Commit graph

35176 commits

Author SHA1 Message Date
Nick Cao 2dadab4889
Merge pull request #249211 from oddlama/feat-influxdb-provision
nixos/influxdb2: automatic initial setup and nixos tests
2023-08-16 21:29:16 +08:00
oddlama b4d718f14a
nixos/influxdb2: add initial setup automation and nixos tests 2023-08-16 14:31:49 +02:00
github-actions[bot] d99b92b3f7
Merge master into staging-next 2023-08-16 12:01:02 +00:00
Janne Heß bc9b484db8
Merge pull request #232230 from oddlama/fix-activation-template-unit-specializations
Fix detection of changed template unit specializations in switch-to-configuration.pl
2023-08-16 13:46:45 +02:00
Ilan Joselevich 0a732d2adf
nixos/oauth2_proxy: service after network.target -> network-online.target 2023-08-16 14:40:33 +03:00
Robert Obryk 46c9aed62b nixos/security/wrappers: add one regression test for #98863
Note that this regression test checks only s[gu]id wrappers. The issue
for capability wrappers is not fixed yet.
2023-08-16 11:33:22 +02:00
Robert Obryk ff204ca32b nixos/security/wrappers: remove all the assertions about readlink(/proc/self/exe)
Given that we are no longer inspecting the target of the /proc/self/exe
symlink, stop asserting that it has any properties. Remove the plumbing
for wrappersDir, which is no longer used.

Asserting that the binary is located in the specific place is no longer
necessary, because we don't rely on that location being writable only by
privileged entities (we used to rely on that when assuming that
readlink(/proc/self/exe) will continue to point at us and when assuming
that the `.real` file can be trusted).

Assertions about lack of write bits on the file were
IMO meaningless since inception: ignoring the Linux's refusal to honor
S[UG]ID bits on files-writeable-by-others, if someone could have
modified the wrapper in a way that preserved the capability or S?ID
bits, they could just remove this check.

Assertions about effective UID were IMO just harmful: if we were
executed without elevation, the caller would expect the result that
would cause in a wrapperless distro: the targets gets executed without
elevation. Due to lack of elevation, that cannot be used to abuse
privileges that the elevation would give.

This change partially fixes #98863 for S[UG]ID wrappers. The issue for
capability wrappers remains.
2023-08-16 11:33:22 +02:00
Robert Obryk 11ca4dcbb8 nixos/security/wrappers: read capabilities off /proc/self/exe directly
/proc/self/exe is a "fake" symlink. When it's opened, it always opens
the actual file that was execve()d in this process, even if the file was
deleted or renamed; if the file is no longer accessible from the current
chroot/mount namespace it will at the very worst fail and never open the
wrong file. Thus, we can make a much simpler argument that we're reading
capabilities off the correct file after this change (and that argument
doesn't rely on things such as protected_hardlinks being enabled, or no
users being able to write to /run/wrappers, or the verification that the
path readlink returns starts with /run/wrappers/).
2023-08-16 11:33:22 +02:00
Robert Obryk ec36e0218f nixos/security/wrappers: stop using .real files
Before this change it was crucial that nonprivileged users are unable to
create hardlinks to SUID wrappers, lest they be able to provide a
different `.real` file alongside. That was ensured by not providing a
location writable to them in the /run/wrappers tmpfs, (unless
disabled) by the fs.protected_hardlinks=1 sysctl, and by the explicit
own-path check in the wrapper. After this change, ensuring
that property is no longer important, and the check is most likely
redundant.

The simplification of expectations of the wrapper will make it
easier to remove some of the assertions in the wrapper (which currently
cause the wrapper to fail in no_new_privs environments, instead of
executing the target with non-elevated privileges).

Note that wrappers had to be copied (not symlinked) into /run/wrappers
due to the SUID/capability bits, and they couldn't be hard/softlinks of
each other due to those bits potentially differing. Thus, this change
doesn't increase the amount of memory used by /run/wrappers.
2023-08-16 11:33:22 +02:00
WilliButz da5c3bde30
Merge pull request #248405 from fpletz/pkgs/mediamtx-1.0.0
mediamtx: 0.23.8 -> 1.0.0, refactor module, add test
2023-08-16 11:30:18 +02:00
Doron Behar 307da96e17
nixos/doc: small rephrase in documentation of documentation
Co-authored-by: Robert Hensing <roberth@users.noreply.github.com>
2023-08-16 06:24:37 +00:00
Lin Jian 1c704628dc
nixos/environment: stop setting ASPELL_CONF
We set[1] ASPELL_CONF to the last nix profile containing lib/aspell in
2013.  In 2017, aspell is patched[2] to search NIX_PROFILES, which
makes [1] not needed any more.

Deleting it is also agreed in this discussion[3].

