Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
102 commits
Select commit Hold shift + click to select a range
030486a
python310Packages.pandas-stubs: 1.5.0.221003 -> 1.5.3.230214
fabaff Feb 15, 2023
4cf459d
vte: 0.70.2 → 0.70.3
bobby285271 Feb 16, 2023
1c6c272
gnome.rygel: 0.42.0 → 0.42.1
bobby285271 Feb 16, 2023
4aec272
gnome.gnome-control-center: 43.2 → 43.4.1
bobby285271 Feb 16, 2023
bfda8cc
python310Packages.fasttext-predict: init at 0.9.2.1
SuperSandro2000 Feb 14, 2023
401ed86
searxng: unstable-2022-09-01 -> unstable-2023-03-13
SuperSandro2000 Feb 14, 2023
04dce59
searxng: replace maintainer Kranzes with me
SuperSandro2000 Feb 15, 2023
779b578
dde-api: init at 5.5.32
wineee Jan 12, 2023
5c24b15
gitlab: 15.8.1 -> 15.8.3 (#216372)
yayayayaka Feb 16, 2023
ca03813
youtrack: 2021.4.35970 -> 2022.3.65371 (#216643)
n0emis Feb 16, 2023
f919693
python310Packages.locationsharinglib: add changelog to meta
fabaff Feb 15, 2023
8e92d67
python311Packages.asyncio-dgram: disable failing test
fabaff Feb 13, 2023
8fe91fb
python311Packages.aioguardian: drop asynctest
fabaff Feb 16, 2023
51eb1a1
gnss-share: init at 0.6
balsoft Feb 15, 2023
44cc3c4
python311Packages.aioambient: drop asynctest
fabaff Feb 16, 2023
299de40
puddletag: fix wrapping
tejing1 Jan 31, 2023
5e82504
mpc-qt: 22.02 -> 23.02
r-ryantm Feb 16, 2023
271ae36
python310Packages.jupyter_console: 6.5.0 -> 6.5.1
r-ryantm Feb 16, 2023
1cd1a67
python310Packages.fake-useragent: 1.1.1 -> 1.1.2
r-ryantm Feb 16, 2023
85e9a82
python310Packages.pyhocon: 0.3.59 -> 0.3.60
r-ryantm Feb 16, 2023
4ba45d2
maintainers: add paveloom
paveloom Feb 10, 2023
b36fa00
subtitleedit: init at 3.6.11
paveloom Feb 10, 2023
07f5bc9
invoice2data: 0.3.6 -> 0.4.2
esclear Feb 11, 2023
3eaf852
python310Packages.jaxopt: init at 0.5.5
bcdarwin Feb 7, 2023
40eab8d
python310Packages.blackjax: init at 0.9.6
bcdarwin Feb 7, 2023
9344fe5
python310Packages.bambi: enable more tests
bcdarwin Feb 7, 2023
b74b47d
theforceengine: init at 1.09.100
devusb Feb 9, 2023
8ab2633
python3Packages.screed: init at 1.1.1
luizirber Dec 11, 2022
68bf2ce
maintainers: add luizirber
luizirber Dec 13, 2022
8c2b5c2
structorizer: init at 3.32-11
auroraanna Feb 7, 2023
bab65eb
chromium: 110.0.5481.77 -> 110.0.5481.100
primeos Feb 16, 2023
e667f40
ungoogled-chromium: 110.0.5481.78 -> 110.0.5481.100
primeos Feb 16, 2023
5984d5e
python311Packages.ncclient: add missing input
fabaff Feb 15, 2023
b439f45
flatpak: 1.14.1 → 1.14.2
Pheoxy Feb 12, 2023
7162be8
cemu: 2.0-22 -> 2.0-26
r-ryantm Feb 5, 2023
fd26819
rPackages.quarto: add quarto dependency
nviets Feb 17, 2023
78b5435
boxxy: 0.2.7 -> 0.3.4, add figsoda as a maintainer
figsoda Feb 15, 2023
daf38ec
terraform-providers.azuread: 2.33.0 → 2.34.0
github-actions[bot] Feb 17, 2023
8f5bafe
terraform-providers.azurerm: 3.43.0 → 3.44.0
github-actions[bot] Feb 17, 2023
743f9b9
terraform-providers.snowflake: 0.56.3 → 0.56.4
github-actions[bot] Feb 17, 2023
e888eed
