1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2024-11-19 04:02:10 +00:00
Commit graph

8692 commits

Author SHA1 Message Date
OPNA2608 5659ea3d6b tests/miracle-wm: init 2024-07-29 15:19:47 +02:00
Robert Hensing c38f9ee113
Merge pull request #324789 from NixOS/devShellTools-env
`devShellTools`: add environment functions
2024-07-29 10:00:40 +02:00
Jörg Thalheim 5356420466 treewide: remove unused with statements from maintainer lists
$ find -type f -name '*.nix' -print0 | xargs -P "$(nproc)" -0 sed -i \
  -e 's!with lib.maintainers; \[ *\];![ ];!' \
  -e 's!with maintainers; \[ *\];![ ];!'
2024-07-29 10:06:20 +08:00
Robert Hensing 1a70c803cb Format 2024-07-29 00:23:05 +02:00
Robert Hensing b5389e2ae9 nixosTests.docker-tools-nix-shell: Enable on aarch64-linux
The docker-tools test, where this originates, was not run on aarch64-linux, but this is an artifact of its age more so than anything else.

Co-authored-by: Ivan Trubach <mr.trubach@icloud.com>
2024-07-29 00:23:05 +02:00
Robert Hensing 6881d9b181 nixosTests.docker-tools-nix-shell: Extract
These tests should run as part of the `tests.devShellTools` suite,
and they're a significant portion of the general docker tools test
duration.
2024-07-28 23:19:56 +02:00
Vladimír Čunát a5b2fe7374
Merge #328673: staging-next 2024-07-20 2024-07-28 13:45:55 +02:00
Robert Hensing 4ca52fdf5f
Merge pull request #323613 from CyberShadow/fix-nix-path-without-channels-v2
nix-channel: do not set empty nix-path when disabling channels
2024-07-28 13:31:10 +02:00
Florian 2c5b304712
Merge pull request #219942 from vsharathchandra/druid_nix_module
nixos/druid: init module and package
2024-07-28 11:02:06 +02:00
sharath.v 99438044e7 druid: add passthru test 2024-07-28 07:20:16 +00:00
K900 24076029d2 Merge remote-tracking branch 'origin/master' into staging-next 2024-07-28 01:04:35 +03:00
Julien Malka 3d3c0f4d34
Merge pull request #330017 from Mic92/boot-counting
nixos/systemd-boot: init boot counting
2024-07-27 19:53:49 +02:00
Vladimír Čunát 64c6a981fe
Merge branch 'master' into staging-next 2024-07-27 09:18:58 +02:00
Bobby Rong eb084d18d3
Merge pull request #330174 from bobby285271/upd/pantheon
Pantheon updates 2024-07-26
2024-07-27 12:38:35 +08:00
Bobby Rong 759ee151e7
nixosTests.pantheon: Disable flaky test for closing multitasking view
org.freedesktop.DBus.Error.NoReply sometimes.
2024-07-27 11:32:27 +08:00
Silvan Mosberger b6a3ee75cd
Merge pull request #324688 from philiptaron/__attrsFailEvaluation/linuxKernel
linuxPackages: remove __attrsFailEvaluation since the attrset evaluates
2024-07-27 02:28:35 +02:00
Nick Cao 84fa4de5d8
Merge pull request #328728 from NickCao/keycloak-metrics-spi
keycloak.plugins.keycloak-metrics-spi: 5.0.0 -> 6.0.0
2024-07-26 19:21:59 -04:00
Jörg Thalheim cd8166ed1c
Merge pull request #329731 from ju1m/radicle
nixos/radicle: fix support of absolute file paths for SSH keys
2024-07-26 20:25:23 +02:00
Julien Malka 64edc7f00f nixos/systemd-boot: init boot counting
Update nixos/modules/system/boot/loader/systemd-boot/boot-counting.md

