about summary refs log tree commit diff
path: root/nixos/modules
Commit message (Collapse)AuthorAge
...
| * | | | | | | | | | nixos/gnome3: add sound-theme-freedesktopworldofpeace2019-11-03
| | |_|_|_|_|_|_|/ / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | I've noticed a similar issue in Pantheon, without this sound theme installed there's no system sounds. I believe it's because the gnome theme and the pantheon theme inherit this one.
* | | | | | | | | | nixos/haproxy: support hot-reload without dropping packetsPeter Hoeg2019-11-09
| |_|_|_|/ / / / / |/| | | | | | | |
* | | | | | | | | Merge pull request #71986 from mtetreault/mte/plymouth-improvementsThomas Tuegel2019-11-09
|\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | plymouth: Add extra config field
| * | | | | | | | | plymouth: Add extra config fieldMathieu A.-Tetreault2019-10-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Signed-off-by: Mathieu A.-Tetreault <alexandretm@amotus.ca>
* | | | | | | | | | nixos/httpd: module fixes enableUserDir (attendum to #72789)Red Davies2019-11-09
| | | | | | | | | |
* | | | | | | | | | Merge pull request #71576 from ShaRose/patch-1Silvan Mosberger2019-11-09
|\ \ \ \ \ \ \ \ \ \ | |_|_|_|/ / / / / / |/| | | | | | | | | nixos/dnsdist: Add CAP_NET_BIND_SERVICE to AmbientCapabilities
| * | | | | | | | | nixos/dnsdist: Add CAP_NET_BIND_SERVICE to AmbientCapabilitiesShaRose2019-10-31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It seems that dnsdist doesn't actually request CAP_NET_BIND_SERVICE, which is why normally it's executed and root and setuids to another, unprivileged, user. This means that as it is, dnsdist will be unable to bind to any port under 1024 and will fail with access denied. Removing CAP_SETGID and CAP_SETUID is also related to this as we don't actually change the uid or gid after the fact as we use DynamicUser. (That part isn't strictly NEEDED but there's no reason to have those capabilities if we don't use them). There are also some additional sandboxing we can remove from the service definition as they are assumed true or strict by DynamicUser: specifically PrivateTmp and ProtectSystem respectively. ProtectHome is still there, despite being assumed read-only as setting it to true means they are seen as empty. I don't think it really matters as I don't know if systemd will ignore it or not, but I didn't see any reason to go hunting for excuses to make it a bigger change.
* | | | | | | | | | Merge pull request #73049 from flokli/fix-redis-mergeFlorian Klink2019-11-08
|\ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | nixos/redis: fix merging
| * | | | | | | | | | nixos/redis: fix mergingFlorian Klink2019-11-08
| | |_|_|/ / / / / / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | https://github.com/NixOS/nixpkgs/pull/71584 did merging without mkMerge. cc @jtojnar
* / | | | | | | | | nixos/systemd: Allow unit options to have multiple equal defs (#73024)Silvan Mosberger2019-11-08
|/ / / / / / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | E.g. this allows systemd.services.<name?>.serviceConfig.DynamicUser = mkMerge [ true true ];
* | | | | | | | | Merge pull request #65971 from jb55/zoneminder-fixPeter Hoeg2019-11-08
|\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | zoneminder: fix nginx config
| * | | | | | | | | zoneminder: fix nginx configWilliam Casarin2019-08-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | For some reason it doesn't seem to load things in the cache directory properly without this slash. Looks like this regression may have been introduced in: commit 19851ec1fce3fabec3c6f951c3fb7d5814d24691 nixos/zoneminder: Fix nginx config check Cc: Daniel Schaefer <git@danielschaefer.me> Cc: Peter Hoeg <peter@hoeg.com> Signed-off-by: William Casarin <jb55@jb55.com>
* | | | | | | | | | Merge pull request #73004 from philandstuff/patch-1worldofpeace2019-11-08
|\ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | ssh-agent: fix syntax problem from #71139
| * | | | | | | | | | ssh-agent: fix syntax problem from #71139Philip Potter2019-11-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Oops, in #71139 a missing `+` broke things quite badly. Thanks @lzorkin for the report and @mebubo for diagnosing the problem.
