Commit Graph

41972 Commits

Author SHA1 Message Date
zowoq
7244df6927 buildbot: 3.11.3 -> 4.0.0
sometimes takes a while for upstream to publish on pypi so switch to using github source for master, pkg, worker and github releases for the plugins which require built assets
2024-06-30 13:26:51 +10:00
h7x4
f4ebfc297c
Merge pull request #200654 from aacebedo/aacebedo/playerctld
playerctl: add daemon service
2024-06-30 03:41:17 +02:00
tomberek
079457313a
Merge pull request #321930 from jtbx-prs/oink-after-network
nixos/oink: wait for network.target
2024-06-29 20:42:03 -04:00
h7x4
8a76b6258e
doc/release-notes: add note about new service playerctld 2024-06-30 02:27:20 +02:00
OPNA2608
af779007e7 tests/lomiri: Don't need to keep Morph in the background anymore, content-hub can launch it now 2024-06-30 01:37:10 +02:00
Arthur Noel
6447fae5d0 kmscon: configure keymap from xserver xkb config 2024-06-30 00:29:16 +01:00
Danilo Reyes
4f021e14a3 shiori: 1.5.5 -> 1.7.0 2024-06-29 15:30:22 -06:00
Eman Lear
6c00b71662
Merge branch 'master' into master 2024-06-30 02:19:21 +08:00
Maximilian Bosch
61c8a190f7
nixos/rl-2411: document breaking change in grafana 2024-06-29 19:09:05 +02:00
Maximilian Bosch
8511063014
grafana: 11.0.0 -> 11.1.0
ChangeLog: https://github.com/grafana/grafana/releases/tag/v11.1.0

A few additional changes were necessary:

* Grafana now refuses to listen on non-IP values and aborts with

    Error: ✗ *apiserver.service run error: invalid IP address: localhost

* packages/grafana-e2e doesn't exist anymore, so the build fixes for
  that could be removed.

* Make sure we always compile the binary parts of cypress.

* Grafana tends to set the minimum Go version to the latest Go version
  available now[1].

* The `url` of a datasource was set to `localhost` by default. I don't
  expect anybody to have not set it when needed, also Grafana aborts now
  if `url` is non-empty for a random walk datasource (which broke the VM
  tests).

