summary refs log tree commit diff
path: root/nixos
Commit message (Collapse)AuthorAge
* nginx module: fix acme if vhost name != serverNameFranz Pletz2017-02-25
| | | | cc #21931 @bobvanderlinden
* Merge pull request #23155 from doshitan/fix-prometheus-basic-authBenjamin Staffin2017-02-24
|\ | | | | prometheus service: fix basic auth option
| * prometheus service: fix basic auth optionTanner Doshier2017-02-24
| | | | | | | | | | If some configuration is provided, we need to filter out the `_module` key or else it breaks prometheus.
* | f2fs module: add crc32 dependency to initrd kernel modules, closes #23093Ryan Mulligan2017-02-24
| | | | | | | | | | f2fs.fsck depends on crc32 module being present in the initrd system, otherwise, if f2fs is used as the root disk, the system is unbootable.
* | Merge pull request #23130 from grahamc/insecure-packages-with-docsRobin Gloster2017-02-24
|\ \ | | | | | | nixpkgs: allow packages to be marked insecure (this time with docs)
| * | nixpkgs: allow packages to be marked insecureGraham Christensen2017-02-24
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If a package's meta has `knownVulnerabilities`, like so: stdenv.mkDerivation { name = "foobar-1.2.3"; ... meta.knownVulnerabilities = [ "CVE-0000-00000: remote code execution" "CVE-0000-00001: local privilege escalation" ]; } and a user attempts to install the package, they will be greeted with a warning indicating that maybe they don't want to install it: error: Package ‘foobar-1.2.3’ in ‘...default.nix:20’ is marked as insecure, refusing to evaluate. Known issues: - CVE-0000-00000: remote code execution - CVE-0000-00001: local privilege escalation You can install it anyway by whitelisting this package, using the following methods: a) for `nixos-rebuild` you can add ‘foobar-1.2.3’ to `nixpkgs.config.permittedInsecurePackages` in the configuration.nix, like so: { nixpkgs.config.permittedInsecurePackages = [ "foobar-1.2.3" ]; } b) For `nix-env`, `nix-build`, `nix-shell` or any other Nix command you can add ‘foobar-1.2.3’ to `permittedInsecurePackages` in ~/.config/nixpkgs/config.nix, like so: { permittedInsecurePackages = [ "foobar-1.2.3" ]; } Adding either of these configurations will permit this specific version to be installed. A third option also exists: NIXPKGS_ALLOW_INSECURE=1 nix-build ... though I specifically avoided having a global file-based toggle to disable this check. This way, users don't disable it once in order to get a single package, and then don't realize future packages are insecure.
* | | nix: 1.11.6 -> 1.11.7Eelco Dolstra2017-02-24
|/ /
* | Merge pull request #23109 from dtzWill/update/neo4jFranz Pletz2017-02-23
|\ \ | | | | | | neo4j: update and fix JVM parameters in NixOS module
| * | nixos/neo4j: Update to default JVM options from current release.Will Dietz2017-02-23
| | | | | | | | | | | | The options previously listed here were the defaults back in 2.1.x.
* | | Merge pull request #23082 from mayflower/graylog_updateFranz Pletz2017-02-23
|\ \ \ | | | | | | | | graylog: update + module plugin support
| * | | graylog module: add plugin supportTristan Helmich2017-02-23
| | | |
* | | | Merge pull request #22634 from Ekleog/dhparamsRobin Gloster2017-02-23
|\ \ \ \ | | | | | | | | | | dhparams module: initialize
| * | | | dhparams module: initializeLéo Gaspard2017-02-18
| | | | |
* | | | | prosody service: needs working network connectivityFranz Pletz2017-02-23
| | | | |
* | | | | dhcpcd service: fix network-online.target integrationFranz Pletz2017-02-23
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When dhcpcd instead of networkd is used, the network-online.target behaved the same as network.target, resulting in broken services that need a working network connectivity when being started. This commit makes dhcpcd wait for a lease and makes it wanted by network-online.target. In turn, network-online.target is now wanted by multi-user.target, so it will be activated at every boot.
