Commit Graph

2292 Commits

Author SHA1 Message Date
Nick Cao
e0ece67a97
Merge pull request #270256 from schmittlauch/gite-forgejo-migration-phrasing
nixos/forgejo docs: correct phrasing
2023-11-27 09:33:21 -05:00
Tomas Antonio Lopez
9e6f9c6d83 nixos/sourcehut: remove usages of 'with lib;'
Inherit library attributes at a finer granularity, instead.
2023-11-27 08:22:48 -03:00
Tomas Antonio Lopez
ba6817ed22 nixos/sourcehut: add myself as maintainer 2023-11-27 08:22:48 -03:00
Tomas Antonio Lopez
087c83f45c nixos/sourcehut: reformat expressions using nixpkgs-fmt 2023-11-27 08:22:48 -03:00
h7x4
0a37316d6c
treewide: use mkPackageOption
This commit replaces a lot of usages of `mkOption` with the package
type, to be `mkPackageOption`, in order to reduce the amount of code.
2023-11-27 01:28:36 +01:00
Trolli Schmittlauch
0e893a9f22 nixos/forgejo docs: correct phrasing 2023-11-26 21:43:32 +01:00
Maciej Krüger
b63af5d7ea
Merge pull request #265728 from nbraud/nixos/sudo-rs/ssm-agent 2023-11-26 21:37:15 +01:00
Lin Jian
5ba42a0de2
Merge pull request #260902 from LDprg/master
preload: init at 0.6.4
2023-11-25 23:29:40 -06:00
LDprg
a0f5d5e500 nixos/preload: init 2023-11-25 20:07:10 +01:00
Robert Hensing
779e50580c
Merge pull request #224611 from srhb/kafka-settings-module
Kafka: Settings and KRaft support
2023-11-23 17:35:29 +01:00
Sarah Brofeldt
cfe3ca1f2f nixos/apache-kafka: Add manual chapter 2023-11-22 06:47:09 +01:00
Sarah Brofeldt
45f84cdfd5 nixos/apache-kafka: structured settings
- Use lazyAttrs (for config references) settings for main server.properties.
- Drop dangerous default for "log.dirs"
- Drop apache-kafka homedir; unused and confusing
- Support formatting kraft logdirs
2023-11-22 06:47:08 +01:00
Mario Rodas
fa14a14694
Merge pull request #258036 from anthonyroussel/fix-ssm-seelog
nixos/amazon-ssm-agent: fix missing seelog.xml file
2023-11-19 18:55:57 -05:00
Nick Cao
d936414252
Merge pull request #268132 from bendlas/forgejo-release-notes
nixos/forgejo/docs: fix typo
2023-11-18 09:39:29 -05:00
emilylange
b3e8dae766 nixos/forgejo: remove postgresql_15 permission work-around
This is no longer necessary as of
ccfe07c316.

Previously: b8585a119c.
2023-11-18 12:14:09 +01:00
Ryan Lahfa
ccfe07c316
Merge pull request #266270 from Ma27/postgresql-ownership-15 2023-11-17 18:02:17 +01:00
Herwig Hochleitner
8c441fc2a7 nixos/forgejo/docs: fix typo 2023-11-17 17:18:57 +01:00
Herwig Hochleitner
20832d5995
nixos/forgejo: changelog and migration instructions (#267248)
* nixos/forgejo: changelog and migration instructions

* nixos/forgejo/docs: clarify sentence

Co-authored-by: Trolli Schmittlauch <schmittlauch@users.noreply.github.com>

* nixos/forgejo/docs: document migration via gitea impersonation

* nixos/forgejo/docs: note about url change on migration

* nixos/forgejo/docs: note about migration (non-)requirement

* nixos/forgejo/docs: header ids

* nixos/forgejo/docs: clarify release notes entry

Co-authored-by: Emily <git@emilylange.de>

* nixos/forgejo/docs: improve manual entry

Co-authored-by: Emily <git@emilylange.de>

* nixos/forgejo/docs: move changelog line to the middle of the section

as noted <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->

---------

Co-authored-by: Trolli Schmittlauch <schmittlauch@users.noreply.github.com>
Co-authored-by: Emily <git@emilylange.de>
2023-11-17 15:55:24 +01:00
Raito Bezarius
7cd63bff21 nixos/sourcehut: do not use ensureDBOwnership
Given that SourceHut uses unfortunate defaults for database name, it will not
be realistic to fix this in time for 23.11.

