aboutsummaryrefslogtreecommitdiff
path: root/nixos (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
| * | | | | | | | | | | Merge master into staging-nextFrederik Rietdijk2020-11-2914-35/+368
| |\ \ \ \ \ \ \ \ \ \ \
| * \ \ \ \ \ \ \ \ \ \ \ Merge master into staging-nextFrederik Rietdijk2020-11-281-0/+10
| |\ \ \ \ \ \ \ \ \ \ \ \
| * \ \ \ \ \ \ \ \ \ \ \ \ Merge master into staging-nextFrederik Rietdijk2020-11-2767-106/+153
| |\ \ \ \ \ \ \ \ \ \ \ \ \
| * \ \ \ \ \ \ \ \ \ \ \ \ \ Merge branch 'staging-next' into stagingJan Tojnar2020-11-245-0/+175
| |\ \ \ \ \ \ \ \ \ \ \ \ \ \
| * \ \ \ \ \ \ \ \ \ \ \ \ \ \ Merge staging-next into stagingFrederik Rietdijk2020-11-2328-380/+700
| |\ \ \ \ \ \ \ \ \ \ \ \ \ \ \
| * \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ Merge pull request #104094 from flokli/systemd-unified-cgroup-hierarchyFlorian Klink2020-11-227-16/+71
| |\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | systemd: switch to unified cgroup hierarchy by default
| | * | | | | | | | | | | | | | | | nixosTests.podman: run default backends, don't run runc rootlessFlorian Klink2020-11-201-5/+14
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The runc backend doesn't work with unified cgroup hierarchy, and it failing is a known issue. However, the default backends should work in both rootless and as-root scenarios, so make sure we test these.
| | * | | | | | | | | | | | | | | | nixosTests.systemd: increase accounting coverageFlorian Klink2020-11-191-11/+24
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | For now, testing IO Accounting is skipped, as it seems to be either broken, or hard to reproduce in a VM.
| | * | | | | | | | | | | | | | | | nixos/k3s: disable unifiedCgroupHierarchyFlorian Klink2020-11-191-0/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This gets automatically disabled by docker if the docker backend is used, but the bundled containerd also doesn't seem to support cgroupsv2, so disable it explicitly here, too.
| | * | | | | | | | | | | | | | | | systemd: switch to unified cgroup hierarchy by defaultFlorian Klink2020-11-194-0/+29
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | See https://www.redhat.com/sysadmin/fedora-31-control-group-v2 for details on why this is desirable, and how it impacts containers. Users that need to keep using the old cgroup hierarchy can re-enable it by setting `systemd.unifiedCgroupHierarchy` to `false`. Well-known candidates not supporting that hierarchy, like docker and hidepid=… will disable it automatically. Fixes #73800
* | | | | | | | | | | | | | | | | | cpp_ethereum: removeRaghav Sood2020-11-301-0/+5
| |_|_|_|_|_|_|_|/ / / / / / / / / |/| | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | Merge pull request #104689 from petabyteboy/feature/gitlab-13-6-1Florian Klink2020-11-291-1/+1
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | gitlab: 13.6.0 -> 13.6.1
| * | | | | | | | | | | | | | | | | nixos/gitlab: use bindsTo instead of requires for gitalyMilan Pässler2020-11-261-1/+1
| | |_|_|_|/ / / / / / / / / / / / | |/| | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | nixos/mautrix-telegram: update defaultsMaximilian Bosch2020-11-291-0/+3
| |_|_|_|_|_|/ / / / / / / / / / |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | These three defaults must exist in the config now, otherwise `mautrix-telegram` will refuse to start.
* | | | | | | | | | | | | | | | Merge pull request #99173 from johanot/fix-initrd-ssh-commands-testSarah Brofeldt2020-11-291-1/+6
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | nixos/initrd-ssh: set more defensive pemissions on sshd test key
| * | | | | | | | | | | | | | | | nixos/initrd-ssh: set more defensive pemissions on sshd test keyJohan Thomsen2020-09-301-1/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It looks like the test sshd key can never be used, because of too open permissions. My guess is that the current test script works fine once the user defined ssh-key has been copied into initrd. At "nixos-install" however, the user specified host key is not present in initrd yet and validation fails. fixes #91486
* | | | | | | | | | | | | | | | | Merge pull request #102061 from braunse/gogs-0-12-3StigP2020-11-291-8/+0
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | |_|_|_|_|_|_|_|_|_|_|_|_|_|/ / / |/| | | | | | | | | | | | | | | | gogs: 0.11.91 -> 0.12.3
| * | | | | | | | | | | | | | | | gogs: 0.11.91 -> 0.12.3Sebastien Braun2020-11-281-8/+0
| | |_|_|_|_|_|/ / / / / / / / / | |/| | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | Merge pull request #62104 from Vizaxo/masterRyan Mulligan2020-11-281-1/+13
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | nixos/exwm: allow custom Emacs load script
| * | | | | | | | | | | | | | | | nixos/exwm: allow custom Emacs load scriptVizaxo2019-05-271-1/+13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Add config option services.xserver.windowManager.exwm.loadScript, which is passed to Emacs (as the -l option) to load after the user's init file.
