Commit Graph

35801 Commits

Author SHA1 Message Date
Bjørn Forsman
fa8ace3618 nixos: don't implicitly map missing user groups to nogroup
Before: `users.users.user1.group = "group-not-defined-anywhere-else"`
would result in user1 having the primary group `nogroup`, assigned at
activation time and only with a (easy to miss) warning from the
activation script. This behaviour is a security issue becase no files
should be owned by `nogroup` and it allows for unrelated users (and
services) to accidentally have access to files they shouldn't have.

After: The configuration above results in this eval error:
  - The following users have a primary group that is undefined: user1
  Hint: Add this to your NixOS config:
    users.groups.group-not-defined-anywhere-else = {};
2023-10-06 19:33:01 +02:00
Weijia Wang
39edffebe6
Merge pull request #253548 from Quantenzitrone/rimgo
rimgo: init at 1.2.0 & module
2023-10-06 17:50:58 +02:00
K900
944e26dc60
Merge pull request #259318 from K900/fix-externally-defined-nixos-tests
nixosTest: fix tests defined with pkgs.nixosTest
2023-10-06 18:04:29 +03:00
Lin Jian
de26e61f7e
Merge pull request #258582 from returntoreality/gpsd-extra-args
nixos/gpsd: add extraArgs option
2023-10-06 22:54:51 +08:00
K900
8a7282f90b nixosTest: fix tests defined with pkgs.nixosTest 2023-10-06 16:33:15 +03:00
Ryan Lahfa
c22f1c1cfa
Merge pull request #257828 from mbey-mw/nginx-tmpfiles-rules 2023-10-06 15:28:36 +02:00
Marek Beyer
ea1eb4ee0f
nixos/nginx: add systemd-tmpfiles exclusion of temporary directories
Directories used by nginx in the tmp path are only created upon startup and
must not be deleted while nginx is running.
2023-10-06 14:26:37 +02:00
Marek Beyer
040cf48d28
nixos/tests: add test for nginx temp directories removal
The default temp directories for nginx must not be removed by
systemd-tmpfiles-clean.service. This test lowers the age parameter for /tmp and
triggers a cleanup that would normally only occur after 10 days of nginx
inactivity. After that, the functionality of nginx that requires a temporary
directory is tested again.
2023-10-06 14:26:37 +02:00
Atemu
eae761dcb0
Merge pull request #245593 from wamserma/grocy-add-package-option
grocy: add package option
2023-10-06 13:56:58 +02:00
7c6f434c
8a2cb1f05f
Merge pull request #259362 from tomfitzhenry/sgt-puzzles-name
sgt-puzzles: rename all "sgtpuzzles" -> "sgt-puzzles"
2023-10-06 11:50:49 +00:00
Pierre Bourdon
e462c9172c
Merge pull request #259039 from edef1c/cve-2023-4911-mitigation
nixos/security/wrappers: use musl rather than glibc and explicitly unset insecure env vars
2023-10-06 12:50:39 +02:00
Tom Fitzhenry
736884108d sgt-puzzles: rename all "sgtpuzzles" -> "sgt-puzzles"
nixpkgs currently mixes sgtpuzzles/sgt-puzzles across filenames,
packages, tests.

This inconsistency is frequently annoying.

Let's unify on "sgt-puzzles", on the basis that:
* "sgt-puzzles" is the package filename.
* Alpine/FreeBSD/Debian use "sgt-puzzles". No other distro uses
"sgtpuzzles". https://repology.org/project/sgt-puzzles/versions
2023-10-06 21:36:48 +11:00
Bobby Rong
49dda70dbc
Merge pull request #259222 from bobby285271/fix/gnome-flashback-eval
nixosTests.gnome-flashback: Fix eval
2023-10-06 17:31:44 +08:00
Bobby Rong
190a819ecb
nixosTests.gnome-flashback: Ensure gnome-flashback-media-keys starts 2023-10-06 16:04:24 +08:00
Bobby Rong
fc096a6d9c
nixosTests.gnome-flashback: Fix eval
The option `nodes.machine.environment.variables.XDG_CONFIG_DIRS' is defined multiple times while it's expected to be unique.
2023-10-06 12:18:53 +08:00
edef
09325d24b6 nixos/security/wrappers: use musl rather than glibc and explicitly unset insecure env vars
This mitigates CVE-2023-4911, crucially without a mass-rebuild.

