Skip to content

Commit dc6cfbe

Browse files
authored
Merge branch 'NixOS:master' into flood-for-transmission_2025-07-19T10-51-22
2 parents 11748e5 + ac7bff2 commit dc6cfbe

File tree

393 files changed

+4067
-3677
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

393 files changed

+4067
-3677
lines changed

maintainers/maintainer-list.nix

Lines changed: 6 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1488,12 +1488,6 @@
14881488
name = "Anas Elgarhy";
14891489
keys = [ { fingerprint = "E10B D192 9231 08C7 3C35 7EC3 83E0 3DC6 F383 4086"; } ];
14901490
};
1491-
AnatolyPopov = {
1492-
email = "[email protected]";
1493-
github = "AnatolyPopov";
1494-
githubId = 2312534;
1495-
name = "Anatolii Popov";
1496-
};
14971491
andehen = {
14981492
email = "[email protected]";
14991493
github = "andehen";
@@ -12899,12 +12893,6 @@
1289912893
githubId = 20658981;
1290012894
name = "Jarosław Wygoda";
1290112895
};
12902-
jyp = {
12903-
email = "[email protected]";
12904-
github = "jyp";
12905-
githubId = 27747;
12906-
name = "Jean-Philippe Bernardy";
12907-
};
1290812896
jzellner = {
1290912897
email = "[email protected]";
1291012898
github = "sofuture";
@@ -18842,11 +18830,6 @@
1884218830
githubId = 9091609;
1884318831
name = "Omar Jatoi";
1884418832
};
18845-
omasanori = {
18846-
github = "omasanori";
18847-
githubId = 167209;
18848-
name = "Masanori Ogino";
18849-
};
1885018833
omgbebebe = {
1885118834
email = "[email protected]";
1885218835
github = "omgbebebe";
@@ -19342,6 +19325,12 @@
1934219325
githubId = 821972;
1934319326
name = "Parth Mehrotra";
1934419327
};
19328+
pascalj = {
19329+
email = "[email protected]";
19330+
github = "pascalj";
19331+
githubId = 330168;
19332+
name = "Pascal Jungblut";
19333+
};
1934519334
paschoal = {
1934619335
email = "[email protected]";
1934719336
github = "paschoal";

maintainers/team-list.nix

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1144,7 +1144,6 @@ with lib.maintainers;
11441144
sage = {
11451145
members = [
11461146
timokau
1147-
omasanori
11481147
raskin
11491148
collares
11501149
];

nixos/modules/profiles/installation-device.nix

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,11 +102,10 @@ with lib;
102102
boot.kernel.sysctl."vm.overcommit_memory" = "1";
103103

104104
# To speed up installation a little bit, include the complete
105-
# stdenv in the Nix store on the CD.
105+
# stdenvNoCC in the Nix store on the CD.
106106
system.extraDependencies =
107107
with pkgs;
108108
[
109-
stdenv
110109
stdenvNoCC # for runCommand
111110
busybox
112111
# For boot.initrd.systemd

nixos/modules/services/networking/cjdns.nix

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ let
4949
k: v:
5050
lib.optionalString (
5151
v.hostname != ""
52-
) "echo $(${pkgs.cjdns}/bin/publictoip6 ${v.publicKey}) ${v.hostname}"
52+
) "echo $(${pkgs.cjdns}/bin/cjdnstool util key2ip6 ${v.publicKey}) ${v.hostname}"
5353
) (cfg.ETHInterface.connectTo // cfg.UDPInterface.connectTo)
5454
)}
5555
'';
@@ -268,7 +268,7 @@ in
268268
269269
if [ -z "$CJDNS_PRIVATE_KEY" ]; then
270270
shopt -s lastpipe
271-
${pkg}/bin/makekeys | { read private ipv6 public; }
271+
${pkg}/bin/cjdnstool util keygen | { read private ipv6 public; }
272272
273273
install -m 600 <(echo "CJDNS_PRIVATE_KEY=$private") /etc/cjdns.keys
274274
install -m 444 <(echo -e "CJDNS_IPV6=$ipv6\nCJDNS_PUBLIC_KEY=$public") /etc/cjdns.public

nixos/modules/services/security/kanidm.nix

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -888,7 +888,14 @@ in
888888
(
889889
defaultServiceConfig
890890
// {
891-
BindReadOnlyPaths = mergePaths (defaultServiceConfig.BindReadOnlyPaths ++ secretPaths);
891+
BindReadOnlyPaths = mergePaths (
892+
defaultServiceConfig.BindReadOnlyPaths
893+
++ secretPaths
894+
++ (lib.optionals (cfg.provision.enable && !cfg.provision.acceptInvalidCerts) [
895+
"-/etc/ssl"
896+
"-/etc/static/ssl"
897+
])
898+
);
892899
}
893900
)
894901
{

nixos/modules/services/security/usbguard.nix

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -50,11 +50,7 @@ in
5050
services.usbguard = {
5151
enable = lib.mkEnableOption "USBGuard daemon";
5252

