Commit Graph

20359 Commits

Author SHA1 Message Date
Peter Hoeg
895090bf89 nixos/earlyoom: use the newly introduced systembus-notify option
Also some cleanups.
2022-03-13 20:21:21 +08:00
Peter Hoeg
27e32bbfde nixos/systembus-notify: add support for system services notifying users 2022-03-13 20:21:21 +08:00
Bobby Rong
65f9112d6b
nixos/pantheon: enable xdg desktop integration
This prevents the embarrassing situation in https://github.com/NixOS/nixpkgs/pull/163828 from happening again.
2022-03-13 12:50:17 +08:00
Luke Granger-Brown
8035c513e3
Merge pull request #163673 from lukegb/pomerium
pomerium: 0.15.7 -> 0.17.0
2022-03-13 02:20:38 +00:00
Kevin Cox
3222d8665d
Merge pull request #159865 from midchildan/update/epgstation
epgstation: 1.7.5 -> 2.6.20
2022-03-12 13:42:49 -05:00
Artturi
1389c15b77
Merge pull request #163304 from gravndal/amule-daemon 2022-03-12 16:18:29 +02:00
Ian Kerins
4c6772e2a1 nixos/oci-containers: improve description of imageFile
As a novice to using this module, I found the existing description to be
quite misleading. It does not at all disable pulling from the registry,
it just loads some image archive that may or may not be related to the
container you're specifying. I had thought there was extra magic behind
this option, but it's just a `docker load`. You need foreknowledge of
the contents of the archive so that whatever it contained is actually
used to run the container.

I've reworded the description to hopefully make this behavior clearer.
2022-03-12 11:14:22 +01:00
midchildan
697ea7c69c
epgstation: make updateScript create EditorConfig-compliant files 2022-03-12 15:10:39 +09:00
midchildan
561c0c2851
nixos/rl-2205: add entries for EPGStation v2 2022-03-12 15:10:38 +09:00
midchildan
5e7be6b480
nixos/epgstation: changes for EPGStation v2 2022-03-12 15:10:37 +09:00
Luke Granger-Brown
3004e58f6a nixos/pomerium: avoid blocking when renewing ACME certificates 2022-03-11 14:09:19 +00:00
Ilya Fedin
dd510b9053 nixos/mate: allow remove any added package
Only extra packages removable currently, but it's possible to run MATE without packages like caja or yelp
2022-03-11 17:25:24 +04:00
Janne Heß
461c1c9e86
nixos/switch-to-configuration: Use parenthesis on all calls 2022-03-11 14:05:20 +01:00
Janne Heß
bc58430068
nixos/switch-to-configuration: Fix reloading of stopped services 2022-03-11 14:05:19 +01:00
Janne Heß
3052d3aa50
nixos/switch-to-configuration: Fix restarting by activation script
This bug is so obscure and unlikely that I was honestly not able to
properly write a test for it. What happens is that we are calling
handleModifiedUnit() with $unitsToStart=\%unitsToRestart. We do this to
make sure that the unit is stopped before it's started again which is
not possible by regular means because the stop phase is already done
when calling the activation script.

recordUnit() still gets $startListFile, however which is the wrong file.
The bug would be triggered if an activation script requests a service
restart for a service that has `stopIfChanged = true` and
switch-to-configuration is killed before the restart phase was run. If
the script is run again, but the activation script is not requesting
more restarts, the unit would be started instead of restarted.
2022-03-11 13:30:03 +01:00
Janne Heß
c96180c53f
nixos/switch-to-configuration: Ignore some unit keys
Some unit keys don't need to restart the service to make them effective.
Reduce the amount of service restarts by ignoring these keys
2022-03-11 13:30:03 +01:00
Bobby Rong
8a56a49cc7
Merge pull request #162411 from kurnevsky/tox-node-service-fix
tox-node: fix config hash and url
2022-03-11 18:09:35 +08:00
Profpatsch
75b08e3624 modules/github-runner: Improve description of url
We spent a whole afternoon debugging this, because upstream has very
bad software quality and the error messages were incredibly
misleading.

So let’s document it for the sanity of other people.

