+2
nixos/doc/manual/release-notes/rl-2505.section.md
+2
nixos/doc/manual/release-notes/rl-2505.section.md
···- [Autotier](https://github.com/45Drives/autotier), a passthrough FUSE filesystem. Available as [services.autotierfs](options.html#opt-services.autotierfs.enable).+- [PostgREST](https://postgrest.org), a standalone web server that turns your PostgreSQL database directly into a RESTful API. Available as [services.postgrest](options.html#opt-services.postgrest.enable).- [µStreamer](https://github.com/pikvm/ustreamer), a lightweight MJPEG-HTTP streamer. Available as [services.ustreamer](options.html#opt-services.ustreamer).
+1
nixos/modules/module-list.nix
+1
nixos/modules/module-list.nix
···
+311
nixos/modules/services/databases/postgrest.nix
+311
nixos/modules/services/databases/postgrest.nix
···+The secret or JSON Web Key (JWK) (or set) used to decode JWT tokens clients provide for authentication.+<https://docs.postgrest.org/en/stable/references/configuration.html#in-database-configuration>+`db-uri` is represented as an attribute set, see [`settings.db-uri`](#opt-services.postgrest.settings.db-uri)+Please set one of `settings.server-port`](#opt-services.postgrest.jwtSecretFile) or `settings.server-unix-socket` to `null`.+lib.optional (cfg.settings.admin-server-port != null && cfg.settings.server-host != "127.0.0.1")+"The PostgREST admin server is potentially listening on a public host. This may expose sensitive information via the `/config` endpoint.";
+1
nixos/tests/all-tests.nix
+1
nixos/tests/all-tests.nix
···postfix-raise-smtpd-tls-security-level = handleTest ./postfix-raise-smtpd-tls-security-level.nix {};
+88
nixos/tests/postgrest.nix
+88
nixos/tests/postgrest.nix
···+"curl --fail-with-body --no-progress-meter --unix-socket /run/postgrest/postgrest.sock http://localhost",+f"curl --fail-with-body --no-progress-meter -H 'Authorization: Bearer {token}' http://localhost:3000",
+1
pkgs/development/haskell-modules/configuration-nix.nix
+1
pkgs/development/haskell-modules/configuration-nix.nix
···