summary refs log tree commit diff
path: root/nixos/modules
Commit message (Collapse)AuthorAge
* nixos/resolvconf: allow disablingAlyssa Ross2022-03-22
| | | | | | | For systems without internet connections, it doesn't make sense to require the existence of an /etc/resolv.conf file to disable resolvconf, so let's expose networking.resolveconf.enable as a public option that can be set to false.
* WIPAlyssa Ross2022-03-22
|
* Merge pull request #164330 from Luflosi/fix-tor-client-disableSandro2022-03-20
|\
| * nixos/tor: fix services.tor.client.enable = false not workingLuflosi2022-03-15
| | | | | | | | | | If `services.tor.client.enable` is set to false (the default), the `SOCKSPort` option is not added to the torrc file but since Tor defaults to listening on port 9050 when the option is not specified, the tor client is not actually disabled. To fix this, simply set `SOCKSPort` to 0, which disables the client. Use `mkForce` to prevent potentially two different `SOCKSPort` options in the torrc file, with one of them being 0 as this would cause Tor to fail to start. When `services.tor.client.enable` is set to false, this should always be disabled.
* | nixos/oauth2_proxy: add missing oidc providers (#164632)Benjamin Staffin2022-03-20
| | | | | | | | - Add adfs and keycloak-oidc providrs - Sort the list alphabetically
* | Merge pull request #163860 from delroth/synapse-rl-fixpennae2022-03-20
|\ \ | | | | | | matrix-synapse: fix release notes and doc for #158605 changes
| * | matrix-synapse: fix release notes and doc for #158605 changesPierre Bourdon2022-03-12
| | |
* | | Merge #164895: nixos displayManager.session: drop typeVladimír Čunát2022-03-19
|\ \ \
| * | | nixos services.xserver.displayManager.session: drop typeVladimír Čunát2022-03-19
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | For now at least. I expect someone will find a working type later. It's incorrect and was causing bad issues. Example test case: nix-instantiate nixos/release.nix -A tests.xfce.x86_64-linux --dry-run This is a partial revert of commit b2d803c from PR #162271.
* | | | Merge pull request #164398 from NinjaTrappeur/nin/pleroma-wrappersNinjatrappeur2022-03-19
|\ \ \ \ | |/ / / |/| | |
| * | | nixos/pleroma: regenerate empty release cookie filesFélix Baylac-Jacqué2022-03-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Since b9cfbcafdf0ca9573de1cdc06137c020e70e44a8, the lack of hexdump in the closure lead to the generation of empty cookie files. This empty cookie file is making pleroma to crash at startup now we correctly read it. We introduce a migration forcing these empty cookies to be re-generated to something not empty.
| * | | nixos/pleroma: inject release cookie path to the pleroma packageFélix Baylac-Jacqué2022-03-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We inject the release cookie path to the pleroma derivation in order to wrap pleroma_ctl with it. Doing this allows us to remove the systemd-injected RELEASE_COOKIE path, which was sadly buggy (RELEASE_COOKIE should point to the *content* of the cookie, not the file containing it). We take advantage of this to factor out the cookie path.
* | | | Merge pull request #164735 from lopsided98/nixos-enter-cleanupArtturi2022-03-19
|\ \ \ \ | | | | | | | | | | nixos/nixos-enter: fix resolv.conf error handling and cleanup
| * | | | nixos/nixos-enter: cleanup resolv.conf handlingBen Wolsieffer2022-03-18
| | | | |
| * | | | nixos/nixos-enter: fix resolv.conf error handlingBen Wolsieffer2022-03-18
| | | | |
* | | | | Merge pull request #164367 from jpathy/patch-2pennae2022-03-18
|\ \ \ \ \ | | | | | | | | | | | | networking.greTunnels: support ip6gre*
| * | | | | networking.greTunnels: support ip6gre*jpathy2022-03-17
| | | | | |
* | | | | | Merge pull request #164624 from ↵Artturi2022-03-18
|\ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | mart-w/fix/nixos/paperless-ng-fix-164615-consumation-bug nixos/paperless-ng: fix #164615
| * | | | | | nixos/paperless-ng: fix #164615Martin Wurm2022-03-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add an exception to the `paperless-ng-server` service's `SystemCallFilter` as the `mbind` syscall is needed when consuming a document while having a classification model present.
* | | | | | | Merge pull request #77622 from R-VdP/nixos-upgrade-reboot-windowSilvan Mosberger2022-03-17
|\ \ \ \ \ \ \ | |/ / / / / / |/| | | | | | NixOS/auto-upgrade: offer the possibility to define a reboot window during which the system may be automatically rebooted
| * | | | | | NixOS/auto-upgrade: offer the possibility to define a reboot window during ↵R-VdP2022-03-09
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | which the system may be automatically rebooted Some systems should not be rebooted at just any time. If the upgrade process takes too long, for instance because of a slow internet connection, or if the upgrade service is ran during production hours, we want to allow to define a window outside of which a reboot will not be performed. The system will then reboot on the next run of the upgrade service which finishes inside the reboot window. E.g. we can run the update service twice per week, once during the night and once during the day, but reboots are only allowed during the night. By doing so, a system that is usually shut down during the night will still receive updates and systems that are turned on 24/7 can be rebooted outside of production hours. Co-authored-by: Silvan Mosberger <github@infinisil.com>
* | | | | | | Revert "nixos/modprobe: add boot.initrd.extraModprobeConfig option"Luflosi2022-03-17
| |_|/ / / / |/| | | | | | | | | | | | | | | | | This reverts commit 1c58cdbeed880e99d816c234a954d4cdfc073b6c, since this change was made redundant by 3dc6fab5c9362db2cf079ffa15f2b62b05001747 and in https://github.com/NixOS/nixpkgs/pull/145013 we decided to revert this commit.
