Commit Graph

44174 Commits

Author SHA1 Message Date
Nick Cao
8edc668914
matrix: migrated links to new element-hq org (#339817) 2024-09-05 15:56:44 -04:00
Philip Taron
2dd2a33447
nixos/installer: drop support for ReiserFS and JFS (#339821) 2024-09-05 11:30:06 -07:00
Martin Weinelt
cd601fe2ed
matrix-appservice-irc: 2.0.1 -> 3.0.0 (#339603) 2024-09-05 20:08:28 +02:00
github-actions[bot]
769b11176d
Merge master into staging-next 2024-09-05 18:03:49 +00:00
Philip Taron
9c5c04ca43
nixos/services.ceph: remove with lib; (#339093) 2024-09-05 10:38:52 -07:00
Emily
74b480507f
nixos/doc/rl-2411: improve wording of macOS version warning (#339587) 2024-09-05 16:11:44 +01:00
Emily
7b9bb0a9a1 nixos/installer: drop support for ReiserFS and JFS
ReiserFS has not been actively maintained for many years. It has been
marked as obsolete since Linux 6.6, and is scheduled for removal
in 2025. A warning is logged informing users of this every time a
ReiserFS file system is mounted. It suffers from unfixable issues
like the year 2038 problem.

JFS is a slightly more ambiguous case. It also has not been actively
maintained for years; even in 2008 questions were being raised
about its maintenance state  and IBM’s commitment to it, and some
enterprise distributions were opting not to ship support for it as
a result. It will [indefinitely postpone journal writes], leading
to data loss over potentially arbitrary amounts of time. Kernel
developers [considered marking it as deprecated] last year, but
no concrete decision was made. There have been [occasional fixes]
to the code since then, but even the developer of much of those was
not opposed to deprecating it.

[considered marking it as deprecated]: https://lore.kernel.org/lkml/Y8DvK281ii6yPRcW@infradead.org/
[indefinitely postpone journal writes]: https://www.usenix.org/legacy/events/usenix05/tech/general/full_papers/prabhakaran/prabhakaran.pdf
[occasional fixes]: https://www.phoronix.com/news/JFS-Linux-6.7-Improvements

Regardless of whether JFS should be removed from the kernel, with all
the implications for existing installations that entails, I think
it’s safe to say that no new Linux installation should be using
either of these file systems, and that it’s a waste of space and
potential footgun to be shipping support for them on our standard
installation media. We’re lagging behind other distributions on
this decision; neither is supported by Fedora’s installation media.

(It also just so happens that `jfsutils` is the one remaining package
in the minimal installer ISO that has reproducibility issues, due to
some cursed toolchain bug, but I’m not trying to Goodhart’s law
this or anything. I just think we shouldn’t be shipping it anyway.)
2024-09-05 16:00:35 +01:00
paumr
0088e7d130 matrix: migrated links to new element-hq org
The vector-im GitHub organisation has been renamed to element-hq:
1d586281f0/profile/README.md
2024-09-05 16:40:06 +02:00
phaer
b6114fd1d5 hyperv-image: double default size 2024-09-05 15:56:25 +02:00
phaer
3a505620ec hyperv-image: use virtualisation.diskSize 2024-09-05 15:56:25 +02:00
phaer
f8a876644b virtualbox-image: use virtualisation.diskSize 2024-09-05 15:56:25 +02:00
phaer
52561c65a2 openstack-image-zfs: increase build-time RAM 2024-09-05 15:56:25 +02:00
phaer
db8d63ba70 openstack-image-zfs: sizeMB -> virt[...].diskSize 2024-09-05 15:56:25 +02:00
phaer
a4b1638f7f azure-image: use virtualisation.diskSize 2024-09-05 15:56:25 +02:00
phaer
759de4c54d amazon-image: sizeMB -> virtualisation.diskSize 2024-09-05 15:56:25 +02:00
phaer
d223461d54 digital-ocean-image: use virtualisation.diskSize
This makes negative diskSizes, that were previously allowed illegal.
2024-09-05 15:56:25 +02:00
phaer
d37a3ea1ef promox-image: use virtualisation.diskSize 2024-09-05 15:56:24 +02:00
phaer
9e18e9fedc google-compute-image: use virtualisation.diskSize 2024-09-05 15:56:24 +02:00
phaer
048599f0d7 linode-image: use virtualisation.diskSize 2024-09-05 15:56:24 +02:00
phaer
564b6ce153 oci-{options,image}: use virtualisation.diskSize 2024-09-05 15:56:24 +02:00
phaer
94634e82f8 macos-builder: use virtualisation.diskSize...
...and drop virtualisation.darwin-builder.diskSize.

This makes negative diskSizes illegal.
2024-09-05 15:56:24 +02:00
phaer
39df221e77 virtualisation-options: init
see header comment in virtualisation-options.nix
2024-09-05 15:56:24 +02:00
phaer
04fadac429 run nixfmt-rfc-style 2024-09-05 15:56:22 +02:00
Emily
8b16862469
brightboxImage: remove, as it seems unmaintained (#339790) 2024-09-05 14:20:39 +01:00
phaer
74180c6159 brightboxImage: remove, as it seems unmaintained
...and is broken/flaky on master, due to custom script with mknod usage.
2024-09-05 14:40:29 +02:00
github-actions[bot]
37c947df6c
Merge master into staging-next 2024-09-05 12:05:31 +00:00
K900
1e41473cf0
nixos/orca: init, enable by default on Plasma (#339069) 2024-09-05 14:01:33 +03:00
nikstur
f349590f46
auditd: fix service ordering (#339465) 2024-09-05 11:19:14 +02:00
Frédéric Christ
6aba98aefd nixos/testing: Fix tty output
Prior to this contribution, the Kernel's frame buffer output
boot log wasn't visible on the graphical console.