[1]: 0192c02720
[2]: ba4cefe4ae
[3]: https://github.com/NixOS/nixpkgs/pull/30234
2023-08-16 09:18:45 +08:00
github-actions[bot] bc80066085
Merge master into staging-next 2023-08-16 00:01:57 +00:00
Nikolay Korotkiy 6f46c37d92
nixosTests.agate: switch to using gemget 2023-08-16 01:26:54 +04:00
Jan Tojnar 86f6b16d28 Merge branch 'master' into staging-next
Conflicts:
- pkgs/servers/mail/mailman/python.nix (relevant to mailman-web)
  between f8a17e4200 and 84f6a6755a
2023-08-15 21:39:20 +02:00
Izorkin 272b35bc91
mariadb-connector-c: enable default v3.3.x 2023-08-15 21:02:28 +03:00
Pol Dellaiera 11f3cbc0c3
Merge pull request #246181 from jvanbruegge/haproxy-package
nixos/haproxy: allow to specify haproxy package
2023-08-15 19:46:13 +02:00
Maximilian Bosch 609397e683
Merge pull request #249308 from r-ryantm/auto-update/prometheus-smartctl-exporter
prometheus-smartctl-exporter: 0.9.1 -> 0.10.0
2023-08-15 16:27:32 +02:00
Maximilian Bosch 2b42b842ed
nixos/prometheus-exporters: fix smartctl test 2023-08-15 15:44:45 +02:00
Silvan Mosberger be9b7ddbdc
Merge pull request #246447 from 999eagle/update/invidious
invidious: unstable-2023-06-06 -> unstable-2023-08-07
2023-08-15 14:05:19 +02:00
Kevin Cox 86c67a1f11
nixos.photoprism: Relax sandbox to allow running exiftool
exiftool is written in Perl which appears to call `chown` as part of startup. This is blocked by the `@privileged` system call group. This causes a failure when changing image orientation.

Fixes: https://github.com/NixOS/nixpkgs/issues/249120
2023-08-15 07:58:42 -04:00
Jan van Brügge 90da2c1223
nixos/haproxy: allow to specify haproxy package 2023-08-15 12:24:55 +01:00
Kerstin f65301cdd3
Merge pull request #219700 from h7x4/kanidm-add-package-option
nixos/kanidm: add package option
2023-08-15 12:06:11 +02:00
Michele Guerini Rocco e7a57d07a8
Merge pull request #248390 from sersorrel/picom-package
nixos/picom: add `package` option
2023-08-15 11:05:35 +02:00
Sophie Tauchert 1a3b7f61b2
nixos/invidious: generate hmac_key automatically
This change also generates the invidious config by putting JSON
snippets into a bash array and then using jq to merge them all into
a single configuration where later elements override previous
elements.
2023-08-15 10:48:30 +02:00
h7x4 655a04a8fa
nixos/kanidm: add package option
Signed-off-by: h7x4 <h7x4@nani.wtf>
2023-08-15 10:05:44 +02:00
github-actions[bot] df770ba961
Merge master into staging-next 2023-08-15 06:01:24 +00:00
Nick Cao fecb8c7752
nixosTests.fcitx5: make use of the newly added settings option 2023-08-15 08:36:07 +08:00
Nick Cao 2af24d4417
nixos/fcitx5: fix evaluation 2023-08-15 08:15:41 +08:00
github-actions[bot] 039c7dfa75
Merge master into staging-next 2023-08-15 00:01:55 +00:00
Silvan Mosberger 50d11650a7
Merge pull request #245243 from tweag/contributing-combining
Clean up contributing documentation
2023-08-14 21:06:06 +02:00
github-actions[bot] 674c2b1920
Merge master into staging-next 2023-08-14 18:01:03 +00:00
Silvan Mosberger de5a39f5e7 CONTRIBUTING.md: Move boot loader-specific sentence to pkgs/README.md
This needs a rewrite at some point..
2023-08-14 19:50:02 +02:00
Maximilian Bosch a471325eaf
Merge pull request #221318 from mweinelt/synapse-extras
nixos/matrix-synapse: Allow passing extras, discover extras from config
2023-08-14 18:43:05 +02:00
K900 25c37880ec
Merge pull request #249150 from Ma27/tempo-extraflags
nixos/tempo: add `extraFlags` option
2023-08-14 19:24:31 +03:00
Maximilian Bosch 10c6be32e4
nixos/tempo: add extraFlags option
Main use-case for me is to specify `-config.expand-env=true` which
allows me inject secrets via systemd's environment file mechanism[1]
like this:

    storage.trace.s3 = {
      /* all the other stuff */
      secret_key = "\${GARAGE_SECRET_KEY}";
    };

[1] https://grafana.com/docs/tempo/latest/configuration/#use-environment-variables-in-the-configuration
2023-08-14 18:07:24 +02:00
github-actions[bot] af70853335
Merge master into staging-next 2023-08-14 12:01:04 +00:00
Alejandro Angulo 874e431f7a rl-2311: mention upgrade of html-proofer to major version 5 2023-08-14 11:26:50 +00:00
Motiejus Jakštys 28cf78b857 headscale.oidc: client_secret_path is a string
It can be include an environment-variable, like
`${CREDENTIALS_DIRECTORY}/some-path`, failing validation for
`types.path`.
2023-08-14 13:03:06 +03:00
Nick Cao 2e6e83d27a
Merge pull request #244982 from linsui/fcitx5
nixos/fcitx5: add settings
2023-08-14 03:01:41 -06:00
Robert Hensing 8fe5918d06
Merge pull request #248138 from hercules-ci/update-nixops_unstable
nixops_unstable: update
2023-08-14 11:00:44 +02:00
linsui 30bb15152e nixos/fcitx5: add settings 2023-08-14 16:25:17 +08:00
Ilan Joselevich e0fad0515b
nixos/picom: use lib.getExe
Co-authored-by: Jian Lin <75130626+jian-lin@users.noreply.github.com>
2023-08-14 11:19:41 +03:00
Ilan Joselevich 94a3092895
nixos/picom: mkPackageOption -> mkPackageOptionMD 2023-08-14 11:18:06 +03:00
github-actions[bot] b782e1dc08
Merge master into staging-next 2023-08-14 06:00:58 +00:00
enc0urage 00d7065913 nixos/systemd-boot: Replace proprietary memtest86 with free memtest86+ in UEFI 2023-08-14 03:05:24 +00:00
Silvan Mosberger 15ca783f10 nixos/README.md: GitHub markdown fixes 2023-08-14 04:49:24 +02:00
Bobby Rong 85efefd8f4
Merge pull request #248544 from bobby285271/rm/qgnomeplatform
nixos/pantheon, nixos/cinnamon: Drop qgnomeplatform
2023-08-14 10:49:10 +08:00
github-actions[bot] 667a7541cd
Merge master into staging-next 2023-08-14 00:01:53 +00:00
Silvan Mosberger 5789cc3754 CONTRIBUTING.md: Clean up "Making patches" section
Moving and collecting bits into the appropriate places, also writing
some new sentences
2023-08-13 22:04:57 +02:00
Silvan Mosberger f3a050a191 doc/reviewing-contributions: Rough move to new contribution doc files
No content was changed, new titles are wrapped with () to signal that
they will need to be decided on in a future commit.

