Commit graph

50977 commits

Author SHA1 Message Date
Leona Maroni 95cc97659c
release-notes: init for 25.11 2025-05-13 17:50:11 +02:00
OPNA2608 41c8686f60 nixosTests.lomiri-docviewer-app: Fix OCR 2025-05-13 17:49:00 +02:00
OPNA2608 22c53f29b2 nixosTests.lomiri-system-settings: Fix OCR 2025-05-13 17:39:46 +02:00
Arne Keller 2264d87679
cato-client: init at 5.2.1.1, nixos/cato-client: init (#339533) 2025-05-13 17:36:06 +02:00
linsui bff193eaba readeck: 0.17.1 -> 0.18.2 2025-05-13 23:32:38 +08:00
OPNA2608 ad3c2cb9d1 nixosTests.lomiri-clock-app: Fix OCR 2025-05-13 17:14:50 +02:00
Jörg Thalheim 5adbb5f72a
darling: drop (#405727) 2025-05-13 16:35:40 +02:00
Someone a59b0f1dfd
nvidia-container-toolkit: minor fixups (#405919) 2025-05-13 13:51:43 +00:00
OPNA2608 6ffec69d67 nixosTests.teleports: Fix OCR 2025-05-13 15:28:43 +02:00
OPNA2608 7de0cd47d7 nixosTests.lomiri-music-app: Fix OCR 2025-05-13 15:28:36 +02:00
OPNA2608 e0c6c758a7 nixosTests.lomiri-mediaplayer-app: Fix OCR 2025-05-13 15:28:31 +02:00
OPNA2608 391862e72c nixosTests.lomiri-gallery-app: Fix OCR 2025-05-13 15:28:21 +02:00
OPNA2608 5e6c4ed8ae nixosTests.lomiri-camera-app: Fix OCR 2025-05-13 15:28:13 +02:00
OPNA2608 0e88d93814 nixosTests.lomiri-calendar-app: Fix OCR 2025-05-13 15:28:06 +02:00
Sandro Jäckel 314cfdddb5
nixos/librenms: seed database in module, not only in test
To properly use librenms and create a user, you need the seeded roles
like admin.
2025-05-13 14:24:27 +02:00
Paul Haerle d1a07176d3
oxidized: switch to tmpfiles (#402646) 2025-05-13 14:21:16 +02:00
nixpkgs-ci[bot] f13b927ceb
Merge master into staging-next 2025-05-13 12:07:00 +00:00
Maximilian Bosch 0be521cb0e
Merge: nixos/nextcloud: use LoadCredential to read services.nextcloud.secretFile (#405970) 2025-05-13 13:45:36 +02:00
Pol Dellaiera 38f4c9b583
nixos/doc: Fix required disk size for installing in a VirtualBox guest (#406149) 2025-05-13 10:28:35 +00:00
Jacek Galowicz cd79d4189d
nixos/test-driver: exit early if /dev/vhost-vsock isn't available (#406455) 2025-05-13 11:59:34 +02:00
Maximilian Bosch c6978e8a58
nixos/test-driver: exit early if /dev/vhost-vsock isn't available
Right now it wrongly seems as if you can set
`sshBackdoor.enable = true;` for each test and not only for debugging
purposes.

This is wrong however since you'd need to pass /dev/vhost-vsock into the
sandbox for this (which is also a prerequisite for #392117).

To make that clear, two things were changed:

* add a warning to the manual to communicate this.
* exit both interactive and non-interactive driver early if
  /dev/vhost-vsock is missing and the ssh backdoor is enabled.

  If that's the case, we pass a CLI flag to the driver already in the
  interactive case. This change also sets the flag for the
  non-interactive case.

