summaryrefslogtreecommitdiffstats
path: root/nixos
AgeCommit message (Collapse)Author
2021-12-28Merge pull request #133984 from ju1m/sourcehuttomberek
nixos/sourcehut: updates, fixes, hardening
2021-12-28nixos/sourcehut: add more testsJulien Moutinho
2021-12-28nixos/sourcehut: fix links to gitsrht-update-hookJulien Moutinho
2021-12-28nixos/sourcehut: fix post-update-scriptJulien Moutinho
2021-12-28nixos/sourcehut: fix OnCalendarJulien Moutinho
2021-12-28nixos/sourcehut: update testJulien Moutinho
2021-12-28nixos/sourcehut: full rewrite, with fixes and hardeningJulien Moutinho
2021-12-28nixos/make-options-doc: fix invalid ':' in XML NCName (non-colonized name)Julien Moutinho
2021-12-28nixos/doc/rl-2205: Add note about reduced closure of python3.pkgs.matplotlibBenoit de Chezelles
2021-12-28Merge pull request #152344 from romildo/upd.qt5ctJosé Romildo Malaquias
qt5ct: move to qt5-packages
2021-12-27Merge pull request #152311 from arachnist/kea-fixesMartin Weinelt
2021-12-27Merge pull request #150774 from abbradar/docker-rootlessNikolay Amiantov
Rootless Docker service
2021-12-27influxdb2 service: don't use dynamic userNikolay Amiantov
It breaks something inside of influxdb2, which results in flurry of errors like these: > ts=2021-12-21T18:19:35.513910Z lvl=info msg="Write failed" log_id=0YZYwvV0000 service=storage-engine service=write shard=50 error="[shard 50] unlinkat ./L1-00000055.tsi: read-only file system" I believe this is somehow caused by a mount namespace that systemd creates for the service, but I didn't investigate this deeper.
2021-12-27Merge pull request #139873 from rnhmjoj/dhcpdMichele Guerini Rocco
nixos/dhcpd: switch to DynamicUser
2021-12-27Merge pull request #147784 from m1cr0man/acmeMartin Weinelt
2021-12-27qt5ct: move to qt5-packagesJosé Romildo
2021-12-27nixos/hydra: Removing self as maintainerPhilipp
2021-12-27Merge pull request #151678 from kouyk/thinkfan-typoBobby Rong
thinkfan: fix typo in level
2021-12-27nixos/kea: fixes for the systemd unitsRobert Gerus
Fix a typo in the kea-dhcp-ddns-server unit definition, and add a KEA_LOCKFILE_DIR environment variable without which kea daemons try to access a lockfile under /var/run/kea path, which is prevented by systemd's ProtectSystem (or one of the other Protect*) mechanism. kea-dhcp-ddns-server doesn't react to updates from dhcp4 server at all without it.
2021-12-27Merge pull request #152289 from lovesegfault/fix-mtp-udev-pathBernardo Meurer
nixos/gvfs: fix libmtp udev package path
2021-12-27Merge pull request #151156 from Artturin/fsckonbatArtturi
2021-12-27Merge pull request #148832 from r-ryantm/auto-update/autoresticBobby Rong
autorestic: 1.3.0 -> 1.5.0
2021-12-26nixos/gvfs: fix libmtp udev package pathBernardo Meurer
As pointed out by @sigprof[1] my bump of libmtp silently broke this, as I moved the udev files out of the bin output of the pkg. [1]: https://github.com/NixOS/nixpkgs/pull/144290#discussion_r775266642
2021-12-26nixos/acme: Add test for caddyLucas Savva
This test is technically broken since reloading caddy does not seem to load new certs. This needs to be fixed in caddy.
2021-12-26nixos/acme: Add test for lego's built-in web serverLucas Savva
In the process I also found that the CapabilityBoundingSet was restricting the service from listening on port 80, and the AmbientCapabilities was ineffective. Fixed appropriately.
2021-12-26nixos/acme: Clean up default handlingSilvan Mosberger
2021-12-26nixos/acme: Add useRoot optionLucas Savva
2021-12-26nixos/acme: Update documentationLucas Savva
- Added defaultText for all inheritable options. - Add docs on using new defaults option to configure DNS validation for all domains. - Update DNS docs to show using a service to configure rfc2136 instead of manual steps.
