0
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-07-13 21:50:33 +03:00
Commit graph

38093 commits

Author SHA1 Message Date
Michele Guerini Rocco
eebd349fdd
nixos/pdns-recursor: deprecate settings, add yaml-settings (#406534) 2025-05-19 10:30:07 +02:00
Felix Singer
f14efb6fa2 nixos/gerrit: Add Felix Singer as maintainer
I'm already a maintainer of the Gerrit package and I've done various
work on the Gerrit module. So it makes sense to be a maintainer there as
well.

Signed-off-by: Felix Singer <felixsinger@posteo.net>
2025-05-19 04:28:36 +02:00
benaryorg
e434130d0b
nixos/systemd: unconditional systemd-journald-audit.socket
Containers did not have *systemd-journald-audit.socket* in *additionalUpstreamSystemUnits*, which meant that the unit was not provided.
However the *wantedBy* was added without any additional check, therefore creating an empty unit with just the *WantedBy* on *boot.isContainer* machines.
This caused `systemd-analyze verify` to fail:

```text
systemd-journald-audit.socket: Unit has no Listen setting (ListenStream=, ListenDatagram=, ListenFIFO=, ...). Refusing.
systemd-journald-audit.socket: Cannot add dependency job, ignoring: Unit systemd-journald-audit.socket has a bad unit file setting.
systemd-journald-audit.socket: Cannot add dependency job, ignoring: Unit systemd-journald-audit.socket has a bad unit file setting.
```

The upstream unit already contains the following, which should make it safe to include regardless:

```ini
[Unit]
ConditionSecurity=audit
ConditionCapability=CAP_AUDIT_READ
```

For reference, this popped up in the context of #[360426](https://redirect.github.com/NixOS/nixpkgs/issues/360426) as well as #[407696](https://redirect.github.com/NixOS/nixpkgs/pull/407696).

Co-authored-by: Bruce Toll <4109762+tollb@users.noreply.github.com>
Signed-off-by: benaryorg <binary@benary.org>
2025-05-18 19:58:59 +00:00
Atemu
3495f98bec
nixos/signald, signald, signaldctl, purple-signald: drop (#407959) 2025-05-18 20:21:42 +02:00
Atemu
211d932302
clamsmtp: drop (#408043) 2025-05-18 16:11:16 +02:00
notehmry
871371a4cb
nixos/opensmtpd: explicit permissions for /var/spool/smtpd/queue (#406710) 2025-05-18 14:55:42 +02:00
Leona Maroni
99398273f3
nixos/clamsmtp: drop
drop as package is removed
2025-05-18 13:15:04 +02:00
isabel
57d05a1cbe
nixos/nix-optimise: allow dates to be a single line str 2025-05-18 11:35:26 +01:00
isabel
4f053b60ae
nixos/nix-gc: allow dates to be a list 2025-05-18 11:35:26 +01:00
K900
67fa2bd433
nixos/polipo, polipo: drop (#408271) 2025-05-18 10:45:38 +03:00
patka
92ceb4a51c
nixos/polipo: drop
Upstream hasn't seen activity since 2014 and archived the project in 2021. There's no longer a need for HTTP proxies
2025-05-18 09:19:45 +02:00
Ramses
4c9b7995bf
nixos/vmware-host: avoid IFD (#404954) 2025-05-17 23:14:42 +02:00
Winter
6e30a19719
nixos/profiles/nix-builder-vm: allow the system derivation to be substituted (#407513) 2025-05-17 15:40:25 -04:00
nikstur
3f4a4ffa18
nixos/etc-overlay: mount etc with nodev,nosuid (#406397) 2025-05-17 20:32:38 +02:00
Ramses
c0f89cb69e
nixos/limine: substituteAll -> replaceVarsWith (#406872) 2025-05-17 20:08:31 +02:00
Ramses
139080c304
nixos/specialisation: escape and restrict specialisation names (#405393) 2025-05-17 19:47:05 +02:00
Emily
507de69321
sourcehut.*: update (#404203) 2025-05-17 17:33:43 +02:00
Niklas Korz
9958792cae nixos/signald: drop 2025-05-17 15:20:02 +02:00
Adam C. Stephens
6701894f18
nixos/forgejo: document migration version restrictions (#406169) 2025-05-17 09:04:42 -04:00
Martin Weinelt
f462e2564d
acme: Add csr option (#376334) 2025-05-17 11:24:08 +02:00
Aleksana
d56a9d0b9b
matrix-continuwuity: init at 0.5.0-rc.5; nixos/matrix-continuwuity: init (#400637) 2025-05-17 11:14:53 +08:00
Winter
747c55e702 nixos/profiles/nix-builder-vm: allow the system derivation to be substituted
Consider a user wanting to set up the Linux builder for the first time,
but with a slightly more generous allocation of resources compared to
the default. They'll do something like this:

```
{
  virtualisation.cores = 3;
  virtualisation.darwin-builder = {
    diskSize = 40 * 1024;
    memorySize = 4 * 1024;
  };
}
```

