3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

13998 commits

Author SHA1 Message Date
Lin Jian c5b6df912b
nixos/fontconfig: add missing config for Xft.hintstyle
This config is removed when removing[1] fonts.fontconfig.hinting.style
option.

However, when adding[2] that option back, this config is missing.

[1]: 65592837b6
[2]: 659096dd89
2022-08-28 05:24:41 +08:00
Christian Kögler 0b6ffe6511
Merge pull request #188362 from pcpthm/fix-nix-registry-flake
nixos/nix-daemon: Add missing parentheses
2022-08-27 22:33:17 +02:00
Bernardo Meurer a53ad0ca15
Merge pull request #188513 from Sciencentistguy/plex-pidfile
nixos/plex: specify PIDFile in systemd service
2022-08-27 17:27:01 -03:00
pennae e607b30abe nixos/tor: convert option descriptions to MD
no change in rendered output. the html manual could render <screen>
blocks differently, but so far it hasn't (and if we need to make a
distinction we can use a special info string).
2022-08-27 19:18:29 +02:00
pennae 5a20c87970 nixos/vsftpd: convert option descriptions to MD
no change to rendered output.
2022-08-27 19:18:29 +02:00
pennae c2e133a422 nixos/thanos: convert option descriptions to MD
no change to outputs.
2022-08-27 19:18:29 +02:00
pennae 0046b457d5 nixos/public-inbox: convert option descriptions to MD
no change to manpage or html.
2022-08-27 19:18:29 +02:00
pennae 429ae9ff3d nixos/thinkfan: convert descriptions to MD
also convert multi-line literals to code blocks to make them render in a
legible manner.
2022-08-27 19:18:29 +02:00
pennae 51a11254a7 nixos/*: literalDocBook -> literalMD
no change to rendered output
2022-08-27 19:18:29 +02:00
pennae 169072fb60 nixos/prometheus: convert option descriptions to MD
this notable also now interprets a markdown-flavored list in
triton_sd_config as actual markdown and renders it differently, but this
is arguably for the better (and probably the original intention).

no other rendering changes.
2022-08-27 19:18:29 +02:00
pennae 97b6defb7b nixos/prometheus: turn markdown in docbook
there seems to be a lot of markdown in the prometheus module that
should've been docbook instead. temporarily convert it to docbook to
keep the diff for the docbook->md conversion of prometheus inspectable.
2022-08-27 19:18:29 +02:00
pennae a2ceee8ffe nixos/strongswan: convert to MD descriptions
no changes to the manpage output. the html output changes, but only by
whitespace.
2022-08-27 19:18:29 +02:00
Gauvain 'GovanifY' Roussel-Tarbouriech f7e49fae0d nixos/prometheus.sachet: add module 2022-08-27 12:41:54 -04:00
Jamie Quigley e8f1b09014
nixos/plex: specify PIDFile in systemd service 2022-08-27 17:23:44 +01:00
clerie bf7d05e64d nixos/keepalived: add secrets support 2022-08-27 17:19:16 +02:00
Pascal Bach 481f9b246d
Merge pull request #187876 from jakubgs/geth-add-authrpc
go-ethereum: add support for Auth RPC CLI flags
2022-08-26 17:16:48 +02:00
Sandro 0116b56989
Merge pull request #187246 from drupol/hedgedoc/add-provider-name-setting 2022-08-26 11:03:47 +02:00
Maximilian Bosch 1652bbcfc3
Merge pull request #188174 from yayayayaka/matrix-synapse-systemd-hardening
nixos/matrix-synapse: Harden systemd serivce
2022-08-26 10:10:04 +02:00
pcpthm f7922cb328 nixos/nix-daemon: Add missing parenthesis
When `nix.registry.<name>.flake` option is used, additional attributes of the flake were not written to the flake registry file because of a missing parenthesis.
2022-08-26 15:53:59 +09:00
Bernardo Meurer d05ae63d23
Merge pull request #179155 from linj-fork/caddy-improve-security
nixos/caddy: improve security about acme certs
2022-08-25 10:36:10 -03:00
Yaya 0c5fbf9c08 nixos/matrix-synapse: Harden systemd serivce
This commit introduces hardening options to the `matrix-synapse`
systemd service.
2022-08-25 08:58:22 +00:00
Curtis Jiang d8bb7ec120 prometheus-v2ray-exporter: init at 0.6.0 2022-08-24 22:35:00 +00:00
Elis Hirwing 658f66299c
Merge pull request #187905 from ju1m/sanoid
nixos/sanoid: fix aliased options
2022-08-24 20:40:41 +02:00
Thiago Kenji Okada 59058bae2a
Merge pull request #188084 from thiagokokada/refactor-xserver
nixos/xserver: remove useGlamor option
2022-08-24 15:25:19 +01:00
CrystalGamma f02151af24 nixos/jitsi-meet: fix property conflict
#167013 introduced a property conflict with the concurrently-written commit
aea940da63, over property
systemd.services.prosody. Fix this by moving the reload option into the block.
2022-08-24 19:02:39 +10:00
Robert Hensing b70d5b5854
Merge pull request #167013 from ThePurox/master
nixos/{jitsi-meet,prosody}: Reload prosody after switch
2022-08-24 10:19:29 +02:00
Thiago Kenji Okada ae0cfe80c4 nixos/xserver: remove useGlamor option
This option is based on a recommendation from a page last updated in
2014 (see https://www.freedesktop.org/wiki/Software/Glamor/), and it
is not necessary anymore.

