about summary refs log tree commit diff
path: root/nixos
AgeCommit message (Collapse)AuthorFilesLines
2023-09-12nvidia,nixos/nvidia: add datacenter drivers compatible with default cudaPkgsEdward Tjörnhammar2-222/+330
For NVLink topology systems we need fabricmanager. Fabricmanager itself is dependent on the datacenter driver set and not the regular x11 ones, it is also tightly tied to the driver version. Furhtermore the current cudaPackages defaults to version 11.8, which corresponds to the 520 datacenter drivers. Future improvement should be to switch the main nvidia datacenter driver version on the `config.cudaVersion` since these are well known from: > https://docs.nvidia.com/deploy/cuda-compatibility/index.html#use-the-right-compat-package This adds nixos configuration options `hardware.nvidia.datacenter.enable` and `hardware.nvidia.datacenter.settings` (the settings configure fabricmanager) Other interesting external links related to this commit are: * Fabricmanager download site: - https://developer.download.nvidia.com/compute/cuda/redist/fabricmanager/linux-x86_64/ * Data Center drivers: - https://www.nvidia.com/Download/driverResults.aspx/193711/en-us/ Implementation specific details: * Fabricmanager is added as a passthru package, similar to settings and presistenced. * Adds `use{Settings,Persistenced,Fabricmanager}` with defaults to preserve x11 expressions. * Utilizes mkMerge to split the `hardware.nvidia` module into three comment delimited sections: 1. Common 2. X11/xorg 3. Data Center * Uses asserts to make the configurations mutualy exclusive. Notes: * Data Center Drivers are `x86_64` only. * Reuses the `nvidia_x11` attribute in nixpkgs on enable, e.g. doesn't change it to `nvidia_driver` and sets that to either `nvidia_x11` or `nvidia_dc`. * Should have a helper function which is switched on `config.cudaVersion` like `selectHighestVersion` but rather `selectCudaCompatibleVersion`.
2023-09-12Merge pull request #254324 from marsam/update-postgisMario Rodas1-1/+1
postgresqlPackages.postgis: 3.3.3 -> 3.4.0
2023-09-12nixos/meme-bingo-web: init serviceAnna Aurora2-0/+94
2023-09-11Merge pull request #244722 from mdlayher/mdl-dhcpMaciej Krüger1-0/+3
2023-09-11Merge pull request #254080 from rnhmjoj/pr-passwordpennae2-14/+28
nixos/users-groups: rename passwordFile in hashedPasswordFile
2023-09-11nixos/acme: rename option credentialsFile to environmentFiledatafoo3-7/+11
2023-09-11nixos/acme: add option to set credential filesdatafoo1-0/+31
This is to leverage systemd credentials for variables suffixed by _FILE.
2023-09-11Merge pull request #253427 from Yarny0/sshd-requiredrsasizeMaximilian Bosch1-2/+1
nixos/sshd: don't validate mock host key, permit `RequiredRSASize`
2023-09-11Merge pull request #251323 from saserr/improve-healthchecksLassulus1-9/+36
healthchecks: add DB, DB_NAME and support for several _FILE options
2023-09-11nixos/pam: fix typo in fscrypt enable optionmib1-1/+1
mkEnableOption prepends "Whether to enable" to text, so this became "Whether to enable Enables fscrypt ..."
2023-09-11Merge pull request #254429 from ctheune/fix-swraid-for-old-initK9002-1/+4
nixos/swraid: fix regression for old initrd and add test coverage
2023-09-11Merge pull request #253973 from trofi/bcache-make-optionalArtturi2-4/+10
2023-09-11oroborus: removeAnderson Torres1-25/+0
Because it is dead.
