Commit Graph

14144 Commits

Author SHA1 Message Date
Domen Kožar
efdea4930c
Merge pull request #187857 from Sohalt/remove-dd-agent
dd-agent: remove
2022-09-14 13:25:50 +01:00
Armeen Mahdian
aa20ba5563 dd-agent: remove 2022-09-14 14:11:14 +02:00
Sandro
c1831f6c90
Merge pull request #182329 from linsui/safeeyes
safeeyes: fix double wrap
2022-09-14 12:30:09 +02:00
Jonas Heinrich
d990f88f9f nixos/go-autoconfig: init module 2022-09-14 02:21:39 -04:00
John Soo
026e83a4a8
nixos/self-deploy: add gzip to path
The service fails without it.
2022-09-13 16:43:00 -07:00
Domen Kožar
2f22b267c5
Merge pull request #190959 from pennae/cachix-host-type
nixos/cachix-agent: fix type for host option
2022-09-13 10:08:00 +01:00
Brian Leung
c231a20d98 nixos/lemmy: move systemd script to serviceConfig
Co-authored-by: Shahar Dawn Or <mightyiampresence@gmail.com>
Co-authored-by: Ctem <c@ctem.me>
Co-authored-by: Ilan Joselevich <personal@ilanjoselevich.com>
Co-authored-by: a-kenji <aks.kenji@protonmail.com>
2022-09-12 18:39:54 -04:00
a-kenji
5519e1b89b nixos/lemmy: remove services.lemmy.jwtSecretPath
Co-authored-by: Ctem <c@ctem.me>
Co-authored-by: Brian Leung <leungbk@posteo.net>
Co-authored-by: Shahar Dawn Or <mightyiampresence@gmail.com>
Co-authored-by: Ilan Joselevich <personal@ilanjoselevich.com>
2022-09-12 18:39:54 -04:00
Franz Pletz
772baccfb1
Merge pull request #190947 from jsoo1/jsoo1/self-deploy-tar 2022-09-12 23:43:47 +02:00
Guillaume Girol
a47cfca9af
Merge pull request #189744 from symphorien/vaultwarden-service
nixos/vaultwarden: misc fixes
2022-09-12 19:26:39 +00:00
pennae
070b3966fc
nixos/cachix-agent: fix type for host option 2022-09-12 20:47:05 +02:00
John Soo
f0f4ad0cb0
nixos/self-deploy: add tar to path.
Previously it was missing, and the service would fail.
2022-09-12 09:08:43 -07:00
Erik Arvstedt
fdead18e9e
nixos/paperless: use python from pkg for gunicorn
This ensures that a compatible `gunicorn` is used when `pkg` is
overridden.
2022-09-12 09:20:53 +02:00
Luke Granger-Brown
9974dcfc20
Merge pull request #190717 from lukegb/paperless-tz
nixos/paperless: fix time.timeZone setting
2022-09-11 22:45:25 +01:00
Domen Kožar
fbc23b491a cachix-agent: add host option 2022-09-11 21:18:09 +01:00
Sandro
30ec7dc641
Merge pull request #156232 from B4dM4n/nixos-tests-mediatomb 2022-09-11 18:18:10 +02:00
Sandro Jäckel
4770866f93
nixos/vector: remove no longer required workaround for cross compiling 2022-09-11 17:11:47 +02:00
Domen Kožar
3f7ba12868 cachix-agent: fix a typo 2022-09-11 16:10:21 +01:00
Christian Kögler
11bafe6b5b nixos/syncthing: remove exit code 2 from exit status success
Fix #181713
2022-09-11 16:21:07 +02:00
Luke Granger-Brown
55d9a2c596 nixos/paperless: fix time.timeZone setting
This attribute set isn't passed through the NixOS config resolution
mechanism, which means that we can't use lib.mkDefault here.

