Commit graph

27416 commits

Author SHA1 Message Date
Majiir Paktu 6eea7fb194 nixos/pam: extract args field
Module arguments have common escaping rules for all PAMs.
2023-10-09 23:17:37 -04:00
Majiir Paktu 12a488e89c nixos/pam: extract modulePath field 2023-10-09 23:17:36 -04:00
Majiir Paktu 25bc21f19a nixos/pam: extract control field 2023-10-09 23:17:36 -04:00
Majiir Paktu 0563e0a379 nixos/pam: give each rule a name
These names are internal identifiers. They will be used as keys so that
users can reconfigure rules by merging a rule config with the same name.
The name is arbitrary. The built-in rules are named after the PAM where
practical.
2023-10-09 23:17:36 -04:00
Majiir Paktu fbd7427b14 nixos/pam: define rules as submodules
Allows us to decompose rules into multiple fields that we later format
as textual rules. Eventually allows users to override individual fields.
2023-10-09 23:17:36 -04:00
Majiir Paktu 3c85d159f7 nixos/pam: automatically populate rule type
Eliminates a redundancy between the 'rules' suboptions and the type
specified in each rule.

We eventually want to give each rule a name so that we can merge config
overrides. The PAM name is a natural choice for rule name, but a PAM is
often used in multiple rule types. Organizing rules by type and rule
name avoids name collisions.
2023-10-09 23:17:15 -04:00
Carl Dong e5c2c71280 nixos/nginx: Allow empty port for listen directive
When listening on unix sockets, it doesn't make sense to specify a port
for nginx's listen directive.

Since nginx defaults to port 80 when the port isn't specified (but the
address is), we can change the default for the option to null as well
without changing any behaviour.
2023-10-09 21:16:03 -04:00
Majiir Paktu d6bb805932 nixos/pam: extract header comments
Unblocks converting the rules from one big string to a rich data
structure.
2023-10-09 20:40:19 -04:00
github-actions[bot] 6b95af2485
Merge master into staging-next 2023-10-10 00:02:12 +00:00
Doron Behar 6843abd5fb
Merge pull request #231152 from tcheronneau/nixos.tinyproxy
Adding tinyproxy service to NixOS
2023-10-09 23:53:58 +03:00
Anderson Torres 52058530ce nixos/connman: refactor 2023-10-09 17:49:02 -03:00
Thiago Kenji Okada e7a621f8e9
Merge pull request #259066 from thiagokokada/add-renice-sway
nixos/sway: add enableRealtime option
2023-10-09 19:53:51 +01:00
github-actions[bot] 75d4639be3
Merge master into staging-next 2023-10-09 18:00:59 +00:00
Sarah Brofeldt a655e7a1aa
Merge pull request #259240 from haenoe/oci-containers-labels-option
nixos/oci-containers: add labels option
2023-10-09 18:52:20 +02:00
Maximilian Bosch 9f1d4b79e3
nixos/postgresql: fix identMap example
This was causing the following warning before when building the manual:

    warning: literalExample is deprecated, use literalExpression instead, or use literalMD for a non-Nix description.

Rather than using `literalExpression`, nothing is used. This option
expects a string and the example is a string, no special handling
required. Both `literalExample` from the docbook ages and
`literalExpression` now are only required if the example is
a Nix expression rather than a value of the option's type.
2023-10-09 17:41:44 +02:00
Maximilian Bosch cb67bb0335
nixos/matrix-synapse: mergeable log configuration
Right now there's no trivial way to override parts of synapse's log
config such as the log-level because the only thing that's changeable is
the path to the log-file used by synapse and its workers.

Now, there's a new option called `services.matrix-synapse.log`
which contains the default log config as Nix attribute-set (except
`handlers.journal.SYSLOG_IDENTIFIER`). It has default priority, so new
things can be added like

    services.matrix-synapse.log = {
      my.extra.field = 23;
    }

without discarding the rest. If desired, this can still be done via
`lib.mkForce`.

If the log configuration for a single worker or synapse, but not all
workers should be changed, `services.matrix-synapse.settings.log_config`
or `services.matrix-synapse.workers._name_.worker_log_config`
can be used.
2023-10-09 17:34:15 +02:00
Weijia Wang ad855375b4
Merge pull request #244197 from wexder/netclient
netclient: init at 0.21.0
2023-10-09 16:55:22 +02:00
Vladimír Zahradník 9053490648 nixos/netclient: init 2023-10-09 15:58:05 +02:00
Maximilian Bosch 7f08d0ebd8
nixos/matrix-synapse: drop old DB check assertion, actually require DB to be up
Closes #236062

The PR #236062 was submitted because of the following problem: a synapse
instance was running in a NixOS container attached to the host network
and a postgresql instance on the host as database. In this setup,
synapse connected to its DB via 127.0.0.1, but the DB wasn't locally set
up and thus not configured in NixOS (i.e.
`config.services.postgresql.enable` was `false`). This caused the
assertion removed in this patch to fail.

Over three years ago this assertion was introduced when this module
stopped doing autoconfiguration of postgresql entirely[1] because a
breaking change in synapse couldn't be managed via an auto-upgrade on
our side. To make sure people don't deploy their DB away by accident,
this assertion was introduced.

Nowadays this doesn't serve any value anymore because people with
existing instances should've upgraded by now (otherwise it's their job
to carefully read the release notes when missing upgrades for
several years) and people deploying fresh instances are instructed by
the docs to also configure postgresql[2].

Instead, it only causes issues in corner cases like #236062, so after
some discussion in that PR I think it's time to remove the assertion
altogether.

Also, there's no `Requires=` for `postgresql.service` in the systemd
units which means that it's not strictly guaranteed that the DB is up
when synapse starts up. This is fixed now by adding `requires`. To avoid
being bitten by above mentioned cases again, this only happens if
`config.services.postgresql.enable` is `true`.

If somebody uses a non-local postgresql, but has also deployed a local
postgresql instance on the synapse server (rather unlikely IMHO), it's
their job to opt out of this behavior with `mkForce` (this is precisely one
of the use-cases `mkForce` and friends were built for IMHO).

[1] https://github.com/NixOS/nixpkgs/pull/80447
[2] https://nixos.org/manual/nixos/stable/#module-services-matrix-synapse
2023-10-09 14:06:50 +02:00
github-actions[bot] 5903dfbe6d
Merge master into staging-next 2023-10-09 12:01:26 +00:00
Maximilian Bosch ad57ad1ff5
nixos/nextcloud: update / clean up the nginx configuration
First of all, a few cleanups were made to make it more readable:

* Reordered the sections by their priority so what you're reading in Nix
  is also what you get in the final nginx.conf.
* Unified media/asset locations

Most notably, this fixes the

    Your web server is not properly set up to resolve "/ocm-provider/".

warning since 27.1.2 where `ocm-provider` was moved from a static
directory in the source tarball to a dynamic HTTP route[1].

