diff --git a/doc/stdenv/stdenv.chapter.md b/doc/stdenv/stdenv.chapter.md
index b4cc50b509d4..fa61973263ae 100644
--- a/doc/stdenv/stdenv.chapter.md
+++ b/doc/stdenv/stdenv.chapter.md
@@ -871,12 +871,27 @@ Constructs a wrapper for a program with various possible arguments. It is define
# adds `FOOBAR=baz` to `$out/bin/foo`’s environment
makeWrapper $out/bin/foo $wrapperfile --set FOOBAR baz
-# prefixes the binary paths of `hello` and `git`
+# Prefixes the binary paths of `hello` and `git`
+# and suffixes the binary path of `xdg-utils`.
# Be advised that paths often should be patched in directly
# (via string replacements or in `configurePhase`).
-makeWrapper $out/bin/foo $wrapperfile --prefix PATH : ${lib.makeBinPath [ hello git ]}
+makeWrapper $out/bin/foo $wrapperfile \
+ --prefix PATH : ${lib.makeBinPath [ hello git ]} \
+ --suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
```
+Packages may expect or require other utilities to be available at runtime.
+`makeWrapper` can be used to add packages to a `PATH` environment variable local to a wrapper.
+
+Use `--prefix` to explicitly set dependencies in `PATH`.
+
+:::{note}
+`--prefix` essentially hard-codes dependencies into the wrapper.
+They cannot be overridden without rebuilding the package.
+:::
+
+If dependencies should be resolved at runtime, use `--suffix` to append fallback values to `PATH`.
+
There’s many more kinds of arguments, they are documented in `nixpkgs/pkgs/build-support/setup-hooks/make-wrapper.sh` for the `makeWrapper` implementation and in `nixpkgs/pkgs/build-support/setup-hooks/make-binary-wrapper/make-binary-wrapper.sh` for the `makeBinaryWrapper` implementation.
`wrapProgram` is a convenience function you probably want to use most of the time, implemented by both `makeWrapper` and `makeBinaryWrapper`.
diff --git a/nixos/modules/config/krb5/default.nix b/nixos/modules/config/krb5/default.nix
index 6cc30c47b7de..4c80f87a498d 100644
--- a/nixos/modules/config/krb5/default.nix
+++ b/nixos/modules/config/krb5/default.nix
@@ -204,11 +204,11 @@ in {
admin_server = SYSLOG:NOTICE
default = SYSLOG:NOTICE
'';
- description = ''
- These lines go to the end of krb5.conf verbatim.
- krb5.conf may include any of the relations that are
- valid for kdc.conf (see man
- kdc.conf), but it is not a recommended practice.
+ description = lib.mdDoc ''
+ These lines go to the end of `krb5.conf` verbatim.
+ `krb5.conf` may include any of the relations that are
+ valid for `kdc.conf` (see `man kdc.conf`),
+ but it is not a recommended practice.
'';
};
diff --git a/nixos/modules/config/ldap.nix b/nixos/modules/config/ldap.nix
index 0f54e4a8cf05..799d60e0103e 100644
--- a/nixos/modules/config/ldap.nix
+++ b/nixos/modules/config/ldap.nix
@@ -186,16 +186,16 @@ in
policy = mkOption {
default = "hard_open";
type = types.enum [ "hard_open" "hard_init" "soft" ];
- description = ''
+ description = lib.mdDoc ''
Specifies the policy to use for reconnecting to an unavailable
- LDAP server. The default is hard_open, which
+ LDAP server. The default is `hard_open`, which
reconnects if opening the connection to the directory server
- failed. By contrast, hard_init reconnects if
+ failed. By contrast, `hard_init` reconnects if
initializing the connection failed. Initializing may not
actually contact the directory server, and it is possible that
a malformed configuration file will trigger reconnection. If
- soft is specified, then
- nss_ldap will return immediately on server
+ `soft` is specified, then
+ `nss_ldap` will return immediately on server
failure. All hard reconnect policies block with exponential
backoff before retrying.
'';
diff --git a/nixos/modules/config/system-path.nix b/nixos/modules/config/system-path.nix
index de980e7383b0..b2d546b721de 100644
--- a/nixos/modules/config/system-path.nix
+++ b/nixos/modules/config/system-path.nix
@@ -84,19 +84,19 @@ in
${defaultPackagesText}
'';
example = [];
- description = ''
+ description = lib.mdDoc ''
Set of default packages that aren't strictly necessary
for a running system, entries can be removed for a more
minimal NixOS installation.
- Note: If pkgs.nano is removed from this list,
+ Note: If `pkgs.nano` is removed from this list,
make sure another editor is installed and the
- EDITOR environment variable is set to it.
+ `EDITOR` environment variable is set to it.
Environment variables can be set using
- .
+ {option}`environment.variables`.
Like with systemPackages, packages are installed to
- /run/current-system/sw. They are
+ {file}`/run/current-system/sw`. They are
automatically available to all users, and are
automatically updated every time you rebuild the system
configuration.
diff --git a/nixos/modules/config/xdg/portal.nix b/nixos/modules/config/xdg/portal.nix
index 689abf267f09..079b3385f8f7 100644
--- a/nixos/modules/config/xdg/portal.nix
+++ b/nixos/modules/config/xdg/portal.nix
@@ -40,12 +40,12 @@ in
extraPortals = mkOption {
type = types.listOf types.package;
default = [ ];
- description = ''
+ description = lib.mdDoc ''
List of additional portals to add to path. Portals allow interaction
with system, like choosing files or taking screenshots. At minimum,
a desktop portal implementation should be listed. GNOME and KDE already
- adds xdg-desktop-portal-gtk; and
- xdg-desktop-portal-kde respectively. On other desktop
+ adds `xdg-desktop-portal-gtk`; and
+ `xdg-desktop-portal-kde` respectively. On other desktop
environments you probably want to add them yourself.
'';
};
diff --git a/nixos/modules/config/xdg/portals/lxqt.nix b/nixos/modules/config/xdg/portals/lxqt.nix
index e85e2cc32693..4cc6c193e7cd 100644
--- a/nixos/modules/config/xdg/portals/lxqt.nix
+++ b/nixos/modules/config/xdg/portals/lxqt.nix
@@ -15,7 +15,7 @@ in
enable = mkEnableOption ''
the desktop portal for the LXQt desktop environment.
- This will add the lxqt.xdg-desktop-portal-lxqt
+ This will add the lxqt.xdg-desktop-portal-lxqt
package (with the extra Qt styles) into the
option
'';
@@ -29,9 +29,9 @@ in
pkgs.qtcurve
];
'';
- description = ''
+ description = lib.mdDoc ''
Extra Qt styles that will be available to the
- lxqt.xdg-desktop-portal-lxqt.
+ `lxqt.xdg-desktop-portal-lxqt`.
'';
};
};
diff --git a/nixos/modules/config/xdg/portals/wlr.nix b/nixos/modules/config/xdg/portals/wlr.nix
index aba1d8dbc00e..d8cbc68b1d6e 100644
--- a/nixos/modules/config/xdg/portals/wlr.nix
+++ b/nixos/modules/config/xdg/portals/wlr.nix
@@ -17,16 +17,16 @@ in
enable = mkEnableOption ''
desktop portal for wlroots-based desktops
- This will add the xdg-desktop-portal-wlr package into
+ This will add the xdg-desktop-portal-wlr package into
the option, and provide the
configuration file
'';
settings = mkOption {
- description = ''
- Configuration for xdg-desktop-portal-wlr.
+ description = lib.mdDoc ''
+ Configuration for `xdg-desktop-portal-wlr`.
- See xdg-desktop-portal-wlr(5) for supported
+ See `xdg-desktop-portal-wlr(5)` for supported
values.
'';
diff --git a/nixos/modules/config/zram.nix b/nixos/modules/config/zram.nix
index 34e80df47a40..b162fbc311e3 100644
--- a/nixos/modules/config/zram.nix
+++ b/nixos/modules/config/zram.nix
@@ -103,12 +103,12 @@ in
default = "zstd";
example = "lz4";
type = with types; either (enum [ "lzo" "lz4" "zstd" ]) str;
- description = ''
- Compression algorithm. lzo has good compression,
- but is slow. lz4 has bad compression, but is fast.
- zstd is both good compression and fast, but requires newer kernel.
+ description = lib.mdDoc ''
+ Compression algorithm. `lzo` has good compression,
+ but is slow. `lz4` has bad compression, but is fast.
+ `zstd` is both good compression and fast, but requires newer kernel.
You can check what other algorithms are supported by your zram device with
- cat /sys/class/block/zram*/comp_algorithm
+ {command}`cat /sys/class/block/zram*/comp_algorithm`
'';
};
};
diff --git a/nixos/modules/hardware/corectrl.nix b/nixos/modules/hardware/corectrl.nix
index 3185f6486c71..345ec479e736 100644
--- a/nixos/modules/hardware/corectrl.nix
+++ b/nixos/modules/hardware/corectrl.nix
@@ -20,7 +20,7 @@ in
type = types.str;
default = "0xfffd7fff";
example = "0xffffffff";
- description = ''
+ description = lib.mdDoc ''
Sets the `amdgpu.ppfeaturemask` kernel option.
In particular, it is used here to set the overdrive bit.
Default is `0xfffd7fff` as it is less likely to cause flicker issues.
diff --git a/nixos/modules/hardware/cpu/amd-sev.nix b/nixos/modules/hardware/cpu/amd-sev.nix
index 32fed2c484d4..678b98e51355 100644
--- a/nixos/modules/hardware/cpu/amd-sev.nix
+++ b/nixos/modules/hardware/cpu/amd-sev.nix
@@ -8,17 +8,17 @@ in
options.hardware.cpu.amd.sev = {
enable = mkEnableOption "access to the AMD SEV device";
user = mkOption {
- description = "Owner to assign to the SEV device.";
+ description = lib.mdDoc "Owner to assign to the SEV device.";
type = types.str;
default = "root";
};
group = mkOption {
- description = "Group to assign to the SEV device.";
+ description = lib.mdDoc "Group to assign to the SEV device.";
type = types.str;
default = defaultGroup;
};
mode = mkOption {
- description = "Mode to set for the SEV device.";
+ description = lib.mdDoc "Mode to set for the SEV device.";
type = types.str;
default = "0660";
};
diff --git a/nixos/modules/installer/sd-card/sd-image.nix b/nixos/modules/installer/sd-card/sd-image.nix
index c0335ea48759..e192312649e2 100644
--- a/nixos/modules/installer/sd-card/sd-image.nix
+++ b/nixos/modules/installer/sd-card/sd-image.nix
@@ -35,14 +35,14 @@ in
options.sdImage = {
imageName = mkOption {
default = "${config.sdImage.imageBaseName}-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}.img";
- description = ''
+ description = lib.mdDoc ''
Name of the generated image file.
'';
};
imageBaseName = mkOption {
default = "nixos-sd-image";
- description = ''
+ description = lib.mdDoc ''
Prefix of the name of the generated image file.
'';
};
@@ -50,7 +50,7 @@ in
storePaths = mkOption {
type = with types; listOf package;
example = literalExpression "[ pkgs.stdenv ]";
- description = ''
+ description = lib.mdDoc ''
Derivations to be included in the Nix store in the generated SD image.
'';
};
@@ -74,7 +74,7 @@ in
firmwarePartitionID = mkOption {
type = types.str;
default = "0x2178694e";
- description = ''
+ description = lib.mdDoc ''
Volume ID for the /boot/firmware partition on the SD card. This value
must be a 32-bit hexadecimal number.
'';
@@ -83,7 +83,7 @@ in
firmwarePartitionName = mkOption {
type = types.str;
default = "FIRMWARE";
- description = ''
+ description = lib.mdDoc ''
Name of the filesystem which holds the boot firmware.
'';
};
@@ -92,7 +92,7 @@ in
type = types.nullOr types.str;
default = null;
example = "14e19a7b-0ae0-484d-9d54-43bd6fdc20c7";
- description = ''
+ description = lib.mdDoc ''
UUID for the filesystem on the main NixOS partition on the SD card.
'';
};
@@ -101,14 +101,14 @@ in
type = types.int;
# As of 2019-08-18 the Raspberry pi firmware + u-boot takes ~18MiB
default = 30;
- description = ''
+ description = lib.mdDoc ''
Size of the /boot/firmware partition, in megabytes.
'';
};
populateFirmwareCommands = mkOption {
example = literalExpression "'' cp \${pkgs.myBootLoader}/u-boot.bin firmware/ ''";
- description = ''
+ description = lib.mdDoc ''
Shell commands to populate the ./firmware directory.
All files in that directory are copied to the
/boot/firmware partition on the SD image.
@@ -117,7 +117,7 @@ in
populateRootCommands = mkOption {
example = literalExpression "''\${config.boot.loader.generic-extlinux-compatible.populateCmd} -c \${config.system.build.toplevel} -d ./files/boot''";
- description = ''
+ description = lib.mdDoc ''
Shell commands to populate the ./files directory.
All files in that directory are copied to the
root (/) partition on the SD image. Use this to
@@ -128,7 +128,7 @@ in
postBuildCommands = mkOption {
example = literalExpression "'' dd if=\${pkgs.myBootLoader}/SPL of=$img bs=1024 seek=1 conv=notrunc ''";
default = "";
- description = ''
+ description = lib.mdDoc ''
Shell commands to run after the image is built.
Can be used for boards requiring to dd u-boot SPL before actual partitions.
'';
@@ -137,16 +137,16 @@ in
compressImage = mkOption {
type = types.bool;
default = true;
- description = ''
+ description = lib.mdDoc ''
Whether the SD image should be compressed using
- zstd.
+ {command}`zstd`.
'';
};
expandOnBoot = mkOption {
type = types.bool;
default = true;
- description = ''
+ description = lib.mdDoc ''
Whether to configure the sd image to expand it's partition on boot.
'';
};
diff --git a/nixos/modules/misc/documentation.nix b/nixos/modules/misc/documentation.nix
index 5fb1ca4c4f59..251a361a580c 100644
--- a/nixos/modules/misc/documentation.nix
+++ b/nixos/modules/misc/documentation.nix
@@ -241,7 +241,7 @@ in
nixos.extraModules = mkOption {
type = types.listOf types.raw;
default = [];
- description = ''
+ description = lib.mdDoc ''
Modules for which to show options even when not imported.
'';
};
diff --git a/nixos/modules/misc/nixpkgs.nix b/nixos/modules/misc/nixpkgs.nix
index 721a041a5830..127f37b0df04 100644
--- a/nixos/modules/misc/nixpkgs.nix
+++ b/nixos/modules/misc/nixpkgs.nix
@@ -117,13 +117,13 @@ in
'';
type = pkgsType;
example = literalExpression "import {}";
- description = ''
+ description = lib.mdDoc ''
If set, the pkgs argument to all NixOS modules is the value of
- this option, extended with nixpkgs.overlays, if
- that is also set. Either nixpkgs.crossSystem or
- nixpkgs.localSystem will be used in an assertion
+ this option, extended with `nixpkgs.overlays`, if
+ that is also set. Either `nixpkgs.crossSystem` or
+ `nixpkgs.localSystem` will be used in an assertion
to check that the NixOS and Nixpkgs architectures match. Any
- other options in nixpkgs.*, notably config,
+ other options in `nixpkgs.*`, notably `config`,
will be ignored.
If unset, the pkgs argument to all NixOS modules is determined
@@ -132,18 +132,18 @@ in
The default value imports the Nixpkgs source files
relative to the location of this NixOS module, because
NixOS and Nixpkgs are distributed together for consistency,
- so the nixos in the default value is in fact a
- relative path. The config, overlays,
- localSystem, and crossSystem come
+ so the `nixos` in the default value is in fact a
+ relative path. The `config`, `overlays`,
+ `localSystem`, and `crossSystem` come
from this option's siblings.
This option can be used by applications like NixOps to increase
the performance of evaluation, or to create packages that depend
on a container that should be built with the exact same evaluation
of Nixpkgs, for example. Applications like this should set
- their default value using lib.mkDefault, so
+ their default value using `lib.mkDefault`, so
user-provided configuration can override it without using
- lib.
+ `lib`.
Note that using a distinct version of Nixpkgs with NixOS may
be an unexpected source of problems. Use this option with care.
diff --git a/nixos/modules/misc/wordlist.nix b/nixos/modules/misc/wordlist.nix
index 988b522d7431..72ef226ca651 100644
--- a/nixos/modules/misc/wordlist.nix
+++ b/nixos/modules/misc/wordlist.nix
@@ -23,7 +23,7 @@ in
}
'';
- description = ''
+ description = lib.mdDoc ''
A set with the key names being the environment variable you'd like to
set and the values being a list of paths to text documents containing
lists of words. The various files will be merged, sorted, duplicates
diff --git a/nixos/modules/programs/captive-browser.nix b/nixos/modules/programs/captive-browser.nix
index 7ebce17bebfd..fd8400315af1 100644
--- a/nixos/modules/programs/captive-browser.nix
+++ b/nixos/modules/programs/captive-browser.nix
@@ -85,9 +85,9 @@ in
bindInterface = mkOption {
default = true;
type = types.bool;
- description = ''
- Binds captive-browser to the network interface declared in
- cfg.interface. This can be used to avoid collisions
+ description = lib.mdDoc ''
+ Binds `captive-browser` to the network interface declared in
+ `cfg.interface`. This can be used to avoid collisions
with private subnets.
