3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

30366 commits

Author SHA1 Message Date
Sandro Jäckel c7f5becba3 dbus: remove unused daemon passhtru 2022-11-21 20:23:00 +01:00
Shawn8901 5ed08d83f7 nixos/prometheus-pve-exporter: Use LoadCredentials to make configFiles readable to DynamicUser 2022-11-21 20:20:50 +01:00
Sandro 3a05360e53
Merge pull request #200082 from panicgh/fetchgit-sparse-checkout 2022-11-21 20:00:56 +01:00
ajs124 57abd8c1cf nixos/tests/acme/server: generate certs with longer validity 2022-11-21 18:18:17 +01:00
ajs124 7274df353c nixos/tests/acme/server: patch certificate generation for longer validity 2022-11-21 18:17:55 +01:00
ajs124 195aa53509 nixos/redis: fix requirepass 2022-11-21 18:00:12 +01:00
figsoda 91969d8d37
Merge pull request #201527 from figsoda/lib
lib/attrsets: add concatMapAttrs
2022-11-21 11:01:43 -05:00
pacien 4cdc08f925 nixos/mautrix-telegram: document JSON env var config
This was introduced in mautrix-telegram v0.12.1.

See: https://github.com/mautrix/telegram/issues/584#issuecomment-1250027272
See: https://github.com/mautrix/telegram/releases/tag/v0.12.1
2022-11-21 08:46:52 -05:00
pacien e14bdbb997 Revert "nixos/mautrix-telegram: substitute secrets in config file at runtime (#112966)"
This is no longer necessary since mautrix-telegram v0.12.1, which
supports JSON-formatted environment variable and therefore maps
natively.

See: https://github.com/mautrix/telegram/issues/584#issuecomment-1250027272
See: https://github.com/mautrix/telegram/releases/tag/v0.12.1

This partially reverts commit 24133ead28.
2022-11-21 08:46:52 -05:00
CRTified 4a8f6ceb66 nixos/mautrix-telegram: add documentation for setting arbitrary secrets
The change that allows setting the secrets by an environment file had
the undocumented side effect of allowing to set any key by the environment
file (Related PR: https://github.com/tulir/mautrix-telegram/pull/332).

This is required to e.g. set `bridge.login_shared_secret`, which was not
documented before.

GitHub: closes #103347
2022-11-21 08:46:52 -05:00
Henri Menke 384293bbbb
nixos/alps: fixes for service hardening 2022-11-21 13:21:44 +01:00
Izorkin 17933082cc nixos/mastodon: fix emoji import 2022-11-21 11:43:28 +01:00
Janne Heß c107fb66da
Merge pull request #202132 from ElvishJerricco/systemd-stage-1-tests-hibernate
nixos: ext fixes with systemd-initrd
2022-11-21 10:38:19 +01:00
Yannik Rödel 4de63c6750 outline: 0.66.3 -> 0.67.0 2022-11-21 09:33:08 +01:00
Nick Cao 46328f5596
nixosTests.systemd-initrd-luks-password: test mounting device unlocked in initrd after switching root 2022-11-21 14:49:20 +08:00
Nick Cao 51e4bd298f
nixos/udev: enable initrd-udevadm-cleanup-db.service in systemd stage 1 2022-11-21 14:33:27 +08:00
Will Fancher 71c74bf173 nixos: Add ext to fsPackages in stage 2 with systemd-initrd enabled 2022-11-20 22:30:01 -05:00
Sandro 8b5dd47fe0
Merge pull request #201647 from jtojnar/nixos-dbus-cleanup 2022-11-21 03:01:58 +01:00
Will Fancher 23b3add0e3 nixos: Fix hibernate test with systemd stage 1 2022-11-20 21:01:51 -05:00
Samuel Dionne-Riel db50c66faf
Merge pull request #201750 from samueldr/feature/plasma-mobile-settings
nixos/plasma5: Sync Plasma Mobile kwinrc defaults with upstream
2022-11-20 17:16:16 -05:00
Maximilian Bosch 853d0a3f2b
Merge pull request #199150 from Ma27/grafana-fixup
nixos/grafana: documentation/warning improvements after #191768
2022-11-20 20:53:25 +01:00
Jörg Thalheim 83b468db28
Merge pull request #196148 from Mic92/tailscale
tailscale: improve formatting on warning message
2022-11-20 20:12:46 +01:00
Maximilian Bosch 4a73fad515
nixos/doc: also note that external YAML files for grafana will end up in the store 2022-11-20 20:03:38 +01:00
Maximilian Bosch 98cadbcf70
nixos/grafana: review fixes 2022-11-20 19:54:44 +01:00
Maximilian Bosch 2580440389
Merge pull request #198470 from RaitoBezarius/nc25-openssl
nextcloud25: use openssl 1.1 as a PHP extension to fix RC4 encryption
2022-11-20 18:32:41 +01:00
Maximilian Bosch 6ee5ae3e48
nixos/grafana: make warning more clear 2022-11-20 18:21:41 +01:00
Maximilian Bosch 9d7e9c5965
nixos/grafana: allow using both directories or single YAML files for non-Nix provisioning 2022-11-20 18:21:41 +01:00
Maximilian Bosch 2f1dfb0db3
nixos/grafana: fix w/o datasources or dashboard provisioning 2022-11-20 18:21:41 +01:00
Maximilian Bosch 4ec456b725
nixos/grafana: fix secret-related warnings
Closes #198646

* The options `password`/`basicAuthPassword` were removed for
  datasources in Grafana 9. The only option to declare them now is to use
  `secureJsonData`.
* Fix description for contactPoints provisioning: when using file/env
  providers, nothing will be leaked into the store.
* Fix regex in file-provider usage check: it's also possible to either
  use `$__env{FOO}` or `$FOO` to fetch secrets from the environment.
* Fix warning for datasources: `password`/`basicAuthPassword` was
  removed, also check for each setting in `secureJsonData` if
  env/file-provider was used (then no warning is needed!).
2022-11-20 18:21:40 +01:00
Maximilian Bosch b300ec349c
nixos/doc: wording fix 2022-11-20 18:21:40 +01:00
Maximilian Bosch febc8a4307
nixos/tests/grafana: demonstrate how to use the file provider
Yes, it's still a store path, but it's only for demonstration purposes.
Also we now have fewer warnings in the provision test.
2022-11-20 18:21:40 +01:00
Maximilian Bosch 03b34e85d4
nixos/grafana: we only support single YAML files for provisioning 2022-11-20 18:21:39 +01:00
Maximilian Bosch 45e1ce7e3a
nixos/grafana: get rid of unnecessary flatten for warnings 2022-11-20 18:21:39 +01:00
Maximilian Bosch afd6199cff
nixos/grafana: re-add legacy notifiers test, mention notifiers in release notes 2022-11-20 18:21:39 +01:00
Maximilian Bosch 25b5824696
nixos/grafana: mark services.grafana.extraOptions as removed 2022-11-20 18:21:38 +01:00
Maximilian Bosch 252785fd9c
nixos/doc: improve release-notes for services.grafana 2022-11-20 18:21:38 +01:00
Maximilian Bosch 957e368f3d
nixos/grafana: provision.{datasources,dashboards} can't be a list anymore
The hack with `either` had the side-effect that the sub-options of the
submodule didn't appear in the manual. I decided to remove this because
the "migration" isn't that hard, you just need to fix some module
declarations.

