Commit Graph

2314 Commits

Author SHA1 Message Date
Pierre Bourdon
91a00709ae
Merge pull request #273219 from Lurkki14/tuxclocker-master
tuxclocker: init at 1.4.0
2023-12-17 17:30:18 +01:00
Jussi Kuokkanen
60cb6ee94f nixos/tuxclocker: init module 2023-12-17 18:16:45 +02:00
Gabriel Arazas
a73ae4bf9f
nixos/guix: add Guix home support 2023-12-14 17:41:22 +08:00
Gabriel Arazas
5fb40a5816
nixos/guix: remove Service.MemoryDenyWriteExecute for GC service
Guile 3 uses JIT needing write and execute permissions.
2023-12-12 10:19:37 +08:00
Peder Bergebakken Sundt
e43bbcfaec
Merge pull request #272557 from ambroisie/update-tandoor-recipes
tandoor-recipes: 1.5.6 -> 1.5.10
2023-12-09 03:12:36 +01:00
Melvyn
de12dd74d2
nixos/sshServe: use bash as default shell for nix-ssh user
Using the user-set default shell (which is intended for non-system users) for the nix-ssh user can lead to unpredictable behavior, such as `fish` complaining about the unwritable home directory on every connection. Bash is guaranteed to be available and work as expected, so explicitly use it instead.
2023-12-08 14:01:35 -08:00
Gabriel Arazas
85fcb9b4ef
nixos/guix: fix user activation script 2023-12-08 17:56:54 +08:00
Bruno BELANYI
d23f965f8b nixos/tandoor-recipes: fix deprecated config key
See the 1.5.10 release notes [1].

[1]: https://github.com/TandoorRecipes/recipes/releases/tag/1.5.10
2023-12-07 19:12:15 +00:00
Nick Cao
c0443ea94c
Merge pull request #271869 from wentasah/redmine-assertions
nixos/redmine: Fix database assertions
2023-12-04 08:56:45 -05:00
Michal Sojka
8667baf161 nixos/redmine: Fix database assertions
Recent PR 266270[1] modified an assertion related to database settings
of the redmine service. There are two problems with that change:

1. Assert message was not updated to reflect the change in the assert
   condition.

2. The new condition applies only to postgresql, not the default
   mysql. Therefore, the assertion breaks existing mysql-based
   installations without any reason.

This commit fixes these by 1) reverting the modified assertion to the
previous value, making the message match the condition and 2) adding a
new assertion that applies only to postgresql.