Now, we can also test applications with graphical output that run
during the boot process.
2024-09-05 10:54:55 +02:00
K900
5a4ee0a587 nixos/pantheon: switch to Orca module 2024-09-05 11:52:53 +03:00
K900
69d2dc4d43 nixos/gnome: switch to Orca module 2024-09-05 11:52:53 +03:00
K900
029879164d nixos/cinnamon: switch to Orca module 2024-09-05 11:48:46 +03:00
Ryan Horiguchi
737d1ffb22 netdata: 1.46.1 -> 1.47.0 2024-09-05 10:19:35 +02:00
Tom Fitzhenry
752afd12e7 unl0kr: remove tomfitzhenry@ as maintainer 2024-09-05 18:10:59 +10:00
r-vdp
38d73e0c07
auditd: add a dependency on systemd-tmpfiles-setup
This is needed so that:
- users have been created (when using systemd-sysusers or userborn)
- /run and /var/run exist
2024-09-05 10:05:18 +02:00
K900
cda3c82d92 nixos/plasma5: enable Orca by default 2024-09-05 10:55:34 +03:00
K900
0f03350dc9 nixos/plasma6: enable Orca by default 2024-09-05 10:55:34 +03:00
K900
64da401049 nixos/orca: init very simple module 2024-09-05 10:55:34 +03:00
r-vdp
6ccc6bf4d2
initrd: emit a warning when tmpfiles config is created manually 2024-09-05 09:55:29 +02:00
Azat Bahawi
187f4340c6
nixos/endlessh-go: allow overriding package (#339459) 2024-09-05 07:48:21 +00:00
Moritz Sanft
d0213a75e0
nixos: support dm-verity 2024-09-05 08:42:53 +02:00
Jonas Heinrich
880bd89c4d nixos/stalwart-mail: package and configure webadmin 2024-09-05 08:33:58 +02:00
github-actions[bot]
b00b35b402
Merge master into staging-next 2024-09-05 06:04:41 +00:00
Vivek Revankar
15b474ae05 nixos/endlessh-go: allow overriding package
allow overriding the endlessh-go package used in the service
2024-09-04 22:28:54 -07:00
Vivek
17a46028b9 nixos/endlessh-go: fix firewall bugs
this change fixes 2 major bugs in the endlessh-go service's firewall options:

1. prometheus port unexpectedly allowed through firewall (services.endlessh-go.openFirewall)

the description of the option is "Whether to open a firewall port for the SSH listener." however as we can see, both the ssh listener AND the prometheus listener have their ports opened. this is especially troublesome because endlessh-go (i guess as an artifact of being developed for docker) defaults the prometheus listener to 0.0.0.0.

2. the prometheus port unexpectedly allowed through firewall when prometheus is disabled (services.endlessh-go.prometheus.enable)

even when prometheus is disabled, its port is allowed through the firewall
2024-09-04 20:32:47 -07:00
éclairevoyant
fcb54ddcc9
openlens: remove package (#339553) 2024-09-05 02:32:14 +00:00
rewine
0daec7844f
deepin desktop environment: 2024.09 update (#338402) 2024-09-05 10:08:27 +08:00
Martin Weinelt
ad601344e1
Revert "nixos/version: validate system.stateVersion" (#339671)
This broke the eval of the ISOs on nixos/unstable-small and likely nixos/trunk-combined. See #339671 for details.
2024-09-05 03:22:20 +02:00
github-actions[bot]
74cdd9c9b1
Merge master into staging-next 2024-09-05 00:13:11 +00:00
Felix Buehler
03a0f9debe nixos/security.acme: remove with lib; 2024-09-05 00:28:18 +02:00
Emily
1ac50842b2 nixos/doc/rl-2411: improve wording of macOS version warning
Fixes: f1c3597d95
2024-09-04 23:26:31 +01:00
Felix Bühler
d7ed3794f0
nixos/services.unpoller: remove with lib; (#339094) 2024-09-04 23:52:53 +02:00
Emily
42e6ee04b1
nixos/*: use pipewire by default (#339209) 2024-09-04 22:42:18 +01:00
Sebastian Sellmeier
4b29fd82fc
openlens: remove package 2024-09-04 22:47:28 +02:00
Martin Weinelt
de396087e9
nixos/tests/matrix-appservice-irc: modernize 2024-09-04 21:05:50 +02:00
Martin Weinelt
d3df411913
nixos/matrix-appservice-irc: media proxying support
Adds required options for serving authenticated media and the key
generation logic.
2024-09-04 21:05:50 +02:00
Johannes Jöns
3df1783166
nixos/version: validate system.stateVersion (#317858) 2024-09-04 18:09:57 +00:00
github-actions[bot]
563bb0fbc2
Merge master into staging-next 2024-09-04 18:04:23 +00:00
Philip Taron
271d117596
treewide: fix eval related to with lib; removal (#339356) 2024-09-04 09:42:58 -07:00
Maciej Krüger
bf757cefa9
Revert "nixos/firewall: fix reverse path check failures with IPsec" (#339393) 2024-09-04 18:39:17 +02:00
éclairevoyant
f6306c0961
treewide: fix eval related to with lib; removal 2024-09-04 12:21:09 -04:00
Florian Klink
bcc7693c76
nixos/timesyncd: allow NTP servers advertised by DHCP to be used (#335755) 2024-09-04 22:53:48 +07:00
Aleksana
9b4a8db85e
nixos/tests/ec2-nixops: fix build (#338147) 2024-09-04 22:17:39 +08:00
Aleksana
43aabb266d
nixos/github-runner: fix build failure (#339452) 2024-09-04 22:15:57 +08:00
r-vdp
d558554243
initrd: use the new tmpfiles options to create tmpfiles config
Otherwise we get a clash when generating the initrd since the initrd tmpfiles
options create a symlink at /etc/tmpfiles.d/ and any subsequent writes inside
this directory because of initrd.systemd.contents will cause a permission denied
error.
2024-09-04 14:39:03 +02:00
github-actions[bot]
4be617cf77
Merge master into staging-next 2024-09-04 12:06:17 +00:00
K900
63222b4c81 doc/rl-2411: add PipeWire note 2024-09-04 13:56:51 +03:00
K900
4463e63001 nixos/tests: don't enable Pulseaudio 2024-09-04 13:56:51 +03:00
K900
e90bac5a65 nixos/plasma5: clean up pulseaudio-related things 2024-09-04 13:56:51 +03:00
K900
5a0ceb9243 nixos/pantheon: don't enable Pulseaudio 2024-09-04 13:56:50 +03:00
K900
c6777a9dd8 nixos/lomiri: don't enable Pulseaudio 2024-09-04 13:56:50 +03:00
K900
78d6adf386 nixos/installer: don't enable Pulseaudio 2024-09-04 13:56:50 +03:00
K900
644cf688b3 nixos/graphical: don't enable Pulseaudio 2024-09-04 13:56:42 +03:00
K900
2ed8e5f614 nixos/gnome: don't enable Pulseaudio 2024-09-04 13:56:42 +03:00
K900
8c2dd1b1be nixos/deepin: don't enable Pulseaudio 2024-09-04 13:56:42 +03:00
K900
6bd9daa1c6 nixos/cinnamon: don't enable Pulseaudio 2024-09-04 13:56:42 +03:00
K900
80a7f7effd nixos/budgie: don't enable Pulseaudio 2024-09-04 13:56:42 +03:00
K900
438fd16359 nixos/graphical-desktop: enable Pipewire audio by default 2024-09-04 13:56:42 +03:00
K900
dcd4151fd6 nixos/steam: also enable 32-bit Pipewire plugins 2024-09-04 13:56:42 +03:00
Kerstin Humm
21ac7729ae nixos/weblate: add borgbackup to path 2024-09-04 12:54:31 +02:00
datafoo
24e08d0e9b nixos/timesyncd: allow NTP servers advertised by DHCP to be used
- add option `fallbackServers` with default to `networking.timeServers`
- option `servers` now default to null