Additionally, the following things were fixed:

* The 404 checks for build/tests/etc. are now guaranteed to be before
  the `.php` location match and it's not implicitly relied upon Nix's
  internal attribute sorting anymore.

* `.wasm` files are supported properly and a correct `Content-Type` is
  set.

* For "legacy" routes (e.g. `ocs-provider`/`cron`/etc) a `rewrite` rule
  inside the location for fastcgi is used as recommended by upstream[2].
  This also makes it easier to understand the purpose of the location
  itself (i.e. use fastcgi for PHP code).

[1] https://github.com/nextcloud/documentation/pull/11179
[2] https://docs.nextcloud.com/server/27/admin_manual/installation/nginx.html
2023-10-09 12:40:57 +02:00
Maximilian Bosch 8702ae0110
nixos/nextcloud: drop enableBrokenCiphersForSSE
🎉
2023-10-09 12:40:57 +02:00
Michele Guerini Rocco 2e54187399
Merge pull request #258347 from Benjamin-L/gnupg-agent-extraconfig
nixos/gnupg: add agent.settings option
2023-10-09 11:12:55 +02:00
HaeNoe 2f021def6e nixos/oci-containers: add labels option 2023-10-09 10:43:29 +02:00
Kid bb2c03f0a1
nixos/system-path: remove nano from defaultPackages description 2023-10-09 14:14:40 +08:00
github-actions[bot] 8443de20df
Merge master into staging-next 2023-10-09 06:01:20 +00:00
Lin Jian 98edbf83ae
Merge pull request #259009 from bobvanderlinden/pr-locate-package
nixos/locate: rename option `locate` -> `package`
2023-10-09 09:34:16 +08:00
Julian Schacher 722e9df2fb
nixos/matrix-synapse: add media_store_path to services ReadWritePaths
Currently, when setting a custom media_store_path, which lies outside of
cfg.dataDir, the current ReadWritePaths make it so that Synapse can't
access the media_store_path. So add the media_store_path to
ReadWritePaths to fix that.
2023-10-09 02:27:05 +02:00
Weijia Wang f0e1ff90d5 Merge branch 'master' into staging-next 2023-10-08 20:10:26 +02:00
Maximilian Bosch 669da9ccdb
Merge pull request #246117 from Ralith/fix-synapse-well-known-example
nixos/matrix-synapse: fix duplicate Content-Type header in example
2023-10-08 19:53:26 +02:00
ners dccd00027e
nixos/azure: add contents module option (#244364) 2023-10-08 19:35:14 +02:00
github-actions[bot] 0b4a97a07f
Merge master into staging-next 2023-10-08 12:01:23 +00:00
Doron Behar 50a077328a
Merge pull request #259259 from Lassulus/syncthing_stale
nixos/syncthing: match stale ids by subtracting in jq
2023-10-08 12:53:34 +03:00
Vladimír Čunát 2ec92384d7
Merge #258361: nixos/knot: compatibility with 23.05 config 2023-10-08 10:16:06 +02:00
Vladimír Čunát 6b66e2fc9c
nixos/knot: compatibility with 23.05 config
- run conf-check iff keyFiles == [] (like in 23.05; this was my bug)
- support extraConfig + keyFiles

- but warning will still be shown if extraConfig is used,
  and it might be slightly confusing
2023-10-08 10:14:54 +02:00
Bob van der Linden 423c86a70b
nixos/locate: rename option locate -> package 2023-10-08 10:09:12 +02:00
Fabián Heredia Montiel 7f16b623fc Merge remote-tracking branch 'origin/master' into staging-next 2023-10-08 00:18:22 -06:00
Sarah Brofeldt 9b73af9b27
Merge pull request #259498 from TLATER/tlater/gitea-metrics
gitea: Add option to supply the metrics token via file
2023-10-08 07:53:33 +02:00
Majiir Paktu f5f1751b1f refactor: combine scripted and networkd WakeOnLan config 2023-10-07 21:02:46 -04:00
Majiir Paktu d290c309f4 nixos/network-interfaces-systemd: fix WakeOnLan
WakeOnLan= was configured when using the scripted backend but not the
networkd backend. The other link options are set in the .network file
when using networkd, but WakeOnLan= is only available in a .link file.
2023-10-07 20:58:51 -04:00
Luflosi 70c8adce8d
kubo: 0.22.0 -> 0.23.0
https://github.com/ipfs/kubo/releases/tag/v0.23.0

Support for /quic (Draft 29) was removed, so remove it from `services.kubo.settings.Addresses.Swarm`.

The changelog says that there have been some fixes to the FUSE mountpoint functionality but the test still requires the workaround, so leave that unchanged.
2023-10-08 02:04:02 +02:00
Majiir Paktu c3e90f5667 nixos/network-interfaces-systemd: require defaultGateway.interface
The logic for configuring a gateway without an interface specified adds
a route with Gateway= to *every interface* configured by NixOS for
networkd. This leads to nonsensical configurations like the following:

    [Network]
    DHCP=no
    Address=192.168.0.1/24

    [Route]
    Gateway=10.0.0.1
    GatewayOnLink=false

We remove this logic and make defaultGateway.interface required to
configure a default gateway when using networkd.

We can ignore the removal of GatewayOnLink because systemd defaults it
to "no" anyway.
2023-10-07 16:09:11 -04:00
Majiir Paktu c11b788d1a nixos/network-interfaces-systemd: support defaultGateway.interface
When interface and address are both specified, we can set Gateway= on
the named interface. The existing logic assumes interface is not set
(since it's guarded by assertion) so we now disable it when interface
has a value.

As a bonus, we now support the defaultGateway.metric option when
interface is set.
2023-10-07 16:09:11 -04:00
Majiir Paktu 088da23f9e nixos/test-instrumentation: fix unsetting of defaultGateway
The empty string is coerced to an attrset:

