Commit graph

28349 commits

Author SHA1 Message Date
Sandro bca69a4037
Merge pull request #181867 from newAM/github-runner
nixos/github-runner: fix systemd defaults for common workflows
2022-07-19 12:56:17 +02:00
Euan Kemp f158ac45ef nixos/k3s: use default cgroup-driver again
Setting `cgroup-driver=systemd` was originally necessary to match with
docker, else the kubelet would not start (#111835)

However, since then, docker support has been dropped from k3s (#177790).
As such, this option is much less necessary.

More importantly, it now seems to be actively causing issues. Due to an
upstream k3s bug, it's resulting in the kubelet and containerd having
different cgroup drivers, which seems to result in some difficult to
debug failure modes.

See
https://github.com/NixOS/nixpkgs/issues/181790#issuecomment-1188840862
for a description of this problem.

Removing this flag entirely seems reasonable to me, and it results in
k3s working again on my machine.
2022-07-19 02:52:12 -07:00
Wei Tang b0a0087d53
nixos/flannel: upgrade to etcdv3 (#180315) 2022-07-19 16:09:42 +10:00
github-actions[bot] 1ae70f1c80
Merge staging-next into staging 2022-07-19 06:03:43 +00:00
github-actions[bot] 305e8cb7b8
Merge master into staging-next 2022-07-19 06:03:02 +00:00
Wout Mertens 3ee8d4c909
netdata module: fix ExecStartPost (#181976) 2022-07-19 06:19:18 +02:00
github-actions[bot] 5467a35e74
Merge staging-next into staging 2022-07-19 00:02:54 +00:00
github-actions[bot] d64d75f2f3
Merge master into staging-next 2022-07-19 00:02:21 +00:00
Artturi 6dc4ee65f7
Merge pull request #179163 from cmm/network-setup-bindTo
nixos/network-interfaces-scripted: don't bindTo absent network-setup.service
2022-07-19 01:33:14 +03:00
Joachim F 0640ef2ccc
Merge pull request #180231 from dfithian/heartbeat
heartbeat service: specify package
2022-07-18 20:56:08 +02:00
Dan Fithian 49a5377557 heartbeat service: specify package
Other elastic services can specify the package. Now we can also do it for heartbeat.
2022-07-18 14:39:22 -04:00
github-actions[bot] 9339fffb65
Merge staging-next into staging 2022-07-18 18:01:57 +00:00
github-actions[bot] 83702a6ef7
Merge master into staging-next 2022-07-18 18:01:14 +00:00
oaksoaj fc9e22fca1 yggdrasil: add group option back and remove systemd User= directive
The group configuration parameter allow to share access to yggdrasil
control socket with the users in the system. In the version we propose,
it is null by default so that only root can access the control socket,
but let user create their own group if they need.

Remove User= durective in systemd unit. Should a user with the specified
name already exist in the system, it would be used silently instead of a
dynamic user which could be a security concern.
2022-07-18 12:56:59 -05:00
oaksoaj 080774e28f yggdrasil: reenable DynamicUser
Since version 0.4 Yggdrasil works again using systemd's DynamicUser option.
This patch reenables it to improve security.