[1] https://github.com/grafana/grafana/pull/88794#discussion_r1630563467
2024-06-29 19:09:05 +02:00
Bobby Rong
49d0f43f57
nixos/doc/rl-2411: Mention Cinnamon 6.2 update 2024-06-29 23:56:38 +08:00
Kim Lindberger
b75986fd26
Merge pull request #310642 from arcnmx/keycloak-hostname-strict
nixos/keycloak: relax hostname settings assertion
2024-06-29 17:09:02 +02:00
Nick Cao
690518e966
Merge pull request #321982 from Moraxyc/update-nezha-agent
nezha-agent: 0.17.0 -> 0.17.2
2024-06-29 09:02:54 -04:00
Thomas Gerbet
85be596266
Merge pull request #322585 from wegank/limesurvey-security
nixos/limesurvey: drop default encryption key and nonce
2024-06-28 23:43:24 +02:00
Sandro
0cbf178ddb
Merge pull request #322508 from MarcelCoding/hound
hound: convert to use freeform type
2024-06-28 22:57:59 +02:00
Matthew Croughan
d76ad79b4d
nixos/scion: use RuntimeDirectory instead of StateDirectory (#323200)
It was wrong to use StateDirectory to keep the scion-control and
scion-router runtime databases on disk for the next run. I observed that
doing this means a reboot, or power outage can corrupt the temporary
runtime databases for the next service start, leading scion ping and
other functionality to stop working permanently, since those files are
not managed in an atomic manner by the golang code.
2024-06-28 22:16:36 +02:00
Masum Reza
383744754e
Merge pull request #314798 from yomaq/healthchecks-settingsFile
nixos/healthchecks: add settingsFile option
2024-06-29 00:02:35 +05:30
Masum Reza
8808f7d7fc
Merge pull request #278982 from felbinger/master
python311Packages.mozilla-django-oidc: init at 4.0.1; peering-manager: add oidc support
2024-06-28 23:49:34 +05:30
Florian Klink
0ee2243bc8
Merge pull request #322980 from michaelfranzl/fix-nss-libvirt
nixos/virtualisation: increase priority for libvirt NSS modules
2024-06-28 18:15:16 +03:00
Bobby Rong
3901dc7822
Merge pull request #323159 from bobby285271/upd/xfce-colord
nixos/xfce: Enable colord by default
2024-06-28 23:00:08 +08:00
Bobby Rong
6c6614ada8
nixos/xfce: Enable colord by default
Goes with #323010.
2024-06-28 21:42:06 +08:00
Moraxyc
f852b38c42
nixos/nezha-agent: add gpu monitoring option 2024-06-28 16:18:40 +08:00
Artturin
fc5487d05d
Merge pull request #319715 from jmbaur/repart-compression-threads
nixos/systemd-repart: respect NIX_BUILD_CORES for image compression
2024-06-28 04:26:20 +03:00
Weijia Wang
daa81ecb2e nixos/limesurvey: drop default encryption key and nonce
Co-authored-by: Thomas Gerbet <thomas@gerbet.me>
2024-06-28 00:34:00 +02:00
Sandro Jäckel
ccd042b969
nixos/hound: set reasonable default for dbpath 2024-06-27 21:59:15 +02:00
Marcel
d7977717ac
nixos/hound: remove with lib; 2024-06-27 21:59:07 +02:00
Marcel
e6979857a3
nixos/hound: convert config to free-form type, add config check 2024-06-27 21:56:18 +02:00
Marcel
73e7708bee
nixos/hound: cleanup services.hound.enable 2024-06-27 21:56:18 +02:00
Silvan Mosberger
c8dec6df38
Merge pull request #322801 from eclairevoyant/discourage-mkpackageoptionmd
lib: deprecate mkPackageOptionMD
2024-06-27 20:15:08 +02:00
Yaya
d7fd9d19b2 nixos/doc/rl-2411: Mention minimal postgresql requirement for gitlab 17
`gitlab` >= 17.0 requires at least `postgresql` >= 14.9. GitLab users
are advised to follow the mentioned steps in the manual to upgrade their
PostgreSQL installation.
2024-06-27 19:52:03 +02:00
Yaya
b4d242907c nixos/gitlab: Add missing state folder 2024-06-27 19:52:03 +02:00
Yaya
59583de9d1 nixos/gitlab: Assert PostgreSQL >= 14.9
Support for PostgreSQL 13 has been removed in GitLab 17.0. [1]
Module users should upgrade their database installation to
PostgreSQL >= 14.9.