We will leave the workaround and leave it to SourceHut maintainers to pick up the work
to clean this up after 23.11.
2023-11-17 15:52:51 +01:00
zzywysm
3f4c802d26 initrd/autofs4: remove legacy references to autofs4 kernel module
Back in 2018, the kernel decided to remove the autofs4 module.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2225d931f75ddd3c39f4d0d195fad99dfd68671

This caused immediate problems with systemd, so the kernel allowed autofs4 as a config option that would simply map back to autofs.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d02d21ea007b6b33cdaf15c2f84fb1fea996ecc2

Earlier this year, in July 2023, the kernel got tired of people not adapting to the autofs change, and forced the issue by fixing it within the kernel defconfigs, which NixOS uses as a starting point for their own kernel configs.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f2190d6b7112d22d3f8dfeca16a2f6a2f51444e

This commit reflects the post-2018 reality by changing the remaining autofs4 references to autofs. Since this change initially happened in kernel 4.18 and we no longer support 4.x kernels, we don't need any backwards-compatibility tweaks.
2023-11-14 15:37:50 -05:00
Tomas Antonio Lopez
5476b490d4 nixos/sourcehut: compile and integrate paste.sr.ht API component 2023-11-14 11:12:14 +01:00
Maximilian Bosch
48459567ae nixos/postgresql: drop ensurePermissions, fix ensureUsers for postgresql15
Closes #216989

First of all, a bit of context: in PostgreSQL, newly created users don't
have the CREATE privilege on the public schema of a database even with
`ALL PRIVILEGES` granted via `ensurePermissions` which is how most of
the DB users are currently set up "declaratively"[1]. This means e.g. a
freshly deployed Nextcloud service will break early because Nextcloud
itself cannot CREATE any tables in the public schema anymore.

The other issue here is that `ensurePermissions` is a mere hack. It's
effectively a mixture of SQL code (e.g. `DATABASE foo` is relying on how
a value is substituted in a query. You'd have to parse a subset of SQL
to actually know which object are permissions granted to for a user).

After analyzing the existing modules I realized that in every case with
a single exception[2] the UNIX system user is equal to the db user is
equal to the db name and I don't see a compelling reason why people
would change that in 99% of the cases. In fact, some modules would even
break if you'd change that because the declarations of the system user &
the db user are mixed up[3].

So I decided to go with something new which restricts the ways to use
`ensure*` options rather than expanding those[4]. Effectively this means
that

* The DB user _must_ be equal to the DB name.
* Permissions are granted via `ensureDBOwnerhip` for an attribute-set in
  `ensureUsers`. That way, the user is actually the owner and can
  perform `CREATE`.
* For such a postgres user, a database must be declared in
  `ensureDatabases`.

For anything else, a custom state management should be implemented. This
can either be `initialScript`, doing it manual, outside of the module or
by implementing proper state management for postgresql[5], but the
current state of `ensure*` isn't even declarative, but a convergent tool
which is what Nix actually claims to _not_ do.

Regarding existing setups: there are effectively two options:

* Leave everything as-is (assuming that system user == db user == db
  name): then the DB user will automatically become the DB owner and
  everything else stays the same.

* Drop the `createDatabase = true;` declarations: nothing will change
  because a removal of `ensure*` statements is ignored, so it doesn't
  matter at all whether this option is kept after the first deploy (and
  later on you'd usually restore from backups anyways).

  The DB user isn't the owner of the DB then, but for an existing setup
  this is irrelevant because CREATE on the public schema isn't revoked
  from existing users (only not granted for new users).

