3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

27234 commits

Author SHA1 Message Date
Lara 8f54cca448 nixos/doc: Add Snipe-IT to 22.05 release notes 2022-05-10 16:57:21 +02:00
Lara 9cb388739f nixos/snipe-it: init
Snipe-IT is a free open source IT asset/license management system

https://snipeitapp.com/
2022-05-10 16:57:21 +02:00
Artturi 4ae23f5c7d
Merge pull request #156071 from Madouura/dev/bcachefs-installer
nixos/tests/installer: add bcachefs tests
2022-05-09 19:48:16 +03:00
Robert Hensing ebf0465d09 Merge remote-tracking branch 'upstream/master' into testers 2022-05-09 14:27:13 +02:00
Robert Hensing ae172a2bb4 treewide: nixosTest -> testers.nixosTest 2022-05-09 14:16:06 +02:00
Klemens Nanni 199933efdf nixos/mandoc: Leave shell argument quoting to nix
Manually crafting a quoted string that otherwise lacks any safe-guards
looks odd.

Use `escapeShellArg` instead before prepending the path.
2022-05-09 10:48:54 +02:00
Janne Heß e6fb1e63d1
Merge pull request #171650 from helsinki-systems/feat/config-systemd-package
treewide: pkgs.systemd -> config.systemd.package
2022-05-09 10:23:04 +02:00
github-actions[bot] f39e774f11
Merge master into staging-next 2022-05-09 00:02:27 +00:00
Sandro 8803756fd3
Merge pull request #172072 from ivan/tinc-unbreak
nixos/tinc: unbreak the service
2022-05-09 01:27:12 +02:00
Sandro b196dea22d
Merge pull request #172080 from wentasah/usbrelay-1.0
usbrelay: 0.9 -> 1.0
2022-05-09 01:02:08 +02:00
Niklaus Giger 1d82f62aef
UHK-agent: Support for Ultimate Hacking Keyboard udev-rules and configuration application (#132420)
* maintainers: add ngiger

* uhk-agent: init at 1.5.17

* Apply suggestions from code review

* Update pkgs/os-specific/linux/uhk-agent/default.nix

* Apply suggestions from code review

* Update pkgs/os-specific/linux/uhk-agent/default.nix

Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2022-05-08 22:40:52 +02:00
Michal Sojka 26ec7081d6 nixos/usbrelayd: set myself as module maintainer
I forgot setting that when creating the module.
2022-05-08 21:44:50 +02:00
Michal Sojka 3effbca0bc usbrelay: 0.9 -> 1.0 2022-05-08 21:16:32 +02:00
ajs124 e4a1b1aacd
Merge pull request #171588 from mweinelt/tools-userpkgs
nixos/tools: move firefox into user packages
2022-05-08 19:02:47 +01:00
github-actions[bot] e92815729d
Merge master into staging-next 2022-05-08 18:01:10 +00:00
Ivan Kozik 9db1d1782b nixos/tinc: unbreak the service
The user is actually tinc.${network}, as Mic92 points out in
https://github.com/NixOS/nixpkgs/pull/171703#discussion_r867506032

Sorry, I broke this in https://github.com/NixOS/nixpkgs/pull/171703 earlier.

coreutils 9.1 chown does not complain in this case with a valid dotted user.
2022-05-08 16:04:20 +00:00
Sandro befb337461
Merge pull request #169216 from Shawn8901/fix_prometheus_config_generation
nixos/prometheus: use pkgs.formats.json.generate to write config file
2022-05-08 15:09:09 +02:00
github-actions[bot] eaaed3f1d2
Merge master into staging-next 2022-05-08 12:01:07 +00:00
Artturi 3c8e6248cb
Merge pull request #172040 from K900/fix-installer-eval
installation-cd-base: fix eval
2022-05-08 13:50:10 +03:00
Robert Schütz 2ddfd7e81b nixos/borgmatic: use pkgs.formats.yaml 2022-05-08 01:08:28 -07:00
K900 e994576b0d installation-cd-base: fix eval 2022-05-08 11:08:10 +03:00
github-actions[bot] 84277e82a5
Merge master into staging-next 2022-05-07 18:01:03 +00:00
Florian Klink dbf2b9152f nixos/tests/systemd-nspawn: add test for machinectl pull-tar
This will package up the closure of pkgs.hello in a tarball, and will
later on verify machinectl pull-tar properly unpacked it, serving as a
regression test for #108158.

Closes #108158
2022-05-07 18:14:46 +02:00
Rick van Schijndel 17c252aab1
Merge pull request #153940 from tomfitzhenry/phosh-service
nixos/phosh: add Phosh, the Phone Shell
2022-05-07 17:56:44 +02:00
Artturi 1d09b16b0c
Merge pull request #171709 from avdv/fix-illum-segfault-and-restart
illum: Prevent segfault when unplugging keyboards
2022-05-07 17:40:52 +03:00
github-actions[bot] fa99b3742a
Merge master into staging-next 2022-05-07 00:02:09 +00:00
Sandro 72565373a4
Merge pull request #170912 from Baughn/master 2022-05-07 01:14:08 +02:00
Maximilian Bosch f0bb39d4b7
Merge pull request #167327 from lheckemann/networkd-usedhcp
nixos/networkd: reimplement useDHCP in a sensible way
2022-05-07 00:05:44 +02:00
Sandro 398cf5bf2d
Merge pull request #164698 from illustris/proxmox-lxc 2022-05-06 23:35:13 +02:00
Sandro d21ebc62bf
Merge pull request #170851 from danderson/danderson/ts-warn-rpf
nixos/tailscale: warn if strict reverse path filtering is in use.
2022-05-06 23:21:50 +02:00
github-actions[bot] 6c361fbbd8
Merge master into staging-next 2022-05-06 18:01:18 +00:00
Svein Ove Aas dcade93a25 factorio: Add loadLatestSave 2022-05-06 17:50:35 +01:00
Félix Baylac-Jacqué 7f76009e10 nixosTests.pleroma: fix test, remove toot patch
Initially applied via e7f6370701, then
reverted by 96aaf29234.

