3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

26285 commits

Author SHA1 Message Date
Ben Wolsieffer 1ee3d9477b nixos/nixos-enter: fix resolv.conf error handling 2022-03-18 12:19:02 -04:00
Manuel Bärenz 2ac527530e nixosTests.keepassxc: Add regression test for #163482 2022-03-18 16:47:34 +01:00
pennae e8bfc4d4a8
Merge pull request #164367 from jpathy/patch-2
networking.greTunnels: support ip6gre*
2022-03-18 15:43:03 +00:00
Artturi 7958394022
Merge pull request #164624 from mart-w/fix/nixos/paperless-ng-fix-164615-consumation-bug
nixos/paperless-ng: fix #164615
2022-03-18 13:30:08 +02:00
pennae 201a32a1a7 unifi: unifi6 -> unifi7 2022-03-18 10:28:53 +01:00
Jamie McClymont 842e547c17 nixos/tests: add integration tests for terminal emulators 2022-03-18 19:49:13 +13:00
j-k c12cec8bc3
_7zz: correct license (#163999)
* _7zz: correct license and remove p7zip dependency

The code under Compress/Rar* is licensed under a specific unRAR license
Also Compress/LzfseDecoder.cpp is covered by BSD3

The unRAR code is removed from the `.tar.xz` since the license posits you
agree or remove the code from your hard drive
This adds some complexity to updating 7zz so there is also an update
script

Meta has been updated and tweaked

Source is now downloaded from sourceforge in the `.tar.xz` version to
avoid depending on p7zip

* _7zz: add notice of the license updates and optional unRAR licenced code
2022-03-18 12:47:19 +08:00
Naïm Favier ca8c877f8c
nixos/tests: fix some evaluation errors
Fixes errors caught by "nixos/testing: restrict arguments to makeTest" as
well as some unrelated errors and warnings.
2022-03-18 02:44:11 +01:00
Naïm Favier 79a234567c
nixos/testing: restrict arguments to makeTest
Disallow passing arbitrary arguments to makeTest since they are not
used; this can help catch mistakes.
2022-03-18 02:44:11 +01:00
Silvan Mosberger 839b9b8ddc
Merge pull request #77622 from R-VdP/nixos-upgrade-reboot-window
NixOS/auto-upgrade: offer the possibility to define a reboot window during which the system may be automatically rebooted
2022-03-17 23:50:53 +01:00
Bob van der Linden 753b911708
nixos: systemd-tmpfiles: use cfg shorthand 2022-03-17 23:16:38 +01:00
Bob van der Linden 38d043de9c
nixos: systemd: split off systemd-tmpfiles into separate module 2022-03-17 23:16:37 +01:00
Bob van der Linden 0e665d1815
nixos: systemd-user: allow additional upstream user units
Currently it is only possible to add upstream _system_ units. The option
systemd.additionalUpstreamSystemUnits can be used for this.

However, this was not yet possible for systemd.user. In a similar
fashion this was added to systemd-user.nix.

