Commit Graph

43334 Commits

Author SHA1 Message Date
Someone Serge
d970b4d6cd tests/nvidia-container-toolkit: hardware.opengl -> graphics 2024-08-22 17:37:26 +00:00
Someone Serge
0780a3ebc8 tests/nvidia-container-toolkit: strip {no,one}-nvidia prefix as obvious from the context 2024-08-22 17:34:48 +00:00
Someone Serge
1e571aeab4 tests/nvidia-container-toolkit: less nesting 2024-08-22 17:25:49 +00:00
Martin Weinelt
fe0d323af5
nixos/engelsystem: prune template cache on version changes
After upgrading to 3.5.0 we noticed, that registering would redirect to
the login page and not work at all. At the same time the admin user was
unable to access its user settings.

This issue could be tracked back to the template cache, that must be
invalidated between release upgrades.
2024-08-22 19:16:28 +02:00
Someone Serge
1b7f2fe883 tests/nvidia-container-toolkit: more getExe 2024-08-22 17:09:56 +00:00
Someone
2d7db58c2f
Merge pull request #313225 from ereslibre/nvidia-consistent-casing
docs: fix Nvidia casing to be consistent across different places
2024-08-22 16:51:41 +00:00
Martin Weinelt
d9cf6ea6f8
Merge pull request #336445 from adamcstephens/kanidm/1.3.3
kanidm: 1.3.2 -> 1.3.3
2024-08-22 18:41:30 +02:00
Someone
4c930c0635
Merge pull request #331071 from ereslibre/fix-nvidia-container-toolkit-docker-contamination
Fix nvidia container toolkit docker contamination
2024-08-22 16:40:06 +00:00
Adam Stephens
b93f6e4acd
nixos/tests/kanidm: bind certs path to fix ofborg tests
provision # [    8.223448] (kanidmd)[819]: kanidm.service: Failed to set up mount namespacing: /ofborg/checkout/repo/38dca4e3aa6bca43ea96d2fcc04e8229/builder/ofborg-evaluator-1/nixos/tests/common/acme/server:
No such file or directory
2024-08-22 10:59:48 -04:00
Emily
a565cfeac3 antennas: drop 2024-08-22 15:51:27 +01:00
Emily
6fa5767e07 tvheadend: drop
Closes: #332259
2024-08-22 15:51:27 +01:00
Christina Sørensen
31321be124
kubernetes: 1.30.2 -> 1.31.0
Updates feature gate tests to feature gates introduces in 1.31, assuming
they'll be around for a while.
2024-08-22 16:26:38 +02:00
Emily
01a749e0bf
Merge pull request #336077 from emilazy/push-yoykzrxwpykp
pict-rs_0_3: drop
2024-08-22 14:58:04 +01:00
Sandro
180f9e2195
Merge pull request #334629 from OPNA2608/init/lomiri/lomiri-gallery-app 2024-08-22 15:44:21 +02:00
Sandro
18fb834638
Merge pull request #322730 from bbenno/update-wp-httpd-htaccess 2024-08-22 14:33:17 +02:00
Alexander Linder
06855f1cd8
nixos/mautrix-whatsapp: automatic appservice registration option, pull login_shared_secret_map setting from env file (#311681)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-08-22 14:14:51 +02:00
nikstur
e7b7271ffc
Merge pull request #336513 from nikstur/etc-overlay-fixes
etc.overlay fixes
2024-08-22 13:57:04 +02:00
nikstur
7845b89e24 nixos/etc: unmount old /etc hierarchy lazily
This should fix errors where /etc is reported to be busy and thus cannot
be unmounted.

Another solution we can consider if this doesn't work out as we expect
is to forcefully unmount /etc.
2024-08-22 12:17:20 +02:00
nikstur
d820fe987e nixos/etc: wantedBy -> requiredBy for mounting overlay etc
I've observed that sometimes the overlay mount unit does not get started
when using wantedBy. requiredBy makes this relationship stricter and if
necessary will restart the initrd-fs.target and thus ensure that when
this target is reached /etc has alredy been mounted. This is in line
with the description of initrd-fs.target in systemd.special:

> Thus, once this target is reached the /sysroot/ hierarchy is fully set up
2024-08-22 12:12:18 +02:00
Sandro
a45dc99ba3
Merge pull request #287565 from RatCornu/pingvin-share 2024-08-22 11:59:03 +02:00
nikstur
483c13b835
Merge pull request #335929 from jmbaur/erofs-utils-1.8
Re-upgrade erofs-utils to 1.8
2024-08-22 11:52:25 +02:00
nikstur
0b6c394f3a
Merge pull request #328513 from isabelroses/docs/perlless
nixos/perlless: correct documented warning
2024-08-22 11:50:08 +02:00
Sandro
b6890ecb57
Merge pull request #334549 from Yarny0/foomatic-db-update 2024-08-22 11:46:35 +02:00
oluceps
6c22d08406
nixos/test/dae: disable waiting network 2024-08-22 17:09:31 +08:00
Sandro
11b26f016e
Merge pull request #336141 from emilazy/push-uztymzmukyyk
opencv{2,3}: drop
2024-08-22 09:14:40 +02:00
José Romildo Malaquias
56b912ba3f
Merge pull request #336161 from ghpzin/nixosTests.enlightenment/mark-broken
nixos/tests/enlightenment: mark broken
2024-08-21 22:28:08 -03:00
Emily
afdee7e458 pict-rs_0_3: drop
This was broken by the Rust 1.80 upgrade, and is an old version that
we’d have to patch to keep working.

