Commit Graph

2126 Commits

Author SHA1 Message Date
Maximilian Bosch
0dd4477d19 Merge: Fix: Correct podman systemd service name (#425170) 2025-08-11 18:39:10 +02:00
André Lima
28d3245201 nixos/libvirtd: allow changing firewall backend 2025-08-10 21:06:54 +01:00
Yethal
68710f4064 virtualisation/oci-containers: fix podman systemd service name 2025-08-04 10:01:24 +02:00
nicoo
19c9496c3e nixos/oci-containers: clean-up dependsOn example
This is more compact, and removes a syntax error.
2025-08-01 10:28:53 +02:00
nicoo
79b1189b5d nixos/oci-containers: remove overuse of literalExpression
This forced examples to be typeset with extraneous linebreaks,
as well as failed to detect syntax errors in examples.
2025-08-01 10:27:41 +02:00
Philip Taron
71d8c89d62 qemu-vm: create erofs with hard-dereference flag (#395494) 2025-07-24 05:32:39 -07:00
Wolfgang Walther
5a0711127c treewide: run nixfmt 1.0.0 2025-07-24 13:55:40 +02:00
Paul Meyer
bd184be272 qemu-vm: create erofs with hard-dereference flag
This will ensure reproducibility between different nixos systems, where
one system has store optimization enabled (which will hardling similar
files in the nix store) and the other doesn't. Without the flag, the
same image, built on the two different systems, will have a different
number of inodes. The flag will dereference hardlinks and copy them
into the image as different inodes.

Signed-off-by: Paul Meyer <katexochen0@gmail.com>
2025-07-24 07:46:37 +02:00
phaer
b033e0c4b6 virtualisation/disk-image: fix image.extension 2025-07-18 11:12:09 -07:00
Rafael Fernández López
117bbae49c nvidia-container-toolkit: reintroduce nvidia runtime wrappers
This allows users to keep using `docker run --gpus`. Despite CDI is
the recommended way to expose GPU's to containers nowadays, allow
users to keep using the old `--gpus` method.
2025-07-16 22:38:11 +02:00
nixpkgs-ci[bot]
8d8db2ff25 Merge master into staging-next 2025-07-12 00:17:12 +00:00
Philip Taron
8279ffe622 treewide: specify that mebibytes are used when it's ambiguous (#424169) 2025-07-11 12:29:33 -07:00
Axel Karjalainen
7159ab6f43 treewide: specify where mebibytes are used when it's ambiguous 2025-07-11 00:44:23 +03:00
K900
b960b040a2 Merge remote-tracking branch 'origin/master' into staging-next 2025-07-08 15:12:10 +03:00
Sandro
30c1ef051b nixos/ec2-data: fix eval 2025-07-08 11:57:40 +02:00
K900
e2c8c4260d Merge remote-tracking branch 'origin/master' into staging-next 2025-07-07 10:09:49 +03:00
jade
f43a088157 nixos-containers: Added flake option (#413463) 2025-07-06 19:24:39 -07:00
Gwendolyn Kornak
b5b04bb146 nixos/nixos-containers: add flake to container start script
Integrated the flake container setup into the spawn script for systemd-nspawn.
The trickiest part of this was ensuring the underlying per-container is built.
With the .conf file created, running `nixos-container update` creates all the necessary per-container structure.
We call this command at start to ensure the structure is created only if the per-container system isnt there.
Note: This also means the flake gets updated to branch HEAD when the container is started for the first time.
2025-07-05 17:22:15 -07:00
Gwendolyn Kornak
9a3173dacd nixos/nixos-containers: add flake option
While the nixos-container command allows for the creation of containers pointing to a flake, the declarative module doesn't have this option.
Adds the flake option for nixos-container declarative approach. Creates the /etc/nixos-container .conf file similar to how the command preforms it.
2025-07-05 17:21:37 -07:00
Martin Weinelt
c21be3563e nixos/ec2-data: use hostname-debian to set hostname from metadata
This is the simpler, more lightweight and better maintained version of
the hostname utility.
2025-07-04 06:53:11 +02:00
nixpkgs-ci[bot]
4725dc1d5d Merge staging-next into staging 2025-07-03 18:06:42 +00:00
Sandro Jäckel
f88e1c39e9 treewide: move StartLimitIntervalSec/StartLimitBurst to unitConfig 2025-07-03 15:48:28 +02:00
nixpkgs-ci[bot]
e17ff436c8 Merge staging-next into staging 2025-07-01 18:06:27 +00:00
nixpkgs-ci[bot]
367477b054 Merge staging-next into staging 2025-06-24 18:06:44 +00:00
Fernando Rodrigues
4a0180f434 nixos/xen: dehardcode the .pad section from the UKI builder
Upstream, intentionally or not, no longer appends the EFI image
with a .pad section for us to hook the rest of the UKI to. This
simply dehardcodes .pad from the awk script, instead using the
very last section in the binary. (Currently .reloc)

Co-authored-by: Yaroslav Bolyukin <iam@lach.pw>
Signed-off-by: Fernando Rodrigues <alpha@sigmasquadron.net>
2025-06-24 11:11:39 -03:00
wxt
ee0937ff0d nixos/waydroid: allow override waydroid 2025-06-24 20:54:30 +08:00
zimbatm
39c01d22bf net-tools: rename from nettools
By being in sync with the pname, it makes it easier to walk back from
the pname that shows in the /nix/store back to the attribute.

