1
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-06-22 01:11:02 +03:00
Commit graph

804 commits

Author SHA1 Message Date
Felix Buehler
24f82fc6b5 nixos/services.surrealdb: remove with lib; 2024-08-30 00:30:41 +02:00
Felix Buehler
edcd08a8ff nixos/services.rethinkdb: remove with lib; 2024-08-30 00:30:41 +02:00
Felix Buehler
18c0ca5714 nixos/services.pgmanage: remove with lib; 2024-08-30 00:30:41 +02:00
Felix Buehler
6bbc3df0dd nixos/services.opentsdb: remove with lib; 2024-08-30 00:30:40 +02:00
Felix Buehler
93fb328e44 nixos/services.openldap: remove with lib; 2024-08-30 00:30:40 +02:00
Felix Buehler
0dbb2e5fa1 nixos/services.influxdb: remove with lib; 2024-08-30 00:30:40 +02:00
Felix Buehler
3db1445493 nixos/services.hbase-standalone: remove with lib; 2024-08-30 00:30:40 +02:00
Felix Buehler
567aa06ba2 nixos/services.firebird: remove with lib; 2024-08-30 00:30:40 +02:00
Felix Buehler
17003eacc9 nixos/services.ferretdb: remove with lib; 2024-08-30 00:30:39 +02:00
Felix Buehler
f06f3a7973 nixos/services.dragonflydb: remove with lib; 2024-08-30 00:30:39 +02:00
Felix Buehler
626c4c1a21 nixos/services.dgraph: remove with lib; 2024-08-30 00:30:39 +02:00
Felix Buehler
75d565a3b0 nixos/services.couchdb: remove with lib; 2024-08-30 00:30:39 +02:00
Felix Buehler
be15d06e48 nixos/services.neo4j: remove with lib; 2024-08-29 00:21:21 +02:00
Felix Buehler
8e91c6b7b3 nixos/services.mysql: remove with lib; 2024-08-29 00:20:49 +02:00
Felix Buehler
fbd927db77 nixos/services.foundationdb: remove with lib; 2024-08-29 00:20:04 +02:00
Sergei Trofimovich
f3ece34945 nixos/postgresql: fix documentation markdown
Without the change the doc build fails as:

    $ nix build -f nixos config.system.build.manual.manualHTML -L
    ...
    nixos-manual-html> RuntimeError: heading in line 366 does not have an id
2024-08-25 17:09:36 +01:00
Wolfgang Walther
435f51c37f
postgresql: split dev output
This splits a dev output to make the default output not depend on any
build dependencies anymore. This also avoids removing references from
pgxs' Makefile this way, which should, at least theoretically, be good
to build extensions via pgxs, making sure they use the same tooling.

ecpg is the "embedded SQL C preprocessor", which is certainly a dev
tool.

Most important, for closure size anyway, is to move pg_config to the dev
output, since it retains paths to all the other outputs.

The only thing with references to the dev output remaining is then the
postgres binary itself. It contains all the output paths, because it
shows those in the pg_config system view. There is no other way than
to nuke those references to avoid circular dependencies between outputs
- and blowing up closure size again.
2024-08-23 21:37:49 +02:00
Pol Dellaiera
8d18fe9184
Merge pull request #335151 from drupol/nixos/chromadb/init
nixos/chromadb: init
2024-08-19 17:29:57 +02:00
Sandro
c67dbda54f
Merge pull request #308700 from tie/pgbouncer-settings
nixos/pgbouncer: add services.pgbouncer.settings option
2024-08-18 16:30:17 +02:00
Pol Dellaiera
835b2f8822
nixos/chromadb: init 2024-08-16 18:23:12 +02:00
github-actions[bot]
d3ef01201e
Merge master into staging-next 2024-08-08 18:01:35 +00:00
Sandro Jäckel
3e8666bce9 nixos/redis: remove outdated info in enable option
Thanks for the heads up @poperigby !
2024-08-08 17:25:16 +02:00
Ivan Trubach
bfb9d1825d nixos/pgbouncer: add services.pgbouncer.settings option
This change adds services.pgbouncer.settings option as per [RFC 0042]
and deprecates other options that were previously used to generate
configuration file.

In addition to that, we also place the configuration file under
environment.etc to allow reloading configuration without service
restart.

[RFC 0042]: https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md
2024-08-08 05:54:26 +03:00
Maximilian Bosch
7b01c5da3c
Merge pull request #329611 from Ma27/pg16
postgresql: 15 -> 16 for 24.11+
2024-08-02 07:09:50 +00:00
Felix Uhl
10538b82df nixos/mysql: fix permission error during first startup
When mysql starts up for the first time, the binary `mysql_install_db`
will run and try to set up the correct folder structure and permissions.

