Commit Graph

30775 Commits

Author SHA1 Message Date
aszlig
e4bd1e8f92
nixos/confinement: Use prio 100 for RootDirectory
One of the module that already supports the systemd-confinement module
is public-inbox. However with the changes to support DynamicUser and
ProtectSystem, the module will now fail at runtime if confinement is
enabled (it's optional and you'll need to override it via another
module).

The reason is that the RootDirectory is set to /var/empty in the
public-inbox module, which doesn't work well with the InaccessiblePaths
directive we now use to support DynamicUser/ProtectSystem.

To make this issue more visible, I decided to just change the priority
of the RootDirectory option definiton the default override priority so
that whenever another different option is defined, we'll get a conflict
at evaluation time.

Signed-off-by: aszlig <aszlig@nix.build>
2024-05-13 00:40:41 +02:00
aszlig
0a9cecc35a
nixos/systemd-confinement: Make / read-only
Our more thorough parametrised tests uncovered that with the changes for
supporting DynamicUser, we now have the situation that for static users
the root directory within the confined environment is now writable for
the user in question.

This is obviously not what we want and I'd consider that a regression.
However while discussing this with @ju1m and my suggestion being to
set TemporaryFileSystem to "/" (as we had previously), they had an even
better idea[1]:

> The goal is to deny write access to / to non-root users,
>
>   * TemporaryFileSystem=/ gives us that through the ownership of / by
>     root (instead of the service's user inherited from
>     RuntimeDirectory=).
>   * ProtectSystem=strict gives us that by mounting / read-only (while
>     keeping its ownership to the service's user).
>
> To avoid the incompatibilities of TemporaryFileSystem=/ mentioned
> above, I suggest to mount / read-only in all cases with
> ReadOnlyPaths = [ "+/" ]:
>
>   ...
>
> I guess this would require at least two changes to the current tests:
>
>   1. to no longer expect root to be able to write to some paths (like
>      /bin) (at least not without first remounting / in read-write
>      mode).
>   2. to no longer expect non-root users to fail to write to certain
>      paths with a "permission denied" error code, but with a
>      "read-only file system" error code.

I like the solution with ReadOnlyPaths even more because it further
reduces the attack surface if the user is root. In chroot-only mode this
is especially useful, since if there are no other bind-mounted paths
involved in the unit configuration, the whole file system within the
confined environment is read-only.

[1]: https://github.com/NixOS/nixpkgs/pull/289593#discussion_r1586794215

Signed-off-by: aszlig <aszlig@nix.build>
2024-05-13 00:40:40 +02:00
Julien Moutinho
0a5542c766
nixos/systemd-confinement: support ProtectSystem=/DynamicUser=
See https://discourse.nixos.org/t/hardening-systemd-services/17147/14
2024-05-13 00:40:25 +02:00
Franz Pletz
ef26d99b37
Merge pull request #310873 from ivan/radvd-debuglevel
nixos/radvd: add debugLevel option
2024-05-12 22:23:24 +02:00
Pol Dellaiera
378c5c67ed
Merge pull request #310348 from ehmry/nginx-validateConfigFile
nixos/nginx: add validateConfigFile option
2024-05-12 21:58:59 +02:00
Weijia Wang
4433bbfd2a
Merge pull request #304773 from acid-bong/no-libs
treewide: remove file-wide `with lib;` uses in nixos/modules/programs
2024-05-12 21:52:15 +02:00
Andreas Rammhold
d157db3480
Merge pull request #307051 from hax404/modules/tayga/mappings
nixos/tayga: add mappings option
2024-05-12 21:16:26 +02:00
Xyven1
201a5ff61f nixos/plex: add systemd hardening configuration 2024-05-12 14:22:04 -04:00
Marek Fajkus
cf1e14e8a9
Merge pull request #310880 from presto8/warn-xss-lock
nixos/xss-lock: add warning for startx
2024-05-12 19:53:52 +02:00
Florian Klink
0244a8d5d7 nixos/caddy: don't set ExecReload if enableReload is disabled
Otherwise, setting services.caddy.enableReload to false fails in a very bad fashion:

The reload command still gets executed, but fails:

```
Apr 26 21:23:01 n1-rk1 systemd[1]: Reloading Caddy...
Apr 26 21:23:01 n1-rk1 caddy[70793]: {"level":"info","ts":1714166581.733018,"msg":"using provided configuration","config_file":"/etc/caddy/caddy_config","config_adapter":"caddyfile"}
Apr 26 21:23:01 n1-rk1 caddy[70793]: {"level":"warn","ts":1714166581.7353032,"msg":"Caddyfile input is not formatted; run 'caddy fmt --overwrite' to fix inconsistencies","adapter":"caddyfile","file":"/etc/caddy/caddy_config","line":3}
Apr 26 21:23:01 n1-rk1 caddy[70793]: Error: sending configuration to instance: performing request: Post "http://localhost:2019/load": dial tcp [::1]:2019: connect: connection refused
Apr 26 21:23:01 n1-rk1 systemd[1]: caddy.service: Control process exited, code=exited, status=1/FAILURE
Apr 26 21:23:01 n1-rk1 systemd[1]: Reload failed for Caddy.
```

… and the server is not restarted either, as a ExecReload= command is
specified.

Fix this, by only setting ExecReload if the reload exists.

The first empty string is still necessary to reset the old option.
2024-05-12 18:27:02 +03:00
Bobby Rong
e466c02ac3
Merge pull request #311074 from bobby285271/upd/mate-glib-networking
nixos/mate: enable services.gnome.glib-networking

cc #53700
2024-05-12 22:39:17 +08:00
Bobby Rong
3de41ce7a8
nixos/mate: enable services.gnome.glib-networking
This is already done in the 5 other desktop environments I maintain, I decided that I don't mind adding another one.
2024-05-12 22:05:22 +08:00
DavHau
0b6c484848 nixos/smokeping: use nginx instead of thttpd
Motivation:
fixes #265953

Changes:
- deprecate `services.smokeping.port` in favor of the niginx native option
- mention in release notes
2024-05-12 13:31:11 +02:00
Pol Dellaiera
8949291221
Merge pull request #305586 from drupol/private-gpt/init
private-gpt: init at 0.5.0
2024-05-12 12:53:53 +02:00
Acid Bong
49f6869f71
treewide: remove file-wide with lib; in nixos/modules/programs 2024-05-12 10:11:06 +03:00
Bjørn Forsman
7909e0f7d6 nixos/pixiecore: fix apiServer example
Add missing http:// scheme. Without it pixiecore logs this and never
contacts the API server:

  [DHCP] Couldn't get bootspec for [REDACTED_MAC_ADDR]: Get "localhost:8080/v1/boot/[REDACTED_MAC_ADDR]": unsupported protocol scheme "localhost"
2024-05-11 23:01:35 +02:00
Pol Dellaiera
aff1950a3f
nixos/private-gpt: init 2024-05-11 22:42:04 +02:00
Gerg-L
6e22a417e6
nixos/xserver: remove duplicate display-manager.script declaration 2024-05-11 16:34:08 -04:00
Preston Hunt
7f0158313d nixos/xss-lock: add warning for startx 2024-05-11 08:47:11 -07:00
Ivan Kozik
0482e54050 nixos/radvd: add debugLevel option 2024-05-11 14:59:09 +00:00
Ilya Epifanov
2099ff760f thermald: fixed handling of an external config 2024-05-11 12:32:49 +02:00
K900
6dd3061cae nixos/greetd: add option to make greetd not stop Plymouth early 2024-05-11 11:52:45 +03:00
Jared Baur
32bf051ba4
nixos/switch-to-configuration: add new implementation
This adds an implementation of switch-to-configuration that allows for
closer interaction with the lifecycle of systemd units by using DBus
APIs directly instead of using systemctl. It is disabled by default, but
can be enabled by specifying `{ system.switch = { enable = false; enableNg = true; }; }`.
2024-05-10 16:33:06 -07:00
superherointj
6cfcd3c754 k3s: format with nixfmt-rfc-style 2024-05-10 18:55:54 -03:00
K900
4733c9feec nixos/tests: set non-conflicting priority for logrotate disabling
CC https://github.com/NixOS/nixpkgs/pull/267880
2024-05-10 16:25:51 +03:00
Martin Weinelt
7da17ece76
Merge pull request #310366 from mweinelt/pretix-pretalx-homemode
pretix, pretalx: fixes, hardening
2024-05-10 14:50:24 +02:00
Franz Pletz
fb382c2628
Merge pull request #310452 from fpletz/nginx-acme-servername
nixos/nginx: fix reference to acme cert hostname
2024-05-10 14:04:24 +02:00
nu-nu-ko
1c0d10e4f4
nixos/navidrome: add nu-nu-ko to maintainers 2024-05-10 21:16:30 +12:00
nu-nu-ko
7519d230b5
nixos/navidrome: ensure data & cache dirs exist with valid permissions 2024-05-10 21:16:30 +12:00
nu-nu-ko
ffc0d8bf58
nixos/navidrome: remove apply from settings option 2024-05-10 21:16:30 +12:00
nu-nu-ko
da8cdc2782
nixos/navidrome: use lib.getExe 2024-05-10 21:16:30 +12:00
nu-nu-ko
4987663e27
nixos/navidrome: add user/group options 2024-05-10 21:16:29 +12:00
nu-nu-ko
bbba2bde44
nixos/navidrome: rfcfmt, rm mdDoc & with lib; 2024-05-10 21:16:29 +12:00
Franz Pletz
338a208e7d
Merge pull request #287505 from jpds/zfs-scrub-trim-randomizedDelaySec 2024-05-10 02:11:13 +02:00
Franz Pletz
7c520d4070
Merge pull request #287494 from jpds/zfs-autoscrub-monthly-default 2024-05-10 02:09:59 +02:00
Franz Pletz
04f0aed442
Merge pull request #267880 from Izorkin/update-nixos-tests-logrotate 2024-05-10 02:06:59 +02:00
Franz Pletz
b7d060d10d
nixos/nginx: fix reference to acme cert hostname
The change introduced in #308303 refers to the virtualHosts attrset
key which can be any string. The servername is the actual primary
hostname used for the certificate.

