Commit Graph

17602 Commits

Author SHA1 Message Date
Bobby Rong
3bdcdae69d gnome.gnome-initial-setup: 44.0 → 45.beta
https://gitlab.gnome.org/GNOME/gnome-initial-setup/-/compare/44.0...45.beta

Install dconf presets: 0c607f104e

Use tecla: 3dcb8709ba

Changelog-reviewed-by: Bobby Rong <rjl931189261@126.com>
Changelog-reviewed-by: Jan Tojnar <jtojnar@gmail.com>
2023-11-21 08:41:32 +01:00
Atemu
cfe0155154
Merge pull request #268324 from Janik-Haag/nixos-firewall-tool
nixos/firewall: install nixos-firewall-tool for iptables by default
2023-11-20 23:23:24 +01:00
Jonas Chevalier
c57a434386
maintainers: remove the numtide team (#268684)
It doesn't really make sense for us as team members are focused on
different things. At the end of the day it's the individuals that do the
work.
2023-11-20 22:27:26 +01:00
Ryan Lahfa
5d08323dda
Merge pull request #268717 from SuperSandro2000/patch-2 2023-11-20 19:05:01 +01:00
Nick Cao
90ef10b571
Merge pull request #253918 from tie/centrifugo
centrifugo: init at 5.1.1
2023-11-20 08:59:54 -05:00
Sandro Jäckel
515ce669bc
nixos/postgresql: point doc link to current like all others 2023-11-20 14:44:23 +01:00
Sandro
809f926017
nixos/postgresql: fix mentioned settings in ensurePermissions warnings 2023-11-20 14:42:57 +01:00
Ivan Trubach
3be1aab86f centrifugo: init at 5.1.1 2023-11-20 10:18:21 +03:00
Ivan Trubach
5c898bec57 nixos/redis: loosen systemd address family restrictions
Do not assume that port and unixSocket are the only options that affect
address families used by Redis. There are other options, e.g. tls-port,
and also clustered setup that are not covered by the declarative
configuration. Instead of trying to selectively restrict unused address
families based on the configuration, limit address families to IP and
Unix sockets and let users lib.mkForce a stricter sandboxing is needed.

See also
https://docs.redis.com/latest/rs/networking/port-configurations/
2023-11-20 07:11:34 +03:00
Mario Rodas
fa14a14694
Merge pull request #258036 from anthonyroussel/fix-ssm-seelog
nixos/amazon-ssm-agent: fix missing seelog.xml file
2023-11-19 18:55:57 -05:00
Mario Rodas
c93541b24e
Merge pull request #264910 from anthonyroussel/ocsinventory-agent+nixos
nixos/ocsinventory-agent: init
2023-11-19 18:55:06 -05:00
Emily
1f9a04da3f
Merge pull request #265465 from jpds/caddy-restart-on-failure
nixos/caddy: Set systemd unit to restart on-failure
2023-11-19 23:59:20 +01:00
Artturi
0bd183e065
Merge pull request #268110 from tyxieblub/squid-service 2023-11-19 23:32:10 +02:00
Artturi
b736459b60
Merge pull request #260089 from anthonyroussel/thanos_0_32_4 2023-11-19 18:37:48 +02:00
Ryan Lahfa
ff3b480354
Merge pull request #252117 from nalves599/252116-pixiecore-firewall 2023-11-19 16:16:54 +01:00
Adrian Pistol
b30601bba2 nixos/chrony: Add missing rtcsync assertion.
Due to a lot of rebasing, I dropped my added assertion in #259405. This is important.
2023-11-19 09:08:26 -06:00
Mario Rodas
d3deaacfb4
Merge pull request #263550 from anthonyroussel/updates/axis2
axis2: 1.7.9 -> 1.8.2, tomcat10: 10.0.27 -> 10.1.15, tomcat9: 9.0.75 -> 9.0.82
2023-11-19 09:39:19 -05:00
Paul Meyer
3e4e76e676 greetd: create cache dir for tuigreet 2023-11-19 14:09:48 +01:00
RTUnreal
20e9267cbb factorio: add dynamic server-settings loading 2023-11-18 22:18:03 +01:00
Artturi
8896579a83
Merge pull request #264521 from stephen-huan/mullvad-vpn-resolvconf 2023-11-18 21:47:51 +02:00
Janik H.
fa9cdc83ab
nixos/firewall: install nixos-firewall-tool for iptables by default 2023-11-18 17:08:30 +01:00
Nick Cao
d936414252
Merge pull request #268132 from bendlas/forgejo-release-notes
nixos/forgejo/docs: fix typo
2023-11-18 09:39:29 -05:00
emilylange
b3e8dae766 nixos/forgejo: remove postgresql_15 permission work-around
This is no longer necessary as of
ccfe07c316.

Previously: b8585a119c.
2023-11-18 12:14:09 +01:00
Ryan Lahfa
d3530f494c
Merge pull request #264358 from RaitoBezarius/drop-nodejs 2023-11-17 23:26:13 +01:00
Felix Buehler
7f9abdcfcb nixos/nextcloud: fix docu of packages 2023-11-17 23:16:23 +01:00
William McKinnon
869fb56797 nixos/syncthing: respect the dataDir option
The previous -home argument worked as such:
"Set common configuration and data directory. The default configuration directory is $HOME/.config/syncthing (Unix-like), $HOME/Library/Application Support/Syncthing (Mac) and %LOCALAPPDATA%\Syncthing (Windows)"

This resulted in syncthing not respecting different home and data dirs
declared in its config. The default behaviour will remain the same, as
we set the datadir default value to homeDir + .config/syncthing.
2023-11-17 22:58:46 +01:00
Julien Malka
cac11727b3
Merge pull request #227588 from camillemndn/jitsi-meet
nixos/jitsi-meet: updated prosody, support secure domain setup and Excalidraw whiteboards
2023-11-17 22:08:05 +01:00
Adam C. Stephens
4b8d7d814e
Merge pull request #265556 from adamcstephens/slimserver/fix
slimserver: fix broken package
2023-11-17 15:47:26 -05:00
Raito Bezarius
72911a99d3 code-server: drop
Depends on Node.js 16 and cannot be trivially upgraded to Node.js 18.
2023-11-17 20:26:55 +01:00
Raito Bezarius
022ee4d701 kibana7: drop
Depends on EOL software and no maintenance has been attempted to change this after a ping
(https://github.com/NixOS/nixpkgs/issues/259178)
Feel free to adopt and re-introduce if you care about this software.

This will probably seriously hamper ELK usability in nixpkgs, but as it
receives no maintenance…
2023-11-17 20:26:55 +01:00
Ryan Lahfa
ccfe07c316
Merge pull request #266270 from Ma27/postgresql-ownership-15 2023-11-17 18:02:17 +01:00
Herwig Hochleitner
8c441fc2a7 nixos/forgejo/docs: fix typo 2023-11-17 17:18:57 +01:00
Herwig Hochleitner
e7c7d97167
nixos/postgresql: document psql 15 changes (#267238)
* nixos/postgresql: document psql 15 changes

* nixos/postgresql: manual heading ids

* nixos/postgresql: reword warning against initialScript

Co-authored-by: Ryan Lahfa <masterancpp@gmail.com>

* nixos/postgresql: wording PERMISSIONS -> PRIVILEGES

Co-authored-by: Ryan Lahfa <masterancpp@gmail.com>

* nixos/postgresql: document intermediate oneshot / service user method

* nixos/postgresql/docs: clarify security benefits of `ensureDBOwnership`

* nixos/postgresql/docs: service type -> serviceConfig.Type

---------

Co-authored-by: Ryan Lahfa <masterancpp@gmail.com>
2023-11-17 16:06:01 +01:00
Herwig Hochleitner
20832d5995
nixos/forgejo: changelog and migration instructions (#267248)
* nixos/forgejo: changelog and migration instructions

* nixos/forgejo/docs: clarify sentence

Co-authored-by: Trolli Schmittlauch <schmittlauch@users.noreply.github.com>

* nixos/forgejo/docs: document migration via gitea impersonation

* nixos/forgejo/docs: note about url change on migration

* nixos/forgejo/docs: note about migration (non-)requirement

* nixos/forgejo/docs: header ids

* nixos/forgejo/docs: clarify release notes entry

Co-authored-by: Emily <git@emilylange.de>

* nixos/forgejo/docs: improve manual entry

Co-authored-by: Emily <git@emilylange.de>

* nixos/forgejo/docs: move changelog line to the middle of the section

as noted <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->

---------

Co-authored-by: Trolli Schmittlauch <schmittlauch@users.noreply.github.com>
Co-authored-by: Emily <git@emilylange.de>
2023-11-17 15:55:24 +01:00
Raito Bezarius
10baca4935 nixos/invidious: do not use ensureDBOwnership
Invidious uses a strange setup where the database name is different from the system username
for non-explicit reasons.

Because of that, it makes it hard to migrate it to use `ensureDBOwnership`, we leave it to Invidious' maintainers
to pick up the pieces.
2023-11-17 15:53:08 +01:00
Raito Bezarius
f653734c4d nixos/mobilizon: do not use ensureDBOwnership
Mobilizon can have a custom database username and it is not trivial to sort out how to remove this.

