1
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-06-23 17:56:53 +03:00
Commit graph

38000 commits

Author SHA1 Message Date
Aleksana
86628e2b8d
nixos/nm-applet: fix service starting too early in some cases (#406277) 2025-05-16 16:52:22 +08:00
Seth Flynn
7c2f22b376
nixos/hddfancontrol: use attrset for config (#394826) 2025-05-15 13:49:19 -04:00
lassulus
84049bd248
nixos/syncthing: define and handle encryptionPassword option (#383442) 2025-05-15 19:44:22 +02:00
Jenny
26c6a14a9a
nixos/librenms: seed database in module, not only in test (#406546) 2025-05-15 19:17:41 +02:00
Arian van Putten
871526be1f
nixos/image/repart: Use own assertions / warnings. (#406940) 2025-05-15 19:14:53 +02:00
Maximilian Bosch
26126c75df
Merge: Use cacert in Nextcloud (#406252) 2025-05-15 18:50:53 +02:00
Vladimír Čunát
e06158e58f
staging-next 2025-05-07 (#404858) 2025-05-15 18:42:40 +02:00
provokateurin
12f8199080
nixos/nextcloud: Override cacert package with config.security.pki.caBundle 2025-05-15 18:19:52 +02:00
isabel
84c1069ebe
nixos/cloudflared: fix cert.pem installation (#407128) 2025-05-15 15:32:56 +01:00
nixpkgs-ci[bot]
d1034e4a8a
Merge master into staging-next 2025-05-15 12:07:04 +00:00
Sandro
5077b9edb6
nixos/headscale: fix derp.auto_update_enabled option (#406108) 2025-05-15 11:04:01 +02:00
Pedro Alves
75c7d0908e nixos/cloudflared: fix cert.pem installation
There was a typo in the systemd service definition for cloudflared which
meant that the cert.pem file was not being correctly exposed.
2025-05-14 20:13:42 +01:00
nixpkgs-ci[bot]
ee27ba77b2
Merge master into staging-next 2025-05-14 18:05:41 +00:00
Luj
b98b4f43bd
readeck: 0.17.1 -> 0.18.2 (#405276) 2025-05-14 17:38:22 +02:00
Sandro
60571a4fa9
nixos/gancio: fix cli not passing all args (#401581) 2025-05-14 15:11:36 +02:00
K900
a27047792f Merge remote-tracking branch 'origin/master' into staging-next 2025-05-14 12:29:40 +03:00
phaer
8a2195e94e repart: fix whitespace in option descriptions
I mistakenly added extra whitespace in
https://github.com/NixOS/nixpkgs/pull/401872 which negatively affects
aesthetics of our documentation.

Thought it was part of nixfmt-rfc-styles output, but can't reproduce.
Might have had configured the wrong nixfmt.
2025-05-14 09:32:18 +02:00
Vladimír Čunát
bf7544999c
Merge master into staging-next 2025-05-14 08:12:15 +02:00
Will Fancher
26ccfb7a8c nixos/image/repart: Use own assertions / warnings.
It was easy to accidentally trigger infinite recursion if you depended
on `toplevel` in any way before. For instance, if you used
`CopyBlocks` with an image containing `toplevel`. This was because
`toplevel`'s assertion / warning logic has to be evaluated, but that
means evaluating `image.repart`'s assertions / warnings, which
requires evaluating the `repartConfig` attrsets to check for malformed
`Label`s. That causes the module system to type check *all*
`repartConfig` keys, even though most of them aren't used in the
assertions / warnings. So evaluating `system.build.image` evaluates
`repartConfig.CopyBlocks`, which evaluates `toplevel`, which evaluates
assertions / warnings, which evaluates `repartConfig.CopyBlocks` to
type check it. Infinite loop.

Even ignoring this recursion problem, it's still better for the repart
module to have its own assertions / warnings options. You don't have
to use `toplevel` in a repart image, so its assertions / warnings
would have been ignored in that case anyway. This way they're *always*
checked when you build an image.
2025-05-14 01:24:43 -04:00
Will Fancher
4b0d1225f5 lib/asserts: Factor out NixOS's toplevel assertion / warning logic. 2025-05-14 01:21:10 -04:00
Jonas Heinrich
002ebbc4de
oncall: init at 2.1.7; nixos/oncall: init (#388723) 2025-05-13 23:21:54 +02:00
Robert Hensing
4e4fd664d5
nixos/activation: Fix shellcheck test failure (#406500) 2025-05-13 21:34:42 +02:00
jade
0784176a58
darwin.linux-builder: split create-builder script (#406533) 2025-05-13 11:38:51 -07:00
nixpkgs-ci[bot]
9948288aca
Merge master into staging-next 2025-05-13 18:05:27 +00:00
Arne Keller
2264d87679
cato-client: init at 5.2.1.1, nixos/cato-client: init (#339533) 2025-05-13 17:36:06 +02:00
linsui
bff193eaba readeck: 0.17.1 -> 0.18.2 2025-05-13 23:32:38 +08:00
Jörg Thalheim
5adbb5f72a
darling: drop (#405727) 2025-05-13 16:35:40 +02:00
Sandro Jäckel
314cfdddb5
nixos/librenms: seed database in module, not only in test
To properly use librenms and create a user, you need the seeded roles
like admin.
2025-05-13 14:24:27 +02:00
Paul Haerle
d1a07176d3
oxidized: switch to tmpfiles (#402646) 2025-05-13 14:21:16 +02:00
nixpkgs-ci[bot]
f13b927ceb
Merge master into staging-next 2025-05-13 12:07:00 +00:00
Maximilian Bosch
0be521cb0e
Merge: nixos/nextcloud: use LoadCredential to read services.nextcloud.secretFile (#405970) 2025-05-13 13:45:36 +02:00
nixpkgs-ci[bot]
d665ddf4a8
Merge master into staging-next 2025-05-13 06:05:56 +00:00
Martin Weinelt
5cea3235bd
nixos/frigate: create model cache dir (#405416) 2025-05-13 04:36:43 +02:00
nixpkgs-ci[bot]
86051b5e95
Merge master into staging-next 2025-05-13 00:16:56 +00:00
Martin Weinelt
8fc7c1593d
nixos/music-assistant: wait for network-online.target
This is required because the server fails to start when it cannot find
a route to send out mDNS packets.
2025-05-13 00:55:12 +02:00
Rebecca Turner
2263f723c1
darwin.linux-builder: split create-builder script
The current workflow for starting the `linux-builder` on macOS is to run
`nix run nixpkgs#darwin.linux-builder`, which adds keys to the store and
then starts the builder.

