Commit Graph

42153 Commits

Author SHA1 Message Date
Danilo Reyes
4f021e14a3 shiori: 1.5.5 -> 1.7.0 2024-06-29 15:30:22 -06:00
Eman Lear
6c00b71662
Merge branch 'master' into master 2024-06-30 02:19:21 +08:00
github-actions[bot]
3bb3e89f3b
Merge master into staging-next 2024-06-29 18:01:05 +00:00
Jörg Thalheim
ebfee308fc systemd-boot-builder: use type literals 2024-06-29 19:09:38 +02:00
Jörg Thalheim
6d0be2bec1 systemd-boot-builder: allow exceptions from python naming scheme 2024-06-29 19:09:28 +02:00
Jörg Thalheim
1ae4daa608 systemd-boot-builder: use safe run wrapper
we have a zoo of ways to call subprocesses.
Let's just replace this with one function that has reasonable defaults.
i.e. I catched instances where commands where run in a shell.
2024-06-29 19:09:06 +02:00
Maximilian Bosch
61c8a190f7
nixos/rl-2411: document breaking change in grafana 2024-06-29 19:09:05 +02:00
Maximilian Bosch
8511063014
grafana: 11.0.0 -> 11.1.0
ChangeLog: https://github.com/grafana/grafana/releases/tag/v11.1.0

A few additional changes were necessary:

* Grafana now refuses to listen on non-IP values and aborts with

    Error: ✗ *apiserver.service run error: invalid IP address: localhost

* packages/grafana-e2e doesn't exist anymore, so the build fixes for
  that could be removed.

* Make sure we always compile the binary parts of cypress.

* Grafana tends to set the minimum Go version to the latest Go version
  available now[1].

* The `url` of a datasource was set to `localhost` by default. I don't
  expect anybody to have not set it when needed, also Grafana aborts now
  if `url` is non-empty for a random walk datasource (which broke the VM
  tests).

[1] https://github.com/grafana/grafana/pull/88794#discussion_r1630563467
2024-06-29 19:09:05 +02:00
Jörg Thalheim
5cbf195292 systemd-boot-builder: use regex strings 2024-06-29 19:09:04 +02:00
Jörg Thalheim
f339bdf84c systemd-boot-builder: simplify conditions 2024-06-29 19:09:02 +02:00
Bobby Rong
49d0f43f57
nixos/doc/rl-2411: Mention Cinnamon 6.2 update 2024-06-29 23:56:38 +08:00
Kim Lindberger
b75986fd26
Merge pull request #310642 from arcnmx/keycloak-hostname-strict
nixos/keycloak: relax hostname settings assertion
2024-06-29 17:09:02 +02:00
Nick Cao
690518e966
Merge pull request #321982 from Moraxyc/update-nezha-agent
nezha-agent: 0.17.0 -> 0.17.2
2024-06-29 09:02:54 -04:00
Bjørn Forsman
7db3dc0fa4 nixos/dictd: treat SIGTERM exit status as success
dictd doesn't handle SIGTERM and terminates with code 143 (128 + 15
(SIGTERM) instead of 0. This results in systemd marking the service as
failed when a user stops it (with `systemctl stop dictd`). Fix it by
treating code 143 as success.
2024-06-29 13:40:49 +02:00
K900
bde999c03e Merge branch 'master' into staging-next 2024-06-29 10:13:13 +03:00
Thomas Gerbet
85be596266
Merge pull request #322585 from wegank/limesurvey-security
nixos/limesurvey: drop default encryption key and nonce
2024-06-28 23:43:24 +02:00
Sandro
0cbf178ddb
Merge pull request #322508 from MarcelCoding/hound
hound: convert to use freeform type
2024-06-28 22:57:59 +02:00
Matthew Croughan
d76ad79b4d
nixos/scion: use RuntimeDirectory instead of StateDirectory (#323200)
It was wrong to use StateDirectory to keep the scion-control and
scion-router runtime databases on disk for the next run. I observed that
doing this means a reboot, or power outage can corrupt the temporary
runtime databases for the next service start, leading scion ping and
other functionality to stop working permanently, since those files are
not managed in an atomic manner by the golang code.
2024-06-28 22:16:36 +02:00
Masum Reza
383744754e
Merge pull request #314798 from yomaq/healthchecks-settingsFile
nixos/healthchecks: add settingsFile option
2024-06-29 00:02:35 +05:30
Masum Reza
8808f7d7fc
Merge pull request #278982 from felbinger/master
python311Packages.mozilla-django-oidc: init at 4.0.1; peering-manager: add oidc support
2024-06-28 23:49:34 +05:30
Florian Klink
0ee2243bc8
Merge pull request #322980 from michaelfranzl/fix-nss-libvirt
nixos/virtualisation: increase priority for libvirt NSS modules
2024-06-28 18:15:16 +03:00
Bobby Rong
3901dc7822
Merge pull request #323159 from bobby285271/upd/xfce-colord
nixos/xfce: Enable colord by default
2024-06-28 23:00:08 +08:00
Bobby Rong
6c6614ada8
nixos/xfce: Enable colord by default
Goes with #323010.
2024-06-28 21:42:06 +08:00
Moraxyc
f852b38c42
nixos/nezha-agent: add gpu monitoring option 2024-06-28 16:18:40 +08:00
github-actions[bot]
d3f2171a63
Merge master into staging-next 2024-06-28 06:01:08 +00:00
Artturin
fc5487d05d
Merge pull request #319715 from jmbaur/repart-compression-threads
nixos/systemd-repart: respect NIX_BUILD_CORES for image compression
2024-06-28 04:26:20 +03:00
github-actions[bot]
2f3bfad6d2
Merge master into staging-next 2024-06-28 00:02:11 +00:00
Weijia Wang
daa81ecb2e nixos/limesurvey: drop default encryption key and nonce
Co-authored-by: Thomas Gerbet <thomas@gerbet.me>
2024-06-28 00:34:00 +02:00
Sandro Jäckel
ccd042b969
nixos/hound: set reasonable default for dbpath 2024-06-27 21:59:15 +02:00
Marcel
d7977717ac
nixos/hound: remove with lib; 2024-06-27 21:59:07 +02:00
Marcel
e6979857a3
nixos/hound: convert config to free-form type, add config check 2024-06-27 21:56:18 +02:00
Marcel
73e7708bee
nixos/hound: cleanup services.hound.enable 2024-06-27 21:56:18 +02:00
Silvan Mosberger
c8dec6df38
Merge pull request #322801 from eclairevoyant/discourage-mkpackageoptionmd
lib: deprecate mkPackageOptionMD
2024-06-27 20:15:08 +02:00
github-actions[bot]
1bfaa6d6e1
Merge master into staging-next 2024-06-27 18:01:13 +00:00
Yaya
d7fd9d19b2 nixos/doc/rl-2411: Mention minimal postgresql requirement for gitlab 17
`gitlab` >= 17.0 requires at least `postgresql` >= 14.9. GitLab users
are advised to follow the mentioned steps in the manual to upgrade their
PostgreSQL installation.
2024-06-27 19:52:03 +02:00
Yaya
b4d242907c nixos/gitlab: Add missing state folder 2024-06-27 19:52:03 +02:00
Yaya
59583de9d1 nixos/gitlab: Assert PostgreSQL >= 14.9
Support for PostgreSQL 13 has been removed in GitLab 17.0. [1]
Module users should upgrade their database installation to
PostgreSQL >= 14.9.

