Commit graph

35260 commits

Author SHA1 Message Date
Yethal 91bb1c6d75
oci-containers: consolidate capabilities interface (#363574)
* oci-containers: consolidate capabilities interface

* Update nixos/modules/virtualisation/oci-containers.nix

Improved wording

Co-authored-by: Benjamin Staffin <benley@zoiks.net>

---------

Co-authored-by: Benjamin Staffin <benley@zoiks.net>
2024-12-12 11:50:13 -05:00
Maximilian Bosch 4c092f5bcd
Merge: nixos/postgresql: Add finalPackage attribute (#364261) 2024-12-12 17:03:33 +01:00
Arne Keller 0a324bb35b
scanservjs: init at 2.27.1; nixos/scanservjs: init (#249806) 2024-12-12 17:01:22 +01:00
Tom Hubrecht 0bdb7a72b1
nixos/postgresql: Add finalPackage attribute
This allows refering to the actual installed package, which is necessary
when using plugins and wanting to use postgres in scripts
2024-12-12 16:54:06 +01:00
Maximilian Bosch 4fb843e646
Merge: nixos/doc: document how to allow-list tablespaces (#364312) 2024-12-12 16:43:10 +01:00
Arne Keller 8bbf8450e4
extlinux-conf-builder: don't emit MENU when timeout is zero (#318778) 2024-12-12 16:31:02 +01:00
WilliButz 58df438b47
nixos/systemd-tmpfiles: use types.attrsWith for settings (#363939) 2024-12-12 15:54:31 +01:00
Maximilian Bosch 2be50b1efe
nixos/systemd-tmpfiles: use types.attrsWith for settings
That way it's way easier to derive from the manual which key is used for
what exactly.
2024-12-12 13:48:39 +01:00
Maximilian Bosch 51a6938a44
nixos/doc: document how to allow-list tablespaces
It was brought up that the restricted file-system access breaks
tablespaces[1]. I'd argue that this is the desired behavior, the whole
point of the hardening is the lock the service down and I don't consider
tablespaces common enough to elevate privileges again. Especially since
the workaround is trivial as shown in the diff.

For completeness sake, this adds the necessary `ReadWritePaths` change
to the postgresql section of the manual.

This also adds a small correction about the state of
`ensurePermissions`.

[1] https://github.com/NixOS/nixpkgs/pull/344925#issuecomment-2521188907
2024-12-12 13:42:52 +01:00
Thiago Kenji Okada 0d2883adc2
nixos-rebuild-ng: add module changes and port tests from nixos-rebuild (#363922) 2024-12-12 12:40:40 +00:00
Florian Klink 4e7a971fe4
nixos/waagent: init module (#362101) 2024-12-12 14:11:39 +02:00
Arne Keller abeecc9b02
nixos/minio: add TLS certificates option (#340441) 2024-12-12 10:22:07 +01:00
Arne Keller 27aef3ef74
nixos/dokuwiki: Don't force http with Caddy (#327743) 2024-12-12 10:21:24 +01:00
Arne Keller e3f940648e
nixos/zfs: do not auto-import pools marked noauto (#352391) 2024-12-12 06:51:39 +01:00
Sandro b4cf66f226
nixos/portunus: fix defaultText (#364382) 2024-12-12 00:45:44 -05:00
Leah Amelia Chen 68891efe67
marytts: init at 5.2.1-unstable-2024-10-09, nixos/marytts: init (#351933)
* marytts: init at 5.2.1-unstable-2024-10-09

* nixos/marytts: init module

* nixos/marytts: add tests
2024-12-12 00:12:54 -05:00
Andrew Marshall 7f8278a264 nixos/zfs: do not auto-import pools marked noauto
This requires all datasets for the pool specified in `fileSystems` to be
marked noauto.

Note that this implicitly skips some tasks for the pool, such as
`expandOnBoot`, as the pool will not be imported at that time.
2024-12-11 22:56:13 -05:00
Arne Keller 1a0bc2c68d
nixos/rtkit: Add option for rtkit-daemon command-line args (#299696) 2024-12-11 23:00:50 +01:00
Bjørn Forsman 886de305c8 nixos/rtkit: mention pipewire in docstring
I don't know the reason for rtkit only getting enabled by
hardware.pulseaudio.enable and not services.pipewire.enable, as they
both use it to get real-time priority, but we can at least help users by
mentioning pipewire in the rtkit option.
2024-12-11 20:52:13 +01:00
misuzu 21e39e915f
system/activation: mention deps attr in activationScripts example (#363915) 2024-12-11 20:01:19 +02:00
K900 7ea7a19b2d
nixos/bookstack: fix unintended escaping of nginx locations (#363581) 2024-12-11 20:23:22 +03:00
Robert Schütz d55cc4608d
nixos/immich: restrict media filesystem permissions (#361627) 2024-12-11 08:45:12 -08:00
Jenny 2f610f9856
nixos/librenms: order librenms-setup after network.target (#363706) 2024-12-11 13:14:25 +01:00
Aly Raffauf 3de5332bba
nixos/qt: install kio when qt.platformTheme = "kde" (#364032) 2024-12-11 13:17:04 +02:00
misuzu 6c7048f933
programs/yubikey-touch-detector: add PartOf=graphical-session.target (#364117) 2024-12-11 13:06:04 +02:00
Arne Keller bfd7154402
nixos/ebusd: fix device access (#352743) 2024-12-11 11:18:00 +01:00
Leona Maroni 2e5a764eaf
git-worktree-switcher: init at 0.2.4 (#355484) 2024-12-11 11:15:17 +01:00
Alyssa Ross e9eff47002 nixos/networking: don't add extra names to ::1
From hosts(5):

> For each host a single line should be present with the following
> information:
>
>               IP_address canonical_hostname [aliases...]

