Commit graph

28661 commits

Author SHA1 Message Date
John Rinehart 392c83491d
nixos/lightdm-greeters/slick: disable slick greeter by default 2022-08-20 16:37:34 +08:00
Vladimír Čunát 78182194c6
Revert Merge #184360: json-glib: add installed tests
Moving to staging, as it causes lots of rebuilds
and it doesn't seem urgent.

This reverts commit d6fb907269, reversing
changes made to 600b02324c.
2022-08-20 08:43:12 +02:00
Bobby Rong 29cb1c877c
Merge pull request #184409 from water-sucks/lightdm-slick-greeter
lightdm-slick-greeter: init at 1.5.9
2022-08-20 09:28:52 +08:00
Jan Tojnar d6fb907269
Merge pull request #184360 from willbush/json-glib
json-glib: add installed tests
2022-08-20 00:12:56 +02:00
pennae 6039648c50 nixos/*: automatically convert option docs 2022-08-19 22:40:58 +02:00
pennae 7e7d68a250 nixos/*: mark pre-existing markdown descriptions as mdDoc 2022-08-19 22:40:58 +02:00
pennae b51f8036c2 nixos/*: use properly indented strings for option docs
using regular strings works well for docbook because docbook is not as
whitespace-sensitive as markdown. markdown would render all of these as
code blocks when given the chance.
2022-08-19 22:40:58 +02:00
pennae 72b507d5a2 nixos/*: convert some markdown in docbook to tags
a lot of markdown syntax has already snuck into option docs, many of it
predating the intent to migrate to markdown. we don't convert all of it
here, just that which is accompanied by docbook tags as well. the rest
can be converted by simply adding the mdDoc marker.
2022-08-19 22:40:58 +02:00
pennae b0e56acef9 nixos/*: remove links to options in code blocks
markdown simply cannot represent these. would be nice to have, but
it'll have to happen some other way (if at all).
2022-08-19 22:40:58 +02:00
pennae 275a34e0d8 nixos/nix-daemon: replace <uri> with <literal>
this could've been a link as well, but <uri> did not render as a link in
the html manual.
2022-08-19 22:40:58 +02:00
pennae d0ba463fcf nixos/*: replace <quote> with actual quotes 2022-08-19 22:40:58 +02:00
pennae f1d39b6d61 nixos/postgresql: replace <function> with <literal>
there's only this one use, we can live with the tiny rendering change.
2022-08-19 22:40:58 +02:00
pennae b7327e966b nixos/*: normalize links with #TEXT=href
the xslt pass will re-add this text, and not having href and text be
equal is required to automatically migrate these links to markdown.
2022-08-19 22:40:58 +02:00
pennae 2646fd7c1b nixos/*: remove <productname>
no change to the rendered output, and we can't properly represent this
in markdown anyway.
2022-08-19 22:40:58 +02:00
pennae a4fdff515b nixos/*: turn inline code blocks into more appropriate things 2022-08-19 22:40:58 +02:00
pennae e4ed177f82 nixos/* eliminate inner whitespace in tags that was missed earlier
nix-doc-munge won't match tags that contain newlines anywhere. most of
these have already been removed, but a few obviously made it through.
2022-08-19 22:40:58 +02:00
pennae 8f8e101527 nixos/*: normalize <package> to <literal>
this renders the same in the manpage and a little more clearly in the
html manual. in the manpage there continues to be no distinction from
regular text, the html manual gets code-type markup (which was probably
the intention for most of these uses anyway).
2022-08-19 22:40:58 +02:00
Kenny MacDermid 7b0b92f5a9
Revert "nixos/fwupd: enable udisks2"
This reverts commit fb5bceb3ff.

Reverted at the request of the author, Bernardo Meurer, to avoid
requiring udisks2 for fwupd to work.
2022-08-19 12:53:34 -03:00
Kenny MacDermid 9754c6d332
nixos/fwupd: migrate to uefi_capsule.conf
In version 1.5.5 of fwupd the uefi plugin was renamed to
uefi-capsule. As part of those changes the configuration file was
renamed and changed.

