Commit Graph

2976 Commits

Author SHA1 Message Date
github-actions[bot]
c6dd9fd65d
Merge master into staging-next 2022-03-25 18:01:14 +00:00
Emery Hemingway
4ec35ff6d6 nixos: init programs/nncp module
The NNCP utilities read a configuration at "/etc/nncp.hjson" by
default. Add a NixOS module for generating this configuration.
2022-03-25 16:30:13 +00:00
Jan Tojnar
d246548329 Merge branch 'master' into staging-next 2022-03-25 15:03:47 +01:00
Janne Heß
7d0e21c77e
nixos/test-runner: Allow writing to qemu stdin 2022-03-25 12:08:21 +01:00
Vladimír Čunát
0a8b4eddd2
Merge branch 'master' into staging-next 2022-03-25 10:16:56 +01:00
Luflosi
ec415055ba nixos/ipfs: improve how the commandline flags are generated
Use `utils.escapeSystemdExecArgs` instead of relying on the exact way in which `toString` formats a list.
In https://github.com/NixOS/nixpkgs/pull/156706#discussion_r795867283 a suggestion was made and then implemented to replace `toString` with `concatStringsSep " "`.
@pennae then suggested to use `utils.escapeSystemdExecArgs` instead in https://github.com/NixOS/nixpkgs/pull/164846#issuecomment-1073001848.
2022-03-24 20:42:07 +00:00
github-actions[bot]
c80dabe3b1
Merge staging-next into staging 2022-03-23 06:01:55 +00:00
Sandro
85ce10e75a
Merge pull request #164042 from mstarzyk/miller-6 2022-03-23 05:31:31 +01:00
github-actions[bot]
9d35f2cd19
Merge staging-next into staging 2022-03-22 18:10:54 +00:00
Michal Sojka
611e9302f9 nixos-rebuild: add --no-flake switch
When a NixOS system uses flakes, i.e., /etc/nixos/flake.nix exists, it
is impossible to use nixos-rebuild to build a pre-flake
configuration.nix. Of course, one can directly use nix command to
build the configuration, but not everybody remembers the correct nix
options to do that.

With the new option, it is possible to build a pre-flake configuration
with command like this:

    nixos-rebuild build-vm -I nixos-config=./vm.nix --no-flake

The option might be useful for people following older pre-flake
tutorials on a flake-based system.
2022-03-22 19:03:10 +01:00
github-actions[bot]
03c279d7ea
Merge staging-next into staging 2022-03-22 00:02:58 +00:00
Jörg Thalheim
9b2939da63
Merge pull request #164260 from Mic92/nix-ld
nix-ld: init at 1.0.0 + nixos module
2022-03-21 18:42:38 +00:00
github-actions[bot]
6ae26bb3c8
Merge staging-next into staging 2022-03-21 18:07:51 +00:00
Maciek Starzyk
55d462eea9 miller: 5.10.3 -> 6.2.0 2022-03-21 19:04:25 +01:00
Kevin Cox
8ce16fcf62
Merge pull request #163451 from hercules-ci/stop-premature-warnings
Stop premature warnings, including `nix.settings` migration
2022-03-21 10:10:40 -04:00
Vladimír Čunát
a519740b4c
Merge branch 'staging-next' into staging 2022-03-21 11:57:43 +01:00
Jörg Thalheim
35eb6cf711 nix-ld: mention in changelog 2022-03-21 11:15:32 +01:00
Sandro
3d48fda6f5
Merge pull request #164330 from Luflosi/fix-tor-client-disable 2022-03-20 19:51:30 +01:00
pennae
5b1fde773a
Merge pull request #163860 from delroth/synapse-rl-fix
matrix-synapse: fix release notes and doc for #158605 changes
2022-03-20 08:49:46 +00:00
github-actions[bot]
588298ee0a
Merge staging-next into staging 2022-03-18 12:01:57 +00:00
pennae
201a32a1a7 unifi: unifi6 -> unifi7 2022-03-18 10:28:53 +01:00
github-actions[bot]
07e0324dff
Merge staging-next into staging 2022-03-18 06:01:55 +00:00
j-k
c12cec8bc3
_7zz: correct license (#163999)
* _7zz: correct license and remove p7zip dependency

The code under Compress/Rar* is licensed under a specific unRAR license
Also Compress/LzfseDecoder.cpp is covered by BSD3

The unRAR code is removed from the `.tar.xz` since the license posits you
agree or remove the code from your hard drive
This adds some complexity to updating 7zz so there is also an update
script

Meta has been updated and tweaked

Source is now downloaded from sourceforge in the `.tar.xz` version to
avoid depending on p7zip

