about summary refs log tree commit diff
path: root/nixos/modules
Commit message (Collapse)AuthorAge
* Merge pull request #79840 from knl/update-oauth2_proxy-to-5.0.0Bas van Dijk2020-04-22
|\ | | | | oauth2_proxy: 3.2.0 -> 5.1.0
| * oauth2_proxy: Update NixOS moduleNikola Knezevic2020-04-20
| | | | | | | | Update to match the current flags and apply fixes to all breaking changes.
* | nixos-containers: add docs about nested containersIngo Blechschmidt2020-04-22
| |
* | Merge pull request #85402 from jtojnar/httpd-phpJan Tojnar2020-04-22
|\ \
| * | nixos/httpd: remove unnecessary overrideJan Tojnar2020-04-17
| | | | | | | | | | | | | | | This was introduced in https://github.com/NixOS/nixpkgs/commit/c801cd1a047efa51055fd04698e316ddd503fd1b but it no longer seems necessary.
| * | nixos/httpd: Use extensions from php packageJan Tojnar2020-04-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | After the recent rewrite, enabled extensions are passed to php programs through an extra ini file by a wrapper. Since httpd uses shared module instead of program, the wrapper did not affect it and no extensions other than built-ins were loaded. To fix this, we are passing the extension config another way – by adding it to the service's generated config. For now we are hardcoding the path to the ini file. It would be nice to add the path to the passthru and use that once the PHP expression settles down.
* | | Merge pull request #85710 from worldofpeace/gnome-iso-wayland-defaultworldofpeace2020-04-21
|\ \ \ | | | | | | | | installation-cd-graphical-gnome: don't run xorg default
| * | | installation-cd-graphical-gnome: don't run xorg defaultworldofpeace2020-04-21
| | | | | | | | | | | | | | | | | | | | If for some reason the Wayland session fails to start it will just start the Xorg session.
* | | | Update link in /etc/os-release (#85723)davidak2020-04-22
| | | |
* | | | Merge pull request #85604 from adisbladis/podman-moduleadisbladis2020-04-21
|\ \ \ \ | | | | | | | | | | nixos/virtualisation.podman: Init module
| * | | | nixos.virtualisation.containers: Init common /etc/containers configuration ↵adisbladis2020-04-21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | module What's happening now is that both cri-o and podman are creating /etc/containers/policy.json. By splitting out the creation of configuration files we can make the podman module leaner & compose better with other container software.
| * | | | nixos.virtualisation: Move containers.nix to nixos-containers.nixadisbladis2020-04-21
| | | | | | | | | | | | | | | | | | | | In anticipation of the new containers module.
| * | | | nixos/podman: Add maintainer team & add myself to podman teamadisbladis2020-04-21
| | | | |
| * | | | nixos/virtualisation.podman: Init moduleadisbladis2020-04-21
| | | | |
* | | | | Merge pull request #85598 from danderson/tailscale-fix-cachedirFlorian Klink2020-04-21
|\ \ \ \ \ | | | | | | | | | | | | nixos/tailscale: set a CacheDir in the systemd unit.
| * | | | | nixos/tailscale: set a CacheDir in the systemd unit.David Anderson2020-04-20
| | |_|_|/ | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes a bug where tailscaled drops some files into / when CacheDir is unset. Signed-off-by: David Anderson <dave@natulte.net>
* | | | | Merge pull request #85708 from Beskhue/fix-documentationFlorian Klink2020-04-21
|\ \ \ \ \ | |_|_|/ / |/| | | | nixos/phpfpm: fix erroneous pools example
| * | | | nixos/phpfpm: fix erroneous pools exampleThomas Churchman2020-04-21
| | | | |
* | | | | Merge pull request #85692 from nh2/systemd-update-default-rate-limitFlorian Klink2020-04-21
|\ \ \ \ \ | | | | | | | | | | | | journald service: Increase default rate limit 1000 -> 10000.
| * | | | | journald service: Increase default rate limit 1000 -> 10000.Niklas Hambüchen2020-04-21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Follows the upstream change of this default: https://github.com/systemd/systemd/pull/8660
* | | | | | Merge pull request #85643 from petabyteboy/feature/generate-configworldofpeace2020-04-21
|\ \ \ \ \ \ | |_|/ / / / |/| | | | | nixos/tools: adapt for renamed console options
| * | | | | nixos/tools: adapt for renamed console optionsMilan Pässler2020-04-21
| | | | | |
* | | | | | treewide: add bool type to enable options, or make use of mkEnableOptionDominik Xaver Hörl2020-04-21
| |_|_|/ / |/| | | | | | | | | | | | | | Add missing type information to manually specified enable options or replace them by mkEnableOption where appropriate.
