0
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-07-14 06:00:33 +03:00
Commit graph

31895 commits

Author SHA1 Message Date
Winter
ee6517a915 Revert "nixos/polkit: guard static gid for polkituser behind state version"
This reverts commit 2265160fc0 and
e56db577a1.

Ideally, we shouldn't cause friction for users that bump `stateVersion`,
and I'd consider having to switch and/or manually hardcode a UID/GID
to supress the warning friction. I think it'd be more beneficial to, in
this rare case of an ID being missed, just let it be until more
discussion happens surrounding this overall issue.

See https://github.com/NixOS/nixpkgs/pull/217785 for more context.
2023-02-25 22:32:16 -05:00
Winter
15f1369b95 Revert "nixos/systemd-coredump: guard static gid for systemd-coredump behind state version"
This reverts commits f5483464d5 and
6b9583e5e1.

Ideally, we shouldn't cause friction for users that bump `stateVersion`,
and I'd consider having to switch and/or manually hardcode a UID/GID
to supress the warning friction. I think it'd be more beneficial to, in
this rare case of an ID being missed, just let it be until more
discussion happens surrounding this overall issue.

See https://github.com/NixOS/nixpkgs/pull/217785 for more context.
2023-02-25 22:31:56 -05:00
Anselm Schüler
9769e90233 lib/options: Add more options to mkPackageOption 2023-02-26 03:00:22 +01:00
Nick Cao
e0bf055d99
Merge pull request #217785 from NickCao/ugid
nixos/{polkit,systemd-coredump}: guard static gid behind state version
2023-02-26 09:44:56 +08:00
Lily Foster
c56e5ef801 nixos/users-groups: update option description to clarify initial* option precedence 2023-02-25 14:27:35 -05:00
Lily Foster
5508000ddf nixos/tests/shadow: ensure hashedPassword takes precedence over initialHashedPassword 2023-02-25 14:27:35 -05:00
Lily Foster
bfa0bff644 nixos/update-users-groups: let hashedPassword take precedence over initialHashedPassword
Without this change, users that have both `initialHashedPassword` and
`hashedPassword` set will have `initialHashedPassword` take precedence,
but only for the first time `/etc/passwd` is generated. After that,
`hashedPassword` takes precedence. This is surprising behavior as it
would generally be expected for `hashedPassword` to win if both are set.

This wouldn't be a noticeable problem (and an assert could just be made
instead) if the users-groups module did not default the
`root.intialHashedPassword` value to `!`, to prevent login by default.
That means that users who set `root.hashedPassword` and use an ephemeral
rootfs (i.e. `/etc/passwd` is created every boot) are not able to log in
to the root account by default, unless they switch to a new generation
during the same boot (i.e. `/etc/passwd` already exists and
`hashedPassword` is used instead of `initialHashedPassword`) or they set
`root.initialHashedPassword = null` (which is unintuitive and seems
redundant).
2023-02-25 14:27:35 -05:00
pennae
5dce130d1c nixos/tests/unifi: inherit allowUnfree into test node
mongodb is unfree, so the test won't run without this. we already allow
unfree to grab the unifi packages, so it's not even a big change.
2023-02-25 19:12:08 +01:00
Florian Klink
4ed9534f12
Merge pull request #217942 from lilyinstarlight/fix/nixos-test-systemd-initrd-shutdown
nixos/tests/systemd-shutdown: ensure systemd-initrd variant actually enables it
2023-02-25 19:02:53 +01:00
Benjamin Asbach
546f356db6 remove myself as maintainer for now as I switched to another distro 2023-02-25 18:56:02 +01:00
Nick Cao
eb03dde70d
Merge pull request #217890 from IndeedNotJames/nixos-tests-gitea
nixos/tests/gitea: open up test for forgejo
2023-02-25 09:55:43 +08:00
superherointj
371c7b8239
Merge pull request #217718 from Kiskae/nvidia/unbreak-6.2
linuxPackages_6_2.nvidia_x11: disable ibt
2023-02-24 17:46:26 -03:00
Sandro
83b8193be9
Merge pull request #201780 from helsinki-systems/init/nextcloud-notify-push
nextcloud-notify-push: init at 0.5.0
2023-02-24 12:10:02 +01:00
IndeedNotJames
1b304e1dbc
forgejo: use existing nixos/tests/gitea as test
forgejo is a soft-fork of gitea and gitea's existing tests work great
with forgejo.
At least for now, as this could change, though somewhat unlikely.
2023-02-24 02:59:30 +01:00
IndeedNotJames
889eb7a315
nixos/tests/gitea: add indeednotjames as maintainer
Mostly, because I (@IndeedNotJames) made a slight change to those tests and intend on
extending them in the future.
2023-02-24 02:59:30 +01:00
IndeedNotJames
7d05a6a910
nixos/tests/gitea: make gitea package configurable
This allows the same tests to be used for forgejo, a soft-fork of
gitea, which currently does not have any tests.
2023-02-24 02:59:30 +01:00
Lily Foster
308657daec
nixos/tests/systemd-shutdown: ensure systemd-initrd variant actually enables it
It looks like the systemd-initrd variant of the systemd-shutdown test
(systemd-initrd-shutdown) did not actually enable the systemd-initrd and
so was just evaluating to the same store path before this change.
2023-02-23 19:42:45 -05:00
sternenseemann
d1fa5dd85c nixos/doc: don't prescribe OS / manual name
In general the man pages do not care what OS and manual they are shipped
with, so they don't get to choose the names of them. We were tempted to
do so, as we had inconsistently chosen OS names for the mandoc and
man-db/groff implementations. Since this has been rectified since, we
can just drop this boilerplate from the man pages.
2023-02-23 20:53:04 +01:00
Naïm Favier
129b6f7812
Merge pull request #216504 from ncfavier/unbound-state-dir-writable
nixos/unbound: make stateDir writable
2023-02-23 14:23:53 +01:00
Bernardo Meurer
ef9030a3ba
Merge pull request #216430 from peterhoeg/m/qmk 2023-02-23 12:14:31 +00:00
Profpatsch
d316c28a30 modules/github-runner: Improve tokenFile docs
We’ve been having trouble figuring out which kind of token to use and
why our setup would break every few system updates.