The very first step is to change the owner and group of the data
directory. This can fail in some cases, for example if `cfg.dataDir` is
something like `/mnt/mysql`:

```
Jul 31 15:24:35 junction systemd[1]: Starting MySQL Server...
Jul 31 15:24:36 junction mysql-pre-start[1346]: chown: changing ownership of '/mnt/mysql': Operation not permitted
Jul 31 15:24:36 junction mysql-pre-start[1309]: Cannot change ownership of the database directories to the 'mysql'
Jul 31 15:24:36 junction mysql-pre-start[1309]: user.  Check that you have the necessary permissions and try again.
Jul 31 15:24:36 junction systemd[1]: mysql.service: Control process exited, code=exited, status=1/FAILURE
Jul 31 15:24:36 junction systemd[1]: mysql.service: Failed with result 'exit-code'.
Jul 31 15:24:36 junction systemd[1]: Failed to start MySQL Server.
```

This is because `/mnt` usually is owned by root.

To work around this issue, use `systemd.tmpfiles` to set the owner,
group and permissions. This will always work, and if the permissions are
already set as expected, mysql will not try to alter them again.
2024-07-31 15:49:23 +02:00
Sigmanificient
543cd40ecc treewide: remove trailing space in description
Done using `grep -rP 'description\s+=\s+"[^"]+[ ]";' | cut -d ':' -f 1 |
xargs -i nvim {}` and sorting the opened files by hand, avoiding
generated packages list
2024-07-26 03:38:50 +02:00
Maximilian Bosch
bf2d040432
postgresql: 15 -> 16 for 24.11+
Upgrade default postgresql for stateVersion >=24.11.
This also rebuilds all packages linking against `libpq.so` to use
postgresql 16.

After re-reading https://www.postgresql.org/docs/16/release-16.html
I don't see any major risks about doing that.
2024-07-24 10:43:02 +02:00
Michael Weiss
10cbea2905
nixos/monetdb, nixos/sks: remove primeos from maintainers (#277366)
Remove myself as maintainer from modules that I don't use anymore
2024-07-04 18:17:43 +02:00
Sandro
33f83c6252
Merge pull request #316977 from eclairevoyant/fix-mkEnableOption
treewide: fix mkEnableOption usage
2024-06-25 22:42:16 +02:00
Paul Meyer
fbe8538aa1 treewide: remove jonringer as package maintainer
Signed-off-by: Paul Meyer <49727155+katexochen@users.noreply.github.com>
2024-06-25 09:16:56 +02:00
Wolfgang Walther
0487937af3
postgresql: add readme with eol-policy
This was discussed and agreed on in [1].

[1]: https://github.com/NixOS/nixpkgs/pull/310580#discussion_r1597284693
2024-06-14 09:38:23 +02:00
éclairevoyant
7d8742da87
treewide: fix mkEnableOption usage 2024-06-14 02:41:42 -04:00
github-actions[bot]
67f8ba4a30
Merge master into staging-next 2024-05-01 18:01:22 +00:00
Tom Hubrecht
0ccd40450f nixos/postgresql: Remove toplevel with lib; 2024-05-01 12:25:24 +02:00
github-actions[bot]
6fecc628f9
Merge master into staging-next 2024-04-29 12:01:15 +00:00
Sandro Jäckel
5f349abc7b
nixos/redis: don't disable transparent hugepages
Since https://github.com/redis/redis/pull/4001 included in 6.2.0
transparent hugepages works when being set to madvise which is the NixOS
and upstream recommended default.
2024-04-28 21:17:03 +02:00
Sandro Jäckel
5071c02bb0
nixos/redis: enable vmOverCommit by default as recommended by redis itself
> WARNING Memory overcommit must be enabled! Without it, a background save or replication may fail under low memory condition.
> Being disabled, it can also cause failures without low memory condition, see https://github.com/jemalloc/jemalloc/issues/1328.
> To fix this issue add 'vm.overcommit_memory = 1' to /etc/sysctl.conf and then reboot or run the command 'sysctl vm.overcommit_memory=1' for this to take effect.
2024-04-28 21:17:03 +02:00
Maximilian Bosch
cba6af761a
Merge pull request #293996 from wolfgangwalther/postgresql-cleanup
postgresql: more cleanup
2024-04-19 13:53:20 +00:00
stuebinm
6afb255d97 nixos: remove all uses of lib.mdDoc
these changes were generated with nixq 0.0.2, by running

  nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix
  nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix
  nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix

two mentions of the mdDoc function remain in nixos/, both of which
are inside of comments.

