Commit Graph

43465 Commits

Author SHA1 Message Date
Yury Shvedov
183a78cb56 nixos/gitwatch: add module
Create module for gitwatch script. This module runs systemd services.
You are able to have several services for different paths at once.

Change-Id: If6100e883dd12a428f79881a80b9b88e683f6db9
2024-08-27 07:35:47 +00:00
Emery Hemingway
f5b732e9bf nixos/eris-server: update comment 2024-08-27 05:00:44 +00:00
Emily
1162c1ed62
{tvheadend,antennas}: drop (#336395) 2024-08-27 02:47:56 +01:00
Philip Taron
b7f194b939
nixos/hardware.pulseaudio: remove with lib; (#337088) 2024-08-26 15:01:54 -07:00
Felix Buehler
18485b25ad nixos/hardware.pulseaudio: remove with lib; 2024-08-26 21:28:10 +02:00
Martin Weinelt
cf696ce6a5
home-assistant-custom-components.waste_collection_schedule: 2.0.1 -> 2.1.0 (#337375) 2024-08-26 21:22:02 +02:00
TheRealGramdalf
f298639e45 nixos/kanidm: fix systemd service type 2024-08-26 18:16:10 +00:00
TheRealGramdalf
5a1e877394 nixos/kanidm: fix systemd service type 2024-08-26 18:05:32 +00:00
TheRealGramdalf
8f18393d38 nixos/kanidm: inherit lib, nixfmt 2024-08-26 18:01:58 +00:00
Robert Schütz
75ad0af1b6 nixos/home-assistant: set WorkingDirectory 2024-08-26 09:39:06 -07:00
Masum Reza
a8e2b007c5
nixos/autoUpgrade: add --refresh when using flakes (#337436) 2024-08-26 20:16:03 +05:30
Franz Pletz
0b50871403
nixos/gamescope: expose gamescopectl (#337449) 2024-08-26 16:26:46 +02:00
Bobby Rong
28d45487fa
metacity, gnome-notes: Fixups for #333917 (#337452) 2024-08-26 19:59:38 +08:00
Bobby Rong
32eeaa5013
nixos/gnome: Fix eval for gnome-flashback
error: Default graphical session, 'gnome-flashback-metacity', not found.

Fixes f192bd9e5c.
2024-08-26 19:45:12 +08:00
PedroHLC
61dfef9a3d
nixos/gamescope: expose gamescopectl 2024-08-26 08:32:36 -03:00
Masum Reza
b8024284d1
Merge pull request #335625 from JohnRTitor/uwsm-module
nixos/uwsm: init
2024-08-26 15:58:29 +05:30
Jörg Thalheim
f40cd1bfe0 nixos/autoUpgrade: add --refresh when using flakes
otherwise the cache might delay updates quite a bit
2024-08-26 12:02:38 +02:00
Sandro
6b4d280cf5
Merge pull request #336797 from SuperSandro2000/paperless-ngx 2024-08-26 11:47:01 +02:00
7c6f434c
8487207876
Merge pull request #337094 from OPNA2608/init/lomiri/lomiri-docviewer-app
lomiri.lomiri-docviewer-app: init at 3.0.4
2024-08-26 05:40:34 +00:00
DCsunset
b94de95f9d nixos/stirling-pdf: make calibre dependency optional based on config 2024-08-26 01:47:17 +00:00
Martin Weinelt
4da8cc80f1
Merge pull request #337319 from emilazy/push-tuksqzuumnzo
nixos/go2rtc: unpin FFmpeg 6
2024-08-26 02:45:50 +02:00
tomberek
7f7df390e6
Merge pull request #335672 from tomberek/tomberek.nixos_test
nixosTest.nix-upgrade: init
2024-08-25 17:48:39 -04:00
ettom
549912e6ff nixos/snapserver: add nss-lookup.target dependency 2024-08-25 23:46:52 +02:00
Nick Cao
2a7a22122f
Merge pull request #337289 from Kiskae/nvidia/fixes_2024_08_25
nixos/nvidia: various fixes
2024-08-25 17:36:24 -04:00
Sandro
68d0798164
Merge pull request #334901 from jpds/kafka-3.8.0
apacheKafka: init 3.8.0
2024-08-25 23:30:47 +02:00
Kiskae
ef3b6ad33d nixos/nvidia: allow the gsp to be toggled independently from open source driver
fixes #323886
2024-08-25 21:51:17 +02:00
Kiskae
20c5d0adfb nixos/nvidia: make the nvidia driver variant a mandatory user choice
fixes #329450
2024-08-25 21:47:29 +02:00
Sandro Jäckel
bb69775568
paperless-ngx: drop inactive maintainers, add myself to maintainers 2024-08-25 21:39:54 +02:00
Emily
fbb4515fdf nixos/go2rtc: unpin FFmpeg 6
The release we package supports FFmpeg 7; see
<https://github.com/AlexxIT/go2rtc/blob/v1.9.4/pkg/ffmpeg/ffmpeg.go#L15>.
2024-08-25 20:29:08 +01:00
Masum Reza
8da188f8e7
Merge pull request #306650 from returntoreality/indi-3rdparty-refactor
indi-full: Indi 3rdparty refactor
2024-08-25 23:09:21 +05:30
abysssol
503245dd07
Merge pull request #334903 from abysssol/ollama-load-models-service
nixos/ollama: move `loadModels` script into a separate service
2024-08-25 15:56:00 +00:00
Franz Pletz
0a490d78b1
Merge pull request #336599 from bjornfor/nixos-ups-use-enum-for-upsmon-option 2024-08-25 15:49:46 +02:00
Maciej Krüger
00f536f650
Merge pull request #310857 from rnhmjoj/pr-firewall
nixos/firewall: fix reverse path check failures with IPsec
2024-08-25 15:06:49 +02:00
Robert Hensing
727351517e
Merge pull request #335660 from Gabriella439/gabriella/containers_nixpkgs.pkgs
containers.*.config.nixpkgs: use `host.pkgs.stdenv.hostPlatform`
2024-08-25 14:40:31 +02:00
Vili Sinervä
13f07436d4 nixos/libinput: Change new options to more appropriate data types
Change the options to be numbers or lists of numbers instead of strings
like the pre-existing options.
2024-08-25 13:45:14 +02:00
Vili Sinervä
891202ef1f nixos/libinput: Clarify that accelSpeed does not apply to custom profile
Add note to the description of the accelSpeed option to make it clear
that is only applies when flat or adaptive profile is in use.
2024-08-25 13:45:14 +02:00
Vili Sinervä
3aa3236289 nixos/libinput: Add options for defining a custom acceleration functions
Without these options the custom acceleration functions would have to be
defined with the additionalOptions option.
2024-08-25 13:45:14 +02:00
Vili Sinervä
34302b2424 nixos/libinput: Allow 'custom' acceleration profile
This is an option that works with the NixOS module as-is, but is
being blocked from use by the allowed enum values.
2024-08-25 13:45:14 +02:00
Jörg Thalheim
82ac9a1580
Merge pull request #337054 from Mic92/sysusers
sysuser: slightly better assertions message
2024-08-25 09:44:58 +02:00
Bobby Rong
dc23466adb
Merge pull request #336934 from bobby285271/upd/pantheon
Pantheon updates 2024-08-24 (switchboard 8.0.0)
2024-08-25 11:34:02 +08:00
Franz Pletz
9446a5d8da
Merge pull request #337003 from alyssais/no-tell-kernel 2024-08-25 02:07:33 +02:00
Franz Pletz
83cd05ff59
Merge pull request #335976 from poscat0x04/nixos-networkd-ipv6ra 2024-08-25 01:51:36 +02:00
Franz Pletz
a266f38ade
Merge pull request #336584 from mweinelt/engelsystem-cache-migration 2024-08-25 01:50:39 +02:00
Franz Pletz
76d7ccecdf
Merge pull request #313105 from bb2020/xserver 2024-08-25 01:47:27 +02:00
Franz Pletz
39c0d9f53d
Merge pull request #336896 from tomodachi94/enhance/nixos/clamav/systemd-slices 2024-08-25 01:45:27 +02:00
Franz Pletz
35b2bfb7ed
Merge pull request #335967 from CajuM/waydroid-svc-stop 2024-08-25 01:40:42 +02:00
Franz Pletz
3969d739d8
Merge pull request #336995 from Ma27/gitea-drop-pam 2024-08-25 01:25:13 +02:00
Franz Pletz
89b019abe9
Merge pull request #337083 from zimward/doc-ssh 2024-08-25 01:15:35 +02:00
OPNA2608
1758314043 nixos/lomiri: Add docviewer app 2024-08-24 23:27:52 +02:00
OPNA2608
531655d3bf tests/lomiri-docviewer-app: init 2024-08-24 23:27:52 +02:00
Felix Buehler
0c91ea6ec1 nixos/services.mailman: remove with lib; 2024-08-24 23:20:06 +02:00
zimward
81a9bf5861
doc: remove mention of key type 2024-08-24 21:59:22 +02:00
Jared Baur
05aefd6f05
nixos/systemd-boot: remove semicolon 2024-08-24 12:50:26 -07:00
Jared Baur
6327b07b25
nixos/systemd-boot: use unique path for devicetree blob
Use the store directory for the devicetree package containing the
desired DTB when installing to the ESP. This allows for more than one
NixOS generation containing differing DTBs to coexist on the same ESP
(similar to how we can have multiple kernels & initrds). This change
removes the assumption that the filepath passed to `copy_from_file` is a
file that lives at the toplevel of a nix output path (which prior to the
systemd-boot DTB support was the case for the kernel and initrd
derivations).
2024-08-24 12:50:24 -07:00
Jörg Thalheim
7211a81060 sysuser: slightly better assertions message 2024-08-24 19:20:28 +02:00
Mihai-Drosi Câju
05313fc5b3 nixos/waydroid: Update service definition according to upstream
* Upstream switched the service's Type to dbus in 1.4.0
* Enable D-Bus activation
* Fixes #334687
2024-08-24 19:48:20 +03:00
Bobby Rong
8e75a28e4e
nixos/pantheon: Increase memorySize
https://logs.ofborg.org/?key=nixos/nixpkgs.336934&attempt_id=24f89861-72eb-417f-94bf-93cea578a1f1
2024-08-24 22:34:55 +08:00
Adam C. Stephens
bd29cb4b30
Merge pull request #336836 from oddlama/feat-update-kanidm-provision
kanidm-provision: 1.1.1 -> 1.1.2
2024-08-24 08:58:35 -04:00
Alyssa Ross
148261d04b
sd-image: optimise sfdisk call for image building
When building an image, rather than operating on a real partition,
there's no need to have sfdisk tell the kernel to reread the partition
table.  This also avoids a call to sync(2), which could be very
expensive depending on what other IO is going on on the system at the time.
2024-08-24 14:36:07 +02:00
Maximilian Bosch
b39569222b
gitea: drop PAM support
Strongly inspired by the forgejo counterpart[1], for the following
reasons:

