10:41:28 -05:00
Taeer Bar-Yam 4d38b6460f zammad: reformat 2022-02-23 10:41:27 -05:00
Taeer Bar-Yam 75fe105a3d Zammad: more fixes 2022-02-23 10:41:27 -05:00
Taeer Bar-Yam aac7f85483 zammad: fix module databases 2022-02-23 10:41:27 -05:00
Taeer Bar-Yam e1009112b6 minor tweaks 2022-02-23 10:41:26 -05:00
Taeer Bar-Yam 34e0a1a1f1 fix zammad service 2022-02-23 10:41:26 -05:00
Taeer Bar-Yam e7aba931e2 zammad: fix module/test 2022-02-23 10:41:26 -05:00
Taeer Bar-Yam 9bc86d946b zammad: init module
Co-authored-by: garbas <rok@garbas.si>
2022-02-23 10:41:25 -05:00
Patrick Hilhorst a8de36a1d0
Merge pull request #158034 from OmnipotentEntity/wordlist 2022-02-23 12:43:26 +01:00
Janne Heß e5823f77b3
Merge pull request #159187 from martinetd/logrotate
logrotate service enhancements
2022-02-23 11:24:17 +01:00
piegames af01434597
Merge pull request #161351: nixos/home-assistant: module updates 2022-02-22 22:47:14 +01:00
Martin Weinelt c2147ab6a8
modprobe: install systemd's modprobe options
Shipped by systemd to combat kmod default options that interfere with
the netdev setup, when those drivers are initially loaded.
2022-02-22 17:22:57 +01:00
Antoine Eiche 413afdae6e openstack-metadata-fetcher: do not fail if no user-data is provided
When no user-data is provided, the OpenStack metadata server doesn't
expose the user-data route.
2022-02-22 16:37:29 +01:00
Lassulus 79df722cdd
Merge pull request #150886 from mohe2015/improve-step-ca
nixos/step-ca: create a step-ca user
2022-02-22 14:40:25 +01:00
Martin Weinelt 0dd8ef5ef7
nixos/home-assistant: update package option description
Overriding can now happen using module options, which is preferred
because it is more discoverable and doesn't require knowledge of
overrides in the first place.
2022-02-22 12:07:02 +01:00
Martin Weinelt 1090fcb7c9
nixos/home-assistant: allow null config value
While the documentation said to set this to null, in case an imperative
config was supposed to be used, this was not possible with the typing in
place.
2022-02-22 12:04:04 +01:00
Guillaume Girol 4846d948b4
Merge pull request #156601 from symphorien/miniflux-password
nixos/miniflux: no cleartext password in the store
2022-02-21 21:18:36 +00:00
markuskowa 0fca9900b1
Merge pull request #157278 from ck3d/default-systemd-nspawn
nixos: Switch to default systemd-nspawn behaviour
2022-02-21 21:56:07 +01:00
Gabriel Fontes c67758484f
nixos/factorio: add bind address option 2022-02-21 09:41:32 -03:00
Domen Kožar 05afa7d0eb
Merge pull request #159662 from polykernel/nix-fix-substituters-merging-order
nixos/nix-daemon: Fix merging order for substituters option
2022-02-21 07:24:32 +01:00
Jan Tojnar f9e65e44e5
Merge pull request #160891 from jtojnar/gnome-iso-shortcuts
installation-cd-graphical-gnome: add useful shortcuts to the dash
2022-02-21 07:00:49 +01:00
Sandro 6335f75903
Merge pull request #156907 from Pamplemousse/taskserver 2022-02-20 21:21:45 +01:00
Sandro 5a57844cf6
Merge pull request #158592 from SuperSandro2000/nginx-nixos 2022-02-20 16:32:09 +01:00
Robert Hensing b550b4b6f8 nixos/nix-daemon: Ensure continued availability of daemon socket
As `nix-daemon.service` does not make use of `ExecStop`, we prefer
to keep the socket up and available. This is important for machines
that run Nix-based services, such as automated build, test, and deploy
services, that expect the daemon socket to be available at all times.