This modules configuration mismatch was generally hidden because
when udisks2 is enabled fwupd will use that instead. Without
udisks2 the following warning is seen:

    WARNING: UEFI ESP partition not detected or configured
2022-08-19 12:53:23 -03:00
Maximilian Bosch c3dec21923
Merge pull request #187372 from delroth/networkd-p2p-route
nixos/network-interfaces-systemd: do not ignore /0 gateway routes
2022-08-19 12:58:28 +02:00
Linus Heckemann d167d23b40
Merge pull request #176780 from linj-fork/emacs-native-comp
emacs: enable native-comp
2022-08-19 12:04:51 +02:00
Christian Kögler b055aadc3d
Merge pull request #157997 from kirelagin/grayscale-antialiasing
hidpi: Use gray-scale antialiasing for fonts
2022-08-19 10:37:30 +02:00
Christian Kögler 5d52f38905
Merge pull request #166942 from AleXoundOS/patch-1
NixOS manual: fix ACME certificates in Nginx configuration sample
2022-08-19 09:55:43 +02:00
Christian Kögler 2364de14a7
Merge pull request #170941 from jfroche/bitcoind-test
nixos/tests/bitcoind: fix test
2022-08-19 09:32:04 +02:00
Christian Kögler 5e7662d848
Merge pull request #167692 from peperunas/onsuccess
nixos/systemd: Add onSuccess module option for units
2022-08-19 09:17:14 +02:00
zowoq 72a3a868a0 nixos/{containers,podman}: nixpkgs-fmt 2022-08-19 14:10:47 +10:00
Gauvain 'GovanifY' Roussel-Tarbouriech 6c55578c7e nixos/komga: add module 2022-08-18 22:52:27 -04:00
Pierre Bourdon 4ae5da5394
nixos/network-interfaces-systemd: do not ignore /0 gateway routes
While it might seem odd, 0.0.0.0/0 or ::/0 gateways are valid and
commonly used on point-to-point links (e.g. a wireguard tunnel) to
indicate that all traffic needs to be sent to a given interface.

systemd-networkd actually documents this as a valid configuration in its
man pages [1].

Tested to do the right thing in one of my NixOS containers using
a Wireguard tunnel as its default route.

[1] https://www.freedesktop.org/software/systemd/man/systemd.network.html#DefaultRouteOnDevice=
2022-08-19 02:25:41 +02:00
Pascal Bach b6ab2508f5
Merge pull request #187299 from superherointj/nixos-modules-minio-fix-network-issue
nixos/minio: fix startup issue
2022-08-18 21:46:43 +02:00
Maximilian Bosch 6a1263503c
Merge pull request #185803 from Ma27/sssd-secrets
nixos/sssd: Add secrets handling (patch originally from @yayayayaka)
2022-08-18 20:51:41 +02:00
Bobby Rong 038d91ed41 rl-2211: mention blueman & slick-greeter switch 2022-08-18 23:01:43 +08:00
Bobby Rong e2ddd98cc9 nixos/cinnamon: default to slick-greeter
Default in Linux Mint.
2022-08-18 23:01:43 +08:00
superherointj 89f527384b nixos/minio: fix startup issue 2022-08-18 11:52:29 -03:00
Andrew Marshall 6dc1c73aba nixos/libvirtd: Do not add autostart network
This does make the out-of-the-box install perhaps a bit worse, since
networking may need to be manually configured. However, it makes it less
frustrating that upon every start of this service, a *removed* autostart
network will be re-added when removed by the user. See
https://github.com/NixOS/nixpkgs/issues/73418 for details.

Behavior from other distros:

- Adds autostart net on install: Fedora
- Does not add autostart net   : Debian, Arch

This does not break any existing installs since it does not affect any
autostart network already in-place.
2022-08-18 15:48:05 +02:00
ckie 30ad2e1c12
Merge pull request #162484 from jappeace/keter-module
nixos/keter: init at 2.0.1
2022-08-18 15:44:05 +03:00
Lin Jian 51bd7cf0d0
emacs: enable native-comp 2022-08-18 20:38:37 +08:00
Jappie Klooster a4d72ad628
nixos/keter: init
Enable keter module

Keter is an apploader which:
1. has the old app running on a port.
2. loads a new one, and wait for that to complete
3. switches the old with the new one once the new one finished loading.

It supports more functionality but this use case
is the primary one being used by supercede.

Adds keter as a module to nixos.
Currently keter is unusable with nix,
because it relies on bundeling of a tar and uploading that to a specific folder.
These expressions automate these devops tasks,
with especially nixops in mind.
This will work with versions above 1.8

The test seems to work.
This uses a new version of keter which has good
support for status code on error pages.
We're using this config at production at supercede
so it should be fine.

Squash log:
==========

mention keter in changelog

Update generated release notes

Always restart keter on failure

This is a little bit of extra stability in case keter crashes.
Which can happen under extreme conditions (DoS attacks).