We tested this with both persistent and non-persistent keys. Everything
seems to work fine.
2022-07-18 12:56:59 -05:00
Maximilian Bosch 179688c7c8
Merge pull request #181377 from mayflower/mxisd-secrets
nixos/mxisd: allow passing secrets
2022-07-18 15:10:49 +02:00
Maximilian Bosch 8b72dae17b
Merge pull request #181528 from Ma27/privacyidea-ldap-proxy-secrets
nixos/privacyidea: better secret-handling ldap-proxy & RFC42-style settings for ldap-proxy
2022-07-18 14:19:47 +02:00
github-actions[bot] a2fce4c651
Merge staging-next into staging 2022-07-18 12:02:35 +00:00
github-actions[bot] 71fe747e70
Merge master into staging-next 2022-07-18 12:01:55 +00:00
Maximilian Bosch 949c334ea9
nixos/privacyidea-ldap-proxy: use list for EnvironmentFile for mergeability 2022-07-18 13:58:08 +02:00
Maximilian Bosch dab3ae9d8b
Merge pull request #181715 from mayflower/jira-secret-opts
nixos/atlassian-jira: allow to store SSO password for crowd outside of the Nix store
2022-07-18 13:53:42 +02:00
Jörg Thalheim 9a020f31aa
Merge pull request #175439 from Mic92/jellyfin
nixos/jellyfin: better defaults for hardware acceleration
2022-07-18 12:51:54 +01:00
Maximilian Bosch c2c82fbe43
nixos/mxisd: use a list for env file for mergeability 2022-07-18 13:47:09 +02:00
Janne Heß 4e0f8f7f44
Merge pull request #181882 from SuperSandro2000/systemd-boot
nixos/systemd-boot: remove default log message if nothing changes
2022-07-18 10:02:43 +02:00
Vladimír Čunát 250922fd1e
Merge branch 'master' into staging-next 2022-07-18 08:29:53 +02:00
Alex Martens c34749dd63 nixos/github-runner: fix systemd defaults for common workflows 2022-07-17 22:02:57 -07:00
Winter 96728ff138
Merge pull request #181660 from anoadragon453/anoa/libuiohook_init
libuiohook: init at 1.2.2
2022-07-17 20:38:02 -04:00
Sandro 24aefd2c82
Merge pull request #177240 from Majiir/streamdeck-ui 2022-07-17 23:27:43 +02:00
Andrew Morgan 4f82bcc822 libuiohook: init at 1.2.2 2022-07-17 16:21:25 -04:00
Sandro Jäckel 4396fd615c
nixos/systemd-boot: remove default log message if nothing changes 2022-07-17 21:46:50 +02:00
Sandro Jäckel 3920bb41f2
nixos/searx: improve searxng compatibility 2022-07-17 21:45:30 +02:00
Sandro 0890c4aef1
Merge pull request #168879 from aidalgol/pass-secret-service-systemd-unit 2022-07-17 16:45:27 +02:00
Bjørn Forsman 0080a93cdf nixos/jenkins-job-builder: create secret file with umask 0077
IOW, don't make it world readable.
2022-07-17 15:24:48 +02:00
Majiir Paktu 3ba735cce2 nixos/streamdeck-ui: init 2022-07-16 22:10:33 -04:00
github-actions[bot] 97f117148f
Merge staging-next into staging 2022-07-17 00:02:54 +00:00
github-actions[bot] 8df1eb061a
Merge master into staging-next 2022-07-17 00:02:14 +00:00
Sandro 04a5c30245
Merge pull request #179582 from catap/prl-tools 2022-07-17 01:41:46 +02:00
Sandro 769329f5f8
Merge pull request #172058 from midchildan/improvement/1pw-gid
nixos/_1password{,-gui}: use a static gid
2022-07-17 01:21:42 +02:00
Sivizius 5e941caa0d
nixos/cri-o: removed defaultText of internal package-option 2022-07-17 08:04:15 +10:00
Sandro Jäckel 5e297d07aa
nixos/onlyoffice: init 2022-07-16 23:32:07 +02:00
Vladimír Čunát 0879ac5da6
Merge branch 'master' into staging-next 2022-07-16 20:07:05 +02:00
Maximilian Bosch 4adf26f018
nixos/privacyidea-ldap-proxy: always run envsubst
Otherwise the file doesn't exist at the expected location.
2022-07-16 14:00:46 +02:00
Kim Lindberger d012de5b1d
Merge pull request #181401 from yayayayaka/gitlab-bump-git-to-2.35.4
nixos/gitlab: Bump git to 2.35.4
2022-07-16 13:37:16 +02:00
Maximilian Bosch 765cc35042
nixos/atlassian-jira: allow to store SSO password for crowd outside of the Nix store
The option `services.jira.sso.applicationPassword` has been replaced by
`applicationPasswordFile` that needs to be readable by the `jira`-user
or group.

The new `crowd.properties` is created on startup in `~jira` and the
secret is injected into it using `replace-secret`.
2022-07-16 13:01:29 +02:00
Bjørn Forsman dbb17b39ba nixos/tests/jenkins: improve jenkins-job-builder subtest
Rely on services.jenkins-job-builder to reload the configuration instead
of doing that manually in the test.

(If this had been implemented already, it would have caught the bug
fixed by the parent commit, that services.jenkins-job-builder failed to
reload jenkins config from disk.)
2022-07-16 12:30:41 +02:00
Bjørn Forsman 50eaf82b6f nixos/jenkins-job-builder: fix jenkins authentication
The current authentication code is broken against newer jenkins:

  jenkins-job-builder-start[1257]: Asking Jenkins to reload config
  jenkins-start[789]: 2022-07-12 14:34:31.148+0000 [id=17]        WARNING hudson.security.csrf.CrumbFilter#doFilter: Found invalid crumb 31e96e52938b51f099a61df9505a4427cb9dca7e35192216755659032a4151df. If you are calling this URL with a script, please use the API Token instead. More information: https://www.jenkins.io/redirect/crumb-cannot-be-used-for-script
  jenkins-start[789]: 2022-07-12 14:34:31.160+0000 [id=17]        WARNING hudson.security.csrf.CrumbFilter#doFilter: No valid crumb was included in request for /reload by admin. Returning 403.
  jenkins-job-builder-start[1357]: curl: (22) The requested URL returned error: 403

Fix it by using `jenkins-cli` instead of messing with `curl`.

This rewrite also prevents leaking the password in process listings. (We
could probably do it without `replace-secret`, assuming `printf` is a
shell built-in, but this implementation should be safe even with shells
not having a built-in `printf`.)

