Commit graph

39113 commits

Author SHA1 Message Date
Will Fancher 4b3b18a44f
nixos/systemd-boot: refactor json.load() logic for better error message (#421916) 2025-07-27 23:08:42 -04:00
0x4A6F 70a3b2b965
nixos/hardware.fw-fanctrl: add package option and refactor using lib.attrsets.recursiveUpdate (#428029) 2025-07-27 20:53:43 +02:00
Mirza Arnaut 15ad26705b nixos/hardware.fw-fanctrl: add package option and refactor using lib.attrsets.recursiveUpdate
Typically services have a `package` option, so it can be set externally
if users are running the stable version but want the package from
unstable, or devs want to test a package from their flake in production.
Really useful in many situations!

Also, the previous implementation was using `pkgs.runCommand` which is
discouraged due to
[IFD](https://nix.dev/manual/nix/2.26/language/import-from-derivation)
(import from derivation) leading to potential slowdowns during
evaluation. I opted for reading the json file and using
[lib.attrsets.recursiveUpdate](https://ryantm.github.io/nixpkgs/functions/library/attrsets/#function-library-lib.attrsets.recursiveUpdate)
to update the default values with the user provided ones.
2025-07-27 19:12:59 +02:00
dish 2fce3f695f
stalwart-mail: 0.12.4 -> 0.13.1, stalwart-mail-webadmin: 0.1.28 -> 0.1.31 (#425489) 2025-07-27 10:36:37 -04:00
jack dedf852ccd nixos/systemd-boot: refactor json.load() logic for better error message 2025-07-27 13:05:03 +02:00
Ryan Horiguchi 62d7be2954
nixos/netdata: fix module when withSystemdJournal = false 2025-07-27 07:32:56 +02:00
Emily 51a41ce9a1
installer/nixos-generate-config: remove broadcom_sta (#426831) 2025-07-27 05:35:35 +01:00
Sandro 9e7a4f4d11
nixos/libretranslate: init (#243050) 2025-07-27 04:44:01 +02:00
Izorkin cbec672b38
nixos/libretranslate: init 2025-07-27 03:46:22 +02:00
NullCube 9c9f467d49 installer/nixos-generate-config: remove broadcom_sta
Resolves the installer failing on devices that include this hardware, as
broadcom_sta was marked as insecure due to being unmaintained and having
active CVE's.

This commit be reverted when/if the installer has a mechanism for allowing
insecure packages.
2025-07-26 18:37:53 -07:00
@norpol 124c3f4850 stalwart-mail: add v0.13.x breaking change notice 2025-07-26 23:50:55 +01:00
Ryan Horiguchi 51b0961214 nixos/dnsmasq: add config option to retrive config file path 2025-07-27 00:49:28 +02:00
Sandro c18c9b0fd3
nixos/tandoor-recipes: fix database management script (#424899) 2025-07-27 00:21:17 +02:00
Florian Klink e9df8b4e2f
nixos/systemd: run0: enable setLoginUid, disable pamMount (#428459) 2025-07-26 19:51:50 +02:00
Sandro a9b0143df6
speedify: init at 15.6.4-12495 (#415937) 2025-07-26 13:20:51 +02:00
isabel 3fca333186
nixos/bees: ensure that hashtable can be locked into memory (#388422) 2025-07-26 10:02:49 +01:00
Aleksana 4a915a2d6f
nixos/minecraft-server: revert typo (#428487) 2025-07-26 16:03:27 +08:00
Andrew Kvalheim 1a8725be71 nixos/minecraft-server: revert typo
Partially reverts e03123d508
2025-07-25 18:11:04 -07:00
Sandro ce6b0611ca
searxng: 0-unstable-2025-07-16 -> 0-unstable-2025-07-18 (#426391) 2025-07-26 02:21:09 +02:00
Philip Taron d392f98f00
services.openssh: use notify-reload for sshd (#427620) 2025-07-25 16:02:49 -07:00
Grimmauld fb51cc802d
nixos/systemd: run0: enable setLoginUid, disable pamMount
This brings our `run0` in line with the upstream defaults:
bcc73cafdb/src/run/systemd-run0.in

While working on `auditd`, i noticed differences in how `run0` behaves
in regard to `/proc/$pid/sessionid` and `/proc/$pid/loginuid`. Particularly,
both files were set to `4294967295`, the magic value denoting `unset`.

