Commit graph

27151 commits

Author SHA1 Message Date
Maciej Krüger 048ef0d455
networking/nftables: add .tables property and disable ruleset flushing by default
This allows for other unmanaged tables to co-exist peacefully on the os,
by having the nixos-managed tables be re-created atomically and the other
tables will simply be left untouched.
2023-08-28 00:30:28 +02:00
Pol Dellaiera 48de649336
nixos/modules/honk: init 2023-08-27 23:43:40 +02:00
Theodore Ni c68a6a21ca
Merge pull request #247909 from Sigmanificient/ragnarwm
ragnarwm: init at 1.3.1
2023-08-27 13:41:04 -07:00
Wietse de Vries 2c622185a7 nixos/calibre-web: add package and enableKepubify options 2023-08-27 15:25:17 +02:00
happysalada 676fe5e01b lemmy: fix ui commit_hash path 2023-08-27 20:44:10 +08:00
Robert Obryk c64bbd4466 nixos/security/wrappers: remove all the assertions about readlink(/proc/self/exe)
Given that we are no longer inspecting the target of the /proc/self/exe
symlink, stop asserting that it has any properties. Remove the plumbing
for wrappersDir, which is no longer used.

Asserting that the binary is located in the specific place is no longer
necessary, because we don't rely on that location being writable only by
privileged entities (we used to rely on that when assuming that
readlink(/proc/self/exe) will continue to point at us and when assuming
that the `.real` file can be trusted).

Assertions about lack of write bits on the file were
IMO meaningless since inception: ignoring the Linux's refusal to honor
S[UG]ID bits on files-writeable-by-others, if someone could have
modified the wrapper in a way that preserved the capability or S?ID
bits, they could just remove this check.

Assertions about effective UID were IMO just harmful: if we were
executed without elevation, the caller would expect the result that
would cause in a wrapperless distro: the targets gets executed without
elevation. Due to lack of elevation, that cannot be used to abuse
privileges that the elevation would give.

This change partially fixes #98863 for S[UG]ID wrappers. The issue for
capability wrappers remains.
2023-08-27 14:10:38 +02:00
Robert Obryk e3550208de nixos/security/wrappers: read capabilities off /proc/self/exe directly
/proc/self/exe is a "fake" symlink. When it's opened, it always opens
the actual file that was execve()d in this process, even if the file was
deleted or renamed; if the file is no longer accessible from the current
chroot/mount namespace it will at the very worst fail and never open the
wrong file. Thus, we can make a much simpler argument that we're reading
capabilities off the correct file after this change (and that argument
doesn't rely on things such as protected_hardlinks being enabled, or no
users being able to write to /run/wrappers, or the verification that the
path readlink returns starts with /run/wrappers/).
2023-08-27 14:10:38 +02:00
Robert Obryk 1bdbc0b0fe nixos/security/wrappers: stop using .real files
Before this change it was crucial that nonprivileged users are unable to
create hardlinks to SUID wrappers, lest they be able to provide a
different `.real` file alongside. That was ensured by not providing a
location writable to them in the /run/wrappers tmpfs, (unless
disabled) by the fs.protected_hardlinks=1 sysctl, and by the explicit
own-path check in the wrapper. After this change, ensuring
that property is no longer important, and the check is most likely
redundant.

The simplification of expectations of the wrapper will make it
easier to remove some of the assertions in the wrapper (which currently
cause the wrapper to fail in no_new_privs environments, instead of
executing the target with non-elevated privileges).

Note that wrappers had to be copied (not symlinked) into /run/wrappers
due to the SUID/capability bits, and they couldn't be hard/softlinks of
each other due to those bits potentially differing. Thus, this change
doesn't increase the amount of memory used by /run/wrappers.

This change removes part of the test that is obsoleted by the removal of
`.real` files.
2023-08-27 14:10:36 +02:00
Robert Obryk 44fde723be nixos/security/wrappers: generate a separate and more complete apparmor policy fragment for each wrapper
This change includes some stuff (e.g. reading of the `.real` file,
execution of the wrapper's target) that belongs to the apparmor policy
of the wrapper. This necessitates making them distinct for each wrapper.
The main reason for this change is as a preparation for making each
wrapper be a distinct binary.
2023-08-27 14:10:07 +02:00
Nick Cao 3b5bb2461c
Merge pull request #249726 from hughobrien/restic-service-network-target
nixos/restic: wait for network-online for timed backups
2023-08-27 13:06:19 +08:00
Franz Pletz da9db25ca4
Merge pull request #222515 from codedownio/tmux-run-plugins-last 2023-08-26 22:47:33 +02:00
Maciej Krüger ebdd6efe6c
Merge pull request #251412 from karolinschlegel/update-odoo 2023-08-26 21:32:48 +02:00
Janik 321734bc2b
Merge pull request #251157 from NetaliDev/vmagent-extra-options 2023-08-26 21:21:11 +02:00
Janik 1f0c325739
Merge pull request #250976 from Shados/sddm-include-tmpfile-config 2023-08-26 20:21:20 +02:00
Karolin Schlegel 19d7454123 odoo: 15.20230317 -> 16.20230722 2023-08-26 10:22:57 +02:00
Franz Pletz 08c65ad526
Merge pull request #251370 from leona-ya/paperless-ngx-mail-ca-certs
nixos/paperless: allow systemd services to read ca-certificates
2023-08-26 03:20:25 +02:00
Franz Pletz da37904672
Merge pull request #246772 from R-VdP/nixos-user-expiry
nixos/update-users-groups: add support for account expiry
2023-08-26 02:41:34 +02:00
Franz Pletz fe907aa37e
Merge pull request #242365 from h7x4/add-mysqld-exporter
services/prometheus/exporters: add mysqld
2023-08-25 23:56:22 +02:00
Majiir Paktu 1f34babe84 nixos/network-interfaces-systemd: add bridge interfaces in systemd-initrd 2023-08-25 13:11:40 -04:00
Leona Maroni 87f21ac4e6
nixos/paperless: allow systemd services to read ca-certificates
This fixes a regression introduced with the update to 1.17.0.
Since this version paperless-ngx checks the ssl certificates of remote
email servers.
2023-08-25 16:54:04 +02:00
Majiir Paktu 2cb4671ebc nixos/network-interfaces-systemd: add VLAN interfaces in systemd-initrd 2023-08-25 10:44:43 -04:00
revol-xut 0ebb3b6ed8 nixos/netbox: add keycloakClientSecret option 2023-08-25 15:42:44 +01:00
Lin Jian 665651c736 emacs: remove outdated doc about package initialization
Since Emacs 27[1], there is no need to call package-initialize in the
init file.

[1]: https://git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS.27?id=cae528457cb862dc886a34240c9d4c73035b6659#n227
2023-08-25 10:22:30 +00:00
Lin Jian 0d3ba90f52 nixos/emacs: replace emacs with Emacs in the doc 2023-08-25 10:22:30 +00:00
Arnout Engelen 4dcaa04151
Merge pull request #242942 from raboof/prometheus-nextcloud-auth-token
prometheus-exporter-nextcloud: support for auth tokens
2023-08-25 09:54:23 +02:00
Ingolf Wagner 7f2b869560
nixos/tts: fix error messages read before text
with a config like this :

```
services.tts = {
  servers = {
    english = {
      enable = true;
      port = 5300;
      model = "tts_models/en/ljspeech/vits"
    };
  };
};
```

You the WAVs tts creates contain an error message which will be read to
you before the text you typed in will be read to you.
This patch fixes that.
2023-08-25 09:48:46 +02:00
Ilan Joselevich 0f95d1cfe1
Merge pull request #248748 from acid-bong/zshLsColors
nixos/zsh: add enableLsColors
2023-08-24 22:04:43 +03:00
Ilan Joselevich 649fadd226
Merge pull request #250761 from gepbird/dwm-fix-java-gui
dwm: add _JAVA_AWT_WM_NONREPARENTING=1
2023-08-24 22:02:38 +03:00
Benjamin Staffin 63f858bdf8
hddfancontrol: license and metadata tweaks (#251184)
* nixos/hddfancontrol: missed a few code review tweaks

Following up on https://github.com/NixOS/nixpkgs/pull/239801#pullrequestreview-1498132501

* hddfancontrol: Fix license field
2023-08-24 12:41:43 -04:00
Jennifer Graul f0b76e7d10
nixos/vmagent: add extraOptions option 2023-08-24 15:09:29 +02:00
K900 9ab379753f
Merge pull request #250974 from K900/wine-binfmt-mask
nixos/binfmt: use PE magic to detect Wine executables
2023-08-24 12:54:21 +03:00
Pierre Bourdon 4428f3a79a
Revert "nixos/security/wrappers: simplifications and a fix for #98863" 2023-08-24 08:35:11 +02:00
Nick Cao 6408fedbfa
Merge pull request #248855 from NickCao/zram-generator
nixos/zram: use nixos/zram-generator as backing implementation
2023-08-24 08:57:22 +08:00
Nick Cao 8d524e610b
Merge pull request #249502 from oddlama/feat-influxdb-provision-full
nixos/influxdb2: add provisioning and nixos tests
2023-08-24 08:55:38 +08:00
Nick Cao e2689c1c98
nixos/zram-generator: drop outdated comments 2023-08-24 08:47:19 +08:00
Pierre Bourdon 0930308453
Merge pull request #199599 from robryk/suidwrapnoreal
nixos/security/wrappers: simplifications and a fix for #98863
2023-08-24 01:09:36 +02:00
Ilan Joselevich 49f76fea56
Merge pull request #251032 from Kranzes/twingate-resolved
nixos/twingate: avoid conflicts with resolved
2023-08-24 01:39:27 +03:00
Pol Dellaiera ef45c82289
Merge pull request #250648 from mfrw/mfrw/tailscale
tailscale: 1.46.1 -> 1.48.1
2023-08-24 00:22:26 +02:00
Ilan Joselevich e739ef8066
nixos/twingate: avoid conflicts with resolved 2023-08-23 23:01:47 +03:00
Emily 73a060e7ca
Merge pull request #244626 from Sohalt/caddy-rfc42
nixos/caddy: Add rfc42 settings option
2023-08-23 20:36:46 +02:00
Benjamin Staffin 12b3178bd2 nixos/hddfancontrol: initial module & test 2023-08-23 13:25:29 -04:00
K900 c6cf85b0d5 nixos/binfmt: use PE magic to detect Wine executables
Otherwise we break every Meson build because it creates native executables named foo.exe
2023-08-23 16:20:57 +03:00
Alexei Robyn 4d0d7fb93e nixos/sddm: avoid systemd-tmpfiles-clean removing user's $XAUTHORITY 2023-08-23 22:52:50 +10:00
oddlama 8b5b7def91
nixos/influxdb2: add org, bucket, users and auth provisioning 2023-08-23 14:46:52 +02:00
Atemu 65f20da184
Merge pull request #246008 from Atemu/emacs-daemon-fix-display
nixos/emacs: start emacs service with the graphical-session
2023-08-23 11:46:52 +02:00
Muhammad Falak R Wani 3f141be99c
tailscale: add mfrw as maintainer
Signed-off-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
2023-08-23 08:32:33 +05:30
sohalt c01874615b nixos/caddy: Add rfc42 settings option 2023-08-22 20:14:35 +02:00
Vincent Haupert 388bfcef4a nixos/github-runners: add nodeRuntimes option 2023-08-22 15:52:35 +02:00
Arian van Putten 3eb0214551 modules/image/repart: Fix stripNixStorePrefix
It seems it wasn't working
2023-08-22 13:09:03 +02:00
Gutyina Gergő 2a71e7815e
dwm: add _JAVA_AWT_WM_NONREPARENTING=1
dwm is not in Java's internal list of non-reparrenting
window managers. Running Java GUI programs without this
variable on window managers (eg. jd-gui) causes the window
to be blank.
2023-08-22 12:56:59 +02:00
Samuel Dionne-Riel faa0c27293
Merge pull request #245739 from dev-null-undefined/grub-specialisations
nixos/grub: Add submenu for each generation with specialisation
2023-08-21 23:03:59 -04:00
Benjamin Staffin 63e9b2f8c0
Merge pull request #246354 from minijackson/netbox-fixes
netbox: 3.5.6 -> 3.5.7 + migration fixes + upgrade NixOS test
2023-08-21 16:22:38 -04:00
dev-null-undefined a39526b3ef
nixos/grub: Add submenu for each generation with specialisation
Before this commit there was no way to access (boot into) specialisation of previous generations from grub,even tho they are there.

This commit will add grub submenu for each generation if the generation has any specialisation.
Which will allow you to boot into them.

Co-authored-by: Samuel Dionne-Riel <samuel@dionne-riel.com>
2023-08-21 21:44:42 +02:00
Ember Keske 0138e327c1 grocy: clear viewcache before start 2023-08-21 10:36:24 +02:00
Janne Heß eb831f759b
nixos/stc: Improve mount unit handling
We should sometimes restart the units rather than reloading them so the
changes are actually applied. / and /nix are explicitly excluded because
there was some very old issue where these were unmounted. I don't think
this will affect many people since most people use fstab mounts instead
but I plan to adapt this behavior for fstab mounts as well in the future
(once I wrote a test for the fstab thingies).
2023-08-21 09:07:14 +02:00
Bruno BELANYI 200c3bad42 nixos/woodpecker-agents: add 'path' option
See #249602.
2023-08-20 22:26:52 +02:00
Sigmanificient 0482394fe0 ragnarwm: init at 1.3.1 2023-08-20 18:20:39 +02:00
github-actions[bot] 1bb285561e
Merge master into staging-next 2023-08-20 06:00:56 +00:00
Bobby Rong 5f75be53ea
Merge pull request #249712 from bobby285271/upd/cinnamon-qt-style
nixos/cinnamon: Override Qt apps style again
2023-08-20 11:35:23 +08:00
github-actions[bot] f6a4c6f912
Merge master into staging-next 2023-08-20 00:02:29 +00:00
Tobias Widmann e4a62b0fd1 nixos/htop: fix boolean values in settings option
When generating htoprc, in order to be recognized by htop, a boolean value
of 'false' should be written as '0', not an empty string.
2023-08-20 00:10:24 +02:00
Martin Weinelt 7c75694db9
Merge pull request #240982 from rnhmjoj/pr-jool
nixos/jool: add service for setting up SIIT/NAT64
2023-08-19 23:32:05 +02:00
Doron Behar ab1fe60481
Merge pull request #249860 from errnoh/goxlr-utility
goxlr-utility: init at 0.12.6 (fixes #243701)
2023-08-19 19:10:40 +00:00
github-actions[bot] b34f222b02
Merge master into staging-next 2023-08-19 18:00:51 +00:00
Bruno BELANYI 6dd4c5f73f nixos/woodpecker-agents: use 'literalExample'
The next commit is going to add an option which takes a list of
packages. So the example must be converted to make it documentable.

