3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

13945 commits

Author SHA1 Message Date
pennae e4d4b3cd64
Merge pull request #182441 from leungbk/lemmy-whitespace
services/web-apps/lemmy.nix: Remove space that causes a type error
2022-07-22 14:30:23 +02:00
github-actions[bot] dec2508b80
Merge staging-next into staging 2022-07-22 12:02:21 +00:00
Maximilian Bosch ee2413c326
nixos/crowd: store openid password securely 2022-07-22 13:13:12 +02:00
Maximilian Bosch 1f6910b7dd
Merge pull request #182267 from mayflower/confluence-secrets
nixos/confluence: store crowd SSO password securely
2022-07-22 13:12:17 +02:00
Maximilian Bosch 85231bbd6e
Merge pull request #182261 from mayflower/mailman-rest-api-pass-file
nixos/mailman: don't leak MAILMAN_REST_API_PASS into the store
2022-07-22 13:11:37 +02:00
Ilan Joselevich d0617a58e2
services/web-apps/lemmy.nix: Remove space that causes a type error 2022-07-22 01:19:28 -07:00
github-actions[bot] df9f22a8b8
Merge staging-next into staging 2022-07-22 00:03:25 +00:00
Martin Weinelt 457d109dcd
Merge pull request #179597 from Mic92/openldap-path
[staging] openldap: remove deprecated options, improve encapsulation
2022-07-22 00:26:32 +02:00
Sandro 98b4daa994
Merge pull request #181881 from SuperSandro2000/searx 2022-07-21 22:39:48 +02:00
Sandro f7f8721b1e
Merge pull request #162689 from astro/glusterfs
nixos/glusterfs: exclude hook "S10selinux-label-brick.sh"
2022-07-21 22:15:00 +02:00
Sofi e2b34f0f11
nixos/minecraft-server: let server shutdown cleanly (#182149) 2022-07-21 15:05:43 -04:00
talyz ddf8182d5b
sshd: Don't remove symlinks to host key files
If a host key file is a symlink pointing to an as of yet non-existent
file, we don't want to remove it, but instead follow the symlink and
create the file at that location.

See https://github.com/nix-community/impermanence/issues/101 for more
information on the issue the original behavior creates.
2022-07-21 19:15:04 +02:00
Vincent Haupert 539b61ea37 nixos/github-runner: fix capset syscall filtering
capset(2) is a single system call, not a set of multiple system calls.
2022-07-21 16:08:15 +02:00
Robert Hensing 5a98c63077 nixos: Move getty helpLine definition to getty module
Working towards a unit-testable documentation module.
2022-07-21 15:32:00 +02:00
Maximilian Bosch 258060c37d
nixos/confluence: store crowd SSO password securely
Basically the same as the JIRA change[1], but I figured that we can
actually implement that in a backwards compatible manner.

[1] https://github.com/NixOS/nixpkgs/pull/181715
2022-07-20 23:11:53 +02:00
Maximilian Bosch db9937b578
nixos/mailman: don't leak MAILMAN_REST_API_PASS into the store 2022-07-20 22:23:54 +02:00
Maximilian Bosch 501bbad4ce
Merge pull request #182104 from mayflower/mail-exporter-secrets
nixos/prometheus-mail-exporter: support storing `passphrase` outside of the store, use umask when using envsubst
2022-07-20 20:42:14 +02:00
Maximilian Bosch 92bd77e85e
nixos/prometheus-mail-exporter: umask to avoid accidental world-readability 2022-07-20 20:29:38 +02:00
Maximilian Bosch 590e60d124
nixos/mxisd: umask to avoid accidental world-readability 2022-07-20 20:29:38 +02:00
Maximilian Bosch 81add6600c
nixos/privacyidea-ldap-proxy: umask to avoid accidental world-readability 2022-07-20 20:29:38 +02:00
Maximilian Bosch 39c0694709
nixos/prometheus-mail-exporter: support storing passphrase outside of the store 2022-07-19 17:32:08 +02:00
github-actions[bot] cfe78489c9
Merge master into staging-next 2022-07-19 12:01:43 +00:00
Sandro bca69a4037
Merge pull request #181867 from newAM/github-runner
nixos/github-runner: fix systemd defaults for common workflows
2022-07-19 12:56:17 +02:00
Euan Kemp f158ac45ef nixos/k3s: use default cgroup-driver again
Setting `cgroup-driver=systemd` was originally necessary to match with
docker, else the kubelet would not start (#111835)

However, since then, docker support has been dropped from k3s (#177790).
As such, this option is much less necessary.

More importantly, it now seems to be actively causing issues. Due to an
upstream k3s bug, it's resulting in the kubelet and containerd having
different cgroup drivers, which seems to result in some difficult to
debug failure modes.

See
https://github.com/NixOS/nixpkgs/issues/181790#issuecomment-1188840862
for a description of this problem.

Removing this flag entirely seems reasonable to me, and it results in
k3s working again on my machine.
2022-07-19 02:52:12 -07:00
Wei Tang b0a0087d53
nixos/flannel: upgrade to etcdv3 (#180315) 2022-07-19 16:09:42 +10:00
github-actions[bot] 305e8cb7b8
Merge master into staging-next 2022-07-19 06:03:02 +00:00
Wout Mertens 3ee8d4c909
netdata module: fix ExecStartPost (#181976) 2022-07-19 06:19:18 +02:00
github-actions[bot] d64d75f2f3
Merge master into staging-next 2022-07-19 00:02:21 +00:00
Joachim F 0640ef2ccc
Merge pull request #180231 from dfithian/heartbeat
heartbeat service: specify package
2022-07-18 20:56:08 +02:00
Dan Fithian 49a5377557 heartbeat service: specify package
Other elastic services can specify the package. Now we can also do it for heartbeat.
2022-07-18 14:39:22 -04:00
github-actions[bot] 83702a6ef7
Merge master into staging-next 2022-07-18 18:01:14 +00:00
oaksoaj fc9e22fca1 yggdrasil: add group option back and remove systemd User= directive
The group configuration parameter allow to share access to yggdrasil
control socket with the users in the system. In the version we propose,
it is null by default so that only root can access the control socket,
but let user create their own group if they need.

Remove User= durective in systemd unit. Should a user with the specified
name already exist in the system, it would be used silently instead of a
dynamic user which could be a security concern.
2022-07-18 12:56:59 -05:00
oaksoaj 080774e28f yggdrasil: reenable DynamicUser
Since version 0.4 Yggdrasil works again using systemd's DynamicUser option.
This patch reenables it to improve security.

We tested this with both persistent and non-persistent keys. Everything
seems to work fine.
2022-07-18 12:56:59 -05:00
Maximilian Bosch 179688c7c8
Merge pull request #181377 from mayflower/mxisd-secrets
nixos/mxisd: allow passing secrets
2022-07-18 15:10:49 +02:00
Maximilian Bosch 8b72dae17b
Merge pull request #181528 from Ma27/privacyidea-ldap-proxy-secrets
nixos/privacyidea: better secret-handling ldap-proxy & RFC42-style settings for ldap-proxy
2022-07-18 14:19:47 +02:00
github-actions[bot] 71fe747e70
Merge master into staging-next 2022-07-18 12:01:55 +00:00
Maximilian Bosch 949c334ea9
nixos/privacyidea-ldap-proxy: use list for EnvironmentFile for mergeability 2022-07-18 13:58:08 +02:00
Maximilian Bosch dab3ae9d8b
Merge pull request #181715 from mayflower/jira-secret-opts
nixos/atlassian-jira: allow to store SSO password for crowd outside of the Nix store
2022-07-18 13:53:42 +02:00
Jörg Thalheim 9a020f31aa
Merge pull request #175439 from Mic92/jellyfin
nixos/jellyfin: better defaults for hardware acceleration
2022-07-18 12:51:54 +01:00
Maximilian Bosch c2c82fbe43
nixos/mxisd: use a list for env file for mergeability 2022-07-18 13:47:09 +02:00
Jörg Thalheim 2856eb2046 vault: fix assertions when raft backend is used 2022-07-18 13:12:26 +02:00
Vladimír Čunát 250922fd1e
Merge branch 'master' into staging-next 2022-07-18 08:29:53 +02:00
Alex Martens c34749dd63 nixos/github-runner: fix systemd defaults for common workflows 2022-07-17 22:02:57 -07:00
Sandro Jäckel 3920bb41f2
nixos/searx: improve searxng compatibility 2022-07-17 21:45:30 +02:00
Sandro 0890c4aef1
Merge pull request #168879 from aidalgol/pass-secret-service-systemd-unit 2022-07-17 16:45:27 +02:00
Bjørn Forsman 0080a93cdf nixos/jenkins-job-builder: create secret file with umask 0077
IOW, don't make it world readable.
2022-07-17 15:24:48 +02:00
Sandro Jäckel 5e297d07aa
nixos/onlyoffice: init 2022-07-16 23:32:07 +02:00
Vladimír Čunát 0879ac5da6
Merge branch 'master' into staging-next 2022-07-16 20:07:05 +02:00
Maximilian Bosch 4adf26f018
nixos/privacyidea-ldap-proxy: always run envsubst
Otherwise the file doesn't exist at the expected location.
2022-07-16 14:00:46 +02:00
Kim Lindberger d012de5b1d
Merge pull request #181401 from yayayayaka/gitlab-bump-git-to-2.35.4
nixos/gitlab: Bump git to 2.35.4
2022-07-16 13:37:16 +02:00
Maximilian Bosch 765cc35042
nixos/atlassian-jira: allow to store SSO password for crowd outside of the Nix store
The option `services.jira.sso.applicationPassword` has been replaced by
`applicationPasswordFile` that needs to be readable by the `jira`-user
or group.

