1
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-06-26 19:16:47 +03:00
Commit graph

295 commits

Author SHA1 Message Date
Silvan Mosberger
374e6bcc40 treewide: Format all Nix files
Format all Nix files using the officially approved formatter,
making the CI check introduced in the previous commit succeed:

  nix-build ci -A fmt.check

This is the next step of the of the [implementation](https://github.com/NixOS/nixfmt/issues/153)
of the accepted [RFC 166](https://github.com/NixOS/rfcs/pull/166).

This commit will lead to merge conflicts for a number of PRs,
up to an estimated ~1100 (~33%) among the PRs with activity in the past 2
months, but that should be lower than what it would be without the previous
[partial treewide format](https://github.com/NixOS/nixpkgs/pull/322537).

Merge conflicts caused by this commit can now automatically be resolved while rebasing using the
[auto-rebase script](8616af08d9/maintainers/scripts/auto-rebase).

If you run into any problems regarding any of this, please reach out to the
[formatting team](https://nixos.org/community/teams/formatting/) by
pinging @NixOS/nix-formatting.
2025-04-01 20:10:43 +02:00
h7x4
5418ecc5af
nixos/heimdal: add documentation to systemd units 2025-03-12 09:14:14 +01:00
h7x4
c4a5ef0c4a
nixos/heimdal: correctly handle multitarget principals 2025-03-12 09:14:14 +01:00
h7x4
405054ead6
nixos/kerberos_server: add the "get-keys" ACL permission (#337306) 2025-03-11 14:51:02 +01:00
shelvacu
1a4575f9db
nixos/modules: Add security.pki.caBundle option and make all services use it for CA bundles (#352244)
Previously some modules used `config.environment.etc."ssl/certs/ca-certificates.crt".source`, some used `"/etc/ssl/certs/ca-certificates.crt"`, and some used `"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"`. These were all bad in one way or another:

- `config.environment.etc."ssl/certs/ca-certificates.crt".source` relies on `source` being set; if `text` is set instead this breaks, introducing a weird undocumented requirement
- `"/etc/ssl/certs/ca-certificates.crt"` is probably okay but very un-nix. It's a magic string, and the path doesn't change when the file changes (and so you can't trigger service reloads, for example, when the contents change in a new system activation)
- `"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"` silently doesn't include the options from `security.pki`

Co-authored-by: Shelvacu <git@shelvacu.com>
2025-03-08 08:41:08 +00:00
Sandro
d1c535f62a
nixos/user-groups: add a toggle for user account creation (#358646) 2025-02-27 23:47:20 +01:00
Tristan Ross
5024df2d7c nixos/nix-daemon: allow nix implementations not following nix versioning 2025-02-23 00:13:02 -05:00
Nessdoor
f500ae084a nixos/kerberos_server: disallow combining "all" with policies != "get-keys" 2025-02-14 19:47:14 +01:00
Nessdoor
00a8c125b0 nixos/kerberos_server: add the "get-keys" ACL permission 2025-02-13 02:18:18 +01:00
NotAShelf
813244ed0f
nixos/userborn: filter enabled users 2025-02-02 02:07:15 +03:00
nikstur
90f7c48747
nixos/userborn: create passwordFilesLocation before userborn run if n… (#367323) 2025-02-01 22:15:24 +01:00
Anderson Torres
bc80114502 various: remove AndersonTorres from modules maintainership 2025-01-22 21:47:09 -03:00
oxalica
a189e89e2a nixos/earlyoom: mention extraArgs breakage and fix example
The shell-escaping breaks space handling and also makes the example
outdated. This breakage is missed in the previous change.

