Commit Graph

14788 Commits

Author SHA1 Message Date
Ryan Lahfa
30307eba48
Merge pull request #207453 from p-h/ulogd
ulogd: init at 2.0.8
2022-12-30 14:13:53 +01:00
alyaeanyx
ebe0608ada nixos/openconnect: fix null cases for user and passwordFile options 2022-12-30 10:10:54 +01:00
Naïm Favier
9fdbf01835
Merge pull request #188002 from Izorkin/update-nginx-brotli 2022-12-29 16:24:05 +01:00
figsoda
403c65ab00
Merge pull request #207875 from SuperSandro2000/nixos-kuma-fix-link
nixos/uptime-kuma: fix link
2022-12-29 10:18:21 -05:00
Izorkin
4a7d0140a0
nixos/nginx: add recommended brotli settings 2022-12-29 18:14:35 +03:00
Sandro
2c421416da
Merge pull request #207913 from SuperSandro2000/grafana-localhost
Closes https://github.com/NixOS/nixpkgs/issues/207769
2022-12-29 15:43:40 +01:00
Sandro
de1b8b9c0f
Update nixos/modules/services/monitoring/uptime-kuma.nix
Co-authored-by: figsoda <figsoda@pm.me>
2022-12-29 15:41:04 +01:00
K900
14a61e74be
Merge pull request #208220 from K900/more-supergfx-fixups
nixos/supergfxd: make config file read/write
2022-12-29 15:58:50 +03:00
Maximilian Bosch
6873c69ada
Merge pull request #207774 from NetaliDev/pdns-secretfile
nixos/powerdns: add secretFile option
2022-12-29 12:28:13 +01:00
K900
25bb55495b nixos/supergfxd: make config file read/write 2022-12-29 14:17:24 +03:00
Sandro Jäckel
7e0588b2fb
nixos/grafana: listen on localhost by default (again) 2022-12-29 03:00:14 +01:00
Naïm Favier
e182da8622
Merge pull request #206939 from tavi-vi/tinc-restart-fix 2022-12-28 22:21:41 +01:00
Sandro
451fbb186b
nixos/hedgedoc: update features note with hedgedoc (#199053)
Co-authored-by: Naïm Favier <n@monade.li>
2022-12-28 21:52:58 +01:00
Sandro
1fc59dfbc7
Merge pull request #206102 from 4z3/exim-can-credentials 2022-12-28 20:53:22 +01:00
Robert Hensing
f03c7fb8d4 nixos/version: Only warn about unset stateVersion if used
If a configuration does not use services that depend on the
stateVersion, it does not need to be set.

This provides an incentive for services not to rely on
stateVersion, and not to burden users with this.
2022-12-28 14:35:14 +01:00
Artturi
a65df1ed0b
Merge pull request #193894 from amjoseph-nixpkgs/pr/nixos/arch-without-inferiors 2022-12-28 15:08:09 +02:00
Bjørn Forsman
0f0929f4aa nixos/borgbackup: fix ~/.cache, ~/.config ownership
Invoke `install` separately for each directory to get ownership right --
i.e. not always owned by root. When owned by root, user sessions break
as no user processes are allowed to create directores there. On normal
systems the directories already exist, but in clean environments / NixOS
test VMs, the bug shows.

Before:
  $ namei -l /home/user1/.cache/borg
  f: /home/user1/.cache/borg
  drwxr-xr-x root  root  /
  drwxr-xr-x root  root  home
  drwx------ user1 users user1
  drwxr-xr-x root  root  .cache
  drwxr-xr-x user1 users borg

After:
  $ namei -l /home/user1/.cache/borg
  f: /home/user1/.cache/borg
  drwxr-xr-x root  root  /
  drwxr-xr-x root  root  home
  drwx------ user1 users user1
  drwxr-xr-x user1 users .cache
  drwxr-xr-x user1 users borg
2022-12-28 13:07:16 +01:00
Ryan Lahfa
861c7b189c
Merge pull request #182360 from Yarny0/cups-pdf
cups-pdf(-to-pdf): init
2022-12-28 09:08:49 +01:00
Sandro
ad8ae1b208
Merge pull request #207754 from leona-ya/paperless-ngx/fix-module-1.10.2
fixes https://github.com/NixOS/nixpkgs/issues/207965
2022-12-28 01:05:49 +01:00
Philippe Hürlimann
bcbedfeefc nixos/ulogd: init
Heavily based on original work by xvuko

