summary refs log tree commit diff
path: root/nixos
Commit message (Collapse)AuthorAge
* nixos/kresd: tell resolveconf to use local resolverSandro Jäckel2021-05-25
|
* beam-packages: drop erlang R18 R19 R20 and cuterThomas Depierre2021-05-25
|
* Merge pull request #121331 from nh2/wireguard-dynamicEndpointRefreshSecondsNiklas Hambüchen2021-05-24
|\ | | | | nixos/wireguard: Add `dynamicEndpointRefreshSeconds` option
| * release notes: Mention WireGuard `dynamicEndpointRefreshSeconds`Niklas Hambüchen2021-05-16
| |
| * wireguard module: Add `dynamicEndpointRefreshSeconds` option.Niklas Hambüchen2021-05-16
| | | | | | | | | | See for an intro: https://wiki.archlinux.org/index.php/WireGuard#Endpoint_with_changing_IP
| * wireguard module: Quote all command line arguments correctly.Niklas Hambüchen2021-04-30
| | | | | | | | | | | | | | | | | | Standard best-practice shell quoting, which can prevent the most horrible production accidents. Note that we cannot use `+ optionalString someBool '' someString''` because Nix's multi-line ''double-quoted'' strings remove leading whitespace.
* | Merge pull request #118993 from tomfitzhenry/serial-docSamuel Dionne-Riel2021-05-24
|\ \ | | | | | | nixos/manual: document how to install over a serial port
| * | nixos/manual: document how to install over a serial portTom Fitzhenry2021-05-24
| | | | | | | | | | | | https://github.com/NixOS/nixpkgs/issues/58198
* | | nixos/nginx: add option rejectSSL exposing ssl_reject_handshakeNaïm Favier2021-05-24
| | |
* | | Revert "nixos/nix-daemon: fix sandbox-paths option"regnat2021-05-24
| | | | | | | | | | | | This reverts commit aeeee447bcc181d57a19d348f857326f4e1959fe.
* | | nixos/bitwarden_rs: fix startup on 32 thread machinesIvan Kozik2021-05-24
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | LimitNPROC=64 is too low for bitwarden_rs to start on a 32 thread machine. Remove the limit. This fixes: ``` bitwarden_rs[38701]: /--------------------------------------------------------------------\ bitwarden_rs[38701]: | Starting Bitwarden_RS | bitwarden_rs[38701]: |--------------------------------------------------------------------| bitwarden_rs[38701]: | This is an *unofficial* Bitwarden implementation, DO NOT use the | bitwarden_rs[38701]: | official channels to report bugs/features, regardless of client. | bitwarden_rs[38701]: | Send usage/configuration questions or feature requests to: | bitwarden_rs[38701]: | https://bitwardenrs.discourse.group/ | bitwarden_rs[38701]: | Report suspected bugs/issues in the software itself at: | bitwarden_rs[38701]: | https://github.com/dani-garcia/bitwarden_rs/issues/new | bitwarden_rs[38701]: \--------------------------------------------------------------------/ bitwarden_rs[38701]: [INFO] No .env file found. bitwarden_rs[38701]: [2021-05-24 03:34:41.121][bitwarden_rs::api::core::sends][INFO] Initiating send deletion bitwarden_rs[38701]: [2021-05-24 03:34:41.122][start][INFO] Rocket has launched from http://127.0.0.1:8222 bitwarden_rs[38701]: [2021-05-24 03:34:41.126][panic][ERROR] thread 'unnamed' panicked at 'failed to spawn thread: Os { code: 11, kind: WouldBlock, message: "Resource temporarily unavailable" }': /build/rustc-1.52.1-src/library/std/src/thread/mod.rs:620 bitwarden_rs[38701]: 0: bitwarden_rs::init_logging::{{closure}} bitwarden_rs[38701]: 1: std::panicking::rust_panic_with_hook bitwarden_rs[38701]: 2: std::panicking::begin_panic_handler::{{closure}} bitwarden_rs[38701]: 3: std::sys_common::backtrace::__rust_end_short_backtrace bitwarden_rs[38701]: 4: rust_begin_unwind bitwarden_rs[38701]: 5: core::panicking::panic_fmt bitwarden_rs[38701]: 6: core::result::unwrap_failed bitwarden_rs[38701]: 7: hyper::server::listener::spawn_with bitwarden_rs[38701]: 8: hyper::server::listener::ListenerPool<A>::accept bitwarden_rs[38701]: 9: std::sys_common::backtrace::__rust_begin_short_backtrace bitwarden_rs[38701]: 10: core::ops::function::FnOnce::call_once{{vtable.shim}} bitwarden_rs[38701]: 11: std::sys::unix::thread::Thread::new::thread_start bitwarden_rs[38701]: 