about summary refs log tree commit diff
path: root/nixos
AgeCommit message (Collapse)AuthorFilesLines
2022-04-16Merge master into staging-nextgithub-actions[bot]4-1/+66
2022-04-16nixos/doc: move "Building NixOS" into "Installation", not "Development"Florian Klink4-1/+1
This section mostly describes how to build various installer images, so it fits better in that chapter. Proposed in https://github.com/NixOS/nixpkgs/pull/168306#discussion_r848329534
2022-04-16Merge pull request #168306 from flokli/nixos-doc-installer-driversFlorian Klink2-0/+65
nixos/doc: add notes on additional drivers or firmware
2022-04-16Merge master into staging-nextgithub-actions[bot]4-8/+44
2022-04-16nixos/ipfs: fix the services.ipfs.autoMigrate optionLuflosi1-3/+3
Apparently this was never properly tested and never worked. When the IPFS repo needs upgrading, the first call to ipfs, which is run before running the migration, fails with the error message "Error: ipfs repo needs migration". To fix this, simply run the migration before any `ipfs config` calls but don't run it when `dataDir` is empty and we need to call `ipfs init`. Writing a NixOS test for this would require keeping at least two versions of IPFS in Nixpkgs, which we don't currently do.
2022-04-16nixos/ipfs: add Luflosi as maintainerLuflosi1-0/+3
2022-04-16nixos/ipfs: remove unused codeLuflosi1-2/+1
This code became obsolete with 4044d81d5cea617e58ec9682f9cc447dde326850, just a couple days after it was introduced.
2022-04-16Merge pull request #162550 from fortuneteller2k/polybarFranz Pletz2-0/+21
2022-04-16Merge pull request #168816 from thiagokokada/graalvm-cleanupThiago Kenji Okada2-0/+13
graalvmXX-ee: remove; graalvmXX-ce: remove Ruby/Python/WASM support
2022-04-16polybar: 3.5.7 -> 3.6.2fortuneteller2k2-0/+21
Co-authored-by: Alexander Foremny <aforemny@posteo.de>
2022-04-16nixos/logrotate: use packages from buildPackages in configuration ↵Nick Cao1-3/+3
checkPhase, fixing cross compilation
2022-04-16Merge master into staging-nextgithub-actions[bot]2-1/+4
2022-04-16tests/emacs-daemon: fix failure for unset $DISPLAYAzat Bahawi1-1/+1
axelf4 figured[1] out a workaround for fixing a failure due to an unset $DISPLAY variable. [1] https://github.com/NixOS/nixpkgs/pull/168076#issuecomment-1098083299
2022-04-15Merge pull request #129304 from yisraeldov/patch-1Mario Rodas1-0/+3
programs.chromium: fix policies for brave
2022-04-16Merge remote-tracking branch 'origin/master' into staging-nextMartin Weinelt10-605/+745
2022-04-15nixos/matrix-synapse: fix typo in mkRemovedOptionModule replacementInstructionsLuflosi1-1/+1
The correct capitalisation is lower-case here.
2022-04-15Merge pull request #162509 from mkg20001/hasteLassulus4-0/+111
haste-server: init at 3dcc43578b99dbafac35dece9d774ff2af39e8d0
2022-04-15Merge pull request #167378 from talyz/keycloak-quarkusKim Lindberger5-604/+633
keycloak: Switch to the new Quarkus version of Keycloak
2022-04-15nixos/doc: add note about the recent graalvmXX-ce changesThiago Kenji Okada2-0/+13
2022-04-15Merge master into staging-nextgithub-actions[bot]4-11/+17
2022-04-15Merge pull request #168764 from rnhmjoj/pr-pdns-ncdnsMichele Guerini Rocco4-11/+17
nixos/ncdns: listen on IPv6 by default
2022-04-15Merge remote-tracking branch 'origin/master' into staging-nextMartin Weinelt1-16/+11
2022-04-15Merge pull request #156401 from TLATER/tlater/gitea-hide-secretsMichele Guerini Rocco1-16/+11
nixos/gitea: Prevent secrets from being exposed at ExecStart time
2022-04-15Merge master into staging-nextgithub-actions[bot]1-1/+1
2022-04-14python3Packages.fenics: fix build, pin to older boost (#166728)Will Dietz1-1/+1
* python3Packages.fenics: fix build, pin to older boost Looking at upstream, there are various issues with newer boost. (At least some of them have been since fixed) For now, fix the build by using a version of boost that works with the current version. Error here was complaining about `std::min_element`, which is no longer available, apparently, due to newer boost no longer (transitively) including <algorithm>. This was added in C++17, so I'm not sure the cmake flag specifying dolfin built with C++11 makes sense or is used. Leaving for now :). * nixos/tests/fenics: fix name of machine/node in script Still fails for now. * python3Packages.fenics: fix accidentally changed strings in subst Looks like in migration to pkg-config this was erroneously changed from `pkgconfig` (python package, and source string) to `pkg-config` (nix package name, tool name). (see 9bb3fccb5b55326cb3c2c507464a8a28d44d1730) Fixes the NixOS test.
