Commit graph

28104 commits

Author SHA1 Message Date
zzywysm 3f4c802d26 initrd/autofs4: remove legacy references to autofs4 kernel module
Back in 2018, the kernel decided to remove the autofs4 module.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2225d931f75ddd3c39f4d0d195fad99dfd68671

This caused immediate problems with systemd, so the kernel allowed autofs4 as a config option that would simply map back to autofs.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d02d21ea007b6b33cdaf15c2f84fb1fea996ecc2

Earlier this year, in July 2023, the kernel got tired of people not adapting to the autofs change, and forced the issue by fixing it within the kernel defconfigs, which NixOS uses as a starting point for their own kernel configs.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f2190d6b7112d22d3f8dfeca16a2f6a2f51444e

This commit reflects the post-2018 reality by changing the remaining autofs4 references to autofs. Since this change initially happened in kernel 4.18 and we no longer support 4.x kernels, we don't need any backwards-compatibility tweaks.
2023-11-14 15:37:50 -05:00
Kerstin Humm c82195d9e8
mastodon: 4.1.6 -> 4.2.1
- run streaming processes in separate systemd services
- remove redundancy in test
- fix update script
- release notes

See https://github.com/mastodon/mastodon/releases/tag/v4.2.1 for details
2023-11-14 21:13:46 +01:00
Julien Malka 372d07dc29 nixos/systemd-boot: conform backend to RFC-0125
Now the builder is using Bootspec documents.
2023-11-14 20:37:07 +01:00
Léo Gaspard b1c25de57b
nixos/acme: do not eat Let's Encrypt's request limits if misconfigured on first try (#266155) 2023-11-14 20:29:50 +01:00
Yang, Bo bff548fef1 waagent: enable provisioning 2023-11-14 19:47:27 +01:00
Nathan Henrie 6c69d3c9ca nixos/navidrome: add openFirewall option
This adds an option to the navidrome module to open the configured TCP
port in the firewall.
2023-11-14 19:29:08 +01:00
github-actions[bot] 6cc772a6fa
Merge master into staging-next 2023-11-14 18:01:11 +00:00
Pierre Bourdon 68367e66e1
Merge pull request #267037 from nbraud/nixos/sudo/assertion
nixos/sudo: Update `cfg.package` assertion
2023-11-14 17:26:08 +01:00
Jonathan Zielinski aca76b750d nixos/opensearch: link plugins from opensearch package
disable security module by default, it crashes unit expecting
certificates.
2023-11-14 14:00:30 +01:00
nicoo d5a8e667d2 nixos/sudo: Update assertion message 2023-11-14 12:25:55 +00:00
Martin Weinelt 3c336a1647
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
- pkgs/development/libraries/gdcm/default.nix
2023-11-14 13:16:34 +01:00
Tomas Antonio Lopez 5476b490d4 nixos/sourcehut: compile and integrate paste.sr.ht API component 2023-11-14 11:12:14 +01:00
Niklas Hambüchen f9c7c12de6
Merge pull request #266702 from nh2/plausible-listen-address-no-distributed-erlang
plausible, nixos/plausible: Add `listenAddress` option
2023-11-14 10:52:21 +01:00
Niklas Hambüchen 65a471717c plausible, nixos/plausible: Add listenAddress option.
This changes

* the plausible HTTP web server

to be listening on localhost only, explicitly.

This makes Plausible have an explicit safe default configuration,
like all other networked services in NixOS.

For background discussion, see: https://github.com/NixOS/nixpkgs/issues/130244

As per my upstream Plausible contribution
(https://github.com/plausible/analytics/pull/1190)
Plausible >= 1.5 also defaults to listening to localhost only;
nevertheless, this default should be stated explicitly in nixpkgs
for easier review and independence from upstream changes, and
a NixOS user must be able to configure the
`listenAddress`, as there are valid use cases for that.

Also, disable

* the Erlang Beam VM inter-node RPC port
* the Erlang EPMD port

because Plausible does not use them (see added comment).
This is done by setting `RELEASE_DISTRIBUTION=none`.

Thus, this commit also removes the NixOS setting `releaseCookiePath`,
because it now has no effect.
2023-11-14 10:51:16 +01:00
Jörg Thalheim 54fd866569 nixos/harmonia: set extra-allowed-users
This fixes the case where users enable harmonia but also have allowed-users set.
Having extra-allowed-users is a no-op when nix.settings.allowed-users is set to "*" (the default)
2023-11-14 10:37:39 +01:00
Silvan Mosberger 3e5bc28ec5
Merge pull request #266598 from infinisil/fix-fwupd
nixos/fwupd: Fix fwupd-refresh service
2023-11-14 08:56:25 +01:00
github-actions[bot] 6a7c026ba7
Merge master into staging-next 2023-11-14 06:01:03 +00:00
eyjhb 2387a37fa0 nixos/flexget: remove TZ envvar 2023-11-14 06:35:40 +01:00
github-actions[bot] 772c3bbbf5
Merge master into staging-next 2023-11-14 00:02:14 +00:00
Felix Bühler f2fc5b4195
Merge pull request #265696 from Stunkymonkey/nixos-exportarr
nixos/exportarr: init
2023-11-13 22:58:32 +01:00
Fabián Heredia Montiel 884449105e Merge remote-tracking branch 'origin/master' into staging-next 2023-11-13 14:31:51 -06:00
Raito Bezarius d57926c0b6 nixos/postgresql: improve the assertions for equality of DB user and DB name
It is hard to figure out which one is offending without the database name.
2023-11-13 17:16:25 +01:00
Raito Bezarius 12797a6a39 nixos/postgresql: restore ensurePermissions and strong-deprecate it
As it is technically a breaking change, we should at least make a strong deprecation
of `ensurePermissions` and leave it in the broken state it is, for out of tree users.

We give them a 6 months notice to migrate away by doing so, which is honest.
In the meantime, we forbid usage of `ensurePermissions` inside of nixpkgs.
2023-11-13 17:16:25 +01:00
Maximilian Bosch 48459567ae nixos/postgresql: drop ensurePermissions, fix ensureUsers for postgresql15
Closes #216989

First of all, a bit of context: in PostgreSQL, newly created users don't
have the CREATE privilege on the public schema of a database even with
`ALL PRIVILEGES` granted via `ensurePermissions` which is how most of
the DB users are currently set up "declaratively"[1]. This means e.g. a
freshly deployed Nextcloud service will break early because Nextcloud
itself cannot CREATE any tables in the public schema anymore.

The other issue here is that `ensurePermissions` is a mere hack. It's
effectively a mixture of SQL code (e.g. `DATABASE foo` is relying on how
a value is substituted in a query. You'd have to parse a subset of SQL
to actually know which object are permissions granted to for a user).