* | | | | | Merge pull request #162271 from Infinisil/warn-no-typeRobert Hensing2022-03-16
|\ \ \ \ \ \ | | | | | | | | | | | | | | Throw an error for options without a type
| * | | | | | nixos/treewide: Add last missing option typesSilvan Mosberger2022-02-28
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Co-Authored-By: Janne Heß <janne@hess.ooo>
* | | | | | | Merge pull request #164270 from alyssais/locate-pruneNamesSandro2022-03-16
|\ \ \ \ \ \ \
| * | | | | | | nixos/locate: disable default findutils pruneNamesAlyssa Ross2022-03-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It doesn't make sense to have a default value for this that's incompatible with the default locate implementation. It means that just doing services.locate.enable = true; generates a warning, even if you don't care about pruning anything. So only use the default prune list if the locate implementation supports it (i.e., isn't findutils).
* | | | | | | | Merge pull request #164317 from bobvanderlinden/pr-move-systemd-fns-libRobert Hensing2022-03-16
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | nixos: systemd: split off helper functions into systemd-lib
| * | | | | | | | nixos: systemd: split off helper functions into systemd-libBob van der Linden2022-03-15
| | |_|_|_|_|_|/ | |/| | | | | |
* | | | | | | | Merge pull request #164313 from Ma27/drop-nextcloud21Maximilian Bosch2022-03-16
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | nextcloud21: remove
| * | | | | | | | nextcloud21: removeMaximilian Bosch2022-03-15
| | |_|_|_|_|/ / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | EOLed by upstream in 2022-02[1]. [1] https://docs.nextcloud.com/server/23/admin_manual/release_schedule.html#older-versions
* | | | | | | | Merge pull request #154004 from illustris/hadoopArtturi2022-03-16
|\ \ \ \ \ \ \ \ | |_|_|_|_|_|/ / |/| | | | | | |
| * | | | | | | nixos/hadoop: add module options for commonly used service configsillustris2022-03-11
| | | | | | | |
| * | | | | | | nixos/hadoop: use CGroups to enforce container limits by defaultillustris2022-03-11
| | | | | | | |
| * | | | | | | nixos/hadoop: add gateway roleillustris2022-03-11
| | | | | | | |
| * | | | | | | nixos/hadoop: fix tests for hadoop 2 and 3.2illustris2022-03-11
| | | | | | | |
| * | | | | | | nixos/hadoop: use FairScheduler by defaultillustris2022-03-11
| | | | | | | |
| * | | | | | | nixos/hadoop: add HADOOP_CONF_DIR to envillustris2022-03-11
| | | | | | | |
| * | | | | | | nixos/hadoop: disable openFirewall by defaultillustris2022-03-11
| | | | | | | |
| * | | | | | | nixos/hadoop: refactor HDFS configsillustris2022-03-11
| | | | | | | |
| * | | | | | | nixos/hadoop: refactor HDFS optionsillustris2022-03-09
| | | | | | | |
| * | | | | | | nixos/hadoop: fix mkenableoption textillustris2022-03-09
| | | | | | | |
* | | | | | | | Merge pull request #164068 from cab404/masterAlexander Bantyev2022-03-16
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | os-release: preserve fields from being excessively quoted
| * | | | | | | | nixos/modules/version: remove unnecessary quotingVladimir Serov2022-03-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | (In cases it is unnecessary)
* | | | | | | | | Merge pull request #162535 from astro/pacemakerRyan Mulligan2022-03-15
|\ \ \ \ \ \ \ \ \ | |_|_|_|/ / / / / |/| | | | | | | | pacemaker: init
| * | | | | | | | nixos: init corosync, pacemaker modulesAstro2022-03-08
| | | | | | | | |
* | | | | | | | | Merge pull request #164105 from ncfavier/ibusJan Tojnar2022-03-15
|\ \ \ \ \ \ \ \ \ | |_|_|_|/ / / / / |/| | | | | | | | ibus: 1.5.24 -> 1.5.26
| * | | | | | | | nixos/environment: add GTK paths to pathsToLinkNaïm Favier2022-03-14
| | | | | | | | |
* | | | | | | | | nixos/tor: allow tor to read resolv.conf when using resolvedLuflosi2022-03-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When `services.resolved.enable` is set to true, the file /etc/resolv.conf becomes a symlink to /etc/static/resolv.conf, which is a symlink to /run/systemd/resolve/stub-resolv.conf. Without this commit, tor does not have access to this file thanks to systemd confinement. This results in the following warning when tor starts: ``` [warn] Unable to stat resolver configuration in '/etc/resolv.conf': No such file or directory [warn] Could not read your DNS config from '/etc/resolv.conf' - please investigate your DNS configuration. This is possibly a problem. Meanwhile, falling back to local DNS at 127.0.0.1. ``` To fix this, simply allow read-only access to the file when resolved is in use. According to https://github.com/NixOS/nixpkgs/pull/161818#discussion_r824820462, the symlink may also point to /run/systemd/resolve/resolv.conf, so allow that as well.
* | | | | | | | | Merge pull request #164050 from LunNova/lunnova/disable-lucida-bitmap-fontsMichele Guerini Rocco2022-03-15
|\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | Remove ancient unfree bitmap fonts from fonts.defaultXFonts
| * | | | | | | | | nixos/fonts: Remove ancient bitmap fonts from defaultXFontsLuna Nova2022-03-13
| |/ / / / / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | See https://github.com/NixOS/nixpkgs/issues/160740