Commit Graph

25312 Commits

Author SHA1 Message Date
nikstur
5435eaaa4d nixos/rshim: init 2023-05-15 01:24:48 +02:00
Ilan Joselevich
a8eea70935
Merge pull request #231113 from Kranzes/harmonia
nixos/harmonia: adjust module and test to upstream, harmonia: 0.6.3 -> 0.6.4
2023-05-11 00:37:41 +03:00
figsoda
9eff400dd9
Merge pull request #230939 from figsoda/sniffnet-module 2023-05-10 17:24:47 -04:00
ajs124
1319323458 nixos/grub: turn definition of version option from an error into a warning
because a lot of configurations (generated by nixos-generate-config) contain it
2023-05-10 21:51:26 +02:00
ajs124
30bea8d82d nixos/*: remove boot.grub.version 2023-05-10 21:51:26 +02:00
Ilan Joselevich
7ecf20b490
nixos/harmonia: adjust module and test to upstream 2023-05-10 22:28:03 +03:00
Ryan Lahfa
fe7b996d66
Merge pull request #230857 from s1341/bugfix_pam_sssd
nixos/pam: Allow password changing via sssd
2023-05-10 16:56:47 +02:00
Sandro
84b4373d8c
Merge pull request #230550 from Mic92/harmonia 2023-05-10 16:55:06 +02:00
happysalada
47bedc81f8 uptime-kuma: add defaults for simpler initial setup 2023-05-10 09:54:56 -04:00
Jörg Thalheim
76ffeaf06c nixos/harmonia: init service 2023-05-10 14:52:31 +02:00
Sandro
7b22f5b4a2
Merge pull request #215494 from poelzi/webdav-server-rs-debug 2023-05-10 14:29:26 +02:00
figsoda
282e5e03a8 nixos/sniffnet: init 2023-05-09 15:53:34 -04:00
asonix
cb2941db79 pict-rs: 0.3.0-alpha.37 -> 0.3.3 2023-05-09 15:24:54 -04:00
Pascal Bach
7e14b746c0
Merge pull request #230890 from linyinfeng/tocken
nixos/networkd: fix typo of `tokenBucketFilterConfig`
2023-05-09 20:49:37 +02:00
Martin Weinelt
42aaea3606
Merge pull request #230889 from mweinelt/shadow-encrypt-method
nixos/shadow: Set default encrypt method
2023-05-09 19:43:06 +02:00
Sandro
8f6cd53206
Merge pull request #229022 from SuperSandro2000/nox-mpv-wayland
nixos/no-x-libs: disable wayland for mpv
2023-05-09 19:07:16 +02:00
Weijia Wang
419d7f9c8d
Merge pull request #230753 from fetsorn/typos
several typos
2023-05-09 19:16:12 +03:00
Atemu
9c946bce87
Merge pull request #230680 from alyssais/netboot-squashfs
nixos/netboot: add squashfsCompression option
2023-05-09 18:13:27 +02:00
Lin Yinfeng
1e05869917
nixos/networkd: fix typo of tokenBucketFilterConfig 2023-05-09 23:06:47 +08:00
Martin Weinelt
a3c7dcd88d
nixos/shadow: Set default encrypt method
Fixes the default for tools like chpasswd, chgpasswd and gpasswd.

