summaryrefslogtreecommitdiff
path: root/doc
AgeCommit message (Collapse)Author
2025-04-23services: postgresql-service-type: Allow allowing to log into the user.Tomas Volf
It is often useful to be able to use the `postgres' user for management tasks, so this commit allows setting that. The default behavior is not changed. I have also added missing exports and sorted them by alphabet. * gnu/services/databases.scm (%default-home-directory): New variable. (<postgresql-configuration>): Add home-directory, allow-login? fields. (create-postgresql-account): Use them. * doc/guix.texi (Database Services): Document it. Change-Id: I2212e5082ff4e87c49a5a8a4711bf929dd08626a Signed-off-by: Ludovic Courtès <[email protected]> Modified-by: Ludovic Courtès <[email protected]>
2025-04-22doc: Update ReadyMedia URL.Sughosha
* doc/guix.texi (DLNA/UPnP Services): Update ReadyMedia URL. Change-Id: Ief346066edd6b9e679f020a6ff8528856cf853d9 Signed-off-by: Maxim Cournoyer <[email protected]>
2025-04-22services: pounce: New service.Maxim Cournoyer
* gnu/services/messaging.scm (pounce-serialize-boolean): (pounce-serialize-string, pounce-serialize-list-of-strings) (pounce-serialize-pair, power-of-two?) (pounce-serialize-number, pounce-serialize-power-of-two) (pounce-serialize-port, pounce-serialize-maybe-boolean) (pounce-serialize-maybe-number, pounce-serialize-maybe-pair) (pounce-serialize-maybe-port, pounce-serialize-maybe-port (pounce-maybe-power-of-two, pounce-serialize-maybe-string) (pounce-serialize-maybe-list-of-strings): New procedures. (pounce-configuration): New configuration. (pounce-activation): New procedure. (serialize-pounce-configuration, pounce-wrapper): Likewise. (pounce-service-type): New service type. * gnu/tests/messaging.scm (ngircd-tls-cert-service-type): New variable. (%pounce-os): Likewise. (run-pounce-test): New procedure. (%test-pounce): New test. * doc/guix.texi (Messaging Services): Document it. Change-Id: I4bbd2bc4821072a93c2c4017b86df329c4b240cb Reviewed-by: Ludovic Courtès <[email protected]>
2025-04-21machine: hetzner: Allow attaching existing public IPs.Sergey Trofimov
* gnu/machine/hetzner.scm (hetzner-configuration): Add ipv4 and ipv6 fields. Export accessors. * gnu/machine/hetzner/http.scm (hetnzer-api-primary-ips): New function. (<hetzner-primary-ip>): New json mapping. (hetzner-api-server-create): Pass IP addresses in request. * doc/guix.texi (Invoking guix deploy): Document it. Change-Id: I44509cc98e041762dc483e876566e79bde85b26a Signed-off-by: Ludovic Courtès <[email protected]>
2025-04-20services: guix: Allow ‘guix-daemon’ to run without root privileges.Ludovic Courtès
* gnu/services/base.scm (run-with-writable-store) (guix-ownership-change-program): New procedures. (<guix-configuration>)[privileged?]: New field. (guix-shepherd-service): Rename to… (guix-shepherd-services): … this. Add the ‘guix-ownership’ service. Change ‘guix-daemon’ service to depend on it; when unprivileged, prefix ‘daemon-command’ by ‘run-with-writable-store’ and omit ‘--build-users-group’; adjust socket activation endpoints. (guix-accounts): When unprivileged, create the “guix-daemon” user and group in addition to the others. (guix-service-type)[extensions]: Adjust to name change. * gnu/tests/base.scm (run-guix-daemon-test): Add ‘name’ parameter. (%test-guix-daemon): Adjust accordingly. (%test-guix-daemon-unprivileged): New test. * doc/guix.texi (Base Services): Document ‘privileged?’. (Migrating to the Unprivileged Daemon): Explain that this is automatic on Guix System. Reviewed-by: Maxim Cournoyer <[email protected]> Change-Id: I28a9a22e617416c551dccb24e43a253b544ba163