This is intended to have other modules add upstream units.
2022-03-17 23:16:37 +01:00
Bob van der Linden b6d50528dd
nixos: systemd-user: use cfg shorthand 2022-03-17 23:16:37 +01:00
Bob van der Linden 022b4209a3
nixos: systemd: split off systemd-user into separate module 2022-03-17 23:16:37 +01:00
Bob van der Linden cae8ef1232
nixos: systemd-coredump: use cfg shorthand 2022-03-17 23:16:30 +01:00
Bob van der Linden ccfcb78a50
nixos: systemd: split off coredump into separate module 2022-03-17 23:15:49 +01:00
Bob van der Linden 7adc8ecac3
nixos: systemd-journald: use cfg shorthand 2022-03-17 23:13:36 +01:00
Bob van der Linden fee1e24b3b
nixos: systemd: split off journald into separate module 2022-03-17 23:13:36 +01:00
Bob van der Linden e2cb8903da
nixos: systemd-logind: use cfg shorthand 2022-03-17 23:13:27 +01:00
Bob van der Linden c647002a94
nixos: systemd: split off logind into separate module 2022-03-17 23:12:00 +01:00
Bob van der Linden 0c94a512dd
nixos: systemd: avoid using "with systemdUtils.lib" 2022-03-17 21:52:54 +01:00
Bob van der Linden 3420dba80a
nixos: systemd: move systemd-nspawn to systemd/nspawn 2022-03-17 21:52:37 +01:00
Martin Wurm fd2215b20c nixos/paperless-ng: fix #164615
Add an exception to the `paperless-ng-server` service's
`SystemCallFilter` as the `mbind` syscall is needed when consuming a
document while having a classification model present.
2022-03-17 19:35:20 +01:00
Félix Baylac-Jacqué b205832efe nixos/pleroma: regenerate empty release cookie files
Since b9cfbcafdf, the lack of hexdump in
the closure lead to the generation of empty cookie files. This empty
cookie file is making pleroma to crash at startup now we correctly
read it.

We introduce a migration forcing these empty cookies to be
re-generated to something not empty.
2022-03-17 15:22:14 +01:00
Félix Baylac-Jacqué e7f6370701 nixosTests.pleroma: fix test, remove toot patch
It was originally impossible to login in toot without having an
interactive shell. I opened https://github.com/ihabunek/toot/pull/180
upstream to fix that and fetch this patch for this test.

The author decided to fix the issue using a slightly different
approach at a3eb5dca24

Because of this upstream fix, our custom patch does not apply anymore.
Using that stdin-based login upstream feature.
2022-03-17 15:22:14 +01:00
Félix Baylac-Jacqué 71d9048f72 nixos/pleroma: inject release cookie path to the pleroma package
We inject the release cookie path to the pleroma derivation in order
to wrap pleroma_ctl with it. Doing this allows us to remove the
systemd-injected RELEASE_COOKIE path, which was sadly
buggy (RELEASE_COOKIE should point to the *content* of the cookie, not
the file containing it).

We take advantage of this to factor out the cookie path.
2022-03-17 15:22:14 +01:00
jpathy 0a62de4cd5 networking.greTunnels: support ip6gre* 2022-03-17 17:59:36 +05:30
Luflosi 7867b9506b
nixos/doc/rl-22.05: add changelog entry for modprobe changes
Add a changelog entry for the changes in 3dc6fab5c9.
2022-03-17 12:56:04 +01:00
Luflosi 47b699fe6c
Revert "nixos/modprobe: add boot.initrd.extraModprobeConfig option"
This reverts commit 1c58cdbeed, since this change was made redundant by 3dc6fab5c9 and in https://github.com/NixOS/nixpkgs/pull/145013 we decided to revert this commit.
2022-03-17 12:56:02 +01:00
Robert Hensing 0395086d0c
Merge pull request #162271 from Infinisil/warn-no-type
Throw an error for options without a type
2022-03-16 22:58:45 +01:00
Pavol Rusnak 0fcf66c74a
Merge pull request #164268 from MrMebelMan/update/kratos
kratos: 0.8.0-alpha.3 -> 0.8.3-alpha.1.pre.0
2022-03-16 22:45:10 +01:00
Sandro 99f75e17d3
Merge pull request #164270 from alyssais/locate-pruneNames 2022-03-16 21:17:48 +01:00
Robert Hensing e98ae78636
Merge pull request #164317 from bobvanderlinden/pr-move-systemd-fns-lib
nixos: systemd: split off helper functions into systemd-lib
2022-03-16 21:05:12 +01:00
Maximilian Bosch 5226029af8
Merge pull request #164313 from Ma27/drop-nextcloud21
nextcloud21: remove
2022-03-16 17:59:53 +01:00
Artturi b734f40478
Merge pull request #154004 from illustris/hadoop 2022-03-16 14:05:56 +02:00
Alyssa Ross a65930ca21
nixos/locate: disable default findutils pruneNames
It doesn't make sense to have a default value for this that's
incompatible with the default locate implementation.  It means that
just doing services.locate.enable = true; generates a warning, even if
you don't care about pruning anything.  So only use the default prune
list if the locate implementation supports it (i.e., isn't findutils).
2022-03-16 11:06:38 +00:00
Alexander Bantyev 1e49b301b9
Merge pull request #164068 from cab404/master
os-release: preserve fields from being excessively quoted
2022-03-16 07:46:16 +03:00
Silvan Mosberger 47f2ee3d55
Merge pull request #160075 from ConnorBaker/spark_3_2_1
spark: init 3.2.1 and test on aarch64-linux
2022-03-16 02:13:03 +01:00
Ryan Mulligan 0ab73f9a3f
Merge pull request #162535 from astro/pacemaker
pacemaker: init
2022-03-15 16:06:56 -07:00
Luflosi 1b34039b5f
nixos/tor: fix services.tor.client.enable = false not working
If `services.tor.client.enable` is set to false (the default), the `SOCKSPort` option is not added to the torrc file but since Tor defaults to listening on port 9050 when the option is not specified, the tor client is not actually disabled. To fix this, simply set `SOCKSPort` to 0, which disables the client.
Use `mkForce` to prevent potentially two different `SOCKSPort` options in the torrc file, with one of them being 0 as this would cause Tor to fail to start. When `services.tor.client.enable` is set to false, this should always be disabled.
2022-03-15 23:39:02 +01:00
Bob van der Linden 9bc093b30a
nixos: systemd: split off helper functions into systemd-lib 2022-03-15 21:52:13 +01:00
Maximilian Bosch 15876a546c
nextcloud21: remove
EOLed by upstream in 2022-02[1].

