Commit graph

26618 commits

Author SHA1 Message Date
Gutyina Gergő 2a71e7815e
dwm: add _JAVA_AWT_WM_NONREPARENTING=1
dwm is not in Java's internal list of non-reparrenting
window managers. Running Java GUI programs without this
variable on window managers (eg. jd-gui) causes the window
to be blank.
2023-08-22 12:56:59 +02:00
Samuel Dionne-Riel faa0c27293
Merge pull request #245739 from dev-null-undefined/grub-specialisations
nixos/grub: Add submenu for each generation with specialisation
2023-08-21 23:03:59 -04:00
Benjamin Staffin 63e9b2f8c0
Merge pull request #246354 from minijackson/netbox-fixes
netbox: 3.5.6 -> 3.5.7 + migration fixes + upgrade NixOS test
2023-08-21 16:22:38 -04:00
dev-null-undefined a39526b3ef
nixos/grub: Add submenu for each generation with specialisation
Before this commit there was no way to access (boot into) specialisation of previous generations from grub,even tho they are there.

This commit will add grub submenu for each generation if the generation has any specialisation.
Which will allow you to boot into them.

Co-authored-by: Samuel Dionne-Riel <samuel@dionne-riel.com>
2023-08-21 21:44:42 +02:00
Janne Heß eb831f759b
nixos/stc: Improve mount unit handling
We should sometimes restart the units rather than reloading them so the
changes are actually applied. / and /nix are explicitly excluded because
there was some very old issue where these were unmounted. I don't think
this will affect many people since most people use fstab mounts instead
but I plan to adapt this behavior for fstab mounts as well in the future
(once I wrote a test for the fstab thingies).
2023-08-21 09:07:14 +02:00
Sigmanificient 0482394fe0 ragnarwm: init at 1.3.1 2023-08-20 18:20:39 +02:00
github-actions[bot] 1bb285561e
Merge master into staging-next 2023-08-20 06:00:56 +00:00
Bobby Rong 5f75be53ea
Merge pull request #249712 from bobby285271/upd/cinnamon-qt-style
nixos/cinnamon: Override Qt apps style again
2023-08-20 11:35:23 +08:00
github-actions[bot] f6a4c6f912
Merge master into staging-next 2023-08-20 00:02:29 +00:00
Tobias Widmann e4a62b0fd1 nixos/htop: fix boolean values in settings option
When generating htoprc, in order to be recognized by htop, a boolean value
of 'false' should be written as '0', not an empty string.
2023-08-20 00:10:24 +02:00
Martin Weinelt 7c75694db9
Merge pull request #240982 from rnhmjoj/pr-jool
nixos/jool: add service for setting up SIIT/NAT64
2023-08-19 23:32:05 +02:00
Doron Behar ab1fe60481
Merge pull request #249860 from errnoh/goxlr-utility
goxlr-utility: init at 0.12.6 (fixes #243701)
2023-08-19 19:10:40 +00:00
github-actions[bot] b34f222b02
Merge master into staging-next 2023-08-19 18:00:51 +00:00
Erno Hopearuoho 3748c8b483 goxlr-utility: init module 2023-08-19 17:16:41 +03:00
Ilan Joselevich 6e3d657482
Merge pull request #247776 from f2k1de/graylog-5.1
graylog-5_1: init at 5.1.4
2023-08-19 16:00:11 +03:00
github-actions[bot] d3b2560b73
Merge master into staging-next 2023-08-19 12:01:03 +00:00
Franz Pletz 4fe4a74fe5
Merge pull request #246713 from n0emis/grocy-4.0.0
grocy: 3.3.0 -> 4.0.0
2023-08-19 13:41:22 +02:00
Ember Keske 66ee520289 grocy: replace @ma27 with @n0emis as maintainer 2023-08-19 13:02:04 +02:00
Pol Dellaiera cac8909c85
Merge pull request #250100 from NixOS/ioquake3/update
ioquake3: fix missing `.so` files at startup and clean-up
2023-08-19 12:31:33 +02:00
Pol Dellaiera 849c75577d
nixos/openarena: cleanup
- Remove `with lib;`
- Add `package` config option
- Adjust paths accordingly in `ExecStart`
2023-08-19 07:28:14 +02:00
Pol Dellaiera 5fdff213c9
nixos/quake3-server: add package config option
- Remove top-level `with lib;`
2023-08-19 07:07:08 +02:00
Hugh O'Brien a08d69ba63
nixos/restic: wait for network-online for timed backups 2023-08-18 20:02:16 -04:00
github-actions[bot] 4a9909e0db