  That way we also get a better error if somebody tries to enable this
  on a system that doesn't support that.
2025-05-13 11:14:13 +02:00
nixpkgs-ci[bot] d665ddf4a8
Merge master into staging-next 2025-05-13 06:05:56 +00:00
Martin Weinelt 5cea3235bd
nixos/frigate: create model cache dir (#405416) 2025-05-13 04:36:43 +02:00
nixpkgs-ci[bot] 86051b5e95
Merge master into staging-next 2025-05-13 00:16:56 +00:00
Martin Weinelt 8fc7c1593d
nixos/music-assistant: wait for network-online.target
This is required because the server fails to start when it cannot find
a route to send out mDNS packets.
2025-05-13 00:55:12 +02:00
Rebecca Turner 2263f723c1
darwin.linux-builder: split create-builder script
The current workflow for starting the `linux-builder` on macOS is to run
`nix run nixpkgs#darwin.linux-builder`, which adds keys to the store and
then starts the builder.

Adding the keys requires user input (due to `sudo`) but the actual
builder should just stay running in the background somewhere.

I'd like to automate this process, but it's currently rather complex:
the first part of the script needs user input for `sudo`, and then
there's no signal when the process has finished starting up. The user
will need to see stdout/stderr during the first part, which makes it
challenging to capture it for the second part to determine when startup
has finished.

To fix this, I've split the `create-builder` script into an `add-keys`
script (interactive) and a `run-builder` script (background). These new
scripts are exposed in the `passthru` attributes for external users. The
`create-builder` script is now a simple call of `add-keys` and then
`run-builder`.

See: https://nixos.org/manual/nixpkgs/unstable/#sec-darwin-builder
2025-05-12 12:18:33 -07:00
Christoph Heiss 0a8bcd4699
nvidia-container-toolkit: add myself as maintainer
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2025-05-12 20:41:31 +02:00
nixpkgs-ci[bot] 3578961ffe
Merge master into staging-next 2025-05-12 18:06:01 +00:00
Arian van Putten fb4135b611
image/repart: repart.imageFile(BaseName) -> image.baseName, image.extension (#401872) 2025-05-12 19:03:54 +02:00
Berk D. Demir e4bf5ce70d nixos/activation: Fix shellcheck test failure
lib/test.nix relies on `fileset.toSource` which creates a source dir
with the files of interest. `testers.shellcheck` passes all the files in
the source dir to shellcheck. The issue is related to relative path
sourcing, i.e. `source ./lib.sh` where shellcheck cannot make any
assumptions about the working directory.

Options were:
1) Disable this warning with a directive
   Prior disabling in the tree:
    - pkgs/tools/nix/info/info.sh
    - nixos/modules/testing/test-instrumentation.nix

2) Set source-path to SCRIPTDIR with a directive
   https://github.com/koalaman/shellcheck/wiki/Directive#source-path

   Even though we don't enable external script following for shellcheck
   with `-x` flag given every file in the source dir is passed, this
   directive seems to capture the intent to help shellcheck a bit
   better.

Went with option 2.
2025-05-12 09:58:28 -07:00
Sandro 19bbee4694
nixos/networkd-dispatcher: use writeShellScript to ease use (#370347) 2025-05-12 18:09:18 +02:00
Sandro 95afdf2b49
nixos/gancio: properly quote
Co-authored-by: Wroclaw <wroclaw223@outlook.com>
2025-05-12 17:55:46 +02:00
Maciej Krüger 2812ff41ee
netdata: 2.4.0 -> 2.5.1 (#404786) 2025-05-12 17:31:40 +02:00
Sandro 49d1eedf46
nixos/postsrsd: expose socketPath via module option (#406386) 2025-05-12 15:17:13 +02:00
nixpkgs-ci[bot] c5997abf8e
Merge master into staging-next 2025-05-12 12:07:01 +00:00
K900 5b99c79903
nixos/udev: verify udev rules with udevadm (#406284) 2025-05-12 12:35:34 +03:00
Vladimír Čunát de872c968f
tests/playwright-python: fix text to look for (#405196) 2025-05-12 10:47:31 +02:00
Oliver Schmidt 5a316930c8 doc: merge Amnezia VPN-related release note entries 2025-05-12 10:34:06 +02:00
Oliver Schmidt 047a804449 nixos/postsrsd: expose socketPath via module option
Services utilising postsrsd need to connect to it via a Unix socket.
While the path to that socket is static as of now, the discoverability
of that path suffers from the lack of module documentation and a
scattered definition of the individual path components over at least
three lines, even when reading the module source.

