Commit Graph

41392 Commits

Author SHA1 Message Date
tomf
b2b3f5d68d
nixos/oci-containers: add preRunExtraOptions (#315356)
`podman --help` and `docker --help` each have global options, that
must be specified before `run`.
2024-06-05 18:18:37 -04:00
Vladimír Čunát
bb0a4e8786
nixos/release-combined: fix evaluation 2024-06-05 17:50:37 +02:00
Bobby Rong
a53e9cab22
Merge pull request #317428 from a-kenji/virtualbox-host-typo
nixos/virtualbox-host: fix typo in assertion
2024-06-05 22:11:14 +08:00
Adam C. Stephens
af4ac075a3
Merge pull request #312523 from emilylange/nixos-forgejo-secrets
nixos/forgejo: refactor secrets, add `cfg.secrets`, forgejo: build `environment-to-ini`, nixos/tests/forgejo: test `cfg.secrets` using /metrics endpoint
2024-06-05 10:01:37 -04:00
a-kenji
406e613b95 nixos/virtualbox-host: fix typo in assertion 2024-06-05 14:04:03 +02:00
Thomas Gerbet
ef6fea2d86 openssh: move Kerberos support into a dedicated package
The `openssh` and `openssh_hpn` packages are now built without
the Kerberos support by default in an effort to reduce the attack surface.

The Kerberos support is likely used only by a fraction of the total users
(I'm guessing mainly users integrating SSH in an Active Directory env) so
dropping it should not impact too many users. It should also be noted that
the Kerberos/GSSAPI auth is disabled by default in the configuration.
`opensshWithKerberos` and `openssh_hpnWithKerberos` are added in order
to provide an easy migration path for users needing this support.

The `openssh_gssapi` package is kept untouched.
2024-06-05 19:45:31 +10:00
Florian Klink
40066ba0d8
Merge pull request #316168 from dawidd6/systemd-user-generators
nixos/systemd: link user-generators
2024-06-05 09:59:29 +02:00
Jörg Thalheim
7d98bbfcd5
Merge pull request #315827 from JohnRTitor/hyprland-module
nixos/{hyprland, wayland-common}: disable wlr portal for hyprland, enable xdg autostart for all wayland compositors
2024-06-05 09:57:53 +02:00
Jörg Thalheim
9028937bc4
Merge pull request #317347 from Prince213/doc-bootspec
nixos/activation/bootspec: misc fixes
2024-06-05 09:56:54 +02:00
Pol Dellaiera
133aa44c38
Merge pull request #317286 from drupol/open-webui-add-more-env
nixos/{ollama,open-webui}: minor service update
2024-06-05 09:12:28 +02:00
Pol Dellaiera
309451127f
nixos/open-webui: update options default values 2024-06-05 08:05:19 +02:00
Pol Dellaiera
5664bb7899
nixos/open-webui: add example in options 2024-06-05 08:05:18 +02:00
Pol Dellaiera
a8670536e5
nixos/open-webui: remove preStart step
nixos/open-webui: remove `preStart` step
2024-06-05 08:05:18 +02:00
Pol Dellaiera
61ab4de94c
nixos/open-webui: update option and service descriptions 2024-06-05 08:05:18 +02:00
Pol Dellaiera
709eb8ebaf
nixos/open-webui: add openFirewall option 2024-06-05 08:05:18 +02:00
Pol Dellaiera
8ea262601a
nixos/open-webui: add release note entry 2024-06-05 08:05:18 +02:00
Pol Dellaiera
c54890e226
nixos/ollama: update port option, use types.port 2024-06-05 08:05:18 +02:00
Pol Dellaiera
cb8670469b
nixos/ollama: add openFirewall option 2024-06-05 07:09:13 +02:00
Sizhe Zhao
5209c84957
nixos/activation/bootspec: fix style 2024-06-05 11:14:36 +08:00
Sizhe Zhao
4f05b8e213
nixos/activation/bootspec: rephrase 2024-06-05 11:13:43 +08:00
Sizhe Zhao
3a4753867d
nixos/activation/bootspec: no longer experimental 2024-06-05 11:09:55 +08:00
Sizhe Zhao
0aaccaa596
nixos/activation/bootspec: now enabled by default 2024-06-05 11:06:03 +08:00
emilylange
ac20219508
nixos/rl-2411: add services.forgejo.secrets
and the accompanying `services.forgejo.mailerPasswordFile` deprecation.
2024-06-05 01:05:47 +02:00
emilylange
fd58d2299b
nixos/tests/forgejo: test cfg.secrets using /metrics endpoint
Heavily inspired by b59e5a34e7 (gitea).
2024-06-05 00:46:00 +02:00
emilylange
694db856ed
nixos/forgejo: refactor secrets, add cfg.secrets
This is not a breaking change. Existing setups continue to work as-is.

