mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-25 08:23:09 +00:00
Merge staging-next into staging
This commit is contained in:
commit
02a21c89b8
@ -15043,6 +15043,12 @@
|
||||
githubId = 496447;
|
||||
name = "Robert Hensing";
|
||||
};
|
||||
robert-manchester = {
|
||||
email = "robert.manchester@gmail.com";
|
||||
github = "robert-manchester";
|
||||
githubId = 86313040;
|
||||
name = "Robert Manchester";
|
||||
};
|
||||
robertodr = {
|
||||
email = "roberto.diremigio@gmail.com";
|
||||
github = "robertodr";
|
||||
|
@ -786,8 +786,11 @@ def update_plugins(editor: Editor, args):
|
||||
autocommit = not args.no_commit
|
||||
|
||||
if autocommit:
|
||||
from datetime import date
|
||||
editor.nixpkgs_repo = git.Repo(editor.root, search_parent_directories=True)
|
||||
commit(editor.nixpkgs_repo, f"{editor.attr_path}: update", [args.outfile])
|
||||
updated = date.today().strftime('%m-%d-%Y')
|
||||
|
||||
commit(editor.nixpkgs_repo, f"{editor.attr_path}: updated the {updated}", [args.outfile])
|
||||
|
||||
if redirects:
|
||||
update()
|
||||
|
@ -44,6 +44,10 @@ of actions is always the same:
|
||||
- Inspect what changed during these actions and print units that failed and
|
||||
that were newly started
|
||||
|
||||
By default, some units are filtered from the outputs to make it less spammy.
|
||||
This can be disabled for development or testing by setting the environment variable
|
||||
`STC_DISPLAY_ALL_UNITS=1`
|
||||
|
||||
Most of these actions are either self-explaining but some of them have to do
|
||||
with our units or the activation script. For this reason, these topics are
|
||||
explained in the next sections.
|
||||
|
@ -359,6 +359,8 @@
|
||||
|
||||
- The application firewall `opensnitch` now uses the process monitor method eBPF as default as recommended by upstream. The method can be changed with the setting [services.opensnitch.settings.ProcMonitorMethod](#opt-services.opensnitch.settings.ProcMonitorMethod).
|
||||
|
||||
- `services.hedgedoc` has been heavily refactored, reducing the amount of declared options in the module. Most of the options should still work without any changes. Some options have been deprecated, as they no longer have any effect. See [#244941](https://github.com/NixOS/nixpkgs/pull/244941) for more details.
|
||||
|
||||
- The module [services.ankisyncd](#opt-services.ankisyncd.package) has been switched to [anki-sync-server-rs](https://github.com/ankicommunity/anki-sync-server-rs) from the old python version, which was difficult to update, had not been updated in a while, and did not support recent versions of anki.
|
||||
Unfortunately all servers supporting new clients (newer version of anki-sync-server, anki's built in sync server and this new rust package) do not support the older sync protocol that was used in the old server, so such old clients will also need updating and in particular the anki package in nixpkgs is also being updated in this release.
|
||||
The module update takes care of the new config syntax and the data itself (user login and cards) are compatible, so users of the module will be able to just log in again after updating both client and server without any extra action.
|
||||
|
@ -7,7 +7,7 @@ let
|
||||
in
|
||||
{
|
||||
options.networking.iproute2 = {
|
||||
enable = mkEnableOption (lib.mdDoc "copy IP route configuration files");
|
||||
enable = mkEnableOption (lib.mdDoc "copying IP route configuration files");
|
||||
rttablesExtraConfig = mkOption {
|
||||
type = types.lines;
|
||||
default = "";
|
||||
|
@ -15,7 +15,7 @@ let
|
||||
in
|
||||
{
|
||||
options.networking.stevenblack = {
|
||||
enable = mkEnableOption (mdDoc "Enable the stevenblack hosts file blocklist");
|
||||
enable = mkEnableOption (mdDoc "the stevenblack hosts file blocklist");
|
||||
|
||||
block = mkOption {
|
||||
type = types.listOf (types.enum [ "fakenews" "gambling" "porn" "social" ]);
|
||||
|
@ -8,13 +8,13 @@ in
|
||||
{
|
||||
options.programs.corectrl = {
|
||||
enable = mkEnableOption (lib.mdDoc ''
|
||||
A tool to overclock amd graphics cards and processors.
|
||||
CoreCtrl, a tool to overclock amd graphics cards and processors.
|
||||
Add your user to the corectrl group to run corectrl without needing to enter your password
|
||||
'');
|
||||
|
||||
gpuOverclock = {
|
||||
enable = mkEnableOption (lib.mdDoc ''
|
||||
true
|
||||
GPU overclocking
|
||||
'');
|
||||
ppfeaturemask = mkOption {
|
||||
type = types.str;
|
||||
|
@ -11,7 +11,7 @@ in
|
||||
enable = mkEnableOption (lib.mdDoc ''
|
||||
i2c devices support. By default access is granted to users in the "i2c"
|
||||
group (will be created if non-existent) and any user with a seat, meaning
|
||||
logged on the computer locally.
|
||||
logged on the computer locally
|
||||
'');
|
||||
|
||||
group = mkOption {
|
||||
|
@ -11,7 +11,7 @@ in
|
||||
non-root access to the firmware of UHK keyboards.
|
||||
You need it when you want to flash a new firmware on the keyboard.
|
||||
Access to the keyboard is granted to users in the "input" group.
|
||||
You may want to install the uhk-agent package.
|
||||
You may want to install the uhk-agent package
|
||||
'');
|
||||
|
||||
};
|
||||
|
@ -11,7 +11,7 @@ in
|
||||
udev rules for keyboards from ZSA like the ErgoDox EZ, Planck EZ and Moonlander Mark I.
|
||||
You need it when you want to flash a new configuration on the keyboard
|
||||
or use their live training in the browser.
|
||||
You may want to install the wally-cli package.
|
||||
You may want to install the wally-cli package
|
||||
'');
|
||||
};
|
||||
|
||||
|
@ -50,7 +50,7 @@ in
|
||||
options = {
|
||||
hardware.openrazer = {
|
||||
enable = mkEnableOption (lib.mdDoc ''
|
||||
OpenRazer drivers and userspace daemon.
|
||||
OpenRazer drivers and userspace daemon
|
||||
'');
|
||||
|
||||
verboseLogging = mkOption {
|
||||
|
@ -9,7 +9,7 @@ in
|
||||
{
|
||||
options.hardware.tuxedo-keyboard = {
|
||||
enable = mkEnableOption (lib.mdDoc ''
|
||||
Enables the tuxedo-keyboard driver.
|
||||
the tuxedo-keyboard driver.
|
||||
|
||||
To configure the driver, pass the options to the {option}`boot.kernelParams` configuration.
|
||||
There are several parameters you can change. It's best to check at the source code description which options are supported.
|
||||
|
@ -24,7 +24,7 @@ in {
|
||||
options = {
|
||||
hardware.nvidia = {
|
||||
datacenter.enable = lib.mkEnableOption (lib.mdDoc ''
|
||||
Data Center drivers for NVIDIA cards on a NVLink topology.
|
||||
Data Center drivers for NVIDIA cards on a NVLink topology
|
||||
'');
|
||||
datacenter.settings = lib.mkOption {
|
||||
type = settingsFormat.type;
|
||||
@ -79,18 +79,18 @@ in {
|
||||
|
||||
powerManagement.enable = lib.mkEnableOption (lib.mdDoc ''
|
||||
experimental power management through systemd. For more information, see
|
||||
the NVIDIA docs, on Chapter 21. Configuring Power Management Support.
|
||||
the NVIDIA docs, on Chapter 21. Configuring Power Management Support
|
||||
'');
|
||||
|
||||
powerManagement.finegrained = lib.mkEnableOption (lib.mdDoc ''
|
||||
experimental power management of PRIME offload. For more information, see
|
||||
the NVIDIA docs, on Chapter 22. PCI-Express Runtime D3 (RTD3) Power Management.
|
||||
the NVIDIA docs, on Chapter 22. PCI-Express Runtime D3 (RTD3) Power Management
|
||||
'');
|
||||
|
||||
dynamicBoost.enable = lib.mkEnableOption (lib.mdDoc ''
|
||||
dynamic Boost balances power between the CPU and the GPU for improved
|
||||
performance on supported laptops using the nvidia-powerd daemon. For more
|
||||
information, see the NVIDIA docs, on Chapter 23. Dynamic Boost on Linux.
|
||||
information, see the NVIDIA docs, on Chapter 23. Dynamic Boost on Linux
|
||||
'');
|
||||
|
||||
modesetting.enable = lib.mkEnableOption (lib.mdDoc ''
|
||||
@ -99,7 +99,7 @@ in {
|
||||
Enabling this fixes screen tearing when using Optimus via PRIME (see
|
||||
{option}`hardware.nvidia.prime.sync.enable`. This is not enabled
|
||||
by default because it is not officially supported by NVIDIA and would not
|
||||
work with SLI.
|
||||
work with SLI
|
||||
'');
|
||||
|
||||
prime.nvidiaBusId = lib.mkOption {
|
||||
@ -153,11 +153,11 @@ in {
|
||||
|
||||
Note that this configuration will only be successful when a display manager
|
||||
for which the {option}`services.xserver.displayManager.setupCommands`
|
||||
option is supported is used.
|
||||
option is supported is used
|
||||
'');
|
||||
|
||||
prime.allowExternalGpu = lib.mkEnableOption (lib.mdDoc ''
|
||||
configuring X to allow external NVIDIA GPUs when using Prime [Reverse] sync optimus.
|
||||
configuring X to allow external NVIDIA GPUs when using Prime [Reverse] sync optimus
|
||||
'');
|
||||
|
||||
prime.offload.enable = lib.mkEnableOption (lib.mdDoc ''
|
||||
@ -166,7 +166,7 @@ in {
|
||||
If this is enabled, then the bus IDs of the NVIDIA and Intel/AMD GPUs have to
|
||||
be specified ({option}`hardware.nvidia.prime.nvidiaBusId` and
|
||||
{option}`hardware.nvidia.prime.intelBusId` or
|
||||
{option}`hardware.nvidia.prime.amdgpuBusId`).
|
||||
{option}`hardware.nvidia.prime.amdgpuBusId`)
|
||||
'');
|
||||
|
||||
prime.offload.enableOffloadCmd = lib.mkEnableOption (lib.mdDoc ''
|
||||
@ -174,7 +174,7 @@ in {
|
||||
for offloading programs to an nvidia device. To work, should have also enabled
|
||||
{option}`hardware.nvidia.prime.offload.enable` or {option}`hardware.nvidia.prime.reverseSync.enable`.
