Commit Graph

25332 Commits

Author SHA1 Message Date
Florian Klink
6c9bef6b0f
Merge pull request #230777 from nikstur/systemd-repart-definitions-in-initrd
systemd-repart definitions in initrd
2023-05-09 13:24:04 +03:00
Sandro
443a8f398a
Merge pull request #230756 from NixOS/fzf-fix 2023-05-09 11:54:38 +02:00
lom
ea1cef8c00 ArchiSteamFarm.ui: use buildNpmPackage 2023-05-08 20:34:21 -04:00
Aaron Andersen
cf0327810b
Merge pull request #207093 from ymarkus/alertmanager
nixos/alertmanager: add checkConfig option
2023-05-08 20:15:17 -04:00
nikstur
d85abd2764 nixos/systemd-repart: definition files in initrd
Store the definition files in the initrd instead of reading them from
the Nix store in /sysroot.

This way, the initrd has to be re-generated every time the definition
files change. When the path to the defintion files instead of the
definition files themselves are embedded in the initrd, however, the
initrd also has to be re-generated every time. In this regard, this
change does not improve the status quo.

However, now systemd-repart also works reliable when the Nix store is
mounted separately from the root partition.

This change also enables new use-cases like creating partitions
necessary to boot the system. However, by default, the root partition
cannot be created on first boot because the systemd-repart service
requires a /sysroot to be mounted. Otherwise, systemd-repart cannot
determine the device to operate on.
2023-05-09 00:11:21 +02:00
nikstur
5c2a7490cf nixos/systemd-repart: fix
Since v253, systemd-repart tries to create temporary directories in
/var/tmp. However, this directory doesn't exist in the initrd. This
commit adds an enviroment variable to re-use the existing /tmp directory
instead of /var/tmp.
2023-05-08 23:12:59 +02:00
Izorkin
1afcb4c6ef
nixos/peertube: update nginx configuration 2023-05-08 23:49:03 +03:00
Izorkin
8d76c0b6fb
peertube: 5.0.0 -> 5.1.0 2023-05-08 23:48:32 +03:00
Ryan Lahfa
43a413de73
Merge pull request #230731 from NixOS/bump/netdata
netdata: 1.38.1 -> 1.39.0
2023-05-08 21:59:56 +02:00
Sandro Jäckel
edf57fef9b
nixos/fzf: fix evaluation if ohMyZsh is enabled 2023-05-08 21:10:28 +02:00
Raito Bezarius
16658f7634 nixos/netdata: introduce deadlineBeforeStopSec
Previously, we hardcoded a 60 second timer to stop netdata if we didn't have any answer back.
This is wrong and can cause data loss because the SIGTERM sent by systemd can sometimes be not honored.
Which in turn becomes a SIGKILL, causing potential data loss / corruption.

Offer a flag to users and bump the deadline to 2 minutes.
2023-05-08 19:29:13 +02:00
Ryan Lahfa
98167d573d
Merge pull request #229313 from mped-oticon/mped_proxmox_assert
nixos/proxmox-image: Disable O_DIRECT to fix assert when writing to tmpfs
2023-05-08 16:11:40 +02:00
Atemu
cb0f64e45d
Merge pull request #230665 from alyssais/iso-image-targetPlatform
nixos/iso-image: targetPlatform -> hostPlatform
2023-05-08 15:06:48 +02:00
Alyssa Ross
ecc1ec2c72 llvmPackages_latest: move to aliases.nix
Because llvmPackages_latest is used in Nixpkgs, by quite a few
packages, it's difficult to keep it up to date, because updating it
requires some level of confidence that every package that uses it is
going to keep working after the update.  The result of this is that
llvmPackages_latest is not updated, and so we end up in the situation
that "latest" is two versions older than the latest version we
actually provide.  This is confusing and unexpected.

"But won't this end up fragmenting our LLVM versions, if every package
previously using _latest is separately pinned to LLVM 14?", I hear you
ask.  No.  That fragmentation is already happening, even with an
llvmPackages_latest, because packages that actually require the
_latest_ version of LLVM (15/16), have already been decoupled from
llvmPackages_latest since it hasn't been upgraded.  So like it or not,
we can't escape packages depending on specific recent LLVMs.  The only
real fix is to get better at keeping the default LLVM up to
date (which I'm reasonably confident we're getting into a better
position to be feasibly better able to do).

