| Commit message (Collapse) | Author | Age |
| |
|
| |
|
| |
|
| |
|
|
|
|
|
| |
it was erroneously set in cb1ca420092c8854592afcf1cc0245b7245358f1
although this file isn't executable before patching shebangs.
|
| |
|
| |
|
|\ |
|
| |
| |
| |
| | |
Fixes #45908
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
The instructions to install nixos behind a proxy were not clear. While
one could guess that setting http_proxy variables can get the install
rolling, one could end up with an installed system where the proxy
settings for the nix-daemon are not configured.
This commit updates the documentation with
1. steps to install behind a proxy
2. configure the global proxy settings so that nix-daemon can access
internet.
3. Pointers to use nesting.clone in case one has to use different proxy
settings on different networks.
|
|\ \
| | |
| | | |
display-managers: make lightdm the default
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Switch from slim to lightdm as the display-manager.
If plasma5 is used as desktop-manager use sdddm.
If gnome3 is used as desktop-manager use gdm.
Based on #12516
|
| | |
| | |
| | | |
fsck of a mounted filesystems fails with error code 8 "Operational error" and halts the boot processing
|
|\ \ \
| | | |
| | | | |
nixos/transmission: fix AppArmor profile to include keyutils
|
| | | | |
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Since 1b11fdd0df2254a762a16d04e603ba99e42169c0 the test VM
depends on some extra packages to build the system to be installed.
This broke the installer test as it tried to download/build these
packages in a sandbox.
|
|\ \ \ \ |
|
| | | | | |
|
|\ \ \ \ \
| |_|_|_|/
|/| | | | |
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
This also includes a set of defaults *for this option*, where when not
used, other saner defaults are used.
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
The background color option is self-explanatory.
The mode is either `normal` or `stretch`, they are as defined by GRUB,
where normal will put the image in the top-left corner of the menu, and
stretch is the default, where it stretches the image without
consideration for the aspect ratio.
* https://www.gnu.org/software/grub/manual/grub/grub.html#background_005fimage
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
The wallpaper used is *structurally compatible* with the other one,
meaning that the logo is at the same location, and not bigger.
It has one drawback: the logo is brighter, which clashes with the grub
usage. This is to be fixed with new options in grub.
|
| |_|/ /
|/| | | |
|
| | | |
| | | |
| | | |
| | | | |
The gitea path is hardcoded in hooks directory in files of paths like:
repositories/<user>/<repo>.git/hooks/update.d/gitea
|
|\ \ \ \
| |_|_|/
|/| | |
| | | |
| | | | |
obsidiansystems/dont-use-obsolete-platform-aliases
treewide: Dont use obsolete platform aliases
|
| | | |
| | | |
| | | |
| | | | |
It is deprecated and will be removed after 18.09.
|
|\ \ \ \
| | | | |
| | | | | |
nfs-utils: 2.1.1 -> 2.3.2, integrate libnfsidmap
|
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
nfs4 exports from a virtual filesystem root,
so the client mount path differs from nfs3
|
| | | | | |
|
|\ \ \ \ \
| | | | | |
| | | | | |
| | | | | | |
nixos/usbguard: ensure the audit log file can be created
nixos/usbguard: disable debug output
|
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
Since version 0.7.3, usbguard-daemon won't start if the file cannot be opened.
|
| | | | | | |
|
|\ \ \ \ \ \
| | | | | | |
| | | | | | | |
nixos/nginx: ensure TLS OCSP stapling works out of the box with LE
|
| | |_|/ / /
| |/| | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
The recommended TLS configuration comes with `ssl_stapling on` and
`ssl_stapling_verify on`. However, this last directive also requires
the use of `ssl_trusted_certificate` to verify the received answer.
When using `enableACME` or similar, we can help the user by providing
the correct value for the directive.
The result can be tested with:
openssl s_client -connect web.example.com:443 -status 2> /dev/null
Without OCSP stapling, we get:
OCSP response: no response sent
After this change, we get:
OCSP Response Data:
OCSP Response Status: successful (0x0)
Response Type: Basic OCSP Response
Version: 1 (0x0)
Responder Id: C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
Produced At: Aug 30 20:46:00 2018 GMT
|
|\ \ \ \ \ \
| |/ / / / /
|/| | | | | |
incron: init at 0.5.12
|
| | | | | | |
|
| | | | | | |
|
| | | | | | |
|
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
recommendation by @jtojnar and @maurer
|
| | | | | |
| | | | | |
| | | | | |
| | | | | | |
wouldn't be unused as per recommended by @maurer
|
| | | | | | |
|
| | | | | | |
|
| | | | | | |
|
| | | | | | |
|
|\ \ \ \ \ \
| | | | | | |
| | | | | | | |
Nix minimal version: 1.11 -> 2.0
|
| | |/ / / /
| |/| | | | |
|
|\ \ \ \ \ \
| |/ / / / /
|/| | | | | |
freedesktop modules: init
|
| | | | | | |
|
| | | | | | |
|
| | | | | | |
|