Merge staging-next into staging

Changed files
+1191 -1043
doc
nixos
modules
config
hardware
installer
sd-card
misc
programs
security
services
cluster
hadoop
continuous-integration
buildbot
hercules-ci-agent
hydra
databases
development
editors
games
hardware
home-automation
logging
mail
matrix
misc
monitoring
network-filesystems
networking
search
security
system
torrent
web-apps
web-servers
x11
desktop-managers
system
tasks
virtualisation
tests
installed-tests
pkgs
applications
audio
finance
graphics
shutter
misc
1password-gui
avrdudess
blender
far2l
nwg-drawer
networking
appgate-sdp
browsers
brave
firefox
google-chrome
vivaldi
instant-messengers
armcord
bluejeans
franz
slack
telegram
tdesktop
wavebox
mailreaders
thunderbird
thunderbird-bin
nextcloud-client
office
jabref
mytetra
version-management
git-and-tools
git-open
lab
video
pipe-viewer
development
libraries
python-modules
fastapi-mail
pep8-naming
pyviz-comms
sentinel
uamqp
tools
analysis
build-managers
gnumake
godot
games
enigma
grapejuice
os-specific
linux
kernel
rtl8814au
rtl88x2bu
servers
grocy
teleport
stdenv
tools
admin
aws-sso-cli
aws-vault
bluetooth
blueman
misc
writedisk
networking
top-level
+17 -2
doc/stdenv/stdenv.chapter.md
···
# adds `FOOBAR=baz` to `$out/bin/foo`’s environment
makeWrapper $out/bin/foo $wrapperfile --set FOOBAR baz
-
# prefixes the binary paths of `hello` and `git`
+
# Prefixes the binary paths of `hello` and `git`
+
# and suffixes the binary path of `xdg-utils`.
# Be advised that paths often should be patched in directly
# (via string replacements or in `configurePhase`).
-
makeWrapper $out/bin/foo $wrapperfile --prefix PATH : ${lib.makeBinPath [ hello git ]}
+
makeWrapper $out/bin/foo $wrapperfile \
+
--prefix PATH : ${lib.makeBinPath [ hello git ]} \
+
--suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
```
+
+
Packages may expect or require other utilities to be available at runtime.
+
`makeWrapper` can be used to add packages to a `PATH` environment variable local to a wrapper.
+
+
Use `--prefix` to explicitly set dependencies in `PATH`.
+
+
:::{note}
+
`--prefix` essentially hard-codes dependencies into the wrapper.
+
They cannot be overridden without rebuilding the package.
+
:::
+
+
If dependencies should be resolved at runtime, use `--suffix` to append fallback values to `PATH`.
There’s many more kinds of arguments, they are documented in `nixpkgs/pkgs/build-support/setup-hooks/make-wrapper.sh` for the `makeWrapper` implementation and in `nixpkgs/pkgs/build-support/setup-hooks/make-binary-wrapper/make-binary-wrapper.sh` for the `makeBinaryWrapper` implementation.
+5 -5
nixos/modules/config/krb5/default.nix
···
admin_server = SYSLOG:NOTICE
default = SYSLOG:NOTICE
'';
-
description = ''
-
These lines go to the end of <literal>krb5.conf</literal> verbatim.
-
<literal>krb5.conf</literal> may include any of the relations that are
-
valid for <literal>kdc.conf</literal> (see <literal>man
-
kdc.conf</literal>), but it is not a recommended practice.
+
description = lib.mdDoc ''
+
These lines go to the end of `krb5.conf` verbatim.
+
`krb5.conf` may include any of the relations that are
+
valid for `kdc.conf` (see `man kdc.conf`),
+
but it is not a recommended practice.
'';
};
+5 -5
nixos/modules/config/ldap.nix
···
policy = mkOption {
default = "hard_open";
type = types.enum [ "hard_open" "hard_init" "soft" ];
-
description = ''
+
description = lib.mdDoc ''
Specifies the policy to use for reconnecting to an unavailable
-
LDAP server. The default is <literal>hard_open</literal>, which
+
LDAP server. The default is `hard_open`, which
reconnects if opening the connection to the directory server
-
failed. By contrast, <literal>hard_init</literal> reconnects if
+
failed. By contrast, `hard_init` reconnects if
initializing the connection failed. Initializing may not
actually contact the directory server, and it is possible that
a malformed configuration file will trigger reconnection. If
-
<literal>soft</literal> is specified, then
-
<package>nss_ldap</package> will return immediately on server
+
`soft` is specified, then
+
`nss_ldap` will return immediately on server
failure. All hard reconnect policies block with exponential
backoff before retrying.
'';
+5 -5
nixos/modules/config/system-path.nix
···
<programlisting>${defaultPackagesText}</programlisting>
'';
example = [];
-
description = ''
+
description = lib.mdDoc ''
Set of default packages that aren't strictly necessary
for a running system, entries can be removed for a more
minimal NixOS installation.
-
Note: If <package>pkgs.nano</package> is removed from this list,
+
Note: If `pkgs.nano` is removed from this list,
make sure another editor is installed and the
-
<literal>EDITOR</literal> environment variable is set to it.
+
`EDITOR` environment variable is set to it.
Environment variables can be set using
-
<option>environment.variables</option>.
+
{option}`environment.variables`.
Like with systemPackages, packages are installed to
-
<filename>/run/current-system/sw</filename>. They are
+
{file}`/run/current-system/sw`. They are
automatically available to all users, and are
automatically updated every time you rebuild the system
configuration.
+3 -3
nixos/modules/config/xdg/portal.nix
···
extraPortals = mkOption {
type = types.listOf types.package;
default = [ ];
-
description = ''
+
description = lib.mdDoc ''
List of additional portals to add to path. Portals allow interaction
with system, like choosing files or taking screenshots. At minimum,
a desktop portal implementation should be listed. GNOME and KDE already
-
adds <package>xdg-desktop-portal-gtk</package>; and
-
<package>xdg-desktop-portal-kde</package> respectively. On other desktop
+
adds `xdg-desktop-portal-gtk`; and
+
`xdg-desktop-portal-kde` respectively. On other desktop
environments you probably want to add them yourself.
'';
};
+3 -3
nixos/modules/config/xdg/portals/lxqt.nix
···
enable = mkEnableOption ''
the desktop portal for the LXQt desktop environment.
-
This will add the <package>lxqt.xdg-desktop-portal-lxqt</package>
+
This will add the <literal>lxqt.xdg-desktop-portal-lxqt</literal>
package (with the extra Qt styles) into the
<option>xdg.portal.extraPortals</option> option
'';
···
pkgs.qtcurve
];
'';
-
description = ''
+
description = lib.mdDoc ''
Extra Qt styles that will be available to the
-
<package>lxqt.xdg-desktop-portal-lxqt</package>.
+
`lxqt.xdg-desktop-portal-lxqt`.
'';
};
};
+4 -4
nixos/modules/config/xdg/portals/wlr.nix
···
enable = mkEnableOption ''
desktop portal for wlroots-based desktops
-
This will add the <package>xdg-desktop-portal-wlr</package> package into
+
This will add the <literal>xdg-desktop-portal-wlr</literal> package into
the <option>xdg.portal.extraPortals</option> option, and provide the
configuration file
'';
settings = mkOption {
-
description = ''
-
Configuration for <package>xdg-desktop-portal-wlr</package>.
+
description = lib.mdDoc ''
+
Configuration for `xdg-desktop-portal-wlr`.
-
See <literal>xdg-desktop-portal-wlr(5)</literal> for supported
+
See `xdg-desktop-portal-wlr(5)` for supported
values.
'';
+5 -5
nixos/modules/config/zram.nix
···
default = "zstd";
example = "lz4";
type = with types; either (enum [ "lzo" "lz4" "zstd" ]) str;
-
description = ''
-
Compression algorithm. <literal>lzo</literal> has good compression,
-
but is slow. <literal>lz4</literal> has bad compression, but is fast.
-
<literal>zstd</literal> is both good compression and fast, but requires newer kernel.
+
description = lib.mdDoc ''
+
Compression algorithm. `lzo` has good compression,
+
but is slow. `lz4` has bad compression, but is fast.
+
`zstd` is both good compression and fast, but requires newer kernel.
You can check what other algorithms are supported by your zram device with
-
<programlisting>cat /sys/class/block/zram*/comp_algorithm</programlisting>
+
{command}`cat /sys/class/block/zram*/comp_algorithm`
'';
};
};
+1 -1
nixos/modules/hardware/corectrl.nix
···
type = types.str;
default = "0xfffd7fff";
example = "0xffffffff";
-
description = ''
+
description = lib.mdDoc ''
Sets the `amdgpu.ppfeaturemask` kernel option.
In particular, it is used here to set the overdrive bit.
Default is `0xfffd7fff` as it is less likely to cause flicker issues.
+3 -3
nixos/modules/hardware/cpu/amd-sev.nix
···
options.hardware.cpu.amd.sev = {
enable = mkEnableOption "access to the AMD SEV device";
user = mkOption {
-
description = "Owner to assign to the SEV device.";
+
description = lib.mdDoc "Owner to assign to the SEV device.";
type = types.str;
default = "root";
};
group = mkOption {
-
description = "Group to assign to the SEV device.";
+
description = lib.mdDoc "Group to assign to the SEV device.";
type = types.str;
default = defaultGroup;
};
mode = mkOption {
-
description = "Mode to set for the SEV device.";
+
description = lib.mdDoc "Mode to set for the SEV device.";
type = types.str;
default = "0660";
};
+13 -13
nixos/modules/installer/sd-card/sd-image.nix
···
options.sdImage = {
imageName = mkOption {
default = "${config.sdImage.imageBaseName}-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}.img";
-
description = ''
+
description = lib.mdDoc ''
Name of the generated image file.
'';
};
imageBaseName = mkOption {
default = "nixos-sd-image";
-
description = ''
+
description = lib.mdDoc ''
Prefix of the name of the generated image file.
'';
};
···
storePaths = mkOption {
type = with types; listOf package;
example = literalExpression "[ pkgs.stdenv ]";
-
description = ''
+
description = lib.mdDoc ''
Derivations to be included in the Nix store in the generated SD image.
'';
};
···
firmwarePartitionID = mkOption {
type = types.str;
default = "0x2178694e";
-
description = ''
+
description = lib.mdDoc ''
Volume ID for the /boot/firmware partition on the SD card. This value
must be a 32-bit hexadecimal number.
'';
···
firmwarePartitionName = mkOption {
type = types.str;
default = "FIRMWARE";
-
description = ''
+
description = lib.mdDoc ''
Name of the filesystem which holds the boot firmware.
'';
};
···
type = types.nullOr types.str;
default = null;
example = "14e19a7b-0ae0-484d-9d54-43bd6fdc20c7";
-
description = ''
+
description = lib.mdDoc ''
UUID for the filesystem on the main NixOS partition on the SD card.
'';
};
···
type = types.int;
# As of 2019-08-18 the Raspberry pi firmware + u-boot takes ~18MiB
default = 30;
-
description = ''
+
description = lib.mdDoc ''
Size of the /boot/firmware partition, in megabytes.
'';
};
populateFirmwareCommands = mkOption {
example = literalExpression "'' cp \${pkgs.myBootLoader}/u-boot.bin firmware/ ''";
-
description = ''
+
description = lib.mdDoc ''
Shell commands to populate the ./firmware directory.
All files in that directory are copied to the
/boot/firmware partition on the SD image.
···
populateRootCommands = mkOption {
example = literalExpression "''\${config.boot.loader.generic-extlinux-compatible.populateCmd} -c \${config.system.build.toplevel} -d ./files/boot''";
-
description = ''
+
description = lib.mdDoc ''
Shell commands to populate the ./files directory.
All files in that directory are copied to the
root (/) partition on the SD image. Use this to
···
postBuildCommands = mkOption {
example = literalExpression "'' dd if=\${pkgs.myBootLoader}/SPL of=$img bs=1024 seek=1 conv=notrunc ''";
default = "";
-
description = ''
+
description = lib.mdDoc ''
Shell commands to run after the image is built.
Can be used for boards requiring to dd u-boot SPL before actual partitions.
'';
···
compressImage = mkOption {
type = types.bool;
default = true;
-
description = ''
+
description = lib.mdDoc ''
Whether the SD image should be compressed using
-
<command>zstd</command>.
+
{command}`zstd`.
'';
};
expandOnBoot = mkOption {
type = types.bool;
default = true;
-
description = ''
+
description = lib.mdDoc ''
Whether to configure the sd image to expand it's partition on boot.
'';
};
+1 -1
nixos/modules/misc/documentation.nix
···
nixos.extraModules = mkOption {
type = types.listOf types.raw;
default = [];
-
description = ''
+
description = lib.mdDoc ''
Modules for which to show options even when not imported.
'';
};
+10 -10
nixos/modules/misc/nixpkgs.nix
···
'';
type = pkgsType;
example = literalExpression "import <nixpkgs> {}";
-
description = ''
+
description = lib.mdDoc ''
If set, the pkgs argument to all NixOS modules is the value of
-
this option, extended with <literal>nixpkgs.overlays</literal>, if
-
that is also set. Either <literal>nixpkgs.crossSystem</literal> or
-
<literal>nixpkgs.localSystem</literal> will be used in an assertion
+
this option, extended with `nixpkgs.overlays`, if
+
that is also set. Either `nixpkgs.crossSystem` or
+
`nixpkgs.localSystem` will be used in an assertion
to check that the NixOS and Nixpkgs architectures match. Any
-
other options in <literal>nixpkgs.*</literal>, notably <literal>config</literal>,
+
other options in `nixpkgs.*`, notably `config`,
will be ignored.
If unset, the pkgs argument to all NixOS modules is determined
···
The default value imports the Nixpkgs source files
relative to the location of this NixOS module, because
NixOS and Nixpkgs are distributed together for consistency,
-
so the <literal>nixos</literal> in the default value is in fact a
-
relative path. The <literal>config</literal>, <literal>overlays</literal>,
-
<literal>localSystem</literal>, and <literal>crossSystem</literal> come
+
so the `nixos` in the default value is in fact a
+
relative path. The `config`, `overlays`,
+
`localSystem`, and `crossSystem` come
from this option's siblings.
This option can be used by applications like NixOps to increase
the performance of evaluation, or to create packages that depend
on a container that should be built with the exact same evaluation
of Nixpkgs, for example. Applications like this should set
-
their default value using <literal>lib.mkDefault</literal>, so
+
their default value using `lib.mkDefault`, so
user-provided configuration can override it without using
-
<literal>lib</literal>.
+
`lib`.
Note that using a distinct version of Nixpkgs with NixOS may
be an unexpected source of problems. Use this option with care.
+1 -1
nixos/modules/misc/wordlist.nix
···
}
'';
-
description = ''
+
description = lib.mdDoc ''
A set with the key names being the environment variable you'd like to
set and the values being a list of paths to text documents containing
lists of words. The various files will be merged, sorted, duplicates
+3 -3
nixos/modules/programs/captive-browser.nix
···
bindInterface = mkOption {
default = true;
type = types.bool;
-
description = ''
-
Binds <package>captive-browser</package> to the network interface declared in
-
<literal>cfg.interface</literal>. This can be used to avoid collisions
+
description = lib.mdDoc ''
+
Binds `captive-browser` to the network interface declared in
+
`cfg.interface`. This can be used to avoid collisions
with private subnets.
'';
};
+2 -2
nixos/modules/programs/chromium.nix
···
extraOpts = mkOption {
type = types.attrs;
-
description = ''
+
description = lib.mdDoc ''
Extra chromium policy options. A list of available policies
can be found in the Chrome Enterprise documentation:
-
<link xlink:href="https://cloud.google.com/docs/chrome-enterprise/policies/">https://cloud.google.com/docs/chrome-enterprise/policies/</link>
+
<https://cloud.google.com/docs/chrome-enterprise/policies/>
Make sure the selected policy is supported on Linux and your browser version.
'';
default = {};
+7 -7
nixos/modules/programs/k3b.nix
···
enable = mkOption {
type = types.bool;
default = false;
-
description = ''
+
description = lib.mdDoc ''
Whether to enable k3b, the KDE disk burning application.
-
Additionally to installing <package>k3b</package> enabling this will
-
add <literal>setuid</literal> wrappers in <literal>/run/wrappers/bin</literal>
-
for both <package>cdrdao</package> and <package>cdrecord</package>. On first
-
run you must manually configure the path of <package>cdrdae</package> and
-
<package>cdrecord</package> to correspond to the appropriate paths under
-
<literal>/run/wrappers/bin</literal> in the "Setup External Programs" menu.
+
Additionally to installing `k3b` enabling this will
+
add `setuid` wrappers in `/run/wrappers/bin`
+
for both `cdrdao` and `cdrecord`. On first
+
run you must manually configure the path of `cdrdae` and
+
`cdrecord` to correspond to the appropriate paths under
+
`/run/wrappers/bin` in the "Setup External Programs" menu.
'';
};
};
+1 -1
nixos/modules/programs/mosh.nix
···
type = lib.types.bool;
};
withUtempter = mkOption {
-
description = ''
+
description = lib.mdDoc ''
Whether to enable libutempter for mosh.
This is required so that mosh can write to /var/run/utmp (which can be queried with `who` to display currently connected user sessions).
Note, this will add a guid wrapper for the group utmp!
+1 -1
nixos/modules/programs/msmtp.nix
···
passwordeval = "cat /secrets/password.txt";
};
};
-
description = ''
+
description = lib.mdDoc ''
Named accounts and their respective configurations.
The special name "default" allows a default account to be defined.
See msmtp(1) for the available options.
+4 -4
nixos/modules/programs/ssh.nix
···
extraConfig = mkOption {
type = types.lines;
default = "";
-
description = ''
-
Extra configuration text prepended to <filename>ssh_config</filename>. Other generated
-
options will be added after a <literal>Host *</literal> pattern.
-
See <citerefentry><refentrytitle>ssh_config</refentrytitle><manvolnum>5</manvolnum></citerefentry>
+
description = lib.mdDoc ''
+
Extra configuration text prepended to {file}`ssh_config`. Other generated
+
options will be added after a `Host *` pattern.
+
See {manpage}`ssh_config(5)`
for help.
'';
};
+1 -1
nixos/modules/programs/thefuck.nix
···
default = "fuck";
type = types.str;
-
description = ''
+
description = lib.mdDoc ''
`thefuck` needs an alias to be configured.
The default value is `fuck`, but you can use anything else as well.
'';
+5 -5
nixos/modules/programs/tsm-client.nix
···
exclude.dir /nix/store
include.encrypt /home/.../*
'';
-
description = ''
-
<literal>include.*</literal> and
-
<literal>exclude.*</literal> directives to be
+
description = lib.mdDoc ''
+
`include.*` and
+
`exclude.*` directives to be
used when sending files to the IBM TSM server.
The lines will be written into a file that the
-
<literal>inclexcl</literal>
-
directive in <filename>dsm.sys</filename> points to.
+
`inclexcl`
+
directive in {file}`dsm.sys` points to.
'';
};
options.extraConfig = mkOption {
+1 -1
nixos/modules/programs/yabar.nix
···
to use `yabar-unstable'.
'';
-
description = ''
+
description = lib.mdDoc ''
The package which contains the `yabar` binary.
Nixpkgs provides the `yabar` and `yabar-unstable`
+4 -4
nixos/modules/programs/zsh/oh-my-zsh.nix
···
package = mkOption {
default = pkgs.oh-my-zsh;
defaultText = literalExpression "pkgs.oh-my-zsh";
-
description = ''
+
description = lib.mdDoc ''
Package to install for `oh-my-zsh` usage.
'';
···
custom = mkOption {
default = null;
type = with types; nullOr str;
-
description = ''
+
description = lib.mdDoc ''
Path to a custom oh-my-zsh package to override config of oh-my-zsh.
(Can't be used along with `customPkgs`).
'';
···
customPkgs = mkOption {
default = [];
type = types.listOf types.package;
-
description = ''
+
description = lib.mdDoc ''
List of custom packages that should be loaded into `oh-my-zsh`.
'';
};
···
cacheDir = mkOption {
default = "$HOME/.cache/oh-my-zsh";
type = types.str;
-
description = ''
+
description = lib.mdDoc ''
Cache directory to be used by `oh-my-zsh`.
Without this option it would default to the read-only nix store.
'';
+1 -1
nixos/modules/programs/zsh/zsh-autoenv.nix
···
package = mkOption {
default = pkgs.zsh-autoenv;
defaultText = literalExpression "pkgs.zsh-autoenv";
-
description = ''
+
description = lib.mdDoc ''
Package to install for `zsh-autoenv` usage.
'';
+1 -1
nixos/modules/programs/zsh/zsh-autosuggestions.nix
···
strategy = mkOption {
type = types.listOf (types.enum [ "history" "completion" "match_prev_cmd" ]);
default = [ "history" ];
-
description = ''
+
description = lib.mdDoc ''
`ZSH_AUTOSUGGEST_STRATEGY` is an array that specifies how suggestions should be generated.
The strategies in the array are tried successively until a suggestion is found.
There are currently three built-in strategies to choose from:
+1 -1
nixos/modules/security/acme/default.nix
···
inheritDefaults = mkOption {
default = true;
example = true;
-
description = "Whether to inherit values set in `security.acme.defaults` or not.";
+
description = lib.mdDoc "Whether to inherit values set in `security.acme.defaults` or not.";
type = lib.types.bool;
};
};
+1 -1
nixos/modules/security/dhparams.nix
···
<note><para>If this is <literal>false</literal> the resulting store
path will be non-deterministic and will be rebuilt every time the
-
<package>openssl</package> package changes.</para></note>
+
<literal>openssl</literal> package changes.</para></note>
'';
};
+14 -15
nixos/modules/security/pam.nix
···
limits = mkOption {
default = [];
type = limitsType;
-
description = ''
+
description = lib.mdDoc ''
Attribute set describing resource limits. Defaults to the
-
value of <option>security.pam.loginLimits</option>.
-
The meaning of the values is explained in <citerefentry>
-
<refentrytitle>limits.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
+
value of {option}`security.pam.loginLimits`.
+
The meaning of the values is explained in {manpage}`limits.conf(5)`.
'';
};
···
}
];
-
description =
-
'' Define resource limits that should apply to users or groups.
-
Each item in the list should be an attribute set with a
-
<varname>domain</varname>, <varname>type</varname>,
-
<varname>item</varname>, and <varname>value</varname>
-
attribute. The syntax and semantics of these attributes
-
must be that described in <citerefentry><refentrytitle>limits.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
+
description = ''
+
Define resource limits that should apply to users or groups.
+
Each item in the list should be an attribute set with a
+
<varname>domain</varname>, <varname>type</varname>,
+
<varname>item</varname>, and <varname>value</varname>
+
attribute. The syntax and semantics of these attributes
+
must be that described in <citerefentry><refentrytitle>limits.conf</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
-
Note that these limits do not apply to systemd services,
-
whose limits can be changed via <option>systemd.extraConfig</option>
-
instead.
-
'';
+
Note that these limits do not apply to systemd services,
+
whose limits can be changed via <option>systemd.extraConfig</option>
+
instead.
+
'';
};
security.pam.services = mkOption {
+1 -1
nixos/modules/security/sudo.nix
···
type = types.package;
default = pkgs.sudo;
defaultText = literalExpression "pkgs.sudo";
-
description = ''
+
description = lib.mdDoc ''
Which package to use for `sudo`.
'';
};
+9 -9
nixos/modules/services/cluster/hadoop/hbase.nix
···
"hbase.cluster.distributed" = "true";
};
type = types.attrsOf types.anything;
-
description = ''
+
description = lib.mdDoc ''
Default options for hbase-site.xml
'';
};
···
type = with types; attrsOf anything;
example = literalExpression ''
'';
-
description = ''
+
description = lib.mdDoc ''
Additional options and overrides for hbase-site.xml
-
<link xlink:href="https://github.com/apache/hbase/blob/rel/2.4.11/hbase-common/src/main/resources/hbase-default.xml"/>
+
<https://github.com/apache/hbase/blob/rel/2.4.11/hbase-common/src/main/resources/hbase-default.xml>
'';
};
hbaseSiteInternal = mkOption {
···
type = types.package;
default = pkgs.hbase;
defaultText = literalExpression "pkgs.hbase";
-
description = "HBase package";
+
description = lib.mdDoc "HBase package";
};
rootdir = mkOption {
-
description = ''
+
description = lib.mdDoc ''
This option will set "hbase.rootdir" in hbase-site.xml and determine
the directory shared by region servers and into which HBase persists.
The URL should be 'fully-qualified' to include the filesystem scheme.
···
default = "/hbase";
};
zookeeperQuorum = mkOption {
-
description = ''
+
description = lib.mdDoc ''
This option will set "hbase.zookeeper.quorum" in hbase-site.xml.
Comma separated list of servers in the ZooKeeper ensemble.
'';
···
openFirewall = mkOption {
type = types.bool;
default = false;
-
description = ''
+
description = lib.mdDoc ''
Open firewall ports for HBase master.
'';
};
···
overrideHosts = mkOption {
type = types.bool;
default = true;
-
description = ''
+
description = lib.mdDoc ''
Remove /etc/hosts entries for "127.0.0.2" and "::1" defined in nixos/modules/config/networking.nix
Regionservers must be able to resolve their hostnames to their IP addresses, through PTR records
or /etc/hosts entries.
···
openFirewall = mkOption {
type = types.bool;
default = false;
-
description = ''
+
description = lib.mdDoc ''
Open firewall ports for HBase master.
'';
};
+2 -2
nixos/modules/services/continuous-integration/buildbot/worker.nix
···
keepalive = mkOption {
default = 600;
type = types.int;
-
description = "
+
description = lib.mdDoc ''
This is a number that indicates how frequently keepalive messages should be sent
from the worker to the buildmaster, expressed in seconds.
-
";
+
'';
};
package = mkOption {
+1 -1
nixos/modules/services/continuous-integration/buildkite-agents.nix
···
options.services.buildkite-agents = mkOption {
type = types.attrsOf (types.submodule buildkiteOptions);
default = {};
-
description = ''
+
description = lib.mdDoc ''
Attribute set of buildkite agents.
The attribute key is combined with the hostname and a unique integer to
create the final agent name. This can be overridden by setting the `name`
+9 -10
nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix
···
defaultText = literalExpression ''baseDirectory + "/secrets"'';
};
clusterJoinTokenPath = mkOption {
-
description = ''
+
description = lib.mdDoc ''
Location of the cluster-join-token.key file.
You can retrieve the contents of the file when creating a new agent via
-
<link xlink:href="https://hercules-ci.com/dashboard">https://hercules-ci.com/dashboard</link>.
+
<https://hercules-ci.com/dashboard>.
As this value is confidential, it should not be in the store, but
installed using other means, such as agenix, NixOps
-
<literal>deployment.keys</literal>, or manual installation.
+
`deployment.keys`, or manual installation.
The contents of the file are used for authentication between the agent and the API.
'';
···
defaultText = literalExpression ''staticSecretsDirectory + "/cluster-join-token.key"'';
};
binaryCachesPath = mkOption {
-
description = ''
+
description = lib.mdDoc ''
Path to a JSON file containing binary cache secret keys.
As these values are confidential, they should not be in the store, but
copied over using other means, such as agenix, NixOps
-
<literal>deployment.keys</literal>, or manual installation.
+
`deployment.keys`, or manual installation.
-
The format is described on <link xlink:href="https://docs.hercules-ci.com/hercules-ci-agent/binary-caches-json/">https://docs.hercules-ci.com/hercules-ci-agent/binary-caches-json/</link>.