    { address = ""; interface = null; metric = null; }

The new defaultGateway logic (correctly) complains that interface must
be defined when using networkd. We instead clear defaultGateway by
setting it to its actual default value, which is null.
2023-10-07 16:09:11 -04:00
Tristan Daniël Maat b59e5a34e7
nixos/gitea: Add option to supply the metrics token via file 2023-10-07 21:53:02 +02:00
Lin Jian 021da9bf62
Merge pull request #259549 from woojiq/keyd
nixos/keyd: add `extraConfig` option
2023-10-07 23:18:51 +08:00
Lin Jian 249ef1a69b
Merge pull request #259558 from amesgen/borgbackup-package-option
nixos/borgbackup: add package option
2023-10-07 23:16:46 +08:00
amesgen bbf7f58b57
nixos/borgbackup: add package option
Co-authored-by: Lin Jian <me@linj.tech>
2023-10-07 16:27:57 +02:00
Maximilian Bosch efc5c80e18
nextcloud25: remove
EOL of Nextcloud v25 is scheduled by the end of this month.
2023-10-07 16:16:42 +02:00
Lin Jian 4a5f3d5a50
Merge pull request #259228 from nbdd0121/patch-1
nixos/dnsmasq: allow custom package
2023-10-07 21:04:22 +08:00
Bobby Rong 383b753bba
Merge pull request #259363 from bobby285271/fix/gnome-flashback
gnome.gnome-flashback: Fix x-d-p-gnome launch
2023-10-07 20:56:26 +08:00
github-actions[bot] 7520bf436a
Merge master into staging-next 2023-10-07 12:00:58 +00:00
Mario Rodas 5103716b44
Merge pull request #252800 from 1000101/prometheus-pgbouncer-exporter
prometheus-pgbouncer-exporter: init at 0.7.0
2023-10-07 06:37:06 -05:00
Gary Guo 7094f1ec0e nixos/dnsmasq: allow custom package
Allow a custom package to be used for dnsmasq service.
2023-10-07 11:53:25 +01:00
1000101 3b094812b1 prometheus-pgbouncer-exporter: init at 0.7.0 2023-10-07 11:44:40 +02:00
woojiq fee1832e84 nixos/keyd: add extraConfig option 2023-10-07 11:50:04 +03:00
Linus Heckemann 2de1be5b51
Merge pull request #258677 from Majiir/fix-networkd-search-domains
nixos/network-interfaces-systemd: don't set network-level domains
2023-10-07 08:43:49 +02:00
github-actions[bot] e2801b1fcf
Merge master into staging-next 2023-10-07 06:00:59 +00:00
K900 b7a3aaae38
Merge pull request #259460 from K900/test-eval-fixes
treewide: test eval fixes
2023-10-07 07:36:46 +03:00
github-actions[bot] b7d8867fd1
Merge master into staging-next 2023-10-07 00:02:14 +00:00
Ryan Lahfa 5fa3ea862b
Merge pull request #251898 from ktrinh-anduril/ktrinh/improve-devicetree-infra 2023-10-07 00:55:35 +02:00
Jan Tojnar 76a7aa445a Merge branch 'master' into staging-next
Conflicts:
- pkgs/development/python-modules/xdot/default.nix
  between 2f244e3647 and 1a9a257cf7
2023-10-06 23:18:00 +02:00
K900 2c596b216a nixos/orangefs: fix typo in group name
This would have broken eval and has broken the test.
2023-10-07 00:07:23 +03:00
Artturi 34c738fb3d
Merge pull request #152631 from jonringer/pgmanage-use-package 2023-10-07 00:05:58 +03:00
K900 d4eca0e8bb nixos/gollum: remove non-existent maintainer 2023-10-06 23:52:42 +03:00
Lin Jian 272dba1e31
Merge pull request #257415 from ehmry/yggdrasil
nixos/yggdrasil: add extraArgs option
2023-10-07 02:05:36 +08:00
Aaron Andersen 76fb9da41f nixos/openssh: add support for authorized principals 2023-10-06 13:57:19 -04:00
Bjørn Forsman e5b8b12ac9 nixos/coredns: add extraArgs option 2023-10-06 19:38:38 +02:00
Bjørn Forsman fa8ace3618 nixos: don't implicitly map missing user groups to nogroup
Before: `users.users.user1.group = "group-not-defined-anywhere-else"`
would result in user1 having the primary group `nogroup`, assigned at
activation time and only with a (easy to miss) warning from the
activation script. This behaviour is a security issue becase no files
should be owned by `nogroup` and it allows for unrelated users (and
services) to accidentally have access to files they shouldn't have.

After: The configuration above results in this eval error:
  - The following users have a primary group that is undefined: user1
  Hint: Add this to your NixOS config:
    users.groups.group-not-defined-anywhere-else = {};
2023-10-06 19:33:01 +02:00
Emery Hemingway 3fc4ecafeb nixos/yggdrasil: add extraArgs option 2023-10-06 17:59:14 +01:00
Weijia Wang 39edffebe6
Merge pull request #253548 from Quantenzitrone/rimgo
rimgo: init at 1.2.0 & module
2023-10-06 17:50:58 +02:00
Lin Jian de26e61f7e
Merge pull request #258582 from returntoreality/gpsd-extra-args
nixos/gpsd: add extraArgs option
2023-10-06 22:54:51 +08:00
Ryan Lahfa c22f1c1cfa
Merge pull request #257828 from mbey-mw/nginx-tmpfiles-rules 2023-10-06 15:28:36 +02:00
Marek Beyer ea1eb4ee0f
nixos/nginx: add systemd-tmpfiles exclusion of temporary directories
Directories used by nginx in the tmp path are only created upon startup and
must not be deleted while nginx is running.
2023-10-06 14:26:37 +02:00
Alyssa Ross e8f0afa7b0
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
	pkgs/development/python-modules/qcelemental/default.nix
2023-10-06 12:11:15 +00:00
Atemu eae761dcb0
Merge pull request #245593 from wamserma/grocy-add-package-option
grocy: add package option
2023-10-06 13:56:58 +02:00
Pierre Bourdon e462c9172c
Merge pull request #259039 from edef1c/cve-2023-4911-mitigation
nixos/security/wrappers: use musl rather than glibc and explicitly unset insecure env vars
2023-10-06 12:50:39 +02:00
Bobby Rong ba82dd7148
gnome.gnome-flashback: Add mkGnomeSession
Having this in environment.systemPackages shouldn't be worse than
adding as XDG_DATA_DIRS in gnome-session.
2023-10-06 18:27:49 +08:00
Bobby Rong 21f5cd377a
gnome.gnome-flashback: Add mkWmApplication
Having this in environment.systemPackages shouldn't be worse than
adding as XDG_DATA_DIRS in gnome-session.
2023-10-06 18:22:07 +08:00
Bobby Rong f6345cd259
gnome.gnome-panel-with-modules: init
Setting X_GNOME_PANEL_MODULESDIR in gnome-session wrapper is confusing to me.
2023-10-06 18:22:07 +08:00
Bobby Rong 49dda70dbc
Merge pull request #259222 from bobby285271/fix/gnome-flashback-eval
nixosTests.gnome-flashback: Fix eval
2023-10-06 17:31:44 +08:00
Will Fancher 524714f7ea systemd 254: ZFS /usr fix with systemd-stage-1 2023-10-06 04:25:25 -04:00
Bobby Rong fc096a6d9c
nixosTests.gnome-flashback: Fix eval
The option `nodes.machine.environment.variables.XDG_CONFIG_DIRS' is defined multiple times while it's expected to be unique.
2023-10-06 12:18:53 +08:00
Benjamin Lee f0a8e05a5d
nixos/gnupg: add agent.settings option 2023-10-05 18:43:23 -07:00
edef 09325d24b6 nixos/security/wrappers: use musl rather than glibc and explicitly unset insecure env vars
This mitigates CVE-2023-4911, crucially without a mass-rebuild.