Merge master into staging-next 2023-08-19 00:01:42 +00:00
Adam Stephens 1403486d17 nixos/lxd-agent: init module from distrobuilder generator 2023-08-18 22:28:59 +00:00
github-actions[bot] 1949ef2080
Merge master into staging-next 2023-08-18 18:00:57 +00:00
Nick Cao a4c6594dcd
nixos/influxdb2: do not load passwordFile and tokenFile when provisioning is disabled 2023-08-18 20:25:53 +08:00
github-actions[bot] f1d7a13229
Merge master into staging-next 2023-08-18 00:01:46 +00:00
Artturi 52be2cdfea
Merge pull request #249788 from Niki4tap/dwm-fix-hash 2023-08-17 22:08:55 +03:00
Felix Bühler 96481fd201
Merge pull request #249323 from kevincox/photoprism-chmod
nixos.photoprism: Relax sandbox to allow running exiftool
2023-08-17 21:01:40 +02:00
Niki4tap bd0b732bef dwm: use correct hash in example 2023-08-17 21:14:35 +03:00
github-actions[bot] 3b76a64c44
Merge master into staging-next 2023-08-17 12:01:23 +00:00
Bobby Rong 26adac4d27
nixos/cinnamon: Override Qt apps style again
Use gtk2 to follow Mint's decision for now.
2023-08-17 17:08:29 +08:00
Bobby Rong fd1f73aaa2
Merge pull request #249312 from FedericoSchonborn/budgie/magpie
budgie.magpie: init at 0.9.2, replace Mutter with it on Budgie
2023-08-17 15:43:43 +08:00
github-actions[bot] 2e936d668c
Merge master into staging-next 2023-08-17 06:00:58 +00:00
Federico Damián Schonborn 9325eefbdc
nixos/budgie: Add Magpie to services.udev.packages
Signed-off-by: Federico Damián Schonborn <fdschonborn@gmail.com>
2023-08-17 00:56:43 -03:00
Nick Cao acd40c3925
Merge pull request #249432 from linj-fork/fix-aspell
nixos/environment: stop setting ASPELL_CONF
2023-08-17 08:20:52 +08:00
Ilan Joselevich fb1f530bc6
Merge pull request #249521 from Kranzes/oauth2-proxy
nixos/oauth2_proxy: service after network.target -> network-online.target
2023-08-17 03:16:10 +03:00
github-actions[bot] 43454c8a64
Merge master into staging-next 2023-08-17 00:01:52 +00:00
Freakmiko 66469836be Fix Lemmy Caddy config static path handling
Due to lemmy-ui using a sub-path for the static files, the original static path handling was not sufficient
2023-08-17 04:19:48 +08:00
github-actions[bot] 583df4e091
Merge master into staging-next 2023-08-16 18:01:01 +00:00
Doron Behar 62730f2c31
Merge pull request #248701 from doronbehar/nixos/manpages
nixos/install-tools: Add manpages to packages instead of seperating them
2023-08-16 15:49:49 +00:00
Martin Weinelt e57875a2c4
Merge pull request #248409 from CobaltCause/conduit-0.6.0
matrix-conduit: 0.5.0 -> 0.6.0
2023-08-16 16:30:08 +02:00
K900 200eeb9ebe
Merge pull request #249101 from motiejus/headscale-oidc
headscale.oidc: client_secret_path is a string
2023-08-16 17:23:56 +03:00
Maciej Krüger 56700d64b1
Merge pull request #226821 from enc0urage/memtest 2023-08-16 15:31:32 +02:00
Nick Cao 2dadab4889
Merge pull request #249211 from oddlama/feat-influxdb-provision
nixos/influxdb2: automatic initial setup and nixos tests
2023-08-16 21:29:16 +08:00
oddlama b4d718f14a
nixos/influxdb2: add initial setup automation and nixos tests 2023-08-16 14:31:49 +02:00
github-actions[bot] d99b92b3f7
Merge master into staging-next 2023-08-16 12:01:02 +00:00
Janne Heß bc9b484db8
Merge pull request #232230 from oddlama/fix-activation-template-unit-specializations
Fix detection of changed template unit specializations in switch-to-configuration.pl
2023-08-16 13:46:45 +02:00
Ilan Joselevich 0a732d2adf
nixos/oauth2_proxy: service after network.target -> network-online.target 2023-08-16 14:40:33 +03:00
Robert Obryk ff204ca32b nixos/security/wrappers: remove all the assertions about readlink(/proc/self/exe)
Given that we are no longer inspecting the target of the /proc/self/exe
symlink, stop asserting that it has any properties. Remove the plumbing
for wrappersDir, which is no longer used.

