1
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-07-05 15:22:36 +03:00
Commit graph

31592 commits

Author SHA1 Message Date
Sandro
273f6bdff8
Merge pull request #244684 from m-bdf/kmscon-use-upstream-service-file
nixos/kmscon: use upstream service file
2024-06-26 19:29:28 +02:00
nikstur
e05a365dca
Merge pull request #321991 from Mic92/etc-overlay-cross
etc.overlay: fix cross-build
2024-06-26 19:12:15 +02:00
Someone Serge
79a7186f1c cudaPackages: updated convention for gpu/runtime checks
Runtime tests (derivations asking for a relaxed sandbox) are now
expected at p.gpuCheck, p.gpuChecks.<name>, or at
p.tests.<name>.gpuCheck.
2024-06-26 16:00:29 +00:00
github-actions[bot]
cf7e625161
Merge master into staging-next 2024-06-26 12:01:11 +00:00
Artturin
1ecc3cd35b
Merge pull request #322194 from Artturin/polkitaddpackageoption
nixos/polkit: Add package option
2024-06-26 12:42:38 +03:00
Nico Felbinger
c4d2c90da0
nixos/peering-manager: add oidc support
Co-authored-by: Jenny <me@netali.de>
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-06-26 07:45:18 +02:00
Someone Serge
ebeb6b9d1d nix-required-mounts: nixfmt 2024-06-26 00:35:45 +00:00
Someone Serge
927b15ed6d nixos/nix-required-mounts: allow passing extra arguments to the hook 2024-06-26 00:35:44 +00:00
Someone Serge
dd70727622 nixos/nix-required-mounts: mount the runtime closures 2024-06-26 00:35:44 +00:00
Someone Serge
3cf5bcfe49 nix-required-mounts: restore the followSymlinks option
This way pkgs.nix-required-mounts is "correct" even before
we override it in the NixOS module
2024-06-26 00:35:44 +00:00
Someone Serge
5560f6a514 nix-required-mounts: guest and host paths may differ 2024-06-26 00:35:43 +00:00
Someone Serge
7418e4fefd programs.nix-required-mounts: presets.cuda -> nvidia-gpu
This hopefully clarifies that the preset configures the hook to expose
"nvidia devices", which includse both the userspace driver and the
device nodes.

The derivations  still declare requiredSystemFeatures = [ "cuda" ] to
explicitly indicate they need to use the CUDA functionality and expect a
libcuda.so and a CUDA-capable device. Ideally, we'd also include the
specific CUDA architectures (sm_86, etc) in feature names.

Derivations that use a co-processor but do not care about the vendor or
even the particular interface may ask for the more generic "opengl",
"vulkan", or "gpu" features. It is then responsibility of the host
declaring the support for this feature to ensure the drivers and
hardware are appropriately set up.
2024-06-26 00:35:43 +00:00
Someone Serge
50d4382114 programs.nix-required-mounts: inherit defaults from the package 2024-06-26 00:35:43 +00:00
Someone Serge
b422dafc89 nix-required-mounts: init 2024-06-26 00:35:42 +00:00
github-actions[bot]
27074b7d07
Merge master into staging-next 2024-06-26 00:02:13 +00:00
Sandro
08605eec2a
Merge pull request #311381 from minijackson/tomcat-port
nixos/tomcat: add 'port' option
2024-06-26 00:53:58 +02:00
Sandro
44b22d8d45
Merge pull request #318185 from tomfitzhenry/initrd-ssh-null-alg
nixos/initrd-ssh: set KexAlgorithms/Ciphers/MACs only if non-null
2024-06-25 23:21:33 +02:00
Sandro
33f83c6252
Merge pull request #316977 from eclairevoyant/fix-mkEnableOption
treewide: fix mkEnableOption usage
2024-06-25 22:42:16 +02:00
Sandro
3176d6fb53
Merge pull request #315144 from mattpolzin/default-nodename-fix
nixos/services.kubernetes.kubelet: handle non-lower case chars in hostname
2024-06-25 22:38:46 +02:00
Sandro
5b0ea759a7
Merge pull request #318347 from caffineehacker/vaultwarden_backup
nixos/vaultwarden: backup all rsa_keys
2024-06-25 22:37:56 +02:00
Sandro
1813936aff
Merge pull request #272895 from xanderio/wg-access-server-0.10.1
wg-access-server: init at 0.12.1
2024-06-25 21:21:19 +02:00
Michael Franzl
cae086d605
nixos/virtualisation: increase priority for libvirt NSS modules
When `services.resolved` is enabled, then `resolve [!UNAVAIL=return]`
is added to `system.nssDatabases.hosts` with priority 501,
which prevents lower-priority NSS modules from running
unless systemd-resolved is not available.

