summaryrefslogtreecommitdiffstats
path: root/nixos/modules
diff options
context:
space:
mode:
authorgithub-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>2021-01-15 01:16:33 +0000
committerGitHub <noreply@github.com>2021-01-15 01:16:33 +0000
commit9f69dadafd02400c157f7faf5f594a023b0009ac (patch)
tree0539212faf4329874a592ab9e05673821ba009ff /nixos/modules
parent183b673b64a8ab9a56b00fa79b0a82c68c93c7cc (diff)
parent5525440dd68cc21d123b0c13fe511966080d24bb (diff)
Merge master into staging-next
Diffstat (limited to 'nixos/modules')
-rw-r--r--nixos/modules/services/databases/firebird.nix3
-rw-r--r--nixos/modules/services/databases/memcached.nix15
-rw-r--r--nixos/modules/services/databases/mongodb.nix7
-rw-r--r--nixos/modules/services/databases/redis.nix21
-rw-r--r--nixos/modules/services/databases/virtuoso.nix5
-rw-r--r--nixos/modules/services/misc/gitea.nix2
-rw-r--r--nixos/modules/services/misc/gitlab.nix8
-rw-r--r--nixos/modules/services/misc/gitolite.nix2
-rw-r--r--nixos/modules/services/misc/redmine.nix4
-rw-r--r--nixos/modules/system/boot/tmp.nix1
10 files changed, 53 insertions, 15 deletions
diff --git a/nixos/modules/services/databases/firebird.nix b/nixos/modules/services/databases/firebird.nix
index 95837aa1cea6..36dbb87f7303 100644
--- a/nixos/modules/services/databases/firebird.nix
+++ b/nixos/modules/services/databases/firebird.nix
@@ -59,6 +59,7 @@ in
port = mkOption {
default = "3050";
+ type = types.port;
description = ''
Port Firebird uses.
'';
@@ -66,6 +67,7 @@ in
user = mkOption {
default = "firebird";
+ type = types.str;
description = ''
User account under which firebird runs.
'';
@@ -73,6 +75,7 @@ in
baseDir = mkOption {
default = "/var/db/firebird"; # ubuntu is using /var/lib/firebird/2.1/data/.. ?
+ type = types.str;
description = ''
Location containing data/ and system/ directories.
data/ stores the databases, system/ stores the password database security2.fdb.
diff --git a/nixos/modules/services/databases/memcached.nix b/nixos/modules/services/databases/memcached.nix
index f54bb6cc9b18..ca7b20eb049a 100644
--- a/nixos/modules/services/databases/memcached.nix
+++ b/nixos/modules/services/databases/memcached.nix
@@ -17,39 +17,44 @@ in
options = {
services.memcached = {
-
enable = mkEnableOption "Memcached";
user = mkOption {
+ type = types.str;
default = "memcached";
description = "The user to run Memcached as";
};
listen = mkOption {
+ type = types.str;
default = "127.0.0.1";
- description = "The IP address to bind to";
+ description = "The IP address to bind to.";
};
port = mkOption {
+ type = types.port;
default = 11211;
- description = "The port to bind to";
+ description = "The port to bind to.";
};
enableUnixSocket = mkEnableOption "unix socket at /run/memcached/memcached.sock";
maxMemory = mkOption {
+ type = types.ints.unsigned;
default = 64;
description = "The maximum amount of memory to use for storage, in megabytes.";
};
maxConnections = mkOption {
+ type = types.ints.unsigned;
default = 1024;
- description = "The maximum number of simultaneous connections";
+ description = "The maximum number of simultaneous connections.";
};
extraOptions = mkOption {
+ type = types.listOf types.str;
default = [];
- description = "A list of extra options that will be added as a suffix when running memcached";
+ description = "A list of extra options that will be added as a suffix when running memcached.";
};
};
diff --git a/nixos/modules/services/databases/mongodb.nix b/nixos/modules/services/databases/mongodb.nix
index 4af0b9d44e13..db1e5fedf50d 100644
--- a/nixos/modules/services/databases/mongodb.nix
+++ b/nixos/modules/services/databases/mongodb.nix
@@ -41,16 +41,19 @@ in
};
user = mkOption {
+ type = types.str;
default = "mongodb";
description = "User account under which MongoDB runs";
};
bind_ip = mkOption {
+ type = types.str;
default = "127.0.0.1";
description = "IP to bind to";
};
quiet = mkOption {
+ type = types.bool;
default = false;
description = "quieter output";
};
@@ -68,16 +71,19 @@ in
};
dbpath = mkOption {
+ type = types.str;
default = "/var/db/mongodb";
description = "Location where MongoDB stores its files";
};
pidFile = mkOption {
+ type = types.str;
default = "/run/mongodb.pid";
description = "Location of MongoDB pid file";
};
replSetName = mkOption {
+ type = types.str;
default = "";
description = ''
If this instance is part of a replica set, set its name here.
