Commit Graph

2270 Commits

Author SHA1 Message Date
Bruno BELANYI
e1e459223d mealie: 2.7.1 -> 2.8.0 (#392158) 2025-04-13 19:59:31 +01:00
Anton Mosich
3f12820164 nixos/mealie: update for mealie v2.8.0
mealie v2.8.0 no longer uses crfpp, but instead uses
ingredient_parser_nlp, which relies on nltk-data. If this environment
variable isn't available, mealie will just download the data instead.
2025-04-13 20:50:30 +02:00
Sandro
1cb88030dd nixos/whoami: init module (#397396) 2025-04-11 17:00:16 +02:00
Sandro
28a43ce6ba baikal: init at 0.10.1 (#370473) 2025-04-11 00:54:14 +02:00
Defelo
3ae07e6d12 nixos/whoami: init module 2025-04-09 16:51:04 +02:00
wrvsrx
30fe7315db nixos/baikal: add it 2025-04-09 18:16:20 +08:00
Seth Flynn
43f7128bbe nixos/reposilite: init module (#381197) 2025-04-08 11:07:36 -04:00
Bruno BELANYI
9c09962137 nixos/homebox: add 'database.createLocally' 2025-04-07 22:19:57 +01:00
Bruno BELANYI
2830bf83f8 nixos/homebox: remove 'network.target' dependency 2025-04-07 21:31:52 +01:00
Bruno BELANYI
4ae49051cb nixos/homebox: allow using UNIX sockets
This is necessary to use PostgreSQL with a local socket.
2025-04-07 21:27:16 +01:00
Tristan Ross
77f77a046a mattermost: 9.11.11 -> 10.5.2; use formats.json; squash systemd-tmpfiles warning (#376838) 2025-04-07 10:27:15 -07:00
Sandro
cf46302e9a nixos/modules: fix part-db package (#388313) 2025-04-06 20:52:00 +02:00
Bruno BELANYI
ce4166636b homebox: 0.17.0 -> 0.18.0; nixos/homebox: update defaults (#388655) 2025-04-06 14:38:36 +01:00
Weijia Wang
999d6cd51c nixos/archtika: fix module and package (#392678) 2025-04-04 14:52:59 +02:00
Sandro Jäckel
ed26b7b0c3 nixos/onlyoffice: misc cleanup 2025-04-04 11:37:33 +02:00
Pol Dellaiera
a9899b4c8f nixos/glance: fix broken server stats (#395859) 2025-04-04 11:23:17 +02:00
MunsMan
2728be7c31 nixos/glance: fix broken server stats 2025-04-04 10:43:13 +02:00
uku
dfaad22261 nixos/reposilite: init module 2025-04-04 09:46:24 +02:00
7c6f434c
8d47959e22 x2t: init at 8.3.2 (#338794) 2025-04-04 04:46:52 +00:00
Florian Klink
e9e9e07548 nixos/movim: remove useless xargs script call (#395727) 2025-04-04 00:21:00 +01:00
Florian Klink
e9a9de1735 nixos/movim: H2O support, H2O + Ejabberd + runTest (#385040) 2025-04-03 19:51:51 +01:00
Arnout Engelen
ea0b776f71 x2t: init at 8.3.2 2025-04-03 20:08:48 +02:00
Piotr Kwiecinski
d96daf7fdd nixos/agorakit: add phpPackage option and pass it to fpm pool 2025-04-03 16:36:28 +02:00
Pol Dellaiera
2bfc080955 nixos/monica: add phpPackage option and pass it to phpfpm pool (#395761) 2025-04-03 16:08:01 +02:00
Sandro
0a124d5554 nixos/gancio: add sendmail to path, make cli easier to use (#395737) 2025-04-03 15:56:51 +02:00
Piotr Kwiecinski
1db72d9afc nixos/monica: add phpPackage option and pass it to phpfpm pool
fixes nixosTests.monica failure
2025-04-03 15:52:08 +02:00
Sandro Jäckel
052423a7e9 nixos/gancio: add sendmail to path 2025-04-03 14:16:02 +02:00
Sandro Jäckel
c5eb4441b9 nixos/gancio: make cli easier to use 2025-04-03 14:16:02 +02:00
โทสฺตัล
b556798f65 nixos/movim: remove useless xargs script call
xargs templating already covers this
2025-04-03 18:16:00 +07:00
Nick Cao
a084e920e0 ocis_5-bin: rename from ocis-bin (#394598) 2025-04-02 16:56:09 -04:00
โทสฺตัล
8a8b892cc1 nixos/movim: add H2O support + testing with ejabberd 2025-04-03 00:18:28 +07:00
โทสฺตัล
0d9a758f73 nixos/movim: cleanup Nginx option 2025-04-03 00:16:19 +07:00
โทสฺตัล
b0f9f1c9f5 nixos/movim: refactor types (shouldn’t meaningfully change anything) 2025-04-03 00:16:18 +07:00
Felix Zieger
1bf74aee3c nixos/haven: init 2025-04-02 17:30:18 +02:00
Maximilian Bosch
39dcdc5c9b nixos/nextcloud: check if ownership of config is correct
Follow-up on #169733

For `data`, Nextcloud checks on its own if everything is readable.
However, for `config` it's crucial that the ownership is actually
correct: otherwise, systemd-tmpfiles will refuse any operations inside
because of unsafe path transitions.

