Commit graph

26876 commits

Author SHA1 Message Date
Sandro c6af5494aa
nixos/nginx: fix services.nginx.defaultListen description 2023-09-03 16:45:10 +02:00
Nick Cao 69596874f1
nixos/mautrix-telegram: drop removed --base-config flag
See also: 9b67b17ac4
2023-09-03 08:59:57 -04:00
linsui 6b2934d6e9 nixos/yazi: init 2023-09-03 17:28:12 +08:00
Ramses 76f8cf18d1 nixos/update-users-groups: no need to include extra package
Co-authored-by: Jörg Thalheim <Mic92@users.noreply.github.com>
2023-09-03 11:26:37 +02:00
r-vdp d560a5e07d nixos/update-users-groups: fix cross compilation
Since #246772, cross compiled NixOS is broken because the DateTime perl
package that was used in the update-users-groups.pl script depends on
Testutf8 which does not cross compile (see #198548).

This PR drops the DateTime dependency in favour of TimePiece, which has
less dependencies and whose closure does cross compile.
2023-09-03 11:26:37 +02:00
Jörg Thalheim f6fa02c984 openrbg: set default based on what microcode updates are enabled
nixos-generate-config sets either of these, so lets use them
2023-09-03 07:16:52 +02:00
oluceps ec0755d5f7
nixos/dae: add example link
Co-authored-by: Mathias Zhang <me@zzzsy.top>
2023-09-03 11:54:36 +08:00
Federico Damián Schonborn 5ab4510232
nixos/budgie: Use the Network Manager Applet indicator
Signed-off-by: Federico Damián Schonborn <fdschonborn@gmail.com>
2023-09-02 15:49:59 -03:00
zzzsyyy 8f070876da
nixos/dae: add confgFile option
Co-authored-by: oluceps <nixos@oluceps.uk>
2023-09-03 02:48:27 +08:00
oluceps 173ff5d2dd
nixos/dae: add more config options 2023-09-03 02:48:24 +08:00
Sanjin Sehic 7f5e8a0113
nixos/healthchecks: enable _FILE variants for all secrets
This change enables _FILE variants for all secrets in Healthchecks
configuration so they can be read from a file and not stored in
/nix/store.

In particular, it adds support for these secrets:
DB_PASSWORD, DISCORD_CLIENT_SECRET, EMAIL_HOST_PASSWORD,
LINENOTIFY_CLIENT_SECRET, MATRIX_ACCESS_TOKEN, PD_APP_ID,
PUSHBULLET_CLIENT_SECRET, PUSHOVER_API_TOKEN, S3_SECRET_KEY, SECRET_KEY,
SLACK_CLIENT_SECRET, TELEGRAM_TOKEN, TRELLO_APP_KEY, and TWILIO_AUTH.
2023-09-02 09:43:19 +01:00
Sanjin Sehic 4a81613aa6
nixos/healthchecks: add EMAIL_HOST_PASSWORD_FILE option
This allows keeping EMAIL_HOST_PASSWORD out of /nix/store.
2023-09-02 09:43:17 +01:00
Sanjin Sehic 9e9f7c4aa6
nixos/healthchecks: define default DB_NAME for postgres and mysql
Previously, if someone changed DB to postgres or mysql and forgot to
change DB_NAME, services.healthchecks would have used the hardcoded path
that was meant for the sqlite as DB_NAME.

This change introduces DB and DB_NAME options in
services.healthchecks.settings.
2023-09-02 09:43:12 +01:00
Artturi 26b11c54d8
Merge pull request #247153 from Artturin/fixwarning1 2023-09-02 03:13:30 +03:00
Florian Klink 90204f058c
Merge pull request #251684 from jmbaur/user-activation-tmpfiles
nixos/systemd-user: call systemd-tmpfiles during activation
2023-09-01 21:52:19 +03:00
Jonas Chevalier 9ace789629
Merge pull request #249103 from yaxitech/github-runner-v2.308.0
github-runner: 2.307.1 -> 2.308.0
2023-09-01 16:31:29 +02:00
Atemu c54f4fdf8c
Merge pull request #248669 from Atemu/dnscrypt-proxy-update-alias
dnscrypt-proxy: rename from dnscrypt-proxy2
2023-09-01 14:37:13 +02:00
Matt Melling 9181483d66
nixos/cloudlog: remove pin for PHP 8.1 2023-08-31 23:51:25 +01:00
Andrew Marshall 189b14246a nixos/networkd: Reload (not restart) when only .network units change
Underneath, systemd-networkd’s reload is just `networkctl reload`. Per
`man networkctl`, calling `reload` is expected to fully handle new,
modified, and removed .network files, but it only handles *new* .netdev
files. For simplicity, assume .network -> reload and .netdev -> restart.