Re-applying this patch: the pleroma NixOS test is broken without it.

It was originally impossible to login in toot without having an
interactive shell. I opened https://github.com/ihabunek/toot/pull/180
upstream to fix that and fetch this patch for this test.

The author decided to fix the issue using a slightly different
approach at a3eb5dca24

Because of this upstream fix, our custom patch does not apply anymore.
Using that stdin-based login upstream feature.

Pointing pleroma_ctl to the right RELEASE_COOKIE as well.
2022-05-06 17:45:42 +02:00
Maximilian Bosch f4e5bd8064
nixos/nixos-generate-config: update comment for useDHCP 2022-05-06 16:56:47 +02:00
Vladimír Čunát 8ad52489e9
Merge branch 'master' into staging-next 2022-05-06 16:07:25 +02:00
Maximilian Bosch 7dbfd6b997
Merge pull request #171783 from Ma27/linux-kernel-updates
Linux kernels 2022-05-06
2022-05-06 14:05:28 +02:00
github-actions[bot] 6e0aca3c43
Merge master into staging-next 2022-05-06 12:02:02 +00:00
Janne Heß 764d77f4c3
Merge pull request #124261 from helsinki-systems/feat/state-version-default-warn
nixos/version: Warn about using the default of system.stateVersion
2022-05-06 13:20:43 +02:00
Yureka 96aaf29234
Revert "Merge pull request #164398 from NinjaTrappeur/nin/pleroma-wrappers"
This reverts commit 05417a66e7, reversing
changes made to 53e4f8d237.
2022-05-06 12:38:28 +02:00
Maximilian Bosch b79d9a846b
linux/hardened/patches/5.17: init at 5.17.5-hardened1 2022-05-06 10:17:59 +02:00
github-actions[bot] ff5c4d3404
Merge master into staging-next 2022-05-06 06:01:36 +00:00
Rick van Schijndel 32bebf42ea
Merge pull request #171703 from ivan/chown-colon
treewide: chown user:group instead of user.group to fix warnings from coreutils 9.1
2022-05-06 07:20:40 +02:00
David Anderson 3fdac0f981 nixos/tailscale: warn if strict reverse path filtering is in use.
Tailscale uses policy routing to enable certain traffic to bypass
routes that lead into the Tailscale mesh. NixOS's reverse path
filtering setup doesn't understand the policy routing at play,
and so incorrectly interprets some of this traffic as spoofed.

Since this only breaks some features of Tailscale, merely warn
users about it, rather than make it a hard error.

Updates tailscale/tailscale#4432

Signed-off-by: David Anderson <dave@natulte.net>
2022-05-05 18:28:48 -07:00
Sandro b9e7f61c72
Merge pull request #171747 from danderson/danderson/tailscale-getent
nixos/tailscale: add glibc to PATH.
2022-05-06 03:10:00 +02:00
Sandro e5e30371bc
Merge pull request #170210 from danderson/danderson/restart-tailscaled
nixos/tailscale: use systemctl restart during activation.
2022-05-06 03:09:01 +02:00
David Anderson 67b1fac192 nixos/tailscale: add glibc to PATH.
For some features, tailscaled uses getent(1) to get the shell
of OS users. getent(1) is in the glibc derivation. Without this
derivation in the path, tailscale falls back to /bin/sh for all
users.

Signed-off-by: David Anderson <dave@natulte.net>
2022-05-05 17:09:27 -07:00
github-actions[bot] b962dee3e7
Merge master into staging-next 2022-05-06 00:02:16 +00:00
Ivan Kozik 59a76614f3 treewide: chown user:group instead of user.group to fix warnings from coreutils 9.1 2022-05-05 22:05:18 +00:00
Ivan Kozik f18cc2cf02 nixos/security/wrappers: chown user:group instead of user.group to fix warnings from coreutils 9.1
activating the configuration...
setting up /etc...
chown: warning: '.' should be ':': ‘root.root’
chown: warning: '.' should be ':': ‘root.messagebus’
chown: warning: '.' should be ':': ‘root.root’
chown: warning: '.' should be ':': ‘root.root’
chown: warning: '.' should be ':': ‘root.root’
chown: warning: '.' should be ':': ‘root.root’
chown: warning: '.' should be ':': ‘root.root’
chown: warning: '.' should be ':': ‘root.root’
chown: warning: '.' should be ':': ‘root.root’
chown: warning: '.' should be ':': ‘root.root’
chown: warning: '.' should be ':': ‘root.root’
chown: warning: '.' should be ':': ‘root.root’
chown: warning: '.' should be ':': ‘root.root’
chown: warning: '.' should be ':': ‘root.root’
chown: warning: '.' should be ':': ‘root.root’
chown: warning: '.' should be ':': ‘root.root’
reloading user units for root...
2022-05-05 22:05:18 +00:00
Robert Schütz ccf42c7987 nixos/home-assistant: fix openFirewall 2022-05-05 15:04:46 -07:00