The new `crowd.properties` is created on startup in `~jira` and the
secret is injected into it using `replace-secret`.
2022-07-16 13:01:29 +02:00
Bjørn Forsman 50eaf82b6f nixos/jenkins-job-builder: fix jenkins authentication
The current authentication code is broken against newer jenkins:

  jenkins-job-builder-start[1257]: Asking Jenkins to reload config
  jenkins-start[789]: 2022-07-12 14:34:31.148+0000 [id=17]        WARNING hudson.security.csrf.CrumbFilter#doFilter: Found invalid crumb 31e96e52938b51f099a61df9505a4427cb9dca7e35192216755659032a4151df. If you are calling this URL with a script, please use the API Token instead. More information: https://www.jenkins.io/redirect/crumb-cannot-be-used-for-script
  jenkins-start[789]: 2022-07-12 14:34:31.160+0000 [id=17]        WARNING hudson.security.csrf.CrumbFilter#doFilter: No valid crumb was included in request for /reload by admin. Returning 403.
  jenkins-job-builder-start[1357]: curl: (22) The requested URL returned error: 403

Fix it by using `jenkins-cli` instead of messing with `curl`.

This rewrite also prevents leaking the password in process listings. (We
could probably do it without `replace-secret`, assuming `printf` is a
shell built-in, but this implementation should be safe even with shells
not having a built-in `printf`.)

Ref https://github.com/NixOS/nixpkgs/issues/156400.
2022-07-16 12:30:41 +02:00
github-actions[bot] fa96a4fa79
Merge master into staging-next 2022-07-16 00:02:26 +00:00
Sandro 2d0f98389f
Merge pull request #175738 from SuperSamus/plasma 2022-07-16 00:56:08 +02:00
Aaron Andersen 9b01242132
Merge pull request #131261 from bb2020/dlna
nixos/minidlna: convert to structural settings
2022-07-15 21:28:19 +02:00
github-actions[bot] 9f53d5cc15
Merge master into staging-next 2022-07-15 18:01:23 +00:00
Sandro 8e45a79ab1
Merge pull request #181579 from NixOS/netdata-module-startpost
netdata: fix post start for module
2022-07-15 16:20:55 +02:00
Sandro 475b23340b
Merge pull request #181410 from lilyinstarlight/fix/greetd-default-user
nixos/greetd: fix minor typo for default user
2022-07-15 16:12:09 +02:00
github-actions[bot] a4622e8226
Merge master into staging-next 2022-07-15 12:01:15 +00:00
Wout Mertens 7f55ee3a53
netdata: fix post start for module 2022-07-15 09:57:13 +02:00
zowoq e2659eea36 nixos/kubernetes: use copyToRoot instead of deprecated contents 2022-07-15 10:23:06 +10:00
Maximilian Bosch bccaac9535
nixos/privacyidea: better secret-handling ldap-proxy & RFC42-style settings for ldap-proxy
Instead of hard-coding a single `configFile` for
`privacyidea-ldap-proxy.service` which is pretty unmergable with other
declarations it now uses a RFC42-like approach. Also to make sure that
secrets can be handled properly without ending up in the Nix store, it's
possible to inject secrets via envsubst

    {
      services.privacyidea.ldap-proxy = {
        enable = true;
        environmentFile = "/run/secrets/ldap-pw";
        settings = {
          privacyidea.instance = "privacyidea.example.org";
          service-account = {
            dn = "uid=readonly,ou=serviceaccounts,dc=example,dc=org";
            password = "$LDAP_PW";
          };
        };
      };
    }

and the following secret file (at `/run/secrets`):

    LDAP_PW=<super-secret ldap pw>

For backwards-compat the old `configFile`-option is kept, but it throws
a deprecation warning and is mutually exclusive with the
`settings`-attrset. Also, it doesn't support secrets injection with
`envsubst` & `environmentFile`.
2022-07-14 23:51:17 +02:00
github-actions[bot] 1a74c5d703
Merge master into staging-next 2022-07-14 18:01:27 +00:00
github-actions[bot] e0608ddfd9
Merge master into haskell-updates 2022-07-14 00:15:36 +00:00
Lily Foster 6f5c1bcf7b nixos/greetd: fix minor typo for default user
It has been like this since the module was added, but it hasn't caused
problems because greetd assumes a default user of "greeter"[1] when it
isn't found anyway

[1]: d700309623/item/greetd/src/config/mod.rs (L127)
2022-07-13 18:11:16 -04:00
M. A 61e3490c1c nixos/gitlab: Bump git to 2.35.4
Resolves CVE-2022-29187
2022-07-13 21:03:46 +00:00
github-actions[bot] 00ec8bc8d3
Merge master into staging-next 2022-07-13 18:01:28 +00:00
Maximilian Bosch d54d70f166
nixos/mxisd: allow passing secrets
Suppose you want to provide a LDAP-based directory search to your
homeserver via a service-user with a bind-password. To make sure that
this doesn't end up in the Nix store, it's now possible to set a
substitute for the bindPassword like

    services.mxisd.extraConfig.ldap.connection = {
      # host, bindDn etc.
      bindPassword = "$LDAP_BIND_PW";
    };

and write the actual secret into an environment file that's readable for
`mxisd.service` containing

    LDAP_BIND_PW=<your secret bind pw>

and the following setting in the Nix expression:

    services.mxisd.environmentFile = "/runs/ecrets/mxisd";

(cherry picked from commit aa25ce7aa1a89618e4257fd46c7d20879f54c728)
2022-07-13 19:19:17 +02:00
Domen Kožar c46a3dc50a cachix-agent: allow restarts now that deployments are subprocesses 2022-07-13 11:40:54 -05:00
Sandro a959a2cd26
Merge pull request #180992 from romildo/new.xdg.portal.lxqt 2022-07-13 14:15:09 +02:00
Vladimír Čunát 8169a7fce0
Merge branch 'master' into staging-next 2022-07-13 09:57:41 +02:00
José Romildo 7e30ebb2c2 nixos/lxqt: add a module for the lxqt portal 2022-07-12 17:17:39 -03:00
Sandro 78fff7ed35
Merge pull request #181197 from bjornfor/fix-ddclient-password-leak 2022-07-12 15:13:43 +02:00
github-actions[bot] 446763e8e1
Merge master into staging-next 2022-07-12 12:01:18 +00:00
Martin Weinelt b7dc3d66c2
Merge pull request #181184 from kittywitch/ha-empty-config-fix
nixos/home-assistant: make the reload triggers dependent upon cfg.config
2022-07-12 11:39:39 +02:00
Bjørn Forsman e0f2f7f9ea nixos/ddclient: don't leak password in process listings
...by using `replace-secret` instead of `sed` when injecting the
password into the ddclient config file. (Verified with `execsnoop`.)