Update nixos/doc/manual/release-notes/rl-2205.section.md

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

Update nixos/modules/module-list.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

Remove sanitization

don't put domain in as a string

Update nixos/tests/keter.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

add jappie as module maintainer

Use type path instead of two seperate options

Fix generated docs

added test machinery to figure out why it's failing

Fix the test, use console output

run nixpkgs-fmt on all modules

Inline config file.

This get's rid of a lot of inderection as well.

Run nix format

remove comment

simplify executable for test

delete config file

add config for keter root

Remove after redis clause

set keter root by default to /var/lib/keter

Update nixos/modules/services/web-servers/keter/default.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

Update nixos/modules/services/web-servers/keter/default.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

Update nixos/modules/services/web-servers/keter/default.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

fix nit

add newlines

add default text and move description in a long description

Delete rather obvious comment

fix release db thing

remove longDescription and put it in a comment instead

change description of mkEnalbeOption

explain what keter does by using the hackage synopsis

set domain to keterDomain and same for executable

move comment to where it's happening

fix type error

add formatting better comment

try add seperate user for keter

Revert "try add seperate user for keter"

This reverts commit d3522d36c96117335bfa072e6f453406c244e940.

Doing this breaks the setup

set default to avoid needing cap_net_bind_service

remove weird comment

use example fields

eleborated on process leakage

Update nixos/modules/services/web-servers/keter/default.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

run nixpkgs-fmt

update docs

Fix formatting, set keter package by default

format our little nixexpr

replace '' -> " where possible

drop indent for multiline string

make description much shorter

regen docs database
2022-08-18 15:29:47 +03:00
Maximilian Bosch 5ec8223e63
nixos/sssd: explain why we use EnvironmentFile= 2022-08-18 11:38:49 +02:00
Maximilian Bosch 204d32c5c1
nixos/sssd-ldap: verify that passing secrets via env works 2022-08-18 11:37:43 +02:00
Maximilian Bosch 2f0bd926ea
nixos/sssd-ldap: fix eval
Introduced by fd7d901133. The openldap
module now expects the database directory to be below
`/var/lib/openldap`, oterhwise it'll fail evaluation like this:

    Failed assertions:
    - Database dc=example,dc=org has `olcDbDirectory` (/var/db/openldap) that is not a subdirectory of
    `/var/lib/openldap/`.
2022-08-18 11:37:29 +02:00
Maximilian Bosch 8d92d42c5c
nixos/sssd: fix typo 2022-08-18 11:34:06 +02:00
Varun Narravula fdac82a307 nixos/lightdm-greeters/slick: init 2022-08-18 15:52:05 +08:00
Kira Bruneau 6e665c4e29
Merge pull request #185987 from LoveIsGrief/display-manager-read-.profile
Attempt to source .profile if .xprofile not found
2022-08-17 15:58:46 -04:00
LoveIsGrief 881512e23f
x11: Source .profile and .xprofile
Other popular distros (OpenSuse, Ubuntu, Gentoo, Arch) read $HOME/.profile when starting X11 display managers.
When moving to nixOS, that is then broken leading to unpredictable behavior (probably programs not working).

This adds similar behavior to https://github.com/sddm/sddm/blob/develop/data/scripts/Xsession

Related to #185979
2022-08-17 20:37:33 +02:00
Jan Tojnar 299611a634
Merge pull request #187132 from ElvishJerricco/gnome-disable-packagekit
nixos: Don't enable packagekit by default
2022-08-17 20:24:05 +02:00
Will Fancher d3e5bd0228 nixos: Don't enable packagekit by default 2022-08-17 13:53:21 -04:00
Bernardo Meurer 5fcc2ff7a1
Merge pull request #187029 from lovesegfault/fwupdmgr-udisks
nixos/fwupd: enable udisks2
2022-08-17 09:04:55 -07:00
Sandro a9f3c22db5
Merge pull request #182382 from SuperSandro2000/portunus 2022-08-17 15:20:45 +02:00
ckie 6c36827e98
Merge pull request #186536 from tpwrules/add-spice-webdavd-module
nixos/spice-webdavd: init
2022-08-17 13:41:43 +03:00
Kim Lindberger eed71ab5db
Merge pull request #185820 from talyz/discourse-2.9.0.beta8
discourse: 2.9.0.beta4 -> 2.9.0.beta9
2022-08-17 10:41:28 +02:00