summary refs log tree commit diff
path: root/nixos
Commit message (Collapse)AuthorAge
* Revert "Merge #97536: uwsgi: fix compiling and linking"Vladimír Čunát2020-12-21
| | | | | | | This reverts commit df4d0b03efe967e07b227edc004169701e39fd3e, reversing changes made to b333263534e23f6e5a394193c5cb2c5f793f6525. It didn't even evaluate!
* Merge pull request #107292 from mguentner/nginxlog_exporterWilliButz2020-12-21
|\ | | | | nginxlog_exporter: 1.3.0 -> 1.8.1 + module w/ tests
| * nixos: add prometheus_nginxlog_exporter module + testMaximilian Güntner2020-12-21
| |
* | Merge pull request #107338 from Ericson2314/thermald-allow-custom-packageJohn Ericson2020-12-21
|\ \ | | | | | | nixos/thermald: Allow switching package
| * | nixos/thermald: Allow switching packageJohn Ericson2020-12-21
| | | | | | | | | | | | | | | | | | Sometimes newer versions than what nixpkgs provides is needed for certain hardware, especially for stable releases where I will backport this commit.
* | | Merge pull request #104292 from fgaz/image-contentsLéo Gaspard2020-12-21
|\ \ \ | | | | | | | | nixos/lib/make-disk-image.nix: support content mode and ownership
| * | | nixosTests.image-contents: initFrancesco Gazzetta2020-12-20
| | | |
| * | | nixos/lib/make-disk-image.nix: support content mode and ownershipFrancesco Gazzetta2020-12-20
| | | |
* | | | Merge pull request #99037 from mohe2015/fix-mongodbTimo Kaufmann2020-12-21
|\ \ \ \ | | | | | | | | | | nixos/mongodb: fix running initialScript without a set root password
| * | | | nixos/mongodb: fix running initialScript without a set root passwordmohe20152020-12-19
| | | | | | | | | | | | | | | | | | | | Co-authored-by: Timo Kaufmann <timokau@zoho.com>
* | | | | nixos/tests/uwsgi: test PHP pluginrnhmjoj2020-12-21
| |_|/ / |/| | |
* | | | Merge pull request #107134 from psibi/patch-2Sandro2020-12-21
|\ \ \ \ | | | | | | | | | | nixos/manual: fix typo in virtualbox installation guide
| * | | | nixos/manual: fix typo in virtualbox installation guideSibi Prabakaran2020-12-21
| | | | |
* | | | | nixos: fix "nixos-rebuild build-vm-with-bootloader" for EFI systemsBjørn Forsman2020-12-21
| |_|_|/ |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | `nixos-rebuild build-vm-with-bootloader` currently fails with the default NixOS EFI configuration: $ cat >configuration.nix <<EOF { fileSystems."/".device = "/dev/sda1"; boot.loader.systemd-boot.enable = true; boot.loader.efi.canTouchEfiVariables = true; } EOF $ nixos-rebuild build-vm-with-bootloader -I nixos-config=$PWD/configuration.nix -I nixpkgs=https://github.com/NixOS/nixpkgs/archive/nixos-20.09.tar.gz [...] insmod: ERROR: could not insert module /nix/store/1ibmgfr13r8b6xyn4f0wj115819f359c-linux-5.4.83/lib/modules/5.4.83/kernel/fs/efivarfs/efivarfs.ko.xz: No such device mount: /sys/firmware/efi/efivars: mount point does not exist. [ 1.908328] reboot: Power down builder for '/nix/store/dx2ycclyknvibrskwmii42sgyalagjxa-nixos-boot-disk.drv' failed with exit code 32 [...] Fix it by setting virtualisation.useEFIBoot = true in qemu-vm.nix, when efi is needed. And remove the now unneeded configuration in ./nixos/tests/systemd-boot.nix, since it's handled globally. Before: * release-20.03: successful build, unsuccessful run * release-20.09 (and master): unsuccessful build After: * Successful build and run. Fixes https://github.com/NixOS/nixpkgs/issues/107255
* | | | Merge pull request #107112 from Izorkin/samba-wsdd-fixFlorian Klink2020-12-20
|\ \ \ \ | | | | | | | | | | nixos/samba-wsdd: fix starting
| * | | | nixos/samba-wsdd: fix startingIzorkin2020-12-17
| | | | |
* | | | | Merge pull request #101482 from m1cr0man/jwsfixFlorian Klink2020-12-20
|\ \ \ \ \ | |_|_|/ / |/| | | | nixos/acme: lego run when account is missing
| * | | | nixos/acme: Remove dependency on system version for hashLucas Savva2020-12-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This means that all systems running from master will trigger new certificate creation on next rebuild. Race conditions around multiple account creation are fixed in #106857, not this commit.