|
||||
|
||||
Example usage `nvidia-offload sauerbraten_client`.
|
||||
Example usage `nvidia-offload sauerbraten_client`
|
||||
'');
|
||||
|
||||
prime.reverseSync.enable = lib.mkEnableOption (lib.mdDoc ''
|
||||
@ -202,25 +202,25 @@ in {
|
||||
|
||||
Note that this configuration will only be successful when a display manager
|
||||
for which the {option}`services.xserver.displayManager.setupCommands`
|
||||
option is supported is used.
|
||||
option is supported is used
|
||||
'');
|
||||
|
||||
nvidiaSettings =
|
||||
(lib.mkEnableOption (lib.mdDoc ''
|
||||
nvidia-settings, NVIDIA's GUI configuration tool.
|
||||
nvidia-settings, NVIDIA's GUI configuration tool
|
||||
''))
|
||||
// {default = true;};
|
||||
|
||||
nvidiaPersistenced = lib.mkEnableOption (lib.mdDoc ''
|
||||
nvidia-persistenced a update for NVIDIA GPU headless mode, i.e.
|
||||
It ensures all GPUs stay awake even during headless mode.
|
||||
It ensures all GPUs stay awake even during headless mode
|
||||
'');
|
||||
|
||||
forceFullCompositionPipeline = lib.mkEnableOption (lib.mdDoc ''
|
||||
forcefully the full composition pipeline.
|
||||
This sometimes fixes screen tearing issues.
|
||||
This has been reported to reduce the performance of some OpenGL applications and may produce issues in WebGL.
|
||||
It also drastically increases the time the driver needs to clock down after load.
|
||||
It also drastically increases the time the driver needs to clock down after load
|
||||
'');
|
||||
|
||||
package = lib.mkOption {
|
||||
|
@ -12,7 +12,7 @@ in
|
||||
|
||||
{
|
||||
|
||||
options.hardware.facetimehd.enable = mkEnableOption (lib.mdDoc "facetimehd kernel module");
|
||||
options.hardware.facetimehd.enable = mkEnableOption (lib.mdDoc "the facetimehd kernel module");
|
||||
|
||||
options.hardware.facetimehd.withCalibration = mkOption {
|
||||
default = false;
|
||||
|
@ -5,7 +5,7 @@ let
|
||||
|
||||
inherit (config.nixops) enableDeprecatedAutoLuks;
|
||||
in {
|
||||
options.nixops.enableDeprecatedAutoLuks = lib.mkEnableOption (lib.mdDoc "Enable the deprecated NixOps AutoLuks module");
|
||||
options.nixops.enableDeprecatedAutoLuks = lib.mkEnableOption (lib.mdDoc "the deprecated NixOps AutoLuks module");
|
||||
|
||||
config = {
|
||||
assertions = [
|
||||
|
@ -8,7 +8,7 @@ in {
|
||||
options = {
|
||||
programs.calls = {
|
||||
enable = mkEnableOption (lib.mdDoc ''
|
||||
Whether to enable GNOME calls: a phone dialer and call handler.
|
||||
GNOME calls: a phone dialer and call handler
|
||||
'');
|
||||
};
|
||||
};
|
||||
|
@ -8,7 +8,7 @@ in
|
||||
{
|
||||
options = {
|
||||
programs.cnping = {
|
||||
enable = mkEnableOption (lib.mdDoc "Whether to install a setcap wrapper for cnping");
|
||||
enable = mkEnableOption (lib.mdDoc "a setcap wrapper for cnping");
|
||||
};
|
||||
};
|
||||
|
||||
|
@ -11,7 +11,7 @@ in {
|
||||
enable = lib.mkEnableOption (lib.mdDoc ''
|
||||
direnv integration. Takes care of both installation and
|
||||
setting up the sourcing of the shell. Additionally enables nix-direnv
|
||||
integration. Note that you need to logout and login for this change to apply.
|
||||
integration. Note that you need to logout and login for this change to apply
|
||||
'');
|
||||
|
||||
package = lib.mkPackageOptionMD pkgs "direnv" {};
|
||||
|
@ -8,9 +8,9 @@ in {
|
||||
options = {
|
||||
programs.feedbackd = {
|
||||
enable = mkEnableOption (lib.mdDoc ''
|
||||
Whether to enable the feedbackd D-BUS service and udev rules.
|
||||
the feedbackd D-BUS service and udev rules.
|
||||
|
||||
Your user needs to be in the `feedbackd` group to trigger effects.
|
||||
Your user needs to be in the `feedbackd` group to trigger effects
|
||||
'');
|
||||
package = mkOption {
|
||||
description = lib.mdDoc ''
|
||||
|
@ -9,7 +9,7 @@ with lib;
|
||||
1714 to 1764 as they are needed for it to function properly.
|
||||
You can use the {option}`package` to use
|
||||
`gnomeExtensions.gsconnect` as an alternative
|
||||
implementation if you use Gnome.
|
||||
implementation if you use Gnome
|
||||
'');
|
||||
package = mkOption {
|
||||
default = pkgs.plasma5Packages.kdeconnect-kde;
|
||||
|
@ -6,7 +6,7 @@ in
|
||||
meta.maintainers = with lib.maintainers; [ rewine ];
|
||||
|
||||
options.programs.wayfire = {
|
||||
enable = lib.mkEnableOption (lib.mdDoc "Wayfire, a wayland compositor based on wlroots.");
|
||||
enable = lib.mkEnableOption (lib.mdDoc "Wayfire, a wayland compositor based on wlroots");
|
||||
|
||||
package = lib.mkPackageOptionMD pkgs "wayfire" { };
|
||||
|
||||
|
@ -359,14 +359,14 @@ in
|
||||
};
|
||||
|
||||
features.oracleMode = mkEnableOption (lib.mdDoc ''
|
||||
Destroy snapshots one by one instead of using one long argument list.
|
||||
destroying snapshots one by one instead of using one long argument list.
|
||||
If source and destination are out of sync for a long time, you may have
|
||||
so many snapshots to destroy that the argument gets is too long and the
|
||||
command fails.
|
||||
command fails
|
||||
'');
|
||||
features.recvu = mkEnableOption (lib.mdDoc ''
|
||||
recvu feature which uses `-u` on the receiving end to keep the destination
|
||||
filesystem unmounted.
|
||||
filesystem unmounted
|
||||
'');
|
||||
features.compressed = mkEnableOption (lib.mdDoc ''
|
||||
compressed feature which adds the options `-Lce` to
|
||||
@ -377,7 +377,7 @@ in
|
||||
support and -e is for embedded data support. see
|
||||
{manpage}`znapzend(1)`
|
||||
and {manpage}`zfs(8)`
|
||||
for more info.
|
||||
for more info
|
||||
'');
|
||||
features.sendRaw = mkEnableOption (lib.mdDoc ''
|
||||
sendRaw feature which adds the options `-w` to the
|
||||
@ -386,25 +386,25 @@ in
|
||||
backup that can't be read without the encryption key/passphrase, useful
|
||||
when the remote isn't fully trusted or not physically secure. This
|
||||
option must be used consistently, raw incrementals cannot be based on
|
||||
non-raw snapshots and vice versa.
|
||||
non-raw snapshots and vice versa
|
||||
'');
|
||||
features.skipIntermediates = mkEnableOption (lib.mdDoc ''
|
||||
Enable the skipIntermediates feature to send a single increment
|
||||
the skipIntermediates feature to send a single increment
|
||||
between latest common snapshot and the newly made one. It may skip
|
||||
several source snaps if the destination was offline for some time, and
|
||||
it should skip snapshots not managed by znapzend. Normally for online
|
||||
destinations, the new snapshot is sent as soon as it is created on the
|
||||
source, so there are no automatic increments to skip.
|
||||
source, so there are no automatic increments to skip
|
||||
'');
|
||||
features.lowmemRecurse = mkEnableOption (lib.mdDoc ''
|
||||
use lowmemRecurse on systems where you have too many datasets, so a
|
||||
recursive listing of attributes to find backup plans exhausts the
|
||||
memory available to {command}`znapzend`: instead, go the slower
|
||||
way to first list all impacted dataset names, and then query their
|
||||
configs one by one.
|
||||
configs one by one
|
||||
'');
|
||||
features.zfsGetType = mkEnableOption (lib.mdDoc ''
|
||||
use zfsGetType if your {command}`zfs get` supports a
|
||||
using zfsGetType if your {command}`zfs get` supports a
|
||||
`-t` argument for filtering by dataset type at all AND
|
||||
lists properties for snapshots by default when recursing, so that there
|
||||
is too much data to process while searching for backup plans.
|
||||
@ -412,7 +412,7 @@ in
|
||||
`--recursive` search for backup plans can literally
|
||||
differ by hundreds of times (depending on the amount of snapshots in
|
||||
that dataset tree... and a decent backup plan will ensure you have a lot
|
||||
of those), so you would benefit from requesting this feature.
|
||||
of those), so you would benefit from requesting this feature
|
||||
'');
|
||||
};
|
||||
};
|
||||
|
@ -122,7 +122,7 @@ in
|
||||
options.services.cassandra = {
|
||||
|
||||
enable = mkEnableOption (lib.mdDoc ''
|
||||
Apache Cassandra – Scalable and highly available database.
|
||||
Apache Cassandra – Scalable and highly available database
|
||||
'');
|
||||
|
||||
clusterName = mkOption {
|
||||
|
@ -11,7 +11,7 @@ in
|
||||
|
||||
options = {
|
||||
services.ferretdb = {
|
||||
enable = mkEnableOption "FerretDB, an Open Source MongoDB alternative.";
|
||||
enable = mkEnableOption "FerretDB, an Open Source MongoDB alternative";
|
||||
|
||||
package = mkOption {
|
||||
type = types.package;
|
||||
|
@ -75,7 +75,7 @@ in {
|
||||
Note that the NixOS module for Redis disables kernel support
|
||||
for Transparent Huge Pages (THP),
|
||||
because this features causes major performance problems for Redis,
|
||||
e.g. (https://redis.io/topics/latency).