* The feature is broken with the current module and crashes on
  authentication with the following stacktrace (with a PAM service
  `gitea` added):

      server # Stack trace of thread 1008:
      server # #0  0x00007f3116917dfb __nptl_setxid (libc.so.6 + 0x8ddfb)
      server # #1  0x00007f3116980ae6 setuid (libc.so.6 + 0xf6ae6)
      server # #2  0x00007f30cc80f420 _unix_run_helper_binary (pam_unix.so + 0x5420)
      server # #3  0x00007f30cc8108c9 _unix_verify_password (pam_unix.so + 0x68c9)
      server # #4  0x00007f30cc80e1b5 pam_sm_authenticate (pam_unix.so + 0x41b5)
      server # #5  0x00007f3116a84e5b _pam_dispatch (libpam.so.0 + 0x3e5b)
      server # #6  0x00007f3116a846a3 pam_authenticate (libpam.so.0 + 0x36a3)
      server # #7  0x00000000029b1e7a n/a (.gitea-wrapped + 0x25b1e7a)
      server # #8  0x000000000047c7e4 n/a (.gitea-wrapped + 0x7c7e4)
      server # ELF object binary architecture: AMD x86-64
      server #
      server # [   42.420827] gitea[897]: pam_unix(gitea:auth): unix_chkpwd abnormal exit: 159
      server # [   42.423142] gitea[897]: pam_unix(gitea:auth): authentication failure; logname= uid=998 euid=998 tty= ruser= rhost=  user=snenskek

  It only worked after turning off multiple sandbox settings and adding
  `shadow` as supplementary group to `gitea.service`.

  I'm not willing to maintain additional multiple sandbox settings for
  different features, especially given that it was probably not used for
  quite a long time:

  * There was no PR or bugreport about sandboxing issues related to
    PAM.

  * Ever since the module exists, it used the user `gitea`, i.e. it had
    never read-access to `/etc/shadow`.

* Upstream has it disabled by default[2].

If somebody really needs it, it can still be brought back by an overlay
updating `tags` accordingly and modifying the systemd service config.

[1] 07641a91c9
[2] https://docs.gitea.com/usage/authentication#pam-pluggable-authentication-module
2024-08-24 13:40:58 +02:00
Cosima Neidahl
eb76459e90
Merge pull request #334952 from OPNA2608/fix/ayatana-lomiri-indicator-marking
nixos/ayatana-indicators: Split ayatana and lomiri indicators
2024-08-24 11:12:00 +02:00
Bobby Rong
b3784b8153
treewide: Fix switchboard executable name 2024-08-24 14:31:20 +08:00
Bobby Rong
96b1f3bd99
Merge pull request #336790 from bobby285271/upd/pantheon
Pantheon updates 2024-08-23
2024-08-24 11:52:42 +08:00
Gabriella Gonzalez
0b6fa5ee40
virtualisation.oci-containers: Add new imageStream option (#335430)
This adds a new `imageStream` option that can be used in conjunction
with `pkgs.dockerTools.streamLayeredImage` so that the image archive
never needs to be materialized in the `/nix/store`.  This greatly
improves the disk utilization for systems that use container images
built using Nix because they only need to store image layers instead of
the full image.  Additionally, when deploying the new system and only
new layers need to be built/copied.
2024-08-24 04:38:27 +02:00
Tomodachi94
695b1c874d
nixos/clamav: add system-clamav.slice
Tracking: https://github.com/NixOS/nixpkgs/issues/279915
2024-08-23 17:09:11 -07:00
Jan Tojnar
b8f3c78021
Merge pull request #333917 from jtojnar/gnome-top-level
gnome: Move more packages to top-level
2024-08-24 01:43:31 +02:00
Peder Bergebakken Sundt
d38f701636
Merge pull request #334559 from litchipi/ifm_fixup
ifm-web: init at 4.0.2
2024-08-24 01:07:30 +02:00
laalsaas
9e5316a1c5 nixos/varnish: change default stateDir to /run
The stateDir, or as varnish calls it, the workdir should always be a
tmpfs. Otherwise, performance issues may occur. See:

- https://varnish-cache.org/docs/trunk/reference/varnishd.html#opt-n

- https://github.com/varnishcache/varnish-cache/issues/4121
2024-08-23 21:45:43 +02:00
Donovan Glover
d3353b074b
Merge pull request #336286 from oluceps/update-dae
dae: 0.7.0 -> 0.7.1
2024-08-23 19:35:53 +00:00
oddlama
aa6cbcbf09
nixos/kanidm: run nixfmt-rfc-style 2024-08-23 20:55:03 +02:00
oddlama
391d05ce95
nixos/kanidm: update provisioning to allow multiple origin urls 2024-08-23 20:46:53 +02:00
Bobby Rong
dfc226bfb1
nixos/pantheon: Enable switcheroo support
317ae5e482
2024-08-23 22:10:26 +08:00
Bobby Rong
43f8c88e9c
nixos/pantheon: Ship elementary-bluetooth-daemon by default
This is extracted from wingpanel-indicator-bluetooth.
2024-08-23 21:34:44 +08:00
Florian Klink
25f5471de6
Merge pull request #333205 from flokli/buildkite-agent-3.77.0
buildkite-agent: 3.76.2 -> 3.77.0
2024-08-23 14:04:52 +03:00
Sarah Brofeldt
f372ec38b1
Merge pull request #334417 from r-ryantm/auto-update/kubernetes
kubernetes: 1.30.2 -> 1.31.0
2024-08-23 12:24:08 +02:00
Jörg Thalheim
33b5aab88f nixosTest.nix-upgrade: try to garbage collect with old nix 2024-08-23 11:06:48 +02:00
Jörg Thalheim
d01abc5602 nixosTest.nix-upgrade: actually use nix-daemon for build
root by-passes nix-daemon
2024-08-23 11:06:48 +02:00
Tom Bereknyei
c4dffb6513 nixosTest.nix-upgrade: init
Test out both nix upgrade-nix and a NixOS upgrade.

Inject a fake fallback-paths.nix assuming a stable -> latest upgrade.

The NixOS upgrade does not use nixos-rebuild switch due to the
cost+annoyance of the instantiation needing
system.includeBuildDependencies.
2024-08-23 11:06:47 +02:00
Bjørn Forsman
1edbc4fa0d nixos/ups: change upsmon option type from str to enum
According to `man upsd.users`, the option is 'either set to "primary" or
"secondary"'.
2024-08-22 21:25:47 +02:00
Someone Serge
f72b7b56fb tests/nvidia-container-toolkit: mv shared config to defaults 2024-08-22 17:51:54 +00:00
Martin Weinelt
760b2b5562
nixos/engelsystem: refactor option setup 2024-08-22 19:50:17 +02:00
Someone Serge
d970b4d6cd tests/nvidia-container-toolkit: hardware.opengl -> graphics 2024-08-22 17:37:26 +00:00
Someone Serge
0780a3ebc8 tests/nvidia-container-toolkit: strip {no,one}-nvidia prefix as obvious from the context 2024-08-22 17:34:48 +00:00
Someone Serge
1e571aeab4 tests/nvidia-container-toolkit: less nesting 2024-08-22 17:25:49 +00:00
Martin Weinelt
fe0d323af5
nixos/engelsystem: prune template cache on version changes
After upgrading to 3.5.0 we noticed, that registering would redirect to
the login page and not work at all. At the same time the admin user was
unable to access its user settings.

This issue could be tracked back to the template cache, that must be
invalidated between release upgrades.
2024-08-22 19:16:28 +02:00
Someone Serge
1b7f2fe883 tests/nvidia-container-toolkit: more getExe 2024-08-22 17:09:56 +00:00
Someone
2d7db58c2f
Merge pull request #313225 from ereslibre/nvidia-consistent-casing
docs: fix Nvidia casing to be consistent across different places
2024-08-22 16:51:41 +00:00
Martin Weinelt
d9cf6ea6f8
Merge pull request #336445 from adamcstephens/kanidm/1.3.3
kanidm: 1.3.2 -> 1.3.3
2024-08-22 18:41:30 +02:00
Someone
4c930c0635
Merge pull request #331071 from ereslibre/fix-nvidia-container-toolkit-docker-contamination
Fix nvidia container toolkit docker contamination
2024-08-22 16:40:06 +00:00
Adam Stephens
b93f6e4acd
nixos/tests/kanidm: bind certs path to fix ofborg tests
provision # [    8.223448] (kanidmd)[819]: kanidm.service: Failed to set up mount namespacing: /ofborg/checkout/repo/38dca4e3aa6bca43ea96d2fcc04e8229/builder/ofborg-evaluator-1/nixos/tests/common/acme/server:
No such file or directory
2024-08-22 10:59:48 -04:00
Emily
a565cfeac3 antennas: drop 2024-08-22 15:51:27 +01:00
Emily
6fa5767e07 tvheadend: drop
Closes: #332259
2024-08-22 15:51:27 +01:00
Christina Sørensen
31321be124
kubernetes: 1.30.2 -> 1.31.0
Updates feature gate tests to feature gates introduces in 1.31, assuming
they'll be around for a while.
2024-08-22 16:26:38 +02:00
Emily
01a749e0bf
Merge pull request #336077 from emilazy/push-yoykzrxwpykp
pict-rs_0_3: drop
2024-08-22 14:58:04 +01:00
Sandro
180f9e2195
Merge pull request #334629 from OPNA2608/init/lomiri/lomiri-gallery-app 2024-08-22 15:44:21 +02:00
Sandro
18fb834638
Merge pull request #322730 from bbenno/update-wp-httpd-htaccess 2024-08-22 14:33:17 +02:00
Alexander Linder
06855f1cd8
nixos/mautrix-whatsapp: automatic appservice registration option, pull login_shared_secret_map setting from env file (#311681)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-08-22 14:14:51 +02:00
nikstur
e7b7271ffc
Merge pull request #336513 from nikstur/etc-overlay-fixes
etc.overlay fixes
2024-08-22 13:57:04 +02:00
nikstur
7845b89e24 nixos/etc: unmount old /etc hierarchy lazily
This should fix errors where /etc is reported to be busy and thus cannot
be unmounted.

