Commit Graph

29573 Commits

Author SHA1 Message Date
Sandro
6ffd08e152
Merge pull request #197144 from SuperSandro2000/changedetection-io-network 2022-10-23 03:27:52 +02:00
Sandro Jäckel
30df44aac2
nixos/changedetection-io: fix typos 2022-10-23 01:45:37 +02:00
github-actions[bot]
71e4896d63
Merge master into staging-next 2022-10-22 12:01:25 +00:00
Arnout Engelen
5784f69a46
Merge pull request #158967 from mschwaig/sd-image-determinism
sd-image: make firmware partition reproducible, sd-image, dvd-image: get rid of faketime related warnings
2022-10-22 13:58:22 +02:00
happysalada
fdfdc5df21 caddy: module: rmem_max default 2022-10-22 07:55:53 -04:00
markuskowa
79638604bb
Merge pull request #189703 from ck3d/remove-incomplient-nspawn-options
nixos/nspawn: Remove not compliant options
2022-10-22 12:19:49 +02:00
Martin Schwaighofer
0c67f190b1 sd-image: remove unnecessary subshell
replace the subshell surrounding this block with cd before and after

Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2022-10-22 12:11:30 +02:00
Martin Schwaighofer
bacef6bb09 dvd-image: replace faketime with --invariant for mkfs.vfat 2022-10-22 12:11:30 +02:00
Martin Schwaighofer
a1d6fd3702 sd-image: replace faketime with --invariant for mkfs.vfat
This is done for sd-images only here, but should probably also be done
for dvd-images.

The --invariant arg should be a better way of making mkfs.vfat deterministic.
The previous version of invoking faketime was building fine and reproducible
when I was compiling an sdimage for aarch64 under emulation.
It was however still logging errors:
ERROR: ld.so: object '/nix/store/1c2cp2709kmvby8ql2n9946v7l52nn50-libfaketime-0.9.9/lib/libfaketime.so.1' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
ERROR: ld.so: object '/nix/store/1c2cp2709kmvby8ql2n9946v7l52nn50-libfaketime-0.9.9/lib/libfaketime.so.1' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored.
The logged errors were presumably inaccurate somehow as calling
faketime was required for reproducibility, even though the log makes it
looks like it failed.
2022-10-22 12:11:30 +02:00
Martin Schwaighofer
f6ee247a1f sd-image: make firmware partition deterministic
Based on how it works for the EFI partition of an iso-image at
nixos/modules/installer/cd-dvd/iso-image.nix.
2022-10-22 12:11:30 +02:00
Sandro Jäckel
17f2c5ba71
nixos/changedetection-io: fix container having no network 2022-10-22 02:14:41 +02:00
github-actions[bot]
c8a9826fe2
Merge master into staging-next 2022-10-22 00:04:37 +00:00
Sandro
0d1e0a9f80
Merge pull request #191061 from Izorkin/update-peertube-nginx 2022-10-22 00:02:11 +02:00
Sandro
67e4972c5d
Merge pull request #195745 from virusdave/patch-1 2022-10-22 00:00:52 +02:00
ajs124
3dd1098f45
Merge pull request #195567 from helsinki-systems/feat/jenkins-jdk17
nixos/jenkins: jdk11 -> jdk17
2022-10-21 22:59:03 +02:00
Martin Weinelt
80fc469031 Merge remote-tracking branch 'origin/master' into staging-next 2022-10-21 22:33:42 +02:00
Elis Hirwing
844715a8b9
Merge pull request #196819 from Stunkymonkey/freshrss-api-fix
freshrss: fix greader-api
2022-10-21 19:56:55 +02:00
Jonas Heinrich
c54a28030f nixos/httpd: Make option adminAddr optional 2022-10-21 09:12:25 -04:00
Anderson Torres
77b67a2524
Merge pull request #196862 from atorres1985-contrib/hypr
hypr: init at unstable-2022-05-25
2022-10-21 08:00:20 -03:00
Florian Klink
690ccd9c4a
Merge pull request #196917 from flokli/nsncd
nixos/nscd: add option to use nsncd, init nsncd
2022-10-21 11:22:17 +02:00
Florian Klink
a86e080fa4 nixosTests.nscd: add nsncd specialisation
This shows that nsncd successfully passes all the tests that we run
against glibc-nscd.
2022-10-21 09:37:18 +02:00
Florian Klink
e7bc3e7504 nixosTests.nscd: dump nscd socket info with sockdump
This dumps what's sent over the nscd socket to the console output, which
allows debugging.
2022-10-21 09:37:18 +02:00
Florian Klink
aee40c2d8a nixos/nscd: add enableNsncd option
When set, this switches from using nscd to using nsncd.

