Commit Graph

27236 Commits

Author SHA1 Message Date
Martin Weinelt
fa7ce6bc7f
nixos/openssh: Add sntrup761x25519-sha512 kexAlgo
Introduced in OpenSSH 9.0 it became the part of the default kexAlgorithm
selection, visibile in sshd_config(5).

It is also enabled by default in the OpenSSH client, as can be seen from

$ ssh -Q KexAlgorithms

Also clarifies that we use the referenced documents as the lower bound,
given that they haven't been updated for 5-7y.
2022-05-10 23:20:54 +02:00
D Anzorge
271905a33f minetest: add aliases and release notes for v4 deprecation 2022-05-10 19:26:25 +02:00
Lara
8f54cca448 nixos/doc: Add Snipe-IT to 22.05 release notes 2022-05-10 16:57:21 +02:00
Lara
9cb388739f nixos/snipe-it: init
Snipe-IT is a free open source IT asset/license management system

https://snipeitapp.com/
2022-05-10 16:57:21 +02:00
Artturi
4ae23f5c7d
Merge pull request #156071 from Madouura/dev/bcachefs-installer
nixos/tests/installer: add bcachefs tests
2022-05-09 19:48:16 +03:00
Robert Hensing
ebf0465d09 Merge remote-tracking branch 'upstream/master' into testers 2022-05-09 14:27:13 +02:00
Robert Hensing
ae172a2bb4 treewide: nixosTest -> testers.nixosTest 2022-05-09 14:16:06 +02:00
Klemens Nanni
199933efdf nixos/mandoc: Leave shell argument quoting to nix
Manually crafting a quoted string that otherwise lacks any safe-guards
looks odd.

Use `escapeShellArg` instead before prepending the path.
2022-05-09 10:48:54 +02:00
Janne Heß
e6fb1e63d1
Merge pull request #171650 from helsinki-systems/feat/config-systemd-package
treewide: pkgs.systemd -> config.systemd.package
2022-05-09 10:23:04 +02:00
github-actions[bot]
f39e774f11
Merge master into staging-next 2022-05-09 00:02:27 +00:00
Sandro
8803756fd3
Merge pull request #172072 from ivan/tinc-unbreak
nixos/tinc: unbreak the service
2022-05-09 01:27:12 +02:00
Sandro
b196dea22d
Merge pull request #172080 from wentasah/usbrelay-1.0
usbrelay: 0.9 -> 1.0
2022-05-09 01:02:08 +02:00
Niklaus Giger
1d82f62aef
UHK-agent: Support for Ultimate Hacking Keyboard udev-rules and configuration application (#132420)
* maintainers: add ngiger

* uhk-agent: init at 1.5.17

* Apply suggestions from code review

* Update pkgs/os-specific/linux/uhk-agent/default.nix

* Apply suggestions from code review

* Update pkgs/os-specific/linux/uhk-agent/default.nix

Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2022-05-08 22:40:52 +02:00
Michal Sojka
26ec7081d6 nixos/usbrelayd: set myself as module maintainer
I forgot setting that when creating the module.
2022-05-08 21:44:50 +02:00
Michal Sojka
3effbca0bc usbrelay: 0.9 -> 1.0 2022-05-08 21:16:32 +02:00
ajs124
e4a1b1aacd
Merge pull request #171588 from mweinelt/tools-userpkgs
nixos/tools: move firefox into user packages
2022-05-08 19:02:47 +01:00
github-actions[bot]
e92815729d
Merge master into staging-next 2022-05-08 18:01:10 +00:00
Ivan Kozik
9db1d1782b nixos/tinc: unbreak the service
The user is actually tinc.${network}, as Mic92 points out in
https://github.com/NixOS/nixpkgs/pull/171703#discussion_r867506032

Sorry, I broke this in https://github.com/NixOS/nixpkgs/pull/171703 earlier.

coreutils 9.1 chown does not complain in this case with a valid dotted user.
2022-05-08 16:04:20 +00:00
Sandro
befb337461
Merge pull request #169216 from Shawn8901/fix_prometheus_config_generation
nixos/prometheus: use pkgs.formats.json.generate to write config file
2022-05-08 15:09:09 +02:00
github-actions[bot]
eaaed3f1d2
Merge master into staging-next 2022-05-08 12:01:07 +00:00
Artturi
3c8e6248cb
Merge pull request #172040 from K900/fix-installer-eval
installation-cd-base: fix eval
2022-05-08 13:50:10 +03:00
Robert Schütz
2ddfd7e81b nixos/borgmatic: use pkgs.formats.yaml 2022-05-08 01:08:28 -07:00
K900
e994576b0d installation-cd-base: fix eval 2022-05-08 11:08:10 +03:00
github-actions[bot]
84277e82a5
Merge master into staging-next 2022-05-07 18:01:03 +00:00
Florian Klink
dbf2b9152f nixos/tests/systemd-nspawn: add test for machinectl pull-tar
This will package up the closure of pkgs.hello in a tarball, and will
later on verify machinectl pull-tar properly unpacked it, serving as a
regression test for #108158.

