1
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-06-25 18:46:32 +03:00
Commit graph

40060 commits

Author SHA1 Message Date
Robert Hensing
dcf985388c
Merge pull request #271976 from r-k-b/fix-dockerTools-includeStorePaths
nixos/dockerTools: fix includeStorePaths when enableFakechroot
2024-02-14 23:38:44 +01:00
Yt
f13f90978a
Merge pull request #288638 from ThyMYthOS/update-stalwart
stalwart-mail: fix default configuration and test
2024-02-14 21:42:46 +00:00
github-actions[bot]
fc96101774
Merge staging-next into staging 2024-02-14 18:01:42 +00:00
Michele Guerini Rocco
f74d88a6f1
Merge pull request #281162 from kennycallado/master
nixos/icewm: Update icewm start command
2024-02-14 18:17:27 +01:00
Silvan Mosberger
1cd71881f2 nixos/systemd: Support notify-reload service Type
Support for this was added in systemd 253:
https://github.com/systemd/systemd/releases/tag/v253
2024-02-14 17:52:13 +01:00
maxine
8c8cc53769
Merge pull request #288531 from chewblacka/update-undervolt
undervolt: 0.3.0 -> 0.4.0
2024-02-14 17:30:53 +01:00
Michele Guerini Rocco
cd02351ae0
Merge pull request #233017 from koenw/libreswan-StateDirectory
nixos/libreswan: Use StateDirectory to setup ipsec/nss
2024-02-14 14:36:43 +01:00
Michele Guerini Rocco
c1f27ae1d3
Merge pull request #199515 from MangoIV/mangoiv/add-note-to-boot-initrd-secrets
Add documentation for moved secrets in stage 1
2024-02-14 14:35:04 +01:00
Michele Guerini Rocco
bac2597d26
Merge pull request #270737 from bramd/brltty-6.6
Update BRLTTY to 6.6
2024-02-14 14:10:32 +01:00
Michele Guerini Rocco
dc91f91987
Merge pull request #286393 from oddlama/fix-hostapd-utf8-ssid
nixos/hostapd: fix utf8Ssid setting not properly honored
2024-02-14 14:08:46 +01:00
Sandro
eb76e99000
Merge pull request #288527 from K900/chromium-plasma-typo 2024-02-14 13:13:50 +01:00
github-actions[bot]
b272934b4b
Merge staging-next into staging 2024-02-14 06:01:47 +00:00
maralorn
6634b86601 nixos: Drop unused variable in systemd/initrd.nix 2024-02-14 01:22:58 +01:00
Matt Leon
c0846f900a
matter-server: add nixos service module
New module to run the python-matter-server executable as a sandboxed
system service.
2024-02-13 19:17:53 -05:00
github-actions[bot]
8bbfcea60e
Merge staging-next into staging 2024-02-14 00:02:43 +00:00
Jeremy Baxter
e03b7562eb nixos/teeworlds: add 24.05 changelog entry 2024-02-14 11:14:42 +13:00
Jeremy
e01eda6edd nixos/teeworlds: add more configuration options, revise
- add 'package' option
- add 'game' and 'server' attrset
- reduce repetition by using functions bool and optionalSetting
- add default value for cfg.name
- revise some option descriptions
2024-02-14 10:57:08 +13:00
Manuel Stahl
cd8aad903c stalwart-mail: fix default configuration and test 2024-02-13 20:34:22 +01:00
emilylange
993083f0ab
nixos/garage: allow all available log levels in cfg.logLevel
`error` and `warn` have always been valid log levels.
But because the upstream docs never mentioned those, we simply didn't
add them to the enum of our module option.

The upstream docs have been updated and now mention `error` and `warn`
as well.

Upstream PR: https://git.deuxfleurs.fr/Deuxfleurs/garage/pulls/716
2024-02-13 20:26:29 +01:00
Peder Bergebakken Sundt
bf7c95ce73
Merge pull request #285314 from pbsds/ttyd-1706718068
nixos/ttyd: add `entrypoint` and `writable` option
2024-02-13 19:41:11 +01:00
Felix Buehler
9db5906a6f nixos/photoprism: improve manage script 2024-02-13 18:51:30 +01:00
John Garcia
eaa1034a80 nixos/undervolt: add turbo option 2024-02-13 13:38:22 +00:00
Martin Weinelt
ec89463a61
nixos/knot: refactor
- Stop using `with lib`
- Drop `lib.mdDoc`
- Use `escaepSystemdExecArgs` for escaping
2024-02-13 13:44:32 +01:00
Martin Weinelt
08a775839d
nixos/tests/knot: test the XDP interface
We reconfigure the secondary nameserver VM to do all the same things that
it did before, but now over the XDP interface.
2024-02-13 13:44:31 +01:00
Martin Weinelt
d1d8dd3e55
nixos/knot: add support for XDP setups
The Express Data Path (XDP) is a way to circumvent the traditional Linux
networking stack and instead run an eBPF program on your NIC, that makes
the decision to provide Knot with certain packets. This is way faster
and more scalable but comes at the cost of reduced introspection.

Unfortunately the `knotc conf-check` command fails hard with missing
interfaces or IP addresses configured in `xdp.listen`, so we disable it
for now, once the `xdp` config section is set. We also promote the config
check condition to a proper option, so our conditions become public
documentation, and we allow users to deal with corner cases, that we have
not thought of yet.

We follow the pre-requisites documented in the Knot 3.3 manual, and set
up the required capabilities and allow the AF_XDP address family.

