1
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-06-30 13:05:15 +03:00
Commit graph

22566 commits

Author SHA1 Message Date
Pyrox
b800579648
nixos/forgejo,forgejo: Add pyrox0 as a maintainer 2024-12-12 21:11:32 +01:00
emilylange
ecd595ef80
nixos/forgejo: fix typo in builtin ssh server conditional
This conditional was introduced in 402b5c67a8
and is supposed to check for `server.START_SSH_SERVER` but instead
checked for `START_SSH_SERVER`.

Co-Authored-By: Pyrox <pyrox@pyrox.dev>
2024-12-12 21:11:30 +01:00
Pyrox
665063ca71
nixos/forgejo: replace GITEA_ prefix in env with FORGEJO_
Since https://codeberg.org/forgejo/forgejo/issues/497 has been resolved,
these can now be `FORGEJO_` prefixed instead of `GITEA_`.

Co-Authored-By: Emily <git@emilylange.de>
2024-12-12 21:01:44 +01:00
Marcus Ramberg
b3c3aaa0bf
nixos/k3s: make assertions about missing configuration options warnings (#364370) 2024-12-12 19:36:44 +01:00
nicoo
f6c5531461
nixos: Don't set !allowSubstitutes (#314664)
It is set by `runCommandLocal` and prevents fetching the build output
from `cache.nixos.org` or another trusted substituter.
2024-12-12 18:26:24 +00:00
K900
81eb6d64ab Merge remote-tracking branch 'origin/master' into staging-next 2024-12-12 21:08:33 +03:00
Maximilian Bosch
4c092f5bcd
Merge: nixos/postgresql: Add finalPackage attribute (#364261) 2024-12-12 17:03:33 +01:00
Arne Keller
0a324bb35b
scanservjs: init at 2.27.1; nixos/scanservjs: init (#249806) 2024-12-12 17:01:22 +01:00
Tom Hubrecht
0bdb7a72b1
nixos/postgresql: Add finalPackage attribute
This allows refering to the actual installed package, which is necessary
when using plugins and wanting to use postgres in scripts
2024-12-12 16:54:06 +01:00
Will Owens
822c245dbf
nixos/tabby: add host option
Listening host is now configurable with CLI flags.
2024-12-12 08:34:36 -05:00
Will Owens
68d4a7df49
nixos/tabby: remove scheduler systemd service
This is now configurable by the web GUI and that is preferred.
2024-12-12 08:34:33 -05:00
Maximilian Bosch
51a6938a44
nixos/doc: document how to allow-list tablespaces
It was brought up that the restricted file-system access breaks
tablespaces[1]. I'd argue that this is the desired behavior, the whole
point of the hardening is the lock the service down and I don't consider
tablespaces common enough to elevate privileges again. Especially since
the workaround is trivial as shown in the diff.

For completeness sake, this adds the necessary `ReadWritePaths` change
to the postgresql section of the manual.

This also adds a small correction about the state of
`ensurePermissions`.

[1] https://github.com/NixOS/nixpkgs/pull/344925#issuecomment-2521188907
2024-12-12 13:42:52 +01:00
Arne Keller
abeecc9b02
nixos/minio: add TLS certificates option (#340441) 2024-12-12 10:22:07 +01:00
Arne Keller
27aef3ef74
nixos/dokuwiki: Don't force http with Caddy (#327743) 2024-12-12 10:21:24 +01:00
Mike Kusold
aed11df8a5 nixos/couchdb: Convert extraConfig to follow RFC42 2024-12-11 23:15:50 -07:00
Mike Kusold
82e0c6257a nixos/couchdb: Add support for additional config files
This allows users to set the Admin Password via secrets. `configFile` must be writable which is why it isn't sufficient.
nixfmt nixos/modules/services/databases/couchdb.nix
2024-12-11 23:11:08 -07:00
abysssol
04d175b54a nixos/ollama: add allowed device for WSL compatibility 2024-12-12 13:06:43 +07:00
github-actions[bot]
da49cc09b4
Merge master into staging-next 2024-12-12 06:05:10 +00:00
Sandro
b4cf66f226
nixos/portunus: fix defaultText (#364382) 2024-12-12 00:45:44 -05:00
Leah Amelia Chen
68891efe67
marytts: init at 5.2.1-unstable-2024-10-09, nixos/marytts: init (#351933)
* marytts: init at 5.2.1-unstable-2024-10-09

