Commit graph

36073 commits

Author SHA1 Message Date
Adam Stephens dbeeeb8e06
nixos/lxc-container: enable udev-trigger for nested containers 2023-10-12 15:11:09 -04:00
Weijia Wang c3a3b38cb9
Merge pull request #258813 from SuperSandro2000/drop-searx
searx: drop
2023-10-12 19:55:39 +02:00
Pol Dellaiera 30046d3bc1
nixos/module: add projecteur 2023-10-12 19:51:20 +02:00
Weijia Wang 1cdfe7f591
Merge pull request #260260 from wegank/wordpress-alias
wordpress6_1, wordpress6_2: drop
2023-10-12 19:38:05 +02:00
Jens Reimann 32814b01a4 trunk-ng: init at 0.17.8 2023-10-12 18:07:06 +02:00
Aaron Andersen bae7820f02
Merge pull request #259425 from aanderse/nixos/openssh-authorized-principals
nixos/openssh: add support for authorized principals
2023-10-12 10:30:52 -04:00
figsoda a9cd086d3c
Merge pull request #260618 from Aleksanaa/nixos/bandwhich
nixos/bandwhich: add missing capabilities
2023-10-12 10:18:46 -04:00
Maciej Krüger d934d20cd3
nixos/lxd: fix ui.enable desc
Otherwise it would show up as "Whether to enable Enables the (experimental) LXD UI. ."

Now is just "Whether to enable (experimental) LXD UI."
2023-10-12 15:24:01 +02:00
Molly Miller 1a794a3e4b nixos/mailman: store locks in ephemeral runtime directory
nixosTests.mailman: test mailman master lock handling
2023-10-12 10:39:18 +00:00
aleksana bb777015c8 nixos/bandwhich: add missing capabilities 2023-10-12 15:53:55 +08:00
Artturi 520e363e82
Merge pull request #259891 from l0b0/refactor/xkb-attrset 2023-10-12 08:43:28 +03:00
OTABI Tomoya d570cfb5b0
Merge pull request #260433 from adamcstephens/sabctools/7.1.2
python311Packages.sabctools: 7.0.2 -> 7.1.2, fix sabnzbd
2023-10-12 14:26:48 +09:00
Artturin 2b1258e453 llvmPackages: add the removal of extend to release-notes 2023-10-12 07:50:57 +03:00
Mikael Fangel 46d295f15c nixos/gnu: remove 2023-10-11 23:43:45 -03:00
Donovan Glover fd7daf9fc4
nixos/nixos-containers: add restartIfChanged option
This commit makes auto-restarting declarative containers optional.

This is useful when you don't want changes to your config to automatically
restart the container and thus stop any applications running inside it.
2023-10-11 21:53:42 -04:00
Silvan Mosberger 2f01d20202
Merge pull request #259927 from asymmetric/no-docbook-in-manual
nixos/manual: no DocBook for mkPackageOption
2023-10-12 03:27:21 +02:00
Sandro Jäckel e793d18455 nixos/searx: little makeover 2023-10-11 23:48:29 +02:00
Sandro Jäckel ad1f57095f searx: drop
searx has been removed as it is unmaintained. Please switch to searxng.
2023-10-11 23:48:28 +02:00
Arnout Engelen 6071292b2a
Merge pull request #243338 from raboof/prometheus-imap-mailstat-exporter-init-at-2023-06-20
prometheus-imap-mailstat-exporter: init at 0.0.1
2023-10-11 17:33:25 -03:00
Bobby Rong 4cf896a425
Merge pull request #260080 from r-ryantm/auto-update/cinnamon.mint-artwork
cinnamon.mint-artwork: 1.7.5 -> 1.7.6
2023-10-11 21:08:19 +08:00
Adam Stephens cb719dfa72
nixos/tests/sabnzbd: add check for sabctools mismatch 2023-10-11 08:53:22 -04:00
Atemu 16fb0b365d
Merge pull request #259056 from leona-ya/nixos-paperless-systemd-254
nixos/paperless: fix start with latest systemd
2023-10-11 13:15:24 +02:00
edef 89e45f23db nixos/modules/security/wrappers: drop dead code 2023-10-11 08:49:32 +00:00
Victor Engmark 3a6c79cff6 nixos/x11: refactor XKB options into a single attrset
[Motivation](https://github.com/NixOS/nixpkgs/issues/257817#issuecomment-1741705042):

- Having all the XKB options in the same attribute set clarifies their
  relation better than using a common option name prefix ("xkb").
- `services.xserver.layout` is an XKB option, but this is not obvious
  from its name. Putting it with the other XKB options clarifies this.