It’s desirable to perform reload instead of restart, as restart has the
potential to bring down interfaces, resulting in a loss of network
connectivity.
2023-08-31 12:24:17 -04:00
Sagi Sarussi f3cf8b679b nixos/kanidm: fix broken doc links 2023-08-31 14:03:30 +03:00
name_snrl 9345e48bb4 privoxy: fix types.string -> types.str 2023-08-30 23:08:13 +05:00
Emery Hemingway 55c8f51af5 nixos/nncp: add caller and daemon services 2023-08-29 21:31:19 +01:00
Martin Weinelt d17a82f986
Merge pull request #252041 from mweinelt/unbound-exporter
prometheus-unbound-exporter: replace at 0.4.4
2023-08-29 21:26:42 +02:00
Jared Baur e39c9f13bc
nixos/systemd-user: call systemd-tmpfiles during activation
Just like with system-wide tmpfiles, call `systemd-tmpfiles --create
--remove` for users during activation. This fixes an issue where new
entries in a user's tmpfiles are not reflected after activation, only at
boot when the user service systemd-tmpfiles-setup.service runs or only
after running systemd-tmpfiles manually.
2023-08-29 10:46:44 -07:00
Martin Weinelt 73c5a5a778
nixos/prometheus/unbound-exporter: update for new package
The command line interface changed slightly, but still supports the TCP
as well as the UDS control interface.
2023-08-28 23:21:52 +02:00
Artturi 206ca4bef4
Merge pull request #246487 from amjoseph-nixpkgs/pr/binfmt-mips 2023-08-28 22:40:30 +03:00
Jan Tojnar 434d160d7c
Merge pull request #234615 from linsui/dconf
nixos/dconf: support generating from attrs
2023-08-28 18:31:52 +02:00
ajs124 dbb69f82c6 nixos/restic: add wrapper scripts that set parameters for backup
and use in test
2023-08-28 15:17:37 +02:00
ajs124 4732cbf3f8 nixos/restic: use openssh as configured in programs.ssh 2023-08-28 15:03:12 +02:00
Pol Dellaiera df24943cc0
Merge pull request #249765 from NixOS/nixos/modules/honk-init
nixos/honk: init
2023-08-28 10:40:23 +02:00
Janne Heß fd454fe4b6
Merge pull request #250316 from helsinki-systems/feat/stc-improve-mount-units
nixos/switch-to-configuration: Improve mount unit handling
2023-08-28 09:18:44 +02:00
Maciej Krüger 369e18f1c7
networking/nftables: ensure deletions 2023-08-28 00:44:16 +02:00
Maciej Krüger 6658b3fcf1
networking/nftables: make ruleset+rulesetFile non-exclusive 2023-08-28 00:40:22 +02:00
Maciej Krüger a1dd69d761
networking/nftables: enable flushRuleset by default if rulset{,File} used 2023-08-28 00:40:21 +02:00
Maciej Krüger 55213b54f0
nixos/nftables: save deletions to file and run them afterwards
Co-authored-by: duament
2023-08-28 00:40:20 +02:00
Maciej Krüger 5f300ad70c
networking/nftables: only delete our tables if flushRuleset is set to false 2023-08-28 00:40:19 +02:00
Maciej Krüger d5a0826686
networking/nftables: remove no longer relevant conflict warnings 2023-08-28 00:40:18 +02:00
Maciej Krüger cd3af25932
networking/nftables: enable flushing ruleset for older versions
Co-authored-by: Naïm Favier <n@monade.li>
2023-08-28 00:35:39 +02:00
Maciej Krüger 311d2fa994
*: migrate to using nftables.tables instead of ruleset directly 2023-08-28 00:30:29 +02:00
Maciej Krüger 048ef0d455
networking/nftables: add .tables property and disable ruleset flushing by default
This allows for other unmanaged tables to co-exist peacefully on the os,
by having the nixos-managed tables be re-created atomically and the other
tables will simply be left untouched.
2023-08-28 00:30:28 +02:00
Pol Dellaiera 48de649336
nixos/modules/honk: init 2023-08-27 23:43:40 +02:00
Theodore Ni c68a6a21ca
Merge pull request #247909 from Sigmanificient/ragnarwm
ragnarwm: init at 1.3.1
2023-08-27 13:41:04 -07:00
happysalada 676fe5e01b lemmy: fix ui commit_hash path 2023-08-27 20:44:10 +08:00
Robert Obryk c64bbd4466 nixos/security/wrappers: remove all the assertions about readlink(/proc/self/exe)
Given that we are no longer inspecting the target of the /proc/self/exe
symlink, stop asserting that it has any properties. Remove the plumbing
for wrappersDir, which is no longer used.

Asserting that the binary is located in the specific place is no longer
necessary, because we don't rely on that location being writable only by
privileged entities (we used to rely on that when assuming that
readlink(/proc/self/exe) will continue to point at us and when assuming
that the `.real` file can be trusted).

Assertions about lack of write bits on the file were
IMO meaningless since inception: ignoring the Linux's refusal to honor
S[UG]ID bits on files-writeable-by-others, if someone could have
modified the wrapper in a way that preserved the capability or S?ID
bits, they could just remove this check.

Assertions about effective UID were IMO just harmful: if we were
executed without elevation, the caller would expect the result that
would cause in a wrapperless distro: the targets gets executed without
elevation. Due to lack of elevation, that cannot be used to abuse
privileges that the elevation would give.

This change partially fixes #98863 for S[UG]ID wrappers. The issue for
capability wrappers remains.
2023-08-27 14:10:38 +02:00
Robert Obryk e3550208de nixos/security/wrappers: read capabilities off /proc/self/exe directly
/proc/self/exe is a "fake" symlink. When it's opened, it always opens
the actual file that was execve()d in this process, even if the file was
deleted or renamed; if the file is no longer accessible from the current
chroot/mount namespace it will at the very worst fail and never open the
wrong file. Thus, we can make a much simpler argument that we're reading
capabilities off the correct file after this change (and that argument
doesn't rely on things such as protected_hardlinks being enabled, or no
users being able to write to /run/wrappers, or the verification that the
path readlink returns starts with /run/wrappers/).
2023-08-27 14:10:38 +02:00
Robert Obryk 1bdbc0b0fe nixos/security/wrappers: stop using .real files
Before this change it was crucial that nonprivileged users are unable to
create hardlinks to SUID wrappers, lest they be able to provide a
different `.real` file alongside. That was ensured by not providing a
location writable to them in the /run/wrappers tmpfs, (unless
disabled) by the fs.protected_hardlinks=1 sysctl, and by the explicit
own-path check in the wrapper. After this change, ensuring
that property is no longer important, and the check is most likely
redundant.

The simplification of expectations of the wrapper will make it
easier to remove some of the assertions in the wrapper (which currently
cause the wrapper to fail in no_new_privs environments, instead of
executing the target with non-elevated privileges).

Note that wrappers had to be copied (not symlinked) into /run/wrappers
due to the SUID/capability bits, and they couldn't be hard/softlinks of
each other due to those bits potentially differing. Thus, this change
doesn't increase the amount of memory used by /run/wrappers.

This change removes part of the test that is obsoleted by the removal of
`.real` files.
2023-08-27 14:10:36 +02:00
Robert Obryk 44fde723be nixos/security/wrappers: generate a separate and more complete apparmor policy fragment for each wrapper
This change includes some stuff (e.g. reading of the `.real` file,
execution of the wrapper's target) that belongs to the apparmor policy
of the wrapper. This necessitates making them distinct for each wrapper.
The main reason for this change is as a preparation for making each
wrapper be a distinct binary.
2023-08-27 14:10:07 +02:00
Nick Cao 3b5bb2461c
Merge pull request #249726 from hughobrien/restic-service-network-target
nixos/restic: wait for network-online for timed backups
2023-08-27 13:06:19 +08:00
Franz Pletz da9db25ca4
Merge pull request #222515 from codedownio/tmux-run-plugins-last 2023-08-26 22:47:33 +02:00
Maciej Krüger ebdd6efe6c
Merge pull request #251412 from karolinschlegel/update-odoo 2023-08-26 21:32:48 +02:00
Janik 321734bc2b
Merge pull request #251157 from NetaliDev/vmagent-extra-options 2023-08-26 21:21:11 +02:00
Janik 1f0c325739
Merge pull request #250976 from Shados/sddm-include-tmpfile-config 2023-08-26 20:21:20 +02:00
Karolin Schlegel 19d7454123 odoo: 15.20230317 -> 16.20230722 2023-08-26 10:22:57 +02:00
Franz Pletz 08c65ad526
Merge pull request #251370 from leona-ya/paperless-ngx-mail-ca-certs
nixos/paperless: allow systemd services to read ca-certificates
2023-08-26 03:20:25 +02:00
Franz Pletz da37904672
Merge pull request #246772 from R-VdP/nixos-user-expiry
nixos/update-users-groups: add support for account expiry
2023-08-26 02:41:34 +02:00
Franz Pletz fe907aa37e
Merge pull request #242365 from h7x4/add-mysqld-exporter
services/prometheus/exporters: add mysqld
2023-08-25 23:56:22 +02:00
Leona Maroni 87f21ac4e6
nixos/paperless: allow systemd services to read ca-certificates
This fixes a regression introduced with the update to 1.17.0.
Since this version paperless-ngx checks the ssl certificates of remote
email servers.
2023-08-25 16:54:04 +02:00
revol-xut 0ebb3b6ed8 nixos/netbox: add keycloakClientSecret option 2023-08-25 15:42:44 +01:00
Lin Jian 665651c736 emacs: remove outdated doc about package initialization
Since Emacs 27[1], there is no need to call package-initialize in the
init file.

