Commit Graph

3738 Commits

Author SHA1 Message Date
Martin Weinelt
ce698e3f0b
Merge pull request #203735 from mweinelt/nixos-22.11-docs
Release NixOS 22.11
2022-11-30 19:19:48 +01:00
Martin Weinelt
384b898d18
Merge pull request #203774 from mweinelt/nixos-22.11-rl-fixups 2022-11-30 19:05:30 +01:00
maralorn
6184f635b3 nixos/doc: Fix typo in 22.11 release manual 2022-11-30 19:03:28 +01:00
Martin Weinelt
068f7348db nixos/doc/rl-2211: more cleanup 2022-11-30 19:01:13 +01:00
Jörg Thalheim
07fe1b987b nixos/doc/rl-2211: cleanup 2022-11-30 17:37:03 +01:00
Martin Weinelt
f1b9cc23aa Release NixOS 22.11 2022-11-30 11:52:38 +01:00
Winter
881f22670e nixos/doc/rl-2211: add entry for aarch64-linux jobset inclusion/images on homepage 2022-11-29 21:07:36 -05:00
Winter
b937bf637f nixos/doc/rl-2211: add entry for libxcrypt migration 2022-11-29 21:07:36 -05:00
Winter
e81b0cec91 nixos/doc/rl-2211: cleanup 2022-11-29 21:07:33 -05:00
Maximilian Bosch
70bd3715e0
Merge pull request #202918 from SuperSandro2000/rleease-notes-191713
nixos/release-notes: add entry for #191713
2022-11-30 00:36:03 +01:00
KFears
bb4cc151b6 nixos/openrgb: fix linking in release notes 2022-11-30 01:31:46 +04:00
Florian Klink
83807f3aaa nixos/doc/rl-2211: document nsncd option 2022-11-29 17:00:19 +00:00
sandydoo
11fbf96e2b
nixos/rosetta: add release notes 2022-11-29 10:33:37 +00:00
Bobby Rong
d91da6d1fb
Merge pull request #201328 from NixOS/cinnamon
Cinnamon 5.6
2022-11-29 14:33:07 +08:00
Bobby Rong
89f3049f9d
rl-23.05: Mention cinnamon 5.6 update 2022-11-29 10:12:36 +08:00
Jonas Heinrich
3aff916914 nixos/opensnitch: Add option to configure rules 2022-11-28 14:19:16 -05:00
Sandro Jäckel
a4f053f0e4
nixos/release-notes: add entry for #191713 2022-11-28 02:19:18 +01:00
Elis Hirwing
9222c47479
Merge pull request #202799 from drupol/php/november-2022-bumps
{php80,php81,php82}: November bumps
2022-11-27 20:23:42 +01:00
Martin Weinelt
35d7617d81
Merge pull request #200354 from mweinelt/kanidm-1.1.0-alpha.10 2022-11-26 22:11:29 +01:00
Flakebi
272ac9ec64 kanidm: add release not for tls requirement 2022-11-26 21:43:12 +01:00
Guillaume Bouchard
d1b6d2d0ab haskellPackages.callHackage: updating all-cabal-hashes do not invalidate callHackage
Packages built with `haskellPackages.callHackage` won't be rebuilt when
updating `all-cabal-hashes`.

The removed comment was keeping a reference to the `cabal2nix` call,
which itself depends on `all-cabal-hashes`, in order to keep this file
during a garbage collection.

The tradeoff is between:

- The current behavior: a mass rebuild, any change of `all-cabal-hashes`
  triggers a rebuild of all the packages built with `callHackage` and
  packages which depend on them. This can take hours, and may happen
  after a "small" unrelated change (i.e. an user is bumping
  `all-cabal-hashes` in order to use a new package from hackage). It
  also have global impacts in a project (long rebuild in CI, new entries
  in cache, developers need to fetch the new entries, ...). In this
  context, `cabal2nix` entries are not garbage collected.
- The new behavior: No mass rebuild, but `cabal2nix` derivations need to
  be recomputed after a garbage collection. This is usually fast (a few
  seconds by call), linear with the number of calls and should not
  happen a lot (i.e. users are not garbage collecting everyday).

