Commit Graph

31024 Commits

Author SHA1 Message Date
Jonas Heinrich
17f958406c
nextcloud30: init at 30.0.0
(cherry picked from commit 1b121c1ea2)
2024-10-01 13:37:24 +02:00
⛧-440729 [sophie]
ced0da1e7e nixos/invidious: add options for configuring inv-sig-helper 2024-09-28 19:56:22 +02:00
Bjørn Forsman
7da1d417b3 nixos/influxdb2: wait until service is ready
Factor out part of the provisioning script into a
wait-until-service-is-ready script, and put it unconditionally in
front of ExecStartPost=, so that services that depend on influxdb2 are
not started until influxdb2 responds to requests.

Fixes https://github.com/NixOS/nixpkgs/issues/317017 ("Scrutiny tries to start before influxdb has started")

(cherry picked from commit 732d36522f)
2024-09-27 08:39:32 +02:00
Martin Weinelt
33fbc56f4d
[Backport release-24.05] nixos/printing: add option to disable browsed daemon (#344711) 2024-09-26 21:59:12 +02:00
seth
f1c0a9cab4 nixVersions.nix_2_18: 2.18.7 -> 2.18.8
Diff: https://github.com/NixOS/nix/compare/2.18.7...2.18.8
Fixes https://github.com/NixOS/nix/security/advisories/GHSA-6fjr-mq49-mm2c

(cherry picked from commit 0aed7f0d24)
2024-09-26 18:59:45 +00:00
Thomas Gerbet
48db5e72f2 nixos/printing: add option to disable browsed daemon
It is currently tied to `services.avahi.enable` which might not be
desirable.

With this change it is possible to disable the service with
`services.printing.browsed.enable = false`

(cherry picked from commit 981a63b005)
2024-09-26 18:45:28 +00:00
Adam C. Stephens
37df9bcf93
[Backport release-24.05] lxc/incus LTS upgrades: 6.0.1 -> 6.0.2 (#344337) 2024-09-25 13:19:57 -04:00
Franz Pletz
0f1657cd03
[Backport release-24.05] nixos/prometheus-smartctl-exporter: fix NVMe scanning (#343049) 2024-09-25 18:37:56 +02:00
Adam Stephens
5a084d21e8
incus-lts: 6.0.1 -> 6.0.2
https://discuss.linuxcontainers.org/t/incus-6-0-2-lts-has-been-released/21633
(cherry picked from commit ee30c817cb)
2024-09-24 22:19:00 -04:00
Rémi NICOLE
830f6d4a19
[Backport release-24.05] nixos/sssd: fix KCM to use new krb5 settings (#327930) 2024-09-24 14:32:50 +00:00
Arian van Putten
7faae2f631
[Backport release-24.05] amazon-ssm-agent: add the system's software to the path (#343104) 2024-09-24 10:33:01 +02:00
Arian van Putten
edfcc0c97b
[Backport release-24.05] amazon-init: include the general system's software and wrappers in PATH (#343105) 2024-09-24 10:32:20 +02:00
Jörg Thalheim
b34eac728a [release-24.05]: update nix-fallback-paths 2024-09-22 15:58:28 +02:00
Graham Christensen
b1d27e1322 amazon-init: include the general system's software and wrappers in PATH
It is surprising that software which was installed by the user at AMI
generation time isn't available to a script run over user data by
default.

When authoring user data to execute at startup, users will now have
more predictable access to baked-in software instead of an extremely
bare-minimum set currently there.

(cherry picked from commit 76b614be39)
2024-09-19 19:58:28 +00:00
Graham Christensen
e6fb8a4224 amazon-ssm-agent: add the system's software to the path
Follow up to #342584.

Similarly to that PR, it is surprising that software which was installed by the user isn't available to a script run over ssm by default.

When executing commands with ssm, users will now have more predictable access to baked-in software instead of an extremely bare-minimum set currently there.

(cherry picked from commit 7547a1f5f8)
2024-09-19 19:57:51 +00:00
Bjørn Forsman
04ba303d19 nixos/prometheus-smartctl-exporter: fix NVMe scanning
smartctl_exporter already runs with SupplementaryGroups "disk", which
gives full access to SATA drives, but NVMe devices are owned by
root:root, resulting in no access:

  [...] msg="Smartctl open device: /dev/nvme0 failed: Permission denied"

This patch introduces a "smartctl-exporter-access" supplementary
group, and an udev rule with setfacl to give the exporter access to NVMe
drives, without changing the base root:root ownership.

