Commit Graph

699 Commits

Author SHA1 Message Date
Philip Taron
117f3ceb51
treewide/nixos: remove with lib; part 1 (#335603) 2024-08-29 15:42:04 -07:00
Felix Buehler
24f82fc6b5 nixos/services.surrealdb: remove with lib; 2024-08-30 00:30:41 +02:00
Felix Buehler
edcd08a8ff nixos/services.rethinkdb: remove with lib; 2024-08-30 00:30:41 +02:00
Felix Buehler
18c0ca5714 nixos/services.pgmanage: remove with lib; 2024-08-30 00:30:41 +02:00
Felix Buehler
6bbc3df0dd nixos/services.opentsdb: remove with lib; 2024-08-30 00:30:40 +02:00
Felix Buehler
93fb328e44 nixos/services.openldap: remove with lib; 2024-08-30 00:30:40 +02:00
Felix Buehler
0dbb2e5fa1 nixos/services.influxdb: remove with lib; 2024-08-30 00:30:40 +02:00
Felix Buehler
3db1445493 nixos/services.hbase-standalone: remove with lib; 2024-08-30 00:30:40 +02:00
Felix Buehler
567aa06ba2 nixos/services.firebird: remove with lib; 2024-08-30 00:30:40 +02:00
Felix Buehler
17003eacc9 nixos/services.ferretdb: remove with lib; 2024-08-30 00:30:39 +02:00
Felix Buehler
f06f3a7973 nixos/services.dragonflydb: remove with lib; 2024-08-30 00:30:39 +02:00
Felix Buehler
626c4c1a21 nixos/services.dgraph: remove with lib; 2024-08-30 00:30:39 +02:00
Felix Buehler
75d565a3b0 nixos/services.couchdb: remove with lib; 2024-08-30 00:30:39 +02:00
Felix Buehler
fbd927db77 nixos/services.foundationdb: remove with lib; 2024-08-29 00:20:04 +02:00
Pol Dellaiera
8d18fe9184
Merge pull request #335151 from drupol/nixos/chromadb/init
nixos/chromadb: init
2024-08-19 17:29:57 +02:00
Sandro
c67dbda54f
Merge pull request #308700 from tie/pgbouncer-settings
nixos/pgbouncer: add services.pgbouncer.settings option
2024-08-18 16:30:17 +02:00
Pol Dellaiera
835b2f8822
nixos/chromadb: init 2024-08-16 18:23:12 +02:00
github-actions[bot]
d3ef01201e
Merge master into staging-next 2024-08-08 18:01:35 +00:00
Sandro Jäckel
3e8666bce9 nixos/redis: remove outdated info in enable option
Thanks for the heads up @poperigby !
2024-08-08 17:25:16 +02:00
Ivan Trubach
bfb9d1825d nixos/pgbouncer: add services.pgbouncer.settings option
This change adds services.pgbouncer.settings option as per [RFC 0042]
and deprecates other options that were previously used to generate
configuration file.

In addition to that, we also place the configuration file under
environment.etc to allow reloading configuration without service
restart.

[RFC 0042]: https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md
2024-08-08 05:54:26 +03:00
Maximilian Bosch
7b01c5da3c
Merge pull request #329611 from Ma27/pg16
postgresql: 15 -> 16 for 24.11+
2024-08-02 07:09:50 +00:00
Sigmanificient
543cd40ecc treewide: remove trailing space in description
Done using `grep -rP 'description\s+=\s+"[^"]+[ ]";' | cut -d ':' -f 1 |
xargs -i nvim {}` and sorting the opened files by hand, avoiding
generated packages list
2024-07-26 03:38:50 +02:00
Maximilian Bosch
bf2d040432
postgresql: 15 -> 16 for 24.11+
Upgrade default postgresql for stateVersion >=24.11.
This also rebuilds all packages linking against `libpq.so` to use
postgresql 16.