After analyzing the existing modules I realized that in every case with
a single exception[2] the UNIX system user is equal to the db user is
equal to the db name and I don't see a compelling reason why people
would change that in 99% of the cases. In fact, some modules would even
break if you'd change that because the declarations of the system user &
the db user are mixed up[3].

So I decided to go with something new which restricts the ways to use
`ensure*` options rather than expanding those[4]. Effectively this means
that

* The DB user _must_ be equal to the DB name.
* Permissions are granted via `ensureDBOwnerhip` for an attribute-set in
  `ensureUsers`. That way, the user is actually the owner and can
  perform `CREATE`.
* For such a postgres user, a database must be declared in
  `ensureDatabases`.

For anything else, a custom state management should be implemented. This
can either be `initialScript`, doing it manual, outside of the module or
by implementing proper state management for postgresql[5], but the
current state of `ensure*` isn't even declarative, but a convergent tool
which is what Nix actually claims to _not_ do.

Regarding existing setups: there are effectively two options:

* Leave everything as-is (assuming that system user == db user == db
  name): then the DB user will automatically become the DB owner and
  everything else stays the same.

* Drop the `createDatabase = true;` declarations: nothing will change
  because a removal of `ensure*` statements is ignored, so it doesn't
  matter at all whether this option is kept after the first deploy (and
  later on you'd usually restore from backups anyways).

  The DB user isn't the owner of the DB then, but for an existing setup
  this is irrelevant because CREATE on the public schema isn't revoked
  from existing users (only not granted for new users).

[1] not really declarative though because removals of these statements
    are simply ignored for instance: https://github.com/NixOS/nixpkgs/issues/206467
[2] `services.invidious`: I removed the `ensure*` part temporarily
    because it IMHO falls into the category "manage the state on your
    own" (see the commit message). See also
    https://github.com/NixOS/nixpkgs/pull/265857
[3] e.g. roundcube had `"DATABASE ${cfg.database.username}" = "ALL PRIVILEGES";`
[4] As opposed to other changes that are considered a potential fix, but
    also add more things like collation for DBs or passwords that are
    _never_ touched again when changing those.
[5] As suggested in e.g. https://github.com/NixOS/nixpkgs/issues/206467
2023-11-13 17:16:25 +01:00
Molly Miller 9cec5c807a nixos/mailman: restart services on failure and increase mailman timeouts 2023-11-13 16:10:55 +01:00
Ryan Lahfa 8f1753206f
Merge pull request #267093 from ElvishJerricco/testing-backdoor-fix-ordering 2023-11-13 15:07:48 +01:00
Fabian Möller cd631134df AusweisApp2: 1.26.7 -> 2.0.1 2023-11-13 13:43:39 +01:00
Jonas Heinrich 4f38dbab82
Merge pull request #266025 from onny/cups-firewall2
nixos/printing: Fix openFirewall option
2023-11-13 11:15:18 +01:00
dadada f192930a79
nixos/soft-serve: fix typos in option descriptions 2023-11-12 22:34:54 +01:00
Will Fancher 1a2f2cf95d nixos/test-instrumentation: Fix backdoor ordering
In #256226, `backdoor.service` was changed to be part of
`sysinit.target` instead of having default dependencies. This broke
several tests that relied on `backdoor.service` starting after default
targets. For example, `systemd-boot.update` expects `/boot` to be
mounted as soon as the backdoor is running.

These tests really ought to be declaring their dependencies properly
with things like `machine.wait_for_unit("local-fs.target")`, because
it's useful for the backdoor to start as early as possible. But for
now, let's just order it the way it was before in stage 2, and use the
earlier ordering in the new stage 1 context.
2023-11-12 15:04:38 -05:00
Weijia Wang 74d102ce50 Merge branch 'master' into staging-next 2023-11-12 19:45:20 +01:00
Gaurav Juvekar 5ab4ce5d33 nixos/network-interfaces: fix typo in networking.fqdn 2023-11-12 08:47:01 -08:00
Jörg Thalheim 44cf4801c0 nixos/nix-serve: also set extra-allowed-users
This fixes the case where users enable nix-serve but also have allowed-users set.
Having extra-allowed-users is a no-op when nix.settings.allowed-users is set to "*" (the default)
2023-11-12 14:09:31 +01:00
Anthony Roussel d4d6602ce3
nixos/thanos: remove with lib; notation
https://nix.dev/guides/best-practices#with-scopes
2023-11-12 11:21:47 +01:00
Anthony Roussel 65be712043
nixos/thanos: use mkPackageOptionMD 2023-11-12 11:08:53 +01:00
Anthony Roussel 9abb2a2116
nixos/thanos: remove deprecations
* replaced store.grpc.series-sample-limit by store.limits.request-samples
* replaced query.replica-label by query.replica-labels
* replaced store.addresses by endpoints
* removed block-sync-concurrency (removed upstream)
2023-11-12 11:08:52 +01:00
Anthony Roussel abed24c0d6
nixos/thanos: fix documentation 2023-11-12 11:08:52 +01:00
Anthony Roussel 312e7f8ae0
nixos/thanos: add ExecReload command to SystemD services 2023-11-12 11:08:52 +01:00
Anthony Roussel 0d9bef343b
nixos/thanos: fix services.thanos.receive.labels config 2023-11-12 11:08:51 +01:00
Anthony Roussel 2074409c86
nixos/thanos: add query-frontend SystemD service 2023-11-12 11:08:51 +01:00
Thomas Watson ca84c463b9 nixos/systemd-boot: pass EFI variable flags during update too
8f2babd032 was partially reverted by mistake. Original message below

---

On some systems, EFI variables are not supported or otherwise wonky.
bootctl attempting to access them causes failures during bootloader
installations and updates. For such systems, NixOS provides the options
`boot.loader.efi.canTouchEfiVariables` and
`boot.loader.systemd-boot.graceful` which pass flags to bootctl that
change whether and how EFI variables are accessed.

Previously, these flags were only passed to bootctl during an install
operation. However, they also apply during an update operation, which
can cause the same sorts of errors. This change passes the flags during
update operations as well to prevent those errors.

