Commit Graph

17602 Commits

Author SHA1 Message Date
Yarny0
3fb29fecd5 nixos/tsm-client: use freeformType for server config
`tsm-client` uses a global configuration
file that must contain coordinates for each
server that it is supposed to contact.
This configuration consists of text
lines with key-value pairs.

In the NixOS module, these servers may be declared
with an attribute set, where the attribute name
defines an alias for the server, and the value
is again an attribute set with the settings for
the respective server.
This is organized as an option of type `attrsOf submodule...`.

Before this commit:

Important settings have their own option within
the submodule.  For everything else, there is
the "catch-all" option `extraConfig` that may
be used to declare any key-value pairs.
There is also `text` that can be used to
add arbitrary text to each server's
section in the global config file.

After this commit:

`extraConfig` and `text` are gone,
the attribute names and values of each server's attribute
set are translated directly into key-value pairs,
with the following notable rules:

* Lists are translated into multiple lines
  with the same key, as such is permitted by
  the software for certain keys.
* `null` may be used to override/shadow a value that
  is defined elsewhere and hides the corresponding key.

Those "important settings" that have previously been
defined as dedicated options are still defined as such,
but they have been renamed to match their
corresponding key names in the configuration file.
There is a notable exception:
"Our" boolean option `genPasswd` influences the "real"
option `passwordaccess', but the latter one is
uncomfortable to use and might lead
to undesirable outcome if used the wrong way.
So it seems advisable to keep the boolean option
and the warning in its description.
To this end, the value of `getPasswd` itself is
later filtered out when the config file is generated.

The tsm-backup service module and the vm test are adapted.

Migration code will be added in a separate
commit to permit easy reversal later, when the
migration code is no longer deemed necessary.
2023-12-02 09:09:27 +01:00
Yarny0
d5f337809e nixos/backup/tsm: use lib.getExe' for service command line 2023-12-02 09:05:45 +01:00
Yarny0
cec6d7f51a nixos/tsm*: update product name and URLs
With the tsm-client 8.1.19.0 release,
IBM renamed the product brand from
"IBM Spectrum Protect" to "IBM Storage Protect":
https://www.ibm.com/support/pages/node/6964770 .

The package already got updated in commits
5ff5b2ae4c and
a4b7a62532 .

The commit at hand updates the modules accordingly.
2023-12-02 09:05:45 +01:00
Bobby Rong
9247bdfce7
nixos/cinnamon: switch to xdg.portal.configPackages
This will make sure the config is in sync with upstream.
2023-12-02 12:12:48 +08:00
Emily Trau
54ba768be8
Merge pull request #271164 from helsinki-systems/feat/netbox-gunicorn
netbox: Inherit gunicorn from the package
2023-12-02 13:37:33 +11:00
Sefa Eyeoglu
c1f0be0373 nixos/postgresqlBackup: add Scrumplex as maintainer
Signed-off-by: Sefa Eyeoglu <contact@scrumplex.net>
2023-12-01 19:08:31 +01:00
Sefa Eyeoglu
0aaf428fde nixos/postgresqlBackup: add --rsyncable to compression programs
The --rsyncable option changes the behavior of gzip/zstd so that the
resulting files can be incrementally backed up easily. Tools like Borg,
rsync and xdelta can make use their deduplication/diff mechanisms more
easily.

In my local testing, this resulted in a 2% size increase for backup
files.

Signed-off-by: Sefa Eyeoglu <contact@scrumplex.net>
2023-12-01 19:08:31 +01:00
Dominique Martinet
8a2c07ba40 ankisyncd: mark module as deprecated 2023-12-01 21:21:35 +09:00
Gabriel Arazas
ad277ea47e nixos/guix: init 2023-12-01 09:10:37 +01:00
Lin Jian
cdc1b4599f
Merge pull request #270096 from slotThe/emacs/192019-2
nixos/emacs: Remove absolute paths from documentation
2023-12-01 01:31:04 -06:00
Weijia Wang
07183914f1
Merge pull request #257692 from telotortium/anki-sync-server
nixos/anki-sync-server: init
2023-12-01 08:30:36 +01:00
Sarah Brofeldt
110828e412
Merge pull request #271243 from shyim/fix-opensearch-boot
nixos/opensearch: check plugins directory exists before checking content
2023-12-01 06:33:50 +01:00
Emily Trau
7edd128431
Merge pull request #266746 from serpent213/patch-2
nixos/roundcube: Ignore newline at end of password file
2023-12-01 15:50:05 +11:00
Mario Rodas
15b5295311
Merge pull request #270847 from anthonyroussel/updates/tomcat_10_1_16
tomcat10: 10.1.15 -> 10.1.16
2023-11-30 22:38:23 -05:00
Silvan Mosberger
54c8a15650
Merge pull request #271247 from h7x4/treewide-mkpackageoptionmd-to-mkpackageoption
treewide: replace `mkPackageOptionMD` with `mkPackageOption`
2023-12-01 02:09:10 +01:00
Franz Pletz
c4b7e013aa
Merge pull request #243834 from LunNova/lunnova/i3-update-session-environment 2023-11-30 20:42:13 +01:00
Peder Bergebakken Sundt
23fb8f614b
Merge pull request #261378 from lamarios/auto-epp
auto-epp: init at 1.2.1
2023-11-30 19:47:12 +01:00
Luflosi
efca3c0329
nixos/teeworlds: reduce closure size
Use `teeworlds-server` instead of `teeworlds`.
We don't need an entire GUI program just to run the server.
2023-11-30 19:26:35 +01:00
Soner Sayakci
87b3a98c36
nixos/opensearch: check plugins directory exists before checking content 2023-11-30 19:09:11 +01:00
h7x4
79d3d59f58
treewide: replace mkPackageOptionMD with mkPackageOption 2023-11-30 19:03:14 +01:00
Weijia Wang
b474de4779 nixos/anki-sync-server: minor cleanup 2023-11-30 17:32:03 +01:00
Robert Irelan
8fe9c18ed3 nixos/anki-sync-server: init
Provide a NixOS module for the [built-in Anki Sync
Server](https://docs.ankiweb.net/sync-server.html) included in recent
versions of Anki. This supersedes the `ankisyncd` module, but we should
keep that for now because `ankisyncd` supports older versions of Anki
clients than this module.
2023-11-30 17:25:17 +01:00
Janne Heß
018175ecab
netbox: Inherit gunicorn from the package
I was using a 23.11 package on a NixOS 23.05 system and this caused the
python that was used in gunicorn to differ from the python the postgres
lib was linked against.
2023-11-30 11:51:37 +01:00
emilylange
9a821ebe0f nixos/jitsi-meet: fix cfg.caddy.enable
This fixes the following error:

```
error: failed processing files:
        FailedJobs(
        "static/404.html": Permission denied (os error 13) at path "/build/static/.tmpRMzDXu"
)
```
2023-11-30 06:13:38 +00:00
Weijia Wang
8c734937d6 nixos/sourcehut: fix eval 2023-11-30 02:52:50 +01:00
Weijia Wang
feeae486de
Merge pull request #261702 from h7x4/replace-mkoption-with-mkpackageoption
treewide: use `mkPackageOption`
2023-11-30 02:49:30 +01:00
Weijia Wang
babc0d5e96
Merge pull request #257400 from wineee/deepin-23
deepin desktop environment: v20 -> v23Beta
2023-11-30 02:47:08 +01:00
Felix Bühler
b80ad550a8
Merge pull request #270519 from Stunkymonkey/esphome-fix-bwrap
nixos/esphome: fix bwrap
2023-11-29 19:40:48 +01:00
fasheng
52c81e882b nixos/fail2ban: fix default value for banaction-allports
It's iptables-allports instead of iptables-allport.

