{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":80104128,"defaultBranch":"master","name":"nixpkgs","ownerLogin":"arianvp","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2017-01-26T10:12:10.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/628387?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1717531573.0","currentOid":""},"activityList":{"items":[{"before":null,"after":"90e91b53bf4dcffc15a2f271363b9db5c52e533e","ref":"refs/heads/backport-317257-to-release-24.05","pushedAt":"2024-06-04T20:06:13.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"doc/release-notes: repalce security.pam.enableSSHAgentAuth with security.pam.sshAgentAuth.enable","shortMessageHtmlLink":"doc/release-notes: repalce security.pam.enableSSHAgentAuth with secur…"}},{"before":"dc69e9d304259a619cc06754f5222a042b381953","after":"0d7d3d60afec7db3133c863c1e3cd17447bebc2f","ref":"refs/heads/add-nixos-acme","pushedAt":"2024-06-04T19:04:14.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"CODEOWNERS: add @NixOS/acme\n\nWe would like to have the @NixOS/acme team assigned for review to changes of this module","shortMessageHtmlLink":"CODEOWNERS: add @NixOS/acme"}},{"before":"3d49494a8cdd1048d571dec27a72af04640b25d2","after":"f8439331dc74c7f4d1603c510352a07b2771b273","ref":"refs/heads/stephank-fix-acme2","pushedAt":"2024-06-04T18:23:34.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"doc/release-notes: Add note about backwards compatibility in ACME module\n\nCo-authored-by: Stéphan Kochen ","shortMessageHtmlLink":"doc/release-notes: Add note about backwards compatibility in ACME module"}},{"before":null,"after":"dc69e9d304259a619cc06754f5222a042b381953","ref":"refs/heads/add-nixos-acme","pushedAt":"2024-06-04T18:20:10.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"CODEOWNERS: add @NixOS/acme\n\nWe would like to have the @NixOS/acme team assigned for review to changes of this module","shortMessageHtmlLink":"CODEOWNERS: add @NixOS/acme"}},{"before":"6bf4f9b17177b708cd1de3f34cc2a209dc7bf08f","after":"3d49494a8cdd1048d571dec27a72af04640b25d2","ref":"refs/heads/stephank-fix-acme2","pushedAt":"2024-06-04T18:10:57.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"doc/release-notes: Add note about backwards compatibility in ACME module\n\nCo-authored-by: Stéphan Kochen ","shortMessageHtmlLink":"doc/release-notes: Add note about backwards compatibility in ACME module"}},{"before":"ffe380919b8777853eb5107d91656ead08f09a1d","after":"6bf4f9b17177b708cd1de3f34cc2a209dc7bf08f","ref":"refs/heads/stephank-fix-acme2","pushedAt":"2024-06-04T18:07:47.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"doc/release-notes: Add note about backwards compatibility in ACME module\n\nCo-authored-by: Stéphan Kochen ","shortMessageHtmlLink":"doc/release-notes: Add note about backwards compatibility in ACME module"}},{"before":null,"after":"ffe380919b8777853eb5107d91656ead08f09a1d","ref":"refs/heads/stephank-fix-acme2","pushedAt":"2024-06-04T18:01:15.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/acme: allow setting security.acme.defaults.server = null to keep old accounts directory\n\nThe accounts directory is based on the hash of the settings.\n\nhttps://github.com/NixOS/nixpkgs/pull/270221 changed the default of\nsecurity.acme.defaults.server from null to the default letsencrypt URL\nhowever as an unwanted side effect this means the accounts directory\nchanges and the ACME module will create a new a new account.\n\nThis can cause issues with people using CAA records that pin the\naccount ID or people who have datacenter-scale NixOS deployments\n\nWe allow setting this option to null again for people who want\nto keep the old account and migrate at their own leisure.