Commit Graph

30996 Commits

Author SHA1 Message Date
Sandro Jäckel
0898fee0de nixos/opengl: remove with lib over entire file 2024-06-06 00:35:29 +02:00
Bobby Rong
a53e9cab22 Merge pull request #317428 from a-kenji/virtualbox-host-typo
nixos/virtualbox-host: fix typo in assertion
2024-06-05 22:11:14 +08:00
Adam C. Stephens
af4ac075a3 Merge pull request #312523 from emilylange/nixos-forgejo-secrets
nixos/forgejo: refactor secrets, add `cfg.secrets`, forgejo: build `environment-to-ini`, nixos/tests/forgejo: test `cfg.secrets` using /metrics endpoint
2024-06-05 10:01:37 -04:00
a-kenji
406e613b95 nixos/virtualbox-host: fix typo in assertion 2024-06-05 14:04:03 +02:00
Thomas Gerbet
ef6fea2d86 openssh: move Kerberos support into a dedicated package
The `openssh` and `openssh_hpn` packages are now built without
the Kerberos support by default in an effort to reduce the attack surface.

The Kerberos support is likely used only by a fraction of the total users
(I'm guessing mainly users integrating SSH in an Active Directory env) so
dropping it should not impact too many users. It should also be noted that
the Kerberos/GSSAPI auth is disabled by default in the configuration.
`opensshWithKerberos` and `openssh_hpnWithKerberos` are added in order
to provide an easy migration path for users needing this support.

The `openssh_gssapi` package is kept untouched.
2024-06-05 19:45:31 +10:00
Florian Klink
40066ba0d8 Merge pull request #316168 from dawidd6/systemd-user-generators
nixos/systemd: link user-generators
2024-06-05 09:59:29 +02:00
Jörg Thalheim
7d98bbfcd5 Merge pull request #315827 from JohnRTitor/hyprland-module
nixos/{hyprland, wayland-common}: disable wlr portal for hyprland, enable xdg autostart for all wayland compositors
2024-06-05 09:57:53 +02:00
Pol Dellaiera
133aa44c38 Merge pull request #317286 from drupol/open-webui-add-more-env
nixos/{ollama,open-webui}: minor service update
2024-06-05 09:12:28 +02:00
Pol Dellaiera
309451127f nixos/open-webui: update options default values 2024-06-05 08:05:19 +02:00
Pol Dellaiera
5664bb7899 nixos/open-webui: add example in options 2024-06-05 08:05:18 +02:00
Pol Dellaiera
a8670536e5 nixos/open-webui: remove preStart step
nixos/open-webui: remove `preStart` step
2024-06-05 08:05:18 +02:00
Pol Dellaiera
61ab4de94c nixos/open-webui: update option and service descriptions 2024-06-05 08:05:18 +02:00
Pol Dellaiera
709eb8ebaf nixos/open-webui: add openFirewall option 2024-06-05 08:05:18 +02:00
Pol Dellaiera
c54890e226 nixos/ollama: update port option, use types.port 2024-06-05 08:05:18 +02:00
Pol Dellaiera
cb8670469b nixos/ollama: add openFirewall option 2024-06-05 07:09:13 +02:00
emilylange
694db856ed nixos/forgejo: refactor secrets, add cfg.secrets
This is not a breaking change. Existing setups continue to work as-is.

Users of `cfg.mailerPasswordFile` will get an option rename/deprecation
warning, but that's it (assuming there is no regression).

This adds `cfg.secrets`, which is a wrapper over systemd's
`LoadCredential=` leveraging Forgejo's `environment-to-ini`.

`environment-to-ini` is intended for configuring Forgejo in OCI
containers.

It requires some fairly annoying escaping of the section names to fit
into the allowed environment variable charset.

E.g. `"log.console".COLORIZE = false` becomes
`FORGEJO__LOG_0x2E_CONSOLE__COLORIZE=false`.

