summaryrefslogtreecommitdiffstats
path: root/nixos/modules/services
AgeCommit message (Collapse)Author
14 daysMerge pull request #322585 from wegank/limesurvey-securityThomas Gerbet
nixos/limesurvey: drop default encryption key and nonce
14 daysMerge pull request #322508 from MarcelCoding/houndSandro
hound: convert to use freeform type
14 daysnixos/scion: use RuntimeDirectory instead of StateDirectory (#323200)Matthew Croughan
It was wrong to use StateDirectory to keep the scion-control and scion-router runtime databases on disk for the next run. I observed that doing this means a reboot, or power outage can corrupt the temporary runtime databases for the next service start, leading scion ping and other functionality to stop working permanently, since those files are not managed in an atomic manner by the golang code.
14 daysMerge pull request #314798 from yomaq/healthchecks-settingsFileMasum Reza
nixos/healthchecks: add settingsFile option
14 daysMerge pull request #278982 from felbinger/masterMasum Reza
python311Packages.mozilla-django-oidc: init at 4.0.1; peering-manager: add oidc support
14 daysMerge pull request #323159 from bobby285271/upd/xfce-colordBobby Rong
nixos/xfce: Enable colord by default
14 daysnixos/xfce: Enable colord by defaultBobby Rong
Goes with #323010.
2024-06-28nixos/limesurvey: drop default encryption key and nonceWeijia Wang
Co-authored-by: Thomas Gerbet <thomas@gerbet.me>
2024-06-27nixos/hound: set reasonable default for dbpathSandro Jäckel
2024-06-27nixos/hound: remove `with lib;`Marcel
2024-06-27nixos/hound: convert config to free-form type, add config checkMarcel
2024-06-27nixos/hound: cleanup services.hound.enableMarcel
2024-06-27Merge pull request #322801 from eclairevoyant/discourage-mkpackageoptionmdSilvan Mosberger
lib: deprecate mkPackageOptionMD
2024-06-27Merge pull request #322782 from DCsunset/quickwit-fixNiklas Hambüchen
nixos/quickwit: fix service ReadWritePaths
2024-06-27Merge pull request #322397 from Ma27/bump-nextcloudJonas Heinrich
nextcloud: drop 27, 28.0.6 -> 28.0.7, 29.0.2 -> 29.0.3
2024-06-27Merge pull request #322216 from Pandapip1/patch-3Sandro
services/localtimed: Allow configuring packages
2024-06-27nixos/scion: add scion package when scion.enable = truematthewcroughan
2024-06-27nixos/scion: use recursiveUpdate instead of //matthewcroughan
2024-06-26treewide: replace mkPackageOptionMD with mkPackageOptionéclairevoyant
2024-06-26nixos/quickwit: fix service ReadWritePathsDCsunset
2024-06-26Merge pull request #313606 from drupol/ollama-add-preLoadedModelsPol Dellaiera
nixos/ollama: add `loadModels` config option
2024-06-26nixos/ollama: add `loadModels` config optionPol Dellaiera
Allows users to download model files upon service startup, instead of at the first use of the model, improving percieved startup latency.
2024-06-26Merge pull request #321591 from JohnRTitor/gdm-fingerprint-authMasum Reza
nixos/gdm: allow logging in via fingerprint
2024-06-26Merge pull request #244684 from m-bdf/kmscon-use-upstream-service-fileSandro
nixos/kmscon: use upstream service file
2024-06-26nixos/peering-manager: add oidc supportNico Felbinger
Co-authored-by: Jenny <me@netali.de> Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-06-26Merge pull request #311381 from minijackson/tomcat-portSandro
nixos/tomcat: add 'port' option
2024-06-25Merge pull request #316977 from eclairevoyant/fix-mkEnableOptionSandro
treewide: fix mkEnableOption usage
2024-06-25Merge pull request #315144 from mattpolzin/default-nodename-fixSandro
nixos/services.kubernetes.kubelet: handle non-lower case chars in hostname
2024-06-25Merge pull request #318347 from caffineehacker/vaultwarden_backupSandro
nixos/vaultwarden: backup all rsa_keys
2024-06-25Merge pull request #272895 from xanderio/wg-access-server-0.10.1Sandro
wg-access-server: init at 0.12.1
2024-06-25Merge pull request #321984 from ryze312/fix_localConfJörg Thalheim
nixos/zerotierone: fix default value for localConf
2024-06-25nixos/gitlab-runner: Add support runner authentication tokensYaya