Co-authored-by: Moritz Sanft <58110325+msanft@users.noreply.github.com>
2024-07-26 20:04:37 +02:00
Martin Weinelt 93f4195fe0
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
- pkgs/applications/graphics/seamly2d/default.nix
2024-07-26 18:05:04 +02:00
K900 26801aa449 Merge remote-tracking branch 'origin/master' into staging-next 2024-07-26 14:31:21 +03:00
Sigmanificient 6dd44107ac treewide: remove unused lib (and other) arguments 2024-07-26 11:18:09 +02:00
Pol Dellaiera ceda66b310
Merge pull request #251687 from martinetd/cryptpad
nixos/cryptpad: init, cryptpad: init at 2024.6.0
2024-07-26 09:21:51 +02:00
K900 1410c766c8 Merge remote-tracking branch 'origin/master' into staging-next 2024-07-26 08:41:08 +03:00
Aleksana 19276533a7
Merge pull request #329968 from carbolymer/jackett-configurable-port
nixos/jackett: add configurable port
2024-07-26 11:23:05 +08:00
Philip Taron 38ffd739cf
linuxPackages: remove __attrsFailEvaluation since the attrset evaluates 2024-07-25 17:32:14 -07:00
Yt 60bee661ea
Merge pull request #329905 from scvalex/livebook-without-cookie
livebook: fix service not starting when LIVEBOOK_COOKIE was not set
2024-07-25 22:42:05 +00:00
Mateusz Galazyn a0906cbd16
nixos/jackett: add configurable port 2024-07-25 20:33:39 +02:00
github-actions[bot] 2567b049bd
Merge master into staging-next 2024-07-25 18:00:59 +00:00
Alexandru Scvortov 742ee97845 livebook: fix service not starting when LIVEBOOK_COOKIE was not set 2024-07-25 17:17:41 +01:00
❄️ 5f2a6de6f9
Merge pull request #328385 from rorosen/k3s-kubelet-config
nixos/k3s: add options for graceful node shutdown and kubelet config
2024-07-25 10:19:16 -03:00
Julien Moutinho 43c36273b2 nixos/radicle: fix support of absolute file paths for SSH keys 2024-07-24 22:07:53 +02:00
github-actions[bot] 7208220b63
Merge master into staging-next 2024-07-24 18:01:18 +00:00
Robert Hensing c5e5aa7266
Merge pull request #308822 from yorickvP/yorickvp/streamLayeredImage-overridable
dockerTools.streamLayeredImage: add includeNixDB argument, expose conf and streamScript
2024-07-24 16:02:35 +02:00
Peder Bergebakken Sundt 24899eea99
Merge pull request #327184 from bhankas/goatcounter
nixos/goatcounter: init
2024-07-24 15:38:27 +02:00
github-actions[bot] 8402add1f4
Merge master into staging-next 2024-07-24 12:01:12 +00:00
Yaya 66f9d60dd7 nixosTests.gitlab: add git package 2024-07-24 10:51:55 +02:00
Dominique Martinet 7c448e8d44 nixos/cryptpad: harden service
cryptpad is not directly exposed to the network, but has plenty that can
be hardened more properly, so fix that.
2024-07-24 16:17:32 +09:00
Dominique Martinet b846e8762f nixos/cryptpad: init
This is a full rewrite independent of the previously removed cryptpad
module, managing cryptpad's config in RFC0042 along with a shiny test.

Upstream cryptpad provides two nginx configs, with many optimizations
and complex settings; this uses the easier variant for now but
improvements (e.g. serving blocks and js files directly through nginx)
should be possible with a bit of work and care about http headers.

the /checkup page of cryptpad passes all tests except HSTS, we don't
seem to have any nginx config with HSTS enabled in nixpkgs so leave this
as is for now.

Co-authored-by: Pol Dellaiera <pol.dellaiera@protonmail.com>
Co-authored-by: Michael Smith <shmitty@protonmail.com>
2024-07-24 16:17:26 +09:00
Payas Relekar aebb3d3474 nixos/goatcounter: init 2024-07-24 10:17:44 +05:30
github-actions[bot] d284ef371e
Merge master into staging-next 2024-07-23 12:01:18 +00:00
Florian a161b380a9
Merge pull request #328205 from litchipi/ifm
ifm: init at 4.0.2
2024-07-23 09:35:56 +02:00
Litchi Pi 0fb7268b9b Init IFM service at version 4.0.2
Signed-off-by: Litchi Pi <litchi.pi@proton.me>
2024-07-23 08:44:50 +02:00
github-actions[bot] 09a27d5bc1
Merge master into staging-next 2024-07-23 00:02:18 +00:00
Franz Pletz b12aaa9f9b
Merge pull request #316139 from Luflosi/bind-service-wait-for-ready-status 2024-07-23 00:19:53 +02:00
Artturin 60e9cffe2c Merge branch 'master' into staging-next 2024-07-22 22:53:31 +03:00
nikstur be0df72dfa
Merge pull request #328926 from nikstur/sysusers-only-for-sysusers
Sysusers only for sysusers
2024-07-22 20:55:58 +02:00
Sandro 4b97ce3bc4
Merge pull request #322095 from illustris/hadoop_3_4
hadoop: init 3.4, drop 3.2
2024-07-21 21:24:10 +02:00
Sandro af3e8fe556
Merge pull request #322173 from illustris/hbase
hbase: version upgrades
2024-07-21 21:23:28 +02:00
nikstur 2710a49adb nixos/systemd-sysusers: stop creating users statically
On Linux we cannot feasbibly generate users statically because we need
to take care to not change or re-use UIDs over the lifetime of a machine
(i.e. over multiple generations). This means we need the context of the
running machine.

Thus, stop creating users statically and instead generate them at
runtime irrespective of mutableUsers.

When /etc is immutable, the password files (e.g. /etc/passwd etc.) are
created in a separate directory (/var/lib/nixos/etc). /etc will be
pre-populated with symlinks to this separate directory.

Immutable users are now implemented by bind-mounting the password files
read-only onto themselves and only briefly re-mounting them writable to
re-execute sysusers. The biggest limitation of this design is that you
now need to manually unmount this bind mount to change passwords because
sysusers cannot change passwords for you. This shouldn't be too much of
an issue because system users should only rarely need to change their
passwords.
2024-07-21 16:23:11 +02:00