3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

11572 commits

Author SHA1 Message Date
Alyssa Ross b898e958da
Merge remote-tracking branch 'nixpkgs/master' into staging-next
Conflicts:
	pkgs/os-specific/linux/libfabric/default.nix
	pkgs/tools/filesystems/btrfs-progs/default.nix
2021-09-22 10:07:27 +00:00
rnhmjoj 08cd8667ee
nixos: filalex77 -> Br1ght0ne
The maintainers has changed username in 512c3c0a.
2021-09-22 11:20:30 +02:00
rnhmjoj 88b3c29cf1
nixos: heimdalFull -> heimdal
The package has been renamed in 2018-05-01.
2021-09-22 11:20:30 +02:00
rnhmjoj 3f10924949
nixos/flannel: pkgs.etcdctl -> pkgs.etcd
The package has been renamed in 2018-04-25.
2021-09-22 11:20:30 +02:00
rnhmjoj 56ad0a49c8
nixos/dnscrypt-wrapper: fix nogroup
The group was actually there but I didn't add it by mistake.
This fixes the evaluation after for #133166.
2021-09-22 11:20:24 +02:00
Ryan Mulligan 6a9003f316 nixos/discourse: add discourse.admin.skipCreate option 2021-09-21 16:45:59 -07:00
Jörg Thalheim 5c34515b99
Merge pull request #138544 from Izorkin/fix-netdata
nixos/netdata: fix working with disabled ipmi plugin
2021-09-22 00:43:58 +01:00
github-actions[bot] 611b805c53
Merge master into staging-next 2021-09-21 18:01:16 +00:00
embr 023239912c nixos/mastodon: Add configurable web- and streaming concurrency
Might as well do this while I'm at it.
2021-09-21 16:35:17 +02:00
embr 8c1e6a8598 nixos/mastodon: Fix sidekiq's DB_POOL, add configurable concurrency
The `services.mastodon` module currently hardcodes sidekiq's concurrency
to 25, but doesn't set a DB pool size, which defaults to 5 or the number
of configured web threads.

(This behaviour is very strange, and arguably a mastodon bug.)

This also makes sidekiq's concurrency configurable, because 25 is a tad
high for the hardware I'm running it on.
2021-09-21 16:35:17 +02:00
github-actions[bot] fd3d37414d
Merge master into staging-next 2021-09-21 12:01:29 +00:00
Sandro e80237d8f4
Merge pull request #138609 from trofi/fix-smokeping
nixos/smokeping: drop dangling fping6 suid swapper
2021-09-21 13:44:54 +02:00
Michele Guerini Rocco 806e2b3643
Merge pull request #138748 from dschrempf/localtimed_nogroup
nixos/localtimed: nogroup fix
2021-09-21 13:35:30 +02:00
Souvik Sen 2f669293bf prometheus-fastly-exporter: init at v6.1.0 2021-09-21 04:05:18 -04:00
github-actions[bot] fa2601f3b2
Merge master into staging-next 2021-09-21 06:01:04 +00:00
Artturi 3b2440afd0
Merge pull request #100120 from unode/cpupower-gui
linuxPackages.cpupower-gui: init at 1.0.0
2021-09-21 03:37:10 +03:00
Dominik Schrempf fade6648c7
nixos/localtimed: nogroup fix 2021-09-20 22:16:09 +02:00
github-actions[bot] ecf5e75910
Merge master into staging-next 2021-09-20 18:01:12 +00:00
Michele Guerini Rocco 2fcef20cb1
Merge pull request #138600 from austinbutler/tpm2-tss-group
nixos/tpm2: define group, fix after #133166
2021-09-20 18:34:39 +02:00
Guillaume Girol f50fc9e7b2
Merge pull request #138582 from DarkDNA/greetd-nonogroup
nixos/greetd: Fix for nogroup removal.
2021-09-20 16:30:05 +00:00
davidak d64c54199d
Merge pull request #138599 from bobby285271/pantheon-manual
nixos/panthoen: mention appcenter changes in manual
2021-09-20 18:10:29 +02:00
github-actions[bot] 9e5021eef4
Merge master into staging-next 2021-09-20 12:01:15 +00:00
happysalada bdd04deff5 meilisearch: module cleanup 2021-09-20 16:12:29 +09:00
happysalada 6903737a8c meilisearch: nixpkgs-fmt 2021-09-20 16:12:29 +09:00
Oleksii Filonenko 811fe35a66 nixos/meilisearch: init
Reviewed-by: Aaron Andersen <aanderse@users.noreply.github.com>
(cherry picked from commit 5844ea85c3)
2021-09-20 16:12:29 +09:00
Sergei Trofimovich 9000350994 nixos/smokeping: drop dangling fping6 suid swapper
After recent change `services.smokeping.enable = true;` system
started failing the build as:

```
nixpkgs-master $ nix build --no-link -f nixos system --keep-going
...
Checking that Nix store paths of all wrapped programs exist... FAIL
The path /nix/store/kr2sr80g9ny74im6m6dyh9v44hnzm261-fping-5.0/bin/fping6 does not exist!
Please, check the value of `security.wrappers."fping6".source`.
```