This will fail with an error like this:

```
error: a 'aarch64-linux' with features {} is required to build '/nix/store/3acpgmwqwnk8g2gc5r05ar2lvmn01b8a-builder.pl.drv', but I am a 'aarch64-darwin' with features {apple-virt, benchmark, big-parallel, nixos-test}
```

But why would they have to rebuild the NixOS system?! All they did was
change the arguments passed to QEMU, and nothing those options control
would affect the NixOS configuration itself... right?

`config.system.build.toplevel` is defined with `allowSubstitutes` set to
`false` by default, which makes it so that the toplevel can't be
substituted if Nix is trying to use it "directly." So because the above
example would have to rebuild the VM runner, which references toplevel
directly, Nix refuses to substitute it, unless `always-allow-substitutes
= true` is set as a Nix option. (In the case where the QEMU options
aren't changed at all, Nix just substitutes the runner, which sidesteps
this issue as the runner itself doesn't use toplevel as an input.)
2025-05-16 13:00:15 -04:00
isabel
6dc8edf1f5
nixos/minecraft-server: update outdated links (#405554) 2025-05-16 16:30:39 +01:00
Sandro
c0cd90d343
nixos/etc: remove rogue continue (#399915) 2025-05-16 15:08:17 +02:00
Adam C. Stephens
d25ea431bd
Headscale service wait before restart (#400053) 2025-05-16 08:30:08 -04:00
isabel
79f86a061d
Add autoenv to modules list (#407568) 2025-05-16 11:27:46 +01:00
C0D3 M4513R
754412b4ae
acme: Add csr option
Signed-off-by: C0D3 M4513R <28912031+C0D3-M4513R@users.noreply.github.com>
2025-05-16 11:45:54 +02:00
Borja Clemente
4fd9814cc8
Add autoenv to modules list
Signed-off-by: Borja Clemente <borja.clemente@gmail.com>
2025-05-16 11:26:05 +02:00
Ratchanan Srirattanamet
ff4214fabd nixos/kimai: fix upgrading to Kimai 2.32 by clearing cache earlier
During testing of Kimai 2.32, it's been found that fixes done in PR
371917 [^1] is not enough to prevent error in the case of upgrading from
2.31 to 2.32.

Hinted by an upstream issue [^2], make sure that the cache is cleared
before running `kimai:install`, not after. This fixes upgrading from
2.31 to 2.32, and should prevent similar issue from popping up again.

