Commit graph

28104 commits

Author SHA1 Message Date
nicoo 744b456b49 nixos/systemd: Mark down the options description 2023-11-22 10:49:51 +00:00
nicoo 3f5e19aaf3 nixos/systemd: Link manpages in options' description 2023-11-22 10:49:50 +00:00
nicoo f1b17edaea nixos/systemd: Refactor package option 2023-11-22 10:49:50 +00:00
nicoo aba2edda44 nixos/systemd: Refactor references to config.systemd 2023-11-22 10:49:50 +00:00
nicoo 667e7ca0bd nixos/systemd: refactor option definitions
- factor out `config.systemd.`;
- remove `lib.mdDoc` no-op.
2023-11-22 10:49:50 +00:00
datafoo 480f5b14e3 nixos/syncoid: add possibility to use string type for sshKey options
The sshKey options do not need to be a valid path at build time. Using
string instead allow use case when the path is not known at build time
such as when using systemd credentials (e.g. `sshKey =
"\${CREDENTIALS_DIRECTORY}/zfs-replication_ed25519";`).
2023-11-22 10:57:58 +01:00
Sarah Brofeldt cfe3ca1f2f nixos/apache-kafka: Add manual chapter 2023-11-22 06:47:09 +01:00
Sarah Brofeldt 45f84cdfd5 nixos/apache-kafka: structured settings
- Use lazyAttrs (for config references) settings for main server.properties.
- Drop dangerous default for "log.dirs"
- Drop apache-kafka homedir; unused and confusing
- Support formatting kraft logdirs
2023-11-22 06:47:08 +01:00
happysalada eb746540a9 nixos/clamav: run as clamav user not root 2023-11-22 03:08:30 +00:00
happysalada ef6b8ff15a nixos/clamav: use state and runtime directory 2023-11-22 03:08:30 +00:00
undefined b46ec2c40f
nixos/prometheus-mongodb-exporter: init module 2023-11-22 09:42:27 +08:00
Lassulus ac1a9af078
Merge pull request #267445 from RTUnreal/add-dynamic-pw-loading-factorio
factorio: add dynamic game-password and login credentials loading
2023-11-21 23:46:51 +01:00
RTUnreal decdfde011 improve documentation of new options 2023-11-21 20:52:30 +01:00
Vladimír Čunát 35a3cb94c6
Merge #269032: GNOME: 44 -> 45 2023-11-21 20:49:59 +01:00
RTUnreal 648ffcecae fix some errors 2023-11-21 20:29:43 +01:00
figsoda dc7b3febf8
23.11 beta release
Signed-off-by: figsoda <figsoda@pm.me>
2023-11-21 14:04:49 -05:00
ners ed31e0235e treewide: replace broken udev paths with systemd 2023-11-21 15:09:38 +01:00
Jan Tojnar b32a490b14 nixos/gnome: Do not install Photos
829b9aacc5
2023-11-21 09:21:55 +01:00
Bobby Rong 9b4a846409 nixos/xdg/portal: Fix link to portals.conf documentation
The original url is now 404.
Let's keep this link in sync with the one in doc/manpage-urls.json.
2023-11-21 08:42:55 +01:00
Bobby Rong fd788f9d1a nixos/wayland: Add xdg.portal.config or xdg.portal.configPackages
See the changes in x-d-p 1.17 for details.
2023-11-21 08:42:17 +01:00
Bobby Rong 39a1279b4d nixos/desktop-managers: Add xdg.portal.config or xdg.portal.configPackages
See the changes in x-d-p 1.17 for details.
2023-11-21 08:42:17 +01:00
Bobby Rong d7a8877d9d nixos/xdg/portal: Add config and configPackages option
In x-d-p 1.17, when no configs are given, you apps will likely not
able to find a backend. Let users aware of the changes.
2023-11-21 08:42:10 +01:00
Bobby Rong 511d457142 nixos/gnome: Replace eog with loupe
ad3b4ca520

Acked-by: Jan Tojnar <jtojnar@gmail.com>
2023-11-21 08:41:54 +01:00
Bobby Rong 14fb201c7c nixos/gnome: Replace cheese with snapshot
f2b0abe388

Acked-by: Jan Tojnar <jtojnar@gmail.com>
2023-11-21 08:41:50 +01:00
Bobby Rong 3bdcdae69d gnome.gnome-initial-setup: 44.0 → 45.beta
https://gitlab.gnome.org/GNOME/gnome-initial-setup/-/compare/44.0...45.beta

