Commit Graph

41810 Commits

Author SHA1 Message Date
Marcel
d7977717ac
nixos/hound: remove with lib; 2024-06-27 21:59:07 +02:00
Marcel
e6979857a3
nixos/hound: convert config to free-form type, add config check 2024-06-27 21:56:18 +02:00
Marcel
73e7708bee
nixos/hound: cleanup services.hound.enable 2024-06-27 21:56:18 +02:00
Silvan Mosberger
c8dec6df38
Merge pull request #322801 from eclairevoyant/discourage-mkpackageoptionmd
lib: deprecate mkPackageOptionMD
2024-06-27 20:15:08 +02:00
Someone
35a472db57
Merge pull request #320830 from philiptaron/nixos-nvidia-change-datacenter-defaults
nixos/nvidia: move TOPOLOGY_FILE_PATH and DATABASE_PATH into nvidia-fabricmanager service definition
2024-06-27 15:56:29 +00:00
Robert Hensing
044d202b36
Merge pull request #322886 from fricklerhandwerk/update-nix
nixVersions: bump patch releases
2024-06-27 14:50:13 +02:00
Niklas Hambüchen
1032399f52
Merge pull request #322782 from DCsunset/quickwit-fix
nixos/quickwit: fix service ReadWritePaths
2024-06-27 14:39:11 +02:00
Jonas Heinrich
77e7768849
Merge pull request #322397 from Ma27/bump-nextcloud
nextcloud: drop 27, 28.0.6 -> 28.0.7, 29.0.2 -> 29.0.3
2024-06-27 14:09:29 +02:00
Valentin Gagarin
144ac0d7fc nixVersions: bump patch releases 2024-06-27 13:43:44 +02:00
Masum Reza
891c75c86e
Merge pull request #322591 from JohnRTitor/hyprland-module
nixos/hyprland: set systemd environment PATH only for versions < 0.41.2
2024-06-27 16:34:04 +05:30
Sandro
f6fb5b4f20
Merge pull request #322216 from Pandapip1/patch-3
services/localtimed: Allow configuring packages
2024-06-27 12:58:20 +02:00
matthewcroughan
23c24527dc nixos/scion: add scion package when scion.enable = true 2024-06-27 11:52:04 +02:00
matthewcroughan
973108d3ed nixos/scion: use recursiveUpdate instead of // 2024-06-27 11:51:28 +02:00
éclairevoyant
77f6192786
lib: deprecate mkPackageOptionMD 2024-06-26 23:14:45 -04:00
éclairevoyant
aeee4fc133
treewide: replace mkPackageOptionMD with mkPackageOption 2024-06-26 23:05:42 -04:00
Jared Baur
560cd874a3
nixos/etc: fix using etc overlay on cross-compiled systems
We need to run tooling from the build platform when generating the EROFS.
2024-06-26 19:50:24 -07:00
DCsunset
05b67b87b7 nixos/quickwit: fix service ReadWritePaths 2024-06-26 20:47:00 -04:00
Pol Dellaiera
908c90cd18
Merge pull request #313606 from drupol/ollama-add-preLoadedModels
nixos/ollama: add `loadModels` config option
2024-06-26 22:56:56 +02:00
Someone
cb69dc5b8d
Merge pull request #256230 from SomeoneSerge/feat/gpu-tests-py