Ref https://github.com/NixOS/nixpkgs/issues/156400.
2022-07-16 12:30:41 +02:00
Arian van Putten 55bd770662
Merge pull request #167514 from shimunn/pam_u2f_module
nixos/security/pam: added `origin` option to pamu2f
2022-07-16 10:56:26 +02:00
Vladimír Čunát 7fbdf335d8
Merge #180368: nixos/i18n: normalise locale names 2022-07-16 09:01:42 +02:00
Timothy DeHerrera 371db36e56
nvidia: improve robustness of udev rules
fixes #165719
2022-07-15 19:37:13 -07:00
github-actions[bot] fa3b53e492
Merge staging-next into staging 2022-07-16 00:03:07 +00:00
github-actions[bot] fa96a4fa79
Merge master into staging-next 2022-07-16 00:02:26 +00:00
Sandro 2d0f98389f
Merge pull request #175738 from SuperSamus/plasma 2022-07-16 00:56:08 +02:00
Bernardo Meurer ed0e38f28d
Merge pull request #181625 from lovesegfault/nix-2.10.3
nix: 2.10.2 -> 2.10.3
2022-07-15 15:28:41 -07:00
Guillaume Girol df9f6848ac
Merge pull request #176063 from Izorkin/update-unit
unit: 1.26.1 -> 1.27.0
2022-07-15 20:39:32 +00:00
Guillaume Girol 5e78a8acb1
Merge pull request #179994 from gador/pgadmin-6.11
Pgadmin 6.11
2022-07-15 20:28:36 +00:00
Izorkin 2d7c97f439
unit: add php 8.1 2022-07-15 22:46:26 +03:00
Aaron Andersen 9b01242132
Merge pull request #131261 from bb2020/dlna
nixos/minidlna: convert to structural settings
2022-07-15 21:28:19 +02:00
Bernardo Meurer ea8a1ac198 nix-fallback-paths: 2.10.2 -> 2.10.3 2022-07-15 12:00:56 -07:00
shimun 327d99c0ca
nixos/security/pam: added origin option to pamu2f 2022-07-15 20:38:24 +02:00
github-actions[bot] 8eb75b850f
Merge staging-next into staging 2022-07-15 18:02:01 +00:00
github-actions[bot] 9f53d5cc15
Merge master into staging-next 2022-07-15 18:01:23 +00:00
Sandro 8e45a79ab1
Merge pull request #181579 from NixOS/netdata-module-startpost
netdata: fix post start for module
2022-07-15 16:20:55 +02:00
Sandro 475b23340b
Merge pull request #181410 from lilyinstarlight/fix/greetd-default-user
nixos/greetd: fix minor typo for default user
2022-07-15 16:12:09 +02:00
github-actions[bot] 9303bacb57
Merge staging-next into staging 2022-07-15 12:01:52 +00:00
github-actions[bot] a4622e8226
Merge master into staging-next 2022-07-15 12:01:15 +00:00
Valentin Gagarin 15edb27dd5
Merge pull request #177732 from tljuniper/python-doc-typos
doc/languages-frameworks: Fix typos
2022-07-15 11:50:54 +01:00
Lucas Eduardo e13404895a
nixos/label: add validation for system.nixos.label (#181479)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2022-07-15 11:45:25 +02:00
Wout Mertens 7f55ee3a53
netdata: fix post start for module 2022-07-15 09:57:13 +02:00
zowoq e2659eea36 nixos/kubernetes: use copyToRoot instead of deprecated contents 2022-07-15 10:23:06 +10:00
Maximilian Bosch bccaac9535
nixos/privacyidea: better secret-handling ldap-proxy & RFC42-style settings for ldap-proxy
Instead of hard-coding a single `configFile` for
`privacyidea-ldap-proxy.service` which is pretty unmergable with other
declarations it now uses a RFC42-like approach. Also to make sure that
secrets can be handled properly without ending up in the Nix store, it's
possible to inject secrets via envsubst

    {
      services.privacyidea.ldap-proxy = {
        enable = true;
        environmentFile = "/run/secrets/ldap-pw";
        settings = {
          privacyidea.instance = "privacyidea.example.org";
          service-account = {
            dn = "uid=readonly,ou=serviceaccounts,dc=example,dc=org";
            password = "$LDAP_PW";
          };
        };
      };
    }

and the following secret file (at `/run/secrets`):

    LDAP_PW=<super-secret ldap pw>

For backwards-compat the old `configFile`-option is kept, but it throws
a deprecation warning and is mutually exclusive with the
`settings`-attrset. Also, it doesn't support secrets injection with
`envsubst` & `environmentFile`.
2022-07-14 23:51:17 +02:00
Martin Weinelt b2d57db6c2
Merge pull request #180516 from Atemu/kernel-disable-ashmem
linux: disable ASHMEM on >= 5.18
2022-07-14 23:20:26 +02:00
github-actions[bot] 1a74c5d703
Merge master into staging-next 2022-07-14 18:01:27 +00:00
Nick Cao c543c996a9
nix-fallback-paths.nix: Update to 2.10.2 2022-07-14 23:53:44 +08:00
Elis Hirwing e4d73b8bdd
Merge pull request #181474 from etu/drop-some-maintainerships
treewide: Drop myself as maintainer for some packages I don't use
2022-07-14 15:08:07 +02:00
sternenseemann 0f68824d86
Merge pull request #181288 from NixOS/haskell-updates
haskellPackages: update stackage and hackage
2022-07-14 14:48:47 +02:00
Elis Hirwing 729fb87ae3
treewide: Drop myself as maintainer for some packages I don't use 2022-07-14 14:39:58 +02:00
github-actions[bot] 58eb752984
Merge master into staging-next 2022-07-14 12:01:31 +00:00
Martin Weinelt 0ae92922a1
nixos/tests/home-assistant: improve reload/restart test cases
Wait until home-assistant is fully reloaded or restarted to spot
possible errors during startup.

Swap out bluetooth_tracker for esphome, since the bluetooth tracker
causes errors, when it does not find a bluetooth device.

