about summary refs log tree commit diff
path: root/nixos
Commit message (Collapse)AuthorAge
* nixos: Add -verbose to xserverArgs exampleLuca Bruno2014-12-22
|
* Merge pull request #5346 from svenkeidel/disable-xserver-verbose-logginglethalman2014-12-22
|\ | | | | disable verbose logging for XServer, fixes #4333
| * disable verbose logging for XServer, fixes #4333Sven Keidel2014-12-15
| | | | | | | | | | | | | | | | | | | | | | | | | | The current options for the XServer produce a huge amount of log messages. The server produces around 70-80 messages per minute. The most messages look like this: display-manager-start[1846]: GetModeLine - scrn: 0 clock: 75200 display-manager-start[1846]: GetModeLine - hdsp: 1366 hbeg: 1414 hend: 1478 httl: 1582 display-manager-start[1846]: vdsp: 768 vbeg: 772 vend: 779 vttl: 792 flags: 9 Since theses messages aren't very useful, I propose to remove the `-logverbose` and `-verbose` options from the XServer arguments.
* | services.mpd: use systemd's user optionBenno Fünfstück2014-12-22
| | | | | | | | | | For some reason, mpd fails to open the sound card if using mpd's user option. Starting mpd directly as the mpd user works for me.
* | Merge pull request #5419 from ehmry/tox-bootstrapdlethalman2014-12-22
|\ \ | | | | | | tox-bootstrapd
| * | nixos: tox-bootstrapd serviceEmery Hemingway2014-12-20
| | |
* | | Merge pull request #5416 from nbp/nixos-option-includeNicolas B. Pierron2014-12-21
|\ \ \ | | | | | | | | nixos-option: Support -I option
| * | | nixos-option: Support -I option.Nicolas B. Pierron2014-12-20
| | | |
* | | | Merge pull request #5415 from nbp/nixos-options-submodulesNicolas B. Pierron2014-12-21
|\ \ \ \ | | | | | | | | | | nixos-option: Handle submodules
| * | | | nixos-option: Use <nixpkgs/nixos> instead of <nixpkgs>.Nicolas B. Pierron2014-12-21
| |/ / /
| * | | nixos-option: Produce nicer error messages in case of typos.Nicolas B. Pierron2014-12-20
| | | |
| * | | nixos-option: Handle 'attrsOf submodule' options.Nicolas B. Pierron2014-12-20
| | | |
* | | | Merge pull request #5405 from nbp/nixos-options-derivationNicolas B. Pierron2014-12-20
|\| | | | | | | | | | | nixos-option: Print the outPath of derivation for option values.
| * | | nixos-option: Improve error messages to avoid reporting internal location ↵Nicolas B. Pierron2014-12-19
| | | | | | | | | | | | | | | | and traces.
| * | | nixos-option: Print derivation outPath within attribute sets and list, when ↵Nicolas B. Pierron2014-12-19
| | | | | | | | | | | | | | | | the strict mode is used.
| * | | nixos-option: Print the outPath of derivation for option values.Nicolas B. Pierron2014-12-19
| | | |
* | | | Merge pull request #5362 from nbp/update-channelsNicolas B. Pierron2014-12-20
|\ \ \ \ | |/ / / |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add a script to add git branches for each channel. To create / update references to remote / local channels, you have to run `./maintainers/scripts/update-channel-branches.sh` while you are at the top-level of nixpkgs work directory. To make this convenient for Nixpkgs / NixOS developer, one can run the following command: ``` $ git config --add alias.fetch-channels '!sh -c "$(git rev-parse --show-cdup)maintainers/scripts/update-channel-branches.sh"' ``` Which will register the alias fetch-channels such that the script can used from sub-directory of nixpkgs by running `git fetch-channels`.
| * | | update-channel-branches.sh: Add verbosity to improve the user experience, ↵Nicolas B. Pierron2014-12-18
| | | | | | | | | | | | | | | | and update NixOS documentation.
* | | | TypoEelco Dolstra2014-12-19
| | | |
* | | | Shut up a warning from udevEelco Dolstra2014-12-19
| | | | | | | | | | | | | | | | Issue #5260.
* | | | virtualisation.qemuNetworkingOptions -> virtualisation.qemu.networkingOptionsMathijs Kwik2014-12-19
| | | |
* | | | nixos/qemu-vm: make networking options configurableMathijs Kwik2014-12-19
| | | |
* | | | Merge pull request #5378 from benley/mesoswmertens2014-12-19
|\ \ \ \ | | | | | | | | | | mesos-slave: add config option for slave attributes
| * | | | nixos/mesos: Parameterize mesos slave attributesBenjamin Staffin2014-12-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Added attributes to nixos/tests/mesos.nix to verify that mesos-slave attributes work. If the generated attributes are invalid, the daemon should fail to start. Change-Id: I5511245add30aba658b1af22cd7355b0bbf5d15c
* | | | | kde4: enable akonadi by defaultEvgeny Egorochkin2014-12-19
| | | | |
* | | | | synergy: restore autostart option.Evgeny Egorochkin2014-12-19
| | | | | | | | | | | | | | | | | | | | closes #5334
* | | | | resurrect torsocks-fasterEvgeny Egorochkin2014-12-19
| | | | |
* | | | | rename torify to tsocks, to avoid name clashes and make it clear which ↵Evgeny Egorochkin2014-12-19
| | | | | | | | | | | | | | | | | | | | wrapper library is used
* | | | | torsocks: enable by default if tor client functionality is enabledEvgeny Egorochkin2014-12-19
| | | | |
* | | | | tor: restore the Privoxy setup, but configure the system Privoxy instead of ↵Evgeny Egorochkin2014-12-19
| | | | | | | | | | | | | | | | | | | | running a separate instance.