[1] not really declarative though because removals of these statements
    are simply ignored for instance: https://github.com/NixOS/nixpkgs/issues/206467
[2] `services.invidious`: I removed the `ensure*` part temporarily
    because it IMHO falls into the category "manage the state on your
    own" (see the commit message). See also
    https://github.com/NixOS/nixpkgs/pull/265857
[3] e.g. roundcube had `"DATABASE ${cfg.database.username}" = "ALL PRIVILEGES";`
[4] As opposed to other changes that are considered a potential fix, but
    also add more things like collation for DBs or passwords that are
    _never_ touched again when changing those.
[5] As suggested in e.g. https://github.com/NixOS/nixpkgs/issues/206467
2023-11-13 17:16:25 +01:00
dadada
f192930a79
nixos/soft-serve: fix typos in option descriptions 2023-11-12 22:34:54 +01:00
tomberek
7859adb9d6
Merge pull request #245394 from christoph-heiss/pkgs/sourcehut
sourcehut: update all component; lots of fixes
2023-11-11 13:42:19 -05:00
Christoph Heiss
88a3d2a0b4
sourcehut: fix postgresql database permission for postgresql >= 15
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 15:50:16 +01:00
Christoph Heiss
66b86f8a2e
sourcehut: de-duplicate nginx add_header directives
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 14:14:59 +01:00
Christoph Heiss
acd21dad52
sourcehut: use systemd.tmpfiles instead of manually creating logfiles
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 14:14:59 +01:00
Christoph Heiss
641e54bb28
sourcehut: create logs directory unconditionally
An empty log directory, in case it stays unused, does not hurt anyone.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
fc6addb147
sourcehut: reword api-origin option description
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
78cc2783c8
sourcehut: drop obsolete services array in favor of indivdual enable flags
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
6b25e09d2d
sourcehut: fix up some more bin paths
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
5841d27497
sourcehut: explicitly disallow openssh to socket-active
This breaks the (already fragile) gitsrht-dispatch -> gitsrht-keys
command chain.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:47 +01:00
Christoph Heiss
c39ba7f5b1
sourcehut: remove set -x from ssh commands
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:46 +01:00
Christoph Heiss
6648488333
sourcehut: fix logging of git/hg ssh commands
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:45 +01:00
Christoph Heiss
6e51802196
sourcehut: fix repos path by using actual settings value
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:32 +01:00
Christoph Heiss
c123a37be6
sourcehut.gitsrht: 0.78.20 -> 0.84.2
Newer version of the gitsrht-api service call setrlimit() on startup,
thus allow it in the `SystemCallFilter` definition for the service.

Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 13:01:30 +01:00
Christoph Heiss
d703173520
sourcehut: make /query endpoint config common to all services
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2023-11-11 12:39:28 +01:00
Anthony Roussel
e30f48be94
treewide: fix redirected and broken URLs
Using the script in maintainers/scripts/update-redirected-urls.sh
2023-11-11 10:49:01 +01:00
Anthony Roussel
3dd50eaa8f
nixos/amazon-ssm-agent: fix missing seelog.xml file 2023-11-09 12:02:48 +01:00
nicoo
690f027251 nixos/ssm-agent: Handle sudo-rs too 2023-11-05 20:49:41 +00:00
Martin Weinelt
05e8361387
Merge pull request #261867 from matrss/set-paperless-secret-key
nixos/paperless: set PAPERLESS_SECRET_KEY
2023-11-01 12:33:23 +01:00
arcnmx
0711d3d69b xmrig: add meta.mainProgram
See #246386
2023-10-28 11:21:57 -07:00
Matthias Riße
63ef033992 nixos/paperless: set PAPERLESS_SECRET_KEY
If the PAPERLESS_SECRET_KEY environment variable is left unset
paperless-ngx defaults to a well-known value, which is insecure.

Co-authored-by: Erik Arvstedt <erik.arvstedt@gmail.com>
2023-10-27 21:11:01 +02:00
Mario Rodas
84a877ed30
Merge pull request #261722 from anthonyroussel/ssm-agent-rename
amazon-ssm-agent: rename from ssm-agent
2023-10-25 04:18:24 -05:00
emilylange
402b5c67a8
nixos/forgejo: pass {env}GIT_PROTOCOL via ssh to forgejo
when using the host's openssh service (not the builtin golang one).

This enables the use of the much faster and more efficient wire protocol
version 2.
See https://git-scm.com/docs/protocol-v2
2023-10-24 03:27:20 +02:00
Anthony Roussel
ccf080ee05
amazon-ssm-agent: rename from ssm-agent 2023-10-22 22:04:09 +02:00
Emily
a61c6b478d
Merge pull request #262741 from emilylange/nixos-forgejo-postgres15
nixos/forgejo: work around permissions error on `postgresql_15`
2023-10-22 21:04:41 +02:00
Artturi
b2426befa0
Merge pull request #259784 from dmytrokyrychuk/init-spice-autorandr
spice-autorandr: init at 0.0.2
2023-10-22 18:52:10 +03:00
Dmytro Kyrychuk
d147d7feed nixos/spice-autorandr: init 2023-10-22 13:45:56 +00:00
emilylange
b8585a119c
nixos/forgejo: work around permissions error on postgresql_15
From `postgresql_15`'s release notes:
> PostgreSQL 15 also revokes the CREATE permission from all users except
a database owner from the public (or default) schema.

https://www.postgresql.org/about/news/postgresql-15-released-2526/

This directly affects `services.postgresql.ensureUsers` in NixOS,
leading to
> permission denied for schema public

`postgresql_15` is now the default for stateVersion `23.11`/`unstable`.