Closes #108158
2022-05-07 18:14:46 +02:00
Rick van Schijndel
17c252aab1
Merge pull request #153940 from tomfitzhenry/phosh-service
nixos/phosh: add Phosh, the Phone Shell
2022-05-07 17:56:44 +02:00
Artturi
1d09b16b0c
Merge pull request #171709 from avdv/fix-illum-segfault-and-restart
illum: Prevent segfault when unplugging keyboards
2022-05-07 17:40:52 +03:00
github-actions[bot]
fa99b3742a
Merge master into staging-next 2022-05-07 00:02:09 +00:00
Sandro
72565373a4
Merge pull request #170912 from Baughn/master 2022-05-07 01:14:08 +02:00
Maximilian Bosch
f0bb39d4b7
Merge pull request #167327 from lheckemann/networkd-usedhcp
nixos/networkd: reimplement useDHCP in a sensible way
2022-05-07 00:05:44 +02:00
Sandro
398cf5bf2d
Merge pull request #164698 from illustris/proxmox-lxc 2022-05-06 23:35:13 +02:00
Sandro
d21ebc62bf
Merge pull request #170851 from danderson/danderson/ts-warn-rpf
nixos/tailscale: warn if strict reverse path filtering is in use.
2022-05-06 23:21:50 +02:00
github-actions[bot]
6c361fbbd8
Merge master into staging-next 2022-05-06 18:01:18 +00:00
Svein Ove Aas
dcade93a25 factorio: Add loadLatestSave 2022-05-06 17:50:35 +01:00
Félix Baylac-Jacqué
7f76009e10 nixosTests.pleroma: fix test, remove toot patch
Initially applied via e7f6370701, then
reverted by 96aaf29234.

Re-applying this patch: the pleroma NixOS test is broken without it.

It was originally impossible to login in toot without having an
interactive shell. I opened https://github.com/ihabunek/toot/pull/180
upstream to fix that and fetch this patch for this test.

The author decided to fix the issue using a slightly different
approach at a3eb5dca24

Because of this upstream fix, our custom patch does not apply anymore.
Using that stdin-based login upstream feature.

Pointing pleroma_ctl to the right RELEASE_COOKIE as well.
2022-05-06 17:45:42 +02:00
Maximilian Bosch
f4e5bd8064
nixos/nixos-generate-config: update comment for useDHCP 2022-05-06 16:56:47 +02:00
Vladimír Čunát
8ad52489e9
Merge branch 'master' into staging-next 2022-05-06 16:07:25 +02:00
Maximilian Bosch
7dbfd6b997
Merge pull request #171783 from Ma27/linux-kernel-updates
Linux kernels 2022-05-06
2022-05-06 14:05:28 +02:00
github-actions[bot]
6e0aca3c43
Merge master into staging-next 2022-05-06 12:02:02 +00:00
Janne Heß
764d77f4c3
Merge pull request #124261 from helsinki-systems/feat/state-version-default-warn
nixos/version: Warn about using the default of system.stateVersion
2022-05-06 13:20:43 +02:00
Yureka
96aaf29234
Revert "Merge pull request #164398 from NinjaTrappeur/nin/pleroma-wrappers"
This reverts commit 05417a66e7, reversing
changes made to 53e4f8d237.
2022-05-06 12:38:28 +02:00
Maximilian Bosch
b79d9a846b
linux/hardened/patches/5.17: init at 5.17.5-hardened1 2022-05-06 10:17:59 +02:00
github-actions[bot]
ff5c4d3404
Merge master into staging-next 2022-05-06 06:01:36 +00:00
Rick van Schijndel
32bebf42ea
Merge pull request #171703 from ivan/chown-colon
treewide: chown user:group instead of user.group to fix warnings from coreutils 9.1
2022-05-06 07:20:40 +02:00
David Anderson
3fdac0f981 nixos/tailscale: warn if strict reverse path filtering is in use.
Tailscale uses policy routing to enable certain traffic to bypass
routes that lead into the Tailscale mesh. NixOS's reverse path
filtering setup doesn't understand the policy routing at play,
and so incorrectly interprets some of this traffic as spoofed.

Since this only breaks some features of Tailscale, merely warn
users about it, rather than make it a hard error.

Updates tailscale/tailscale#4432

Signed-off-by: David Anderson <dave@natulte.net>
2022-05-05 18:28:48 -07:00
Sandro
b9e7f61c72
Merge pull request #171747 from danderson/danderson/tailscale-getent
nixos/tailscale: add glibc to PATH.
2022-05-06 03:10:00 +02:00
Sandro
e5e30371bc
Merge pull request #170210 from danderson/danderson/restart-tailscaled
nixos/tailscale: use systemctl restart during activation.
2022-05-06 03:09:01 +02:00
David Anderson
67b1fac192 nixos/tailscale: add glibc to PATH.
For some features, tailscaled uses getent(1) to get the shell
of OS users. getent(1) is in the glibc derivation. Without this
derivation in the path, tailscale falls back to /bin/sh for all
users.

Signed-off-by: David Anderson <dave@natulte.net>
2022-05-05 17:09:27 -07:00
github-actions[bot]
b962dee3e7
Merge master into staging-next 2022-05-06 00:02:16 +00:00
Ivan Kozik
59a76614f3 treewide: chown user:group instead of user.group to fix warnings from coreutils 9.1 2022-05-05 22:05:18 +00:00