* | | | | tor: restore strong circuit isolationEvgeny Egorochkin2014-12-19
| | | | |
* | | | | Revert "nixos: Remove torify module"Evgeny Egorochkin2014-12-19
|/ / / / | | | | | | | | | | | | | | | | | | | | tsocks is still useful because it's less strict This reverts commit 1b26faeb6994151b8f8842f340fe4c1b820f09fb.
* | | | nixos: Add VBox hardening to 14.12 release notes.aszlig2014-12-18
| | | | | | | | | | | | | | | | Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* | | | zfs hostId: Instructions to derive from machine-idwmertens2014-12-18
| | | |
* | | | nixos/virtualbox: Revert disable hardening.aszlig2014-12-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This reverts commit 5d67b17901ff2c9a18647bd9453c6b0d4294b875. The issues have been resolved by ac603e208c98b260db675fa0c13be94fa95216f4. Tested this with hostonlyifs and USB support with extension pack. Conflicts: nixos/modules/programs/virtualbox-host.nix Signed-off-by: aszlig <aszlig@redmoonstudios.org> Tested-by: Mateusz Kowalczyk <fuuzetsu@fuuzetsu.co.uk>
* | | | ssh-agent: Don't have a timeout by defaultEelco Dolstra2014-12-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | IMHO, having a short timeout (1h) defeats the point of using ssh-agent, which is not to have to retype passphrases all the time. Of course, users who want timeouts can set programs.ssh.agentTimeout. This restores the 14.04 behaviour.
* | | | Fix container testEelco Dolstra2014-12-18
| | | | | | | | | | | | | | | | http://hydra.nixos.org/build/17989795
* | | | nixos/tests/virtualbox: Disable debug logging.aszlig2014-12-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Especially if the user isn't in the vboxusers group anymore, this gets VERY noisy, because the VBoxSVC process emits warnings for every single USB device noting that it's only possible to access it when the user is in the vboxusers group. So, we now have a debug attribute, where we can enable it when necessary. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* | | | nixos/tests/virtualbox: Don't use vboxusers group.aszlig2014-12-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | At least when we're running in hardening mode, because it's needed there only for USB support. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* | | | nixos/tests/blivet: Fix by avoiding "nix-store".aszlig2014-12-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The "nix-store" command within the VM test is running without NIX_REMOTE=daemon and since Nix 1.8 tries to open the store database in read-write mode even for nix-store -qR. Now, we're doing this properly and rely on setup hooks, which is the same method that's used when you're building a library which depends on blivet. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* | | | virtualbox: Fix runtime paths in hardening mode.aszlig2014-12-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Because we have to rely on setuid wrappers on NixOS, we can't easily hardcode the executable paths and set it 4755. So for all calls, we need to change the runtime path executable directory to /var/setuid-wrappers/ and for verification we need to retain the executable directory. Also note, that usually VBoxNetAdpCtl, VBoxNetDHCP, VBoxNetNAT, VBoxSDL and VBoxVolInfo don't reside in directories that are commonly in PATH, but in /usr/lib/virtualbox in most mainstream distros. But because the names of these executables are distinctive enough to not cause collisions with other setuid programs, I'll leave it like that and not patch up setuid-wrappers. Signed-off-by: aszlig <aszlig@redmoonstudios.org>
* | | | release notes: reindent, remove renames (redudant)Domen Kožar2014-12-18
| | | | | | | | | | | | | | | | | | | | (cherry picked from commit 8566f66ea44f7adf050d92bd8dc8de9ba814f0d1) Signed-off-by: Domen Kožar <domen@dev.si>
* | | | update release notesDomen Kožar2014-12-18
| | | | | | | | | | | | | | | | | | | | (cherry picked from commit 33e9a0503a55aef49c4d8750a712388ab71b6446) Signed-off-by: Domen Kožar <domen@dev.si>
* | | | fix users.mutableUsers = false; install in isoDomen Kožar2014-12-18
| | | | | | | | | | | | | | | | | | | | (cherry picked from commit 9bc8bcbbdcc7cac98686877f09315bb749627732) Signed-off-by: Domen Kožar <domen@dev.si>
* | | | Improve /etc/sudoers messageEelco Dolstra2014-12-18
| | | |
* | | | nixos/network-interfaces: Add ipv6 gateway supportWilliam A. Kennington III2014-12-17
| | | |
* | | | switch-to-configuration: Ignore slice unitsEelco Dolstra2014-12-18
| | | |
* | | | Revert "enable bash autocomplete by default"Eelco Dolstra2014-12-18
| | | | | | | | | | | | | | | | | | | | This reverts commit ee8e15fe76a235ae3583d4e8cb4bb370f28c5eae. See discussion at https://github.com/NixOS/nixpkgs/commit/ee8e15fe76a235ae3583d4e8cb4bb370f28c5eae.
* | | | Remove udev from /run/opengl-driversEelco Dolstra2014-12-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | /run/opengl-drivers should contain only libGL-related libraries, not stuff like udev. Injecting anything into LD_LIBRARY_PATH is dangerous because it can break applications that expect a different version of the library. Caused by eef9a8ac2a30b495ff7184382ed0dbd73b3b88e4. Fixes #5371.
* | | | It is called Dingo! yes, Dingo!Rob Vermaas2014-12-17
| | | |