[1]: https://docs.gitlab.com/ee/update/deprecations.html#postgresql-13-no-longer-supported
2024-06-27 19:52:03 +02:00
Someone
35a472db57
Merge pull request #320830 from philiptaron/nixos-nvidia-change-datacenter-defaults
nixos/nvidia: move TOPOLOGY_FILE_PATH and DATABASE_PATH into nvidia-fabricmanager service definition
2024-06-27 15:56:29 +00:00
Robert Hensing
044d202b36
Merge pull request #322886 from fricklerhandwerk/update-nix
nixVersions: bump patch releases
2024-06-27 14:50:13 +02:00
Niklas Hambüchen
1032399f52
Merge pull request #322782 from DCsunset/quickwit-fix
nixos/quickwit: fix service ReadWritePaths
2024-06-27 14:39:11 +02:00
Jonas Heinrich
77e7768849
Merge pull request #322397 from Ma27/bump-nextcloud
nextcloud: drop 27, 28.0.6 -> 28.0.7, 29.0.2 -> 29.0.3
2024-06-27 14:09:29 +02:00
Valentin Gagarin
144ac0d7fc nixVersions: bump patch releases 2024-06-27 13:43:44 +02:00
Masum Reza
891c75c86e
Merge pull request #322591 from JohnRTitor/hyprland-module
nixos/hyprland: set systemd environment PATH only for versions < 0.41.2
2024-06-27 16:34:04 +05:30
Sandro
f6fb5b4f20
Merge pull request #322216 from Pandapip1/patch-3
services/localtimed: Allow configuring packages
2024-06-27 12:58:20 +02:00
matthewcroughan
23c24527dc nixos/scion: add scion package when scion.enable = true 2024-06-27 11:52:04 +02:00
matthewcroughan
973108d3ed nixos/scion: use recursiveUpdate instead of // 2024-06-27 11:51:28 +02:00
éclairevoyant
77f6192786
lib: deprecate mkPackageOptionMD 2024-06-26 23:14:45 -04:00
éclairevoyant
aeee4fc133
treewide: replace mkPackageOptionMD with mkPackageOption 2024-06-26 23:05:42 -04:00
Jared Baur
560cd874a3
nixos/etc: fix using etc overlay on cross-compiled systems
We need to run tooling from the build platform when generating the EROFS.
2024-06-26 19:50:24 -07:00
DCsunset
05b67b87b7 nixos/quickwit: fix service ReadWritePaths 2024-06-26 20:47:00 -04:00
Pol Dellaiera
908c90cd18
Merge pull request #313606 from drupol/ollama-add-preLoadedModels
nixos/ollama: add `loadModels` config option
2024-06-26 22:56:56 +02:00
Alexandre Acebedo
14422223df
playerctl: add daemon service 2024-06-26 21:33:46 +02:00
Someone
cb69dc5b8d
Merge pull request #256230 from SomeoneSerge/feat/gpu-tests-py
GPU access in the sandbox
2024-06-26 19:16:53 +00:00
Pol Dellaiera
f6727a9e3e nixos/ollama: add loadModels config option
Allows users to download model files upon service startup,
instead of at the first use of the model, improving percieved startup latency.
2024-06-26 15:11:37 -04:00
Sandro
efdfa300ee
Merge pull request #287036 from srhb/kafka-versions-cleanup
kafka: versions cleanup and drop older
2024-06-26 20:22:49 +02:00
Masum Reza
44f79e5bf0
Merge pull request #321591 from JohnRTitor/gdm-fingerprint-auth
nixos/gdm: allow logging in via fingerprint
2024-06-26 23:08:16 +05:30
John Titor
ff0738b736
nixos/hyprland: set systemd environment PATH for versions < 0.41.2
Importing PATH into the systemd environment is done by default in
Hyprland v0.41.2+ (https://github.com/hyprwm/Hyprland/pull/6640)
We soft deprecate this option here for versions >= 0.41.2.
2024-06-26 23:04:27 +05:30
Sandro
273f6bdff8
Merge pull request #244684 from m-bdf/kmscon-use-upstream-service-file
nixos/kmscon: use upstream service file
2024-06-26 19:29:28 +02:00
nikstur
e05a365dca
Merge pull request #321991 from Mic92/etc-overlay-cross
etc.overlay: fix cross-build
2024-06-26 19:12:15 +02:00
Someone Serge
79a7186f1c cudaPackages: updated convention for gpu/runtime checks
Runtime tests (derivations asking for a relaxed sandbox) are now
expected at p.gpuCheck, p.gpuChecks.<name>, or at
p.tests.<name>.gpuCheck.
2024-06-26 16:00:29 +00:00
Artturin
1ecc3cd35b
Merge pull request #322194 from Artturin/polkitaddpackageoption
nixos/polkit: Add package option
2024-06-26 12:42:38 +03:00
Tomodachi94
5912dfd17c
nixos/doc/rl-2411: drop nodePackages.vscode-*-bin
Packages dropped:
* nodePackages.vscode-css-languageserver-bin
* nodePackages.vscode-json-languageserver-bin
* nodePackages.vscode-html-languageserver-bin
2024-06-26 02:19:16 -07:00
Nico Felbinger
c4d2c90da0
nixos/peering-manager: add oidc support
Co-authored-by: Jenny <me@netali.de>
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-06-26 07:45:18 +02:00
Someone Serge
ebeb6b9d1d nix-required-mounts: nixfmt 2024-06-26 00:35:45 +00:00
Someone Serge
927b15ed6d nixos/nix-required-mounts: allow passing extra arguments to the hook 2024-06-26 00:35:44 +00:00
Someone Serge
dd70727622 nixos/nix-required-mounts: mount the runtime closures 2024-06-26 00:35:44 +00:00
Someone Serge
55f54cc2c3 nix-required-mounts: restore (optional) symlink support 2024-06-26 00:35:44 +00:00
Someone Serge
3cf5bcfe49 nix-required-mounts: restore the followSymlinks option
This way pkgs.nix-required-mounts is "correct" even before
we override it in the NixOS module
2024-06-26 00:35:44 +00:00
Someone Serge
5560f6a514 nix-required-mounts: guest and host paths may differ 2024-06-26 00:35:43 +00:00
Someone Serge
7418e4fefd programs.nix-required-mounts: presets.cuda -> nvidia-gpu
This hopefully clarifies that the preset configures the hook to expose
"nvidia devices", which includse both the userspace driver and the
device nodes.