This can result in a subtly broken setup by the `override.config.php`
not being updated, but also not part of the system closure anymore
(another override.config.php is referenced now) which means it'll be
GCed eventually even though Nextcloud relies on it.

If this precondition is not met, the following error will be printed:

    nextcloud-setup-start[972]: /var/lib/nextcloud/config is not owned by user 'nextcloud'!
    nextcloud-setup-start[972]: Please check the logs via 'journalctl -u systemd-tmpfiles-setup'
    nextcloud-setup-start[972]: and make sure there are no unsafe path transitions.
    nextcloud-setup-start[972]: (https://nixos.org/manual/nixos/stable/#module-services-nextcloud-pitfalls-during-upgrade)
2025-04-02 09:30:17 +02:00
misuzu
0f4487251d strfry: init at 1.0.4, nixos/strfry: init (#385587) 2025-04-02 10:13:41 +03:00
Morgan Jones
9f23ed6644 nixos/mattermost: increase db connect timeouts 2025-04-01 22:17:57 -07:00
Morgan Jones
ea485e1207 mattermost: squash systemd-tmpfiles warning (+ other minor fixes)
There was a systemd-tmpfiles warning about not being able to remove the
'plugins' directory. Squash this warning through removal of unnecessary
systemd-tmpfiles options, and write a test for it.

Add the {option}`services.mattermost.pluginsBundle` option to allow
overriding the plugin directory and also using it for tests. Update
wording in option documentation so it is more clear.

Use formats.json instead of builtins.toJSON so module merging works.

Make the tests go faster by pipelining shutdowns of nodes.
2025-04-01 19:20:48 -07:00
Felix Zieger
dfd82bf3e5 nixos/strfry: init 2025-04-01 23:20:15 +02:00
Silvan Mosberger
374e6bcc40 treewide: Format all Nix files
Format all Nix files using the officially approved formatter,
making the CI check introduced in the previous commit succeed:

  nix-build ci -A fmt.check

This is the next step of the of the [implementation](https://github.com/NixOS/nixfmt/issues/153)
of the accepted [RFC 166](https://github.com/NixOS/rfcs/pull/166).

This commit will lead to merge conflicts for a number of PRs,
up to an estimated ~1100 (~33%) among the PRs with activity in the past 2
months, but that should be lower than what it would be without the previous
[partial treewide format](https://github.com/NixOS/nixpkgs/pull/322537).

Merge conflicts caused by this commit can now automatically be resolved while rebasing using the
[auto-rebase script](8616af08d9/maintainers/scripts/auto-rebase).

If you run into any problems regarding any of this, please reach out to the
[formatting team](https://nixos.org/community/teams/formatting/) by
pinging @NixOS/nix-formatting.
2025-04-01 20:10:43 +02:00
Maximilian Bosch
f20b220e17 Merge: nixos/nextcloud: add maintainer team, update docs about maintainership of apps (#393069) 2025-04-01 11:25:28 +02:00
Casey Link
2db95477f9 nixos/ocis: default to the newly renamed ocis-bin5 package
And we are getting ready for ocis-bin7 to land, where we will need to
compare it to the system.stateVersion.
2025-04-01 08:49:20 +02:00
Robert Hensing
e12690d530 nixos/movim: Fix accidental append to module system property 2025-03-31 12:24:22 +02:00
Maximilian Bosch
97d215cf17 Merge: php: 8.3 -> 8.4 (#394112) 2025-03-30 22:54:31 +02:00
Nico Felbinger
7dc56449ad nixos/modules: fix part-db package 2025-03-30 15:20:13 +02:00
Jonas Heinrich
8d69e1faae nixos/wordpress: Use https by default for caddy (#375375) 2025-03-30 10:31:52 +02:00
Maximilian Bosch
65121c9333 Merge: nextcloud-occ: work with sudo disabled (#380211) 2025-03-29 23:25:45 +01:00
Daniel Xu
f1c4d339a5 nixos/wordpress: Use https by default for caddy
Previously, `http://` scheme was hard coded into the caddy config if
`webserver = "caddy"` was chosen. This is fine for local testing, but is
problematic if you want your nixos host to be public facing.

In the public facing case, you generally want to be using TLS. But since
the wordpress module generates the caddyfile rule, the user's nixos
config cannot easily change it to also allow https.

An alternative would be to reverse proxy an https rule to the generated
http rule, but that's somewhat questionable as there's not an internal
http endpoint to proxy to. It might be possible but I couldn't figure
it out.

So simplify by omitting the scheme. This causes caddy to use https by
default and 301 redirect any http requests to the https endpoint. Caddy
will just do the right thing if it's being hosted on a local/internal
hostname (self sign certificates).

This should be backwards compatible with previous default if users are
using reasonable browsers/tools.

Signed-off-by: Daniel Xu <dxu@dxuuu.xyz>
2025-03-29 15:10:35 -06:00
Bruno BELANYI
8fb60c58dd calibre-web: fix ebook conversion missing config_binariesdir setting (#366642) 2025-03-29 20:08:35 +00:00
Pol Dellaiera
0ef31de6ea monica: pin php version to 8.3 (#394415) 2025-03-29 20:12:16 +01:00