Also mention it in the release note.
2025-01-06 15:44:14 -05:00
Gaétan Lepage
f709cfe630
nixos/swapspace: add installWrapper option (#368539) 2025-01-03 08:49:44 +01:00
Philip Taron
b7090b3216
nixos/cloud-init: fix eval 2025-01-01 12:01:12 -08:00
oxalica
acc2ec20ed nixos/earlyoom: format and remove dead code 2024-12-31 18:33:18 -05:00
oxalica
b22d47a1b8 earlyoom: use upstream systemd service and add release note 2024-12-31 18:31:16 -05:00
Felix Buehler
c05dd62835 nixos/services.uptimed: remove with lib; 2024-12-30 12:09:44 +01:00
Felix Buehler
e8c85ce9ab nixos/services.saslauthd: remove with lib; 2024-12-30 12:09:44 +01:00
Felix Buehler
710d6186c1 nixos/services.nscd: remove with lib; 2024-12-30 12:09:44 +01:00
Felix Buehler
0a49bde242 nixos/nix: remove with lib; 2024-12-30 12:09:44 +01:00
Felix Buehler
08f1e99c34 nixos/services.localtimed: remove with lib; 2024-12-30 12:09:44 +01:00
Felix Buehler
128623b2f1 nixos/services.cloud-init: remove with lib; 2024-12-30 12:09:43 +01:00
Felix Buehler
354e3ac4e2 nixos/services.cachix-watch-store: remove with lib; 2024-12-30 12:09:43 +01:00
Felix Buehler
81f97e6d28 nixos/services.cachix-agent: remove with lib; 2024-12-30 12:09:43 +01:00
Felix Buehler
fb31348d4d nixos/services.automatic-timezoned: remove with lib; 2024-12-30 12:09:43 +01:00
phanirithvij
64b06b0a19 nixos/swapspace: add installWrapper option
Signed-off-by: phanirithvij <phanirithvij2000@gmail.com>
Co-authored-by: Luflosi <luflosi@luflosi.de>
2024-12-27 19:19:09 +05:30
Lan Tian
4919e4cd1c
nixos/userborn: create passwordFilesLocation before userborn run if not /etc 2024-12-22 00:05:50 -08:00
Arne Keller
61026a1ad0
nixos/dbus: add package options (#347923) 2024-12-20 18:14:17 +01:00
Silvan Mosberger
4f0dadbf38 treewide: format all inactive Nix files
After final improvements to the official formatter implementation,
this commit now performs the first treewide reformat of Nix files using it.
This is part of the implementation of RFC 166.

Only "inactive" files are reformatted, meaning only files that
aren't being touched by any PR with activity in the past 2 months.
This is to avoid conflicts for PRs that might soon be merged.
Later we can do a full treewide reformat to get the rest,
which should not cause as many conflicts.

A CI check has already been running for some time to ensure that new and
already-formatted files are formatted, so the files being reformatted here
should also stay formatted.

This commit was automatically created and can be verified using

    nix-build https://github.com/infinisil/treewide-nixpkgs-reformat-script/archive/a08b3a4d199c6124ac5b36a889d9099b4383463f.tar.gz \
      --argstr baseRev b32a094368
    result/bin/apply-formatting $NIXPKGS_PATH
2024-12-10 20:26:33 +01:00
Arne Keller
097248f4e0
nixos/nscd: increase default timeout to 10 seconds (#290355) 2024-12-06 13:18:52 +01:00
Bruno BELANYI
35435a647a nixos/localtimed: fix 'geoclue2Package' doc 2024-12-01 10:41:30 +00:00
phanirithvij
80ea320fe7 nixos/swapspace: init module
Signed-off-by: phanirithvij <phanirithvij2000@gmail.com>
Co-authored-by: Luflosi <luflosi@luflosi.de>
2024-10-30 22:41:15 +05:30
nikstur
e81710fa8b
nixos/userborn: fix username typo (#346773) 2024-10-16 17:00:39 +02:00
Sandro Jäckel
cfc0d6bee8
nixos/dbus: add package options 2024-10-11 13:38:15 +02:00
Sandro Jäckel
172f25b6ad
makeDBusConf: make overrideable 2024-10-11 13:38:15 +02:00
Sandro Jäckel
d957526c06
nixos/dbus: inline once used homeDir 2024-10-11 13:10:19 +02:00
Sebastián Zavala Villagómez
8a277a6abf nixos/automatic-timezoned: set time.timeZone to null to avoid silent overriding
Currently if a timezone was selected explicitly, the service will
silently override the value, essentially ignoring what is meant to be a
a deliberate choice of option. This may cause confusion as to why the
option is not doing anything when this service is enabled, particularly
in more complex set-ups after some time.