We drop insecure environment variables explicitly, including
glibc-specific ones, since musl doesn't do this by default.

Change-Id: I591a817e6d4575243937d9ccab51c23a96bed6f9
2023-10-05 22:04:05 +00:00
lassulus 82b59a8fb2 nixos/syncthing: match stale ids by subtracting in jq 2023-10-05 23:08:05 +02:00
Thiago Kenji Okada 63fce4ce48 nixos/sway: add enableRealtime option
This option wraps the `sway` binary to allow it to request realtime
scheduling (SCHED_RR). This allow for possible lower latency, specially
when the system is under high load.

Available since Sway 1.8. See:
- https://github.com/swaywm/sway/pull/6994
- https://github.com/swaywm/sway/releases/tag/1.8
2023-10-05 15:26:47 +01:00
Leona Maroni 6249a0983d
nixos/paperless: fix start with latest systemd 2023-10-05 12:56:37 +02:00
Alyssa Ross a838aa244f
Merge remote-tracking branch 'origin/master' into staging-next
The hash for pytensor is not correct, but that's also the case in
master, so a merge commit isn't the place to fix it.

Conflicts:
	pkgs/development/python-modules/faadelays/default.nix
	pkgs/development/python-modules/pytensor/default.nix
	pkgs/tools/admin/rset/default.nix
2023-10-05 08:02:48 +00:00
Martin Weinelt 9a20605910
nixos/home-assistant: update bluetooth integrations 2023-10-05 05:09:55 +02:00
github-actions[bot] 77b60239ac
Merge master into staging-next 2023-10-05 00:02:28 +00:00
Anselm Schüler a5bc9ee49b
nixos/nano: enable syntaxHighlight by default 2023-10-05 00:15:32 +02:00
Anselm Schüler 8679b69dcd
nixos/nano: include extra syntax highlight files when syntaxHighlight is true 2023-10-05 00:12:42 +02:00
Jörg Thalheim 07c70a41ab nixos/mediawiki: add nginx option
mediawiki: configure uploadsDir
2023-10-04 22:21:55 +01:00
Vladimír Čunát fa7835846a
Merge branch 'master' into staging-next 2023-10-04 22:40:54 +02:00
Maximilian Bosch 4305d167a2
Merge pull request #256407 from Ma27/motd-ordering
nixos/rust-motd: allow ordering sections
2023-10-04 19:25:18 +02:00
edef 77225e33c0
Merge pull request #248627 from edef1c/gpg-agent-sockets 2023-10-04 12:32:29 -04:00
github-actions[bot] c7a3c2d71b
Merge master into staging-next 2023-10-04 12:01:01 +00:00
Florian Klink 7239f0198e
Merge pull request #258920 from ElvishJerricco/systemd-stage-1-full-build
systemd-stage-1: Default to full systemd build.
2023-10-04 12:02:36 +03:00
Florian Klink 42f2e2dadd
Merge pull request #257510 from ign0tus/fix/wake-on-lan-policy
Fix: WakeOnLan policy
2023-10-04 11:36:16 +03:00
Will Fancher 710b96b191 systemd-stage-1: Default to full systemd build. 2023-10-04 04:21:35 -04:00
Florian Klink d89aa11c89
Merge pull request #258345 from lf-/jade/wait-for-online
nixos/networkd: fix wait-online on networking.useDHCP default configuration
2023-10-04 10:58:14 +03:00
github-actions[bot] 0f2514516b
Merge master into staging-next 2023-10-04 06:00:56 +00:00
Will Fancher 37601de942
Merge pull request #237154 from ElvishJerricco/sd-s1-networkd-flush-with-keep-configuration
systemd stage 1 networking: Use KeepConfiguration
2023-10-03 23:37:03 -04:00
Martin Weinelt e29e5077fc
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
- pkgs/development/python-modules/podcastparser/default.nix
2023-10-03 21:13:27 +02:00
K900 76917ca3ae nixos/sddm: add option to enable Wayland support via Weston 2023-10-03 12:48:58 +03:00
github-actions[bot] 560e64fc7a
Merge master into staging-next 2023-10-03 06:01:08 +00:00
K900 9d2e9d8ddf
Merge pull request #258434 from SuperSandro2000/locate-dbfile
nixos/locate: #258575 followup
2023-10-03 08:58:20 +03:00
Ruby Juric 638d19ac92
zitadel: init at 2.37.2; nixos/zitadel: init (#254896) 2023-10-03 07:11:18 +02:00
Sandro Jäckel b53f817088
nixos/locate: cleanup optional parenthesis 2023-10-03 00:19:57 +02:00
Martin Weinelt 9d0b02be98 Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
- pkgs/development/python-modules/python-ndn/default.nix
2023-10-02 23:59:00 +02:00
Jade Lovelace 28ab2b278d nixos/networkd: make wait-online not time out
A further bug to our strange multi-user.target depending on
network-online.target issue is that systemd recently changed the
behaviour of systemd-networkd-wait-online to no longer consider the
absence of interfaces with RequiredForOnline to be sufficient to be
online: https://github.com/systemd/systemd/pull/27825

On the advice of the systemd developers
(https://github.com/systemd/systemd/issues/29388), this commit changes
the configuration of systemd-networkd-wait-online to pass --any by
default, and lets the default DHCP interfaces be RequiredForOnline
as they would be by default if the option is omitted.

It is plausible that systemd-networkd-wait-online may still fail if
there are no interfaces at all. However, that probably cannot be
avoided.
2023-10-02 14:47:21 -07:00
Majiir Paktu 0ba49949b0 nixos/network-interfaces-systemd: don't set network-level domains
systemd.network(5) describes Domains= as a "list of domains which should
be resolved using the DNS servers on this link." This setting is read by
systemd-resolved.service, and it's used to configure both search domains
and DNS query routing.

Adding the search domains from `networking.search` is unnecessary
because these are already configured globally in `resolved.conf` through
the default value of `services.resolved.domains`.

Adding the system's `networking.domain` to each network is unexpected
and probably incorrect. A user may not expect that the domain is in
effect automatically added to the search domains even if not specified
in `networking.search`.

