Commit Graph

6022 Commits

Author SHA1 Message Date
Pol Dellaiera
80661f912f nixos/private-gpt: drop 2025-07-30 08:20:28 +02:00
Niklas Hambüchen
436a8a1152 umami: init at 2.19.0; nixos/umami: init (#380249) 2025-07-29 16:48:52 +02:00
Diogo Correia
5d6b6bad55 doc: add services.umami to 25.11 release notes 2025-07-29 14:38:02 +00:00
Sandro
781856bcb7 go-httpbin: init at 2.18.3, nixos/go-httpbin: init module (#427717) 2025-07-29 15:48:11 +02:00
Grimmauld
6cd6573d41 nixos/doc/rl-2511: document rfc42 conversion for systemd.extraConfig 2025-07-28 11:26:47 +02:00
Izorkin
cbec672b38 nixos/libretranslate: init 2025-07-27 03:46:22 +02:00
Zahrun
1c26e0e7a9 speedify: init at 15.6.4-12495
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
Co-authored-by: emaryn <197520219+emaryn@users.noreply.github.com>
2025-07-25 15:54:44 +05:30
Jade Lovelace
4f93d9a2d1 mx-puppet-discord: remove
According to emilazy these were the only usages of sha1 in nixpkgs:

```
pkgs/servers/mx-puppet-discord/node-packages.nix
111:        sha1 = "532e01241dbcb0f2769f1b9a7cde313d30101173";
120:        sha1 = "68018cab4f59834b3fef2e59fbfd52938403e001";
129:        sha1 = "52b0e8bb808a1202602899af67939b049dd42402";
138:        sha1 = "0a37a3f9430ff7c29512d29882e25ae738a31283";
```

Anyone motivated to maintain it can feel free to restore this, it's just
not maintained at the moment, and the sha1 hashes need to go.

This was found after Ericson proposed implementing something like
https://github.com/NixOS/nix/issues/13544 in Lix, which led to the
question "who is using sha1 anyway?" and the realization we could just
*remove* support for it outside of .. the known chromium crimes.
2025-07-24 19:31:06 -07:00
Wolfgang Walther
62fe016519 treewide: run treefmt with mdcr/nixfmt 2025-07-24 13:52:31 +02:00
Wolfgang Walther
6c47e7d5da treewide: fix syntax errors in nix code blocks
Fixes all code blocks with "nix" language in markdown files for syntax
errors to be able to run nixfmt in the next step.
2025-07-24 13:52:29 +02:00
Michele Guerini Rocco
6424dede0c nixos/network-interfaces: improve IPv6 support (#417150) 2025-07-23 16:51:24 +02:00
Defelo
224dc30d39 nixos/go-httpbin: init module 2025-07-23 16:17:47 +02:00
André Silva
fcf647a843 nixos/qbittorrent: init (#287923) 2025-07-22 12:48:41 +01:00
Frank Moda
12ed2954d4 nixos/homebridge: init 2025-07-22 15:26:19 +05:30
nuko
84d174e312 nixos/qbittorrent: init service module
nixos/qbittorrent: add default serverConfig & fix test

Migrate to runTest

Replace lib.optional with lib.optionals

nixos/qbittorrent: update release notes to 2511
2025-07-22 17:39:46 +12:00
Alexandru Scvorțov
1ff3dc1245 matrix-tuwunel: add service module 2025-07-21 01:52:09 +05:30
Felix Buehler
140a6b4522 nixos/lemurs: init 2025-07-19 16:15:58 +05:30
Sandro
d69cbe23e1 nixos/chhoto-url: init module (#424630) 2025-07-18 13:32:14 +02:00
Aleksana
03b3a97679 nixos/newt: init (#414337) 2025-07-18 19:07:59 +08:00
Defelo
55e6f26bff nixos/chhoto-url: init module 2025-07-18 12:00:32 +02:00
dish
21e98fc8a9 forgejo: 11.0.3 -> 12.0.0
https://forgejo.org/2025-07-release-v12-0/

https://codeberg.org/forgejo/forgejo/milestone/12836
2025-07-17 11:46:43 -04:00
xanderio
caea8a1c0a nixos/dependency-track: fix default JVM heap size (#425747) 2025-07-17 16:11:36 +02:00
jack
9501130c38 nixos/newt: init 2025-07-17 13:04:13 +02:00
Sebastian Kowalak
e33d7087b6 nixos/paisa: init 2025-07-16 22:00:12 +02:00
Julian Stecklina
5517b6f068 nixos/dependency-track: fix default JVM heap size
The default of 4GB is too low for a production setup and causes
DependencyTrack to hit java.lang.OutOfMemoryError. This causes
Dependency Track to enter a weird state where it will throw 502 and
504 errors.