|
||||
e.g. (https://redis.io/topics/latency)
|
||||
'');
|
||||
|
||||
user = mkOption {
|
||||
|
@ -8,7 +8,7 @@ in {
|
||||
|
||||
options = {
|
||||
services.surrealdb = {
|
||||
enable = mkEnableOption (lib.mdDoc "A scalable, distributed, collaborative, document-graph database, for the realtime web ");
|
||||
enable = mkEnableOption (lib.mdDoc "SurrealDB, a scalable, distributed, collaborative, document-graph database, for the realtime web");
|
||||
|
||||
package = mkOption {
|
||||
default = pkgs.surrealdb;
|
||||
|
@ -14,7 +14,7 @@ with lib;
|
||||
|
||||
services.deepin.app-services = {
|
||||
|
||||
enable = mkEnableOption (lib.mdDoc "Service collection of DDE applications, including dconfig-center");
|
||||
enable = mkEnableOption (lib.mdDoc "service collection of DDE applications, including dconfig-center");
|
||||
|
||||
};
|
||||
|
||||
|
@ -15,8 +15,8 @@ with lib;
|
||||
services.deepin.dde-api = {
|
||||
|
||||
enable = mkEnableOption (lib.mdDoc ''
|
||||
Provides some dbus interfaces that is used for screen zone detecting,
|
||||
thumbnail generating, and sound playing in Deepin Desktop Environment.
|
||||
some dbus interfaces that is used for screen zone detecting,
|
||||
thumbnail generating, and sound playing in Deepin Desktop Environment
|
||||
'');
|
||||
|
||||
};
|
||||
|
@ -14,7 +14,7 @@ with lib;
|
||||
|
||||
services.deepin.dde-daemon = {
|
||||
|
||||
enable = mkEnableOption (lib.mdDoc "Daemon for handling the deepin session settings");
|
||||
enable = mkEnableOption (lib.mdDoc "daemon for handling the deepin session settings");
|
||||
|
||||
};
|
||||
|
||||
|
@ -24,8 +24,8 @@ in
|
||||
|
||||
options = {
|
||||
services.gnome.gnome-browser-connector.enable = mkEnableOption (mdDoc ''
|
||||
Native host connector for the GNOME Shell browser extension, a DBus service
|
||||
allowing to install GNOME Shell extensions from a web browser.
|
||||
native host connector for the GNOME Shell browser extension, a DBus service
|
||||
allowing to install GNOME Shell extensions from a web browser
|
||||
'');
|
||||
};
|
||||
|
||||
|
@ -7,7 +7,7 @@ in
|
||||
{
|
||||
options = {
|
||||
services.supergfxd = {
|
||||
enable = lib.mkEnableOption (lib.mdDoc "Enable the supergfxd service");
|
||||
enable = lib.mkEnableOption (lib.mdDoc "the supergfxd service");
|
||||
|
||||
settings = lib.mkOption {
|
||||
type = lib.types.nullOr json.type;
|
||||
|
@ -9,9 +9,9 @@ in
|
||||
{
|
||||
options = {
|
||||
hardware.tuxedo-rs = {
|
||||
enable = mkEnableOption (lib.mdDoc "Rust utilities for interacting with hardware from TUXEDO Computers.");
|
||||
enable = mkEnableOption (lib.mdDoc "Rust utilities for interacting with hardware from TUXEDO Computers");
|
||||
|
||||
tailor-gui.enable = mkEnableOption (lib.mdDoc "Alternative to TUXEDO Control Center, written in Rust.");
|
||||
tailor-gui.enable = mkEnableOption (lib.mdDoc "tailor-gui, an alternative to TUXEDO Control Center, written in Rust");
|
||||
};
|
||||
};
|
||||
|
||||
|
@ -302,7 +302,7 @@ in
|
||||
|
||||
enablePAM = mkEnableOption (lib.mdDoc "creating a own Dovecot PAM service and configure PAM user logins") // { default = true; };
|
||||
|
||||
enableDHE = mkEnableOption (lib.mdDoc "enable ssl_dh and generation of primes for the key exchange") // { default = true; };
|
||||
enableDHE = mkEnableOption (lib.mdDoc "ssl_dh and generation of primes for the key exchange") // { default = true; };
|
||||
|
||||
sieveScripts = mkOption {
|
||||
type = types.attrsOf types.path;
|
||||
|
@ -260,7 +260,7 @@ in {
|
||||
};
|
||||
|
||||
serve = {
|
||||
enable = mkEnableOption (lib.mdDoc "Automatic nginx and uwsgi setup for mailman-web");
|
||||
enable = mkEnableOption (lib.mdDoc "automatic nginx and uwsgi setup for mailman-web");
|
||||
|
||||
virtualRoot = mkOption {
|
||||
default = "/";
|
||||
@ -592,7 +592,7 @@ in {
|
||||
# Since the mailman-web settings.py obstinately creates a logs
|
||||
# dir in the cwd, change to the (writable) runtime directory before
|
||||
# starting uwsgi.
|
||||
ExecStart = "${pkgs.coreutils}/bin/env -C $RUNTIME_DIRECTORY ${pkgs.uwsgi.override { plugins = ["python3"]; }}/bin/uwsgi --json ${uwsgiConfigFile}";
|
||||
ExecStart = "${pkgs.coreutils}/bin/env -C $RUNTIME_DIRECTORY ${pkgs.uwsgi.override { plugins = ["python3"]; python3 = webEnv.python; }}/bin/uwsgi --json ${uwsgiConfigFile}";
|
||||
User = cfg.webUser;
|
||||
Group = "mailman";
|
||||
RuntimeDirectory = "mailman-uwsgi";
|
||||
|
@ -96,8 +96,8 @@ in
|
||||
type = types.submodule {
|
||||
options = {
|
||||
enable = mkEnableOption (lib.mdDoc ''
|
||||
If true, accessToken is ignored and the username/password below will be
|
||||
used instead. The access token of the bot will be stored in the dataPath.
|
||||
ignoring the accessToken. If true, accessToken is ignored and the username/password below will be
|
||||
used instead. The access token of the bot will be stored in the dataPath
|
||||
'');
|
||||
|
||||
username = mkOption {
|
||||
|
@ -111,11 +111,11 @@ in
|
||||
(submodule {
|
||||
options = {
|
||||
enable = mkEnableOption (lib.mdDoc ''
|
||||
building of firmware for manual flashing.
|
||||
building of firmware for manual flashing
|
||||
'');
|
||||
enableKlipperFlash = mkEnableOption (lib.mdDoc ''
|
||||
flashings scripts for firmware. This will add `klipper-flash-$mcu` scripts to your environment which can be called to flash the firmware.
|
||||
Please check the configs at [klipper](https://github.com/Klipper3d/klipper/tree/master/config) whether your board supports flashing via `make flash`.
|
||||
Please check the configs at [klipper](https://github.com/Klipper3d/klipper/tree/master/config) whether your board supports flashing via `make flash`
|
||||
'');
|
||||
serial = mkOption {
|
||||
type = types.nullOr path;
|
||||
|
@ -40,9 +40,9 @@ in
|
||||
|
||||
options.services.packagekit = {
|
||||
enable = mkEnableOption (lib.mdDoc ''
|
||||
PackageKit provides a cross-platform D-Bus abstraction layer for
|
||||
PackageKit, a cross-platform D-Bus abstraction layer for
|
||||
installing software. Software utilizing PackageKit can install
|
||||
software regardless of the package manager.
|
||||
software regardless of the package manager
|
||||
'');
|
||||
|
||||
settings = mkOption {
|
||||
|
@ -12,7 +12,7 @@ let
|
||||
in
|
||||
{
|
||||
options.services.rshim = {
|
||||
enable = lib.mkEnableOption (lib.mdDoc "User-space rshim driver for the BlueField SoC");
|
||||
enable = lib.mkEnableOption (lib.mdDoc "user-space rshim driver for the BlueField SoC");
|
||||
|
||||
package = lib.mkPackageOptionMD pkgs "rshim-user-space" { };
|
||||
|
||||
|
@ -438,7 +438,7 @@ in
|
||||
};
|
||||
|
||||
options."lists.sr.ht" = commonServiceSettings "lists" // {
|
||||
allow-new-lists = mkEnableOption (lib.mdDoc "Allow creation of new lists");
|
||||
allow-new-lists = mkEnableOption (lib.mdDoc "creation of new lists");
|
||||
notify-from = mkOption {
|
||||
description = lib.mdDoc "Outgoing email for notifications generated by users.";
|
||||
type = types.str;
|
||||
|
@ -9,7 +9,7 @@ in {
|
||||
|
||||
options = {
|
||||
services.tp-auto-kbbl = {
|
||||
enable = mkEnableOption (lib.mdDoc "Auto toggle keyboard back-lighting on Thinkpads (and maybe other laptops) for Linux");
|
||||
enable = mkEnableOption (lib.mdDoc "auto toggle keyboard back-lighting on Thinkpads (and maybe other laptops) for Linux");
|
||||
|
||||
package = mkOption {
|
||||
type = types.package;
|
||||
|
@ -67,14 +67,14 @@ in {
|
||||
options = {
|
||||
services.zoneminder = with lib; {
|
||||
enable = lib.mkEnableOption (lib.mdDoc ''
|
||||
ZoneMinder
|
||||
ZoneMinder.
|
||||
|
||||
If you intend to run the database locally, you should set
|
||||
`config.services.zoneminder.database.createLocally` to true. Otherwise,
|
||||
when set to `false` (the default), you will have to create the database
|
||||
and database user as well as populate the database yourself.
|
||||
Additionally, you will need to run `zmupdate.pl` yourself when
|
||||
upgrading to a newer version.
|
||||
upgrading to a newer version
|
||||
'');
|
||||
|
||||
webserver = mkOption {
|
||||
|
@ -11,10 +11,10 @@ in {
|
||||
|
||||
# the upstream package runs as root, but doesn't seem to be strictly
|
||||
# necessary for basic functionality
|
||||
runAsRoot = mkEnableOption (lib.mdDoc "Whether to run as root");
|
||||
runAsRoot = mkEnableOption (lib.mdDoc "running as root");
|
||||
|
||||
autoRetirement = mkEnableOption (lib.mdDoc ''
|
||||
Whether to automatically retire the host upon OS shutdown.
|
||||
retiring the host upon OS shutdown
|
||||
'');
|
||||
|
||||
apiKeyFile = mkOption {
|
||||
@ -59,7 +59,7 @@ in {
|
||||
};
|
||||
|
||||
options.diagnostic =
|
||||
mkEnableOption (lib.mdDoc "Collect memory usage for the agent itself");
|
||||
mkEnableOption (lib.mdDoc "collecting memory usage for the agent itself");
|
||||
};
|
||||
};
|
||||
};
|
||||
|
@ -11,7 +11,7 @@ in {
|
||||
({ options.warnings = options.warnings; options.assertions = options.assertions; })
|
||||
];
|
||||
extraOpts = {
|
||||
verbose = mkEnableOption (lib.mdDoc "Verbose logging mode for prometheus-wireguard-exporter");
|
||||
verbose = mkEnableOption (lib.mdDoc "verbose logging mode for prometheus-wireguard-exporter");
|
||||
|
||||
wireguardConfig = mkOption {
|
||||
type = with types; nullOr (either path str);
|
||||
|
@ -177,13 +177,13 @@ in {
|
||||
|
||||
backup = {
|
||||
enable = mkEnableOption (lib.mdDoc ''
|
||||
Backup server role. When using OpenAFS built-in buserver, use in conjunction with the
|
||||
the backup server role. When using OpenAFS built-in buserver, use in conjunction with the
|
||||
`database` role to maintain the Backup
|
||||
Database. Normally only used in conjunction with tape storage
|
||||
or IBM's Tivoli Storage Manager.