https://github.com/fail2ban/fail2ban/tree/master/config/action.d
2023-11-29 16:17:53 +01:00
MinerSebas
95a5f14116 nixos/plasma5: Dont add samba a second time to environment.systemPackages
If `services.samba.enable` is true, the the samba Module already adds the samba Package. If a User sets a differnet Package in `services.samba.package` then `environment.systemPackages` will contain two different samba Packages.
```
system-path> warning: collision between `/nix/store/rw5fzn10lb21xk3myc0d4m49j69d0crs-samba-4.19.2/bin/testparm' and `/nix/store/ssxn9pnl293knqghcjvpbzb6ysg0f7fv-samba-4.19.2/bin/testparm'
system-path> warning: collision between `/nix/store/rw5fzn10lb21xk3myc0d4m49j69d0crs-samba-4.19.2/bin/testparm' and `/nix/store/ssxn9pnl293knqghcjvpbzb6ysg0f7fv-samba-4.19.2/bin/testparm'
system-path> warning: collision between `/nix/store/rw5fzn10lb21xk3myc0d4m49j69d0crs-samba-4.19.2/bin/nmbd' and `/nix/store/ssxn9pnl293knqghcjvpbzb6ysg0f7fv-samba-4.19.2/bin/nmbd'
system-path> warning: collision between `/nix/store/rw5fzn10lb21xk3myc0d4m49j69d0crs-samba-4.19.2/bin/nmbd' and `/nix/store/ssxn9pnl293knqghcjvpbzb6ysg0f7fv-samba-4.19.2/bin/nmbd'
system-path> warning: collision between `/nix/store/rw5fzn10lb21xk3myc0d4m49j69d0crs-samba-4.19.2/bin/smbcontrol' and `/nix/store/ssxn9pnl293knqghcjvpbzb6ysg0f7fv-samba-4.19.2/bin/smbcontrol'
system-path> warning: collision between `/nix/store/rw5fzn10lb21xk3myc0d4m49j69d0crs-samba-4.19.2/bin/smbcontrol' and `/nix/store/ssxn9pnl293knqghcjvpbzb6ysg0f7fv-samba-4.19.2/bin/smbcontrol'
system-path> warning: collision between `/nix/store/rw5fzn10lb21xk3myc0d4m49j69d0crs-samba-4.19.2/bin/gentest' and `/nix/store/ssxn9pnl293knqghcjvpbzb6ysg0f7fv-samba-4.19.2/bin/gentest'
system-path> warning: collision between `/nix/store/rw5fzn10lb21xk3myc0d4m49j69d0crs-samba-4.19.2/bin/gentest' and `/nix/store/ssxn9pnl293knqghcjvpbzb6ysg0f7fv-samba-4.19.2/bin/gentest'
system-path> warning: collision between `/nix/store/rw5fzn10lb21xk3myc0d4m49j69d0crs-samba-4.19.2/bin/smbpasswd' and `/nix/store/ssxn9pnl293knqghcjvpbzb6ysg0f7fv-samba-4.19.2/bin/smbpasswd'
system-path> warning: collision between `/nix/store/rw5fzn10lb21xk3myc0d4m49j69d0crs-samba-4.19.2/bin/smbd' and `/nix/store/ssxn9pnl293knqghcjvpbzb6ysg0f7fv-samba-4.19.2/bin/smbd'
...
```
(The original samba will still stay in the closure as `kdenetwork-filesharing` depends on it.)
2023-11-29 16:15:52 +01:00
Stig
9f060c688e
Merge pull request #265661 from TomaSajt/lanraragi
lanraragi: 0.8.90 -> 0.9.0
2023-11-29 13:01:07 +01:00
TomaSajt
eac5dfd20f
lanraragi: 0.8.90 -> 0.9.0 2023-11-29 08:52:48 +01:00
Emily Trau
77cc213d14
Merge pull request #265349 from malt3/init/athens
athens: init at 0.12.1
2023-11-29 18:28:39 +11:00
Anthony Roussel
9a5f5ee7d3
nixos/tomcat: add anthonyroussel to maintainers 2023-11-29 07:56:09 +01:00
Paul Fauchon
b034425636 nixos/auto-epp: init 2023-11-29 14:28:25 +08:00
Aldwin Vlasblom
8efe6a71cb
nixos/vdirsyncer: fix config.statusPath option
The `services.vdirsyncer.jobs.<name>.config.statusPath` option was
making the appropriate changes to the systemd service options, but not
to the vdirsyncer config file.
2023-11-28 18:54:49 +01:00
tomberek
a2de752222
Merge pull request #267538 from nessdoor/pkgs/paste.sr.ht
sourcehut.pastesrht: add missing backend component
2023-11-28 12:40:09 -05:00
asymmetric
7da99477ca
Merge pull request #265368 from chayleaf/maubot
nixos/maubot: init
2023-11-28 16:58:46 +01:00
Someone Serge
d97d2fb271 nixos/clamav: ensure freshclam starts before clamav (if enabled) 2023-11-28 14:21:30 +00:00
chayleaf
00070cf866
nixos/maubot: init 2023-11-28 20:35:55 +07:00
Mario Rodas
3dba8d6fdb
Merge pull request #268634 from tie/redis-restrict-address-families
nixos/redis: loosen systemd address family restrictions
2023-11-27 20:06:29 -05:00
Maciej Krüger
7cc312f18b
Merge pull request #265730 from nbraud/nixos/sudo-rs/x2goserver
nixos/x2goserver: Support sudo-rs
2023-11-28 01:37:05 +01:00
Felix Buehler
9f563e21ac nixos/esphome: fix bwrap 2023-11-28 00:48:30 +01:00
Nick Cao
e0ece67a97
Merge pull request #270256 from schmittlauch/gite-forgejo-migration-phrasing
nixos/forgejo docs: correct phrasing
2023-11-27 09:33:21 -05:00
Jonas Chevalier
a403a118d1
fahclient: 7.6.21 -> 8.1.18 (#246832)
Rebuild from source
2023-11-27 14:20:58 +01:00
Tomas Antonio Lopez
9e6f9c6d83 nixos/sourcehut: remove usages of 'with lib;'
Inherit library attributes at a finer granularity, instead.
2023-11-27 08:22:48 -03:00
Tomas Antonio Lopez
ba6817ed22 nixos/sourcehut: add myself as maintainer 2023-11-27 08:22:48 -03:00
Tomas Antonio Lopez
087c83f45c nixos/sourcehut: reformat expressions using nixpkgs-fmt 2023-11-27 08:22:48 -03:00
Lin Jian
fbbbcfb879
Merge pull request #264661 from schoettl/dolibarr-with-package
nixos/dolibarr: add package option
2023-11-26 20:41:10 -06:00
h7x4
0a37316d6c
treewide: use mkPackageOption
This commit replaces a lot of usages of `mkOption` with the package
type, to be `mkPackageOption`, in order to reduce the amount of code.
2023-11-27 01:28:36 +01:00
Trolli Schmittlauch
0e893a9f22 nixos/forgejo docs: correct phrasing 2023-11-26 21:43:32 +01:00
Maciej Krüger
b63af5d7ea
Merge pull request #265728 from nbraud/nixos/sudo-rs/ssm-agent 2023-11-26 21:37:15 +01:00
Maciej Krüger
cdd67575e7
Merge pull request #265722 from nbraud/nixos/sudo-rs/btrbk 2023-11-26 21:36:20 +01:00
Sandro Jäckel
960527707b nixos/mediawiki: don't clear default installed extensions 2023-11-26 20:29:49 +01:00
Jörg Thalheim
501680a656 nixos/telegraf: include procps if procstat input is configured 2023-11-26 20:26:48 +01:00
Sandro Jäckel
8ae9c8640c nixos/mediawiki: don't assume language of main page
The mainpage might be named Hauptseite and mediawiki redirects from
/wiki/ on its own to there
2023-11-26 19:59:32 +01:00
Sandro Jäckel
f68be841c9 nixos/mediawiki: use fastcgi.conf file which contains extra parameter 2023-11-26 19:59:32 +01:00
Jörg Thalheim
f468e0d111 nixos/mediawiki: quote shell flags passed to installer 2023-11-26 17:25:14 +01:00
Jörg Thalheim
0bd8759d1c nixos/mediawiki: drop sqlite variant
Probably no one ever tested this, mediawiki tries to create the database inside the read-only
package. There might be a proper fix but for now it's better to not advertise unsupported options.
2023-11-26 17:25:14 +01:00
Sandro
e580ab8c3e nixos/mediawiki: update url option defaultText 2023-11-26 17:24:15 +01:00
3JlOy_PYCCKUI
64002ec9b0 nixos/torrentstream: init 2023-11-26 16:36:48 +02:00
Pierre Bourdon
c6c20c63b4
Merge pull request #269954 from imincik/fix-tmate-ssh-server-module
nixos/tmate-ssh-server: fix tmate-client-config script
2023-11-26 12:42:09 +01:00
Tony Zorman
13da2e9463 nixos/emacs: Remove absolute paths from documentation
Apart from being bad practice, absolute paths may be confusing;
especially the `services.emacs.package` definition in the "Running
Emacs as a service" section. Remove them.

