1
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-06-29 20:45:29 +03:00
Commit graph

26212 commits

Author SHA1 Message Date
Weijia Wang
b65d2ea436
Merge pull request #192672 from amjoseph-nixpkgs/pr/nixos/sd/powerpc64le
enable NixOS installer for powerpc64le
2023-02-23 07:09:46 +02:00
Adam Joseph
f99e8bafe6 nixos/installer: add sd-image-powerpc64le.nix
This builds on top of nixpkgs mainline 00d8347180
with the following two PRs cherry-picked:

- https://github.com/NixOS/nixpkgs/pull/192670
- https://github.com/NixOS/nixpkgs/pull/192668

using the following command:

```
nix build -f nixos -L \
  -I nixos-config=nixos/modules/installer/sd-card/sd-image-powerpc64le.nix \
  config.system.build.sdImage
```

I was able to successfully boot the image, although it boots to a login prompt
rather than a shell, and won't accept the empty password for `root`.  I guess
I'll have to figure out why that is.

To boot the image: `zstd`-decompress the it, mount it, and use `kexec`:

```
cd boot/nixos
kexec -l \
  *-vmlinux \
  --initrd *-initrd \
  --dt-no-old-root \
  --command-line="$(grep APPEND ../extlinux/extlinux.conf | sed 's_^ *APPEND *__')"
```

The machine I used for testing has only one storage device which is completely
allocated to LVM.  It appears that the NixOS ISO loader doesn't look for
partition tables within LVM volumes.  To work aroundn this, I had to extract the
`ext4` image within the partition table within the `sd-card` image and put that
in its own LVM volume.  This likely won't be an obstacle for users who write the
image to a USB stick or similar.
2023-02-23 06:18:52 +02:00
Robert Schütz
89c8ef30a6 nixos/imaginary: bind to localhost by default 2023-02-22 17:37:36 -08:00
Henri Menke
64be5cc145
nixos/alps: fix embarrasing typo 2023-02-22 20:41:17 +01:00
github-actions[bot]
9c68d30a50
Merge staging-next into staging 2023-02-22 18:01:38 +00:00
github-actions[bot]
68dd6912f3
Merge master into staging-next 2023-02-22 18:01:07 +00:00
Kiskae
d120c53077 linuxPackages_6_2.nvidia_x11: disable ibt 2023-02-22 18:08:41 +01:00
K900
8a678a16f8
Merge pull request #217578 from eduarrrd/pam
PAM service fixups for plasma5 and sddm
2023-02-22 16:30:02 +03:00
Sandro Jäckel
5e5a84b193
nixos/nginx: add recommendedZstdSettings 2023-02-22 13:59:53 +01:00
github-actions[bot]
67e4f6dde0
Merge staging-next into staging 2023-02-22 12:02:05 +00:00
github-actions[bot]
0f910f5664
Merge master into staging-next 2023-02-22 12:01:31 +00:00
Nick Cao
d377d9bc2e
Merge pull request #216785 from 1sixth/set-polkituser-gid
nixos/polkit: set static gid for polkituser
2023-02-22 18:14:40 +08:00
github-actions[bot]
f95edd46da
Merge staging-next into staging 2023-02-22 06:01:53 +00:00
github-actions[bot]
77f501b5df
Merge master into staging-next 2023-02-22 06:01:21 +00:00
1sixth
e56db577a1
nixos/polkit: set static gid for polkituser
polkituser needs a group since https://github.com/NixOS/nixpkgs/pull/130522.
2023-02-22 08:46:55 +08:00
github-actions[bot]
a13cd94b7b
Merge staging-next into staging 2023-02-22 00:03:12 +00:00
github-actions[bot]
3cd1b92b06
Merge master into staging-next 2023-02-22 00:02:34 +00:00
Luflosi
e5ffc94ea9
nixos/mautrix-facebook: fix copy&paste error
Closes https://github.com/NixOS/nixpkgs/issues/166312.
2023-02-22 00:03:19 +01:00
Sandro
5b7d323435
Merge pull request #216909 from emilytrau/tailscale-tweaks 2023-02-21 23:21:09 +01:00
Eduard Bachmakov
45a6488f9c nixos/sddm + nixos/plasma5: switch PAM service to login.
GDM and LightDM are already using this approach. It also allows us to
enable Kwallet integration more globally without generating stray PAM
services.

The default configuration of login service includes both options sddm
was setting explicitly.
2023-02-21 22:48:09 +01:00
Eduard Bachmakov
2ca5a88f8e nixos/plasma5: remove non-existant/unused PAM service configs.
This removes two unused service configs from /etc/pam.d/ and, more
importantly, reduces confusion.