Instead, just put it before any user overrides so that if the user
specifies this environment variable it'll just override it anyway.
2022-09-11 15:01:47 +01:00
Christian Kögler
8a039bc1dd
Merge pull request #190634 from ck3d/fix-nixos-influx-cross
nixos/influx: Fix cross compilation for configFile
2022-09-11 07:29:59 +02:00
Jörg Thalheim
67db9b4ad1
Merge pull request #190695 from Mic92/gollum
nixos/gollum: add package option
2022-09-10 18:27:29 +02:00
pennae
d98322834b nixos/*: fix docbook deprecation notices
mostly no rendering changes except in buildkite, which used markdown
where docbook was expected without marking up its markdown.
2022-09-10 18:23:13 +02:00
Jörg Thalheim
6a66cf1b90 nixos/gollum: add package option 2022-09-10 17:57:08 +02:00
Christian Kögler
330bc02b01 nixos/influx: Fix cross compilation for configFile 2022-09-10 08:10:24 +02:00
Silvan Mosberger
6389a26e5f
Merge pull request #181834 from ncfavier/numbers
lib/types: add `number`
2022-09-09 19:59:29 +02:00
Sandro Jäckel
08dd3b91ea nixos/vector: fix validation for cross compiling 2022-09-09 11:59:07 -04:00
Christian Kögler
6ee982a34e
Merge pull request #190498 from eskytthe/grafana-module-fix-text
nixos/grafana: fix description text error
2022-09-09 17:55:26 +02:00
Christian Kögler
4b6b03f99c
Merge pull request #185782 from e1mo/e1mo/syncthing-receiveencrypted
nixos/syncthing: Add receiveencrypted folder type
2022-09-09 17:30:45 +02:00
Erik Skytthe
3c1c405e72 nixos/grafana: fix description text error
Description text has been placed incorrectly for allowedDomains and allowedGroups
2022-09-09 15:55:15 +02:00
Brian Leung
b7f19802af services/lemmy: fix /feeds/* and /nodeinfo/* API endpoints
Co-authored-by: Shahar Dawn Or <mightyiampresence@gmail.com>
Co-authored-by: Matthias Meschede <MMesch@users.noreply.github.com>
Co-authored-by: a-kenji <aks.kenji@protonmail.com>
Co-authored-by: Ctem <c@ctem.me>
Co-authored-by: Valentin Gagarin <valentin.gagarin@tweag.io>
2022-09-09 05:18:02 -04:00
Ivv
ac5e7351d1
Merge pull request #188754 from snaar/prometheus-ipmi
nixos/services.prometheus.exporters.ipmi: new module along with underlying ipmi_exporter package
2022-09-08 21:39:49 +02:00
revol-xut
0e291be644
mediawiki: fix correctly setting --dbtype flag 2022-09-06 22:17:47 +02:00
Bernardo Meurer
0627237785
Merge pull request #181334 from zhaofengli/nat-iptables-pkg
nixos/nat: Use the package specified in networking.firewall.package
2022-09-06 14:05:20 -03:00
Tako Marks
3df41451e3 nixos/kanidm: Bind mount cacert path in unixd service
In order to be able to use the unixd service with the `verify_ca` and
`verify_hostnames` set to `true` it needs to be able to read the
certificate store. This change bind mounts the cacert paths for the
unixd service.
2022-09-06 15:01:37 +02:00
Luke Granger-Brown
8157e3d89f
Merge pull request #189934 from delroth/grafana-sandboxing
nixos/grafana: loosen systemd syscall sandboxing
2022-09-06 09:36:23 +01:00
Pierre Bourdon
bfe73f9543
nixos/grafana: loosen systemd syscall sandboxing
Allow @resources syscalls in the grafana.service unit. While Grafana
itself does not need them, some plugins (incl. first party) crash if
they fail to setrlimit. This was first seen with the official grafana
Clickhouse datasource plugin.

The @resources syscalls set is fairly harmess anyway.
2022-09-06 02:10:47 +02:00
Sandro
2902676b30
Merge pull request #189056 from jtojnar/fwupd 2022-09-05 16:13:00 +02:00
Fabian Möller
f3e08ac0b1
nixos/mediatomb: wait for network-online.target 2022-09-05 16:03:01 +02:00
Martin Weinelt
268569b6d8
Merge pull request #189852 from erikarvstedt/paperless-pythonpath 2022-09-05 15:26:20 +02:00
Erik Arvstedt
783f8f16c1
paperless: move PYTHONPATH definition to module
`paperless-ngx.pythonPath` was incomplete due to the missing paperless-ngx
source, so it had to be amended in the service.
Instead of amending it, define it entirely in the service.

This allows an override of `paperless-ngx.propagatedBuildInputs` to be reflected
in the service's PYTHONPATH.
2022-09-05 14:50:45 +02:00
Erik Arvstedt
310b9fe58d
nixos/paperless: extract variable pkg 2022-09-05 10:03:59 +02:00
Jan Tojnar
89c025b366 nixos/fwupd: add polkit dependency
We are building fwupd daemon with polkit support which means
polkit daemon is required.

Previously polkit was enabled by default via udisks2 but that
stopped with f763710065
breaking the fwupd installed tests as a result.

Let’s add the polkit dependency to the fwupd module to ensure polkit is available.
2022-09-04 20:23:12 +02:00
Jonas Heinrich
bdd227c300
Merge pull request #184827 from onny/dokuwiki
dokuwiki: 2020-07-29 -> 2022-07-31
2022-09-04 19:08:45 +02:00
Martin Weinelt
f98011803e
nixos/paperless: Restrict CAP_NET_BIND_SERVICE
Handing CAP_NET_BIND_SERVICE to the `paperless-web.service` only makes
sense when it actually wants to bind to a port < 1024. Don't hand it out
if that is not the case.
2022-09-04 16:24:24 +02:00
Martin Weinelt
2d257f8101
nixos/paperless: Add pgsql via unix socket example
Finding out how to connect paperless to a PostgreSQL database via unix
sockets and peer authentication took me a few minutes, so leaving a hint
in the extraConfig example seems like a good idea to me.

Also remove unnecessary use of literalExpression for attribute set, it
is only required for complex values like functions or values that depend
on other values or packages.
2022-09-04 16:16:46 +02:00
Martin Weinelt
81a17f7352
nixos/paperless: Use system timezone by default, if set 2022-09-04 16:16:46 +02:00
Martin Weinelt
94f00041f0
nixos/paperless: Allow mbind syscall in paperless-web.services
After uploading a document through the webinterface I started seeing
it killed through the SYSBUS signal. Inspecting the call trace led me to
liblapack's memory allocator, that uses the mbind syscall on Linux.
2022-09-04 16:16:45 +02:00
Sandro
2f54aad5e6
Merge pull request #156813 from JQ-Networks/master 2022-09-04 14:32:13 +02:00
Guillaume Girol
70b8ef1df6 nixos/vaultwarden: fix typo in timer alias 2022-09-04 12:00:00 +00:00
Guillaume Girol
7160e94e27 nixos/vaultwarden: fix race with backup
when vaultwarden starts while backup-vaultwarden.service is running, it
fails because the sqlite database is locked
2022-09-04 12:00:00 +00:00
Guillaume Girol
7d009061c9 nixos/vaultwarden: Restart=always
there is no reason vaultwarden should remain not started
2022-09-04 12:00:00 +00:00
Aaron Andersen
5b62b0d2ce
Merge pull request #189635 from RaitoBezarius/nixos/dolibarr
dolibarr: init at 15.0.3, nixos/dolibarr: init
2022-09-04 07:55:34 -04:00
bb2020
ce609256fb nixos/minidlna: update documentation 2022-09-04 09:07:40 +00:00
Aaron Andersen
c2563fe476 nixos/dolibarr: init
Co-authored: Ryan Lahfa <masterancpp@gmail.com>
2022-09-04 05:28:22 +02:00
Jörg Thalheim
8259e82318
Merge pull request #189594 from amesgen/teamspeak-restart
nixos/teamspeak3: restart on failure
2022-09-03 16:53:59 +01:00
snaar
866d977212 nixos/services.prometheus.exporters.ipmi: new module
Bringing in new https://github.com/prometheus-community/ipmi_exporter exporter into existing Prometheus exporters framework.
2022-09-03 10:56:04 -04:00
Federico Beffa
8be4e9e2ec nixos/service/languagetool: init 2022-09-03 16:48:43 +02:00
amesgen
592d13693e
nixos/teamspeak3: restart on failure
Prevents transient failures such as