Install dconf presets: 0c607f104e

Use tecla: 3dcb8709ba

Changelog-reviewed-by: Bobby Rong <rjl931189261@126.com>
Changelog-reviewed-by: Jan Tojnar <jtojnar@gmail.com>
2023-11-21 08:41:32 +01:00
John Chadwick 412543ddd8 nixos/libvirtd: add support for nss modules 2023-11-21 01:39:02 -05:00
Atemu cfe0155154
Merge pull request #268324 from Janik-Haag/nixos-firewall-tool
nixos/firewall: install nixos-firewall-tool for iptables by default
2023-11-20 23:23:24 +01:00
Jonas Chevalier c57a434386
maintainers: remove the numtide team (#268684)
It doesn't really make sense for us as team members are focused on
different things. At the end of the day it's the individuals that do the
work.
2023-11-20 22:27:26 +01:00
Ryan Lahfa 5d08323dda
Merge pull request #268717 from SuperSandro2000/patch-2 2023-11-20 19:05:01 +01:00
Nick Cao 90ef10b571
Merge pull request #253918 from tie/centrifugo
centrifugo: init at 5.1.1
2023-11-20 08:59:54 -05:00
Sandro 809f926017
nixos/postgresql: fix mentioned settings in ensurePermissions warnings 2023-11-20 14:42:57 +01:00
Ivan Trubach 3be1aab86f centrifugo: init at 5.1.1 2023-11-20 10:18:21 +03:00
Ivan Trubach 5c898bec57 nixos/redis: loosen systemd address family restrictions
Do not assume that port and unixSocket are the only options that affect
address families used by Redis. There are other options, e.g. tls-port,
and also clustered setup that are not covered by the declarative
configuration. Instead of trying to selectively restrict unused address
families based on the configuration, limit address families to IP and
Unix sockets and let users lib.mkForce a stricter sandboxing is needed.

See also
https://docs.redis.com/latest/rs/networking/port-configurations/
2023-11-20 07:11:34 +03:00
Mario Rodas fa14a14694
Merge pull request #258036 from anthonyroussel/fix-ssm-seelog
nixos/amazon-ssm-agent: fix missing seelog.xml file
2023-11-19 18:55:57 -05:00
Mario Rodas c93541b24e
Merge pull request #264910 from anthonyroussel/ocsinventory-agent+nixos
nixos/ocsinventory-agent: init
2023-11-19 18:55:06 -05:00
Emily 1f9a04da3f
Merge pull request #265465 from jpds/caddy-restart-on-failure
nixos/caddy: Set systemd unit to restart on-failure
2023-11-19 23:59:20 +01:00
Artturi 0bd183e065
Merge pull request #268110 from tyxieblub/squid-service 2023-11-19 23:32:10 +02:00
Robert Hensing f3e9d7f84b darwin.linux-builder: Disable installer tools 2023-11-19 21:33:58 +01:00
Robert Hensing 64b587e3e2 nixos/system.disableInstallerTools: Do define options without effect
These won't cause anything to appear in toplevel.
2023-11-19 21:21:16 +01:00
Robert Hensing 66b2913797 darwin.linux-builder: Disable evaluation
A remote builder does not need to evaluate anything, so let's trim
it down to (eventually) save some space, and make the purpose of
the builder clear.

Users should evaluate on the host instead.
2023-11-19 21:06:32 +01:00
Artturi b736459b60
Merge pull request #260089 from anthonyroussel/thanos_0_32_4 2023-11-19 18:37:48 +02:00
Ryan Lahfa ff3b480354
Merge pull request #252117 from nalves599/252116-pixiecore-firewall 2023-11-19 16:16:54 +01:00
Ryan Lahfa cbd983e1cd
Merge pull request #266151 from JulienMalka/append-secret-reproducible 2023-11-19 16:16:01 +01:00
Adrian Pistol b30601bba2 nixos/chrony: Add missing rtcsync assertion.
Due to a lot of rebasing, I dropped my added assertion in #259405. This is important.
2023-11-19 09:08:26 -06:00
Mario Rodas d3deaacfb4
Merge pull request #263550 from anthonyroussel/updates/axis2
axis2: 1.7.9 -> 1.8.2, tomcat10: 10.0.27 -> 10.1.15, tomcat9: 9.0.75 -> 9.0.82
2023-11-19 09:39:19 -05:00
RTUnreal 20e9267cbb factorio: add dynamic server-settings loading 2023-11-18 22:18:03 +01:00
Ryan Lahfa 66a09f19cd
Merge pull request #267640 from Madouura/pr/bcachefs 2023-11-18 21:39:57 +01:00
Artturi 8896579a83
Merge pull request #264521 from stephen-huan/mullvad-vpn-resolvconf 2023-11-18 21:47:51 +02:00
Will Fancher b606ebb355
Merge pull request #266990 from ElvishJerricco/systemd-boot-boot-pass-flags-to-update
nixos/systemd-boot: pass EFI variable flags during update too
2023-11-18 12:34:10 -05:00
Patrick Steinhardt a8617e2b0d nixos/networkd: allow configuring AckFilter for CAKE qdisc
The CAKE section for systemd.network units allows configuring whether or
not redundant ACKs should be dropped. This option corresponds to the
respective tc-cake(8) params "ack-filter", "ack-filter-aggressive" or
"no-ack-filter".