We have already done the 0.4 → 0.5 update without keeping around
the old version or adding in any additional `stateVersion` logic
in <https://github.com/NixOS/nixpkgs/pull/280221>. As a result,
migration for 0.3 users is going to be a little awkward. I’ve done
my best to provide comprehensive instructions for anyone who hasn’t
already bumped to 0.4.

It is probably a footgun to add `stateVersion` logic for any
package that makes backwards‐incompatible schema changes and only
supports migration from the immediately previous version. Users
won’t get migrated by default and we have to either package and
maintain an endlessly growing list of old versions or add complicated
instructions like this. It’s not really practical for us to support
a significantly better migration story than upstream does.
2024-08-22 01:54:09 +01:00
Philip Taron
c849780855
Merge pull request #336404 from Stunkymonkey/security-pam-remove-with-lib 2024-08-21 17:01:28 -07:00
Felix Buehler
e32ec19edf nixos/security.pam: remove with lib; 2024-08-22 00:19:00 +02:00
Emily
1a35d0ccb5 nixos/pict-rs: fix environment variable name
Thanks to @marius851000 for reporting this issue. I assume it probably
changed in 0.5 or something.
2024-08-21 23:09:55 +01:00
Yt
133fb94cd4
Merge pull request #328976 from marius851000/fix_lemmy_ui
lemmy-ui: fix execution
2024-08-21 21:52:11 +00:00
marius david
8f73423ca0 tests/lemmy: Fix Lemmy’s test 2024-08-21 22:13:35 +02:00
Felix Stupp
4b998d179f
nixos/systemd.network: add support for UseDomains= in [Network] sections
Those options were also added with systemd 256, but sadly were missed out in #307068.

These options are documented in:
- [systemd 256 changelog](https://github.com/systemd/systemd/releases/tag/v256) (search for `UseDomains=`)
- [networkd.conf(5)](https://www.freedesktop.org/software/systemd/man/256/networkd.conf.html#UseDomains=)
- [systemd.network(5)](https://www.freedesktop.org/software/systemd/man/256/systemd.network.html#UseDomains=)
2024-08-21 19:48:29 +00:00
isabel
750663add9
nixos/perlless: correct documented warning 2024-08-21 20:11:48 +01:00
OPNA2608
1b4795b3e2 tests/lomiri: Optimise further
- Split desktop into desktop-basics (basic keybind & app launching) and
  desktop-appinteractions (one applications triggering something in another) due to timeouts
- Wrap machine.wait_for_text to wait 10 seconds before starting

The 10 second delay improves runtime dramatically on weaker hardware. In desktop-ayatana-indicators
on my aarch64 laptop, runtime was cut down by 818,41 seconds (~ 14 minutes).
Hopefully helps abit with timeout issues on ARM :(
2024-08-21 21:09:49 +02:00
s1341
5c1ed3ad5a kasmweb: 1.12.0 -> 1.15.0 2024-08-21 15:06:02 +03:00
John Titor
93343775bd
nixos/uwsm: init
[UWSM](https://github.com/Vladimir-csp/uwsm) is a session manager that wraps a wayland
window compositor with useful systemd units like `graphical-session-pre.target`,
`graphical-session.target`, `xdg-desktop-autostart.target`.

This is useful for Wayland Compositors that do not start
these units on these own.

Example for Hyprland:
```nix
programs.hyprland.enable = true;
programs.uwsm.enable = true;
programs.uwsm.waylandCompositors = {
  hyprland = {
    compositorPrettyName = "Hyprland";
    compositorComment = "Hyprland compositor managed by UWSM";
    compositorBinPath = "/run/current-system/sw/bin/Hyprland";
  };
};
```

Co-authored-by: Kai Norman Clasen <k.clasen@protonmail.com>
2024-08-21 16:09:54 +05:30
r-vdp
6cac9e409c
wstunnel: reformat with nixfmt 2024-08-21 10:46:04 +02:00
poscat
712e039585
nixos/networkd: add IPv6SendRA options added in systemd 255 2024-08-21 15:59:33 +08:00
Jörg Thalheim
c43e67f69b
Merge pull request #335344 from Mic92/harmonia
nixos/harmonia: switch to non-deprecated SIGN_KEY_PATHS
2024-08-21 07:01:22 +02:00
Peder Bergebakken Sundt
d6da32fe45
Merge pull request #316208 from Sigmanificient/qtile-nixosvm-tests-add-extra-packages
nixos/tests/qtile: test extraPackages and qtile-extras
2024-08-20 23:02:22 +02:00
ghpzin
11a05813b6
nixos/tests/enlightenment: mark broken 2024-08-20 23:43:31 +03:00
Bjørn Forsman
dc7379e04f nixos/ups: restart upsdrv.service on config changes
Or else new configuration won't take effect until the next boot (or if
the user manually restarts the service).
2024-08-20 22:08:01 +02:00
Emily
87c5a230ec opencv{2,3}: drop 2024-08-20 20:16:13 +01:00
Emily
25bdc22ac8
Merge pull request #334495 from Sigmanificient/liboop
{liboop,lsh}: drop
2024-08-20 19:02:29 +01:00
damhiya
5a3fe0fa46 coqPackages.MenhirLib: init at 20240715 2024-08-20 14:58:36 +02:00
Sigmanificient
e959525e15 lsh: drop 2024-08-20 12:02:12 +02:00
Litchi Pi
ef03964b92 ifm-web: init at 4.0.2
Signed-off-by: Litchi Pi <litchi.pi@proton.me>
2024-08-20 10:42:02 +02:00
Sigmanificient
78b1309ad4 nixos/tests/qtile: test extraPackages and qtile-extras 2024-08-20 02:27:03 +02:00
Jared Baur
cd998f9de9
nixos/qemu-vm: suppress mkfs.erofs output
The mkfs.erofs utility has a lot of output by default that slows down
running tests. We don't need to capture any of the output from
mkfs.erofs, so we can suppress it.
2024-08-19 14:55:55 -07:00
Kerstin
f0ceb9f402
Merge pull request #335768 from erictapen/mastodon
nixos/mastodon: remove pin for postgresql version
2024-08-19 23:11:53 +02:00
Rafael Fernández López
d665ca4fb2 nvidia-container-toolkit: add initial set of tests to check closures 2024-08-19 19:40:28 +02:00
Rafael Fernández López
2b883410d4 nvidia-container-toolkit: only mount existing paths in the host 2024-08-19 19:34:34 +02:00
isabel
f3c2be2a80
nixos/wakapi: init module 2024-08-19 17:16:01 +01:00
Pol Dellaiera
8d18fe9184
Merge pull request #335151 from drupol/nixos/chromadb/init
nixos/chromadb: init
2024-08-19 17:29:57 +02:00
nicoo
2a5454490e
nixosTests.systemd-boot.memtest86: only run when memtest86plus is available (#335825)
The blocks the `nixos-unstable` channel due to an [evaluation error] for `aarch64-linux`.