See committed inline comment for further explanation.
2022-02-20 13:44:13 +01:00
Vladyslav M eb0dda98dc nixos/vaultwarden: fix evaluation 2022-02-20 14:37:20 +02:00
Maximilian Bosch 0b118df038
Merge pull request #160936 from Ma27/fix-nixos-run-vms
nixos-build-vms(8): `$out/bin/nixos-run-vms` should non-interactively start VMs
2022-02-20 11:55:53 +01:00
Maciej Krüger 7feed2c0be
Merge pull request #160917 from pingiun/patch-12 2022-02-20 09:57:45 +01:00
Rhys Davies 32a44aa069 nixos/xone: init 2022-02-20 18:25:12 +13:00
Rhys Davies fb69e1763e xow_dongle-firmware: init at 2017-07 2022-02-20 18:25:06 +13:00
Alyssa Ross 1176525f87 treewide: remove obsolete kernel version checks
We don't support Linux kernels older than 4.4 in Nixpkgs.
2022-02-19 21:09:19 +00:00
Maximilian Bosch 1659bca6b7
nixos-build-vms(8): $out/bin/nixos-run-vms should non-interactively start VMs
Not entirely sure when it got broken this time, but when creating a VM
network with `nixos-build-vms(8)`, there are should be the following scripts:

* `$out/bin/nixos-test-driver` which drops into an interactive shell to
  interactively perform test steps.
* `$out/bin/nixos-run-vms` which non-interactively starts the VMs from
  the network so that one can manually play around in the VM.

The latter also starts an interactive shell for a while now which means
that it does the exact same thing as `nixos-test-driver` which is not
its purpose.
2022-02-19 19:43:34 +01:00
K900 e67dd381d3 nixos/pipewire: default to wireplumber 2022-02-19 19:52:55 +03:00
Jelle Besseling 5dd2d74296
eternal-terminal: remove pingiun as maintainer 2022-02-19 17:47:41 +01:00
Aaron Andersen 3ebe6c3491
Merge pull request #160734 from vholer/gh-158802
nixos/mysqlBackup: set service Type
2022-02-19 10:58:23 -05:00
Jelle Besseling 29366071a4 nixos/mastodon: add RAILS_ROOT to mastodon-env 2022-02-19 16:42:45 +01:00
Aaron Andersen 63f03d0888
Merge pull request #157259 from bb2020/mbpfan
nixos/mbpfan: update documentation
2022-02-19 08:29:57 -05:00
Jan Tojnar e9cade383c installation-cd-graphical-gnome: add useful shortcuts to the dash
The live image is primarily used for installation so we should make
link to manual as well as other useful tools front and center,
instead of having them buried in the app drawer.

The default GNOME apps can still be found there when the ISO
is used for demonstration purposes.
2022-02-19 14:08:32 +01:00
Nikolay Amiantov 6786ceb9af
Merge pull request #159538 from abbradar/ntopng-redis
ntopng: bump, use a separate user and redis instance
2022-02-19 15:27:56 +03:00
Nikolay Amiantov a347d52074 nixos/ntopng: http-port -> httpPort 2022-02-19 14:03:33 +03:00
Nikolay Amiantov 41f4d999ad nixos/ntopng: update user and redis configuration
New ntopng version supports running as specified user. Create a separate
user for ntopng with a separate Redis instance.

