2024-05-29 23:27:43 +02:00
# Upcoming Release
2024-04-22 08:07:32 +02:00
2024-05-29 23:27:43 +02:00
## Breaking Changes
2024-08-15 06:41:01 +02:00
- Remove dependency on `sops-nix` .
2024-05-29 23:27:43 +02:00
- Rename `shb.nginx.autheliaProtect` to `shb.nginx.vhosts` . Indeed, the option allows to define a vhost with _optional_ Authelia protection but the former name made it look like Authelia protection was enforced.
2024-05-30 05:29:10 +02:00
- Rename all `shb.arr.*.APIKey` to `shb.arr.*.ApiKey` .
2024-05-29 23:27:43 +02:00
- Remove `shb.vaultwarden.ldapEndpoint` option because it was not used in the implementation anyway.
2024-05-29 23:46:41 +02:00
- Bump Nextcloud default version from 27 to 28. Add support for version 29.
2024-06-10 08:29:40 +02:00
- Deluge config breaks the authFile into an attrset of user to password file. Also deluge has tests now.
2024-05-02 07:58:15 +02:00
- Nextcloud now configures the LDAP app to use the `user_id` from LLDAP as the user ID used in Nextcloud. This makes all source of user - internal, LDAP and SSO - agree on the user ID.
2024-08-31 09:57:21 +02:00
- Authelia options changed:
- `shb.authelia.oidcClients.id` -> `shb.authelia.oidcClients.client_id`
- `shb.authelia.oidcClients.description` -> `shb.authelia.oidcClients.client_name`
- `shb.authelia.oidcClients.secret` -> `shb.authelia.oidcClients.client_secret`
2024-09-01 08:36:53 +02:00
- `shb.authelia.ldapEndpoint` -> `shb.authelia.ldapHostname` and `shb.authelia.ldapPort`
2024-10-24 22:12:29 +02:00
- `shb.authelia.jwtSecretFile` -> `shb.authelia.jwtSecret.result.path`
- `shb.authelia.ldapAdminPasswordFile` -> `shb.authelia.ldapAdminPassword.result.path`
- `shb.authelia.sessionSecretFile` -> `shb.authelia.sessionSecret.result.path`
- `shb.authelia.storageEncryptionKeyFile` -> `shb.authelia.storageEncryptionKey.result.path`
- `shb.authelia.identityProvidersOIDCIssuerPrivateKeyFile` -> `shb.authelia.identityProvidersOIDCIssuerPrivateKey.result.path`
- `shb.authelia.smtp.passwordFile` -> `shb.authelia.smtp.password.result.path`
2024-09-01 21:36:33 +02:00
- Make Nextcloud automatically disable maintenance mode upon service restart.
2024-10-01 23:01:00 +02:00
- `shb.ldap.ldapUserPasswordFile` -> `shb.ldap.ldapUserPassword.result.path`
- `shb.ldap.jwtSecretFile` -> `shb.ldap.jwtSecret.result.path`
2024-10-24 22:12:29 +02:00
- Jellyfin changes:
- `shb.jellyfin.ldap.passwordFile` -> `shb.jellyfin.ldap.adminPassword.result.path` .
- `shb.jellyfin.sso.secretFile` -> `shb.jellyfin.ldap.sharedSecret.result.path` .
- + `shb.jellyfin.ldap.sharedSecretForAuthelia` .
- Forgejo changes:
- `shb.forgejo.ldap.adminPasswordFile` -> `shb.forgejo.ldap.adminPassword.result.path` .
- `shb.forgejo.sso.secretFile` -> `shb.forgejo.ldap.sharedSecret.result.path` .
- `shb.forgejo.sso.secretFileForAuthelia` -> `shb.forgejo.ldap.sharedSecretForAuthelia.result.path` .
- `shb.forgejo.adminPasswordFile` -> `shb.forgejo.adminPassword.result.path` .
- `shb.forgejo.databasePasswordFile` -> `shb.forgejo.databasePassword.result.path` .
2024-05-29 23:27:43 +02:00
## User Facing Backwards Compatible Changes
2024-08-12 15:48:55 +02:00
- Add mount contract.
