Commit graph

37915 commits

Author SHA1 Message Date
Sandro 49d1eedf46
nixos/postsrsd: expose socketPath via module option (#406386) 2025-05-12 15:17:13 +02:00
K900 5b99c79903
nixos/udev: verify udev rules with udevadm (#406284) 2025-05-12 12:35:34 +03:00
Oliver Schmidt 047a804449 nixos/postsrsd: expose socketPath via module option
Services utilising postsrsd need to connect to it via a Unix socket.
While the path to that socket is static as of now, the discoverability
of that path suffers from the lack of module documentation and a
scattered definition of the individual path components over at least
three lines, even when reading the module source.

By exposing the socket path as a readOnly NixOS option, that value shows
up in the options overview and can be re-used in other parts of NixOS
config.
2025-05-12 09:51:17 +02:00
Wolfgang Walther 9d78475ae9
nixos/pgbackrest: prevent storing secrets in store
While we're not (fully) supporting the related features, yet, we already
prevent accidental storage of secrets in the store. This will also avoid
breaking changes in the future, when those features are properly
supported.
2025-05-12 09:14:39 +02:00
Wolfgang Walther 82e519947f
nixos/pgbackrest: add SFTP support 2025-05-12 09:14:38 +02:00
Wolfgang Walther d5ddb6116f
nixos/pgbackrest: init module 2025-05-12 09:14:37 +02:00
Leona Maroni f79b568519
nixos/gitlab: add activeRecord key files (#405047) 2025-05-12 08:40:16 +02:00
Leona Maroni 3724b37770
nixos/archtika: remove module and package (#406192) 2025-05-12 08:09:23 +02:00
r-vdp b7fe0a1c0c
nixos/test/installer: make sure we can build the nixos udev rules 2025-05-12 00:37:03 +02:00
r-vdp 51a43f8ad3
Reapply "nixos/udev: verify udev rules using udevadm"
This reverts commit 5d69558f0d.
2025-05-11 22:55:09 +02:00
K900 ca62c09828
nixos/kde-pim: include kcontacts for merkuro's widgets (#406220) 2025-05-11 20:00:31 +03:00
Fernando Rodrigues b6c615196e
nixos/kde-pim: include kcontacts for merkuro's widgets
When using Merkuro in Plasma 6, the 'Contacts' widget will automatically
be added to the default panel. Unfortunately, it does not work unless
`kdePackages.kcontacts` is also present in the environment. This adds
the dependency if Plasma 6 is also enabled alongside Merkuro.

Signed-off-by: Fernando Rodrigues <alpha@sigmasquadron.net>
2025-05-11 16:53:44 +00:00
Maximilian Bosch d2cce43a85
Merge: nixos/ssh: add the systemd-ssh-proxy include directive to the Host * block (#405967) 2025-05-11 17:36:54 +02:00
thiloho a847800945
nixos/archtika: remove module 2025-05-11 16:27:16 +02:00
Jacek Galowicz 08ed87ccc6
nixos/test-driver: allow assigning other vsock number ranges (#405508) 2025-05-11 13:24:41 +02:00
Wolfgang Walther 797c149b3e
nixos/postgresql: improve local peer authentication with default map (#404315) 2025-05-11 10:09:00 +00:00
Wolfgang Walther 3d29b7d3a2
nixos/postgresql: improve local peer authentication with default map
This allows to easily map allowed database roles to system users.
2025-05-11 10:24:21 +02:00
isabel 92d64400d5
nixos/anubis: Fix defaultOptions not applying user-defined settings (#398790) 2025-05-11 08:56:46 +01:00
Martin Weinelt 9da9474d63
nixos/boot/tmp: introduce adaptive huge memory pages (#404514) 2025-05-11 01:23:32 +02:00
abysssol af8538fee6
nixos/ollama: Fix systemd service doesn't use AMD GPU (#405857) 2025-05-10 22:59:56 +00:00
Arne Keller 4d4f8628cd
nixos/libvirtd: Use preferred version of iptables (#228625) 2025-05-10 22:23:51 +02:00
r-vdp 57d91c535b
nixos/ssh: add the systemd-ssh-proxy include directive to the Host * block
Otherwise, then any Host or Match block in the extraConfig will absorb the include
2025-05-10 21:10:48 +02:00
Zhaofeng Li 13bb852869 nixos/libvirtd: Use preferred version of iptables 2025-05-10 12:49:47 -06:00
Seth Flynn 8e551be5f1
nixos/graphics: don't mark package options as internal 2025-05-10 14:36:08 -04:00
Gary Guo 7dd8c5b602 unifi8: drop
This was an alias to the unifi package, which has been updated to v9.
To avoid confusion, remove this alias.
2025-05-10 14:47:52 +01:00
a 1d483cbef1 Resolves #405846 2025-05-10 21:38:58 +12:00
Paul Haerle 36607ba6e6
installer/tools: fix grammatical error in docs (#388452) 2025-05-10 11:31:39 +02:00
Maximilian Bosch b8b86834b7
nixos/test-driver: move sshBackdoor cfg from test-instrumentation to driver
That way, we don't need to duplicate the sshBackdoor options on NixOS-level.

Suggested-by: Jacek Galowicz <jacek@galowicz.de>
2025-05-10 10:40:35 +02:00
Wolfgang Walther f934044282
nixos/hydra: avoid conflicts for local postgres ident map
The key change here is, that the match was on the hydra database only
previously, but is now limited to to the hydra role instead. This avoids
conflicts with rules that are created by other modules or downstream
users.

With this change, we can remove the additional "postgres postgres" line,
because the default pg_hba line will kick in again and allow the
postgres user access to the postgres role.