See https://github.com/NixOS/nixpkgs/issues/194751 for details.
2022-11-26 19:00:56 +01:00
sternenseemann
7b9b222763 nixos/doc: update RL entry for GNAT update 2022-11-26 14:20:09 +01:00
Leonardo Taglialegne
6d77ca3ffd Fix typo in 22.11 release notes 2022-11-25 16:11:54 +01:00
Pol Dellaiera
aa634993cd php82: 8.2.0rc6 -> 8.2.0rc7
News: https://github.com/php/php-src/blob/php-8.2.0RC7/NEWS
2022-11-25 09:32:07 +01:00
Robert Hensing
d08a22c7ce
Merge pull request #201937 from panda2134/master
netlify-cli: 6.13.2 -> 12.2.4, esbuild_netlify: 0.13.6 -> 0.14.39
2022-11-24 13:52:52 +00:00
Linus Heckemann
eddfcf8622 amazon-image: fetch metadata only in stage-2
This also removes automatic enablement/mounting of instance store swap
devices and ext3 filesystems. This behaviour is strongly opinionated
and shouldn't be enabled by default.

The unionfs behaviour never took effect anyway, because the AMI
manifest path only exists for instance store-backed AMIs, which have
not been supported by nixpkgs since
84742e2293 (2019).
2022-11-23 17:19:13 +01:00
figsoda
82fe76d1cd carnix,cratesIO: remove 2022-11-22 14:10:25 -05:00
Valentin Gagarin
10ffe1e731
Merge pull request #201084 from wentasah/nixos-doc-fix-install
nixos/doc: fix installing from other distro
2022-11-22 11:13:09 +01:00
panda2134
669067ed04 netlify-cli: update release note for updating netlify-cli 2022-11-22 12:20:11 +08:00
Martin Weinelt
36f58b687c
nixos/evcc: init 2022-11-21 22:40:15 +01:00
Sandro
caf13a5bb1
Merge pull request #182759 from otopetrik/proxmox-image-uefi 2022-11-21 21:34:30 +01:00
Martin Weinelt
b68bd2ee52 23.05 is Stoat 2022-11-21 21:22:27 +01:00
Sandro
3a05360e53
Merge pull request #200082 from panicgh/fetchgit-sparse-checkout 2022-11-21 20:00:56 +01:00
Maximilian Bosch
853d0a3f2b
Merge pull request #199150 from Ma27/grafana-fixup
nixos/grafana: documentation/warning improvements after #191768
2022-11-20 20:53:25 +01:00
Maximilian Bosch
4a73fad515
nixos/doc: also note that external YAML files for grafana will end up in the store 2022-11-20 20:03:38 +01:00
Maximilian Bosch
2580440389
Merge pull request #198470 from RaitoBezarius/nc25-openssl
nextcloud25: use openssl 1.1 as a PHP extension to fix RC4 encryption
2022-11-20 18:32:41 +01:00
Maximilian Bosch
9d7e9c5965
nixos/grafana: allow using both directories or single YAML files for non-Nix provisioning 2022-11-20 18:21:41 +01:00
Maximilian Bosch
b300ec349c
nixos/doc: wording fix 2022-11-20 18:21:40 +01:00
Maximilian Bosch
03b34e85d4
nixos/grafana: we only support single YAML files for provisioning 2022-11-20 18:21:39 +01:00
Maximilian Bosch
afd6199cff
nixos/grafana: re-add legacy notifiers test, mention notifiers in release notes 2022-11-20 18:21:39 +01:00
Maximilian Bosch
252785fd9c
nixos/doc: improve release-notes for services.grafana 2022-11-20 18:21:38 +01:00
Elis Hirwing
14cc62d7e6
Merge pull request #201000 from drupol/php/8.2.0
php82: init at 8.2.0rc6
2022-11-20 16:01:00 +01:00
Martin Weinelt
55ab131ee2
nixos/manual: Don't recommend mkpasswd methods
Instead rely on the default, which at this time is yescrypt.
2022-11-19 14:07:59 +01:00
Sergei Trofimovich
00d016a2f5
Merge pull request #186764 from fricklerhandwerk/remove-syntax-overview
remove Nix language syntax summary
2022-11-18 22:41:54 +00:00
Vladimír Čunát
8ab030e8de
Merge #201359: firefox, thunderbird, librewolf: Enable wayland support by default 2022-11-18 10:49:22 +01:00
Kerstin Humm
d35c9e04e6 mastodon: 3.5.3 -> 4.0.2 2022-11-17 20:05:50 +01:00
Christian Kögler
de60d387a0
Merge pull request #200180 from Korny666/fix_install_chapter
nixos/doc: correct install summary
2022-11-17 17:42:12 +01:00
Martin Weinelt
c156bdf40d
firefox, thunderbird, librewolf: Enable wayland support by default
Enabling Wayland support by default prevents use of XWayland on Wayland
systems, while correctly falling back to X11 when Wayland is
unavailable in the current session.