[1]: https://git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS.27?id=cae528457cb862dc886a34240c9d4c73035b6659#n227
2023-08-25 10:22:30 +00:00
Lin Jian 0d3ba90f52 nixos/emacs: replace emacs with Emacs in the doc 2023-08-25 10:22:30 +00:00
Arnout Engelen 4dcaa04151
Merge pull request #242942 from raboof/prometheus-nextcloud-auth-token
prometheus-exporter-nextcloud: support for auth tokens
2023-08-25 09:54:23 +02:00
Ingolf Wagner 7f2b869560
nixos/tts: fix error messages read before text
with a config like this :

```
services.tts = {
  servers = {
    english = {
      enable = true;
      port = 5300;
      model = "tts_models/en/ljspeech/vits"
    };
  };
};
```

You the WAVs tts creates contain an error message which will be read to
you before the text you typed in will be read to you.
This patch fixes that.
2023-08-25 09:48:46 +02:00
Ilan Joselevich 0f95d1cfe1
Merge pull request #248748 from acid-bong/zshLsColors
nixos/zsh: add enableLsColors
2023-08-24 22:04:43 +03:00
Ilan Joselevich 649fadd226
Merge pull request #250761 from gepbird/dwm-fix-java-gui
dwm: add _JAVA_AWT_WM_NONREPARENTING=1
2023-08-24 22:02:38 +03:00
Benjamin Staffin 63f858bdf8
hddfancontrol: license and metadata tweaks (#251184)
* nixos/hddfancontrol: missed a few code review tweaks

Following up on https://github.com/NixOS/nixpkgs/pull/239801#pullrequestreview-1498132501

* hddfancontrol: Fix license field
2023-08-24 12:41:43 -04:00
Jennifer Graul f0b76e7d10
nixos/vmagent: add extraOptions option 2023-08-24 15:09:29 +02:00
K900 9ab379753f
Merge pull request #250974 from K900/wine-binfmt-mask
nixos/binfmt: use PE magic to detect Wine executables
2023-08-24 12:54:21 +03:00
Pierre Bourdon 4428f3a79a
Revert "nixos/security/wrappers: simplifications and a fix for #98863" 2023-08-24 08:35:11 +02:00
Nick Cao 6408fedbfa
Merge pull request #248855 from NickCao/zram-generator
nixos/zram: use nixos/zram-generator as backing implementation
2023-08-24 08:57:22 +08:00
Nick Cao 8d524e610b
Merge pull request #249502 from oddlama/feat-influxdb-provision-full
nixos/influxdb2: add provisioning and nixos tests
2023-08-24 08:55:38 +08:00
Nick Cao e2689c1c98
nixos/zram-generator: drop outdated comments 2023-08-24 08:47:19 +08:00
Pierre Bourdon 0930308453
Merge pull request #199599 from robryk/suidwrapnoreal
nixos/security/wrappers: simplifications and a fix for #98863
2023-08-24 01:09:36 +02:00
Ilan Joselevich 49f76fea56
Merge pull request #251032 from Kranzes/twingate-resolved
nixos/twingate: avoid conflicts with resolved
2023-08-24 01:39:27 +03:00
Pol Dellaiera ef45c82289
Merge pull request #250648 from mfrw/mfrw/tailscale
tailscale: 1.46.1 -> 1.48.1
2023-08-24 00:22:26 +02:00
Ilan Joselevich e739ef8066
nixos/twingate: avoid conflicts with resolved 2023-08-23 23:01:47 +03:00
Emily 73a060e7ca
Merge pull request #244626 from Sohalt/caddy-rfc42
nixos/caddy: Add rfc42 settings option
2023-08-23 20:36:46 +02:00
Benjamin Staffin 12b3178bd2 nixos/hddfancontrol: initial module & test 2023-08-23 13:25:29 -04:00
K900 c6cf85b0d5 nixos/binfmt: use PE magic to detect Wine executables
Otherwise we break every Meson build because it creates native executables named foo.exe
2023-08-23 16:20:57 +03:00
Alexei Robyn 4d0d7fb93e nixos/sddm: avoid systemd-tmpfiles-clean removing user's $XAUTHORITY 2023-08-23 22:52:50 +10:00
oddlama 8b5b7def91
nixos/influxdb2: add org, bucket, users and auth provisioning 2023-08-23 14:46:52 +02:00
Atemu 65f20da184
Merge pull request #246008 from Atemu/emacs-daemon-fix-display
nixos/emacs: start emacs service with the graphical-session
2023-08-23 11:46:52 +02:00
Muhammad Falak R Wani 3f141be99c
tailscale: add mfrw as maintainer
Signed-off-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
2023-08-23 08:32:33 +05:30
sohalt c01874615b nixos/caddy: Add rfc42 settings option 2023-08-22 20:14:35 +02:00
Vincent Haupert 388bfcef4a nixos/github-runners: add nodeRuntimes option 2023-08-22 15:52:35 +02:00
Arian van Putten 3eb0214551 modules/image/repart: Fix stripNixStorePrefix
It seems it wasn't working
2023-08-22 13:09:03 +02:00
Gutyina Gergő 2a71e7815e
dwm: add _JAVA_AWT_WM_NONREPARENTING=1
dwm is not in Java's internal list of non-reparrenting
window managers. Running Java GUI programs without this
variable on window managers (eg. jd-gui) causes the window
to be blank.
2023-08-22 12:56:59 +02:00
Samuel Dionne-Riel faa0c27293
Merge pull request #245739 from dev-null-undefined/grub-specialisations
nixos/grub: Add submenu for each generation with specialisation
2023-08-21 23:03:59 -04:00
Benjamin Staffin 63e9b2f8c0
Merge pull request #246354 from minijackson/netbox-fixes
netbox: 3.5.6 -> 3.5.7 + migration fixes + upgrade NixOS test
2023-08-21 16:22:38 -04:00
dev-null-undefined a39526b3ef
nixos/grub: Add submenu for each generation with specialisation
Before this commit there was no way to access (boot into) specialisation of previous generations from grub,even tho they are there.

This commit will add grub submenu for each generation if the generation has any specialisation.
Which will allow you to boot into them.

