about summary refs log tree commit diff
path: root/nixos/modules/services
AgeCommit message (Collapse)AuthorFilesLines
2024-05-15Revert "nixos/garage: drop replication_mode setting"Yureka1-18/+7
2024-05-14Merge pull request #311307 from michaelpj/mpj/remove-some-maintenncePol Dellaiera2-2/+2
Remove myself from some packages I no longer use
2024-05-14Merge pull request #311376 from SuperSandro2000/display-managers-miscNick Cao1-2/+2
nixos/display.managers: use cfg where possible
2024-05-14Merge pull request #300564 from Cynerd/bcg-fixAleksana1-3/+3
nixos/bcg: fix usage without environment files
2024-05-14hostapd: add "wpa2-sha1" to authentication.mode enumTom Fitzhenry1-6/+11
This is required for some Kindles (e.g. Kindle Paperwhite 7th Gen), and printers (e.g. Brother MFC-J4440DW). OpenWRT typically adds "wpa_key_mgmt = WPA-PSK", per https://github.com/openwrt/openwrt/blob/3f28c422ba7ca06efd41686fd2f9e664f7e8a12e/package/network/config/wifi-scripts/files/lib/netifd/hostapd.sh#L44-L71
2024-05-13Merge pull request #310199 from symphorien/borg_ignore_warnings_masterGuillaume Girol1-6/+26
nixos/borgbackup: add an option to ignore warnings
2024-05-13Merge pull request #310786 from K900/greetd-plymouthK9001-1/+13
nixos/greetd: add option to make greetd not stop Plymouth early
2024-05-13nixos/display.managers: use cfg where possibleSandro Jäckel1-2/+2
2024-05-13Merge pull request #310926 from Gerg-L/display-managerSandro1-3/+0
2024-05-13Merge pull request #305286 from cafkafk/devpi-server-initChristina Rust1-0/+128
nixos/devpi-server: init
2024-05-13Merge pull request #309643 from flokli/garage-replication_modeFlorian Klink1-7/+18
nixos/garage: drop replication_mode setting
2024-05-13nixos/devpi-server: initChristina Sørensen1-0/+128
Signed-off-by: Christina Sørensen <christina@cafkafk.com>
2024-05-13Merge pull request #310350 from oddlama/fix-oauth2-proxyK9001-3/+3
nixos/oauth2-proxy: fix invalid comparison between list and attrset
2024-05-13tzupdate: remove michaelpj as maintainerMichael Peyton Jones1-1/+1
2024-05-13arbtt: remove michaeplj as maintainerMichael Peyton Jones1-1/+1
2024-05-13Merge pull request #310819 from ilya-epifanov/thermald-config-fixFranz Pletz1-2/+2
thermald: fixed handling of an external config
2024-05-13Merge pull request #307076 from flokli/caddy-reloadJörg Thalheim1-1/+1
nixos/caddy: don't set ExecReload if enableReload is disabled
2024-05-13Merge pull request #309115 from NyCodeGHG/nixos/miniflux-sd-notifyMartin Weinelt1-4/+11
nixos/miniflux: use systemd notify and watchdog
2024-05-13nixos/garage: add assertion for replication_factorYureka1-0/+18
2024-05-13Merge pull request #311039 from DavHau/pr_smokepingFlorian Klink1-33/+30
nixos/smokeping: use nginx instead of thttpd
2024-05-12Merge pull request #310873 from ivan/radvd-debuglevelFranz Pletz1-1/+12
nixos/radvd: add debugLevel option
2024-05-12Merge pull request #310348 from ehmry/nginx-validateConfigFilePol Dellaiera1-1/+8
nixos/nginx: add validateConfigFile option
2024-05-12Merge pull request #307051 from hax404/modules/tayga/mappingsAndreas Rammhold1-2/+24
nixos/tayga: add mappings option
2024-05-12nixos/caddy: don't set ExecReload if enableReload is disabledFlorian Klink1-1/+1
Otherwise, setting services.caddy.enableReload to false fails in a very bad fashion: The reload command still gets executed, but fails: ``` Apr 26 21:23:01 n1-rk1 systemd[1]: Reloading Caddy... Apr 26 21:23:01 n1-rk1 caddy[70793]: {"level":"info","ts":1714166581.733018,"msg":"using provided configuration","config_file":"/etc/caddy/caddy_config","config_adapter":"caddyfile"} Apr 26 21:23:01 n1-rk1 caddy[70793]: {"level":"warn","ts":1714166581.7353032,"msg":"Caddyfile input is not formatted; run 'caddy fmt --overwrite' to fix inconsistencies","adapter":"caddyfile","file":"/etc/caddy/caddy_config","line":3} Apr 26 21:23:01 n1-rk1 caddy[70793]: Error: sending configuration to instance: performing request: Post "http://localhost:2019/load": dial tcp [::1]:2019: connect: connection refused Apr 26 21:23:01 n1-rk1 systemd[1]: caddy.service: Control process exited, code=exited, status=1/FAILURE Apr 26 21:23:01 n1-rk1 systemd[1]: Reload failed for Caddy. ``` … and the server is not restarted either, as a ExecReload= command is specified. Fix this, by only setting ExecReload if the reload exists. The first empty string is still necessary to reset the old option.
