1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2024-11-18 03:30:45 +00:00
Commit graph

43839 commits

Author SHA1 Message Date
paumr 0088e7d130 matrix: migrated links to new element-hq org
The vector-im GitHub organisation has been renamed to element-hq:
1d586281f0/profile/README.md
2024-09-05 16:40:06 +02:00
nikstur f349590f46
auditd: fix service ordering (#339465) 2024-09-05 11:19:14 +02:00
Ryan Horiguchi 737d1ffb22 netdata: 1.46.1 -> 1.47.0 2024-09-05 10:19:35 +02:00
r-vdp 38d73e0c07
auditd: add a dependency on systemd-tmpfiles-setup
This is needed so that:
- users have been created (when using systemd-sysusers or userborn)
- /run and /var/run exist
2024-09-05 10:05:18 +02:00
Azat Bahawi 187f4340c6
nixos/endlessh-go: allow overriding package (#339459) 2024-09-05 07:48:21 +00:00
Moritz Sanft d0213a75e0
nixos: support dm-verity 2024-09-05 08:42:53 +02:00
Vivek Revankar 15b474ae05 nixos/endlessh-go: allow overriding package
allow overriding the endlessh-go package used in the service
2024-09-04 22:28:54 -07:00
éclairevoyant fcb54ddcc9
openlens: remove package (#339553) 2024-09-05 02:32:14 +00:00
rewine 0daec7844f
deepin desktop environment: 2024.09 update (#338402) 2024-09-05 10:08:27 +08:00
Martin Weinelt ad601344e1
Revert "nixos/version: validate system.stateVersion" (#339671)
This broke the eval of the ISOs on nixos/unstable-small and likely nixos/trunk-combined. See #339671 for details.
2024-09-05 03:22:20 +02:00
Felix Bühler d7ed3794f0
nixos/services.unpoller: remove with lib; (#339094) 2024-09-04 23:52:53 +02:00
Emily 42e6ee04b1
nixos/*: use pipewire by default (#339209) 2024-09-04 22:42:18 +01:00
Sebastian Sellmeier 4b29fd82fc
openlens: remove package 2024-09-04 22:47:28 +02:00
Johannes Jöns 3df1783166
nixos/version: validate system.stateVersion (#317858) 2024-09-04 18:09:57 +00:00
Philip Taron 271d117596
treewide: fix eval related to with lib; removal (#339356) 2024-09-04 09:42:58 -07:00
Maciej Krüger bf757cefa9
Revert "nixos/firewall: fix reverse path check failures with IPsec" (#339393) 2024-09-04 18:39:17 +02:00
éclairevoyant f6306c0961
treewide: fix eval related to with lib; removal 2024-09-04 12:21:09 -04:00
Florian Klink bcc7693c76
nixos/timesyncd: allow NTP servers advertised by DHCP to be used (#335755) 2024-09-04 22:53:48 +07:00
Aleksana 9b4a8db85e
nixos/tests/ec2-nixops: fix build (#338147) 2024-09-04 22:17:39 +08:00
Aleksana 43aabb266d
nixos/github-runner: fix build failure (#339452) 2024-09-04 22:15:57 +08:00
K900 63222b4c81 doc/rl-2411: add PipeWire note 2024-09-04 13:56:51 +03:00
K900 4463e63001 nixos/tests: don't enable Pulseaudio 2024-09-04 13:56:51 +03:00
K900 e90bac5a65 nixos/plasma5: clean up pulseaudio-related things 2024-09-04 13:56:51 +03:00
K900 5a0ceb9243 nixos/pantheon: don't enable Pulseaudio 2024-09-04 13:56:50 +03:00
K900 c6777a9dd8 nixos/lomiri: don't enable Pulseaudio 2024-09-04 13:56:50 +03:00
K900 78d6adf386 nixos/installer: don't enable Pulseaudio 2024-09-04 13:56:50 +03:00
K900 644cf688b3 nixos/graphical: don't enable Pulseaudio 2024-09-04 13:56:42 +03:00
K900 2ed8e5f614 nixos/gnome: don't enable Pulseaudio 2024-09-04 13:56:42 +03:00
K900 8c2dd1b1be nixos/deepin: don't enable Pulseaudio 2024-09-04 13:56:42 +03:00
K900 6bd9daa1c6 nixos/cinnamon: don't enable Pulseaudio 2024-09-04 13:56:42 +03:00
K900 80a7f7effd nixos/budgie: don't enable Pulseaudio 2024-09-04 13:56:42 +03:00
K900 438fd16359 nixos/graphical-desktop: enable Pipewire audio by default 2024-09-04 13:56:42 +03:00
K900 dcd4151fd6 nixos/steam: also enable 32-bit Pipewire plugins 2024-09-04 13:56:42 +03:00
Kerstin Humm 21ac7729ae nixos/weblate: add borgbackup to path 2024-09-04 12:54:31 +02:00
datafoo 24e08d0e9b nixos/timesyncd: allow NTP servers advertised by DHCP to be used
- add option `fallbackServers` with default to `networking.timeServers`
- option `servers` now default to null