Section in the manual have been preserved with a simple redirect to
GitHub, the proper anchors should be filled out in a future commit once
the new section names are decided.
2023-08-13 22:04:56 +02:00
Silvan Mosberger d70091c3ad Create unified markdown files for contributing docs 2023-08-13 21:54:50 +02:00
LёNya 54f5045571 nixos/zoneminder: replace lib.optional with lib.optionals to make module work 2023-08-13 22:32:42 +03:00
github-actions[bot] 12e030d6da
Merge master into staging-next 2023-08-13 18:00:59 +00:00
h7x4 66de20bc45
tests/prometheus-exporters: add test for mysqld exporter 2023-08-13 19:47:19 +02:00
h7x4 8981783b60
services/prometheus/exporters: add mysqld
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2023-08-13 19:46:30 +02:00
Bernardo Meurer 70dd76d94f
Merge pull request #247475 from qowoz/nix217 2023-08-13 13:27:20 -04:00
Jonas Heinrich 5e6e949e84 nixos/opensnitch: add test 2023-08-13 17:49:19 +02:00
Jonas Heinrich c5f4a46036 nixos/opensnitch: Add support for EPBF process monitor
Co-authored-by: Slime90
2023-08-13 22:19:48 +08:00
Atemu 5f98e7c92b
Merge pull request #247357 from atorres1985-contrib/emacs-update
emacs: update to 29.1
2023-08-13 16:15:36 +02:00
Janne Heß da6c61cc19
nixos/manual: Add chapter about instance unit overrides 2023-08-13 14:40:25 +02:00
Janne Heß d995da11d8
nixos/switch-to-configuration: Fix unit location in toplevel 2023-08-13 14:26:30 +02:00
Janne Heß 7937c5816d
nixos/switchTest: Also check for base unit modifications 2023-08-13 14:25:24 +02:00
enc0urage 1488a2bc1a nixos/grub: Replace proprietary memtest86 with free memtest86+ in UEFI mode 2023-08-13 12:04:34 +00:00
github-actions[bot] 0ee8715a0d
Merge master into staging-next 2023-08-13 12:00:52 +00:00
happysalada 4022b2733a nixos/rustus: add user name to enable restoring of backups 2023-08-13 12:59:20 +01:00
Jörg Thalheim 38b2c039bd gitea-actions-runner: restart on failure 2023-08-13 12:54:15 +01:00
DavHau 3d58bac73b services.gitea-actions-runner: make ExecStartPre extensible 2023-08-13 12:54:15 +01:00
Jörg Thalheim 7ad7e99370 nixos/gitea-actions-runner: settings option to configure daemon 2023-08-13 12:54:15 +01:00
Nick Cao 0814089e05
nixos/zram: use nixos/zram-generator as backing implementation 2023-08-13 15:38:40 +08:00
Nick Cao a7e095d9fd
nixos/zram-generator: init 2023-08-13 15:36:23 +08:00
github-actions[bot] f5eb026a2a
Merge master into staging-next 2023-08-13 06:00:52 +00:00
Nick Cao 722e1e2313
Merge pull request #247899 from DavHau/zerotier-docs
nixos/zerotierone: document networks never left automatically
2023-08-13 00:00:35 -06:00
Bobby Rong ddd4973ddb
nixos/cinnamon: Drop qgnomeplatform
The upstream is not maintained, and qadwaitadecoration
does not seem to be xorg-related. We should have proper
shadows when using SSD.
2023-08-13 12:21:54 +08:00
Bobby Rong f4e1e8627d
nixos/pantheon: Drop qgnomeplatform
The upstream is not maintained, and qadwaitadecoration
does not seem to be xorg-related. We should have proper
shadows when using SSD.
2023-08-13 12:21:54 +08:00
Samuel Dionne-Riel f064a5bcc2
Merge pull request #220263 from samueldr/feature/misc-grub-fixes
nixos/grub: Fixes to allow flicker-free boot, themes and bug fixes
2023-08-12 20:32:51 -04:00
Doron Behar 924a07dc22 nixos/doc: Improve documentation of documentation
- Move contents of README.md from
  nixos/modules/installer/tools/manpages/ to
  nixos/doc/manual/contributing-to-this-manual.chapter.md.
- Don't mention DocBook as its obsolete and too specific.
- Rename derivation attribute name of configuration.nix(5) manual page,
  both on the `contributing-to-this-manual.chapter.md`, and in other
  places.
2023-08-12 22:28:04 +03:00
github-actions[bot] 1c639fb6fb
Merge master into staging-next 2023-08-12 18:00:55 +00:00
Acid Bong c76bb0d58e
nixos/zsh: add enableLsColors
Borrowed from nixos/bash/ls-colors module
2023-08-12 20:53:05 +03:00
Jan Tojnar 08d242047c iso_gnome: Fix evaluation
`qt.enable` option requires `qt.style` to be set.
Previously, this was set in GNOME module but it has been removed
in 622745942b
2023-08-12 19:30:49 +02:00
Doron Behar 32f75a0f2a nixos/install-tools: Add manpages to packages instead of seperating them
Since each such `nixos-*` tool has it's own derivation, exposed in pkgs,
There is no point in separating the manuals from the packages. If
someone wishes to have the tools without the manuals, they can use
meta.outputsToInstall to disable the installation of the manpages of
these packages. This Fixes #244450.
2023-08-12 18:01:06 +03:00
Maximilian Bosch 66ab687151
Merge pull request #248131 from Ma27/captive-browser-setcap
nixos/captive-browser: drop setcap wrapper for captive-browser
2023-08-12 14:52:38 +02:00
github-actions[bot] 9f3079a7c3
Merge master into staging-next 2023-08-12 12:01:01 +00:00
Ilan Joselevich 2393e099a6
Merge pull request #247008 from fufexan/hyprland
Update hyprwm packages and nixos/hyprland
2023-08-12 14:55:29 +03:00
Doron Behar 9d0bb6e67a nixos-option: Include manual page in the package 2023-08-12 12:57:16 +03:00
Doron Behar 68e6cc5831 nixos-rebuild: Include manual page in the package 2023-08-12 12:52:46 +03:00
Franz Pletz b6fb9b86a4
Merge pull request #248586 from oddlama/fix-hostapd-pwfile
nixos/hostapd: add missing stringification of path in INI format
2023-08-12 10:55:47 +02:00
Jan Tojnar 622745942b nixos/gnome: Do not force Qt apps to Adwaita
adwaita-qt tries valiantly to ensure a visual consistency
but unfortunately, it often falls into an uncanny valley instead.
Let’s make it opt-in again for more vanilla default experience.

