Commit Graph

43953 Commits

Author SHA1 Message Date
Doron Behar
024357143a
nixos/samba: add mount.cifs +s wrapper (#328901) 2024-09-04 07:55:39 +00:00
Sirio Balmelli
dc700df6b2
nixos/github-runner: fix build failure
Shellcheck complains:

       > args=(
       >      ^-- SC2054 (warning): Use spaces, not commas, to separate array elements.

Add a comment disabling shellcheck in this case and annotating why.

Signed-off-by: Sirio Balmelli <sirio@b-ad.ch>
2024-09-04 09:20:11 +02:00
github-actions[bot]
d90699ae2f
Merge staging-next into staging 2024-09-04 06:05:29 +00:00
K900
23b4832da0 Merge remote-tracking branch 'origin/master' into staging-next 2024-09-04 08:53:48 +03:00
rewine
29d62536b9 deepin.nix: install dde-api-proxy 2024-09-04 10:16:56 +08:00
rewine
60348797ee deepin.dde-dock: remove 2024-09-04 10:16:54 +08:00
Sachi King
361fde84f9 Revert "nixos/firewall: fix reverse path check failures with IPsec"
The inclusion of the "meta ipsec" rule in the default reverse path
filtering breaks systems not built with specific XFRM kernel config
options.  Specifically CONFIG_XFRM must be set, which gets selected
by CONFIG_NFT_XFRM, which is hidden behind CONFIG_XFRM_USER.

These options are not selected by default in most defconfig's provided
by the kernel with the exception of some device-specific defconfigs.

These options are not set by the nix kernel common_config, and I would
argue that IPSec support does not belong in a minimal kernel as that
elevates its support status above other in-kernel VPN interfaces.

The contributor of this feature does not seem interested in working
towards a solution that does not break systems running kernels built
with "autoModules = false" while supporting this feature, and as this
silently breaks firewalls into an insecure state and poses an immediate
security issue I propose this be reverted until a solution that does not
break such systems is proposed.
https://github.com/NixOS/nixpkgs/pull/310857#discussion_r1742834970

Devices used as firewalls, if they do not have the required kernel
config, will fail to load the new firewall rules and will upon boot pass
traffic without any filtering into the internal network.

Devices exposed directly to the internet, after reboot, will boot
without filtering potentially exposing services not intended to be
exposed to the internet, such as databases.

The following platforms in nixpkgs appear to be impacted:
 - pc_simplekernel
 - pogoplug4
 - sheevaplug
 - zero-gravitas
 - zero-sugar
 - utilite
 - guruplug
 - beaglebone
 - fuloong2f_n32

References to hardware without autoModules can be found in
nixos-hardware, as well as in active third-party repos on github.

I suspect there are other users impacted that do not have their configurations
public, as autoModules = true leads to long compile times when targeting
kernels to less standard hardware or hardware with quirks that require
patches that cannot be upstreamed.

This reverts commit 3c12ef3f21.
2024-09-04 11:51:15 +10:00
Philip Taron
9e244d3d92
nixos/services.factorio: fix escapeShellArg (#339115) 2024-09-03 13:32:36 -07:00
Sandro
6e055283a9
virtualisation/azure-images: drop outdated list... (#338426) 2024-09-03 21:16:39 +02:00
Maximilian Bosch
6cc3e274c9
prometheus-openldap-exporter: remove (#338824) 2024-09-03 19:57:31 +02:00
Artturin
5b6e67c676
{gjs,geocode-glib}.tests.installed-tests: Fix (#338891) 2024-09-03 19:39:59 +03:00
Artturin
da19f27bd4 geocode-glib.tests.installed-tests: Fix
Were added in c670fb9afe