terraform-providers.aws: 4.54.0 → 4.55.0
github-actions[bot] Feb 17, 2023
0a292e4
openocd: 0.11.0 -> 0.12.0
bjornfor Feb 16, 2023
f704a95
ntfy-sh: 1.30.1 -> 1.31.0
arjan-s Feb 15, 2023
63a9866
skopeo: 1.11.0 -> 1.11.1
zowoq Feb 16, 2023
83a5ca1
python3Packages.gdtoolkit: Enable tests
hesiod Feb 14, 2023
7d9fcfe
python3Packages.gdtoolkit: Add maintainer tmarkus
hesiod Feb 14, 2023
a6f8a7e
python3Packages.gdtoolkit: Move to pkgs/development/tools
hesiod Feb 14, 2023
8d209a4
redpanda: 22.3.11 -> 22.3.13
avakhrenev Feb 17, 2023
98ec148
python310Packages.canonicaljson: 1.6.4 -> 1.6.5
fabaff Feb 16, 2023
68460c4
python310Packages.canonicaljson: add changelog to meta
fabaff Feb 16, 2023
05e4fd7
python310Packages.types-python-dateutil: 2.8.19.6 -> 2.8.19.7
fabaff Feb 16, 2023
e06d48c
python310Packages.requests-pkcs12: 1.14 -> 1.15
fabaff Feb 16, 2023
5bd3590
python310Packages.pynobo: 1.6.0 -> 1.6.1
fabaff Feb 16, 2023
cc9d0de
python310Packages.pynobo: add changelog to meta
fabaff Feb 16, 2023
bac287a
mpy-utils: init at 0.1.13
aciceri Jan 28, 2023
82d5f22
zig_0_9: build with baseline CPU target
winterqt Feb 17, 2023
bae3674
nixos/no-x-libs: add vim-full
SFrijters Dec 29, 2022
bbeedf7
numix-icon-theme-square: 23.02.05 -> 23.02.16
r-ryantm Feb 17, 2023
5be67ea
prowlarr: 1.1.3.2521 -> 1.2.0.2583
rhoriguchi Feb 12, 2023
749ed7c
Revert "podman: remove wrapper"
zowoq Feb 17, 2023
f1daa77
posteid-seed-extractor: init at unstable-23-02-2022
aciceri Feb 13, 2023
d21aff4
python310Packages.playwright: set meta.platforms
dotlambda Feb 11, 2023
d773b2e
vaultwarden.webvault: build from source
dotlambda Feb 16, 2023
fd0d426
vaultwarden.updateScript: make compatible with webvault built from so…
dotlambda Feb 16, 2023
576b59d
nasin-nanpa: init at 2.5.1
somasis Mar 15, 2022
7722add
syncthing: fix cross
yuyuyureka Feb 16, 2023
5a0bcdb
teleport: 11.2.3 -> 11.3.4
justinas Feb 3, 2023
0fa7a89
tl-expected: 2019-11-11 -> 2023-02-15
centromere Feb 15, 2023
e755ef5
kotatogram-desktop: fix tg_owt
centromere Feb 16, 2023
c0029b7
clamav: 1.0.0 -> 1.0.1
arjan-s Feb 17, 2023
8a77548
mutagen-compose: 0.16.4 -> 0.16.5
r-ryantm Feb 17, 2023
ea6433b
pianotrans: 1.0 -> 1.0.1
azuwis Feb 17, 2023
8a2880f
eartag: 0.3.1 -> 0.3.2
foo-dogsquared Feb 17, 2023
905b9f9
faas-cli: 0.15.4 -> 0.15.9
welteki Feb 16, 2023
4060113
python310Packages.leb128: 1.0.4 -> 1.0.5
r-ryantm Feb 16, 2023
e95847d
cwltool: 3.1.20230209161050 -> 3.1.20230213100550
r-ryantm Feb 16, 2023
a7a2b98
nix-your-shell: 1.0.2 -> 1.1.0
9999years Feb 16, 2023
ead72f0
usql: 0.13.8 -> 0.13.9
anthonyroussel Feb 16, 2023
1f94a7c
flycast: 2.0 -> 2.1
Feb 16, 2023
b23ec16
ledger-live-desktop: 2.51.0 -> 2.53.2
MGenerowicz Feb 16, 2023
63caa53
python310Packages.types-requests: 2.28.11.12 -> 2.28.11.13
fabaff Feb 16, 2023
bd424d2
nixos/systemd-repart: enable running after initrd
nikstur Feb 14, 2023
59448a1
python310Packages.ansible-doctor: 2.0.0 -> 2.0.1
r-ryantm Feb 17, 2023
25e9a4a