Related: https://pagure.io/fedora-workstation/issue/351
2023-08-12 10:29:34 +02:00
Franz Pletz 5522989d34
Merge pull request #248521 from ehmry/liquidsoap
nixos/liquidsoap: restart always
2023-08-12 10:21:35 +02:00
oddlama bbac87a2dd
nixos/hostapd: add missing stringification of path in INI format 2023-08-11 22:44:08 +02:00
ash 05245fc0ea nixos/picom: add package option 2023-08-11 17:00:36 +01:00
Emery Hemingway 248c8c7812 nixos/liquidsoap: restart always 2023-08-11 12:51:27 +01:00
James Baker 09d32e2612
nixos/virtualisation.docker: Do not assert 32 bit libraries available on ARM (#246179) 2023-08-11 10:49:25 +02:00
Charles Hall 02fd938fb7
nixos/conduit: disable update checks by default 2023-08-10 23:16:19 -07:00
github-actions[bot] b4856800a9
Merge staging-next into staging 2023-08-11 06:01:25 +00:00
Franz Pletz cb6dd866f2
Merge pull request #241338 from bachp/minio-distributed 2023-08-11 05:33:44 +02:00
Franz Pletz 68e658f7fc
Merge pull request #248446 from aanderse/pam_mkhomedir 2023-08-11 04:52:12 +02:00
Anderson Torres 46865e7ab8 rl-2311: mention emacs-29 update
Co-authored-by: Atemu <atemu.main@gmail.com>
Co-authored-by: adisbladis <adisbladis@gmail.com>
Co-authored-by: asymmetric <lorenzo@mailbox.org>
2023-08-10 23:45:09 -03:00
Mario Rodas d8001aae54
Merge pull request #242116 from flurie/fix-datadog-agent
datadog-agent: 7.38.1 -> 7.45.1
2023-08-10 20:53:27 -05:00
Nick Cao 8efe50b161
Merge pull request #248343 from CnTeng/master
nixos/dae: use network-online
2023-08-10 19:37:36 -06:00
Aaron Andersen 9d56365451 security/pam: add umask option to configure pam_mkhomedir 2023-08-10 20:35:08 -04:00
Franz Pletz 4fc07e7b48
nixos/tests/mediamtx: init 2023-08-10 20:43:26 +02:00
Franz Pletz 362810eabe
nixos/mediamtx: refactor
* log settings are defaults
* log directory won't generally be used
* remove ffmpeg from path, encourage the use of store paths in settings
2023-08-10 20:16:11 +02:00
github-actions[bot] ec1a84ef66
Merge staging-next into staging 2023-08-10 18:01:30 +00:00
Franz Pletz 9c85697da8
Merge pull request #244060 from Gerg-L/nvidiaDynamicBoost
nixos/nvidia: clean up and add dynamic boost
2023-08-10 17:02:26 +02:00
Silvan Mosberger 37ba768fb4
Merge pull request #241871 from mobusoperandi/doc-doc-syntax-chapter
doc syntax section into chapter, link from nixos manual
2023-08-10 16:11:25 +02:00
CnTeng 24f2116a7a nixos/dae: use network-online 2023-08-10 20:23:46 +08:00
Artturi 2ed985dd37
Merge pull request #248017 from Artturin/fishcrossfix 2023-08-10 15:18:21 +03:00
Maximilian Bosch 183be440fd
nixos/captive-browser: drop setcap wrapper for captive-browser
Since Linux 5.7 it's possible to set `SO_BINDTODEVICE` via `setsockopt(2)`
as unprivileged user if this operation doesn't imply escaping a VRF
interface[1].