It's a protocol-compatible, non-caching and much less flaky alternative.
2022-10-21 09:37:18 +02:00
AndersonTorres
af3779f819 nixos/hypr: add module 2022-10-21 00:01:43 -03:00
github-actions[bot]
c434165354
Merge master into staging-next 2022-10-21 00:05:50 +00:00
Guillaume Girol
91a3819bad
Merge pull request #177273 from dali99/escape-systemd
Make escapeSystemdPath implement the correct systemd escaping algorithm
2022-10-20 19:15:31 +00:00
Sandro
c9719e7fd6
Merge pull request #189269 from Tom-Hubrecht/ntfy-sh 2022-10-20 20:50:34 +02:00
Sandro
89e49d87d3
Merge pull request #196488 from SuperSandro2000/changedetectionio 2022-10-20 20:25:36 +02:00
Daniel Olsen
3251123a77 nixos/lib.escapeSystemdPath: Implement the correct algorithm for escaping names in systemd units
Co-authored-by: ajs124 <git@ajs124.de>
2022-10-20 20:12:15 +02:00
github-actions[bot]
80317024cf
Merge master into staging-next 2022-10-20 18:10:43 +00:00
Dave Nicponski
1a73877305 Tweak nginx config for Let's Encrypt ACME challenges
Currently, this is using a "URI prefix match", but per nginx docs,

```
[...] the location with the longest matching prefix is selected and remembered. Then regular expressions are checked, in the order of their appearance in the configuration file. The search of regular expressions terminates on the first match, and the corresponding configuration is used. If no match with a regular expression is found then the configuration of the prefix location remembered earlier is used.
```
which means a config like this (from wordpress service) will override that
```
locations = {
          "~ /\\." = {
            priority = 800;
            extraConfig = "deny all;";
          };
};
```
😱
Luckily, from nginx docs:
```
If the longest matching prefix location has the “^~” modifier then regular expressions are not checked.
```

Whew!
2022-10-20 10:59:28 -04:00
Bernardo Meurer
d473597e33
Merge pull request #196904 from hercules-ci/nixos-nixpkgs-only-error-when-used 2022-10-20 09:10:29 -04:00
github-actions[bot]
ee0190d830
Merge master into staging-next 2022-10-20 12:01:25 +00:00
Izorkin
abdcfec3a0
nixos/peertube: add nginx configuration 2022-10-20 14:49:51 +03:00
Florian Klink
7987b41d44 nixos/nscd: nixpkgs-fmt 2022-10-20 13:15:16 +02:00
Florian Klink
a3b07e3693 nixosTests.nscd: update subtest name and comment
test_host_lookups can be used against different daemons speaking the
nscd protocol.
2022-10-20 13:15:16 +02:00
Robert Hensing
1e9864c85e nixos/nixpkgs: Only error when nixpkgs options are actually used 2022-10-20 11:19:20 +02:00
Janne Heß
24167c94f0
Merge pull request #196337 from SuperSandro2000/update-users-groups
nixos/update-users-groups.pl: sort json file for better reproducibility
2022-10-20 11:11:49 +02:00
github-actions[bot]
aac580f88f
Merge master into staging-next 2022-10-20 00:05:13 +00:00
Felix Bühler
27e5ca478b
Merge pull request #196140 from uninsane/pr/freshrss-patchShebangs
freshrss: patchShebangs instead of specifying interpreter at use site
2022-10-20 00:03:13 +02:00
Sandro
ab6c14bf9a
Merge pull request #196624 from Minion3665/replace-polymc-with-prismlauncher 2022-10-19 23:36:35 +02:00
Felix Buehler
fe9fb739a9 freshrss: fix greader-api 2022-10-19 23:34:26 +02:00
Sandro Jäckel
c9aab9ba97
nixos/changedetection-io: init 2022-10-19 21:33:31 +02:00
github-actions[bot]
958cbc7d51
Merge master into staging-next 2022-10-19 18:09:25 +00:00
Skyler Grey
49c81f001c
release-notes: state that PolyMC has been replaced 2022-10-19 19:06:55 +01:00
Skyler Grey
fcbbc69f13
release-notes-2205: suggest using prismlauncher
- Previously PolyMC was the suggested replacement for MultiMC
- As PolyMC is marked as insecure and prismlauncher is a replacement,
  this commit suggests using it instead
2022-10-19 19:06:54 +01:00
Domen Kožar
d2cfe468f8
Merge pull request #196728 from veehaitch/github-runner-new-pats
nixos/github-runner: support fine-grained personal access tokens
2022-10-19 14:40:23 +02:00
Martin Weinelt
5d2330ddb5
Merge pull request #195760 from jmbaur/prometheus-kea-exporter 2022-10-19 14:02:15 +02:00
github-actions[bot]
bbaff9a043
Merge master into staging-next 2022-10-19 12:01:22 +00:00
Vincent Haupert
ea8cf2e486 nixos/github-runners: support fine-grained personal access tokens
Add support for GitHub's new fine-grained personal access tokens [1]. As
opposed to the classic PATs, those start with `github_pat_` instead of
`ghp_`.

Make sure to use a token which has read and write access to the
"Administration" resource group [2] to allow for registrations of new
runners.

[1] https://github.blog/2022-10-18-introducing-fine-grained-personal-access-tokens-for-github/

[2] https://docs.github.com/en/rest/overview/permissions-required-for-github-apps#administration
2022-10-19 13:50:34 +02:00