summary refs log tree commit diff
path: root/nixos/modules/profiles
Commit message (Collapse)AuthorAge
* nixos/*: automatically convert option docspennae2022-08-06
|
* Merge pull request #143885 from peat-psuwit/all-hardware-reset-raspberryK9002022-08-04
|\ | | | | profiles/all-hardware.nix: add reset-raspberry for USB on RPi 4
| * profiles/all-hardware.nix: add reset-raspberry for USB on RPi 4Ratchanan Srirattanamet2021-11-13
| | | | | | | | | | | | | | This is needed for USB to work on RPi 4. Kernel's defconfig demoted the module from built-in to module in 5.14. See [1]. [1] https://lore.kernel.org/linux-arm-kernel/ab43364b-55cc-08e6-a647-6e50a1743f03@gmail.com/
* | treewide: use isAarch where appropriateAlyssa Ross2022-07-30
| |
* | nixos/i18n: don't build all supportedLocales by defaultSandro Jäckel2022-06-11
| |
* | Merge pull request #169113 from ElvishJerricco/systemd-stage-1-installer-testsBernardo Meurer2022-04-30
|\ \ | | | | | | nixos: Installer tests for systemd stage 1
| * | nixos: Installer tests for systemd stage 1Will Fancher2022-04-17
| | |
* | | nixos/*qemu*: Add systemd initrd supportJanne Heß2022-04-30
| | |
* | | nixos/modules/profiles/all-hardware: add nvme to initrd modulesBernardo Meurer2022-04-26
|/ /
* | nixos/nix-daemon: use structural settingspolykernel2022-01-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The `nix.*` options, apart from options for setting up the daemon itself, currently provide a lot of setting mappings for the Nix daemon configuration. The scope of the mapping yields convience, but the line where an option is considered essential is blurry. For instance, the `extra-sandbox-paths` mapping is provided without its primary consumer, and the corresponding `sandbox-paths` option is also not mapped. The current system increases the maintenance burden as maintainers have to closely follow upstream changes. In this case, there are two state versions of Nix which have to be maintained collectively, with different options avaliable. This commit aims to following the standard outlined in RFC 42[1] to implement a structural setting pattern. The Nix configuration is encoded at its core as key-value pairs which maps nicely to attribute sets, making it feasible to express in the Nix language itself. Some existing options are kept such as `buildMachines` and `registry` which present a simplified interface to managing the respective settings. The interface is exposed as `nix.settings`. Legacy configurations are mapped to their corresponding options under `nix.settings` for backwards compatibility. Various options settings in other nixos modules and relevant tests have been updated to use structural setting for consistency. The generation and validation of the configration file has been modified to use `writeTextFile` instead of `runCommand` for clarity. Note that validation is now mandatory as strict checking of options has been pushed down to the derivation level due to freeformType consuming unmatched options. Furthermore, validation can not occur when cross-compiling due to current limitations. A new option `publicHostKey` was added to the `buildMachines` submodule corresponding to the base64 encoded public host key settings exposed in the builder syntax. The build machine generation was subsequently rewritten to use `concatStringsSep` for better performance by grouping concatenations. [1] - https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md
* | all-hardware: Add virtio_mmio moduleZhaofeng Li2022-01-06
| |
* | all-hardware: Disable VMWare and Hyper-V modules on non-X86 platformsZhaofeng Li2022-01-06
| |
* | Merge pull request #146288 from Artturin/mtoolsandsuchArtturi2021-11-19
|\ \
| * | profiles/base: add mtoolsArtturin2021-11-17
| |/
* / nixos/profiles/minimal: disable command-not-foundArtturin2021-11-16
|/ | | | reduces size by about 1M
* NixOS AWS AMI: enable the serial console on ttyS0Your Name2021-08-20
|
* nixos/installer: simplify and document wifi setuprnhmjoj2021-08-15
| | | | | | | | | | | | | The wpa_supplicant service in the NixOS installer is unusable because the control socket is disabled and /etc/wpa_supplicant.conf ignored. The manual currently recommends manually starting the daemon and using wpa_passphrase, but this requires figuring out the interface name, driver and only works for WPA2 personal networks. By enabling the control socket, instead, a user can configure the network via wpa_cli (or wpa_gui in the graphical installer), which support more advanced network configurations.
