summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorgithub-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>2024-04-05 06:01:46 +0000
committerGitHub <noreply@github.com>2024-04-05 06:01:46 +0000
commit110bd4dbeef553a1190af1571b94a5d8b7a7114c (patch)
tree63d1ad4c0bc8f14dbb7063d20375cdf6482bbad0
parent2ff2fe727d50d8b8bd0ec8719ba4302f1eaa5e60 (diff)
parent9a0c25978d78416219718437fd7e618668d9ad74 (diff)
Merge staging-next into staging
-rw-r--r--README.md4
-rw-r--r--maintainers/maintainer-list.nix6
-rw-r--r--nixos/modules/module-list.nix1
-rw-r--r--nixos/modules/services/system/cloud-init.nix4
-rw-r--r--nixos/modules/services/web-apps/silverbullet.nix123
-rw-r--r--nixos/tests/all-tests.nix1
-rw-r--r--nixos/tests/silverbullet.nix47
-rw-r--r--pkgs/applications/audio/faustPhysicalModeling/default.nix4
-rw-r--r--pkgs/applications/audio/geonkick/default.nix4
-rw-r--r--pkgs/applications/audio/grandorgue/default.nix4
-rw-r--r--pkgs/applications/graphics/lightburn/default.nix4
-rw-r--r--pkgs/applications/misc/fspy/default.nix1
-rw-r--r--pkgs/applications/misc/keepassxc/default.nix2
-rw-r--r--pkgs/applications/misc/qlcplus/default.nix16
-rw-r--r--pkgs/applications/networking/browsers/microsoft-edge/browser.nix3
-rw-r--r--pkgs/applications/networking/browsers/vivaldi/default.nix6
-rw-r--r--pkgs/applications/networking/cluster/popeye/default.nix4
-rw-r--r--pkgs/applications/office/gnucash/default.nix6
-rw-r--r--pkgs/applications/science/electronics/kicad/base.nix2
-rw-r--r--pkgs/applications/version-management/ghq/default.nix6
-rw-r--r--pkgs/applications/video/freetube/default.nix4
-rw-r--r--pkgs/applications/video/kodi/addons/youtube/default.nix4
-rwxr-xr-xpkgs/build-support/dotnet/nuget-to-nix/nuget-to-nix.sh6
-rw-r--r--pkgs/build-support/pkg-config-wrapper/default.nix6
-rw-r--r--pkgs/by-name/bo/boxbuddy/package.nix6
-rw-r--r--pkgs/by-name/c2/c2fmzq/package.nix6
-rw-r--r--pkgs/by-name/ce/centerpiece/package.nix55
-rw-r--r--pkgs/by-name/da/daytona-bin/package.nix1
-rw-r--r--pkgs/by-name/di/dissent/package.nix4
-rw-r--r--pkgs/by-name/fo/folio/package.nix4
-rw-r--r--pkgs/by-name/gf/gfal2-util/package.nix2
-rw-r--r--pkgs/by-name/gf/gfal2/package.nix129
-rw-r--r--pkgs/by-name/gi/git-gr/package.nix17
-rw-r--r--pkgs/by-name/gp/gpscorrelate/package.nix (renamed from pkgs/applications/misc/gpscorrelate/default.nix)32
-rw-r--r--pkgs/by-name/kn/knossosnet/package.nix4
-rw-r--r--pkgs/by-name/ko/komac/package.nix45
-rw-r--r--pkgs/by-name/or/orchard/package.nix4
-rw-r--r--pkgs/by-name/pd/pdk/Gemfile.lock2
-rw-r--r--pkgs/by-name/re/renode-unstable/package.nix4
-rw-r--r--pkgs/by-name/re/restinio/package.nix29
-rw-r--r--pkgs/by-name/rn/rnd-name/package.nix33
-rw-r--r--pkgs/by-name/sa/satty/package.nix6
-rw-r--r--pkgs/by-name/si/silverbullet/package.nix39
-rw-r--r--pkgs/by-name/sp/spicetify-cli/package.nix4
-rw-r--r--pkgs/by-name/st/stirling-pdf/package.nix6
-rw-r--r--pkgs/by-name/tu/tuifimanager/package.nix (renamed from pkgs/applications/file-managers/tuifimanager/default.nix)4
-rw-r--r--pkgs/by-name/wi/wit-bindgen/package.nix6