Fix #335050
2024-09-04 12:17:39 +02:00
datafoo
b4cd57870d nixos/timesyncd: allow null for option servers
This gives the ability to not write `NTP=` to the `timesyncd.conf` file
(servers = null) as opposed to writing `NTP=` (servers = []) which is
interpreted slightly differently by systemd:

> When the empty string is assigned, the list of NTP servers is reset,
and all prior assignments will have no effect.
2024-09-04 12:14:24 +02:00
datafoo
34efcf8aef nixos/timesyncd: minor refactoring 2024-09-04 12:14:24 +02:00
datafoo
45c0d04735 nixos/timesyncd: minor refactoring 2024-09-04 12:14:24 +02:00
Florian Agbuya
1032b5fa95 flarum: disable automatic DB creation 2024-09-04 16:33:30 +08:00
Florian Agbuya
249dacfaa8 flarum: fix flarum directory permissions 2024-09-04 16:33:18 +08:00
r-vdp
544c97226d
auditd: remove with lib 2024-09-04 10:00:07 +02:00
r-vdp
0cb37347c6
auditd: format with nixfmt 2024-09-04 10:00:07 +02:00
Doron Behar
024357143a
nixos/samba: add mount.cifs +s wrapper (#328901) 2024-09-04 07:55:39 +00:00
Sirio Balmelli
dc700df6b2
nixos/github-runner: fix build failure
Shellcheck complains:

       > args=(
       >      ^-- SC2054 (warning): Use spaces, not commas, to separate array elements.

Add a comment disabling shellcheck in this case and annotating why.

Signed-off-by: Sirio Balmelli <sirio@b-ad.ch>
2024-09-04 09:20:11 +02:00
K900
23b4832da0 Merge remote-tracking branch 'origin/master' into staging-next 2024-09-04 08:53:48 +03:00
rewine
29d62536b9 deepin.nix: install dde-api-proxy 2024-09-04 10:16:56 +08:00
rewine
60348797ee deepin.dde-dock: remove 2024-09-04 10:16:54 +08:00
Sachi King
361fde84f9 Revert "nixos/firewall: fix reverse path check failures with IPsec"
The inclusion of the "meta ipsec" rule in the default reverse path
filtering breaks systems not built with specific XFRM kernel config
options.  Specifically CONFIG_XFRM must be set, which gets selected
by CONFIG_NFT_XFRM, which is hidden behind CONFIG_XFRM_USER.

These options are not selected by default in most defconfig's provided
by the kernel with the exception of some device-specific defconfigs.

These options are not set by the nix kernel common_config, and I would
argue that IPSec support does not belong in a minimal kernel as that
elevates its support status above other in-kernel VPN interfaces.

The contributor of this feature does not seem interested in working
towards a solution that does not break systems running kernels built
with "autoModules = false" while supporting this feature, and as this
silently breaks firewalls into an insecure state and poses an immediate
security issue I propose this be reverted until a solution that does not
break such systems is proposed.
https://github.com/NixOS/nixpkgs/pull/310857#discussion_r1742834970

Devices used as firewalls, if they do not have the required kernel
config, will fail to load the new firewall rules and will upon boot pass
traffic without any filtering into the internal network.

Devices exposed directly to the internet, after reboot, will boot
without filtering potentially exposing services not intended to be
exposed to the internet, such as databases.

The following platforms in nixpkgs appear to be impacted:
 - pc_simplekernel
 - pogoplug4
 - sheevaplug
 - zero-gravitas
 - zero-sugar
 - utilite
 - guruplug
 - beaglebone
 - fuloong2f_n32

References to hardware without autoModules can be found in
nixos-hardware, as well as in active third-party repos on github.

I suspect there are other users impacted that do not have their configurations
public, as autoModules = true leads to long compile times when targeting
kernels to less standard hardware or hardware with quirks that require
patches that cannot be upstreamed.