2025-04-20doc: Document migration to the unprivileged daemon.Ludovic Courtès
* doc/guix.texi (Build Environment Setup): Add “Migrating to the Unprivileged Daemon” section. (Upgrading Guix): Link to it. Change-Id: I2bac3f4419d85b7c718c6c4a3908387b4f6ee582
2025-04-19services: ngircd: Require networking.Maxim Cournoyer
Otherwise the service could fail starting if the networking interface takes some time to be created during the boot (one such example are WireGuard interfaces). * gnu/services/messaging.scm (ngircd-configuration) [shepherd-requirement]: Add networking. * doc/guix.texi (Messaging Services): Update. Change-Id: I387ae5780a35cad5b74d9883ac53f13de1a08c78
2025-04-15Revert "doc: Emacs Packages: Remove outdated commentary on testing."Ludovic Courtès
This reverts commit b17268b53e9fb1b1ac2ad29fe7633b52744fee2f, which was meant for the ‘emacs-team’ branch as part of a patch series. Change-Id: I9d9b01924698aaf5bb6ac2c8472311976eeaacc6
2025-04-14doc: Emacs Packages: Remove outdated commentary on testing.Morgan Smith
* doc/contributing.texi (Emacs Packages): Removeoutdated commentary on testing. We now run the tests by default like is done in other build systems. Change-Id: I245a0a412615a1177fbd1b6e723fda3749f7e49f Signed-off-by: Ludovic Courtès <[email protected]>
2025-04-14gnu: speakersafetyd: Add log file.Roman Scherer
* gnu/services/sound.scm (speakersafetyd-configuration) [log-file]: New field. (speakersafetyd): Use it via #:log-file. Change-Id: I870bc7bfd69249da3a9c981f627e751395386bd2
2025-04-14gnu: speakersafetyd: Run as unprivileged user.Roman Scherer
* gnu/services/sound.scm (speakersafetyd): Run as unprivileged user. (speakersafetyd-accounts): New procedure. (speakersafetyd-activation): Likewise. (speakersafetyd-shepherd-service): Specify the #:group, #:user and #:supplementary-groups arguments. (speakersafetyd-service-type): Extend activation-service-type. Change-Id: I870bc7bfd69249da3a9c981f627e751395386bd2
2025-04-14services: ngircd: Revert to use make-forkexec-constructor.Maxim Cournoyer
The use of make-systemd-constructor appears to cause problems when connecting via TLS (see: https://github.com/ngircd/ngircd/issues/330). * gnu/services/messaging.scm (ngircd-global): [pid-file]: Set default value and remove maybeness. Adjust doc. * gnu/services/messaging.scm (ngircd-configuration): Adjust comment. (ngircd-wrapper): Expose writable PID file and preserve pid namespace. (ngircd-shepherd-service): Replace make-systemd-constructor with make-forkexec-constructor and adjust surrounding accordingly. (ngircd-activation): New procedure. (ngircd-service-type): Extend activation-service-type with it. Change-Id: Ic7c135ab45122e180107cde8bb9976426e3afbc4
2025-04-14services: ngircd: Fix typo in doc.Maxim Cournoyer
* gnu/services/messaging.scm (ngircd-options) <pam?>: Fix typo. * doc/guix.texi (Messaging Services): Update. Change-Id: If14e406089b2c945cac37e25d8e08a3812e4b28e
2025-04-14services: ngircd: Disable PAM by default.Maxim Cournoyer
This was the original intention, as PAM authentication cannot be easily satisfied when the service runs as non-root, which is the case. * gnu/services/messaging.scm (ngircd-configuration) <options>: Remove maybe and set default value. * doc/guix.texi (Messaging Services): Update. Change-Id: I8435cf5be7206f9165d69cbbac11c205bf928c8f