[1]: https://github.com/NixOS/nixpkgs/pull/266270
2023-12-03 14:41:42 +01:00
Weijia Wang
f5f2b471f3
Merge pull request #271437 from martinetd/ankisyncd-deprecation
ankisyncd: mark module as deprecated
2023-12-03 14:35:57 +01:00
Weijia Wang
4e81387d5b
Merge pull request #264331 from foo-dogsquared/add-nixos-guix-module
nixos/guix: init
2023-12-03 13:03:43 +01:00
LDprg
6f33e6e4ab nixos/preload: fix log permission 2023-12-02 19:19:33 +01:00
Dominique Martinet
8a2c07ba40 ankisyncd: mark module as deprecated 2023-12-01 21:21:35 +09:00
Gabriel Arazas
ad277ea47e nixos/guix: init 2023-12-01 09:10:37 +01:00
Weijia Wang
07183914f1
Merge pull request #257692 from telotortium/anki-sync-server
nixos/anki-sync-server: init
2023-12-01 08:30:36 +01:00
h7x4
79d3d59f58
treewide: replace mkPackageOptionMD with mkPackageOption 2023-11-30 19:03:14 +01:00
Weijia Wang
b474de4779 nixos/anki-sync-server: minor cleanup 2023-11-30 17:32:03 +01:00
Robert Irelan
8fe9c18ed3 nixos/anki-sync-server: init
Provide a NixOS module for the [built-in Anki Sync
Server](https://docs.ankiweb.net/sync-server.html) included in recent
versions of Anki. This supersedes the `ankisyncd` module, but we should
keep that for now because `ankisyncd` supports older versions of Anki
clients than this module.
2023-11-30 17:25:17 +01:00
Weijia Wang
8c734937d6 nixos/sourcehut: fix eval 2023-11-30 02:52:50 +01:00
Weijia Wang
feeae486de
Merge pull request #261702 from h7x4/replace-mkoption-with-mkpackageoption
treewide: use `mkPackageOption`
2023-11-30 02:49:30 +01:00
tomberek
a2de752222
Merge pull request #267538 from nessdoor/pkgs/paste.sr.ht
sourcehut.pastesrht: add missing backend component
2023-11-28 12:40:09 -05:00
Nick Cao
e0ece67a97
Merge pull request #270256 from schmittlauch/gite-forgejo-migration-phrasing
nixos/forgejo docs: correct phrasing
2023-11-27 09:33:21 -05:00
Tomas Antonio Lopez
9e6f9c6d83 nixos/sourcehut: remove usages of 'with lib;'
Inherit library attributes at a finer granularity, instead.
2023-11-27 08:22:48 -03:00
Tomas Antonio Lopez
ba6817ed22 nixos/sourcehut: add myself as maintainer 2023-11-27 08:22:48 -03:00
Tomas Antonio Lopez
087c83f45c nixos/sourcehut: reformat expressions using nixpkgs-fmt 2023-11-27 08:22:48 -03:00
h7x4
0a37316d6c
treewide: use mkPackageOption
This commit replaces a lot of usages of `mkOption` with the package
type, to be `mkPackageOption`, in order to reduce the amount of code.
2023-11-27 01:28:36 +01:00
Trolli Schmittlauch
0e893a9f22 nixos/forgejo docs: correct phrasing 2023-11-26 21:43:32 +01:00
Maciej Krüger
b63af5d7ea
Merge pull request #265728 from nbraud/nixos/sudo-rs/ssm-agent 2023-11-26 21:37:15 +01:00
Lin Jian
5ba42a0de2
Merge pull request #260902 from LDprg/master
preload: init at 0.6.4
2023-11-25 23:29:40 -06:00
LDprg
a0f5d5e500 nixos/preload: init 2023-11-25 20:07:10 +01:00
Robert Hensing
779e50580c
Merge pull request #224611 from srhb/kafka-settings-module
Kafka: Settings and KRaft support
2023-11-23 17:35:29 +01:00
Sarah Brofeldt
cfe3ca1f2f nixos/apache-kafka: Add manual chapter 2023-11-22 06:47:09 +01:00
Sarah Brofeldt
45f84cdfd5 nixos/apache-kafka: structured settings
- Use lazyAttrs (for config references) settings for main server.properties.
- Drop dangerous default for "log.dirs"
- Drop apache-kafka homedir; unused and confusing
- Support formatting kraft logdirs
2023-11-22 06:47:08 +01:00
Mario Rodas
fa14a14694
Merge pull request #258036 from anthonyroussel/fix-ssm-seelog
nixos/amazon-ssm-agent: fix missing seelog.xml file
2023-11-19 18:55:57 -05:00
Nick Cao
d936414252
Merge pull request #268132 from bendlas/forgejo-release-notes
nixos/forgejo/docs: fix typo
2023-11-18 09:39:29 -05:00
emilylange
b3e8dae766 nixos/forgejo: remove postgresql_15 permission work-around
This is no longer necessary as of
ccfe07c316.

Previously: b8585a119c.
2023-11-18 12:14:09 +01:00
Ryan Lahfa
ccfe07c316
Merge pull request #266270 from Ma27/postgresql-ownership-15 2023-11-17 18:02:17 +01:00
Herwig Hochleitner
8c441fc2a7 nixos/forgejo/docs: fix typo 2023-11-17 17:18:57 +01:00
Herwig Hochleitner
20832d5995
nixos/forgejo: changelog and migration instructions (#267248)
* nixos/forgejo: changelog and migration instructions

* nixos/forgejo/docs: clarify sentence

Co-authored-by: Trolli Schmittlauch <schmittlauch@users.noreply.github.com>

* nixos/forgejo/docs: document migration via gitea impersonation

* nixos/forgejo/docs: note about url change on migration

* nixos/forgejo/docs: note about migration (non-)requirement

* nixos/forgejo/docs: header ids

* nixos/forgejo/docs: clarify release notes entry

Co-authored-by: Emily <git@emilylange.de>

* nixos/forgejo/docs: improve manual entry

Co-authored-by: Emily <git@emilylange.de>

* nixos/forgejo/docs: move changelog line to the middle of the section

as noted <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->

---------

Co-authored-by: Trolli Schmittlauch <schmittlauch@users.noreply.github.com>
Co-authored-by: Emily <git@emilylange.de>
2023-11-17 15:55:24 +01:00
Raito Bezarius
7cd63bff21 nixos/sourcehut: do not use ensureDBOwnership
Given that SourceHut uses unfortunate defaults for database name, it will not
be realistic to fix this in time for 23.11.