Also, it did the wrong thing: it forced DRI2, but Glamor should also
work with DRI3, that is a better option most of the time. So let's
remove this option, folks that still want to force this manually can do
so in other ways.
2022-08-23 18:14:00 +01:00
Julien Moutinho 9a94509089 nixos/sanoid: fix aliased options
Fixes https://github.com/NixOS/nixpkgs/issues/181561
2022-08-22 18:56:47 +02:00
misuzu 5fcdceb0b2 nixos/netbird: init 2022-08-22 16:37:43 +03:00
Jakub Sokołowski 54b76185d8
go-ethereum: add support for Auth RPC CLI flags
The split of Ethereum into Execution Layer and Consensus Layer adds a
requirement for communication between execution client and consensus
client using secur JWT tokens. In Geth this is configurable using the
`--authrpc.*` CLI flags which are currently not exposed by this service.

For more details read the following article:
https://geth.ethereum.org/docs/interface/consensus-clients

Signed-off-by: Jakub Sokołowski <jakub@status.im>
2022-08-22 15:30:57 +02:00
Alexander Bantyev 629ec1b38a
Merge pull request #161805 from yrd/outline
outline: init at 0.65.2
2022-08-22 14:45:12 +04:00
Martin Weinelt f21ec1e75b
Merge pull request #181082 from Lassulus/terraria 2022-08-21 21:37:41 +02:00
lassulus 9c8890f2e5 nixos/terraria: set primary group 2022-08-21 21:31:43 +02:00
Kevin Cox 9e0494b3d1 nixos/mautrix-facebook: set verification levels
These are now required otherwise startup fails with:

> TypeError: 'NoneType' object is not subscriptable

The chosen levels are stricter than default but don't require unsupported signing or DB editing so seem like a reasonable high bar for now. It is easy for users to lower the levels so it is better to be stricter by default.