Another solution we can consider if this doesn't work out as we expect
is to forcefully unmount /etc.
2024-08-22 12:17:20 +02:00
nikstur
d820fe987e nixos/etc: wantedBy -> requiredBy for mounting overlay etc
I've observed that sometimes the overlay mount unit does not get started
when using wantedBy. requiredBy makes this relationship stricter and if
necessary will restart the initrd-fs.target and thus ensure that when
this target is reached /etc has alredy been mounted. This is in line
with the description of initrd-fs.target in systemd.special:

> Thus, once this target is reached the /sysroot/ hierarchy is fully set up
2024-08-22 12:12:18 +02:00
Sandro
a45dc99ba3
Merge pull request #287565 from RatCornu/pingvin-share 2024-08-22 11:59:03 +02:00
nikstur
483c13b835
Merge pull request #335929 from jmbaur/erofs-utils-1.8
Re-upgrade erofs-utils to 1.8
2024-08-22 11:52:25 +02:00
nikstur
0b6c394f3a
Merge pull request #328513 from isabelroses/docs/perlless
nixos/perlless: correct documented warning
2024-08-22 11:50:08 +02:00
Sandro
b6890ecb57
Merge pull request #334549 from Yarny0/foomatic-db-update 2024-08-22 11:46:35 +02:00
oluceps
6c22d08406
nixos/test/dae: disable waiting network 2024-08-22 17:09:31 +08:00
Sandro
11b26f016e
Merge pull request #336141 from emilazy/push-uztymzmukyyk
opencv{2,3}: drop
2024-08-22 09:14:40 +02:00
José Romildo Malaquias
56b912ba3f
Merge pull request #336161 from ghpzin/nixosTests.enlightenment/mark-broken
nixos/tests/enlightenment: mark broken
2024-08-21 22:28:08 -03:00
Emily
afdee7e458 pict-rs_0_3: drop
This was broken by the Rust 1.80 upgrade, and is an old version that
we’d have to patch to keep working.

We have already done the 0.4 → 0.5 update without keeping around
the old version or adding in any additional `stateVersion` logic
in <https://github.com/NixOS/nixpkgs/pull/280221>. As a result,
migration for 0.3 users is going to be a little awkward. I’ve done
my best to provide comprehensive instructions for anyone who hasn’t
already bumped to 0.4.

It is probably a footgun to add `stateVersion` logic for any
package that makes backwards‐incompatible schema changes and only
supports migration from the immediately previous version. Users
won’t get migrated by default and we have to either package and
maintain an endlessly growing list of old versions or add complicated
instructions like this. It’s not really practical for us to support
a significantly better migration story than upstream does.
2024-08-22 01:54:09 +01:00
Philip Taron
c849780855
Merge pull request #336404 from Stunkymonkey/security-pam-remove-with-lib 2024-08-21 17:01:28 -07:00
Felix Buehler
e32ec19edf nixos/security.pam: remove with lib; 2024-08-22 00:19:00 +02:00
Emily
1a35d0ccb5 nixos/pict-rs: fix environment variable name
Thanks to @marius851000 for reporting this issue. I assume it probably
changed in 0.5 or something.
2024-08-21 23:09:55 +01:00
Yt
133fb94cd4
Merge pull request #328976 from marius851000/fix_lemmy_ui
lemmy-ui: fix execution
2024-08-21 21:52:11 +00:00
marius david
8f73423ca0 tests/lemmy: Fix Lemmy’s test 2024-08-21 22:13:35 +02:00
Felix Stupp
4b998d179f
nixos/systemd.network: add support for UseDomains= in [Network] sections
Those options were also added with systemd 256, but sadly were missed out in #307068.

These options are documented in:
- [systemd 256 changelog](https://github.com/systemd/systemd/releases/tag/v256) (search for `UseDomains=`)
- [networkd.conf(5)](https://www.freedesktop.org/software/systemd/man/256/networkd.conf.html#UseDomains=)
- [systemd.network(5)](https://www.freedesktop.org/software/systemd/man/256/systemd.network.html#UseDomains=)
2024-08-21 19:48:29 +00:00
isabel
750663add9
nixos/perlless: correct documented warning 2024-08-21 20:11:48 +01:00
OPNA2608
1b4795b3e2 tests/lomiri: Optimise further
- Split desktop into desktop-basics (basic keybind & app launching) and
  desktop-appinteractions (one applications triggering something in another) due to timeouts
- Wrap machine.wait_for_text to wait 10 seconds before starting

The 10 second delay improves runtime dramatically on weaker hardware. In desktop-ayatana-indicators
on my aarch64 laptop, runtime was cut down by 818,41 seconds (~ 14 minutes).
Hopefully helps abit with timeout issues on ARM :(
2024-08-21 21:09:49 +02:00
s1341
5c1ed3ad5a kasmweb: 1.12.0 -> 1.15.0 2024-08-21 15:06:02 +03:00
John Titor
93343775bd
nixos/uwsm: init
[UWSM](https://github.com/Vladimir-csp/uwsm) is a session manager that wraps a wayland
window compositor with useful systemd units like `graphical-session-pre.target`,
`graphical-session.target`, `xdg-desktop-autostart.target`.

This is useful for Wayland Compositors that do not start
these units on these own.

Example for Hyprland:
```nix
programs.hyprland.enable = true;
programs.uwsm.enable = true;
programs.uwsm.waylandCompositors = {
  hyprland = {
    compositorPrettyName = "Hyprland";
    compositorComment = "Hyprland compositor managed by UWSM";
    compositorBinPath = "/run/current-system/sw/bin/Hyprland";
  };
};
```

Co-authored-by: Kai Norman Clasen <k.clasen@protonmail.com>
2024-08-21 16:09:54 +05:30
r-vdp
6cac9e409c
wstunnel: reformat with nixfmt 2024-08-21 10:46:04 +02:00
poscat
712e039585
nixos/networkd: add IPv6SendRA options added in systemd 255 2024-08-21 15:59:33 +08:00
Jörg Thalheim
c43e67f69b
Merge pull request #335344 from Mic92/harmonia
nixos/harmonia: switch to non-deprecated SIGN_KEY_PATHS
2024-08-21 07:01:22 +02:00
Peder Bergebakken Sundt
d6da32fe45
Merge pull request #316208 from Sigmanificient/qtile-nixosvm-tests-add-extra-packages
nixos/tests/qtile: test extraPackages and qtile-extras
2024-08-20 23:02:22 +02:00
ghpzin
11a05813b6
nixos/tests/enlightenment: mark broken 2024-08-20 23:43:31 +03:00
Bjørn Forsman
dc7379e04f nixos/ups: restart upsdrv.service on config changes
Or else new configuration won't take effect until the next boot (or if
the user manually restarts the service).
2024-08-20 22:08:01 +02:00
Emily
87c5a230ec opencv{2,3}: drop 2024-08-20 20:16:13 +01:00
Emily
25bdc22ac8
Merge pull request #334495 from Sigmanificient/liboop
{liboop,lsh}: drop
2024-08-20 19:02:29 +01:00
damhiya
5a3fe0fa46 coqPackages.MenhirLib: init at 20240715 2024-08-20 14:58:36 +02:00
Sigmanificient
e959525e15 lsh: drop 2024-08-20 12:02:12 +02:00
Litchi Pi
ef03964b92 ifm-web: init at 4.0.2
Signed-off-by: Litchi Pi <litchi.pi@proton.me>
2024-08-20 10:42:02 +02:00
Sigmanificient
78b1309ad4 nixos/tests/qtile: test extraPackages and qtile-extras 2024-08-20 02:27:03 +02:00
Jared Baur
cd998f9de9
nixos/qemu-vm: suppress mkfs.erofs output
The mkfs.erofs utility has a lot of output by default that slows down
running tests. We don't need to capture any of the output from
mkfs.erofs, so we can suppress it.
2024-08-19 14:55:55 -07:00
Kerstin
f0ceb9f402
Merge pull request #335768 from erictapen/mastodon
nixos/mastodon: remove pin for postgresql version
2024-08-19 23:11:53 +02:00
Rafael Fernández López
d665ca4fb2 nvidia-container-toolkit: add initial set of tests to check closures 2024-08-19 19:40:28 +02:00
Rafael Fernández López
2b883410d4 nvidia-container-toolkit: only mount existing paths in the host 2024-08-19 19:34:34 +02:00
isabel
f3c2be2a80
nixos/wakapi: init module 2024-08-19 17:16:01 +01:00
Pol Dellaiera
8d18fe9184
Merge pull request #335151 from drupol/nixos/chromadb/init
nixos/chromadb: init
2024-08-19 17:29:57 +02:00
nicoo
2a5454490e
nixosTests.systemd-boot.memtest86: only run when memtest86plus is available (#335825)
The blocks the `nixos-unstable` channel due to an [evaluation error] for `aarch64-linux`.

