Commit Graph

282006 Commits

Author SHA1 Message Date
arcnmx
c219dfc434 scream: 3.4 -> 3.6
Renamed from scream-receivers
2021-04-12 17:13:37 -07:00
Sandro
7ed23e37bd
Merge pull request #112956 from r-ryantm/auto-update/openvswitch
openvswitch: 2.14.1 -> 2.14.2
2021-04-10 17:24:22 +02:00
nixinator
3314db5a56
cdogs-sdl: init at 0.11.0 (#118949)
Co-authored-by: Jonathan Ringer <jonringer@users.noreply.github.com>
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2021-04-10 17:23:57 +02:00
Sandro
69e3e6d07c
Merge pull request #118485 from risicle/ris-openvswitch-lts-2.5.12
openvswitch-lts: 2.5.9 -> 2.5.12
2021-04-10 17:23:25 +02:00
Sandro
c5448a477a
Merge pull request #119041 from das-g/osm2pgsql
osm2pgsql: 1.4.1 -> 1.4.2
2021-04-10 17:20:32 +02:00
Sandro
b87413a1e6
Merge pull request #118933 from alyssais/snd
snd: 20.3 -> 21.1; broaden platforms; parallelize
2021-04-10 17:16:29 +02:00
Sandro
8eaa3b08c9
Merge pull request #119036 from totoroot/update/qownnotes-21.4.0
qownnotes: 21.3.2 -> 21.4.0
2021-04-10 17:12:32 +02:00
Sandro
38b7f6b9c2
Merge pull request #119022 from veprbl/pr/pythia_8_304
pythia: 8.303 -> 8.304
2021-04-10 17:09:22 +02:00
Mario Rodas
763b66fef5
Merge pull request #119013 from r-ryantm/auto-update/go-toml
go-toml: 1.8.1 -> 1.9.0
2021-04-10 10:03:14 -05:00
Sandro
aa05808456
Merge pull request #117677 from 06kellyjac/octant-desktop 2021-04-10 16:46:25 +02:00
Sandro
937e6da44e
Merge pull request #118984 from Tomahna/metals
metals: 0.10.0 -> 0.10.1
2021-04-10 16:32:15 +02:00
Sandro
4c99c73069
Merge pull request #118983 from r-ryantm/auto-update/dnsproxy
dnsproxy: 0.36.0 -> 0.37.0
2021-04-10 16:32:01 +02:00
Sandro
15435a234c
Merge pull request #118980 from r-ryantm/auto-update/dbmate
dbmate: 1.11.0 -> 1.12.0
2021-04-10 16:31:28 +02:00
Sandro
ed64b0ddf4
Merge pull request #118971 from r-ryantm/auto-update/clash
clash: 1.4.2 -> 1.5.0
2021-04-10 16:29:10 +02:00
Aaron Andersen
3036212d5a
Merge pull request #118952 from expipiplus1/patch-2
services.postgresql: Improve example clarity
2021-04-10 10:19:50 -04:00
Raphael Borun Das Gupta
2d42fde815 osm2pgsql: 1.4.1 -> 1.4.2 2021-04-10 16:16:22 +02:00
Matthias Thym
773cfbf027 qownnotes: 21.3.2 -> 21.4.0 2021-04-10 15:52:36 +02:00
Robert Schütz
827fb0a2a8
Merge pull request #118938 from erictapen/imagemagick-7.0.11-6
imagemagick7: 7.0.11-5 -> 7.0.11-6
2021-04-10 15:52:28 +02:00
sternenseemann
9c989f2fd9 spacecookie: add top-level attribute for haskellPackages.spacecookie
The haskellPackages.spacecookie derivation also includes a library and
thus a lot of propagated haskell dependencies. The top-level attribute
uses haskell.lib.justStaticExecutables and therefore only the
executable. This should reduce the runtime closure users have to
download considerably if they only want the server.
2021-04-10 15:44:19 +02:00
sternenseemann
d51edbe17e nixos/spacecookie: reflect changes for spacecookie 1.0.0.0
* New log options
* The old port option has been deprecated in favor of listen -> port