 - `.` needs to be replaced with `_0X2E_` and
 - `-` needs to be replaced with `_0X2D_`

Those are simply the hex representation of each char from an ASCII
table:

. = ASCII 46 = 46 (decimal) = 2E (hex) = 0x2E = _OX2E_

To make interacting with `environment-to-ini` less annoying, we template
and escape the sections/keys in nix:

`cfg.secrets` takes the same free-form sections/keys as `cfg.settings`.
Meaning there is now a generalized abstraction for all keys, not just
those that have been manually implemented in the past.

It goes as far as theoretically allowing one to have `DEFAULT.APP_NAME`
read from a secret file.

I don't know why one would want to do that, but it has been made
possible by this :^)

More reasonable examples are listed in the `cfg.secrets` option example.

We also continue to bootstrap a handful of secrets like
`security.SECRET_KEY`. This is done is a sort of sidecar bootstrap unit
fittingly called `forgejo-secrets.service`.

Overriding those is, just like before, not really intended and requires
the use of `lib.mkForce` and might lead to breakage. But it is, in a
way, more possible than before.
2024-06-05 00:45:59 +02:00
nikstur
1baf7d7e4e Merge pull request #314890 from danielbarter/repart-image-fix
repart-image: remove --map-root-user flag from unshare
2024-06-04 22:28:05 +02:00
Nick Cao
5032dc9bc3 Merge pull request #317038 from abmantis/patch-5
nixos/nvidia-optimus: add nvidia-modeset to blacklist
2024-06-04 16:10:52 -04:00
Arian van Putten
605418f9b1 Merge pull request #317257 from arianvp/stephank-fix-acme2
nixos/acme: allow setting security.acme.defaults.server = null to keep old accounts directory
2024-06-04 21:58:25 +02:00
K900
840914c324 Merge pull request #317268 from SuperSandro2000/plasma6-cups
nixos/plasma6: make print-manager depend on cups
2024-06-04 22:18:59 +03:00
Maximilian Bosch
7e2210236e Merge pull request #316004 from Ma27/nc-memlimit
nixos/nextcloud: make memory_limit of nextcloud-cron configurable
2024-06-04 19:18:03 +00:00
Sandro Jäckel
7c39d372f7 nixos/plasma6: make print-manager depend on cups 2024-06-04 20:50:06 +02:00
Stéphan Kochen
d1f07e6382 nixos/acme: allow setting security.acme.defaults.server = null to keep old accounts directory
The accounts directory is based on the hash of the settings.

https://github.com/NixOS/nixpkgs/pull/270221 changed the  default of
security.acme.defaults.server from null to the default letsencrypt URL
however as an unwanted side effect this means the accounts directory
changes and the ACME module will create a new a new account.

This can cause issues with people using CAA records that pin the
account ID or people who have datacenter-scale NixOS deployments

We allow setting this option to null again for people who want
to keep the old account and migrate at their own leisure.