Btw, I think the implementation of our module is pretty brittle,
especially the part about diffing tokens to check whether they
changed. We should rather just request a new builder registration
every time, it’s not that much overhead, and always set `replace` so
it is idempotent.
2022-03-11 10:26:39 +01:00
Krzysztof Nazarewski
4ea5398d20
plantuml-server 1.2021.12 -> 1.2022.2
- changed JDK version to 17 (11+ required)
- added maven build reproducibility
2022-03-11 09:05:35 +01:00
pennae
af0f3944bd
Merge pull request #163009 from scvalex/nbd-service
nbd: add nbd service and test
2022-03-11 01:02:10 +00:00
Martin Weinelt
76721f5e5e
Merge pull request #159986 from NukaDuka/pve_exporter 2022-03-10 22:41:45 +01:00
Giulio De Pasquale
81781c338d
Jellyfin: Disable ProtectClock to allow NVENC, NVDEC acceleration 2022-03-10 00:19:57 +00:00
Evgeny Kurnevsky
d94be44526
tox-node: fix config 2022-03-09 23:27:34 +03:00
Giulio De Pasquale
3b944f4c0c
Jellyfin: Fix NVENC, NVDEC usage by allowing AF_UNIX
Fix NVENC, NVDEC usage when transcoding with hardware capabilities
2022-03-09 19:44:06 +00:00
Lassulus
155c02837b
Merge pull request #163383 from Lassulus/tor_newlines
nixos/tor: admit newlines in secret key
2022-03-09 19:19:39 +01:00
pennae
06c57317c2
Merge pull request #146653 from DarkDNA/nixos/fix-systemd-exporter/extraFlags
nixos/prometheus/systemd: Implement the extraFlags config option.
2022-03-09 16:12:32 +00:00
lassulus
236a731da0 nixos/tor: admit newlines in secret key 2022-03-09 15:11:01 +01:00
Alexandru Scvortov
252f20aaa2 nbd: add programs.nbd, services.nbd, and test
Changes:

nbd: Update nixos/modules/services/networking/nbd.nix

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>

nbd: Update nixos/modules/services/networking/nbd.nix

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>

nbd: Update nixos/tests/nbd.nix

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>

nbd: generalize options in nbd service

nbd: harden service

nbd: Update nixos/modules/services/networking/nbd.nix

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>

nbd: Update nixos/modules/services/networking/nbd.nix

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>

nbd: refactor code a bit and BindPaths automatically
2022-03-09 12:00:47 +00:00
Peter Hoeg
d44916d12f nixos/activation: allowed quoted values in /etc/os-release 2022-03-09 17:07:48 +08:00
Bernardo Meurer
e3a73aed43
Merge pull request #163255 from NickCao/nix
nixVersions.stable: 2.6.1 -> 2.7.0
2022-03-08 10:22:51 -08:00
Nick Cao
3c09fec700
nix-fallback-paths.nix: Update to 2.7.0 2022-03-08 22:40:16 +08:00
Sandro
a879922e62
Merge pull request #163208 from Izorkin/fix-modsecurity-nginx 2022-03-08 13:11:42 +01:00
Sandro
e9183df241
Merge pull request #157923 from tim-tx/update/dendrite-0.6.0 2022-03-08 12:51:04 +01:00
Sandro
1a0b804799
Merge pull request #162866 from euank/k3s-unified-cgroups 2022-03-08 12:39:37 +01:00
Sandro
0ffade9012
Merge pull request #162214 from ncfavier/redis-bind-localhost 2022-03-08 12:38:39 +01:00
Izorkin
b672e4dd2c
nginxModules: add option disableIPC
The disableIPC option is required to checking enabled nginxModules
and disable the SystemCallFilter IPC filter.
2022-03-08 14:37:11 +03:00
Gaute Ravndal
fe6f628343 nixos/amuled: fix package reference in service definition
The amuleDaemon package was renamed to kebab-case in 81ef57d6.
2022-03-08 12:14:25 +01:00
Artturi
5cd34745f0
Merge pull request #161701 from RyanGibb/zsh-autosuggest-strategy-array 2022-03-08 12:01:07 +02:00
Kim Lindberger
b71a8e2383
Merge pull request #162095 from midchildan/fix/keycloak-mysql
nixos/keycloak: fix database provisioning issues
2022-03-07 20:13:01 +01:00
Timo Kaufmann
94ea3a8899
Merge pull request #160777 from LunNova/improve-input-remapper-module
nixos/input-remapper: Fix missing [], add more options, add test
2022-03-07 18:51:08 +01:00
Maciej Krüger
75ea3ea9b8
Merge pull request #157438 from sbruder/nitter-package-option 2022-03-07 18:50:27 +01:00
Luna Nova
865e0df2fc
nixos/input-remapper: add nixos test for input-remapper 2022-03-07 08:31:40 -08:00
Luna Nova
d8cb494765
nixos/input-remapper: Fix missing [] for package, add enableUdevRules and serviceWantedBy options, add meta.maintainers 2022-03-07 08:31:40 -08:00
Ryan Gibb
34b5dd453b nixos/zsh-autosuggestions: ZSH_AUTOSUGGEST_STRATEGY array
zsh-autosuggestions supports having fallback strategies expressed
through the ZSH_AUTOSUGGEST_STRATEGY array. For example,
`ZSH_AUTOSUGGEST_STRATEGY=(history completion)`. We should also support
this.
2022-03-07 16:29:00 +00:00
Sandro
652aa6df2c
Merge pull request #158015 from j0hax/kclockd-integration 2022-03-07 17:21:08 +01:00
Euan Kemp
e6d1c597f1 nixos/k3s: use the systemd driver for docker + unified cgroups
This is necessary for it to work at all. The single-node-docker test
will fail without this change.