However, `mkRenamedOptionModule` wouldn't work here because it'd create
a "virtual" option for the deprecated path (i.e.
`services.grafana.provision.{datasources,dashboards}`), but that's the
already a new option, i.e. the submodule for the new stuff.

To make sure that you still get errors, I implemented a small hack using
`coercedTo` which throws an error if a list is specified (as it would be
done on 22.05) which explains what to do instead to make the migration
easier.

Also, I linkified the options in the manual now to make it easier to
navigate between those.
2022-11-20 18:21:35 +01:00
ajs124 626e8b67fa nixos/tests/acme/server: regenerate certs
expired today
2022-11-20 16:37:42 +01:00
Elis Hirwing 14cc62d7e6
Merge pull request #201000 from drupol/php/8.2.0
php82: init at 8.2.0rc6
2022-11-20 16:01:00 +01:00
David Wilemski c9543015d0
nixos/firewall: remove stray quote from package option
This quote is not needed and shows up rendered in the manpage documenting this option.
2022-11-19 22:04:52 -06:00
Martin Weinelt 1bb3114d92
Merge pull request #201984 from hax404/deluge_test 2022-11-20 02:17:26 +01:00
Jan Tojnar 1c37b65fb9
Merge pull request #181967 from noneucat/fix/at-spi2-core
gnome/at-spi2-core: also set GTK_A11Y when at-spi2-core is disabled
2022-11-20 02:17:08 +01:00
Martin Weinelt 0db9431e26
Merge pull request #201991 from vlinkz/calamaresqtwebkit 2022-11-20 01:59:28 +01:00
Andy Chun @noneucat 2fedbbab9c nixos/gnome/at-spi2-core: force GTK_A11Y=none when disabled
GTK 4 applications use accessibility bus directly
and will try to connect to it every time a widget is created:
https://gitlab.gnome.org/GNOME/gtk/-/issues/4831

This will make GTK 4 apps (e.g. newly ported Nautilus) grind
to a halt on systems that do not have AT-SPI service installed.

Let’s explicitly disable accessibility support with an environment
variable when the AT-SPI service is not enabled to avoid that.
Just like we do for ATK-based applications with `NO_AT_BRIDGE`.

Fixes: https://github.com/NixOS/nixpkgs/issues/197188
2022-11-20 01:50:38 +01:00
Victor Fuentes 4fe9988b89
installation-cd: Remove libsForQt5.full 2022-11-19 19:12:37 -05:00
happysalada 82ee824968 surrealdb: module init 2022-11-19 18:58:04 -05:00
Georg Haas f20402f8e3
nixos/tests/deluge: fix test
deluge-console always exits with code 1. This is known in https://dev.deluge-torrent.org/ticket/3291
2022-11-20 00:35:59 +01:00
Icy-Thought 2beff9375c
nixos/picom: add egl backend to options 2022-11-19 19:29:22 +01:00
Martin Weinelt c021df5792
Merge pull request #197254 from Atemu/fstab-escape-options 2022-11-19 18:08:40 +01:00
happysalada 4a3aa6ff98 tremor-rs: module init 2022-11-19 11:41:21 -05:00
Martin Weinelt 2714a22521
Merge pull request #198820 from talyz/keycloak-admin-password 2022-11-19 15:03:03 +01:00
Martin Weinelt 6c1b52297d
Merge pull request #195497 from mweinelt/crypt-hash-deprecations 2022-11-19 14:28:44 +01:00
Martin Weinelt 218e2f5e14
Merge pull request #193740 from illustris/hbase
hbase: remove 1.7, 2.4.11 -> 2.4.15, init 2.5.1, 3.0.0-alpha-2 -> alpha-3
2022-11-19 14:28:11 +01:00
Martin Weinelt 78155df21d
nixos/users-groups: Warn about deprecated hashes at activation
To allow for a reasonably fast deprecation of weak password hashing
schemes we provide an activation script that checks existing hashes in
/etc/shadow and issues a warning for user accounts that still rely on
deprecated hashes.