Co-authored-by: Michele Guerini Rocco <rnhmjoj@users.noreply.github.com>
2023-10-11 09:46:37 +03:00
Arnout Engelen aae49a5cc7
Merge pull request #247540 from imlonghao/borgmatic/1.8.1
borgmatic: 1.7.15 -> 1.8.1
2023-10-10 22:46:24 -03:00
Majiir Paktu 9d6e6e18bc nixos/pam: add maintainer 2023-10-10 21:11:35 -04:00
Majiir Paktu e712b6e81d nixos/pam: generate apparmor includes from rules
Removes redundant config from the module. Fixes a bug where some modules
(e.g. ussh) were added to apparmor even though they had no rules enabled.
2023-10-10 21:11:35 -04:00
Majiir Paktu 43f7cb4a95 nixos/pam: add order comment to each rule line 2023-10-10 21:11:35 -04:00
Majiir Paktu 077cdcc7e9 nixos/pam: convert rules to attrs, add order field
Makes it possible to override properties of a rule by name. Introduces
an 'order' field that can be overridden to change the sequence of rules.

For now, the order value for each built-in rule is derived from its
place in the hardcoded list of rules.
2023-10-10 21:11:34 -04:00
Majiir Paktu e86487e579 nixos/pam: remove empty text fields 2023-10-10 21:11:34 -04:00
Majiir Paktu 5b8439f966 nixos/pam: add settings option for common argument styles
Adds easily overrideable settings for the most common PAM argument
styles. These are:

- Flag (e.g. "use_first_pass"): rendered for true boolean values. false
  values are ignored.

- Key-value (e.g. "action=validate"): rendered for non-null, non-boolean
  values.

Most PAM arguments can be configured this way. Others can still be
configured with the 'args' option.
2023-10-10 21:11:34 -04:00
Martin Weinelt 37773cd0b0
Merge pull request #259729 from natsukium/factory-boy
python311Packages.factory-boy: rename from factory_boy
2023-10-11 02:04:37 +02:00
Bernardo Meurer fd1b81464c
Merge pull request #258328 from Madouura/pr/rocm-update 2023-10-10 16:20:36 -04:00
Izorkin cfd837442f nixos/samba: start service after network activation 2023-10-10 20:13:52 +02:00
maxine f3d84b91e9
Merge pull request #260248 from ToxicFrog/linger
nixos/users-groups: add user option to enable lingering
2023-10-10 20:08:27 +02:00
Weijia Wang 7db9836654 wordpress6_1, wordpress6_2: drop 2023-10-10 18:38:22 +02:00
R. Ryantm 051963b199
cinnamon.mint-artwork: 1.7.5 -> 1.7.6
This sets the mono font to DejaVu Sans Mono 10.
2023-10-10 22:06:50 +08:00
imlonghao 4a519fa142
borgmatic: 1.7.15 -> 1.8.1 2023-10-10 21:48:13 +08:00
Rebecca Kelly e648d46465 nixos/users-groups: add user option to enable lingering
Adapted from
https://gist.github.com/graham33/fdbdcc18317a621d9dd54beb36be6683

Fixes #3702

Lingering users can still be managed mutably by root with `loginctl`,
but the settings here will take precedence when `nixos-rebuild` is run.
2023-10-10 08:53:48 -04:00
Jörg Thalheim b7057368c8 systemd-boot-builder: add missing fsync in atomic writes
write(2) and close(2) doesn't ensure the file content actually got synched, so let's also fsync before doing the rename
2023-10-10 14:49:51 +02:00
Jörg Thalheim 8335022649 nixos/tests/systemd-boot: improve assertion error for update test 2023-10-10 14:49:51 +02:00
Jörg Thalheim 865a2cf8c1 Revert "nixos/systemd-boot: skip EFI update to 252"
This reverts commit 80665d606a.