> failed to register local accounting service
2022-09-03 14:55:36 +02:00
Caleb Chase
f8c0d9e66d portunus: fix maintainers bug 2022-09-02 22:25:56 -05:00
Finn Behrens
22a5797173 nixos/moodle: use php80 and update extensions 2022-09-02 18:03:27 +00:00
Jonas Heinrich
589ddec574 nixos/dokuwiki: Update module 2022-09-02 18:50:10 +02:00
Sandro
5e515466a9
Merge pull request #180149 from WilliButz/gitlab-module/fix-registry-issuer 2022-09-02 00:16:22 +02:00
pennae
3bddcf5f90
Merge branch 'master' into option-docs-md 2022-09-01 16:10:09 +02:00
Michal Sojka
7e626703b0 nixos/nullmailer: Always adjust ownership of spool directories
When switching between different NixOS configurations (with and
without nullmailer and other services), it can happen that the UID of
the nullmailer user changes. When it happens, the nullmailer service
happily starts, but the user cannot send any email, because the
sendmail wrapper doesn't have permission to write them to the queue.

This commit prevents that. Instead of creating the directories by the
nullmailer user, which doesn't have permissions to change ownership,
we now create them by the systemd-tmpfiles, which has sufficient
permissions to adjust ownership.
2022-09-01 15:40:27 +02:00
Zhaofeng Li
7689468a4b nixos/nat: Use the package specified in networking.firewall.package
Otherwise the system path is inconsistent if you do something like

    networking.firewall.package = pkgs.iptables-legacy;
2022-08-31 13:14:07 -06:00
Christian Kögler
43c0f946a8
Merge pull request #188620 from KFearsoff/fix-syncthing-versioning-path
nixos/syncthing: fix path setting for versioning
2022-08-31 20:46:54 +02:00
superherointj
73305cc3d4
Merge pull request #189101 from talyz/keycloak-19
keycloak: 18.0.0 -> 19.0.1
2022-08-31 12:57:49 -03:00
pennae
1d41cff3dc nixos/*: convert straggler options to MD 2022-08-31 17:27:38 +02:00
pennae
f2ea09ecbe nixos/*: convert options with listings
minor rendering changes.
2022-08-31 17:27:36 +02:00
pennae
722b99bc0e nixos/*: convert options with admonitions to MD
rendering changes only slightly, most changes are in spacing.
2022-08-31 16:36:16 +02:00
pennae
bd56368848 nixos/*: md-convert hidden plaintext options
most of these are hidden because they're either part of a submodule that
doesn't have its type rendered (eg because the submodule type is used in
an either type) or because they are explicitly hidden. some of them are
merely hidden from nix-doc-munge by how their option is put together.
2022-08-31 16:32:54 +02:00
pennae
515c4727fa nixos/*: md-"convert" empty descriptions
for some reason these are not picked up properly by nix-doc-munge, so
we'll do this instead.
2022-08-31 16:32:54 +02:00
pennae
9547123258 nixos/*: convert internal option descriptions to MD
we'll have to do it eventually, may as well be now.
2022-08-31 16:32:54 +02:00
pennae
ef176dcf7e nixos/*: automatically convert option descriptions
conversions were done using https://github.com/pennae/nix-doc-munge
using (probably) rev f34e145 running