`fping` does not provide `fping6` binary for a while. Let's just remove it.

Closes: https://github.com/NixOS/nixpkgs/issues/138581
2021-09-20 07:57:56 +01:00
github-actions[bot] f666c4d10f
Merge master into staging-next 2021-09-20 06:01:17 +00:00
happysalada b51e813153 elasticsearch: support version 6 2021-09-20 14:31:02 +09:00
Bobby Rong 2610f6e0df
nixos/panthoen: mention appcenter changes in manual 2021-09-20 10:06:22 +08:00
Amanda Cameron bd28ff08d3 nixos/greetd: Fix for nogroup removal. 2021-09-19 17:37:27 -04:00
Austin Butler b88b46b830 nixos/tcsd: make group uid dynamic 2021-09-19 12:42:46 -07:00
github-actions[bot] 78ca5a3e45
Merge master into staging-next 2021-09-19 18:01:13 +00:00
Guillaume Girol 07d82812bc
Merge pull request #138441 from symphorien/nonogroup-fixes-2
Fixes after #133166
2021-09-19 17:15:02 +00:00
Alyssa Ross e2bb7997c4
Merge remote-tracking branch 'nixpkgs/master' into staging-next
Conflicts:
	nixos/doc/manual/release-notes/rl-2111.section.md
2021-09-19 17:08:00 +00:00
Izorkin 1e54f84012
nixos/netdata: fix working with disabled ipmi plugin 2021-09-19 19:15:49 +03:00
Aaron Andersen 559449530f
Merge pull request #132319 from onny/opensnitch
nixos/opensnitch: Add module for opensnitch
2021-09-19 11:31:21 -04:00
Michele Guerini Rocco 108986ab71
Merge pull request #138515 from rnhmjoj/fix-physlock
nixos/physlock: fix broken wrapper
2021-09-19 17:06:38 +02:00
rnhmjoj 64f5d681d9
nixos/physlock: fix broken wrapper
- `user` doesn't exist -> `owner`
- set `setuid,group` as well (no longer optional)
2021-09-19 11:53:41 +02:00
davidak dfa2dd95c2
Merge pull request #138434 from bobby285271/pantheon-team
treewide: switch from pantheon.maintainers to lib.teams.pantheon
2021-09-19 02:58:11 +02:00
Michele Guerini Rocco 1cf01b5215
Merge pull request #138207 from rnhmjoj/layouts
nixos/extra-layouts: avoid all rebuilds
2021-09-19 01:10:55 +02:00
Guillaume Girol ceb2e6667b
Merge pull request #126289 from rnhmjoj/wrappers
nixos/security/wrappers: make well-typed
2021-09-18 15:28:49 +00:00
Bobby Rong 0fd8cc3908
treewide: switch from pantheon.maintainers to lib.teams.pantheon 2021-09-18 23:07:00 +08:00
Jonas Heinrich 0dcac759f2 nixos/dokuwiki: Add support for Caddy web server 2021-09-18 23:09:21 +09:00
Raphael Megzari 62468d6ff7
Merge branch 'master' into staging-next 2021-09-18 22:46:18 +09:00
Guillaume Girol af5ba65b9f nixos/nntp-proxy: define group, fix after #133166 2021-09-18 14:42:08 +02:00
Guillaume Girol fa3664a176 nixos/logcheck: define group, fix after #133166 2021-09-18 14:42:08 +02:00
Guillaume Girol cd2b24c306 nixos/heapster: define group, fix after #133166 2021-09-18 14:42:08 +02:00
Guillaume Girol 9e94e48b94 nixos/gammu-smsd: define group, fix after #133166 2021-09-18 14:42:08 +02:00
Guillaume Girol ca2db671ba nixos/cgminer: define group, fix eval after #133166 2021-09-18 14:42:08 +02:00
Guillaume Girol 3e9520f414 nixos/cgminer: fix type of services.cgminer.config option 2021-09-18 14:42:08 +02:00
Guillaume Girol 8c2e6705b3 nixos/gpsd: define group, fix after #133166 2021-09-18 14:42:08 +02:00
