summaryrefslogtreecommitdiffstats
path: root/nixos/modules/tasks
AgeCommit message (Collapse)Author
2020-04-02Merge pull request #79828 from Mic92/zedJörg Thalheim
nixos/zfs: populate PATH with needed programs for zed
2020-03-30Merge pull request #81161 from wedens/libvirt-6.0.0Robin Gloster
libvirt: 5.4.0 -> 6.1.0
2020-03-29nixos/network-interfaces: fix examples typesDavid Costa
make literalExample receive string arguments. Fix nixos/nixos-homepage#255
2020-03-21zfs: document systemd-udev-settle dependencyPeter Hoeg
2020-03-15nixos/scripted-networking: fix bridge setup when libvirtd uses socket activationvolth
2020-03-12Merge pull request #80141 from symphorien/scrubLéo Gaspard
nixos/btrfs: make autoScrub not prevent shutdown or suspend
2020-03-12Merge pull request #81214 from buckley310/updateDelaylewo
NixOS/auto-upgrade: Add optional randomized delay
2020-03-03NixOS/auto-upgrade: refine option descriptionSean Buckley
2020-03-03nixos/zfs: continue trimming also if one pool failsJörg Thalheim
fixes https://github.com/NixOS/nixpkgs/issues/81602
2020-02-28NixOS/auto-upgrade: fix wordingSean Buckley
Co-Authored-By: Pascal Hertleif <killercup@gmail.com>
2020-02-27NixOS/auto-upgrade: Add optional randomized delaySean Buckley
2020-02-21Merge pull request #53033 from netixx/openvswitch-improved-systemdJörg Thalheim
openvswitch: better integration with systemd
2020-02-19Merge pull request #80504 from ben0x539/encrypted-devices-loa-warningMichele Guerini Rocco
silence warning from #63103 in encrypted-devices.nix
2020-02-18silence warning from #63103 in encrypted-devices.nixBenjamin Herr
2020-02-14nixos/btrfs: make autoScrub not prevent shutdown or suspendSymphorien Gibol
Fixes: #79086 #79017
2020-02-11nixos/filesystems: don't chown /run/keys recursivelyFlorian Klink
3c74e48d9c8dbcede89a72ea18cd27def4b498a9 was a bit too much, it updated permissions of all files recursively, causing files to be readable by the group. This isn't a problem immediately after bootup, but on a new activation, as tmpfiles.d get restarted then, updating the permission bits of now-existing files. This updates the `Z` to be a `z` (the non-recursive variant), and adds a `d` to ensure a directory is created (which should be covered by the initrd shell script anyway)
2020-02-11nixos/zfs: populate PATH with needed programs for zedJörg Thalheim
2020-02-05nixos/filesystems: ensure keys gid on /run/keys mountpointFlorian Klink
boot.specialFileSystems is used to describe mount points to be set up in stage 1 and 2. We use it to create /run/keys already there, so sshd-in-initrd scenarios can consume keys sent over through nixops send-keys. However, it seems the kernel only supports the gid=… option for tmpfs, not ramfs, causing /run/keys to be owned by the root group, not keys group. This was/is worked around in nixops by running a chown root:keys /run/keys whenever pushing keys [1], and as machines had to have pushed keys to be usable, this was pretty much always the case. This is causing regressions in setups not provisioned via nixops, that still use /run/keys for secrets (through cloud provider startup scripts for example), as suddenly being an owner of the "keys" group isn't enough to access the folder. This PR removes the defunct gid=… option in the mount script called in stage 1 and 2, and introduces a tmpfiles rule which takes care of fixing up permissions as part of sysinit.target (very early in systemd bootup, so before regular services are started). In case of nixops deployments, this doesn't change anything. nixops-based deployments receiving secrets from nixops send-keys in initrd will simply have the permissions already set once tmpfiles is started. Fixes #42344 [1]: https://github.com/NixOS/nixops/blob/884d6c3994b227eb09c307e5d25d6885c9af8220/nixops/backends/__init__.py#L267-L269
2020-02-01nixos/networking-interfaces: change preferTempAddress to allow disabling ↵rnhmjoj
temp addresses
2020-01-09nixos/powertop: wait for hardware to initializeDenys Pavlov
We should wait until after `multi-user.target` is triggered to allow hardware to finish initializing, such as network devices and USB drives. This ensures `powertop --auto-tune` sets more tunables to "Good". Fixes #66820
2019-12-20nixos: unify virtual console optionsrnhmjoj
This commit moves all the virtual console related options to a dedicated config/console.nix NixOS module. Currently most of these are defined in config/i18n.nix with a "console" prefix like `i18n.consoleFont`, `i18n.consoleColors` or under `boot` and are implemented in tasks/kbd.nix. Since they have little to do with actual internationalisation and are (informally) in an attrset already, it makes sense to move them to a specific module.
