summary refs log tree commit diff
path: root/nixos
Commit message (Collapse)AuthorAge
* nixos: don't white-list port 631 in the firewall when CUPS is enabledPeter Simons2013-12-23
| | | | | | | | | | | | If you want CUPS to receive UDP printer announcements from the rest of the world, please add networking.firewall.allowedUDPPorts = [ 631 ]; to /etc/nixos/configuration.nix. See <http://lists.science.uu.nl/pipermail/nix-dev/2013-November/011997.html> for the discussion that lead to this.
* nixos initrd: load atkbd, not xtkbdLluís Batlle i Rossell2013-12-23
| | | | I don't think anyone has a XT keyboard in a computer running nixos.
* Make Ejabberd service workMichael Raskin2013-12-20
|
* mediawiki: Update to 1.20.8Eelco Dolstra2013-12-20
| | | | CVE-2013-4567, CVE-2013-4568
* Merge pull request #1373 from offlinehacker/nixos/memcached/user_fixMichael Raskin2013-12-14
|\ | | | | memcached: set uid to make it work with #1076
| * memcached: set uid to make it work with #1076Jaka Hudoklin2013-12-13
| |
* | Merge pull request #1362 from tomberek/ddclient_correctionMichael Raskin2013-12-14
|\ \ | | | | | | Correct web-skip value to match behavior of checkip.dyndns.com
| * | Correct web-skip value to match behavior of checkip.dyndns.comThomas Bereknyei2013-12-11
| | |
* | | Merge pull request #1340 from bjornfor/ntopngMichael Raskin2013-12-14
|\ \ \ | | | | | | | | Add ntopng package and nixos service module
| * | | nixos: add ntopng serviceBjørn Forsman2013-12-09
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ntopng is a high-speed web-based traffic analysis and flow collection tool. Enable it by adding this to configuration.nix: services.ntopng.enable = true; Open a browser at http://localhost:3000 and login with the default username/password: admin/admin.
* | | | add herbstluftwm enable optionDavid Virgilio2013-12-14
| |_|/ |/| |
* | | Google Compute image: fix punctuation in description, give disk image proper ↵Rob Vermaas2013-12-12
| | | | | | | | | | | | name with version and revision.
* | | Manual: Fix typoEelco Dolstra2013-12-12
| |/ |/| | | | | Fixes #1363.
* | fail2ban: Fix preStart actionEelco Dolstra2013-12-11
| | | | | | | | | | | | | | Creating /run/fail2ban didn't work since it didn't have write permission to /run. Now it does. Reported by Thomas Bereknyei.
* | Remove a hardcoded SSH public key from the Google Compute image.Rob Vermaas2013-12-11
| |
* | Add initial configuration for Google Compute EngineRob Vermaas2013-12-11
| |
* | nixos/libvirtd-service: fix fail-to-start when no machines are configuredBjørn Forsman2013-12-09
|/ | | | | Don't fail to start the libvirtd service just because there are no files that match the /etc/libvirt/qemu/*.xml pattern.
* nixos/avahi-service: small documentation updateBjørn Forsman2013-12-07
|
* postgresql: Fix shutdownEelco Dolstra2013-12-03
| | | | | | | | | | | Postgres was taking a long time to shutdown. This is because we were sending SIGINT to all processes, apparently confusing the autovacuum launcher. Instead it should only be sent to the main process (which takes care of shutting down the others). The downside is that systemd will also send the final SIGKILL only to the main process, so other processes in the cgroup may be left behind. There should be an option for this...
* Fix passing of kernel parametersEelco Dolstra2013-12-02
| | | | | Broken in 9ee30cd9b51c46cea7193993d006bb4301588001. Reported by Arvin Moezzi.
* cups: Allow users in the wheel group to do admin actionsEelco Dolstra2013-12-01
|
* systemd: add services.journald.extraConfig optionSong Wenwu2013-11-30
|
* Merge pull request #1292 from jozko/openldap-fixesDomen Kožar2013-11-28
|\ | | | | Added openldap user, group and configure service so its not running as root
| * Added openldap user, group and configure service so its not running as root.Jozko Skrablin2013-11-28
| |
* | nixos/libvirtd-service: fix for garbage collected emulator pathsBjørn Forsman2013-11-27
| | | | | | | | | | | | | | | | | | | | | | libvirtd puts the full path of the emulator binary in the machine config file. But this path can unfortunately be garbage collected while still being used by the virtual machine. Then this happens: Error starting domain: Cannot check QEMU binary /nix/store/z5c2xzk9x0pj6x511w0w4gy9xl5wljxy-qemu-1.5.2-x86-only/bin/qemu-kvm: No such file or directory Fix by updating the emulator path on each service startup to something valid (re-scan $PATH).