2021-12-26nixos/acme: Update release notesLucas Savva
2021-12-26nixos/acme: Add defaults and inheritDefaults optionLucas Savva
Allows configuring many default settings for certificates, all of which can still be overridden on a per-cert basis. Some options have been moved into .defaults from security.acme, namely email, server, validMinDays and renewInterval. These changes will not break existing configurations thanks to mkChangedOptionModule. With this, it is also now possible to configure DNS-01 with web servers whose virtualHosts utilise enableACME. The only requirement is you set `acmeRoot = null` for each vhost. The test suite has been revamped to cover these additions and also to generally make it easier to maintain. Test config for apache and nginx has been fully standardised, and it is now much easier to add a new web server if it follows the same configuration patterns as those two. I have also optimised the use of switch-to-configuration which should speed up testing.
2021-12-26nixos/acme: Check for revoked certificatesLucas Savva
Closes #129838 It is possible for the CA to revoke a cert that has not yet expired. We must run lego to validate this before expiration, but we must still ignore failures on unexpired certs to retain compatibility with #85794 Also changed domainHash logic such that a renewal will only be attempted at all if domains are unchanged, and do a full run otherwises. Resolves #147540 but will be partially reverted when go-acme/lego#1532 is resolved + available.
2021-12-26nixos/acme: Add a human readable error on run failureLucas Savva
Closes NixOS/nixpkgs#108237 When a user first adds an ACME cert to their configuration, it's likely to fail to renew due to DNS misconfig. This is non-fatal for other services since selfsigned certs are (usually) put in place to let dependant services start. Tell the user about this in the logs, and exit 2 for differentiation purposes.
2021-12-26nixos/acme: Remove selfsignedDeps from finished targetsLucas Savva
selfsignedDeps is already appended to the after and wants of a cert's renewal service, making these redundant. You can see this if you run the following command: systemctl list-dependencies --all --reverse acme-selfsigned-mydomain.com.service
2021-12-25Merge pull request #151255 from aanderse/nixos/mysql-cleanupAaron Andersen
nixos/mysql: module cleanup
2021-12-25Merge pull request #147973 from aanderse/nixos/caddyAaron Andersen
nixos/caddy: introduce several new options
2021-12-25Merge pull request #151482 from jbpratt/kubevirtLassulus
virtualisation: implement kubevirt config
2021-12-25nixos/rl-2205: mention autorestic updateBobby Rong
2021-12-25nixos/stubby: reduce to a settings-style configurationEmery Hemingway
Extract the example configuration from the package to provide a working example. Remove pkgs.stubby from `environment.systemPackages`.
2021-12-24Merge pull request #147027 from Izorkin/update-nginx-ktls7c6f434c
nginxMainline: enable ktls support
2021-12-24Merge pull request #151481 from Ma27/privacyidea-uwsgi-buffer-sizeMaximilian Bosch
nixos/privacyidea: increase buffer-size of uwsgi from 4096 to 8192
2021-12-23Merge pull request #149704 from squalus/nginx-prometheus-exporter-fixBobby Rong
nixos/prometheus-nginx-exporter: fix argument syntax
2021-12-23nixos/collectd: validate config file syntax at build timeGuillaume Girol
2021-12-23nixos/collectd: add nixos testGuillaume Girol
2021-12-22nixos/mysql: minor cleanup and formattingAaron Andersen
2021-12-22nixos/mysql: remove services.mysql.bind and services.mysql.port in favor of ↵Aaron Andersen
services.mysql.settings
2021-12-22docker-rootless service: initNikolay Amiantov
2021-12-22Merge pull request #150922 from ncfavier/systemd-tzdirFlorian Klink
nixos/systemd: set TZDIR for PID 1
2021-12-22Update nixos-rebuild man page to reflect target-host changerembo10
See: https://github.com/NixOS/nixpkgs/pull/126614
2021-12-22thinkfan: fix typo in levelSteven Kou
One of the valid values for the fan speed is "level disengaged", however, it is represented as "level disengage" and does not match what thinkfan expects.
2021-12-21virtualisation: implement kubevirt configjbpratt
KubeVirt[1] allows for VMs to be run and managed as pods inside of Kubernetes clusters. Information about the guests can be exposed through qemu-guest-agent[2] as well as startup scripts can be injected through cloud-init[3]. This config has been duplicated and modified from the `cloudstack` config/script. To test this out, deploy KubeVirt locally with KinD[4], build the disk image, then package it into a container image (or upload to CDI[5]) and provision a VirtualMachine. [1]: https://kubevirt.io/user-guide/ [2]: https://kubevirt.io/user-guide/virtual_machines/guest_agent_information/ [3]: https://kubevirt.io/user-guide/virtual_machines/startup_scripts/#cloud-init-examples [4]: https://kubevirt.io/quickstart_kind/ [5]: https://kubevirt.io/user-guide/operations/containerized_data_importer/#containerized-data-importer Signed-off-by: jbpratt <jbpratt78@gmail.com>