This fixes use cases like:

    services.nginx.virualHosts.foobar.serverName = "my.fqdn.org";
2024-05-10 01:36:34 +02:00
Martin Weinelt
622af635bb
pretalx: adopt and set up code ownership 2024-05-09 18:20:14 +02:00
Martin Weinelt
9afcf733f3
nixos/pretix: update hardening
- Transition from world-readable to group-readable UMask
- Remove world permissions from state directory
2024-05-09 18:20:14 +02:00
Martin Weinelt
82f2cc7489
nixos/pretalx: set up hardening 2024-05-09 18:20:13 +02:00
Martin Weinelt
b4b3165619
nixos/pretalx: fix state directory mode
The state directory contains static files that need to be accessible by
a webserver, but homeMode defaults to 0750 and switching the generation
will always force the homeMode, thereby breaking access to the assets.

Instead, fully rely on systemd to provide the StateDirectory with the
correct mode.
2024-05-09 18:20:13 +02:00
Martin Weinelt
a4193dba8f
nixos/pretix: fix state directory mode
The state directory contains static files that need to be accessible by
a webserver, but homeMode defaults to 0750 and switching the generation
will always force the homeMode, thereby breaking access to the assets.

Instead, fully rely on systemd to provide the StateDirectory with the
correct mode.
2024-05-09 17:00:02 +02:00
oddlama
58286e510c
nixos/oauth2-proxy: fix invalid comparison between list and attrset 2024-05-09 16:58:33 +02:00
Emery Hemingway
60c75135f8 nixos/nginx: add validateConfigFile option
Add an option to disable configuration file processing and
validation.
2024-05-09 16:48:26 +02:00
Adam C. Stephens
215dd64e07
Merge pull request #307039 from adamcstephens/nixos-unstable
nixos/incus: add support for soft daemon restarts
2024-05-09 09:59:37 -04:00
Nick Cao
fe4d8b1b73
Merge pull request #310298 from rouven0/portunus-dex
nixos/portunus: fix dangling service files for dex
2024-05-09 09:50:54 -04:00
Adam Stephens
7d5b333dcd
nixos/incus: add support for soft daemon restart
This is a feature supported out of the box by upstream and allows the
incusd service to be restarted without impacting running
instances. While this does give up a bit of reproducibility, qemu and
lxc for example, there are clear benefits in allowing the host to
apply updates without impacting instances.