+
The format is described on <https://docs.hercules-ci.com/hercules-ci-agent/binary-caches-json/>.
'';
type = types.path;
default = config.staticSecretsDirectory + "/binary-caches.json";
defaultText = literalExpression ''staticSecretsDirectory + "/binary-caches.json"'';
};
secretsJsonPath = mkOption {
-
description = ''
+
description = lib.mdDoc ''
Path to a JSON file containing secrets for effects.
As these values are confidential, they should not be in the store, but
copied over using other means, such as agenix, NixOps
-
<literal>deployment.keys</literal>, or manual installation.
+
`deployment.keys`, or manual installation.
-
The format is described on <link xlink:href="https://docs.hercules-ci.com/hercules-ci-agent/secrets-json/">https://docs.hercules-ci.com/hercules-ci-agent/secrets-json/</link>.
-
+
The format is described on <https://docs.hercules-ci.com/hercules-ci-agent/secrets-json/>.
'';
type = types.path;
default = config.staticSecretsDirectory + "/secrets.json";
+3 -3
nixos/modules/services/continuous-integration/hydra/default.nix
···
type = types.str;
default = localDB;
example = "dbi:Pg:dbname=hydra;host=postgres.example.org;user=foo;";
-
description = ''
+
description = lib.mdDoc ''
The DBI string for Hydra database connection.
NOTE: Attempts to set `application_name` will be overridden by
···
type = types.str;
default = "*";
example = "localhost";
-
description = ''
-
The hostname or address to listen on or <literal>*</literal> to listen
+
description = lib.mdDoc ''
+
The hostname or address to listen on or `*` to listen
on all interfaces.
'';
};
+2 -2
nixos/modules/services/databases/foundationdb.nix
···
openFirewall = mkOption {
type = types.bool;
default = false;
-
description = ''
+
description = lib.mdDoc ''
Open the firewall ports corresponding to FoundationDB processes and coordinators
-
using <option>config.networking.firewall.*</option>.
+
using {option}`config.networking.firewall.*`.
'';
};
+2 -2
nixos/modules/services/databases/mongodb.nix
···
default = pkgs.mongodb;
defaultText = literalExpression "pkgs.mongodb";
type = types.package;
-
description = "
+
description = lib.mdDoc ''
Which MongoDB derivation to use.
-
";
+
'';
};
user = mkOption {
+2 -2
nixos/modules/services/databases/mysql.nix
···
package = mkOption {
type = types.package;
example = literalExpression "pkgs.mariadb";
-
description = "
+
description = lib.mdDoc ''
Which MySQL derivation to use. MariaDB packages are supported too.
-
";
+
'';
};
user = mkOption {
+3 -3
nixos/modules/services/databases/postgresql.nix
···
authentication = mkOption {
type = types.lines;
default = "";
-
description = ''
+
description = lib.mdDoc ''
Defines how users authenticate themselves to the server. See the
-
<link xlink:href="https://www.postgresql.org/docs/current/auth-pg-hba-conf.html">PostgreSQL documentation for pg_hba.conf</link>
+
[PostgreSQL documentation for pg_hba.conf](https://www.postgresql.org/docs/current/auth-pg-hba-conf.html)
for details on the expected format of this option. By default,
peer based authentication will be used for users connecting
via the Unix socket, and md5 password authentication will be
used for users connecting via TCP. Any added rules will be
inserted above the default rules. If you'd like to replace the
-
default rules entirely, you can use <function>lib.mkForce</function> in your
+
default rules entirely, you can use `lib.mkForce` in your
module.
'';
};
+7 -6
nixos/modules/services/development/jupyter/default.nix
···
};
}
'';
-
description = "Declarative kernel config
+
description = lib.mdDoc ''
+
Declarative kernel config.
-
Kernels can be declared in any language that supports and has the required
-
dependencies to communicate with a jupyter server.
-
In python's case, it means that ipykernel package must always be included in
-
the list of packages of the targeted environment.
-
";
+
Kernels can be declared in any language that supports and has the required
+
dependencies to communicate with a jupyter server.
+
In python's case, it means that ipykernel package must always be included in
+
the list of packages of the targeted environment.
+
'';
};
};
+1 -1
nixos/modules/services/development/lorri.nix
···
enable = lib.mkOption {
default = false;
type = lib.types.bool;
-
description = ''
+
description = lib.mdDoc ''
Enables the daemon for `lorri`, a nix-shell replacement for project
development. The socket-activated daemon starts on the first request
issued by the `lorri` command.
+1 -1
nixos/modules/services/editors/infinoted.nix
···
certificateChain = mkOption {
type = types.nullOr types.path;
default = null;
-
description = ''
+
description = lib.mdDoc ''
Chain of CA-certificates to which our `certificateFile` is relative.
Optional for TLS.
'';
+3 -3
nixos/modules/services/games/asf.nix
···
settings = mkOption {
type = format.type;
-
description = ''
-
The ASF.json file, all the options are documented <link xlink:href="https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#global-config">here</link>.
+
description = lib.mdDoc ''
+
The ASF.json file, all the options are documented [here](https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#global-config).
Do note that `AutoRestart` and `UpdateChannel` is always to `false` respectively `0` because NixOS takes care of updating everything.
`Headless` is also always set to `true` because there is no way to provide inputs via a systemd service.
-
You should try to keep ASF up to date since upstream does not provide support for anything but the latest version and you're exposing yourself to all kinds of issues - as is outlined <link xlink:href="https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#updateperiod">here</link>.
+
You should try to keep ASF up to date since upstream does not provide support for anything but the latest version and you're exposing yourself to all kinds of issues - as is outlined [here](https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#updateperiod).
'';
example = {
Statistics = false;
+2 -2
nixos/modules/services/games/crossfire-server.nix
···
stateDir = mkOption {
type = types.str;
default = "/var/lib/crossfire";
-
description = ''
+
description = lib.mdDoc ''
Where to store runtime data (save files, persistent items, etc).
If left at the default, this will be automatically created on server
···
configFiles = mkOption {
type = types.attrsOf types.str;
-
description = ''
+
description = lib.mdDoc ''
Text to append to the corresponding configuration files. Note that the
files given in the example are *not* the complete set of files available
to customize; look in /etc/crossfire after enabling the server to see
+1 -1
nixos/modules/services/games/deliantra-server.nix
···
stateDir = mkOption {
type = types.str;
default = "/var/lib/deliantra";
-
description = ''
+
description = lib.mdDoc ''
Where to store runtime data (save files, persistent items, etc).
If left at the default, this will be automatically created on server
+3 -3
nixos/modules/services/games/minetest-server.nix
···
gameId = mkOption {
type = types.nullOr types.str;
default = null;
-
description = ''
+
description = lib.mdDoc ''
Id of the game to use. To list available games run
`minetestserver --gameid list`.
···
world = mkOption {
type = types.nullOr types.path;
default = null;
-
description = ''
+
description = lib.mdDoc ''
Name of the world to use. To list available worlds run
`minetestserver --world list`.
···
configPath = mkOption {
type = types.nullOr types.path;
default = null;
-
description = ''
+
description = lib.mdDoc ''
Path to the config to use.
If set to null, the config of the running user will be used:
+3 -5
nixos/modules/services/hardware/fwupd.nix
···
DisabledPlugins=${lib.concatStringsSep ";" cfg.disabledPlugins}
'';
};
-
"fwupd/uefi.conf" = {
-
source = pkgs.writeText "uefi.conf" ''
-
[uefi]
+
"fwupd/uefi_capsule.conf" = {
+
source = pkgs.writeText "uefi_capsule.conf" ''
+
[uefi_capsule]
OverrideESPMountPoint=${config.boot.loader.efi.efiSysMountPoint}
'';
};
···
services.dbus.packages = [ cfg.package ];
services.udev.packages = [ cfg.package ];
-
-
services.udisks2.enable = true;
systemd.packages = [ cfg.package ];
};
+2 -2
nixos/modules/services/home-automation/home-assistant.nix
···
psycopg2
];
'';
-
description = ''
+
description = lib.mdDoc ''
List of packages to add to propagatedBuildInputs.
-
A popular example is <package>python3Packages.psycopg2</package>
+
A popular example is `python3Packages.psycopg2`
for PostgreSQL support in the recorder component.
'';
};
+2 -2
nixos/modules/services/logging/logrotate.nix
···
priority = mkOption {
type = types.int;
default = 1000;
-
description = ''
+
description = lib.mdDoc ''
Order of this logrotate block in relation to the others. The semantics are
the same as with `lib.mkOrder`. Smaller values have a greater priority.
'';
···
priority = mkOption {
type = types.int;
default = 1000;
-
description = ''
+
description = lib.mdDoc ''
Order of this logrotate block in relation to the others. The semantics are
the same as with `lib.mkOrder`. Smaller values are inserted first.
'';
+36 -36
nixos/modules/services/mail/postfix.nix
···
setgidGroup = mkOption {
type = types.str;
default = "postdrop";
-
description = "
+
description = lib.mdDoc ''
How to call postfix setgid group (for postdrop). Should
be uniquely used group.
-
";
+
'';
};
networks = mkOption {
type = types.nullOr (types.listOf types.str);
default = null;
example = ["192.168.0.1/24"];
-
description = "
+
description = lib.mdDoc ''
Net masks for trusted - allowed to relay mail to third parties -
hosts. Leave empty to use mynetworks_style configuration or use
default (localhost-only).
-
";
+
'';
};
networksStyle = mkOption {
type = types.str;
default = "";
-
description = "
+
description = lib.mdDoc ''
Name of standard way of trusted network specification to use,
leave blank if you specify it explicitly or if you want to use
default (localhost-only).
-
";
+
'';
};
hostname = mkOption {
type = types.str;
default = "";
-
description ="
+
description = lib.mdDoc ''
Hostname to use. Leave blank to use just the hostname of machine.
It should be FQDN.
-
";
+
'';
};
domain = mkOption {
type = types.str;
default = "";
-
description ="
+
description = lib.mdDoc ''
Domain to use. Leave blank to use hostname minus first component.
-
";
+
'';
};
origin = mkOption {
type = types.str;
default = "";
-
description ="
+
description = lib.mdDoc ''
Origin to use in outgoing e-mail. Leave blank to use hostname.
-
";
+
'';
};
destination = mkOption {
type = types.nullOr (types.listOf types.str);
default = null;
example = ["localhost"];
-
description = "
+
description = lib.mdDoc ''
Full (!) list of domains we deliver locally. Leave blank for
acceptable Postfix default.
-
";
+
'';
};
relayDomains = mkOption {
type = types.nullOr (types.listOf types.str);
default = null;
example = ["localdomain"];
-
description = "
+
description = lib.mdDoc ''
List of domains we agree to relay to. Default is empty.
-
";
+
'';
};
relayHost = mkOption {
type = types.str;
default = "";
-
description = "
+
description = lib.mdDoc ''
Mail relay for outbound mail.
-
";
+
'';
};
relayPort = mkOption {
type = types.int;
default = 25;
-
description = "
+
description = lib.mdDoc ''
SMTP port for relay mail relay.
-
";
+
'';
};
lookupMX = mkOption {
type = types.bool;
default = false;
-
description = "
+
description = lib.mdDoc ''
Whether relay specified is just domain whose MX must be used.
-
";
+
'';
};
postmasterAlias = mkOption {
type = types.str;
default = "root";
-
description = "
+
description = lib.mdDoc ''
Who should receive postmaster e-mail. Multiple values can be added by
separating values with comma.
-
";
+
'';
};
rootAlias = mkOption {
type = types.str;
default = "";
-
description = "
+
description = lib.mdDoc ''
Who should receive root e-mail. Blank for no redirection.
Multiple values can be added by separating values with comma.
-
";
+
'';
};
extraAliases = mkOption {
type = types.lines;
default = "";
-
description = "
+
description = lib.mdDoc ''
Additional entries to put verbatim into aliases file, cf. man-page aliases(8).
-
";
+
'';
};
aliasMapType = mkOption {
···
extraConfig = mkOption {
type = types.lines;
default = "";
-
description = "
+
description = lib.mdDoc ''
Extra lines to be added verbatim to the main.cf configuration file.
-
";
+
'';
};
tlsTrustedAuthorities = mkOption {
···
type = types.str;
default = "";
example = "+";
-
description = "
+
description = lib.mdDoc ''
Delimiter for address extension: so mail to user+test can be handled by ~user/.forward+test
-
";
+
'';
};
canonical = mkOption {
···
virtual = mkOption {
type = types.lines;
default = "";
-
description = "
+
description = lib.mdDoc ''
Entries for the virtual alias map, cf. man-page virtual(5).
-
";
+
'';
};
virtualMapType = mkOption {
···
transport = mkOption {
default = "";
type = types.lines;
-
description = "
+
description = lib.mdDoc ''
Entries for the transport map, cf. man-page transport(8).
-
";
+
'';
};
dnsBlacklists = mkOption {
+10 -11
nixos/modules/services/matrix/dendrite.nix
···
type = lib.types.nullOr lib.types.path;
example = "/var/lib/dendrite/server.cert";
default = null;
-
description = ''
+
description = lib.mdDoc ''
The path to the TLS certificate.
-
<programlisting>
+
```
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
-
</programlisting>
+
```
'';
};
tlsKey = lib.mkOption {
type = lib.types.nullOr lib.types.path;
example = "/var/lib/dendrite/server.key";
default = null;
-
description = ''
+
description = lib.mdDoc ''
The path to the TLS key.
-
<programlisting>
+
```
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
-
</programlisting>
+
```
'';
};
environmentFile = lib.mkOption {
···
example = "/var/lib/dendrite/registration_secret";
default = null;
description = ''
-
Environment file as defined in <citerefentry>
-
<refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
+
Environment file as defined in <citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry>.
Secrets may be passed to the service without adding them to the world-readable
Nix store, by specifying placeholder variables as the option value in Nix and
setting these variables accordingly in the environment file. Currently only used
···
lib.types.path
(lib.types.strMatching "^\\$CREDENTIALS_DIRECTORY/.+");
example = "$CREDENTIALS_DIRECTORY/private_key";
-
description = ''
+
description = lib.mdDoc ''
The path to the signing private key file, used to sign
requests and events.
-
<programlisting>
+
```
nix-shell -p dendrite --command "generate-keys --private-key matrix_key.pem"
-
</programlisting>
+
```
'';
};
trusted_third_party_id_servers = lib.mkOption {
+1 -1
nixos/modules/services/matrix/synapse.nix
···
type = types.bool;
default = true;
example = false;
-
description = ''
+
description = lib.mdDoc ''
Is the preview URL API enabled? If enabled, you *must* specify an
explicit url_preview_ip_range_blacklist of IPs that the spider is
denied from accessing.
+4 -4
nixos/modules/services/misc/etebase-server.nix
···
};
};
default = {};
-
description = ''
-
Configuration for <package>etebase-server</package>. Refer to
-
<link xlink:href="https://github.com/etesync/server/blob/master/etebase-server.ini.example"/>
-
and <link xlink:href="https://github.com/etesync/server/wiki"/>
+
description = lib.mdDoc ''
+
Configuration for `etebase-server`. Refer to
+
<https://github.com/etesync/server/blob/master/etebase-server.ini.example>
+
and <https://github.com/etesync/server/wiki>
for details on supported values.
'';
example = {
+2 -2
nixos/modules/services/misc/exhibitor.nix
···
enable = mkOption {
type = types.bool;
default = false;
-
description = "
+
description = lib.mdDoc ''
Whether to enable the exhibitor server.
-
";
+
'';
};
# See https://github.com/soabase/exhibitor/wiki/Running-Exhibitor for what these mean
# General options for any type of config
+5 -5
nixos/modules/services/misc/freeswitch.nix
···
enableReload = mkOption {
default = false;
type = types.bool;
-
description = ''
-
Issue the <literal>reloadxml</literal> command to FreeSWITCH when configuration directory changes (instead of restart).
-
See <link xlink:href="https://freeswitch.org/confluence/display/FREESWITCH/Reloading">FreeSWITCH documentation</link> for more info.
-
The configuration directory is exposed at <filename>/etc/freeswitch</filename>.
-
See also <literal>systemd.services.*.restartIfChanged</literal>.
+
description = lib.mdDoc ''
+
Issue the `reloadxml` command to FreeSWITCH when configuration directory changes (instead of restart).
+
See [FreeSWITCH documentation](https://freeswitch.org/confluence/display/FREESWITCH/Reloading) for more info.
+
The configuration directory is exposed at {file}`/etc/freeswitch`.
+
See also `systemd.services.*.restartIfChanged`.
'';
};
configTemplate = mkOption {
+12 -15
nixos/modules/services/misc/geoipupdate.nix
···
options = {
services.geoipupdate = {
enable = lib.mkEnableOption ''
-
periodic downloading of GeoIP databases using
-
<productname>geoipupdate</productname>.
+
periodic downloading of GeoIP databases using geoipupdate.
'';
interval = lib.mkOption {
···
ProxyUserPassword = { _secret = "/run/keys/proxy_pass"; };
}
'';
-
description = ''
-
<productname>geoipupdate</productname> configuration
-
options. See
-
<link xlink:href="https://github.com/maxmind/geoipupdate/blob/main/doc/GeoIP.conf.md"/>
+
description = lib.mdDoc ''
+
geoipupdate configuration options. See
+
<https://github.com/maxmind/geoipupdate/blob/main/doc/GeoIP.conf.md>
for a full list of available options.
Settings containing secret data should be set to an
attribute set containing the attribute
-
<literal>_secret</literal> - a string pointing to a file
+
`_secret` - a string pointing to a file
containing the value the option should be set to. See the
example to get a better picture of this: in the resulting
-
<filename>GeoIP.conf</filename> file, the
-
<literal>ProxyUserPassword</literal> key will be set to the
+
{file}`GeoIP.conf` file, the
+
`ProxyUserPassword` key will be set to the
contents of the
-
<filename>/run/keys/proxy_pass</filename> file.
+
{file}`/run/keys/proxy_pass` file.
'';
type = lib.types.submodule {
freeformType =
···
LicenseKey = lib.mkOption {
type = with lib.types; either path (attrsOf path);
-
description = ''
-
A file containing the
-
<productname>MaxMind</productname> license key.
+
description = lib.mdDoc ''
+
A file containing the MaxMind license key.
Always handled as a secret whether the value is
-
wrapped in a <literal>{ _secret = ...; }</literal>
-
attrset or not (refer to <xref linkend="opt-services.geoipupdate.settings"/> for
+
wrapped in a `{ _secret = ...; }`
+
attrset or not (refer to [](#opt-services.geoipupdate.settings) for
details).
'';
apply = x: if isAttrs x then x else { _secret = x; };
+6 -6
nixos/modules/services/misc/gitea.nix
···
file = mkOption {
type = types.nullOr types.str;
default = null;
-
description = "Filename to be used for the dump. If `null` a default name is choosen by gitea.";
+
description = lib.mdDoc "Filename to be used for the dump. If `null` a default name is choosen by gitea.";
example = "gitea-dump";
};
};
···
default = "${cfg.stateDir}/log";
defaultText = literalExpression ''"''${config.${opt.stateDir}}/log"'';
type = types.str;
-
description = "Root path for log files.";
+
description = lib.mdDoc "Root path for log files.";
};
LEVEL = mkOption {
default = "Info";
type = types.enum [ "Trace" "Debug" "Info" "Warn" "Error" "Critical" ];
-
description = "General log level.";
+
description = lib.mdDoc "General log level.";
};
};
···
DISABLE_SSH = mkOption {
type = types.bool;
default = false;
-
description = "Disable external SSH feature.";
+
description = lib.mdDoc "Disable external SSH feature.";
};
SSH_PORT = mkOption {
type = types.int;
default = 22;
example = 2222;
-
description = ''
+
description = lib.mdDoc ''
SSH port displayed in clone URL.
The option is required to configure a service when the external visible port
differs from the local listening port i.e. if port forwarding is used.
···
COOKIE_SECURE = mkOption {
type = types.bool;
default = false;
-
description = ''
+
description = lib.mdDoc ''
Marks session cookies as "secure" as a hint for browsers to only send
them via HTTPS. This option is recommend, if gitea is being served over HTTPS.
'';
+6 -8
nixos/modules/services/misc/gitlab.nix
···
default = 0;
example = 48;
apply = x: x * 60 * 60;
-
description = ''
+
description = lib.mdDoc ''
How long to keep the backups around, in
-
hours. <literal>0</literal> means <quote>keep
-
forever</quote>.
+
hours. `0` means “keep forever”.
'';
};
···
databaseHost = mkOption {
type = types.str;
default = "";
-
description = ''
-
GitLab database hostname. An empty string means <quote>use
-
local unix socket connection</quote>.
+
description = lib.mdDoc ''
+
GitLab database hostname. An empty string means
+
“use local unix socket connection”.
'';
};
···
description = ''
The number of worker processes Puma should spawn. This
controls the amount of parallel Ruby code can be
-
executed. GitLab recommends <quote>Number of CPU cores -
-
1</quote>, but at least two.
+
executed. GitLab recommends <literal>Number of CPU cores - 1</literal>, but at least two.
<note>
<para>
+12 -13
nixos/modules/services/misc/gitolite.nix
···
enable = mkOption {
type = types.bool;
default = false;
-
description = ''
+
description = lib.mdDoc ''
Enable gitolite management under the
-
<literal>gitolite</literal> user. After
+
`gitolite` user. After
switching to a configuration with Gitolite enabled, you can
-
then run <literal>git clone
-
gitolite@host:gitolite-admin.git</literal> to manage it further.
+
then run `git clone gitolite@host:gitolite-admin.git` to manage it further.
'';
};
···
@{$RC{ENABLE}} = grep { $_ ne 'desc' } @{$RC{ENABLE}}; # disable the command/feature
'''
'';
-
description = ''
-
Extra configuration to append to the default <literal>~/.gitolite.rc</literal>.
+
description = lib.mdDoc ''
+
Extra configuration to append to the default `~/.gitolite.rc`.
-
This should be Perl code that modifies the <literal>%RC</literal>
-
configuration variable. The default <literal>~/.gitolite.rc</literal>
-
content is generated by invoking <literal>gitolite print-default-rc</literal>,
+
This should be Perl code that modifies the `%RC`
+
configuration variable. The default `~/.gitolite.rc`
+
content is generated by invoking `gitolite print-default-rc`,
and extra configuration from this option is appended to it. The result
-
is placed to Nix store, and the <literal>~/.gitolite.rc</literal> file
+
is placed to Nix store, and the `~/.gitolite.rc` file
becomes a symlink to it.
If you already have a customized (or otherwise changed)
-
<literal>~/.gitolite.rc</literal> file, NixOS will refuse to replace
+
`~/.gitolite.rc` file, NixOS will refuse to replace
it with a symlink, and the `gitolite-init` initialization service
will fail. In this situation, in order to use this option, you
will need to take any customizations you may have in
-
<literal>~/.gitolite.rc</literal>, convert them to appropriate Perl
+
`~/.gitolite.rc`, convert them to appropriate Perl
statements, add them to this option, and remove the file.
-
See also the <literal>enableGitAnnex</literal> option.
+
See also the `enableGitAnnex` option.
'';
};
+1 -1
nixos/modules/services/misc/klipper.nix
···
'';
configFile = mkOption {
type = path;
-
description = "Path to firmware config which is generated using `klipper-genconf`";
+
description = lib.mdDoc "Path to firmware config which is generated using `klipper-genconf`";
};
};
});
+10 -10
nixos/modules/services/misc/nix-daemon.nix
···
type = types.nullOr types.str;
default = null;
example = "/root/.ssh/id_buildhost_builduser";
-
description = ''
+
description = lib.mdDoc ''
The path to the SSH private key with which to authenticate on
the build machine. The private key must not have a passphrase.
If null, the building user (root on NixOS machines) must have an
···
trusted-public-keys = mkOption {
type = types.listOf types.str;
example = [ "hydra.nixos.org-1:CNHJZBh9K4tP3EKF6FkkgeVYsS3ohTl+oS0Qa8bezVs=" ];
-
description = ''
+
description = lib.mdDoc ''
List of public keys used to sign binary caches. If
-
<option>nix.settings.trusted-public-keys</option> is enabled,
+
{option}`nix.settings.trusted-public-keys` is enabled,
then Nix will use a binary from a binary cache if and only
-
if it is signed by <emphasis>any</emphasis> of the keys
+
if it is signed by *any* of the keys
listed here. By default, only the key for
-
<uri>cache.nixos.org</uri> is included.
+
`cache.nixos.org` is included.
'';
};
···
type = types.listOf types.str;
default = [ "*" ];
example = [ "@wheel" "@builders" "alice" "bob" ];
-
description = ''
+
description = lib.mdDoc ''
A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon. As with
-
<option>nix.settings.trusted-users</option>, you can specify groups by
-
prefixing them with <literal>@</literal>. Also, you can
-
allow all users by specifying <literal>*</literal>. The
-
default is <literal>*</literal>. Note that trusted users are
+
{option}`nix.settings.trusted-users`, you can specify groups by
+
prefixing them with `@`. Also, you can
+
allow all users by specifying `*`. The
+
default is `*`. Note that trusted users are
always allowed to connect.
'';
};
+1 -1
nixos/modules/services/misc/rmfakecloud.nix
···
type = with types; attrsOf str;
default = { };
example = { DATADIR = "/custom/path/for/rmfakecloud/data"; };
-
description = ''
+
description = lib.mdDoc ''
Extra settings in the form of a set of key-value pairs.
For tokens and secrets, use `environmentFile` instead.
+1 -1
nixos/modules/services/misc/zoneminder.nix
···
webserver = mkOption {
type = types.enum [ "nginx" "none" ];
default = "nginx";
-
description = ''
+
description = lib.mdDoc ''
The webserver to configure for the PHP frontend.
Set it to `none` if you want to configure it yourself. PRs are welcome
+1 -1
nixos/modules/services/monitoring/collectd.nix
···
buildMinimalPackage = mkOption {
default = false;
-
description = ''
+
description = lib.mdDoc ''
Build a minimal collectd package with only the configured `services.collectd.plugins`
'';
type = bool;
+2 -2
nixos/modules/services/monitoring/datadog-agent.nix
···
package = mkOption {
default = pkgs.datadog-agent;
defaultText = literalExpression "pkgs.datadog-agent";
-
description = ''
+
description = lib.mdDoc ''
Which DataDog v7 agent package to use. Note that the provided
package is expected to have an overridable `pythonPackages`-attribute
which configures the Python environment with the Datadog
···
};
checks = mkOption {
-
description = ''
+
description = lib.mdDoc ''
Configuration for all Datadog checks. Keys of this attribute
set will be used as the name of the check to create the
appropriate configuration in `conf.d/$check.d/conf.yaml`.
+2 -2
nixos/modules/services/monitoring/grafana-agent.nix
···
};
settings = mkOption {
-
description = ''
-
Configuration for <package>grafana-agent</package>.
+
description = lib.mdDoc ''
+
Configuration for `grafana-agent`.
See https://grafana.com/docs/agent/latest/configuration/
'';
+6 -6
nixos/modules/services/monitoring/grafana-image-renderer.nix
···
default = "default";
type = types.enum [ "default" "reusable" "clustered" ];
description = ''
-
Rendering mode of <package>grafana-image-renderer</package>:
+
Rendering mode of <literal>grafana-image-renderer</literal>:
<itemizedlist>
<listitem><para><literal>default:</literal> Creates on browser-instance
per rendering request.</para></listitem>
···
args = mkOption {
type = types.listOf types.str;
default = [ "--no-sandbox" ];
-
description = ''
-
List of CLI flags passed to <package>chromium</package>.