Guillaume Girol 615db90f3d nixos/openntpd, nixos/ntp: define group, fix after #133166 2021-09-18 14:42:08 +02:00
Guillaume Girol 88b4ba2169 nixos/unifi: define group, fix after #133166 2021-09-18 14:42:08 +02:00
github-actions[bot] 7da057ad4e
Merge master into staging-next 2021-09-18 12:01:25 +00:00
Guillaume Girol 8ba5f8115c nixos/zope2: define group
untested as the module is broken (attribute 'modules' missing)
2021-09-18 12:00:00 +00:00
Guillaume Girol 23d14d89b8 nixos/tvheadend: define group, fix eval after #133166 2021-09-18 12:00:00 +00:00
Guillaume Girol fd04a872bc nixos/toxvpn: define group, fix eval after #133166 2021-09-18 12:00:00 +00:00
Guillaume Girol d09ab77588 nixos/shout: define group, fix eval after #133166 2021-09-18 12:00:00 +00:00
Guillaume Girol feeca7dd55 nixos/rippled: define group, fix eval after #133166 2021-09-18 12:00:00 +00:00
Guillaume Girol a654d779fe nixos/ripple-data-api: define group
required after #133166
untested, the module is broken by the removal of couchdb
2021-09-18 12:00:00 +00:00
Guillaume Girol 6cf8b27fd6 nixos/rdnssd: define group; fix after #133166 2021-09-18 12:00:00 +00:00
Bobby Rong 4998805947
nixos/pantheon: prefer pantheon.epiphany 2021-09-18 19:33:41 +08:00
Bobby Rong dc19457a80
nixos/pantheon: remove lightlocker
screen locker has been embedded in the compositor, see github.com/elementary/gala/pull/809
2021-09-18 19:33:41 +08:00
Bobby Rong 158181403a
nixos/pantheon: enable touchegg by default 2021-09-18 19:33:41 +08:00
Bobby Rong b420199b87
nixos/pantheon: enable fwupd by default
this is needed in switchboard-plug-about
2021-09-18 19:33:41 +08:00
Bobby Rong 3f3502ca93
nixos/pantheon: update excludePackages example in docs 2021-09-18 19:33:40 +08:00
Bobby Rong 760f7e57e4
nixos/pantheon: install elementary-mail by default 2021-09-18 19:33:40 +08:00
Bobby Rong 0366acbcd5
nixos/pantheon: add inter and open-dyslexic as preinstalled font 2021-09-18 19:33:40 +08:00
Bobby Rong 2478c8bf01
nixos/touchegg: init 2021-09-18 19:33:40 +08:00
Bobby Rong de73ad2567
pantheon.elementary-files: 4.5.0 -> 6.0.2 2021-09-18 19:33:38 +08:00
Bobby Rong 91073bc810
pantheon.elementary-screenshot: 1.7.1 -> 6.0.0
renamed from pantheon.elementary-screenshot-tool
2021-09-18 19:33:38 +08:00
Bobby Rong 7973714304
pantheon.elementary-dpms-helper: drop package 2021-09-18 19:33:36 +08:00
Bobby Rong 75473c2d70
gnome.gnome-settings-daemon338: init at 3.38.2
light-locker is no longer used in Pantheon 6, we will try using the upstream gnome-settings-daemon
2021-09-18 19:33:36 +08:00
Aaron Andersen 4ec195a9c1
Merge pull request #137429 from illustris/spark3
Spark: init module
2021-09-18 07:28:19 -04:00
github-actions[bot] c4fd2a8f99
Merge master into staging-next 2021-09-18 00:01:33 +00:00
illustris 71d15cf816 nixos/spark: init module 2021-09-17 22:34:47 +05:30
Massimo Zaniboni a3d011eebc
nixos-docs: improved the installation instructions of Pleroma
- Detailed initial config generation process.
- Detailed Nginx Configuration.
- Detailed private/public conf split.