Co-Authored-By: oxalica <oxalicc@pm.me>
2022-11-19 14:07:59 +01:00
Martin Weinelt f391e6dbcc
nixos/user: Don't recommend mkpasswd methods
Instead rely on the default, which at this time is yescrypt.
2022-11-19 14:07:59 +01:00
Martin Weinelt 55ab131ee2
nixos/manual: Don't recommend mkpasswd methods
Instead rely on the default, which at this time is yescrypt.
2022-11-19 14:07:59 +01:00
linsui 7370fcf517 nixos/firefox: remove firefox-wayland 2022-11-19 17:55:13 +08:00
linsui 958cdd7c6b nixos/firefox: add preferencesStatus, autoConfig
... and nativeMessagingHosts
2022-11-19 17:50:51 +08:00
linsui b9778b3a95 nixos/firefox: lint 2022-11-19 17:50:51 +08:00
linsui 6120738eaa nixos/firefox: fix "The option is used but not defined" 2022-11-19 17:50:51 +08:00
Zhaofeng Li 3d185562b5 nixos/tests/phosh: init 2022-11-19 06:55:25 +01:00
Zhaofeng Li 8b2d34fa5e test-driver: Allow configuring delay for send_{key,chars} 2022-11-19 06:55:25 +01:00
Sergei Trofimovich 00d016a2f5
Merge pull request #186764 from fricklerhandwerk/remove-syntax-overview
remove Nix language syntax summary
2022-11-18 22:41:54 +00:00
Anderson Torres fc8a4f7291
Merge pull request #201521 from hmenke/alps
nixos/alps: add hardening, extensible options, test
2022-11-18 14:46:03 -03:00
Maciej Krüger 980e2c2ed2
Merge pull request #196773 from bobvanderlinden/pr-steam-package 2022-11-18 13:08:39 +01:00
Vladimír Čunát 8ab030e8de
Merge #201359: firefox, thunderbird, librewolf: Enable wayland support by default 2022-11-18 10:49:22 +01:00
Samuel Dionne-Riel 4ec2521ebb nixos/plasma5: Sync kwinrc defaults with upstream
This was missed when updating Plasma Mobile last time.
2022-11-18 04:35:35 -05:00
Manuel Bärenz af447367ec nixos/mastodon: Add turion as maintainer 2022-11-17 20:05:50 +01:00
Kerstin Humm d35c9e04e6 mastodon: 3.5.3 -> 4.0.2 2022-11-17 20:05:50 +01:00
Kerstin Humm 7718720149 nixos/mastodon: increase RAM for NixOS test vm 2022-11-17 20:05:50 +01:00
Jan Tojnar 5acdf85467 nixos/dbus: Avoid redundant output specification
- Do not use `daemon`, it has been synonymous to `out` since 783c40eb68
- Do not use explicit `out` output, it has been default since a17216af4c (originally introduced in 2132c86c45)
2022-11-17 19:49:34 +01:00
figsoda d1dd00b618 nixos/vaultwarden: use lib.concatMapAttrs 2022-11-17 12:54:28 -05:00
Christian Kögler de60d387a0
Merge pull request #200180 from Korny666/fix_install_chapter
nixos/doc: correct install summary
2022-11-17 17:42:12 +01:00
Henri Menke 9820effbba
nixos/alps: test login and cookie 2022-11-17 17:12:57 +01:00
Henri Menke aeb5a692c3
nixos/alps: add hardening, extensible options, test 2022-11-17 17:12:54 +01:00
Patrick Jackson b0c6f4ae05 nixos/mullvad-vpn: add mullvad-exclude wrapper & systemPackage 2022-11-17 07:31:40 -08:00
Jan Tojnar 43f34da079 nixos/dbus: Clean up
- Format the expression with nixpkgs-fmt.
- Remove `with` statement for clarity.
- Remove useless comments.
- Regroup systemd options.
2022-11-17 16:26:14 +01:00
Jan Tojnar 65ddb0ef06 nixos/dbus: Remove socketActivated option removal warning
It has been removed since 21.05:

f292a27f44
2022-11-17 16:14:33 +01:00
Bernardo Meurer 9959fe259d
Merge pull request #195135 from maxbrunet/feat/automatic-timezoned/init 2022-11-17 08:28:40 -05:00
Martin Weinelt c156bdf40d
firefox, thunderbird, librewolf: Enable wayland support by default
Enabling Wayland support by default prevents use of XWayland on Wayland
systems, while correctly falling back to X11 when Wayland is
unavailable in the current session.

With the current packaging many people unnecessarily rely on the
`firefox` attribute, which is suggested by nixos-generate-config, which
in turn makes their Firefox use XWayland, when it shouldn't, which
causes bugs with GNOME on Wayland:

https://discourse.nixos.org/t/firefox-all-black-when-first-launched-after-login/21143

Using the Wayland-enabled Firefox was tested on pure X11 systems by
contributors on the #nix-mozilla:nixos.org room and we are confident
this change will not cause severe regressions.

Even better, people can now toggle `MOZ_ENABLE_WAYLAND=<0|1>` in their
environment to override this decision, should they feel the need to do
so.
2022-11-17 11:50:12 +01:00
Artturi 24cc9c3c73
Merge pull request #201183 from Artturin/utempter
tmux: build with utempter
2022-11-17 12:10:41 +02:00
adisbladis 841bcc7a24
Merge pull request #185129 from Munksgaard/fix-nixos-container
nixos-containers: Make sure same version of nixos-container is used
2022-11-17 22:13:44 +13:00
Maxime Brunet 29b5192b08
automatic-timezoned: init at 1.0.41 2022-11-16 15:26:21 -08:00
Florian Klink 67e0d7a1bf
Merge pull request #199352 from symphorien/deadlock-post-resume
nixos/power-management: fix deadlock with post-resume.{target,service}
2022-11-16 21:25:40 +00:00
Thiago Kenji Okada eb8b2d7142 nixos/docs: document picom module changes 2022-11-16 20:14:34 +00:00
Thiago Kenji Okada 6785dae748 nixos/picom: remove experimentalBackends option
Removed by upstream in the recent v10 release.
2022-11-16 20:13:42 +00:00
Pol Dellaiera 1812d1540e
php82: init at 8.2.0rc6 2022-11-16 18:57:26 +01:00
Will Fancher 688fa4133d
Merge pull request #201396 from ElvishJerricco/systemd-util-linux-path-stage-1-fix
nixos: Fix systemd stage 1 after #201266
2022-11-16 11:48:39 -05:00
sternenseemann a110f08f12 ocamlPackages.extlib: rename from ocaml_extlib
This matches the name used in dune and on OPAM.
2022-11-16 14:30:37 +01:00
Jörg Thalheim c48d83b7bf
Merge pull request #197536 from eigengrau/zsh-init-no-unset
nixos/zsh: don’t be noisy when scripts are run with -u
2022-11-16 09:46:39 +01:00
Brian Cooper 8b013b65a6
nixos/misc: fix grammar typo 2022-11-16 06:54:04 +00:00
Vincent Haupert 2f71de984e release-notes: mention new services.github-runners & breaking changes 2022-11-15 23:53:04 -05:00
Carl Richard Theodor Schneider 647ed242dc nixos/adguardhome: allow for empty/unmanaged configs
This commit fixes broken non-declarative configs by
making the assertions more relaxed.
It also allows to remove the forced configuration merge by making
`settings` `null`able (now the default).

Both cases (trivial non-declarative config and `null`able config) are
verified with additional tests.

Fixes #198665
2022-11-15 23:43:15 -05:00
Sandro 655ab77b16
Merge pull request #198724 from Izorkin/update-peertube 2022-11-16 02:51:47 +01:00
Sandro 8ef6a0aca6
Merge pull request #188467 from kekrby/fix-gtk-icon-cache 2022-11-16 02:03:15 +01:00
Will Fancher b28ecff1e6 nixos: Add util-linux to systemd PATH to fix fsck with systemd 251.6
This is an alternative to the reverted
d9b1bde390, which broke systemd stage 1
2022-11-15 17:54:32 -05:00
Will Fancher acecd1ec7b Revert "nixos: Fix fsck with systemd 251.6 and later"
This reverts commit d9b1bde390.
2022-11-15 17:45:38 -05:00
Sandro a51b4f21fb
Merge pull request #198217 from eigengrau/shell-alias-double-dash 2022-11-15 23:41:05 +01:00
Nicolas Benes f6b07f0e2f fetchgit: make sparseCheckout a list of strings
The `sparseCheckout` argument allows the user to specify directories or
patterns of files, which Git uses to filter files it should check-out.