2023-09-10Merge pull request #250501 from miallo/nixos-rebuild/list-generationsDoron Behar1-0/+2
nixos-rebuild: Add list-generations
2023-09-10nixos/swraid: fix regression for old initrd and add test coverageChristian Theune2-1/+4
2023-09-10Merge pull request #254056 from n8henrie/masterFlorian Klink1-1/+3
Include note about systemd default watchdog reboot time
2023-09-10Merge pull request #246243 from yu-re-ka/electron-libexecYorick1-0/+2
electron-bin: place electron files in libexec/
2023-09-10nixos/swraid: fix monitor serviceChristian Theune2-5/+22
2023-09-10nixos/bcache: add a `boot.bcache.enable` kill switchSergei Trofimovich2-4/+10
My system does not use `bcache` and I sould prever my `systemPackages` not to have bcache tools. The change does not change the default but proviced usual `enable` knob.
2023-09-10nixos-rebuild: Add list-generationsMichael Lohmann1-0/+2
Add new command `nixos-rebuild list-generations`. It will show an output like ``` $ nixos-rebuild list-generations Generation Build-date NixOS version Kernel Configuration Revision Specialisations 52 (current) Fri 2023-08-18 08:17:27 23.11.20230817.0f46300 6.4.10 448160aeccf6a7184bd8a84290d527819f1c552c * 51 Mon 2023-08-07 17:56:41 23.11.20230807.31b1eed 6.4.8 99ef480007ca51e3d440aa4fa6558178d63f9c42 * ``` This also mentions the change in the upcoming release notes
2023-09-10Merge pull request #249939 from erdnaxe/galene-fixNick Cao1-1/+1
nixos/galene: do not restrict AF_NETLINK
2023-09-10rl-2311: add note about electron path changeYureka1-0/+2
2023-09-10Merge pull request #254333 from amarshall/fix-networkd-reloadK9001-3/+2
nixos/networkd: Fix incorrectly treating attrset as list
2023-09-10Merge pull request #251770 from robryk/suidwrapapparmPierre Bourdon5-124/+39
nixos/security/wrappers: simplifications and a fix for #98863 (respin of #199599)
2023-09-10nixos/networkd: Fix incorrectly treating attrset as listAndrew Marshall1-3/+2
This reverses a [change made during PR review][1] that I did not sufficiently test, causing [this error][2]. [1]: https://github.com/NixOS/nixpkgs/pull/249643#discussion_r1309151135 [2]: https://github.com/NixOS/nixpkgs/pull/249643#issuecomment-1712707336
2023-09-09Merge pull request #246201 from n0emis/zigbee2mqtt-groups-fileJanik1-1/+2
2023-09-09security/acme: limit concurrent certificate generationsOliver Schmidt3-14/+136
fixes #232505 Implements the new option `security.acme.maxConcurrentRenewals` to limit the number of certificate generation (or renewal) jobs that can run in parallel. This avoids overloading the system resources with many certificates or running into acme registry rate limits and network timeouts. Architecture considerations: - simplicity, lightweight: Concerns have been voiced about making this already rather complex module even more convoluted. Additionally, locking solutions shall not significantly increase performance and footprint of individual job runs. To accomodate these concerns, this solution is implemented purely in Nix, bash, and using the light-weight `flock` util. To reduce complexity, jobs are already assigned their lockfile slot at system build time instead of dynamic locking and retrying. This comes at the cost of not always maxing out the permitted concurrency at runtime. - no stale locks: Limiting concurrency via locking mechanism is usually approached with semaphores. Unfortunately, both SysV as well as POSIX-Semaphores are *not* released when the process currently locking them is SIGKILLed. This poses the danger of stale locks staying around and certificate renewal being blocked from running altogether. `flock` locks though are released when the process holding the file descriptor of the lock file is KILLed or terminated. - lockfile generation: Lock files could either be created at build time in the Nix store or at script runtime in a idempotent manner. While the latter would be simpler to achieve, we might exceed the number of permitted concurrent runs during a system switch: Already running jobs are still locked on the existing lock files, while jobs started after the system switch will acquire locks on freshly created files, not being blocked by the still running services. For this reason, locks are generated and managed at runtime in the shared state directory `/var/lib/locks/`. nixos/security/acme: move locks to /run also, move over permission and directory management to systemd-tmpfiles nixos/security/acme: fix some linter remarks in my code there are some remarks left for existing code, not touching that nixos/security/acme: redesign script locking flow - get rid of subshell - provide function for wrapping scripts in a locked environment nixos/acme: improve visibility of blocking on locks nixos/acme: add smoke test for concurrency limitation heavily inspired by m1cr0man nixos/acme: release notes entry on new concurrency limits nixos/acme: cleanup, clarifications
2023-09-09nixos/decklink: inithexchen2-0/+17
2023-09-09Merge pull request #249964 from ambroisie/woodpecker-improvementsJanik1-18/+41
2023-09-09Merge pull request #253739 from mweinelt/firefox-102-removalajs1241-1/+0
firefox-esr-102-unwrapped: remove
2023-09-09Merge pull request #252006 from ajs124/logrotate-extraParamsLassulus1-3/+9
2023-09-09nixos/tt-rss: fix and significantly simplify database setupajs1241-41/+3
the schema files referenced in the current preStart are empty. other ones exist, but don't apply cleanly either. calling update.php with --update-schema works for initial setup and updates. if the database schema is already up to date, it's idempotent.
