From df1f1e62e8f7a1bdc3297370c806898a52d69c96 Mon Sep 17 00:00:00 2001 From: "DGNum [bot]" Date: Tue, 17 Jun 2025 12:59:09 +0000 Subject: [PATCH 1/6] lon: update proxmox-nixos MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit 91c96a414e14835b84adbf775f793739a5851fab → 8df841766fab6c15341577b6982ddd368be72113 Last 50 commits: 8df8417 Merge pull request #168 from 5aaee9/main 850a1d1 fix: vm not auto start when cloud init enabled 48f39fb Merge pull request #65 from xddxdd/declarative-bridge 4f2c493 Add option to declaratively configure visible bridges b3483bb Update cache key 0d4d626 Merge pull request #162 from SaumonNet/newcache b900a4b Merge pull request #161 from codgician/evergreen 67c5fc9 pve-manager: 8.2.10 -> 8.3.5 a9a9a07 proxmox-i18n: init at 3.2.4 5ce11fd pve-common: 8.2.9 -> 8.3.1 2b7758e pve-guest-common: 5.1.6 -> 5.1.7 2567deb pve-access-control: 8.2.0 -> 8.2.2 8fb3952 pve-common: 8.2.1 -> 8.2.9 483faa6 pve-manager: 8.2.4 -> 8.2.10 89a8387 Merge pull request #118 from proxmox-update/auto-update/linstor-proxmox b94cd64 fix: cache key c7740e7 Merge pull request #160 from SaumonNet/firstvmid 32e4599 Merge pull request #114 from proxmox-update/auto-update/markedjs 31468f3 Merge pull request #145 from proxmox-update/auto-update/pve-container 22ef831 Merge pull request #156 from proxmox-update/auto-update/pve-ha-manager 204532e Merge pull request #159 from SaumonNet/backup-qemu-hash-stability 99187f3 fix: nixmoxer: find first vmid 87ad0ba proxmox-backup-qemu: remove leaveDotGit 1cf98ce Merge pull request #158 from SaumonNet/autoinstall b3c4a99 Merge pull request #147 from proxmox-update/auto-update/uuid 8e3c6a4 Merge pull request #143 from proxmox-update/auto-update/testharness 5a84f32 fix: force iso name 7be8021 pve-ha-manager: 4.0.6 -> 4.0.7 de68467 uuid: 0.36 -> 0.37 e078b6c markedjs: 15.0.4 -> 15.0.12 f7ca9bc pve-container: 5.2.2 -> 5.2.6 55113bb testharness: 3.50 -> 3.52 292e513 linstor-proxmox: 8.0.4 -> 8.1.1 bb52ad5 Merge pull request #121 from codgician/qemu-update-script 9937276 re-enable linstor test a30672b pve-qemu-server: ensure bootsplash.jpg is copied 051f0df pve-qemu-server: fix qemu version check 1ff2292 pve-common: migrate substituteAll to replaceVars as the former will be removed in 25.11 1d339bd linstor-server: fix hash of source 26bb504 proxmox-backup-qemu: fix hash of source 6c52096 update to 25.05 dda2c5b pve-qemu-server: 8.2.1 -> 8.3.8 92d03a3 pve-http-server: 5.1.2 -> 5.2.2 7df1e81 linstor-server: use protobuf_24 b209161 pve-qemu: 9.1.2 -> 9.2.0-5 60e72a8 Merge pull request #139 from codgician/init-sencha-touch c1d7666 Merge pull request #141 from SaumonNet/rework-rust d65932f remove useless Cargo.toml 70a187f termproxy: 1.0.1->1.1.0 ff142d2 perlmod: update --- lon.lock | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lon.lock b/lon.lock index 089e164..416724a 100644 --- a/lon.lock +++ b/lon.lock @@ -265,10 +265,10 @@ "type": "Git", "fetchType": "git", "branch": "main", - "revision": "91c96a414e14835b84adbf775f793739a5851fab", + "revision": "8df841766fab6c15341577b6982ddd368be72113", "url": "https://github.com/SaumonNet/proxmox-nixos.git", - "hash": "sha256-YYbR1o5qTPUxpaVhkJcOGjghNGbIBQmivXAgNTFDxqU=", - "lastModified": 