This will also allow adding comments, to explain why some options are
used.
2023-08-19 16:29:10 +01:00
Bruno BELANYI 7d246a2873 nixos/woodpecker-agents: fix typos in doc
The name of the backend is `local`, not `exec`.

`environmentFile` is supposed to be a list.
2023-08-19 16:28:31 +01:00
Bruno BELANYI f7151209c4 nixos/woodpecker-agents: fix 'podman' example
The name should match the fact that we're using `podman` instead of
`docker`.

And the group was wrong.
2023-08-19 16:28:31 +01:00
Erno Hopearuoho 3748c8b483 goxlr-utility: init module 2023-08-19 17:16:41 +03:00
francescoDeSimone 42f0af4abe nixos/duplicati: add package option 2023-08-19 16:08:39 +02:00
Ilan Joselevich 6e3d657482
Merge pull request #247776 from f2k1de/graylog-5.1
graylog-5_1: init at 5.1.4
2023-08-19 16:00:11 +03:00
github-actions[bot] d3b2560b73
Merge master into staging-next 2023-08-19 12:01:03 +00:00
Ember Keske 0b1ef8ea9e grocy: 4.0.0 -> 4.0.2 2023-08-19 13:52:07 +02:00
Franz Pletz 4fe4a74fe5
Merge pull request #246713 from n0emis/grocy-4.0.0
grocy: 3.3.0 -> 4.0.0
2023-08-19 13:41:22 +02:00
Ember Keske 66ee520289 grocy: replace @ma27 with @n0emis as maintainer 2023-08-19 13:02:04 +02:00
Pol Dellaiera cac8909c85
Merge pull request #250100 from NixOS/ioquake3/update
ioquake3: fix missing `.so` files at startup and clean-up
2023-08-19 12:31:33 +02:00
Alexandre Iooss 64a71aea98 nixos/galene: do not restrict AF_NETLINK
Built-in TURN server requires AF_NETLINK address family.
2023-08-19 08:47:01 +02:00
Pol Dellaiera 849c75577d
nixos/openarena: cleanup
- Remove `with lib;`
- Add `package` config option
- Adjust paths accordingly in `ExecStart`
2023-08-19 07:28:14 +02:00
Pol Dellaiera 5fdff213c9
nixos/quake3-server: add package config option
- Remove top-level `with lib;`
2023-08-19 07:07:08 +02:00
Hugh O'Brien a08d69ba63
nixos/restic: wait for network-online for timed backups 2023-08-18 20:02:16 -04:00
github-actions[bot] 4a9909e0db
Merge master into staging-next 2023-08-19 00:01:42 +00:00
Adam Stephens 1403486d17 nixos/lxd-agent: init module from distrobuilder generator 2023-08-18 22:28:59 +00:00
github-actions[bot] 1949ef2080
Merge master into staging-next 2023-08-18 18:00:57 +00:00
Nick Cao a4c6594dcd
nixos/influxdb2: do not load passwordFile and tokenFile when provisioning is disabled 2023-08-18 20:25:53 +08:00
github-actions[bot] f1d7a13229
Merge master into staging-next 2023-08-18 00:01:46 +00:00
Artturi 52be2cdfea
Merge pull request #249788 from Niki4tap/dwm-fix-hash 2023-08-17 22:08:55 +03:00
Felix Bühler 96481fd201
Merge pull request #249323 from kevincox/photoprism-chmod
nixos.photoprism: Relax sandbox to allow running exiftool
2023-08-17 21:01:40 +02:00
Niki4tap bd0b732bef dwm: use correct hash in example 2023-08-17 21:14:35 +03:00
github-actions[bot] 3b76a64c44
Merge master into staging-next 2023-08-17 12:01:23 +00:00
Bobby Rong 26adac4d27
nixos/cinnamon: Override Qt apps style again
Use gtk2 to follow Mint's decision for now.
2023-08-17 17:08:29 +08:00
Bobby Rong fd1f73aaa2
Merge pull request #249312 from FedericoSchonborn/budgie/magpie
budgie.magpie: init at 0.9.2, replace Mutter with it on Budgie
2023-08-17 15:43:43 +08:00
github-actions[bot] 2e936d668c
Merge master into staging-next 2023-08-17 06:00:58 +00:00
Federico Damián Schonborn 9325eefbdc
nixos/budgie: Add Magpie to services.udev.packages
Signed-off-by: Federico Damián Schonborn <fdschonborn@gmail.com>
2023-08-17 00:56:43 -03:00
Nick Cao acd40c3925
Merge pull request #249432 from linj-fork/fix-aspell
nixos/environment: stop setting ASPELL_CONF
2023-08-17 08:20:52 +08:00
Ilan Joselevich fb1f530bc6
Merge pull request #249521 from Kranzes/oauth2-proxy
nixos/oauth2_proxy: service after network.target -> network-online.target
2023-08-17 03:16:10 +03:00
github-actions[bot] 43454c8a64
Merge master into staging-next 2023-08-17 00:01:52 +00:00
Freakmiko 66469836be Fix Lemmy Caddy config static path handling
Due to lemmy-ui using a sub-path for the static files, the original static path handling was not sufficient
2023-08-17 04:19:48 +08:00
github-actions[bot] 583df4e091
Merge master into staging-next 2023-08-16 18:01:01 +00:00
Doron Behar 62730f2c31
Merge pull request #248701 from doronbehar/nixos/manpages
nixos/install-tools: Add manpages to packages instead of seperating them
2023-08-16 15:49:49 +00:00
Martin Weinelt e57875a2c4
Merge pull request #248409 from CobaltCause/conduit-0.6.0
matrix-conduit: 0.5.0 -> 0.6.0
2023-08-16 16:30:08 +02:00
K900 200eeb9ebe
Merge pull request #249101 from motiejus/headscale-oidc
headscale.oidc: client_secret_path is a string
2023-08-16 17:23:56 +03:00
Maciej Krüger 56700d64b1
Merge pull request #226821 from enc0urage/memtest 2023-08-16 15:31:32 +02:00
Nick Cao 2dadab4889
Merge pull request #249211 from oddlama/feat-influxdb-provision
nixos/influxdb2: automatic initial setup and nixos tests
2023-08-16 21:29:16 +08:00
oddlama b4d718f14a
nixos/influxdb2: add initial setup automation and nixos tests 2023-08-16 14:31:49 +02:00
github-actions[bot] d99b92b3f7
Merge master into staging-next 2023-08-16 12:01:02 +00:00
Janne Heß bc9b484db8
Merge pull request #232230 from oddlama/fix-activation-template-unit-specializations
Fix detection of changed template unit specializations in switch-to-configuration.pl
2023-08-16 13:46:45 +02:00
Ilan Joselevich 0a732d2adf
nixos/oauth2_proxy: service after network.target -> network-online.target 2023-08-16 14:40:33 +03:00
Robert Obryk ff204ca32b nixos/security/wrappers: remove all the assertions about readlink(/proc/self/exe)
Given that we are no longer inspecting the target of the /proc/self/exe
symlink, stop asserting that it has any properties. Remove the plumbing
for wrappersDir, which is no longer used.

Asserting that the binary is located in the specific place is no longer
necessary, because we don't rely on that location being writable only by
privileged entities (we used to rely on that when assuming that
readlink(/proc/self/exe) will continue to point at us and when assuming
that the `.real` file can be trusted).

Assertions about lack of write bits on the file were
IMO meaningless since inception: ignoring the Linux's refusal to honor
S[UG]ID bits on files-writeable-by-others, if someone could have
modified the wrapper in a way that preserved the capability or S?ID
bits, they could just remove this check.

Assertions about effective UID were IMO just harmful: if we were
executed without elevation, the caller would expect the result that
would cause in a wrapperless distro: the targets gets executed without
elevation. Due to lack of elevation, that cannot be used to abuse
privileges that the elevation would give.

This change partially fixes #98863 for S[UG]ID wrappers. The issue for
capability wrappers remains.
2023-08-16 11:33:22 +02:00
Robert Obryk 11ca4dcbb8 nixos/security/wrappers: read capabilities off /proc/self/exe directly
/proc/self/exe is a "fake" symlink. When it's opened, it always opens
the actual file that was execve()d in this process, even if the file was
deleted or renamed; if the file is no longer accessible from the current
chroot/mount namespace it will at the very worst fail and never open the
wrong file. Thus, we can make a much simpler argument that we're reading
capabilities off the correct file after this change (and that argument
doesn't rely on things such as protected_hardlinks being enabled, or no
users being able to write to /run/wrappers, or the verification that the
path readlink returns starts with /run/wrappers/).
2023-08-16 11:33:22 +02:00
Robert Obryk ec36e0218f nixos/security/wrappers: stop using .real files
Before this change it was crucial that nonprivileged users are unable to
create hardlinks to SUID wrappers, lest they be able to provide a
different `.real` file alongside. That was ensured by not providing a
location writable to them in the /run/wrappers tmpfs, (unless
disabled) by the fs.protected_hardlinks=1 sysctl, and by the explicit
own-path check in the wrapper. After this change, ensuring
that property is no longer important, and the check is most likely
redundant.

The simplification of expectations of the wrapper will make it
easier to remove some of the assertions in the wrapper (which currently
cause the wrapper to fail in no_new_privs environments, instead of
executing the target with non-elevated privileges).

Note that wrappers had to be copied (not symlinked) into /run/wrappers
due to the SUID/capability bits, and they couldn't be hard/softlinks of
each other due to those bits potentially differing. Thus, this change
doesn't increase the amount of memory used by /run/wrappers.
2023-08-16 11:33:22 +02:00
WilliButz da5c3bde30
Merge pull request #248405 from fpletz/pkgs/mediamtx-1.0.0
mediamtx: 0.23.8 -> 1.0.0, refactor module, add test
2023-08-16 11:30:18 +02:00
Lin Jian 1c704628dc
nixos/environment: stop setting ASPELL_CONF
We set[1] ASPELL_CONF to the last nix profile containing lib/aspell in
2013.  In 2017, aspell is patched[2] to search NIX_PROFILES, which
makes [1] not needed any more.

Deleting it is also agreed in this discussion[3].

[1]: 0192c02720
[2]: ba4cefe4ae
[3]: https://github.com/NixOS/nixpkgs/pull/30234
2023-08-16 09:18:45 +08:00
Jason Tarasovic fb59bf8a6d
systemd-networkd: add option to assign ipv6 prefix 2023-08-15 17:47:51 -05:00
Jason Tarasovic 521944571a
systemd-networkd: add dhcpv6Config options 2023-08-15 15:23:57 -05:00
Jan Tojnar 86f6b16d28 Merge branch 'master' into staging-next
Conflicts:
- pkgs/servers/mail/mailman/python.nix (relevant to mailman-web)
  between f8a17e4200 and 84f6a6755a
2023-08-15 21:39:20 +02:00
Pol Dellaiera 11f3cbc0c3
Merge pull request #246181 from jvanbruegge/haproxy-package
nixos/haproxy: allow to specify haproxy package
2023-08-15 19:46:13 +02:00
Silvan Mosberger be9b7ddbdc
Merge pull request #246447 from 999eagle/update/invidious
invidious: unstable-2023-06-06 -> unstable-2023-08-07
2023-08-15 14:05:19 +02:00
Kevin Cox 86c67a1f11
nixos.photoprism: Relax sandbox to allow running exiftool
exiftool is written in Perl which appears to call `chown` as part of startup. This is blocked by the `@privileged` system call group. This causes a failure when changing image orientation.

Fixes: https://github.com/NixOS/nixpkgs/issues/249120
2023-08-15 07:58:42 -04:00
Jan van Brügge 90da2c1223
nixos/haproxy: allow to specify haproxy package 2023-08-15 12:24:55 +01:00
linsui 0e6827ed9c nixos/gdm: switch to dconf settings 2023-08-15 19:20:39 +08:00
linsui 038d78d4ce nixos/dconf: add locks support 2023-08-15 19:20:39 +08:00
linsui fb52d5df86 nixos/dconf: add settings support 2023-08-15 19:20:39 +08:00
linsui cce75fa51e nixos/dconf: refractor
remove `with lib;`
profiles option now accepts packages in addition to paths.
profiles option is no longer internal.
cfgDir definition has been inlined.
pulled GIO_EXTRA_MODULES inside mkif.
removed pointless comments with section headings.
defined profiles are now turned into package, allowing to simplify the db update logic.
2023-08-15 19:20:39 +08:00
Kerstin f65301cdd3
Merge pull request #219700 from h7x4/kanidm-add-package-option
nixos/kanidm: add package option
2023-08-15 12:06:11 +02:00
Michele Guerini Rocco e7a57d07a8
Merge pull request #248390 from sersorrel/picom-package
nixos/picom: add `package` option
2023-08-15 11:05:35 +02:00
Sophie Tauchert 1a3b7f61b2
nixos/invidious: generate hmac_key automatically
This change also generates the invidious config by putting JSON
snippets into a bash array and then using jq to merge them all into
a single configuration where later elements override previous
elements.
2023-08-15 10:48:30 +02:00
h7x4 655a04a8fa
nixos/kanidm: add package option
Signed-off-by: h7x4 <h7x4@nani.wtf>
2023-08-15 10:05:44 +02:00
github-actions[bot] df770ba961
Merge master into staging-next 2023-08-15 06:01:24 +00:00
Nick Cao 2af24d4417
nixos/fcitx5: fix evaluation 2023-08-15 08:15:41 +08:00
github-actions[bot] 674c2b1920
Merge master into staging-next 2023-08-14 18:01:03 +00:00
Maximilian Bosch a471325eaf
Merge pull request #221318 from mweinelt/synapse-extras
nixos/matrix-synapse: Allow passing extras, discover extras from config
2023-08-14 18:43:05 +02:00
Maximilian Bosch 10c6be32e4
nixos/tempo: add extraFlags option
Main use-case for me is to specify `-config.expand-env=true` which
allows me inject secrets via systemd's environment file mechanism[1]
like this:

    storage.trace.s3 = {
      /* all the other stuff */
      secret_key = "\${GARAGE_SECRET_KEY}";
    };