[evaluation error]: https://gist.github.com/nbraud/8820dda48156922f998bba987eb229c6
2024-08-19 14:51:18 +00:00
Kerstin Humm
f5bb4b807c weblate: 5.6.2 -> 5.7
Changelog: https://github.com/WeblateOrg/weblate/releases/tag/weblate-5.7

Also had to rework django-compressor settings and aligned them more
closely with the official docs:
https://cheat.readthedocs.io/en/latest/django/compressor.html
2024-08-19 16:10:40 +02:00
Florian Klink
cce9aef6fd
Merge pull request #334337 from eduarrrd/eaccess-null
nixos/systemd/initrd: Fix emergencyAccess to work with `null`.
2024-08-19 14:44:25 +03:00
nikstur
0a810476ad
Merge pull request #307528 from WilliButz/systemd-initrd/tmpfiles-settings
nixos/systemd-tmpfiles: add initrd support
2024-08-19 11:54:42 +02:00
Kerstin Humm
1592790b03
nixos/mastodon: use correct postgresql package 2024-08-19 11:06:57 +02:00
Kerstin Humm
14fbed4b70
nixos/mastodon: don't pin postgresql version for test 2024-08-19 11:06:57 +02:00
schnusch
d8c7f81279 nixos/cgit: test list settings type 2024-08-19 08:13:49 +02:00
euxane
1768115589 nixos/cgit: handle list setting type
The cgitrc file allows list of values to be set for some keys as
multiple definition lines.

This allows setting multiple "css" files to include or multiple
"readme" branch and file lookup paths to be set.
2024-08-19 08:13:49 +02:00
Will Fancher
f84991dc2b
Merge pull request #334288 from ElvishJerricco/systemd-initrd-fully-merge-sbin
Systemd initrd fully merge sbin
2024-08-18 22:41:53 -04:00
Gabriella Gonzalez
79e5dbb262 Restore check for container not defining nixpkgs.hostPlatform option 2024-08-18 17:00:16 -07:00
Gabriella Gonzalez
0600255046 Use host.pkgs.stdenv.hostPlatform 2024-08-18 16:49:57 -07:00
Gabriella Gonzalez
de83fcb2df containers.*.config: reuse host nixpkgs.pkgs if defined
The minimum reproduction for the problem I'm trying to solve is that
the following NixOS test with a trivial NixOS container:

```
{ inputs = {
    nixpkgs.url = "github:NixOS/nixpkgs/24.05";

    flake-utils.url = "github:numtide/flake-utils/v1.0.0";
  };

  outputs = { flake-utils, nixpkgs, self, ... }:
    flake-utils.lib.eachDefaultSystem (system: {
      checks.default = nixpkgs.legacyPackages."${system}".nixosTest {
        name = "test";

        nodes.machine.containers.tutorial.config = { };

        testScript = "";
      };
    });
}
```

… fails with the following error message:

```
error: Neither nodes.machine.nixpkgs.hostPlatform nor the legacy option nodes.machine.nixpkgs.system has been set.
You can set nodes.machine.nixpkgs.hostPlatform in hardware-configuration.nix by re-running
a recent version of nixos-generate-config.
The option nodes.machine.nixpkgs.system is still fully supported for NixOS 22.05 interoperability,
but will be deprecated in the future, so we recommend to set nodes.machine.nixpkgs.hostPlatform.
```

The root of the problem appears to be that in
`nixos/modules/virtualisation/nixos-containers.nix` there is support
for deriving the guest's `nixpkgs.hostPlatform` or
`nixpkgs.localSystem` from the corresponding host's values, but this
doesn't work if the host sets `nixpkgs.pkgs` instead of one of those
values.  In fact, this is what happens when using `pkgs.nixosTest`
(which sets `nixpkgs.pkgs` in
`pkgs/build-support/testers/default.nix`).