|
||||
|
||||
For a modern backup server, enable this role and see
|
||||
{option}`enableFabs`.
|
||||
{option}`enableFabs`
|
||||
'');
|
||||
|
||||
enableFabs = mkEnableOption (lib.mdDoc ''
|
||||
|
@ -8,7 +8,7 @@ let
|
||||
in {
|
||||
options = {
|
||||
services.create_ap = {
|
||||
enable = mkEnableOption (lib.mdDoc "setup wifi hotspots using create_ap");
|
||||
enable = mkEnableOption (lib.mdDoc "setting up wifi hotspots using create_ap");
|
||||
settings = mkOption {
|
||||
type = with types; attrsOf (oneOf [ int bool str ]);
|
||||
default = {};
|
||||
|
@ -14,7 +14,7 @@ in
|
||||
options = {
|
||||
services.dae = with lib;{
|
||||
enable = mkEnableOption
|
||||
(mdDoc "A Linux high-performance transparent proxy solution based on eBPF");
|
||||
(mdDoc "dae, a Linux high-performance transparent proxy solution based on eBPF");
|
||||
|
||||
package = mkPackageOptionMD pkgs "dae" { };
|
||||
|
||||
@ -46,7 +46,7 @@ in
|
||||
openFirewall = mkOption {
|
||||
type = with types; submodule {
|
||||
options = {
|
||||
enable = mkEnableOption "enable";
|
||||
enable = mkEnableOption (mdDoc "opening {option}`port` in the firewall");
|
||||
port = mkOption {
|
||||
type = types.port;
|
||||
description = ''
|
||||
@ -91,7 +91,7 @@ in
|
||||
};
|
||||
|
||||
disableTxChecksumIpGeneric =
|
||||
mkEnableOption (mdDoc "See <https://github.com/daeuniverse/dae/issues/43>");
|
||||
mkEnableOption "" // { description = mdDoc "See <https://github.com/daeuniverse/dae/issues/43>"; };
|
||||
|
||||
};
|
||||
};
|
||||
|
@ -54,13 +54,13 @@ in
|
||||
description = "TCP port for the WebSocket.";
|
||||
};
|
||||
|
||||
openFirewall = lib.mkEnableOption "open up the service ports in the firewall";
|
||||
openFirewall = lib.mkEnableOption "opening up the service ports in the firewall";
|
||||
|
||||
allowRebootSystem = lib.mkEnableOption "allow rebooting the system";
|
||||
allowRebootSystem = lib.mkEnableOption "rebooting the system";
|
||||
|
||||
allowRestartService = lib.mkEnableOption "allow killing/restarting processes";
|
||||
allowRestartService = lib.mkEnableOption "killing/restarting processes";
|
||||
|
||||
allowSetSystemTime = lib.mkEnableOption "allow setting the system time";
|
||||
allowSetSystemTime = lib.mkEnableOption "setting the system time";
|
||||
|
||||
extraArgs = lib.mkOption {
|
||||
type = lib.types.listOf lib.types.str;
|
||||
|
@ -9,7 +9,7 @@ let
|
||||
configFile = settingsFormat.generate "config.yaml" cfg.config;
|
||||
in {
|
||||
options.services.go-neb = {
|
||||
enable = mkEnableOption (lib.mdDoc "Extensible matrix bot written in Go");
|
||||
enable = mkEnableOption (lib.mdDoc "an extensible matrix bot written in Go");
|
||||
|
||||
bindAddress = mkOption {
|
||||
type = types.str;
|
||||
|
@ -116,10 +116,10 @@ in {
|
||||
options = {
|
||||
services.hostapd = {
|
||||
enable = mkEnableOption (mdDoc ''
|
||||
Whether to enable hostapd. hostapd is a user space daemon for access point and
|
||||
hostapd, a user space daemon for access point and
|
||||
authentication servers. It implements IEEE 802.11 access point management,
|
||||
IEEE 802.1X/WPA/WPA2/EAP Authenticators, RADIUS client, EAP server, and RADIUS
|
||||
authentication server.
|
||||
authentication server
|
||||
'');
|
||||
|
||||
package = mkPackageOption pkgs "hostapd" {};
|
||||
|
@ -272,18 +272,18 @@ in
|
||||
};
|
||||
|
||||
faxcron.enable.spoolInit = mkEnableOption (lib.mdDoc ''
|
||||
Purge old files from the spooling area with
|
||||
purging old files from the spooling area with
|
||||
{file}`faxcron`
|
||||
each time the spooling area is initialized.
|
||||
each time the spooling area is initialized
|
||||
'');
|
||||
faxcron.enable.frequency = mkOption {
|
||||
type = nullOr nonEmptyStr;
|
||||
default = null;
|
||||
example = "daily";
|
||||
description = lib.mdDoc ''
|
||||
Purge old files from the spooling area with
|
||||
purging old files from the spooling area with
|
||||
{file}`faxcron` with the given frequency
|
||||
(see systemd.time(7)).
|
||||
(see systemd.time(7))
|
||||
'';
|
||||
};
|
||||
faxcron.infoDays = mkOption {
|
||||
|
@ -265,7 +265,7 @@ in
|
||||
'';
|
||||
};
|
||||
|
||||
logCLFTime = mkEnableOption (lib.mdDoc "Full CLF-formatted date and time to log");
|
||||
logCLFTime = mkEnableOption (lib.mdDoc "full CLF-formatted date and time to log");
|
||||
|
||||
address = mkOption {
|
||||
type = with types; nullOr str;
|
||||
@ -456,7 +456,7 @@ in
|
||||
'';
|
||||
};
|
||||
|
||||
trust.enable = mkEnableOption (lib.mdDoc "Explicit trust options");
|
||||
trust.enable = mkEnableOption (lib.mdDoc "explicit trust options");
|
||||
|
||||
trust.family = mkOption {
|
||||
type = with types; nullOr str;
|
||||
@ -474,7 +474,7 @@ in
|
||||
'';
|
||||
};
|
||||
|
||||
trust.hidden = mkEnableOption (lib.mdDoc "Router concealment");
|
||||
trust.hidden = mkEnableOption (lib.mdDoc "router concealment");
|
||||
|
||||
websocket = mkEndpointOpt "websockets" "127.0.0.1" 7666;
|
||||
|
||||
@ -552,7 +552,7 @@ in
|
||||
|
||||
proto.http = (mkEndpointOpt "http" "127.0.0.1" 7070) // {
|
||||
|
||||
auth = mkEnableOption (lib.mdDoc "Webconsole authentication");
|
||||
auth = mkEnableOption (lib.mdDoc "webconsole authentication");
|
||||
|
||||
user = mkOption {
|
||||
type = types.str;
|
||||
|
@ -7,7 +7,7 @@ in
|
||||
enable = mkEnableOption (lib.mdDoc "the openiscsi iscsi daemon");
|
||||
enableAutoLoginOut = mkEnableOption (lib.mdDoc ''
|
||||
automatic login and logout of all automatic targets.
|
||||
You probably do not want this.
|
||||
You probably do not want this
|
||||
'');
|
||||
discoverPortal = mkOption {
|
||||
type = nullOr str;
|
||||
|
@ -10,7 +10,7 @@ in
|
||||
};
|
||||
options = {
|
||||
services.nar-serve = {
|
||||
enable = mkEnableOption (lib.mdDoc "Serve NAR file contents via HTTP");
|
||||
enable = mkEnableOption (lib.mdDoc "serving NAR file contents via HTTP");
|
||||
|
||||
port = mkOption {
|
||||
type = types.port;
|
||||
|
@ -103,7 +103,7 @@ in
|
||||
'';
|
||||
};
|
||||
|
||||
networking.nftables.flushRuleset = mkEnableOption (lib.mdDoc "Flush the entire ruleset on each reload.");
|
||||
networking.nftables.flushRuleset = mkEnableOption (lib.mdDoc "flushing the entire ruleset on each reload");
|
||||
|
||||
networking.nftables.extraDeletions = mkOption {
|
||||
type = types.lines;
|
||||
|
@ -8,7 +8,7 @@ in
|
||||
{
|
||||
options = {
|
||||
services.snowflake-proxy = {
|
||||
enable = mkEnableOption (lib.mdDoc "System to defeat internet censorship");
|
||||
enable = mkEnableOption (lib.mdDoc "snowflake-proxy, a system to defeat internet censorship");
|
||||
|
||||
broker = mkOption {
|
||||
description = lib.mdDoc "Broker URL (default \"https://snowflake-broker.torproject.net/\")";
|
||||
|
@ -116,9 +116,9 @@ in
|
||||
};
|
||||
|
||||
persistentKeys = mkEnableOption (lib.mdDoc ''
|
||||
If enabled then keys will be generated once and Yggdrasil
|
||||
persistent keys. If enabled then keys will be generated once and Yggdrasil
|
||||
will retain the same IPv6 address when the service is
|
||||
restarted. Keys are stored at ${keysPath}.
|
||||
restarted. Keys are stored at ${keysPath}
|
||||
'');
|
||||
|
||||
extraArgs = mkOption {
|
||||
|
@ -11,7 +11,7 @@ let
|
||||
in
|
||||
{
|
||||
options.services.earlyoom = {
|
||||
enable = mkEnableOption (lib.mdDoc "Early out of memory killing");
|
||||
enable = mkEnableOption (lib.mdDoc "early out of memory killing");
|
||||
|
||||
freeMemThreshold = mkOption {
|
||||
type = types.ints.between 1 100;
|
||||
|
@ -13,7 +13,7 @@ in
|
||||
|
||||
WARNING: enabling this option (while convenient) should *not* be done on a
|
||||
machine where you do not trust the other users as it allows any other
|
||||
local user to DoS your session by spamming notifications.