In the meantime, for the upcoming 23.11 release, I apply the classical workaround
and defer to Mobilizon's maintainers.
2023-11-17 15:52:51 +01:00
Raito Bezarius
7cd63bff21 nixos/sourcehut: do not use ensureDBOwnership
Given that SourceHut uses unfortunate defaults for database name, it will not
be realistic to fix this in time for 23.11.

We will leave the workaround and leave it to SourceHut maintainers to pick up the work
to clean this up after 23.11.
2023-11-17 15:52:51 +01:00
Adam Stephens
431b9f23ad
slimserver: add bin symlink and meta.mainProgram 2023-11-17 08:18:32 -05:00
joris
18f3c1fb55 services/squid: explicit usage of coreutils' kill on ExecReload 2023-11-17 13:55:21 +01:00
Martino Fontana
84e51c525d nixos/plasma5: enable dconf by default 2023-11-17 11:48:00 +01:00
Ilan Joselevich
d7e7a2136e
Merge pull request #267761 from jpds/grafana-restart-on-failure
nixos/grafana: Set systemd unit to restart on failure
2023-11-17 00:59:25 +00:00
github-actions[bot]
dba5c9ef4e
Merge master into staging-next 2023-11-16 18:01:17 +00:00
Pol Dellaiera
3acc2484cf
Merge pull request #267560 from anthonyroussel/bugfix/plantuml-server-nixos
nixos/plantuml-server: fix
2023-11-16 18:32:44 +01:00
talyz
4b0b3413b4
nixos/keycloak: Allow setting hostname-url 2023-11-16 16:12:07 +01:00
Kim Lindberger
9c4df4d618
Merge pull request #246992 from cransom/cransom-parsedmarc-smtp
nixos/parsedmarc: fix validation for smtp
2023-11-16 15:06:20 +01:00
github-actions[bot]
301fcc69ba
Merge master into staging-next 2023-11-16 12:01:02 +00:00
Sarah Brofeldt
54f00576aa
Merge pull request #265193 from 0z13/opensearch-module-link-plugins
nixos/opensearch: link plugins from opensearch package
2023-11-16 11:30:09 +01:00
Vladimír Čunát
0fe5300699
Merge branch 'master' into staging-next 2023-11-16 09:49:24 +01:00
Lin Jian
bf8a6ad72c
Merge pull request #265733 from nbdd0121/unbound
nixos/unbound: fix wrong syscall filter and tighten sandbox
2023-11-16 14:38:46 +08:00
Jonathan Davies
58cbf94b38 nixos/grafana: Set systemd unit to restart on failure 2023-11-15 23:20:59 +00:00
Adrian Pistol
7a1d45811e nixos/chrony: Let Chrony control/track RTC drift 2023-11-15 15:09:22 -06:00
Weijia Wang
1a85914512
Merge pull request #266528 from lucasbergman/unifi-jvmoptions
nixos/unifi: Add the ability to specify extra JVM options
2023-11-15 17:53:25 +01:00
Anthony Roussel
8c7c1e7a30
nixos/plantuml-server: remove deprecated allowPlantumlInclude option
See https://github.com/plantuml/plantuml-server/pull/301
2023-11-15 15:14:28 +01:00
Anthony Roussel
deae39af43
nixos/plantuml-server: use jetty_11
PlantUML Server does not support Jetty versions higher than 12.x.

Jetty 12.x has introduced major breaking changes, see
* https://github.com/jetty/jetty.project/releases/tag/jetty-12.0.0
* https://eclipse.dev/jetty/documentation/jetty-12/programming-guide/index.html#pg-migration-11-to-12
2023-11-15 15:14:28 +01:00
Anthony Roussel
2c94d267c2
nixos/plantuml-server: use mkPackageOptionMD 2023-11-15 15:12:58 +01:00
Anthony Roussel
3b17b80525
nixos/plantuml-server: add anthonyroussel to maintainers 2023-11-15 15:12:58 +01:00
Anthony Roussel
09e9d47508
nixos/plantuml-server: add hardening 2023-11-15 15:12:58 +01:00
Anthony Roussel
e3839eef71
nixos/plantuml-server: remove with lib; notation
https://nix.dev/guides/best-practices#with-scopes
2023-11-15 15:12:58 +01:00
Izorkin
63ed35dac4 nixos/mastodon: update elasticsearch configuration 2023-11-15 14:01:47 +01:00
Vladimír Čunát
c46eae0f35
Merge branch 'master' into staging-next 2023-11-15 07:33:10 +01:00
Ryan Lahfa
d983d6c863
Merge pull request #251950 from erictapen/mastodon 2023-11-15 01:46:50 +01:00
zzywysm
3f4c802d26 initrd/autofs4: remove legacy references to autofs4 kernel module
Back in 2018, the kernel decided to remove the autofs4 module.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2225d931f75ddd3c39f4d0d195fad99dfd68671

This caused immediate problems with systemd, so the kernel allowed autofs4 as a config option that would simply map back to autofs.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d02d21ea007b6b33cdaf15c2f84fb1fea996ecc2

Earlier this year, in July 2023, the kernel got tired of people not adapting to the autofs change, and forced the issue by fixing it within the kernel defconfigs, which NixOS uses as a starting point for their own kernel configs.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f2190d6b7112d22d3f8dfeca16a2f6a2f51444e

This commit reflects the post-2018 reality by changing the remaining autofs4 references to autofs. Since this change initially happened in kernel 4.18 and we no longer support 4.x kernels, we don't need any backwards-compatibility tweaks.
2023-11-14 15:37:50 -05:00
Kerstin Humm
c82195d9e8
mastodon: 4.1.6 -> 4.2.1
- run streaming processes in separate systemd services
- remove redundancy in test
- fix update script
- release notes

See https://github.com/mastodon/mastodon/releases/tag/v4.2.1 for details
2023-11-14 21:13:46 +01:00
Nathan Henrie
6c69d3c9ca nixos/navidrome: add openFirewall option
This adds an option to the navidrome module to open the configured TCP
port in the firewall.
2023-11-14 19:29:08 +01:00
Jonathan Zielinski
aca76b750d nixos/opensearch: link plugins from opensearch package
disable security module by default, it crashes unit expecting
certificates.
2023-11-14 14:00:30 +01:00
Martin Weinelt
3c336a1647
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
- pkgs/development/libraries/gdcm/default.nix
2023-11-14 13:16:34 +01:00
Tomas Antonio Lopez
5476b490d4 nixos/sourcehut: compile and integrate paste.sr.ht API component 2023-11-14 11:12:14 +01:00
Niklas Hambüchen
f9c7c12de6
Merge pull request #266702 from nh2/plausible-listen-address-no-distributed-erlang
plausible, nixos/plausible: Add `listenAddress` option
2023-11-14 10:52:21 +01:00
Niklas Hambüchen
65a471717c plausible, nixos/plausible: Add listenAddress option.
This changes

* the plausible HTTP web server

to be listening on localhost only, explicitly.

This makes Plausible have an explicit safe default configuration,
like all other networked services in NixOS.

For background discussion, see: https://github.com/NixOS/nixpkgs/issues/130244

As per my upstream Plausible contribution
(https://github.com/plausible/analytics/pull/1190)
Plausible >= 1.5 also defaults to listening to localhost only;
nevertheless, this default should be stated explicitly in nixpkgs
for easier review and independence from upstream changes, and
a NixOS user must be able to configure the
`listenAddress`, as there are valid use cases for that.

Also, disable

* the Erlang Beam VM inter-node RPC port
* the Erlang EPMD port

because Plausible does not use them (see added comment).
This is done by setting `RELEASE_DISTRIBUTION=none`.

Thus, this commit also removes the NixOS setting `releaseCookiePath`,
because it now has no effect.
2023-11-14 10:51:16 +01:00
Jörg Thalheim
54fd866569 nixos/harmonia: set extra-allowed-users
This fixes the case where users enable harmonia but also have allowed-users set.
Having extra-allowed-users is a no-op when nix.settings.allowed-users is set to "*" (the default)
2023-11-14 10:37:39 +01:00
Silvan Mosberger
3e5bc28ec5
Merge pull request #266598 from infinisil/fix-fwupd
nixos/fwupd: Fix fwupd-refresh service
2023-11-14 08:56:25 +01:00
github-actions[bot]
6a7c026ba7
Merge master into staging-next 2023-11-14 06:01:03 +00:00
eyjhb
2387a37fa0 nixos/flexget: remove TZ envvar 2023-11-14 06:35:40 +01:00
github-actions[bot]
772c3bbbf5
Merge master into staging-next 2023-11-14 00:02:14 +00:00
Julien Moutinho
accbc67b04 nixos/transmission: use mkDefault on PrivateMounts and PrivateUsers 2023-11-13 23:24:55 +01:00
Julien Moutinho
dd77a799f8 nixos/transmission: /run/host must be writable, fixes #258793 2023-11-13 23:23:44 +01:00
Felix Bühler
f2fc5b4195
Merge pull request #265696 from Stunkymonkey/nixos-exportarr
nixos/exportarr: init
2023-11-13 22:58:32 +01:00
Fabián Heredia Montiel
884449105e Merge remote-tracking branch 'origin/master' into staging-next 2023-11-13 14:31:51 -06:00
Raito Bezarius
d57926c0b6 nixos/postgresql: improve the assertions for equality of DB user and DB name
It is hard to figure out which one is offending without the database name.
2023-11-13 17:16:25 +01:00
Raito Bezarius
12797a6a39 nixos/postgresql: restore ensurePermissions and strong-deprecate it
As it is technically a breaking change, we should at least make a strong deprecation
of `ensurePermissions` and leave it in the broken state it is, for out of tree users.