\n\nFixes https://github.com/NixOS/nixpkgs/issues/316608\n\nCo-authored-by: Arian van Putten ","shortMessageHtmlLink":"nixos/acme: allow setting security.acme.defaults.server = null to kee…"}},{"before":"70622715d39c4100faf76eff37fd09e47014ddc4","after":"a48cd7d56faaaee4d359c7c64ca83e55b00d9732","ref":"refs/heads/update-ami-docs","pushedAt":"2024-05-25T08:01:07.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/amazon-image: Drop create-amis.sh script and update docs\n\nWe replaced this with automation in https://github.com/NixOS/amis\n\nAlso add some docs how you can build the image yourself","shortMessageHtmlLink":"nixos/amazon-image: Drop create-amis.sh script and update docs"}},{"before":"abf96b6f488c8ce777a3e9693032f437ce3b219a","after":"70622715d39c4100faf76eff37fd09e47014ddc4","ref":"refs/heads/update-ami-docs","pushedAt":"2024-05-25T07:20:41.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/amazon-image: Drop create-amis.sh script and update docs\n\nWe replaced this with automation in https://github.com/NixOS/amis\n\nAlso add some docs how you can build the image yourself","shortMessageHtmlLink":"nixos/amazon-image: Drop create-amis.sh script and update docs"}},{"before":"4c33ad8c41a9688b0627b2f88d7b80ea3f6a904f","after":"abf96b6f488c8ce777a3e9693032f437ce3b219a","ref":"refs/heads/update-ami-docs","pushedAt":"2024-05-25T07:15:05.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/amazon-image: Drop create-amis.sh script and update docs\n\nWe replaced this with automation in https://github.com/NixOS/amis\n\nAlso add some docs how you can build the image yourself","shortMessageHtmlLink":"nixos/amazon-image: Drop create-amis.sh script and update docs"}},{"before":null,"after":"4c33ad8c41a9688b0627b2f88d7b80ea3f6a904f","ref":"refs/heads/update-ami-docs","pushedAt":"2024-05-25T07:14:09.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/amazon-image: Drop create-amis.sh script and update docs\n\nWe replaced this with automation in https://github.com/NixOS/amis\n\nAlso add some docs how you can build the image yourself","shortMessageHtmlLink":"nixos/amazon-image: Drop create-amis.sh script and update docs"}},{"before":null,"after":"20f01aa76c8723300179f1ee94d43d9d8f2452da","ref":"refs/heads/fix-amazon-xen-blkfront","pushedAt":"2024-05-23T09:06:04.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/amazon-image: do not force-load xen-blkfront kernel module\n\nMost AWS instances use Nitro Hypervisor these days which\nexpose EBS volumes as nvme disks.\n\nAnd even on previous-generation instances that still use Xen\n(like T2) the xen-blkfront module will be loaded automatically\ndue to the presence of a modalias.\n\nThis fixes #46881","shortMessageHtmlLink":"nixos/amazon-image: do not force-load xen-blkfront kernel module"}},{"before":"2c1ce8a03b3d6d9f61571fe0de6ae06540b99447","after":"a9d471e59ac9804d318727b9283c596bf2211efa","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T23:43:52.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/kexec: use /run/next-system\n\nThis fixes the long standing issue #50300","shortMessageHtmlLink":"nixos/kexec: use /run/next-system"}},{"before":"3db0ec3647a242a56b69e16eaf9e2a632fb3fbd0","after":"2c1ce8a03b3d6d9f61571fe0de6ae06540b99447","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T23:28:42.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/kexec: use /run/next-system\n\nThis fixes the long standing issue #50300","shortMessageHtmlLink":"nixos/kexec: use /run/next-system"}},{"before":"f00694d48311a9d6d268a6d46be7c05429b0e30b","after":"3db0ec3647a242a56b69e16eaf9e2a632fb3fbd0","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T21:24:07.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/wrappers: use normal mount for /run/wrappers\n\nWe want to get rid of specialFileSystems / earlyMountScript eventually and\nthere is no need to run this before systemd anymore now that\nthe wrappers themselves are set up in a systemd unit since https://github.com/NixOS/nixpkgs/pull/263203\n\nAlso this is needed to make soft-reboot work. We want to make sure\nthat we remount /run/wrappers with the nosuid bit removed on soft-reboot\nbut because @earlyMountScript@ happens in initrd, this wouldn't happen","shortMessageHtmlLink":"nixos/wrappers: use normal mount for /run/wrappers"}},{"before":"404451fb9a7a7402f556f8b993ec857905be4100","after":"f00694d48311a9d6d268a6d46be7c05429b0e30b","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T21:22:37.