* _7zz: add notice of the license updates and optional unRAR licenced code
2022-03-18 12:47:19 +08:00
github-actions[bot]
739cf04cb7
Merge staging-next into staging 2022-03-17 18:02:05 +00:00
Luflosi
7867b9506b
nixos/doc/rl-22.05: add changelog entry for modprobe changes
Add a changelog entry for the changes in 3dc6fab5c9.
2022-03-17 12:56:04 +01:00
Luflosi
47b699fe6c
Revert "nixos/modprobe: add boot.initrd.extraModprobeConfig option"
This reverts commit 1c58cdbeed, since this change was made redundant by 3dc6fab5c9 and in https://github.com/NixOS/nixpkgs/pull/145013 we decided to revert this commit.
2022-03-17 12:56:02 +01:00
github-actions[bot]
2eac3106df
Merge staging-next into staging 2022-03-17 00:02:45 +00:00
Robert Hensing
0395086d0c
Merge pull request #162271 from Infinisil/warn-no-type
Throw an error for options without a type
2022-03-16 22:58:45 +01:00
Pavol Rusnak
0fcf66c74a
Merge pull request #164268 from MrMebelMan/update/kratos
kratos: 0.8.0-alpha.3 -> 0.8.3-alpha.1.pre.0
2022-03-16 22:45:10 +01:00
github-actions[bot]
177bd4ed53
Merge staging-next into staging 2022-03-16 18:01:43 +00:00
Artturi
b734f40478
Merge pull request #154004 from illustris/hadoop 2022-03-16 14:05:56 +02:00
zowoq
6431086967 Merge remote-tracking branch 'origin/staging-next' into staging
Conflicts:
	pkgs/development/python-modules/symengine/default.nix
2022-03-16 16:03:43 +10:00
Silvan Mosberger
47f2ee3d55
Merge pull request #160075 from ConnorBaker/spark_3_2_1
spark: init 3.2.1 and test on aarch64-linux
2022-03-16 02:13:03 +01:00
Ryan Mulligan
0ab73f9a3f
Merge pull request #162535 from astro/pacemaker
pacemaker: init
2022-03-15 16:06:56 -07:00
Luflosi
1b34039b5f
nixos/tor: fix services.tor.client.enable = false not working
If `services.tor.client.enable` is set to false (the default), the `SOCKSPort` option is not added to the torrc file but since Tor defaults to listening on port 9050 when the option is not specified, the tor client is not actually disabled. To fix this, simply set `SOCKSPort` to 0, which disables the client.
Use `mkForce` to prevent potentially two different `SOCKSPort` options in the torrc file, with one of them being 0 as this would cause Tor to fail to start. When `services.tor.client.enable` is set to false, this should always be disabled.
2022-03-15 23:39:02 +01:00
Vladyslav Burzakovskyy
df2327ee24 kratos: 0.8.0-alpha.3 -> 0.8.3-alpha.1.pre.0 2022-03-15 14:38:14 +01:00
Michele Guerini Rocco
c0ede26162
Merge pull request #164050 from LunNova/lunnova/disable-lucida-bitmap-fonts
Remove ancient unfree bitmap fonts from fonts.defaultXFonts
2022-03-15 09:42:07 +01:00
Jonathan Ringer
54d6aee8f3 nixos/doc/rl-22.05: mention nvidia va-api additions 2022-03-14 22:35:11 -07:00
Alyssa Ross
d7e181ff83
Merge remote-tracking branch 'nixpkgs/staging-next' into staging
Conflicts:
	pkgs/development/compilers/ocaml/4.12.nix
	pkgs/development/python-modules/oci/default.nix
	pkgs/tools/admin/bubblewrap/default.nix
2022-03-14 12:33:16 +00:00
Luna Nova
5ac5bed4b4
nixos/fonts: Document removal of ancient bitmap fonts from default config 2022-03-13 15:43:32 -07:00
pennae
aa7b129708
Merge pull request #154113 from pennae/systemd-escaping
nixos: add functions and documentation for escaping systemd Exec* directives
2022-03-13 19:57:32 +00:00
Janne Heß
3148b3d365
Merge pull request #163069 from helsinki-systems/feat/minor-stc-improvements
nixos/switch-to-configuration: Few minor/medium improvements
2022-03-13 17:50:36 +01:00
Peter Hoeg
27e32bbfde nixos/systembus-notify: add support for system services notifying users 2022-03-13 20:21:21 +08:00
Luke Granger-Brown
8035c513e3
Merge pull request #163673 from lukegb/pomerium
pomerium: 0.15.7 -> 0.17.0
2022-03-13 02:20:38 +00:00
Pierre Bourdon
9fad223ad1
matrix-synapse: fix release notes and doc for #158605 changes 2022-03-12 21:58:26 +01:00
Kevin Cox
3222d8665d
Merge pull request #159865 from midchildan/update/epgstation
epgstation: 1.7.5 -> 2.6.20
2022-03-12 13:42:49 -05:00
Florian Klink
8e428f654c
Merge pull request #163454 from flokli/iptables-nft-legacy-more-rl
nixos/doc: update rl-2111 w.r.t. iptables-nft migration
2022-03-12 10:17:15 +01:00
midchildan
552c993062
nixos/rl-2205: fix invalid link 2022-03-12 15:10:39 +09:00
midchildan
561c0c2851
nixos/rl-2205: add entries for EPGStation v2 2022-03-12 15:10:38 +09:00
pennae
40a35299fa nixos: add functions and documentation for escaping systemd Exec* directives
it's really easy to accidentally write the wrong systemd Exec* directive, ones
that works most of the time but fails when users include systemd metacharacters
in arguments that are interpolated into an Exec* directive. add a few functions
analogous to escapeShellArg{,s} and some documentation on how and when to use them.
2022-03-12 00:48:52 +01:00