Renaming the map from hydra-users to hydra is for consistency, so that
all modules can define maps matching in name with the role they manage.

The change from ident to peer is just cosmetic, ident is only used for
TCP connections and falls back to peer anyway.
2025-05-10 10:32:47 +02:00
Maximilian Bosch 12c544e008
nixos/testing: improve wording of vsockOffset description
Co-authored-by: Jacek Galowicz <jacek@galowicz.de>
2025-05-10 10:28:44 +02:00
lassulus fb297f0be8
movim: 0.30 → 0.30.1; {movim,nixos.movim}: mysql → mariadb (#401596) 2025-05-10 07:58:20 +02:00
Peder Bergebakken Sundt f13181e910
waagent: 2.12.0.4 -> 2.13.1.1 (#404876) 2025-05-10 00:08:00 +02:00
K900 5d69558f0d
Revert "nixos/udev: verify udev rules using udevadm" 2025-05-10 00:50:36 +03:00
Gabriel Smith 710e189c6e nixos/ups: run upsmon as non-root user "nutmon" by default
NUT documentation strongly suggests running `upsmon` as a non-root user
with very limited permissions. This includes only read access to
`upsmon.conf`.

Previously the `RUN_AS_USER` setting could be overwritten with
`mkForce`, but this left the system with technically incorrect
permissions on `upsmon.conf` that would prevent reloading. This patch
provides a way to change the user that `upsmon` runs as while
maintaining correct permissions on `upsmon.conf`.

Fixes #318582
2025-05-09 23:11:33 +02:00
Paul Haerle 772ee19537
installer: fix broken search suggestion in default config (#378797) 2025-05-09 20:35:51 +02:00
Arnout Engelen 1a5f51a754
treewide: possibly inactive maintainer ericsagnes (#399433) 2025-05-09 13:51:19 +02:00
Leona Maroni 18ef62172e
nixos/udev: verify udev rules using udevadm (#404323) 2025-05-09 13:03:30 +02:00
Arnout Engelen eb9ce0eed3
treewide: remove inactive maintainer ericsagnes 2025-05-09 12:03:09 +02:00
Maximilian Bosch a9adfc631a
nixos/test-driver: allow assigning other vsock number ranges
I'm a little annoyed at myself that I only realized this _after_ #392030
got merged. But I realized that if something else is using AF_VSOCK or
you simply have another interactive test running (e.g. by another user
on a larger builder), starting up VMs in the driver fails with

    qemu-system-x86_64: -device vhost-vsock-pci,guest-cid=3: vhost-vsock: unable to set guest cid: Address already in use

Multi-user setups are broken anyways because you usually don't have
permissions to remove the VM state from another user and thus starting
the driver fails with

    PermissionError: [Errno 13] Permission denied: PosixPath('/tmp/vm-state-machine')

but this is something you can work around at least.

I was considering to generate random offsets, but that's not feasible
given we need to know the numbers at eval time to inject them into the
QEMU args. Also, while we could do this via the test-driver, we should
also probe if the vsock numbers are unused making the code even more
complex for a use-case I consider rather uncommon.

Hence the solution is to do

    sshBackdoor.vsockOffset = 23542;

when encountering conflicts.
2025-05-09 11:54:00 +02:00
fleaz 8638793548 nixos/gitlab-runner: Add dockerPullPolicy option 2025-05-09 09:34:00 +02:00
Maximilian Bosch 7aa84359d4
Merge: nixos/postgresql: remove recoveryConfig option (#405186) 2025-05-09 09:28:23 +02:00
Jacek Galowicz 8b3baa1402
nixos/test-driver: add backdoor based on systemd-ssh-proxy & AF_VSOCK (#392030) 2025-05-09 08:03:55 +02:00
sudoforge 8aa7a07653
nixos/iwd: move General.UseDefaultInterface to DriverQuirks.DefaultInterface
`General.UseDefaultInterface` was deprecated last year, with a
recommendation to move to `DriverQuirks.DefaultInterface` [0] [1] [2].

[0]: https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=5c7777ff0fbcdee3c5d3a3cf6b1f375f2e820644
[1]: https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=d223f49fbc622e5b2f270711619ecbd542bed12e
[2]: https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=a27b7823df12c5d185b39aa7777c546843c1c96f
2025-05-08 21:35:40 -07:00
Colin 62cab5dbe8
pkgs/buffybox: 3.2.0-unstable-2025-03-16 -> 3.3.0-unstable-2025-05-06 (#403179) 2025-05-09 02:04:39 +00:00
hustlerone 90ff6dc49e nixos/unl0kr: fix touchpads 2025-05-09 00:29:43 +02:00
K900 c50e195272
grafana: 11.6.0+security-01 -> 12.0.0 (#404897) 2025-05-09 00:08:35 +03:00
isabel d0d992d748
nixos/regreet: use proper user in tmpfiles (#284722) 2025-05-08 20:31:42 +01:00
Alex Martens fae4917f2f
nixos/homepage-dashboard: harden service (#377886) 2025-05-08 20:28:08 +01:00
r-vdp 1278d56d71
nixos/udev: verify all udev rules using udevadm 2025-05-08 20:34:26 +02:00
Jan Tojnar 5a60a1a922 nixos/gnome: Enable RTKit by default
Without this, Mutter will complain at startup:

    .gnome-shell-wr[1013]: Failed to make thread 'KMS thread' high priority scheduled: GDBus.Error:org.freedesktop.DBus.Error.NameHasNoOwner: Name "org.freedesktop.RealtimeKit1" does not exist

PipeWire, WirePlumber and xdg-desktop-portal-gnome complain about the missing service too.
2025-05-08 18:29:03 +02:00