Ref https://github.com/NixOS/nixpkgs/issues/156400.
2022-07-12 10:23:40 +02:00
Pascal Wittmann 6d1cabe9d9
Merge pull request #158346 from kurnevsky/i2pd-yggdrasil
i2pd: add yggdrasil settings
2022-07-12 10:19:18 +02:00
github-actions[bot] aef69f5f34
Merge master into staging-next 2022-07-12 06:01:09 +00:00
Aaron Andersen bf57026e6a
Merge pull request #179511 from jian-lin/fix-force-caddy-reload-config
nixos/caddy: force caddy to reload config in ExecReload
2022-07-12 04:53:45 +02:00
github-actions[bot] 2caa4189ea
Merge master into staging-next 2022-07-12 00:02:27 +00:00
Aidan Gauland d9119dbbdf
pass-secret-service: unstable-2020-04-12 -> unstable-2022-03-21
* Update to the latest upstream version of pass-secret-service that includes
  systemd service files.
* Add patch to fix use of a function that has been removed from the Python
  Cryptography library in NixOS 22.05
* Install systemd service files in the Nix package.
* Add NixOS test to ensure the D-Bus API activates the service unit.
* Add myself as a maintainer to the package and NixOS test.
* Use checkTarget instead of equivalent custom checkPhase.
2022-07-12 07:33:26 +12:00
Sandro Jäckel af66b47b3a nixos/postgresql-backup: allow setting compression level 2022-07-11 21:28:22 +02:00
github-actions[bot] 5f2ff17a45
Merge master into staging-next 2022-07-11 18:01:16 +00:00
Kat Inskip 8f2c49ece6
nixos/home-assistant: make the reload triggers dependent upon cfg.config 2022-07-11 08:19:25 -07:00
Sandro e2f14dd31a
Merge pull request #181026 from queezle42/pipewire-systemwide-bluetooth
pipewire: fix bluetooth for system-wide configuration
2022-07-11 15:38:55 +02:00
Jens Nolte 61c9f44a1d pipewire: fix bluetooth for system-wide configuration 2022-07-11 02:35:36 +02:00
github-actions[bot] 55e8459a46
Merge staging-next into staging 2022-07-11 00:04:08 +00:00
Melvyn ef6d6d4c4a
Add bash to netdata service path
The `bash` binary is needed for running some plugins, notably the alarm notify plugins. If the binary isn't in the path, alarms notifications aren't sent and the netdata error log instead contains `/usr/bin/env: 'bash': No such file or directory`.
2022-07-10 16:26:05 -07:00
Sandro 366683965e
Merge pull request #166308 from ncfavier/wg-resolvconf
nixos/resolvconf: allow different implementations
2022-07-10 21:00:00 +02:00
Shawn8901 98ac43a1cf
zrepl: add package option to module (#179189)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2022-07-10 20:32:27 +02:00
github-actions[bot] 05798fee88
Merge staging-next into staging 2022-07-10 18:01:55 +00:00
Martin Weinelt 0044b4fa22
Merge pull request #180950 from alyssais/graphite 2022-07-10 17:22:45 +02:00
Martin Weinelt f8137a54eb
Merge pull request #153445 from erdnaxe/prometheus_protecthome
nixos/prometheus-node-exporter: do not protect home
2022-07-10 17:21:44 +02:00
Emery Hemingway 429fc9aaf7 nixos/hedgedoc: convert to settings-style configuration
Replace "services.hedgedoc.configuration" with ".settings" to be
consistent with RFC0042. This allows control of settings not
declared in the module.
2022-07-10 08:07:14 -05:00
github-actions[bot] 4bff9bab6b
Merge staging-next into staging 2022-07-10 12:02:29 +00:00
Robert Hensing e153087276 nixos: Fix use of nixpkgs.localSystem
localSystem is ill-defined because unlike hostPlatform, its
meaning is different in a cross or non-cross context.
2022-07-10 13:35:54 +02:00
Janne Heß 9412f62782
Merge pull request #180536 from SuperSandro2000/hydra-runuser
nixos/hydra: use runuser like hydra flake
2022-07-10 13:30:42 +02:00
K900 d2b579b23e
Merge pull request #178254 from K900/update-tempo
tempo: 1.1.0 -> 1.4.1, add NixOS module
2022-07-10 14:01:30 +03:00
Alyssa Ross 1f18d44106
python3.pkgs.graphite_api: remove
Due to lack of maintenance.  It doesn't build, the last upstream
commit was in 2017, and last significant change in Nixpkgs was in
2018.
2022-07-10 09:46:20 +00:00
Alyssa Ross ada1d87767
python3.pkgs.graphite_beacon: remove
Due to lack of maintenance.  It is not compatible with the default
Python version (due to the tornado 5) dependency, and doesn't look
like it will be any time soon.
2022-07-10 09:17:23 +00:00
github-actions[bot] ed2918e1af
Merge staging-next into staging 2022-07-09 18:01:55 +00:00
Dominique Martinet fd701a9cd1 logrotate: fix config check without sandbox
make logrotate not try to write to /var/lib/logrotate.status by
using an alternate path.

Also avoid /tmp and use build CWD

Fixes #180734
2022-07-09 09:55:03 +09:00
github-actions[bot] 5c6643bcdd
Merge staging-next into staging 2022-07-09 00:02:42 +00:00
Martino Fontana 5e84f7899e nixos/plasma5: expose qdbus in PATH 2022-07-08 23:33:19 +02:00
Martino Fontana 7a4e909905 nixos/plasma5: enable power-profiles-daemon by default 2022-07-08 23:32:51 +02:00
K900 512a26ae13
Merge pull request #177389 from K900/plasma-exclude-packages
nixos/plasma5: add excludePackages option
2022-07-08 21:33:35 +03:00
K900 03dd01dd2f nixos: add module for tempo
It's very barebones but should be OK for now.
2022-07-08 21:33:17 +03:00
Jan Tojnar 819fe6a918 Merge branch 'staging-next' into staging
; Conflicts:
;	pkgs/data/icons/papirus-icon-theme/default.nix
2022-07-08 20:21:39 +02:00
Peder Bergebakken Sundt 50dd61a9ba nixos/polaris: init 2022-07-08 12:27:48 -04:00
Sandro Jäckel 90761632ae
nixos/hydra: use runuser like hydra flake 2022-07-07 22:37:51 +02:00
Jan Tojnar e374cc2aad
Merge pull request #179736 from jansol/pipewire
pipewire: 0.3.52 -> 0.3.54
2022-07-07 20:48:51 +02:00
Jan Solanti 844f03a9dd pipewire: 0.3.53 -> 0.3.54 2022-07-07 19:26:26 +03:00
Sandro de9a1f4e81
Merge pull request #180039 from astro/openwebrx 2022-07-07 14:48:48 +02:00
Astro 10565fccde m17-cxx-demod: init at 2.3, add to nixos/openwebrx 2022-07-07 00:41:30 +02:00
ajs124 2837f807c9
Merge pull request #180066 from helsinki-systems/rem/nodejs-12_x
nodejs-12_x: remove
2022-07-06 23:09:28 +02:00
stuebinm 3fbc2a433d services/nextcloud: impossible error message 2022-07-06 11:57:44 +02:00
Kevin Cox 0b257763d2
Merge pull request #180135 from kevincox/redis-save
nixos.redis: Fix disabling of RDB persistence.
2022-07-05 20:58:27 -04:00
stuebinm 5f4d5fcfa4 services/nextcloud: apply suggestions 2022-07-06 00:16:04 +02:00
stuebinm dd9200c0a4 services/nextcloud: fix a bug 2022-07-06 00:05:31 +02:00
Maximilian Bosch 9f12b04a0f
Merge pull request #180265 from Ma27/bump-privacyidea
privacyidea: 3.7.1 -> 3.7.2
2022-07-05 22:48:50 +02:00
Robin Gloster ab6c8fcdc5
Merge pull request #180159 from mayflower/upstream-mailman-ldap
nixos/mailman: LDAP integration
2022-07-05 22:14:37 +02:00
Maximilian Bosch 000d72eb7f
nixos/privacyidea: pin python to 3.9
Otherwise `pi-manage` doesn't work inside the Python env (which is 3.10
whereas privacyidea requires 3.9).

Failing Hydra build: https://hydra.nixos.org/build/182734928
2022-07-05 19:38:54 +02:00
Kevin Cox 568d2e77f4
nixos.redis: Fix disabling of RDB persistence.
I was under the impression that setting `services.redis.servers.<name>.save = []` would disable RDB persistence as no schedule would mean no persistence. However since the code did not handle this case specially it actually results in no `save` setting being written and the internal Redis default is used.

This patch handles the empty case to disable RDB persistence.

Disabling RDB persistence is useful in a number of scenarios:

1. Using Redis in a pure-cache mode where persistence is not desired.
2. When using the (generally superior) AOF persistence mode this file is never read so there is little point to writing it.
3. When saving is handled manually

For more information see https://redis.io/docs/manual/persistence/

This is a breaking change as the user may have been relying on `[]` using Redis defaults. However I believe that updating the behaviour for the next release is beneficial as IMHO it is less surprising and does what the user would expect. I have added release notes to warn about this change.
2022-07-05 07:37:38 -04:00
Martin Weinelt 9082cc6ba0
Merge pull request #174219 from PhilippWoelfel/fix/nixos/calibre-web
nixos/calibre-web: Add quotes to test for calibre library
2022-07-05 12:07:47 +02:00
Jörg Thalheim 826c20dcae
nixos/vault: add option to start in dev mode. (#180114)
* nixos/vault: add option to start in dev mode.

This is not only useful for nixos tests i.e. when testing vault agent
setups but also when playing around with vault in local setups. In our
tests we can now make use of this option to test more vault features.
i.e. adding this feature has uncovered the need for a `StateDirectory`.