Asserting that the binary is located in the specific place is no longer
necessary, because we don't rely on that location being writable only by
privileged entities (we used to rely on that when assuming that
readlink(/proc/self/exe) will continue to point at us and when assuming
that the `.real` file can be trusted).

Assertions about lack of write bits on the file were
IMO meaningless since inception: ignoring the Linux's refusal to honor
S[UG]ID bits on files-writeable-by-others, if someone could have
modified the wrapper in a way that preserved the capability or S?ID
bits, they could just remove this check.

Assertions about effective UID were IMO just harmful: if we were
executed without elevation, the caller would expect the result that
would cause in a wrapperless distro: the targets gets executed without
elevation. Due to lack of elevation, that cannot be used to abuse
privileges that the elevation would give.

This change partially fixes #98863 for S[UG]ID wrappers. The issue for
capability wrappers remains.
2023-08-16 11:33:22 +02:00
Robert Obryk 11ca4dcbb8 nixos/security/wrappers: read capabilities off /proc/self/exe directly
/proc/self/exe is a "fake" symlink. When it's opened, it always opens
the actual file that was execve()d in this process, even if the file was
deleted or renamed; if the file is no longer accessible from the current
chroot/mount namespace it will at the very worst fail and never open the
wrong file. Thus, we can make a much simpler argument that we're reading
capabilities off the correct file after this change (and that argument
doesn't rely on things such as protected_hardlinks being enabled, or no
users being able to write to /run/wrappers, or the verification that the
path readlink returns starts with /run/wrappers/).
2023-08-16 11:33:22 +02:00
Robert Obryk ec36e0218f nixos/security/wrappers: stop using .real files
Before this change it was crucial that nonprivileged users are unable to
create hardlinks to SUID wrappers, lest they be able to provide a
different `.real` file alongside. That was ensured by not providing a
location writable to them in the /run/wrappers tmpfs, (unless
disabled) by the fs.protected_hardlinks=1 sysctl, and by the explicit
own-path check in the wrapper. After this change, ensuring
that property is no longer important, and the check is most likely
redundant.

The simplification of expectations of the wrapper will make it
easier to remove some of the assertions in the wrapper (which currently
cause the wrapper to fail in no_new_privs environments, instead of
executing the target with non-elevated privileges).

Note that wrappers had to be copied (not symlinked) into /run/wrappers
due to the SUID/capability bits, and they couldn't be hard/softlinks of
each other due to those bits potentially differing. Thus, this change
doesn't increase the amount of memory used by /run/wrappers.
2023-08-16 11:33:22 +02:00
WilliButz da5c3bde30
Merge pull request #248405 from fpletz/pkgs/mediamtx-1.0.0
mediamtx: 0.23.8 -> 1.0.0, refactor module, add test
2023-08-16 11:30:18 +02:00
Lin Jian 1c704628dc
nixos/environment: stop setting ASPELL_CONF
We set[1] ASPELL_CONF to the last nix profile containing lib/aspell in
2013.  In 2017, aspell is patched[2] to search NIX_PROFILES, which
makes [1] not needed any more.

Deleting it is also agreed in this discussion[3].

