Commit Graph

32098 Commits

Author SHA1 Message Date
Linus Heckemann
48269da315
Merge pull request #206839 from lheckemann/stateless-vms
nixos/qemu-vm: allow use without a disk image
2023-03-04 02:02:45 +01:00
Maximilian Bosch
c9bdd9352a
Merge pull request #219399 from Ma27/ma27-maintainership
maintainers/ma27: updates
2023-03-03 22:02:51 +01:00
Maximilian Bosch
3b02da3fdd
nixos/tests/gitea: keep calling the file itself evaluatable
When I work on something gitea-related I want to be able to just do
`nix-build nixos/tests/gitea.nix` to run the tests.
2023-03-03 22:00:49 +01:00
Maximilian Bosch
e62c913822
treewide: remove ma27 from a bunch of packages (again)
Some of the stuff used to be needed for a project, for others I found
alternatives that suited better my needs. Anyways, I don't intend to
spend time maintaining these, so no need to keep that.
2023-03-03 21:25:26 +01:00
Maximilian Bosch
647d316d4b
Merge pull request #215313 from GaetanLepage/bump-default-linux
linuxPackages: bump default 5.15 -> 6.1
2023-03-03 21:11:15 +01:00
Sandro
2665f5e379
Merge pull request #178447 from Francesco149/dendrite-prestart 2023-03-03 18:45:09 +01:00
Tom Fitzhenry
a210bb2111 phosh: add tomfitzhenry@ as maintainer 2023-03-04 00:47:15 +11:00
Tom Fitzhenry
2455dfab0d phosh: 0.23.0 -> 0.25.1 2023-03-04 00:38:29 +11:00
Félix Baylac Jacqué
bee41ce735 nixosTests/pleroma: node.xx.config -> node.xx
Accessing a test driver node configuration via node.xxx.config is now
deprecated. Migrating to the new API.
2023-03-03 08:18:29 +01:00
Maximilian Bosch
72f45f225f
Merge pull request #218269 from theHedgehog0/gitea-module-getexe
nixos/gitea: Move to lib.getExe
2023-03-02 19:46:45 +01:00
0x4A6F
8a3d244cc0
atuin: 12.0.0 -> 13.0.1, remove onsails from maintainers (#218841) 2023-03-02 12:23:50 -05:00
Pyrox
98dd7f5307
nixos/gitea: Move to lib.getExe
This makes it so that alternative packages, such as `pkgs.forgejo` are
able to be used instead of the default `pkgs.gitea`.

Also adds myself as a maintainer of the module.

The varible `gitea`, which was used instead of `cfg.package`, has been
replaced with the variable `exe`, and is instead the value of the main
executable, as gotten from `lib.getExe`. `cfg.package` is used when this
value is not appropriate.
2023-03-02 12:16:30 -05:00
Maximilian Bosch
f8bbedfcac
Merge pull request #219073 from IndeedNotJames/gitea-gpg
nixos/gitea: fix commit signing (`gpg`) core dump, add nixos test
2023-03-02 17:24:02 +01:00
Arian van Putten
17ca3dd2a6
Merge pull request #217852 from justinas/teleport-12
teleport: 11.3.4 -> 12.0.2, reintroduce teleport_11
2023-03-02 11:18:24 +01:00
Luke Granger-Brown
b3c09089e4
Merge pull request #215750 from puppe/fix-paperless
nixos/paperless: download NLTK data
2023-03-02 10:00:46 +00:00
Yureka
55da71c10e
nixos/nftables: add checkRuleset option (#216531)
* nixos/nftables: add checkRuleset option

* lkl: 2022-05-18 -> 2023-01-27
2023-03-02 10:28:01 +01:00
Bobby Rong
3374c1ab48
Merge pull request #219004 from bobby285271/fix/pantheon-add-mutter-udev
nixos/pantheon: add mutter to services.udev.packages
2023-03-02 09:55:20 +08:00
IndeedNotJames
93c1d370db
nixos/gitea: fix commit signing (gpg) core dump
Gitea spawns `gpg` processes for commit signing related actions.
Those `gpg` processes need `mlock` (probably to prevent secrets
in the memory to swap).
Blocking it (as part of the `@memlock` preset) causes any
commit signing related actions to error out as http/500
2023-03-01 23:44:21 +01:00
IndeedNotJames
249f6c4c1d
nixos/tests/gitea: test gpg commit signing key
`/api/v1/signing-key.gpg` spawns a `gpg` process,
which is great to test if `gpg` is available
and can be invoked from in the unit.

