Commit graph

37378 commits

Author SHA1 Message Date
Silvan Mosberger
e52d633a63 Merge remote-tracking branch 'upstream/staging-next' into staging 2025-04-02 18:30:54 +02:00
Maximilian Bosch
c8274e56b8
Merge: nixos/nextcloud: check if ownership of datadir and config is correct (#379581) 2025-04-02 10:51:55 +02:00
โทสฺตัล
7554581474 nixos/h2o: enable HTTP/3 via QUIC 2025-04-02 15:11:53 +07:00
โทสฺตัล
301581e073 nixos/h2o: typo 2025-04-02 15:11:53 +07:00
Florian Klink
2b0e0a9fd4
nixos/h2o: disable OCSP stapling w/ Let’s Encrypt (support sunset) (#393765) 2025-04-02 09:10:42 +01:00
Maximilian Bosch
39dcdc5c9b
nixos/nextcloud: check if ownership of config is correct
Follow-up on #169733

For `data`, Nextcloud checks on its own if everything is readable.
However, for `config` it's crucial that the ownership is actually
correct: otherwise, systemd-tmpfiles will refuse any operations inside
because of unsafe path transitions.

This can result in a subtly broken setup by the `override.config.php`
not being updated, but also not part of the system closure anymore
(another override.config.php is referenced now) which means it'll be
GCed eventually even though Nextcloud relies on it.

If this precondition is not met, the following error will be printed:

    nextcloud-setup-start[972]: /var/lib/nextcloud/config is not owned by user 'nextcloud'!
    nextcloud-setup-start[972]: Please check the logs via 'journalctl -u systemd-tmpfiles-setup'
    nextcloud-setup-start[972]: and make sure there are no unsafe path transitions.
    nextcloud-setup-start[972]: (https://nixos.org/manual/nixos/stable/#module-services-nextcloud-pitfalls-during-upgrade)
2025-04-02 09:30:17 +02:00
misuzu
0f4487251d
strfry: init at 1.0.4, nixos/strfry: init (#385587) 2025-04-02 10:13:41 +03:00
Felix Zieger
dfd82bf3e5 nixos/strfry: init 2025-04-01 23:20:15 +02:00
Pol Dellaiera
25264d105d nixos/docling-serve: init 2025-04-01 21:42:53 +02:00
K900
30edc74585 Merge remote-tracking branch 'origin/staging-next' into staging 2025-04-01 21:12:38 +03:00
Silvan Mosberger
374e6bcc40 treewide: Format all Nix files
Format all Nix files using the officially approved formatter,
making the CI check introduced in the previous commit succeed:

  nix-build ci -A fmt.check

This is the next step of the of the [implementation](https://github.com/NixOS/nixfmt/issues/153)
of the accepted [RFC 166](https://github.com/NixOS/rfcs/pull/166).

This commit will lead to merge conflicts for a number of PRs,
up to an estimated ~1100 (~33%) among the PRs with activity in the past 2
months, but that should be lower than what it would be without the previous
[partial treewide format](https://github.com/NixOS/nixpkgs/pull/322537).

Merge conflicts caused by this commit can now automatically be resolved while rebasing using the
[auto-rebase script](8616af08d9/maintainers/scripts/auto-rebase).

If you run into any problems regarding any of this, please reach out to the
[formatting team](https://nixos.org/community/teams/formatting/) by
pinging @NixOS/nix-formatting.
2025-04-01 20:10:43 +02:00
Adam C. Stephens
62d611a22b
nixos/incus: add AppArmor rules (#386060) 2025-04-01 12:51:34 -04:00
Franz Pletz
82f0c74912
nixos/zoxide: init module (#393493) 2025-04-01 18:01:32 +02:00
Tanya Arora
8125d74e21
nixos/dnsmasq: Fix failure on read-only /etc when resolveLocalQueries=false (#391738) 2025-04-01 17:59:21 +02:00
K900
6408946263 Merge remote-tracking branch 'origin/staging-next' into staging 2025-04-01 16:56:46 +03:00
Pol Dellaiera
a18002797a
nixos/navidrome: Add environmentFile config option (#389471) 2025-04-01 15:55:58 +02:00
Maximilian Bosch
f20b220e17
Merge: nixos/nextcloud: add maintainer team, update docs about maintainership of apps (#393069) 2025-04-01 11:25:28 +02:00
John Titor
51dc163364 nixos/ananicy: re enable BPF on hardened kernels
This was a workaround to begin with, as hardened kernel didn't support tracing.
Back then kernel level tracing was only available through debugfs, and now that
tracefs has been available on NixOS for a while now, enabled in
Link: https://github.com/NixOS/nixpkgs/pull/388751

This workaround can be removed and bpf can be used with tracefs.
Link: https://github.com/NixOS/nixpkgs/issues/360957

Signed-off-by: John Titor <50095635+JohnRTitor@users.noreply.github.com>
2025-04-01 14:42:59 +05:30
K900
a6d5666400 Merge remote-tracking branch 'origin/staging-next' into staging 2025-04-01 08:39:50 +03:00
André Silva
64ee43c568
nixos/hyprland: fix call to wayland-session.nix (#394858) 2025-03-31 17:47:05 +01:00
Florian Klink
e9b7593367
nixos/movim: Fix accidental append to module system property (#394861) 2025-03-31 16:38:51 +01:00
Arne Keller
ee6d7cb213
nitter: 0-unstable-2024-02-26 -> 0-unstable-2025-02-25; nixos/nitter: rename guestAccounts to sessionsFile (#393028) 2025-03-31 17:16:30 +02:00
nixpkgs-ci[bot]
86e22e1e80
Merge staging-next into staging 2025-03-31 12:06:34 +00:00
Herwig Hochleitner
2107f032ab nixos/startx: remove graphical-session assertions
this assertion broke gnome sessions in very hard to debug way:

- gdm starts, but on successful login just returns to login screen
- journalctl isn't exactly helpful in this condition:
  - a typical gnome login will involve many warnings and errors, that
    aren't actually preventing login, but will lead affected users
    on a merry chase for many hours
  - the actual indicators in the log arent't even an errors, only info and warning
    - graphical-session.target: Starting requested but asserts failed.
    - Assertion failed for Current graphical user session.

startx is a power tool for power users, needing a certain level of
expertise for the user to even want it, let alone use correctly.
However, the expectation is, that the necessary expertise will be
contained within the domain of startx and that it not break tools for
regular users.

This partially reverts commit e1c3082085.
2025-03-31 11:58:09 +01:00
Robert Hensing
e12690d530 nixos/movim: Fix accidental append to module system property 2025-03-31 12:24:22 +02:00
André Silva
09879a452b
nixos/hyprland: fix call to wayland-session.nix 2025-03-31 11:15:31 +01:00
Pratham Patel
cd795fd3f0 nixos/modules: cosmic: init 2025-03-31 15:28:55 +05:30
Pratham Patel
cd85a8a827 nixos/modules: cosmic-greeter: init 2025-03-31 15:28:55 +05:30
Wolfgang Walther
899c3986e7
nixos/postgrest: init module (#394041) 2025-03-31 07:20:43 +00:00
nixpkgs-ci[bot]
cea056bb01
Merge staging-next into staging 2025-03-31 06:06:14 +00:00
Austin Horstman
f62c664b16
qt: add "kde6" to qt.platformTheme (#384669) 2025-03-31 00:00:31 -05:00
Adam C. Stephens
11e4741be7
incus: 6.10.1 -> 6.11.0 (#394108) 2025-03-30 21:20:03 -04:00
nixpkgs-ci[bot]
34600d0052
Merge staging-next into staging 2025-03-31 00:17:08 +00:00
Maximilian Bosch
97d215cf17
Merge: php: 8.3 -> 8.4 (#394112) 2025-03-30 22:54:31 +02:00
Pol Dellaiera
35bb79372d
prometheus-chrony-exporter: init chrony nixos module (#394575) 2025-03-30 22:30:21 +02:00
Arne Keller
fd9f17ef49
nixos/filesystems: init bindfs (#337697) 2025-03-30 22:10:57 +02:00
Seth Flynn
53b589567a
nixos/wayland-session: fix conflicts between users (#390168) 2025-03-30 16:09:54 -04:00
Seth Flynn
4df2726a5c
nixos/wayland-session: fix conflicts between users 2025-03-30 15:37:15 -04:00
Wolfgang Walther
064432a519
nixos/postgrest: init module 2025-03-30 14:24:16 +02:00
nixpkgs-ci[bot]
ed9f389a51
Merge staging-next into staging 2025-03-30 12:06:19 +00:00
PAEPCKE, Michael
cdb80c1f44
prometheus-exporter: init chrony module 2025-03-30 11:14:30 +00:00
Jonas Heinrich
8d69e1faae
nixos/wordpress: Use https by default for caddy (#375375) 2025-03-30 10:31:52 +02:00
nixpkgs-ci[bot]
03db8f9dcb
Merge staging-next into staging 2025-03-30 00:17:21 +00:00
Maximilian Bosch
65121c9333
Merge: nextcloud-occ: work with sudo disabled (#380211) 2025-03-29 23:25:45 +01:00
Daniel Xu
f1c4d339a5 nixos/wordpress: Use https by default for caddy
Previously, `http://` scheme was hard coded into the caddy config if
`webserver = "caddy"` was chosen. This is fine for local testing, but is
problematic if you want your nixos host to be public facing.

In the public facing case, you generally want to be using TLS. But since
the wordpress module generates the caddyfile rule, the user's nixos
config cannot easily change it to also allow https.

An alternative would be to reverse proxy an https rule to the generated
http rule, but that's somewhat questionable as there's not an internal
http endpoint to proxy to. It might be possible but I couldn't figure
it out.

So simplify by omitting the scheme. This causes caddy to use https by
default and 301 redirect any http requests to the https endpoint. Caddy
will just do the right thing if it's being hosted on a local/internal
hostname (self sign certificates).

This should be backwards compatible with previous default if users are
using reasonable browsers/tools.

Signed-off-by: Daniel Xu <dxu@dxuuu.xyz>
2025-03-29 15:10:35 -06:00
Bruno BELANYI
8fb60c58dd
calibre-web: fix ebook conversion missing config_binariesdir setting (#366642) 2025-03-29 20:08:35 +00:00
Pol Dellaiera
0ef31de6ea
monica: pin php version to 8.3 (#394415) 2025-03-29 20:12:16 +01:00
Pol Dellaiera
f79c218ea5
icingaweb2: pin php version to 8.3 (#394399) 2025-03-29 20:11:29 +01:00
Maximilian Bosch
b88fdf622c
Merge: nixos/dolibarr: pin php version (to 8.3) (#394153) 2025-03-29 20:11:04 +01:00
Pol Dellaiera
6945312759
agorakit: pin php version to 8.2 (#394410) 2025-03-29 20:10:33 +01:00