GPU access in the sandbox
2024-06-26 19:16:53 +00:00
Pol Dellaiera
f6727a9e3e nixos/ollama: add loadModels config option
Allows users to download model files upon service startup,
instead of at the first use of the model, improving percieved startup latency.
2024-06-26 15:11:37 -04:00
Sandro
efdfa300ee
Merge pull request #287036 from srhb/kafka-versions-cleanup
kafka: versions cleanup and drop older
2024-06-26 20:22:49 +02:00
Masum Reza
44f79e5bf0
Merge pull request #321591 from JohnRTitor/gdm-fingerprint-auth
nixos/gdm: allow logging in via fingerprint
2024-06-26 23:08:16 +05:30
John Titor
ff0738b736
nixos/hyprland: set systemd environment PATH for versions < 0.41.2
Importing PATH into the systemd environment is done by default in
Hyprland v0.41.2+ (https://github.com/hyprwm/Hyprland/pull/6640)
We soft deprecate this option here for versions >= 0.41.2.
2024-06-26 23:04:27 +05:30
Sandro
273f6bdff8
Merge pull request #244684 from m-bdf/kmscon-use-upstream-service-file
nixos/kmscon: use upstream service file
2024-06-26 19:29:28 +02:00
nikstur
e05a365dca
Merge pull request #321991 from Mic92/etc-overlay-cross
etc.overlay: fix cross-build
2024-06-26 19:12:15 +02:00
Someone Serge
79a7186f1c cudaPackages: updated convention for gpu/runtime checks
Runtime tests (derivations asking for a relaxed sandbox) are now
expected at p.gpuCheck, p.gpuChecks.<name>, or at
p.tests.<name>.gpuCheck.
2024-06-26 16:00:29 +00:00
Artturin
1ecc3cd35b
Merge pull request #322194 from Artturin/polkitaddpackageoption
nixos/polkit: Add package option
2024-06-26 12:42:38 +03:00
Someone Serge
ebeb6b9d1d nix-required-mounts: nixfmt 2024-06-26 00:35:45 +00:00
Someone Serge
927b15ed6d nixos/nix-required-mounts: allow passing extra arguments to the hook 2024-06-26 00:35:44 +00:00
Someone Serge
dd70727622 nixos/nix-required-mounts: mount the runtime closures 2024-06-26 00:35:44 +00:00
Someone Serge
55f54cc2c3 nix-required-mounts: restore (optional) symlink support 2024-06-26 00:35:44 +00:00
Someone Serge
3cf5bcfe49 nix-required-mounts: restore the followSymlinks option
This way pkgs.nix-required-mounts is "correct" even before
we override it in the NixOS module
2024-06-26 00:35:44 +00:00
Someone Serge
5560f6a514 nix-required-mounts: guest and host paths may differ 2024-06-26 00:35:43 +00:00
Someone Serge
7418e4fefd programs.nix-required-mounts: presets.cuda -> nvidia-gpu
This hopefully clarifies that the preset configures the hook to expose
"nvidia devices", which includse both the userspace driver and the
device nodes.