[1]: https://docs.gitlab.com/ee/update/deprecations.html#postgresql-13-no-longer-supported
2024-06-27 19:52:03 +02:00
Someone
35a472db57
Merge pull request #320830 from philiptaron/nixos-nvidia-change-datacenter-defaults
nixos/nvidia: move TOPOLOGY_FILE_PATH and DATABASE_PATH into nvidia-fabricmanager service definition
2024-06-27 15:56:29 +00:00
Martin Weinelt
d50a1e97b1
Merge remote-tracking branch 'origin/master' into staging-next 2024-06-27 16:16:01 +02:00
Robert Hensing
044d202b36
Merge pull request #322886 from fricklerhandwerk/update-nix
nixVersions: bump patch releases
2024-06-27 14:50:13 +02:00
Niklas Hambüchen
1032399f52
Merge pull request #322782 from DCsunset/quickwit-fix
nixos/quickwit: fix service ReadWritePaths
2024-06-27 14:39:11 +02:00
Jonas Heinrich
77e7768849
Merge pull request #322397 from Ma27/bump-nextcloud
nextcloud: drop 27, 28.0.6 -> 28.0.7, 29.0.2 -> 29.0.3
2024-06-27 14:09:29 +02:00
Valentin Gagarin
144ac0d7fc nixVersions: bump patch releases 2024-06-27 13:43:44 +02:00
Masum Reza
891c75c86e
Merge pull request #322591 from JohnRTitor/hyprland-module
nixos/hyprland: set systemd environment PATH only for versions < 0.41.2
2024-06-27 16:34:04 +05:30
Sandro
f6fb5b4f20
Merge pull request #322216 from Pandapip1/patch-3
services/localtimed: Allow configuring packages
2024-06-27 12:58:20 +02:00
matthewcroughan
23c24527dc nixos/scion: add scion package when scion.enable = true 2024-06-27 11:52:04 +02:00
matthewcroughan
973108d3ed nixos/scion: use recursiveUpdate instead of // 2024-06-27 11:51:28 +02:00
éclairevoyant
77f6192786
lib: deprecate mkPackageOptionMD 2024-06-26 23:14:45 -04:00
éclairevoyant
aeee4fc133
treewide: replace mkPackageOptionMD with mkPackageOption 2024-06-26 23:05:42 -04:00
Jared Baur
560cd874a3
nixos/etc: fix using etc overlay on cross-compiled systems
We need to run tooling from the build platform when generating the EROFS.
2024-06-26 19:50:24 -07:00
DCsunset
05b67b87b7 nixos/quickwit: fix service ReadWritePaths 2024-06-26 20:47:00 -04:00
Pol Dellaiera
908c90cd18
Merge pull request #313606 from drupol/ollama-add-preLoadedModels
nixos/ollama: add `loadModels` config option
2024-06-26 22:56:56 +02:00
Alexandre Acebedo
14422223df
playerctl: add daemon service 2024-06-26 21:33:46 +02:00
Someone
cb69dc5b8d
Merge pull request #256230 from SomeoneSerge/feat/gpu-tests-py
GPU access in the sandbox
2024-06-26 19:16:53 +00:00
Pol Dellaiera
f6727a9e3e nixos/ollama: add loadModels config option
Allows users to download model files upon service startup,
instead of at the first use of the model, improving percieved startup latency.
2024-06-26 15:11:37 -04:00
Sandro
efdfa300ee
Merge pull request #287036 from srhb/kafka-versions-cleanup
kafka: versions cleanup and drop older
2024-06-26 20:22:49 +02:00
github-actions[bot]
677389dc9f
Merge master into staging-next 2024-06-26 18:01:17 +00:00
Masum Reza
44f79e5bf0
Merge pull request #321591 from JohnRTitor/gdm-fingerprint-auth
nixos/gdm: allow logging in via fingerprint
2024-06-26 23:08:16 +05:30
John Titor
ff0738b736
nixos/hyprland: set systemd environment PATH for versions < 0.41.2
Importing PATH into the systemd environment is done by default in
Hyprland v0.41.2+ (https://github.com/hyprwm/Hyprland/pull/6640)
We soft deprecate this option here for versions >= 0.41.2.
2024-06-26 23:04:27 +05:30
Sandro
273f6bdff8
Merge pull request #244684 from m-bdf/kmscon-use-upstream-service-file
nixos/kmscon: use upstream service file
2024-06-26 19:29:28 +02:00
nikstur
e05a365dca
Merge pull request #321991 from Mic92/etc-overlay-cross
etc.overlay: fix cross-build
2024-06-26 19:12:15 +02:00
Someone Serge
79a7186f1c cudaPackages: updated convention for gpu/runtime checks
Runtime tests (derivations asking for a relaxed sandbox) are now
expected at p.gpuCheck, p.gpuChecks.<name>, or at
p.tests.<name>.gpuCheck.
2024-06-26 16:00:29 +00:00
github-actions[bot]
cf7e625161
Merge master into staging-next 2024-06-26 12:01:11 +00:00
Artturin
1ecc3cd35b
Merge pull request #322194 from Artturin/polkitaddpackageoption
nixos/polkit: Add package option
2024-06-26 12:42:38 +03:00
Tomodachi94
5912dfd17c
nixos/doc/rl-2411: drop nodePackages.vscode-*-bin
Packages dropped:
* nodePackages.vscode-css-languageserver-bin
* nodePackages.vscode-json-languageserver-bin
* nodePackages.vscode-html-languageserver-bin
2024-06-26 02:19:16 -07:00
Nico Felbinger
c4d2c90da0
nixos/peering-manager: add oidc support
Co-authored-by: Jenny <me@netali.de>
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-06-26 07:45:18 +02:00
Someone Serge
ebeb6b9d1d nix-required-mounts: nixfmt 2024-06-26 00:35:45 +00:00
Someone Serge
927b15ed6d nixos/nix-required-mounts: allow passing extra arguments to the hook 2024-06-26 00:35:44 +00:00
Someone Serge
dd70727622 nixos/nix-required-mounts: mount the runtime closures 2024-06-26 00:35:44 +00:00
Someone Serge
55f54cc2c3 nix-required-mounts: restore (optional) symlink support 2024-06-26 00:35:44 +00:00
Someone Serge
3cf5bcfe49 nix-required-mounts: restore the followSymlinks option
This way pkgs.nix-required-mounts is "correct" even before
we override it in the NixOS module
2024-06-26 00:35:44 +00:00
Someone Serge
5560f6a514 nix-required-mounts: guest and host paths may differ 2024-06-26 00:35:43 +00:00
Someone Serge
7418e4fefd programs.nix-required-mounts: presets.cuda -> nvidia-gpu
This hopefully clarifies that the preset configures the hook to expose
"nvidia devices", which includse both the userspace driver and the
device nodes.