Closes: #230880
2023-05-09 17:05:34 +02:00
Sandro
d199137345
Merge pull request #230560 from legendofmiracles/upddate-nodjs-asf 2023-05-09 16:58:52 +02:00
Alyssa Ross
e5e49df7fd
nixos/netboot: add squashfsCompression option
This is copied from isoImage.squashfsCompression.  It's useful to be
able to customise, as iteration cycles are very slow with xz, and
subjectively systems booted with less efficiently compressed squashfs
stores appear to have faster reads (although I didn't test that
scientificly so there could be other factors).
2023-05-09 14:15:10 +00:00
Alyssa Ross
096cdeeac4
nixos/iso-image: type isoImage.squashfsCompression 2023-05-09 14:15:02 +00:00
fetsorn
5e77899001 nixos/tpm2: fix typo
"acess" -> "access"
2023-05-09 18:02:17 +04:00
fetsorn
1a4e993104 nixos/prometheus: fix typo
"nixpgs" -> "nixpkgs"
2023-05-09 18:02:17 +04:00
fetsorn
f035683f55 nixos/matomo: fix typo
"suported" -> "supported"
2023-05-09 18:02:17 +04:00
fetsorn
d1398dd05c nixos/deluge: fix typo
"secuerly" -> "securely"
2023-05-09 18:02:17 +04:00
fetsorn
ac5f6d9100 nixos/apparmor: fix typo
"usualy" -> "usually"
2023-05-09 18:02:17 +04:00
Martin Weinelt
35a73717df
Merge pull request #218599 from Izorkin/update-peertube
peertube: 5.0.0 -> 5.1.0
2023-05-09 14:37:44 +02:00
Jacek Galowicz
b7dfa5082a
Merge pull request #228220 from R-VdP/test_driver_guest_shell_timeout
nixos-test-driver: include a timeout for the recv call, do not assume sh == bash
2023-05-09 13:05:28 +02:00
s1341
e2d538fead pam: remove unused try_first_pass 2023-05-09 13:45:15 +03:00
s1341
765ae4d581 nixos/pam: allow changing password using sssd 2023-05-09 13:43:06 +03:00
Florian Klink
6c9bef6b0f
Merge pull request #230777 from nikstur/systemd-repart-definitions-in-initrd
systemd-repart definitions in initrd
2023-05-09 13:24:04 +03:00
Sandro
443a8f398a
Merge pull request #230756 from NixOS/fzf-fix 2023-05-09 11:54:38 +02:00
lom
ea1cef8c00 ArchiSteamFarm.ui: use buildNpmPackage 2023-05-08 20:34:21 -04:00
Aaron Andersen
cf0327810b
Merge pull request #207093 from ymarkus/alertmanager
nixos/alertmanager: add checkConfig option
2023-05-08 20:15:17 -04:00
nikstur
d85abd2764 nixos/systemd-repart: definition files in initrd
Store the definition files in the initrd instead of reading them from
the Nix store in /sysroot.

This way, the initrd has to be re-generated every time the definition
files change. When the path to the defintion files instead of the
definition files themselves are embedded in the initrd, however, the
initrd also has to be re-generated every time. In this regard, this
change does not improve the status quo.

However, now systemd-repart also works reliable when the Nix store is
mounted separately from the root partition.

This change also enables new use-cases like creating partitions
necessary to boot the system. However, by default, the root partition
cannot be created on first boot because the systemd-repart service
requires a /sysroot to be mounted. Otherwise, systemd-repart cannot
determine the device to operate on.
2023-05-09 00:11:21 +02:00
nikstur
5c2a7490cf nixos/systemd-repart: fix
Since v253, systemd-repart tries to create temporary directories in
/var/tmp. However, this directory doesn't exist in the initrd. This
commit adds an enviroment variable to re-use the existing /tmp directory
instead of /var/tmp.
2023-05-08 23:12:59 +02:00
Izorkin
1afcb4c6ef
nixos/peertube: update nginx configuration 2023-05-08 23:49:03 +03:00
Izorkin
8d76c0b6fb
peertube: 5.0.0 -> 5.1.0 2023-05-08 23:48:32 +03:00
Ryan Lahfa
43a413de73
Merge pull request #230731 from NixOS/bump/netdata
netdata: 1.38.1 -> 1.39.0
2023-05-08 21:59:56 +02:00
Sandro Jäckel
edf57fef9b
nixos/fzf: fix evaluation if ohMyZsh is enabled 2023-05-08 21:10:28 +02:00
Raito Bezarius
16658f7634 nixos/netdata: introduce deadlineBeforeStopSec
Previously, we hardcoded a 60 second timer to stop netdata if we didn't have any answer back.
This is wrong and can cause data loss because the SIGTERM sent by systemd can sometimes be not honored.
Which in turn becomes a SIGKILL, causing potential data loss / corruption.