-rw-r--r--pkgs/data/themes/where-is-my-sddm-theme/default.nix4
-rw-r--r--pkgs/development/cuda-modules/setup-hooks/auto-add-driver-runpath-hook.sh8
-rw-r--r--pkgs/development/cuda-modules/setup-hooks/auto-fix-elf-files.sh64
-rw-r--r--pkgs/development/cuda-modules/setup-hooks/extension.nix30
-rw-r--r--pkgs/development/libraries/armadillo/default.nix4
-rw-r--r--pkgs/development/libraries/hunspell/dictionaries-chromium.nix9
-rw-r--r--pkgs/development/libraries/ldb/default.nix4
-rw-r--r--pkgs/development/libraries/oneDNN/default.nix4
-rw-r--r--pkgs/development/python-modules/astropy/default.nix4
-rw-r--r--pkgs/development/python-modules/dirigera/default.nix35
-rw-r--r--pkgs/development/python-modules/gfal2-python/default.nix53
-rw-r--r--pkgs/development/python-modules/gfal2-util/default.nix103
-rw-r--r--pkgs/development/python-modules/gfal2-util/fetchgfal2.nix48
-rw-r--r--pkgs/development/python-modules/gfal2-util/gfal-util-script.patch19
-rw-r--r--pkgs/development/python-modules/hcloud/default.nix4
-rw-r--r--pkgs/development/python-modules/py-serializable/default.nix37
-rw-r--r--pkgs/development/r-modules/bioc-annotation-packages.nix4
-rw-r--r--pkgs/development/r-modules/bioc-experiment-packages.nix16
-rw-r--r--pkgs/development/r-modules/bioc-packages.nix382
-rw-r--r--pkgs/development/r-modules/cran-packages.nix5906
-rw-r--r--pkgs/development/r-modules/default.nix81
-rw-r--r--pkgs/development/r-modules/patches/universalmotif.patch10
-rw-r--r--pkgs/development/tools/azure-static-sites-client/versions.json48
-rw-r--r--pkgs/development/tools/continuous-integration/cirrus-cli/default.nix6
-rw-r--r--pkgs/development/tools/gci/default.nix4
-rw-r--r--pkgs/development/tools/language-servers/helm-ls/default.nix6
-rw-r--r--pkgs/development/tools/misc/lttng-tools/default.nix4
-rw-r--r--pkgs/development/tools/zed/default.nix4
-rw-r--r--pkgs/games/prismlauncher/wrapper.nix3
-rw-r--r--pkgs/os-specific/linux/firmware/sof-firmware/default.nix4
-rw-r--r--pkgs/os-specific/linux/libbpf/default.nix2
-rw-r--r--pkgs/servers/etcd/3.5/default.nix10
-rw-r--r--pkgs/servers/http/apache-httpd/2.4.nix19
-rw-r--r--pkgs/servers/peertube/default.nix4
-rw-r--r--pkgs/servers/prowlarr/default.nix10
-rw-r--r--pkgs/servers/readarr/default.nix8
-rw-r--r--pkgs/servers/samba/4.x.nix4
-rw-r--r--pkgs/servers/search/groonga/default.nix4
-rw-r--r--pkgs/shells/fish/plugins/wakatime-fish.nix4
-rw-r--r--pkgs/tools/admin/syft/default.nix32
-rw-r--r--pkgs/tools/bootloaders/refind/default.nix3
-rw-r--r--pkgs/tools/filesystems/mtdutils/default.nix4
-rw-r--r--pkgs/tools/misc/cyberchef/default.nix4
-rw-r--r--pkgs/tools/misc/fastfetch/default.nix8
-rw-r--r--pkgs/tools/misc/rmlint/default.nix5
-rw-r--r--pkgs/tools/security/pinentry/default.nix2
-rw-r--r--pkgs/tools/security/vals/default.nix6
-rw-r--r--pkgs/tools/system/thermald/default.nix6
-rw-r--r--pkgs/tools/text/fanficfare/default.nix4
-rw-r--r--pkgs/tools/virtualization/govc/default.nix4
-rw-r--r--pkgs/top-level/all-packages.nix10
-rw-r--r--pkgs/top-level/python-packages.nix6
