| Commit message (Collapse) | Author | Age |
|
|
|
| |
Backport: 14.04
|
|
|
|
|
|
|
|
|
| |
Restarting user@ instances is bad because it causes all user services
(such as ssh-agent.service) to be restarted. Maybe one day we can have
switch-to-configuration restart user units in a fine-grained way, but
for now we should just ignore user systemd instances.
Backport: 14.04
|
|
|
|
| |
Signed-off-by: Austin Seipp <aseipp@pobox.com>
|
|
|
|
| |
Signed-off-by: Austin Seipp <aseipp@pobox.com>
|
| |
|
|
|
|
| |
The shutdown was announced years ago, only now it stopped working.
|
|
|
|
| |
(cherry picked from commit ecdb0f7867007b2e5ae0d14a0994d3b502d90fa7)
|
|\
| |
| | |
notbit: Bump version and add more configuration options
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| | |
This now provides a handful of different grsecurity kernels for slightly
different 'flavors' of packages. This doesn't change the grsecurity
module to use them just yet, however.
Signed-off-by: Austin Seipp <aseipp@pobox.com>
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
AppArmor only requires a few patches to the 3.2 and 3.4 kernels in order
to work properly (with the minor catch grsecurity -stable includes the
3.2 patches.) This adds them to the kernel builds by default, removes
features.apparmor (since it's always true) and makes it the default MAC
system.
Signed-off-by: Austin Seipp <aseipp@pobox.com>
|
|\ \
| | |
| | | |
Phabricator, a web application, snapshot of 2014-05-12
|
| | | |
|
|\ \ \
| |_|/
|/| | |
nixos/graphite-service: fix startup
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
mkdir -m will only set the permissions if it *creates* the directory.
Existing directories, with possibly wrong permissions, will not be
updated.
Use explicit chmod so permissions will always be correct.
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
The preStart snippets (graphite, carbon) try to create directories under
/var/db/. That currently fails because the code is run as user
"graphite". Fix by setting "PermissionsStartOnly = true" so that the
preStart stuff is run as 'root'.
Further:
* graphite-web-0.9.12/bin/build-index.sh needs perl, so add it to PATH.
* Now that preStart runs as root, we must wait with "chown graphite"
until we're done creating files/directories.
* Drop needless check for root (uid 0) before running chown.
|
| | | |
|
|\ \ \
| | | |
| | | | |
gtkhtml, evolution, gnome-photos, gnome-clocks, zeitgeist, bijiben
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Note editor designed to remain simple to use
https://wiki.gnome.org/Apps/Bijiben
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Clock application designed for GNOME 3
https://wiki.gnome.org/Apps/Clocks
|
| | | | |
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Photos is an application to access, organize and share your photos with GNOME 3
https://wiki.gnome.org/Apps/Photos
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Personal information management application that provides integrated mail,
calendaring and address book functionality
https://wiki.gnome.org/Apps/Evolution
|
| |_|/
|/| | |
|
| | | |
|
| | | |
|
| | | |
|
|\ \ \
| | | |
| | | | |
sudo: env_keep TERMINFO for urxvt
|
| | | | |
|
| | | |
| | | |
| | | |
| | | | |
unpartioned disks
|
| | | |
| | | |
| | | |
| | | | |
Fixes #2585.
|
| | | |
| | | |
| | | |
| | | | |
This prevents the activation script from clobbering our hostname.
|
| | | | |
|
| | | |
| | | |
| | | |
| | | |
| | | | |
We only need a copy of /etc/resolv.conf for networking, and
/etc/{passwd,group} for building.
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
"nixos-install --chroot" runs a command (by default a login shell) in
a chroot inside the NixOS installation in /mnt. This might useful for
poking around a new installation.
|
| | | |
| | | |
| | | |
| | | | |
This removes the need to have an initially empty root password.
|
| | | |
| | | |
| | | |
| | | | |
This makes re-running nixos-install a bit faster.
|
| | | |
| | | |
| | | |
| | | | |
The build user group is always "nixbld", so no need to detect it.
|
| | | |
| | | |
| | | |
| | | | |
This ensures that all mounts are automatically cleaned up.
|
| | | | |
|
| | | | |
|
| | | | |
|
| | | | |
|
| | | | |
|
| | | |
| | | |
| | | |
| | | |
| | | | |
The last ID wasn't in official README,
but it was reported by third3ye on IRC.
|
| | | | |
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
On x86_64, 384 MB is not enough anymore for running "nix-env -i".
http://hydra.nixos.org/build/10865007
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
By setting a line like
MACVLANS="eno1"
in /etc/containers/<name>.conf, the container will get an Ethernet
interface named mv-eno1, which represents an additional MAC address on
the physical eno1 interface. Thus the container has direct access to
the physical network. You can specify multiple interfaces in MACVLANS.
Unfortunately, you can't do this with wireless interfaces.
Note that dhcpcd is disabled in containers by default, so you'll
probably want to set
networking.useDHCP = true;
in the container, or configure a static IP address.
To do: add a containers.* option for this, and a flag for
"nixos-container create".
|