2022-04-15Merge staging-next into staginggithub-actions[bot]2-9/+23
2022-04-14nixos/console: Fix attribute path to fix evalJanne Heß1-1/+1
2022-04-14Merge pull request #168600 from helsinki-systems/feat/systemd-stage-1-keymapLassulus2-9/+23
nixos/stage-1-systemd: Add keymap support
2022-04-14nixos/release-notes: document ncdns incompatible changesrnhmjoj2-0/+9
2022-04-14nixos/tests/ncdns: fix testrnhmjoj1-9/+6
1. Add another wait_for_unit("pdns-recursor") (this is needed when DNSSEC is disabled) 2. Make everything IPv6
2022-04-14nixos/ncdns: listen on IPv6 by defaultrnhmjoj1-2/+2
2022-04-14Merge staging-next into staginggithub-actions[bot]12-33/+226
2022-04-14Merge pull request #168535 from rnhmjoj/pr-pdns-nixosMichele Guerini Rocco4-8/+47
nixos/pdns-recursor: update default values
2022-04-14Merge pull request #168301 from helsinki-systems/feat/systemd-stage-1-mdadmJanne Heß5-10/+89
nixos/stage-1-systemd: Add mdraid support (+ test)
2022-04-14doc/release-notes: mention pdns-recursor options changesrnhmjoj2-0/+31
2022-04-14nixos/tests/pdns-recursor: test a DNS queryrnhmjoj1-1/+4
2022-04-14nixos/pdns-recursor: update default valuesrnhmjoj1-7/+12
1. Update the default values of several addresses-related settings that have been changed by upstream. 2. Make `dns.address` take multiple addresses. This is needed for dual stack, now working by default.
2022-04-14Merge pull request #161253 from flokli/kexec-bootFlorian Klink2-14/+89
nixos/installer: add kexec-boot
2022-04-14nixosTests.kexec: fix tests with kexecBoot formatFlorian Klink1-6/+8
2022-04-14nixos/doc/md-to-db.sh: consistent pandoc versionAlyssa Ross1-1/+1
Until now, this script has used the version of pandoc from unstable. This means that running the script on the same version of Nixpkgs could produce different results, and meant that when Pandoc's output was changed, random PRs were changing the whole manual when they ran the script to regenerate docs[1][2]. Here I've changed the manual to use a consistent version of pandoc — the one from the latest release tag, which will avoid this problem in future. This will avoid this problem in future. The only time we'll need to worry about pandoc output changes is when we bump the version used in this script. I also considered using the version from the current Nixpkgs branch, but decided against it as it's unlikely that e.g. the person bumping Pandoc will remember to regenerate the manual. [1]: https://github.com/NixOS/nixpkgs/pull/162550 [2]: https://github.com/NixOS/nixpkgs/pull/168535
2022-04-14Merge staging-next into staginggithub-actions[bot]12-12/+196
2022-04-14Merge pull request #168609 from rnhmjoj/pr-test-driverJacek Galowicz2-3/+7
nixos/test-driver: highlight driver log lines
2022-04-14Merge pull request #168328 from K900/fix-nix-ld-testpennae1-1/+1
tests/nix-ld: fix invocation
2022-04-14nixos/stage-1-systemd: Add mdraid support (+ test)Janne Heß5-10/+89
2022-04-14Merge pull request #167393 from iblech/patch-docs-ccJanne Heß2-0/+20
nixos-rebuild, switch-to-configuration: document and protect against cross compilation subtlety
2022-04-14nixos/test-driver: highlight driver log linesrnhmjoj2-3/+7
