Commit Graph

14496 Commits

Author SHA1 Message Date
Jörg Thalheim
83b468db28
Merge pull request #196148 from Mic92/tailscale
tailscale: improve formatting on warning message
2022-11-20 20:12:46 +01:00
Maximilian Bosch
2580440389
Merge pull request #198470 from RaitoBezarius/nc25-openssl
nextcloud25: use openssl 1.1 as a PHP extension to fix RC4 encryption
2022-11-20 18:32:41 +01:00
David Wilemski
c9543015d0
nixos/firewall: remove stray quote from package option
This quote is not needed and shows up rendered in the manpage documenting this option.
2022-11-19 22:04:52 -06:00
Jan Tojnar
1c37b65fb9
Merge pull request #181967 from noneucat/fix/at-spi2-core
gnome/at-spi2-core: also set GTK_A11Y when at-spi2-core is disabled
2022-11-20 02:17:08 +01:00
Andy Chun @noneucat
2fedbbab9c nixos/gnome/at-spi2-core: force GTK_A11Y=none when disabled
GTK 4 applications use accessibility bus directly
and will try to connect to it every time a widget is created:
https://gitlab.gnome.org/GNOME/gtk/-/issues/4831

This will make GTK 4 apps (e.g. newly ported Nautilus) grind
to a halt on systems that do not have AT-SPI service installed.

Let’s explicitly disable accessibility support with an environment
variable when the AT-SPI service is not enabled to avoid that.
Just like we do for ATK-based applications with `NO_AT_BRIDGE`.

Fixes: https://github.com/NixOS/nixpkgs/issues/197188
2022-11-20 01:50:38 +01:00
happysalada
82ee824968 surrealdb: module init 2022-11-19 18:58:04 -05:00
happysalada
4a3aa6ff98 tremor-rs: module init 2022-11-19 11:41:21 -05:00
Martin Weinelt
2714a22521
Merge pull request #198820 from talyz/keycloak-admin-password 2022-11-19 15:03:03 +01:00
Henri Menke
aeb5a692c3
nixos/alps: add hardening, extensible options, test 2022-11-17 17:12:54 +01:00
Patrick Jackson
b0c6f4ae05 nixos/mullvad-vpn: add mullvad-exclude wrapper & systemPackage 2022-11-17 07:31:40 -08:00
Maxime Brunet
29b5192b08
automatic-timezoned: init at 1.0.41 2022-11-16 15:26:21 -08:00
Thiago Kenji Okada
6785dae748 nixos/picom: remove experimentalBackends option
Removed by upstream in the recent v10 release.
2022-11-16 20:13:42 +00:00
Carl Richard Theodor Schneider
647ed242dc nixos/adguardhome: allow for empty/unmanaged configs
This commit fixes broken non-declarative configs by
making the assertions more relaxed.
It also allows to remove the forced configuration merge by making
`settings` `null`able (now the default).

Both cases (trivial non-declarative config and `null`able config) are
verified with additional tests.