Fixes https://github.com/NixOS/nixpkgs/issues/151336
2023-11-12 02:07:25 -05:00
Lucas Bergman 07828dc05b nixos/unifi: Add extraJvmOptions option
This can be useful for adding extra logging, tweaking garbage collector
parameters, and for using JMX to monitor the JVM.
2023-11-12 00:38:10 +00:00
Lucas Bergman 50ff8ff3f9 nixos/unifi: Switch command line args to a list
There's no functionality change here, but this makes it a bit more
convenient to add more args.
2023-11-12 00:32:50 +00:00
Lucas Bergman 2bc02c0383 nixos/unifi: Clean up formatting
This removes "with lib", which advances #208242 a bit, and cleans up a few
formatting nits found by nixfmt.
2023-11-12 00:28:40 +00:00
github-actions[bot] 33248a2caf
Merge master into staging-next 2023-11-12 00:02:14 +00:00
tomberek 7859adb9d6
Merge pull request #245394 from christoph-heiss/pkgs/sourcehut
sourcehut: update all component; lots of fixes
2023-11-11 13:42:19 -05:00
github-actions[bot] 9776723357
Merge master into staging-next 2023-11-11 18:00:58 +00:00
Maciej Krüger e9a5bf8ae4
Merge pull request #265712 from nbraud/nixos/sudo-rs/akkoma 2023-11-11 18:10:25 +01:00
Maciej Krüger 9c61d268a7
Merge pull request #265727 from nbraud/nixos/sudo-rs/google_oslogin 2023-11-11 18:09:39 +01:00
Maciej Krüger c647a12d7f
Merge pull request #265725 from nbraud/nixos/sudo-rs/gce 2023-11-11 18:09:20 +01:00
K900 e792d7fec0
Merge pull request #264442 from anthonyroussel/update-url-redirects
treewide: fix redirected and broken URLs
2023-11-11 18:08:59 +03:00
Christoph Heiss 88a3d2a0b4
sourcehut: fix postgresql database permission for postgresql >= 15
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 15:50:16 +01:00
Christoph Heiss 66b86f8a2e
sourcehut: de-duplicate nginx add_header directives
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 14:14:59 +01:00
Christoph Heiss acd21dad52
sourcehut: use systemd.tmpfiles instead of manually creating logfiles
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 14:14:59 +01:00
Christoph Heiss 641e54bb28
sourcehut: create logs directory unconditionally
An empty log directory, in case it stays unused, does not hurt anyone.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss fc6addb147
sourcehut: reword api-origin option description
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss 78cc2783c8
sourcehut: drop obsolete services array in favor of indivdual enable flags
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss 6b25e09d2d
sourcehut: fix up some more bin paths
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss 5841d27497
sourcehut: explicitly disallow openssh to socket-active
This breaks the (already fragile) gitsrht-dispatch -> gitsrht-keys
command chain.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss c39ba7f5b1
sourcehut: remove set -x from ssh commands
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:46 +01:00
Christoph Heiss 6648488333
sourcehut: fix logging of git/hg ssh commands
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:45 +01:00
Christoph Heiss 6e51802196
sourcehut: fix repos path by using actual settings value
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:32 +01:00
Christoph Heiss c123a37be6
sourcehut.gitsrht: 0.78.20 -> 0.84.2
Newer version of the gitsrht-api service call setrlimit() on startup,
thus allow it in the `SystemCallFilter` definition for the service.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:30 +01:00
github-actions[bot] 652204165d
Merge master into staging-next 2023-11-11 12:00:58 +00:00
Christoph Heiss d703173520
sourcehut: make /query endpoint config common to all services
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 12:39:28 +01:00
Anthony Roussel e30f48be94
treewide: fix redirected and broken URLs
Using the script in maintainers/scripts/update-redirected-urls.sh
2023-11-11 10:49:01 +01:00
Félix Baylac Jacqué dfa45288af maintainers: ninjatrappeur -> picnoir
I changed my nickname from Ninjatrappeur to Picnoir. My github id is
stable, it shouldn't break too much stuff.

I took advantage of this handle change to remove myself from the
hostapd maintainers: I don't use NixOS as a router anymore.
2023-11-11 08:31:16 +01:00
github-actions[bot] 912311b7fd
Merge master into staging-next 2023-11-11 00:02:21 +00:00
tu-maurice 40c06a143f prayer: remove 2023-11-10 20:44:28 -03:00
Martin Weinelt 3536221702
Merge pull request #160346 from mweinelt/hass-custom-everything
home-assistant: custom components and lovelace modules
2023-11-11 00:08:25 +01:00
Kira Bruneau 0cc094c041
Merge pull request #265886 from kira-bruneau/at-spi2-core
nixos/gnome/at-spi2-core: fix disabling a11y in all contexts
2023-11-10 16:31:53 -05:00
Martin Weinelt f30192ae6f
nixos/home-assistant: add customComponents support
Allows passing custom component packages, that get installed into
home-assistant's state directory.
Python depedencies, that are propagated from the custom component
get passed into `extraPackages`, so they are available to
home-assistant at runtime.

This is implemented in a way, that allows coexistence with custom
components not managed through the NixOS module.
2023-11-10 22:00:36 +01:00
Martin Weinelt 9a941c58e5
nixos/home-assistant: add customLovelaceModules support
Allows the installation of custom lovelace modules, that can inject
css/js into the frontend and offer a wide variety of widgets.
2023-11-10 22:00:30 +01:00
Alyssa Ross afabc4a15d
Merge remote-tracking branch 'origin/master' into HEAD
Conflicts:
	pkgs/development/libraries/SDL2/default.nix
2023-11-10 15:18:19 +01:00
Anthony Roussel b0d279d219
nixos/sonic-server: init 2023-11-10 15:10:14 +01:00
Ryan Lahfa b8218af2e6
Merge pull request #256226 from ElvishJerricco/systemd-stage-1-testing-backdoor 2023-11-10 14:08:07 +01:00
Lin Jian 36f4c90526
Merge pull request #266150 from robryk/resticnotimer
nixos/restic: allow timer to be disabled
2023-11-10 17:51:14 +08:00
K900 b0dd91c32a
Merge pull request #266509 from K900/remove-nixos-option-shim
nixos/installer: remove nixos-option compat shim
2023-11-10 10:47:18 +03:00
github-actions[bot] b55905ceb6
Merge master into staging-next 2023-11-10 06:01:22 +00:00
Silvan Mosberger 4587db7279 nixos/fwupd: Don't ignore stderr 2023-11-10 06:54:45 +01:00
Silvan Mosberger 6bf31e521e nixos/fwupd: Don't use DynamicUser
Was introduced in dde6a4f397
but it doesn't work on my machine:

    fwupdmgr[439074]: Failed to connect to daemon: The connection is closed

Creating a persistent user does work however
2023-11-10 06:51:56 +01:00
Yureka b0206f9bf9 nixos/sudo: enable by default
The default was accidentally changed to false in #262790
2023-11-10 03:30:39 +01:00
Will Fancher 9a0f523372 systemd-stage-1: Enable backdoor in nixos tests 2023-11-09 17:53:48 -05:00
Will Fancher f8ba8be54b testing-instrumentation: Factor backdoor service out to variable 2023-11-09 17:02:01 -05:00
github-actions[bot] e112f9b8bb
Merge master into staging-next 2023-11-09 18:00:56 +00:00
K900 1d6b03af9a nixos/installer: remove nixos-option compat shim
It's been two years.
2023-11-09 20:57:57 +03:00
Pierre Bourdon b75b355b50
Merge pull request #262790 from nbraud/nixos/sudo
nixos/sudo: bring in line with release notes
2023-11-09 16:53:02 +01:00
Bernardo Meurer 22e859ae44
Merge pull request #266264 from hercules-ci/nix-stable-2.18
nix: 2.17.1 -> 2.18.1
2023-11-09 12:39:44 -03:00
Rvfg 92ee71866f
nixos/nat: fix nat-nftables 2023-11-09 23:06:01 +08:00
github-actions[bot] 2d73797da4
Merge master into staging-next 2023-11-09 12:01:04 +00:00
Anthony Roussel 3dd50eaa8f
nixos/amazon-ssm-agent: fix missing seelog.xml file 2023-11-09 12:02:48 +01:00
Thiago Kenji Okada da8c62363e
Merge pull request #266310 from Atry/patch-4
azure-agent: add dependencies for its extensions
2023-11-09 09:52:10 +00:00
Will Fancher 2f73652c34
Merge pull request #240651 from accelbread/postresumecommands
nixos/boot: add postResumeCommands option
2023-11-09 04:22:05 -05:00
github-actions[bot] 00a0662a3c
Merge master into staging-next 2023-11-09 00:02:14 +00:00
Robert Hensing 6381cc0525 nix: 2.17.1 -> 2.18.1 2023-11-08 23:19:33 +01:00
Yang, Bo 1ce985242c google-compute-image: support NVMe and UEFI 2023-11-08 21:05:21 +01:00
nicoo b942382216 nixos/sudo: refactor processing of cfg.extraRules 2023-11-08 19:41:39 +00:00
nicoo 1852b67bc6 nixos/sudo: Make the default rules' options configurable 2023-11-08 19:41:39 +00:00
nicoo 93011e31bd nixos/sudo: Handle root's default rule through extraRules
This makes things more uniform; moreover, users can now inject rules before this.
2023-11-08 19:41:39 +00:00
nicoo 097115485a nixos/terminfo: Simplify sudo-related option 2023-11-08 19:41:38 +00:00
nicoo 77ed368b20 nixos/sudo: Refactor option definitions 2023-11-08 19:41:38 +00:00
nicoo 19e1420e13 nixos/sudo: Move support for pam_ssh_agent_auth(8) to PAM's NixOS module 2023-11-08 19:41:37 +00:00
Felix Bühler 7aaa664cc2
Merge pull request #263054 from uninsane/pr-trust-dns-0.24.0
trust-dns: 0.23.0 -> 0.24.0
2023-11-08 19:35:23 +01:00
github-actions[bot] 536833ef29
Merge master into staging-next 2023-11-08 18:01:00 +00:00
Yang, Bo c4086e5ce9 azure-agent: add dependencies for its extensions
waagent's extension `Microsoft.OSTCExtensions.VMAccessForLinux` requires Python, otherwise it would be failed to install with the following error message in `/var/log/waagent.log`:

```
No Python interpreter found on the box
```

waagent's extension `Microsoft.CPlat.Core.RunCommandLinux` needs lsof, otherwise it would produce the following error message in `/var/log/waagent.log`:

```
/var/lib/waagent/Microsoft.Azure.Extensions.CustomScript-2.1.10/bin/custom-script-shim: line 60: lsof: command not found
```
2023-11-08 17:54:08 +00:00
Caleb c4d3afef06
wyoming-faster-whisper fix CUDA devices not being detected. (#266167)
This change enables CUDA support by allowing access to /dev/nvidia0.
2023-11-08 13:34:26 +01:00
Ryan Lahfa bc2b72df73
Merge pull request #264234 from guiguid/guiguid-patch-netdata-systemd-journal
netdata: 1.43.0 -> 1.43.2 and add systemd-journal plugin
2023-11-08 13:30:43 +01:00
Adam Joseph ba2ed469c2
Merge branch 'master' into staging-next 2023-11-08 06:15:46 +00:00
Will Fancher eaad9ece24
Merge pull request #266116 from ElvishJerricco/sd-s1-user-shells-fix-warning
nixos/initrd-ssh: Only warn about shell when using systemd initrd
2023-11-07 21:25:21 -05:00
Rodrigo Gryzinski 23a5f1f80d nixos/wireguard: add wireguard to default kernel modules
Previously the module was only dynamically loaded on service startup,
this is needed in case security.lockKernelModules is enabled.
2023-11-07 22:02:51 -03:00
Artturi d24da52844
Merge pull request #265764 from amjoseph-nixpkgs/pr/pythonForBuild 2023-11-08 00:13:25 +02:00
Julien Malka e626f8468b
nixos/stage1: make append_initrd_secrets script reproducible 2023-11-07 22:56:48 +01:00
Robert Obryk 20b202b3c8 nixos/restic: allow timer to be disabled 2023-11-07 22:37:37 +01:00
Felix Buehler 4d1680ccc7 nixos/exportarr: init 2023-11-07 20:56:32 +01:00
Will Fancher 03f089e11d nixos/initrd-ssh: Only warn about shell when using systemd initrd 2023-11-07 13:28:31 -05:00
github-actions[bot] 1505981287
Merge master into staging-next 2023-11-07 18:00:55 +00:00
Ryan Lahfa 0cd6f66fb7
Merge pull request #247376 from RageKnify/fix/smartd-mail 2023-11-07 18:00:56 +01:00
Atemu 8a8a2a1071
Merge pull request #262565 from Atemu/nixos/firmware-mkEnableOption
nixos/hardware: use mkEnableOption
2023-11-07 15:59:03 +01:00
Malte Poll 9c5825bd27 nixos/athens: init at 0.12.1
Co-authored-by: Paul Meyer <49727155+katexochen@users.noreply.github.com>
2023-11-07 14:43:11 +01:00
Maximilian Bosch 0597d1d179 nixos/journald: add storage option
While this can be added via `services.journald.extraConfig`, this option
provides proper type-checking and other modules can determine
where journal data is stored. This is relevant when using e.g. promtail
to send logs to Loki and it should read from `/run/log/journal` if
volatile storage is used.
2023-11-07 14:06:27 +01:00
Florian Brandes 2ed7a5ab59 nixos/virtualization: fix shellcheck login
fixes https://www.shellcheck.net/wiki/SC2002

Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2023-11-07 13:40:42 +01:00
github-actions[bot] bed56440cb
Merge master into staging-next 2023-11-07 12:00:57 +00:00
Anthony Roussel 0908cc1a9e
nixos/tomcat: remove with lib; and use mkEnableOption 2023-11-07 11:35:38 +01:00
Jonas Heinrich 31f01ff179 nixos/printing: Fix openFirewall option 2023-11-07 10:21:48 +01:00
Janik 22aa256c6c
Merge pull request #264882 from robryk/resticfix
nixos/restic: fix #264696 and add a regression test
2023-11-07 09:46:55 +01:00
Gary Guo bc422e2f61 nixos/unbound: tighten sandboxing for unbound 2023-11-07 02:30:21 +00:00
github-actions[bot] 38bc2a577e
Merge master into staging-next 2023-11-07 00:02:31 +00:00
Jörg Thalheim a7c984b7a2 nixos/mediawiki: pin php to 8.1 2023-11-06 22:52:42 +01:00
Jörg Thalheim 915ad8a77b nixos/mediawiki: fix rewrites for static ressources and rest API 2023-11-06 22:52:42 +01:00
Gary Guo de6c5343b6 nixos/unbound: remove setuid/gid capability
If username is set, then unbound will try to become that user using
`setusercontext`. But this is pointless since we are already instructing
systemd to launch unbound with that user.

So force username to be empty, which disables this behaviour in unbound.
This allows us to remove the capability granted, and also tighten the
syscall filter.
2023-11-06 20:22:27 +00:00
Martin Weinelt a3708ce91c
Merge pull request #230380 from graham33/feature/zwave-js-server_module
zwave-js: module init, zwave-js-server: init at 1.33.0
2023-11-06 20:24:56 +01:00
Jonathan Davies 79e7841ff7 nixos/caddy: Set systemd unit to restart on-failure whilst ignoring
error code 1.

This is what's recommended by systemd for long-running services and
helps with recovering from crashes.
2023-11-06 18:27:47 +00:00
Archit Gupta 2a4b82c461 nixos/boot: add postResumeCommands option
Adds a postResumeCommands option to the initramfs to allow inserting
code to execute after the device has attempted to resume, and before
filesystems are mounted. This allows to inject code for operations like
wiping the rootfs on boot; if those were instead put in
postDeviceCommands, on a hibernated device, they would execute before
the device resumes from hibernation.
2023-11-06 09:50:11 -08:00
Kira Bruneau 9dec7a00ad nixos/gnome/at-spi2-core: fix disabling a11y in all contexts
`environment.variables` gets sourced by shells & the x11 wrapper
through bash's `/etc/profile`, but not by systemd services, dbus
services, wayland sessions...

`environment.sessionVariables` sets these variables with PAM early in
the login process so it gets applied in all contexts.

I ran into a similar issue before in #109060.
2023-11-06 12:40:38 -05:00
Colin 83bf3ed892 trust-dns: 0.23.0 -> 0.24.0
upstream is in the process of renaming to `hickory-dns`.
a consequence of this is that the main binary has been renamed from
`trust-dns` to `hickory-dns` and the repository has been moved (though
for the time being the old repo is still usable on account that it
redirects to the new one).
see: <https://bluejekyll.github.io/blog/posts/announcing-hickory-dns/>
2023-11-06 15:38:23 +00:00
Alyssa Ross d9105c28c8 nixos/stage-1: create initramfs /lib at build time
Modules built in to the kernel can attempt to load firmware before
init is started.  To guarantee the firmware is accessible to them
where they expect, /lib has to exist in the initramfs — it can't be
created later by init, because by that point the module may already
have tried and given up.
2023-11-06 14:35:34 +01:00
Weijia Wang 32da89a1a1 Merge branch 'master' into staging-next 2023-11-06 14:33:18 +01:00
Alyssa Ross 8ab2f09522 nixos/qemu-vm: fix infinite recursion
The virtualisation.directBoot.initrd option was added for netboot
images, but the assertion to check directBoot enabled if it was used
caused an infinite recursion if it was.  Minimal reproduction:

	import nixos/tests/make-test-python.nix ({ pkgs, ... }: {
	  name = "";

	  nodes = {
	    machine = { config, ...}: {
	      imports = [ nixos/modules/installer/netboot/netboot-minimal.nix ];

	      virtualisation.directBoot = {
	        enable = true;
	        initrd = "${config.system.build.netbootRamdisk}/${config.system.boot.loader.initrdFile}";
	      };
	    };
	  };
	  testScript = "";
	}) {}

The fix is to swap the two conditions, so that cfg.directBoot.enable
is checked first, and the initrd comparision will be short circuited.

This wasn't noticed during review because in earlier versions of the
virtualisation.directBoot patch, the assertion was accidentally in the
conditional above, so wasn't evaluated unless port forwarding was in
use.
2023-11-06 13:49:31 +01:00
nicoo 89fd59c12a nixos/vagrant-guest: Set security.sudo-rs.wheelNeedsPassword too 2023-11-06 12:39:04 +01:00
Michele Guerini Rocco 8beca974f9
Merge pull request #263138 from tomfitzhenry/hostapd-optional-managementframeprotection
nixos/hostapd: remove managementFrameProtection in favour of clearer default
2023-11-06 11:17:07 +01:00
Ivan Petkov 49f444897b syncoid: disable PrivateUsers in systemd unit
* leaving PrivateUsers=true appears to break when using zfs-2.2.0
2023-11-06 10:16:15 +01:00
Adam Joseph bc2d598878 treewide: change pythonForBuild to pythonOnBuildForHost 2023-11-05 17:42:12 -08:00
github-actions[bot] b23f12e076
Merge master into staging-next 2023-11-06 00:02:12 +00:00
Maximilian Bosch 19bbcbade3
Merge pull request #265071 from 999eagle/feat/matrix-sliding-sync-update
nixos/matrix-sliding-sync: add dependency on matrix-synapse if running locally
2023-11-05 23:24:01 +01:00
Thomas Watson be8065759e nixos/kernel: correct kernelPatches.extraConfig documentation
It hasn't expected the prefix for a long time (possibly ever). Other
documentation and patches within nixpkgs itself (such as the crashdump
module) do not have the prefix.
2023-11-05 16:00:15 -06:00
adisbladis a1592fb410
Merge pull request #258299 from Arcayr/virtualisation-hostname
nixos/virtualisation: add hostname option to oci-containers.
2023-11-06 10:44:26 +13:00
nicoo 6f28ce9856 nixos/x2goserver: Work with both Miller's sudo and sudo-rs 2023-11-05 20:59:15 +00:00
nicoo 690f027251 nixos/ssm-agent: Handle sudo-rs too 2023-11-05 20:49:41 +00:00
Sophie Tauchert 8627e0ef58
nixos/matrix/*: change dependencies on matrix-synapse.service to serviceUnit 2023-11-05 21:43:08 +01:00
nicoo 9259a8d279 nixos/google_oslogin: Handle sudo-rs too 2023-11-05 20:40:12 +00:00
Sophie Tauchert 70dc536ae0
nixos/matrix-synapse: add readOnly serviceUnit option
This is useful to configure services dependent on matrix-synapse regardless
of whether workers are enabled or not.
2023-11-05 21:38:39 +01:00
nicoo 326904b128 nixos/google-compute-config: Add sudo-rs rules 2023-11-05 20:33:19 +00:00
Gary Guo c70614c0a4 nixos/unbound: fix wrong syscall filter
This changes the syscall filter to match that of upstream. Note that