'';
};
diff --git a/nixos/modules/programs/chromium.nix b/nixos/modules/programs/chromium.nix
index 98eb071e6144..58ead42daf55 100644
--- a/nixos/modules/programs/chromium.nix
+++ b/nixos/modules/programs/chromium.nix
@@ -76,10 +76,10 @@ in
extraOpts = mkOption {
type = types.attrs;
- description = ''
+ description = lib.mdDoc ''
Extra chromium policy options. A list of available policies
can be found in the Chrome Enterprise documentation:
- https://cloud.google.com/docs/chrome-enterprise/policies/
+
Make sure the selected policy is supported on Linux and your browser version.
'';
default = {};
diff --git a/nixos/modules/programs/k3b.nix b/nixos/modules/programs/k3b.nix
index 68a4d08f349c..cdaed3cf70fb 100644
--- a/nixos/modules/programs/k3b.nix
+++ b/nixos/modules/programs/k3b.nix
@@ -8,15 +8,15 @@ with lib;
enable = mkOption {
type = types.bool;
default = false;
- description = ''
+ description = lib.mdDoc ''
Whether to enable k3b, the KDE disk burning application.
- Additionally to installing k3b enabling this will
- add setuid wrappers in /run/wrappers/bin
- for both cdrdao and cdrecord. On first
- run you must manually configure the path of cdrdae and
- cdrecord to correspond to the appropriate paths under
- /run/wrappers/bin in the "Setup External Programs" menu.
+ Additionally to installing `k3b` enabling this will
+ add `setuid` wrappers in `/run/wrappers/bin`
+ for both `cdrdao` and `cdrecord`. On first
+ run you must manually configure the path of `cdrdae` and
+ `cdrecord` to correspond to the appropriate paths under
+ `/run/wrappers/bin` in the "Setup External Programs" menu.
'';
};
};
diff --git a/nixos/modules/programs/mosh.nix b/nixos/modules/programs/mosh.nix
index 31aadb6aba61..9e56e1731d7c 100644
--- a/nixos/modules/programs/mosh.nix
+++ b/nixos/modules/programs/mosh.nix
@@ -17,7 +17,7 @@ in
type = lib.types.bool;
};
withUtempter = mkOption {
- description = ''
+ description = lib.mdDoc ''
Whether to enable libutempter for mosh.
This is required so that mosh can write to /var/run/utmp (which can be queried with `who` to display currently connected user sessions).
Note, this will add a guid wrapper for the group utmp!
diff --git a/nixos/modules/programs/msmtp.nix b/nixos/modules/programs/msmtp.nix
index fbdab2cac559..023ffdd444b8 100644
--- a/nixos/modules/programs/msmtp.nix
+++ b/nixos/modules/programs/msmtp.nix
@@ -45,7 +45,7 @@ in {
passwordeval = "cat /secrets/password.txt";
};
};
- description = ''
+ description = lib.mdDoc ''
Named accounts and their respective configurations.
The special name "default" allows a default account to be defined.
See msmtp(1) for the available options.
diff --git a/nixos/modules/programs/ssh.nix b/nixos/modules/programs/ssh.nix
index 9c4a95ef22c6..865c0becdbcf 100644
--- a/nixos/modules/programs/ssh.nix
+++ b/nixos/modules/programs/ssh.nix
@@ -93,10 +93,10 @@ in
extraConfig = mkOption {
type = types.lines;
default = "";
- description = ''
- Extra configuration text prepended to ssh_config. Other generated
- options will be added after a Host * pattern.
- See ssh_config5
+ description = lib.mdDoc ''
+ Extra configuration text prepended to {file}`ssh_config`. Other generated
+ options will be added after a `Host *` pattern.
+ See {manpage}`ssh_config(5)`
for help.
'';
};
diff --git a/nixos/modules/programs/thefuck.nix b/nixos/modules/programs/thefuck.nix
index 18d09e26866c..6b939cce4195 100644
--- a/nixos/modules/programs/thefuck.nix
+++ b/nixos/modules/programs/thefuck.nix
@@ -22,7 +22,7 @@ in
default = "fuck";
type = types.str;
- description = ''
+ description = lib.mdDoc ''
`thefuck` needs an alias to be configured.
The default value is `fuck`, but you can use anything else as well.
'';
diff --git a/nixos/modules/programs/tsm-client.nix b/nixos/modules/programs/tsm-client.nix
index 0a3af3744a78..cdd70b7744ba 100644
--- a/nixos/modules/programs/tsm-client.nix
+++ b/nixos/modules/programs/tsm-client.nix
@@ -95,13 +95,13 @@ let
exclude.dir /nix/store
include.encrypt /home/.../*
'';
- description = ''
- include.* and
- exclude.* directives to be
+ description = lib.mdDoc ''
+ `include.*` and
+ `exclude.*` directives to be
used when sending files to the IBM TSM server.
The lines will be written into a file that the
- inclexcl
- directive in dsm.sys points to.
+ `inclexcl`
+ directive in {file}`dsm.sys` points to.
'';
};
options.extraConfig = mkOption {
diff --git a/nixos/modules/programs/yabar.nix b/nixos/modules/programs/yabar.nix
index 0ec668ada8eb..c6eb0eb10c34 100644
--- a/nixos/modules/programs/yabar.nix
+++ b/nixos/modules/programs/yabar.nix
@@ -62,7 +62,7 @@ in
to use `yabar-unstable'.
'';
- description = ''
+ description = lib.mdDoc ''
The package which contains the `yabar` binary.
Nixpkgs provides the `yabar` and `yabar-unstable`
diff --git a/nixos/modules/programs/zsh/oh-my-zsh.nix b/nixos/modules/programs/zsh/oh-my-zsh.nix
index b253b803edcc..41ea31b0f122 100644
--- a/nixos/modules/programs/zsh/oh-my-zsh.nix
+++ b/nixos/modules/programs/zsh/oh-my-zsh.nix
@@ -49,7 +49,7 @@ in
package = mkOption {
default = pkgs.oh-my-zsh;
defaultText = literalExpression "pkgs.oh-my-zsh";
- description = ''
+ description = lib.mdDoc ''
Package to install for `oh-my-zsh` usage.
'';
@@ -67,7 +67,7 @@ in
custom = mkOption {
default = null;
type = with types; nullOr str;
- description = ''
+ description = lib.mdDoc ''
Path to a custom oh-my-zsh package to override config of oh-my-zsh.
(Can't be used along with `customPkgs`).
'';
@@ -76,7 +76,7 @@ in
customPkgs = mkOption {
default = [];
type = types.listOf types.package;
- description = ''
+ description = lib.mdDoc ''
List of custom packages that should be loaded into `oh-my-zsh`.
'';
};
@@ -92,7 +92,7 @@ in
cacheDir = mkOption {
default = "$HOME/.cache/oh-my-zsh";
type = types.str;
- description = ''
+ description = lib.mdDoc ''
Cache directory to be used by `oh-my-zsh`.
Without this option it would default to the read-only nix store.
'';
diff --git a/nixos/modules/programs/zsh/zsh-autoenv.nix b/nixos/modules/programs/zsh/zsh-autoenv.nix
index 62f497a45dd0..46fc4d49c597 100644
--- a/nixos/modules/programs/zsh/zsh-autoenv.nix
+++ b/nixos/modules/programs/zsh/zsh-autoenv.nix
@@ -11,7 +11,7 @@ in {
package = mkOption {
default = pkgs.zsh-autoenv;
defaultText = literalExpression "pkgs.zsh-autoenv";
- description = ''
+ description = lib.mdDoc ''
Package to install for `zsh-autoenv` usage.
'';
diff --git a/nixos/modules/programs/zsh/zsh-autosuggestions.nix b/nixos/modules/programs/zsh/zsh-autosuggestions.nix
index b6c36a082e77..92a3fc081370 100644
--- a/nixos/modules/programs/zsh/zsh-autosuggestions.nix
+++ b/nixos/modules/programs/zsh/zsh-autosuggestions.nix
@@ -24,7 +24,7 @@ in
strategy = mkOption {
type = types.listOf (types.enum [ "history" "completion" "match_prev_cmd" ]);
default = [ "history" ];
- description = ''
+ description = lib.mdDoc ''
`ZSH_AUTOSUGGEST_STRATEGY` is an array that specifies how suggestions should be generated.
The strategies in the array are tried successively until a suggestion is found.
There are currently three built-in strategies to choose from:
diff --git a/nixos/modules/security/acme/default.nix b/nixos/modules/security/acme/default.nix
index 1df6d9eba953..f85cf2fc1211 100644
--- a/nixos/modules/security/acme/default.nix
+++ b/nixos/modules/security/acme/default.nix
@@ -676,7 +676,7 @@ let
inheritDefaults = mkOption {
default = true;
example = true;
- description = "Whether to inherit values set in `security.acme.defaults` or not.";
+ description = lib.mdDoc "Whether to inherit values set in `security.acme.defaults` or not.";
type = lib.types.bool;
};
};
diff --git a/nixos/modules/security/dhparams.nix b/nixos/modules/security/dhparams.nix
index b3fce7e83aff..93c9066dc95c 100644
--- a/nixos/modules/security/dhparams.nix
+++ b/nixos/modules/security/dhparams.nix
@@ -94,7 +94,7 @@ in {
If this is false the resulting store
path will be non-deterministic and will be rebuilt every time the
- openssl package changes.
+ openssl package changes.
'';
};
diff --git a/nixos/modules/security/pam.nix b/nixos/modules/security/pam.nix
index 9f89508bd1fe..94b59c83d4a7 100644
--- a/nixos/modules/security/pam.nix
+++ b/nixos/modules/security/pam.nix
@@ -320,11 +320,10 @@ let
limits = mkOption {
default = [];
type = limitsType;
- description = ''
+ description = lib.mdDoc ''
Attribute set describing resource limits. Defaults to the
- value of .
- The meaning of the values is explained in
- limits.conf5.
+ value of {option}`security.pam.loginLimits`.
+ The meaning of the values is explained in {manpage}`limits.conf(5)`.
'';
};
@@ -774,18 +773,18 @@ in
}
];
- description =
- '' Define resource limits that should apply to users or groups.
- Each item in the list should be an attribute set with a
- domain, type,
- item, and value
- attribute. The syntax and semantics of these attributes
- must be that described in limits.conf5.
+ description = ''
+ Define resource limits that should apply to users or groups.
+ Each item in the list should be an attribute set with a
+ domain, type,
+ item, and value
+ attribute. The syntax and semantics of these attributes
+ must be that described in limits.conf5.
- Note that these limits do not apply to systemd services,
- whose limits can be changed via
- instead.
- '';
+ Note that these limits do not apply to systemd services,
+ whose limits can be changed via
+ instead.
+ '';
};
security.pam.services = mkOption {
diff --git a/nixos/modules/security/sudo.nix b/nixos/modules/security/sudo.nix
index faa99a31a6d6..68ceb6c230eb 100644
--- a/nixos/modules/security/sudo.nix
+++ b/nixos/modules/security/sudo.nix
@@ -46,7 +46,7 @@ in
type = types.package;
default = pkgs.sudo;
defaultText = literalExpression "pkgs.sudo";
- description = ''
+ description = lib.mdDoc ''
Which package to use for `sudo`.
'';
};
diff --git a/nixos/modules/services/cluster/hadoop/hbase.nix b/nixos/modules/services/cluster/hadoop/hbase.nix
index 246775dc8987..8fd40459c19d 100644
--- a/nixos/modules/services/cluster/hadoop/hbase.nix
+++ b/nixos/modules/services/cluster/hadoop/hbase.nix
@@ -21,7 +21,7 @@ in
"hbase.cluster.distributed" = "true";
};
type = types.attrsOf types.anything;
- description = ''
+ description = lib.mdDoc ''
Default options for hbase-site.xml
'';
};
@@ -30,9 +30,9 @@ in
type = with types; attrsOf anything;
example = literalExpression ''
'';
- description = ''
+ description = lib.mdDoc ''
Additional options and overrides for hbase-site.xml
-
+
'';
};
hbaseSiteInternal = mkOption {
@@ -50,11 +50,11 @@ in
type = types.package;
default = pkgs.hbase;
defaultText = literalExpression "pkgs.hbase";
- description = "HBase package";
+ description = lib.mdDoc "HBase package";
};
rootdir = mkOption {
- description = ''
+ description = lib.mdDoc ''
This option will set "hbase.rootdir" in hbase-site.xml and determine
the directory shared by region servers and into which HBase persists.
The URL should be 'fully-qualified' to include the filesystem scheme.
@@ -68,7 +68,7 @@ in
default = "/hbase";
};
zookeeperQuorum = mkOption {
- description = ''
+ description = lib.mdDoc ''
This option will set "hbase.zookeeper.quorum" in hbase-site.xml.
Comma separated list of servers in the ZooKeeper ensemble.
'';
@@ -83,7 +83,7 @@ in
openFirewall = mkOption {
type = types.bool;
default = false;
- description = ''
+ description = lib.mdDoc ''
Open firewall ports for HBase master.
'';
};
@@ -94,7 +94,7 @@ in
overrideHosts = mkOption {
type = types.bool;
default = true;
- description = ''
+ description = lib.mdDoc ''
Remove /etc/hosts entries for "127.0.0.2" and "::1" defined in nixos/modules/config/networking.nix
Regionservers must be able to resolve their hostnames to their IP addresses, through PTR records
or /etc/hosts entries.
@@ -105,7 +105,7 @@ in
openFirewall = mkOption {
type = types.bool;
default = false;
- description = ''
+ description = lib.mdDoc ''
Open firewall ports for HBase master.
'';
};
diff --git a/nixos/modules/services/continuous-integration/buildbot/worker.nix b/nixos/modules/services/continuous-integration/buildbot/worker.nix
index 245f685764dc..52c41c4a7584 100644
--- a/nixos/modules/services/continuous-integration/buildbot/worker.nix
+++ b/nixos/modules/services/continuous-integration/buildbot/worker.nix
@@ -121,10 +121,10 @@ in {
keepalive = mkOption {
default = 600;
type = types.int;
- description = "
+ description = lib.mdDoc ''
This is a number that indicates how frequently keepalive messages should be sent
from the worker to the buildmaster, expressed in seconds.
- ";
+ '';
};
package = mkOption {
diff --git a/nixos/modules/services/continuous-integration/buildkite-agents.nix b/nixos/modules/services/continuous-integration/buildkite-agents.nix
index cafa40dc6e5f..8e8a65b56b78 100644
--- a/nixos/modules/services/continuous-integration/buildkite-agents.nix
+++ b/nixos/modules/services/continuous-integration/buildkite-agents.nix
@@ -193,7 +193,7 @@ in
options.services.buildkite-agents = mkOption {
type = types.attrsOf (types.submodule buildkiteOptions);
default = {};
- description = ''
+ description = lib.mdDoc ''
Attribute set of buildkite agents.
The attribute key is combined with the hostname and a unique integer to
create the final agent name. This can be overridden by setting the `name`
diff --git a/nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix b/nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix
index 9e1fb0307576..83518344b36b 100644
--- a/nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix
+++ b/nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix
@@ -103,15 +103,15 @@ let
defaultText = literalExpression ''baseDirectory + "/secrets"'';
};
clusterJoinTokenPath = mkOption {
- description = ''
+ description = lib.mdDoc ''
Location of the cluster-join-token.key file.
You can retrieve the contents of the file when creating a new agent via
- https://hercules-ci.com/dashboard.
+ .
As this value is confidential, it should not be in the store, but
installed using other means, such as agenix, NixOps
- deployment.keys, or manual installation.
+ `deployment.keys`, or manual installation.
The contents of the file are used for authentication between the agent and the API.
'';
@@ -120,29 +120,28 @@ let
defaultText = literalExpression ''staticSecretsDirectory + "/cluster-join-token.key"'';
};
binaryCachesPath = mkOption {
- description = ''
+ description = lib.mdDoc ''
Path to a JSON file containing binary cache secret keys.
As these values are confidential, they should not be in the store, but
copied over using other means, such as agenix, NixOps
- deployment.keys, or manual installation.
+ `deployment.keys`, or manual installation.
- The format is described on https://docs.hercules-ci.com/hercules-ci-agent/binary-caches-json/.
+ The format is described on .
'';
type = types.path;
default = config.staticSecretsDirectory + "/binary-caches.json";
defaultText = literalExpression ''staticSecretsDirectory + "/binary-caches.json"'';
};
secretsJsonPath = mkOption {
- description = ''
+ description = lib.mdDoc ''
Path to a JSON file containing secrets for effects.
As these values are confidential, they should not be in the store, but
copied over using other means, such as agenix, NixOps
- deployment.keys, or manual installation.
-
- The format is described on https://docs.hercules-ci.com/hercules-ci-agent/secrets-json/.
+ `deployment.keys`, or manual installation.
+ The format is described on .
'';
type = types.path;
default = config.staticSecretsDirectory + "/secrets.json";
diff --git a/nixos/modules/services/continuous-integration/hydra/default.nix b/nixos/modules/services/continuous-integration/hydra/default.nix
index 7159ec287fc8..8b5c1228c523 100644
--- a/nixos/modules/services/continuous-integration/hydra/default.nix
+++ b/nixos/modules/services/continuous-integration/hydra/default.nix
@@ -87,7 +87,7 @@ in
type = types.str;
default = localDB;
example = "dbi:Pg:dbname=hydra;host=postgres.example.org;user=foo;";
- description = ''
+ description = lib.mdDoc ''
The DBI string for Hydra database connection.
NOTE: Attempts to set `application_name` will be overridden by
@@ -115,8 +115,8 @@ in
type = types.str;
default = "*";
example = "localhost";
- description = ''
- The hostname or address to listen on or * to listen
+ description = lib.mdDoc ''
+ The hostname or address to listen on or `*` to listen
on all interfaces.