Co-authored-by: Samuel Dionne-Riel <samuel@dionne-riel.com>
2023-08-21 21:44:42 +02:00
Ember Keske 0138e327c1 grocy: clear viewcache before start 2023-08-21 10:36:24 +02:00
Janne Heß eb831f759b
nixos/stc: Improve mount unit handling
We should sometimes restart the units rather than reloading them so the
changes are actually applied. / and /nix are explicitly excluded because
there was some very old issue where these were unmounted. I don't think
this will affect many people since most people use fstab mounts instead
but I plan to adapt this behavior for fstab mounts as well in the future
(once I wrote a test for the fstab thingies).
2023-08-21 09:07:14 +02:00
Bruno BELANYI 200c3bad42 nixos/woodpecker-agents: add 'path' option
See #249602.
2023-08-20 22:26:52 +02:00
Sigmanificient 0482394fe0 ragnarwm: init at 1.3.1 2023-08-20 18:20:39 +02:00
github-actions[bot] 1bb285561e
Merge master into staging-next 2023-08-20 06:00:56 +00:00
Bobby Rong 5f75be53ea
Merge pull request #249712 from bobby285271/upd/cinnamon-qt-style
nixos/cinnamon: Override Qt apps style again
2023-08-20 11:35:23 +08:00
github-actions[bot] f6a4c6f912
Merge master into staging-next 2023-08-20 00:02:29 +00:00
Tobias Widmann e4a62b0fd1 nixos/htop: fix boolean values in settings option
When generating htoprc, in order to be recognized by htop, a boolean value
of 'false' should be written as '0', not an empty string.
2023-08-20 00:10:24 +02:00
Martin Weinelt 7c75694db9
Merge pull request #240982 from rnhmjoj/pr-jool
nixos/jool: add service for setting up SIIT/NAT64
2023-08-19 23:32:05 +02:00
Doron Behar ab1fe60481
Merge pull request #249860 from errnoh/goxlr-utility
goxlr-utility: init at 0.12.6 (fixes #243701)
2023-08-19 19:10:40 +00:00
github-actions[bot] b34f222b02
Merge master into staging-next 2023-08-19 18:00:51 +00:00
Bruno BELANYI 6dd4c5f73f nixos/woodpecker-agents: use 'literalExample'
The next commit is going to add an option which takes a list of
packages. So the example must be converted to make it documentable.

This will also allow adding comments, to explain why some options are
used.
2023-08-19 16:29:10 +01:00
Bruno BELANYI 7d246a2873 nixos/woodpecker-agents: fix typos in doc
The name of the backend is `local`, not `exec`.

`environmentFile` is supposed to be a list.
2023-08-19 16:28:31 +01:00
Bruno BELANYI f7151209c4 nixos/woodpecker-agents: fix 'podman' example
The name should match the fact that we're using `podman` instead of
`docker`.

And the group was wrong.
2023-08-19 16:28:31 +01:00
Erno Hopearuoho 3748c8b483 goxlr-utility: init module 2023-08-19 17:16:41 +03:00
francescoDeSimone 42f0af4abe nixos/duplicati: add package option 2023-08-19 16:08:39 +02:00
Ilan Joselevich 6e3d657482
Merge pull request #247776 from f2k1de/graylog-5.1
graylog-5_1: init at 5.1.4
2023-08-19 16:00:11 +03:00
github-actions[bot] d3b2560b73
Merge master into staging-next 2023-08-19 12:01:03 +00:00
Ember Keske 0b1ef8ea9e grocy: 4.0.0 -> 4.0.2 2023-08-19 13:52:07 +02:00
Franz Pletz 4fe4a74fe5
Merge pull request #246713 from n0emis/grocy-4.0.0
grocy: 3.3.0 -> 4.0.0
2023-08-19 13:41:22 +02:00
Ember Keske 66ee520289 grocy: replace @ma27 with @n0emis as maintainer 2023-08-19 13:02:04 +02:00
Pol Dellaiera cac8909c85
Merge pull request #250100 from NixOS/ioquake3/update
ioquake3: fix missing `.so` files at startup and clean-up
2023-08-19 12:31:33 +02:00
Alexandre Iooss 64a71aea98 nixos/galene: do not restrict AF_NETLINK
Built-in TURN server requires AF_NETLINK address family.
2023-08-19 08:47:01 +02:00
Pol Dellaiera 849c75577d
nixos/openarena: cleanup
- Remove `with lib;`
- Add `package` config option
- Adjust paths accordingly in `ExecStart`
2023-08-19 07:28:14 +02:00
Pol Dellaiera 5fdff213c9
nixos/quake3-server: add package config option
- Remove top-level `with lib;`
2023-08-19 07:07:08 +02:00
Hugh O'Brien a08d69ba63
nixos/restic: wait for network-online for timed backups 2023-08-18 20:02:16 -04:00
github-actions[bot] 4a9909e0db
Merge master into staging-next 2023-08-19 00:01:42 +00:00
Adam Stephens 1403486d17 nixos/lxd-agent: init module from distrobuilder generator 2023-08-18 22:28:59 +00:00
github-actions[bot] 1949ef2080
Merge master into staging-next 2023-08-18 18:00:57 +00:00
Nick Cao a4c6594dcd
nixos/influxdb2: do not load passwordFile and tokenFile when provisioning is disabled 2023-08-18 20:25:53 +08:00
github-actions[bot] f1d7a13229
Merge master into staging-next 2023-08-18 00:01:46 +00:00
Artturi 52be2cdfea
Merge pull request #249788 from Niki4tap/dwm-fix-hash 2023-08-17 22:08:55 +03:00
Felix Bühler 96481fd201
Merge pull request #249323 from kevincox/photoprism-chmod
nixos.photoprism: Relax sandbox to allow running exiftool
2023-08-17 21:01:40 +02:00
Niki4tap bd0b732bef dwm: use correct hash in example 2023-08-17 21:14:35 +03:00
github-actions[bot] 3b76a64c44
Merge master into staging-next 2023-08-17 12:01:23 +00:00
Bobby Rong 26adac4d27
nixos/cinnamon: Override Qt apps style again
Use gtk2 to follow Mint's decision for now.
2023-08-17 17:08:29 +08:00
Bobby Rong fd1f73aaa2
Merge pull request #249312 from FedericoSchonborn/budgie/magpie
budgie.magpie: init at 0.9.2, replace Mutter with it on Budgie
2023-08-17 15:43:43 +08:00
github-actions[bot] 2e936d668c
Merge master into staging-next 2023-08-17 06:00:58 +00:00
Federico Damián Schonborn 9325eefbdc
nixos/budgie: Add Magpie to services.udev.packages
Signed-off-by: Federico Damián Schonborn <fdschonborn@gmail.com>
2023-08-17 00:56:43 -03:00
Nick Cao acd40c3925
Merge pull request #249432 from linj-fork/fix-aspell
nixos/environment: stop setting ASPELL_CONF
2023-08-17 08:20:52 +08:00
Ilan Joselevich fb1f530bc6
Merge pull request #249521 from Kranzes/oauth2-proxy
nixos/oauth2_proxy: service after network.target -> network-online.target
2023-08-17 03:16:10 +03:00
github-actions[bot] 43454c8a64
Merge master into staging-next 2023-08-17 00:01:52 +00:00
Freakmiko 66469836be Fix Lemmy Caddy config static path handling
Due to lemmy-ui using a sub-path for the static files, the original static path handling was not sufficient
2023-08-17 04:19:48 +08:00
github-actions[bot] 583df4e091
Merge master into staging-next 2023-08-16 18:01:01 +00:00
Doron Behar 62730f2c31
Merge pull request #248701 from doronbehar/nixos/manpages
nixos/install-tools: Add manpages to packages instead of seperating them
2023-08-16 15:49:49 +00:00
Martin Weinelt e57875a2c4
Merge pull request #248409 from CobaltCause/conduit-0.6.0
matrix-conduit: 0.5.0 -> 0.6.0
2023-08-16 16:30:08 +02:00
K900 200eeb9ebe
Merge pull request #249101 from motiejus/headscale-oidc
headscale.oidc: client_secret_path is a string
2023-08-16 17:23:56 +03:00
Maciej Krüger 56700d64b1
Merge pull request #226821 from enc0urage/memtest 2023-08-16 15:31:32 +02:00
Nick Cao 2dadab4889
Merge pull request #249211 from oddlama/feat-influxdb-provision
nixos/influxdb2: automatic initial setup and nixos tests
2023-08-16 21:29:16 +08:00
oddlama b4d718f14a
nixos/influxdb2: add initial setup automation and nixos tests 2023-08-16 14:31:49 +02:00
github-actions[bot] d99b92b3f7
Merge master into staging-next 2023-08-16 12:01:02 +00:00
Janne Heß bc9b484db8
Merge pull request #232230 from oddlama/fix-activation-template-unit-specializations
Fix detection of changed template unit specializations in switch-to-configuration.pl
2023-08-16 13:46:45 +02:00
Ilan Joselevich 0a732d2adf
nixos/oauth2_proxy: service after network.target -> network-online.target 2023-08-16 14:40:33 +03:00
Robert Obryk ff204ca32b nixos/security/wrappers: remove all the assertions about readlink(/proc/self/exe)
Given that we are no longer inspecting the target of the /proc/self/exe
symlink, stop asserting that it has any properties. Remove the plumbing
for wrappersDir, which is no longer used.