+
description = lib.mdDoc ''
+
List of CLI flags passed to `chromium`.
'';
};
};
···
default = {};
-
description = ''
-
Configuration attributes for <package>grafana-image-renderer</package>.
+
description = lib.mdDoc ''
+
Configuration attributes for `grafana-image-renderer`.
-
See <link xlink:href="https://github.com/grafana/grafana-image-renderer/blob/ce1f81438e5f69c7fd7c73ce08bab624c4c92e25/default.json"/>
+
See <https://github.com/grafana/grafana-image-renderer/blob/ce1f81438e5f69c7fd7c73ce08bab624c4c92e25/default.json>
for supported values.
'';
};
+2 -2
nixos/modules/services/monitoring/mackerel-agent.nix
···
apiKeyFile = mkOption {
type = types.path;
example = "/run/keys/mackerel-api-key";
-
description = ''
+
description = lib.mdDoc ''
Path to file containing the Mackerel API key. The file should contain a
single line of the following form:
-
<literallayout>apikey = "EXAMPLE_API_KEY"</literallayout>
+
`apikey = "EXAMPLE_API_KEY"`
'';
};
+11 -11
nixos/modules/services/monitoring/nagios.nix
···
enable = mkEnableOption ''<link xlink:href="http://www.nagios.org/">Nagios</link> to monitor your system or network.'';
objectDefs = mkOption {
-
description = "
+
description = lib.mdDoc ''
A list of Nagios object configuration files that must define
the hosts, host groups, services and contacts for the
network that you want Nagios to monitor.
-
";
+
'';
type = types.listOf types.path;
example = literalExpression "[ ./objects.cfg ]";
};
···
type = types.listOf types.package;
default = with pkgs; [ monitoring-plugins msmtp mailutils ];
defaultText = literalExpression "[pkgs.monitoring-plugins pkgs.msmtp pkgs.mailutils]";
-
description = "
+
description = ''
Packages to be added to the Nagios <envar>PATH</envar>.
Typically used to add plugins, but can be anything.
-
";
+
'';
};
mainConfigFile = mkOption {
type = types.nullOr types.package;
default = null;
-
description = "
+
description = lib.mdDoc ''
If non-null, overrides the main configuration file of Nagios.
-
";
+
'';
};
extraConfig = mkOption {
···
type = types.package;
default = nagiosCGICfgFile;
defaultText = literalExpression "nagiosCGICfgFile";
-
description = "
+
description = lib.mdDoc ''
Derivation for the configuration file of Nagios CGI scripts
that can be used in web servers for running the Nagios web interface.
-
";
+
'';
};
enableWebInterface = mkOption {
type = types.bool;
default = false;
-
description = "
+
description = lib.mdDoc ''
Whether to enable the Nagios web interface. You should also
-
enable Apache (<option>services.httpd.enable</option>).
-
";
+
enable Apache ({option}`services.httpd.enable`).
+
'';
};
virtualHost = mkOption {
+8 -9
nixos/modules/services/monitoring/prometheus/default.nix
···
authorization = mkOption {
type = types.nullOr types.attrs;
default = null;
-
description = ''
+
description = lib.mdDoc ''
Sets the `Authorization` header on every scrape request with the configured credentials.
'';
};
···
promTypes.dockerswarm_sd_config = mkDockerSdConfigModule {
role = mkOption {
type = types.enum [ "services" "tasks" "nodes" ];
-
description = ''
+
description = lib.mdDoc ''
Role of the targets to retrieve. Must be `services`, `tasks`, or `nodes`.
'';
};
···
role = mkOption {
type = types.enum [ "instance" "baremetal" ];
-
description = ''
+
description = lib.mdDoc ''
Role of the targets to retrieve. Must be `instance` or `baremetal`.
'';
};
···
type = with types; either bool (enum [ "syntax-only" ]);
default = true;
example = "syntax-only";
-
description = ''
-
Check configuration with <literal>promtool
-
check</literal>. The call to <literal>promtool</literal> is
+
description = lib.mdDoc ''
+
Check configuration with `promtool check`. The call to `promtool` is
subject to sandboxing by Nix.
If you use credentials stored in external files
-
(<literal>password_file</literal>, <literal>bearer_token_file</literal>, etc),
-
they will not be visible to <literal>promtool</literal>
+
(`password_file`, `bearer_token_file`, etc),
+
they will not be visible to `promtool`
and it will report errors, despite a correct configuration.
-
To resolve this, you may set this option to <literal>"syntax-only"</literal>
+
To resolve this, you may set this option to `"syntax-only"`
in order to only syntax check the Prometheus configuration.
'';
};
+4 -4
nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
···
work with this exporter:
<programlisting>
{
-
<xref linkend="opt-services.prometheus.exporters.dovecot.enable"/> = true;
-
<xref linkend="opt-services.prometheus.exporters.dovecot.socketPath"/> = "/var/run/dovecot2/old-stats";
-
<xref linkend="opt-services.dovecot2.mailPlugins.globally.enable"/> = [ "old_stats" ];
-
<xref linkend="opt-services.dovecot2.extraConfig"/> = '''
+
services.prometheus.exporters.dovecot.enable = true;
+
services.prometheus.exporters.dovecot.socketPath = "/var/run/dovecot2/old-stats";
+
services.dovecot2.mailPlugins.globally.enable = [ "old_stats" ];
+
services.dovecot2.extraConfig = '''
service old-stats {
unix_listener old-stats {
user = dovecot-exporter
+2 -2
nixos/modules/services/monitoring/prometheus/exporters/knot.nix
···
type = types.str;
default = "${pkgs.knot-dns.out}/lib/libknot.so";
defaultText = literalExpression ''"''${pkgs.knot-dns.out}/lib/libknot.so"'';
-
description = ''
-
Path to the library of <package>knot-dns</package>.
+
description = lib.mdDoc ''
+
Path to the library of `knot-dns`.
'';
};
+1 -1
nixos/modules/services/monitoring/prometheus/exporters/mail.nix
···
It's possible to work around the issue with a config like this:
<programlisting>
{
-
<link linkend="opt-services.rspamd.locals._name_.text">services.rspamd.locals."multimap.conf".text</link> = '''
+
services.rspamd.locals."multimap.conf".text = '''
ALLOWLIST_PROMETHEUS {
filter = "email:domain:tld";
type = "from";
+1 -1
nixos/modules/services/monitoring/prometheus/exporters/nginxlog.nix
···
settings = mkOption {
type = types.attrs;
default = {};
-
description = ''
+
description = lib.mdDoc ''
All settings of nginxlog expressed as an Nix attrset.
Check the official documentation for the corresponding YAML
+5 -5
nixos/modules/services/monitoring/prometheus/exporters/openldap.nix
···
example = "/run/keys/ldap_pass";
description = ''
Environment file to contain the credentials to authenticate against
-
<package>openldap</package>.
+
<literal>openldap</literal>.
The file should look like this:
<programlisting>
···
default = "tcp";
example = "udp";
type = types.str;
-
description = ''
-
Which protocol to use to connect against <package>openldap</package>.
+
description = lib.mdDoc ''
+
Which protocol to use to connect against `openldap`.
'';
};
ldapAddr = mkOption {
default = "localhost:389";
type = types.str;
-
description = ''
-
Address of the <package>openldap</package>-instance.
+
description = lib.mdDoc ''
+
Address of the `openldap`-instance.
'';
};
metricsPath = mkOption {
+1 -1
nixos/modules/services/monitoring/riemann-tools.nix
···
extraArgs = mkOption {
type = types.listOf types.str;
default = [];
-
description = ''
+
description = lib.mdDoc ''
A list of commandline-switches forwarded to a riemann-tool.
See for example `riemann-health --help` for available options.
'';
+3 -3
nixos/modules/services/network-filesystems/xtreemfs.nix
···
uuid = mkOption {
example = "eacb6bab-f444-4ebf-a06a-3f72d7465e40";
type = types.str;
-
description = ''
+
description = lib.mdDoc ''
Must be set to a unique identifier, preferably a UUID according to
RFC 4122. UUIDs can be generated with `uuidgen` command, found in
the `util-linux` package.
···
uuid = mkOption {
example = "eacb6bab-f444-4ebf-a06a-3f72d7465e41";
type = types.str;
-
description = ''
+
description = lib.mdDoc ''
Must be set to a unique identifier, preferably a UUID according to
RFC 4122. UUIDs can be generated with `uuidgen` command, found in
the `util-linux` package.
···
uuid = mkOption {
example = "eacb6bab-f444-4ebf-a06a-3f72d7465e42";
type = types.str;
-
description = ''
+
description = lib.mdDoc ''
Must be set to a unique identifier, preferably a UUID according to
RFC 4122. UUIDs can be generated with `uuidgen` command, found in
the `util-linux` package.
+2 -2
nixos/modules/services/network-filesystems/yandex-disk.nix
···
enable = mkOption {
type = types.bool;
default = false;
-
description = "
+
description = lib.mdDoc ''
Whether to enable Yandex-disk client. See https://disk.yandex.ru/
-
";
+
'';
};
username = mkOption {
+20 -20
nixos/modules/services/networking/bind.nix
···
cacheNetworks = mkOption {
default = [ "127.0.0.0/24" ];
type = types.listOf types.str;
-
description = "
+
description = lib.mdDoc ''
What networks are allowed to use us as a resolver. Note
that this is for recursive queries -- all networks are
allowed to query zones configured with the `zones` option.
It is recommended that you limit cacheNetworks to avoid your
server being used for DNS amplification attacks.
-
";
+
'';
};
blockedNetworks = mkOption {
default = [ ];
type = types.listOf types.str;
-
description = "
+
description = lib.mdDoc ''
What networks are just blocked.
-
";
+
'';
};
ipv4Only = mkOption {
default = false;
type = types.bool;
-
description = "
+
description = lib.mdDoc ''
Only use ipv4, even if the host supports ipv6.
-
";
+
'';
};
forwarders = mkOption {
default = config.networking.nameservers;
defaultText = literalExpression "config.networking.nameservers";
type = types.listOf types.str;
-
description = "
+
description = lib.mdDoc ''
List of servers we should forward requests to.
-
";
+
'';
};
forward = mkOption {
default = "first";
type = types.enum ["first" "only"];
-
description = "
+
description = lib.mdDoc ''
Whether to forward 'first' (try forwarding but lookup directly if forwarding fails) or 'only'.
-
";
+
'';
};
listenOn = mkOption {
default = [ "any" ];
type = types.listOf types.str;
-
description = "
+
description = lib.mdDoc ''
Interfaces to listen on.
-
";
+
'';
};
listenOnIpv6 = mkOption {
default = [ "any" ];
type = types.listOf types.str;
-
description = "
+
description = lib.mdDoc ''
Ipv6 interfaces to listen on.
-
";
+
'';
};
directory = mkOption {
···
zones = mkOption {
default = [ ];
type = with types; coercedTo (listOf attrs) bindZoneCoerce (attrsOf (types.submodule bindZoneOptions));
-
description = "
+
description = lib.mdDoc ''
List of zones we claim authority over.
-
";
+
'';
example = {
"example.com" = {
master = false;
···
extraConfig = mkOption {
type = types.lines;
default = "";
-
description = "
+
description = lib.mdDoc ''
Extra lines to be added verbatim to the generated named configuration file.
-
";
+
'';
};
extraOptions = mkOption {
···
type = types.path;
default = confFile;
defaultText = literalExpression "confFile";
-
description = "
+
description = lib.mdDoc ''
Overridable config file to use for named. By default, that
generated by nixos.
-
";
+
'';
};
};
+1 -1
nixos/modules/services/networking/cloudflare-dyndns.nix
···
apiTokenFile = mkOption {
type = types.nullOr types.str;
default = null;
-
description = ''
+
description = lib.mdDoc ''
The path to a file containing the CloudFlare API token.
The file must have the form `CLOUDFLARE_API_TOKEN=...`
+3 -3
nixos/modules/services/networking/create_ap.nix
···
settings = mkOption {
type = with types; attrsOf (oneOf [ int bool str ]);
default = {};
-
description = ''
-
Configuration for <package>create_ap</package>.
-
See <link xlink:href="https://raw.githubusercontent.com/lakinduakash/linux-wifi-hotspot/master/src/scripts/create_ap.conf">upstream example configuration</link>
+
description = lib.mdDoc ''
+
Configuration for `create_ap`.
+
See [upstream example configuration](https://raw.githubusercontent.com/lakinduakash/linux-wifi-hotspot/master/src/scripts/create_ap.conf)
for supported values.
'';
example = {
+1 -1
nixos/modules/services/networking/dhcpcd.nix
···
type = types.lines;
default = "";
example = "if [[ $reason =~ BOUND ]]; then echo $interface: Routers are $new_routers - were $old_routers; fi";
-
description = ''
+
description = lib.mdDoc ''
Shell code that will be run after all other hooks. See
`man dhcpcd-run-hooks` for details on what is possible.
'';
+1 -1
nixos/modules/services/networking/ferm.nix
···
enable = mkOption {
default = false;
type = types.bool;
-
description = ''
+
description = lib.mdDoc ''
Whether to enable Ferm Firewall.
*Warning*: Enabling this service WILL disable the existing NixOS
firewall! Default firewall rules provided by packages are not
+23 -23
nixos/modules/services/networking/firefox-syncserver.nix
···
type = lib.types.package;
default = pkgs.syncstorage-rs;
defaultText = lib.literalExpression "pkgs.syncstorage-rs";
-
description = ''
+
description = lib.mdDoc ''
Package to use.
'';
};
···
# behavior ever change.
type = lib.types.strMatching "[a-z_][a-z0-9_]*";
default = defaultDatabase;
-
description = ''
+
description = lib.mdDoc ''
Database to use for storage. Will be created automatically if it does not exist
-
and <literal>config.${opt.database.createLocally}</literal> is set.
+
and `config.${opt.database.createLocally}` is set.
'';
};
database.user = lib.mkOption {
type = lib.types.str;
default = defaultUser;
-
description = ''
+
description = lib.mdDoc ''
Username for database connections.
'';
};
···
database.host = lib.mkOption {
type = lib.types.str;
default = "localhost";
-
description = ''
-
Database host name. <literal>localhost</literal> is treated specially and inserts
+
description = lib.mdDoc ''
+
Database host name. `localhost` is treated specially and inserts
systemd dependencies, other hostnames or IP addresses of the local machine do not.
'';
};
···
database.createLocally = lib.mkOption {
type = lib.types.bool;
default = true;
-
description = ''
+
description = lib.mdDoc ''
Whether to create database and user on the local machine if they do not exist.
This includes enabling unix domain socket authentication for the configured user.
'';
···
logLevel = lib.mkOption {
type = lib.types.str;
default = "error";
-
description = ''
-
Log level to run with. This can be a simple log level like <literal>error</literal>
-
or <literal>trace</literal>, or a more complicated logging expression.
+
description = lib.mdDoc ''
+
Log level to run with. This can be a simple log level like `error`
+
or `trace`, or a more complicated logging expression.
'';
};
secrets = lib.mkOption {
type = lib.types.path;
-
description = ''
+
description = lib.mdDoc ''
A file containing the various secrets. Should be in the format expected by systemd's
-
<literal>EnvironmentFile</literal> directory. Two secrets are currently available:
-
<literal>SYNC_MASTER_SECRET</literal> and
-
<literal>SYNC_TOKENSERVER__FXA_METRICS_HASH_SECRET</literal>.
+
`EnvironmentFile` directory. Two secrets are currently available:
+
`SYNC_MASTER_SECRET` and
+
`SYNC_TOKENSERVER__FXA_METRICS_HASH_SECRET`.
'';
};
···
hostname = lib.mkOption {
type = lib.types.str;
-
description = ''
+
description = lib.mdDoc ''
Host name to use for this service.
'';
};
···
capacity = lib.mkOption {
type = lib.types.ints.unsigned;
default = 10;
-
description = ''
+
description = lib.mdDoc ''
How many sync accounts are allowed on this server. Setting this value
equal to or less than the number of currently active accounts will
effectively deny service to accounts not yet registered here.
···
defaultText = lib.literalExpression ''
''${if cfg.singleNode.enableTLS then "https" else "http"}://''${config.${opt.singleNode.hostname}}
'';
-
description = ''
+
description = lib.mdDoc ''
URL of the host. If you are not using the automatic webserver proxy setup you will have
to change this setting or your sync server may not be functional.
'';
···
port = lib.mkOption {
type = lib.types.port;
default = 5000;
-
description = ''
+
description = lib.mdDoc ''
Port to bind to.
'';
};
···
tokenserver.enabled = lib.mkOption {
type = lib.types.bool;
default = true;
-
description = ''
+
description = lib.mdDoc ''
Whether to enable the token service as well.
'';
};
};
};
default = { };
-
description = ''
+
description = lib.mdDoc ''
Settings for the sync server. These take priority over values computed
from NixOS options.
-
See the doc comments on the <literal>Settings</literal> structs in
-
<link xlink:href="https://github.com/mozilla-services/syncstorage-rs/blob/master/syncstorage/src/settings.rs" />
+
See the doc comments on the `Settings` structs in
+
<https://github.com/mozilla-services/syncstorage-rs/blob/master/syncstorage/src/settings.rs>
and
-
<link xlink:href="https://github.com/mozilla-services/syncstorage-rs/blob/master/syncstorage/src/tokenserver/settings.rs" />
+
<https://github.com/mozilla-services/syncstorage-rs/blob/master/syncstorage/src/tokenserver/settings.rs>
for available options.
'';
};
+1 -1
nixos/modules/services/networking/fireqos.nix
···
enable = mkOption {
type = types.bool;
default = false;
-
description = ''
+
description = lib.mdDoc ''
If enabled, FireQOS will be launched with the specified
configuration given in `config`.
'';
+3 -3
nixos/modules/services/networking/ghostunnel.nix
···
};
keystore = mkOption {
-
description = ''
+
description = lib.mdDoc ''
Path to keystore (combined PEM with cert/key, or PKCS12 keystore).
-
NB: storepass is not supported because it would expose credentials via <literal>/proc/*/cmdline</literal>.
+
NB: storepass is not supported because it would expose credentials via `/proc/*/cmdline`.
-
Specify this or <literal>cert</literal> and <literal>key</literal>.
+
Specify this or `cert` and `key`.
'';
type = types.nullOr types.str;
default = null;
+1 -1
nixos/modules/services/networking/gnunet.nix
···
extraOptions = mkOption {
type = types.lines;
default = "";
-
description = ''
+
description = lib.mdDoc ''
Additional options that will be copied verbatim in `gnunet.conf'.
See `gnunet.conf(5)' for details.
'';
+1 -1
nixos/modules/services/networking/headscale.nix
···
magicDns = mkOption {
type = types.bool;
default = true;
-
description = ''
+
description = lib.mdDoc ''
Whether to use [MagicDNS](https://tailscale.com/kb/1081/magicdns/).
Only works if there is at least a nameserver defined.
'';
+2 -2
nixos/modules/services/networking/hylafax/options.nix
···
InternationalPrefix = "00";
LongDistancePrefix = "0";
};
-
description = ''
+
description = lib.mdDoc ''
Attribute set of default values for
-
modem config files <filename>etc/config.*</filename>.
+
modem config files {file}`etc/config.*`.
${commonDescr}
Think twice before changing
paths of fax-processing scripts.
+16 -16
nixos/modules/services/networking/ircd-hybrid/default.nix
···
serverName = mkOption {
default = "hades.arpa";
type = types.str;
-
description = "
+
description = lib.mdDoc ''
IRCD server name.
-
";
+
'';
};
sid = mkOption {
default = "0NL";
type = types.str;
-
description = "
+
description = lib.mdDoc ''
IRCD server unique ID in a net of servers.
-
";
+
'';
};
description = mkOption {
default = "Hybrid-7 IRC server.";
type = types.str;
-
description = "
+
description = lib.mdDoc ''
IRCD server description.
-
";
+
'';
};
rsaKey = mkOption {
default = null;
example = literalExpression "/root/certificates/irc.key";
type = types.nullOr types.path;
-
description = "
+
description = lib.mdDoc ''
IRCD server RSA key.
-
";
+
'';
};
certificate = mkOption {
default = null;
example = literalExpression "/root/certificates/irc.pem";
type = types.nullOr types.path;
-
description = "
+
description = lib.mdDoc ''
IRCD server SSL certificate. There are some limitations - read manual.
-
";
+
'';
};
adminEmail = mkOption {
default = "<bit-bucket@example.com>";
type = types.str;
example = "<name@domain.tld>";
-
description = "
+
description = lib.mdDoc ''
IRCD server administrator e-mail.
-
";
+
'';
};
extraIPs = mkOption {
default = [];
example = ["127.0.0.1"];
type = types.listOf types.str;
-
description = "
+
description = lib.mdDoc ''
Extra IP's to bind.
-
";
+
'';
};
extraPort = mkOption {
default = "7117";
type = types.str;
-
description = "
+
description = lib.mdDoc ''
Extra port to avoid filtering.
-
";
+
'';
};
};
+1 -1
nixos/modules/services/networking/iscsi/root-initiator.nix
···
};
extraConfigFile = mkOption {
-
description = ''
+
description = lib.mdDoc ''
Append an additional file's contents to `/etc/iscsid.conf`. Use a non-store path
and store passwords in this file. Note: the file specified here must be available
in the initrd, see: `boot.initrd.secrets`.
+2 -2
nixos/modules/services/networking/kresd.nix
···
};
package = mkOption {
type = types.package;
-
description = "
+
description = lib.mdDoc ''
knot-resolver package to use.
-
";
+
'';
default = pkgs.knot-resolver;
defaultText = literalExpression "pkgs.knot-resolver";
example = literalExpression "pkgs.knot-resolver.override { extraFeatures = true; }";
+1 -1
nixos/modules/services/networking/lokinet.nix
···
network.exit-node = [ "example.loki" "example2.loki" ];
}
'';
-
description = ''
+
description = lib.mdDoc ''
Configuration for Lokinet.
Currently, the best way to view the available settings is by
generating a config file using `lokinet -g`.
+1 -1
nixos/modules/services/networking/monero.nix
···
exclusiveNodes = mkOption {
type = types.listOf types.str;
default = [ ];
-
description = ''
+
description = lib.mdDoc ''
List of peer IP addresses to connect to *only*.
If given the other peer options will be ignored.
'';
+1 -1
nixos/modules/services/networking/murmur.nix
···
registerHostname = mkOption {
type = types.str;
default = "";
-
description = ''
+
description = lib.mdDoc ''
DNS hostname where your server can be reached. This is only
needed if you want your server to be accessed by its
hostname and not IP - but the name *must* resolve on the
+2 -2
nixos/modules/services/networking/mxisd.nix
···
environmentFile = mkOption {
type = types.nullOr types.str;
default = null;
-
description = ''
+
description = lib.mdDoc ''
Path to an environment-file which may contain secrets to be
-
substituted via <package>envsubst</package>.
+
substituted via `envsubst`.
'';
};
+1 -1
nixos/modules/services/networking/nar-serve.nix
···
cacheURL = mkOption {
type = types.str;
default = "https://cache.nixos.org/";
-
description = ''
+
description = lib.mdDoc ''
Binary cache URL to connect to.
The URL format is compatible with the nix remote url style, such as:
+2 -2
nixos/modules/services/networking/ncdns.nix
···
description = ''
Path to the file containing the KSK public key.
The key can be generated using the <literal>dnssec-keygen</literal>
-
command, provided by the package <package>bind</package> as follows:
+
command, provided by the package <literal>bind</literal> as follows:
<programlisting>
$ dnssec-keygen -a RSASHA256 -3 -b 2048 -f KSK bit
</programlisting>
···
description = ''
Path to the file containing the ZSK public key.
The key can be generated using the <literal>dnssec-keygen</literal>
-
command, provided by the package <package>bind</package> as follows:
+
command, provided by the package <literal>bind</literal> as follows:
<programlisting>
$ dnssec-keygen -a RSASHA256 -3 -b 2048 bit
</programlisting>
+2 -2
nixos/modules/services/networking/nix-serve.nix
···
The path to the file used for signing derivation data.
Generate with:
-
```
+
<programlisting>
nix-store --generate-binary-cache-key key-name secret-key-file public-key-file
-
```
+
</programlisting>
For more details see <citerefentry><refentrytitle>nix-store</refentrytitle><manvolnum>1</manvolnum></citerefentry>.
'';
+1 -1
nixos/modules/services/networking/nixops-dns.nix
···
dnsmasq = mkOption {
type = types.bool;
default = true;
-
description = ''
+
description = lib.mdDoc ''
Enable dnsmasq forwarding to nixops-dns. This allows to use
nixops-dns for `services.nixops-dns.domain` resolution
while forwarding the rest of the queries to original resolvers.
+1 -1
nixos/modules/services/networking/ocserv.nix
···
config = mkOption {
type = types.lines;
-
description = ''
+
description = lib.mdDoc ''
Configuration content to start an OCServ server.
For a full configuration reference,please refer to the online documentation
+2 -2
nixos/modules/services/networking/redsocks.nix
···
type = types.str;
default = "stderr";
description =
-
''
+
lib.mdDoc ''
Where to send logs.
Possible values are:
···
"Forwarded_ipport" ];
default = "false";
description =
-
''
+
lib.mdDoc ''
Way to disclose client IP to the proxy.
- "false": do not disclose
http-connect supports the following ways:
+9 -9
nixos/modules/services/networking/resilio.nix
···
];
}
];
-
description = ''
+
description = lib.mdDoc ''
Shared folder list. If enabled, web UI must be
-
disabled. Secrets can be generated using <literal>rslsync
-
--generate-secret</literal>. Note that this secret will be
+
disabled. Secrets can be generated using `rslsync --generate-secret`.
+
Note that this secret will be
put inside the Nix store, so it is realistically not very
secret.
If you would like to be able to modify the contents of this
directories, it is recommended that you make your user a
-
member of the <literal>rslsync</literal> group.
+
member of the `rslsync` group.
Directories in this list should be in the
-
<literal>rslsync</literal> group, and that group must have
+
`rslsync` group, and that group must have
write access to the directory. It is also recommended that
-
<literal>chmod g+s</literal> is applied to the directory
+
`chmod g+s` is applied to the directory
so that any sub directories created will also belong to
-
the <literal>rslsync</literal> group. Also,
-
<literal>setfacl -d -m group:rslsync:rwx</literal> and
-
<literal>setfacl -m group:rslsync:rwx</literal> should also
+
the `rslsync` group. Also,
+
`setfacl -d -m group:rslsync:rwx` and
+
`setfacl -m group:rslsync:rwx` should also
be applied so that the sub directories are writable by
the group.
'';
+1 -1
nixos/modules/services/networking/rpcbind.nix
···
enable = mkOption {
type = types.bool;
default = false;
-
description = ''
+
description = lib.mdDoc ''
Whether to enable `rpcbind', an ONC RPC directory service
notably used by NFS and NIS, and which can be queried
using the rpcinfo(1) command. `rpcbind` is a replacement for
+2 -2
nixos/modules/services/networking/v2ray.nix
···
protocol = "freedom";
}];
};
-
description = ''
+
description = lib.mdDoc ''
The configuration object.
Either `configFile` or `config` must be specified.
-
See <link xlink:href="https://www.v2fly.org/en_US/config/overview.html"/>.
+
See <https://www.v2fly.org/en_US/config/overview.html>.