Quoting from `man nss-resolve`:

> To activate the NSS module, add "resolve [!UNAVAIL=return]" to the line
> starting with "hosts:" in /etc/nsswitch.conf. Specifically, it is
> recommended to place "resolve" early in /etc/nsswitch.conf's "hosts:"
> line. It should be before the "files" entry, since systemd-resolved
> supports /etc/hosts internally, but with caching. To the contrary, it
> should be after "mymachines", to give hostnames given to local VMs and
> containers precedence over names received over DNS. Finally, we
> recommend placing "dns" somewhere after "resolve", to fall back to
> nss-dns if systemd-resolved.service is not available.

Note that the man page (just) recommends "early" and means with this
"before the 'files' and 'dns' entries". It does not insist on being
first or excluding other modules.

For this reason, libvirt NSS modules should run before the `resolve`
module. They should come right next to `mymachines` because both are
conceptually very similar -- they resolve local VMs/containers.

Since the data source of the libvirt NSS modules are local
plain text files (see source code of the libvirt NSS module),
no performance impact is expected form this raise of priorities.

Other NSS modules in NixOS also explicitly set their priority, which is
why this change increases consistency.

Fixes #322022
2024-06-25 20:22:14 +02:00
github-actions[bot]
08b5c3c46a
Merge master into staging-next 2024-06-25 18:01:20 +00:00
Jörg Thalheim
12e24e94d3
Merge pull request #321984 from ryze312/fix_localConf
nixos/zerotierone: fix default value for localConf
2024-06-25 17:14:23 +02:00
Yaya
6f211d899d nixos/gitlab-runner: Add support runner authentication tokens
Support for *runner registration tokens* is deprecated since GitLab
16.0, has been disabled by default in GitLab 17.0 and will be removed in
GitLab 18.0, as outlined in the [GitLab documentation].

It is possible to [re-enable support for runner registration tokens]
until GitLab 18.0, to prevent the registration workflow from
breaking.

*Runner authentication tokens*, the replacement for registration tokens,
have been available since GitLab 16.0 and are expected to be defined in
the `CI_SERVER_TOKEN` environment variable, instead of the previous
`REGISTRATION_TOKEN` variable.

This commit adds a new option
`services.gitlab-runner.services.<name>.authenticationTokenConfigFile`.
Defining such option next to
`services.gitlab-runner.services.<name>.registrationConfigFile` brings
the following benefits:
- A warning message can be emitted to notify module users about the
  upcoming breaking change with GitLab 17.0, where *runner registration
  tokens* will be disabled by default, potentially disrupting
  operations.
- Some configuration options are no longer supported with *runner
  authentication tokens* since they will be defined when creating a new
  token in the GitLab UI instead. New warning messages can be emitted to
  notify users to remove the affected options from their configuration.
- Once support for *registration tokens* has been removed in GitLab 18,
  we can remove
  `services.gitlab-runner.services.<name>.registrationConfigFile` as
  well and make module users configure an *authentication token*
  instead.

This commit changes the option type of
`services.gitlab-runner.services.<name>.registrationConfigFile` to
`with lib.types; nullOr str` to allow configuring an authentication
token in
`services.gitlab-runner.services.<name>.authenticationTokenConfigFile`
instead.

A new assertion will make sure that
`services.gitlab-runner.services.<name>.registrationConfigFile` and
`services.gitlab-runner.services.<name>.authenticationTokenConfigFile`
are mutually exclusive. Setting both at the same time would not make
much sense in this case.