https://hydra.nixos.org/build/270814594/log
2024-09-03 19:39:23 +03:00
Artturin
74065337aa
mouse-actions-gui: init at 0.4.4 (#269518) 2024-09-03 19:33:49 +03:00
Philip Taron
7f1830f117
nixos/services.thinkfan: fix undefined variables (#338951) 2024-09-03 09:18:28 -07:00
Maximilian Bosch
40012de7de
mautrix-signal: 0.6.3 -> 0.7.0 (#337534) 2024-09-03 17:18:01 +02:00
Aleksana
43b54f4834
nixos/services.bees: Fix evaluation (#339185) 2024-09-03 20:36:36 +08:00
Aleksana
5624b8e352
nixos/foot: fix bash script (#339077) 2024-09-03 20:06:00 +08:00
github-actions[bot]
9b619f2f77
Merge master into staging-next 2024-09-03 12:05:18 +00:00
Bruno BELANYI
4d1e8c93a6
nixos/prowlarr: set HOME for the service (#317554) 2024-09-03 11:08:10 +01:00
Sandro
3bd4ec61c2
nixos/stargazer: module bug fix and hardening (#294795) 2024-09-03 11:56:05 +02:00
Benno Bielmeier
b8c7d88784 nixos/services.thinkfan: fix undefined variables
In d9dc50dc11 the usage of `with lib;` has
been removed from thinkfan.nix. Unfortunately, adjusting the check line
and its usage of the functions all,id,zipListsWith has not been updated
resulting in evaluation errors complaining about "undefined variable".
Update: partly covered in 0646a0771b of #339084

rel: #208242
2024-09-03 10:42:28 +02:00
Pol Dellaiera
930e12b9e8
nixos/services.openssh: remove with lib; (#339092) 2024-09-03 10:18:32 +02:00
K900
878922a902 nixos/installation-device: use a bigger hammer
Untrimmed mbrola-voices is leaking into the installer images again.
Instead of trying to manually squash every path it could possibly
leak through, use a very big hammer.
2024-09-03 10:53:25 +03:00
Jon Seager
d6834ede48
nixos/vmware.guest: disable xf86inputvmmouse on aarch64 (#326395) 2024-09-03 08:02:55 +01:00
Christina Sørensen
ed1dc0d441
nixos/kubernetes: amend dns addon clusterDns list (#338801) 2024-09-03 09:01:25 +02:00
Jörg Thalheim
a9034a9c35
nixos/grub: fix value precedence with optional -> mkIf (#338773) 2024-09-03 08:29:25 +02:00
github-actions[bot]
b7b46e40c2
Merge master into staging-next 2024-09-03 06:04:33 +00:00
Emily
2419b85a5e
nixos/syncplay: add missing options (#338579) 2024-09-03 04:36:51 +01:00
Assistant
8119ec6478 nixos/syncplay: add missing options
Exposes all currently available command-line arguments that were
missing, including some that were impossible to use with the catch-all
option `extraArgs` alone, requiring changes to other parts of the
system.
Those are now all self-contained in the module.
The service now uses systemd's `DynamicUsers`.
2024-09-02 22:26:11 -04:00
Bernardo Meurer
fc13b0acdb
Merge branch 'master' into add-rutorrent-service 2024-09-03 01:18:16 +00:00
github-actions[bot]
a07f612219
Merge master into staging-next 2024-09-03 00:13:11 +00:00
Felix Buehler
e1281c7a9d nixos/services.factorio: fix escapeShellArg 2024-09-02 23:47:15 +02:00
Felix Buehler
5f8696e39c nixos/services.openssh: remove with lib; 2024-09-02 22:31:36 +02:00
Felix Buehler
31c38324dd nixos/services.ceph: remove with lib; 2024-09-02 22:30:59 +02:00
Felix Buehler
f57a188819 nixos/services.unpoller: remove with lib; 2024-09-02 22:30:26 +02:00
Felix Bühler
1f34eeb672
nixos/services.thinkfan: fix all & id (#339084) 2024-09-02 22:21:06 +02:00
Martin Weinelt
abbba61963
zigbee2mqtt: 1.39.1 -> 1.40.0 (#338906) 2024-09-02 22:19:56 +02:00
Alyssa Ross
ca4ecee93b nixos/doc/rl-2411: document "rust" deprecations 2024-09-02 21:48:21 +02:00
Felix Bühler
8dd85c637c
nixos/services.zammad: remove with lib; (#338051) 2024-09-02 21:42:59 +02:00
Felix Buehler
0646a0771b nixos/services.thinkfan: fix all & id 2024-09-02 21:12:56 +02:00
Frédéric Christ
aab2bd233c nixos/mautrix-signal: Adapt to new configuration
With mautrix-signal v0.7.0 the bridge is built upon the bridgev2
architecture. With this, the configuration file was slightly rearranged.
Options like login_shared_secret_map and double_puppet_server_map were
dropped.
2024-09-02 20:47:10 +02:00
Frédéric Christ
e38c90b7c9 nixos/mautrix-signal: Reformat code 2024-09-02 20:40:36 +02:00
linsui
d572c865ad nixos/foot: fix bash script 2024-09-03 02:27:22 +08:00
github-actions[bot]
ce19166255
Merge master into staging-next 2024-09-02 18:04:19 +00:00
Martin Weinelt
76d4d43c6f
nixos/doc/rl-24.11: knot 3.4.0 migration guide 2024-09-02 15:25:32 +02:00
Martin Weinelt
fcc561f390
nixos/tests/prometheus-exporters/knot: update for 3.4.0
Removes deprecated and now removed fields from the config.
2024-09-02 15:20:36 +02:00
github-actions[bot]
4aa8416117
Merge master into staging-next 2024-09-02 12:05:34 +00:00
Zhong Jianxin
422ae9928a nixos/services.bees: Fix evaluation
```
error: undefined variable 'mod'
```
2024-09-02 19:23:52 +08:00
phaer
53df1e4ece virtualisation/qemu-vm: disallow nullable diskSize
Because `virtualisation.diskSize = null` does result in a broken vm runner,
see https://github.com/NixOS/nixpkgs/issues/292901.