    nix-doc-munge nixos/**/*.nix
    nix-doc-munge --import nixos/**/*.nix

the tool ensures that only changes that could affect the generated
manual *but don't* are committed, other changes require manual review
and are discarded.
2022-08-31 16:32:53 +02:00
pennae
5a643387ec nixos/*: normalize more docbook for auto-conversion 2022-08-31 16:32:53 +02:00
pennae
e4f876eb7e nixos/*: convert varlist-using options to MD
there are sufficiently few variable list around, and they are
sufficiently simple, that it doesn't seem helpful to add another
markdown extension for them. rendering differences are small, except in
the tor module: admonitions inside other blocks cannot be made to work
well with mistune (and likely most other markdown processors), so those
had to be shuffled a bit. we also lose paragraph breaks in the list
items due to how we have to render from markdown to docbook, but once we
remove docbook from the pipeline those paragraph breaks will be restored.
2022-08-31 16:32:53 +02:00
pennae
c915b915b5 nixos/*: md-convert options with unordered lists
mostly no rendering changes. some lists (like simplelist) don't have an
exact translation to markdown, so we use a comma-separated list of
literals instead.
2022-08-31 16:32:53 +02:00
pennae
1013069f52 nixos/*: convert more partially-md option descriptions
this mostly means marking options that use markdown already
appropriately and making a few adjustments so they still render
correctly. notable for nftables we have to transform the md links
because the manpage would not render them correctly otherwise.
2022-08-31 16:32:14 +02:00
pennae
7d102d113a nixos/*: convert multiline inline code to listings
presumably it was not intended to have these blocks rendered inline, and
markdown conversion would be messy as well.
2022-08-31 16:27:25 +02:00
pennae
0cfcb5908c nixos/*: <screen> -> <programlisting>
most of the screen tags used in option docs are actually listings of
some sort. nsd had a notable exception where its screen usage was pretty
much a raw markdown block that made most sense to convert into docbook lists.
2022-08-31 16:27:24 +02:00
pennae
5841c386a0 nixos/*: remove indentation from long enable options
the way these are written they introduce lots of whitespace in each
line, which will cause those lines to render as code when converted to
markdown. override the whole description instead.
2022-08-31 16:21:14 +02:00
Jörg Thalheim
cf758a4107
Merge pull request #185231 from moduon/k3s-ha
nixos/k3s: streamline HA setup
2022-08-31 13:57:18 +01:00
talyz
2affab6cf5
keycloak: 18.0.0 -> 19.0.1 2022-08-31 13:18:56 +02:00
Netali
52e621ace8
nixos/kea: fix ctrl-agent extraArgs 2022-08-31 01:26:12 +02:00
Bobby Rong
2f63816448
Merge pull request #187466 from bobby285271/revert-lightdm-user-shell-bash
Revert "nixos/lightdm: make lightdm user shell bash"
2022-08-30 19:36:11 +08:00
Jairo Llopis
60e0d3d736
k3s: streamline HA setup
- Replace misleading docs.
- Add new assertions to let configurations make more sense.
- Add clusterInit flag.
- Add some more docs about HA and non-HA modes setup.
- Improve multi-node tests for HA mode.

Fix https://github.com/NixOS/nixpkgs/issues/182085
2022-08-30 09:27:29 +01:00
K900
fcea1ef75f
Merge pull request #188771 from K900/vaultwarden-permissions
nixos/vaultwarden: protect the default data directory more
2022-08-30 09:41:15 +03:00
Martin Weinelt
f3b7d6414b
Merge pull request #128192 from clerie/keepalived-secrets 2022-08-29 23:44:34 +02:00
Anton Bulakh
b79f9e9b8a nixos/awesome: fix luaModules using pkgs.lua instead of awesome.lua 2022-08-29 17:25:11 +02:00
K900
a7bfb90ea8 nixos/vaultwarden: protect the default data directory more
Fixes #179415
2022-08-29 09:26:31 +03:00
Jake Hamilton
ff997b83e1
nixos/writefreely: init 2022-08-28 16:29:14 -07:00
iko
4bc69a5235
nixos/searx: improve searxng compatibility 2022-08-28 16:52:42 +03:00
KFears
7f22740983 nixos/syncthing: fix path setting for versioning
Syncthing config XML uses `fsPath` setting for specifying the path to the versioning folder. This commit adds `services.syncthing.folders.<name>.versioning.fsPath` option to enable this functionality declaratively. Previously, `versioning.params.versionsPath` was used, which doesn't work.
2022-08-28 17:27:51 +04:00
Thiago Kenji Okada
2d92f70c32
Merge pull request #188539 from linj-fork/pr/fix-fontconfig-hint
nixos/fontconfig: add missing config for Xft.hintstyle
2022-08-27 22:46:14 +01:00
Lin Jian
c5b6df912b
nixos/fontconfig: add missing config for Xft.hintstyle
This config is removed when removing[1] fonts.fontconfig.hinting.style
option.

However, when adding[2] that option back, this config is missing.

[1]: 65592837b6
[2]: 659096dd89
2022-08-28 05:24:41 +08:00
Christian Kögler
0b6ffe6511
Merge pull request #188362 from pcpthm/fix-nix-registry-flake
nixos/nix-daemon: Add missing parentheses
2022-08-27 22:33:17 +02:00
Bernardo Meurer
a53ad0ca15
Merge pull request #188513 from Sciencentistguy/plex-pidfile
nixos/plex: specify PIDFile in systemd service
2022-08-27 17:27:01 -03:00
pennae
e607b30abe nixos/tor: convert option descriptions to MD
no change in rendered output. the html manual could render <screen>
blocks differently, but so far it hasn't (and if we need to make a
distinction we can use a special info string).
2022-08-27 19:18:29 +02:00
pennae
5a20c87970 nixos/vsftpd: convert option descriptions to MD
no change to rendered output.
2022-08-27 19:18:29 +02:00
pennae
c2e133a422 nixos/thanos: convert option descriptions to MD
no change to outputs.
2022-08-27 19:18:29 +02:00
pennae
0046b457d5 nixos/public-inbox: convert option descriptions to MD
no change to manpage or html.
2022-08-27 19:18:29 +02:00
pennae
429ae9ff3d nixos/thinkfan: convert descriptions to MD
also convert multi-line literals to code blocks to make them render in a
legible manner.
2022-08-27 19:18:29 +02:00
pennae
51a11254a7 nixos/*: literalDocBook -> literalMD
no change to rendered output
2022-08-27 19:18:29 +02:00
pennae
169072fb60 nixos/prometheus: convert option descriptions to MD
this notable also now interprets a markdown-flavored list in
triton_sd_config as actual markdown and renders it differently, but this
is arguably for the better (and probably the original intention).

