Commit Graph

43297 Commits

Author SHA1 Message Date
PedroHLC
61dfef9a3d
nixos/gamescope: expose gamescopectl 2024-08-26 08:32:36 -03:00
Masum Reza
b8024284d1
Merge pull request #335625 from JohnRTitor/uwsm-module
nixos/uwsm: init
2024-08-26 15:58:29 +05:30
Jörg Thalheim
f40cd1bfe0 nixos/autoUpgrade: add --refresh when using flakes
otherwise the cache might delay updates quite a bit
2024-08-26 12:02:38 +02:00
Sandro
6b4d280cf5
Merge pull request #336797 from SuperSandro2000/paperless-ngx 2024-08-26 11:47:01 +02:00
7c6f434c
8487207876
Merge pull request #337094 from OPNA2608/init/lomiri/lomiri-docviewer-app
lomiri.lomiri-docviewer-app: init at 3.0.4
2024-08-26 05:40:34 +00:00
DCsunset
b94de95f9d nixos/stirling-pdf: make calibre dependency optional based on config 2024-08-26 01:47:17 +00:00
Martin Weinelt
4da8cc80f1
Merge pull request #337319 from emilazy/push-tuksqzuumnzo
nixos/go2rtc: unpin FFmpeg 6
2024-08-26 02:45:50 +02:00
tomberek
7f7df390e6
Merge pull request #335672 from tomberek/tomberek.nixos_test
nixosTest.nix-upgrade: init
2024-08-25 17:48:39 -04:00
ettom
549912e6ff nixos/snapserver: add nss-lookup.target dependency 2024-08-25 23:46:52 +02:00
Nick Cao
2a7a22122f
Merge pull request #337289 from Kiskae/nvidia/fixes_2024_08_25
nixos/nvidia: various fixes
2024-08-25 17:36:24 -04:00
Sandro
68d0798164
Merge pull request #334901 from jpds/kafka-3.8.0
apacheKafka: init 3.8.0
2024-08-25 23:30:47 +02:00
Kiskae
ef3b6ad33d nixos/nvidia: allow the gsp to be toggled independently from open source driver
fixes #323886
2024-08-25 21:51:17 +02:00
Kiskae
20c5d0adfb nixos/nvidia: make the nvidia driver variant a mandatory user choice
fixes #329450
2024-08-25 21:47:29 +02:00
Sandro Jäckel
bb69775568
paperless-ngx: drop inactive maintainers, add myself to maintainers 2024-08-25 21:39:54 +02:00
Emily
fbb4515fdf nixos/go2rtc: unpin FFmpeg 6
The release we package supports FFmpeg 7; see
<https://github.com/AlexxIT/go2rtc/blob/v1.9.4/pkg/ffmpeg/ffmpeg.go#L15>.
2024-08-25 20:29:08 +01:00
Masum Reza
8da188f8e7
Merge pull request #306650 from returntoreality/indi-3rdparty-refactor
indi-full: Indi 3rdparty refactor
2024-08-25 23:09:21 +05:30
abysssol
503245dd07
Merge pull request #334903 from abysssol/ollama-load-models-service
nixos/ollama: move `loadModels` script into a separate service
2024-08-25 15:56:00 +00:00
Franz Pletz
0a490d78b1
Merge pull request #336599 from bjornfor/nixos-ups-use-enum-for-upsmon-option 2024-08-25 15:49:46 +02:00
Maciej Krüger
00f536f650
Merge pull request #310857 from rnhmjoj/pr-firewall
nixos/firewall: fix reverse path check failures with IPsec
2024-08-25 15:06:49 +02:00
Robert Hensing
727351517e
Merge pull request #335660 from Gabriella439/gabriella/containers_nixpkgs.pkgs
containers.*.config.nixpkgs: use `host.pkgs.stdenv.hostPlatform`
2024-08-25 14:40:31 +02:00
Vili Sinervä
13f07436d4 nixos/libinput: Change new options to more appropriate data types
Change the options to be numbers or lists of numbers instead of strings
like the pre-existing options.
2024-08-25 13:45:14 +02:00
Vili Sinervä
891202ef1f nixos/libinput: Clarify that accelSpeed does not apply to custom profile
Add note to the description of the accelSpeed option to make it clear
that is only applies when flat or adaptive profile is in use.
2024-08-25 13:45:14 +02:00
Vili Sinervä
3aa3236289 nixos/libinput: Add options for defining a custom acceleration functions
Without these options the custom acceleration functions would have to be
defined with the additionalOptions option.
