about summary refs log tree commit diff
path: root/nixos
Commit message (Collapse)AuthorAge
* Fix udev rule required by gpmEelco Dolstra2014-05-20
| | | | Backport: 14.04
* switch-to-configuration: Don't restart instances of user@.serviceEelco Dolstra2014-05-20
| | | | | | | | | Restarting user@ instances is bad because it causes all user services (such as ssh-agent.service) to be restarted. Maybe one day we can have switch-to-configuration restart user units in a fine-grained way, but for now we should just ignore user systemd instances. Backport: 14.04
* nixos/duosec: Add an option to allow TCP forwardingAustin Seipp2014-05-20
| | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* Fix fallout from 4f27ad14Austin Seipp2014-05-18
| | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* fix eval after previous commitVladimír Čunát2014-05-18
|
* berlios.de probably shut down, replace itVladimír Čunát2014-05-18
| | | | The shutdown was announced years ago, only now it stopped working.
* Fix dogstatsd, needs procps in path.Rob Vermaas2014-05-18
| | | | (cherry picked from commit ecdb0f7867007b2e5ae0d14a0994d3b502d90fa7)
* Merge pull request #2604 from wkennington/master.notbitAustin Seipp2014-05-17
|\ | | | | notbit: Bump version and add more configuration options
| * notbit: Add additional options to the daemonWilliam A. Kennington III2014-05-13
| |
| * notbit: Don't include unecessary notbit binaries in the environmentWilliam A. Kennington III2014-05-13
| |
| * notbit: Use the correct default portWilliam A. Kennington III2014-05-13
| |
* | grsec: refactor grsecurity packagesAustin Seipp2014-05-17
| | | | | | | | | | | | | | | | This now provides a handful of different grsecurity kernels for slightly different 'flavors' of packages. This doesn't change the grsecurity module to use them just yet, however. Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | kernel: enable AppArmor by defaultAustin Seipp2014-05-17
| | | | | | | | | | | | | | | | | | | | AppArmor only requires a few patches to the 3.2 and 3.4 kernels in order to work properly (with the minor catch grsecurity -stable includes the 3.2 patches.) This adds them to the kernel builds by default, removes features.apparmor (since it's always true) and makes it the default MAC system. Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | Merge pull request #2629 from letac/masterAustin Seipp2014-05-14
|\ \ | | | | | | Phabricator, a web application, snapshot of 2014-05-12
| * | Phabricator, a web application, snapshot of 2014-05-12Strahinja Popovic2014-05-12
| | |
* | | Merge pull request #2301 from bjornfor/graphite-fixeslethalman2014-05-14
|\ \ \ | |_|/ |/| | nixos/graphite-service: fix startup
| * | nixos/grahite-service: mkdir -m => mkdir && chmodBjørn Forsman2014-04-17
| | | | | | | | | | | | | | | | | | | | | | | | mkdir -m will only set the permissions if it *creates* the directory. Existing directories, with possibly wrong permissions, will not be updated. Use explicit chmod so permissions will always be correct.
| * | nixos/graphite-service: fix startup issueBjørn Forsman2014-04-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The preStart snippets (graphite, carbon) try to create directories under /var/db/. That currently fails because the code is run as user "graphite". Fix by setting "PermissionsStartOnly = true" so that the preStart stuff is run as 'root'. Further: * graphite-web-0.9.12/bin/build-index.sh needs perl, so add it to PATH. * Now that preStart runs as root, we must wait with "chown graphite" until we're done creating files/directories. * Drop needless check for root (uid 0) before running chown.