[1]: 0192c02720
[2]: ba4cefe4ae
[3]: https://github.com/NixOS/nixpkgs/pull/30234
2023-08-16 09:18:45 +08:00
Jan Tojnar 86f6b16d28 Merge branch 'master' into staging-next
Conflicts:
- pkgs/servers/mail/mailman/python.nix (relevant to mailman-web)
  between f8a17e4200 and 84f6a6755a
2023-08-15 21:39:20 +02:00
Pol Dellaiera 11f3cbc0c3
Merge pull request #246181 from jvanbruegge/haproxy-package
nixos/haproxy: allow to specify haproxy package
2023-08-15 19:46:13 +02:00
Silvan Mosberger be9b7ddbdc
Merge pull request #246447 from 999eagle/update/invidious
invidious: unstable-2023-06-06 -> unstable-2023-08-07
2023-08-15 14:05:19 +02:00
Kevin Cox 86c67a1f11
nixos.photoprism: Relax sandbox to allow running exiftool
exiftool is written in Perl which appears to call `chown` as part of startup. This is blocked by the `@privileged` system call group. This causes a failure when changing image orientation.

Fixes: https://github.com/NixOS/nixpkgs/issues/249120
2023-08-15 07:58:42 -04:00
Jan van Brügge 90da2c1223
nixos/haproxy: allow to specify haproxy package 2023-08-15 12:24:55 +01:00
Kerstin f65301cdd3
Merge pull request #219700 from h7x4/kanidm-add-package-option
nixos/kanidm: add package option
2023-08-15 12:06:11 +02:00
Michele Guerini Rocco e7a57d07a8
Merge pull request #248390 from sersorrel/picom-package
nixos/picom: add `package` option
2023-08-15 11:05:35 +02:00
Sophie Tauchert 1a3b7f61b2
nixos/invidious: generate hmac_key automatically
This change also generates the invidious config by putting JSON
snippets into a bash array and then using jq to merge them all into
a single configuration where later elements override previous
elements.
2023-08-15 10:48:30 +02:00
h7x4 655a04a8fa
nixos/kanidm: add package option
Signed-off-by: h7x4 <h7x4@nani.wtf>
2023-08-15 10:05:44 +02:00
github-actions[bot] df770ba961
Merge master into staging-next 2023-08-15 06:01:24 +00:00
Nick Cao 2af24d4417
nixos/fcitx5: fix evaluation 2023-08-15 08:15:41 +08:00
github-actions[bot] 674c2b1920
Merge master into staging-next 2023-08-14 18:01:03 +00:00
Maximilian Bosch a471325eaf
Merge pull request #221318 from mweinelt/synapse-extras
nixos/matrix-synapse: Allow passing extras, discover extras from config
2023-08-14 18:43:05 +02:00
Maximilian Bosch 10c6be32e4
nixos/tempo: add extraFlags option
Main use-case for me is to specify `-config.expand-env=true` which
allows me inject secrets via systemd's environment file mechanism[1]
like this:

    storage.trace.s3 = {
      /* all the other stuff */
      secret_key = "\${GARAGE_SECRET_KEY}";
    };