Since lib.mdDoc is already defined as just id, this commit is a no-op as
far as Nix (and the built manual) is concerned.
2024-04-13 10:07:35 -07:00
Aleksana
2a057805ae
Merge pull request #301804 from helsinki-systems/init/keydb
keydb: init at 6.3.4
2024-04-12 16:33:36 +08:00
Simon Hauser
b3642388fe
keydb: init at 6.3.4 2024-04-11 10:47:07 +02:00
Robin Appelman
a3184ef2bf doc: use initdbArgs in example postgresql upgrade script
it's likely that the configured initdbArgs will still be relevant after the upgrade.
2024-04-09 14:34:58 +02:00
Bjørn Forsman
a29010fe79 nixos: improve many 'enable' descriptions 2024-04-09 07:10:17 +02:00
Wolfgang Walther
1682b4cc39
nixos/postgresql: fix enableJIT = false
The enableJIT = true case was fixed in #221851 or
e2fb651752 respectively.

However this did not take the case into consideration, when doing this:

    services.postgresql = {
      enable = true;
      enableJIT = false;
      package = pkgs.postgresql_15_jit;
    };

If enableJIT is treated as the source of truth, then this should indeed
cause JIT to be disabled, which this commit does.
2024-04-04 08:41:19 +02:00
Maximilian Bosch
5142b7afa8
nixos/postgresql: turn settings into a submodule
The main idea behind that was to be able to do more sophisticated
merging for stuff that goes into `postgresql.conf`:
`shared_preload_libraries` is a comma-separated list in a `types.str`
and thus not mergeable. With this change, the option accepts both a
comma-separated string xor a list of strings.

This can be implemented rather quick using `coercedTo` +
freeform modules. The interface still behaves equally, but it allows to
merge declarations for this option together.

One side-effect was that I had to change the `attrsOf (oneOf ...)` part into
a submodule to allow declaring options for certain things. While at it,
I decided to move `log_line_prefix` and `port` into this structure as
well.
2024-03-30 14:23:05 +01:00
Janne Heß
fcc95ff817 treewide: Fix all Nix ASTs in all markdown files
This allows for correct highlighting and maybe future automatic
formatting. The AST was verified to work with nixfmt only.
2024-03-28 09:28:12 +01:00
Janne Heß
bc77c7a973 treewide: Mark Nix blocks in markdown as Nix
This should help us with highlighting and future formatting.
2024-03-28 09:28:12 +01:00
Wolfgang Walther
4b6bce5c31
postgresql: refactor to remove "this" argument
This was proposed by abbradar in #150801, but left out of the follow up PR
#221851 by Ma27 to reduce the size of the diff. Compared to the initial
proposal this includes the callPackage call in the recursion, which avoids
breaking the withJIT/withoutJIT helpers.

In terms of nixpkgs, this is a pure refactor, no derivations change. However,
this makes downstream expressions like the following possible:

  (postgresql.override { jitSupport = true; }).pkgs.postgis

This would have not worked before without passing another "this" argument,
which is error prone as can be seen in this example:

  https://github.com/PostgREST/postgrest/pull/3222/files
2024-03-15 21:11:09 +01:00
Wolfgang Walther
14b3ea2789
postgresql: refactor to pass jitSupport/llvm via scope instead of passthru
This makes it less error-prone to use the llvm package in extensions, because
it will always match the package used by the postgresql derivation itself.

Previously, you could've accidentally used llvm instead of postgresql.llvm
with a different result.
2024-03-15 21:11:09 +01:00
emilylange
08c37ba899 nixos/lldap: set service UMask=0027 and StateDirectoryMode=0750
While `/var/lib/lldap` isn't technically accessible by unprivileged
users thanks to `DynamicUser=true`, a user might prefer and change it to
`DynamicUser=false`.

There is currently also a PR open that intends to make `DynamicUser`
configurable via module option.

As such, `jwt_secret_file`, if bootstrapped by the service start
procedure, might be rendered world-readable due to its permissions
(`0644/-rw-r--r--`) defaulting to the service's umask (`022`) and
`/var/lib/lldap` to `0755/drwxr-xr-x` due to `StateDirectoryMode=0755`.

This would usually be fixed by using `(umask 027; openssl ...)` instead
of just `openssl ...`.

However, it was found that another file (`users.db`), this time
bootstrapped by `lldap` itself, also had insufficient permissions
(`0644/-rw-r--r--`) inherited by the global umask and would be left
world-readable as well.

Due to this, we instead change the service's to `027`.

And to lower the impact for already bootstrapped files on existing
instances like `users.db`, set `StateDirectoryMode=0750`.
2024-03-11 17:34:29 +01:00