python310Packages.pynvml: 11.4.1 -> 11.5.0
r-ryantm Feb 17, 2023
6d04b39
wiki-tui: 0.6.1 -> 0.6.3
legendofmiracles Feb 16, 2023
65b95a2
onlyoffice: allow ExecStartPre additions
Feb 8, 2023
e3303e2
obs-vkcapture: fix xcursor not rendering
YellowOnion Feb 16, 2023
ea3064b
python310Packages.oslo-serialization: 5.0.0 -> 5.1.0
r-ryantm Feb 12, 2023
b5692f9
traefik: 2.9.6 -> 2.9.8
NickCao Feb 16, 2023
079f9a2
rqlite: init at 7.6.1 (#187962)
dit7ya Feb 17, 2023
f60c815
nest: init at 3.3
jiegec Nov 1, 2022
3567b25
nodejs-14_x: 14.21.2 -> 14.21.3
marsam Feb 17, 2023
bc0dfb7
nodejs-16_x: 16.19.0 -> 16.19.1
marsam Feb 17, 2023
a628b11
nodejs-18_x: 18.14.0 -> 18.14.1
marsam Feb 17, 2023
b8438b5
nodejs-19_x: 19.6.0 -> 19.6.1
marsam Feb 17, 2023
a9a9f80
cargo-valgrind: 2.1.0 -> 2.1.1
r-ryantm Feb 17, 2023
ac51c5e
yt-dlp: 2023.1.6 -> 2023.2.17
iblech Feb 17, 2023
9b3f256
maintaniers: remove dizfer
Feb 17, 2023
7ebc968
flexget: 3.5.23 -> 3.5.24
marsam Feb 17, 2023
aad02ff
tbb: Split into tbb_2020_3 and tbb_2021_8
hesiod Feb 10, 2023
2bb0593
tbb_2021_8: use gcc11
davidak Feb 18, 2023
07b34cd
tbb_2020_3: use gcc9
davidak Feb 18, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
24 changes: 18 additions & 6 deletions maintainers/maintainer-list.nix
Original file line number Diff line number Diff line change
Expand Up @@ -1337,6 +1337,12 @@
githubId = 12958979;
name = "Mika Naylor";
};
avakhrenev = {
email = "[email protected]";
github = "avakhrenev";
githubId = 1060224;
name = "Alexey Vakhrenev";
};
avaq = {
email = "[email protected]";
github = "Avaq";
Expand Down Expand Up @@ -3472,12 +3478,6 @@
githubId = 14034137;
name = "Mostly Void";
};
dizfer = {
email = "[email protected]";
github = "DIzFer";
githubId = 8852888;
name = "David Izquierdo";
};
djacu = {
email = "[email protected]";
github = "djacu";
Expand Down Expand Up @@ -7961,6 +7961,12 @@
githubId = 22085373;
name = "Luis Hebendanz";
};
luizirber = {
email = "[email protected]";
github = "luizirber";
githubId = 6642;
name = "Luiz Irber";
};
luizribeiro = {
email = "[email protected]";
matrix = "@luizribeiro:matrix.org";
Expand Down Expand Up @@ -10529,6 +10535,12 @@
githubId = 15645854;
name = "Brad Christensen";
};
paveloom = {
email = "[email protected]";
github = "paveloom";
githubId = 49961859;
name = "Pavel Sobolev";
};
payas = {
email = "[email protected]";
github = "bhankas";
Expand Down
29 changes: 27 additions & 2 deletions nixos/modules/config/no-x-libs.nix
Original file line number Diff line number Diff line change
Expand Up @@ -30,18 +30,43 @@ with lib;
beam = super.beam_nox;
cairo = super.cairo.override { x11Support = false; };
dbus = super.dbus.override { x11Support = false; };
ffmpeg_4 = super.ffmpeg_4.override { sdlSupport = false; vdpauSupport = false; };
ffmpeg_5 = super.ffmpeg_5.override { sdlSupport = false; vdpauSupport = false; };
ffmpeg_4 = super.ffmpeg_4-headless;
ffmpeg_5 = super.ffmpeg_5-headless;