We give them a 6 months notice to migrate away by doing so, which is honest.
In the meantime, we forbid usage of `ensurePermissions` inside of nixpkgs.
2023-11-13 17:16:25 +01:00
Maximilian Bosch
48459567ae nixos/postgresql: drop ensurePermissions, fix ensureUsers for postgresql15
Closes #216989

First of all, a bit of context: in PostgreSQL, newly created users don't
have the CREATE privilege on the public schema of a database even with
`ALL PRIVILEGES` granted via `ensurePermissions` which is how most of
the DB users are currently set up "declaratively"[1]. This means e.g. a
freshly deployed Nextcloud service will break early because Nextcloud
itself cannot CREATE any tables in the public schema anymore.

The other issue here is that `ensurePermissions` is a mere hack. It's
effectively a mixture of SQL code (e.g. `DATABASE foo` is relying on how
a value is substituted in a query. You'd have to parse a subset of SQL
to actually know which object are permissions granted to for a user).

After analyzing the existing modules I realized that in every case with
a single exception[2] the UNIX system user is equal to the db user is
equal to the db name and I don't see a compelling reason why people
would change that in 99% of the cases. In fact, some modules would even
break if you'd change that because the declarations of the system user &
the db user are mixed up[3].

So I decided to go with something new which restricts the ways to use
`ensure*` options rather than expanding those[4]. Effectively this means
that

* The DB user _must_ be equal to the DB name.
* Permissions are granted via `ensureDBOwnerhip` for an attribute-set in
  `ensureUsers`. That way, the user is actually the owner and can
  perform `CREATE`.
* For such a postgres user, a database must be declared in
  `ensureDatabases`.

For anything else, a custom state management should be implemented. This
can either be `initialScript`, doing it manual, outside of the module or
by implementing proper state management for postgresql[5], but the
current state of `ensure*` isn't even declarative, but a convergent tool
which is what Nix actually claims to _not_ do.

Regarding existing setups: there are effectively two options:

* Leave everything as-is (assuming that system user == db user == db
  name): then the DB user will automatically become the DB owner and
  everything else stays the same.

* Drop the `createDatabase = true;` declarations: nothing will change
  because a removal of `ensure*` statements is ignored, so it doesn't
  matter at all whether this option is kept after the first deploy (and
  later on you'd usually restore from backups anyways).

  The DB user isn't the owner of the DB then, but for an existing setup
  this is irrelevant because CREATE on the public schema isn't revoked
  from existing users (only not granted for new users).

[1] not really declarative though because removals of these statements
    are simply ignored for instance: https://github.com/NixOS/nixpkgs/issues/206467
[2] `services.invidious`: I removed the `ensure*` part temporarily
    because it IMHO falls into the category "manage the state on your
    own" (see the commit message). See also
    https://github.com/NixOS/nixpkgs/pull/265857
[3] e.g. roundcube had `"DATABASE ${cfg.database.username}" = "ALL PRIVILEGES";`
[4] As opposed to other changes that are considered a potential fix, but
    also add more things like collation for DBs or passwords that are
    _never_ touched again when changing those.
[5] As suggested in e.g. https://github.com/NixOS/nixpkgs/issues/206467
2023-11-13 17:16:25 +01:00
Molly Miller
9cec5c807a nixos/mailman: restart services on failure and increase mailman timeouts 2023-11-13 16:10:55 +01:00
Jonas Heinrich
4f38dbab82
Merge pull request #266025 from onny/cups-firewall2
nixos/printing: Fix openFirewall option
2023-11-13 11:15:18 +01:00
dadada
f192930a79
nixos/soft-serve: fix typos in option descriptions 2023-11-12 22:34:54 +01:00
Weijia Wang
74d102ce50 Merge branch 'master' into staging-next 2023-11-12 19:45:20 +01:00
Jörg Thalheim
44cf4801c0 nixos/nix-serve: also set extra-allowed-users
This fixes the case where users enable nix-serve but also have allowed-users set.
Having extra-allowed-users is a no-op when nix.settings.allowed-users is set to "*" (the default)
2023-11-12 14:09:31 +01:00
Anthony Roussel
d4d6602ce3
nixos/thanos: remove with lib; notation
https://nix.dev/guides/best-practices#with-scopes
2023-11-12 11:21:47 +01:00
Anthony Roussel
65be712043
nixos/thanos: use mkPackageOptionMD 2023-11-12 11:08:53 +01:00
Anthony Roussel
9abb2a2116
nixos/thanos: remove deprecations
* replaced store.grpc.series-sample-limit by store.limits.request-samples
* replaced query.replica-label by query.replica-labels
* replaced store.addresses by endpoints
* removed block-sync-concurrency (removed upstream)
2023-11-12 11:08:52 +01:00
Anthony Roussel
abed24c0d6
nixos/thanos: fix documentation 2023-11-12 11:08:52 +01:00
Anthony Roussel
312e7f8ae0
nixos/thanos: add ExecReload command to SystemD services 2023-11-12 11:08:52 +01:00
Anthony Roussel
0d9bef343b
nixos/thanos: fix services.thanos.receive.labels config 2023-11-12 11:08:51 +01:00
Anthony Roussel
2074409c86
nixos/thanos: add query-frontend SystemD service 2023-11-12 11:08:51 +01:00
Lucas Bergman
07828dc05b nixos/unifi: Add extraJvmOptions option
This can be useful for adding extra logging, tweaking garbage collector
parameters, and for using JMX to monitor the JVM.
2023-11-12 00:38:10 +00:00
Lucas Bergman
50ff8ff3f9 nixos/unifi: Switch command line args to a list
There's no functionality change here, but this makes it a bit more
convenient to add more args.
2023-11-12 00:32:50 +00:00
Lucas Bergman
2bc02c0383 nixos/unifi: Clean up formatting
This removes "with lib", which advances #208242 a bit, and cleans up a few
formatting nits found by nixfmt.
2023-11-12 00:28:40 +00:00
Sebastian Sinnlos
71dd9c3d53 nixos/nextcloud: missing ocm-dir applys also from 26.0.8 onward
ocmProviderIsNotAStaticDirAnymore applys also to nextcloud26 form 26.0.8
onwards til EOL in 2024-03
2023-11-12 01:11:00 +01:00
github-actions[bot]
33248a2caf
Merge master into staging-next 2023-11-12 00:02:14 +00:00
tomberek
7859adb9d6
Merge pull request #245394 from christoph-heiss/pkgs/sourcehut
sourcehut: update all component; lots of fixes
2023-11-11 13:42:19 -05:00
github-actions[bot]
9776723357
Merge master into staging-next 2023-11-11 18:00:58 +00:00
Maciej Krüger
e9a5bf8ae4
Merge pull request #265712 from nbraud/nixos/sudo-rs/akkoma 2023-11-11 18:10:25 +01:00
K900
e792d7fec0
Merge pull request #264442 from anthonyroussel/update-url-redirects
treewide: fix redirected and broken URLs
2023-11-11 18:08:59 +03:00
Christoph Heiss
88a3d2a0b4
sourcehut: fix postgresql database permission for postgresql >= 15
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 15:50:16 +01:00
Christoph Heiss
66b86f8a2e
sourcehut: de-duplicate nginx add_header directives
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 14:14:59 +01:00
Christoph Heiss
acd21dad52
sourcehut: use systemd.tmpfiles instead of manually creating logfiles
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 14:14:59 +01:00
Christoph Heiss
641e54bb28
sourcehut: create logs directory unconditionally
An empty log directory, in case it stays unused, does not hurt anyone.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
fc6addb147
sourcehut: reword api-origin option description
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
78cc2783c8
sourcehut: drop obsolete services array in favor of indivdual enable flags
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
6b25e09d2d
sourcehut: fix up some more bin paths
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
5841d27497
sourcehut: explicitly disallow openssh to socket-active
This breaks the (already fragile) gitsrht-dispatch -> gitsrht-keys
command chain.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
c39ba7f5b1
sourcehut: remove set -x from ssh commands
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:46 +01:00
Christoph Heiss
6648488333
sourcehut: fix logging of git/hg ssh commands
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:45 +01:00
Christoph Heiss
6e51802196
sourcehut: fix repos path by using actual settings value
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:32 +01:00
Christoph Heiss
c123a37be6
sourcehut.gitsrht: 0.78.20 -> 0.84.2
Newer version of the gitsrht-api service call setrlimit() on startup,
thus allow it in the `SystemCallFilter` definition for the service.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:30 +01:00
github-actions[bot]
652204165d
Merge master into staging-next 2023-11-11 12:00:58 +00:00
Christoph Heiss
d703173520
sourcehut: make /query endpoint config common to all services
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 12:39:28 +01:00
Anthony Roussel
e30f48be94
treewide: fix redirected and broken URLs
Using the script in maintainers/scripts/update-redirected-urls.sh
2023-11-11 10:49:01 +01:00
Félix Baylac Jacqué
dfa45288af maintainers: ninjatrappeur -> picnoir
I changed my nickname from Ninjatrappeur to Picnoir. My github id is
stable, it shouldn't break too much stuff.