Asserting that the binary is located in the specific place is no longer
necessary, because we don't rely on that location being writable only by
privileged entities (we used to rely on that when assuming that
readlink(/proc/self/exe) will continue to point at us and when assuming
that the `.real` file can be trusted).

Assertions about lack of write bits on the file were
IMO meaningless since inception: ignoring the Linux's refusal to honor
S[UG]ID bits on files-writeable-by-others, if someone could have
modified the wrapper in a way that preserved the capability or S?ID
bits, they could just remove this check.

Assertions about effective UID were IMO just harmful: if we were
executed without elevation, the caller would expect the result that
would cause in a wrapperless distro: the targets gets executed without
elevation. Due to lack of elevation, that cannot be used to abuse
privileges that the elevation would give.

This change partially fixes #98863 for S[UG]ID wrappers. The issue for
capability wrappers remains.
2023-08-16 11:33:22 +02:00
Robert Obryk 11ca4dcbb8 nixos/security/wrappers: read capabilities off /proc/self/exe directly
/proc/self/exe is a "fake" symlink. When it's opened, it always opens
the actual file that was execve()d in this process, even if the file was
deleted or renamed; if the file is no longer accessible from the current
chroot/mount namespace it will at the very worst fail and never open the
wrong file. Thus, we can make a much simpler argument that we're reading
capabilities off the correct file after this change (and that argument
doesn't rely on things such as protected_hardlinks being enabled, or no
users being able to write to /run/wrappers, or the verification that the
path readlink returns starts with /run/wrappers/).
2023-08-16 11:33:22 +02:00
Robert Obryk ec36e0218f nixos/security/wrappers: stop using .real files
Before this change it was crucial that nonprivileged users are unable to
create hardlinks to SUID wrappers, lest they be able to provide a
different `.real` file alongside. That was ensured by not providing a
location writable to them in the /run/wrappers tmpfs, (unless
disabled) by the fs.protected_hardlinks=1 sysctl, and by the explicit
own-path check in the wrapper. After this change, ensuring
that property is no longer important, and the check is most likely
redundant.

The simplification of expectations of the wrapper will make it
easier to remove some of the assertions in the wrapper (which currently
cause the wrapper to fail in no_new_privs environments, instead of
executing the target with non-elevated privileges).

Note that wrappers had to be copied (not symlinked) into /run/wrappers
due to the SUID/capability bits, and they couldn't be hard/softlinks of
each other due to those bits potentially differing. Thus, this change
doesn't increase the amount of memory used by /run/wrappers.
2023-08-16 11:33:22 +02:00
WilliButz da5c3bde30
Merge pull request #248405 from fpletz/pkgs/mediamtx-1.0.0
mediamtx: 0.23.8 -> 1.0.0, refactor module, add test
2023-08-16 11:30:18 +02:00
Lin Jian 1c704628dc
nixos/environment: stop setting ASPELL_CONF
We set[1] ASPELL_CONF to the last nix profile containing lib/aspell in
2013.  In 2017, aspell is patched[2] to search NIX_PROFILES, which
makes [1] not needed any more.

Deleting it is also agreed in this discussion[3].

[1]: 0192c02720
[2]: ba4cefe4ae
[3]: https://github.com/NixOS/nixpkgs/pull/30234
2023-08-16 09:18:45 +08:00
Jan Tojnar 86f6b16d28 Merge branch 'master' into staging-next
Conflicts:
- pkgs/servers/mail/mailman/python.nix (relevant to mailman-web)
  between f8a17e4200 and 84f6a6755a
2023-08-15 21:39:20 +02:00
Pol Dellaiera 11f3cbc0c3
Merge pull request #246181 from jvanbruegge/haproxy-package
nixos/haproxy: allow to specify haproxy package
2023-08-15 19:46:13 +02:00
Silvan Mosberger be9b7ddbdc
Merge pull request #246447 from 999eagle/update/invidious
invidious: unstable-2023-06-06 -> unstable-2023-08-07
2023-08-15 14:05:19 +02:00
Kevin Cox 86c67a1f11
nixos.photoprism: Relax sandbox to allow running exiftool
exiftool is written in Perl which appears to call `chown` as part of startup. This is blocked by the `@privileged` system call group. This causes a failure when changing image orientation.