So until this is resolved globally, we work around this issue.
2023-10-22 15:25:34 +02:00
Ryan Lahfa
efccbbab5b
Merge pull request #258994 from lorenzleutgeb/msr
nixos/hardware/cpu/x86/msr: init
2023-10-22 10:24:12 +01:00
Lin Jian
c132df63df
Merge pull request #250792 from ckiee/init-rkvm
{,nixos/}rkvm: init
2023-10-22 17:11:12 +08:00
Lorenz Leutgeb
84803308bf nixos/xmrig: Use hardware.cpu.x86.msr 2023-10-22 09:41:00 +02:00
dadada
77f7b5a3e5
nixos/soft-serve: init
This adds a NixOS module for Soft Serve, a tasty, self-hostable Git
server for the command line. The module has a test that checks some
basic things like creating users, creating a repo and cloning it.

Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2023-10-21 17:51:42 +02:00
Dmitry Kalinkin
6392f18258
Merge pull request #262351 from h7x4/remove-nix-exec-bits
treewide: remove execute bit for non-executable `*.nix` files
2023-10-20 14:45:16 -04:00
h7x4
e6321d2788
treewide: remove execute bit for non-executable *.nix files 2023-10-20 19:55:39 +02:00
Bjørn Forsman
142074c2a8 nixos: fix bad mkEnableOption descriptions
Fix descriptions that don't account for (1) the "Whether to enable"
prefix or (2) the automatically added trailing dot.
2023-10-20 16:22:40 +01:00
ckie
f3ad4def37
nixos/rkvm: init
Co-authored-by: Lin Jian <me@linj.tech>
2023-10-18 06:21:40 +03:00
Atemu
16fb0b365d
Merge pull request #259056 from leona-ya/nixos-paperless-systemd-254
nixos/paperless: fix start with latest systemd
2023-10-11 13:15:24 +02:00
Sarah Brofeldt
9b73af9b27
Merge pull request #259498 from TLATER/tlater/gitea-metrics
gitea: Add option to supply the metrics token via file
2023-10-08 07:53:33 +02:00
Tristan Daniël Maat
b59e5a34e7
nixos/gitea: Add option to supply the metrics token via file 2023-10-07 21:53:02 +02:00
K900
d4eca0e8bb nixos/gollum: remove non-existent maintainer 2023-10-06 23:52:42 +03:00
Lin Jian
de26e61f7e
Merge pull request #258582 from returntoreality/gpsd-extra-args
nixos/gpsd: add extraArgs option
2023-10-06 22:54:51 +08:00
Leona Maroni
6249a0983d
nixos/paperless: fix start with latest systemd 2023-10-05 12:56:37 +02:00
Linus Karl
342cc761df nixos/gpsd: add extraArgs option
Allows setting addtional arguments to gpsd
2023-10-02 15:10:12 +02:00
Cabia Rangris
6f7933059d
Merge pull request #237404 from cab404/cab/moonraker-gpiod
moonraker: add useGpiod
2023-10-02 06:45:16 +04:00
Vladimir Serov
5edabf7c0b
moonraker: add useGpiod 2023-10-02 06:09:58 +04:00
Mario Rodas
fbf686309f
Merge pull request #256725 from trofi/modules-xmr-stak-cudaSupport-removal
modules/xmr-stak: drop broken cudaSupport option
2023-09-29 06:13:19 -05:00
Sander van der Burg
32c36780d1 dysnomia: 0.10.1 -> 0.10.2 2023-09-27 18:35:30 +02:00
Sergei Trofimovich
e57034f9a7 modules/xmr-stak: drop broken cudaSupport option
Tanvir Ahmed T. reports that `services.xmr-stak.enable = true;` shows
that `23.05` ships broken `xmr-stak` module:

    error: function 'anonymous lambda' called with unexpected argument 'cudaSupport'

I broke it when I removed `cudaSupport` flag in
    a5ce71d4e8

I'm just removing the option without an attempt to supply the stub as
module was already broken on `23.05` release. There are probably no
users of `xmr-stak` module by now.