Drop mosquitto from the environment. It wasn't used since the 2022.3.0
release when MQTT stopped being configurable from the YAML config.
2022-07-14 02:26:54 +02:00
github-actions[bot] e0608ddfd9
Merge master into haskell-updates 2022-07-14 00:15:36 +00:00
Lily Foster 6f5c1bcf7b nixos/greetd: fix minor typo for default user
It has been like this since the module was added, but it hasn't caused
problems because greetd assumes a default user of "greeter"[1] when it
isn't found anyway

[1]: d700309623/item/greetd/src/config/mod.rs (L127)
2022-07-13 18:11:16 -04:00
M. A 61e3490c1c nixos/gitlab: Bump git to 2.35.4
Resolves CVE-2022-29187
2022-07-13 21:03:46 +00:00
github-actions[bot] 00ec8bc8d3
Merge master into staging-next 2022-07-13 18:01:28 +00:00
Maximilian Bosch d54d70f166
nixos/mxisd: allow passing secrets
Suppose you want to provide a LDAP-based directory search to your
homeserver via a service-user with a bind-password. To make sure that
this doesn't end up in the Nix store, it's now possible to set a
substitute for the bindPassword like

    services.mxisd.extraConfig.ldap.connection = {
      # host, bindDn etc.
      bindPassword = "$LDAP_BIND_PW";
    };

and write the actual secret into an environment file that's readable for
`mxisd.service` containing

    LDAP_BIND_PW=<your secret bind pw>

and the following setting in the Nix expression:

    services.mxisd.environmentFile = "/runs/ecrets/mxisd";

(cherry picked from commit aa25ce7aa1a89618e4257fd46c7d20879f54c728)
2022-07-13 19:19:17 +02:00
Domen Kožar c46a3dc50a cachix-agent: allow restarts now that deployments are subprocesses 2022-07-13 11:40:54 -05:00
Sandro a959a2cd26
Merge pull request #180992 from romildo/new.xdg.portal.lxqt 2022-07-13 14:15:09 +02:00
github-actions[bot] 9e8540af02
Merge master into staging-next 2022-07-13 12:01:13 +00:00
illustris 26c66bc7c8 nixos/release: add proxmox LXC and VMA 2022-07-13 10:44:41 +02:00
illustris f60f165501 nixos/proxmox-image: use qemu 6.2 for building VMA 2022-07-13 10:44:41 +02:00
Vladimír Čunát 8169a7fce0
Merge branch 'master' into staging-next 2022-07-13 09:57:41 +02:00
José Romildo 7e30ebb2c2 nixos/lxqt: add a module for the lxqt portal 2022-07-12 17:17:39 -03:00
Luflosi db4fdd6247
nixos/filesystems: skip fsck for bind mounts
Without this change, configurations like
```nix
fileSystems."/path/to/bindMountedDirectory" = {
  device = "/path/to/originalDirectory";
  options = [ "bind" ];
};
```
will lead to a warning message in `dmesg`:
```
systemd-fstab-generator: Checking was requested for "/path/to/originalDirectory", but it is not a device.
```
This happens because the generated /etc/fstab entry contains a non-zero fsck pass number, which doesn't make sense for a bind mount.
2022-07-12 16:51:25 +02:00
Sandro 78fff7ed35
Merge pull request #181197 from bjornfor/fix-ddclient-password-leak 2022-07-12 15:13:43 +02:00
Artturi 23ba30cb5c
Merge pull request #181220 from Artturin/revertcurltestfornow 2022-07-12 15:35:43 +03:00
github-actions[bot] 446763e8e1
Merge master into staging-next 2022-07-12 12:01:18 +00:00
Artturin ea8e40cd0a Revert "release: add tests.packageTestsForChannelBlockers.curl.withCheck as a channel blocker"
This reverts commit 7141ab0f0b.

reverting this for now to unblock staging-next

{UNKNOWN}: aggregate job ‘tested’ failed with the error: nixpkgs.tests.packageTestsForChannelBlockers.curl.withCheck.x86_64-linux: does not exist
 at /nix/store/9i92scfqz5idhmjrmjnqhrvjgyydzfns-hydra-perl-deps/lib/perl5/site_perl/5.34.0/Catalyst/Model/DBIC/Schema.pm line 526
2022-07-12 15:00:38 +03:00
Martin Weinelt b7dc3d66c2
Merge pull request #181184 from kittywitch/ha-empty-config-fix
nixos/home-assistant: make the reload triggers dependent upon cfg.config
2022-07-12 11:39:39 +02:00
Bjørn Forsman e0f2f7f9ea nixos/ddclient: don't leak password in process listings
...by using `replace-secret` instead of `sed` when injecting the
password into the ddclient config file. (Verified with `execsnoop`.)