Supersedes: https://github.com/NixOS/nixpkgs/pull/192019

Co-authored-by: Alexander Bantyev <balsoft@balsoft.ru>
2023-11-26 11:22:28 +01:00
Ivan Mincik
df254b2dd2 nixos/tmate-ssh-server: fix tmate-client-config script 2023-11-26 09:34:51 +01:00
Lin Jian
5ba42a0de2
Merge pull request #260902 from LDprg/master
preload: init at 0.6.4
2023-11-25 23:29:40 -06:00
Mario Rodas
1744e3fa01
Merge pull request #266675 from anthonyroussel/sonic-server-nixos
nixos/sonic-server: init
2023-11-25 23:45:16 -05:00
ckie
d5260c5544
nixos/transmission: correct typo on systemd StateDirectory
systemd would previously create a nonoperational
"/var/lib/transmission/watch-dir" directory due to a typo in the
StateDirectory array ("watch-dir" -> "watchdir")

I have corrected this by using the pre-declared constants for these
folder names.
2023-11-26 05:32:22 +02:00
LDprg
a0f5d5e500 nixos/preload: init 2023-11-25 20:07:10 +01:00
Lassulus
b821ac8070
Merge pull request #267278 from Stunkymonkey/nixos-packages-docu-fix
nixos/nextcloud: fix docu of packages
2023-11-25 18:48:28 +01:00
Peder Bergebakken Sundt
2ca79e7f9d nixos/ejabberd: ensure erlang cookie is made
Apply the same fix as found in `couchdb` and `rabbitmq`.
2023-11-25 15:41:42 +01:00
Maciej Krüger
7b1e146a49
Merge pull request #266477 from duament/nixos-nat-nftables
nixos/nat: fix nat-nftables
2023-11-25 12:58:48 +01:00
Nick Cao
9ad7bc9180
Merge pull request #269613 from jpds/caddy-restart-sec-typo
nixos/caddy: Fixed RestartSec typo
2023-11-24 09:41:10 -05:00
Chris Marchesi
54020c36a2 nixos/xscreensaver: init module
This adds a NixOS module for XScreenSaver (from @aidalgol in #130218,
with a few updates).

The module:

* Installs XScreenSaver
* Sets up a suid wrapper for xscreensaver-auth
* Sets up a user service for xscreensaver

The suid wrapper should function correctly when xscreensaver is
installed via the derivation update in 40a00547b71.

Co-authored-by: Aidan Gauland <aidalgol@fastmail.net>
Co-authored-by: Anderson Torres <torres.anderson.85@protonmail.com>
2023-11-24 08:53:00 -03:00
Jonathan Davies
a1163912c2 nixos/caddy: Fixed RestartSec typo. 2023-11-24 11:03:32 +00:00
Jonas Heinrich
8f3f6a2a77 nixos/invoiceplane: Add settings option 2023-11-24 10:25:46 +00:00
happysalada
e5b0b76105 nixos/clamav: add fangfrisch updater 2023-11-24 09:09:46 +00:00
Robert Hensing
779e50580c
Merge pull request #224611 from srhb/kafka-settings-module
Kafka: Settings and KRaft support
2023-11-23 17:35:29 +01:00
sinanmohd
da35c07d23 nixos/seatd: add readiness notification 2023-11-23 13:50:14 +11:00
sinanmohd
9796cbb021 nixos/seatd: init 2023-11-23 13:50:14 +11:00
rewine
12fba79491
deepin: add v23 packages 2023-11-23 10:00:44 +08:00
rewine
245ae0f64f
services.deepin.app-services: add systemd service
https://github.com/linuxdeepin/dde-app-services/pull/45
2023-11-23 10:00:43 +08:00
Vincent Ambo
b2f67d3f48 nixos/nix-serve: fix module compatibility with unflaked Nix
The option `extra-allowed-users` was introduced in Nix 2.4, and fails
config validation on Nix 2.3.
2023-11-23 00:03:31 +03:00
Andrew Morgan
54b7a39646 peertube: Clarify option descriptions of listenHttp, listenWeb, enableWebHttps 2023-11-22 21:15:36 +01:00
Nick Cao
0840c28c43
Merge pull request #268991 from undefined-moe/mongodb-exporter
add prometheus-mongodb-exporter
2023-11-22 09:29:50 -05:00
datafoo
480f5b14e3 nixos/syncoid: add possibility to use string type for sshKey options
The sshKey options do not need to be a valid path at build time. Using
string instead allow use case when the path is not known at build time
such as when using systemd credentials (e.g. `sshKey =
"\${CREDENTIALS_DIRECTORY}/zfs-replication_ed25519";`).
2023-11-22 10:57:58 +01:00
Sarah Brofeldt
cfe3ca1f2f nixos/apache-kafka: Add manual chapter 2023-11-22 06:47:09 +01:00
Sarah Brofeldt
45f84cdfd5 nixos/apache-kafka: structured settings
- Use lazyAttrs (for config references) settings for main server.properties.
- Drop dangerous default for "log.dirs"
- Drop apache-kafka homedir; unused and confusing
- Support formatting kraft logdirs
2023-11-22 06:47:08 +01:00
happysalada
eb746540a9 nixos/clamav: run as clamav user not root 2023-11-22 03:08:30 +00:00
happysalada
ef6b8ff15a nixos/clamav: use state and runtime directory 2023-11-22 03:08:30 +00:00
undefined
b46ec2c40f
nixos/prometheus-mongodb-exporter: init module 2023-11-22 09:42:27 +08:00
Lassulus
ac1a9af078
Merge pull request #267445 from RTUnreal/add-dynamic-pw-loading-factorio
factorio: add dynamic game-password and login credentials loading
2023-11-21 23:46:51 +01:00
RTUnreal
decdfde011 improve documentation of new options 2023-11-21 20:52:30 +01:00
Vladimír Čunát
35a3cb94c6
Merge #269032: GNOME: 44 -> 45 2023-11-21 20:49:59 +01:00
RTUnreal
648ffcecae fix some errors 2023-11-21 20:29:43 +01:00
ners
ed31e0235e treewide: replace broken udev paths with systemd 2023-11-21 15:09:38 +01:00
Jan Tojnar
b32a490b14 nixos/gnome: Do not install Photos
829b9aacc5
2023-11-21 09:21:55 +01:00
Bobby Rong
39a1279b4d nixos/desktop-managers: Add xdg.portal.config or xdg.portal.configPackages
See the changes in x-d-p 1.17 for details.
2023-11-21 08:42:17 +01:00
Bobby Rong
d7a8877d9d nixos/xdg/portal: Add config and configPackages option
In x-d-p 1.17, when no configs are given, you apps will likely not
able to find a backend. Let users aware of the changes.
2023-11-21 08:42:10 +01:00
Bobby Rong
511d457142 nixos/gnome: Replace eog with loupe
ad3b4ca520