While the manual page says elevators such as sudo should not set the loginuid,
run0 is a bit of a special case: The unit spawned by it is not child of
the running user session, and as such there is no id to inherit.

`systemd` upstream uses `pam_loginuid`, and for consistency we should too.
Especially because it prevents a whole lot of pain when working with `auditd`.

As to pam mounts:
On nixos we enable those if they are globally enabled. Upstream does not.
Considering the password entered into polkit is usually not the user password
of the account which will own the unit, pam mount will fail for any partition
which requires a password. Thus it makes sense to also disable pam mounts
for our run0, it prevents unnecessary unexpected pain.
2025-07-25 23:49:59 +02:00
Cosima Neidahl 009450ee9e
nixos/peertube-runner: init module (#427007) 2025-07-25 21:28:22 +02:00
Martin Weinelt 09d976e1fb
nixos/frigate: don't clear model cache (#427874) 2025-07-25 18:41:35 +02:00
Felix Bargfeldt be9ccdb653
nixos/grafana: add openFirewall (#350700) 2025-07-25 18:12:08 +02:00
June Stepp f200c10c8a
nixos/peertube-runner: init module 2025-07-25 10:58:04 -05:00
Martin Weinelt 62b08a9af8
kea: 2.6.2 -> 2.6.3 (#411875) 2025-07-25 16:01:32 +02:00
Marc Plano-Lesay 0d25584641
nixos/kanidm: accept originUrls following rfc8252 (#428204) 2025-07-25 20:41:26 +08:00
Martin Weinelt fde8885198
kea: 2.6.2 -> 2.6.3
https://downloads.isc.org/isc/kea/2.6.3/Kea-2.6.3-ReleaseNotes.txt

https://kb.isc.org/docs/cve-2025-32801
https://kb.isc.org/docs/cve-2025-32802
https://kb.isc.org/docs/cve-2025-32803

Fixes: CVE-2025-32801, CVE-2025-32802, CVE-2025-32803
2025-07-25 14:12:39 +02:00
Zahrun 1c26e0e7a9 speedify: init at 15.6.4-12495
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
Co-authored-by: emaryn <197520219+emaryn@users.noreply.github.com>
2025-07-25 15:54:44 +05:30
diniamo 5bb944c6f5 nixos/grafana: add openFirewall option 2025-07-25 10:02:17 +02:00
lassulus 04009c667d
fw-fanctrl: set default strategies (#426756) 2025-07-25 07:54:28 +02:00
Jade Lovelace 4f93d9a2d1 mx-puppet-discord: remove
According to emilazy these were the only usages of sha1 in nixpkgs:

```
pkgs/servers/mx-puppet-discord/node-packages.nix
111:        sha1 = "532e01241dbcb0f2769f1b9a7cde313d30101173";
120:        sha1 = "68018cab4f59834b3fef2e59fbfd52938403e001";
129:        sha1 = "52b0e8bb808a1202602899af67939b049dd42402";
138:        sha1 = "0a37a3f9430ff7c29512d29882e25ae738a31283";
```

Anyone motivated to maintain it can feel free to restore this, it's just
not maintained at the moment, and the sha1 hashes need to go.