1743764738, + "hash": "sha256-yaEzei8/2LBZL+h0iKO28eeP1Cvl5v0piAyakZfZL0s=", + "lastModified": 1750064469, "submodules": false }, "signal-irc-bridge": { From c1afcb77689fe96544a9d19c97e3846a2473ffdb Mon Sep 17 00:00:00 2001 From: catvayor Date: Sat, 14 Jun 2025 22:15:27 +0200 Subject: [PATCH 2/6] refactor(systemd-notify): take it from nix-modules --- modules/nixos/default.nix | 2 +- modules/nixos/systemd-notify.nix | 49 ++++++++++++++++++++++++++++++++ 2 files changed, 50 insertions(+), 1 deletion(-) create mode 100644 modules/nixos/systemd-notify.nix diff --git a/modules/nixos/default.nix b/modules/nixos/default.nix index 0485145..c3900ed 100644 --- a/modules/nixos/default.nix +++ b/modules/nixos/default.nix @@ -39,6 +39,7 @@ "extranix" "openbao" "forgejo-multiuser-nix-runners" + "systemd-notify" ]) ++ [ "${sources.agenix}/modules/age.nix" @@ -52,7 +53,6 @@ "services/forgejo-nix-runners" "services/nginx-sni" "services/reaction" - "services/systemd-notify" "services/victorialogs" "services/victoriametrics" ] diff --git a/modules/nixos/systemd-notify.nix b/modules/nixos/systemd-notify.nix new file mode 100644 index 0000000..4e55a59 --- /dev/null +++ b/modules/nixos/systemd-notify.nix @@ -0,0 +1,49 @@ +# SPDX-FileCopyrightText: 2024 Tom Hubrecht +# +# SPDX-License-Identifier: EUPL-1.2 + +{ config, lib, ... }: + +let + inherit (lib) + mkEnableOption + mkIf + mkOption + mkForce + optional + ; + inherit (lib.types) attrsOf str submodule; + + cfg = config.services.systemd-notify; +in + +{ + options.services.systemd-notify = { + enable = mkEnableOption "notifications when a systemd unit fails."; + + command = mkOption { + type = str; + description = '' + Command to run on failure of a systemd unit. + Takes the name of the failed unit as an argument. + ''; + }; + }; + + options.systemd.services = mkOption { + type = attrsOf (submodule { + config.onFailure = optional cfg.enable "email@%n.service"; + }); + }; + + config = mkIf cfg.enable { + systemd.services."email@" = { + description = "Sends a status mail via sendmail on service failures."; + onFailure = mkForce [ ]; # Avoid recursive failures + serviceConfig = { + ExecStart = "${cfg.command} %i"; + Type = "oneshot"; + }; + }; + }; +} From d6300e6e1974bbcb168cd2d393400463d995a1d4 Mon Sep 17 00:00:00 2001 From: catvayor Date: Sat, 14 Jun 2025 22:30:19 +0200 Subject: [PATCH 3/6] feat(systemd-notify): allow multiple failure scripts --- modules/nixos/dgn-notify/default.nix | 21 ++++++-------- modules/nixos/systemd-notify.nix | 42 ++++++++++++++-------------- 2 files changed, 30 insertions(+), 33 deletions(-) diff --git a/modules/nixos/dgn-notify/default.nix b/modules/nixos/dgn-notify/default.nix index d9818db..5c83242 100644 --- a/modules/nixos/dgn-notify/default.nix +++ b/modules/nixos/dgn-notify/default.nix @@ -54,19 +54,16 @@ in }; services.systemd-notify = { - enable = true; - command = builtins.toString ( - pkgs.writeShellScript "sendmail" '' - ${pkgs.msmtp}/bin/sendmail -i -t < Date: Wed, 11 Jun 2025 17:14:30 +0200 Subject: [PATCH 4/6] feat(nimbolus): init