* | | | | | | | | | | | | | | | | Merge pull request #104268 from mvnetbiz/ha-allowpathsMartin Weinelt2020-11-291-1/+5
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | home-assistant: add allowlist_external_dirs to systemd unit ReadWritePaths
| * | | | | | | | | | | | | | | | | home-assistant: add allowlist_external_dirs to systemd unit ReadWritePathsMatt Votava2020-11-191-1/+5
| | | | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | | nixos/disnix: reorder startup to take MongoDB and InfluxDB into account, add ↵Sander van der Burg2020-11-281-1/+11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | option to add Disnix profile to the system PATH
* | | | | | | | | | | | | | | | | | nixos/dysnomia: add InfluxDB configuration options, add option to use legacy ↵Sander van der Burg2020-11-281-23/+63
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | modules, eliminate import from derivation hack
* | | | | | | | | | | | | | | | | | Merge pull request #86225 from sorki/proxychainsSilvan Mosberger2020-11-282-0/+166
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | nixos/proxychains: init
| * | | | | | | | | | | | | | | | | | nixos/proxychains: initRichard Marko2020-09-092-0/+166
| | | | | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | | | jq: Add testTim Steinbach2020-11-282-0/+11
| | | | | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | | | bat: Add testTim Steinbach2020-11-282-0/+13
| | | | | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | | | lsd: Add testTim Steinbach2020-11-282-0/+13
| | | | | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | | | minecraft-server: Add testTim Steinbach2020-11-282-0/+38
| | | | | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | | | minecraft: Add testTim Steinbach2020-11-282-0/+29
| |_|_|/ / / / / / / / / / / / / / / |/| | | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | | Merge pull request #85133 from snicket2100/mosquitto-service-sandboxingSandro2020-11-271-0/+10
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | |_|_|_|_|/ / / / / / / / / / / / / |/| | | | | | | | | | | | | | | | | mosquitto: systemd service sandboxing
| * | | | | | | | | | | | | | | | | mosquitto: systemd service sandboxingsnicket21002020-04-131-0/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | running the service in a sandbox. read-only root file system, with tmpfs mounted in /tmp, hidden /root and /home, temporary /dev. the only writeable path is the data directory, which according to my experiments is enough for the service to work correctly.
* | | | | | | | | | | | | | | | | | Merge pull request #104553 from jansol/pipewireJan Tojnar2020-11-261-11/+8
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | pipewire: 0.3.15 -> 0.3.16
| * | | | | | | | | | | | | | | | | | pipewire: 0.3.15 -> 0.3.16Jan Solanti2020-11-231-11/+8
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This release replaces the libpulseaudio shim with a pipewire module that acts as a fake pulseaudio server along with a systemd service that loads that module on demand.
* | | | | | | | | | | | | | | | | | | nixos/tests/networking: Alleviate race in scripted testSarah Brofeldt2020-11-251-2/+2
| |_|_|_|_|_|_|_|_|_|_|/ / / / / / / |/| | | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | | awscli: Add testTim Steinbach2020-11-252-0/+18
| | | | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | | nixos/zram: add zramSwap.memoryMax optionLuke Granger-Brown2020-11-251-1/+15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This allows capping the total amount of memory that will be used for zram-swap, in addition to the percentage-based calculation, which is useful when blanket-applying a configuration to many machines. This is based off the strategy used by Fedora for their rollout of zram-swap-by-default in Fedora 33 (https://fedoraproject.org/wiki/Changes/SwapOnZRAM), which caps the maximum amount of memory used for zram at 4GiB. In future it might be good to port this to the systemd zram-generator, instead of using this separate infrastructure.
* | | | | | | | | | | | | | | | | | nixos auto-upgrade: remove flag when flakeFrederik Rietdijk2020-11-251-3/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The `--no-build-output` flag that is added by default is only valid for the old cli, which is not used when flakes are used. Follow-up to c9daa81eff922d9f77d136cfcff0ea05d40024e0.
* | | | | | | | | | | | | | | | | | Merge pull request #102938 from cruegge/dev-symlinksFlorian Klink2020-11-251-0/+3
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | nixos/stage-1: create /dev/std{in,out,err} symlinks
| * | | | | | | | | | | | | | | | | | Create /dev/std{in,out,err} symlinks in stage-1Christoph Ruegge2020-11-051-0/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This used to be done by udev, but that was removed in systemd/systemd@6b2229c. The links are created by systemd at the end of stage-2, but activation scripts might need them earlier.
* | | | | | | | | | | | | | | | | | | nixos/factorio: Don't open firewall ports by defaultStijn DW2020-11-241-1/+1
| | | | | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | | | nixos/factorio: add openFirewall optionStijn DW2020-11-241-3/+8
| | | | | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | | | Merge pull request #104776 from grahamc/utillinuxGraham Christensen2020-11-2454-77/+78
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | |_|_|_|_|_|_|_|_|_|_|_|_|/ / / / / / |/| | | | | | | | | | | | | | | | | | utillinux: rename to util-linux
| * | | | | | | | | | | | | | | | | | utillinux: rename to util-linuxGraham Christensen2020-11-2454-77/+78
| | | | | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | | | Merge pull request #81661 from adisbladis/ssh-pam-sudo-keysadisbladis2020-11-243-2/+9
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | |/ / / / / / / / / / / / / / / / / / |/| | | | | | | | | | | | | | | | | | pam_ssh_agent_auth: Honour services.openssh.authorizedKeysFiles
| * | | | | | | | | | | | | | | | | | pam_ssh_agent_auth: Honour services.openssh.authorizedKeysFilesadisbladis2020-11-243-2/+9
| | |_|_|_|_|_|_|_|_|_|/ / / / / / / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If a system administrator has explicitly configured key locations this should be taken into account by `sudo`.
* | | | | | | | | | | | | | | | | | mullvad-vpn: add iproute2Artturin2020-11-241-0/+3
| | | | | | | | | | | | | | | | | |
* | | | | | | | | | | | | | | | | | Merge pull request #104734 from ju1m/fix-udevRyan Mulligan2020-11-241-1/+1
|\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | nixos/network-interfaces: fix typo in udev rule syntax
| * | | | | | | | | | | | | | | | | | nixos/network-interfaces: fix typo in udev rule syntaxJulien Moutinho2020-11-241-1/+1
| | | | | | | | | | | | | | | | | | |