summary refs log tree commit diff
path: root/nixos
AgeCommit message (Collapse)AuthorFilesLines
2023-10-31Merge pull request #264008 from arcnmx/xmrig-mainProgramLin Jian1-2/+2
xmrig: add meta.mainProgram
2023-10-30Merge pull request #263849 from ElvishJerricco/sd-initrd-not-experimentalK9001-4/+0
systemd-stage-1: No longer experimental
2023-10-30Merge pull request #227633 from ↵K9009-22/+45
ElvishJerricco/systemd-stage-1-fix-initrd-commands Systemd stage 1 assert initrd commands are empty
2023-10-30Merge pull request #264378 from ↵Martin Weinelt1-12/+10
mweinelt/wyoming-openwakeword-relax-model-selection nixos/wyoming/openwakeword: relax model selection
2023-10-30nixos/wyoming/openwakeword: relax model selectionMartin Weinelt1-12/+10
The wyoming-openwakeword supports a custom model directory, which cannot be used when the the model list is constrained to the builtin ones.
2023-10-30Merge pull request #264260 from bobby285271/upd/xfceBobby Rong1-0/+3
nixosTests.xfce: Check if any coredumps are found
2023-10-30nixosTests.xfce: Check if any coredumps are foundBobby Rong1-0/+3
Adds a regression test for https://gitlab.xfce.org/xfce/xfconf/-/issues/35.
2023-10-30systemd-stage-1: Add assertions for unsupported options.Will Fancher9-22/+45
2023-10-30Merge pull request #258071 from helsinki-systems/feat/stc-lockJanne Heß1-0/+4
nixos/switch-to-configuration: Lock the switch
2023-10-29Merge pull request #245855 from rnhmjoj/pr-sslhMichele Guerini Rocco3-78/+132
nixos/sslh: update and refactor for RFC42
2023-10-29Merge pull request #262854 from ↵Ryan Lahfa3-10/+46
ElvishJerricco/systemd-stage-1-bcachefs-decryption systemd-stage-1: bcachefs decryption
2023-10-29Merge pull request #261870 from emilylange/drop-chromium-beta-devEmily1-0/+4
chromium{Beta,Dev},google-chrome-{beta,dev}: drop
2023-10-29luarocks-packages-update: init (#262156)Matthieu Coudron1-0/+4
* luarocks-packages-updater: init Goal is to make it possible to maintain out-of-tree luarocks packages without needing to clone nixpkgs. maintainers/scripts/update-luarocks-packages gets renamed to pkgs/development/lua-modules/updater/updater.py Once merged you can run for instance nix run nixpkgs#luarocks-packages-updater -- -i contrib/luarocks-packages.csv -o contrib/generated-packages.nix I also set the parallelism (--proc) to 1 by default else luarocks fails because of https://github.com/luarocks/luarocks/issues/1540 * Update maintainers/scripts/pluginupdate.py Co-authored-by: Marc Jakobi <mrcjkb89@outlook.com> --------- Co-authored-by: Marc Jakobi <mrcjkb89@outlook.com>
2023-10-29erigon: add package option to override default versionJakub Sokołowski1-1/+3
Signed-off-by: Jakub Sokołowski <jakub@status.im>
2023-10-29nixos: fix iproute2 invocations (#263976)Rémy Grünblatt4-36/+36
When using iproute2's ip binary, you can omit the dev parameter, e.g. ip link set up eth0 instead of ip link set up dev eth0. This breaks if for some reason your device is named e.g. he, hel, … because it is interpreted as ip link set up help. I just encountered this bug using networking.bridges trying to create an interface named he. I used a grep on nixpkgs to try to find iproute2 invocations using variables without the dev keyword, and found a few, and fixed them by providing the dev keyword. I merely fixed what I found, but the use of abbreviated commands makes it a bit hard to be sure everything has been found (e.g. ip l set … up instead of ip link set … up).
2023-10-29Merge pull request #262583 from ElvishJerricco/systemd-stage-1-shellsWill Fancher2-8/+20
systemd-stage-1: Support for user shells
2023-10-29nixos/release-notes: mention sslh changesrnhmjoj1-0/+3
2023-10-29sslh: 1.22c -> 2.0.0rnhmjoj1-12/+20
2023-10-29nixos/sslh: refactor for RFC42rnhmjoj2-78/+121
2023-10-29Revert "nixos/activation: remove specialfs activationScript"K9001-1/+19
This reverts commit a8f50f991948b91d1a191d1348bfff860a39b5a2. Broke installer tests, need to figure out how to fix nixos-enter before attempting this again.
2023-10-29Merge pull request #262839 from RaitoBezarius/qemu-vm/timeoutRyan Lahfa8-13/+99
2023-10-29Merge pull request #263744 from K900/stateversion-docsK90012-43/+68
treewide: rewrite stateVersion docs (again), clean up some stateVersion usages (again)
2023-10-29Merge pull request #227442 from christoph-heiss/openssh/allowusersAaron Andersen2-14/+103
openssh: add {Allow,Deny}{Users,Groups} settings
2023-10-29nixos/version: rewrite stateVersion documentationK9001-16/+26
Match the comment in nixos-generate-config and add some more details for the curious.