53-
package = lib.mkPackageOption pkgs "usbguard" {
54-
extraDescription = ''
55-
If you do not need the Qt GUI, use `pkgs.usbguard-nox` to save disk space.
56-
'';
57-
};
53+
package = lib.mkPackageOption pkgs "usbguard" { };
5854

5955
ruleFile = lib.mkOption {
6056
type = lib.types.nullOr lib.types.path;

nixos/modules/services/web-apps/freshrss.nix

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ let
1818
DATA_PATH = cfg.dataDir;
1919
}
2020
// lib.optionalAttrs (cfg.extensions != [ ]) {
21-
THIRDPARTY_EXTENSIONS_PATH = "${extension-env}/share/freshrss/";
21+
THIRDPARTY_EXTENSIONS_PATH = "${extension-env}/share/freshrss";
2222
};
2323
in
2424
{

nixos/modules/services/web-apps/outline.nix

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -166,6 +166,13 @@ in
166166
type = lib.types.str;
167167
description = "S3 access key.";
168168
};
169+
accelerateUrl = lib.mkOption {
170+
type = lib.types.nullOr lib.types.str;
171+
default = null;
172+
description = ''
173+
URL for AWS S3 [transfer acceleration](https://docs.aws.amazon.com/AmazonS3/latest/userguide/transfer-acceleration.html).
174+
'';
175+
};
169176
secretKeyFile = lib.mkOption {
170177
type = lib.types.path;
171178
description = "File path that contains the S3 secret key.";
@@ -682,6 +689,10 @@ in
682689
AWS_S3_ACL = cfg.storage.acl;
683690
})
684691

692+
(lib.mkIf (cfg.storage.storageType == "s3" && cfg.storage.accelerateUrl != null) {
693+
AWS_S3_ACCELERATE_URL = cfg.storage.accelerateUrl;
694+
})
695+
685696
(lib.mkIf (cfg.slackAuthentication != null) {
686697
SLACK_CLIENT_ID = cfg.slackAuthentication.clientId;
687698
})

nixos/tests/cjdns.nix

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ in
105105
106106
def cjdns_ip(machine):
107107
res = machine.succeed("ip -o -6 addr show dev tun0")
108-
ip = re.split("\s+|/", res)[3]
108+
ip = re.split("\\s+|/", res)[3]
109109
machine.log("has ip {}".format(ip))
110110
return ip
111111
@@ -116,14 +116,14 @@ in
116116
117117
# ping a few times each to let the routing table establish itself
118118
119-
alice.succeed("ping -c 4 {}".format(carol_ip6))
120-
bob.succeed("ping -c 4 {}".format(carol_ip6))
119+
alice.wait_until_succeeds("ping -c 4 {}".format(carol_ip6))
120+
bob.wait_until_succeeds("ping -c 4 {}".format(carol_ip6))
121121
122-
carol.succeed("ping -c 4 {}".format(alice_ip6))
123-
carol.succeed("ping -c 4 {}".format(bob_ip6))
122+
carol.wait_until_succeeds("ping -c 4 {}".format(alice_ip6))
123+
carol.wait_until_succeeds("ping -c 4 {}".format(bob_ip6))
124124
125-
alice.succeed("ping -c 4 {}".format(bob_ip6))
126-
bob.succeed("ping -c 4 {}".format(alice_ip6))
125+
alice.wait_until_succeeds("ping -c 4 {}".format(bob_ip6))
126+
bob.wait_until_succeeds("ping -c 4 {}".format(alice_ip6))
127127
128128
alice.wait_for_unit("httpd.service")
129129

nixos/tests/freshrss/extensions.nix

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,30 @@
88
enable = true;
99
baseUrl = "http://localhost";
1010
authType = "none";
11-
extensions = [ pkgs.freshrss-extensions.youtube ];
11+
extensions = [
12+
pkgs.freshrss-extensions.youtube
13+
pkgs.freshrss-extensions.title-wrap
14+
];
1215
};
1316
};
17+
extraPythonPackages = p: [
18+
p.lxml
19+
p.lxml-stubs
20+
];
21+
skipTypeCheck = true;
1422

1523
testScript = ''
1624
machine.wait_for_unit("multi-user.target")
1725
machine.wait_for_open_port(80)
18-
response = machine.succeed("curl -vvv -s http://localhost:80/i/?c=extension")
26+
response = machine.succeed("curl -s http://localhost:80/i/?c=extension")
1927
assert '<span class="ext_name disabled">YouTube Video Feed</span>' in response, "Extension not present in extensions page."
28+
29+
# enable Title-Wrap extension
30+
from lxml import etree
31+
tree = etree.HTML(response)
32+
csrf = tree.xpath("/html/body/header/nav/form/input/@value")[0]
33+
response = machine.succeed(f"curl --fail-with-body -s 'http://localhost:80/i/?c=extension&a=enable&e=Title-Wrap' -d '_csrf={csrf}'")
34+
# verify that the Title-Wrap css is accessible.
35+
machine.succeed("curl --fail-with-body -s 'http://localhost:80/ext.php?1=&f=xExtension-TitleWrap/static/title_wrap.css'")
2036
'';
2137
}

0 commit comments

Comments
 (0)