Commit graph

2193 commits

Author SHA1 Message Date
Jonas Heinrich 46e424a858
nixos/dokuwiki: Remove unused enable option (#391057) 2025-03-24 10:30:51 +01:00
Robert Helgesson ee04cf23b6 nixos/grav: clean up PHP extensions
Specifically, simply add the extensions that are not already part of
the default `enabled` set.
2025-03-24 10:09:27 +01:00
Jonas Heinrich 82a382ed09
nixos/keycloak: add realmFiles option (#273833) 2025-03-24 09:35:04 +01:00
Weijia Wang 367cbed935
nixos/kimai: ensure that our local.yaml is valid on init time (#371919) 2025-03-23 20:23:59 +01:00
Weijia Wang 86e6f70e1d
nixos/kimai: fix an error on first init after an upgrade (#371917) 2025-03-23 20:23:44 +01:00
Sandro 9f2544d0ea
nixos/wakapi: harden systemd service (#389534) 2025-03-20 17:48:34 +01:00
Kerstin 72cda846bf
nixos/mobilizon: create sitemap directory (#391389) 2025-03-20 14:35:36 +01:00
Robert Rose cd10f9a874 nixos/keycloak: add realmFiles option
Add an option to import Keycloak realms during
startup from exported realm files.
2025-03-20 12:07:38 +01:00
Sandro Jäckel c317d5e222
nixos/mobilizon: create sitemap directory
Mar 19 21:35:05 mobilizon mobilizon[1324]: 21:35:05.504 [info] {"args":{},"attempt":19,"duration":130905,"error":"** (File.Error) could not write to file \"/var/lib/mobilizon/sitemap/sitemap-00001.xml\": no such file or directory","event":"job:exception","id":178203,"max_attempts":20,"meta":{},"queue":"background","queue_time":510620016,"source":"oban","state":"failure","tags":[],"worker":"Mobilizon.Service.Workers.BuildSiteMap"}
2025-03-19 22:52:48 +01:00
Sandro ddef00d3f0
nixos/zipline: improve systemd hardening (#387119) 2025-03-19 19:01:37 +01:00
Sandro 1289c91409
nixos/echoip: improve systemd hardening (#387466) 2025-03-19 19:00:27 +01:00
Defelo ef19fcf725
nixos/zipline: improve systemd hardening 2025-03-19 18:16:01 +01:00
e1mo 100559d83c
nixos/dokuwiki: Remove unused enable option
The option has been added in 50029ed89c
but never had any effect. As far as I could tell, it was only added for
backward compatibility. I think it's safe to remove this after 3+ years.

I opted for removal instead of implementing it since the module will
just do nothing if no site is configure, thus no enable / disable switch
is needed. Especially on a per-site level.
2025-03-18 20:36:09 +01:00
Sandro 326cd70480
nixos/movim: improve systemd dependency directives (#388750) 2025-03-18 17:42:52 +01:00
Pol Dellaiera ad9f51048b
nixos/flarum: restart on package update (#389453) 2025-03-16 07:28:51 +01:00
Pol Dellaiera b29c5b7119
treewide: add documentation for nixos systemd units (#389283) 2025-03-15 21:30:08 +01:00
jrdsgl 38590f303b
nixos/changedetection-io: fix typo (#383539)
Update changedetection-io.nix

typo correction variables
2025-03-15 10:59:05 +01:00
โทสฺตัล 521d3689fb nixos/movim: move phpExecutionUnit service in requires order 2025-03-15 16:25:53 +07:00
โทสฺตัล 02600c4ac5 nixos/movim: improve systemd dependency directives 2025-03-15 16:25:52 +07:00
Mikael Voss 6a55cc63f3
akkoma-emoji.blobs_gg: move to top‐level & migrate to pkgs/by-name 2025-03-14 15:13:10 +01:00
Mikael Voss 4c17535c7b
akkoma-frontends.admin-fe: rename to akkoma-admin-fe & migrate to pkgs/by-name 2025-03-14 14:55:23 +01:00
Mikael Voss 30cbef7dc9
akkoma-fe: migrate to pkgs/by-name 2025-03-14 14:48:19 +01:00
Austin Horstman 14ee3b00fe
nixos/slskd: remove useless inotify watches (#389586) 2025-03-14 08:11:31 -05:00
Kerstin Humm c06efc8927
nixos/mastodon: some formatting 2025-03-13 16:51:55 +01:00
isabel c7968cf140
nixos/wakapi: harden systemd service
when using `systemd-analyze security wakapi.service` we went from a 5.9
to a 3.
2025-03-13 15:30:32 +00:00
ppom 5611f102a2 nixos/slskd: remove useless inotify watches
Closes #389397
2025-03-13 12:00:00 +01:00
Florian Agbuya 8125e281fd nixos/flarum: restart on package update
Ensures the Flarum service automatically restarts when its package is updated, preventing stale instances from running after upgrades.
2025-03-13 17:16:34 +08:00
h7x4 ab0564bd10
treewide: add documentation for nixos systemd units 2025-03-12 18:00:38 +01:00
K900 6eb7fc1303
nixos/akkoma: remove IFD (#382944) 2025-03-12 14:49:01 +03:00
Pol Dellaiera 598e3abada
nixos/outline: remove non-existent systemd option (#388886) 2025-03-11 22:50:50 +01:00
โทสฺตัล 5b820b674a nixos/movim: fix minification options & document them
Removes the packages since this can be overridden with
services.movim.package.
2025-03-11 11:36:22 +07:00
Talya Connor 9173c89764 nixos/outline: remove non-existent systemd option
Maybe PrivateHome once existed? It doesn't now, though, and this is the
only instance of it in all of nixpkgs!