2025-04-14services: ngircd: Expose a new ssl-verify? option.Maxim Cournoyer
* gnu/services/messaging.scm (ngircd-server) [ssl-verify?]: New field. * doc/guix.texi (Messaging Services): Regenerate doc. Change-Id: Ia2d6e557bd89448d8cc2d1cd88e606e2b1ef5029
2025-04-14services: ngircd: Allow specifying Shepherd requirements.Maxim Cournoyer
* gnu/services/messaging.scm (ngircd-configuration) [shepherd-requirement]: New field. * gnu/services/messaging.scm (ngircd-shepherd-service) [requirement]: Use it. * doc/guix.texi (Messaging Services): Update doc. Change-Id: I8164c132ca25830885005d0e8f55554047c84a95
2025-04-10services: opensmtpd: Add logging to a file.Felix Lechner
* gnu/services/mail.scm (opensmtpd-configuration): Add log-file field. (opensmtpd-shepherd-service)[start]: Add a command line flag to not daemonize. Drop #:pid-file. Add #:log-file. * doc/guix.texi (Mail Services): Document the additional parameter. Change-Id: I485e040d680ccb39fa62e49d2e6ea916f047972c Signed-off-by: Andreas Enge <[email protected]>
2025-04-08services: anonip: Rotate log files.Ludovic Courtès
* gnu/services/web.scm (anonip-log-files): New procedure. (anonip-service-type): Use it to extend ‘log-rotation-service-type’. * doc/guix.texi (Log Rotation): Document it. Change-Id: I903bb79e0992b794bb0a40e504283cd57a8a087b
2025-04-08services: Add a default configuration value for the ngircd service.Maxim Cournoyer
* gnu/services/messaging.scm (ngircd-configuration): Adjust comment. (ngircd-wrapper): Nest bindings within the (maybe-value-set? ssl) check, to avoid errors when not providing an explicit value to the ssl field. (ngircd-service-type) [default-value]: New field. Change-Id: I1d2d7973cc9314e9bbc5870bf7b5f872d074b49b
2025-04-08services: Add ngircd-service-type.Maxim Cournoyer
* gnu/services/messaging.scm (pascal-case, ngircd-serialize-string) (ngircd-serialize-boolean, ngircd-serialize-file-like) (ngircd-serialize-list-of-strings, ngircd-serialize-list-of-ports) (ngircd-serialize-number, ngircd-serialize-port) (string-or-number?, ngircd-serialize-string-or-number): New procedures. (ngircd-global, ngircd-limits, ngircd-options, ngircd-ssl) (ngircd-operator, ngircd-server, ngircd-channel) (ngircd-configuration): New configurations. (serialize-ngircd-global, serialize-ngircd-limits) (serialize-ngircd-options, serialize-ngircd-operator) (serialize-list-of-ngircd-operators, serialize-ngircd-server) (serialize-ngircd-channel, serialize-list-of-ngircd-channels) (serialize-ngircd-configuration): New procedures. (list-of-ngircd-operators?, list-of-ngircd-servers?) (list-of-ngircd-channels?): New predicates. (ngircd-generate-documentation): New procedure. (ngircd-user+group, ngircd-account, ngircd-wrapper): Likewise. (ngircd-shepherd-service): New shepherd service. (ngircd-service-type): New service type. * gnu/tests/messaging.scm (%ngircd-os): New variable. (run-ngircd-test): New procedure. (%test-ngircd): New test. * doc/guix.texi (Messaging Services): Document it. Change-Id: I3ce9a7fd0b33afab22cf15942a1db0cf5b12bfdb
2025-04-06doc: cookbook: Update instructions for building a custom kernel.Adam Quandour
* doc/guix-cookbook.texi (Customizing the Kernel): Update. Change-Id: I4451f038219c73b685fa3e80e1b05c729d4bea35 Signed-off-by: Ludovic Courtès <[email protected]> Modified-by: Ludovic Courtès <[email protected]>
2025-04-06machine: hetzner: Allow connections using ssh-agent.Sergey Trofimov