|
||||
local user to DoS your session by spamming notifications
|
||||
'');
|
||||
};
|
||||
|
||||
|
@ -14,7 +14,7 @@ let
|
||||
in {
|
||||
options = {
|
||||
services.flexget = {
|
||||
enable = mkEnableOption (lib.mdDoc "Run FlexGet Daemon");
|
||||
enable = mkEnableOption (lib.mdDoc "FlexGet daemon");
|
||||
|
||||
package = mkPackageOptionMD pkgs "flexget" {};
|
||||
|
||||
|
@ -40,7 +40,7 @@ in
|
||||
};
|
||||
|
||||
allowVideoAccess = lib.mkEnableOption (lib.mdDoc ''
|
||||
Enable access to video devices like cameras on the system.
|
||||
access to video devices like cameras on the system
|
||||
'');
|
||||
};
|
||||
};
|
||||
|
@ -69,7 +69,7 @@ let
|
||||
in
|
||||
{
|
||||
options.services.cloudlog = with types; {
|
||||
enable = mkEnableOption (mdDoc "Whether to enable Cloudlog");
|
||||
enable = mkEnableOption (mdDoc "Cloudlog");
|
||||
dataDir = mkOption {
|
||||
type = str;
|
||||
default = "/var/lib/cloudlog";
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -7,7 +7,7 @@ in {
|
||||
|
||||
enable = mkEnableOption (lib.mdDoc "hledger-web service");
|
||||
|
||||
serveApi = mkEnableOption (lib.mdDoc "Serve only the JSON web API, without the web UI");
|
||||
serveApi = mkEnableOption (lib.mdDoc "serving only the JSON web API, without the web UI");
|
||||
|
||||
host = mkOption {
|
||||
type = types.str;
|
||||
|
@ -12,11 +12,11 @@ in {
|
||||
options = {
|
||||
services.isso = {
|
||||
enable = mkEnableOption (lib.mdDoc ''
|
||||
A commenting server similar to Disqus.
|
||||
isso, a commenting server similar to Disqus.
|
||||
|
||||
Note: The application's author suppose to run isso behind a reverse proxy.
|
||||
The embedded solution offered by NixOS is also only suitable for small installations
|
||||
below 20 requests per second.
|
||||
below 20 requests per second
|
||||
'');
|
||||
|
||||
settings = mkOption {
|
||||
|
@ -105,9 +105,9 @@ in
|
||||
type = bool;
|
||||
default = true;
|
||||
description = lib.mdDoc ''
|
||||
Whether to enable Jitsi Videobridge instance and configure it to connect to Prosody.
|
||||
Jitsi Videobridge instance and configure it to connect to Prosody.
|
||||
|
||||
Additional configuration is possible with {option}`services.jitsi-videobridge`.
|
||||
Additional configuration is possible with {option}`services.jitsi-videobridge`
|
||||
'';
|
||||
};
|
||||
|
||||
|
@ -8,9 +8,9 @@ in {
|
||||
options = {
|
||||
services.meme-bingo-web = {
|
||||
enable = mkEnableOption (mdDoc ''
|
||||
A web app for the meme bingo, rendered entirely on the web server and made interactive with forms.
|
||||
a web app for the meme bingo, rendered entirely on the web server and made interactive with forms.
|
||||
|
||||
Note: The application's author suppose to run meme-bingo-web behind a reverse proxy for SSL and HTTP/3.
|
||||
Note: The application's author suppose to run meme-bingo-web behind a reverse proxy for SSL and HTTP/3
|
||||
'');
|
||||
|
||||
package = mkOption {
|
||||
|
@ -4,7 +4,7 @@ with lib;
|
||||
let cfg = config.services.phylactery;
|
||||
in {
|
||||
options.services.phylactery = {
|
||||
enable = mkEnableOption (lib.mdDoc "Whether to enable Phylactery server");
|
||||
enable = mkEnableOption (lib.mdDoc "Phylactery server");
|
||||
|
||||
host = mkOption {
|
||||
type = types.str;
|
||||
|
@ -30,7 +30,7 @@ let
|
||||
in {
|
||||
options.services.snipe-it = {
|
||||
|
||||
enable = mkEnableOption (lib.mdDoc "A free open source IT asset/license management system");
|
||||
enable = mkEnableOption (lib.mdDoc "snipe-it, a free open source IT asset/license management system");
|
||||
|
||||
user = mkOption {
|
||||
default = "snipeit";
|
||||
|
@ -9,7 +9,7 @@ in
|
||||
options.services.zitadel =
|
||||
let inherit (lib) mkEnableOption mkOption mkPackageOption types;
|
||||
in {
|
||||
enable = mkEnableOption "ZITADEL, a user and identity access management platform.";
|
||||
enable = mkEnableOption "ZITADEL, a user and identity access management platform";
|
||||
|
||||
package = mkPackageOption pkgs "ZITADEL" { default = [ "zitadel" ]; };
|
||||
|
||||
|
@ -16,7 +16,7 @@ in
|
||||
options.services.keter = {
|
||||
enable = lib.mkEnableOption (lib.mdDoc ''keter, a web app deployment manager.
|
||||
Note that this module only support loading of webapps:
|
||||
Keep an old app running and swap the ports when the new one is booted.
|
||||
Keep an old app running and swap the ports when the new one is booted
|
||||
'');
|
||||
|
||||
root = lib.mkOption {
|
||||
|
@ -8,7 +8,7 @@ in
|
||||
|
||||
options.services.rustus = {
|
||||
|
||||
enable = mkEnableOption (lib.mdDoc "TUS protocol implementation in Rust.");
|
||||
enable = mkEnableOption (lib.mdDoc "TUS protocol implementation in Rust");
|
||||
|
||||
host = mkOption {
|
||||
type = types.str;
|
||||
|
@ -15,7 +15,7 @@ in
|
||||
options = {
|
||||
|
||||
services.xserver.desktopManager.deepin = {
|
||||
enable = mkEnableOption (lib.mdDoc "Enable Deepin desktop manager");
|
||||
enable = mkEnableOption (lib.mdDoc "Deepin desktop manager");
|
||||
extraGSettingsOverrides = mkOption {
|
||||
default = "";
|
||||
type = types.lines;
|
||||
|
@ -79,7 +79,7 @@ in
|
||||
// { default = true; internal = true; };
|
||||
enableValidation = lib.mkEnableOption (lib.mdDoc ''the validation of bootspec documents for each build.
|
||||
This will introduce Go in the build-time closure as we are relying on [Cuelang](https://cuelang.org/) for schema validation.
|
||||
Enable this option if you want to ascertain that your documents are correct.
|
||||
Enable this option if you want to ascertain that your documents are correct
|
||||
''
|
||||
);
|
||||
|
||||
|
@ -599,7 +599,9 @@ while (my ($unit, $state) = each(%{$active_cur})) {
|
||||
$units_to_start{$unit} = 1;
|
||||
record_unit($start_list_file, $unit);
|
||||
# Don't spam the user with target units that always get started.
|
||||
$units_to_filter{$unit} = 1;
|
||||
if (($ENV{"STC_DISPLAY_ALL_UNITS"} // "") ne "1") {
|
||||
$units_to_filter{$unit} = 1;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -12,7 +12,7 @@ with lib;
|
||||
];
|
||||
|
||||
options = {
|
||||
boot.growPartition = mkEnableOption (lib.mdDoc "grow the root partition on boot");
|
||||
boot.growPartition = mkEnableOption (lib.mdDoc "growing the root partition on boot");
|
||||
};
|
||||
|
||||
config = mkIf config.boot.growPartition {
|
||||
|
@ -12,7 +12,7 @@ in
|
||||
};
|
||||
|
||||
options.boot.loader.external = {
|
||||
enable = mkEnableOption (lib.mdDoc "use an external tool to install your bootloader");
|
||||
enable = mkEnableOption (lib.mdDoc "using an external tool to install your bootloader");
|
||||
|
||||
installHook = mkOption {
|
||||
type = with types; path;
|
||||
|
@ -5,7 +5,7 @@ let
|
||||
in
|
||||
{
|
||||
options.services.homed.enable = lib.mkEnableOption (lib.mdDoc ''
|
||||
Enable systemd home area/user account manager
|
||||
systemd home area/user account manager
|
||||
'');
|
||||
|
||||
config = lib.mkIf cfg.enable {
|
||||
|
@ -5,7 +5,7 @@ let
|
||||
in
|
||||
{
|
||||
options.services.userdbd.enable = lib.mkEnableOption (lib.mdDoc ''
|
||||
Enables the systemd JSON user/group record lookup service
|
||||
the systemd JSON user/group record lookup service
|
||||
'');
|
||||
config = lib.mkIf cfg.enable {
|
||||
systemd.additionalUpstreamSystemUnits = [
|
||||
|
@ -8,20 +8,22 @@ import ./make-test-python.nix ({ pkgs, lib, ... }:
|
||||
|
||||
nodes = {
|
||||
hedgedocSqlite = { ... }: {
|
||||
services = {
|
||||
hedgedoc = {
|
||||
enable = true;
|
||||
settings.dbURL = "sqlite:///var/lib/hedgedoc/hedgedoc.db";
|
||||
};
|
||||
};
|
||||
services.hedgedoc.enable = true;
|
||||
};
|
||||
|
||||
hedgedocPostgres = { ... }: {
|
||||
hedgedocPostgresWithTCPSocket = { ... }: {
|
||||
systemd.services.hedgedoc.after = [ "postgresql.service" ];
|
||||
services = {
|
||||
hedgedoc = {
|
||||
enable = true;
|
||||
settings.dbURL = "postgres://hedgedoc:\${DB_PASSWORD}@localhost:5432/hedgedocdb";
|
||||
settings.db = {
|
||||
dialect = "postgres";
|
||||
user = "hedgedoc";
|
||||
password = "$DB_PASSWORD";
|
||||
host = "localhost";
|
||||
port = 5432;
|
||||
database = "hedgedocdb";
|
||||
};
|
||||
|
||||
/*
|
||||
* Do not use pkgs.writeText for secrets as
|
||||
@ -40,6 +42,33 @@ import ./make-test-python.nix ({ pkgs, lib, ... }:
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
hedgedocPostgresWithUNIXSocket = { ... }: {
|
||||
systemd.services.hedgedoc.after = [ "postgresql.service" ];
|
||||
services = {
|
||||
hedgedoc = {
|
||||
enable = true;
|
||||
settings.db = {
|
||||
dialect = "postgres";
|
||||
user = "hedgedoc";
|
||||
password = "$DB_PASSWORD";
|
||||
host = "/run/postgresql";