With the current packaging many people unnecessarily rely on the
`firefox` attribute, which is suggested by nixos-generate-config, which
in turn makes their Firefox use XWayland, when it shouldn't, which
causes bugs with GNOME on Wayland:

https://discourse.nixos.org/t/firefox-all-black-when-first-launched-after-login/21143

Using the Wayland-enabled Firefox was tested on pure X11 systems by
contributors on the #nix-mozilla:nixos.org room and we are confident
this change will not cause severe regressions.

Even better, people can now toggle `MOZ_ENABLE_WAYLAND=<0|1>` in their
environment to override this decision, should they feel the need to do
so.
2022-11-17 11:50:12 +01:00
Maxime Brunet
29b5192b08
automatic-timezoned: init at 1.0.41 2022-11-16 15:26:21 -08:00
Thiago Kenji Okada
eb8b2d7142 nixos/docs: document picom module changes 2022-11-16 20:14:34 +00:00
Pol Dellaiera
1812d1540e
php82: init at 8.2.0rc6 2022-11-16 18:57:26 +01:00
sternenseemann
a110f08f12 ocamlPackages.extlib: rename from ocaml_extlib
This matches the name used in dune and on OPAM.
2022-11-16 14:30:37 +01:00
Vincent Haupert
2f71de984e release-notes: mention new services.github-runners & breaking changes 2022-11-15 23:53:04 -05:00
Nicolas Benes
f6b07f0e2f fetchgit: make sparseCheckout a list of strings
The `sparseCheckout` argument allows the user to specify directories or
patterns of files, which Git uses to filter files it should check-out.

Git expects a multi-line string on stdin ("newline-delimited list", see
`git-sparse-checkout(1)`), but within nixpkgs it is more consistent to
use a list of strings instead. The list elements are joined to a
multi-line string only before passing it to the builder script.

A deprecation warning is emitted if a (multi-line) string is passed to
`sparseCheckout`, but for the time being it is still accepted.
2022-11-15 19:45:33 +01:00
pennae
07e5701aca nixos/manual: re-add mention of mdDoc marker 2022-11-14 16:05:44 +01:00
Michal Sojka
ee8ae2da4c nixos/doc: fix installing from other distro
The nixos-generate-config command mentioned in the manual fails with error:

    nixos-generate-config: no need to specify `/` with `--root`, it is the default

This was introduced in 611b8c4472
(#161034). Now, the command should be called without any arguments.
2022-11-13 22:11:19 +01:00
Pol Dellaiera
364a7d2920
php: switch to nts by default 2022-11-13 11:47:27 +01:00
Robert Schütz
257ec177c8 nixos/syncthing: disallow relative paths
Relative paths are interpreted relative to the working directory, which
is currently unset and thus defaults to `/`. However we want to change
the working directory in a future release such that relative paths are
interpreted relative to `/var/lib/syncthing`.
2022-11-12 11:37:23 -08:00
sternenseemann
880e077b15
Merge pull request #199424 from NixOS/haskell-updates
haskellPackages: update stackage and hackage
2022-11-11 18:18:47 +01:00
Franz Pletz
96edebd788
obs-studio27: remove 2022-11-11 15:36:49 +01:00
Maximilian Bosch
35b146ca31
nixos/nextcloud: fixup openssl compat change
Upon testing the change itself I realized that it doesn't build properly
because