The derivations  still declare requiredSystemFeatures = [ "cuda" ] to
explicitly indicate they need to use the CUDA functionality and expect a
libcuda.so and a CUDA-capable device. Ideally, we'd also include the
specific CUDA architectures (sm_86, etc) in feature names.

Derivations that use a co-processor but do not care about the vendor or
even the particular interface may ask for the more generic "opengl",
"vulkan", or "gpu" features. It is then responsibility of the host
declaring the support for this feature to ensure the drivers and
hardware are appropriately set up.
2024-06-26 00:35:43 +00:00
Someone Serge
50d4382114 programs.nix-required-mounts: inherit defaults from the package 2024-06-26 00:35:43 +00:00
Someone Serge
6662b09941 nix-required-mounts: handle __structuredAttrs 2024-06-26 00:35:43 +00:00
Someone Serge
340b41815d nixosTests.nix-required-mounts: init 2024-06-26 00:35:42 +00:00
Someone Serge
b422dafc89 nix-required-mounts: init 2024-06-26 00:35:42 +00:00
github-actions[bot]
27074b7d07
Merge master into staging-next 2024-06-26 00:02:13 +00:00
Sandro
08605eec2a
Merge pull request #311381 from minijackson/tomcat-port
nixos/tomcat: add 'port' option
2024-06-26 00:53:58 +02:00
Sandro
44b22d8d45
Merge pull request #318185 from tomfitzhenry/initrd-ssh-null-alg
nixos/initrd-ssh: set KexAlgorithms/Ciphers/MACs only if non-null
2024-06-25 23:21:33 +02:00
Sandro
33f83c6252
Merge pull request #316977 from eclairevoyant/fix-mkEnableOption
treewide: fix mkEnableOption usage
2024-06-25 22:42:16 +02:00
Sandro
3176d6fb53
Merge pull request #315144 from mattpolzin/default-nodename-fix
nixos/services.kubernetes.kubelet: handle non-lower case chars in hostname
2024-06-25 22:38:46 +02:00
Sandro
5b0ea759a7
Merge pull request #318347 from caffineehacker/vaultwarden_backup
nixos/vaultwarden: backup all rsa_keys
2024-06-25 22:37:56 +02:00
Sandro
1813936aff
Merge pull request #272895 from xanderio/wg-access-server-0.10.1
wg-access-server: init at 0.12.1
2024-06-25 21:21:19 +02:00
Michael Franzl
cae086d605
nixos/virtualisation: increase priority for libvirt NSS modules
When `services.resolved` is enabled, then `resolve [!UNAVAIL=return]`
is added to `system.nssDatabases.hosts` with priority 501,
which prevents lower-priority NSS modules from running
unless systemd-resolved is not available.

Quoting from `man nss-resolve`:

> To activate the NSS module, add "resolve [!UNAVAIL=return]" to the line
> starting with "hosts:" in /etc/nsswitch.conf. Specifically, it is
> recommended to place "resolve" early in /etc/nsswitch.conf's "hosts:"
> line. It should be before the "files" entry, since systemd-resolved
> supports /etc/hosts internally, but with caching. To the contrary, it
> should be after "mymachines", to give hostnames given to local VMs and
> containers precedence over names received over DNS. Finally, we
> recommend placing "dns" somewhere after "resolve", to fall back to
> nss-dns if systemd-resolved.service is not available.

Note that the man page (just) recommends "early" and means with this
"before the 'files' and 'dns' entries". It does not insist on being
first or excluding other modules.

For this reason, libvirt NSS modules should run before the `resolve`
module. They should come right next to `mymachines` because both are
conceptually very similar -- they resolve local VMs/containers.

Since the data source of the libvirt NSS modules are local
plain text files (see source code of the libvirt NSS module),
no performance impact is expected form this raise of priorities.

Other NSS modules in NixOS also explicitly set their priority, which is
why this change increases consistency.

Fixes #322022
2024-06-25 20:22:14 +02:00
github-actions[bot]
08b5c3c46a
Merge master into staging-next 2024-06-25 18:01:20 +00:00
Jörg Thalheim
12e24e94d3
Merge pull request #321984 from ryze312/fix_localConf
nixos/zerotierone: fix default value for localConf
2024-06-25 17:14:23 +02:00
Yaya
8e85799e54 nixos/doc/rl-2411: Add a deprecation notice for gitlab-runner 2024-06-25 17:06:45 +02:00
Yaya
95bd18b5c5 nixos/doc/rl-2411: Add a deprecation notice for gitlab 2024-06-25 17:06:45 +02:00
Yaya
6f211d899d nixos/gitlab-runner: Add support runner authentication tokens
Support for *runner registration tokens* is deprecated since GitLab
16.0, has been disabled by default in GitLab 17.0 and will be removed in
GitLab 18.0, as outlined in the [GitLab documentation].

It is possible to [re-enable support for runner registration tokens]
until GitLab 18.0, to prevent the registration workflow from
breaking.

*Runner authentication tokens*, the replacement for registration tokens,
have been available since GitLab 16.0 and are expected to be defined in
the `CI_SERVER_TOKEN` environment variable, instead of the previous
`REGISTRATION_TOKEN` variable.

This commit adds a new option
`services.gitlab-runner.services.<name>.authenticationTokenConfigFile`.
Defining such option next to
`services.gitlab-runner.services.<name>.registrationConfigFile` brings
the following benefits:
- A warning message can be emitted to notify module users about the
  upcoming breaking change with GitLab 17.0, where *runner registration
  tokens* will be disabled by default, potentially disrupting
  operations.
- Some configuration options are no longer supported with *runner
  authentication tokens* since they will be defined when creating a new
  token in the GitLab UI instead. New warning messages can be emitted to
  notify users to remove the affected options from their configuration.
- Once support for *registration tokens* has been removed in GitLab 18,
  we can remove
  `services.gitlab-runner.services.<name>.registrationConfigFile` as
  well and make module users configure an *authentication token*
  instead.

This commit changes the option type of
`services.gitlab-runner.services.<name>.registrationConfigFile` to
`with lib.types; nullOr str` to allow configuring an authentication
token in
`services.gitlab-runner.services.<name>.authenticationTokenConfigFile`
instead.

A new assertion will make sure that
`services.gitlab-runner.services.<name>.registrationConfigFile` and
`services.gitlab-runner.services.<name>.authenticationTokenConfigFile`
are mutually exclusive. Setting both at the same time would not make
much sense in this case.

