about summary refs log tree commit diff
path: root/nixos
Commit message (Collapse)AuthorAge
* Merge pull request #81809 from dguibert/dg/disnix-group-list-to-attrsetMichele Guerini Rocco2020-03-05
|\ | | | | users.groups.disnix instead of a list
| * users.groups.disnix instead of a listDavid Guibert2020-03-05
| | | | | | | | related to #63103.
* | create-amis: Add eu-north-1adisbladis2020-03-05
| |
* | nixos/release-notes: fix a tiny typoVladimír Čunát2020-03-05
|/
* Merge pull request #81708 from yegortimoshenko/acme-fullchain-force-symlinkSilvan Mosberger2020-03-04
|\ | | | | nixos/acme: force symlink from fullchain.pem to cert.pem
| * nixos/acme: force symlink from fullchain.pem to cert.pemYegor Timoshenko2020-03-04
| | | | | | | | Co-authored-by: emily <vcs@emily.moe>
* | Merge pull request #81597 from thatsmydoing/multiport-natMichele Guerini Rocco2020-03-04
|\ \ | | | | | | nixos/nat: fix multiple destination ports with loopback
| * | nixos/nat: fix multiple destination ports with loopbackThomas Dy2020-03-04
| | |
* | | Merge pull request #81610 from Mic92/zfsJörg Thalheim2020-03-04
|\ \ \ | | | | | | | | nixos/zfs: continue trimming also if one pool fails
| * | | nixos/zfs: continue trimming also if one pool failsJörg Thalheim2020-03-03
| | | | | | | | | | | | | | | | fixes https://github.com/NixOS/nixpkgs/issues/81602
* | | | Merge pull request #81405 from NinjaTrappeur/nin-networkd-policy-rulesMaximilian Bosch2020-03-04
|\ \ \ \ | |_|_|/ |/| | | nixos/networkd: add RoutingPolicyRules-related options
| * | | nixos/networkd: test routingPolicyRules with a nixos vm testFélix Baylac-Jacqué2020-03-02
| | | |
| * | | nixos/networkd: Add the RoutingPolicyRule-related optionsFélix Baylac-Jacqué2020-03-01
| | | |
* | | | Merge pull request #81327 from flokli/add-cageFlorian Klink2020-03-03
|\ \ \ \ | | | | | | | | | | nixos/cage: init
| * | | | nixos/cage: initMatthew Bauer2020-03-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add a cage module to nixos. This can be used to make kiosk-style systems that boot directly to a single application. The user (demo by default) is automatically logged in by this service and the program (xterm by default) is automatically started. This is useful for some embedded, single-user systems where we want automatic booting. To keep the system secure, the user should have limited privileges. Based on the service provided in the Cage wiki here: https://github.com/Hjdskes/cage/wiki/Starting-Cage-on-boot-with-systemd Co-Authored-By: Florian Klink <flokli@flokli.de>
* | | | | Merge pull request #81292 from hercules-ci/fix-service-runner-quotesRobert Hensing2020-03-03
|\ \ \ \ \ | |_|_|/ / |/| | | | nixos/service-runner.nix: Allow quotes in commands + test
| * | | | nixos/service-runner.nix: Allow quotes in commands + testRobert Hensing2020-02-28
| | | | |
* | | | | Merge pull request #81060 from andir/opensmtpd-timeoutAndreas Rammhold2020-03-03
|\ \ \ \ \ | |_|_|_|/ |/| | | | nixos/tests/opensmtpd: bump test (&build) timeout to 30m from 30s
| * | | | nixos/tests/opensmtpd: bump test (&build) timeout to 30m from 30sAndreas Rammhold2020-02-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | I am not sure how this ever passed on hydra but 30s is barely enough to pass the configure phase of opensmtpd. It is likely the package was built as part of another jobset. Whenever it is built as part of the test execution the timeout propagates and 30s is clearly not enough for that.
* | | | | Merge pull request #80900 from emilazy/acme-must-stapleYegor Timoshenko2020-03-03
|\ \ \ \ \ | | | | | | | | | | | | nixos/acme: Must-Staple and extra flags
| * | | | | nixos/acme: add extraLegoRenewFlags optionEmily2020-02-29
| | | | | |
| * | | | | nixos/acme: add ocspMustStaple optionEmily2020-02-29
| | | | | |
* | | | | | Merge pull request #80856 from emilazy/adjust-acmeYegor Timoshenko2020-03-03
|\ \ \ \ \ \ | | | | | | | | | | | | | | nixos/acme: adjust renewal timer options
| * | | | | | nixos/acme: adjust renewal timer optionsEmily2020-02-29
| |/ / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The current weekly setting causes every NixOS server to try to renew its certificate at midnight on the dot on Monday. This contributes to the general problem of periodic load spikes for Let's Encrypt; NixOS is probably not a major contributor to that problem, but we can lead by example by picking good defaults here. The values here were chosen after consulting with @yuriks, an SRE at Let's Encrypt: * Randomize the time certificates are renewed within a 24 hour period. * Check for renewal every 24 hours, to ensure the certificate is always renewed before an expiry notice is sent out. * Increase the AccuracySec (thus lowering the accuracy(!)), so that systemd can coalesce the renewal with other timers being run. (You might be worried that this would defeat the purpose of the time skewing, but systemd is documented as avoiding this by picking a random time.)