After re-reading https://www.postgresql.org/docs/16/release-16.html
I don't see any major risks about doing that.
2024-07-24 10:43:02 +02:00
Michael Weiss
10cbea2905
nixos/monetdb, nixos/sks: remove primeos from maintainers (#277366)
Remove myself as maintainer from modules that I don't use anymore
2024-07-04 18:17:43 +02:00
Sandro
33f83c6252
Merge pull request #316977 from eclairevoyant/fix-mkEnableOption
treewide: fix mkEnableOption usage
2024-06-25 22:42:16 +02:00
Paul Meyer
fbe8538aa1 treewide: remove jonringer as package maintainer
Signed-off-by: Paul Meyer <49727155+katexochen@users.noreply.github.com>
2024-06-25 09:16:56 +02:00
Wolfgang Walther
0487937af3
postgresql: add readme with eol-policy
This was discussed and agreed on in [1].

[1]: https://github.com/NixOS/nixpkgs/pull/310580#discussion_r1597284693
2024-06-14 09:38:23 +02:00
éclairevoyant
7d8742da87
treewide: fix mkEnableOption usage 2024-06-14 02:41:42 -04:00
github-actions[bot]
67f8ba4a30
Merge master into staging-next 2024-05-01 18:01:22 +00:00
Tom Hubrecht
0ccd40450f nixos/postgresql: Remove toplevel with lib; 2024-05-01 12:25:24 +02:00
github-actions[bot]
6fecc628f9
Merge master into staging-next 2024-04-29 12:01:15 +00:00
Sandro Jäckel
5f349abc7b
nixos/redis: don't disable transparent hugepages
Since https://github.com/redis/redis/pull/4001 included in 6.2.0
transparent hugepages works when being set to madvise which is the NixOS
and upstream recommended default.
2024-04-28 21:17:03 +02:00
Sandro Jäckel
5071c02bb0
nixos/redis: enable vmOverCommit by default as recommended by redis itself
> WARNING Memory overcommit must be enabled! Without it, a background save or replication may fail under low memory condition.
> Being disabled, it can also cause failures without low memory condition, see https://github.com/jemalloc/jemalloc/issues/1328.
> To fix this issue add 'vm.overcommit_memory = 1' to /etc/sysctl.conf and then reboot or run the command 'sysctl vm.overcommit_memory=1' for this to take effect.
2024-04-28 21:17:03 +02:00
Maximilian Bosch
cba6af761a
Merge pull request #293996 from wolfgangwalther/postgresql-cleanup
postgresql: more cleanup
2024-04-19 13:53:20 +00:00
stuebinm
6afb255d97 nixos: remove all uses of lib.mdDoc
these changes were generated with nixq 0.0.2, by running

  nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix
  nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix
  nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix

two mentions of the mdDoc function remain in nixos/, both of which
are inside of comments.

Since lib.mdDoc is already defined as just id, this commit is a no-op as
far as Nix (and the built manual) is concerned.
2024-04-13 10:07:35 -07:00
Aleksana
2a057805ae
Merge pull request #301804 from helsinki-systems/init/keydb
keydb: init at 6.3.4
2024-04-12 16:33:36 +08:00
Simon Hauser
b3642388fe
keydb: init at 6.3.4 2024-04-11 10:47:07 +02:00
Bjørn Forsman
a29010fe79 nixos: improve many 'enable' descriptions 2024-04-09 07:10:17 +02:00
Wolfgang Walther
1682b4cc39
nixos/postgresql: fix enableJIT = false
The enableJIT = true case was fixed in #221851 or
e2fb651752 respectively.

However this did not take the case into consideration, when doing this:

    services.postgresql = {
      enable = true;
      enableJIT = false;
      package = pkgs.postgresql_15_jit;
    };

If enableJIT is treated as the source of truth, then this should indeed
cause JIT to be disabled, which this commit does.
2024-04-04 08:41:19 +02:00
Maximilian Bosch
5142b7afa8
nixos/postgresql: turn settings into a submodule
The main idea behind that was to be able to do more sophisticated
merging for stuff that goes into `postgresql.conf`:
`shared_preload_libraries` is a comma-separated list in a `types.str`
and thus not mergeable. With this change, the option accepts both a
comma-separated string xor a list of strings.

This can be implemented rather quick using `coercedTo` +
freeform modules. The interface still behaves equally, but it allows to
merge declarations for this option together.