|
||||
database = "hedgedocdb";
|
||||
};
|
||||
|
||||
environmentFile = pkgs.writeText "hedgedoc-env" ''
|
||||
DB_PASSWORD=snakeoilpassword
|
||||
'';
|
||||
};
|
||||
postgresql = {
|
||||
enable = true;
|
||||
initialScript = pkgs.writeText "pg-init-script.sql" ''
|
||||
CREATE ROLE hedgedoc LOGIN PASSWORD 'snakeoilpassword';
|
||||
CREATE DATABASE hedgedocdb OWNER hedgedoc;
|
||||
'';
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
testScript = ''
|
||||
@ -50,11 +79,18 @@ import ./make-test-python.nix ({ pkgs, lib, ... }:
|
||||
hedgedocSqlite.wait_for_open_port(3000)
|
||||
hedgedocSqlite.wait_until_succeeds("curl -sSf http://localhost:3000/new")
|
||||
|
||||
with subtest("HedgeDoc postgres"):
|
||||
hedgedocPostgres.wait_for_unit("postgresql.service")
|
||||
hedgedocPostgres.wait_for_unit("hedgedoc.service")
|
||||
hedgedocPostgres.wait_for_open_port(5432)
|
||||
hedgedocPostgres.wait_for_open_port(3000)
|
||||
hedgedocPostgres.wait_until_succeeds("curl -sSf http://localhost:3000/new")
|
||||
with subtest("HedgeDoc postgres with TCP socket"):
|
||||
hedgedocPostgresWithTCPSocket.wait_for_unit("postgresql.service")
|
||||
hedgedocPostgresWithTCPSocket.wait_for_unit("hedgedoc.service")
|
||||
hedgedocPostgresWithTCPSocket.wait_for_open_port(5432)
|
||||
hedgedocPostgresWithTCPSocket.wait_for_open_port(3000)
|
||||
hedgedocPostgresWithTCPSocket.wait_until_succeeds("curl -sSf http://localhost:3000/new")
|
||||
|
||||
with subtest("HedgeDoc postgres with UNIX socket"):
|
||||
hedgedocPostgresWithUNIXSocket.wait_for_unit("postgresql.service")
|
||||
hedgedocPostgresWithUNIXSocket.wait_for_unit("hedgedoc.service")
|
||||
hedgedocPostgresWithUNIXSocket.wait_for_open_port(5432)
|
||||
hedgedocPostgresWithUNIXSocket.wait_for_open_port(3000)
|
||||
hedgedocPostgresWithUNIXSocket.wait_until_succeeds("curl -sSf http://localhost:3000/new")
|
||||
'';
|
||||
})
|
||||
|
@ -33,14 +33,14 @@ let
|
||||
in
|
||||
stdenv.mkDerivation rec {
|
||||
pname = if withGui then "bitcoin" else "bitcoind";
|
||||
version = "25.0";
|
||||
version = "25.1";
|
||||
|
||||
src = fetchurl {
|
||||
urls = [
|
||||
"https://bitcoincore.org/bin/bitcoin-core-${version}/bitcoin-${version}.tar.gz"
|
||||
];
|
||||
# hash retrieved from signed SHA256SUMS
|
||||
sha256 = "5df67cf42ca3b9a0c38cdafec5bbb517da5b58d251f32c8d2a47511f9be1ebc2";
|
||||
sha256 = "bec2a598d8dfa8c2365b77f13012a733ec84b8c30386343b7ac1996e901198c9";
|
||||
};
|
||||
|
||||
nativeBuildInputs =
|
||||
|
@ -14,6 +14,7 @@
|
||||
, rustPlatform
|
||||
, Security
|
||||
, sqlite
|
||||
, rust-jemalloc-sys
|
||||
, stdenv
|
||||
, SystemConfiguration
|
||||
, testers
|
||||
@ -70,6 +71,7 @@ rustPlatform.buildRustPackage rec {
|
||||
|
||||
buildInputs = [
|
||||
sqlite
|
||||
rust-jemalloc-sys
|
||||
] ++ lib.optionals stdenv.isDarwin [
|
||||
CoreFoundation
|
||||
Security
|
||||
|
@ -2,6 +2,7 @@
|
||||
, lib
|
||||
, protobuf
|
||||
, rocksdb
|
||||
, rust-jemalloc-sys-unprefixed
|
||||
, rustPlatform
|
||||
, rustc-wasm32
|
||||
, stdenv
|
||||
@ -60,7 +61,9 @@ rustPlatform.buildRustPackage rec {
|
||||
rustc-wasm32.llvmPackages.lld
|
||||
];
|
||||
|
||||
buildInputs = lib.optionals stdenv.isDarwin [ Security SystemConfiguration ];
|
||||
buildInputs = [
|
||||
rust-jemalloc-sys-unprefixed
|
||||
] ++ lib.optionals stdenv.isDarwin [ Security SystemConfiguration ];
|
||||
|
||||
# NOTE: we need to force lld otherwise rust-lld is not found for wasm32 target
|
||||
CARGO_TARGET_WASM32_UNKNOWN_UNKNOWN_LINKER = "lld";
|
||||
|
@ -2,16 +2,16 @@
|
||||
|
||||
rustPlatform.buildRustPackage rec {
|
||||
pname = "hexdino";
|
||||
version = "0.1.2";
|
||||
version = "0.1.3";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "Luz";
|
||||
repo = pname;
|
||||
rev = version;
|
||||
sha256 = "sha256-OFtOa6StpOuLgkULnY5MlqDcSTEiMxogowHIBEiGr4E=";
|
||||
hash = "sha256-glbyftCJiP0/5trW7DOcVCU2q4ZH3zFK96eyGuYR8eY=";
|
||||
};
|
||||
|
||||
cargoSha256 = "sha256-lvLiRQNH3rpu+JTXWhQtXczmGRWGtnnLDknZaMp3d0s=";
|
||||
cargoHash = "sha256-nldA8gDMj0iO+HgatiuMqzR6ZCjbxFsTp5pDGbFKA1k=";
|
||||
|
||||
meta = with lib; {
|
||||
description = "A hex editor with vim like keybindings written in Rust";
|
||||
|
@ -7,13 +7,13 @@
|
||||
|
||||
stdenv.mkDerivation (finalAttrs: {
|
||||
pname = "tecoc";
|
||||
version = "unstable-2023-04-21";
|
||||
version = "unstable-2023-06-21";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "blakemcbride";
|
||||
repo = "TECOC";
|
||||
rev = "021d1d15242b9d6c84d70c9ffcf1871793898f0a";
|
||||
hash = "sha256-VGIO+uiAZkdzLYmJztmnKTS4HDIVow4AimaneHj7E1M=";
|
||||
rev = "b4a96395a18c7e64ccaef0e25fdde3b7ef33ac4b";
|
||||
hash = "sha256-KTOGsTtxJh2sneU2VoDNUHcL3m8zt+3rBZTDvK1n02A=";
|
||||
};
|
||||
|
||||
buildInputs = [ ncurses ];
|
||||
|
@ -86,7 +86,7 @@ let
|
||||
owner = "OctoPrint";
|
||||
repo = "OctoPrint";
|
||||
rev = version;
|
||||
hash = "sha256-SYN/BrcukHMDwk70XGu/pO45fSPr/KOEyd4wxtz2Fo0=";
|
||||
hash = "sha256-71uE8JvcS++xH8WSVWj5x0+9s3XIwf3A64c6YtxpSRc=";
|
||||
};
|
||||
|
||||
propagatedBuildInputs = with self; [
|
||||
@ -114,7 +114,6 @@ let
|
||||
netifaces
|
||||
octoprint-filecheck
|
||||
octoprint-firmwarecheck
|
||||
octoprint-pisupport
|
||||
passlib
|
||||
pathvalidate
|
||||
pkginfo
|
||||
@ -142,6 +141,8 @@ let
|
||||
pydantic
|
||||
] ++ lib.optionals stdenv.isDarwin [
|
||||
py.pkgs.appdirs
|
||||
] ++ lib.optionals (!stdenv.isDarwin) [
|
||||
octoprint-pisupport
|
||||
];
|
||||
|
||||
nativeCheckInputs = with self; [
|
||||
|
@ -148,36 +148,39 @@ let
|
||||
else throw "no chromium Rosetta Stone entry for os: ${platform.config}";
|
||||
};
|
||||
|
||||
recompressTarball = { version, sha256 ? "" }: fetchzip {
|
||||
name = "chromium-${version}.tar.zstd";
|
||||
url = "https://commondatastorage.googleapis.com/chromium-browser-official/chromium-${version}.tar.xz";
|
||||
inherit sha256;
|
||||
|
||||
nativeBuildInputs = [ zstd ];
|
||||
|
||||
postFetch = ''
|
||||
echo removing unused code from tarball to stay under hydra limit
|
||||
rm -r $out/third_party/{rust-src,llvm}
|
||||
|
||||
echo moving remains out of \$out
|
||||
mv $out source
|
||||
|
||||
echo recompressing final contents into new tarball
|
||||
# try to make a deterministic tarball
|
||||
tar \
|
||||
--use-compress-program "zstd -T$NIX_BUILD_CORES" \
|
||||
--sort name \
|
||||
--mtime 1970-01-01 \
|
||||
--owner=root --group=root \
|
||||
--numeric-owner --mode=go=rX,u+rw,a-s \
|
||||
-cf $out source
|
||||
'';
|
||||
};
|
||||
|
||||
|
||||
base = rec {
|
||||
pname = "${packageName}-unwrapped";
|
||||
inherit (upstream-info) version;
|
||||
inherit packageName buildType buildPath;
|
||||
|
||||
src = fetchzip {
|
||||
name = "chromium-${version}.tar.zstd";
|
||||
url = "https://commondatastorage.googleapis.com/chromium-browser-official/chromium-${version}.tar.xz";
|
||||
inherit (upstream-info) sha256;
|
||||
|
||||
nativeBuildInputs = [ zstd ];
|
||||
|
||||
postFetch = ''
|
||||
echo removing unused code from tarball to stay under hydra limit
|
||||
rm -r $out/third_party/{rust-src,llvm}
|
||||
|
||||
echo moving remains out of \$out
|
||||
mv $out source
|
||||
|
||||
echo recompressing final contents into new tarball
|
||||
# try to make a deterministic tarball
|
||||
tar \
|
||||
--use-compress-program "zstd -T$NIX_BUILD_CORES" \
|
||||
--sort name \
|
||||
--mtime 1970-01-01 \
|
||||
--owner=root --group=root \
|
||||
--numeric-owner --mode=go=rX,u+rw,a-s \
|
||||
-cf $out source
|
||||
'';
|
||||
};
|
||||
src = recompressTarball { inherit version; inherit (upstream-info) sha256; };
|
||||
|
||||
nativeBuildInputs = [
|
||||
ninja pkg-config
|
||||
@ -486,6 +489,7 @@ let
|
||||
chromiumDeps = {
|
||||
gn = gnChromium;
|
||||
};
|
||||
inherit recompressTarball;
|
||||
};
|
||||
}
|
||||
# overwrite `version` with the exact same `version` from the same source,
|
||||
|
@ -21,12 +21,11 @@ from urllib.request import urlopen
|
||||
|
||||
RELEASES_URL = 'https://versionhistory.googleapis.com/v1/chrome/platforms/linux/channels/all/versions/all/releases'
|
||||
DEB_URL = 'https://dl.google.com/linux/chrome/deb/pool/main/g'
|
||||
BUCKET_URL = 'https://commondatastorage.googleapis.com/chromium-browser-official'
|
||||
|
||||
PIN_PATH = dirname(abspath(__file__)) + '/upstream-info.nix'
|
||||
UNGOOGLED_FLAGS_PATH = dirname(abspath(__file__)) + '/ungoogled-flags.toml'
|
||||
COMMIT_MESSAGE_SCRIPT = dirname(abspath(__file__)) + '/get-commit-message.py'
|
||||
|
||||
NIXPKGS_PATH = subprocess.check_output(["git", "rev-parse", "--show-toplevel"], cwd=dirname(PIN_PATH)).strip()
|
||||
|
||||
def load_as_json(path):
|
||||
"""Loads the given nix file as JSON."""