'';
};
diff --git a/nixos/modules/services/databases/foundationdb.nix b/nixos/modules/services/databases/foundationdb.nix
index f71228708e42..16998b997918 100644
--- a/nixos/modules/services/databases/foundationdb.nix
+++ b/nixos/modules/services/databases/foundationdb.nix
@@ -97,9 +97,9 @@ in
openFirewall = mkOption {
type = types.bool;
default = false;
- description = ''
+ description = lib.mdDoc ''
Open the firewall ports corresponding to FoundationDB processes and coordinators
- using .
+ using {option}`config.networking.firewall.*`.
'';
};
diff --git a/nixos/modules/services/databases/mongodb.nix b/nixos/modules/services/databases/mongodb.nix
index 981185cc534c..5a52eb98b917 100644
--- a/nixos/modules/services/databases/mongodb.nix
+++ b/nixos/modules/services/databases/mongodb.nix
@@ -35,9 +35,9 @@ in
default = pkgs.mongodb;
defaultText = literalExpression "pkgs.mongodb";
type = types.package;
- description = "
+ description = lib.mdDoc ''
Which MongoDB derivation to use.
- ";
+ '';
};
user = mkOption {
diff --git a/nixos/modules/services/databases/mysql.nix b/nixos/modules/services/databases/mysql.nix
index 1a096d2a88a4..ddb4eceb317e 100644
--- a/nixos/modules/services/databases/mysql.nix
+++ b/nixos/modules/services/databases/mysql.nix
@@ -36,9 +36,9 @@ in
package = mkOption {
type = types.package;
example = literalExpression "pkgs.mariadb";
- description = "
+ description = lib.mdDoc ''
Which MySQL derivation to use. MariaDB packages are supported too.
- ";
+ '';
};
user = mkOption {
diff --git a/nixos/modules/services/databases/postgresql.nix b/nixos/modules/services/databases/postgresql.nix
index d0135647d6af..36de8b9e874a 100644
--- a/nixos/modules/services/databases/postgresql.nix
+++ b/nixos/modules/services/databases/postgresql.nix
@@ -79,15 +79,15 @@ in
authentication = mkOption {
type = types.lines;
default = "";
- description = ''
+ description = lib.mdDoc ''
Defines how users authenticate themselves to the server. See the
- PostgreSQL documentation for pg_hba.conf
+ [PostgreSQL documentation for pg_hba.conf](https://www.postgresql.org/docs/current/auth-pg-hba-conf.html)
for details on the expected format of this option. By default,
peer based authentication will be used for users connecting
via the Unix socket, and md5 password authentication will be
used for users connecting via TCP. Any added rules will be
inserted above the default rules. If you'd like to replace the
- default rules entirely, you can use lib.mkForce in your
+ default rules entirely, you can use `lib.mkForce` in your
module.
'';
};
diff --git a/nixos/modules/services/development/jupyter/default.nix b/nixos/modules/services/development/jupyter/default.nix
index b77f5adbd5e9..66113ce09409 100644
--- a/nixos/modules/services/development/jupyter/default.nix
+++ b/nixos/modules/services/development/jupyter/default.nix
@@ -149,13 +149,14 @@ in {
};
}
'';
- description = "Declarative kernel config
+ description = lib.mdDoc ''
+ Declarative kernel config.
- Kernels can be declared in any language that supports and has the required
- dependencies to communicate with a jupyter server.
- In python's case, it means that ipykernel package must always be included in
- the list of packages of the targeted environment.
- ";
+ Kernels can be declared in any language that supports and has the required
+ dependencies to communicate with a jupyter server.
+ In python's case, it means that ipykernel package must always be included in
+ the list of packages of the targeted environment.
+ '';
};
};
diff --git a/nixos/modules/services/development/lorri.nix b/nixos/modules/services/development/lorri.nix
index a82b3f57f8e8..8c64e3d9a560 100644
--- a/nixos/modules/services/development/lorri.nix
+++ b/nixos/modules/services/development/lorri.nix
@@ -9,7 +9,7 @@ in {
enable = lib.mkOption {
default = false;
type = lib.types.bool;
- description = ''
+ description = lib.mdDoc ''
Enables the daemon for `lorri`, a nix-shell replacement for project
development. The socket-activated daemon starts on the first request
issued by the `lorri` command.
diff --git a/nixos/modules/services/editors/infinoted.nix b/nixos/modules/services/editors/infinoted.nix
index d2eb4946f2fb..c91197ea57b1 100644
--- a/nixos/modules/services/editors/infinoted.nix
+++ b/nixos/modules/services/editors/infinoted.nix
@@ -36,7 +36,7 @@ in {
certificateChain = mkOption {
type = types.nullOr types.path;
default = null;
- description = ''
+ description = lib.mdDoc ''
Chain of CA-certificates to which our `certificateFile` is relative.
Optional for TLS.
'';
diff --git a/nixos/modules/services/games/asf.nix b/nixos/modules/services/games/asf.nix
index b7892900376f..592ab4bedcfe 100644
--- a/nixos/modules/services/games/asf.nix
+++ b/nixos/modules/services/games/asf.nix
@@ -81,11 +81,11 @@ in
settings = mkOption {
type = format.type;
- description = ''
- The ASF.json file, all the options are documented here.
+ description = lib.mdDoc ''
+ The ASF.json file, all the options are documented [here](https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#global-config).
Do note that `AutoRestart` and `UpdateChannel` is always to `false` respectively `0` because NixOS takes care of updating everything.
`Headless` is also always set to `true` because there is no way to provide inputs via a systemd service.
- You should try to keep ASF up to date since upstream does not provide support for anything but the latest version and you're exposing yourself to all kinds of issues - as is outlined here.
+ You should try to keep ASF up to date since upstream does not provide support for anything but the latest version and you're exposing yourself to all kinds of issues - as is outlined [here](https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#updateperiod).
'';
example = {
Statistics = false;
diff --git a/nixos/modules/services/games/crossfire-server.nix b/nixos/modules/services/games/crossfire-server.nix
index a0dc1e6c564c..7820a08be40b 100644
--- a/nixos/modules/services/games/crossfire-server.nix
+++ b/nixos/modules/services/games/crossfire-server.nix
@@ -41,7 +41,7 @@ in {
stateDir = mkOption {
type = types.str;
default = "/var/lib/crossfire";
- description = ''
+ description = lib.mdDoc ''
Where to store runtime data (save files, persistent items, etc).
If left at the default, this will be automatically created on server
@@ -61,7 +61,7 @@ in {
configFiles = mkOption {
type = types.attrsOf types.str;
- description = ''
+ description = lib.mdDoc ''
Text to append to the corresponding configuration files. Note that the
files given in the example are *not* the complete set of files available
to customize; look in /etc/crossfire after enabling the server to see
diff --git a/nixos/modules/services/games/deliantra-server.nix b/nixos/modules/services/games/deliantra-server.nix
index 17bdf2aef776..f39044eda7c7 100644
--- a/nixos/modules/services/games/deliantra-server.nix
+++ b/nixos/modules/services/games/deliantra-server.nix
@@ -41,7 +41,7 @@ in {
stateDir = mkOption {
type = types.str;
default = "/var/lib/deliantra";
- description = ''
+ description = lib.mdDoc ''
Where to store runtime data (save files, persistent items, etc).
If left at the default, this will be automatically created on server
diff --git a/nixos/modules/services/games/minetest-server.nix b/nixos/modules/services/games/minetest-server.nix
index bc6ab7462d6b..34e0ba8c8e5c 100644
--- a/nixos/modules/services/games/minetest-server.nix
+++ b/nixos/modules/services/games/minetest-server.nix
@@ -25,7 +25,7 @@ in
gameId = mkOption {
type = types.nullOr types.str;
default = null;
- description = ''
+ description = lib.mdDoc ''
Id of the game to use. To list available games run
`minetestserver --gameid list`.
@@ -36,7 +36,7 @@ in
world = mkOption {
type = types.nullOr types.path;
default = null;
- description = ''
+ description = lib.mdDoc ''
Name of the world to use. To list available worlds run
`minetestserver --world list`.
@@ -47,7 +47,7 @@ in
configPath = mkOption {
type = types.nullOr types.path;
default = null;
- description = ''
+ description = lib.mdDoc ''
Path to the config to use.
If set to null, the config of the running user will be used:
diff --git a/nixos/modules/services/hardware/fwupd.nix b/nixos/modules/services/hardware/fwupd.nix
index eb5f6dcf8fd0..fe00cd1e32b6 100644
--- a/nixos/modules/services/hardware/fwupd.nix
+++ b/nixos/modules/services/hardware/fwupd.nix
@@ -15,9 +15,9 @@ let
DisabledPlugins=${lib.concatStringsSep ";" cfg.disabledPlugins}
'';
};
- "fwupd/uefi.conf" = {
- source = pkgs.writeText "uefi.conf" ''
- [uefi]
+ "fwupd/uefi_capsule.conf" = {
+ source = pkgs.writeText "uefi_capsule.conf" ''
+ [uefi_capsule]
OverrideESPMountPoint=${config.boot.loader.efi.efiSysMountPoint}
'';
};
@@ -125,8 +125,6 @@ in {
services.udev.packages = [ cfg.package ];
- services.udisks2.enable = true;
-
systemd.packages = [ cfg.package ];
};
diff --git a/nixos/modules/services/home-automation/home-assistant.nix b/nixos/modules/services/home-automation/home-assistant.nix
index 2b8128383631..c435491e71a9 100644
--- a/nixos/modules/services/home-automation/home-assistant.nix
+++ b/nixos/modules/services/home-automation/home-assistant.nix
@@ -126,10 +126,10 @@ in {
psycopg2
];
'';
- description = ''
+ description = lib.mdDoc ''
List of packages to add to propagatedBuildInputs.
- A popular example is python3Packages.psycopg2
+ A popular example is `python3Packages.psycopg2`
for PostgreSQL support in the recorder component.
'';
};
diff --git a/nixos/modules/services/logging/logrotate.nix b/nixos/modules/services/logging/logrotate.nix
index 53230cc51e59..3ea130a891d4 100644
--- a/nixos/modules/services/logging/logrotate.nix
+++ b/nixos/modules/services/logging/logrotate.nix
@@ -79,7 +79,7 @@ let
priority = mkOption {
type = types.int;
default = 1000;
- description = ''
+ description = lib.mdDoc ''
Order of this logrotate block in relation to the others. The semantics are
the same as with `lib.mkOrder`. Smaller values have a greater priority.
'';
@@ -260,7 +260,7 @@ in
priority = mkOption {
type = types.int;
default = 1000;
- description = ''
+ description = lib.mdDoc ''
Order of this logrotate block in relation to the others. The semantics are
the same as with `lib.mkOrder`. Smaller values are inserted first.
'';
diff --git a/nixos/modules/services/mail/postfix.nix b/nixos/modules/services/mail/postfix.nix
index 75ef09dbc6ee..3dc54038661d 100644
--- a/nixos/modules/services/mail/postfix.nix
+++ b/nixos/modules/services/mail/postfix.nix
@@ -355,125 +355,125 @@ in
setgidGroup = mkOption {
type = types.str;
default = "postdrop";
- description = "
+ description = lib.mdDoc ''
How to call postfix setgid group (for postdrop). Should
be uniquely used group.
- ";
+ '';
};
networks = mkOption {
type = types.nullOr (types.listOf types.str);
default = null;
example = ["192.168.0.1/24"];
- description = "
+ description = lib.mdDoc ''
Net masks for trusted - allowed to relay mail to third parties -
hosts. Leave empty to use mynetworks_style configuration or use
default (localhost-only).
- ";
+ '';
};
networksStyle = mkOption {
type = types.str;
default = "";
- description = "
+ description = lib.mdDoc ''
Name of standard way of trusted network specification to use,
leave blank if you specify it explicitly or if you want to use
default (localhost-only).
- ";
+ '';
};
hostname = mkOption {
type = types.str;
default = "";
- description ="
+ description = lib.mdDoc ''
Hostname to use. Leave blank to use just the hostname of machine.
It should be FQDN.
- ";
+ '';
};
domain = mkOption {
type = types.str;
default = "";
- description ="
+ description = lib.mdDoc ''
Domain to use. Leave blank to use hostname minus first component.
- ";
+ '';
};
origin = mkOption {
type = types.str;
default = "";
- description ="
+ description = lib.mdDoc ''
Origin to use in outgoing e-mail. Leave blank to use hostname.
- ";
+ '';
};
destination = mkOption {
type = types.nullOr (types.listOf types.str);
default = null;
example = ["localhost"];
- description = "
+ description = lib.mdDoc ''
Full (!) list of domains we deliver locally. Leave blank for
acceptable Postfix default.
- ";
+ '';
};
relayDomains = mkOption {
type = types.nullOr (types.listOf types.str);
default = null;
example = ["localdomain"];
- description = "
+ description = lib.mdDoc ''
List of domains we agree to relay to. Default is empty.
- ";
+ '';
};
relayHost = mkOption {
type = types.str;
default = "";
- description = "
+ description = lib.mdDoc ''
Mail relay for outbound mail.
- ";
+ '';
};
relayPort = mkOption {
type = types.int;
default = 25;
- description = "
+ description = lib.mdDoc ''
SMTP port for relay mail relay.
- ";
+ '';
};
lookupMX = mkOption {
type = types.bool;
default = false;
- description = "
+ description = lib.mdDoc ''
Whether relay specified is just domain whose MX must be used.
- ";
+ '';
};
postmasterAlias = mkOption {
type = types.str;
default = "root";
- description = "
+ description = lib.mdDoc ''
Who should receive postmaster e-mail. Multiple values can be added by
separating values with comma.
- ";
+ '';
};
rootAlias = mkOption {
type = types.str;
default = "";
- description = "
+ description = lib.mdDoc ''
Who should receive root e-mail. Blank for no redirection.
Multiple values can be added by separating values with comma.
- ";
+ '';
};
extraAliases = mkOption {
type = types.lines;
default = "";
- description = "
+ description = lib.mdDoc ''
Additional entries to put verbatim into aliases file, cf. man-page aliases(8).
- ";
+ '';
};
aliasMapType = mkOption {
@@ -497,9 +497,9 @@ in
extraConfig = mkOption {
type = types.lines;
default = "";
- description = "
+ description = lib.mdDoc ''
Extra lines to be added verbatim to the main.cf configuration file.
- ";
+ '';
};
tlsTrustedAuthorities = mkOption {
@@ -527,9 +527,9 @@ in
type = types.str;
default = "";
example = "+";
- description = "
+ description = lib.mdDoc ''
Delimiter for address extension: so mail to user+test can be handled by ~user/.forward+test
- ";
+ '';
};
canonical = mkOption {
@@ -543,9 +543,9 @@ in
virtual = mkOption {
type = types.lines;
default = "";
- description = "
+ description = lib.mdDoc ''
Entries for the virtual alias map, cf. man-page virtual(5).
- ";
+ '';
};
virtualMapType = mkOption {
@@ -572,9 +572,9 @@ in
transport = mkOption {
default = "";
type = types.lines;
- description = "
+ description = lib.mdDoc ''
Entries for the transport map, cf. man-page transport(8).
- ";
+ '';
};
dnsBlacklists = mkOption {
diff --git a/nixos/modules/services/matrix/dendrite.nix b/nixos/modules/services/matrix/dendrite.nix
index 7cf9fd9e75f3..b336c5fd0f96 100644
--- a/nixos/modules/services/matrix/dendrite.nix
+++ b/nixos/modules/services/matrix/dendrite.nix
@@ -26,24 +26,24 @@ in
type = lib.types.nullOr lib.types.path;
example = "/var/lib/dendrite/server.cert";
default = null;
- description = ''
+ description = lib.mdDoc ''
The path to the TLS certificate.
-
+ ```
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
-
+ ```
'';
};
tlsKey = lib.mkOption {
type = lib.types.nullOr lib.types.path;
example = "/var/lib/dendrite/server.key";
default = null;
- description = ''
+ description = lib.mdDoc ''
The path to the TLS key.
-
+ ```
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
-
+ ```
'';
};
environmentFile = lib.mkOption {
@@ -51,8 +51,7 @@ in
example = "/var/lib/dendrite/registration_secret";
default = null;
description = ''
- Environment file as defined in
- systemd.exec5.
+ Environment file as defined in systemd.exec5.
Secrets may be passed to the service without adding them to the world-readable
Nix store, by specifying placeholder variables as the option value in Nix and
setting these variables accordingly in the environment file. Currently only used
@@ -103,13 +102,13 @@ in
lib.types.path
(lib.types.strMatching "^\\$CREDENTIALS_DIRECTORY/.+");
example = "$CREDENTIALS_DIRECTORY/private_key";
- description = ''
+ description = lib.mdDoc ''
The path to the signing private key file, used to sign
requests and events.
-
+ ```
nix-shell -p dendrite --command "generate-keys --private-key matrix_key.pem"
-
+ ```
'';
};
trusted_third_party_id_servers = lib.mkOption {
diff --git a/nixos/modules/services/matrix/synapse.nix b/nixos/modules/services/matrix/synapse.nix
index 0dbfcc17638d..a40ed93b4a6d 100644
--- a/nixos/modules/services/matrix/synapse.nix
+++ b/nixos/modules/services/matrix/synapse.nix
@@ -516,7 +516,7 @@ in {
type = types.bool;
default = true;
example = false;
- description = ''
+ description = lib.mdDoc ''
Is the preview URL API enabled? If enabled, you *must* specify an
explicit url_preview_ip_range_blacklist of IPs that the spider is
denied from accessing.
diff --git a/nixos/modules/services/misc/etebase-server.nix b/nixos/modules/services/misc/etebase-server.nix
index 1359c265c8f1..76c7c6596c85 100644
--- a/nixos/modules/services/misc/etebase-server.nix
+++ b/nixos/modules/services/misc/etebase-server.nix
@@ -133,10 +133,10 @@ in
};
};
default = {};
- description = ''
- Configuration for etebase-server. Refer to
-
- and
+ description = lib.mdDoc ''
+ Configuration for `etebase-server`. Refer to
+
+ and
for details on supported values.
