Commit Graph

2357 Commits

Author SHA1 Message Date
Jonas Heinrich
58fcc2db9d
Merge pull request #282339 from marcusramberg/marcus/ollama_listen
nixos/ollama: Add listenAddress
2024-01-21 12:57:53 +01:00
Doron Behar
49e5ffd3a9
Merge pull request #235847 from doronbehar/nixos/taskserver-permissions
nixos/taskserver: Enable cfg.group to read clients' certificates
2024-01-21 09:32:07 +02:00
Marcus Ramberg
8d956b1725 nixos/ollama: Add listenAddress 2024-01-21 00:27:07 +01:00
Janne Heß
e04524a931
nixos/nix-gc: Use singleLineStr where possible 2024-01-20 13:16:39 +01:00
Janne Heß
2315174384
nixos/nix-gc: Add Type so systemctl waits properly 2024-01-20 13:15:20 +01:00
Janne Heß
fd8727163d
nixos/nix-gc: Drop with lib; 2024-01-20 13:14:57 +01:00
Lin Jian
9e98fce0c5
Merge pull request #281654 from SuperSandro2000/portunus-restart
nixos/portunus: restart on failure
2024-01-20 09:17:18 +08:00
Peder Bergebakken Sundt
31ff0dfe49
Merge pull request #273024 from melvyn2/patch-1
nixos/sshServe: use bash as default shell for nix-ssh user
2024-01-19 22:26:44 +01:00
Sandro
5897d4eb0d
nixos/portunus: remove superfluous explicit out
Co-authored-by: Lin Jian <me@linj.tech>
2024-01-19 11:58:07 +01:00
Sandro Jäckel
fd199bdc5b
nixos/portunus: add seedSettings option 2024-01-19 11:57:01 +01:00
Jade Lovelace
fe474ed61a nixos: fix remaining services for network-online dep fix 2024-01-19 00:11:34 -08:00
Jade Lovelace
6c5ab28fce nixos: fix a bunch of services missing dep on network-online.target
This was done by generating a truly hilarious configuration:

rg 'services\.[^.]+\.enable\t' opts-tags | cut -f1 > allonconfig.nix

The following were not tested due to other evaluation errors. They
should probably be manually audited.
services.amule
services.castopod
services.ceph
services.chatgpt-retrieval-plugin
services.clamsmtp
services.clight
services.dante
services.dex
services.discourse
services.dwm-status
services.engelsystem
services.foundationdb
services.frigate
services.frp
services.grocy
services.guacamole-client
services.hedgedoc
services.home-assistant
services.honk
services.imaginary
services.jitsi-meet
services.kerberos_server
services.limesurvey
services.mastodon
services.mediawiki
services.mobilizon
services.moodle
services.mosquitto
services.nextcloud
services.nullmailer
services.patroni
services.pfix-srsd
services.pgpkeyserver-lite
services.postfixadmin
services.roundcube
services.schleuder
services.self-deploy
services.slskd
services.spacecookie
services.statsd
services.step-ca
services.sympa
services.tsmBackup
services.vdirsyncer
services.vikunja
services.yandex-disk
services.zabbixWeb
2024-01-19 00:11:34 -08:00
Jade Lovelace
80edf319fe nixos/paperless: fix network-online.target dependencies 2024-01-18 16:28:41 -08:00
Bernardo Meurer
a09b1c12fb
nixos/moonraker: don't warn about harmless update_manager settings
The only setting we care to warn about is `enable_system_updates`,
there's no reason to issue warnings when folks set, for example,
`enable_auto_refresh`.
2024-01-18 13:52:50 -05:00
Sandro Jäckel
f154807e93
nixos/portunus: restart on failure 2024-01-18 01:01:30 +01:00
Doron Behar
ead172880f nixos/taskserver: Enable cfg.group to read clients' certificates
This enables the services.taskserver.group to read the certificates
generated by the taskserver.service' preStart script.
2024-01-16 13:09:41 +02:00
Yt
827bd96b2b
Merge pull request #280005 from digtail/2024-01-09-ntfy-sh-dynamic-user
nixos/ntfy-sh: clean up DynamicUser workarounds
2024-01-12 23:39:25 +01:00
Yureka
1a1c53c271
Revert "nixos/gitlab: Add CI database connection for >=15.9" (#280395) 2024-01-12 02:03:23 +01:00
Yureka
29bc446b5c
Revert "nixos/gitlab: fix database config when no passwordfile is defined" (#280392) 2024-01-12 02:00:49 +01:00
Tom Siewert
890ffaa1ae nixos/gitlab: fix database config when no passwordfile is defined
In commit 41ca9c1, the database config got an additional config entry
for a separate CI database connection [1]. Unfortunately, the main connection
must always be the first entry. The fix for this was only applied when
databasePasswordFile has been set.