We will leave the workaround and leave it to SourceHut maintainers to pick up the work
to clean this up after 23.11.
2023-11-17 15:52:51 +01:00
zzywysm
3f4c802d26 initrd/autofs4: remove legacy references to autofs4 kernel module
Back in 2018, the kernel decided to remove the autofs4 module.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2225d931f75ddd3c39f4d0d195fad99dfd68671

This caused immediate problems with systemd, so the kernel allowed autofs4 as a config option that would simply map back to autofs.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d02d21ea007b6b33cdaf15c2f84fb1fea996ecc2

Earlier this year, in July 2023, the kernel got tired of people not adapting to the autofs change, and forced the issue by fixing it within the kernel defconfigs, which NixOS uses as a starting point for their own kernel configs.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f2190d6b7112d22d3f8dfeca16a2f6a2f51444e

This commit reflects the post-2018 reality by changing the remaining autofs4 references to autofs. Since this change initially happened in kernel 4.18 and we no longer support 4.x kernels, we don't need any backwards-compatibility tweaks.
2023-11-14 15:37:50 -05:00
Tomas Antonio Lopez
5476b490d4 nixos/sourcehut: compile and integrate paste.sr.ht API component 2023-11-14 11:12:14 +01:00
Maximilian Bosch
48459567ae nixos/postgresql: drop ensurePermissions, fix ensureUsers for postgresql15
Closes #216989

First of all, a bit of context: in PostgreSQL, newly created users don't
have the CREATE privilege on the public schema of a database even with
`ALL PRIVILEGES` granted via `ensurePermissions` which is how most of
the DB users are currently set up "declaratively"[1]. This means e.g. a
freshly deployed Nextcloud service will break early because Nextcloud
itself cannot CREATE any tables in the public schema anymore.

The other issue here is that `ensurePermissions` is a mere hack. It's
effectively a mixture of SQL code (e.g. `DATABASE foo` is relying on how
a value is substituted in a query. You'd have to parse a subset of SQL
to actually know which object are permissions granted to for a user).

After analyzing the existing modules I realized that in every case with
a single exception[2] the UNIX system user is equal to the db user is
equal to the db name and I don't see a compelling reason why people
would change that in 99% of the cases. In fact, some modules would even
break if you'd change that because the declarations of the system user &
the db user are mixed up[3].

So I decided to go with something new which restricts the ways to use
`ensure*` options rather than expanding those[4]. Effectively this means
that

* The DB user _must_ be equal to the DB name.
* Permissions are granted via `ensureDBOwnerhip` for an attribute-set in
  `ensureUsers`. That way, the user is actually the owner and can
  perform `CREATE`.
* For such a postgres user, a database must be declared in
  `ensureDatabases`.

For anything else, a custom state management should be implemented. This
can either be `initialScript`, doing it manual, outside of the module or
by implementing proper state management for postgresql[5], but the
current state of `ensure*` isn't even declarative, but a convergent tool
which is what Nix actually claims to _not_ do.

Regarding existing setups: there are effectively two options:

* Leave everything as-is (assuming that system user == db user == db
  name): then the DB user will automatically become the DB owner and
  everything else stays the same.

* Drop the `createDatabase = true;` declarations: nothing will change
  because a removal of `ensure*` statements is ignored, so it doesn't
  matter at all whether this option is kept after the first deploy (and
  later on you'd usually restore from backups anyways).

  The DB user isn't the owner of the DB then, but for an existing setup
  this is irrelevant because CREATE on the public schema isn't revoked
  from existing users (only not granted for new users).