[GitLab documentation]: https://docs.gitlab.com/17.0/ee/ci/runners/new_creation_workflow.html#estimated-time-frame-for-planned-changes
[re-enable support for runner registration tokens]: https://docs.gitlab.com/17.0/ee/ci/runners/new_creation_workflow.html#prevent-your-runner-registration-workflow-from-breaking
2024-06-25 17:06:45 +02:00
Yaya
92a26526b9 nixos/gitlab-runner: Remove global with lib; 2024-06-25 17:06:45 +02:00
Julien Malka
9d1a59b2e2
Merge pull request #322386 from katexochen/jonringer/rm
treewide: remove jonringer as package maintainer and code owner
2024-06-25 17:04:27 +02:00
OPNA2608
60f68545b1 nixos/lomiri: Add calculator 2024-06-25 16:13:41 +02:00
OPNA2608
7a3cb59d2a tests/lomiri-calculator-app: init 2024-06-25 16:13:41 +02:00
Bobby Rong
1373dd5ac8
Merge pull request #322186 from bobby285271/upd/cinnamon-xapps
Cinnamon updates 2024-06-24
2024-06-25 21:33:27 +08:00
Maximilian Bosch
60657a4591
nextcloud27: remove
Version will be EOL by the end of 2024-06.
2024-06-25 14:08:15 +02:00
Martin Weinelt
de245ec4a5
Merge remote-tracking branch 'origin/master' into staging-next 2024-06-25 13:00:25 +02:00
Alexander Sieg
32f2e9c950
wg-access-server: add release notes entry 2024-06-25 11:03:02 +02:00
Moritz Sanft
43990c5428
nixos/prometheus: remove minio exporter 2024-06-25 11:00:01 +02:00
Alexander Sieg
369cfec06d
nixos/wg-access-server: init module 2024-06-25 10:59:30 +02:00
Paul Meyer
fbe8538aa1 treewide: remove jonringer as package maintainer
Signed-off-by: Paul Meyer <49727155+katexochen@users.noreply.github.com>
2024-06-25 09:16:56 +02:00
Franz Pletz
e6e4cd92ad
Merge pull request #322211 from NyCodeGHG/update-libvirt
libvirt: 10.0.0 -> 10.4.0, nixos/libvirtd: add ssh proxy option
2024-06-25 05:47:13 +02:00
rewine
9b3299c8cd
Merge pull request #310778 from wineee/dde23
deepin desktop environment: update
2024-06-25 09:52:28 +08:00
Thiago Kenji Okada
30c578e589
Merge pull request #321987 from thiagokokada/rtorrent-add-hardening
nixos/rtorrent: add systemd hardening configuration
2024-06-25 02:34:42 +01:00
Thiago Kenji Okada
406ebf3ad6 nixos/rtorrent: make RuntimeDirectory not world readable 2024-06-24 19:01:17 -03:00
Thiago Kenji Okada
b8cd02c34f nixos/rtorrent: add NixOS tests 2024-06-24 19:01:16 -03:00
Thiago Kenji Okada
33f1e2ece3 nixos/rtorrent: add systemd hardening configuration 2024-06-24 19:01:16 -03:00
Jonathan Davies
2c06c1e73c
nixos/graylog: Increased disk size, fixes preflight check:
Preflight check failed with error: Journal directory
</var/lib/graylog/data/journal> has not enough free space (3412 MB) available.
You need to provide additional 1707 MB to contain 'message_journal_max_size = 5120 MB'
2024-06-24 22:50:14 +01:00
Jonathan Davies
5dad91559d
nixos/graylog: Added more test gates 2024-06-24 22:50:07 +01:00
Gavin John
8dcb12dee3 services/localtimed: Add package and geoclue2Package options 2024-06-24 14:36:26 -05:00
Will Fancher
2893f56de0
Merge pull request #319359 from misuzu/clevis-zfs-fix
nixos/clevis: add support for parent encrypted zfs datasets
2024-06-24 14:47:55 -04:00
github-actions[bot]
42ca786b66
Merge master into staging-next 2024-06-24 18:00:57 +00:00
Felix Bühler
e1f89770af
Merge pull request #302909 from Stunkymonkey/vagrant-guest-install-chmod
nixos/vagrant-guest: prefer 'install' over 'chmod'
2024-06-24 19:47:59 +02:00
Marie Ramlow
35b3707f20 nixos/libvirtd: add ssh proxy option 2024-06-24 17:20:05 +02:00
Artturin
b61e0ff19b nixos/polkit: Add package option
Overlaying polkit results in a lot of rebuilds thus it makes sense to
add a package option.

Assists in using the patch needed to fix https://www.github.com/NixOS/nixpkgs/issues/18012
2024-06-24 17:55:41 +03:00
Bobby Rong
510d7c2239
nixos/cinnamon: Don't ship apps that are not shipped in Mint 22
My reasons following Mint are:

1. Geary signed https://stopthemingmy.app, per request we shouldn't pre-ship it under a themed desktop environment.
   See also b7937b4509

2. Hexchat is still gtk2 and is not maintained anymore, Mint encourages switching to Matrix instead.
   See also https://blog.linuxmint.com/?p=4675 ("Joining the Matrix")
2024-06-24 22:30:18 +08:00
github-actions[bot]
88140ced6d
Merge master into staging-next 2024-06-24 12:01:17 +00:00
Pol Dellaiera
f95c186eb9
nixos/private-gpt: remove drupol from maintainers 2024-06-24 09:13:15 +02:00
github-actions[bot]
c1d6d547af
Merge staging-next into staging 2024-06-24 06:01:33 +00:00
arcnmx
a910bc8146 nixos/keycloak: relax hostname settings assertion
The `hostname-strict` setting enables dynamic hostname resolution.
2024-06-23 19:36:36 -07:00
Yt
6d455fee01
Merge pull request #321828 from Shawn8901/stalwart-spamfilter
stalwart-mail: include pre-defined spam-filter
2024-06-24 00:08:49 +00:00
github-actions[bot]
fca5c19283
Merge staging-next into staging 2024-06-24 00:03:38 +00:00
tomberek
73d924022e
Merge pull request #314917 from christoph-heiss/sourcehut-fix
nixos: sourcehut: fix some binary paths
2024-06-23 18:43:57 -04:00
Franz Pletz
3c033186ee
Merge pull request #316727 from jpds/nixos-tests-prometheus
nixos/prometheus: Revamp tests
2024-06-23 23:05:06 +02:00
Martin Weinelt
242807e0e7
Merge pull request #322011 from kkoniuszy/add-home-assistant-custom-components-spook
home-assistant-custom-components.spook: init at 3.0.1
2024-06-23 22:24:14 +02:00
Martin Weinelt
66adc9c5d1
nixos/tests/home-assistant: test multi-component packages
The spook package includes two separate integrations and the module was
adapted to account for that scenario. Add a test to ensure the changed
keeps working correctly going forward.
2024-06-23 22:09:00 +02:00
Kacper Koniuszy
7b81a213cf nixos/home-assistant: fix symlinking multi-manifest custom components
frenck/spook includes a second manifest for an integration. The current
copyCustomComponents script assumed that only one component directory
will be found, which in this case resulted in a malformed symlink
destination:

lrwxrwxrwx 1 hass hass 224 Jun 23 17:23 spook -> '/nix/store/r41ics22zs578avzqf7x86plcgn2q71h-python3.12-frenck-spook-v3.0.1/custom_components/spook/integrations/spook_inverse'$'\n''/nix/store/r41ics22zs578avzqf7x86plcgn2q71h-python3.12-frenck-spook-v3.0.1/custom_components/spook'
2024-06-23 22:03:37 +02:00
Mathew Polzin
88d934879a nixos/services.kubernetes.kubelet: handle non-lower case characters in hostname 2024-06-23 14:06:42 -05:00
Shawn8901
ac961ac498 nixos/stalwart-mail: set pre-defined spam-filter rules 2024-06-23 21:01:14 +02:00
github-actions[bot]
07b6f9e8ae
Merge staging-next into staging 2024-06-23 18:01:37 +00:00
Maximilian Bosch
2ac989c06f
Merge pull request #321931 from Ma27/occ-improvements
nixos/nextcloud: occ improvements
2024-06-23 17:42:42 +00:00
Artturin
2cfac74be5
Merge pull request #319139 from NyCodeGHG/android-ndks
android-ndks: add 25, 26 ndks, update default ndk and sdk
2024-06-23 20:39:28 +03:00
Artturin
f575ce82ff
Merge pull request #321711 from alois31/nix-2.18.3
nixVersions.nix_2_18: 2.18.2 -> 2.18.3
2024-06-23 20:36:31 +03:00
Martin Weinelt
2096642430
Merge remote-tracking branch 'origin/staging-next' into staging
Conflicts:
- pkgs/os-specific/windows/mingw-w64/default.nix
2024-06-23 19:09:00 +02:00
Niklas Hambüchen
65378f632a
Merge pull request #321966 from nh2/libe57format-3.1.1
libe57format: 2.2.0 -> 3.1.1
2024-06-23 19:00:23 +02:00
rewine
8e793b457a deepin.nix: update 2024-06-24 00:26:00 +08:00
rewine
6ce4843893 nixos/modules: init deepin-anything 2024-06-24 00:25:56 +08:00
Niklas Hambüchen
dbbaf02a9c release-notes: Mention libe57format upgrade 2024-06-23 16:18:56 +00:00
Jörg Thalheim
04efc006a4 etc.overlay: fix cross-build 2024-06-23 17:31:03 +02:00
Ryze
10962c7ca2
nixos/zerotierone: fix default value for localConf 2024-06-23 18:10:59 +03:00
Artturin
ef00c78e0d
nixos/jenkins: add RuntimeDirectory
Necessary for jenkins socket which has to be enabled with

`JENKINS_UNIX_DOMAIN_PATH=/run/jenkins/jenkins.socket`

in `services.jenkins.environment`

https://www.github.com/jenkinsci/packaging/issues/455
2024-06-23 18:00:35 +03:00
Francesco Gazzetta
20a73ab51d nixos/smartd: add systembus-notify notifications 2024-06-23 16:56:54 +02:00
K900
fd7e20b819
Merge pull request #321944 from K900/allow-null-password
nixos/plasma6: allow null password for screen lock
2024-06-23 17:52:53 +03:00
Masum Reza
be54c7d931
Merge pull request #320737 from Reputable2772/path-priority
nixos/hyprland: set path order for systemd user services
2024-06-23 19:49:48 +05:30
Bobby Rong
e68b4241db
Merge pull request #321939 from bobby285271/upd/xfce-pa
nixos/xfce: Install xfce4-pulseaudio-plugin when services.pipewire.pulse is enabled
2024-06-23 21:04:10 +08:00
Yt
a3530eabd7
Merge pull request #321936 from pacien/nixos-stalwart-remove-queue-report-path
nixos/stalwart-mail: remove deprecated {queue,report}.path settings
2024-06-23 11:39:39 +00:00
Jörg Thalheim
2654628f2c
Merge pull request #319238 from Mic92/digital-ocean
make-disk-image: fix build for systems that use boot.loader.grub.devices
2024-06-23 13:28:50 +02:00
K900
cc5ee2d621 nixos/plasma6: allow null password for screen lock
This was fixed and we missed it, I think?
2024-06-23 14:01:49 +03:00
Bobby Rong
387810bb17
nixos/xfce: Install xfce4-pulseaudio-plugin when services.pipewire.pulse is enabled
I think most users will really need it for the media keys.
2024-06-23 18:03:47 +08:00
euxane
8daa31600a nixos/stalwart-mail: remove deprecated {queue,report}.path settings
Since stalwart-mail 0.6.0, queue and report files are located in
the shared `storage.{data,blob}` stores. The `{queue,report}.path`
settings no longer had any effect since then.

I'm also removing the creation of the associated extra directories
in the `preStart` script. This should not cause any issue with old
setups since 0.6.0 was already packaged when 24.05 was released.
2024-06-23 11:47:12 +02:00
Jeremy Baxter
923a86602e nixos/oink: wait for network.target 2024-06-23 21:34:40 +12:00
Pol Dellaiera
420c9a60c0
Merge pull request #321664 from abysssol/ollama-override-gfx
nixos/ollama: add option for `HSA_OVERRIDE_GFX_VERSION`
2024-06-23 11:02:57 +02:00
Gooxey
d3140c11a5 nixos/antennas: removed WorkingDirectory setting
Antennas could not start because the specifed directory did not exist
2024-06-23 09:23:42 +02:00
Yt
12cdce24bb
Merge pull request #317239 from pacien/nixos-stalwart-no-dynamic-user-release-log
doc/release-notes: migration note for stalwart-mail user
2024-06-23 01:13:30 +00:00
Bruno BELANYI
9caa682281
Merge pull request #262892 from l0b0/test/tandoor-script-name 2024-06-22 23:23:35 +01:00
Doron Behar
9c7e7d8f18
Merge pull request #258058 from doronbehar/pkg/transmission_4
transmission: sent a warning and alias it to transmission_3
2024-06-23 00:07:37 +03:00
Masum Reza
6498422050
Merge pull request #191698 from ShamrockLee/clang-tools-python
clang-tools: move into llvmPackages
2024-06-23 02:26:27 +05:30
Pol Dellaiera
5dad22a889
Merge pull request #321673 from juselius/fix-service-restart-certmgr
nixos/kubernetes: fix service reload to restart
2024-06-22 22:56:12 +02:00
Yueh-Shun Li
657517056c
clang-tools: add release note entry about moving into llvmPackages
Add 24.11 release note entry about moving clang-tools into llvmPackages
and making clang-tools_<version> aliases.
2024-06-23 01:35:02 +05:30
euxane
3d10deb7a5 nixos/cgit: fix GIT_PROJECT_ROOT ownership
The GIT_PROJECT_ROOT directory is now created at runtime instead of
being assembled at build time.

