summary refs log tree commit diff
path: root/nixos/modules/programs
Commit message (Collapse)AuthorAge
* Merge pull request #7345 from joachifm/conditional-shadow-setuidsPeter Simons2015-04-14
|\ | | | | nixos: condition shadow setuid-wrappers on mutableUsers
| * nixos: condition shadow setuid-wrappers on mutableUsersJoachim Fasting2015-04-14
| | | | | | | | Having junk setuid wrappers in PATH is annoying.
* | nixos: Put root's channels to the end of NIX_PATH.aszlig2015-04-13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | My original reason to put it at the beginning of NIX_PATH was to allow shipping a particular version <nixpkgs> with a channel. But in order to do that, we can still let the channel expression ship with a custom version of nixpkgs by something like <channel/nixpkgs> and the builder of the channel could also rewrite self-references. So the inconvenience is now shifted towards the maintainer of the channel rather than the user (which isn't nice, but better err on the side of the developer rather than on the user), because as @edolstra pointed out: Having the channels of root at the beginning of NIX_PATH could have unintended side-effects if there a channel called nixpkgs. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* | nixos: Add all of root's channels to NIX_PATH.aszlig2015-04-12
|/ | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is very useful if you want to distribute channels (and thus expressions as well) in a similar fashion to Debians APT sources (or PPAs or whatnot). So, for example if you have a channel with some additional functions or packages, you simply add that channel with: sudo nix-channel --add https://example.com/my-nifty-channel foo And you can access that channel using <foo>, for example in your configuration.nix: { imports = [ <foo/modules/shiny-little-module> ]; environment.systemPackages = with import <foo/pkgs> {}; [ bar blah ]; services.udev.extraRules = import <foo/lib/udev/mkrule.nix> { kernel = "eth*"; attr.address = "00:1D:60:B9:6D:4F"; name = "my_fast_network_card"; }; } Within nixpkgs, we shouldn't have <nixos> used anywhere anymore, so we shouldn't get into conflicts. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* sg: add setuid wrapper. (newgrp is a symlink to sg and was already setuid).obadz2015-03-30
| | | | sudo: add ability for wheel users to change group (as well as user)
* Add ibus-qt.Gabriel Ebner2015-03-11
|
* ibus: Enable XIM support.Gabriel Ebner2015-03-11
| | | | This allows firefox to use ibus.
* Add programs.ibus config option to enable ibus and plugins.Gabriel Ebner2015-03-11
|
* ssh: make askPassword an optionThomas Tuegel2015-03-11
| | | | | | By making askPassword an option, desktop environment modules can override the default x11_ssh_askpassword with their own equivalent for better integration. For example, KDE 5 uses plasma5.ksshaskpass instead.
* nixos/uim: capitalize descriptionNikolay Amiantov2015-03-05
|
* ssh-agent: Fix asking for confirmation via $SSH_ASKPASSEelco Dolstra2015-02-25
| | | | | | | This was lost back in ffedee6ed523864dd5f871ffd85e3c2099d579a2. Getting this to work is slightly tricky because ssh-agent runs as a user unit, and so doesn't know the user's $DISPLAY.
* environment: use Qt 5 Qml import pathsThomas Tuegel2015-02-21
|
* Revert "Merge pull request #5626 from matthiasbeyer/add-fish_shell_module"Luca Bruno2015-02-11
| | | | | This reverts commit 157d199b33bee85aeeb256e84abf55523539eaa0, reversing changes made to 4c7adddcb7ae435cdecceeb627dca22ae581ca09.
* Merge pull request #5626 from matthiasbeyer/add-fish_shell_modulelethalman2015-02-11
|\ | | | | Add basic nixos module for fish shell
| * Put shell aliases in interactiveShellInitMatthias Beyer2015-01-08
| |
| * Add basic nixos module for fish shellMatthias Beyer2015-01-08
| |
* | Move cdemu module into programsHerwig Hochleitner2015-02-10
| |
* | environment: set paths for Qt plugins and QMLThomas Tuegel2015-01-26
| |
* | Merge pull request #5726 from spwhitt/zsh-command-not-foundDomen Kožar2015-01-17
|\ \ | | | | | | command-not-found: Add ZSH Support
| * | command-not-found: Add ZSH SupportSpencer Whitt2015-01-12
| |/
* / Revert "zsh: profile-relative functions path"Arseniy Seroka2015-01-10
|/ | | | | | | This reverts commit 766207ca1d52db37df5ca17b9bd3bd21a03dfafd. We need to solve the problem with `environment.profileRelativeEnvVars`. The best workaround is to make profileRelativeEnvVars prepend paths.
* nixos: make zsh use fcntl for locking history files by defaultJan Malakhovski2015-01-07
| | | | | Without this zsh creates and then unlinks .lock files at each interactive input line, which is inhumane with respect to disk.
* zsh: profile-relative functions pathKirill Elagin2015-01-04
| | | | This is needed mostly for autocompletion.
* nixos/virtualbox: Revert disable hardening.aszlig2014-12-18
| | | | | | | | | | | | | | This reverts commit 5d67b17901ff2c9a18647bd9453c6b0d4294b875. The issues have been resolved by ac603e208c98b260db675fa0c13be94fa95216f4. Tested this with hostonlyifs and USB support with extension pack. Conflicts: nixos/modules/programs/virtualbox-host.nix Signed-off-by: aszlig <aszlig@redmoonstudios.org> Tested-by: Mateusz Kowalczyk <fuuzetsu@fuuzetsu.co.uk>
* ssh-agent: Don't have a timeout by defaultEelco Dolstra2014-12-18
| | | | | | | | IMHO, having a short timeout (1h) defeats the point of using ssh-agent, which is not to have to retype passphrases all the time. Of course, users who want timeouts can set programs.ssh.agentTimeout. This restores the 14.04 behaviour.