* | Add support for lightweight NixOS containersEelco Dolstra2013-11-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | You can now say: systemd.containers.foo.config = { services.openssh.enable = true; services.openssh.ports = [ 2022 ]; users.extraUsers.root.openssh.authorizedKeys.keys = [ "ssh-dss ..." ]; }; which defines a NixOS instance with the given configuration running inside a lightweight container. You can also manage the configuration of the container independently from the host: systemd.containers.foo.path = "/nix/var/nix/profiles/containers/foo"; where "path" is a NixOS system profile. It can be created/updated by doing: $ nix-env --set -p /nix/var/nix/profiles/containers/foo \ -f '<nixos>' -A system -I nixos-config=foo.nix The container configuration (foo.nix) should define boot.isContainer = true; to optimise away the building of a kernel and initrd. This is done automatically when using the "config" route. On the host, a lightweight container appears as the service "container-<name>.service". The container is like a regular NixOS (virtual) machine, except that it doesn't have its own kernel. It has its own root file system (by default /var/lib/containers/<name>), but shares the Nix store of the host (as a read-only bind mount). It also has access to the network devices of the host. Currently, if the configuration of the container changes, running "nixos-rebuild switch" on the host will cause the container to be rebooted. In the future we may want to send some message to the container so that it can activate the new container configuration without rebooting. Containers are not perfectly isolated yet. In particular, the host's /sys/fs/cgroup is mounted (writable!) in the guest.
* | When setting $NIX_REMOTE, check whether /nix/var/nix/db is writableEelco Dolstra2013-11-27
| | | | | | | | | | In NixOS containers, root doesn't have write permission to /nix/var/nix/db, so it has to use the daemon.
* | postgresql: Fix the port optionEelco Dolstra2013-11-27
|/ | | | Also clarify the description of the enableTCPIP option.
* Add a regression test for hostname / nss_myhostnameEelco Dolstra2013-11-26
| | | | Issue #1248.
* nscd: Fix LD_LIBRARY_PATHEelco Dolstra2013-11-26
| | | | | | This ensures that nscd can find the NSS modules. Fixes #1248.
* Allow services to specify a pre-stop scriptEelco Dolstra2013-11-26
|
* Disable various services when running inside a containerEelco Dolstra2013-11-26
|
* Make dd-agent services restart when killed.Rob Vermaas2013-11-22
|
* Add a nix module for AMD Hybrid GraphicsWilliam A. Kennington III2013-11-20
|
* Don't include the code name in the EBS AMI nameEelco Dolstra2013-11-19
|
* polkit: Add some examplesEelco Dolstra2013-11-18
|
* polkit: Fix authenticating as a wheel userEelco Dolstra2013-11-18
| | | | | In Javascript-based PolKit, "unix-user:0;unix-group:wheel" is not valid; it should be a list "unix-user:0", "unix-group:wheel".
* polkit: The rule file needs to end in .rulesEelco Dolstra2013-11-18
| | | | Otherwise it's ignored.
* httpd.nix: Support non-root operationEelco Dolstra2013-11-18
|
* Allow running NixOS services outside of systemdEelco Dolstra2013-11-18
| | | | | | | | | | | | | | | | | | | | | | | | | The attribute ‘config.systemd.services.<service-name>.runner’ generates a script that runs the service outside of systemd. This is useful for testing, and also allows NixOS services to be used outside of NixOS. For instance, given a configuration file foo.nix: { config, pkgs, ... }: { services.postgresql.enable = true; services.postgresql.package = pkgs.postgresql92; services.postgresql.dataDir = "/tmp/postgres"; } you can build and run PostgreSQL as follows: $ nix-build -A config.systemd.services.postgresql.runner -I nixos-config=./foo.nix $ ./result This will run the service's ExecStartPre, ExecStart, ExecStartPost and ExecStopPost commands in an appropriate environment. It doesn't work well yet for "forking" services, since it can't track the main process. It also doesn't work for services that assume they're always executed by root.
* Check whether fileSystems defines the root FSEelco Dolstra2013-11-18
|
* Allow overrides to work for unit optionsEelco Dolstra2013-11-18
|
* Use types.lines for script/preStart/postStart/postStopEelco Dolstra2013-11-18
|
* Apply better type checking to unitConfig/serviceConfig/...Eelco Dolstra2013-11-18
| | | | In particular, complain if two modules define the same systemd option.
* Fix broken Conflicts optionsEelco Dolstra2013-11-18
|
* Allow building/testing individual systemd unitsEelco Dolstra2013-11-18
|
* xfce: enable tumbler the thumbnail manager (close #1206)Sergey Mironov2013-11-16
|
* systemd: Add systemd.extraConfig option for /etc/systemd/system.confRicardo M. Correia2013-11-16
|
* systemd: Change services.logind.extraConfig type to types.linesRicardo M. Correia2013-11-16
|
* Put /efi and /loader on the main livecd partition for efi booting with ↵Shea Levy2013-11-14
| | | | | | | | unetbootin Fixes #248, mostly Signed-off-by: Shea Levy <shea@shealevy.com>