Commit Graph

5562 Commits

Author SHA1 Message Date
Jonas Heinrich
4a8b7bb45d nixos/froide-govplan: init 2025-03-23 18:05:54 +01:00
Franz Pletz
7978d240c2
nixos/iosched: exclude loop devices by default; mention in release notes (#385106) 2025-03-09 09:38:05 +01:00
Mikael Voss
901b87f8fd
nixos/doc/rl-2411: mention iosched module 2025-03-09 02:27:34 +01:00
Leona Maroni
810f3b88e4
nixos/synapse-auto-compressor: init (#383168) 2025-03-08 16:55:06 +01:00
Lin Jian
23e610d63f
emacs: support and enable __structuredAttrs in elisp build helpers (#387193) 2025-03-08 17:09:46 +08:00
Aleksana
f2ef5d1a9e
tauon: doc fixes (#387077) 2025-03-08 16:48:18 +08:00
shelvacu
1a4575f9db
nixos/modules: Add security.pki.caBundle option and make all services use it for CA bundles (#352244)
Previously some modules used `config.environment.etc."ssl/certs/ca-certificates.crt".source`, some used `"/etc/ssl/certs/ca-certificates.crt"`, and some used `"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"`. These were all bad in one way or another:

- `config.environment.etc."ssl/certs/ca-certificates.crt".source` relies on `source` being set; if `text` is set instead this breaks, introducing a weird undocumented requirement
- `"/etc/ssl/certs/ca-certificates.crt"` is probably okay but very un-nix. It's a magic string, and the path doesn't change when the file changes (and so you can't trigger service reloads, for example, when the contents change in a new system activation)
- `"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"` silently doesn't include the options from `security.pki`

Co-authored-by: Shelvacu <git@shelvacu.com>
2025-03-08 08:41:08 +00:00
Sandro
07c24fffa3
nixos/matrix-alertmanager: init module (#378966) 2025-03-07 19:59:46 +01:00
misuzu
f3b9f47891
nixos/umurmur: init (#387580) 2025-03-07 17:46:10 +02:00
Maximilian Bosch
6c4f93e113
Merge: nixos/nextcloud: use LoadCredential to read secrets (#367433) 2025-03-07 10:58:29 +01:00
3JlOy_PYCCKUI
095da00b2d nixos/umurmur: init 2025-03-07 12:07:53 +03:00
Dionysis Grigoropoulos
ce90b7889c
nixos/matrix-alertmanager: init module 2025-03-07 00:04:17 +02:00
Jeremiah
1e0217b0c5
nixos/soft-serve: restart trigger added (#384829)
Previously changing configuration did not apply to the running service
requiring it to be restarted manually. This fixes that issue.
2025-03-05 12:54:04 -05:00
Sandro
5ca7fffe87
nezha: 0.20.3 -> 1.9.5; nezha-agent: 0.20.5 -> 1.9.2; nixos/nezha-agent: refactor (#361515) 2025-03-05 17:38:42 +01:00
Lin Jian
d64a233e4c
emacs: enable __structuredAttrs by default in elisp build helpers 2025-03-05 14:07:47 +08:00
ZHAO Jin-Xiang
6cbe4bd3ad wtfutil: rename wtf to wtfutil 2025-03-05 12:57:57 +08:00
Sandro
4f7fc6dfdf
nixos/glitchtip: init module (#386013) 2025-03-05 01:23:43 +01:00
Defelo
5da710d274
nixos/glitchtip: init module
Co-authored-by: soyouzpanda <soyouzpanda@soyouzpanda.fr>
Co-authored-by: Nico Felbinger <nico@felbinger.eu>
2025-03-05 00:24:50 +01:00
Philip Wilk
aa8fe45398
hddfancontrol: 1.5.1->2.0.1 2025-03-04 19:48:06 +00:00
Jan Solanti
8bd9f1d373 tauon: add DB migration warning to release notes 2025-03-04 21:18:51 +02:00
Moraxyc
1df119a49c
nixos/doc/rl-2505: mention Nezha update 2025-03-04 18:08:05 +08:00
xanderio
8bc3ee6396
dependency-track: stop bundling frontend in jar (#386408) 2025-03-04 09:39:44 +01:00
Tom McLaughlin
60f9abdbf4 mkBinaryCache: add release notes entry about new zstd compression by default 2025-03-02 15:40:01 -08:00
Alexander Sieg
8af0a5abfd dependency-track: don't bundle frontend in jar
Bundling the frontend in the jar is deprecated by upstream and causes
the frontend from being serve after weeks of runtime.
2025-03-02 16:50:01 +01:00
transcaffeine
0b483037f7
nixos/synapse-auto-compressor: init 2025-03-02 15:59:42 +01:00
Weijia Wang
95779c4cb4
nixos/rippled: move drop notice to nixos release notes (#385928) 2025-03-01 16:38:41 +01:00
Maximilian Bosch
2cf427c045
Merge: nextcloud31: init at 31.0.0 (#385060) 2025-03-01 13:47:45 +01:00
Maximilian Bosch
be4fd8fdf2
nixos/nextcloud: update docs
* Update related packages for pkg option.
* Add release notes.
2025-03-01 11:58:54 +01:00
Christoph Heiss
af74cbc292
nixos/rippled: move drop notice to nixos release notes
See the accompanying discussion [0] and e.g. the PR at [1].