no other rendering changes.
2022-08-27 19:18:29 +02:00
pennae
97b6defb7b nixos/prometheus: turn markdown in docbook
there seems to be a lot of markdown in the prometheus module that
should've been docbook instead. temporarily convert it to docbook to
keep the diff for the docbook->md conversion of prometheus inspectable.
2022-08-27 19:18:29 +02:00
pennae
a2ceee8ffe nixos/strongswan: convert to MD descriptions
no changes to the manpage output. the html output changes, but only by
whitespace.
2022-08-27 19:18:29 +02:00
Gauvain 'GovanifY' Roussel-Tarbouriech
f7e49fae0d nixos/prometheus.sachet: add module 2022-08-27 12:41:54 -04:00
Jamie Quigley
e8f1b09014
nixos/plex: specify PIDFile in systemd service 2022-08-27 17:23:44 +01:00
clerie
bf7d05e64d nixos/keepalived: add secrets support 2022-08-27 17:19:16 +02:00
Pascal Bach
481f9b246d
Merge pull request #187876 from jakubgs/geth-add-authrpc
go-ethereum: add support for Auth RPC CLI flags
2022-08-26 17:16:48 +02:00
Sandro
0116b56989
Merge pull request #187246 from drupol/hedgedoc/add-provider-name-setting 2022-08-26 11:03:47 +02:00
Maximilian Bosch
1652bbcfc3
Merge pull request #188174 from yayayayaka/matrix-synapse-systemd-hardening
nixos/matrix-synapse: Harden systemd serivce
2022-08-26 10:10:04 +02:00
pcpthm
f7922cb328 nixos/nix-daemon: Add missing parenthesis
When `nix.registry.<name>.flake` option is used, additional attributes of the flake were not written to the flake registry file because of a missing parenthesis.
2022-08-26 15:53:59 +09:00
Bernardo Meurer
d05ae63d23
Merge pull request #179155 from linj-fork/caddy-improve-security
nixos/caddy: improve security about acme certs
2022-08-25 10:36:10 -03:00
Yaya
0c5fbf9c08 nixos/matrix-synapse: Harden systemd serivce
This commit introduces hardening options to the `matrix-synapse`
systemd service.
2022-08-25 08:58:22 +00:00
Curtis Jiang
d8bb7ec120 prometheus-v2ray-exporter: init at 0.6.0 2022-08-24 22:35:00 +00:00
Elis Hirwing
658f66299c
Merge pull request #187905 from ju1m/sanoid
nixos/sanoid: fix aliased options
2022-08-24 20:40:41 +02:00
Thiago Kenji Okada
59058bae2a
Merge pull request #188084 from thiagokokada/refactor-xserver
nixos/xserver: remove useGlamor option
2022-08-24 15:25:19 +01:00
CrystalGamma
f02151af24 nixos/jitsi-meet: fix property conflict
#167013 introduced a property conflict with the concurrently-written commit
aea940da63, over property
systemd.services.prosody. Fix this by moving the reload option into the block.
2022-08-24 19:02:39 +10:00
Robert Hensing
b70d5b5854
Merge pull request #167013 from ThePurox/master
nixos/{jitsi-meet,prosody}: Reload prosody after switch
2022-08-24 10:19:29 +02:00
Thiago Kenji Okada
ae0cfe80c4 nixos/xserver: remove useGlamor option
This option is based on a recommendation from a page last updated in
2014 (see https://www.freedesktop.org/wiki/Software/Glamor/), and it
is not necessary anymore.

Also, it did the wrong thing: it forced DRI2, but Glamor should also
work with DRI3, that is a better option most of the time. So let's
remove this option, folks that still want to force this manually can do
so in other ways.
2022-08-23 18:14:00 +01:00
Julien Moutinho
9a94509089 nixos/sanoid: fix aliased options
Fixes https://github.com/NixOS/nixpkgs/issues/181561
2022-08-22 18:56:47 +02:00
misuzu
5fcdceb0b2 nixos/netbird: init 2022-08-22 16:37:43 +03:00
Jakub Sokołowski
54b76185d8
go-ethereum: add support for Auth RPC CLI flags
The split of Ethereum into Execution Layer and Consensus Layer adds a
requirement for communication between execution client and consensus
client using secur JWT tokens. In Geth this is configurable using the
`--authrpc.*` CLI flags which are currently not exposed by this service.

For more details read the following article:
https://geth.ethereum.org/docs/interface/consensus-clients

Signed-off-by: Jakub Sokołowski <jakub@status.im>
2022-08-22 15:30:57 +02:00
Alexander Bantyev
629ec1b38a
Merge pull request #161805 from yrd/outline
outline: init at 0.65.2
2022-08-22 14:45:12 +04:00
Martin Weinelt
f21ec1e75b
Merge pull request #181082 from Lassulus/terraria 2022-08-21 21:37:41 +02:00
lassulus
9c8890f2e5 nixos/terraria: set primary group 2022-08-21 21:31:43 +02:00
Kevin Cox
9e0494b3d1 nixos/mautrix-facebook: set verification levels
These are now required otherwise startup fails with:

> TypeError: 'NoneType' object is not subscriptable

The chosen levels are stricter than default but don't require unsupported signing or DB editing so seem like a reasonable high bar for now. It is easy for users to lower the levels so it is better to be stricter by default.