Acked-by: Jan Tojnar <jtojnar@gmail.com>
2023-11-21 08:41:54 +01:00
Bobby Rong
14fb201c7c nixos/gnome: Replace cheese with snapshot
f2b0abe388

Acked-by: Jan Tojnar <jtojnar@gmail.com>
2023-11-21 08:41:50 +01:00
Bobby Rong
3bdcdae69d gnome.gnome-initial-setup: 44.0 → 45.beta
https://gitlab.gnome.org/GNOME/gnome-initial-setup/-/compare/44.0...45.beta

Install dconf presets: 0c607f104e

Use tecla: 3dcb8709ba

Changelog-reviewed-by: Bobby Rong <rjl931189261@126.com>
Changelog-reviewed-by: Jan Tojnar <jtojnar@gmail.com>
2023-11-21 08:41:32 +01:00
Atemu
cfe0155154
Merge pull request #268324 from Janik-Haag/nixos-firewall-tool
nixos/firewall: install nixos-firewall-tool for iptables by default
2023-11-20 23:23:24 +01:00
Jonas Chevalier
c57a434386
maintainers: remove the numtide team (#268684)
It doesn't really make sense for us as team members are focused on
different things. At the end of the day it's the individuals that do the
work.
2023-11-20 22:27:26 +01:00
Ryan Lahfa
5d08323dda
Merge pull request #268717 from SuperSandro2000/patch-2 2023-11-20 19:05:01 +01:00
Nick Cao
90ef10b571
Merge pull request #253918 from tie/centrifugo
centrifugo: init at 5.1.1
2023-11-20 08:59:54 -05:00
Sandro Jäckel
515ce669bc
nixos/postgresql: point doc link to current like all others 2023-11-20 14:44:23 +01:00
Sandro
809f926017
nixos/postgresql: fix mentioned settings in ensurePermissions warnings 2023-11-20 14:42:57 +01:00
Ivan Trubach
3be1aab86f centrifugo: init at 5.1.1 2023-11-20 10:18:21 +03:00
Ivan Trubach
5c898bec57 nixos/redis: loosen systemd address family restrictions
Do not assume that port and unixSocket are the only options that affect
address families used by Redis. There are other options, e.g. tls-port,
and also clustered setup that are not covered by the declarative
configuration. Instead of trying to selectively restrict unused address
families based on the configuration, limit address families to IP and
Unix sockets and let users lib.mkForce a stricter sandboxing is needed.

See also
https://docs.redis.com/latest/rs/networking/port-configurations/
2023-11-20 07:11:34 +03:00
Mario Rodas
fa14a14694
Merge pull request #258036 from anthonyroussel/fix-ssm-seelog
nixos/amazon-ssm-agent: fix missing seelog.xml file
2023-11-19 18:55:57 -05:00
Mario Rodas
c93541b24e
Merge pull request #264910 from anthonyroussel/ocsinventory-agent+nixos
nixos/ocsinventory-agent: init
2023-11-19 18:55:06 -05:00
Emily
1f9a04da3f
Merge pull request #265465 from jpds/caddy-restart-on-failure
nixos/caddy: Set systemd unit to restart on-failure
2023-11-19 23:59:20 +01:00
Artturi
0bd183e065
Merge pull request #268110 from tyxieblub/squid-service 2023-11-19 23:32:10 +02:00
Artturi
b736459b60
Merge pull request #260089 from anthonyroussel/thanos_0_32_4 2023-11-19 18:37:48 +02:00
Ryan Lahfa
ff3b480354
Merge pull request #252117 from nalves599/252116-pixiecore-firewall 2023-11-19 16:16:54 +01:00
Adrian Pistol
b30601bba2 nixos/chrony: Add missing rtcsync assertion.
Due to a lot of rebasing, I dropped my added assertion in #259405. This is important.
2023-11-19 09:08:26 -06:00
Mario Rodas
d3deaacfb4
Merge pull request #263550 from anthonyroussel/updates/axis2
axis2: 1.7.9 -> 1.8.2, tomcat10: 10.0.27 -> 10.1.15, tomcat9: 9.0.75 -> 9.0.82
2023-11-19 09:39:19 -05:00
Paul Meyer
3e4e76e676 greetd: create cache dir for tuigreet 2023-11-19 14:09:48 +01:00
RTUnreal
20e9267cbb factorio: add dynamic server-settings loading 2023-11-18 22:18:03 +01:00
Artturi
8896579a83
Merge pull request #264521 from stephen-huan/mullvad-vpn-resolvconf 2023-11-18 21:47:51 +02:00
Janik H.
fa9cdc83ab
nixos/firewall: install nixos-firewall-tool for iptables by default 2023-11-18 17:08:30 +01:00
Nick Cao
d936414252
Merge pull request #268132 from bendlas/forgejo-release-notes
nixos/forgejo/docs: fix typo
2023-11-18 09:39:29 -05:00
emilylange
b3e8dae766 nixos/forgejo: remove postgresql_15 permission work-around
This is no longer necessary as of
ccfe07c316.