* | | | | | | | | | | Merge pull request #71825 from AIDEA775/fix/zsh-syntax-highlightingMatthew Bauer2019-11-07
|\ \ \ \ \ \ \ \ \ \ \ | |/ / / / / / / / / / |/| | | | | | | | | | nixos/zsh-syntax-highlighting: Fix highlighting when ohMyZsh is enabled
| * | | | | | | | | | nixos/zsh-syntax-highlighting: Fix highlighting when ohMyZsh is enabledSilva Alejandro Ismael2019-10-23
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | From https://github.com/zsh-users/zsh-syntax-highlighting#faq: "It must be sourced after all custom widgets have been created (i.e., after all zle -N calls and after running compinit)." zsh-syntax-highlighting must be sourced to the end.
* | | | | | | | | | | Merge pull request #71408 from f--t/fix/x11-servicesMatthew Bauer2019-11-07
|\ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | Fix nixos x11 service logging for ssdm and xmonad
| * | | | | | | | | | | nixos/widnow-managers/xmonad: fix systemd identifier for xmonadft2019-10-19
| | | | | | | | | | | |
| * | | | | | | | | | | ssdm: fix identifier for xserver-wrapperft2019-10-19
| | | | | | | | | | | |
* | | | | | | | | | | | nixos-rebuild: add explicit option to enable (remote) sudoBjørn Forsman2019-11-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add --use-remote-sudo option. When set, remote commands will be prefixed with 'sudo'. This allows using sudo remotely _without_ having to use sudo locally (when using --build-host/--taget-host).
* | | | | | | | | | | | Merge pull request #72369 from worldofpeace/corefonts-dropworldofpeace2019-11-07
|\ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | nixos/fontconfig-ultimate: remove
| * | | | | | | | | | | | nixos/fontconfig-ultimate: removeworldofpeace2019-11-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This module has been obsolete for several years now.
| * | | | | | | | | | | | nixos/corefonts: removeworldofpeace2019-11-06
| | |_|_|_|_|_|_|/ / / / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 4 years ago in 7edb27b7af6ebff7e35207f7fcf16e0e2bd8884a the option was made hidden. We should just remove the module and use mkRemovedOptionModule.
* | | | | | | | | | | | Merge pull request #71605 from aanderse/redmine-cleanupAaron Andersen2019-11-06
|\ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | redmine: drop 3.4.x package, 4.0.4 -> 4.0.5
| * | | | | | | | | | | | redmine: drop 3.4.x packageAaron Andersen2019-10-26
| | |_|_|_|_|_|_|_|/ / / | |/| | | | | | | | | |
* | | | | | | | | | | | nixos/networkmanager: fix merging options (#72916)Silvan Mosberger2019-11-06
|\ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | nixos/networkmanager: fix merging options
| * | | | | | | | | | | | nixos/networkmanager: fix merging optionsJan Tojnar2019-11-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Incorrect merging of modules resulted in dhcpcd being enabled causing flaky network connection. https://github.com/NixOS/nixpkgs/pull/64364 Fixing it uncovered an infinite recursion from the same commit, previously masked by the incorrect merge. We can just drop the `mkDefault` for `networking.wireless.enable` as it is already `false` by default. Closes: https://github.com/NixOS/nixpkgs/issues/72416
* | | | | | | | | | | | | Merge pull request #72789 from aanderse/httpd-againAaron Andersen2019-11-06
|\ \ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | nixos/httpd: module cleanup
| * | | | | | | | | | | | | nixos/httpd: allow user to specify a minimal list of apache modulesAaron Andersen2019-11-04
| | | | | | | | | | | | | |
| * | | | | | | | | | | | | nixos/httpd: drop stateDir option, hardcode to /run/httpdAaron Andersen2019-11-04
| | | | | | | | | | | | | |
* | | | | | | | | | | | | | Merge pull request #70336 from abbradar/synapse-ipv6Maximilian Bosch2019-11-06
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ | |_|_|_|/ / / / / / / / / / |/| | | | | | | | | | | | | matrix-synapse service: blacklist local IPv6 addresses by default
| * | | | | | | | | | | | | matrix-synapse service: blacklist local IPv6 addresses by defaultNikolay Amiantov2019-10-03
| | | | | | | | | | | | | |
* | | | | | | | | | | | | | vault: fix config when file backend is usedEEva (JPotier)2019-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When the option services.vault.storageBackend is set to "file", a systemd.tmpfiles.rules was added, with extraneous []. These are not needed and have been removed.
