0
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-07-19 08:31:01 +03:00
Commit graph

43278 commits

Author SHA1 Message Date
abysssol
503245dd07
Merge pull request #334903 from abysssol/ollama-load-models-service
nixos/ollama: move `loadModels` script into a separate service
2024-08-25 15:56:00 +00:00
Franz Pletz
0a490d78b1
Merge pull request #336599 from bjornfor/nixos-ups-use-enum-for-upsmon-option 2024-08-25 15:49:46 +02:00
Maciej Krüger
00f536f650
Merge pull request #310857 from rnhmjoj/pr-firewall
nixos/firewall: fix reverse path check failures with IPsec
2024-08-25 15:06:49 +02:00
Robert Hensing
727351517e
Merge pull request #335660 from Gabriella439/gabriella/containers_nixpkgs.pkgs
containers.*.config.nixpkgs: use `host.pkgs.stdenv.hostPlatform`
2024-08-25 14:40:31 +02:00
Vili Sinervä
13f07436d4 nixos/libinput: Change new options to more appropriate data types
Change the options to be numbers or lists of numbers instead of strings
like the pre-existing options.
2024-08-25 13:45:14 +02:00
Vili Sinervä
891202ef1f nixos/libinput: Clarify that accelSpeed does not apply to custom profile
Add note to the description of the accelSpeed option to make it clear
that is only applies when flat or adaptive profile is in use.
2024-08-25 13:45:14 +02:00
Vili Sinervä
3aa3236289 nixos/libinput: Add options for defining a custom acceleration functions
Without these options the custom acceleration functions would have to be
defined with the additionalOptions option.
2024-08-25 13:45:14 +02:00
Vili Sinervä
34302b2424 nixos/libinput: Allow 'custom' acceleration profile
This is an option that works with the NixOS module as-is, but is
being blocked from use by the allowed enum values.
2024-08-25 13:45:14 +02:00
Jörg Thalheim
82ac9a1580
Merge pull request #337054 from Mic92/sysusers
sysuser: slightly better assertions message
2024-08-25 09:44:58 +02:00
Bobby Rong
dc23466adb
Merge pull request #336934 from bobby285271/upd/pantheon
Pantheon updates 2024-08-24 (switchboard 8.0.0)
2024-08-25 11:34:02 +08:00
Franz Pletz
9446a5d8da
Merge pull request #337003 from alyssais/no-tell-kernel 2024-08-25 02:07:33 +02:00
Franz Pletz
83cd05ff59
Merge pull request #335976 from poscat0x04/nixos-networkd-ipv6ra 2024-08-25 01:51:36 +02:00
Franz Pletz
a266f38ade
Merge pull request #336584 from mweinelt/engelsystem-cache-migration 2024-08-25 01:50:39 +02:00
Franz Pletz
76d7ccecdf
Merge pull request #313105 from bb2020/xserver 2024-08-25 01:47:27 +02:00
Franz Pletz
39c0d9f53d
Merge pull request #336896 from tomodachi94/enhance/nixos/clamav/systemd-slices 2024-08-25 01:45:27 +02:00
Franz Pletz
35b2bfb7ed
Merge pull request #335967 from CajuM/waydroid-svc-stop 2024-08-25 01:40:42 +02:00
Franz Pletz
3969d739d8
Merge pull request #336995 from Ma27/gitea-drop-pam 2024-08-25 01:25:13 +02:00
Franz Pletz
89b019abe9
Merge pull request #337083 from zimward/doc-ssh 2024-08-25 01:15:35 +02:00
OPNA2608
1758314043 nixos/lomiri: Add docviewer app 2024-08-24 23:27:52 +02:00
OPNA2608
531655d3bf tests/lomiri-docviewer-app: init 2024-08-24 23:27:52 +02:00
zimward
81a9bf5861
doc: remove mention of key type 2024-08-24 21:59:22 +02:00
Jörg Thalheim
7211a81060 sysuser: slightly better assertions message 2024-08-24 19:20:28 +02:00
Mihai-Drosi Câju
05313fc5b3 nixos/waydroid: Update service definition according to upstream
* Upstream switched the service's Type to dbus in 1.4.0
* Enable D-Bus activation
* Fixes #334687
2024-08-24 19:48:20 +03:00
Bobby Rong
8e75a28e4e
nixos/pantheon: Increase memorySize
https://logs.ofborg.org/?key=nixos/nixpkgs.336934&attempt_id=24f89861-72eb-417f-94bf-93cea578a1f1
2024-08-24 22:34:55 +08:00
Adam C. Stephens
bd29cb4b30
Merge pull request #336836 from oddlama/feat-update-kanidm-provision
kanidm-provision: 1.1.1 -> 1.1.2
2024-08-24 08:58:35 -04:00
Alyssa Ross
148261d04b
sd-image: optimise sfdisk call for image building
When building an image, rather than operating on a real partition,
there's no need to have sfdisk tell the kernel to reread the partition
table.  This also avoids a call to sync(2), which could be very
expensive depending on what other IO is going on on the system at the time.
2024-08-24 14:36:07 +02:00
Maximilian Bosch
b39569222b
gitea: drop PAM support
Strongly inspired by the forgejo counterpart[1], for the following
reasons:

* The feature is broken with the current module and crashes on
  authentication with the following stacktrace (with a PAM service
  `gitea` added):

      server # Stack trace of thread 1008:
      server # #0  0x00007f3116917dfb __nptl_setxid (libc.so.6 + 0x8ddfb)
      server # #1  0x00007f3116980ae6 setuid (libc.so.6 + 0xf6ae6)
      server # #2  0x00007f30cc80f420 _unix_run_helper_binary (pam_unix.so + 0x5420)
      server # #3  0x00007f30cc8108c9 _unix_verify_password (pam_unix.so + 0x68c9)
      server # #4  0x00007f30cc80e1b5 pam_sm_authenticate (pam_unix.so + 0x41b5)
      server # #5  0x00007f3116a84e5b _pam_dispatch (libpam.so.0 + 0x3e5b)
      server # #6  0x00007f3116a846a3 pam_authenticate (libpam.so.0 + 0x36a3)
      server # #7  0x00000000029b1e7a n/a (.gitea-wrapped + 0x25b1e7a)
      server # #8  0x000000000047c7e4 n/a (.gitea-wrapped + 0x7c7e4)
      server # ELF object binary architecture: AMD x86-64
      server #
      server # [   42.420827] gitea[897]: pam_unix(gitea:auth): unix_chkpwd abnormal exit: 159
      server # [   42.423142] gitea[897]: pam_unix(gitea:auth): authentication failure; logname= uid=998 euid=998 tty= ruser= rhost=  user=snenskek

  It only worked after turning off multiple sandbox settings and adding
  `shadow` as supplementary group to `gitea.service`.

  I'm not willing to maintain additional multiple sandbox settings for
  different features, especially given that it was probably not used for
  quite a long time:

  * There was no PR or bugreport about sandboxing issues related to
    PAM.

  * Ever since the module exists, it used the user `gitea`, i.e. it had
    never read-access to `/etc/shadow`.

* Upstream has it disabled by default[2].

If somebody really needs it, it can still be brought back by an overlay
updating `tags` accordingly and modifying the systemd service config.