Dropping the wrapper is actually desirable because `captive-browser`
itself doesn't drop capabilities and as a result, the capabilities are
passed on to `chromium` itself[2].

For older kernels, this is still necessary, hence the wrapper will only
be added nowadays if the kernel is older than 5.7.

[1] c427bfec18
[2] 08450562e5/bind_device_linux.go (L11-L14)
    and because our setcap wrapper makes all capabilities
    inheritable.
2023-08-10 14:06:38 +02:00
github-actions[bot] d98b254ef5
Merge staging-next into staging 2023-08-10 12:01:53 +00:00
Maximilian Bosch 1ab411fcd4
Merge pull request #247386 from montchr/docs-matrix-synapse
nixos/matrix-synapse: set public baseurl in example config
2023-08-10 12:52:34 +02:00
Ryan Lahfa afa8d16f74
Merge pull request #247102 from yaxitech/image-repart-package-option 2023-08-10 11:55:01 +02:00
Ryan Lahfa ec409e6f79
Merge pull request #231673 from symphorien/suid_wrappers_userns 2023-08-10 11:52:59 +02:00
github-actions[bot] 025b892dad
Merge staging-next into staging 2023-08-10 06:01:30 +00:00
Franz Pletz 6574d90239
Merge pull request #248154 from onny/nextcloud-tests-fix
nixos/tests/nextcloud: Fix deprecation warning
2023-08-10 04:18:27 +02:00
Franz Pletz 50e7a02e67
nixos/chrony: add simple test 2023-08-10 03:04:04 +02:00
Franz Pletz c13c1412bf
nixos/chrony: add enableMemoryLocking option
Fixes #222629.
2023-08-10 03:03:53 +02:00
Franz Pletz cef068f3b3
Revert "nixos/malloc: add back maybe unnecessary line"
This reverts commit ed55524562.

Does not evaluate.
2023-08-10 03:02:39 +02:00
github-actions[bot] e896efe3b2
Merge staging-next into staging 2023-08-10 00:02:37 +00:00
Franz Pletz 8e372c19d1
Merge pull request #245286 from codec/add-prometheus-idrac-exporter
prometheus-idrac-exporter: init at unstable-2023-06-29
2023-08-10 00:58:03 +02:00
github-actions[bot] 753276e426
Merge staging-next into staging 2023-08-09 18:01:38 +00:00
Jonas Heinrich 14f7b1161d nixos/tests/nextcloud: Fix deprecation warning 2023-08-09 16:57:57 +02:00
Robert Hensing 4b51c5360f nixops_unstable: Fix tests attribute
The .overrideAttrs part is ok now, but a "passthru' workaround is
necessary now. See https://github.com/NixOS/nixpkgs/pull/247520
2023-08-09 15:47:13 +02:00
Robert Hensing ea6e5c0730
Merge pull request #246775 from yaxitech/no-kernel-params-wo-kernel
nixos/toplevel: only pass `kernelParams` if `boot.kernel.enable`
2023-08-09 15:14:13 +02:00
Franz Pletz dcafb07ed8
Merge pull request #232250 from YBeaugnon/libvirt-hooks
nixos/libvirtd: hooks support
2023-08-09 15:07:52 +02:00
Franz Pletz b15eff32c4
Merge pull request #248126 from DDoSolitary/patch-netdata-ipc
nixos/netdata: fix position of NETDATA_PIPENAME
2023-08-09 14:42:55 +02:00
Guillaume Girol 0e4b8a05b2 nixos/wrappers: allow setuid and setgid wrappers to run in user namespaces
In user namespaces where an unprivileged user is mapped as root and root
is unmapped, setuid bits have no effect. However setuid root
executables like mount are still usable *in the namespace* as the user
already has the required privileges. This commit detects the situation
where the wrapper gained no privileges that the parent process did not
already have and in this case does less sanity checking. In short there
is no need to be picky since the parent already can execute the foo.real
executable themselves.

Details:
man 7 user_namespaces:
   Set-user-ID and set-group-ID programs
       When a process inside a user namespace executes a set-user-ID
       (set-group-ID) program, the process's effective user (group) ID
       inside the namespace is changed to whatever value is mapped for
       the user (group) ID of the file.  However, if either the user or
       the group ID of the file has no mapping inside the namespace, the
       set-user-ID (set-group-ID) bit is silently ignored: the new
       program is executed, but the process's effective user (group) ID
       is left unchanged.  (This mirrors the semantics of executing a
       set-user-ID or set-group-ID program that resides on a filesystem
       that was mounted with the MS_NOSUID flag, as described in
       mount(2).)