Ref https://github.com/NixOS/nixpkgs/issues/156400.
2022-07-12 10:23:40 +02:00
Pascal Wittmann 6d1cabe9d9
Merge pull request #158346 from kurnevsky/i2pd-yggdrasil
i2pd: add yggdrasil settings
2022-07-12 10:19:18 +02:00
Alyssa Ross c3fafea4ed nixos: remove unused "system tarball" modules
This has all been commented in nixos/release.nix since at least 2015,
so it's not doing us any good to keep it around.
2022-07-12 07:34:20 +00:00
github-actions[bot] aef69f5f34
Merge master into staging-next 2022-07-12 06:01:09 +00:00
Aaron Andersen bf57026e6a
Merge pull request #179511 from jian-lin/fix-force-caddy-reload-config
nixos/caddy: force caddy to reload config in ExecReload
2022-07-12 04:53:45 +02:00
github-actions[bot] 2caa4189ea
Merge master into staging-next 2022-07-12 00:02:27 +00:00
Aidan Gauland d9119dbbdf
pass-secret-service: unstable-2020-04-12 -> unstable-2022-03-21
* Update to the latest upstream version of pass-secret-service that includes
  systemd service files.
* Add patch to fix use of a function that has been removed from the Python
  Cryptography library in NixOS 22.05
* Install systemd service files in the Nix package.
* Add NixOS test to ensure the D-Bus API activates the service unit.
* Add myself as a maintainer to the package and NixOS test.
* Use checkTarget instead of equivalent custom checkPhase.
2022-07-12 07:33:26 +12:00
Sandro Jäckel af66b47b3a nixos/postgresql-backup: allow setting compression level 2022-07-11 21:28:22 +02:00
Gaute Ravndal cc0d38b58e nixos/i18n: normalise locale codeset names in supportedLocales 2022-07-11 20:17:50 +02:00
github-actions[bot] 5f2ff17a45
Merge master into staging-next 2022-07-11 18:01:16 +00:00
Kat Inskip 8f2c49ece6
nixos/home-assistant: make the reload triggers dependent upon cfg.config 2022-07-11 08:19:25 -07:00
Sandro e2f14dd31a
Merge pull request #181026 from queezle42/pipewire-systemwide-bluetooth
pipewire: fix bluetooth for system-wide configuration
2022-07-11 15:38:55 +02:00
github-actions[bot] de1ff46f80
Merge staging-next into staging 2022-07-11 12:01:55 +00:00
Robert Hensing 38860c9e91
Merge pull request #178969 from christian-burger/fix/comment-in-release.nix-corrected
nixos/release.nix: fixed commands in comment
2022-07-11 12:02:42 +02:00
github-actions[bot] f98204778b
Merge staging-next into staging 2022-07-11 06:02:06 +00:00
Franz Pletz d048693138
Merge pull request #180999 from Luflosi/update/ipfs
ipfs: 0.13.0 -> 0.13.1
2022-07-11 03:26:06 +02:00
Jens Nolte 61c9f44a1d pipewire: fix bluetooth for system-wide configuration 2022-07-11 02:35:36 +02:00
github-actions[bot] 55e8459a46
Merge staging-next into staging 2022-07-11 00:04:08 +00:00
Melvyn ef6d6d4c4a
Add bash to netdata service path
The `bash` binary is needed for running some plugins, notably the alarm notify plugins. If the binary isn't in the path, alarms notifications aren't sent and the netdata error log instead contains `/usr/bin/env: 'bash': No such file or directory`.
2022-07-10 16:26:05 -07:00
Bernardo Meurer c6b0888a86
Merge pull request #180991 from aij/raspberrypi-bootloader-config.txt
raspberrypi-bootloader: Update doc URL for config.txt options
2022-07-10 14:09:43 -07:00
Guillaume Girol e21a770188
Merge pull request #180933 from yuuyins/nvidia-busidtype
hardware/nvidia: add @ to constraint on busIDType
2022-07-10 20:00:30 +00:00
Sandro 366683965e
Merge pull request #166308 from ncfavier/wg-resolvconf
nixos/resolvconf: allow different implementations
2022-07-10 21:00:00 +02:00
Shawn8901 98ac43a1cf
zrepl: add package option to module (#179189)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2022-07-10 20:32:27 +02:00
github-actions[bot] 05798fee88
Merge staging-next into staging 2022-07-10 18:01:55 +00:00
Luflosi 631a2bddfc
nixos/tests/ipfs: disable FUSE test
The FUSE mount functionality of IPFS was broken by the update to v0.13.0, so disable it. Hopefully it will be fixed soon.
See https://github.com/ipfs/kubo/issues/9044.
2022-07-10 18:49:56 +02:00
Martin Weinelt 0044b4fa22
Merge pull request #180950 from alyssais/graphite 2022-07-10 17:22:45 +02:00
Martin Weinelt f8137a54eb
Merge pull request #153445 from erdnaxe/prometheus_protecthome
nixos/prometheus-node-exporter: do not protect home
2022-07-10 17:21:44 +02:00
Emery Hemingway 429fc9aaf7 nixos/hedgedoc: convert to settings-style configuration
Replace "services.hedgedoc.configuration" with ".settings" to be
consistent with RFC0042. This allows control of settings not
declared in the module.
2022-07-10 08:07:14 -05:00
Martin Weinelt 09b76341b3
Merge pull request #180796 from squalus/librewolf-tests 2022-07-10 14:16:24 +02:00
github-actions[bot] 4bff9bab6b
Merge staging-next into staging 2022-07-10 12:02:29 +00:00
Ivan Jager 34aa4fe7a9 raspberrypi-bootloader: Update doc URL for config.txt options
The old URL was redirecting to more generic Rasbperry Pi documentation.
2022-07-10 06:58:32 -05:00
Robert Hensing acd969a4dd nixos/nixpkgs.nix: Recommend hostPlatform instead of system
The ${opt.*} syntax will print the full path when NixOS is used
as a submodule.