'';
};
};
+2 -2
nixos/modules/services/networking/wpa_supplicant.nix
···
allowAuxiliaryImperativeNetworks = mkEnableOption "support for imperative & declarative networks" // {
description = ''
Whether to allow configuring networks "imperatively" (e.g. via
-
<package>wpa_supplicant_gui</package>) and declaratively via
+
<literal>wpa_supplicant_gui</literal>) and declaratively via
<xref linkend="opt-networking.wireless.networks"/>.
-
Please note that this adds a custom patch to <package>wpa_supplicant</package>.
+
Please note that this adds a custom patch to <literal>wpa_supplicant</literal>.
'';
};
+1 -1
nixos/modules/services/networking/x2goserver.nix
···
settings = mkOption {
type = types.attrsOf types.attrs;
default = {};
-
description = ''
+
description = lib.mdDoc ''
x2goserver.conf ini configuration as nix attributes. See
`x2goserver.conf(5)` for details
'';
+9 -10
nixos/modules/services/networking/yggdrasil.nix
···
"tcp://0.0.0.0:xxxxx"
];
};
-
description = ''
+
description = lib.mdDoc ''
Configuration for yggdrasil, as a Nix attribute set.
Warning: this is stored in the WORLD-READABLE Nix store!
Therefore, it is not appropriate for private keys. If you
-
wish to specify the keys, use <option>configFile</option>.
+
wish to specify the keys, use {option}`configFile`.
-
If the <option>persistentKeys</option> is enabled then the
+
If the {option}`persistentKeys` is enabled then the
keys that are generated during activation will override
-
those in <option>config</option> or
-
<option>configFile</option>.
+
those in {option}`config` or
+
{option}`configFile`.
If no keys are specified then ephemeral keys are generated
and the Yggdrasil interface will have a random IPv6 address
each time the service is started, this is the default.
-
If both <option>configFile</option> and <option>config</option>
+
If both {option}`configFile` and {option}`config`
are supplied, they will be combined, with values from
-
<option>configFile</option> taking precedence.
+
{option}`configFile` taking precedence.
-
You can use the command <literal>nix-shell -p yggdrasil --run
-
"yggdrasil -genconf"</literal> to generate default
-
configuration values with documentation.
+
You can use the command `nix-shell -p yggdrasil --run "yggdrasil -genconf"`
+
to generate default configuration values with documentation.
'';
};
+4 -4
nixos/modules/services/networking/znc/options.nix
···
type = types.listOf types.str;
default = [ "webadmin" "adminlog" ];
example = [ "partyline" "webadmin" "adminlog" "log" ];
-
description = ''
+
description = lib.mdDoc ''
A list of modules to include in the `znc.conf` file.
'';
};
···
type = types.listOf types.str;
default = [ "chansaver" "controlpanel" ];
example = [ "chansaver" "controlpanel" "fish" "push" ];
-
description = ''
+
description = lib.mdDoc ''
A list of user modules to include in the `znc.conf` file.
'';
};
···
'';
type = types.str;
description = ''
-
Generate with `nix-shell -p znc --command "znc --makepass"`.
+
Generate with <command>nix-shell -p znc --command "znc --makepass"</command>.
This is the password used to log in to the ZNC web admin interface.
You can also set this through
<option>services.znc.config.User.&lt;username&gt;.Pass.Method</option>
···
extraZncConf = mkOption {
default = "";
type = types.lines;
-
description = ''
+
description = lib.mdDoc ''
Extra config to `znc.conf` file.
'';
};
+1 -1
nixos/modules/services/search/meilisearch.nix
···
};
logLevel = mkOption {
-
description = ''
+
description = lib.mdDoc ''
Defines how much detail should be present in MeiliSearch's logs.
MeiliSearch currently supports four log levels, listed in order of increasing verbosity:
- 'ERROR': only log unexpected events indicating MeiliSearch is not functioning as expected
+1 -1
nixos/modules/services/security/fail2ban.nix
···
default = [];
type = types.listOf types.package;
example = lib.literalExpression "[ pkgs.ipset ]";
-
description = ''
+
description = lib.mdDoc ''
Extra packages to be made available to the fail2ban service. The example contains
the packages needed by the `iptables-ipset-proto6` action.
'';
+2 -2
nixos/modules/services/security/haka.nix
···
default = pkgs.haka;
defaultText = literalExpression "pkgs.haka";
type = types.package;
-
description = "
+
description = lib.mdDoc ''
Which Haka derivation to use.
-
";
+
'';
};
configFile = mkOption {
+1 -1
nixos/modules/services/security/infnoise.nix
···
enable = mkEnableOption "the Infinite Noise TRNG driver";
fillDevRandom = mkOption {
-
description = ''
+
description = lib.mdDoc ''
Whether to run the infnoise driver as a daemon to refill /dev/random.
If disabled, you can use the `infnoise` command-line tool to
+3 -3
nixos/modules/services/security/oauth2_proxy.nix
···
domains = mkOption {
type = types.listOf types.str;
default = [];
-
description = ''
+
description = lib.mdDoc ''
Authenticate emails with the specified domains. Use
-
<literal>*</literal> to authenticate any email.
+
`*` to authenticate any email.
'';
};
···
domain = mkOption {
type = types.nullOr types.str;
default = null;
-
description = ''
+
description = lib.mdDoc ''
Optional cookie domains to force cookies to (ie: `.yourcompany.com`).
The longest domain matching the request's host will be used (or the shortest
cookie domain if there is no match).
+5 -5
nixos/modules/services/security/privacyidea.nix
···
description = ''
File to load as environment file. Environment variables
from this file will be interpolated into the config file
-
using <package>envsubst</package> which is helpful for specifying
+
using <literal>envsubst</literal> which is helpful for specifying
secrets:
<programlisting>
{ <xref linkend="opt-services.privacyidea.secretKey"/> = "$SECRET"; }
···
settings = mkOption {
type = with types; attrsOf (attrsOf (oneOf [ str bool int (listOf str) ]));
default = {};
-
description = ''
-
Attribute-set containing the settings for <package>privacyidea-ldap-proxy</package>.
+
description = lib.mdDoc ''
+
Attribute-set containing the settings for `privacyidea-ldap-proxy`.
It's possible to pass secrets using env-vars as substitutes and
-
use the option <xref linkend="opt-services.privacyidea.ldap-proxy.environmentFile"/>
-
to inject them via <package>envsubst</package>.
+
use the option [](#opt-services.privacyidea.ldap-proxy.environmentFile)
+
to inject them via `envsubst`.
'';
};
+2 -2
nixos/modules/services/system/cloud-init.nix
···
btrfs.enable = mkOption {
type = types.bool;
default = false;
-
description = ''
+
description = lib.mdDoc ''
Allow the cloud-init service to operate `btrfs` filesystem.
'';
};
···
ext4.enable = mkOption {
type = types.bool;
default = true;
-
description = ''
+
description = lib.mdDoc ''
Allow the cloud-init service to operate `ext4` filesystem.
'';
};
+6 -6
nixos/modules/services/system/self-deploy.nix
···
default = null;
-
description = ''
+
description = lib.mdDoc ''
Attribute of `nixFile` that builds the current system.
'';
};
···
default = { };
-
description = ''
+
description = lib.mdDoc ''
Arguments to `nix-build` passed as `--argstr` or `--arg` depending on
the type.
'';
···
default = "switch";
-
description = ''
+
description = lib.mdDoc ''
The `switch-to-configuration` subcommand used.
'';
};
···
repository = lib.mkOption {
type = with lib.types; oneOf [ path str ];
-
description = ''
+
description = lib.mdDoc ''
The repository to fetch from. Must be properly formatted for git.
If this value is set to a path (must begin with `/`) then it's
···
default = "master";
-
description = ''
+
description = lib.mdDoc ''
Branch to track
Technically speaking any ref can be specified here, as this is
···
default = "hourly";
-
description = ''
+
description = lib.mdDoc ''
The schedule on which to run the `self-deploy` service. Format
specified by `systemd.time 7`.
+5 -5
nixos/modules/services/torrent/magnetico.nix
···
Usernames must start with a lowercase ([a-z]) ASCII character, might
contain non-consecutive underscores except at the end, and consists of
small-case a-z characters and digits 0-9. The
-
<command>htpasswd</command> tool from the <package>apacheHttpd
-
</package> package may be used to generate the hash: <command>htpasswd
-
-bnBC 12 username password</command>
+
<command>htpasswd</command> tool from the <literal>apacheHttpd</literal>
+
package may be used to generate the hash:
+
<command>htpasswd -bnBC 12 username password</command>
<warning>
<para>
···
start with a lowecase ([a-z]) ASCII character, might contain
non-consecutive underscores except at the end, and consists of
small-case a-z characters and digits 0-9.
-
The <command>htpasswd</command> tool from the <package>apacheHttpd
-
</package> package may be used to generate the hash:
+
The <command>htpasswd</command> tool from the <literal>apacheHttpd</literal>
+
package may be used to generate the hash:
<command>htpasswd -bnBC 12 username password</command>
'';
};
+10 -13
nixos/modules/services/web-apps/discourse.nix
···
max_reqs_per_ip_mode = "warn+block";
};
'';
-
description = ''
+
description = lib.mdDoc ''
Additional settings to put in the
-
<filename>discourse.conf</filename> file.
+
{file}`discourse.conf` file.
Look in the
-
<link xlink:href="https://github.com/discourse/discourse/blob/master/config/discourse_defaults.conf">discourse_defaults.conf</link>
+
[discourse_defaults.conf](https://github.com/discourse/discourse/blob/master/config/discourse_defaults.conf)
file in the upstream distribution to find available options.
-
Setting an option to <literal>null</literal> means
-
<quote>define variable, but leave right-hand side
-
empty</quote>.
+
Setting an option to `null` means
+
“define variable, but leave right-hand side empty”.
'';
};
···
host = lib.mkOption {
type = with lib.types; nullOr str;
default = null;
-
description = ''
-
Discourse database hostname. <literal>null</literal> means <quote>prefer
-
local unix socket connection</quote>.
+
description = lib.mdDoc ''
+
Discourse database hostname. `null` means
+
“prefer local unix socket connection”.
'';
};
···
discourse-github
];
'';
-
description = ''
-
Plugins to install as part of
-
<productname>Discourse</productname>, expressed as a list of
-
derivations.
+
description = lib.mdDoc ''
+
Plugins to install as part of Discourse, expressed as a list of derivations.
'';
};
+9 -9
nixos/modules/services/web-apps/hedgedoc.nix
···
allowAnonymousEdits = mkOption {
type = types.bool;
default = false;
-
description = ''
-
Whether to allow guests to edit existing notes with the `freely' permission,
-
when <option>allowAnonymous</option> is enabled.
+
description = lib.mdDoc ''
+
Whether to allow guests to edit existing notes with the `freely` permission,
+
when {option}`allowAnonymous` is enabled.
'';
};
allowFreeURL = mkOption {
···
id = mkOption {
type = types.str;
default = "";
-
description = ''
+
description = lib.mdDoc ''
Attribute map for `id'.
Defaults to `NameID' of SAML response.
'';
···
username = mkOption {
type = types.str;
default = "";
-
description = ''
+
description = lib.mdDoc ''
Attribute map for `username'.
Defaults to `NameID' of SAML response.
'';
···
email = mkOption {
type = types.str;
default = "";
-
description = ''
-
Attribute map for `email'.
-
Defaults to `NameID' of SAML response if
-
<option>identifierFormat</option> has
+
description = lib.mdDoc ''
+
Attribute map for `email`.
+
Defaults to `NameID` of SAML response if
+
{option}`identifierFormat` has
the default value.
'';
};
+3 -3
nixos/modules/services/web-apps/invidious.nix
···
nginx.enable = lib.mkOption {
type = types.bool;
default = false;
-
description = ''
+
description = lib.mdDoc ''
Whether to configure nginx as a reverse proxy for Invidious.
-
It serves it under the domain specified in <option>services.invidious.settings.domain</option> with enabled TLS and ACME.
-
Further configuration can be done through <option>services.nginx.virtualHosts.''${config.services.invidious.settings.domain}.*</option>,
+
It serves it under the domain specified in {option}`services.invidious.settings.domain` with enabled TLS and ACME.
+
Further configuration can be done through {option}`services.nginx.virtualHosts.''${config.services.invidious.settings.domain}.*`,
which can also be used to disable AMCE and TLS.
'';
};
+3 -3
nixos/modules/services/web-apps/isso.nix
···
'';
settings = mkOption {
-
description = ''
-
Configuration for <package>isso</package>.
+
description = lib.mdDoc ''
+
Configuration for `isso`.
-
See <link xlink:href="https://posativ.org/isso/docs/configuration/server/">Isso Server Configuration</link>
+
See [Isso Server Configuration](https://posativ.org/isso/docs/configuration/server/)
for supported values.
'';
+6 -6
nixos/modules/services/web-apps/mastodon.nix
···
};
user = lib.mkOption {
-
description = ''
+
description = lib.mdDoc ''
User under which mastodon runs. If it is set to "mastodon",
that user will be created, otherwise it should be set to the
name of a user created elsewhere. In both cases,
-
<package>mastodon</package> and a package containing only
-
the shell script <literal>mastodon-env</literal> will be added to
+
`mastodon` and a package containing only
+
the shell script `mastodon-env` will be added to
the user's package set. To run a command from
-
<package>mastodon</package> such as <literal>tootctl</literal>
+
`mastodon` such as `tootctl`
with the environment configured by this module use
-
<literal>mastodon-env</literal>, as in:
+
`mastodon-env`, as in:
-
<literal>mastodon-env tootctl accounts create newuser --email newuser@example.com</literal>
+
`mastodon-env tootctl accounts create newuser --email newuser@example.com`
'';
type = lib.types.str;
default = "mastodon";
+1 -1
nixos/modules/services/web-apps/matomo.nix
···
Name of the web server user that forwards requests to <option>services.phpfpm.pools.&lt;name&gt;.socket</option> the fastcgi socket for Matomo if the nginx
option is not used. Either this option or the nginx option is mandatory.
If you want to use another webserver than nginx, you need to set this to that server's user
-
and pass fastcgi requests to `index.php`, `matomo.php` and `piwik.php` (legacy name) to this socket.
+
and pass fastcgi requests to <literal>index.php</literal>, <literal>matomo.php</literal> and <literal>piwik.php</literal> (legacy name) to this socket.
'';
};
+1 -1
nixos/modules/services/web-apps/moodle.nix
···
createLocally = mkOption {
type = types.bool;
default = true;
-
description = "Create the database and database user locally.";
+
description = lib.mdDoc "Create the database and database user locally.";
};
};
+4 -4
nixos/modules/services/web-apps/nextcloud.nix
···
here because it has the side-effect that personal information is even accessible to
unauthenticated users by default.
-
By default, the following properties are set to <quote>Show to everyone</quote>
+
By default, the following properties are set to “Show to everyone”
if this flag is enabled:
<itemizedlist>
<listitem><para>About</para></listitem>
···
secretFile = mkOption {
type = types.nullOr types.str;
default = null;
-
description = ''
+
description = lib.mdDoc ''
Secret options which will be appended to nextcloud's config.php file (written as JSON, in the same
-
form as the <xref linkend="opt-services.nextcloud.extraOptions"/> option), for example
-
<programlisting>{"redis":{"password":"secret"}}</programlisting>.
+
form as the [](#opt-services.nextcloud.extraOptions) option), for example
+
`{"redis":{"password":"secret"}}`.
'';
};
+1 -1
nixos/modules/services/web-apps/nexus.nix
···
'''
'';
-
description = ''
+
description = lib.mdDoc ''
Options for the JVM written to `nexus.jvmopts`.
Please refer to the docs (https://help.sonatype.com/repomanager3/installation/configuring-the-runtime-environment)
for further information.
+8 -8
nixos/modules/services/web-apps/pgpkeyserver-lite.nix
···
default = pkgs.pgpkeyserver-lite;
defaultText = literalExpression "pkgs.pgpkeyserver-lite";
type = types.package;
-
description = "
+
description = lib.mdDoc ''
Which webgui derivation to use.
-
";
+
'';
};
hostname = mkOption {
type = types.str;
-
description = "
+
description = lib.mdDoc ''
Which hostname to set the vHost to that is proxying to sks.
-
";
+
'';
};
hkpAddress = mkOption {
default = builtins.head sksCfg.hkpAddress;
defaultText = literalExpression "head config.${sksOpt.hkpAddress}";
type = types.str;
-
description = "
+
description = lib.mdDoc ''
Wich ip address the sks-keyserver is listening on.
-
";
+
'';
};
hkpPort = mkOption {
default = sksCfg.hkpPort;
defaultText = literalExpression "config.${sksOpt.hkpPort}";
type = types.int;
-
description = "
+
description = lib.mdDoc ''
Which port the sks-keyserver is listening on.
-
";
+
'';
};
};
};
+4 -4
nixos/modules/services/web-apps/plausible.nix
···
url = mkOption {
default = "http://localhost:8123/default";
type = types.str;
-
description = ''
-
The URL to be used to connect to <package>clickhouse</package>.
+
description = lib.mdDoc ''
+
The URL to be used to connect to `clickhouse`.
'';
};
};
···
socket = mkOption {
default = "/run/postgresql";
type = types.str;
-
description = ''
-
Path to the UNIX domain-socket to communicate with <package>postgres</package>.
+
description = lib.mdDoc ''
+
Path to the UNIX domain-socket to communicate with `postgres`.
'';
};
};
+2 -2
nixos/modules/services/web-apps/rss-bridge.nix
···
"Twitter"
]
'';
-
description = ''
+
description = lib.mdDoc ''
List of bridges to be whitelisted.
If the list is empty, rss-bridge will use whitelist.default.txt.
-
Use <literal>[ "*" ]</literal> to whitelist all.
+
Use `[ "*" ]` to whitelist all.
'';
};
};
+4 -4
nixos/modules/services/web-apps/wiki-js.nix
···
type = mkOption {
default = "postgres";
type = types.enum [ "postgres" "mysql" "mariadb" "mssql" ];
-
description = ''
-
Database driver to use for persistence. Please note that <literal>sqlite</literal>
+
description = lib.mdDoc ''
+
Database driver to use for persistence. Please note that `sqlite`
is currently not supported as the build process for it is currently not implemented
-
in <package>pkgs.wiki-js</package> and it's not recommended by upstream for
+
in `pkgs.wiki-js` and it's not recommended by upstream for
production use.
'';
};
···
};
};
description = ''
-
Settings to configure <package>wiki-js</package>. This directly
+
Settings to configure <literal>wiki-js</literal>. This directly
corresponds to <link xlink:href="https://docs.requarks.io/install/config">the upstream configuration options</link>.
Secrets can be injected via the environment by
+1 -1
nixos/modules/services/web-servers/apache-httpd/location-options.nix
···
priority = mkOption {
type = types.int;
default = 1000;
-
description = ''
+
description = lib.mdDoc ''
Order of this location block in relation to the others in the vhost.
The semantics are the same as with `lib.mkOrder`. Smaller values have
a greater priority.
+1 -1
nixos/modules/services/web-servers/darkhttpd.nix
···
address = mkOption {
default = "127.0.0.1";
type = str;
-
description = ''
+
description = lib.mdDoc ''
Address to listen on.
Pass `all` to listen on all interfaces.
'';
+30 -30
nixos/modules/services/web-servers/nginx/default.nix
···
statusPage = mkOption {
default = false;
type = types.bool;
-
description = "
+
description = lib.mdDoc ''
Enable status page reachable from localhost on http://127.0.0.1/nginx_status.
-
";
+
'';
};
recommendedTlsSettings = mkOption {
default = false;
type = types.bool;
-
description = "
+
description = lib.mdDoc ''
Enable recommended TLS settings.
-
";
+
'';
};
recommendedOptimisation = mkOption {
default = false;
type = types.bool;
-
description = "
+
description = lib.mdDoc ''
Enable recommended optimisation settings.
-
";
+
'';
};
recommendedGzipSettings = mkOption {
default = false;
type = types.bool;
-
description = "
+
description = lib.mdDoc ''
Enable recommended gzip settings.
-
";
+
'';
};
recommendedProxySettings = mkOption {
default = false;
type = types.bool;
-
description = "
+
description = lib.mdDoc ''
Whether to enable recommended proxy settings if a vhost does not specify the option manually.
-
";
+
'';
};
proxyTimeout = mkOption {
type = types.str;
default = "60s";
example = "20s";
-
description = "
+
description = lib.mdDoc ''
Change the proxy related timeouts in recommendedProxySettings.
-
";
+
'';
};
defaultListenAddresses = mkOption {
···
default = [ "0.0.0.0" ] ++ optional enableIPv6 "[::0]";
defaultText = literalExpression ''[ "0.0.0.0" ] ++ lib.optional config.networking.enableIPv6 "[::0]"'';
example = literalExpression ''[ "10.0.0.12" "[2002:a00:1::]" ]'';
-
description = "
+
description = lib.mdDoc ''
If vhosts do not specify listenAddresses, use these addresses by default.
-
";
+
'';
};
package = mkOption {
···
apply = p: p.override {
modules = p.modules ++ cfg.additionalModules;
};
-
description = "
+
description = lib.mdDoc ''
Nginx package to use. This defaults to the stable version. Note
that the nginx team recommends to use the mainline version which
-
available in nixpkgs as <literal>nginxMainline</literal>.
-
";
+
available in nixpkgs as `nginxMainline`.
+
'';
};
additionalModules = mkOption {
···
logError = mkOption {
default = "stderr";
type = types.str;
-
description = "
+
description = lib.mdDoc ''
Configures logging.
The first parameter defines a file that will store the log. The
special value stderr selects the standard error file. Logging to
···
increasing severity. Setting a certain log level will cause all
messages of the specified and more severe log levels to be logged.
If this parameter is omitted then error is used.
-
";
+
'';
};
preStart = mkOption {
type = types.lines;
default = "";
-
description = "
+
description = lib.mdDoc ''
Shell commands executed before the service's nginx is started.
-
";
+
'';
};
config = mkOption {
···
httpConfig = mkOption {
type = types.lines;
default = "";
-
description = "
+
description = lib.mdDoc ''
Configuration lines to be set inside the http block.
This is mutually exclusive with the structured configuration
via virtualHosts and the recommendedXyzSettings configuration
options. See appendHttpConfig for appending to the generated http block.
-
";
+
'';
};
streamConfig = mkOption {
···
proxy_pass 192.168.0.1:53535;
}
'';
-
description = "
+
description = lib.mdDoc ''
Configuration lines to be set inside the stream block.
-
";
+
'';
};
eventsConfig = mkOption {
···
appendHttpConfig = mkOption {
type = types.lines;
default = "";
-
description = "
+
description = lib.mdDoc ''
Configuration lines to be appended to the generated http block.
This is mutually exclusive with using config and httpConfig for
specifying the whole http block verbatim.
-
";
+
'';
};
enableReload = mkOption {
default = false;
type = types.bool;
-
description = ''
+
description = lib.mdDoc ''
Reload nginx when configuration file changes (instead of restart).
-
The configuration file is exposed at <filename>/etc/nginx/nginx.conf</filename>.
-
See also <literal>systemd.services.*.restartIfChanged</literal>.
+
The configuration file is exposed at {file}`/etc/nginx/nginx.conf`.
+
See also `systemd.services.*.restartIfChanged`.
'';
};
+1 -1
nixos/modules/services/web-servers/nginx/location-options.nix
···
priority = mkOption {
type = types.int;
default = 1000;
-
description = ''
+
description = lib.mdDoc ''
Order of this location block in relation to the others in the vhost.
The semantics are the same as with `lib.mkOrder`. Smaller values have
a greater priority.
+3 -3
nixos/modules/services/web-servers/nginx/vhost-options.nix
···
http3 = mkOption {
type = types.bool;
default = false;
-
description = ''
+
description = lib.mdDoc ''
Whether to enable HTTP 3.
-
This requires using <literal>pkgs.nginxQuic</literal> package
-
which can be achieved by setting <literal>services.nginx.package = pkgs.nginxQuic;</literal>.
+
This requires using `pkgs.nginxQuic` package
+
which can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`.
Note that HTTP 3 support is experimental and
*not* yet recommended for production.
Read more at https://quic.nginx.org/
+4 -4
nixos/modules/services/web-servers/tomcat.nix
···
purifyOnStart = mkOption {
type = types.bool;
default = false;
-
description = ''
+
description = lib.mdDoc ''
On startup, the `baseDir` directory is populated with various files,
subdirectories and symlinks. If this option is enabled, these items
(except for the `logs` and `work` subdirectories) are first removed.
···
baseDir = mkOption {
type = lib.types.path;
default = "/var/tomcat";
-
description = ''
+
description = lib.mdDoc ''
Location where Tomcat stores configuration files, web applications
and logfiles. Note that it is partially cleared on each service startup
if `purifyOnStart` is enabled.
···
serverXml = mkOption {
type = types.lines;
default = "";
-
description = "
+
description = lib.mdDoc ''
Verbatim server.xml configuration.
This is mutually exclusive with the virtualHosts options.
-
";
+
'';
};
commonLibs = mkOption {
+10 -10
nixos/modules/services/web-servers/varnish/default.nix
···
http_address = mkOption {
type = types.str;
default = "*:6081";
-
description = "
+
description = lib.mdDoc ''
HTTP listen address and port.
-
";
+
'';
};
config = mkOption {
type = types.lines;
-
description = "
+
description = lib.mdDoc ''
Verbatim default.vcl configuration.
-
";
+
'';
};
stateDir = mkOption {
type = types.path;
default = "/var/spool/varnish/${config.networking.hostName}";
defaultText = literalExpression ''"/var/spool/varnish/''${config.networking.hostName}"'';
-
description = "
+
description = lib.mdDoc ''
Directory holding all state for Varnish to run.
-
";
+
'';
};
extraModules = mkOption {
type = types.listOf types.package;
default = [];
example = literalExpression "[ pkgs.varnishPackages.geoip ]";
-
description = "
+
description = lib.mdDoc ''
Varnish modules (except 'std').
-
";
+
'';
};
extraCommandLine = mkOption {
type = types.str;
default = "";
example = "-s malloc,256M";
-
description = "
+
description = lib.mdDoc ''
Command line switches for varnishd (run 'varnishd -?' to get list of options)
-
";
+
'';
};
};
+5 -5
nixos/modules/services/x11/desktop-managers/none.nix
···
services.xserver.desktopManager.runXdgAutostartIfNone = mkOption {
type = types.bool;
default = false;
-
description = ''
+
description = lib.mdDoc ''
Whether to run XDG autostart files for sessions without a desktop manager
(with only a window manager), these sessions usually don't handle XDG
autostart files by default.
-
Some services like <option>i18n.inputMethod</option> and
-
<option>service.earlyoom</option> use XDG autostart files to start.
-
If this option is not set to <literal>true</literal> and you are using
+
Some services like {option}`i18n.inputMethod` and
+
{option}`service.earlyoom` use XDG autostart files to start.
+
If this option is not set to `true` and you are using
a window manager without a desktop manager, you need to manually start
-
them or running <package>dex</package> somewhere.
+
them or running `dex` somewhere.
'';
};
};
+1 -1
nixos/modules/services/x11/desktop-managers/phosh.nix
···
phocConfigType = types.submodule {
options = {
xwayland = mkOption {
-
description = ''
+
description = lib.mdDoc ''
Whether to enable XWayland support.
To start XWayland immediately, use `immediate`.
+2 -2
nixos/modules/system/activation/activation-script.nix
···
Whether this activation script supports being dry-activated.