Previously: b8585a119c.
2023-11-18 12:14:09 +01:00
Ryan Lahfa
d3530f494c
Merge pull request #264358 from RaitoBezarius/drop-nodejs 2023-11-17 23:26:13 +01:00
Felix Buehler
7f9abdcfcb nixos/nextcloud: fix docu of packages 2023-11-17 23:16:23 +01:00
William McKinnon
869fb56797 nixos/syncthing: respect the dataDir option
The previous -home argument worked as such:
"Set common configuration and data directory. The default configuration directory is $HOME/.config/syncthing (Unix-like), $HOME/Library/Application Support/Syncthing (Mac) and %LOCALAPPDATA%\Syncthing (Windows)"

This resulted in syncthing not respecting different home and data dirs
declared in its config. The default behaviour will remain the same, as
we set the datadir default value to homeDir + .config/syncthing.
2023-11-17 22:58:46 +01:00
Julien Malka
cac11727b3
Merge pull request #227588 from camillemndn/jitsi-meet
nixos/jitsi-meet: updated prosody, support secure domain setup and Excalidraw whiteboards
2023-11-17 22:08:05 +01:00
Adam C. Stephens
4b8d7d814e
Merge pull request #265556 from adamcstephens/slimserver/fix
slimserver: fix broken package
2023-11-17 15:47:26 -05:00
Raito Bezarius
72911a99d3 code-server: drop
Depends on Node.js 16 and cannot be trivially upgraded to Node.js 18.
2023-11-17 20:26:55 +01:00
Raito Bezarius
022ee4d701 kibana7: drop
Depends on EOL software and no maintenance has been attempted to change this after a ping
(https://github.com/NixOS/nixpkgs/issues/259178)
Feel free to adopt and re-introduce if you care about this software.

This will probably seriously hamper ELK usability in nixpkgs, but as it
receives no maintenance…
2023-11-17 20:26:55 +01:00
Ryan Lahfa
ccfe07c316
Merge pull request #266270 from Ma27/postgresql-ownership-15 2023-11-17 18:02:17 +01:00
Herwig Hochleitner
8c441fc2a7 nixos/forgejo/docs: fix typo 2023-11-17 17:18:57 +01:00
Herwig Hochleitner
e7c7d97167
nixos/postgresql: document psql 15 changes (#267238)
* nixos/postgresql: document psql 15 changes

* nixos/postgresql: manual heading ids

* nixos/postgresql: reword warning against initialScript

Co-authored-by: Ryan Lahfa <masterancpp@gmail.com>

* nixos/postgresql: wording PERMISSIONS -> PRIVILEGES

Co-authored-by: Ryan Lahfa <masterancpp@gmail.com>

* nixos/postgresql: document intermediate oneshot / service user method

* nixos/postgresql/docs: clarify security benefits of `ensureDBOwnership`

* nixos/postgresql/docs: service type -> serviceConfig.Type

---------

Co-authored-by: Ryan Lahfa <masterancpp@gmail.com>
2023-11-17 16:06:01 +01:00
Herwig Hochleitner
20832d5995
nixos/forgejo: changelog and migration instructions (#267248)
* nixos/forgejo: changelog and migration instructions

* nixos/forgejo/docs: clarify sentence

Co-authored-by: Trolli Schmittlauch <schmittlauch@users.noreply.github.com>

* nixos/forgejo/docs: document migration via gitea impersonation

* nixos/forgejo/docs: note about url change on migration

* nixos/forgejo/docs: note about migration (non-)requirement

* nixos/forgejo/docs: header ids

* nixos/forgejo/docs: clarify release notes entry

Co-authored-by: Emily <git@emilylange.de>

* nixos/forgejo/docs: improve manual entry

Co-authored-by: Emily <git@emilylange.de>

* nixos/forgejo/docs: move changelog line to the middle of the section

as noted <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->

---------

Co-authored-by: Trolli Schmittlauch <schmittlauch@users.noreply.github.com>
Co-authored-by: Emily <git@emilylange.de>
2023-11-17 15:55:24 +01:00
Raito Bezarius
10baca4935 nixos/invidious: do not use ensureDBOwnership
Invidious uses a strange setup where the database name is different from the system username
for non-explicit reasons.

Because of that, it makes it hard to migrate it to use `ensureDBOwnership`, we leave it to Invidious' maintainers
to pick up the pieces.
2023-11-17 15:53:08 +01:00
Raito Bezarius
f653734c4d nixos/mobilizon: do not use ensureDBOwnership
Mobilizon can have a custom database username and it is not trivial to sort out how to remove this.

In the meantime, for the upcoming 23.11 release, I apply the classical workaround
and defer to Mobilizon's maintainers.
2023-11-17 15:52:51 +01:00
Raito Bezarius
7cd63bff21 nixos/sourcehut: do not use ensureDBOwnership
Given that SourceHut uses unfortunate defaults for database name, it will not
be realistic to fix this in time for 23.11.

We will leave the workaround and leave it to SourceHut maintainers to pick up the work
to clean this up after 23.11.
2023-11-17 15:52:51 +01:00
Adam Stephens
431b9f23ad
slimserver: add bin symlink and meta.mainProgram 2023-11-17 08:18:32 -05:00
joris
18f3c1fb55 services/squid: explicit usage of coreutils' kill on ExecReload 2023-11-17 13:55:21 +01:00
Martino Fontana
84e51c525d nixos/plasma5: enable dconf by default 2023-11-17 11:48:00 +01:00
Ilan Joselevich
d7e7a2136e
Merge pull request #267761 from jpds/grafana-restart-on-failure
nixos/grafana: Set systemd unit to restart on failure
2023-11-17 00:59:25 +00:00
github-actions[bot]
dba5c9ef4e
Merge master into staging-next 2023-11-16 18:01:17 +00:00
Pol Dellaiera
3acc2484cf
Merge pull request #267560 from anthonyroussel/bugfix/plantuml-server-nixos
nixos/plantuml-server: fix
2023-11-16 18:32:44 +01:00
talyz
4b0b3413b4
nixos/keycloak: Allow setting hostname-url 2023-11-16 16:12:07 +01:00
Kim Lindberger
9c4df4d618
Merge pull request #246992 from cransom/cransom-parsedmarc-smtp
nixos/parsedmarc: fix validation for smtp
2023-11-16 15:06:20 +01:00
github-actions[bot]
301fcc69ba
Merge master into staging-next 2023-11-16 12:01:02 +00:00
Sarah Brofeldt
54f00576aa
Merge pull request #265193 from 0z13/opensearch-module-link-plugins
nixos/opensearch: link plugins from opensearch package
2023-11-16 11:30:09 +01:00
Vladimír Čunát
0fe5300699
Merge branch 'master' into staging-next 2023-11-16 09:49:24 +01:00
Lin Jian
bf8a6ad72c
Merge pull request #265733 from nbdd0121/unbound
nixos/unbound: fix wrong syscall filter and tighten sandbox
2023-11-16 14:38:46 +08:00
Jonathan Davies
58cbf94b38 nixos/grafana: Set systemd unit to restart on failure 2023-11-15 23:20:59 +00:00
Adrian Pistol
7a1d45811e nixos/chrony: Let Chrony control/track RTC drift 2023-11-15 15:09:22 -06:00
Weijia Wang
1a85914512
Merge pull request #266528 from lucasbergman/unifi-jvmoptions
nixos/unifi: Add the ability to specify extra JVM options
2023-11-15 17:53:25 +01:00
Anthony Roussel
8c7c1e7a30
nixos/plantuml-server: remove deprecated allowPlantumlInclude option
See https://github.com/plantuml/plantuml-server/pull/301
2023-11-15 15:14:28 +01:00
Anthony Roussel
deae39af43
nixos/plantuml-server: use jetty_11
PlantUML Server does not support Jetty versions higher than 12.x.