https://github.com/sternenseemann/spacecookie/blob/master/CHANGELOG.md#1000
2021-04-10 15:44:19 +02:00
sternenseemann
76583ee81a nixos/spacecookie: convert into settings-style freeform configuration
* Move `hostname` and `root` into a settings submodule with a freeform
  type, allowing users to also use options not known to the NixOS
  service. Compatibility with a warning for the renamed options is also
  trivial to achieve.
* `port` stays where it is as we don't actually use the `port` option of
  spacecookie to set up the socket, but only to inform spacecookie about
  the port we have set in the `systemd.socket` file, this makes more
  sense. Additionally the configuration of the listening port and
  address change in the next spacecookie release — we can dodge this
  issue altogether by doing our own thing, but I'm interested to hear
  opinions on this.
  To ensure that this is not misconfigured, we add an assertion for
  the port option.
* Add an assertion for `user` in settings which has no effect the way
  we are starting spacecookie as it wouldn't be able to call setuid.
  The message also explains how a specific user can be used with
  spacecookie if desired.
2021-04-10 15:44:19 +02:00
sternenseemann
b74821f31b nixos/spacecookie: add address option customizing listen address
This configuration option reflects a new feature from the unreleased
spacecookie version allowing to customize the address spacecookie will
listen on (e. g. "::1" to bind on link-local addresses only). We will
not use this feature in the future, since the configuration option of
spacecookie naturally only has an effect if we don't use socket
activation (and spacecookie sets up its own socket), but having the same
functionality in the service seems like a good idea.

We can luckily emulate this behavior with socket activation as well.
2021-04-10 15:44:19 +02:00
sternenseemann
d1f57cbaf0 nixos/spacecookie: add openFirewall option
Convenience shortcut which automatically configures the firewall to open
the port which is also configured for the spacecookie service.
2021-04-10 15:44:19 +02:00
sternenseemann
58be28d7ce nixos/spacecookie: add package option
This allows to change the derivation to use for the spacecookie server
binary. We probably should also use justStaticExecutables by default to
reduce the runtime closure of the service.
2021-04-10 15:44:19 +02:00
sternenseemann
8abd77c811 nixos/tests/spacecookie: refactor
* Use proper gopher urls
* The client vms name is also controlled in a single place now
* fileContent holds the precise file content now
* wait for the spacecookie unit instead of the port
  * avoids sending an empty request
  * since spacecookie is a notify service it only is fully started when
    the socket has been set up.
2021-04-10 15:44:19 +02:00
sternenseemann
6b577f46b4 nixos/spacecookie: use nix style strings for description 2021-04-10 15:44:19 +02:00
Fabian Affolter
b596339ee0
Merge pull request #119021 from r-ryantm/auto-update/httpx
httpx: 1.0.3 -> 1.0.4
2021-04-10 15:35:27 +02:00
Michael Weiss
4b9e672792
Merge pull request #119003 from primeos/chromium
chromium: Fix the build (libva redefinition)
2021-04-10 14:34:23 +02:00
Martin Weinelt
79fa31eff9
Merge pull request #119004 from mweinelt/home-assistant
home-assistant: 2021.4.2 -> 2021.4.3
2021-04-10 14:11:01 +02:00
Dmitry Kalinkin
9501203dc1
pythia: 8.303 -> 8.304 2021-04-10 08:05:43 -04:00
R. RyanTM
cca6c85231 httpx: 1.0.3 -> 1.0.4 2021-04-10 12:01:45 +00:00
Fabian Affolter
0ecaa4ccdd
Merge pull request #119002 from r-ryantm/auto-update/gitleaks
gitleaks: 7.3.0 -> 7.4.0
2021-04-10 13:50:59 +02:00
Fabian Affolter
cdf1b1eae6
Merge pull request #118982 from r-ryantm/auto-update/disfetch
disfetch: 1.21 -> 1.22
2021-04-10 13:40:44 +02:00
Fabian Affolter
ccea6bc417
Merge pull request #118999 from r-ryantm/auto-update/gdu
gdu: 4.9.1 -> 4.10.0
2021-04-10 13:37:47 +02:00
Fabian Affolter
b0f94ddcc5
Merge pull request #118986 from r-ryantm/auto-update/dnsx
dnsx: 1.0.1 -> 1.0.2
2021-04-10 13:37:18 +02:00
Aaron Andersen
d6918517a5
Merge pull request #118979 from LeSuisse/mediawiki-1.35.2
mediawiki: 1.35.1 -> 1.35.2
2021-04-10 07:33:37 -04:00
Dmitry Kalinkin
c32ba28e67
github-runner: fix eval (#119011) 2021-04-10 07:14:10 -04:00
R. RyanTM
79ea4d0e0f go-toml: 1.8.1 -> 1.9.0 2021-04-10 11:09:57 +00:00
Martin Weinelt
fe3ffe4beb home-assistant: 2021.4.2 -> 2021.4.3 2021-04-10 12:30:21 +02:00
Vincent Haupert
f4af2f267a
nixos/github-runner: init at v2.277.1 (#116775)
* github-runner: init at 2.277.1

* nixos/github-runner: initial version

* nixos/github-runner: add warning if tokenFile in Nix store

* github-runner: don't accept unexpected attrs

* github-runner: formatting nits

* github-runner: add pre and post hooks to checkPhase

* nixos/github-runner: update ExecStartPre= comment

* nixos/github-runner: adapt tokenFile option description

Also note that not only a change to the option value will trigger a
reconfiguration but also modifications to the file's content.