[evaluation error]: https://gist.github.com/nbraud/8820dda48156922f998bba987eb229c6
2024-08-19 14:51:18 +00:00
Kerstin Humm
f5bb4b807c weblate: 5.6.2 -> 5.7
Changelog: https://github.com/WeblateOrg/weblate/releases/tag/weblate-5.7

Also had to rework django-compressor settings and aligned them more
closely with the official docs:
https://cheat.readthedocs.io/en/latest/django/compressor.html
2024-08-19 16:10:40 +02:00
Florian Klink
cce9aef6fd
Merge pull request #334337 from eduarrrd/eaccess-null
nixos/systemd/initrd: Fix emergencyAccess to work with `null`.
2024-08-19 14:44:25 +03:00
nikstur
0a810476ad
Merge pull request #307528 from WilliButz/systemd-initrd/tmpfiles-settings
nixos/systemd-tmpfiles: add initrd support
2024-08-19 11:54:42 +02:00
Kerstin Humm
1592790b03
nixos/mastodon: use correct postgresql package 2024-08-19 11:06:57 +02:00
Kerstin Humm
14fbed4b70
nixos/mastodon: don't pin postgresql version for test 2024-08-19 11:06:57 +02:00
schnusch
d8c7f81279 nixos/cgit: test list settings type 2024-08-19 08:13:49 +02:00
euxane
1768115589 nixos/cgit: handle list setting type
The cgitrc file allows list of values to be set for some keys as
multiple definition lines.

This allows setting multiple "css" files to include or multiple
"readme" branch and file lookup paths to be set.
2024-08-19 08:13:49 +02:00
Will Fancher
f84991dc2b
Merge pull request #334288 from ElvishJerricco/systemd-initrd-fully-merge-sbin
Systemd initrd fully merge sbin
2024-08-18 22:41:53 -04:00
Gabriella Gonzalez
79e5dbb262 Restore check for container not defining nixpkgs.hostPlatform option 2024-08-18 17:00:16 -07:00
Gabriella Gonzalez
0600255046 Use host.pkgs.stdenv.hostPlatform 2024-08-18 16:49:57 -07:00
Gabriella Gonzalez
de83fcb2df containers.*.config: reuse host nixpkgs.pkgs if defined
The minimum reproduction for the problem I'm trying to solve is that
the following NixOS test with a trivial NixOS container:

```
{ inputs = {
    nixpkgs.url = "github:NixOS/nixpkgs/24.05";

    flake-utils.url = "github:numtide/flake-utils/v1.0.0";
  };

  outputs = { flake-utils, nixpkgs, self, ... }:
    flake-utils.lib.eachDefaultSystem (system: {
      checks.default = nixpkgs.legacyPackages."${system}".nixosTest {
        name = "test";

        nodes.machine.containers.tutorial.config = { };

        testScript = "";
      };
    });
}
```

… fails with the following error message:

```
error: Neither nodes.machine.nixpkgs.hostPlatform nor the legacy option nodes.machine.nixpkgs.system has been set.
You can set nodes.machine.nixpkgs.hostPlatform in hardware-configuration.nix by re-running
a recent version of nixos-generate-config.
The option nodes.machine.nixpkgs.system is still fully supported for NixOS 22.05 interoperability,
but will be deprecated in the future, so we recommend to set nodes.machine.nixpkgs.hostPlatform.
```

The root of the problem appears to be that in
`nixos/modules/virtualisation/nixos-containers.nix` there is support
for deriving the guest's `nixpkgs.hostPlatform` or
`nixpkgs.localSystem` from the corresponding host's values, but this
doesn't work if the host sets `nixpkgs.pkgs` instead of one of those
values.  In fact, this is what happens when using `pkgs.nixosTest`
(which sets `nixpkgs.pkgs` in
`pkgs/build-support/testers/default.nix`).

The solution I went with was to forward the `nixpkgs.pkgs` setting from
the host to the guest, but only if it is defined (matching the same
treatment as `nixpkgs.hostPlatform` and `nixpkgs.localSystem`.
2024-08-18 11:32:46 -07:00
Sandro
69701a3807
Merge pull request #320060 from PatrickDaG/homebox
homebox: init at 0.13.0; nixos/homebox: init
2024-08-18 16:32:43 +02:00
Sandro
c67dbda54f
Merge pull request #308700 from tie/pgbouncer-settings
nixos/pgbouncer: add services.pgbouncer.settings option
2024-08-18 16:30:17 +02:00
Masum Reza
94c30e543d
Merge pull request #335115 from SuperSandro2000/graphical-desktop
nixos/graphical-desktop: add enable option, nixos/wayland-session: use graphical-desktop option and remove implicit defaults
2024-08-18 17:20:55 +05:30
Masum Reza
3f08237ceb
Merge pull request #296607 from Yusuf-Duran/add-iio-hyprland
iio-hyprland: init at 0-unstable-2024-07-24; nixos/iio-hyprland: init module
2024-08-18 17:19:20 +05:30
Sandro
c2d5ecc504
nixos/displayManager: mention how to get a list of currently available desktop sessions (#335208) 2024-08-18 17:17:01 +05:30
Adam C. Stephens
526d11e357
Merge pull request #335366 from adamcstephens/incus/publish-squashfs
incus: publish squashfs image to hydra
2024-08-17 19:06:02 -04:00
Linus Karl
d2367c3f7e indi-full: refactor 3rdparty drivers
This splits the 3rdparty drivers into seperate
packages as recommended by upstream. This also
allows to build a indi-full equivalent with only
the needed drivers. Also add indi-full-nonfree
with all the nonfree drivers. And remove them
from indi-full.
2024-08-18 01:05:52 +02:00
Peder Bergebakken Sundt
e471916645
treewide: passthru nixos test (#334491) 2024-08-18 00:29:43 +02:00
Adam C. Stephens
062b5b645d
Merge pull request #335441 from emilylange/nixos-forgejo-pam
forgejo,forgejo-lts: remove PAM support
2024-08-17 17:15:34 -04:00
Sandro Jäckel
4f34325b2b
nixos/wayland-session: use graphical-desktop option and remove implicit defaults 2024-08-17 23:11:37 +02:00
Sandro Jäckel
57507a521a
nixos/graphical-desktop: add enable option 2024-08-17 23:11:37 +02:00
Yusuf
228660743a
nixos/iio-hyprland: init module 2024-08-18 01:18:23 +05:30
emilylange
07641a91c9
forgejo,forgejo-lts: remove PAM support
https://forgejo.org/docs/latest/user/authentication/#pam-pluggable-authentication-module

PAM support has to be enabled at compile time and upstream considers it
opt-in.