'';
example = {
diff --git a/nixos/modules/services/misc/exhibitor.nix b/nixos/modules/services/misc/exhibitor.nix
index 3db42b8e4a43..d804b21fd4f9 100644
--- a/nixos/modules/services/misc/exhibitor.nix
+++ b/nixos/modules/services/misc/exhibitor.nix
@@ -71,9 +71,9 @@ in
enable = mkOption {
type = types.bool;
default = false;
- description = "
+ description = lib.mdDoc ''
Whether to enable the exhibitor server.
- ";
+ '';
};
# See https://github.com/soabase/exhibitor/wiki/Running-Exhibitor for what these mean
# General options for any type of config
diff --git a/nixos/modules/services/misc/freeswitch.nix b/nixos/modules/services/misc/freeswitch.nix
index 8a74b229ce34..88949bf98002 100644
--- a/nixos/modules/services/misc/freeswitch.nix
+++ b/nixos/modules/services/misc/freeswitch.nix
@@ -22,11 +22,11 @@ in {
enableReload = mkOption {
default = false;
type = types.bool;
- description = ''
- Issue the reloadxml command to FreeSWITCH when configuration directory changes (instead of restart).
- See FreeSWITCH documentation for more info.
- The configuration directory is exposed at /etc/freeswitch.
- See also systemd.services.*.restartIfChanged.
+ description = lib.mdDoc ''
+ Issue the `reloadxml` command to FreeSWITCH when configuration directory changes (instead of restart).
+ See [FreeSWITCH documentation](https://freeswitch.org/confluence/display/FREESWITCH/Reloading) for more info.
+ The configuration directory is exposed at {file}`/etc/freeswitch`.
+ See also `systemd.services.*.restartIfChanged`.
'';
};
configTemplate = mkOption {
diff --git a/nixos/modules/services/misc/geoipupdate.nix b/nixos/modules/services/misc/geoipupdate.nix
index c2007f25fb34..444bd57893b3 100644
--- a/nixos/modules/services/misc/geoipupdate.nix
+++ b/nixos/modules/services/misc/geoipupdate.nix
@@ -12,8 +12,7 @@ in
options = {
services.geoipupdate = {
enable = lib.mkEnableOption ''
- periodic downloading of GeoIP databases using
- geoipupdate.
+ periodic downloading of GeoIP databases using geoipupdate.
'';
interval = lib.mkOption {
@@ -36,21 +35,20 @@ in
ProxyUserPassword = { _secret = "/run/keys/proxy_pass"; };
}
'';
- description = ''
- geoipupdate configuration
- options. See
-
+ description = lib.mdDoc ''
+ geoipupdate configuration options. See
+
for a full list of available options.
Settings containing secret data should be set to an
attribute set containing the attribute
- _secret - a string pointing to a file
+ `_secret` - a string pointing to a file
containing the value the option should be set to. See the
example to get a better picture of this: in the resulting
- GeoIP.conf file, the
- ProxyUserPassword key will be set to the
+ {file}`GeoIP.conf` file, the
+ `ProxyUserPassword` key will be set to the
contents of the
- /run/keys/proxy_pass file.
+ {file}`/run/keys/proxy_pass` file.
'';
type = lib.types.submodule {
freeformType =
@@ -85,13 +83,12 @@ in
LicenseKey = lib.mkOption {
type = with lib.types; either path (attrsOf path);
- description = ''
- A file containing the
- MaxMind license key.
+ description = lib.mdDoc ''
+ A file containing the MaxMind license key.
Always handled as a secret whether the value is
- wrapped in a { _secret = ...; }
- attrset or not (refer to for
+ wrapped in a `{ _secret = ...; }`
+ attrset or not (refer to [](#opt-services.geoipupdate.settings) for
details).
'';
apply = x: if isAttrs x then x else { _secret = x; };
diff --git a/nixos/modules/services/misc/gitea.nix b/nixos/modules/services/misc/gitea.nix
index 048ff3211654..f96b4fb6dd55 100644
--- a/nixos/modules/services/misc/gitea.nix
+++ b/nixos/modules/services/misc/gitea.nix
@@ -183,7 +183,7 @@ in
file = mkOption {
type = types.nullOr types.str;
default = null;
- description = "Filename to be used for the dump. If `null` a default name is choosen by gitea.";
+ description = lib.mdDoc "Filename to be used for the dump. If `null` a default name is choosen by gitea.";
example = "gitea-dump";
};
};
@@ -293,12 +293,12 @@ in
default = "${cfg.stateDir}/log";
defaultText = literalExpression ''"''${config.${opt.stateDir}}/log"'';
type = types.str;
- description = "Root path for log files.";
+ description = lib.mdDoc "Root path for log files.";
};
LEVEL = mkOption {
default = "Info";
type = types.enum [ "Trace" "Debug" "Info" "Warn" "Error" "Critical" ];
- description = "General log level.";
+ description = lib.mdDoc "General log level.";
};
};
@@ -306,14 +306,14 @@ in
DISABLE_SSH = mkOption {
type = types.bool;
default = false;
- description = "Disable external SSH feature.";
+ description = lib.mdDoc "Disable external SSH feature.";
};
SSH_PORT = mkOption {
type = types.int;
default = 22;
example = 2222;
- description = ''
+ description = lib.mdDoc ''
SSH port displayed in clone URL.
The option is required to configure a service when the external visible port
differs from the local listening port i.e. if port forwarding is used.
@@ -339,7 +339,7 @@ in
COOKIE_SECURE = mkOption {
type = types.bool;
default = false;
- description = ''
+ description = lib.mdDoc ''
Marks session cookies as "secure" as a hint for browsers to only send
them via HTTPS. This option is recommend, if gitea is being served over HTTPS.
'';
diff --git a/nixos/modules/services/misc/gitlab.nix b/nixos/modules/services/misc/gitlab.nix
index 0bf2bca4a0b8..aa2a05900f87 100644
--- a/nixos/modules/services/misc/gitlab.nix
+++ b/nixos/modules/services/misc/gitlab.nix
@@ -338,10 +338,9 @@ in {
default = 0;
example = 48;
apply = x: x * 60 * 60;
- description = ''
+ description = lib.mdDoc ''
How long to keep the backups around, in
- hours. 0 means keep
- forever.
+ hours. `0` means “keep forever”.
'';
};
@@ -415,9 +414,9 @@ in {
databaseHost = mkOption {
type = types.str;
default = "";
- description = ''
- GitLab database hostname. An empty string means use
- local unix socket connection.
+ description = lib.mdDoc ''
+ GitLab database hostname. An empty string means
+ “use local unix socket connection”.
'';
};
@@ -752,8 +751,7 @@ in {
description = ''
The number of worker processes Puma should spawn. This
controls the amount of parallel Ruby code can be
- executed. GitLab recommends Number of CPU cores -
- 1, but at least two.
+ executed. GitLab recommends Number of CPU cores - 1, but at least two.
diff --git a/nixos/modules/services/misc/gitolite.nix b/nixos/modules/services/misc/gitolite.nix
index b313be074db0..88b9ac4a0a33 100644
--- a/nixos/modules/services/misc/gitolite.nix
+++ b/nixos/modules/services/misc/gitolite.nix
@@ -14,12 +14,11 @@ in
enable = mkOption {
type = types.bool;
default = false;
- description = ''
+ description = lib.mdDoc ''
Enable gitolite management under the
- gitolite user. After
+ `gitolite` user. After
switching to a configuration with Gitolite enabled, you can
- then run git clone
- gitolite@host:gitolite-admin.git to manage it further.
+ then run `git clone gitolite@host:gitolite-admin.git` to manage it further.
'';
};
@@ -72,25 +71,25 @@ in
@{$RC{ENABLE}} = grep { $_ ne 'desc' } @{$RC{ENABLE}}; # disable the command/feature
'''
'';
- description = ''
- Extra configuration to append to the default ~/.gitolite.rc.
+ description = lib.mdDoc ''
+ Extra configuration to append to the default `~/.gitolite.rc`.
- This should be Perl code that modifies the %RC
- configuration variable. The default ~/.gitolite.rc
- content is generated by invoking gitolite print-default-rc,
+ This should be Perl code that modifies the `%RC`
+ configuration variable. The default `~/.gitolite.rc`
+ content is generated by invoking `gitolite print-default-rc`,
and extra configuration from this option is appended to it. The result
- is placed to Nix store, and the ~/.gitolite.rc file
+ is placed to Nix store, and the `~/.gitolite.rc` file
becomes a symlink to it.
If you already have a customized (or otherwise changed)
- ~/.gitolite.rc file, NixOS will refuse to replace
+ `~/.gitolite.rc` file, NixOS will refuse to replace
it with a symlink, and the `gitolite-init` initialization service
will fail. In this situation, in order to use this option, you
will need to take any customizations you may have in
- ~/.gitolite.rc, convert them to appropriate Perl
+ `~/.gitolite.rc`, convert them to appropriate Perl
statements, add them to this option, and remove the file.
- See also the enableGitAnnex option.
+ See also the `enableGitAnnex` option.
'';
};
diff --git a/nixos/modules/services/misc/klipper.nix b/nixos/modules/services/misc/klipper.nix
index 34e9acc71929..0dadc0c74705 100644
--- a/nixos/modules/services/misc/klipper.nix
+++ b/nixos/modules/services/misc/klipper.nix
@@ -82,7 +82,7 @@ in
'';
configFile = mkOption {
type = path;
- description = "Path to firmware config which is generated using `klipper-genconf`";
+ description = lib.mdDoc "Path to firmware config which is generated using `klipper-genconf`";
};
};
});
diff --git a/nixos/modules/services/misc/nix-daemon.nix b/nixos/modules/services/misc/nix-daemon.nix
index d299c4a0a8f1..2738d2ee6cd0 100644
--- a/nixos/modules/services/misc/nix-daemon.nix
+++ b/nixos/modules/services/misc/nix-daemon.nix
@@ -264,7 +264,7 @@ in
type = types.nullOr types.str;
default = null;
example = "/root/.ssh/id_buildhost_builduser";
- description = ''
+ description = lib.mdDoc ''
The path to the SSH private key with which to authenticate on
the build machine. The private key must not have a passphrase.
If null, the building user (root on NixOS machines) must have an
@@ -562,13 +562,13 @@ in
trusted-public-keys = mkOption {
type = types.listOf types.str;
example = [ "hydra.nixos.org-1:CNHJZBh9K4tP3EKF6FkkgeVYsS3ohTl+oS0Qa8bezVs=" ];
- description = ''
+ description = lib.mdDoc ''
List of public keys used to sign binary caches. If
- is enabled,
+ {option}`nix.settings.trusted-public-keys` is enabled,
then Nix will use a binary from a binary cache if and only
- if it is signed by any of the keys
+ if it is signed by *any* of the keys
listed here. By default, only the key for
- cache.nixos.org is included.
+ `cache.nixos.org` is included.
'';
};
@@ -605,13 +605,13 @@ in
type = types.listOf types.str;
default = [ "*" ];
example = [ "@wheel" "@builders" "alice" "bob" ];
- description = ''
+ description = lib.mdDoc ''
A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon. As with
- , you can specify groups by
- prefixing them with @. Also, you can
- allow all users by specifying *. The
- default is *. Note that trusted users are
+ {option}`nix.settings.trusted-users`, you can specify groups by
+ prefixing them with `@`. Also, you can
+ allow all users by specifying `*`. The
+ default is `*`. Note that trusted users are
always allowed to connect.
'';
};
diff --git a/nixos/modules/services/misc/rmfakecloud.nix b/nixos/modules/services/misc/rmfakecloud.nix
index 2feb663f7cb6..c1b5291ce200 100644
--- a/nixos/modules/services/misc/rmfakecloud.nix
+++ b/nixos/modules/services/misc/rmfakecloud.nix
@@ -50,7 +50,7 @@ in {
type = with types; attrsOf str;
default = { };
example = { DATADIR = "/custom/path/for/rmfakecloud/data"; };
- description = ''
+ description = lib.mdDoc ''
Extra settings in the form of a set of key-value pairs.
For tokens and secrets, use `environmentFile` instead.
diff --git a/nixos/modules/services/misc/zoneminder.nix b/nixos/modules/services/misc/zoneminder.nix
index ef3f6c1a0fd9..fa0e06a01480 100644
--- a/nixos/modules/services/misc/zoneminder.nix
+++ b/nixos/modules/services/misc/zoneminder.nix
@@ -80,7 +80,7 @@ in {
webserver = mkOption {
type = types.enum [ "nginx" "none" ];
default = "nginx";
- description = ''
+ description = lib.mdDoc ''
The webserver to configure for the PHP frontend.
Set it to `none` if you want to configure it yourself. PRs are welcome
diff --git a/nixos/modules/services/monitoring/collectd.nix b/nixos/modules/services/monitoring/collectd.nix
index 5c62d509511d..3d518ebc67a4 100644
--- a/nixos/modules/services/monitoring/collectd.nix
+++ b/nixos/modules/services/monitoring/collectd.nix
@@ -52,7 +52,7 @@ in {
buildMinimalPackage = mkOption {
default = false;
- description = ''
+ description = lib.mdDoc ''
Build a minimal collectd package with only the configured `services.collectd.plugins`
'';
type = bool;
diff --git a/nixos/modules/services/monitoring/datadog-agent.nix b/nixos/modules/services/monitoring/datadog-agent.nix
index 9b984fafc12b..a7f6fa23aa65 100644
--- a/nixos/modules/services/monitoring/datadog-agent.nix
+++ b/nixos/modules/services/monitoring/datadog-agent.nix
@@ -60,7 +60,7 @@ in {
package = mkOption {
default = pkgs.datadog-agent;
defaultText = literalExpression "pkgs.datadog-agent";
- description = ''
+ description = lib.mdDoc ''
Which DataDog v7 agent package to use. Note that the provided
package is expected to have an overridable `pythonPackages`-attribute
which configures the Python environment with the Datadog
@@ -168,7 +168,7 @@ in {
};
checks = mkOption {
- description = ''
+ description = lib.mdDoc ''
Configuration for all Datadog checks. Keys of this attribute
set will be used as the name of the check to create the
appropriate configuration in `conf.d/$check.d/conf.yaml`.
diff --git a/nixos/modules/services/monitoring/grafana-agent.nix b/nixos/modules/services/monitoring/grafana-agent.nix
index 8190f44c72f7..45b62d140c16 100644
--- a/nixos/modules/services/monitoring/grafana-agent.nix
+++ b/nixos/modules/services/monitoring/grafana-agent.nix
@@ -38,8 +38,8 @@ in
};
settings = mkOption {
- description = ''
- Configuration for grafana-agent.
+ description = lib.mdDoc ''
+ Configuration for `grafana-agent`.
See https://grafana.com/docs/agent/latest/configuration/
'';
diff --git a/nixos/modules/services/monitoring/grafana-image-renderer.nix b/nixos/modules/services/monitoring/grafana-image-renderer.nix
index 4820b1946987..d92ce5e1eefc 100644
--- a/nixos/modules/services/monitoring/grafana-image-renderer.nix
+++ b/nixos/modules/services/monitoring/grafana-image-renderer.nix
@@ -63,7 +63,7 @@ in {
default = "default";
type = types.enum [ "default" "reusable" "clustered" ];
description = ''
- Rendering mode of grafana-image-renderer:
+ Rendering mode of grafana-image-renderer:
default: Creates on browser-instance
per rendering request.
@@ -79,8 +79,8 @@ in {
args = mkOption {
type = types.listOf types.str;
default = [ "--no-sandbox" ];
- description = ''
- List of CLI flags passed to chromium.
+ description = lib.mdDoc ''
+ List of CLI flags passed to `chromium`.
'';
};
};
@@ -89,10 +89,10 @@ in {
default = {};
- description = ''
- Configuration attributes for grafana-image-renderer.
+ description = lib.mdDoc ''
+ Configuration attributes for `grafana-image-renderer`.
- See
+ See
for supported values.
'';
};
diff --git a/nixos/modules/services/monitoring/mackerel-agent.nix b/nixos/modules/services/monitoring/mackerel-agent.nix
index 89c6d4d6c65b..9182739ee1cc 100644
--- a/nixos/modules/services/monitoring/mackerel-agent.nix
+++ b/nixos/modules/services/monitoring/mackerel-agent.nix
@@ -20,11 +20,11 @@ in {
apiKeyFile = mkOption {
type = types.path;
example = "/run/keys/mackerel-api-key";
- description = ''
+ description = lib.mdDoc ''
Path to file containing the Mackerel API key. The file should contain a
single line of the following form:
- apikey = "EXAMPLE_API_KEY"
+ `apikey = "EXAMPLE_API_KEY"`
'';
};
diff --git a/nixos/modules/services/monitoring/nagios.nix b/nixos/modules/services/monitoring/nagios.nix
index a45d0c0e070b..14dbc5fdb44f 100644
--- a/nixos/modules/services/monitoring/nagios.nix
+++ b/nixos/modules/services/monitoring/nagios.nix
@@ -91,11 +91,11 @@ in
enable = mkEnableOption ''Nagios to monitor your system or network.'';
objectDefs = mkOption {
- description = "
+ description = lib.mdDoc ''
A list of Nagios object configuration files that must define
the hosts, host groups, services and contacts for the
network that you want Nagios to monitor.