* the `pname` of a php extension is `php-<name>`, not `<name>`.
* calling the extension `openssl-legacy` resulted in PHP trying to compile
  `ext/openssl-legacy` which broke since it doesn't exist:

      source root is php-8.1.12
      setting SOURCE_DATE_EPOCH to timestamp 1666719000 of file php-8.1.12/win32/wsyslog.c
      patching sources
      cdToExtensionRootPhase
      /nix/store/48mnkga4kh84xyiqwzx8v7iv090i7z66-stdenv-linux/setup: line 1399: cd: ext/openssl-legacy: No such file or directory

I didn't encounter that one before because I was mostly interested in
having a sane behavior for everyone not using this "feature" and the
documentation around this. My findings about the behavior with turning
openssl1.1 on/off are still valid because I tested this on `master` with
manually replacing `openssl` by `openssl_1_1` in `php-packages.nix`.

To work around the issue I had to slightly modify the extension
build-system for PHP:

* The attribute `extensionName` is now relevant to determine the output
  paths (e.g. `lib/openssl.so`). This is not a behavioral change for
  existing extensions because then `extensionName==name`.

  However when specifying `extName` in `php-packages.nix` this value is
  overridden and it is made sure that the extension called `extName` NOT
  `name` (i.e. `openssl` vs `openssl-legacy`) is built and installed.

  The `name` still has to be kept to keep the legacy openssl available
  as `php.extensions.openssl-legacy`.

Additionally I implemented a small VM test to check the behavior with
server-side encryption:

* For `stateVersion` below 22.11, OpenSSL 1.1 is used (in `basic.nix`
  it's checked that OpenSSL 3 is used). With that the "default"
  behavior of the module is checked.

* It is ensured that the PHP interpreter for Nextcloud's php-fpm
  actually loads the correct openssl extension.

* It is tested that (encrypted) files remain usable when (temporarily)
  installing OpenSSL3 (of course then they're not decryptable, but on a
  rollback that should still be possible).

Finally, a few more documentation changes:

* I also mentioned the issue in `nextcloud.xml` to make sure the issue
  is at least mentioned in the manual section about Nextcloud. Not too
  much detail here, but the relevant option `enableBrokenCiphersForSSE`
  is referenced.

* I fixed a few minor wording issues to also give the full context
  (we're talking about Nextcloud; we're talking about the PHP extension
  **only**; please check if you really need this even though it's
  enabled by default).