2023-10-29nixos-generate-config: rewrite stateVersion comment againK9001-6/+16
Hopefully this version is clearer. Also tried to make it less technical.
2023-10-29Merge pull request #263977 from JulienMalka/fix-netdata-testRyan Lahfa1-2/+2
2023-10-29nixos/lib/test-driver: add driver-timeout as a passthru testRaito Bezarius1-0/+5
From now on, we will aim to ensure that the test driver gets tested by OfBorg using all our available tests. This commit adds the driver timeout test to the driver.
2023-10-29nixos/tests/nixos-test-driver: test timeout failuresRaito Bezarius2-0/+23
We test that the test framework timeouts are working as expected.
2023-10-29nixos/lib/testing/run: expose `rawTestDerivation`Raito Bezarius1-13/+23
For `testBuildFailure` and similar functions, we need a full blown derivation and not a lazy one. This is an internal option for test framework developers.
2023-10-29nixos/test-driver: provide a global timeoutRaito Bezarius4-0/+48
Since the debut of the test-driver, we didn't obtain a race timer with the test execution to ensure that tests doesn't run beyond a certain amount of time. This is particularly important when you are running into hanging tests which cannot be detected by current facilities (requires more pvpanic wiring up, QMP API stuff, etc.). Two easy examples: - Some QEMU tests may get stuck in some situation and run for more than 24 hours → we default to 1 hour max. - Some QEMU tests may panic in the wrong place, e.g. UEFI firmware or worse → end users can set a "reasonable" amount of time And then, we should let the retry logic retest them until they succeed and adjust their global timeouts. Of course, this does not help with the fact that the timeout may need to be a function of the actual busyness of the machine running the tests. This is only one step towards increased reliability.
2023-10-29Merge pull request #264082 from josephst/systemd-domainnamenikstur1-1/+1
systemd domainname unit - use nix store path of `net tools` for `domainname`
2023-10-29Merge pull request #261862 from vifino/syslog-ng-4.4.0Guillaume Girol1-1/+1
syslogng: Late cleanup
2023-10-29Merge pull request #263462 from nikstur/rebuildable-systemRobert Hensing10-39/+160
Rebuildable system & appliance
2023-10-29Merge pull request #262915 from chayleaf/certspotterPeder Bergebakken Sundt4-0/+220
certspotter: init at 0.17.0; nixos/certspotter: init
2023-10-28systemd domainname service - fix missing domainname binaryJoseph Stahl1-1/+1
needs nettools in path
2023-10-29Merge pull request #264036 from wegank/unifi-hotfixWeijia Wang1-2/+2
nixos/unifi: fix use of optionalString
2023-10-28nixos/unifi: fix use of optionalStringWeijia Wang1-2/+2
2023-10-28chromium{Beta,Dev},google-chrome-{beta,dev}: dropemilylange1-0/+4
This is mainly due to the lack of maintenance in nixpkgs. `google-chrome-{beta,dev}` depend on `chromium{Beta,Dev}`'s version info. `chromium{Beta,Dev}` are rarely updated and explicitly blocklisted by `hydra.nixos.org`, meaning they are almost always outdated and not cached in `cache.nixos.org`. `chromium{Beta,Dev}` were intended to fix the build derivation of each new major release (if something broke) *before* stable reached that new major release. Allowing for fast bumps in nixpkgs, especially if the stable bump contains very important critical security fixes. Something that can easily be replicated by using an early-stable release or by manually entering a dev/beta version string in stable's `upstream-info.nix`. This resolves exposing end-users to outdated and vulnerable `google-chrome-{beta,dev}` and `chromium{Beta,Dev}` versions.
2023-10-28Merge pull request #263033 from ↵Ryan Lahfa3-22/+54
ElvishJerricco/systemd-stage-1-filesystems-encrypted systemd-stage-1: Enable more encrypted installer tests
2023-10-28xmrig: add meta.mainProgramarcnmx1-2/+2
See #246386
2023-10-28nixos/sshd: add comment explaining different list option typesChristoph Heiss1-0/+6
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-10-28tests/netdata: fix test after upgrade to 1.43.0Julien Malka1-2/+2
2023-10-28nixos/netboot: fix eval on non x86_64 systemsJörg Thalheim1-1/+1
pkgs is x86_64-linux, which makes the build on aarch64-linux i.e. fail.
2023-10-28Merge pull request #262084 from imlonghao/borgmatic/fix-262020Weijia Wang1-1/+1
borgmatic: fix deprecation warning check failed
2023-10-28nixos/profiles: add image-based-appliance profileJulian Stecklina1-0/+26
2023-10-28nixos/profiles/minimal: remove some perlnikstur1-0/+9
2023-10-28nixos: release notes for `system.switch.enable`nikstur1-0/+5
2023-10-28nixos/docs: add non-switchable-systems sectionnikstur2-0/+22
2023-10-28Merge pull request #263203 from nikstur/replace-activationLinus Heckemann23-222/+232
Replace simple activationScripts
2023-10-28nixos/certspotter: initchayleaf4-0/+220