Separate instance is only used for new `system.stateVersion`s to avoid
breaking existing setups. To configure that we add two new options,
`redis.address` and `redis.createInstance`. They can also be used to
specify your own Redis address.
2022-02-19 14:03:33 +03:00
Christian Kögler 57fc08cfdb nixos: Switch to default systemd-nspawn behaviour 2022-02-19 09:52:37 +01:00
Aaron Andersen 85f873466e
Merge pull request #160611 from jeeger/mediatomb-group-fix
nixos/mediatomb: make service use group
2022-02-18 19:49:13 -05:00
Renaud a632c843a7
Merge pull request #158259 from Yarny0/hylafax
hylafaxplus: 7.0.4 -> 7.0.5
2022-02-18 22:17:08 +01:00
Martin Weinelt 88a2ad9746
Merge pull request #157720 from jojosch/mjolnir-update 2022-02-18 21:31:08 +01:00
Vlastimil Holer 09a6ce91d8
nixos/mysqlBackup: set service Type
fixes #158802

Sets the mysql backup systemd service type to "oneshot" to ensure the
service is marked as started after the backup script fully proceeds. This
allows to reliably depend on completing of this service by other services.
2022-02-18 18:35:55 +01:00
Aaron Andersen b3c0344c9d
Merge pull request #156763 from ratsclub/blocky
nixos/blocky: init
2022-02-18 11:27:25 -05:00
Jonathan Strickland 2158ae39db
airsonic: fix services.airsonic.listenAddress doc
(#158421)
* airsonic: fix services.airsonic.listenAddress doc

Co-authored-by: Ted Reed <ted.reed@gmail.com>

* airsonic: new docs for airsonic.listenAddress

Co-authored-by: Ted Reed <ted.reed@gmail.com>

Co-authored-by: Ted Reed <ted.reed@gmail.com>
2022-02-18 17:16:13 +01:00
Jan Seeger f1fe11906d nixos/mediatomb: make service use group
The systemd service for mediatomb did not use the group configuration setting in the service configuration, I added in the group specification.
2022-02-18 13:19:00 +01:00
Janne Heß dcbacb0f62
Merge pull request #160458 from helsinki-systems/fix/stc-backslashes
nixos/switch-to-configuration: Fix backslashes in unit names
2022-02-17 19:08:02 +01:00
Jan Solanti 394c6f7949 nixos/pipewire: use standalone config when no session manger enabled 2022-02-17 17:39:53 +02:00
Jan Solanti afbb3ca9ef pipewire: 0.3.45 -> 0.3.46 2022-02-17 17:39:31 +02:00
Vladimír Čunát 9d09daa0a9
Merge #157512: nixos/tmp: Fix format of /tmp mount options 2022-02-17 16:26:28 +01:00
Janne Heß 3617ecb67f
nixos/switch-to-configuration: Fix backslashes in unit names
systemd needs this so special characters (like the ones in wireguard
units that appear because they are part of base64) can be escaped using
the \x syntax.

Root of the issue is that `glob()` handles the backslash internally
which is obviously not what we want here.

