Commit graph

7313 commits

Author SHA1 Message Date
Gaétan Lepage
ff2d12d11d
nixos/cloudflared: add option for cert.pem and use dynamic user (#383499) 2025-03-10 11:15:06 +01:00
fleaz
676efd089b rl-2411: Add note about intel-compute-runtime package 2025-03-10 01:49:59 +05:30
fleaz
f350c3aeb0 nixos/doc/manual: Update opengl section for Intel
Intel removed support for <12th Gen from the intel-compute-runtime
package, so people with older CPUs will need to install the legacy
package.
2025-03-10 01:49:59 +05:30
Franz Pletz
7978d240c2
nixos/iosched: exclude loop devices by default; mention in release notes (#385106) 2025-03-09 09:38:05 +01:00
Mikael Voss
901b87f8fd
nixos/doc/rl-2411: mention iosched module 2025-03-09 02:27:34 +01:00
Leona Maroni
810f3b88e4
nixos/synapse-auto-compressor: init (#383168) 2025-03-08 16:55:06 +01:00
Tim Keller
2762812d2c nixos/doc/release-notes: mention xf86videointel has been fixed 2025-03-08 08:30:29 -06:00
Tim Keller
c6e354f52f nixos/doc: xf86videointel is available again 2025-03-08 08:30:12 -06:00
Lin Jian
23e610d63f
emacs: support and enable __structuredAttrs in elisp build helpers (#387193) 2025-03-08 17:09:46 +08:00
Aleksana
f2ef5d1a9e
tauon: doc fixes (#387077) 2025-03-08 16:48:18 +08:00
shelvacu
1a4575f9db
nixos/modules: Add security.pki.caBundle option and make all services use it for CA bundles (#352244)
Previously some modules used `config.environment.etc."ssl/certs/ca-certificates.crt".source`, some used `"/etc/ssl/certs/ca-certificates.crt"`, and some used `"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"`. These were all bad in one way or another:

- `config.environment.etc."ssl/certs/ca-certificates.crt".source` relies on `source` being set; if `text` is set instead this breaks, introducing a weird undocumented requirement
- `"/etc/ssl/certs/ca-certificates.crt"` is probably okay but very un-nix. It's a magic string, and the path doesn't change when the file changes (and so you can't trigger service reloads, for example, when the contents change in a new system activation)
- `"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"` silently doesn't include the options from `security.pki`

Co-authored-by: Shelvacu <git@shelvacu.com>
2025-03-08 08:41:08 +00:00
Sandro
07c24fffa3
nixos/matrix-alertmanager: init module (#378966) 2025-03-07 19:59:46 +01:00
misuzu
f3b9f47891
nixos/umurmur: init (#387580) 2025-03-07 17:46:10 +02:00
Maximilian Bosch
6c4f93e113
Merge: nixos/nextcloud: use LoadCredential to read secrets (#367433) 2025-03-07 10:58:29 +01:00
3JlOy_PYCCKUI
095da00b2d nixos/umurmur: init 2025-03-07 12:07:53 +03:00
Dionysis Grigoropoulos
ce90b7889c
nixos/matrix-alertmanager: init module 2025-03-07 00:04:17 +02:00
Izorkin
a6a9bb9725 dovecot: remove hard coding path to module dir 2025-03-06 19:47:04 +03:00
programmerlexi
12779dc091
nixos/limine: init module
Co-Authored-By: Gabriel Waksmundzki <czapek1337@gmail.com>
2025-03-06 08:05:08 +01:00
Jeremiah
1e0217b0c5
nixos/soft-serve: restart trigger added (#384829)
Previously changing configuration did not apply to the running service
requiring it to be restarted manually. This fixes that issue.
2025-03-05 12:54:04 -05:00
Sandro
5ca7fffe87
nezha: 0.20.3 -> 1.9.5; nezha-agent: 0.20.5 -> 1.9.2; nixos/nezha-agent: refactor (#361515) 2025-03-05 17:38:42 +01:00
Pedro Alves
4f644e0b31 nixos/cloudflared: add option for cert.pem and use dynamic user
Make the cloudflared tunnel service use systemd credentials and dynamic
users, removing the services.cloudflared.user and .group option.

Also add an option to provide the cert.pem file, without which tunnels
defined declaratively would not work.