docs: Improved documentation of Pleroma service

Secrets are only in the private file, and in a draft format for avoiding GitHub
complaints.

Fixed Nginx configuration.

docs: Improved the Nginx reverse proxy settings of Pleroma service
2021-09-17 15:31:11 +02:00
Luke Granger-Brown 65b8408ce8 Merge remote-tracking branch 'upstream/staging' into staging-next 2021-09-17 12:18:44 +00:00
Jonas Heinrich 38431cf21c nixos/wordpress: caddy support 2021-09-17 19:12:21 +09:00
github-actions[bot] 00e2bbfcff
Merge staging-next into staging 2021-09-17 06:02:03 +00:00
figsoda 590bd1db94
Merge pull request #137336 from dsg22/feature-libinput-expose-transformatrionmatrix-option
libinput: Add transformation matrix option
2021-09-16 20:17:52 -04:00
github-actions[bot] 2ad7b248e6
Merge staging-next into staging 2021-09-17 00:02:15 +00:00
rnhmjoj e4da1edf8b
nixos/extra-layouts: avoid all rebuilds
Just setting the XKB_CONFIG_ROOT should be enough, so we don't need to
rebuild the xserver, xkbcomp and other packages anymore.
However, the variable has to be passed explicitely to scripts running at
build time: in particular to xkbvalidate and xkb-console-keymap.
2021-09-17 01:48:46 +02:00
Jan Tojnar 2006672bf0
Merge pull request #138160 from jansol/master
pipewire: 0.3.35 -> 0.3.36
2021-09-16 21:17:59 +02:00
Sandro 5795c33bdd
Merge pull request #138051 from ehmry/tox-bootstrapd 2021-09-16 20:02:02 +02:00
Jan Solanti 996b51ee85 pipewire: 0.3.35 -> 0.3.36 2021-09-16 18:52:08 +03:00
github-actions[bot] 85bd312fb6
Merge staging-next into staging 2021-09-16 12:02:04 +00:00
Jan Tojnar 79c444b5bd
Merge pull request #137533 from jansol/master
pipewire: 0.3.34 -> 0.3.35
2021-09-16 11:44:47 +02:00
github-actions[bot] 52ebc93c96
Merge staging-next into staging 2021-09-16 06:01:54 +00:00
Martin Weinelt cf75539971 nixos/home-assistant: allow serial access for usb discovery and zwave_js
via https://www.home-assistant.io/blog/2021/09/01/release-20219/#usb-discovery
and https://www.home-assistant.io/integrations/usb/
2021-09-16 04:22:32 +02:00
Emery Hemingway 0721aa49a3 nixos/tox-bootstrapd: use DynamicUser 2021-09-15 22:01:56 +02:00
github-actions[bot] 24a34e5706
Merge staging-next into staging 2021-09-15 12:01:34 +00:00
Lara fe034d33be nixos/gitlab: Enable roation of log files
This commit enables a logrotate service for gitlab using the default
values from omnibus. [1]

