about summary refs log tree commit diff
path: root/nixos
AgeCommit message (Collapse)AuthorFilesLines
2022-03-13nixos/jellyfin: Disable PrivateDevices from hardening to allow GPU endpoints ↵Giulio De Pasquale1-1/+2
to be accessed
2022-03-13Merge pull request #163069 from helsinki-systems/feat/minor-stc-improvementsJanne Heß4-94/+328
nixos/switch-to-configuration: Few minor/medium improvements
2022-03-13Merge pull request #162252 from sternenseemann/systemd-boot-builder-fix-errorsLuke Granger-Brown1-5/+16
sdboot-builder: fix crash in exception handling
2022-03-13sdboot-builder: fix crash in exception handlingMaëlys Bras de fer1-5/+16
2022-03-13nixos/tomcat: add basic test case using the example appSander van der Burg2-0/+22
2022-03-13nixos/squeezelite: add support for PulseAudio versionPeter Hoeg1-21/+17
2022-03-13nixos/tomcat: configure default group and fix broken default package referenceSander van der Burg1-3/+4
Without this fix, evaluating a NixOS configuration with Tomcat enabled and the default settings results in the following evaluation error: Failed assertions: - users.users.tomcat.group is unset. This used to default to nogroup, but this is unsafe. For example you can create a group for this user with: users.users.tomcat.group = "tomcat"; users.groups.tomcat = {};
2022-03-13nixos/captive-browser: add to menu barPeter Hoeg1-1/+19
2022-03-13nixos/earlyoom: use the newly introduced systembus-notify optionPeter Hoeg1-85/+70
Also some cleanups.
2022-03-13nixos/systembus-notify: add support for system services notifying usersPeter Hoeg4-0/+41
2022-03-13nixos/pantheon: enable xdg desktop integrationBobby Rong1-0/+1
This prevents the embarrassing situation in https://github.com/NixOS/nixpkgs/pull/163828 from happening again.
2022-03-13nixos/networkd: add support for more WireGuard options (introduced in ↵Luke Granger-Brown1-0/+4
systemd v250) As of systemd/systemd@e90843445890586912ec366cf017f01483c7fdd6, systemd-networkd now automatically configures routes to addresses specified in AllowedIPs unless explicitly disabled with "RouteTable=off".
2022-03-13Merge pull request #163673 from lukegb/pomeriumLuke Granger-Brown3-3/+22
pomerium: 0.15.7 -> 0.17.0
2022-03-12Merge pull request #159865 from midchildan/update/epgstationKevin Cox4-276/+385
epgstation: 1.7.5 -> 2.6.20
2022-03-12Merge pull request #163304 from gravndal/amule-daemonArtturi1-1/+1
2022-03-12nixos/oci-containers: improve description of imageFileIan Kerins1-4/+6
As a novice to using this module, I found the existing description to be quite misleading. It does not at all disable pulling from the registry, it just loads some image archive that may or may not be related to the container you're specifying. I had thought there was extra magic behind this option, but it's just a `docker load`. You need foreknowledge of the contents of the archive so that whatever it contained is actually used to run the container. I've reworded the description to hopefully make this behavior clearer.
2022-03-12Merge pull request #163454 from flokli/iptables-nft-legacy-more-rlFlorian Klink2-1/+18
nixos/doc: update rl-2111 w.r.t. iptables-nft migration
2022-03-12nixos/rl-2205: fix invalid linkmidchildan2-6/+5
2022-03-12epgstation: make updateScript create EditorConfig-compliant filesmidchildan1-1/+1
2022-03-12nixos/rl-2205: add entries for EPGStation v2midchildan3-4/+81
2022-03-12nixos/epgstation: changes for EPGStation v2midchildan2-277/+310
2022-03-12nixos: add functions and documentation for escaping systemd Exec* directivespennae6-0/+157
it's really easy to accidentally write the wrong systemd Exec* directive, ones that works most of the time but fails when users include systemd metacharacters in arguments that are interpolated into an Exec* directive. add a few functions analogous to escapeShellArg{,s} and some documentation on how and when to use them.