This commit fixes the order of the config for deployments without a databasePasswordFile.

[1] https://docs.gitlab.com/ee/update/deprecations.html#single-database-connection-is-deprecated
2024-01-10 14:35:57 +01:00
digital
39fd0c3fe3 nixos/ntfy-sh: clean up DynamicUser workarounds
this commit removes the static assignments for the ntfy-sh user and
group. furthermore, it removes some tmpfiles.d rules which where
initially put in place by https://github.com/NixOS/nixpkgs/pull/234811.
these are however not required, as ntfy-sh will automatically create the
required files and systemd automatically handles the migration process.

A nixosTest is added to demonstrate that the migration is working
reliably.

This also fixes an issue with where systemd would sometimes not start
ntfy-sh. The tmpfiles rules in combination with impermanence caused `/
var/lib/ntfy-sh` to be a directory when it should have been a symlink.
2024-01-10 00:15:50 +01:00
Tom Siewert
838a2b54ed nixos/gitlab: Add CI database connection for >=15.9
Starting with GitLab 15.9, single connections were deprecated [1] and
will be removed in GitLab 17.0.

[1] https://docs.gitlab.com/ee/update/deprecations.html#single-database-connection-is-deprecated
2024-01-08 18:14:06 +01:00
Alex Martens
d8bb8a6417 nixos/llama-cpp: init 2024-01-06 10:42:55 -08:00
nu-nu-ko
e1a9d1bfcb maintainers: add nu-nu-ko 2024-01-05 12:47:15 +13:00
Sandro Jäckel
7c1b4b22f9
nixos/paperless: convert extraConfig to freeform type
Co-authored-by: Atemu <atemu.main@gmail.com>
2024-01-04 00:04:38 +01:00
Tomas Antonio Lopez
147cc4061e nixos/sourcehut: ensure that the repos directory exists
Fixes a bug where, if the OpenSSH server starts before the first initialization
of the git service, the SSH service fails to find the corresponding bind mount
and terminates with a 226/NAMESPACE error.
2024-01-04 00:00:32 +01:00
Weijia Wang
3526f2ffec
Merge pull request #274192 from foo-dogsquared/nixos-guix-add-guix-home-support
nixos/guix: add Guix home support
2024-01-03 01:28:11 +01:00
Mario Rodas
7f0a64976d
Merge pull request #270286 from ajs124/ruby_ossl11_cleanup
ruby_2_7: remove
2024-01-02 18:37:18 -05:00
Nick Cao
f6a028db30
Merge pull request #276808 from SuperSandro2000/portunus-cookie-secure
nixos/portunus: make sure the cookies are only send over https if it …
2024-01-02 16:54:37 -05:00
ajs124
02ad3159b0 ruby_2_7: remove 2024-01-02 15:30:06 +01:00
Jonas Heinrich
b06d3c3aa6
Merge pull request #277442 from onny/ollama
nixos/ollama: init
2023-12-29 23:00:10 +01:00
Jonas Heinrich
67a799c40f nixos/ollama: init 2023-12-29 15:19:55 +01:00
Stefan Majewsky
9ecbdfb5bd portunus: 1.1.0 -> 2.0.0
Changelog: <https://github.com/majewsky/portunus/releases/tag/v2.0.0>
2023-12-27 18:30:32 +01:00
Sandro Jäckel
64b6b5e787
nixos/portunus: make sure the cookies are only send over https if it is enabled 2023-12-26 00:27:32 +01:00
Weijia Wang
e520c76913
Merge pull request #275831 from foo-dogsquared/nixos-guix-socket-activation-fix
nixos/guix: fix systemd socket unit
2023-12-25 10:54:30 +01:00
Gabriel Arazas
d3e246f9fa
nixos/guix: fix systemd socket unit 2023-12-21 22:18:56 +08:00
Raghav Sood
7d97d9ebd1
Merge pull request #275439 from RaghavSood/nitter/guest-accounts
nitter: unstable-2023-10-31 -> unstable-2023-12-03 (guest accounts support)
2023-12-21 14:03:35 +08:00
Maximilian Bosch
571f06ad0d
Merge pull request #270260 from SuperSandro2000/gitea-camo-hmac
nixos/gitea: add hmacKey support
2023-12-20 19:02:20 +01:00
Gabriel Arazas
b7ece537bb
nixos/guix: fix conditional linking of profiles 2023-12-20 22:04:01 +08:00
Raghav Sood
2595f503cd
nitter: add guest account support to systemd service 2023-12-20 00:01:20 +08:00
K900
e42d80fa6d
Merge pull request #274818 from eyJhb/moonraker-new-config-filemanager
moonraker: add setting file_manager.check_klipper_config_path
2023-12-19 17:36:54 +03:00
eyjhb
0fc323eeef
moonraker: disable check_klipper_config if klipper is immutable 2023-12-19 15:36:01 +01:00
Sandro Jäckel
1ebb7d7bba
nixos/gitea: add hmacKey support 2023-12-18 23:44:24 +01:00
Pierre Bourdon
91a00709ae
Merge pull request #273219 from Lurkki14/tuxclocker-master
tuxclocker: init at 1.4.0
2023-12-17 17:30:18 +01:00
Jussi Kuokkanen
60cb6ee94f nixos/tuxclocker: init module 2023-12-17 18:16:45 +02:00
Gabriel Arazas
a73ae4bf9f
nixos/guix: add Guix home support 2023-12-14 17:41:22 +08:00
Gabriel Arazas
5fb40a5816
nixos/guix: remove Service.MemoryDenyWriteExecute for GC service
Guile 3 uses JIT needing write and execute permissions.
2023-12-12 10:19:37 +08:00
Peder Bergebakken Sundt
e43bbcfaec
Merge pull request #272557 from ambroisie/update-tandoor-recipes
tandoor-recipes: 1.5.6 -> 1.5.10
2023-12-09 03:12:36 +01:00
Melvyn
de12dd74d2
nixos/sshServe: use bash as default shell for nix-ssh user
Using the user-set default shell (which is intended for non-system users) for the nix-ssh user can lead to unpredictable behavior, such as `fish` complaining about the unwritable home directory on every connection. Bash is guaranteed to be available and work as expected, so explicitly use it instead.
2023-12-08 14:01:35 -08:00
Gabriel Arazas
85fcb9b4ef
nixos/guix: fix user activation script 2023-12-08 17:56:54 +08:00
Bruno BELANYI
d23f965f8b nixos/tandoor-recipes: fix deprecated config key
See the 1.5.10 release notes [1].

