summary refs log tree commit diff
path: root/nixos/modules
Commit message (Collapse)AuthorAge
* s6 experiments sixosAlyssa Ross2019-02-22
|
* nixos/jupyter: wait for network.targetsveitser2018-11-06
|
* Merge pull request #49792 from griff/rspamd-multifile-enableFranz Pletz2018-11-06
|\ | | | | nixos/rspamd: Fix enable for locals and overrides
| * nixos/rspamd: Fix enable for locals and overridesBrian Olsen2018-11-05
| | | | | | | | | | | | | | | | | | | | When implementing #49620 I included an enable option for both the locals and overrides options but the code writing the files didn't actually look at enable and so would write the file regardless of its value. I also set the type to loaOf which should have been attrsOf since the code was not written to handle the options being lists. This fixes both of those issues.
* | nixos: packagekit can no longer use "nix" default back-endPeter Simons2018-11-06
| | | | | | | | | | | | The code in question does not support Nix 2.0 yet. Closes https://github.com/NixOS/nixpkgs/issues/49793.
* | Merge pull request #49354 from aanderse/fstab-escapingJörg Thalheim2018-11-06
|\ \ | | | | | | filesystems: escape spaces in fstab with \040
| * | filesystems: escape spaces in fstab with \040Aaron Andersen2018-10-28
| | |
* | | Merge pull request #49516 from johanot/kubedns-to-corednsSarah Brofeldt2018-11-06
|\ \ \ | |_|/ |/| | nixos/kubernetes: KubeDNS -> CoreDNS
| * | nixos/kubernetes: Replace KubeDNS with CoreDNSJohan Thomsen2018-10-31
| | |
* | | nixos/rngd: do not pass --version flagGabriel Ebner2018-11-05
| | |
* | | Merge pull request #49670 from matthewbauer/pkgs-i686-removeMatthew Bauer2018-11-04
|\ \ \ | | | | | | | | Fix pkgsi686Linux assertion
| * | | treewide: remove pkgs_i686Matthew Bauer2018-11-03
| | | | | | | | | | | | | | | | | | | | | | | | This was getting evaluated eagerly causing assertion failures in aarch64 systems. We can replace usages of pkgs_i686 with pkgs.pkgsi686Linux.
* | | | Merge pull request #44303 from pvgoran/tomcat-clean-basedirMichael Raskin2018-11-04
|\ \ \ \ | | | | | | | | | | nixos/tomcat: add purifyOnStart option
| * | | | nixos/tomcat: add purifyOnStart optionPavel Goran2018-10-29
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | With this option enabled, before creating file/directories/symlinks in baseDir according to configuration, old occurences of them are removed. This prevents remainders of an old configuration (libraries, webapps, you name it) from persisting after activating a new configuration.
* | | | | nixos/prometheus: check configuration before starting serviceAndreas Rammhold2018-11-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | With `promtool` we can check the validity of a configuration before deploying it. This avoids situations where you would end up with a broken monitoring system without noticing it - since the monitoring broke down. :-)
* | | | | nixos/prometheus: add `package` optionAndreas Rammhold2018-11-04
| | | | | | | | | | | | | | | | | | | | | | | | | With a package option we can let the user decide what package to use for prometheus without requiring an overlay.
* | | | | Merge pull request #49746 from NixOS/fix-nixos-bash-completion-commentRobert Hensing2018-11-04
|\ \ \ \ \ | | | | | | | | | | | | nixos: programs.bash: Fix comment about completion
| * | | | | nixos: programs.bash: Fix comment about completionRobert Hensing2018-11-04
| | | | | | | | | | | | | | | | | | | | | | | | `XDG_DATA_DIRS` already includes what is typically the `share` directory. Adding an extra `share` breaks it.
* | | | | | Merge pull request #49283 from aanderse/solrAndreas Rammhold2018-11-04
|\ \ \ \ \ \ | |/ / / / / |/| | | | | solr: 4.10.3 -> 7.5.0, refactor service to reflect major changes in version bump
| * | | | | solr: 4.10.3 -> 7.5.0, refactor service to reflect major changes in version ↵Aaron Andersen2018-11-03
| | | | | | | | | | | | | | | | | | | | | | | | bump, NixOS test included
* | | | | | Merge pull request #49687 from gnidorah/swayMichael Weiss2018-11-04
|\ \ \ \ \ \ | | | | | | | | | | | | | | sway-beta module: add missing pieces
| * | | | | | sway-beta module: add missing piecesgnidorah2018-11-03
| | |_|/ / / | |/| | | |
* | | | | | gitlab module: fix config handlingRobin Gloster2018-11-04
| | | | | |
* | | | | | Merge pull request #49620 from griff/rspamd-multifileJoachim F2018-11-03
|\ \ \ \ \ \ | | | | | | | | | | | | | | nixos/rspamd: Add support for included files
| * | | | | | nixos/rspamd: Add support for included filesBrian Olsen2018-11-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | By default rspamd will look for multiple files in /etc/rspamd/local.d and /etc/rspamd/override.d to be included in subsections of the merged final config for rspamd. Most of the config snippets in the official rspamd documentation are made to these files and so it makes sense for NixOS to support them and this is what this commit does. As part of rspamd 1.8.1 support was added for having custom Lua rules stored in $LOCAL_CONFDIR/rspamd.local.lua which means that it is now possible for NixOS to support such rules and so this commit also adds support for this to the rspamd module.