The derivations  still declare requiredSystemFeatures = [ "cuda" ] to
explicitly indicate they need to use the CUDA functionality and expect a
libcuda.so and a CUDA-capable device. Ideally, we'd also include the
specific CUDA architectures (sm_86, etc) in feature names.

Derivations that use a co-processor but do not care about the vendor or
even the particular interface may ask for the more generic "opengl",
"vulkan", or "gpu" features. It is then responsibility of the host
declaring the support for this feature to ensure the drivers and
hardware are appropriately set up.
2024-06-26 00:35:43 +00:00
Someone Serge
50d4382114 programs.nix-required-mounts: inherit defaults from the package 2024-06-26 00:35:43 +00:00
Someone Serge
6662b09941 nix-required-mounts: handle __structuredAttrs 2024-06-26 00:35:43 +00:00
Someone Serge
340b41815d nixosTests.nix-required-mounts: init 2024-06-26 00:35:42 +00:00
Someone Serge
b422dafc89 nix-required-mounts: init 2024-06-26 00:35:42 +00:00
Sandro
08605eec2a
Merge pull request #311381 from minijackson/tomcat-port
nixos/tomcat: add 'port' option
2024-06-26 00:53:58 +02:00
Sandro
44b22d8d45
Merge pull request #318185 from tomfitzhenry/initrd-ssh-null-alg
nixos/initrd-ssh: set KexAlgorithms/Ciphers/MACs only if non-null
2024-06-25 23:21:33 +02:00
Sandro
33f83c6252
Merge pull request #316977 from eclairevoyant/fix-mkEnableOption
treewide: fix mkEnableOption usage
2024-06-25 22:42:16 +02:00
Sandro
3176d6fb53
Merge pull request #315144 from mattpolzin/default-nodename-fix
nixos/services.kubernetes.kubelet: handle non-lower case chars in hostname
2024-06-25 22:38:46 +02:00
Sandro
5b0ea759a7
Merge pull request #318347 from caffineehacker/vaultwarden_backup
nixos/vaultwarden: backup all rsa_keys
2024-06-25 22:37:56 +02:00
Sandro
1813936aff
Merge pull request #272895 from xanderio/wg-access-server-0.10.1
wg-access-server: init at 0.12.1
2024-06-25 21:21:19 +02:00
Michael Franzl
cae086d605
nixos/virtualisation: increase priority for libvirt NSS modules
When `services.resolved` is enabled, then `resolve [!UNAVAIL=return]`
is added to `system.nssDatabases.hosts` with priority 501,
which prevents lower-priority NSS modules from running
unless systemd-resolved is not available.

Quoting from `man nss-resolve`:

> To activate the NSS module, add "resolve [!UNAVAIL=return]" to the line
> starting with "hosts:" in /etc/nsswitch.conf. Specifically, it is
> recommended to place "resolve" early in /etc/nsswitch.conf's "hosts:"
> line. It should be before the "files" entry, since systemd-resolved
> supports /etc/hosts internally, but with caching. To the contrary, it
> should be after "mymachines", to give hostnames given to local VMs and
> containers precedence over names received over DNS. Finally, we
> recommend placing "dns" somewhere after "resolve", to fall back to
> nss-dns if systemd-resolved.service is not available.

Note that the man page (just) recommends "early" and means with this
"before the 'files' and 'dns' entries". It does not insist on being
first or excluding other modules.

For this reason, libvirt NSS modules should run before the `resolve`
module. They should come right next to `mymachines` because both are
conceptually very similar -- they resolve local VMs/containers.

Since the data source of the libvirt NSS modules are local
plain text files (see source code of the libvirt NSS module),
no performance impact is expected form this raise of priorities.

Other NSS modules in NixOS also explicitly set their priority, which is
why this change increases consistency.

Fixes #322022
2024-06-25 20:22:14 +02:00
Jörg Thalheim
12e24e94d3
Merge pull request #321984 from ryze312/fix_localConf
nixos/zerotierone: fix default value for localConf
2024-06-25 17:14:23 +02:00
Yaya
8e85799e54 nixos/doc/rl-2411: Add a deprecation notice for gitlab-runner 2024-06-25 17:06:45 +02:00
Yaya
95bd18b5c5 nixos/doc/rl-2411: Add a deprecation notice for gitlab 2024-06-25 17:06:45 +02:00
Yaya
6f211d899d nixos/gitlab-runner: Add support runner authentication tokens
Support for *runner registration tokens* is deprecated since GitLab
16.0, has been disabled by default in GitLab 17.0 and will be removed in
GitLab 18.0, as outlined in the [GitLab documentation].