Fix #335050
2024-09-04 12:17:39 +02:00
datafoo b4cd57870d nixos/timesyncd: allow null for option servers
This gives the ability to not write `NTP=` to the `timesyncd.conf` file
(servers = null) as opposed to writing `NTP=` (servers = []) which is
interpreted slightly differently by systemd:

> When the empty string is assigned, the list of NTP servers is reset,
and all prior assignments will have no effect.
2024-09-04 12:14:24 +02:00
datafoo 34efcf8aef nixos/timesyncd: minor refactoring 2024-09-04 12:14:24 +02:00
datafoo 45c0d04735 nixos/timesyncd: minor refactoring 2024-09-04 12:14:24 +02:00
r-vdp 544c97226d
auditd: remove with lib 2024-09-04 10:00:07 +02:00
r-vdp 0cb37347c6
auditd: format with nixfmt 2024-09-04 10:00:07 +02:00
Doron Behar 024357143a
nixos/samba: add mount.cifs +s wrapper (#328901) 2024-09-04 07:55:39 +00:00
Sirio Balmelli dc700df6b2
nixos/github-runner: fix build failure
Shellcheck complains:

       > args=(
       >      ^-- SC2054 (warning): Use spaces, not commas, to separate array elements.

Add a comment disabling shellcheck in this case and annotating why.

Signed-off-by: Sirio Balmelli <sirio@b-ad.ch>
2024-09-04 09:20:11 +02:00
rewine 29d62536b9 deepin.nix: install dde-api-proxy 2024-09-04 10:16:56 +08:00
rewine 60348797ee deepin.dde-dock: remove 2024-09-04 10:16:54 +08:00
Sachi King 361fde84f9 Revert "nixos/firewall: fix reverse path check failures with IPsec"
The inclusion of the "meta ipsec" rule in the default reverse path
filtering breaks systems not built with specific XFRM kernel config
options.  Specifically CONFIG_XFRM must be set, which gets selected
by CONFIG_NFT_XFRM, which is hidden behind CONFIG_XFRM_USER.

These options are not selected by default in most defconfig's provided
by the kernel with the exception of some device-specific defconfigs.

These options are not set by the nix kernel common_config, and I would
argue that IPSec support does not belong in a minimal kernel as that
elevates its support status above other in-kernel VPN interfaces.

The contributor of this feature does not seem interested in working
towards a solution that does not break systems running kernels built
with "autoModules = false" while supporting this feature, and as this
silently breaks firewalls into an insecure state and poses an immediate
security issue I propose this be reverted until a solution that does not
break such systems is proposed.
https://github.com/NixOS/nixpkgs/pull/310857#discussion_r1742834970

Devices used as firewalls, if they do not have the required kernel
config, will fail to load the new firewall rules and will upon boot pass
traffic without any filtering into the internal network.

Devices exposed directly to the internet, after reboot, will boot
without filtering potentially exposing services not intended to be
exposed to the internet, such as databases.

The following platforms in nixpkgs appear to be impacted:
 - pc_simplekernel
 - pogoplug4
 - sheevaplug
 - zero-gravitas
 - zero-sugar
 - utilite
 - guruplug
 - beaglebone
 - fuloong2f_n32

References to hardware without autoModules can be found in
nixos-hardware, as well as in active third-party repos on github.

I suspect there are other users impacted that do not have their configurations
public, as autoModules = true leads to long compile times when targeting
kernels to less standard hardware or hardware with quirks that require
patches that cannot be upstreamed.

This reverts commit 3c12ef3f21.
2024-09-04 11:51:15 +10:00
Philip Taron 9e244d3d92
nixos/services.factorio: fix escapeShellArg (#339115) 2024-09-03 13:32:36 -07:00
Sandro 6e055283a9
virtualisation/azure-images: drop outdated list... (#338426) 2024-09-03 21:16:39 +02:00
Maximilian Bosch 6cc3e274c9
prometheus-openldap-exporter: remove (#338824) 2024-09-03 19:57:31 +02:00
Artturin 74065337aa
mouse-actions-gui: init at 0.4.4 (#269518) 2024-09-03 19:33:49 +03:00
Philip Taron 7f1830f117
nixos/services.thinkfan: fix undefined variables (#338951) 2024-09-03 09:18:28 -07:00