These activation scripts will also be executed on dry-activate
activations with the environment variable
-
<literal>NIXOS_ACTION</literal> being set to <literal>dry-activate
-
</literal>. it's important that these activation scripts don't
+
<literal>NIXOS_ACTION</literal> being set to <literal>dry-activate</literal>.
+
it's important that these activation scripts don't
modify anything about the system when the variable is set.
'';
};
+1 -1
nixos/modules/system/boot/kernel_config.nix
···
USB? y
DEBUG n
'';
-
description = ''
+
description = lib.mdDoc ''
The result of converting the structured kernel configuration in settings
to an intermediate string that can be parsed by generate-config.pl to
answer the kernel `make defconfig`.
+3 -3
nixos/modules/system/boot/luksroot.nix
···
boot.initrd.luks.reusePassphrases = mkOption {
type = types.bool;
default = true;
-
description = ''
+
description = lib.mdDoc ''
When opening a new LUKS device try reusing last successful
passphrase.
Useful for mounting a number of devices that use the same
passphrase without retyping it several times.
-
Such setup can be useful if you use <command>cryptsetup
-
luksSuspend</command>. Different LUKS devices will still have
+
Such setup can be useful if you use {command}`cryptsetup luksSuspend`.
+
Different LUKS devices will still have
different master keys even when using the same passphrase.
'';
};
+3 -3
nixos/modules/tasks/auto-upgrade.nix
···
type = types.nullOr types.str;
default = null;
example = "https://nixos.org/channels/nixos-14.12-small";
-
description = ''
+
description = lib.mdDoc ''
The URI of the NixOS channel to use for automatic
upgrades. By default, this is the channel set using
-
<command>nix-channel</command> (run <literal>nix-channel
-
--list</literal> to see the current value).
+
{command}`nix-channel` (run `nix-channel --list`
+
to see the current value).
'';
};
+11 -12
nixos/modules/tasks/filesystems.nix
···
}
'';
type = types.attrsOf (types.submodule [coreFileSystemOpts fileSystemOpts]);
-
description = ''
+
description = lib.mdDoc ''
The file systems to be mounted. It must include an entry for
-
the root directory (<literal>mountPoint = "/"</literal>). Each
+
the root directory (`mountPoint = "/"`). Each
entry in the list is an attribute set with the following fields:
-
<literal>mountPoint</literal>, <literal>device</literal>,
-
<literal>fsType</literal> (a file system type recognised by
-
<command>mount</command>; defaults to
-
<literal>"auto"</literal>), and <literal>options</literal>
-
(the mount options passed to <command>mount</command> using the
-
<option>-o</option> flag; defaults to <literal>[ "defaults" ]</literal>).
+
`mountPoint`, `device`,
+
`fsType` (a file system type recognised by
+
{command}`mount`; defaults to
+
`"auto"`), and `options`
+
(the mount options passed to {command}`mount` using the
+
{option}`-o` flag; defaults to `[ "defaults" ]`).
-
Instead of specifying <literal>device</literal>, you can also
-
specify a volume label (<literal>label</literal>) for file
-
systems that support it, such as ext2/ext3 (see <command>mke2fs
-
-L</command>).
+
Instead of specifying `device`, you can also
+
specify a volume label (`label`) for file
+
systems that support it, such as ext2/ext3 (see {command}`mke2fs -L`).
'';
};
+1 -1
nixos/modules/tasks/filesystems/zfs.nix
···
type = types.either (types.enum [ "disabled" "all" ]) (types.listOf types.str);
default = "disabled";
example = [ "tank" "dozer" ];
-
description = ''
+
description = lib.mdDoc ''
After importing, expand each device in the specified pools.
Set the value to the plain string "all" to expand all pools on boot:
+4 -4
nixos/modules/tasks/network-interfaces.nix
···
default = null;
example = "fast";
type = types.nullOr types.str;
-
description = ''
+
description = lib.mdDoc ''
DEPRECATED, use `driverOptions`.
Option specifying the rate in which we'll ask our link partner
to transmit LACPDU packets in 802.3ad mode.
···
default = null;
example = 100;
type = types.nullOr types.int;
-
description = ''
+
description = lib.mdDoc ''
DEPRECATED, use `driverOptions`.
Miimon is the number of millisecond in between each round of polling
by the device driver for failed links. By default polling is not
···
default = null;
example = "active-backup";
type = types.nullOr types.str;
-
description = ''
+
description = lib.mdDoc ''
DEPRECATED, use `driverOptions`.
The mode which the bond will be running. The default mode for
the bonding driver is balance-rr, optimizing for throughput.
···
default = null;
example = "layer2+3";
type = types.nullOr types.str;
-
description = ''
+
description = lib.mdDoc ''
DEPRECATED, use `driverOptions`.
Selects the transmit hash policy to use for slave selection in
balance-xor, 802.3ad, and tlb modes.
+1 -1
nixos/modules/virtualisation/amazon-options.nix
···
};
datasets = lib.mkOption {
-
description = ''
+
description = lib.mdDoc ''
Datasets to create under the `tank` and `boot` zpools.
**NOTE:** This option is used only at image creation time, and
+1 -1
nixos/modules/virtualisation/azure-image.nix
···
type = with types; either (enum [ "auto" ]) int;
default = "auto";
example = 2048;
-
description = ''
+
description = lib.mdDoc ''
Size of disk image. Unit is MB.
'';
};
+3 -3
nixos/modules/virtualisation/google-compute-image.nix
···
type = with types; either (enum [ "auto" ]) int;
default = "auto";
example = 1536;
-
description = ''
+
description = lib.mdDoc ''
Size of disk image. Unit is MB.
'';
};
···
virtualisation.googleComputeImage.configFile = mkOption {
type = with types; nullOr str;
default = null;
-
description = ''
+
description = lib.mdDoc ''
A path to a configuration file which will be placed at `/etc/nixos/configuration.nix`
and be used when switching to a new configuration.
If set to `null`, a default configuration is used, where the only import is
···
virtualisation.googleComputeImage.compressionLevel = mkOption {
type = types.int;
default = 6;
-
description = ''
+
description = lib.mdDoc ''
GZIP compression level of the resulting disk image (1-9).
'';
};
+3 -3
nixos/modules/virtualisation/hyperv-image.nix
···
type = with types; either (enum [ "auto" ]) int;
default = "auto";
example = 2048;
-
description = ''
+
description = lib.mdDoc ''
The size of the hyper-v base image in MiB.
'';
};
vmDerivationName = mkOption {
type = types.str;
default = "nixos-hyperv-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}";
-
description = ''
+
description = lib.mdDoc ''
The name of the derivation for the hyper-v appliance.
'';
};
vmFileName = mkOption {
type = types.str;
default = "nixos-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}.vhdx";
-
description = ''
+
description = lib.mdDoc ''
The file name of the hyper-v appliance.
'';
};
+4 -4
nixos/modules/virtualisation/kvmgt.nix
···
vgpuOptions = {
uuid = mkOption {
type = with types; listOf str;
-
description = "UUID(s) of VGPU device. You can generate one with <package>libossp_uuid</package>.";
+
description = lib.mdDoc "UUID(s) of VGPU device. You can generate one with `libossp_uuid`.";
};
};
···
vgpus = mkOption {
default = {};
type = with types; attrsOf (submodule [ { options = vgpuOptions; } ]);
-
description = ''
-
Virtual GPUs to be used in Qemu. You can find devices via <command>ls /sys/bus/pci/devices/*/mdev_supported_types</command>
-
and find info about device via <command>cat /sys/bus/pci/devices/*/mdev_supported_types/i915-GVTg_V5_4/description</command>
+
description = lib.mdDoc ''
+
Virtual GPUs to be used in Qemu. You can find devices via {command}`ls /sys/bus/pci/devices/*/mdev_supported_types`
+
and find info about device via {command}`cat /sys/bus/pci/devices/*/mdev_supported_types/i915-GVTg_V5_4/description`
'';
example = {
i915-GVTg_V5_8.uuid = [ "a297db4a-f4c2-11e6-90f6-d3b88d6c9525" ];
+1 -1
nixos/modules/virtualisation/libvirtd.nix
···
type = types.package;
default = pkgs.qemu;
defaultText = literalExpression "pkgs.qemu";
-
description = ''
+
description = lib.mdDoc ''
Qemu package to use with libvirt.
`pkgs.qemu` can emulate alien architectures (e.g. aarch64 on x86)
`pkgs.qemu_kvm` saves disk space allowing to emulate only host architectures.
+2 -3
nixos/modules/virtualisation/lxc.nix
···
type = types.lines;
default = "";
description =
-
''
+
lib.mdDoc ''
This is the config file for managing unprivileged user network
-
administration access in LXC. See <citerefentry><refentrytitle>lxc-usernet</refentrytitle><manvolnum>5</manvolnum>
-
</citerefentry>.
+
administration access in LXC. See {manpage}`lxc-usernet(5)`.
'';
};
};
+5 -5
nixos/modules/virtualisation/nixos-containers.nix
···
type = types.path;
default = pkgs.path;
defaultText = literalExpression "pkgs.path";
-
description = ''
+
description = lib.mdDoc ''
A path to the nixpkgs that provide the modules, pkgs and lib for evaluating the container.
-
To only change the <literal>pkgs</literal> argument used inside the container modules,
-
set the <literal>nixpkgs.*</literal> options in the container <option>config</option>.
-
Setting <literal>config.nixpkgs.pkgs = pkgs</literal> speeds up the container evaluation
-
by reusing the system pkgs, but the <literal>nixpkgs.config</literal> option in the
+
To only change the `pkgs` argument used inside the container modules,
+
set the `nixpkgs.*` options in the container {option}`config`.
+
Setting `config.nixpkgs.pkgs = pkgs` speeds up the container evaluation
+
by reusing the system pkgs, but the `nixpkgs.config` option in the
container config is ignored in this case.
'';
};
+1 -1
nixos/modules/virtualisation/openstack-options.nix
···
};
datasets = lib.mkOption {
-
description = ''
+
description = lib.mdDoc ''
Datasets to create under the `tank` and `boot` zpools.
**NOTE:** This option is used only at image creation time, and
+1 -1
nixos/modules/virtualisation/parallels-guest.nix
···
autoMountShares = mkOption {
type = types.bool;
default = true;
-
description = ''
+
description = lib.mdDoc ''
Control prlfsmountd service. When this service is running, shares can not be manually
mounted through `mount -t prl_fs ...` as this service will remount and trample any set options.
Recommended to enable for simple file sharing, but extended share use such as for code should
+3 -3
nixos/modules/virtualisation/podman/network-socket.nix
···
enable = mkOption {
type = types.bool;
default = false;
-
description = ''
+
description = lib.mdDoc ''
Make the Podman and Docker compatibility API available over the network
with TLS client certificate authentication.
This allows Docker clients to connect with the equivalents of the Docker
-
CLI <literal>-H</literal> and <literal>--tls*</literal> family of options.
+
CLI `-H` and `--tls*` family of options.
For certificate setup, see https://docs.docker.com/engine/security/protect-access/
-
This option is independent of <xref linkend="opt-virtualisation.podman.dockerSocket.enable"/>.
+
This option is independent of [](#opt-virtualisation.podman.dockerSocket.enable).
'';
};
+13 -13
nixos/modules/virtualisation/proxmox-image.nix
···
type = types.str;
default = "";
example = "order=scsi0;net0";
-
description = ''
+
description = lib.mdDoc ''
Default boot device. PVE will try all devices in its default order if this value is empty.
'';
};
···
type = types.str;
default = "virtio-scsi-pci";
example = "lsi";
-
description = ''
+
description = lib.mdDoc ''
SCSI controller type. Must be one of the supported values given in
-
<link xlink:href="https://pve.proxmox.com/wiki/Qemu/KVM_Virtual_Machines"/>
+
<https://pve.proxmox.com/wiki/Qemu/KVM_Virtual_Machines>
'';
};
virtio0 = mkOption {
type = types.str;
default = "local-lvm:vm-9999-disk-0";
example = "ceph:vm-123-disk-0";
-
description = ''
+
description = lib.mdDoc ''
Configuration for the default virtio disk. It can be used as a cue for PVE to autodetect the target sotrage.
This parameter is required by PVE even if it isn't used.
'';
···
ostype = mkOption {
type = types.str;
default = "l26";
-
description = ''
+
description = lib.mdDoc ''
Guest OS type
'';
};
cores = mkOption {
type = types.ints.positive;
default = 1;
-
description = ''
+
description = lib.mdDoc ''
Guest core count
'';
};
memory = mkOption {
type = types.ints.positive;
default = 1024;
-
description = ''
+
description = lib.mdDoc ''
Guest memory in MB
'';
};
···
name = mkOption {
type = types.str;
default = "nixos-${config.system.nixos.label}";
-
description = ''
+
description = lib.mdDoc ''
VM name
'';
};
net0 = mkOption {
type = types.commas;
default = "virtio=00:00:00:00:00:00,bridge=vmbr0,firewall=1";
-
description = ''
+
description = lib.mdDoc ''
Configuration for the default interface. When restoring from VMA, check the
"unique" box to ensure device mac is randomized.
'';
···
type = types.str;
default = "socket";
example = "/dev/ttyS0";
-
description = ''
+
description = lib.mdDoc ''
Create a serial device inside the VM (n is 0 to 3), and pass through a host serial device (i.e. /dev/ttyS0),
or create a unix socket on the host side (use qm terminal to open a terminal connection).
'';
···
type = types.bool;
apply = x: if x then "1" else "0";
default = true;
-
description = ''
+
description = lib.mdDoc ''
Expect guest to have qemu agent running
'';
};
···
cpu = "host";
onboot = 1;
}'';
-
description = ''
+
description = lib.mdDoc ''
Additional options appended to qemu-server.conf
'';
};
···
type = types.str;
default = config.proxmox.qemuConf.name;
example = "999-nixos_template";
-
description = ''
+
description = lib.mdDoc ''
Filename of the image will be vzdump-qemu-''${filenameSuffix}.vma.zstd.
This will also determine the default name of the VM on restoring the VMA.
Start this value with a number if you want the VMA to be detected as a backup of
+4 -4
nixos/modules/virtualisation/qemu-vm.nix
···
type = types.nullOr types.package;
default = null;
description =
-
''
-
An alternate BIOS (such as <package>qboot</package>) with which to start the VM.
-
Should contain a file named <literal>bios.bin</literal>.
-
If <literal>null</literal>, QEMU's builtin SeaBIOS will be used.
+
lib.mdDoc ''
+
An alternate BIOS (such as `qboot`) with which to start the VM.
+
Should contain a file named `bios.bin`.
+
If `null`, QEMU's builtin SeaBIOS will be used.
'';
};
+5 -5
nixos/modules/virtualisation/vmware-image.nix
···
type = with types; either (enum [ "auto" ]) int;
default = "auto";
example = 2048;
-
description = ''
+
description = lib.mdDoc ''
The size of the VMWare base image in MiB.
'';
};
vmDerivationName = mkOption {
type = types.str;
default = "nixos-vmware-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}";
-
description = ''
+
description = lib.mdDoc ''
The name of the derivation for the VMWare appliance.
'';
};
vmFileName = mkOption {
type = types.str;
default = "nixos-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}.vmdk";
-
description = ''
+
description = lib.mdDoc ''
The file name of the VMWare appliance.
'';
};
vmSubformat = mkOption {
type = types.enum subformats;
default = "monolithicSparse";
-
description = "Specifies which VMDK subformat to use.";
+
description = lib.mdDoc "Specifies which VMDK subformat to use.";
};
vmCompat6 = mkOption {
type = types.bool;
default = false;
example = true;
-
description = "Create a VMDK version 6 image (instead of version 4).";
+
description = lib.mdDoc "Create a VMDK version 6 image (instead of version 4).";
};
};
};
+1
nixos/tests/installed-tests/default.nix
···
gnome-photos = callInstalledTest ./gnome-photos.nix {};
graphene = callInstalledTest ./graphene.nix {};
gsconnect = callInstalledTest ./gsconnect.nix {};
+
json-glib = callInstalledTest ./json-glib.nix {};
ibus = callInstalledTest ./ibus.nix {};
libgdata = callInstalledTest ./libgdata.nix {};
librsvg = callInstalledTest ./librsvg.nix {};
+5
nixos/tests/installed-tests/json-glib.nix
···
+
{ pkgs, makeInstalledTest, ... }:
+
+
makeInstalledTest {
+
tested = pkgs.json-glib;
+
}
+2 -5
pkgs/applications/audio/bitwig-studio/bitwig-studio1.nix
···
libxkbfile pixman xcbutil xcbutilwm zlib
];
-
binPath = lib.makeBinPath [
-
xdg-utils zenity ffmpeg
-
];
-
installPhase = ''
mkdir -p $out
cp -r opt/bitwig-studio $out/libexec
···
-not -path '*/resources/*' | \
while IFS= read -r f ; do
wrapProgram $f \
-
--prefix PATH : "${binPath}" \
+
--suffix PATH : "${lib.makeBinPath [ ffmpeg zenity ]}" \
+
--prefix PATH : "${lib.makeBinPath [ xdg-utils ]}" \
"''${gappsWrapperArgs[@]}" \
--set LD_PRELOAD "${libxkbcommon.out}/lib/libxkbcommon.so" || true
done
+3 -6
pkgs/applications/audio/bitwig-studio/bitwig-studio3.nix
···
alsa-lib cairo freetype gdk-pixbuf glib gtk3 libxcb xcbutil xcbutilwm zlib libXtst libxkbcommon pulseaudio libjack2 libX11 libglvnd libXcursor stdenv.cc.cc.lib
];
-
binPath = lib.makeBinPath [
-
xdg-utils ffmpeg
-
];
-
ldLibraryPath = lib.strings.makeLibraryPath buildInputs;
installPhase = ''
···
patchelf --set-interpreter "${stdenv.cc.bintools.dynamicLinker}" $f
wrapProgram $f \
"''${gappsWrapperArgs[@]}" \
-
--prefix PATH : "${binPath}" \
-
--suffix LD_LIBRARY_PATH : "${ldLibraryPath}"
+
--prefix LD_LIBRARY_PATH : "${ldLibraryPath}" \
+
--prefix PATH : "${lib.makeBinPath [ ffmpeg ]}" \
+
--suffix PATH : "${lib.makeBinPath [ xdg-utils ]}"
done
'';
+3 -1
pkgs/applications/audio/bitwig-studio/bitwig-studio4.nix
···
-not -path '*/resources/*' | \
while IFS= read -r f ; do
patchelf --set-interpreter "${stdenv.cc.bintools.dynamicLinker}" $f
+
# make xdg-open overrideable at runtime
wrapProgram $f \
"''${gappsWrapperArgs[@]}" \
-
--prefix PATH : "${lib.makeBinPath [ xdg-utils ffmpeg ]}" \
+
--prefix PATH : "${lib.makeBinPath [ ffmpeg ]}" \
+
--suffix PATH : "${lib.makeBinPath [ xdg-utils ]}" \
--suffix LD_LIBRARY_PATH : "${lib.strings.makeLibraryPath buildInputs}"
done
+2 -4
pkgs/applications/audio/mid2key/default.nix
···
src = fetchFromGitHub {
owner = "dnschneid";
repo = "mid2key";
-
rev = "v${version}";
-
sha256 = "0j2vsjvdgx51nd1qmaa18mcy0yw9pwrhbv2mdwnf913bwsk4y904";
+
rev = "r${version}";
+
sha256 = "Zo0mqdBJ1JKD9ZCA8te3f5opyYslFncYcx9iuXq2B9g=";
};
-
-
unpackPhase = "tar xvzf $src";
buildInputs = [ alsa-lib libX11 libXi libXtst xorgproto ];
+2 -1
pkgs/applications/finance/irpf/default.nix
···
install -Dm755 irpf.jar "$BASEDIR/${pname}.jar"
install -Dm644 Leia-me.htm offline.png online.png pgd-updater.jar "$BASEDIR"
+
# make xdg-open overrideable at runtime
makeWrapper ${jdk11}/bin/java $out/bin/${pname} \
--add-flags "-Dawt.useSystemAAFontSettings=on" \
--add-flags "-Dswing.aatext=true" \
--add-flags "-jar $BASEDIR/${pname}.jar" \
-
--prefix PATH : ${lib.makeBinPath [ xdg-utils ]} \
+
--suffix PATH : ${lib.makeBinPath [ xdg-utils ]} \
--set _JAVA_AWT_WM_NONREPARENTING 1 \
--set AWT_TOOLKIT MToolkit
+3 -1
pkgs/applications/graphics/shutter/default.nix
···
'';
preFixup = ''
+
# make xdg-open overrideable at runtime
gappsWrapperArgs+=(
--set PERL5LIB ${perlPackages.makePerlPath perlModules} \
-
--prefix PATH : ${lib.makeBinPath [ imagemagick xdg-utils ] }
+
--prefix PATH : ${lib.makeBinPath [ imagemagick ] }
+
--suffix PATH : ${lib.makeBinPath [ xdg-utils ] }
)
'';
+2 -1
pkgs/applications/misc/1password-gui/beta.nix
···
# Electron is trying to open udev via dlopen()
# and for some reason that doesn't seem to be impacted from the rpath.
# Adding udev to LD_LIBRARY_PATH fixes that.
+
# Make xdg-open overrideable at runtime.
makeWrapper $out/share/1password/1password $out/bin/1password \
-
--prefix PATH : ${lib.makeBinPath [ xdg-utils ]} \
+
--suffix PATH : ${lib.makeBinPath [ xdg-utils ]} \
--prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ udev ]}
runHook postInstall
+2 -1
pkgs/applications/misc/1password-gui/default.nix
···
# Electron is trying to open udev via dlopen()
# and for some reason that doesn't seem to be impacted from the rpath.
# Adding udev to LD_LIBRARY_PATH fixes that.
+
# Make xdg-open overrideable at runtime.
makeWrapper $out/share/1password/1password $out/bin/1password \
-
--prefix PATH : ${lib.makeBinPath [ xdg-utils ]} \
+
--suffix PATH : ${lib.makeBinPath [ xdg-utils ]} \
--prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ udev ]}
runHook postInstall
+1 -1
pkgs/applications/misc/avrdudess/default.nix
···
export LD_LIBRARY_PATH="${lib.makeLibraryPath [gtk2 mono]}"
# We need PATH from user env for xdg-open to find its tools, which
# typically depend on the currently running desktop environment.
-
export PATH="${lib.makeBinPath [ avrdude xdg-utils ]}:\$PATH"
+
export PATH="\$PATH:${lib.makeBinPath [ avrdude xdg-utils ]}"
# avrdudess must have its resource files in its current working directory
cd $out/avrdudess && exec ${mono}/bin/mono "$out/avrdudess/avrdudess.exe" "\$@"
+6 -1
pkgs/applications/misc/blender/default.nix
···
, zlib, zstd, fftw, opensubdiv, freetype, jemalloc, ocl-icd, addOpenGLRunpath
, jackaudioSupport ? false, libjack2
, cudaSupport ? config.cudaSupport or false, cudaPackages ? {}
+
, hipSupport ? false, hip # comes with a significantly larger closure size
, colladaSupport ? true, opencollada
, spaceNavSupport ? stdenv.isLinux, libspnav
, makeWrapper
···
'${python310Packages.numpy}/${python.sitePackages}/numpy'
'' else ''
substituteInPlace extern/clew/src/clew.c --replace '"libOpenCL.so"' '"${ocl-icd}/lib/libOpenCL.so"'
-
'');
+
'') +
+
(if hipSupport then ''
+
substituteInPlace extern/hipew/src/hipew.c --replace '"/opt/rocm/hip/lib/libamdhip64.so"' '"${hip}/lib/libamdhip64.so"'
+
substituteInPlace extern/hipew/src/hipew.c --replace '"opt/rocm/hip/bin"' '"${hip}/bin"'
+
'' else "");
cmakeFlags =
[
+3 -2
pkgs/applications/misc/far2l/default.nix
···
PYTHON = withPython;
};
-
runtimeDeps = [ unzip zip p7zip xz gzip bzip2 gnutar xdg-utils ];
+
runtimeDeps = [ unzip zip p7zip xz gzip bzip2 gnutar ];
postInstall = ''
wrapProgram $out/bin/far2l \
--argv0 $out/bin/far2l \
-
--prefix PATH : ${lib.makeBinPath runtimeDeps}
+
--prefix PATH : ${lib.makeBinPath runtimeDeps} \
+
--suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
'';
meta = with lib; {
+2 -1
pkgs/applications/misc/nwg-drawer/default.nix
···
'';
preFixup = ''
+
# make xdg-open overrideable at runtime
gappsWrapperArgs+=(
-
--prefix PATH : ${xdg-utils}/bin
+
--suffix PATH : ${xdg-utils}/bin
--prefix XDG_DATA_DIRS : $out/share
)
'';
+2 -1
pkgs/applications/networking/appgate-sdp/default.nix
···
--prefix PATH : ${makeBinPath [ iproute2 networkmanager dnsmasq ]} \
--set LD_LIBRARY_PATH $out/opt/appgate/service
+
# make xdg-open overrideable at runtime
makeWrapper $out/opt/appgate/Appgate $out/bin/appgate \
-
--prefix PATH : ${makeBinPath [ xdg-utils ]} \
+
--suffix PATH : ${makeBinPath [ xdg-utils ]} \
--set LD_LIBRARY_PATH $out/opt/appgate:${makeLibraryPath deps}
wrapProgram $out/opt/appgate/linux/set_dns --set PYTHONPATH $PYTHONPATH
+2 -1
pkgs/applications/networking/browsers/brave/default.nix
···
libxkbcommon libXScrnSaver libXcomposite libXcursor libXdamage
libXext libXfixes libXi libXrandr libXrender libxshmfence
libXtst libuuid mesa nspr nss pango pipewire udev wayland
-
xdg-utils xorg.libxcb zlib snappy
+
xorg.libxcb zlib snappy
]
++ optional pulseSupport libpulseaudio
++ optional libvaSupport libva;
···
gappsWrapperArgs+=(
--prefix LD_LIBRARY_PATH : ${rpath}
--prefix PATH : ${binpath}
+
--suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
${optionalString (enableFeatures != []) ''
--add-flags "--enable-features=${strings.concatStringsSep "," enableFeatures}"
''}
+2 -1
pkgs/applications/networking/browsers/firefox/wrapper.nix
···
mv "$executablePath" "$oldExe"
fi
+
# make xdg-open overrideable at runtime
makeWrapper "$oldExe" \
"''${executablePath}${nameSuffix}" \
--prefix LD_LIBRARY_PATH ':' "$libs" \
--suffix-each GTK_PATH ':' "$gtk_modules" \
-
--prefix PATH ':' "${xdg-utils}/bin" \
+
--suffix PATH ':' "${xdg-utils}/bin" \
--suffix PATH ':' "$out/bin" \
--set MOZ_APP_LAUNCHER "${launcherName}" \
--set MOZ_SYSTEM_DIR "$out/lib/mozilla" \
+2 -1
pkgs/applications/networking/browsers/google-chrome/default.nix
···
dbus gdk-pixbuf gcc-unwrapped.lib
systemd
libexif pciutils
-
liberation_ttf curl util-linux xdg-utils wget
+
liberation_ttf curl util-linux wget
flac harfbuzz icu libpng opusWithCustomModes snappy speechd
bzip2 libcap at-spi2-atk at-spi2-core
libkrb5 libdrm libglvnd mesa coreutils
···
makeWrapper "$out/share/google/$appname/google-$appname" "$exe" \
--prefix LD_LIBRARY_PATH : "$rpath" \
--prefix PATH : "$binpath" \
+
--suffix PATH : "${lib.makeBinPath [ xdg-utils ]}" \
--prefix XDG_DATA_DIRS : "$XDG_ICON_DIRS:$GSETTINGS_SCHEMAS_PATH:${addOpenGLRunpath.driverLink}/share" \
--set CHROME_WRAPPER "google-chrome-$dist" \
--add-flags ${escapeShellArg commandLineArgs} \
+2 -2
pkgs/applications/networking/browsers/vivaldi/default.nix
···
vivaldiName = if isSnapshot then "vivaldi-snapshot" else "vivaldi";
in stdenv.mkDerivation rec {
pname = "vivaldi";
-
version = "5.4.2753.33-1";
+
version = "5.4.2753.37-1";
src = fetchurl {
url = "https://downloads.vivaldi.com/${branch}/vivaldi-${branch}_${version}_amd64.deb";
-
sha256 = "0bs6324m5l5vmg1x1sj6g3qb1958c5c8z35r87r3rpnv52lqr501";
+
sha256 = "05aaprv1bqnb7iml1m6vlzv038dizy05ycwkrgb5nw1wiz9w6cyw";
};
unpackPhase = ''
+1 -1
pkgs/applications/networking/instant-messengers/armcord/default.nix
···
# Wrap the startup command
makeWrapper $out/opt/ArmCord/armcord $out/bin/armcord \
--prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath buildInputs}" \
-
--prefix PATH : ${lib.makeBinPath [ xdg-utils ]} \
+
--suffix PATH : ${lib.makeBinPath [ xdg-utils ]} \
"''${gappsWrapperArgs[@]}"
# Fix desktop link
+2 -1
pkgs/applications/networking/instant-messengers/bluejeans/default.nix
···
cc $localtime64_stub -shared -o "${placeholder "out"}"/opt/BlueJeans/liblocaltime64_stub.so
+
# make xdg-open overrideable at runtime
makeWrapper $out/opt/BlueJeans/bluejeans-v2 $out/bin/bluejeans \
--set LD_LIBRARY_PATH "${libPath}":"${placeholder "out"}"/opt/BlueJeans \
--set LD_PRELOAD "$out"/opt/BlueJeans/liblocaltime64_stub.so \
-
--prefix PATH : ${lib.makeBinPath [ xdg-utils ]}
+
--suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
substituteInPlace "$out"/share/applications/bluejeans-v2.desktop \
--replace "/opt/BlueJeans/bluejeans-v2" "$out/bin/bluejeans"
+2 -1
pkgs/applications/networking/instant-messengers/franz/generic.nix
···
dontWrapGApps = true;
postFixup = ''
+
# make xdg-open overrideable at runtime
wrapProgram $out/opt/${name}/${pname} \
--prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath runtimeDependencies}" \
-
--prefix PATH : ${xdg-utils}/bin \
+
--suffix PATH : ${xdg-utils}/bin \
"''${gappsWrapperArgs[@]}"
'';