Both of these network-level assignments are problematic in cases where
the NixOS networkd module is not managing every interface on the system.
In that scenario, the managed interfaces will have Domains= set while
the others do not. That will cause systemd-resolved to route DNS queries
for the search domains and the system domain to only those managed
interfaces.
2023-10-02 17:36:08 -04:00
Alyssa Ross dc439e41db nixos/environment: move XDG_CONFIG_DIRS to sessionVariables
Otherwise, in non-interactive contexts (e.g. systemd units), this
entry (the default) won't be in the list.  Only the profile relative
ones would be, since they were already using session variables.  This
is clearly not the correct behavior.
2023-10-02 18:47:48 +00:00
github-actions[bot] 23a7292114
Merge master into staging-next 2023-10-02 18:01:04 +00:00
Nick Cao a431dcd07d
Merge pull request #258486 from tazjin/gonic-resolve-conf
nixos/gonic: allow gonic to perform non-local DNS resolution
2023-10-02 13:40:12 -04:00
Linus Karl 342cc761df nixos/gpsd: add extraArgs option
Allows setting addtional arguments to gpsd
2023-10-02 15:10:12 +02:00
Weijia Wang ccdb43a66a Merge branch 'master' into staging-next 2023-10-02 14:49:01 +02:00
K900 524181b5b8 nixos/locate: rip out dbfile overrides
All the locate versions we have support LOCATE_PATH, so just use that
instead of adding indirections all over the place AND forcing people
to rebuild their locate implementation if they want the path changed.
2023-10-02 15:10:22 +03:00
Ryan Lahfa 6f4a420057
Merge pull request #257719 from CardboardTurkey/regreet-fix-group 2023-10-02 13:28:37 +02:00
nikstur 62e95d095d nixos/qemu-vm: optionally disable overriding fileSystems
Allow the user to disable overriding the fileSystems option with
virtualisation.fileSystems by setting
`virtualisation.fileSystems = lib.mkForce { };`.

With this change you can use the qemu-vm module to boot from an external
image that was not produced by the qemu-vm module itself. The user can
now re-use the modularly set fileSystems option instead of having to
reproduce it in virtualisation.fileSystems.
2023-10-02 11:13:26 +02:00
Cabia Rangris 6f7933059d
Merge pull request #237404 from cab404/cab/moonraker-gpiod
moonraker: add useGpiod
2023-10-02 06:45:16 +04:00
Vladimir Serov 5edabf7c0b
moonraker: add useGpiod 2023-10-02 06:09:58 +04:00
Jörg Thalheim f8be2c43b4 nixos/buildbot: allow to prepend imports 2023-10-02 09:11:39 +10:00
Jörg Thalheim e2106a5dbb nixos/buildbot: make configurators configurable 2023-10-02 09:11:39 +10:00
Vincent Ambo 259d112c05 nixos/gonic: allow gonic to perform non-local DNS resolution
Gonic accesses external services (e.g. Listenbrainz or last.FM) for
scrobbling, but it was previously not allowed to read
`/etc/resolv.conf`.

This had the effect that, unless a local resolver was configured on
the system, any connection attempt would fail due to DNS resolution
being unavailable.
2023-10-02 01:05:00 +03:00
github-actions[bot] 708561b6ea
Merge master into staging-next 2023-10-01 18:01:08 +00:00
K900 e53c99eb17 treewide: use pkgs.config instead of config.nixpkgs.config
`pkgs` may be passed in externally, in which case `config.nixpkgs.config` will not be set.

Follow-up to #257458.
2023-10-01 20:48:40 +03:00
Ryan Lahfa 8bc4e1927c
Merge pull request #255321 from p-h/ulogd-multiple-logging-stacks 2023-10-01 17:53:19 +02:00
Alyssa Ross d4a1009f5a
Merge remote-tracking branch 'origin/master' into staging-next 2023-10-01 13:53:00 +00:00
K900 eb8ce7930d
Merge pull request #257458 from K900/die-nixpkgs-config-die
treewide: fail when `nixpkgs.config` is set with explicit `pkgs`, remove all `nixpkgs.config` usages in in-tree modules
2023-10-01 10:11:15 +03:00
github-actions[bot] 8314cc67bf
Merge master into staging-next 2023-09-30 18:01:01 +00:00
Martin Weinelt b571d96667
nixos/wyoming/openwakeword: init
The wyoming server for providing access to openWakeWord.
2023-09-30 03:40:40 +02:00
github-actions[bot] 6b41a98c6c
Merge master into staging-next 2023-09-30 00:01:53 +00:00
Ryan Lahfa 3c3ef90189
Merge pull request #242191 from tie/systemd-required-for-online-range 2023-09-30 01:16:21 +02:00
Wietse de Vries 86dbce6d07 audiobookshelf: init module 2023-09-29 22:01:45 +02:00
github-actions[bot] 50751b0602
Merge master into staging-next 2023-09-29 18:00:55 +00:00
pennae bb6c5f9f87
Merge pull request #244324 from SuperSandro2000/nixos-nano
nixos/nano: add enable, package option, do not create /etc/nanorc by …
2023-09-29 18:05:59 +02:00
github-actions[bot] c1a6c05aa7
Merge master into staging-next 2023-09-29 12:01:16 +00:00
Mario Rodas fbf686309f
Merge pull request #256725 from trofi/modules-xmr-stak-cudaSupport-removal
modules/xmr-stak: drop broken cudaSupport option
2023-09-29 06:13:19 -05:00
Maximilian Bosch 57de6a8550
nixos/rust-motd: refactor assertion and TOML generation
* `sort (<)` also works for strings (TIL!), so no need for comparing
  length and whether all keys from `cfg.settings` exist in `cfg.order`
  (slightly less overhead).

* Don't build another piece of JSON (`orderedSections`), simply use
  `cfg.settings`/`cfg.order` with `__structuredAttrs` to ensure a
  properly ordered TOML.

  This also has the upside of not having to do quote hackery.

* Also, a freeform submodule isn't strictly needed because we don't have
  any special options defined, so replacing that with
  `attrsOf format.type`.

Co-authored-by: Silvan Mosberger <github@infinisil.com>
2023-09-29 11:13:27 +02:00
asymmetric 4a359e2106
Merge pull request #250810 from asonix/btrbk-fix-btrfs-path
nixos/btrbk: fix btrfs path for passwordless execution
2023-09-29 10:37:21 +02:00
Quantenzitrone f857cfd5be rimgo: add module 2023-09-29 08:59:59 +02:00
github-actions[bot] e0e21b78ec
Merge master into staging-next 2023-09-29 00:02:21 +00:00
Sandro Jäckel 5b9cdda1c2
nixos/nano: add enable, package option, do not create /etc/nanorc by default
and remove nano from environment.defaultPackages. In addition also cleanup the file in general.