* nixos/marytts: init module

* nixos/marytts: add tests
2024-12-12 00:12:54 -05:00
Robert Rose
759d2b8646 nixos/k3s: make assertions about missing configuration options warnings
It is possible to configure k3s in various ways (cli flags, env
variables, single config file, multiple config files) and everything is
merged together in a final config. The nixos module cannot know if a
configuration option that is missing from the module point of view is
supplied in another way, so it shouldn't assert missing configuration
options.
2024-12-11 22:29:21 +01:00
github-actions[bot]
86a29d0a96
Merge master into staging-next 2024-12-11 18:05:20 +00:00
K900
7ea7a19b2d
nixos/bookstack: fix unintended escaping of nginx locations (#363581) 2024-12-11 20:23:22 +03:00
Robert Schütz
d55cc4608d
nixos/immich: restrict media filesystem permissions (#361627) 2024-12-11 08:45:12 -08:00
Weijia Wang
c3b1815822 Merge branch 'master' into staging-next 2024-12-11 16:42:17 +01:00
Jenny
2f610f9856
nixos/librenms: order librenms-setup after network.target (#363706) 2024-12-11 13:14:25 +01:00
Moritz Vogel
0c1feac497 nixos/ebusd: fix device access 2024-12-11 10:50:54 +01:00
Arne Keller
138ac300df
nixos/v2ray: change the type of config field (#163810) 2024-12-11 10:30:02 +01:00
Benjamin Saunders
fd21ef2a65 nixos/immich: restrict filesystem permissions
immich appears to create this directory with permissions 0755 by
default, which needlessly exposes user data to other processes.
2024-12-10 20:02:17 -08:00
Majiir Paktu
e5a456f26f nixos/wireguard-networkd: re-enable by default for networkd users 2024-12-10 19:33:45 -05:00
Majiir Paktu
6bc8dcc630 nixos/wireguard-networkd: use systemd credentials for privateKeyFile and presharedKeyFile 2024-12-10 19:33:45 -05:00
github-actions[bot]
7dcd9f1e0a
Merge master into staging-next 2024-12-11 00:15:31 +00:00
Majiir Paktu
cca305f3e3 nixos/wireguard-networkd: fix issue link 2024-12-10 16:57:53 -05:00
Majiir Paktu
a93d42e97e nixos/wireguard-networkd: disable by default
Enabling networking.wireguard.useNetworkd currently requires users to
modify the permissions of their private key files. Since that is a bad
upgrade experience, the module should be disabled by default for now.
Once systemd credential support is added to the module, it should be
safe to once again enable it by default for networkd users.
2024-12-10 16:54:50 -05:00
Weijia Wang
c225fc4361 Merge branch 'master' into staging-next 2024-12-10 22:10:48 +01:00
misuzu
ad12b26526
nixos/crab-hole: init (#341598) 2024-12-10 22:16:50 +02:00
NiklasVousten
bd4a6b9aae nixos/crab-hole: init crab-hole 2024-12-10 21:08:31 +01:00
Silvan Mosberger
4f0dadbf38 treewide: format all inactive Nix files
After final improvements to the official formatter implementation,
this commit now performs the first treewide reformat of Nix files using it.
This is part of the implementation of RFC 166.

Only "inactive" files are reformatted, meaning only files that
aren't being touched by any PR with activity in the past 2 months.
This is to avoid conflicts for PRs that might soon be merged.
Later we can do a full treewide reformat to get the rest,
which should not cause as many conflicts.

A CI check has already been running for some time to ensure that new and
already-formatted files are formatted, so the files being reformatted here
should also stay formatted.

This commit was automatically created and can be verified using

    nix-build https://github.com/infinisil/treewide-nixpkgs-reformat-script/archive/a08b3a4d199c6124ac5b36a889d9099b4383463f.tar.gz \
      --argstr baseRev b32a094368
    result/bin/apply-formatting $NIXPKGS_PATH
2024-12-10 20:26:33 +01:00
Silvan Mosberger
84d4f874c2 treewide: format all inactive Nix files
After final improvements to the official formatter implementation,
this commit now performs the first treewide reformat of Nix files using it.
This is part of the implementation of RFC 166.

Only "inactive" files are reformatted, meaning only files that
aren't being touched by any PR with activity in the past 2 months.
This is to avoid conflicts for PRs that might soon be merged.
Later we can do a full treewide reformat to get the rest,
which should not cause as many conflicts.

A CI check has already been running for some time to ensure that new and
already-formatted files are formatted, so the files being reformatted here
should also stay formatted.

This commit was automatically created and can be verified using

    nix-build https://github.com/infinisil/treewide-nixpkgs-reformat-script/archive/a08b3a4d199c6124ac5b36a889d9099b4383463f.tar.gz \
      --argstr baseRev 78e9caf153
    result/bin/apply-formatting $NIXPKGS_PATH
2024-12-10 20:23:58 +01:00
github-actions[bot]
78e9caf153
Merge master into staging-next 2024-12-10 18:04:59 +00:00
Sandro
d6e107169b
ArchiSteamFarm: 6.0.8.7 -> 6.1.0.3 (#361305) 2024-12-10 18:01:38 +01:00
Nick Cao
fa559bd562
redis - complete lib refactor (#363775) 2024-12-10 10:55:26 -05:00
Aaron Andersen
acaee51228
nixos/redmine: Change type of services.redmine.stateDir to path (#363430) 2024-12-10 07:17:08 -05:00
K900
07105d9e6f Merge remote-tracking branch 'origin/master' into staging-next 2024-12-10 09:47:05 +03:00
Andrew Frahn
c146818be2 nixos/services.redis: complete removal of with lib; 2024-12-10 16:19:03 +11:00
Philip Taron
0311f6c40e
treewide/nixos: remove with lib; part 5 (#335647) 2024-12-09 16:04:21 -08:00
Sandro
a4e756888c
nixos/mailman: increase uwsgi buffer size (#359037) 2024-12-10 00:51:27 +01:00
cy
248081c472
nixos/caddy: add environmentFile option (#363694) 2024-12-09 18:50:58 -05:00
alex
6a5dc7cbd5 nixos/evremap: add option phys
adds the optional attribute `phys` to uniquely identify a single device, if multiple
devices share the same name

nixos/evremap: fix toml config generation

filter out attrsets with a `null` value as toml doesn't support it

nixos/evremap: use nixfmt

nixos/evremap: incorporate changes from review
2024-12-10 00:50:07 +01:00
Marcus Ramberg
37da609352
nixos/k3s: add nftables to Path of k3s service (#360796) 2024-12-09 21:45:25 +01:00