Commit graph

35260 commits

Author SHA1 Message Date
Yethal
91bb1c6d75
oci-containers: consolidate capabilities interface (#363574)
* oci-containers: consolidate capabilities interface

* Update nixos/modules/virtualisation/oci-containers.nix

Improved wording

Co-authored-by: Benjamin Staffin <benley@zoiks.net>

---------

Co-authored-by: Benjamin Staffin <benley@zoiks.net>
2024-12-12 11:50:13 -05:00
Maximilian Bosch
4c092f5bcd
Merge: nixos/postgresql: Add finalPackage attribute (#364261) 2024-12-12 17:03:33 +01:00
Arne Keller
0a324bb35b
scanservjs: init at 2.27.1; nixos/scanservjs: init (#249806) 2024-12-12 17:01:22 +01:00
Tom Hubrecht
0bdb7a72b1
nixos/postgresql: Add finalPackage attribute
This allows refering to the actual installed package, which is necessary
when using plugins and wanting to use postgres in scripts
2024-12-12 16:54:06 +01:00
Maximilian Bosch
4fb843e646
Merge: nixos/doc: document how to allow-list tablespaces (#364312) 2024-12-12 16:43:10 +01:00
Arne Keller
8bbf8450e4
extlinux-conf-builder: don't emit MENU when timeout is zero (#318778) 2024-12-12 16:31:02 +01:00
WilliButz
58df438b47
nixos/systemd-tmpfiles: use types.attrsWith for settings (#363939) 2024-12-12 15:54:31 +01:00
Maximilian Bosch
2be50b1efe
nixos/systemd-tmpfiles: use types.attrsWith for settings
That way it's way easier to derive from the manual which key is used for
what exactly.
2024-12-12 13:48:39 +01:00
Maximilian Bosch
51a6938a44
nixos/doc: document how to allow-list tablespaces
It was brought up that the restricted file-system access breaks
tablespaces[1]. I'd argue that this is the desired behavior, the whole
point of the hardening is the lock the service down and I don't consider
tablespaces common enough to elevate privileges again. Especially since
the workaround is trivial as shown in the diff.

For completeness sake, this adds the necessary `ReadWritePaths` change
to the postgresql section of the manual.

This also adds a small correction about the state of
`ensurePermissions`.

[1] https://github.com/NixOS/nixpkgs/pull/344925#issuecomment-2521188907
2024-12-12 13:42:52 +01:00
Thiago Kenji Okada
0d2883adc2
nixos-rebuild-ng: add module changes and port tests from nixos-rebuild (#363922) 2024-12-12 12:40:40 +00:00
Florian Klink
4e7a971fe4
nixos/waagent: init module (#362101) 2024-12-12 14:11:39 +02:00
Arne Keller
abeecc9b02
nixos/minio: add TLS certificates option (#340441) 2024-12-12 10:22:07 +01:00
Arne Keller
27aef3ef74
nixos/dokuwiki: Don't force http with Caddy (#327743) 2024-12-12 10:21:24 +01:00
Arne Keller
e3f940648e
nixos/zfs: do not auto-import pools marked noauto (#352391) 2024-12-12 06:51:39 +01:00
Sandro
b4cf66f226
nixos/portunus: fix defaultText (#364382) 2024-12-12 00:45:44 -05:00
Leah Amelia Chen
68891efe67
marytts: init at 5.2.1-unstable-2024-10-09, nixos/marytts: init (#351933)
* marytts: init at 5.2.1-unstable-2024-10-09

* nixos/marytts: init module

* nixos/marytts: add tests
2024-12-12 00:12:54 -05:00
Andrew Marshall
7f8278a264 nixos/zfs: do not auto-import pools marked noauto
This requires all datasets for the pool specified in `fileSystems` to be
marked noauto.

Note that this implicitly skips some tasks for the pool, such as
`expandOnBoot`, as the pool will not be imported at that time.
2024-12-11 22:56:13 -05:00
Arne Keller
1a0bc2c68d
nixos/rtkit: Add option for rtkit-daemon command-line args (#299696) 2024-12-11 23:00:50 +01:00
Bjørn Forsman
886de305c8 nixos/rtkit: mention pipewire in docstring
I don't know the reason for rtkit only getting enabled by
hardware.pulseaudio.enable and not services.pipewire.enable, as they
both use it to get real-time priority, but we can at least help users by
mentioning pipewire in the rtkit option.
2024-12-11 20:52:13 +01:00
misuzu
21e39e915f
system/activation: mention deps attr in activationScripts example (#363915) 2024-12-11 20:01:19 +02:00
K900
7ea7a19b2d
nixos/bookstack: fix unintended escaping of nginx locations (#363581) 2024-12-11 20:23:22 +03:00
Robert Schütz
d55cc4608d
nixos/immich: restrict media filesystem permissions (#361627) 2024-12-11 08:45:12 -08:00
Jenny
2f610f9856
nixos/librenms: order librenms-setup after network.target (#363706) 2024-12-11 13:14:25 +01:00
Aly Raffauf
3de5332bba
nixos/qt: install kio when qt.platformTheme = "kde" (#364032) 2024-12-11 13:17:04 +02:00
misuzu
6c7048f933
programs/yubikey-touch-detector: add PartOf=graphical-session.target (#364117) 2024-12-11 13:06:04 +02:00
Arne Keller
bfd7154402
nixos/ebusd: fix device access (#352743) 2024-12-11 11:18:00 +01:00
Leona Maroni
2e5a764eaf
git-worktree-switcher: init at 0.2.4 (#355484) 2024-12-11 11:15:17 +01:00
Alyssa Ross
e9eff47002 nixos/networking: don't add extra names to ::1
From hosts(5):

> For each host a single line should be present with the following
> information:
>
>               IP_address canonical_hostname [aliases...]