Modeled after the zabbly implementation: 2a67c3e260/systemd/incus-startup.service

This will now be the default.
2024-05-09 09:01:12 -04:00
Guillaume Girol
00346bff2b nixos/borgbackup: add an option to ignore warnings
borgbackup exit code 1 means warning, not error. For example if a file
is modified during backup, borg create exits with code 1. It may be
desirable to count that as success.
2024-05-09 12:00:00 +00:00
Rouven Seifert
06667e028f
nixos/portunus: fix dangling service files for dex 2024-05-09 11:29:23 +02:00
Guillaume Girol
2931e934d0
Merge pull request #277368 from niklaskorz/nixos-mautrix-signal
nixos/mautrix-signal: add module
2024-05-08 22:33:29 +02:00
Nanotwerp
9630d00c18 nixos/virt-manager: use dconf to autoconnect QEMU/KVM 2024-05-08 13:53:10 -04:00
Linus Heckemann
a10842c7f0
Merge pull request #302300 from Ma27/kernel-zstd
linux kernel: prefer zstd where possible
2024-05-08 15:17:45 +02:00
Florian Klink
ddf728e50b
Merge pull request #306926 from tie/networkd-global-ipv6-privacy-extensions
nixos/networkd: allow IPv6PrivacyExtensions in networkd.conf
2024-05-08 14:41:08 +03:00
7c6f434c
55e9b296c1
Merge pull request #309696 from Uthar/lisp-removal-of-previous-variants
Lisp modules - removal of previous variants
2024-05-08 10:04:39 +00:00
Jonas Heinrich
4a451cb3ce
Merge pull request #308291 from Ma27/nc-update-db
nixos/nextcloud: add nextcloud-update-db.service, nextcloud-cron isn't oneshot
2024-05-08 11:29:45 +02:00
Pascal Wittmann
a751e2faa2
Merge pull request #302908 from kai-tub/nixos/restic/fix-checkCmd
nixos/restic: fix skipping of check command
2024-05-08 10:29:31 +02:00
Pascal Wittmann
b641bba3d7
Merge pull request #309052 from kira-bruneau/intel-gpu-tools
nixos/intel-gpu-tools: init basic security wrapper
2024-05-07 23:28:45 +02:00
Sandro
dc79d5b1b3
Merge pull request #308904 from SuperSandro2000/273761-follow-up
nixos/openrazer: properly rename mouseBatteryNotifier option
2024-05-07 22:18:31 +02:00
nikstur
951e023010
Merge pull request #309838 from cyberus-technology/take-plausible-maintainership
plausible: take take-plausible-maintainership
2024-05-07 18:34:24 +02:00
Leona Maroni
31be9134a2
Merge pull request #309836 from cyberus-technology/fix-nixos-plausible-unit
nixos/plausible: fix unit start script
2024-05-07 15:46:50 +02:00
Alexander Sieg
8edee82bc2
plausible: take take-plausible-maintainership 2024-05-07 15:35:22 +02:00
Alexander Sieg
3be1b16698
nixos/plausible: fix unit start script
In 8bb777ee37 a condition was added to
only execute the createdb.sh script if database setup was configurated.
However a superfluace " was added at the end of the line which cased an
escaping error the resulted in #309520.

Fixes #309520
2024-05-07 15:27:08 +02:00
Karel Kočí
282f8b7be3
nixos/bcg: fix usage without environment files
The preStart script should be used only if it is really needed.
2024-05-07 14:58:19 +02:00
Basti
5132ef795e
Merge pull request #309572 from SuperSandro2000/307498-followup
nixos/containers: set storage.settings via mkDefault
2024-05-07 09:59:38 +00:00
Pol Dellaiera
9f3f549360
Merge pull request #309550 from linj-fork/pr/kanata-check-config-at-build-time
nixos/kanata: check the config file at build time
2024-05-07 09:59:18 +02:00
Pol Dellaiera
52b35c5833
Merge pull request #309534 from getchoo/nixos/fish/package-option
nixos/fish: add `package` option
2024-05-07 08:56:13 +02:00
seth
3056f09554
nixos/fish: add package option 2024-05-07 00:34:38 -04:00
Lin Jian
50f535b067
Merge pull request #309609 from linj-fork/pr/kanata-module-doc
nixos/kanata: improve doc
2024-05-07 11:05:26 +08:00
Kasper Gałkowski
fc5b715e1a nixos/clfswm: use sbclPackages - lispPackages was removed 2024-05-07 03:35:07 +02:00
Niklas Hambüchen
8907c1017d
Merge pull request #309424 from NixOS/ReadWriteDirectories-ReadWritePaths
nixos/{zoneminder,caddy,traefik}: ReadWriteDirectories -> ReadWritePaths
2024-05-07 01:13:06 +02:00
Niklas Hambüchen
9d7a729277 treewide: ReadWriteDirectories -> ReadWritePaths.
These were renamed in systemd v231:
2a624c36e6
2024-05-07 01:06:02 +02:00
Maximilian Kienitz
aa93972d0b nixos/vsftpd: fix invalid implication in assertions 2024-05-06 23:26:09 +02:00
Florian Klink
8950e22d8c nixos/garage: drop replication_mode setting
This got broken up into separate `replication_factor` and
`consistency_mode` settings with Garage 1.x, and due to the the "none"
default kicking in, Garage fails to startup with