2024-08-25 13:45:14 +02:00
Vili Sinervä
34302b2424 nixos/libinput: Allow 'custom' acceleration profile
This is an option that works with the NixOS module as-is, but is
being blocked from use by the allowed enum values.
2024-08-25 13:45:14 +02:00
Jörg Thalheim
82ac9a1580
Merge pull request #337054 from Mic92/sysusers
sysuser: slightly better assertions message
2024-08-25 09:44:58 +02:00
Bobby Rong
dc23466adb
Merge pull request #336934 from bobby285271/upd/pantheon
Pantheon updates 2024-08-24 (switchboard 8.0.0)
2024-08-25 11:34:02 +08:00
Franz Pletz
9446a5d8da
Merge pull request #337003 from alyssais/no-tell-kernel 2024-08-25 02:07:33 +02:00
Franz Pletz
83cd05ff59
Merge pull request #335976 from poscat0x04/nixos-networkd-ipv6ra 2024-08-25 01:51:36 +02:00
Franz Pletz
a266f38ade
Merge pull request #336584 from mweinelt/engelsystem-cache-migration 2024-08-25 01:50:39 +02:00
Franz Pletz
76d7ccecdf
Merge pull request #313105 from bb2020/xserver 2024-08-25 01:47:27 +02:00
Franz Pletz
39c0d9f53d
Merge pull request #336896 from tomodachi94/enhance/nixos/clamav/systemd-slices 2024-08-25 01:45:27 +02:00
Franz Pletz
35b2bfb7ed
Merge pull request #335967 from CajuM/waydroid-svc-stop 2024-08-25 01:40:42 +02:00
Franz Pletz
3969d739d8
Merge pull request #336995 from Ma27/gitea-drop-pam 2024-08-25 01:25:13 +02:00
Franz Pletz
89b019abe9
Merge pull request #337083 from zimward/doc-ssh 2024-08-25 01:15:35 +02:00
OPNA2608
1758314043 nixos/lomiri: Add docviewer app 2024-08-24 23:27:52 +02:00
OPNA2608
531655d3bf tests/lomiri-docviewer-app: init 2024-08-24 23:27:52 +02:00
zimward
81a9bf5861
doc: remove mention of key type 2024-08-24 21:59:22 +02:00
Jared Baur
05aefd6f05
nixos/systemd-boot: remove semicolon 2024-08-24 12:50:26 -07:00
Jared Baur
6327b07b25
nixos/systemd-boot: use unique path for devicetree blob
Use the store directory for the devicetree package containing the
desired DTB when installing to the ESP. This allows for more than one
NixOS generation containing differing DTBs to coexist on the same ESP
(similar to how we can have multiple kernels & initrds). This change
removes the assumption that the filepath passed to `copy_from_file` is a
file that lives at the toplevel of a nix output path (which prior to the
systemd-boot DTB support was the case for the kernel and initrd
derivations).
2024-08-24 12:50:24 -07:00
Jörg Thalheim
7211a81060 sysuser: slightly better assertions message 2024-08-24 19:20:28 +02:00
Mihai-Drosi Câju
05313fc5b3 nixos/waydroid: Update service definition according to upstream
* Upstream switched the service's Type to dbus in 1.4.0
* Enable D-Bus activation
* Fixes #334687
2024-08-24 19:48:20 +03:00
Bobby Rong
8e75a28e4e
nixos/pantheon: Increase memorySize
https://logs.ofborg.org/?key=nixos/nixpkgs.336934&attempt_id=24f89861-72eb-417f-94bf-93cea578a1f1
2024-08-24 22:34:55 +08:00
Adam C. Stephens
bd29cb4b30
Merge pull request #336836 from oddlama/feat-update-kanidm-provision
kanidm-provision: 1.1.1 -> 1.1.2
2024-08-24 08:58:35 -04:00
Alyssa Ross
148261d04b
sd-image: optimise sfdisk call for image building
When building an image, rather than operating on a real partition,
there's no need to have sfdisk tell the kernel to reread the partition
table.  This also avoids a call to sync(2), which could be very
expensive depending on what other IO is going on on the system at the time.
2024-08-24 14:36:07 +02:00
Maximilian Bosch
b39569222b
gitea: drop PAM support
Strongly inspired by the forgejo counterpart[1], for the following
reasons:

* The feature is broken with the current module and crashes on
  authentication with the following stacktrace (with a PAM service
  `gitea` added):

      server # Stack trace of thread 1008:
      server # #0  0x00007f3116917dfb __nptl_setxid (libc.so.6 + 0x8ddfb)
      server # #1  0x00007f3116980ae6 setuid (libc.so.6 + 0xf6ae6)
      server # #2  0x00007f30cc80f420 _unix_run_helper_binary (pam_unix.so + 0x5420)
      server # #3  0x00007f30cc8108c9 _unix_verify_password (pam_unix.so + 0x68c9)
      server # #4  0x00007f30cc80e1b5 pam_sm_authenticate (pam_unix.so + 0x41b5)
      server # #5  0x00007f3116a84e5b _pam_dispatch (libpam.so.0 + 0x3e5b)
      server # #6  0x00007f3116a846a3 pam_authenticate (libpam.so.0 + 0x36a3)
      server # #7  0x00000000029b1e7a n/a (.gitea-wrapped + 0x25b1e7a)
      server # #8  0x000000000047c7e4 n/a (.gitea-wrapped + 0x7c7e4)
      server # ELF object binary architecture: AMD x86-64
      server #
      server # [   42.420827] gitea[897]: pam_unix(gitea:auth): unix_chkpwd abnormal exit: 159
      server # [   42.423142] gitea[897]: pam_unix(gitea:auth): authentication failure; logname= uid=998 euid=998 tty= ruser= rhost=  user=snenskek

  It only worked after turning off multiple sandbox settings and adding
  `shadow` as supplementary group to `gitea.service`.

  I'm not willing to maintain additional multiple sandbox settings for
  different features, especially given that it was probably not used for
  quite a long time:

  * There was no PR or bugreport about sandboxing issues related to
    PAM.

  * Ever since the module exists, it used the user `gitea`, i.e. it had
    never read-access to `/etc/shadow`.

* Upstream has it disabled by default[2].

If somebody really needs it, it can still be brought back by an overlay
updating `tags` accordingly and modifying the systemd service config.