    Mar 11 15:18:28 kala systemd[1]: /etc/systemd/system/outline.service:46: Unknown key 'PrivateHome' in section [Service], ignoring.
2025-03-11 15:26:30 +11:00
โทสฺตัล bc27f99008 nixos/movim: add overridden package to ð environment (inc. symlinks) 2025-03-10 22:51:02 +07:00
โทสฺตัล 076fdda013 {movim,nixos/movim}: fix database options
Wrong casing, doesn’t work with those not creating a local database, &
has a bug with implementation on how it should be overriding the
database support to the movim package.
2025-03-09 20:13:13 +07:00
Aleksana 7791660b3f
nixos/nextcloud: update nextcloud version in example (#387933) 2025-03-08 20:26:35 +08:00
Maximilian Bosch 6fe52c5dae
Merge: nixos/nextcloud: fix shellcheck after #367433 (#387913) 2025-03-08 11:32:05 +01:00
shelvacu 1a4575f9db
nixos/modules: Add security.pki.caBundle option and make all services use it for CA bundles (#352244)
Previously some modules used `config.environment.etc."ssl/certs/ca-certificates.crt".source`, some used `"/etc/ssl/certs/ca-certificates.crt"`, and some used `"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"`. These were all bad in one way or another:

- `config.environment.etc."ssl/certs/ca-certificates.crt".source` relies on `source` being set; if `text` is set instead this breaks, introducing a weird undocumented requirement
- `"/etc/ssl/certs/ca-certificates.crt"` is probably okay but very un-nix. It's a magic string, and the path doesn't change when the file changes (and so you can't trigger service reloads, for example, when the contents change in a new system activation)
- `"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"` silently doesn't include the options from `security.pki`

Co-authored-by: Shelvacu <git@shelvacu.com>
2025-03-08 08:41:08 +00:00
Sandro 48ecb73067
netbox_4_2: init (#376100) 2025-03-07 20:31:48 +01:00
Sandro ea79d17e5b
nixos/nextcloud: update nextcloud version in example 2025-03-07 20:20:39 +01:00
Sandro Jäckel 98b175f44a
nixos/nextcloud: fix shellcheck after #367433 2025-03-07 14:41:02 +01:00
Maximilian Bosch 6c4f93e113
Merge: nixos/nextcloud: use LoadCredential to read secrets (#367433) 2025-03-07 10:58:29 +01:00
โทสฺตัล 43c1654cae nixos/movim: run nixfmt on module
This 711-line file was expanded into 817-line file by nixfmt.
Readability was hurt as now I can’t see as much in my editor at a time;
this directly makes editing & reviewing slower as reading is harder. I
am upset about this change.
2025-03-07 14:53:05 +07:00
Defelo eccf638822
nixos/echoip: improve systemd hardening 2025-03-06 02:01:23 +01:00
Maximilian Bosch 432d274c81
nixos/nextcloud-notify_push: use RestartMode=direct
`nextcloud-notify_push.service` requires
`nextcloud-notify_push-setup.service`. If the latter fails (e.g. because
of Nextcloud not being there yet), the push service would also fail with
result 'dependency'.

RestartMode=direct doesn't put a unit into failed state IF it's about to
be restarted again. That way, `nextcloud-notify_push` will await several
restart attempts. Only if the unit fails due to a rate-limit (i.e. too
many restarts), the push service will also fail.

If the startup is still too slow, it may make sense for administrators to
configure higher intervals between the start attempts with RestartSec.
2025-03-05 17:27:04 +01:00
Sandro d52a42c0c1
part-db: init at 1.14.5 (#365249) 2025-03-05 15:31:27 +01:00
Nico Felbinger c456896108
nixos/part-db: init module
Co-authored-by: Sandro <7258858+supersandro2000@users.noreply.github.com>
Co-authored-by: Tert0 <62036464+tert0@users.noreply.github.com>
2025-03-05 12:56:25 +01:00
Sandro 4f7fc6dfdf
nixos/glitchtip: init module (#386013) 2025-03-05 01:23:43 +01:00
Defelo 5da710d274
nixos/glitchtip: init module
Co-authored-by: soyouzpanda <soyouzpanda@soyouzpanda.fr>
Co-authored-by: Nico Felbinger <nico@felbinger.eu>
2025-03-05 00:24:50 +01:00
Joshua Kobschätzki 3403819b4d netbox_4_2: init
Co-authored-by: SuperSandro2000 <sandro.jaeckel@gmail.com>
2025-03-03 21:24:13 +01:00
Alexander Sieg 8af0a5abfd dependency-track: don't bundle frontend in jar
Bundling the frontend in the jar is deprecated by upstream and causes
the frontend from being serve after weeks of runtime.
2025-03-02 16:50:01 +01:00