Which is somewhat relevant, since `gpg` was
missing from the unit's `$PATH` until recently.

And even after adding `gpg` to the unit's `$PATH`,
configuring commit signing for a instance
resulted in http/500s nonetheless.

That's due to `@memlock` being present in
`SystemCallFilter=~` and `gpg` trying to
use `mlock` (probably to prevent secrets
in the memory to swap), resulting in an
immediate `SIGKILL` of any spawned `gpg` processes.
2023-03-01 23:44:21 +01:00
K900
1e00e82f9d
Merge pull request #218437 from K900/x11-default-modesetting
nixos/x11: default to the modesetting driver
2023-03-01 17:51:04 +03:00
Robert Hensing
118bdf25a6 lib/modules: Allow an "anonymous" module with key in disabledModules
This makes the following work

    disabledModules = [ foo.nixosModules.bar ];

even if `bar` is not a path, but rather a module such as

    { key = "/path/to/foo#nixosModules.bar"; config = ...; }

By supporting this, the user will often be able to use the same syntax
for both importing and disabling a module. This is becoming more relevant
because flakes promote the use of attributes to reference modules. Not
all of these modules in flake attributes will be identifiable, but with
the help of a framework such as flake-parts, these attributes can be
guaranteed to be identifiable (by outPath + attribute path).
2023-03-01 15:03:44 +01:00
Bobby Rong
1f9308f005
nixos/pantheon: add mutter to services.udev.packages
For ./lib/udev/rules.d/61-mutter.rules

Same as d1eeb64. This is forgotten in PR 130380.
2023-03-01 10:00:53 +08:00
Bobby Rong
a12fc54f19
Merge pull request #196511 from NixOS/pantheon
Pantheon: default to mutter 42
2023-03-01 09:51:43 +08:00
maxine
7ceeb440c1
Merge pull request #213604 from mikroskeem/feature/docker-local-log-driver
nixos/docker: add "local" as valid logDriver option
2023-02-28 21:47:55 +01:00
Valentin Gagarin
4e0525a8cd configuration.nix: suggest a command line program
adding two graphical programs makes a strong assmuption that users will
use a graphical environment.

add a command line program as an alternative suggestion that is easy to
comment in as a first-steps measure.
2023-02-28 17:16:03 +01:00
Bobby Rong
39caebaba5
rl-2305: Mention Pantheon 7 & Mutter 42 update 2023-02-28 23:19:42 +08:00
Justinas Stankevicius
e831a3da98 nixos/tests/teleport: make justinas the maintainer 2023-02-28 13:22:50 +02:00
Justinas Stankevicius
31b5597cbd nixos/teleport: add "package" option 2023-02-28 13:22:50 +02:00
Jon Seager
cad6488509
nixos/multipass: typo s/SyslogIdentifer/SyslogIdentifier/ 2023-02-28 10:45:38 +00:00
zowoq
2ab049a5c7 nixos/tests/podman: add zfs to rootful test 2023-02-28 18:08:29 +10:00
zowoq
48642c634e podman: remove wrapper
trying to get all of the podman functionality to work with the wrapper
 is becoming more complicated with each release, it isn't sustainable

removing the wrapper does mean that using extraPackages will need to build from source

- remove unnecessary serviceConfig overrides

- set HELPER_BINARIES_DIR to libexec/podman

- use install.bin target on linux for podman/tmpfiles
  - also installs quadlet/rootlessport in libexec

