Commit Graph

7208 Commits

Author SHA1 Message Date
6543
cac3bdab21
nixos/services.mysql: add galera cluster options (#388978)
And add release notes for new option.

Co-authored-by: Arne Keller <arne.keller@posteo.de>
2025-04-06 00:26:06 +02:00
Gutyina Gergő
01be6580d3
nixos/pocket-id: init
Co-authored-by: ymstnt <21342713+YMSTNT@users.noreply.github.com>
2025-04-03 09:26:57 +02:00
Felix Zieger
1bf74aee3c nixos/haven: init 2025-04-02 17:30:18 +02:00
misuzu
0f4487251d
strfry: init at 1.0.4, nixos/strfry: init (#385587) 2025-04-02 10:13:41 +03:00
Felix Zieger
dfd82bf3e5 nixos/strfry: init 2025-04-01 23:20:15 +02:00
Pol Dellaiera
25264d105d nixos/docling-serve: init 2025-04-01 21:42:53 +02:00
Silvan Mosberger
374e6bcc40 treewide: Format all Nix files
Format all Nix files using the officially approved formatter,
making the CI check introduced in the previous commit succeed:

  nix-build ci -A fmt.check

This is the next step of the of the [implementation](https://github.com/NixOS/nixfmt/issues/153)
of the accepted [RFC 166](https://github.com/NixOS/rfcs/pull/166).

This commit will lead to merge conflicts for a number of PRs,
up to an estimated ~1100 (~33%) among the PRs with activity in the past 2
months, but that should be lower than what it would be without the previous
[partial treewide format](https://github.com/NixOS/nixpkgs/pull/322537).

Merge conflicts caused by this commit can now automatically be resolved while rebasing using the
[auto-rebase script](8616af08d9/maintainers/scripts/auto-rebase).

If you run into any problems regarding any of this, please reach out to the
[formatting team](https://nixos.org/community/teams/formatting/) by
pinging @NixOS/nix-formatting.
2025-04-01 20:10:43 +02:00
Franz Pletz
82f0c74912
nixos/zoxide: init module (#393493) 2025-04-01 18:01:32 +02:00
Maximilian Bosch
f20b220e17
Merge: nixos/nextcloud: add maintainer team, update docs about maintainership of apps (#393069) 2025-04-01 11:25:28 +02:00
Adrien Faure
63455f1a21 docs: add separate Nixpkgs release notes
the initial change was already made ad hoc in 10a75ab, in response to the recently introduced enforced redirects mapping that is supposed to keep stable URLs.

due to the redirect mechanism's current limitation to locations within
the same site (that is, either the Nixpkgs xor the NixOS manual), and
the observation that noteworthy Nixpkgs changes tend to be
self-contained, it seemed reasonable to introduce a seperate release
notes document. it also has the advantage that users of only Nixpkgs
don't have to deal with release notes that are only relevant for NixOS.

the original change was already lossless for NixOS users, since the
Nixpkgs release notes are appended to the NixOS release notes.

this change moves the pre-existing Nixpkgs notes to the new dedicated page.

Co-authored-by: Gagarin Valentin Gagarin <valentin@gagarin.work>
2025-04-01 07:52:19 +01:00
Arne Keller
ee6d7cb213
nitter: 0-unstable-2024-02-26 -> 0-unstable-2025-02-25; nixos/nitter: rename guestAccounts to sessionsFile (#393028) 2025-03-31 17:16:30 +02:00
Pratham Patel
2a7180b3db nixos/release-notes: add release notes for COSMIC modules 2025-03-31 15:28:55 +05:30
Wolfgang Walther
899c3986e7
nixos/postgrest: init module (#394041) 2025-03-31 07:20:43 +00:00
Maximilian Bosch
97d215cf17
Merge: php: 8.3 -> 8.4 (#394112) 2025-03-30 22:54:31 +02:00
Wolfgang Walther
064432a519
nixos/postgrest: init module 2025-03-30 14:24:16 +02:00
Daniel Xu
f1c4d339a5 nixos/wordpress: Use https by default for caddy
Previously, `http://` scheme was hard coded into the caddy config if
`webserver = "caddy"` was chosen. This is fine for local testing, but is
problematic if you want your nixos host to be public facing.

In the public facing case, you generally want to be using TLS. But since
the wordpress module generates the caddyfile rule, the user's nixos
config cannot easily change it to also allow https.

An alternative would be to reverse proxy an https rule to the generated
http rule, but that's somewhat questionable as there's not an internal
http endpoint to proxy to. It might be possible but I couldn't figure
it out.

So simplify by omitting the scheme. This causes caddy to use https by
default and 301 redirect any http requests to the https endpoint. Caddy
will just do the right thing if it's being hosted on a local/internal
hostname (self sign certificates).

This should be backwards compatible with previous default if users are
using reasonable browsers/tools.