This reverts commit 3c12ef3f21.
2024-09-04 11:51:15 +10:00
Philip Taron
9e244d3d92
nixos/services.factorio: fix escapeShellArg (#339115) 2024-09-03 13:32:36 -07:00
Sandro
6e055283a9
virtualisation/azure-images: drop outdated list... (#338426) 2024-09-03 21:16:39 +02:00
Maximilian Bosch
6cc3e274c9
prometheus-openldap-exporter: remove (#338824) 2024-09-03 19:57:31 +02:00
Artturin
74065337aa
mouse-actions-gui: init at 0.4.4 (#269518) 2024-09-03 19:33:49 +03:00
Philip Taron
7f1830f117
nixos/services.thinkfan: fix undefined variables (#338951) 2024-09-03 09:18:28 -07:00
Maximilian Bosch
40012de7de
mautrix-signal: 0.6.3 -> 0.7.0 (#337534) 2024-09-03 17:18:01 +02:00
Aleksana
43b54f4834
nixos/services.bees: Fix evaluation (#339185) 2024-09-03 20:36:36 +08:00
Aleksana
5624b8e352
nixos/foot: fix bash script (#339077) 2024-09-03 20:06:00 +08:00
github-actions[bot]
9b619f2f77
Merge master into staging-next 2024-09-03 12:05:18 +00:00
Bruno BELANYI
4d1e8c93a6
nixos/prowlarr: set HOME for the service (#317554) 2024-09-03 11:08:10 +01:00
Sandro
3bd4ec61c2
nixos/stargazer: module bug fix and hardening (#294795) 2024-09-03 11:56:05 +02:00
Benno Bielmeier
b8c7d88784 nixos/services.thinkfan: fix undefined variables
In d9dc50dc11 the usage of `with lib;` has
been removed from thinkfan.nix. Unfortunately, adjusting the check line
and its usage of the functions all,id,zipListsWith has not been updated
resulting in evaluation errors complaining about "undefined variable".
Update: partly covered in 0646a0771b of #339084

rel: #208242
2024-09-03 10:42:28 +02:00
r-vdp
20291241fd
wstunnel: the ping frequency can now also be configured for the server
See: https://github.com/erebe/wstunnel/pull/338
2024-09-03 10:38:43 +02:00
Pol Dellaiera
930e12b9e8
nixos/services.openssh: remove with lib; (#339092) 2024-09-03 10:18:32 +02:00
K900
878922a902 nixos/installation-device: use a bigger hammer
Untrimmed mbrola-voices is leaking into the installer images again.
Instead of trying to manually squash every path it could possibly
leak through, use a very big hammer.
2024-09-03 10:53:25 +03:00
Jon Seager
d6834ede48
nixos/vmware.guest: disable xf86inputvmmouse on aarch64 (#326395) 2024-09-03 08:02:55 +01:00
Christina Sørensen
ed1dc0d441
nixos/kubernetes: amend dns addon clusterDns list (#338801) 2024-09-03 09:01:25 +02:00
Jörg Thalheim
a9034a9c35
nixos/grub: fix value precedence with optional -> mkIf (#338773) 2024-09-03 08:29:25 +02:00
github-actions[bot]
b7b46e40c2
Merge master into staging-next 2024-09-03 06:04:33 +00:00
Emily
2419b85a5e
nixos/syncplay: add missing options (#338579) 2024-09-03 04:36:51 +01:00
Assistant
8119ec6478 nixos/syncplay: add missing options
Exposes all currently available command-line arguments that were
missing, including some that were impossible to use with the catch-all
option `extraArgs` alone, requiring changes to other parts of the
system.
Those are now all self-contained in the module.
The service now uses systemd's `DynamicUsers`.
2024-09-02 22:26:11 -04:00
Bernardo Meurer
fc13b0acdb
Merge branch 'master' into add-rutorrent-service 2024-09-03 01:18:16 +00:00
github-actions[bot]
a07f612219
Merge master into staging-next 2024-09-03 00:13:11 +00:00
Felix Buehler
e1281c7a9d nixos/services.factorio: fix escapeShellArg 2024-09-02 23:47:15 +02:00
Felix Buehler
5f8696e39c nixos/services.openssh: remove with lib; 2024-09-02 22:31:36 +02:00
Felix Buehler
31c38324dd nixos/services.ceph: remove with lib; 2024-09-02 22:30:59 +02:00
Felix Buehler
f57a188819 nixos/services.unpoller: remove with lib; 2024-09-02 22:30:26 +02:00
Felix Buehler
4f6d325a8a nixos/services.graphite: remove with lib; 2024-09-02 22:29:51 +02:00
Felix Buehler
d37789ce5d nixos/services.taskserver: remove with lib; 2024-09-02 22:29:22 +02:00
Felix Buehler
3687224301 nixos/services.snapper: remove with lib; 2024-09-02 22:28:48 +02:00
Felix Buehler
9ed63429ab nixos/services.rippled: remove with lib; 2024-09-02 22:28:20 +02:00
Felix Buehler
11dd437b65 nixos/services.radicle: remove with lib; 2024-09-02 22:27:51 +02:00
Felix Buehler
cd7695ae97 nixos/services.portunus: remove with lib; 2024-09-02 22:27:08 +02:00
Felix Buehler
f51cd10816 nixos/services.borgbackup: remove with lib; 2024-09-02 22:26:34 +02:00
Felix Buehler
60e8c03c9b nixos/services.snapserver: remove with lib; 2024-09-02 22:25:44 +02:00
Felix Bühler
1f34eeb672
nixos/services.thinkfan: fix all & id (#339084) 2024-09-02 22:21:06 +02:00
Martin Weinelt
abbba61963
zigbee2mqtt: 1.39.1 -> 1.40.0 (#338906) 2024-09-02 22:19:56 +02:00
Alyssa Ross
ca4ecee93b nixos/doc/rl-2411: document "rust" deprecations 2024-09-02 21:48:21 +02:00
Felix Bühler
8dd85c637c
nixos/services.zammad: remove with lib; (#338051) 2024-09-02 21:42:59 +02:00
Felix Buehler
0646a0771b nixos/services.thinkfan: fix all & id 2024-09-02 21:12:56 +02:00
Frédéric Christ
aab2bd233c nixos/mautrix-signal: Adapt to new configuration
With mautrix-signal v0.7.0 the bridge is built upon the bridgev2
architecture. With this, the configuration file was slightly rearranged.
Options like login_shared_secret_map and double_puppet_server_map were
dropped.
2024-09-02 20:47:10 +02:00
Frédéric Christ
e38c90b7c9 nixos/mautrix-signal: Reformat code 2024-09-02 20:40:36 +02:00
linsui
d572c865ad nixos/foot: fix bash script 2024-09-03 02:27:22 +08:00
github-actions[bot]
ce19166255
Merge master into staging-next 2024-09-02 18:04:19 +00:00
Aaron Andersen
5e8cc27962 nixos/openvpn: add extraArgs option 2024-09-02 09:49:02 -04:00
Martin Weinelt
76d4d43c6f
nixos/doc/rl-24.11: knot 3.4.0 migration guide 2024-09-02 15:25:32 +02:00
Martin Weinelt
fcc561f390
nixos/tests/prometheus-exporters/knot: update for 3.4.0
Removes deprecated and now removed fields from the config.
2024-09-02 15:20:36 +02:00
github-actions[bot]
4aa8416117
Merge master into staging-next 2024-09-02 12:05:34 +00:00
Zhong Jianxin
422ae9928a nixos/services.bees: Fix evaluation
```
error: undefined variable 'mod'
```
2024-09-02 19:23:52 +08:00
phaer
53df1e4ece virtualisation/qemu-vm: disallow nullable diskSize
Because `virtualisation.diskSize = null` does result in a broken vm runner,
see https://github.com/NixOS/nixpkgs/issues/292901.