Default levels: 0ce0588725/mautrix_facebook/example-config.yaml (L247-L263)
2022-08-21 14:50:38 -04:00
Kevin Cox
3a08b9acab nixos/mautrix-facebook: create group
Otherwise we get a warning when applying the config.
2022-08-21 14:50:38 -04:00
Sandro
b957b84842
Merge pull request #187670 from linj-fork/pr/bump-kanata 2022-08-21 18:21:05 +02:00
Phillip Seeber
9704e9c856 nixos/nextcloud: add option to set fastcgi timeout 2022-08-21 18:14:47 +02:00
Sandro
d478d8be71
Merge pull request #186674 from aopom/plausible-service-after-clickhouse 2022-08-21 03:46:35 +02:00
Lin Jian
9f4e8ea56d
nixos/kanata: remove redundant lib 2022-08-21 09:45:26 +08:00
Bobby Rong
5d99fb614b nixos/lightdm-greeters/slick: use mkEnableOption 2022-08-20 21:57:39 +02:00
Guillaume Girol
e941a9d433
Merge pull request #186652 from peterhoeg/u/http-dns
nixos/https-dns-proxy: bump version and add support for OpenDNS
2022-08-20 18:09:23 +00:00
John Rinehart
392c83491d
nixos/lightdm-greeters/slick: disable slick greeter by default 2022-08-20 16:37:34 +08:00
Bobby Rong
29cb1c877c
Merge pull request #184409 from water-sucks/lightdm-slick-greeter
lightdm-slick-greeter: init at 1.5.9
2022-08-20 09:28:52 +08:00
pennae
6039648c50 nixos/*: automatically convert option docs 2022-08-19 22:40:58 +02:00
pennae
7e7d68a250 nixos/*: mark pre-existing markdown descriptions as mdDoc 2022-08-19 22:40:58 +02:00
pennae
b51f8036c2 nixos/*: use properly indented strings for option docs
using regular strings works well for docbook because docbook is not as
whitespace-sensitive as markdown. markdown would render all of these as
code blocks when given the chance.
2022-08-19 22:40:58 +02:00
pennae
72b507d5a2 nixos/*: convert some markdown in docbook to tags
a lot of markdown syntax has already snuck into option docs, many of it
predating the intent to migrate to markdown. we don't convert all of it
here, just that which is accompanied by docbook tags as well. the rest
can be converted by simply adding the mdDoc marker.
2022-08-19 22:40:58 +02:00
pennae
b0e56acef9 nixos/*: remove links to options in code blocks
markdown simply cannot represent these. would be nice to have, but
it'll have to happen some other way (if at all).
2022-08-19 22:40:58 +02:00
pennae
275a34e0d8 nixos/nix-daemon: replace <uri> with <literal>
this could've been a link as well, but <uri> did not render as a link in
the html manual.
2022-08-19 22:40:58 +02:00
pennae
d0ba463fcf nixos/*: replace <quote> with actual quotes 2022-08-19 22:40:58 +02:00
pennae
f1d39b6d61 nixos/postgresql: replace <function> with <literal>
there's only this one use, we can live with the tiny rendering change.
2022-08-19 22:40:58 +02:00
pennae
b7327e966b nixos/*: normalize links with #TEXT=href
the xslt pass will re-add this text, and not having href and text be
equal is required to automatically migrate these links to markdown.
2022-08-19 22:40:58 +02:00
pennae
2646fd7c1b nixos/*: remove <productname>
no change to the rendered output, and we can't properly represent this
in markdown anyway.
2022-08-19 22:40:58 +02:00
pennae
a4fdff515b nixos/*: turn inline code blocks into more appropriate things 2022-08-19 22:40:58 +02:00
pennae
e4ed177f82 nixos/* eliminate inner whitespace in tags that was missed earlier
nix-doc-munge won't match tags that contain newlines anywhere. most of
these have already been removed, but a few obviously made it through.
2022-08-19 22:40:58 +02:00
pennae
8f8e101527 nixos/*: normalize <package> to <literal>
this renders the same in the manpage and a little more clearly in the
html manual. in the manpage there continues to be no distinction from
regular text, the html manual gets code-type markup (which was probably
the intention for most of these uses anyway).
2022-08-19 22:40:58 +02:00
Kenny MacDermid
7b0b92f5a9
Revert "nixos/fwupd: enable udisks2"
This reverts commit fb5bceb3ff.

Reverted at the request of the author, Bernardo Meurer, to avoid
requiring udisks2 for fwupd to work.
2022-08-19 12:53:34 -03:00
Kenny MacDermid
9754c6d332
nixos/fwupd: migrate to uefi_capsule.conf
In version 1.5.5 of fwupd the uefi plugin was renamed to
uefi-capsule. As part of those changes the configuration file was
renamed and changed.

This modules configuration mismatch was generally hidden because
when udisks2 is enabled fwupd will use that instead. Without
udisks2 the following warning is seen:

    WARNING: UEFI ESP partition not detected or configured
2022-08-19 12:53:23 -03:00
Bobby Rong
c52f565d3a Revert "nixos/lightdm: make lightdm user shell bash"
This reverts commit c134f6443a.
Pantheon is using GSD 3.38 nowadays, closes #101568
2022-08-19 23:25:53 +08:00
Gauvain 'GovanifY' Roussel-Tarbouriech
6c55578c7e nixos/komga: add module 2022-08-18 22:52:27 -04:00
Pascal Bach
b6ab2508f5
Merge pull request #187299 from superherointj/nixos-modules-minio-fix-network-issue
nixos/minio: fix startup issue
2022-08-18 21:46:43 +02:00
Maximilian Bosch
6a1263503c
Merge pull request #185803 from Ma27/sssd-secrets
nixos/sssd: Add secrets handling (patch originally from @yayayayaka)
2022-08-18 20:51:41 +02:00
Bobby Rong
e2ddd98cc9 nixos/cinnamon: default to slick-greeter
Default in Linux Mint.
2022-08-18 23:01:43 +08:00
superherointj
89f527384b nixos/minio: fix startup issue 2022-08-18 11:52:29 -03:00
ckie
30ad2e1c12
Merge pull request #162484 from jappeace/keter-module
nixos/keter: init at 2.0.1
2022-08-18 15:44:05 +03:00
Jappie Klooster
a4d72ad628
nixos/keter: init
Enable keter module

Keter is an apploader which:
1. has the old app running on a port.
2. loads a new one, and wait for that to complete
3. switches the old with the new one once the new one finished loading.