nixpkgs.system / nixpkgs.localSystem must not be read by any
other module because its meaning is ambiguous in cross vs
non-cross contexts. hostPlatform is generally what you need.
*Where* you build something generally doesn't matter in a
system _configuration_ context like NixOS.
2022-07-10 13:36:24 +02:00
Robert Hensing 711e653a65 nixos/eval-config: Allow system to be set modularly when arg is null 2022-07-10 13:35:54 +02:00
Robert Hensing e153087276 nixos: Fix use of nixpkgs.localSystem
localSystem is ill-defined because unlike hostPlatform, its
meaning is different in a cross or non-cross context.
2022-07-10 13:35:54 +02:00
Janne Heß 9412f62782
Merge pull request #180536 from SuperSandro2000/hydra-runuser
nixos/hydra: use runuser like hydra flake
2022-07-10 13:30:42 +02:00
K900 d2b579b23e
Merge pull request #178254 from K900/update-tempo
tempo: 1.1.0 -> 1.4.1, add NixOS module
2022-07-10 14:01:30 +03:00
Robert Hensing 97d5a1a591
Merge pull request #180747 from alyssais/hardened-dhcpcd
nixosTests.hardened: disable dhcpcd privsep
2022-07-10 12:40:38 +02:00
Alyssa Ross 1f18d44106
python3.pkgs.graphite_api: remove
Due to lack of maintenance.  It doesn't build, the last upstream
commit was in 2017, and last significant change in Nixpkgs was in
2018.
2022-07-10 09:46:20 +00:00
Alyssa Ross 9f2c91667d
python3.pkgs.influxgraph: remove
Due to lack of maintenance.  Last upstream commit was in 2018, and
graphite_api doesn't build, is also unmaintained upstream, and will
also be removed.
2022-07-10 09:46:18 +00:00
Alyssa Ross ada1d87767
python3.pkgs.graphite_beacon: remove
Due to lack of maintenance.  It is not compatible with the default
Python version (due to the tornado 5) dependency, and doesn't look
like it will be any time soon.
2022-07-10 09:17:23 +00:00
github-actions[bot] 4fa8151b9f
Merge staging-next into staging 2022-07-10 06:01:52 +00:00
yuu ce2e4707b7
hardware/nvidia: add @ to constraint on busIDType
On some configurations, the only known syntax that works
requires the `@` character, such as `intelBusId = "0@0:2:0";`  and
`nvidiaBusId = "1@1:0:0";` [1].

[1]. https://discourse.nixos.org/t/struggling-with-nvidia-prime/13794/4
2022-07-10 02:48:40 -03:00
José Romildo Malaquias 7802f1b647
Merge pull request #180570 from romildo/upd.nixos.qt5
nixos/qt5: add kde platform theme
2022-07-09 21:44:28 -03:00
github-actions[bot] ed2918e1af
Merge staging-next into staging 2022-07-09 18:01:55 +00:00
Kirill A. Korinsky f41fc22111
prl-tools: 12.2.1-41615 -> 17.1.4-51567
Install Parallel Tools updated for version 17 of Parallels for macOS. This
fixes clipboard sharing, so that copy and paste works between the host
macOS and the guest NixOS VM. Support for guests on M1 Apple Silicon-based
Macs (aarch64-linux) is also added.

Co-authored-by: Paul Smith <paulsmith@gmail.com>
Co-authored-by: Weijia Wang <9713184+wegank@users.noreply.github.com>
2022-07-09 14:43:27 +02:00
Artturi 9209b23d44
Merge pull request #180778 from martinetd/logrotate-test-nosandbox
logrotate: fix config check without sandbox
2022-07-09 15:12:25 +03:00
github-actions[bot] 449ceff4fa
Merge staging-next into staging 2022-07-09 12:01:54 +00:00
Vladimír Čunát a6d59d9ee4
Merge #180513: nixos/i18n: always generate C locale 2022-07-09 09:15:50 +02:00
Dominique Martinet fd701a9cd1 logrotate: fix config check without sandbox
make logrotate not try to write to /var/lib/logrotate.status by
using an alternate path.

Also avoid /tmp and use build CWD

Fixes #180734
2022-07-09 09:55:03 +09:00
squalus 478940e2c7 librewolf: add nixos test
- support librewolf in the firefox nixos test
- use the correct binary name
- ensure autoplay is always on for the audio test, since
  librewolf disables it by default
2022-07-08 17:40:24 -07:00
github-actions[bot] 5c6643bcdd
Merge staging-next into staging 2022-07-09 00:02:42 +00:00
Martino Fontana 5e84f7899e nixos/plasma5: expose qdbus in PATH 2022-07-08 23:33:19 +02:00
Martino Fontana 7a4e909905 nixos/plasma5: enable power-profiles-daemon by default 2022-07-08 23:32:51 +02:00
Alyssa Ross 1e12b9292c nixosTests.mjolnir: fix eval
This was broken by a bad merge, where the same attribute was added
separately in two different places.