}
+3 -2
pkgs/applications/networking/instant-messengers/slack/default.nix
···
patchelf --set-rpath ${rpath}:$out/lib/slack $file || true
done
-
# Replace the broken bin/slack symlink with a startup wrapper
+
# Replace the broken bin/slack symlink with a startup wrapper.
+
# Make xdg-open overrideable at runtime.
rm $out/bin/slack
makeWrapper $out/lib/slack/slack $out/bin/slack \
--prefix XDG_DATA_DIRS : $GSETTINGS_SCHEMAS_PATH \
-
--prefix PATH : ${lib.makeBinPath [xdg-utils]} \
+
--suffix PATH : ${lib.makeBinPath [xdg-utils]} \
--add-flags "\''${NIXOS_OZONE_WL:+\''${WAYLAND_DISPLAY:+--enable-features=UseOzonePlatform --ozone-platform=wayland}}"
# Fix the desktop link
+1 -1
pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix
···
wrapProgram $out/bin/telegram-desktop \
"''${gappsWrapperArgs[@]}" \
"''${qtWrapperArgs[@]}" \
-
--prefix PATH : ${lib.makeBinPath [ xdg-utils]} \
+
--suffix PATH : ${lib.makeBinPath [ xdg-utils]} \
--set XDG_RUNTIME_DIR "XDG-RUNTIME-DIR"
sed -i $out/bin/telegram-desktop \
-e "s,'XDG-RUNTIME-DIR',\"\''${XDG_RUNTIME_DIR:-/run/user/\$(id --user)}\","
+2 -1
pkgs/applications/networking/instant-messengers/wavebox/default.nix
···
'';
postFixup = ''
+
# make xdg-open overrideable at runtime
makeWrapper $out/opt/wavebox/Wavebox $out/bin/wavebox \
-
--prefix PATH : ${xdg-utils}/bin
+
--suffix PATH : ${xdg-utils}/bin
'';
meta = with lib; {
+265 -265
pkgs/applications/networking/mailreaders/thunderbird-bin/release_sources.nix
···
{
-
version = "102.0.3";
+
version = "102.1.2";
sources = [
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/af/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/af/thunderbird-102.1.2.tar.bz2";
locale = "af";
arch = "linux-x86_64";
-
sha256 = "acbb0b0467c0f83179c301e6435d6fb09d784d793bf56eb9d10a2240f40972cf";
+
sha256 = "045a2ae8a4da72b4ebe18800b03a5a5f722fcf2a26a3fb382b4412f5be1958bf";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ar/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ar/thunderbird-102.1.2.tar.bz2";
locale = "ar";
arch = "linux-x86_64";
-
sha256 = "c15a7753c36d20da261a4819a49429196d839a7288b756478330bcf69cd93611";
+
sha256 = "5d3b5ef861ef742025be92e49233b6f1ed91ae5bbc19e4819cfc68ad139663a7";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ast/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ast/thunderbird-102.1.2.tar.bz2";
locale = "ast";
arch = "linux-x86_64";
-
sha256 = "2e0747bfa96640d8c4998d08b3e1096797d870773bc805a2d9726da110799e35";
+
sha256 = "8a9255162105f0148aa12a5833a5a27294dcc5dd48841d871808031bf08d0e64";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/be/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/be/thunderbird-102.1.2.tar.bz2";
locale = "be";
arch = "linux-x86_64";
-
sha256 = "1316efa7b999c1ecd6470520ae90beec9575e549bd1735ea523bb61b1edc3230";
+
sha256 = "b46b07e20417ea588645893d3aa256acabf1689bb226e439983c55d99049dbab";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/bg/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/bg/thunderbird-102.1.2.tar.bz2";
locale = "bg";
arch = "linux-x86_64";
-
sha256 = "502f8aef0eab71e3b07404e888962930d3fd751d4402c178ed4ab2b38b1f9fb4";
+
sha256 = "090e8d450209b3584cf77bbe304c914d903be40491113d8667126cc7607d0ae2";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/br/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/br/thunderbird-102.1.2.tar.bz2";
locale = "br";
arch = "linux-x86_64";
-
sha256 = "1d3ec6f206083eca2b72f65bf50134163f58e800607e768892765f040feea94b";
+
sha256 = "b5aebf8f6210a2234041cc8774ff94459c38da193abfc222ae2994bba1f9b5b5";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ca/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ca/thunderbird-102.1.2.tar.bz2";
locale = "ca";
arch = "linux-x86_64";
-
sha256 = "aaae5de848334d5ebc3f761ec6780aa9826e43424308c256d40469c63699b6cc";
+
sha256 = "67e6fc3cd2a4ba0ba9b4a45cf4acc7a3cded9dea42a4e2826f06a750739a61ab";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/cak/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/cak/thunderbird-102.1.2.tar.bz2";
locale = "cak";
arch = "linux-x86_64";
-
sha256 = "f391f7d47c1fd9cb5ad7f5e1d79e20400521449404842cedaa7e5ac613e71e10";
+
sha256 = "bba56f6fbeb8441df134eb4a3179a6e95494e55feda1f8e697e7d1d8c45cbfc5";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/cs/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/cs/thunderbird-102.1.2.tar.bz2";
locale = "cs";
arch = "linux-x86_64";
-
sha256 = "9ba13380b2ac7c54f15e294fdd1534eb6687056865dad5f72aa4c7120fb2740b";
+
sha256 = "d6d586b4c28f189006928605537e73d33d4e6f3cb2cac7762961d300f180d7b7";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/cy/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/cy/thunderbird-102.1.2.tar.bz2";
locale = "cy";
arch = "linux-x86_64";
-
sha256 = "3f93b8fbe6cb9928a546768fbf0976b69361fd1ca34acc207b74a267cab32b7b";
+
sha256 = "80bedee4129f6ad3cbe452ffd744ae1273d230bff6b5ea1a149f7884f6c3a856";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/da/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/da/thunderbird-102.1.2.tar.bz2";
locale = "da";
arch = "linux-x86_64";
-
sha256 = "45a5500cad37d4a50ae16801362a1b32f4233f9febd2400deb239e082fd59421";
+
sha256 = "fe828dcd369eecce999dcada43703e7ae64f40d65e1a527aa1c8b5a12872da4b";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/de/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/de/thunderbird-102.1.2.tar.bz2";
locale = "de";
arch = "linux-x86_64";
-
sha256 = "4b36a09e6945c0a4674982e726ceaccf7b7724d9f394640f190ab0b2597cff4c";
+
sha256 = "c1caf3070b417ef809203a4da6bf93cdc328a9b240304ea609b52f707627bb69";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/dsb/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/dsb/thunderbird-102.1.2.tar.bz2";
locale = "dsb";
arch = "linux-x86_64";
-
sha256 = "3ab10a155916f89c803738fcac21a66b670321795b2aed813d3007e34f00b996";
+
sha256 = "8c3c81ad3b6067d51261aed574a6fd9df2188e6533540794763d6d58cf323849";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/el/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/el/thunderbird-102.1.2.tar.bz2";
locale = "el";
arch = "linux-x86_64";
-
sha256 = "2bcdedd483a0724714e20416fe4ff57d5f8d7e07da32e54430ab1af20a6f6089";
+
sha256 = "81ad4bc8a3d1fc7da97bb8655b12363c2a4033f39ece73ba37097315b6df0c70";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/en-CA/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/en-CA/thunderbird-102.1.2.tar.bz2";
locale = "en-CA";
arch = "linux-x86_64";
-
sha256 = "0b5bc27fd53c7b19a81d0dd502866237e0861770cc8e7caba5b5771b5321cdf3";
+
sha256 = "3487c91dc802bb0c284bd87dfaddd2aac907aca7ed9bcdde8d8d74d79a51eea9";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/en-GB/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/en-GB/thunderbird-102.1.2.tar.bz2";
locale = "en-GB";
arch = "linux-x86_64";
-
sha256 = "4bd0315b1b1f8d9d83e91b845df10807274c3ee921551fdece8a25cf51db08f2";
+
sha256 = "631f9c56e3b9dd3d606cf031a432c05f84c333c47067649264fd35e295d00910";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/en-US/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/en-US/thunderbird-102.1.2.tar.bz2";
locale = "en-US";
arch = "linux-x86_64";
-
sha256 = "16c2db5a24db5f9a7b449a73ebe0b881fd6965c4060f9b005df2ec819dded4e0";
+
sha256 = "5227881c30d9723386a9296c44c5253fe930c2f32b094c63972e4ba3a6c316eb";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/es-AR/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/es-AR/thunderbird-102.1.2.tar.bz2";
locale = "es-AR";
arch = "linux-x86_64";
-
sha256 = "a9cb0bbc9ea7cfe759cf19e9e27cf23ca88967d26e7a951a5b58908fdd535cdc";
+
sha256 = "094652b5b87bfe24389ef15acdb8a62b2bdee5b16d0ea3fa8b10b47ea8371391";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/es-ES/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/es-ES/thunderbird-102.1.2.tar.bz2";
locale = "es-ES";
arch = "linux-x86_64";
-
sha256 = "462ebc50ec7fb4a4f6fe81fcec48d2e50ae6ae0c90768499104692fdd5e78396";
+
sha256 = "63fa635cfc4e0d1c1365589090a1d01025f4b03d826f09530876329d23ab3f8f";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/es-MX/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/es-MX/thunderbird-102.1.2.tar.bz2";
locale = "es-MX";
arch = "linux-x86_64";
-
sha256 = "bb025a6d3bda7916ecba63b400386fa046d0a075ad1f82213d7b6577d6605edc";
+
sha256 = "efa60acc622b904efbf99f8708f236221f474da529741da7ae411300c0a839ac";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/et/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/et/thunderbird-102.1.2.tar.bz2";
locale = "et";
arch = "linux-x86_64";
-
sha256 = "7914cf39516159f769f29ca73985ae45d587c8db953fea10aa9814d65bbc341d";
+
sha256 = "c9eb969de36dddd32eca24c9845093caa9afffaba2e22e1c84ca8b1a1c39850f";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/eu/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/eu/thunderbird-102.1.2.tar.bz2";
locale = "eu";
arch = "linux-x86_64";
-
sha256 = "b34813f880a4a48152695a65d5ff24e206e34bdbdaeb8edef59c0075d3b130de";
+
sha256 = "65348b4703f68daa83f2964593c38fda497fe2426472138bdbc5c7a7eb48f348";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/fi/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/fi/thunderbird-102.1.2.tar.bz2";
locale = "fi";
arch = "linux-x86_64";
-
sha256 = "33aff0a00102765d0e102eea520f615a3d4d0f1d93a00e8768e6fc93492fd16e";
+
sha256 = "a229d9e9d7ea87e940d2aff60b0ee8e0288d3e584b0c73a45d1bb34d16d57117";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/fr/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/fr/thunderbird-102.1.2.tar.bz2";
locale = "fr";
arch = "linux-x86_64";
-
sha256 = "0cce5a940d8c3a2b9d15d3102108d21c3165d69c30a62618da0a93b95a52cf99";
+
sha256 = "714f5aefaab686cf6daa699f4e00455e2a4abf2414b5bbf3436e9020694ed27d";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/fy-NL/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/fy-NL/thunderbird-102.1.2.tar.bz2";
locale = "fy-NL";
arch = "linux-x86_64";
-
sha256 = "bba6ccedface111987459a370352972853fd0af65a61a1a0032faf24113730df";
+
sha256 = "89198e512ee6a8384a95739f718b89b3309b51c2afbe3f86841724e829990d05";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ga-IE/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ga-IE/thunderbird-102.1.2.tar.bz2";
locale = "ga-IE";
arch = "linux-x86_64";
-
sha256 = "18960a121ffc43f27e9fa733ec2a80881f4ca9316bf6114ccc693de772416c89";
+
sha256 = "4b68b313a633aab863abad1ebf80385a8a2bc95915ce74b7277e9bd6ec95fba0";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/gd/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/gd/thunderbird-102.1.2.tar.bz2";
locale = "gd";
arch = "linux-x86_64";
-
sha256 = "6e4430667839fbab52acc968036d9a08d99eec0eed5ceb5284ac747c4026c5ff";
+
sha256 = "8703b7388f1f183707682dc9f29d847a56a3e61b8018361e583bdb2081d0a92e";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/gl/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/gl/thunderbird-102.1.2.tar.bz2";
locale = "gl";
arch = "linux-x86_64";
-
sha256 = "0c871f1f195fc35b78c9f6b1f93220635231f117da3c5b470b852724408390e9";
+
sha256 = "f46a7c1a5e6d6b413220b2edcd8d0e9c3d0ebb7fe55599b3f151e8b82d0d0d6f";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/he/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/he/thunderbird-102.1.2.tar.bz2";
locale = "he";
arch = "linux-x86_64";
-
sha256 = "e0f6dc98cebe0a00361b05292547d338d767837b5a29740786049f0af9bdbf38";
+
sha256 = "cb79bc77109b9e36874755f497ff55e7df29dd45a411df134e342efae4df91a0";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/hr/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/hr/thunderbird-102.1.2.tar.bz2";
locale = "hr";
arch = "linux-x86_64";
-
sha256 = "af6a7cd558d9ce3f30c98fc1f6d4d5ffab8342dbab27b381943f8d21aab05f37";
+
sha256 = "f7f83473148269479dfa94211c3465e2dfb1e746a61c749d8a4648e37790832f";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/hsb/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/hsb/thunderbird-102.1.2.tar.bz2";
locale = "hsb";
arch = "linux-x86_64";
-
sha256 = "fc121b9b7ff2a74562dd239345d8754b3f21d5ea99eea47eee2436c71aad39fe";
+
sha256 = "f26ebf4f971502b6a5681b6888a65b4dbbd49bc7e44d99b2580bdad1e656be44";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/hu/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/hu/thunderbird-102.1.2.tar.bz2";
locale = "hu";
arch = "linux-x86_64";
-
sha256 = "e8df28798a07a4a43265f5a8c29ae0844f083f51bffe54afc9b173881407021b";
+
sha256 = "d05150adc28458e01b52a45d633ce895713bc4fbbc1a867bf61efa4459682fc2";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/hy-AM/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/hy-AM/thunderbird-102.1.2.tar.bz2";
locale = "hy-AM";
arch = "linux-x86_64";
-
sha256 = "8a7c705633a98937550b8c22199dfba8f9908fd6ea2c41cccf504bcb8c1b0c05";
+
sha256 = "bb2d7f8167dc30c1a927701022b927f6cd21aab4e60e02cee8274badb196c77c";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/id/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/id/thunderbird-102.1.2.tar.bz2";
locale = "id";
arch = "linux-x86_64";
-
sha256 = "ed2d44255fc8d227a602743619b6bab606bbc17de96f90503c644347fa99cc58";
+
sha256 = "06342277629f9f42fb6a2ccaeed5421047cf2dec9dd912b0825ee9ffee2d1aba";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/is/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/is/thunderbird-102.1.2.tar.bz2";
locale = "is";
arch = "linux-x86_64";
-
sha256 = "309d47fece404ef7717d95cf0b4920be48ecee0b69c73a1431e7044fab5c46d2";
+
sha256 = "ffa8a785f1a7c5c670782e87d492c9d2831ede93c178b1038f8735484036f8be";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/it/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/it/thunderbird-102.1.2.tar.bz2";
locale = "it";
arch = "linux-x86_64";
-
sha256 = "e92bd95955e9e6964394d95dd6564956e14c618e73f9853a72473cc89f6e68b7";
+
sha256 = "97d0433d6c49d445006738fe43cccca9c76216e065b0d6f126eb50084f5ab265";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ja/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ja/thunderbird-102.1.2.tar.bz2";
locale = "ja";
arch = "linux-x86_64";
-
sha256 = "81299c0ccaf3dd52d92a081a828d01573bcfe7f821c7cb6d0697acb505591189";
+
sha256 = "d8f885cb04693fc9a079ac541350b03805ab053b5aa60e49b037ebdfd5532019";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ka/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ka/thunderbird-102.1.2.tar.bz2";
locale = "ka";
arch = "linux-x86_64";
-
sha256 = "8445a72ae12af5c11d56e0dc1d8bc3beb5c368386950b3815bc63c6b3ff48837";
+
sha256 = "e07636d63fc6b22ea1534022a7e1433da1a3ddc5a22dd0e9e2245f2a18d4bdd6";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/kab/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/kab/thunderbird-102.1.2.tar.bz2";
locale = "kab";
arch = "linux-x86_64";
-
sha256 = "c403ad18c89ba13550484a4cf83afd0e28c6a11dead70f4a40ad81e136b5c4a7";
+
sha256 = "a0a087c5bbdc1acf2ab45ba164ce3a390cb40496b5c82a8821fff9e23641a193";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/kk/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/kk/thunderbird-102.1.2.tar.bz2";
locale = "kk";
arch = "linux-x86_64";
-
sha256 = "924ddb7c862291732f58dd3e57b9a3b30e39eea24efc1a02a6226f580c6878ca";
+
sha256 = "97548dde66cc92df20e2f807e70d57a4a72b4a6f5ff18caecf26e218ac218ca5";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ko/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ko/thunderbird-102.1.2.tar.bz2";
locale = "ko";
arch = "linux-x86_64";
-
sha256 = "7663f31cc759cf0115a75bba540f57f6c64905c63d204825a5fc63ad6e274edd";
+
sha256 = "bc51227d4f7bfd5c45b0234da669d8b6998c2cf109fe298e6edac65a34df5b02";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/lt/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/lt/thunderbird-102.1.2.tar.bz2";
locale = "lt";
arch = "linux-x86_64";
-
sha256 = "039d08152f607f6a8190cdb306e37ec2434447c655e9a86a5703170a36116a4b";
+
sha256 = "438017e6f6f6dd71553a0248282dfe25922121af6c4b14fce45dd95defd3a519";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/lv/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/lv/thunderbird-102.1.2.tar.bz2";
locale = "lv";
arch = "linux-x86_64";
-
sha256 = "0f40dbd570823d52abf7739024f1dda2a52303b02edf63939b6a544f15231252";
+
sha256 = "4e631147ed90b5eaf92f9c324f85620e59b22d96d4dba225567d13123393713e";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ms/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ms/thunderbird-102.1.2.tar.bz2";
locale = "ms";
arch = "linux-x86_64";
-
sha256 = "6f8abab920d8755f94bbbaa151fa6400be664b7e6dedc57e7c94c0bb2dfc4752";
+
sha256 = "26046b38c260068dadb29d779a0a7a4a15fda0c5aba9ace9e078554d01f337e4";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/nb-NO/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/nb-NO/thunderbird-102.1.2.tar.bz2";
locale = "nb-NO";
arch = "linux-x86_64";
-
sha256 = "4938fe75b54544ff7888c6db0a52b94ab4d71af15cfe429d6420ace100f47f0d";
+
sha256 = "933a7042a64c0f730aeef00449f4b05ef1f72bf031c31f3f4348c57f75243ff1";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/nl/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/nl/thunderbird-102.1.2.tar.bz2";
locale = "nl";
arch = "linux-x86_64";
-
sha256 = "769484d34082d656720e92f737bc7b80c39685e74aefa3148e8988d54c3fb96e";
+
sha256 = "8a221cb6c2f308c8b1761e436ac69b3e4367afc5d0b0bafe8463a19605d23307";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/nn-NO/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/nn-NO/thunderbird-102.1.2.tar.bz2";
locale = "nn-NO";
arch = "linux-x86_64";
-
sha256 = "2f6628897a9dda07bbf8f0d5df020b073b081ebb5d77942f23a38900b56f0cc5";
+
sha256 = "ab4182c6d11c0c4deb3ce09608e2c8ef771400562f3dceaa1c41e6592d376bf5";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/pa-IN/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/pa-IN/thunderbird-102.1.2.tar.bz2";
locale = "pa-IN";
arch = "linux-x86_64";
-
sha256 = "d5381e984b7f180c743f1572ee156c9b23350eacf3cea6b005aa159022bcb5c5";
+
sha256 = "bb9a7c35ee2b73217a80c6a9fc05c9ddf41cedf04b4fe872c11959ee5e80e95c";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/pl/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/pl/thunderbird-102.1.2.tar.bz2";
locale = "pl";
arch = "linux-x86_64";
-
sha256 = "2322ce9c3979e01d3bad6af964b1917293a654fa24e1ae70413194e93ebc4016";
+
sha256 = "aa705ada7e847104cfffc8e67cf2261b0c546a0fb6522aae8288cb0332ef480b";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/pt-BR/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/pt-BR/thunderbird-102.1.2.tar.bz2";
locale = "pt-BR";
arch = "linux-x86_64";
-
sha256 = "c427e30ce35ae73c9f214aaccbd61880dc896f18619d85e81f166d068d01a107";
+
sha256 = "1871803eb0df4341aca0a5e49956fdaa5b8a180b1a9b5d4891a6b5145141f0fa";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/pt-PT/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/pt-PT/thunderbird-102.1.2.tar.bz2";
locale = "pt-PT";
arch = "linux-x86_64";
-
sha256 = "8593bd34d6c87882d38cb521bd7e64e698565376bc50198a840f48516d2d1473";
+
sha256 = "dde614c584721d3d0ac34f022000691d9138777f5bf016b1f73b50eaec5297e6";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/rm/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/rm/thunderbird-102.1.2.tar.bz2";
locale = "rm";
arch = "linux-x86_64";
-
sha256 = "8afd7611f7a3604fd1b720ca4fd8f91b46e43a905874d87ef1befaefcfb73c16";
+
sha256 = "748b3db1b3984cfaa6deb55ab14bae5001a43a44013a9f0533b20dfb0914a171";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ro/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ro/thunderbird-102.1.2.tar.bz2";
locale = "ro";
arch = "linux-x86_64";
-
sha256 = "322faa61dc5524d84fadbd57df1cf6a12631c12b02af79807f6c0042c2d7906a";
+
sha256 = "9ac16bcebfb28ab3f0eeec7504c62b8965d25d0d199b4e2f371feed0daf71298";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ru/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ru/thunderbird-102.1.2.tar.bz2";
locale = "ru";
arch = "linux-x86_64";
-
sha256 = "696b98e0a1309bb66355051a0dd507a323e16fd98425fe8fff9688625edd6669";
+
sha256 = "32db96e0aafba6a886e90c2adb89363aaf06b0a03abadca558cbd8c97051d41c";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/sk/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/sk/thunderbird-102.1.2.tar.bz2";
locale = "sk";
arch = "linux-x86_64";
-
sha256 = "4370208682ced071070f798a5f3f024a6a154e12150435550ddb96334dd773de";
+
sha256 = "7a16cbfa0944c6592285d26a9a88ddd4f7d3100af139bfc079aced2252e6564d";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/sl/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/sl/thunderbird-102.1.2.tar.bz2";
locale = "sl";
arch = "linux-x86_64";
-
sha256 = "c7b15cbd62fcc90503f16ca6cfccded4205cd2af058886f23435317b0f085425";
+
sha256 = "165468dc4a5a012e7d84d7cb5a83d0ebc907fe95581dc9faf838bfcdf7958f49";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/sq/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/sq/thunderbird-102.1.2.tar.bz2";
locale = "sq";
arch = "linux-x86_64";
-
sha256 = "e5827847a7d987fdc0484bdc70110213b1d3a1ee4ba8e0b10bcebfc39c9f3e5a";
+
sha256 = "7ada316a5bad8752666d7497365863589a5693a6f9579a7978aafea69ab95be8";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/sr/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/sr/thunderbird-102.1.2.tar.bz2";
locale = "sr";
arch = "linux-x86_64";
-
sha256 = "a17962cbf4cc6b302a7b06432fa9a5ba11e33505089619bb677293d6f3529832";
+
sha256 = "b7a3a141050b189051010a977bf85f27135f8ee10af0c70dcbe04780c7f05489";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/sv-SE/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/sv-SE/thunderbird-102.1.2.tar.bz2";
locale = "sv-SE";
arch = "linux-x86_64";
-
sha256 = "bb11f3928321898f0c746dc988995bf853e102f753b91c602073c8357cfb1d00";
+
sha256 = "35b058a42ca3627f9695eb22d1c8d71ee72aa4bc3be2e072aa9561cded1d6686";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/th/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/th/thunderbird-102.1.2.tar.bz2";
locale = "th";
arch = "linux-x86_64";
-
sha256 = "38696729272f4ca48d918767135e03a24226f86529d243482c729196d645f94b";
+
sha256 = "39cc0214918f882ed19b0986f500d7b24a29026b2651f35b798571460f3cf022";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/tr/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/tr/thunderbird-102.1.2.tar.bz2";
locale = "tr";
arch = "linux-x86_64";
-
sha256 = "3857970887245300da2d764a2da99a64fcdd725ae9456dbe423a79483666cd93";
+
sha256 = "b8f2d411457ce94ee48f98725f996098f3868406ba82ecd4a9305a17e42aaccf";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/uk/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/uk/thunderbird-102.1.2.tar.bz2";
locale = "uk";
arch = "linux-x86_64";
-
sha256 = "743b5f2b7e04af087acbf75ca47ea5ec9588530908a33c8e2025d1ee6d91b70e";
+
sha256 = "e41fb8cbe8da3f632992f4fd15e812b2e10e5ade070f3970446a213724b3736d";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/uz/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/uz/thunderbird-102.1.2.tar.bz2";
locale = "uz";
arch = "linux-x86_64";
-
sha256 = "ab498aa09a784ca8f42ecae1cfb7ed6b54afbf7381fc3f32391cf160983fdbc6";
+
sha256 = "26fdadcb748baf1c699a23fc90caa9cb342cf93bc18b110c6efcce89b3eb555a";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/vi/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/vi/thunderbird-102.1.2.tar.bz2";
locale = "vi";
arch = "linux-x86_64";
-
sha256 = "57d18f28b4ebe93093657aab133c58da1859ad8261fe5eb14f156a813c9feb53";
+
sha256 = "a91cf22c3592346599ede9495f51b0aac22823194f4ceb4d34b785dfd494d47d";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/zh-CN/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/zh-CN/thunderbird-102.1.2.tar.bz2";
locale = "zh-CN";
arch = "linux-x86_64";
-