But on top of that, due to our strict hardening, we found two more
requirements, that were communicated upstream while debugging this.

- There is a requirement on AF_NETLINK, likely to query for and configure
  the relevant network interface
- Running eBPF programs requires access to the `bpf` syscall, which we
  deny through the `~@privileged` configuration.

In summary We now conditionally loosen the hardening of the unit once we
detect that an XDP configuration is wanted. And since we cannot
introspect arbitrary files from the `settingsFiles` option, we expose XDP
support through the `enableXDP` toggle option on the module.
2024-02-13 13:44:31 +01:00
K900
526bcf58da nixos/chromium: fix incorrect option definition
Fixes #232528
2024-02-13 15:17:45 +03:00
github-actions[bot]
6d11c074e2
Merge staging-next into staging 2024-02-13 12:01:40 +00:00
Yt
971fbfd00a
Merge pull request #276468 from onny/opensnitch-update4
opensnitch: 1.6.4 -> 1.6.5, opensnitch-ui: 1.6.4 -> 1.6.5
2024-02-13 10:46:01 +00:00
Joris Bolsens
6a11b7a777
nixos/kubernetes: don't delete the apitoken after its created
This was breaking the nixos-kubernetes-node-join script
the token gets copied, and then immediately overridden with /dev/null when certmgr restarts.
2024-02-12 22:50:27 -08:00
github-actions[bot]
4b315ab2d6
Merge staging-next into staging 2024-02-13 06:03:27 +00:00
Adam C. Stephens
fccf3732ef
Merge pull request #288123 from adamcstephens/incus/networkd
nixos/lxc: fix VM network and switch container to networkd
2024-02-13 00:30:26 -05:00
github-actions[bot]
c0e8987b85
Merge staging-next into staging 2024-02-13 00:02:40 +00:00
Paul Meyer
ce0a47cd2c maintainers: remove attila-lendvai 2024-02-12 23:10:03 +01:00
Paul Meyer
11eef97f3c bee-clef: remove 2024-02-12 23:10:03 +01:00
Yt
8893789d4a
Merge pull request #288243 from ThyMYthOS/update-stalwart
stalwart-mail: 0.5.2 -> 0.5.3
2024-02-12 21:51:36 +00:00
Sandro Jäckel
80e79ded15
nixos/unbound: check validity of config file 2024-02-12 22:49:03 +01:00
Adam Stephens
cf68af8561
nixos/lxc/container: switch to networkd by default 2024-02-12 16:26:30 -05:00
Adam Stephens
bdc79efc2b
nixos/lxd/vm: fix network config 2024-02-12 16:26:29 -05:00
Maximilian Bosch
d363f52625
nixos/postgresql: drop ensurePermissions option
...effectively what was planned already in #266270, but it was too late
because the branches were restricted and didn't allow any breaking
changes anymore.

It also suffers from the same issue that we already had when discussing
this the last time[1] when `ensureDBOwnership` was ultimately introduced
as band-aid fix: newly created users don't get CREATE permission on
the `public` schema anymore (since psql 15), even with `ALL PRIVILEGES`.

If one's use-case is more sophisticated than having a single owner, it's
questionable anyways if this module is the correct tool since
permissions aren't dropped on a change to this option or a removal which
is pretty surprising in the context of NixOS.

[1] https://github.com/NixOS/nixpkgs/pull/266270
2024-02-12 21:10:33 +01:00
Sandro
886449aef2
Merge pull request #268979 from con-f-use/warn_docker_storage_driver
nixos/docker: warn about changing storageDriver and remove `devicemapper` value
2024-02-12 19:46:05 +01:00
github-actions[bot]
917c8637e8
Merge staging-next into staging 2024-02-12 18:01:31 +00:00
benaryorg
8b2d86b982
pkgs.formats: toINIWithGlobalSection wrapper
The new format is based on the existing wrapper and generates an INI file with an unnamed global section at the top as is used by *stunnel* for instance.
Technically the INI format is a subset of this however testing, type checking, and API guarantees profit from two separate generators.

Co-authored-by: tim-tx <tim-tx@users.noreply.github.com>
Signed-off-by: benaryorg <binary@benary.org>
2024-02-12 17:58:48 +00:00
Janik
29f575d7e6
Merge pull request #288284 from NetaliDev/rustdesk-extra-args
nixos/rustdesk-server: add extra args options for hbbr and hbbs
2024-02-12 16:52:01 +01:00
github-actions[bot]
f9874c4b8c
Merge staging-next into staging 2024-02-12 14:49:17 +00:00
Pol Dellaiera
2d627a2a70
Merge pull request #277220 from nu-nu-ko/nixos-jellyfin-dirs
nixos/jellyfin: add directory options
2024-02-12 14:06:46 +01:00
Jennifer Graul
c412263319
nixos/rustdesk-server: add extra args options for hbbr and hbbs 2024-02-12 13:41:08 +01:00
github-actions[bot]
e581fdc2c3
Merge staging-next into staging 2024-02-12 12:02:01 +00:00
Jonas Heinrich
31b9a9d18c opensnitch: 1.6.4 -> 1.6.5, opensnitch-ui: 1.6.4 -> 1.6.5.1 2024-02-12 11:58:44 +01:00
Sophie Tauchert
b670443f42
nixos/hydra: use set-default in hydra-env wrapper package 2024-02-12 11:16:32 +01:00
Maciej Krüger
4a9a73c626
Merge pull request #284046 from mkg20001/oils-for-linux
oil: rename to oil-python, oil: init at 0.20.0
2024-02-12 11:08:07 +01:00