Commit Graph

21292 Commits

Author SHA1 Message Date
Robert Hensing
527457cadc Merge pull request #156163 from erdnaxe/galene_hardening
nixos/galene: systemd unit hardening
2022-04-28 10:52:00 +02:00
Julien Mourer
55f1c83f5b hardware: set enableRedistributableFirmware if enableAllFirmware is set (#163014)
If it works with enableRedistributableFirmware, which is a subset of enableAllFirmware, it should also work with enableAllFirmware.
2022-04-28 10:30:04 +02:00
Bobby Rong
f4f969a484 Merge pull request #170360 from bobby285271/pantheon
Pantheon 7 updates 2022-04-25
2022-04-28 12:44:12 +08:00
Artem Leshchev
b01be47c87 nixos/nvidia: fix /dev/nvidia* devices minors
We can't assume that DRI card minor is the same as NVidia GPU device minor,
because some DRI minors could be taken by GPUs of other vendors.

Fixes #87788, #98942.
2022-04-28 01:18:58 +03:00
Pascal Bach
ee385d8364 Merge pull request #170396 from teto/gitlab-description
services.gitlab-runner: support runner description
2022-04-27 19:30:26 +02:00
Sandro
54b1753b2a Merge pull request #170505 from romildo/upd.enlightenment
nixos/enlightenment: enable libinput
2022-04-27 18:06:40 +02:00
Florian Klink
9b71167ac0 Merge pull request #87268 from adisbladis/nixos-containers-state-directories
nixos-container: Use new configuration & state directories
2022-04-27 15:35:58 +02:00
Artturi
fce438aa02 Merge pull request #170462 from Artturin/hpssali 2022-04-27 16:24:16 +03:00
Sandro
bf0457694b Merge pull request #169144 from romildo/upd.lxqt
lxqt: 1.0.0 -> 1.1.0
2022-04-27 14:54:54 +02:00
Arnout Engelen
2b85441bb0 Merge pull request #146241 from rgrunbla/wpa_supplicant-fix-writable
wpa_supplicant: prevent writing non-writable configuration
2022-04-27 11:35:49 +02:00
adisbladis
3c49151f15 nixos/nixos-containers: Add warning on unsupported state version combo 2022-04-27 18:35:46 +12:00
adisbladis
f535d6f45e nixos-container: Use new configuration & state directories
We need to move NixOS containers somewhere else so these don't clash
with Podman, Skopeo & other container software in the libpod &
cri-o/cri-u/libcontainer ecosystems.

The state directory move is not strictly a requirement but is good for
consistency.
2022-04-27 18:35:08 +12:00
Bernardo Meurer
80d4480778 sd-image-aarch64: deduplicate cm4 section 2022-04-26 20:23:50 -07:00
Bobby Rong
782683d551 nixos/pantheon: fix outdated wording in docs 2022-04-27 10:18:16 +08:00
Bernardo Meurer
11c1152e0f sd-image-aarch64: add dtbs for rpi-400 and cm4s 2022-04-26 19:05:24 -07:00
Bernardo Meurer
b30105b7c2 ubootRaspberryCM4_64bit: merge with ubootRaspberryPi4_64bit 2022-04-26 19:05:23 -07:00
Bernardo Meurer
dcfaae6679 nixos/modules/profiles/all-hardware: add nvme to initrd modules 2022-04-26 15:22:37 -07:00
Bernardo Meurer
faf42ffbd0 ubootRaspberryCM4_64bit: init 2022-04-26 15:22:25 -07:00
Bernardo Meurer
d1fef1e7c3 sd-image-aarch64: add support for the RaspberryPi CM4 2022-04-26 15:22:24 -07:00
José Romildo
0679095c10 nixos/enlightenment: enable libinput 2022-04-26 18:17:46 -03:00
José Romildo
22b2c47866 nixos/mate: enable libinput 2022-04-26 18:08:47 -03:00
Janne Heß
69d1acda00 nixos/xfs: Fix evaluation (#170471) 2022-04-26 21:43:01 +02:00
Artturin
99b1b47f39 nixos/hpsa: add alternative url for hpssacli 2022-04-26 21:39:04 +03:00
Jan Tojnar
6b738bce80 nixos/nscd: Fix lib.literalExample deprecation
The NixOS evaluation would complain:

trace: warning: literalExample is deprecated, use literalExpression instead, or use literalDocBook for a non-Nix description.
2022-04-26 14:06:52 +02:00
Xiami
b43999bea0 nixos/zookeeper: Remove .passthru as suggested 2022-04-26 18:44:37 +08:00
Matthieu Coudron
c1e318d0c5 services.gitlab-runner: support runner description
The description for the runner in the UI is by default sthg like
"npm_nixos_d0544ed48909" i.e., the name of the attribute.