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/wrappers: use normal mount for /run/wrappers\n\nWe want to get rid of specialFileSystems / earlyMountScript eventually and\nthere is no need to run this before systemd anymore now that\nthe wrappers themselves are set up in a systemd unit since https://github.com/NixOS/nixpkgs/pull/263203\n\nAlso this is needed to make soft-reboot work. We want to make sure\nthat we remount /run/wrappers with the nosuid bit removed on soft-reboot\nbut because @earlyMountScript@ happens in initrd, this wouldn't happen","shortMessageHtmlLink":"nixos/wrappers: use normal mount for /run/wrappers"}},{"before":"b619ed4186f7dd9151f4437cb9625ea07ad7196e","after":"404451fb9a7a7402f556f8b993ec857905be4100","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T21:10:29.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/wrappers: use normal mount for /run/wrappers\n\nWe want to get rid of specialFileSystems / earlyMountScript eventually and\nthere is no need to run this before systemd anymore now that\nthe wrappers themselves are set up in a systemd unit since https://github.com/NixOS/nixpkgs/pull/263203\n\nAlso this is needed to make soft-reboot work. We want to make sure\nthat we remount /run/wrappers with the nosuid bit removed on soft-reboot\nbut because @earlyMountScript@ happens in initrd, this wouldn't happen","shortMessageHtmlLink":"nixos/wrappers: use normal mount for /run/wrappers"}},{"before":"fc6c978f7542d41b4452bd84c8363c2bf56eb10d","after":"b619ed4186f7dd9151f4437cb9625ea07ad7196e","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T21:01:18.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/wrappers: use normal mount for /run/wrappers\n\nWe want to get rid of specialFileSystems / earlyMountScript eventually and\nthere is no need to run this before systemd anymore now that\nthe wrappers themselves are set up in a systemd unit since https://github.com/NixOS/nixpkgs/pull/263203","shortMessageHtmlLink":"nixos/wrappers: use normal mount for /run/wrappers"}},{"before":"5ef2e4f72efe03ac6d9a3904448bcfbf5f070773","after":"fc6c978f7542d41b4452bd84c8363c2bf56eb10d","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T20:48:46.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/wrappers: use normal mount for /run/wrappers\n\nWe want to get rid of specialFileSystems / earlyMountScript eventually and\nthere is no need to run this before systemd anymore now that\nthe wrappers themselves are set up in a systemd unit since https://github.com/NixOS/nixpkgs/pull/263203","shortMessageHtmlLink":"nixos/wrappers: use normal mount for /run/wrappers"}},{"before":"2c6454c51bdb98bcb6da24a9acc497743d1de565","after":"5ef2e4f72efe03ac6d9a3904448bcfbf5f070773","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T20:26:40.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/systemd: add support for soft-reboot","shortMessageHtmlLink":"nixos/systemd: add support for soft-reboot"}},{"before":"b8c0bb7d4cecf50f8306ea52472f47614fcc878e","after":"57e4d6cfc67fe94ba38b84cde6b5956c9cfdd776","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T19:25:20.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/systemd: add support for soft-reboot","shortMessageHtmlLink":"nixos/systemd: add support for soft-reboot"}},{"before":"edb0fd677580b9af9b45f98829bf26c05ceacb60","after":"b8c0bb7d4cecf50f8306ea52472f47614fcc878e","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T19:23:42.