Fixes: ef895f6b43 ("Merge pull request #173239 from jojosch/mjolnir-update")
2022-07-08 20:55:55 +00:00
K900 512a26ae13
Merge pull request #177389 from K900/plasma-exclude-packages
nixos/plasma5: add excludePackages option
2022-07-08 21:33:35 +03:00
K900 03dd01dd2f nixos: add module for tempo
It's very barebones but should be OK for now.
2022-07-08 21:33:17 +03:00
Jan Tojnar 819fe6a918 Merge branch 'staging-next' into staging
; Conflicts:
;	pkgs/data/icons/papirus-icon-theme/default.nix
2022-07-08 20:21:39 +02:00
Alyssa Ross a14da86f2c
nixosTests.hardened: fix for recent Nix
As far as I know, there's no stable equivalent of nix ping-store.
2022-07-08 17:03:40 +00:00
Alyssa Ross d440cc931e
nixosTests.hardened: disable dhcpcd privsep
Since 831024e2b9 ("nixos/dhcpcd: assert if privSep && alternative
malloc"), this test has an assertion failure because dhcpcd (with
privsep enabled) is not compatible with the allocator used by the
hardened profile.

Since it's unclear[1] what to do about this for the hardened profile,
I propose doing the simplest thing possible to make the test eval,
which is to just disable dhcpcd privsep.  It's very inconvenient when
trying to refactor the NixOS test infrastructure to have a test that
doesn't evaluate.  Once the correct solution is found for using dhcpcd
with privsep with the hardened profile, this patch can be reverted.

[1]: https://github.com/NixOS/nixpkgs/pull/157430
2022-07-08 17:03:29 +00:00
Peder Bergebakken Sundt 50dd61a9ba nixos/polaris: init 2022-07-08 12:27:48 -04:00
github-actions[bot] 527a304ac4
Merge staging-next into staging 2022-07-08 00:03:17 +00:00
Sandro Jäckel 90761632ae
nixos/hydra: use runuser like hydra flake 2022-07-07 22:37:51 +02:00
José Romildo 41dbc0bdf2 nixos/qt5: add kde platform theme 2022-07-07 16:29:34 -03:00
Jan Tojnar b88fe63b17
Merge pull request #180554 from ElXreno/flatpak-builder-migrate
flatpak-builder: remove libdwarf dependency and fix tests
2022-07-07 20:49:38 +02:00
Jan Tojnar e374cc2aad
Merge pull request #179736 from jansol/pipewire
pipewire: 0.3.52 -> 0.3.54
2022-07-07 20:48:51 +02:00
ElXreno 4eeaca86fd
nixosTests.installed-tests.flatpak-builder: fix tests
This commit fixes the following error:
       Failed assertions:
       - Setting xdg.portal.enable to true requires a portal implementation in xdg.portal.extraPortals such as xdg-desktop-portal-gtk or xdg-desktop-portal-kde.
2022-07-07 21:07:21 +03:00
github-actions[bot] 02ada34099
Merge staging-next into staging 2022-07-07 18:01:45 +00:00
José Romildo Malaquias ebdd91b4e3
Merge pull request #180549 from romildo/upd.nixos.qt
nixos/qt5: add lxqt platform theme
2022-07-07 14:40:43 -03:00
Martin Weinelt 1c4ee228e2 Merge remote-tracking branch 'origin/staging-next' into staging 2022-07-07 19:20:35 +02:00
Maëlys Bras de fer b2224764ee
nixos-generate-config: substitute nix-instantiate 2022-07-07 18:42:44 +02:00
Jan Solanti 844f03a9dd pipewire: 0.3.53 -> 0.3.54 2022-07-07 19:26:26 +03:00
Sandro de9a1f4e81
Merge pull request #180039 from astro/openwebrx 2022-07-07 14:48:48 +02:00
Atemu 339ce46af2 nixos/waydroid: add FIXME regarding ASHMEM removal in 5.18 2022-07-07 14:40:17 +02:00
Sandro Jäckel 59128a34c3
nixos/i18n: always generate C locale 2022-07-07 14:25:13 +02:00
Jan Tojnar d910a8b8a5 Merge branch 'staging-next' into staging
; Conflicts:
;	pkgs/data/icons/zafiro-icons/default.nix
2022-07-07 14:24:09 +02:00
José Romildo 6593595ee5 nixos/qt5: add lxqt platform theme 2022-07-07 09:05:46 -03:00
Robert Hensing 613e768608
Merge pull request #179801 from hercules-ci/fix-footgun-dockerTools-buildImage-contents
dockerTools.buildImage: Add copyToRoot to replace contents, explain usage
2022-07-07 09:51:41 +02:00
Astro 10565fccde m17-cxx-demod: init at 2.3, add to nixos/openwebrx 2022-07-07 00:41:30 +02:00
zowoq b7eb3285b3 railcar, nixos/railcar: remove
Upstream repo is archived and hasn't had any commits since 2018, isn't packaged anywhere else apart from AUR.
2022-07-07 07:16:58 +10:00
ajs124 2837f807c9
Merge pull request #180066 from helsinki-systems/rem/nodejs-12_x
nodejs-12_x: remove
2022-07-06 23:09:28 +02:00
Artturi fb6816eae3
Merge pull request #178869 from Artturin/curlies 2022-07-06 17:30:45 +03:00
stuebinm 3fbc2a433d services/nextcloud: impossible error message 2022-07-06 11:57:44 +02:00
Robert Hensing e007eb480c dockerTools.buildImage: Add copyToRoot to replace contents, explain usage 2022-07-06 07:30:24 +02:00
Kevin Cox 0b257763d2
Merge pull request #180135 from kevincox/redis-save
nixos.redis: Fix disabling of RDB persistence.
2022-07-05 20:58:27 -04:00
stuebinm 5f4d5fcfa4 services/nextcloud: apply suggestions 2022-07-06 00:16:04 +02:00
stuebinm dd9200c0a4 services/nextcloud: fix a bug 2022-07-06 00:05:31 +02:00
Maximilian Bosch 9f12b04a0f
Merge pull request #180265 from Ma27/bump-privacyidea
privacyidea: 3.7.1 -> 3.7.2
2022-07-05 22:48:50 +02:00
Robin Gloster ab6c8fcdc5
Merge pull request #180159 from mayflower/upstream-mailman-ldap
nixos/mailman: LDAP integration
2022-07-05 22:14:37 +02:00
Florian Brandes 3aa303469e pgadmin: 6.10 -> 6.11
skip failing test caused by postgresql update

Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2022-07-05 21:26:42 +02:00
Maximilian Bosch 000d72eb7f
nixos/privacyidea: pin python to 3.9
Otherwise `pi-manage` doesn't work inside the Python env (which is 3.10
whereas privacyidea requires 3.9).

Failing Hydra build: https://hydra.nixos.org/build/182734928
2022-07-05 19:38:54 +02:00
José Romildo 68cc57cce1 nixos/qt5ct: remove enable option and suggests qt5.platformTheme
This module should be removed after a nixos release cycle
2022-07-05 13:50:42 -03:00
José Romildo 47ba8cdcc7 nixos/qt5: add maintainer 2022-07-05 13:34:20 -03:00
José Romildo a264a86d93 nixos/qt5: add qt5ct as a possible platform theme 2022-07-05 11:15:19 -03:00
Kevin Cox 568d2e77f4
nixos.redis: Fix disabling of RDB persistence.
I was under the impression that setting `services.redis.servers.<name>.save = []` would disable RDB persistence as no schedule would mean no persistence. However since the code did not handle this case specially it actually results in no `save` setting being written and the internal Redis default is used.

This patch handles the empty case to disable RDB persistence.

Disabling RDB persistence is useful in a number of scenarios:

1. Using Redis in a pure-cache mode where persistence is not desired.
2. When using the (generally superior) AOF persistence mode this file is never read so there is little point to writing it.
3. When saving is handled manually

For more information see https://redis.io/docs/manual/persistence/

This is a breaking change as the user may have been relying on `[]` using Redis defaults. However I believe that updating the behaviour for the next release is beneficial as IMHO it is less surprising and does what the user would expect. I have added release notes to warn about this change.
2022-07-05 07:37:38 -04:00
Maximilian Bosch 67c091bf68
Merge pull request #180157 from lheckemann/rip
maintainers: remove elseym
2022-07-05 13:02:39 +02:00
Martin Weinelt 9082cc6ba0
Merge pull request #174219 from PhilippWoelfel/fix/nixos/calibre-web
nixos/calibre-web: Add quotes to test for calibre library
2022-07-05 12:07:47 +02:00
Jörg Thalheim 826c20dcae
nixos/vault: add option to start in dev mode. (#180114)
* nixos/vault: add option to start in dev mode.

This is not only useful for nixos tests i.e. when testing vault agent
setups but also when playing around with vault in local setups. In our
tests we can now make use of this option to test more vault features.
i.e. adding this feature has uncovered the need for a `StateDirectory`.

* Update nixos/modules/services/security/vault.nix

Co-authored-by: Robert Hensing <roberth@users.noreply.github.com>

Co-authored-by: Jonas Chevalier <zimbatm@zimbatm.com>
Co-authored-by: Robert Hensing <roberth@users.noreply.github.com>
2022-07-05 10:54:11 +02:00
Linus Heckemann ec2bee2404 maintainers: remove elseym
Simon passed away in December 2021.

Simon, it was a pleasure to work with you, to learn things together
and to share good times. It ended too soon. You will be missed.
2022-07-04 21:21:38 +02:00
Maximilian Bosch 6a5b1bc0a3
nixos/mailman: strip trailing \n when reading the secret 2022-07-04 21:15:56 +02:00
Maximilian Bosch dd4b6b81fa
nixos/mailman: implement LDAP support for postorius 2022-07-04 21:15:53 +02:00
Luflosi 320e4dbcc3
nixos/nginx: fix broken listenAddresses example
When using the example without the square brackets, nginx fails to start:
```
nginx-pre-start: nginx: [emerg] invalid port in "::1:80" of the "listen" directive in /nix/store/xyz-nginx.conf:29
nginx-pre-start: nginx: configuration file /nix/store/xyz-nginx.conf test failed
```
2022-07-04 19:46:18 +02:00
WilliButz fbaae54932
Merge pull request #170947 from dpausp/gitlab-registry-cert-fix-path-condition
nixos/gitlab: fix gitlab-registry-cert path condition
2022-07-04 18:39:42 +02:00
Maximilian Bosch 4f2a86a43a
Merge pull request #178858 from Ma27/matrix-docs
nixos/matrix-synapse: update docs
2022-07-04 16:56:27 +02:00
ajs124 1c0cc017b5 nixos/cryptpad: remove 2022-07-04 15:33:59 +02:00