Official upstream binaries have it disabled.

We enabled it by default because we simply inherited most of it from
Gitea when the split in nixpkgs happened.

Reasons why it had been enabled in nixpkgs for Gitea are unknown.

See 9406f240a7.

There is reason to believe not a single Forgejo instance running on
NixOS uses this feature because it literally segfaults due to our
sandboxing.
2024-08-17 21:07:23 +02:00
Sigmanificient
422d853079 liboop: drop
fix

liboop: drop
2024-08-17 21:06:45 +02:00
Masum Reza
e6db763dde
Merge pull request #335398 from JohnRTitor/hypridle-service
nixos/hypridle: switch to package provided user service file
2024-08-17 23:11:27 +05:30
John Titor
077938f18b
nixos/hypridle: switch to package provided user service file
format with nixfmt-rfc-style
2024-08-17 20:51:36 +05:30
Adam Stephens
659308a8c1
nixos/incusContainer: create hydra build product 2024-08-17 09:01:17 -04:00
Adam Stephens
9277993de4
make-squashfs: add support for generating hydra build products
left default to write the image directly to the store, but enabling hydraBuildProduct
will create $out as a directory
2024-08-17 09:00:43 -04:00
Jörg Thalheim
aa994dd296 harmonia: switch to non-deprecated SIGN_KEY_PATHS 2024-08-17 13:11:06 +02:00
Jörg Thalheim
5d500e3d51
Merge pull request #335283 from Enzime/fix/regreet
regreet: fix theming options not under GTK header
2024-08-17 12:26:35 +02:00
Michael Hoang
3ffc982bfa regreet: don't allow settings to be a path 2024-08-17 14:32:49 +10:00
Michael Hoang
5ee778d424 regreet: fix theming options not under GTK header
Fixes #335082
2024-08-17 14:29:45 +10:00
Emily
00f9b25737
Merge pull request #325813 from SamLukeYes/xonsh
xonsh: fix wrapper, 0.17.0 -> 0.18.2
2024-08-16 22:53:01 +01:00
Morgan Jones
99714ac2fc
nixos/nebula: add missing with maintainers 2024-08-16 12:13:40 -07:00
Fabián Heredia Montiel
2c94341824
Merge pull request #328532 from LeSuisse/openstack-config-no-default-root-password
openstack-config: remove hardcoded default password for the root account
2024-08-16 12:30:12 -06:00
Pol Dellaiera
835b2f8822
nixos/chromadb: init 2024-08-16 18:23:12 +02:00
Rafael Fernández López
058e8f5ef1
nvidia-podman: remove nvidia wrapper
Since version 4.1.0, podman has support for CDI, and is the
recommended way to expose GPU's for containers for podman.

More information: https://web.archive.org/web/20240729183805/https://docs.nvidia.com/datacenter/cloud-native/container-toolkit/latest/install-guide.html#configuring-podman
2024-08-16 18:16:23 +02:00
abysssol
5f17f87a7f nixos/ollama: move loadModels script into a separate service
Due to the large size of models, the script can run for a long time,
which can cause timeouts, since the startup phase has a time limit.
2024-08-16 11:36:35 -04:00
Adam C. Stephens
c49d0387e0
Merge pull request #251598 from oddlama/feat-kanidm-provision
nixos/kanidm: add basic provisioning
2024-08-16 10:15:22 -04:00
Rafael Fernández López
f7b4d57421
virtualisation/docker: fix nvidia wrapper
Although CDI should be used in order to not require container runtime
wrappers anymore, fix the nvidia-container-runtime integration with
Docker for cases when Docker < 25.
2024-08-16 15:49:35 +02:00
K900
0d331a43ff
Merge pull request #335066 from K900/pipewire-limits
nixos/pipewire: install the default limits config, make group always exist
2024-08-16 16:38:20 +03:00
Franz Pletz
4bd91be1ad
Merge pull request #333462 from Luflosi/nixos-iperf3-package-option 2024-08-16 14:46:53 +02:00
oddlama
558fa6abc6
nixos/kanidm: add provisioning of groups, persons and oauth2 systems 2024-08-16 14:12:35 +02:00
superherointj
d634a501b1
Merge pull request #334630 from rorosen/k3s-1.28.12
k3s_1_28: 1.28.11+k3s2 -> 1.28.12+k3s1
2024-08-16 08:06:15 -03:00
K900
333e6672e1 nixos/pipewire: install the default limits config, make group always exist 2024-08-16 12:00:08 +03:00
Jörg Thalheim
d9e8fc4b72
Merge pull request #323785 from Mic92/zerotier
nixos/zerotierone: clean up local.conf symlinks unconditionally
2024-08-16 09:35:35 +02:00
Robert Rose
d506595e43 nixos/k3s: use jq instead of JSONpath to process test data
Although kubectl has builtin JSONpath support, it is only supported
partially and the support varies between different versions. While using
JSONpath in tests worked for some versions, it failed for others. This
contribution replaces the problematic JSONpath usages with the jq JSON
processor.
2024-08-16 08:37:15 +02:00
Peder Bergebakken Sundt
db16f389ab
Merge pull request #334508 from pbsds/fix-taskserver-1723599512
nixos/taskserver: fix test eval
2024-08-16 00:44:26 +02:00
OPNA2608
95461ff6c6 tests/ayatana-indicators: Finalise for differences in ayatana vs lomiri indicators 2024-08-15 22:10:56 +02:00
OPNA2608
712439f971 tests/ayatana-indicators: Prepare for differences in ayatana vs lomiri indicators 2024-08-15 22:10:25 +02:00
OPNA2608
cc01673c23 tests/ayatana-indicators: nixfmt, modernise 2024-08-15 22:06:15 +02:00
OPNA2608
4403f7f6c3 nixos/ayatana-indicators: Support new passthru.ayatana-indicators format 2024-08-15 20:52:04 +02:00
Jonathan Davies
a289e52ce1
apacheKafka: init 3.8.0 2024-08-15 17:28:12 +01:00
Emily
f651cf8481
Merge pull request #334726 from networkException/revert-programs-chromium-package
nixos/chromium: revert having `programs.chromium.enable` insert `pkgs.chromium` into the system closure
2024-08-15 14:22:13 +02:00
Sandro
bbbc7bcdb3
Merge pull request #331784 from SuperSandro2000/pam-motd-writeText
nixos/pam: fix writeFile no longer taking null as an argument warning
2024-08-15 09:32:42 +02:00
networkException
2c8c689cd7
Revert "nixos/chromium: Make programs.chromium.enable install chromium"
This reverts commit 93b6400ff5.