Also add a release note for it.
2022-03-05 11:30:53 -08:00
tim-tx
5a6b36e498 dendrite: 0.5.1 -> 0.6.5 2022-03-05 11:41:31 -05:00
Martin Weinelt
5556fc8f8f
Merge pull request #162407 from mweinelt/zigbee2mqtt 2022-03-05 15:33:57 +01:00
piegames
be4a0e6e40
Merge pull request #158605 from mweinelt/synapse-rfc42
nixos/matrix-synapse: migrate to rfc42 settings and formatter
2022-03-05 15:23:52 +01:00
piegames
cd7e516b26
Merge pull request #156858: nixos/polkit: don't enable by default 2022-03-05 14:48:35 +01:00
Martin Weinelt
8a95d9fede
nixos/flatpak: enable polkit
via https://github.com/NixOS/nixpkgs/pull/156858#issuecomment-1022254342
2022-03-05 13:57:30 +01:00
Johannes Arnold
e21874098d nixos/kclock: integrate with dbus 2022-03-05 12:38:36 +01:00
ngerstle
8aaa0699db k3s: enable enableUnifiedCgroupHierarchy 2022-03-05 00:18:17 -08:00
Sandro
13c9be5066
Merge pull request #160482 from jansol/pipewire 2022-03-05 03:08:25 +01:00
Martin Weinelt
f799a02bca
nixos/synapse: move into matrix category 2022-03-04 23:57:35 +01:00
Martin Weinelt
a483264931
nixos/matrix-synapse: fix registerNewMatrixUser script 2022-03-04 23:57:34 +01:00
Martin Weinelt
d918011885
nixos/matrix-synapse: update manual with settings option 2022-03-04 23:57:29 +01:00
Martin Weinelt
f7286992d2
nixos/matrix-synapse: migrate to rfc42 settings and formatter 2022-03-04 23:57:28 +01:00
Pascal Bach
b5fa1aa46f
Merge pull request #162496 from Baughn/master
pam: Fix google-authenticator reference
2022-03-04 17:18:17 +01:00
Yaya
38246ed194 nixos/snowflake-proxy: init
This commit introduces snowflake-proxy [1], a system to circumvent internet
censorship.

[1] https://snowflake.torproject.org/
2022-03-04 08:41:38 -06:00
Naïm Favier
2e46cc1f00 nixos/earlyoom: remove useKernelOOMKiller
This option is deprecated and ignored by earlyoom since 1.2.
2022-03-04 13:04:24 +00:00
Janne Heß
803f7d4af5
Merge pull request #161838 from helsinki-systems/feat/stc-less-socket-restarts
nixos/switch-to-configuration: Document and test handling of socket-activated services
2022-03-04 09:32:55 +01:00
Jonas Heinrich
9a30f53ffe nixos/firejail: Fix order of extrsArgs before profile wrappedBinaries option 2022-03-03 21:35:37 -05:00
Peter Hoeg
bae181d3f0 nixos/os-release: generate from attrset 2022-03-04 09:36:40 +08:00
Janne Heß
1def557525
nixos/switch-to-configuration: Document and test socket-activated services 2022-03-03 20:49:20 +01:00
Jonas Heinrich
764670261a nixos/opensnitch: Add options to configure daemon 2022-03-02 18:38:56 -05:00
Renaud
671a068a01
Remove F-PROT package and service module (EoL) (#160372) 2022-03-02 21:51:47 +02:00
aszlig
7286be7e81 nixos/systemd-confinement: Allow shipped unit file
In issue #157787 @martined wrote:

  Trying to use confinement on packages providing their systemd units
  with systemd.packages, for example mpd, fails with the following
  error:

  system-units> ln: failed to create symbolic link
  '/nix/store/...-system-units/mpd.service': File exists

  This is because systemd-confinement and mpd both provide a mpd.service
  file through systemd.packages. (mpd got updated that way recently to
  use upstream's service file)

To address this, we now place the unit file containing the bind-mounted
paths of the Nix closure into a drop-in directory instead of using the
name of a unit file directly.

