Commit graph

7317 commits

Author SHA1 Message Date
Wolfgang Walther
c76d239f14
nixos/postgres-websockets: init (#397408) 2025-04-11 07:47:10 +00:00
Seth Flynn
eed8e360f5
slskd: 0.22.2 -> 0.22.3
Diff: https://github.com/slskd/slskd/compare/0.22.2...0.22.3

Changelog: https://github.com/slskd/slskd/releases/tag/0.22.3
2025-04-10 13:45:07 -04:00
Wolfgang Walther
d62c14f5d1
nixos/postgres-websockets: init 2025-04-10 10:12:27 +02:00
nixpkgs-ci[bot]
51a06fbd76
Merge master into staging-next 2025-04-10 00:15:39 +00:00
RohanHart
ff1a8591bc
aws-workspaces: 4.7.0.4312 -> 2024.8.5191 (#396863)
* aws-workspaces: 4.7.0.4312 -> 2024.8.5191

* aws-workspaces: 2024.8.5191 updated from jaredcrean

https://github.com/jaredcrean/nixpkgs/tree/aws-workspace-2024.8.5191

* aws-workspaces: 2024.8.5191 jbigkit PR was merged

https://github.com/NixOS/nixpkgs/pull/345659

* aws-workspaces: 2024.8.5191 refactor

Move dcvclient into libexec so that it's handled by wrapGAppsHook4.
GSchema is packaged, look in the correct location.
Use standard .deb unpack support.

* aws-workspaces: 2024.8.5191 repackage as FHS

* aws-workspaces: 2024.8.5191 added breaking change to release notes

---------

Co-authored-by: Pol Dellaiera <pol.dellaiera@protonmail.com>
Co-authored-by: 100001 <github.ixda@8shield.net>
Co-authored-by: Rohan <rohan@coinzoom.com>
2025-04-09 20:53:06 +02:00
nixpkgs-ci[bot]
b66e31c26a
Merge master into staging-next 2025-04-09 16:04:15 +00:00
Defelo
3ae07e6d12
nixos/whoami: init module 2025-04-09 16:51:04 +02:00
Adam C. Stephens
f2200ca6ee
nixos/anubis: init module (#392018) 2025-04-09 09:23:35 -04:00
K900
c41ad742f6 Merge remote-tracking branch 'origin/master' into staging-next 2025-04-09 15:31:47 +03:00
Leona Maroni
f2ebbabda0
discourse: 3.3.2 -> 3.4.2
https://meta.discourse.org/t/3-3-3-security-and-maintenance-release/343239
https://meta.discourse.org/t/3-3-4-security-and-maintenance-release/349301
https://blog.discourse.org/2025/02/unpacking-discourse-3-4/
https://meta.discourse.org/t/3-4-1-bug-fix-and-ux-release/353247
https://meta.discourse.org/t/3-4-2-security-and-bug-fix-release/358152
2025-04-08 22:56:45 +02:00
nanoyaki
b10f83f2d8 nixos/lavalink: add release note 2025-04-08 20:40:21 +02:00
nixpkgs-ci[bot]
a72dfbca8f
Merge master into staging-next 2025-04-08 18:04:25 +00:00
Seth Flynn
43f7128bbe
nixos/reposilite: init module (#381197) 2025-04-08 11:07:36 -04:00
K900
b3146d4446 Merge remote-tracking branch 'origin/master' into staging-next 2025-04-07 21:21:10 +03:00
Tristan Ross
77f77a046a
mattermost: 9.11.11 -> 10.5.2; use formats.json; squash systemd-tmpfiles warning (#376838) 2025-04-07 10:27:15 -07:00
Johannes Kirschbauer
0196e5372b
lib/modules: Init lib.mkDefinition (#390983) 2025-04-07 14:52:48 +02:00
Morgan Jones
423caa2d13
mattermost: 9.11.11 -> 10.5.2 2025-04-06 18:00:12 -07:00
K900
05bc93a58a Merge remote-tracking branch 'origin/master' into staging-next 2025-04-06 11:20:16 +03:00
6543
cac3bdab21
nixos/services.mysql: add galera cluster options (#388978)
And add release notes for new option.

Co-authored-by: Arne Keller <arne.keller@posteo.de>
2025-04-06 00:26:06 +02:00
Cassie Cheung
cadf4cfc83
nixos/anubis: init module 2025-04-05 21:48:39 +08:00
K900
79542ad7f3 Merge remote-tracking branch 'origin/master' into staging-next 2025-04-04 21:11:09 +03:00
uku
dfaad22261
nixos/reposilite: init module 2025-04-04 09:46:24 +02:00
Johannes Kirschbauer
33daa3f4b9
lib.modules: init test for lib.mkDefinition 2025-04-03 15:03:00 +02:00
Johannes Kirschbauer
c906064af1
lib.modules: document mkDefinition section 2025-04-03 14:12:08 +02:00
Gutyina Gergő
01be6580d3
nixos/pocket-id: init
Co-authored-by: ymstnt <21342713+YMSTNT@users.noreply.github.com>
2025-04-03 09:26:57 +02:00
nixpkgs-ci[bot]
d05ee1c1cb
Merge staging-next into staging 2025-04-02 16:38:11 +00:00
Silvan Mosberger
e52d633a63 Merge remote-tracking branch 'upstream/staging-next' into staging 2025-04-02 18:30:54 +02:00
Felix Zieger
1bf74aee3c nixos/haven: init 2025-04-02 17:30:18 +02:00
misuzu
0f4487251d
strfry: init at 1.0.4, nixos/strfry: init (#385587) 2025-04-02 10:13:41 +03:00
Felix Zieger
dfd82bf3e5 nixos/strfry: init 2025-04-01 23:20:15 +02:00
Pol Dellaiera
25264d105d nixos/docling-serve: init 2025-04-01 21:42:53 +02:00
K900
30edc74585 Merge remote-tracking branch 'origin/staging-next' into staging 2025-04-01 21:12:38 +03:00
Silvan Mosberger
374e6bcc40 treewide: Format all Nix files
Format all Nix files using the officially approved formatter,
making the CI check introduced in the previous commit succeed:

  nix-build ci -A fmt.check

This is the next step of the of the [implementation](https://github.com/NixOS/nixfmt/issues/153)
of the accepted [RFC 166](https://github.com/NixOS/rfcs/pull/166).

This commit will lead to merge conflicts for a number of PRs,
up to an estimated ~1100 (~33%) among the PRs with activity in the past 2
months, but that should be lower than what it would be without the previous
[partial treewide format](https://github.com/NixOS/nixpkgs/pull/322537).

Merge conflicts caused by this commit can now automatically be resolved while rebasing using the
[auto-rebase script](8616af08d9/maintainers/scripts/auto-rebase).

If you run into any problems regarding any of this, please reach out to the
[formatting team](https://nixos.org/community/teams/formatting/) by
pinging @NixOS/nix-formatting.
2025-04-01 20:10:43 +02:00
Franz Pletz
82f0c74912
nixos/zoxide: init module (#393493) 2025-04-01 18:01:32 +02:00
K900
6408946263 Merge remote-tracking branch 'origin/staging-next' into staging 2025-04-01 16:56:46 +03:00
Maximilian Bosch
f20b220e17
Merge: nixos/nextcloud: add maintainer team, update docs about maintainership of apps (#393069) 2025-04-01 11:25:28 +02:00
Adrien Faure
63455f1a21 docs: add separate Nixpkgs release notes
the initial change was already made ad hoc in 10a75ab, in response to the recently introduced enforced redirects mapping that is supposed to keep stable URLs.

due to the redirect mechanism's current limitation to locations within
the same site (that is, either the Nixpkgs xor the NixOS manual), and
the observation that noteworthy Nixpkgs changes tend to be
self-contained, it seemed reasonable to introduce a seperate release
notes document. it also has the advantage that users of only Nixpkgs
don't have to deal with release notes that are only relevant for NixOS.

the original change was already lossless for NixOS users, since the
Nixpkgs release notes are appended to the NixOS release notes.

this change moves the pre-existing Nixpkgs notes to the new dedicated page.

Co-authored-by: Gagarin Valentin Gagarin <valentin@gagarin.work>
2025-04-01 07:52:19 +01:00
K900
a6d5666400 Merge remote-tracking branch 'origin/staging-next' into staging 2025-04-01 08:39:50 +03:00
Arne Keller
ee6d7cb213
nitter: 0-unstable-2024-02-26 -> 0-unstable-2025-02-25; nixos/nitter: rename guestAccounts to sessionsFile (#393028) 2025-03-31 17:16:30 +02:00
nixpkgs-ci[bot]
86e22e1e80
Merge staging-next into staging 2025-03-31 12:06:34 +00:00
Pratham Patel
2a7180b3db nixos/release-notes: add release notes for COSMIC modules 2025-03-31 15:28:55 +05:30
Wolfgang Walther
899c3986e7
nixos/postgrest: init module (#394041) 2025-03-31 07:20:43 +00:00
nixpkgs-ci[bot]
34600d0052
Merge staging-next into staging 2025-03-31 00:17:08 +00:00
Maximilian Bosch
97d215cf17
Merge: php: 8.3 -> 8.4 (#394112) 2025-03-30 22:54:31 +02:00
Wolfgang Walther
064432a519
nixos/postgrest: init module 2025-03-30 14:24:16 +02:00
nixpkgs-ci[bot]
ed9f389a51
Merge staging-next into staging 2025-03-30 12:06:19 +00:00
Daniel Xu
f1c4d339a5 nixos/wordpress: Use https by default for caddy
Previously, `http://` scheme was hard coded into the caddy config if
`webserver = "caddy"` was chosen. This is fine for local testing, but is
problematic if you want your nixos host to be public facing.

In the public facing case, you generally want to be using TLS. But since
the wordpress module generates the caddyfile rule, the user's nixos
config cannot easily change it to also allow https.

An alternative would be to reverse proxy an https rule to the generated
http rule, but that's somewhat questionable as there's not an internal
http endpoint to proxy to. It might be possible but I couldn't figure
it out.

So simplify by omitting the scheme. This causes caddy to use https by
default and 301 redirect any http requests to the https endpoint. Caddy
will just do the right thing if it's being hosted on a local/internal
hostname (self sign certificates).

This should be backwards compatible with previous default if users are
using reasonable browsers/tools.

Signed-off-by: Daniel Xu <dxu@dxuuu.xyz>
2025-03-29 15:10:35 -06:00
K900
92e17913a7 Merge remote-tracking branch 'origin/staging-next' into staging 2025-03-29 21:07:19 +03:00
Morgan Jones
9569ad4b57 release-notes: add androidenv details to rl-2505 2025-03-29 22:13:03 +05:30
nixpkgs-ci[bot]
02e075f1a7
Merge staging-next into staging 2025-03-29 12:06:10 +00:00