* | | | | networking module: remove reference to removed ip-up.targetRobin Gloster2017-02-23
| | | | |
* | | | | google-compute-image.nix: fix evaluation failureDan Peebles2017-02-22
| | | | |
* | | | | make-disk-image.nix: support additional filesystem contentsDan Peebles2017-02-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This makes make-disk-image.nix slightly more consistent with other image builders we have. Unfortunately I duplicated some code in doing so, but this is temporary duplication on the path to consolidating everything. See https://github.com/NixOS/nixpkgs/issues/23052 for more details on that. I'm also exposing the option in the amazon-image.nix maintainer module.
* | | | | nixos polkit: fixup setuid wrapper of pkexecVladimír Čunát2017-02-22
| |/ / / |/| | | | | | | | | | | Broken in 628e6a8. Fixes #23083.
* | | | nixos/release-notes: fix typosFranz Pletz2017-02-22
| | | |
* | | | Merge pull request #23046 from Zimmi48/patch-2Jörg Thalheim2017-02-22
|\ \ \ \ | | | | | | | | | | nixos/manual/networkmanager: add info on nm-applet
| * | | | nixos/manual/networkmanager: add info on nm-appletThéo Zimmermann2017-02-21
| | | | |
* | | | | Merge pull request #23045 from Zimmi48/patch-1Jörg Thalheim2017-02-22
|\ \ \ \ \ | | | | | | | | | | | | nixos/manual/xserver: propose more alternatives
| * | | | | nixos/manual/xserver: propose more alternativesThéo Zimmermann2017-02-21
| |/ / / /
* | | | | Merge pull request #22822 from Mic92/iputilsJörg Thalheim2017-02-22
|\ \ \ \ \ | | | | | | | | | | | | iputils: 20151218 -> 20161105
| * | | | | nixos/release-notes: mention iputils changesJörg Thalheim2017-02-22
| | | | | |
| * | | | | replace ping6 with pingJörg Thalheim2017-02-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | reason: after the upgrade of iputils from 20151218 to 20161105 functionality of ping6 and tracepath6 was merged into ping and tracepath. Ping is now mostly a drop-in replacment for ping6, except that selecting a specific interface is done by encoding it into the address (ex.: fe80::1%eth0) rather then specifing it with the `-I` flag.
* | | | | | libvirt: expose libvirt qemu configuration fileTristan Helmich2017-02-21
| | | | | | | | | | | | | | | | | | | | | | | | fixes #22823
* | | | | | networking.defaultGateway{,6}: fix exampleRobin Gloster2017-02-21
| |/ / / / |/| | | |
* | | | | vnstat: provide full path of "kill" in ExecReloadJörg Thalheim2017-02-21
| | | | |
* | | | | wrappers service: make /run/wrappers a mountpointNikolay Amiantov2017-02-21
| | | | | | | | | | | | | | | | | | | | | | | | | Also remove some compatibility code because the directory in question would be shadowed by a mountpoint anyway.
* | | | | Merge pull request #22264 from peterhoeg/m/modeswitchPeter Hoeg2017-02-21
|\ \ \ \ \ | | | | | | | | | | | | usb-modeswitch: 2.2.1 -> 2.5.0 and nixos module
| * | | | | usb-wwan: nixos modulePeter Hoeg2017-02-21
| | | | | |
* | | | | | Merge pull request #22715 from phi-gamma/fix-22709-xen-domUFranz Pletz2017-02-21
|\ \ \ \ \ \ | | | | | | | | | | | | | | xen: update domU config for pvgrub2
| * | | | | | xen: update domU config for pvgrub2Philipp Gesang2017-02-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | fix #22709 Recent pvgrub (from Grub built with “--with-platform=xen”) understands the Grub2 configuration format. Grub legacy configuration (menu.lst) is ignored.
* | | | | | | herbstluftwm module: add configFile optionAnders Papitto2017-02-21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | based on the equivalent for i3
* | | | | | | systemd: Properly escape environment options.Kevin Cox2017-02-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Using toJSON on a string value works because the allowed JSON escape sequences is almost a subset of the systemd allowed escape sequences. The only exception is `\/` which JSON allows but systemd doesn't. Luckily this sequence isn't required and toJSON don't produce it making the result valid for systemd consumption. Examples of things that this fixes are environment variables with double quotes or newlines.
