1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2024-11-19 04:02:10 +00:00
Commit graph

22859 commits

Author SHA1 Message Date
Victor Nawothnig 10933c5ccf nixos/dovecot: Allow any or no protocol 2021-08-19 11:59:43 +02:00
Jean-Paul Calderone 808125fff6
deluge-1_x: Remove older version of Deluge (#134448)
Deluge 1.x requires Python 2 which upstream has end-of-lifed.  Deluge depends
on pythonPackages.twisted, Python 2 support for which upstream has
nowdropped.  If pythonPackages.twisted is upgraded then Deluge 1.x breaks.
So, remove it instead of leaving it broken.

Deluge 2.x (deluge-2_x) is available and continues to work.
2021-08-19 09:18:18 +02:00
Wael M. Nasreddine eab36fabf6
config.hardware.onlykey: update the udev rules for onlykey
The udev rules were updated upstream without an explanation as you can
see in [this comment][commit].

[commit]: 0bcf928ada
2021-08-18 19:25:42 -07:00
Wael M. Nasreddine 1f9e019260
config.hardware.onlykey: move the module into its own folder 2021-08-18 19:25:40 -07:00
Jos van Bakel 1002ce25a0
nixos/nats: init 2021-08-18 20:18:08 +02:00
Finn Behrens cc927c650b nixos/moodle: revert to php74 for xmlrpc extension 2021-08-18 19:05:48 +02:00
Andreas Rammhold ae61a14242
Merge pull request #123046 from Flakebi/paperless
paperless-ng: init at 1.4.5
2021-08-18 14:39:03 +02:00
Elis Hirwing 6567c223ef
Merge pull request #133716 from misuzu/syncoid-permissions
nixos/syncoid: add global and per-dataset permissions options
2021-08-18 08:18:56 +02:00
zowoq f9c6dd42d9
Merge pull request #131981 from maxeaubrey/nomad_1.1.3
nomad_1_1: 1.1.2 -> 1.1.3, nomad_0_12: drop
2021-08-18 07:02:47 +10:00
Kim Lindberger 7f857f1c32
Merge pull request #133611 from talyz/discourse-2.7.7
discourse: 2.7.5 -> 2.7.7, plugin updates and fixes
2021-08-17 22:56:55 +02:00
Francesco Gazzetta ea300d1e2d shattered-pixel-dungeon: 0.9.3 -> 1.0.0 2021-08-17 22:40:48 +02:00
Lassulus 6a74d5562e
Merge pull request #132583 from blaggacao/fix/soft-force-the-file-system-layout-for-boot-media
nixos/boot-media: soft-force entire fs layout
2021-08-17 22:36:41 +02:00
Lassulus d4b27d7d33
Merge pull request #134475 from MalteT/fix/pam-config-challengeResponsePath
nixos/pam: Fix `security.pam.yubico.challengeResponsePath` type
2021-08-17 19:35:14 +02:00
nyanloutre c9fc751673 nixos/navidrome: init module and test
Co-authored-by: aciceri <andrea.ciceri@autistici.org>
Co-authored-by: nyanloutre <paul@nyanlout.re>
2021-08-17 10:32:25 -07:00
talyz f8096460bd
discourse.plugins: Make the updater able to package plugins
Let the update.py script handle the initial, repetitive task of
packaging new plugins. With this in place, the plugin only needs to be
added to the list in `update-plugins` and most of the work will be
done automatically when the script is run. Metadata still needs to be
filled in manually and some packages may of course require additional
work/patching.
2021-08-17 18:21:15 +02:00
talyz 6fd5a40cca
discourse.tests: Test the appropriate discourse package
Perform the tests on the package that the `tests` attribute is a child
of, i.e. if `discourseAllPlugins.tests` is built, the tests will run
with the `discourseAllPlugins` package, not the `discourse` package as
previously.
2021-08-17 18:20:55 +02:00
talyz bb14315d51
discourse: Remove leftover link to unused plugins directory 2021-08-17 18:17:56 +02:00
Malte Tammena 891e537592 Fix security.pam.yubico.challengeResponsePath type
The config is optional and may be left `null`.
2021-08-17 16:55:50 +02:00
Maxine Aubrey a88a7d5633
nomad: default to nomad_1_1 2021-08-17 14:54:47 +02:00
Martin Minka 22719ca7de nixos/caddy: add resume option
Without this option all changes done with Caddy API are lost after reboot.