It is possible to [re-enable support for runner registration tokens]
until GitLab 18.0, to prevent the registration workflow from
breaking.

*Runner authentication tokens*, the replacement for registration tokens,
have been available since GitLab 16.0 and are expected to be defined in
the `CI_SERVER_TOKEN` environment variable, instead of the previous
`REGISTRATION_TOKEN` variable.

This commit adds a new option
`services.gitlab-runner.services.<name>.authenticationTokenConfigFile`.
Defining such option next to
`services.gitlab-runner.services.<name>.registrationConfigFile` brings
the following benefits:
- A warning message can be emitted to notify module users about the
  upcoming breaking change with GitLab 17.0, where *runner registration
  tokens* will be disabled by default, potentially disrupting
  operations.
- Some configuration options are no longer supported with *runner
  authentication tokens* since they will be defined when creating a new
  token in the GitLab UI instead. New warning messages can be emitted to
  notify users to remove the affected options from their configuration.
- Once support for *registration tokens* has been removed in GitLab 18,
  we can remove
  `services.gitlab-runner.services.<name>.registrationConfigFile` as
  well and make module users configure an *authentication token*
  instead.

This commit changes the option type of
`services.gitlab-runner.services.<name>.registrationConfigFile` to
`with lib.types; nullOr str` to allow configuring an authentication
token in
`services.gitlab-runner.services.<name>.authenticationTokenConfigFile`
instead.

A new assertion will make sure that
`services.gitlab-runner.services.<name>.registrationConfigFile` and
`services.gitlab-runner.services.<name>.authenticationTokenConfigFile`
are mutually exclusive. Setting both at the same time would not make
much sense in this case.

[GitLab documentation]: https://docs.gitlab.com/17.0/ee/ci/runners/new_creation_workflow.html#estimated-time-frame-for-planned-changes
[re-enable support for runner registration tokens]: https://docs.gitlab.com/17.0/ee/ci/runners/new_creation_workflow.html#prevent-your-runner-registration-workflow-from-breaking
2024-06-25 17:06:45 +02:00
Yaya
92a26526b9 nixos/gitlab-runner: Remove global with lib; 2024-06-25 17:06:45 +02:00
Julien Malka
9d1a59b2e2
Merge pull request #322386 from katexochen/jonringer/rm
treewide: remove jonringer as package maintainer and code owner
2024-06-25 17:04:27 +02:00
Bobby Rong
1373dd5ac8
Merge pull request #322186 from bobby285271/upd/cinnamon-xapps
Cinnamon updates 2024-06-24
2024-06-25 21:33:27 +08:00
Maximilian Bosch
60657a4591
nextcloud27: remove
Version will be EOL by the end of 2024-06.
2024-06-25 14:08:15 +02:00
Alexander Sieg
32f2e9c950
wg-access-server: add release notes entry 2024-06-25 11:03:02 +02:00
Moritz Sanft
43990c5428
nixos/prometheus: remove minio exporter 2024-06-25 11:00:01 +02:00
Alexander Sieg
369cfec06d
nixos/wg-access-server: init module 2024-06-25 10:59:30 +02:00
Paul Meyer
fbe8538aa1 treewide: remove jonringer as package maintainer
Signed-off-by: Paul Meyer <49727155+katexochen@users.noreply.github.com>
2024-06-25 09:16:56 +02:00
Franz Pletz
e6e4cd92ad
Merge pull request #322211 from NyCodeGHG/update-libvirt
libvirt: 10.0.0 -> 10.4.0, nixos/libvirtd: add ssh proxy option
2024-06-25 05:47:13 +02:00
rewine
9b3299c8cd
Merge pull request #310778 from wineee/dde23
deepin desktop environment: update
2024-06-25 09:52:28 +08:00
Thiago Kenji Okada
30c578e589
Merge pull request #321987 from thiagokokada/rtorrent-add-hardening
nixos/rtorrent: add systemd hardening configuration
2024-06-25 02:34:42 +01:00
Thiago Kenji Okada
406ebf3ad6 nixos/rtorrent: make RuntimeDirectory not world readable 2024-06-24 19:01:17 -03:00
Thiago Kenji Okada
b8cd02c34f nixos/rtorrent: add NixOS tests 2024-06-24 19:01:16 -03:00
Thiago Kenji Okada
33f1e2ece3 nixos/rtorrent: add systemd hardening configuration 2024-06-24 19:01:16 -03:00
Gavin John
8dcb12dee3 services/localtimed: Add package and geoclue2Package options 2024-06-24 14:36:26 -05:00
Will Fancher
2893f56de0
Merge pull request #319359 from misuzu/clevis-zfs-fix
nixos/clevis: add support for parent encrypted zfs datasets
2024-06-24 14:47:55 -04:00
Felix Bühler
e1f89770af
Merge pull request #302909 from Stunkymonkey/vagrant-guest-install-chmod
nixos/vagrant-guest: prefer 'install' over 'chmod'
2024-06-24 19:47:59 +02:00
Marie Ramlow
35b3707f20 nixos/libvirtd: add ssh proxy option 2024-06-24 17:20:05 +02:00
Artturin
b61e0ff19b nixos/polkit: Add package option
Overlaying polkit results in a lot of rebuilds thus it makes sense to
add a package option.