[1] https://docs.nextcloud.com/server/23/admin_manual/release_schedule.html#older-versions
2022-03-15 21:26:46 +01:00
Jan Tojnar 0f94c5b151
Merge pull request #164105 from ncfavier/ibus
ibus: 1.5.24 -> 1.5.26
2022-03-15 21:24:52 +01:00
Sandro 0b88ca814f
Merge pull request #161818 from Luflosi/fix-tor-read-resolv.conf 2022-03-15 19:23:13 +01:00
Franz Pletz 018a959be7
Merge pull request #160750 from Izorkin/update-prosody 2022-03-15 19:07:15 +01:00
Luflosi 3c63da7cf8
nixos/tor: allow tor to read resolv.conf when using resolved
When `services.resolved.enable` is set to true, the file /etc/resolv.conf becomes a symlink to /etc/static/resolv.conf, which is a symlink to /run/systemd/resolve/stub-resolv.conf. Without this commit, tor does not have access to this file thanks to systemd confinement. This results in the following warning when tor starts:
```
[warn] Unable to stat resolver configuration in '/etc/resolv.conf': No such file or directory
[warn] Could not read your DNS config from '/etc/resolv.conf' - please investigate your DNS configuration. This is possibly a problem. Meanwhile, falling back to local DNS at 127.0.0.1.
```
To fix this, simply allow read-only access to the file when resolved is in use.
According to https://github.com/NixOS/nixpkgs/pull/161818#discussion_r824820462, the symlink may also point to /run/systemd/resolve/resolv.conf, so allow that as well.
2022-03-15 15:16:14 +01:00
Vladyslav Burzakovskyy df2327ee24 kratos: 0.8.0-alpha.3 -> 0.8.3-alpha.1.pre.0 2022-03-15 14:38:14 +01:00
Vladimir Serov 0c68e23f52
nixos/modules/version: remove unnecessary quoting
(In cases it is unnecessary)
2022-03-15 14:17:59 +03:00
Michele Guerini Rocco c0ede26162
Merge pull request #164050 from LunNova/lunnova/disable-lucida-bitmap-fonts
Remove ancient unfree bitmap fonts from fonts.defaultXFonts
2022-03-15 09:42:07 +01:00
Jonathan Ringer 54d6aee8f3 nixos/doc/rl-22.05: mention nvidia va-api additions 2022-03-14 22:35:11 -07:00
Jonathan Ringer 0326d67a58 nixos/nvidia: add vaapi support 2022-03-14 22:35:11 -07:00
Naïm Favier aaad72a37c
nixos/environment: add GTK paths to pathsToLink 2022-03-14 18:01:16 +01:00
davidak d2c95bb666
Merge pull request #163433 from JJJollyjim/bcachefs
bcachefs: unstable-2022-01-12 -> unstable-2022-03-09
2022-03-14 15:34:43 +01:00
Luke Granger-Brown 247a1809a4
Merge pull request #163431 from nazarewk/update-plantuml-server
plantuml-server 1.2021.12 -> 1.2022.2
2022-03-14 13:37:49 +00:00
Alexander Bantyev 8eb9d6c0d4
Merge pull request #163622 from ilya-fedin/mate-allow-remove-any-package
nixos/mate: allow remove any added package
2022-03-14 15:26:58 +03:00
Pascal VITOUX 045b819959 nixos/graylog: fix group creation
As described in #163571, the graylog group was not created by the
module.
2022-03-14 10:13:15 +01:00
Jamie McClymont 4ee9b84ec5 nixos/bcachefs: re-enable encryption in test 2022-03-14 21:49:24 +13:00
Janne Heß 7668896154
Merge pull request #164060 from ncfavier/fix-installBootLoader
nixos/switch-to-configuration: fix installBootLoader escaping
2022-03-14 09:21:27 +01:00
Maximilian Bosch 0c5586c2f2
Merge pull request #162254 from Ma27/init-dmarc-exporter
prometheus-dmarc-exporter: init at 0.5.1
2022-03-14 09:02:08 +01:00
Bobby Rong f6a48cd9fc
Merge pull request #163960 from bobby285271/pantheon
nixos/pantheon: enable xdg desktop integration
2022-03-14 09:23:42 +08:00
Naïm Favier 9bdd2f852c
nixos/switch-to-configuration: fix installBootLoader escaping
Use a quoted heredoc to inject installBootLoader safely into the script,
and restore the previous invocation of `system` with a single argument so
that shell commands keep working.
2022-03-14 02:12:52 +01:00
Luna Nova 5ac5bed4b4
nixos/fonts: Document removal of ancient bitmap fonts from default config 2022-03-13 15:43:32 -07:00
Luna Nova 95077158aa
nixos/fonts: Remove ancient bitmap fonts from defaultXFonts
See https://github.com/NixOS/nixpkgs/issues/160740
2022-03-13 15:37:48 -07:00
Sander van der Burg 43543a6bbc
Merge pull request #163716 from svanderburg/fixtomcat
nixos/tomcat: configure default group and fix broken default package …
2022-03-13 21:43:45 +01:00
pennae aa7b129708
Merge pull request #154113 from pennae/systemd-escaping
nixos: add functions and documentation for escaping systemd Exec* directives
2022-03-13 19:57:32 +00:00
Giulio De Pasquale b77494badb nixos/jellyfin: Disable PrivateDevices from hardening to allow GPU endpoints to be accessed 2022-03-13 17:01:10 +00:00
Janne Heß 3148b3d365
Merge pull request #163069 from helsinki-systems/feat/minor-stc-improvements
nixos/switch-to-configuration: Few minor/medium improvements
2022-03-13 17:50:36 +01:00
Luke Granger-Brown 5f81753d1b
Merge pull request #162252 from sternenseemann/systemd-boot-builder-fix-errors
sdboot-builder: fix crash in exception handling
2022-03-13 14:19:54 +00:00
Maëlys Bras de fer 529b09a729 sdboot-builder: fix crash in exception handling 2022-03-13 14:38:01 +01:00
Sander van der Burg 86fafe5f50 nixos/tomcat: add basic test case using the example app 2022-03-13 14:31:43 +01:00
Peter Hoeg d853dc52d8 nixos/squeezelite: add support for PulseAudio version 2022-03-13 21:08:52 +08:00
Sander van der Burg d12186a601 nixos/tomcat: configure default group and fix broken default package reference
Without this fix, evaluating a NixOS configuration with Tomcat enabled and the
default settings results in the following evaluation error:

Failed assertions:
- users.users.tomcat.group is unset. This used to default to
nogroup, but this is unsafe. For example you can create a group
for this user with:
users.users.tomcat.group = "tomcat";
users.groups.tomcat = {};
2022-03-13 14:00:09 +01:00
Peter Hoeg 80b9bfdfb1 nixos/captive-browser: add to menu bar 2022-03-13 20:22:00 +08:00
Peter Hoeg 895090bf89 nixos/earlyoom: use the newly introduced systembus-notify option
Also some cleanups.
2022-03-13 20:21:21 +08:00
Peter Hoeg 27e32bbfde nixos/systembus-notify: add support for system services notifying users 2022-03-13 20:21:21 +08:00
Bobby Rong 65f9112d6b
nixos/pantheon: enable xdg desktop integration
This prevents the embarrassing situation in https://github.com/NixOS/nixpkgs/pull/163828 from happening again.
2022-03-13 12:50:17 +08:00
Luke Granger-Brown 8035c513e3
Merge pull request #163673 from lukegb/pomerium
pomerium: 0.15.7 -> 0.17.0
2022-03-13 02:20:38 +00:00
Pierre Bourdon 9fad223ad1
matrix-synapse: fix release notes and doc for #158605 changes 2022-03-12 21:58:26 +01:00
Kevin Cox 3222d8665d
Merge pull request #159865 from midchildan/update/epgstation
epgstation: 1.7.5 -> 2.6.20
2022-03-12 13:42:49 -05:00
Artturi 1389c15b77
Merge pull request #163304 from gravndal/amule-daemon 2022-03-12 16:18:29 +02:00
Ian Kerins 4c6772e2a1 nixos/oci-containers: improve description of imageFile
As a novice to using this module, I found the existing description to be
quite misleading. It does not at all disable pulling from the registry,
it just loads some image archive that may or may not be related to the
container you're specifying. I had thought there was extra magic behind
this option, but it's just a `docker load`. You need foreknowledge of
the contents of the archive so that whatever it contained is actually
used to run the container.