* kdm no longer exists in nixpkgs
* `pam.d/gdm` is not used by gdm
* `pam.d/lightdm` IS used by lightdm but hardcoded using .text rather
  than attrset+template.
2023-02-21 22:28:32 +01:00
Sandro Jäckel
a4f63a6e77
nixos/no-x-libs: hide qt5's self 2023-02-21 21:14:08 +01:00
github-actions[bot]
9acd1eb7fd
Merge staging-next into staging 2023-02-21 18:01:45 +00:00
github-actions[bot]
fd8dd0c966
Merge master into staging-next 2023-02-21 18:01:08 +00:00
pennae
3794c04d79 nixos/manual: fix manpage links
{manpage} already exapnds to a link but akkoma wants to link to
a specific setting. split the mention for clarity.

networkd just straight up duplicated what {manpage} generates anyway, so
that link can go away completely.
2023-02-21 18:26:39 +01:00
Dominic Shelton
38593bc3c0 nixos/flipperzero: init 2023-02-21 17:45:14 +01:00
ajs124
bdb0566f8b nixos/nextcloud-notify_push: use lib.genAttrs 2023-02-21 15:53:27 +01:00
ajs124
6c24a28ea6 nixos/nextcloud-notify_push: add some restart config to the service 2023-02-21 15:05:17 +01:00
ajs124
671bd1ef7a nixos/nextcloud-notify_push: add database options 2023-02-21 15:05:16 +01:00
ajs124
1f0aa74c8f nixos/nextcloud-notify_push: init 2023-02-21 15:05:16 +01:00
github-actions[bot]
8d3dc41d38
Merge staging-next into staging 2023-02-21 12:02:07 +00:00
github-actions[bot]
a160ec1116
Merge master into staging-next 2023-02-21 12:01:36 +00:00
Martin Weinelt
0663b90f54
Merge pull request #213232 from mweinelt/tts-module
nixos/tts: init
2023-02-21 11:33:20 +00:00
Martin Weinelt
198713cf82
nixos/tts: init
Provide a module to configure Coqui TTS, available as `tts` in nixpkgs
for a few releases already.

The module supports multiple servers in parallel, so multiple languages
and testing scenarios can be covered, without affecting any production
usage.
2023-02-21 11:59:17 +01:00
Franz Pletz
0e6e15e124
Merge pull request #216815 from R-VdP/flashrom-udev-rules
flashrom: use a udev uaccess tag instead of introducing a custom flashrom group
2023-02-21 11:41:53 +01:00
Sandro
7606d0e004
Merge pull request #199798 from j2ghz/patch-1
Add package override to mimir
2023-02-21 09:37:57 +01:00
github-actions[bot]
2d285b1590
Merge staging-next into staging 2023-02-21 06:01:33 +00:00
github-actions[bot]
af79979d58
Merge master into staging-next 2023-02-21 06:01:00 +00:00
Aaron Andersen
ab8815a4b6
Merge pull request #215789 from bb2020/mbpfan
nixos/mbpfan: add aggressive option
2023-02-20 22:24:11 -05:00
Martin Weinelt
d92d6030be
Merge pull request #217089 from mweinelt/hass-pythonpath
home-assistant: Load optional deps from PYTHONPATH
2023-02-21 00:52:47 +00:00
github-actions[bot]
fc3641aa1e
Merge staging-next into staging 2023-02-21 00:03:04 +00:00
github-actions[bot]
e3e8374b6f
Merge master into staging-next 2023-02-21 00:02:33 +00:00
Martin Puppe
8bc615d0e0 nixos/yggdrasil: correct documentation
The option `LinkLocalTCPPort` does not exist anymore in recent versions
of Yggdrasil. The port for incoming link-local connections is now
configured as part of the `MulticastInterfaces` option. Our
documentation should reflect that.
2023-02-20 23:10:54 +01:00
Martin Puppe
cf8b1fb85e nixos/yggdrasil: support HJSON files as configFile
Yggdrasil uses HJSON as its configuration file format. The NixOS module
meanwhile only supports pure JSON. This commit adds support for HJSON
files.
2023-02-20 23:10:54 +01:00
Martin Puppe
78ac812356 nixos/yggdrasil: fix configFile option
As far as I can tell the configFile option cannot have worked as
intended. The Yggdrasil systemd service uses a dynamic user. As it was,
there was no way to set the correct permissions on a config file
beforehand which would allow the dynamic user to read the config file
without making it readable for all users. But since the config file can
contain a private key it *must not* be world-readable.

The file must only be readable by root. The file has to be copied and
the permissions have to be fixed during service startup. This can either
be done in a ExecStartPre directive with the '+' prefix (which executes
that command with elevated privileges), or it can be done more
declarative with the LoadCredential directive. I have chosen the latter
approach because it delegates more work to systemd itself. It should be
noted that this has the minor tradeoff that the config file must not be
larger than 1 MB. This is a limit which systemd imposes on credential
files. But I think 1 MB ought to be enough for anybody ;).
2023-02-20 23:04:24 +01:00
Martin Puppe
9b2e2e8006 nixos/yggdrasil: nixpkgs-fmt 2023-02-20 22:02:59 +01:00
Will Fancher
bb7cd63150
Merge pull request #215381 from lilyinstarlight/fix/make-initrd-ng-wrapped-executables
make-initrd-ng: support wrapped executables
2023-02-20 14:11:48 -05:00
github-actions[bot]
e579b2b641
Merge staging-next into staging 2023-02-20 18:02:05 +00:00
github-actions[bot]
08d46af354
Merge master into staging-next 2023-02-20 18:01:32 +00:00
Martin Weinelt
e01ccd6245
home-assistant: Inject extra dependencies through PYTHONPATH
Injecting configuration specific dependencies into the
propagatedBuildInputs of the home-assistant package forces alot of
rebuilds while setting up home-assistant, which is annoying.

By passing optional dependencies into home-assistant via the systemd
units PYTHONPATH environment variable, only he concatenation of
library paths in the systemd unit requires a rebuild.

This also means users can rely heavily on the cached home-assistant
package and will rarely have to build from source, if ever.
2023-02-20 18:37:20 +01:00