  This is because I felt that sometimes it might be hard to understand
  what's going on when e.g. an eval-warning appears without telling where
  exactly it comes from.
2022-11-11 14:45:46 +01:00
Anderson Torres
d48d7a69aa
Merge pull request #174975 from danth/firefox-module
nixos/firefox: init
2022-11-10 21:31:57 -03:00
github-actions[bot]
a4ffa492ba
Merge master into haskell-updates 2022-11-11 00:17:01 +00:00
Maximilian Bosch
2a63e4f902
Merge pull request #200218 from Ma27/rm-kernel-4.9
linux_4_9: remove
2022-11-10 23:34:56 +01:00
Daniel Thwaites
01b3d0bf25
nixos/firefox: init 2022-11-10 19:07:37 +00:00
Janne Heß
798bc67cff
Merge pull request #200319 from helsinki-systems/feat/redis-module-changes
nixos/redis: misc module changes
2022-11-10 16:03:54 +01:00
sternenseemann
5c044644a6 Merge remote-tracking branch 'origin/master' into haskell-updates 2022-11-10 13:56:56 +01:00
github-actions[bot]
f3a93620b1
Merge master into staging-next 2022-11-10 12:01:27 +00:00
Maximilian Bosch
61128cba67
nixos/nextcloud: minor docs cleanup for openssl change
* s/NextCloud/Nextcloud/g
* `enableBrokenCiphersForSSE` should be enabled by default for any NixOS
  installation from before 22.11 to make sure existing installations
  don't run into the issue. Not the other way round.
* Update release notes to reflect on that.
* Improve wording of the warning a bit: explain which option to change
  to get rid of it.
* Ensure that basic tests w/o `enableBrokenCiphersForSSE` run with
  OpenSSL 3.
2022-11-10 12:17:43 +01:00
Raito Bezarius
7eefaeb5e3
nextcloud25: use openssl 1.1 as a PHP extension to fix RC4 encryption 2022-11-10 12:17:43 +01:00
Anderson Torres
40962b461b
Merge pull request #200300 from thiagokokada/mame-tools-init
mame-tools: init at 0.249
2022-11-10 07:45:00 -03:00
Thiago Kenji Okada
891511b619 nixos/doc: document mame package changes 2022-11-10 09:47:54 +00:00
Thiago Kenji Okada
d868053b40 nixos/doc: formatting improvements 2022-11-10 09:47:54 +00:00
ajs124
bc4e9a890c nixos/redis: store config in state directory
this is needed because certain redis features, like sentinel, require
the config file to be persistent
2022-11-09 21:49:33 +01:00
Oto Petřík
4729d5d7f6 nixos/proxmox-image: allow building UEFI images
Allow building other than Legacy-BIOS-only Proxmox images.
Default is unchanged.

To build UEFI proxmox image use:
  proxmox.qemuConf.bios = "ovmf";
(default is "seabios")

To build image bootable using both "seabios" and "ovmf" use:
  partitionTableType = "hybrid";
BIOS can be switched in Proxmox between "seabios" and "ovmf" and VM still boots.
(GRUB2-only, systemd-boot does not boot under "seabios")

To build systemd-boot UEFI image:
  proxmox.qemuConf.bios = "ovmf";
  boot.loader.systemd-boot.enable = true;
2022-11-09 03:19:42 +01:00
github-actions[bot]
8deed80953
Merge master into haskell-updates 2022-11-09 00:16:09 +00:00
github-actions[bot]
81316207ec
Merge master into staging-next 2022-11-09 00:02:55 +00:00
Maximilian Bosch
fbc4961be9
nixos/doc: mention signald update in release-notes and related upgrade instructions 2022-11-08 23:27:20 +01:00
github-actions[bot]
4517d658d3
Merge master into staging-next 2022-11-08 18:01:16 +00:00
Maximilian Bosch
8d9133c67d
linux_4_9: remove
Support will be dropped on 01 Jan 2023[1]. Normally we'd keep it around
until then, but considering that it's an LTS kernel it may be better to
do it before 22.11 to make sure there are no unpleasant surprises.