Offer a flag to users and bump the deadline to 2 minutes.
2023-05-08 19:29:13 +02:00
Ryan Lahfa
98167d573d
Merge pull request #229313 from mped-oticon/mped_proxmox_assert
nixos/proxmox-image: Disable O_DIRECT to fix assert when writing to tmpfs
2023-05-08 16:11:40 +02:00
Atemu
cb0f64e45d
Merge pull request #230665 from alyssais/iso-image-targetPlatform
nixos/iso-image: targetPlatform -> hostPlatform
2023-05-08 15:06:48 +02:00
Alyssa Ross
ecc1ec2c72 llvmPackages_latest: move to aliases.nix
Because llvmPackages_latest is used in Nixpkgs, by quite a few
packages, it's difficult to keep it up to date, because updating it
requires some level of confidence that every package that uses it is
going to keep working after the update.  The result of this is that
llvmPackages_latest is not updated, and so we end up in the situation
that "latest" is two versions older than the latest version we
actually provide.  This is confusing and unexpected.

"But won't this end up fragmenting our LLVM versions, if every package
previously using _latest is separately pinned to LLVM 14?", I hear you
ask.  No.  That fragmentation is already happening, even with an
llvmPackages_latest, because packages that actually require the
_latest_ version of LLVM (15/16), have already been decoupled from
llvmPackages_latest since it hasn't been upgraded.  So like it or not,
we can't escape packages depending on specific recent LLVMs.  The only
real fix is to get better at keeping the default LLVM up to
date (which I'm reasonably confident we're getting into a better
position to be feasibly better able to do).

So, unless we want to double down on providing a confusingly named
"llvmPackages_latest" attribute that refers to some arbitrary LLVM
version that's probably not the latest one (or even the latest one
available in Nixpkgs), we only have two options here: either we don't
provide such an attribute at all, or we don't use it in Nixpkgs so we
don't become scared to bump it as soon as we have a new LLVM available.
2023-05-08 13:05:33 +00:00
Nick Cao
aa7197b091
Merge pull request #230539 from OPNA2608/update/miriway
miriway: unstable-2023-03-17 -> unstable-2023-04-25
2023-05-08 20:27:47 +08:00
Alyssa Ross
bf7de549b9
nixos/iso-image: targetPlatform -> hostPlatform
This is not a compiler, and therefore does not need to care about the
target platform.
2023-05-08 11:50:06 +00:00
Mark Ruvald Pedersen
66fb2f539a nixos/proxmox-image: Disable O_DIRECT to fix assert
Context summary:
'vma create' can't otherwise write to tmpfs such as /dev/shm.
This is important when used from non-nixos machines which may
have /build as tmpfs.

VMA is Proxmox's virtual machine image format that wraps QEMU images,
augmenting these with proxmox-specific configuration file.
proxmox-image.nix uses the VMA tool to create vma image files.
The VMA tool exists as a patchset ontop of QEMU.

VMA writes its output with open() and O_DIRECT flag.
O_DIRECT does not work on Linux tmpfs [1]. Thus:
$ vma create ~/output.vma ...  # works, assuming home isn't tmpfs.
$ vma create /dev/shm/output.vma ...  # fails since /dev/shm is tmpfs
Failure results in assert(*errp == NULL).

O_DIRECT is a cache performance hint.
But it currently blocks our usage of nixos-generate -f proxmox from
Non-NixOS hosts and Docker.

The patch here simply removes O_DIRECT:
vma-writer.c later performs memalign due to O_DIRECT, but this is
safe to do with or without O_DIRECT.
Ideally, this should be fixed in upstream Proxmox: Perhaps by falling
back to open without O_DIRECT.

Another attempt to fix this SIGABRT is [2], which writes the vma file
directory to $out/ folder -- however that may still be tmpfs mounted
which it is in our case.

[1] https://lore.kernel.org/lkml/45A29EC2.8020502@tmr.com/t/
[2] https://github.com/NixOS/nixpkgs/pull/224282
2023-05-08 12:33:41 +02:00
Jörg Thalheim
3288479636 nixos/envfs: make mounts non-critical
We usually don't want to bring the whole machine into emergency mode
just because we couldn't mount envfs. It's usually not on the critical
path.
2023-05-08 11:24:18 +02:00