The solution I went with was to forward the `nixpkgs.pkgs` setting from
the host to the guest, but only if it is defined (matching the same
treatment as `nixpkgs.hostPlatform` and `nixpkgs.localSystem`.
2024-08-18 11:32:46 -07:00
Sandro
69701a3807
Merge pull request #320060 from PatrickDaG/homebox
homebox: init at 0.13.0; nixos/homebox: init
2024-08-18 16:32:43 +02:00
Sandro
c67dbda54f
Merge pull request #308700 from tie/pgbouncer-settings
nixos/pgbouncer: add services.pgbouncer.settings option
2024-08-18 16:30:17 +02:00
Masum Reza
94c30e543d
Merge pull request #335115 from SuperSandro2000/graphical-desktop
nixos/graphical-desktop: add enable option, nixos/wayland-session: use graphical-desktop option and remove implicit defaults
2024-08-18 17:20:55 +05:30
Masum Reza
3f08237ceb
Merge pull request #296607 from Yusuf-Duran/add-iio-hyprland
iio-hyprland: init at 0-unstable-2024-07-24; nixos/iio-hyprland: init module
2024-08-18 17:19:20 +05:30
Sandro
c2d5ecc504
nixos/displayManager: mention how to get a list of currently available desktop sessions (#335208) 2024-08-18 17:17:01 +05:30
Adam C. Stephens
526d11e357
Merge pull request #335366 from adamcstephens/incus/publish-squashfs
incus: publish squashfs image to hydra
2024-08-17 19:06:02 -04:00
Linus Karl
d2367c3f7e indi-full: refactor 3rdparty drivers
This splits the 3rdparty drivers into seperate
packages as recommended by upstream. This also
allows to build a indi-full equivalent with only
the needed drivers. Also add indi-full-nonfree
with all the nonfree drivers. And remove them
from indi-full.
2024-08-18 01:05:52 +02:00
Peder Bergebakken Sundt
e471916645
treewide: passthru nixos test (#334491) 2024-08-18 00:29:43 +02:00
Adam C. Stephens
062b5b645d
Merge pull request #335441 from emilylange/nixos-forgejo-pam
forgejo,forgejo-lts: remove PAM support
2024-08-17 17:15:34 -04:00
Sandro Jäckel
4f34325b2b
nixos/wayland-session: use graphical-desktop option and remove implicit defaults 2024-08-17 23:11:37 +02:00
Sandro Jäckel
57507a521a
nixos/graphical-desktop: add enable option 2024-08-17 23:11:37 +02:00
Yusuf
228660743a
nixos/iio-hyprland: init module 2024-08-18 01:18:23 +05:30
emilylange
07641a91c9
forgejo,forgejo-lts: remove PAM support
https://forgejo.org/docs/latest/user/authentication/#pam-pluggable-authentication-module

PAM support has to be enabled at compile time and upstream considers it
opt-in.

Official upstream binaries have it disabled.

We enabled it by default because we simply inherited most of it from
Gitea when the split in nixpkgs happened.

Reasons why it had been enabled in nixpkgs for Gitea are unknown.

See 9406f240a7.

There is reason to believe not a single Forgejo instance running on
NixOS uses this feature because it literally segfaults due to our
sandboxing.
2024-08-17 21:07:23 +02:00
Sigmanificient
422d853079 liboop: drop
fix

liboop: drop
2024-08-17 21:06:45 +02:00
Masum Reza
e6db763dde
Merge pull request #335398 from JohnRTitor/hypridle-service
nixos/hypridle: switch to package provided user service file
2024-08-17 23:11:27 +05:30
John Titor
077938f18b
nixos/hypridle: switch to package provided user service file
format with nixfmt-rfc-style
2024-08-17 20:51:36 +05:30
Adam Stephens
659308a8c1
nixos/incusContainer: create hydra build product 2024-08-17 09:01:17 -04:00
Adam Stephens
9277993de4
make-squashfs: add support for generating hydra build products
left default to write the image directly to the store, but enabling hydraBuildProduct
will create $out as a directory
2024-08-17 09:00:43 -04:00
Jörg Thalheim
aa994dd296 harmonia: switch to non-deprecated SIGN_KEY_PATHS 2024-08-17 13:11:06 +02:00
Jörg Thalheim
5d500e3d51
Merge pull request #335283 from Enzime/fix/regreet
regreet: fix theming options not under GTK header
2024-08-17 12:26:35 +02:00
Michael Hoang
3ffc982bfa regreet: don't allow settings to be a path 2024-08-17 14:32:49 +10:00
Michael Hoang
5ee778d424 regreet: fix theming options not under GTK header
Fixes #335082
2024-08-17 14:29:45 +10:00
Emily
00f9b25737
Merge pull request #325813 from SamLukeYes/xonsh
xonsh: fix wrapper, 0.17.0 -> 0.18.2
2024-08-16 22:53:01 +01:00
Morgan Jones
99714ac2fc
nixos/nebula: add missing with maintainers 2024-08-16 12:13:40 -07:00
Fabián Heredia Montiel
2c94341824
Merge pull request #328532 from LeSuisse/openstack-config-no-default-root-password
openstack-config: remove hardcoded default password for the root account
2024-08-16 12:30:12 -06:00
Pol Dellaiera
835b2f8822
nixos/chromadb: init 2024-08-16 18:23:12 +02:00
Rafael Fernández López
058e8f5ef1
nvidia-podman: remove nvidia wrapper
Since version 4.1.0, podman has support for CDI, and is the
recommended way to expose GPU's for containers for podman.

