1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2024-11-19 12:11:28 +00:00
Commit graph

31972 commits

Author SHA1 Message Date
Cabia Rangris f8b026c478
Merge pull request #218637 from Luflosi/klipper-fix-typo
nixos/klipper: fix assert message to match actual assertion
2023-02-27 21:17:18 +04:00
Soner Sayakci ff7dfcba57 nixos/opensearch: fix opensearch startup 2023-02-27 16:07:12 +00:00
Luflosi 2378d1a214
nixos/klipper: fix assert message to match actual assertion
This error was introduced in 849c40b5f5.
2023-02-27 17:04:48 +01:00
Riley c713217380
nixos/k3s: add environmentFile as an option
* k3s: add environmentFile option

Enabling to include secrets through configuration such as 'sops'

* Update nixos/doc/manual/release-notes/rl-2305.section.md

Co-authored-by: Jairo Llopis <973709+yajo@users.noreply.github.com>
2023-02-27 08:15:25 -03:00
Nick Cao 50302bbfc7
Merge pull request #218386 from dotlambda/txredisapi-python3
nixos/tests/txredisapi: stop using python38
2023-02-27 14:47:25 +08:00
schnusch bbc988ba00 nixos/matrix-synapse: fix .well-known delegation of federated traffic
Synapse is reverse-proxied on ${fqdn} not ${config.networking.domain} and
the .well-known delegation info must point to the domain on which synapse
is hosted, see https://matrix-org.github.io/synapse/latest/delegate.html
2023-02-27 02:02:35 +01:00
Robert Schütz 9e1d4dff3e nixos/openvpn: use writeShellScript
Previously the upScript would fail with

    Syntax error: "(" unexpected (expecting "done")

on line 7 if /bin/sh is not bash.
2023-02-26 10:12:28 -08:00
Aaron Andersen d8c0a9204a
Merge pull request #217834 from yaxitech/gh-runner-workdir-clean
nixos/github-runners: clean `workDir` as root
2023-02-26 08:05:05 -05:00
Vladimír Čunát 30e272bc04
Merge #216499: staging-next 2023-02-15 2023-02-26 10:11:50 +01:00
happysalada 8872f52732 qdrant: service module init 2023-02-26 01:33:15 -05:00
github-actions[bot] 399e2c78d4
Merge master into staging-next 2023-02-26 06:01:09 +00:00
Robert Schütz 9a8272bd01 nixos/tests/txredisapi: stop using python38 2023-02-25 21:32:15 -08:00
Anselm Schüler 9769e90233 lib/options: Add more options to mkPackageOption 2023-02-26 03:00:22 +01:00
Nick Cao e0bf055d99
Merge pull request #217785 from NickCao/ugid
nixos/{polkit,systemd-coredump}: guard static gid behind state version
2023-02-26 09:44:56 +08:00
github-actions[bot] 348549a031
Merge master into staging-next 2023-02-26 00:02:44 +00:00
Lily Foster c56e5ef801 nixos/users-groups: update option description to clarify initial* option precedence 2023-02-25 14:27:35 -05:00
Lily Foster 5508000ddf nixos/tests/shadow: ensure hashedPassword takes precedence over initialHashedPassword 2023-02-25 14:27:35 -05:00
Lily Foster bfa0bff644 nixos/update-users-groups: let hashedPassword take precedence over initialHashedPassword
Without this change, users that have both `initialHashedPassword` and
`hashedPassword` set will have `initialHashedPassword` take precedence,
but only for the first time `/etc/passwd` is generated. After that,
`hashedPassword` takes precedence. This is surprising behavior as it
would generally be expected for `hashedPassword` to win if both are set.