diskSize was declared to be nullable when it first got types in a
tree-wide commit:
30f0faac22

But it seemingly never actually supported it, as "${cfg.diskSize}M" is
passed to qemu-img create, which doesn't allow an empty size parameter.

closes: https://github.com/NixOS/nixpkgs/issues/292901
2024-09-02 12:09:15 +02:00
Weijia Wang
c0df3aea49
nixos/doc/rl-2411: warn about upcoming macOS version requirement (#338695) 2024-09-02 09:56:38 +02:00
Martin Weinelt
27aaa2d596
zigbee2mqtt: 1.39.1 -> 1.40.0
https://github.com/Koenkk/zigbee2mqtt/releases/tag/1.40.0
2024-09-02 02:18:01 +02:00
github-actions[bot]
d834278999
Merge master into staging-next 2024-09-02 00:13:57 +00:00
Felix Bühler
06aee405da
nixos/services.neo4j: remove with lib; (#338049) 2024-09-01 20:52:52 +02:00
Niklas Hambüchen
1dab03cf4a
maintainers: add benaryorg (#338657) 2024-09-01 20:45:53 +02:00
Felix Buehler
6747d84812 nixos/services.kanata: fix utils 2024-09-01 19:42:03 +02:00
Jan Tojnar
e9179b4fa3 Merge branch 'master' into staging-next 2024-09-01 19:04:04 +02:00
Artturin
0d5deebbfd
nixosTests.systemd-initrd-luks-fido2: fix test on aarch64-linux (#297308) 2024-09-01 19:45:29 +03:00
Maximilian Bosch
735662bf16
prometheus-openldap-exporter: remove
2.3.0 is the final release, the repo is now archived.

Also I don't use it anymore for quite a while, so it didn't have a real
nixpkgs maintainer either.