The derivations  still declare requiredSystemFeatures = [ "cuda" ] to
explicitly indicate they need to use the CUDA functionality and expect a
libcuda.so and a CUDA-capable device. Ideally, we'd also include the
specific CUDA architectures (sm_86, etc) in feature names.

Derivations that use a co-processor but do not care about the vendor or
even the particular interface may ask for the more generic "opengl",
"vulkan", or "gpu" features. It is then responsibility of the host
declaring the support for this feature to ensure the drivers and
hardware are appropriately set up.
2024-06-26 00:35:43 +00:00
Someone Serge
50d4382114 programs.nix-required-mounts: inherit defaults from the package 2024-06-26 00:35:43 +00:00
Someone Serge
6662b09941 nix-required-mounts: handle __structuredAttrs 2024-06-26 00:35:43 +00:00
Someone Serge
340b41815d nixosTests.nix-required-mounts: init 2024-06-26 00:35:42 +00:00
Someone Serge
b422dafc89 nix-required-mounts: init 2024-06-26 00:35:42 +00:00
Sandro
08605eec2a
Merge pull request #311381 from minijackson/tomcat-port
nixos/tomcat: add 'port' option
2024-06-26 00:53:58 +02:00
Sandro
44b22d8d45
Merge pull request #318185 from tomfitzhenry/initrd-ssh-null-alg
nixos/initrd-ssh: set KexAlgorithms/Ciphers/MACs only if non-null
2024-06-25 23:21:33 +02:00
Sandro
33f83c6252
Merge pull request #316977 from eclairevoyant/fix-mkEnableOption
treewide: fix mkEnableOption usage
2024-06-25 22:42:16 +02:00
Sandro
3176d6fb53
Merge pull request #315144 from mattpolzin/default-nodename-fix
nixos/services.kubernetes.kubelet: handle non-lower case chars in hostname
2024-06-25 22:38:46 +02:00
Sandro
5b0ea759a7
Merge pull request #318347 from caffineehacker/vaultwarden_backup
nixos/vaultwarden: backup all rsa_keys
2024-06-25 22:37:56 +02:00
Sandro
1813936aff
Merge pull request #272895 from xanderio/wg-access-server-0.10.1
wg-access-server: init at 0.12.1
2024-06-25 21:21:19 +02:00
Jörg Thalheim
12e24e94d3
Merge pull request #321984 from ryze312/fix_localConf
nixos/zerotierone: fix default value for localConf
2024-06-25 17:14:23 +02:00
Yaya
8e85799e54 nixos/doc/rl-2411: Add a deprecation notice for gitlab-runner 2024-06-25 17:06:45 +02:00
Yaya
95bd18b5c5 nixos/doc/rl-2411: Add a deprecation notice for gitlab 2024-06-25 17:06:45 +02:00
Yaya
6f211d899d nixos/gitlab-runner: Add support runner authentication tokens
Support for *runner registration tokens* is deprecated since GitLab
16.0, has been disabled by default in GitLab 17.0 and will be removed in
GitLab 18.0, as outlined in the [GitLab documentation].

It is possible to [re-enable support for runner registration tokens]
until GitLab 18.0, to prevent the registration workflow from
breaking.

*Runner authentication tokens*, the replacement for registration tokens,
have been available since GitLab 16.0 and are expected to be defined in
the `CI_SERVER_TOKEN` environment variable, instead of the previous
`REGISTRATION_TOKEN` variable.

This commit adds a new option
`services.gitlab-runner.services.<name>.authenticationTokenConfigFile`.
Defining such option next to
`services.gitlab-runner.services.<name>.registrationConfigFile` brings
the following benefits:
- A warning message can be emitted to notify module users about the
  upcoming breaking change with GitLab 17.0, where *runner registration
  tokens* will be disabled by default, potentially disrupting
  operations.
- Some configuration options are no longer supported with *runner
  authentication tokens* since they will be defined when creating a new
  token in the GitLab UI instead. New warning messages can be emitted to
  notify users to remove the affected options from their configuration.
- Once support for *registration tokens* has been removed in GitLab 18,
  we can remove
  `services.gitlab-runner.services.<name>.registrationConfigFile` as
  well and make module users configure an *authentication token*
  instead.

This commit changes the option type of
`services.gitlab-runner.services.<name>.registrationConfigFile` to
`with lib.types; nullOr str` to allow configuring an authentication
token in
`services.gitlab-runner.services.<name>.authenticationTokenConfigFile`
instead.

A new assertion will make sure that
`services.gitlab-runner.services.<name>.registrationConfigFile` and
`services.gitlab-runner.services.<name>.authenticationTokenConfigFile`
are mutually exclusive. Setting both at the same time would not make
much sense in this case.

[GitLab documentation]: https://docs.gitlab.com/17.0/ee/ci/runners/new_creation_workflow.html#estimated-time-frame-for-planned-changes
[re-enable support for runner registration tokens]: https://docs.gitlab.com/17.0/ee/ci/runners/new_creation_workflow.html#prevent-your-runner-registration-workflow-from-breaking
2024-06-25 17:06:45 +02:00
Yaya
92a26526b9 nixos/gitlab-runner: Remove global with lib; 2024-06-25 17:06:45 +02:00
Julien Malka
9d1a59b2e2
Merge pull request #322386 from katexochen/jonringer/rm
treewide: remove jonringer as package maintainer and code owner
2024-06-25 17:04:27 +02:00