The effect of the setuid bit is that the real user id is preserved and
the effective and set user ids are changed to the owner of the wrapper.
We detect that no privilege was gained by checking that euid == suid
== ruid. In this case we stop checking that euid == owner of the
wrapper file.

As a reminder here are the values of euid, ruid, suid, stat.st_uid and
stat.st_mode & S_ISUID in various cases when running a setuid 42 executable as user 1000:

Normal case:
ruid=1000 euid=42 suid=42
setuid=2048, st_uid=42

nosuid mount:
ruid=1000 euid=1000 suid=1000
setuid=2048, st_uid=42

inside unshare -rm:
ruid=0 euid=0 suid=0
setuid=2048, st_uid=65534

inside unshare -rm, on a suid mount:
ruid=0 euid=0 suid=0
setuid=2048, st_uid=65534
2023-08-09 12:00:00 +00:00
DDoSolitary d410464c5d
nixos/netdata: fix position of NETDATA_PIPENAME
It was accidentally placed in a condition-guarded block, making the
setting only take effect when enableAnalyticsReporting = false.
2023-08-09 19:22:20 +08:00
Florian Praden 490ec79ac3
nixos/gitea: bugfix for gitea-dump service.
Missing custom directory setup in gitea-dump service. Adding environment variable in gitea-dump service definition.
2023-08-09 11:53:18 +02:00
github-actions[bot] bd7afc88f7
Merge staging-next into staging 2023-08-09 00:02:37 +00:00
Artturin ea580ebee8 nixos/fish: Fix completion generator cross-compilation 2023-08-08 23:21:38 +03:00
Robert Hensing bc9d2d6a7c
Merge pull request #247520 from Atemu/fix/kernel-passthru.tests
kernel: fix passthru.tests
2023-08-08 21:29:19 +02:00
github-actions[bot] 792f4d7934
Merge staging-next into staging 2023-08-08 18:01:27 +00:00
Mihai Fufezan 50ad802e51
nixos/hyprland: remove xwayland.hidpi 2023-08-08 20:32:53 +03:00
K900 b0b00f0e28
Merge pull request #247937 from linj-fork/fix-types.string
treewide: stop using types.string
2023-08-08 18:50:42 +03:00
WilliButz acbf16d419
Merge pull request #247709 from Ma27/nextcloud-adminuser-doc-fix
nixos/nextcloud: improve documentation of `adminuser`-option
2023-08-08 16:29:59 +02:00
Lin Jian 74fadae942
treewide: stop using types.string
It is an error[1] now.

[1]: https://github.com/NixOS/nixpkgs/pull/247848
2023-08-08 21:31:21 +08:00
github-actions[bot] f19f490d4e
Merge staging-next into staging 2023-08-08 12:01:54 +00:00
DavHau 74c574a8db nixos/zerotierone: document networks never left automatically
Removing a network from the joinNetworks list does not make the machine leave the network which is confusing.

This behavior is now clarified via the options description
2023-08-08 11:31:33 +02:00
Michele Guerini Rocco ccc33bd3d7
Merge pull request #245852 from rnhmjoj/pr-fix-dnscrypt
dnscrypt-wrapper fixes
2023-08-08 10:34:27 +02:00
Lassulus e63386d6bf
Merge pull request #247751 from Mic92/installation-device-trusted-users
nixos/installation-device: allow nix-copy for root/nixos user
2023-08-08 08:23:59 +02:00
github-actions[bot] 66d14ccd84
Merge staging-next into staging 2023-08-08 06:01:31 +00:00
Franz Pletz 9640eb3970
Merge pull request #246029 from ehmry/eris-go 2023-08-08 06:18:03 +02:00
Franz Pletz 7fdf825d82
Merge pull request #247823 from emilylange/caddy 2023-08-08 05:57:37 +02:00
github-actions[bot] 2e9323c2d4
Merge staging-next into staging 2023-08-08 00:02:19 +00:00
emilylange efdcf6b96c
nixosTests.caddy: remove etag subtest
Caddy 2.7.x does no longer return etags for files with unix modtimes of
0 and 1.
Files in /nix/store have a modtime of 1.

This is something that has been specifically implemented for nix.

For now, we decided to remove the test.
But I might reimplement a similar etag subtest some time in the future.
2023-08-07 23:47:07 +02:00
Pol Dellaiera ef02511ff4
Merge pull request #247358 from pokon548/dae-add-service
nixos/dae: init
2023-08-07 21:11:43 +02:00
github-actions[bot] 597f030762
Merge staging-next into staging 2023-08-07 18:01:43 +00:00
Isa bd50b5fcf5 graylog-5_1: init at 5.1.4 2023-08-07 19:49:48 +02:00
Lily Foster b367b9cf87
Merge pull request #241565 from SuperSandro2000/nox-python
nixos/no-x-libs: use pythonPackagesExtensions to construct python ove…
2023-08-07 10:56:27 -04:00
Jörg Thalheim 1f1a758e95 nixos/installation-device: allow nix-copy for root/nixos user
For non-interactive installation it's quite handy to be able to nix copy additional dependencies to the system.
While this is possible for the root user, we cannot easily ssh into it, as we don't allow root login with a password.
By making nixos a trusted user, we can do "passwd && sudo systemctl start sshd" and than run nixos-anywhere
2023-08-07 16:48:49 +02:00
github-actions[bot] 9d7b03ec57
Merge staging-next into staging 2023-08-07 12:01:16 +00:00
Maximilian Bosch 648546b09d
nixos/nextcloud: improve documentation of adminuser-option
This option only has an effect on the initial setup of Nextcloud and
changes later won't have any effect.