Parsing the package version broke our systemd-boot builder test.

i.e. it won't be able to parse systemd-boot efi binaries coming from
ubuntu

We no longer use the faulty systemd-boot version so this code should no
longer be needed.
2023-10-10 14:49:51 +02:00
Jörg Thalheim b7fbd1ffd4 systemd-boot-builder: use regex prefix string
otherwise there are warnings for \.
2023-10-10 14:49:51 +02:00
Jörg Thalheim 5ee9fdf929 systemd-boot-builder: use new builtin typing style 2023-10-10 14:49:51 +02:00
Jörg Thalheim e20a886f87 systemd-boot-builder: drop unused import 2023-10-10 14:49:51 +02:00
Jörg Thalheim a17f41ed0b systemd-boot-builder: replace mkdir_p function with stdlib equivalent 2023-10-10 14:49:51 +02:00
Jörg Thalheim f4bf9702be systemd-boot-builder: always do syncfs, even after a failure 2023-10-10 14:49:51 +02:00
Jörg Thalheim dbac7467ad systemd-boot-builder: drop semicolons
this is python, not C.
2023-10-10 14:49:51 +02:00
Jörg Thalheim 1f70361d08 systemd-boot-builder: resort imports according to isort
foo
2023-10-10 14:49:51 +02:00
Robert Hensing a14f3f829d nixos/eval-config.nix: Rename arg nixosSystem -> configuration
For some time now the attrset returned by `evalModules` has
`type = "configuration"`.

This is a clean refactor because the name is not exposed.
(never is for simple lambda)
2023-10-10 13:25:15 +02:00
Robert Hensing 1c0427862e nixos/eval-config.nix: Rename let withExtraArgs -> withExtraAttrs
Presumably it only used to add `extraArgs`, but it also adds other
attributes now.
2023-10-10 13:24:55 +02:00
Robert Hensing 2eb706646a
Merge pull request #259797 from K900/eval-config-pkgs
eval-config.nix: set nixpkgs.pkgs instead of _module.args.pkgs
2023-10-10 13:18:30 +02:00
Vladimír Čunát 3b6389aa2f
nixos/release: don't block on firefox tests
I can't recall when these tests last discovered a real problem.
Having to do many manual restarts is annoying, e.g.
  https://hydra.nixos.org/build/237622614#tabs-buildsteps
2023-10-10 12:19:27 +02:00
Maximilian Bosch 3d3b99ad20
Merge pull request #259980 from Ma27/synapse-db-assertion
nixos/matrix-synapse: drop old DB check assertion, actually require DB to be up
2023-10-10 11:41:05 +02:00
Maximilian Bosch 791fe98a0d
Merge pull request #259888 from julianschacher/matrix-synapse-fix-media-store-access
nixos/matrix-synapse: add `media_store_path` to services `ReadWritePaths`
2023-10-10 11:40:45 +02:00
Luflosi cf8aa48605
nixos/tests/kubo: various improvements
Add new test to check if kubo.passthru.repoVersion is set correctly.
Also split the existing NixOS VM test into two independent parts. The test already used two independent VMs but just one testScript. This made experimenting with just one of the two VMs slower than it needed to be. It should also increase parallelism slightly since both test scripts can now run at the same time.
2023-10-10 10:46:25 +02:00
Ben Wolsieffer b6876d5c86
nixos/security/wrappers: don't force PIE hardening (#259509)
PIE causes problems with static binaries on ARM (see 76552e9). It is
enabled by default on other platforms anyway when musl is used, so we
don't need to specify it manually.
2023-10-10 10:13:29 +02:00
Lin Jian a75d4a5fd5
Merge pull request #260069 from doronbehar/doc/mkOptionType.typo
nixos/doc/mkOptionType: small typo fix
2023-10-10 15:23:08 +08:00
Majiir Paktu 6eea7fb194 nixos/pam: extract args field
Module arguments have common escaping rules for all PAMs.
2023-10-09 23:17:37 -04:00
Majiir Paktu 12a488e89c nixos/pam: extract modulePath field 2023-10-09 23:17:36 -04:00
Majiir Paktu 25bc21f19a nixos/pam: extract control field 2023-10-09 23:17:36 -04:00
Majiir Paktu 0563e0a379 nixos/pam: give each rule a name
These names are internal identifiers. They will be used as keys so that
users can reconfigure rules by merging a rule config with the same name.
The name is arbitrary. The built-in rules are named after the PAM where
practical.
2023-10-09 23:17:36 -04:00
Majiir Paktu fbd7427b14 nixos/pam: define rules as submodules
Allows us to decompose rules into multiple fields that we later format
as textual rules. Eventually allows users to override individual fields.
2023-10-09 23:17:36 -04:00
Majiir Paktu 3c85d159f7 nixos/pam: automatically populate rule type
Eliminates a redundancy between the 'rules' suboptions and the type
specified in each rule.