It supports more functionality but this use case
is the primary one being used by supercede.

Adds keter as a module to nixos.
Currently keter is unusable with nix,
because it relies on bundeling of a tar and uploading that to a specific folder.
These expressions automate these devops tasks,
with especially nixops in mind.
This will work with versions above 1.8

The test seems to work.
This uses a new version of keter which has good
support for status code on error pages.
We're using this config at production at supercede
so it should be fine.

Squash log:
==========

mention keter in changelog

Update generated release notes

Always restart keter on failure

This is a little bit of extra stability in case keter crashes.
Which can happen under extreme conditions (DoS attacks).

Update nixos/doc/manual/release-notes/rl-2205.section.md

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

Update nixos/modules/module-list.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

Remove sanitization

don't put domain in as a string

Update nixos/tests/keter.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

add jappie as module maintainer

Use type path instead of two seperate options

Fix generated docs

added test machinery to figure out why it's failing

Fix the test, use console output

run nixpkgs-fmt on all modules

Inline config file.

This get's rid of a lot of inderection as well.

Run nix format

remove comment

simplify executable for test

delete config file

add config for keter root

Remove after redis clause

set keter root by default to /var/lib/keter

Update nixos/modules/services/web-servers/keter/default.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

Update nixos/modules/services/web-servers/keter/default.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

Update nixos/modules/services/web-servers/keter/default.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

fix nit

add newlines

add default text and move description in a long description

Delete rather obvious comment

fix release db thing

remove longDescription and put it in a comment instead

change description of mkEnalbeOption

explain what keter does by using the hackage synopsis

set domain to keterDomain and same for executable

move comment to where it's happening

fix type error

add formatting better comment

try add seperate user for keter

Revert "try add seperate user for keter"

This reverts commit d3522d36c96117335bfa072e6f453406c244e940.

Doing this breaks the setup

set default to avoid needing cap_net_bind_service

remove weird comment

use example fields

eleborated on process leakage

Update nixos/modules/services/web-servers/keter/default.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

run nixpkgs-fmt

update docs

Fix formatting, set keter package by default

format our little nixexpr

replace '' -> " where possible

drop indent for multiline string

make description much shorter

regen docs database
2022-08-18 15:29:47 +03:00
Maximilian Bosch
5ec8223e63
nixos/sssd: explain why we use EnvironmentFile= 2022-08-18 11:38:49 +02:00
Maximilian Bosch
8d92d42c5c
nixos/sssd: fix typo 2022-08-18 11:34:06 +02:00
Pol Dellaiera
69347cc5fc
hedgedoc: add SAML providerName option 2022-08-18 11:08:53 +02:00
Varun Narravula
fdac82a307 nixos/lightdm-greeters/slick: init 2022-08-18 15:52:05 +08:00
Kira Bruneau
6e665c4e29
Merge pull request #185987 from LoveIsGrief/display-manager-read-.profile
Attempt to source .profile if .xprofile not found
2022-08-17 15:58:46 -04:00
LoveIsGrief
881512e23f
x11: Source .profile and .xprofile
Other popular distros (OpenSuse, Ubuntu, Gentoo, Arch) read $HOME/.profile when starting X11 display managers.
When moving to nixOS, that is then broken leading to unpredictable behavior (probably programs not working).

This adds similar behavior to https://github.com/sddm/sddm/blob/develop/data/scripts/Xsession

Related to #185979
2022-08-17 20:37:33 +02:00
Jan Tojnar
299611a634
Merge pull request #187132 from ElvishJerricco/gnome-disable-packagekit
nixos: Don't enable packagekit by default
2022-08-17 20:24:05 +02:00
Will Fancher
d3e5bd0228 nixos: Don't enable packagekit by default 2022-08-17 13:53:21 -04:00
Bernardo Meurer
5fcc2ff7a1
Merge pull request #187029 from lovesegfault/fwupdmgr-udisks
nixos/fwupd: enable udisks2
2022-08-17 09:04:55 -07:00
Yannik Rödel
9898e975af outline: init at 0.65.2 2022-08-17 16:30:16 +02:00
Sandro
a9f3c22db5
Merge pull request #182382 from SuperSandro2000/portunus 2022-08-17 15:20:45 +02:00
ckie
6c36827e98
Merge pull request #186536 from tpwrules/add-spice-webdavd-module
nixos/spice-webdavd: init
2022-08-17 13:41:43 +03:00
Kim Lindberger
eed71ab5db
Merge pull request #185820 from talyz/discourse-2.9.0.beta8
discourse: 2.9.0.beta4 -> 2.9.0.beta9
2022-08-17 10:41:28 +02:00
Peter Hoeg
28116cfd9b nixos/https-dns-proxy: add OpenDNS support 2022-08-17 10:25:31 +08:00
Bernardo Meurer
fb5bceb3ff
nixos/fwupd: enable udisks2
Without this, you get a warning that fwupd is unable to find the ESP
partition.

