1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2024-11-18 11:40:45 +00:00
Commit graph

31800 commits

Author SHA1 Message Date
Bobby Rong 22b54a6e7f
cinnamon-gsettings-overrides: Move from cinnamon scope to top-level 2024-07-23 22:12:42 +08:00
Bobby Rong ab6606dfb8
cinnamon-screensaver: Move from cinnamon scope to top-level 2024-07-23 22:12:42 +08:00
Bobby Rong d1a7acfc47
cinnamon-common: Move from cinnamon scope to top-level 2024-07-23 22:12:41 +08:00
Bobby Rong 6fd4a53e3e
cinnamon-control-center: Move from cinnamon scope to top-level 2024-07-23 22:12:41 +08:00
Bobby Rong bf4ffb38d0
cinnamon-session: Move from cinnamon scope to top-level 2024-07-23 22:12:41 +08:00
Bobby Rong f3d0454e4a
nemo-with-extensions: Move from cinnamon scope to top-level 2024-07-23 22:12:40 +08:00
Bobby Rong 925db507a8
nemo: Move from cinnamon scope to top-level 2024-07-23 22:00:19 +08:00
Bobby Rong e5373c3e6c
cinnamon-settings-daemon: Move from cinnamon scope to top-level 2024-07-23 22:00:18 +08:00
Bobby Rong e8fd435f36
cinnamon-translations: Move from cinnamon scope to top-level 2024-07-23 22:00:18 +08:00
Bobby Rong 6f102799e7
cinnamon-menus: Move from cinnamon scope to top-level 2024-07-23 22:00:18 +08:00
Bobby Rong 3fba5befb1
cinnamon-desktop: Move from cinnamon scope to top-level 2024-07-23 22:00:18 +08:00
Franz Pletz 38953c157e
Merge pull request #326369 from getchoo/nixos/nvidia/modesetting 2024-07-23 14:16:56 +02:00
Florian a161b380a9
Merge pull request #328205 from litchipi/ifm
ifm: init at 4.0.2
2024-07-23 09:35:56 +02:00
Litchi Pi 0fb7268b9b Init IFM service at version 4.0.2
Signed-off-by: Litchi Pi <litchi.pi@proton.me>
2024-07-23 08:44:50 +02:00
Franz Pletz b12aaa9f9b
Merge pull request #316139 from Luflosi/bind-service-wait-for-ready-status 2024-07-23 00:19:53 +02:00
Pol Dellaiera 771c4624ed
Merge pull request #328713 from mweinelt/ollama-sandbox-issue
nixos/ollama: replace flawed sandboxing option
2024-07-22 22:21:16 +02:00
nikstur be0df72dfa
Merge pull request #328926 from nikstur/sysusers-only-for-sysusers
Sysusers only for sysusers
2024-07-22 20:55:58 +02:00
Bruno BELANYI 87a80cdaf9
Merge pull request #329112 from ambroisie/tandoor-module
nixos/tandoor-recipes: revert 'GUNICORN_MEDIA=1'
2024-07-22 15:48:52 +01:00
Bobby Rong 3e9b9159cb
Merge pull request #327144 from bobby285271/upd/cinnamon-xapps-by-name
Move various packages out of cinnamon scope
2024-07-22 21:33:16 +08:00
Martin Weinelt fe58e8856f
nixos/ollama: make host example dualstack wildcard
Binding to IPv6 wildcard generally binds dual-stack, which is also a
better example because the way to specify it is not always very clear.
2024-07-22 14:51:40 +02:00
Martin Weinelt 12897b37a8
nixos/ollama: harden systemd unit
Tested with CPU and CUDA acceleration. Researched for ROCm, but I have no
compatible card to test it with.
2024-07-22 14:51:40 +02:00
Martin Weinelt be7bce879f
nixos/ollama: remove writablePaths option
Making the models directory always writable is much simpler, than having
to watch out for an option to facilitate that.
2024-07-22 14:51:39 +02:00
Martin Weinelt 809ea5c6bd
nixos/ollama: replace flawed sandboxing option
The ollama module in its default configuration relies on systemd's
`DynamicUser=` feature for user allocation. In #305076 that allocation
was made conditional and tied to the `sandboxing` option, that was
intended to fix access to model directories outside the allocated state
directory.

However, by disabling sandboxing ollama would inadvertently run as root,
given that `User=` and `Group=` are not required to be set.

The correct way to grant access to other paths is to allocate static
user and group, and grant permissions to the destination path to that
allocation.

We therefore replace the sandboxing option user and group options, that
default to `null`, which means they default to `DynamicUser=`, but can
be replaced with a statically allocated user/group, and thereby a stable
uid/gid.

Fixes: 552eb759 ("nixos/ollama: add options to bypass sandboxing")
2024-07-22 14:51:39 +02:00
Bruno BELANYI c8f2bb1b65 nixos/tandoor-recipes: revert 'GUNICORN_MEDIA=1'
Quoting from upstream's documentation [1]:

> Basically everyone recommends not doing this. Please use [a webserver]
> to handle media file serving.

Given that this commit broke the module for unrelated reasons, I've
decided to just revert it and let downstream users make the choice of
easy vs. secure.