2023-09-09Merge pull request #251062 from ajs124/restic-wrapper-scriptJanik3-12/+42
2023-09-09Merge pull request #251302 from Mic92/buildbotLassulus1-1/+7
nixos/buildbot: support reload, buildbot-www-react: init 3.9
2023-09-09Merge pull request #254166 from Artturin/fixthingy1Artturi1-1/+1
2023-09-09Merge pull request #248502 from kurnevsky/wstunnelYorick1-2/+2
wstunnel: correct listen option
2023-09-09Merge pull request #249643 from amarshall/networkd-reloadJanne Heß1-2/+9
nixos/networkd: Reload (not restart) when only .network units change
2023-09-09Merge pull request #254027 from luochen1990/feature-better-binfmtJanne Heß1-1/+1
nixos/binfmt: improve type annotations
2023-09-09nixos/listmonk: fixing datatype of optionsrevol-xut1-2/+2
2023-09-09nixos/cfdyndns: add option to use CF tokenTimothy DeHerrera1-1/+13
2023-09-09Merge pull request #254029 from delroth/sudo-maintainersPierre Bourdon1-1/+1
sudo, nixosTests.sudo: refresh set of maintainers
2023-09-09nixos/stage-2-init: dont use install to create /etc/nixos if it's a symlinkArtturin1-1/+1
it should be checking that it is not a broken symlink but bash conditionals are difficult -d was causing the directory to not be created if it does not exist ``` $ install -m 0755 -d $PWD/hello $ ls hello/ $ ln -s something notexist 'notexist' -> 'something' $ ls -l lrwxrwxrwx artturin artturin 9 B Sat Sep 9 06:59:44 2023 notexist@ ⇒ something drwxr-xr-x artturin artturin 2 B Sat Sep 9 06:59:36 2023 hello/ $ install -m 0755 -d $PWD/notexist install: cannot change permissions of ‘/home/artturin/nixgits/my-nixpkgs/test/notexist’: No such file or directory ```
2023-09-09Merge pull request #254089 from BruNeu/patch-1Weijia Wang1-1/+1
nixos/stalwart-mail: fixed broken link
2023-09-08nixos/stalwart-mail: fixed broken linkBruNeu1-1/+1
2023-09-08Merge pull request #254078 from nbraud/hailMaciej Krüger3-62/+2
2023-09-08plausible: 1.4.4 -> 1.5.1Salar Rahmanian1-0/+1
2023-09-08nixos/hail: Remove modulenicoo3-62/+2
2023-09-08nixos/users-groups: rename passwordFile in hashedPasswordFilernhmjoj2-14/+28
This avoids the possible confusion with `passwordFile` being the file version of `password`, while it should contain the password hash. Fixes issue #165858.
2023-09-08systemd.watchdog: (docs): include note about systemd default watchdog reboot ↵Nathan Henrie1-1/+3
time I found it very confusing to get an error message on reboot about `10min` when that didn't seem to be the NixOS default.
2023-09-08Merge pull request #253299 from pennae/jack-toolspennae1-0/+2
jack-example-tools: init at 4