- ";
+ '';
type = types.listOf types.path;
example = literalExpression "[ ./objects.cfg ]";
};
@@ -104,18 +104,18 @@ in
type = types.listOf types.package;
default = with pkgs; [ monitoring-plugins msmtp mailutils ];
defaultText = literalExpression "[pkgs.monitoring-plugins pkgs.msmtp pkgs.mailutils]";
- description = "
+ description = ''
Packages to be added to the Nagios PATH.
Typically used to add plugins, but can be anything.
- ";
+ '';
};
mainConfigFile = mkOption {
type = types.nullOr types.package;
default = null;
- description = "
+ description = lib.mdDoc ''
If non-null, overrides the main configuration file of Nagios.
- ";
+ '';
};
extraConfig = mkOption {
@@ -139,19 +139,19 @@ in
type = types.package;
default = nagiosCGICfgFile;
defaultText = literalExpression "nagiosCGICfgFile";
- description = "
+ description = lib.mdDoc ''
Derivation for the configuration file of Nagios CGI scripts
that can be used in web servers for running the Nagios web interface.
- ";
+ '';
};
enableWebInterface = mkOption {
type = types.bool;
default = false;
- description = "
+ description = lib.mdDoc ''
Whether to enable the Nagios web interface. You should also
- enable Apache ().
- ";
+ enable Apache ({option}`services.httpd.enable`).
+ '';
};
virtualHost = mkOption {
diff --git a/nixos/modules/services/monitoring/prometheus/default.nix b/nixos/modules/services/monitoring/prometheus/default.nix
index 3bc61fba158f..ada66fe24646 100644
--- a/nixos/modules/services/monitoring/prometheus/default.nix
+++ b/nixos/modules/services/monitoring/prometheus/default.nix
@@ -251,7 +251,7 @@ let
authorization = mkOption {
type = types.nullOr types.attrs;
default = null;
- description = ''
+ description = lib.mdDoc ''
Sets the `Authorization` header on every scrape request with the configured credentials.
'';
};
@@ -664,7 +664,7 @@ let
promTypes.dockerswarm_sd_config = mkDockerSdConfigModule {
role = mkOption {
type = types.enum [ "services" "tasks" "nodes" ];
- description = ''
+ description = lib.mdDoc ''
Role of the targets to retrieve. Must be `services`, `tasks`, or `nodes`.
'';
};
@@ -1222,7 +1222,7 @@ let
role = mkOption {
type = types.enum [ "instance" "baremetal" ];
- description = ''
+ description = lib.mdDoc ''
Role of the targets to retrieve. Must be `instance` or `baremetal`.
'';
};
@@ -1729,16 +1729,15 @@ in
type = with types; either bool (enum [ "syntax-only" ]);
default = true;
example = "syntax-only";
- description = ''
- Check configuration with promtool
- check. The call to promtool is
+ description = lib.mdDoc ''
+ Check configuration with `promtool check`. The call to `promtool` is
subject to sandboxing by Nix.
If you use credentials stored in external files
- (password_file, bearer_token_file, etc),
- they will not be visible to promtool
+ (`password_file`, `bearer_token_file`, etc),
+ they will not be visible to `promtool`
and it will report errors, despite a correct configuration.
- To resolve this, you may set this option to "syntax-only"
+ To resolve this, you may set this option to `"syntax-only"`
in order to only syntax check the Prometheus configuration.
'';
};
diff --git a/nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix b/nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
index d86b750ba5f2..80a2f92881d7 100644
--- a/nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
+++ b/nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
@@ -33,10 +33,10 @@ in
work with this exporter:
{
- = true;
- = "/var/run/dovecot2/old-stats";
- = [ "old_stats" ];
- = '''
+ services.prometheus.exporters.dovecot.enable = true;
+ services.prometheus.exporters.dovecot.socketPath = "/var/run/dovecot2/old-stats";
+ services.dovecot2.mailPlugins.globally.enable = [ "old_stats" ];
+ services.dovecot2.extraConfig = '''
service old-stats {
unix_listener old-stats {
user = dovecot-exporter
diff --git a/nixos/modules/services/monitoring/prometheus/exporters/knot.nix b/nixos/modules/services/monitoring/prometheus/exporters/knot.nix
index 2df0ab93bdef..a73425b37da7 100644
--- a/nixos/modules/services/monitoring/prometheus/exporters/knot.nix
+++ b/nixos/modules/services/monitoring/prometheus/exporters/knot.nix
@@ -11,8 +11,8 @@ in {
type = types.str;
default = "${pkgs.knot-dns.out}/lib/libknot.so";
defaultText = literalExpression ''"''${pkgs.knot-dns.out}/lib/libknot.so"'';
- description = ''
- Path to the library of knot-dns.
+ description = lib.mdDoc ''
+ Path to the library of `knot-dns`.
'';
};
diff --git a/nixos/modules/services/monitoring/prometheus/exporters/mail.nix b/nixos/modules/services/monitoring/prometheus/exporters/mail.nix
index 205188538a21..4ebe7128e2a0 100644
--- a/nixos/modules/services/monitoring/prometheus/exporters/mail.nix
+++ b/nixos/modules/services/monitoring/prometheus/exporters/mail.nix
@@ -121,7 +121,7 @@ let
It's possible to work around the issue with a config like this:
{
- services.rspamd.locals."multimap.conf".text = '''
+ services.rspamd.locals."multimap.conf".text = '''
ALLOWLIST_PROMETHEUS {
filter = "email:domain:tld";
type = "from";
diff --git a/nixos/modules/services/monitoring/prometheus/exporters/nginxlog.nix b/nixos/modules/services/monitoring/prometheus/exporters/nginxlog.nix
index 9967d3647e00..9e507423c7d6 100644
--- a/nixos/modules/services/monitoring/prometheus/exporters/nginxlog.nix
+++ b/nixos/modules/services/monitoring/prometheus/exporters/nginxlog.nix
@@ -10,7 +10,7 @@ in {
settings = mkOption {
type = types.attrs;
default = {};
- description = ''
+ description = lib.mdDoc ''
All settings of nginxlog expressed as an Nix attrset.
Check the official documentation for the corresponding YAML
diff --git a/nixos/modules/services/monitoring/prometheus/exporters/openldap.nix b/nixos/modules/services/monitoring/prometheus/exporters/openldap.nix
index 59fcedef9ddc..6f77c05562d7 100644
--- a/nixos/modules/services/monitoring/prometheus/exporters/openldap.nix
+++ b/nixos/modules/services/monitoring/prometheus/exporters/openldap.nix
@@ -12,7 +12,7 @@ in {
example = "/run/keys/ldap_pass";
description = ''
Environment file to contain the credentials to authenticate against
- openldap.
+ openldap.
The file should look like this:
@@ -26,15 +26,15 @@ in {
default = "tcp";
example = "udp";
type = types.str;
- description = ''
- Which protocol to use to connect against openldap.
+ description = lib.mdDoc ''
+ Which protocol to use to connect against `openldap`.
'';
};
ldapAddr = mkOption {
default = "localhost:389";
type = types.str;
- description = ''
- Address of the openldap-instance.
+ description = lib.mdDoc ''
+ Address of the `openldap`-instance.
'';
};
metricsPath = mkOption {
diff --git a/nixos/modules/services/monitoring/riemann-tools.nix b/nixos/modules/services/monitoring/riemann-tools.nix
index b5cd79c74301..28821267b4f3 100644
--- a/nixos/modules/services/monitoring/riemann-tools.nix
+++ b/nixos/modules/services/monitoring/riemann-tools.nix
@@ -37,7 +37,7 @@ in {
extraArgs = mkOption {
type = types.listOf types.str;
default = [];
- description = ''
+ description = lib.mdDoc ''
A list of commandline-switches forwarded to a riemann-tool.
See for example `riemann-health --help` for available options.
'';
diff --git a/nixos/modules/services/network-filesystems/xtreemfs.nix b/nixos/modules/services/network-filesystems/xtreemfs.nix
index 7b476fc7ac93..09d517740a0a 100644
--- a/nixos/modules/services/network-filesystems/xtreemfs.nix
+++ b/nixos/modules/services/network-filesystems/xtreemfs.nix
@@ -111,7 +111,7 @@ in
uuid = mkOption {
example = "eacb6bab-f444-4ebf-a06a-3f72d7465e40";
type = types.str;
- description = ''
+ description = lib.mdDoc ''
Must be set to a unique identifier, preferably a UUID according to
RFC 4122. UUIDs can be generated with `uuidgen` command, found in
the `util-linux` package.
@@ -236,7 +236,7 @@ in
uuid = mkOption {
example = "eacb6bab-f444-4ebf-a06a-3f72d7465e41";
type = types.str;
- description = ''
+ description = lib.mdDoc ''
Must be set to a unique identifier, preferably a UUID according to
RFC 4122. UUIDs can be generated with `uuidgen` command, found in
the `util-linux` package.
@@ -379,7 +379,7 @@ in
uuid = mkOption {
example = "eacb6bab-f444-4ebf-a06a-3f72d7465e42";
type = types.str;
- description = ''
+ description = lib.mdDoc ''
Must be set to a unique identifier, preferably a UUID according to
RFC 4122. UUIDs can be generated with `uuidgen` command, found in
the `util-linux` package.
diff --git a/nixos/modules/services/network-filesystems/yandex-disk.nix b/nixos/modules/services/network-filesystems/yandex-disk.nix
index 94f806a61789..1078df0bed25 100644
--- a/nixos/modules/services/network-filesystems/yandex-disk.nix
+++ b/nixos/modules/services/network-filesystems/yandex-disk.nix
@@ -23,9 +23,9 @@ in
enable = mkOption {
type = types.bool;
default = false;
- description = "
+ description = lib.mdDoc ''
Whether to enable Yandex-disk client. See https://disk.yandex.ru/
- ";
+ '';
};
username = mkOption {
diff --git a/nixos/modules/services/networking/bind.nix b/nixos/modules/services/networking/bind.nix
index 0966332f7d0d..630d1b20733b 100644
--- a/nixos/modules/services/networking/bind.nix
+++ b/nixos/modules/services/networking/bind.nix
@@ -117,62 +117,62 @@ in
cacheNetworks = mkOption {
default = [ "127.0.0.0/24" ];
type = types.listOf types.str;
- description = "
+ description = lib.mdDoc ''
What networks are allowed to use us as a resolver. Note
that this is for recursive queries -- all networks are
allowed to query zones configured with the `zones` option.
It is recommended that you limit cacheNetworks to avoid your
server being used for DNS amplification attacks.
- ";
+ '';
};
blockedNetworks = mkOption {
default = [ ];
type = types.listOf types.str;
- description = "
+ description = lib.mdDoc ''
What networks are just blocked.
- ";
+ '';
};
ipv4Only = mkOption {
default = false;
type = types.bool;
- description = "
+ description = lib.mdDoc ''
Only use ipv4, even if the host supports ipv6.
- ";
+ '';
};
forwarders = mkOption {
default = config.networking.nameservers;
defaultText = literalExpression "config.networking.nameservers";
type = types.listOf types.str;
- description = "
+ description = lib.mdDoc ''
List of servers we should forward requests to.
- ";
+ '';
};
forward = mkOption {
default = "first";
type = types.enum ["first" "only"];
- description = "
+ description = lib.mdDoc ''
Whether to forward 'first' (try forwarding but lookup directly if forwarding fails) or 'only'.
- ";
+ '';
};
listenOn = mkOption {
default = [ "any" ];
type = types.listOf types.str;
- description = "
+ description = lib.mdDoc ''
Interfaces to listen on.
- ";
+ '';
};
listenOnIpv6 = mkOption {
default = [ "any" ];
type = types.listOf types.str;
- description = "
+ description = lib.mdDoc ''
Ipv6 interfaces to listen on.
- ";
+ '';
};
directory = mkOption {
@@ -184,9 +184,9 @@ in
zones = mkOption {
default = [ ];
type = with types; coercedTo (listOf attrs) bindZoneCoerce (attrsOf (types.submodule bindZoneOptions));
- description = "
+ description = lib.mdDoc ''
List of zones we claim authority over.
- ";
+ '';
example = {
"example.com" = {
master = false;
@@ -201,9 +201,9 @@ in
extraConfig = mkOption {
type = types.lines;
default = "";
- description = "
+ description = lib.mdDoc ''
Extra lines to be added verbatim to the generated named configuration file.
- ";
+ '';
};
extraOptions = mkOption {
@@ -219,10 +219,10 @@ in
type = types.path;
default = confFile;
defaultText = literalExpression "confFile";
- description = "
+ description = lib.mdDoc ''
Overridable config file to use for named. By default, that
generated by nixos.
- ";
+ '';
};
};
diff --git a/nixos/modules/services/networking/cloudflare-dyndns.nix b/nixos/modules/services/networking/cloudflare-dyndns.nix
index 5dd90cfe35ba..92d7f97b0bc4 100644
--- a/nixos/modules/services/networking/cloudflare-dyndns.nix
+++ b/nixos/modules/services/networking/cloudflare-dyndns.nix
@@ -13,7 +13,7 @@ in
apiTokenFile = mkOption {
type = types.nullOr types.str;
default = null;
- description = ''
+ description = lib.mdDoc ''
The path to a file containing the CloudFlare API token.
The file must have the form `CLOUDFLARE_API_TOKEN=...`
diff --git a/nixos/modules/services/networking/create_ap.nix b/nixos/modules/services/networking/create_ap.nix
index a3c330fab007..2fcf9b8a5419 100644
--- a/nixos/modules/services/networking/create_ap.nix
+++ b/nixos/modules/services/networking/create_ap.nix
@@ -12,9 +12,9 @@ in {
settings = mkOption {
type = with types; attrsOf (oneOf [ int bool str ]);
default = {};
- description = ''
- Configuration for create_ap.
- See upstream example configuration
+ description = lib.mdDoc ''
+ Configuration for `create_ap`.
+ See [upstream example configuration](https://raw.githubusercontent.com/lakinduakash/linux-wifi-hotspot/master/src/scripts/create_ap.conf)
for supported values.
'';
example = {
diff --git a/nixos/modules/services/networking/dhcpcd.nix b/nixos/modules/services/networking/dhcpcd.nix
index 6b7ce828919c..ac5d45a65e3b 100644
--- a/nixos/modules/services/networking/dhcpcd.nix
+++ b/nixos/modules/services/networking/dhcpcd.nix
@@ -155,7 +155,7 @@ in
type = types.lines;
default = "";
example = "if [[ $reason =~ BOUND ]]; then echo $interface: Routers are $new_routers - were $old_routers; fi";
- description = ''
+ description = lib.mdDoc ''
Shell code that will be run after all other hooks. See
`man dhcpcd-run-hooks` for details on what is possible.
'';
diff --git a/nixos/modules/services/networking/ferm.nix b/nixos/modules/services/networking/ferm.nix
index 7faebcef6300..ea96a736fecf 100644
--- a/nixos/modules/services/networking/ferm.nix
+++ b/nixos/modules/services/networking/ferm.nix
@@ -20,7 +20,7 @@ in {
enable = mkOption {
default = false;
type = types.bool;
- description = ''
+ description = lib.mdDoc ''
Whether to enable Ferm Firewall.
*Warning*: Enabling this service WILL disable the existing NixOS
firewall! Default firewall rules provided by packages are not
diff --git a/nixos/modules/services/networking/firefox-syncserver.nix b/nixos/modules/services/networking/firefox-syncserver.nix
index 254d5c1dc670..2944124b1043 100644
--- a/nixos/modules/services/networking/firefox-syncserver.nix
+++ b/nixos/modules/services/networking/firefox-syncserver.nix
@@ -55,7 +55,7 @@ in
type = lib.types.package;
default = pkgs.syncstorage-rs;
defaultText = lib.literalExpression "pkgs.syncstorage-rs";
- description = ''
+ description = lib.mdDoc ''
Package to use.
'';
};
@@ -66,16 +66,16 @@ in
# behavior ever change.
type = lib.types.strMatching "[a-z_][a-z0-9_]*";
default = defaultDatabase;
- description = ''
+ description = lib.mdDoc ''
Database to use for storage. Will be created automatically if it does not exist
- and config.${opt.database.createLocally} is set.
+ and `config.${opt.database.createLocally}` is set.
'';
};
database.user = lib.mkOption {
type = lib.types.str;
default = defaultUser;
- description = ''
+ description = lib.mdDoc ''
Username for database connections.
'';
};
@@ -83,8 +83,8 @@ in
database.host = lib.mkOption {
type = lib.types.str;
default = "localhost";
- description = ''
- Database host name. localhost is treated specially and inserts
+ description = lib.mdDoc ''
+ Database host name. `localhost` is treated specially and inserts
systemd dependencies, other hostnames or IP addresses of the local machine do not.
'';
};
@@ -92,7 +92,7 @@ in
database.createLocally = lib.mkOption {
type = lib.types.bool;
default = true;
- description = ''
+ description = lib.mdDoc ''
Whether to create database and user on the local machine if they do not exist.
This includes enabling unix domain socket authentication for the configured user.
'';
@@ -101,19 +101,19 @@ in
logLevel = lib.mkOption {
type = lib.types.str;
default = "error";
- description = ''
- Log level to run with. This can be a simple log level like error
- or trace, or a more complicated logging expression.
+ description = lib.mdDoc ''
+ Log level to run with. This can be a simple log level like `error`
+ or `trace`, or a more complicated logging expression.
'';
};
secrets = lib.mkOption {
type = lib.types.path;
- description = ''
+ description = lib.mdDoc ''
A file containing the various secrets. Should be in the format expected by systemd's
- EnvironmentFile directory. Two secrets are currently available:
- SYNC_MASTER_SECRET and
- SYNC_TOKENSERVER__FXA_METRICS_HASH_SECRET.