Fixes: https://github.com/NixOS/nixpkgs/issues/249120
2023-08-15 07:58:42 -04:00
Jan van Brügge 90da2c1223
nixos/haproxy: allow to specify haproxy package 2023-08-15 12:24:55 +01:00
linsui 0e6827ed9c nixos/gdm: switch to dconf settings 2023-08-15 19:20:39 +08:00
linsui 038d78d4ce nixos/dconf: add locks support 2023-08-15 19:20:39 +08:00
linsui fb52d5df86 nixos/dconf: add settings support 2023-08-15 19:20:39 +08:00
linsui cce75fa51e nixos/dconf: refractor
remove `with lib;`
profiles option now accepts packages in addition to paths.
profiles option is no longer internal.
cfgDir definition has been inlined.
pulled GIO_EXTRA_MODULES inside mkif.
removed pointless comments with section headings.
defined profiles are now turned into package, allowing to simplify the db update logic.
2023-08-15 19:20:39 +08:00
Kerstin f65301cdd3
Merge pull request #219700 from h7x4/kanidm-add-package-option
nixos/kanidm: add package option
2023-08-15 12:06:11 +02:00
Michele Guerini Rocco e7a57d07a8
Merge pull request #248390 from sersorrel/picom-package
nixos/picom: add `package` option
2023-08-15 11:05:35 +02:00
Sophie Tauchert 1a3b7f61b2
nixos/invidious: generate hmac_key automatically
This change also generates the invidious config by putting JSON
snippets into a bash array and then using jq to merge them all into
a single configuration where later elements override previous
elements.
2023-08-15 10:48:30 +02:00
h7x4 655a04a8fa
nixos/kanidm: add package option
Signed-off-by: h7x4 <h7x4@nani.wtf>
2023-08-15 10:05:44 +02:00
github-actions[bot] df770ba961
Merge master into staging-next 2023-08-15 06:01:24 +00:00
Nick Cao 2af24d4417
nixos/fcitx5: fix evaluation 2023-08-15 08:15:41 +08:00
github-actions[bot] 674c2b1920
Merge master into staging-next 2023-08-14 18:01:03 +00:00
Maximilian Bosch a471325eaf
Merge pull request #221318 from mweinelt/synapse-extras
nixos/matrix-synapse: Allow passing extras, discover extras from config
2023-08-14 18:43:05 +02:00
Maximilian Bosch 10c6be32e4
nixos/tempo: add extraFlags option
Main use-case for me is to specify `-config.expand-env=true` which
allows me inject secrets via systemd's environment file mechanism[1]
like this:

    storage.trace.s3 = {
      /* all the other stuff */
      secret_key = "\${GARAGE_SECRET_KEY}";
    };

[1] https://grafana.com/docs/tempo/latest/configuration/#use-environment-variables-in-the-configuration
2023-08-14 18:07:24 +02:00
github-actions[bot] af70853335
Merge master into staging-next 2023-08-14 12:01:04 +00:00
Motiejus Jakštys 28cf78b857 headscale.oidc: client_secret_path is a string
It can be include an environment-variable, like
`${CREDENTIALS_DIRECTORY}/some-path`, failing validation for
`types.path`.
2023-08-14 13:03:06 +03:00
linsui 30bb15152e nixos/fcitx5: add settings 2023-08-14 16:25:17 +08:00
Ilan Joselevich e0fad0515b
nixos/picom: use lib.getExe
Co-authored-by: Jian Lin <75130626+jian-lin@users.noreply.github.com>
2023-08-14 11:19:41 +03:00
Ilan Joselevich 94a3092895
nixos/picom: mkPackageOption -> mkPackageOptionMD 2023-08-14 11:18:06 +03:00
Enno Richter 3f52185de8 boot.initrd.systemd: make TPM2 modules optional 2023-08-14 09:34:29 +02:00
github-actions[bot] b782e1dc08
Merge master into staging-next 2023-08-14 06:00:58 +00:00
enc0urage 00d7065913 nixos/systemd-boot: Replace proprietary memtest86 with free memtest86+ in UEFI 2023-08-14 03:05:24 +00:00
Bobby Rong 85efefd8f4
Merge pull request #248544 from bobby285271/rm/qgnomeplatform
nixos/pantheon, nixos/cinnamon: Drop qgnomeplatform
2023-08-14 10:49:10 +08:00
github-actions[bot] 667a7541cd
Merge master into staging-next 2023-08-14 00:01:53 +00:00
LёNya 54f5045571 nixos/zoneminder: replace lib.optional with lib.optionals to make module work 2023-08-13 22:32:42 +03:00
github-actions[bot] 12e030d6da
Merge master into staging-next 2023-08-13 18:00:59 +00:00
h7x4 8981783b60
services/prometheus/exporters: add mysqld
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2023-08-13 19:46:30 +02:00
Bernardo Meurer 70dd76d94f
Merge pull request #247475 from qowoz/nix217 2023-08-13 13:27:20 -04:00
Jonas Heinrich c5f4a46036 nixos/opensnitch: Add support for EPBF process monitor
Co-authored-by: Slime90
2023-08-13 22:19:48 +08:00
Atemu 7706f570a7 dnscrypt-proxy: rename from dnscrypt-proxy2
An alias is added for dnscrypt-proxy2
2023-08-13 16:03:31 +02:00
Janne Heß d995da11d8
nixos/switch-to-configuration: Fix unit location in toplevel 2023-08-13 14:26:30 +02:00
enc0urage 1488a2bc1a nixos/grub: Replace proprietary memtest86 with free memtest86+ in UEFI mode 2023-08-13 12:04:34 +00:00
github-actions[bot] 0ee8715a0d
Merge master into staging-next 2023-08-13 12:00:52 +00:00
happysalada 4022b2733a nixos/rustus: add user name to enable restoring of backups 2023-08-13 12:59:20 +01:00
Jörg Thalheim 38b2c039bd gitea-actions-runner: restart on failure 2023-08-13 12:54:15 +01:00
DavHau 3d58bac73b services.gitea-actions-runner: make ExecStartPre extensible 2023-08-13 12:54:15 +01:00
Jörg Thalheim 7ad7e99370 nixos/gitea-actions-runner: settings option to configure daemon 2023-08-13 12:54:15 +01:00
Nick Cao 0814089e05
nixos/zram: use nixos/zram-generator as backing implementation 2023-08-13 15:38:40 +08:00
Nick Cao a7e095d9fd
nixos/zram-generator: init 2023-08-13 15:36:23 +08:00
github-actions[bot] f5eb026a2a
Merge master into staging-next 2023-08-13 06:00:52 +00:00
Nick Cao 722e1e2313
Merge pull request #247899 from DavHau/zerotier-docs
nixos/zerotierone: document networks never left automatically
2023-08-13 00:00:35 -06:00
Bobby Rong ddd4973ddb
nixos/cinnamon: Drop qgnomeplatform
The upstream is not maintained, and qadwaitadecoration
does not seem to be xorg-related. We should have proper
shadows when using SSD.
2023-08-13 12:21:54 +08:00
Bobby Rong f4e1e8627d
nixos/pantheon: Drop qgnomeplatform
The upstream is not maintained, and qadwaitadecoration
does not seem to be xorg-related. We should have proper
shadows when using SSD.
2023-08-13 12:21:54 +08:00
Samuel Dionne-Riel f064a5bcc2
Merge pull request #220263 from samueldr/feature/misc-grub-fixes
nixos/grub: Fixes to allow flicker-free boot, themes and bug fixes
2023-08-12 20:32:51 -04:00
Doron Behar 924a07dc22 nixos/doc: Improve documentation of documentation
- Move contents of README.md from
  nixos/modules/installer/tools/manpages/ to
  nixos/doc/manual/contributing-to-this-manual.chapter.md.
- Don't mention DocBook as its obsolete and too specific.
- Rename derivation attribute name of configuration.nix(5) manual page,
  both on the `contributing-to-this-manual.chapter.md`, and in other
  places.
2023-08-12 22:28:04 +03:00
github-actions[bot] 1c639fb6fb
Merge master into staging-next 2023-08-12 18:00:55 +00:00
Acid Bong c76bb0d58e
nixos/zsh: add enableLsColors
Borrowed from nixos/bash/ls-colors module
2023-08-12 20:53:05 +03:00
Jan Tojnar 08d242047c iso_gnome: Fix evaluation
`qt.enable` option requires `qt.style` to be set.
Previously, this was set in GNOME module but it has been removed
in 622745942b
2023-08-12 19:30:49 +02:00
Doron Behar 32f75a0f2a nixos/install-tools: Add manpages to packages instead of seperating them
Since each such `nixos-*` tool has it's own derivation, exposed in pkgs,
There is no point in separating the manuals from the packages. If
someone wishes to have the tools without the manuals, they can use
meta.outputsToInstall to disable the installation of the manpages of
these packages. This Fixes #244450.
2023-08-12 18:01:06 +03:00
Maximilian Bosch 66ab687151
Merge pull request #248131 from Ma27/captive-browser-setcap
nixos/captive-browser: drop setcap wrapper for captive-browser
2023-08-12 14:52:38 +02:00
github-actions[bot] 9f3079a7c3
Merge master into staging-next 2023-08-12 12:01:01 +00:00
Ilan Joselevich 2393e099a6
Merge pull request #247008 from fufexan/hyprland
Update hyprwm packages and nixos/hyprland
2023-08-12 14:55:29 +03:00
Franz Pletz b6fb9b86a4
Merge pull request #248586 from oddlama/fix-hostapd-pwfile
nixos/hostapd: add missing stringification of path in INI format
2023-08-12 10:55:47 +02:00
Jan Tojnar 622745942b nixos/gnome: Do not force Qt apps to Adwaita
adwaita-qt tries valiantly to ensure a visual consistency
but unfortunately, it often falls into an uncanny valley instead.
Let’s make it opt-in again for more vanilla default experience.

