Commit Graph

26420 Commits

Author SHA1 Message Date
Charles Hall
02fd938fb7
nixos/conduit: disable update checks by default 2023-08-10 23:16:19 -07:00
Franz Pletz
9c85697da8
Merge pull request #244060 from Gerg-L/nvidiaDynamicBoost
nixos/nvidia: clean up and add dynamic boost
2023-08-10 17:02:26 +02:00
Artturi
2ed985dd37
Merge pull request #248017 from Artturin/fishcrossfix 2023-08-10 15:18:21 +03:00
Maximilian Bosch
1ab411fcd4
Merge pull request #247386 from montchr/docs-matrix-synapse
nixos/matrix-synapse: set public baseurl in example config
2023-08-10 12:52:34 +02:00
Ryan Lahfa
afa8d16f74
Merge pull request #247102 from yaxitech/image-repart-package-option 2023-08-10 11:55:01 +02:00
Ryan Lahfa
ec409e6f79
Merge pull request #231673 from symphorien/suid_wrappers_userns 2023-08-10 11:52:59 +02:00
Franz Pletz
c13c1412bf
nixos/chrony: add enableMemoryLocking option
Fixes #222629.
2023-08-10 03:03:53 +02:00
Franz Pletz
cef068f3b3
Revert "nixos/malloc: add back maybe unnecessary line"
This reverts commit ed55524562.

Does not evaluate.
2023-08-10 03:02:39 +02:00
Franz Pletz
8e372c19d1
Merge pull request #245286 from codec/add-prometheus-idrac-exporter
prometheus-idrac-exporter: init at unstable-2023-06-29
2023-08-10 00:58:03 +02:00
Robert Hensing
ea6e5c0730
Merge pull request #246775 from yaxitech/no-kernel-params-wo-kernel
nixos/toplevel: only pass `kernelParams` if `boot.kernel.enable`
2023-08-09 15:14:13 +02:00
Franz Pletz
dcafb07ed8
Merge pull request #232250 from YBeaugnon/libvirt-hooks
nixos/libvirtd: hooks support
2023-08-09 15:07:52 +02:00
Franz Pletz
b15eff32c4
Merge pull request #248126 from DDoSolitary/patch-netdata-ipc
nixos/netdata: fix position of NETDATA_PIPENAME
2023-08-09 14:42:55 +02:00
Guillaume Girol
0e4b8a05b2 nixos/wrappers: allow setuid and setgid wrappers to run in user namespaces
In user namespaces where an unprivileged user is mapped as root and root
is unmapped, setuid bits have no effect. However setuid root
executables like mount are still usable *in the namespace* as the user
already has the required privileges. This commit detects the situation
where the wrapper gained no privileges that the parent process did not
already have and in this case does less sanity checking. In short there
is no need to be picky since the parent already can execute the foo.real
executable themselves.

Details:
man 7 user_namespaces:
   Set-user-ID and set-group-ID programs
       When a process inside a user namespace executes a set-user-ID
       (set-group-ID) program, the process's effective user (group) ID
       inside the namespace is changed to whatever value is mapped for
       the user (group) ID of the file.  However, if either the user or
       the group ID of the file has no mapping inside the namespace, the
       set-user-ID (set-group-ID) bit is silently ignored: the new
       program is executed, but the process's effective user (group) ID
       is left unchanged.  (This mirrors the semantics of executing a
       set-user-ID or set-group-ID program that resides on a filesystem
       that was mounted with the MS_NOSUID flag, as described in
       mount(2).)

The effect of the setuid bit is that the real user id is preserved and
the effective and set user ids are changed to the owner of the wrapper.
We detect that no privilege was gained by checking that euid == suid
== ruid. In this case we stop checking that euid == owner of the
wrapper file.

As a reminder here are the values of euid, ruid, suid, stat.st_uid and
stat.st_mode & S_ISUID in various cases when running a setuid 42 executable as user 1000:

Normal case:
ruid=1000 euid=42 suid=42
setuid=2048, st_uid=42

nosuid mount:
ruid=1000 euid=1000 suid=1000
setuid=2048, st_uid=42

inside unshare -rm:
ruid=0 euid=0 suid=0
setuid=2048, st_uid=65534

inside unshare -rm, on a suid mount:
ruid=0 euid=0 suid=0
setuid=2048, st_uid=65534
2023-08-09 12:00:00 +00:00
DDoSolitary
d410464c5d
nixos/netdata: fix position of NETDATA_PIPENAME
It was accidentally placed in a condition-guarded block, making the
setting only take effect when enableAnalyticsReporting = false.
2023-08-09 19:22:20 +08:00
Florian Praden
490ec79ac3
nixos/gitea: bugfix for gitea-dump service.
Missing custom directory setup in gitea-dump service. Adding environment variable in gitea-dump service definition.
2023-08-09 11:53:18 +02:00
Artturin
ea580ebee8 nixos/fish: Fix completion generator cross-compilation 2023-08-08 23:21:38 +03:00
K900
b0b00f0e28
Merge pull request #247937 from linj-fork/fix-types.string
treewide: stop using types.string
2023-08-08 18:50:42 +03:00
WilliButz
acbf16d419
Merge pull request #247709 from Ma27/nextcloud-adminuser-doc-fix
nixos/nextcloud: improve documentation of `adminuser`-option
2023-08-08 16:29:59 +02:00
Lin Jian
74fadae942
treewide: stop using types.string
It is an error[1] now.

[1]: https://github.com/NixOS/nixpkgs/pull/247848
2023-08-08 21:31:21 +08:00
Michele Guerini Rocco
ccc33bd3d7
Merge pull request #245852 from rnhmjoj/pr-fix-dnscrypt
dnscrypt-wrapper fixes
2023-08-08 10:34:27 +02:00
Lassulus
e63386d6bf
Merge pull request #247751 from Mic92/installation-device-trusted-users
nixos/installation-device: allow nix-copy for root/nixos user
2023-08-08 08:23:59 +02:00
Franz Pletz
9640eb3970
Merge pull request #246029 from ehmry/eris-go 2023-08-08 06:18:03 +02:00
Pol Dellaiera
ef02511ff4
Merge pull request #247358 from pokon548/dae-add-service
nixos/dae: init
2023-08-07 21:11:43 +02:00
Lily Foster
b367b9cf87
Merge pull request #241565 from SuperSandro2000/nox-python
nixos/no-x-libs: use pythonPackagesExtensions to construct python ove…
2023-08-07 10:56:27 -04:00
Jörg Thalheim
1f1a758e95 nixos/installation-device: allow nix-copy for root/nixos user
For non-interactive installation it's quite handy to be able to nix copy additional dependencies to the system.
While this is possible for the root user, we cannot easily ssh into it, as we don't allow root login with a password.
By making nixos a trusted user, we can do "passwd && sudo systemctl start sshd" and than run nixos-anywhere
2023-08-07 16:48:49 +02:00
Maximilian Bosch
648546b09d
nixos/nextcloud: improve documentation of adminuser-option
This option only has an effect on the initial setup of Nextcloud and
changes later won't have any effect.

Same issue as with `adminpassFile` - it's only passed to the installer
command - but even worse because the username is frequently used as
unique ID in the database, so there's no trivial way to change it, even
imperatively.
2023-08-07 12:16:41 +02:00
pokon548
dcf5ae3d0b nixos/dae: init 2023-08-07 14:32:32 +08:00
Wout Mertens
ea07a9a98e
Merge pull request #247319 from DDoSolitary/patch-netdata-ipc
netdata: set NETDATA_PIPENAME to /run/netdata/ipc
2023-08-07 08:27:29 +02:00
Martin Weinelt
af90462b88
Merge pull request #247235 from mweinelt/wyoming-faster-whisper-option-fix
nixos/wyoming/faster-whisper: fix device option description
2023-08-06 22:04:42 +02:00
K900
4a2735bb3d
Merge pull request #241481 from Mayeu/update/kubo
kubo: 0.20.0 -> 0.21.0
2023-08-06 20:03:37 +03:00
Maximilian Bosch
01820d520b
Merge pull request #247384 from jtbx/nextcloud-doc
nixos/nextcloud: improve documentation
2023-08-06 12:27:33 +02:00
Nick Cao
90c77d8891
Merge pull request #246842 from frederictobiasc/mautrix-whatsapp-module
nixos/mautrix-whatsapp: init
2023-08-06 03:21:25 -06:00
Frédéric Christ
3a1f5757b9 mautrix-whatsapp: move defaults back to options.
As suggested by @nickcao this commit moves the defaults back to the
options. Only `homeserver.domain` stays in the config section since the
documentation module does not support referencing attributes of other
modules.
2023-08-06 11:03:17 +02:00
davidak
62f11e9e1d
Merge pull request #246187 from SuperSamus/hid-nintendo-remove
hid-nintendo: remove
2023-08-06 04:07:11 +02:00
Jeremy
c7a9f7c132 nixos/nextcloud: improve documentation 2023-08-06 10:02:52 +12:00
Chris Montgomery
aefa0bb6cc
nixos/matrix-synapse: set public baseurl in example config 2023-08-05 16:08:35 -04:00
Gregor Godbersen
3d9a6399a1 nixos/paperless: set default thumbnail font
The upstream default for the thumbnail font is set to "Liberation Serif
Regular" located at /usr/share/fonts which is inaccessible under nix.
(2a2bf3bf55/src/paperless/settings.py (L894))