+ `EnvironmentFile` directory. Two secrets are currently available:
+ `SYNC_MASTER_SECRET` and
+ `SYNC_TOKENSERVER__FXA_METRICS_HASH_SECRET`.
'';
};
@@ -126,7 +126,7 @@ in
hostname = lib.mkOption {
type = lib.types.str;
- description = ''
+ description = lib.mdDoc ''
Host name to use for this service.
'';
};
@@ -134,7 +134,7 @@ in
capacity = lib.mkOption {
type = lib.types.ints.unsigned;
default = 10;
- description = ''
+ description = lib.mdDoc ''
How many sync accounts are allowed on this server. Setting this value
equal to or less than the number of currently active accounts will
effectively deny service to accounts not yet registered here.
@@ -147,7 +147,7 @@ in
defaultText = lib.literalExpression ''
''${if cfg.singleNode.enableTLS then "https" else "http"}://''${config.${opt.singleNode.hostname}}
'';
- description = ''
+ description = lib.mdDoc ''
URL of the host. If you are not using the automatic webserver proxy setup you will have
to change this setting or your sync server may not be functional.
'';
@@ -162,7 +162,7 @@ in
port = lib.mkOption {
type = lib.types.port;
default = 5000;
- description = ''
+ description = lib.mdDoc ''
Port to bind to.
'';
};
@@ -170,21 +170,21 @@ in
tokenserver.enabled = lib.mkOption {
type = lib.types.bool;
default = true;
- description = ''
+ description = lib.mdDoc ''
Whether to enable the token service as well.
'';
};
};
};
default = { };
- description = ''
+ description = lib.mdDoc ''
Settings for the sync server. These take priority over values computed
from NixOS options.
- See the doc comments on the Settings structs in
-
+ See the doc comments on the `Settings` structs in
+
and
-
+
for available options.
'';
};
diff --git a/nixos/modules/services/networking/fireqos.nix b/nixos/modules/services/networking/fireqos.nix
index 5469bce58c60..b7f51a89c0e1 100644
--- a/nixos/modules/services/networking/fireqos.nix
+++ b/nixos/modules/services/networking/fireqos.nix
@@ -10,7 +10,7 @@ in {
enable = mkOption {
type = types.bool;
default = false;
- description = ''
+ description = lib.mdDoc ''
If enabled, FireQOS will be launched with the specified
configuration given in `config`.
'';
diff --git a/nixos/modules/services/networking/ghostunnel.nix b/nixos/modules/services/networking/ghostunnel.nix
index 79cf80e57bef..4b9620cea214 100644
--- a/nixos/modules/services/networking/ghostunnel.nix
+++ b/nixos/modules/services/networking/ghostunnel.nix
@@ -37,12 +37,12 @@ let
};
keystore = mkOption {
- description = ''
+ description = lib.mdDoc ''
Path to keystore (combined PEM with cert/key, or PKCS12 keystore).
- NB: storepass is not supported because it would expose credentials via /proc/*/cmdline.
+ NB: storepass is not supported because it would expose credentials via `/proc/*/cmdline`.
- Specify this or cert and key.
+ Specify this or `cert` and `key`.
'';
type = types.nullOr types.str;
default = null;
diff --git a/nixos/modules/services/networking/gnunet.nix b/nixos/modules/services/networking/gnunet.nix
index 2ab9097e7f7d..9d1c9746f728 100644
--- a/nixos/modules/services/networking/gnunet.nix
+++ b/nixos/modules/services/networking/gnunet.nix
@@ -123,7 +123,7 @@ in
extraOptions = mkOption {
type = types.lines;
default = "";
- description = ''
+ description = lib.mdDoc ''
Additional options that will be copied verbatim in `gnunet.conf'.
See `gnunet.conf(5)' for details.
'';
diff --git a/nixos/modules/services/networking/headscale.nix b/nixos/modules/services/networking/headscale.nix
index ab07e7c14b8c..23d8dac2f986 100644
--- a/nixos/modules/services/networking/headscale.nix
+++ b/nixos/modules/services/networking/headscale.nix
@@ -216,7 +216,7 @@ in
magicDns = mkOption {
type = types.bool;
default = true;
- description = ''
+ description = lib.mdDoc ''
Whether to use [MagicDNS](https://tailscale.com/kb/1081/magicdns/).
Only works if there is at least a nameserver defined.
'';
diff --git a/nixos/modules/services/networking/hylafax/options.nix b/nixos/modules/services/networking/hylafax/options.nix
index bc289132a760..79275d628b60 100644
--- a/nixos/modules/services/networking/hylafax/options.nix
+++ b/nixos/modules/services/networking/hylafax/options.nix
@@ -235,9 +235,9 @@ in
InternationalPrefix = "00";
LongDistancePrefix = "0";
};
- description = ''
+ description = lib.mdDoc ''
Attribute set of default values for
- modem config files etc/config.*.
+ modem config files {file}`etc/config.*`.
${commonDescr}
Think twice before changing
paths of fax-processing scripts.
diff --git a/nixos/modules/services/networking/ircd-hybrid/default.nix b/nixos/modules/services/networking/ircd-hybrid/default.nix
index f659f3f3e8c1..44fadde1fbb7 100644
--- a/nixos/modules/services/networking/ircd-hybrid/default.nix
+++ b/nixos/modules/services/networking/ircd-hybrid/default.nix
@@ -41,69 +41,69 @@ in
serverName = mkOption {
default = "hades.arpa";
type = types.str;
- description = "
+ description = lib.mdDoc ''
IRCD server name.
- ";
+ '';
};
sid = mkOption {
default = "0NL";
type = types.str;
- description = "
+ description = lib.mdDoc ''
IRCD server unique ID in a net of servers.
- ";
+ '';
};
description = mkOption {
default = "Hybrid-7 IRC server.";
type = types.str;
- description = "
+ description = lib.mdDoc ''
IRCD server description.
- ";
+ '';
};
rsaKey = mkOption {
default = null;
example = literalExpression "/root/certificates/irc.key";
type = types.nullOr types.path;
- description = "
+ description = lib.mdDoc ''
IRCD server RSA key.
- ";
+ '';
};
certificate = mkOption {
default = null;
example = literalExpression "/root/certificates/irc.pem";
type = types.nullOr types.path;
- description = "
+ description = lib.mdDoc ''
IRCD server SSL certificate. There are some limitations - read manual.
- ";
+ '';
};
adminEmail = mkOption {
default = "";
type = types.str;
example = "";
- description = "
+ description = lib.mdDoc ''
IRCD server administrator e-mail.
- ";
+ '';
};
extraIPs = mkOption {
default = [];
example = ["127.0.0.1"];
type = types.listOf types.str;
- description = "
+ description = lib.mdDoc ''
Extra IP's to bind.
- ";
+ '';
};
extraPort = mkOption {
default = "7117";
type = types.str;
- description = "
+ description = lib.mdDoc ''
Extra port to avoid filtering.
- ";
+ '';
};
};
diff --git a/nixos/modules/services/networking/iscsi/root-initiator.nix b/nixos/modules/services/networking/iscsi/root-initiator.nix
index b55fda672521..4434fedce1eb 100644
--- a/nixos/modules/services/networking/iscsi/root-initiator.nix
+++ b/nixos/modules/services/networking/iscsi/root-initiator.nix
@@ -77,7 +77,7 @@ in
};
extraConfigFile = mkOption {
- description = ''
+ description = lib.mdDoc ''
Append an additional file's contents to `/etc/iscsid.conf`. Use a non-store path
and store passwords in this file. Note: the file specified here must be available
in the initrd, see: `boot.initrd.secrets`.
diff --git a/nixos/modules/services/networking/kresd.nix b/nixos/modules/services/networking/kresd.nix
index 623e477ca7a8..55af6abd5e01 100644
--- a/nixos/modules/services/networking/kresd.nix
+++ b/nixos/modules/services/networking/kresd.nix
@@ -59,9 +59,9 @@ in {
};
package = mkOption {
type = types.package;
- description = "
+ description = lib.mdDoc ''
knot-resolver package to use.
- ";
+ '';
default = pkgs.knot-resolver;
defaultText = literalExpression "pkgs.knot-resolver";
example = literalExpression "pkgs.knot-resolver.override { extraFeatures = true; }";
diff --git a/nixos/modules/services/networking/lokinet.nix b/nixos/modules/services/networking/lokinet.nix
index 6dc33faa82b4..59622d173a35 100644
--- a/nixos/modules/services/networking/lokinet.nix
+++ b/nixos/modules/services/networking/lokinet.nix
@@ -95,7 +95,7 @@ in with lib; {
network.exit-node = [ "example.loki" "example2.loki" ];
}
'';
- description = ''
+ description = lib.mdDoc ''
Configuration for Lokinet.
Currently, the best way to view the available settings is by
generating a config file using `lokinet -g`.
diff --git a/nixos/modules/services/networking/monero.nix b/nixos/modules/services/networking/monero.nix
index 032f6df4e79e..bac705843eb0 100644
--- a/nixos/modules/services/networking/monero.nix
+++ b/nixos/modules/services/networking/monero.nix
@@ -181,7 +181,7 @@ in
exclusiveNodes = mkOption {
type = types.listOf types.str;
default = [ ];
- description = ''
+ description = lib.mdDoc ''
List of peer IP addresses to connect to *only*.
If given the other peer options will be ignored.
'';
diff --git a/nixos/modules/services/networking/murmur.nix b/nixos/modules/services/networking/murmur.nix
index 807caceb5bfe..73787f433b45 100644
--- a/nixos/modules/services/networking/murmur.nix
+++ b/nixos/modules/services/networking/murmur.nix
@@ -219,7 +219,7 @@ in
registerHostname = mkOption {
type = types.str;
default = "";
- description = ''
+ description = lib.mdDoc ''
DNS hostname where your server can be reached. This is only
needed if you want your server to be accessed by its
hostname and not IP - but the name *must* resolve on the
diff --git a/nixos/modules/services/networking/mxisd.nix b/nixos/modules/services/networking/mxisd.nix
index 9ddc2094b6df..571326c5aced 100644
--- a/nixos/modules/services/networking/mxisd.nix
+++ b/nixos/modules/services/networking/mxisd.nix
@@ -49,9 +49,9 @@ in {
environmentFile = mkOption {
type = types.nullOr types.str;
default = null;
- description = ''
+ description = lib.mdDoc ''
Path to an environment-file which may contain secrets to be
- substituted via envsubst.
+ substituted via `envsubst`.
'';
};
diff --git a/nixos/modules/services/networking/nar-serve.nix b/nixos/modules/services/networking/nar-serve.nix
index 09f019d41bb7..a725f4453ca2 100644
--- a/nixos/modules/services/networking/nar-serve.nix
+++ b/nixos/modules/services/networking/nar-serve.nix
@@ -23,7 +23,7 @@ in
cacheURL = mkOption {
type = types.str;
default = "https://cache.nixos.org/";
- description = ''
+ description = lib.mdDoc ''
Binary cache URL to connect to.
The URL format is compatible with the nix remote url style, such as:
diff --git a/nixos/modules/services/networking/ncdns.nix b/nixos/modules/services/networking/ncdns.nix
index 958231963c68..8af1b532cf26 100644
--- a/nixos/modules/services/networking/ncdns.nix
+++ b/nixos/modules/services/networking/ncdns.nix
@@ -126,7 +126,7 @@ in
description = ''
Path to the file containing the KSK public key.
The key can be generated using the dnssec-keygen
- command, provided by the package bind as follows:
+ command, provided by the package bind as follows:
$ dnssec-keygen -a RSASHA256 -3 -b 2048 -f KSK bit
@@ -147,7 +147,7 @@ in
description = ''
Path to the file containing the ZSK public key.
The key can be generated using the dnssec-keygen
- command, provided by the package bind as follows:
+ command, provided by the package bind as follows:
$ dnssec-keygen -a RSASHA256 -3 -b 2048 bit
diff --git a/nixos/modules/services/networking/nix-serve.nix b/nixos/modules/services/networking/nix-serve.nix
index 04cbc0c0d8f8..5deb31a486b2 100644
--- a/nixos/modules/services/networking/nix-serve.nix
+++ b/nixos/modules/services/networking/nix-serve.nix
@@ -39,9 +39,9 @@ in
The path to the file used for signing derivation data.
Generate with:
- ```
+
nix-store --generate-binary-cache-key key-name secret-key-file public-key-file
- ```
+
For more details see nix-store1.
'';
diff --git a/nixos/modules/services/networking/nixops-dns.nix b/nixos/modules/services/networking/nixops-dns.nix
index 4abdb50d6942..378c2ee6d05f 100644
--- a/nixos/modules/services/networking/nixops-dns.nix
+++ b/nixos/modules/services/networking/nixops-dns.nix
@@ -40,7 +40,7 @@ in
dnsmasq = mkOption {
type = types.bool;
default = true;
- description = ''
+ description = lib.mdDoc ''
Enable dnsmasq forwarding to nixops-dns. This allows to use
nixops-dns for `services.nixops-dns.domain` resolution
while forwarding the rest of the queries to original resolvers.
diff --git a/nixos/modules/services/networking/ocserv.nix b/nixos/modules/services/networking/ocserv.nix
index dc26ffeafeef..efe1d240a9a7 100644
--- a/nixos/modules/services/networking/ocserv.nix
+++ b/nixos/modules/services/networking/ocserv.nix
@@ -15,7 +15,7 @@ in
config = mkOption {
type = types.lines;
- description = ''
+ description = lib.mdDoc ''
Configuration content to start an OCServ server.
For a full configuration reference,please refer to the online documentation
diff --git a/nixos/modules/services/networking/redsocks.nix b/nixos/modules/services/networking/redsocks.nix
index 5aa9f003bad5..85ae3125ded8 100644
--- a/nixos/modules/services/networking/redsocks.nix
+++ b/nixos/modules/services/networking/redsocks.nix
@@ -30,7 +30,7 @@ in
type = types.str;
default = "stderr";
description =
- ''
+ lib.mdDoc ''
Where to send logs.
Possible values are:
@@ -122,7 +122,7 @@ in
"Forwarded_ipport" ];
default = "false";
description =
- ''
+ lib.mdDoc ''
Way to disclose client IP to the proxy.
- "false": do not disclose
http-connect supports the following ways:
diff --git a/nixos/modules/services/networking/resilio.nix b/nixos/modules/services/networking/resilio.nix
index 05798a2c83ee..d21f108024e5 100644
--- a/nixos/modules/services/networking/resilio.nix
+++ b/nixos/modules/services/networking/resilio.nix
@@ -199,25 +199,25 @@ in
];
}
];
- description = ''
+ description = lib.mdDoc ''
Shared folder list. If enabled, web UI must be
- disabled. Secrets can be generated using rslsync
- --generate-secret. Note that this secret will be
+ disabled. Secrets can be generated using `rslsync --generate-secret`.
+ Note that this secret will be
put inside the Nix store, so it is realistically not very
secret.
If you would like to be able to modify the contents of this
directories, it is recommended that you make your user a
- member of the rslsync group.
+ member of the `rslsync` group.
Directories in this list should be in the
- rslsync group, and that group must have
+ `rslsync` group, and that group must have
write access to the directory. It is also recommended that
- chmod g+s is applied to the directory
+ `chmod g+s` is applied to the directory
so that any sub directories created will also belong to
- the rslsync group. Also,
- setfacl -d -m group:rslsync:rwx and
- setfacl -m group:rslsync:rwx should also
+ the `rslsync` group. Also,
+ `setfacl -d -m group:rslsync:rwx` and
+ `setfacl -m group:rslsync:rwx` should also
be applied so that the sub directories are writable by
the group.
'';
diff --git a/nixos/modules/services/networking/rpcbind.nix b/nixos/modules/services/networking/rpcbind.nix
index 0a5df6987092..aa04214debb0 100644
--- a/nixos/modules/services/networking/rpcbind.nix
+++ b/nixos/modules/services/networking/rpcbind.nix
@@ -13,7 +13,7 @@ with lib;
enable = mkOption {
type = types.bool;
default = false;
- description = ''
+ description = lib.mdDoc ''
Whether to enable `rpcbind', an ONC RPC directory service
notably used by NFS and NIS, and which can be queried
using the rpcinfo(1) command. `rpcbind` is a replacement for
diff --git a/nixos/modules/services/networking/v2ray.nix b/nixos/modules/services/networking/v2ray.nix
index f063ddfed0a7..1ff1feed8f47 100644
--- a/nixos/modules/services/networking/v2ray.nix
+++ b/nixos/modules/services/networking/v2ray.nix
@@ -51,12 +51,12 @@ with lib;
protocol = "freedom";
}];
};
- description = ''
+ description = lib.mdDoc ''
The configuration object.
Either `configFile` or `config` must be specified.
- See .
+ See .
'';
};
};
diff --git a/nixos/modules/services/networking/wpa_supplicant.nix b/nixos/modules/services/networking/wpa_supplicant.nix
index 59e408f63199..72b665f411fe 100644
--- a/nixos/modules/services/networking/wpa_supplicant.nix
+++ b/nixos/modules/services/networking/wpa_supplicant.nix
@@ -189,10 +189,10 @@ in {
allowAuxiliaryImperativeNetworks = mkEnableOption "support for imperative & declarative networks" // {
description = ''
Whether to allow configuring networks "imperatively" (e.g. via
- wpa_supplicant_gui) and declaratively via
+ wpa_supplicant_gui) and declaratively via
.
- Please note that this adds a custom patch to wpa_supplicant.
+ Please note that this adds a custom patch to wpa_supplicant.