This fixes ownership issues which prevented those repositories to be
read by users other than root. This also avoids creating symlinks in
the nix store pointing to the outside.
2024-06-22 19:45:25 +02:00
euxane
2d8626bf0a nixos/cgit: configurable user instead of root
This allows running cgit instances using dedicated users instead of
root. This is now set to "cgit" by default.
2024-06-22 19:45:25 +02:00
euxane
51b246a1ac nixos/fcgiwrap: do not run as root by default
Use a dynamic user instead unless one is specified.
2024-06-22 19:45:25 +02:00
euxane
c5dc3e2034 nixos/fcgiwrap: adapt consumer modules and tests 2024-06-22 19:45:25 +02:00
euxane
81f72015f0 nixos/fcgiwrap: add unix socket owner, private by default
This adds a few options to properly set the ownership and permissions
on UNIX local sockets, set to private by default.

Previously, the created UNIX local sockets could be used by any local
user. This was especially problematic when fcgiwrap is running as root
(the default).
2024-06-22 19:45:25 +02:00
euxane
289c1585c2 nixos/fcgiwrap: limit prefork type to positives 2024-06-22 19:45:25 +02:00
euxane
3955eaf450 nixos/fcgiwrap: improve readability of CLI args 2024-06-22 19:45:25 +02:00
euxane
8101ae41f8 nixos/fcgiwrap: adapt consumer modules and tests 2024-06-22 19:45:25 +02:00
euxane
022289f2fa nixos/fcgiwrap: group options logically, fix doc
Since we're already introducing some backward-incompatible change in
the previous commit, let's make the options more tidy, also preparing
for the introduction of more options.

This also fixes the documentation of the user and group options which
are applying to the service's running user, not the socket.
2024-06-22 19:45:25 +02:00
euxane
bf2ad6f48c nixos/fcgiwrap: adapt consumer modules and tests
This also fixes the gitolite-fcgiwrap test by running git through
fcgiwrap as the proper user.
2024-06-22 19:45:25 +02:00
euxane
41419ca288 nixos/fcgiwrap: refactor for multiple instances
This allows configuring and starting independent instances of the
fgciwrap service, each with their own settings and running user,
instead of having to share a global one.

I could not use `mkRenamedOptionModule` on the previous options
because the aliases conflict with `attrsOf submodule` now defined at
`services.fcgiwrap`. This makes this change not backward compatible.
2024-06-22 19:45:15 +02:00
abysssol
42c70e2923 nixos/ollama: add option for HSA_OVERRIDE_GFX_VERSION
There are several GPUs that ROCm doesn't officially support but
will work correctly if ROCm is directed to treat the GPU as a different
one that is supported and has a similar architecture.
This can be done by setting `HSA_OVERRIDE_GFX_VERSION`.
Ollama has documentation on this topic: https://github.com/ollama/ollama/blob/main/docs/gpu.md#amd-radeon
2024-06-22 13:13:08 -04:00
Maximilian Bosch
a71e967ef3
Merge pull request #320983 from Ma27/nc-dbtableprefix
nixos/nextcloud: deprecate dbtableprefix
2024-06-22 16:54:41 +00:00
Maximilian Bosch
50d5306e7c
nixos/nextcloud: use dedicated memory limit for the entire CLI
Originally, I wanted to execute `nextcloud-occ` with a higher memory
limit because I needed to trigger an expensive operation by hand,
regenerating a bunch of previews.

While doing so, I realized how painful it is to put an invocation of
nextcloud-occ together for that, especially when you need to put it
into another systemd unit in Nix code.

That's why I decided to use the memory limit now for every
CLI invocation just in case. The stuff you do in those units (e.g.
running background jobs) is something you can also do by hand with
`nextcloud-occ` and you'll most likely want to have the same memory
limit there.
2024-06-22 18:39:08 +02:00
Maximilian Bosch
ab9b8f8cf4
nixos/nextcloud: services.nextcloud.occ is not internal
This option is actually useful when having a systemd unit invoking
`nextcloud-occ`, then you want to do something like

    path = [ config.services.nextcloud.occ ]