Assists in using the patch needed to fix https://www.github.com/NixOS/nixpkgs/issues/18012
2024-06-24 17:55:41 +03:00
Bobby Rong
510d7c2239
nixos/cinnamon: Don't ship apps that are not shipped in Mint 22
My reasons following Mint are:

1. Geary signed https://stopthemingmy.app, per request we shouldn't pre-ship it under a themed desktop environment.
   See also b7937b4509

2. Hexchat is still gtk2 and is not maintained anymore, Mint encourages switching to Matrix instead.
   See also https://blog.linuxmint.com/?p=4675 ("Joining the Matrix")
2024-06-24 22:30:18 +08:00
Pol Dellaiera
f95c186eb9
nixos/private-gpt: remove drupol from maintainers 2024-06-24 09:13:15 +02:00
arcnmx
a910bc8146 nixos/keycloak: relax hostname settings assertion
The `hostname-strict` setting enables dynamic hostname resolution.
2024-06-23 19:36:36 -07:00
Yt
6d455fee01
Merge pull request #321828 from Shawn8901/stalwart-spamfilter
stalwart-mail: include pre-defined spam-filter
2024-06-24 00:08:49 +00:00
tomberek
73d924022e
Merge pull request #314917 from christoph-heiss/sourcehut-fix
nixos: sourcehut: fix some binary paths
2024-06-23 18:43:57 -04:00
Franz Pletz
3c033186ee
Merge pull request #316727 from jpds/nixos-tests-prometheus
nixos/prometheus: Revamp tests
2024-06-23 23:05:06 +02:00
Martin Weinelt
242807e0e7
Merge pull request #322011 from kkoniuszy/add-home-assistant-custom-components-spook
home-assistant-custom-components.spook: init at 3.0.1
2024-06-23 22:24:14 +02:00
Martin Weinelt
66adc9c5d1
nixos/tests/home-assistant: test multi-component packages
The spook package includes two separate integrations and the module was
adapted to account for that scenario. Add a test to ensure the changed
keeps working correctly going forward.
2024-06-23 22:09:00 +02:00
Kacper Koniuszy
7b81a213cf nixos/home-assistant: fix symlinking multi-manifest custom components
frenck/spook includes a second manifest for an integration. The current
copyCustomComponents script assumed that only one component directory
will be found, which in this case resulted in a malformed symlink
destination:

lrwxrwxrwx 1 hass hass 224 Jun 23 17:23 spook -> '/nix/store/r41ics22zs578avzqf7x86plcgn2q71h-python3.12-frenck-spook-v3.0.1/custom_components/spook/integrations/spook_inverse'$'\n''/nix/store/r41ics22zs578avzqf7x86plcgn2q71h-python3.12-frenck-spook-v3.0.1/custom_components/spook'
2024-06-23 22:03:37 +02:00
Mathew Polzin
88d934879a nixos/services.kubernetes.kubelet: handle non-lower case characters in hostname 2024-06-23 14:06:42 -05:00
Shawn8901
ac961ac498 nixos/stalwart-mail: set pre-defined spam-filter rules 2024-06-23 21:01:14 +02:00
Maximilian Bosch
2ac989c06f
Merge pull request #321931 from Ma27/occ-improvements
nixos/nextcloud: occ improvements
2024-06-23 17:42:42 +00:00
Artturin
2cfac74be5
Merge pull request #319139 from NyCodeGHG/android-ndks
android-ndks: add 25, 26 ndks, update default ndk and sdk
2024-06-23 20:39:28 +03:00
Artturin
f575ce82ff
Merge pull request #321711 from alois31/nix-2.18.3
nixVersions.nix_2_18: 2.18.2 -> 2.18.3
2024-06-23 20:36:31 +03:00
Niklas Hambüchen
65378f632a
Merge pull request #321966 from nh2/libe57format-3.1.1
libe57format: 2.2.0 -> 3.1.1
2024-06-23 19:00:23 +02:00
rewine
8e793b457a deepin.nix: update 2024-06-24 00:26:00 +08:00
rewine
6ce4843893 nixos/modules: init deepin-anything 2024-06-24 00:25:56 +08:00
Niklas Hambüchen
dbbaf02a9c release-notes: Mention libe57format upgrade 2024-06-23 16:18:56 +00:00
Jörg Thalheim
04efc006a4 etc.overlay: fix cross-build 2024-06-23 17:31:03 +02:00
Ryze
10962c7ca2
nixos/zerotierone: fix default value for localConf 2024-06-23 18:10:59 +03:00
Artturin
ef00c78e0d
nixos/jenkins: add RuntimeDirectory
Necessary for jenkins socket which has to be enabled with

`JENKINS_UNIX_DOMAIN_PATH=/run/jenkins/jenkins.socket`

in `services.jenkins.environment`

https://www.github.com/jenkinsci/packaging/issues/455
2024-06-23 18:00:35 +03:00
Francesco Gazzetta
20a73ab51d nixos/smartd: add systembus-notify notifications 2024-06-23 16:56:54 +02:00
K900
fd7e20b819
Merge pull request #321944 from K900/allow-null-password
nixos/plasma6: allow null password for screen lock
2024-06-23 17:52:53 +03:00
Masum Reza
be54c7d931
Merge pull request #320737 from Reputable2772/path-priority
nixos/hyprland: set path order for systemd user services
2024-06-23 19:49:48 +05:30
Bobby Rong
e68b4241db
Merge pull request #321939 from bobby285271/upd/xfce-pa
nixos/xfce: Install xfce4-pulseaudio-plugin when services.pipewire.pulse is enabled
2024-06-23 21:04:10 +08:00
Yt
a3530eabd7
Merge pull request #321936 from pacien/nixos-stalwart-remove-queue-report-path
nixos/stalwart-mail: remove deprecated {queue,report}.path settings
2024-06-23 11:39:39 +00:00
Jörg Thalheim
2654628f2c
Merge pull request #319238 from Mic92/digital-ocean
make-disk-image: fix build for systems that use boot.loader.grub.devices
2024-06-23 13:28:50 +02:00
K900
cc5ee2d621 nixos/plasma6: allow null password for screen lock
This was fixed and we missed it, I think?
2024-06-23 14:01:49 +03:00
Bobby Rong
387810bb17
nixos/xfce: Install xfce4-pulseaudio-plugin when services.pipewire.pulse is enabled
I think most users will really need it for the media keys.
2024-06-23 18:03:47 +08:00
euxane
8daa31600a nixos/stalwart-mail: remove deprecated {queue,report}.path settings
Since stalwart-mail 0.6.0, queue and report files are located in
the shared `storage.{data,blob}` stores. The `{queue,report}.path`
settings no longer had any effect since then.