Jetty 12.x has introduced major breaking changes, see
* https://github.com/jetty/jetty.project/releases/tag/jetty-12.0.0
* https://eclipse.dev/jetty/documentation/jetty-12/programming-guide/index.html#pg-migration-11-to-12
2023-11-15 15:14:28 +01:00
Anthony Roussel
2c94d267c2
nixos/plantuml-server: use mkPackageOptionMD 2023-11-15 15:12:58 +01:00
Anthony Roussel
3b17b80525
nixos/plantuml-server: add anthonyroussel to maintainers 2023-11-15 15:12:58 +01:00
Anthony Roussel
09e9d47508
nixos/plantuml-server: add hardening 2023-11-15 15:12:58 +01:00
Anthony Roussel
e3839eef71
nixos/plantuml-server: remove with lib; notation
https://nix.dev/guides/best-practices#with-scopes
2023-11-15 15:12:58 +01:00
Izorkin
63ed35dac4 nixos/mastodon: update elasticsearch configuration 2023-11-15 14:01:47 +01:00
Vladimír Čunát
c46eae0f35
Merge branch 'master' into staging-next 2023-11-15 07:33:10 +01:00
Ryan Lahfa
d983d6c863
Merge pull request #251950 from erictapen/mastodon 2023-11-15 01:46:50 +01:00
zzywysm
3f4c802d26 initrd/autofs4: remove legacy references to autofs4 kernel module
Back in 2018, the kernel decided to remove the autofs4 module.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2225d931f75ddd3c39f4d0d195fad99dfd68671

This caused immediate problems with systemd, so the kernel allowed autofs4 as a config option that would simply map back to autofs.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d02d21ea007b6b33cdaf15c2f84fb1fea996ecc2

Earlier this year, in July 2023, the kernel got tired of people not adapting to the autofs change, and forced the issue by fixing it within the kernel defconfigs, which NixOS uses as a starting point for their own kernel configs.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f2190d6b7112d22d3f8dfeca16a2f6a2f51444e

This commit reflects the post-2018 reality by changing the remaining autofs4 references to autofs. Since this change initially happened in kernel 4.18 and we no longer support 4.x kernels, we don't need any backwards-compatibility tweaks.
2023-11-14 15:37:50 -05:00
Kerstin Humm
c82195d9e8
mastodon: 4.1.6 -> 4.2.1
- run streaming processes in separate systemd services
- remove redundancy in test
- fix update script
- release notes

See https://github.com/mastodon/mastodon/releases/tag/v4.2.1 for details
2023-11-14 21:13:46 +01:00
Nathan Henrie
6c69d3c9ca nixos/navidrome: add openFirewall option
This adds an option to the navidrome module to open the configured TCP
port in the firewall.
2023-11-14 19:29:08 +01:00
Jonathan Zielinski
aca76b750d nixos/opensearch: link plugins from opensearch package
disable security module by default, it crashes unit expecting
certificates.
2023-11-14 14:00:30 +01:00
Martin Weinelt
3c336a1647
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
- pkgs/development/libraries/gdcm/default.nix
2023-11-14 13:16:34 +01:00
Tomas Antonio Lopez
5476b490d4 nixos/sourcehut: compile and integrate paste.sr.ht API component 2023-11-14 11:12:14 +01:00
Niklas Hambüchen
f9c7c12de6
Merge pull request #266702 from nh2/plausible-listen-address-no-distributed-erlang
plausible, nixos/plausible: Add `listenAddress` option
2023-11-14 10:52:21 +01:00
Niklas Hambüchen
65a471717c plausible, nixos/plausible: Add listenAddress option.
This changes

* the plausible HTTP web server

to be listening on localhost only, explicitly.

This makes Plausible have an explicit safe default configuration,
like all other networked services in NixOS.

For background discussion, see: https://github.com/NixOS/nixpkgs/issues/130244

As per my upstream Plausible contribution
(https://github.com/plausible/analytics/pull/1190)
Plausible >= 1.5 also defaults to listening to localhost only;
nevertheless, this default should be stated explicitly in nixpkgs
for easier review and independence from upstream changes, and
a NixOS user must be able to configure the
`listenAddress`, as there are valid use cases for that.

Also, disable

* the Erlang Beam VM inter-node RPC port
* the Erlang EPMD port

because Plausible does not use them (see added comment).
This is done by setting `RELEASE_DISTRIBUTION=none`.

Thus, this commit also removes the NixOS setting `releaseCookiePath`,
because it now has no effect.
2023-11-14 10:51:16 +01:00
Jörg Thalheim
54fd866569 nixos/harmonia: set extra-allowed-users
This fixes the case where users enable harmonia but also have allowed-users set.
Having extra-allowed-users is a no-op when nix.settings.allowed-users is set to "*" (the default)
2023-11-14 10:37:39 +01:00
Silvan Mosberger
3e5bc28ec5
Merge pull request #266598 from infinisil/fix-fwupd
nixos/fwupd: Fix fwupd-refresh service
2023-11-14 08:56:25 +01:00
github-actions[bot]
6a7c026ba7
Merge master into staging-next 2023-11-14 06:01:03 +00:00
eyjhb
2387a37fa0 nixos/flexget: remove TZ envvar 2023-11-14 06:35:40 +01:00
github-actions[bot]
772c3bbbf5
Merge master into staging-next 2023-11-14 00:02:14 +00:00
Julien Moutinho
accbc67b04 nixos/transmission: use mkDefault on PrivateMounts and PrivateUsers 2023-11-13 23:24:55 +01:00
Julien Moutinho
dd77a799f8 nixos/transmission: /run/host must be writable, fixes #258793 2023-11-13 23:23:44 +01:00
Felix Bühler
f2fc5b4195
Merge pull request #265696 from Stunkymonkey/nixos-exportarr
nixos/exportarr: init
2023-11-13 22:58:32 +01:00
Fabián Heredia Montiel
884449105e Merge remote-tracking branch 'origin/master' into staging-next 2023-11-13 14:31:51 -06:00
Raito Bezarius
d57926c0b6 nixos/postgresql: improve the assertions for equality of DB user and DB name
It is hard to figure out which one is offending without the database name.
2023-11-13 17:16:25 +01:00
Raito Bezarius
12797a6a39 nixos/postgresql: restore ensurePermissions and strong-deprecate it
As it is technically a breaking change, we should at least make a strong deprecation
of `ensurePermissions` and leave it in the broken state it is, for out of tree users.