Current service is not supporting Caddy --resume parameter. There is reference to original unit https://github.com/caddyserver/dist/blob/master/init/caddy.service which also mentions --resume and that it should be used if new Caddy API will be used.
2021-08-17 18:46:29 +09:00
Lassulus fc50593e17
Merge pull request #132553 from iceman-p/go-ethereum-snap
nixos/geth: Change default to snap sync
2021-08-17 11:32:35 +02:00
Robert Hensing 5ee8693888
Merge pull request #134030 from rnhmjoj/installer-wifi
nixos/installer: simplify and document wifi setup
2021-08-17 11:18:40 +02:00
davidak e3426d2971
Merge pull request #134340 from bjornfor/fix-release-notes
nixos: fix release notes about linux_latest version
2021-08-17 09:08:47 +02:00
Jörg Thalheim 4df44299d6
Merge pull request #73780 from h0m1/fixnix/stage-1
stage-1: create temporary secrets directory in /tmp and not in cwd
2021-08-17 06:33:42 +01:00
Maximilian Bosch a5341beb78
linux: drop *_latest_hardened-attributes in favor of versioned attributes
The problem behind this is that the hardened patchset[1]. Quite recently
this led to a weird problem when Linux 5.12 was dropped (and thus had to
be removed from `nixpkgs`), there were no patches for 5.13, so
`linuxPackages_hardened_latest` had to be downgraded to 5.10 as base[2]
which may be rather unintuitive and unexpected.

To avoid these kind of "silent downgrades" in the future, it makes sense
to drop the attribute entirely. If somebody wants to use a hardened
kernel, it's better to explicitly pin it using the newly introduced
versioned attributes, e.g. `linuxPackages_4_14_hardened`.

[1] https://github.com/anthraxx/linux-hardened/
[2] https://github.com/NixOS/nixpkgs/pull/133587
2021-08-16 20:45:58 +02:00
Robert Scott 23485f23ff
Merge pull request #133556 from risicle/ris-graphene-hardened-malloc-8
graphene-hardened-malloc: 2 -> 8, overhaul tests
2021-08-16 19:04:18 +01:00
Bjørn Forsman a37965f7c5 nixos: fix release notes about linux_latest version
It's version 5.13, not 5.12.
2021-08-16 19:32:04 +02:00
Alexandru Scvortov 8afd31c625 kubernetes: fix flaky test and run tests as group 2021-08-16 14:59:58 +01:00
Sandro e60d2657db
Merge pull request #133793 from scvalex/fix-kubernetes-1-22
kubernetes: fix breakage introduced by upgrade to 1.22
2021-08-16 15:46:10 +02:00
Maximilian Bosch 0362d572b2
Merge pull request #133675 from Ma27/test-driver-compat
nixos/test-driver: minor fixes for `nixos-build-vms(8)`
2021-08-16 14:07:01 +02:00
Stig 7d5b6f0fa2
Merge pull request #133768 from stigtsp/package/perl-mod_perl2-2.0.11-patch1
perlPackages.mod_perl2: fix build on perl-5.34.0, add nixos test
2021-08-16 12:20:59 +02:00
Michele Guerini Rocco a336bdd209
Merge pull request #103738 from netixx/openvswitch-improved-systemd
openvswitch: fix systemd integration assertion
2021-08-16 11:48:53 +02:00
Maximilian Bosch e55554491d
Merge pull request #133587 from TredwellGit/linux_5_12
linux_5_12: remove
2021-08-16 11:08:42 +02:00
misuzu 6802eb4241 nixos/syncoid: add global and per-dataset permissions options 2021-08-16 10:14:05 +03:00
Robert Hensing 1f20a1097d treewide: runCommandNoCCLocal -> runCommandLocal
It has always been a synonym.
2021-08-15 17:36:41 +02:00
Robert Hensing fbafeb7ad5 treewide: runCommandNoCC -> runCommand
This has been synonymous for ~5y.
2021-08-15 17:36:41 +02:00
Ruby Iris Juric 035dcc0e7e
nixos/nginx: fix typo in listenAdresses 2021-08-15 20:51:09 +10:00
rnhmjoj d857340c8e
nixos/installer: simplify and document wifi setup
The wpa_supplicant service in the NixOS installer is unusable because
the control socket is disabled and /etc/wpa_supplicant.conf ignored.