Closes #199933

[1] https://endoflife.date/linux
2022-11-08 16:30:14 +01:00
happysalada
2c5abd89c7 rmem_max: define merge function 2022-11-08 10:30:10 -05:00
Philipp Hauck
cb82a002f8 nixos: correct install summary 2022-11-08 15:29:42 +01:00
github-actions[bot]
917a1408b8
Merge master into staging-next 2022-11-08 06:01:15 +00:00
Sandro
4f8277ef10
Merge pull request #200094 from mdlayher/mdl-zrepl 2022-11-08 01:53:26 +01:00
github-actions[bot]
7db1be3e27
Merge master into haskell-updates 2022-11-08 00:16:51 +00:00
github-actions[bot]
8345eea2ce
Merge master into staging-next 2022-11-08 00:02:57 +00:00
Matt Layher
8ec252784e
zrepl: 0.5.0 -> 0.6.0
Signed-off-by: Matt Layher <mdlayher@gmail.com>
2022-11-07 18:35:44 -05:00
Martin Weinelt
0f774a39d4
Merge pull request #196957 from Madouura/dev/protonup
close https://github.com/NixOS/nixpkgs/pull/193062
close https://github.com/NixOS/nixpkgs/issues/186974
2022-11-07 23:24:41 +01:00
Vladimír Čunát
7fa607bab4
Merge #194670: arangodb: 3.4.8 -> 3.10.0 2022-11-07 22:25:43 +01:00
laalsaas
5f07247a07 mepo: init module 2022-11-07 20:27:00 +01:00
github-actions[bot]
938efbfd26
Merge master into staging-next 2022-11-07 18:01:17 +00:00
Manuel Bärenz
891dfb1b63 nixos/mastodon: add option mediaAutoRemove 2022-11-07 18:58:58 +01:00
sternenseemann
c7a0d75bd1 haskell.compiler.ghc92: 9.2.4 -> 9.2.5 2022-11-07 17:29:47 +01:00
github-actions[bot]
e51ba60580
Merge master into staging-next 2022-11-07 00:03:30 +00:00
Yarny0
6f622e91c5 cups-drv-rastertosag-gdi (cups driver): gzip ppd files
ppd files are gzipped to save some space.
The `gzip` "-n" option prevents gzip from storing
a timestamp, thus facilitating reproducibility.
2022-11-06 16:19:22 +01:00
Madoura
e747d0a368
protonup-ng: init at 0.2.1
Co-authored-by: IceDBorn <github.envenomed@dralias.com>
2022-11-06 09:05:55 -06:00
github-actions[bot]
52c99d862c
Merge staging-next into staging 2022-11-05 06:02:05 +00:00
Dominique Martinet
01ff1dd23f logrotate service: cleanup deprecated options 2022-11-05 10:34:03 +09:00
github-actions[bot]
07bf88ec8f
Merge staging-next into staging 2022-11-04 18:01:42 +00:00
ajs124
92fe5610ff
Merge pull request #199094 from NickCao/pdns
pdns: 4.6.3 -> 4.7.2
2022-11-04 14:09:36 +01:00
Oleksandr Chupryna
3abe0af96b twingate: init at 1.0.60 2022-11-04 13:29:03 +01:00
Nick Cao
bbc2675e19
nixos/pdns: add note about schema change to release note 2022-11-04 09:07:27 +08:00
github-actions[bot]
08b08d0caf
Merge staging-next into staging 2022-11-04 00:03:34 +00:00
Franz Pletz
0fc1caab21
Merge pull request #199158 from aaronjheng/perf-trace 2022-11-04 00:19:56 +01:00
ajs124
f888abe781
Merge pull request #198484 from LeSuisse/cassandra-2-drop
cassandra_2_1, cassandra_2_2: drop
2022-11-04 00:05:42 +01:00
ajs124
2dd8b1bebf
Merge pull request #198998 from LeSuisse/percona-server56-drop
percona-server56: drop
2022-11-03 23:56:30 +01:00
Aaron Jheng
d7618af3d8
perf: remove trace binary 2022-11-03 22:31:38 +00:00
ajs124
bdcc05301a
Merge pull request #198748 from Mic92/tt-rss
tt-rss: 2021-06-21 -> 2022-10-15
2022-11-03 20:48:34 +01:00
Winter
8538873dab sourcehut.dispatchsrht: remove
dispatch has been deprecated since August (see https://sourcehut.org/blog/2022-08-01-dispatch-deprecation-plans/).
2022-11-01 22:04:40 -04:00
github-actions[bot]
452026e7da
Merge staging-next into staging 2022-11-02 00:03:04 +00:00
Sandro
a01b2b807e
Merge pull request #197221 from azahi/endlessh-module 2022-11-01 23:44:25 +01:00
Thomas Gerbet
2669e59da4 percona-server56: drop
Percona Server for MySQL 5.6 is no more maintained due to the EOL of MySQL 5.6.
See https://www.percona.com/downloads/Percona-Server-5.6/LATEST/.