We give them a 6 months notice to migrate away by doing so, which is honest.
In the meantime, we forbid usage of `ensurePermissions` inside of nixpkgs.
2023-11-13 17:16:25 +01:00
Maximilian Bosch
48459567ae nixos/postgresql: drop ensurePermissions, fix ensureUsers for postgresql15
Closes #216989

First of all, a bit of context: in PostgreSQL, newly created users don't
have the CREATE privilege on the public schema of a database even with
`ALL PRIVILEGES` granted via `ensurePermissions` which is how most of
the DB users are currently set up "declaratively"[1]. This means e.g. a
freshly deployed Nextcloud service will break early because Nextcloud
itself cannot CREATE any tables in the public schema anymore.

The other issue here is that `ensurePermissions` is a mere hack. It's
effectively a mixture of SQL code (e.g. `DATABASE foo` is relying on how
a value is substituted in a query. You'd have to parse a subset of SQL
to actually know which object are permissions granted to for a user).

After analyzing the existing modules I realized that in every case with
a single exception[2] the UNIX system user is equal to the db user is
equal to the db name and I don't see a compelling reason why people
would change that in 99% of the cases. In fact, some modules would even
break if you'd change that because the declarations of the system user &
the db user are mixed up[3].

So I decided to go with something new which restricts the ways to use
`ensure*` options rather than expanding those[4]. Effectively this means
that

* The DB user _must_ be equal to the DB name.
* Permissions are granted via `ensureDBOwnerhip` for an attribute-set in
  `ensureUsers`. That way, the user is actually the owner and can
  perform `CREATE`.
* For such a postgres user, a database must be declared in
  `ensureDatabases`.

For anything else, a custom state management should be implemented. This
can either be `initialScript`, doing it manual, outside of the module or
by implementing proper state management for postgresql[5], but the
current state of `ensure*` isn't even declarative, but a convergent tool
which is what Nix actually claims to _not_ do.

Regarding existing setups: there are effectively two options:

* Leave everything as-is (assuming that system user == db user == db
  name): then the DB user will automatically become the DB owner and
  everything else stays the same.

* Drop the `createDatabase = true;` declarations: nothing will change
  because a removal of `ensure*` statements is ignored, so it doesn't
  matter at all whether this option is kept after the first deploy (and
  later on you'd usually restore from backups anyways).

  The DB user isn't the owner of the DB then, but for an existing setup
  this is irrelevant because CREATE on the public schema isn't revoked
  from existing users (only not granted for new users).

[1] not really declarative though because removals of these statements
    are simply ignored for instance: https://github.com/NixOS/nixpkgs/issues/206467
[2] `services.invidious`: I removed the `ensure*` part temporarily
    because it IMHO falls into the category "manage the state on your
    own" (see the commit message). See also
    https://github.com/NixOS/nixpkgs/pull/265857
[3] e.g. roundcube had `"DATABASE ${cfg.database.username}" = "ALL PRIVILEGES";`
[4] As opposed to other changes that are considered a potential fix, but
    also add more things like collation for DBs or passwords that are
    _never_ touched again when changing those.
[5] As suggested in e.g. https://github.com/NixOS/nixpkgs/issues/206467
2023-11-13 17:16:25 +01:00
Molly Miller
9cec5c807a nixos/mailman: restart services on failure and increase mailman timeouts 2023-11-13 16:10:55 +01:00
Jonas Heinrich
4f38dbab82
Merge pull request #266025 from onny/cups-firewall2
nixos/printing: Fix openFirewall option
2023-11-13 11:15:18 +01:00
dadada
f192930a79
nixos/soft-serve: fix typos in option descriptions 2023-11-12 22:34:54 +01:00
Weijia Wang
74d102ce50 Merge branch 'master' into staging-next 2023-11-12 19:45:20 +01:00
Jörg Thalheim
44cf4801c0 nixos/nix-serve: also set extra-allowed-users
This fixes the case where users enable nix-serve but also have allowed-users set.
Having extra-allowed-users is a no-op when nix.settings.allowed-users is set to "*" (the default)
2023-11-12 14:09:31 +01:00
Anthony Roussel
d4d6602ce3
nixos/thanos: remove with lib; notation
https://nix.dev/guides/best-practices#with-scopes
2023-11-12 11:21:47 +01:00
Anthony Roussel
65be712043
nixos/thanos: use mkPackageOptionMD 2023-11-12 11:08:53 +01:00
Anthony Roussel
9abb2a2116
nixos/thanos: remove deprecations
* replaced store.grpc.series-sample-limit by store.limits.request-samples
* replaced query.replica-label by query.replica-labels
* replaced store.addresses by endpoints
* removed block-sync-concurrency (removed upstream)
2023-11-12 11:08:52 +01:00
Anthony Roussel
abed24c0d6
nixos/thanos: fix documentation 2023-11-12 11:08:52 +01:00
Anthony Roussel
312e7f8ae0
nixos/thanos: add ExecReload command to SystemD services 2023-11-12 11:08:52 +01:00
Anthony Roussel
0d9bef343b
nixos/thanos: fix services.thanos.receive.labels config 2023-11-12 11:08:51 +01:00
Anthony Roussel
2074409c86
nixos/thanos: add query-frontend SystemD service 2023-11-12 11:08:51 +01:00
Lucas Bergman
07828dc05b nixos/unifi: Add extraJvmOptions option
This can be useful for adding extra logging, tweaking garbage collector
parameters, and for using JMX to monitor the JVM.
2023-11-12 00:38:10 +00:00
Lucas Bergman
50ff8ff3f9 nixos/unifi: Switch command line args to a list
There's no functionality change here, but this makes it a bit more
convenient to add more args.
2023-11-12 00:32:50 +00:00
Lucas Bergman
2bc02c0383 nixos/unifi: Clean up formatting
This removes "with lib", which advances #208242 a bit, and cleans up a few
formatting nits found by nixfmt.
2023-11-12 00:28:40 +00:00
Sebastian Sinnlos
71dd9c3d53 nixos/nextcloud: missing ocm-dir applys also from 26.0.8 onward
ocmProviderIsNotAStaticDirAnymore applys also to nextcloud26 form 26.0.8
onwards til EOL in 2024-03
2023-11-12 01:11:00 +01:00
github-actions[bot]
33248a2caf
Merge master into staging-next 2023-11-12 00:02:14 +00:00
tomberek
7859adb9d6
Merge pull request #245394 from christoph-heiss/pkgs/sourcehut
sourcehut: update all component; lots of fixes
2023-11-11 13:42:19 -05:00
github-actions[bot]
9776723357
Merge master into staging-next 2023-11-11 18:00:58 +00:00
Maciej Krüger
e9a5bf8ae4
Merge pull request #265712 from nbraud/nixos/sudo-rs/akkoma 2023-11-11 18:10:25 +01:00
K900
e792d7fec0
Merge pull request #264442 from anthonyroussel/update-url-redirects
treewide: fix redirected and broken URLs
2023-11-11 18:08:59 +03:00
Christoph Heiss
88a3d2a0b4
sourcehut: fix postgresql database permission for postgresql >= 15
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 15:50:16 +01:00
Christoph Heiss
66b86f8a2e
sourcehut: de-duplicate nginx add_header directives
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 14:14:59 +01:00
Christoph Heiss
acd21dad52
sourcehut: use systemd.tmpfiles instead of manually creating logfiles
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 14:14:59 +01:00
Christoph Heiss
641e54bb28
sourcehut: create logs directory unconditionally
An empty log directory, in case it stays unused, does not hurt anyone.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
fc6addb147
sourcehut: reword api-origin option description
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
78cc2783c8
sourcehut: drop obsolete services array in favor of indivdual enable flags
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
6b25e09d2d
sourcehut: fix up some more bin paths
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
5841d27497
sourcehut: explicitly disallow openssh to socket-active
This breaks the (already fragile) gitsrht-dispatch -> gitsrht-keys
command chain.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
c39ba7f5b1
sourcehut: remove set -x from ssh commands
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:46 +01:00
Christoph Heiss
6648488333
sourcehut: fix logging of git/hg ssh commands
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:45 +01:00
Christoph Heiss
6e51802196
sourcehut: fix repos path by using actual settings value
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:32 +01:00
Christoph Heiss
c123a37be6
sourcehut.gitsrht: 0.78.20 -> 0.84.2
Newer version of the gitsrht-api service call setrlimit() on startup,
thus allow it in the `SystemCallFilter` definition for the service.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:30 +01:00
github-actions[bot]
652204165d
Merge master into staging-next 2023-11-11 12:00:58 +00:00
Christoph Heiss
d703173520
sourcehut: make /query endpoint config common to all services
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 12:39:28 +01:00
Anthony Roussel
e30f48be94
treewide: fix redirected and broken URLs
Using the script in maintainers/scripts/update-redirected-urls.sh
2023-11-11 10:49:01 +01:00
Félix Baylac Jacqué
dfa45288af maintainers: ninjatrappeur -> picnoir
I changed my nickname from Ninjatrappeur to Picnoir. My github id is
stable, it shouldn't break too much stuff.