This change should not cause any rebuild.
2025-06-21 19:57:36 +02:00
Adam C. Stephens
9d9e0f911c nixos/incus: fix AppArmor issue (#415057) 2025-06-13 13:46:57 -04:00
John Titor
c87464cb0c Revert "treewide: migrate nixos modules to networking.hosts"
This reverts commit cd64f1bd87.
2025-06-09 00:10:05 +05:30
MakiseKurisu
dd5faa98ae nixos/incus: update AppArmor profile for new versions 2025-06-09 00:32:43 +08:00
John Titor
cd64f1bd87 treewide: migrate nixos modules to networking.hosts
Signed-off-by: John Titor <50095635+JohnRTitor@users.noreply.github.com>
2025-06-07 23:09:46 +05:30
Peder Bergebakken Sundt
c77ac9dfc3 treewide: fix typos 2025-06-02 16:07:07 +02:00
Someone
57390c8b91 virtualisation/docker: fix nvidia container wrapper (#407290) 2025-05-27 09:34:51 +00:00
John Titor
ad331efcaf nixos/qemu-vm: useBootPartition -> useBIOSBoot
useBootPartition was ambiguous, this makes the option more like useEFIBoot

Signed-off-by: John Titor <50095635+JohnRTitor@users.noreply.github.com>
2025-05-26 14:06:42 +05:30
sanana
c156a809e3 nixosTests.limine.bios: init
This patch adds a NixOS test for Limine on BIOS systems. It also fixes
some formatting in `nixos/lib/make-disk-image.nix`.

Signed-off-by: John Titor <50095635+JohnRTitor@users.noreply.github.com>
2025-05-26 14:06:42 +05:30
sanana
95355b4d94 nixos/qemu-vm: add option for a separate boot partition on BIOS
This patch adds the option `virtualisation.useBootPartition` which
creates a separate boot partition on BIOS systems using the new
`legacy+boot` partition layout type in `nixos/lib/make-disk-image.nix`.
2025-05-26 14:06:42 +05:30
Ramses
4c9b7995bf nixos/vmware-host: avoid IFD (#404954) 2025-05-17 23:14:42 +02:00
Rafael Fernández López
7e42e4431b virtualisation/docker: fix nvidia container wrapper 2025-05-15 10:27:23 +02:00
Arne Keller
4d4f8628cd nixos/libvirtd: Use preferred version of iptables (#228625) 2025-05-10 22:23:51 +02:00
Zhaofeng Li
13bb852869 nixos/libvirtd: Use preferred version of iptables 2025-05-10 12:49:47 -06:00
js6pak
6fdd4c90e5 nixos/vmware-host: avoid IFD 2025-05-07 17:34:35 +02:00
codgician
16a7d7e982 waagent: support AutoUpdate.UpdateToLatestVersion in module 2025-05-07 17:07:53 +08:00
r-vdp
eec01220a4 nixos/qemu-guest-agent: fix udevadm verify issues 2025-05-05 12:08:59 +02:00
Maximilian Bosch
b539370717 Merge: nixos/oci-containers: stricter dependencies for rootless containers with sdnotify=healthy (#394039) 2025-05-02 19:46:44 +02:00
Maximilian Bosch
344ee0cf07 nixos/oci-containers: stricter dependencies for rootless containers with sdnotify=healthy
After running this configuration for a while, we
noticed that the containers didn't get back up once and the services
failed with the following error:

    Error: current system boot ID differs from cached boot ID; an unhandled reboot has occurred.

This is hard to reproduce and seems to be a timing issue. However,
the logs indicated another issue that this patch now solves:

* The ExecStartPost= indicated that the user session got stopped before
  which is required or sdnotify=healthy. Add explicit ordering for
  user@. This unfortunately requires a statically declared uid.
2025-04-30 14:23:25 +02:00
illustris
5803bdb9fc Revert "Use mkImageMediaOverride for filesystem attributes of various images" 2025-04-29 08:41:26 +05:30
Maximilian Bosch
9cd14670ad nixos/oci-containers: escape login.username
When using e.g. GitLab as container registry, the token name may be the
username. However, the token name can contain special characters
including spaces breaking the registry login like this:

    Apr 25 15:35:48 test42 pre-start[294091]: image doesn't exist locally and login failed
    Apr 25 15:35:52 test42 pre-start[294289]: Error: accepts at most 1 arg(s), received 2
    Apr 25 15:35:52 test42 pre-start[294297]: Error: registry.example.com/foo/bar/baz: image not known

Applying `escapeShellArg` on it fixes the problem.
2025-04-25 15:39:00 +02:00
jopejoe1
e6d927fcfd cloudstack: add to image/images (#398556) 2025-04-24 19:03:53 +02:00
jopejoe1
326702f8bb Use mkImageMediaOverride for filesystem attributes of various images (#397330) 2025-04-24 18:54:06 +02:00
lassulus
b8d7097244 nixos/containers: fix shell error when privateUsers=no (#396174) 2025-04-18 17:53:51 -07:00