summary refs log tree commit diff
path: root/nixos
AgeCommit message (Collapse)AuthorFilesLines
2022-11-2122.11 beta release 22.11-betaMartin Weinelt2-2/+2
2022-11-21Merge pull request #202160 from yrd/outlineCabia Rangris1-5/+16
outline: 0.66.3 -> 0.67.0
2022-11-21Merge pull request #202211 from helsinki-systems/fix/redis-requirepassMartin Weinelt1-2/+4
2022-11-21Merge pull request #200082 from panicgh/fetchgit-sparse-checkoutSandro2-0/+11
2022-11-21nixos/redis: fix requirepassajs1241-2/+4
2022-11-21Merge pull request #201527 from figsoda/libfigsoda1-3/+3
lib/attrsets: add concatMapAttrs
2022-11-21nixos/mautrix-telegram: document JSON env var configpacien1-0/+5
This was introduced in mautrix-telegram v0.12.1. See: https://github.com/mautrix/telegram/issues/584#issuecomment-1250027272 See: https://github.com/mautrix/telegram/releases/tag/v0.12.1
2022-11-21Revert "nixos/mautrix-telegram: substitute secrets in config file at runtime ↵pacien1-14/+2
(#112966)" This is no longer necessary since mautrix-telegram v0.12.1, which supports JSON-formatted environment variable and therefore maps natively. See: https://github.com/mautrix/telegram/issues/584#issuecomment-1250027272 See: https://github.com/mautrix/telegram/releases/tag/v0.12.1 This partially reverts commit 24133ead28dc4ece7ba016bc8f7624db0478e977.
2022-11-21nixos/mautrix-telegram: add documentation for setting arbitrary secretsCRTified1-1/+7
The change that allows setting the secrets by an environment file had the undocumented side effect of allowing to set any key by the environment file (Related PR: https://github.com/tulir/mautrix-telegram/pull/332). This is required to e.g. set `bridge.login_shared_secret`, which was not documented before. GitHub: closes #103347
2022-11-21nixos/mastodon: fix emoji importIzorkin1-1/+1
2022-11-21Merge pull request #202132 from ElvishJerricco/systemd-stage-1-tests-hibernateJanne Heß2-3/+5
nixos: ext fixes with systemd-initrd
2022-11-21outline: 0.66.3 -> 0.67.0Yannik Rödel1-5/+16
2022-11-21nixosTests.systemd-initrd-luks-password: test mounting device unlocked in ↵Nick Cao1-0/+5
initrd after switching root
2022-11-21nixos/udev: enable initrd-udevadm-cleanup-db.service in systemd stage 1Nick Cao1-1/+8
2022-11-20nixos: Add ext to fsPackages in stage 2 with systemd-initrd enabledWill Fancher1-1/+2
2022-11-21Merge pull request #201647 from jtojnar/nixos-dbus-cleanupSandro1-40/+32
2022-11-20nixos: Fix hibernate test with systemd stage 1Will Fancher1-2/+3
2022-11-20Merge pull request #201750 from samueldr/feature/plasma-mobile-settingsSamuel Dionne-Riel1-3/+3
nixos/plasma5: Sync Plasma Mobile kwinrc defaults with upstream
2022-11-20Merge pull request #199150 from Ma27/grafana-fixupMaximilian Bosch4-193/+404
nixos/grafana: documentation/warning improvements after #191768
2022-11-20Merge pull request #196148 from Mic92/tailscaleJörg Thalheim1-1/+5
tailscale: improve formatting on warning message
2022-11-20nixos/doc: also note that external YAML files for grafana will end up in the ↵Maximilian Bosch2-0/+10
store
2022-11-20nixos/grafana: review fixesMaximilian Bosch1-2/+2
2022-11-20Merge pull request #198470 from RaitoBezarius/nc25-opensslMaximilian Bosch7-1/+211
nextcloud25: use openssl 1.1 as a PHP extension to fix RC4 encryption
2022-11-20nixos/grafana: make warning more clearMaximilian Bosch1-2/+2
2022-11-20nixos/grafana: allow using both directories or single YAML files for non-Nix ↵Maximilian Bosch4-35/+56
provisioning
2022-11-20nixos/grafana: fix w/o datasources or dashboard provisioningMaximilian Bosch1-3/+14
2022-11-20nixos/grafana: fix secret-related warningsMaximilian Bosch1-42/+45
Closes #198646 * The options `password`/`basicAuthPassword` were removed for datasources in Grafana 9. The only option to declare them now is to use `secureJsonData`. * Fix description for contactPoints provisioning: when using file/env providers, nothing will be leaked into the store. * Fix regex in file-provider usage check: it's also possible to either use `$__env{FOO}` or `$FOO` to fetch secrets from the environment. * Fix warning for datasources: `password`/`basicAuthPassword` was removed, also check for each setting in `secureJsonData` if env/file-provider was used (then no warning is needed!).