* virtualbox: Fix runtime paths in hardening mode.aszlig2014-12-18
| | | | | | | | | | | | | | | | Because we have to rely on setuid wrappers on NixOS, we can't easily hardcode the executable paths and set it 4755. So for all calls, we need to change the runtime path executable directory to /var/setuid-wrappers/ and for verification we need to retain the executable directory. Also note, that usually VBoxNetAdpCtl, VBoxNetDHCP, VBoxNetNAT, VBoxSDL and VBoxVolInfo don't reside in directories that are commonly in PATH, but in /usr/lib/virtualbox in most mainstream distros. But because the names of these executables are distinctive enough to not cause collisions with other setuid programs, I'll leave it like that and not patch up setuid-wrappers. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* Revert "enable bash autocomplete by default"Eelco Dolstra2014-12-18
| | | | | This reverts commit ee8e15fe76a235ae3583d4e8cb4bb370f28c5eae. See discussion at https://github.com/NixOS/nixpkgs/commit/ee8e15fe76a235ae3583d4e8cb4bb370f28c5eae.
* nixos/virtualbox: Fix warning on enableHardening.aszlig2014-12-16
| | | | | | | | The warning was displayed whenever services.virtualboxHost.enable was true, but if people were to enable hardening, they'd still get that annoying message. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* nixos/virtualbox/hostonlyif: Fix writing to /root.aszlig2014-12-15
| | | | | | | | Creates unnecessary cruft in the root users home directory, which we really don't need. Except the log, but therefore we now cat the log to stderr and the private temporary directory is cleaned up afterwards. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* nixos/virtualbox: Disable hardening for now.aszlig2014-12-15
| | | | | | | | This should display a big fat warning that people can hardly miss until we have fixed the issues with the host-only-interfaces that persist when hardining is enabled. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* nixos/virtualbox: Note about "vboxusers" group.aszlig2014-12-15
| | | | Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* nixos/virtualbox: Allow to disable hardening.aszlig2014-12-15
| | | | | | | | | Hardening mode in VirtualBox is quite restrictive and on some systems it could make sense to disable hardening mode, especially while we still have issues with hostonly networking and other issues[TM] we don't know or haven't tested yet. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* nixos/virtualbox: Fix setuid wrappers.aszlig2014-12-13
| | | | | | | | | | We only need to have setuid-root wrappers for VBox{Headless,SDL} and VirtualBox, otherwise VBoxManage will run as root and NOT drop privileges! Fixes #5283. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* virtualbox: Unbreak the nixos module.ambrop7@gmail.com2014-12-12
|
* virtualbox: Allow disabling the network interface.ambrop7@gmail.com2014-12-11
| | | | | | The current nixos module for VirtualBox unconditionally configures a vboxnet0 network interface at boot. This may be undesired, especially when the user wants to manage network interfaces in a centralized manner.
* enable bash autocomplete by defaultDomen Kožar2014-12-08
|
* virtualbox: Enable hardening by default.aszlig2014-11-29
| | | | | | | | | | | | | | | | | | | | | | | | | | VirtualBox with hardening support requires the main binaries to be setuid root. Using VBOX_WITH_RUNPATH, we ensure that the RPATHs are pointing to the libexec directory and we also need to unset VBOX_WITH_ORIGIN to make sure that the build system is actually setting those RPATHs. The hardened.patch implements two things: * Set the binary directory to the setuid-wrappers dir so that VboxSVC calls them instead of the binaries from the store path. The reason behind this is because nothing in the Nix store can have the setuid flag. * Excempt /nix/store from the group permission check, because while it is group-writeable indeed it also has the sticky bit set (and also the whole store is mounted read-only on most NixOS systems), so we're checking on that as well. Right now, the hardened.patch uses /nix/store and /var/setuid-wrappers directly, so someone would ever want to change those on a NixOS system, please provide a patch to set those paths on build time. However, for simplicity, it's best to do it when we _really_ need it. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* nixos: Add enable option for programs/virtualbox.aszlig2014-11-27
| | | | | | | | | We will simply rename the previous module and add a warning whenever the module is included directly, pointing the user to the right option and also enable it as well (in case somebody has missed the option and is wondering why VirtualBox doesn't work anymore). Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* Don't set $MANPATHEelco Dolstra2014-11-27
| | | | | The default is derived automatically from $PATH, so it's in fact better *not* to set it.
* ssh-agent: use types.nullOrAristid Breitkreuz2014-11-15
|
* ssh-agent: make key timeout optionalAristid Breitkreuz2014-11-15
|
* limit the amount of time ssh-agent keeps a key (default: 1h)Aristid Breitkreuz2014-11-15
|
* Add "light" package and setuid wrapperBrian McKenna2014-11-09
|
* ssmtp: add 'root' optionNikolay Amiantov2014-11-05
|
* ssmtp: add types to optionsNikolay Amiantov2014-11-05
|
* alsa: Add multilib plugin support via "libs" entry in asound config.Nathaniel Baxter2014-10-04
| | | | alsa: Remove unused $ALSA_PLUGIN_DIRS support.
* More pkgs.lib -> lib fixesShea Levy2014-09-29
|
* nixos/ssh: Allow user to configure the package that provides ssh/sshdWilliam A. Kennington III2014-09-11
|
* Replace environment.profileVariables by environment.profileRelativeEnvVarsNicolas Pierron2014-09-07
|
* virtualbox: vboxusers may use /dev/vboxnetctlMichael Fellinger2014-09-04
|