I've reworded the description to hopefully make this behavior clearer.
2022-03-12 11:14:22 +01:00
Florian Klink 8e428f654c
Merge pull request #163454 from flokli/iptables-nft-legacy-more-rl
nixos/doc: update rl-2111 w.r.t. iptables-nft migration
2022-03-12 10:17:15 +01:00
midchildan 552c993062
nixos/rl-2205: fix invalid link 2022-03-12 15:10:39 +09:00
midchildan 697ea7c69c
epgstation: make updateScript create EditorConfig-compliant files 2022-03-12 15:10:39 +09:00
midchildan 561c0c2851
nixos/rl-2205: add entries for EPGStation v2 2022-03-12 15:10:38 +09:00
midchildan 5e7be6b480
nixos/epgstation: changes for EPGStation v2 2022-03-12 15:10:37 +09:00
pennae 40a35299fa nixos: add functions and documentation for escaping systemd Exec* directives
it's really easy to accidentally write the wrong systemd Exec* directive, ones
that works most of the time but fails when users include systemd metacharacters
in arguments that are interpolated into an Exec* directive. add a few functions
analogous to escapeShellArg{,s} and some documentation on how and when to use them.
2022-03-12 00:48:52 +01:00
Luke Granger-Brown c19e76b29f pomerium: note changes in packaging in 22.05 release notes 2022-03-11 14:09:19 +00:00
Luke Granger-Brown 3004e58f6a nixos/pomerium: avoid blocking when renewing ACME certificates 2022-03-11 14:09:19 +00:00
Ilya Fedin dd510b9053 nixos/mate: allow remove any added package
Only extra packages removable currently, but it's possible to run MATE without packages like caja or yelp
2022-03-11 17:25:24 +04:00
Janne Heß 461c1c9e86
nixos/switch-to-configuration: Use parenthesis on all calls 2022-03-11 14:05:20 +01:00
Janne Heß bc58430068
nixos/switch-to-configuration: Fix reloading of stopped services 2022-03-11 14:05:19 +01:00
Janne Heß 3052d3aa50
nixos/switch-to-configuration: Fix restarting by activation script
This bug is so obscure and unlikely that I was honestly not able to
properly write a test for it. What happens is that we are calling
handleModifiedUnit() with $unitsToStart=\%unitsToRestart. We do this to
make sure that the unit is stopped before it's started again which is
not possible by regular means because the stop phase is already done
when calling the activation script.