2022-11-20nixos/doc: wording fixMaximilian Bosch2-4/+4
2022-11-20nixos/tests/grafana: demonstrate how to use the file providerMaximilian Bosch1-1/+1
Yes, it's still a store path, but it's only for demonstration purposes. Also we now have fewer warnings in the provision test.
2022-11-20nixos/grafana: we only support single YAML files for provisioningMaximilian Bosch2-2/+2
2022-11-20nixos/grafana: get rid of unnecessary `flatten` for warningsMaximilian Bosch1-6/+5
2022-11-20nixos/grafana: re-add legacy notifiers test, mention notifiers in release notesMaximilian Bosch3-0/+53
2022-11-20nixos/grafana: mark `services.grafana.extraOptions` as removedMaximilian Bosch1-0/+4
2022-11-20nixos/doc: improve release-notes for services.grafanaMaximilian Bosch2-17/+174
2022-11-20nixos/grafana: `provision.{datasources,dashboards}` can't be a list anymoreMaximilian Bosch2-114/+67
The hack with `either` had the side-effect that the sub-options of the submodule didn't appear in the manual. I decided to remove this because the "migration" isn't that hard, you just need to fix some module declarations. However, `mkRenamedOptionModule` wouldn't work here because it'd create a "virtual" option for the deprecated path (i.e. `services.grafana.provision.{datasources,dashboards}`), but that's the already a new option, i.e. the submodule for the new stuff. To make sure that you still get errors, I implemented a small hack using `coercedTo` which throws an error if a list is specified (as it would be done on 22.05) which explains what to do instead to make the migration easier. Also, I linkified the options in the manual now to make it easier to navigate between those.
2022-11-20nixos/tests/acme/server: regenerate certsajs1244-83/+83
expired today
2022-11-20Merge pull request #201000 from drupol/php/8.2.0Elis Hirwing3-0/+8
php82: init at 8.2.0rc6
2022-11-19nixos/firewall: remove stray quote from package optionDavid Wilemski1-1/+1
This quote is not needed and shows up rendered in the manpage documenting this option.
2022-11-20Merge pull request #201984 from hax404/deluge_testMartin Weinelt1-1/+3
2022-11-20Merge pull request #181967 from noneucat/fix/at-spi2-coreJan Tojnar1-1/+4
gnome/at-spi2-core: also set GTK_A11Y when at-spi2-core is disabled
2022-11-20Merge pull request #201991 from vlinkz/calamaresqtwebkitMartin Weinelt1-2/+0
2022-11-20nixos/gnome/at-spi2-core: force GTK_A11Y=none when disabledAndy Chun @noneucat1-1/+4
GTK 4 applications use accessibility bus directly and will try to connect to it every time a widget is created: https://gitlab.gnome.org/GNOME/gtk/-/issues/4831 This will make GTK 4 apps (e.g. newly ported Nautilus) grind to a halt on systems that do not have AT-SPI service installed. Let’s explicitly disable accessibility support with an environment variable when the AT-SPI service is not enabled to avoid that. Just like we do for ATK-based applications with `NO_AT_BRIDGE`. Fixes: https://github.com/NixOS/nixpkgs/issues/197188
2022-11-19installation-cd: Remove libsForQt5.fullVictor Fuentes1-2/+0
2022-11-19surrealdb: module inithappysalada2-0/+80
2022-11-20nixos/tests/deluge: fix testGeorg Haas1-1/+3
deluge-console always exits with code 1. This is known in https://dev.deluge-torrent.org/ticket/3291
2022-11-19Merge pull request #197254 from Atemu/fstab-escape-optionsMartin Weinelt5-5/+36
2022-11-19tremor-rs: module inithappysalada2-0/+130
2022-11-19Merge pull request #198820 from talyz/keycloak-admin-passwordMartin Weinelt2-9/+35
2022-11-19Merge pull request #195497 from mweinelt/crypt-hash-deprecationsMartin Weinelt3-4/+23
2022-11-19Merge pull request #193740 from illustris/hbaseMartin Weinelt1-1/+1
hbase: remove 1.7, 2.4.11 -> 2.4.15, init 2.5.1, 3.0.0-alpha-2 -> alpha-3