[1] https://grafana.com/docs/tempo/latest/configuration/#use-environment-variables-in-the-configuration
2023-08-14 18:07:24 +02:00
github-actions[bot] af70853335
Merge master into staging-next 2023-08-14 12:01:04 +00:00
Motiejus Jakštys 28cf78b857 headscale.oidc: client_secret_path is a string
It can be include an environment-variable, like
`${CREDENTIALS_DIRECTORY}/some-path`, failing validation for
`types.path`.
2023-08-14 13:03:06 +03:00
linsui 30bb15152e nixos/fcitx5: add settings 2023-08-14 16:25:17 +08:00
Ilan Joselevich e0fad0515b
nixos/picom: use lib.getExe
Co-authored-by: Jian Lin <75130626+jian-lin@users.noreply.github.com>
2023-08-14 11:19:41 +03:00
Ilan Joselevich 94a3092895
nixos/picom: mkPackageOption -> mkPackageOptionMD 2023-08-14 11:18:06 +03:00
github-actions[bot] b782e1dc08
Merge master into staging-next 2023-08-14 06:00:58 +00:00
enc0urage 00d7065913 nixos/systemd-boot: Replace proprietary memtest86 with free memtest86+ in UEFI 2023-08-14 03:05:24 +00:00
Bobby Rong 85efefd8f4
Merge pull request #248544 from bobby285271/rm/qgnomeplatform
nixos/pantheon, nixos/cinnamon: Drop qgnomeplatform
2023-08-14 10:49:10 +08:00
github-actions[bot] 667a7541cd
Merge master into staging-next 2023-08-14 00:01:53 +00:00
LёNya 54f5045571 nixos/zoneminder: replace lib.optional with lib.optionals to make module work 2023-08-13 22:32:42 +03:00
github-actions[bot] 12e030d6da
Merge master into staging-next 2023-08-13 18:00:59 +00:00
h7x4 8981783b60
services/prometheus/exporters: add mysqld
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2023-08-13 19:46:30 +02:00
Bernardo Meurer 70dd76d94f
Merge pull request #247475 from qowoz/nix217 2023-08-13 13:27:20 -04:00
Jonas Heinrich c5f4a46036 nixos/opensnitch: Add support for EPBF process monitor
Co-authored-by: Slime90
2023-08-13 22:19:48 +08:00
Janne Heß d995da11d8
nixos/switch-to-configuration: Fix unit location in toplevel 2023-08-13 14:26:30 +02:00
enc0urage 1488a2bc1a nixos/grub: Replace proprietary memtest86 with free memtest86+ in UEFI mode 2023-08-13 12:04:34 +00:00
github-actions[bot] 0ee8715a0d
Merge master into staging-next 2023-08-13 12:00:52 +00:00
happysalada 4022b2733a nixos/rustus: add user name to enable restoring of backups 2023-08-13 12:59:20 +01:00
Jörg Thalheim 38b2c039bd gitea-actions-runner: restart on failure 2023-08-13 12:54:15 +01:00
DavHau 3d58bac73b services.gitea-actions-runner: make ExecStartPre extensible 2023-08-13 12:54:15 +01:00
Jörg Thalheim 7ad7e99370 nixos/gitea-actions-runner: settings option to configure daemon 2023-08-13 12:54:15 +01:00
Nick Cao 0814089e05
nixos/zram: use nixos/zram-generator as backing implementation 2023-08-13 15:38:40 +08:00
Nick Cao a7e095d9fd
nixos/zram-generator: init 2023-08-13 15:36:23 +08:00
github-actions[bot] f5eb026a2a
Merge master into staging-next 2023-08-13 06:00:52 +00:00
Nick Cao 722e1e2313
Merge pull request #247899 from DavHau/zerotier-docs
nixos/zerotierone: document networks never left automatically
2023-08-13 00:00:35 -06:00
Bobby Rong ddd4973ddb
nixos/cinnamon: Drop qgnomeplatform
The upstream is not maintained, and qadwaitadecoration
does not seem to be xorg-related. We should have proper
shadows when using SSD.
2023-08-13 12:21:54 +08:00
Bobby Rong f4e1e8627d
nixos/pantheon: Drop qgnomeplatform
The upstream is not maintained, and qadwaitadecoration
does not seem to be xorg-related. We should have proper
shadows when using SSD.
2023-08-13 12:21:54 +08:00
Samuel Dionne-Riel f064a5bcc2
Merge pull request #220263 from samueldr/feature/misc-grub-fixes
nixos/grub: Fixes to allow flicker-free boot, themes and bug fixes
2023-08-12 20:32:51 -04:00
Doron Behar 924a07dc22 nixos/doc: Improve documentation of documentation
- Move contents of README.md from
  nixos/modules/installer/tools/manpages/ to
  nixos/doc/manual/contributing-to-this-manual.chapter.md.
- Don't mention DocBook as its obsolete and too specific.
- Rename derivation attribute name of configuration.nix(5) manual page,
  both on the `contributing-to-this-manual.chapter.md`, and in other
  places.
2023-08-12 22:28:04 +03:00
github-actions[bot] 1c639fb6fb
Merge master into staging-next 2023-08-12 18:00:55 +00:00
Acid Bong c76bb0d58e
nixos/zsh: add enableLsColors
Borrowed from nixos/bash/ls-colors module
2023-08-12 20:53:05 +03:00
Jan Tojnar 08d242047c iso_gnome: Fix evaluation
`qt.enable` option requires `qt.style` to be set.
Previously, this was set in GNOME module but it has been removed
in 622745942b
2023-08-12 19:30:49 +02:00