2022-03-11pomerium: note changes in packaging in 22.05 release notesLuke Granger-Brown2-0/+15
2022-03-11nixos/pomerium: avoid blocking when renewing ACME certificatesLuke Granger-Brown1-3/+7
2022-03-11nixos/mate: allow remove any added packageIlya Fedin1-6/+5
Only extra packages removable currently, but it's possible to run MATE without packages like caja or yelp
2022-03-11nixos/switch-to-configuration: Use parenthesis on all callsJanne Heß1-88/+89
2022-03-11nixos/switch-to-configuration: Fix reloading of stopped servicesJanne Heß4-0/+98
2022-03-11nixos/switch-to-configuration: Fix restarting by activation scriptJanne Heß1-2/+10
This bug is so obscure and unlikely that I was honestly not able to properly write a test for it. What happens is that we are calling handleModifiedUnit() with $unitsToStart=\%unitsToRestart. We do this to make sure that the unit is stopped before it's started again which is not possible by regular means because the stop phase is already done when calling the activation script. recordUnit() still gets $startListFile, however which is the wrong file. The bug would be triggered if an activation script requests a service restart for a service that has `stopIfChanged = true` and switch-to-configuration is killed before the restart phase was run. If the script is run again, but the activation script is not requesting more restarts, the unit would be started instead of restarted.
2022-03-11nixos/switch-to-configuration: Ignore some unit keysJanne Heß4-18/+71
Some unit keys don't need to restart the service to make them effective. Reduce the amount of service restarts by ignoring these keys
2022-03-11nixos/switchTest: Also test targetsJanne Heß1-0/+74
2022-03-11Merge staging-next into staginggithub-actions[bot]4-8/+14
2022-03-11Merge pull request #163443 from ncfavier/fix-types-packageRobert Hensing2-2/+5
lib.types.package: only call toDerivation when necessary
2022-03-11lib.types.package: only call toDerivation when necessaryNaïm Favier2-2/+5
The current logic assumes that everything that isn't a derivation is a store path, but it can also be something that's *coercible* to a store path, like a flake input. Unnecessary uses of `lib.toDerivation` result in errors in pure evaluation mode when `builtins.storePath` is disabled. Also document what a `package` is.
2022-03-11Merge pull request #162411 from kurnevsky/tox-node-service-fixBobby Rong1-6/+1
tox-node: fix config hash and url
2022-03-11modules/github-runner: Improve description of `url`Profpatsch1-0/+8
We spent a whole afternoon debugging this, because upstream has very bad software quality and the error messages were incredibly misleading. So let’s document it for the sanity of other people. Btw, I think the implementation of our module is pretty brittle, especially the part about diffing tokens to check whether they changed. We should rather just request a new builder registration every time, it’s not that much overhead, and always set `replace` so it is idempotent.
2022-03-11nixos/hadoop: add release notesillustris2-0/+59
2022-03-11nixos/hadoop: add module options for commonly used service configsillustris6-49/+194
2022-03-11nixos/hadoop: use CGroups to enforce container limits by defaultillustris3-3/+9
2022-03-11nixos/hadoop: add gateway roleillustris4-52/+57
2022-03-11nixos/hadoop: fix tests for hadoop 2 and 3.2illustris3-16/+35
2022-03-11nixos/hadoop: use FairScheduler by defaultillustris2-4/+1
2022-03-11hadoop: add passthrough testsillustris5-146/+162
2022-03-11nixos/hadoop: add HADOOP_CONF_DIR to envillustris1-0/+1
2022-03-11nixos/hadoop: disable openFirewall by defaultillustris5-16/+56
2022-03-11nixos/hadoop: refactor HDFS configsillustris1-111/+100
2022-03-11plantuml-server 1.2021.12 -> 1.2022.2Krzysztof Nazarewski1-3/+18
- changed JDK version to 17 (11+ required) - added maven build reproducibility
2022-03-11Merge staging-next into staginggithub-actions[bot]7-0/+264
2022-03-11Merge pull request #163009 from scvalex/nbd-servicepennae7-0/+264
nbd: add nbd service and test
2022-03-11Merge staging-next into staginggithub-actions[bot]6-2/+154
2022-03-10Merge pull request #159986 from NukaDuka/pve_exporterMartin Weinelt5-0/+150