recordUnit() still gets $startListFile, however which is the wrong file.
The bug would be triggered if an activation script requests a service
restart for a service that has `stopIfChanged = true` and
switch-to-configuration is killed before the restart phase was run. If
the script is run again, but the activation script is not requesting
more restarts, the unit would be started instead of restarted.
2022-03-11 13:30:03 +01:00
Janne Heß c96180c53f
nixos/switch-to-configuration: Ignore some unit keys
Some unit keys don't need to restart the service to make them effective.
Reduce the amount of service restarts by ignoring these keys
2022-03-11 13:30:03 +01:00
Janne Heß acb535fb61
nixos/switchTest: Also test targets 2022-03-11 13:30:03 +01:00
Robert Hensing a15fbdb88f
Merge pull request #163443 from ncfavier/fix-types-package
lib.types.package: only call toDerivation when necessary
2022-03-11 11:56:44 +01:00
Naïm Favier 9c2266c031
lib.types.package: only call toDerivation when necessary
The current logic assumes that everything that isn't a derivation is a
store path, but it can also be something that's *coercible* to a store
path, like a flake input.

Unnecessary uses of `lib.toDerivation` result in errors in pure evaluation
mode when `builtins.storePath` is disabled.

Also document what a `package` is.
2022-03-11 11:26:34 +01:00
Bobby Rong 8a56a49cc7
Merge pull request #162411 from kurnevsky/tox-node-service-fix
tox-node: fix config hash and url
2022-03-11 18:09:35 +08:00
Profpatsch 75b08e3624 modules/github-runner: Improve description of url
We spent a whole afternoon debugging this, because upstream has very
bad software quality and the error messages were incredibly
misleading.

So let’s document it for the sanity of other people.