I took advantage of this handle change to remove myself from the
hostapd maintainers: I don't use NixOS as a router anymore.
2023-11-11 08:31:16 +01:00
github-actions[bot]
912311b7fd
Merge master into staging-next 2023-11-11 00:02:21 +00:00
tu-maurice
40c06a143f prayer: remove 2023-11-10 20:44:28 -03:00
Steffen Beyer
ae5fe741ba
nixos/roundcube: Ignore newline at end of password file 2023-11-11 00:17:53 +01:00
Martin Weinelt
3536221702
Merge pull request #160346 from mweinelt/hass-custom-everything
home-assistant: custom components and lovelace modules
2023-11-11 00:08:25 +01:00
Kira Bruneau
0cc094c041
Merge pull request #265886 from kira-bruneau/at-spi2-core
nixos/gnome/at-spi2-core: fix disabling a11y in all contexts
2023-11-10 16:31:53 -05:00
Martin Weinelt
f30192ae6f
nixos/home-assistant: add customComponents support
Allows passing custom component packages, that get installed into
home-assistant's state directory.
Python depedencies, that are propagated from the custom component
get passed into `extraPackages`, so they are available to
home-assistant at runtime.

This is implemented in a way, that allows coexistence with custom
components not managed through the NixOS module.
2023-11-10 22:00:36 +01:00
Martin Weinelt
9a941c58e5
nixos/home-assistant: add customLovelaceModules support
Allows the installation of custom lovelace modules, that can inject
css/js into the frontend and offer a wide variety of widgets.
2023-11-10 22:00:30 +01:00
Alyssa Ross
afabc4a15d
Merge remote-tracking branch 'origin/master' into HEAD
Conflicts:
	pkgs/development/libraries/SDL2/default.nix
2023-11-10 15:18:19 +01:00
Anthony Roussel
b0d279d219
nixos/sonic-server: init 2023-11-10 15:10:14 +01:00
Lin Jian
36f4c90526
Merge pull request #266150 from robryk/resticnotimer
nixos/restic: allow timer to be disabled
2023-11-10 17:51:14 +08:00
Silvan Mosberger
4587db7279 nixos/fwupd: Don't ignore stderr 2023-11-10 06:54:45 +01:00
Silvan Mosberger
6bf31e521e nixos/fwupd: Don't use DynamicUser
Was introduced in dde6a4f397
but it doesn't work on my machine:

    fwupdmgr[439074]: Failed to connect to daemon: The connection is closed

Creating a persistent user does work however
2023-11-10 06:51:56 +01:00
Rvfg
92ee71866f
nixos/nat: fix nat-nftables 2023-11-09 23:06:01 +08:00
Anthony Roussel
3dd50eaa8f
nixos/amazon-ssm-agent: fix missing seelog.xml file 2023-11-09 12:02:48 +01:00
github-actions[bot]
00a0662a3c
Merge master into staging-next 2023-11-09 00:02:14 +00:00
Felix Bühler
7aaa664cc2
Merge pull request #263054 from uninsane/pr-trust-dns-0.24.0
trust-dns: 0.23.0 -> 0.24.0
2023-11-08 19:35:23 +01:00
github-actions[bot]
536833ef29
Merge master into staging-next 2023-11-08 18:01:00 +00:00
Caleb
c4d3afef06
wyoming-faster-whisper fix CUDA devices not being detected. (#266167)
This change enables CUDA support by allowing access to /dev/nvidia0.
2023-11-08 13:34:26 +01:00
Ryan Lahfa
bc2b72df73
Merge pull request #264234 from guiguid/guiguid-patch-netdata-systemd-journal
netdata: 1.43.0 -> 1.43.2 and add systemd-journal plugin
2023-11-08 13:30:43 +01:00
Adam Joseph
ba2ed469c2
Merge branch 'master' into staging-next 2023-11-08 06:15:46 +00:00
Rodrigo Gryzinski
23a5f1f80d nixos/wireguard: add wireguard to default kernel modules
Previously the module was only dynamically loaded on service startup,
this is needed in case security.lockKernelModules is enabled.
2023-11-07 22:02:51 -03:00
Robert Obryk
20b202b3c8 nixos/restic: allow timer to be disabled 2023-11-07 22:37:37 +01:00
Felix Buehler
4d1680ccc7 nixos/exportarr: init 2023-11-07 20:56:32 +01:00
github-actions[bot]
1505981287
Merge master into staging-next 2023-11-07 18:00:55 +00:00
Ryan Lahfa
0cd6f66fb7
Merge pull request #247376 from RageKnify/fix/smartd-mail 2023-11-07 18:00:56 +01:00
Malte Poll
9c5825bd27 nixos/athens: init at 0.12.1
Co-authored-by: Paul Meyer <49727155+katexochen@users.noreply.github.com>
2023-11-07 14:43:11 +01:00
github-actions[bot]
bed56440cb
Merge master into staging-next 2023-11-07 12:00:57 +00:00
Anthony Roussel
0908cc1a9e
nixos/tomcat: remove with lib; and use mkEnableOption 2023-11-07 11:35:38 +01:00
Jonas Heinrich
31f01ff179 nixos/printing: Fix openFirewall option 2023-11-07 10:21:48 +01:00
Janik
22aa256c6c
Merge pull request #264882 from robryk/resticfix
nixos/restic: fix #264696 and add a regression test
2023-11-07 09:46:55 +01:00
Gary Guo
bc422e2f61 nixos/unbound: tighten sandboxing for unbound 2023-11-07 02:30:21 +00:00
github-actions[bot]
38bc2a577e
Merge master into staging-next 2023-11-07 00:02:31 +00:00
Jörg Thalheim
a7c984b7a2 nixos/mediawiki: pin php to 8.1 2023-11-06 22:52:42 +01:00
Jörg Thalheim
915ad8a77b nixos/mediawiki: fix rewrites for static ressources and rest API 2023-11-06 22:52:42 +01:00
Gary Guo
de6c5343b6 nixos/unbound: remove setuid/gid capability
If username is set, then unbound will try to become that user using
`setusercontext`. But this is pointless since we are already instructing
systemd to launch unbound with that user.

So force username to be empty, which disables this behaviour in unbound.
This allows us to remove the capability granted, and also tighten the
syscall filter.
2023-11-06 20:22:27 +00:00
Martin Weinelt
a3708ce91c
Merge pull request #230380 from graham33/feature/zwave-js-server_module
zwave-js: module init, zwave-js-server: init at 1.33.0
2023-11-06 20:24:56 +01:00
Jonathan Davies
79e7841ff7 nixos/caddy: Set systemd unit to restart on-failure whilst ignoring
error code 1.

This is what's recommended by systemd for long-running services and
helps with recovering from crashes.
2023-11-06 18:27:47 +00:00
Kira Bruneau
9dec7a00ad nixos/gnome/at-spi2-core: fix disabling a11y in all contexts
`environment.variables` gets sourced by shells & the x11 wrapper
through bash's `/etc/profile`, but not by systemd services, dbus
services, wayland sessions...

`environment.sessionVariables` sets these variables with PAM early in
the login process so it gets applied in all contexts.