Users of `cfg.mailerPasswordFile` will get an option rename/deprecation
warning, but that's it (assuming there is no regression).

This adds `cfg.secrets`, which is a wrapper over systemd's
`LoadCredential=` leveraging Forgejo's `environment-to-ini`.

`environment-to-ini` is intended for configuring Forgejo in OCI
containers.

It requires some fairly annoying escaping of the section names to fit
into the allowed environment variable charset.

E.g. `"log.console".COLORIZE = false` becomes
`FORGEJO__LOG_0x2E_CONSOLE__COLORIZE=false`.

 - `.` needs to be replaced with `_0X2E_` and
 - `-` needs to be replaced with `_0X2D_`

Those are simply the hex representation of each char from an ASCII
table:

. = ASCII 46 = 46 (decimal) = 2E (hex) = 0x2E = _OX2E_

To make interacting with `environment-to-ini` less annoying, we template
and escape the sections/keys in nix:

`cfg.secrets` takes the same free-form sections/keys as `cfg.settings`.
Meaning there is now a generalized abstraction for all keys, not just
those that have been manually implemented in the past.

It goes as far as theoretically allowing one to have `DEFAULT.APP_NAME`
read from a secret file.

I don't know why one would want to do that, but it has been made
possible by this :^)

More reasonable examples are listed in the `cfg.secrets` option example.

We also continue to bootstrap a handful of secrets like
`security.SECRET_KEY`. This is done is a sort of sidecar bootstrap unit
fittingly called `forgejo-secrets.service`.

Overriding those is, just like before, not really intended and requires
the use of `lib.mkForce` and might lead to breakage. But it is, in a
way, more possible than before.
2024-06-05 00:45:59 +02:00
nikstur
1baf7d7e4e
Merge pull request #314890 from danielbarter/repart-image-fix
repart-image: remove --map-root-user flag from unshare
2024-06-04 22:28:05 +02:00
Nick Cao
5032dc9bc3
Merge pull request #317038 from abmantis/patch-5
nixos/nvidia-optimus: add nvidia-modeset to blacklist
2024-06-04 16:10:52 -04:00
kirillrdy
dfee75c298
Merge pull request #309121 from jlbribeiro/pkgs/zx-8.0.2
zx: 7.2.3 -> 8.1.2
2024-06-05 06:07:55 +10:00
Arian van Putten
605418f9b1
Merge pull request #317257 from arianvp/stephank-fix-acme2
nixos/acme: allow setting security.acme.defaults.server = null to keep old accounts directory
2024-06-04 21:58:25 +02:00
K900
840914c324
Merge pull request #317268 from SuperSandro2000/plasma6-cups
nixos/plasma6: make print-manager depend on cups
2024-06-04 22:18:59 +03:00
Maximilian Bosch
7e2210236e
Merge pull request #316004 from Ma27/nc-memlimit
nixos/nextcloud: make memory_limit of nextcloud-cron configurable
2024-06-04 19:18:03 +00:00
Sandro Jäckel
7c39d372f7 nixos/plasma6: make print-manager depend on cups 2024-06-04 20:50:06 +02:00
Arian van Putten
f8439331dc doc/release-notes: Add note about backwards compatibility in ACME module
Co-authored-by: Stéphan Kochen <git@stephank.nl>
2024-06-04 20:23:30 +02:00
Stéphan Kochen
d1f07e6382 nixos/acme: allow setting security.acme.defaults.server = null to keep old accounts directory
The accounts directory is based on the hash of the settings.