So, unless we want to double down on providing a confusingly named
"llvmPackages_latest" attribute that refers to some arbitrary LLVM
version that's probably not the latest one (or even the latest one
available in Nixpkgs), we only have two options here: either we don't
provide such an attribute at all, or we don't use it in Nixpkgs so we
don't become scared to bump it as soon as we have a new LLVM available.
2023-05-08 13:05:33 +00:00
Nick Cao
aa7197b091
Merge pull request #230539 from OPNA2608/update/miriway
miriway: unstable-2023-03-17 -> unstable-2023-04-25
2023-05-08 20:27:47 +08:00
Alyssa Ross
bf7de549b9
nixos/iso-image: targetPlatform -> hostPlatform
This is not a compiler, and therefore does not need to care about the
target platform.
2023-05-08 11:50:06 +00:00
Mark Ruvald Pedersen
66fb2f539a nixos/proxmox-image: Disable O_DIRECT to fix assert
Context summary:
'vma create' can't otherwise write to tmpfs such as /dev/shm.
This is important when used from non-nixos machines which may
have /build as tmpfs.

VMA is Proxmox's virtual machine image format that wraps QEMU images,
augmenting these with proxmox-specific configuration file.
proxmox-image.nix uses the VMA tool to create vma image files.
The VMA tool exists as a patchset ontop of QEMU.

VMA writes its output with open() and O_DIRECT flag.
O_DIRECT does not work on Linux tmpfs [1]. Thus:
$ vma create ~/output.vma ...  # works, assuming home isn't tmpfs.
$ vma create /dev/shm/output.vma ...  # fails since /dev/shm is tmpfs
Failure results in assert(*errp == NULL).

O_DIRECT is a cache performance hint.
But it currently blocks our usage of nixos-generate -f proxmox from
Non-NixOS hosts and Docker.

The patch here simply removes O_DIRECT:
vma-writer.c later performs memalign due to O_DIRECT, but this is
safe to do with or without O_DIRECT.
Ideally, this should be fixed in upstream Proxmox: Perhaps by falling
back to open without O_DIRECT.

Another attempt to fix this SIGABRT is [2], which writes the vma file
directory to $out/ folder -- however that may still be tmpfs mounted
which it is in our case.

[1] https://lore.kernel.org/lkml/45A29EC2.8020502@tmr.com/t/
[2] https://github.com/NixOS/nixpkgs/pull/224282
2023-05-08 12:33:41 +02:00
Jörg Thalheim
3288479636 nixos/envfs: make mounts non-critical
We usually don't want to bring the whole machine into emergency mode
just because we couldn't mount envfs. It's usually not on the critical
path.
2023-05-08 11:24:18 +02:00
Sandro
6197953fb6
Merge pull request #207106 from autrimpo/gonic-module
nixos/gonic: init
2023-05-08 01:28:24 +02:00
Michal Koutenský
8118e3de43 nixos/gonic: init 2023-05-07 22:43:23 +02:00
Ilan Joselevich
6a751fe806
Merge pull request #227765 from zhaofengli/darling
darling: init at unstable-2023-05-02
2023-05-07 22:29:02 +03:00
Bernardo Meurer
3cf3f4395a
Merge pull request #230449 from lovesegfault/mainsail-module 2023-05-07 11:49:59 -04:00
OPNA2608
fc3c5947a9 nixos/miriway: Adjust default and example config
The keybinds for the WM's internal commands have been made configurable.
2023-05-07 17:32:20 +02:00
Martin Weinelt
cd0f4fc67c
Merge pull request #230256 from lovesegfault/systemd-can
nixos/networkd: add TransmitQueues and TransmitQueueLength
2023-05-07 11:53:35 +02:00
Naïm Favier
0767f800e0
Merge pull request #224688 from Izorkin/add-nginx-upstream-timeout
nixos/nginx: allow arbitrary parameters in upstream servers
2023-05-07 11:43:39 +02:00
Izorkin
2809915f19
nixos/nginx: allow arbitrary parameters in upstream servers
Adds a `freeformType` to `services.nginx.upstreams.<name>.servers` to
allow setting arbitrary parameters.
2023-05-07 11:17:49 +02:00
Bernardo Meurer
4804f7a09b
nixos/mainsail: init 2023-05-07 01:41:03 -04:00
Zhaofeng Li
1e39c977f7 nixos/darling: init 2023-05-06 22:49:35 -06:00
Bernardo Meurer
aa8eff129d
nixos/networkd: add TransmitQueues and TransmitQueueLength
These are relevant when using networkd to configure CAN networks