99 files changed, 4466 insertions, 3311 deletions
diff --git a/README.md b/README.md
index 9d357c9a3887..5ba68bbd64bb 100644
--- a/README.md
+++ b/README.md
@@ -1,9 +1,9 @@
<p align="center">
<a href="https://nixos.org">
<picture>
- <source media="(prefers-color-scheme: light)" srcset="https://raw.githubusercontent.com/NixOS/nixos-homepage/master/logo/nixos-hires.png">
+ <source media="(prefers-color-scheme: light)" srcset="https://raw.githubusercontent.com/NixOS/nixos-homepage/main/public/logo/nixos-hires.png">
<source media="(prefers-color-scheme: dark)" srcset="https://raw.githubusercontent.com/NixOS/nixos-artwork/master/logo/nixos-white.png">
- <img src="https://raw.githubusercontent.com/NixOS/nixos-homepage/master/logo/nixos-hires.png" width="500px" alt="NixOS logo">
+ <img src="https://raw.githubusercontent.com/NixOS/nixos-homepage/main/public/logo/nixos-hires.png" width="500px" alt="NixOS logo">
</picture>
</a>
</p>
diff --git a/maintainers/maintainer-list.nix b/maintainers/maintainer-list.nix
index c75ec21c0398..3341cd595d47 100644
--- a/maintainers/maintainer-list.nix
+++ b/maintainers/maintainer-list.nix
@@ -1425,6 +1425,12 @@
githubId = 4194320;
name = "Anton Schirg";
};
+ aorith = {
+ email = "aomanu+nixpkgs@gmail.com";
+ github = "aorith";
+ githubId = 5411704;
+ name = "Manuel Sanchez Pinar";
+ };
apeschar = {
email = "albert@peschar.net";
github = "apeschar";
diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix
index e07295b4ba51..d4e0e689e28c 100644
--- a/nixos/modules/module-list.nix
+++ b/nixos/modules/module-list.nix
@@ -1389,6 +1389,7 @@
./services/web-apps/rss-bridge.nix
./services/web-apps/selfoss.nix
./services/web-apps/shiori.nix
+ ./services/web-apps/silverbullet.nix
./services/web-apps/slskd.nix
./services/web-apps/snipe-it.nix
./services/web-apps/sogo.nix
diff --git a/nixos/modules/services/system/cloud-init.nix b/nixos/modules/services/system/cloud-init.nix
index 00ae77be4271..e6288270c8e2 100644
--- a/nixos/modules/services/system/cloud-init.nix
+++ b/nixos/modules/services/system/cloud-init.nix
@@ -204,7 +204,7 @@ in
description = "Apply the settings specified in cloud-config";
wantedBy = [ "multi-user.target" ];
wants = [ "network-online.target" ];
- after = [ "network-online.target" "syslog.target" "cloud-config.target" ];
+ after = [ "network-online.target" "cloud-config.target" ];
path = path;
serviceConfig = {
@@ -220,7 +220,7 @@ in
description = "Execute cloud user/final scripts";
wantedBy = [ "multi-user.target" ];
wants = [ "network-online.target" ];
- after = [ "network-online.target" "syslog.target" "cloud-config.service" "rc-local.service" ];
+ after = [ "network-online.target" "cloud-config.service" "rc-local.service" ];
requires = [ "cloud-config.target" ];
path = path;
serviceConfig = {
diff --git a/nixos/modules/services/web-apps/silverbullet.nix b/nixos/modules/services/web-apps/silverbullet.nix
new file mode 100644
index 000000000000..a0c6ee34d262
--- /dev/null
+++ b/nixos/modules/services/web-apps/silverbullet.nix
@@ -0,0 +1,123 @@
+{ config
+, pkgs
+, lib
+, ...