[1]: https://github.com/TandoorRecipes/recipes/releases/tag/1.5.10
2023-12-07 19:12:15 +00:00
Nick Cao
c0443ea94c
Merge pull request #271869 from wentasah/redmine-assertions
nixos/redmine: Fix database assertions
2023-12-04 08:56:45 -05:00
Michal Sojka
8667baf161 nixos/redmine: Fix database assertions
Recent PR 266270[1] modified an assertion related to database settings
of the redmine service. There are two problems with that change:

1. Assert message was not updated to reflect the change in the assert
   condition.

2. The new condition applies only to postgresql, not the default
   mysql. Therefore, the assertion breaks existing mysql-based
   installations without any reason.

This commit fixes these by 1) reverting the modified assertion to the
previous value, making the message match the condition and 2) adding a
new assertion that applies only to postgresql.

[1]: https://github.com/NixOS/nixpkgs/pull/266270
2023-12-03 14:41:42 +01:00
Weijia Wang
f5f2b471f3
Merge pull request #271437 from martinetd/ankisyncd-deprecation
ankisyncd: mark module as deprecated
2023-12-03 14:35:57 +01:00
Weijia Wang
4e81387d5b
Merge pull request #264331 from foo-dogsquared/add-nixos-guix-module
nixos/guix: init
2023-12-03 13:03:43 +01:00
LDprg
6f33e6e4ab nixos/preload: fix log permission 2023-12-02 19:19:33 +01:00
Dominique Martinet
8a2c07ba40 ankisyncd: mark module as deprecated 2023-12-01 21:21:35 +09:00
Gabriel Arazas
ad277ea47e nixos/guix: init 2023-12-01 09:10:37 +01:00
Weijia Wang
07183914f1
Merge pull request #257692 from telotortium/anki-sync-server
nixos/anki-sync-server: init
2023-12-01 08:30:36 +01:00
h7x4
79d3d59f58
treewide: replace mkPackageOptionMD with mkPackageOption 2023-11-30 19:03:14 +01:00
Weijia Wang
b474de4779 nixos/anki-sync-server: minor cleanup 2023-11-30 17:32:03 +01:00
Robert Irelan
8fe9c18ed3 nixos/anki-sync-server: init
Provide a NixOS module for the [built-in Anki Sync
Server](https://docs.ankiweb.net/sync-server.html) included in recent
versions of Anki. This supersedes the `ankisyncd` module, but we should
keep that for now because `ankisyncd` supports older versions of Anki
clients than this module.
2023-11-30 17:25:17 +01:00
Weijia Wang
8c734937d6 nixos/sourcehut: fix eval 2023-11-30 02:52:50 +01:00
Weijia Wang
feeae486de
Merge pull request #261702 from h7x4/replace-mkoption-with-mkpackageoption
treewide: use `mkPackageOption`
2023-11-30 02:49:30 +01:00
tomberek
a2de752222
Merge pull request #267538 from nessdoor/pkgs/paste.sr.ht
sourcehut.pastesrht: add missing backend component
2023-11-28 12:40:09 -05:00
Nick Cao
e0ece67a97
Merge pull request #270256 from schmittlauch/gite-forgejo-migration-phrasing
nixos/forgejo docs: correct phrasing
2023-11-27 09:33:21 -05:00
Tomas Antonio Lopez
9e6f9c6d83 nixos/sourcehut: remove usages of 'with lib;'
Inherit library attributes at a finer granularity, instead.
2023-11-27 08:22:48 -03:00
Tomas Antonio Lopez
ba6817ed22 nixos/sourcehut: add myself as maintainer 2023-11-27 08:22:48 -03:00
Tomas Antonio Lopez