Support for *runner registration tokens* is deprecated since GitLab 16.0, has been disabled by default in GitLab 17.0 and will be removed in GitLab 18.0, as outlined in the [GitLab documentation]. It is possible to [re-enable support for runner registration tokens] until GitLab 18.0, to prevent the registration workflow from breaking. *Runner authentication tokens*, the replacement for registration tokens, have been available since GitLab 16.0 and are expected to be defined in the `CI_SERVER_TOKEN` environment variable, instead of the previous `REGISTRATION_TOKEN` variable. This commit adds a new option `services.gitlab-runner.services.<name>.authenticationTokenConfigFile`. Defining such option next to `services.gitlab-runner.services.<name>.registrationConfigFile` brings the following benefits: - A warning message can be emitted to notify module users about the upcoming breaking change with GitLab 17.0, where *runner registration tokens* will be disabled by default, potentially disrupting operations. - Some configuration options are no longer supported with *runner authentication tokens* since they will be defined when creating a new token in the GitLab UI instead. New warning messages can be emitted to notify users to remove the affected options from their configuration. - Once support for *registration tokens* has been removed in GitLab 18, we can remove `services.gitlab-runner.services.<name>.registrationConfigFile` as well and make module users configure an *authentication token* instead. This commit changes the option type of `services.gitlab-runner.services.<name>.registrationConfigFile` to `with lib.types; nullOr str` to allow configuring an authentication token in `services.gitlab-runner.services.<name>.authenticationTokenConfigFile` instead. A new assertion will make sure that `services.gitlab-runner.services.<name>.registrationConfigFile` and `services.gitlab-runner.services.<name>.authenticationTokenConfigFile` are mutually exclusive. Setting both at the same time would not make much sense in this case. [GitLab documentation]: https://docs.gitlab.com/17.0/ee/ci/runners/new_creation_workflow.html#estimated-time-frame-for-planned-changes [re-enable support for runner registration tokens]: https://docs.gitlab.com/17.0/ee/ci/runners/new_creation_workflow.html#prevent-your-runner-registration-workflow-from-breaking
2024-06-25nixos/gitlab-runner: Remove global with lib;Yaya
2024-06-25Merge pull request #322386 from katexochen/jonringer/rmJulien Malka
treewide: remove jonringer as package maintainer and code owner
2024-06-25Merge pull request #322186 from bobby285271/upd/cinnamon-xappsBobby Rong
Cinnamon updates 2024-06-24
2024-06-25nextcloud27: removeMaximilian Bosch
Version will be EOL by the end of 2024-06.
2024-06-25nixos/prometheus: remove minio exporterMoritz Sanft
2024-06-25nixos/wg-access-server: init moduleAlexander Sieg
2024-06-25treewide: remove jonringer as package maintainerPaul Meyer
Signed-off-by: Paul Meyer <49727155+katexochen@users.noreply.github.com>
2024-06-25Merge pull request #310778 from wineee/dde23rewine
deepin desktop environment: update
2024-06-24nixos/rtorrent: make RuntimeDirectory not world readableThiago Kenji Okada
2024-06-24nixos/rtorrent: add systemd hardening configurationThiago Kenji Okada
2024-06-24services/localtimed: Add package and geoclue2Package optionsGavin John
2024-06-24nixos/cinnamon: Don't ship apps that are not shipped in Mint 22Bobby Rong
My reasons following Mint are: 1. Geary signed https://stopthemingmy.app, per request we shouldn't pre-ship it under a themed desktop environment. See also https://github.com/linuxmint/mint-y-icons/commit/b7937b45090f8b15f7718bd51ef7bee1eb0e263c 2. Hexchat is still gtk2 and is not maintained anymore, Mint encourages switching to Matrix instead. See also https://blog.linuxmint.com/?p=4675 ("Joining the Matrix")
2024-06-24nixos/private-gpt: remove `drupol` from maintainersPol Dellaiera
2024-06-24Merge pull request #321828 from Shawn8901/stalwart-spamfilterYt
stalwart-mail: include pre-defined spam-filter
2024-06-23Merge pull request #314917 from christoph-heiss/sourcehut-fixtomberek
nixos: sourcehut: fix some binary paths
2024-06-23Merge pull request #316727 from jpds/nixos-tests-prometheusFranz Pletz
nixos/prometheus: Revamp tests
2024-06-23Merge pull request #322011 from ↵Martin Weinelt
kkoniuszy/add-home-assistant-custom-components-spook home-assistant-custom-components.spook: init at 3.0.1
2024-06-23nixos/home-assistant: fix symlinking multi-manifest custom componentsKacper Koniuszy
frenck/spook includes a second manifest for an integration. The current copyCustomComponents script assumed that only one component directory will be found, which in this case resulted in a malformed symlink destination: lrwxrwxrwx 1 hass hass 224 Jun 23 17:23 spook -> '/nix/store/r41ics22zs578avzqf7x86plcgn2q71h-python3.12-frenck-spook-v3.0.1/custom_components/spook/integrations/spook_inverse'$'\n''/nix/store/r41ics22zs578avzqf7x86plcgn2q71h-python3.12-frenck-spook-v3.0.1/custom_components/spook'