about summary refs log tree commit diff
path: root/nixos
Commit message (Collapse)AuthorAge
...
* | | | | | | | nixos/cage: move ConditionPathExists to service configFlorian Klink2020-03-09
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It doesn't belong into [Service]: > Unknown key name 'ConditionPathExists' in section 'Service', ignoring.
* | | | | | | | Merge pull request #80921 from hercules-ci/buildLayeredImage-allow-empty-storeDomen Kožar2020-03-08
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | buildLayeredImage: Allow empty store, no paths to add
| * | | | | | | | buildLayeredImage: Allow empty store, no paths to addRobert Hensing2020-02-28
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is useful when buildLayeredImage is called in a generic way that should allow simple (base) images to be built, which may not reference any store paths.
* | | | | | | | | Merge pull request #79488 from danielfullmer/zoneminder-1.34.2Dmitry Kalinkin2020-03-07
|\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | zoneminder: 1.32.3 -> 1.34.3
| * | | | | | | | | nixos/zoneminder: update on startup if neededDaniel Fullmer2020-03-07
| | | | | | | | | |
* | | | | | | | | | Merge pull request #81369 from mweinelt/pr/acme-chmodSilvan Mosberger2020-03-07
|\ \ \ \ \ \ \ \ \ \ | |_|_|_|/ / / / / / |/| | | | | | | | | nixos/acme: apply chmod and ownership unconditionally
| * | | | | | | | | nixos/acme: apply chmod and ownership unconditionallyMartin Weinelt2020-02-29
| | |_|_|_|/ / / / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Also separate directory and file permissions so the certificate files don't end up with the executable bit. Fixes #81335
* | | | | | | | | Merge pull request #81907 from atlaua/lr/wg-typoLancelot SIX2020-03-06
|\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | nixos/wireguard: Fix typo in error message
| * | | | | | | | | nixos/wireguard: Fix typo in error messageLuis Ressel2020-03-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | generatePrivateKey -> generatePrivateKeyFile
* | | | | | | | | | Merge pull request #81891 from emilazy/nginx-use-mozilla-tls-configJörg Thalheim2020-03-06
|\ \ \ \ \ \ \ \ \ \ | |/ / / / / / / / / |/| | | | | | | | | nixos/nginx: use Mozilla Intermediate TLS configuration
| * | | | | | | | | nixos/nginx: use Mozilla Intermediate TLS configurationEmily2020-03-06
| | |_|_|/ / / / / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The configuration at https://ssl-config.mozilla.org/#server=nginx&config=intermediate is reliably kept up-to-date in terms of security and compatible with a wide range of clients. They've probably had more care and thought put into them than our defaults, and will be easier to keep updated in the future. The only removed (rather than changed) configuration option here is ssl_ecdh_curve, per https://github.com/mozilla/server-side-tls/issues/189. Resolves #80952.
* | | | | | | | | Merge pull request #81752 from alexbakker/fix-55221Jörg Thalheim2020-03-06
|\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | uwsgi: use pyhome instead of pythonpath for uwsgi vassals
| * | | | | | | | | uwsgi: use pyhome instead of pythonpath for uwsgi vassalsAlexander Bakker2020-03-04
| | | | | | | | | |
* | | | | | | | | | Merge pull request #81774 from ju1m/shorewall_fix_RestartTriggersSilvan Mosberger2020-03-06
|\ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | shorewall: fix RestartTriggers
| * | | | | | | | | | shorewall: fix RestartTriggersJulien Moutinho2020-03-05
| |/ / / / / / / / /
* | | | | | | | | | nixos/prometheus-mikrotik-exporter: initMartin Milata2020-03-06
| | | | | | | | | |
* | | | | | | | | | nixos/tests/prometheus-exporters: increase memory for rspamdWilliButz2020-03-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Before this, the test failed because rspamd did invoke the oom-killer.