Default levels: 0ce0588725/mautrix_facebook/example-config.yaml (L247-L263)
2022-08-21 14:50:38 -04:00
Kevin Cox 3a08b9acab nixos/mautrix-facebook: create group
Otherwise we get a warning when applying the config.
2022-08-21 14:50:38 -04:00
Sandro b957b84842
Merge pull request #187670 from linj-fork/pr/bump-kanata 2022-08-21 18:21:05 +02:00
Phillip Seeber 9704e9c856 nixos/nextcloud: add option to set fastcgi timeout 2022-08-21 18:14:47 +02:00
Sandro d478d8be71
Merge pull request #186674 from aopom/plausible-service-after-clickhouse 2022-08-21 03:46:35 +02:00
Lin Jian 9f4e8ea56d
nixos/kanata: remove redundant lib 2022-08-21 09:45:26 +08:00
Bobby Rong 5d99fb614b nixos/lightdm-greeters/slick: use mkEnableOption 2022-08-20 21:57:39 +02:00
Guillaume Girol e941a9d433
Merge pull request #186652 from peterhoeg/u/http-dns
nixos/https-dns-proxy: bump version and add support for OpenDNS
2022-08-20 18:09:23 +00:00
John Rinehart 392c83491d
nixos/lightdm-greeters/slick: disable slick greeter by default 2022-08-20 16:37:34 +08:00
Bobby Rong 29cb1c877c
Merge pull request #184409 from water-sucks/lightdm-slick-greeter
lightdm-slick-greeter: init at 1.5.9
2022-08-20 09:28:52 +08:00
pennae 6039648c50 nixos/*: automatically convert option docs 2022-08-19 22:40:58 +02:00
pennae 7e7d68a250 nixos/*: mark pre-existing markdown descriptions as mdDoc 2022-08-19 22:40:58 +02:00
pennae b51f8036c2 nixos/*: use properly indented strings for option docs
using regular strings works well for docbook because docbook is not as
whitespace-sensitive as markdown. markdown would render all of these as
code blocks when given the chance.
2022-08-19 22:40:58 +02:00
pennae 72b507d5a2 nixos/*: convert some markdown in docbook to tags
a lot of markdown syntax has already snuck into option docs, many of it
predating the intent to migrate to markdown. we don't convert all of it
here, just that which is accompanied by docbook tags as well. the rest
can be converted by simply adding the mdDoc marker.
2022-08-19 22:40:58 +02:00
pennae b0e56acef9 nixos/*: remove links to options in code blocks
markdown simply cannot represent these. would be nice to have, but
it'll have to happen some other way (if at all).
2022-08-19 22:40:58 +02:00
pennae 275a34e0d8 nixos/nix-daemon: replace <uri> with <literal>
this could've been a link as well, but <uri> did not render as a link in
the html manual.
2022-08-19 22:40:58 +02:00
pennae d0ba463fcf nixos/*: replace <quote> with actual quotes 2022-08-19 22:40:58 +02:00
pennae f1d39b6d61 nixos/postgresql: replace <function> with <literal>
there's only this one use, we can live with the tiny rendering change.
2022-08-19 22:40:58 +02:00
pennae b7327e966b nixos/*: normalize links with #TEXT=href
the xslt pass will re-add this text, and not having href and text be
equal is required to automatically migrate these links to markdown.
2022-08-19 22:40:58 +02:00
pennae 2646fd7c1b nixos/*: remove <productname>
no change to the rendered output, and we can't properly represent this
in markdown anyway.
2022-08-19 22:40:58 +02:00
pennae a4fdff515b nixos/*: turn inline code blocks into more appropriate things 2022-08-19 22:40:58 +02:00
pennae e4ed177f82 nixos/* eliminate inner whitespace in tags that was missed earlier
nix-doc-munge won't match tags that contain newlines anywhere. most of
these have already been removed, but a few obviously made it through.
2022-08-19 22:40:58 +02:00
pennae 8f8e101527 nixos/*: normalize <package> to <literal>
this renders the same in the manpage and a little more clearly in the
html manual. in the manpage there continues to be no distinction from
regular text, the html manual gets code-type markup (which was probably
the intention for most of these uses anyway).
2022-08-19 22:40:58 +02:00
Kenny MacDermid 7b0b92f5a9
Revert "nixos/fwupd: enable udisks2"
This reverts commit fb5bceb3ff.

Reverted at the request of the author, Bernardo Meurer, to avoid
requiring udisks2 for fwupd to work.
2022-08-19 12:53:34 -03:00
Kenny MacDermid 9754c6d332
nixos/fwupd: migrate to uefi_capsule.conf
In version 1.5.5 of fwupd the uefi plugin was renamed to
uefi-capsule. As part of those changes the configuration file was
renamed and changed.