c.f. https://github.com/fwupd/fwupd/wiki/PluginFlag:esp-not-found
2022-08-16 18:15:18 -04:00
Lassulus
8471526587
Merge pull request #186785 from helsinki-systems/feat/nss-lookup-nscd 2022-08-16 20:45:45 +02:00
Maximilian Bosch
9e8ea1b855
Merge pull request #183717 from NetaliDev/mysql-auth
nixos: add mysql/mariadb user authentication module
2022-08-16 20:30:16 +02:00
Paul-Henri Froidmont
d2ce318bd4 nixos/patroni: init 2022-08-16 18:57:15 +02:00
Jonas Heinrich
0d85bb5e4a
Merge pull request #186668 from r-ryantm/auto-update/pipewire
pipewire: 0.3.56 -> 0.3.56
2022-08-16 15:48:34 +02:00
Sandro
e1951451e0
Merge pull request #186914 from evils/tuptime 2022-08-16 15:18:27 +02:00
Evils
3895a5baa2 tuptime: 5.1.0 -> 5.2.0
add meta.changelog

and update module to upstream wording
2022-08-16 10:03:12 +02:00
Jörg Thalheim
7a8a3dfd8b
Merge pull request #181939 from Mic92/vault-2
vault: fix assertions when raft backend is used
2022-08-16 05:24:01 +01:00
Jörg Thalheim
2c3f6055fb syncoid: handle syncing dataset without a parent 2022-08-16 06:18:54 +02:00
Vincent Haupert
786f72c32e nixos/github-runner: start Runner.Listener directly in ExecStart=
The `runsvc.sh` script wraps a JavaScript script which starts
`Runner.Listener` and also handles failures. This has the downside that
the service _always_ exits with status code 0, i.e., success. This
causes frequent service restarts when running in ephemeral mode with a
faulty config as Systemd always sees a success exit status. To prevent
this, this commit changes the service config to call `Runner.Listener`
directly. The JavaScript wrapper stops the process with a SIGINT, hence,
the Systemd unit now sends a SIGINT to stop the service.
2022-08-15 13:13:58 -04:00
Vincent Haupert
987a4b4231 nixos/github-runner: add support for ephemeral runners
Adds the module option `ephemeral`. If set to true, configures the
runner registration with the `--ephemeral` option. This causes the
runner to exit after processing a single job, to de-register itself, and
to delete its configuration. Afterward, systemd restarts the service
which triggers a new ephemeral registration with a clean state.
2022-08-15 13:13:58 -04:00
Vincent Haupert
3f075e5bb1 nixos/github-runner: add PAT support
This commit introduces support for runner registrations through a
personal access token (PAT). To use a PAT instead of a registration
token, place an appropriately scoped PAT in `tokenFile`. If the file
contains a PAT, the configuration script queries a new runner
registration token. Using a runner registration token directly continues
to work as before.
2022-08-15 13:13:58 -04:00
Vincent Haupert
65542a6348 nixos/github-runner: use state instead of runtime dir as RUNNER_ROOT
Using the runtime directory as `RUNNER_ROOT` is wrong. We should always
use the state directory like we already do when invoking the runner
configure script. Otherwise, the runner constructs the wrong path for
some files (.credentials, .runner, ...).
2022-08-15 13:13:58 -04:00
Jörg Thalheim
66c94cd524
Merge pull request #185856 from NoneTirex/fix-headscale-tls-config
headscale: fix tls challengeType enum possible values
2022-08-15 17:51:49 +01:00
Bobby Rong
50c0564bc8
Merge pull request #186742 from bobby285271/cinnamon
Cinnamon updates 2022-08-15
2022-08-15 21:22:50 +08:00
Christian Kögler
0884cb0ba2
Merge pull request #177577 from jmbaur/globalprotect-openconnect_config
nixos/globalprotect: add settings option for service configuration
2022-08-15 14:43:13 +02:00
Bobby Rong
9c69f307ce nixos/cinnamon: install gnome-screenshot
Closes #169178
2022-08-15 19:35:43 +08:00
Janne Heß
8cef7eec93
nixos/nscd: Add requiredBy for the nss targets
This is to ensure the targets are stopped when nscd is stopped to
prevent races on switch. Example interaction: nscd is stopped, some
service that requires nss-user-lookup.target is restarted. Without this
PR, nss-user-lookup.target would still be active, hence the service
would start without nscd running.
2022-08-15 13:18:03 +02:00
Bobby Rong
fcc28fe306
Merge pull request #186587 from midchildan/fix/mirakurun-add-logo-dir
nixos/mirakurun: set the LOGO_DATA_DIR_PATH environment variable
2022-08-15 17:40:26 +08:00
Sebastián Mancilla
10a745eac8
Merge pull request #179896 from erikarvstedt/fix-bash-exit-handler
treewide: fix bash exit handlers
2022-08-14 21:42:41 -04:00
Thomas Watson
9c52987b51 nixos/spice-webdavd: init 2022-08-14 12:28:05 -05:00
ppom
565a729f7c make plausible service start after clickhouse service
Plausible fails on start because clickhouse is not ready,
when clickhouse has low CPU available, eg.
```nix
{systemd.services.clickhouse.serviceConfig.CPUWeight = 20;}
```

Fixed with
```nix
{systemd.services.plausible.after = [ "clickhouse.service" ];}
```
2022-08-14 17:09:05 +02:00
R. Ryantm
813a4ba8a0 pipewire: 0.3.56 -> 0.3.56 2022-08-14 14:31:51 +00:00
midchildan
664b01f082
nixos/mirakurun: set the LOGO_DATA_DIR_PATH environment variable 2022-08-14 16:34:47 +09:00
linsui
f411f4ae7a safeeyes: fix double wrap 2022-08-14 09:31:22 +08:00