Fixes https://github.com/NixOS/nixpkgs/issues/210041

(cherry picked from commit 86a6ef5f15)
2024-09-19 15:29:32 +00:00
Julien Malka
2198681f51
[Backport release-24.05] nixos/systemd-boot: Fix regression in builder script (#342234) 2024-09-19 14:56:52 +02:00
Jean-François Roche
875e6ad20a nixos/systemd-boot: Fix regression in builder script
Avoid running Python scripts in the root of the package, as this
triggers `os.listdir` on the Nix store directory during import. This
operation can be time-consuming on large store directories
(see issue #283795 for more details).

The issue was initially fixed in #284153 but was reverted in #306339.

Co-authored-by: Sönke Hahn <soenkehahn@gmail.com>
(cherry picked from commit 251b0c958f)
2024-09-16 10:08:29 +02:00
Florian Agbuya
6b25604415 flarum: fix installation and migration logic
(cherry picked from commit 317a52a757)
2024-09-16 07:00:11 +00:00
Bjørn Forsman
6ecc647b4e nixos/ups: set env vars in the global environment
This allows using upsdrvctl interactively, which otherwise tries to use
a missing ups.conf in the Nix store, instead of the correct
/etc/nut/ups.conf.

(cherry picked from commit 1cb392fdcd)
2024-09-14 08:59:39 +02:00
Bjørn Forsman
7ea9a39b4d nixos/ups: deduplicate environment variables
No functional change, but more DRY.

(cherry picked from commit 801388a6fa)
2024-09-14 08:59:39 +02:00
Peder Bergebakken Sundt
cd51764d0a
[Backport release-24.05] Syncthing: implemented folder type (#340775) 2024-09-13 02:51:44 +02:00
Maximilian Bosch
f3762903d6
nixos/prometheus-exporters/pgbouncer: don't leak DB password into cmdline
Since `connectionStringFile` reads the file and puts it into the
invocation of the exporter, it's part of the cmdline and thus
effectively world-readable.

Added a new `connectionEnvFile` which is supposed to be an environment
file of the form

  PGBOUNCER_EXPORTER_CONNECTION_STRING=...

that will be added to the systemd service. The exporter will read the
connection string from that value.

(cherry picked from commit 862ecd674f)
2024-09-09 22:54:13 +02:00
Maximilian Bosch
1a6587231b
nixos/prometheus-exporters: fix assertions declared in exporter modules
And it turns out, the test was using a removed option all along 🙃

(cherry picked from commit 4980a7d938)
2024-09-09 22:34:44 +02:00
K900
0a00d66fe6 nixos-install: fail if we can't set up bootloader
(cherry picked from commit fa39e3d642)
2024-09-09 13:22:53 +00:00
Cat
f41a13fc1b nixos/syncthing: implement folder type (#308832)
* Syncthing: implemented folder type

* Syncthing: fix syntax (via @johnhamelink )

This commit should be rebased/squashed into the previous one if ofborg cleares it!

Co-authored-by: John Hamelink <me@johnhame.link>

---------

Co-authored-by: John Hamelink <me@johnhame.link>
(cherry picked from commit ed1b6699c0)
2024-09-09 13:08:01 +00:00
Peder Bergebakken Sundt
bdb9b5d94a
[Backport release-24.05] docs: fix Nvidia casing to be consistent across different places (#336574) 2024-09-08 00:12:00 +02:00
Florian Agbuya
c2a2bf70c1 flarum: disable automatic DB creation
(cherry picked from commit 1032b5fa95)
2024-09-07 15:43:50 +00:00
Florian Agbuya
0e59203469 flarum: fix flarum directory permissions
(cherry picked from commit 249dacfaa8)
2024-09-07 15:43:50 +00:00
Justinas Stankevicius
db4e63a4e2 nixos/prowlarr: set HOME for the service
(cherry picked from commit 6e14231e83)
2024-09-03 10:08:36 +00:00
Artturin
891f087836
[Backport release-24.05] nixos/telegraf: make sure ping executable is available when trying to ping (#338740) 2024-09-01 21:29:28 +03:00
Sandro
baca75692d
[Backport release-24.05] nixos/tsm-client: Fix multi-value dsm.sys options (#328031) 2024-09-01 18:11:53 +02:00
Shea Levy
fbbd9323de
[Backport release-24.05] nixos/ipu6: Don't build out-of-tree driver for kernels that have it (#332240) 2024-09-01 06:33:05 -04:00
Echo Nolan
43e77c3a5f nixos/telegraf: make sure ping executable is available when trying to ping
We need ping to be in PATH of the service otherwise it can't ping. This commit
adds it, conditional on one of the inputs being a ping task.