Fixes https://github.com/NixOS/nixpkgs/issues/316608

Co-authored-by: Arian van Putten <arian.vanputten@gmail.com>
2024-06-04 20:09:46 +02:00
Pol Dellaiera
6b6d4aeb35 Merge pull request #316248 from shivaraj-bh/open-webui
open-webui: init at 0.2.4
2024-06-04 15:47:03 +02:00
shivaraj-bh
f66cb82fef nixos/open-webui: init 2024-06-04 16:46:19 +05:30
Bobby Rong
6051698052 Merge pull request #314695 from nonetrix/patch-1
nixos/xdg/portal: Fix typo
2024-06-04 13:27:16 +08:00
Daniel Barter
d7a9d49c42 repart-image: removing unshare (and util-linux dep) form systemd-repart invocation
..
2024-06-03 17:48:27 -07:00
Abílio Costa
79cd2f9738 nixos/nvidia-optimus: add nvidia-modeset to blacklist
The nvidia-modeset module is loaded, which in turn pulls in the nvidia module. This makes bbswitch fail to turn off the card since it would be in use by the module.
2024-06-03 23:18:34 +01:00
Sandro
43b5ccde57 Merge pull request #316879 from SuperSandro2000/mkEnableOption 2024-06-03 19:03:12 +02:00
Sandro Jäckel
1c2132f714 nixos/installation-cd-plasma5: fix even more aliases 2024-06-03 16:26:54 +02:00
K900
2e8de9bd1a Merge pull request #316929 from SuperSandro2000/cd-konsole
nixos/installation-cd-plasma5: don't use alias for konsole
2024-06-03 17:25:12 +03:00
Sandro
a88fb925bb nixos/installation-cd-plasma5: don't use alias for konsole 2024-06-03 16:22:12 +02:00
Michele Guerini Rocco
9e97770a19 Merge pull request #312317 from tom-kuca/replace-existing-network-addresses
nixos/network-interfaces: prevent failure when a network address already exists
2024-06-03 15:30:13 +02:00
Sandro Jäckel
41452802cb treewide: fix all obviously wrong mkEnableOptions 2024-06-03 13:20:32 +02:00
Sandro
0387dede7c Merge pull request #316732 from SuperSandro2000/tailscale-auth 2024-06-03 12:49:31 +02:00
Dawid Dziurla
fbbc41f7da nixos/systemd: simplify hooks function 2024-06-03 11:15:59 +02:00
Florian Klink
c149b8818b Merge pull request #316836 from srhb/fix-garage-assert
nixos/garage: fix replication 1.0 assertion
2024-06-03 11:14:03 +03:00
Sarah Brofeldt
f7393d13fe nixos/garage: fix replication 1.0 assertion
Use the `cfg.package.version` (string) instead of the entire package so
users don't see  `error: value is a set while a string was expected`
instead of the intended assertion message.
2024-06-03 09:56:42 +02:00
Florian Klink
77a51024c0 Merge pull request #316697 from bbenno/fix-gollum
nixos/gollum: fix systemd tempfile permission
2024-06-03 08:25:04 +03:00
John Titor
de77718887 nixos/wayland-session: cleanup
xwayland, wlr-portal ->
 enable-xwayland, enable-wlr-portal
2024-06-03 09:28:00 +05:30
illustris
da799551a4 nixos/proxmox-lxc: fix console access (#307163)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-06-03 00:15:27 +02:00
Sandro
1e8d02875f Merge pull request #307287 from illustris/proxmox-vma 2024-06-03 00:12:40 +02:00
Someone
e7139eb386 Merge pull request #316516 from aidalgol/libxnvctrl-nixos-fix
nixos/nvidia: add missing check for nvidia settings enabled
2024-06-02 21:32:56 +00:00
Eric Wolf
7c0937d668 nixos/nextcloud-notify_push: use Type=notify
This prevents the post start script from running
before necessary sockets have been created.

It also prevents an unused shell from being kept around
by using `exec` to make `notify_push` the main process.
2024-06-02 23:19:07 +02:00
Sandro
6f02edec1a Merge pull request #316358 from majewsky/portunus-remove-libxcrypt-legacy 2024-06-02 23:10:26 +02:00
Sandro Jäckel
f643e4fa5b nixos/tailscale-auth: fix enable option description 2024-06-02 22:30:42 +02:00
Ryan Horiguchi
ea63e59edc nixos/adguardhome: fix typo 2024-06-02 21:01:11 +02:00
h7x4
850cbdd97d Merge pull request #316648 from s1ls/invidious-router-descfix
nixos/invidious-router: remove redundant "Enables" in description
2024-06-02 19:28:19 +02:00
Benno Bielmeier
b5c7987b52 nixos/gollum: fix systemd tempfile permission
When services.gollum.{user,group} was specified a value other than its
default (i.e. "gollum"), the build failed due to referencing a
non-existing user.
2024-06-02 18:00:19 +02:00
Sandro
56744fd9ee Merge pull request #312261 from Yarny0/ensure-printers-fix-options 2024-06-02 17:59:01 +02:00