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/systemd: add support for soft-reboot","shortMessageHtmlLink":"nixos/systemd: add support for soft-reboot"}},{"before":"ee1a3539092ad5a969ae632fda9bfc71c624dbfb","after":"edb0fd677580b9af9b45f98829bf26c05ceacb60","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T19:21:34.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/systemd: add support for soft-reboot","shortMessageHtmlLink":"nixos/systemd: add support for soft-reboot"}},{"before":"2dabb7ac2a091138b89b566b3ef463b24055c875","after":"ee1a3539092ad5a969ae632fda9bfc71c624dbfb","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T19:19:20.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/systemd: add support for soft-reboot","shortMessageHtmlLink":"nixos/systemd: add support for soft-reboot"}},{"before":"98fd96535cf94f3d3833981cd08f30a0ece11f41","after":"2dabb7ac2a091138b89b566b3ef463b24055c875","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T19:09:53.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/systemd: add support for soft-reboot","shortMessageHtmlLink":"nixos/systemd: add support for soft-reboot"}},{"before":"a30ac3b94c64d36460685dc6707a93880a32c8ba","after":"98fd96535cf94f3d3833981cd08f30a0ece11f41","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T19:06:50.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/systemd: add support for soft-reboot","shortMessageHtmlLink":"nixos/systemd: add support for soft-reboot"}},{"before":"2dc92fe5b912a253a3dd61cdd34046815f38c88a","after":"a30ac3b94c64d36460685dc6707a93880a32c8ba","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T18:56:01.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/systemd: add support for soft-reboot","shortMessageHtmlLink":"nixos/systemd: add support for soft-reboot"}},{"before":null,"after":"2dc92fe5b912a253a3dd61cdd34046815f38c88a","ref":"refs/heads/soft-reboot","pushedAt":"2024-05-07T18:54:31.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/systemd: add support for soft-reboot","shortMessageHtmlLink":"nixos/systemd: add support for soft-reboot"}},{"before":null,"after":"94798cf315aea864ac05f223e1626626de0819a2","ref":"refs/heads/os-release-build-id","pushedAt":"2024-04-21T14:11:46.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"arianvp","name":"Arian van Putten","path":"/arianvp","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/628387?s=80&v=4"},"commit":{"message":"nixos/version: set os-release BUILD_ID to system.nixos.versionSuffix\n\nVERSION_ID already contains the version so having it in BUILD_ID\nis redundant.\n\nThis also aligns the value with what is documented in\n\nhttps://www.freedesktop.org/software/systemd/man/latest/os-release.html#BUILD_ID=\n\n> A string uniquely identifying the system image originally used as the\n> installation base. In most cases, VERSION_ID or IMAGE_ID+IMAGE_VERSION are\n> updated when the entire system image is replaced during an update. BUILD_ID\n> may be used in distributions where the original installation image version is\n> important: VERSION_ID would change during incremental system updates, but\n> BUILD_ID would not. This field is optional.\n>\n> Examples: \"BUILD_ID=\"2013-03-20.3\"\", \"BUILD_ID=201303203\".","shortMessageHtmlLink":"nixos/version: set os-release BUILD_ID to system.nixos.versionSuffix"}},{"before":"3e98d578958677398ad4434211875519de17f3e9","after":"6f11ba9ffea6000f34b6a9498a9f66b50c743668","ref":"refs/heads/amazon-ec2-amis","pushedAt":"2024-03-12T23:37:12.000Z","pushType":"push","commitsCount":5378,"pusher":{"login":"garbas","name":"Rok Garbas","path":"/garbas","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20208?s=80&v=4"},"commit":{"message":"Merge branch 'master' into amazon-ec2-amis","shortMessageHtmlLink":"Merge branch 'master' into amazon-ec2-amis"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEXGtqpwA","startCursor":null,"endCursor":null}},"title":"Activity · arianvp/nixpkgs"}