Paperless throws an error when parsing plaintext files without a valid
font. This change sets a nix default using the liberation_ttf package.
2023-08-05 22:06:27 +02:00
WilliButz
404abaa27a
Merge pull request #247314 from Ma27/nextcloud-php-settings
nixos/nextcloud: make php settings additive
2023-08-05 14:12:52 +02:00
Frédéric Christ
288d2ee55d mautrix-whatsapp: Move defaults to config section
This contribution applies Example 32 (conventional settings option) from
[nixpkgs](https://nixos.org/manual/nixos/stable/#sec-settings-nix-representable).
2023-08-05 13:57:15 +02:00
DDoSolitary
060a47e1e4
netdata: set NETDATA_PIPENAME to /run/netdata/ipc
Netdata creates its control socket at /tmp/netdata-ipc by default, which
is insecure and actually inaccessible with systemd's PrivateTmp enabled.

Originally we patched its source code to move the socket to
/run/netdata/ipc. However, it was removed due to incompatibility when
upgrading to v1.41.0: 1d2a2dc7d0

Fortunately, this new version of netdata adds support for setting the
location of the control socket via the environment variable
NETDATA_PIPENAME. So let's set it for the netdata service and the
command line utility so that they can communicate properly.
2023-08-05 18:19:08 +08:00
Maximilian Bosch
2ddb1453e6
nixos/nextcloud: make php settings additive
Right now, the settings aren't additive which means that when I do

    services.nextcloud.phpOptions."opcache.interned_strings_buffer = "23";

all other options are discarded because of how the module system works.

This isn't very nice in this case, though because wanting to override
a single option doesn't mean I want to discard the rest of the -
reasonable - defaults. Hence, the settings are showed as default in the
option's manual section, but are added with normal priority.

That means, to override _all_ options at once, an expression like

    services.nextcloud.phpOptions = mkForce {
      /* ... */
    };

is needed. This is also way more intuitive IMHO because the `mkForce`
explicitly tells that everything will be modified.

Also, APCu enable and the memory & file-size limits are also written
into `services.nextcloud.phpOptions` rather than adding them
silently before passing all options to the PHP package. This has the
benefit that users will realize on evaluation time that they configured
options that would otherwise be set by the module on its own.
2023-08-05 11:58:11 +02:00
Emery Hemingway
b6c5112152 nixos/ntopng: seperate interface config with newlines 2023-08-05 10:02:48 +01:00
Martin Weinelt
12cb284a44
nixos/wyoming/faster-whisper: fix device option description 2023-08-05 00:24:26 +02:00
Maximilian Bosch
ed02e79bbe
Merge pull request #241497 from bendlas/prepare-gitea-120
nixos/gitea: add WORK_PATH to config, fix 1.20
2023-08-04 18:50:09 +02:00
Vincent Haupert
f652755434 nixos/image: add image.repart.package option
Allow giving a custom package containing the `systemd-repart` binary.
Defaults to `pkgs.systemd`. This option opens up the possibility to use
a different package for the image builder and the system configuration.

For example, someone could use this option to build an image with a
patched systemd while still using the upstream nixpkgs systemd package
(i.e., `pkgs.systemd`) for the system configuration installed to the
created image.
2023-08-04 13:49:18 +02:00
ajs124
bf4d2e6c1e
Merge pull request #242538 from tnias/fix/apparmor
apparmor: add some policies and improve abstractions and utils
2023-08-04 13:05:52 +02:00
Vincent Haupert
fbebce610f nixos/toplevel: move systemBuilder for boot.kernel.enable
This avoids creating a build-time reference on `boot.kernelParams` if
the configuration does not use a kernel, i.e., `boot.kernel.enable` is
set to `false`.
2023-08-04 12:46:03 +02:00
codec
47db2bfffb prometheus-idrac-exporter: init at unstable-2023-06-29 2023-08-04 00:57:19 +02:00
Ryan Lahfa
2a1f1797be
Merge pull request #246941 from yaxitech/image-amend-repart-r13y 2023-08-03 15:57:24 +02:00
Gerg-L
4ca2a16390 nixos/nvidia: add Dynamic Boost support 2023-08-03 09:32:14 -04:00