A bit hard to list all the potential security issues affecting it but CVE-2021-27928
should be one of them.
2022-11-01 16:30:21 +01:00
Sandro
fad5f168d2
Merge pull request #197010 from tpwrules/disable-qt-cache 2022-11-01 16:09:35 +01:00
Thiago Kenji Okada
21fdd3855b
Merge pull request #198590 from zhaofengli/cemu-wiiu
cemu: init at 2.0-10
2022-10-31 20:48:52 +00:00
Zhaofeng Li
4f57829303 rl-2211: Mention the cemu-ti rename
The cemu-ti rename was done in #188939.
2022-10-31 14:03:26 -06:00
John Soo
f2585031bf
arangodb: document new parameters and aarch64-linux drop 2022-10-31 09:55:55 -07:00
Stanisław Pitucha
08fbb5de2d
Merge pull request #190325 from fgaz/merecat/init
merecat: init at 2.31
2022-10-31 21:23:03 +11:00
Francesco Gazzetta
b43605fb03 nixos/merecat: init 2022-10-31 09:24:28 +01:00
Smaug123
73a4e61349 tt-rss: 2021-06-21 -> 2022-08-01
Pull in a year of upstream changes.
This update will involve two database migrations when logging in to the
resulting service.
2022-10-31 07:50:31 +01:00
Sandro
4d4fdde2cf
Merge pull request #197876 from iopq/alt-history 2022-10-30 19:51:28 +01:00
John Soo
86e1247a47
arangodb: note removal of old versions in rl-2211 notes 2022-10-30 10:22:11 -07:00
Thomas Gerbet
c7c4f66546 cassandra_2_1, cassandra_2_2: drop
Cassandra 2.x is no more supported upstream and is affected by some vulnerabilities
(CVE-2020-13946, CVE-2020-17516).
2022-10-29 17:49:57 +02:00
Florian Klink
55c1fca0d8
Merge pull request #198336 from ck3d/doc-overrideStrategy
doc/rl-2211: add new option overrideStrategy
2022-10-29 16:24:42 +01:00
Christian Kögler
fa269d4e0d doc/rl-2211: add new option overrideStrategy 2022-10-29 16:19:50 +02:00
Thiago Kenji Okada
f83198ab9c
Merge pull request #171680 from bryanasdev000/zfshibernation
nixos/zfs: introduce option to control hibernation
2022-10-29 10:37:52 +01:00
Bryan A. S
a53858010b nixos/zfs: introduce option to control hibernation 2022-10-29 04:46:27 -03:00
iopq
96f7444bc8 nixos/xray: init service 2022-10-28 23:53:41 +08:00
Sandro
432e5e65a9
Merge pull request #197104 from Luflosi/kubo-RFC42 2022-10-27 23:48:33 +02:00
Patrick Jackson
316948c5ad nixos/mullvad-vpn: add cross-platform availability announcement to release notes 2022-10-27 12:39:25 -07:00
Sandro
8f0c7e38cb
Merge pull request #190181 from RaitoBezarius/garage-module
services/garage: init
2022-10-27 02:14:01 +02:00
Sandro
8ebdb3e6fe
Merge pull request #176701 from CRTified/adguardhome-schemaversion 2022-10-26 22:52:04 +02:00
Thiago Kenji Okada
73ba4de363
Merge pull request #175128 from davidak/doc-graphical-installer
nixos/doc: improve install instructions
2022-10-26 13:42:48 +01:00
davidak
f701bd5986 nixos/doc: improve install instructions
- Update download URLs
- Replace "USB stick"/"USB Drive" with "USB flash drive" as that seem more correct

  https://en.wikipedia.org/wiki/USB_flash_drive
  https://elementary.io/docs/installation#choose-operating-system

- Don't mention CD as easiest option anymore,
  as all modern systems should be able to boot from USB,
  but many don't have a CD drive. Burning CDs is also usually wasteful as you
  can't burn them again.
- Remove link to NixOS Wiki (Making_the_installation_media) as it is not needed
- Add Etcher and USBImager as graphical tools to create install drive
- Make dd command consistent and use block size of 4 MB for faster flashing
- More consistent text
- Add instructions for "Booting from the install medium"

  Inspired by 9a91b0f495/docs/installation.md (booting-from-the-install-drive-booting-from-the-installation-medium-clear-float-2)

- Add instructions for "Graphical Installation"
- Restructure headings and anchors for "Manual Installation"
- Adding legacy anchors for "Manual Installation" to not break links