I ran into a similar issue before in #109060.
2023-11-06 12:40:38 -05:00
Colin
83bf3ed892 trust-dns: 0.23.0 -> 0.24.0
upstream is in the process of renaming to `hickory-dns`.
a consequence of this is that the main binary has been renamed from
`trust-dns` to `hickory-dns` and the repository has been moved (though
for the time being the old repo is still usable on account that it
redirects to the new one).
see: <https://bluejekyll.github.io/blog/posts/announcing-hickory-dns/>
2023-11-06 15:38:23 +00:00
Weijia Wang
32da89a1a1 Merge branch 'master' into staging-next 2023-11-06 14:33:18 +01:00
Michele Guerini Rocco
8beca974f9
Merge pull request #263138 from tomfitzhenry/hostapd-optional-managementframeprotection
nixos/hostapd: remove managementFrameProtection in favour of clearer default
2023-11-06 11:17:07 +01:00
Ivan Petkov
49f444897b syncoid: disable PrivateUsers in systemd unit
* leaving PrivateUsers=true appears to break when using zfs-2.2.0
2023-11-06 10:16:15 +01:00
github-actions[bot]
b23f12e076
Merge master into staging-next 2023-11-06 00:02:12 +00:00
Maximilian Bosch
19bbcbade3
Merge pull request #265071 from 999eagle/feat/matrix-sliding-sync-update
nixos/matrix-sliding-sync: add dependency on matrix-synapse if running locally
2023-11-05 23:24:01 +01:00
nicoo
6f28ce9856 nixos/x2goserver: Work with both Miller's sudo and sudo-rs 2023-11-05 20:59:15 +00:00
nicoo
690f027251 nixos/ssm-agent: Handle sudo-rs too 2023-11-05 20:49:41 +00:00
Sophie Tauchert
8627e0ef58
nixos/matrix/*: change dependencies on matrix-synapse.service to serviceUnit 2023-11-05 21:43:08 +01:00
Sophie Tauchert
70dc536ae0
nixos/matrix-synapse: add readOnly serviceUnit option
This is useful to configure services dependent on matrix-synapse regardless
of whether workers are enabled or not.
2023-11-05 21:38:39 +01:00
Gary Guo
c70614c0a4 nixos/unbound: fix wrong syscall filter
This changes the syscall filter to match that of upstream. Note that

    SystemCallFilter=~foo bar

is completely different from

    SystemCallFilter=~foo
    SystemCallFilter=bar

The former one means that foo and bar are forbidden, and the latter
one means foo is forbidden and bar is granted!
2023-11-05 20:32:51 +00:00
Sophie Tauchert
c8b5539626
nixos/matrix-sliding-sync: add dependency on matrix-synapse if running locally and restart 2023-11-05 21:31:20 +01:00
nicoo
19af28537b nixos/btrbk: Support both Miller's sudo and sudo-rs 2023-11-05 20:15:18 +00:00
nicoo
9aee9b163e nixos/akkoma: Do not warn under sudo-rs 2023-11-05 18:40:33 +00:00
github-actions[bot]
bb38778356
Merge master into staging-next 2023-11-05 18:00:55 +00:00
Jonas Heinrich
35128eb6f8
nixos/printing: Add openFirewall option (#176539) 2023-11-05 16:01:20 +01:00
Aaron Andersen
a707831d98
Merge pull request #256738 from toastal/prosody-libevent-deprecated
prosody: remove deprecated libevent
2023-11-05 08:36:25 -05:00
github-actions[bot]
2ecaf22639
Merge master into staging-next 2023-11-05 12:01:15 +00:00
Leah Amelia Chen
30f2f955fe nixos/greetd: autostart GNOME Keyring when enabled
The PAM service `greetd` creates now autostarts GNOME Keyring when it is
enabled via `services.gnome.gnome-keyring.enable`.

Should cause a lot fewer headaches for people like me who didn't know
why GNOME Keyring was complaining that it was never supplied with login details.

Fixes #246197
2023-11-05 12:22:52 +01:00
Weijia Wang
9627659c22 Merge branch 'master' into staging-next 2023-11-04 17:27:09 +01:00
K900
ea9372de82
Merge pull request #265482 from alois31/plasma-setuid
nixos/plasma5: fix mismatch between nix and module system
2023-11-04 19:08:55 +03:00
Alois Wohlschlager
dee9519abe
nixos/plasma5: fix mismatch between nix and module system
In https://github.com/NixOS/nixpkgs/pull/254071, a mismatch between usage of
the Nix language and the NixOS module system was introduced. By merging the
kwin_wayland wrapper attrset into the mkIf representation, the former was
effectively ignored.
As a result, the capability wrapper for kwin_wayland stopped being installed,
leading to realtime scheduling being disabled. The issue was not detected
because the behavioral change is very subtle.

By consistently using language-level constructs, this mismatch is resolved.
The capability wrapper is thus installed again and realtime scheduling is
restored.
2023-11-04 16:33:38 +01:00
Felix Bühler
85f1ba3e51
Merge pull request #263173 from r-ryantm/auto-update/freshrss
freshrss: 1.21.0 -> 1.22.1
2023-11-04 13:09:36 +01:00
github-actions[bot]
2c3155e94d
Merge master into staging-next 2023-11-04 12:00:55 +00:00
Maximilian Bosch
845cf9943c
Merge pull request #264582 from FliegendeWurst/throttled-modprobe
nixos/throttled: load required kernel module
2023-11-04 12:27:38 +01:00
illustris
ef9732e11f
spark: remove untarDir 2023-11-04 13:01:45 +05:30
github-actions[bot]
3c43b804d4
Merge master into staging-next 2023-11-03 18:01:23 +00:00
Michele Guerini Rocco
5654dea8a5
Merge pull request #264787 from katexochen/feat/xkb-extralayouts
nixos/x11: move extraLayouts into xkb attrset
2023-11-03 13:49:14 +01:00
github-actions[bot]
db0a71076b
Merge master into staging-next 2023-11-03 12:01:07 +00:00
Peter Hoeg
f4856b55dd nixos/fwupd: make auto-refresh run (and work) 2023-11-03 10:54:41 +01:00
github-actions[bot]
75a11d85b8
Merge master into staging-next 2023-11-03 00:02:23 +00:00
Alexandru Scvortov
cbbe57bc52 elixir: make 1.15 default and pin existing pkgs to 1.14 2023-11-02 20:16:00 +00:00
github-actions[bot]
29efc257c0
Merge master into staging-next 2023-11-02 18:01:07 +00:00
Janik H.
15babfbc12
nixos/woodpecker-server: fix environmentFile example 2023-11-02 18:14:46 +01:00
Janik
8a897821fe
Merge pull request #262781 from Janik-Haag/woodpecker
nixos/woodpecker-server: change type of environmentFile to list of paths
2023-11-02 17:40:07 +01:00
Maximilian Bosch
dbb68f0b49
Merge pull request #263558 from Ma27/fix-image-renderer-callback
nixos/grafana-image-renderer: use Grafana's http_addr rather than localhost
2023-11-02 15:49:23 +01:00
Anthony Roussel
efdbdab8b5
nixos/ocsinventory-agent: init 2023-11-02 14:20:45 +01:00
Graham Bennett
b2fccae809 zwave-js: module init, zwave-js-server: init at 1.33.0
Co-authored-by: Martin Weinelt <mweinelt@users.noreply.github.com>
Co-authored-by: h7x4 <h7x4@nani.wtf>
2023-11-02 08:21:09 +00:00
github-actions[bot]
e67e95c1d1
Merge master into staging-next 2023-11-02 06:01:16 +00:00
Martin Weinelt
0b2ab262bc
home-assistant: 2023.10.5 -> 2023.11.0
https://www.home-assistant.io/blog/2023/11/01/release-202311/
2023-11-01 22:28:12 +01:00
Stephen Huan
09cc3285cc
nixos/mullvad-vpn: use resolvconf if enabled 2023-11-01 16:47:11 -04:00
Robert Obryk
536401e90a nixos/restic: fix #264696 and add a regression test
Make sure that preStart and postStop are included in all cases when they are nonempty.
2023-11-01 21:18:56 +01:00
h7x4
5672d3d8b8
nixos/quicktun: clean up module 2023-11-01 20:10:14 +01:00
github-actions[bot]
4a533d29ce
Merge master into staging-next 2023-11-01 12:01:10 +00:00
Martin Weinelt
05e8361387
Merge pull request #261867 from matrss/set-paperless-secret-key
nixos/paperless: set PAPERLESS_SECRET_KEY
2023-11-01 12:33:23 +01:00
Felix Buehler
29d41b7fd2 nixos/freshrss: migrate to DATA_PATH 2023-11-01 12:31:42 +01:00
Paul Meyer
143680787e nixos/x11: move extraLayouts into xkb attrset
[Motivation](NixOS#257817 (comment))

`extraLayouts` was missed in #259891, so moving it to the other xkb
options with this PR.

Signed-off-by: Paul Meyer <49727155+katexochen@users.noreply.github.com>
2023-11-01 11:55:25 +01:00
Jakob Schöttl
7a363cef5f nixos/dolibarr: add package option
Allow users to easily use a different dolibarr version, e.g. version 18
(currently in unstable) instead of 16.
2023-11-01 08:50:36 +01:00
github-actions[bot]
0d2063b693
Merge master into staging-next 2023-11-01 00:02:16 +00:00
Guillaume DELVIT
043522789b nixos/services/netdata: add systemd-journald plugin as a privileged wrapper
https://learn.netdata.cloud/docs/logs/systemd-journal/
need acces to

    Kernel Logs (dmesg):
        Capability: CAP_SYSLOG
        Description: This capability allows the program to read kernel logs using the dmesg command or by reading the /dev/kmsg file.

    System Logs (e.g., /var/log/syslog):
        Capability: CAP_DAC_READ_SEARCH
        Description: This capability allows the program to read system logs located in directories such as /var/log/.