12: start_thread bitwarden_rs[38701]: 13: __GI___clone bitwarden_rs[38701]: [2021-05-24 03:34:41.126][panic][ERROR] thread 'main' panicked at 'internal error: entered unreachable code: the call to `handle_threads` should block on success': /build/bitwarden_rs-1.20.0-vendor.tar.gz/rocket/src/rocket.rs:751 bitwarden_rs[38701]: 0: bitwarden_rs::init_logging::{{closure}} bitwarden_rs[38701]: 1: std::panicking::rust_panic_with_hook bitwarden_rs[38701]: 2: std::panicking::begin_panic_handler::{{closure}} bitwarden_rs[38701]: 3: std::sys_common::backtrace::__rust_end_short_backtrace bitwarden_rs[38701]: 4: rust_begin_unwind bitwarden_rs[38701]: 5: core::panicking::panic_fmt bitwarden_rs[38701]: 6: rocket::rocket::Rocket::launch bitwarden_rs[38701]: 7: bitwarden_rs::main bitwarden_rs[38701]: 8: std::sys_common::backtrace::__rust_begin_short_backtrace bitwarden_rs[38701]: 9: std::rt::lang_start::{{closure}} bitwarden_rs[38701]: 10: std::rt::lang_start_internal bitwarden_rs[38701]: 11: main ```
* | | Merge pull request #123304 from SuperSandro2000/pihole-exporterSandro2021-05-24
|\ \ \
| * | | nixos/prometheus: init pihole-exporterSandro Jäckel2021-05-24
| | | |
* | | | Merge pull request #123583 from superherointj/module-libvirtd-ovmf-aarch64-fixAnderson Torres2021-05-23
|\ \ \ \ | |/ / / |/| | | libvirtd: fix ovmf for aarch64
| * | | libvirtd: fix ovmf for aarch64superherointj2021-05-18
| | | |
* | | | Merge pull request #123926 from pschyska/masterMichael Raskin2021-05-23
|\ \ \ \ | | | | | | | | | | nixos/atop: Add defaultText to types.package options, Fix timing-related test failures.
| * | | | nixos/atop: Add defaultText for types.package optionsPaul Schyska2021-05-22
| | | | | | | | | | | | | | | | | | | | see: https://github.com/NixOS/nixpkgs/pull/123053#discussion_r637205826
| * | | | nixos/atop: Wait for conditionsPaul Schyska2021-05-22
| | | | | | | | | | | | | | | | | | | | | | | | | I had intermittent test failures due to timing issues. This patch seems to have fixed them.
* | | | | Merge pull request #121031 from romildo/fix.lxqtJosé Romildo Malaquias2021-05-23
|\ \ \ \ \ | | | | | | | | | | | | lxqt: does not explicitly require gvfs package
| * | | | | lxqt: does not explicitly require gvfs packageJosé Romildo Malaquias2021-04-28
| | | | | | | | | | | | | | | | | | | | | | | | It is enough to enable the gvfs service.
* | | | | | Merge pull request #123902 from hyperfekt/mount-pstore-quietGuillaume Girol2021-05-23
|\ \ \ \ \ \ | | | | | | | | | | | | | | nixos/filesystems: condition mount-pstore.service on unmounted /sys/fs/pstore
| * | | | | | nixos/filesystems: condition mount-pstore.service on unmounted /sys/fs/pstorehyperfekt2021-05-21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | For unknown reasons, switching to a system that first introduces this service has it fail with /sys/fs/pstore already having been mounted.
* | | | | | | iso-image: Improve disk detectionSamuel Dionne-Riel2021-05-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This should help in rare hardware-specific situations where the root is not automatically detected properly. We search using a marker file. This should help some weird UEFI setups where the root is set to `(hd0,msdos2)` by default. Defaulting to `(hd0)` by looking for the ESP **will break themeing**. It is unclear why, but files in `(hd0,msdos2)` are not all present as they should be. This also fixes an issue introduced with cb5c4fcd3c5d4070f040d591b2dd1da580f234d1 where rEFInd stopped booting in many cases. This is because it ended up using (hd0) rather than using the `search` which was happening beforehand, which in turn uses (hd0,msdos2), which is the ESP. Putting back the `search` here fixes that.
* | | | | | | iso-image: unqualified root → ($root)Samuel Dionne-Riel2021-05-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This technically changes nothing. In practice `$root` is always the "CWD", whether searched for automatically or not. But this serves to announce we are relying on `$root`... I guess...