Co-authored-by: Martin Weinelt <mweinelt@users.noreply.github.com>
2023-05-06 21:55:09 -04:00
Vladimír Čunát
e700696f49
Merge #230386: Revert "nixos/qemu-vm: fix diskless VMs" 2023-05-06 22:00:39 +02:00
Martin Weinelt
f4ca022023
Merge pull request #229999 from ambroisie/update-tandoor-recipes
tandoor-recipes: 1.4.4 -> 1.4.9
2023-05-06 21:58:04 +02:00
Vladimír Čunát
5674901601
Revert "nixos/qemu-vm: fix diskless VMs" 2023-05-06 21:41:14 +02:00
Jonas Chevalier
d3ff0e4114
Merge pull request #229111 from zimbatm/cloud-init-settings
cloud-init module: adopt the settings format
2023-05-06 21:34:11 +02:00
Sandro
6a8a43e5f2
Merge pull request #225341 from SuperSandro2000/ohmyzsh-fzf
nixos/fzf: add ohMyZsh integration
2023-05-06 21:24:15 +02:00
Robert Hensing
216315c6c4
Merge pull request #197547 from hercules-ci/module-class-and-flake-import
module system: Improve error messages around faulty imports
2023-05-06 20:16:34 +02:00
Gabriel Fontes
16b3b0c53b nixos/tests/kavita: init 2023-05-06 13:57:53 -03:00
Gabriel Fontes
e2854d332d nixos/kavita: init 2023-05-06 13:57:53 -03:00
Robert Hensing
8054785157 lib/modules: Move class out of specialArgs 2023-05-06 18:32:58 +02:00
Robert Hensing
79703eef08 nixos,nixpkgs: Add module classes
This allows modules that declare their class to be checked.
While that's not most user modules, frameworks can take advantage
of this by setting declaring the module class for their users.
That way, the mistake of importing a module into the wrong hierarchy
can be reported more clearly in some cases.
2023-05-06 18:29:04 +02:00
Martin Weinelt
1c963cea48
nixos/gitea-actions-runner: init 2023-05-06 17:34:15 +02:00
Rick van Schijndel
5e2d479540
Merge pull request #229874 from mcnesium/fix_ambig_char
fix ambiguous unicode characters
2023-05-06 16:54:54 +02:00
Bruno BELANYI
9650310348 nixos/tandoor-recipes: disable debug toolbar 2023-05-06 14:22:17 +01:00
Pierre Bourdon
2ddbabec4d
nixos/xserver: fix xserver.conf reproducibility (sort ModulePath entries) 2023-05-05 22:33:09 +02:00
Ryan Lahfa
0b0c5fdf95
Merge pull request #230027 from jmbaur/fix-cross-nixos-system
nixos/bootspec: Fix cross for nixos-system systemBuilder
2023-05-05 22:05:44 +02:00
Ryan Lahfa
32264d614a
Merge pull request #227696 from aktaboot/fix-install-tools-deps
nixos/installer: fix util-linux dependencies in install script
2023-05-05 21:58:23 +02:00
aktaboot
b3ef821489 nixos/installer: fix util-linux dependencies in install scripts 2023-05-05 18:11:57 +02:00
Ryan Lahfa
275a6e3d8d
Merge pull request #193469 from minijackson/mount-options-stage-1
nixos/stage-1: follow mount options
2023-05-05 17:05:48 +02:00
Ryan Lahfa
1ab4d7d0c3
Merge pull request #228047 from RaitoBezarius/diskless-vm
nixos/qemu-vm: fix diskless VMs
2023-05-05 15:37:11 +02:00
Emily Lange
549bee9851
nixos/grafana-agent: add extraFlags option (#228883) 2023-05-05 15:14:41 +02:00
Jared Baur
67561dcc59
nixos/bootspec: Fix cross for nixos-system systemBuilder
When `nixpkgs.hostPlatform` != `nixpkgs.buildPlatform`, building the
top-level attribute fails since the bootspec portion of the system
builder tries to reference the host platform's `jq`. Change this to
reference the build platform's `jq`.
2023-05-04 20:09:16 -07:00
Rene Hollander
a70c7aba36 nixos/networkd: Fix typo in usage sectionBridgeVLAN
The `B` in bridge should be capitalized.