    User Logs (e.g., /var/log/auth.log):
        Capability: CAP_DAC_READ_SEARCH
        Description: This capability allows the program to read user logs located in directories such as /var/log/.
2023-11-01 00:16:30 +01:00
Robert Hensing
29697af6ae
Merge pull request #258068 from Izorkin/update-peertube
peertube: 5.1.0 -> 5.2.1
2023-10-31 23:44:14 +01:00
FliegendeWurst
1391725fb5 nixos/throttled: load required kernel module 2023-10-31 22:14:02 +01:00
github-actions[bot]
81270bbdcf
Merge master into staging-next 2023-10-31 18:01:02 +00:00
Robin Gloster
7e2992c01b
Merge pull request #264584 from Ma27/drop-privacyidea
privacyidea: remove
2023-10-31 16:46:37 +01:00
Janik H.
8e5729517e
nixos/woodpecker-server: change type of environmentFile to list of paths 2023-10-31 15:46:53 +01:00
K900
46bc9e79a9
Merge pull request #259765 from 70m6/bugfix/bitcoind-enable
bugfix/bitcoind-enable
2023-10-31 17:35:10 +03:00
Tom Barrett
a4b31637b5 bitcoind: only use enabled services 2023-10-31 15:29:17 +01:00
Maximilian Bosch
5927d55685
privacyidea: remove
Related to #262907 (Django3 removal from nixpkgs).

This package already required an unreasonable amount of maintenance
regularly for a such small leaf-package. It has a few highly outdated
dependencies (e.g. flask 1, jinja2 2.11, sqlalchemy 1.3).

After at least each Python package-set update one had to fix up a lot of
dependencies to fix the package itself, so it was only useful on stable
branches. And having so much outdated software in a security-sensitive
piece of software seems questionable.

Finally, globin and I won't be available for maintaining this now that
Mayflower is migrating to another solution (and we'll do that as well)
and I'd expect this to bitrot extremely quick if we both bail out.
2023-10-31 14:17:48 +01:00
github-actions[bot]
2fd5f8dd7a
Merge master into staging-next 2023-10-31 12:01:11 +00:00
Alexandru Scvortov
fa54eeea5c livebook: add systemd user service, test, and docs
Co-authored-by: Yt <happysalada@tuta.io>
2023-10-31 07:31:18 +00:00
github-actions[bot]
97868dae8e
Merge master into staging-next 2023-10-31 06:00:58 +00:00
Mario Rodas
1122fb5123
Merge pull request #264250 from Ma27/rm-postgres-11
postgresql_11: remove
2023-10-30 21:36:56 -05:00
github-actions[bot]
135430eb60
Merge master into staging-next 2023-10-31 00:02:27 +00:00
Martin Weinelt
e3647a1769
nixos/wyoming/openwakeword: fix typo in attribute name 2023-10-31 00:42:04 +01:00
Martin Weinelt
5da8c00f11
Merge pull request #264404 from mweinelt/wyoming-openwakeword-1.8.1
wyoming-openwakeword: 1.5.1 -> 1.8.1
2023-10-30 22:53:25 +01:00
Martin Weinelt
3f224f0607
Merge pull request #264214 from mweinelt/wyoming-faster-whisper-device-param
nixos/wyoming/faster-whisper: pass device config to executable
2023-10-30 22:27:24 +01:00
github-actions[bot]
931938d1df
Merge master into staging-next 2023-10-30 18:01:02 +00:00
Lin Jian
bb3474f826
Merge pull request #264008 from arcnmx/xmrig-mainProgram
xmrig: add meta.mainProgram
2023-10-31 01:21:25 +08:00
K900
7bc18b63da
Merge pull request #227633 from ElvishJerricco/systemd-stage-1-fix-initrd-commands
Systemd stage 1 assert initrd commands are empty
2023-10-30 20:03:44 +03:00
Martin Weinelt
e458280606
nixos/wyoming/openwakeword: update for 1.8.1
Remove the deprecated --models option, as models are now discovered
and loaded dynamically from all configured model dirs at runtime.

Allow setting up custom model directories, so wake words other than the
built-in ones can be used, e.g. from
https://github.com/fwartner/home-assistant-wakewords-collection.
2023-10-30 18:00:28 +01:00
Martin Weinelt
0d34502fe3
nixos/wyoming/openwakeword: relax model selection
The wyoming-openwakeword supports a custom model directory, which cannot
be used when the the model list is constrained to the builtin ones.
2023-10-30 16:21:58 +01:00
Will Fancher
cca22054c0 systemd-stage-1: Add assertions for unsupported options. 2023-10-30 12:15:58 +01:00
Maximilian Bosch
1220a4d4dd
postgresql_11: remove
As described in the release lifecycle docs from postgresql[1], v11 will
stop receiving fixes as of Nov 9 2023. This means it's EOL throughout
the entire lifetime of 23.11, so let's drop it now.

A lot of examples are also referencing postgresql_11. Where it's
sensible, use postgresql_15 as example now to avoid confusion.

This is also handy because the LLVM 16 fix for postgresql is not
available for postgresql 11 ;-)

[1] https://www.postgresql.org/support/versioning/
2023-10-30 10:41:16 +01:00
Vladimír Čunát
5c89ba8ab4
Merge branch 'master' into staging-next 2023-10-30 06:12:04 +01:00
Martin Weinelt
4f971ebf3c
nixos/wyoming/faster-whisper: pass device config to executable
The device could previously be configured but wasn't wired up to do
anything meaningful and as such always defaulted to CPU.
2023-10-30 00:45:17 +01:00
Michele Guerini Rocco
800965ce8c
Merge pull request #245855 from rnhmjoj/pr-sslh
nixos/sslh: update and refactor for RFC42
2023-10-29 23:19:38 +01:00
Jakub Sokołowski
c7b3a19df6 erigon: add package option to override default version
Signed-off-by: Jakub Sokołowski <jakub@status.im>
2023-10-29 18:27:13 +00:00
github-actions[bot]
64070c2fda
Merge master into staging-next 2023-10-29 18:01:23 +00:00
Rémy Grünblatt
c9e3cc43c7
nixos: fix iproute2 invocations (#263976)
When using iproute2's ip binary, you can omit the dev parameter, e.g. ip link set up eth0 instead of ip link set up dev eth0.

This breaks if for some reason your device is named e.g. he, hel, … because it is interpreted as ip link set up help.

I just encountered this bug using networking.bridges trying to create an interface named he.

I used a grep on nixpkgs to try to find iproute2 invocations using variables without the dev keyword, and found a few, and fixed them by providing the dev keyword.

I merely fixed what I found, but the use of abbreviated commands makes it a bit hard to be sure everything has been found (e.g. ip l set … up instead of ip link set … up).
2023-10-29 18:27:16 +01:00
rnhmjoj
7ecac99da7
sslh: 1.22c -> 2.0.0 2023-10-29 18:13:37 +01:00
rnhmjoj
3728338d40
nixos/sslh: refactor for RFC42 2023-10-29 18:13:37 +01:00
Aaron Andersen
3b848391b6
Merge pull request #227442 from christoph-heiss/openssh/allowusers
openssh: add {Allow,Deny}{Users,Groups} settings
2023-10-29 08:20:22 -04:00
github-actions[bot]
571f1df5e4
Merge master into staging-next 2023-10-29 12:00:57 +00:00
Guillaume Girol
98b63514f0
Merge pull request #261862 from vifino/syslog-ng-4.4.0
syslogng: Late cleanup
2023-10-29 09:51:02 +01:00
github-actions[bot]
3f274c7328
Merge master into staging-next 2023-10-29 06:01:18 +00:00
Peder Bergebakken Sundt
37c7104f53
Merge pull request #262915 from chayleaf/certspotter
certspotter: init at 0.17.0; nixos/certspotter: init
2023-10-29 05:10:04 +01:00
github-actions[bot]
954eb09381
Merge master into staging-next 2023-10-29 00:02:24 +00:00
Weijia Wang
eaf8053ad5
Merge pull request #264036 from wegank/unifi-hotfix
nixos/unifi: fix use of optionalString
2023-10-29 00:33:19 +02:00
Weijia Wang
88e82879f4 nixos/unifi: fix use of optionalString 2023-10-28 23:01:44 +02:00
arcnmx
0711d3d69b xmrig: add meta.mainProgram
See #246386
2023-10-28 11:21:57 -07:00
Christoph Heiss
cc8ba21629
nixos/sshd: add comment explaining different list option types
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-10-28 20:13:26 +02:00
github-actions[bot]
52b6b90243
Merge master into staging-next 2023-10-28 18:00:57 +00:00
Weijia Wang
66ab26fce8
Merge pull request #262084 from imlonghao/borgmatic/fix-262020
borgmatic: fix deprecation warning check failed
2023-10-28 15:33:39 +02:00
github-actions[bot]
519b7ea0c3
Merge master into staging-next 2023-10-28 12:01:19 +00:00
Linus Heckemann
8670794565
Merge pull request #263203 from nikstur/replace-activation
Replace simple activationScripts
2023-10-28 10:17:15 +02:00
chayleaf
f4aeeb9e81
nixos/certspotter: init 2023-10-28 14:19:36 +07:00
github-actions[bot]
81ed2302dc
Merge master into staging-next 2023-10-28 06:00:57 +00:00
Peder Bergebakken Sundt
dc42e2603b
Merge pull request #263335 from anthonyroussel/nixos-goss
nixos/goss: init
2023-10-28 06:36:43 +02:00
imlonghao
88bc98a073
borgmatic: fix deprecation warning check failed 2023-10-28 11:32:38 +08:00
github-actions[bot]
4791949f6a
Merge master into staging-next 2023-10-28 00:02:23 +00:00
Peder Bergebakken Sundt
a9d001fd4a
Merge pull request #260877 from moritzrickert/plausible-registration-invite-only
nixos/plausible: add invite only registrations
2023-10-27 23:49:49 +02:00
Artturi
61f2bd3178
Merge pull request #254386 from erikarvstedt/nginx-js-mime-type 2023-10-27 23:32:20 +03:00
Matthias Riße
63ef033992 nixos/paperless: set PAPERLESS_SECRET_KEY
If the PAPERLESS_SECRET_KEY environment variable is left unset
paperless-ngx defaults to a well-known value, which is insecure.