Git expects a multi-line string on stdin ("newline-delimited list", see
`git-sparse-checkout(1)`), but within nixpkgs it is more consistent to
use a list of strings instead. The list elements are joined to a
multi-line string only before passing it to the builder script.

A deprecation warning is emitted if a (multi-line) string is passed to
`sparseCheckout`, but for the time being it is still accepted.
2022-11-15 19:45:33 +01:00
Pierre Bourdon 4ac2dbfec5
Merge pull request #201329 from jqqqqqqqqqq/master
nixos/nginx: fix default listen port options
2022-11-15 17:57:51 +01:00
Curtis Jiang f7bed8cd44 nixos/nginx: fix default listen port options 2022-11-15 15:11:52 +00:00
Florian Klink 8db9c4ed3f
Merge pull request #201266 from aszlig/fix-fsck
nixos: Fix fsck with systemd 251.6 and later
2022-11-15 08:17:53 +00:00
Franz Pletz f0609d6c05
Merge pull request #198529 from jqqqqqqqqqq/master 2022-11-15 04:58:47 +01:00
Curtis Jiang 81cd6b06f9 nixos/nginx: add default listen port options 2022-11-15 02:00:03 +00:00
aszlig d9b1bde390
nixos: Fix fsck with systemd 251.6 and later
Version 251.6 of systemd introduced a small change[1] that now checks
whether the fsck command is available in *addition* to the filesystem
specific fsck.$fsname executable.

When bumping systemd to version 251.7 on our side[2], we introduced that
change. This subsequently caused our "fsck" test to fail and it looks
like this was an oversight during the pull request[3] introducing the
bump.

Since the fsck wrapper binary is in util-linux, I decided to address
this by adding util-linux to fsPackages because util-linux is already
part of the closure of any NixOS system so the impact should be pretty
low.

[1]: 73db7d9932
[2]: 844a08cc06
[3]: https://github.com/NixOS/nixpkgs/pull/199618

Signed-off-by: aszlig <aszlig@nix.build>
2022-11-15 02:15:54 +01:00
Robert Hensing a82e6b5dae
Merge pull request #201187 from pennae/mddoc-in-manual
nixos/manual: re-add mention of mdDoc marker
2022-11-14 19:00:33 +01:00
Robert Hensing 833f9d5e1f
Merge pull request #200646 from hercules-ci/options-markdown-and-errors
`nixosOptionsDoc`: add `markdownByDefault`, error handling
2022-11-14 18:58:54 +01:00
pennae 07e5701aca nixos/manual: re-add mention of mdDoc marker 2022-11-14 16:05:44 +01:00
Artturin 2af809015a nixos/tmux: add withUtempter option 2022-11-14 15:26:19 +02:00
Markus Partheymueller 5bc1b01a40
boot.loader.systemd-boot: add extraInstallCommands option (#200715) 2022-11-14 14:20:58 +01:00
Bryan Richter e3fc19b301
nixos/nginx: docs: Update formatting
* Capitalize ACME
* Use bold instead of ALL CAPS
* Tweak sentence structure
2022-11-14 12:24:17 +02:00
Bryan Richter fd9eed5bf3
nixos/nginx: Extend acmeFallbackHost documentation
This extra example would have saved me a lot of uncertainty and doubt.
2022-11-14 11:54:33 +02:00
Franz Pletz 69f8e94c46
Merge pull request #199587 from lorenz/fscrypt
nixos/pam: support fscrypt login protectors
2022-11-14 09:42:35 +01:00
Franz Pletz 2274143409
Merge pull request #200611 from fpletz/libvirtd-fix-autostart 2022-11-14 09:21:00 +01:00
Michal Sojka ee8ae2da4c nixos/doc: fix installing from other distro
The nixos-generate-config command mentioned in the manual fails with error:

    nixos-generate-config: no need to specify `/` with `--root`, it is the default

This was introduced in 611b8c4472
(#161034). Now, the command should be called without any arguments.
2022-11-13 22:11:19 +01:00
Florian Brandes ba3f3b73ad
sqlite3-to-mysql: init at 1.4.16
Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2022-11-13 20:18:24 +01:00
Elis Hirwing 04dea74eae
Merge pull request #194172 from drupol/php/enable-nts-by-default
php: enable `nts` flags by default
2022-11-13 13:33:27 +01:00
clerie 159d73f7a3 nixos/chisel-server: add module 2022-11-13 12:02:34 +01:00
Pol Dellaiera 364a7d2920
php: switch to nts by default 2022-11-13 11:47:27 +01:00
Guillaume Girol 4c633f0301
Merge pull request #199667 from bjornfor/nixos-sane-indirection-for-quick-reload
nixos/sane: point env vars to /etc for quick reload
2022-11-13 10:05:05 +00:00
Sandro Jäckel 5f03b6ddfc
nixos/console: move enable option out of let in 2022-11-12 23:40:20 +01:00
Justinas Stankevicius 3f6eb10dbd nixos/mastodon: fix definition of mastodon-media-auto-remove 2022-11-12 22:22:41 +01:00
Sandro 9477fa1e44
Merge pull request #197917 from SuperSandro2000/kernel-enable 2022-11-12 21:12:56 +01:00
Robert Schütz 257ec177c8 nixos/syncthing: disallow relative paths
Relative paths are interpreted relative to the working directory, which
is currently unset and thus defaults to `/`. However we want to change
the working directory in a future release such that relative paths are
interpreted relative to `/var/lib/syncthing`.
2022-11-12 11:37:23 -08:00
happysalada e2bb1e774b erigon: module: better secret management 2022-11-12 14:29:43 -05:00
Bernardo Meurer 39e63f110e
nixos/man-db: allow man-cache to be fetched from cache
Currently, we build `man-cache` with `runCommandLocal`, which causes it
to get re-built locally instead of fetched from cache. While the
resulting derivation might be small, it does take a fair bit of time to
build for all my systems, and would be _far_ quicker to fetch.