[1] not really declarative though because removals of these statements
    are simply ignored for instance: https://github.com/NixOS/nixpkgs/issues/206467
[2] `services.invidious`: I removed the `ensure*` part temporarily
    because it IMHO falls into the category "manage the state on your
    own" (see the commit message). See also
    https://github.com/NixOS/nixpkgs/pull/265857
[3] e.g. roundcube had `"DATABASE ${cfg.database.username}" = "ALL PRIVILEGES";`
[4] As opposed to other changes that are considered a potential fix, but
    also add more things like collation for DBs or passwords that are
    _never_ touched again when changing those.
[5] As suggested in e.g. https://github.com/NixOS/nixpkgs/issues/206467
2023-11-13 17:16:25 +01:00
dadada
f192930a79
nixos/soft-serve: fix typos in option descriptions 2023-11-12 22:34:54 +01:00
tomberek
7859adb9d6
Merge pull request #245394 from christoph-heiss/pkgs/sourcehut
sourcehut: update all component; lots of fixes
2023-11-11 13:42:19 -05:00
Christoph Heiss
88a3d2a0b4
sourcehut: fix postgresql database permission for postgresql >= 15
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 15:50:16 +01:00
Christoph Heiss
66b86f8a2e
sourcehut: de-duplicate nginx add_header directives
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 14:14:59 +01:00
Christoph Heiss
acd21dad52
sourcehut: use systemd.tmpfiles instead of manually creating logfiles
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 14:14:59 +01:00
Christoph Heiss
641e54bb28
sourcehut: create logs directory unconditionally
An empty log directory, in case it stays unused, does not hurt anyone.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
fc6addb147
sourcehut: reword api-origin option description
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
78cc2783c8
sourcehut: drop obsolete services array in favor of indivdual enable flags
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
6b25e09d2d
sourcehut: fix up some more bin paths
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
5841d27497
sourcehut: explicitly disallow openssh to socket-active
This breaks the (already fragile) gitsrht-dispatch -> gitsrht-keys
command chain.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
c39ba7f5b1
sourcehut: remove set -x from ssh commands
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:46 +01:00
Christoph Heiss
6648488333
sourcehut: fix logging of git/hg ssh commands
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:45 +01:00
Christoph Heiss
6e51802196
sourcehut: fix repos path by using actual settings value
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:32 +01:00
Christoph Heiss
c123a37be6
sourcehut.gitsrht: 0.78.20 -> 0.84.2
Newer version of the gitsrht-api service call setrlimit() on startup,
thus allow it in the `SystemCallFilter` definition for the service.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:30 +01:00
Christoph Heiss
d703173520
sourcehut: make /query endpoint config common to all services
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 12:39:28 +01:00
Anthony Roussel
e30f48be94
treewide: fix redirected and broken URLs
Using the script in maintainers/scripts/update-redirected-urls.sh
2023-11-11 10:49:01 +01:00
Anthony Roussel
3dd50eaa8f
nixos/amazon-ssm-agent: fix missing seelog.xml file 2023-11-09 12:02:48 +01:00
nicoo
690f027251 nixos/ssm-agent: Handle sudo-rs too 2023-11-05 20:49:41 +00:00
Martin Weinelt
05e8361387
Merge pull request #261867 from matrss/set-paperless-secret-key
nixos/paperless: set PAPERLESS_SECRET_KEY
2023-11-01 12:33:23 +01:00
arcnmx
0711d3d69b xmrig: add meta.mainProgram
See #246386
2023-10-28 11:21:57 -07:00
Matthias Riße
63ef033992 nixos/paperless: set PAPERLESS_SECRET_KEY
If the PAPERLESS_SECRET_KEY environment variable is left unset
paperless-ngx defaults to a well-known value, which is insecure.

Co-authored-by: Erik Arvstedt <erik.arvstedt@gmail.com>
2023-10-27 21:11:01 +02:00
Mario Rodas
84a877ed30
Merge pull request #261722 from anthonyroussel/ssm-agent-rename
amazon-ssm-agent: rename from ssm-agent
2023-10-25 04:18:24 -05:00
emilylange
402b5c67a8
nixos/forgejo: pass {env}GIT_PROTOCOL via ssh to forgejo
when using the host's openssh service (not the builtin golang one).

This enables the use of the much faster and more efficient wire protocol
version 2.
See https://git-scm.com/docs/protocol-v2
2023-10-24 03:27:20 +02:00
Anthony Roussel
ccf080ee05
amazon-ssm-agent: rename from ssm-agent 2023-10-22 22:04:09 +02:00
Emily
a61c6b478d
Merge pull request #262741 from emilylange/nixos-forgejo-postgres15
nixos/forgejo: work around permissions error on `postgresql_15`
2023-10-22 21:04:41 +02:00
Artturi
b2426befa0
Merge pull request #259784 from dmytrokyrychuk/init-spice-autorandr
spice-autorandr: init at 0.0.2
2023-10-22 18:52:10 +03:00
Dmytro Kyrychuk
d147d7feed nixos/spice-autorandr: init 2023-10-22 13:45:56 +00:00
emilylange
b8585a119c
nixos/forgejo: work around permissions error on postgresql_15
From `postgresql_15`'s release notes:
> PostgreSQL 15 also revokes the CREATE permission from all users except
a database owner from the public (or default) schema.

https://www.postgresql.org/about/news/postgresql-15-released-2526/

This directly affects `services.postgresql.ensureUsers` in NixOS,
leading to
> permission denied for schema public

`postgresql_15` is now the default for stateVersion `23.11`/`unstable`.