There is a whole lot of noise in a NixOS test log due to journal, commands, and test driver messages all being mixing together. With this commit the test driver messages are highlighted so you don't have to squint too much to see where a subtest starts and ends or what was the last command being run. Here's an excerpt from a highlighted log: machine # [ 6.647826] dhcpcd[668]: eth0: adding default route via 10.0.2.2 machine # I've had a great day! (finished: must succeed: curl -sfL https://example.com/how-are-you? | tee /dev/stderr, in 0.19 seconds) (finished: subtest: Privoxy can filter https requests, in 0.22 seconds) subtest: Blocks are working machine: waiting for TCP port 443 machine # Connection to localhost (::1) 443 port [tcp/https] succeeded! (finished: waiting for TCP port 443, in 0.03 seconds) machine: must fail: curl -f https://example.com/ads 1>&2 machine # [ 6.730608] nscd[742]: 742 monitored file `/etc/resolv.conf` was written to machine # [ 6.733071] privoxy[814]: 2022-04-14 09:41:01.695 7fa995c39640 Actions: +block{Fake ads} ... machine # curl: (22) The requested URL returned error: 403 machine # [ 6.753098] systemd[1]: Stopping Name Service Cache Daemon... machine # [ 6.755632] systemd[1]: nscd.service: Deactivated successfully. machine # [ 6.757069] systemd[1]: Stopped Name Service Cache Daemon. (finished: must fail: curl -f https://example.com/ads 1>&2, in 0.07 seconds) machine: must succeed: curl -f https://example.com/PRIVOXY-FORCE/ads 1>&2 machine # [ 6.765099] systemd[1]: Starting Name Service Cache Daemon... machine # [ 6.781519] nscd[925]: 925 monitoring file `/etc/passwd` (1) machine # [ 6.844105] systemd[1]: Reached target Network is Online. machine # [ 6.848860] privoxy[814]: 2022-04-14 09:41:01.805 7fa995c39640 Actions: +block{Fake ads} ... machine # [ 6.856068] nscd[925]: 925 monitoring file `/etc/nsswitch.conf` (8) machine # [ 6.858229] systemd[1]: Reached target Multi-User System. machine # [ 6.858934] nscd[925]: 925 monitoring directory `/etc` (2) machine # [ 6.861315] systemd[1]: Startup finished in 2.374s (kernel) + 4.451s (userspace) = 6.826s. machine # Hot Nixpkgs PRs in your area. Click here! machine # [ 6.873055] nscd[925]: 925 monitoring directory `/etc` (2) machine # [ 6.874489] nscd[925]: 925 monitoring file `/etc/nsswitch.conf` (8) machine # [ 6.875599] nscd[925]: 925 monitoring directory `/etc` (2) (finished: must succeed: curl -f https://example.com/PRIVOXY-FORCE/ads 1>&2, in 0.12 seconds) (finished: subtest: Blocks are working, in 0.22 seconds) subtest: Temporary certificates are cleaned machine: must succeed: test $(ls /run/privoxy/certs | wc -l) -gt 0 (finished: must succeed: test $(ls /run/privoxy/certs | wc -l) -gt 0, in 0.02 seconds) machine: must succeed: date -s "$(date --date '12 days')" (finished: must succeed: date -s "$(date --date '12 days')", in 0.02 seconds) machine # [ 6.959589] systemd[1]: Started Logrotate Service. machine # [ 6.966685] systemd[1]: Starting Cleanup of Temporary Directories... machine # [ 6.974783] systemd[1]: logrotate.service: Deactivated successfully. machine # [ 7.004493] systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. machine # [ 7.005457] systemd[1]: Finished Cleanup of Temporary Directories. machine: must succeed: test $(ls /run/privoxy/certs | wc -l) -eq 0 (finished: must succeed: test $(ls /run/privoxy/certs | wc -l) -eq 0, in 0.01 seconds) (finished: subtest: Temporary certificates are cleaned, in 0.15 seconds) (finished: run the VM test script, in 7.44 seconds) test script finished in 7.48s cleanup kill machine (pid 8)
2022-04-14nixos/stage-1-systemd: Add keymap supportJanne Heß2-9/+23
Makes my life a lot easier with my non-american keyboard layout
2022-04-14Merge pull request #168302 from helsinki-systems/feat/systemd-stage-1-lvmLassulus3-7/+150
nixos/stage-1-systemd: Add LVM2 support (+ test)
2022-04-14Merge pull request #168477 from ↵Janne Heß4-1/+14
helsinki-systems/feat/systemd-stage-1-hibernation nixos/stage-1-systemd: Implement and test hibernation
2022-04-14Merge branch 'staging-next' into stagingVladimír Čunát39-271/+1420
Minor conflicts; I hope I didn't mess up: pkgs/development/tools/misc/binutils/default.nix pkgs/games/openjk/default.nix