'';
};
diff --git a/nixos/modules/services/networking/x2goserver.nix b/nixos/modules/services/networking/x2goserver.nix
index 3c2424b6f4f9..a1e096c19a2a 100644
--- a/nixos/modules/services/networking/x2goserver.nix
+++ b/nixos/modules/services/networking/x2goserver.nix
@@ -50,7 +50,7 @@ in {
settings = mkOption {
type = types.attrsOf types.attrs;
default = {};
- description = ''
+ description = lib.mdDoc ''
x2goserver.conf ini configuration as nix attributes. See
`x2goserver.conf(5)` for details
'';
diff --git a/nixos/modules/services/networking/yggdrasil.nix b/nixos/modules/services/networking/yggdrasil.nix
index 81ed6d1dd566..e7513c5627c8 100644
--- a/nixos/modules/services/networking/yggdrasil.nix
+++ b/nixos/modules/services/networking/yggdrasil.nix
@@ -31,29 +31,28 @@ in {
"tcp://0.0.0.0:xxxxx"
];
};
- description = ''
+ description = lib.mdDoc ''
Configuration for yggdrasil, as a Nix attribute set.
Warning: this is stored in the WORLD-READABLE Nix store!
Therefore, it is not appropriate for private keys. If you
- wish to specify the keys, use .
+ wish to specify the keys, use {option}`configFile`.
- If the is enabled then the
+ If the {option}`persistentKeys` is enabled then the
keys that are generated during activation will override
- those in or
- .
+ those in {option}`config` or
+ {option}`configFile`.
If no keys are specified then ephemeral keys are generated
and the Yggdrasil interface will have a random IPv6 address
each time the service is started, this is the default.
- If both and
+ If both {option}`configFile` and {option}`config`
are supplied, they will be combined, with values from
- taking precedence.
+ {option}`configFile` taking precedence.
- You can use the command nix-shell -p yggdrasil --run
- "yggdrasil -genconf" to generate default
- configuration values with documentation.
+ You can use the command `nix-shell -p yggdrasil --run "yggdrasil -genconf"`
+ to generate default configuration values with documentation.
'';
};
diff --git a/nixos/modules/services/networking/znc/options.nix b/nixos/modules/services/networking/znc/options.nix
index 021fea9819a7..9d472abdf484 100644
--- a/nixos/modules/services/networking/znc/options.nix
+++ b/nixos/modules/services/networking/znc/options.nix
@@ -118,7 +118,7 @@ in
type = types.listOf types.str;
default = [ "webadmin" "adminlog" ];
example = [ "partyline" "webadmin" "adminlog" "log" ];
- description = ''
+ description = lib.mdDoc ''
A list of modules to include in the `znc.conf` file.
'';
};
@@ -127,7 +127,7 @@ in
type = types.listOf types.str;
default = [ "chansaver" "controlpanel" ];
example = [ "chansaver" "controlpanel" "fish" "push" ];
- description = ''
+ description = lib.mdDoc ''
A list of user modules to include in the `znc.conf` file.
'';
};
@@ -178,7 +178,7 @@ in
'';
type = types.str;
description = ''
- Generate with `nix-shell -p znc --command "znc --makepass"`.
+ Generate with nix-shell -p znc --command "znc --makepass".
This is the password used to log in to the ZNC web admin interface.
You can also set this through
@@ -216,7 +216,7 @@ in
extraZncConf = mkOption {
default = "";
type = types.lines;
- description = ''
+ description = lib.mdDoc ''
Extra config to `znc.conf` file.
'';
};
diff --git a/nixos/modules/services/search/meilisearch.nix b/nixos/modules/services/search/meilisearch.nix
index 9a03fc1f715b..496200b80813 100644
--- a/nixos/modules/services/search/meilisearch.nix
+++ b/nixos/modules/services/search/meilisearch.nix
@@ -68,7 +68,7 @@ in
};
logLevel = mkOption {
- description = ''
+ description = lib.mdDoc ''
Defines how much detail should be present in MeiliSearch's logs.
MeiliSearch currently supports four log levels, listed in order of increasing verbosity:
- 'ERROR': only log unexpected events indicating MeiliSearch is not functioning as expected
diff --git a/nixos/modules/services/security/fail2ban.nix b/nixos/modules/services/security/fail2ban.nix
index 24c84151bc78..29aa49c8aada 100644
--- a/nixos/modules/services/security/fail2ban.nix
+++ b/nixos/modules/services/security/fail2ban.nix
@@ -73,7 +73,7 @@ in
default = [];
type = types.listOf types.package;
example = lib.literalExpression "[ pkgs.ipset ]";
- description = ''
+ description = lib.mdDoc ''
Extra packages to be made available to the fail2ban service. The example contains
the packages needed by the `iptables-ipset-proto6` action.
'';
diff --git a/nixos/modules/services/security/haka.nix b/nixos/modules/services/security/haka.nix
index 10b7cef54d33..893ab89d2a86 100644
--- a/nixos/modules/services/security/haka.nix
+++ b/nixos/modules/services/security/haka.nix
@@ -61,9 +61,9 @@ in
default = pkgs.haka;
defaultText = literalExpression "pkgs.haka";
type = types.package;
- description = "
+ description = lib.mdDoc ''
Which Haka derivation to use.
- ";
+ '';
};
configFile = mkOption {
diff --git a/nixos/modules/services/security/infnoise.nix b/nixos/modules/services/security/infnoise.nix
index 4fb8adaf33f8..883185fab171 100644
--- a/nixos/modules/services/security/infnoise.nix
+++ b/nixos/modules/services/security/infnoise.nix
@@ -10,7 +10,7 @@ in {
enable = mkEnableOption "the Infinite Noise TRNG driver";
fillDevRandom = mkOption {
- description = ''
+ description = lib.mdDoc ''
Whether to run the infnoise driver as a daemon to refill /dev/random.
If disabled, you can use the `infnoise` command-line tool to
diff --git a/nixos/modules/services/security/oauth2_proxy.nix b/nixos/modules/services/security/oauth2_proxy.nix
index 8b2c7fa21402..e0b22d3f38eb 100644
--- a/nixos/modules/services/security/oauth2_proxy.nix
+++ b/nixos/modules/services/security/oauth2_proxy.nix
@@ -160,9 +160,9 @@ in
domains = mkOption {
type = types.listOf types.str;
default = [];
- description = ''
+ description = lib.mdDoc ''
Authenticate emails with the specified domains. Use
- * to authenticate any email.
+ `*` to authenticate any email.
'';
};
@@ -347,7 +347,7 @@ in
domain = mkOption {
type = types.nullOr types.str;
default = null;
- description = ''
+ description = lib.mdDoc ''
Optional cookie domains to force cookies to (ie: `.yourcompany.com`).
The longest domain matching the request's host will be used (or the shortest
cookie domain if there is no match).
diff --git a/nixos/modules/services/security/privacyidea.nix b/nixos/modules/services/security/privacyidea.nix
index 29c499e33ab5..ce98b0393ee7 100644
--- a/nixos/modules/services/security/privacyidea.nix
+++ b/nixos/modules/services/security/privacyidea.nix
@@ -75,7 +75,7 @@ in
description = ''
File to load as environment file. Environment variables
from this file will be interpolated into the config file
- using envsubst which is helpful for specifying
+ using envsubst which is helpful for specifying
secrets:
{ = "$SECRET"; }
@@ -204,11 +204,11 @@ in
settings = mkOption {
type = with types; attrsOf (attrsOf (oneOf [ str bool int (listOf str) ]));
default = {};
- description = ''
- Attribute-set containing the settings for privacyidea-ldap-proxy.
+ description = lib.mdDoc ''
+ Attribute-set containing the settings for `privacyidea-ldap-proxy`.
It's possible to pass secrets using env-vars as substitutes and
- use the option
- to inject them via envsubst.
+ use the option [](#opt-services.privacyidea.ldap-proxy.environmentFile)
+ to inject them via `envsubst`.
'';
};
diff --git a/nixos/modules/services/system/cloud-init.nix b/nixos/modules/services/system/cloud-init.nix
index 111cfa83c222..95ca5fb48dba 100644
--- a/nixos/modules/services/system/cloud-init.nix
+++ b/nixos/modules/services/system/cloud-init.nix
@@ -39,7 +39,7 @@ in
btrfs.enable = mkOption {
type = types.bool;
default = false;
- description = ''
+ description = lib.mdDoc ''
Allow the cloud-init service to operate `btrfs` filesystem.
'';
};
@@ -47,7 +47,7 @@ in
ext4.enable = mkOption {
type = types.bool;
default = true;
- description = ''
+ description = lib.mdDoc ''
Allow the cloud-init service to operate `ext4` filesystem.
'';
};
diff --git a/nixos/modules/services/system/self-deploy.nix b/nixos/modules/services/system/self-deploy.nix
index ff56206573c1..ecba2e43dc20 100644
--- a/nixos/modules/services/system/self-deploy.nix
+++ b/nixos/modules/services/system/self-deploy.nix
@@ -41,7 +41,7 @@ in
default = null;
- description = ''
+ description = lib.mdDoc ''
Attribute of `nixFile` that builds the current system.
'';
};
@@ -51,7 +51,7 @@ in
default = { };
- description = ''
+ description = lib.mdDoc ''
Arguments to `nix-build` passed as `--argstr` or `--arg` depending on
the type.
'';
@@ -62,7 +62,7 @@ in
default = "switch";
- description = ''
+ description = lib.mdDoc ''
The `switch-to-configuration` subcommand used.
'';
};
@@ -70,7 +70,7 @@ in
repository = lib.mkOption {
type = with lib.types; oneOf [ path str ];
- description = ''
+ description = lib.mdDoc ''
The repository to fetch from. Must be properly formatted for git.
If this value is set to a path (must begin with `/`) then it's
@@ -99,7 +99,7 @@ in
default = "master";
- description = ''
+ description = lib.mdDoc ''
Branch to track
Technically speaking any ref can be specified here, as this is
@@ -113,7 +113,7 @@ in
default = "hourly";
- description = ''
+ description = lib.mdDoc ''
The schedule on which to run the `self-deploy` service. Format
specified by `systemd.time 7`.
diff --git a/nixos/modules/services/torrent/magnetico.nix b/nixos/modules/services/torrent/magnetico.nix
index 11f1c71e3f81..ffc8577375b7 100644
--- a/nixos/modules/services/torrent/magnetico.nix
+++ b/nixos/modules/services/torrent/magnetico.nix
@@ -124,9 +124,9 @@ in {
Usernames must start with a lowercase ([a-z]) ASCII character, might
contain non-consecutive underscores except at the end, and consists of
small-case a-z characters and digits 0-9. The
- htpasswd tool from the apacheHttpd
- package may be used to generate the hash: htpasswd
- -bnBC 12 username password
+ htpasswd tool from the apacheHttpd
+ package may be used to generate the hash:
+ htpasswd -bnBC 12 username password
@@ -150,8 +150,8 @@ in {
start with a lowecase ([a-z]) ASCII character, might contain
non-consecutive underscores except at the end, and consists of
small-case a-z characters and digits 0-9.
- The htpasswd tool from the apacheHttpd
- package may be used to generate the hash:
+ The htpasswd tool from the apacheHttpd
+ package may be used to generate the hash:
htpasswd -bnBC 12 username password
'';
};
diff --git a/nixos/modules/services/web-apps/discourse.nix b/nixos/modules/services/web-apps/discourse.nix
index 1e2326d81801..0ebc6f5399c0 100644
--- a/nixos/modules/services/web-apps/discourse.nix
+++ b/nixos/modules/services/web-apps/discourse.nix
@@ -121,17 +121,16 @@ in
max_reqs_per_ip_mode = "warn+block";
};
'';
- description = ''
+ description = lib.mdDoc ''
Additional settings to put in the
- discourse.conf file.
+ {file}`discourse.conf` file.
Look in the
- discourse_defaults.conf
+ [discourse_defaults.conf](https://github.com/discourse/discourse/blob/master/config/discourse_defaults.conf)
file in the upstream distribution to find available options.
- Setting an option to null means
- define variable, but leave right-hand side
- empty.
+ Setting an option to `null` means
+ “define variable, but leave right-hand side empty”.
'';
};
@@ -241,9 +240,9 @@ in
host = lib.mkOption {
type = with lib.types; nullOr str;
default = null;
- description = ''
- Discourse database hostname. null means prefer
- local unix socket connection.
+ description = lib.mdDoc ''
+ Discourse database hostname. `null` means
+ “prefer local unix socket connection”.
'';
};
@@ -494,10 +493,8 @@ in
discourse-github
];
'';
- description = ''
- Plugins to install as part of
- Discourse, expressed as a list of
- derivations.
+ description = lib.mdDoc ''
+ Plugins to install as part of Discourse, expressed as a list of derivations.
'';
};
diff --git a/nixos/modules/services/web-apps/hedgedoc.nix b/nixos/modules/services/web-apps/hedgedoc.nix
index 348192ea8486..f1c450005ac0 100644
--- a/nixos/modules/services/web-apps/hedgedoc.nix
+++ b/nixos/modules/services/web-apps/hedgedoc.nix
@@ -189,9 +189,9 @@ in
allowAnonymousEdits = mkOption {
type = types.bool;
default = false;
- description = ''
- Whether to allow guests to edit existing notes with the `freely' permission,
- when is enabled.
+ description = lib.mdDoc ''
+ Whether to allow guests to edit existing notes with the `freely` permission,
+ when {option}`allowAnonymous` is enabled.
'';
};
allowFreeURL = mkOption {
@@ -937,7 +937,7 @@ in
id = mkOption {
type = types.str;
default = "";
- description = ''
+ description = lib.mdDoc ''
Attribute map for `id'.
Defaults to `NameID' of SAML response.
'';
@@ -945,7 +945,7 @@ in
username = mkOption {
type = types.str;
default = "";
- description = ''
+ description = lib.mdDoc ''
Attribute map for `username'.
Defaults to `NameID' of SAML response.
'';
@@ -953,10 +953,10 @@ in
email = mkOption {
type = types.str;
default = "";
- description = ''
- Attribute map for `email'.
- Defaults to `NameID' of SAML response if
- has
+ description = lib.mdDoc ''
+ Attribute map for `email`.
+ Defaults to `NameID` of SAML response if
+ {option}`identifierFormat` has
the default value.
'';
};
diff --git a/nixos/modules/services/web-apps/invidious.nix b/nixos/modules/services/web-apps/invidious.nix
index 0b9d9b03c6ae..cf6e7f92f071 100644
--- a/nixos/modules/services/web-apps/invidious.nix
+++ b/nixos/modules/services/web-apps/invidious.nix
@@ -246,11 +246,11 @@ in
nginx.enable = lib.mkOption {
type = types.bool;
default = false;
- description = ''
+ description = lib.mdDoc ''
Whether to configure nginx as a reverse proxy for Invidious.
- It serves it under the domain specified in with enabled TLS and ACME.
- Further configuration can be done through ,
+ It serves it under the domain specified in {option}`services.invidious.settings.domain` with enabled TLS and ACME.
+ Further configuration can be done through {option}`services.nginx.virtualHosts.''${config.services.invidious.settings.domain}.*`,
which can also be used to disable AMCE and TLS.
'';
};
diff --git a/nixos/modules/services/web-apps/isso.nix b/nixos/modules/services/web-apps/isso.nix
index 4c01781a6a2b..a5d3d8bd7305 100644
--- a/nixos/modules/services/web-apps/isso.nix
+++ b/nixos/modules/services/web-apps/isso.nix
@@ -20,10 +20,10 @@ in {
'';
settings = mkOption {
- description = ''
- Configuration for isso.
+ description = lib.mdDoc ''
+ Configuration for `isso`.
- See Isso Server Configuration
+ See [Isso Server Configuration](https://posativ.org/isso/docs/configuration/server/)
for supported values.
'';
diff --git a/nixos/modules/services/web-apps/mastodon.nix b/nixos/modules/services/web-apps/mastodon.nix
index d0594ff74192..5abaad85b4f3 100644
--- a/nixos/modules/services/web-apps/mastodon.nix
+++ b/nixos/modules/services/web-apps/mastodon.nix
@@ -130,18 +130,18 @@ in {
};
user = lib.mkOption {
- description = ''
+ description = lib.mdDoc ''
User under which mastodon runs. If it is set to "mastodon",
that user will be created, otherwise it should be set to the
name of a user created elsewhere. In both cases,
- mastodon and a package containing only
- the shell script mastodon-env will be added to
+ `mastodon` and a package containing only
+ the shell script `mastodon-env` will be added to
the user's package set. To run a command from
- mastodon such as tootctl
+ `mastodon` such as `tootctl`
with the environment configured by this module use
- mastodon-env, as in:
+ `mastodon-env`, as in:
- mastodon-env tootctl accounts create newuser --email newuser@example.com
+ `mastodon-env tootctl accounts create newuser --email newuser@example.com`
'';
type = lib.types.str;
default = "mastodon";
diff --git a/nixos/modules/services/web-apps/matomo.nix b/nixos/modules/services/web-apps/matomo.nix
index 80c4db1263e1..f9927992a865 100644
--- a/nixos/modules/services/web-apps/matomo.nix
+++ b/nixos/modules/services/web-apps/matomo.nix
@@ -57,7 +57,7 @@ in {
Name of the web server user that forwards requests to the fastcgi socket for Matomo if the nginx
option is not used. Either this option or the nginx option is mandatory.
If you want to use another webserver than nginx, you need to set this to that server's user
- and pass fastcgi requests to `index.php`, `matomo.php` and `piwik.php` (legacy name) to this socket.
+ and pass fastcgi requests to index.php, matomo.php and piwik.php (legacy name) to this socket.