* Update nixos/modules/services/security/vault.nix

Co-authored-by: Robert Hensing <roberth@users.noreply.github.com>

Co-authored-by: Jonas Chevalier <zimbatm@zimbatm.com>
Co-authored-by: Robert Hensing <roberth@users.noreply.github.com>
2022-07-05 10:54:11 +02:00
Maximilian Bosch 6a5b1bc0a3
nixos/mailman: strip trailing \n when reading the secret 2022-07-04 21:15:56 +02:00
Maximilian Bosch dd4b6b81fa
nixos/mailman: implement LDAP support for postorius 2022-07-04 21:15:53 +02:00
Luflosi 320e4dbcc3
nixos/nginx: fix broken listenAddresses example
When using the example without the square brackets, nginx fails to start:
```
nginx-pre-start: nginx: [emerg] invalid port in "::1:80" of the "listen" directive in /nix/store/xyz-nginx.conf:29
nginx-pre-start: nginx: configuration file /nix/store/xyz-nginx.conf test failed
```
2022-07-04 19:46:18 +02:00
WilliButz e2a322b3cd
nixos/gitlab: fix registry.issuer setting
Prior to this change, the configuration value for
`services.gitlab.registry.issuer` was only referenced by the
docker-registry configuration and in the `gitlab-registry-cert` service
while the gitlab config used the hard-coded value "gitlab-issuer".
2022-07-04 19:31:16 +02:00
WilliButz fbaae54932
Merge pull request #170947 from dpausp/gitlab-registry-cert-fix-path-condition
nixos/gitlab: fix gitlab-registry-cert path condition
2022-07-04 18:39:42 +02:00
Maximilian Bosch 4f2a86a43a
Merge pull request #178858 from Ma27/matrix-docs
nixos/matrix-synapse: update docs
2022-07-04 16:56:27 +02:00
ajs124 1c0cc017b5 nixos/cryptpad: remove 2022-07-04 15:33:59 +02:00
Astro 242090860a nixos/openwebrx: add codec2, js8call 2022-07-04 15:06:10 +02:00
Jörg Thalheim d09303b31d
Update nixos/modules/services/misc/jellyfin.nix 2022-07-04 13:25:43 +01:00
Maximilian Bosch 899a37d190
nixos/matrix-synapse: update docs
* Update attribute names in code examples (* -> settings.*).
* Use `nix-shell -p` rather than `nix run` because the example won't
  work with the current default Nix.
* Update config values for `element-web`.
* Fix link to `element-web` security considerations.
* Make the synapse expression even smaller and use callout-lists to
  explain the code.
* Document how to correctly deploy the shared registration secret.

[1] https://spec.matrix.org/latest/client-server-api/#getwell-knownmatrixclient
2022-07-04 12:13:57 +02:00
Erik Arvstedt 3f54dfa475
treewide: fix bash exit handlers
Transform exit handlers of the form
trap cleanup EXIT [INT] [TERM] [QUIT] [HUP] [ERR]
  (where cleanup is idempotent)
to
trap cleanup EXIT

This fixes a common bash antipattern.

Each of the above signals causes the script to exit. For each signal,
bash first handles the signal by running `cleanup` and then runs
`cleanup` again when handling EXIT.
(Exception:  `vscode/*` prevents the second run of `cleanup` by removing
the trap in cleanup`).

Simplify the cleanup logic by just trapping exit, which is always run
when the script exits due to any of the above signals.

Note: In case of borgbackup, the exit handler is not idempotent, but just
trapping EXIT guarantees that it's only run once.
2022-07-02 16:13:12 +02:00
James Hannah c6e76ab7c9 nixos/radvd: add package option
Allow package users to override the package for radvd.
2022-07-01 21:11:46 +02:00
Silvan Mosberger 9b68a413da
Merge pull request #179796 from klemensn/desktop-manager-literal-newline
nixos/desktop-manager: Use literal newline to fix shell syntax
2022-07-01 20:32:00 +02:00
7c6f434c 8d002d4a47
Merge pull request #179442 from alyssais/dictd
nixos/dictd: make dict use local server
2022-07-01 16:52:54 +00:00
7c6f434c 95d4ce2175
Merge pull request #164048 from hqurve/jupyter-extra-paths
Jupyter kernel: link extra paths and fix missing docs in sagemath jupyter
2022-07-01 16:43:02 +00:00
Klemens Nanni 987400b848 nixos/desktop-manager: Use literal newline to fix shell syntax
Running `nixos/tests/keepassxc.nix` shows:
```
machine # [   18.705390] xsession[985]: /nix/store/2g2jx5c6x3p152wbiijr0rmky7byqivc-xsession: line 13: nn: command not found
```

This garbled bash script runs without `set -o errexit` and thus skips
"\n\n" as invalid command:
```
$ cat -n /nix/store/2g2jx5c6x3p152wbiijr0rmky7byqivc-xsession
...
\n\n
            if [ -e $HOME/.background-image ]; then
              /nix/store/wq1d1ph8wj4alpx78akvpbd0a0m9qkd1-feh-3.8/bin/feh --bg-scale  $HOME/.background-image
            fi
...
```

KeePassXC uses it through
`nixos/modules/services/x11/display-managers/default.nix`:
```
...
        # Script responsible for starting the window manager and the desktop manager.
        xsession = dm: wm: pkgs.writeScript "xsession" ''
          #! ${pkgs.bash}/bin/bash

          # Legacy session script used to construct .desktop files from
          # `services.xserver.displayManager.session` entries. Called from
          # `sessionWrapper`.

          # Start the window manager.
          ${wm.start}

          # Start the desktop manager.
          ${dm.start}
...
        '';
...
```

The bogus line was introduced in PR #160752:
```
commit 0bc0dc8090
Author: Shaw Vrana <shaw@vranix.com>
Date:   Fri Feb 18 11:27:42 2022 -0800

    desktop manager script: start properly

    Adds a missing line feed when X is enabled to the start script name
    and the appended if check. Resolves #160735
```

I have not tried to reproduce the original issue and thus don't know
why "\n\n" apparently gets interpreted fine in one place but remains
literal the `xsession` case.

However, using a literal newline must be valid for all cases and
certainly fixes the warning seen in KeePassXC tests.

Furthermore, starting the nix string (`''`) with a newline as usual also
fixes its overall indentation.
2022-07-01 16:30:47 +04:00
Sandro 911a73340c
Merge pull request #175335 from wyndon/init-lokinet 2022-07-01 11:54:38 +02:00
bb2020 7113eb5574 nixos/minidlna: convert to structural settings 2022-07-01 11:05:38 +03:00
bb2020 449d6ce32b nixos/minidlna: add more configuration options 2022-07-01 11:05:38 +03:00
stuebinm c3e03d1199
Merge branch 'master' into nextcloud-secrets 2022-06-30 22:24:44 +02:00
stuebinm ef75aab612 services/nextcloud: more consistent code 2022-06-30 22:21:43 +02:00
ckie a8c2879f43
Merge pull request #179425 from McSinyx/phylactery
phylactery: init at 0.1.1
2022-06-30 18:29:19 +03:00
Domen Kožar 989565d676 cachix-agent: expose verbose option 2022-06-30 09:56:28 -05:00
wyndon 69e1e00ebb
nixos/lokinet: init 2022-06-30 16:01:50 +02:00
Nguyễn Gia Phong f5f338c846
nixos/phylactery: init 2022-06-30 22:50:08 +09:00
José Romildo Malaquias f72be3af76
Merge pull request #179220 from romildo/fix.xfconf
nixos/xfconf: init
2022-06-30 07:39:27 -03:00
Domen Kožar 5a14883a5f
Merge pull request #179634 from domenkozar/cachix-agent-avoid-restarts
cachix-agent: properly handle not restarting the service
2022-06-29 17:37:00 -05:00
Domen Kožar c7b135ac8e cachix-agent: properly handle not restarting the service 2022-06-29 17:17:35 -05:00
Sandro a59be4f6c8
Merge pull request #175919 from phaer/phaer-healthchecks
healthchecks: init at 2.2.1
2022-06-29 23:15:35 +02:00
Kai Wohlfahrt 60d1c1d9ad openldap: change runtime directory
Use `openldap` for consistency between `/var/lib` and `/run`.
2022-06-29 19:59:29 +02:00
Kai Wohlfahrt 334d622ec7 openldap: test starting with empty DB
This addresses the original concern behind #92544
2022-06-29 19:59:29 +02:00
Kai Wohlfahrt 8a7193fc0a openldap: test and fix mutable config 2022-06-29 19:59:29 +02:00
Kai Wohlfahrt fd7d901133 openldap: run under systemd-defined user/group
This improves security, by starting the service as an unprivileged user,
rather than starting as root and relying on the service to drop
privileges. This requires a significant cleanup of pre-init scripts, to
make use of StateDirectory and RuntimeDirectory for permissions.
2022-06-29 19:59:29 +02:00
Kai Wohlfahrt 38ead944ce openldap: run in foreground
Now that we use notify daemon type, this works safely and simplifies
configuration.
2022-06-29 19:59:29 +02:00
Kai Wohlfahrt d72f89a8fc openldap: Allow notify outside of main thread
This fixes a bug I observed in deployment on a RPi, but not able to
reproduce in tests.
2022-06-29 19:59:28 +02:00
Kai Wohlfahrt 6e6f33ad83 openldap: remove deprecated options 2022-06-29 19:59:06 +02:00
Lin Jian d1b90cf540
nixos/caddy: force caddy to reload config in ExecReload
This patch follows an upstream commit[1].

Before this patch, if acme module is used, caddy will still use an old
cert even a new one is available. The cause is that without --force
flag, caddy will not reload an unchanged config.

Refer to that commit[1] message for more information.

[1]: 979e498d6d
2022-06-29 10:36:24 +08:00
ajs124 aea940da63 nixos/jitsi-meet: move prosodyctl calls into prosody preStart 2022-06-29 00:19:57 +02:00
Lin Jian f7baa65db7
nixos/caddy: improve security about acme certs
Before this patch, the caddy process has acme in its supplementary
group because of the SupplementaryGroups in its service config, which
may give it more permission than needed, is inconsistent with the
documentation of services.caddy.virtualHosts.<name>.useACMEHost and is
redundant since we have mkCertOwnershipAssertion in assertions.