[1] https://gitlab.com/gitlab-org/omnibus-gitlab/-/blob/master/files/gitlab-cookbooks/gitlab/attributes/default.rb#L754

Resolves #136723
2021-09-15 09:57:18 +02:00
Michele Guerini Rocco 0e848f7b12
Merge pull request #134302 from rnhmjoj/gdm-no-udev-settle
nixos/gdm: remove udev-settle dependency
2021-09-15 09:52:10 +02:00
github-actions[bot] 0f78d9c4b7
Merge staging-next into staging 2021-09-15 00:02:12 +00:00
github-actions[bot] 728f30ca03
Merge master into staging-next 2021-09-15 00:01:33 +00:00
github-actions[bot] 95f24a8a57
Merge staging-next into staging 2021-09-14 18:01:40 +00:00
github-actions[bot] 91c89490cc
Merge master into staging-next 2021-09-14 18:01:05 +00:00
Jonas Heinrich 94f775024e Opensnitch: Add module 2021-09-14 18:51:23 +02:00
Bobby Rong 39261adc92
Merge pull request #135626 from delroth/tor-netlink
nixos/tor: allow AF_NETLINK address family
2021-09-14 22:57:34 +08:00
Guillaume Girol eb328077c3 nixos/vsftpd: allocate group; fix fallout of #133166 2021-09-14 12:00:00 +00:00
github-actions[bot] 79a728d821
Merge staging-next into staging 2021-09-14 00:01:57 +00:00
github-actions[bot] 1db0c42d5a
Merge master into staging-next 2021-09-14 00:01:23 +00:00
Guillaume Girol 3592034595
Merge pull request #133166 from symphorien/nonogroup
Don't default to nogroup for the primary group of users.
2021-09-13 18:29:21 +00:00
github-actions[bot] 04e48fbe4f
Merge staging-next into staging 2021-09-13 18:01:51 +00:00
Jonathan Ringer ca1731455d
Merge remote-tracking branch 'origin/master' into staging-next 2021-09-13 08:09:52 -07:00
talyz 6496902fb2
nixos/parsedmarc: Add manual entry and release note 2021-09-13 13:57:17 +02:00
talyz 98d9617705
nixos/parsedmarc: Add NixOS module 2021-09-13 13:57:06 +02:00
talyz 3a1e1f0624
nixos/elasticsearch: Wait for elasticsearch to start up properly
Other services that depend on elasticsearch should be started after
it, but since the versions we're packaging have to run as
"Type=simple", they're started as soon as the elasticsearch binary has
been executed, likely winning the race against it.

This makes sure elasticsearch is up and running, responding to a
simple query, before dependents are started.
2021-09-13 13:57:01 +02:00
rnhmjoj fedd7cd690
nixos: explicitely set security.wrappers ownership
This is slightly more verbose and inconvenient, but it forces you
to think about what the wrapper ownership and permissions will be.
2021-09-13 13:48:13 +02:00
rnhmjoj 8f76a6eefc
nixos: add implict security.wrappers options
This is to keep the same permissions/setuid/setgid as before the change
in security.wrappers defaults.
2021-09-13 13:48:13 +02:00
rnhmjoj 41a498578e
nixos/mail: reuse security.wrappers type 2021-09-13 13:48:13 +02:00
Florian Klink 8019c95b55
Merge pull request #131618 from andir/systemdv249
systemd v249
2021-09-13 09:39:49 +02:00
github-actions[bot] ac962ee61a
Merge master into staging-next 2021-09-13 00:01:41 +00:00
Sandro a79648dd7f
Merge pull request #136109 from john-consumable/master 2021-09-13 00:42:54 +02:00
Andreas Rammhold 64556974b6
systemd: 247.6 -> 249.4
This updates systemd to version v249.4 from version v247.6.