* | | | | Merge pull request #83769 from dadada/nixos/dokuwiki-multi-serverMarek Mahut2020-04-20
|\ \ \ \ \ | | | | | | | | | | | | nixos/dokuwiki: add support for multi-site, additional plugins and templates
| * | | | | nixos/dokuwiki: change default of aclFile and usersFiledadada2020-04-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | `aclFile` and `usersFile` will be set to a default value if `aclUse` is specified and aclFile is not overriden by `acl`.
| * | | | | nixos/dokuwiki: modify usersFile and aclFiledadada2020-04-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Use types.str instead of types.path to exclude private information from the derivation. Add a warinig about the contents of acl beeing included in the nix store.
| * | | | | nixos/dokuwiki: dokuwiki userdadada2020-04-18
| | | | | |
| * | | | | nixos/dokuwiki: add option disableActionsdadada2020-04-18
| | | | | |
| * | | | | nixos/dokuwiki: set default value for usersFiledadada2020-04-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If usersFile is not set, a file is created along the stateDir that can hold the users and supports dynamically adding users using the web GUI.
| * | | | | nixos/dokuwiki: add assertion for usersFiledadada2020-04-18
| | | | | |
| * | | | | nixos/dokuwiki: add plugins and templates optionsdadada2020-04-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Adds support for additional plugins and templates similarly to how wordpress.nix does it. Plugins and templates need to be packaged as in the example.
| * | | | | nixos/dokuwiki: refactordadada2020-04-18
| | | | | |
| * | | | | nixos/dokuwiki: add <name?> optiondadada2020-04-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Enables multi-site configurations. This break compatibility with prior configurations that expect options for a single dokuwiki instance in `services.dokuwiki`.
* | | | | | Merge pull request #85620 from ↵Eelco Dolstra2020-04-20
|\ \ \ \ \ \ | |_|_|/ / / |/| | | | | | | | | | | | | | | | | matthewbauer/use-modulesPath-for-nixos-generate-config nixos/nixos-generate-config.pl: use modulesPath instead of <nixpkgs>
| * | | | | nixos/nixos-generate-config.pl: use modulesPath instead of <nixpkgs>Matthew Bauer2020-04-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | For imports, it is better to use ‘modulesPath’ than rely on <nixpkgs> being correctly set. Some users may not have <nixpkgs> set correctly. In addition, when ‘pure-eval=true’, <nixpkgs> is unset.
* | | | | | Merge pull request #82714 from delroth/s3tcLéo Gaspard2020-04-20
|\ \ \ \ \ \ | |_|_|/ / / |/| | | | | libtxc_dxtn{,_s2tc}: remove from nixpkgs + hardware.opengl options
| * | | | | libtxc_dxtn{,_s2tc}: remove from nixpkgs + hardware.opengl optionsPierre Bourdon2020-04-20
| | |/ / / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | Context: discussion in https://github.com/NixOS/nixpkgs/pull/82630 Mesa has been supporting S3TC natively without requiring these libraries since the S3TC patent expired in December 2017.
* | | | | Merge pull request #85371 from Mic92/tmpfilesJörg Thalheim2020-04-20
|\ \ \ \ \
| * | | | | tmpfiles: load user-defined entries firstJörg Thalheim2020-04-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | systemd-tmpfiles will load all files in lexicographic order and ignores rules for the same path in later files with a warning Since we apply the default rules provided by systemd, we should load user-defines rules first so users have a chance to override defaults.
* | | | | | nixos-containers: Add support for custom nixpkgs argumentadisbladis2020-04-20
| |_|_|/ / |/| | | |
* | | | | Merge pull request #83301 from evils/tuptimeFlorian Klink2020-04-19
|\ \ \ \ \ | | | | | | | | | | | | Tuptime: Init Package, Module and Test
| * | | | | nixos/tuptime: init moduleEvils2020-04-03
| | | | | |
* | | | | | Merge pull request #73934 from flokli/nixos-test-port-cockroachdbworldofpeace2020-04-19
|\ \ \ \ \ \ | | | | | | | | | | | | | | nixosTests.cockroachdb: port to python
| * | | | | | nixos/chrony: move to StateDirectory and tmpfiles.dFlorian Klink2020-04-03
| | | | | | |
| * | | | | | cockroachdb: remove stray trailing whitespaceFlorian Klink2020-04-03
| | | | | | |
* | | | | | | Merge pull request #84522 from emilazy/add-linux-hardened-patchesYegor Timoshenko2020-04-19
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | linux_*_hardened: use linux-hardened patch set
| * | | | | | | nixos/hardened: add emily to maintainersEmily2020-04-17
| | | | | | | |
| * | | | | | | nixos/hardened: enable user namespaces for rootEmily2020-04-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | linux-hardened sets kernel.unprivileged_userns_clone=0 by default; see anthraxx/linux-hardened@104f44058f058a395502192c4939645df6f52ecb. This allows the Nix sandbox to function while reducing the attack surface posed by user namespaces, which allow unprivileged code to exercise lots of root-only code paths and have lead to privilege escalation vulnerabilities in the past. We can safely leave user namespaces on for privileged users, as root already has root privileges, but if you're not running builds on your machine and really want to minimize the kernel attack surface then you can set security.allowUserNamespaces to false. Note that Chrome's sandbox requires either unprivileged CLONE_NEWUSER or setuid, and Firefox's silently reduces the security level if it isn't allowed (see about:support), so desktop users may want to set: boot.kernel.sysctl."kernel.unprivileged_userns_clone" = true;
| * | | | | | | nixos/hardened: don't set vm.unprivileged_userfaultfdEmily2020-04-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Upstreamed in anthraxx/linux-hardened@a712392b88b3cbc8385fd97be87a43db2ad7ecf0.
| * | | | | | | nixos/hardened: don't set vm.mmap_min_addrEmily2020-04-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Upstreamed in anthraxx/linux-hardened@f1fe0a64dd532551b048d97b35473c25809f7a0f.