Closes: https://github.com/NixOS/nixpkgs/issues/256703
2023-09-22 17:40:04 +01:00
bb2020
5caa82281e nixos/mbpfan: adjust defaults 2023-09-20 16:10:26 +03:00
Fabián Heredia Montiel
f8056c5007
Merge pull request #255145 from BuonHobo/patch-1
jellyfin: Start service after network is up
2023-09-16 12:00:21 -06:00
Alex
ec9009f8e4
Jellyfin service starts after network-online.target
To those who use Jellyfin's DLNA server, it can happen that the DLNA server starts before we are connected to the LAN.

When this happens, Jellyfin only publishes the DLNA server on the local ports and is not discoverable by devices in the LAN.

In order to fix this, I'm ensuring that Jellyfin starts after we are connected to the network, making it properly discoverable by DLNA clients.

After making this change, Jellyfin's DLNA server is now working as expected on my machine. It used to be consistently undiscoverable.

I verified that this doesn't break anything in situations where the LAN is not available: I disconnected my laptop from the network and rebooted it and Jellyfin started as expected.

This change was informed by reading the suggestion in this article: https://www.freedesktop.org/wiki/Software/systemd/NetworkTarget/
2023-09-14 18:31:22 +02:00
happysalada
1e335c516b nixos/cfdyndns: dynamic user and loadcredentials 2023-09-14 07:53:36 +00:00
Herwig Hochleitner
30bcc6c39d
Merge pull request #248310 from emilylange/nixos/gitea-forgejo-split
nixos/forgejo: fork from nixos/gitea (split)

close https://github.com/NixOS/nixpkgs/issues/244866
2023-09-12 22:10:01 +02:00
Timothy DeHerrera
69bfaafc9d nixos/cfdyndns: add option to use CF token 2023-09-09 12:20:14 +00:00
Yaya
1a22627603 nixos/gitlab: Add a warning message
GitLab instances created or updated between versions [15.11.0, 15.11.2]
have an incorrect database schema. [1] This will become a problem once
upgrading GitLab to >=16.2.0.

A workaround can be found in the GitLab docs: [2]

[1]: https://gitlab.com/gitlab-org/gitlab/-/issues/408835
[2]: https://docs.gitlab.com/ee/update/versions/gitlab_16_changes.html#undefined-column-error-upgrading-to-162-or-later
2023-09-05 13:46:44 +02:00
ajs124
97dfc365e6 gitlab: 16.1.4 -> 16.3.1
https://gitlab.com/gitlab-org/gitlab/-/blob/v16.3.1-ee/CHANGELOG.md

Fixes CVE-2022-4343
Fixes CVE-2023-0120
Fixes CVE-2023-1279
Fixes CVE-2023-1555
Fixes CVE-2023-3205
Fixes CVE-2023-3915
Fixes CVE-2023-3950
Fixes CVE-2023-4018
Fixes CVE-2023-4378
Fixes CVE-2023-4630
Fixes CVE-2023-4638
Fixes CVE-2023-4647

Co-Authored-By: Yaya <github@uwu.is>
2023-09-05 13:46:44 +02:00
Morgan Helton
147d81d155 nixos/atuin: fix enable option typo 2023-09-05 08:34:34 +02:00
Leona Maroni
87f21ac4e6
nixos/paperless: allow systemd services to read ca-certificates
This fixes a regression introduced with the update to 1.17.0.
Since this version paperless-ngx checks the ssl certificates of remote
email servers.
2023-08-25 16:54:04 +02:00
LёNya
54f5045571 nixos/zoneminder: replace lib.optional with lib.optionals to make module work 2023-08-13 22:32:42 +03:00
Florian Praden
490ec79ac3
nixos/gitea: bugfix for gitea-dump service.
Missing custom directory setup in gitea-dump service. Adding environment variable in gitea-dump service definition.
2023-08-09 11:53:18 +02:00
emilylange
8d374cebcd
nixos/forgejo: init
Following a decicion from both the gitea and forgejo maintainers in
nixpkgs.
This means, that forgejo will no longer co-use the nixos/gitea module
via `services.gitea.package = pkgs.forgejo`.
2023-08-06 18:40:02 +02:00
Gregor Godbersen
3d9a6399a1 nixos/paperless: set default thumbnail font
The upstream default for the thumbnail font is set to "Liberation Serif
Regular" located at /usr/share/fonts which is inaccessible under nix.
(2a2bf3bf55/src/paperless/settings.py (L894))