    SystemCallFilter=~foo bar

is completely different from

    SystemCallFilter=~foo
    SystemCallFilter=bar

The former one means that foo and bar are forbidden, and the latter
one means foo is forbidden and bar is granted!
2023-11-05 20:32:51 +00:00
Sophie Tauchert c8b5539626
nixos/matrix-sliding-sync: add dependency on matrix-synapse if running locally and restart 2023-11-05 21:31:20 +01:00
nicoo 19af28537b nixos/btrbk: Support both Miller's sudo and sudo-rs 2023-11-05 20:15:18 +00:00
nicoo 9aee9b163e nixos/akkoma: Do not warn under sudo-rs 2023-11-05 18:40:33 +00:00
github-actions[bot] bb38778356
Merge master into staging-next 2023-11-05 18:00:55 +00:00
nicoo ad92951579 nixos/sudo: Don't include empty sections
This makes the generated sudoers a touch easier to read.
2023-11-05 17:23:41 +00:00
Jonas Heinrich 35128eb6f8
nixos/printing: Add openFirewall option (#176539) 2023-11-05 16:01:20 +01:00
Aaron Andersen a707831d98
Merge pull request #256738 from toastal/prosody-libevent-deprecated
prosody: remove deprecated libevent
2023-11-05 08:36:25 -05:00
Ryan Lahfa 0020a3f649
Merge pull request #265281 from JulienMalka/systemd-boot-maintainer 2023-11-05 13:03:59 +01:00
github-actions[bot] 2ecaf22639
Merge master into staging-next 2023-11-05 12:01:15 +00:00
Leah Amelia Chen 30f2f955fe nixos/greetd: autostart GNOME Keyring when enabled
The PAM service `greetd` creates now autostarts GNOME Keyring when it is
enabled via `services.gnome.gnome-keyring.enable`.

Should cause a lot fewer headaches for people like me who didn't know
why GNOME Keyring was complaining that it was never supplied with login details.

Fixes #246197
2023-11-05 12:22:52 +01:00
github-actions[bot] 6e287cb9de
Merge master into staging-next 2023-11-05 00:02:23 +00:00
Thiago Kenji Okada 3fcd5f430b
Merge pull request #263206 from kanashimia/revert-259066-add-renice-sway
Revert "nixos/sway: add enableRealtime option"
2023-11-04 21:59:06 +00:00
Weijia Wang 9627659c22 Merge branch 'master' into staging-next 2023-11-04 17:27:09 +01:00
K900 ea9372de82
Merge pull request #265482 from alois31/plasma-setuid
nixos/plasma5: fix mismatch between nix and module system
2023-11-04 19:08:55 +03:00
Alois Wohlschlager dee9519abe
nixos/plasma5: fix mismatch between nix and module system
In https://github.com/NixOS/nixpkgs/pull/254071, a mismatch between usage of
the Nix language and the NixOS module system was introduced. By merging the
kwin_wayland wrapper attrset into the mkIf representation, the former was
effectively ignored.
As a result, the capability wrapper for kwin_wayland stopped being installed,
leading to realtime scheduling being disabled. The issue was not detected
because the behavioral change is very subtle.