With this change, we use `runCommand` instead of `runCommandLocal`,
allowing it to get fetched from cache instead of rebuilt for all hosts.
2022-11-12 18:33:13 +00:00
Martin Weinelt 7478655ee7
Merge pull request #198631 from fedeinthemix/fix-languagetool 2022-11-12 15:18:10 +01:00
Bobby Rong 3403c98eb4
Merge pull request #200167 from bobby285271/cinnamon
nixos/cinnamon: make it possible to remove core packages
2022-11-12 08:56:04 +08:00
Florian Klink 989eb42390
Merge pull request #200421 from lovesegfault/udisks-libblockdev-cfg
nixos/udisks2: symlink libblockdev configs
2022-11-11 20:38:46 +00:00
sternenseemann 880e077b15
Merge pull request #199424 from NixOS/haskell-updates
haskellPackages: update stackage and hackage
2022-11-11 18:18:47 +01:00
Robert Hensing 1ed0a2c21e
Merge pull request #200712 from andir/andir/testing-remove-unused-with
nixos/lib/testing-python: remove unused `with pkgs;`
2022-11-11 16:27:19 +01:00
Franz Pletz 3c446ee4e2
Merge pull request #200639 from fpletz/pkgs/obs-28.1.2
obs-studio: 28.0.3 -> 28.1.2, plugins fixes
2022-11-11 16:26:59 +01:00
Andreas Rammhold 923e404389 nixos/lib/testing-python: remove unused with pkgs;
This with statement has no users anymore and can safely be removed.
2022-11-11 16:05:00 +01:00
Lorenz Brun f046cc0923 nixos/pam: support fscrypt login protectors
fscrypt can automatically unlock directories with the user's login
password. To do this it ships a PAM module which reads the user's
password and loads the respective keys into the user's kernel keyring.

Significant inspiration was taken from the ecryptfs implementation.
2022-11-11 15:37:39 +01:00
Franz Pletz 96edebd788
obs-studio27: remove 2022-11-11 15:36:49 +01:00
Maximilian Bosch 35b146ca31
nixos/nextcloud: fixup openssl compat change
Upon testing the change itself I realized that it doesn't build properly
because

* the `pname` of a php extension is `php-<name>`, not `<name>`.
* calling the extension `openssl-legacy` resulted in PHP trying to compile
  `ext/openssl-legacy` which broke since it doesn't exist:

      source root is php-8.1.12
      setting SOURCE_DATE_EPOCH to timestamp 1666719000 of file php-8.1.12/win32/wsyslog.c
      patching sources
      cdToExtensionRootPhase
      /nix/store/48mnkga4kh84xyiqwzx8v7iv090i7z66-stdenv-linux/setup: line 1399: cd: ext/openssl-legacy: No such file or directory

I didn't encounter that one before because I was mostly interested in
having a sane behavior for everyone not using this "feature" and the
documentation around this. My findings about the behavior with turning
openssl1.1 on/off are still valid because I tested this on `master` with
manually replacing `openssl` by `openssl_1_1` in `php-packages.nix`.

To work around the issue I had to slightly modify the extension
build-system for PHP:

* The attribute `extensionName` is now relevant to determine the output
  paths (e.g. `lib/openssl.so`). This is not a behavioral change for
  existing extensions because then `extensionName==name`.

  However when specifying `extName` in `php-packages.nix` this value is
  overridden and it is made sure that the extension called `extName` NOT
  `name` (i.e. `openssl` vs `openssl-legacy`) is built and installed.

  The `name` still has to be kept to keep the legacy openssl available
  as `php.extensions.openssl-legacy`.

Additionally I implemented a small VM test to check the behavior with
server-side encryption:

* For `stateVersion` below 22.11, OpenSSL 1.1 is used (in `basic.nix`
  it's checked that OpenSSL 3 is used). With that the "default"
  behavior of the module is checked.

* It is ensured that the PHP interpreter for Nextcloud's php-fpm
  actually loads the correct openssl extension.

* It is tested that (encrypted) files remain usable when (temporarily)
  installing OpenSSL3 (of course then they're not decryptable, but on a
  rollback that should still be possible).

Finally, a few more documentation changes:

* I also mentioned the issue in `nextcloud.xml` to make sure the issue
  is at least mentioned in the manual section about Nextcloud. Not too
  much detail here, but the relevant option `enableBrokenCiphersForSSE`
  is referenced.

* I fixed a few minor wording issues to also give the full context
  (we're talking about Nextcloud; we're talking about the PHP extension
  **only**; please check if you really need this even though it's
  enabled by default).

  This is because I felt that sometimes it might be hard to understand
  what's going on when e.g. an eval-warning appears without telling where
  exactly it comes from.
2022-11-11 14:45:46 +01:00
Martin Weinelt 90ad4d9da7
Merge pull request #200629 from helsinki-systems/fix/test-dhparams 2022-11-11 12:11:55 +01:00
Robert Hensing b106ff14ed nixosOptionsDoc: Report in which option an error occurs 2022-11-11 06:47:30 +01:00
Robert Hensing 429ba6c714 nixosOptionsDoc: Add markdownByDefault parameter 2022-11-11 06:29:44 +01:00
ajs124 8bb4c87281 nixosTests.dhparams: fix with openssl3 2022-11-11 02:55:54 +01:00
Franz Pletz 8cc2dcce7d
Merge pull request #199524 from ymarkus/zfs-exporter
nixos/prometheus-zfs-exporter: init
2022-11-11 02:01:13 +01:00
Anderson Torres d48d7a69aa
Merge pull request #174975 from danth/firefox-module
nixos/firefox: init
2022-11-10 21:31:57 -03:00
Franz Pletz 286f868a5c
Merge pull request #162057 from jdheyburn/jdheyburn-unifi-prometheus-exporter-loki 2022-11-11 01:31:41 +01:00
Franz Pletz 8e9f00682d
nixos/prometheus-zfs-exporter: mdDoc descriptions 2022-11-11 01:29:10 +01:00
github-actions[bot] a4ffa492ba
Merge master into haskell-updates 2022-11-11 00:17:01 +00:00
Franz Pletz d82f52519a
nixos/libvirtd: always start libvirtd
Previously we did socket-activation but this breaks the autostart
feature since upstream expects libvirtd to be started unconditionally on
boot.