Signed-off-by: Daniel Xu <dxu@dxuuu.xyz>
2025-03-29 15:10:35 -06:00
Morgan Jones
9569ad4b57 release-notes: add androidenv details to rl-2505 2025-03-29 22:13:03 +05:30
K900
4b2bc4c4d7
nixos/k3b: remove, refer users to k3b 24.08 (Qt 6) (#351093) 2025-03-29 14:12:02 +03:00
Ryan Hendrickson
800863744b
nixos/geoclue2: add options for static source (#392257) 2025-03-28 21:10:22 -04:00
Maximilian Bosch
d783555924
php: 8.3 -> 8.4
The default PHP is now the latest version of the interpreter available.
2025-03-28 22:13:39 +01:00
Izel Nakri
d69fa4d3fb nixos/bitbox-bridge: init
Signed-off-by: John Titor <50095635+JohnRTitor@users.noreply.github.com>
2025-03-29 00:49:47 +05:30
JuliusFreudenberger
9a48443997 nixos/rl-2505: update of teleport default version 2025-03-28 22:40:23 +05:30
Maximilian Bosch
21954cf09b
nextcloud-news-updater: remove, unmaintained 2025-03-28 17:32:41 +01:00
Wolfgang Walther
9992c0fd4d
doc/option-types: fix attrTag example
Further down, `ssh = { drop = {}; };` is used.
2025-03-27 14:22:53 +01:00
heisfer
825381d5ed nixos/zoxide: init module 2025-03-26 22:08:23 +02:00
Jonas Heinrich
5325034183
froide-govplan: init at 0-unstable-2025-01-27 (#349750) 2025-03-26 14:27:02 +01:00
Johannes Kirschbauer
5e74a74444
lib.packagesFromDirectoryRecursive: use explicit recursion, support nested scopes (#392800) 2025-03-26 13:28:56 +01:00
nicoo
6b7576b0cf lib.packagesFromDirectoryRecursive: use explicit recursion, support nested scopes 2025-03-26 12:11:43 +01:00
Arne Keller
98430f956c
pinchflat: init at 2025.3.17, nixos/pinchflat: init (#364135) 2025-03-26 11:06:02 +01:00
maryjane
a6f14a6036 nixos/doc: Fix outdated references in the NixOS manual 2025-03-25 19:51:54 +00:00
Arne Keller
657dd8d7cd
nixos/ipfs-cluster: init (#292290) 2025-03-25 18:53:02 +01:00
Nathan Fish
950324a23e nixos/ipfs-cluster: init
Co-authored-by: Sorki <srk@48.io>
2025-03-25 16:34:16 +01:00
Wolfgang Walther
a4006e4970
Revert "nixos/postgresql: add docs about procedural languages"
This reverts commit 0bc099abd6.
2025-03-25 14:58:02 +01:00
Maximilian Bosch
dad0bf139b
Merge: nixos/postgresql: add docs about procedural languages (#392399) 2025-03-25 13:00:09 +00:00
uku
b6ba4a499c
nixos/nitter: rename guestAccounts to sessionsFile
for consistency with upstream, see
6fcd849eff
2025-03-25 10:48:27 +01:00
misuzu
f630533b4a
nixos/xpad-noone: init (#389752) 2025-03-25 11:29:52 +02:00
Ryan Hendrickson
4c2f564ef0 nixos/geoclue2: add options for static source 2025-03-24 19:15:47 -04:00
Jonas Heinrich
82a382ed09
nixos/keycloak: add realmFiles option (#273833) 2025-03-24 09:35:04 +01:00
Jonas Heinrich
4a8b7bb45d nixos/froide-govplan: init 2025-03-23 18:05:54 +01:00
Wolfgang Walther
0bc099abd6
nixos/postgresql: add docs about procedural languages 2025-03-23 15:07:43 +01:00
Pablo Ovelleiro Corral
796556ce8d Add release notes 2025-03-23 12:51:58 +01:00
Acid Bong
67e9d0ab57
nixos/release-notes: point nixos-rebuild build-image to the right manual (#392306) 2025-03-23 14:45:35 +05:30
nixpkgs-ci[bot]
8fa05d5ca4
Merge master into staging-next 2025-03-21 12:05:59 +00:00
Arian van Putten
b684e9c6d6
fluent-bit: link against Nix dependencies, fix Darwin builds, and add NixOS module (#365493) 2025-03-21 11:39:18 +00:00
Robert Rose
cd10f9a874 nixos/keycloak: add realmFiles option
Add an option to import Keycloak realms during
startup from exported realm files.
2025-03-20 12:07:38 +01:00
K900
6a900ee562 Merge remote-tracking branch 'origin/master' into staging-next 2025-03-20 09:08:18 +03:00
nixpkgs-ci[bot]
4733649a15
Merge master into staging-next 2025-03-20 00:15:20 +00:00
Jeremy Fleischman
9c02a1e422
services/cloudflare-dyndns: require that apiTokenFile be an api token
Previously, this option was supposed to be a file of the form
`CLOUDFLARE_API_TOKEN=...`, which has a few problems:

- That's not an api token. It's an env file fit for passing to systemd's
  `EnvironmentFile` option. The user could typo the variable name, or
  intentionally/unintentionally include unrelated environment variables.
- It's not how secret files usually work in NixOS. Secret files are
  usually just the secret, and don't leak details about how the secret
  is passed to the service.
- This increases friction for people switching between cloudflare dyndns
  services, such as `services.cloudflare-dyndns` and
  `services.cfdyndns`, which both have a `apiToken` option, but (before
  this change) with different semantics.
2025-03-19 18:19:29 -05:00
commiterate
3366b27e59 fluent-bit: link against Nix dependencies, fix Darwin builds, and add NixOS module 2025-03-19 18:48:46 -04:00
Felix Bühler
30358ab7a7
formats.lua: init; types.luaInline: init (#390120) 2025-03-19 23:18:05 +01:00