- symlink binaries from helpersBin into HELPER_BINARIES_DIR

- remove unnecessary rootlessport output

- remove unnecessary substituteInPlace
2023-02-28 18:08:29 +10:00
zowoq
ce07d44ca9 Revert "nixos/release: disable nfs3.simple"
This reverts commit 6a28e4887c.
2023-02-28 10:30:28 +10:00
zowoq
ae671e1b91 Revert "nixos/release: disable nfs3.simple"
This reverts commit 5682853027.
2023-02-28 10:30:28 +10:00
Robert Kovacsics
476bb88308 nixos/atop: Don't choke if no existing atop logs 2023-02-28 00:22:11 +00:00
Luke Granger-Brown
997d8d5870
Merge pull request #218618 from dali99/headscale-openid
nixos/headscale: update oidc options
2023-02-28 00:21:04 +00:00
Robert Schütz
be55739ebb
Merge pull request #218025 from MrFreezeex/protonbridge-update
protonmail-bridge: 2.3.0 -> 3.0.18
2023-02-27 14:57:12 -08:00
Will Fancher
ace4d26ccc
Merge pull request #217887 from lilyinstarlight/fix/allow-overriding-systemd-initrd-bins
nixos/systemd-initrd: allow overriding initrdBin with extraBin
2023-02-27 17:43:30 -05:00
Robert Scott
3a3d4c8bd2
Merge pull request #217902 from LeSuisse/haproxy-CVE-2023-25725
haproxy: 2.7.2 -> 2.7.3
2023-02-27 21:39:38 +00:00
Stefan Frijters
2af041ab44 nixos/gitlab-runner: do not pull in Docker if gitlab-runner-clear-docker-cache is disabled
Only create the service if the option is enabled and if any docker executors exist.
2023-02-27 22:24:14 +01:00
Robert Hensing
692a1033ff
Merge pull request #218365 from winterqt/revert-static-gid-migration
Revert systemd-coredump and polkit static GIDs
2023-02-27 20:16:57 +01:00
Eelco Dolstra
056b679c35 nix-fallback-paths.nix: Update to 2.13.3 2023-02-27 10:40:18 -08:00
Luke Granger-Brown
f43347d8a3
Merge pull request #214346 from SFrijters/postfix-ipv4
nixos/postfix: restrict inet_protocols to ipv4 when ipv6 is disabled
2023-02-27 18:24:53 +00:00
Cabia Rangris
f8b026c478
Merge pull request #218637 from Luflosi/klipper-fix-typo
nixos/klipper: fix assert message to match actual assertion
2023-02-27 21:17:18 +04:00
Thomas Gerbet
43e79015bf nixos/tests/haproxy: stop using nixos/profiles/minimal
The defaults conflicts with the defaults of `services.httpd`:
```
error: The option `nodes.machine.services.logrotate.enable' has conflicting definition values:
       - In `/home/thomas/Workspace/Packaging/nixpkgs/nixos/modules/profiles/minimal.nix': false
       - In `/home/thomas/Workspace/Packaging/nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix': true
       Use `lib.mkForce value` or `lib.mkDefault value` to change the priority on any of these definitions.
(use '--show-trace' to show detailed location information)
```

`nixos/profile/minimal` is not used in the majority of the tests and it does not
seem to have a specific reason to use it for the HAProxy test.
2023-02-27 17:56:56 +01:00
Soner Sayakci
ff7dfcba57 nixos/opensearch: fix opensearch startup 2023-02-27 16:07:12 +00:00
Luflosi
2378d1a214
nixos/klipper: fix assert message to match actual assertion
This error was introduced in 849c40b5f5.
2023-02-27 17:04:48 +01:00
Daniel Olsen
ea31ef91af nixos/headscale: update oidc options 2023-02-27 15:17:16 +01:00
Riley
c713217380
nixos/k3s: add environmentFile as an option
* k3s: add environmentFile option

Enabling to include secrets through configuration such as 'sops'

* Update nixos/doc/manual/release-notes/rl-2305.section.md

Co-authored-by: Jairo Llopis <973709+yajo@users.noreply.github.com>
2023-02-27 08:15:25 -03:00
Nick Cao
50302bbfc7
Merge pull request #218386 from dotlambda/txredisapi-python3
nixos/tests/txredisapi: stop using python38
2023-02-27 14:47:25 +08:00
Nick Bathum
519958c94b
nixos/lib/make-multi-disk-zfs-image: expose memSize parameter
closes #178095
2023-02-26 20:18:04 -05:00
schnusch
bbc988ba00 nixos/matrix-synapse: fix .well-known delegation of federated traffic
Synapse is reverse-proxied on ${fqdn} not ${config.networking.domain} and
the .well-known delegation info must point to the domain on which synapse
is hosted, see https://matrix-org.github.io/synapse/latest/delegate.html
2023-02-27 02:02:35 +01:00
Robert Schütz
9e1d4dff3e nixos/openvpn: use writeShellScript
Previously the upScript would fail with