[1] https://grafana.com/docs/tempo/latest/configuration/#use-environment-variables-in-the-configuration
2023-08-14 18:07:24 +02:00
github-actions[bot] af70853335
Merge master into staging-next 2023-08-14 12:01:04 +00:00
Motiejus Jakštys 28cf78b857 headscale.oidc: client_secret_path is a string
It can be include an environment-variable, like
`${CREDENTIALS_DIRECTORY}/some-path`, failing validation for
`types.path`.
2023-08-14 13:03:06 +03:00
linsui 30bb15152e nixos/fcitx5: add settings 2023-08-14 16:25:17 +08:00
Ilan Joselevich e0fad0515b
nixos/picom: use lib.getExe
Co-authored-by: Jian Lin <75130626+jian-lin@users.noreply.github.com>
2023-08-14 11:19:41 +03:00
Ilan Joselevich 94a3092895
nixos/picom: mkPackageOption -> mkPackageOptionMD 2023-08-14 11:18:06 +03:00
Enno Richter 3f52185de8 boot.initrd.systemd: make TPM2 modules optional 2023-08-14 09:34:29 +02:00
github-actions[bot] b782e1dc08
Merge master into staging-next 2023-08-14 06:00:58 +00:00
enc0urage 00d7065913 nixos/systemd-boot: Replace proprietary memtest86 with free memtest86+ in UEFI 2023-08-14 03:05:24 +00:00
Bobby Rong 85efefd8f4
Merge pull request #248544 from bobby285271/rm/qgnomeplatform
nixos/pantheon, nixos/cinnamon: Drop qgnomeplatform
2023-08-14 10:49:10 +08:00
github-actions[bot] 667a7541cd
Merge master into staging-next 2023-08-14 00:01:53 +00:00
LёNya 54f5045571 nixos/zoneminder: replace lib.optional with lib.optionals to make module work 2023-08-13 22:32:42 +03:00
github-actions[bot] 12e030d6da
Merge master into staging-next 2023-08-13 18:00:59 +00:00
h7x4 8981783b60
services/prometheus/exporters: add mysqld
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2023-08-13 19:46:30 +02:00
Bernardo Meurer 70dd76d94f
Merge pull request #247475 from qowoz/nix217 2023-08-13 13:27:20 -04:00
Fugi 5e75b36302
nixos/prometheus-sabnzbd-exporter: init 2023-08-13 16:31:52 +02:00
Jonas Heinrich c5f4a46036 nixos/opensnitch: Add support for EPBF process monitor
Co-authored-by: Slime90
2023-08-13 22:19:48 +08:00
Atemu 7706f570a7 dnscrypt-proxy: rename from dnscrypt-proxy2
An alias is added for dnscrypt-proxy2
2023-08-13 16:03:31 +02:00
Janne Heß d995da11d8
nixos/switch-to-configuration: Fix unit location in toplevel 2023-08-13 14:26:30 +02:00
enc0urage 1488a2bc1a nixos/grub: Replace proprietary memtest86 with free memtest86+ in UEFI mode 2023-08-13 12:04:34 +00:00
github-actions[bot] 0ee8715a0d
Merge master into staging-next 2023-08-13 12:00:52 +00:00
happysalada 4022b2733a nixos/rustus: add user name to enable restoring of backups 2023-08-13 12:59:20 +01:00
Jörg Thalheim 38b2c039bd gitea-actions-runner: restart on failure 2023-08-13 12:54:15 +01:00
DavHau 3d58bac73b services.gitea-actions-runner: make ExecStartPre extensible 2023-08-13 12:54:15 +01:00
Jörg Thalheim 7ad7e99370 nixos/gitea-actions-runner: settings option to configure daemon 2023-08-13 12:54:15 +01:00
Nick Cao 0814089e05
nixos/zram: use nixos/zram-generator as backing implementation 2023-08-13 15:38:40 +08:00
Nick Cao a7e095d9fd
nixos/zram-generator: init 2023-08-13 15:36:23 +08:00
github-actions[bot] f5eb026a2a
Merge master into staging-next 2023-08-13 06:00:52 +00:00
Nick Cao 722e1e2313
Merge pull request #247899 from DavHau/zerotier-docs
nixos/zerotierone: document networks never left automatically
2023-08-13 00:00:35 -06:00
Bobby Rong ddd4973ddb
nixos/cinnamon: Drop qgnomeplatform
The upstream is not maintained, and qadwaitadecoration
does not seem to be xorg-related. We should have proper
shadows when using SSD.
2023-08-13 12:21:54 +08:00
Bobby Rong f4e1e8627d
nixos/pantheon: Drop qgnomeplatform
The upstream is not maintained, and qadwaitadecoration
does not seem to be xorg-related. We should have proper
shadows when using SSD.
2023-08-13 12:21:54 +08:00
Samuel Dionne-Riel f064a5bcc2
Merge pull request #220263 from samueldr/feature/misc-grub-fixes
nixos/grub: Fixes to allow flicker-free boot, themes and bug fixes
2023-08-12 20:32:51 -04:00
Doron Behar 924a07dc22 nixos/doc: Improve documentation of documentation
- Move contents of README.md from
  nixos/modules/installer/tools/manpages/ to
  nixos/doc/manual/contributing-to-this-manual.chapter.md.
- Don't mention DocBook as its obsolete and too specific.
- Rename derivation attribute name of configuration.nix(5) manual page,
  both on the `contributing-to-this-manual.chapter.md`, and in other
  places.
2023-08-12 22:28:04 +03:00
github-actions[bot] 1c639fb6fb
Merge master into staging-next 2023-08-12 18:00:55 +00:00
Acid Bong c76bb0d58e
nixos/zsh: add enableLsColors
Borrowed from nixos/bash/ls-colors module
2023-08-12 20:53:05 +03:00
Jan Tojnar 08d242047c iso_gnome: Fix evaluation
`qt.enable` option requires `qt.style` to be set.
Previously, this was set in GNOME module but it has been removed
in 622745942b
2023-08-12 19:30:49 +02:00
Doron Behar 32f75a0f2a nixos/install-tools: Add manpages to packages instead of seperating them
Since each such `nixos-*` tool has it's own derivation, exposed in pkgs,
There is no point in separating the manuals from the packages. If
someone wishes to have the tools without the manuals, they can use
meta.outputsToInstall to disable the installation of the manpages of
these packages. This Fixes #244450.
2023-08-12 18:01:06 +03:00
Maximilian Bosch 66ab687151
Merge pull request #248131 from Ma27/captive-browser-setcap
nixos/captive-browser: drop setcap wrapper for captive-browser
2023-08-12 14:52:38 +02:00
github-actions[bot] 9f3079a7c3
Merge master into staging-next 2023-08-12 12:01:01 +00:00
Ilan Joselevich 2393e099a6
Merge pull request #247008 from fufexan/hyprland
Update hyprwm packages and nixos/hyprland
2023-08-12 14:55:29 +03:00
Franz Pletz b6fb9b86a4
Merge pull request #248586 from oddlama/fix-hostapd-pwfile
nixos/hostapd: add missing stringification of path in INI format
2023-08-12 10:55:47 +02:00
Jan Tojnar 622745942b nixos/gnome: Do not force Qt apps to Adwaita
adwaita-qt tries valiantly to ensure a visual consistency
but unfortunately, it often falls into an uncanny valley instead.
Let’s make it opt-in again for more vanilla default experience.

Related: https://pagure.io/fedora-workstation/issue/351
2023-08-12 10:29:34 +02:00
Franz Pletz 5522989d34
Merge pull request #248521 from ehmry/liquidsoap
nixos/liquidsoap: restart always
2023-08-12 10:21:35 +02:00
edef 8131fc5ee6 nixos/gnupg: require sockets.target, not just gpg-agent.socket
If other sockets are enabled, such as gpg-agent-browser.socket,
those should be started before gpg-agent.service as well.

Change-Id: I29d3f4b19db9e687425b594dcef863a88ec296c9
2023-08-12 03:19:10 +00:00
oddlama bbac87a2dd
nixos/hostapd: add missing stringification of path in INI format 2023-08-11 22:44:08 +02:00
ash 05245fc0ea nixos/picom: add package option 2023-08-11 17:00:36 +01:00
Emery Hemingway 248c8c7812 nixos/liquidsoap: restart always 2023-08-11 12:51:27 +01:00
Evgeny Kurnevsky 5110d348b2
wstunnel: correct listen option 2023-08-11 11:58:40 +03:00
James Baker 09d32e2612
nixos/virtualisation.docker: Do not assert 32 bit libraries available on ARM (#246179) 2023-08-11 10:49:25 +02:00
Charles Hall 02fd938fb7
nixos/conduit: disable update checks by default 2023-08-10 23:16:19 -07:00
Franz Pletz cb6dd866f2
Merge pull request #241338 from bachp/minio-distributed 2023-08-11 05:33:44 +02:00
Franz Pletz 68e658f7fc
Merge pull request #248446 from aanderse/pam_mkhomedir 2023-08-11 04:52:12 +02:00
Mario Rodas d8001aae54
Merge pull request #242116 from flurie/fix-datadog-agent
datadog-agent: 7.38.1 -> 7.45.1
2023-08-10 20:53:27 -05:00
Nick Cao 8efe50b161
Merge pull request #248343 from CnTeng/master
nixos/dae: use network-online
2023-08-10 19:37:36 -06:00
Aaron Andersen 9d56365451 security/pam: add umask option to configure pam_mkhomedir 2023-08-10 20:35:08 -04:00
Franz Pletz 362810eabe
nixos/mediamtx: refactor
* log settings are defaults
* log directory won't generally be used
* remove ffmpeg from path, encourage the use of store paths in settings
2023-08-10 20:16:11 +02:00
Franz Pletz 9c85697da8
Merge pull request #244060 from Gerg-L/nvidiaDynamicBoost
nixos/nvidia: clean up and add dynamic boost
2023-08-10 17:02:26 +02:00
CnTeng 24f2116a7a nixos/dae: use network-online 2023-08-10 20:23:46 +08:00
Artturi 2ed985dd37
Merge pull request #248017 from Artturin/fishcrossfix 2023-08-10 15:18:21 +03:00
Maximilian Bosch 183be440fd
nixos/captive-browser: drop setcap wrapper for captive-browser
Since Linux 5.7 it's possible to set `SO_BINDTODEVICE` via `setsockopt(2)`
as unprivileged user if this operation doesn't imply escaping a VRF
interface[1].

Dropping the wrapper is actually desirable because `captive-browser`
itself doesn't drop capabilities and as a result, the capabilities are
passed on to `chromium` itself[2].

For older kernels, this is still necessary, hence the wrapper will only
be added nowadays if the kernel is older than 5.7.

[1] c427bfec18
[2] 08450562e5/bind_device_linux.go (L11-L14)
    and because our setcap wrapper makes all capabilities
    inheritable.
2023-08-10 14:06:38 +02:00
Maximilian Bosch 1ab411fcd4
Merge pull request #247386 from montchr/docs-matrix-synapse
nixos/matrix-synapse: set public baseurl in example config
2023-08-10 12:52:34 +02:00
Ryan Lahfa afa8d16f74
Merge pull request #247102 from yaxitech/image-repart-package-option 2023-08-10 11:55:01 +02:00
Ryan Lahfa ec409e6f79
Merge pull request #231673 from symphorien/suid_wrappers_userns 2023-08-10 11:52:59 +02:00
Franz Pletz c13c1412bf
nixos/chrony: add enableMemoryLocking option
Fixes #222629.
2023-08-10 03:03:53 +02:00
Franz Pletz cef068f3b3
Revert "nixos/malloc: add back maybe unnecessary line"
This reverts commit ed55524562.

Does not evaluate.
2023-08-10 03:02:39 +02:00
Franz Pletz 8e372c19d1
Merge pull request #245286 from codec/add-prometheus-idrac-exporter
prometheus-idrac-exporter: init at unstable-2023-06-29
2023-08-10 00:58:03 +02:00
Robert Hensing ea6e5c0730
Merge pull request #246775 from yaxitech/no-kernel-params-wo-kernel
nixos/toplevel: only pass `kernelParams` if `boot.kernel.enable`
2023-08-09 15:14:13 +02:00
Franz Pletz dcafb07ed8
Merge pull request #232250 from YBeaugnon/libvirt-hooks
nixos/libvirtd: hooks support
2023-08-09 15:07:52 +02:00
Franz Pletz b15eff32c4
Merge pull request #248126 from DDoSolitary/patch-netdata-ipc
nixos/netdata: fix position of NETDATA_PIPENAME
2023-08-09 14:42:55 +02:00
Guillaume Girol 0e4b8a05b2 nixos/wrappers: allow setuid and setgid wrappers to run in user namespaces
In user namespaces where an unprivileged user is mapped as root and root
is unmapped, setuid bits have no effect. However setuid root
executables like mount are still usable *in the namespace* as the user
already has the required privileges. This commit detects the situation
where the wrapper gained no privileges that the parent process did not
already have and in this case does less sanity checking. In short there
is no need to be picky since the parent already can execute the foo.real
executable themselves.

Details:
man 7 user_namespaces:
   Set-user-ID and set-group-ID programs
       When a process inside a user namespace executes a set-user-ID
       (set-group-ID) program, the process's effective user (group) ID
       inside the namespace is changed to whatever value is mapped for
       the user (group) ID of the file.  However, if either the user or
       the group ID of the file has no mapping inside the namespace, the
       set-user-ID (set-group-ID) bit is silently ignored: the new
       program is executed, but the process's effective user (group) ID
       is left unchanged.  (This mirrors the semantics of executing a
       set-user-ID or set-group-ID program that resides on a filesystem
       that was mounted with the MS_NOSUID flag, as described in
       mount(2).)

The effect of the setuid bit is that the real user id is preserved and
the effective and set user ids are changed to the owner of the wrapper.
We detect that no privilege was gained by checking that euid == suid
== ruid. In this case we stop checking that euid == owner of the
wrapper file.

As a reminder here are the values of euid, ruid, suid, stat.st_uid and
stat.st_mode & S_ISUID in various cases when running a setuid 42 executable as user 1000:

Normal case:
ruid=1000 euid=42 suid=42
setuid=2048, st_uid=42

nosuid mount:
ruid=1000 euid=1000 suid=1000
setuid=2048, st_uid=42

inside unshare -rm:
ruid=0 euid=0 suid=0
setuid=2048, st_uid=65534

inside unshare -rm, on a suid mount:
ruid=0 euid=0 suid=0
setuid=2048, st_uid=65534
2023-08-09 12:00:00 +00:00
DDoSolitary d410464c5d
nixos/netdata: fix position of NETDATA_PIPENAME
It was accidentally placed in a condition-guarded block, making the
setting only take effect when enableAnalyticsReporting = false.
2023-08-09 19:22:20 +08:00
Florian Praden 490ec79ac3
nixos/gitea: bugfix for gitea-dump service.
Missing custom directory setup in gitea-dump service. Adding environment variable in gitea-dump service definition.
2023-08-09 11:53:18 +02:00
Artturin ea580ebee8 nixos/fish: Fix completion generator cross-compilation 2023-08-08 23:21:38 +03:00
Mihai Fufezan 50ad802e51
nixos/hyprland: remove xwayland.hidpi 2023-08-08 20:32:53 +03:00
K900 b0b00f0e28
Merge pull request #247937 from linj-fork/fix-types.string
treewide: stop using types.string
2023-08-08 18:50:42 +03:00
WilliButz acbf16d419
Merge pull request #247709 from Ma27/nextcloud-adminuser-doc-fix
nixos/nextcloud: improve documentation of `adminuser`-option
2023-08-08 16:29:59 +02:00
Lin Jian 74fadae942
treewide: stop using types.string
It is an error[1] now.