[^1]: https://github.com/NixOS/nixpkgs/pull/371917
[^2]: https://github.com/kimai/kimai/issues/5437
2025-05-16 11:19:58 +02:00
Aleksana
86628e2b8d
nixos/nm-applet: fix service starting too early in some cases (#406277) 2025-05-16 16:52:22 +08:00
Seth Flynn
7c2f22b376
nixos/hddfancontrol: use attrset for config (#394826) 2025-05-15 13:49:19 -04:00
lassulus
84049bd248
nixos/syncthing: define and handle encryptionPassword option (#383442) 2025-05-15 19:44:22 +02:00
Jenny
26c6a14a9a
nixos/librenms: seed database in module, not only in test (#406546) 2025-05-15 19:17:41 +02:00
Arian van Putten
871526be1f
nixos/image/repart: Use own assertions / warnings. (#406940) 2025-05-15 19:14:53 +02:00
Maximilian Bosch
26126c75df
Merge: Use cacert in Nextcloud (#406252) 2025-05-15 18:50:53 +02:00
Vladimír Čunát
e06158e58f
staging-next 2025-05-07 (#404858) 2025-05-15 18:42:40 +02:00
provokateurin
12f8199080
nixos/nextcloud: Override cacert package with config.security.pki.caBundle 2025-05-15 18:19:52 +02:00
isabel
84c1069ebe
nixos/cloudflared: fix cert.pem installation (#407128) 2025-05-15 15:32:56 +01:00
nixpkgs-ci[bot]
d1034e4a8a
Merge master into staging-next 2025-05-15 12:07:04 +00:00
Sandro
5077b9edb6
nixos/headscale: fix derp.auto_update_enabled option (#406108) 2025-05-15 11:04:01 +02:00
Pedro Alves
75c7d0908e nixos/cloudflared: fix cert.pem installation
There was a typo in the systemd service definition for cloudflared which
meant that the cert.pem file was not being correctly exposed.
2025-05-14 20:13:42 +01:00
nixpkgs-ci[bot]
ee27ba77b2
Merge master into staging-next 2025-05-14 18:05:41 +00:00
Luj
b98b4f43bd
readeck: 0.17.1 -> 0.18.2 (#405276) 2025-05-14 17:38:22 +02:00
Sandro
60571a4fa9
nixos/gancio: fix cli not passing all args (#401581) 2025-05-14 15:11:36 +02:00
K900
a27047792f Merge remote-tracking branch 'origin/master' into staging-next 2025-05-14 12:29:40 +03:00
phaer
8a2195e94e repart: fix whitespace in option descriptions
I mistakenly added extra whitespace in
https://github.com/NixOS/nixpkgs/pull/401872 which negatively affects
aesthetics of our documentation.

Thought it was part of nixfmt-rfc-styles output, but can't reproduce.
Might have had configured the wrong nixfmt.
2025-05-14 09:32:18 +02:00
Vladimír Čunát
bf7544999c
Merge master into staging-next 2025-05-14 08:12:15 +02:00
Will Fancher
26ccfb7a8c nixos/image/repart: Use own assertions / warnings.
It was easy to accidentally trigger infinite recursion if you depended
on `toplevel` in any way before. For instance, if you used
`CopyBlocks` with an image containing `toplevel`. This was because
`toplevel`'s assertion / warning logic has to be evaluated, but that
means evaluating `image.repart`'s assertions / warnings, which
requires evaluating the `repartConfig` attrsets to check for malformed
`Label`s. That causes the module system to type check *all*
`repartConfig` keys, even though most of them aren't used in the
assertions / warnings. So evaluating `system.build.image` evaluates
`repartConfig.CopyBlocks`, which evaluates `toplevel`, which evaluates
assertions / warnings, which evaluates `repartConfig.CopyBlocks` to
type check it. Infinite loop.

Even ignoring this recursion problem, it's still better for the repart
module to have its own assertions / warnings options. You don't have
to use `toplevel` in a repart image, so its assertions / warnings
would have been ignored in that case anyway. This way they're *always*
checked when you build an image.
2025-05-14 01:24:43 -04:00
Will Fancher
4b0d1225f5 lib/asserts: Factor out NixOS's toplevel assertion / warning logic. 2025-05-14 01:21:10 -04:00
Jonas Heinrich
002ebbc4de
oncall: init at 2.1.7; nixos/oncall: init (#388723) 2025-05-13 23:21:54 +02:00