about summary refs log tree commit diff
path: root/nixos
Commit message (Collapse)AuthorAge
* Merge pull request #90646 from Ma27/matrix-maintainer-teamMaximilian Bosch2020-06-18
|\ | | | | maintainers/teams: add matrix team
| * maintainers/teams: add matrix teamMaximilian Bosch2020-06-17
| |
* | Merge pull request #89486 from Ma27/dovecot-mailboxeslewo2020-06-17
|\ \ | | | | | | nixos/dovecot2: turn `mailboxes`-option into an attr-set
| * | nixos/dovecot2: refactor mailboxes optionMaximilian Bosch2020-06-17
| | | | | | | | | | | | | | | | | | | | | Specifying mailboxes as a list isn't a good approach since this makes it impossible to override values. For backwards-compatibility, it's still possible to declare a list of mailboxes, but a deprecation warning will be shown.
| * | nixos/dovecot2: add autoexpunge settingMaximilian Bosch2020-06-17
| | | | | | | | | | | | | | | | | | To automatically purge old email. See also https://wiki.dovecot.org/MailboxSettings
* | | Merge pull request #74589 from tmplt/fix-physlockSilvan Mosberger2020-06-17
|\ \ \ | | | | | | | | nixos/physlock: add suspend-then-hibernate to lockOn.suspend units
| * | | nixos/physlock: add suspend-then-hibernate to suspend/hibernate unitstmplt2020-06-16
| | | |
* | | | Merge pull request #83171 from rnhmjoj/hashMichele Guerini Rocco2020-06-17
|\ \ \ \ | | | | | | | | | | nixos/users: validate password hashes
| * | | | nixos/users: validate password hashesrnhmjoj2020-06-15
| | | | |
* | | | | Merge pull request #89814 from alexfmpe/patch-3Lassulus2020-06-17
|\ \ \ \ \ | | | | | | | | | | | | Fix typo
| * | | | | Fix typoAlexandre Esteves2020-06-08
| | | | | |
* | | | | | nixos/manual: Document `boot.debug1mounts` and clarify what `exit` does with ↵jakobrs2020-06-17
| |_|_|/ / |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | `shell_on_fail` (#89365) * nixos/manual: document boot.debug1mounts * nixos/manual: clarify what `exit` does with shell_on_fail
* | | | | Merge pull request #90604 from maralorn/systemd-oneshot-warningFlorian Klink2020-06-16
|\ \ \ \ \ | |_|_|_|/ |/| | | | nixos/systemd: Update warning for restarting oneshots
| * | | | nixos/systemd: Update warning for restarting oneshotsMalte Brandy2020-06-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Restart= can be anything other than on-success and always for onehost units as of https://github.com/systemd/systemd/pull/13754/commits/10e72727eeeeb1a495303ec406fa8d1e1a83dc6e which is contained in systemd 245.
* | | | | Merge pull request #90051 from fabianhauser/hamster-time-trackerJan Tojnar2020-06-16
|\ \ \ \ \
| * | | | | hamster: init at 3.0.2Fabian Hauser2020-06-10
| | | | | |
* | | | | | Merge pull request #87833 from Izorkin/sandbox-mysqlJörg Thalheim2020-06-16
|\ \ \ \ \ \
| * | | | | | nixos/mysql: fix init databases on first start in sandbox modeIzorkin2020-06-10
| | | | | | |
| * | | | | | nixos/mysql: update tmpfiles rulesIzorkin2020-06-10
| | | | | | |
| * | | | | | nixos/mysql: enable sandbox modeIzorkin2020-06-10
| | | | | | |
* | | | | | | Merge pull request #90539 from r-ryantm/auto-update/fwupdJan Tojnar2020-06-16
|\ \ \ \ \ \ \
| * | | | | | | fwupd: Add passthru consistency testJan Tojnar2020-06-16
| | |_|_|_|/ / | |/| | | | | | | | | | | | | | | | | | | We need to keep the passthru.filesInstalledToEtc and passthru.defaultBlacklistedPlugins in sync with the package contents so let's add a test to enforce that.
* | | | | | | Merge pull request #89327 from mweinelt/go-neb-moduleAaron Andersen2020-06-16
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | nixos/go-neb: init
| * | | | | | | nixos/tests/go-neb: initMartin Weinelt2020-06-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Simple test to start the unit with a dummy client and a dummy service and check if it can receive webhooks.