This modules configuration mismatch was generally hidden because
when udisks2 is enabled fwupd will use that instead. Without
udisks2 the following warning is seen:

    WARNING: UEFI ESP partition not detected or configured
2022-08-19 12:53:23 -03:00
Bobby Rong c52f565d3a Revert "nixos/lightdm: make lightdm user shell bash"
This reverts commit c134f6443a.
Pantheon is using GSD 3.38 nowadays, closes #101568
2022-08-19 23:25:53 +08:00
Gauvain 'GovanifY' Roussel-Tarbouriech 6c55578c7e nixos/komga: add module 2022-08-18 22:52:27 -04:00
Pascal Bach b6ab2508f5
Merge pull request #187299 from superherointj/nixos-modules-minio-fix-network-issue
nixos/minio: fix startup issue
2022-08-18 21:46:43 +02:00
Maximilian Bosch 6a1263503c
Merge pull request #185803 from Ma27/sssd-secrets
nixos/sssd: Add secrets handling (patch originally from @yayayayaka)
2022-08-18 20:51:41 +02:00
Bobby Rong e2ddd98cc9 nixos/cinnamon: default to slick-greeter
Default in Linux Mint.
2022-08-18 23:01:43 +08:00
superherointj 89f527384b nixos/minio: fix startup issue 2022-08-18 11:52:29 -03:00
ckie 30ad2e1c12
Merge pull request #162484 from jappeace/keter-module
nixos/keter: init at 2.0.1
2022-08-18 15:44:05 +03:00
Jappie Klooster a4d72ad628
nixos/keter: init
Enable keter module

Keter is an apploader which:
1. has the old app running on a port.
2. loads a new one, and wait for that to complete
3. switches the old with the new one once the new one finished loading.

It supports more functionality but this use case
is the primary one being used by supercede.

Adds keter as a module to nixos.
Currently keter is unusable with nix,
because it relies on bundeling of a tar and uploading that to a specific folder.
These expressions automate these devops tasks,
with especially nixops in mind.
This will work with versions above 1.8

The test seems to work.
This uses a new version of keter which has good
support for status code on error pages.
We're using this config at production at supercede
so it should be fine.

Squash log:
==========

mention keter in changelog

Update generated release notes

Always restart keter on failure

This is a little bit of extra stability in case keter crashes.
Which can happen under extreme conditions (DoS attacks).

Update nixos/doc/manual/release-notes/rl-2205.section.md

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

Update nixos/modules/module-list.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

Remove sanitization

don't put domain in as a string

Update nixos/tests/keter.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

add jappie as module maintainer

Use type path instead of two seperate options

Fix generated docs

added test machinery to figure out why it's failing

Fix the test, use console output

run nixpkgs-fmt on all modules

Inline config file.

This get's rid of a lot of inderection as well.

Run nix format

remove comment

simplify executable for test

delete config file

add config for keter root

Remove after redis clause

set keter root by default to /var/lib/keter

Update nixos/modules/services/web-servers/keter/default.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

Update nixos/modules/services/web-servers/keter/default.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

Update nixos/modules/services/web-servers/keter/default.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

fix nit

add newlines

add default text and move description in a long description

Delete rather obvious comment

fix release db thing

remove longDescription and put it in a comment instead

change description of mkEnalbeOption

explain what keter does by using the hackage synopsis

set domain to keterDomain and same for executable

move comment to where it's happening

fix type error

add formatting better comment

try add seperate user for keter

Revert "try add seperate user for keter"

This reverts commit d3522d36c96117335bfa072e6f453406c244e940.