087c83f45c nixos/sourcehut: reformat expressions using nixpkgs-fmt 2023-11-27 08:22:48 -03:00
h7x4
0a37316d6c
treewide: use mkPackageOption
This commit replaces a lot of usages of `mkOption` with the package
type, to be `mkPackageOption`, in order to reduce the amount of code.
2023-11-27 01:28:36 +01:00
Trolli Schmittlauch
0e893a9f22 nixos/forgejo docs: correct phrasing 2023-11-26 21:43:32 +01:00
Maciej Krüger
b63af5d7ea
Merge pull request #265728 from nbraud/nixos/sudo-rs/ssm-agent 2023-11-26 21:37:15 +01:00
Lin Jian
5ba42a0de2
Merge pull request #260902 from LDprg/master
preload: init at 0.6.4
2023-11-25 23:29:40 -06:00
LDprg
a0f5d5e500 nixos/preload: init 2023-11-25 20:07:10 +01:00
Robert Hensing
779e50580c
Merge pull request #224611 from srhb/kafka-settings-module
Kafka: Settings and KRaft support
2023-11-23 17:35:29 +01:00
Sarah Brofeldt
cfe3ca1f2f nixos/apache-kafka: Add manual chapter 2023-11-22 06:47:09 +01:00
Sarah Brofeldt
45f84cdfd5 nixos/apache-kafka: structured settings
- Use lazyAttrs (for config references) settings for main server.properties.
- Drop dangerous default for "log.dirs"
- Drop apache-kafka homedir; unused and confusing
- Support formatting kraft logdirs
2023-11-22 06:47:08 +01:00
Mario Rodas
fa14a14694
Merge pull request #258036 from anthonyroussel/fix-ssm-seelog
nixos/amazon-ssm-agent: fix missing seelog.xml file
2023-11-19 18:55:57 -05:00
Nick Cao
d936414252
Merge pull request #268132 from bendlas/forgejo-release-notes
nixos/forgejo/docs: fix typo
2023-11-18 09:39:29 -05:00
emilylange
b3e8dae766 nixos/forgejo: remove postgresql_15 permission work-around
This is no longer necessary as of
ccfe07c316.

Previously: b8585a119c.
2023-11-18 12:14:09 +01:00
Ryan Lahfa
ccfe07c316
Merge pull request #266270 from Ma27/postgresql-ownership-15 2023-11-17 18:02:17 +01:00
Herwig Hochleitner
8c441fc2a7 nixos/forgejo/docs: fix typo 2023-11-17 17:18:57 +01:00
Herwig Hochleitner
20832d5995
nixos/forgejo: changelog and migration instructions (#267248)
* nixos/forgejo: changelog and migration instructions

* nixos/forgejo/docs: clarify sentence

Co-authored-by: Trolli Schmittlauch <schmittlauch@users.noreply.github.com>

* nixos/forgejo/docs: document migration via gitea impersonation

* nixos/forgejo/docs: note about url change on migration

* nixos/forgejo/docs: note about migration (non-)requirement

* nixos/forgejo/docs: header ids

* nixos/forgejo/docs: clarify release notes entry

Co-authored-by: Emily <git@emilylange.de>

* nixos/forgejo/docs: improve manual entry

Co-authored-by: Emily <git@emilylange.de>

* nixos/forgejo/docs: move changelog line to the middle of the section

as noted <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->

---------

Co-authored-by: Trolli Schmittlauch <schmittlauch@users.noreply.github.com>
Co-authored-by: Emily <git@emilylange.de>
2023-11-17 15:55:24 +01:00
Raito Bezarius
7cd63bff21 nixos/sourcehut: do not use ensureDBOwnership
Given that SourceHut uses unfortunate defaults for database name, it will not
be realistic to fix this in time for 23.11.