sha256 = "7922f00281084e18f3a27f661c14730de81b7df0ed3052374ad6ee1f93d15ed3";
+
sha256 = "db5c8a102bd3038105f032339a055c7f859ba64ed5f013aeaabae66a5f9b7c97";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/zh-TW/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/zh-TW/thunderbird-102.1.2.tar.bz2";
locale = "zh-TW";
arch = "linux-x86_64";
-
sha256 = "c8119e17541bd649728d3fa4f725231ded11f37809048c5b20e8847b8c222ec5";
+
sha256 = "6eb7070f15f25eed3a4af81ac4d10444e9bf8fc16dcc20d1d0b2877ca508c3ad";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/af/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/af/thunderbird-102.1.2.tar.bz2";
locale = "af";
arch = "linux-i686";
-
sha256 = "dd728dbb96d781c4ad0b2a01d67807d2b8235c7b77f652b4d226248f84f2bb92";
+
sha256 = "0389d59440492dba14c4600618da93b1d6164c2942b160398ef48d2d33ff6afe";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ar/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ar/thunderbird-102.1.2.tar.bz2";
locale = "ar";
arch = "linux-i686";
-
sha256 = "68314d9ce2afc0a91578b7761df736b16d3016629ac191474a014e662bf4e419";
+
sha256 = "b1aa3d6f9bd3b124ebc81e4b7bd244e07267aa9fdb433a15cc55259678b65d59";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ast/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ast/thunderbird-102.1.2.tar.bz2";
locale = "ast";
arch = "linux-i686";
-
sha256 = "e9e82165023f075e6380794487474856ef0420530f94f8c1c233d3112fcc2ca5";
+
sha256 = "39557a3ff8b1b9f334fb60ba0f21f652eb052e2ce52ca69132c256ab18f36484";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/be/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/be/thunderbird-102.1.2.tar.bz2";
locale = "be";
arch = "linux-i686";
-
sha256 = "3722fc4b2a9f42104f4bb2267923320c392f817486c1dcfbe4a92c01764a900c";
+
sha256 = "c8ad677a9c20d462cca53030ef21708668fad7f6ca2432e48159cdc35b283416";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/bg/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/bg/thunderbird-102.1.2.tar.bz2";
locale = "bg";
arch = "linux-i686";
-
sha256 = "719f8571d79cdef43abba3bd2e453d875652b9bde7b24ed987cbb83b313e8cf0";
+
sha256 = "248fb0b4259c9936d0ab7246d49749d79cac136843393cfb42fb8fb1e60a3c4d";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/br/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/br/thunderbird-102.1.2.tar.bz2";
locale = "br";
arch = "linux-i686";
-
sha256 = "8195d158a2770707073ae0ed18bcf578ff061c052d593b4feb02e9f10facb6be";
+
sha256 = "4f7b9cb23ce763d4c80bbbfa55f37dc950c768620891a1540a4cd2c2add61120";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ca/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ca/thunderbird-102.1.2.tar.bz2";
locale = "ca";
arch = "linux-i686";
-
sha256 = "f97b5247b38c00f2e6db3a2edd878de0059dec8a59b92663ea2d9f7175a4eb7e";
+
sha256 = "95335a5eca928b64cfd3b66bc3fd04c013300122ebd6120d53fffa5450544532";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/cak/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/cak/thunderbird-102.1.2.tar.bz2";
locale = "cak";
arch = "linux-i686";
-
sha256 = "247f1be0ebac1033b519dadefb35c645c02c6352658a24e9b2864d449bc91ab3";
+
sha256 = "f70d912d44e5d86dc565ac1ea517178e1c02a054805a1fe2f46c0749bbc94327";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/cs/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/cs/thunderbird-102.1.2.tar.bz2";
locale = "cs";
arch = "linux-i686";
-
sha256 = "39bec8757b777aeadf5e3803a1b8ca52bf8c62f906d792b1d47a68b67593162f";
+
sha256 = "27ca0c7c25ea1eddda5416a8e79e21f5c56d11c58d25f7716f8aa5e7628dc3fd";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/cy/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/cy/thunderbird-102.1.2.tar.bz2";
locale = "cy";
arch = "linux-i686";
-
sha256 = "d9899c8f3b6c538828b559af3990d44bb93fa085539815f4c800bcd3f7f2029c";
+
sha256 = "24927b8410cef3c9ed234fe1ae4d264333e4d14577715580817117479d4039b5";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/da/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/da/thunderbird-102.1.2.tar.bz2";
locale = "da";
arch = "linux-i686";
-
sha256 = "359ffd538a7f5f2870d8bd379f1538800defe296766a0cae57432e545f0ee49e";
+
sha256 = "bf34f47b5397ba7abaf8df61deea65a28f61d66dc91502d41fec5f8593fecc75";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/de/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/de/thunderbird-102.1.2.tar.bz2";
locale = "de";
arch = "linux-i686";
-
sha256 = "1f372cd57db1e564d960c12dd34317747017d4255e2c5dc8f960d5075bf2a835";
+
sha256 = "372606ca06a8e86ec7d39f9da0d6943b1dac6389aa5223ceab572d7b17aef4e1";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/dsb/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/dsb/thunderbird-102.1.2.tar.bz2";
locale = "dsb";
arch = "linux-i686";
-
sha256 = "fca6872c8bc3fd832ceb96b4cabe189fb4b679592fbf4fd4e27df514da917d4e";
+
sha256 = "b771a808ed13d2e21b4411e3e1b22e0a4159593cdf2e5eb7aad37a19b58892dc";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/el/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/el/thunderbird-102.1.2.tar.bz2";
locale = "el";
arch = "linux-i686";
-
sha256 = "81ba36edd7ce98f44a86511fc7b03e030e2fc2ec1821640114a6546babc1b042";
+
sha256 = "da57fe1f356d9b26bf49289e4755e3faefa31f0719ff00f8af7e3b832bf59e4a";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/en-CA/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/en-CA/thunderbird-102.1.2.tar.bz2";
locale = "en-CA";
arch = "linux-i686";
-
sha256 = "bf3ec87dd0842e92d0a759e8bad1eb5fbce8917277fabfd70b8366bfab9f011f";
+
sha256 = "a4abeea1e5477fcdbb2a5606610eefeb40fdd65e6e418042058e684b86b2c30e";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/en-GB/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/en-GB/thunderbird-102.1.2.tar.bz2";
locale = "en-GB";
arch = "linux-i686";
-
sha256 = "9b1ac42adceab6ddc19bc432ae4568fe4008f0063c59b86871041a299890d9fe";
+
sha256 = "8ff8ca611dfdbd03b63eff740fa70c4fceeb292157af3718a79499b77d6954f7";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/en-US/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/en-US/thunderbird-102.1.2.tar.bz2";
locale = "en-US";
arch = "linux-i686";
-
sha256 = "acd7b35b5d7d2e863a0a37a850b60d6ce91d156476ce1c7974256339000d86bb";
+
sha256 = "5eb0b8c567be77cd8231ebab5269acbac310c2d01cf6f810c5e321496884b94c";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/es-AR/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/es-AR/thunderbird-102.1.2.tar.bz2";
locale = "es-AR";
arch = "linux-i686";
-
sha256 = "4b2715d15add631a1158e843108cbcc0eefce833ec42d7d35b4d856b473cb48f";
+
sha256 = "6e19e0ba0a54e175b5810a42a2f086a07be421dd6f6c227c60b870324042b2ca";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/es-ES/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/es-ES/thunderbird-102.1.2.tar.bz2";
locale = "es-ES";
arch = "linux-i686";
-
sha256 = "6b3dcd54b1e948ee36a3e674c22e56356b66503bd40e149b9a24ea3116cf98e5";
+
sha256 = "a626601734b040c32a1e54309799a6d953719a38eec731c6ef23b09d544c282c";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/es-MX/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/es-MX/thunderbird-102.1.2.tar.bz2";
locale = "es-MX";
arch = "linux-i686";
-
sha256 = "49fedc894cd933770536eea6359c31a01e47ad9e797274284bfaf3ea8de8ff15";
+
sha256 = "209a1a0b6d86301740846943ea62acd1781456210f3b5c3b9191017730a2dc72";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/et/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/et/thunderbird-102.1.2.tar.bz2";
locale = "et";
arch = "linux-i686";
-
sha256 = "78d961730172ae310bc08139d0eff9471745900d85fd8a568c97d649bca1b354";
+
sha256 = "9e4bb92b59ab36e317e38986c42a3231c18761a9fe6c3cc3aba7e672fc8c4334";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/eu/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/eu/thunderbird-102.1.2.tar.bz2";
locale = "eu";
arch = "linux-i686";
-
sha256 = "d8dbc084f38f86598cb1efe16a6c48634c57830318d9a9d1f5ac9ef7c63ef7ea";
+
sha256 = "68ed1a1137601c4f2f57e6afc146dc8700041b5c39931f1eb80b3c3807ab515e";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/fi/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/fi/thunderbird-102.1.2.tar.bz2";
locale = "fi";
arch = "linux-i686";
-
sha256 = "71d303185d5ec95d607507bb9836a01940908e27c15117575280b13dcb5788c0";
+
sha256 = "71fbf151a51727cd43f56dda7039442246bd6faa98a45ccef5c8b8c040315064";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/fr/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/fr/thunderbird-102.1.2.tar.bz2";
locale = "fr";
arch = "linux-i686";
-
sha256 = "55e158f1204517652d03e2b7d1600cee41f8c024db794f4676826f960440a6a4";
+
sha256 = "a2119c1e7e652d1f2423e62be999c70303fafe1498df31c74e9254f8f6b7a63d";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/fy-NL/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/fy-NL/thunderbird-102.1.2.tar.bz2";
locale = "fy-NL";
arch = "linux-i686";
-
sha256 = "329d42fef604eba4f3b5d036ba5b9acf055673205dd30f8651c94f5c7684bbf6";
+
sha256 = "6dc49239f5e7abfbd460e35d79872edf264911ebede3bbaed30f36af9ba16400";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ga-IE/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ga-IE/thunderbird-102.1.2.tar.bz2";
locale = "ga-IE";
arch = "linux-i686";
-
sha256 = "4c4d3de0d9db04caf2b46238c47c6b897f2d7fe52fe21cfa14d71568671dbf02";
+
sha256 = "e5faa22d057228ca0a982601469e2bb41a1782e61fac694b5ae458e74f84fe37";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/gd/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/gd/thunderbird-102.1.2.tar.bz2";
locale = "gd";
arch = "linux-i686";
-
sha256 = "f14761057f6d1d6934e5e1cc55335a46f26a2382dc4708632665265331b4f08b";
+
sha256 = "ea99f37e3310978ae95bd04b2dbfa8f7e7f4f2f7dc41c72df662c3778c9941a5";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/gl/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/gl/thunderbird-102.1.2.tar.bz2";
locale = "gl";
arch = "linux-i686";
-
sha256 = "2078e7499593799d76b2242f44c0097d5a1ec357da62802d5d1cce47732a75a3";
+
sha256 = "6bafaa93902648eb3964e0e1bbf6743fb4b4415e98e29b6f678ccfaf99a7120d";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/he/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/he/thunderbird-102.1.2.tar.bz2";
locale = "he";
arch = "linux-i686";
-
sha256 = "2fa1c357cfb849d61562bca9146939eda36f0af909022dbd21029b3c47f683ae";
+
sha256 = "3f7abb2eadbb725b5e2e3a71863b0ac5a2f5b2747d4f207c1cf712ba36d1d9ed";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/hr/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/hr/thunderbird-102.1.2.tar.bz2";
locale = "hr";
arch = "linux-i686";
-
sha256 = "c1b8fd464affaa87903856b9c959a09b120814d6887ce946db14e1f429a85304";
+
sha256 = "2dea47835e6b7b1c40148b449dceb993368558f9c8c40a9c5b4506a8409c9bb8";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/hsb/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/hsb/thunderbird-102.1.2.tar.bz2";
locale = "hsb";
arch = "linux-i686";
-
sha256 = "db8ac9b2463293d8360cb04df2a5a7c92f4b8eee7f1e705ca3b2f19031ff2d4e";
+
sha256 = "d58fab220f516fbf1a4e219b9d1e64882a7b1fbd905bc07b9930815857eab991";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/hu/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/hu/thunderbird-102.1.2.tar.bz2";
locale = "hu";
arch = "linux-i686";
-
sha256 = "3749911e71ef81a89a3009bf691c8a06abbc1ca537dedb68c785dca9f0257d4f";
+
sha256 = "40fd326287e681413b5631ffdfbbb07bae2aedd15d35f73c4dd0058fe622a315";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/hy-AM/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/hy-AM/thunderbird-102.1.2.tar.bz2";
locale = "hy-AM";
arch = "linux-i686";
-
sha256 = "07988301e82d78494e478fd5f99a0639642364bf53f8cd9711ff643112cf25c2";
+
sha256 = "2e3976460f2e49805fef9e455eb24647bb0a9c77f4302b8e1f9e7caf0a4f69dd";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/id/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/id/thunderbird-102.1.2.tar.bz2";
locale = "id";
arch = "linux-i686";
-
sha256 = "8af0ece3ba77f12ed9053ff9bcf311cebcf8159b34bded5df09748c2fbfb208a";
+
sha256 = "4d1782b347f631547902c4896eb809927e459e031cbadd69e561cec0d67f0be9";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/is/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/is/thunderbird-102.1.2.tar.bz2";
locale = "is";
arch = "linux-i686";
-
sha256 = "663b1af1fb3977edcb5524769effd6a94da93860c9c7206c4b31aadb85e5c8bf";
+
sha256 = "948dbf54d7a325500ad93fcb2664fe2a198defda12cc46ed9df60658c1dee3ef";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/it/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/it/thunderbird-102.1.2.tar.bz2";
locale = "it";
arch = "linux-i686";
-
sha256 = "83739d727628ef7b60c5732d41bb6c708d3adfa5fb2ccfbb0f1a62f4ac0317c5";
+
sha256 = "b8b56dbdeb2649473971d9b0dbfb759c615f300dda0484536083be1b9bfa0f9e";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ja/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ja/thunderbird-102.1.2.tar.bz2";
locale = "ja";
arch = "linux-i686";
-
sha256 = "79d20840657d20afbe7d1dcf5e86d26ded6e72a52d41b4433dbd7c08e77a239b";
+
sha256 = "156f2aada12af105f8751ebd15c9fe0e55e7c590e899eec1c45560d6ae36af80";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ka/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ka/thunderbird-102.1.2.tar.bz2";
locale = "ka";
arch = "linux-i686";
-
sha256 = "86b332459621f593e9f311b1b606e38923ad8862b4d0b6a35e113cda67ad4255";
+
sha256 = "2ef2f49658a117de9de1ac194b83efa3a3b2a30c64ddd6c9296f14c2618bc1ee";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/kab/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/kab/thunderbird-102.1.2.tar.bz2";
locale = "kab";
arch = "linux-i686";
-
sha256 = "9e4def077f06509440bc78d7ac2b7573c0e2140944bb0761d55472cb1a5465c8";
+
sha256 = "95b14e777593530ba764cfcc8c60726b41637b49801fdd22e9fb3c07e2abd84f";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/kk/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/kk/thunderbird-102.1.2.tar.bz2";
locale = "kk";
arch = "linux-i686";
-
sha256 = "39bc019264f03f7f8a25bb42242629af3c7971965b7a448f02f862e76087b7c4";
+
sha256 = "f032b6a3295b85512b68ab436b8b83dca63a3867a56a3623555720d2905bbfe8";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ko/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ko/thunderbird-102.1.2.tar.bz2";
locale = "ko";
arch = "linux-i686";
-
sha256 = "183bb61c5e4ab7ee00b5da58bee26557e82c9a9ced39e276c8a5b3f5f7974c42";
+
sha256 = "3b75a679e817c1c4eee93e91c71ee329b0b8fc35dc4695bbeb1b6fa3f4cd71b2";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/lt/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/lt/thunderbird-102.1.2.tar.bz2";
locale = "lt";
arch = "linux-i686";
-
sha256 = "da9177b28632516fecdfdb0561a9af8c502872f1f79ed552d3c7f948597ff55f";
+
sha256 = "00c5a79529e8daf343eb0334d1e9e5a7506c2ef6b2005a715e5305a3403b4b23";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/lv/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/lv/thunderbird-102.1.2.tar.bz2";
locale = "lv";
arch = "linux-i686";
-
sha256 = "5a808bff2a272396c43ecb2353dde36a1ef7f2b6c871f00e94f20f787e0ff84b";
+
sha256 = "84fd3ae0a1acf4af8dd00edbf612bd1186130f757a6523f8f8da124eef2d47a5";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ms/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ms/thunderbird-102.1.2.tar.bz2";
locale = "ms";
arch = "linux-i686";
-
sha256 = "e6b6ab180f723936c8a8a870359ffec20347d9fc58eb1b6406b76c7fa292ca1a";
+
sha256 = "3ca1fe79a9f8d9ae49ad2815c74133126d4b1b6e982903a6d2d4612f8e40c2e6";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/nb-NO/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/nb-NO/thunderbird-102.1.2.tar.bz2";
locale = "nb-NO";
arch = "linux-i686";
-
sha256 = "bf21182e27be5dd930b2cb2dcd31ed0c1c4c14b0c09a34e1be7f62b6aef85800";
+
sha256 = "1f26868424c8ee51d45254b8fd6e9695de1223d2574e7e4de2037b2f4c34af62";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/nl/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/nl/thunderbird-102.1.2.tar.bz2";
locale = "nl";
arch = "linux-i686";
-
sha256 = "431ac204db5cce7c76e5221df0754dbbca2c4eaaf131b7a144b2e325f2df8e5c";
+
sha256 = "953cf766dcc14ca591ae5633f8dfa07abe757e0dfdd5dc3ba8e2caba506b6cf8";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/nn-NO/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/nn-NO/thunderbird-102.1.2.tar.bz2";
locale = "nn-NO";
arch = "linux-i686";
-
sha256 = "52b6f7f08ee856f631376e78ecb0ab52ac3b88faee03f4604459b5ac8a98e18b";
+
sha256 = "1098dbaf39d678db1a8267f23f4e3dcffcf56cf29a3626db54d2d99f4323a14b";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/pa-IN/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/pa-IN/thunderbird-102.1.2.tar.bz2";
locale = "pa-IN";
arch = "linux-i686";
-
sha256 = "b1e5cbd3ac22af04a17920831d79c953311a9e1163cc4ca6e8aecaca89411152";
+
sha256 = "8932202b4c411b5be0cfd13cab442998ca1799d2912ac65c5ba758bc5fab3b77";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/pl/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/pl/thunderbird-102.1.2.tar.bz2";
locale = "pl";
arch = "linux-i686";
-
sha256 = "0a15a79b2be773aab7e9b719ce0212168479e78ceb4771096f3fbad13ee202af";
+
sha256 = "9bcacb8f37e8470f0550c11fab8b4a45ae3086856ba7fcb64a4065f9d3af3a84";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/pt-BR/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/pt-BR/thunderbird-102.1.2.tar.bz2";
locale = "pt-BR";
arch = "linux-i686";
-
sha256 = "ec994c42a39304861c0d5994826aa7baa2e5e07359fc192059a5f4a7e75232a0";
+
sha256 = "7d2614cd3210ff0d352143105c08ffe4d5f3763a22683ab0710fa836fa1a12ca";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/pt-PT/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/pt-PT/thunderbird-102.1.2.tar.bz2";
locale = "pt-PT";
arch = "linux-i686";
-
sha256 = "efc3b02b4f1ad379568aab7bcda964ace0ca6b041197522ab5beaed2f349f16d";
+
sha256 = "39f0165269f56e70d61b07d993b1d9ea06cfc08275fbee1d44a95b809cd8e701";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/rm/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/rm/thunderbird-102.1.2.tar.bz2";
locale = "rm";
arch = "linux-i686";
-
sha256 = "68e891c973d3f1c0d3e375bda27c4b3f1d778996dcad1377601cff5a93aef613";
+
sha256 = "649efb2f33afa27db7a9b330b903b7804b640bb5bd63133590354b832439c83b";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ro/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ro/thunderbird-102.1.2.tar.bz2";
locale = "ro";
arch = "linux-i686";
-
sha256 = "7d60e055c73d0b121e5e772447f6eb7ec7b2858ef99f2a60d5b30a6ee593d04c";
+
sha256 = "2634b9c82e303be352fda72c386517216da92a6e39928221c681f80afee11c5a";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ru/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ru/thunderbird-102.1.2.tar.bz2";
locale = "ru";
arch = "linux-i686";
-
sha256 = "8df485fdf589942e5e0110401fde31dc33af56fb0b1e0f972990cd25460651dc";
+
sha256 = "3f223227cca70e3142fdd2f537dbf9a7511ddc47ee821cf4e90c8238333a41b3";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/sk/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/sk/thunderbird-102.1.2.tar.bz2";
locale = "sk";
arch = "linux-i686";
-
sha256 = "b699730217177e392d0e51024dd86c93bd5655702e0e7ac628c1af729480fd8b";
+
sha256 = "63209953a283c2dd5a41d647eebfecb5b5da51bcb380cfe8c57fbb58228829be";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/sl/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/sl/thunderbird-102.1.2.tar.bz2";
locale = "sl";
arch = "linux-i686";
-
sha256 = "5cd62795e8c2195bff851e077ddd4ba0b6b725a562d1e4f95100f1e7cfb00d49";
+
sha256 = "ecfb2460e9c35f52f2dfe159791f576ad25611cfe028c492e30a3b385b998c68";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/sq/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/sq/thunderbird-102.1.2.tar.bz2";
locale = "sq";
arch = "linux-i686";
-
sha256 = "2cbe949408ec382b91fc056935014f800d13b7cc4fcd19e5d5699a6252698545";
+
sha256 = "6d087ac410aeda35b9b595904e28c5300226bef19a9a36b522504ae8ea3cd6a7";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/sr/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/sr/thunderbird-102.1.2.tar.bz2";
locale = "sr";
arch = "linux-i686";
-
sha256 = "264ee1a41398ff754b6b3b349b2728812bb0bf651aa39e3d1661b15e7f15ed02";
+
sha256 = "6bb2e8a43ab378432afc917a0d211867b9bb25965d257675e0f935a08c5381c7";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/sv-SE/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/sv-SE/thunderbird-102.1.2.tar.bz2";
locale = "sv-SE";
arch = "linux-i686";
-
sha256 = "05393be6b938ecb9327078305910204554ef34c413f95bf8bfc0fa846fd5e8da";
+
sha256 = "fcf9245e837e0c2514358410a074e19023ba7158668eef857daa67f5059e8411";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/th/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/th/thunderbird-102.1.2.tar.bz2";
locale = "th";
arch = "linux-i686";
-
sha256 = "9282291d0668dd7ac340dec6ec15cc2f53a08fa280823072c5aa285cab741f2d";
+
sha256 = "5c33365f0b774dafec6ab8d86e865ffc99144bb36b176ca4f2b0659913c76880";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/tr/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/tr/thunderbird-102.1.2.tar.bz2";
locale = "tr";
arch = "linux-i686";
-
sha256 = "415759235885f38a83269100df2492b48be42095e855841d31cd1b4b0875c280";
+
sha256 = "7071b53d00d2c16140c3de4867ddc0f58f27ceb8bb68f7d6c3f942a4e072db45";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/uk/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/uk/thunderbird-102.1.2.tar.bz2";
locale = "uk";
arch = "linux-i686";
-
sha256 = "480923d1f68028250ca5b7170c5391fe39152c4597ed307f1e232a2f6efaf1dc";
+
sha256 = "dc85e271eafa9bb26d266c3c6019177b68444b4705757c961895f130e222ddb3";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/uz/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/uz/thunderbird-102.1.2.tar.bz2";
locale = "uz";
arch = "linux-i686";
-
sha256 = "fdb1d65960820ebe14e6a8698abd11583652cd74f3f9412e2ff5c38df0a5b212";
+
sha256 = "a1ffa39b4a480560949ca42efed831f87c03e63b6532193f288298277efd6b46";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/vi/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/vi/thunderbird-102.1.2.tar.bz2";
locale = "vi";
arch = "linux-i686";
-
sha256 = "eb2bab16ff71881bbc6590ddd731ecbf9a1a19d5f499c9d023626da42e4ff3c6";
+
sha256 = "10414a1ad61baf1da9319826e8deb20ba79644ffb4e8de5d038d931f54b23f7a";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/zh-CN/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/zh-CN/thunderbird-102.1.2.tar.bz2";
locale = "zh-CN";
arch = "linux-i686";
-
sha256 = "0047b3f174dcd19556bf1f6f1f4bfa5fc87a6cab53d7e4d111ad7f321ffec09c";
+
sha256 = "379f4b36b6ceb7b357e8d140c062b9855cd3471573e867e4173947bf087df948";
}
-
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/zh-TW/thunderbird-102.0.3.tar.bz2";
+
{ url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/zh-TW/thunderbird-102.1.2.tar.bz2";
locale = "zh-TW";
arch = "linux-i686";
-
sha256 = "cdee1981e868cb8df03681051c02ecf07936d1f5dcdee1c0f30d6c4742042b64";
+
sha256 = "edd3c26c9e5e76d388c1a4f2b20f23902d81c530fdfc2b183a0714bee53a6921";
}
];
}
+2 -2
pkgs/applications/networking/mailreaders/thunderbird/packages.nix
···
};
thunderbird-102 = (buildMozillaMach rec {
pname = "thunderbird";
-
version = "102.0.3";
+
version = "102.1.2";
application = "comm/mail";
applicationName = "Mozilla Thunderbird";
binaryName = pname;
src = fetchurl {
url = "mirror://mozilla/thunderbird/releases/${version}/source/thunderbird-${version}.source.tar.xz";
-
sha512 = "ac9f22935ef558890c95cf7fbbbe32a5bb1b7140acb10088ed0d037d1ca5c6e11695c131eb40844807003b77e83b1dd2d9008df420ec394fed5008d5c4c6c3cb";
+
sha512 = "f5c6c77e932b30b43eaa6384b1dd1ab511d0ae8262cb51a5789f7c633235d5f8f343000d1cc1cae12e00a1d73571a814f98b0bf78681e00d7a51a34cfefdfdf1";
};