So until this is resolved globally, we work around this issue.
2023-10-22 15:25:34 +02:00
Ryan Lahfa
efccbbab5b
Merge pull request #258994 from lorenzleutgeb/msr
nixos/hardware/cpu/x86/msr: init
2023-10-22 10:24:12 +01:00
Lin Jian
c132df63df
Merge pull request #250792 from ckiee/init-rkvm
{,nixos/}rkvm: init
2023-10-22 17:11:12 +08:00
Lorenz Leutgeb
84803308bf nixos/xmrig: Use hardware.cpu.x86.msr 2023-10-22 09:41:00 +02:00
dadada
77f7b5a3e5
nixos/soft-serve: init
This adds a NixOS module for Soft Serve, a tasty, self-hostable Git
server for the command line. The module has a test that checks some
basic things like creating users, creating a repo and cloning it.

Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2023-10-21 17:51:42 +02:00
Dmitry Kalinkin
6392f18258
Merge pull request #262351 from h7x4/remove-nix-exec-bits
treewide: remove execute bit for non-executable `*.nix` files
2023-10-20 14:45:16 -04:00
h7x4
e6321d2788
treewide: remove execute bit for non-executable *.nix files 2023-10-20 19:55:39 +02:00
Bjørn Forsman
142074c2a8 nixos: fix bad mkEnableOption descriptions
Fix descriptions that don't account for (1) the "Whether to enable"
prefix or (2) the automatically added trailing dot.
2023-10-20 16:22:40 +01:00
ckie
f3ad4def37
nixos/rkvm: init
Co-authored-by: Lin Jian <me@linj.tech>
2023-10-18 06:21:40 +03:00
Atemu
16fb0b365d
Merge pull request #259056 from leona-ya/nixos-paperless-systemd-254
nixos/paperless: fix start with latest systemd
2023-10-11 13:15:24 +02:00
Sarah Brofeldt
9b73af9b27
Merge pull request #259498 from TLATER/tlater/gitea-metrics
gitea: Add option to supply the metrics token via file
2023-10-08 07:53:33 +02:00
Tristan Daniël Maat
b59e5a34e7
nixos/gitea: Add option to supply the metrics token via file 2023-10-07 21:53:02 +02:00
K900
d4eca0e8bb nixos/gollum: remove non-existent maintainer 2023-10-06 23:52:42 +03:00
Lin Jian
de26e61f7e
Merge pull request #258582 from returntoreality/gpsd-extra-args
nixos/gpsd: add extraArgs option
2023-10-06 22:54:51 +08:00
Leona Maroni
6249a0983d
nixos/paperless: fix start with latest systemd 2023-10-05 12:56:37 +02:00
Linus Karl
342cc761df nixos/gpsd: add extraArgs option
Allows setting addtional arguments to gpsd
2023-10-02 15:10:12 +02:00
Cabia Rangris
6f7933059d
Merge pull request #237404 from cab404/cab/moonraker-gpiod
moonraker: add useGpiod
2023-10-02 06:45:16 +04:00
Vladimir Serov
5edabf7c0b
moonraker: add useGpiod 2023-10-02 06:09:58 +04:00
Mario Rodas
fbf686309f
Merge pull request #256725 from trofi/modules-xmr-stak-cudaSupport-removal
modules/xmr-stak: drop broken cudaSupport option
2023-09-29 06:13:19 -05:00
Sander van der Burg
32c36780d1 dysnomia: 0.10.1 -> 0.10.2 2023-09-27 18:35:30 +02:00
Sergei Trofimovich
e57034f9a7 modules/xmr-stak: drop broken cudaSupport option
Tanvir Ahmed T. reports that `services.xmr-stak.enable = true;` shows
that `23.05` ships broken `xmr-stak` module:

    error: function 'anonymous lambda' called with unexpected argument 'cudaSupport'

I broke it when I removed `cudaSupport` flag in
    a5ce71d4e8

I'm just removing the option without an attempt to supply the stub as
module was already broken on `23.05` release. There are probably no
users of `xmr-stak` module by now.

Closes: https://github.com/NixOS/nixpkgs/issues/256703
2023-09-22 17:40:04 +01:00
bb2020
5caa82281e nixos/mbpfan: adjust defaults 2023-09-20 16:10:26 +03:00
Fabián Heredia Montiel
f8056c5007
Merge pull request #255145 from BuonHobo/patch-1
jellyfin: Start service after network is up
2023-09-16 12:00:21 -06:00
Alex
ec9009f8e4
Jellyfin service starts after network-online.target
To those who use Jellyfin's DLNA server, it can happen that the DLNA server starts before we are connected to the LAN.