Add support for these values in the `cakeConfig` module so that users
can configure it.
2023-11-19 03:40:51 +11:00
Janik H. fa9cdc83ab
nixos/firewall: install nixos-firewall-tool for iptables by default 2023-11-18 17:08:30 +01:00
Madoura 890cf0a79c
nixos/bcachefs: soft-deprecate 'linuxPackages_testing_bcachefs'
'bcachefs' is included in the linux kernel since 6.7-rc1
2023-11-18 09:58:51 -06:00
Nick Cao d936414252
Merge pull request #268132 from bendlas/forgejo-release-notes
nixos/forgejo/docs: fix typo
2023-11-18 09:39:29 -05:00
Madoura 0adbda28d3
nixos/bcachefs: remove 'with lib;' 2023-11-18 07:59:01 -06:00
Yang, Bo 6d69feb35e google-compute-image: add the missing /boot filesystem 2023-11-18 13:37:42 +01:00
emilylange b3e8dae766 nixos/forgejo: remove postgresql_15 permission work-around
This is no longer necessary as of
ccfe07c316.

Previously: b8585a119c.
2023-11-18 12:14:09 +01:00
Philip Taron bc7a939ced nixos/networkd: add [IPVLAN] and [IPVTAP] configuration options to systemd.netdev files
[IPVLAN](https://www.freedesktop.org/software/systemd/man/latest/systemd.netdev.html#%5BIPVLAN%5D%20Section%20Options)
[IPVTAP](https://www.freedesktop.org/software/systemd/man/latest/systemd.netdev.html#%5BIPVTAP%5D%20Section%20Options)
2023-11-18 08:43:21 +01:00
Philip Taron 7686f24675 nixos/networkd: add ipvtap kind to netdev and IPVTAP= to network
From `man systemd.netdev`: https://www.freedesktop.org/software/systemd/man/latest/systemd.netdev.html#Supported%20netdev%20kinds

From `man systemd.network`: https://www.freedesktop.org/software/systemd/man/latest/systemd.network.html#IPoIB=
2023-11-18 08:43:21 +01:00
Ryan Lahfa d3530f494c
Merge pull request #264358 from RaitoBezarius/drop-nodejs 2023-11-17 23:26:13 +01:00
Felix Buehler 7f9abdcfcb nixos/nextcloud: fix docu of packages 2023-11-17 23:16:23 +01:00
William McKinnon 869fb56797 nixos/syncthing: respect the dataDir option
The previous -home argument worked as such:
"Set common configuration and data directory. The default configuration directory is $HOME/.config/syncthing (Unix-like), $HOME/Library/Application Support/Syncthing (Mac) and %LOCALAPPDATA%\Syncthing (Windows)"

This resulted in syncthing not respecting different home and data dirs
declared in its config. The default behaviour will remain the same, as
we set the datadir default value to homeDir + .config/syncthing.
2023-11-17 22:58:46 +01:00
Julien Malka cac11727b3
Merge pull request #227588 from camillemndn/jitsi-meet
nixos/jitsi-meet: updated prosody, support secure domain setup and Excalidraw whiteboards
2023-11-17 22:08:05 +01:00
Adam C. Stephens 4b8d7d814e
Merge pull request #265556 from adamcstephens/slimserver/fix
slimserver: fix broken package
2023-11-17 15:47:26 -05:00
Raito Bezarius 72911a99d3 code-server: drop
Depends on Node.js 16 and cannot be trivially upgraded to Node.js 18.
2023-11-17 20:26:55 +01:00
Raito Bezarius 022ee4d701 kibana7: drop
Depends on EOL software and no maintenance has been attempted to change this after a ping
(https://github.com/NixOS/nixpkgs/issues/259178)
Feel free to adopt and re-introduce if you care about this software.