It currently leads to an evuluation error: 
```
error: attribute 'sectionbridgeVLAN' missing

       at /nix/store/7wmrwj0sgwg1iivxk43lpkqjhji57mq7-source/nixos/modules/system/boot/networkd.nix:2386:56:

         2385|       example = { VLAN = "10-20"; };
         2386|       type = types.addCheck (types.attrsOf unitOption) check.network.sectionbridgeVLAN;
             |                                                        ^
         2387|       description = lib.mdDoc ''
       Did you mean sectionBridgeVLAN?
```
2023-05-04 16:20:56 +02:00
Martin Weinelt
12a2201d61
Merge pull request #229780 from NixOS/home-assistant
home-assistant: 2023.4.6 -> 2023.5.0
2023-05-04 15:43:40 +02:00
Weijia Wang
cddc413c66
Merge pull request #229845 from pitkling/fix/qemu-vm-escape-variable
virtualisation/qemu-vm: fix unescaped bash variable in shell script
2023-05-04 15:47:26 +03:00
mcnesium
36af786eda
fix ambiguous unicode characters 2023-05-04 12:54:56 +02:00
Jörg Thalheim
be8e3128b9
Merge pull request #223418 from Mic92/grub
nixos/grub-install: don't rely on shell to run commands
2023-05-04 09:48:41 +01:00
Peter Kling
996db6d059
virtualisation/qemu-vm: escape bash variable in shell script
Fixes #229729
2023-05-04 09:52:49 +02:00
Martin Weinelt
6d934088ea
nixos/home-assistant: update bluetooth components 2023-05-04 07:33:32 +02:00
pennae
aad25290ee nixos/emacs: restore example markup
these examples were turned into untitle anchors previously because at
the time supporting examples was not deemed necessary or useful. now
that we have them we can restore them though.
2023-05-03 19:58:21 +02:00
Ryan Lahfa
da28a7a3d0
Merge pull request #228347 from NixOS/uefi-without-bootloaders
nixos/qemu-vm: make it possible to use UEFI without bootloaders
2023-05-03 17:08:47 +02:00
Michael Livshin
11b851718e system76-scheduler: don't enable unconditionally
Oops :(
2023-05-03 10:34:32 +03:00
Izorkin
edb40b3e4f nixos/fail2ban: others small update 2023-05-03 08:45:26 +02:00
Izorkin
544ebba973 nixos/fail2ban: update bantime options 2023-05-03 08:45:26 +02:00
Raito Bezarius
6e8248c8b2 nixos/qemu-vm: make it possible to use UEFI without bootloaders
`useEFIBoot` is somewhat misleading, but we should make it possible to
enable UEFI environment / firmware without buying into a bootloader.

This makes it possible.
2023-05-02 23:20:03 +02:00
Bernardo Meurer
b04b3345f1
Merge pull request #195082 from cmm/system76-scheduler 2023-05-02 09:25:05 -07:00
Artturi
2d256ca7c2
Merge pull request #227499 from tollb/w20230421d_use_systemd_hwdb_to_build_udev_hwdb 2023-05-02 19:04:06 +03:00
Robert Hensing
c4793e85f1
Merge pull request #229427 from Mic92/hercules-ci-agent
nixos/hercules-ci-agent: increase stack limit
2023-05-02 13:42:42 +02:00
Michael Livshin
549fd53520 system76-scheduler: add config module 2023-05-02 13:43:36 +03:00
Martin Weinelt
826418fc35
Merge pull request #227990 from Mic92/mediawiki-webserver
nixos/mediawiki: make apache2 optional
2023-05-02 12:39:10 +02:00
Jörg Thalheim
301d6bb9c2 nixos/hercules-ci-agent: increase stack limit
see https://github.com/hercules-ci/hercules-ci-agent/pull/451 for context
2023-05-02 09:53:41 +02:00
Jonas Heinrich
d932d6929b
Merge pull request #227401 from onny/maddytls2
nixos/maddy: Add tls option
2023-05-02 07:32:56 +02:00
Sandro
7b02d16807
Merge pull request #227973 from tensor5/nixos/nextcloud--fix-notify_push-configuration-parse-error 2023-05-02 01:05:02 +02:00
figsoda
ed153ccbfd
Merge pull request #229209 from Misterio77/navidrome-cfg-package
nixos/navidrome: add package option
2023-05-01 18:31:34 -04:00
Gabriel Fontes
1c3c2c8203
nixos/navidrome: add package option 2023-05-01 16:29:17 -03:00
Jörg Thalheim
077e950f7a nixos/mediawiki: also test fcgi socket 2023-05-01 20:51:11 +02:00
Jörg Thalheim
d309952a5d nixos/mediawiki: make apache optional 2023-05-01 20:51:11 +02:00
Jonas Heinrich
fcf6662fb5
Merge pull request #229159 from Misterio77/refactor-nextcloud-createlocally
nixos/nextcloud: refactor database.createLocally
2023-05-01 20:04:20 +02:00
Jonas Heinrich
616ba4ae5c nixos/maddy: Add tls option 2023-05-01 19:12:26 +02:00
Gabriel Fontes
fddf531c6f
nixos/nextcloud: refactor database.createLocally
Fixes https://github.com/NixOS/nixpkgs/issues/228971
2023-05-01 12:20:40 -03:00
Matthieu Coudron
7fe4909bee
services.datadog: remove python2 from systemd service (#228312)
which caused a security warning. seems to work without it so let's ditch it
2023-05-01 16:37:34 +02:00
Nick Cao
cb6c1de07d
Merge pull request #229138 from exzombie/fix/fstrim-interval
nixos/fstrim: fix overriding the timer interval
2023-05-01 17:23:36 +08:00
K900
5c95114a2f
Merge pull request #228951 from aacebedo/aacebedo/asusctl_4.6.2
asusctl: 4.5.8 -> 4.6.2
2023-05-01 12:08:37 +03:00
Alexandre Acebedo
576d7d34c4 asusctl: 4.5.8 -> 4.6.2 2023-05-01 11:07:39 +02:00
Weijia Wang
b87aa62298
Merge pull request #227936 from wineee/dde
nixos/deepin: init
2023-05-01 08:38:45 +03:00
Kira Bruneau
50200de3f4
Merge pull request #216230 from tcheronneau/master
nixos/{consul-template,vault-agent}: init
2023-04-30 13:53:57 -04:00
gaykitty
3056e9c395 nixos/stargazer: remove with lib 2023-04-30 13:05:34 -03:00
gaykitty
d4f3dd4f71 nixos/stargazer: fix route ordering 2023-04-30 13:05:34 -03:00
Jure Varlec
44438e0dcd nixos/fstrim: fix overriding the timer interval
The OnCalendar systemd setting is additive. To clear the setting defined
by the pre-existing unit file, it has to be set first to an empty
string, then to the desired value.
2023-04-30 17:36:49 +02:00
zimbatm
406a6dfa26 cloud-init module: adopt the settings format
This makes it easier to for example set `datasource_list = [ "Vultr" ];`
so that cloud-init doesn't scan trough all of the datasources when you
know on which target the system is going to be deployed.

