| Commit message (Collapse) | Author | Age |
|\
| |
| | |
Init privacyIDEA packages and modules
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
`doas` is a lighter alternative to `sudo` that "provide[s] 95% of the
features of `sudo` with a fraction of the codebase" [1]. I prefer it to
`sudo`, so I figured I would add a NixOS module in order for it to be
easier to use. The module is based off of the existing `sudo` module.
[1] https://github.com/Duncaen/OpenDoas
|
| |
| |
| |
| |
| |
| |
| | |
And allow the runtime to be configurable via the
`virtualisation.oci-containers.backend` option.
Valid choices are "podman" and "docker".
|
| |
| |
| |
| | |
prey-bash-client is deprecated since 2018
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
module
What's happening now is that both cri-o and podman are creating
/etc/containers/policy.json.
By splitting out the creation of configuration files we can make the
podman module leaner & compose better with other container software.
|
| |
| |
| |
| | |
In anticipation of the new containers module.
|
|/ |
|
|\
| |
| | |
Tuptime: Init Package, Module and Test
|
| | |
|
|/
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* nixos/k3s: simplify config expression
* nixos/k3s: add config assertions and trim unneeded bits
* nixos/k3s: add a test that k3s works; minor module improvements
This is a single-node test. Eventually we should also have a multi-node
test to verify the agent bit works, but that one's more involved.
* nixos/k3s: add option description
* nixos/k3s: add defaults for token/serveraddr
Now that the assertion enforces their presence, we dont' need to use the typesystem for it.
* nixos/k3s: remove unneeded sudo in test
* nixos/k3s: add to test list
|
|
|
|
| |
Co-authored-by: raunovv <rauno@oyenetwork.com>
Co-authored-by: Jörg Thalheim <joerg@thalheim.io>
|
| |
|
|\
| |
| | |
nixos/none: remove
|
| |
| |
| |
| |
| |
| | |
This windowManager and desktopManager doesn't even have
an option to use it. git history suggests to me that there's no way anyone
finds this useful anymore.
|
|\ \
| | |
| | | |
nixos/mullvad-vpn: add service
|
| | |
| | |
| | |
| | | |
mullvad-vpn package is mostly useless without it.
|
|\ \ \
| |_|/
|/| | |
nixos/magic-wormhole-mailbox-server: moving from mail to networking
|
| | | |
|
| | |
| | |
| | |
| | | |
It looks like I forgot to actually delete this file.
|
|\ \ \
| |/ /
|/| | |
xow: init at 0.4
|
| | | |
|
|/ / |
|
|\ \
| | |
| | | |
nixos/quorum: init
|
| | | |
|
|\ \ \
| | | |
| | | | |
nixos gerrit module
|
| |/ /
| | |
| | |
| | |
| | | |
Co-authored-by: edef <edef@edef.eu>
Co-authored-by: Florian Klink <flokli@flokli.de>
|
| | | |
|
|/ /
| |
| |
| |
| |
| |
| |
| | |
Running the manual on a TTY is useless in the graphical ISOs and not
particularly useful in non-graphical ISOs (since you can also run
'nixos-help').
Fixes #83157.
|
|\ \
| | |
| | | |
wooting: init wootility, wooting-udev-rules and module
|
| | |
| | |
| | |
| | | |
Signed-off-by: David Wood <david.wood@codeplay.com>
|
| | |
| | |
| | |
| | | |
Signed-off-by: Martin Baillie <martin@baillie.email>
|
|\ \ \
| | | |
| | | | |
nixos/tpm2: init
|
| | | |
| | | |
| | | |
| | | |
| | | | |
This commit adds udev rules, the userspace resource manager and
PKCS#11 module support.
|
|\ \ \ \
| | | | |
| | | | | |
smartdns: init at 30
|
| | | | | |
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
The v7 series is very different.
This commit introduces the 3 packages: fahclient, fahcontrol and
fahviewer. It also rebuilds the NixOS module to map better with the new
client.
|
|\ \ \ \ \
| | | | | |
| | | | | | |
ankisyncd, nixos/ankisyncd: init at 2.1.0
|
| | | | | | |
|
|/ / / / / |
|
|\ \ \ \ \
| | | | | |
| | | | | | |
nixos/cage: init
|
| |/ / / /
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Add a cage module to nixos. This can be used to make kiosk-style
systems that boot directly to a single application. The user (demo by
default) is automatically logged in by this service and the
program (xterm by default) is automatically started.
This is useful for some embedded, single-user systems where we want
automatic booting. To keep the system secure, the user should have
limited privileges.
Based on the service provided in the Cage wiki here:
https://github.com/Hjdskes/cage/wiki/Starting-Cage-on-boot-with-systemd
Co-Authored-By: Florian Klink <flokli@flokli.de>
|
|\ \ \ \ \
| |/ / / /
|/| | | | |
Add nix-store-gcs-proxy service
|
| | | | | |
|
| | | | | |
|
|\ \ \ \ \
| |_|/ / /
|/| | | | |
Theming options for Gtk and Qt
|
| | | | | |
|
| | | | | |
|
| | | | |
| | | | |
| | | | |
| | | | | |
Signed-off-by: David Wood <david.wood@codeplay.com>
|
|\ \ \ \ \
| |_|/ / /
|/| | | | |
brightnessctl: Add systemd support
|