This was found after Ericson proposed implementing something like
https://github.com/NixOS/nix/issues/13544 in Lix, which led to the
question "who is using sha1 anyway?" and the realization we could just
*remove* support for it outside of .. the known chromium crimes.
2025-07-24 19:31:06 -07:00
Sandro Jäckel 04e7d4607d
searxng: 0-unstable-2025-07-16 -> 0-unstable-2025-07-18 2025-07-24 22:55:01 +02:00
Sandro 9928a21a4e
nixos/mautrix-whatsapp: upgrade default config (#420722) 2025-07-24 22:09:34 +02:00
Kabbone 65a1a7985a
nixos/mautrix-whatsapp: adapt to new config file format 2025-07-24 21:42:08 +02:00
6543 b6088b0d8e nixos/nextcloud: remove with lib usage 2025-07-24 17:00:10 +02:00
Robert Hensing f5ee08446a
Modular services (#372170) 2025-07-24 16:46:34 +02:00
Maximilian Bosch 5d30429bbf
Merge: nixos/nextcloud: move phpPackage default into option (#423792) 2025-07-24 16:31:49 +02:00
Mikael Voss 5e6d2501da
nixos/bees: ensure that hashtable can be locked into memory 2025-07-24 15:14:28 +02:00
Philip Taron 71d8c89d62
qemu-vm: create erofs with hard-dereference flag (#395494) 2025-07-24 05:32:39 -07:00
Wolfgang Walther 5a0711127c
treewide: run nixfmt 1.0.0 2025-07-24 13:55:40 +02:00
Wolfgang Walther 62fe016519
treewide: run treefmt with mdcr/nixfmt 2025-07-24 13:52:31 +02:00
Wolfgang Walther 6c47e7d5da
treewide: fix syntax errors in nix code blocks
Fixes all code blocks with "nix" language in markdown files for syntax
errors to be able to run nixfmt in the next step.
2025-07-24 13:52:29 +02:00
Paul Meyer bd184be272 qemu-vm: create erofs with hard-dereference flag
This will ensure reproducibility between different nixos systems, where
one system has store optimization enabled (which will hardling similar
files in the nix store) and the other doesn't. Without the flag, the
same image, built on the two different systems, will have a different
number of inodes. The flag will dereference hardlinks and copy them
into the image as different inodes.

Signed-off-by: Paul Meyer <katexochen0@gmail.com>
2025-07-24 07:46:37 +02:00
Martin Weinelt e48d12554c
nixos/tlsrpt: fix permissions for postfix
Same as with other services giving postfix access, this needs to happen
for the postfix user. Adding supplementary group permissions to the
systemd unit does not propagate to child processes that ultimately call
the unix domain socket.
2025-07-24 02:29:54 +02:00
Martin Weinelt cb4fd4e3ca
nixos/frigate: don't clear model cache
Upstream stores the model cache in the config directory, which is
unnecessarily messy. The cache directory is still the correct place for
these, since they can be pruned and redownloaded, we just don't want it
to happen on every restart.

Fixes: #427714
2025-07-23 23:27:46 +02:00
Michele Guerini Rocco 2e7f98d013
nixos/searx: use envsubst instead of sed for reading environment variables (#419149) 2025-07-23 22:21:01 +02:00
0x4A6F bb46a07699
fw-fanctrl: set default strategies
- fixes #426282

- current implementation breaks generation of strategies,
  when strategies are not defined by user.

- minimal working config with `strategies.default = null`:
```nix
  hardware.fw-fanctrl = {
    enable = true;
    config.strategies = { };
  };
```

- User should be able to start the service, when only `hardware.fw-fanctrl.enable`
  is enabled.
2025-07-23 20:42:01 +02:00
Felix Bargfeldt 4c6641db92
nixos/alertmanager-ntfy: improve documentation about topic option (#426956) 2025-07-23 19:35:42 +02:00
Maximilian Bosch 0bb1514207
nixos/alertmanager-ntfy: improve documentation about topic option
This cannot be left unset, otherwise the evaluation would fail. However,
it should be treated as secret. Update description to reflect that.
2025-07-23 18:51:19 +02:00