summary refs log tree commit diff
path: root/nixos/modules/services
Commit message (Collapse)AuthorAge
* sysprof: 1.2.0 -> 3.28.1Andreas Rammhold2018-05-16
|
* Merge pull request #39615 from jtojnar/gdm-waylandJan Tojnar2018-05-16
|\ | | | | GDM wayland improvements
| * gnome3.gdm: allow choosing user account without GNOMEJan Tojnar2018-05-16
| | | | | | | | | | Account chooser depends on AccountsService, which is normally enabled by GNOME module but it was missing when using GDM without GNOME.
* | Add stubby resolver daemon service module (#38667)baroncharlus2018-05-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * networking/stubby.nix: implementing systemd service module for stubby This change implements stubby, the DNS-over-TLS stub resolver daemon. The motivation for this change was the desire to use stubby's DNS-over-TLS funcitonality in tandem with unbound, which requires passing certain configuration parameters. This module implements those config parameters by exposing them for use in configuration.nix. * networking/stubby.nix: merging back module list re-merging the module list to remove unecessary changes. * networking/stubby.nix: removing unecessary capabilities flag This change removes the unecessary flag for toggling the capabilities which allows the daemon to bind to low ports. * networking/stubby.nix: adding debug level logging bool Adding the option to turn on debug logging. * networking/stubby.nix: clarifying idleTimeout and adding systemd target Improving docs to note that idleTimeout is expressed in ms. Adding the nss-lookup `before' target to the systemd service definition. * networking/stubby.nix: Restrict options with types.enum This change restricts fallbackProtocol and authenticationMode to accept only valid options instead of any list or str types (respectively). This change also fixes typo in the CapabilityBoundingSet systemd setting. * networking/stubby.nix: cleaning up documentation Cleaning up docs, adding literal tags to settings, and removing whitespace. * networking/stubby.nix: fixing missing linebreak in comments * networking/stubby.nix: cleaning errant comments
* | Merge pull request #33371 from jtojnar/flatpakJan Tojnar2018-05-15
|\ \ | | | | | | Flatpak
| * | nixos/flatpak: add docsJan Tojnar2018-05-15
| | |
| * | nixos/flatpak: allow specifying extra portalsJan Tojnar2018-05-15
| | |
| * | nixos/flatpak: initJan Tojnar2018-05-15
| |/
* | nexus: fix setup and nixos test (#40522)Maximilian Bosch2018-05-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The original `nexus` derivation required `/run/sonatype-work/nexus3` which explicitly depended on the NixOS path structure. This would break `nexus` for everyone using `nixpkgs` on a non-NixOS system, additionally the module never created `/run/sonatype-work`, so the systemd unit created in `services.nexus` fails as well. The issue wasn't actively known as the `nixos/nexus` test wasn't registered in Hydra (see #40257). This patch contains the following changes: * Adds `tests.nexus` to `release.nix` to run the test on Hydra. * Makes JVM parameters configurable: by default all JVM options were located in `result/bin/nexus.vmoptions` which made it quite hard to patch these parameters. Now it's possible to override all parameters by running `VM_OPTS_FILE=custom-nexus.vmoptions ./result/bin/nexus run` (after patching the `nexus` shell script), additionally it's possible to override these parameters with `services.nexus.vmoptions`. * Bumped Nexus from 3.5.1 