    Syntax error: "(" unexpected (expecting "done")

on line 7 if /bin/sh is not bash.
2023-02-26 10:12:28 -08:00
Nick Bathum
59462da917
nixos/lib/make-disk-image: expose memSize parameter
Generating large disk images can fail from out-of-memory in vm-run.
2023-02-26 12:08:58 -05:00
Vincent Haupert
e8df83d417 nixos/tests/github-runner: init 2023-02-26 15:39:19 +01:00
Vincent Haupert
137db83090 nixos/github-runners: use Runner.Listener directly for registration
Nothing the script `config.sh` does prior to the final call to
`Runner.Listener configure` is relevant for the systemd service.
Particularly, we don't need (nor want) any of the artifacts the `env.sh`
script creates.
2023-02-26 15:39:19 +01:00
K900
82964d1694 nixos/x11: default to the modesetting driver
The upstream drivers are very dead:
- nouveau:
   - https://gitlab.freedesktop.org/xorg/driver/xf86-video-nouveau/-/commits/master
   - last meaningful change in August 2020
- ati (aka radeon):
   - https://gitlab.freedesktop.org/xorg/driver/xf86-video-ati/-/commits/master
   - last meaningful change in April 2020
- amdgpu:
   - https://gitlab.freedesktop.org/xorg/driver/xf86-video-amdgpu/-/commits/master
   - barely alive, mostly thanks to Valve people

Modesetting isn't even the future, it's the now, especially with Wayland.
We should embrace it.
2023-02-26 16:11:13 +03:00
Aaron Andersen
d8c0a9204a
Merge pull request #217834 from yaxitech/gh-runner-workdir-clean
nixos/github-runners: clean `workDir` as root
2023-02-26 08:05:05 -05:00
Vladimír Čunát
30e272bc04
Merge #216499: staging-next 2023-02-15 2023-02-26 10:11:50 +01:00
happysalada
8872f52732 qdrant: service module init 2023-02-26 01:33:15 -05:00
github-actions[bot]
399e2c78d4
Merge master into staging-next 2023-02-26 06:01:09 +00:00
Robert Schütz
9a8272bd01 nixos/tests/txredisapi: stop using python38 2023-02-25 21:32:15 -08:00
Winter
ee6517a915 Revert "nixos/polkit: guard static gid for polkituser behind state version"
This reverts commit 2265160fc0 and
e56db577a1.

Ideally, we shouldn't cause friction for users that bump `stateVersion`,
and I'd consider having to switch and/or manually hardcode a UID/GID
to supress the warning friction. I think it'd be more beneficial to, in
this rare case of an ID being missed, just let it be until more
discussion happens surrounding this overall issue.

See https://github.com/NixOS/nixpkgs/pull/217785 for more context.
2023-02-25 22:32:16 -05:00
Winter
15f1369b95 Revert "nixos/systemd-coredump: guard static gid for systemd-coredump behind state version"
This reverts commits f5483464d5 and
6b9583e5e1.

Ideally, we shouldn't cause friction for users that bump `stateVersion`,
and I'd consider having to switch and/or manually hardcode a UID/GID
to supress the warning friction. I think it'd be more beneficial to, in
this rare case of an ID being missed, just let it be until more
discussion happens surrounding this overall issue.