I wanted to have a more user-friendly description and added a
description to the service.
Seems like gitlab-runner doesn't like having both fields set:
"Cannot use two forms of the same flag: description name"
so I used one or the other.
2022-04-26 11:43:46 +02:00
Will
14fca0ca6f couchdb3: 3.2.1 -> 3.2.2 2022-04-26 09:02:36 +00:00
Rick van Schijndel
4586388f85 Merge pull request #170320 from andersk/negated-version
treewide: Simplify negated uses of versionAtLeast, versionOlder
2022-04-26 07:50:15 +02:00
Bernardo Meurer
e8e87beee7 Merge pull request #169047 from helsinki-systems/feat/systemd-stage-1-filesystems
nixos/systemd-stage-1: Fixup most filesystem tasks
2022-04-25 15:02:29 -07:00
Bernardo Meurer
59aa6e4988 Merge pull request #170099 from helsinki-systems/feat/systemd-stage-1-no-random-seed
nixos/systemd-stage-1: Get rid of random-seed
2022-04-25 14:56:45 -07:00
Bernardo Meurer
9f26ab61e5 Merge pull request #170134 from helsinki-systems/feat/systemd-stage-1-also-storepaths
nixos/stage-1-systemd: Also accept packages as store paths
2022-04-25 14:53:24 -07:00
Anders Kaseorg
6920d8ca42 treewide: Simplify negated uses of versionAtLeast, versionOlder
Signed-off-by: Anders Kaseorg <andersk@mit.edu>
2022-04-25 13:35:24 -07:00
Robert Hensing
ecc66a886e Merge pull request #168945 from Lassulus/kexec-tests
nixosTests.kexec: better test if we are in a new system
2022-04-25 17:17:32 +02:00
David Anderson
c9a1647ade nixos/tailscale: use systemctl restart during activation.
This avoids the scenario where you activate a new config over Tailscale,
and a long delay between the "stop services" and "start services" phases
of the activation script lead to your terminal freezing for tens of
seconds, until tailscaled finally gets started again and the session
recovers.

Per the documentation of stopIfChanged, this is only safe to do if the
service definition is robust to stopping the old process using the new
service definition. As the maintainer of the upstream systemd unit, I
can confirm that Tailscale is robust to this scenario: it has to be
in order to work right on several other distros that just do
unpack-then-restart, rather than the more complex stop-unpack-start
dance.

Signed-off-by: David Anderson <dave@natulte.net>
2022-04-24 23:31:35 -07:00
Vonfry
2474c8c89a nixos/fcitx5: add the setting of RIME_DATA_DIR and options for rime-data 2022-04-25 13:39:19 +08:00
Sandro
93da45162d Merge pull request #166321 from wentasah/usbrelay 2022-04-25 02:23:19 +02:00
Janne Heß
45494fab68 nixos/systemd-stage-1: Get rid of random-seed
This is not used at all since the unit has
ConditionPathExists=!/etc/initrd-release
2022-04-24 21:59:59 +01:00
Linus Heckemann
fc1248c589 Merge pull request #169932 from Ma27/nextcloud-profile-setting
nixos/nextcloud: make `profile.enabled` configurable
2022-04-24 22:50:05 +02:00
Janne Heß
acca3f4b81 nixos/plymouth: Add systemd stage 1 support 2022-04-24 21:47:49 +01:00
Janne Heß
dc4b2812e4 nixos/stage-1-systemd: Also accept packages as store paths 2022-04-24 21:47:34 +01:00
Jack O'Sullivan
568cb2d6ab nixos/systemd/nspawn: Add missing nspawn unit options
A few options have been added to the `systemd.nspawn` unit type are
missing from `systemd.nspawn.*.*Config`. See systemd.nspawn(5).
2022-04-24 21:20:59 +01:00
Janne Heß
acca69992c nixos/btrfs: Add systemd stage 1 support 2022-04-24 16:32:54 +02:00
Janne Heß
160fb93fdc nixos/filesystems: Make most simple filesystems compatible with systemd
This includes disabling some features in the initrd by default, this is
only done when the new initrd is used. Namely, ext and bcache are
disabled by default. bcache gets an own enable option while ext is
detected like any other filesystem.
2022-04-24 16:32:34 +02:00
Robin Gloster
0d8c3cf64b Merge pull request #164650 from mayflower/jira-home
nixos/jira: set home for jira user
2022-04-24 14:27:33 +02:00
Linus Heckemann
c85bc19cdf Merge pull request #169303 from emccorson/fix/add-copy-system-config
nixos/tools: add copySystemConfiguration to configuration file template
2022-04-24 00:01:00 +02:00
Maximilian Bosch
9931c4a407 nixos/nextcloud: make profile.enabled configurable
I recently learned that Nextcloud 23's new profile feature — basically a
way for users to share personal contact details — has a problematic
default setting, profile data is shared with **everyone** by default.

This means that an unauthenticated user can access personal information
by accessing `nextcloud.tld/u/user.name`.

The announcement of v23 states[1]:

> We go a step further and introduce a profile page. Here you can put a
> description of yourself, show links to, for example, social media, what
> department you are in and information on how to contact you. All these
> are of course entirely optional and you can choose what is visible to who!
> The profile and user status are accessible also from our mobile and desktop clients.

It's not mentioned that by default you share personal information[3] with
everyone and personally I think that's somewhat problematic.

To work around that, I decided to add an option for the recently added[2]
and even set it to `false` by default to make an explicit opt-in for
that feature.

[1] https://nextcloud.com/blog/nextcloud-hub-2-brings-major-overhaul-introducing-nextcloud-office-p2p-backup-and-more/
[2] https://github.com/nextcloud/server/pull/31624/files
[3] By default, this affects the following properties:
    * About
    * Full name
    * Headline
    * Organisation
    * Profile picture
    * Role
    * Twitter
    * Website
    Phone, Address and Email are not affected and only shown to
    authenticated users by default.
2022-04-23 13:31:50 +02:00
Jonas Heinrich
24b53785cc nixos/create_ap: add module 2022-04-23 07:17:44 -04:00
Bernardo Meurer
b23ec41f14 Merge pull request #168554 from helsinki-systems/feat/systemd-stage-1-luks
nixos/systemd-stage-1: Add basic LUKS support
2022-04-22 12:37:25 -07:00
Jan Tojnar
be9e3fdf7d Merge pull request #169553 from jtojnar/gnome-default-dark-background
nixos/gnome: Add the NixOS background metadata
2022-04-21 21:36:19 +02:00
Bernardo Meurer
b57126a16e Merge pull request #169477 from drupol/nix/add-2.8.0
nixVersions.stable: 2.7.0 -> 2.8.0
2022-04-21 11:18:25 -07:00