| Commit message (Collapse) | Author | Age |
| |
|
| |
|
|\
| |
| | |
nixos/wireguard: Add `dynamicEndpointRefreshSeconds` option
|
| | |
|
| |
| |
| |
| |
| | |
See for an intro:
https://wiki.archlinux.org/index.php/WireGuard#Endpoint_with_changing_IP
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Standard best-practice shell quoting, which can prevent the most
horrible production accidents.
Note that we cannot use `+ optionalString someBool '' someString''`
because Nix's multi-line ''double-quoted'' strings remove leading
whitespace.
|
|\ \
| | |
| | | |
nixos/manual: document how to install over a serial port
|
| | |
| | |
| | |
| | | |
https://github.com/NixOS/nixpkgs/issues/58198
|
| | | |
|
| | |
| | |
| | |
| | | |
This reverts commit aeeee447bcc181d57a19d348f857326f4e1959fe.
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
LimitNPROC=64 is too low for bitwarden_rs to start on a 32 thread machine.
Remove the limit.
This fixes:
```
bitwarden_rs[38701]: /--------------------------------------------------------------------\
bitwarden_rs[38701]: | Starting Bitwarden_RS |
bitwarden_rs[38701]: |--------------------------------------------------------------------|
bitwarden_rs[38701]: | This is an *unofficial* Bitwarden implementation, DO NOT use the |
bitwarden_rs[38701]: | official channels to report bugs/features, regardless of client. |
bitwarden_rs[38701]: | Send usage/configuration questions or feature requests to: |
bitwarden_rs[38701]: | https://bitwardenrs.discourse.group/ |
bitwarden_rs[38701]: | Report suspected bugs/issues in the software itself at: |
bitwarden_rs[38701]: | https://github.com/dani-garcia/bitwarden_rs/issues/new |
bitwarden_rs[38701]: \--------------------------------------------------------------------/
bitwarden_rs[38701]: [INFO] No .env file found.
bitwarden_rs[38701]: [2021-05-24 03:34:41.121][bitwarden_rs::api::core::sends][INFO] Initiating send deletion
bitwarden_rs[38701]: [2021-05-24 03:34:41.122][start][INFO] Rocket has launched from http://127.0.0.1:8222
bitwarden_rs[38701]: [2021-05-24 03:34:41.126][panic][ERROR] thread 'unnamed' panicked at 'failed to spawn thread: Os { code: 11, kind: WouldBlock, message: "Resource temporarily unavailable" }': /build/rustc-1.52.1-src/library/std/src/thread/mod.rs:620
bitwarden_rs[38701]: 0: bitwarden_rs::init_logging::{{closure}}
bitwarden_rs[38701]: 1: std::panicking::rust_panic_with_hook
bitwarden_rs[38701]: 2: std::panicking::begin_panic_handler::{{closure}}
bitwarden_rs[38701]: 3: std::sys_common::backtrace::__rust_end_short_backtrace
bitwarden_rs[38701]: 4: rust_begin_unwind
bitwarden_rs[38701]: 5: core::panicking::panic_fmt
bitwarden_rs[38701]: 6: core::result::unwrap_failed
bitwarden_rs[38701]: 7: hyper::server::listener::spawn_with
bitwarden_rs[38701]: 8: hyper::server::listener::ListenerPool<A>::accept
bitwarden_rs[38701]: 9: std::sys_common::backtrace::__rust_begin_short_backtrace
bitwarden_rs[38701]: 10: core::ops::function::FnOnce::call_once{{vtable.shim}}
bitwarden_rs[38701]: 11: std::sys::unix::thread::Thread::new::thread_start
bitwarden_rs[38701]: 12: start_thread
bitwarden_rs[38701]: 13: __GI___clone
bitwarden_rs[38701]: [2021-05-24 03:34:41.126][panic][ERROR] thread 'main' panicked at 'internal error: entered unreachable code: the call to `handle_threads` should block on success': /build/bitwarden_rs-1.20.0-vendor.tar.gz/rocket/src/rocket.rs:751
bitwarden_rs[38701]: 0: bitwarden_rs::init_logging::{{closure}}
bitwarden_rs[38701]: 1: std::panicking::rust_panic_with_hook
bitwarden_rs[38701]: 2: std::panicking::begin_panic_handler::{{closure}}
bitwarden_rs[38701]: 3: std::sys_common::backtrace::__rust_end_short_backtrace
bitwarden_rs[38701]: 4: rust_begin_unwind
bitwarden_rs[38701]: 5: core::panicking::panic_fmt
bitwarden_rs[38701]: 6: rocket::rocket::Rocket::launch
bitwarden_rs[38701]: 7: bitwarden_rs::main
bitwarden_rs[38701]: 8: std::sys_common::backtrace::__rust_begin_short_backtrace
bitwarden_rs[38701]: 9: std::rt::lang_start::{{closure}}
bitwarden_rs[38701]: 10: std::rt::lang_start_internal
bitwarden_rs[38701]: 11: main
```
|
|\ \ \ |
|
| | | | |
|
|\ \ \ \
| |/ / /
|/| | | |
libvirtd: fix ovmf for aarch64
|
| | | | |
|
|\ \ \ \
| | | | |
| | | | | |
nixos/atop: Add defaultText to types.package options, Fix timing-related test failures.
|
| | | | |
| | | | |
| | | | |
| | | | | |
see: https://github.com/NixOS/nixpkgs/pull/123053#discussion_r637205826
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
I had intermittent test failures due to timing issues.
