about summary refs log tree commit diff
path: root/nixos
AgeCommit message (Collapse)AuthorFilesLines
2020-07-21Merge pull request #72320 from sweber83/sw-zigbee2mqttLassulus4-0/+120
zigbee2mqtt package & module
2020-07-20Merge pull request #93451 from edef1c/os-loginedef1-2/+4
nixos/users-groups: don't consider a system with Google OS Login inaccessible
2020-07-21Merge pull request #74174 from raboof/fix-74047-stable-gpt-disk-guidTimo Kaufmann2-11/+7
make-iso9660-image: produce stable GPT disk GUID
2020-07-21Merge pull request #93355 from Izorkin/nginx-unitFlorian Klink1-1/+1
nixos/unit: add 'tmp' directory
2020-07-21Merge pull request #93422 from helsinki-systems/fix/gitlab-sidekiq-warnFlorian Klink1-1/+1
nixos/gitlab: Drop sidekiq PID file
2020-07-20Merge pull request #93073 from helsinki-systems/tmpfiles-packagesFlorian Klink3-21/+63
nixos/systemd: Implement a packages option for tmpfiles
2020-07-20nixos/zigbee2mqtt: add minimal testSimon Weber1-0/+19
2020-07-20nixos/zigbee2mqtt: initSimon Weber3-0/+101
2020-07-20nixos/modules/system/activation/top-level.nix: allow overriding system.nameBas van Dijk2-11/+19
The toplevel derivations of systems that have `networking.hostName` set to `""` (because they want their hostname to be set by DHCP) used to be all named `nixos-system-unnamed-${config.system.nixos.label}`. This makes them hard to distinguish. A similar problem existed in NixOS tests where `vmName` is used in the `testScript` to refer to the VM. It defaulted to the `networking.hostName` which when set to `""` won't allow you to refer to the machine from the `testScript`. This commit makes the `system.name` configurable. It still defaults to: ``` if config.networking.hostName == "" then "unnamed" else config.networking.hostName; ``` but in case `networking.hostName` needs to be to `""` the `system.name` can be set to a distinguishable name.
2020-07-20lib: toHex -> toHexString & toBase -> toBaseDigitsBas van Dijk1-1/+1
This makes the type of these functions more apparent from the name.
2020-07-20nixos/tests/networking.nix: test the services.dhcpd4.machines optionBas van Dijk2-9/+15
This modifies the `router` to not give out a range of IP addresses but only give out a fixed address based on the MAC address using the `services.dhcpd4.machines` option. To get access to the MAC address the `qemuNicMac` function is defined and exported from `qemu-flags.nix`.
2020-07-20nixos/tests: support up to 255 nodes in NixOS testsBas van Dijk1-1/+5
2020-07-20Merge pull request #85689 from danieldk/resilio-module-fixDaniël de Kok1-3/+3
nixos/resilio: fix directoryRoot configuration
2020-07-20nixos/resilio: fix directoryRoot configurationDaniël de Kok1-3/+3
The resilio module places the directoryRoot configuration in the webui section. However, the generated configuration fails on the current version of Resilio Sync with: Invalid key context: 'directory_root' must be in global config section This change places this key in the global configuration section to solve this error.
2020-07-20make-iso9660-image: produce stable GPT disk GUIDArnout Engelen2-11/+7
By generating a version-5 GUID based on $out (which contains the derivation hash) and preventing isohybrid from overwriting the GPT table (which already is populated correctly by xorriso). Tested by: * booting from USB disk on a UEFI system * booting from USB disk on a non-UEFI system * booting from CD on a UEFI system * booting from CD on a non-UEFI system * booting from CD on an OSX system Also tested that "nix-build ./nixos/release-combined.nix -A nixos.iso_minimal.x86_64-linux -I nixpkgs=~/nixpkgs-r13y --check" now succeeds. Fixes #74047
2020-07-19oauth2_proxy: 5.1.1 -> 6.0.0 (#93121)Nikola Knežević1-5/+7
The new release fixes one of the outstanding CVEs against oauth2_proxy: https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-5m6c-jp6f-2vcv. In addition, rename the owner and the project name to reflect the changes upstream (it now belongs to the oauth2-proxy organization, and the name is oauth2-proxy)
2020-07-20nixos/wireguard: Fix mismatched XML tagaszlig1-1/+1
Build error introduced in fe7053f75a912197f312d890740dd3bdde0ed994: parser error : Opening and ending tag mismatch: commmand line 6139 and command escription><para>Base64 preshared key generated by <commmand>wg genpsk</command> ^ Writing "command" with only two "m" fixes building the NixOS manual. Signed-off-by: aszlig <aszlig@nix.build>
2020-07-19Merge pull request #93474 from tnias/fix20200719Jörg Thalheim2-17/+18
2020-07-19nixos/containers: correct isNormaUser to isNormalUser06kellyjac1-1/+1
Correct a small spelling slip up
2020-07-19nixos/wireguard: fix typos and unify formattingPhilipp Bartsch2-17/+18
2020-07-19nixos/users-groups: don't consider a system with Google OS Login inaccessibleedef1-2/+4
This allows disabling users.mutableUsers without configuring any authentication mechanisms (passwords, authorized SSH keys) other than Google OS Login.
2020-07-18nixos/gitlab: Drop sidekiq PID fileJanne Heß1-1/+1
> WARNING: PID file creation will be removed in Sidekiq 6.0, see #4045. Please use a proper process supervisor to start and manage your services Since NixOS uses a proper process supervisor AND does not use the PID file anywhere, we can just drop it to be upwards compatible and fix that warning.