This will probably seriously hamper ELK usability in nixpkgs, but as it
receives no maintenance…
2023-11-17 20:26:55 +01:00
Ryan Lahfa 65481ecfef
Merge pull request #267985 from JulienMalka/absent-bootspec 2023-11-17 18:07:10 +01:00
Ryan Lahfa ccfe07c316
Merge pull request #266270 from Ma27/postgresql-ownership-15 2023-11-17 18:02:17 +01:00
Herwig Hochleitner 8c441fc2a7 nixos/forgejo/docs: fix typo 2023-11-17 17:18:57 +01:00
Herwig Hochleitner e7c7d97167
nixos/postgresql: document psql 15 changes (#267238)
* nixos/postgresql: document psql 15 changes

* nixos/postgresql: manual heading ids

* nixos/postgresql: reword warning against initialScript

Co-authored-by: Ryan Lahfa <masterancpp@gmail.com>

* nixos/postgresql: wording PERMISSIONS -> PRIVILEGES

Co-authored-by: Ryan Lahfa <masterancpp@gmail.com>

* nixos/postgresql: document intermediate oneshot / service user method

* nixos/postgresql/docs: clarify security benefits of `ensureDBOwnership`

* nixos/postgresql/docs: service type -> serviceConfig.Type

---------

Co-authored-by: Ryan Lahfa <masterancpp@gmail.com>
2023-11-17 16:06:01 +01:00
Herwig Hochleitner 20832d5995
nixos/forgejo: changelog and migration instructions (#267248)
* nixos/forgejo: changelog and migration instructions

* nixos/forgejo/docs: clarify sentence

Co-authored-by: Trolli Schmittlauch <schmittlauch@users.noreply.github.com>

* nixos/forgejo/docs: document migration via gitea impersonation

* nixos/forgejo/docs: note about url change on migration

* nixos/forgejo/docs: note about migration (non-)requirement

* nixos/forgejo/docs: header ids

* nixos/forgejo/docs: clarify release notes entry

Co-authored-by: Emily <git@emilylange.de>

* nixos/forgejo/docs: improve manual entry

Co-authored-by: Emily <git@emilylange.de>

* nixos/forgejo/docs: move changelog line to the middle of the section

as noted <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->

---------

Co-authored-by: Trolli Schmittlauch <schmittlauch@users.noreply.github.com>
Co-authored-by: Emily <git@emilylange.de>
2023-11-17 15:55:24 +01:00
Raito Bezarius 10baca4935 nixos/invidious: do not use ensureDBOwnership
Invidious uses a strange setup where the database name is different from the system username
for non-explicit reasons.

Because of that, it makes it hard to migrate it to use `ensureDBOwnership`, we leave it to Invidious' maintainers
to pick up the pieces.
2023-11-17 15:53:08 +01:00
Raito Bezarius f653734c4d nixos/mobilizon: do not use ensureDBOwnership
Mobilizon can have a custom database username and it is not trivial to sort out how to remove this.

In the meantime, for the upcoming 23.11 release, I apply the classical workaround
and defer to Mobilizon's maintainers.
2023-11-17 15:52:51 +01:00
Raito Bezarius 7cd63bff21 nixos/sourcehut: do not use ensureDBOwnership
Given that SourceHut uses unfortunate defaults for database name, it will not
be realistic to fix this in time for 23.11.