[1] 07641a91c9
[2] https://docs.gitea.com/usage/authentication#pam-pluggable-authentication-module
2024-08-24 13:40:58 +02:00
Cosima Neidahl
eb76459e90
Merge pull request #334952 from OPNA2608/fix/ayatana-lomiri-indicator-marking
nixos/ayatana-indicators: Split ayatana and lomiri indicators
2024-08-24 11:12:00 +02:00
Bobby Rong
b3784b8153
treewide: Fix switchboard executable name 2024-08-24 14:31:20 +08:00
Bobby Rong
96b1f3bd99
Merge pull request #336790 from bobby285271/upd/pantheon
Pantheon updates 2024-08-23
2024-08-24 11:52:42 +08:00
Gabriella Gonzalez
0b6fa5ee40
virtualisation.oci-containers: Add new imageStream option (#335430)
This adds a new `imageStream` option that can be used in conjunction
with `pkgs.dockerTools.streamLayeredImage` so that the image archive
never needs to be materialized in the `/nix/store`.  This greatly
improves the disk utilization for systems that use container images
built using Nix because they only need to store image layers instead of
the full image.  Additionally, when deploying the new system and only
new layers need to be built/copied.
2024-08-24 04:38:27 +02:00
Tomodachi94
695b1c874d
nixos/clamav: add system-clamav.slice
Tracking: https://github.com/NixOS/nixpkgs/issues/279915
2024-08-23 17:09:11 -07:00
Jan Tojnar
b8f3c78021
Merge pull request #333917 from jtojnar/gnome-top-level
gnome: Move more packages to top-level
2024-08-24 01:43:31 +02:00
Peder Bergebakken Sundt
d38f701636
Merge pull request #334559 from litchipi/ifm_fixup
ifm-web: init at 4.0.2
2024-08-24 01:07:30 +02:00
laalsaas
9e5316a1c5 nixos/varnish: change default stateDir to /run
The stateDir, or as varnish calls it, the workdir should always be a
tmpfs. Otherwise, performance issues may occur. See:

- https://varnish-cache.org/docs/trunk/reference/varnishd.html#opt-n

- https://github.com/varnishcache/varnish-cache/issues/4121
2024-08-23 21:45:43 +02:00
Donovan Glover
d3353b074b
Merge pull request #336286 from oluceps/update-dae
dae: 0.7.0 -> 0.7.1
2024-08-23 19:35:53 +00:00
oddlama
aa6cbcbf09
nixos/kanidm: run nixfmt-rfc-style 2024-08-23 20:55:03 +02:00
oddlama
391d05ce95
nixos/kanidm: update provisioning to allow multiple origin urls 2024-08-23 20:46:53 +02:00
Bobby Rong
dfc226bfb1
nixos/pantheon: Enable switcheroo support
317ae5e482
2024-08-23 22:10:26 +08:00
Bobby Rong
43f8c88e9c
nixos/pantheon: Ship elementary-bluetooth-daemon by default
This is extracted from wingpanel-indicator-bluetooth.
2024-08-23 21:34:44 +08:00
Florian Klink
25f5471de6
Merge pull request #333205 from flokli/buildkite-agent-3.77.0
buildkite-agent: 3.76.2 -> 3.77.0
2024-08-23 14:04:52 +03:00
Sarah Brofeldt
f372ec38b1
Merge pull request #334417 from r-ryantm/auto-update/kubernetes
kubernetes: 1.30.2 -> 1.31.0
2024-08-23 12:24:08 +02:00
Jörg Thalheim
33b5aab88f nixosTest.nix-upgrade: try to garbage collect with old nix 2024-08-23 11:06:48 +02:00
Jörg Thalheim
d01abc5602 nixosTest.nix-upgrade: actually use nix-daemon for build
root by-passes nix-daemon
2024-08-23 11:06:48 +02:00
Tom Bereknyei
c4dffb6513 nixosTest.nix-upgrade: init
Test out both nix upgrade-nix and a NixOS upgrade.

Inject a fake fallback-paths.nix assuming a stable -> latest upgrade.