[0] https://github.com/NixOS/nixpkgs/pull/374568#discussion_r1951562014
[1] https://github.com/NixOS/nixpkgs/pull/371930

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2025-02-28 23:53:29 +01:00
Samuel Dionne-Riel
6ec6eae586
Revert "nixos/grub: generate BLS entries" 2025-02-28 14:30:10 -05:00
dish
a94dc905b3
webpack-cli: 5.1.4 -> 6.0.1 2025-02-28 11:32:25 -05:00
Michele Guerini Rocco
6bf084c4ea
nixos/grub: generate BLS entries (#95901) 2025-02-28 15:12:36 +01:00
rnhmjoj
7b71abeaac
nixos/release-notes: mention GRUB boot loader entries 2025-02-28 10:00:01 +01:00
Pol Dellaiera
56e88da108
rebuilderd: init at 0.22.1 (#343334) 2025-02-28 09:14:08 +01:00
Sandro
32d2826f35
nixos/archtika: init at 1.0.1 (#365218) 2025-02-27 23:56:06 +01:00
Sandro
d1c535f62a
nixos/user-groups: add a toggle for user account creation (#358646) 2025-02-27 23:47:20 +01:00
Sandro
75f83b13f6
release-notes/25.05: drop extra added new line 2025-02-27 23:36:41 +01:00
Sandro Jäckel
36a3c6c11d
nixos/paperless: move paperless-manage to proper systemPackage 2025-02-27 21:47:35 +01:00
Pol Dellaiera
2c8bdd00fd nixos/rebuilderd: init 2025-02-27 21:18:46 +01:00
Maximilian Bosch
7d443d378b
nixos/oci-containers: support rootless containers & healthchecks
Closes #259770
Closes #207050

The motivation for the former is to not execute the container as root,
so you don't have to `sudo -i` to perform podman management tasks.

The idea behind healthchecks is to be able to keep the unit in the
activating state until the container is healthy, only then then unit is
marked as active.

The following changes were necessary:

* Move the ctr-id into `/run/${containerName}` to make podman can
  actually write to it since it's now in its RuntimeDirectory.

* Make `sdnotify` option configurable (`healthy` for healthchecks that
  must pass, default remains `conmon`).

* Set Delegate=yes for `sdnotify=healthy` to make sure a rootless
  container can actually talk to sd_notify[1].

* Add a warning that lingering must be enabled to have a `systemd --user`
  instance running which is required for the cgroup support to work
  properly.

* Added a testcase for rootless containers with both conmon and
  healthchecks.

[1] https://github.com/containers/podman/discussions/20573#discussioncomment-7612481
2025-02-27 11:08:33 +01:00
Martin Weinelt
35f9b4c165
zigbee2mqtt_2: init at 2.1.1 (#371053) 2025-02-25 05:09:13 +01:00
Bobby Rong
5bdd314871
nixos/doc/rl-2505: Fix wrong option name in Xfce 4.20 release notes (#384523) 2025-02-23 22:37:00 +08:00
Bobby Rong
e3ac8c88f5
nixos/doc/rl-2505: Fix wrong option name in Xfce 4.20 release notes
https://search.nixos.org/options?channel=unstable&show=services.xserver.desktopManager.xfce.waylandSessionCompositor
2025-02-23 22:27:09 +08:00
Robert Schütz
7dd54f634d
python3Packages.beancount: 2.3.6 -> 3.1.0 (#371541) 2025-02-22 09:06:09 -08:00
Peder Bergebakken Sundt
d525eb5838 treewide: fix typos
done with `fd \\\.md$ . --type f -x typos --write-changes`
2025-02-22 02:02:07 +01:00
Robert Helgesson
44a5b1bdca nixos/grav: init module 2025-02-21 23:09:42 +01:00
Martin Weinelt
bf25eae002
nixos/routinator: init module (#380046) 2025-02-21 23:07:21 +01:00
Andrei Lapshin
cc354c451c
python3Packages.beancount: 2.3.6 -> 3.1.0 2025-02-21 21:46:51 +01:00
Peter Lehmann
c468f4e261
nixos/routinator: init module 2025-02-21 19:10:18 +01:00
Martin Weinelt
99eabc0ab3
zigbee2mqtt_2: init at 2.1.1
https://github.com/Koenkk/zigbee2mqtt/releases/tag/2.0.0
https://github.com/Koenkk/zigbee2mqtt/releases/tag/2.1.0
https://github.com/Koenkk/zigbee2mqtt/releases/tag/2.1.1
2025-02-21 14:14:41 +01:00