* | | | | | | iso-image: change date on all filesSamuel Dionne-Riel2021-05-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It may be that in some conditions dates earlier than 1980 on FAT on GRUB 2.06~ish will cause failures https://github.com/NixOS/nixpkgs/issues/123376#issuecomment-845515035
* | | | | | | iso-image: Force gfxmodeSamuel Dionne-Riel2021-05-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | https://www.gnu.org/software/grub/manual/grub/html_node/gfxmode.html
* | | | | | | Merge remote-tracking branch 'origin/master' into staging-nextJonathan Ringer2021-05-22
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Conflicts: pkgs/tools/networking/xh/default.nix
| * | | | | | | nixos/doc: add 21.11 release notes stubRyan Mulligan2021-05-22
| | | | | | | |
| * | | | | | | nixos/doc: convert "Contributing to this manual" to CommonMarkRyan Mulligan2021-05-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Also updates it to mention running md-to-db.sh.
| * | | | | | | nixos/doc: add md-to-db.sh, convert "Building Your Own NixOS CD" to CommonMarkRyan Mulligan2021-05-22
| | | | | | | |
| * | | | | | | Merge pull request #121626 from mweinelt/botamusiqueMartin Weinelt2021-05-23
| |\ \ \ \ \ \ \
| | * | | | | | | nixos/tests/botamusique: initMartin Weinelt2021-05-23
| | | | | | | | |
| | * | | | | | | nixos/botamusique: initMartin Weinelt2021-05-23
| | | | | | | | |
| * | | | | | | | Merge pull request #124073 from mkg20001/cinnamonpolkitJan Tojnar2021-05-23
| |\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | nixos/cinnamon: add polkit_gnome to fix #124062
| | * | | | | | | | nixos/cinnamon: add polkit_gnome to fix #124062Maciej Krüger2021-05-22
| | | | | | | | | |
| * | | | | | | | | Merge pull request #124056 from mkg20001/cinnamonlocaleJan Tojnar2021-05-23
| |\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | nixos/cinnamon: add cinnamon-translations to systemPackages
| | * | | | | | | | | nixos/cinnamon: add cinnamon-translations to systemPackagesMaciej Krüger2021-05-22
| | |/ / / / / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This allows other cinnamon applications to use the locales Without this the cinnamon UI is not properly translated
| * | | | | | | | | Merge pull request #122203 from mohe2015/imperative-nixos-container-timeoutMaximilian Bosch2021-05-22
| |\ \ \ \ \ \ \ \ \ | | |_|/ / / / / / / | |/| | | | | | | | nixos-containers: Increase startup timeout for imperative containers
| | * | | | | | | | nixos/containers: Increase startup timeout for imperative containersHedtke, Moritz2021-05-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Changed the startup timeout from 15 seconds to one minute as 15 seconds is really low. Also it's currently not possible to change it without editing your system configuration.
| * | | | | | | | | Merge pull request #123941 from mweinelt/matrix-synapseMaximilian Bosch2021-05-22
| |\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | nixos/matrix-synapse: protect created files
| | * | | | | | | | | nixos/matrix-synapse: protect created filesMartin Weinelt2021-05-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Enforce UMask on the systemd unit to restrict the permissions of files created. Especially the homeserver signing key should not be world readable, and media is served through synapse itself, so no other user needs access to these files. Use a prestart chmod to fixup the permissions on the signing key.
| * | | | | | | | | | Merge pull request #104420 from danielfullmer/syncoid-perm-fixSandro2021-05-22
| |\ \ \ \ \ \ \ \ \ \
| | * | | | | | | | | | nixos/syncoid: test both with and without --no-sync-snapBen Wolsieffer2020-11-22
| | | | | | | | | | | |
| | * | | | | | | | | | nixos/syncoid: fix permissions without --no-sync-snapDaniel Fullmer2020-11-21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | After 733acfa140d5b73bc69c53c4ebd90ccc5f281f0e, syncoid would fail to run if commonArgs did not include [ "--no-sync-snap" ], since it would not have permissions to create or destroy snapshots.
| * | | | | | | | | | | maintainers: rename metadark -> kira-bruneau (#124035)Kira Bruneau2021-05-22
| | | | | | | | | | | |
| * | | | | | | | | | | Merge pull request #123211 from mdevlamynck/pipewire-plasma-paDomen Kožar2021-05-22
| |\ \ \ \ \ \ \ \ \ \ \ | | |_|_|_|_|_|_|/ / / / | |/| | | | | | | | | | nixos/plasma5: also add plasma-pa when using pipewire with pulseaudio support
| | * | | | | | | | | | nixos/plasma5: also add plasma-pa when using pipewire with pulseaudio supportMatthias Devlamynck2021-05-16
| | | | | | | | | | | |
* | | | | | | | | | | | Merge master into staging-nextgithub-actions[bot]2021-05-22
|\| | | | | | | | | | |
| * | | | | | | | | | | nixos/spacenavd: run as user servicesohalt2021-05-22
| | | | | | | | | | | |
| * | | | | | | | | | | Merge pull request #123970 from kisik21/nix-fix-sandbox-pathsDomen Kožar2021-05-22
| |\ \ \ \ \ \ \ \ \ \ \ | | |_|_|_|_|/ / / / / / | |/| | | | | | | | | | nixos/nix-daemon: fix sandbox-paths option