By exposing the socket path as a readOnly NixOS option, that value shows
up in the options overview and can be re-used in other parts of NixOS
config.
2025-05-12 09:51:17 +02:00
Oliver Schmidt eebaa71e11 doc: add release about for AmneziaWG support
add release notes for #341663. Especially noteworthy is the minor
backwards incompatibility introduced there.
2025-05-12 09:29:59 +02:00
Wolfgang Walther 9d78475ae9
nixos/pgbackrest: prevent storing secrets in store
While we're not (fully) supporting the related features, yet, we already
prevent accidental storage of secrets in the store. This will also avoid
breaking changes in the future, when those features are properly
supported.
2025-05-12 09:14:39 +02:00
Wolfgang Walther 82e519947f
nixos/pgbackrest: add SFTP support 2025-05-12 09:14:38 +02:00
Wolfgang Walther d5ddb6116f
nixos/pgbackrest: init module 2025-05-12 09:14:37 +02:00
Leona Maroni f79b568519
nixos/gitlab: add activeRecord key files (#405047) 2025-05-12 08:40:16 +02:00
Leona Maroni 3724b37770
nixos/archtika: remove module and package (#406192) 2025-05-12 08:09:23 +02:00
r-vdp b7fe0a1c0c
nixos/test/installer: make sure we can build the nixos udev rules 2025-05-12 00:37:03 +02:00
Fazzi e9fda96c29 nixos/nm-applet: fix service starting too early in some cases 2025-05-11 23:10:02 +01:00
r-vdp 51a43f8ad3
Reapply "nixos/udev: verify udev rules using udevadm"
This reverts commit 5d69558f0d.
2025-05-11 22:55:09 +02:00
provokateurin dfb7f45bb8
nixos/nextcloud: Disable integrity check 2025-05-11 21:34:33 +02:00
Benjamin Sparks 31bdcff584 nixos/darling: drop 2025-05-11 21:02:37 +02:00
Benjamin Sparks 7eaa783b2b nixosTests.darling: drop 2025-05-11 21:02:37 +02:00
Patrick Steinhardt 8578bd1117 nixos/headscale: fix derp.auto_update_enabled option
The options part of "services.headscale.settings" get rendered directly
into a JSON file. As such, any declared values need to match the actual
config key that upstream uses or they are ineffective.

One such key is "derp.auto_update_enable", which controls whether or not
auto-updates for the DERP map are enabled. This key is misspellt though:
the config is called "derp.auto_update_enabled", and that has always
been the case since the config has been introduced in 57f46ded (Split
derp into its own config struct, 2021-10-22). Any unknown key is simply
ignored by Headscale, and as such the setting is ineffective.

Fix this by renaming the option.
2025-05-11 20:12:05 +02:00
nixpkgs-ci[bot] 24f25d9d29
Merge master into staging-next 2025-05-11 18:05:07 +00:00
K900 ca62c09828
nixos/kde-pim: include kcontacts for merkuro's widgets (#406220) 2025-05-11 20:00:31 +03:00
Fernando Rodrigues b6c615196e
nixos/kde-pim: include kcontacts for merkuro's widgets
When using Merkuro in Plasma 6, the 'Contacts' widget will automatically
be added to the default panel. Unfortunately, it does not work unless
`kdePackages.kcontacts` is also present in the environment. This adds
the dependency if Plasma 6 is also enabled alongside Merkuro.