Doing this breaks the setup

set default to avoid needing cap_net_bind_service

remove weird comment

use example fields

eleborated on process leakage

Update nixos/modules/services/web-servers/keter/default.nix

Co-authored-by: ckie <25263210+ckiee@users.noreply.github.com>

run nixpkgs-fmt

update docs

Fix formatting, set keter package by default

format our little nixexpr

replace '' -> " where possible

drop indent for multiline string

make description much shorter

regen docs database
2022-08-18 15:29:47 +03:00
Maximilian Bosch 5ec8223e63
nixos/sssd: explain why we use EnvironmentFile= 2022-08-18 11:38:49 +02:00
Maximilian Bosch 8d92d42c5c
nixos/sssd: fix typo 2022-08-18 11:34:06 +02:00
Pol Dellaiera 69347cc5fc
hedgedoc: add SAML providerName option 2022-08-18 11:08:53 +02:00
Varun Narravula fdac82a307 nixos/lightdm-greeters/slick: init 2022-08-18 15:52:05 +08:00
Kira Bruneau 6e665c4e29
Merge pull request #185987 from LoveIsGrief/display-manager-read-.profile
Attempt to source .profile if .xprofile not found
2022-08-17 15:58:46 -04:00
LoveIsGrief 881512e23f
x11: Source .profile and .xprofile
Other popular distros (OpenSuse, Ubuntu, Gentoo, Arch) read $HOME/.profile when starting X11 display managers.
When moving to nixOS, that is then broken leading to unpredictable behavior (probably programs not working).

This adds similar behavior to https://github.com/sddm/sddm/blob/develop/data/scripts/Xsession

Related to #185979
2022-08-17 20:37:33 +02:00
Jan Tojnar 299611a634
Merge pull request #187132 from ElvishJerricco/gnome-disable-packagekit
nixos: Don't enable packagekit by default
2022-08-17 20:24:05 +02:00
Will Fancher d3e5bd0228 nixos: Don't enable packagekit by default 2022-08-17 13:53:21 -04:00
Bernardo Meurer 5fcc2ff7a1
Merge pull request #187029 from lovesegfault/fwupdmgr-udisks
nixos/fwupd: enable udisks2
2022-08-17 09:04:55 -07:00
Yannik Rödel 9898e975af outline: init at 0.65.2 2022-08-17 16:30:16 +02:00
Sandro a9f3c22db5
Merge pull request #182382 from SuperSandro2000/portunus 2022-08-17 15:20:45 +02:00
ckie 6c36827e98
Merge pull request #186536 from tpwrules/add-spice-webdavd-module
nixos/spice-webdavd: init
2022-08-17 13:41:43 +03:00
Kim Lindberger eed71ab5db
Merge pull request #185820 from talyz/discourse-2.9.0.beta8
discourse: 2.9.0.beta4 -> 2.9.0.beta9
2022-08-17 10:41:28 +02:00
Peter Hoeg 28116cfd9b nixos/https-dns-proxy: add OpenDNS support 2022-08-17 10:25:31 +08:00
Bernardo Meurer fb5bceb3ff
nixos/fwupd: enable udisks2
Without this, you get a warning that fwupd is unable to find the ESP
partition.

c.f. https://github.com/fwupd/fwupd/wiki/PluginFlag:esp-not-found
2022-08-16 18:15:18 -04:00
Lassulus 8471526587
Merge pull request #186785 from helsinki-systems/feat/nss-lookup-nscd 2022-08-16 20:45:45 +02:00
Maximilian Bosch 9e8ea1b855
Merge pull request #183717 from NetaliDev/mysql-auth
nixos: add mysql/mariadb user authentication module
2022-08-16 20:30:16 +02:00
Paul-Henri Froidmont d2ce318bd4 nixos/patroni: init 2022-08-16 18:57:15 +02:00
Jonas Heinrich 0d85bb5e4a
Merge pull request #186668 from r-ryantm/auto-update/pipewire
pipewire: 0.3.56 -> 0.3.56
2022-08-16 15:48:34 +02:00
Sandro e1951451e0
Merge pull request #186914 from evils/tuptime 2022-08-16 15:18:27 +02:00
Evils 3895a5baa2 tuptime: 5.1.0 -> 5.2.0
add meta.changelog