| * | | | | | | nixos/go-neb: initMartin Weinelt2020-06-02
| | | | | | | |
* | | | | | | | Merge pull request #90386 from danielfullmer/systemd-bootctl-updateFlorian Klink2020-06-16
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | nixos/systemd-boot: update bootloader if needed
| * | | | | | | | nixos/systemd-boot: fix default boot entry selectionFlorian Klink2020-06-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | https://github.com/systemd/systemd/commit/6cd12ebcfe459466257ea63022a32515d756e719 changed behaviour - now the "default" entry needs to identity an entry with its full name, including the ".conf". Reported-In: https://github.com/NixOS/nixpkgs/issues/86422
| * | | | | | | | nixos/systemd-boot: add test for updatingDaniel Fullmer2020-06-15
| | | | | | | | |
| * | | | | | | | nixos/systemd-boot: update bootloader if neededDaniel Fullmer2020-06-15
| | | | | | | | |
* | | | | | | | | nixos/modules/system/boot/networkd: enable socket activationAndreas Rammhold2020-06-16
| |_|_|_|_|/ / / |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Since cd1dedac67d4b077a556a660ef5724c909da8006 systemd-networkd has it's netlink socket created via a systemd.socket unit. One might think that this doesn't make much sense since networkd is just going to create it's own socket on startup anyway. The difference here is that we have configuration-time control over things like socket buffer sizes vs compile-time constants. For larger setups where networkd has to create a lot of (virtual) devices the default buffer size of currently 128MB is not enough. A good example is a machine with >100 virtual interfaces (e.g., wireguard tunnels, VLANs, …) that all have to be brought up during startup. The receive buffer size will spike due to all the generated message from the new interfaces. Eventually some of the message will be dropped since there is not enough (permitted) buffer space available. By having networkd start through / with a netlink socket created by systemd we can configure the `ReceiveBufferSize` parameter in the socket options without recompiling networkd. Since the actual memory requirements depend on hardware, timing, exact configurations etc. it isn't currently possible to infer a good default from within the NixOS module system. Administrators are advised to monitor the logs of systemd-networkd for `rtnl: kernel receive buffer overrun` spam and increase the memory as required. Note: Increasing the ReceiveBufferSize doesn't allocate any memory. It just increases the upper bound on the kernel side. The memory allocation depends on the amount of messages that are queued on the kernel side of the netlink socket.
* | | | | | | | Merge pull request #90391 from samueldr/fix/manual-zstd-noteSamuel Dionne-Riel2020-06-15
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | nixos/release-notes: Amend note about image compression
| * | | | | | | | nixos/release-notes: Amend note about image compressionSamuel Dionne-Riel2020-06-15
| | | | | | | | |
* | | | | | | | | Merge pull request #90343 from flokli/hardware-u2f-removeFlorian Klink2020-06-15
|\ \ \ \ \ \ \ \ \ | |_|_|_|/ / / / / |/| | | | | | | | hardware/u2f: remove module
| * | | | | | | | hardware/u2f: remove moduleFlorian Klink2020-06-14
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | udev gained native support to handle FIDO security tokens, so we don't need a module which only added the now obsolete udev rules. Fixes: https://github.com/NixOS/nixpkgs/issues/76482
* | | | | | | | | Merge master into staging-nextFrederik Rietdijk2020-06-15
|\ \ \ \ \ \ \ \ \
| * \ \ \ \ \ \ \ \ Merge pull request #90380 from mdlayher/mdl-corerad-passasfileSilvan Mosberger2020-06-15
| |\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | nixos/corerad: use passAsFile while converting settings JSON to TOML
| | * | | | | | | | | nixos/corerad: use passAsFile while converting settings JSON to TOMLMatt Layher2020-06-14
| | | |/ / / / / / / | | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | Signed-off-by: Matt Layher <mdlayher@gmail.com>
| * | | | | | | | | Merge pull request #90297 from lheckemann/other-distro-tool-install-commandMaximilian Bosch2020-06-15
| |\ \ \ \ \ \ \ \ \ | | |/ / / / / / / / | |/| | | | | | | | manual: use less weird way of installing nixos tools
| | * | | | | | | | manual: use less weird way of installing nixos toolsLinus Heckemann2020-06-14
| | | | | | | | | |
| * | | | | | | | | Merge pull request #89781 from mdlayher/mdl-corerad-settingsSilvan Mosberger2020-06-14
| |\ \ \ \ \ \ \ \ \ | | |_|/ / / / / / / | |/| | | | | | | |
| | * | | | | | | | nixos/corerad: add settings option to supersede configFileMatt Layher2020-06-14
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Signed-off-by: Matt Layher <mdlayher@gmail.com>
| * | | | | | | | | Merge pull request #90261 from prusnak/installer-zstd-rmPeter Hoeg2020-06-14
| |\ \ \ \ \ \ \ \ \ | | |_|_|/ / / / / / | |/| | | | | | | | images: remove original files when using zstd for compression
| | * | | | | | | | images: remove original files when using zstd for compressionPavol Rusnak2020-06-14
| | | |/ / / / / / | | |/| | | | | |
| * | | | | | | | Merge pull request #89772 from rnhmjoj/dnschainMichele Guerini Rocco2020-06-13
| |\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | dnschain: remove
| | * | | | | | | | nixos/release-notes: document dnschain removalrnhmjoj2020-06-13
| | | | | | | | | |
| | * | | | | | | | dnschain: remove package and NixOS modulernhmjoj2020-06-13
| | | |/ / / / / / | | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The software is unmaintained since ~2014 and the package can't be built anymore (issue #89205).
| * | | | | | | | nixos/timesyncd: Make dbus-activatibleArian van Putten2020-06-13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Upstream has this alias too; so that dbus activation works. What I don't fully understand is why this would ever be useful given this unit is already started way in early boot; even before dbus is up. But lets just keep behaviour similar to upstream and then ask these questions to upstream.
| * | | | | | | | nixos/networkd: Make activatible through dbus and netlinkArian van Putten2020-06-13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | With this systemd buffers netlink messages in early boot from the kernel itself; and passes them on to networkd for processing once it's started. Makes sure no routing messages are missed. Also makes an alias so that dbus can activate this unit. Upstream has this too.
| * | | | | | | | nixos/resolved: Include dbus alias of resolved unitArian van Putten2020-06-13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This will make dbus socket activation for it work When `systemd-resolved` is restarted; this would lead to unavailability of DNS lookups. You're supposed to use DBUS socket activation to buffer resolved requests; such that restarts happen without downtime
* | | | | | | | | Merge master into staging-nextFrederik Rietdijk2020-06-13
|\| | | | | | | |