Putting chromium in the system closure by enabling the module breaks
previous expectations of module users. Previously, this would create
policy files for chromium, google-chrome and brave as chromium based
browsers.

Use cases relating to a browser other than chromium directly as well
as only using home-manager's module system to configure other aspects
of a chromium package (various use cases require overriding inputs
to the chromium derivation) were not covered by this breaking change.

More design is needed before having policy and package options coexist
properly in this module.
2024-08-15 02:26:31 +02:00
networkException
2f1a499d26
Revert "nixos/chromium: Update description for programs.chromium.enable"
This reverts commit 80656f196d.

The main change to be reverted depends on this change, see the following
commit.
2024-08-15 02:25:31 +02:00
a-kenji
0f13d8a4ba nixos/unbound: fix typos in description and comment 2024-08-14 23:53:58 +02:00
Thiago Kenji Okada
33c968004c
Merge pull request #333678 from thiagokokada/sx-add-as-xsession
sx: add desktop file and providedSessions
2024-08-14 21:29:39 +01:00
superherointj
53b0c8af91
Merge pull request #334697 from rorosen/k3s-test-timeout
nixos/k3s: increase timeout in tests
2024-08-14 17:05:32 -03:00
Doron Behar
6bfd71d2b5
Merge pull request #318892 from doronbehar/pkg/taskwarrior3
nixosTests.taskchampion-sync-server: init
2024-08-14 19:43:33 +00:00
Robert Rose
69e2e82ba0 nixos/k3s: increase timeout in tests
Increase the timout for the import of container images in the `airgap-images`
test from 60s to 120s to counter flaky tests.
2024-08-14 21:01:19 +02:00
Maximilian Bosch
d86f963742
Merge pull request #329657 from flyingcircusio/mailpit-module
nixos/mailpit: init
2024-08-14 17:37:54 +02:00
Maximilian Bosch
f07601ce07
nixos/mailpit: fix defaults for listen/smtp 2024-08-14 16:12:57 +02:00
Maximilian Bosch
d2fca016fe
Merge pull request #331717 from alyssais/linux-6.9-drop
linux_6_8,linux_6_9: remove
2024-08-14 16:04:30 +02:00
OPNA2608
8c1cb41408 nixos/lomiri: Add gallery app 2024-08-14 15:54:36 +02:00
OPNA2608
cb0faa488a tests/lomiri-gallery-app: init 2024-08-14 15:26:08 +02:00
Martin Weinelt
9ccfa87721
Merge pull request #332764 from NixOS/staging-next
staging-next 2024-08-06
2024-08-14 13:33:28 +02:00
Emily
57d0d4a8f3
Merge pull request #334526 from ElvishJerricco/revert-boot-counting-again-sadface
systemd-boot: Revert boot counting again
2024-08-14 12:19:55 +01:00
Pol Dellaiera
302b8650e5
Merge pull request #334371 from nixupp/patch-1
nixos/openwebui: add link to description
2024-08-14 12:02:02 +02:00
Maximilian Bosch
15dab820a6
nixos/mailpit: allow multiple instances
Now it's possible to start multiple mailpit instances - for e.g.
multiple testing environments - on the same machine:

    {
      services.mailpit.instances = {
        dev = { /* ... */ };
        staging = { /* ... */ };
      };
    }

The simplest way to start a single instance is by declaring

    services.mailpit.instances.default = {};
2024-08-14 11:33:52 +02:00
Maximilian Bosch
a2437d8075
nixos/mailpit: init
Simple module to configure a systemd service for mailpit.
2024-08-14 11:33:52 +02:00
Eduard Bachmakov
b33bf6b99a nixos/systemd/initrd: Fix emergencyAccess to work with null.
Implementation is now compatible with the option's .type already defined.

This allows us to pass `config.users.users.<user>.hashedPassword` even if this is null (the default).

Before:
true  => access
false => no access
hash  => access via password
null  => eval error

After:
true  => access
false => no access
hash  => access via password
null  => no access
2024-08-14 10:26:15 +02:00
github-actions[bot]
261f1edcbd
Merge master into staging-next 2024-08-14 06:01:07 +00:00
Yarny0
cdd7496ff3 foomatic-db: unstable-2024-05-04 -> unstable-2024-08-13
This update renames Utax ppd files to avoid spaces in filenames.
Since this is an incompatible change,
we also add a hint in the release notes.
2024-08-14 07:30:17 +02:00
Doron Behar
e58e0e1d95 doc: mention Taskwarrior 3 in taskserver module docs & in release notes 2024-08-14 08:06:11 +03:00
Doron Behar
2c40948c73 nixosTests.taskchampion-sync-server: init 2024-08-14 08:06:11 +03:00
Doron Behar
ecf4caea3f nixos/taskchampion-sync-server: init
Co-authored-by: Mohamed Laradji <mlaradji@proton.me>
2024-08-14 08:06:11 +03:00
Doron Behar
54698e8db6 taskwarrior2: rename from taskwarrior, with a warning alias
Also remove an outdated link in `taskserver/default.md`.
2024-08-14 08:06:10 +03:00
Will Fancher
0637303ca8 Revert "Merge pull request #330017 from Mic92/boot-counting"
This reverts commit 3d3c0f4d34, reversing
changes made to 47f7e25a77.
2024-08-13 23:11:18 -04:00
Nick Cao
12f650234b
Merge pull request #334257 from Dan-Theriault/miniflux-no-admin-required
nixos/miniflux: make admin provisioning optional
2024-08-13 21:54:34 -04:00
Peder Bergebakken Sundt
024600b390 nixos/taskserver: fix test eval
Error was:

```
error:
Failed assertions:
- Specialisation names can only contain alphanumeric characters and underscores
Invalid specialisation names: manual-config
```

Using nix (Lix, like Nix) 2.90.0
2024-08-14 03:40:36 +02:00
Will Fancher
b78bd2f912 Revert "Merge pull request #333952 from r-vdp/specialisation-name-regex"
This reverts commit fc35704bc8, reversing
changes made to c67d90d517.
2024-08-13 21:33:15 -04:00
github-actions[bot]
ae6040d6a6
Merge master into staging-next 2024-08-14 00:02:32 +00:00
Dan Theriault
f6788b6165 nixos/miniflux: make admin provisioning optional
Miniflux supports provisioning users via SSO, which renders admin
accounts unnecessary for some use-cases. This change retains the
existing default, but makes it easier to disable admin provisioning.
2024-08-13 18:56:16 -04:00
Someone
f9a85112f5
Merge pull request #334340 from eljamm/nvidia-open
nixos/nvidia: fix CUDA for open driver
2024-08-13 19:35:46 +00:00
Pol Dellaiera
a0a63aa8d4
Merge pull request #332593 from mzacho/master
nixos/modules/services/mail: add protonmail-bridge service
2024-08-13 21:08:24 +02:00
Pol Dellaiera
c556059765
Merge pull request #334344 from truh/docs/oci-containers-docs-urls
nixos/oci-containers: replace broken links to docker docs
2024-08-13 20:44:55 +02:00
github-actions[bot]
35c1846996
Merge master into staging-next 2024-08-13 18:01:28 +00:00
Philip Taron
04a8c1e764
Merge pull request #328030 from Wulfsta/swap-status 2024-08-13 07:05:46 -07:00
Adam C. Stephens
7e95d0361c
Merge pull request #333730 from adamcstephens/incus/from-lxd
nixos/incus: add incus-only vm and container images
2024-08-13 08:39:26 -04:00
nixupp
876cfeddfc
nixos/openwebui: add link to description 2024-08-13 12:18:54 +00:00
Martin Weinelt
0906206d42
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
- pkgs/top-level/python-packages.nix
2024-08-13 13:21:03 +02:00
WilliButz
8dd369f524
nixos/systemd-tmpfiles: add initrd support
This adds support for declaring tmpfiles rules exclusively for the
systemd initrd. Configuration is possible through the new option
`boot.initrd.systemd.tmpfiles.settings` that shares the same interface as
`systemd.tmpfiles.settings`.