Fixes #198665
2022-11-15 23:43:15 -05:00
Sandro
655ab77b16
Merge pull request #198724 from Izorkin/update-peertube 2022-11-16 02:51:47 +01:00
Pierre Bourdon
4ac2dbfec5
Merge pull request #201329 from jqqqqqqqqqq/master
nixos/nginx: fix default listen port options
2022-11-15 17:57:51 +01:00
Curtis Jiang
f7bed8cd44 nixos/nginx: fix default listen port options 2022-11-15 15:11:52 +00:00
Franz Pletz
f0609d6c05
Merge pull request #198529 from jqqqqqqqqqq/master 2022-11-15 04:58:47 +01:00
Curtis Jiang
81cd6b06f9 nixos/nginx: add default listen port options 2022-11-15 02:00:03 +00:00
Bryan Richter
e3fc19b301
nixos/nginx: docs: Update formatting
* Capitalize ACME
* Use bold instead of ALL CAPS
* Tweak sentence structure
2022-11-14 12:24:17 +02:00
Bryan Richter
fd9eed5bf3
nixos/nginx: Extend acmeFallbackHost documentation
This extra example would have saved me a lot of uncertainty and doubt.
2022-11-14 11:54:33 +02:00
Elis Hirwing
04dea74eae
Merge pull request #194172 from drupol/php/enable-nts-by-default
php: enable `nts` flags by default
2022-11-13 13:33:27 +01:00
clerie
159d73f7a3 nixos/chisel-server: add module 2022-11-13 12:02:34 +01:00
Pol Dellaiera
364a7d2920
php: switch to nts by default 2022-11-13 11:47:27 +01:00
Guillaume Girol
4c633f0301
Merge pull request #199667 from bjornfor/nixos-sane-indirection-for-quick-reload
nixos/sane: point env vars to /etc for quick reload
2022-11-13 10:05:05 +00:00
Justinas Stankevicius
3f6eb10dbd nixos/mastodon: fix definition of mastodon-media-auto-remove 2022-11-12 22:22:41 +01:00
Robert Schütz
257ec177c8 nixos/syncthing: disallow relative paths
Relative paths are interpreted relative to the working directory, which
is currently unset and thus defaults to `/`. However we want to change
the working directory in a future release such that relative paths are
interpreted relative to `/var/lib/syncthing`.
2022-11-12 11:37:23 -08:00
happysalada
e2bb1e774b erigon: module: better secret management 2022-11-12 14:29:43 -05:00
Martin Weinelt
7478655ee7
Merge pull request #198631 from fedeinthemix/fix-languagetool 2022-11-12 15:18:10 +01:00
Bobby Rong
3403c98eb4
Merge pull request #200167 from bobby285271/cinnamon
nixos/cinnamon: make it possible to remove core packages
2022-11-12 08:56:04 +08:00
Florian Klink
989eb42390
Merge pull request #200421 from lovesegfault/udisks-libblockdev-cfg
nixos/udisks2: symlink libblockdev configs
2022-11-11 20:38:46 +00:00
Maximilian Bosch
35b146ca31
nixos/nextcloud: fixup openssl compat change
Upon testing the change itself I realized that it doesn't build properly
because

* the `pname` of a php extension is `php-<name>`, not `<name>`.
* calling the extension `openssl-legacy` resulted in PHP trying to compile
  `ext/openssl-legacy` which broke since it doesn't exist:

      source root is php-8.1.12
      setting SOURCE_DATE_EPOCH to timestamp 1666719000 of file php-8.1.12/win32/wsyslog.c
      patching sources
      cdToExtensionRootPhase
      /nix/store/48mnkga4kh84xyiqwzx8v7iv090i7z66-stdenv-linux/setup: line 1399: cd: ext/openssl-legacy: No such file or directory

I didn't encounter that one before because I was mostly interested in
having a sane behavior for everyone not using this "feature" and the
documentation around this. My findings about the behavior with turning
openssl1.1 on/off are still valid because I tested this on `master` with
manually replacing `openssl` by `openssl_1_1` in `php-packages.nix`.

To work around the issue I had to slightly modify the extension
build-system for PHP:

* The attribute `extensionName` is now relevant to determine the output
  paths (e.g. `lib/openssl.so`). This is not a behavioral change for
  existing extensions because then `extensionName==name`.

  However when specifying `extName` in `php-packages.nix` this value is
  overridden and it is made sure that the extension called `extName` NOT
  `name` (i.e. `openssl` vs `openssl-legacy`) is built and installed.

  The `name` still has to be kept to keep the legacy openssl available
  as `php.extensions.openssl-legacy`.

Additionally I implemented a small VM test to check the behavior with
server-side encryption:

* For `stateVersion` below 22.11, OpenSSL 1.1 is used (in `basic.nix`
  it's checked that OpenSSL 3 is used). With that the "default"
  behavior of the module is checked.

* It is ensured that the PHP interpreter for Nextcloud's php-fpm
  actually loads the correct openssl extension.

* It is tested that (encrypted) files remain usable when (temporarily)
  installing OpenSSL3 (of course then they're not decryptable, but on a
  rollback that should still be possible).

Finally, a few more documentation changes:

* I also mentioned the issue in `nextcloud.xml` to make sure the issue
  is at least mentioned in the manual section about Nextcloud. Not too
  much detail here, but the relevant option `enableBrokenCiphersForSSE`
  is referenced.

* I fixed a few minor wording issues to also give the full context
  (we're talking about Nextcloud; we're talking about the PHP extension
  **only**; please check if you really need this even though it's
  enabled by default).