> : Error: Either the legacy replication_mode or replication_level and consistency_mode can be set, not both.

if we actually make the migratiom as documented in the migration guide.

Drop this explicit setting, so users can set replication_mode or
replication_factor/consistency_mode, depending on the version they're
using.
2024-05-06 23:15:10 +03:00
Bernardo Meurer
40da51f2f0
Merge pull request #309611 from lovesegfault/fix-oauth2-proxy
nixos/oauth2-proxy: fix missing `lib.`
2024-05-06 15:15:45 -04:00
Artturin
5ce6ea92e3
Merge pull request #301827 from kampka/forbiddenDependenciesRegex
nixos/top-level: Turn `system.forbiddenDependenciesRegex` into a list
2024-05-06 21:07:03 +03:00
Bernardo Meurer
7c87bee77b
nixos/oauth2-proxy: fix missing lib. 2024-05-06 14:05:17 -04:00
Lin Jian
75a864edf1
nixos/kanata: replace deflayer with deflayermap in config example
IMHO, this style is more intuitive.
2024-05-07 01:52:08 +08:00
Lin Jian
4eafe1458d
nixos/kanata: improve links to the upstream documentation 2024-05-07 01:51:57 +08:00
Lin Jian
f7b50c3977
nixos/kanata: improve example of the package option
Before this patch, it is rendered as "Example: kanata-with-cmd".
With this patch applied, it is "Example: pkgs.kanata-with-cmd".
2024-05-07 01:51:51 +08:00
Sandro Jäckel
d8137e77ec
nixos/containers: set storage.settings via mkDefault
to make them easily overwriteable, aka without mkForce
2024-05-06 16:34:00 +02:00
Lin Jian
1d93534ec4
nixos/kanata: check the config file at build time
Before this patch, checking the config file is done at runtime.
Doing so at build time shortens the feedback loop[1][2].

[1]: https://github.com/NixOS/nixpkgs/issues/278135
[2]: https://github.com/jtroo/kanata/issues/689
2024-05-06 20:25:09 +08:00
Sandro
ed7d332850
Merge pull request #309304 from Ma27/nc-dav 2024-05-06 14:17:52 +02:00
Izorkin
772ae48e69
nixos/tests: disable logrotate service by default in tests 2024-05-06 14:53:38 +03:00
Jared Baur
91d7945974
nixos/terminfo: always use buildPlatform's terminfo (#309108)
Many terminal packages don't cross compile, so the `terminfo`
 NixOS module was not usable for nixos configurations that are
 cross-compiled.