We eventually want to give each rule a name so that we can merge config
overrides. The PAM name is a natural choice for rule name, but a PAM is
often used in multiple rule types. Organizing rules by type and rule
name avoids name collisions.
2023-10-09 23:17:15 -04:00
Majiir Paktu d6bb805932 nixos/pam: extract header comments
Unblocks converting the rules from one big string to a rich data
structure.
2023-10-09 20:40:19 -04:00
Ryan Lahfa bfc5d57d66
Merge pull request #259886 from RaitoBezarius/drop-varnish 2023-10-10 00:46:20 +02:00
Madoura 6f39d63688
nixos/doc: rocm-opencl-icd -> rocmPackages.clr.icd 2023-10-09 16:38:54 -05:00
Madoura fb93210205
nixos/doc: note ROCm changes 2023-10-09 16:38:53 -05:00
Doron Behar 6843abd5fb
Merge pull request #231152 from tcheronneau/nixos.tinyproxy
Adding tinyproxy service to NixOS
2023-10-09 23:53:58 +03:00
Anderson Torres 52058530ce nixos/connman: refactor 2023-10-09 17:49:02 -03:00
Doron Behar 3c34a1a464 nixos/doc/mkOptionType: small typo fix 2023-10-09 23:38:32 +03:00
Thiago Kenji Okada e7a621f8e9
Merge pull request #259066 from thiagokokada/add-renice-sway
nixos/sway: add enableRealtime option
2023-10-09 19:53:51 +01:00
Sarah Brofeldt a655e7a1aa
Merge pull request #259240 from haenoe/oci-containers-labels-option
nixos/oci-containers: add labels option
2023-10-09 18:52:20 +02:00
Maximilian Bosch 9f1d4b79e3
nixos/postgresql: fix identMap example
This was causing the following warning before when building the manual:

    warning: literalExample is deprecated, use literalExpression instead, or use literalMD for a non-Nix description.

Rather than using `literalExpression`, nothing is used. This option
expects a string and the example is a string, no special handling
required. Both `literalExample` from the docbook ages and
`literalExpression` now are only required if the example is
a Nix expression rather than a value of the option's type.
2023-10-09 17:41:44 +02:00
Maximilian Bosch cb67bb0335
nixos/matrix-synapse: mergeable log configuration
Right now there's no trivial way to override parts of synapse's log
config such as the log-level because the only thing that's changeable is
the path to the log-file used by synapse and its workers.

Now, there's a new option called `services.matrix-synapse.log`
which contains the default log config as Nix attribute-set (except
`handlers.journal.SYSLOG_IDENTIFIER`). It has default priority, so new
things can be added like

    services.matrix-synapse.log = {
      my.extra.field = 23;
    }

without discarding the rest. If desired, this can still be done via
`lib.mkForce`.

If the log configuration for a single worker or synapse, but not all
workers should be changed, `services.matrix-synapse.settings.log_config`
or `services.matrix-synapse.workers._name_.worker_log_config`
can be used.
2023-10-09 17:34:15 +02:00
Weijia Wang ad855375b4
Merge pull request #244197 from wexder/netclient
netclient: init at 0.21.0
2023-10-09 16:55:22 +02:00
Vladimír Zahradník 9053490648 nixos/netclient: init 2023-10-09 15:58:05 +02:00
Bobby Rong f5ec74729c
Merge pull request #259787 from bobby285271/upd/pantheon-test
nixosTests.pantheon: Extend the tests
2023-10-09 20:41:32 +08:00
ajs124 6e45bee3b3 nixos/rl-2311: add varnish upgrade notes 2023-10-09 14:18:50 +02:00
ajs124 dbe4e6d2c0 varnish74: init at 7.4.1 2023-10-09 14:14:21 +02:00
Maximilian Bosch 7f08d0ebd8
nixos/matrix-synapse: drop old DB check assertion, actually require DB to be up
Closes #236062

The PR #236062 was submitted because of the following problem: a synapse
instance was running in a NixOS container attached to the host network
and a postgresql instance on the host as database. In this setup,
synapse connected to its DB via 127.0.0.1, but the DB wasn't locally set
up and thus not configured in NixOS (i.e.
`config.services.postgresql.enable` was `false`). This caused the
assertion removed in this patch to fail.