* gnu/machine/hetzner.scm (<hetzner-configuration>): Add ssh-public-key. * doc/guix.texi (System Configuration)[hetzner-configuration]: Document it. Change-Id: I7354ead508b1a4819534c6b22ba1f089749927c2 Signed-off-by: Ludovic Courtès <[email protected]> Modified-by: Ludovic Courtès <[email protected]>
2025-04-03services: gitolite-service-type: Allow setting the admin name.Tomas Volf
* gnu/services/version-control.scm (<gitolite-configuration>): Add admin-name field. (gitolite-activation): Use it. * doc/guix.texi (Version Control Services): Document it. Remove the wrong default value of admin-pubkey. State the need for .pub extension. Change-Id: Idadf4b2697cee6d1da10e6ba03bdc2e1d729c417 Signed-off-by: Maxim Cournoyer <[email protected]>
2025-04-03services: gitolite-git-configuration: Add extra-content field.Tomas Volf
* gnu/services/version-control.scm (<gitolite-git-configuration>): Add extra-content field. (gitolite-git-configuration-compiler): Handle it during configuration file generation. * doc/guix.texi (Version Control Services): Document it. Change-Id: Iceb02f60b8ef26138961aefef4e56ca83df0e19f Signed-off-by: Maxim Cournoyer <[email protected]>
2025-04-03services: gitolite-git-configuration: Add receive-fsck-objects field.Tomas Volf
* gnu/services/version-control.scm (<gitolite-git-configuration>): Add receive-fsck-objects field. (gitolite-git-configuration-compiler): Handle it during configuration file generation. * doc/guix.texi (Version Control Services): Document it. Change-Id: Iceb02f60b8ef26138961aefef4e56ca83df0e19f Signed-off-by: Maxim Cournoyer <[email protected]>
2025-04-03services: gitolite-git-configuration: Add default-branch field.Tomas Volf
* gnu/services/version-control.scm (<gitolite-git-configuration>): Add default-branch field. (gitolite-git-configuration-compiler): Handle it during configuration file generation. * doc/guix.texi (Version Control Services): Document it. Change-Id: Iceb02f60b8ef26138961aefef4e56ca83df0e19f Signed-off-by: Maxim Cournoyer <[email protected]>
2025-04-03services: Add gitolite-git-configuration.Tomas Volf
In preparation for further customizability of the git configuration, extract the current setup into a separate record type. * gnu/services/version-control.scm (<gitolite-git-configuration>): New record type. (gitolite-git-configuration-compiler): And gexp compiler for it. (<gitolite-configuration>): Add git-config field. (gitolite-activation): Use it. * doc/guix.texi (Version Control Services): Document both. Change-Id: I7658698a93f938f62f41a4fa45b72de1eeb14414 Signed-off-by: Maxim Cournoyer <[email protected]>
2025-04-03services: gitolite-rc-file: Add extra-content field.Tomas Volf
* gnu/services/version-control.scm (<gitolite-rc-file>): Add extra-content field. (gitolite-rc-file-compiler): Handle it during configuration file generation. * doc/guix.texi (Version Control Services): Document it. Change-Id: I5082e1d7a27cc746641ba9ec8ae07c703da5f279 Signed-off-by: Maxim Cournoyer <[email protected]>
2025-04-03services: gitolite-rc-file: Add host-name field.Tomas Volf
* gnu/services/version-control.scm (<gitolite-rc-file>): Add host-name field. (gitolite-rc-file-compiler): Handle it during configuration file generation. * doc/guix.texi (Version Control Services): Document it. Change-Id: I1231ed47a294ff48b35a301f76ae8e9cbfcd9b95 Signed-off-by: Maxim Cournoyer <[email protected]>
2025-04-03services: gitolite-rc-file: Add log-extra field.Tomas Volf
