about summary refs log tree commit diff
path: root/nixos
Commit message (Collapse)AuthorAge
* Merge pull request #67728 from kisik21/bash-module-emacs-eterm-remote-prompt-fixMatthew Bauer2019-08-29
|\ | | | | nixos/bash: Improve Emacs detection for PS1
| * nixos/bash: Improve Emacs detection for PS1Vika2019-08-30
| | | | | | | | | | | | | | That's one of my itches - when I'm sshing from Emacs' term to a NixOS machine, it doesn't detect that I'm running emacs and showing a title escape sequence. This commit fixes it, checking against $TERM to prevent this from ever bothering anyone again.
* | rl-1909.xml: fix XML syntax error that broke the NixOS manualPeter Simons2019-08-29
|/
* Fix letsencrypt (#60219)Arian van Putten2019-08-29
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * nixos/acme: Fix ordering of cert requests When subsequent certificates would be added, they would not wake up nginx correctly due to target units only being triggered once. We now added more fine-grained systemd dependencies to make sure nginx always is aware of new certificates and doesn't restart too early resulting in a crash. Furthermore, the acme module has been refactored. Mostly to get rid of the deprecated PermissionStartOnly systemd options which were deprecated. Below is a summary of changes made. * Use SERVICE_RESULT to determine status This was added in systemd v232. we don't have to keep track of the EXITCODE ourselves anymore. * Add regression test for requesting mutliple domains * Deprecate 'directory' option We now use systemd's StateDirectory option to manage create and permissions of the acme state directory. * The webroot is created using a systemd.tmpfiles.rules rule instead of the preStart script. * Depend on certs directly By getting rid of the target units, we make sure ordering is correct in the case that you add new certs after already having deployed some. Reason it broke before: acme-certificates.target would be in active state, and if you then add a new cert, it would still be active and hence nginx would restart without even requesting a new cert. Not good! We make the dependencies more fine-grained now. this should fix that * Remove activationDelay option It complicated the code a lot, and is rather arbitrary. What if your activation script takes more than activationDelay seconds? Instead, one should use systemd dependencies to make sure some action happens before setting the certificate live. e.g. If you want to wait until your cert is published in DNS DANE / TLSA, you could create a unit that blocks until it appears in DNS: ``` RequiredBy=acme-${cert}.service After=acme-${cert}.service ExecStart=publish-wait-for-dns-script ```
* Merge pull request #66922 from davidak/netdata_enableCgroupAccountingFlorian Klink2019-08-29
|\ | | | | netdata: enable cgroup accounting
| * netdata: enable cgroup accountingdavidak2019-08-19
| |
* | Merge pull request #67606 from endocrimes/r-vault-1.2.2Jaka Hudoklin2019-08-29
|\ \ | | | | | | vault: 1.0.2 -> 1.2.2
| * | vault: add raft backend to vault serviceDanielle Lancashire2019-08-28
| | |
* | | nixos/gitlab-runner: add missing HOME to environment (#67450)Pascal Bach2019-08-28
| | | | | | | | | Gitlab runner fails to start if HOME is not set.
* | | Merge pull request #67626 from worldofpeace/xfce4-14-docworldofpeace2019-08-28
|\ \ \ | | | | | | | | rl-1909: add note about Xfce 4.14
| * | | rl-1909: add note about Xfce 4.14worldofpeace2019-08-28
| |/ /
* | | Merge pull request #64738 from rnhmjoj/magneticoSilvan Mosberger2019-08-28
|\ \ \ | | | | | | | | magnetico: init package and service
| * | | nixos/magnetico: add testrnhmjoj2019-08-28
| | | |
| * | | nixos/magnetico: init servicernhmjoj2019-08-28
| | | |
* | | | Merge pull request #65661 from davidak/containersSilvan Mosberger2019-08-28
|\ \ \ \ | | | | | | | | | | nixos-containers: add TimeoutStartSec option
| * | | | nixos-containers: add TimeoutStartSec optiondavidak2019-08-28
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Default is now 1m instead of global default of 15sec. It is also configurable. Fixes issue where start of many containers (40+) fail https://github.com/NixOS/nixpkgs/issues/65001
* | | | | Merge pull request #67260 from pstch/fix/xsession-allow-session-choiceMatthew Bauer2019-08-28
|\ \ \ \ \ | |/ / / / |/| | | | nixos/x11: provide selected session to custom session
| * | | | nixos/x11: provide selected session to custom sessionHugo Geoffroy2019-08-28
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The custom session script is always executed (when it exists). This change passes the selected session script and select session name to the custom session script, so that it can defer to the selected session script based on the value of the selected session name.
* | | | | Merge pull request #67394 from Ma27/drop-keys.target-dependencyLinus Heckemann2019-08-28
|\ \ \ \ \ | | | | | | | | | | | | nixos/treewide: drop dependencies to `keys.target`
| * | | | | nixos/treewide: drop dependencies to `keys.target`Maximilian Bosch2019-08-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The `keys.target` is used to indicate whether all NixOps keys were successfully uploaded on an unattended reboot. However this can cause startup issues e.g. with NixOS containers (see #67265) and can block boots even though this might not be needed (e.g. with a dovecot2 instance running that doesn't need any of the NixOps keys). As described in the NixOps manual[1], dependencies to keys should be defined like this now: ``` nix { systemd.services.myservice = { after = [ "secret-key.service" ]; wants = [ "secret-key.service" ]; }; } ``` However I'd leave the issue open until it's discussed whether or not to keep `keys.target` in `nixpkgs`. [1] https://nixos.org/nixops/manual/#idm140737322342384
* | | | | | Merge pull request #67487 from dasJ/suspend-then-hibernatePeter Hoeg2019-08-28
|\ \ \ \ \ \ | |_|_|_|/ / |/| | | | | nixos/systemd: Add suspend-then-hibernate units
| * | | | | nixos/systemd: Add suspend-then-hibernate unitsJanne Heß2019-08-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Pretty useful for laptops. I use them with: ``` services.logind.lidSwitch = "suspend-then-hibernate"; environment.etc."systemd/sleep.conf".text = "HibernateDelaySec=8h"; ```
* | | | | | Merge pull request #66859 from worldofpeace/xfce4-14-moduleworldofpeace2019-08-27
|\ \ \ \ \ \ | | | | | | | | | | | | | | nixos/xfce4-14: init
| * | | | | | nixosTests.xfce4-14: initworldofpeace2019-08-21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | This is pretty much identical to the xfce test we currently have.