Same issue as with `adminpassFile` - it's only passed to the installer
command - but even worse because the username is frequently used as
unique ID in the database, so there's no trivial way to change it, even
imperatively.
2023-08-07 12:16:41 +02:00
pokon548 dcf5ae3d0b nixos/dae: init 2023-08-07 14:32:32 +08:00
Wout Mertens ea07a9a98e
Merge pull request #247319 from DDoSolitary/patch-netdata-ipc
netdata: set NETDATA_PIPENAME to /run/netdata/ipc
2023-08-07 08:27:29 +02:00
github-actions[bot] 6311c0f6ef
Merge staging-next into staging 2023-08-07 00:02:29 +00:00
Martin Weinelt af90462b88
Merge pull request #247235 from mweinelt/wyoming-faster-whisper-option-fix
nixos/wyoming/faster-whisper: fix device option description
2023-08-06 22:04:42 +02:00
github-actions[bot] bbf876fefa
Merge staging-next into staging 2023-08-06 18:01:26 +00:00
K900 4a2735bb3d
Merge pull request #241481 from Mayeu/update/kubo
kubo: 0.20.0 -> 0.21.0
2023-08-06 20:03:37 +03:00
Atemu a0dcabb690 kernel: fix passthru.tests
https://github.com/NixOS/nixpkgs/pull/191540 indirectly broke kernel
passthru.tests; calling the testsForLinuxPackages and testsForKernel functions
with some args intended for some other exposed test-internal function.

Organise the passed-through functions under `passthru` to prevent this from
happening.
2023-08-06 15:47:54 +02:00
Atemu 6229f0bc8f all-tests: exclude passthru attributes from test discovery
discoverTests tries to discover some sort of internal function and tries to call
it with the arguments for that internal function. This poses an issue when you
want to expose some other functions (i.e. a parameterisation for a test) in
nixosTests.

This commit allows a test to pass through arbitrary values via `.passthru`
without them having discovery applied to them; including functions.
2023-08-06 15:40:10 +02:00
github-actions[bot] b536c72108
Merge staging-next into staging 2023-08-06 12:02:05 +00:00
Maximilian Bosch 01820d520b
Merge pull request #247384 from jtbx/nextcloud-doc
nixos/nextcloud: improve documentation
2023-08-06 12:27:33 +02:00
Nick Cao 90c77d8891
Merge pull request #246842 from frederictobiasc/mautrix-whatsapp-module
nixos/mautrix-whatsapp: init
2023-08-06 03:21:25 -06:00
Frédéric Christ 3a1f5757b9 mautrix-whatsapp: move defaults back to options.
As suggested by @nickcao this commit moves the defaults back to the
options. Only `homeserver.domain` stays in the config section since the
documentation module does not support referencing attributes of other
modules.
2023-08-06 11:03:17 +02:00
zowoq b2c3198256 nixos/nix-fallback-paths: 2.15.1 -> 2.17.0
https://releases.nixos.org/nix/nix-2.17.0/fallback-paths.nix
2023-08-06 16:22:39 +10:00
github-actions[bot] 2ca7eb5d4e
Merge staging-next into staging 2023-08-06 06:01:22 +00:00
davidak 62f11e9e1d
Merge pull request #246187 from SuperSamus/hid-nintendo-remove
hid-nintendo: remove
2023-08-06 04:07:11 +02:00
Tom McLaughlin addfb000c4 tmux: add extraConfigBeforePlugins 2023-08-05 18:59:52 -07:00
github-actions[bot] 0031ae7742
Merge staging-next into staging 2023-08-06 00:03:36 +00:00
Jeremy c7a9f7c132 nixos/nextcloud: improve documentation 2023-08-06 10:02:52 +12:00
Chris Montgomery aefa0bb6cc
nixos/matrix-synapse: set public baseurl in example config 2023-08-05 16:08:35 -04:00
Gregor Godbersen 3d9a6399a1 nixos/paperless: set default thumbnail font
The upstream default for the thumbnail font is set to "Liberation Serif
Regular" located at /usr/share/fonts which is inaccessible under nix.
(2a2bf3bf55/src/paperless/settings.py (L894))

Paperless throws an error when parsing plaintext files without a valid
font. This change sets a nix default using the liberation_ttf package.
2023-08-05 22:06:27 +02:00
Gregor Godbersen 540a20546a nixos/paperless: add test for plaintext document 2023-08-05 22:06:27 +02:00
github-actions[bot] 687b501234
Merge staging-next into staging 2023-08-05 18:01:37 +00:00
WilliButz 404abaa27a
Merge pull request #247314 from Ma27/nextcloud-php-settings
nixos/nextcloud: make php settings additive
2023-08-05 14:12:52 +02:00
github-actions[bot] f8579c6c72
Merge staging-next into staging 2023-08-05 12:02:05 +00:00
Frédéric Christ 288d2ee55d mautrix-whatsapp: Move defaults to config section
This contribution applies Example 32 (conventional settings option) from
[nixpkgs](https://nixos.org/manual/nixos/stable/#sec-settings-nix-representable).
2023-08-05 13:57:15 +02:00
DDoSolitary 060a47e1e4
netdata: set NETDATA_PIPENAME to /run/netdata/ipc
Netdata creates its control socket at /tmp/netdata-ipc by default, which
is insecure and actually inaccessible with systemd's PrivateTmp enabled.