This patch fixes these problems by defaulting the group of needed
certs to caddy, which is what other web servers like nginx do and
deleting SupplementaryGroups config.
2022-06-29 05:41:13 +08:00
Artturi 3cff3f75b4
Merge pull request #166340 from max-privatevoid/patch-6 2022-06-28 19:55:10 +03:00
Alyssa Ross 4684ff771e
nixos/dictd: make dict use local server
Seems silly to install this for use with the local server, but to not
configure it to use the local server.  Otherwise, out of the box we
just get an error about no server being configured.
2022-06-28 12:22:45 +00:00
Sandro 6dce91f57b
Merge pull request #178336 from astro/openwebrx 2022-06-28 11:36:27 +02:00
phaer 12d45dc313 healthchecks: init at 2.2.1 2022-06-28 10:28:46 +02:00
happysalada b90fa9940b dgraph: add module 2022-06-28 02:34:54 -04:00
Astro 9123ed5f36 openwebrx: 1.1.0 -> 1.2.0 2022-06-28 00:46:32 +02:00
Pascal Bach 13df7151e1
Merge pull request #178783 from greizgh/fix-syncthing-doc
nixos/syncthing: fix services.syncthing.folders description
2022-06-27 22:37:56 +02:00
Kim Lindberger 8b404a1617
Merge pull request #177783 from talyz/parsedmarc-secrets
parsedmarc, geoipupdate: Improve secrets handling and more
2022-06-27 15:26:10 +02:00
Maximilian Bosch ec5b885d95
Merge pull request #179236 from winterqt/nextcloud-improvements
nixos/nextcloud: some small improvements
2022-06-27 13:42:44 +02:00
Sandro 2cf13724e1
Merge pull request #168141 from mausch/radarr 2022-06-27 01:06:15 +02:00
Aaron Andersen e3e82b92e8
Merge pull request #177106 from martinetd/logrotate
logrotate: do not add mail if 'mail = false' is specified
2022-06-26 23:39:38 +02:00
Aaron Andersen bf5781e639
Merge pull request #151642 from antifuchs/fix-151550
navidrome: Allow read access to /etc
2022-06-26 23:32:18 +02:00
Aaron Andersen 28562b800e
Merge pull request #178154 from aanderse/nixos/prosody
nixos/prosody: conditionally provision required directories with StateDirectory
2022-06-26 22:45:18 +02:00
Winter d6f59779c6 nixos/nextcloud: remove extraneous nginx config directive 2022-06-26 14:30:59 -04:00
Winter e54ddddd2a nixos/nextcloud: make all services run after nextcloud-setup 2022-06-26 14:29:59 -04:00
Winter 6be3ce36b6 nixos/nextcloud: use mkOption.default for datadir 2022-06-26 14:27:03 -04:00
José Romildo d18aeb6351 nixos/xfconf: init
- Add a module for xfconf, the Xfce configuration storage system.
2022-06-26 14:29:01 -03:00
Erik Arvstedt 1a32663efc
treewide: rename maintainer earvstedt -> erikarvstedt
The maintainer name now matches the Github username, which simplifies
maintainer notifications.
2022-06-26 19:12:18 +02:00
Lassulus ea532fe833
Merge pull request #179168 from yayayayaka/revert-177536-hedgedoc-fix-statedirectory 2022-06-26 19:05:04 +02:00
José Romildo bb5ec4625a nixos/thunar: init
- Add a module for the thunar file manager, which depends on the xfconf dbus service, and also has a dbus service and a systemd unit.

- Renames the option services.xserver.desktopManager.xfce.thunarPlugins to programs.thunar.plugins.
2022-06-26 12:22:07 -03:00
Yaya 57617daaff
Revert "nixos/hedgedoc: Do not set StateDirectory to an absolute path" 2022-06-26 12:06:36 +02:00
Bernardo Meurer 83801da137
Merge pull request #176979 from winterqt/nginx-per-location-recommended-proxy-settings
nixos/nginx: allow recommended proxy settings to be enabled per location
2022-06-25 23:48:29 -07:00
piegames aa3641fa90
Merge pull request #178838 from mweinelt/matrix-appservice-irc
nixos/matrix-appservice-irc: wait for postgres to start
2022-06-25 23:09:36 +02:00
Thomas Depierre fc658c86f7 riak, nixos/riak: remove
Riak have been updated a lot since the version 2.2 (now 3.0.10) but
has seen no updated to the package. This is at this point
a problem forcing us to maintain old versions of erlang.

We would be happy to re accept a newer version of Riak if someone want
to spend the time to set it up.
2022-06-25 15:51:18 -04:00
Kim Lindberger 5710bac2b4
nixos/gitlab: Use Git 2.35.x to work around git bug (#177776)
Git 2.36.1 seemingly contains a commit-graph related bug which is
easily triggered through GitLab, so let's downgrade it to 2.35.x until
this issue is solved. See
https://gitlab.com/gitlab-org/gitlab/-/issues/360783#note_992870101.
2022-06-25 21:22:53 +02:00
Thiago Kenji Okada 66e8dceabc
Merge pull request #167907 from Misterio77/argonone-module
nixos/argonone: init
2022-06-25 10:48:22 +01:00
Gabriel Fontes 17fc78ea58
nixos/argonone: init 2022-06-24 21:20:32 -03:00
ajs124 5c39c81260
Merge pull request #176702 from Mic92/tt-rss
tt-rss: downgrade to php 8.0
2022-06-25 00:29:11 +02:00
Martin Weinelt a24431e56f
Merge pull request #162808 from mweinelt/schleuder
schleuder: init
2022-06-24 21:38:22 +02:00
Linus Heckemann 1dabedae3e nixos/schleuder: init module and accompanying test
Co-Authored-By: Martin Weinelt <hexa@darmstadt.ccc.de>
Co-Authored-By: Cole Helbling <cole.helbling@determinate.systems>
2022-06-24 15:30:16 -04:00
Sandro 74ea995b11
Merge pull request #174446 from jsimonetti/routedns-init
routedns: init at 0.1.5
2022-06-24 16:31:03 +02:00
Martin Weinelt 6c1f44b3f1
nixos/matrix-appservice-irc: wait for postgres to start
Closes: #178692
2022-06-24 08:37:43 +02:00
Lassulus 8c2e25e98e
Merge pull request #177081 from azahi/trickster
trickster: 0.1.10 -> 1.1.5
2022-06-23 22:24:54 +02:00
Greizgh ac1e34f0fe
nixos/syncthing: fix services.syncthing.folders description
It was improperly referencing overrideDevices instead of overrideFolders.
2022-06-23 20:44:59 +02:00
Bernardo Meurer 5332bc174a
Merge pull request #178483 from twitchyliquid64/tailscale-networkd
tailscale: ignore tailscale link when using networkd
2022-06-23 12:10:14 -04:00
pennae db0dcf15c6
Merge pull request #177379 from hercules-ci/markdown-cassandra
nixos/cassandra: Convert option docs to markdown
2022-06-23 08:43:35 +00:00
ajs124 6c189d264e
Merge pull request #177077 from Lassulus/bitlbee_cfgdir
nixos/bitlbee: allow writing to configDir
2022-06-22 19:27:59 +02:00
Martin Weinelt b15badc6c9
Merge pull request #151241 from andir/hass-reload-on-config-changes 2022-06-22 17:20:43 +02:00
Andreas Rammhold cfbcf381c2
nixos/home-assistant: reload the daemon when configuration changed
Reload the service when configuration changes. This means that we don't
have a potentially slow startup for every small configuration change.
2022-06-22 16:20:11 +02:00
Lassulus 5308b5b44a
Merge pull request #178194 from spacekitteh/patch-35
xpra: Add the ability to perform a start-desktop
2022-06-22 14:41:15 +02:00
Naïm Favier 4af5c46faa
nixos/dhcpcd: use networking.resolvconf.package
Allow using the appropriate resolver implementation to set DNS entries
(typically systemd-resolved instead of openresolv).
2022-06-21 22:58:44 +02:00
Naïm Favier 953a5bd3dd
nixos/tailscale: use networking.resolvconf.package
Allow using the appropriate resolver implementation to set DNS entries
(typically systemd-resolved instead of openresolv).
2022-06-21 22:58:44 +02:00
Naïm Favier 458ac47a1d
nixos/wg-quick: improve usage with systemd-networkd
Use `networking.resolvconf.package` to allow DNS entries to be set using
the system-wide resolver implementation instead of hardcoding systemd or
openresolv.

Extend the tests by adding DNS entries and making one of the peers use
systemd-networkd (hence systemd-resolved).