diskSize was declared to be nullable when it first got types in a
tree-wide commit:
30f0faac22

But it seemingly never actually supported it, as "${cfg.diskSize}M" is
passed to qemu-img create, which doesn't allow an empty size parameter.

closes: https://github.com/NixOS/nixpkgs/issues/292901
2024-09-02 12:09:15 +02:00
Weijia Wang
c0df3aea49
nixos/doc/rl-2411: warn about upcoming macOS version requirement (#338695) 2024-09-02 09:56:38 +02:00
Martin Weinelt
27aaa2d596
zigbee2mqtt: 1.39.1 -> 1.40.0
https://github.com/Koenkk/zigbee2mqtt/releases/tag/1.40.0
2024-09-02 02:18:01 +02:00
github-actions[bot]
d834278999
Merge master into staging-next 2024-09-02 00:13:57 +00:00
Felix Bühler
06aee405da
nixos/services.neo4j: remove with lib; (#338049) 2024-09-01 20:52:52 +02:00
Niklas Hambüchen
1dab03cf4a
maintainers: add benaryorg (#338657) 2024-09-01 20:45:53 +02:00
Felix Buehler
6747d84812 nixos/services.kanata: fix utils 2024-09-01 19:42:03 +02:00
Jan Tojnar
e9179b4fa3 Merge branch 'master' into staging-next 2024-09-01 19:04:04 +02:00
Artturin
0d5deebbfd
nixosTests.systemd-initrd-luks-fido2: fix test on aarch64-linux (#297308) 2024-09-01 19:45:29 +03:00
Maximilian Bosch
735662bf16
prometheus-openldap-exporter: remove
2.3.0 is the final release, the repo is now archived.

Also I don't use it anymore for quite a while, so it didn't have a real
nixpkgs maintainer either.

Closes #338712
2024-09-01 16:47:45 +02:00
Emily
ca59219c43
python3Packages.{mautrix,matrix-nio}: add withOlm flags (#336901) 2024-09-01 15:38:16 +01:00
Étienne Simon
b5574c71be
Fix nested quotes in fontconfig.nix
A sed with nested double quotes is inserting malformed XML into /etc/fonts/fonts.conf, this commit put the sed command into single quotes to properly insert double quotes to enclose the XML attribute.
2024-09-01 15:55:12 +02:00
Sarah Brofeldt
a1863c871e nixos/kubernetes: amend dns addon clusterDns list
With 24.11, this is the required type, and we rely on this for the NixOS
tests
2024-09-01 15:13:11 +02:00
Sarah Brofeldt
1860dfed71
nixos/kubernetes: allow setting multiple kubelet dns resolvers (#338523) 2024-09-01 15:07:08 +02:00
Jan Tojnar
ffdd6582a0 release-notes: Mention gnome scope dissolution
Now, only non-packages remain.
2024-09-01 14:16:31 +02:00
Jan Tojnar
58bf5606fb gnome-flashback: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
b37f158fb0 gnome-applets: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
e1093690a8 gnome-panel: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
a110f292a1 gnome-control-center: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
c2f1fa833e gnome-session: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
ca9576c81d gnome-shell: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
7f387d6bf9 mutter{,43}: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
d2da9a19c4 gnome-settings-daemon{,43}: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
b4c59a979a gnome-bluetooth{,_1_0}: Move to by-name 2024-09-01 14:16:31 +02:00
zimbatm
1ea32d4f69 nixos/grub: fix value precendence with optional -> mkIf
When using `lib.optionals`, the return value of both branches of the
condition get set as a value to the option.

When using `lib.mkIf`, only the positive condition gets set as a value
to the option.

This small distinction is important when dealing with precedence. For
example here, we wanted to set a boot.grub.devices default value with
lib.mkDefault, and that was getting overridden with the empty value of
`lib.optional (cfg.device != "") cfg.device`.