Originally we patched its source code to move the socket to
/run/netdata/ipc. However, it was removed due to incompatibility when
upgrading to v1.41.0: 1d2a2dc7d0

Fortunately, this new version of netdata adds support for setting the
location of the control socket via the environment variable
NETDATA_PIPENAME. So let's set it for the netdata service and the
command line utility so that they can communicate properly.
2023-08-05 18:19:08 +08:00
Maximilian Bosch 2ddb1453e6
nixos/nextcloud: make php settings additive
Right now, the settings aren't additive which means that when I do

    services.nextcloud.phpOptions."opcache.interned_strings_buffer = "23";

all other options are discarded because of how the module system works.

This isn't very nice in this case, though because wanting to override
a single option doesn't mean I want to discard the rest of the -
reasonable - defaults. Hence, the settings are showed as default in the
option's manual section, but are added with normal priority.

That means, to override _all_ options at once, an expression like

    services.nextcloud.phpOptions = mkForce {
      /* ... */
    };

is needed. This is also way more intuitive IMHO because the `mkForce`
explicitly tells that everything will be modified.

Also, APCu enable and the memory & file-size limits are also written
into `services.nextcloud.phpOptions` rather than adding them
silently before passing all options to the PHP package. This has the
benefit that users will realize on evaluation time that they configured
options that would otherwise be set by the module on its own.
2023-08-05 11:58:11 +02:00
Emery Hemingway b6c5112152 nixos/ntopng: seperate interface config with newlines 2023-08-05 10:02:48 +01:00
Vladimír Čunát d5732d9669
Merge branch 'staging-next' into staging 2023-08-05 07:45:29 +02:00
Martin Weinelt 12cb284a44
nixos/wyoming/faster-whisper: fix device option description 2023-08-05 00:24:26 +02:00
Maximilian Bosch ed02e79bbe
Merge pull request #241497 from bendlas/prepare-gitea-120
nixos/gitea: add WORK_PATH to config, fix 1.20
2023-08-04 18:50:09 +02:00
Martin Weinelt 3d36620b0e
Merge pull request #247109 from helsinki-systems/fix/networking-test
nixos/tests/networking: dhcpd -> kea
2023-08-04 16:48:45 +02:00
ajs124 1690adc424 nixos/tests/networking/caseSensitiveRenaming: fix bash syntax
was introduced broken in 93502aa3b1
2023-08-04 14:38:08 +02:00
ajs124 799a69971e nixos/tests/networking: dhcpd -> kea
forgotten in 413d9d3864
2023-08-04 14:23:09 +02:00
Vincent Haupert f652755434 nixos/image: add image.repart.package option
Allow giving a custom package containing the `systemd-repart` binary.
Defaults to `pkgs.systemd`. This option opens up the possibility to use
a different package for the image builder and the system configuration.

For example, someone could use this option to build an image with a
patched systemd while still using the upstream nixpkgs systemd package
(i.e., `pkgs.systemd`) for the system configuration installed to the
created image.
2023-08-04 13:49:18 +02:00
ajs124 bf4d2e6c1e
Merge pull request #242538 from tnias/fix/apparmor
apparmor: add some policies and improve abstractions and utils
2023-08-04 13:05:52 +02:00
Vincent Haupert fbebce610f nixos/toplevel: move systemBuilder for boot.kernel.enable
This avoids creating a build-time reference on `boot.kernelParams` if
the configuration does not use a kernel, i.e., `boot.kernel.enable` is
set to `false`.
2023-08-04 12:46:03 +02:00
codec 47db2bfffb prometheus-idrac-exporter: init at unstable-2023-06-29 2023-08-04 00:57:19 +02:00
Jan Malakhovski 775f21b9fd doc: add a release note about proper sourceRoot usage 2023-08-03 16:32:06 +00:00
Pol Dellaiera 9aabdcf43f
Merge pull request #237892 from jthulhu/update-pharo
pharo: old -> 10.0.5
2023-08-03 18:20:01 +02:00
jthulhu e85228766c pharo: old -> 10.0.5 2023-08-03 16:57:58 +02:00
Ryan Lahfa 2a1f1797be
Merge pull request #246941 from yaxitech/image-amend-repart-r13y 2023-08-03 15:57:24 +02:00
Gerg-L 4ca2a16390 nixos/nvidia: add Dynamic Boost support 2023-08-03 09:32:14 -04:00
Martin Weinelt 667c4f2dc6
Merge pull request #224635 from helsinki-systems/drop/dhcpd
dhcpd: remove
2023-08-03 15:12:06 +02:00
ajs124 4b0ef51702
Merge pull request #245891 from Izorkin/fix-nginx-http2
nixos/nginx: using new variant of http2 directive
2023-08-03 14:50:31 +02:00
Martin Weinelt f699824f6e
python310Packages.django: migrate to django_4
3.2 LTS ran out of mainstream support in 2021/12 and we should probably
stay on the latest LTS release, that receives mainstream support.
2023-08-03 14:35:34 +02:00
Martin Weinelt 9eaec2881f
Merge pull request #246836 from NixOS/home-assistant
home-assistant: 2023.7.3 -> 2023.8.0
2023-08-03 13:54:00 +02:00