We will leave the workaround and leave it to SourceHut maintainers to pick up the work
to clean this up after 23.11.
2023-11-17 15:52:51 +01:00
Julien Malka 81e378618e
nixos/systemd-boot: allow for bootspec-less generations
Generation built with old versions of NixOS with no bootspec
support may still be present on the system and must be
accounted for.
2023-11-17 14:39:04 +01:00
Adam Stephens 431b9f23ad
slimserver: add bin symlink and meta.mainProgram 2023-11-17 08:18:32 -05:00
joris 18f3c1fb55 services/squid: explicit usage of coreutils' kill on ExecReload 2023-11-17 13:55:21 +01:00
fortuneteller2k d3c568b7bc maintainers: fortuneteller2k -> moni 2023-11-17 18:03:27 +08:00
Ilan Joselevich d7e7a2136e
Merge pull request #267761 from jpds/grafana-restart-on-failure
nixos/grafana: Set systemd unit to restart on failure
2023-11-17 00:59:25 +00:00
github-actions[bot] dba5c9ef4e
Merge master into staging-next 2023-11-16 18:01:17 +00:00
Pol Dellaiera 3acc2484cf
Merge pull request #267560 from anthonyroussel/bugfix/plantuml-server-nixos
nixos/plantuml-server: fix
2023-11-16 18:32:44 +01:00
Kim Lindberger 9c4df4d618
Merge pull request #246992 from cransom/cransom-parsedmarc-smtp
nixos/parsedmarc: fix validation for smtp
2023-11-16 15:06:20 +01:00
github-actions[bot] 301fcc69ba
Merge master into staging-next 2023-11-16 12:01:02 +00:00
Sarah Brofeldt 54f00576aa
Merge pull request #265193 from 0z13/opensearch-module-link-plugins
nixos/opensearch: link plugins from opensearch package
2023-11-16 11:30:09 +01:00
Vladimír Čunát 0fe5300699
Merge branch 'master' into staging-next 2023-11-16 09:49:24 +01:00
Lin Jian bf8a6ad72c
Merge pull request #265733 from nbdd0121/unbound
nixos/unbound: fix wrong syscall filter and tighten sandbox
2023-11-16 14:38:46 +08:00
Jonathan Davies 58cbf94b38 nixos/grafana: Set systemd unit to restart on failure 2023-11-15 23:20:59 +00:00
Adrian Pistol 7a1d45811e nixos/chrony: Let Chrony control/track RTC drift 2023-11-15 15:09:22 -06:00
Weijia Wang 1a85914512
Merge pull request #266528 from lucasbergman/unifi-jvmoptions
nixos/unifi: Add the ability to specify extra JVM options
2023-11-15 17:53:25 +01:00
Anthony Roussel 8c7c1e7a30
nixos/plantuml-server: remove deprecated allowPlantumlInclude option
See https://github.com/plantuml/plantuml-server/pull/301
2023-11-15 15:14:28 +01:00
Anthony Roussel deae39af43
nixos/plantuml-server: use jetty_11
PlantUML Server does not support Jetty versions higher than 12.x.

Jetty 12.x has introduced major breaking changes, see
* https://github.com/jetty/jetty.project/releases/tag/jetty-12.0.0
* https://eclipse.dev/jetty/documentation/jetty-12/programming-guide/index.html#pg-migration-11-to-12
2023-11-15 15:14:28 +01:00
Anthony Roussel 2c94d267c2
nixos/plantuml-server: use mkPackageOptionMD 2023-11-15 15:12:58 +01:00
Anthony Roussel 3b17b80525
nixos/plantuml-server: add anthonyroussel to maintainers 2023-11-15 15:12:58 +01:00
Anthony Roussel 09e9d47508
nixos/plantuml-server: add hardening 2023-11-15 15:12:58 +01:00
Anthony Roussel e3839eef71
nixos/plantuml-server: remove with lib; notation
https://nix.dev/guides/best-practices#with-scopes
2023-11-15 15:12:58 +01:00
Izorkin 63ed35dac4 nixos/mastodon: update elasticsearch configuration 2023-11-15 14:01:47 +01:00
github-actions[bot] eba04b3485
Merge master into staging-next 2023-11-15 12:01:18 +00:00
Ryan Lahfa 75fbff2576
Merge pull request #263442 from JulienMalka/systemd-boot-bootspec 2023-11-15 08:40:19 +01:00
Vladimír Čunát c46eae0f35
Merge branch 'master' into staging-next 2023-11-15 07:33:10 +01:00
Samuel Dionne-Riel 3d88cc85dd
Merge pull request #262595 from tpwrules/fix-extra-config-documentation
nixos/kernel: correct kernelPatches.extraConfig documentation
2023-11-14 22:40:04 -05:00
Ryan Lahfa d983d6c863
Merge pull request #251950 from erictapen/mastodon 2023-11-15 01:46:50 +01:00
zzywysm 3f4c802d26 initrd/autofs4: remove legacy references to autofs4 kernel module
Back in 2018, the kernel decided to remove the autofs4 module.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2225d931f75ddd3c39f4d0d195fad99dfd68671

This caused immediate problems with systemd, so the kernel allowed autofs4 as a config option that would simply map back to autofs.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d02d21ea007b6b33cdaf15c2f84fb1fea996ecc2

Earlier this year, in July 2023, the kernel got tired of people not adapting to the autofs change, and forced the issue by fixing it within the kernel defconfigs, which NixOS uses as a starting point for their own kernel configs.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f2190d6b7112d22d3f8dfeca16a2f6a2f51444e

This commit reflects the post-2018 reality by changing the remaining autofs4 references to autofs. Since this change initially happened in kernel 4.18 and we no longer support 4.x kernels, we don't need any backwards-compatibility tweaks.
2023-11-14 15:37:50 -05:00
Kerstin Humm c82195d9e8
mastodon: 4.1.6 -> 4.2.1
- run streaming processes in separate systemd services
- remove redundancy in test
- fix update script
- release notes