extraPatches = [
# The file to be patched is different from firefox's `no-buildconfig-ffx90.patch`.
+2 -1
pkgs/applications/networking/nextcloud-client/default.nix
···
"--prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ libsecret ]}"
# See also: https://bugreports.qt.io/browse/QTBUG-85967
"--set QML_DISABLE_DISK_CACHE 1"
-
"--prefix PATH : ${lib.makeBinPath [ xdg-utils ]}"
+
# make xdg-open overrideable at runtime
+
"--suffix PATH : ${lib.makeBinPath [ xdg-utils ]}"
];
cmakeFlags = [
+1 -1
pkgs/applications/office/jabref/default.nix
···
unzip $out/lib/javafx-web-18-linux${lib.optionalString stdenv.isAarch64 "-aarch64"}.jar libjfxwebkit.so -d $out/lib/
wrapProgram $out/bin/JabRef \
-
--prefix PATH : ${lib.makeBinPath [ xdg-utils ]} \
+
--suffix PATH : ${lib.makeBinPath [ xdg-utils ]} \
--set JAVA_HOME "${jdk}" \
--set JAVA_OPTS "-Djava.library.path=$out/lib/ --patch-module org.jabref=$out/share/java/jabref/resources/main"
+2 -1
pkgs/applications/office/mytetra/default.nix
···
'';
postFixup = ''
+
# make xdg-open overrideable at runtime
wrapProgram $out/bin/mytetra \
-
--prefix PATH : ${xdg-utils}/bin
+
--suffix PATH : ${xdg-utils}/bin
'';
meta = with lib; {
+2 -1
pkgs/applications/version-management/git-and-tools/git-open/default.nix
···
cp git-open $out/bin
installManPage git-open.1
wrapProgram $out/bin/git-open \
-
--prefix PATH : "${lib.makeBinPath [ git xdg-utils gnugrep ]}"
+
--prefix PATH : "${lib.makeBinPath [ git gnugrep ]}" \
+
--suffix PATH : "${lib.makeBinPath [ xdg-utils ]}"
'';
meta = with lib; {
+4 -1
pkgs/applications/version-management/git-and-tools/lab/default.nix
···
ldflags = [ "-s" "-w" "-X main.version=${version}" ];
postInstall = ''
-
wrapProgram $out/bin/lab --prefix PATH ":" "${lib.makeBinPath [ git xdg-utils ]}";
+
# make xdg-open overrideable at runtime
+
wrapProgram $out/bin/lab \
+
--prefix PATH ":" "${lib.makeBinPath [ git ]}" \
+
--suffix PATH ":" "${lib.makeBinPath [ xdg-utils ]}"
installShellCompletion --cmd lab \
--bash <($out/bin/lab completion bash) \
--fish <($out/bin/lab completion fish) \
+3 -1
pkgs/applications/video/pipe-viewer/default.nix
···
wrapProgram "$out/bin/pipe-viewer" \
--prefix PATH : "${lib.makeBinPath [ ffmpeg wget youtube-dl yt-dlp ]}"
'' + lib.optionalString withGtk3 ''
+
# make xdg-open overrideable at runtime
wrapProgram "$out/bin/gtk-pipe-viewer" ''${gappsWrapperArgs[@]} \
-
--prefix PATH : "${lib.makeBinPath [ ffmpeg wget xdg-utils youtube-dl yt-dlp ]}"
+
--prefix PATH : "${lib.makeBinPath [ ffmpeg wget youtube-dl yt-dlp ]}" \
+
--suffix PATH : "${lib.makeBinPath [ xdg-utils ]}"
'';
meta = with lib; {
+2 -2
pkgs/development/libraries/cgreen/default.nix
···
stdenv.mkDerivation rec {
pname = "cgreen";
-
version = "1.4.1";
+
version = "1.6.0";
src = fetchFromGitHub {
owner = "cgreen-devs";
repo = "cgreen";
rev = version;
-
sha256 = "sha256-aQrfsiPuNrEMscZrOoONiN665KlNmnOiYj9ZIyzW304=";
+
sha256 = "sha256-BXch/V73a35Y6MqUlmR8mDp3ttwEAQTnqDC+ygLbIPY=";
};
postPatch = ''
+14 -1
pkgs/development/libraries/json-glib/default.nix
···
, glib
, meson
, ninja
+
, nixosTests
, pkg-config
, gettext
, gobject-introspection
···
pname = "json-glib";
version = "1.6.6";
-
outputs = [ "out" "dev" "devdoc" ];
+
outputs = [ "out" "dev" "devdoc" "installedTests" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
sha256 = "luyYvnqR9t3jNjZyDj2i/27LuQ52zKpJSX8xpoVaSQ4=";
};
+
+
patches = [
+
# Add option for changing installation path of installed tests.
+
./meson-add-installed-tests-prefix-option.patch
+
];
strictDeps = true;
···
glib
];
+
mesonFlags = [
+
"-Dinstalled_test_prefix=${placeholder "installedTests"}"
+
];
# Run-time dependency gi-docgen found: NO (tried pkgconfig and cmake)
# it should be a build-time dep for build
···
'';
passthru = {
+
tests = {
+
installedTests = nixosTests.installed-tests.json-glib;
+
};
+
updateScript = gnome.updateScript {
packageName = pname;
versionPolicy = "odd-unstable";
+27
pkgs/development/libraries/json-glib/meson-add-installed-tests-prefix-option.patch
···
+
diff --git a/json-glib/tests/meson.build b/json-glib/tests/meson.build
+
index 1eb56c8..dca444e 100644
+
--- a/json-glib/tests/meson.build
+
+++ b/json-glib/tests/meson.build
+
@@ -21,8 +21,9 @@ test_data = [
+
'stream-load.json',
+
]
+
+
-installed_test_bindir = join_paths(json_libexecdir, 'installed-tests', json_api_name)
+
-installed_test_datadir = join_paths(json_datadir, 'installed-tests', json_api_name)
+
+installed_test_prefix = get_option('installed_test_prefix')
+
+installed_test_bindir = join_paths(installed_test_prefix, 'libexec', 'installed-tests', json_api_name)
+
+installed_test_datadir = join_paths(installed_test_prefix, 'share', 'installed-tests', json_api_name)
+
+
install_data(test_data, install_dir: installed_test_bindir)
+
+
diff --git a/meson_options.txt b/meson_options.txt
+
index 068a03f..03f398a 100644
+
--- a/meson_options.txt
+
+++ b/meson_options.txt
+
@@ -10,3 +10,6 @@ option('man',
+
option('tests',
+
type: 'boolean', value: true,
+
description: 'Build the tests')
+
+option('installed_test_prefix',
+
+ description: 'Prefix for installed tests',
+
+ type: 'string')
+2 -2
pkgs/development/python-modules/fastapi-mail/default.nix
···
buildPythonPackage rec {
pname = "fastapi-mail";
-
version = "1.0.9";
+
version = "1.1.4";
format = "pyproject";
disabled = pythonOlder "3.7";
···
owner = "sabuhish";
repo = pname;
rev = "refs/tags/${version}";
-
hash = "sha256-2Nb+FzmhsKvauT/yOCLHCEld8r+6niu9kV6EmjhC6S0=";
+
hash = "sha256-eQVDPkoRWlzCLwsOh+ksYniRyg02fhda6ys5QMqeLM0=";
};
postPatch = ''
+16 -4
pkgs/development/python-modules/pep8-naming/default.nix
···
{ lib
-
, fetchPypi
, buildPythonPackage
+
, fetchFromGitHub
+
, fetchpatch
, flake8
, python
}:
···
pname = "pep8-naming";
version = "0.13.1";
-
src = fetchPypi {
-
inherit pname version;
-
sha256 = "sha256-Ovd82qnHll98haVs1Xk1RVPJu9P98weKd28S21TdaUQ=";
+
src = fetchFromGitHub {
+
owner = "PyCQA";
+
repo = pname;
+
rev = version;
+
sha256 = "sha256-NG4hLZcOMKprUyMnzkHRmUCFGyYgvT6ydBQNpgWE9h0=";
};
+
+
patches = [
+
# Fixes tests for flake8 => 5
+
# Remove on next release
+
(fetchpatch {
+
url = "https://github.com/PyCQA/pep8-naming/commit/c8808a0907f64b5d081cff8d3f9443e5ced1474e.patch";
+
sha256 = "sha256-4c+a0viS0rXuxj+TuIfgrKZjnrjiJjDoYBbNp3+6Ed0=";
+
})
+
];
propagatedBuildInputs = [
flake8
+2 -2
pkgs/development/python-modules/pyviz-comms/default.nix
···
buildPythonPackage rec {
pname = "pyviz_comms";
-
version = "2.2.0";
+
version = "2.2.1";
src = fetchPypi {
inherit pname version;
-
sha256 = "sha256-uMncveAfOEeEP7TQTDs/TeeEkgxx5Eztnfu1YPbJIhg=";
+
sha256 = "sha256-omFFuM5D0tk0s8aCbXe5E84QXFKOsuSUyJCz41Jd3zM=";
};
propagatedBuildInputs = [ param ];
+2 -2
pkgs/development/python-modules/sentinel/default.nix
···
buildPythonPackage rec {
pname = "sentinel";
-
version = "0.3.0";
+
version = "1.0.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "f28143aa4716dbc8f6193f5682176a3c33cd26aaae05d9ecf66c186a9887cc2d";
+
sha256 = "sha256-GQko+ZUa9ulKH4Tu/K7XkcKAl90VK4jpiJBr4wBFH9I=";
};
meta = with lib; {
+5
pkgs/development/python-modules/uamqp/default.nix
···
, fetchpatch
, fetchPypi
, isPy3k
+
, libcxxabi
, openssl
, Security
, six
···
six
] ++ lib.optionals (!isPy3k) [
enum34
+
];
+
+
LDFLAGS = lib.optionals stdenv.isDarwin [
+
"-L${lib.getLib libcxxabi}/lib"
];
dontUseCmakeConfigure = true;
+2 -2
pkgs/development/tools/analysis/pmd/default.nix
···
stdenv.mkDerivation rec {
pname = "pmd";
-
version = "6.47.0";
+
version = "6.48.0";
src = fetchurl {
url = "https://github.com/pmd/pmd/releases/download/pmd_releases/${version}/pmd-bin-${version}.zip";
-
hash = "sha256-0rOV6l5VCdBkk5+F/k2vYtHQWzwugvp3ogaTRuXUKXE=";
+
hash = "sha256-DXoiV5AunDGagfq8BWHFcgGBv9OdGij5DDuxOKJYnE4=";
};
nativeBuildInputs = [ unzip makeWrapper ];
+3 -3
pkgs/development/tools/analysis/tfsec/default.nix
···
buildGoModule rec {
pname = "tfsec";
-
version = "1.27.1";
+
version = "1.27.2";
src = fetchFromGitHub {
owner = "aquasecurity";
repo = pname;
rev = "v${version}";
-
hash = "sha256-9RMSSgpYAmQgIAy4pJRk3tKwx+unaFmSNgXdKK3HYTU=";
+
hash = "sha256-SFh8LHHEdyjPmQDWcDIH/zfGvJanHcuOfVAjTFBwnoY=";
};
ldflags = [
···
# "-extldflags '-fno-PIC -static'"
];
-
vendorSha256 = "sha256-o3TGEsYtd7RVGcw7guhqpbKMFkiRBpvCFUeIhnKKIeQ=";
+
vendorSha256 = "sha256-Z1UIE2sqIoF74uSy6sIUubpvdWdDa04gZB5gDOYJzHk=";
subPackages = [
"cmd/tfsec"
+21 -4
pkgs/development/tools/build-managers/gnumake/default.nix
···
-
{ lib, stdenv, fetchurl, guileSupport ? false, pkg-config, guile }:
+
{ lib
+
, stdenv
+
, fetchurl
+
, guileSupport ? false, guile
+
# avoid guile depend on bootstrap to prevent dependency cycles
+
, inBootstrap ? false
+
, pkg-config
+
, gnumake
+
}:
+
+
let
+
guileEnabled = guileSupport && !inBootstrap;
+
in
stdenv.mkDerivation rec {
pname = "gnumake";
···
./0002-remove-impure-dirs.patch
];
-
nativeBuildInputs = lib.optionals guileSupport [ pkg-config ];
-
buildInputs = lib.optionals guileSupport [ guile ];
+
nativeBuildInputs = lib.optionals guileEnabled [ pkg-config ];
+
buildInputs = lib.optionals guileEnabled [ guile ];
-
configureFlags = lib.optional guileSupport "--with-guile"
+
configureFlags = lib.optional guileEnabled "--with-guile"
# Make uses this test to decide whether it should keep track of
# subseconds. Apple made this possible with APFS and macOS 10.13.
···
outputs = [ "out" "man" "info" ];
separateDebugInfo = true;
+
+
passthru.tests = {
+
# make sure that the override doesn't break bootstrapping
+
gnumakeWithGuile = gnumake.override { guileSupport = true; };
+
};
meta = with lib; {
description = "A tool to control the generation of non-source files from sources";
+8 -3
pkgs/development/tools/godot/default.nix
···
, freetype
, openssl
, alsa-lib
+
, alsa-plugins
+
, makeWrapper
, libGLU
, zlib
, yasm
···
in
stdenv.mkDerivation rec {
pname = "godot";
-
version = "3.4.4";
+
version = "3.5";
src = fetchFromGitHub {
owner = "godotengine";
repo = "godot";
rev = "${version}-stable";
-
sha256 = "sha256-3AESLzqozi7Fc80u8Ml3ergZMkIhHy4tNlRe/3FsE6k=";
+
sha256 = "sha256-aU5cTiz7OaM0fsv0EzJDUA1Es+Ei63CKLE6GVspJexc=";
};
-
nativeBuildInputs = [ pkg-config ];
+
nativeBuildInputs = [ pkg-config makeWrapper ];
buildInputs = [
scons
udev
···
cp icon.png "$out/share/icons/godot.png"
substituteInPlace "$out/share/applications/org.godotengine.Godot.desktop" \
--replace "Exec=godot" "Exec=$out/bin/godot"
+
+
makeWrapper $out/bin/godot $out/bin/godot \
+
--set ALSA_PLUGIN_DIR ${alsa-plugins}/lib/alsa-lib
'';
meta = with lib; {
+13 -12
pkgs/development/tools/godot/pkg_config_additions.patch
···
diff --git a/platform/x11/detect.py b/platform/x11/detect.py
-
index 91652aad55..d12389f9f2 100644
+
index 98c9ddb..0cc2bff 100644
--- a/platform/x11/detect.py
+++ b/platform/x11/detect.py
-
@@ -218,6 +218,11 @@ def configure(env):
+
@@ -255,6 +255,10 @@ def configure(env):
env.ParseConfig("pkg-config xrender --cflags --libs")
env.ParseConfig("pkg-config xi --cflags --libs")
-
-
+ env.ParseConfig("pkg-config xext --cflags --libs")
+
+ env.ParseConfig("pkg-config xfixes --cflags --libs")
+ env.ParseConfig("pkg-config glu --cflags --libs")
+ env.ParseConfig("pkg-config zlib --cflags --libs")
+
if env["touch"]:
env.Append(CPPDEFINES=["TOUCH_ENABLED"])
-
-
@@ -323,6 +328,7 @@ def configure(env):
-
print("Enabling ALSA")
+
+
@@ -359,7 +363,7 @@ def configure(env):
+
if os.system("pkg-config --exists alsa") == 0: # 0 means found
env["alsa"] = True
env.Append(CPPDEFINES=["ALSA_ENABLED", "ALSAMIDI_ENABLED"])
+
- env.ParseConfig("pkg-config alsa --cflags") # Only cflags, we dlopen the library.
+ env.ParseConfig("pkg-config alsa --cflags --libs")
else:
-
print("ALSA libraries not found, disabling driver")
-
-
@@ -340,6 +346,7 @@ def configure(env):
+
print("Warning: ALSA libraries not found. Disabling the ALSA audio driver.")
+
+
@@ -375,7 +379,7 @@ def configure(env):
+
if env["udev"]:
if os.system("pkg-config --exists libudev") == 0: # 0 means found
-
print("Enabling udev support")
env.Append(CPPDEFINES=["UDEV_ENABLED"])
+
- env.ParseConfig("pkg-config libudev --cflags") # Only cflags, we dlopen the library.
+ env.ParseConfig("pkg-config libudev --cflags --libs")
else:
-
print("libudev development libraries not found, disabling udev support")
+
print("Warning: libudev development libraries not found. Disabling controller hotplugging support.")
else:
+2 -1
pkgs/games/enigma/default.nix
···
postInstall = ''
rm -r $out/include
-
wrapProgram $out/bin/enigma --prefix PATH : "${lib.makeBinPath [ xdg-utils ]}"
+
# make xdg-open overrideable at runtime
+
wrapProgram $out/bin/enigma --suffix PATH : "${lib.makeBinPath [ xdg-utils ]}"
'';
meta = with lib; {
+3 -1
pkgs/games/grapejuice/default.nix
···
makeWrapperArgs = [
"\${gappsWrapperArgs[@]}"
-
"--prefix PATH : ${lib.makeBinPath [ xdg-user-dirs xdg-utils wine winetricks pciutils glxinfo ]}"
+
"--prefix PATH : ${lib.makeBinPath [ xdg-user-dirs wine winetricks pciutils glxinfo ]}"
+
# make xdg-open overrideable at runtime
+
"--suffix PATH : ${lib.makeBinPath [ xdg-utils ]}"
];
postPatch = ''
+4 -4
pkgs/os-specific/linux/kernel/zen-kernels.nix
···
# comments with variant added for update script
# ./update-zen.py zen
zenVariant = {
-
version = "5.19.1"; #zen
+
version = "5.19.2"; #zen
suffix = "zen1"; #zen
-
sha256 = "1b906fa4hk56y5g1hx50kp395fakrphna4nnvy98vs8cxpcfyqi7"; #zen
+
sha256 = "0n21karcw9f861h26jxh29yiyg67kcxja7wh1xpdgx957avazacp"; #zen
isLqx = false;
};
# ./update-zen.py lqx
lqxVariant = {
-
version = "5.18.17"; #lqx
+
version = "5.19.2"; #lqx
suffix = "lqx1"; #lqx
-
sha256 = "1cf4ix9xx1yi781xsrkaxn673mzi98dxlccsfvky78gjchmc8d6p"; #lqx
+
sha256 = "00rssb305yxv085jhy642m8iyrbz5lvi4ynkc8vqr83y9w6ilf8y"; #lqx
isLqx = true;
};
zenKernelsFor = { version, suffix, sha256, isLqx }: buildLinux (args // {
+3 -3
pkgs/os-specific/linux/rtl8814au/default.nix
···
stdenv.mkDerivation {
pname = "rtl8814au";
-
version = "${kernel.version}-unstable-2022-05-23";
+
version = "${kernel.version}-unstable-2022-08-18";
src = fetchFromGitHub {
owner = "morrownr";
repo = "8814au";
-
rev = "687f05c73e22dc14d5f24f2bb92f2ecac3cc71d5";
-
sha256 = "08znnihk9rdrwgyzazxqcrzwdjnm5q8ah92bfb552wjv11r87zv1";
+
rev = "752d8ea365b2affc5d356e35659600995508849d";
+
hash = "sha256-m79IVoD3xFigmax13qELx5e3v0NfJSwmmC0PatA91HI=";
};
nativeBuildInputs = kernel.moduleBuildDependencies;
+3 -3
pkgs/os-specific/linux/rtl88x2bu/default.nix
···
stdenv.mkDerivation rec {
pname = "rtl88x2bu";
-
version = "${kernel.version}-unstable-2022-05-23";
+
version = "${kernel.version}-unstable-2022-08-18";
src = fetchFromGitHub {
owner = "morrownr";
repo = "88x2bu-20210702";
-
rev = "3fbe980a9a8cee223e4671449128212cf7514b3c";
-
sha256 = "1p4bp8g94ny385nl3m2ca824dbm6lhjvh7s5rqyzk220il2sa0nd";
+
rev = "6dda660a6af1b18654bbbbedd933cdf30683b7a1";
+
sha256 = "sha256-o+SLc8EQA3DHYdZQToyoZS0TFkuVEnFStQQUOCFPYXI=";
};
hardeningDisable = [ "pic" ];
+2 -2
pkgs/servers/grocy/default.nix
···
stdenv.mkDerivation rec {
pname = "grocy";
-
version = "3.3.0";
+
version = "3.3.1";
src = fetchurl {
url = "https://github.com/grocy/grocy/releases/download/v${version}/grocy_${version}.zip";
-
sha256 = "sha256-y0l0V+cTIfZYtyV8l6kdFW9UzJWb7eQMEocaPo7TLbg=";
+
sha256 = "sha256-XqjYDha9wwfITEDRZsnH/ig+9q1/SfKIwQYg1svUaXM=";
};
nativeBuildInputs = [ unzip ];
+3 -2
pkgs/servers/teleport/default.nix
···
postInstall = ''
install -Dm755 -t $client/bin $out/bin/tsh
-
wrapProgram $client/bin/tsh --prefix PATH : ${lib.makeBinPath [ xdg-utils ]}
-
wrapProgram $out/bin/tsh --prefix PATH : ${lib.makeBinPath [ xdg-utils ]}
+
# make xdg-open overrideable at runtime
+
wrapProgram $client/bin/tsh --suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
+
wrapProgram $out/bin/tsh --suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
'';
doInstallCheck = true;
+6 -1
pkgs/stdenv/linux/default.nix
···
# stage5.gcc -> stage4.coreutils -> stage3.glibc -> bootstrap
gmp = lib.makeOverridable (super.gmp.override { stdenv = self.stdenv; }).overrideAttrs (a: { pname = "${a.pname}-stage4"; });
+
# To allow users' overrides inhibit dependencies too heavy for
+
# bootstrap, like guile: https://github.com/NixOS/nixpkgs/issues/181188
+
gnumake = super.gnumake.override { inBootstrap = true; };
+
gcc = lib.makeOverridable (import ../../build-support/cc-wrapper) {
nativeTools = false;
nativeLibc = false;
···
overrides = self: super: {
inherit (prevStage)
gzip bzip2 xz bash coreutils diffutils findutils gawk
-
gnumake gnused gnutar gnugrep gnupatch patchelf
+
gnused gnutar gnugrep gnupatch patchelf
attr acl zlib pcre libunistring;
${localSystem.libc} = getLibc prevStage;
···
inherit (self) stdenv runCommandLocal patchelf libunistring;
};
+
gnumake = super.gnumake.override { inBootstrap = false; };
} // lib.optionalAttrs (super.stdenv.targetPlatform == localSystem) {
# Need to get rid of these when cross-compiling.
inherit (prevStage) binutils binutils-unwrapped;
-1
pkgs/stdenv/linux/make-bootstrap-tools.nix
···
cp -d ${mpfr.out}/lib/libmpfr*.so* $out/lib
cp -d ${libmpc.out}/lib/libmpc*.so* $out/lib
cp -d ${zlib.out}/lib/libz.so* $out/lib
-
cp -d ${libelf}/lib/libelf.so* $out/lib
'' + lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) ''
# These needed for cross but not native tools because the stdenv
+1 -1
pkgs/tools/admin/aws-sso-cli/default.nix
···
postInstall = ''
mv $out/bin/cmd $out/bin/aws-sso
wrapProgram $out/bin/aws-sso \
-
--prefix PATH : ${lib.makeBinPath [ xdg-utils ]}
+
--suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
'';
meta = with lib; {
+2 -1
pkgs/tools/admin/aws-vault/default.nix
···
nativeBuildInputs = [ installShellFiles makeWrapper ];
postInstall = ''
-
wrapProgram $out/bin/aws-vault --prefix PATH : ${lib.makeBinPath [ xdg-utils ]}
+
# make xdg-open overrideable at runtime
+
wrapProgram $out/bin/aws-vault --suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
installShellCompletion --cmd aws-vault \
--bash $src/contrib/completions/bash/aws-vault.bash \
--fish $src/contrib/completions/fish/aws-vault.fish \
+5 -2
pkgs/tools/bluetooth/blueman/default.nix
···
let
pythonPackages = python3Packages;
-
binPath = lib.makeBinPath [ xdg-utils dnsmasq dhcp iproute2 ];
in stdenv.mkDerivation rec {
pname = "blueman";
···
(lib.enableFeature withPulseAudio "pulseaudio")
];
+
makeWrapperArgs = [
+
"--prefix PATH ':' ${lib.makeBinPath [ dnsmasq dhcp iproute2 ]}"
+
"--suffix PATH ':' ${lib.makeBinPath [ xdg-utils ]}"
+
];
+
postFixup = ''
-
makeWrapperArgs="--prefix PATH ':' ${binPath}"
# This mimics ../../../development/interpreters/python/wrap.sh
wrapPythonProgramsIn "$out/bin" "$out $pythonPath"
wrapPythonProgramsIn "$out/libexec" "$out $pythonPath"
+3 -3
pkgs/tools/misc/writedisk/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "writedisk";
-
version = "1.2.0";
+
version = "1.3.0";
src = fetchCrate {
inherit version;
pname = "writedisk";
-
sha256 = "sha256-f5+Qw9Agepx2wIUmsAA2M9g/ajbFjjLR5RPPtQncRKU=";
+
sha256 = "sha256-MZFnNb8rJMu/nlH8rfnD//bhqPSkhyXucbTrwsRM9OY=";
};
-
cargoSha256 = "sha256-SMAhh7na+XQyVtbfzsBGOCdBRLP58JL1fPSBVKFkhdc=";
+
cargoSha256 = "sha256-DGroBBozAViibbIYbtqH2SxIGLqdtyJ9XKyz7O1L05g=";
nativeBuildInputs = [ pkg-config ];
+26
pkgs/tools/networking/ghz/default.nix
···
+
{ lib, buildGoModule, fetchFromGitHub }:
+
+
buildGoModule rec {
+
pname = "ghz";
+
version = "0.109.0";
+
+
src = fetchFromGitHub {
+
owner = "bojand";
+
repo = "ghz";
+
rev = "v${version}";
+
sha256 = "sha256-5l2PeN+VxTaORAkmAfI9TCGd4W6y8BFs/eY4T9nYJuc=";
+
};
+
+
vendorSha256 = "sha256-qZD+qxjjFgyQDtjOQcilS4w2sS9I+7iCK2/ThaAJTy4=";
+
+
subPackages = [ "cmd/ghz" "cmd/ghz-web" ];
+
+
ldflags = [ "-s" "-w" ];
+
+
meta = with lib; {
+
description = "Simple gRPC benchmarking and load testing tool";
+
homepage = "https://ghz.sh";
+
license = licenses.asl20;
+
maintainers = [ maintainers.zombiezen ];
+
};
+
}
+4
pkgs/top-level/all-packages.nix
···
ghrepo-stats = with python3Packages; toPythonApplication ghrepo-stats;
+
ghz = callPackage ../tools/networking/ghz { };
+
gibberish-detector = with python3Packages; toPythonApplication gibberish-detector;
gibo = callPackage ../tools/misc/gibo { };
···
blender-with-packages = callPackage ../applications/misc/blender/wrapper.nix {};
+
+
blender-hip = blender.override { hipSupport = true; };
blflash = callPackage ../tools/misc/blflash { };