Terminfo files (AFAIK) are small files that contain data about
 terminal capability, so they should never have any runtime
 dependencies that would cause any executables or otherwise
 incompatible outputs from the `buildPlatform` to leak into the
 nixos config's closure.
2024-05-06 09:04:43 +00:00
Niklas Hambüchen
7b6b627a66 nixos/caddy: Comment why ExecStart is reset 2024-05-06 03:18:29 +02:00
nicoo
db5f88c41a
nixos/ssh: Make ~/.ssh/authorized_keys optional in AuthorizedKeysFiles (#279894) 2024-05-06 01:11:03 +00:00
Sandro Jäckel
b2fd301603
nixos/openrazer: properly rename mouseBatteryNotifier option 2024-05-05 23:22:07 +02:00
Sandro
bdd2e6b121
Merge pull request #309324 from evenbrenden/move-jotta-cli
nixos/jotta-cli: move to services.jotta-cli
2024-05-05 23:17:24 +02:00
Georg Haas
e83b8cfd43
nixos/tayga: add mappings option 2024-05-05 21:10:51 +02:00
K900
8d9c2c8a1c
Merge pull request #309318 from oxalica/feat/plasma6-kwin-wayland-nice
nixos/plasma6: add CAP_SYS_NICE for kwin_wayland
2024-05-05 22:00:27 +03:00
Florian Klink
135fbd12c3
Merge pull request #309068 from SuperSandro2000/dbus-broker
nixos/dbus: fix switching from dbus-broker to dbus
2024-05-05 21:32:53 +03:00
André Silva
7142a2dec9
Merge pull request #306655 from devusb/sunshine-update
sunshine: 0.23.0 -> 0.23.1
2024-05-05 19:14:28 +01:00
Even Brenden
9fa89d0e2c nixos/jotta-cli: move to services.jotta-cli 2024-05-05 19:30:16 +02:00
Maximilian Bosch
c7a1616be7
nixos/nextcloud: add trailing slashes to carddav/caldav redirect
This seems to solve the problem with the warning about carddav/caldav
redirects being broken.
2024-05-05 18:17:25 +02:00
Marie Ramlow
212c34f8c0 nixos/miniflux: use systemd notify and watchdog
Miniflux supports notifying systemd when it's ready.
It also supports the systemd watchdog, which will restart miniflux when it's stuck.
2024-05-05 14:47:05 +02:00
Niklas Korz
346d23fdf2 nixos/mautrix-signal: add module 2024-05-05 13:57:50 +02:00
Will Fancher
4871a4e0da nixos/systemd-stage-1: Fix fsck.xfs needing bash's sh symlink 2024-05-05 06:01:03 -04:00
Sandro Jäckel
06643a08b2 nixos/display-managers: fix assertion 2024-05-05 11:17:49 +02:00
Jade Lovelace
f96f3c9e30 nixos/keycloak: pass --verbose to starting keycloak
This sets the exception handler to show the full exception on startup.
We don't think it does anything else, with respect to logging, for
instance. Everything else can be configured in the config file, and this
is plain reasonable to simply always enable in our view.
2024-05-04 17:43:38 -07:00
Kira Bruneau
63e307802c nixos/intel-gpu-tools: init basic security wrapper 2024-05-04 19:26:41 -04:00
Jörg Thalheim
68f45f55ee
Merge pull request #308946 from eclairevoyant/revert-hyprland-envvars
nixos/hyprland: revert setting environment variables globally
2024-05-05 00:45:50 +02:00
Kai Norman Clasen
c650982a43 nixos/restic: Add runCheck option
This commit fixes the requirement to provide a pruneOption to ensure
that the check command is run when a check option is set. This is useful
for check-only configurations. The option is implicitly set if checkOpts
are given by default.
2024-05-04 22:44:37 +02:00
Sandro Jäckel
21ab17debe
nixos/dbus: fix switching from dbus-broker to dbus 2024-05-04 21:56:17 +02:00
Aaron Andersen
efd518852d
Merge pull request #300090 from lytedev/300088
plausible: Do not run createdb.sh unless configured to setup the database