[1]: https://github.com/NixOS/nixpkgs/pull/247848
2023-08-08 21:31:21 +08:00
DavHau 74c574a8db nixos/zerotierone: document networks never left automatically
Removing a network from the joinNetworks list does not make the machine leave the network which is confusing.

This behavior is now clarified via the options description
2023-08-08 11:31:33 +02:00
Michele Guerini Rocco ccc33bd3d7
Merge pull request #245852 from rnhmjoj/pr-fix-dnscrypt
dnscrypt-wrapper fixes
2023-08-08 10:34:27 +02:00
Lassulus e63386d6bf
Merge pull request #247751 from Mic92/installation-device-trusted-users
nixos/installation-device: allow nix-copy for root/nixos user
2023-08-08 08:23:59 +02:00
Franz Pletz 9640eb3970
Merge pull request #246029 from ehmry/eris-go 2023-08-08 06:18:03 +02:00
Pol Dellaiera ef02511ff4
Merge pull request #247358 from pokon548/dae-add-service
nixos/dae: init
2023-08-07 21:11:43 +02:00
Isa bd50b5fcf5 graylog-5_1: init at 5.1.4 2023-08-07 19:49:48 +02:00
Lily Foster b367b9cf87
Merge pull request #241565 from SuperSandro2000/nox-python
nixos/no-x-libs: use pythonPackagesExtensions to construct python ove…
2023-08-07 10:56:27 -04:00
Jörg Thalheim 1f1a758e95 nixos/installation-device: allow nix-copy for root/nixos user
For non-interactive installation it's quite handy to be able to nix copy additional dependencies to the system.
While this is possible for the root user, we cannot easily ssh into it, as we don't allow root login with a password.
By making nixos a trusted user, we can do "passwd && sudo systemctl start sshd" and than run nixos-anywhere
2023-08-07 16:48:49 +02:00
Maximilian Bosch 648546b09d
nixos/nextcloud: improve documentation of adminuser-option
This option only has an effect on the initial setup of Nextcloud and
changes later won't have any effect.

Same issue as with `adminpassFile` - it's only passed to the installer
command - but even worse because the username is frequently used as
unique ID in the database, so there's no trivial way to change it, even
imperatively.
2023-08-07 12:16:41 +02:00
pokon548 dcf5ae3d0b nixos/dae: init 2023-08-07 14:32:32 +08:00
Wout Mertens ea07a9a98e
Merge pull request #247319 from DDoSolitary/patch-netdata-ipc
netdata: set NETDATA_PIPENAME to /run/netdata/ipc
2023-08-07 08:27:29 +02:00
Martin Weinelt af90462b88
Merge pull request #247235 from mweinelt/wyoming-faster-whisper-option-fix
nixos/wyoming/faster-whisper: fix device option description
2023-08-06 22:04:42 +02:00
K900 4a2735bb3d
Merge pull request #241481 from Mayeu/update/kubo
kubo: 0.20.0 -> 0.21.0
2023-08-06 20:03:37 +03:00
emilylange 8d374cebcd
nixos/forgejo: init
Following a decicion from both the gitea and forgejo maintainers in
nixpkgs.
This means, that forgejo will no longer co-use the nixos/gitea module
via `services.gitea.package = pkgs.forgejo`.
2023-08-06 18:40:02 +02:00
Maximilian Bosch 01820d520b
Merge pull request #247384 from jtbx/nextcloud-doc
nixos/nextcloud: improve documentation
2023-08-06 12:27:33 +02:00
Nick Cao 90c77d8891
Merge pull request #246842 from frederictobiasc/mautrix-whatsapp-module
nixos/mautrix-whatsapp: init
2023-08-06 03:21:25 -06:00
Frédéric Christ 3a1f5757b9 mautrix-whatsapp: move defaults back to options.
As suggested by @nickcao this commit moves the defaults back to the
options. Only `homeserver.domain` stays in the config section since the
documentation module does not support referencing attributes of other
modules.
2023-08-06 11:03:17 +02:00
zowoq b2c3198256 nixos/nix-fallback-paths: 2.15.1 -> 2.17.0
https://releases.nixos.org/nix/nix-2.17.0/fallback-paths.nix
2023-08-06 16:22:39 +10:00
davidak 62f11e9e1d
Merge pull request #246187 from SuperSamus/hid-nintendo-remove
hid-nintendo: remove
2023-08-06 04:07:11 +02:00
Tom McLaughlin addfb000c4 tmux: add extraConfigBeforePlugins 2023-08-05 18:59:52 -07:00
Jeremy c7a9f7c132 nixos/nextcloud: improve documentation 2023-08-06 10:02:52 +12:00
Chris Montgomery aefa0bb6cc
nixos/matrix-synapse: set public baseurl in example config 2023-08-05 16:08:35 -04:00
Gregor Godbersen 3d9a6399a1 nixos/paperless: set default thumbnail font
The upstream default for the thumbnail font is set to "Liberation Serif
Regular" located at /usr/share/fonts which is inaccessible under nix.
(2a2bf3bf55/src/paperless/settings.py (L894))

Paperless throws an error when parsing plaintext files without a valid
font. This change sets a nix default using the liberation_ttf package.
2023-08-05 22:06:27 +02:00
WilliButz 404abaa27a
Merge pull request #247314 from Ma27/nextcloud-php-settings
nixos/nextcloud: make php settings additive
2023-08-05 14:12:52 +02:00
Frédéric Christ 288d2ee55d mautrix-whatsapp: Move defaults to config section
This contribution applies Example 32 (conventional settings option) from
[nixpkgs](https://nixos.org/manual/nixos/stable/#sec-settings-nix-representable).
2023-08-05 13:57:15 +02:00
DDoSolitary 060a47e1e4
netdata: set NETDATA_PIPENAME to /run/netdata/ipc
Netdata creates its control socket at /tmp/netdata-ipc by default, which
is insecure and actually inaccessible with systemd's PrivateTmp enabled.

Originally we patched its source code to move the socket to
/run/netdata/ipc. However, it was removed due to incompatibility when
upgrading to v1.41.0: 1d2a2dc7d0

Fortunately, this new version of netdata adds support for setting the
location of the control socket via the environment variable
NETDATA_PIPENAME. So let's set it for the netdata service and the
command line utility so that they can communicate properly.
2023-08-05 18:19:08 +08:00
Maximilian Bosch 2ddb1453e6
nixos/nextcloud: make php settings additive
Right now, the settings aren't additive which means that when I do

    services.nextcloud.phpOptions."opcache.interned_strings_buffer = "23";

all other options are discarded because of how the module system works.

This isn't very nice in this case, though because wanting to override
a single option doesn't mean I want to discard the rest of the -
reasonable - defaults. Hence, the settings are showed as default in the
option's manual section, but are added with normal priority.

That means, to override _all_ options at once, an expression like

    services.nextcloud.phpOptions = mkForce {
      /* ... */
    };

is needed. This is also way more intuitive IMHO because the `mkForce`
explicitly tells that everything will be modified.

Also, APCu enable and the memory & file-size limits are also written
into `services.nextcloud.phpOptions` rather than adding them
silently before passing all options to the PHP package. This has the
benefit that users will realize on evaluation time that they configured
options that would otherwise be set by the module on its own.
2023-08-05 11:58:11 +02:00
Emery Hemingway b6c5112152 nixos/ntopng: seperate interface config with newlines 2023-08-05 10:02:48 +01:00
Martin Weinelt 12cb284a44
nixos/wyoming/faster-whisper: fix device option description 2023-08-05 00:24:26 +02:00
Artturin 103bb49f84 nixos/stage-2-init: Change permission of /etc/nixos only if it exists
When I boot there's a warning `stage-2-init: install: cannot change permissions of '/etc/nixos': No such file or directory`
because my /etc/nixos is a symlink to $HOME/dotfiles.

```
/etc/nixos -> /home/artturin/dotfiles
```

These lines were added in 56b4653904
2023-08-04 20:54:18 +03:00
Maximilian Bosch ed02e79bbe
Merge pull request #241497 from bendlas/prepare-gitea-120
nixos/gitea: add WORK_PATH to config, fix 1.20
2023-08-04 18:50:09 +02:00
Vincent Haupert f652755434 nixos/image: add image.repart.package option
Allow giving a custom package containing the `systemd-repart` binary.
Defaults to `pkgs.systemd`. This option opens up the possibility to use
a different package for the image builder and the system configuration.

For example, someone could use this option to build an image with a
patched systemd while still using the upstream nixpkgs systemd package
(i.e., `pkgs.systemd`) for the system configuration installed to the
created image.
2023-08-04 13:49:18 +02:00
ajs124 bf4d2e6c1e
Merge pull request #242538 from tnias/fix/apparmor
apparmor: add some policies and improve abstractions and utils
2023-08-04 13:05:52 +02:00
Vincent Haupert fbebce610f nixos/toplevel: move systemBuilder for boot.kernel.enable
This avoids creating a build-time reference on `boot.kernelParams` if
the configuration does not use a kernel, i.e., `boot.kernel.enable` is
set to `false`.
2023-08-04 12:46:03 +02:00
codec 47db2bfffb prometheus-idrac-exporter: init at unstable-2023-06-29 2023-08-04 00:57:19 +02:00
Ryan Lahfa 2a1f1797be
Merge pull request #246941 from yaxitech/image-amend-repart-r13y 2023-08-03 15:57:24 +02:00
Gerg-L 4ca2a16390 nixos/nvidia: add Dynamic Boost support 2023-08-03 09:32:14 -04:00
Martin Weinelt 667c4f2dc6
Merge pull request #224635 from helsinki-systems/drop/dhcpd
dhcpd: remove
2023-08-03 15:12:06 +02:00
ajs124 4b0ef51702
Merge pull request #245891 from Izorkin/fix-nginx-http2
nixos/nginx: using new variant of http2 directive
2023-08-03 14:50:31 +02:00
Martin Weinelt 9eaec2881f
Merge pull request #246836 from NixOS/home-assistant
home-assistant: 2023.7.3 -> 2023.8.0
2023-08-03 13:54:00 +02:00
Vincent Haupert 5fd478506d nixos/image: use stable target dir for amended repart definitions
Output the amended repart definitions to a well-known directory in
$TMPDIR instead of using a temporary directory with a random directory
name.

The output file `repart-output.json` also contains the full path to the
repart definition file used to create the partition. As
`amend-repart-definitions.py` uses `tempfile.mkdtemp`, this introduces
an impurity:

```json
{
        "type" : "root-x86-64",
        "label" : "rootfs",
        "uuid" : "f2fa2e49-e443-45d2-a2e2-c3754cab6363",
        "file" : "/build/tmppjo7kv5o/rootfs.conf",
        "node" : "image.raw2",
        "offset" : 135266304,
        "old_size" : 0,
        "raw_size" : 1651101696,
        "old_padding" : 0,
        "raw_padding" : 0,
        "activity" : "create",
}
```

This commit changes the parent directory of the amended repart
definitions to `/build/amended-repart.d/`.
2023-08-03 11:46:35 +02:00
Izorkin cf7cea3287
nixos/nginx: using new variant of http2 directive 2023-08-03 07:09:02 +03:00
Pol Dellaiera b3e46b47d9
Merge pull request #246845 from jakeschurch/add-proxmox-image-disk-size-followup
update(proxmox-image): update pull request #246120 from jakeschurch/add-prox…
2023-08-02 22:55:40 +02:00
Martin Weinelt a98ba7fdae
Merge pull request #246564 from erictapen/kanidm
kanidm: 1.1.0-alpha.12 -> 1.1.0-beta.13
2023-08-02 22:51:18 +02:00
Martin Weinelt 822c33c217
nixos/home-assistant: allow bluetooth for gardena_bluetooth component 2023-08-02 22:42:50 +02:00
Frédéric Christ a71889c042 mautrix-whatsapp: Add release notes 2023-08-02 21:38:12 +02:00
Frédéric Christ 0173330426 mautrix-whatsapp: Add postgres options to example 2023-08-02 21:32:55 +02:00
Frédéric Christ b443a4d940 mautrix-whatsapp: Apply suggestions
This contribution applies suggestions made by Luflosi in
https://github.com/NixOS/nixpkgs/pull/176025#issuecomment-1237338551
as well as some general refactoring.

Co-authored-by: Luflosi <Luflosi@users.noreply.github.com>
2023-08-02 21:06:41 +02:00
Victor SENE 641d717ace nixos/mautrix-whatsapp: init module
Import from PR https://github.com/NixOS/nixpkgs/pull/176025

Co-authored-by: Luflosi <Luflosi@users.noreply.github.com>
2023-08-02 21:06:41 +02:00
Jake Schurch 36430fbb14 revert(proxmox-image): pull request #246120 from jakeschurch/add-proxmox-image-addl-disk-size-override
NOTES:

@jakeschurch did not realize that is was already updated on master, but not
backported to 23.05 channel

Signed-off-by: Jake Schurch <jakeschurch@gmail.com>
2023-08-02 15:01:44 -04:00
Robert Hensing f8f9f13d57
Merge pull request #246386 from hercules-ci/lib-getExe-dont-make-name-assumption
lib.getExe: Do not make assumptions about the main program
2023-08-02 20:05:52 +02:00
Pol Dellaiera 17b46c61f3
Merge pull request #246746 from mode89/fix/nixos-install-with-non-empty-mnt
nixos-install: fix removal of non-empty `/mnt`
2023-08-02 18:41:46 +02:00
Ryan Lahfa 9616fc4149
Merge pull request #246603 from yaxitech/image-repart-output-json 2023-08-02 17:01:27 +02:00
r-vdp 44a7059bf2
nixos/update-users-groups: set expiry correctly for new users 2023-08-02 13:51:41 +02:00
Andrey Krainyak d61cc625fa
nixos-install: fix removal of non-empty /mnt
After building the target system, `nixos-install` tries to remove `/mnt`
on the target filesystem. And the script may fail without any explanation,
if `/mnt` isn't empty.

This commit makes the installation process carry on even if there are
files under `/mnt`.

See https://github.com/NixOS/nixpkgs/issues/244643.
2023-08-02 16:37:22 +08:00
Ember Keske c247201679 grocy: 3.3.0 -> 4.0.0 2023-08-02 06:44:36 +02:00
Samuel Dionne-Riel 1d416595ad nixos/grub: Remove with with broad scopes.
There is only other `with` with a somewhat broad scope, `with pkgs`, but
it's used in a place where it would become awkward to change out. And
anyway its scope is rather limited still.
2023-08-01 19:18:48 -04:00
Samuel Dionne-Riel c867c6d172 nixos/grub: Insert required image modules for themes
With a limited testing of all packaged GRUB 2 themes (pkgs.nixos-grub2-theme)
this is tested to work.

Without this change, the theme loading will error out (waiting for a key press).

With this change, the theme loads and works as expected.
2023-08-01 18:56:03 -04:00
Samuel Dionne-Riel 50063bf9d6 nixos/grub: Add support for timeoutStyle 2023-08-01 18:56:03 -04:00
Samuel Dionne-Riel f12b216574 nixos/grub: Fix extraFiles in subdirectories
This directly copies the systemd-boot logic, which works.