| * | | | nixos/acme: Add data.email to othersHash in nixos > 20.09Lucas Savva2020-10-24
| | | | |
| * | | | nixos/acme: lego run whenen account is missingLucas Savva2020-10-23
| | | | |
* | | | | Merge pull request #84324 from Emantor/init/icecc_icemonSilvan Mosberger2020-12-19
|\ \ \ \ \ | | | | | | | | | | | | Icecream support
| * | | | | nixos/icecream: add modulesRouven Czerwinski2020-11-01
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This adds modules for the icecream scheduler and daemon. Icecream can be used for distributed compilation, especially in environments with diverse toolchains, since it sends the complete build environment to the daemon. Unfortunatley the daemon can't be run with DynamicUser = true, since the daemon requires to be started as root in order to accept other build environments, see [1]. [1]: https://github.com/icecc/icecream#using-icecream-in-heterogeneous-environments
* | | | | | Merge pull request #97145 from lheckemann/initrd-improvementsLinus Heckemann2020-12-18
|\ \ \ \ \ \ | | | | | | | | | | | | | | Initrd improvements
| * | | | | | nixos/initrd: docbookise "compressor" descriptionLinus Heckemann2020-12-17
| | | | | | |
| * | | | | | nixos/tests: Add test for initrd secretsLinus Heckemann2020-12-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | lz4 compression is excluded because it doesn't work for a reason which remains unclear to me.
| * | | | | | nixos/initrd: add compressorArgs, make compressor option publicDominik Xaver Hörl2020-12-17
| | | | | | |
* | | | | | | yq: Add testTim Steinbach2020-12-18
| | | | | | |
* | | | | | | Revert "Module-builtin assertions, disabling assertions and submodule ↵Silvan Mosberger2020-12-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | assertions"
* | | | | | | Merge pull request #104589 from ↵Michele Guerini Rocco2020-12-18
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | fadenb/release_notes_wpa_supplicant_breaking_change nixos/release-notes: Warn on wpa_supplicant changes
| * | | | | | | nixos/release-notes: Warn on wpa_supplicant changesTristan Helmich2020-11-22
| | | | | | | |
* | | | | | | | Merge pull request #97023 from Infinisil/module-assertionsSilvan Mosberger2020-12-18
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | Module-builtin assertions, disabling assertions and submodule assertions
| * | | | | | | | lib/modules: Introduce _module.checks.*.checkSilvan Mosberger2020-12-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously the .enable option was used to encode the condition as well, which lead to some oddness: - In order to encode an assertion, one had to invert it - To disable a check, one had to mkForce it By introducing a separate .check option this is solved because: - It can be used to encode assertions - Disabling is done separately with .enable option, whose default can be overridden without a mkForce
| * | | | | | | | lib/modules: Remove _module.checks.*.triggerPath as it's not necessarySilvan Mosberger2020-11-30
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously this option was thought to be necessary to avoid infinite recursion, but it actually isn't, since the check evaluation isn't fed back into the module fixed-point.