and update module to upstream wording
2022-08-16 10:03:12 +02:00
Jörg Thalheim 7a8a3dfd8b
Merge pull request #181939 from Mic92/vault-2
vault: fix assertions when raft backend is used
2022-08-16 05:24:01 +01:00
Jörg Thalheim 2c3f6055fb syncoid: handle syncing dataset without a parent 2022-08-16 06:18:54 +02:00
Vincent Haupert 786f72c32e nixos/github-runner: start Runner.Listener directly in ExecStart=
The `runsvc.sh` script wraps a JavaScript script which starts
`Runner.Listener` and also handles failures. This has the downside that
the service _always_ exits with status code 0, i.e., success. This
causes frequent service restarts when running in ephemeral mode with a
faulty config as Systemd always sees a success exit status. To prevent
this, this commit changes the service config to call `Runner.Listener`
directly. The JavaScript wrapper stops the process with a SIGINT, hence,
the Systemd unit now sends a SIGINT to stop the service.
2022-08-15 13:13:58 -04:00
Vincent Haupert 987a4b4231 nixos/github-runner: add support for ephemeral runners
Adds the module option `ephemeral`. If set to true, configures the
runner registration with the `--ephemeral` option. This causes the
runner to exit after processing a single job, to de-register itself, and
to delete its configuration. Afterward, systemd restarts the service
which triggers a new ephemeral registration with a clean state.
2022-08-15 13:13:58 -04:00
Vincent Haupert 3f075e5bb1 nixos/github-runner: add PAT support
This commit introduces support for runner registrations through a
personal access token (PAT). To use a PAT instead of a registration
token, place an appropriately scoped PAT in `tokenFile`. If the file
contains a PAT, the configuration script queries a new runner
registration token. Using a runner registration token directly continues
to work as before.
2022-08-15 13:13:58 -04:00
Vincent Haupert 65542a6348 nixos/github-runner: use state instead of runtime dir as RUNNER_ROOT
Using the runtime directory as `RUNNER_ROOT` is wrong. We should always
use the state directory like we already do when invoking the runner
configure script. Otherwise, the runner constructs the wrong path for
some files (.credentials, .runner, ...).
2022-08-15 13:13:58 -04:00
Jörg Thalheim 66c94cd524
Merge pull request #185856 from NoneTirex/fix-headscale-tls-config
headscale: fix tls challengeType enum possible values
2022-08-15 17:51:49 +01:00
Bobby Rong 50c0564bc8
Merge pull request #186742 from bobby285271/cinnamon
Cinnamon updates 2022-08-15
2022-08-15 21:22:50 +08:00
Christian Kögler 0884cb0ba2
Merge pull request #177577 from jmbaur/globalprotect-openconnect_config
nixos/globalprotect: add settings option for service configuration
2022-08-15 14:43:13 +02:00
Bobby Rong 9c69f307ce nixos/cinnamon: install gnome-screenshot
Closes #169178
2022-08-15 19:35:43 +08:00
Janne Heß 8cef7eec93
nixos/nscd: Add requiredBy for the nss targets
This is to ensure the targets are stopped when nscd is stopped to
prevent races on switch. Example interaction: nscd is stopped, some
service that requires nss-user-lookup.target is restarted. Without this
PR, nss-user-lookup.target would still be active, hence the service
would start without nscd running.
2022-08-15 13:18:03 +02:00
Bobby Rong fcc28fe306
Merge pull request #186587 from midchildan/fix/mirakurun-add-logo-dir
nixos/mirakurun: set the LOGO_DATA_DIR_PATH environment variable
2022-08-15 17:40:26 +08:00
Sebastián Mancilla 10a745eac8
Merge pull request #179896 from erikarvstedt/fix-bash-exit-handler
treewide: fix bash exit handlers
2022-08-14 21:42:41 -04:00
Thomas Watson 9c52987b51 nixos/spice-webdavd: init 2022-08-14 12:28:05 -05:00
ppom 565a729f7c make plausible service start after clickhouse service
Plausible fails on start because clickhouse is not ready,
when clickhouse has low CPU available, eg.
```nix
{systemd.services.clickhouse.serviceConfig.CPUWeight = 20;}
```