The manual currently recommends manually starting the daemon and using
wpa_passphrase, but this requires figuring out the interface name,
driver and only works for WPA2 personal networks.

By enabling the control socket, instead, a user can configure the
network via wpa_cli (or wpa_gui in the graphical installer), which
support more advanced network configurations.
2021-08-15 12:08:32 +02:00
Anderson Torres 5605b561ce
Merge pull request #109302 from SrTobi-Forks/tobias/grub-savedefault
nixos/grub: implements GRUB_SAVEDEFAULT feature
2021-08-14 10:35:16 -03:00
Aaron Andersen cf17e439bc
Merge pull request #133671 from jlesquembre/caddy
nixos/caddy: update ca option
2021-08-14 08:53:45 -04:00
Robert Scott dca4f32819 graphene-hardened-malloc: 2 -> 8
significantly overhaul tests to cover build-time-linking and
LD_PRELOAD use, simplifying the hardened nixos test to allow
it to reuse this test setup.
2021-08-14 11:52:11 +01:00
Andreas Rammhold 6e1421013a
paperless: remove package & module as it has been superseded by paperless-ng
The paperless project has moved on to paperless-ng and the original
paperless package in Nixpkgs has stopped working recently (due to
version incompatibility with the providede Django package).

Instead of investing more time into the old module we should migrate all
users to the new module instead.
2021-08-14 10:10:44 +02:00
Flakebi 95f2dc650d
paperless-ng: init at 1.4.5 2021-08-14 10:10:43 +02:00
Bernardo Meurer c934bb6771
nixos/hqplayerd: don't add config to restartTriggers when it doesn't exist
Previously when the use didn't set `hqplayer.config`, we would still
attempt to reference the config file in the restartTriggers, causing an
error.
2021-08-13 15:16:21 -07:00
Stig Palmquist 5e13c58f78 nixos/mod_perl: add test 2021-08-13 21:03:15 +02:00
Alexandru Scvortov 6c38bb6d5d kubernetes: fix breakage introduced by upgrade to 1.22 2021-08-13 17:55:03 +01:00
Maximilian Bosch 1ba3f7927f
nixos/testing: only create nixos-run-vms for nixos-build-vms(8)
This is the case when the test-script is empty. `nixos-build-vms(8)` is
primarily supposed to be used as tool to test changes or to reproduce
bugs (IMHO) where "just spinning up a few VMs" is the primary use-case.

In the ongoing discussion about these changes[1] it was suggested to
only expose it when needed (i.e. in the case I described above) to keep
the API surface as slim as possible.

[1] https://github.com/NixOS/nixpkgs/pull/133675#discussion_r688112485
2021-08-13 17:39:49 +02:00
edef 9451a23e9f
Merge pull request #130265 from liclac/gce-image-compression-level
google-compute-image: Add a setting for GZIP compression level
2021-08-13 14:31:08 +00:00
Maciej Krüger 03ad23df49
Merge pull request #133585 from mkg20001/fc-nginx-hash 2021-08-13 16:19:34 +02:00
Michele Guerini Rocco 95c7f7ed58
Merge pull request #118583 from rnhmjoj/roaming
nixos/wireless: add options for better roaming
2021-08-13 11:02:15 +02:00
rnhmjoj 0d082b464d
nixos/wireless: add rnhmjoj as maintainer 2021-08-13 10:16:22 +02:00
rnhmjoj 704f33c888
nixos/wireless: add one service per interface
This sets up a different systemd service for each interface. This way
each wpa_supplicant instance waits for his inteface to become ready
using the respective device unit, and that only. The configuration file
is still shared between all instances, though.