`install` with `-D` will create all leading directory components.
2023-08-01 18:54:27 -04:00
Samuel Dionne-Riel 894d47f989 nixos/grub: Always install with bootloader id
The intent was to not pass the flag when installing as removable. In
reality there is a third case, where you may not want to touch EFI
variables, and not want to install as removable.

In that case, it would install to the generic \EFI\grub\grubx64.efi,
which is not a good choice in any cases. The operating system should
"own" their path under \EFI\ to be a good citizen [citation needed].

With this change, there can be only two paths GRUB can be installed to:

 - \EFI\NixOS-boot\grubx64.efi
 - \EFI\BOOT\bootx64.efi

This removes the surprising behaviour where GRUB may be installed to a
different location only because we configured NixOS not to touch EFI
variables.

It may be necessary under some configurations to install GRUB without
touching EFI variables, but to the NixOS-owned location.
2023-08-01 18:54:27 -04:00
Vincent Haupert 7f70abf80c nixos/image: write systemd-repart output to $out/repart-output.json
Write the output of `systemd-repart` as a JSON file to
`$out/repart-output.json`.

Depending on the repart configuration, the output of `systemd-repart`
contains important information, for example, when creating verity
partitions:

> The verity root hash itself will be included in the output of
> systemd-repart.

See `Verity=` in repart.d(5).
2023-08-02 00:10:14 +02:00
Maximilian Bosch d2facca5c0
nixos/matrix-synapse: fix option description of extras option
Co-authored-by: Benjamin Saunders <ben.e.saunders@gmail.com>
2023-08-01 18:16:56 +02:00
Martin Weinelt 184d15cc06
kanidm: 1.1.0-alpha.12 -> 1.1.0-beta.13
https://github.com/kanidm/kanidm/releases/tag/v1.1.0-beta.13

The kanidmd process now creates a unix socket, over which admin tasks
can be done, without having to shut kanidm down first.

The kanidm_unixd process now wants access to /etc/shadow and /etc/group,
so it can rule out collisions with the host system.
2023-08-01 17:13:58 +02:00
Pol Dellaiera fa8883c580 hedgedoc: remove top level with lib; 2023-08-01 16:01:02 +02:00
Pol Dellaiera b7062f43e2 hedgedoc: add enableStatsApi configuration option 2023-08-01 15:52:11 +02:00
Pol Dellaiera a521506834 hedgedoc: use lib.mkPackageOptionMD 2023-08-01 15:51:33 +02:00
Sandro Jäckel 0d4c3913b2
nixos/no-x-libs: use pythonPackagesExtensions to construct python overlay
to construct it for all supported python package sets at the same time
2023-08-01 15:36:15 +02:00
Minijackson d1b0a9543d
nixos/netbox: move migration into the preStart netbox.service, reindex
Now migrations are run only on upgrade / downgrade and first start,
which makes netbox much faster on a normal start.

add the reindex for NetBox > 3.5.0, to populate the index, preventing
empty search results.

Migrations were moved out of netbox-migration.service into
netbox.service, to prevent service dependency issues when upgrading
NixOS.
2023-08-01 14:45:01 +02:00
h7x4 b6fbd87328 nixos/atuin: harden systemd unit 2023-08-01 18:17:37 +08:00
h7x4 fd01b3f59c nixos/atuin: fix database.createLocally behaviour
Co-authored-by: Andrew Marshall <andrew@johnandrewmarshall.com>
2023-08-01 18:17:37 +08:00
Adam Joseph 957541ad69 nixos/modules/system/boot/binfmt.nix: update mips patterns
This commit updates the binfmt magic-patterns using

  f5e6786de4/scripts/qemu-binfmt-conf.sh

The patterns prior to this commit did not understand the difference
between mips32-*-* (32-bit void*,int) and mips64-*-*abin32 (32-bit
void*, 64-bit int).  This commit corrects that.
2023-07-31 21:24:26 -07:00
Nick Cao 32e85db47c
Merge pull request #246346 from yu-re-ka/fish-cross
nixos/fish: fix cross build
2023-07-31 19:22:32 -06:00
Nick Cao 0d8bcf32a3
Merge pull request #246343 from yu-re-ka/bird-cross
nixos/bird: fix checkConfig with cross-compilation
2023-07-31 19:13:47 -06:00
Robert Hensing d36353cf86 nixos/oddjob: Maybe fix, but mark as broken
Unfortunately there's no test for me to confirm that it works,
so all I can do is ask for maintainers, unfortunately -- I mean...
This is your opportunity!
2023-07-31 21:19:39 +02:00
Maximilian Bosch 701d0e1da6
nixos/matrix-synapse: fix path to extras for additive settings 2023-07-31 19:15:09 +02:00
Maximilian Bosch 190886c5cc
nixos/matrix-synapse: clarify that extras are additive 2023-07-31 18:54:17 +02:00
Maximilian Bosch 5a3870c212
nixos/matrix-synapse: expose final matrix-synapse package via package-option
When extending this module, it might be necessary to run something
from the package that's used in `matrix-synapse.service` (e.g. for
workers).

Now this can be trivially done by using
`config.services.matrix-synapse.package`. Previously it was necessary to
reuse the `PYTHONPATH` from the environment of `matrix-synapse.service`,
but that one doesn't exist anymore.
2023-07-31 18:20:28 +02:00
digital 9d78971007
nixos/boot/initrd-network: add option to enable udhcpc (#240406)
In some setups, and especially with sytemd-networkd becoming more widely
used, networking.useDHCP is set to false. Despite this, it may be useful
to have dhcp in the initramfs.
2023-07-31 16:08:56 +02:00
Minijackson a57a322b8d
nixos/netbox: add GIT_PATH environment variable
used by the synchronization backend for remote git repositories, in
"Data Sources"
2023-07-31 14:39:08 +02:00
Minijackson bcdc4d976c
nixos/netbox: remove "with lib;" 2023-07-31 14:38:26 +02:00
Yureka 0445837cc7 nixos/fish: fix cross build 2023-07-31 14:10:04 +02:00
WilliButz bf48dde359
Merge pull request #233659 from seberm/prometheus-ipmi-exporter-family-restriction
nixos/prometheus-ipmi-exporter: allow AF_UNIX address family
2023-07-31 13:57:15 +02:00
Yureka 31d4a4af19 nixos/bird: fix checkConfig with cross-compilation 2023-07-31 13:48:55 +02:00
Martin Weinelt 0d117d7ad5
Merge pull request #246188 from gdamjan/bump-matrix-appservice-irc-2
matrix-appservice-irc: 0.38.0 -> 1.0.1
2023-07-31 13:38:09 +02:00
Weijia Wang 2d69842838
Merge pull request #245931 from soupglasses/pkg/ns-usbloader-7.0
ns-usbloader: init at 7.0
2023-07-31 11:56:30 +02:00
Дамјан Георгиевски 69bc2ad72f matrix-appservice-irc: 0.38.0 -> 1.0.1
https://github.com/matrix-org/matrix-appservice-irc/releases/tag/1.0.0

* This release drops support for Node 16. The minimum required version is now 18+.
* Moved from NPM to Yarn

https://github.com/matrix-org/matrix-appservice-irc/releases/tag/1.0.1

* Fixes for GHSA-vc7j-h8xg-fv5x.
* Fixes for GHSA-3pmj-jqqp-2mj3.
* Fixes for GHSA-c7hh-3v6c-fj4q
* Update matrix-appservice-bridge to 9.0.1

while there was an effort to make this package with `mkYarnPackage`, in the end it
was suggested to just use `stdenv.mkDerivation` instead

nixos/matrix-appservice-irc:
* fix path to config.schema.yml directory stucture of the package changed
* use remarshal instead of python and pyyaml
  to convert the config schema from yaml to json
2023-07-31 11:19:42 +02:00
Nick Cao 6ea628b5c5
Merge pull request #244969 from Stzx/fix-warnings
udisks2: fix conf file loading warnings
2023-07-31 00:22:32 -06:00
Nick Cao c3f4240e33
Merge pull request #246193 from christophcharles/gogs-config-file
nixos/gogs: fix deprecations for 0.13.0
2023-07-30 18:23:03 -06:00
Pol Dellaiera 71e3934d82
Merge pull request #246120 from jakeschurch/add-proxmox-image-addl-disk-size-override
proxmox-image: add additionalDiskSpace parameter as input to make-disk-image.nix
2023-07-30 20:34:00 +02:00
Oliver Schmidt ff9296f93e
nixos/gitlab: ensure service started again after dependency restarts (#245240)
When a dependency, like postgresql.service or redis-gitlab.service, had
been stopped and started at switch-to-configuration time, gitlab.service
and its helper units had been stopped but not started again.
`multi-user.target` only has a `Wants` relation to gitlab.target, but
once gitlab.target has been successfully started once and is not stopped/
restarted again, it does not cause all its dependencies to stay activated
the whole time.

This commit fixes this by upgrading the dependy relationship of
gitlab.service towards gitlab.target from a "Wants" to a "Requires". It
should be enough to do this for this single unit part of gitlab.target
only, as all other units wantedBy gitlab.target are pulled in by
gitlab.service as well or have bindsTo relations.
2023-07-30 18:49:54 +02:00
Jake Schurch a479735162 respond to pr feedback
Signed-off-by: Jake Schurch <jakeschurch@gmail.com>
2023-07-30 12:01:03 -04:00
Jake Schurch d780bdf308
Update nixos/modules/virtualisation/proxmox-image.nix
Co-authored-by: Pol Dellaiera <pol.dellaiera@protonmail.com>
2023-07-30 11:57:29 -04:00
Ember Keske ba2f38d684 nixos/zigbee2mqtt: persist groups set via ui 2023-07-30 16:48:29 +02:00
Christoph Charles 43d1c4d782 nixos/gogs: fix deprecations for 0.13.0
Changed ROOT_URL to EXTERNAL_URL.
2023-07-30 15:54:16 +02:00
Martino Fontana d9fd4ba733 hid-nintendo: remove 2023-07-30 14:49:27 +02:00
Martin Weinelt 6ae8e13396
nixos/matrix-appservice-irc: update syscall filter
Simplify the SystemcallFilter by employing an explicit allow list, and
an explicit block list.

Node since version 18 requires syscalls in the @pkey group.

Excluding @privileged and @resources is a recommendation in
systemd-analyze.
2023-07-30 03:07:52 +02:00
Nick Cao 4ad78e3e98
Merge pull request #245886 from linsui/quickphase
nixos/fcitx5: add quickPhrase
2023-07-29 18:48:25 -06:00
Jake Schurch f2794786fd proxmox-image: add additionalDiskSpace parameter as input to make-disk-image.nix 2023-07-29 20:47:46 -04:00
Benjamin Saunders 5f445e8cf5 nixos/matrix-synapse: fix duplicate Content-Type header in example
nginx adds a `content-type: application/octet-stream` header by
default, and `add_header` does not supplant it. By setting
`default_type` instead we avoid the extraneous header.
2023-07-29 17:12:09 -07:00
Florian Klink a2a7096157
Merge pull request #246082 from ElvishJerricco/exitrd-fix-shutdown-loop
systemd shutdownRamfs: Fix infinite shutdown loop
2023-07-30 00:11:55 +02:00
Florian Klink 0546c70849
Merge pull request #246084 from ElvishJerricco/simplify-hibernate-test
Simplify hibernate test
2023-07-30 00:10:19 +02:00
Ryan Lahfa 899b60de3f
Merge pull request #245893 from h7x4/move-nginx-status-page-declaration 2023-07-29 20:22:58 +02:00
Will Fancher 7a3730f901 nixos/systemd: Add util-linux to systemd-mkswap's path 2023-07-29 14:02:06 -04:00
Will Fancher 4ecd0c119a systemd shutdownRamfs: Fix infinite shutdown loop 2023-07-29 13:52:52 -04:00
Sofi 3273352d05
ns-usbloader: init at 7.0 2023-07-29 19:28:32 +02:00
Atemu d391373c40 nixos/emacs: start emacs service with the graphical-session
If emacs starts before the graphical session is initialised, clients won't be
able to open new frames in the session. Start emacs with the graphical session
to avoid this issue.

Fixes https://github.com/NixOS/nixpkgs/issues/224512
2023-07-29 14:17:28 +02:00
Emery Hemingway 354821c1e8 nixos/eris-server: init 2023-07-29 11:56:58 +01:00
Pol Dellaiera cb8e68fd59
Merge pull request #244146 from GiggleSquid/pkgs/boinc-headless
boinc: add headless option
2023-07-29 12:52:12 +02:00
Pol Dellaiera 80d8a945dd
Merge pull request #245570 from jwygoda/tailscaled-autoconnect-options
nixos/tailscale: add extraUpFlags option
2023-07-29 06:12:26 +02:00
Will Fancher ce2c20a14d
Merge pull request #245837 from dcarosone/zfs-systemd-udev-fix
zfs: 'want', don't 'require', systemd-udev-settle
2023-07-28 20:12:28 -04:00
Jarosław Wygoda 2dbda3314f nixos/tailscale: add extraUpFlags option 2023-07-28 22:44:37 +02:00
h7x4 d803f78e7c
nixos/nginx: move status page config to services.nginx 2023-07-28 20:29:09 +02:00
Ryan Lahfa 5150e29817
Merge pull request #245737 from oddlama/fix-nginx-unnecessary-acme-locations 2023-07-28 19:23:56 +02:00
Ryan Lahfa 2a0aaa7e8f
Merge pull request #245413 from oddlama/fix-hostapd-mac-allow 2023-07-28 19:19:02 +02:00
Pol Dellaiera 1e37e277ca
Merge pull request #234652 from Valodim/cage-extra-environment
nixos/cage: add environment config
2023-07-28 18:57:19 +02:00
linsui 71540ff216 nixos/fcitx5: add quickPhrase 2023-07-29 00:54:25 +08:00
Pol Dellaiera fd304ecc8a
Merge pull request #236027 from iliana/grub-dont-die
nixos/grub: don't die on EFI-only systems if devices != ["nodev"]
2023-07-28 17:26:24 +02:00
ajs124 413d9d3864 nixos/dhcp(46): remove
package reached its EOL on 2022-10-04
see https://www.isc.org/blogs/isc-dhcp-eol/ for details
2023-07-28 16:35:40 +02:00
Martin Weinelt de5ca86149
Merge pull request #245759 from mweinelt/frigate-recordings
nixos/frigate: fix recording and serving of clips/recordings
2023-07-28 12:02:29 +02:00
Eric Wolf 318d8cc4c5 nixos/lemmy: limit impurity by secrets
Split `services.lemmy.secretFile` into
multiple options to allow only secrets.
2023-07-28 07:49:27 +00:00
Daniel Carosone 4ffc1c82c6 zfs: 'want', don't 'require', systemd-udev-settle
This completes changes in #227208
Fixes: #244737, #245089.
2023-07-28 16:57:12 +10:00
Emily 49c07cd259
Merge pull request #238735 from MayNiklas/proxmox-image-settings
nixos/proxmox-image: add additionalSpace, bootSize and diskSize options
2023-07-27 22:17:42 +02:00
Thiago Kenji Okada a6096c235c
Merge pull request #245571 from Misterio77/qt6gtk2
qt6Packages.qt6gtk2: init at 0.2
2023-07-27 19:13:29 +00:00
Gabriel Fontes ff8b69941a
nixos/qt: install qt6gtk2 when using gtk2
Now qt6 apps are correctly themed when using platformTheme gtk2.
2023-07-27 15:39:30 -03:00
Martin Weinelt 3086313e4c
nixos/frigate: fix recording and serving of clips/recordings
Frigate does string prefix matching for paths, which isn't exactly
compatible with dynamically provisioned directories of systemd, where
/var/cache/frigate is actually a symlink to /var/cache/private/frigate.