This wouldn't be a noticeable problem (and an assert could just be made
instead) if the users-groups module did not default the
`root.intialHashedPassword` value to `!`, to prevent login by default.
That means that users who set `root.hashedPassword` and use an ephemeral
rootfs (i.e. `/etc/passwd` is created every boot) are not able to log in
to the root account by default, unless they switch to a new generation
during the same boot (i.e. `/etc/passwd` already exists and
`hashedPassword` is used instead of `initialHashedPassword`) or they set
`root.initialHashedPassword = null` (which is unintuitive and seems
redundant).
2023-02-25 14:27:35 -05:00
pennae 5dce130d1c nixos/tests/unifi: inherit allowUnfree into test node
mongodb is unfree, so the test won't run without this. we already allow
unfree to grab the unifi packages, so it's not even a big change.
2023-02-25 19:12:08 +01:00
Florian Klink 4ed9534f12
Merge pull request #217942 from lilyinstarlight/fix/nixos-test-systemd-initrd-shutdown
nixos/tests/systemd-shutdown: ensure systemd-initrd variant actually enables it
2023-02-25 19:02:53 +01:00
github-actions[bot] 52a11b56f9
Merge master into staging-next 2023-02-25 18:01:03 +00:00
Benjamin Asbach 546f356db6 remove myself as maintainer for now as I switched to another distro 2023-02-25 18:56:02 +01:00
github-actions[bot] ffa8788cc6
Merge master into staging-next 2023-02-25 06:01:20 +00:00
Nick Cao eb03dde70d
Merge pull request #217890 from IndeedNotJames/nixos-tests-gitea
nixos/tests/gitea: open up test for forgejo
2023-02-25 09:55:43 +08:00
github-actions[bot] 78fc07ec20
Merge master into staging-next 2023-02-25 00:02:47 +00:00
superherointj 371c7b8239
Merge pull request #217718 from Kiskae/nvidia/unbreak-6.2
linuxPackages_6_2.nvidia_x11: disable ibt
2023-02-24 17:46:26 -03:00
github-actions[bot] 2384cd723b
Merge master into staging-next 2023-02-24 12:01:20 +00:00
Sandro 83b8193be9
Merge pull request #201780 from helsinki-systems/init/nextcloud-notify-push
nextcloud-notify-push: init at 0.5.0
2023-02-24 12:10:02 +01:00
IndeedNotJames 1b304e1dbc
forgejo: use existing nixos/tests/gitea as test
forgejo is a soft-fork of gitea and gitea's existing tests work great
with forgejo.
At least for now, as this could change, though somewhat unlikely.
2023-02-24 02:59:30 +01:00
IndeedNotJames 889eb7a315
nixos/tests/gitea: add indeednotjames as maintainer
Mostly, because I (@IndeedNotJames) made a slight change to those tests and intend on
extending them in the future.
2023-02-24 02:59:30 +01:00
IndeedNotJames 7d05a6a910
nixos/tests/gitea: make gitea package configurable
This allows the same tests to be used for forgejo, a soft-fork of
gitea, which currently does not have any tests.
2023-02-24 02:59:30 +01:00
Lily Foster 308657daec
nixos/tests/systemd-shutdown: ensure systemd-initrd variant actually enables it
It looks like the systemd-initrd variant of the systemd-shutdown test
(systemd-initrd-shutdown) did not actually enable the systemd-initrd and
so was just evaluating to the same store path before this change.
2023-02-23 19:42:45 -05:00
github-actions[bot] 7fb1a9172f
Merge master into staging-next 2023-02-24 00:02:22 +00:00
sternenseemann d1fa5dd85c nixos/doc: don't prescribe OS / manual name
In general the man pages do not care what OS and manual they are shipped
with, so they don't get to choose the names of them. We were tempted to
do so, as we had inconsistently chosen OS names for the mandoc and
man-db/groff implementations. Since this has been rectified since, we
can just drop this boilerplate from the man pages.
2023-02-23 20:53:04 +01:00
Alyssa Ross 52c286ee5b
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
	pkgs/development/libraries/pmdk/default.nix
2023-02-23 13:51:34 +00:00
Naïm Favier 129b6f7812
Merge pull request #216504 from ncfavier/unbound-state-dir-writable
nixos/unbound: make stateDir writable
2023-02-23 14:23:53 +01:00
Bernardo Meurer ef9030a3ba
Merge pull request #216430 from peterhoeg/m/qmk 2023-02-23 12:14:31 +00:00
github-actions[bot] 390b789c39
Merge master into staging-next 2023-02-23 12:01:07 +00:00
Profpatsch d316c28a30 modules/github-runner: Improve tokenFile docs
We’ve been having trouble figuring out which kind of token to use and
why our setup would break every few system updates.

This should clarify which options there are, and which ones lead to
better results.

Ideally there would be a manual section that has a step-by-step guide
on how to set up the github runner, with screenshots and everything.
2023-02-23 12:37:30 +01:00
Nick Cao f5483464d5
nixos/systemd-coredump: guard static gid for systemd-coredump behind state version 2023-02-23 17:07:50 +08:00
Nick Cao 2265160fc0
nixos/polkit: guard static gid for polkituser behind state version 2023-02-23 17:07:49 +08:00
Vincent Haupert 36949b9718 nixos/github-runners: clean workDir as root
Purge contents of `workDir` as root to also allow the removal of files
marked as read-only. It is easy to create read-only files in `workDir`,
e.g., by copying files from the Nix store.
2023-02-23 09:05:27 +01:00
github-actions[bot] 010946fcbd
Merge master into staging-next 2023-02-23 06:01:03 +00:00
Weijia Wang b65d2ea436
Merge pull request #192672 from amjoseph-nixpkgs/pr/nixos/sd/powerpc64le
enable NixOS installer for powerpc64le
2023-02-23 07:09:46 +02:00
Adam Joseph f99e8bafe6 nixos/installer: add sd-image-powerpc64le.nix
This builds on top of nixpkgs mainline 00d8347180
with the following two PRs cherry-picked:

- https://github.com/NixOS/nixpkgs/pull/192670
- https://github.com/NixOS/nixpkgs/pull/192668

using the following command:

```
nix build -f nixos -L \
  -I nixos-config=nixos/modules/installer/sd-card/sd-image-powerpc64le.nix \
  config.system.build.sdImage
```

I was able to successfully boot the image, although it boots to a login prompt
rather than a shell, and won't accept the empty password for `root`.  I guess
I'll have to figure out why that is.

To boot the image: `zstd`-decompress the it, mount it, and use `kexec`:

```
cd boot/nixos
kexec -l \
  *-vmlinux \
  --initrd *-initrd \
  --dt-no-old-root \
  --command-line="$(grep APPEND ../extlinux/extlinux.conf | sed 's_^ *APPEND *__')"
```

The machine I used for testing has only one storage device which is completely
allocated to LVM.  It appears that the NixOS ISO loader doesn't look for
partition tables within LVM volumes.  To work aroundn this, I had to extract the
`ext4` image within the partition table within the `sd-card` image and put that
in its own LVM volume.  This likely won't be an obstacle for users who write the
image to a USB stick or similar.
2023-02-23 06:18:52 +02:00
Robert Schütz 89c8ef30a6 nixos/imaginary: bind to localhost by default 2023-02-22 17:37:36 -08:00
Henri Menke 64be5cc145
nixos/alps: fix embarrasing typo 2023-02-22 20:41:17 +01:00
github-actions[bot] 68dd6912f3
Merge master into staging-next 2023-02-22 18:01:07 +00:00
Kiskae d120c53077 linuxPackages_6_2.nvidia_x11: disable ibt 2023-02-22 18:08:41 +01:00
D Anzorge bf02778b76 nixos/manual: fix typos in install instructions 2023-02-22 15:40:33 +01:00