See https://github.com/mastodon/mastodon/releases/tag/v4.2.1 for details
2023-11-14 21:13:46 +01:00
Julien Malka 372d07dc29 nixos/systemd-boot: conform backend to RFC-0125
Now the builder is using Bootspec documents.
2023-11-14 20:37:07 +01:00
Léo Gaspard b1c25de57b
nixos/acme: do not eat Let's Encrypt's request limits if misconfigured on first try (#266155) 2023-11-14 20:29:50 +01:00
Yang, Bo bff548fef1 waagent: enable provisioning 2023-11-14 19:47:27 +01:00
Nathan Henrie 6c69d3c9ca nixos/navidrome: add openFirewall option
This adds an option to the navidrome module to open the configured TCP
port in the firewall.
2023-11-14 19:29:08 +01:00
github-actions[bot] 6cc772a6fa
Merge master into staging-next 2023-11-14 18:01:11 +00:00
Pierre Bourdon 68367e66e1
Merge pull request #267037 from nbraud/nixos/sudo/assertion
nixos/sudo: Update `cfg.package` assertion
2023-11-14 17:26:08 +01:00
Jonathan Zielinski aca76b750d nixos/opensearch: link plugins from opensearch package
disable security module by default, it crashes unit expecting
certificates.
2023-11-14 14:00:30 +01:00
nicoo d5a8e667d2 nixos/sudo: Update assertion message 2023-11-14 12:25:55 +00:00
Martin Weinelt 3c336a1647
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
- pkgs/development/libraries/gdcm/default.nix
2023-11-14 13:16:34 +01:00
Tomas Antonio Lopez 5476b490d4 nixos/sourcehut: compile and integrate paste.sr.ht API component 2023-11-14 11:12:14 +01:00
Niklas Hambüchen f9c7c12de6
Merge pull request #266702 from nh2/plausible-listen-address-no-distributed-erlang
plausible, nixos/plausible: Add `listenAddress` option
2023-11-14 10:52:21 +01:00
Niklas Hambüchen 65a471717c plausible, nixos/plausible: Add listenAddress option.
This changes

* the plausible HTTP web server

to be listening on localhost only, explicitly.

This makes Plausible have an explicit safe default configuration,
like all other networked services in NixOS.

For background discussion, see: https://github.com/NixOS/nixpkgs/issues/130244

As per my upstream Plausible contribution
(https://github.com/plausible/analytics/pull/1190)
Plausible >= 1.5 also defaults to listening to localhost only;
nevertheless, this default should be stated explicitly in nixpkgs
for easier review and independence from upstream changes, and
a NixOS user must be able to configure the
`listenAddress`, as there are valid use cases for that.

Also, disable

* the Erlang Beam VM inter-node RPC port
* the Erlang EPMD port

because Plausible does not use them (see added comment).
This is done by setting `RELEASE_DISTRIBUTION=none`.

Thus, this commit also removes the NixOS setting `releaseCookiePath`,
because it now has no effect.
2023-11-14 10:51:16 +01:00
Jörg Thalheim 54fd866569 nixos/harmonia: set extra-allowed-users
This fixes the case where users enable harmonia but also have allowed-users set.
Having extra-allowed-users is a no-op when nix.settings.allowed-users is set to "*" (the default)
2023-11-14 10:37:39 +01:00
Silvan Mosberger 3e5bc28ec5
Merge pull request #266598 from infinisil/fix-fwupd
nixos/fwupd: Fix fwupd-refresh service
2023-11-14 08:56:25 +01:00
github-actions[bot] 6a7c026ba7
Merge master into staging-next 2023-11-14 06:01:03 +00:00
eyjhb 2387a37fa0 nixos/flexget: remove TZ envvar 2023-11-14 06:35:40 +01:00
github-actions[bot] 772c3bbbf5
Merge master into staging-next 2023-11-14 00:02:14 +00:00
Felix Bühler f2fc5b4195
Merge pull request #265696 from Stunkymonkey/nixos-exportarr
nixos/exportarr: init
2023-11-13 22:58:32 +01:00
Fabián Heredia Montiel 884449105e Merge remote-tracking branch 'origin/master' into staging-next 2023-11-13 14:31:51 -06:00
Raito Bezarius d57926c0b6 nixos/postgresql: improve the assertions for equality of DB user and DB name
It is hard to figure out which one is offending without the database name.
2023-11-13 17:16:25 +01:00
Raito Bezarius 12797a6a39 nixos/postgresql: restore ensurePermissions and strong-deprecate it
As it is technically a breaking change, we should at least make a strong deprecation
of `ensurePermissions` and leave it in the broken state it is, for out of tree users.