Because we are unlikely to get this fixed upstream, this is one of the
reason we should stop using DynamicUser= here.

The other being, that nginx needs to be able to serve clips and
recordings from both the CacheDirectory and the StateDirectory, and
nginx being a member on a group that may only exist after it was started
up doesn't work reliably.

This is also why we relax the umask to allow g+r/g+rx for newly created
files. Existing installs may need the following permissions fix to get
things going.

```
find /var/lib/frigate/recordings -type d -exec chmod g+rx {} \;
find /var/lib/frigate/recordings -type f -exec chmod g+r {} \;
find /var/cache/frigate -type f -exec chmod g+r {} \;
```

Co-Authored-By: Daniel Barlow <dan@telent.net>
2023-07-27 18:36:25 +02:00
Matthieu Coudron 6774f3fc04 services.postgresql: fix example 2023-07-27 11:35:55 -05:00
Ryan Lahfa 7d053c812b
Merge pull request #245250 from nikstur/images 2023-07-27 17:00:13 +02:00
Mayeu 77fb833411 kubo: 0.20.0 -> 0.21.0 2023-07-27 16:59:45 +02:00
oddlama cbdaab0f17
nixos/nginx: remove unnecessary acme locations to allow double proxied setups 2023-07-27 15:30:38 +02:00
Bobby Rong 69a7cd6718
Merge pull request #245481 from bobby285271/upd/pantheon
Pantheon updates 2023-07-26
2023-07-27 16:04:25 +08:00
Bobby Rong 497229d3c2
nixos/pantheon: Install orca
ref: ec0eb37689
2023-07-27 14:08:53 +08:00
rewine d9f707f795 nixos/wayfire: init 2023-07-27 00:04:03 -03:00
Nick Cao 8f7b4e8894
Merge pull request #245564 from eliasp/paperless-docs-url
nixos/paperless: update URL to docs
2023-07-26 17:52:39 -06:00
nikstur cb2d047c57 nixos/image: add repart builder docs 2023-07-26 23:36:18 +02:00
nikstur ec8d30cc50 nixos/image: add repart builder 2023-07-26 23:33:14 +02:00
nikstur a662dc8b73 nixos/lib: systemd definition files function
Add a re-usable function that converts an attrset to a directory
containing systemd definition files.
2023-07-26 23:30:08 +02:00
nikstur 9b4d3b840e nixos/systemd-sysupdate: init 2023-07-26 20:33:31 +02:00
Elias Probst 2b0545b423
nixos/paperless: update URL to docs 2023-07-26 19:02:29 +02:00
pennae e2a43fbfb3
Merge pull request #244356 from datafoo/mosquitto-systemd-credentials
nixos/mosquitto: leverage systemd credentials
2023-07-26 18:23:06 +02:00
lewo 9a98962714
Merge pull request #245545 from nlewo/osquery-disable-database
nixos/osquery: do not use the local database for osqueryi
2023-07-26 17:58:09 +02:00
Florian Klink 7539b8f2d7
Merge pull request #244841 from flokli/networkmanager-fix-ppp-plugin
nixos/networkmanager: create pppd lock directory
2023-07-26 17:44:35 +02:00
Antoine Eiche 8af1d49858 nixos/osquery: do not use the local database for osqueryi
Because the local database is used by the osquery deamon, running
osqueri fails with:

    IO error: While lock file: /var/lib/osquery/osquery.db/LOCK:    Resource temporarily unavailable
2023-07-26 17:22:22 +02:00
Pol Dellaiera d242834675
Merge pull request #230109 from vdot0x23/docker-extraPackages
nixos/docker: add extraPackages option
2023-07-26 15:14:13 +02:00
ajs124 c9cf0708f0
Merge pull request #229271 from markus-heinrich/submit/sogo
nixos/sogo: fix nginx proxy_buffer config
2023-07-26 12:39:51 +02:00
Nick Cao 9ae5c2de7f
Merge pull request #244572 from MinerSebas/usb-modeswitch-module-rename
nixos/usb-modeswitch: Rename module from usbWwan
2023-07-25 19:24:14 -06:00
Nick Cao 76025b299f
Merge pull request #245454 from 2xsaiko/outgoing/emacs-env
nixos/emacs: don't set EDITOR to store path
2023-07-25 19:19:56 -06:00
Nick Cao e3696d3a5d
Merge pull request #245399 from mweinelt/conduit-chmod-umask
nixos/conduit: improve state directory permissions
2023-07-25 18:50:03 -06:00
Marco Rebhan b72044c113
nixos/emacs: don't set EDITOR to store path
Use emacseditor in PATH instead of using the absolute path to prevent
old path from sticking around when switching configurations.
2023-07-26 00:52:03 +02:00
Sandro 492860f609
Merge pull request #245380 from SuperSandro2000/fonts-typo
nixos/packages: fix typo preventing mkRenamedOptionModule from working
2023-07-25 18:56:44 +02:00
oddlama 0ac2ba763f
nixos/hostapd: fix regression after refactoring to RFC42.
Switching from submodule notation from ({name, ...}: {}) to (submob: {}) seems to require a different accessing scheme.
2023-07-25 18:40:51 +02:00
MinerSebas 7c309898bc nixos/usb-modeswitch: Rename module from usbWwan 2023-07-25 17:07:00 +02:00
Martin Weinelt 18733782ad
nixos/conduit: improve state directory permissions
Allow only the conduit user to access its database files, and make sure
to create all new files with 0600 (o+rw).
2023-07-25 16:54:39 +02:00
Aaron Andersen 8d85dcea22
Merge pull request #215247 from evan-goode/evdevremapkeys
nixos/evdevremapkeys: init
2023-07-25 08:45:54 -04:00
Sandro Jäckel 4c07356e3d
nixos/packages: fix typo preventing mkRenamedOptionModule from working 2023-07-25 14:43:40 +02:00
Martin Weinelt 6847465f6f
Merge pull request #242275 from Atemu/nixos/paperless-manage-toShellVars
nixos/paperless: use toShellVars for paperless-manage
2023-07-25 12:26:32 +02:00
Robert Hensing c9f9df2f8e
Merge pull request #245038 from R-VdP/fix_nix_channel
nixos/nix-channel: only try to remove the nix-channel binary if it exists
2023-07-25 11:25:15 +02:00
asymmetric 46df012d2a
Merge pull request #244332 from SuperSandro2000/fonts-fonts
nixos/fonts: rename fonts.fonts option to fonts.packages, other cleanups
2023-07-25 09:49:25 +02:00
Bobby Rong 34d40c6f20
Merge pull request #245105 from thoughtfull-systems/xfce-exclude-packages
nixos/xfce: add environment.xfce.excludePackages option
2023-07-25 11:39:30 +08:00
Pol Dellaiera 07fd6694b5
Merge pull request #236368 from SuperSandro2000/etc-dir-names
nixos/etc: keep directories in derivation name
2023-07-25 03:02:47 +02:00
Sandro Jäckel 83793ca898
nixos/fonts: rename fonts.enableDefaultFonts to fonts.enableDefaultPackages
to better fit the renamed fonts.packages
2023-07-25 00:55:25 +02:00
Sandro dfcffbd74f
Merge pull request #225055 from jtrees/update-wooting-udev-rules
wooting: update udev rules
2023-07-24 23:56:31 +02:00
Joshua Trees 12ad49a130 wooting: clarify requirements for hardware option to work 2023-07-24 22:34:52 +02:00
Gianmarco Gargiulo b34a51f5a7
nixos/gogs: fix deprecations for 0.13.0
Changed APP_NAME to BRAND_NAME, DB_TYPE to TYPE and PASSWD to PASSWORD.
2023-07-24 19:41:52 +00:00
Sandro Jäckel f9fdeb2dbc
nixos/ghostscript: evaporate the extra whitespace 2023-07-24 17:34:39 +02:00
Sandro Jäckel b0c67b4b6e
treewide: rename fonts.fonts to fonts.packages 2023-07-24 17:34:39 +02:00
Sandro Jäckel 5162df3239
nixos/fonts: rename fonts.fonts option to fonts.packages, other cleanups
fonts.fonts is not a great name and this also resolves a TODO.
2023-07-24 17:34:37 +02:00
Paul Stadig cb2f531332 nixos/xfce: allow exclusion of xfce4-notifyd
Use `environment.xfce.excludePackages` with `systemd.packages` so `xfce4-notifyd` can be excluded
from installation.
2023-07-24 07:55:10 -04:00
datafoo 533ff8546b nixos/mosquitto: leverage systemd credentials
Use systemd credentials for all variations of user passwords.
Password files do not need special permissions anymore.
2023-07-24 11:37:30 +02:00
r-vdp b825f65c90
nixos/nix-channel: only try to remove the nix-channel binary if it exists
It may not be there if `system.disableInstallerTools = true`.
2023-07-24 10:34:48 +02:00
Lassulus ceaab39b40
Merge pull request #230196 from doronbehar/nixos/syncthing
nixos/syncthing: Use API to merge / override configurations
2023-07-24 08:38:50 +02:00
Stzx e196c81a23
udisks2: fix conf file loading warnings 2023-07-24 11:41:50 +08:00
Pol Dellaiera a30cc10e7f
Merge pull request #242703 from jwygoda/tailscaled-autoconnect
nixos/tailscale: add authKeyFile option
2023-07-24 04:48:42 +02:00
Sandro 9ca0bd9db3
Merge pull request #244467 from wamserma/tarsnap-add-package-option
tarsnap: add package option
2023-07-24 00:46:24 +02:00
Robert Hensing 35a0bd36d0
Merge pull request #244653 from bjornfor/nixos-generate-config-emit-lib
nixos-generate-config: add 'lib' arg to configuration.nix
2023-07-24 00:03:26 +02:00
Paul Stadig 1c5e23c405 nixos/xfce: add environment.xfce.excludePackages option
Packages in environment.xfce.excludePackages will be excluded from the default environment.

Fixes #91169
2023-07-23 17:52:41 -04:00
Emily 2d83cbda63
Merge pull request #244463 from mattmelling/cloudlog-pin-php8
cloudlog: pin php version
2023-07-23 23:09:50 +02:00
Will Fancher df59d8c0b7
Merge pull request #227208 from ElvishJerricco/zfs-systemd-target-ordering
zfs: Relate import services to zfs-import.target instead of local-fs
2023-07-23 16:58:25 -04:00
Sandro 1d1fe1fe14
Merge pull request #245063 from SuperSandro2000/remove-maintainer
treewide: reduce packages I maintainer
2023-07-23 21:28:26 +02:00
Will Fancher 0ddc9d0250 zfs: Relate import services to zfs-import.target instead of local-fs
Being wanted by and ordered before local-fs.target isn't strictly
correct. And in systemd initrd, it's very incorrect because
local-fs.target is for the initrd file system, not the real root file
system.
2023-07-23 14:12:53 -04:00
Sandro Jäckel cf6c96533b
treewide: reduce packages I maintainer 2023-07-23 19:30:22 +02:00
Doron Behar 047fa8dbdf nixos/syncthing: Use API to merge / override configurations
If one sets either of `override{Device,folder}s` to false, the jq `*`
operator doesn't merge well the devices and folders, creating duplicate
IDs for folders as observed in #230146. This PR makes the script iterate
via Nix / Bash loop the devices and folders IDs and merges the keys
using upstream's `curl -X POST` support for single objects.

Hence this commit fixes #230146.
2023-07-23 18:22:33 +03:00
r-vdp 668e2dafb6
nixos/nix-channel: fix editorconfig warnings and apply nixpkgs-fmt 2023-07-23 15:39:32 +02:00
Ilan Joselevich 383dc75dd7
Merge pull request #244949 from FlafyDev/fix/nix-daemon-if
nixos/nix-daemon: change regular if to mkIf
2023-07-23 16:02:33 +03:00
oddlama d073105d6b
nixos/switch-to-configuration: fix ignoring of template unit specialization dropins 2023-07-23 13:16:58 +02:00
Robert Hensing 864404dcc1
Merge pull request #244993 from Enzime/fix/linux-builder
linux-builder: fix eval failure
2023-07-23 11:59:03 +02:00
Michael Hoang 1deed6cd12 linux-builder: fix eval failure 2023-07-23 18:07:48 +10:00
FlafyDev 519a71edc3 nixos/nix-daemon: change regular if to mkIf 2023-07-23 04:16:04 +03:00
Mihai Fufezan e9f270f1f0
nixos/hyprland: apply config options to package 2023-07-23 01:15:59 +03:00
Ryan Lahfa c4ae17443e
Merge pull request #244233 from oddlama/init-typesense-bin 2023-07-22 18:47:45 +02:00
oddlama 234dd85da0
nixos/typesense: init at 0.24.1 2023-07-22 16:38:13 +02:00
Raito Bezarius 44aee34594 Revert "nixos/gitea: set service type to notify"
This reverts commit b61919e5e0.

As it breaks Forgejo who does not support this feature yet.
2023-07-22 16:12:36 +02:00
Florian Klink 02a5e9c933 nixos/networkmanager: create pppd lock directory
I digged up some 3G stick, which uses ppp to set up the connection.