When this happens, Jellyfin only publishes the DLNA server on the local ports and is not discoverable by devices in the LAN.

In order to fix this, I'm ensuring that Jellyfin starts after we are connected to the network, making it properly discoverable by DLNA clients.

After making this change, Jellyfin's DLNA server is now working as expected on my machine. It used to be consistently undiscoverable.

I verified that this doesn't break anything in situations where the LAN is not available: I disconnected my laptop from the network and rebooted it and Jellyfin started as expected.

This change was informed by reading the suggestion in this article: https://www.freedesktop.org/wiki/Software/systemd/NetworkTarget/
2023-09-14 18:31:22 +02:00
happysalada
1e335c516b nixos/cfdyndns: dynamic user and loadcredentials 2023-09-14 07:53:36 +00:00
Herwig Hochleitner
30bcc6c39d
Merge pull request #248310 from emilylange/nixos/gitea-forgejo-split
nixos/forgejo: fork from nixos/gitea (split)

close https://github.com/NixOS/nixpkgs/issues/244866
2023-09-12 22:10:01 +02:00
Timothy DeHerrera
69bfaafc9d nixos/cfdyndns: add option to use CF token 2023-09-09 12:20:14 +00:00
Yaya
1a22627603 nixos/gitlab: Add a warning message
GitLab instances created or updated between versions [15.11.0, 15.11.2]
have an incorrect database schema. [1] This will become a problem once
upgrading GitLab to >=16.2.0.

A workaround can be found in the GitLab docs: [2]

[1]: https://gitlab.com/gitlab-org/gitlab/-/issues/408835
[2]: https://docs.gitlab.com/ee/update/versions/gitlab_16_changes.html#undefined-column-error-upgrading-to-162-or-later
2023-09-05 13:46:44 +02:00
ajs124
97dfc365e6 gitlab: 16.1.4 -> 16.3.1
https://gitlab.com/gitlab-org/gitlab/-/blob/v16.3.1-ee/CHANGELOG.md

Fixes CVE-2022-4343
Fixes CVE-2023-0120
Fixes CVE-2023-1279
Fixes CVE-2023-1555
Fixes CVE-2023-3205
Fixes CVE-2023-3915
Fixes CVE-2023-3950
Fixes CVE-2023-4018
Fixes CVE-2023-4378
Fixes CVE-2023-4630
Fixes CVE-2023-4638
Fixes CVE-2023-4647

Co-Authored-By: Yaya <github@uwu.is>
2023-09-05 13:46:44 +02:00
Morgan Helton
147d81d155 nixos/atuin: fix enable option typo 2023-09-05 08:34:34 +02:00
Leona Maroni
87f21ac4e6
nixos/paperless: allow systemd services to read ca-certificates
This fixes a regression introduced with the update to 1.17.0.
Since this version paperless-ngx checks the ssl certificates of remote
email servers.
2023-08-25 16:54:04 +02:00
LёNya
54f5045571 nixos/zoneminder: replace lib.optional with lib.optionals to make module work 2023-08-13 22:32:42 +03:00
Florian Praden
490ec79ac3
nixos/gitea: bugfix for gitea-dump service.
Missing custom directory setup in gitea-dump service. Adding environment variable in gitea-dump service definition.
2023-08-09 11:53:18 +02:00
emilylange
8d374cebcd
nixos/forgejo: init
Following a decicion from both the gitea and forgejo maintainers in
nixpkgs.
This means, that forgejo will no longer co-use the nixos/gitea module
via `services.gitea.package = pkgs.forgejo`.
2023-08-06 18:40:02 +02:00
Gregor Godbersen
3d9a6399a1 nixos/paperless: set default thumbnail font
The upstream default for the thumbnail font is set to "Liberation Serif
Regular" located at /usr/share/fonts which is inaccessible under nix.
(2a2bf3bf55/src/paperless/settings.py (L894))