# dep of graphviz, libXpm is optional for Xpm support
gd = super.gd.override { withXorg = false; };
gobject-introspection = super.gobject-introspection.override { x11Support = false; };
gpsd = super.gpsd.override { guiSupport = false; };
graphviz = super.graphviz-nox;
gst_all_1 = super.gst_all_1 // {
gst-plugins-base = super.gst_all_1.gst-plugins-base.override { enableX11 = false; };
};
imagemagick = super.imagemagick.override { libX11Support = false; libXtSupport = false; };
imagemagickBig = super.imagemagickBig.override { libX11Support = false; libXtSupport = false; };
libdevil = super.libdevil-nox;
libextractor = super.libextractor.override { gtkSupport = false; };
libva = super.libva-minimal;
limesuite = super.limesuite.override { withGui = false; };
mpv-unwrapped = super.mpv-unwrapped.override { sdl2Support = false; x11Support = false; };
msmtp = super.msmtp.override { withKeyring = false; };
networkmanager-fortisslvpn = super.networkmanager-fortisslvpn.override { withGnome = false; };
networkmanager-iodine = super.networkmanager-iodine.override { withGnome = false; };
networkmanager-l2tp = super.networkmanager-l2tp.override { withGnome = false; };
networkmanager-openconnect = super.networkmanager-openconnect.override { withGnome = false; };
networkmanager-openvpn = super.networkmanager-openvpn.override { withGnome = false; };
networkmanager-sstp = super.networkmanager-vpnc.override { withGnome = false; };
networkmanager-vpnc = super.networkmanager-vpnc.override { withGnome = false; };
pango = super.pango.override { x11Support = false; };
pinentry = super.pinentry.override { enabledFlavors = [ "curses" "tty" "emacs" ]; withLibsecret = false; };
qemu = super.qemu.override { gtkSupport = false; spiceSupport = false; sdlSupport = false; };
qrencode = super.qrencode.overrideAttrs (_: { doCheck = false; });
qt5 = super.qt5.overrideScope' (self': super': {
qtbase = super'.qtbase.override { withGtk3 = false; };
});
stoken = super.stoken.override { withGTK3 = false; };
# translateManpages -> perlPackages.po4a -> texlive-combined-basic -> texlive-core-big -> libX11
util-linux = super.util-linux.override { translateManpages = false; };
vim-full = super.vim-full.override { guiSupport = false; };
zbar = super.zbar.override { enableVideo = false; withXorg = false; };
}));
};
}
2 changes: 1 addition & 1 deletion nixos/modules/services/web-apps/onlyoffice.nix
Original file line number Diff line number Diff line change
Expand Up @@ -267,7 +267,7 @@ in
wantedBy = [ "multi-user.target" ];
serviceConfig = {
ExecStart = "${cfg.package.fhs}/bin/onlyoffice-wrapper DocService/docservice /run/onlyoffice/config";
ExecStartPre = onlyoffice-prestart;
ExecStartPre = [ onlyoffice-prestart ];
Group = "onlyoffice";
Restart = "always";
RuntimeDirectory = "onlyoffice";
Expand Down
123 changes: 123 additions & 0 deletions nixos/modules/system/boot/systemd/repart.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,123 @@
{ config, pkgs, lib, ... }:

let
cfg = config.systemd.repart;
initrdCfg = config.boot.initrd.systemd.repart;

writeDefinition = name: partitionConfig: pkgs.writeText
"${name}.conf"
(lib.generators.toINI { } { Partition = partitionConfig; });

listOfDefinitions = lib.mapAttrsToList
writeDefinition
(lib.filterAttrs (k: _: !(lib.hasPrefix "_" k)) cfg.partitions);

# Create a directory in the store that contains a copy of all definition
# files. This is then passed to systemd-repart in the initrd so it can access
# the definition files after the sysroot has been mounted but before
# activation. This needs a hard copy of the files and not just symlinks
# because otherwise the files do not show up in the sysroot.
definitionsDirectory = pkgs.runCommand "systemd-repart-definitions" { } ''
mkdir -p $out
${(lib.concatStringsSep "\n"
(map (pkg: "cp ${pkg} $out/${pkg.name}") listOfDefinitions)
)}
'';
in
{
options = {
boot.initrd.systemd.repart.enable = lib.mkEnableOption (lib.mdDoc "systemd-repart") // {
description = lib.mdDoc ''
Grow and add partitions to a partition table at boot time in the initrd.
systemd-repart only works with GPT partition tables.

To run systemd-repart after the initrd, see
`options.systemd.repart.enable`.
'';
};

systemd.repart = {
enable = lib.mkEnableOption (lib.mdDoc "systemd-repart") // {
description = lib.mdDoc ''
Grow and add partitions to a partition table.
systemd-repart only works with GPT partition tables.

To run systemd-repart while in the initrd, see
`options.boot.initrd.systemd.repart.enable`.
'';
};

partitions = lib.mkOption {
type = with lib.types; attrsOf (attrsOf (oneOf [ str int bool ]));
default = { };
example = {
"10-root" = {
Type = "root";
};
"20-home" = {
Type = "home";
SizeMinBytes = "512M";
SizeMaxBytes = "2G";
};
};
description = lib.mdDoc ''
Specify partitions as a set of the names of the definition files as the
key and the partition configuration as its value. The partition
configuration can use all upstream options. See <link
xlink:href="https://www.freedesktop.org/software/systemd/man/repart.d.html"/>
for all available options.
'';
};
};
};

config = lib.mkIf (cfg.enable || initrdCfg.enable) {
# Always link the definitions into /etc so that they are also included in
# the /nix/store of the sysroot during early userspace (i.e. while in the
# initrd).
environment.etc."repart.d".source = definitionsDirectory;

boot.initrd.systemd = lib.mkIf initrdCfg.enable {
additionalUpstreamUnits = [
"systemd-repart.service"
];

storePaths = [
"${config.boot.initrd.systemd.package}/bin/systemd-repart"
];

# Override defaults in upstream unit.
services.systemd-repart = {
# Unset the conditions as they cannot be met before activation because
# the definition files are not stored in the expected locations.
unitConfig.ConditionDirectoryNotEmpty = [
" " # required to unset the previous value.
];
serviceConfig = {
# systemd-repart runs before the activation script. Thus we cannot
# rely on them being linked in /etc already. Instead we have to
# explicitly pass their location in the sysroot to the binary.
ExecStart = [
" " # required to unset the previous value.
''${config.boot.initrd.systemd.package}/bin/systemd-repart \
--definitions=/sysroot${definitionsDirectory} \
--dry-run=no
''
];
};
# Because the initrd does not have the `initrd-usr-fs.target` the
# upestream unit runs too early in the boot process, before the sysroot
# is available. However, systemd-repart needs access to the sysroot to
# find the definition files.
after = [ "sysroot.mount" ];
};
};

systemd = lib.mkIf cfg.enable {
additionalUpstreamSystemUnits = [
"systemd-repart.service"
];
};
};

}
97 changes: 75 additions & 22 deletions nixos/modules/virtualisation/podman/default.nix
Original file line number Diff line number Diff line change
@@ -1,13 +1,14 @@
{ config, lib, pkgs, ... }:
let
cfg = config.virtualisation.podman;
toml = pkgs.formats.toml { };
json = pkgs.formats.json { };

inherit (lib) mkOption types;

podmanPackage = (pkgs.podman.override {
extraPackages = cfg.extraPackages
# setuid shadow
++ [ "/run/wrappers" ]
++ lib.optional (builtins.elem "zfs" config.boot.supportedFilesystems) config.boot.zfs.package;
});