Also add a test case and fix some perlcritic issues in the subroutine.
2022-02-17 12:49:45 +01:00
Martin Weinelt 047429df52
nixos/home-assistant: fix package override
The attributes can be missing on the package, since they're optional, so
catch that by adding empty defaults.
2022-02-17 00:50:44 +01:00
Olivier Marty 7852ea1596 nixos/matomo: point path.geoip2 outside of the nix store.
path.geoip2 pointed to the nix store which is read-only. Matomo was
failing to download a geoip2 database. See #64759.
2022-02-16 22:21:44 +03:00
Pascal Bach 4c999b91a5
Merge pull request #156685 from schnusch/squid
nixos/squid: add services.squid.proxyAddress
2022-02-16 19:42:47 +01:00
Sandro a682f4f6b4
Merge pull request #160233 from truh/jmusicbot_add-package-option 2022-02-16 11:22:05 +01:00
James Landrein 6da3328129 nixos/containerd: fix zfs setting config override 2022-02-16 18:54:59 +10:00
ajs124 31462e501e nixos/virtuoso: drop 2022-02-16 01:01:13 +01:00
Sandro a6d259faf3
Merge pull request #141650 from 06kellyjac/agate 2022-02-16 00:56:27 +01:00
Jakob Klepp f28d9be832 nixos/jmusicbot: add option services.jmusicbot.package 2022-02-16 00:43:57 +01:00
piegames c1d2042219
home-assistant: clean up preStart
Co-Authored-By: Martin Weinelt <hexa@darmstadt.ccc.de>
2022-02-15 23:41:51 +01:00
Martin Weinelt 2f644fd3e6
nixos/home-assistant: add rpi_power component by default on arm
The rpi_power integration is part of the onboarding flow on Raspberry Pi
SBCs.
2022-02-15 23:41:51 +01:00
Martin Weinelt 918100f48f
nixos/home-assistant: Wait for {mysql,postgresql}.service
Database provisioning was shown to be racy since adding a recorder test
using PostgreSQL. There is no harm in waiting for these services,
because if they're not available they will be ignored.
2022-02-15 23:41:50 +01:00
Martin Weinelt 13faa004b6
nixos/home-assistant: add extraPackages option 2022-02-15 23:41:49 +01:00
Martin Weinelt 4a0b964b34
nixos/home-assistant: add extraComponents option
It simply should not be required to override the package for such a
common use case, especially since the module usually adds another
override on top to inherit extraComponents.
2022-02-15 23:41:48 +01:00
Martin Weinelt 59a367bcab
nixos/home-assistant: convert to rfc42 style settings
After this change users with non-declarative configs need to set
`services.home-assistant.config` to an `null`, or their
`configuration.yaml` will be overwritten.

The reason for this is that with rfc42 style defaults the config
attribute set will never be empty by default.
2022-02-15 23:41:48 +01:00
Martin Weinelt 9896247fb6
nixos/home-assistant: Wait for network-online.target
If people take the time to setup network-online.target correctly we
should wait for it. If they don't it's basically the same as
network.target anyway, so no harm done.

Over time I've seen multiple integrations that have dealt badly with
missing network connectivity at startup, this should alleviate further
pains.
2022-02-15 23:15:17 +01:00
Martin Weinelt 5aabba490e
nixos/home-assistant: update default package example
The given example is now closer to a sane default people will want to
start with. It also displays the existance of extraComponents, a feature
that will receive more usage with home-assistant warning about
components that have completely migrated away from YAML configuration.
2022-02-15 23:15:16 +01:00
Martin Weinelt 42c0909848
nixos/home-assistant: move module into home-automation category
Putting so many things into misc is not great, so let's open up a new
category called home-automation here and now.
2022-02-15 23:15:09 +01:00
Janne Heß 05e1f8a2c7
Merge pull request #160176 from stigtsp/fix/switch-to-configuration-array-compare
nixos/switch-to-configuration: avoid Array::Compare dependency
2022-02-15 20:06:07 +01:00
illustris 19f7856b39 nixos/proxmox-lxc: init 2022-02-15 23:55:03 +05:30
Stig Palmquist 3d713efe41 nixos/switch-to-configuration: avoid Array::Compare dependency
Replace Array::Compare with a simple function, since Array::Compare
pulls down Module::Build which breaks cross compilation.
2022-02-15 15:37:37 +01:00
Kevin Cox 9ec2ae338b
Merge pull request #155290 from LunNova/input-remapper
input-remapper: init at unstable-2022-02-09 (and add nixos module)
2022-02-15 08:24:54 -05:00
Sarah Brofeldt 87ed82d86c
Merge pull request #159448 from r-ryantm/auto-update/kubernetes
kubernetes: 1.22.6 -> 1.23.3
2022-02-15 08:59:44 +01:00
Sarah Brofeldt 152dd4c81d nixos/kubernetes: Update deprecated scheduler opts
--port and --address have both been deprecated and are nonfunctional
starting with kubernetes 1.23. Use --secure-port and --bind-address
instead. This means that users can no longer rely on the insecure port
for anything, so update the release notes accordingly.
2022-02-15 08:31:49 +01:00
Victor Freire 6532d3417e nixos/blocky: init 2022-02-14 22:48:32 -03:00
Martin Weinelt b3d39e3c59
Merge pull request #160037 from lourkeur/cleanup/firewall 2022-02-14 23:39:23 +01:00
Robert Hensing 81302f1518
Merge pull request #159692 from mohe2015/patch-1
nixos/step-ca: Remove unnecessary passthru.tests
2022-02-14 22:23:49 +01:00
Louis Bettens 625412d2bc nixos/firewall: remove dead code 2022-02-14 20:55:25 +01:00
Martin Weinelt 30b7f827cb
Merge pull request #151812 from alarsyo/paperless-redis-fix 2022-02-14 14:05:49 +01:00
Martin Weinelt 375ec7465f
Merge pull request #158945 from yu-re-ka/feature-gitlab-redis-warning 2022-02-13 23:47:24 +01:00
Moritz Hedtke 9d5aba4ac9
nixos/step-ca: Remove unnecessary passthru.tests 2022-02-13 17:26:48 +01:00
polykernel 34636a8525 nixos/nix-daemon: Fix merging order for substituters option
The `substituters` option in `nix.settings` uses the order
of the substituters listed to define priority. Prior to https://github.com/NixOS/nixpkgs/pull/139075,
the corresponding option `binaryCaches` is declared in the `nix` namespace,
which is guaranteed to be merged last. However, the order of merging isn't
guaranteed in submodules. This cause definitions to be appended to the default
value instead of prepended, breaking backwards compatibility as reported in https://github.com/NixOS/nixpkgs/issues/158356.