With lines like "::1 localhost ahost.adomin ahost", we were saying
that the canonical name for "ahost" was "localhost", the opposite of a
canonical name.  This is why a second loopback address (127.0.0.2) is
used for hostnames with IPv4 — if they were put after "localhost" on
the 127.0.0.1 line, the same thing would happen.  With IPv6 we can't
do the same thing as there's only a single loopback address, so
instead the right thing to do is to simply not list the hostnames in
/etc/hosts, and rely on the myhostname NSS plugin, which will handle
this correctly.

(Note that the examples in hosts(5) also do not include IPv6 FQDN or
hostname entries.)
2024-12-11 11:09:40 +01:00
Moritz Vogel 0c1feac497 nixos/ebusd: fix device access 2024-12-11 10:50:54 +01:00
Arne Keller 138ac300df
nixos/v2ray: change the type of config field (#163810) 2024-12-11 10:30:02 +01:00
Majiir Paktu fae5d6025c programs/yubikey-touch-detector: add PartOf=graphical-session.target 2024-12-10 23:30:52 -05:00
Benjamin Saunders fd21ef2a65 nixos/immich: restrict filesystem permissions
immich appears to create this directory with permissions 0755 by
default, which needlessly exposes user data to other processes.
2024-12-10 20:02:17 -08:00
Majiir Paktu e5a456f26f nixos/wireguard-networkd: re-enable by default for networkd users 2024-12-10 19:33:45 -05:00
Majiir Paktu 6bc8dcc630 nixos/wireguard-networkd: use systemd credentials for privateKeyFile and presharedKeyFile 2024-12-10 19:33:45 -05:00
Majiir Paktu cca305f3e3 nixos/wireguard-networkd: fix issue link 2024-12-10 16:57:53 -05:00
Majiir Paktu a93d42e97e nixos/wireguard-networkd: disable by default
Enabling networking.wireguard.useNetworkd currently requires users to
modify the permissions of their private key files. Since that is a bad
upgrade experience, the module should be disabled by default for now.
Once systemd credential support is added to the module, it should be
safe to once again enable it by default for networkd users.
2024-12-10 16:54:50 -05:00
misuzu 22b87b1b7e
nixos/bat: init (#350079) 2024-12-10 22:33:34 +02:00
misuzu ad12b26526
nixos/crab-hole: init (#341598) 2024-12-10 22:16:50 +02:00
NiklasVousten bd4a6b9aae nixos/crab-hole: init crab-hole 2024-12-10 21:08:31 +01:00
Silvan Mosberger 4f0dadbf38 treewide: format all inactive Nix files
After final improvements to the official formatter implementation,
this commit now performs the first treewide reformat of Nix files using it.
This is part of the implementation of RFC 166.

Only "inactive" files are reformatted, meaning only files that
aren't being touched by any PR with activity in the past 2 months.
This is to avoid conflicts for PRs that might soon be merged.
Later we can do a full treewide reformat to get the rest,
which should not cause as many conflicts.

A CI check has already been running for some time to ensure that new and
already-formatted files are formatted, so the files being reformatted here
should also stay formatted.

This commit was automatically created and can be verified using

    nix-build a08b3a4d19.tar.gz \
      --argstr baseRev b32a094368
    result/bin/apply-formatting $NIXPKGS_PATH
2024-12-10 20:26:33 +01:00
Thiago Kenji Okada 43e6aa5bd2 nixos-rebuild-ng: enable reexec if system.rebuild.enableNg is enabled 2024-12-10 18:38:08 +00:00
Thiago Kenji Okada ae6664cc51 nixos/tools: add system.rebuild.enableNg 2024-12-10 18:38:08 +00:00
Arne Keller 9ad61cfc19
nixos/plymouth: add support for logo in catppuccin (two-step) theme (#304045) 2024-12-10 18:43:49 +01:00
Fernando Rodrigues 3a068accfd
nixos/bat: init bat module
Signed-off-by: Fernando Rodrigues <alpha@sigmasquadron.net>
2024-12-10 14:38:30 -03:00
Sandro d6e107169b
ArchiSteamFarm: 6.0.8.7 -> 6.1.0.3 (#361305) 2024-12-10 18:01:38 +01:00
Nick Cao fa559bd562
redis - complete lib refactor (#363775) 2024-12-10 10:55:26 -05:00
phaer df8e6f7487 system/activation: mention deps attr in activationScripts example
As it helps making deps easier to discover - as we don't currently
render submodule options in the module correctly - and is arguably
more technical correct: When using nixos-install to install nixos
into a chroot in i.e. /mnt, there's no gurantee that /mnt/dev exists
before the specialfs phase ran.
2024-12-10 14:17:09 +01:00
Aaron Andersen acaee51228
nixos/redmine: Change type of services.redmine.stateDir to path (#363430) 2024-12-10 07:17:08 -05:00
Andrew Frahn c146818be2 nixos/services.redis: complete removal of with lib; 2024-12-10 16:19:03 +11:00
jiriks74 3318aa52de
nixos/git-worktree-switcher: init git-worktree-switcher
This module sets up shells so that they work with
[git-worktree-switcher](https://github.com/mateusauler/git-worktree-switcher)
2024-12-10 03:39:13 +01:00