Paperless throws an error when parsing plaintext files without a valid
font. This change sets a nix default using the liberation_ttf package.
2023-08-05 22:06:27 +02:00
Maximilian Bosch
ed02e79bbe
Merge pull request #241497 from bendlas/prepare-gitea-120
nixos/gitea: add WORK_PATH to config, fix 1.20
2023-08-04 18:50:09 +02:00
h7x4
b6fbd87328 nixos/atuin: harden systemd unit 2023-08-01 18:17:37 +08:00
h7x4
fd01b3f59c nixos/atuin: fix database.createLocally behaviour
Co-authored-by: Andrew Marshall <andrew@johnandrewmarshall.com>
2023-08-01 18:17:37 +08:00
Nick Cao
c3f4240e33
Merge pull request #246193 from christophcharles/gogs-config-file
nixos/gogs: fix deprecations for 0.13.0
2023-07-30 18:23:03 -06:00
Oliver Schmidt
ff9296f93e
nixos/gitlab: ensure service started again after dependency restarts (#245240)
When a dependency, like postgresql.service or redis-gitlab.service, had
been stopped and started at switch-to-configuration time, gitlab.service
and its helper units had been stopped but not started again.
`multi-user.target` only has a `Wants` relation to gitlab.target, but
once gitlab.target has been successfully started once and is not stopped/
restarted again, it does not cause all its dependencies to stay activated
the whole time.

This commit fixes this by upgrading the dependy relationship of
gitlab.service towards gitlab.target from a "Wants" to a "Requires". It
should be enough to do this for this single unit part of gitlab.target
only, as all other units wantedBy gitlab.target are pulled in by
gitlab.service as well or have bindsTo relations.
2023-07-30 18:49:54 +02:00
Christoph Charles
43d1c4d782 nixos/gogs: fix deprecations for 0.13.0
Changed ROOT_URL to EXTERNAL_URL.
2023-07-30 15:54:16 +02:00
Elias Probst
2b0545b423
nixos/paperless: update URL to docs 2023-07-26 19:02:29 +02:00
Aaron Andersen
8d85dcea22
Merge pull request #215247 from evan-goode/evdevremapkeys
nixos/evdevremapkeys: init
2023-07-25 08:45:54 -04:00
Martin Weinelt
6847465f6f
Merge pull request #242275 from Atemu/nixos/paperless-manage-toShellVars
nixos/paperless: use toShellVars for paperless-manage
2023-07-25 12:26:32 +02:00
Gianmarco Gargiulo
b34a51f5a7
nixos/gogs: fix deprecations for 0.13.0
Changed APP_NAME to BRAND_NAME, DB_TYPE to TYPE and PASSWD to PASSWORD.
2023-07-24 19:41:52 +00:00
Raito Bezarius
44aee34594 Revert "nixos/gitea: set service type to notify"
This reverts commit b61919e5e0.

As it breaks Forgejo who does not support this feature yet.
2023-07-22 16:12:36 +02:00
Felix Bühler
0a2745684e
Merge pull request #239624 from Stunkymonkey/use-optionalString-then
treewide: use optionalString instead of 'then ""'
2023-07-22 13:02:47 +02:00
Maximilian Bosch
7c70396c1d
Merge pull request #242863 from emilylange/nixos/gitea-runtimedirmode
nixos/gitea: revert change to RuntimeDirectoryMode
Closes ##243340
2023-07-21 19:22:05 +02:00
Maximilian Bosch
38823d15f4
Merge pull request #243883 from techknowlogick/gitea-1200
gitea: 1.19.4 -> 1.20.0
2023-07-21 09:41:07 +02:00
Maximilian Bosch
b61919e5e0
nixos/gitea: set service type to notify 2023-07-20 22:20:43 +02:00
Evan Goode
be333da51f nixos/evdevremapkeys: init
Add a service for evdevremapkeys (already packaged), a daemon for
remapping keyboard events
2023-07-19 23:06:31 -04:00
Karel Kočí
fd3f5471b0
nixos/mqtt2influxdb: init module 2023-07-19 09:47:04 +02:00
Karel Kočí
dd4eec64ab
nixos/bcg: init module
This is gateway that transforms BigClown wireless to MQTT.
2023-07-19 09:47:04 +02:00
Sandro
cacb77fb27
Merge pull request #206273 from wucke13/master 2023-07-18 13:12:06 +02:00
Maximilian Bosch
42105b2ba3
nixos/gitea: explicitly set CHUNKED_UPLOAD_PATH to writable location
Fix for Gitea 1.20.0.