I took advantage of this handle change to remove myself from the
hostapd maintainers: I don't use NixOS as a router anymore.
2023-11-11 08:31:16 +01:00
github-actions[bot]
912311b7fd
Merge master into staging-next 2023-11-11 00:02:21 +00:00
tu-maurice
40c06a143f prayer: remove 2023-11-10 20:44:28 -03:00
Steffen Beyer
ae5fe741ba
nixos/roundcube: Ignore newline at end of password file 2023-11-11 00:17:53 +01:00
Martin Weinelt
3536221702
Merge pull request #160346 from mweinelt/hass-custom-everything
home-assistant: custom components and lovelace modules
2023-11-11 00:08:25 +01:00
Kira Bruneau
0cc094c041
Merge pull request #265886 from kira-bruneau/at-spi2-core
nixos/gnome/at-spi2-core: fix disabling a11y in all contexts
2023-11-10 16:31:53 -05:00
Martin Weinelt
f30192ae6f
nixos/home-assistant: add customComponents support
Allows passing custom component packages, that get installed into
home-assistant's state directory.
Python depedencies, that are propagated from the custom component
get passed into `extraPackages`, so they are available to
home-assistant at runtime.

This is implemented in a way, that allows coexistence with custom
components not managed through the NixOS module.
2023-11-10 22:00:36 +01:00
Martin Weinelt
9a941c58e5
nixos/home-assistant: add customLovelaceModules support
Allows the installation of custom lovelace modules, that can inject
css/js into the frontend and offer a wide variety of widgets.
2023-11-10 22:00:30 +01:00
Alyssa Ross
afabc4a15d
Merge remote-tracking branch 'origin/master' into HEAD
Conflicts:
	pkgs/development/libraries/SDL2/default.nix
2023-11-10 15:18:19 +01:00
Anthony Roussel
b0d279d219
nixos/sonic-server: init 2023-11-10 15:10:14 +01:00
Lin Jian
36f4c90526
Merge pull request #266150 from robryk/resticnotimer
nixos/restic: allow timer to be disabled
2023-11-10 17:51:14 +08:00
Silvan Mosberger
4587db7279 nixos/fwupd: Don't ignore stderr 2023-11-10 06:54:45 +01:00
Silvan Mosberger
6bf31e521e nixos/fwupd: Don't use DynamicUser
Was introduced in dde6a4f397
but it doesn't work on my machine:

    fwupdmgr[439074]: Failed to connect to daemon: The connection is closed

Creating a persistent user does work however
2023-11-10 06:51:56 +01:00
Rvfg
92ee71866f
nixos/nat: fix nat-nftables 2023-11-09 23:06:01 +08:00
Anthony Roussel
3dd50eaa8f
nixos/amazon-ssm-agent: fix missing seelog.xml file 2023-11-09 12:02:48 +01:00
github-actions[bot]
00a0662a3c
Merge master into staging-next 2023-11-09 00:02:14 +00:00
Felix Bühler
7aaa664cc2
Merge pull request #263054 from uninsane/pr-trust-dns-0.24.0
trust-dns: 0.23.0 -> 0.24.0
2023-11-08 19:35:23 +01:00
github-actions[bot]
536833ef29
Merge master into staging-next 2023-11-08 18:01:00 +00:00
Caleb
c4d3afef06
wyoming-faster-whisper fix CUDA devices not being detected. (#266167)
This change enables CUDA support by allowing access to /dev/nvidia0.
2023-11-08 13:34:26 +01:00
Ryan Lahfa
bc2b72df73
Merge pull request #264234 from guiguid/guiguid-patch-netdata-systemd-journal
netdata: 1.43.0 -> 1.43.2 and add systemd-journal plugin
2023-11-08 13:30:43 +01:00
Adam Joseph
ba2ed469c2
Merge branch 'master' into staging-next 2023-11-08 06:15:46 +00:00
Rodrigo Gryzinski
23a5f1f80d nixos/wireguard: add wireguard to default kernel modules
Previously the module was only dynamically loaded on service startup,
this is needed in case security.lockKernelModules is enabled.
2023-11-07 22:02:51 -03:00
Robert Obryk
20b202b3c8 nixos/restic: allow timer to be disabled 2023-11-07 22:37:37 +01:00
Felix Buehler
4d1680ccc7 nixos/exportarr: init 2023-11-07 20:56:32 +01:00
github-actions[bot]
1505981287
Merge master into staging-next 2023-11-07 18:00:55 +00:00
Ryan Lahfa
0cd6f66fb7
Merge pull request #247376 from RageKnify/fix/smartd-mail 2023-11-07 18:00:56 +01:00
Malte Poll
9c5825bd27 nixos/athens: init at 0.12.1
Co-authored-by: Paul Meyer <49727155+katexochen@users.noreply.github.com>
2023-11-07 14:43:11 +01:00
github-actions[bot]
bed56440cb
Merge master into staging-next 2023-11-07 12:00:57 +00:00
Anthony Roussel
0908cc1a9e
nixos/tomcat: remove with lib; and use mkEnableOption 2023-11-07 11:35:38 +01:00
Jonas Heinrich
31f01ff179 nixos/printing: Fix openFirewall option 2023-11-07 10:21:48 +01:00
Janik
22aa256c6c
Merge pull request #264882 from robryk/resticfix
nixos/restic: fix #264696 and add a regression test
2023-11-07 09:46:55 +01:00
Gary Guo
bc422e2f61 nixos/unbound: tighten sandboxing for unbound 2023-11-07 02:30:21 +00:00
github-actions[bot]
38bc2a577e
Merge master into staging-next 2023-11-07 00:02:31 +00:00