The way this is addressed in the module system is with order priorities via
`mkOrder` and sorting definitions before merging. This PR restores the previous
behavior by setting a higher priority to the substituters option defined internally,
thus all definitions with default priority will be merged before it. This was chosen because
the `mkRenamedOption` function does not preserve order priority so users using legacy options do not have
precise control on placement.

This change should suffice for simple configuration, but further revision to the module system
is needed for to make various `mk*` functions  aware of order priorities.
2022-02-12 17:15:31 -05:00
Janne Heß 828aab5608
Merge pull request #159014 from jian-lin/fix-nix.buildMachines.mandatoryFeatures 2022-02-12 22:20:22 +01:00
Mario Rodas bdaf97830d
Merge pull request #159025 from jian-lin/undervolt
nixos/undervolt: respect services.undervolt.package
2022-02-12 15:07:27 -05:00
Zhaofeng Li 1781d283f3 sd-image-aarch64: Enable arm_boost for Pi 4
This is effective on the Pi 400 and on newer board revisions of the
Pi 4B. From the official documentation:

> New Raspberry Pi OS images from Bullseye onwards come with
> this setting by default.

<https://www.raspberrypi.com/documentation/computers/config_txt.html>
2022-02-12 00:04:48 -08:00
Zhaofeng Li 963f011f16 sd-image-aarch64.nix: Add config for Pi Zero 2 W 2022-02-12 00:04:48 -08:00
Janne Heß fa3c756621
Merge pull request #157329 from helsinki-systems/feat/nixos-reload-triggers
nixos/systemd: Implement reload triggers
2022-02-11 23:59:26 +01:00
ajs124 3a5835bb68
Merge pull request #159095 from helsinki-systems/drop/nixos-gogoclient
nixos/gogoclient: drop
2022-02-11 13:31:45 +01:00
Dominique Martinet c132bfaa19 logrotate: prepend extraConfig instead of postpending it
logrotate global options only affect rules following them - as such,
services.logrotate.extraConfig being added last makes the option only
useful for adding new paths but not for setting global options (e.g.
'dateext' so all logs are rotate with a date suffix).

Moving this first solves this problem, and we can then use this instead
of default paths config to append missingok/notifempty.
2022-02-11 21:07:37 +09:00