Without this being set, e.g. a `git push` (or `ssh` to `git@` in general) fails like this:

    2023/07/17 09:27:05 ...s/setting/setting.go:109:LoadCommonSettings() [F] Unable to load settings from config: unable to create chunked upload directory: /nix/store/yna9nf66wl2n9hlnhxi2g7fdgawk2kxl-gitea-1.20.0/bin/data/tmp/package-upload (mkdir /nix/store/yna9nf66wl2n9hlnhxi2g7fdgawk2kxl-gitea-1.20.0/bin/data: read-only file system)
    Connection to git.mbosch.me closed.
2023-07-17 11:49:34 +02:00
Artturi
d1abbbd9b6
Merge pull request #242309 from Artturin/ananicyextraxadd 2023-07-16 00:43:45 +03:00
Sandro
545f079f5e
Merge pull request #243475 from vtuan10/enable-klipper-flash
nixos/klipper: add enableKlipperFlash option
2023-07-15 02:54:47 +02:00
Bruno BELANYI
b5f28477aa nixos/prowlarr: make use of 'lib.getExe' 2023-07-14 13:43:26 +00:00
Van Tuan Vo
917bb93078
nixos/klipper: add enableKlipperFlash option 2023-07-14 15:19:36 +02:00
Ryan Lahfa
c9e26d7d3a
Merge pull request #242036 from jnsgruk/prowlarr-update 2023-07-14 13:48:15 +02:00
Jon Seager
3de6be0951
nixos/homepage-dashboard: init 2023-07-13 09:38:26 +01:00
Artturin
4cf8006173 nixos/ananicy: take listOf attrs instead of string 2023-07-12 20:13:03 +03:00
Sandro
5aa53b205e
Merge pull request #208924 from erdnaxe/nitter-network-online 2023-07-12 14:19:30 +02:00
Rick van Schijndel
e1163b27dd
Merge pull request #242912 from chayleaf/fix-getent
treewide: update path to getent
2023-07-12 12:37:08 +02:00
Jon Seager
b853c70661
nixos/prowlarr: add package option 2023-07-12 10:19:05 +01:00
Felix Buehler
bec27fabee treewide: use lib.optional instead of 'then []' 2023-07-12 09:36:28 +01:00
chayleaf
4d4c73ff78 treewide: update path to getent 2023-07-12 02:32:23 +07:00
emilylange
da58b13615
nixos/gitea: revert change to RuntimeDirectoryMode
As this broke most unix socket setups and there is a far better suited
`server.UNIX_SOCKET_PERMISSION` in gitea/forgejo itself.

https://docs.gitea.io/en-us/administration/config-cheat-sheet/#server-server

ref: a0311e5107
2023-07-11 17:05:45 +02:00
Atemu
2616bb762b nixos/paperless: explain how to set JSON env vars
Co-authored-by: Christian Theune <ct@flyingcircus.io>
Co-authored-by: Erik Arvstedt <erik.arvstedt@gmail.com>
2023-07-09 19:52:06 +02:00
Artturin
1b1f25312d ananicy: unstable-2021-11-05 -> unstable-2023-03-21
type's were renamed so this will break some user rules
2023-07-09 00:58:05 +03:00
Artturin
aae2268e0a nixos/ananicy-cpp: add rulesProvider 2023-07-08 20:28:45 +03:00
Artturin
ff28d7a982 nixos/ananicy: don't error if $out/ananicy-cpp doesn't exist
copy new rule
2023-07-08 20:19:13 +03:00
Artturin
b04a04929c nixos/ananicy: add extraTypes, extraCgroups 2023-07-08 19:42:46 +03:00
Atemu
44f637aa8d nixos/paperless: use toShellVars for paperless-manage
The homebrewed snippet didn't escape vars properly which is an issue because
PAPERLESS_OCR_USER_ARGS requires a JSON string. This also meant a discrepancy
between the services' env vars and paperless-manage's.