Related: https://pagure.io/fedora-workstation/issue/351
2023-08-12 10:29:34 +02:00
Franz Pletz 5522989d34
Merge pull request #248521 from ehmry/liquidsoap
nixos/liquidsoap: restart always
2023-08-12 10:21:35 +02:00
oddlama bbac87a2dd
nixos/hostapd: add missing stringification of path in INI format 2023-08-11 22:44:08 +02:00
ash 05245fc0ea nixos/picom: add package option 2023-08-11 17:00:36 +01:00
Emery Hemingway 248c8c7812 nixos/liquidsoap: restart always 2023-08-11 12:51:27 +01:00
Evgeny Kurnevsky 5110d348b2
wstunnel: correct listen option 2023-08-11 11:58:40 +03:00
James Baker 09d32e2612
nixos/virtualisation.docker: Do not assert 32 bit libraries available on ARM (#246179) 2023-08-11 10:49:25 +02:00
Charles Hall 02fd938fb7
nixos/conduit: disable update checks by default 2023-08-10 23:16:19 -07:00
Franz Pletz cb6dd866f2
Merge pull request #241338 from bachp/minio-distributed 2023-08-11 05:33:44 +02:00
Franz Pletz 68e658f7fc
Merge pull request #248446 from aanderse/pam_mkhomedir 2023-08-11 04:52:12 +02:00
Mario Rodas d8001aae54
Merge pull request #242116 from flurie/fix-datadog-agent
datadog-agent: 7.38.1 -> 7.45.1
2023-08-10 20:53:27 -05:00
Nick Cao 8efe50b161
Merge pull request #248343 from CnTeng/master
nixos/dae: use network-online
2023-08-10 19:37:36 -06:00
Aaron Andersen 9d56365451 security/pam: add umask option to configure pam_mkhomedir 2023-08-10 20:35:08 -04:00
Franz Pletz 362810eabe
nixos/mediamtx: refactor
* log settings are defaults
* log directory won't generally be used
* remove ffmpeg from path, encourage the use of store paths in settings
2023-08-10 20:16:11 +02:00
Franz Pletz 9c85697da8
Merge pull request #244060 from Gerg-L/nvidiaDynamicBoost
nixos/nvidia: clean up and add dynamic boost
2023-08-10 17:02:26 +02:00
CnTeng 24f2116a7a nixos/dae: use network-online 2023-08-10 20:23:46 +08:00
Artturi 2ed985dd37
Merge pull request #248017 from Artturin/fishcrossfix 2023-08-10 15:18:21 +03:00
Maximilian Bosch 183be440fd
nixos/captive-browser: drop setcap wrapper for captive-browser
Since Linux 5.7 it's possible to set `SO_BINDTODEVICE` via `setsockopt(2)`
as unprivileged user if this operation doesn't imply escaping a VRF
interface[1].

Dropping the wrapper is actually desirable because `captive-browser`
itself doesn't drop capabilities and as a result, the capabilities are
passed on to `chromium` itself[2].

For older kernels, this is still necessary, hence the wrapper will only
be added nowadays if the kernel is older than 5.7.

[1] c427bfec18
[2] 08450562e5/bind_device_linux.go (L11-L14)
    and because our setcap wrapper makes all capabilities
    inheritable.
2023-08-10 14:06:38 +02:00
Maximilian Bosch 1ab411fcd4
Merge pull request #247386 from montchr/docs-matrix-synapse
nixos/matrix-synapse: set public baseurl in example config
2023-08-10 12:52:34 +02:00
Ryan Lahfa afa8d16f74
Merge pull request #247102 from yaxitech/image-repart-package-option 2023-08-10 11:55:01 +02:00
Ryan Lahfa ec409e6f79
Merge pull request #231673 from symphorien/suid_wrappers_userns 2023-08-10 11:52:59 +02:00
Franz Pletz c13c1412bf
nixos/chrony: add enableMemoryLocking option
Fixes #222629.
2023-08-10 03:03:53 +02:00
Franz Pletz cef068f3b3
Revert "nixos/malloc: add back maybe unnecessary line"
This reverts commit ed55524562.