This is a follow up to #220481

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>
2023-09-29 00:24:34 +02:00
Thiago Kenji Okada 61ead0290d
Merge pull request #257900 from thiagokokada/oci-useNetworkd-default-but-optional
nixos/virtualisation: use mkDefault in networking.useNetworkd in oci-common
2023-09-28 23:17:31 +01:00
Thiago Kenji Okada e514178339 nixos/virtualisation: use mkDefault in networking.useNetworkd in oci-common
To make it easier to disable for those folks who don't want to use
systemd-networkd.
2023-09-28 22:05:34 +01:00
asonix a8c1811bf6 nixos/btrbk: fix btrfs path for passwordless execution 2023-09-28 14:51:19 -05:00
Yaya 0951dbcc9b nixos/matrix-sliding-sync: Fix missing lib.mdDoc 2023-09-28 19:37:07 +00:00
ign0tus 27d0a8a0cd network.interfaces: Add option to configure WakeOnLan policy
Adds an option to configure a custom WakeOnLan policy instead of the
hard-coded "magic" policy. To ensure compatibility with current
behavior, "magic" is kept as default.
2023-09-28 20:14:02 +02:00
Vladimír Čunát 2e8016c50b
Merge #257852: systemd: revert allow udev-trigger for lxd nested containers 2023-09-28 20:05:29 +02:00
github-actions[bot] bd2b03a095
Merge master into staging-next 2023-09-28 18:00:54 +00:00
Adam Stephens b1237da5b2
systemd: revert allow udev-trigger for lxd nested containers 2023-09-28 13:58:11 -04:00
Robert Hensing d37aa6f414
Merge pull request #257843 from tweag/nixos-nixpkgs-overlays-rewrite
nixos/nixpkgs: Rewrite overlays option docs
2023-09-28 17:35:38 +01:00
ign0tus 237f7ba7d2 networkd: Allow combinations of WakeOnLan policies
To comply with the systemd.link WakeOnLan[^1] specification, the option
"off" and all other possible policy combinations must be allowed.

[^1]: https://www.freedesktop.org/software/systemd/man/systemd.link.html#WakeOnLan=
2023-09-28 17:04:35 +02:00
Silvan Mosberger 11406bdc0e nixos/nixpkgs: Rewrite overlays option docs
henrik-ch was also here :)

Co-Authored-By: Valentin Gagarin <valentin.gagarin@tweag.io>
2023-09-28 16:27:33 +02:00
github-actions[bot] 8fdaf11017
Merge master into staging-next 2023-09-28 12:01:25 +00:00
Mario Rodas 25b9f4d2b6
Merge pull request #255116 from adamcstephens/lxd/udev-container
systemd: allow udev-trigger to run on lxd containers with nesting
2023-09-28 02:17:27 -05:00
Vladimír Čunát 0dbe002e4d
Merge branch 'staging' into staging-next 2023-09-28 09:12:44 +02:00
Robert Hensing d1c454a3eb
Merge pull request #257682 from Kharacternyk/transmission-doc-typo
nixos/transmission: fix a typo in the docs
2023-09-28 04:38:03 +01:00
Will Fancher 209f6f3c21
Merge pull request #257693 from NickCao/bindmount
nixos/stage-1-systemd: fix initrd-fstab generation for bind mounts, a…
2023-09-27 20:15:46 -04:00
Maximilian Bosch e515dce892 nixos/sshd: fix sshd.conf validity check
When using e.g. `{ addr = "[::]"; port = 22; }` at `listenAddresses`,
the check fails because of an escaping issue[1] with

    last 1 log lines:
    > Invalid test mode specification -f
    For full logs, run 'nix log /nix/store/c6pbpw5hjkjgipmarwyic9zyqr1xaix5-check-sshd-config.drv'

Using `lib.escapeShellArg` appears to solve the problem.

[1] https://github.com/NixOS/nixpkgs/pull/256090#issuecomment-1738063528
2023-09-28 00:11:31 +00:00
Nick Cao 37cac5f032
nixos/stage-1-systemd: makeFstabEntries: drop rootPrefix parameter 2023-09-27 18:31:56 -04:00
Kiran Ostrolenk eb2c136196
regreet: fix user group in tmpfiles rules
Prior to this commit the derivation assumed a user's primary group has
the same name as the user themselves. This is standard on linux but not
necessary (and indeed I believe not the default on NixOS).

Closes #232184
2023-09-27 22:00:42 +01:00
Sander van der Burg 5bf3c4393c
Merge pull request #257672 from svanderburg/disnix-updates
Disnix updates
2023-09-27 21:51:27 +02:00
Nick Cao 0fecd7edc8
nixos/stage-1-systemd: fix initrd-fstab generation for bind mounts, again
See https://github.com/NixOS/nixpkgs/pull/185089
2023-09-27 14:34:17 -04:00
github-actions[bot] b7f2311d92
Merge staging-next into staging 2023-09-27 18:01:33 +00:00
Nazar Vinnichuk e40c8d3739 nixos/transmission: fix a typo in the docs 2023-09-27 19:55:37 +03:00
Ryan Lahfa c22ca8e820
Merge pull request #254440 from Izorkin/add-nginx-bpf 2023-09-27 18:53:43 +02:00
Ryan Lahfa e909050efd
Merge pull request #257047 from minijackson/netbox-3.6.2 2023-09-27 18:50:54 +02:00
Vladimir Pouzanov 093f354a17 nixos/users-groups: escape hatch for enabling a shell system-wide 2023-09-27 18:49:06 +02:00
Ryan Lahfa 12eb1e5d28
Merge pull request #249412 from JTarasovic/jdt/systemd-networkd/ipv6-assign-prefix 2023-09-27 18:39:00 +02:00
Ryan Lahfa cb403e56a6
Merge pull request #249386 from JTarasovic/jdt/systemd-networkd/dhcpv6config 2023-09-27 18:38:16 +02:00
Sander van der Burg 32c36780d1 dysnomia: 0.10.1 -> 0.10.2 2023-09-27 18:35:30 +02:00
Vladimír Čunát 8a86b98f0b
Merge #255658: staging-next 2023-09-17 2023-09-27 18:00:00 +02:00
Maximilian Bosch b9bff72147
Merge pull request #249792 from teto/postgresql-quality-of-life-changes
services.postgres: move the generated statement at the top of the file
2023-09-27 16:22:58 +02:00
Janik 65e9f3c071
Merge pull request #257621 from herrwiese/for-master/usbguard-path-to-string 2023-09-27 14:21:57 +02:00
Andreas Wiese 1e8b8e6d38 nixos/usbguard: don't use path literal for pure evaluation
PR#256295 reintroduced ruleFile option, but set the default as a path
literal, which was a "string path" previously.  This breaks evaluation
for being impure:

  error: access to absolute path '/var/lib/usbguard/rules.conf' is forbidden in pure eval mode (use '--impure' to override)
2023-09-27 11:22:09 +02:00
github-actions[bot] 0ead40ab4d
Merge staging-next into staging 2023-09-27 06:01:26 +00:00
github-actions[bot] 9a4dae4abd
Merge master into staging-next 2023-09-27 06:01:00 +00:00
Artturi 31c647207a
Merge pull request #231384 from mrcjkb/tuxedo-rs 2023-09-27 08:08:50 +03:00
Gary Guo e037977239 postgresql: default to v15 in 23.11 2023-09-27 03:51:06 +02:00
Eike Frost be2b474c00 nixos/tlp fix NetworkManager RDW dispatcher script location 2023-09-26 21:35:54 -04:00
Maximilian Bosch d77b59b41d
nixos/rust-motd: use a second attribute (order) for the of sections in TOML
Rather than using `priority` with `sortProperties`, a new option called
`order` defines the ordering of the sections. I.e.

    order = [ "global" "uptime" "banner" ]

means that `uptime` comes before `banner`. Please note that `global` is
for global settings and not a section. I figured that it'd be too much
magic to hide this in the implementation and ask the user to specify the
order of _each_ section in `settings` instead.