Expand All @@ -27,24 +28,13 @@ let
done
'';

net-conflist = pkgs.runCommand "87-podman-bridge.conflist"
{
nativeBuildInputs = [ pkgs.jq ];
extraPlugins = builtins.toJSON cfg.defaultNetwork.extraPlugins;
jqScript = ''
. + { "plugins": (.plugins + $extraPlugins) }
'';
} ''
jq <${cfg.package}/etc/cni/net.d/87-podman-bridge.conflist \
--argjson extraPlugins "$extraPlugins" \
"$jqScript" \
>$out
'';

in
{
imports = [
./dnsname.nix
(lib.mkRemovedOptionModule [ "virtualisation" "podman" "defaultNetwork" "dnsname" ]
"Use virtualisation.podman.defaultNetwork.settings.dns_enabled instead.")
(lib.mkRemovedOptionModule [ "virtualisation" "podman" "defaultNetwork" "extraPlugins" ]
"Netavark isn't compatible with CNI plugins.")
./network-socket.nix
];

Expand Down Expand Up @@ -109,6 +99,37 @@ in
'';
};

autoPrune = {
enable = mkOption {
type = types.bool;
default = false;
description = lib.mdDoc ''
Whether to periodically prune Podman resources. If enabled, a
systemd timer will run `podman system prune -f`
as specified by the `dates` option.
'';
};

flags = mkOption {
type = types.listOf types.str;
default = [];
example = [ "--all" ];
description = lib.mdDoc ''
Any additional flags passed to {command}`podman system prune`.
'';
};

dates = mkOption {
default = "weekly";
type = types.str;
description = lib.mdDoc ''
Specification (in the format described by
{manpage}`systemd.time(7)`) of the time at
which the prune will occur.
'';
};
};

package = lib.mkOption {
type = types.package;
default = podmanPackage;
Expand All @@ -118,11 +139,11 @@ in
'';
};

defaultNetwork.extraPlugins = lib.mkOption {
type = types.listOf json.type;
default = [ ];
defaultNetwork.settings = lib.mkOption {
type = json.type;
default = { };
description = lib.mdDoc ''
Extra CNI plugin configurations to add to podman's default network.
Settings for podman's default network.
'';
};

Expand All @@ -133,11 +154,26 @@ in
environment.systemPackages = [ cfg.package ]
++ lib.optional cfg.dockerCompat dockerCompat;

environment.etc."cni/net.d/87-podman-bridge.conflist".source = net-conflist;
# https://github.com/containers/podman/blob/097cc6eb6dd8e598c0e8676d21267b4edb11e144/docs/tutorials/basic_networking.md#default-network
environment.etc."containers/networks/podman.json" = lib.mkIf (cfg.defaultNetwork.settings != { }) {
source = json.generate "podman.json" ({
dns_enabled = false;
driver = "bridge";
id = "0000000000000000000000000000000000000000000000000000000000000000";
internal = false;
ipam_options = { driver = "host-local"; };
ipv6_enabled = false;
name = "podman";
network_interface = "podman0";
subnets = [{ gateway = "10.88.0.1"; subnet = "10.88.0.0/16"; }];
} // cfg.defaultNetwork.settings);
};

virtualisation.containers = {
enable = true; # Enable common /etc/containers configuration
containersConf.settings = lib.optionalAttrs cfg.enableNvidia {
containersConf.settings = {
network.network_backend = "netavark";
} // lib.optionalAttrs cfg.enableNvidia {
engine = {
conmon_env_vars = [ "PATH=${lib.makeBinPath [ pkgs.nvidia-podman ]}" ];
runtimes.nvidia = [ "${pkgs.nvidia-podman}/bin/nvidia-container-runtime" ];
Expand All @@ -151,6 +187,23 @@ in
ExecStart = [ "" "${cfg.package}/bin/podman $LOGGING system service" ];
};

systemd.services.podman-prune = {
description = "Prune podman resources";

restartIfChanged = false;
unitConfig.X-StopOnRemoval = false;

serviceConfig.Type = "oneshot";

script = ''
${cfg.package}/bin/podman system prune -f ${toString cfg.autoPrune.flags}
'';

startAt = lib.optional cfg.autoPrune.enable cfg.autoPrune.dates;
after = [ "podman.service" ];
requires = [ "podman.service" ];
};

systemd.sockets.podman.wantedBy = [ "sockets.target" ];
systemd.sockets.podman.socketConfig.SocketGroup = "podman";

Expand Down
Loading