With lines like "::1 localhost ahost.adomin ahost", we were saying
that the canonical name for "ahost" was "localhost", the opposite of a
canonical name.  This is why a second loopback address (127.0.0.2) is
used for hostnames with IPv4 — if they were put after "localhost" on
the 127.0.0.1 line, the same thing would happen.  With IPv6 we can't
do the same thing as there's only a single loopback address, so
instead the right thing to do is to simply not list the hostnames in
/etc/hosts, and rely on the myhostname NSS plugin, which will handle
this correctly.

(Note that the examples in hosts(5) also do not include IPv6 FQDN or
hostname entries.)
2024-12-11 11:09:40 +01:00
Moritz Vogel
0c1feac497 nixos/ebusd: fix device access 2024-12-11 10:50:54 +01:00
Arne Keller
138ac300df
nixos/v2ray: change the type of config field (#163810) 2024-12-11 10:30:02 +01:00
Majiir Paktu
fae5d6025c programs/yubikey-touch-detector: add PartOf=graphical-session.target 2024-12-10 23:30:52 -05:00
Benjamin Saunders
fd21ef2a65 nixos/immich: restrict filesystem permissions
immich appears to create this directory with permissions 0755 by
default, which needlessly exposes user data to other processes.
2024-12-10 20:02:17 -08:00
Majiir Paktu
e5a456f26f nixos/wireguard-networkd: re-enable by default for networkd users 2024-12-10 19:33:45 -05:00
Majiir Paktu
6bc8dcc630 nixos/wireguard-networkd: use systemd credentials for privateKeyFile and presharedKeyFile 2024-12-10 19:33:45 -05:00
Majiir Paktu
cca305f3e3 nixos/wireguard-networkd: fix issue link 2024-12-10 16:57:53 -05:00
Majiir Paktu
a93d42e97e nixos/wireguard-networkd: disable by default
Enabling networking.wireguard.useNetworkd currently requires users to
modify the permissions of their private key files. Since that is a bad
upgrade experience, the module should be disabled by default for now.
Once systemd credential support is added to the module, it should be
safe to once again enable it by default for networkd users.
2024-12-10 16:54:50 -05:00
misuzu
22b87b1b7e
nixos/bat: init (#350079) 2024-12-10 22:33:34 +02:00
misuzu
ad12b26526
nixos/crab-hole: init (#341598) 2024-12-10 22:16:50 +02:00
NiklasVousten
bd4a6b9aae nixos/crab-hole: init crab-hole 2024-12-10 21:08:31 +01:00
Silvan Mosberger
4f0dadbf38 treewide: format all inactive Nix files
After final improvements to the official formatter implementation,
this commit now performs the first treewide reformat of Nix files using it.
This is part of the implementation of RFC 166.

Only "inactive" files are reformatted, meaning only files that
aren't being touched by any PR with activity in the past 2 months.
This is to avoid conflicts for PRs that might soon be merged.
Later we can do a full treewide reformat to get the rest,
which should not cause as many conflicts.

A CI check has already been running for some time to ensure that new and
already-formatted files are formatted, so the files being reformatted here
should also stay formatted.

This commit was automatically created and can be verified using

    nix-build a08b3a4d19.tar.gz \
      --argstr baseRev b32a094368
    result/bin/apply-formatting $NIXPKGS_PATH
2024-12-10 20:26:33 +01:00
Thiago Kenji Okada
43e6aa5bd2 nixos-rebuild-ng: enable reexec if system.rebuild.enableNg is enabled 2024-12-10 18:38:08 +00:00
Thiago Kenji Okada
ae6664cc51 nixos/tools: add system.rebuild.enableNg 2024-12-10 18:38:08 +00:00
Arne Keller
9ad61cfc19
nixos/plymouth: add support for logo in catppuccin (two-step) theme (#304045) 2024-12-10 18:43:49 +01:00
Fernando Rodrigues
3a068accfd
nixos/bat: init bat module
Signed-off-by: Fernando Rodrigues <alpha@sigmasquadron.net>
2024-12-10 14:38:30 -03:00
Sandro
d6e107169b
ArchiSteamFarm: 6.0.8.7 -> 6.1.0.3 (#361305) 2024-12-10 18:01:38 +01:00
Nick Cao
fa559bd562
redis - complete lib refactor (#363775) 2024-12-10 10:55:26 -05:00
phaer
df8e6f7487 system/activation: mention deps attr in activationScripts example
As it helps making deps easier to discover - as we don't currently
render submodule options in the module correctly - and is arguably
more technical correct: When using nixos-install to install nixos
into a chroot in i.e. /mnt, there's no gurantee that /mnt/dev exists
before the specialfs phase ran.
2024-12-10 14:17:09 +01:00
Aaron Andersen
acaee51228
nixos/redmine: Change type of services.redmine.stateDir to path (#363430) 2024-12-10 07:17:08 -05:00
Andrew Frahn
c146818be2 nixos/services.redis: complete removal of with lib; 2024-12-10 16:19:03 +11:00
jiriks74
3318aa52de
nixos/git-worktree-switcher: init git-worktree-switcher
This module sets up shells so that they work with
[git-worktree-switcher](https://github.com/mateusauler/git-worktree-switcher)
2024-12-10 03:39:13 +01:00