Closes #338712
2024-09-01 16:47:45 +02:00
Emily
ca59219c43
python3Packages.{mautrix,matrix-nio}: add withOlm flags (#336901) 2024-09-01 15:38:16 +01:00
Étienne Simon
b5574c71be
Fix nested quotes in fontconfig.nix
A sed with nested double quotes is inserting malformed XML into /etc/fonts/fonts.conf, this commit put the sed command into single quotes to properly insert double quotes to enclose the XML attribute.
2024-09-01 15:55:12 +02:00
Sarah Brofeldt
a1863c871e nixos/kubernetes: amend dns addon clusterDns list
With 24.11, this is the required type, and we rely on this for the NixOS
tests
2024-09-01 15:13:11 +02:00
Sarah Brofeldt
1860dfed71
nixos/kubernetes: allow setting multiple kubelet dns resolvers (#338523) 2024-09-01 15:07:08 +02:00
Jan Tojnar
ffdd6582a0 release-notes: Mention gnome scope dissolution
Now, only non-packages remain.
2024-09-01 14:16:31 +02:00
Jan Tojnar
58bf5606fb gnome-flashback: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
b37f158fb0 gnome-applets: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
e1093690a8 gnome-panel: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
a110f292a1 gnome-control-center: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
c2f1fa833e gnome-session: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
ca9576c81d gnome-shell: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
7f387d6bf9 mutter{,43}: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
d2da9a19c4 gnome-settings-daemon{,43}: Move from gnome scope to top-level 2024-09-01 14:16:31 +02:00
Jan Tojnar
b4c59a979a gnome-bluetooth{,_1_0}: Move to by-name 2024-09-01 14:16:31 +02:00
zimbatm
1ea32d4f69 nixos/grub: fix value precendence with optional -> mkIf
When using `lib.optionals`, the return value of both branches of the
condition get set as a value to the option.

When using `lib.mkIf`, only the positive condition gets set as a value
to the option.

This small distinction is important when dealing with precedence. For
example here, we wanted to set a boot.grub.devices default value with
lib.mkDefault, and that was getting overridden with the empty value of
`lib.optional (cfg.device != "") cfg.device`.

See https://github.com/nix-community/srvos/pull/491#discussion_r1738827651

The general conclusion is that using `lib.mkIf` is preferable to
`lib.optional` or `lib.optionals` when setting values in the NixOS
module system.
2024-09-01 12:13:15 +02:00
Quantenzitrone
2521bebbf2
nixosTests.systemd-initrd-luks-fido2: fix test on aarch64-linux
This is the error message on fail:

> qemu-system-aarch64: -device canokey,file=/tmp/canokey-file: Warning:
>   speed mismatch trying to attach usb device "CanoKey QEMU" (full
>   speed) to bus "usb0.0", port "3" (high speed)

My Understanding of the Issue is: The test failed because
qemu-system-aarch64 apparently has different USB controllers enabled by
default, resulting in a "speed mismatch" between the USB controller and
CanoKey that only occurred on aarch64.
I could reproduce the issue on x86_64 by enabling the EHCI controller
and then fix the issue by specifying which USB bus to use for the
CanoKey.
This didn't fully fix the issue on my first attempt, because the UCHI
controller enabled by -usb doesn't have the same bus name on aarch64
and x86_64.
While bus=usb-bus.0 worked on x86_64, on aarch64 i get this message:

> qemu-system-aarch64: -device canokey,bus=usb-bus.0,file=
>   /tmp/canokey-file: Bus 'usb-bus.0' not found

