Commit graph

37333 commits

Author SHA1 Message Date
jopejoe1 daf56b64ff
nixos/kanidm: don't set RUST_LOG in systemd service (#394964) 2025-04-03 10:57:36 +02:00
jopejoe1 c45ef5ee28
znapzend: use system's zfs package (#395479) 2025-04-03 10:25:35 +02:00
Arne Keller 9da6c7332e
nixos/bees: sync service configuration with upstream (#348054) 2025-04-03 08:24:44 +02:00
Alois Wohlschlager 71204983bd
nixos/bees: use the upstream service file
Instead of duplicating the options from the upstream service file and letting
them get out of sync, use the file directly and only configure the needed
overrides. In particular, the upstream improvements include the mounts not
being globally visible any more, so they can't be used for bypassing nosuid and
the like, and the custom cleanup script that performed the unmount becomes
unnecessary.
2025-04-03 06:52:49 +02:00
Emily 8159a40eef
nixos/grafana-agent: remove (#395514) 2025-04-03 00:28:13 +02:00
Gaétan Lepage eb11ce28e3
nixos/cosmic[-greeter]: minor corrections (#395521) 2025-04-02 23:28:34 +02:00
Nick Cao a084e920e0
ocis_5-bin: rename from ocis-bin (#394598) 2025-04-02 16:56:09 -04:00
Florian Klink 28b1639d57 nixos/grafana-agent: remove
As described in https://github.com/NixOS/nixpkgs/pull/394017,
grafana-agent does not build with Go 1.23 anymore, and Go 1.22 has been
removed.

grafana-agent has been deprecated by Grafana (in favour of Grafana
Alloy), and will be EOL on 2025-11-01, which would be part of the
upcoming 25.05 release.

Instead of leaving us with a broken package, drop it alltogether, and
add release notes.
2025-04-02 21:45:31 +01:00
Gaetan Lepage c657d02c4f nixos/cosmic-greeter: minor corrections 2025-04-02 22:00:56 +02:00
Felix Zieger 1bf74aee3c nixos/haven: init 2025-04-02 17:30:18 +02:00
Florian Klink d0b0e168c9
nixos/tmpfiles: properly escape argument option (#391318) 2025-04-02 15:52:08 +01:00
Domen Kožar 5897ff97e2
paretosecurity: 0.0.91 -> 0.0.96 (#393366) 2025-04-02 15:13:35 +01:00
Leonie Marcy Vack 2e0d0d6333 znapzend: use system's zfs package 2025-04-02 15:12:59 +02:00
Mikael Voss 045fbc389f
nixos/tmpfiles: properly escape argument option
The systemd.tmpfiles.settings.<name>.<path>.<type>.argument option may
contain arbitrary strings. This could allow intentional or unintentional
introduction of new configuration lines.

The argument field cannot be quoted, C‐style \xNN escape sequences are
however permitted. By escaping whitespace and newline characters, the
issue can be mitigated.
2025-04-02 13:23:42 +02:00
Maximilian Bosch c8274e56b8
Merge: nixos/nextcloud: check if ownership of datadir and config is correct (#379581) 2025-04-02 10:51:55 +02:00
โทสฺตัล 7554581474 nixos/h2o: enable HTTP/3 via QUIC 2025-04-02 15:11:53 +07:00
โทสฺตัล 301581e073 nixos/h2o: typo 2025-04-02 15:11:53 +07:00
Florian Klink 2b0e0a9fd4
nixos/h2o: disable OCSP stapling w/ Let’s Encrypt (support sunset) (#393765) 2025-04-02 09:10:42 +01:00
Maximilian Bosch 39dcdc5c9b
nixos/nextcloud: check if ownership of config is correct
Follow-up on #169733

For `data`, Nextcloud checks on its own if everything is readable.
However, for `config` it's crucial that the ownership is actually
correct: otherwise, systemd-tmpfiles will refuse any operations inside
because of unsafe path transitions.

This can result in a subtly broken setup by the `override.config.php`
not being updated, but also not part of the system closure anymore
(another override.config.php is referenced now) which means it'll be
GCed eventually even though Nextcloud relies on it.

If this precondition is not met, the following error will be printed:

    nextcloud-setup-start[972]: /var/lib/nextcloud/config is not owned by user 'nextcloud'!
    nextcloud-setup-start[972]: Please check the logs via 'journalctl -u systemd-tmpfiles-setup'
    nextcloud-setup-start[972]: and make sure there are no unsafe path transitions.
    nextcloud-setup-start[972]: (https://nixos.org/manual/nixos/stable/#module-services-nextcloud-pitfalls-during-upgrade)
2025-04-02 09:30:17 +02:00
misuzu 0f4487251d
strfry: init at 1.0.4, nixos/strfry: init (#385587) 2025-04-02 10:13:41 +03:00
Felix Zieger dfd82bf3e5 nixos/strfry: init 2025-04-01 23:20:15 +02:00
Pol Dellaiera 25264d105d nixos/docling-serve: init 2025-04-01 21:42:53 +02:00
Silvan Mosberger 374e6bcc40 treewide: Format all Nix files
Format all Nix files using the officially approved formatter,
making the CI check introduced in the previous commit succeed:

  nix-build ci -A fmt.check

This is the next step of the of the [implementation](https://github.com/NixOS/nixfmt/issues/153)
of the accepted [RFC 166](https://github.com/NixOS/rfcs/pull/166).

This commit will lead to merge conflicts for a number of PRs,
up to an estimated ~1100 (~33%) among the PRs with activity in the past 2
months, but that should be lower than what it would be without the previous
[partial treewide format](https://github.com/NixOS/nixpkgs/pull/322537).

