summaryrefslogtreecommitdiffstats
path: root/nixos
AgeCommit message (Collapse)Author
2022-10-10Merge pull request #195377 from ngkz/fork/ssh-askpass-waylandBernardo Meurer
2022-10-10Merge pull request #195003 from veehaitch/fix-github-runner-first-startBernardo Meurer
2022-10-11nixos/ssh: pass WAYLAND_DISPLAY to ssh-askpassKazutoshi Noguchi
2022-10-10Merge pull request #195141 from zhaofengli/vbox-headless-wrappersBernardo Meurer
2022-10-10Merge pull request #195324 from zhaofengli/fwupd-config-mergingCabia Rangris
nixos/fwupd: Fix configuration file merging
2022-10-10nixos/fwupd: Fix configuration file mergingZhaofeng Li
2022-10-10Merge pull request #195230 from illustris/sssd-ldapMartin Weinelt
2022-10-10nixos/sssd: fix race condition in testillustris
2022-10-09nixos/seafile: avoid sleep in testsGreizgh
Replace sleep statements with wait_until_succeeds
2022-10-09Merge pull request #187026 from azahi/endlessh-goSandro
2022-10-09Merge pull request #195190 from Ma27/coturn-replace-secretFranz Pletz
nixos/coturn: refactor secret injection
2022-10-09Merge pull request #195057 from LeSuisse/sget-initAnderson Torres
sget: init at unstable-2022-10-04
2022-10-09Merge pull request #194738 from mayflower/pi-tokenjanitorMaximilian Bosch
nixos/privacyidea: add proper support for `privacyidea-token-janitor`
2022-10-09nixos/coturn: refactor secret injectionMaximilian Bosch
The original implementation had a few issues: * The secret was briefly leaked since it is part of the cmdline for `sed(1)` and on Linux `cmdline` is world-readable. * If the secret would contain either a `,` or a `"` it would mess with the `sed(1)` expression itself unless you apply messy escape hacks. To circumvent all of that, I decided to use `replace-secret` which allows you to replace a string inside a file (in this case `#static-auth-secret#`) with the contents of a file, i.e. `cfg.static-auth-secret-file` without any of these issues.
2022-10-09Merge pull request #191198 from Moredread/nixpkgs-paperlessSandro
nixosTests.paperless: check if /metadata/ can be accessed
2022-10-09nixos/gitlab: Configure ActionCabletalyz
ActionCable is used to provide realtime updates in a few places, mainly the issue sidebar.
2022-10-09nixos/gitlab: Set a more appropriate type for extraConfigtalyz
2022-10-09nixos/gitlab: Make sure docker-registry starts after cert generationtalyz
2022-10-09nixos/gitlab: Create registry state pathtalyz
2022-10-09nixos/gitlab: Connect to redis through a unix socket by defaulttalyz
This gives us slightly higher security as you have to be in the gitlab group to connect, and possibly a (very small) performance benefit as well.
2022-10-09nixos/gitlab: Add findutils to runtime dependenciestalyz
Needed for the gitlab:cleanup:orphan_job_artifact_files rake task.
2022-10-09nixos/gitlab: Deduplicate runtime dependency listingtalyz
2022-10-09nixos/gitlab: Add workhorse.config optiontalyz
2022-10-09genJqSecretsReplacementSnippet: Allow dots in attribute names...talyz
...and escape quotation marks and backslashes.
2022-10-08nixos/virtualbox-host: Fix hardening with headless vboxZhaofeng Li
Fixes #157157.
2022-10-08sget: init at unstable-2022-10-04Thomas Gerbet
This binary was provided by the `cosign` package until now but it is in the process of being removed, see https://github.com/sigstore/cosign/pull/2019 Since it might be removed during the 22.11 cycle we drop it preventively. This will make possible security backports easier if we need them.
2022-10-08iwd: remove myself as maintainerJörg Thalheim
2022-10-08Merge pull request #194684 from oxalica/fix/systemd-oomd-testFlorian Klink
nixos/tests/systemd-oomd: fix and follows upstream tests
2022-10-08nixosTests.spark: give worker node 2G of memoryRobert Scott
test currently failing due to OOM
2022-10-08nixos/github-runner: fix bugs related to `InaccessiblePaths=`Vincent Haupert
This commit fixes two bugs: 1) When starting a github-runner for the very first time, the unconfigure script did not copy the `tokenFile` to the state directory. This case just was not handled so far. As a result, the runner could not configure. The unit did, however, fail even before as the state token file is configured as inaccessible for the service through `InaccessiblePaths=`. As the given path did not exist in the described case, setting up the unit's namespacing failed. 2) Similarly, the `tokenFile` is also marked as not accessible to the service user. There are, however, cases where other namespacing options make the files inaccessible even before `InaccessiblePaths=` kicks in; thus, they appear as non existing and cause the namespacing to fail yet again. Prefixing the entry with a `-` causes Systemd to ignore the entry if it cannot find it. This is the behavior we want. I also took fixing those bugs as a chance to refactor the unconfigure script to make it easier to follow.