Signed-off-by: Fernando Rodrigues <alpha@sigmasquadron.net>
2025-05-11 16:53:44 +00:00
Maximilian Bosch d2cce43a85
Merge: nixos/ssh: add the systemd-ssh-proxy include directive to the Host * block (#405967) 2025-05-11 17:36:54 +02:00
thiloho a847800945
nixos/archtika: remove module 2025-05-11 16:27:16 +02:00
nixpkgs-ci[bot] 9af3319f5f
Merge master into staging-next 2025-05-11 12:06:00 +00:00
Jonas Heinrich 82631e0e4c nixos/tests/oncall: init 2025-05-11 13:30:01 +02:00
Jonas Heinrich ce6e5f037a nixos/oncall: init 2025-05-11 13:30:01 +02:00
Tatyana Golovizina 4a55cd73bf nixos/doc: Fix required disk size for installing in a VirtualBox guest
The manual says that you need at least 8 GB of disk to install in Virtualbox, but the installer returns an error and says that you need at least 10 GB.
2025-05-11 15:27:58 +04:00
Jacek Galowicz 08ed87ccc6
nixos/test-driver: allow assigning other vsock number ranges (#405508) 2025-05-11 13:24:41 +02:00
Jörg Thalheim 7fd771ee97
ci: allow running jobs locally (#404466) 2025-05-11 12:28:04 +02:00
Wolfgang Walther 8980c1f7fc
various: fix parse errors for nix 2.3
Path interpolation syntax is not supported in the minimum nix version.
2025-05-11 12:14:58 +02:00
Wolfgang Walther 797c149b3e
nixos/postgresql: improve local peer authentication with default map (#404315) 2025-05-11 10:09:00 +00:00
Patrick 7a564cf0cd
nixos/networkd-dispatcher: use writeShellApplication to ease use 2025-05-11 11:53:45 +02:00
Wolfgang Walther 3d29b7d3a2
nixos/postgresql: improve local peer authentication with default map
This allows to easily map allowed database roles to system users.
2025-05-11 10:24:21 +02:00
isabel 92d64400d5
nixos/anubis: Fix defaultOptions not applying user-defined settings (#398790) 2025-05-11 08:56:46 +01:00
nixpkgs-ci[bot] 673efed879
Merge master into staging-next 2025-05-11 00:17:35 +00:00
Martin Weinelt 9da9474d63
nixos/boot/tmp: introduce adaptive huge memory pages (#404514) 2025-05-11 01:23:32 +02:00
abysssol af8538fee6
nixos/ollama: Fix systemd service doesn't use AMD GPU (#405857) 2025-05-10 22:59:56 +00:00
Alyssa Ross 0af6d76cda
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
	nixos/doc/manual/release-notes/rl-2505.section.md
2025-05-10 23:23:16 +02:00
Arne Keller 4d4f8628cd
nixos/libvirtd: Use preferred version of iptables (#228625) 2025-05-10 22:23:51 +02:00
r-vdp 57d91c535b
nixos/ssh: add the systemd-ssh-proxy include directive to the Host * block
Otherwise, then any Host or Match block in the extraConfig will absorb the include
2025-05-10 21:10:48 +02:00
Zhaofeng Li 13bb852869 nixos/libvirtd: Use preferred version of iptables 2025-05-10 12:49:47 -06:00
Seth Flynn 01515e6f54
doc/rl-2505: move services.dex entry to other notable changes
This isn't all that major of a change, nor does it necessarily add
functionality
2025-05-10 14:47:23 -04:00
Seth Flynn a64bab663d
doc/rl-2505: improve consistency in highlights section 2025-05-10 14:47:20 -04:00
Seth Flynn 8e551be5f1
nixos/graphics: don't mark package options as internal 2025-05-10 14:36:08 -04:00
networkException 23468ad19f
nixos/nextcloud: use LoadCredential to read services.nextcloud.secretFile
This patch adds support for using systemd's LoadCredential
feature to read in a json file at a path defined in the
services.nextcloud.secretFile option.