We give them a 6 months notice to migrate away by doing so, which is honest.
In the meantime, we forbid usage of `ensurePermissions` inside of nixpkgs.
2023-11-13 17:16:25 +01:00
Maximilian Bosch 48459567ae nixos/postgresql: drop ensurePermissions, fix ensureUsers for postgresql15
Closes #216989

First of all, a bit of context: in PostgreSQL, newly created users don't
have the CREATE privilege on the public schema of a database even with
`ALL PRIVILEGES` granted via `ensurePermissions` which is how most of
the DB users are currently set up "declaratively"[1]. This means e.g. a
freshly deployed Nextcloud service will break early because Nextcloud
itself cannot CREATE any tables in the public schema anymore.

The other issue here is that `ensurePermissions` is a mere hack. It's
effectively a mixture of SQL code (e.g. `DATABASE foo` is relying on how
a value is substituted in a query. You'd have to parse a subset of SQL
to actually know which object are permissions granted to for a user).

After analyzing the existing modules I realized that in every case with
a single exception[2] the UNIX system user is equal to the db user is
equal to the db name and I don't see a compelling reason why people
would change that in 99% of the cases. In fact, some modules would even
break if you'd change that because the declarations of the system user &
the db user are mixed up[3].

So I decided to go with something new which restricts the ways to use
`ensure*` options rather than expanding those[4]. Effectively this means
that

* The DB user _must_ be equal to the DB name.
* Permissions are granted via `ensureDBOwnerhip` for an attribute-set in
  `ensureUsers`. That way, the user is actually the owner and can
  perform `CREATE`.
* For such a postgres user, a database must be declared in
  `ensureDatabases`.

For anything else, a custom state management should be implemented. This
can either be `initialScript`, doing it manual, outside of the module or
by implementing proper state management for postgresql[5], but the
current state of `ensure*` isn't even declarative, but a convergent tool
which is what Nix actually claims to _not_ do.

Regarding existing setups: there are effectively two options:

* Leave everything as-is (assuming that system user == db user == db
  name): then the DB user will automatically become the DB owner and
  everything else stays the same.

* Drop the `createDatabase = true;` declarations: nothing will change
  because a removal of `ensure*` statements is ignored, so it doesn't
  matter at all whether this option is kept after the first deploy (and
  later on you'd usually restore from backups anyways).

  The DB user isn't the owner of the DB then, but for an existing setup
  this is irrelevant because CREATE on the public schema isn't revoked
  from existing users (only not granted for new users).

[1] not really declarative though because removals of these statements
    are simply ignored for instance: https://github.com/NixOS/nixpkgs/issues/206467
[2] `services.invidious`: I removed the `ensure*` part temporarily
    because it IMHO falls into the category "manage the state on your
    own" (see the commit message). See also
    https://github.com/NixOS/nixpkgs/pull/265857
[3] e.g. roundcube had `"DATABASE ${cfg.database.username}" = "ALL PRIVILEGES";`
[4] As opposed to other changes that are considered a potential fix, but
    also add more things like collation for DBs or passwords that are
    _never_ touched again when changing those.
[5] As suggested in e.g. https://github.com/NixOS/nixpkgs/issues/206467
2023-11-13 17:16:25 +01:00
Molly Miller 9cec5c807a nixos/mailman: restart services on failure and increase mailman timeouts 2023-11-13 16:10:55 +01:00
Ryan Lahfa 8f1753206f
Merge pull request #267093 from ElvishJerricco/testing-backdoor-fix-ordering 2023-11-13 15:07:48 +01:00
Fabian Möller cd631134df AusweisApp2: 1.26.7 -> 2.0.1 2023-11-13 13:43:39 +01:00
Jonas Heinrich 4f38dbab82
Merge pull request #266025 from onny/cups-firewall2
nixos/printing: Fix openFirewall option
2023-11-13 11:15:18 +01:00
dadada f192930a79
nixos/soft-serve: fix typos in option descriptions 2023-11-12 22:34:54 +01:00
Will Fancher 1a2f2cf95d nixos/test-instrumentation: Fix backdoor ordering
In #256226, `backdoor.service` was changed to be part of
`sysinit.target` instead of having default dependencies. This broke
several tests that relied on `backdoor.service` starting after default
targets. For example, `systemd-boot.update` expects `/boot` to be
mounted as soon as the backdoor is running.