Besides the many new features that can be found in the upstream
repository they also introduced a bunch of cleanup which ended up
requiring a few more patches on our side.

a) 0022-core-Handle-lookup-paths-being-symlinks.patch:
  The way symlinked units were handled was changed in such that the last
  name of a unit file within one of the unit directories
  (/run/systemd/system, /etc/systemd/system, ...) is used as the name
  for the unit. Unfortunately that code didn't take into account that
  the unit directories themselves could already be symlinks and thus
  caused all our units to be recognized slightly different.

  There is an upstream PR for this new patch:
    https://github.com/systemd/systemd/pull/20479

b) The way the APIVFS is setup has been changed in such a way that we
   now always have /run. This required a few changes to the
   confinement tests which did assert that they didn't exist. Instead of
   adding another patch we can just adopt the upstream behavior. An
   empty /run doesn't seem harmful.

   As part of this work I refactored the confinement test just a little
   bit to allow better debugging of test failures. Previously it would
   just fail at some point and it wasn't obvious which of the many
   commands failed or what the unexpected string was. This should now be
   more obvious.

c) Again related to the confinement tests the way a file was tested for
   being accessible was optimized. Previously systemd would in some
   situations open a file twice during that check. This was reduced to
   one operation but required the procfs to be mounted in a units
   namespace.

   An upstream bug was filed and fixed. We are now carrying the
   essential patch to fix that issue until it is backported to a new
   release (likely only version 250). The good part about this story is
   that upstream systemd now has a test case that looks very similar to
   one of our confinement tests. Hopefully that will lead to less
   friction in the long run.

   https://github.com/systemd/systemd/issues/20514
   https://github.com/systemd/systemd/pull/20515

d) Previously we could grep for dlopen( somewhat reliably but now
   upstream started using a wrapper around dlopen that is most of the
   time used with linebreaks. This makes using grep not ergonomic
   anymore.

   With this bump we are grepping for anything that looks like a
   dynamic library name (in contrast to a dlopen(3) call) and replace
   those instead. That seems more robust. Time will tell if this holds.

   I tried using coccinelle to patch all those call sites using its
   tooling but unfornately it does stumble upon the _cleanup_
   annotations that are very common in the systemd code.

e) We now have some machinery for libbpf support in our systemd build.
   That being said it doesn't actually work as generating some skeletons
   doesn't work just yet. It fails with the below error message and is
   disabled by default (in both minimal and the regular build).