The final solution now manually enables the OHCI controller (which may
be similar to UHCI, but i really have no idea other than it works) and
assigns it the id aka bus name "usb-bus", so it works the same under
both architectures.
2024-09-01 10:40:14 +02:00
github-actions[bot]
0cfb8626ee
Merge staging-next into staging 2024-09-01 06:05:31 +00:00
Artturin
877838a0da
nixos/tests/plotinus: fix build (#338686) 2024-09-01 07:33:59 +03:00
github-actions[bot]
1fdf4b61a4
Merge staging-next into staging 2024-09-01 00:16:33 +00:00
Emily
f1c3597d95 nixos/doc/rl-2411: warn about upcoming macOS version requirement
For a long time now, the SDK and minimum target version for
`x86_64-darwin` has been stuck on macOS 10.12. In the past, the minimum
SDK was updated quite regularly; at first, the current situation was
just because updating the SDKs was excessively burdensome and nobody
was up for doing the work, but the introduction of `aarch64-darwin`
with its macOS 11 default SDK has resulted in a long‐term fracture
of the two platforms.

Per <https://endoflife.date/macos>, macOS 10.12 has not received
an update since 2017 and went out of security support 5 years
ago. Trying to support it in Nixpkgs has been a large burden on the
Darwin maintainers, resulting in workarounds, porting work, and even
patching functionality out of applications. The existence of Nix
users using a macOS version this old is, to my knowledge, entirely
theoretical, and we pay in both maintenance costs and functionality:
for instance, applications built for `x86_64-darwin` do not support
automatic dark mode switching by default.

This situation has always been suboptimal, but it is
now becoming untenable. Python, a critical component
of the Nixpkgs standard environment for builds, is
dropping support for versions older than 10.13 in 3.13:
<https://www.python.org/downloads/release/python-3130rc1/>. Qt 6 only
supports macOS 11 and newer. libuv only supports the versions Apple
does, and is a ticking time bomb due to its use in the standard
environment. QEMU only supports the last two macOS releases, and
won’t build with an SDK older than macOS 12; we previously vendored
a set of backporting changes and functionality‐removing reverts
to keep it building for 10.12, but this also became overly onerous,
and we gave up in <https://github.com/NixOS/nixpkgs/pull/338598>.

`x86_64-darwin` is a platform with a limited upstream future. Apple no
longer sells any hardware that runs it natively, and it is unclear how
much longer they will support it in the operating system. There are
still many users of the platform, myself included, so we shouldn’t
drop support for it prematurely, but it’s unreasonable to try and
patch the entire world to keep it supporting insecure versions of
the OS that only run on hardware that is no longer sold.

Therefore, this adds a release note to warn users ahead of time that
25.05 will only support macOS 11 and newer, as suggested by the 24.05
release team when the possibility of bumping the required version
was raised.

Why target Big Sur, rather than any other version? The
reason is simple: it’s the same SDK and deployment target as
`aarch64-darwin`. There are many packages that work on `aarch64-darwin`
but not `x86_64-darwin`, and Darwin maintainers frequently need to be
called in to fix things that work fine on the newer platform but not
the older one. This change will increase the health of `x86_64-darwin`
by aligning the SDK versions and support between the two platforms;
the vast majority of packages that work on one will Just Work on the
other. macOS 11 is almost four years old and has itself been out of
security support for a year now, but as the first version to support
Apple Silicon, it’s a far more compatible base for us to build our
Darwin packages for. Any future change in supported versions should
be synchronized between the two Darwin architectures.

When 25.05 is released, users on old, unsupported versions of macOS
will have the following options:

* Update to a new macOS version. For users that are on hardware
  that Apple has dropped support for, OpenCore Legacy Patcher
  (<https://dortania.github.io/OpenCore-Legacy-Patcher/>) can enable
  the use of newer macOS versions on hardware even older than 10.12
  supports.

* Install NixOS. That obviously precludes the use of macOS software
  (though most of that software has already dropped support for 10.12),
  but will give users a secure, supported operating system that we
  can actually own the support for going forward.

* Keep using 24.11 forever. Since they’re not getting updates
  to their OS and core applications anyway, this is likely to be
  acceptable to many users.

