summary refs log tree commit diff
path: root/nixos/modules
Commit message (Collapse)AuthorAge
* Merge pull request #49513 from dtzWill/fix/activation-nscd-pathWill Dietz2018-11-02
|\ | | | | activation-script: add libc to path to provide nscd when needed
| * activation-script: add libc to path to provide nscd when neededWill Dietz2018-10-31
| |
* | nixos/zerotier: binds to network-online.target to avoid the 1m30s timeout ↵obadz2018-11-01
| | | | | | | | before kill on shutdown
* | nixos/kapacitor: new serviceSander van der Burg2018-11-01
| |
* | home-assistant: use SIGINT instead of SIGTERM to shut down (#49571)Peter Hoeg2018-11-01
| | | | | | | | | | | | | | | | | | | | hass will ignore the standard SIGTERM sent by systemd during stop/restart and we then have to wait for the timeout after which systemd will forcefully kill the process. If instead if we send SIGINT, hass will shut down nicely. There are many issues reported upstream about the inability to shut down/restart and it is *supposed* to work with SIGTERM but doesn't.
* | Merge pull request #49338 from FeepingCreature/improve-warning-messageRobert Hensing2018-10-31
|\ \ | | | | | | improve shell.nix warning messages
| * | improve shell.nix warning messagesFeepingCreature2018-10-28
| | |
* | | Merge pull request #49312 from typetetris/release-18.09Joachim F2018-10-31
|\ \ \ | | | | | | | | nixos/ddclient: Fix #49258
| * | | nixos/ddclient: fix #49258Eric Wolf2018-10-30
| | | |
* | | | Merge pull request #48771 from arianvp/container-tweaksJörg Thalheim2018-10-31
|\ \ \ \ | |_|_|/ |/| | | nixos/containers: Introduce several tweaks to systemd-nspawn from upstream systemd
| * | | nixos/containers: Introduce several tweaks to systemd-nspawn from upstream ↵Arian van Putten2018-10-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | systemd * Lets container@.service be activated by machines.target instead of multi-user.target According to the systemd manpages, all containers that are registered by machinectl, should be inside machines.target for easy stopping and starting container units altogether * make sure container@.service and container.slice instances are actually located in machine.slice https://plus.google.com/112206451048767236518/posts/SYAueyXHeEX See original commit: https://github.com/NixOS/systemd/commit/45d383a3b8 * Enable Cgroup delegation for nixos-containers Delegate=yes should be set for container scopes where a systemd instance inside the container shall manage the hierarchies below its own cgroup and have access to all controllers. This is equivalent to enabling all accounting options on the systemd process inside the system container. This means that systemd inside the container is responsible for managing Cgroup resources for unit files that enable accounting options inside. Without this option, units that make use of cgroup features within system containers might misbehave See original commit: https://github.com/NixOS/systemd/commit/a931ad47a8 from the manpage: Turns on delegation of further resource control partitioning to processes of the unit. Units where this is enabled may create and manage their own private subhierarchy of control groups below the control group of the unit itself. For unprivileged services (i.e. those using the User= setting) the unit's control group will be made accessible to the relevant user. When enabled the service manager will refrain from manipulating control groups or moving processes below the unit's control group, so that a clear concept of ownership is established: the control group tree above the unit's control group (i.e. towards the root control group) is owned and managed by the service manager of the host, while the control group tree below the unit's control group is owned and managed by the unit itself. Takes either a boolean argument or a list of control group controller names. If true, delegation is turned on, and all supported controllers are enabled for the unit, making them available to the unit's processes for management. If false, delegation is turned off entirely (and no additional controllers are enabled). If set to a list of controllers, delegation is turned on, and the specified controllers are enabled for the unit. Note that additional controllers than the ones specified might be made available as well, depending on configuration of the containing slice unit or other units contained in it. Note that assigning the empty string will enable delegation, but reset the list of controllers, all assignments prior to this will have no effect. Defaults to false. Note that controller delegation to less privileged code is only safe on the unified control group hierarchy. Accordingly, access to the specified controllers will not be granted to unprivileged services on the legacy hierarchy, even when requested. The following controller names may be specified: cpu, cpuacct, io, blkio, memory, devices, pids. Not all of these controllers are available on all kernels however, and some are specific to the unified hierarchy while others are specific to the legacy hierarchy. Also note that the kernel might support further controllers, which aren't covered here yet as delegation is either not supported at all for them or not defined cleanly.