a http terraform backend --- machines/nixos/compute01/_configuration.nix | 1 + machines/nixos/compute01/nimbolus/default.nix | 43 ++++++++ machines/nixos/compute01/nimbolus/module.nix | 104 ++++++++++++++++++ .../nixos/compute01/secrets/nimbolus-kms_key | Bin 0 -> 1804 bytes .../compute01/secrets/nimbolus-s3_secret | Bin 0 -> 1743 bytes machines/nixos/compute01/secrets/secrets.nix | 2 + modules/nixos/default.nix | 2 +- 7 files changed, 151 insertions(+), 1 deletion(-) create mode 100644 machines/nixos/compute01/nimbolus/default.nix create mode 100644 machines/nixos/compute01/nimbolus/module.nix create mode 100644 machines/nixos/compute01/secrets/nimbolus-kms_key create mode 100644 machines/nixos/compute01/secrets/nimbolus-s3_secret diff --git a/machines/nixos/compute01/_configuration.nix b/machines/nixos/compute01/_configuration.nix index 7e45eea..6689130 100644 --- a/machines/nixos/compute01/_configuration.nix +++ b/machines/nixos/compute01/_configuration.nix @@ -28,6 +28,7 @@ lib.extra.mkConfig { "mastodon" # "netbox" "nextcloud" + "nimbolus" "ollama-proxy" "opengist" "outline" diff --git a/machines/nixos/compute01/nimbolus/default.nix b/machines/nixos/compute01/nimbolus/default.nix new file mode 100644 index 0000000..45188a0 --- /dev/null +++ b/machines/nixos/compute01/nimbolus/default.nix @@ -0,0 +1,43 @@ +# SPDX-FileCopyrightText: 2025 Lubin Bailly +# +# SPDX-License-Identifier: EUPL-1.2 + +{ + pkgs, + sources, + config, + ... +}: +let + host = "nimbolus.dgnum.eu"; + port = 9008; +in +{ + imports = [ ./module.nix ]; + services.nimbolus-tf = { + enable = true; + package = (import sources.kat-pkgs { inherit pkgs; }).nimbolus-tf-backend; + settings = { + LISTEN_ADDR = "127.0.0.1:${toString port}"; + + STORAGE_BACKEND = "s3"; + STORAGE_S3_ENDPOINT = "s3.dgnum.eu"; + STORAGE_S3_USE_SSL = "true"; + STORAGE_S3_BUCKET = "nimbolus-dgnum"; + STORAGE_S3_ACCESS_KEY = "GKefa111701f349de3988f0010"; + + # TODO: configure openBAO + # AUTH_BASIC_ENABLED = "false"; + # AUTH_JWT_OIDC_ISSUER_URL = "https://vault.dgnum.eu/v1/identity/oidc"; + }; + + credentials = { + KMS_KEY_FILE = config.age.secrets."nimbolus-kms_key".path; + STORAGE_S3_SECRET_KEY_FILE = config.age.secrets."nimbolus-s3_secret".path; + }; + }; + + dgn-web.simpleProxies.nimbolus = { + inherit host port; + }; +} diff --git a/machines/nixos/compute01/nimbolus/module.nix b/machines/nixos/compute01/nimbolus/module.nix new file mode 100644 index 0000000..626dc61 --- /dev/null +++ b/machines/nixos/compute01/nimbolus/module.nix @@ -0,0 +1,104 @@ +# SPDX-FileCopyrightText: 2025 Lubin Bailly +# +# SPDX-License-Identifier: EUPL-1.2 + +{ + lib, + config, + sources, + pkgs, + ... +}: +let + inherit (lib) + getExe + mapAttrsToList + mkEnableOption + mkIf + mkPackageOption + mkOption + ; + inherit (lib.types) + attrsOf + path + str + ; + + cfg = config.services.nimbolus-tf; +in +{ + options.services.nimbolus-tf = { + enable = mkEnableOption "the nimbolus terraform http backend"; + package = mkPackageOption (import sources.kat-pkgs { inherit pkgs; }) "nimbolus-tf-backend" { + pkgsText = "kat-pkgs"; + }; + user = mkOption { + type = str; + description = '' + User used by the nimbolus server. + ''; + default = "nimbolus"; + }; + group = mkOption { + type = str; + description = '' + Group used by the nimbolus server. + ''; + default = "nimbolus"; + }; + settings = mkOption { + type = attrsOf str; + default = { }; + description = '' + Environment variables for nimbolus configuration. + ''; + }; + credentials = mkOption { + type = attrsOf path; + default = { }; + description = '' + Files to pass by systemd LoadCredentials. + ''; + }; + }; + config = mkIf cfg.enable { + systemd.services.nimbolus-tf = { + description = "Nimbolus terraform http backend"; + wantedBy = [ "multi-user.target" ]; + serviceConfig = { + ExecStart = getExe cfg.package; + Environment = + mapAttrsToList (name: value: "${name}=${value}") cfg.settings + ++ mapAttrsToList (name: _: "${name}=%d/${name}") cfg.credentials; + LoadCredential = mapAttrsToList (name: file: "${name}:${file}") cfg.credentials; + + StateDirectory = "nimbolus-tf"; + StateDirectoryMode = "0700"; + WorkingDirectory = "/var/lib/nimbolus-tf"; + + # Hardening + DynamicUser = true; + CapabilityBoundingSet = ""; + PrivateDevices = true; + ProtectClock = true; + ProtectKernelLogs = true; + ProtectControlGroups = true; + ProtectKernelModules = true; + RestrictNamespaces = true; + ProtectHostname = true; + LockPersonality = true; + RestrictRealtime = true; + ProtectHome = true; + ProtectProc = "noaccess"; + ProcSubset = "pid"; + PrivateUsers = true; + UMask = "0077"; + ProtectKernelTunables = true; + RestrictAddressFamilies = "AF_INET AF_INET6"; + SystemCallFilter = "~@clock @cpu-emulation @debug @module @mount @obsolete @privileged @raw-io @reboot @resources @swap"; + MemoryDenyWriteExecute = true; + SystemCallArchitectures = "native"; + }; + }; + }; +} diff --git a/machines/nixos/compute01/secrets/nimbolus-kms_key b/machines/nixos/compute01/secrets/nimbolus-kms_key new file mode 100644 index 0000000000000000000000000000000000000000..323599072b3853d415189c01168ab67f7ae8e010 GIT binary patch literal 1804 zcmZXUxvu;M8O7-$3_=7c{q)0)cYEBR*dBYljQ8E5@pwF5$NL^BLP#_q0jW~t1>gw~ zqKTB`1yUfWD50VS2?{R7pW@Pf&F?!$=bR`_UXnWQw|2~%`opGA!5Ic#esmay>?OG) zI1W>XP;9VrIRqf%?IMwb%#oG_jTwwg-*q<#?b(5|fl@Wi4pyXgl@@4vU#%Ec$S?=vgZ+QF@#qf+raBu(!0fSGj>c z2ur15!ou?VL=ozJB8p2^Q%BKe^P7j#Px36V5YAt4W&x_0PSaC1nTFoNO|}K*NS~im z>CcLSL+jmG3zRlVxxu)%v_kYBI(=vrEAq0bQ!B>_ueng{kx5-GNx3n@#E*^PSKF*i znzK0oS9t!A9$&>0d=+3rf_53aUlrzwXAl?>W}LfGjahu20N=Vt~PEnbNX3&z3SX4s%tXSWuny@ZQ#Na%or{ zVj&aZI5c=m>yNbz8ixkFDP;o9%OebUqQ~zWuG|t0c^t=s-0w7Lr0gac9uYjvlt%R5>>M2E8X*sB2)>c9kP8e=4+Vl!Of z)hQzg#RetVzGD|WJNk8K>(}y%_A^eT7MBPsR*)+Gm`|N80!*S`hGH{0x*w30F?gQ7 z741y+&+P0LDH2m&;+I!{L0T`?RgW)JO-CO*mnX0}$0Kk(iTtU%Ky?O(^VM+~{%(en zF^(roabl*N3f}IWT?|W$tB?MyC6x3eR)0NjIyST&P%kb_PKvY+5Ew8d6Yw2zPAi+_ zMvssmwy8CWit|VGH6l(rqkHUjv5O8YBvj?1B7mZ%JH7WrR~H_%%QsN=tc#a`cbP}2 zp+u~uVp2;?3k}q~S`NES@EPogqtESJyUy_X0sq*2t97OD*2%^Q3EDX}-nsp50l;}N zV&hQoj>1;uoG>?`YTevSZCjTe48+`rwq$-)B1%PeZ`5b?V&3-rA@t*XrQgyZlOkVRa?x5Q&uYXZpS8eI^*)}XTwbB!&6CK@>5NsPkW9Zdt$NeVDPe=>|6DYKlyR_2q;+CQ>hX86d=ogJ&@?%5>( z?xdw&k{Ipch-3)XPk1^P0=T9`u{f&mHCGw3vFT}-|8D`tb0?YULDz)So!