(cherry picked from commit 934a337a13)
2024-09-01 04:25:31 +00:00
Will Fancher
d829513235 nixos/iso-image: Compress squashfs with zstd 19
(cherry picked from commit 49192ef7a3)
2024-08-31 18:39:20 +00:00
Emily
e2b77fb94c
[24.05] backport fcgiwrap instances fix for local privilege escalation issue (#331465) 2024-08-31 16:38:03 +01:00
euxane
8931f18bfa nixos/fcgiwrap: add security advisory links to messages 2024-08-31 17:15:42 +02:00
Leona Maroni
cad30495d5
[Backport release-24.05] nixos/varnish: change default stateDir to /run (#337679) 2024-08-28 10:45:53 +02:00
Emery Hemingway
665a1853b5 nixos/eris-server: update comment
(cherry picked from commit f5b732e9bf)
2024-08-27 19:08:30 +00:00
Will Fancher
4797a40769
[Backport release-24.05] nixos/systemd/initrd: Fix emergencyAccess to work with null. (#336418) 2024-08-27 12:12:12 -04:00
Cosima Neidahl
b316d12227
[Backport release-24.05] lomiri.lomiri-gallery-app: init at 3.0.2 (#336579) 2024-08-27 16:20:44 +02:00
laalsaas
691e09524a nixos/varnish: change default stateDir to /run
The stateDir, or as varnish calls it, the workdir should always be a
tmpfs. Otherwise, performance issues may occur. See:

- https://varnish-cache.org/docs/trunk/reference/varnishd.html#opt-n

- https://github.com/varnishcache/varnish-cache/issues/4121

(cherry picked from commit 9e5316a1c5)
2024-08-27 10:22:15 +00:00
rnhmjoj
749b4b36d4 nixos/firewall: fix reverse path check failures with IPsec
The endpoint of an IPsec tunnel receives encrypted IPsec packets that
are first decrypted and then forwarded to the intended destination.
The decrypted traffic appears to originate from the same interface it
came in from, so in most cases these packets will fail the reverse path
check even if legitimate.

This change adds an exception to not reject packets that were previously
IPsec-encrypted, meaning the have been accepted, decrypted and are in
the process of being forwarded to their final destinal.

Sources:

  - https://www.kernel.org/doc/Documentation/networking/xfrm_device.txt
  - https://git.netfilter.org/nftables/commit/?id=49f6e9a846c6c8325b95debe04d5ebc3c01246fb
  - https://git.netfilter.org/nftables/commit/?id=8f55ed41d007061bd8aae94fee2bda172c0e8996
  - https://thermalcircle.de/doku.php?id=blog:linux:nftables_demystifying_ipsec_expressions

(cherry picked from commit 3c12ef3f21)
2024-08-25 13:07:35 +00:00
Bjørn Forsman
53d5d2be6d nixos/ups: restart upsdrv.service on config changes
Or else new configuration won't take effect until the next boot (or if
the user manually restarts the service).

(cherry picked from commit dc7379e04f)
2024-08-23 17:27:36 +02:00
OPNA2608
669d0c9dea nixos/lomiri: Add gallery app
(cherry picked from commit 8c1cb41408)
2024-08-22 18:59:56 +02:00
Rafael Fernández López
939643bb33 docs: fix Nvidia casing to be consistent across different places
(cherry picked from commit 7749696f61)
2024-08-22 16:52:05 +00:00
Eduard Bachmakov
987f6a5bf2 nixos/systemd/initrd: Fix emergencyAccess to work with null.
Implementation is now compatible with the option's .type already defined.

This allows us to pass `config.users.users.<user>.hashedPassword` even if this is null (the default).

Before:
true  => access
false => no access
hash  => access via password
null  => eval error

After:
true  => access
false => no access
hash  => access via password
null  => no access

(cherry picked from commit b33bf6b99a)
2024-08-21 22:42:12 +00:00
Masum Reza
b538a69ce8
Merge pull request #327380 from NixOS/backport-321010-to-release-24.05
[Backport release-24.05] virtualboxKvm: 20240515 -> 20240617
2024-08-21 15:07:44 +05:30
John Titor
acf94f31f7
nixos/hyprland: set systemd environment PATH for versions < 0.41.2
Importing PATH into the systemd environment is done by default in
Hyprland v0.41.2+ (https://github.com/hyprwm/Hyprland/pull/6640)
We soft deprecate this option here for versions >= 0.41.2.

(cherry picked from commit ff0738b736)
2024-08-19 10:32:27 +05:30
Reputable2722
86dc9c933c
nixos/hyprland: set path order for systemd user services
Set PATH order correctly for systemd user services (see NixOS/nixpkgs#320734

Signed-off-by: Reputable2722 <153411261+Reputable2772@users.noreply.github.com>
(cherry picked from commit dc423d5c69)
2024-08-19 10:32:26 +05:30