This closes a longstanding "fixme" from cbfba81.
2021-08-13 10:16:22 +02:00
Maciej Krüger 934698a378
nixos/nginx: make serverNamesHash{Bucket,Max}Size configurable 2021-08-13 07:27:39 +02:00
Artturi bb03a951c9
Merge pull request #116290 from aaronjanse/mar2021-hidpi
nixos/hidpi: add xserver dpi
2021-08-13 01:50:36 +03:00
Maximilian Bosch e1ec5acd31
nixos/test-driver: start interactive mode if testScript is empty
This is relevant for `nixos-build-vms(8)` which doesn't have a
test-script. In that case it's more intuitive to directly go into the
interactive mode which is IMHO more intuitive.
2021-08-12 23:01:03 +02:00
Maximilian Bosch 260d9cc7e1
nixos/testing: re-add nixos-run-vms script
Originally removed in 926fb93968. This
one is actually quite useful for `nixos-build-vms(8)`.
2021-08-12 22:50:29 +02:00
José Luis Lafuente 679d54dcb3
nixos/caddy: update ca option
The generated json configuration returns this warning:
the 'issuer' field is deprecated and will be removed in the future; use 'issuers' instead

Updated the config to use "issuers" instead of "issuer"

Also, now it's possible to set the ca option null to not inject
automatically any ca. This is useful if you don't want to generate any
certificates or if you want to define a more fine-graned ca config
manually (e.g.: use different ca per domain)
2021-08-12 22:02:12 +02:00
Artturi 17265bc319
Merge pull request #133622 from erikarvstedt/fix-recursive-doas
nixos/doas: fix recursive calls to doas
2021-08-12 22:39:24 +03:00
Bernardo Meurer d11ed5661e
Merge pull request #133603 from lovesegfault/hqplayerd-settings
nixos/hqplayerd: allow configuration from Nix
2021-08-12 19:30:23 +00:00
ajs124 ce278bf9d9
Merge pull request #131537 from helsinki-systems/upd/varnish
varnish: update & fix
2021-08-12 19:46:38 +02:00
ajs124 586ca51a78 varnishPackages: update default, because we dropped 6.3.x 2021-08-12 19:10:11 +02:00
Sandro 991eaaa024
Merge pull request #133607 from SuperSandro2000/SuperSandro2000-patch-1 2021-08-12 18:18:48 +02:00
Erik Arvstedt 781ab443c2
nixos/doas: fix recursive calls to doas
Previously, for processes launched by doas the unwrapped doas binary preceded the
setuid-wrapped doas binary in PATH.

This caused error `doas: not installed setuid` when running doas from
processes launched by doas.

doas seems to short-circuit the PATH lookup when called like
`doas -u myuser doas -u myuser ...` so the error doesn't appear in this case.
2021-08-12 14:40:22 +02:00
Maciej Krüger 5d73f669a8
Merge pull request #131962 from mkg20001/fc-nginx 2021-08-12 14:07:48 +02:00
Sandro 0a31b7df57
nixos/ssh: cleanup UseDNS setting 2021-08-12 12:13:10 +02:00
Bernardo Meurer e5aa940305
nixos/hqplayerd: allow configuration from Nix 2021-08-12 02:37:38 -07:00
Bernardo Meurer b43049dbd7
nixos/hqplayerd: also open controller port 2021-08-12 02:36:42 -07:00
rnhmjoj bef963963a
nixos/wireless: add options for better roaming
- Add an option to automatically launch a scan when the
signal of the current network is low

- Enable 802.11r (fast access point transition) by default for all
protected networks
2021-08-12 10:11:51 +02:00
rnhmjoj 33372e8b75
nixos/wireless: generate pretty configuration
Turns this mess

    ctrl_interface=DIR=/run/wpa_supplicant GROUP=wheel
    update_config=1

    network={
      ssid="cool-network"

      psk="ciao"