This is possible today, but not documented (and the option completion
from nil doesn't pick it up as a result).
2024-06-22 18:38:04 +02:00
Benjamin Staffin
4530b8f72f
nixos/ipa: Lower default sssd debug_level (#310662)
debug_level 65510 (0x3f7f0) is _extremely_ verbose, far more than one
would want in normal operation.  Setting these in the default config
also makes it difficult to override in a user config.  Anyone who needs
greater verbosity can add these options to their own sssd config, or
adjust them at runtime with `sssctl debug-level`.
2024-06-22 11:31:18 -04:00
Benjamin Staffin
e93ccda887
nixos/ipa: Make ipa_hostname configurable (#321588)
Some sites put hosts in domains outside of the IPA server's default
domain, so this needs to be user-configurable.  The default is to use
the system's FQDN if it is configured, otherwise fallback to the
previous default behaviour of assuming the IPA's server's domain.
2024-06-22 11:29:54 -04:00
Nick Cao
0360d42e20
nixos/keycloak: disable keycloak-metrics-spi in tests 2024-06-22 10:23:09 -04:00
Nick Cao
d10d0fc423
nixos/keycloak: update options for release 25.0.0
Reference: https://www.keycloak.org/docs/25.0.0/upgrading/
2024-06-22 10:23:09 -04:00
Aleksana
df12edd993
Merge pull request #321760 from WolfangAukang/drop-me
maintainers: remove wolfangaukang
2024-06-22 21:59:48 +08:00
Aleksana
3247a65980
Merge pull request #321242 from onny/davfs2-remove-module
nixos/davfs2: Add deprecation notice
2024-06-22 21:25:02 +08:00
P.
7e1ff7bd73
treewide: remove wolfangaukang as maintainer 2024-06-22 07:03:16 -06:00
Jonas Heinrich
2eb7209481 nixos/davfs2: Add deprecation notice 2024-06-22 12:21:21 +02:00
Alois Wohlschlager
a754cd2eff
nixVersions.nix_2_18: 2.18.2 -> 2.18.3
It's a small round of various fixes for the default version of Nix.
Diff: https://github.com/NixOS/nix/compare/2.18.2...2.18.3
2024-06-22 10:56:11 +02:00
Jonas Juselius
cfed9707a5 nixos/kubernetes: fix service reload to restart 2024-06-22 07:52:46 +02:00
Maxine Aubrey
9d41fe6fcc
nixos/gdm: add fingerprint pam rules
Signed-off-by: John Titor <50095635+JohnRTitor@users.noreply.github.com>
2024-06-22 01:42:50 +05:30
Thomas Gerbet
6d04aa54ba
Merge pull request #315874 from JohnRTitor/gnome-keyring-module
nixos/gnome-keyring: rewrite module and fix unlocking on GDM session login
2024-06-21 21:07:43 +02:00
Aleksana
34a82372fe
Merge pull request #314728 from SamLukeYes/xonsh
xonsh: 0.15.1 -> 0.17.0
2024-06-22 02:32:07 +08:00
github-actions[bot]
fb94da4e9e
Merge staging-next into staging 2024-06-21 18:01:30 +00:00
John Titor
641ea1c57e
nixos/amdgpu: cleanup occurance of hardware.opengl
Unfortunately this got missed in
https://github.com/NixOS/nixpkgs/pull/320228
2024-06-21 21:40:11 +05:30
K900
7d18aa634e
Merge pull request #321320 from rnhmjoj/pr-libreswan-tests
linux/common-config: enable IPsec over TCP
2024-06-21 18:24:50 +03:00
Aleksana
07f8a394e5
Merge pull request #321519 from lheckemann/maintainership
maintainers: drop lheckemann
2024-06-21 22:59:09 +08:00
Ruby Iris Juric
088b397516 nixos/zitadel: Drop Sorixelle as maintainer 2024-06-21 16:11:10 +02:00
Ryan Lahfa
efcabaa056
Merge pull request #298641 from RaitoBezarius/netdata-45
netdata: 1.44.3 -> 1.45.3
2024-06-21 16:04:11 +02:00
Linus Heckemann
e5adf0b547 maintainers: drop lheckemann 2024-06-21 15:54:54 +02:00
Jörg Thalheim
9f180c5438
Merge pull request #280517 from Mic92/zerotierone
nixos/zerotierone: make localConf mergeable
2024-06-21 15:32:05 +02:00
Jörg Thalheim
09ead1f6eb nixos/zerotierone: make localConf mergeable 2024-06-21 15:17:45 +02:00
h7x4
eb6059678c
Merge pull request #321477 from mohe2015/remove-maintainer-mohe2015
Remove maintainer mohe2015
2024-06-21 14:18:24 +02:00
Peder Bergebakken Sundt
892cdcec93
Merge pull request #320836 from philiptaron/services.bluemap.host
nixos/bluemap: fix defaults issue with `services.bluemap.host`
2024-06-21 14:07:24 +02:00
github-actions[bot]
c6707a9686
Merge staging-next into staging 2024-06-21 12:01:53 +00:00
Moritz Hedtke
ca0a8eb9a8 nixos/step-ca: remove mohe2015 as maintainer 2024-06-21 12:40:08 +02:00
Doron Behar
7645dde059 transmission_3: rename from transmission 2024-06-21 12:33:37 +03:00
Jade Lovelace
933a101ab0
Merge pull request #321457 from Tom-Hubrecht/maintainer
Remove myself as maintainer
2024-06-21 01:43:06 -07:00
superherointj
fe10b0c276
Merge pull request #321237 from Djabx/add-snapper-opts
nixos/snapper: add snapper opts
2024-06-21 05:38:57 -03:00
Masum Reza
61bf19d81b
Merge pull request #316410 from wegank/release-notes-4
doc/release-notes: fix mention of ankisyncd
2024-06-21 13:46:57 +05:30
superherointj
c14d83e0eb
Merge pull request #321232 from siriobalmelli/configure/oci
nixos/oci-image: expose diskSize as a configurable option
2024-06-21 05:14:04 -03:00
Alexandre Badez
754618f7bd nixos/snapper: formating 2024-06-21 09:49:55 +02:00
Alexandre Badez
a1ded8273d nixos/snapper: add timeline limit options 2024-06-21 09:49:51 +02:00
Tom Hubrecht
938372e46e nixos/netbird: Remove thubrecht as maintainer 2024-06-21 09:32:46 +02:00
Tom Hubrecht
b431a6c59b crabfit: Remove thubrecht as maintainer 2024-06-21 09:32:00 +02:00
h7x4
ad964c4ebf
Merge pull request #318613 from msanft/grafana-reporter/build-go-module
grafana-reporter: migrate to buildGoModule
2024-06-21 09:21:09 +02:00
h7x4
11c5359c4f
Merge pull request #319516 from r-vdp/wstunnel-init
wstunnel: 9.6.2 -> 9.7.0
2024-06-21 09:17:42 +02:00
Sirio Balmelli
80712f254c
nixos/oci-image: expose diskSize as a configurable option
diskSize defaults to the previous hard-coded 8192:
no change for existing users.

Users can set diskSize when building images which require
larger disk space; thus avoiding the error:

    ERROR: cptofs failed. diskSize might be too small for closure.

Signed-off-by: Sirio Balmelli <sirio@b-ad.ch>
Co-authored-by: superherointj <5861043+superherointj@users.noreply.github.com>
2024-06-21 08:54:08 +02:00
rnhmjoj
7c021fdfcd
nixos/tests/libreswan-nat: add test 2024-06-21 08:32:43 +02:00
rnhmjoj
818afd9d6d
nixos/tests/libreswan: use runTest 2024-06-21 08:32:42 +02:00
Sandro Jäckel
743d9f835d
maintainers: remove one year inactive maintainer kiwi 2024-06-21 01:38:39 -04:00
Philip Taron
3ac49bcf94
nixos/bluemap: fix defaults issue with services.bluemap.host
The default for this value depends on `config.networking.domain`, which is typed as `types.nullOr types.str` in nixos/modules/tasks/network-interfaces.nix

As a result, the default for `services.bluemap.host` either has to be `types.nullOr types.str`, or we need to drop the default.

Based on PR feedback, this commit drops the default and requires configuration through the `services.bluemap.host` option.

While this is a breaking change, since the module is a month old, there should be very few users so far.
2024-06-20 21:05:03 -07:00
John Titor
6bb516d45f
nixos/gnome-keyring: enable gnome-keyring for fingerprint authentication'
this should be enabled by default if fprintd is enabled
2024-06-21 09:11:04 +05:30
Thomas Gerbet
88130cec79
Merge pull request #321097 from PatrickDaG/firefly-6.1.18
firefly-iii: 6.1.17 -> 6.1.18
2024-06-20 23:03:48 +02:00
Robert Hensing
ba5a6f19ed
Merge pull request #312516 from Stunkymonkey/nixos-swap-umask
nixos/swap: prefer 'umask' over 'chmod'
2024-06-20 20:06:13 +02:00
John Titor
c24c7933ba
nixos/gnome-keyring: unlock keyring with gdm-password, gdm-autologin
GDM uses gdm-password as the PAM service name for both logins and unlocks.
So unlock gnome-keyring as part of `gdm-password`.
Without this, keyrings may not be unlocked properly for GDM 45+.

also unlock as part of GDM autologin
2024-06-20 23:08:43 +05:30
Oliver Schmidt
26bae04567 tests/acme: check consistent account hash for legacy settings
To allow migration from 23.11 to 24.05 without triggering re-registrations,
the account hashing behaviour of the previous release can be retained by setting
`security.acme.defaults.server` to `null`.