See https://github.com/nix-community/srvos/pull/491#discussion_r1738827651

The general conclusion is that using `lib.mkIf` is preferable to
`lib.optional` or `lib.optionals` when setting values in the NixOS
module system.
2024-09-01 12:13:15 +02:00
wxt
1c77c14c21 nixos/todesk: init 2024-09-01 17:19:09 +08:00
Quantenzitrone
2521bebbf2
nixosTests.systemd-initrd-luks-fido2: fix test on aarch64-linux
This is the error message on fail:

> qemu-system-aarch64: -device canokey,file=/tmp/canokey-file: Warning:
>   speed mismatch trying to attach usb device "CanoKey QEMU" (full
>   speed) to bus "usb0.0", port "3" (high speed)

My Understanding of the Issue is: The test failed because
qemu-system-aarch64 apparently has different USB controllers enabled by
default, resulting in a "speed mismatch" between the USB controller and
CanoKey that only occurred on aarch64.
I could reproduce the issue on x86_64 by enabling the EHCI controller
and then fix the issue by specifying which USB bus to use for the
CanoKey.
This didn't fully fix the issue on my first attempt, because the UCHI
controller enabled by -usb doesn't have the same bus name on aarch64
and x86_64.
While bus=usb-bus.0 worked on x86_64, on aarch64 i get this message:

> qemu-system-aarch64: -device canokey,bus=usb-bus.0,file=
>   /tmp/canokey-file: Bus 'usb-bus.0' not found

The final solution now manually enables the OHCI controller (which may
be similar to UHCI, but i really have no idea other than it works) and
assigns it the id aka bus name "usb-bus", so it works the same under
both architectures.
2024-09-01 10:40:14 +02:00
github-actions[bot]
0cfb8626ee
Merge staging-next into staging 2024-09-01 06:05:31 +00:00
Artturin
877838a0da
nixos/tests/plotinus: fix build (#338686) 2024-09-01 07:33:59 +03:00
github-actions[bot]
1fdf4b61a4
Merge staging-next into staging 2024-09-01 00:16:33 +00:00
Emily
f1c3597d95 nixos/doc/rl-2411: warn about upcoming macOS version requirement
For a long time now, the SDK and minimum target version for
`x86_64-darwin` has been stuck on macOS 10.12. In the past, the minimum
SDK was updated quite regularly; at first, the current situation was
just because updating the SDKs was excessively burdensome and nobody
was up for doing the work, but the introduction of `aarch64-darwin`
with its macOS 11 default SDK has resulted in a long‐term fracture
of the two platforms.

Per <https://endoflife.date/macos>, macOS 10.12 has not received
an update since 2017 and went out of security support 5 years
ago. Trying to support it in Nixpkgs has been a large burden on the
Darwin maintainers, resulting in workarounds, porting work, and even
patching functionality out of applications. The existence of Nix
users using a macOS version this old is, to my knowledge, entirely
theoretical, and we pay in both maintenance costs and functionality:
for instance, applications built for `x86_64-darwin` do not support
automatic dark mode switching by default.

This situation has always been suboptimal, but it is
now becoming untenable. Python, a critical component
of the Nixpkgs standard environment for builds, is
dropping support for versions older than 10.13 in 3.13:
<https://www.python.org/downloads/release/python-3130rc1/>. Qt 6 only
supports macOS 11 and newer. libuv only supports the versions Apple
does, and is a ticking time bomb due to its use in the standard
environment. QEMU only supports the last two macOS releases, and
won’t build with an SDK older than macOS 12; we previously vendored
a set of backporting changes and functionality‐removing reverts
to keep it building for 10.12, but this also became overly onerous,
and we gave up in <https://github.com/NixOS/nixpkgs/pull/338598>.

`x86_64-darwin` is a platform with a limited upstream future. Apple no
longer sells any hardware that runs it natively, and it is unclear how
much longer they will support it in the operating system. There are
still many users of the platform, myself included, so we shouldn’t
drop support for it prematurely, but it’s unreasonable to try and
patch the entire world to keep it supporting insecure versions of
the OS that only run on hardware that is no longer sold.

Therefore, this adds a release note to warn users ahead of time that
25.05 will only support macOS 11 and newer, as suggested by the 24.05
release team when the possibility of bumping the required version
was raised.

Why target Big Sur, rather than any other version? The
reason is simple: it’s the same SDK and deployment target as
`aarch64-darwin`. There are many packages that work on `aarch64-darwin`
but not `x86_64-darwin`, and Darwin maintainers frequently need to be
called in to fix things that work fine on the newer platform but not
the older one. This change will increase the health of `x86_64-darwin`
by aligning the SDK versions and support between the two platforms;
the vast majority of packages that work on one will Just Work on the
other. macOS 11 is almost four years old and has itself been out of
security support for a year now, but as the first version to support
Apple Silicon, it’s a far more compatible base for us to build our
Darwin packages for. Any future change in supported versions should
be synchronized between the two Darwin architectures.

When 25.05 is released, users on old, unsupported versions of macOS
will have the following options:

* Update to a new macOS version. For users that are on hardware
  that Apple has dropped support for, OpenCore Legacy Patcher
  (<https://dortania.github.io/OpenCore-Legacy-Patcher/>) can enable
  the use of newer macOS versions on hardware even older than 10.12
  supports.

* Install NixOS. That obviously precludes the use of macOS software
  (though most of that software has already dropped support for 10.12),
  but will give users a secure, supported operating system that we
  can actually own the support for going forward.

* Keep using 24.11 forever. Since they’re not getting updates
  to their OS and core applications anyway, this is likely to be
  acceptable to many users.

* Switch to MacPorts. They support all the way back to 10.6 for
  `x86_64-darwin` by building packages separately for every OS release,
  though not every package is available for every version.