[1] 07641a91c9
[2] https://docs.gitea.com/usage/authentication#pam-pluggable-authentication-module
2024-08-24 13:40:58 +02:00
Cosima Neidahl
eb76459e90
Merge pull request #334952 from OPNA2608/fix/ayatana-lomiri-indicator-marking
nixos/ayatana-indicators: Split ayatana and lomiri indicators
2024-08-24 11:12:00 +02:00
Bobby Rong
b3784b8153
treewide: Fix switchboard executable name 2024-08-24 14:31:20 +08:00
Bobby Rong
96b1f3bd99
Merge pull request #336790 from bobby285271/upd/pantheon
Pantheon updates 2024-08-23
2024-08-24 11:52:42 +08:00
Gabriella Gonzalez
0b6fa5ee40
virtualisation.oci-containers: Add new imageStream option (#335430)
This adds a new `imageStream` option that can be used in conjunction
with `pkgs.dockerTools.streamLayeredImage` so that the image archive
never needs to be materialized in the `/nix/store`.  This greatly
improves the disk utilization for systems that use container images
built using Nix because they only need to store image layers instead of
the full image.  Additionally, when deploying the new system and only
new layers need to be built/copied.
2024-08-24 04:38:27 +02:00
Tomodachi94
695b1c874d
nixos/clamav: add system-clamav.slice
Tracking: https://github.com/NixOS/nixpkgs/issues/279915
2024-08-23 17:09:11 -07:00
Jan Tojnar
b8f3c78021
Merge pull request #333917 from jtojnar/gnome-top-level
gnome: Move more packages to top-level
2024-08-24 01:43:31 +02:00
Peder Bergebakken Sundt
d38f701636
Merge pull request #334559 from litchipi/ifm_fixup
ifm-web: init at 4.0.2
2024-08-24 01:07:30 +02:00
laalsaas
9e5316a1c5 nixos/varnish: change default stateDir to /run
The stateDir, or as varnish calls it, the workdir should always be a
tmpfs. Otherwise, performance issues may occur. See:

- https://varnish-cache.org/docs/trunk/reference/varnishd.html#opt-n

- https://github.com/varnishcache/varnish-cache/issues/4121
2024-08-23 21:45:43 +02:00
Donovan Glover
d3353b074b
Merge pull request #336286 from oluceps/update-dae
dae: 0.7.0 -> 0.7.1
2024-08-23 19:35:53 +00:00
oddlama
aa6cbcbf09
nixos/kanidm: run nixfmt-rfc-style 2024-08-23 20:55:03 +02:00
oddlama
391d05ce95
nixos/kanidm: update provisioning to allow multiple origin urls 2024-08-23 20:46:53 +02:00
Bobby Rong
dfc226bfb1
nixos/pantheon: Enable switcheroo support
317ae5e482
2024-08-23 22:10:26 +08:00
Bobby Rong
43f8c88e9c
nixos/pantheon: Ship elementary-bluetooth-daemon by default
This is extracted from wingpanel-indicator-bluetooth.
2024-08-23 21:34:44 +08:00
Florian Klink
25f5471de6
Merge pull request #333205 from flokli/buildkite-agent-3.77.0
buildkite-agent: 3.76.2 -> 3.77.0
2024-08-23 14:04:52 +03:00
Sarah Brofeldt
f372ec38b1
Merge pull request #334417 from r-ryantm/auto-update/kubernetes
kubernetes: 1.30.2 -> 1.31.0
2024-08-23 12:24:08 +02:00
Jörg Thalheim
33b5aab88f nixosTest.nix-upgrade: try to garbage collect with old nix 2024-08-23 11:06:48 +02:00
Jörg Thalheim
d01abc5602 nixosTest.nix-upgrade: actually use nix-daemon for build
root by-passes nix-daemon
2024-08-23 11:06:48 +02:00
Tom Bereknyei
c4dffb6513 nixosTest.nix-upgrade: init
Test out both nix upgrade-nix and a NixOS upgrade.

Inject a fake fallback-paths.nix assuming a stable -> latest upgrade.

The NixOS upgrade does not use nixos-rebuild switch due to the
cost+annoyance of the instantiation needing
system.includeBuildDependencies.
2024-08-23 11:06:47 +02:00
Bjørn Forsman
1edbc4fa0d nixos/ups: change upsmon option type from str to enum
According to `man upsd.users`, the option is 'either set to "primary" or
"secondary"'.
2024-08-22 21:25:47 +02:00
Someone Serge
f72b7b56fb tests/nvidia-container-toolkit: mv shared config to defaults 2024-08-22 17:51:54 +00:00
Martin Weinelt
760b2b5562
nixos/engelsystem: refactor option setup 2024-08-22 19:50:17 +02:00
Someone Serge
d970b4d6cd tests/nvidia-container-toolkit: hardware.opengl -> graphics 2024-08-22 17:37:26 +00:00
Someone Serge
0780a3ebc8 tests/nvidia-container-toolkit: strip {no,one}-nvidia prefix as obvious from the context 2024-08-22 17:34:48 +00:00