We drop insecure environment variables explicitly, including
glibc-specific ones, since musl doesn't do this by default.

Change-Id: I591a817e6d4575243937d9ccab51c23a96bed6f9
2023-10-05 22:04:05 +00:00
Martin Weinelt
9a20605910
nixos/home-assistant: update bluetooth integrations 2023-10-05 05:09:55 +02:00
Eric Bailey
b90ac4c0ec kops: 1.27.1 -> 1.28.0
- Drop kops_1_25
- kops_1_26: 1.26.5 -> 1.26.6
- Update 23.11 release notes
2023-10-04 19:27:49 -05:00
Jörg Thalheim
07c70a41ab nixos/mediawiki: add nginx option
mediawiki: configure uploadsDir
2023-10-04 22:21:55 +01:00
Maximilian Bosch
4305d167a2
Merge pull request #256407 from Ma27/motd-ordering
nixos/rust-motd: allow ordering sections
2023-10-04 19:25:18 +02:00
Weijia Wang
6e8e41ec9b
Merge pull request #250149 from ebardie/ebardie/fusuma-update
fusuma: enable "essential" plugins
2023-10-04 18:59:44 +02:00
edef
77225e33c0
Merge pull request #248627 from edef1c/gpg-agent-sockets 2023-10-04 12:32:29 -04:00
ebardie
6d30f6d579 fusuma: enable "essential" plugins
Specifically the following plugins:

    fusuma-plugin-appmatcher
    fusuma-plugin-keypress
    fusuma-plugin-sendkey
    fusuma-plugin-tap
    fusuma-plugin-wmctrl

I've not enabled the other plugins available on rubygems for the
following reasons:

  * remap : seems niche functionality and requires further configuration
            to grant the user access permissions to event devices

  * thumbsense : pulls in remap (see above)

  * touchscreen : I've no way of testing.  Note: enabling didn't appear
                  to cause any problems.

Ideally the plugin functionality would be made available as separate
pkgs, but that would require patching Fusuma to search outside of the
Gem directory.  Enabling this subset of packages for what appears to be
widely useful functionality seems a good option.
2023-10-04 12:22:34 +02:00
Doron Behar
34585a2b76
Merge pull request #256866 from kirillrdy/transmission
transmission, transmission_4: set mainProgram and restore nixosTests
2023-10-04 13:20:46 +03:00
Florian Klink
7239f0198e
Merge pull request #258920 from ElvishJerricco/systemd-stage-1-full-build
systemd-stage-1: Default to full systemd build.
2023-10-04 12:02:36 +03:00
Florian Klink
42f2e2dadd
Merge pull request #257510 from ign0tus/fix/wake-on-lan-policy
Fix: WakeOnLan policy
2023-10-04 11:36:16 +03:00
Will Fancher
710b96b191 systemd-stage-1: Default to full systemd build. 2023-10-04 04:21:35 -04:00
Florian Klink
d89aa11c89
Merge pull request #258345 from lf-/jade/wait-for-online
nixos/networkd: fix wait-online on networking.useDHCP default configuration
2023-10-04 10:58:14 +03:00
Will Fancher
37601de942
Merge pull request #237154 from ElvishJerricco/sd-s1-networkd-flush-with-keep-configuration
systemd stage 1 networking: Use KeepConfiguration
2023-10-03 23:37:03 -04:00
K900
76917ca3ae nixos/sddm: add option to enable Wayland support via Weston 2023-10-03 12:48:58 +03:00
K900
9d2e9d8ddf
Merge pull request #258434 from SuperSandro2000/locate-dbfile
nixos/locate: #258575 followup
2023-10-03 08:58:20 +03:00
Ruby Juric
638d19ac92
zitadel: init at 2.37.2; nixos/zitadel: init (#254896) 2023-10-03 07:11:18 +02:00
Sandro Jäckel
b53f817088
nixos/locate: cleanup optional parenthesis 2023-10-03 00:19:57 +02:00
Jade Lovelace
28ab2b278d nixos/networkd: make wait-online not time out
A further bug to our strange multi-user.target depending on
network-online.target issue is that systemd recently changed the
behaviour of systemd-networkd-wait-online to no longer consider the
absence of interfaces with RequiredForOnline to be sufficient to be
online: https://github.com/systemd/systemd/pull/27825

On the advice of the systemd developers
(https://github.com/systemd/systemd/issues/29388), this commit changes
the configuration of systemd-networkd-wait-online to pass --any by
default, and lets the default DHCP interfaces be RequiredForOnline
as they would be by default if the option is omitted.