* | | | nixos/networking.nix: only setup rpc on glibcTravis Athougies2018-10-30
| | | | | | | | | | | | | | | | | | | | | | | | (cherry picked from commit 4177dc3f774523fea7d181601d7c3301fda13790) and (cherry picked from commit a2f0c95baf57fb735dd47b5db73274f7e75df7c9)
* | | | gtk: don't hardcode glibc useWill Dietz2018-10-30
| | | | | | | | | | | | | | | | (cherry picked from commit 6e6f839093ad080c3a61810e9720165faf103e81)
* | | | apparmor-suid: don't force glibcWill Dietz2018-10-30
| | | | | | | | | | | | | | | | (cherry picked from commit 131131e58fc66365854f37f4fe2bf6ca01c8aed6)
* | | | nixos: use pkgs.getent and stdenv.cc.libcWill Dietz2018-10-30
| | | | | | | | | | | | | | | | (cherry picked from commit 52eba9753aeba4f02c8ce0de50f10bd98de1ef1e)
* | | | stage1 boot: use stdenv.cc.libcWill Dietz2018-10-30
| | | | | | | | | | | | | | | | (cherry picked from commit d3ae884c9eeb4a6f66ac4e57764c04db16ea7c71)
* | | | Merge pull request #49348 from markuskowa/mod-slurm-upgradexeji2018-10-31
|\ \ \ \ | | | | | | | | | | nixos/slurm: add slurmdbd, run daemons as user
| * | | | nixos/slurm: add maintainer to module and testMarkus Kowalewski2018-10-30
| | | | |
| * | | | nixos/slurm: node/partitionName option -> listMarkus Kowalewski2018-10-30
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Make the node and partitionname options lists. There can be more than paratition or set of nodes. Add changes to release notes
| * | | | nixos/slurm: fix obselete string typeMarkus Kowalewski2018-10-30
| | | | |
| * | | | nixos/slurm: add slurmdbd to moduleMarkus Kowalewski2018-10-30
| | | | | | | | | | | | | | | | | | | | | | | | | * New options "services.slurm.dbdserver.[enable,config]" * Add slurmdbd to test slurm.nix
| * | | | nixos/slurm: run ctld as user and fix spool dirMarkus Kowalewski2018-10-30
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * run as user 'slurm' per default instead of root * add user/group slurm to ids.nix * fix default location for the state dir of slurmctld: (/var/spool -> /var/spool/slurmctld) * Update release notes with the above changes
* | | | | nixos/libvirtd: utilize onShutdown option (#49480)Lizard2018-10-31
| | | | | | | | | | | | | | | | | | | | | | | | | `services.virtualisation.libvirtd.onShutdown` was previously unused. While suspending a domain on host shutdown is the default, this commit makes it so domains can be shut down, also.
