+2
nixos/doc/manual/release-notes/rl-2505.section.md
···+- All services that require a root certificate bundle now use the value of a new read-only option, `security.pki.caBundle`.- hddfancontrol has been updated to major release 2. See the [migration guide](https://github.com/desbma/hddfancontrol/tree/master?tab=readme-ov-file#migrating-from-v1x), as there are breaking changes.- The Home Assistant module has new options {option}`services.home-assistant.blueprints.automation`, `services.home-assistant.blueprints.script`, and {option}`services.home-assistant.blueprints.template` that allow for the declarative installation of [blueprints](https://www.home-assistant.io/docs/blueprint/) into the appropriate configuration directories.
+20
-12
nixos/modules/security/ca.nix
······
+1
-1
nixos/modules/services/audio/gonic.nix
···
+1
-1
nixos/modules/services/continuous-integration/gocd-agent/default.nix
···ln -s "${pkgs.writeText "autoregister.properties" cfg.agentConfig}" config/autoregister.properties
+1
-1
nixos/modules/services/continuous-integration/gocd-server/default.nix
···
+4
-3
nixos/modules/services/mail/postfix.nix
···-File containing trusted certification authorities (CA) to verify certificates of mailservers contacted for mail delivery. This basically sets smtp_tls_CAfile and enables opportunistic tls. Defaults to NixOS trusted certification authorities.+File containing trusted certification authorities (CA) to verify certificates of mailservers contacted for mail delivery. This sets [smtp_tls_CAfile](https://www.postfix.org/postconf.5.html#smtp_tls_CAfile). Defaults to system trusted certificates (see `security.pki.*` options).
+1
-1
nixos/modules/services/misc/db-rest.nix
+1
-1
nixos/modules/services/misc/gitlab.nix
···${optionalString (cfg.smtp.authentication != null) "authentication: :${cfg.smtp.authentication},"}
+1
-1
nixos/modules/services/misc/portunus.nix
···
+1
-1
nixos/modules/services/misc/radicle.nix
···"${if lib.types.path.check cfg.publicKey then cfg.publicKey else pkgs.writeText "radicle.pub" cfg.publicKey}:${env.RAD_HOME}/keys/radicle.pub"···
+1
-3
nixos/modules/services/misc/tandoor-recipes.nix
···
+2
-2
nixos/modules/services/monitoring/ocsinventory-agent.nix
······
+2
-1
nixos/modules/services/monitoring/parsedmarc.nix
···
+1
-1
nixos/modules/services/monitoring/uptime-kuma.nix
+2
-1
nixos/modules/services/networking/biboumi.nix
···
+1
-2
nixos/modules/services/networking/privoxy.nix
···
+2
-2
nixos/modules/services/networking/stunnel.nix
······
+1
-1
nixos/modules/services/networking/unbound.nix
···access-control = mkDefault ([ "127.0.0.0/8 allow" ] ++ (optional config.networking.enableIPv6 "::1/128 allow"));
+1
-1
nixos/modules/services/search/hound.nix
···-ExecStartPre = "${pkgs.git}/bin/git config --global --replace-all http.sslCAinfo /etc/ssl/certs/ca-certificates.crt";+ExecStartPre = "${pkgs.git}/bin/git config --global --replace-all http.sslCAinfo ${config.security.pki.caBundle}";
+1
-1
nixos/modules/services/system/nix-daemon.nix
+1
-1
nixos/modules/services/torrent/transmission.nix
+1
-1
nixos/modules/services/web-apps/cryptpad.nix
+1
-1
nixos/modules/services/web-apps/dex.nix
···
+1
-1
nixos/modules/services/web-apps/grav.nix
···
+2
-2
nixos/modules/services/web-apps/nextcloud.nix
······+defaultText = literalExpression (generators.toPretty { } (defaultPHPSettings // { "openssl.cafile" = literalExpression "config.security.pki.caBundle"; }));
+1
-1
nixos/modules/services/web-apps/peertube.nix
···
+1
-1
nixos/modules/services/web-apps/sogo.nix
···