It failed to spin up ppp, because ppp failed to find the directory it wants to create its lockfiles in:

```
Jul 22 16:47:49 tp ModemManager[926779]: <info>  [modem1] state changed (connected -> disconnecting)
Jul 22 16:47:49 tp ModemManager[926779]: <info>  [modem1] simple connect started...
Jul 22 16:47:49 tp ModemManager[926779]: <info>  [modem1] simple connect state (4/10): wait to get fully enabled
Jul 22 16:47:50 tp ModemManager[926779]: <info>  [modem1] state changed (disconnecting -> registered)
Jul 22 16:47:50 tp ModemManager[926779]: <info>  [modem1] simple connect state (5/10): wait after enabled
Jul 22 16:47:50 tp ModemManager[926779]: <info>  [modem1/bearer0] connection #11 finished: duration 1s
Jul 22 16:47:50 tp ModemManager[926779]: <info>  [modem1] simple connect state (6/10): register
Jul 22 16:47:50 tp ModemManager[926779]: <info>  [modem1] simple connect state (7/10): wait to get packet service state attached
Jul 22 16:47:50 tp ModemManager[926779]: <info>  [modem1] simple connect state (8/10): bearer
Jul 22 16:47:50 tp ModemManager[926779]: <info>  [modem1] simple connect state (9/10): connect
Jul 22 16:47:50 tp ModemManager[926779]: <info>  [modem1] state changed (registered -> connecting)
Jul 22 16:47:50 tp ModemManager[926779]: <info>  [modem1] state changed (connecting -> connected)
Jul 22 16:47:50 tp ModemManager[926779]: <info>  [modem1] simple connect state (10/10): all done
Jul 22 16:47:50 tp pppd[1576260]: Plugin /nix/store/yqdqzz6y6agcmrfj8b6pwqhjcjyb3ypr-networkmanager-1.42.6/lib/pppd/2.5.0/nm-pppd-plugin.so loaded.
Jul 22 16:47:50 tp NetworkManager[1576260]: Plugin /nix/store/yqdqzz6y6agcmrfj8b6pwqhjcjyb3ypr-networkmanager-1.42.6/lib/pppd/2.5.0/nm-pppd-plugin.so loaded.
Jul 22 16:47:50 tp pppd[1576260]: nm-ppp-plugin: initializing
Jul 22 16:47:50 tp pppd[1576260]: pppd 2.5.0 started by root, uid 0
Jul 22 16:47:50 tp pppd[1576260]: Can't create lock file /var/run/pppd/lock/LCK..ttyUSB0: No such file or directory
Jul 22 16:47:50 tp NetworkManager[1576260]: Can't create lock file /var/run/pppd/lock/LCK..ttyUSB0: No such file or directory
Jul 22 16:47:50 tp pppd[1576260]: nm-ppp-plugin: status 2 / phase 'serial connection'
Jul 22 16:47:50 tp pppd[1576260]: Exit.
Jul 22 16:47:50 tp pppd[1576260]: nm-ppp-plugin: status 0 / phase 'dead'
Jul 22 16:47:50 tp pppd[1576260]: nm-ppp-plugin: cleaning up
```

Creating the directories via tmpfiles.d got the connection to succeed,
and might also fix other connections using PPP.
2023-07-22 17:00:17 +03:00
Felix Bühler 0a2745684e
Merge pull request #239624 from Stunkymonkey/use-optionalString-then
treewide: use optionalString instead of 'then ""'
2023-07-22 13:02:47 +02:00
1000101 f63d863fde
nixos/pgbouncer: init (#241578)
Co-authored-by: Marek Mahut <marek.mahut@gmail.com>
2023-07-22 12:49:23 +02:00
Nick Cao 0b411c1e04
Merge pull request #244750 from therishidesai/rdesai/fix-hostapd-hardening
nixos/hostapd: add AF_PACKET to RestrictAddressFamilies
2023-07-21 21:16:22 -06:00
Rishi Desai efba841aeb nixos/hostapd: add AF_PACKET to RestrictAddressFamilies 2023-07-21 21:11:14 -05:00
rnhmjoj c7c288fbd5
nixos/dnscrypt-wrapper: avoid using polkit 2023-07-22 02:12:31 +02:00
Lassulus f8ad4849c3
Merge pull request #233386 from Lassulus/syncthing-fix 2023-07-22 01:02:04 +02:00
Matt Layher 93efcdac79
nixos/networkd: add DHCPServer PXE boot options
Signed-off-by: Matt Layher <mdlayher@gmail.com>
2023-07-21 16:59:21 -04:00
Ilan Joselevich 75a51855e3
Merge pull request #244689 from Kranzes/twingate-cp
nixos/twingate: fix cp (-n -> --update=none)
2023-07-21 23:21:53 +03:00
Maximilian Bosch 7c70396c1d
Merge pull request #242863 from emilylange/nixos/gitea-runtimedirmode
nixos/gitea: revert change to RuntimeDirectoryMode
Closes ##243340
2023-07-21 19:22:05 +02:00
Ilan Joselevich b0db3b7c11
nixos/twingate: fix cp (-n -> --update=none) 2023-07-21 19:57:57 +03:00
Bjørn Forsman a7da3eacaf nixos-generate-config: add 'lib' arg to configuration.nix
Although 'lib' isn't needed by the default configuration, new NixOS uses
can get confused when being recommended configuration.nix snippets like

  systemd.services.NetworkManager-wait-online.enable = lib.mkForce false;

and have `sudo nixos-rebuild switch` fail with

  error: undefined variable 'lib'
2023-07-21 13:53:33 +02:00
Stzx 3e8f45393d
Fix package ref 2023-07-21 18:56:49 +08:00
Sandro 0bca96affc
Merge pull request #243550 from SuperSandro2000/matrix-sliding-sync-module 2023-07-21 11:39:03 +02:00
Markus S. Wamser a936b9edec tarsnap: add package option 2023-07-21 11:37:15 +02:00
Sandro 9f4a3203eb
Merge pull request #233250 from SuperSandro2000/podman-timer-persist 2023-07-21 11:34:18 +02:00
Nathan Bijnens ffc3eb7c16 ebusd: new module 2023-07-21 18:22:46 +09:00
Maximilian Bosch 38823d15f4
Merge pull request #243883 from techknowlogick/gitea-1200
gitea: 1.19.4 -> 1.20.0
2023-07-21 09:41:07 +02:00
rnhmjoj 1f28c8defc
nixos/jool: validate the configuration
This checks the validity of both NAT64 and SIIT configurations
at build time. An error produces something like this:

    Validating Jool configuration... Error: Cannot parse '283.0.113.1' as an IPv4 address.
2023-07-21 09:08:40 +02:00
rnhmjoj 4657ff6ca7
nixos/jool: add service for setting up SIIT/NAT64 2023-07-21 09:07:54 +02:00
Artturi dbef093f84
Merge pull request #244449 from Artturin/fixsrip1 2023-07-21 01:44:33 +03:00
Maximilian Bosch b61919e5e0
nixos/gitea: set service type to notify 2023-07-20 22:20:43 +02:00
Andrew Marshall 3d774b4453 util-linux: Fix build on non-Linux
Build logs show:

> configure: WARNING: non-linux system; not building mount
> configure: WARNING: non-linux system; not building swapon

So skip these on non-Linux

Using getOutput prevents eval failures on other platforms.
Things should stay eval'able with NIXPKGS_ALLOW_UNSUPPORTED_SYSTEM=1

Co-authored-by: Artturin <Artturin@artturin.com>
2023-07-20 22:03:15 +03:00
Artturin 69267c22f1 nixos/stage-1: fix stripping
got broken in 6ea1a2a1be which changed
runCommandCC to runCommand but was not
noticed because it was failing silently

runCommand doesn't include CC or bintools
2023-07-20 21:26:38 +03:00
Felix Bühler f7bb884c13
Merge pull request #243850 from mattchrist/nixos/freshrss_auth_type
nixos/freshrss: authType option
2023-07-20 18:58:45 +02:00
Ryan Lahfa 2d0a128ac9
Merge pull request #201562 from jdbaldry/add/osquery 2023-07-20 11:06:46 +02:00
Matt Melling 3f34b65b2c
cloudlog: pin php version 2023-07-20 09:24:47 +01:00
Will Fancher 22bcc32f63
Merge pull request #244033 from SuperSandro2000/issue-243820
nixos/stage-1: fix mount replacement in extra-utils
2023-07-20 00:43:33 -04:00
Will Fancher 2e60058b95
Revert "nixos/boot/stage-1: chase symlinks when copying binaries" 2023-07-20 00:03:50 -04:00
Evan Goode be333da51f nixos/evdevremapkeys: init
Add a service for evdevremapkeys (already packaged), a daemon for
remapping keyboard events
2023-07-19 23:06:31 -04:00
Matt Christ c4d28ff161 nixos/freshrss: authType option
This patch adds an `authType` option to enable configuring FreshRSS's
`auth_type` parameter.
Upstream documentation for this feature is located here:
https://freshrss.github.io/FreshRSS/en/admins/09_AccessControl.html

An accompanying NixOS test is provided to confirm this feature works
as expected.
2023-07-19 19:43:55 -05:00
Sandro Jäckel 18010665ca
nixos/matrix-sliding-sync: init
Co-authored-by: Emily <55066419+emilylange@users.noreply.github.com>
2023-07-19 23:59:25 +02:00
Florian Klink 8f15fe7914
Merge pull request #241370 from RaitoBezarius/vxlan-independent
nixos/networkd: support `Independent` flag for VXLAN netdevs
2023-07-19 23:18:54 +03:00
Florian Klink 6f66c57acc
Merge pull request #241365 from RaitoBezarius/macaddrs-netdevs
nixos/networkd: support netdev MAC addresses
2023-07-19 23:03:34 +03:00
Martin Weinelt aadb3f3058
Merge pull request #244188 from mweinelt/engelsystem-php81
nixos/engelsystem: pin php at 8.1
2023-07-19 21:13:26 +02:00
Antoine Eiche da65d1dd20 nixos/osquery: init 2023-07-19 16:55:29 +02:00
Sandro dd5b7cfe1c
Merge pull request #228288 from Cynerd/bigclown 2023-07-19 15:51:25 +02:00
Sandro 3168d64a3f
Merge pull request #241974 from SohamG/pkg/oddjob 2023-07-19 15:07:04 +02:00
Sandro 2a2c6aeb4a
Merge pull request #244323 from SuperSandro2000/nexus 2023-07-19 14:55:09 +02:00
Linus Heckemann 5016dee6b1
Merge pull request #244177 from DeterminateSystems/initrd-chase-symlinks
nixos/boot/stage-1: chase symlinks when copying binaries
2023-07-19 14:26:55 +02:00
Sandro Jäckel fe6304df54
nixos/nexus: use mkPackageOption, cleanup
This fixes:
trace: warning: literalExample is deprecated, use literalExpression instead, or use literalMD for a non-Nix description.
2023-07-19 13:13:28 +02:00
Karel Kočí fd3f5471b0
nixos/mqtt2influxdb: init module 2023-07-19 09:47:04 +02:00
Karel Kočí dd4eec64ab
nixos/bcg: init module
This is gateway that transforms BigClown wireless to MQTT.
2023-07-19 09:47:04 +02:00
Gerg-L bf383adf0a nixos/user-groups: Add to $NIX_PROFILES paths 2023-07-18 23:33:18 -04:00
Gerg-L a5ccd2c5c8 nixos/nvidia: cleaned up reorganized and reformatted 2023-07-18 16:50:42 -04:00
Jack Connors 9bc84eba6f nixos/boinc: add boinc-headless example to package option 2023-07-18 21:47:12 +01:00
Martin Weinelt c8a7edcee1
nixos/engelsystem: pin php at 8.1
Upstream supports php 8.0/8.1 for the 3.3.0 release. The upgrade to 8.2
caused a type mismatch in carbon.

> PHP message: Exception: Code: 0, Message: Carbon\Carbon::setLastErrors(): Argument #1 ($lastErrors) must be of type array, bool given, called in /nix/store/2prnw9qya9kaks2rwvd6fkrz0c7l5ygd-engelsystem-3.3.0/share/engelsystem/vendor/nesbot/carbon/src/Carbon/Traits/Creator.php on line 98, File: vendor/nesbot/carbon/src/Carbon/Traits/Creator.php:928
2023-07-18 18:34:58 +02:00
Martin Weinelt 1076c3ada6
nixos/matrix-synapse: Allow passing extras, discover extras from config
With this change we allow the user to configure extras, exposed as
optional-dependencies on the matrix-synapse package.

The vertical integration between package, user configuration and
deployment is a huge boon which then allows us to dynamically adapt the
python environment the service runs in, by inspecting the configuration
and autodiscovering certain used extras from config paths.
2023-07-18 17:53:27 +02:00
Soham S Gumaste 162893f92a
nixos/oddjob: init at 0.34.7 2023-07-18 10:48:07 -05:00
Robert Hensing 8ad59ed1b2
Merge pull request #242098 from hercules-ci/nixos-no-nix-channel
nixos: Disable nix-channel
2023-07-18 15:27:24 +02:00
Martin Weinelt cd71c603a1
Merge pull request #244137 from flokli/web-eid-app-programs-firefox
nixos/firefox: stop reading nixpkgs.config.firefox.enableEUWebID
2023-07-18 14:52:49 +02:00
Sandro cacb77fb27
Merge pull request #206273 from wucke13/master 2023-07-18 13:12:06 +02:00
Sandro 065fd18e5c
Merge pull request #240452 from NickCao/bpftune 2023-07-18 12:43:02 +02:00
Florian Klink ca1dd491c6 nixos/firefox: stop reading nixpkgs.config.firefox.enableEUWebID
This can cause firefox to be overridden with nativeMessagingHosts
pointing to web-eid-app twice, causing a conflict during build.
2023-07-18 11:48:17 +03:00
Alexander Flurie 048f9a4adf fix whitespace issue 2023-07-18 00:20:46 -04:00
Mario Rodas 752b3281a4
Merge pull request #244061 from schra/fix/typo-vaultwarden
nixos/vaultwarden: Fix Markdown syntax of link
2023-07-17 20:15:58 -05:00
pennae d0299f7fa1
Merge pull request #243570 from dotlambda/patroni-python310
nixos/patroni: use Python 3.10
2023-07-18 01:28:29 +02:00
André Schröder 9858973dad nixos/vaultwarden: Fix Markdown syntax of link
The typo was introduced in 1d41cff3dc
2023-07-17 23:41:44 +02:00
Linus Heckemann dd2a892144 nixos/boot/stage-1: chase symlinks when copying binaries
The split of util-linux into further outputs (#236463) resulted in
${util-linux.bin}/bin/mount becoming a symlink. This broke zfs in some
cases.
2023-07-17 22:13:49 +02:00
Sandro 61dfd95022
Merge pull request #236778 from awakesecurity/jsoo1/buildkite-agent-hooks
nixos/buildkite-agents: simplify service definition
2023-07-17 21:46:12 +02:00
Sandro aa90c57672
Merge pull request #240774 from tollb/w20230630c_fix_atop_systemd_units
nixos/atop: Fix regression in enabling atop units
2023-07-17 21:26:21 +02:00
Sandro Jäckel 222222bedb
nixos/stage-1: fix mount replacement in extra-utils 2023-07-17 21:12:39 +02:00
Emily 00a7b91eac
Merge pull request #243366 from vamega/sambda-wsdd-firewall-config
nixos/samba-wsdd: add openFirewall option
2023-07-17 19:21:58 +02:00
Jarosław Wygoda 7fc0e3334e nixos/tailscale: add authKeyFile option
Auth key registers new nodes without needing to sign in via a browser

Tailscale sends status changes with systemd-notify.
https://github.com/tailscale/tailscale/blob/v1.44.0/ipn/ipnlocal/local.go#L3670
2023-07-17 18:52:07 +02:00
ppom 139259a377
slskd: init module (#233648)
* slskd: init module

* Update nixos/modules/services/web-apps/slskd.nix

* Update nixos/modules/services/web-apps/slskd.nix

* add description to slskd module options

---------

Co-authored-by: ppom <ppom@ppom.me>
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2023-07-17 18:40:54 +02:00
Alexander Flurie c2861bcbdf add separate configurable datadog process agent 2023-07-17 10:34:50 -04:00
Varun Madiath d237a7318c nixos/samba-wsdd: add openFirewall option 2023-07-17 10:22:43 -04:00
Jon Seager 5e73f0c1c9 nixos/lxd: fix default ui package 2023-07-17 08:04:42 -03:00
Maximilian Bosch 42105b2ba3
nixos/gitea: explicitly set CHUNKED_UPLOAD_PATH to writable location
Fix for Gitea 1.20.0.