- Export torrent metrics.
- Bump chunkSize in Nextcloud to boost performance.
2024-05-29 23:27:43 +02:00
- Fix home-assistant onboarding file generation. Added new VM test.
- OIDC and SMTP config are now optional in Vaultwarden. Added new VM test.
- Add default OIDC config for Authelia. This way, Authelia can start even with no config or only forward auth configs.
- Fix replaceSecrets function. It wasn't working correctly with functions from `lib.generators` and `pkgs.pkgs-lib.formats` . Also more test coverage.
- Add udev extra rules to allow smartctl Prometheus exporter to find NVMe drives.
2024-04-22 08:07:32 +02:00
- Revert Loki to major version 2 because upgrading to version 3 required manual intervention as Loki
refuses to start. So until this issue is tackled, reverting is the best immediate fix.
See https://github.com/NixOS/nixpkgs/commit/8f95320f39d7e4e4a29ee70b8718974295a619f4
2024-06-10 08:30:14 +02:00
- Add prometheus deluge exporter support. It just needs the `shb.deluge.prometheusScraperPasswordFile` option to be set.
2024-04-22 08:07:32 +02:00
2024-05-29 23:27:43 +02:00
## Other Changes
- Add pretty printing of test errors. Instead of:
```
error: testRadarr failed: expected {"services":{"bazarr":{},"jackett":{},"lidarr":{},"nginx":{"enable":true},"radarr":{"dataDir":"/var/lib/radarr","enable":true,"group":"radarr","user":"radarr"},"readarr":{},"sonarr":{}},"shb":{"backup":{"instances":{"radarr":{"excludePatterns":[".db-shm",".db-wal",".mono"],"sourceDirectories":["/var/lib/radarr"]}}},"nginx":{"autheliaProtect":[{"authEndpoint":"https://oidc.example.com","autheliaRules":[{"domain":"radarr.example.com","policy":"bypass","resources":["^/api.*"]},{"domain":"radarr.example.com","policy":"two_factor","subject":["group:arr_user"]}],"domain":"example.com","ssl":null,"subdomain":"radarr","upstream":"http://127.0.0.1:7878"}]}},"systemd":{"services":{"radarr":{"serviceConfig":{"StateDirectoryMode":"0750","UMask":"0027"}}},"tmpfiles":{"rules":["d '/var/lib/radarr' 0750 radarr radarr - -"]}},"users":{"groups":{"radarr":{"members":["backup"]}}}}, but got {"services":{"bazarr":{},"jackett":{},"lidarr":{},"nginx":{"enable":true},"radarr":{"dataDir":"/var/lib/radarr","enable":true,"group":"radarr","user":"radarr"},"readarr":{},"sonarr":{}},"shb":{"backup":{"instances":{"radarr":{"excludePatterns":[".db-shm",".db-wal",".mono"],"sourceDirectories":["/var/lib/radarr"]}}},"nginx":{"vhosts":[{"authEndpoint":"https://oidc.example.com","autheliaRules":[{"domain":"radarr.example.com","policy":"bypass","resources":["^/api.*"]},{"domain":"radarr.example.com","policy":"two_factor","subject":["group:arr_user"]}],"domain":"example.com","ssl":null,"subdomain":"radarr","upstream":"http://127.0.0.1:7878"}]}},"systemd":{"services":{"radarr":{"serviceConfig":{"StateDirectoryMode":"0750","UMask":"0027"}}},"tmpfiles":{"rules":["d '/var/lib/radarr' 0750 radarr radarr - -"]}},"users":{"groups":{"radarr":{"members":["backup"]}}}}
```
You now see:
```
error: testRadarr failed (- expected, + result)
{
"dictionary_item_added": [
"root['shb']['nginx']['vhosts']"
],
"dictionary_item_removed": [
"root['shb']['nginx']['authEndpoint']"
]
}
```
2024-05-02 07:57:23 +02:00
- Made Nextcloud LDAP setup use a hardcoded configID. This makes the detection of an existing config much more robust.
2024-05-29 23:27:43 +02:00
2024-04-22 08:07:32 +02:00
# 0.1.0
Creation of CHANGELOG.md