1
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-06-21 08:59:20 +03:00
Commit graph

7946 commits

Author SHA1 Message Date
Jade Lovelace
9ce6ff06c7 nixos/tests: fix kanidm under network-online dep fix 2024-01-18 16:28:41 -08:00
Jade Lovelace
062be41387 nixos/tests: fix zrepl under network-online dep fix 2024-01-18 16:28:41 -08:00
Jade Lovelace
d51e4a6443 nixos/tests: fix uptermd under network-online dep fix 2024-01-18 16:28:41 -08:00
Jade Lovelace
c940ae656d nixos/tests: fix opensmtpd under network-online dep fix 2024-01-18 16:28:41 -08:00
Jade Lovelace
c125c23468 nixos/tests: fix systemd-networkd-dhcpserver under network-online dep fix 2024-01-18 16:28:41 -08:00
Jade Lovelace
9ed2e58b70 nixos/tests: fix rss2email under network-online dep fix 2024-01-18 16:28:41 -08:00
Jade Lovelace
8169ded7a3 nixos/tests: fix qemu-vm-restrictnetwork under network-online dep fix 2024-01-18 16:28:41 -08:00
github-actions[bot]
b459003bdd
Merge master into staging-next 2024-01-19 00:02:22 +00:00
nikstur
eec1845744 nixos/systemd-sysusers: init 2024-01-18 23:08:14 +01:00
github-actions[bot]
dc4a7c97b0
Merge master into staging-next 2024-01-18 18:00:55 +00:00
K900
967d49b8a8 Merge remote-tracking branch 'origin/staging-next' into staging 2024-01-18 19:15:32 +03:00
Adithya Nair
8b5644684e
nixos/frp: use toml configFile
According to upstream, the INI configuration file is deprecated and
TOML/YAML/JSON is recommended.
Link: https://github.com/fatedier/frp/tree/dev#configuration-files
2024-01-18 21:37:40 +05:30
Janne Heß
15c31afd8a
Merge pull request #271067 from nikstur/sysinit-reactivation
nixos/switch-to-configuration: add sysinit-reactivation.target
2024-01-18 16:13:32 +01:00
Adam C. Stephens
887d3f54c6
Merge pull request #278753 from adamcstephens/incus/migrate-test
incus, lxd: ensure lxd->incus migration is supported and tested
2024-01-18 08:01:23 -05:00
Franz Pletz
c00a2d02bd
Merge pull request #251882 from r-ryantm/auto-update/prometheus-snmp-exporter
prometheus-snmp-exporter: 0.22.0 -> 0.25.0
2024-01-18 08:16:39 +01:00
github-actions[bot]
f8b9065479
Merge staging-next into staging 2024-01-18 00:02:50 +00:00
nikstur
e6b66f08a5 nixos/switch-to-configuration: add sysinit-reactivation.target 2024-01-18 00:46:30 +01:00
Franz Pletz
ed2ea66bbf
Merge pull request #278539 from Ma27/sshd-socket-activation-ports
nixos/sshd: fix socket activated ports when using ListenAddress
2024-01-17 23:27:52 +01:00
WilliButz
a8ea9fe492
nixos/prometheus-snmp-exporter: switch to new config syntax
Introduced with version 0.23.0, see
b75fc6b839/auth-split-migration.md
2024-01-17 20:32:45 +01:00
github-actions[bot]
5fe540596f
Merge staging-next into staging 2024-01-17 18:01:27 +00:00
Robin Gloster
e59524560c
Merge pull request #281555 from fpletz/nixos/ntpd-rs-fix-metrics
nixos/ntpd-rs: fix metrics service
2024-01-17 15:49:24 +01:00
Sandro
23a88afe88
Merge pull request #247112 from OPNA2608/init/lomiri/lomiri-terminal-app 2024-01-17 15:31:11 +01:00
Franz Pletz
35c015ff91
nixos/ntpd-rs: fix metrics service 2024-01-17 15:06:20 +01:00
Robert Hensing
1f9e86f314 nixosTests.docker-tools: Use both code paths in includeStorePath test 2024-01-17 13:50:01 +01:00
github-actions[bot]
4fe3cac67d
Merge staging-next into staging 2024-01-17 12:01:22 +00:00
Maciej Krüger
f666630f4a
Merge pull request #280556 from gador/pgadmin-8.2
pgadmin: 8.1 -> 8.2, python3Packages.webauthn 1.11.1 -> 2.0.0, python3Packages.flask-security-too: fix pydantic issue
2024-01-17 08:30:24 +01:00
github-actions[bot]
e73431e32f
Merge staging-next into staging 2024-01-17 06:01:31 +00:00
Benjamin Bädorf
7c3ecbdce9 nixos/invoiceplane: add nginx as a webserver option for invoiceplane
Getting the vhost to play nice with phpfpm was done by following this
community post: https://community.invoiceplane.com/t/topic/2654
2024-01-17 05:09:34 +01:00
Florian Brandes
03649bfdf2 python3Packages.flask-security-too: fix for webauth 2
also removes pydantic (since webauth 2 doesn't use it anymore)

Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-01-16 15:55:16 +01:00
Franz Pletz
71435c9869
nixos/tests/podman: firewall now opened by module 2024-01-16 14:46:16 +01:00
github-actions[bot]
7e5906aca4
Merge staging-next into staging 2024-01-16 12:01:24 +00:00
Thiago Kenji Okada
401d16acd0
Merge pull request #247256 from lucasew/xrdp-audio
xrdp: add support for audio
2024-01-16 10:06:51 +00:00
OPNA2608
62b9942ca2 lomiri.lomiri-terminal-app: init at 2.0.1 2024-01-15 18:42:35 +01:00
github-actions[bot]
d27cb01f7b
Merge staging-next into staging 2024-01-15 06:01:24 +00:00
Franz Pletz
678b899ac0
Merge pull request #264593 from fpletz/pkgs/ntp-rs-1.0.0 2024-01-15 02:17:36 +01:00
github-actions[bot]
c040ffb531
Merge staging-next into staging 2024-01-14 18:01:21 +00:00
Peder Bergebakken Sundt
fa8616a4c0
Merge pull request #279479 from gepbird/c2fmzq-server-bool-setting-allow-false
nixos/c2fmzq-server: allow setting bool settings to false
2024-01-14 18:32:11 +01:00
Franz Pletz
9707745cf8
nixos/ntpd-rs: init 2024-01-14 17:34:42 +01:00
Adam Stephens
ffdcec2d94
nixos/tests/incus: add lxd-to-incus migration test 2024-01-14 09:26:49 -05:00
Felix Bühler
99f4714039
Merge pull request #277501 from Stunkymonkey/prowlarr-check-folder
nixos/tests/prowlarr: check for folder existence
2024-01-14 14:39:27 +01:00
github-actions[bot]
d841ab8796
Merge staging-next into staging 2024-01-14 12:01:53 +00:00
Thomas Gerbet
afb57ff041 elasticsearch: 7.17.10 -> 7.17.16
Fixes CVE-2023-31417, CVE-2023-31418, CVE-2023-31419, CVE-2023-46673 and CVE-2023-46674.

Security announces:
https://www.elastic.co/guide/en/security/7.17/release-notes-header-7.17.0.html#release-notes-7.17.16

Release notes:
https://www.elastic.co/guide/en/elasticsearch/reference/7.17/release-notes-7.17.16.html
https://www.elastic.co/guide/en/elasticsearch/reference/7.17/release-notes-7.17.15.html
https://www.elastic.co/guide/en/elasticsearch/reference/7.17/release-notes-7.17.14.html
https://www.elastic.co/guide/en/elasticsearch/reference/7.17/release-notes-7.17.13.html
https://www.elastic.co/guide/en/elasticsearch/reference/7.17/release-notes-7.17.12.html
https://www.elastic.co/guide/en/elasticsearch/reference/7.17/release-notes-7.17.11.html
2024-01-14 12:21:45 +01:00
Bobby Rong
4d47dc2d9f
Merge pull request #280526 from bobby285271/upd/pantheon-test
nixosTests.pantheon: Extend the test
2024-01-14 17:44:09 +08:00
Bobby Rong
40bec35947
nixosTests.pantheon: Extend the test
- Ensure greeter-compositor starts
- Ensure various environment variables are set
- Ensure multitasking view triggers
- Misc updates
2024-01-14 14:10:21 +08:00
github-actions[bot]
c9743f0e5c
Merge staging-next into staging 2024-01-14 06:01:18 +00:00
Ryan Lahfa
dd5621df6d
Merge pull request #278380 from DeeUnderscore/fix/nginx-etag
nginx: change etags for statically compressed files served from store
2024-01-14 04:55:27 +01:00
github-actions[bot]
ec9f3ed3ee
Merge staging-next into staging 2024-01-14 00:02:46 +00:00
Gutyina Gergő
7247d16af6
nixos/c2fmzq-server: allow setting bool settings to false 2024-01-14 00:19:19 +01:00
Dee Anzorge
f124c73686 nginx: change etags for statically compressed files served from store
Per RFC 9110, [section 8.8.1][1], different representations of the same
resource should have different Etags:

> A strong validator is unique across all versions of all
> representations associated with a particular resource over time.
> However, there is no implication of uniqueness across representations
> of different resources (i.e., the same strong validator might be in
> use for representations of multiple resources at the same time and
> does not imply that those representations are equivalent)

When serving statically compressed files (ie, when there is an existing
corresponding .gz/.br/etc. file on disk), Nginx sends the Etag marked
as strong. These tags should be different for each compressed format
(as shown in  an explicit example in section [8.8.3.3][2] of the RFC).
Upstream Etags are composed of the file modification timestamp and
content length, and the latter generally changes between these
representations.

Previous implementation of Nix-specific Etags for things served from
store used the store hash. This is fine to share between different
files, but it becomes a problem for statically compressed versions of
the same file, as it means Nginx was serving different representations
of the same resource with the same Etag, marked as strong.

This patch addresses this by imitating the upstream Nginx behavior, and
appending the value of content length to the store hash.

[1]: https://www.rfc-editor.org/rfc/rfc9110.html#name-validator-fields
[2]:
https://www.rfc-editor.org/rfc/rfc9110.html#name-example-entity-tags-varying
2024-01-13 22:07:50 +01:00
Mario Rodas
033f88f786
Merge pull request #277982 from trofi/spark-fix-tests-eval
spark: fix `tests` eval under `allowAliases = false`
2024-01-13 16:06:50 -05:00