One side-effect was that I had to change the `attrsOf (oneOf ...)` part into
a submodule to allow declaring options for certain things. While at it,
I decided to move `log_line_prefix` and `port` into this structure as
well.
2024-03-30 14:23:05 +01:00
Janne Heß
fcc95ff817 treewide: Fix all Nix ASTs in all markdown files
This allows for correct highlighting and maybe future automatic
formatting. The AST was verified to work with nixfmt only.
2024-03-28 09:28:12 +01:00
Janne Heß
bc77c7a973 treewide: Mark Nix blocks in markdown as Nix
This should help us with highlighting and future formatting.
2024-03-28 09:28:12 +01:00
Wolfgang Walther
4b6bce5c31
postgresql: refactor to remove "this" argument
This was proposed by abbradar in #150801, but left out of the follow up PR
#221851 by Ma27 to reduce the size of the diff. Compared to the initial
proposal this includes the callPackage call in the recursion, which avoids
breaking the withJIT/withoutJIT helpers.

In terms of nixpkgs, this is a pure refactor, no derivations change. However,
this makes downstream expressions like the following possible:

  (postgresql.override { jitSupport = true; }).pkgs.postgis

This would have not worked before without passing another "this" argument,
which is error prone as can be seen in this example:

  https://github.com/PostgREST/postgrest/pull/3222/files
2024-03-15 21:11:09 +01:00
Wolfgang Walther
14b3ea2789
postgresql: refactor to pass jitSupport/llvm via scope instead of passthru
This makes it less error-prone to use the llvm package in extensions, because
it will always match the package used by the postgresql derivation itself.

Previously, you could've accidentally used llvm instead of postgresql.llvm
with a different result.
2024-03-15 21:11:09 +01:00
emilylange
08c37ba899 nixos/lldap: set service UMask=0027 and StateDirectoryMode=0750
While `/var/lib/lldap` isn't technically accessible by unprivileged
users thanks to `DynamicUser=true`, a user might prefer and change it to
`DynamicUser=false`.

There is currently also a PR open that intends to make `DynamicUser`
configurable via module option.

As such, `jwt_secret_file`, if bootstrapped by the service start
procedure, might be rendered world-readable due to its permissions
(`0644/-rw-r--r--`) defaulting to the service's umask (`022`) and
`/var/lib/lldap` to `0755/drwxr-xr-x` due to `StateDirectoryMode=0755`.

This would usually be fixed by using `(umask 027; openssl ...)` instead
of just `openssl ...`.

However, it was found that another file (`users.db`), this time
bootstrapped by `lldap` itself, also had insufficient permissions
(`0644/-rw-r--r--`) inherited by the global umask and would be left
world-readable as well.

Due to this, we instead change the service's to `027`.

And to lower the impact for already bootstrapped files on existing
instances like `users.db`, set `StateDirectoryMode=0750`.
2024-03-11 17:34:29 +01:00
emilylange
61a651e362 nixos/lldap: bootstrap jwt_secret if not provided
If not provided, lldap defaults to `secretjwtsecret` as value which is
hardcoded in the code base.

See https://github.com/lldap/lldap/blob/v0.5.0/server/src/infra/configuration.rs#L76-L77

This is really bad, because it is trivially easy to generate an admin
access token/cookie as attacker, if a `jwt_secret` is known.
2024-03-11 17:34:29 +01:00
Weijia Wang
4acc19b18c
Merge pull request #291581 from Luflosi/nixos/memcached/clarify-setting
nixos/memcached: clarify behaviour of `enableUnixSocket`
2024-03-08 10:25:10 +01:00
Maximilian Bosch
3c8f4e06e6
Merge pull request #287602 from Ma27/drop-postgres-ensurePermissions
nixos/postgresql: drop ensurePermissions option
2024-03-07 19:50:44 +00:00
Luflosi
a982176a71
nixos/memcached: clarify behaviour of enableUnixSocket
Let's make it clear that enabling this option will disable listening on an IP address and port.
2024-02-26 15:29:55 +01:00
Sandro
30f71249a8
Merge pull request #285866 from 999eagle/feat/pgbouncer-systemd 2024-02-19 14:42:01 +01:00