This does come with the implication that the options set in the drop-in
directory won't apply if the main unit file is missing. In practice
however this should not happen for two reasons:

  * The systemd-confinement module already sets additional options via
    systemd.services and thus we should get a main unit file
  * In the unlikely event that we don't get a main unit file regardless
    of the previous point, the unit would be a no-op even if the options
    of the drop-in directory would apply

Another thing to consider is the order in which those options are
merged, since systemd loads the files from the drop-in directory in
alphabetical order. So given that we have confinement.conf and
overrides.conf, the confinement options are loaded before the NixOS
overrides.

Since we're only setting the BindReadOnlyPaths option, the order isn't
that important since all those paths are merged anyway and we still
don't lose the ability to reset the option since overrides.conf comes
afterwards.

Fixes: https://github.com/NixOS/nixpkgs/issues/157787
Signed-off-by: aszlig <aszlig@nix.build>
2022-03-02 11:42:44 -08:00
Kartik Gokte
6a0b420d94 nixos/prometheus-pve-exporter: init at 2.2.2 2022-03-02 23:59:33 +05:30
Martin Weinelt
d78f8c588d
nixos/udisks2: enable polkit 2022-03-02 17:38:36 +01:00
Kevin Cox
79862ae905
Merge pull request #161008 from rhysmdnz/xone
xone: init package and module
2022-03-02 11:26:51 -05:00
Svein Ove Aas
cf0f406ed6 pam: Fix google-authenticator reference 2022-03-02 15:18:58 +00:00
Martin Weinelt
accca0bd6e
nixos/zigbee2mqtt: move into home-automation category 2022-03-01 19:19:31 +01:00
Maximilian Bosch
199d4224e9
Merge pull request #155207 from rapenne-s/freshclam_when_internet
clamav: start freshclan after network-online target
2022-03-01 11:14:30 +01:00
Solene Rapenne
317ca6bb4e clamav: remove freshclam service dependency 2022-02-28 22:51:07 +01:00
Maximilian Bosch
5cee9c9ef2
prometheus-dmarc-exporter: init at 0.5.1 2022-02-28 16:50:01 +01:00
Naïm Favier
6e4f5f9aee
nixos/redis: bind on localhost by default 2022-02-28 13:37:47 +01:00
Janne Heß
d32ba3f4b0
Merge pull request #161929 from martinetd/switchTest
logrotate: do not enable logrotate.service itself
2022-02-28 10:19:25 +01:00
Rok Garbas
993c35991b
Merge pull request #157693 from Radvendii/zammad
zammad: init at 5.0.2
2022-02-28 00:57:11 +01:00
zowoq
177281ad00 nixos/amazon-image: use 5_10 kernel and add assert 2022-02-27 15:04:37 -08:00
Janne Heß
5ec0477dfc
Merge pull request #161059 from hercules-ci/fix-nix-daemon-socket-availability
nixos/nix-daemon: Ensure continued availability of daemon socket
2022-02-27 17:57:57 +01:00
midchildan
dc5bd4b375
nixos/keycloak: fix database provisioning issues
This fixes the following issues with the database provisioning script
included in the services.keycloak module:

- It lacked permission to access the DB password file specified in the
  module option 'services.keycloak.database.passwordFile'.

- It prevented Keycloak from starting after the second time if the user
  chose MySQL for the database.
2022-02-28 00:54:26 +09:00
Jörg Thalheim
c219935f5e
Merge pull request #162056 from NickCao/bird-reload
nixos/bird: run service as non-root user, add test for reload
2022-02-27 09:48:04 +00:00
Nick Cao
6e389e6367
nixos/bird: run service as non-root user, add test for reload 2022-02-27 16:19:22 +08:00
Dominique Martinet
0dadec45d8 logrotate/systemd: add 'minsize = 1M' to wtmp/btmp rotation
align with upstream logrotate which added the minsize rule at some point.
This avoids needlessly rotating the files too often as brought up in
https://github.com/NixOS/nixpkgs/pull/159187#issuecomment-1052426774
2022-02-27 07:20:26 +09:00
Martin Weinelt
308403c329
Merge pull request #161663 from felixsinger/update/pkgs/mumble 2022-02-26 22:38:26 +01:00
Felix Singer
c267e9ce37 mumble,murmur: 1.3.4 -> 1.4.231
Update version to 1.4.231.

Build 231 points to a specific commit from the 1.4.x branch adding many
fixes and improvements. Since this version is an unofficial release, add
an unstable prefix to the version string in Nixpkgs.

