summary refs log tree commit diff
path: root/nixos/modules/services/web-apps
Commit message (Collapse)AuthorAge
* nextcloud21: removeMaximilian Bosch2022-03-15
| | | | | | EOLed by upstream in 2022-02[1]. [1] https://docs.nextcloud.com/server/23/admin_manual/release_schedule.html#older-versions
* plantuml-server 1.2021.12 -> 1.2022.2Krzysztof Nazarewski2022-03-11
| | | | | - changed JDK version to 17 (11+ required) - added maven build reproducibility
* nixos/keycloak: fix database provisioning issuesmidchildan2022-02-28
| | | | | | | | | | | This fixes the following issues with the database provisioning script included in the services.keycloak module: - It lacked permission to access the DB password file specified in the module option 'services.keycloak.database.passwordFile'. - It prevented Keycloak from starting after the second time if the user chose MySQL for the database.
* nixos/peertube: add python pathIzorkin2022-02-24
|
* nixos/peertube: fix youtube-dl importIzorkin2022-02-24
|
* Merge pull request #156601 from symphorien/miniflux-passwordGuillaume Girol2022-02-21
|\ | | | | nixos/miniflux: no cleartext password in the store
| * nixos/miniflux: no cleartext password in the storeGuillaume Girol2022-01-31
| |
* | Merge pull request #158592 from SuperSandro2000/nginx-nixosSandro2022-02-20
|\ \
| * | treewide: use configured nginx packageSandro Jäckel2022-02-08
| | |
* | | nixos/mastodon: add RAILS_ROOT to mastodon-envJelle Besseling2022-02-19
| | |
* | | nixos/matomo: point path.geoip2 outside of the nix store.Olivier Marty2022-02-16
|/ / | | | | | | | | path.geoip2 pointed to the nix store which is read-only. Matomo was failing to download a geoip2 database. See #64759.
* | Merge pull request #157719 from talyz/bookstack-secret-pathsKim Lindberger2022-02-02
|\ \ | |/ |/| nixos/bookstack: Make secret replacement strings more unique
| * nixos/bookstack: Make secret replacement strings more uniquetalyz2022-02-02
| | | | | | | | | | | | | | If a secret path is a subset of a second secret path, there's a risk that its secret is substituted for the matching part of the second path. To prevent this, use the sha256 of the paths as placeholder string instead.
* | Merge pull request #153219 from symphorien/doc-minifluxGuillaume Girol2022-01-31
|\ \ | |/ |/| nixos/miniflux: improve docs
| * nixos/miniflux: improve docsGuillaume Girol2022-01-25
| |
* | Merge pull request #156731 from Ma27/bump-plausibleNiklas Hambüchen2022-01-29
|\ \ | | | | | | plausible: 1.4.0 -> 1.4.3
| * | plausible: 1.4.0 -> 1.4.3Maximilian Bosch2022-01-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ChangeLog: https://github.com/plausible/analytics/blob/v1.4.3/CHANGELOG.md#unreleased Also makes the option `services.plausible.releaseCookiePath` mandatory[1]: since Elixir 1.13 the `RELEASE_COOKIE` env-var *must* be set, otherwise the startup fails[2]. Since we drop `$out/releases/COOKIE` in the `fixupPhase` of `mixRelease` and Elixir seems to always attempt to generate such a file[3], I figured it's reasonable to just make it mandatory now. Closes #155575 [1] https://nixos.org/manual/nixos/stable/options.html#opt-services.plausible.releaseCookiePath [2] https://github.com/elixir-lang/elixir/commit/f24eb2c1ef3cfb345e9420945c57f276148c0a89 / https://github.com/elixir-lang/elixir/issues/11114 [3] https://hexdocs.pm/mix/Mix.Tasks.Release.html, see `:cookie`
* | | ethercalc: init at latest master (b19627)Ingo Blechschmidt2022-01-29
| | |
* | | nextcloud: use tmpfiles to create group-readable homeJörg Thalheim2022-01-27
|/ / | | | | | | | | | | | | | | users.users.*.createHome makes home only owner-readable. This breaks nginx reading static assets from nextcloud's home, after a nixos-rebuild that did not restart nextcloud-setup. Closes #112639
* | Merge pull request #155847 from onny/dokuwikicleanupRenaud2022-01-24
|\ \ | | | | | | nixos/dokuwiki: Minor code cleanup
| * | nixos/dokuwiki: Minor code cleanupJonas Heinrich2022-01-20
| | |
* | | nixos/wordpress: Drop old deprecated interface (#152674)Jonas Heinrich2022-01-23
| | |
* | | Merge pull request #155502 from yayayayaka/nextcloud-optional-headersMaximilian Bosch2022-01-21
|\ \ \ | | | | | | | | nixos/nextcloud: Optionally disable setting HTTP response headers
| * | | nixos/nextcloud: Optionally disable setting HTTP response headersLara2022-01-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This commit introduces a new option `services.nextcloud.nginx.recommendedHttpHeaders` that can be used to optionally disable serving recommended HTTP Response Headers in nginx. This is especially useful if some headers are already configured elsewhere to be served in nginx and thus result in duplicate headers. Resolves #120223
* | | | nixos/invoiceplane: init module and package at 1.5.11 (#146909)Jonas Heinrich2022-01-20
| |/ / |/| |
* | | Merge pull request #155367 from talyz/keycloak-loadcredentialNikolay Amiantov2022-01-19
|\ \ \ | |/ / |/| | nixos/keycloak: Use LoadCredential to load secrets + module formatting
| * | nixos/keycloak: Reformat the code with nixpkgs-fmttalyz2022-01-17
| | |
| * | nixos/keycloak: Inherit library functions and builtinstalyz2022-01-17
| | | | | | | | | | | | | | | | | | Instead of referencing all library functions through `lib.` and builtins through `builtins.` at every invocation, inherit them into the appropriate scope.
