| Commit message (Collapse) | Author | Age |
| |
|
|
|
| |
Current assert prevents using secretKeyFile entirely
|
|\
| |
| | |
Move certain GNOME3 options to programs
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
|\ \
| |/
|/| |
Couchdb: Don't chown /var/log to couchdb
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
The default for logFile is /var/log/couchdb.log, and the tmpfile rules chown
${dirOf cfg.logFile}, which is just /var/log, to couchdb:couchdb.
This was found by Edes' report on IRC, which looked like
Detected unsafe path transition /var/log → /var/log/journal during canonicalization of /var/log/journal
While this bug has been present since the initial couchdb module in
62438c09f7cc811f994510550614c9265b3b1d18 by @garbas, this wasn't a
problem, because the initial module only created and chowned /var/log
if it didn't exist yet, which can't occur because this gets created in
the initial phases of NixOS startup.
However with the recent move from manual preStart chown scripts to
systemd.tmpfiles.rules in 062efe018d571b1daa9c37b8c99eb39ad47d7342 (#59389),
this chown is suddenly running unconditionally at every system
activation, therefore triggering the above error.
|
|\ \
| | |
| | | |
nixos/dwm-status: add module
|
| | | |
|
|\ \ \
| | | |
| | | | |
prometheus-wireguard-exporter: 3.0.0 -> 3.0.1
|
| | | |
| | | |
| | | |
| | | |
| | | | |
With this switch activated, the exporter also exposes the remote IP of
each active WireGuard peer.
|
|/ / / |
|
|\ \ \
| | | |
| | | | |
Add bluez-qt as an explicit dependency of plasma5
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
When bluetooth is enabled, we install bluedevil, but
its applet cannot work without the qml components in
bluez-qt.
Superseedes #65440 that failed to address the issue.
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
The issue was only with NixOS service, `postgresql` installed through
`nix-env` was not affected.
Fixes https://github.com/NixOS/nixpkgs/issues/23655
|
|\ \ \ \
| |/ / /
|/| | | |
nixos/gdm: add autoSuspend option
|
| | | | |
|
|\ \ \ \
| | | | |
| | | | | |
nixos/unifi: create data directory with correct permissions
|
| | | | | |
|
|\ \ \ \ \
| | | | | |
| | | | | | |
Surf display kiosk session
|
| |/ / / / |
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
Setting GTK_CSD=1 works around the issue
we were having with this [0]
[0]: https://github.com/elementary/files/issues/971
|
|/ / / /
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Causes various issues when not set
* https://github.com/elementary/files/issues/971
* https://github.com/elementary/default-settings/pull/103
* https://github.com/cassidyjames/ideogram/issues/26
However this can cause certain problems in gala
* https://github.com/elementary/gala/issues/244
|
| | | | |
|
|\ \ \ \
| | | | |
| | | | | |
bloop: 1.2.5 -> 1.3.2
|
| | | | | |
|
| | | | | |
|
|\ \ \ \ \
| | | | | |
| | | | | | |
Add zfs replication
|
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
This adds a simple configuration for sending snapshots to a remote
system using zfs-replicate that ties into the autoSnapshot settings
already present in services.zfs.autoSnapshot.
|
|\ \ \ \ \ \ |
|
| | | | | | | |
|
| | | | | | | |
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Only define seperate users and groups when necessary.
|
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | |
| | | | | | | |
Stop using nobody/nogroup by default and use seperate users for each
exporter instead.
|
| |\ \ \ \ \ \
| | |/ / / / /
| |/| | | | | |
prometheus-postgres-exporter: init at 0.5.1
|
| | | | | | | |
|
|\| | | | | | |
|
| |\ \ \ \ \ \
| | | | | | | |
| | | | | | | | |
systemd user services shouldn't run as root and other "non-interactive" users
|
| | | | | | | | |
|
| | | | | | | | |
|
| |\ \ \ \ \ \ \
| | | | | | | | |
| | | | | | | | | |
syncthing: create default group if not overridden
|
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | |
| | | | | | | | | |
The following configuration generates a systemd unit that doesn't
start.
```nix
{
services.syncthing = {
enable = true;
user = "my-user";
};
}
```
It fails with
```
systemd[1]: Started Syncthing service.
systemd[6745]: syncthing.service: Failed to determine group credentials: No such process
systemd[6745]: syncthing.service: Failed at step GROUP spawning /nix/store/n1ydz3i08nqp1ajc50ycy1zribmphqc9-syncthing-1.1.4-bin/bin/syncthing: No such process
systemd[1]: syncthing.service: Main process exited, code=exited, status=216/GROUP
systemd[1]: syncthing.service: Failed with result 'exit-code'.
```
This is due to the fact that `syncthing` group (default) is not
created if the user is overridden.
Add a separate check for setting up the default group, so that
user/group are created independently.
|
| |\ \ \ \ \ \ \ \
| | | | | | | | | |
| | | | | | | | | | |
prometheus-mail-exporter: init at 2019-07-14, add module and test
|
| | | | | | | | | | |
|
| |\ \ \ \ \ \ \ \ \
| | |_|_|_|/ / / / /
| |/| | | | | | | | |
nixos/gitlab: fix config initializer permissions
|
| | | | | | | | | | |
|
|\| | | | | | | | | |
|