[GitLab documentation]: https://docs.gitlab.com/17.0/ee/ci/runners/new_creation_workflow.html#estimated-time-frame-for-planned-changes
[re-enable support for runner registration tokens]: https://docs.gitlab.com/17.0/ee/ci/runners/new_creation_workflow.html#prevent-your-runner-registration-workflow-from-breaking
2024-06-25 17:06:45 +02:00
Yaya
92a26526b9 nixos/gitlab-runner: Remove global with lib; 2024-06-25 17:06:45 +02:00
Julien Malka
9d1a59b2e2
Merge pull request #322386 from katexochen/jonringer/rm
treewide: remove jonringer as package maintainer and code owner
2024-06-25 17:04:27 +02:00
OPNA2608
60f68545b1 nixos/lomiri: Add calculator 2024-06-25 16:13:41 +02:00
Bobby Rong
1373dd5ac8
Merge pull request #322186 from bobby285271/upd/cinnamon-xapps
Cinnamon updates 2024-06-24
2024-06-25 21:33:27 +08:00
Maximilian Bosch
60657a4591
nextcloud27: remove
Version will be EOL by the end of 2024-06.
2024-06-25 14:08:15 +02:00
Martin Weinelt
de245ec4a5
Merge remote-tracking branch 'origin/master' into staging-next 2024-06-25 13:00:25 +02:00
Moritz Sanft
43990c5428
nixos/prometheus: remove minio exporter 2024-06-25 11:00:01 +02:00
Alexander Sieg
369cfec06d
nixos/wg-access-server: init module 2024-06-25 10:59:30 +02:00
Paul Meyer
fbe8538aa1 treewide: remove jonringer as package maintainer
Signed-off-by: Paul Meyer <49727155+katexochen@users.noreply.github.com>
2024-06-25 09:16:56 +02:00
Franz Pletz
e6e4cd92ad
Merge pull request #322211 from NyCodeGHG/update-libvirt
libvirt: 10.0.0 -> 10.4.0, nixos/libvirtd: add ssh proxy option
2024-06-25 05:47:13 +02:00
rewine
9b3299c8cd
Merge pull request #310778 from wineee/dde23
deepin desktop environment: update
2024-06-25 09:52:28 +08:00
Thiago Kenji Okada
30c578e589
Merge pull request #321987 from thiagokokada/rtorrent-add-hardening
nixos/rtorrent: add systemd hardening configuration
2024-06-25 02:34:42 +01:00
Thiago Kenji Okada
406ebf3ad6 nixos/rtorrent: make RuntimeDirectory not world readable 2024-06-24 19:01:17 -03:00
Thiago Kenji Okada
33f1e2ece3 nixos/rtorrent: add systemd hardening configuration 2024-06-24 19:01:16 -03:00
Gavin John
8dcb12dee3 services/localtimed: Add package and geoclue2Package options 2024-06-24 14:36:26 -05:00
Will Fancher
2893f56de0
Merge pull request #319359 from misuzu/clevis-zfs-fix
nixos/clevis: add support for parent encrypted zfs datasets
2024-06-24 14:47:55 -04:00
github-actions[bot]
42ca786b66
Merge master into staging-next 2024-06-24 18:00:57 +00:00
Felix Bühler
e1f89770af
Merge pull request #302909 from Stunkymonkey/vagrant-guest-install-chmod
nixos/vagrant-guest: prefer 'install' over 'chmod'
2024-06-24 19:47:59 +02:00
Marie Ramlow
35b3707f20 nixos/libvirtd: add ssh proxy option 2024-06-24 17:20:05 +02:00
Artturin
b61e0ff19b nixos/polkit: Add package option
Overlaying polkit results in a lot of rebuilds thus it makes sense to
add a package option.

Assists in using the patch needed to fix https://www.github.com/NixOS/nixpkgs/issues/18012
2024-06-24 17:55:41 +03:00
Bobby Rong
510d7c2239
nixos/cinnamon: Don't ship apps that are not shipped in Mint 22
My reasons following Mint are:

1. Geary signed https://stopthemingmy.app, per request we shouldn't pre-ship it under a themed desktop environment.
   See also b7937b4509

2. Hexchat is still gtk2 and is not maintained anymore, Mint encourages switching to Matrix instead.
   See also https://blog.linuxmint.com/?p=4675 ("Joining the Matrix")
2024-06-24 22:30:18 +08:00
github-actions[bot]
88140ced6d
Merge master into staging-next 2024-06-24 12:01:17 +00:00
Pol Dellaiera
f95c186eb9
nixos/private-gpt: remove drupol from maintainers 2024-06-24 09:13:15 +02:00
github-actions[bot]
c1d6d547af
Merge staging-next into staging 2024-06-24 06:01:33 +00:00
arcnmx
a910bc8146 nixos/keycloak: relax hostname settings assertion
The `hostname-strict` setting enables dynamic hostname resolution.
2024-06-23 19:36:36 -07:00