* | | | | | | consul: 0.9.3 -> 1.3.0.Niklas Hambüchen2018-11-03
| |_|/ / / / |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Removes the old UI build tooling; it is no longer necessary because as of 1.2.0 it's bundled into the server binary. It doesn't even need to have JS built, because it's bundled into the release commit's source tree (see #48714). The UI is enabled by default, so the NixOS service is updated to directly use `ui = webUi;` now. Fixes #48714. Fixes #44192. Fixes #41243. Fixes #35602. Signed-off-by: Niklas Hambüchen <mail@nh2.me>
* | | | | | nixos/google-network-daemon: systemd job type simple instead of oneshot (#49692)Sarah Brofeldt2018-11-03
| | | | | |
* | | | | | Merge pull request #49650 from srghma/srghma-patch-1Florian Klink2018-11-03
|\ \ \ \ \ \ | |_|/ / / / |/| | | | | amazon-image: fix typo in comment
| * | | | | fix typoSergei Khoma2018-06-03
| | | | | | | | | | | | | | | | | | based on https://www.ec2instances.info/
* | | | | | Merge pull request #49658 from mayflower/gitlab-refactorFlorian Klink2018-11-03
|\ \ \ \ \ \ | | | | | | | | | | | | | | gitlab: refactor and fix test
| * | | | | | gitlab: refactor and fix testRobin Gloster2018-11-02
| | | | | | |
* | | | | | | nixos/dockerPreloader: preload docker images (#49379)lewo2018-11-03
|/ / / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This module permits to preload Docker image in a VM in order to reduce OIs on file copies. This module has to be only used in testing environments, when the test requires several Docker images such as in Kubernetes tests. In this case, `virtualisation.dockerPreloader.images` can replace the `services.kubernetes.kubelet.seedDockerImages` options. The idea is to populate the /var/lib/docker directory by mounting qcow files (we uses qcow file to avoid permission issues) that contain images. For each image specified in config.virtualisation.dockerPreloader.images: 1. The image is loaded by Docker in a VM 2. The resulting /var/lib/docker is written to a QCOW file This set of QCOW files can then be used to populate the /var/lib/docker: 1. Each QCOW is mounted in the VM 2. Symlink are created from these mount points to /var/lib/docker 3. A /var/lib/docker/image/overlay2/repositories.json file is generated 4. The docker daemon is started.
* | | | | | nixos/postgresql: add myself as maintainerAustin Seipp2018-11-02
| | | | | | | | | | | | | | | | | | | | | | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | | | | | nixos: fix #48917 by setting SYSTEMD_TIMEDATED_NTP_SERVICESAustin Seipp2018-11-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Setting this variable in the environment of systemd-timedated allows 'timedatectl' to tell if an NTP service is running. Closes #48917. Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | | | | | Merge pull request #47526 from rnhmjoj/syncthingJoachim F2018-11-02
|\ \ \ \ \ \ | | | | | | | | | | | | | | nixos/syncthing: move configuration to condigDir
| * | | | | | nixos/syncthing: move configuration to condigDirrnhmjoj2018-10-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | fixes #47513 following the upstream recommended settings: https://github.com/syncthing/syncthing/issues/3434#issuecomment-235401876
* | | | | | | Merge pull request #49513 from dtzWill/fix/activation-nscd-pathWill Dietz2018-11-02
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | activation-script: add libc to path to provide nscd when needed
| * | | | | | | activation-script: add libc to path to provide nscd when neededWill Dietz2018-10-31
| | |_|_|_|/ / | |/| | | | |
* | | | | | | nixos/zerotier: binds to network-online.target to avoid the 1m30s timeout ↵obadz2018-11-01
| | | | | | | | | | | | | | | | | | | | | | | | | | | | before kill on shutdown
* | | | | | | nixos/kapacitor: new serviceSander van der Burg2018-11-01
| |_|_|/ / / |/| | | | |
* | | | | | home-assistant: use SIGINT instead of SIGTERM to shut down (#49571)Peter Hoeg2018-11-01
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | hass will ignore the standard SIGTERM sent by systemd during stop/restart and we then have to wait for the timeout after which systemd will forcefully kill the process. If instead if we send SIGINT, hass will shut down nicely. There are many issues reported upstream about the inability to shut down/restart and it is *supposed* to work with SIGTERM but doesn't.