* Send patches. We *may* accept non‐invasive patches to keep
  certain critical packages (such as the core `stdenv` packages)
  building for old OS versions, on a case‐by‐case basis, but we
  can’t guarantee it. This will ultimately have to be a decision
  made by package maintainers and personally I doubt this will be a
  viable path to sustainably support older versions.
2024-09-01 00:29:37 +01:00
Maximilian Bosch
9ac9a9c2f5
nixos/tests/wireguard: tie kernel version to test to default (#338632) 2024-09-01 00:06:25 +02:00
ghpzin
506d9f0416
nixos/tests/plotinus: fix build
- change tested app from gnome-calculator to gnome-pomodoro as plotinus
only works on gtk3 apps
- change screenshot result to one that shows popup from plotinus
instead of preferences window
- add 2 minute timeouts waiting for windows
- add 10 minute timeout for full test
2024-09-01 00:31:59 +03:00
Artturin
9ef8a9cd56
nixos/telegraf: make sure ping executable is available when trying to ping (#338673) 2024-08-31 23:52:58 +03:00
Felix Bühler
7f62309646
nixos/fonts.fontconfig: remove with lib; (#338042) 2024-08-31 22:52:12 +02:00
Echo Nolan
934a337a13 nixos/telegraf: make sure ping executable is available when trying to ping
We need ping to be in PATH of the service otherwise it can't ping. This commit
adds it, conditional on one of the inputs being a ping task.
2024-08-31 15:29:04 -04:00
Will Fancher
811ee8ab2e
nixos/iso-image: Compress squashfs with zstd 19 (#338652) 2024-08-31 14:38:47 -04:00
github-actions[bot]
f20de6f5f1
Merge staging-next into staging 2024-08-31 18:04:19 +00:00
benaryorg
4105cdb446
tests/ceph: benaryorg as dmcrypt test maintainer
Signed-off-by: benaryorg <binary@benary.org>
2024-08-31 17:12:02 +00:00
Will Fancher
49192ef7a3 nixos/iso-image: Compress squashfs with zstd 19 2024-08-31 12:21:36 -04:00
Lin Jian
485edde32f
doc/release-notes: change "New Services" to "New Modules" (#337984) 2024-08-31 23:11:50 +08:00
éclairevoyant
075c6ce71f
nixos/fcitx5: fix evaluation (#338621) 2024-08-31 14:28:20 +00:00
sternenseemann
891a1f78e8 nixos/tests/wireguard: tie kernel version to test to default
When wireguard began being tested on multiple kernel versions, the
current default version at the time was hard coded:
41bd6d2614.

We should update this and prevent it from becoming stale ever again by
computing the default value.
2024-08-31 16:09:11 +02:00
Nick Cao
4a7f3e03c1
nixos/fcitx5: replace renamed options in test 2024-08-31 09:22:24 -04:00
Niklas Hambüchen
41f229d131
ceph.tests: Fix maintainer eval (#338619) 2024-08-31 15:22:03 +02:00
Nick Cao
38cabf32f8
nixos/fcitx5: fix evaluation 2024-08-31 09:20:31 -04:00
github-actions[bot]
c33b70bb75
Merge staging-next into staging 2024-08-31 12:05:08 +00:00
Martin Weinelt
b51e706d6e
nixos/doc/rl-2411: frigate breaking changes 2024-08-31 13:49:32 +02:00
Martin Weinelt
9e01f2b6ac
nixos/tests/frigate: test login 2024-08-31 13:49:32 +02:00
Martin Weinelt
62a52a1b3c
frigate: 0.13.2 -> 0.14.1
https://github.com/blakeblackshear/frigate/releases/tag/v0.14.0
https://github.com/blakeblackshear/frigate/releases/tag/v0.14.1
2024-08-31 13:49:32 +02:00
Niklas Hambüchen
def05db018 ceph.tests: Fix maintainer eval 2024-08-31 11:47:58 +00:00
Niklas Hambüchen
53152af2fe
ceph: Fix missing patch for Ceph with dmcrypt (#335684) 2024-08-31 13:11:26 +02:00
benaryorg
0cd631e61f tests/ceph: bluestore, dmcrypt, and IPv6 test
Signed-off-by: benaryorg <binary@benary.org>
2024-08-31 11:07:25 +00:00
github-actions[bot]
023a2c3d2a
Merge staging-next into staging 2024-08-31 06:04:54 +00:00
github-actions[bot]
8158f1d5b3
Merge master into staging-next 2024-08-31 06:04:15 +00:00
Tomodachi94
2d8f095ab1
nixos/hydra: unset SSL_CERT_FILE
An ancient comment says to unset this variable after 16.03. Considering
we've just gotten past 24.05, I think it's safe to remove this finally.