Over three years ago this assertion was introduced when this module
stopped doing autoconfiguration of postgresql entirely[1] because a
breaking change in synapse couldn't be managed via an auto-upgrade on
our side. To make sure people don't deploy their DB away by accident,
this assertion was introduced.

Nowadays this doesn't serve any value anymore because people with
existing instances should've upgraded by now (otherwise it's their job
to carefully read the release notes when missing upgrades for
several years) and people deploying fresh instances are instructed by
the docs to also configure postgresql[2].

Instead, it only causes issues in corner cases like #236062, so after
some discussion in that PR I think it's time to remove the assertion
altogether.

Also, there's no `Requires=` for `postgresql.service` in the systemd
units which means that it's not strictly guaranteed that the DB is up
when synapse starts up. This is fixed now by adding `requires`. To avoid
being bitten by above mentioned cases again, this only happens if
`config.services.postgresql.enable` is `true`.

If somebody uses a non-local postgresql, but has also deployed a local
postgresql instance on the synapse server (rather unlikely IMHO), it's
their job to opt out of this behavior with `mkForce` (this is precisely one
of the use-cases `mkForce` and friends were built for IMHO).

[1] https://github.com/NixOS/nixpkgs/pull/80447
[2] https://nixos.org/manual/nixos/stable/#module-services-matrix-synapse
2023-10-09 14:06:50 +02:00
Maximilian Bosch ad57ad1ff5
nixos/nextcloud: update / clean up the nginx configuration
First of all, a few cleanups were made to make it more readable:

* Reordered the sections by their priority so what you're reading in Nix
  is also what you get in the final nginx.conf.
* Unified media/asset locations

Most notably, this fixes the

    Your web server is not properly set up to resolve "/ocm-provider/".

warning since 27.1.2 where `ocm-provider` was moved from a static
directory in the source tarball to a dynamic HTTP route[1].

Additionally, the following things were fixed:

* The 404 checks for build/tests/etc. are now guaranteed to be before
  the `.php` location match and it's not implicitly relied upon Nix's
  internal attribute sorting anymore.

* `.wasm` files are supported properly and a correct `Content-Type` is
  set.

* For "legacy" routes (e.g. `ocs-provider`/`cron`/etc) a `rewrite` rule
  inside the location for fastcgi is used as recommended by upstream[2].
  This also makes it easier to understand the purpose of the location
  itself (i.e. use fastcgi for PHP code).