@@ -86,6 +92,7 @@ in
};
extraConfig = mkOption {
+ type = types.lines;
default = "";
example = ''
storage.journal.enabled: false
diff --git a/nixos/modules/services/databases/redis.nix b/nixos/modules/services/databases/redis.nix
index 9628d30e76a3..1b90e59b1663 100644
--- a/nixos/modules/services/databases/redis.nix
+++ b/nixos/modules/services/databases/redis.nix
@@ -122,12 +122,29 @@ in
};
slaveOf = mkOption {
- default = null; # { ip, port }
- description = "An attribute set with two attributes: ip and port to which this redis instance acts as a slave.";
+ type = with types; nullOr (submodule ({ ... }: {
+ options = {
+ ip = mkOption {
+ type = str;
+ description = "IP of the Redis master";
+ example = "192.168.1.100";
+ };
+
+ port = mkOption {
+ type = port;
+ description = "port of the Redis master";
+ default = 6379;
+ };
+ };
+ }));
+
+ default = null;
+ description = "IP and port to which this redis instance acts as a slave.";
example = { ip = "192.168.1.100"; port = 6379; };
};
masterAuth = mkOption {
+ type = types.str;
default = null;
description = ''If the master is password protected (using the requirePass configuration)
it is possible to tell the slave to authenticate before starting the replication synchronization
diff --git a/nixos/modules/services/databases/virtuoso.nix b/nixos/modules/services/databases/virtuoso.nix
index 6eb09e0a58fc..8b01622ecb03 100644
--- a/nixos/modules/services/databases/virtuoso.nix
+++ b/nixos/modules/services/databases/virtuoso.nix
@@ -16,28 +16,33 @@ with lib;
enable = mkEnableOption "Virtuoso Opensource database server";
config = mkOption {
+ type = types.lines;
default = "";
description = "Extra options to put into Virtuoso configuration file.";
};
parameters = mkOption {
+ type = types.lines;
default = "";
description = "Extra options to put into [Parameters] section of Virtuoso configuration file.";
};
listenAddress = mkOption {
+ type = types.str;
default = "1111";
example = "myserver:1323";
description = "ip:port or port to listen on.";
};
httpListenAddress = mkOption {
+ type = types.nullOr types.str;
default = null;
example = "myserver:8080";
description = "ip:port or port for Virtuoso HTTP server to listen on.";
};
dirsAllowed = mkOption {
+ type = types.nullOr types.str; # XXX Maybe use a list in the future?
default = null;
example = "/www, /home/";
description = "A list of directories Virtuoso is allowed to access";
diff --git a/nixos/modules/services/misc/gitea.nix b/nixos/modules/services/misc/gitea.nix
index ac702a05ee8b..7eb52fef43d5 100644
--- a/nixos/modules/services/misc/gitea.nix
+++ b/nixos/modules/services/misc/gitea.nix
@@ -453,7 +453,7 @@ in
description = "gitea";
after = [ "network.target" ] ++ lib.optional usePostgresql "postgresql.service" ++ lib.optional useMysql "mysql.service";
wantedBy = [ "multi-user.target" ];
- path = [ gitea pkgs.gitAndTools.git ];
+ path = [ gitea pkgs.git ];
preStart = let
runConfig = "${cfg.stateDir}/custom/conf/app.ini";
diff --git a/nixos/modules/services/misc/gitlab.nix b/nixos/modules/services/misc/gitlab.nix
index 35a9dccdff28..de4d1bf1987a 100644
--- a/nixos/modules/services/misc/gitlab.nix
+++ b/nixos/modules/services/misc/gitlab.nix
@@ -736,7 +736,7 @@ in {
environment = gitlabEnv;
path = with pkgs; [
postgresqlPackage
- gitAndTools.git
+ git
ruby
openssh
nodejs
@@ -764,7 +764,7 @@ in {
path = with pkgs; [
openssh
procps # See https://gitlab.com/gitlab-org/gitaly/issues/1562
- gitAndTools.git
+ git
cfg.packages.gitaly.rubyEnv
cfg.packages.gitaly.rubyEnv.wrappedRuby
gzip
@@ -806,7 +806,7 @@ in {
wantedBy = [ "multi-user.target" ];
path = with pkgs; [
exiftool
- gitAndTools.git
+ git
gnutar
gzip
openssh
@@ -854,7 +854,7 @@ in {
environment = gitlabEnv;
path = with pkgs; [
postgresqlPackage
- gitAndTools.git
+ git
openssh
nodejs
procps
diff --git a/nixos/modules/services/misc/gitolite.nix b/nixos/modules/services/misc/gitolite.nix
index 59cbdac319c8..190ea9212d2a 100644
--- a/nixos/modules/services/misc/gitolite.nix
+++ b/nixos/modules/services/misc/gitolite.nix
@@ -227,6 +227,6 @@ in
};
environment.systemPackages = [ pkgs.gitolite pkgs.git ]
- ++ optional cfg.enableGitAnnex pkgs.gitAndTools.git-annex;
+ ++ optional cfg.enableGitAnnex pkgs.git-annex;
});
}
diff --git a/nixos/modules/services/misc/redmine.nix b/nixos/modules/services/misc/redmine.nix
index 1313bdaccc49..8b53eb471db6 100644
--- a/nixos/modules/services/misc/redmine.nix
+++ b/nixos/modules/services/misc/redmine.nix
@@ -230,7 +230,7 @@ in
production = {
scm_subversion_command = "${pkgs.subversion}/bin/svn";
scm_mercurial_command = "${pkgs.mercurial}/bin/hg";
- scm_git_command = "${pkgs.gitAndTools.git}/bin/git";
+ scm_git_command = "${pkgs.git}/bin/git";
scm_cvs_command = "${pkgs.cvs}/bin/cvs";
scm_bazaar_command = "${pkgs.breezy}/bin/bzr";
scm_darcs_command = "${pkgs.darcs}/bin/darcs";
@@ -299,7 +299,7 @@ in
breezy
cvs
darcs
- gitAndTools.git
+ git
mercurial
subversion
];
diff --git a/nixos/modules/system/boot/tmp.nix b/nixos/modules/system/boot/tmp.nix
index 837e308cbea9..5bb299adb15f 100644
--- a/nixos/modules/system/boot/tmp.nix
+++ b/nixos/modules/system/boot/tmp.nix
@@ -34,6 +34,7 @@ with lib;
{
what = "tmpfs";
where = "/tmp";
+ type = "tmpfs";
mountConfig.Options = [ "mode=1777" "strictatime" "rw" "nosuid" "nodev" "size=50%" ];
}
];