Signed-off-by: Felix Singer <felixsinger@posteo.net>
Signed-off-by: Franz Pletz <fpletz@fnordicwalking.de>
2022-02-26 22:08:22 +01:00
Maciej Krüger
42a5831e62
nixos/pgadmin: init 2022-02-26 14:30:14 +01:00
Dominique Martinet
4d12b79cd7 logrotate: do not enable logrotate.service itself
logrotate.timer is enough for rotating logs. Enabling logrotate.service would
make the service start on every configuration switch, leading to tests failure when
logrotate is enabled.

Also update test to make sure the timer is active and runs the service
on date change.
2022-02-26 19:13:12 +09:00
K900
cb2cfba6f7 treewide: switch all desktop file generators to new API
Notably:
- remove explicit arguments that match the defaults
- convert everything to the right Nix types
2022-02-25 13:40:38 -08:00
Luflosi
0eb1d070c8 ipfs-migrator: 1.7.1 -> 2.0.2
https://github.com/ipfs/fs-repo-migrations/releases/tag/v2.0.2

This is pretty much a complete rewrite of the ipfs-migrator package.
In version 2.0.0 a major change was made to the way the migrator works. Before, there was one binary that contained every migration. Now every migration has its own binary. If fs-repo-migrations can't find a required binary in the PATH, it will download it off the internet. To prevent that, build every migration individually, symlink them all into one package and then wrap fs-repo-migrations so it finds the package with all the migrations.
The change to the IPFS NixOS module and the IPFS package is needed because without explicitly specifying a repo version to migrate to, fs-repo-migrations will query the internet to find the latest version. This fails in the sandbox, for example when testing the ipfs passthru tests.
While it may seem like the repoVersion and IPFS version are in sync and the code could be simplified, this is not the case. See https://github.com/ipfs/fs-repo-migrations#when-should-i-migrate for a table with the IPFS versions and corresponding repo versions.
Go 1.17 breaks the migrations, so use Go 1.16 instead. This is also the Go version used in their CI, see 3dc218e300/.github/workflows/test.yml (L4). See https://github.com/ipfs/fs-repo-migrations/pull/140#issuecomment-982715907 for a previous mention of this issue. The issue manifests itself when doing anything with a migration, for example `fs-repo-11-to-12 --help`:
```
panic: qtls.ClientHelloInfo doesn't match

goroutine 1 [running]:
github.com/marten-seemann/qtls-go1-15.init.0()
	github.com/marten-seemann/qtls-go1-15@v0.1.1/unsafe.go:20 +0x132
```
Also add myself as a maintainer for this package.
This fixes the test failure discovered in https://github.com/NixOS/nixpkgs/pull/160914.
See https://github.com/ipfs/fs-repo-migrations/issues/148 to read some of my struggles with updating this package.
2022-02-25 11:12:19 -08:00
0x4A6F
7ad39a4125
Merge pull request #161193 from Mic92/bird1
bird: drop bird1 package & modules; hardening
2022-02-25 17:03:09 +01:00
Jörg Thalheim
a9252603d5
Merge pull request #160195 from illustris/proxmox-lxc
nixos/proxmox-lxc: init
2022-02-25 14:49:48 +00:00
Stig
c1f6adfaa8
Merge pull request #154109 from Izorkin/update-peertube
peertube: 3.4.1 -> 4.1.0
2022-02-25 14:38:15 +01:00
Martin Weinelt
f45ba367d9
Merge pull request #161735 from fooker/pr/snapserver-config-fix 2022-02-25 11:41:30 +01:00
Jörg Thalheim
ad16194460
nixos/bird: improve systemd hardening / capability set
aligned with https://github.com/archlinux/svntogit-packages/blob/packages/bird/trunk/bird.service#L20-L21
2022-02-25 11:39:34 +01:00
Jörg Thalheim
9abf72f229
bird1: drop package + modules
reason: no longer maintained upstream.
2022-02-25 11:39:34 +01:00
zowoq
ec2028eb3c nixos/kubernetes: use kubectl from kubernetes
- also clarify kubectl wrapper naming
2022-02-25 19:22:30 +10:00
Dustin Frisch
ec10d9a836
nixos/snapserver: fix argument handling.
The argument parser used by snapserver behaves differntly for optional
arguments with existing defaults. In such cases, the standalone argument
name is a valid input and a following value is interpreted as a
positional argument. Therefore the argument and the value must be
provided as a single argument seperated by equals sign.
2022-02-24 23:11:58 +01:00
Samuel Dionne-Riel
0adf99aee4
Merge pull request #156005 from zhaofengli/pi02
Update Raspberry Pi packages
2022-02-24 15:05:23 -05:00