Also add a few `networkd`-specific settings.
2022-06-21 22:58:44 +02:00
Tom 3b8a162680 tailscale: ignore tailscale link when using networkd 2022-06-21 13:23:28 -07:00
Robert Hensing fe11145ec9 nixos/cassandra: Convert option docs to markdown 2022-06-21 13:20:13 +02:00
Robert Hensing e2c261f2c0
Merge pull request #176146 from pennae/module-docs-markdown
treewide: markdown option docs
2022-06-21 13:16:02 +02:00
Maximilian Bosch 5ab65d9cd1 nixos/prometheus-postfix-exporter: fixes for systemd integration
* Allow the service to read from the journal w/systemd.enable
* Ensure that the service is started after postfix.service
2022-06-20 19:30:59 +02:00
Lassulus eb013128da
Merge pull request #178195 from dnr/pipewire-systemwide
nixos/pipewire: fix wireplumber with system-wide
2022-06-19 12:42:37 +02:00
Florian Klink 5f297c164e nixos/grafana-agent: add myself as maintainer 2022-06-19 11:50:32 +02:00
Florian Klink b09836593e nixos/grafana-agent: move remote write config from integrations.prometheus_remote_write to metrics.global.remote_write
remote_write config in integrations.prometheus_remote_write is only
applied for integrations, so static configurations won't get written
anywhere.
2022-06-19 11:50:32 +02:00
Florian Klink e578b4d3ed nixos/grafana-agent: drop server.{grpc,http}_listen_address,http_listen_port
According to https://grafana.com/docs/agent/latest/upgrade-guide/#v0240,
this has been deprecated/moved to -server.http.address and
-server.grpc.address (accepting ip and port) config options in v0.24.0,
and already listens on localhost and not port 80 by default.
2022-06-19 11:50:31 +02:00
Florian Klink 2cca676e69 nixos/grafana-agent: replace settings.prometheus with settings.metrics
According to https://github.com/grafana/agent/pull/1540, -prometheus.*
flages were deprecated in 0.19.0 in favor of the -metrics.*
counterparts. Same applies to `loki` being renamed to `logs`.

I'm not sure if the config file format is still supported (it could be),
but we shouldn't use deprecated configs.
2022-06-19 11:50:31 +02:00
Sophie Taylor 62494281d8
xpra: fix whitespace 2022-06-19 18:26:10 +10:00
Jörg Thalheim 96b227697f
Merge pull request #177785 from Mic92/navidrome
nixos/navidrome: fixes missing ssl certficates
2022-06-19 07:07:41 +01:00
David Reiss 33163bd0ef nixos/pipewire: fix wireplumber with system-wide 2022-06-18 18:46:41 -07:00
Sophie Taylor f13c61a3b9
xpra: Add the ability to perform a start-desktop 2022-06-19 11:40:41 +10:00
Jörg Thalheim 4258952dc6
nixos/jellyfin: sync up with hardening provided in upstream 2022-06-18 17:09:31 +02:00
Aaron Andersen 078a53824e nixos/prosody: provide additional details in the user and group options description 2022-06-18 10:08:08 -04:00
Aaron Andersen 79bfd3c0d0 nixos/prosody: conditionally provision required directories with StateDirectory 2022-06-18 10:05:15 -04:00
Kevin Cox b2537dc430
Merge pull request #177561 from max-privatevoid/ipfs-dont-leak-config
nixos/ipfs: do not leak config to journal on startup
2022-06-17 19:37:33 -04:00
Max 2a8bf9777d nixos/ipfs: do not leak config to journal on startup
The preStart script for the IPFS service will print parts of the configuration
to stdout (and therefore, the journal) when applying profiles on startup. This
may lead to unwanted disclosure of private information, such as remote pinning
service API keys. Fix by sending stdout to /dev/null.
2022-06-17 23:41:27 +02:00
Sandro 0e6db671a0
Merge pull request #178009 from bbenno/update-gollum
gollum: 5.2.3 -> 5.3.0
2022-06-17 21:08:57 +02:00
Benno Bielmeier be0e2db8b9 nixos/gollum: add option local-time
This feature was introduced in gollum v5.3.0
2022-06-17 12:50:47 +02:00
Benno Bielmeier 9434ac0963 nixos/gollum: improve description of user-icons option 2022-06-17 12:50:13 +02:00
Jörg Thalheim 5d54641d7f
Merge pull request #177790 from superherointj/package-k3s-1.24.1+k3s1
k3s: 1.23.6+k3s1 -> 1.24.1+k3s1
2022-06-17 08:38:10 +01:00
talyz 858a0c3fa6
nixos/parsedmarc: Improve secret handling
Make secret replacement more robust and futureproof:

- Allow any attribute in `services.parsedmarc.settings` to be a
  secret if set to `{ _secret = "/path/to/secret"; }`.

- Hash secret file paths before using them as a placeholders in the
  config file to minimize the risk of conflicting file paths being
  replaced instead.
2022-06-16 13:58:20 +02:00
Lily Foster b5818b7a30 nixos/pipewire: only add pipewire-pulse.conf conditionally 2022-06-15 15:05:44 -07:00
Lily Foster 1e3747b98b nixos/pipewire: add pkgs.pulseaudio to pipewire-pulse user unit path 2022-06-15 15:05:44 -07:00
superherointj a6a0c44760 k3s: remove docker support 2022-06-15 16:40:29 -03:00
Jörg Thalheim c772b13ee7 nixos/navidrome: fixes missing ssl certficates 2022-06-15 20:40:07 +02:00
talyz 32e057881a
nixos/parsedmarc: Remove kafka support
It's broken (see https://github.com/domainaware/parsedmarc/issues/243)
and providing settings for it is therefore misleading.
2022-06-15 20:15:09 +02:00
talyz 6686a3115c
nixos/parsedmarc: Fix compatibility with recent versions of grafana 2022-06-15 20:15:03 +02:00
talyz 4dddca8240
nixos/geoipupdate: Improve secret handling
Make secret replacement more robust and futureproof:

- Allow any attribute in `services.geoipupdate.settings` to be a
  secret if set to `{ _secret = "/path/to/secret"; }`.

- Hash the license key path before using it as a placeholder in the
  config file to minimize the risk of conflicting file paths being
  replaced instead.
2022-06-15 20:14:57 +02:00
talyz 23c15323ce
nixos/geoipupdate: Add error handling to scripts 2022-06-15 17:18:50 +02:00
zimbatm 31b47913f3
nixos: add grafana-agent module
Easily ship logs and metrics to Grafana Cloud and other similar targets.
2022-06-15 12:59:06 +02:00
Bobby Rong 6d1779c567
Merge pull request #175620 from bobby285271/nixos-pantheon
nixos/pantheon: make it possible to remove core packages
2022-06-15 18:49:37 +08:00
Lassulus a632afba6d
Merge pull request #177536 from yayayayaka/hedgedoc-fix-statedirectory
nixos/hedgedoc: Do not set StateDirectory to an absolute path
2022-06-15 11:25:04 +02:00
M. A becff58579 nixos/hedgedoc: Do not set StateDirectory to an absolute path
Commit 8109d8a set the `StateDirectory=` option of the systemd service
configuration to the value of `cfg.workDir` which is wrong, according
to dasJ [1]. This commit resolves this issue by stripping the
`/var/lib/` prefix from `cfg.workDir`.

[1] https://github.com/NixOS/nixpkgs/pull/172824#issuecomment-1130350412
2022-06-15 08:58:52 +00:00
Andreas c028f5569b kcheckpass is gone(?) 2022-06-15 14:53:40 +08:00
Jeroen Simonetti 829167bd27
nixos/routedns: init
Signed-off-by: Jeroen Simonetti <jeroen@simonetti.nl>
2022-06-15 08:33:46 +02:00
Niklas Hambüchen 0652ef9a64
Merge pull request #176903 from nh2/vaultwarden-service-better-example
nixos/vaultwarden: Make example more detailed.
2022-06-15 01:21:40 +02:00
Azat Bahawi 82497b0e9f
trickster: 0.1.10 -> 1.1.5 2022-06-14 01:51:45 +03:00
Jared Baur f880ea69ba
nixos/globalprotect: add settings option for service configuration 2022-06-13 15:29:41 -07:00
Benjamin Asbach 6b913c40f0 gitea: bugfix: add check for empty file for secrets
There are some cases were the files are present but not filled with secrets. In these cases the service fails to startup.

This fixes #175967
2022-06-14 01:09:14 +03:00
Léo Gaspard 02cd48717d
nixos/openldap: fix systemd rejecting notification (#177084)
On one of the two machines I have running openldap, openldap failed to start due to a "timeout". Increasing the allowed startup delay didn't help.

I noticed the following in logs:
```
openldap.service: Got notification message from PID 5224, but reception only permitted for main PID 5223
```

It turns out that on this machine at least, openldap apparently sends the notification from a non-main process, which means that we need this NotifyAccess setting for systemd to record that it successfully started. Without it, after 30 seconds systemd kills the process because it didn't receive the sd_notify call.

Somehow the other machine I have on nixos running ldap works fine even without this, but I could not figure out what changes the behavior.