* Merge pull request #85073 from hyperfekt/systemd-pstoreFlorian Klink2021-05-17
|\ | | | | nixos/systemd|filesystems: mount and evacuate /sys/fs/pstore using systemd-pstore
| * nixos/systemd: enable systemd-pstore.servicehyperfekt2021-05-09
| | | | | | | | | | As described in issue #81138, the Install section of upstream units is currently ignored, so we make it part of the sysinit.target manually.
* | Merge master into staging-nextgithub-actions[bot]2021-05-14
|\ \
| * \ Merge pull request #110435 from superloach/patch-2Samuel Dionne-Riel2021-05-13
| |\ \ | | |/ | |/| nixos/modules: add "sdhci_pci" to availableKernelModules
| | * nixos/modules: add "sdhci_pci" to availableKernelModulesTerra Brown2021-01-21
| | | | | | | | | Encountered issues booting the live image on an Acer R11 Chromebook (CYAN). Got help from @samueldr on Freenode, and adding this module fixed it. Likely useful for other platforms/situations where booting from SD is necessary.
* | | Merge master into staging-nextgithub-actions[bot]2021-05-08
|\| |
| * | profiles/all-hardware.nix: Add vc4 for broadcom hardwareSamuel Dionne-Riel2021-05-04
| | | | | | | | | | | | Namely, early KMS on raspberry pi
| * | profiles/all-hardware.nix: Share some config for all ARMSamuel Dionne-Riel2021-05-04
| | |
| * | profiles/all-hardware.nix: Fix for arvmv7l-linuxSamuel Dionne-Riel2021-05-04
| | |
| * | profiles/all-hardware.nix: Add analogix-dpSamuel Dionne-Riel2021-05-04
| | | | | | | | | | | | | | | While it's being brought in implicitly by the other analogix driver, let's be explicit, in case things change.
| * | profiles/all-hardware.nix: Add regulator needed for rockchipSamuel Dionne-Riel2021-05-04
| | | | | | | | | | | | But not exclusive to rockchip
| * | profiles/all-hardware.nix: Add rockchip modulesSamuel Dionne-Riel2021-05-04
| | |
| * | profiles/all-hardware.nix: Add support for Raspberry Pi 4 USBSamuel Dionne-Riel2021-05-04
| | |
| * | profiles/all-hardware.nix: Add power regulator modulesSamuel Dionne-Riel2021-05-04
| | | | | | | | | | | | | | | This is used on some allwinner platforms, and is a weak dependency for USB to work.
| * | profiles/all-hardware.nix: Add modules for integrated displaysSamuel Dionne-Riel2021-05-04
| | | | | | | | | | | | Namely, this is used by the pinebook's display
| * | profiles/all-hardware.nix: Add support for Allwinner hardwareSamuel Dionne-Riel2021-05-04
| | |
| * | profiles/all-hardware.nix: Add simplefb for AArch64Samuel Dionne-Riel2021-05-04
| | |
* | | nixos/apparmor: disable killUnconfinedConfinables by defaultJulien Moutinho2021-04-23
|/ /
* | nixos/hidepid: drop the module as the hidepid mount option is brokenDominik Xaver Hörl2021-02-21
| | | | | | | | | | This has been in an unusable state since the switch to cgroups-v2. See https://github.com/NixOS/nixpkgs/issues/73800 for details.
* | qemu-guest: remove security.rngd settingErik Arvstedt2021-01-27
|/ | | | | | | Since release 20.09 `rngd.enable` defaults to false, so this setting is redundant. Also fix the `qemu-quest` section of the manual that incorrectly claimed that `rngd` was enabled.
* nixos ISO image: revert another part of 8ca33835baVladimír Čunát2021-01-13
|
* nixos: fixup build of aarch64 minimal ISO (fixes #109252)Vladimír Čunát2021-01-13
| | | | Perhaps it's not pretty nor precise; feel free to improve.
* nixos/getty: rename from services.mingettyAlyssa Ross2021-01-05
| | | | | | | | | | It's been 8.5 years since NixOS used mingetty, but the option was never renamed (despite the file definining the module being renamed in 9f5051b76c1 ("Rename mingetty module to agetty")). I've chosen to rename it to services.getty here, rather than services.agetty, because getty is implemantation-neutral and also the name of the unit that is generated.