Co-authored-by: Erik Arvstedt <erik.arvstedt@gmail.com>
2023-10-27 21:11:01 +02:00
tomf
d18f272a39
Merge pull request #262408 from evandeaubl/master
nixos/tailscale: add openFirewall option
2023-10-28 05:19:41 +11:00
github-actions[bot]
4c838ddf14
Merge master into staging-next 2023-10-27 18:01:08 +00:00
tomf
b42ca6b992
Merge pull request #260346 from l0b0/feat/shiori-webroot
nixos/shiori: add web root option
2023-10-28 04:25:40 +11:00
Emily
f4e67057e8
Merge pull request #263234 from CobaltCause/garage-statedirectory
nixos/garage: set `StateDirectory` if used at all
2023-10-27 17:26:39 +02:00
Alyssa Ross
44ff5dfca2 nixos/restic: remove s3CredentialsFile option
This has been deprecated since 2021, so all users should have seen the
warning and migrated by now.
2023-10-27 12:31:54 +00:00
Anthony Roussel
3a2d3bc3d8
nixos/goss: init 2023-10-27 08:00:48 +02:00
github-actions[bot]
f0ebfe8b52
Merge master into staging-next 2023-10-27 00:02:24 +00:00
Pol Dellaiera
aaccf42b1b
Merge pull request #261432 from yayayayaka/snipe-it-convert-to-buildComposerProject
snipe-it: convert to buildComposerProject
2023-10-27 01:36:34 +02:00
Peder Bergebakken Sundt
e8ff5952f6
Merge pull request #258558 from hmenke/c2FmZQ
c2FmZQ: init at 0.4.8
2023-10-26 20:33:51 +02:00
github-actions[bot]
96132a216a
Merge master into staging-next 2023-10-26 18:01:02 +00:00
Peder Bergebakken Sundt
adcaf3962d
Merge pull request #212087 from robryk/resticpaths
nixos/backups/restic: handle cases when both dynamicFileFrom and paths are set
2023-10-26 19:35:22 +02:00
Yaya
d91c530a55
snipe-it: Convert to php.buildComposerPackage 2023-10-26 18:51:05 +02:00
Peder Bergebakken Sundt
4d6d43f444
Merge pull request #263460 from arcuru/rename-arcuru
treewide: rename handle/GH account patricksjackson to arcuru
2023-10-26 18:46:42 +02:00
Henri Menke
e0cebb254e
nixos/c2fmzq-server: init module
Co-authored-by: Peder Bergebakken Sundt <pbsds@hotmail.com>
Co-authored-by: Anselm Schüler <mail@anselmschueler.com>
Co-authored-by: h7x4 <h7x4@nani.wtf>
2023-10-26 17:27:51 +02:00
Moritz Rickert
09794b1ee4 nixos/plausible: add invite only registrations 2023-10-26 16:54:25 +02:00
Martin Weinelt
b501176d83
nixos/wyoming-faster-whisper: update model enum
The medium model was never provided due to its extensive size.
2023-10-26 15:56:17 +02:00
Maximilian Bosch
15e17917fc
nixos/grafana-image-renderer: use Grafana's http_addr rather than localhost
Otherwise the callback won't work Grafana is configured to listen on a
different IP address by default.
2023-10-26 12:57:39 +02:00
Vladimír Čunát
d811555465
Merge branch 'staging' into staging-next 2023-10-26 10:36:50 +02:00
nikstur
b16365b393 nixos/iscsi: replace activationScript
Move the functionality into preStart of the systemd service.
2023-10-26 01:51:07 +02:00
nikstur
6987ff3a4f nixos/spiped: replace activationScript via tmpfiles 2023-10-26 01:44:21 +02:00
nikstur
f18ff2ec0b nixos/mlmmj: replace activationScript 2023-10-26 01:44:21 +02:00
nikstur
d5a96d508b nixos/stargazer: replace activationScript via tmpfiles 2023-10-26 01:44:21 +02:00
nikstur
6c800013bf nixos/strongswan-swanctl: replace activationScripts via tmpfiles 2023-10-26 01:44:20 +02:00
nikstur
168b967b32 nixos/mattermost: replace activationScript via tmpfiles 2023-10-26 01:43:56 +02:00
Patrick Jackson
4a938cc665 treewide: rename handle/GH account patricksjackson to arcuru 2023-10-25 15:42:48 -07:00
nikstur
1b2b1364de nixos/ups: replace activationScript via tmpfiles 2023-10-25 23:44:01 +02:00
Martin Weinelt
2bb79db3e2
Merge pull request #263315 from chayleaf/kea
kea: use separate runtime directories for each service
2023-10-25 22:29:31 +02:00
chayleaf
413011ddf4 kea: use separate runtime directories for each service
Kea may clean the runtime directory when starting (or maybe systemd does
it). I ran into this issue when restarting Kea after changing its
configuration, so I think the fact it normally doesn't clean it is a
race condition (it's cleaned on service start, and normally all Kea
services start at roughly the same time).
2023-10-26 02:51:43 +07:00
Lin Jian
2a27bf588f
Merge pull request #261733 from nbdd0121/hass
nixos/home-assistant: use runCommandLocal for configuration.yaml
2023-10-26 02:23:21 +08:00
Mario Rodas
84a877ed30
Merge pull request #261722 from anthonyroussel/ssm-agent-rename
amazon-ssm-agent: rename from ssm-agent
2023-10-25 04:18:24 -05:00
Stig
a99cbd99e1
Merge pull request #255715 from TomaSajt/lanraragi
lanraragi: init at 0.8.90
2023-10-25 10:54:27 +02:00
digital
a6253e6b12
nixos/syncthing: support syncthing gui and api over unix sockets (#247343) 2023-10-25 09:18:42 +02:00
Rebecca Kelly
855223de8f nixos/munin: fix internAndFixPlugins mangling store paths
The previous implementation works fine when the plugins do not already
contain store paths, which is the case for stuff from munin-contrib.
However, for plugins generated via nix (e.g. with writeShellScriptBin),
it tries to fix the paths in it which already point to the nix store,
ruining everything.
2023-10-25 09:00:45 +02:00
Rebecca Kelly
0f7fb5cdcf nixos/munin: fix key-context error when using extraAutoPlugins
If extraAutoPlugins contains values that carry context (e.g. it comes
from a flake input), the keys generated from them using baseNameOf
inherit that context and the config doesn't compile.

This doesn't actually need to be an attrset anyways, so a bit of
internal refactoring lets us fix this without changing the visible API.
2023-10-25 09:00:45 +02:00
Charles Hall
f5dcc015b9
nixos/garage: set StateDirectory if used at all
Changes the `mkIf` to trigger if *either* `data_dir`/`metadata_dir` use
`/var/lib/garage`, not only if both do. This is useful to me because I
want to store metadata in `/var/lib/garage` but I also want to store
data in a different mountpoint (via `data_dir` and `ReadWritePaths`).
2023-10-24 22:03:21 -07:00
TomaSajt
8e18ff0c24
nixos/lanraragi: init 2023-10-25 01:14:59 +02:00
Janik
e46b352ac4
Merge pull request #231065 from yu-re-ka/fnm-advanced-module
nixos/fastnetmon-advanced: init
2023-10-24 21:43:26 +02:00
Emily
702853c61a
Merge pull request #263046 from emilylange/nixos-forgejo
nixosTests.forgejo: test backup/dump service; nixos/forgejo: pass {env}`GIT_PROTOCOL` via ssh to forgejo; nixosTests.forgejo: test git wire protocol version
2023-10-24 19:40:20 +02:00
K900
d0d6219c42
Merge pull request #262265 from chayleaf/akkoma-extra
nixos/akkoma: add services.akkoma.dist.extraFlags
2023-10-24 18:30:24 +03:00
Tom Fitzhenry
9e7c877de7 nixos/hostapd: remove managementFrameProtection 2023-10-24 23:54:44 +11:00
Tom Fitzhenry
9f7335d449 nixos/hostapd: document that legacy example should have optional MFP
Thinkpad x230, for example, is unable to connect to the legacy example
if managementFrameProtection is required.
2023-10-24 23:46:57 +11:00
Robin Gloster
e5d552f5b9
treewide: update globin's maintainership 2023-10-24 13:09:45 +02:00
emilylange
402b5c67a8
nixos/forgejo: pass {env}GIT_PROTOCOL via ssh to forgejo
when using the host's openssh service (not the builtin golang one).