[1]: https://docs.tandoor.dev/system/configuration/#gunicorn-media

This reverts commit e8c56de827.
2024-07-22 09:17:41 +00:00
PopeRigby a5eaa1df10
nixos/scrutiny: enable collector by default if scrutiny is enabled (#329069) 2024-07-22 07:38:45 +01:00
Aleksana b841e48094
Merge pull request #329018 from Aleksanaa/nixos/appimage
nixos/appimage: minor fix eval
2024-07-22 07:57:16 +08:00
aleksana 71b3f89bee nixos/appimage: minor fix eval 2024-07-22 07:47:00 +08:00
Sohalt c11439943d
nixos/containers: add wants and after dependency for network interfaces (#153234)
Co-authored-by: Franz Pletz <fpletz@fnordicwalking.de>
2024-07-22 01:22:19 +02:00
Marcus Ramberg 585a077fd2
Merge pull request #327665 from bolives-hax/add-qemu-s390x-binfmt
added s390x option type via magic attributes
2024-07-21 23:12:55 +02:00
Sandro 49831e2e65
Merge pull request #328604 from illustris/pve-kvm
nixos/proxmoxImage: fix build
2024-07-21 21:23:06 +02:00
bl0v3 e83fc89111 nixos/binfmt: added s390x option type via magic attributes 2024-07-21 20:17:16 +02:00
Bobby Rong d114d56aad
nixos/cinnamon: Do not use "with pkgs.cinnamon"
Otherwise with allowAliases enabled, the aliases are preferred and used,
spamming deprecation warnings.
2024-07-22 01:02:17 +08:00
Bobby Rong 508637b0e3
xapp: Move from cinnamon scope to top-level
* The timeshift changes are used to make by-name check happy.
* More by-name changes in the next commit.
2024-07-22 01:02:16 +08:00
Atemu f6d4f4f055
Merge pull request #328662 from Aleksanaa/nixos/appimage
nixos/appimage: support both type-1 and type-2 appimages in binfmt
2024-07-21 17:44:39 +02:00
Sandro 4cc8b29327
Merge pull request #299599 from SuperSandro2000/kde-pim
programs/kde-pim: init
2024-07-21 16:26:01 +02:00
nikstur 2ca04530c9 nixos/systemd-sysusers: assert against password and hashedPassword
Regardless of mutable or immutable users, systemd-sysupdate never
updates existing user records and thus will for example never change
passwords for you.

It only support initial passwords and now actively asserts agains other
paswords.
2024-07-21 16:23:11 +02:00
nikstur 2710a49adb nixos/systemd-sysusers: stop creating users statically
On Linux we cannot feasbibly generate users statically because we need
to take care to not change or re-use UIDs over the lifetime of a machine
(i.e. over multiple generations). This means we need the context of the
running machine.

Thus, stop creating users statically and instead generate them at
runtime irrespective of mutableUsers.

When /etc is immutable, the password files (e.g. /etc/passwd etc.) are
created in a separate directory (/var/lib/nixos/etc). /etc will be
pre-populated with symlinks to this separate directory.

Immutable users are now implemented by bind-mounting the password files
read-only onto themselves and only briefly re-mounting them writable to
re-execute sysusers. The biggest limitation of this design is that you
now need to manually unmount this bind mount to change passwords because
sysusers cannot change passwords for you. This shouldn't be too much of
an issue because system users should only rarely need to change their
passwords.
2024-07-21 16:23:11 +02:00
nikstur d43e323b4a nixos/systemd-sysusers: only create systemusers
systemd-sysusers cannot create normal users (i.e. with a UID > 1000).
Thus we stop trying an explitily only use systemd-sysusers when there
are no normal users on the system (e.g. appliances).
2024-07-21 16:22:01 +02:00
Bobby Rong 350a70036a
mint-themes: Move from cinnamon scope to top-level 2024-07-21 21:17:11 +08:00
Bobby Rong 2359076f1f
mint-y-icons: Move from cinnamon scope to top-level 2024-07-21 21:17:10 +08:00
Bobby Rong c09bdb5d5e
mint-cursor-themes: Move from cinnamon scope to top-level 2024-07-21 21:17:09 +08:00
Franz Pletz 1a3c164570
Merge pull request #328682 from fpletz/nixos/fix-proxmox-lxc 2024-07-21 09:09:40 +02:00
Adam C. Stephens 65ef67740b
Merge pull request #328665 from adamcstephens/incus/fix-lts-unstable
incus: fix OVMF path backward compatibility
2024-07-20 14:09:46 -04:00
lassulus e209fc2f2f
Merge pull request #241373 from nikstur/qemu-vm-simplify-nix-store-image
nixos/qemu-vm: simplify building nix store image
2024-07-20 19:27:40 +02:00
Franz Pletz ceafec213f
nixos/proxmox-lxc: fix nixos-rebuild
Same is being done in lxc-container module.
2024-07-20 16:54:29 +02:00
Franz Pletz c501d3fa97
nixos/proxmox-lxc: fix getty start
Otherwise there is no getty on tty1 in Proxmox.
2024-07-20 16:54:28 +02:00
Franz Pletz 4aa419c046
nixos/proxmox-lxc: reformat 2024-07-20 16:54:28 +02:00
Franz Pletz 7c67f72893
Merge pull request #320075 from illustris/pve-lxc-ping-fix 2024-07-20 16:52:05 +02:00
Arian van Putten 8afba669e2 nixos/wrappers: use normal mount for /run/wrappers
We want to get rid of specialFileSystems / earlyMountScript eventually and
there is no need to run this before systemd anymore now that
the wrappers themselves are set up in a systemd unit since https://github.com/NixOS/nixpkgs/pull/263203

Also this is needed to make soft-reboot work. We want to make sure
that we remount /run/wrappers with the nosuid bit removed on soft-reboot
but because @earlyMountScript@ happens in initrd, this wouldn't happen
2024-07-20 16:07:43 +02:00
Adam Stephens 28922c4421
incus: fix OVMF path backward compatibility
incus 6.3.0 changed the OVMF path, but our module needs to support LTS
as well. Also move the newer OCI deps to be conditional on version.
2024-07-20 09:54:07 -04:00