OTOH this makes the intent way clearer than priorities. Also, this
remains opt-in, the option defaults to `attrNames cfg.settings`, i.e.
all sections ordered alphabetically.
2023-09-26 23:28:40 +02:00
Marc Jakobi 01cc0a605a nixos/tuxedo-rs: init at 0.2.2 2023-09-26 23:28:05 +02:00
Minijackson 828f0446f5
nixos/netbox: use netbox_3_6 for stateVersion>=23.11 2023-09-26 22:42:49 +02:00
github-actions[bot] 4bfb61a48c
Merge master into staging-next 2023-09-26 18:01:12 +00:00
K900 f33cdbcc25 nixos/gnome: remove nixpkgs.config usage
I have no idea how to keep this working, but it feels wrong anyway.
2023-09-26 18:02:01 +03:00
K900 d3c27efa36 nixos/firefox: remove nixpkgs.config usage 2023-09-26 18:02:01 +03:00
K900 c018561f54 nixos/amdgpu-pro: remove nixpkgs.config usage
A new X.org ABI is exceptionally unlikely at this point, and we can
add an assertion if it ever happens.
2023-09-26 18:02:00 +03:00
K900 7a7c1859cd nixos/lightdm-tiny-greeter: remove nixpkgs.config usage 2023-09-26 18:02:00 +03:00
K900 38461ff27a nixos/locate: remove nixpkgs.config usage 2023-09-26 18:02:00 +03:00
K900 ce87196a00 nixos/nixpkgs: assert that nixpkgs.config is not set when pkgs is passed in externally
This is a common footgun people hit often. Remove it.
2023-09-26 18:02:00 +03:00
Yureka d490800f0f nixos/peering-manager: use settingsFormat 2023-09-26 14:42:45 +02:00
Alexander Bantyev 299e0b9560
Merge pull request #255033 from AleXoundOS/castopod
castopod: init at 1.6.4
2023-09-26 16:42:26 +04:00
github-actions[bot] 3bfcfd7eef
Merge master into staging-next 2023-09-26 06:01:00 +00:00
Lin Jian bba54c4900
Merge pull request #255813 from linj-fork/feat-kanata-all-device
nixos/kanata: add default value, doc and warning for devices
2023-09-26 13:50:59 +08:00
Fabián Heredia Montiel 312aa96fe6
Merge pull request #256565 from bjornfor/nixos-wireguard-add-metric-option
nixos/wireguard: add metric option
2023-09-25 21:15:02 -06:00
github-actions[bot] cc5ae613ff
Merge master into staging-next 2023-09-26 00:02:17 +00:00
Will Fancher 350b6b84e6
Merge pull request #257325 from NixOS/honk/fix-initdb-script-startup
nixos/modules/honk: fix initdb service startup
2023-09-25 20:01:04 -04:00
Weijia Wang c71554840b
Merge pull request #257104 from vifino/unifi-7.5.176
unifi7: 7.4.156 -> 7.5.176
2023-09-25 23:43:16 +02:00
Weijia Wang 9e821b5ae0
Merge pull request #241542 from dasj19/wordpress-avoid-language-folder
wordpress: fixed installing of languages
2023-09-25 23:32:31 +02:00
0x4A6F a0db07dad5
Merge pull request #256295 from Janik-Haag/usbguard
nixos/usbguard: restore ruleFile option
2023-09-25 22:05:36 +02:00
Pol Dellaiera 57514f5beb
nixos/modules/honk: fix initdb service startup 2023-09-25 22:02:52 +02:00
github-actions[bot] fc1f757bf6
Merge master into staging-next 2023-09-25 18:01:06 +00:00
Valentin Gagarin 370097ce86
remove the misleading warning on using nix-env for split outputs (#255947)
The text was originally added [0] following an apparently incomplete
research on how everything plays together. In fact, Nix propagates
`outputs` to the corresponding nested derivations, and there is some
messy behavior in Nixpkgs that only seems to propagate
`meta.outputsToInstall` in `buildEnv`[1].

This change moves the hints on how to use NixOS specifics to NixOS
module documentation (which is hopefully easier to find through
search.nixos.org), describes the default behavior in Nixpkgs (updating
a the link to the source), and removes the confusing mention of
`nix-env`.

the last of them should not be there to begin with. we don't want
beginners to use `nix-env`, as this is known to run them into trouble
eventually.

[0]: https://github.com/NixOS/nixpkgs/pull/76794
[1]: 1774d07242/pkgs/build-support/buildenv/default.nix (L66)
2023-09-25 16:23:01 +02:00
Yureka 6500b4580c
Revert "nixos/boot/rasbperrypi: add support for boot.initrd.secret with uboot (#240358)" (#257251)
This reverts commit 94e939985b.
2023-09-25 14:22:51 +02:00
github-actions[bot] 3e52e5929d
Merge master into staging-next 2023-09-25 12:01:02 +00:00
Ryan Lahfa 4242ecd871
Merge pull request #248372 from yaxitech/amd-sev-guest 2023-09-25 13:10:42 +02:00
WilliButz 2d30a37d9f
Merge pull request #248925 from FugiMuffi/prometheus-sabnzbd-exporter
prometheus-sabnzbd-exporter: init at 0.1.70
2023-09-25 12:09:36 +02:00
Will Fancher 4bd4976b87
Merge pull request #251290 from Majiir/systemd-initrd-networking-features
nixos/network-interfaces-systemd: support `vlans`, `bridges` in systemd-initrd
2023-09-25 05:07:23 -04:00
misuzu cf6e43a3dd nixos/castopod: init 2023-09-25 10:17:44 +04:00
github-actions[bot] 104c9ec59b
Merge master into staging-next 2023-09-25 06:01:10 +00:00
Charles Hall 94a42157f4 nixos/xonotic: init 2023-09-24 22:54:59 -03:00
github-actions[bot] 680b13891d
Merge master into staging-next 2023-09-25 00:02:13 +00:00
Majiir Paktu 0f9d719d8a nixos/pam: split rule lists into individual rules 2023-09-24 18:37:10 -04:00
Majiir Paktu dd458977a0 nixos/pam: clean up rules
Makes the rules more uniform in structure and style. This makes it
easier to automate subsequent commits. No behavior changes.
2023-09-24 18:37:10 -04:00
Artturi 713af20167
Merge pull request #241518 from Gerg-L/use-xdg-base-directories 2023-09-25 00:45:31 +03:00
ktrinh 8da771560c nixos/device-tree: Allow custom dtbSource and expose compileDts 2023-09-24 11:58:13 -07:00
github-actions[bot] 03a82ba5d4
Merge master into staging-next 2023-09-24 18:00:54 +00:00
Aaron Andersen c51a273a92
Merge pull request #254370 from jakubgs/mtr-exporter/multi-job
mtr-exporter: support specifying multiple jobs
2023-09-24 11:39:23 -04:00
Adrian Pistol 191131077b unifi7: 7.4.156 -> 7.5.176 2023-09-24 17:25:08 +02:00
Ryan Lahfa 0fa52bd973
Merge pull request #257043 from Tom-Hubrecht/garage-envfile 2023-09-24 17:07:21 +02:00
Tom Hubrecht 2d38d9edc0 nixos/garage: Add an environmentFile option
Since garage 0.8.2, garage accepts environment variables for passing secrets,
e.g. `GARAGE_RPC_SECRET` or `GARAGE_ADMIN_TOKEN`. The added `environmentFile`
allows those secrets to not be present in the nix store.
2023-09-24 14:47:05 +02:00
Maximilian Bosch 9bd9e20e9a
Merge pull request #256090 from CRTified/sshd-validation-fix
nixos/sshd: Specify connection parameters for configuration validation
2023-09-24 14:12:46 +02:00
github-actions[bot] b6d5fc29bc
Merge master into staging-next 2023-09-24 12:01:00 +00:00
Aryeh Hillman b6766564ed Update wg-quick.nix
Update wg-quick.nix such that a search for `WireGuard` in the `NixOS Options` section of search.nixos.org brings up the convenient `networking.wg-quick.interfaces.wg0.configFile` option.
2023-09-24 13:24:27 +02:00
Lin Jian c5ba4c687e
nixos/kanata: add default value, doc and warning for devices 2023-09-24 17:09:23 +08:00
Minijackson 6c7e768420
netbox_3_5: introduce alias
clears up ambiguity
use that alias in tests