Fixed with
```nix
{systemd.services.plausible.after = [ "clickhouse.service" ];}
```
2022-08-14 17:09:05 +02:00
R. Ryantm 813a4ba8a0 pipewire: 0.3.56 -> 0.3.56 2022-08-14 14:31:51 +00:00
midchildan 664b01f082
nixos/mirakurun: set the LOGO_DATA_DIR_PATH environment variable 2022-08-14 16:34:47 +09:00
linsui f411f4ae7a safeeyes: fix double wrap 2022-08-14 09:31:22 +08:00
Bernardo Meurer 5975411744
nixos/localtimed: fix service 2022-08-12 22:46:16 -04:00
gardspirito aa6a8bd8dd nixos/neo4j: HTTP connector toggling 2022-08-12 15:45:48 -07:00
gardspirito 8d6f4552cd nixos/neo4j: fix typo 2022-08-12 15:45:48 -07:00
Kerstin Humm a22112e88a neo4j: remove deprecated config 2022-08-12 15:45:48 -07:00
Kerstin Humm 9b60931986 neo4j: add erictapen as maintainer 2022-08-12 15:45:48 -07:00
Kerstin Humm 60b6ad6f37 nixos/neo4j: set some settings so warnings at startup disappear 2022-08-12 15:45:48 -07:00
Jonathan Ringer 0fbce25144 neo4j: 3.5.14 -> 4.1.1 2022-08-12 15:45:48 -07:00
pennae 50f9b3107a
Merge pull request #185474 from pennae/option-docs-md
nixos/*: more options md conversion
2022-08-12 23:23:26 +02:00
Sandro df97735064
Merge pull request #173669 from SuperSandro2000/gitea 2022-08-12 15:33:46 +02:00
talyz 7feea0d062
discourse: 2.9.0.beta4 -> 2.9.0.beta9
Co-authored-by: Tobias Stenzel <ts@flyingcircus.io>
2022-08-12 12:20:17 +02:00
Richard Marko 9ba8f7d8b3 services/klipper: add CPUScheduling and IOScheduling tuning 2022-08-12 17:31:02 +08:00
Richard Marko 1410d89398 nixos/klipper: add OOMScoreAdjust -999
to make it unlikely that klipper gets killed by OOM killer.
2022-08-12 17:31:02 +08:00
Winter ce63730df8 Update nixos/modules/services/misc/tautulli.nix 2022-08-11 22:49:50 -04:00
Ryan Horiguchi feba340314 nixos/tautulli: add option to open firewall 2022-08-11 22:49:50 -04:00
Martin Weinelt a58668f0a0
Merge pull request #176835 from pennae/syncserver 2022-08-12 01:33:26 +02:00
pennae bd1978e911 nixos/firefox-syncserver: init 2022-08-12 00:45:25 +02:00
Emery Hemingway 300c5c98c6 nixos/yggdrasil: rename "config" option to "settings"
Make this service consistent with rfc42.

https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md
2022-08-11 16:09:42 -05:00
Kim Lindberger 51998bc19e
Merge pull request #185760 from michaeladler/fix-ssh-hostkey-gen
fix: ssh-keygen fails if directory does not exist
2022-08-11 16:39:58 +02:00
ajs124 90d88829da nixos/gvfs: enable udisks2
can be used by gvfs and is disabled by default after
f763710065
2022-08-11 13:28:31 +02:00
ajs124 f763710065 nixos/udisks2: don't enable by default
This was enabled by default in 18a7ce76fc
with the reason that it would be "useful regardless of the desktop
environment.", which I'm not arguing against.

The reason why this should not be enabled by default is that there are a
lot of systems that NixOS runs on that are not desktop systems.
Users on such systems most likely do not want or need this feature and
could even consider this an antifeature.
Furthermore, it is surprising to them to find out that they have this
enabled on their systems.
They might be even more surprised to find that they have polkit enabled
by default, which was a default that was flipped in
a813be071c. For some discussion as to why
see https://github.com/NixOS/nixpkgs/pull/156858.