The initial 4GB was set to make Dependency Track run in the (too
small) VM in the NixOS integration test. Move the explicit heap
configuration there. For the service itself, we now don't set a limit.
This means the JVM will choose its maximum heap on its own, which does
a much better job for realistic scenarios.

I added a release note, because people who run Dependency Track on
very tiny VMs/machines may experience issues.
2025-07-16 12:16:49 +02:00
Martin Weinelt
fbc56958af nixos/pfix-srsd: migrate postfix integration from postfix module
The postfix module is too big to host every individual integration option
and moving it here has no downside.
2025-07-15 22:04:28 +02:00
Martin Weinelt
9a9073fc89 nixos/postsrsd: integrate with postfix by default 2025-07-15 20:29:35 +02:00
Kevin Cox
8ff28f4d78 sparkleshare: Remove
The project has been unmaintained for a while now and has started failing to build.

Abandonment notice from the maintainer: https://github.com/hbons/SparkleShare/issues/2006

It has been a good run but it is time to say goodbye. Thanks to hbons for all of the work over the years. It looks like there is a good chance of a fork living on but it will take time to see how that shakes out. So for now let's just remove the package.
2025-07-15 08:22:27 -04:00
Leona Maroni
41ff90fcd4 nixos/varnish: turn listen addresses into structured config (#421481) 2025-07-15 13:13:50 +02:00
Vladimír Čunát
b47d4f01d4 staging-next 2025-07-04 (#422427) 2025-07-13 19:33:14 +02:00
Wolfgang Walther
733f85ec4f fanctrl: init at 1.0.3; add nixos module (#388514) 2025-07-13 16:36:41 +00:00
Svenum
cfe95170f1 nixos/fw-fanctrl: init 2025-07-13 18:22:47 +02:00
nixpkgs-ci[bot]
8457b9345d Merge master into staging-next 2025-07-13 00:20:06 +00:00
Izorkin
80318319cb libvirt: add support nftables backend 2025-07-11 23:51:20 +03:00
rnhmjoj
0bd522a407 nixos/release-notes: mention networking.interfaces changes 2025-07-11 09:44:49 +02:00
K900
77e81dbfc2 Merge remote-tracking branch 'origin/master' into staging-next 2025-07-11 09:24:31 +03:00
Connor Baker
6af71350c3 nixos/tee-supplicant: add tee-supplicant module (and more) (#237613) 2025-07-10 16:35:55 -07:00
Christian Theune
8046e4a6f8 nixos/varnish: turn listen addresses into structured config
Introduces `services.varnish.listen` as a list of structured
listen addresses with all allowed variations of arguments
documented in the man page.

Deprecates `services.varnish.http_address`.
2025-07-08 13:52:55 +02:00
K900
e2c8c4260d Merge remote-tracking branch 'origin/master' into staging-next 2025-07-07 10:09:49 +03:00
Martin Weinelt
468768b93b Reapply "nixos/dovecot: improve and harden systemd unit" (#422829) 2025-07-07 01:25:22 +02:00
Martin Weinelt
5f9db3b506 nixos: stop using/installing nettools by default (#422270) 2025-07-07 00:32:19 +02:00
nixpkgs-ci[bot]
07ab953baa Merge master into staging-next 2025-07-06 16:43:42 +00:00
Ruby Iris Juric
11d8fbb0b6 nixos/sharkey: init module 2025-07-07 01:01:39 +10:00
Martin Weinelt
6403717045 Reapply "nixos/dovecot: improve and harden systemd unit"
This reverts commit a794031c59.

With the following additions:

Allow `CAP_KILL`, so the dovecot master process may interrupt its child
processes.

Allow new privileges, so dovecot and call the setuid sendmail executable.

Allow AF_NETLINK sockets, so dovecot sieve handling can use the
getifaddrs syscall.

Finally, we now asssert, that no options are set on the legacy dovecot2
systemd unit name, to make the user aware they need to update their
overrides.
2025-07-06 14:39:40 +02:00
nixpkgs-ci[bot]
60677469ef Merge master into staging-next 2025-07-06 12:06:26 +00:00
Jaco Malan
1fb02bc8f9 nixos/monero: add environmentFile option 2025-07-06 10:33:44 +02:00
Martin Weinelt
bf1b4d35fb networking: don't install nettools by default
https://lwn.net/Articles/710533/ has been true in 2017 and still holds
today.
2025-07-06 00:59:36 +02:00
nixpkgs-ci[bot]
d5e57e9a43 Merge master into staging-next 2025-07-05 12:06:19 +00:00
K900
a6900e5833 nixos/lasuite-meet: init (#407742) 2025-07-05 10:21:40 +03:00
soyouzpanda
15f71480e2 nixos/lasuite-meet: init 2025-07-05 10:10:15 +03:00