Co-authored-by: xvuko <nix@vuko.pl>
2022-12-28 00:17:28 +01:00
K900
e59753591b
Merge pull request #192285 from illdefined/akkoma
akkoma: init at 3.5.0
2022-12-27 22:30:10 +03:00
Domen Kožar
93fb6f14eb
Merge pull request #207960 from domenkozar/cachix-agent-reliability
cachix-agent: always restart
2022-12-27 15:15:50 +00:00
Mikael Voss
2490ee906e
nixos/akkoma: init 2022-12-27 14:37:00 +01:00
Domen Kožar
3148ec4f6c cachix-agent: always restart 2022-12-27 12:24:01 +00:00
Sandro
9bc0aeb745
nixos/uptime-kuma: fix link 2022-12-26 21:52:30 +01:00
Ryan Lahfa
b2b06a2677
Merge pull request #207693 from tazjin/fix-public-inbox
nixos/public-inbox: fix incorrectly restrictive option type
2022-12-26 21:25:05 +01:00
Michal Sojka
3708ee280b nixos/nix-daemon: fix typo 2022-12-26 20:45:13 +01:00
figsoda
6175aaa7d2
Merge pull request #207777 from lilyinstarlight/fix/nix-daemon-coercible
nixos/nix-daemon: fix isCoercibleToString typo
2022-12-25 21:40:08 -05:00
netali
64a957a7d1
nixos/powerdns: add secretFile option 2022-12-26 02:12:31 +01:00
Maciej Krüger
94373a589b
Merge pull request #203011 from duament/firewall-nftables 2022-12-26 00:57:24 +01:00
Leona Maroni
2d7b8ef56f
nixos/paperless: update for paperless-ngx 1.10.2 2022-12-25 23:07:44 +00:00
Sandro
682e55d80d
Merge pull request #207388 from SuperSandro2000/nixos/dex 2022-12-25 19:41:48 +01:00
Vincent Ambo
aea521150d nixos/public-inbox: fix incorrectly restrictive option type
The `freeformType` of `settings.publicinbox` in this module prevented
users from setting settings on the `publicinbox` section itself (which
is necessary for making e.g. IMAP work correctly), and only allowed
configuration of nested per-inbox sections.

In general I believe that these overly specific types which are
traditional in NixOS, and this kind of config generation, are a huge
footgun. This commit is the least invasive change that makes the
module work correctly.
2022-12-25 16:45:58 +03:00
Andrew Childs
4ec86b13c9
pleroma: 2.4.4 -> 2.5.0 (#207521) 2022-12-25 13:38:55 +01:00
Bjørn Forsman
700adb32e9 nixos/sane: point SANE_CONFIG_DIR away from /etc/sane.d
This brings back the ability to e.g. configure sane-airscan with
`environment.etc."sane.d/airscan.conf".text = ...`.

(AFAICT, sane-airscan loads all config files it finds, so it'll first
load the one from the nixos hardware.sane.* configuration, then the user
specified one in /etc/sane.d/airscan.conf.)

Fixes: 4fbec87a5b ("nixos/sane: point env vars to /etc for quick reload")

Fixes https://github.com/NixOS/nixpkgs/issues/207262
2022-12-25 12:34:50 +01:00
Phosu Parsons
ff9dbe90d7 services.pixiecore: add quick option 2022-12-25 09:33:38 +01:00
Lily Foster
7def7250be
nixos/nix-daemon: fix isCoercibleToString typo
It isn't exported at the top-level lib and needs to be qualified.
2022-12-24 13:34:06 -05:00
Guillaume Girol
8abfd56121
Merge pull request #207532 from Mic92/nginx-fix
nixos/nginx: disable configuration validation for now
2022-12-24 15:30:21 +00:00
Sandro
c8c8ac5cc6
Merge pull request #203449 from yaxitech/azure-quote-provider 2022-12-24 16:19:39 +01:00
Maximilian Bosch
5dfbae068f
Merge pull request #206878 from SebTM/fix/greetd_sds_type
greetd: Fix systemd-output in greetd/tuigreed
2022-12-24 11:11:27 +01:00
Jörg Thalheim
7ef58bce9d nixos/nginx: disable configuration validation for now
There still seem a lot of breakages not addressed yet:

https://github.com/NixOS/nixpkgs/pull/205561
2022-12-24 09:25:43 +01:00
Izorkin
37bea1a089
nixos/peertube: add SyslogIdentifier 2022-12-23 20:47:05 +03:00
Izorkin
ff099060ed
nixos/peertube: fix typo 2022-12-23 20:47:05 +03:00
Izorkin
9195f02b49
nixos/peertube: add secretsFile option 2022-12-23 20:47:04 +03:00
Izorkin
32673128e5
nixos/peertube: update nginx configuration 2022-12-23 20:47:04 +03:00
Izorkin
1915c85b9e
peertube: 4.3.1 -> 5.0.0 2022-12-23 20:46:54 +03:00
Naïm Favier
eb13e0bb84
Merge pull request #207342 from SuperSandro2000/nitter 2022-12-23 17:20:26 +01:00
Kristoffer Dalby
571780384a
headscale: Update to 0.17.1, conform module to RFC0042
This commit upgrades headscale to the newest version, 0.17.0 and updates
the module with the current breaking config changes.

In addition, the module is rewritten to conform with RFC0042 to try to
prevent some drift between the module and the upstream.

A new maintainer, Misterio77, is added as maintainer.

Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Co-authored-by: Gabriel Fontes <hi@m7.rs>
Co-authored-by: Geoffrey Huntley <ghuntley@ghuntley.com>
2022-12-23 15:47:53 +01:00
Bobby Rong
d7e2c900d7
Merge pull request #206847 from bobby285271/cinnamon-nemo-extensions
cinnamon.nemo-with-extensions: init
2022-12-23 17:09:55 +08:00
Sandro Jäckel
32b35888d6
nixos/dex: fix ssl cert validation 2022-12-23 06:39:26 +01:00