Merge conflicts caused by this commit can now automatically be resolved while rebasing using the
[auto-rebase script](8616af08d9/maintainers/scripts/auto-rebase).

If you run into any problems regarding any of this, please reach out to the
[formatting team](https://nixos.org/community/teams/formatting/) by
pinging @NixOS/nix-formatting.
2025-04-01 20:10:43 +02:00
Adam C. Stephens 62d611a22b
nixos/incus: add AppArmor rules (#386060) 2025-04-01 12:51:34 -04:00
Franz Pletz 82f0c74912
nixos/zoxide: init module (#393493) 2025-04-01 18:01:32 +02:00
Tanya Arora 8125d74e21
nixos/dnsmasq: Fix failure on read-only /etc when resolveLocalQueries=false (#391738) 2025-04-01 17:59:21 +02:00
Pol Dellaiera a18002797a
nixos/navidrome: Add environmentFile config option (#389471) 2025-04-01 15:55:58 +02:00
Maximilian Bosch f20b220e17
Merge: nixos/nextcloud: add maintainer team, update docs about maintainership of apps (#393069) 2025-04-01 11:25:28 +02:00
John Titor 51dc163364 nixos/ananicy: re enable BPF on hardened kernels
This was a workaround to begin with, as hardened kernel didn't support tracing.
Back then kernel level tracing was only available through debugfs, and now that
tracefs has been available on NixOS for a while now, enabled in
Link: https://github.com/NixOS/nixpkgs/pull/388751

This workaround can be removed and bpf can be used with tracefs.
Link: https://github.com/NixOS/nixpkgs/issues/360957

Signed-off-by: John Titor <50095635+JohnRTitor@users.noreply.github.com>
2025-04-01 14:42:59 +05:30
Casey Link 2db95477f9 nixos/ocis: default to the newly renamed ocis-bin5 package
And we are getting ready for ocis-bin7 to land, where we will need to
compare it to the system.stateVersion.
2025-04-01 08:49:20 +02:00
Jappie3 b40d9c82c1
nixos/kanidm: don't set RUST_LOG in systemd service
setting RUST_LOG in the systemd service means that the
serverSettings.log_level option is pretty much useless, as RUST_LOG
takes precedence
2025-03-31 19:34:06 +02:00
André Silva 64ee43c568
nixos/hyprland: fix call to wayland-session.nix (#394858) 2025-03-31 17:47:05 +01:00
Florian Klink e9b7593367
nixos/movim: Fix accidental append to module system property (#394861) 2025-03-31 16:38:51 +01:00
Arne Keller ee6d7cb213
nitter: 0-unstable-2024-02-26 -> 0-unstable-2025-02-25; nixos/nitter: rename guestAccounts to sessionsFile (#393028) 2025-03-31 17:16:30 +02:00
Herwig Hochleitner 2107f032ab nixos/startx: remove graphical-session assertions
this assertion broke gnome sessions in very hard to debug way:

- gdm starts, but on successful login just returns to login screen
- journalctl isn't exactly helpful in this condition:
  - a typical gnome login will involve many warnings and errors, that
    aren't actually preventing login, but will lead affected users
    on a merry chase for many hours
  - the actual indicators in the log arent't even an errors, only info and warning
    - graphical-session.target: Starting requested but asserts failed.
    - Assertion failed for Current graphical user session.

startx is a power tool for power users, needing a certain level of
expertise for the user to even want it, let alone use correctly.
However, the expectation is, that the necessary expertise will be
contained within the domain of startx and that it not break tools for
regular users.

This partially reverts commit e1c3082085.
2025-03-31 11:58:09 +01:00
Robert Hensing e12690d530 nixos/movim: Fix accidental append to module system property 2025-03-31 12:24:22 +02:00
André Silva 09879a452b
nixos/hyprland: fix call to wayland-session.nix 2025-03-31 11:15:31 +01:00
Pratham Patel cd795fd3f0 nixos/modules: cosmic: init 2025-03-31 15:28:55 +05:30
Pratham Patel cd85a8a827 nixos/modules: cosmic-greeter: init 2025-03-31 15:28:55 +05:30
Wolfgang Walther 899c3986e7
nixos/postgrest: init module (#394041) 2025-03-31 07:20:43 +00:00
Austin Horstman f62c664b16
qt: add "kde6" to qt.platformTheme (#384669) 2025-03-31 00:00:31 -05:00
Adam C. Stephens 11e4741be7
incus: 6.10.1 -> 6.11.0 (#394108) 2025-03-30 21:20:03 -04:00
Maximilian Bosch 97d215cf17
Merge: php: 8.3 -> 8.4 (#394112) 2025-03-30 22:54:31 +02:00
Pol Dellaiera 35bb79372d
prometheus-chrony-exporter: init chrony nixos module (#394575) 2025-03-30 22:30:21 +02:00
Arne Keller fd9f17ef49
nixos/filesystems: init bindfs (#337697) 2025-03-30 22:10:57 +02:00
Seth Flynn 53b589567a
nixos/wayland-session: fix conflicts between users (#390168) 2025-03-30 16:09:54 -04:00
Seth Flynn 4df2726a5c
nixos/wayland-session: fix conflicts between users 2025-03-30 15:37:15 -04:00
Wolfgang Walther 064432a519
nixos/postgrest: init module 2025-03-30 14:24:16 +02:00
PAEPCKE, Michael cdb80c1f44
prometheus-exporter: init chrony module 2025-03-30 11:14:30 +00:00
Jonas Heinrich 8d69e1faae
nixos/wordpress: Use https by default for caddy (#375375) 2025-03-30 10:31:52 +02:00