Tests still pass after this change.
2024-08-30 21:26:59 -07:00
Tomodachi94
d464996f3f
nixos/hydra: fix typo 2024-08-30 21:11:17 -07:00
Tomodachi94
386a1d5d06
nixos/hydra: add system-hydra.slice
Part of #279915
2024-08-30 21:09:00 -07:00
Tristan Gosselin-Hane
2d54b2b048 nixos/kubernetes: allow setting multiple kubelet dns resolvers
The current kubernetes module only allows you to set a single DNS
resolver for the kubelet. Historically, this has not mattered as the
value was passed to a cli argument as a string and as per the kubelet's
configuration parsing mechanism, multiple values could be passed as a
comma-delimited string. However, recently, the module was refactored to
make configure kubernetes components via configuration files rather than
the deprecated command-line arguments. These files more strongly-typed
than CLI arguments and to pass multiple values, one must define a list
in the file. When this change was made, an incorrect assumption was made
that only a single DNS server could be specified and forced a
single-item list into this configuration file. We need to introduce a
breaking change to the module in order to allow the user to supply their
own list with however many dns resolvers they wish to use.
2024-08-30 22:17:00 -04:00
Tristan Gosselin-Hane
5a03aa5a45 nixos/kubernetes: add extraConfig to kubelet config
Every now and then, kubernetes adds new configuration parameters to the
kubelet configuration. Since this is defined using a nix attrset which
is then converted to json/yaml, it would be nice to have an escape hatch
similar to the extraOpts one that exists for additional CLI arguments.
The typical use case would be to configure new settings before they are
officially supported in the nixos module.
2024-08-30 22:12:40 -04:00
Yt
4dd3c85ad5
{prisma,prisma-engines}: 5.16.1 -> 5.18.0 (#337521) 2024-08-31 00:15:53 +00:00
github-actions[bot]
fab50d5f8d
Merge staging-next into staging 2024-08-31 00:13:46 +00:00
github-actions[bot]
dcad9b571a
Merge master into staging-next 2024-08-31 00:13:18 +00:00
Philip Taron
9916dc8728
treewide/nixos: remove with lib; part 2 (#335618) 2024-08-30 15:56:57 -07:00
Philip Taron
4710721d41
nixos: Support fileSystems.<name>.depends with fstab-generator (#233707) 2024-08-30 15:55:39 -07:00
Felix Bühler
30eba5df55
nixos/services.libinput: remove with lib; (#338054) 2024-08-30 23:15:31 +02:00
Felix Buehler
5f816eeb7e nixos.tests.audiobookshelf: remove with lib; 2024-08-30 23:01:46 +02:00
Felix Buehler
dcb2e4eba4 nixos/services.xe-guest-utilities: remove with lib; 2024-08-30 23:01:45 +02:00
Felix Buehler
3e5d6ba7df nixos/virtualisation.vmware.image: remove with lib; 2024-08-30 23:01:45 +02:00
Felix Buehler
cd197cebdf nixos/system.autoUpgrade: remove with lib; 2024-08-30 23:01:45 +02:00
Felix Buehler
10e8c2cecd nixos/environment.etc: remove with lib; 2024-08-30 23:01:45 +02:00
Felix Buehler
f3dd1a8bd5 nixos/services.logind: remove with lib; 2024-08-30 23:01:45 +02:00
Felix Buehler
69ca7aa56f nixos/services.journald: remove with lib; 2024-08-30 23:01:42 +02:00
Felix Buehler
97070a2ea6 nixos/services.libreswan: remove with lib; 2024-08-30 23:01:18 +02:00
Felix Buehler
92f17f012d nixos/services.kresd: remove with lib; 2024-08-30 23:01:16 +02:00
Felix Buehler
5960372742 nixos/services.kea: remove with lib; 2024-08-30 23:00:56 +02:00
Felix Buehler
717fa0dea5 nixos/services.dnscrypt-wrapper: remove with lib; 2024-08-30 23:00:56 +02:00
Felix Buehler
0846124d8b nixos/services.owncast: remove with lib; 2024-08-30 23:00:55 +02:00
Felix Buehler
20496ce388 nixos/services.osrm: remove with lib; 2024-08-30 23:00:55 +02:00
Felix Buehler
eddc7384db nixos/services.ombi: remove with lib; 2024-08-30 23:00:55 +02:00
Felix Buehler
d40cf96f75 nixos/services.octoprint: remove with lib; 2024-08-30 23:00:55 +02:00
Felix Buehler
a99bf84530 nixos/services.nzbhydra2: remove with lib; 2024-08-30 23:00:54 +02:00
Felix Buehler
2da17447da nixos/services.nzbget: remove with lib; 2024-08-30 23:00:54 +02:00
Felix Buehler
457b7563d4 nixos/services.ntfy-sh: remove with lib; 2024-08-30 23:00:54 +02:00
Felix Buehler
eeed115e37 nixos/services.novacomd: remove with lib; 2024-08-30 23:00:54 +02:00
Felix Buehler
b48bee9985 nixos/nix.sshServe: remove with lib; 2024-08-30 23:00:54 +02:00
Felix Buehler
42bdc30f19 nixos/services.n8n: remove with lib; 2024-08-30 23:00:53 +02:00
Felix Buehler
e00ab2106a nixos/services.moonraker: remove with lib; 2024-08-30 23:00:53 +02:00
Felix Buehler
a4db992d51 nixos/services.mbpfan: remove with lib; 2024-08-30 23:00:53 +02:00
Felix Buehler
68fd69371f nixos/services.mame: remove with lib; 2024-08-30 23:00:53 +02:00
Felix Buehler
a11ac85d65 nixos/services.logkeys: remove with lib; 2024-08-30 23:00:53 +02:00
Felix Buehler
25e0bc25f6 nixos/services.lifecycled: remove with lib; 2024-08-30 23:00:52 +02:00
Felix Buehler
d562492115 nixos/services.lidarr: remove with lib; 2024-08-30 23:00:52 +02:00
Felix Buehler
4e1b387f24 nixos/services.leaps: remove with lib; 2024-08-30 23:00:52 +02:00
Felix Buehler
118d8962d3 nixos/services.languagetool: remove with lib; 2024-08-30 23:00:52 +02:00
Felix Buehler
14f18ffb06 nixos/services.klipper: remove with lib; 2024-08-30 23:00:52 +02:00
Felix Buehler
cac7b5e266 nixos/services.jellyseerr: remove with lib; 2024-08-30 23:00:51 +02:00
Felix Buehler
2fbd333075 nixos/services.jackett: remove with lib; 2024-08-30 23:00:51 +02:00
Felix Buehler
a442c73bff nixos/services.irkerd: remove with lib; 2024-08-30 23:00:51 +02:00
Felix Buehler
bd471d7eb1 nixos/services.input-remapper: remove with lib; 2024-08-30 23:00:51 +02:00
Felix Buehler
7065336804 nixos/services.ihaskell: remove with lib; 2024-08-30 23:00:50 +02:00
Felix Buehler
2270873952 nixos/services.heisenbridge: remove with lib; 2024-08-30 23:00:50 +02:00
Felix Buehler
0205ba83ab nixos/services.headphones: remove with lib; 2024-08-30 23:00:50 +02:00
Felix Buehler
a40bb4329a nixos/services.greenclip: remove with lib; 2024-08-30 23:00:50 +02:00
Felix Buehler
01533f55c4 nixos/services.gpsd: remove with lib; 2024-08-30 23:00:50 +02:00
Felix Buehler
22d14ed8a2 nixos/services.gollum: remove with lib; 2024-08-30 23:00:49 +02:00
Felix Buehler
9358cb9b7d nixos/services.gitweb: remove with lib; 2024-08-30 23:00:49 +02:00