More information: https://web.archive.org/web/20240729183805/https://docs.nvidia.com/datacenter/cloud-native/container-toolkit/latest/install-guide.html#configuring-podman
2024-08-16 18:16:23 +02:00
abysssol
5f17f87a7f nixos/ollama: move loadModels script into a separate service
Due to the large size of models, the script can run for a long time,
which can cause timeouts, since the startup phase has a time limit.
2024-08-16 11:36:35 -04:00
Adam C. Stephens
c49d0387e0
Merge pull request #251598 from oddlama/feat-kanidm-provision
nixos/kanidm: add basic provisioning
2024-08-16 10:15:22 -04:00
Rafael Fernández López
f7b4d57421
virtualisation/docker: fix nvidia wrapper
Although CDI should be used in order to not require container runtime
wrappers anymore, fix the nvidia-container-runtime integration with
Docker for cases when Docker < 25.
2024-08-16 15:49:35 +02:00
K900
0d331a43ff
Merge pull request #335066 from K900/pipewire-limits
nixos/pipewire: install the default limits config, make group always exist
2024-08-16 16:38:20 +03:00
Franz Pletz
4bd91be1ad
Merge pull request #333462 from Luflosi/nixos-iperf3-package-option 2024-08-16 14:46:53 +02:00
oddlama
558fa6abc6
nixos/kanidm: add provisioning of groups, persons and oauth2 systems 2024-08-16 14:12:35 +02:00
superherointj
d634a501b1
Merge pull request #334630 from rorosen/k3s-1.28.12
k3s_1_28: 1.28.11+k3s2 -> 1.28.12+k3s1
2024-08-16 08:06:15 -03:00
K900
333e6672e1 nixos/pipewire: install the default limits config, make group always exist 2024-08-16 12:00:08 +03:00
Jörg Thalheim
d9e8fc4b72
Merge pull request #323785 from Mic92/zerotier
nixos/zerotierone: clean up local.conf symlinks unconditionally
2024-08-16 09:35:35 +02:00
Robert Rose
d506595e43 nixos/k3s: use jq instead of JSONpath to process test data
Although kubectl has builtin JSONpath support, it is only supported
partially and the support varies between different versions. While using
JSONpath in tests worked for some versions, it failed for others. This
contribution replaces the problematic JSONpath usages with the jq JSON
processor.
2024-08-16 08:37:15 +02:00
Peder Bergebakken Sundt
db16f389ab
Merge pull request #334508 from pbsds/fix-taskserver-1723599512
nixos/taskserver: fix test eval
2024-08-16 00:44:26 +02:00
OPNA2608
95461ff6c6 tests/ayatana-indicators: Finalise for differences in ayatana vs lomiri indicators 2024-08-15 22:10:56 +02:00
OPNA2608
712439f971 tests/ayatana-indicators: Prepare for differences in ayatana vs lomiri indicators 2024-08-15 22:10:25 +02:00
OPNA2608
cc01673c23 tests/ayatana-indicators: nixfmt, modernise 2024-08-15 22:06:15 +02:00
OPNA2608
4403f7f6c3 nixos/ayatana-indicators: Support new passthru.ayatana-indicators format 2024-08-15 20:52:04 +02:00
Jonathan Davies
a289e52ce1
apacheKafka: init 3.8.0 2024-08-15 17:28:12 +01:00
Emily
f651cf8481
Merge pull request #334726 from networkException/revert-programs-chromium-package
nixos/chromium: revert having `programs.chromium.enable` insert `pkgs.chromium` into the system closure
2024-08-15 14:22:13 +02:00
Sandro
bbbc7bcdb3
Merge pull request #331784 from SuperSandro2000/pam-motd-writeText
nixos/pam: fix writeFile no longer taking null as an argument warning
2024-08-15 09:32:42 +02:00
networkException
2c8c689cd7
Revert "nixos/chromium: Make programs.chromium.enable install chromium"
This reverts commit 93b6400ff5.

Putting chromium in the system closure by enabling the module breaks
previous expectations of module users. Previously, this would create
policy files for chromium, google-chrome and brave as chromium based
browsers.

Use cases relating to a browser other than chromium directly as well
as only using home-manager's module system to configure other aspects
of a chromium package (various use cases require overriding inputs
to the chromium derivation) were not covered by this breaking change.

More design is needed before having policy and package options coexist
properly in this module.
2024-08-15 02:26:31 +02:00
networkException
2f1a499d26
Revert "nixos/chromium: Update description for programs.chromium.enable"
This reverts commit 80656f196d.

The main change to be reverted depends on this change, see the following
commit.
2024-08-15 02:25:31 +02:00
a-kenji
0f13d8a4ba nixos/unbound: fix typos in description and comment 2024-08-14 23:53:58 +02:00
Thiago Kenji Okada
33c968004c
Merge pull request #333678 from thiagokokada/sx-add-as-xsession
sx: add desktop file and providedSessions
2024-08-14 21:29:39 +01:00
superherointj
53b0c8af91
Merge pull request #334697 from rorosen/k3s-test-timeout
nixos/k3s: increase timeout in tests
2024-08-14 17:05:32 -03:00
Doron Behar
6bfd71d2b5
Merge pull request #318892 from doronbehar/pkg/taskwarrior3
nixosTests.taskchampion-sync-server: init
2024-08-14 19:43:33 +00:00
Robert Rose
69e2e82ba0 nixos/k3s: increase timeout in tests
Increase the timout for the import of container images in the `airgap-images`
test from 60s to 120s to counter flaky tests.
2024-08-14 21:01:19 +02:00
Maximilian Bosch
d86f963742
Merge pull request #329657 from flyingcircusio/mailpit-module
nixos/mailpit: init
2024-08-14 17:37:54 +02:00
Maximilian Bosch
f07601ce07
nixos/mailpit: fix defaults for listen/smtp 2024-08-14 16:12:57 +02:00
Maximilian Bosch
d2fca016fe
Merge pull request #331717 from alyssais/linux-6.9-drop
linux_6_8,linux_6_9: remove
2024-08-14 16:04:30 +02:00
OPNA2608
8c1cb41408 nixos/lomiri: Add gallery app 2024-08-14 15:54:36 +02:00
OPNA2608
cb0faa488a tests/lomiri-gallery-app: init 2024-08-14 15:26:08 +02:00
Martin Weinelt
9ccfa87721
Merge pull request #332764 from NixOS/staging-next
staging-next 2024-08-06
2024-08-14 13:33:28 +02:00
Emily
57d0d4a8f3
Merge pull request #334526 from ElvishJerricco/revert-boot-counting-again-sadface
systemd-boot: Revert boot counting again
2024-08-14 12:19:55 +01:00
Pol Dellaiera
302b8650e5
Merge pull request #334371 from nixupp/patch-1
nixos/openwebui: add link to description
2024-08-14 12:02:02 +02:00
Maximilian Bosch
15dab820a6
nixos/mailpit: allow multiple instances
Now it's possible to start multiple mailpit instances - for e.g.
multiple testing environments - on the same machine:

    {
      services.mailpit.instances = {
        dev = { /* ... */ };
        staging = { /* ... */ };
      };
    }

The simplest way to start a single instance is by declaring

    services.mailpit.instances.default = {};
2024-08-14 11:33:52 +02:00
Maximilian Bosch
a2437d8075
nixos/mailpit: init
Simple module to configure a systemd service for mailpit.
2024-08-14 11:33:52 +02:00
Eduard Bachmakov
b33bf6b99a nixos/systemd/initrd: Fix emergencyAccess to work with null.
Implementation is now compatible with the option's .type already defined.

This allows us to pass `config.users.users.<user>.hashedPassword` even if this is null (the default).

Before:
true  => access
false => no access
hash  => access via password
null  => eval error

After:
true  => access
false => no access
hash  => access via password
null  => no access
2024-08-14 10:26:15 +02:00
github-actions[bot]
261f1edcbd
Merge master into staging-next 2024-08-14 06:01:07 +00:00
Yarny0
cdd7496ff3 foomatic-db: unstable-2024-05-04 -> unstable-2024-08-13
This update renames Utax ppd files to avoid spaces in filenames.
Since this is an incompatible change,
we also add a hint in the release notes.
2024-08-14 07:30:17 +02:00
Doron Behar
e58e0e1d95 doc: mention Taskwarrior 3 in taskserver module docs & in release notes 2024-08-14 08:06:11 +03:00
Doron Behar
2c40948c73 nixosTests.taskchampion-sync-server: init 2024-08-14 08:06:11 +03:00
Doron Behar
ecf4caea3f nixos/taskchampion-sync-server: init
Co-authored-by: Mohamed Laradji <mlaradji@proton.me>
2024-08-14 08:06:11 +03:00
Doron Behar
54698e8db6 taskwarrior2: rename from taskwarrior, with a warning alias
Also remove an outdated link in `taskserver/default.md`.
2024-08-14 08:06:10 +03:00
Will Fancher
0637303ca8 Revert "Merge pull request #330017 from Mic92/boot-counting"
This reverts commit 3d3c0f4d34, reversing
changes made to 47f7e25a77.
2024-08-13 23:11:18 -04:00
Nick Cao
12f650234b
Merge pull request #334257 from Dan-Theriault/miniflux-no-admin-required
nixos/miniflux: make admin provisioning optional
2024-08-13 21:54:34 -04:00
Peder Bergebakken Sundt
024600b390 nixos/taskserver: fix test eval
Error was:

```
error:
Failed assertions:
- Specialisation names can only contain alphanumeric characters and underscores
Invalid specialisation names: manual-config
```

Using nix (Lix, like Nix) 2.90.0
2024-08-14 03:40:36 +02:00
Will Fancher
b78bd2f912 Revert "Merge pull request #333952 from r-vdp/specialisation-name-regex"
This reverts commit fc35704bc8, reversing
changes made to c67d90d517.
2024-08-13 21:33:15 -04:00
github-actions[bot]
ae6040d6a6
Merge master into staging-next 2024-08-14 00:02:32 +00:00
Dan Theriault
f6788b6165 nixos/miniflux: make admin provisioning optional
Miniflux supports provisioning users via SSO, which renders admin
accounts unnecessary for some use-cases. This change retains the
existing default, but makes it easier to disable admin provisioning.
2024-08-13 18:56:16 -04:00
Someone
f9a85112f5
Merge pull request #334340 from eljamm/nvidia-open
nixos/nvidia: fix CUDA for open driver
2024-08-13 19:35:46 +00:00
Pol Dellaiera
a0a63aa8d4
Merge pull request #332593 from mzacho/master
nixos/modules/services/mail: add protonmail-bridge service
2024-08-13 21:08:24 +02:00
Pol Dellaiera
c556059765
Merge pull request #334344 from truh/docs/oci-containers-docs-urls
nixos/oci-containers: replace broken links to docker docs
2024-08-13 20:44:55 +02:00
github-actions[bot]
35c1846996
Merge master into staging-next 2024-08-13 18:01:28 +00:00
Philip Taron
04a8c1e764
Merge pull request #328030 from Wulfsta/swap-status 2024-08-13 07:05:46 -07:00
Adam C. Stephens
7e95d0361c
Merge pull request #333730 from adamcstephens/incus/from-lxd
nixos/incus: add incus-only vm and container images
2024-08-13 08:39:26 -04:00
nixupp
876cfeddfc
nixos/openwebui: add link to description 2024-08-13 12:18:54 +00:00
Martin Weinelt
0906206d42
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
- pkgs/top-level/python-packages.nix
2024-08-13 13:21:03 +02:00
WilliButz
8dd369f524
nixos/systemd-tmpfiles: add initrd support
This adds support for declaring tmpfiles rules exclusively for the
systemd initrd. Configuration is possible through the new option
`boot.initrd.systemd.tmpfiles.settings` that shares the same interface as
`systemd.tmpfiles.settings`.