Btw, I think the implementation of our module is pretty brittle,
especially the part about diffing tokens to check whether they
changed. We should rather just request a new builder registration
every time, it’s not that much overhead, and always set `replace` so
it is idempotent.
2022-03-11 10:26:39 +01:00
illustris a7827ecfae nixos/hadoop: add release notes 2022-03-11 14:27:01 +05:30
illustris e1017adb32 nixos/hadoop: add module options for commonly used service configs 2022-03-11 14:26:57 +05:30
illustris bef71d7c53 nixos/hadoop: use CGroups to enforce container limits by default 2022-03-11 14:18:44 +05:30
illustris 716b0dfaaf nixos/hadoop: add gateway role 2022-03-11 14:18:44 +05:30
illustris d39056d165 nixos/hadoop: fix tests for hadoop 2 and 3.2 2022-03-11 14:18:44 +05:30
illustris 8aeb60f034 nixos/hadoop: use FairScheduler by default 2022-03-11 14:18:44 +05:30
illustris 799dc66cf1 hadoop: add passthrough tests 2022-03-11 14:18:44 +05:30
illustris c82d48913f nixos/hadoop: add HADOOP_CONF_DIR to env 2022-03-11 14:18:44 +05:30
illustris 0f97c9ae82 nixos/hadoop: disable openFirewall by default 2022-03-11 14:18:44 +05:30
illustris f6cf1ced33 nixos/hadoop: refactor HDFS configs 2022-03-11 14:18:34 +05:30
Krzysztof Nazarewski 4ea5398d20
plantuml-server 1.2021.12 -> 1.2022.2
- changed JDK version to 17 (11+ required)
- added maven build reproducibility
2022-03-11 09:05:35 +01:00
pennae af0f3944bd
Merge pull request #163009 from scvalex/nbd-service
nbd: add nbd service and test
2022-03-11 01:02:10 +00:00
Martin Weinelt 76721f5e5e
Merge pull request #159986 from NukaDuka/pve_exporter 2022-03-10 22:41:45 +01:00
Martin Weinelt 44c88e44c9
Merge pull request #162992 from mweinelt/minidlna 2022-03-10 22:34:42 +01:00
Connor Baker ee1ff0797b spark: update release notes for 22.05 2022-03-10 14:07:01 -05:00
Giulio De Pasquale 81781c338d
Jellyfin: Disable ProtectClock to allow NVENC, NVDEC acceleration 2022-03-10 00:19:57 +00:00
Izorkin a822d0c075
nixos/tests/peertube: add check peertube cli 2022-03-09 23:43:48 +03:00
Evgeny Kurnevsky d94be44526
tox-node: fix config 2022-03-09 23:27:34 +03:00
Giulio De Pasquale 3b944f4c0c
Jellyfin: Fix NVENC, NVDEC usage by allowing AF_UNIX
Fix NVENC, NVDEC usage when transcoding with hardware capabilities
2022-03-09 19:44:06 +00:00
Lassulus 155c02837b
Merge pull request #163383 from Lassulus/tor_newlines
nixos/tor: admit newlines in secret key
2022-03-09 19:19:39 +01:00
davidak f02094df72
Merge pull request #161837 from bobby285271/appstream
appstream: 0.14.4 → 0.15.2
2022-03-09 17:29:57 +01:00
pennae 06c57317c2
Merge pull request #146653 from DarkDNA/nixos/fix-systemd-exporter/extraFlags
nixos/prometheus/systemd: Implement the extraFlags config option.
2022-03-09 16:12:32 +00:00
Googlebot b2068c1248
Merge branch 'NixOS:master' into master 2022-03-09 09:58:39 -05:00
Florian Klink 788abdba4b nixos/doc: update rl-2111 w.r.t. iptables-nft migration
Follow-up on https://github.com/NixOS/nixpkgs/pull/161426.

Explain why having legacy iptables rules installed can lead to confusing
firewall behaviour, and provide some guidance on how to fix this.
2022-03-09 15:30:36 +01:00
lassulus 236a731da0 nixos/tor: admit newlines in secret key 2022-03-09 15:11:01 +01:00
Robert Hensing ca8fa3bb6e rl-2205.section.xml: Regenerate 2022-03-09 15:07:48 +01:00
Robert Hensing 11d74c3871 nixos/rl-2205: Add mkRenamedOptionModuleWith 2022-03-09 14:58:39 +01:00
Robert Hensing 646e888011 nixos/nix-daemon: Stop warning about nix.settings
Out-of-tree modules that use it can not upgrade yet.
There's no real hurry and we should avoid warning fatigue.
2022-03-09 14:53:53 +01:00
Alexandru Scvortov 252f20aaa2 nbd: add programs.nbd, services.nbd, and test
Changes:

nbd: Update nixos/modules/services/networking/nbd.nix

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>

nbd: Update nixos/modules/services/networking/nbd.nix

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>

nbd: Update nixos/tests/nbd.nix

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>

nbd: generalize options in nbd service

nbd: harden service

nbd: Update nixos/modules/services/networking/nbd.nix

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>

nbd: Update nixos/modules/services/networking/nbd.nix

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>

nbd: refactor code a bit and BindPaths automatically
2022-03-09 12:00:47 +00:00
Peter Hoeg d44916d12f nixos/activation: allowed quoted values in /etc/os-release 2022-03-09 17:07:48 +08:00
R-VdP 39f3eb3004 NixOS/auto-upgrade: offer the possibility to define a reboot window during which the system may be automatically rebooted
Some systems should not be rebooted at just any time. If the upgrade process takes too long, for instance because of a
slow internet connection, or if the upgrade service is ran during production hours, we want to allow to define a window
outside of which a reboot will not be performed.
The system will then reboot on the next run of the upgrade service which finishes inside the reboot window.

E.g. we can run the update service twice per week, once during the night and once during the day, but reboots are only
allowed during the night. By doing so, a system that is usually shut down during the night will still receive updates
and systems that are turned on 24/7 can be rebooted outside of production hours.

Co-authored-by: Silvan Mosberger <github@infinisil.com>
2022-03-09 08:18:16 +01:00
Astro 70c1e849c0 nixos/tests/pacemaker: init 2022-03-09 01:19:10 +01:00
Astro a60ab35dd6 nixos: init corosync, pacemaker modules 2022-03-08 20:28:56 +01:00
illustris dd5f004b06 nixos/hadoop: refactor HDFS options 2022-03-09 00:06:17 +05:30
illustris 6efa931c51 nixos/hadoop: fix mkenableoption text 2022-03-09 00:06:17 +05:30
Bernardo Meurer e3a73aed43
Merge pull request #163255 from NickCao/nix
nixVersions.stable: 2.6.1 -> 2.7.0
2022-03-08 10:22:51 -08:00
Nick Cao 3c09fec700
nix-fallback-paths.nix: Update to 2.7.0 2022-03-08 22:40:16 +08:00
Sandro a879922e62
Merge pull request #163208 from Izorkin/fix-modsecurity-nginx 2022-03-08 13:11:42 +01:00
Sandro e9183df241
Merge pull request #157923 from tim-tx/update/dendrite-0.6.0 2022-03-08 12:51:04 +01:00
Sandro 1a0b804799
Merge pull request #162866 from euank/k3s-unified-cgroups 2022-03-08 12:39:37 +01:00
Sandro 0ffade9012
Merge pull request #162214 from ncfavier/redis-bind-localhost 2022-03-08 12:38:39 +01:00
Izorkin b672e4dd2c
nginxModules: add option disableIPC
The disableIPC option is required to checking enabled nginxModules
and disable the SystemCallFilter IPC filter.
2022-03-08 14:37:11 +03:00
Gaute Ravndal fe6f628343 nixos/amuled: fix package reference in service definition
The amuleDaemon package was renamed to kebab-case in 81ef57d6.
2022-03-08 12:14:25 +01:00
Artturi 5cd34745f0
Merge pull request #161701 from RyanGibb/zsh-autosuggest-strategy-array 2022-03-08 12:01:07 +02:00
ajs124 a28591680b nixos/prometheus/exporters/varnish: improve some defaults 2022-03-08 01:42:27 +01:00
Kim Lindberger b71a8e2383
Merge pull request #162095 from midchildan/fix/keycloak-mysql
nixos/keycloak: fix database provisioning issues
2022-03-07 20:13:01 +01:00
Timo Kaufmann 94ea3a8899
Merge pull request #160777 from LunNova/improve-input-remapper-module
nixos/input-remapper: Fix missing [], add more options, add test
2022-03-07 18:51:08 +01:00
Maciej Krüger 75ea3ea9b8
Merge pull request #157438 from sbruder/nitter-package-option 2022-03-07 18:50:27 +01:00
Luna Nova 0643620420
nixos/input-remapper: document pkexec workaround in test 2022-03-07 08:39:15 -08:00
Jos van Bakel daab8fb3af
nixos/nats: fix test 2022-03-07 17:36:21 +01:00