See https://github.com/NixOS/nixpkgs/pull/217785 for more context.
2023-02-25 22:31:56 -05:00
Anselm Schüler
9769e90233 lib/options: Add more options to mkPackageOption 2023-02-26 03:00:22 +01:00
Nick Cao
e0bf055d99
Merge pull request #217785 from NickCao/ugid
nixos/{polkit,systemd-coredump}: guard static gid behind state version
2023-02-26 09:44:56 +08:00
github-actions[bot]
348549a031
Merge master into staging-next 2023-02-26 00:02:44 +00:00
Lily Foster
c56e5ef801 nixos/users-groups: update option description to clarify initial* option precedence 2023-02-25 14:27:35 -05:00
Lily Foster
5508000ddf nixos/tests/shadow: ensure hashedPassword takes precedence over initialHashedPassword 2023-02-25 14:27:35 -05:00
Lily Foster
bfa0bff644 nixos/update-users-groups: let hashedPassword take precedence over initialHashedPassword
Without this change, users that have both `initialHashedPassword` and
`hashedPassword` set will have `initialHashedPassword` take precedence,
but only for the first time `/etc/passwd` is generated. After that,
`hashedPassword` takes precedence. This is surprising behavior as it
would generally be expected for `hashedPassword` to win if both are set.

This wouldn't be a noticeable problem (and an assert could just be made
instead) if the users-groups module did not default the
`root.intialHashedPassword` value to `!`, to prevent login by default.
That means that users who set `root.hashedPassword` and use an ephemeral
rootfs (i.e. `/etc/passwd` is created every boot) are not able to log in
to the root account by default, unless they switch to a new generation
during the same boot (i.e. `/etc/passwd` already exists and
`hashedPassword` is used instead of `initialHashedPassword`) or they set
`root.initialHashedPassword = null` (which is unintuitive and seems
redundant).
2023-02-25 14:27:35 -05:00
pennae
5dce130d1c nixos/tests/unifi: inherit allowUnfree into test node
mongodb is unfree, so the test won't run without this. we already allow
unfree to grab the unifi packages, so it's not even a big change.
2023-02-25 19:12:08 +01:00
Florian Klink
4ed9534f12
Merge pull request #217942 from lilyinstarlight/fix/nixos-test-systemd-initrd-shutdown
nixos/tests/systemd-shutdown: ensure systemd-initrd variant actually enables it
2023-02-25 19:02:53 +01:00
github-actions[bot]
52a11b56f9
Merge master into staging-next 2023-02-25 18:01:03 +00:00
Benjamin Asbach
546f356db6 remove myself as maintainer for now as I switched to another distro 2023-02-25 18:56:02 +01:00
github-actions[bot]
ffa8788cc6
Merge master into staging-next 2023-02-25 06:01:20 +00:00
Nick Cao
eb03dde70d
Merge pull request #217890 from IndeedNotJames/nixos-tests-gitea
nixos/tests/gitea: open up test for forgejo
2023-02-25 09:55:43 +08:00
Arthur Outhenin-Chalandre
47782b16c5
protonmail-bridge: 2.3.0 -> 3.0.18
Update protonmail-bridge to v3. This also rename the CLI executable from
protonmail-bridge to bridge to be more in line with upstream naming.