|
||||
@ -41,6 +40,23 @@ def save_dict_as_nix(path, input):
|
||||
with open(path, 'w') as out:
|
||||
out.write(formatted.decode())
|
||||
|
||||
def prefetch_src_sri_hash(attr_path, version):
|
||||
"""Prefetches the fixed-output-derivation source tarball and returns its SRI-Hash."""
|
||||
print(f'nix-build (FOD prefetch) {attr_path} {version}')
|
||||
out = subprocess.run(
|
||||
["nix-build", "--expr", f'(import ./. {{}}).{attr_path}.browser.passthru.recompressTarball {{ version = "{version}"; }}'],
|
||||
cwd=NIXPKGS_PATH,
|
||||
stderr=subprocess.PIPE
|
||||
).stderr.decode()
|
||||
|
||||
for line in iter(out.split("\n")):
|
||||
match = re.match(r"\s+got:\s+(.+)$", line)
|
||||
if match:
|
||||
print(f'Hash: {match.group(1)}')
|
||||
return match.group(1)
|
||||
print(f'{out}\n\nError: Expected hash in nix-build stderr output.', file=sys.stderr)
|
||||
sys.exit(1)
|
||||
|
||||
def nix_prefetch_url(url, algo='sha256'):
|
||||
"""Prefetches the content of the given URL."""
|
||||
print(f'nix-prefetch-url {url}')
|
||||
@ -206,7 +222,10 @@ with urlopen(RELEASES_URL) as resp:
|
||||
google_chrome_suffix = channel_name
|
||||
|
||||
try:
|
||||
channel['sha256'] = nix_prefetch_url(f'{BUCKET_URL}/chromium-{release["version"]}.tar.xz')
|
||||
channel['sha256'] = prefetch_src_sri_hash(
|
||||
channel_name_to_attr_name(channel_name),
|
||||
release["version"]
|
||||
)
|
||||
channel['sha256bin64'] = nix_prefetch_url(
|
||||
f'{DEB_URL}/google-chrome-{google_chrome_suffix}/' +
|
||||
f'google-chrome-{google_chrome_suffix}_{release["version"]}-1_amd64.deb')
|
||||
|
@ -41,9 +41,9 @@
|
||||
version = "2023-08-10";
|
||||
};
|
||||
};
|
||||
sha256 = "1g8rllmnmhmmpjzrmi3cww0nszxicq0kim2wd0l0ip2mzk2p8qlp";
|
||||
sha256bin64 = "1bq170l0g9yq17x6xlg6fjar6gv3hdi0zijwmx4s02pmw6727484";
|
||||
version = "118.0.5993.70";
|
||||
sha256 = "sha256-CTkw92TiRD2tkYu5a5dy8fjpR2MMOMCvcbxXhJ36Bp8=";
|
||||
sha256bin64 = "06rbsjh4khhl408181ns5nsdwasklb277fdjfajdv5h1j9a190k3";
|
||||
version = "118.0.5993.88";
|
||||
};
|
||||
ungoogled-chromium = {
|
||||
deps = {
|
||||
@ -54,12 +54,12 @@
|
||||
version = "2023-08-10";
|
||||
};
|
||||
ungoogled-patches = {
|
||||
rev = "118.0.5993.70-1";
|
||||
sha256 = "0k6684cy1ks6yba2bdz17g244f05qy9769cvis4h2jzhgbf5rysh";
|
||||
rev = "118.0.5993.88-1";
|
||||
sha256 = "17j47d64l97ascp85h8cnfnr5wr4va3bdk95wmagqss7ym5c7zsf";
|
||||
};
|
||||
};
|
||||
sha256 = "1g8rllmnmhmmpjzrmi3cww0nszxicq0kim2wd0l0ip2mzk2p8qlp";
|
||||
sha256bin64 = "1bq170l0g9yq17x6xlg6fjar6gv3hdi0zijwmx4s02pmw6727484";
|
||||
version = "118.0.5993.70";
|
||||
sha256 = "sha256-CTkw92TiRD2tkYu5a5dy8fjpR2MMOMCvcbxXhJ36Bp8=";
|
||||
sha256bin64 = "06rbsjh4khhl408181ns5nsdwasklb277fdjfajdv5h1j9a190k3";
|
||||
version = "118.0.5993.88";
|
||||
};
|
||||
}
|
||||
|
@ -2,13 +2,13 @@
|
||||
|
||||
buildGoModule rec {
|
||||
pname = "starboard";
|
||||
version = "0.15.15";
|
||||
version = "0.15.16";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "aquasecurity";
|
||||
repo = pname;
|
||||
rev = "v${version}";
|
||||
sha256 = "sha256-aKxRjPXvj9rGUheUjpjGWlzg9I6LaCxfc6FJV8Kzj3I=";
|
||||
sha256 = "sha256-n4gChQQMVdtEKW2WqQAEVtlU2fFxLxBem2yAJzDjx2Q=";
|
||||
# populate values that require us to use git. By doing this in postFetch we
|
||||
# can delete .git afterwards and maintain better reproducibility of the src.
|
||||
leaveDotGit = true;
|
||||
|
@ -2,13 +2,13 @@
|
||||
|
||||
buildGoModule rec {
|
||||
pname = "tektoncd-cli";
|
||||
version = "0.32.0";
|
||||
version = "0.32.1";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "tektoncd";
|
||||
repo = "cli";
|
||||
rev = "v${version}";
|
||||
sha256 = "sha256-Ilue0stXko8bkMMzXEHrdgJYIV5ZcI39hwFUya8X4ac=";
|
||||
sha256 = "sha256-qxKWyNQRWc0krdIfG6Mkn8ZZSkCkb0V41nIUsN5azGo=";
|
||||
};
|
||||
|
||||
vendorHash = null;
|
||||
|
@ -6,13 +6,13 @@
|
||||
|
||||
buildGoModule rec {
|
||||
pname = "terraform-backend-git";
|
||||
version = "0.1.5";
|
||||
version = "0.1.6";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "plumber-cd";
|
||||
repo = "terraform-backend-git";
|
||||
rev = "v${version}";
|
||||
hash = "sha256-ryHFuHIEJ4i1R3oBW3w3aAvtv+vIrO745qwx0+SqBF4=";
|
||||
hash = "sha256-ZbQfL7uKCFD98HcoeqscZaIsWFvWH0Ytzlqr6fMmXUs=";
|
||||
};
|
||||
|
||||
vendorHash = "sha256-Y/4UgG/2Vp+gxBnGrNpAgRNfPZWJXhVo8TVa/VfOYt0=";
|
||||
|
@ -1,52 +1,52 @@
|
||||
{ branch ? "stable", callPackage, fetchurl, lib, stdenv }:
|
||||
let
|
||||
versions = if stdenv.isLinux then {
|
||||
stable = "0.0.31";
|
||||
ptb = "0.0.49";
|
||||
canary = "0.0.170";
|
||||
development = "0.0.234";
|
||||
stable = "0.0.32";
|
||||
ptb = "0.0.51";
|
||||
canary = "0.0.171";
|
||||
development = "0.0.1";
|
||||
} else {
|
||||
stable = "0.0.280";
|
||||
ptb = "0.0.80";
|
||||
canary = "0.0.315";
|
||||
development = "0.0.8797";
|
||||
stable = "0.0.281";
|
||||
ptb = "0.0.82";
|
||||
canary = "0.0.320";
|
||||
development = "0.0.2";
|
||||
};
|
||||
version = versions.${branch};
|
||||
srcs = rec {
|
||||
x86_64-linux = {
|
||||
stable = fetchurl {
|
||||
url = "https://dl.discordapp.net/apps/linux/${version}/discord-${version}.tar.gz";
|
||||
hash = "sha256-toWwiMsEFsGaOYaPZziSmZtpzxGd9m+2MtxTrJwqFbw=";
|
||||
hash = "sha256-XeGDKRKnvDyl0AWm9Vs/PDeIfAq/FL9AsjLt+dNg1HQ=";
|
||||
};
|
||||
ptb = fetchurl {
|
||||
url = "https://dl-ptb.discordapp.net/apps/linux/${version}/discord-ptb-${version}.tar.gz";
|
||||
hash = "sha256-o8cDoBe6A0wBjVLjp4JXrv3QsG7TZ/Kj4+T5lj6WHdY=";
|
||||
hash = "sha256-VlvGZ5qy61zse0mhvrROYwr0C94Zy1Kh4D4dp+sJTN0=";
|
||||
};
|
||||
canary = fetchurl {
|
||||
url = "https://dl-canary.discordapp.net/apps/linux/${version}/discord-canary-${version}.tar.gz";
|
||||
hash = "sha256-Lw+qLAAwyoDBKDPOBA9HR79gcnqwTshFq6GMpFS0tXA=";
|
||||
hash = "sha256-NcmV+DPI5hfNdBUgoaOLsjG32QfjF+x7f01B6PR10Vc=";
|
||||
};
|
||||
development = fetchurl {
|
||||
url = "https://dl-development.discordapp.net/apps/linux/${version}/discord-development-${version}.tar.gz";
|
||||
hash = "sha256-R5UwgpXgb32mEohTzyRVXmumcgPl8UPan3UjmLFLxLo=";
|
||||
hash = "sha256-ogLOZZ9pTXB01TqdnmdORIzZ8GbGzskUzbG4E68gZwY=";
|
||||
};
|
||||
};
|
||||
x86_64-darwin = {
|
||||
stable = fetchurl {
|
||||
url = "https://dl.discordapp.net/apps/osx/${version}/Discord.dmg";
|
||||
hash = "sha256-SUbpzd8RIf+e+so/dXZh5OkjCvWRC+EyqgeIg4u32Hg=";
|
||||
hash = "sha256-Qxh9K0u99xfsVPJyAD3bFeZPxBXg2EeDyM+rbF80EC8=";
|
||||
};
|
||||
ptb = fetchurl {
|
||||