Fixes #171623.
2022-11-11 01:10:37 +01:00
Maximilian Bosch 2a63e4f902
Merge pull request #200218 from Ma27/rm-kernel-4.9
linux_4_9: remove
2022-11-10 23:34:56 +01:00
Daniel Thwaites 01b3d0bf25
nixos/firefox: init 2022-11-10 19:07:37 +00:00
amesgen 733ea72e16
nixos/rss2email: remove unnecessary cfg file indirection to fix test (#200108)
Previously, the NixOS test often failed as the copied config file is not
overwriteable. In actual setups, the restart interval is much bigger, such that
systemd-tmpfiles will correct the permissions inbetween.
2022-11-10 20:06:32 +01:00
figsoda e920aed521
Merge pull request #200440 from nagy/treewide-modules
treewide: use `types.port` and `mkEnableOption` in nixos modules
2022-11-10 12:12:51 -05:00
Gauvain 'GovanifY' Roussel-Tarbouriech 5a4a53dbc6 nixos/mautrix-telegram: fix crash on postgresql database usage 2022-11-10 11:17:20 -05:00
Vincent Haupert 847774470e nixos/github-runners: restart service if exit code signals a retryable error
On some occasions, the GitHub runner service encounters errors which are
deemed retryable but result in the runner's termination. To signal a
retryable error, the runner exits with status code 2:

https://github.com/actions/runner/blob/40ed7f8/src/Runner.Common/Constants.cs#L146

To account for that behavior, this commit sets
`RestartForceExitStatus=2` which results in a service restart regardless
of using an ephemeral runner or not.
2022-11-10 11:06:04 -05:00
Janne Heß 798bc67cff
Merge pull request #200319 from helsinki-systems/feat/redis-module-changes
nixos/redis: misc module changes
2022-11-10 16:03:54 +01:00
sternenseemann 5c044644a6 Merge remote-tracking branch 'origin/master' into haskell-updates 2022-11-10 13:56:56 +01:00
Eelco Dolstra 0a00b332cd
Merge pull request #198526 from farnoy/nixos-container-unified-cgroups
[nixos-container] Make nixos containers use unified cgroupsv2
2022-11-10 13:37:43 +01:00
github-actions[bot] f3a93620b1
Merge master into staging-next 2022-11-10 12:01:27 +00:00
Maximilian Bosch 61128cba67
nixos/nextcloud: minor docs cleanup for openssl change
* s/NextCloud/Nextcloud/g
* `enableBrokenCiphersForSSE` should be enabled by default for any NixOS
  installation from before 22.11 to make sure existing installations
  don't run into the issue. Not the other way round.
* Update release notes to reflect on that.
* Improve wording of the warning a bit: explain which option to change
  to get rid of it.
* Ensure that basic tests w/o `enableBrokenCiphersForSSE` run with
  OpenSSL 3.
2022-11-10 12:17:43 +01:00
Raito Bezarius 394d4de877
nextcloud25: enable by default broken ciphers for NixOS ≤ 22.11 2022-11-10 12:17:43 +01:00
Raito Bezarius 7eefaeb5e3
nextcloud25: use openssl 1.1 as a PHP extension to fix RC4 encryption 2022-11-10 12:17:43 +01:00
Anderson Torres 40962b461b
Merge pull request #200300 from thiagokokada/mame-tools-init
mame-tools: init at 0.249
2022-11-10 07:45:00 -03:00
Thiago Kenji Okada 891511b619 nixos/doc: document mame package changes 2022-11-10 09:47:54 +00:00
Thiago Kenji Okada d868053b40 nixos/doc: formatting improvements 2022-11-10 09:47:54 +00:00
Daniel Nagy b4674b39c1
treewide: use mkEnableOption in nixos modules 2022-11-10 09:30:00 +01:00
Daniel Nagy 095269c862
treewide: use types.port in nixos modules 2022-11-10 09:30:00 +01:00
Bobby Rong 8380ac4538
nixos/cinnamon: don't override greeter theme if the package is excluded
This makes it possible to remove mint themes in an easy way, in this
case we will just use the default from slick-greeter module, i.e. the
Adwaita theme.
2022-11-10 14:47:06 +08:00
Bobby Rong ba4494f8f6
nixos/cinnamon: make it possible to remove more non-essential packages
Packages for accessibility and theme can now be removed with excludePackages
2022-11-10 14:47:06 +08:00
Bobby Rong bb30779791
nixos/cinnamon: fix some typos 2022-11-10 14:47:00 +08:00
Bobby Rong e88b1dc9c8
nixos/cinnamon: switch to xdg.icons.enable
We enable this option explicitly to prevent users from accidentally
disabling it and getting a broken desktop.
2022-11-10 14:43:25 +08:00
Bobby Rong fa3008b93c
nixos/cinnamon: switch to xdg.mime.enable
We enable this option explicitly to prevent users from accidentally
disabling it and getting a broken desktop.
2022-11-10 14:41:58 +08:00
github-actions[bot] 3ff06869dc
Merge master into haskell-updates 2022-11-10 00:16:25 +00:00
github-actions[bot] 020ea91183
Merge master into staging-next 2022-11-10 00:02:27 +00:00
Sandro Jäckel 5452a26077
nixos/lvm: replace boot.isContainer with services.lvm.enable 2022-11-09 23:47:37 +01:00
Sandro Jäckel 182575a60d
nixos/kernel: replace boot.isContainer with boot.kernel.enable 2022-11-09 23:45:33 +01:00
Guillaume Girol 255ac994b8 nixos/firefox-syncserver: fix setup failure due to duplicate key
in some circumstances, the setup service would fail with:
ERROR 1062 (23000) at line 5: Duplicate entry '1' for key 'PRIMARY'
so let's use an upsert instead of insert. This also simplifies the
script.

Besides, also fix that when the setup script changes, the corresponding
script is not restarted as it is usually not active, so we trigger a
restart of the main systemd service.
2022-11-09 23:39:08 +01:00
ajs124 bc4e9a890c nixos/redis: store config in state directory
this is needed because certain redis features, like sentinel, require
the config file to be persistent
2022-11-09 21:49:33 +01:00
Bernardo Meurer c9e23626a1
nixos/udisks2: symlink libblockdev configs
Without this, you get the following error message in the logs:

udisksd[4082]: Failed to load config files: Failed to get contents of the config dir (/etc/libblockdev/conf.d/)Error opening directory “/etc/libblockdev/conf.d/”: No such file or directory. Using the built-in config
2022-11-09 18:30:59 +00:00
github-actions[bot] d99020653d
Merge master into staging-next 2022-11-09 18:01:11 +00:00
Bernardo Meurer 6678a7ecb7
nixos/geoclue2: make system service wait on network-online
In ee0b8a7eaa we made the user service wait on network-online, but
forgot about the system service. We need them _both_ to wait when the
wifi source is enabled.
2022-11-09 16:50:18 +00:00
ajs124 168ad716e0 nixos/redis: add extraParams 2022-11-09 16:43:04 +01:00
Anderson Torres 3a73976c74
Merge pull request #200388 from babbaj/remove-ethminer
ethminer: remove
2022-11-09 12:06:28 -03:00
Babbaj 9a7c359a35
ethminer: remove 2022-11-09 09:37:35 -05:00
Jonas Heinrich f7f9442695 nixos/invoiceplane: Enable clean url 2022-11-09 08:17:52 -05:00
Robert Hensing 59f6a93082
Merge pull request #199595 from hercules-ci/nixos-toplevel-maintenance
nixos/top-level: maintenance
2022-11-09 13:54:36 +01:00
Robert Hensing 93a905ec4f
Merge pull request #194759 from hercules-ci/fqdn-or-hostname
nixos: Add `networking.fqdnOrHostName`
2022-11-09 13:53:57 +01:00
github-actions[bot] 5995b81686
Merge master into staging-next 2022-11-09 06:01:29 +00:00
Oto Petřík 4729d5d7f6 nixos/proxmox-image: allow building UEFI images
Allow building other than Legacy-BIOS-only Proxmox images.
Default is unchanged.