2024-05-04 18:41:49 +00:00
北雁 Cryolitia
04a7f3c371
nixos/xdg-terminal-exec: init module 2024-05-05 02:06:43 +08:00
Weijia Wang
9ed8582721
Merge pull request #308622 from jmbaur/jbaur/clatd-minor-cleanup
Minor cleanups for clatd module and release notes
2024-05-04 19:25:11 +02:00
Daniel Flanagan
8bb777ee37 plausible: Do not run createdb.sh unless configured to setup the database
Closes #300088
2024-05-04 10:28:21 -05:00
éclairevoyant
b43ad60e1a
Merge pull request #308966 from Guanran928/wastebin
nixos/wastebin: fix typo
2024-05-04 06:28:36 +00:00
Guanran Wang
c46effbdf0
nixos/wastebin: fix typo 2024-05-04 13:00:34 +08:00
éclairevoyant
23bde0b9e3
Revert "nixos/hyprland: Set environment variables for Hyprland to work better"
This reverts commit d18a587b78.
2024-05-03 22:38:57 -04:00
Pavol Rusnak
23f72abf0c
Merge pull request #308796 from 0xB10C/2024-05-promethues-bitcoin-exporter-expose-package
nixos/prometheus-bitcoin-exporter: expose package option
2024-05-03 23:09:17 +02:00
Leona Maroni
d9bdb87f7d
Merge pull request #307498 from SuperSandro2000/podman-storage-default
nixos/containers: move storage.settings default into config
2024-05-03 22:31:06 +02:00
éclairevoyant
512b6d9ad2
Merge pull request #308531 from sanxus/fix-extraConfig
nixos/networkmanager: fix incorrect documention about `extraConfig`
2024-05-03 18:08:44 +00:00
sanxus
6b7692c8f5
nixos/networkmanager: fix incorrect documention about extraConfig 2024-05-04 01:04:51 +08:00
Jonathan Davies
8e0e9bdee8 nixos/zfs: Added a randomizedDelaySec option to ZFS autoscrub/trim timers
Allows operators to space out these IO operations across a fleet of
machines, rather than have them all happen at the same time.
2024-05-03 15:01:53 +01:00
0xb10c
0c4215faf0
nixos/prometheus-bitcoin-exporter: expose package option 2024-05-03 15:23:36 +02:00
Jonathan Davies
5b671b7fc8 nixos/zfs: Default autoscrub interval to monthly 2024-05-03 13:41:51 +01:00
github-actions[bot]
ae736c738d
Merge master into staging-next 2024-05-03 12:01:32 +00:00
piegames
315db4f0f2 heisenbridge: Drop piegames from maintainers 2024-05-03 13:38:25 +02:00
piegames
3813ff1a48 conduit: Drop piegames from maintainers 2024-05-03 13:38:00 +02:00
Pol Dellaiera
c88c954f81
Merge pull request #308335 from bbigras/promtail
nixos/promtail: check-syntax in preStart
2024-05-03 13:28:09 +02:00
Yt
8328303ea8
Merge pull request #308500 from bobrippling/nixos-module-cleanup-ebusd
nixos/ebusd: clean up module
2024-05-03 11:13:37 +00:00
Rob Pilling
aa10bacb81 nixos/ebusd: clean up module 2024-05-03 08:34:17 +01:00
oxalica
def8d7e254
nixos/plasma6: add CAP_SYS_NICE for kwin_wayland
This makes kwin_wayland successfully gain SCHED_RR priority, which
significantly improves the rendering lag, ie. cursor movement and
desktop animations, under heavy CPU load like on compilation.
This was already enabled for plasma5 but is not for plasma6 somehow.
2024-05-03 02:27:44 -04:00
github-actions[bot]
3588aea450
Merge master into staging-next 2024-05-03 00:02:39 +00:00
michaelBelsanti
2c9c781478
espanos: add package option 2024-05-02 19:08:13 -04:00
Jan Tojnar
2a2796c2bc nixos/xserver: Remove with statements
They masked the evaluation error caused by removal of
`defaultSessionFromLegacyOptions` variable
in 6be2bfcc32
2024-05-02 23:20:02 +02:00
Jan Tojnar
8bf5752a3c nixos/xserver: Remove {desktop,window}Manager.default options
These have been deprecated since NixOS 20.03.