I did intentionally not replicate the `rules` interface here, given that
the settings attribute set is more versatile than the list of strings
used for `rules`. This should also make it unnecessary to implement the
workaround from 1a68e21d47 again.

A self-contained `tmpfiles.d` directory is generated from the new initrd
settings and it is added to the initrd as a content path at
`/etc/tmpfiles.d`.

The stage-1 `systemd-tmpfiles-setup.service` is now altered to no longer
operate under the `/sysroot` prefix, because the `/sysroot` hierarchy
cannot be expected to be available when the default upstream service is
started.

To handle files under `/sysroot` a slightly altered version of the
upstream default service is introduced. This new unit
`systemd-tmpfiles-setup-sysroot.service` operates only under the
`/sysroot` prefix and it is ordered between `initrd-fs.target` and the
nixos activation.

Config related to tmpfiles was moved from initrd.nix to tmpfiles.nix.
2024-08-13 13:02:21 +02:00
eljamm
4548c39286
nixos/nvidia: fix CUDA for open driver
For the open driver, the `nvidia-uvm` module does not auto-load after
`nvidia`, which makes CUDA not work.

In this case, we need to add it to `boot.kernelModules` for it to work
again.
2024-08-13 11:56:10 +01:00
Jakob Klepp
0b8954f8d2 nixos/oci-containers: replace broken links to docker docs
Old links in descriptions now lead to 404 pages.
2024-08-13 11:49:08 +02:00
Sarah Brofeldt
ba99ba8ea7
Merge pull request #327914 from 0z13/nvidia-container-toolkit-device-name
nixos/nvidia-container-toolkit: add device-name-strategy option
2024-08-13 10:41:45 +02:00
superherointj
3a158316b8
Merge pull request #332183 from codedownio/k3s-containerd-config
nixos/k3s: add containerdConfigTemplate option
2024-08-13 04:03:59 -03:00
Kerstin Humm
13c96978c3 nixos/weblate: init module and test
Co-authored-by: Taeer Bar-Yam <Radvendii@users.noreply.github.com>
2024-08-13 08:44:54 +02:00
Will Fancher
208e953381 systemd-stage-1: Fully merge /bin and /sbin
In #327506, we stopped using `/sbin` in the `pathsToLink` of `initrdBinEnv`. This inadvertantly stopped including the `sbin` directory of the `initrdBin` packages, which meant that things like `mdadm`'s udev rules, which referred to binaries by their `sbin` paths, stopped working.

The purpose of #327506 was to fix the fact that `mount` was not calling mount helpers like `mount.ext4` unless they happened to be in `/sbin`. But this raised some questions for me, because I thought we set `managerEnvironment.PATH` to help util-linux find helpers for both `mount` and `fsck`. So I decided to look at how this works in stage 2 to figure it out, and it's a little cursed.

---

What I already knew is that we have [this](696a4e3758/nixos/modules/system/boot/systemd.nix (L624-L625))

```
        # util-linux is needed for the main fsck utility wrapping the fs-specific ones
        PATH = lib.makeBinPath (config.system.fsPackages ++ [cfg.package.util-linux]);
```

And I thought this was how `mount` finds the mount helpers. But if that were true, then `mount` should be finding helpers in stage 1 because of [this](696a4e3758/nixos/modules/system/boot/systemd/initrd.nix (L411))

```
      managerEnvironment.PATH = "/bin";
```

Turns out, `mount` _actually_ finds helpers with [this configure flag](696a4e3758/pkgs/os-specific/linux/util-linux/default.nix (L59))

```
    "--enable-fs-paths-default=/run/wrappers/bin:/run/current-system/sw/bin:/sbin"
```

Ok... so then why do we need the PATH? Because `fsck` has [this](a75c7a102e/disk-utils/fsck.c (L1659))

```
	fsck_path = xstrdup(path && *path ? path : FSCK_DEFAULT_PATH);
```

(`path` is `getenv("PATH")`)

So, tl;dr, `mount` and `fsck` have completely unrelated search paths for their helper programs

For `mount`, we have to use a configure flag to point to `/run/current-system`, and for `fsck` we can just set PATH