* Switch to MacPorts. They support all the way back to 10.6 for
  `x86_64-darwin` by building packages separately for every OS release,
  though not every package is available for every version.

* Send patches. We *may* accept non‐invasive patches to keep
  certain critical packages (such as the core `stdenv` packages)
  building for old OS versions, on a case‐by‐case basis, but we
  can’t guarantee it. This will ultimately have to be a decision
  made by package maintainers and personally I doubt this will be a
  viable path to sustainably support older versions.
2024-09-01 00:29:37 +01:00
Maximilian Bosch
9ac9a9c2f5
nixos/tests/wireguard: tie kernel version to test to default (#338632) 2024-09-01 00:06:25 +02:00
ghpzin
506d9f0416
nixos/tests/plotinus: fix build
- change tested app from gnome-calculator to gnome-pomodoro as plotinus
only works on gtk3 apps
- change screenshot result to one that shows popup from plotinus
instead of preferences window
- add 2 minute timeouts waiting for windows
- add 10 minute timeout for full test
2024-09-01 00:31:59 +03:00
Artturin
9ef8a9cd56
nixos/telegraf: make sure ping executable is available when trying to ping (#338673) 2024-08-31 23:52:58 +03:00
Felix Bühler
7f62309646
nixos/fonts.fontconfig: remove with lib; (#338042) 2024-08-31 22:52:12 +02:00
Echo Nolan
934a337a13 nixos/telegraf: make sure ping executable is available when trying to ping
We need ping to be in PATH of the service otherwise it can't ping. This commit
adds it, conditional on one of the inputs being a ping task.
2024-08-31 15:29:04 -04:00
Will Fancher
811ee8ab2e
nixos/iso-image: Compress squashfs with zstd 19 (#338652) 2024-08-31 14:38:47 -04:00
github-actions[bot]
f20de6f5f1
Merge staging-next into staging 2024-08-31 18:04:19 +00:00
benaryorg
4105cdb446
tests/ceph: benaryorg as dmcrypt test maintainer
Signed-off-by: benaryorg <binary@benary.org>
2024-08-31 17:12:02 +00:00
Will Fancher
49192ef7a3 nixos/iso-image: Compress squashfs with zstd 19 2024-08-31 12:21:36 -04:00
Lin Jian
485edde32f
doc/release-notes: change "New Services" to "New Modules" (#337984) 2024-08-31 23:11:50 +08:00
éclairevoyant
075c6ce71f
nixos/fcitx5: fix evaluation (#338621) 2024-08-31 14:28:20 +00:00
sternenseemann
891a1f78e8 nixos/tests/wireguard: tie kernel version to test to default
When wireguard began being tested on multiple kernel versions, the
current default version at the time was hard coded:
41bd6d2614.