This is a follow up to 2ce1e84103.
2025-05-10 20:36:01 +02:00
nixpkgs-ci[bot] 72306e012b
Merge master into staging-next 2025-05-10 18:04:20 +00:00
Florian Klink 180f5a2593
nixos/systemd-initrd: deprecate strip (#404512) 2025-05-10 19:11:16 +03:00
Jan Tojnar 9d37135613
Merge speechd: 0.11.5 -> 0.12.1 (#375043) 2025-05-10 15:53:32 +02:00
Gary Guo 7dd8c5b602 unifi8: drop
This was an alias to the unifi package, which has been updated to v9.
To avoid confusion, remove this alias.
2025-05-10 14:47:52 +01:00
Peter Kling 089fa2b542 speechd: use socket activation 2025-05-10 14:58:35 +02:00
nixpkgs-ci[bot] 72fcf7d5a6
Merge master into staging-next 2025-05-10 12:05:40 +00:00
a 1d483cbef1 Resolves #405846 2025-05-10 21:38:58 +12:00
Paul Haerle 36607ba6e6
installer/tools: fix grammatical error in docs (#388452) 2025-05-10 11:31:39 +02:00
Maximilian Bosch b8b86834b7
nixos/test-driver: move sshBackdoor cfg from test-instrumentation to driver
That way, we don't need to duplicate the sshBackdoor options on NixOS-level.

Suggested-by: Jacek Galowicz <jacek@galowicz.de>
2025-05-10 10:40:35 +02:00
Wolfgang Walther f934044282
nixos/hydra: avoid conflicts for local postgres ident map
The key change here is, that the match was on the hydra database only
previously, but is now limited to to the hydra role instead. This avoids
conflicts with rules that are created by other modules or downstream
users.

With this change, we can remove the additional "postgres postgres" line,
because the default pg_hba line will kick in again and allow the
postgres user access to the postgres role.

Renaming the map from hydra-users to hydra is for consistency, so that
all modules can define maps matching in name with the role they manage.

The change from ident to peer is just cosmetic, ident is only used for
TCP connections and falls back to peer anyway.
2025-05-10 10:32:47 +02:00
Maximilian Bosch 12c544e008
nixos/testing: improve wording of vsockOffset description
Co-authored-by: Jacek Galowicz <jacek@galowicz.de>
2025-05-10 10:28:44 +02:00
nixpkgs-ci[bot] 4d19b24788
Merge master into staging-next 2025-05-10 06:04:47 +00:00
lassulus fb297f0be8
movim: 0.30 → 0.30.1; {movim,nixos.movim}: mysql → mariadb (#401596) 2025-05-10 07:58:20 +02:00
Martin Schwaighofer 8205de0711 rocmPackages: update release notes 2025-05-10 02:22:15 +02:00
nixpkgs-ci[bot] ec6cecf985
Merge master into staging-next 2025-05-10 00:15:43 +00:00
Peder Bergebakken Sundt f13181e910
waagent: 2.12.0.4 -> 2.13.1.1 (#404876) 2025-05-10 00:08:00 +02:00
K900 5d69558f0d
Revert "nixos/udev: verify udev rules using udevadm" 2025-05-10 00:50:36 +03:00
Gabriel Smith 710e189c6e nixos/ups: run upsmon as non-root user "nutmon" by default
NUT documentation strongly suggests running `upsmon` as a non-root user
with very limited permissions. This includes only read access to
`upsmon.conf`.

Previously the `RUN_AS_USER` setting could be overwritten with
`mkForce`, but this left the system with technically incorrect
permissions on `upsmon.conf` that would prevent reloading. This patch
provides a way to change the user that `upsmon` runs as while
maintaining correct permissions on `upsmon.conf`.

Fixes #318582
2025-05-09 23:11:33 +02:00
Nick Cao d806c1b557
nixosTests.zram-generator: fix test (#405542) 2025-05-09 16:21:25 -04:00
Florian Klink 9cc7df71a7
nixos/lib: fix typo in documentation for systemd (#405675) 2025-05-09 21:39:44 +03:00
Paul Haerle 772ee19537
installer: fix broken search suggestion in default config (#378797) 2025-05-09 20:35:51 +02:00