---

So, for systemd stage 1, we *do* want to include packages' `sbin` paths, because of the `mdadm` problem. But for `mount`, we need helpers to be on the search path, and right now that means putting it somewhere in `/run/wrappers/bin:/run/current-system/sw/bin:/sbin`.
2024-08-12 23:35:01 -04:00
Will Fancher
d74d182991 Revert "systemd-stage-1: Use common bin for /sbin"
This reverts commit b4b4751e97.
2024-08-12 23:35:01 -04:00
github-actions[bot]
0a1ac11214
Merge master into staging-next 2024-08-13 00:02:23 +00:00
Will Fancher
bcd1d9cf54
Merge pull request #312755 from tomfitzhenry/systemd-dhcp108
nixos/networkd: allow IPv6OnlyPreferredSec in networkd.conf
2024-08-12 19:19:34 -04:00
Tom McLaughlin
81c0783c0e nixos/k3s: add containerdConfigTemplate option 2024-08-12 14:58:18 -07:00
github-actions[bot]
62f43c3094
Merge master into staging-next 2024-08-12 18:02:11 +00:00
Philip Taron
c44e170e3f
nixos/proxmox-lxc: lib.mdDoc is deprecated 2024-08-12 08:02:57 -07:00
Philip Taron
5c21c35835
nixos/borgmatic: lib.mdDoc is deprecated 2024-08-12 08:02:10 -07:00
Florian
20d3d501ad
Merge pull request #290913 from flandweber/borgmatic-improvement
nixos/borgmatic: added test
2024-08-12 15:37:12 +02:00
K900
0ed621ef5d
Merge pull request #334121 from r-vdp/specialisation-fix-acme
acme: fix test
2024-08-12 16:01:16 +03:00
Sandro
e32c796ff7
Merge pull request #332541 from SuperSandro2000/mailman-relay-assert
nixos/mailman: allow setting relay domains with services.postfix.conf…
2024-08-12 14:37:53 +02:00
r-vdp
f09a62f122
acme: fix test after fc35704bc8 2024-08-12 14:04:09 +02:00
github-actions[bot]
8674a36b01
Merge master into staging-next 2024-08-12 12:01:27 +00:00
Florian Klink
fc35704bc8
Merge pull request #333952 from r-vdp/specialisation-name-regex
specialisation: limit the allowed characters in specialisation names
2024-08-12 13:30:54 +03:00
github-actions[bot]
dc79586bdf
Merge master into staging-next 2024-08-12 00:02:44 +00:00
Gavin John
80656f196d
nixos/chromium: Update description for programs.chromium.enable 2024-08-11 19:37:51 -04:00
Jan Tojnar
54b056a950 nixos/metacity: Avoid top-level with 2024-08-12 00:29:13 +02:00
Jan Tojnar
f192bd9e5c metacity: Move from gnome scope to top-level 2024-08-12 00:29:13 +02:00
Jan Tojnar
64438363f5 gnome-shell-extensions: Move from gnome scope to top-level 2024-08-12 00:29:11 +02:00
Jan Tojnar
a0d15e0d04 gdm: Move from gnome scope to top-level 2024-08-12 00:29:11 +02:00
Jan Tojnar
db9ae25dca gnome-initial-setup: Move from gnome scope to top-level 2024-08-12 00:29:11 +02:00
Jan Tojnar
d364738c76 quadrapassel: Move from gnome scope to top-level 2024-08-12 00:29:10 +02:00
Jan Tojnar
1f3f0c2e4b tali: Move from gnome scope to top-level 2024-08-12 00:29:10 +02:00
Jan Tojnar
077dd2b94c swell-foop: Move from gnome scope to top-level 2024-08-12 00:29:08 +02:00
Jan Tojnar
5db162af3a lightsoff: Move from gnome scope to top-level 2024-08-12 00:29:07 +02:00
Jan Tojnar
31a54e038c iagno: Move from gnome scope to top-level 2024-08-12 00:29:07 +02:00
Jan Tojnar
8c4f0fc73e hitori: Move from gnome scope to top-level 2024-08-12 00:29:06 +02:00
Jan Tojnar
e0795cb2de gnome-tetravex: Move from gnome scope to top-level 2024-08-12 00:29:06 +02:00
Jan Tojnar
f26fb6acad gnome-taquin: Move from gnome scope to top-level 2024-08-12 00:29:06 +02:00
Jan Tojnar
d988332cd4 gnome-sudoku: Move from gnome scope to top-level 2024-08-12 00:29:05 +02:00
Jan Tojnar
82a1d2ed24 gnome-robots: Move from gnome scope to top-level 2024-08-12 00:29:05 +02:00
Jan Tojnar
b76db173df gnome-nibbles: Move from gnome scope to top-level 2024-08-12 00:29:04 +02:00
Jan Tojnar
3811546639 gnome-mines: Move from gnome scope to top-level 2024-08-12 00:29:04 +02:00
Jan Tojnar
828635c725 gnome-mahjongg: Move from gnome scope to top-level 2024-08-12 00:29:04 +02:00
Jan Tojnar
b4e480f919 gnome-klotski: Move from gnome scope to top-level 2024-08-12 00:29:03 +02:00
Jan Tojnar
fa58a27b35 gnome-chess: Move from gnome scope to top-level 2024-08-12 00:29:03 +02:00
Jan Tojnar
076fe09eeb four-in-a-row: Move from gnome scope to top-level 2024-08-12 00:29:02 +02:00
Jan Tojnar
31b95b8251 five-or-more: Move from gnome scope to top-level 2024-08-12 00:29:02 +02:00
Jan Tojnar
fcd5e77e53 atomix: Move from gnome scope to top-level 2024-08-12 00:29:02 +02:00
Jan Tojnar
659c2ac87e aisleriot: Move from gnome scope to top-level 2024-08-12 00:29:01 +02:00
Jan Tojnar
18859a6bad gnome-remote-desktop: Move from gnome scope to top-level 2024-08-12 00:29:01 +02:00
Jan Tojnar
967bb64c16 gnome-software: Move from gnome scope to top-level 2024-08-12 00:29:00 +02:00
Jan Tojnar
138941d672 gnome-color-manager: Move from gnome scope to top-level 2024-08-12 00:28:59 +02:00
Jan Tojnar
6e8760f7f7 gnome-backgrounds: Move from gnome scope to top-level 2024-08-12 00:28:58 +02:00