* | | | | | Merge pull request #49338 from FeepingCreature/improve-warning-messageRobert Hensing2018-10-31
|\ \ \ \ \ \ | | | | | | | | | | | | | | improve shell.nix warning messages
| * | | | | | improve shell.nix warning messagesFeepingCreature2018-10-28
| | | | | | |
* | | | | | | Merge pull request #49312 from typetetris/release-18.09Joachim F2018-10-31
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | nixos/ddclient: Fix #49258
| * | | | | | | nixos/ddclient: fix #49258Eric Wolf2018-10-30
| | |_|_|_|/ / | |/| | | | |
* | | | | | | Merge pull request #48771 from arianvp/container-tweaksJörg Thalheim2018-10-31
|\ \ \ \ \ \ \ | |_|_|/ / / / |/| | | | | | nixos/containers: Introduce several tweaks to systemd-nspawn from upstream systemd
| * | | | | | nixos/containers: Introduce several tweaks to systemd-nspawn from upstream ↵Arian van Putten2018-10-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | systemd * Lets container@.service be activated by machines.target instead of multi-user.target According to the systemd manpages, all containers that are registered by machinectl, should be inside machines.target for easy stopping and starting container units altogether * make sure container@.service and container.slice instances are actually located in machine.slice https://plus.google.com/112206451048767236518/posts/SYAueyXHeEX See original commit: https://github.com/NixOS/systemd/commit/45d383a3b8 * Enable Cgroup delegation for nixos-containers Delegate=yes should be set for container scopes where a systemd instance inside the container shall manage the hierarchies below its own cgroup and have access to all controllers. This is equivalent to enabling all accounting options on the systemd process inside the system container. This means that systemd inside the container is responsible for managing Cgroup resources for unit files that enable accounting options inside. Without this option, units that make use of cgroup features within system containers might misbehave See original commit: https://github.com/NixOS/systemd/commit/a931ad47a8 from the manpage: Turns on delegation of further resource control partitioning to processes of the unit. Units where this is enabled may create and manage their own private subhierarchy of control groups below the control group of the unit itself. For unprivileged services (i.e. those using the User= setting) the unit's control group will be made accessible to the relevant user. When enabled the service manager will refrain from manipulating control groups or moving processes below the unit's control group, so that a clear concept of ownership is established: the control group tree above the unit's control group (i.e. towards the root control group) is owned and managed by the service manager of the host, while the control group tree below the unit's control group is owned and managed by the unit itself. Takes either a boolean argument or a list of control group controller names. If true, delegation is turned on, and all supported controllers are enabled for the unit, making them available to the unit's processes for management. If false, delegation is turned off entirely (and no additional controllers are enabled). If set to a list of controllers, delegation is turned on, and the specified controllers are enabled for the unit. Note that additional controllers than the ones specified might be made available as well, depending on configuration of the containing slice unit or other units contained in it. Note that assigning the empty string will enable delegation, but reset the list of controllers, all assignments prior to this will have no effect. Defaults to false. Note that controller delegation to less privileged code is only safe on the unified control group hierarchy. Accordingly, access to the specified controllers will not be granted to unprivileged services on the legacy hierarchy, even when requested. The following controller names may be specified: cpu, cpuacct, io, blkio, memory, devices, pids. Not all of these controllers are available on all kernels however, and some are specific to the unified hierarchy while others are specific to the legacy hierarchy. Also note that the kernel might support further controllers, which aren't covered here yet as delegation is either not supported at all for them or not defined cleanly.
* | | | | | | nixos/networking.nix: only setup rpc on glibcTravis Athougies2018-10-30
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | (cherry picked from commit 4177dc3f774523fea7d181601d7c3301fda13790) and (cherry picked from commit a2f0c95baf57fb735dd47b5db73274f7e75df7c9)
* | | | | | | gtk: don't hardcode glibc useWill Dietz2018-10-30
| | | | | | | | | | | | | | | | | | | | | | | | | | | | (cherry picked from commit 6e6f839093ad080c3a61810e9720165faf103e81)
* | | | | | | apparmor-suid: don't force glibcWill Dietz2018-10-30
| | | | | | | | | | | | | | | | | | | | | | | | | | | | (cherry picked from commit 131131e58fc66365854f37f4fe2bf6ca01c8aed6)