Paperless throws an error when parsing plaintext files without a valid
font. This change sets a nix default using the liberation_ttf package.
2023-08-05 22:06:27 +02:00
Maximilian Bosch
ed02e79bbe
Merge pull request #241497 from bendlas/prepare-gitea-120
nixos/gitea: add WORK_PATH to config, fix 1.20
2023-08-04 18:50:09 +02:00
h7x4
b6fbd87328 nixos/atuin: harden systemd unit 2023-08-01 18:17:37 +08:00
h7x4
fd01b3f59c nixos/atuin: fix database.createLocally behaviour
Co-authored-by: Andrew Marshall <andrew@johnandrewmarshall.com>
2023-08-01 18:17:37 +08:00
Nick Cao
c3f4240e33
Merge pull request #246193 from christophcharles/gogs-config-file
nixos/gogs: fix deprecations for 0.13.0
2023-07-30 18:23:03 -06:00
Oliver Schmidt
ff9296f93e
nixos/gitlab: ensure service started again after dependency restarts (#245240)
When a dependency, like postgresql.service or redis-gitlab.service, had
been stopped and started at switch-to-configuration time, gitlab.service
and its helper units had been stopped but not started again.
`multi-user.target` only has a `Wants` relation to gitlab.target, but
once gitlab.target has been successfully started once and is not stopped/
restarted again, it does not cause all its dependencies to stay activated
the whole time.

This commit fixes this by upgrading the dependy relationship of
gitlab.service towards gitlab.target from a "Wants" to a "Requires". It
should be enough to do this for this single unit part of gitlab.target
only, as all other units wantedBy gitlab.target are pulled in by
gitlab.service as well or have bindsTo relations.
2023-07-30 18:49:54 +02:00
Christoph Charles
43d1c4d782 nixos/gogs: fix deprecations for 0.13.0
Changed ROOT_URL to EXTERNAL_URL.
2023-07-30 15:54:16 +02:00
Elias Probst
2b0545b423
nixos/paperless: update URL to docs 2023-07-26 19:02:29 +02:00
Aaron Andersen
8d85dcea22
Merge pull request #215247 from evan-goode/evdevremapkeys
nixos/evdevremapkeys: init
2023-07-25 08:45:54 -04:00
Martin Weinelt
6847465f6f
Merge pull request #242275 from Atemu/nixos/paperless-manage-toShellVars
nixos/paperless: use toShellVars for paperless-manage
2023-07-25 12:26:32 +02:00
Gianmarco Gargiulo
b34a51f5a7
nixos/gogs: fix deprecations for 0.13.0
Changed APP_NAME to BRAND_NAME, DB_TYPE to TYPE and PASSWD to PASSWORD.
2023-07-24 19:41:52 +00:00
Raito Bezarius
44aee34594 Revert "nixos/gitea: set service type to notify"
This reverts commit b61919e5e0.

As it breaks Forgejo who does not support this feature yet.
2023-07-22 16:12:36 +02:00
Felix Bühler
0a2745684e
Merge pull request #239624 from Stunkymonkey/use-optionalString-then
treewide: use optionalString instead of 'then ""'
2023-07-22 13:02:47 +02:00
Maximilian Bosch
7c70396c1d
Merge pull request #242863 from emilylange/nixos/gitea-runtimedirmode
nixos/gitea: revert change to RuntimeDirectoryMode
Closes ##243340
2023-07-21 19:22:05 +02:00
Maximilian Bosch
38823d15f4
Merge pull request #243883 from techknowlogick/gitea-1200
gitea: 1.19.4 -> 1.20.0
2023-07-21 09:41:07 +02:00
Maximilian Bosch
b61919e5e0
nixos/gitea: set service type to notify 2023-07-20 22:20:43 +02:00
Evan Goode
be333da51f nixos/evdevremapkeys: init
Add a service for evdevremapkeys (already packaged), a daemon for
remapping keyboard events
2023-07-19 23:06:31 -04:00
Karel Kočí
fd3f5471b0
nixos/mqtt2influxdb: init module 2023-07-19 09:47:04 +02:00
Karel Kočí
dd4eec64ab
nixos/bcg: init module
This is gateway that transforms BigClown wireless to MQTT.
2023-07-19 09:47:04 +02:00
Sandro
cacb77fb27
Merge pull request #206273 from wucke13/master 2023-07-18 13:12:06 +02:00
Maximilian Bosch
42105b2ba3
nixos/gitea: explicitly set CHUNKED_UPLOAD_PATH to writable location
Fix for Gitea 1.20.0.