* | | | | | | Merge pull request #22941 from mayflower/systemd-tmpfilesRobin Gloster2017-02-20
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | systemd: setup tmpfiles on switching configuration
| * | | | | | | systemd: setup tmpfiles on switching configurationRobin Gloster2017-02-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This fixes systemd.tmpfiles.rules on switching configuration so that does not only get applied on a fresh boot. This e.g. fixes kubernetes.
* | | | | | | | nixos.openntpd: don't spam systemd journalRicardo M. Correia2017-02-20
| |_|_|_|_|/ / |/| | | | | | | | | | | | | | | | | | | | | | | | | | | Starting `ntpd` with the `-d` option spams the systemd journal. Instead, let the server fork.
* | | | | | | systemd-boot: Unlink loader.conf if it existsaszlig2017-02-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Since systemd version 232 the install subcommand of bootctl opens the loader.conf with fopen() modes "wxe", where the "e" stands for exclusive, so the call will fail if the file exists. For installing the boot loader just once this is fine, but if we're using NIXOS_INSTALL_BOOTLOADER on a systemd where the bootloader is already present this will fail. Exactly this is done within the simpleUefiGummiboot installer test, where nixos-install is called twice and thus the bootloader is also installed twice, resulting in an error during the fopen call: Failed to open loader.conf for writing: File exists Removing the file prior to calling bootctl should fix this. I've tested this using the installer.simpleUefiGummiboot test and it now succeeds. Signed-off-by: aszlig <aszlig@redmoonstudios.org> Cc: @edolstra, @shlevy, @mic92 Fixes: #22925
* | | | | | | systemd-boot: Make sure /etc/machine-id existsaszlig2017-02-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This leads to the following error when trying to install a new machine where the machine ID wasn't yet initialized during boot: Failed to get machine did: No such file or directory In addition this was also detected by the simpleUefiGummiboot installer test. So let's generate a fallback machine ID by using systemd-machine-id-setup before actually running bootctl. Tested this by running the installer.simpleUefiGummiboot test, it still fails but not because of the machine ID. Signed-off-by: aszlig <aszlig@redmoonstudios.org> Cc: @edolstra, @shlevy, @mic92 Fixes: #22561
* | | | | | | manual: Add link to config section (#22994)Lorenzo Manacorda2017-02-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add link to "Configuration" chapter from "Changing the Configuration" section. Also, fix grammar error. (cherry picked from commit a585f987fa32f2e81b3f273291971151c25f98b7)
* | | | | | | Merge pull request #23014 from zraexy/zraexy-bumblebee-pmmethodNikolay Amiantov2017-02-20
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | bumblebee service: Fix pmMethod bbswitch check
| * | | | | | | bumblebee service: Fix pmMethod bbswitch checkzraexy2017-02-19
| | | | | | | | | | | | | | | | | | | | | | | | Made useBbswitch work when pmMethod is "auto" and removed invalid pmMethod option "nouveau".
* | | | | | | | Merge pull request #22882 from bjornfor/wiresharkRobin Gloster2017-02-20
|\ \ \ \ \ \ \ \ | |/ / / / / / / |/| | | | | | | nixos: add programs.wireshark option
| * | | | | | | programs.wireshark: use setcap wrapperRobin Gloster2017-02-17
| | | | | | | |
| * | | | | | | nixos: add programs.wireshark optionBjørn Forsman2017-02-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | To be able to use Wireshark as an ordinary user, the 'dumpcap' program must be installed setuid root. This module module simplifies such a configuration to simply: programs.wireshark.enable = true; The setuid wrapper is available for users in the 'wireshark' group. Changes v1 -> v2: - add "defaultText" to the programs.wireshark.package option (AFAIK, that prevents the manual from being needlessly rebuilt when the package changes)
| * | | | | | | setcapWrapper: add support for setting permissionsRobin Gloster2017-02-17
| | |_|/ / / / | |/| | | | |
* | | | | | | munin service: listen on IPv6 loopback as well (#23012)florianjacob2017-02-20
| | | | | | | | | | | | | | | | | | | | | munin service: listen on IPv6 loopback as well