[1] https://github.com/nextcloud/documentation/pull/11179
[2] https://docs.nextcloud.com/server/27/admin_manual/installation/nginx.html
2023-10-09 12:40:57 +02:00
Maximilian Bosch 8702ae0110
nixos/nextcloud: drop enableBrokenCiphersForSSE
🎉
2023-10-09 12:40:57 +02:00
Michele Guerini Rocco 2e54187399
Merge pull request #258347 from Benjamin-L/gnupg-agent-extraconfig
nixos/gnupg: add agent.settings option
2023-10-09 11:12:55 +02:00
HaeNoe 2f021def6e nixos/oci-containers: add labels option 2023-10-09 10:43:29 +02:00
Lorenzo Manacorda afb15c6513 nixos/manual: no DocBook for mkPackageOption
`mkPackageOptionMD` is now an alias of `mkPackageOption`, and the transition
from DocBook to CommonMark has been completed.
2023-10-09 08:54:29 +02:00
Kid bb2c03f0a1
nixos/system-path: remove nano from defaultPackages description 2023-10-09 14:14:40 +08:00
Lin Jian 98edbf83ae
Merge pull request #259009 from bobvanderlinden/pr-locate-package
nixos/locate: rename option `locate` -> `package`
2023-10-09 09:34:16 +08:00
Raito Bezarius f9f7fd208a varnish72: drop, varnish73: drop
All of them are EOL according to https://endoflife.date/varnish
2023-10-09 03:06:32 +02:00
Julian Schacher 722e9df2fb
nixos/matrix-synapse: add media_store_path to services ReadWritePaths
Currently, when setting a custom media_store_path, which lies outside of
cfg.dataDir, the current ReadWritePaths make it so that Synapse can't
access the media_store_path. So add the media_store_path to
ReadWritePaths to fix that.
2023-10-09 02:27:05 +02:00
Maximilian Bosch 669da9ccdb
Merge pull request #246117 from Ralith/fix-synapse-well-known-example
nixos/matrix-synapse: fix duplicate Content-Type header in example
2023-10-08 19:53:26 +02:00
K900 93cfbb253c eval-config.nix: set nixpkgs.pkgs instead of _module.args.pkgs
This allows nixpkgs.overlays to work, and also the nixpkgs.config check.
2023-10-08 20:41:44 +03:00
ners dccd00027e
nixos/azure: add contents module option (#244364) 2023-10-08 19:35:14 +02:00
Bobby Rong 585164f759
nixosTests.pantheon: Extend the tests
This help me discover issues when I do manual testing.
2023-10-09 00:14:30 +08:00
Doron Behar 50a077328a
Merge pull request #259259 from Lassulus/syncthing_stale
nixos/syncthing: match stale ids by subtracting in jq
2023-10-08 12:53:34 +03:00
Vladimír Čunát 2ec92384d7
Merge #258361: nixos/knot: compatibility with 23.05 config 2023-10-08 10:16:06 +02:00
Vladimír Čunát 6b66e2fc9c
nixos/knot: compatibility with 23.05 config
- run conf-check iff keyFiles == [] (like in 23.05; this was my bug)
- support extraConfig + keyFiles

- but warning will still be shown if extraConfig is used,
  and it might be slightly confusing
2023-10-08 10:14:54 +02:00
Bob van der Linden 423c86a70b
nixos/locate: rename option locate -> package 2023-10-08 10:09:12 +02:00
Sarah Brofeldt 9b73af9b27
Merge pull request #259498 from TLATER/tlater/gitea-metrics
gitea: Add option to supply the metrics token via file
2023-10-08 07:53:33 +02:00
natsukium abd8c26137
python311Packages.factory-boy: rename from factory_boy 2023-10-08 12:32:12 +09:00
Majiir Paktu f5f1751b1f refactor: combine scripted and networkd WakeOnLan config 2023-10-07 21:02:46 -04:00
Majiir Paktu d290c309f4 nixos/network-interfaces-systemd: fix WakeOnLan
WakeOnLan= was configured when using the scripted backend but not the
networkd backend. The other link options are set in the .network file
when using networkd, but WakeOnLan= is only available in a .link file.
2023-10-07 20:58:51 -04:00
Luflosi 70c8adce8d
kubo: 0.22.0 -> 0.23.0
https://github.com/ipfs/kubo/releases/tag/v0.23.0

Support for /quic (Draft 29) was removed, so remove it from `services.kubo.settings.Addresses.Swarm`.

The changelog says that there have been some fixes to the FUSE mountpoint functionality but the test still requires the workaround, so leave that unchanged.
2023-10-08 02:04:02 +02:00
Majiir Paktu c3e90f5667 nixos/network-interfaces-systemd: require defaultGateway.interface
The logic for configuring a gateway without an interface specified adds
a route with Gateway= to *every interface* configured by NixOS for
networkd. This leads to nonsensical configurations like the following:

    [Network]
    DHCP=no
    Address=192.168.0.1/24

    [Route]
    Gateway=10.0.0.1
    GatewayOnLink=false

We remove this logic and make defaultGateway.interface required to
configure a default gateway when using networkd.

We can ignore the removal of GatewayOnLink because systemd defaults it
to "no" anyway.
2023-10-07 16:09:11 -04:00
Majiir Paktu c11b788d1a nixos/network-interfaces-systemd: support defaultGateway.interface
When interface and address are both specified, we can set Gateway= on
the named interface. The existing logic assumes interface is not set
(since it's guarded by assertion) so we now disable it when interface
has a value.