I did intentionally not replicate the `rules` interface here, given that
the settings attribute set is more versatile than the list of strings
used for `rules`. This should also make it unnecessary to implement the
workaround from 1a68e21d47 again.

A self-contained `tmpfiles.d` directory is generated from the new initrd
settings and it is added to the initrd as a content path at
`/etc/tmpfiles.d`.

The stage-1 `systemd-tmpfiles-setup.service` is now altered to no longer
operate under the `/sysroot` prefix, because the `/sysroot` hierarchy
cannot be expected to be available when the default upstream service is
started.

To handle files under `/sysroot` a slightly altered version of the
upstream default service is introduced. This new unit
`systemd-tmpfiles-setup-sysroot.service` operates only under the
`/sysroot` prefix and it is ordered between `initrd-fs.target` and the
nixos activation.

Config related to tmpfiles was moved from initrd.nix to tmpfiles.nix.
2024-08-13 13:02:21 +02:00
eljamm
4548c39286
nixos/nvidia: fix CUDA for open driver
For the open driver, the `nvidia-uvm` module does not auto-load after
`nvidia`, which makes CUDA not work.

In this case, we need to add it to `boot.kernelModules` for it to work
again.
2024-08-13 11:56:10 +01:00
Jakob Klepp
0b8954f8d2 nixos/oci-containers: replace broken links to docker docs
Old links in descriptions now lead to 404 pages.
2024-08-13 11:49:08 +02:00
Sarah Brofeldt
ba99ba8ea7
Merge pull request #327914 from 0z13/nvidia-container-toolkit-device-name
nixos/nvidia-container-toolkit: add device-name-strategy option
2024-08-13 10:41:45 +02:00
superherointj
3a158316b8
Merge pull request #332183 from codedownio/k3s-containerd-config
nixos/k3s: add containerdConfigTemplate option
2024-08-13 04:03:59 -03:00
Kerstin Humm
13c96978c3 nixos/weblate: init module and test
Co-authored-by: Taeer Bar-Yam <Radvendii@users.noreply.github.com>
2024-08-13 08:44:54 +02:00
Will Fancher
208e953381 systemd-stage-1: Fully merge /bin and /sbin
In #327506, we stopped using `/sbin` in the `pathsToLink` of `initrdBinEnv`. This inadvertantly stopped including the `sbin` directory of the `initrdBin` packages, which meant that things like `mdadm`'s udev rules, which referred to binaries by their `sbin` paths, stopped working.

The purpose of #327506 was to fix the fact that `mount` was not calling mount helpers like `mount.ext4` unless they happened to be in `/sbin`. But this raised some questions for me, because I thought we set `managerEnvironment.PATH` to help util-linux find helpers for both `mount` and `fsck`. So I decided to look at how this works in stage 2 to figure it out, and it's a little cursed.

---

What I already knew is that we have [this](696a4e3758/nixos/modules/system/boot/systemd.nix (L624-L625))

```
        # util-linux is needed for the main fsck utility wrapping the fs-specific ones
        PATH = lib.makeBinPath (config.system.fsPackages ++ [cfg.package.util-linux]);
```

And I thought this was how `mount` finds the mount helpers. But if that were true, then `mount` should be finding helpers in stage 1 because of [this](696a4e3758/nixos/modules/system/boot/systemd/initrd.nix (L411))

```
      managerEnvironment.PATH = "/bin";
```

Turns out, `mount` _actually_ finds helpers with [this configure flag](696a4e3758/pkgs/os-specific/linux/util-linux/default.nix (L59))

```
    "--enable-fs-paths-default=/run/wrappers/bin:/run/current-system/sw/bin:/sbin"
```

Ok... so then why do we need the PATH? Because `fsck` has [this](a75c7a102e/disk-utils/fsck.c (L1659))

```
	fsck_path = xstrdup(path && *path ? path : FSCK_DEFAULT_PATH);
```

(`path` is `getenv("PATH")`)

So, tl;dr, `mount` and `fsck` have completely unrelated search paths for their helper programs

For `mount`, we have to use a configure flag to point to `/run/current-system`, and for `fsck` we can just set PATH

---

So, for systemd stage 1, we *do* want to include packages' `sbin` paths, because of the `mdadm` problem. But for `mount`, we need helpers to be on the search path, and right now that means putting it somewhere in `/run/wrappers/bin:/run/current-system/sw/bin:/sbin`.
2024-08-12 23:35:01 -04:00
Will Fancher
d74d182991 Revert "systemd-stage-1: Use common bin for /sbin"
This reverts commit b4b4751e97.
2024-08-12 23:35:01 -04:00
github-actions[bot]
0a1ac11214
Merge master into staging-next 2024-08-13 00:02:23 +00:00
Will Fancher
bcd1d9cf54
Merge pull request #312755 from tomfitzhenry/systemd-dhcp108
nixos/networkd: allow IPv6OnlyPreferredSec in networkd.conf
2024-08-12 19:19:34 -04:00
Tom McLaughlin
81c0783c0e nixos/k3s: add containerdConfigTemplate option 2024-08-12 14:58:18 -07:00
github-actions[bot]
62f43c3094
Merge master into staging-next 2024-08-12 18:02:11 +00:00
Philip Taron
c44e170e3f
nixos/proxmox-lxc: lib.mdDoc is deprecated 2024-08-12 08:02:57 -07:00
Philip Taron
5c21c35835
nixos/borgmatic: lib.mdDoc is deprecated 2024-08-12 08:02:10 -07:00
Florian
20d3d501ad
Merge pull request #290913 from flandweber/borgmatic-improvement
nixos/borgmatic: added test
2024-08-12 15:37:12 +02:00
K900
0ed621ef5d
Merge pull request #334121 from r-vdp/specialisation-fix-acme
acme: fix test
2024-08-12 16:01:16 +03:00
Sandro
e32c796ff7
Merge pull request #332541 from SuperSandro2000/mailman-relay-assert
nixos/mailman: allow setting relay domains with services.postfix.conf…
2024-08-12 14:37:53 +02:00
r-vdp
f09a62f122
acme: fix test after fc35704bc8 2024-08-12 14:04:09 +02:00
github-actions[bot]
8674a36b01
Merge master into staging-next 2024-08-12 12:01:27 +00:00