This will simply make the choice deliberate from the user's part, either
by having to remove the option or lowering its priority as a recognition
that it may be ignored.

This change was inspired by the `services.tzupdate` module, which does
the same.

[1]: <https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/services/misc/tzupdate.nix#L24>
2024-10-10 14:33:12 -04:00
Sebastián Zavala Villagómez
1c5727cdf7 nixos/localtimed: set time.timeZone to null to avoid silent overriding
Currently if a timezone was selected explicitly, the service will
silently override the value, essentially ignoring what is meant to be a
a deliberate choice of option. This may cause confusion as to why the
option is not doing anything when this service is enabled, particularly
in more complex set-ups after some time.

This will simply make the choice deliberate from the user's part, either
by having to remove the option or lowering its priority as a recognition
that it may be ignored.

This change was inspired by the `services.tzupdate` module, which does
the same.

[1]: <https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/services/misc/tzupdate.nix#L24>
2024-10-07 23:40:49 -04:00
Aaron Andersen
38a589083e
nixos/userborn: fix username typo 2024-10-05 21:40:09 -04:00
Parker Hoyes
c960ba48d1
nixos/nix-daemon: Enable cgroups delegation (#339310)
When `use-cgroups` is enabled, the nix daemon creates sub-cgroups for the build processes (and itself if NixOS/nix#11412 is merged, see NixOS/nix#9675). `Delegate` should be set to prevent systemd from messing with the nix service's cgroups (https://github.com/systemd/systemd/blob/main/docs/CGROUP_DELEGATION.md) and ensure the OOM killer only targets the offending derivation and not the entire service (NixOS/nix#10374).
2024-09-13 16:08:29 +03:00
Lin Yinfeng
33e796b66f
nixos/userborn: convert users.users.<name>.home to string
If `opts.home` is not a string, an evaluation failure occurs in
`mapAttrs'`. Converting `opts.home` to string solves this issue.

The type of `users.users.<name>.home` is `lib.types.path`. Values
other than strings, e.g., derivations can also have the type
`lib.types.path`.
2024-09-11 18:28:58 +08:00
Lin Yinfeng
d3fdfb473d
nixos/userborn: support users.users.<name>.createHome 2024-09-11 18:09:29 +08:00
nikstur
4620067d79 nixos/userborn: init 2024-08-26 12:45:33 +02:00
Johann Wagner
49d137a967 nixos/cloud-init: Allow additional packages in cloud-init module 2024-07-02 19:19:56 +02:00
Johann Wagner
33c55024dc nixos/cloud-init: Allow systemd.network to be enabled if cloud-init.network is disabled 2024-07-02 19:12:30 +02:00
Gavin John
8dcb12dee3 services/localtimed: Add package and geoclue2Package options 2024-06-24 14:36:26 -05:00
h7x4
d8ddf6fb6d
Merge pull request #287611 from h7x4/nixos-module-fixup-kerberos-server
nixos/kerberos_server: use krb format generator, plus misc cleanup
2024-06-14 17:04:55 +02:00
h7x4
195d155a1c
nixos/kerberos_server: use krb format generator, plus misc cleanup
- Introduce more possible options by using the krb format generator.
- Enforce package choice is using a correct package.
- Use meta attribute to decide implementation, allows for overriding the
  package.
- Make necessary changes to the format, to allow for multiple ACL files in
  heimdal.
- Add systemd target and slice for both implementations.
- Move state to `/var/lib`
- Add documentation
2024-06-08 23:29:53 +02:00
Sandro Jäckel
1c60f0a9a0 nixos/bash-completion: move options to programs.bash.completion, add package option, drop with lib
This allows to easily test bash-completion updates without triggering a mass rebuild locally.
2024-06-06 02:51:06 +02:00