It is plausible that systemd-networkd-wait-online may still fail if
there are no interfaces at all. However, that probably cannot be
avoided.
2023-10-02 14:47:21 -07:00
Alyssa Ross
dc439e41db nixos/environment: move XDG_CONFIG_DIRS to sessionVariables
Otherwise, in non-interactive contexts (e.g. systemd units), this
entry (the default) won't be in the list.  Only the profile relative
ones would be, since they were already using session variables.  This
is clearly not the correct behavior.
2023-10-02 18:47:48 +00:00
Nick Cao
a431dcd07d
Merge pull request #258486 from tazjin/gonic-resolve-conf
nixos/gonic: allow gonic to perform non-local DNS resolution
2023-10-02 13:40:12 -04:00
Linus Karl
342cc761df nixos/gpsd: add extraArgs option
Allows setting addtional arguments to gpsd
2023-10-02 15:10:12 +02:00
K900
524181b5b8 nixos/locate: rip out dbfile overrides
All the locate versions we have support LOCATE_PATH, so just use that
instead of adding indirections all over the place AND forcing people
to rebuild their locate implementation if they want the path changed.
2023-10-02 15:10:22 +03:00
Ryan Lahfa
6f4a420057
Merge pull request #257719 from CardboardTurkey/regreet-fix-group 2023-10-02 13:28:37 +02:00
Ryan Lahfa
06f013e0cd
Merge pull request #238847 from nikstur/qemu-vm-external-disk-image 2023-10-02 13:27:03 +02:00
Linus Heckemann
313d0245a8
Merge pull request #256666 from lheckemann/bcachefs-keyring
bcachefs tests: unlock directly to the right keyring
2023-10-02 11:35:16 +02:00
nikstur
62e95d095d nixos/qemu-vm: optionally disable overriding fileSystems
Allow the user to disable overriding the fileSystems option with
virtualisation.fileSystems by setting
`virtualisation.fileSystems = lib.mkForce { };`.

With this change you can use the qemu-vm module to boot from an external
image that was not produced by the qemu-vm module itself. The user can
now re-use the modularly set fileSystems option instead of having to
reproduce it in virtualisation.fileSystems.
2023-10-02 11:13:26 +02:00
Cabia Rangris
6f7933059d
Merge pull request #237404 from cab404/cab/moonraker-gpiod
moonraker: add useGpiod
2023-10-02 06:45:16 +04:00
Vladimir Serov
5edabf7c0b
moonraker: add useGpiod 2023-10-02 06:09:58 +04:00
Jörg Thalheim
f8be2c43b4 nixos/buildbot: allow to prepend imports 2023-10-02 09:11:39 +10:00
Jörg Thalheim
e2106a5dbb nixos/buildbot: make configurators configurable 2023-10-02 09:11:39 +10:00
Vincent Ambo
259d112c05 nixos/gonic: allow gonic to perform non-local DNS resolution
Gonic accesses external services (e.g. Listenbrainz or last.FM) for
scrobbling, but it was previously not allowed to read
`/etc/resolv.conf`.

This had the effect that, unless a local resolver was configured on
the system, any connection attempt would fail due to DNS resolution
being unavailable.
2023-10-02 01:05:00 +03:00
K900
e53c99eb17 treewide: use pkgs.config instead of config.nixpkgs.config
`pkgs` may be passed in externally, in which case `config.nixpkgs.config` will not be set.

Follow-up to #257458.
2023-10-01 20:48:40 +03:00
Ryan Lahfa
8bc4e1927c
Merge pull request #255321 from p-h/ulogd-multiple-logging-stacks 2023-10-01 17:53:19 +02:00
K900
eb8ce7930d
Merge pull request #257458 from K900/die-nixpkgs-config-die
treewide: fail when `nixpkgs.config` is set with explicit `pkgs`, remove all `nixpkgs.config` usages in in-tree modules
2023-10-01 10:11:15 +03:00