2020-07-18nixos/manual: Fix reference to copy_from_hostOlli Helenius1-1/+1
2020-07-18Merge pull request #76487 from ryneeverett/lockkernelmodules-dockerJörg Thalheim1-0/+1
2020-07-18Merge pull request #93290 from danieldk/manual-opencl-amdDaniël de Kok2-0/+105
nixos/manual: add a section about enabling OpenCL for AMD GPUs
2020-07-18nixos/docker: explicitly load kernel modulesryneeverett1-0/+1
This is analogous to #70447. With security.lockKernelModules=true, docker commands result in the following error without at least loading veth: $ docker run hello-world /nix/store/mr50kaan2vs4gc40ymwncb2vci25aq7z-docker-19.03.2/libexec/docker/docker: Error response from daemon: failed to create endpoint epic_kare on network bridge: failed to add the host (veth8b381f3) <=> sandbox (veth348e197) pair interfaces: operation not supported. ERRO[0003] error waiting for container: context canceled
2020-07-18nixos/systemd: Implement a packages option for tmpfilesJanne Heß3-21/+63
Also drop the `portables` tmpfiles because the file is missing in the systemd derivation.
2020-07-17Merge pull request #93291 from mdlayher/mdl-mmexporterWilliButz3-0/+59
prometheus-modemmanager-exporter: init at 0.1.0, add NixOS module
2020-07-17nixos/prometheus-modemmanager-exporter: new moduleMatt Layher3-0/+59
Signed-off-by: Matt Layher <mdlayher@gmail.com>
2020-07-17nixos/unit: add 'tmp' directoryIzorkin1-1/+1
2020-07-17Merge pull request #93104 from Kloenk/moodle-pluginsLassulus1-5/+9
nixos/moodle: add plugins
2020-07-17nixos/matrix-synapse: update documentationclaudiiii1-18/+20
2020-07-17nixos/manual: add a section about enabling OpenCL for AMD GPUsDaniël de Kok2-0/+105
- Begin a new chapter "GPU Acceleration", this should also cover VA-API, OpenGL, Vulkan, etc. - Add a general blurb about OpenCL and how to check whether OpenCL devices are found. - Add a section about enabling OpenCL for AMD GPUs specifically.
2020-07-16moodle: update to 3.9.1Finn Behrens1-5/+9
use phpEnv to provide xmlrpc
2020-07-16Merge pull request #92934 from hercules-ci/dockerTools-set-imageTagRobert Hensing1-0/+37
dockerTools: Always set imageTag attribute
2020-07-16Merge pull request #93210 from zowoq/podmanDaniël de Kok1-1/+1
podman updates
2020-07-16nixos/tests/kubernetes: Don't re-import <nixpkgs>Sarah Brofeldt1-1/+0
2020-07-16Revert "nixos/podman: use cgroupfs for rootless crun test"zowoq1-1/+1
This reverts commit 033ba9c73d4fe544db93fbf299cf7a4a0a786ea8.
2020-07-14Merge pull request #93110 from grahamc/systemd-executableGraham Christensen2-1/+11
stage-2: parameterized systemd executable
2020-07-14Merge pull request #93001 from aanderse/gitoliteFlorian Klink1-16/+17
nixos/gitolite: provision data directory only before service begins
2020-07-14Merge pull request #92791 from johanot/ceph-15Florian Klink2-6/+6
ceph: 14.2.10 -> 15.2.4
2020-07-14stage-2: parameterized systemd executableGraham Christensen2-1/+11
This lets users do sneaky things before systemd starts, and permanently affect the environment in which systemd runs. For example, we could start systemd in a non-default network namespace by setting the systemdExecutable to a wrapper script containing: #!/bin/sh ip netns add virtual touch /var/run/netns/physical mount -o bind /proc/self/ns/net /var/run/netns/physical exec ip netns exec virtual systemd _note: the above example does literally work, but there are unresolved problems with udev and dhcp._
2020-07-14Merge pull request #93089 from jtojnar/debug-gnome-testsworldofpeace2-0/+4
nixosTests.gnome3: enable debug mode
2020-07-14spotifyd: make option link clickableAtemu1-1/+1
2020-07-14nixosTests.gnome3: enable debug modeJan Tojnar2-0/+4
The tests fail too often on Hydra without much of a hint what went wrong. Hopefully, this will provide some clue.
2020-07-13Merge pull request #93077 from RomanSharapov/add-configurable-keepaliveFlorian Klink1-1/+10
nixos/buildbot: enable configurable keepalive for buildbot worker
2020-07-13nixos/buildbot: enable configurable keepalive for buildbot workerRoman Sharapov1-1/+10
In the current implementation, there's no possibility to modify the default parameter for keepalive. This is a number that indicates how frequently keepalive messages should be sent from the worker to the buildmaster, expressed in seconds. The default (600) causes a message to be sent to the buildmaster at least once every 10 minutes. If the worker is behind a NAT box or stateful firewall, these messages may help to keep the connection alive: some NAT boxes tend to forget about a connection if it has not been used in a while. When this happens, the buildmaster will think that the worker has disappeared, and builds will time out. Meanwhile the worker will not realize than anything is wrong.
2020-07-13nixos/doc/manual/release-notes: Add release notes for subuid/subgid mappingsadisbladis1-0/+6
2020-07-13nixos.users-groups: Set up subuid/subgid mappings for all normal usersadisbladis4-54/+66
This is required by (among others) Podman to run containers in rootless mode. Other distributions such as Fedora and Ubuntu already set up these mappings. The scheme with a start UID/GID offset starting at 100000 and increasing in 65536 increments is copied from Fedora.
2020-07-13install-grub.pl: Fix GRUB always reinstalling. (#92756)Niklas Hambüchen1-1/+1
See https://github.com/NixOS/nixpkgs/pull/92520#issuecomment-655157990. In #85895 I accidentally introduced a comparison between an array reference and an array, which can never be true. Fixed by dereferencing.