* | | | | | Merge pull request #80096 from tfc/port-rsyslogd-testFlorian Klink2020-03-02
|\ \ \ \ \ \ | | | | | | | | | | | | | | nixosTests.rsyslogd: Port to python
| * | | | | | nixosTests.rsyslogd: Port to pythonJacek Galowicz2020-02-27
| | | | | | |
* | | | | | | prometheus-nginx-exporter: 0.5.0 -> 0.6.0 (#81285)WilliButz2020-03-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * prometheus-nginx-exporter: 0.5.0 -> 0.6.0 * nixos/prometheus-nginx-exporter: update for 0.6.0 Added new option constLabels and updated virtualHost name in the exporter's test.
* | | | | | | nixos/release-notes: mention fix for predictable network-interfaces in initrdMaximilian Bosch2020-03-02
| | | | | | |
* | | | | | | Merge pull request #79532 from NixOS/fix-predictable-ifnames-in-initrdMaximilian Bosch2020-03-02
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | nixos/stage-1: fix predictable interface names in initrd
| * | | | | | | nixos/initrd-network: always run postCommandsFranz Pletz2020-02-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | As outlined in #71447, postCommands should always be run if networking in initrd is enabled. regardless if the configuration actually succeeded.
| * | | | | | | nixos/initrd-network: use ipconfig from klibcFranz Pletz2020-02-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This apparently has features that the version from Arch's mkinitcpio-nfs-utils does not have. Fixes #75314.
| * | | | | | | nixos/initrd-network: flush interfaces before stage 2Franz Pletz2020-02-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Depending on the network management backend being used, if the interface configuration in stage 1 is not cleared, there might still be some old addresses or routes from stage 1 present in stage 2 after network configuration has finished.
| * | | | | | | nixos/stage-1: fix predictable interfaces namesFranz Pletz2020-02-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This makes predictable interfaces names available as soon as possible with udev by adding the default network link units to initrd which are read by udev. Also adds some udev rules that are needed but which would normally loaded from the udev store path which is not included in the initrd.
* | | | | | | | Merge pull request #79925 from mrkkrp/mk/add-nix-store-gcs-proxy-serviceAndreas Rammhold2020-03-02
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | Add nix-store-gcs-proxy service
| * | | | | | | | module/nix-store-gcs-proxy: initMark Karpov2020-03-02
| | | | | | | | |
* | | | | | | | | Merge pull request #81164 from Mic92/home-assistantJörg Thalheim2020-03-02
|\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | nixos/home-assistant: 0.104.3 -> 0.106.0
| * | | | | | | | | nixos/home-assistant: make config deep mergeableJörg Thalheim2020-02-28
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This make it possible to split the home-assistant configuration across multiple files and nix will merge the option in an intuitive way.
* | | | | | | | | | services.mailman: RemainAfterExit so settings take effect properlyBenjamin Staffin2020-03-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Prior to this fix, changes to certain settings would not be applied automatically and users would have to know to manually restart the affected service. A prime example of this is `services.mailman.hyperkitty.baseUrl`, or various things that affect `mailman3/settings.py`
* | | | | | | | | | Merge pull request #81473 from pacien/riot-no-phoning-home-release-notes-20-03Michele Guerini Rocco2020-03-02
|\ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | riot-web: mention incompatible config change in release notes
| * | | | | | | | | | riot-web: mention incompatible config change in release notespacien2020-03-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Mention the changes introduced in commit c9e5cca. GitHub: closes #81416
* | | | | | | | | | | Merge pull request #77405 from danielfullmer/zerotier-mac-fixobadz2020-03-01
|\ \ \ \ \ \ \ \ \ \ \ | |_|_|_|_|_|_|_|_|_|/ |/| | | | | | | | | | nixos/zerotierone: prevent systemd from changing MAC address
| * | | | | | | | | | nixos/zerotierone: prevent systemd from changing MAC addressDaniel Fullmer2020-01-09
| | | | | | | | | | |
* | | | | | | | | | | doc/xfce: remove trailing codeworldofpeace2020-03-01
| | | | | | | | | | |
* | | | | | | | | | | Merge pull request #66601 from eadwu/nvidia/prime-render-offloadJosé Romildo Malaquias2020-03-01
|\ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | nvidia: prime render offload
| * | | | | | | | | | | nixos/nvidia: implement prime render offloadEdmund Wu2019-12-10
| | | | | | | | | | | |
| * | | | | | | | | | | nixos/xserver: introduce attr display to xserver.driversEdmund Wu2019-12-10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Specifically for NVIDIA so that only the device section would be created
| * | | | | | | | | | | nixos/nvidia: prime.sync.{intel,nvidia}BusId -> prime.{intel,nvidia}BusIdEdmund Wu2019-12-10
| | | | | | | | | | | |
| * | | | | | | | | | | nixos/nvidia: optimus_prime -> prime.syncEdmund Wu2019-12-10
| | | | | | | | | | | |
| * | | | | | | | | | | nixos/nvidia: remove lib referencesEdmund Wu2019-12-10
| | | | | | | | | | | |
* | | | | | | | | | | | Merge pull request #80451 from worldofpeace/pantheon-docworldofpeace2020-03-01
|\ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | nixos/pantheon: add docs