Does not evaluate.
2023-08-10 03:02:39 +02:00
Franz Pletz 8e372c19d1
Merge pull request #245286 from codec/add-prometheus-idrac-exporter
prometheus-idrac-exporter: init at unstable-2023-06-29
2023-08-10 00:58:03 +02:00
Robert Hensing ea6e5c0730
Merge pull request #246775 from yaxitech/no-kernel-params-wo-kernel
nixos/toplevel: only pass `kernelParams` if `boot.kernel.enable`
2023-08-09 15:14:13 +02:00
Franz Pletz dcafb07ed8
Merge pull request #232250 from YBeaugnon/libvirt-hooks
nixos/libvirtd: hooks support
2023-08-09 15:07:52 +02:00
Franz Pletz b15eff32c4
Merge pull request #248126 from DDoSolitary/patch-netdata-ipc
nixos/netdata: fix position of NETDATA_PIPENAME
2023-08-09 14:42:55 +02:00
Guillaume Girol 0e4b8a05b2 nixos/wrappers: allow setuid and setgid wrappers to run in user namespaces
In user namespaces where an unprivileged user is mapped as root and root
is unmapped, setuid bits have no effect. However setuid root
executables like mount are still usable *in the namespace* as the user
already has the required privileges. This commit detects the situation
where the wrapper gained no privileges that the parent process did not
already have and in this case does less sanity checking. In short there
is no need to be picky since the parent already can execute the foo.real
executable themselves.

Details:
man 7 user_namespaces:
   Set-user-ID and set-group-ID programs
       When a process inside a user namespace executes a set-user-ID
       (set-group-ID) program, the process's effective user (group) ID
       inside the namespace is changed to whatever value is mapped for
       the user (group) ID of the file.  However, if either the user or
       the group ID of the file has no mapping inside the namespace, the
       set-user-ID (set-group-ID) bit is silently ignored: the new
       program is executed, but the process's effective user (group) ID
       is left unchanged.  (This mirrors the semantics of executing a
       set-user-ID or set-group-ID program that resides on a filesystem
       that was mounted with the MS_NOSUID flag, as described in
       mount(2).)

The effect of the setuid bit is that the real user id is preserved and
the effective and set user ids are changed to the owner of the wrapper.
We detect that no privilege was gained by checking that euid == suid
== ruid. In this case we stop checking that euid == owner of the
wrapper file.

As a reminder here are the values of euid, ruid, suid, stat.st_uid and
stat.st_mode & S_ISUID in various cases when running a setuid 42 executable as user 1000:

Normal case:
ruid=1000 euid=42 suid=42
setuid=2048, st_uid=42

nosuid mount:
ruid=1000 euid=1000 suid=1000
setuid=2048, st_uid=42

inside unshare -rm:
ruid=0 euid=0 suid=0
setuid=2048, st_uid=65534

inside unshare -rm, on a suid mount:
ruid=0 euid=0 suid=0
setuid=2048, st_uid=65534
2023-08-09 12:00:00 +00:00
DDoSolitary d410464c5d
nixos/netdata: fix position of NETDATA_PIPENAME
It was accidentally placed in a condition-guarded block, making the
setting only take effect when enableAnalyticsReporting = false.
2023-08-09 19:22:20 +08:00
Florian Praden 490ec79ac3
nixos/gitea: bugfix for gitea-dump service.
Missing custom directory setup in gitea-dump service. Adding environment variable in gitea-dump service definition.
2023-08-09 11:53:18 +02:00
Artturin ea580ebee8 nixos/fish: Fix completion generator cross-compilation 2023-08-08 23:21:38 +03:00
Mihai Fufezan 50ad802e51
nixos/hyprland: remove xwayland.hidpi 2023-08-08 20:32:53 +03:00
K900 b0b00f0e28
Merge pull request #247937 from linj-fork/fix-types.string
treewide: stop using types.string
2023-08-08 18:50:42 +03:00
WilliButz acbf16d419
Merge pull request #247709 from Ma27/nextcloud-adminuser-doc-fix
nixos/nextcloud: improve documentation of `adminuser`-option
2023-08-08 16:29:59 +02:00
Lin Jian 74fadae942
treewide: stop using types.string
It is an error[1] now.

[1]: https://github.com/NixOS/nixpkgs/pull/247848
2023-08-08 21:31:21 +08:00
DavHau 74c574a8db nixos/zerotierone: document networks never left automatically
Removing a network from the joinNetworks list does not make the machine leave the network which is confusing.

This behavior is now clarified via the options description
2023-08-08 11:31:33 +02:00
Michele Guerini Rocco ccc33bd3d7
Merge pull request #245852 from rnhmjoj/pr-fix-dnscrypt
dnscrypt-wrapper fixes
2023-08-08 10:34:27 +02:00
Lassulus e63386d6bf
Merge pull request #247751 from Mic92/installation-device-trusted-users
nixos/installation-device: allow nix-copy for root/nixos user
2023-08-08 08:23:59 +02:00
Franz Pletz 9640eb3970
Merge pull request #246029 from ehmry/eris-go 2023-08-08 06:18:03 +02:00
Pol Dellaiera ef02511ff4
Merge pull request #247358 from pokon548/dae-add-service
nixos/dae: init
2023-08-07 21:11:43 +02:00
Isa bd50b5fcf5 graylog-5_1: init at 5.1.4 2023-08-07 19:49:48 +02:00
Lily Foster b367b9cf87
Merge pull request #241565 from SuperSandro2000/nox-python
nixos/no-x-libs: use pythonPackagesExtensions to construct python ove…
2023-08-07 10:56:27 -04:00
Jörg Thalheim 1f1a758e95 nixos/installation-device: allow nix-copy for root/nixos user
For non-interactive installation it's quite handy to be able to nix copy additional dependencies to the system.
While this is possible for the root user, we cannot easily ssh into it, as we don't allow root login with a password.
By making nixos a trusted user, we can do "passwd && sudo systemctl start sshd" and than run nixos-anywhere
2023-08-07 16:48:49 +02:00
Maximilian Bosch 648546b09d
nixos/nextcloud: improve documentation of adminuser-option
This option only has an effect on the initial setup of Nextcloud and
changes later won't have any effect.

Same issue as with `adminpassFile` - it's only passed to the installer
command - but even worse because the username is frequently used as
unique ID in the database, so there's no trivial way to change it, even
imperatively.
2023-08-07 12:16:41 +02:00
pokon548 dcf5ae3d0b nixos/dae: init 2023-08-07 14:32:32 +08:00
Wout Mertens ea07a9a98e
Merge pull request #247319 from DDoSolitary/patch-netdata-ipc
netdata: set NETDATA_PIPENAME to /run/netdata/ipc
2023-08-07 08:27:29 +02:00