to 3.11.0 * Run the `nexus` test on Hydra with `callTest` in `nixos/release.nix`, furthermore the test checks if the UI is available on the specified port. * Added myself as maintainer for the NixOS test and the package to have some more people in case of further breakage. * Added sufficient disk space to the `nexus` test, otherwise the service fails with the following errors: ``` com.orientechnologies.orient.core.exception.ODatabaseException: Cannot create database 'accesslog' com.orientechnologies.orient.core.exception.OLowDiskSpaceException: Error occurred while executing a write operation to database 'accesslog' due to limited free space on the disk (242 MB). The database is now working in read-only mode. Please close the database (or stop OrientDB), make room on your hard drive and then reopen the database. The minimal required space is 256 MB. Required space is now set to 256MB (you can change it by setting parameter storage.diskCache.diskFreeSpaceLimit) . ``` /cc @ironpinguin @xeji
* | nixos: stumpwm: switch from package marked as broken to working quicklisp ↵Arcadio Rubio García2018-05-14
| | | | | | | | package (#40501)
* | Merge pull request #40373 from xeji/fix-mesos-testxeji2018-05-13
|\ \ | | | | | | nixos/mesos: fix non-deterministic service and test failure
| * | nixos/mesos-slave: start after dockerUli Baum2018-05-11
| | | | | | | | | | | | | | | | | | If docker is enabled, start mesos-slave.service after docker.service to avoid a race condition that could result in mesos-slave to fail with "Failed to create docker: Timed out getting docker version"
* | | Merge pull request #40416 from oxij/os/fix-some-typesxeji2018-05-13
|\ \ \ | | | | | | | | nixos: fix some types
| * | | nixos: services.xserver.desktopManager.xterm.enable: fix typeJan Malakhovski2018-05-13
| |/ /
* / / nixos: rename system.{stateVersion,defaultChannel} -> system.nixos.\1Jan Malakhovski2018-05-12
|/ /
* | Merge pull request #39681 from pstn/gnunet-serviceRobert Schütz2018-05-11
|\ \ | | | | | | nixos/gnunet: create switch for package.
| * | nixos/gnunet: create switch for package.Philipp Steinpass2018-05-11
| | |
* | | hostapd: remove assertion (allow 5GHz channels)Yegor Timoshenko2018-05-11
|/ /
* | nixos/dovecot: Fix usage of dhparams optionaszlig2018-05-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The pull request that added dhparams (#39507) was made at the time where the dhparams module overhaul (#39526) wasn't done yet, so it's still using the old mechanics of the module. As stated in the release notes: Module implementers should not set a specific bit size in order to let users configure it by themselves if they want to have a different bit size than the default (2048). An example usage of this would be: { config, ... }: { security.dhparams.params.myservice = {}; environment.etc."myservice.conf".text = '' dhparams = ${config.security.dhparams.params.myservice.path} ''; } Signed-off-by: aszlig <aszlig@nix.build> Cc: @qknight, @abbradar, @hrdinka, @leenaars
* | Merge pull request #39671 from johanot/keepalived-vrrpInstanceTrackingSarah Brofeldt2018-05-09
|\ \ | |/ |/| nixos/keepalived: Implemented vrrp-instance track scripts and track interfaces
| * nixos/keepalived: Implemented vrrp-instance tracking scripts and interfaces.Johan Thomsen2018-05-08
| | | | | | | | | | Tracking scripts in particular, cannot be included in extraOpts, because script declaration has to be above script usage in keepalived.conf. Changes are fully backward compatible.