  This is because I felt that sometimes it might be hard to understand
  what's going on when e.g. an eval-warning appears without telling where
  exactly it comes from.
2022-11-11 14:45:46 +01:00
Franz Pletz
8cc2dcce7d
Merge pull request #199524 from ymarkus/zfs-exporter
nixos/prometheus-zfs-exporter: init
2022-11-11 02:01:13 +01:00
Franz Pletz
286f868a5c
Merge pull request #162057 from jdheyburn/jdheyburn-unifi-prometheus-exporter-loki 2022-11-11 01:31:41 +01:00
Franz Pletz
8e9f00682d
nixos/prometheus-zfs-exporter: mdDoc descriptions 2022-11-11 01:29:10 +01:00
amesgen
733ea72e16
nixos/rss2email: remove unnecessary cfg file indirection to fix test (#200108)
Previously, the NixOS test often failed as the copied config file is not
overwriteable. In actual setups, the restart interval is much bigger, such that
systemd-tmpfiles will correct the permissions inbetween.
2022-11-10 20:06:32 +01:00
figsoda
e920aed521
Merge pull request #200440 from nagy/treewide-modules
treewide: use `types.port` and `mkEnableOption` in nixos modules
2022-11-10 12:12:51 -05:00
Gauvain 'GovanifY' Roussel-Tarbouriech
5a4a53dbc6 nixos/mautrix-telegram: fix crash on postgresql database usage 2022-11-10 11:17:20 -05:00
Vincent Haupert
847774470e nixos/github-runners: restart service if exit code signals a retryable error
On some occasions, the GitHub runner service encounters errors which are
deemed retryable but result in the runner's termination. To signal a
retryable error, the runner exits with status code 2:

https://github.com/actions/runner/blob/40ed7f8/src/Runner.Common/Constants.cs#L146

To account for that behavior, this commit sets
`RestartForceExitStatus=2` which results in a service restart regardless
of using an ephemeral runner or not.
2022-11-10 11:06:04 -05:00
Janne Heß
798bc67cff
Merge pull request #200319 from helsinki-systems/feat/redis-module-changes
nixos/redis: misc module changes
2022-11-10 16:03:54 +01:00
Maximilian Bosch
61128cba67
nixos/nextcloud: minor docs cleanup for openssl change
* s/NextCloud/Nextcloud/g
* `enableBrokenCiphersForSSE` should be enabled by default for any NixOS
  installation from before 22.11 to make sure existing installations
  don't run into the issue. Not the other way round.
* Update release notes to reflect on that.
* Improve wording of the warning a bit: explain which option to change
  to get rid of it.
* Ensure that basic tests w/o `enableBrokenCiphersForSSE` run with
  OpenSSL 3.
2022-11-10 12:17:43 +01:00
Raito Bezarius
394d4de877
nextcloud25: enable by default broken ciphers for NixOS ≤ 22.11 2022-11-10 12:17:43 +01:00
Raito Bezarius
7eefaeb5e3
nextcloud25: use openssl 1.1 as a PHP extension to fix RC4 encryption 2022-11-10 12:17:43 +01:00
Daniel Nagy
b4674b39c1
treewide: use mkEnableOption in nixos modules 2022-11-10 09:30:00 +01:00
Daniel Nagy
095269c862
treewide: use types.port in nixos modules 2022-11-10 09:30:00 +01:00
Bobby Rong
8380ac4538
nixos/cinnamon: don't override greeter theme if the package is excluded
This makes it possible to remove mint themes in an easy way, in this
case we will just use the default from slick-greeter module, i.e. the
Adwaita theme.
2022-11-10 14:47:06 +08:00
Bobby Rong
ba4494f8f6
nixos/cinnamon: make it possible to remove more non-essential packages
Packages for accessibility and theme can now be removed with excludePackages
2022-11-10 14:47:06 +08:00
Bobby Rong
bb30779791
nixos/cinnamon: fix some typos 2022-11-10 14:47:00 +08:00
Bobby Rong
e88b1dc9c8
nixos/cinnamon: switch to xdg.icons.enable
We enable this option explicitly to prevent users from accidentally
disabling it and getting a broken desktop.
2022-11-10 14:43:25 +08:00
Bobby Rong
fa3008b93c
nixos/cinnamon: switch to xdg.mime.enable
We enable this option explicitly to prevent users from accidentally
disabling it and getting a broken desktop.
2022-11-10 14:41:58 +08:00
github-actions[bot]
020ea91183
Merge master into staging-next 2022-11-10 00:02:27 +00:00