Additionally, add an assertion checking that the certificate file is
provided if there are declarative routes defined.
2025-03-05 13:33:04 +00:00
Lin Jian
d64a233e4c
emacs: enable __structuredAttrs by default in elisp build helpers 2025-03-05 14:07:47 +08:00
ZHAO Jin-Xiang
6cbe4bd3ad wtfutil: rename wtf to wtfutil 2025-03-05 12:57:57 +08:00
Sandro
4f7fc6dfdf
nixos/glitchtip: init module (#386013) 2025-03-05 01:23:43 +01:00
Defelo
5da710d274
nixos/glitchtip: init module
Co-authored-by: soyouzpanda <soyouzpanda@soyouzpanda.fr>
Co-authored-by: Nico Felbinger <nico@felbinger.eu>
2025-03-05 00:24:50 +01:00
Philip Wilk
aa8fe45398
hddfancontrol: 1.5.1->2.0.1 2025-03-04 19:48:06 +00:00
Jan Solanti
8bd9f1d373 tauon: add DB migration warning to release notes 2025-03-04 21:18:51 +02:00
Moraxyc
1df119a49c
nixos/doc/rl-2505: mention Nezha update 2025-03-04 18:08:05 +08:00
xanderio
8bc3ee6396
dependency-track: stop bundling frontend in jar (#386408) 2025-03-04 09:39:44 +01:00
Lin Jian
c07efdbb57
doc/rl-2505: mention Emacs bump and removal 2025-03-03 13:18:47 +08:00
Tom McLaughlin
60f9abdbf4 mkBinaryCache: add release notes entry about new zstd compression by default 2025-03-02 15:40:01 -08:00
Alexander Sieg
8af0a5abfd dependency-track: don't bundle frontend in jar
Bundling the frontend in the jar is deprecated by upstream and causes
the frontend from being serve after weeks of runtime.
2025-03-02 16:50:01 +01:00
transcaffeine
0b483037f7
nixos/synapse-auto-compressor: init 2025-03-02 15:59:42 +01:00
Weijia Wang
95779c4cb4
nixos/rippled: move drop notice to nixos release notes (#385928) 2025-03-01 16:38:41 +01:00
Maximilian Bosch
2cf427c045
Merge: nextcloud31: init at 31.0.0 (#385060) 2025-03-01 13:47:45 +01:00
Maximilian Bosch
be4fd8fdf2
nixos/nextcloud: update docs
* Update related packages for pkg option.
* Add release notes.
2025-03-01 11:58:54 +01:00
Christoph Heiss
af74cbc292
nixos/rippled: move drop notice to nixos release notes
See the accompanying discussion [0] and e.g. the PR at [1].

[0] https://github.com/NixOS/nixpkgs/pull/374568#discussion_r1951562014
[1] https://github.com/NixOS/nixpkgs/pull/371930

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2025-02-28 23:53:29 +01:00
Samuel Dionne-Riel
6ec6eae586
Revert "nixos/grub: generate BLS entries" 2025-02-28 14:30:10 -05:00
dish
a94dc905b3
webpack-cli: 5.1.4 -> 6.0.1 2025-02-28 11:32:25 -05:00
Michele Guerini Rocco
6bf084c4ea
nixos/grub: generate BLS entries (#95901) 2025-02-28 15:12:36 +01:00
rnhmjoj
7b71abeaac
nixos/release-notes: mention GRUB boot loader entries 2025-02-28 10:00:01 +01:00
Pol Dellaiera
56e88da108
rebuilderd: init at 0.22.1 (#343334) 2025-02-28 09:14:08 +01:00
Sandro
32d2826f35
nixos/archtika: init at 1.0.1 (#365218) 2025-02-27 23:56:06 +01:00
Sandro
d1c535f62a
nixos/user-groups: add a toggle for user account creation (#358646) 2025-02-27 23:47:20 +01:00
Sandro
75f83b13f6
release-notes/25.05: drop extra added new line 2025-02-27 23:36:41 +01:00
Sandro Jäckel
36a3c6c11d
nixos/paperless: move paperless-manage to proper systemPackage 2025-02-27 21:47:35 +01:00
Pol Dellaiera
2c8bdd00fd nixos/rebuilderd: init 2025-02-27 21:18:46 +01:00
Maximilian Bosch
7d443d378b
nixos/oci-containers: support rootless containers & healthchecks
Closes #259770
Closes #207050

The motivation for the former is to not execute the container as root,
so you don't have to `sudo -i` to perform podman management tasks.

The idea behind healthchecks is to be able to keep the unit in the
activating state until the container is healthy, only then then unit is
marked as active.

The following changes were necessary:

* Move the ctr-id into `/run/${containerName}` to make podman can
  actually write to it since it's now in its RuntimeDirectory.

* Make `sdnotify` option configurable (`healthy` for healthchecks that
  must pass, default remains `conmon`).

* Set Delegate=yes for `sdnotify=healthy` to make sure a rootless
  container can actually talk to sd_notify[1].

* Add a warning that lingering must be enabled to have a `systemd --user`
  instance running which is required for the cgroup support to work
  properly.

* Added a testcase for rootless containers with both conmon and
  healthchecks.

[1] https://github.com/containers/podman/discussions/20573#discussioncomment-7612481
2025-02-27 11:08:33 +01:00
Martin Weinelt
35f9b4c165
zigbee2mqtt_2: init at 2.1.1 (#371053) 2025-02-25 05:09:13 +01:00
Bobby Rong
5bdd314871
nixos/doc/rl-2505: Fix wrong option name in Xfce 4.20 release notes (#384523) 2025-02-23 22:37:00 +08:00