Evidently, this default is not only surprising to users, but also module
developers, as most if not all modules for desktop environments already
explicity set services.udisks2.enable = true; which they don't need to
right now.
2022-08-11 02:47:34 +02:00
Sandro 43ee224113
Merge pull request #185629 from mlyxshi/master 2022-08-10 14:47:29 +02:00
Bernardo Meurer 4bd7ee8870
Merge pull request #185301 from lovesegfault/geoclue-wifi-wait 2022-08-09 23:15:22 -07:00
Bernardo Meurer ee0b8a7eaa
nixos/geoclue2: wait for network to be up when wifi provider is enabled 2022-08-09 23:52:50 -04:00
Mario Rodas 0ac85cc7e8
Merge pull request #184003 from Izorkin/update-peertube
peertube: 4.2.1 -> 4.2.2
2022-08-09 21:47:34 -05:00
tirex 8f9ef1c30e headscale: fix tls challengeType enum possible values 2022-08-10 03:09:41 +02:00
Thiago Kenji Okada 35348fcc07
Merge pull request #182831 from otavio/topic/use-postStop-for-restic
nixos/restic: use postStop for `backupCleanupCommand`
2022-08-09 18:39:42 +01:00
Izorkin 0b98d77ff5
nixos/peertube: fix start service 2022-08-09 18:58:02 +03:00
Lara 87942da08e
nixos/sssd: Add secrets handling
Currently, it is not possible to supply sensitive credentials like
`ldap_default_authtok` without writing them to the nix store. This
This commit introduces a new option `environmentFile` where those
credentials can be supplied via environment substitution.
2022-08-09 17:28:37 +02:00
Moritz 'e1mo' Fromm 79ae88a100
nixos/syncthing: Add receiveencrypted folder type
This folder type is available in syncthing, but could not be set in
NixOS.
See <https://docs.syncthing.net/users/untrusted.html> for reference.
2022-08-09 15:03:14 +02:00
Michael Adler d8b356caaf fix: ssh-keygen fails if directory does not exist 2022-08-09 12:16:17 +02:00
Anderson Torres 14c47e30b8
Merge pull request #185630 from AndersonTorres/wip-hackedbox
hackedbox: init at 0.8.5.1
2022-08-08 17:57:37 -03:00
Sandro Jäckel 49da90755b
nixos/portunus: init 2022-08-08 19:14:50 +02:00
M. A 6efa5c77ed nixos/snipe-it: Add private_uploads to tmpfiles
Through testing Snipe-IT's backup feature I discovered that it expects
the `${dataDir}/storage/private_uploads` folder to be present.
2022-08-08 11:11:48 -04:00
K900 d68ba1d746 nixos/plasma5: default runUsingSystemd to on
Upstream switched as of 5.25
2022-08-08 22:31:26 +08:00
Robert Hensing 661c29c806
Merge pull request #181222 from hercules-ci/module-specialArgs
`_module.specialArgs` + unit test for nixos/documentation module
2022-08-08 11:53:10 +02:00
AndersonTorres 7b6ad60ab4 hackedbox: init at 0.8.5.1 2022-08-08 03:30:35 -03:00
mlyxshi 228a897afd
Update nitter.nix 2022-08-07 22:50:42 -07:00
illustris dffa97f03c nixos/hbase-standalone: add mkRenamedOptionModule and rename file 2022-08-07 21:21:45 +02:00
illustris a92ca6263a nixos/hadoop.hbase: change mkOption to mkEnableOption 2022-08-07 21:21:45 +02:00
illustris d1af9d1517 nixos/hadoop: allow overriding conf files generated by site options with extraconfdirs 2022-08-07 21:21:45 +02:00
illustris 1285a586c5 nixos/hadoop: fix incorrect merging of yarnSiteInternal 2022-08-07 21:21:45 +02:00
illustris ac403b83fb nixos/hadoop: add HBase submodule 2022-08-07 21:21:45 +02:00
Bobby Rong 9c16fe5b87
Merge #181918: Cinnamon 5.4
https://www.linuxmint.com/rel_vanessa_cinnamon_whatsnew.php
2022-08-07 10:07:01 +08:00
pennae 087472b1e5 nixos/*: automatically convert option docs 2022-08-06 20:39:12 +02:00
Netali f23a1e6a54
nixos: add mysql/mariadb user authentication 2022-08-06 19:39:23 +02:00