To build UEFI proxmox image use:
  proxmox.qemuConf.bios = "ovmf";
(default is "seabios")

To build image bootable using both "seabios" and "ovmf" use:
  partitionTableType = "hybrid";
BIOS can be switched in Proxmox between "seabios" and "ovmf" and VM still boots.
(GRUB2-only, systemd-boot does not boot under "seabios")

To build systemd-boot UEFI image:
  proxmox.qemuConf.bios = "ovmf";
  boot.loader.systemd-boot.enable = true;
2022-11-09 03:19:42 +01:00
ajs124 c79f431491
Merge pull request #200201 from helsinki-systems/upd/varnish
varnish: updates
2022-11-09 01:40:41 +01:00
github-actions[bot] 8deed80953
Merge master into haskell-updates 2022-11-09 00:16:09 +00:00
github-actions[bot] 81316207ec
Merge master into staging-next 2022-11-09 00:02:55 +00:00
ajs124 65522538a3
Merge pull request #200284 from Ma27/signald-release-notes
nixos/doc: mention signald update in release-notes and related upgrade instructions
2022-11-09 00:59:55 +01:00
Maximilian Bosch fbc4961be9
nixos/doc: mention signald update in release-notes and related upgrade instructions 2022-11-08 23:27:20 +01:00
Bjørn Forsman 25617e3def nixos/blocky: fix description
Before: "Whether to enable Fast and lightweight [...]"
After: "Whether to enable blocky, a fast and lightweight [...]"
2022-11-08 20:59:06 +01:00
Pascal Bach ea2a9ac9d3
Merge pull request #200222 from Ma27/prometheus-hardening-regression
nixos/prometheus: fix startup w/hardened service
2022-11-08 20:33:47 +01:00
github-actions[bot] 4517d658d3
Merge master into staging-next 2022-11-08 18:01:16 +00:00
Maximilian Bosch 176676c4cf
Merge pull request #192890 from Enzime/fix/nextcloud-space-passwords
nixos/nextcloud: handle passwords with spaces
2022-11-08 18:02:04 +01:00
Maximilian Bosch dcb32beda0
nixos/prometheus: fix startup w/hardened service
See the discussion below the original PR[1] and #197443 for more
context.

I guess I missed that upon review because the branch was too old and I
cherry-picked the commit onto my deployment branch which is based on
22.05. Sorry for that!

[1] https://github.com/NixOS/nixpkgs/pull/162784#issuecomment-1306848036
2022-11-08 17:46:35 +01:00
Maximilian Bosch 8d9133c67d
linux_4_9: remove
Support will be dropped on 01 Jan 2023[1]. Normally we'd keep it around
until then, but considering that it's an LTS kernel it may be better to
do it before 22.11 to make sure there are no unpleasant surprises.

Closes #199933

[1] https://endoflife.date/linux
2022-11-08 16:30:14 +01:00
happysalada 2c5abd89c7 rmem_max: define merge function 2022-11-08 10:30:10 -05:00
Jonas Heinrich fd76db7cb4 nixos/invoiceplane: Add cron option 2022-11-08 09:59:10 -05:00
Philipp Hauck cb82a002f8 nixos: correct install summary 2022-11-08 15:29:42 +01:00
ajs124 47cbd610ce varnish71: drop 2022-11-08 14:35:01 +01:00
github-actions[bot] 917a1408b8
Merge master into staging-next 2022-11-08 06:01:15 +00:00
Sandro 4f8277ef10
Merge pull request #200094 from mdlayher/mdl-zrepl 2022-11-08 01:53:26 +01:00
Sandro Jäckel 677d6f1623
nixos/changedetection-io: hide referer by default 2022-11-08 01:37:46 +01:00
github-actions[bot] 7db1be3e27
Merge master into haskell-updates 2022-11-08 00:16:51 +00:00
github-actions[bot] 8345eea2ce
Merge master into staging-next 2022-11-08 00:02:57 +00:00
Matt Layher 8ec252784e
zrepl: 0.5.0 -> 0.6.0
Signed-off-by: Matt Layher <mdlayher@gmail.com>
2022-11-07 18:35:44 -05:00
Michael Weiss acf257739b
Merge pull request #199902 from primeos/nixos-tests-chromium
nixos/tests/chromium: Re-enable the chrome://gpu test for M107
2022-11-08 00:21:13 +01:00
Martin Weinelt 0f774a39d4
Merge pull request #196957 from Madouura/dev/protonup
close https://github.com/NixOS/nixpkgs/pull/193062
close https://github.com/NixOS/nixpkgs/issues/186974
2022-11-07 23:24:41 +01:00
Vladimír Čunát 7fa607bab4
Merge #194670: arangodb: 3.4.8 -> 3.10.0 2022-11-07 22:25:43 +01:00
laalsaas 5f07247a07 mepo: init module 2022-11-07 20:27:00 +01:00
David Arnold 2aa5c8d3ab nixos/teamviewer: fix for non-NetworkManager environments 2022-11-07 19:54:25 +01:00
Sandro da6ae81172
Merge pull request #200052 from SuperSandro2000/less-space 2022-11-07 19:50:33 +01:00
github-actions[bot] 938efbfd26
Merge master into staging-next 2022-11-07 18:01:17 +00:00
Manuel Bärenz 891dfb1b63 nixos/mastodon: add option mediaAutoRemove 2022-11-07 18:58:58 +01:00
Sandro eb33bec8b3
nixos/less: fix spacing 2022-11-07 17:51:51 +01:00
sternenseemann c7a0d75bd1 haskell.compiler.ghc92: 9.2.4 -> 9.2.5 2022-11-07 17:29:47 +01:00
Bobby Rong 4e9c9c0b7c
Merge pull request #199154 from uninsane/pr/lightdm-mobile-greeter
lightdm-mobile-greeter: init at 2022-10-30
2022-11-07 22:30:53 +08:00
happysalada 1ef74a7854 lighthouse: module add defaults 2022-11-07 09:15:49 -05:00
Maximilian Bosch 58227c4de0
Merge pull request #162784 from amarshall/prom-svc-harden
nixos/prometheus: Harden systemd service
2022-11-07 15:03:43 +01:00
colin ed9998cf2a nixos/lightdm: add greeters.mobile config option
i based this on the neighboring lightdm-greeters/mini.nix module.

