3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

23166 commits

Author SHA1 Message Date
georgewhewell 5b8c42f98c nixos/lighthouse: add dataDirs to unit ReadWritePaths 2022-11-22 20:48:33 -05:00
WORLDofPEACE de6f2b0a07 nixos/dbus: support dbus-broker 2022-11-22 09:36:22 +08:00
Martin Weinelt 36f58b687c
nixos/evcc: init 2022-11-21 22:40:15 +01:00
Sandro caf13a5bb1
Merge pull request #182759 from otopetrik/proxmox-image-uefi 2022-11-21 21:34:30 +01:00
Cabia Rangris a19d805696
Merge pull request #202160 from yrd/outline
outline: 0.66.3 -> 0.67.0
2022-11-21 23:30:08 +04:00
Martin Weinelt 3d332ee800
Merge pull request #202211 from helsinki-systems/fix/redis-requirepass 2022-11-21 20:25:13 +01:00
ajs124 195aa53509 nixos/redis: fix requirepass 2022-11-21 18:00:12 +01:00
figsoda 91969d8d37
Merge pull request #201527 from figsoda/lib
lib/attrsets: add concatMapAttrs
2022-11-21 11:01:43 -05:00
pacien 4cdc08f925 nixos/mautrix-telegram: document JSON env var config
This was introduced in mautrix-telegram v0.12.1.

See: https://github.com/mautrix/telegram/issues/584#issuecomment-1250027272
See: https://github.com/mautrix/telegram/releases/tag/v0.12.1
2022-11-21 08:46:52 -05:00
pacien e14bdbb997 Revert "nixos/mautrix-telegram: substitute secrets in config file at runtime (#112966)"
This is no longer necessary since mautrix-telegram v0.12.1, which
supports JSON-formatted environment variable and therefore maps
natively.

See: https://github.com/mautrix/telegram/issues/584#issuecomment-1250027272
See: https://github.com/mautrix/telegram/releases/tag/v0.12.1

This partially reverts commit 24133ead28.
2022-11-21 08:46:52 -05:00
CRTified 4a8f6ceb66 nixos/mautrix-telegram: add documentation for setting arbitrary secrets
The change that allows setting the secrets by an environment file had
the undocumented side effect of allowing to set any key by the environment
file (Related PR: https://github.com/tulir/mautrix-telegram/pull/332).

This is required to e.g. set `bridge.login_shared_secret`, which was not
documented before.

GitHub: closes #103347
2022-11-21 08:46:52 -05:00
Izorkin 17933082cc nixos/mastodon: fix emoji import 2022-11-21 11:43:28 +01:00
Janne Heß c107fb66da
Merge pull request #202132 from ElvishJerricco/systemd-stage-1-tests-hibernate
nixos: ext fixes with systemd-initrd
2022-11-21 10:38:19 +01:00
Yannik Rödel 4de63c6750 outline: 0.66.3 -> 0.67.0 2022-11-21 09:33:08 +01:00
Nick Cao 51e4bd298f
nixos/udev: enable initrd-udevadm-cleanup-db.service in systemd stage 1 2022-11-21 14:33:27 +08:00
Will Fancher 71c74bf173 nixos: Add ext to fsPackages in stage 2 with systemd-initrd enabled 2022-11-20 22:30:01 -05:00
Sandro 8b5dd47fe0
Merge pull request #201647 from jtojnar/nixos-dbus-cleanup 2022-11-21 03:01:58 +01:00
Samuel Dionne-Riel db50c66faf
Merge pull request #201750 from samueldr/feature/plasma-mobile-settings
nixos/plasma5: Sync Plasma Mobile kwinrc defaults with upstream
2022-11-20 17:16:16 -05:00
Maximilian Bosch 853d0a3f2b
Merge pull request #199150 from Ma27/grafana-fixup
nixos/grafana: documentation/warning improvements after #191768
2022-11-20 20:53:25 +01:00
Jörg Thalheim 83b468db28
Merge pull request #196148 from Mic92/tailscale
tailscale: improve formatting on warning message
2022-11-20 20:12:46 +01:00
Maximilian Bosch 98cadbcf70
nixos/grafana: review fixes 2022-11-20 19:54:44 +01:00
Maximilian Bosch 2580440389
Merge pull request #198470 from RaitoBezarius/nc25-openssl
nextcloud25: use openssl 1.1 as a PHP extension to fix RC4 encryption
2022-11-20 18:32:41 +01:00
Maximilian Bosch 6ee5ae3e48
nixos/grafana: make warning more clear 2022-11-20 18:21:41 +01:00
Maximilian Bosch 9d7e9c5965
nixos/grafana: allow using both directories or single YAML files for non-Nix provisioning 2022-11-20 18:21:41 +01:00
Maximilian Bosch 2f1dfb0db3
nixos/grafana: fix w/o datasources or dashboard provisioning 2022-11-20 18:21:41 +01:00
Maximilian Bosch 4ec456b725
nixos/grafana: fix secret-related warnings
Closes #198646

* The options `password`/`basicAuthPassword` were removed for
  datasources in Grafana 9. The only option to declare them now is to use
  `secureJsonData`.
* Fix description for contactPoints provisioning: when using file/env
  providers, nothing will be leaked into the store.
* Fix regex in file-provider usage check: it's also possible to either
  use `$__env{FOO}` or `$FOO` to fetch secrets from the environment.
* Fix warning for datasources: `password`/`basicAuthPassword` was
  removed, also check for each setting in `secureJsonData` if
  env/file-provider was used (then no warning is needed!).
2022-11-20 18:21:40 +01:00
Maximilian Bosch 45e1ce7e3a
nixos/grafana: get rid of unnecessary flatten for warnings 2022-11-20 18:21:39 +01:00
Maximilian Bosch 25b5824696
nixos/grafana: mark services.grafana.extraOptions as removed 2022-11-20 18:21:38 +01:00
Maximilian Bosch 957e368f3d
nixos/grafana: provision.{datasources,dashboards} can't be a list anymore
The hack with `either` had the side-effect that the sub-options of the
submodule didn't appear in the manual. I decided to remove this because
the "migration" isn't that hard, you just need to fix some module
declarations.