* profiles/hardened: Add note about potential instabilitytalyz2021-01-04
| | | | | | | Enabling the profile can lead to hard-to-debug issues, which should be warned about in addition to the cost in features and performance. See https://github.com/NixOS/nixpkgs/issues/108262 for an example.
* nixos/hardened: update blacklisted filesystemsTredwellGit2020-09-27
| | | | https://github.com/openSUSE/suse-module-tools/blob/241a1582698c6a7f96f877a5ec64f478fdf90c82/suse-module-tools.spec#L24
* nixos/installer: enable sshd by defaultJörg Thalheim2020-09-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Right now the UX for installing NixOS on a headless system is very bad. To enable sshd without physical steps users have to have either physical access or need to be very knowledge-able to figure out how to modify the installation image by hand to put an `sshd.service` symlink in the right directory in /nix/store. This is in particular a problem on ARM SBCs (single board computer) but also other hardware where network is the only meaningful way to access the hardware. This commit enables sshd by default. This does not give anyone access to the NixOS installer since by default. There is no user with a non-empty password or key. It makes it easy however to add ssh keys to the installation image (usb stick, sd-card on arm boards) by simply mounting it and adding a keys to `/root/.ssh/authorized_keys`. Importantly this should not require nix/nixos on the machine that prepare the installation device and even feasiable on non-linux systems by using ext4 third party drivers. Potential new threats: Since this enables sshd by default a potential bug in openssh could lead to remote code execution. Openssh has a very good track-record over the last 20 years, which makes it far more likely that Linux itself would have a remote code execution vulnerability. It is trusted by millions of servers on many operating systems to be exposed to the internet by default. Co-authored-by: Samuel Dionne-Riel <samuel@dionne-riel.com>
* nixos/security/misc: add option unprivilegedUsernsCloneIzorkin2020-08-25
|
* nixos/systemPackages: clean up (#91213)davidak2020-08-20
| | | | | | | | | | | | | | * nixos/systemPackages: clean up * Update nixos/doc/manual/release-notes/rl-2009.xml Co-authored-by: Jan Tojnar <jtojnar@gmail.com> * Update nixos/doc/manual/release-notes/rl-2009.xml Co-authored-by: 8573 <8573@users.noreply.github.com> Co-authored-by: Jan Tojnar <jtojnar@gmail.com> Co-authored-by: 8573 <8573@users.noreply.github.com>
* nixos/displayManager: make autoLogin options independent of DM typeworldofpeace2020-07-09
| | | | Co-authored-by: volth <volth@volth.com>
* Merge pull request #74378 from ttuegel/lxc-containeradisbladis2020-04-25
|\ | | | | docker-container: Remove /etc symlink
| * docker-container: Remove /etc symlinkThomas Tuegel2019-11-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The system output usually contains a symlink from /etc to the static configuration for the benefit of the stage-1 script in the initrd. The stage-2 script is usually started in the real root without such a symlink. In a container, there is no stage-1 and the system output is used directly as a real root. If the symlink is present, setup-etc.pl will create a symlink cycle and the system cannot boot. There is no reason for the /etc link to exist in a container because setup-etc.pl will create the necessary files. The container module will now remove the /etc symlink and create an empty directory. The empty /etc is for container managers to populate it with site-specific settings; for example, to set the hostname. This is required to boot NixOS in an LXC container on another host. See also: #9735
* | nixos/hardened: add emily to maintainersEmily2020-04-17
| |
* | nixos/hardened: enable user namespaces for rootEmily2020-04-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | linux-hardened sets kernel.unprivileged_userns_clone=0 by default; see anthraxx/linux-hardened@104f44058f058a395502192c4939645df6f52ecb. This allows the Nix sandbox to function while reducing the attack surface posed by user namespaces, which allow unprivileged code to exercise lots of root-only code paths and have lead to privilege escalation vulnerabilities in the past. We can safely leave user namespaces on for privileged users, as root already has root privileges, but if you're not running builds on your machine and really want to minimize the kernel attack surface then you can set security.allowUserNamespaces to false. Note that Chrome's sandbox requires either unprivileged CLONE_NEWUSER or setuid, and Firefox's silently reduces the security level if it isn't allowed (see about:support), so desktop users may want to set: boot.kernel.sysctl."kernel.unprivileged_userns_clone" = true;