As a bonus, we now support the defaultGateway.metric option when
interface is set.
2023-10-07 16:09:11 -04:00
Majiir Paktu 088da23f9e nixos/test-instrumentation: fix unsetting of defaultGateway
The empty string is coerced to an attrset:

    { address = ""; interface = null; metric = null; }

The new defaultGateway logic (correctly) complains that interface must
be defined when using networkd. We instead clear defaultGateway by
setting it to its actual default value, which is null.
2023-10-07 16:09:11 -04:00
Tristan Daniël Maat b59e5a34e7
nixos/gitea: Add option to supply the metrics token via file 2023-10-07 21:53:02 +02:00
Lin Jian 021da9bf62
Merge pull request #259549 from woojiq/keyd
nixos/keyd: add `extraConfig` option
2023-10-07 23:18:51 +08:00
Lin Jian 249ef1a69b
Merge pull request #259558 from amesgen/borgbackup-package-option
nixos/borgbackup: add package option
2023-10-07 23:16:46 +08:00
amesgen bbf7f58b57
nixos/borgbackup: add package option
Co-authored-by: Lin Jian <me@linj.tech>
2023-10-07 16:27:57 +02:00
Maximilian Bosch efc5c80e18
nextcloud25: remove
EOL of Nextcloud v25 is scheduled by the end of this month.
2023-10-07 16:16:42 +02:00
Lin Jian 4a5f3d5a50
Merge pull request #259228 from nbdd0121/patch-1
nixos/dnsmasq: allow custom package
2023-10-07 21:04:22 +08:00
Bobby Rong 383b753bba
Merge pull request #259363 from bobby285271/fix/gnome-flashback
gnome.gnome-flashback: Fix x-d-p-gnome launch
2023-10-07 20:56:26 +08:00
Mario Rodas 5103716b44
Merge pull request #252800 from 1000101/prometheus-pgbouncer-exporter
prometheus-pgbouncer-exporter: init at 0.7.0
2023-10-07 06:37:06 -05:00
Doron Behar 34888cd1d1 nixos/tests/syncthing-init: Remove unused testName attribute 2023-10-07 14:04:43 +03:00
Gary Guo 7094f1ec0e nixos/dnsmasq: allow custom package
Allow a custom package to be used for dnsmasq service.
2023-10-07 11:53:25 +01:00
1000101 3b094812b1 prometheus-pgbouncer-exporter: init at 0.7.0 2023-10-07 11:44:40 +02:00
woojiq fee1832e84 nixos/keyd: add extraConfig option 2023-10-07 11:50:04 +03:00
Linus Heckemann 2de1be5b51
Merge pull request #258677 from Majiir/fix-networkd-search-domains
nixos/network-interfaces-systemd: don't set network-level domains
2023-10-07 08:43:49 +02:00
K900 b7a3aaae38
Merge pull request #259460 from K900/test-eval-fixes
treewide: test eval fixes
2023-10-07 07:36:46 +03:00
Ryan Lahfa 5fa3ea862b
Merge pull request #251898 from ktrinh-anduril/ktrinh/improve-devicetree-infra 2023-10-07 00:55:35 +02:00
Ryan Lahfa ae7d5d59b8
Merge pull request #258569 from alyssais/linux-6.4-drop 2023-10-07 00:35:08 +02:00
K900 320fcb409c nixos/tests/tracee: fix eval
Test still doesn't pass.
2023-10-07 00:17:54 +03:00
K900 b854f27f47 nixos/tests/sftpgo: fix eval 2023-10-07 00:10:50 +03:00
K900 29535e40ef nixos/tests/lxd-image-server: fix eval 2023-10-07 00:07:50 +03:00
K900 93d52c5609 nixos/tests/mongodb: remove non-existent maintainer 2023-10-07 00:07:40 +03:00
K900 2c596b216a nixos/orangefs: fix typo in group name
This would have broken eval and has broken the test.
2023-10-07 00:07:23 +03:00
K900 3626143f19 nixos/tests/litestream: fix eval
Test still doesn't pass.
2023-10-07 00:07:11 +03:00
Artturi 34c738fb3d
Merge pull request #152631 from jonringer/pgmanage-use-package 2023-10-07 00:05:58 +03:00
K900 a4e7f5011d nixos/tests: remove reference to non-existent test 2023-10-06 23:55:21 +03:00
K900 969a309b9e nixos/tests/sftpgo: fix eval 2023-10-06 23:55:20 +03:00
K900 a101216526 nixos/tests/osquery: fix eval 2023-10-06 23:55:20 +03:00
K900 16753291fa nixos/tests/legit: fix eval 2023-10-06 23:55:20 +03:00
K900 a3323f68a7 nixos/tests/hardened: fix eval 2023-10-06 23:54:57 +03:00
K900 1bc5af0f6a nixos/tests/dconf: fix config format
This was changed in the module, but not in the test
2023-10-06 23:52:52 +03:00
K900 d4eca0e8bb nixos/gollum: remove non-existent maintainer 2023-10-06 23:52:42 +03:00
K900 80cc25eb51 nixos/testing: fix eval for tests created without make-python-test.nix
We have too many test entrypoints and this is a problem.
2023-10-06 23:52:04 +03:00
Robert Scott 3a60f9bf63
Merge pull request #258943 from techknowlogick/bump-teleport
teleport_11: 11.3.10 -> 11.3.25, teleport_12: 12.4.7 -> 12.4.20, teleport_13: init at 13.4.1, teleport_14: init at 14.0.1
2023-10-06 20:56:01 +01:00
Lin Jian 272dba1e31
Merge pull request #257415 from ehmry/yggdrasil
nixos/yggdrasil: add extraArgs option
2023-10-07 02:05:36 +08:00
Aaron Andersen 76fb9da41f nixos/openssh: add support for authorized principals 2023-10-06 13:57:19 -04:00
Bjørn Forsman e5b8b12ac9 nixos/coredns: add extraArgs option 2023-10-06 19:38:38 +02:00
Bjørn Forsman fa8ace3618 nixos: don't implicitly map missing user groups to nogroup
Before: `users.users.user1.group = "group-not-defined-anywhere-else"`
would result in user1 having the primary group `nogroup`, assigned at
activation time and only with a (easy to miss) warning from the
activation script. This behaviour is a security issue becase no files
should be owned by `nogroup` and it allows for unrelated users (and
services) to accidentally have access to files they shouldn't have.