We will leave the workaround and leave it to SourceHut maintainers to pick up the work
to clean this up after 23.11.
2023-11-17 15:52:51 +01:00
zzywysm
3f4c802d26 initrd/autofs4: remove legacy references to autofs4 kernel module
Back in 2018, the kernel decided to remove the autofs4 module.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2225d931f75ddd3c39f4d0d195fad99dfd68671

This caused immediate problems with systemd, so the kernel allowed autofs4 as a config option that would simply map back to autofs.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d02d21ea007b6b33cdaf15c2f84fb1fea996ecc2

Earlier this year, in July 2023, the kernel got tired of people not adapting to the autofs change, and forced the issue by fixing it within the kernel defconfigs, which NixOS uses as a starting point for their own kernel configs.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f2190d6b7112d22d3f8dfeca16a2f6a2f51444e

This commit reflects the post-2018 reality by changing the remaining autofs4 references to autofs. Since this change initially happened in kernel 4.18 and we no longer support 4.x kernels, we don't need any backwards-compatibility tweaks.
2023-11-14 15:37:50 -05:00
Tomas Antonio Lopez
5476b490d4 nixos/sourcehut: compile and integrate paste.sr.ht API component 2023-11-14 11:12:14 +01:00
Maximilian Bosch
48459567ae nixos/postgresql: drop ensurePermissions, fix ensureUsers for postgresql15
Closes #216989

First of all, a bit of context: in PostgreSQL, newly created users don't
have the CREATE privilege on the public schema of a database even with
`ALL PRIVILEGES` granted via `ensurePermissions` which is how most of
the DB users are currently set up "declaratively"[1]. This means e.g. a
freshly deployed Nextcloud service will break early because Nextcloud
itself cannot CREATE any tables in the public schema anymore.

The other issue here is that `ensurePermissions` is a mere hack. It's
effectively a mixture of SQL code (e.g. `DATABASE foo` is relying on how
a value is substituted in a query. You'd have to parse a subset of SQL
to actually know which object are permissions granted to for a user).

After analyzing the existing modules I realized that in every case with
a single exception[2] the UNIX system user is equal to the db user is
equal to the db name and I don't see a compelling reason why people
would change that in 99% of the cases. In fact, some modules would even
break if you'd change that because the declarations of the system user &
the db user are mixed up[3].

So I decided to go with something new which restricts the ways to use
`ensure*` options rather than expanding those[4]. Effectively this means
that

* The DB user _must_ be equal to the DB name.
* Permissions are granted via `ensureDBOwnerhip` for an attribute-set in
  `ensureUsers`. That way, the user is actually the owner and can
  perform `CREATE`.
* For such a postgres user, a database must be declared in
  `ensureDatabases`.

For anything else, a custom state management should be implemented. This
can either be `initialScript`, doing it manual, outside of the module or
by implementing proper state management for postgresql[5], but the
current state of `ensure*` isn't even declarative, but a convergent tool
which is what Nix actually claims to _not_ do.

Regarding existing setups: there are effectively two options:

* Leave everything as-is (assuming that system user == db user == db
  name): then the DB user will automatically become the DB owner and
  everything else stays the same.

* Drop the `createDatabase = true;` declarations: nothing will change
  because a removal of `ensure*` statements is ignored, so it doesn't
  matter at all whether this option is kept after the first deploy (and
  later on you'd usually restore from backups anyways).

  The DB user isn't the owner of the DB then, but for an existing setup
  this is irrelevant because CREATE on the public schema isn't revoked
  from existing users (only not granted for new users).