Adding the keys requires user input (due to `sudo`) but the actual
builder should just stay running in the background somewhere.

I'd like to automate this process, but it's currently rather complex:
the first part of the script needs user input for `sudo`, and then
there's no signal when the process has finished starting up. The user
will need to see stdout/stderr during the first part, which makes it
challenging to capture it for the second part to determine when startup
has finished.

To fix this, I've split the `create-builder` script into an `add-keys`
script (interactive) and a `run-builder` script (background). These new
scripts are exposed in the `passthru` attributes for external users. The
`create-builder` script is now a simple call of `add-keys` and then
`run-builder`.

See: https://nixos.org/manual/nixpkgs/unstable/#sec-darwin-builder
2025-05-12 12:18:33 -07:00
nixpkgs-ci[bot]
3578961ffe
Merge master into staging-next 2025-05-12 18:06:01 +00:00
Arian van Putten
fb4135b611
image/repart: repart.imageFile(BaseName) -> image.baseName, image.extension (#401872) 2025-05-12 19:03:54 +02:00
Berk D. Demir
e4bf5ce70d nixos/activation: Fix shellcheck test failure
lib/test.nix relies on `fileset.toSource` which creates a source dir
with the files of interest. `testers.shellcheck` passes all the files in
the source dir to shellcheck. The issue is related to relative path
sourcing, i.e. `source ./lib.sh` where shellcheck cannot make any
assumptions about the working directory.

Options were:
1) Disable this warning with a directive
   Prior disabling in the tree:
    - pkgs/tools/nix/info/info.sh
    - nixos/modules/testing/test-instrumentation.nix

2) Set source-path to SCRIPTDIR with a directive
   https://github.com/koalaman/shellcheck/wiki/Directive#source-path

   Even though we don't enable external script following for shellcheck
   with `-x` flag given every file in the source dir is passed, this
   directive seems to capture the intent to help shellcheck a bit
   better.

Went with option 2.
2025-05-12 09:58:28 -07:00
Sandro
19bbee4694
nixos/networkd-dispatcher: use writeShellScript to ease use (#370347) 2025-05-12 18:09:18 +02:00
Sandro
95afdf2b49
nixos/gancio: properly quote
Co-authored-by: Wroclaw <wroclaw223@outlook.com>
2025-05-12 17:55:46 +02:00
Sandro
49d1eedf46
nixos/postsrsd: expose socketPath via module option (#406386) 2025-05-12 15:17:13 +02:00
nixpkgs-ci[bot]
c5997abf8e
Merge master into staging-next 2025-05-12 12:07:01 +00:00
K900
5b99c79903
nixos/udev: verify udev rules with udevadm (#406284) 2025-05-12 12:35:34 +03:00
Oliver Schmidt
047a804449 nixos/postsrsd: expose socketPath via module option
Services utilising postsrsd need to connect to it via a Unix socket.
While the path to that socket is static as of now, the discoverability
of that path suffers from the lack of module documentation and a
scattered definition of the individual path components over at least
three lines, even when reading the module source.

By exposing the socket path as a readOnly NixOS option, that value shows
up in the options overview and can be re-used in other parts of NixOS
config.
2025-05-12 09:51:17 +02:00
Wolfgang Walther
9d78475ae9
nixos/pgbackrest: prevent storing secrets in store
While we're not (fully) supporting the related features, yet, we already
prevent accidental storage of secrets in the store. This will also avoid
breaking changes in the future, when those features are properly
supported.
2025-05-12 09:14:39 +02:00
Wolfgang Walther
82e519947f
nixos/pgbackrest: add SFTP support 2025-05-12 09:14:38 +02:00
Wolfgang Walther
d5ddb6116f
nixos/pgbackrest: init module 2025-05-12 09:14:37 +02:00
Leona Maroni
f79b568519
nixos/gitlab: add activeRecord key files (#405047) 2025-05-12 08:40:16 +02:00
Leona Maroni
3724b37770
nixos/archtika: remove module and package (#406192) 2025-05-12 08:09:23 +02:00