* | | Simple typoAthan Clark2014-05-13
| | |
* | | Merge pull request #2375 from lethalman/gnome3lethalman2014-05-13
|\ \ \ | | | | | | | | gtkhtml, evolution, gnome-photos, gnome-clocks, zeitgeist, bijiben
| * | | bijiben: new packageLuca Bruno2014-05-02
| | | | | | | | | | | | | | | | | | | | | | | | Note editor designed to remain simple to use https://wiki.gnome.org/Apps/Bijiben
| * | | gnome-clocks: new packageLuca Bruno2014-05-02
| | | | | | | | | | | | | | | | | | | | | | | | Clock application designed for GNOME 3 https://wiki.gnome.org/Apps/Clocks
| * | | geoclue2: add dbus serviceLuca Bruno2014-05-02
| | | |
| * | | gnome-photos: new packageLuca Bruno2014-05-02
| | | | | | | | | | | | | | | | | | | | | | | | Photos is an application to access, organize and share your photos with GNOME 3 https://wiki.gnome.org/Apps/Photos
| * | | evolution: new packageLuca Bruno2014-05-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Personal information management application that provides integrated mail, calendaring and address book functionality https://wiki.gnome.org/Apps/Evolution
* | | | resolve issue #2308Corey O'Connor2014-05-13
| |_|/ |/| |
* | | dhcpcd: Allow adding hook codeWout Mertens2014-05-12
| | |
* | | Set console=ttyS0 for Amazon EC2 instances, as suggested by Amazon.Rob Vermaas2014-05-12
| | |
* | | nixos: f2fs filesystem module support (close #2085)Emery Hemingway2014-05-11
| | |
* | | Merge pull request #2497 from aristidb/sudo_terminfomornfall2014-05-10
|\ \ \ | | | | | | | | sudo: env_keep TERMINFO for urxvt
| * | | sudo: env_keep TERMINFO for urxvtAristid Breitkreuz2014-05-04
| | | |
* | | | When auto-formatting ext devices, use the -F flag to make it work with ↵Rickard Nilsson2014-05-09
| | | | | | | | | | | | | | | | unpartioned disks
* | | | nixos-container: Ensure umask 022Eelco Dolstra2014-05-09
| | | | | | | | | | | | | | | | Fixes #2585.
* | | | nixos-install: Run in a separate UTS namespaceEelco Dolstra2014-05-09
| | | | | | | | | | | | | | | | This prevents the activation script from clobbering our hostname.
* | | | /var/run -> /runEelco Dolstra2014-05-09
| | | |
* | | | nixos-install: Don't bind-mount all of /etcEelco Dolstra2014-05-09
| | | | | | | | | | | | | | | | | | | | We only need a copy of /etc/resolv.conf for networking, and /etc/{passwd,group} for building.
* | | | nixos-install: Add operation --chrootEelco Dolstra2014-05-09
| | | | | | | | | | | | | | | | | | | | | | | | "nixos-install --chroot" runs a command (by default a login shell) in a chroot inside the NixOS installation in /mnt. This might useful for poking around a new installation.
* | | | nixos-install: Ask the user to set a root passwordEelco Dolstra2014-05-09
| | | | | | | | | | | | | | | | This removes the need to have an initially empty root password.
* | | | nixos-install: Don't copy the bootstrap Nix if it's already thereEelco Dolstra2014-05-09
| | | | | | | | | | | | | | | | This makes re-running nixos-install a bit faster.
* | | | nixos-install: Assume the build user group is "nixbld"Eelco Dolstra2014-05-09
| | | | | | | | | | | | | | | | The build user group is always "nixbld", so no need to detect it.
* | | | nixos-install: Run in a private mount namespaceEelco Dolstra2014-05-09
| | | | | | | | | | | | | | | | This ensures that all mounts are automatically cleaned up.
* | | | nixos-install: Don't pass --show-trace by defaultEelco Dolstra2014-05-09
| | | |
* | | | nixos-generator-config: Don't emit a double / in bind mountsEelco Dolstra2014-05-09
| | | |
* | | | nixos-generate-config: Don't include /var/setuid-wrappersEelco Dolstra2014-05-09
| | | |
* | | | nixos-generate-config: Use stable device paths (e.g. /dev/disk/by-uuid/X)Eelco Dolstra2014-05-09
| | | |
* | | | Don't enable the NVIDIA driver by default because it's unfreeEelco Dolstra2014-05-09
| | | |
* | | | nixos-generate-config.pl: add new PCI IDs for broadcom_staVladimír Čunát2014-05-08
| | | | | | | | | | | | | | | | | | | | The last ID wasn't in official README, but it was reported by third3ye on IRC.
* | | | Fix incorrect commentEelco Dolstra2014-05-08
| | | |
* | | | Installer test: Increase amount of RAMEelco Dolstra2014-05-07
| | | | | | | | | | | | | | | | | | | | | | | | On x86_64, 384 MB is not enough anymore for running "nix-env -i". http://hydra.nixos.org/build/10865007
* | | | Containers: Support setting up macvlan interfacesEelco Dolstra2014-05-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | By setting a line like MACVLANS="eno1" in /etc/containers/<name>.conf, the container will get an Ethernet interface named mv-eno1, which represents an additional MAC address on the physical eno1 interface. Thus the container has direct access to the physical network. You can specify multiple interfaces in MACVLANS. Unfortunately, you can't do this with wireless interfaces. Note that dhcpcd is disabled in containers by default, so you'll probably want to set networking.useDHCP = true; in the container, or configure a static IP address. To do: add a containers.* option for this, and a flag for "nixos-container create".