* | nginx module: add upstream extraConfigNikolay Amiantov2018-05-08
| |
* | dovecot2: added ssl_dh using security.dhparamsJoachim Schiele2018-05-08
| | | | | | | | | | The 18.03 channel includes dovecot 2.3, which requires ssl_dh to be set. -> fixes https://github.com/nixcloud/nixcloud-webservices/issues/21
* | NetworkManager: add noDns optionjD91mZM22018-05-08
|/
* nixos/nsd: Allow to configure root zoneaszlig2018-05-07
| | | | | | | | | | | | | | | | | | | | | | | When trying to run NSD to serve the root zone, one gets the following error message: error: illegal name: '.' This is because the name of the zone is used as the derivation name for building the zone file. However, Nix doesn't allow derivation names starting with a period. So whenever the zone is "." now, the file name generated is "root" instead of ".". I also added an assertion that makes sure the user sets services.nsd.rootServer, otherwise NSD will fail at runtime because it prevents serving the root zone without an explicit compile-time option. Tested this by adding a root zone to the "nsd" NixOS VM test. Signed-off-by: aszlig <aszlig@nix.build> Cc: @hrdinka, @qknight
* Merge pull request #39455 from Ekleog/matterbridge-configfileJoachim F2018-05-06
|\ | | | | matterbridge module: add configPath option as a workaround, waiting for nix encryption
| * matterbridge module: add configPath option as a workaround, waiting for nix ↵Léo Gaspard2018-04-25
| | | | | | | | encryption
* | nixos/matrix-synapse service: url_preview_url_blacklist fix (#40027)Tristan Helmich2018-05-06
| | | | | | | | Moved list of ip ranges to url_preview_ip_range_blacklist defaults. Fixes #40017
* | Merge pull request #38622 from obadz/minidlna-modulexeji2018-05-06
|\ \ | | | | | | nixos/minidlna: add loglevel config
| * | minidlna nixos module: add loglevel configobadz2018-04-09
| | |
* | | Merge pull request #39055 from abbradar/reload-stopxeji2018-05-05
|\ \ \ | | | | | | | | firewall service: run stop commands in reload
| * | | firewall service: run stop commands in reloadNikolay Amiantov2018-04-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Do cleanup of user-created additional rules. Of course it'd be much better to just use iptables-{save,restore} for declarative management, but as it's still not there...
* | | | Merge pull request #39991 from xeji/remove-fleetJaka Hudoklin2018-05-05
|\ \ \ \ | | | | | | | | | | fleet, panamax: remove
| * | | | fleet: remove package, module, testUli Baum2018-05-05
| | | | | | | | | | | | | | | | | | | | deprecated and unmaintained upstream
| * | | | panamax: remove packages, module and testUli Baum2018-05-05
| | | | | | | | | | | | | | | | | | | | | | | | | was broken and depends on (deprecated) fleet packages: panamax_api, panamax_ui
* | | | | ndppd module: init (#35533)gnidorah2018-05-05
| | | | |
* | | | | sshguard: service creates /var/lib/sshguardbricewge2018-05-05
| | | | |
* | | | | restic-rest-server module: initPascal Bach2018-05-04
|/ / / /
* | | | prometheus-nginx-exporter: fix bool to string coercionWilliButz2018-05-02
| | | |
* | | | Merge branch 'master' into docker-registry-enhancementsRobin Gloster2018-05-02
|\ \ \ \
| * | | | nixos/prometheus-surfboard-exporter: add new moduleSamuel Leathers2018-05-02
| | | | |
| * | | | foundationdb: split into multiple, major-versioned packages to make upgrades ↵Austin Seipp2018-05-01
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | user-controllable Signed-off-by: Austin Seipp <aseipp@pobox.com>
| * | | | nixos: add TLS support to FoundationDB module, and tweak setup a bitAustin Seipp2018-05-01
| | | | | | | | | | | | | | | | | | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
| * | | | foundationdb: install the java client libraryAustin Seipp2018-05-01
| | | | | | | | | | | | | | | | | | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
| * | | | nixos/prometheus-varnish-exporter: update moduleWilliButz2018-05-01
| | | | |
| * | | | Merge pull request #39478 from pngwjpgh/infinotedMatthew Justin Bauer2018-05-01
| |\ \ \ \ | | | | | | | | | | | | nixos/infinoted: Abstract over libinfinity version
| | * | | | nixos/infinoted: Abstract over libinfinity versionGregor Kleen2018-04-26
| | | | | |
| * | | | | nixos/monetdb: init (#39812)Michael Weiss2018-05-01
| | | | | |
| * | | | | nixos/promtheus-nginx-exporter: update moduleWilliButz2018-05-01
| | | | | |
| * | | | | Merge pull request #38351 from grahamc/user-channelsGraham Christensen2018-05-01
| |\ \ \ \ \ | | | | | | | | | | | | | | Add user channels to the default nix path