summary refs log tree commit diff
path: root/nixos/modules
AgeCommit message (Collapse)AuthorFilesLines
2022-11-20nixos/grafana: fix w/o datasources or dashboard provisioningMaximilian Bosch1-3/+14
2022-11-20nixos/grafana: fix secret-related warningsMaximilian Bosch1-42/+45
Closes #198646 * The options `password`/`basicAuthPassword` were removed for datasources in Grafana 9. The only option to declare them now is to use `secureJsonData`. * Fix description for contactPoints provisioning: when using file/env providers, nothing will be leaked into the store. * Fix regex in file-provider usage check: it's also possible to either use `$__env{FOO}` or `$FOO` to fetch secrets from the environment. * Fix warning for datasources: `password`/`basicAuthPassword` was removed, also check for each setting in `secureJsonData` if env/file-provider was used (then no warning is needed!).
2022-11-20nixos/grafana: get rid of unnecessary `flatten` for warningsMaximilian Bosch1-6/+5
2022-11-20nixos/grafana: mark `services.grafana.extraOptions` as removedMaximilian Bosch1-0/+4
2022-11-20nixos/grafana: `provision.{datasources,dashboards}` can't be a list anymoreMaximilian Bosch1-62/+49
The hack with `either` had the side-effect that the sub-options of the submodule didn't appear in the manual. I decided to remove this because the "migration" isn't that hard, you just need to fix some module declarations. However, `mkRenamedOptionModule` wouldn't work here because it'd create a "virtual" option for the deprecated path (i.e. `services.grafana.provision.{datasources,dashboards}`), but that's the already a new option, i.e. the submodule for the new stuff. To make sure that you still get errors, I implemented a small hack using `coercedTo` which throws an error if a list is specified (as it would be done on 22.05) which explains what to do instead to make the migration easier. Also, I linkified the options in the manual now to make it easier to navigate between those.
2022-11-19nixos/firewall: remove stray quote from package optionDavid Wilemski1-1/+1
This quote is not needed and shows up rendered in the manpage documenting this option.
2022-11-20Merge pull request #181967 from noneucat/fix/at-spi2-coreJan Tojnar1-1/+4
gnome/at-spi2-core: also set GTK_A11Y when at-spi2-core is disabled
2022-11-20Merge pull request #201991 from vlinkz/calamaresqtwebkitMartin Weinelt1-2/+0
2022-11-20nixos/gnome/at-spi2-core: force GTK_A11Y=none when disabledAndy Chun @noneucat1-1/+4
GTK 4 applications use accessibility bus directly and will try to connect to it every time a widget is created: https://gitlab.gnome.org/GNOME/gtk/-/issues/4831 This will make GTK 4 apps (e.g. newly ported Nautilus) grind to a halt on systems that do not have AT-SPI service installed. Let’s explicitly disable accessibility support with an environment variable when the AT-SPI service is not enabled to avoid that. Just like we do for ATK-based applications with `NO_AT_BRIDGE`. Fixes: https://github.com/NixOS/nixpkgs/issues/197188
2022-11-19installation-cd: Remove libsForQt5.fullVictor Fuentes1-2/+0
2022-11-19surrealdb: module inithappysalada2-0/+80
2022-11-19Merge pull request #197254 from Atemu/fstab-escape-optionsMartin Weinelt2-2/+10
2022-11-19tremor-rs: module inithappysalada2-0/+130
2022-11-19Merge pull request #198820 from talyz/keycloak-admin-passwordMartin Weinelt1-2/+25
2022-11-19nixos/users-groups: Warn about deprecated hashes at activationMartin Weinelt1-0/+20
To allow for a reasonably fast deprecation of weak password hashing schemes we provide an activation script that checks existing hashes in /etc/shadow and issues a warning for user accounts that still rely on deprecated hashes. Co-Authored-By: oxalica <oxalicc@pm.me>
2022-11-19nixos/user: Don't recommend mkpasswd methodsMartin Weinelt1-1/+1
Instead rely on the default, which at this time is yescrypt.
2022-11-18Merge pull request #201521 from hmenke/alpsAnderson Torres1-9/+43
nixos/alps: add hardening, extensible options, test
2022-11-18Merge pull request #196773 from bobvanderlinden/pr-steam-packageMaciej Krüger1-8/+25
2022-11-17nixos/alps: add hardening, extensible options, testHenri Menke1-9/+43
2022-11-17nixos/mullvad-vpn: add mullvad-exclude wrapper & systemPackagePatrick Jackson1-0/+19
2022-11-17Merge pull request #195135 from maxbrunet/feat/automatic-timezoned/initBernardo Meurer3-0/+95
2022-11-17Merge pull request #201183 from Artturin/utempterArtturi1-0/+19
tmux: build with utempter
2022-11-17Merge pull request #185129 from Munksgaard/fix-nixos-containeradisbladis1-4/+6
nixos-containers: Make sure same version of nixos-container is used
2022-11-16automatic-timezoned: init at 1.0.41Maxime Brunet3-0/+95
2022-11-16Merge pull request #199352 from symphorien/deadlock-post-resumeFlorian Klink1-1/+1
nixos/power-management: fix deadlock with post-resume.{target,service}
2022-11-16nixos/picom: remove experimentalBackends optionThiago Kenji Okada1-10/+4
Removed by upstream in the recent v10 release.