[1] not really declarative though because removals of these statements
    are simply ignored for instance: https://github.com/NixOS/nixpkgs/issues/206467
[2] `services.invidious`: I removed the `ensure*` part temporarily
    because it IMHO falls into the category "manage the state on your
    own" (see the commit message). See also
    https://github.com/NixOS/nixpkgs/pull/265857
[3] e.g. roundcube had `"DATABASE ${cfg.database.username}" = "ALL PRIVILEGES";`
[4] As opposed to other changes that are considered a potential fix, but
    also add more things like collation for DBs or passwords that are
    _never_ touched again when changing those.
[5] As suggested in e.g. https://github.com/NixOS/nixpkgs/issues/206467
2023-11-13 17:16:25 +01:00
dadada
f192930a79
nixos/soft-serve: fix typos in option descriptions 2023-11-12 22:34:54 +01:00
tomberek
7859adb9d6
Merge pull request #245394 from christoph-heiss/pkgs/sourcehut
sourcehut: update all component; lots of fixes
2023-11-11 13:42:19 -05:00
Christoph Heiss
88a3d2a0b4
sourcehut: fix postgresql database permission for postgresql >= 15
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 15:50:16 +01:00
Christoph Heiss
66b86f8a2e
sourcehut: de-duplicate nginx add_header directives
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 14:14:59 +01:00
Christoph Heiss
acd21dad52
sourcehut: use systemd.tmpfiles instead of manually creating logfiles
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 14:14:59 +01:00
Christoph Heiss
641e54bb28
sourcehut: create logs directory unconditionally
An empty log directory, in case it stays unused, does not hurt anyone.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
fc6addb147
sourcehut: reword api-origin option description
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
78cc2783c8
sourcehut: drop obsolete services array in favor of indivdual enable flags
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
6b25e09d2d
sourcehut: fix up some more bin paths
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
5841d27497
sourcehut: explicitly disallow openssh to socket-active
This breaks the (already fragile) gitsrht-dispatch -> gitsrht-keys
command chain.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
c39ba7f5b1
sourcehut: remove set -x from ssh commands
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:46 +01:00
Christoph Heiss
6648488333
sourcehut: fix logging of git/hg ssh commands
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:45 +01:00
Christoph Heiss
6e51802196
sourcehut: fix repos path by using actual settings value
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:32 +01:00
Christoph Heiss
c123a37be6
sourcehut.gitsrht: 0.78.20 -> 0.84.2
Newer version of the gitsrht-api service call setrlimit() on startup,
thus allow it in the `SystemCallFilter` definition for the service.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:30 +01:00
Christoph Heiss
d703173520
sourcehut: make /query endpoint config common to all services
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 12:39:28 +01:00
Anthony Roussel
e30f48be94
treewide: fix redirected and broken URLs
Using the script in maintainers/scripts/update-redirected-urls.sh
2023-11-11 10:49:01 +01:00
Anthony Roussel
3dd50eaa8f
nixos/amazon-ssm-agent: fix missing seelog.xml file 2023-11-09 12:02:48 +01:00
nicoo
690f027251 nixos/ssm-agent: Handle sudo-rs too 2023-11-05 20:49:41 +00:00
Martin Weinelt
05e8361387
Merge pull request #261867 from matrss/set-paperless-secret-key
nixos/paperless: set PAPERLESS_SECRET_KEY
2023-11-01 12:33:23 +01:00
arcnmx
0711d3d69b xmrig: add meta.mainProgram
See #246386
2023-10-28 11:21:57 -07:00
Matthias Riße
63ef033992 nixos/paperless: set PAPERLESS_SECRET_KEY
If the PAPERLESS_SECRET_KEY environment variable is left unset
paperless-ngx defaults to a well-known value, which is insecure.

Co-authored-by: Erik Arvstedt <erik.arvstedt@gmail.com>
2023-10-27 21:11:01 +02:00
Mario Rodas
84a877ed30
Merge pull request #261722 from anthonyroussel/ssm-agent-rename
amazon-ssm-agent: rename from ssm-agent
2023-10-25 04:18:24 -05:00
emilylange
402b5c67a8
nixos/forgejo: pass {env}GIT_PROTOCOL via ssh to forgejo
when using the host's openssh service (not the builtin golang one).

This enables the use of the much faster and more efficient wire protocol
version 2.
See https://git-scm.com/docs/protocol-v2
2023-10-24 03:27:20 +02:00
Anthony Roussel
ccf080ee05
amazon-ssm-agent: rename from ssm-agent 2023-10-22 22:04:09 +02:00
Emily
a61c6b478d
Merge pull request #262741 from emilylange/nixos-forgejo-postgres15
nixos/forgejo: work around permissions error on `postgresql_15`
2023-10-22 21:04:41 +02:00
Artturi
b2426befa0
Merge pull request #259784 from dmytrokyrychuk/init-spice-autorandr
spice-autorandr: init at 0.0.2
2023-10-22 18:52:10 +03:00
Dmytro Kyrychuk
d147d7feed nixos/spice-autorandr: init 2023-10-22 13:45:56 +00:00
emilylange
b8585a119c
nixos/forgejo: work around permissions error on postgresql_15
From `postgresql_15`'s release notes:
> PostgreSQL 15 also revokes the CREATE permission from all users except
a database owner from the public (or default) schema.

https://www.postgresql.org/about/news/postgresql-15-released-2526/

This directly affects `services.postgresql.ensureUsers` in NixOS,
leading to
> permission denied for schema public

`postgresql_15` is now the default for stateVersion `23.11`/`unstable`.