* | | | | | | | | | nixos/prometheus-mail-exporter: misc fixesMartin Milata2020-03-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - Fix misspelled option. mkRenamedOptionModule is not used because the option hasn't really worked before. - Add missing cfg.telemetryPath arg to ExecStart. - Fix mkdir invocation in test.
* | | | | | | | | | nixos/prometheus-mail-exporter: fix assertionMartin Milata2020-03-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The assertion was printed when user explicitly defined only the configFile option.
* | | | | | | | | | nixos/prometheus-snmp-exporter: fix assertionMartin Milata2020-03-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The assertion was printed when user explicitly defined only the configurationPath option.
* | | | | | | | | | nixos/prometheus-snmp-exporter: update log optionsMartin Milata2020-03-06
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The allowed values have changed in bd3319d28c43580c74839a10dca5d348cc3e0b29. 0.15: --log.level="info" Only log messages with the given severity or above. Valid levels: [debug, info, warn, error, fatal] --log.format="logger:stderr" Set the log target and format. Example: "logger:syslog?appname=bob&local=7" or "logger:stdout?json=true" 0.17: --log.level=info Only log messages with the given severity or above. One of: [debug, info, warn, error] --log.format=logfmt Output format of log messages. One of: [logfmt, json]
* | | | | | | | | | nixos/prometheus-*-exporter: escape shell argsMartin Milata2020-03-06
| | | | | | | | | |
* | | | | | | | | | Merge pull request #81809 from dguibert/dg/disnix-group-list-to-attrsetMichele Guerini Rocco2020-03-05
|\ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | users.groups.disnix instead of a list
| * | | | | | | | | | users.groups.disnix instead of a listDavid Guibert2020-03-05
| |/ / / / / / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | related to #63103.
* | / / / / / / / / create-amis: Add eu-north-1adisbladis2020-03-05
| |/ / / / / / / / |/| | | | | | | |
* | | | | | | | | nixos/release-notes: fix a tiny typoVladimír Čunát2020-03-05
|/ / / / / / / /
* | | | | | | | Merge pull request #81708 from yegortimoshenko/acme-fullchain-force-symlinkSilvan Mosberger2020-03-04
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | nixos/acme: force symlink from fullchain.pem to cert.pem
| * | | | | | | | nixos/acme: force symlink from fullchain.pem to cert.pemYegor Timoshenko2020-03-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Co-authored-by: emily <vcs@emily.moe>
* | | | | | | | | Merge pull request #81597 from thatsmydoing/multiport-natMichele Guerini Rocco2020-03-04
|\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | nixos/nat: fix multiple destination ports with loopback
| * | | | | | | | | nixos/nat: fix multiple destination ports with loopbackThomas Dy2020-03-04
| | | | | | | | | |
* | | | | | | | | | Merge pull request #81610 from Mic92/zfsJörg Thalheim2020-03-04
|\ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | nixos/zfs: continue trimming also if one pool fails
| * | | | | | | | | | nixos/zfs: continue trimming also if one pool failsJörg Thalheim2020-03-03
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | fixes https://github.com/NixOS/nixpkgs/issues/81602
* | | | | | | | | | | Merge pull request #81405 from NinjaTrappeur/nin-networkd-policy-rulesMaximilian Bosch2020-03-04
|\ \ \ \ \ \ \ \ \ \ \ | |_|_|/ / / / / / / / |/| | | | | | | | | | nixos/networkd: add RoutingPolicyRules-related options
| * | | | | | | | | | nixos/networkd: test routingPolicyRules with a nixos vm testFélix Baylac-Jacqué2020-03-02
| | | | | | | | | | |
| * | | | | | | | | | nixos/networkd: Add the RoutingPolicyRule-related optionsFélix Baylac-Jacqué2020-03-01
| | | | | | | | | | |
* | | | | | | | | | | Merge pull request #81327 from flokli/add-cageFlorian Klink2020-03-03
|\ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | nixos/cage: init