| * | | | | | | | lib/modules: Rename _module.assertions to _module.checksSilvan Mosberger2020-11-30
| | | | | | | | |
| * | | | | | | | nixos/docs: Update assertion docs for new module-builtin onesSilvan Mosberger2020-11-30
| | | | | | | | |
| * | | | | | | | nixos/assertions: Use module-builtin assertion implementationSilvan Mosberger2020-11-30
| | | | | | | | |
* | | | | | | | | nix: 2.3.9 -> 2.3.10Eelco Dolstra2020-12-18
| | | | | | | | |
* | | | | | | | | nixos/doc: fix manual buildrnhmjoj2020-12-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is a fixup of 9728907c
* | | | | | | | | Merge pull request #97362 from martinetd/wakeonlanMichele Guerini Rocco2020-12-18
|\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | wakeonlan service: use powerUpCommands
| * | | | | | | | | wakeonlan service: use powerUpCommandsDominique Martinet2020-09-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | powerDownCommands is supposed to run before shutdown, but the current implementation only runs before-sleep, thus not enabling wakeonlan on devices when powering off even if the hardware supports it. Taking into consideration the possibility of unexpected shutdown, it is preferable to move the commands to powerUpCommands instead which is executed at boot time as well as after resume - that should cover all use cases for wakeonlan. Fixes #91352
* | | | | | | | | | console: remove console.extraTTYs optionrnhmjoj2020-12-17
| |_|_|_|_|_|_|/ / |/| | | | | | | | | | | | | | | | | | | | | | | | | | This closes issue #88085
* | | | | | | | | Merge pull request #97445 from jojosch/mailhog-1.0.1Doron Behar2020-12-17
|\ \ \ \ \ \ \ \ \ | |_|_|_|_|_|_|/ / |/| | | | | | | |
| * | | | | | | | mailhog: add simple testJohannes Schleifenbaum2020-12-17
| | | | | | | | |
* | | | | | | | | Merge pull request #106995 from ↵Andreas Rammhold2020-12-17
|\ \ \ \ \ \ \ \ \ | |/ / / / / / / / |/| | | | | | | | | | | | | | | | | | | | | | | | | | andir/ml2pr/PATCH-nixos-users-groups-createHome-Ensure-HOME-permissions-fix-description nixos/users-groups: createHome: Ensure HOME permissions, fix description
| * | | | | | | | nixos/users-groups: createHome: Ensure HOME permissions, fix descriptionKlemens Nanni2020-12-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | configuration.nix(1) states users.extraUsers.<name>.createHome [...] If [...] the home directory already exists but is not owned by the user, directory owner and group will be changed to match the user. i.e. ownership would change only if the user mismatched; the code however ignores the owner, it is sufficient to enable `createHome`: if ($u->{createHome}) { make_path($u->{home}, { mode => 0700 }) if ! -e $u->{home}; chown $u->{uid}, $u->{gid}, $u->{home}; } Furthermore, permissions are ignored on already existing directories and therefore may allow others to read private data eventually. Given that createHome already acts as switch to not only create but effectively own the home directory, manage permissions in the same manner to ensure the intended default and cover all primary attributes. Avoid yet another configuration option to have administrators make a clear and simple choice between securely managing home directories and optionally defering management to own code (taking care of custom location, ownership, mode, extended attributes, etc.). While here, simplify and thereby fix misleading documentation.
* | | | | | | | | minecraft: Fix testTim Steinbach2020-12-17
| |_|_|_|/ / / / |/| | | | | | |
* | | | | | | | Merge pull request #92582 from truh/plantuml-server-squashDoron Behar2020-12-16
|\ \ \ \ \ \ \ \
| * | | | | | | | plantuml-server: init at 1.2020.14Jakob Klepp2020-07-08
| | | | | | | | |
* | | | | | | | | nixos/slurm: fix dbdserver config file handlingMarkus Kowalewski2020-12-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Since slurm-20.11.0.1 the dbd server requires slurmdbd.conf to be in mode 600 to protect the database password. This change creates slurmdbd.conf on-the-fly at service startup and thus avoids that the database password ends up in the nix store.
* | | | | | | | | Revert "minecraft: 2.2.909 → 2.2.741"Tim Steinbach2020-12-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This reverts commit 8d4d8ef274f2f559c1a91133004f31f041eadd51. The update script pulls the version info from AUR and they still use the old version. Sorry...