summary refs log tree commit diff
path: root/nixos/modules/services/scheduling
Commit message (Collapse)AuthorAge
* nixos/modules: users.(extraUsers|extraGroup->users|group)Florian Klink2018-06-30
|
* nixos/modules/services/scheduling/fcron: add setuid to fcrontabAlex Brandt2018-05-06
| | | | | | | | | | | | | | Without fcrontab being setuid, every attempt by an user in the fcron group to edit their own crontab (via `fcrontab -e`) results in the following error: ``` 2018-05-06 11:29:07 ERROR could not change euid to 273: Operation not permitted 2018-05-06 11:29:07 ERROR fcron child aborted: this does not affect the main fcron daemon, but this may prevent a job from being run or an email from being sent. ``` Adding setuid by hand has resolved this issue and aligns with the way fcrontab is installed on other distributions.
* fcron module: be compatible with non-wrapped sendmail's, like opensmtpd'sLéo Gaspard2017-12-31
|
* nixos/atd: remove "batch" from setuid wrappersBjørn Forsman2017-10-16
| | | | | | | | | "batch" is a shell script so invoking it via setuid wrapper never worked anyway. (The kernel drops perms on executables with shebang.) A previous nixpkgs commit made "batch" invoke the NixOS setuid "at" wrapper to gain needed privileges. Thanks to @yesbox for noticing.
* fcron module: fix use with hardlink-optimized storeLéo Gaspard2017-10-09
|
* nixos/fcron: service needs fcron in PATHJoerg Thalheim2017-10-09
| | | | | otherwise fcronsighup is not found. Set PATH to /run/current-system/sw/bin does not seems to be used by service file anyway.
* cron service: fix reliance on etc.timezoneLinus Heckemann2017-08-30
| | | | | This does not fully address the issue, as cron will not restart when the timezone is changed imperatively as it presumably needs to.
* fcron: install systabJörg Thalheim2017-04-23
| | | | fixes #25072
* fcron: do not chmod at allJörg Thalheim2017-04-13
| | | | fcron does handle permissions on its own correctly
* nixos/treewide: remove boolean examples for optionsFranz Pletz2017-03-17
| | | | | | | They contain no useful information and increase the length of the autogenerated options documentation. See discussion in #18816.
* fcron: 3.1.2 -> 3.2.1Jörg Thalheim2017-03-05
| | | | fixes #23320 #23413
* nixos/cron: unbreak since new security.wrapperBjørn Forsman2017-02-15
|
* nixos/atd: unbreak after new security.wrappersBjørn Forsman2017-02-15
| | | | | * convert list -> attrset * 'atd' doesn't exist, 'at' does
* More derpParnell Springmeyer2017-01-29
|
* Getting rid of the var indirection and using a bin path insteadParnell Springmeyer2017-01-29
|
* Fixing a bunch of issuesParnell Springmeyer2017-01-29
|
* Addressing PR feedbackParnell Springmeyer2017-01-28
|
* setcap-wrapper: Merging with upstream master and resolving conflictsParnell Springmeyer2017-01-25
|\
| * marathon service: remove use of network-interfaces.targetJoachim Fasting2016-09-13
| |
| * chronos service: remove use of network-interfaces.targetJoachim Fasting2016-09-13
| |
* | Adapting everything for the merged permissions wrappers work.Parnell Springmeyer2016-09-01
| |
* | everything?: Updating every package that depended on the old setuidPrograms ↵Parnell Springmeyer2016-09-01
|/ | | | configuration.
* jobs -> systemd.servicesRobin Gloster2016-01-07
|
* services.cron.enable: Remove misleading defaultEelco Dolstra2015-11-19
| | | | | Elsewhere we set it to "mkDefault (allFiles != [])" to the default has no effect.
* build the crontab localy, there is nothing to gain from building it remotelymichael bishop2015-10-03
|
* cron: Actually enable the service if enabledShea Levy2015-07-24
|
* Use environment.etc to manage /etc/crontabEelco Dolstra2015-07-22
| | | | Otherwise, /etc/crontab won't be deleted when cron is disabled.
* Don't enable cron by defaultEelco Dolstra2015-07-22
| | | | | | | | | | The rationale for disabling this is: 1) systemd timers are better; 2) it gets rid of one usually unnecessary process, which makes containers more light-weight. Note that cron is still enabled if services.cron.systemCronJobs is non-empty, so this only matters if you have no declarative cron jobs but do have user cron jobs.
* types.uniq types.bool -> types.boolEelco Dolstra2015-06-15
|
* Make it easy to override the marathon framework userrushmorem2015-05-29
| | | | | | | | | | | | | Currently the module hardcodes the systemd service user to "marathon". With this change one would not need to create an extra systemd config to override the user. So why would one need to override the Marathon user? Some apps require root access to run. You can't run those with Marathon unless you override the default user to root. Marathon also provides a `--mesos_user` command line flag which allows you to run apps using arbitrary users. You need to run the framework as root to enable this functionality.
* Update Marathon modulerushmorem2015-05-21
| | | | | The new module makes it possible to pass extra commandline arguments to Marathon as well as environment variables.
* Merge pull request #6452 from rushmorem/update-chronos-portJaka Hudoklin2015-02-19
|\ | | | | Update chronos default port
| * Update chronos default portrushmorem2015-02-19
| | | | | | | | | | | | | | Update chronos default port to match the one documented on their website (http://airbnb.github.io/chronos). The one in their repo (the current one) clashes with the marathon documented one.
* | Add marathon mesos frameworkrushmorem2015-02-19
|/
* cron: make into systemd.service and make it depend on /etc/localtimeRob Vermaas2014-12-15
| | | | so that changes in timezone will trigger a restart of cron service.
* nixos: add chronos serviceJaka Hudoklin2014-12-03
|
* nixos: Add option services.cron.cronFilesRickard Nilsson2014-10-01
| | | | | | | This allows you to configure extra files that should be appended to your crontab. Implemented by writing to /etc/crontab when the cron service starts. Would be nicer to use a cron that supports /etc/cron.d but that would require us to patch vixie-cron.
* Get all lib functions from lib, not pkgs.lib, in modulesShea Levy2014-07-02
|
* Rewrite ‘with pkgs.lib’ -> ‘with lib’Eelco Dolstra2014-04-14
| | | | | | | | Using pkgs.lib on the spine of module evaluation is problematic because the pkgs argument depends on the result of module evaluation. To prevent an infinite recursion, pkgs and some of the modules are evaluated twice, which is inefficient. Using ‘with lib’ prevents this problem.
* fcron: Fix error when cron.mailto is null.Moritz Ulrich2013-11-04
| | | | Signed-off-by: Moritz Ulrich <moritz@tarn-vedra.de>
* Add lots of missing option typesEelco Dolstra2013-10-30
|
* Turn security.pam.services into an attribute setEelco Dolstra2013-10-15
| | | | | | | | | | | | That is, you can say security.pam.services.sshd = { options... }; instead of security.pam.services = [ { name = "sshd"; options... } ]; making it easier to override PAM settings from other modules.
* Move all of NixOS to nixos/ in preparation of the repository mergeEelco Dolstra2013-10-10