* gnu/services/version-control.scm (<gitolite-rc-file>): Add log-extra field. (gitolite-rc-file-compiler): Handle it during configuration file generation. * doc/guix.texi (Version Control Services): Document it. Change-Id: Ice65dbdf4f42549e3c83914da7229db9d2cf856b Signed-off-by: Maxim Cournoyer <[email protected]>
2025-04-03doc: Update guix-science URL.Jake Forster
* doc/guix.texi (Customizing the System-Wide Guix): Update guix-science URL. Signed-off-by: Maxim Cournoyer <[email protected]>
2025-04-01services: file-database: Search ‘updatedb’ in package.Sergio Pastor Pérez
`file-database-service-type' appends 'bin/updatedb' path to the `package' field provided by `file-database-configuration'. This prevents users from using alternate packages which also provide 'updatedb' but in a different location. For example, the `plocate' package installs 'updatedb' in 'sbin/updatedb'. Fallback to 'sbin/' if 'updatedb' is not found in 'bin/'. * gnu/services/admin.scm (<file-database-configuration>)[package]: Update docstring. (file-database-shepherd-services): Locate 'updatedb' binary. * doc/guix.texi (File Search Services): Update accordingly. Change-Id: Ic741716044be3a8f51a157510f9f923bd66c41d7 Signed-off-by: Ludovic Courtès <[email protected]> Modified-by: Ludovic Courtès <[email protected]>
2025-04-01doc: Remove extra paren in example.Ludovic Courtès
* doc/guix.texi (Networking Setup): Remove extra parent in ‘dhcpcd-configuration’ example. Change-Id: I10cea18054424ee14318730b9e8d750e9484b35a
2025-04-01doc: Fix package name.Nigko Yerden
* doc/guix.texi (Networking Services): Replace 'go-gitlab-torproject-org-tpo-anti-censorship-pluggable-transports-lyrebird' with 'lyrebird'. The old name was deprecated in b80dcf5a0784d2b7de87aa0f0235e7e036daa942. Change-Id: Iffcd1e30aecd0bccff2cfa9b8cab126556c0498b Signed-off-by: Zheng Junjie <[email protected]>
2025-03-27services: libvirt: Add UEFI firmware support.Maxim Cournoyer
This makes libvirt able to boot images that require a UEFI bootloader, with the available firmwares exposed to libvirt made configurable via a new configuration field. For more background on the problem this fixes, see the same issue that was reported in NixOS (see: https://github.com/NixOS/nixpkgs/issues/115996). * gnu/services/virtualization.scm: (list-of-file-likes?): New predicate. (libvirt-configuration): [firmwares]: New field. (/etc/qemu/firmware): New procedure. (libvirt-service-type): Extend the etc-service-type with it. (generate-libvirt-documentation): Delete obsolete procedure. * doc/guix.texi: Re-generate doc. * gnu/tests/virtualization.scm (run-libvirt-test): Augment memory from 256 to 512 MiB. Test it. Series-to: [email protected] Change-Id: I40694964405f13681520bf1e28b7365b0200d8f7
2025-03-26daemon: Allow running as non-root with unprivileged user namespaces.Ludovic Courtès
Many thanks to Reepca Russelstein for their review and guidance on these changes. * nix/libstore/build.cc (guestUID, guestGID): New variables. (DerivationGoal)[readiness]: New field. (initializeUserNamespace): New function. (DerivationGoal::runChild): When ‘readiness.readSide’ is positive, read from it. (DerivationGoal::startBuilder): Call ‘chown’ only when ‘buildUser.enabled()’ is true. Pass CLONE_NEWUSER to ‘clone’ when ‘buildUser.enabled()’ is false or not running as root. Retry ‘clone’ without CLONE_NEWUSER upon EPERM. (DerivationGoal::registerOutputs): Make ‘actualPath’ writable before ‘rename’. (DerivationGoal::deleteTmpDir): Catch ‘SysError’ around ‘_chown’ call. * nix/libstore/local-store.cc (LocalStore::createUser): Do