Commit Graph

31255 Commits

Author SHA1 Message Date
Sandro
3176d6fb53
Merge pull request #315144 from mattpolzin/default-nodename-fix
nixos/services.kubernetes.kubelet: handle non-lower case chars in hostname
2024-06-25 22:38:46 +02:00
Sandro
5b0ea759a7
Merge pull request #318347 from caffineehacker/vaultwarden_backup
nixos/vaultwarden: backup all rsa_keys
2024-06-25 22:37:56 +02:00
Sandro
1813936aff
Merge pull request #272895 from xanderio/wg-access-server-0.10.1
wg-access-server: init at 0.12.1
2024-06-25 21:21:19 +02:00
Jörg Thalheim
12e24e94d3
Merge pull request #321984 from ryze312/fix_localConf
nixos/zerotierone: fix default value for localConf
2024-06-25 17:14:23 +02:00
Yaya
6f211d899d nixos/gitlab-runner: Add support runner authentication tokens
Support for *runner registration tokens* is deprecated since GitLab
16.0, has been disabled by default in GitLab 17.0 and will be removed in
GitLab 18.0, as outlined in the [GitLab documentation].

It is possible to [re-enable support for runner registration tokens]
until GitLab 18.0, to prevent the registration workflow from
breaking.

*Runner authentication tokens*, the replacement for registration tokens,
have been available since GitLab 16.0 and are expected to be defined in
the `CI_SERVER_TOKEN` environment variable, instead of the previous
`REGISTRATION_TOKEN` variable.

This commit adds a new option
`services.gitlab-runner.services.<name>.authenticationTokenConfigFile`.
Defining such option next to
`services.gitlab-runner.services.<name>.registrationConfigFile` brings
the following benefits:
- A warning message can be emitted to notify module users about the
  upcoming breaking change with GitLab 17.0, where *runner registration
  tokens* will be disabled by default, potentially disrupting
  operations.
- Some configuration options are no longer supported with *runner
  authentication tokens* since they will be defined when creating a new
  token in the GitLab UI instead. New warning messages can be emitted to
  notify users to remove the affected options from their configuration.
- Once support for *registration tokens* has been removed in GitLab 18,
  we can remove
  `services.gitlab-runner.services.<name>.registrationConfigFile` as
  well and make module users configure an *authentication token*
  instead.

This commit changes the option type of
`services.gitlab-runner.services.<name>.registrationConfigFile` to
`with lib.types; nullOr str` to allow configuring an authentication
token in
`services.gitlab-runner.services.<name>.authenticationTokenConfigFile`
instead.

A new assertion will make sure that
`services.gitlab-runner.services.<name>.registrationConfigFile` and
`services.gitlab-runner.services.<name>.authenticationTokenConfigFile`
are mutually exclusive. Setting both at the same time would not make
much sense in this case.

[GitLab documentation]: https://docs.gitlab.com/17.0/ee/ci/runners/new_creation_workflow.html#estimated-time-frame-for-planned-changes
[re-enable support for runner registration tokens]: https://docs.gitlab.com/17.0/ee/ci/runners/new_creation_workflow.html#prevent-your-runner-registration-workflow-from-breaking
2024-06-25 17:06:45 +02:00
Yaya
92a26526b9 nixos/gitlab-runner: Remove global with lib; 2024-06-25 17:06:45 +02:00
Julien Malka
9d1a59b2e2
Merge pull request #322386 from katexochen/jonringer/rm
treewide: remove jonringer as package maintainer and code owner
2024-06-25 17:04:27 +02:00
Bobby Rong
1373dd5ac8
Merge pull request #322186 from bobby285271/upd/cinnamon-xapps
Cinnamon updates 2024-06-24
2024-06-25 21:33:27 +08:00
Moritz Sanft
43990c5428
nixos/prometheus: remove minio exporter 2024-06-25 11:00:01 +02:00
Alexander Sieg
369cfec06d
nixos/wg-access-server: init module 2024-06-25 10:59:30 +02:00
Paul Meyer
fbe8538aa1 treewide: remove jonringer as package maintainer
Signed-off-by: Paul Meyer <49727155+katexochen@users.noreply.github.com>
2024-06-25 09:16:56 +02:00
Franz Pletz
e6e4cd92ad
Merge pull request #322211 from NyCodeGHG/update-libvirt
libvirt: 10.0.0 -> 10.4.0, nixos/libvirtd: add ssh proxy option
2024-06-25 05:47:13 +02:00
rewine
9b3299c8cd
Merge pull request #310778 from wineee/dde23
deepin desktop environment: update
2024-06-25 09:52:28 +08:00
Thiago Kenji Okada
30c578e589
Merge pull request #321987 from thiagokokada/rtorrent-add-hardening
nixos/rtorrent: add systemd hardening configuration
2024-06-25 02:34:42 +01:00
Thiago Kenji Okada
406ebf3ad6 nixos/rtorrent: make RuntimeDirectory not world readable 2024-06-24 19:01:17 -03:00
Thiago Kenji Okada
33f1e2ece3 nixos/rtorrent: add systemd hardening configuration 2024-06-24 19:01:16 -03:00
Will Fancher
2893f56de0
Merge pull request #319359 from misuzu/clevis-zfs-fix
nixos/clevis: add support for parent encrypted zfs datasets
2024-06-24 14:47:55 -04:00
Felix Bühler
e1f89770af
Merge pull request #302909 from Stunkymonkey/vagrant-guest-install-chmod
nixos/vagrant-guest: prefer 'install' over 'chmod'
2024-06-24 19:47:59 +02:00
Marie Ramlow
35b3707f20 nixos/libvirtd: add ssh proxy option 2024-06-24 17:20:05 +02:00
Bobby Rong
510d7c2239
nixos/cinnamon: Don't ship apps that are not shipped in Mint 22
My reasons following Mint are:

1. Geary signed https://stopthemingmy.app, per request we shouldn't pre-ship it under a themed desktop environment.
   See also b7937b4509

2. Hexchat is still gtk2 and is not maintained anymore, Mint encourages switching to Matrix instead.
   See also https://blog.linuxmint.com/?p=4675 ("Joining the Matrix")
2024-06-24 22:30:18 +08:00
Pol Dellaiera
f95c186eb9
nixos/private-gpt: remove drupol from maintainers 2024-06-24 09:13:15 +02:00
Yt
6d455fee01
Merge pull request #321828 from Shawn8901/stalwart-spamfilter
stalwart-mail: include pre-defined spam-filter
2024-06-24 00:08:49 +00:00
tomberek
73d924022e
Merge pull request #314917 from christoph-heiss/sourcehut-fix
nixos: sourcehut: fix some binary paths
2024-06-23 18:43:57 -04:00
Franz Pletz
3c033186ee
Merge pull request #316727 from jpds/nixos-tests-prometheus
nixos/prometheus: Revamp tests
2024-06-23 23:05:06 +02:00
Martin Weinelt
242807e0e7
Merge pull request #322011 from kkoniuszy/add-home-assistant-custom-components-spook
home-assistant-custom-components.spook: init at 3.0.1
2024-06-23 22:24:14 +02:00
Kacper Koniuszy
7b81a213cf nixos/home-assistant: fix symlinking multi-manifest custom components
frenck/spook includes a second manifest for an integration. The current
copyCustomComponents script assumed that only one component directory
will be found, which in this case resulted in a malformed symlink
destination:

lrwxrwxrwx 1 hass hass 224 Jun 23 17:23 spook -> '/nix/store/r41ics22zs578avzqf7x86plcgn2q71h-python3.12-frenck-spook-v3.0.1/custom_components/spook/integrations/spook_inverse'$'\n''/nix/store/r41ics22zs578avzqf7x86plcgn2q71h-python3.12-frenck-spook-v3.0.1/custom_components/spook'
2024-06-23 22:03:37 +02:00
Mathew Polzin
88d934879a nixos/services.kubernetes.kubelet: handle non-lower case characters in hostname 2024-06-23 14:06:42 -05:00
Shawn8901
ac961ac498 nixos/stalwart-mail: set pre-defined spam-filter rules 2024-06-23 21:01:14 +02:00
Maximilian Bosch
2ac989c06f
Merge pull request #321931 from Ma27/occ-improvements
nixos/nextcloud: occ improvements
2024-06-23 17:42:42 +00:00
Artturin
f575ce82ff
Merge pull request #321711 from alois31/nix-2.18.3
nixVersions.nix_2_18: 2.18.2 -> 2.18.3
2024-06-23 20:36:31 +03:00
rewine
8e793b457a deepin.nix: update 2024-06-24 00:26:00 +08:00
rewine
6ce4843893 nixos/modules: init deepin-anything 2024-06-24 00:25:56 +08:00
Ryze
10962c7ca2
nixos/zerotierone: fix default value for localConf 2024-06-23 18:10:59 +03:00
Artturin
ef00c78e0d
nixos/jenkins: add RuntimeDirectory
Necessary for jenkins socket which has to be enabled with