By consistently using language-level constructs, this mismatch is resolved.
The capability wrapper is thus installed again and realtime scheduling is
restored.
2023-11-04 16:33:38 +01:00
Felix Bühler 85f1ba3e51
Merge pull request #263173 from r-ryantm/auto-update/freshrss
freshrss: 1.21.0 -> 1.22.1
2023-11-04 13:09:36 +01:00
github-actions[bot] 2c3155e94d
Merge master into staging-next 2023-11-04 12:00:55 +00:00
Maximilian Bosch 845cf9943c
Merge pull request #264582 from FliegendeWurst/throttled-modprobe
nixos/throttled: load required kernel module
2023-11-04 12:27:38 +01:00
Julien Malka 33df4d3447
nixos/systemd-boot: add julienmalka as maintainer 2023-11-04 02:38:11 +01:00
Weijia Wang 44f16f33cc Merge branch 'master' into staging-next 2023-11-04 01:43:45 +01:00
K900 3ce4c66151 nixos/module-list: add virt-manager
Was missed in #261474
2023-11-04 01:02:27 +03:00
github-actions[bot] 3c43b804d4
Merge master into staging-next 2023-11-03 18:01:23 +00:00
Lily Foster 5c5d730067
Merge pull request #262347 from adamcstephens/incus/module
nixos/incus: init module and tests
2023-11-03 09:42:24 -04:00
Michele Guerini Rocco 5654dea8a5
Merge pull request #264787 from katexochen/feat/xkb-extralayouts
nixos/x11: move extraLayouts into xkb attrset
2023-11-03 13:49:14 +01:00
github-actions[bot] db0a71076b
Merge master into staging-next 2023-11-03 12:01:07 +00:00
Maximilian Bosch 225d785e7d
Merge pull request #263475 from nbraud/nixos/sudo-bugfix
nixos/sudo: fix `security.sudo.package`
2023-11-03 11:26:03 +01:00
Peter Hoeg f4856b55dd nixos/fwupd: make auto-refresh run (and work) 2023-11-03 10:54:41 +01:00
linsui 92c106c097 nixos/firefox: update document link 2023-11-03 17:05:37 +08:00
github-actions[bot] 75a11d85b8
Merge master into staging-next 2023-11-03 00:02:23 +00:00
Adam Stephens 3132ba6cda
nixos/incus: shutdown instances on service stop 2023-11-02 19:54:11 -04:00
Adam Stephens 3087595a6b
nixos/incus: preseed should not trigger socket-activation 2023-11-02 19:54:04 -04:00
Adam Stephens 1fff6a9031
nixos/incus: init module and tests 2023-11-02 19:54:02 -04:00
Alexandru Scvortov cbbe57bc52 elixir: make 1.15 default and pin existing pkgs to 1.14 2023-11-02 20:16:00 +00:00
github-actions[bot] 29efc257c0
Merge master into staging-next 2023-11-02 18:01:07 +00:00
Janik H. 15babfbc12
nixos/woodpecker-server: fix environmentFile example 2023-11-02 18:14:46 +01:00
Janik 8a897821fe
Merge pull request #262781 from Janik-Haag/woodpecker
nixos/woodpecker-server: change type of environmentFile to list of paths
2023-11-02 17:40:07 +01:00
Maximilian Bosch dbb68f0b49
Merge pull request #263558 from Ma27/fix-image-renderer-callback
nixos/grafana-image-renderer: use Grafana's http_addr rather than localhost
2023-11-02 15:49:23 +01:00
Anthony Roussel efdbdab8b5
nixos/ocsinventory-agent: init 2023-11-02 14:20:45 +01:00
github-actions[bot] 677e25fcd2
Merge master into staging-next 2023-11-02 12:01:08 +00:00
Jörg Thalheim 94b810348a installer/cd-dvd/channel: allow to disable bundled channel
When building kexec-based installer every mb saved will reduce the RAM usage and allow to install NixOS on smaller machines.
It also means that less data has to be downloaded from the network.
When using flakes or niv we no longer rely on nix channels beeing present
and when using something like nixos-anywhere, we no longer need to evaluate anything in the installer at all.
2023-11-02 12:39:05 +01:00
Jörg Thalheim af459e624e installer/cd-dvd/channel: stop using lib
the lack of with allows lsp's to spot errors better
2023-11-02 12:39:05 +01:00
Graham Bennett b2fccae809 zwave-js: module init, zwave-js-server: init at 1.33.0
Co-authored-by: Martin Weinelt <mweinelt@users.noreply.github.com>
Co-authored-by: h7x4 <h7x4@nani.wtf>
2023-11-02 08:21:09 +00:00
github-actions[bot] e67e95c1d1
Merge master into staging-next 2023-11-02 06:01:16 +00:00
Martin Weinelt 0b2ab262bc
home-assistant: 2023.10.5 -> 2023.11.0
https://www.home-assistant.io/blog/2023/11/01/release-202311/
2023-11-01 22:28:12 +01:00
Stephen Huan 09cc3285cc
nixos/mullvad-vpn: use resolvconf if enabled 2023-11-01 16:47:11 -04:00
Robert Obryk 536401e90a nixos/restic: fix #264696 and add a regression test
Make sure that preStart and postStop are included in all cases when they are nonempty.
2023-11-01 21:18:56 +01:00
github-actions[bot] cd7af6170b
Merge master into staging-next 2023-11-01 18:01:01 +00:00
nikstur 7d0b5b3a94 nixos/nix-channnel: fix setting up the default channel again 2023-11-01 16:23:28 +01:00
github-actions[bot] 4a533d29ce
Merge master into staging-next 2023-11-01 12:01:10 +00:00
Martin Weinelt 05e8361387
Merge pull request #261867 from matrss/set-paperless-secret-key
nixos/paperless: set PAPERLESS_SECRET_KEY
2023-11-01 12:33:23 +01:00
Felix Buehler 29d41b7fd2 nixos/freshrss: migrate to DATA_PATH 2023-11-01 12:31:42 +01:00
Paul Meyer 143680787e nixos/x11: move extraLayouts into xkb attrset
[Motivation](NixOS#257817 (comment))

`extraLayouts` was missed in #259891, so moving it to the other xkb
options with this PR.

Signed-off-by: Paul Meyer <49727155+katexochen@users.noreply.github.com>
2023-11-01 11:55:25 +01:00
Jakob Schöttl 7a363cef5f nixos/dolibarr: add package option
Allow users to easily use a different dolibarr version, e.g. version 18
(currently in unstable) instead of 16.
2023-11-01 08:50:36 +01:00
github-actions[bot] 0d2063b693
Merge master into staging-next 2023-11-01 00:02:16 +00:00
Guillaume DELVIT 043522789b nixos/services/netdata: add systemd-journald plugin as a privileged wrapper
https://learn.netdata.cloud/docs/logs/systemd-journal/
need acces to

    Kernel Logs (dmesg):
        Capability: CAP_SYSLOG
        Description: This capability allows the program to read kernel logs using the dmesg command or by reading the /dev/kmsg file.

    System Logs (e.g., /var/log/syslog):
        Capability: CAP_DAC_READ_SEARCH
        Description: This capability allows the program to read system logs located in directories such as /var/log/.

    User Logs (e.g., /var/log/auth.log):
        Capability: CAP_DAC_READ_SEARCH
        Description: This capability allows the program to read user logs located in directories such as /var/log/.
2023-11-01 00:16:30 +01:00
Robert Hensing 29697af6ae
Merge pull request #258068 from Izorkin/update-peertube
peertube: 5.1.0 -> 5.2.1
2023-10-31 23:44:14 +01:00
FliegendeWurst 1391725fb5 nixos/throttled: load required kernel module 2023-10-31 22:14:02 +01:00
github-actions[bot] 81270bbdcf
Merge master into staging-next 2023-10-31 18:01:02 +00:00
nikstur 37209a6799
Merge pull request #264608 from nikstur/nix-channel-fix-default
nixos/nix-channel: fix subscribing to default channel
2023-10-31 18:42:06 +01:00
nikstur 8c1739cafe nixos/nix-channel: fix subscribing to default channel
Fixes https://github.com/NixOS/nixpkgs/issues/264602
2023-10-31 16:51:23 +01:00
Robin Gloster 7e2992c01b
Merge pull request #264584 from Ma27/drop-privacyidea
privacyidea: remove
2023-10-31 16:46:37 +01:00
Franz Pletz 265ca81834
Merge pull request #241908 from picnoir/nin/oci-container-pre-start-list 2023-10-31 15:53:35 +01:00
Janik H. 8e5729517e
nixos/woodpecker-server: change type of environmentFile to list of paths 2023-10-31 15:46:53 +01:00
K900 46bc9e79a9
Merge pull request #259765 from 70m6/bugfix/bitcoind-enable
bugfix/bitcoind-enable
2023-10-31 17:35:10 +03:00
Tom Barrett a4b31637b5 bitcoind: only use enabled services 2023-10-31 15:29:17 +01:00
Weijia Wang a38f4bdef6
Merge pull request #264562 from acid-bong/patch-1
nixos/direnv: fix typo
2023-10-31 14:21:25 +01:00
Maximilian Bosch 5927d55685
privacyidea: remove
Related to #262907 (Django3 removal from nixpkgs).