* nixos/github-runner: remove mkDefault for DynamicUser=

* nixos/github-runner: create a parent for systemd dirs

Adds a parent directory "github-runner/" to all of the systemd lifecycle
directories StateDirectory=, RuntimeDirectory= and LogDirectory=.

Doing this has two motivations:

1. Something like this would required if we want to support multiple
   runners configurations. Please note that this is already possible
   using NixOS containers.
2. Having an additional parent directory makes it easier to remap
   any of the directories. Without a parent, systemd is going to
   complain if, for example, the given StateDirectory= is a symlink.

* nixos/github-runner: use specifier to get abs runtime path

* nixos/github-runner: use hostname as default for option `name`

Until now, the runner registration did not set the `--name` argument if
the configuration option was `null`, the default for the option.
According to GitHub's documentation, this instructs the registration
script to use the machine's hostname.

This commit causes the registration to always pass the `--name` argument
to the runner configuration script. The option now defaults to
`networking.hostName` which should be always set on NixOS.

This change becomes necessary as the systemd service name includes the
name of the runner since fcfa809 and, hence, expects it to be set. Thus,
an unset `name` option leads to an error.

* nixos/github-runner: use types.str for `name` option

Forcing a `name` option to comply with a pattern which could also be
used as a hostname is probably not required by GitHub.

* nixos/github-runner: pass dir paths explicitly for ExecStartPre=

* nixos/github-runner: update variable and script naming

* nixos/github-runner: let systemd choose the user/group

User and group naming restrictions are a complex topic [1] that I don't
even want to touch. Let systemd figure out the username and group and
reference it in our scripts through the USER environment variable.

[1] https://systemd.io/USER_NAMES/

* Revert "nixos/github-runner: use types.str for `name` option"

The escaping applied to the subdirectory paths given to StateDirectory=,
RuntimeDirectory= and LogsDirectory= apparently doesn't use the same
strategy that is used to escape unit names (cf. systemd-escape(1)). This
makes it unreasonably hard to construct reliable paths which work for
StateDirectory=/RuntimeDirectory=/LogsDirectory= and ExecStartPre=.

Against this background, I decided to (re-)apply restrictions to the
name a user might give for the GitHub runner. The pattern for
`networking.hostName` seems like a reasonable choice, also as its value
is the default if the `name` option isn't set.

This reverts commit 193ac67ba3.

* nixos/github-runner: use types.path for `tokenFile` option

* nixos/github-runner: escape options used as shell arguments

* nixos/github-runner: wait for network-online.target

* github-runner: ignore additional online tests
2021-04-10 10:17:10 +00:00
Michael Weiss
227efbd318
chromium: Fix the build (libva redefinition)
The recent libva 2.11.0 update (780fa55) broke the chromium and
ungoogled-chromium builds. Fix #118931.
2021-04-10 12:06:42 +02:00
Martin Weinelt
cd6cc34d41 python3Packages.python-smarttub: 0.0.21 -> 0.0.23 2021-04-10 12:04:21 +02:00
R. RyanTM
7c4663c64a gitleaks: 7.3.0 -> 7.4.0 2021-04-10 10:03:23 +00:00
Martin Weinelt
977132fe59 python3Packages.devolo-home-control-api: 0.17.1 -> 0.17.3 2021-04-10 12:02:00 +02:00
Martin Weinelt
8cbaf51809
Merge pull request #118943 from mweinelt/home-assistant
home-assistant: 2021.4.1 -> 2021.4.2
2021-04-10 11:58:58 +02:00
R. RyanTM
4ff6c83f2d gdu: 4.9.1 -> 4.10.0 2021-04-10 09:46:02 +00:00
R. RyanTM
4a895869d1 dnsx: 1.0.1 -> 1.0.2 2021-04-10 08:08:59 +00:00
Kevin Rauscher
92f5917c43
metals: 0.10.0 -> 0.10.1 2021-04-10 10:07:11 +02:00
R. RyanTM
715186f4cd dnsproxy: 0.36.0 -> 0.37.0 2021-04-10 08:05:15 +00:00
R. RyanTM
775cb72c89 disfetch: 1.21 -> 1.22 2021-04-10 08:01:28 +00:00