Co-authored-by: James Landrein <github@j4m3s.eu>
Signed-off-by: Arthur Outhenin-Chalandre <arthur.outhenin-chalandre@proton.ch>
2023-02-25 01:41:39 +01:00
github-actions[bot]
78fc07ec20
Merge master into staging-next 2023-02-25 00:02:47 +00:00
superherointj
371c7b8239
Merge pull request #217718 from Kiskae/nvidia/unbreak-6.2
linuxPackages_6_2.nvidia_x11: disable ibt
2023-02-24 17:46:26 -03:00
github-actions[bot]
2384cd723b
Merge master into staging-next 2023-02-24 12:01:20 +00:00
Sandro
83b8193be9
Merge pull request #201780 from helsinki-systems/init/nextcloud-notify-push
nextcloud-notify-push: init at 0.5.0
2023-02-24 12:10:02 +01:00
IndeedNotJames
1b304e1dbc
forgejo: use existing nixos/tests/gitea as test
forgejo is a soft-fork of gitea and gitea's existing tests work great
with forgejo.
At least for now, as this could change, though somewhat unlikely.
2023-02-24 02:59:30 +01:00
IndeedNotJames
889eb7a315
nixos/tests/gitea: add indeednotjames as maintainer
Mostly, because I (@IndeedNotJames) made a slight change to those tests and intend on
extending them in the future.
2023-02-24 02:59:30 +01:00
IndeedNotJames
7d05a6a910
nixos/tests/gitea: make gitea package configurable
This allows the same tests to be used for forgejo, a soft-fork of
gitea, which currently does not have any tests.
2023-02-24 02:59:30 +01:00
Lily Foster
308657daec
nixos/tests/systemd-shutdown: ensure systemd-initrd variant actually enables it
It looks like the systemd-initrd variant of the systemd-shutdown test
(systemd-initrd-shutdown) did not actually enable the systemd-initrd and
so was just evaluating to the same store path before this change.
2023-02-23 19:42:45 -05:00
github-actions[bot]
7fb1a9172f
Merge master into staging-next 2023-02-24 00:02:22 +00:00
Martin Puppe
ebdfdae156 nixos/paperless: download NLTK data
Since version 1.10.0 paperless-ngx depends on the NLTK library which is
used to pre-process data for machine learning. NLTK needs certain
data for stemming, stopword removal etc. This data has to be downloaded
first. This commit introduces a new systemd service that does the
downloading.
2023-02-23 21:34:49 +01:00
sternenseemann
d1fa5dd85c nixos/doc: don't prescribe OS / manual name
In general the man pages do not care what OS and manual they are shipped
with, so they don't get to choose the names of them. We were tempted to
do so, as we had inconsistently chosen OS names for the mandoc and
man-db/groff implementations. Since this has been rectified since, we
can just drop this boilerplate from the man pages.
2023-02-23 20:53:04 +01:00
Lily Foster
5210ddc701
nixos/systemd-initrd: allow overriding initrdBin with extraBin
Being able to override `boot.initrd.systemd.initrdBin` with `boot.initrd.systemd.extraBin` is a desirable behavior, so this PR changes the `ln -s` command to `ln -sf` to force link even if the file already exists.
2023-02-23 13:23:15 -05:00
Lily Foster
e78dc938d8
nixos/qemu-vm: fix minor typo
The typo creates an empty directory 0755 in initrd rootfs rather than
create the Nix store directories with mode 0755.

I guess setting the mode is not strictly necessary if it worked before
this change, but I'll leave the `-m 0755` in just in case.
2023-02-23 13:01:53 -05:00
Justinas Stankevicius
857636b032 teleport: 11.3.4 -> 12.0.2 2023-02-23 16:35:36 +02:00
Alyssa Ross
52c286ee5b
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
	pkgs/development/libraries/pmdk/default.nix
2023-02-23 13:51:34 +00:00
Naïm Favier
129b6f7812
Merge pull request #216504 from ncfavier/unbound-state-dir-writable
nixos/unbound: make stateDir writable
2023-02-23 14:23:53 +01:00
Bernardo Meurer
ef9030a3ba
Merge pull request #216430 from peterhoeg/m/qmk 2023-02-23 12:14:31 +00:00
github-actions[bot]
390b789c39
Merge master into staging-next 2023-02-23 12:01:07 +00:00
Profpatsch
d316c28a30 modules/github-runner: Improve tokenFile docs
We’ve been having trouble figuring out which kind of token to use and
why our setup would break every few system updates.

This should clarify which options there are, and which ones lead to
better results.

Ideally there would be a manual section that has a step-by-step guide
on how to set up the github runner, with screenshots and everything.
2023-02-23 12:37:30 +01:00
Nick Cao
f5483464d5
nixos/systemd-coredump: guard static gid for systemd-coredump behind state version 2023-02-23 17:07:50 +08:00
Nick Cao
2265160fc0
nixos/polkit: guard static gid for polkituser behind state version 2023-02-23 17:07:49 +08:00
Vincent Haupert
36949b9718 nixos/github-runners: clean workDir as root
Purge contents of `workDir` as root to also allow the removal of files
marked as read-only. It is easy to create read-only files in `workDir`,
e.g., by copying files from the Nix store.
2023-02-23 09:05:27 +01:00
github-actions[bot]
010946fcbd
Merge master into staging-next 2023-02-23 06:01:03 +00:00
Weijia Wang
b65d2ea436
Merge pull request #192672 from amjoseph-nixpkgs/pr/nixos/sd/powerpc64le
enable NixOS installer for powerpc64le
2023-02-23 07:09:46 +02:00