2022-10-07nixos/udev: allow marking firmware as not compressibleNick Cao
2022-10-07Merge pull request #190052 from JasonWoof/acme-exampleChristian Kögler
nixos/doc: fix acme dns-01 example
2022-10-07Merge pull request #193694 from cab404/fwupd-remote-listAlexander Bantyev
nixos.fwupd: add remote list option
2022-10-06nixos/jfs: correct broken toplevel referenceEdward Tjörnhammar
2022-10-06nixos/acme: Disable lego renew sleepingLucas Savva
Lego has a built-in mechanism for sleeping for a random amount of time before renewing a certificate. In our environment this is not only unnecessary (as our systemd timer takes care of it) but also unwanted since it slows down the execution of the systemd service encompassing it, thus also slowing down the start up of any services its depending on. Also added FixedRandomDelay to the timer for more predictability.
2022-10-06nixos/acme: Make account creds check more robustLucas Savva
Fixes #190493 Check if an actual key file exists. This does not completely cover the work accountHash does to ensure that a new account is registered when account related options are changed.
2022-10-06nixos/acme: Fix cert renewal with built in webserverLucas Savva
Fixes #191794 Lego threw a permission denied error binding to port 80. AmbientCapabilities with CAP_NET_BIND_SERVICE was required. Also added a test for this.
2022-10-06Merge pull request #194271 from andersk/teleport-10Sandro
2022-10-06nixos/firefox-syncserver: remove extra add_headerpennae
syncstorage-rs sets this header starting with 0.12.3.
2022-10-06nixos/firefox-syncserver: proxyPass singleNode to 127.0.0.1pennae
syncstorage-rs does not listen on ::1 unless explicitly configured.
2022-10-06nixos/firefox-syncserver: set default for oauth verifier threadspennae
the 0.12.1 update introduced a static thread pool for verifying oauth tokens. set a reasonable default for self-hosted setups (10 threads).
2022-10-06nixos/privacyidea: fix manual buildMaximilian Bosch
2022-10-06nixos/privacyidea: add proper support for `privacyidea-token-janitor`Maximilian Bosch
`privacyidea-token-janitor`[1] is a tool which helps to automate maintenance of tokens. This is helpful to identify e.g. orphaned tokens, i.e. tokens of users that were removed or tokens that were unused for a longer period of time and apply actions to them (e.g. `disable` or `delete`). This patch adds two new things: * A wrapper for `privacyidea-token-janitor` to make sure it's executable from CLI. To achieve this, it does a `sudo(8)` into the `privacyidea`-user and sets up the environment to make sure the configuration file can be found. With that, administrators can directly invoke it from the CLI without additional steps. * An optional service is added which performs automatic cleanups of orphaned and/or unassigned tokens. Yes, the tool can do way more stuff, but I figured it's reasonable to have an automatic way to clean up tokens of users who were removed from the PI instance. Additional automation steps should probably be implemented in additional services (and are perhaps too custom to add them to this module). [1] https://privacyidea.readthedocs.io/en/v3.7/workflows_and_tools/tools/index.html
2022-10-06Merge pull request #193767 from winterqt/update-dendriteJörg Thalheim
dendrite: 0.9.9 -> 0.10.1
2022-10-06nixos/tests/systemd-oomd: fix and follows upstream testsoxalica
The current test triggers the kernel OOM killer and doesn't work well.
2022-10-06Merge pull request #194603 from phiadaarr/jitsiVideobridgeStanisław Pitucha
jitsi-videobridge: fix link in docs
2022-10-05teleport: 9.1.2 -> 10.3.106kellyjac
Dropped the roletester since it doesn't exist anymore Co-authored-by: Anders Kaseorg <andersk@mit.edu> Signed-off-by: Anders Kaseorg <andersk@mit.edu>
2022-10-05nixos/tmate-ssh-server: init module (#192270)José Luis Lafuente
* nixos/tmate-ssh-server: init module Co-authored-by: Aaron Andersen <aaron@fosslib.net>
2022-10-05jitsi-videobridge: fix link in docsPhilipp Arras
2022-10-05Merge pull request #191491 from oxalica/fix/systemd-initrd-modprobeFlorian Klink
nixos/systemd-stage-1: include modprobe confg in initrd