This enables the use of the much faster and more efficient wire protocol
version 2.
See https://git-scm.com/docs/protocol-v2
2023-10-24 03:27:20 +02:00
Janik
a5b74d45bd
Merge pull request #262978 from JulienMalka/ferretdb-docs
nixos/ferretdb: fix broken link to documentation
2023-10-23 22:53:21 +02:00
Yureka
bf5f01ee52 nixos/fastnetmon-advanced: init 2023-10-23 22:51:19 +02:00
Domen Kožar
4e95cbe36e
Merge pull request #246081 from therealr5/bacula-fix
nixos/bacula: fix postgresql config and remove unneeded quotation marks
2023-10-23 21:42:11 +01:00
Lorenz Leutgeb
cc6c2d32f2
rosenpass: refactor, add module and test (#254813) 2023-10-23 19:29:30 +02:00
Julien Malka
5237796f2b nixos/ferretdb: fix broken link to documentation 2023-10-23 16:48:31 +00:00
Maximilian Bosch
3ad1ebe9ff
Merge pull request #258047 from mweinelt/knot-exporter
prometheus-knot-exporter: 2021-08-21 -> 3.3.1; python310Packages.libknot: init at 3.3.1
2023-10-23 15:01:06 +02:00
github-actions[bot]
2c2c0379b7
Merge staging-next into staging 2023-10-23 12:02:04 +00:00
Martin Weinelt
589ccfdac1
nixos/prometheus-exporters/knot: update for new exporter
The new exporter has proper console scripts definition, that sets up
another executable name.

The package now also shells out to pidof, which is why we require procps
in the unit PATH.
2023-10-23 13:19:52 +02:00
Ryan Lahfa
d1ee91c22d
Merge pull request #262796 from SuperSandro2000/patch-1
nixos/nginx: document implicit default port 80
2023-10-23 11:04:54 +01:00
Martin Weinelt
6ddb74a81a
Merge pull request #262542 from yu-re-ka/matrix-synapse-opentracing
matrix-synapse: remove opentracing optional dependencies
2023-10-23 11:22:25 +02:00
K900
a52abd4ccb
Merge pull request #262623 from K900/continued-firefox-cleanups
firefox: start killing all the per-extension options
2023-10-23 10:25:37 +03:00
github-actions[bot]
df9eab6771
Merge staging-next into staging 2023-10-23 00:03:00 +00:00
Martin Weinelt
3244b1eaef
Merge pull request #262678 from plumelo/feat/esphome-proc-subset
esphome: remove ProcSubset from serviceConfig
2023-10-23 00:46:21 +02:00
Anthony Roussel
ccf080ee05
amazon-ssm-agent: rename from ssm-agent 2023-10-22 22:04:09 +02:00
Sandro
f4d631c3d1
nixos/nginx: document implicit default port 80 2023-10-22 21:32:50 +02:00
Emily
a61c6b478d
Merge pull request #262741 from emilylange/nixos-forgejo-postgres15
nixos/forgejo: work around permissions error on `postgresql_15`
2023-10-22 21:04:41 +02:00
github-actions[bot]
3d9ca9d8e3
Merge staging-next into staging 2023-10-22 18:01:34 +00:00
Luna Nova
d47bb3261f
nixos/i3: add updateSessionEnvironment option
Runs dbus-update-activation-environment and systemctl import-environment on session start
to ensure xdg portals work, and user services have correct PATH / XDG env vars.
Matches behavior of Plasma/Gnome sessions.
2023-10-22 10:18:55 -07:00
Robert Schütz
80f59b1626
Merge pull request #261135 from dotlambda/nixos-iptsd-init
nixos/iptsd: init
2023-10-22 09:48:37 -07:00
Artturi
b2426befa0
Merge pull request #259784 from dmytrokyrychuk/init-spice-autorandr
spice-autorandr: init at 0.0.2
2023-10-22 18:52:10 +03:00
Martin Weinelt
410ccec99c
Merge pull request #261931 from mweinelt/homeassistant-satellite
homeassistant-satellite: init at 2.3.0
2023-10-22 16:53:03 +02:00
K900
60421a1622 firefox: start killing all the per-extension options 2023-10-22 17:13:42 +03:00
Meghea Iulian
bff068e514
esphome: remove ProcSubset from serviceConfig
Remove ProcSubset from esphome serviceConfig because esphome/bwrap needs to
access it.
According to
https://www.freedesktop.org/software/systemd/man/latest/systemd.exec.html#ProcSubset=
ProcSubset isn't even recommended for most programs.
Fixes #262674
2023-10-22 17:09:00 +03:00
Dmytro Kyrychuk
d147d7feed nixos/spice-autorandr: init 2023-10-22 13:45:56 +00:00
emilylange
b8585a119c
nixos/forgejo: work around permissions error on postgresql_15
From `postgresql_15`'s release notes:
> PostgreSQL 15 also revokes the CREATE permission from all users except
a database owner from the public (or default) schema.

https://www.postgresql.org/about/news/postgresql-15-released-2526/

This directly affects `services.postgresql.ensureUsers` in NixOS,
leading to
> permission denied for schema public

`postgresql_15` is now the default for stateVersion `23.11`/`unstable`.

So until this is resolved globally, we work around this issue.
2023-10-22 15:25:34 +02:00
Yureka
0288685a4d nixos/matrix-synapse: remove opentracing options 2023-10-22 14:15:39 +02:00
github-actions[bot]
4312247c19
Merge staging-next into staging 2023-10-22 12:01:52 +00:00
Ryan Lahfa
efccbbab5b
Merge pull request #258994 from lorenzleutgeb/msr
nixos/hardware/cpu/x86/msr: init
2023-10-22 10:24:12 +01:00
Lin Jian
c132df63df
Merge pull request #250792 from ckiee/init-rkvm
{,nixos/}rkvm: init
2023-10-22 17:11:12 +08:00
Lorenz Leutgeb
62c63f746a nixos/undervolt: Use hardware.cpu.x86.msr 2023-10-22 09:41:00 +02:00
Lorenz Leutgeb
84803308bf nixos/xmrig: Use hardware.cpu.x86.msr 2023-10-22 09:41:00 +02:00
Lorenz Leutgeb
b70a63a910 nixos/tlp: Use hardware.cpu.x86.msr 2023-10-22 09:41:00 +02:00
Lorenz Leutgeb
b893b67028 nixos/throttled: Use hardware.cpu.x86.msr 2023-10-22 09:40:59 +02:00
github-actions[bot]
09fabcdc4e
Merge staging-next into staging 2023-10-22 00:03:08 +00:00
github-actions[bot]
1cf369a0dd
Merge master into staging-next 2023-10-22 00:02:31 +00:00
Peder Bergebakken Sundt
d2af1eb6ff
Merge pull request #256449 from illustris/hadoop
hadoop: 3.3.5 -> 3.3.6, build container executor from source
2023-10-22 01:40:19 +02:00
Janik
abca224ce4
Merge pull request #242467 from dadada/dev/dadada/init-nixos-soft-serve
nixos/soft-serve: init
2023-10-21 21:58:47 +02:00
github-actions[bot]
f4afba2014
Merge staging-next into staging 2023-10-21 18:01:53 +00:00
Alyssa Ross
83b8726e5f
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
	pkgs/development/python-modules/velbus-aio/default.nix
2023-10-21 17:24:16 +00:00
nikstur
95e6dfd5d9
Merge pull request #260275 from thillux/jitterentropy-rngd
jitterentropy-rngd: init at 1.2.8
2023-10-21 19:10:51 +02:00
Ryan Lahfa
c5442c247f
Merge pull request #257262 from dongcarl/2023-09-nginx-fixes
nixos/nginx: Allow empty port for listen directive (for unix socket)
2023-10-21 17:26:57 +01:00
dadada
77f7b5a3e5
nixos/soft-serve: init
This adds a NixOS module for Soft Serve, a tasty, self-hostable Git
server for the command line. The module has a test that checks some
basic things like creating users, creating a repo and cloning it.

Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2023-10-21 17:51:42 +02:00
Ryan Lahfa
0b0440e028
Merge pull request #254647 from Janik-Haag/networkManagerEnsureProfiles
nixos/networkmanager: add declarative profiles
2023-10-21 15:06:41 +01:00
github-actions[bot]
682b6995b4
Merge staging-next into staging 2023-10-21 12:01:45 +00:00
github-actions[bot]
0c34dab04f
Merge master into staging-next 2023-10-21 12:01:08 +00:00
Sandro Jäckel
b11e3eb7d1 nixos/asf: update hardening options to match upstream 2023-10-21 13:50:05 +02:00
github-actions[bot]
e5968ce788
Merge staging-next into staging 2023-10-21 06:01:24 +00:00
github-actions[bot]
1c4183d88a
Merge master into staging-next 2023-10-21 06:00:57 +00:00