So until this is resolved globally, we work around this issue.
2023-10-22 15:25:34 +02:00
Ryan Lahfa
efccbbab5b
Merge pull request #258994 from lorenzleutgeb/msr
nixos/hardware/cpu/x86/msr: init
2023-10-22 10:24:12 +01:00
Lin Jian
c132df63df
Merge pull request #250792 from ckiee/init-rkvm
{,nixos/}rkvm: init
2023-10-22 17:11:12 +08:00
Lorenz Leutgeb
84803308bf nixos/xmrig: Use hardware.cpu.x86.msr 2023-10-22 09:41:00 +02:00
dadada
77f7b5a3e5
nixos/soft-serve: init
This adds a NixOS module for Soft Serve, a tasty, self-hostable Git
server for the command line. The module has a test that checks some
basic things like creating users, creating a repo and cloning it.

Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2023-10-21 17:51:42 +02:00
Dmitry Kalinkin
6392f18258
Merge pull request #262351 from h7x4/remove-nix-exec-bits
treewide: remove execute bit for non-executable `*.nix` files
2023-10-20 14:45:16 -04:00
h7x4
e6321d2788
treewide: remove execute bit for non-executable *.nix files 2023-10-20 19:55:39 +02:00
Bjørn Forsman
142074c2a8 nixos: fix bad mkEnableOption descriptions
Fix descriptions that don't account for (1) the "Whether to enable"
prefix or (2) the automatically added trailing dot.
2023-10-20 16:22:40 +01:00
ckie
f3ad4def37
nixos/rkvm: init
Co-authored-by: Lin Jian <me@linj.tech>
2023-10-18 06:21:40 +03:00
Atemu
16fb0b365d
Merge pull request #259056 from leona-ya/nixos-paperless-systemd-254
nixos/paperless: fix start with latest systemd
2023-10-11 13:15:24 +02:00
Sarah Brofeldt
9b73af9b27
Merge pull request #259498 from TLATER/tlater/gitea-metrics
gitea: Add option to supply the metrics token via file
2023-10-08 07:53:33 +02:00
Tristan Daniël Maat
b59e5a34e7
nixos/gitea: Add option to supply the metrics token via file 2023-10-07 21:53:02 +02:00
K900
d4eca0e8bb nixos/gollum: remove non-existent maintainer 2023-10-06 23:52:42 +03:00
Lin Jian
de26e61f7e
Merge pull request #258582 from returntoreality/gpsd-extra-args
nixos/gpsd: add extraArgs option
2023-10-06 22:54:51 +08:00
Leona Maroni
6249a0983d
nixos/paperless: fix start with latest systemd 2023-10-05 12:56:37 +02:00
Linus Karl
342cc761df nixos/gpsd: add extraArgs option
Allows setting addtional arguments to gpsd
2023-10-02 15:10:12 +02:00
Cabia Rangris
6f7933059d
Merge pull request #237404 from cab404/cab/moonraker-gpiod
moonraker: add useGpiod
2023-10-02 06:45:16 +04:00
Vladimir Serov
5edabf7c0b
moonraker: add useGpiod 2023-10-02 06:09:58 +04:00
Mario Rodas
fbf686309f
Merge pull request #256725 from trofi/modules-xmr-stak-cudaSupport-removal
modules/xmr-stak: drop broken cudaSupport option
2023-09-29 06:13:19 -05:00
Sander van der Burg
32c36780d1 dysnomia: 0.10.1 -> 0.10.2 2023-09-27 18:35:30 +02:00
Sergei Trofimovich
e57034f9a7 modules/xmr-stak: drop broken cudaSupport option
Tanvir Ahmed T. reports that `services.xmr-stak.enable = true;` shows
that `23.05` ships broken `xmr-stak` module:

    error: function 'anonymous lambda' called with unexpected argument 'cudaSupport'

I broke it when I removed `cudaSupport` flag in
    a5ce71d4e8

I'm just removing the option without an attempt to supply the stub as
module was already broken on `23.05` release. There are probably no
users of `xmr-stak` module by now.