Just use the correctly functioning library function for this instead.
2023-07-08 16:03:45 +02:00
Janik
e46ab54b68
Merge pull request #241783 from gmemstr/n8n-tweaks 2023-07-07 23:04:48 +02:00
Pol Dellaiera
764472b473
Merge pull request #233091 from yayayayaka/add-team-gitlab
maintainers/team-list: Add team gitlab
2023-07-07 15:19:15 +02:00
Robert Hensing
54303b65ef
Merge pull request #241690 from hercules-ci/nixos-nix-modules
Split nixos/nix-daemon.nix
2023-07-07 10:29:58 +02:00
Kerstin
ba445ba8bc
Merge pull request #241088 from jooooscha/master
maintainers: add joscha
2023-07-06 15:30:28 +02:00
Gabriel Simmer
674de7c287
nixos/n8n: correct configuration, webhookUrl type
I realised in NixOS#240189 I made some minor errors in the service definition.
2023-07-05 23:15:52 +01:00
Alexander Sieg
8d80108d6d nixos/gitlab: configure elasticsearch indexer path 2023-07-05 15:01:31 +02:00
Robert Hensing
0f71c406cf nixos/nix-daemon: Move to services/system
It is now only about the system service.
Granted, it also installs the client package, but that could be
factored out later, with actual test to support such a new type of
configuration.
2023-07-05 14:59:01 +02:00
Robert Hensing
fad172a366 nixos/config/nix-channel: Move NIX_PATH logic 2023-07-05 14:54:29 +02:00
Robert Hensing
5c0c96a828 nixos/config/nix-channel: Factor out root channel initialization 2023-07-05 14:54:29 +02:00
Robert Hensing
1c772cd857 nixos/config/flakes: Factor out 2023-07-05 14:54:28 +02:00
Robert Hensing
d6a68f0542 nixos/config/nix-remote-build: Factor out 2023-07-05 14:54:27 +02:00
Robert Hensing
4bbd44908c nixos/config/nix: Move extraOptions 2023-07-05 14:54:27 +02:00
Robert Hensing
19e33831c6 nixos/config/nix: Move nix.check* 2023-07-05 14:54:26 +02:00
Robert Hensing
d73da5b868 nixos/config/nix: Move nix.settings 2023-07-05 14:54:26 +02:00
Maximilian Bosch
b82c8e13c7
Merge pull request #228508 from SuperSandro2000/gitea-no-recurse
nixos/gitea: don't recursively change file owners/permissions
2023-07-05 13:56:46 +02:00
Robert Hensing
6649d1e369 nixos/config/nix: Move nixConf 2023-07-05 13:03:32 +02:00
Robert Hensing
2fa416732c nixos/config/nix: Move legacyConfMappings 2023-07-05 12:52:56 +02:00
Maximilian Bosch
7f0bc68c32
Merge pull request #237544 from hrdinka/fix_gitea
Revert "nixos/gitea: requires database"
2023-07-05 12:09:55 +02:00
Alexander Sieg
8934558abf
nixos/gitlab: fix unit test result display (#241322)
After the update to GitLab 16 the puma worker needs `gzip` in it's PATH
in order to junit test results.
2023-07-04 18:57:19 +02:00
Atemu
712caf8eb1
Merge pull request #224366 from martinetd/ankisyncd-rs
ankisyncd-rs: add package for anki-sync-server-rs
2023-07-04 18:03:19 +02:00
Herwig Hochleitner
5205c73d93 nixos/gitea: add WORK_PATH to config
this is in preparation for 1.20, which needs this option set
2023-07-04 16:05:56 +02:00
Dominique Martinet
fbe3e3b44e replace ankisyncd with ankisyncd-rs
- remove old ankisyncd python package
- rename new rust package so it's a drop in replacement
2023-07-04 18:14:18 +09:00
Dominique Martinet
668f528b6c nixos/ankisyncd: use ankisyncd-rs instead of the old python one
Unfortunately the config is not compatible; data itself looks like it was compatible
from an up to date python ankisyncd but I wouldn't assume anything with the older
service (which didn't work for me with either ankidroid or recent desktop version)
2023-07-04 18:14:17 +09:00
Janik
8419b512e6
Merge pull request #240189 from gmemstr/patch-1
n8n: add WEBHOOK_URL environment variable
2023-07-04 08:56:36 +02:00
Christoph Hrdinka
70cc0d412f
nixos/gitea: only require databases if createDatabase is set
Currently the database service (mysql/postgresql) is required by the
gitea service. If none of them exists on the same machine as gitea it
will refuse to start. With this change it is only required if
createDatabase was set to true.
2023-07-03 17:02:12 +02:00
Bobby Rong
dd9fcc40b7
Merge pull request #241131 from ShamrockLee/nix-daemon-gramman
nixos/nix-daemon: fix grammatical mistake in description
2023-07-03 16:41:51 +08:00
Nguyễn Gia Phong
170125ebdb nixos/ntfy.sh: require base-url setting
It is required by attachment-cache-dir whose default is provided.
2023-07-03 08:58:05 +08:00