url = "https://dl-ptb.discordapp.net/apps/osx/${version}/DiscordPTB.dmg";
|
||||
hash = "sha256-IvrCjiZ5Oa616+U8C2ihg8THj7ePV2A8+82wUWqWoPY=";
|
||||
hash = "sha256-U99FiR3IUL8saGtVrWblWqsCIJc0rK5ZMII9/BL5H7w=";
|
||||
};
|
||||
canary = fetchurl {
|
||||
url = "https://dl-canary.discordapp.net/apps/osx/${version}/DiscordCanary.dmg";
|
||||
hash = "sha256-m43SijSBxcAvYAlSFpQKIFILUm4AgSQ5F4XyQJyftts=";
|
||||
hash = "sha256-7fPlb4x116HIXEJr1G7wVHriOQu6/2u69SpbU9qxHNw=";
|
||||
};
|
||||
development = fetchurl {
|
||||
url = "https://dl-development.discordapp.net/apps/osx/${version}/DiscordDevelopment.dmg";
|
||||
hash = "sha256-ra0El4Y7SqanY6ZBbHE1Y+pqel4OD7nXKKfg/vndULo=";
|
||||
hash = "sha256-iMw61dXtThXvz2GnZiM4+tURMRfXhrN/ze1RTBL6zy8=";
|
||||
};
|
||||
};
|
||||
aarch64-darwin = x86_64-darwin;
|
||||
|
@ -5,6 +5,7 @@
|
||||
, pkg-config
|
||||
, perl
|
||||
, openssl
|
||||
, rust-jemalloc-sys
|
||||
, python3
|
||||
, wrapQtAppsHook
|
||||
, qtbase
|
||||
@ -173,6 +174,7 @@ rec {
|
||||
|
||||
buildInputs = [
|
||||
openssl
|
||||
rust-jemalloc-sys
|
||||
];
|
||||
|
||||
postFixup = ''
|
||||
|
@ -110,6 +110,13 @@ stdenv.mkDerivation rec {
|
||||
url = "https://github.com/sagemath/sage/commit/d88bc3815c0901bfdeaa3e4a31107c084199f614.diff";
|
||||
sha256 = "sha256-dXaEwk2wXxmx02sCw4Vu9mF0ZrydhFD4LRwNAiQsPgM=";
|
||||
})
|
||||
|
||||
# https://github.com/sagemath/sage/pull/36279, landed in 10.2.beta4
|
||||
(fetchpatch {
|
||||
name = "matplotlib-3.8-upgrade.patch";
|
||||
url = "https://github.com/sagemath/sage/commit/0fcf88935908440930c5f79202155aca4ad57518.diff";
|
||||
sha256 = "sha256-mvqAHaTCXsxPv901L8HSTnrfghfXYdq0wfLoP/cYQZI=";
|
||||
})
|
||||
];
|
||||
|
||||
patches = nixPatches ++ bugfixPatches ++ packageUpgradePatches;
|
||||
|
@ -78,6 +78,7 @@
|
||||
, sphinx
|
||||
, sympy
|
||||
, typing-extensions
|
||||
, nbclassic
|
||||
}:
|
||||
|
||||
assert (!blas.isILP64) && (!lapack.isILP64);
|
||||
@ -181,6 +182,8 @@ buildPythonPackage rec {
|
||||
sphinx
|
||||
sympy
|
||||
typing-extensions
|
||||
|
||||
nbclassic
|
||||
];
|
||||
|
||||
preBuild = ''
|
||||
|
@ -20,11 +20,11 @@ let
|
||||
|
||||
in stdenv.mkDerivation rec {
|
||||
pname = "gromacs";
|
||||
version = "2023.2";
|
||||
version = "2023.3";
|
||||
|
||||
src = fetchurl {
|
||||
url = "ftp://ftp.gromacs.org/pub/gromacs/gromacs-${version}.tar.gz";
|
||||
sha256 = "sha256-vOFIByfksruQBBO3XZmjJm81B4d9pPWy1JHfeY+fza4=";
|
||||
sha256 = "sha256-Tsj40MevdrE/j9FtuOLBIOdJ3kOa6VVNn2U/gS140cs=";
|
||||
};
|
||||
|
||||
patches = [ ./pkgconfig.patch ];
|
||||
|
@ -10,7 +10,7 @@
|
||||
}:
|
||||
|
||||
let
|
||||
version = "5.12.161";
|
||||
version = "5.12.162";
|
||||
in
|
||||
rustPlatform.buildRustPackage {
|
||||
pname = "git-mit";
|
||||
@ -20,10 +20,10 @@ rustPlatform.buildRustPackage {
|
||||
owner = "PurpleBooth";
|
||||
repo = "git-mit";
|
||||
rev = "v${version}";
|
||||
hash = "sha256-r0gRBOf/CC4HDh/N4Qi1/3DkPuuNlqfbvl4o5JqobKE=";
|
||||
hash = "sha256-qwnzq1CKo7kJXITpPjKAhk1dbGSj6TXat7ioP7o3ifg=";
|
||||
};
|
||||
|
||||
cargoHash = "sha256-LgiO/wPoPjmxymcXl9zQ8n/xOnFfpravwpqEsUctxxw=";
|
||||
cargoHash = "sha256-AGE+zA5DHabqgzCC/T1DDG9bGPciSdl1euZbbCeKPzQ=";
|
||||
|
||||
nativeBuildInputs = [ pkg-config ];
|
||||
|
||||
|
@ -18,15 +18,15 @@
|
||||
|
||||
rustPlatform.buildRustPackage rec {
|
||||
pname = "stgit";
|
||||
version = "2.3.2";
|
||||
version = "2.4.0";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "stacked-git";
|
||||
repo = "stgit";
|
||||
rev = "v${version}";
|
||||
hash = "sha256-rQNX54zmVHZKplEUNaKyVtCrC8Q4DdxLzNSStiYvDGA=";
|
||||
hash = "sha256-+ipNSdEaz3nVBTYS+A4Fauan0DaKZR69No95FTS2/4o=";
|
||||
};
|
||||
cargoHash = "sha256-ju8JQnohidBsydwwm6gNx1L24brmDWYXwNgfCl7G/aA=";
|
||||
cargoHash = "sha256-G0g+53HWxhJfozMGByhmgnxws6P10FY9fAOleqhn+Mk=";
|
||||
|
||||
nativeBuildInputs = [
|
||||
pkg-config installShellFiles makeWrapper asciidoc xmlto docbook_xsl
|
||||
|
43
pkgs/by-name/km/kmsvnc/package.nix
Normal file
43
pkgs/by-name/km/kmsvnc/package.nix
Normal file
@ -0,0 +1,43 @@
|
||||
{ lib
|
||||
, stdenv
|
||||
, fetchFromGitHub
|
||||
, cmake
|
||||
, pkg-config
|
||||
, libdrm
|
||||
, libvncserver
|
||||
, libxkbcommon
|
||||
, libva
|
||||
}:
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
pname = "kmsvnc";
|
||||
version = "0.0.5";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "isjerryxiao";
|
||||
repo = "kmsvnc";
|
||||
rev = "v${version}";
|
||||
hash = "sha256-Dz1y4t8u9/rnmOiYMWMq6aEq3kV47uiIK7K4DSvjZNc=";
|
||||
};
|
||||
|
||||
nativeBuildInputs = [
|
||||
cmake
|
||||
pkg-config
|
||||
];
|
||||
|
||||
buildInputs = [
|
||||
libdrm
|
||||
libvncserver
|
||||
libxkbcommon
|
||||
libva
|
||||
];
|
||||
|
||||
meta = with lib; {
|
||||
description = "A VNC server for DRM/KMS capable GNU/Linux devices";
|
||||
homepage = "https://github.com/isjerryxiao/kmsvnc";
|
||||
license = licenses.gpl3Only;
|
||||
maintainers = with maintainers; [ nickcao ];
|
||||
mainProgram = "kmsvnc";
|
||||
platforms = platforms.linux;
|
||||
};
|
||||
}
|
61
pkgs/by-name/pg/pgmoneta/package.nix
Normal file
61
pkgs/by-name/pg/pgmoneta/package.nix
Normal file
@ -0,0 +1,61 @@
|
||||
{ lib
|
||||
, stdenv
|
||||
, bzip2
|
||||
, cjson
|
||||
, cmake
|
||||
, curl
|
||||
, docutils
|
||||
, fetchFromGitHub
|
||||
, libarchive
|
||||
, libev
|
||||
, libgccjit
|
||||
, libssh
|
||||
, lz4
|
||||
, openssl
|
||||
, systemd
|
||||
, zlib
|
||||
, zstd
|
||||
}:
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
pname = "pgmoneta";
|
||||
version = "0.7.0";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "pgmoneta";
|
||||
repo = "pgmoneta";
|
||||
rev = version;
|
||||
hash = "sha256-Acg60QFMmRTubYWkPxbHTciVOYoIWc3GZGQVauewZik=";
|
||||
};
|
||||
|
||||
nativeBuildInputs = [
|
||||
cmake
|
||||
docutils # for rst2man
|
||||
];
|
||||
|
||||
buildInputs = [
|
||||
bzip2
|
||||
cjson
|
||||
curl
|
||||
libarchive
|
||||
libev
|
||||
libgccjit
|
||||
libssh
|
||||
lz4
|
||||
openssl
|
||||
systemd
|
||||
zlib
|
||||
zstd
|
||||
];
|
||||
|
||||
env.NIX_CFLAGS_COMPILE = "-Wno-error";
|
||||
|
||||
meta = with lib; {
|
||||
description = "Backup / restore solution for PostgreSQL";
|
||||
homepage = "https://pgmoneta.github.io/";
|
||||
changelog = "https://github.com/pgmoneta/pgmoneta/releases/tag/${version}";
|
||||
license = licenses.bsd3;
|
||||
maintainers = [ maintainers.marsam ];
|
||||
platforms = platforms.linux;
|
||||
};
|
||||
}
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user