This should clarify which options there are, and which ones lead to
better results.

Ideally there would be a manual section that has a step-by-step guide
on how to set up the github runner, with screenshots and everything.
2023-02-23 12:37:30 +01:00
Nick Cao
f5483464d5
nixos/systemd-coredump: guard static gid for systemd-coredump behind state version 2023-02-23 17:07:50 +08:00
Nick Cao
2265160fc0
nixos/polkit: guard static gid for polkituser behind state version 2023-02-23 17:07:49 +08:00
Weijia Wang
b65d2ea436
Merge pull request #192672 from amjoseph-nixpkgs/pr/nixos/sd/powerpc64le
enable NixOS installer for powerpc64le
2023-02-23 07:09:46 +02:00
Adam Joseph
f99e8bafe6 nixos/installer: add sd-image-powerpc64le.nix
This builds on top of nixpkgs mainline 00d8347180
with the following two PRs cherry-picked:

- https://github.com/NixOS/nixpkgs/pull/192670
- https://github.com/NixOS/nixpkgs/pull/192668

using the following command:

```
nix build -f nixos -L \
  -I nixos-config=nixos/modules/installer/sd-card/sd-image-powerpc64le.nix \
  config.system.build.sdImage
```

I was able to successfully boot the image, although it boots to a login prompt
rather than a shell, and won't accept the empty password for `root`.  I guess
I'll have to figure out why that is.

To boot the image: `zstd`-decompress the it, mount it, and use `kexec`:

```
cd boot/nixos
kexec -l \
  *-vmlinux \
  --initrd *-initrd \
  --dt-no-old-root \
  --command-line="$(grep APPEND ../extlinux/extlinux.conf | sed 's_^ *APPEND *__')"
```