Co-authored-by: Raito Bezarius <masterancpp@gmail.com>
2023-09-24 10:13:05 +02:00
Jakub Sokołowski 4e587ac821
mtr-exporter: support specifying multiple jobs
This ability has been added in `0.3.0` release:
https://github.com/mgumz/mtr-exporter/releases/tag/0.3.0
https://github.com/NixOS/nixpkgs/pull/252667

To achieve this a config is generated and symlinked at `/etc/mtr-exporter.conf`.

Signed-off-by: Jakub Sokołowski <jakub@status.im>
2023-09-24 09:13:31 +02:00
github-actions[bot] 0e6413dbff
Merge master into staging-next 2023-09-24 00:02:23 +00:00
Thiago Kenji Okada a3a7520a2f
Merge pull request #119856 from ilian/oci-image
oci-image: init scripts to build and upload image
2023-09-23 21:09:07 +01:00
Martin Weinelt 1ff350f7b8
Merge pull request #81460 from vcunat/p/knot-nixConfig
nixos/knot: allow full configuration by nix values
2023-09-23 20:55:54 +02:00
github-actions[bot] ab2ecc25c1
Merge master into staging-next 2023-09-23 18:00:59 +00:00
Nick Cao 1fe305df27
Merge pull request #256906 from oddlama/fix-typesense-0.25.1
nixos/typesense: disable MemoryDenyWriteExecute which is needed since 0.25.1
2023-09-23 11:37:13 -04:00
Janne Heß cc55ef9d55
Merge pull request #254993 from helsinki-systems/feat/stc-mount-improvements
nixos/switch-to-configuration: Mount improvements and a lot more test cases
2023-09-23 17:03:13 +02:00
oddlama 11d4f6e4a8
nixos/typesense: disable MemoryDenyWriteExecute which is needed since 0.25.1
also adjust default state directory mode to allow typesense group
2023-09-23 16:37:23 +02:00
Aaron Andersen 2af64a3d1d
Merge pull request #246173 from bb2020/mbpfan
nixos/mbpfan: adjust defaults
2023-09-23 09:41:11 -04:00
Nick Cao 4a5b19463a
Merge pull request #256762 from mweinelt/matrix-synapse-network-online
nixos/matrix-synapse: wait for network-online.target
2023-09-23 09:12:06 -04:00
Maciej Krüger 9a914a7c52
Merge pull request #256491 from mkg20001/mkg/sudo-rs-resolve
nixos/{sudo,-rs}: revert sudo-rs, make own module
2023-09-23 15:08:06 +02:00
digital 94e939985b
nixos/boot/rasbperrypi: add support for boot.initrd.secret with uboot (#240358)
Co-authored-by: digital <didev@dinid.net>
2023-09-23 14:32:09 +02:00
Vladimír Čunát 1869818c57
nixos/knot: add release notes and partial compatibility 2023-09-23 10:05:17 +02:00
Vladimír Čunát ce85980e77
nixos/knot: also allow config by YAML file 2023-09-23 10:04:02 +02:00
Vladimír Čunát 7fb737dde6
nixos/knot: allow full configuration by nix values (RFC 42) 2023-09-23 10:04:02 +02:00
github-actions[bot] f95580a6ff
Merge master into staging-next 2023-09-23 06:00:57 +00:00
Artturi 87ee3c4fdf
Merge pull request #176886 from hyperfekt/nonderivation_fish-completion 2023-09-23 06:28:23 +03:00
Martin Weinelt 457d9bbc94
nixos/matrix-synapse: wait for network-online.target
While network.target only guarantees that network devices have been
created the `network-online.target` allows delaying service startup
until after a configurable network state has been reached.

This should resolve spurious failures, e.g. when synapse tries to load
the discovery information for its OIDC provider from a remote host.
2023-09-22 22:41:40 +02:00
Sergei Trofimovich e57034f9a7 modules/xmr-stak: drop broken cudaSupport option
Tanvir Ahmed T. reports that `services.xmr-stak.enable = true;` shows
that `23.05` ships broken `xmr-stak` module:

    error: function 'anonymous lambda' called with unexpected argument 'cudaSupport'

I broke it when I removed `cudaSupport` flag in
    a5ce71d4e8

I'm just removing the option without an attempt to supply the stub as
module was already broken on `23.05` release. There are probably no
users of `xmr-stak` module by now.

Closes: https://github.com/NixOS/nixpkgs/issues/256703
2023-09-22 17:40:04 +01:00
Maciej Krüger 8e9b72be82
nixos/sudo-rs: add crossCompile 'fix'
This is just a quick fix based on pname,
as I have no idea how to use slicing in the module

We should instead use slicing to get the package for the host
2023-09-22 15:14:14 +02:00
Maciej Krüger 7c8b8bd3e4
nixos/sudo-rs: init
adds a new sudo-rs module that contains sudo-rs changes removed from sudo module
2023-09-22 15:14:13 +02:00