Given that AFAIU NotifyAccess still restricts to "from the cgroup of the service", I think this change should be safe.
2022-06-13 15:28:12 +02:00
Maximilian Bosch 7f9a78e197
Merge pull request #175330 from jtojnar/grafana-uid
nixos/grafana: Allow setting UID for datasource
2022-06-13 07:01:19 +02:00
Maximilian Bosch 5203011e4e
Merge pull request #177430 from Ma27/fix-wireguard-exporter
nixos/prometheus-wireguard-exporter: fix broken options
2022-06-13 06:14:30 +02:00
Aaron Andersen 37b6b161e5
Merge pull request #177321 from rnhmjoj/pr-fix-mpd
mpd: fix socket activation
2022-06-12 22:26:53 -04:00
Dominique Martinet f878c8994f logrotate: do not add mail if 'mail = false' is specified
Reported-by: Ricardo M. Correia <rcorreia@wizy.org>
2022-06-13 08:57:49 +09:00
Winter 6c53004840 nixos/nginx: allow recommended proxy settings to be enabled per location 2022-06-12 19:52:35 -04:00
Maximilian Bosch e03d41fb6b
nixos/prometheus-wireguard-exporter: fix broken options
This is apparently a breaking change in a patch-level release[1] where
it's now necessary to specify values for each CLI argument.

[1] https://github.com/MindFlavor/prometheus_wireguard_exporter/releases/tag/3.6.1
2022-06-12 20:27:25 +02:00
Maximilian Bosch fd2a89b983
nixos/wpa_supplicant: don't log that wpa_supplicant.conf is ignored with allowAuxiliaryImperativeNetworks = true
The warning is wrong with `allowAuxiliaryImperativeNetworks`[1] being
set to `true` because both files are included in this case with `-c` and
`-I`.

[1] https://nixos.org/manual/nixos/stable/options.html#opt-networking.wireless.allowAuxiliaryImperativeNetworks
2022-06-12 17:07:36 +02:00
K900 6350d8d9b3 nixos/plasma5: add excludePackages option
This is a pretty straightforward port of #151005.
More things can probably be made optional, I've only added ones
that I'm confident in.
2022-06-12 14:39:59 +03:00
pennae 320aa2a791 treewide: attempt at markdown option docs 2022-06-12 12:44:38 +02:00
Bobby Rong 2375fac93d
nixos/pantheon: treat evince and file-roller as optional app 2022-06-12 13:12:15 +08:00
Bobby Rong 860781d909
nixos/pantheon: allow disabling pantheon-agent-geoclue2 2022-06-12 13:11:58 +08:00
Timothy DeHerrera ec4e23d4e9
Merge pull request #171155 from cab404/wg-quick-files
nixos/wg-quick: added support for configuration files
2022-06-11 22:00:45 -07:00
Bobby Rong 1097e3e80c
nixos/pantheon: make it possible to remove core packages 2022-06-12 11:39:05 +08:00
Bobby Rong c1559a07fe
nixos/pantheon: switch to xdg.icons.enable 2022-06-12 11:39:04 +08:00
Bobby Rong 9ca889d0fb
nixos/pantheon: switch to xdg.mime.enable 2022-06-12 11:39:01 +08:00
Jan Tojnar c397df20d1
Merge pull request #151005 from rhoriguchi/gnome
nixos/gnome: make it possible to remove core packages
2022-06-11 21:40:35 +02:00
rnhmjoj 7149c5cb60
mpd: fix socket activation
Apparently since systemd v250 a `ListenStream` in an override file won't
override the unit, but will be appended to a list of socket addresses.
The socket unit fails if two or more addresses have the same port,
probably because two systemd processes try to listen to it at once.
The solution is to add an empty `ListenStream=` to reset all previous
definitions.

Fix #175478.
2022-06-11 20:56:19 +02:00
Rick van Schijndel 5bc0350e7c
Merge pull request #177256 from rnhmjoj/pr-picom
nixos/picom: remove deprecated refreshRate option
2022-06-11 20:09:28 +02:00
Soham Sen feff6ddbe7 expressvpn: init at 3.25.0.13 2022-06-11 17:10:33 +05:30
rnhmjoj 26526f02ad
nixos/picom: remove deprecated refreshRate option
Fix #175765
2022-06-11 08:59:20 +02:00
piegames 4ebc288038
Merge #172819: nixos: move matrix services into their category 2022-06-10 10:54:18 +02:00
Elis Hirwing 7afff45088
Merge pull request #174555 from etu/php-drop-php74
php: Drop PHP 7.4
2022-06-10 10:43:31 +02:00
Martin Weinelt 7b3e907a6f
Merge pull request #176561 from K900/pipewire-create-home 2022-06-10 09:25:41 +02:00
lassulus a12e525410 nixos/bitlbee: allow writing to configDir 2022-06-09 21:05:16 +02:00
Domen Kožar f38fd46992 cachix-agent: set USER to please cachix 2022-06-09 17:07:28 +01:00
Ryan Horiguchi 42ceb20d29 nixos/gnome: make it possible to remove core packages
Co-Authored-By: Jan Tojnar <jtojnar@gmail.com>
2022-06-09 13:09:55 +02:00
Jan Tojnar ca23e42105 nixos/gnome: Move sessionPath to core-shell group
This will allow people to disable these packages.
2022-06-09 13:04:20 +02:00
Jan Tojnar 016b99dce6 nixos/gnome: drop hicolor-icon-theme
It is already installed by xdg.icons.enable.

Let’s also enable that option explicitly to prevent users from accidentally
disabling it since GNOME will be severely broken without it.
2022-06-09 13:04:20 +02:00
Jan Tojnar aad39fe41a nixos/gnome: drop shared-mime-info
It is already installed by xdg.mime.enable.

Let’s also enable that option explicitly to prevent users from accidentally
disabling it since GNOME will be severely broken without it.
2022-06-09 13:04:19 +02:00
Julien Moutinho 17c6f62503 nixos/sourcehut: some settings became mandatory upstream 2022-06-08 19:46:04 -04:00
Julien Moutinho f34d654860 nixos/sourcehut: increase RestartSec to better avoid degraded states 2022-06-08 19:46:04 -04:00
Julien Moutinho cd6808ba9f sourcehut: fix Unix socket support for Redis 2022-06-08 19:46:04 -04:00
Julien Moutinho 43b5dcd60c nixos/sourcehut: remove forgotten unused files 2022-06-08 19:46:04 -04:00
Julien Moutinho 876f3a8bf0 sourcehut.todosrht: 0.67.2 -> 0.71.0 2022-06-08 19:46:04 -04:00
Julien Moutinho bcb91bbeb7 sourcehut.metasrht: 0.57.5 -> 0.58.8 2022-06-08 19:46:04 -04:00
Julien Moutinho 59d8439966 sourcehut.listssrht: 0.51.7 -> 0.51.9 2022-06-08 19:46:04 -04:00
Julien Moutinho 658d8f1240 sourcehut.hgsrht: 0.29.4 -> 0.31.2 2022-06-08 19:46:04 -04:00
Julien Moutinho b57ed0fa1d sourcehut.gitsrht: 0.77.3 -> 0.78.18 2022-06-08 19:46:04 -04:00
Julien Moutinho 43f856ab2c sourcehut.buildsrht: 0.75.2 -> 0.79.1 2022-06-08 19:46:04 -04:00
Elis Hirwing da19e4ae97
nixos/snipe-it: Upgrade to PHP 8.1
They state that they support PHP 8.1:
https://snipe-it.readme.io/docs/requirements
2022-06-08 18:09:15 +02:00
Elis Hirwing d7f000b98b
nixos/moodle: Upgrade to PHP 8.1 2022-06-08 18:09:11 +02:00
Elis Hirwing d0862b0ed9
nixos/nextcloud: Upgrade to PHP 8.0 2022-06-08 18:09:07 +02:00
Elis Hirwing a69ba21a29
nixos/invoiceplan: Upgrade to PHP 8.1
They seem to be working to get PHP 8.1 support:
https://github.com/InvoicePlane/InvoicePlane/issues/798
2022-06-08 18:09:03 +02:00
Elis Hirwing f822b894c5
nixos/dokuwiki: Upgrade to PHP 8.1
They seem to run tests against 8.1 since this commit:
7aee97ee81
2022-06-08 18:08:59 +02:00
Elis Hirwing c53c34ee72
nixos/postfixadmin: Upgrade to PHP 8.1 2022-06-08 18:08:56 +02:00
Elis Hirwing 4580a63bc4
nixos/grocy: Upgrade to PHP 8.0 2022-06-08 18:08:52 +02:00
Niklas Hambüchen 5683c6e03b nixos/vaultwarden: Make example more detailed.
It took me a while to figure out how to correctly setup
vaultwarden on NixOS.
I hope that this more detailed example will help others.
2022-06-08 17:03:53 +02:00
Alyssa Ross c0b05f106f
nixos/localtime: add missing mkRenamedOptionModule
Fixes: ffae8569b0 ("nixos/localtimed: hopefully fix geoclue")
2022-06-08 13:46:26 +00:00
Martin Weinelt e0169d7a9d
Merge pull request #176558 from Artturin/bumpnofileinfinity 2022-06-08 12:03:01 +02:00
Sandro be96e24124
Merge pull request #163226 from lodi/persistent-evdev
persistent-evdev: init at unstable-2022-01-14
2022-06-07 23:46:13 +02:00
sohalt f1669775bc nixos/headscale: do not run gin webframework in debug mode 2022-06-07 23:22:05 +02:00
sohalt 18c899d963 nixos/headscale: only set oidc secret if not null 2022-06-07 23:21:13 +02:00
Ben Siraphob 033da0465f
Merge pull request #176418 from Yureien/init/dragonflydb
dragonflydb: init at 0.1.0
2022-06-07 14:02:26 -07:00
lodi 3f1ec25f90 persistent-evdev: init at unstable-2022-01-14 2022-06-07 13:20:52 -04:00
Daniel Poelzleithner e78c2d05da hedgedoc: ensure upload directory exists
Upload directory is not created when uploading, but will fail silently.
Ensure the upload directory is created.
2022-06-07 09:06:56 -05:00
Jörg Thalheim 70b31373b4
tt-rss: downgrade to php 8.0 2022-06-07 14:24:07 +02:00
happysalada f5ef819e24 mimir: switch pname to mimir 2022-06-07 06:53:15 -04:00
cab 8de1e9e2f8
nixos/wg-quick: added support for configuration files 2022-06-07 01:28:50 +04:00
Rick van Schijndel 3037752d1d
Merge pull request #175961 from helsinki-systems/rem/broken
remove some packages marked broken for over 1.5 years
2022-06-06 20:44:39 +02:00
Sebastien Bourdeauducq 6cecab9cd8 hydra: create runcommand-logs directory 2022-06-06 11:36:58 -07:00
Artturin c8f5b17a98 nixos/nix-daemon: set LimitNOFILE to 1048576
fixes 'too many open files'
2022-06-06 21:16:47 +03:00
K900 955d1a6dde pipewire: create home directory for the pipewire user when running systemwide
wireplumber wants to store state there
2022-06-06 18:06:38 +03:00
Sandro d8fad83d2c
Merge pull request #176133 from SuperSandro2000/asf-2 2022-06-06 14:34:44 +02:00
Nguyễn Gia Phong 22f3d4e4db
nixos: move matrix services into their category 2022-06-06 13:50:58 +09:00
Soham Sen 109e13db24 dragonflydb: init at 0.1.0 2022-06-06 04:05:48 +05:30
Emery Hemingway 2d012163f2 nixos/uhub: fix plugins, set CAP_NET_BIND_SERVICE
Fix generation of the plugins configuration and allow binding to
"privileged" ports.
2022-06-05 13:58:26 -05:00
Guillaume Girol 7548b71138
Merge pull request #171778 from zhaofengli/infnoise-0.3.2
infnoise: unstable-2019-08-12 -> 0.3.2, nixos/infnoise: init
2022-06-05 17:30:34 +00:00
Anders Kaseorg b362ef4eff pipewire: Never set an empty LD_LIBRARY_PATH
An empty LD_LIBRARY_PATH may confuse some applications into appending
:, creating an empty segment that insecurely refers to the current
directory, not the absence of directories.