   > FAILED: src/core/bpf/socket_bind/socket-bind.skel.h
   > /build/source/tools/build-bpf-skel.py --clang_exec /nix/store/x1bi2mkapk1m0zq2g02nr018qyjkdn7a-clang-wrapper-12.0.1/bin/clang --llvm_strip_exec /nix/store/zm0kqan9qc77x219yihmmisi9g3sg8ns-llvm-12.0.1/bin/llvm-strip --bpftool_exec /nix/store/l6dg8jlbh8qnqa58mshh3d8r6999dk0p-bpftools-5.13.11/bin/bpftool --arch x86_64 ../src/core/bpf/socket_bind/socket-bind.bpf.c src/core/bpf/socket_bind/socket-bind.skel.h
   > libbpf: elf: socket_bind_bpf is not a valid eBPF object file
   > Error: failed to open BPF object file: BPF object format invalid
   > Traceback (most recent call last):
   >   File "/build/source/tools/build-bpf-skel.py", line 128, in <module>
   >     bpf_build(args)
   >   File "/build/source/tools/build-bpf-skel.py", line 92, in bpf_build
   >     gen_bpf_skeleton(bpftool_exec=args.bpftool_exec,
   >   File "/build/source/tools/build-bpf-skel.py", line 63, in gen_bpf_skeleton
   >     skel = subprocess.check_output(bpftool_args, universal_newlines=True)
   >   File "/nix/store/81lwy2hfqj4c1943b1x8a0qsivjhdhw9-python3-3.9.6/lib/python3.9/subprocess.py", line 424, in check_output
   >     return run(*popenargs, stdout=PIPE, timeout=timeout, check=True,
   >   File "/nix/store/81lwy2hfqj4c1943b1x8a0qsivjhdhw9-python3-3.9.6/lib/python3.9/subprocess.py", line 528, in run
   >     raise CalledProcessError(retcode, process.args,
   > subprocess.CalledProcessError: Command '['/nix/store/l6dg8jlbh8qnqa58mshh3d8r6999dk0p-bpftools-5.13.11/bin/bpftool', 'g', 's', '../src/core/bpf/socket_bind/socket-bind.bpf.o']' returned non-zero exit status 255.
   > [102/1457] Compiling C object src/journal/libjournal-core.a.p/journald-server.c.oapture output)put)ut)
   > ninja: build stopped: subcommand failed.

  f) We do now have support for TPM2 based disk encryption in our
     systemd build. The actual bits and pieces to make use of that are
     missing but there are various ongoing efforts in that direction.
     There is also the story about systemd in our initrd to enable this
     being used for root volumes. None of this will yet work out of the
     box but we can start improving on that front.

  g) FIDO2 support was added systemd and consequently we can now use
     that. Just with TPM2 there hasn't been any integration work with
     NixOS and instead this just adds that capability to work on that.