Co-authored-by: j-k <dev@j-k.io>
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
Co-authored-by: Robert Schütz <github@dotlambda.de>
Co-authored-by: Jörg Thalheim <Mic92@users.noreply.github.com>
Co-authored-by: Thiago Kenji Okada <thiagokokada@gmail.com>
2022-10-26 14:22:15 +02:00
R. Ryantm
876320522f bloat: unstable-2022-09-23 -> unstable-2022-10-25
Co-authored-by: Francesco Gazzetta <fgaz@fgaz.me>
2022-10-26 11:41:53 +02:00
Jan Tojnar
fa285355ee nixos/doc/manual/md-to-db.sh: Add support for <kbd> element 2022-10-26 01:46:44 +02:00
Vladimír Čunát
0079830888
Merge #195644: mysql57: drop 2022-10-25 21:23:27 +02:00
Carl Richard Theodor Schneider
1526a1b041 adguardhome: Add schema_version
This will add `passthru.schema_version` to be used as default value for
the adguardhome module.
It will also update the `update.sh` to keep the `schema_version` in sync
with the version by inspecting the sourcecode.

This might break existing configs, if they use deprecated values that don't
appear in newer schema_versions and schema_version wasn't set explicitly.
Explicit declarations of schema_version always have higher priority.

This also removes the `host` and `config` settings in favour of using the
appropriate `settings`.

Fixes #173938

Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2022-10-25 17:35:27 +02:00
Skyler Grey
acf1d993b9
release-notes: Move PolyMC from "highlights"
- Previously PolyMC's removal was counted as a release highlight
- It probably shouldn't be, as it's more a notable change rather than a
  highlight
- Thanks @Ma27 for noticing this
2022-10-24 08:07:51 +01:00
Raito Bezarius
9b7dc6cb1c services/garage: init 2022-10-23 18:54:18 +02:00
Maximilian Bosch
40b7f52b8f
nextcloud25: init 2022-10-23 17:20:49 +02:00
Maximilian Bosch
f9afc634e3
Merge pull request #191768 from KFearsoff/grafana-rfc42
nixos/grafana: refactor for RFC42
2022-10-23 13:28:25 +02:00
Julien Malka
b54ae5a868 nixos/uptime-kuma: init module 2022-10-23 12:44:16 +02:00
Linus Heckemann
79ec5f2d2b
Merge pull request #161124 from Atemu/nixos/nix-skip-all-checks
nixos/nix-daemon: make checkConfig fully disable nix.conf validation
2022-10-23 07:55:06 +02:00
KFears
9f963f36e5 nixos/grafana: refactor settings for RFC42 2022-10-22 23:56:14 +04:00
KFears
7908ef062f nixos/grafana: add alerting 2022-10-22 23:54:32 +04:00
KFears
0852dc859e nixos/grafana: refactor datasources for RFC42
This commit refactors `services.grafana.provision.datasources` towards
the RFC42 style. To preserve backwards compatibility, we have to jump
through a ton of hoops, introducing esoteric type signatures and bizarre
structs. The Grafana module definition should hopefully become a lot
cleaner after a release cycle or two once the old configuration style is
completely deprecated.
2022-10-22 23:53:24 +04:00
Azat Bahawi
76ccbea152
nixos/endlessh: init module 2022-10-22 16:07:52 +03:00
Luflosi
a255c43f44
nixos/kubo: convert to RFC42-style settings 2022-10-21 20:54:00 +02:00
KFears
89e30315e0 nixos/grafana: refactor dashboards for RFC42
This commit refactors `services.grafana.provision.dashboards` towards
the RFC42 style. To preserve backwards compatibility, we have to jump
through a ton of hoops, introducing esoteric type signatures and bizarre
structs. The Grafana module definition should hopefully become a lot
cleaner after a release cycle or two once the old configuration style is
completely deprecated.
2022-10-21 16:42:30 +04:00
Thomas Watson
04706f6b12 release-notes: add info about disabled QML cache 2022-10-20 22:15:04 -05:00