| * | | | | | | | | | | nixos/cage: initMatthew Bauer2020-03-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add a cage module to nixos. This can be used to make kiosk-style systems that boot directly to a single application. The user (demo by default) is automatically logged in by this service and the program (xterm by default) is automatically started. This is useful for some embedded, single-user systems where we want automatic booting. To keep the system secure, the user should have limited privileges. Based on the service provided in the Cage wiki here: https://github.com/Hjdskes/cage/wiki/Starting-Cage-on-boot-with-systemd Co-Authored-By: Florian Klink <flokli@flokli.de>
* | | | | | | | | | | | Merge pull request #81292 from hercules-ci/fix-service-runner-quotesRobert Hensing2020-03-03
|\ \ \ \ \ \ \ \ \ \ \ \ | |_|_|/ / / / / / / / / |/| | | | | | | | | | | nixos/service-runner.nix: Allow quotes in commands + test
| * | | | | | | | | | | nixos/service-runner.nix: Allow quotes in commands + testRobert Hensing2020-02-28
| | |_|_|_|_|_|_|/ / / | |/| | | | | | | | |
* | | | | | | | | | | Merge pull request #81060 from andir/opensmtpd-timeoutAndreas Rammhold2020-03-03
|\ \ \ \ \ \ \ \ \ \ \ | |_|_|_|/ / / / / / / |/| | | | | | | | | | nixos/tests/opensmtpd: bump test (&build) timeout to 30m from 30s
| * | | | | | | | | | nixos/tests/opensmtpd: bump test (&build) timeout to 30m from 30sAndreas Rammhold2020-02-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | I am not sure how this ever passed on hydra but 30s is barely enough to pass the configure phase of opensmtpd. It is likely the package was built as part of another jobset. Whenever it is built as part of the test execution the timeout propagates and 30s is clearly not enough for that.
* | | | | | | | | | | Merge pull request #80900 from emilazy/acme-must-stapleYegor Timoshenko2020-03-03
|\ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | nixos/acme: Must-Staple and extra flags
| * | | | | | | | | | | nixos/acme: add extraLegoRenewFlags optionEmily2020-02-29
| | | | | | | | | | | |
| * | | | | | | | | | | nixos/acme: add ocspMustStaple optionEmily2020-02-29
| | | | | | | | | | | |
* | | | | | | | | | | | Merge pull request #80856 from emilazy/adjust-acmeYegor Timoshenko2020-03-03
|\ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | nixos/acme: adjust renewal timer options
| * | | | | | | | | | | | nixos/acme: adjust renewal timer optionsEmily2020-02-29
| |/ / / / / / / / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The current weekly setting causes every NixOS server to try to renew its certificate at midnight on the dot on Monday. This contributes to the general problem of periodic load spikes for Let's Encrypt; NixOS is probably not a major contributor to that problem, but we can lead by example by picking good defaults here. The values here were chosen after consulting with @yuriks, an SRE at Let's Encrypt: * Randomize the time certificates are renewed within a 24 hour period. * Check for renewal every 24 hours, to ensure the certificate is always renewed before an expiry notice is sent out. * Increase the AccuracySec (thus lowering the accuracy(!)), so that systemd can coalesce the renewal with other timers being run. (You might be worried that this would defeat the purpose of the time skewing, but systemd is documented as avoiding this by picking a random time.)
* | | | | | | | | | | | Merge pull request #80096 from tfc/port-rsyslogd-testFlorian Klink2020-03-02
|\ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | nixosTests.rsyslogd: Port to python
| * | | | | | | | | | | | nixosTests.rsyslogd: Port to pythonJacek Galowicz2020-02-27
| | | | | | | | | | | | |
* | | | | | | | | | | | | prometheus-nginx-exporter: 0.5.0 -> 0.6.0 (#81285)WilliButz2020-03-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * prometheus-nginx-exporter: 0.5.0 -> 0.6.0 * nixos/prometheus-nginx-exporter: update for 0.6.0 Added new option constLabels and updated virtualHost name in the exporter's test.
* | | | | | | | | | | | | nixos/release-notes: mention fix for predictable network-interfaces in initrdMaximilian Bosch2020-03-02
| | | | | | | | | | | | |