Also fixes evaluation error caused by moving
the `defaultSessionFromLegacyOptions` variable
in 6be2bfcc32
2024-05-02 23:20:02 +02:00
Jan Tojnar
5b2b3b8558 nixos/gnome: Remove global with expressions
The can potentially mask evaluation errors due to laziness of variable access within.
2024-05-02 23:17:40 +02:00
Jan Tojnar
f77c3bf760 nixos/gnome: Remove deprecated aliases 2024-05-02 23:17:40 +02:00
Jared Baur
09073330e0
nixos/clatd: remove invalid startLimitIntervalSec
The `startLimitIntervalSec` option is not valid under `serviceConfig`.
2024-05-02 14:16:12 -07:00
Christian Kampka
8814c364a3 nixos/top-level: Rename system.forbiddenDependenciesRegex to system.forbiddenDependenciesRegexes
and turn it in to a list.

The current setting of system.forbiddenDependenciesRegex is a string, meaning only one such regex as any additional setting would result in conflicts.

As maintainers have already started using this setting eg. in profiles, it would be good if this setting would accept a list of regex to allow the end
user to make use of it in addition to package maintainers.
2024-05-02 21:08:39 +03:00
github-actions[bot]
31135daf48
Merge master into staging-next 2024-05-02 18:01:05 +00:00
nicoo
1207b23cc2
Merge #305764: nixos/gitlab: Add a second database connection 2024-05-02 17:44:56 +00:00
Anomalocaridid
52ad64b548
nixos/grub: fix documentation for boot.loader.grub.theme (#305663)
Closes #233865. Currently, the documentation for `boot.loader.grub.theme` misleadingly implies that it needs a package for a grub theme instead of a path to a grub theme.
2024-05-02 17:43:24 +00:00
Robert Hensing
188ba247d5
nixos/podman: Create docker socket symlink via socket unit (#305803)
This ensures that both "sockets" are available after sockets.target.
See https://github.com/hercules-ci/arion/issues/238
2024-05-02 14:04:37 +00:00
nicoo
480b871f2d
Merge #305844: add clatd module and nixos test 2024-05-02 14:00:06 +00:00
Colin Sane
6034d354d7
nixos/trust-dns: fix invalid default for settings.zones option (#308513)
and fix a few documentation typos while here.
2024-05-02 12:34:04 +00:00
github-actions[bot]
c4dfa193ac
Merge master into staging-next 2024-05-02 12:01:36 +00:00
Sandro
4a2f53b67a
Merge pull request #280940 from e1mo/fix-parsedmarc-smtp-to 2024-05-02 11:16:27 +02:00
Janne Heß
9ee8e1eff0
Merge pull request #305386 from tbleiker/znapzend
znapzend: add --mailErrorSummaryTo
2024-05-02 10:46:03 +02:00
Sandro
2e9d7dca27
Merge pull request #302570 from evenbrenden/jottad-service 2024-05-02 10:25:30 +02:00
Sandro
bafcff9b15
Merge pull request #273233 from SuperSandro2000/oauth2-proxy
nixos/oauth2-proxy{,-nginx}: renamed from oauth2_proxy, also renamed the servi…
2024-05-02 09:48:01 +02:00
Vladimír Čunát
725f48a252
Merge branch 'master' into staging-next 2024-05-02 09:05:49 +02:00
Bruno Bigras
7666eadc69 nixos/promtail: check-syntax in preStart
Co-authored-by: Pol Dellaiera <pol.dellaiera@protonmail.com>
2024-05-01 21:18:28 -04:00
Yt
dcf85a267b
Merge pull request #298327 from bobrippling/feat/ebusd-log-none
nixos/ebusd: permit "none" as a log level
2024-05-01 21:53:40 +00:00
Pol Dellaiera
6ca53cb409
Merge pull request #308092 from Stunkymonkey/mailman-chmod-install
nixos/mailman: prefer 'install' over 'chmod/chown'
2024-05-01 23:04:29 +02:00
Birk
8b35a7cd18
nixos/logrotate: typo in option name fixed (#307788) 2024-05-01 22:45:45 +02:00
Maximilian Bosch
5ef467d6f5
nixos/nextcloud: add nextcloud-update-db.service, nextcloud-cron isn't oneshot
This service performs operations that significantly increase the
performance of Nextcloud, can take a while. These are designed however
to not require maintenance mode and can be executed during normal
operation[1].

Make nextcloud-cron a simple unit instead of oneshot: otherwise we risk
that it'll be stopped by the startup timeout (oneshot executes ExecStart
while "activating") which can be an issue for very long running tasks or
if Nextcloud needs to catch up if one task was broken for a while.

[1] https://docs.nextcloud.com/server/29/admin_manual/maintenance/upgrade.html#long-running-migration-steps
2024-05-01 20:09:37 +02:00
Sandro
a534c335e0
Merge pull request #307553 from SuperSandro2000/gst-plugins-good-nox
nixos/no-x-libs: disable more GUIs for gst_all_1.gst-plugins-good
2024-05-01 20:08:13 +02:00