https://github.com/NixOS/nixpkgs/pull/270221 changed the  default of
security.acme.defaults.server from null to the default letsencrypt URL
however as an unwanted side effect this means the accounts directory
changes and the ACME module will create a new a new account.

This can cause issues with people using CAA records that pin the
account ID or people who have datacenter-scale NixOS deployments

We allow setting this option to null again for people who want
to keep the old account and migrate at their own leisure.

Fixes https://github.com/NixOS/nixpkgs/issues/316608

Co-authored-by: Arian van Putten <arian.vanputten@gmail.com>
2024-06-04 20:09:46 +02:00
Pol Dellaiera
6b6d4aeb35
Merge pull request #316248 from shivaraj-bh/open-webui
open-webui: init at 0.2.4
2024-06-04 15:47:03 +02:00
Jörg Thalheim
f3ad1f2937 nixos-small: fix eval 2024-06-04 14:07:11 +02:00
shivaraj-bh
f66cb82fef nixos/open-webui: init 2024-06-04 16:46:19 +05:30
Jörg Thalheim
7c503a8a9d
Merge pull request #315927 from Artturin/movetestsnix1
nixosTests.nix-misc: split from nixosTests.misc
2024-06-04 10:18:25 +02:00
Bobby Rong
6051698052
Merge pull request #314695 from nonetrix/patch-1
nixos/xdg/portal: Fix typo
2024-06-04 13:27:16 +08:00
Adam C. Stephens
72f73120fc
Merge pull request #316162 from adamcstephens/lxd/vm-cfg-rw
lxd-virtual-machine-image: install initial configuration read-write
2024-06-04 00:16:12 -04:00
Daniel Barter
d7a9d49c42 repart-image: removing unshare (and util-linux dep) form systemd-repart invocation
..
2024-06-03 17:48:27 -07:00
Abílio Costa
79cd2f9738
nixos/nvidia-optimus: add nvidia-modeset to blacklist
The nvidia-modeset module is loaded, which in turn pulls in the nvidia module. This makes bbswitch fail to turn off the card since it would be in use by the module.
2024-06-03 23:18:34 +01:00
José Ribeiro
6fc5c63584
doc(rl-24.11): zx v8 breaking changes 2024-06-03 22:16:55 +01:00
Doron Behar
459335513a
Merge pull request #315555 from doronbehar/pkg/musescore
musescore: 4.3.0 -> 4.3.1
2024-06-03 21:20:15 +03:00
Thomas Gerbet
8359a1c6f7
Merge pull request #316884 from NixOS/enableSSHAgentAuth
doc/release-notes: repalce security.pam.enableSSHAgentAuth with secur…
2024-06-03 20:11:30 +02:00
Sandro
43b5ccde57
Merge pull request #316879 from SuperSandro2000/mkEnableOption 2024-06-03 19:03:12 +02:00
Sandro Jäckel
1c2132f714
nixos/installation-cd-plasma5: fix even more aliases 2024-06-03 16:26:54 +02:00
K900
2e8de9bd1a
Merge pull request #316929 from SuperSandro2000/cd-konsole
nixos/installation-cd-plasma5: don't use alias for konsole
2024-06-03 17:25:12 +03:00
Sandro
a88fb925bb
nixos/installation-cd-plasma5: don't use alias for konsole 2024-06-03 16:22:12 +02:00
Michele Guerini Rocco
9e97770a19
Merge pull request #312317 from tom-kuca/replace-existing-network-addresses
nixos/network-interfaces: prevent failure when a network address already exists
2024-06-03 15:30:13 +02:00