The NixOS upgrade does not use nixos-rebuild switch due to the
cost+annoyance of the instantiation needing
system.includeBuildDependencies.
2024-08-23 11:06:47 +02:00
Bjørn Forsman
1edbc4fa0d nixos/ups: change upsmon option type from str to enum
According to `man upsd.users`, the option is 'either set to "primary" or
"secondary"'.
2024-08-22 21:25:47 +02:00
Someone Serge
f72b7b56fb tests/nvidia-container-toolkit: mv shared config to defaults 2024-08-22 17:51:54 +00:00
Martin Weinelt
760b2b5562
nixos/engelsystem: refactor option setup 2024-08-22 19:50:17 +02:00
Someone Serge
d970b4d6cd tests/nvidia-container-toolkit: hardware.opengl -> graphics 2024-08-22 17:37:26 +00:00
Someone Serge
0780a3ebc8 tests/nvidia-container-toolkit: strip {no,one}-nvidia prefix as obvious from the context 2024-08-22 17:34:48 +00:00
Someone Serge
1e571aeab4 tests/nvidia-container-toolkit: less nesting 2024-08-22 17:25:49 +00:00
Martin Weinelt
fe0d323af5
nixos/engelsystem: prune template cache on version changes
After upgrading to 3.5.0 we noticed, that registering would redirect to
the login page and not work at all. At the same time the admin user was
unable to access its user settings.

This issue could be tracked back to the template cache, that must be
invalidated between release upgrades.
2024-08-22 19:16:28 +02:00
Someone Serge
1b7f2fe883 tests/nvidia-container-toolkit: more getExe 2024-08-22 17:09:56 +00:00
Someone
2d7db58c2f
Merge pull request #313225 from ereslibre/nvidia-consistent-casing
docs: fix Nvidia casing to be consistent across different places
2024-08-22 16:51:41 +00:00
Martin Weinelt
d9cf6ea6f8
Merge pull request #336445 from adamcstephens/kanidm/1.3.3
kanidm: 1.3.2 -> 1.3.3
2024-08-22 18:41:30 +02:00
Someone
4c930c0635
Merge pull request #331071 from ereslibre/fix-nvidia-container-toolkit-docker-contamination
Fix nvidia container toolkit docker contamination
2024-08-22 16:40:06 +00:00
Adam Stephens
b93f6e4acd
nixos/tests/kanidm: bind certs path to fix ofborg tests
provision # [    8.223448] (kanidmd)[819]: kanidm.service: Failed to set up mount namespacing: /ofborg/checkout/repo/38dca4e3aa6bca43ea96d2fcc04e8229/builder/ofborg-evaluator-1/nixos/tests/common/acme/server:
No such file or directory
2024-08-22 10:59:48 -04:00
Emily
a565cfeac3 antennas: drop 2024-08-22 15:51:27 +01:00
Emily
6fa5767e07 tvheadend: drop
Closes: #332259
2024-08-22 15:51:27 +01:00
Christina Sørensen
31321be124
kubernetes: 1.30.2 -> 1.31.0
Updates feature gate tests to feature gates introduces in 1.31, assuming
they'll be around for a while.
2024-08-22 16:26:38 +02:00
Emily
01a749e0bf
Merge pull request #336077 from emilazy/push-yoykzrxwpykp
pict-rs_0_3: drop
2024-08-22 14:58:04 +01:00
Sandro
180f9e2195
Merge pull request #334629 from OPNA2608/init/lomiri/lomiri-gallery-app 2024-08-22 15:44:21 +02:00
Sandro
18fb834638
Merge pull request #322730 from bbenno/update-wp-httpd-htaccess 2024-08-22 14:33:17 +02:00
Alexander Linder
06855f1cd8
nixos/mautrix-whatsapp: automatic appservice registration option, pull login_shared_secret_map setting from env file (#311681)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-08-22 14:14:51 +02:00
nikstur
e7b7271ffc
Merge pull request #336513 from nikstur/etc-overlay-fixes
etc.overlay fixes
2024-08-22 13:57:04 +02:00
nikstur
7845b89e24 nixos/etc: unmount old /etc hierarchy lazily
This should fix errors where /etc is reported to be busy and thus cannot
be unmounted.