* | | | | redsocks module: add self as maintainerLéo Gaspard2018-10-31
| | | | |
* | | | | dkimproxy-out module: add self as maintainerLéo Gaspard2018-10-31
| | | | |
* | | | | clamsmtp module: add self as maintainerLéo Gaspard2018-10-31
| | | | |
* | | | | dhparams module: add self as maintainerLéo Gaspard2018-10-31
|/ / / /
* | | | Merge pull request #48499 from aneeshusa/restart-salt-on-config-changesJörg Thalheim2018-10-30
|\ \ \ \ | | | | | | | | | | nixos/salt: restart on config changes
| * | | | salt: Restart on config changesAneesh Agrawal2018-10-15
| | | | |
| * | | | nixos/salt-minion: Fix salt-call without `-c`Aneesh Agrawal2018-10-15
| | | | |
| * | | | nixos/salt-minion: Remove trailing whitespaceAneesh Agrawal2018-10-15
| | | | |
* | | | | Merge pull request #49395 from dtzWill/update/upower-0.99.9xeji2018-10-30
|\ \ \ \ \ | | | | | | | | | | | | upower: 0.99.7 -> 0.99.9, lock down service
| * | | | | nixos/upower: lockdown service using upstream settingsWill Dietz2018-10-29
| | |_|/ / | |/| | |
* | | | | Merge pull request #48664 from alyssais/postgres11Lancelot SIX2018-10-30
|\ \ \ \ \ | | | | | | | | | | | | postgresql_11: init at 11.0
| * | | | | postgresql*: use underscores in version numbersAlyssa Ross2018-10-30
| |/ / / /
* | | | | nixos/bitlbee: use purple-2 as purple_plugin_path (#49440)Lassulus2018-10-30
| | | | |
* | | | | Merge pull request #49326 from c0bw3b/nixos/installation-deviceEelco Dolstra2018-10-30
|\ \ \ \ \ | |/ / / / |/| | | | nixos/installation-device: set GC initial heap size to 1MB
| * | | | installation-device: set GC initial heap size to 1MBRenaud2018-10-28
| | | | | | | | | | | | | | | | | | | | 100000 (100kB) is too aggressive (too low) and gets ignored by the GC See issue #43339
* | | | | Merge pull request #48801 from matthewbauer/cloneConfigExtraMatthew Bauer2018-10-28
|\ \ \ \ \ | | | | | | | | | | | | ova: add cloneConfigExtra option
| * | | | | ova: add cloneConfigExtra optionMatthew Bauer2018-10-21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Customize virtualbox ovas to contain a clone config option giving some useful hints. Fixes #38429
* | | | | | Merge pull request #48875 from Izorkin/nginx-prestartJörg Thalheim2018-10-28
|\ \ \ \ \ \ | | | | | | | | | | | | | | nginx: add custom options
| * | | | | | nginx: add custom optionsIzorkin2018-10-23
| | | | | | |
* | | | | | | Merge pull request #49317 from c0bw3b/nixos/demovmSilvan Mosberger2018-10-28
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | nixos/virtualbox-image: increase disk to 50G
| * | | | | | | nixos/virtualbox-image: increase disk to 50GRenaud2018-10-28
| | |_|/ / / / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 100GB breaks cptofs but 50GB is fine and benchmarks shows it takes the same time as building the demo VBox VM with a 10GB disk + enabled VM sound output by default + set USB controller in USB2.0 mode + add manifest file in the OVA as it allows integrity checking on imports
* | | | | | | Merge pull request #49360 from tadfisher/logind-suspend-then-hibernateSilvan Mosberger2018-10-28
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | nixos/systemd: support "suspend-then-hibernate" logind option
| * | | | | | | nixos/systemd: support "suspend-then-hibernate" logind optionTad Fisher2018-10-28
| | | | | | | |
* | | | | | | | nixos/rngd: fix exec flags and udev rulesRenaud2018-10-28
| |_|_|_|_|_|/ |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | TPM1.2 support has been dropped in rng-tools v6.5 see https://github.com/nhorman/rng-tools/commit/caef8cce97396adc8c60749a0ce6ac039b57859a rngd won't access /dev/tpm0 anymore and the "--no-tpm=1" option is now unrecognised
* | | | | | | Merge pull request #46330 from geistesk/wavemon-moduleJoachim F2018-10-28
|\ \ \ \ \ \ \ | |_|/ / / / / |/| | | | | | nixos/wavemon: create module
| * | | | | | nixos/wavemon: create modulegeistesk2018-09-07
| | | | | | |
* | | | | | | nixos/rsyslogd & nixos/syslog-ng: fix broken module (#47306)aanderse2018-10-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * journald: forward message to syslog by default if a syslog implementation is installed * added a test to ensure rsyslog is receiving messages when expected * added rsyslogd tests to release.nix