Without this being set, e.g. a `git push` (or `ssh` to `git@` in general) fails like this:

    2023/07/17 09:27:05 ...s/setting/setting.go:109:LoadCommonSettings() [F] Unable to load settings from config: unable to create chunked upload directory: /nix/store/yna9nf66wl2n9hlnhxi2g7fdgawk2kxl-gitea-1.20.0/bin/data/tmp/package-upload (mkdir /nix/store/yna9nf66wl2n9hlnhxi2g7fdgawk2kxl-gitea-1.20.0/bin/data: read-only file system)
    Connection to git.mbosch.me closed.
2023-07-17 11:49:34 +02:00
Artturi
d1abbbd9b6
Merge pull request #242309 from Artturin/ananicyextraxadd 2023-07-16 00:43:45 +03:00
Sandro
545f079f5e
Merge pull request #243475 from vtuan10/enable-klipper-flash
nixos/klipper: add enableKlipperFlash option
2023-07-15 02:54:47 +02:00
Bruno BELANYI
b5f28477aa nixos/prowlarr: make use of 'lib.getExe' 2023-07-14 13:43:26 +00:00
Van Tuan Vo
917bb93078
nixos/klipper: add enableKlipperFlash option 2023-07-14 15:19:36 +02:00
Ryan Lahfa
c9e26d7d3a
Merge pull request #242036 from jnsgruk/prowlarr-update 2023-07-14 13:48:15 +02:00
Jon Seager
3de6be0951
nixos/homepage-dashboard: init 2023-07-13 09:38:26 +01:00
Artturin
4cf8006173 nixos/ananicy: take listOf attrs instead of string 2023-07-12 20:13:03 +03:00
Sandro
5aa53b205e
Merge pull request #208924 from erdnaxe/nitter-network-online 2023-07-12 14:19:30 +02:00
Rick van Schijndel
e1163b27dd
Merge pull request #242912 from chayleaf/fix-getent
treewide: update path to getent
2023-07-12 12:37:08 +02:00
Jon Seager
b853c70661
nixos/prowlarr: add package option 2023-07-12 10:19:05 +01:00
Felix Buehler
bec27fabee treewide: use lib.optional instead of 'then []' 2023-07-12 09:36:28 +01:00
chayleaf
4d4c73ff78 treewide: update path to getent 2023-07-12 02:32:23 +07:00
emilylange
da58b13615
nixos/gitea: revert change to RuntimeDirectoryMode
As this broke most unix socket setups and there is a far better suited
`server.UNIX_SOCKET_PERMISSION` in gitea/forgejo itself.

https://docs.gitea.io/en-us/administration/config-cheat-sheet/#server-server

ref: a0311e5107
2023-07-11 17:05:45 +02:00
Atemu
2616bb762b nixos/paperless: explain how to set JSON env vars
Co-authored-by: Christian Theune <ct@flyingcircus.io>
Co-authored-by: Erik Arvstedt <erik.arvstedt@gmail.com>
2023-07-09 19:52:06 +02:00
Artturin
1b1f25312d ananicy: unstable-2021-11-05 -> unstable-2023-03-21
type's were renamed so this will break some user rules
2023-07-09 00:58:05 +03:00
Artturin
aae2268e0a nixos/ananicy-cpp: add rulesProvider 2023-07-08 20:28:45 +03:00
Artturin
ff28d7a982 nixos/ananicy: don't error if $out/ananicy-cpp doesn't exist
copy new rule
2023-07-08 20:19:13 +03:00
Artturin
b04a04929c nixos/ananicy: add extraTypes, extraCgroups 2023-07-08 19:42:46 +03:00
Atemu
44f637aa8d nixos/paperless: use toShellVars for paperless-manage
The homebrewed snippet didn't escape vars properly which is an issue because
PAPERLESS_OCR_USER_ARGS requires a JSON string. This also meant a discrepancy
between the services' env vars and paperless-manage's.

Just use the correctly functioning library function for this instead.
2023-07-08 16:03:45 +02:00
Janik
e46ab54b68
Merge pull request #241783 from gmemstr/n8n-tweaks 2023-07-07 23:04:48 +02:00
Pol Dellaiera
764472b473
Merge pull request #233091 from yayayayaka/add-team-gitlab
maintainers/team-list: Add team gitlab
2023-07-07 15:19:15 +02:00
Robert Hensing
54303b65ef
Merge pull request #241690 from hercules-ci/nixos-nix-modules
Split nixos/nix-daemon.nix
2023-07-07 10:29:58 +02:00
Kerstin
ba445ba8bc
Merge pull request #241088 from jooooscha/master
maintainers: add joscha
2023-07-06 15:30:28 +02:00
Gabriel Simmer
674de7c287
nixos/n8n: correct configuration, webhookUrl type
I realised in NixOS#240189 I made some minor errors in the service definition.
2023-07-05 23:15:52 +01:00