2024-05-12Merge pull request #311074 from bobby285271/upd/mate-glib-networkingBobby Rong1-0/+1
nixos/mate: enable services.gnome.glib-networking cc #53700
2024-05-12nixos/mate: enable services.gnome.glib-networkingBobby Rong1-0/+1
This is already done in the 5 other desktop environments I maintain, I decided that I don't mind adding another one.
2024-05-12nixos/smokeping: use nginx instead of thttpdDavHau1-33/+30
Motivation: fixes #265953 Changes: - deprecate `services.smokeping.port` in favor of the niginx native option - mention in release notes
2024-05-12Merge pull request #305586 from drupol/private-gpt/initPol Dellaiera1-0/+121
private-gpt: init at 0.5.0
2024-05-11nixos/pixiecore: fix apiServer exampleBjørn Forsman1-2/+2
Add missing http:// scheme. Without it pixiecore logs this and never contacts the API server: [DHCP] Couldn't get bootspec for [REDACTED_MAC_ADDR]: Get "localhost:8080/v1/boot/[REDACTED_MAC_ADDR]": unsupported protocol scheme "localhost"
2024-05-11nixos/private-gpt: initPol Dellaiera1-0/+121
2024-05-11nixos/xserver: remove duplicate display-manager.script declarationGerg-L1-3/+0
2024-05-11nixos/radvd: add debugLevel optionIvan Kozik1-1/+12
2024-05-11thermald: fixed handling of an external configIlya Epifanov1-2/+2
2024-05-11nixos/greetd: add option to make greetd not stop Plymouth earlyK9001-1/+13
2024-05-10k3s: format with nixfmt-rfc-stylesuperherointj1-13/+31
2024-05-10Merge pull request #310366 from mweinelt/pretix-pretalx-homemodeMartin Weinelt2-12/+49
pretix, pretalx: fixes, hardening
2024-05-10Merge pull request #310452 from fpletz/nginx-acme-servernameFranz Pletz1-1/+1
nixos/nginx: fix reference to acme cert hostname
2024-05-10nixos/navidrome: add nu-nu-ko to maintainersnu-nu-ko1-1/+2
2024-05-10nixos/navidrome: ensure data & cache dirs exist with valid permissionsnu-nu-ko1-54/+65
2024-05-10nixos/navidrome: remove apply from settings optionnu-nu-ko1-3/+1
2024-05-10nixos/navidrome: use lib.getExenu-nu-ko1-2/+2
2024-05-10nixos/navidrome: add user/group optionsnu-nu-ko1-2/+25
2024-05-10nixos/navidrome: rfcfmt, rm mdDoc & with lib;nu-nu-ko1-52/+73
2024-05-10nixos/nginx: fix reference to acme cert hostnameFranz Pletz1-1/+1
The change introduced in #308303 refers to the virtualHosts attrset key which can be any string. The servername is the actual primary hostname used for the certificate. This fixes use cases like: services.nginx.virualHosts.foobar.serverName = "my.fqdn.org";
2024-05-09pretalx: adopt and set up code ownershipMartin Weinelt1-1/+1
2024-05-09nixos/pretix: update hardeningMartin Weinelt1-2/+4
- Transition from world-readable to group-readable UMask - Remove world permissions from state directory
2024-05-09nixos/pretalx: set up hardeningMartin Weinelt1-0/+35
2024-05-09nixos/pretalx: fix state directory modeMartin Weinelt1-5/+7
The state directory contains static files that need to be accessible by a webserver, but homeMode defaults to 0750 and switching the generation will always force the homeMode, thereby breaking access to the assets. Instead, fully rely on systemd to provide the StateDirectory with the correct mode.
2024-05-09nixos/pretix: fix state directory modeMartin Weinelt1-4/+2
The state directory contains static files that need to be accessible by a webserver, but homeMode defaults to 0750 and switching the generation will always force the homeMode, thereby breaking access to the assets. Instead, fully rely on systemd to provide the StateDirectory with the correct mode.
2024-05-09nixos/oauth2-proxy: fix invalid comparison between list and attrsetoddlama1-3/+3