These tests really ought to be declaring their dependencies properly
with things like `machine.wait_for_unit("local-fs.target")`, because
it's useful for the backdoor to start as early as possible. But for
now, let's just order it the way it was before in stage 2, and use the
earlier ordering in the new stage 1 context.
2023-11-12 15:04:38 -05:00
Weijia Wang 74d102ce50 Merge branch 'master' into staging-next 2023-11-12 19:45:20 +01:00
Gaurav Juvekar 5ab4ce5d33 nixos/network-interfaces: fix typo in networking.fqdn 2023-11-12 08:47:01 -08:00
Jörg Thalheim 44cf4801c0 nixos/nix-serve: also set extra-allowed-users
This fixes the case where users enable nix-serve but also have allowed-users set.
Having extra-allowed-users is a no-op when nix.settings.allowed-users is set to "*" (the default)
2023-11-12 14:09:31 +01:00
Anthony Roussel d4d6602ce3
nixos/thanos: remove with lib; notation
https://nix.dev/guides/best-practices#with-scopes
2023-11-12 11:21:47 +01:00
Anthony Roussel 65be712043
nixos/thanos: use mkPackageOptionMD 2023-11-12 11:08:53 +01:00
Anthony Roussel 9abb2a2116
nixos/thanos: remove deprecations
* replaced store.grpc.series-sample-limit by store.limits.request-samples
* replaced query.replica-label by query.replica-labels
* replaced store.addresses by endpoints
* removed block-sync-concurrency (removed upstream)
2023-11-12 11:08:52 +01:00
Anthony Roussel abed24c0d6
nixos/thanos: fix documentation 2023-11-12 11:08:52 +01:00
Anthony Roussel 312e7f8ae0
nixos/thanos: add ExecReload command to SystemD services 2023-11-12 11:08:52 +01:00
Anthony Roussel 0d9bef343b
nixos/thanos: fix services.thanos.receive.labels config 2023-11-12 11:08:51 +01:00
Anthony Roussel 2074409c86
nixos/thanos: add query-frontend SystemD service 2023-11-12 11:08:51 +01:00
Thomas Watson ca84c463b9 nixos/systemd-boot: pass EFI variable flags during update too
8f2babd032 was partially reverted by mistake. Original message below

---

On some systems, EFI variables are not supported or otherwise wonky.
bootctl attempting to access them causes failures during bootloader
installations and updates. For such systems, NixOS provides the options
`boot.loader.efi.canTouchEfiVariables` and
`boot.loader.systemd-boot.graceful` which pass flags to bootctl that
change whether and how EFI variables are accessed.

Previously, these flags were only passed to bootctl during an install
operation. However, they also apply during an update operation, which
can cause the same sorts of errors. This change passes the flags during
update operations as well to prevent those errors.

Fixes https://github.com/NixOS/nixpkgs/issues/151336
2023-11-12 02:07:25 -05:00
Lucas Bergman 07828dc05b nixos/unifi: Add extraJvmOptions option
This can be useful for adding extra logging, tweaking garbage collector
parameters, and for using JMX to monitor the JVM.
2023-11-12 00:38:10 +00:00
Lucas Bergman 50ff8ff3f9 nixos/unifi: Switch command line args to a list
There's no functionality change here, but this makes it a bit more
convenient to add more args.
2023-11-12 00:32:50 +00:00
Lucas Bergman 2bc02c0383 nixos/unifi: Clean up formatting
This removes "with lib", which advances #208242 a bit, and cleans up a few
formatting nits found by nixfmt.
2023-11-12 00:28:40 +00:00
github-actions[bot] 33248a2caf
Merge master into staging-next 2023-11-12 00:02:14 +00:00
tomberek 7859adb9d6
Merge pull request #245394 from christoph-heiss/pkgs/sourcehut
sourcehut: update all component; lots of fixes
2023-11-11 13:42:19 -05:00
github-actions[bot] 9776723357
Merge master into staging-next 2023-11-11 18:00:58 +00:00
Maciej Krüger e9a5bf8ae4
Merge pull request #265712 from nbraud/nixos/sudo-rs/akkoma 2023-11-11 18:10:25 +01:00
Maciej Krüger 9c61d268a7
Merge pull request #265727 from nbraud/nixos/sudo-rs/google_oslogin 2023-11-11 18:09:39 +01:00
Maciej Krüger c647a12d7f
Merge pull request #265725 from nbraud/nixos/sudo-rs/gce 2023-11-11 18:09:20 +01:00