~oPhPZs- zwj?QoqXL_OW=vTuvOza)MVaiJHD`> z)(_swj;wtk8a&+~o0VH&^0O*CxXl()^h?T|tX0=&F;7{}}- zexNvxkcU8Qv2s1I4CA>|R>s6FLIQ_&>FbtTJWgX4x|I~fo$kaeiS;dqfi-oEQ0zb$ zF32*NW-8nJ+Y>rx#4Of@sd5q&N?9ckKKEK9A)Q&MLqdSkO4b-urs^2Pv{MRfpz~*| z@M1yo&li}zX93rW#R!DMyjKsXF?Et(dox(L+j5Vv6L%G0-_)5K?9#Q{#}w1P*1F-! zjnqMonUq^@^?oeyEkR6^DWiE1L@mR?Y_4)fAs|pW?e zvFV|8^huMSnxadJN0p_xjIXsq^b?&rz~VECmr3F7ti7a}6p0m+KjG_<)I0&ZM>u#d zK;F#+Zfmm%}PmUEkQ@XS<4pIqtL$VF~Xg=r1jk<9WSynSJ@rz zB#9>#A*uI4eXR{(BSXeP5|~@4IH4W5+m$*VCF`tLwgn&S(;4*h6iGPKlGdw^ssNc; z6UAeA=xC#w?6`DC@!nBZa87AVN3swn&V#Xg1Ni?-4r6#I2aiz+~r42L&c<^TmKOo9f|coJ&9y6CHYuQ*FKVRW0P=S$(%H_ zD1;Y^#$$Oq`zey3Og4sO07u`M76?Aq5AskWx(Wm&AD^-QB- z@{lh&q^mAy1!Gh+NGXZ0HP|GHw=Jo;D0CKjwmsbE2w!m!#I{`@vLWACJJn;du?iVw zC94vce{qA<&hGiGfOrBu<(74F z7*ODa-WssiyWO3l$kW3>gic?SkfG(Q46~JKj4>2bM;liO&w$dV5s`;&z)1rGQl^Um zw9!GdU3+t2cdJB<7B`3%ca1{0cqlfhODJ>GS8|)!UNX~z{^VAUQW_zBifNG0ezYzX z6>ig`y2~g2tZAvr?$yl_R$zKK)uQ6`Io_p)u`K-ϓAOj>OS?_uGzL50@aka-4P zUS19oeS-~e2!{xAYbG3xphNb6&lU?~RP-7zwAk$K!wHuX`0U4j{>HC<^YQUJzx~_4 z-lYG`rw_ef2Y>j}8?*Y}Uw@?iE`0C5ZT`z&{Ns!5{ZF)ajGuq|>pwF-{jT#F@j3Z} uFR4HN{`tiZ{~mwz<+uJ5ecrO!Jog`&9|+c`U;F;{%{M>!_fPG=c>e?G2SDrq literal 0 HcmV?d00001 diff --git a/machines/nixos/compute01/secrets/secrets.nix b/machines/nixos/compute01/secrets/secrets.nix index 38fd800..442f9ad 100644 --- a/machines/nixos/compute01/secrets/secrets.nix +++ b/machines/nixos/compute01/secrets/secrets.nix @@ -25,6 +25,8 @@ "netbox-environment_file" "nextcloud-adminpass_file" "nextcloud-s3_secret_file" + "nimbolus-kms_key" + "nimbolus-s3_secret" "opengist-environment_file" "outline-oidc_client_secret_file" "outline-smtp_password_file" diff --git a/modules/nixos/default.nix b/modules/nixos/default.nix index c3900ed..ef1c7ee 100644 --- a/modules/nixos/default.nix +++ b/modules/nixos/default.nix @@ -37,8 +37,8 @@ "dgn-web" "django-apps" "extranix" - "openbao" "forgejo-multiuser-nix-runners" + "openbao" "systemd-notify" ]) ++ [ From 7b58d8af0121857ef5cd98fd1a13703040530304 Mon Sep 17 00:00:00 2001 From: "DGNum [bot]" Date: Tue, 17 Jun 2025 12:56:12 +0000 Subject: [PATCH 5/6] lon: update nix-modules MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit 44ccf96bd73c1bbbbcc849cb0f2e0d1f5f75f934 → fd4ba193ea3eda529ac27b43b206e9e3618b1975 Last 1 commits: fd4ba19 fix(ntfy-sh/acl): use replaceVarsWith --- lon.lock | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lon.lock b/lon.lock index 089e164..1158e28 100644 --- a/lon.lock +++ b/lon.lock @@ -195,10 +195,10 @@ "type": "Git", "fetchType": "git", "branch": "dgnum", - "revision": "44ccf96bd73c1bbbbcc849cb0f2e0d1f5f75f934", + "revision": "fd4ba193ea3eda529ac27b43b206e9e3618b1975", "url": "https://git.hubrecht.ovh/hubrecht/nix-modules", - "hash": "sha256-mkrCWowrCje3/TuAG0eAJplrtlz1hYmusSFn93/Ccok=", - "lastModified": 1749629064, + "hash": "sha256-O/lMCM0qKkd+TBV43Fp9uG3aEbDSc2lI3a5TetNYs0w=", + "lastModified": 1749739595, "submodules": false }, "nix-pkgs": { From 3a60dff40a7e6b31a3305d550b4eed9fef8c6e8c Mon Sep 17 00:00:00 2001 From: "DGNum [bot]" Date: Wed, 18 Jun 2025 12:58:19 +0000 Subject: [PATCH 6/6] lon: update proxmox-nixos MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit 91c96a414e14835b84adbf775f793739a5851fab → 8df841766fab6c15341577b6982ddd368be72113 Last 50 commits: 8df8417 Merge pull request #168 from 5aaee9/main 850a1d1 fix: vm not auto start when cloud init enabled 48f39fb Merge pull request #65 from xddxdd/declarative-bridge 4f2c493 Add option to declaratively configure visible bridges b3483bb Update cache key 0d4d626 Merge pull request #162 from SaumonNet/newcache b900a4b Merge pull request #161 from codgician/evergreen 67c5fc9 pve-manager: 8.2.10 -> 8.3.5 a9a9a07 proxmox-i18n: init at 3.2.4 5ce11fd pve-common: 8.2.9 -> 8.3.1 2b7758e pve-guest-common: 5.1.6 -> 5.1.7 2567deb pve-access-control: 8.2.0 -> 8.2.2 8fb3952 pve-common: 8.2.1 -> 8.2.9 483faa6 pve-manager: 8.2.4 -> 8.2.10 89a8387 Merge pull request #118 from proxmox-update/auto-update/linstor-proxmox b94cd64 fix: cache key c7740e7 Merge pull request #160 from SaumonNet/firstvmid 32e4599 Merge pull request #114 from proxmox-update/auto-update/markedjs 31468f3 Merge pull request #145 from proxmox-update/auto-update/pve-container 22ef831 Merge pull request #156 from proxmox-update/auto-update/pve-ha-manager 204532e Merge pull request #159 from SaumonNet/backup-qemu-hash-stability 99187f3 fix: nixmoxer: find first vmid 87ad0ba proxmox-backup-qemu: remove leaveDotGit 1cf98ce Merge pull request #158 from SaumonNet/autoinstall b3c4a99 Merge pull request #147 from proxmox-update/auto-update/uuid 8e3c6a4 Merge pull request #143 from proxmox-update/auto-update/testharness 5a84f32 fix: force iso name 7be8021 pve-ha-manager: 4.0.6 -> 4.0.7 de68467 uuid: 0.36 -> 0.37 e078b6c markedjs: 15.0.4 -> 15.0.12 f7ca9bc pve-container: 5.2.2 -> 5.2.6 55113bb testharness: 3.50 -> 3.52 292e513 linstor-proxmox: 8.0.4 -> 8.1.1 bb52ad5 Merge pull request #121 from codgician/qemu-update-script 9937276 re-enable linstor test a30672b pve-qemu-server: ensure bootsplash.jpg is copied 051f0df pve-qemu-server: fix qemu version check 1ff2292 pve-common: migrate substituteAll to replaceVars as the former will be removed in 25.11 1d339bd linstor-server: fix hash of source 26bb504 proxmox-backup-qemu: fix hash of source 6c52096 update to 25.05 dda2c5b pve-qemu-server: 8.2.1 -> 8.3.8 92d03a3 pve-http-server: 5.1.2 -> 5.2.2 7df1e81 linstor-server: use protobuf_24 b209161 pve-qemu: 9.1.2 -> 9.2.0-5 60e72a8 Merge pull request #139 from codgician/init-sencha-touch c1d7666 Merge pull request #141 from SaumonNet/rework-rust d65932f remove useless Cargo.toml 70a187f termproxy: 1.0.1->1.1.0 ff142d2 perlmod: update --- lon.lock | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lon.lock b/lon.lock index 1158e28..77ca9d7 100644 --- a/lon.lock +++ b/lon.lock @@ -265,10 +265,10 @@ "type": "Git", "fetchType": "git", "branch": "main", - "revision": "91c96a414e14835b84adbf775f793739a5851fab", + "revision": "8df841766fab6c15341577b6982ddd368be72113", "url": "https://github.com/SaumonNet/proxmox-nixos.git", - "hash": "sha256-YYbR1o5qTPUxpaVhkJcOGjghNGbIBQmivXAgNTFDxqU=", - "lastModified": 1743764738, + "hash": "sha256-yaEzei8/2LBZL+h0iKO28eeP1Cvl5v0piAyakZfZL0s=", + "lastModified": 1750064469, "submodules": false }, "signal-irc-bridge": {