+}:
+let
+ cfg = config.services.silverbullet;
+ defaultUser = "silverbullet";
+ defaultGroup = defaultUser;
+ defaultSpaceDir = "/var/lib/silverbullet";
+in
+{
+ options = {
+ services.silverbullet = {
+ enable = lib.mkEnableOption (lib.mdDoc "Silverbullet, an open-source, self-hosted, offline-capable Personal Knowledge Management (PKM) web application.");
+
+ package = lib.mkPackageOptionMD pkgs "silverbullet" { };
+
+ openFirewall = lib.mkOption {
+ type = lib.types.bool;
+ default = false;
+ description = lib.mdDoc "Open port in the firewall.";
+ };
+
+ listenPort = lib.mkOption {
+ type = lib.types.int;
+ default = 3000;
+ description = lib.mdDoc "Port to listen on.";
+ };
+
+ listenAddress = lib.mkOption {
+ type = lib.types.str;
+ default = "127.0.0.1";
+ description = lib.mdDoc "Address or hostname to listen on. Defaults to 127.0.0.1.";
+ };
+
+ spaceDir = lib.mkOption {
+ type = lib.types.path;
+ default = defaultSpaceDir;
+ example = "/home/yourUser/silverbullet";
+ description = lib.mdDoc ''
+ Folder to store Silverbullet's space/workspace.
+ By default it is located at `${defaultSpaceDir}`.
+ '';
+ };
+
+ user = lib.mkOption {
+ type = lib.types.str;
+ default = defaultUser;
+ example = "yourUser";
+ description = lib.mdDoc ''
+ The user to run Silverbullet as.
+ By default, a user named `${defaultUser}` will be created whose space
+ directory is [spaceDir](#opt-services.silverbullet.spaceDir).
+ '';
+ };
+
+ group = lib.mkOption {
+ type = lib.types.str;
+ default = defaultGroup;
+ example = "yourGroup";
+ description = lib.mdDoc ''
+ The group to run Silverbullet under.
+ By default, a group named `${defaultGroup}` will be created.
+ '';
+ };
+
+ envFile = lib.mkOption {
+ type = lib.types.nullOr lib.types.path;
+ default = null;
+ example = "/etc/silverbullet.env";
+ description = lib.mdDoc ''
+ File containing extra environment variables. For example:
+
+ ```
+ SB_USER=user:password
+ SB_AUTH_TOKEN=abcdefg12345
+ ```
+ '';
+ };
+
+ extraArgs = lib.mkOption {
+ type = lib.types.listOf lib.types.str;
+ default = [ ];
+ example = [ "--db /path/to/silverbullet.db" ];
+ description = lib.mdDoc "Extra arguments passed to silverbullet.";
+ };
+ };
+ };
+
+ config = lib.mkIf cfg.enable {
+ systemd.services.silverbullet = {
+ description = "Silverbullet service";
+ after = [ "network.target" ];
+ wantedBy = [ "multi-user.target" ];
+
+ preStart = lib.mkIf (!lib.hasPrefix "/var/lib/" cfg.spaceDir) "mkdir -p '${cfg.spaceDir}'";
+ serviceConfig = {
+ Type = "simple";
+ User = "${cfg.user}";
+ Group = "${cfg.group}";
+ EnvironmentFile = lib.mkIf (cfg.envFile != null) "${cfg.envFile}";
+ StateDirectory = lib.mkIf (lib.hasPrefix "/var/lib/" cfg.spaceDir) (lib.last (lib.splitString "/" cfg.spaceDir));
+ ExecStart = "${lib.getExe cfg.package} --port ${toString cfg.listenPort} --hostname '${cfg.listenAddress}' '${cfg.spaceDir}' " + lib.concatStringsSep " " cfg.extraArgs;
+ Restart = "on-failure";
+ };
+ };
+
+ networking.firewall = lib.mkIf cfg.openFirewall {
+ allowedTCPPorts = [ cfg.listenPort ];
+ };
+
+ users.users.${defaultUser} = lib.mkIf (cfg.user == defaultUser) {
+ isSystemUser = true;
+ group = cfg.group;
+ description = "Silverbullet daemon user";
+ };
+
+ users.groups.${defaultGroup} = lib.mkIf (cfg.group == defaultGroup) { };
+ };
+
+ meta.maintainers = with lib.maintainers; [ aorith ];
+}
diff --git a/nixos/tests/all-tests.nix b/nixos/tests/all-tests.nix
index 487a7755bb17..bc586a609271 100644
--- a/nixos/tests/all-tests.nix
+++ b/nixos/tests/all-tests.nix
@@ -811,6 +811,7 @@ in {
shattered-pixel-dungeon = handleTest ./shattered-pixel-dungeon.nix {};
shiori = handleTest ./shiori.nix {};
signal-desktop = handleTest ./signal-desktop