Previously, one had to copy-paste the default config and adapt it.
2023-04-30 15:08:10 +02:00
zimbatm
4a1fd4afe0 cloud-init module: remove superfluous lib. prefixes 2023-04-30 14:59:16 +02:00
zimbatm
de8b1cf647 cloud-init module: format with nixpkgs-fmt 2023-04-30 14:58:29 +02:00
Nick Cao
1acfbbb2e7
Merge pull request #125865 from eliasp/restic-private-tmp
nixos/restic: use private tmp for service unit
2023-04-30 20:37:07 +08:00
Ilan Joselevich
a36b310b7a
Merge pull request #228858 from m-bdf/hyprland-xwayland-conditional-default
nixos/hyprland: conditionally enable Xwayland
2023-04-30 13:21:53 +03:00
Maximilian Bosch
5c9977a524
Merge pull request #224891 from KFearsoff/fix-grafana-assertions-in-yaml
nixos/grafana: fix assertions leaking into YAML
2023-04-30 11:39:48 +02:00
Elias Probst
3bd1c64a5b
nixos/restic: use private tmp for service unit
To reduce the danger of accidentally exposing sensitive files processed
by a restic backup to other services/users, enable the `PrivateTmp=`
feature of restic service units, which provides a per service isolation
of `/tmp` and `/var/tmp`.

Co-authored-by: Daniel Nagy <danielnagy@posteo.de>
2023-04-30 10:39:29 +02:00
Sandro Jäckel
ce0a2d2b85
nixos/no-x-libs: disable wayland for mpv 2023-04-30 02:23:41 +02:00
Sandro
5d0d352833
Merge pull request #220761 from elesiuta/picosnitch-init 2023-04-30 01:52:10 +02:00
Weijia Wang
acb0a2c266
Merge pull request #228225 from LeSuisse/strongswan-5.9.10
strongswan: 5.9.8 -> 5.9.10
2023-04-29 23:08:09 +03:00
Kira Bruneau
f81a619c91
Merge pull request #227916 from IndeedNotJames/lldap
lldap: init at 0.4.3; nixos/lldap: init; nixosTests.lldap: init
2023-04-29 15:24:12 -04:00
IndeedNotJames
87ccd1a47b
nixos/lldap: init
Co-authored-by: LongerHV <46924944+LongerHV@users.noreply.github.com>
2023-04-29 21:14:25 +02:00
rewine
d55808c2c0
nixos/deepin: init 2023-04-29 22:36:18 +08:00