Without this being set, e.g. a `git push` (or `ssh` to `git@` in general) fails like this:

    2023/07/17 09:27:05 ...s/setting/setting.go:109:LoadCommonSettings() [F] Unable to load settings from config: unable to create chunked upload directory: /nix/store/yna9nf66wl2n9hlnhxi2g7fdgawk2kxl-gitea-1.20.0/bin/data/tmp/package-upload (mkdir /nix/store/yna9nf66wl2n9hlnhxi2g7fdgawk2kxl-gitea-1.20.0/bin/data: read-only file system)
    Connection to git.mbosch.me closed.
2023-07-17 11:49:34 +02:00
Nick Cao b47c483bf8
nixos/bpftune: init 2023-07-17 15:59:49 +08:00
Colin e7059632c6 nixos/trust-dns: init
Co-authored-by: Yt <happysalada@tuta.io>
2023-07-16 15:24:10 +08:00
Artturi d1abbbd9b6
Merge pull request #242309 from Artturin/ananicyextraxadd 2023-07-16 00:43:45 +03:00
github-actions[bot] 26b725b3fe
Merge master into staging-next 2023-07-15 12:01:05 +00:00
pennae 45ae0efbbc
Merge pull request #243271 from woojiq/keyd-support-multiple-configs
nixos/keyd: add support for multiple configuration in different files
2023-07-15 13:59:57 +02:00
Nick Cao d9dd68efda
Merge pull request #243004 from baloo/baloo/keepalived/vrrp-router-id
keepalived: fixup `virtualRouterId` documentation
2023-07-15 05:36:10 -06:00
woojiq 2d3bf20086 nixos/keyd: add support for multi-file configuration
Add `keyboards` option to define different configurations for different IDs. This creates the appropriate files in `/etc/keyd` instead of just `default.conf` as before.
Add `23.11` release note entry.
Add `mkRemovedOptionModule` for the old API with a note on how to revert the old behavior.
2023-07-15 11:33:41 +03:00
github-actions[bot] 2a22bb7087
Merge master into staging-next 2023-07-15 06:01:19 +00:00
Matti 162039a233 nixos/swraid: Add missing mkRenamedOption 2023-07-15 03:56:54 +02:00
Robert Schütz c9e8e912cb nixos/patroni: use Python 3.10 2023-07-14 18:20:14 -07:00
Sandro 545f079f5e
Merge pull request #243475 from vtuan10/enable-klipper-flash
nixos/klipper: add enableKlipperFlash option
2023-07-15 02:54:47 +02:00
adisbladis 110489e12a
Merge pull request #243373 from adisbladis/pict-rs_0_4
pict-rs: 0.3.3 -> 0.4.0
2023-07-15 12:36:05 +12:00
github-actions[bot] 73205ff524
Merge master into staging-next 2023-07-15 00:02:34 +00:00
Arthur Gautier ee38adc8e2 keepalived: use ints.between
Signed-off-by: Arthur Gautier <baloo@superbaloo.net>
2023-07-14 20:52:48 +00:00
Lassulus a4ffd00fb9
Merge pull request #243251 from schnusch/cgit-regex
nixos/cgit: fix \v and \f in regexEscape
2023-07-14 22:03:44 +02:00
schnusch 8980fdd9b5 nixos/cgit: fix \v and \f in regexEscape 2023-07-14 21:14:01 +02:00
github-actions[bot] 0f179253f1
Merge master into staging-next 2023-07-14 18:01:25 +00:00
Sandro 75cfb4925a
Merge pull request #242126 from kjeremy/vmware-guest-aarch64
vmware-guest module: work under aarch64
2023-07-14 19:51:14 +02:00
Bruno BELANYI b5f28477aa nixos/prowlarr: make use of 'lib.getExe' 2023-07-14 13:43:26 +00:00
Van Tuan Vo 917bb93078
nixos/klipper: add enableKlipperFlash option 2023-07-14 15:19:36 +02:00
github-actions[bot] 781017eaf1
Merge master into staging-next 2023-07-14 12:01:45 +00:00
Ryan Lahfa c9e26d7d3a
Merge pull request #242036 from jnsgruk/prowlarr-update 2023-07-14 13:48:15 +02:00
Sandro 9e010edec7
Merge pull request #243102 from yu-re-ka/peering-manager-meta 2023-07-14 12:08:05 +02:00
Pol Dellaiera 641b814a44
Merge pull request #243094 from jnsgruk/homepage
homepage: init at 0.6.21
2023-07-14 09:53:26 +02:00
adisbladis 4c5afa2af4 nixos/pict-rs: Use pict-rs-0.3 for NixOS <= 23.05 2023-07-14 17:46:26 +12:00
github-actions[bot] 9905fde3a5
Merge master into staging-next 2023-07-14 00:02:39 +00:00
Janik fc7d1abf50
Merge pull request #133092 from TomatoCream/add-jvm-to-nexus 2023-07-14 01:45:19 +02:00
Your Name 9cc181f5c6 nixos/nexus: add jvm package option 2023-07-13 23:16:42 +02:00
Ryan Lahfa 7bc11802ed
Merge pull request #238777 from ORichterSec/esdm-upstream 2023-07-13 22:35:45 +02:00
Will Fancher 11fec97761
Merge pull request #183314 from DeterminateSystems/optional-swraid
Make swraid optional
2023-07-13 16:24:34 -04:00
Sandro 6873b5c7ee
Merge pull request #243289 from SuperSandro2000/nullmailer-group
nixos/nullmailer: allow users in the nullmailer group to send mails
2023-07-13 21:44:18 +02:00
Guillaume Girol aaf4aa7c7e
Merge pull request #237994 from SebTM/fix/cups-xdg-missing
cups: add dependency for xdg-open
2023-07-13 18:22:46 +00:00
github-actions[bot] a3b43106c9
Merge master into staging-next 2023-07-13 18:01:24 +00:00
Bjørn Forsman df1eee2aa6 nixos: show which files are related to "not applying GID/UID change"
I initially thought it was related to /var/lib/nixos/{gid-map,uid-map},
but it seems that to migrate GID/UID you have to edit
/etc/{group,passwd} (and update GID/UID in all files). So mention those
files in the warning messages.
2023-07-13 17:21:36 +02:00
Ramses 1bee79f9f7
nixos/swap: make sure all kernel modules are loaded before creating swap devices. (#239163)
Co-authored-by: iliana etaoin <iliana@buttslol.net>
2023-07-13 17:12:54 +02:00
Sandro Jäckel b2c1b176d9
nixos/nullmailer: allow users in the nullmailer group to send mails
In combination with https://github.com/NixOS/nixpkgs/pull/231673 this
allows hardened services to use nullmailer's sendmail.
2023-07-13 17:02:19 +02:00
Oliver Richter 9d6cd34766 esdm: init at 0.6.0
Signed-off-by: Oliver Richter <richter-oliver@gmx.net>
2023-07-13 16:08:12 +02:00
Sebastian Sellmeier 57071b60fe
cups: add xdg-open as dependency package as substitution does not work
for all desktop-envs
2023-07-13 15:37:00 +02:00
github-actions[bot] f4330398cd
Merge master into staging-next 2023-07-13 12:01:13 +00:00
Philipp Bartsch 30ad9053ab nixos/murmur: add apparmor policy 2023-07-13 11:11:01 +02:00
Philipp Bartsch ced170c030 nixos/miniflux: add apparmor policy
This change also extends the test to ensure that normal operations
aren't denied.
2023-07-13 11:10:39 +02:00
Jon Seager 3de6be0951
nixos/homepage-dashboard: init 2023-07-13 09:38:26 +01:00
adisbladis c88c434c34 nixos/lemmy: Move pictrs url from pictrs_url to pictrs.url
The upstream config schema changed.
2023-07-13 15:46:30 +12:00
adisbladis 2bc5b80182 lemmy-ui: Set NODE_ENV to run server in production mode 2023-07-13 15:46:30 +12:00
Philipp Bartsch 0f474b4c6c nixos/apparmor: support custom i18n glibc locales
The i18n nixos module creates a customized glibcLocales package.
Use the system specific glibcLocale instead of the vanilla one.
2023-07-12 21:38:31 +02:00
github-actions[bot] 79f291cd13
Merge master into staging-next 2023-07-12 18:01:11 +00:00
Artturin 4cf8006173 nixos/ananicy: take listOf attrs instead of string 2023-07-12 20:13:03 +03:00
Lassulus 0e1fc501c6
Merge pull request #241927 from ether42/usbguard
nixos/usbguard: rename services.usbguard.implictPolicyTarget to services.usbguard.implicitPolicyTarget
2023-07-12 18:58:30 +02:00
Yureka 5934231542 nixos/peering-manager: remove global 'with lib;' 2023-07-12 18:39:55 +02:00
Yureka 041e9a8e7a nixos/peering-manager: add meta section 2023-07-12 18:39:54 +02:00
Pol Dellaiera f3d3147417
Merge pull request #241528 from Gerg-L/nixos/direnvrc
nixos/direnv: init
2023-07-12 16:42:40 +02:00
Gerg-L 194a3a7d97 nixos/direnv: init 2023-07-12 08:48:17 -04:00
Sandro 5aa53b205e
Merge pull request #208924 from erdnaxe/nitter-network-online 2023-07-12 14:19:30 +02:00
github-actions[bot] bc41da4eb9
Merge master into staging-next 2023-07-12 12:01:23 +00:00
Cabia Rangris d857b1261c
Merge pull request #241667 from cyberus-technology/outline-0.70.0
outline: 0.69.2 -> 0.70.2
2023-07-12 14:45:40 +04:00
Rick van Schijndel e1163b27dd
Merge pull request #242912 from chayleaf/fix-getent
treewide: update path to getent
2023-07-12 12:37:08 +02:00
Jon Seager b853c70661
nixos/prowlarr: add package option 2023-07-12 10:19:05 +01:00
Felix Buehler bec27fabee treewide: use lib.optional instead of 'then []' 2023-07-12 09:36:28 +01:00
Alexander Sieg b926effb76
outline: 0.69.2 -> 0.70.2 2023-07-12 09:54:57 +02:00
Arthur Gautier c8920fc6d9 keepalived: fixup virtualRouterId documentation
Router id 0 is an invalid option with keepalived
2023-07-12 06:12:03 +00:00
github-actions[bot] c7f86a0032
Merge master into staging-next 2023-07-12 00:02:37 +00:00
Arnout Engelen 7e26c8d097
prometheus-exporter-nextcloud: support for auth tokens
Fixes #176849
2023-07-12 00:32:17 +02:00
Sandro f57af4cd1e
Merge pull request #237442 from SuperSandro2000/nixos-option
nixos-option: update to nix 2.15
2023-07-12 00:14:53 +02:00
chayleaf 4d4c73ff78 treewide: update path to getent 2023-07-12 02:32:23 +07:00
Sandro d6d6d42c74
Merge pull request #237364 from fdietze/patch-3
fix herbstluftwm session command with other desktop managers
2023-07-11 21:14:20 +02:00
Sandro Jäckel 49d0af0f1e
nixos/tools: remove nixos-option condition 2023-07-11 17:13:21 +02:00
emilylange da58b13615
nixos/gitea: revert change to RuntimeDirectoryMode
As this broke most unix socket setups and there is a far better suited
`server.UNIX_SOCKET_PERMISSION` in gitea/forgejo itself.

https://docs.gitea.io/en-us/administration/config-cheat-sheet/#server-server

ref: a0311e5107
2023-07-11 17:05:45 +02:00
github-actions[bot] 8e15f4621a
Merge master into staging-next 2023-07-11 00:02:57 +00:00
nikstur 3b6bc9b536 nixos/filesystems: init squashfs 2023-07-10 22:02:36 +02:00
Linus Heckemann 7d2124f9e3 stage-1: Only copy mdadm and mdmon into initramfs if enabled 2023-07-10 20:31:13 +02:00
Linus Heckemann c0f963a338 boot.initrd.services.swraid -> boot.swraid
Since the option affects both stage-1 and stage-2, it does not make
sense to keep it within the boot.initrd namespace.
2023-07-10 20:20:08 +02:00
Linus Heckemann 0b277bcc2b nixos/swraid: make entire module optional
swraid support will now only be enabled by default if stateVersion is
older than 23.11. nixos-generate-config will now generate explicit
config for enabling support if needed.
2023-07-10 16:39:35 +02:00
github-actions[bot] 09bdd38107
Merge master into staging-next 2023-07-10 00:02:30 +00:00
Sandro eae22520b9
Merge pull request #237802 from SuperSandro2000/ceph-package-options
nixos/ceph: add options to configure package used by each component
2023-07-09 23:38:28 +02:00
Philipp Bartsch ad7ffe3a7c nixos/apparmor: fix syntax in abstractions/bash 2023-07-09 22:25:30 +02:00
Philipp Bartsch 9145e6df84 nixos/apparmor: add missing abstraction/nss-systemd
The abstraction/nameservice profile from apparmor-profiles package
includes abstractions/nss-systemd. Without "reexporting" it,
the include fails and we get some errors.
2023-07-09 22:21:44 +02:00
Jacob Moody 5f97e78c64 pam_dp9ik: init at 1.5 2023-07-09 14:12:21 -05:00
Atemu 2616bb762b nixos/paperless: explain how to set JSON env vars
Co-authored-by: Christian Theune <ct@flyingcircus.io>
Co-authored-by: Erik Arvstedt <erik.arvstedt@gmail.com>
2023-07-09 19:52:06 +02:00
github-actions[bot] c60d48234a
Merge master into staging-next 2023-07-09 12:01:18 +00:00
Lily Foster 5c1583bfd7
nixos/plymouth: fix minor doc rendering issue 2023-07-09 02:31:05 -04:00
github-actions[bot] a52559d1f6
Merge master into staging-next 2023-07-09 06:01:18 +00:00
K900 8533b23159 nixos/networkd: fix mismerge of #240969 and #241362 2023-07-09 07:34:42 +03:00