nothing if ‘dirs’ already exists. Warn instead of failing when failing to chown ‘dir’. * guix/substitutes.scm (%narinfo-cache-directory): Check for ‘_NIX_OPTIONS’ rather than getuid() == 0 to determine the cache location. * doc/guix.texi (Build Environment Setup): Reorganize a bit. Add section headings “Daemon Running as Root” and “The Isolated Build Environment”. Add “Daemon Running Without Privileges” subsection. Remove paragraph about ‘--disable-chroot’. (Invoking guix-daemon): Warn against ‘--disable-chroot’ and explain why. * tests/derivations.scm ("builder is outside the store"): New test. Reviewed-by: Reepca Russelstein <[email protected]>
2025-03-25doc: Remove incorrect ‘kbxutil’ example.Ludovic Courtès
Fixes <https://issues.guix.gnu.org/71918>. * doc/guix.texi (Invoking guix refresh): Remove ‘kbxutil’ example. Reported-by: Attila Lendvai <[email protected]> Change-Id: If185740731bf29462caba8be31c07f296d0bddd0
2025-03-23doc: Document Shepherd timers and recommend against mcron.Ludovic Courtès
* doc/guix.texi (Scheduled Job Execution): Add intro. Add “Shepherd Timers” subsection; move previous documentation to “Mcron” subsection. Recommend use of Shepherd timers. (Mcron Home Service): Recommend Shepherd timers. (Shepherd Home Service): Document timers. Reviewed-by: Maxim Cournoyer <[email protected]> Change-Id: I9dba68a0d062f5aeeae29ff725e1161f2bd3b291
2025-03-23services: ganeti: Produce Shepherd timers instead of mcron jobs.Ludovic Courtès
* gnu/services/ganeti.scm (<ganeti-watcher-configuration>)[schedule]: Change default value to a cron string. (ganeti-timer): New procedure. (ganeti-watcher-jobs): Rename to… (ganeti-watcher-service): … this. Return Shepherd services. (ganeti-watcher-service-type)[extensions]: Adjust accordingly. (ganeti-cleaner-jobs): Rename to… (ganeti-cleaner-service): … this. Return Shepherd services. (ganeti-cleaner-service-type)[extensions]: Adjust accordingly. (ganeti-shepherd-services): Include the watcher and cleaner services. (ganeti-mcron-jobs): Remove. (ganeti-service-type)[extensions]: Adjust accordingly. * doc/guix.texi (Virtualization Services): Update ‘schedule’ documentation. Reviewed-by: Maxim Cournoyer <[email protected]> Change-Id: Id209a3c50271203dc7190c4c6d0c0ffdf6c10875
2025-03-23services: wireguard: Turn monitoring into a Shepherd timer.Ludovic Courtès
* gnu/services/vpn.scm (<wireguard-configuration>)[schedule]: Change default value. (wireguard-monitoring-program): New procedure, with code taken from… (wireguard-monitoring-jobs): … here. Remove. (wireguard-shepherd-services): New procedure, with code taken from… (wireguard-shepherd-service): … here. Remove. * doc/guix.texi (VPN Services): Update. Reviewed-by: Maxim Cournoyer <[email protected]> Change-Id: I6851ddf1eb9480bdc9e6c6c6b88958ab2e6225d7
2025-03-23services: fstrim: Turn into a Shepherd timer.Ludovic Courtès
* gnu/services/linux.scm (mcron-time?): Remove. (shepherd-calendar-event?): New procedure. (fstrim-configuration)[schedule]: Change type to ‘shepherd-calendar-event’ and update docstring. (fstrim-mcron-job): Rename to… (fstrim-shepherd-services): … this. Return a list of Shepherd services. (fstrim-service-type): Adjust accordingly. * doc/guix.texi (Linux Services): Update. Reviewed-by: Maxim Cournoyer <[email protected]> Change-Id: I9a7433cb15a1f4600470a915769d612e6e644dd8
2025-03-23services: package-database: Turn into a Shepherd timer.Ludovic Courtès