lightdm-mobile-greeter doesn't have a lot of configuration options.
it grabs the default user to login as from lightdm, along with which DE
it should launch. so no further configuration should be needed aside
from enabling `services.xserver.displayManager.lightdm.enable` and
either setting `services.xserver.displayManager.defaultSession` to the
appropriate session or explicitly defining a seat like:

```nix
services.xserver.displayManager.lightdm.extraSeatDefaults = ''
  user-session = phosh
'';
```
2022-11-07 05:48:23 -08:00
happysalada f4ff9c2649 lighthouse: init module 2022-11-07 07:58:17 -05:00
Maximilian Bosch 94046425a0
Merge pull request #199997 from mayflower/wp-create-font-dir
nixos/wordpress: ensure that fonts already exists
2022-11-07 13:25:16 +01:00
github-actions[bot] 19a0988af4
Merge master into staging-next 2022-11-07 12:01:51 +00:00
Bobby Rong 03e68946a0
Merge pull request #186628 from ocfox/pam_faildelay
nixos/pam: add option failDelay
2022-11-07 19:54:57 +08:00
Robert Hensing abd4e9d524
Merge pull request #199572 from SuperSandro2000/nix-daemon-io-prio
nixos/nix-daemon: don't give daemon by default high io priority
2022-11-07 12:26:47 +01:00
Maximilian Bosch 67e61879c5
Merge pull request #199416 from symphorien/wg-add-peer
nixos/wireguard: start new peers when they are added
2022-11-07 12:20:06 +01:00
ocfox ab0ae8f5e1
nixos/pam: add option failDelay
Co-authored-by: Bobby Rong <rjl931189261@126.com>
2022-11-07 19:16:35 +08:00
Majiir Paktu ad83bff008 nixos/binfmt: restart systemd-binfmt when registrations change 2022-11-07 11:28:47 +01:00
Maximilian Bosch b40b8b92e2
nixos/wordpress: ensure that fonts already exists
Not a big deal in most of the cases because wordpress ensures that this
directory exists on its own, but with our twentig customizations that's
actually causing issues.

(cherry picked from commit 3285342bfe5f401dda84c13c834e73154928a61c)
2022-11-07 10:08:01 +01:00
Edward Tjörnhammar 83ecc90d10 nixos/mdevctl: init module 2022-11-07 09:05:23 +00:00
illustris 140bd1aef4
hbase: update versions and remove EoL version
- remove 1.7
- 2.4.11 -> 2.4.15
- init 2.5.1
- 3.0.0-alpha-2 -> 3.0.0-alpha-3
2022-11-07 12:01:36 +05:30
github-actions[bot] 5f9b3cb99e
Merge master into staging-next 2022-11-07 06:01:28 +00:00
zowoq 58a59738d5 nixos/tests/podman: fix rootless systemd 2022-11-07 14:11:34 +10:00
zowoq bbfdc6ce4d nixos/tests/podman: move docker tests to separate node 2022-11-07 14:11:34 +10:00
github-actions[bot] e51ba60580
Merge master into staging-next 2022-11-07 00:03:30 +00:00
Maximilian Bosch f54c651ba5
Merge pull request #199905 from booklearner/patch-1
alps: fix default smtp port
2022-11-06 23:59:21 +01:00
Doron Behar c568890eb8
Merge pull request #133537 from Yarny0/foomatic-db
foomatic-db ppd files
2022-11-06 22:25:55 +00:00
Lily Foster c2b3c9794d nixosTests: test spaces in mount options via btrfs subvols
Also enabled the btrfs tests for installer-systemd-stage-1 again
2022-11-06 22:15:35 +01:00
Atemu 753f883c35 stage-1: escape mount points and options
mountFS adds these strings to fstab and then relies on `mount` parsing fstab. If
they have spaces or tabs in them, that would break fstab and therefore not mount
with the unhelpful error: No such file or directory.

Co-authored-by: Lily Foster <lily@lily.flowers>

Co-authored-by: Luflosi <Luflosi@users.noreply.github.com>
2022-11-06 22:15:31 +01:00
Jörg Thalheim efa5fc967f
Merge pull request #199875 from helsinki-systems/fix/mariadb-tests
mariadb: fix nixos tests
2022-11-06 22:11:53 +01:00
booklearner 59bd411df9
alps: fix default smtp port 2022-11-06 16:00:34 -05:00
Michael Weiss 673f7d025b
nixos/tests/chromium: Re-enable the chrome://gpu test for M107
I need to fix copying the chrome://gpu content to the clipboard (Ctrl+a doesn't
work anymore so we have to click the button) but we can at least test the font
rendering for now.
2022-11-06 21:48:57 +01:00
Jörg Thalheim 1d442b3b68
Merge pull request #186087 from Mic92/consul
nixos/consul: use signal instead of api for reload
2022-11-06 20:32:19 +01:00
Domen Kožar 8993cc730d
Merge pull request #199770 from domenkozar/nixos-options-markdown
nixos options markdown: fix html escaping
2022-11-06 18:08:59 +00:00
github-actions[bot] 6e2df29235
Merge master into staging-next 2022-11-06 18:01:32 +00:00
ajs124 f22af0612d mariadb: fix nixos tests
after 8b30afdd78
2022-11-06 18:49:17 +01:00
Jakub Okoński 12508ac79a nixos-container: force systemd-nspawn to use unified cgroups hierarchy 2022-11-06 17:12:02 +01:00
Yarny0 6f622e91c5 cups-drv-rastertosag-gdi (cups driver): gzip ppd files
ppd files are gzipped to save some space.
The `gzip` "-n" option prevents gzip from storing
a timestamp, thus facilitating reproducibility.
2022-11-06 16:19:22 +01:00
Madoura e747d0a368
protonup-ng: init at 0.2.1
Co-authored-by: IceDBorn <github.envenomed@dralias.com>
2022-11-06 09:05:55 -06:00