We should update this and prevent it from becoming stale ever again by
computing the default value.
2024-08-31 16:09:11 +02:00
Nick Cao
4a7f3e03c1
nixos/fcitx5: replace renamed options in test 2024-08-31 09:22:24 -04:00
Niklas Hambüchen
41f229d131
ceph.tests: Fix maintainer eval (#338619) 2024-08-31 15:22:03 +02:00
Nick Cao
38cabf32f8
nixos/fcitx5: fix evaluation 2024-08-31 09:20:31 -04:00
github-actions[bot]
c33b70bb75
Merge staging-next into staging 2024-08-31 12:05:08 +00:00
Martin Weinelt
b51e706d6e
nixos/doc/rl-2411: frigate breaking changes 2024-08-31 13:49:32 +02:00
Martin Weinelt
9e01f2b6ac
nixos/tests/frigate: test login 2024-08-31 13:49:32 +02:00
Martin Weinelt
62a52a1b3c
frigate: 0.13.2 -> 0.14.1
https://github.com/blakeblackshear/frigate/releases/tag/v0.14.0
https://github.com/blakeblackshear/frigate/releases/tag/v0.14.1
2024-08-31 13:49:32 +02:00
Niklas Hambüchen
def05db018 ceph.tests: Fix maintainer eval 2024-08-31 11:47:58 +00:00
Niklas Hambüchen
53152af2fe
ceph: Fix missing patch for Ceph with dmcrypt (#335684) 2024-08-31 13:11:26 +02:00
benaryorg
0cd631e61f tests/ceph: bluestore, dmcrypt, and IPv6 test
Signed-off-by: benaryorg <binary@benary.org>
2024-08-31 11:07:25 +00:00
github-actions[bot]
023a2c3d2a
Merge staging-next into staging 2024-08-31 06:04:54 +00:00
github-actions[bot]
8158f1d5b3
Merge master into staging-next 2024-08-31 06:04:15 +00:00
Tristan Gosselin-Hane
2d54b2b048 nixos/kubernetes: allow setting multiple kubelet dns resolvers
The current kubernetes module only allows you to set a single DNS
resolver for the kubelet. Historically, this has not mattered as the
value was passed to a cli argument as a string and as per the kubelet's
configuration parsing mechanism, multiple values could be passed as a
comma-delimited string. However, recently, the module was refactored to
make configure kubernetes components via configuration files rather than
the deprecated command-line arguments. These files more strongly-typed
than CLI arguments and to pass multiple values, one must define a list
in the file. When this change was made, an incorrect assumption was made
that only a single DNS server could be specified and forced a
single-item list into this configuration file. We need to introduce a
breaking change to the module in order to allow the user to supply their
own list with however many dns resolvers they wish to use.
2024-08-30 22:17:00 -04:00
Yt
4dd3c85ad5
{prisma,prisma-engines}: 5.16.1 -> 5.18.0 (#337521) 2024-08-31 00:15:53 +00:00
github-actions[bot]
fab50d5f8d
Merge staging-next into staging 2024-08-31 00:13:46 +00:00
github-actions[bot]
dcad9b571a
Merge master into staging-next 2024-08-31 00:13:18 +00:00
Philip Taron
9916dc8728
treewide/nixos: remove with lib; part 2 (#335618) 2024-08-30 15:56:57 -07:00
Philip Taron
4710721d41
nixos: Support fileSystems.<name>.depends with fstab-generator (#233707) 2024-08-30 15:55:39 -07:00
Felix Bühler
30eba5df55
nixos/services.libinput: remove with lib; (#338054) 2024-08-30 23:15:31 +02:00
Felix Buehler
5f816eeb7e nixos.tests.audiobookshelf: remove with lib; 2024-08-30 23:01:46 +02:00
Felix Buehler
dcb2e4eba4 nixos/services.xe-guest-utilities: remove with lib; 2024-08-30 23:01:45 +02:00
Felix Buehler
3e5d6ba7df nixos/virtualisation.vmware.image: remove with lib; 2024-08-30 23:01:45 +02:00
Felix Buehler
cd197cebdf nixos/system.autoUpgrade: remove with lib; 2024-08-30 23:01:45 +02:00
Felix Buehler