* | | | | | | | | | | | | | jormungandr: RemoveEelco Dolstra2019-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is a good example of a package/module that should be distributed externally (e.g. as a flake [1]): it's not stable yet so anybody who seriously wants to use it will want to use the upstream repo. Also, it's highly specialized so NixOS is not really the right place at the moment (every NixOS module slows down NixOS evaluation for everybody). [1] https://github.com/edolstra/jormungandr/tree/flake
* | | | | | | | | | | | | | Merge pull request #71139 from philandstuff/ssh-agent-pkcs11-whitelistRobin Gloster2019-11-04
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ssh-agent: add agentPKCS11Whitelist option
| * | | | | | | | | | | | | | ssh-agent: add agentPKCS11Whitelist optionPhilip Potter2019-10-14
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If you want to be able to use OpenSC with ssh-agent, you need to be able to add it to the ssh-agent whitelist. This adds an option, agentPKCS11Whitelist, that exposes the option. Note that I currently work around this by injecting the parameter into the agentTimeout option: programs.ssh.agentTimeout = "1h -P ${pkgs.opensc}/lib/opensc-pkcs11.so"; but I feel that a proper option would be better :)
* | | | | | | | | | | | | | | Merge pull request #72698 from gebner/digimend-driversGabriel Ebner2019-11-04
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | digimend drivers for graphics tablets
| * | | | | | | | | | | | | | | nixos/digimend: init moduleGabriel Ebner2019-11-03
| | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | Merge pull request #72729 from mmahut/tracMarek Mahut2019-11-04
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | nixos/trac: init
| * | | | | | | | | | | | | | | | nixos/trac: service initMarek Mahut2019-11-03
| | | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | nixos/nat: fix typo in commentMax Veytsman2019-11-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This iptables directive is marking packets coming from the internal interfaces so they can later be NATed by the rule in https://github.com/NixOS/nixpkgs/blob/22378e699682778075bcfb12cb6bf710261586f5/nixos/modules/services/networking/nat.nix#L38-L42 . Fix the comment accordingly.
* | | | | | | | | | | | | | | | | Merge pull request #68193 from chkno/nixos-option-rewriteLinus Heckemann2019-11-04
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | nixos-option C++ rewrite with --all
| * | | | | | | | | | | | | | | | | snake_case -> camelCaseChuck2019-11-04
| | | | | | | | | | | | | | | | | |
| * | | | | | | | | | | | | | | | | Support aggregate types attrsOf and listOfChuck2019-11-04
| | | | | | | | | | | | | | | | | |
| * | | | | | | | | | | | | | | | | (clang-format for has_example)Chuck2019-11-04
| | | | | | | | | | | | | | | | | |
| * | | | | | | | | | | | | | | | | Add maintainerChuck2019-11-04
| | | | | | | | | | | | | | | | | |
| * | | | | | | | | | | | | | | | | Only print example when there is oneChuck2019-11-04
| | | | | | | | | | | | | | | | | |
| * | | | | | | | | | | | | | | | | snake_case -> camelCaseChuck2019-11-04
| | | | | | | | | | | | | | | | | |
| * | | | | | | | | | | | | | | | | Don't print header on stderrChuck2019-11-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Automated consumers can use 'sed 1d' or similar to remove this header. This probably makes this output *easier* to consume correctly. Having this header show up in consumers' terminal or log output is probably not useful, but hiding it without hiding all error messages would have been more troublesome that just stripping it from stdout. I.e., previously, unsophisticated use would show undesired output: $ some-other-tool This attribute set contains: This attribute set contains: This attribute set contains: This attribute set contains: <Actual some-other-tool output> The simplest way to hide this undesired output would have been nixos-option ... 2>/dev/null, which would hide all error messages. We do not wish to encourage that. Correct use would have been something like: nixos-option ... 2> >( grep --line-buffered -v 'This attribute set contains:') After this change, correct use is simpler: nixos-option ... | sed 1d or nixos-option ... | sed '1/This attribute set contains:/d' if the caller don't know if this invocation of nixos-option will yield an attribute listing or an option description.
| * | | | | | | | | | | | | | | | | Explain why header goes on stderrChuck2019-11-04
| | | | | | | | | | | | | | | | | |