However, `mkRenamedOptionModule` wouldn't work here because it'd create
a "virtual" option for the deprecated path (i.e.
`services.grafana.provision.{datasources,dashboards}`), but that's the
already a new option, i.e. the submodule for the new stuff.

To make sure that you still get errors, I implemented a small hack using
`coercedTo` which throws an error if a list is specified (as it would be
done on 22.05) which explains what to do instead to make the migration
easier.

Also, I linkified the options in the manual now to make it easier to
navigate between those.
2022-11-20 18:21:35 +01:00
David Wilemski c9543015d0
nixos/firewall: remove stray quote from package option
This quote is not needed and shows up rendered in the manpage documenting this option.
2022-11-19 22:04:52 -06:00
Jan Tojnar 1c37b65fb9
Merge pull request #181967 from noneucat/fix/at-spi2-core
gnome/at-spi2-core: also set GTK_A11Y when at-spi2-core is disabled
2022-11-20 02:17:08 +01:00
Martin Weinelt 0db9431e26
Merge pull request #201991 from vlinkz/calamaresqtwebkit 2022-11-20 01:59:28 +01:00
Andy Chun @noneucat 2fedbbab9c nixos/gnome/at-spi2-core: force GTK_A11Y=none when disabled
GTK 4 applications use accessibility bus directly
and will try to connect to it every time a widget is created:
https://gitlab.gnome.org/GNOME/gtk/-/issues/4831

This will make GTK 4 apps (e.g. newly ported Nautilus) grind
to a halt on systems that do not have AT-SPI service installed.

Let’s explicitly disable accessibility support with an environment
variable when the AT-SPI service is not enabled to avoid that.
Just like we do for ATK-based applications with `NO_AT_BRIDGE`.

Fixes: https://github.com/NixOS/nixpkgs/issues/197188
2022-11-20 01:50:38 +01:00
Victor Fuentes 4fe9988b89
installation-cd: Remove libsForQt5.full 2022-11-19 19:12:37 -05:00
happysalada 82ee824968 surrealdb: module init 2022-11-19 18:58:04 -05:00
Martin Weinelt c021df5792
Merge pull request #197254 from Atemu/fstab-escape-options 2022-11-19 18:08:40 +01:00
happysalada 4a3aa6ff98 tremor-rs: module init 2022-11-19 11:41:21 -05:00
Martin Weinelt 2714a22521
Merge pull request #198820 from talyz/keycloak-admin-password 2022-11-19 15:03:03 +01:00
Martin Weinelt 78155df21d
nixos/users-groups: Warn about deprecated hashes at activation
To allow for a reasonably fast deprecation of weak password hashing
schemes we provide an activation script that checks existing hashes in
/etc/shadow and issues a warning for user accounts that still rely on
deprecated hashes.

Co-Authored-By: oxalica <oxalicc@pm.me>
2022-11-19 14:07:59 +01:00
Martin Weinelt f391e6dbcc
nixos/user: Don't recommend mkpasswd methods
Instead rely on the default, which at this time is yescrypt.
2022-11-19 14:07:59 +01:00
Anderson Torres fc8a4f7291
Merge pull request #201521 from hmenke/alps
nixos/alps: add hardening, extensible options, test
2022-11-18 14:46:03 -03:00
Maciej Krüger 980e2c2ed2
Merge pull request #196773 from bobvanderlinden/pr-steam-package 2022-11-18 13:08:39 +01:00
Samuel Dionne-Riel 4ec2521ebb nixos/plasma5: Sync kwinrc defaults with upstream
This was missed when updating Plasma Mobile last time.
2022-11-18 04:35:35 -05:00
Jan Tojnar 5acdf85467 nixos/dbus: Avoid redundant output specification
- Do not use `daemon`, it has been synonymous to `out` since 783c40eb68
- Do not use explicit `out` output, it has been default since a17216af4c (originally introduced in 2132c86c45)
2022-11-17 19:49:34 +01:00
figsoda d1dd00b618 nixos/vaultwarden: use lib.concatMapAttrs 2022-11-17 12:54:28 -05:00
Henri Menke aeb5a692c3
nixos/alps: add hardening, extensible options, test 2022-11-17 17:12:54 +01:00
Patrick Jackson b0c6f4ae05 nixos/mullvad-vpn: add mullvad-exclude wrapper & systemPackage 2022-11-17 07:31:40 -08:00
Jan Tojnar 43f34da079 nixos/dbus: Clean up
- Format the expression with nixpkgs-fmt.
- Remove `with` statement for clarity.
- Remove useless comments.
- Regroup systemd options.
2022-11-17 16:26:14 +01:00
Jan Tojnar 65ddb0ef06 nixos/dbus: Remove socketActivated option removal warning
It has been removed since 21.05:

f292a27f44
2022-11-17 16:14:33 +01:00
Bernardo Meurer 9959fe259d
Merge pull request #195135 from maxbrunet/feat/automatic-timezoned/init 2022-11-17 08:28:40 -05:00