`JENKINS_UNIX_DOMAIN_PATH=/run/jenkins/jenkins.socket`

in `services.jenkins.environment`

https://www.github.com/jenkinsci/packaging/issues/455
2024-06-23 18:00:35 +03:00
K900
fd7e20b819
Merge pull request #321944 from K900/allow-null-password
nixos/plasma6: allow null password for screen lock
2024-06-23 17:52:53 +03:00
Masum Reza
be54c7d931
Merge pull request #320737 from Reputable2772/path-priority
nixos/hyprland: set path order for systemd user services
2024-06-23 19:49:48 +05:30
Bobby Rong
e68b4241db
Merge pull request #321939 from bobby285271/upd/xfce-pa
nixos/xfce: Install xfce4-pulseaudio-plugin when services.pipewire.pulse is enabled
2024-06-23 21:04:10 +08:00
K900
cc5ee2d621 nixos/plasma6: allow null password for screen lock
This was fixed and we missed it, I think?
2024-06-23 14:01:49 +03:00
Bobby Rong
387810bb17
nixos/xfce: Install xfce4-pulseaudio-plugin when services.pipewire.pulse is enabled
I think most users will really need it for the media keys.
2024-06-23 18:03:47 +08:00
euxane
8daa31600a nixos/stalwart-mail: remove deprecated {queue,report}.path settings
Since stalwart-mail 0.6.0, queue and report files are located in
the shared `storage.{data,blob}` stores. The `{queue,report}.path`
settings no longer had any effect since then.

I'm also removing the creation of the associated extra directories
in the `preStart` script. This should not cause any issue with old
setups since 0.6.0 was already packaged when 24.05 was released.
2024-06-23 11:47:12 +02:00
Pol Dellaiera
420c9a60c0
Merge pull request #321664 from abysssol/ollama-override-gfx
nixos/ollama: add option for `HSA_OVERRIDE_GFX_VERSION`
2024-06-23 11:02:57 +02:00
Gooxey
d3140c11a5 nixos/antennas: removed WorkingDirectory setting
Antennas could not start because the specifed directory did not exist
2024-06-23 09:23:42 +02:00
Bruno BELANYI
9caa682281
Merge pull request #262892 from l0b0/test/tandoor-script-name 2024-06-22 23:23:35 +01:00
Doron Behar
9c7e7d8f18
Merge pull request #258058 from doronbehar/pkg/transmission_4
transmission: sent a warning and alias it to transmission_3
2024-06-23 00:07:37 +03:00
Pol Dellaiera
5dad22a889
Merge pull request #321673 from juselius/fix-service-restart-certmgr
nixos/kubernetes: fix service reload to restart
2024-06-22 22:56:12 +02:00
abysssol
42c70e2923 nixos/ollama: add option for HSA_OVERRIDE_GFX_VERSION
There are several GPUs that ROCm doesn't officially support but
will work correctly if ROCm is directed to treat the GPU as a different
one that is supported and has a similar architecture.
This can be done by setting `HSA_OVERRIDE_GFX_VERSION`.
Ollama has documentation on this topic: https://github.com/ollama/ollama/blob/main/docs/gpu.md#amd-radeon
2024-06-22 13:13:08 -04:00
Maximilian Bosch
a71e967ef3
Merge pull request #320983 from Ma27/nc-dbtableprefix
nixos/nextcloud: deprecate dbtableprefix
2024-06-22 16:54:41 +00:00
Maximilian Bosch
50d5306e7c
nixos/nextcloud: use dedicated memory limit for the entire CLI
Originally, I wanted to execute `nextcloud-occ` with a higher memory
limit because I needed to trigger an expensive operation by hand,
regenerating a bunch of previews.

While doing so, I realized how painful it is to put an invocation of
nextcloud-occ together for that, especially when you need to put it
into another systemd unit in Nix code.

That's why I decided to use the memory limit now for every
CLI invocation just in case. The stuff you do in those units (e.g.
running background jobs) is something you can also do by hand with
`nextcloud-occ` and you'll most likely want to have the same memory
limit there.
2024-06-22 18:39:08 +02:00
Maximilian Bosch
ab9b8f8cf4
nixos/nextcloud: services.nextcloud.occ is not internal
This option is actually useful when having a systemd unit invoking
`nextcloud-occ`, then you want to do something like

    path = [ config.services.nextcloud.occ ]

This is possible today, but not documented (and the option completion
from nil doesn't pick it up as a result).
2024-06-22 18:38:04 +02:00
Benjamin Staffin
4530b8f72f
nixos/ipa: Lower default sssd debug_level (#310662)
debug_level 65510 (0x3f7f0) is _extremely_ verbose, far more than one
would want in normal operation.  Setting these in the default config
also makes it difficult to override in a user config.  Anyone who needs
greater verbosity can add these options to their own sssd config, or
adjust them at runtime with `sssctl debug-level`.
2024-06-22 11:31:18 -04:00