2019-12-16Merge master into staging-nextFrederik Rietdijk
2019-12-15Merge pull request #75193 from Ma27/optional-networkd-gatewayFranz Pletz
nixos/networkd: only set gateway if it's explicitly specified in the module system
2019-12-15openvswitch: better integration with systemdNetix (Espinet François)
Systemd dependencies for scripted mode were refactored according to analysis in #34586. networking.vswitches can now be used with systemd-networkd, although they are not supported by the daemon, a nixos receipe creates the switch and attached required interfaces (just like the scripted version). Vlans and internal interfaces are implemented following the template format i.e. each interface is described using an attributeSet (vlan and type at the moment). If vlan is present, then interface is added to the vswitch with given tag (access mode). Type internal enabled vswitch to create interfaces (see openvswitch docs). Added configuration for configuring supported openFlow version on the vswitch This commit is a split from the original PR #35127.
2019-12-12nfs: set up request-key for id mappingKai Wohlfahrt
A patch is necessary upstream to support multiple configs via symlinks in /etc/request-key.d Once that is done, we can add support for CIFS as well
2019-12-10nixos/treewide: Move rename.nix imports to their respective modulesSilvan Mosberger
A centralized list for these renames is not good because: - It breaks disabledModules for modules that have a rename defined - Adding/removing renames for a module means having to find them in the central file - Merge conflicts due to multiple people editing the central file
2019-12-08nixos/networkd: only set gateway if it's explicitly specified in the module ↵Maximilian Bosch
system
2019-12-04nixos/zfs: Adding ZED configuration optionsnyanloutre
Co-authored-by: sjau <github.com@sjau.ch>
2019-10-26Fix typo in message (`vswichtes` → `vswitches`)Elias Probst
2019-10-23nixos/network: remove 99-main.networkFlorian Klink
Just maching all network interfaces caused many breakages, see #18962 and #71106. We already don't support the global networking.useDHCP, networking.defaultGateway(6) options if networking.useNetworkd is enabled, but direct users to configure the per-device networking.interfaces.<name?>.… options.
2019-10-15Merge pull request #70240 from woffs/pr-etc-zpool.dJörg Thalheim
nixos module zfs: provide /etc/zfs/zpool.d
2019-10-14nixos/zfs: simplify logic for scrub/autosnapshot serviceJörg Thalheim
This makes them consistent with the way zfs.trim is enabled and allow to enable them by default in future.
2019-10-08nixos/zfs: avoid script derivation for trim serviceJörg Thalheim
Since we only have a single pipe we can save the overhead of building a derivation when creating the zfs trim service file when building the system.
2019-10-07nixos/zfs: only enable trim if zfs is enabledJörg Thalheim
Also don't fail the service if there are no pools yet. This might happen on installation ISOs.
2019-10-07Merge pull request #69302 from mayflower/networkd-disallow-dhcpLinus Heckemann
networkd: disallow useDHCP
2019-10-02nixos module zfs: provide /etc/zfs/zpool.dFrank Doepper
The scripts for zpool iostat -c and zpool status -c are located in /etc/zfs/zpool.d
2019-09-30mkRemovedOptionModule: assert on removed options (#69419)Silvan Mosberger
mkRemovedOptionModule: assert on removed options
2019-09-30mkRemovedOptionModule: assert on removed optionsRobin Gloster
We don't want to ignore config that can mess up machines. In general this should always fail evaluation, as you think you are changing behaviour and don't, which can easily create run-time errors we can catch early.
2019-09-28nixos network-interfaces.nix: fixup after the last changeVladimír Čunát
TL;DR: ipv6 tests were broken (probably the privacy-extension stuff) https://github.com/NixOS/nixpkgs/pull/68227#issuecomment-536159177
2019-09-28nixos/zfs: Enable trim by default (#69672)Jörg Thalheim
nixos/zfs: Enable trim by default
2019-09-27nixos/zfs: Enable trim by defaultSvein Ove Aas
2019-09-26Merge pull request #68227 from volth/patch-362Linus Heckemann
network-interfaces.nix: escape '.' in interface names passed to sysctl
2019-09-25Merge branch 'master' into networkd-disallow-dhcpRobin Gloster
2019-09-24nixos/network: replace deprecated DHCP=both by DHCP=yesRoman Volosatovs
2019-09-24networking.useDHCP: add release notes and docsRobin Gloster
2019-09-24networking.useDHCP: disallow for networkdRobin Gloster
This setting will be removed with the switch to systemd-networkd. The use of per interface config is encouraged instead.
2019-09-15NixOS/auto-upgrade: add gzip to service pathMikhail Klementev
Resolves #28527
2019-09-08nixos/networkd: continue supporting 99-main with wildcard interface matchAndreas Rammhold
With systemd version 243 network units with empty match block will generate warnigs. The reasoning seems to be that the intended behaviour is hard to infere. Being explicit about really meaning any interface is the reasonable thing here. We want to get rid of this mechanism in the long run but as long as we do not have a replacement we should stick with it and keep it in reasonable good shape.
2019-09-06'udev' needs absolute path to 'echo'volth
2019-09-06network-interfaces.nix: escape '.' in interface names passed to sysctlvolth