This package already required an unreasonable amount of maintenance
regularly for a such small leaf-package. It has a few highly outdated
dependencies (e.g. flask 1, jinja2 2.11, sqlalchemy 1.3).

After at least each Python package-set update one had to fix up a lot of
dependencies to fix the package itself, so it was only useful on stable
branches. And having so much outdated software in a security-sensitive
piece of software seems questionable.

Finally, globin and I won't be available for maintaining this now that
Mayflower is migrating to another solution (and we'll do that as well)
and I'd expect this to bitrot extremely quick if we both bail out.
2023-10-31 14:17:48 +01:00
github-actions[bot] 2fd5f8dd7a
Merge master into staging-next 2023-10-31 12:01:11 +00:00
nikstur 14152f80bb nixos/image: fix layout of option examples in repart builder 2023-10-31 11:27:57 +01:00
nikstur 151fa7c39c nixos/image: include module options in manual 2023-10-31 11:27:56 +01:00
nikstur 84722633b7 nixos/image: move docs into manual 2023-10-31 11:27:56 +01:00
Acid Bong e7d95c440b
nixos/direnv: fix typo 2023-10-31 12:09:06 +02:00
nikstur b984b2691a
Merge pull request #264475 from blitz/repart-docs
nixos/image: fix documentation build
2023-10-31 10:13:01 +01:00
Alexandru Scvortov fa54eeea5c livebook: add systemd user service, test, and docs
Co-authored-by: Yt <happysalada@tuta.io>
2023-10-31 07:31:18 +00:00
github-actions[bot] 97868dae8e
Merge master into staging-next 2023-10-31 06:00:58 +00:00
Mario Rodas 1122fb5123
Merge pull request #264250 from Ma27/rm-postgres-11
postgresql_11: remove
2023-10-30 21:36:56 -05:00
github-actions[bot] 135430eb60
Merge master into staging-next 2023-10-31 00:02:27 +00:00
Martin Weinelt e3647a1769
nixos/wyoming/openwakeword: fix typo in attribute name 2023-10-31 00:42:04 +01:00
Julian Stecklina ea3ca0b1e3 nixos/image: fix documentation build
literalExpression triggers the following error when building the
manual:

Cacheable portion of option doc build failed.
Usually this means that an option attribute that ends up in documentation (eg `default` or `description`) depends on the restricted module arguments `config` or `pkgs`.
2023-10-31 00:36:17 +01:00
Martin Weinelt 5da8c00f11
Merge pull request #264404 from mweinelt/wyoming-openwakeword-1.8.1
wyoming-openwakeword: 1.5.1 -> 1.8.1
2023-10-30 22:53:25 +01:00
Martin Weinelt 3f224f0607
Merge pull request #264214 from mweinelt/wyoming-faster-whisper-device-param
nixos/wyoming/faster-whisper: pass device config to executable
2023-10-30 22:27:24 +01:00
Luka Blaskovic d3db35f684 stage-2: don't write to /dev/kmsg if missing 2023-10-30 21:53:52 +01:00
github-actions[bot] 931938d1df
Merge master into staging-next 2023-10-30 18:01:02 +00:00
Lin Jian bb3474f826
Merge pull request #264008 from arcnmx/xmrig-mainProgram
xmrig: add meta.mainProgram
2023-10-31 01:21:25 +08:00
K900 998720bf94
Merge pull request #263849 from ElvishJerricco/sd-initrd-not-experimental
systemd-stage-1: No longer experimental
2023-10-30 20:04:20 +03:00
K900 7bc18b63da
Merge pull request #227633 from ElvishJerricco/systemd-stage-1-fix-initrd-commands
Systemd stage 1 assert initrd commands are empty
2023-10-30 20:03:44 +03:00
Martin Weinelt e458280606
nixos/wyoming/openwakeword: update for 1.8.1
Remove the deprecated --models option, as models are now discovered
and loaded dynamically from all configured model dirs at runtime.

Allow setting up custom model directories, so wake words other than the
built-in ones can be used, e.g. from
https://github.com/fwartner/home-assistant-wakewords-collection.
2023-10-30 18:00:28 +01:00
Martin Weinelt 0d34502fe3
nixos/wyoming/openwakeword: relax model selection
The wyoming-openwakeword supports a custom model directory, which cannot
be used when the the model list is constrained to the builtin ones.
2023-10-30 16:21:58 +01:00
github-actions[bot] 7f11b9b46b
Merge master into staging-next 2023-10-30 12:01:05 +00:00
Will Fancher cca22054c0 systemd-stage-1: Add assertions for unsupported options. 2023-10-30 12:15:58 +01:00
Janne Heß d80d7d6697
Merge pull request #258071 from helsinki-systems/feat/stc-lock
nixos/switch-to-configuration: Lock the switch
2023-10-30 10:49:50 +01:00
Maximilian Bosch 1220a4d4dd
postgresql_11: remove
As described in the release lifecycle docs from postgresql[1], v11 will
stop receiving fixes as of Nov 9 2023. This means it's EOL throughout
the entire lifetime of 23.11, so let's drop it now.

A lot of examples are also referencing postgresql_11. Where it's
sensible, use postgresql_15 as example now to avoid confusion.

This is also handy because the LLVM 16 fix for postgresql is not
available for postgresql 11 ;-)

[1] https://www.postgresql.org/support/versioning/
2023-10-30 10:41:16 +01:00
Vladimír Čunát 5c89ba8ab4
Merge branch 'master' into staging-next 2023-10-30 06:12:04 +01:00
Martin Weinelt 4f971ebf3c
nixos/wyoming/faster-whisper: pass device config to executable
The device could previously be configured but wasn't wired up to do
anything meaningful and as such always defaulted to CPU.
2023-10-30 00:45:17 +01:00
Michele Guerini Rocco 800965ce8c
Merge pull request #245855 from rnhmjoj/pr-sslh
nixos/sslh: update and refactor for RFC42
2023-10-29 23:19:38 +01:00
Ryan Lahfa a905c3a544
Merge pull request #262854 from ElvishJerricco/systemd-stage-1-bcachefs-decryption
systemd-stage-1: bcachefs decryption
2023-10-29 22:24:38 +01:00
Jakub Sokołowski c7b3a19df6 erigon: add package option to override default version
Signed-off-by: Jakub Sokołowski <jakub@status.im>
2023-10-29 18:27:13 +00:00