After: The configuration above results in this eval error:
  - The following users have a primary group that is undefined: user1
  Hint: Add this to your NixOS config:
    users.groups.group-not-defined-anywhere-else = {};
2023-10-06 19:33:01 +02:00
Emery Hemingway 3fc4ecafeb nixos/yggdrasil: add extraArgs option 2023-10-06 17:59:14 +01:00
Weijia Wang 39edffebe6
Merge pull request #253548 from Quantenzitrone/rimgo
rimgo: init at 1.2.0 & module
2023-10-06 17:50:58 +02:00
K900 944e26dc60
Merge pull request #259318 from K900/fix-externally-defined-nixos-tests
nixosTest: fix tests defined with pkgs.nixosTest
2023-10-06 18:04:29 +03:00
Lin Jian de26e61f7e
Merge pull request #258582 from returntoreality/gpsd-extra-args
nixos/gpsd: add extraArgs option
2023-10-06 22:54:51 +08:00
K900 8a7282f90b nixosTest: fix tests defined with pkgs.nixosTest 2023-10-06 16:33:15 +03:00
Ryan Lahfa c22f1c1cfa
Merge pull request #257828 from mbey-mw/nginx-tmpfiles-rules 2023-10-06 15:28:36 +02:00
Marek Beyer ea1eb4ee0f
nixos/nginx: add systemd-tmpfiles exclusion of temporary directories
Directories used by nginx in the tmp path are only created upon startup and
must not be deleted while nginx is running.
2023-10-06 14:26:37 +02:00
Marek Beyer 040cf48d28
nixos/tests: add test for nginx temp directories removal
The default temp directories for nginx must not be removed by
systemd-tmpfiles-clean.service. This test lowers the age parameter for /tmp and
triggers a cleanup that would normally only occur after 10 days of nginx
inactivity. After that, the functionality of nginx that requires a temporary
directory is tested again.
2023-10-06 14:26:37 +02:00