I'm also removing the creation of the associated extra directories
in the `preStart` script. This should not cause any issue with old
setups since 0.6.0 was already packaged when 24.05 was released.
2024-06-23 11:47:12 +02:00
Jeremy Baxter
923a86602e nixos/oink: wait for network.target 2024-06-23 21:34:40 +12:00
Pol Dellaiera
420c9a60c0
Merge pull request #321664 from abysssol/ollama-override-gfx
nixos/ollama: add option for `HSA_OVERRIDE_GFX_VERSION`
2024-06-23 11:02:57 +02:00
Gooxey
d3140c11a5 nixos/antennas: removed WorkingDirectory setting
Antennas could not start because the specifed directory did not exist
2024-06-23 09:23:42 +02:00
Yt
12cdce24bb
Merge pull request #317239 from pacien/nixos-stalwart-no-dynamic-user-release-log
doc/release-notes: migration note for stalwart-mail user
2024-06-23 01:13:30 +00:00
Bruno BELANYI
9caa682281
Merge pull request #262892 from l0b0/test/tandoor-script-name 2024-06-22 23:23:35 +01:00
Doron Behar
9c7e7d8f18
Merge pull request #258058 from doronbehar/pkg/transmission_4
transmission: sent a warning and alias it to transmission_3
2024-06-23 00:07:37 +03:00
Masum Reza
6498422050
Merge pull request #191698 from ShamrockLee/clang-tools-python
clang-tools: move into llvmPackages
2024-06-23 02:26:27 +05:30
Pol Dellaiera
5dad22a889
Merge pull request #321673 from juselius/fix-service-restart-certmgr
nixos/kubernetes: fix service reload to restart
2024-06-22 22:56:12 +02:00
Yueh-Shun Li
657517056c
clang-tools: add release note entry about moving into llvmPackages
Add 24.11 release note entry about moving clang-tools into llvmPackages
and making clang-tools_<version> aliases.
2024-06-23 01:35:02 +05:30
euxane
3d10deb7a5 nixos/cgit: fix GIT_PROJECT_ROOT ownership
The GIT_PROJECT_ROOT directory is now created at runtime instead of
being assembled at build time.

This fixes ownership issues which prevented those repositories to be
read by users other than root. This also avoids creating symlinks in
the nix store pointing to the outside.
2024-06-22 19:45:25 +02:00
euxane
2d8626bf0a nixos/cgit: configurable user instead of root
This allows running cgit instances using dedicated users instead of
root. This is now set to "cgit" by default.
2024-06-22 19:45:25 +02:00
euxane
51b246a1ac nixos/fcgiwrap: do not run as root by default
Use a dynamic user instead unless one is specified.
2024-06-22 19:45:25 +02:00
euxane
c5dc3e2034 nixos/fcgiwrap: adapt consumer modules and tests 2024-06-22 19:45:25 +02:00
euxane
81f72015f0 nixos/fcgiwrap: add unix socket owner, private by default
This adds a few options to properly set the ownership and permissions
on UNIX local sockets, set to private by default.

Previously, the created UNIX local sockets could be used by any local
user. This was especially problematic when fcgiwrap is running as root
(the default).
2024-06-22 19:45:25 +02:00
euxane
289c1585c2 nixos/fcgiwrap: limit prefork type to positives 2024-06-22 19:45:25 +02:00
euxane
3955eaf450 nixos/fcgiwrap: improve readability of CLI args 2024-06-22 19:45:25 +02:00
euxane
8101ae41f8 nixos/fcgiwrap: adapt consumer modules and tests 2024-06-22 19:45:25 +02:00
euxane
022289f2fa nixos/fcgiwrap: group options logically, fix doc
Since we're already introducing some backward-incompatible change in
the previous commit, let's make the options more tidy, also preparing
for the introduction of more options.

This also fixes the documentation of the user and group options which
are applying to the service's running user, not the socket.
2024-06-22 19:45:25 +02:00
euxane
bf2ad6f48c nixos/fcgiwrap: adapt consumer modules and tests
This also fixes the gitolite-fcgiwrap test by running git through
fcgiwrap as the proper user.
2024-06-22 19:45:25 +02:00
euxane
41419ca288 nixos/fcgiwrap: refactor for multiple instances
This allows configuring and starting independent instances of the
fgciwrap service, each with their own settings and running user,
instead of having to share a global one.

I could not use `mkRenamedOptionModule` on the previous options
because the aliases conflict with `attrsOf submodule` now defined at
`services.fcgiwrap`. This makes this change not backward compatible.
2024-06-22 19:45:15 +02:00
abysssol
42c70e2923 nixos/ollama: add option for HSA_OVERRIDE_GFX_VERSION
There are several GPUs that ROCm doesn't officially support but
will work correctly if ROCm is directed to treat the GPU as a different
one that is supported and has a similar architecture.
This can be done by setting `HSA_OVERRIDE_GFX_VERSION`.
Ollama has documentation on this topic: https://github.com/ollama/ollama/blob/main/docs/gpu.md#amd-radeon
2024-06-22 13:13:08 -04:00