Commit graph

37378 commits

Author SHA1 Message Date
Silvan Mosberger e52d633a63 Merge remote-tracking branch 'upstream/staging-next' into staging 2025-04-02 18:30:54 +02:00
Maximilian Bosch c8274e56b8
Merge: nixos/nextcloud: check if ownership of datadir and config is correct (#379581) 2025-04-02 10:51:55 +02:00
โทสฺตัล 7554581474 nixos/h2o: enable HTTP/3 via QUIC 2025-04-02 15:11:53 +07:00
โทสฺตัล 301581e073 nixos/h2o: typo 2025-04-02 15:11:53 +07:00
Florian Klink 2b0e0a9fd4
nixos/h2o: disable OCSP stapling w/ Let’s Encrypt (support sunset) (#393765) 2025-04-02 09:10:42 +01:00
Maximilian Bosch 39dcdc5c9b
nixos/nextcloud: check if ownership of config is correct
Follow-up on #169733

For `data`, Nextcloud checks on its own if everything is readable.
However, for `config` it's crucial that the ownership is actually
correct: otherwise, systemd-tmpfiles will refuse any operations inside
because of unsafe path transitions.

This can result in a subtly broken setup by the `override.config.php`
not being updated, but also not part of the system closure anymore
(another override.config.php is referenced now) which means it'll be
GCed eventually even though Nextcloud relies on it.

If this precondition is not met, the following error will be printed:

    nextcloud-setup-start[972]: /var/lib/nextcloud/config is not owned by user 'nextcloud'!
    nextcloud-setup-start[972]: Please check the logs via 'journalctl -u systemd-tmpfiles-setup'
    nextcloud-setup-start[972]: and make sure there are no unsafe path transitions.
    nextcloud-setup-start[972]: (https://nixos.org/manual/nixos/stable/#module-services-nextcloud-pitfalls-during-upgrade)
2025-04-02 09:30:17 +02:00
misuzu 0f4487251d
strfry: init at 1.0.4, nixos/strfry: init (#385587) 2025-04-02 10:13:41 +03:00
Felix Zieger dfd82bf3e5 nixos/strfry: init 2025-04-01 23:20:15 +02:00
Pol Dellaiera 25264d105d nixos/docling-serve: init 2025-04-01 21:42:53 +02:00
K900 30edc74585 Merge remote-tracking branch 'origin/staging-next' into staging 2025-04-01 21:12:38 +03:00
Silvan Mosberger 374e6bcc40 treewide: Format all Nix files
Format all Nix files using the officially approved formatter,
making the CI check introduced in the previous commit succeed:

  nix-build ci -A fmt.check

This is the next step of the of the [implementation](https://github.com/NixOS/nixfmt/issues/153)
of the accepted [RFC 166](https://github.com/NixOS/rfcs/pull/166).

This commit will lead to merge conflicts for a number of PRs,
up to an estimated ~1100 (~33%) among the PRs with activity in the past 2
months, but that should be lower than what it would be without the previous
[partial treewide format](https://github.com/NixOS/nixpkgs/pull/322537).

Merge conflicts caused by this commit can now automatically be resolved while rebasing using the
[auto-rebase script](8616af08d9/maintainers/scripts/auto-rebase).

If you run into any problems regarding any of this, please reach out to the
[formatting team](https://nixos.org/community/teams/formatting/) by
pinging @NixOS/nix-formatting.
2025-04-01 20:10:43 +02:00
Adam C. Stephens 62d611a22b
nixos/incus: add AppArmor rules (#386060) 2025-04-01 12:51:34 -04:00
Franz Pletz 82f0c74912
nixos/zoxide: init module (#393493) 2025-04-01 18:01:32 +02:00
Tanya Arora 8125d74e21
nixos/dnsmasq: Fix failure on read-only /etc when resolveLocalQueries=false (#391738) 2025-04-01 17:59:21 +02:00
K900 6408946263 Merge remote-tracking branch 'origin/staging-next' into staging 2025-04-01 16:56:46 +03:00
Pol Dellaiera a18002797a
nixos/navidrome: Add environmentFile config option (#389471) 2025-04-01 15:55:58 +02:00
Maximilian Bosch f20b220e17
Merge: nixos/nextcloud: add maintainer team, update docs about maintainership of apps (#393069) 2025-04-01 11:25:28 +02:00
John Titor 51dc163364 nixos/ananicy: re enable BPF on hardened kernels
This was a workaround to begin with, as hardened kernel didn't support tracing.
Back then kernel level tracing was only available through debugfs, and now that
tracefs has been available on NixOS for a while now, enabled in
Link: https://github.com/NixOS/nixpkgs/pull/388751

This workaround can be removed and bpf can be used with tracefs.
Link: https://github.com/NixOS/nixpkgs/issues/360957

Signed-off-by: John Titor <50095635+JohnRTitor@users.noreply.github.com>
2025-04-01 14:42:59 +05:30
K900 a6d5666400 Merge remote-tracking branch 'origin/staging-next' into staging 2025-04-01 08:39:50 +03:00
André Silva 64ee43c568
nixos/hyprland: fix call to wayland-session.nix (#394858) 2025-03-31 17:47:05 +01:00
Florian Klink e9b7593367
nixos/movim: Fix accidental append to module system property (#394861) 2025-03-31 16:38:51 +01:00
Arne Keller ee6d7cb213
nitter: 0-unstable-2024-02-26 -> 0-unstable-2025-02-25; nixos/nitter: rename guestAccounts to sessionsFile (#393028) 2025-03-31 17:16:30 +02:00
nixpkgs-ci[bot] 86e22e1e80
Merge staging-next into staging 2025-03-31 12:06:34 +00:00
Herwig Hochleitner 2107f032ab nixos/startx: remove graphical-session assertions
this assertion broke gnome sessions in very hard to debug way:

- gdm starts, but on successful login just returns to login screen
- journalctl isn't exactly helpful in this condition:
  - a typical gnome login will involve many warnings and errors, that
    aren't actually preventing login, but will lead affected users
    on a merry chase for many hours
  - the actual indicators in the log arent't even an errors, only info and warning
    - graphical-session.target: Starting requested but asserts failed.
    - Assertion failed for Current graphical user session.

startx is a power tool for power users, needing a certain level of
expertise for the user to even want it, let alone use correctly.
However, the expectation is, that the necessary expertise will be
contained within the domain of startx and that it not break tools for
regular users.

This partially reverts commit e1c3082085.
2025-03-31 11:58:09 +01:00
Robert Hensing e12690d530 nixos/movim: Fix accidental append to module system property 2025-03-31 12:24:22 +02:00
André Silva 09879a452b
nixos/hyprland: fix call to wayland-session.nix 2025-03-31 11:15:31 +01:00
Pratham Patel cd795fd3f0 nixos/modules: cosmic: init 2025-03-31 15:28:55 +05:30
Pratham Patel cd85a8a827 nixos/modules: cosmic-greeter: init 2025-03-31 15:28:55 +05:30
Wolfgang Walther 899c3986e7
nixos/postgrest: init module (#394041) 2025-03-31 07:20:43 +00:00
nixpkgs-ci[bot] cea056bb01
Merge staging-next into staging 2025-03-31 06:06:14 +00:00
Austin Horstman f62c664b16
qt: add "kde6" to qt.platformTheme (#384669) 2025-03-31 00:00:31 -05:00
Adam C. Stephens 11e4741be7
incus: 6.10.1 -> 6.11.0 (#394108) 2025-03-30 21:20:03 -04:00
nixpkgs-ci[bot] 34600d0052
Merge staging-next into staging 2025-03-31 00:17:08 +00:00
Maximilian Bosch 97d215cf17
Merge: php: 8.3 -> 8.4 (#394112) 2025-03-30 22:54:31 +02:00
Pol Dellaiera 35bb79372d
prometheus-chrony-exporter: init chrony nixos module (#394575) 2025-03-30 22:30:21 +02:00
Arne Keller fd9f17ef49
nixos/filesystems: init bindfs (#337697) 2025-03-30 22:10:57 +02:00
Seth Flynn 53b589567a
nixos/wayland-session: fix conflicts between users (#390168) 2025-03-30 16:09:54 -04:00
Seth Flynn 4df2726a5c
nixos/wayland-session: fix conflicts between users 2025-03-30 15:37:15 -04:00
Wolfgang Walther 064432a519
nixos/postgrest: init module 2025-03-30 14:24:16 +02:00
nixpkgs-ci[bot] ed9f389a51
Merge staging-next into staging 2025-03-30 12:06:19 +00:00
PAEPCKE, Michael cdb80c1f44
prometheus-exporter: init chrony module 2025-03-30 11:14:30 +00:00
Jonas Heinrich 8d69e1faae
nixos/wordpress: Use https by default for caddy (#375375) 2025-03-30 10:31:52 +02:00
nixpkgs-ci[bot] 03db8f9dcb
Merge staging-next into staging 2025-03-30 00:17:21 +00:00
Maximilian Bosch 65121c9333
Merge: nextcloud-occ: work with sudo disabled (#380211) 2025-03-29 23:25:45 +01:00
Daniel Xu f1c4d339a5 nixos/wordpress: Use https by default for caddy
Previously, `http://` scheme was hard coded into the caddy config if
`webserver = "caddy"` was chosen. This is fine for local testing, but is
problematic if you want your nixos host to be public facing.

In the public facing case, you generally want to be using TLS. But since
the wordpress module generates the caddyfile rule, the user's nixos
config cannot easily change it to also allow https.

An alternative would be to reverse proxy an https rule to the generated
http rule, but that's somewhat questionable as there's not an internal
http endpoint to proxy to. It might be possible but I couldn't figure
it out.

So simplify by omitting the scheme. This causes caddy to use https by
default and 301 redirect any http requests to the https endpoint. Caddy
will just do the right thing if it's being hosted on a local/internal
hostname (self sign certificates).

This should be backwards compatible with previous default if users are
using reasonable browsers/tools.

Signed-off-by: Daniel Xu <dxu@dxuuu.xyz>
2025-03-29 15:10:35 -06:00
Bruno BELANYI 8fb60c58dd
calibre-web: fix ebook conversion missing config_binariesdir setting (#366642) 2025-03-29 20:08:35 +00:00
Pol Dellaiera 0ef31de6ea
monica: pin php version to 8.3 (#394415) 2025-03-29 20:12:16 +01:00
Pol Dellaiera f79c218ea5
icingaweb2: pin php version to 8.3 (#394399) 2025-03-29 20:11:29 +01:00
Maximilian Bosch b88fdf622c
Merge: nixos/dolibarr: pin php version (to 8.3) (#394153) 2025-03-29 20:11:04 +01:00
Pol Dellaiera 6945312759
agorakit: pin php version to 8.2 (#394410) 2025-03-29 20:10:33 +01:00