| * | | | | | nixos/xfce4-14: initworldofpeace2019-08-21
| | |_|/ / / | |/| | | |
* | | | | | nix.conf: Set sandbox-fallback = falseEelco Dolstra2019-08-27
| | | | | | | | | | | | | | | | | | | | | | | | For security, we don't want the sandbox to be disabled silently.
* | | | | | Merge pull request #67549 from worldofpeace/gnome-control-center/fix-sharingworldofpeace2019-08-27
|\ \ \ \ \ \ | |_|_|/ / / |/| | | | | Fix sharing in gnome-control-center
| * | | | | nixos/gnome-user-share: cleanupworldofpeace2019-08-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * No sessionPath! * add to systemd.packages This is for the gnome-user-share-webdav.service. * Update option description
* | | | | | zsh: remove unfunction on TERM=dumbMatthew Bauer2019-08-27
| | | | | | | | | | | | | | | | | | Unfortunately this gives an error when precmd or preexec exists. Removing to avoid that.
* | | | | | Merge pull request #67556 from mmahut/matomoMarek Mahut2019-08-27
|\ \ \ \ \ \ | | | | | | | | | | | | | | nixos/matomo: fixing the configuration path
| * | | | | | nixos/matomo: fixing the configuration pathMarek Mahut2019-08-27
| |/ / / / /
* | | | | | nixos/dnschain: disable DNSSEC for namecoin TLDsrnhmjoj2019-08-27
| | | | | |
* | | | | | nixos/pdns-recursor: implement a `settings` option (#67251)Silvan Mosberger2019-08-27
|\ \ \ \ \ \ | | | | | | | | | | | | | | nixos/pdns-recursor: implement a `settings` option
| * | | | | | nixos/doc: mention extraConfig -> settings change in pdns-recursorrnhmjoj2019-08-26
| | | | | | |
| * | | | | | nixos/pdns-recursor: add luaConfig optionrnhmjoj2019-08-26
| | | | | | |
| * | | | | | nixos/pdns-recursor: implement a `settings` optionrnhmjoj2019-08-26
| | | | | | |
* | | | | | | Merge pull request #66984 from flokli/systemd-cgroup-accountingFlorian Klink2019-08-27
|\ \ \ \ \ \ \ | |_|/ / / / / |/| | | | | | nixos/systemd: enable systemd cgroup accounting by default
| * | | | | | nixos/systemd: add cgroup accounting testFlorian Klink2019-08-25
| | | | | | |
| * | | | | | nixos/systemd: enable cgroup accounting by defaultFlorian Klink2019-08-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If this is the default for OpenShift already, we probably can enable it as well. see https://github.com/openshift/machine-config-operator/pull/581
| * | | | | | nixos/systemd: add new Default{BlockIO,IP}Accounting settingsFlorian Klink2019-08-25
| | | | | | |
| * | | | | | nixos/systemd: honor default enableCgroupAccounting settingsFlorian Klink2019-08-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | systemd defaults DefaultMemoryAccounting and DefaultTasksAccounting to yes, so no need to enable explicitly
* | | | | | | Merge pull request #63634 from aanderse/moodleAaron Andersen2019-08-26
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | moodle: init at 3.7.1
| * | | | | | | nixos/moodle: init serviceAaron Andersen2019-08-25
| | | | | | | |
* | | | | | | | Merge pull request #67476 from matthewbauer/fix-66745Matthew Bauer2019-08-26
|\ \ \ \ \ \ \ \ | |_|_|/ / / / / |/| | | | | | | nixos/update-users-groups.pl: chomp hashedPassword
| * | | | | | | nixos/update-users-groups.pl: chomp hashedPasswordMatthew Bauer2019-08-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We don’t want any trailing whitespace, otherwise we mess up the formating of the shadow file. Some things like readFile may have the trailing new line. Fixes #66745
* | | | | | | | mailman: reserve uid & gid in NixOSPeter Simons2019-08-26
| | | | | | | |
* | | | | | | | nixos darkhttpd: module to enable darkhttpdPeter Hoeg2019-08-26
| | | | | | | |
* | | | | | | | Merge pull request #67466 from worldofpeace/gnome3-defaults-cleanupworldofpeace2019-08-26
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | nixos/gnome3: split up
| * | | | | | | | nixos/gnome3: split out gnome-flashbackworldofpeace2019-08-26
| | | | | | | | |
| * | | | | | | | nixos/gnome3: split upworldofpeace2019-08-26
| | |/ / / / / / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This introduces the following options under the services.gnome3 namespace: * core-os-services.enable * core-shell.enable * core-utilities.enable * games.enable The first three are all default enabled by gnome3.enable and their purpose is to make gnome3 more flexable for users usecases. In the case of core-utilities and games, it allows users to easily switch on the default gnome3 applications and games packages. Previously we had lists in gnome-3/default.nix but they weren't visible to the user. By having options we have generated documentation and an interface.