Co-Authored-By: Jörg Thalheim <joerg@thalheim.io>
2021-09-12 23:45:49 +02:00
Sandro e4b50b4821
Merge pull request #66415 from ToxicFrog/crossfire 2021-09-12 22:13:02 +02:00
Maximilian Bosch 364b5555ee
Merge pull request #137132 from Ma27/pi-sudo
nixos/privacyidea: use `sudo(8)` that's configured via the module
2021-09-12 20:09:49 +02:00
github-actions[bot] a13bf1828b
Merge master into staging-next 2021-09-12 18:01:21 +00:00
Maximilian Bosch 8b13843f4e
Merge pull request #135751 from zhaofengli/promtail-allow-positions-file
nixos/promtail: Allow write access to positions file if not in CacheDirectory
2021-09-12 18:17:25 +02:00
ajs124 119c9e1f70 nixos/rabbitmq: clean-up after f091420c1d 2021-09-12 16:32:36 +02:00
Jan Solanti f4fbb21176 pipewire: 0.3.34 -> 0.3.35 2021-09-12 16:33:50 +03:00
Guillaume Girol bc3bca822a nixos: define the primary group of users where needed 2021-09-12 14:59:30 +02:00
github-actions[bot] acd45cb351
Merge master into staging-next 2021-09-12 12:01:10 +00:00
Sandro e26b155274
Merge pull request #137444 from SuperSandro2000/wicd
treewide: yank wicd as it is abandoned
2021-09-12 12:56:10 +02:00
github-actions[bot] 45de5d0c9a
Merge master into staging-next 2021-09-12 06:01:00 +00:00
zowoq 07109dd495 nixos/kubernetes: add cni-plugin-flannel to kubelet.cni.packages
the flannel plugin was removed from `cni-plugins` in ee8ed2cd8d
2021-09-12 12:47:45 +10:00
John Soo a51ee771be nixos/datadog-agent: Update process collection binary. 2021-09-11 15:32:14 -07:00
Sandro Jäckel 781766e30c
treewide: yank wicd as it is abandoned 2021-09-11 23:46:52 +02:00
Davíð Steinn Geirsson 4598ff3bb8 nixos/libinput: Add transformation matrix option 2021-09-11 20:53:29 +00:00
github-actions[bot] c435b0e35f
Merge master into staging-next 2021-09-11 18:01:16 +00:00
Sandro 667711513d
Merge pull request #137039 from figsoda/sx-extra-layouts 2021-09-11 14:51:05 +02:00
figsoda 9c82ab55b1 nixos/xserver: fix extraLayouts with displayManager.sx.enable 2021-09-10 18:48:14 -04:00
Martin Weinelt d9341eafa2
Merge branch 'master' into staging-next 2021-09-10 15:04:01 +02:00
Kevin Cox a49a3d97ac
Merge pull request #137113 from kevincox/ipfs-profile-fix
nixos.ipfs: Fix startup after unclean shutdown.
2021-09-10 08:26:04 -04:00
github-actions[bot] 3f7ad651c7
Merge master into staging-next 2021-09-10 06:01:06 +00:00
Elis Hirwing eac6215607
Merge pull request #136460 from misuzu/sanoid-recursive-zfs
nixos/sanoid: allow zfs value for recursive
2021-09-10 07:13:12 +02:00
happysalada 6a51087bba ipfs: default to not listen on the local network 2021-09-10 09:39:55 +09:00
github-actions[bot] 912b8082df
Merge master into staging-next 2021-09-10 00:01:31 +00:00
Pavol Rusnak 60c852813a
Merge pull request #137214 from alyssais/exists
treewide: "does not exists" -> "does not exist"
2021-09-09 21:40:54 +02:00
Alyssa Ross c9ce275aa4
treewide: "does not exists" -> "does not exist"
I noticed this minor grammar mistake when running update.nix, and then
while grepping to find the source I noticed we had it a few times in
Nixpkgs.  Just as easy to fix treewide as it was to fix the one
occurrence I noticed.
2021-09-09 18:45:33 +00:00
Lassulus 2e04b29a17
Merge pull request #126247 from kmein/feature/spotifyd
spotifyd: generate TOML config via formats
2021-09-09 20:08:03 +02:00
Maximilian Bosch 69e75754d5
nixos/privacyidea: use sudo(8) that's configured via the module 2021-09-08 22:45:50 +02:00
Kevin Cox af354d2049
nixos.ipfs: Fix startup after unclean shutdown.
Fixes https://github.com/NixOS/nixpkgs/issues/135684
2021-09-08 12:17:22 -04:00
github-actions[bot] 5ed67a849a
Merge master into staging-next 2021-09-08 12:01:27 +00:00
Alexandre Iooss bbc51efb46 nixos/grafana: systemd unit hardening 2021-09-08 10:43:46 +02:00
github-actions[bot] fbefda3466
Merge master into staging-next 2021-09-07 12:01:13 +00:00
matthewcroughan 11aedaec1f nixos: nix.sshServe: add write option
Adds the ability to provide the --write flag in addition to the --serve flag via
a new option, services.sshServe.write.

A user can now share their system as a remote builder with friends easily as
follows:

{
  nix = {
    sshServe = {
      enable = true;
      write = true;
      keys = ["ssh-dss AAAAB3NzaC1k... alice@example.org"];
    };
  };
}

Co-authored-by: Raphael Megzari <raphael@megzari.com>
2021-09-07 18:10:55 +09:00
Michele Guerini Rocco a350fcd078
Merge pull request #134070 from malte-v/gnunet-public-tmpdir
nixos/gnunet: use public $TMPDIR
2021-09-07 09:30:15 +02:00
Vladimír Čunát 09f5763784
Merge branch 'master' into staging-next
Conflicts:
 - pkgs/development/python-modules/pathspec/default.nix
   The hashes are equivalent, so it's not a real conflict.
 - pkgs/top-level/static.nix
   I can't see a solution, deffered redoing this to the later PR:
   https://github.com/NixOS/nixpkgs/pull/136849
2021-09-07 08:43:26 +02:00