2022-11-16Merge pull request #201396 from ↵Will Fancher2-6/+3
ElvishJerricco/systemd-util-linux-path-stage-1-fix nixos: Fix systemd stage 1 after #201266
2022-11-16Merge pull request #197536 from eigengrau/zsh-init-no-unsetJörg Thalheim1-3/+3
nixos/zsh: don’t be noisy when scripts are run with -u
2022-11-16nixos/misc: fix grammar typoBrian Cooper1-1/+1
2022-11-15nixos/adguardhome: allow for empty/unmanaged configsCarl Richard Theodor Schneider1-8/+12
This commit fixes broken non-declarative configs by making the assertions more relaxed. It also allows to remove the forced configuration merge by making `settings` `null`able (now the default). Both cases (trivial non-declarative config and `null`able config) are verified with additional tests. Fixes #198665
2022-11-16Merge pull request #198724 from Izorkin/update-peertubeSandro1-3/+25
2022-11-16Merge pull request #188467 from kekrby/fix-gtk-icon-cacheSandro1-3/+1
2022-11-15nixos: Add util-linux to systemd PATH to fix fsck with systemd 251.6Will Fancher1-1/+2
This is an alternative to the reverted d9b1bde390eb133a3da66c8abd902ea2b754938c, which broke systemd stage 1
2022-11-15Revert "nixos: Fix fsck with systemd 251.6 and later"Will Fancher1-5/+1
This reverts commit d9b1bde390eb133a3da66c8abd902ea2b754938c.
2022-11-15Merge pull request #198217 from eigengrau/shell-alias-double-dashSandro2-2/+2
2022-11-15Merge pull request #201329 from jqqqqqqqqqq/masterPierre Bourdon1-2/+2
nixos/nginx: fix default listen port options
2022-11-15nixos/nginx: fix default listen port optionsCurtis Jiang1-2/+2
2022-11-15Merge pull request #201266 from aszlig/fix-fsckFlorian Klink1-1/+5
nixos: Fix fsck with systemd 251.6 and later
2022-11-15Merge pull request #198529 from jqqqqqqqqqq/masterFranz Pletz1-4/+22
2022-11-15nixos/nginx: add default listen port optionsCurtis Jiang1-4/+22
2022-11-15nixos: Fix fsck with systemd 251.6 and lateraszlig1-1/+5
Version 251.6 of systemd introduced a small change[1] that now checks whether the fsck command is available in *addition* to the filesystem specific fsck.$fsname executable. When bumping systemd to version 251.7 on our side[2], we introduced that change. This subsequently caused our "fsck" test to fail and it looks like this was an oversight during the pull request[3] introducing the bump. Since the fsck wrapper binary is in util-linux, I decided to address this by adding util-linux to fsPackages because util-linux is already part of the closure of any NixOS system so the impact should be pretty low. [1]: https://github.com/systemd/systemd-stable/commit/73db7d99323c236625656f906eb4e429613d324b [2]: https://github.com/NixOS/nixpkgs/commit/844a08cc06b5c0703ba37f2318ef5b7d90665d04 [3]: https://github.com/NixOS/nixpkgs/pull/199618 Signed-off-by: aszlig <aszlig@nix.build>
2022-11-14nixos/tmux: add withUtempter optionArtturin1-0/+19
2022-11-14boot.loader.systemd-boot: add extraInstallCommands option (#200715)Markus Partheymueller1-1/+23
2022-11-14nixos/nginx: docs: Update formattingBryan Richter1-5/+5
* Capitalize ACME * Use bold instead of ALL CAPS * Tweak sentence structure
2022-11-14nixos/nginx: Extend acmeFallbackHost documentationBryan Richter1-0/+4
This extra example would have saved me a lot of uncertainty and doubt.
2022-11-14Merge pull request #199587 from lorenz/fscryptFranz Pletz1-0/+30
nixos/pam: support fscrypt login protectors
2022-11-14Merge pull request #200611 from fpletz/libvirtd-fix-autostartFranz Pletz1-0/+1
2022-11-13Merge pull request #194172 from drupol/php/enable-nts-by-defaultElis Hirwing1-1/+8
php: enable `nts` flags by default
2022-11-13nixos/chisel-server: add moduleclerie2-0/+100
2022-11-13php: switch to `nts` by defaultPol Dellaiera1-1/+8