We better also check for hash consistency with that setting to avoid unexpected
account hash changes again.
2024-06-20 17:22:05 +02:00
Masum Reza
d603719ec6
Merge pull request #321140 from pyrox0/mealie-1.9
mealie: 1.7.0 -> 1.9.0
2024-06-20 20:27:18 +05:30
Sandro
9bf71066c8
Merge pull request #321165 from Guanran928/patch-1 2024-06-20 16:46:58 +02:00
github-actions[bot]
667f4bf852
Merge staging-next into staging 2024-06-20 12:01:36 +00:00
Sandro
3d37622cff
Merge pull request #302645 from anthonyroussel/fix-samba 2024-06-20 13:48:06 +02:00
K900
5ce022e0e0
Merge pull request #319865 from JohnRTitor/amdgpu-module
nixos/amdgpu: init module
2024-06-20 14:29:01 +03:00
Patrick
6154279455
nixos/firefly-iii: enhance provisioning service 2024-06-20 12:16:48 +02:00
K900
20b7b4f619
Merge pull request #320228 from K900/opengl-cleanups
treewide: big opengl cleanups
2024-06-20 12:37:59 +03:00
Guanran928
ba7e7693dc
nixos/matrix-synapse: fix typo 2024-06-20 13:53:38 +08:00
Pyrox
d94a39f87d
mealie: 1.7.0 -> 1.9.0
Also fix a small issue with the module not casting the port number
to a string
2024-06-19 20:48:39 -04:00
Martin Weinelt
af4cfc1e0f Merge remote-tracking branch 'origin/staging-next' into staging 2024-06-19 23:28:26 +02:00
Raito Bezarius
aaccbed9fb nixos/netdata: add wireguard support
CAP_NET_ADMIN is required.

Change-Id: I8559e50ccf2d34a4bc7c8f4f2aeafb7771fe751b
Signed-off-by: Raito Bezarius <masterancpp@gmail.com>
2024-06-19 22:30:05 +02:00
Raito Bezarius
6955aab487 nixos/netdata: add docker and podman support
Podman requires `jq`.

Change-Id: Iad2abe1ccf92738da82384f30503f3be6fb11ca7
Signed-off-by: Raito Bezarius <masterancpp@gmail.com>
2024-06-19 22:30:05 +02:00
Wout Mertens
f058c122ee nixos/netdata: remove old lib.mdDoc calls 2024-06-19 22:30:05 +02:00
Raito Bezarius
32a8884ba4 nixos/tests/netdata: use recommended python packages
To maximize the testing surface.

Signed-off-by: Raito Bezarius <masterancpp@gmail.com>
2024-06-19 22:30:05 +02:00
Raito Bezarius
1cfb30fbdb nixos/netdata: depends on suid-sgid-wrappers
Netdata is critically dependent on working wrappers, thus, we ensure that the service was successful.

Signed-off-by: Raito Bezarius <masterancpp@gmail.com>
2024-06-19 22:30:05 +02:00
Raito Bezarius
3386a3aab0 nixos/netdata: introduce recommendedPythonPackages
This option furthers the "zero configuration" reputation of netdata by collecting
some Python packages available in nixpkgs and offering them to the module.

It is disabled by default.

Signed-off-by: Raito Bezarius <masterancpp@gmail.com>
2024-06-19 22:30:05 +02:00
Raito Bezarius
0794ea59cd nixos/netdata: add default programs for netdata (NVMe, WiFi, APCs)
Netdata is zero-config, so we should provide some *default* packages.

If the closure size is a problem for you, reach out to maintainers.

Signed-off-by: Raito Bezarius <masterancpp@gmail.com>
2024-06-19 22:30:05 +02:00
Raito Bezarius
38cdab1f92 nixos/netdata: add debugfs, logs-management, network-viewer support
Those require some capabilities.

Signed-off-by: Raito Bezarius <masterancpp@gmail.com>
2024-06-19 22:30:04 +02:00
Rick van Schijndel
43ce0f9ee0
Merge pull request #318256 from risicle/ris-stack-clash-protection
cc-wrapper: add stack clash protection hardening flag
2024-06-19 19:54:30 +02:00
Maciej Krüger
a4776f9fc9
nixos/docuum: add missing options 2024-06-19 19:10:36 +02:00
res0Nanz
16d8c11a33 nixos/networkd-dispatcher: fix links in doc
Ill-formatted markdown links fixed.
2024-06-20 00:52:12 +08:00
res0Nanz
ae96067a6d nixos/cloudflared: fix links in doc
Ill-formatted markdown links fixed.
2024-06-20 00:49:01 +08:00
Sirio Balmelli
6c10cfba34
tests/odoo: fix broken test
Odoo does not initialize the database by default,
it must be explicitly initialized for the test as written to succeed.

Signed-off-by: Sirio Balmelli <sirio@b-ad.ch>
2024-06-19 13:35:23 +00:00
Sirio Balmelli
a972071a31
odoo: 16.0.20231024 -> 17.0.20240507
Preserve 'odoo16' on the same pattern as existing 'odoo15'

Signed-off-by: Sirio Balmelli <sirio@b-ad.ch>
2024-06-19 13:35:20 +00:00
Victor Engmark
d70be9d211
nixosTests.tandoor-recipes-script-name: init
Verify that all `href` attributes emitted as part of the entrypoint page
after logging in are reachable.

Co-authored-by: Bruno BELANYI <bruno@belanyi.fr>
2024-06-20 00:06:38 +12:00
Victor Engmark
f5710b2b83
nixos/tandoor-recipes: Fix working directory
Run `tandoor-recipes` from within its `MEDIA_ROOT` directory to support
the `SCRIPT_NAME` setting.

Closes #262857.
2024-06-20 00:06:16 +12:00
Artturin
7324a175cf
Merge pull request #320673 from rvl/snapper-systemd-fix
nixos/snapper: Don't create broken snapper-boot.service
2024-06-19 14:59:00 +03:00
Pol Dellaiera
c249dd3eff
Merge pull request #320935 from drupol/bump/searxng/june-2024
searxng: 0-unstable-2024-05-31 -> 0-unstable-2024-06-19
2024-06-19 13:56:01 +02:00
Maximilian Bosch
45d2b8b536
nixos/nextcloud: deprecated dbtableprefix
Closes #320381

Installation with a custom dbtableprefix is not allowed anymore for a
while[1] and we shouldn't advertise it as such.

The option is deprecated for now since I'm not sure if there are some
weird corner-cases where removing the option directly would break
existing installations from before <20 with a custom dbtableprefix. The
migration-path for such a case is as follows:

* Check if /var/lib/nextcloud/config/config.php has the correct
  dbtableprefix set and if not, take care of it.
* Remove `dbtableprefix` from the NixOS configuration. It's effectively
  state anyways.

After a bit of time to switch (perhaps after the next release
branchoff), the option can be removed.

[1] https://github.com/nextcloud/server/issues/24836
2024-06-19 11:43:33 +02:00