10e8c2cecd nixos/environment.etc: remove with lib; 2024-08-30 23:01:45 +02:00
Felix Buehler
f3dd1a8bd5 nixos/services.logind: remove with lib; 2024-08-30 23:01:45 +02:00
Felix Buehler
69ca7aa56f nixos/services.journald: remove with lib; 2024-08-30 23:01:42 +02:00
Felix Buehler
97070a2ea6 nixos/services.libreswan: remove with lib; 2024-08-30 23:01:18 +02:00
Felix Buehler
92f17f012d nixos/services.kresd: remove with lib; 2024-08-30 23:01:16 +02:00
Felix Buehler
5960372742 nixos/services.kea: remove with lib; 2024-08-30 23:00:56 +02:00
Felix Buehler
717fa0dea5 nixos/services.dnscrypt-wrapper: remove with lib; 2024-08-30 23:00:56 +02:00
Felix Buehler
0846124d8b nixos/services.owncast: remove with lib; 2024-08-30 23:00:55 +02:00
Felix Buehler
20496ce388 nixos/services.osrm: remove with lib; 2024-08-30 23:00:55 +02:00
Felix Buehler
eddc7384db nixos/services.ombi: remove with lib; 2024-08-30 23:00:55 +02:00
Felix Buehler
d40cf96f75 nixos/services.octoprint: remove with lib; 2024-08-30 23:00:55 +02:00
Felix Buehler
a99bf84530 nixos/services.nzbhydra2: remove with lib; 2024-08-30 23:00:54 +02:00
Felix Buehler
2da17447da nixos/services.nzbget: remove with lib; 2024-08-30 23:00:54 +02:00
Felix Buehler
457b7563d4 nixos/services.ntfy-sh: remove with lib; 2024-08-30 23:00:54 +02:00
Felix Buehler
eeed115e37 nixos/services.novacomd: remove with lib; 2024-08-30 23:00:54 +02:00
Felix Buehler
b48bee9985 nixos/nix.sshServe: remove with lib; 2024-08-30 23:00:54 +02:00
Felix Buehler
42bdc30f19 nixos/services.n8n: remove with lib; 2024-08-30 23:00:53 +02:00
Felix Buehler
e00ab2106a nixos/services.moonraker: remove with lib; 2024-08-30 23:00:53 +02:00
Felix Buehler
a4db992d51 nixos/services.mbpfan: remove with lib; 2024-08-30 23:00:53 +02:00
Felix Buehler
68fd69371f nixos/services.mame: remove with lib; 2024-08-30 23:00:53 +02:00
Felix Buehler
a11ac85d65 nixos/services.logkeys: remove with lib; 2024-08-30 23:00:53 +02:00
Felix Buehler
25e0bc25f6 nixos/services.lifecycled: remove with lib; 2024-08-30 23:00:52 +02:00
Felix Buehler
d562492115 nixos/services.lidarr: remove with lib; 2024-08-30 23:00:52 +02:00
Felix Buehler
4e1b387f24 nixos/services.leaps: remove with lib; 2024-08-30 23:00:52 +02:00
Felix Buehler
118d8962d3 nixos/services.languagetool: remove with lib; 2024-08-30 23:00:52 +02:00
Felix Buehler
14f18ffb06 nixos/services.klipper: remove with lib; 2024-08-30 23:00:52 +02:00
Felix Buehler
cac7b5e266 nixos/services.jellyseerr: remove with lib; 2024-08-30 23:00:51 +02:00
Felix Buehler
2fbd333075 nixos/services.jackett: remove with lib; 2024-08-30 23:00:51 +02:00
Felix Buehler
a442c73bff nixos/services.irkerd: remove with lib; 2024-08-30 23:00:51 +02:00
Felix Buehler
bd471d7eb1 nixos/services.input-remapper: remove with lib; 2024-08-30 23:00:51 +02:00
Felix Buehler
7065336804 nixos/services.ihaskell: remove with lib; 2024-08-30 23:00:50 +02:00
Felix Buehler
2270873952 nixos/services.heisenbridge: remove with lib; 2024-08-30 23:00:50 +02:00
Felix Buehler
0205ba83ab nixos/services.headphones: remove with lib; 2024-08-30 23:00:50 +02:00
Felix Buehler
a40bb4329a nixos/services.greenclip: remove with lib; 2024-08-30 23:00:50 +02:00
Felix Buehler
01533f55c4 nixos/services.gpsd: remove with lib; 2024-08-30 23:00:50 +02:00
Felix Buehler
22d14ed8a2 nixos/services.gollum: remove with lib; 2024-08-30 23:00:49 +02:00
Felix Buehler
9358cb9b7d nixos/services.gitweb: remove with lib; 2024-08-30 23:00:49 +02:00