The machine I used for testing has only one storage device which is completely
allocated to LVM.  It appears that the NixOS ISO loader doesn't look for
partition tables within LVM volumes.  To work aroundn this, I had to extract the
`ext4` image within the partition table within the `sd-card` image and put that
in its own LVM volume.  This likely won't be an obstacle for users who write the
image to a USB stick or similar.
2023-02-23 06:18:52 +02:00
Robert Schütz
89c8ef30a6 nixos/imaginary: bind to localhost by default 2023-02-22 17:37:36 -08:00
Henri Menke
64be5cc145
nixos/alps: fix embarrasing typo 2023-02-22 20:41:17 +01:00
Kiskae
d120c53077 linuxPackages_6_2.nvidia_x11: disable ibt 2023-02-22 18:08:41 +01:00
D Anzorge
bf02778b76 nixos/manual: fix typos in install instructions 2023-02-22 15:40:33 +01:00
K900
8a678a16f8
Merge pull request #217578 from eduarrrd/pam
PAM service fixups for plasma5 and sddm
2023-02-22 16:30:02 +03:00
ajs124
67a6170dc9
Merge pull request #216748 from winterqt/drop-keepassx
keepassx{,2}: drop
2023-02-22 13:05:53 +01:00
Florian Klink
91a20ba38e
Merge pull request #214811 from flokli/google-oslogin-fix-test
nixosTests.google-oslogin: fix tests, provide group mock endpoint
2023-02-22 11:38:40 +01:00
Nick Cao
d377d9bc2e
Merge pull request #216785 from 1sixth/set-polkituser-gid
nixos/polkit: set static gid for polkituser
2023-02-22 18:14:40 +08:00
Winter
1301a1a997 keepassx{,2}: drop
Upstream has officially abandoned the project as of 2021 [0], there's been
no release since 2016, it uses the EoL Qt 4, and alternatives like
KeePassXC exist.

Also move KeePassXC to its own directory -- it doesn't make sense to
have it in KeePassX's folder anymore.

[0]: https://www.keepassx.org/index.html%3Fp=636.html
2023-02-21 22:40:39 -05:00
1sixth
e56db577a1
nixos/polkit: set static gid for polkituser
polkituser needs a group since https://github.com/NixOS/nixpkgs/pull/130522.
2023-02-22 08:46:55 +08:00
Nick Cao
203302b8a6
Merge pull request #217584 from Luflosi/fix-mautrix-facebook-typo
nixos/mautrix-facebook: fix copy&paste error
2023-02-22 08:41:57 +08:00
zowoq
07b8c65c77 nixos/tests/podman: add test for rootless port forwarding 2023-02-22 10:16:58 +10:00
zowoq
9ab047538f nixos/tests/podman: refactor dns test and fix indentation 2023-02-22 10:16:58 +10:00
zowoq
b53ab7f158 nixos/tests/podman: split podman into rootful/rootless 2023-02-22 10:16:58 +10:00
Luflosi
e5ffc94ea9
nixos/mautrix-facebook: fix copy&paste error
Closes https://github.com/NixOS/nixpkgs/issues/166312.
2023-02-22 00:03:19 +01:00
Sandro
5b7d323435
Merge pull request #216909 from emilytrau/tailscale-tweaks 2023-02-21 23:21:09 +01:00
Eduard Bachmakov
45a6488f9c nixos/sddm + nixos/plasma5: switch PAM service to login.
GDM and LightDM are already using this approach. It also allows us to
enable Kwallet integration more globally without generating stray PAM
services.

The default configuration of login service includes both options sddm
was setting explicitly.
2023-02-21 22:48:09 +01:00
Eduard Bachmakov
2ca5a88f8e nixos/plasma5: remove non-existant/unused PAM service configs.
This removes two unused service configs from /etc/pam.d/ and, more
importantly, reduces confusion.

* kdm no longer exists in nixpkgs
* `pam.d/gdm` is not used by gdm
* `pam.d/lightdm` IS used by lightdm but hardcoded using .text rather
  than attrset+template.
2023-02-21 22:28:32 +01:00
pennae
417dd2ad16 nixos-render-docs: add options asciidoc converter
same reasoning as for the earlier commonmark converter.
2023-02-21 18:19:00 +01:00
pennae
4d3aef762f nixos-render-docs: add options commonmark converter
the old method of pasting parts of options.json into a markdown document
and hoping for the best no longer works now that options.json contains
more than just docbook. given the infrastructure we have now we can
actually render options.md properly, so we may as well do that.
2023-02-21 18:19:00 +01:00
Dominic Shelton
38593bc3c0 nixos/flipperzero: init 2023-02-21 17:45:14 +01:00
ajs124
bdb0566f8b nixos/nextcloud-notify_push: use lib.genAttrs 2023-02-21 15:53:27 +01:00
ajs124
6c24a28ea6 nixos/nextcloud-notify_push: add some restart config to the service 2023-02-21 15:05:17 +01:00
ajs124
671bd1ef7a nixos/nextcloud-notify_push: add database options 2023-02-21 15:05:16 +01:00
ajs124
8a5596aded nixosTests.nextcloud.with-postgresql-and-redis*: also test notify_push 2023-02-21 15:05:16 +01:00