Closes: https://github.com/NixOS/nixpkgs/issues/256703
2023-09-22 17:40:04 +01:00
bb2020
5caa82281e nixos/mbpfan: adjust defaults 2023-09-20 16:10:26 +03:00
Fabián Heredia Montiel
f8056c5007
Merge pull request #255145 from BuonHobo/patch-1
jellyfin: Start service after network is up
2023-09-16 12:00:21 -06:00
Alex
ec9009f8e4
Jellyfin service starts after network-online.target
To those who use Jellyfin's DLNA server, it can happen that the DLNA server starts before we are connected to the LAN.

When this happens, Jellyfin only publishes the DLNA server on the local ports and is not discoverable by devices in the LAN.

In order to fix this, I'm ensuring that Jellyfin starts after we are connected to the network, making it properly discoverable by DLNA clients.

After making this change, Jellyfin's DLNA server is now working as expected on my machine. It used to be consistently undiscoverable.

I verified that this doesn't break anything in situations where the LAN is not available: I disconnected my laptop from the network and rebooted it and Jellyfin started as expected.

This change was informed by reading the suggestion in this article: https://www.freedesktop.org/wiki/Software/systemd/NetworkTarget/
2023-09-14 18:31:22 +02:00
happysalada
1e335c516b nixos/cfdyndns: dynamic user and loadcredentials 2023-09-14 07:53:36 +00:00
Herwig Hochleitner
30bcc6c39d
Merge pull request #248310 from emilylange/nixos/gitea-forgejo-split
nixos/forgejo: fork from nixos/gitea (split)

close https://github.com/NixOS/nixpkgs/issues/244866
2023-09-12 22:10:01 +02:00
Timothy DeHerrera
69bfaafc9d nixos/cfdyndns: add option to use CF token 2023-09-09 12:20:14 +00:00
Yaya
1a22627603 nixos/gitlab: Add a warning message
GitLab instances created or updated between versions [15.11.0, 15.11.2]
have an incorrect database schema. [1] This will become a problem once
upgrading GitLab to >=16.2.0.

A workaround can be found in the GitLab docs: [2]

[1]: https://gitlab.com/gitlab-org/gitlab/-/issues/408835
[2]: https://docs.gitlab.com/ee/update/versions/gitlab_16_changes.html#undefined-column-error-upgrading-to-162-or-later
2023-09-05 13:46:44 +02:00
ajs124
97dfc365e6 gitlab: 16.1.4 -> 16.3.1
https://gitlab.com/gitlab-org/gitlab/-/blob/v16.3.1-ee/CHANGELOG.md

Fixes CVE-2022-4343
Fixes CVE-2023-0120
Fixes CVE-2023-1279
Fixes CVE-2023-1555
Fixes CVE-2023-3205
Fixes CVE-2023-3915
Fixes CVE-2023-3950
Fixes CVE-2023-4018
Fixes CVE-2023-4378
Fixes CVE-2023-4630
Fixes CVE-2023-4638
Fixes CVE-2023-4647

Co-Authored-By: Yaya <github@uwu.is>
2023-09-05 13:46:44 +02:00
Morgan Helton
147d81d155 nixos/atuin: fix enable option typo 2023-09-05 08:34:34 +02:00
Leona Maroni
87f21ac4e6
nixos/paperless: allow systemd services to read ca-certificates
This fixes a regression introduced with the update to 1.17.0.
Since this version paperless-ngx checks the ssl certificates of remote
email servers.
2023-08-25 16:54:04 +02:00
LёNya
54f5045571 nixos/zoneminder: replace lib.optional with lib.optionals to make module work 2023-08-13 22:32:42 +03:00
Florian Praden
490ec79ac3
nixos/gitea: bugfix for gitea-dump service.
Missing custom directory setup in gitea-dump service. Adding environment variable in gitea-dump service definition.
2023-08-09 11:53:18 +02:00
emilylange
8d374cebcd
nixos/forgejo: init
Following a decicion from both the gitea and forgejo maintainers in
nixpkgs.
This means, that forgejo will no longer co-use the nixos/gitea module
via `services.gitea.package = pkgs.forgejo`.
2023-08-06 18:40:02 +02:00
Gregor Godbersen
3d9a6399a1 nixos/paperless: set default thumbnail font
The upstream default for the thumbnail font is set to "Liberation Serif
Regular" located at /usr/share/fonts which is inaccessible under nix.
(2a2bf3bf55/src/paperless/settings.py (L894))

Paperless throws an error when parsing plaintext files without a valid
font. This change sets a nix default using the liberation_ttf package.
2023-08-05 22:06:27 +02:00
Maximilian Bosch
ed02e79bbe
Merge pull request #241497 from bendlas/prepare-gitea-120
nixos/gitea: add WORK_PATH to config, fix 1.20
2023-08-04 18:50:09 +02:00