Signed-off-by: Anders Kaseorg <andersk@mit.edu>
2022-06-05 13:34:35 +02:00
Wout Mertens 949e1e5277
Merge pull request #176075 from NixOS/netdata-poststart
netdata: started when service can be pinged
2022-06-05 13:10:37 +02:00
pennae 4a9708930d
Merge pull request #176116 from pennae/unifi-remove-deprecated
nixos/unifi: change deprecated default for openFirewall
2022-06-04 20:52:34 +00:00
lom 0df7cba1b0 nixos/asf: ipcPasswordFile use nullOr 2022-06-04 12:00:45 -06:00
Sandro Jäckel 032f15e566
nixos/asf: add me as maintainer 2022-06-03 18:52:48 +02:00
Sandro Jäckel d8cd684b62
nixos/asf: restart when self restarting 2022-06-03 18:52:47 +02:00
Sandro Jäckel 4de6a81193
nixos/asf: fix state directory permissions, for real 2022-06-03 18:52:47 +02:00
Sandro Jäckel 28379c3a51
Revert "nixos/asf: set restrictive home permissions"
This reverts commit 16f28933e7.
2022-06-03 18:52:46 +02:00
Thiago Kenji Okada 44b5c8b6a7
Merge pull request #175965 from otavio/topic/nixos-restic
Add new restic options for NixOS module
2022-06-03 16:19:55 +01:00
Otavio Salvador d9e3b1fafe nixos/restic: add backup{Prepare,Cleanup}Command options
The backupPrepareCommand and backupCleanupCommand options offer a way to
run a script to prepare for backup and then cleanup it once finish.

Signed-off-by: Otavio Salvador <otavio@ossystems.com.br>
2022-06-03 11:22:22 -03:00
Otavio Salvador deae887c5a nixos/restic: add new repositoryFile option
Allow providing the repository as a file, useful when we don't want it
being stored in the Git repository as plain text.

Signed-off-by: Otavio Salvador <otavio@ossystems.com.br>
2022-06-03 11:21:37 -03:00
pennae e21c4d67d5 nixos/unifi: change deprecated default for openFirewall
this was deprecated 6 months ago in unstable for removal in 22.11,
so now seems like a good point to change the default.
2022-06-03 15:59:41 +02:00
Sandro c09782950f
Merge pull request #176030 from SuperSandro2000/asf 2022-06-03 12:12:23 +02:00
Sandro Jäckel e438fad5e9
nixos/asf: format 2022-06-03 11:41:40 +02:00
Sandro Jäckel 17ec7e4401
nixos/asf: remove subdirectories from bot config 2022-06-03 11:41:38 +02:00
Sandro Jäckel 16f28933e7
nixos/asf: set restrictive home permissions 2022-06-03 11:41:37 +02:00
Sandro Jäckel 48b21f661c
nixos/asf: add ipcPasswordFile option, only delete bot configs when managed by nixos, make preStart clearer 2022-06-03 11:41:36 +02:00
Wout Mertens 7f025e2b34
netdata: started when service can be pinged 2022-06-03 10:45:27 +02:00
Otavio Salvador 082a4184ec nixos/restic: reformat
Apply nixpkgs-fmt on file prior doing changes.

Signed-off-by: Otavio Salvador <otavio@ossystems.com.br>
2022-06-02 16:48:43 -03:00
Rick van Schijndel d93d4a5820
Merge pull request #175872 from uninsane/colinsane/phosh-phoc-scale
phosh: allow fractional scaling
2022-06-02 20:54:41 +02:00
Lassulus 8cea5e2fa1
Merge pull request #173664 from Izorkin/peertube-redis-server
nixos/peertube: use redis.servers
2022-06-02 20:26:29 +02:00
ajs124 5bb61d6a25 syslogng_incubator: remove after being marked broken for over 18 months
It was marked in commit 6d797c8462 by Jörg Thalheim on 2018-08-27 (commited on 2018-08-27)
2022-06-02 18:03:52 +02:00
colin 1d0649f929 phosh: restrict the scale config value to strictly positive values or null 2022-06-02 01:46:08 -07:00
colin cabf369f83 phosh: allow fractional scaling 2022-06-01 15:44:12 -07:00
Bernardo Meurer ffae8569b0 nixos/localtimed: hopefully fix geoclue 2022-06-01 13:20:16 -07:00
Martin Weinelt 5a188dfbca
Merge pull request #175729 from DeterminateSystems/jellyfin-fix 2022-06-01 17:19:49 +02:00
Linus Heckemann 7eab23d517 jellyfin: fix permissions on state directory
Previously, all configuration and state data was accessible to all
users on the system running jellyfin. This included user passwords in
the Jellyfin database, as well as credentials for LDAP if configured.
The exact set of accessible data depends on system configuration.

Thanks to Sofie Finnes Øvrelid for reporting this issue.

Fixes: CVE-2022-32198

Co-Authored-By: Martin Weinelt <hexa@darmstadt.ccc.de>
2022-06-01 12:31:23 +02:00
Aaron Andersen 18a07645e5
Merge pull request #174959 from MoritzBoehme/openconnect-auto-start
nixos/openconnect: add autoStart option
2022-05-31 23:05:25 -04:00
Martin Weinelt 02e44ee3be
Merge pull request #174804 from dotlambda/prometheus-dmarc-exporter-no-poetry2nix 2022-06-01 01:46:30 +02:00
Robert Schütz aff15c41fc dmarc-metrics-exporter: rename from prometheus-dmarc-exporter
Also stop using poetry2nix.
2022-05-31 23:25:18 +00:00
Sandro 8d8e031d25
Merge pull request #133771 from erdnaxe/libreddit_fix
nixos/libreddit: service hardening and test
2022-05-31 21:53:51 +02:00
Maximilian Bosch 185ee01e80
Merge pull request #173273 from kfollesdal/grafana-azuread
nixos/grafana: add new options to grafana module
2022-05-31 19:24:33 +02:00
markuskowa 412168b4ae
Merge pull request #175316 from markuskowa/upd-slurm
slurm: 21.08.8.2 -> 22.05.0.1
2022-05-30 21:18:28 +02:00
ajs124 30186896ee nixos/nginx: fix SystemCallFilter for openresty 2022-05-30 11:58:28 +02:00