    }

    network={
      ssid="fancy-network"

      eap=PEAP
    identity="user@example.com"
    password="secret"

    }

    network={
      ssid="free-network"

      key_mgmt=NONE

    }

    network={
      ssid="raw-network"

      psk=fafafa

    }

into something more human readable:

    network={
      ssid="cool-network"
      psk="ciao"
    }

    network={
      ssid="fancy-network"
      eap=PEAP
      identity="user@example.com"
      password="secret"
    }

    network={
      ssid="free-network"
      key_mgmt=NONE
    }

    network={
      ssid="raw-network"
      psk=fafafa
    }

    ctrl_interface=/run/wpa_supplicant
    ctrl_interface_group=wheel
    update_config=1
2021-08-12 10:11:51 +02:00
Bernardo Meurer 7c122d687b
nixos/hqplayerd: sort options 2021-08-12 00:37:36 -07:00
TredwellGit 957f0485da linux_5_12: remove
https://lwn.net/ml/linux-kernel/1626791065147152@kroah.com/
2021-08-12 05:30:46 +00:00
Artturi bf7caecbf4
Merge pull request #133204 from j0hax/display-manager-start
nixos/xserver: fix a display-manager race condition
2021-08-12 03:36:48 +03:00
Artturi 34f276d133
Merge pull request #133304 from Artturin/gdmfix
nixos/gdm: disable the gdm services as it is redundant
2021-08-12 03:32:28 +03:00
Johannes Arnold 358ab44a45 nixos/xserver: fix a display-manager race condition 2021-08-12 03:17:38 +03:00
Timothy DeHerrera 90016afdb1
Merge pull request #133557 from SuperSandro2000/SuperSandro2000-patch-1
nixos/ssh: cleanup X11Forwarding setting
2021-08-11 17:18:48 -06:00
Sandro cbf6bbac91
nixos/ssh: cleanup X11Forwarding setting 2021-08-12 01:00:50 +02:00
Martin Weinelt 41eb076ed8
Merge pull request #127595 from rnhmjoj/wpa-auto
nixos/wireless: use udev to wait for interfaces
2021-08-12 00:49:33 +02:00
rnhmjoj 99e8af51b2
nixos/wireless: use udev to wait for interfaces
I may have finally found a clean solution to the issues[1][2][3] with
the automatic discovery of wireless network interfaces.

[1]: https://github.com/NixOS/nixpkgs/issues/101963
[2]: https://github.com/NixOS/nixpkgs/issues/23196
[3]: https://github.com/NixOS/nixpkgs/pull/125917#issuecomment-856000426

Currently the start script fails right away if no interface is available
by the time it's running, possibly leaving the system without network.
This happens when running a little early in the boot. A solution is to
instead wait for at least one interface to appear before scanning the
/sys/class/net/ directory. This is done here by listening for the right
udev events (from the net/wlan subsystem) using the `udevadm monitor`
command and grep to match its output.

This methods guarantees the availability of at least one interface to
wpa_supplicant, but won't add additional interfaces once it has started.
However, if the current interface is lost, say unplugged, the service is
automatically stopped and will be restarted as soon as a one (not
necessarily the same) is detected. It would be possible make this fully
dynamic by running another service that continously listen for udev
events and manages the main wpa_supplicant daemon, but this is probably
overkill.

I tested the following cases:

  - one interface, starting at boot, w/o predictable naming scheme
  - two interfaces, starting at boot (intel wireless and a usb adapter),
    w/o predictable naming scheme
  - one interface after the system booted, w/o predictable naming scheme
  - two interfaces after the system booted, w/o predictable naming scheme
  - unplugging and plugging back the current interface
2021-08-12 00:31:06 +02:00
Sandro 2e4b2ad74b
Merge pull request #126750 from d-xo/erigon-2021-06-03 2021-08-11 13:30:51 +02:00
Sandro 3e80403848
Merge pull request #133436 from nagy/port-types
treewide: Port type adaptations
2021-08-11 10:54:27 +02:00
Emery Hemingway 0ac49d7c7b nixos: rewrite uhub module
* Support for hosting multiple hubs
* Using "settings" style configuration
* Remove "uhub" user, use DynamicUser
* Configuration reloading
2021-08-11 09:51:23 +02:00
DavHau df0f76b39f cryptpad: add test for nixos module 2021-08-11 11:04:39 +09:00
Daniel Nagy 79a86e7ef5
treewide: Port type adaptations 2021-08-11 00:45:08 +02:00
Pascal Bach 1c54ce56ab nixos/minio: add release notes 2021-08-10 22:37:30 +02:00
Pascal Bach 3417f18f96 nixos/minio: allow configuring console port 2021-08-10 22:37:30 +02:00
Sandro 6df7b8f398
Merge pull request #133389 from SuperSandro2000/cleanup 2021-08-10 17:16:34 +02:00
Sandro Jäckel 4477421b05
changelog: re-add by accident deleted sections 2021-08-10 16:26:18 +02:00
Vladimír Čunát c0097aa84a
nixos/tests: unbreak the tested job
I expect it suffices that the channel only blocks on one firefox ESR
test - the one for the default ESR.  I didn't want to have the
information about the default in two places, so either of the tests will
be evaluated twice (but to the same *.drv I hope).
2021-08-10 16:15:57 +02:00
Benjamin Asbach 86296623c6 isso: added NixOS module to configure isso in NixOS 2021-08-09 17:42:54 -06:00
Benjamin Asbach c1a7bbc38f isso: added a test to verify that the server is able to start and a generated javascript file is available 2021-08-09 17:41:35 -06:00
Martin Weinelt afb0e73ebc firefox-esr-91: init at 91.0esr 2021-08-10 07:43:50 +09:00
Artturin 47f6591706 nixos/gdm: disable the gdm services as it is redundant
and causes issues
2021-08-10 01:43:38 +03:00
Pascal Bach 37d93c80c1
Merge pull request #133174 from symphorien/nagios-alias
nixos/tests/nagios.nix: fix eval
2021-08-09 23:22:55 +02:00
Félix Baylac-Jacqué 7b554c9477 nixosTests.pleroma: increase server memory size
The server VM machine is sometimes OOMing, making the test flaky.
Increasing the memory size to 512MB fixes the issue.
2021-08-09 21:30:42 +02:00
Félix Baylac-Jacqué 885ab9286e nixosTests.pleroma: increase certificate validity duration
Analogous to 6325d15e90.

The test certificate expiration date was set to the default 30 days.
This certificate is generated through its own derivation. As with
every derivation, it gets cached by cache.nixos.org once we build it.

In practice, we rebuild this derivation only if one of its input
changes. The only inputs here being openssl and stdenv.

While it's not an issue on the unstable branches, it can be
problematic on a stable release: the test will fail after 30 days.

Extending the certificate lifespan from 1 month to 100 years to prevent
it from getting expired while being cached.
2021-08-09 21:30:42 +02:00
Ryan Mulligan 33cdc784e8
Merge pull request #131545 from NickCao/influxdb2
nixos/influxdb2: init
2021-08-09 10:34:53 -07:00
Doron Behar 3d72b0b6b0
Merge pull request #114241 from sorki/tests/cntr 2021-08-09 05:40:37 +00:00
Martin Weinelt b00dd3ac1f
nixos/tests/prometheus-exporters/kea: drop enable option
There is no generic services.kea.enable option. Instead kea consists of
four daemons (dhcp4, dhcp6, ddns, ctrlagent) that can be enabled
individually. In this test we're just looking at dhcp6.
2021-08-09 01:49:54 +02:00
David Terry a74eaeba5a
erigon: 2021.05.02 -> 2021.08.01 2021-08-08 21:22:21 +02:00
Sandro c9e66e9d45
Merge pull request #111442 from helsinki-systems/wakeonlan
nixos/wakeonlan: add types
2021-08-08 20:51:27 +02:00