This patch seems to have fixed them.
|
|\ \ \ \ \
| | | | | |
| | | | | | |
lxqt: does not explicitly require gvfs package
|
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
It is enough to enable the gvfs service.
|
|\ \ \ \ \ \
| | | | | | |
| | | | | | | |
nixos/filesystems: condition mount-pstore.service on unmounted /sys/fs/pstore
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
For unknown reasons, switching to a system that first introduces this
service has it fail with /sys/fs/pstore already having been mounted.
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
This should help in rare hardware-specific situations where the root is
not automatically detected properly.
We search using a marker file. This should help some weird UEFI setups
where the root is set to `(hd0,msdos2)` by default.
Defaulting to `(hd0)` by looking for the ESP **will break themeing**. It
is unclear why, but files in `(hd0,msdos2)` are not all present as they
should be.
This also fixes an issue introduced with cb5c4fcd3c5d4070f040d591b2dd1da580f234d1
where rEFInd stopped booting in many cases. This is because it ended up
using (hd0) rather than using the `search` which was happening
beforehand, which in turn uses (hd0,msdos2), which is the ESP.
Putting back the `search` here fixes that.
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
This technically changes nothing. In practice `$root` is always the
"CWD", whether searched for automatically or not.
But this serves to announce we are relying on `$root`... I guess...
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
It may be that in some conditions dates earlier than 1980 on FAT on GRUB
2.06~ish will cause failures
https://github.com/NixOS/nixpkgs/issues/123376#issuecomment-845515035
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
https://www.gnu.org/software/grub/manual/grub/html_node/gfxmode.html
|
|\ \ \ \ \ \ \
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
Conflicts:
pkgs/tools/networking/xh/default.nix
|
| | | | | | | | |
|
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | | |
Also updates it to mention running md-to-db.sh.
|
| | | | | | | | |
|
| |\ \ \ \ \ \ \ |
|
| | | | | | | | | |
|
| | | | | | | | | |
|
| |\ \ \ \ \ \ \ \
| | | | | | | | | |
| | | | | | | | | | |
nixos/cinnamon: add polkit_gnome to fix #124062
|
| | | | | | | | | | |
|
| |\ \ \ \ \ \ \ \ \
| | | | | | | | | | |
| | | | | | | | | | | |
nixos/cinnamon: add cinnamon-translations to systemPackages
|
| | |/ / / / / / / /
| | | | | | | | | |
| | | | | | | | | |
| | | | | | | | | |
| | | | | | | | | |
| | | | | | | | | | |
This allows other cinnamon applications to use the locales
Without this the cinnamon UI is not properly translated
|
| |\ \ \ \ \ \ \ \ \
| | |_|/ / / / / / /
| |/| | | | | | | | |
nixos-containers: Increase startup timeout for imperative containers
|
| | | | | | | | | |
| | | | | | | | | |
| | | | | | | | | |
| | | | | | | | | |
| | | | | | | | | | |
Changed the startup timeout from 15 seconds to one minute as 15 seconds is really low.
Also it's currently not possible to change it without editing your system configuration.
|
| |\ \ \ \ \ \ \ \ \
| | | | | | | | | | |
| | | | | | | | | | | |
nixos/matrix-synapse: protect created files
|
| | | | | | | | | | |
| | | | | | | | | | |
| | | | | | | | | | |
| | | | | | | | | | |
| | | | | | | | | | |
| | | | | | | | | | |
| | | | | | | | | | |
| | | | | | | | | | |
| | | | | | | | | | | |
Enforce UMask on the systemd unit to restrict the permissions of files
created. Especially the homeserver signing key should not be world
readable, and media is served through synapse itself, so no other user
needs access to these files.
Use a prestart chmod to fixup the permissions on the signing key.
|
| |\ \ \ \ \ \ \ \ \ \ |
|
| | | | | | | | | | | | |
|
| | | | | | | | | | | |
| | | | | | | | | | | |
| | | | | | | | | | | |
| | | | | | | | | | | |
| | | | | | | | | | | |
| | | | | | | | | | | | |
After 733acfa140d5b73bc69c53c4ebd90ccc5f281f0e, syncoid would fail to
run if commonArgs did not include [ "--no-sync-snap" ], since it would
not have permissions to create or destroy snapshots.
|
| | | | | | | | | | | | |
|
| |\ \ \ \ \ \ \ \ \ \ \
| | |_|_|_|_|_|_|/ / / /
| |/| | | | | | | | | | |
nixos/plasma5: also add plasma-pa when using pipewire with pulseaudio support
|
| | | | | | | | | | | | |
|
|\| | | | | | | | | | | |
|
| | | | | | | | | | | | |
|
| |\ \ \ \ \ \ \ \ \ \ \
| | |_|_|_|_|/ / / / / /
| |/| | | | | | | | | | |
nixos/nix-daemon: fix sandbox-paths option
|