| * | nixos/keycloak: Use LoadCredential to load secretstalyz2022-01-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Use systemd's LoadCredential mechanism to make the secret files available to the service. This gets rid of the privileged part of the ExecPreStart script which only served to copy these files and assign the correct permissions. There's been issues with this approach when used in combination with DynamicUser, where sometimes the user isn't created before the ExecPreStart script runs, causing the error install: invalid user ‘keycloak’ This should fix that issue. Unfortunately, all of the ExecPreStart script had to be moved to ExecStart, since credentials aren't provided to ExecPreStart. See https://github.com/systemd/systemd/issues/19604.
* | | nixos/bookstack: Add option config to replace extraConfigtalyz2022-01-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The `extraConfig` parameter only handles text - it doesn't support arbitrary secrets and, with the way it's processed in the setup script, it's very easy to accidentally unescape the echoed string and run shell commands / feed garbage to bash. To fix this, implement a new option, `config`, which instead takes a typed attribute set, generates the `.env` file in nix and does arbitrary secret replacement. This option is then used to provide the configuration for all other options which change the `.env` file.
* | | nixos/bookstack: Simplify the nginx setuptalyz2022-01-18
| | | | | | | | | | | | Use the recommended defaults and remove unnecessary configuration.
* | | nixos/bookstack: Make the hostname configurable...talyz2022-01-18
| | | | | | | | | | | | | | | | | | | | | ...and set a reasonable default `appURL` based on it. This is pretty much required when configuring ACME, and useful in general.
* | | nixos/bookstack: Clear the cache more reliablytalyz2022-01-18
| | | | | | | | | | | | | | | | | | | | | | | | When upgrading bookstack, if something in the cache conflicts with the new installation, the artisan commands might fail. To solve this, make the cache lifetime bound to the setup service. This also removes the `cacheDir` option, since the path is now handled automatically by systemd.
* | | nixos/mattermost: update release notesMorgan Jones2022-01-16
|/ /
* | nixos/prosody-filer: remove usage of literalExampleNaïm Favier2022-01-16
| |
* | Merge pull request #154193 from abbradar/keycloak-changesKim Lindberger2022-01-16
|\ \ | | | | | | keycloak: 15.1.0 -> 16.1.0 + module improvements
| * | keycloak service: allow to set empty frontend URLNikolay Amiantov2022-01-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This together with extraConfig: { "subsystem=undertow"."server=default-server"."http-listener=default"."proxy-address-forwarding" = true; "subsystem=undertow"."server=default-server"."https-listener=https"."proxy-address-forwarding" = true; } Allows to run Keycloak behind a reverse proxy that provides X-Forwarded-* headers.
| * | keycloak service: add themes supportNikolay Amiantov2022-01-16
| | | | | | | | | | | | | | | Custom themes can be packaged and then added using `themes` config attribute.
| * | keycloak service: use 'attrsOf anything' for extraConfigNikolay Amiantov2022-01-16
| | |
| * | keycloak service: update HTTPS configurationNikolay Amiantov2022-01-16
| | | | | | | | | | | | | | | | | | Keycloak 16.1.0 uses different way to configure HTTPS. This requires us to order commands correctly, otherwise linked objects will fail.
| * | keycloak service: ordering for CLI scriptNikolay Amiantov2022-01-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Allow update commands in the script to be ordered using `mkOrder`. If we encounter ordered sub-objects we sort them by priority. To implement this we now explicitly pass current node in `recurse`, which also allows us to clean up edge case for top-level node. Also refactor `recurse` to avoid passing result text argument; we weren't tail recursive before anyway.
* | | nixos/dokuwiki: Drop deprecated old interface (#152676)Jonas Heinrich2022-01-16
| | |
* | | timetagger: Make enable option with mkOptionMatthias Beyer2022-01-15
| | | | | | | | | | | | Signed-off-by: Matthias Beyer <mail@beyermatthias.de>
* | | timetagger: Use default value for package optionMatthias Beyer2022-01-15
| | | | | | | | | | | | | | | Signed-off-by: Matthias Beyer <mail@beyermatthias.de> Suggested-by: Aaron Andersen <aaron@fosslib.net>
* | | Add service module for timetaggerMatthias Beyer2022-01-15
| | | | | | | | | | | | Signed-off-by: Matthias Beyer <mail@beyermatthias.de>
* | | nixos/wordpress: Ensure no passwordFile if local db deployment (#148613)Jonas Heinrich2022-01-12
| | |
* | | prosody-filer service: initNikolay Amiantov2022-01-11
| | | | | | | | | | | | Add user and group, as files stored are persistent and to be accessed by nginx or other web server.
* | | baget service: initNikolay Amiantov2022-01-11
|/ /
* | Merge pull request #153706 from ymarkus/bookstack-moduleAaron Andersen2022-01-06
|\ \ | | | | | | nixos/bookstack: fix setup service
| * | nixos/bookstack: fix setup serviceYannick Markus2022-01-06
| | |