* gnu/services/admin.scm (package-database-mcron-jobs): Rename to… (package-database-shepherd-services): … this. Return a shepherd service. (package-database-service-type): Update accordingly. * doc/guix.texi (File Search Services): Update documentation of the ‘schedule’ field. Reviewed-by: Maxim Cournoyer <[email protected]> Change-Id: Id7b4c5cff95a7117dca7d95af37db7389bb5ca92
2025-03-23services: file-database: Turn into a Shepherd timer.Ludovic Courtès
* gnu/services/admin.scm (file-database-mcron-jobs): Rename to… (file-database-shepherd-services): … this. Return a list of Shepherd services. (file-database-service-type): Adjust accordingly. * doc/guix.texi (File Search Services): Update documentation of ‘schedule’. Reviewed-by: Maxim Cournoyer <[email protected]> Change-Id: I5734c629b113e54057694d2ec480abd26b7815db
2025-03-23doc: cookbook: Custom NAT-based libvirt networks.45mg
* doc/guix-cookbook.texi (Virtual Machines): [Custom NAT-based network for libvirt]: New section. [References]: New section. Change-Id: Ice79c5dc8183ec694ac8b846a5ec88cb98cac9ff Signed-off-by: Maxim Cournoyer <[email protected]>
2025-03-23doc: cookbook: Clarify virtual network switches.45mg
* doc/guix-cookbook.texi (Virtual Machines): [Routed network for libvirt] {Creating a virtual network switch}: Remove unnecessarily noncommital language ("a few components/configurations, such as..."). Correct 'TUN interface', as bridges are currently used. Add a link to the libvirt Wiki for more information. Change-Id: I6ffdeca8e4d32155c8cce547d4930bf1b0cb471b Signed-off-by: Maxim Cournoyer <[email protected]>
2025-03-23doc: cookbook: Fix terminology for libvirt virtual network switches.45mg
* doc/guix-cookbook.texi (Virtual Machines) [Routed network for libvirt]: Replace the term 'virtual bridge' with 'virtual network switch'. This is the term used by the libvirt Wiki to refer to the combined setup of a 'virtual bridge' network interface, dnsmasq instance bound to it, and firewall rules associated with it; 'bridge' is ambiguous because it is sometimes used with this meaning, and sometimes to refer specifically to the virtual network device called a 'bridge'. Change-Id: Ibd10fe76321eb61e9ca23d8124634d1108d4faad Signed-off-by: Maxim Cournoyer <[email protected]>
2025-03-23doc/cookbook: Update menus.Maxim Cournoyer
Change-Id: I435d799ac458c38894f06b94d4334f0854a2c219
2025-03-22mapped-devices/luks: Add support for --allow-discards.Sören Tempel
* gnu/system/mapped-devices.scm (open-luks-device): Support opening LUKS devices with the --allow-discards option. * gnu/system/mapped-devices.scm (luks-device-mapping-with-options): Pass through the allow-discards? keyword argument. * doc/guix.texi (Mapped Devices): Update documentation for the luks-device-mapping-with-options procedure. Co-authored-by: Sisiutl <[email protected]> Modified-by: Maxim Cournoyer <[email protected]> Change-Id: Iff82d7d548486f028d19f6aa35dd30ca194f57cc
2025-03-22doc: Fix default values for gitolite-configuration.Tomas Volf
* doc/guix.texi (Version Control Services) <gitolite-configuration> [package, admin-pubkey, rc-file, home-directory] [user, group]: Use @code. Wrap the value in double quotes. Change-Id: I1a96826e339d4372d54bb29d22f3fa84f255cb0f Signed-off-by: Maxim Cournoyer <[email protected]>
2025-03-20home: Add home-snuik-service.Janneke Nieuwenhuizen
* gnu/home/services/messaging.scm (home-snuik-service-type): New variable. * doc/guix.texi (Messaging Home Services): Document it. Change-Id: I1e278e7d8ed04efcb1a2ce9e12e69cb6a31a9fa4