Another solution we can consider if this doesn't work out as we expect
is to forcefully unmount /etc.
2024-08-22 12:17:20 +02:00
nikstur
d820fe987e nixos/etc: wantedBy -> requiredBy for mounting overlay etc
I've observed that sometimes the overlay mount unit does not get started
when using wantedBy. requiredBy makes this relationship stricter and if
necessary will restart the initrd-fs.target and thus ensure that when
this target is reached /etc has alredy been mounted. This is in line
with the description of initrd-fs.target in systemd.special:

> Thus, once this target is reached the /sysroot/ hierarchy is fully set up
2024-08-22 12:12:18 +02:00
Sandro
a45dc99ba3
Merge pull request #287565 from RatCornu/pingvin-share 2024-08-22 11:59:03 +02:00
nikstur
483c13b835
Merge pull request #335929 from jmbaur/erofs-utils-1.8
Re-upgrade erofs-utils to 1.8
2024-08-22 11:52:25 +02:00
nikstur
0b6c394f3a
Merge pull request #328513 from isabelroses/docs/perlless
nixos/perlless: correct documented warning
2024-08-22 11:50:08 +02:00
Sandro
b6890ecb57
Merge pull request #334549 from Yarny0/foomatic-db-update 2024-08-22 11:46:35 +02:00
oluceps
6c22d08406
nixos/test/dae: disable waiting network 2024-08-22 17:09:31 +08:00
Sandro
11b26f016e
Merge pull request #336141 from emilazy/push-uztymzmukyyk
opencv{2,3}: drop
2024-08-22 09:14:40 +02:00
José Romildo Malaquias
56b912ba3f
Merge pull request #336161 from ghpzin/nixosTests.enlightenment/mark-broken
nixos/tests/enlightenment: mark broken
2024-08-21 22:28:08 -03:00
Emily
afdee7e458 pict-rs_0_3: drop
This was broken by the Rust 1.80 upgrade, and is an old version that
we’d have to patch to keep working.

We have already done the 0.4 → 0.5 update without keeping around
the old version or adding in any additional `stateVersion` logic
in <https://github.com/NixOS/nixpkgs/pull/280221>. As a result,
migration for 0.3 users is going to be a little awkward. I’ve done
my best to provide comprehensive instructions for anyone who hasn’t
already bumped to 0.4.

It is probably a footgun to add `stateVersion` logic for any
package that makes backwards‐incompatible schema changes and only
supports migration from the immediately previous version. Users
won’t get migrated by default and we have to either package and
maintain an endlessly growing list of old versions or add complicated
instructions like this. It’s not really practical for us to support
a significantly better migration story than upstream does.
2024-08-22 01:54:09 +01:00
Philip Taron
c849780855
Merge pull request #336404 from Stunkymonkey/security-pam-remove-with-lib 2024-08-21 17:01:28 -07:00
Felix Buehler
e32ec19edf nixos/security.pam: remove with lib; 2024-08-22 00:19:00 +02:00
Emily
1a35d0ccb5 nixos/pict-rs: fix environment variable name
Thanks to @marius851000 for reporting this issue. I assume it probably
changed in 0.5 or something.
2024-08-21 23:09:55 +01:00
Yt
133fb94cd4
Merge pull request #328976 from marius851000/fix_lemmy_ui
lemmy-ui: fix execution
2024-08-21 21:52:11 +00:00
marius david
8f73423ca0 tests/lemmy: Fix Lemmy’s test 2024-08-21 22:13:35 +02:00
Felix Stupp
4b998d179f
nixos/systemd.network: add support for UseDomains= in [Network] sections
Those options were also added with systemd 256, but sadly were missed out in #307068.

These options are documented in:
- [systemd 256 changelog](https://github.com/systemd/systemd/releases/tag/v256) (search for `UseDomains=`)
- [networkd.conf(5)](https://www.freedesktop.org/software/systemd/man/256/networkd.conf.html#UseDomains=)
- [systemd.network(5)](https://www.freedesktop.org/software/systemd/man/256/systemd.network.html#UseDomains=)
2024-08-21 19:48:29 +00:00
isabel
750663add9
nixos/perlless: correct documented warning 2024-08-21 20:11:48 +01:00