'';
};
diff --git a/nixos/modules/services/web-apps/moodle.nix b/nixos/modules/services/web-apps/moodle.nix
index 6d1a9839ca1f..03dd57753acc 100644
--- a/nixos/modules/services/web-apps/moodle.nix
+++ b/nixos/modules/services/web-apps/moodle.nix
@@ -138,7 +138,7 @@ in
createLocally = mkOption {
type = types.bool;
default = true;
- description = "Create the database and database user locally.";
+ description = lib.mdDoc "Create the database and database user locally.";
};
};
diff --git a/nixos/modules/services/web-apps/nextcloud.nix b/nixos/modules/services/web-apps/nextcloud.nix
index feee7494a71a..b286b1a64c3e 100644
--- a/nixos/modules/services/web-apps/nextcloud.nix
+++ b/nixos/modules/services/web-apps/nextcloud.nix
@@ -532,7 +532,7 @@ in {
here because it has the side-effect that personal information is even accessible to
unauthenticated users by default.
- By default, the following properties are set to Show to everyone
+ By default, the following properties are set to “Show to everyone”
if this flag is enabled:
About
@@ -569,10 +569,10 @@ in {
secretFile = mkOption {
type = types.nullOr types.str;
default = null;
- description = ''
+ description = lib.mdDoc ''
Secret options which will be appended to nextcloud's config.php file (written as JSON, in the same
- form as the option), for example
- {"redis":{"password":"secret"}}.
+ form as the [](#opt-services.nextcloud.extraOptions) option), for example
+ `{"redis":{"password":"secret"}}`.
'';
};
diff --git a/nixos/modules/services/web-apps/nexus.nix b/nixos/modules/services/web-apps/nexus.nix
index cfa137e77d25..64dc0b625dba 100644
--- a/nixos/modules/services/web-apps/nexus.nix
+++ b/nixos/modules/services/web-apps/nexus.nix
@@ -93,7 +93,7 @@ in
'''
'';
- description = ''
+ description = lib.mdDoc ''
Options for the JVM written to `nexus.jvmopts`.
Please refer to the docs (https://help.sonatype.com/repomanager3/installation/configuring-the-runtime-environment)
for further information.
diff --git a/nixos/modules/services/web-apps/pgpkeyserver-lite.nix b/nixos/modules/services/web-apps/pgpkeyserver-lite.nix
index faf0ce13238e..2552441befe1 100644
--- a/nixos/modules/services/web-apps/pgpkeyserver-lite.nix
+++ b/nixos/modules/services/web-apps/pgpkeyserver-lite.nix
@@ -24,34 +24,34 @@ in
default = pkgs.pgpkeyserver-lite;
defaultText = literalExpression "pkgs.pgpkeyserver-lite";
type = types.package;
- description = "
+ description = lib.mdDoc ''
Which webgui derivation to use.
- ";
+ '';
};
hostname = mkOption {
type = types.str;
- description = "
+ description = lib.mdDoc ''
Which hostname to set the vHost to that is proxying to sks.
- ";
+ '';
};
hkpAddress = mkOption {
default = builtins.head sksCfg.hkpAddress;
defaultText = literalExpression "head config.${sksOpt.hkpAddress}";
type = types.str;
- description = "
+ description = lib.mdDoc ''
Wich ip address the sks-keyserver is listening on.
- ";
+ '';
};
hkpPort = mkOption {
default = sksCfg.hkpPort;
defaultText = literalExpression "config.${sksOpt.hkpPort}";
type = types.int;
- description = "
+ description = lib.mdDoc ''
Which port the sks-keyserver is listening on.
- ";
+ '';
};
};
};
diff --git a/nixos/modules/services/web-apps/plausible.nix b/nixos/modules/services/web-apps/plausible.nix
index 6f098134c922..00e16b09b1ec 100644
--- a/nixos/modules/services/web-apps/plausible.nix
+++ b/nixos/modules/services/web-apps/plausible.nix
@@ -49,8 +49,8 @@ in {
url = mkOption {
default = "http://localhost:8123/default";
type = types.str;
- description = ''
- The URL to be used to connect to clickhouse.
+ description = lib.mdDoc ''
+ The URL to be used to connect to `clickhouse`.
'';
};
};
@@ -66,8 +66,8 @@ in {
socket = mkOption {
default = "/run/postgresql";
type = types.str;
- description = ''
- Path to the UNIX domain-socket to communicate with postgres.
+ description = lib.mdDoc ''
+ Path to the UNIX domain-socket to communicate with `postgres`.
'';
};
};
diff --git a/nixos/modules/services/web-apps/rss-bridge.nix b/nixos/modules/services/web-apps/rss-bridge.nix
index b1a3907d1964..bef3d9de2a10 100644
--- a/nixos/modules/services/web-apps/rss-bridge.nix
+++ b/nixos/modules/services/web-apps/rss-bridge.nix
@@ -66,10 +66,10 @@ in
"Twitter"
]
'';
- description = ''
+ description = lib.mdDoc ''
List of bridges to be whitelisted.
If the list is empty, rss-bridge will use whitelist.default.txt.
- Use [ "*" ] to whitelist all.
+ Use `[ "*" ]` to whitelist all.
'';
};
};
diff --git a/nixos/modules/services/web-apps/wiki-js.nix b/nixos/modules/services/web-apps/wiki-js.nix
index 5dc0bb73259b..c648cfff6cef 100644
--- a/nixos/modules/services/web-apps/wiki-js.nix
+++ b/nixos/modules/services/web-apps/wiki-js.nix
@@ -54,10 +54,10 @@ in {
type = mkOption {
default = "postgres";
type = types.enum [ "postgres" "mysql" "mariadb" "mssql" ];
- description = ''
- Database driver to use for persistence. Please note that sqlite
+ description = lib.mdDoc ''
+ Database driver to use for persistence. Please note that `sqlite`
is currently not supported as the build process for it is currently not implemented
- in pkgs.wiki-js and it's not recommended by upstream for
+ in `pkgs.wiki-js` and it's not recommended by upstream for
production use.
'';
};
@@ -94,7 +94,7 @@ in {
};
};
description = ''
- Settings to configure wiki-js. This directly
+ Settings to configure wiki-js. This directly
corresponds to the upstream configuration options.
Secrets can be injected via the environment by
diff --git a/nixos/modules/services/web-servers/apache-httpd/location-options.nix b/nixos/modules/services/web-servers/apache-httpd/location-options.nix
index 726ad2683d28..f2d4f8357047 100644
--- a/nixos/modules/services/web-servers/apache-httpd/location-options.nix
+++ b/nixos/modules/services/web-servers/apache-httpd/location-options.nix
@@ -43,7 +43,7 @@ in
priority = mkOption {
type = types.int;
default = 1000;
- description = ''
+ description = lib.mdDoc ''
Order of this location block in relation to the others in the vhost.
The semantics are the same as with `lib.mkOrder`. Smaller values have
a greater priority.
diff --git a/nixos/modules/services/web-servers/darkhttpd.nix b/nixos/modules/services/web-servers/darkhttpd.nix
index 5663e9ca9df6..ca079ea00517 100644
--- a/nixos/modules/services/web-servers/darkhttpd.nix
+++ b/nixos/modules/services/web-servers/darkhttpd.nix
@@ -29,7 +29,7 @@ in {
address = mkOption {
default = "127.0.0.1";
type = str;
- description = ''
+ description = lib.mdDoc ''
Address to listen on.
Pass `all` to listen on all interfaces.
'';
diff --git a/nixos/modules/services/web-servers/nginx/default.nix b/nixos/modules/services/web-servers/nginx/default.nix
index 72b91c37f8a7..0c4b2246a1b2 100644
--- a/nixos/modules/services/web-servers/nginx/default.nix
+++ b/nixos/modules/services/web-servers/nginx/default.nix
@@ -390,50 +390,50 @@ in
statusPage = mkOption {
default = false;
type = types.bool;
- description = "
+ description = lib.mdDoc ''
Enable status page reachable from localhost on http://127.0.0.1/nginx_status.
- ";
+ '';
};
recommendedTlsSettings = mkOption {
default = false;
type = types.bool;
- description = "
+ description = lib.mdDoc ''
Enable recommended TLS settings.
- ";
+ '';
};
recommendedOptimisation = mkOption {
default = false;
type = types.bool;
- description = "
+ description = lib.mdDoc ''
Enable recommended optimisation settings.
- ";
+ '';
};
recommendedGzipSettings = mkOption {
default = false;
type = types.bool;
- description = "
+ description = lib.mdDoc ''
Enable recommended gzip settings.
- ";
+ '';
};
recommendedProxySettings = mkOption {
default = false;
type = types.bool;
- description = "
+ description = lib.mdDoc ''
Whether to enable recommended proxy settings if a vhost does not specify the option manually.
- ";
+ '';
};
proxyTimeout = mkOption {
type = types.str;
default = "60s";
example = "20s";
- description = "
+ description = lib.mdDoc ''
Change the proxy related timeouts in recommendedProxySettings.
- ";
+ '';
};
defaultListenAddresses = mkOption {
@@ -441,9 +441,9 @@ in
default = [ "0.0.0.0" ] ++ optional enableIPv6 "[::0]";
defaultText = literalExpression ''[ "0.0.0.0" ] ++ lib.optional config.networking.enableIPv6 "[::0]"'';
example = literalExpression ''[ "10.0.0.12" "[2002:a00:1::]" ]'';
- description = "
+ description = lib.mdDoc ''
If vhosts do not specify listenAddresses, use these addresses by default.
- ";
+ '';
};
package = mkOption {
@@ -453,11 +453,11 @@ in
apply = p: p.override {
modules = p.modules ++ cfg.additionalModules;
};
- description = "
+ description = lib.mdDoc ''
Nginx package to use. This defaults to the stable version. Note
that the nginx team recommends to use the mainline version which
- available in nixpkgs as nginxMainline.
- ";
+ available in nixpkgs as `nginxMainline`.
+ '';
};
additionalModules = mkOption {
@@ -474,7 +474,7 @@ in
logError = mkOption {
default = "stderr";
type = types.str;
- description = "
+ description = lib.mdDoc ''
Configures logging.
The first parameter defines a file that will store the log. The
special value stderr selects the standard error file. Logging to
@@ -485,15 +485,15 @@ in
increasing severity. Setting a certain log level will cause all
messages of the specified and more severe log levels to be logged.
If this parameter is omitted then error is used.
- ";
+ '';
};
preStart = mkOption {
type = types.lines;
default = "";
- description = "
+ description = lib.mdDoc ''
Shell commands executed before the service's nginx is started.
- ";
+ '';
};
config = mkOption {
@@ -551,12 +551,12 @@ in
httpConfig = mkOption {
type = types.lines;
default = "";
- description = "
+ description = lib.mdDoc ''
Configuration lines to be set inside the http block.
This is mutually exclusive with the structured configuration
via virtualHosts and the recommendedXyzSettings configuration
options. See appendHttpConfig for appending to the generated http block.
- ";
+ '';
};
streamConfig = mkOption {
@@ -569,9 +569,9 @@ in
proxy_pass 192.168.0.1:53535;
}
'';
- description = "
+ description = lib.mdDoc ''
Configuration lines to be set inside the stream block.
- ";
+ '';
};
eventsConfig = mkOption {
@@ -585,20 +585,20 @@ in
appendHttpConfig = mkOption {
type = types.lines;
default = "";
- description = "
+ description = lib.mdDoc ''
Configuration lines to be appended to the generated http block.
This is mutually exclusive with using config and httpConfig for
specifying the whole http block verbatim.
- ";
+ '';
};
enableReload = mkOption {
default = false;
type = types.bool;
- description = ''
+ description = lib.mdDoc ''
Reload nginx when configuration file changes (instead of restart).
- The configuration file is exposed at /etc/nginx/nginx.conf.
- See also systemd.services.*.restartIfChanged.
+ The configuration file is exposed at {file}`/etc/nginx/nginx.conf`.
+ See also `systemd.services.*.restartIfChanged`.
'';
};
diff --git a/nixos/modules/services/web-servers/nginx/location-options.nix b/nixos/modules/services/web-servers/nginx/location-options.nix
index dc68194f752b..2728852058ea 100644
--- a/nixos/modules/services/web-servers/nginx/location-options.nix
+++ b/nixos/modules/services/web-servers/nginx/location-options.nix
@@ -122,7 +122,7 @@ with lib;
priority = mkOption {
type = types.int;
default = 1000;
- description = ''
+ description = lib.mdDoc ''
Order of this location block in relation to the others in the vhost.
The semantics are the same as with `lib.mkOrder`. Smaller values have
a greater priority.
diff --git a/nixos/modules/services/web-servers/nginx/vhost-options.nix b/nixos/modules/services/web-servers/nginx/vhost-options.nix
index a749f8bc20f1..96006f88758e 100644
--- a/nixos/modules/services/web-servers/nginx/vhost-options.nix
+++ b/nixos/modules/services/web-servers/nginx/vhost-options.nix
@@ -197,10 +197,10 @@ with lib;
http3 = mkOption {
type = types.bool;
default = false;
- description = ''
+ description = lib.mdDoc ''
Whether to enable HTTP 3.
- This requires using pkgs.nginxQuic package
- which can be achieved by setting services.nginx.package = pkgs.nginxQuic;.
+ This requires using `pkgs.nginxQuic` package
+ which can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`.
Note that HTTP 3 support is experimental and
*not* yet recommended for production.
Read more at https://quic.nginx.org/
diff --git a/nixos/modules/services/web-servers/tomcat.nix b/nixos/modules/services/web-servers/tomcat.nix
index ec7f46e25e95..95c307dba61a 100644
--- a/nixos/modules/services/web-servers/tomcat.nix
+++ b/nixos/modules/services/web-servers/tomcat.nix
@@ -34,7 +34,7 @@ in
purifyOnStart = mkOption {
type = types.bool;
default = false;
- description = ''
+ description = lib.mdDoc ''
On startup, the `baseDir` directory is populated with various files,
subdirectories and symlinks. If this option is enabled, these items
(except for the `logs` and `work` subdirectories) are first removed.
@@ -46,7 +46,7 @@ in
baseDir = mkOption {
type = lib.types.path;
default = "/var/tomcat";
- description = ''
+ description = lib.mdDoc ''
Location where Tomcat stores configuration files, web applications
and logfiles. Note that it is partially cleared on each service startup
if `purifyOnStart` is enabled.
@@ -112,10 +112,10 @@ in
serverXml = mkOption {
type = types.lines;
default = "";
- description = "
+ description = lib.mdDoc ''
Verbatim server.xml configuration.
This is mutually exclusive with the virtualHosts options.
- ";
+ '';
};
commonLibs = mkOption {
diff --git a/nixos/modules/services/web-servers/varnish/default.nix b/nixos/modules/services/web-servers/varnish/default.nix
index 39ebe6338728..c812c3664268 100644
--- a/nixos/modules/services/web-servers/varnish/default.nix
+++ b/nixos/modules/services/web-servers/varnish/default.nix
@@ -27,43 +27,43 @@ in
http_address = mkOption {
type = types.str;
default = "*:6081";
- description = "
+ description = lib.mdDoc ''
HTTP listen address and port.
- ";
+ '';
};
config = mkOption {
type = types.lines;
- description = "
+ description = lib.mdDoc ''
Verbatim default.vcl configuration.
- ";
+ '';
};
stateDir = mkOption {
type = types.path;
default = "/var/spool/varnish/${config.networking.hostName}";
defaultText = literalExpression ''"/var/spool/varnish/''${config.networking.hostName}"'';
- description = "
+ description = lib.mdDoc ''
Directory holding all state for Varnish to run.
- ";
+ '';
};
extraModules = mkOption {
type = types.listOf types.package;
default = [];
example = literalExpression "[ pkgs.varnishPackages.geoip ]";
- description = "
+ description = lib.mdDoc ''
Varnish modules (except 'std').
- ";
+ '';
};
extraCommandLine = mkOption {
type = types.str;
default = "";
example = "-s malloc,256M";
- description = "
+ description = lib.mdDoc ''
Command line switches for varnishd (run 'varnishd -?' to get list of options)
- ";
+ '';
};
};
diff --git a/nixos/modules/services/x11/desktop-managers/none.nix b/nixos/modules/services/x11/desktop-managers/none.nix
index b5e498b67a01..074b729cc3f3 100644
--- a/nixos/modules/services/x11/desktop-managers/none.nix
+++ b/nixos/modules/services/x11/desktop-managers/none.nix
@@ -8,16 +8,16 @@ in
services.xserver.desktopManager.runXdgAutostartIfNone = mkOption {
type = types.bool;
default = false;
- description = ''
+ description = lib.mdDoc ''
Whether to run XDG autostart files for sessions without a desktop manager
(with only a window manager), these sessions usually don't handle XDG
autostart files by default.
- Some services like and
- use XDG autostart files to start.
- If this option is not set to true and you are using
+ Some services like {option}`i18n.inputMethod` and
+ {option}`service.earlyoom` use XDG autostart files to start.
+ If this option is not set to `true` and you are using
a window manager without a desktop manager, you need to manually start
- them or running dex somewhere.
+ them or running `dex` somewhere.
'';
};
};
diff --git a/nixos/modules/services/x11/desktop-managers/phosh.nix b/nixos/modules/services/x11/desktop-managers/phosh.nix
index 0ff5d6fd1b11..2f670d3492e9 100644
--- a/nixos/modules/services/x11/desktop-managers/phosh.nix
+++ b/nixos/modules/services/x11/desktop-managers/phosh.nix
@@ -24,7 +24,7 @@ let
phocConfigType = types.submodule {
options = {
xwayland = mkOption {
- description = ''
+ description = lib.mdDoc ''
Whether to enable XWayland support.
To start XWayland immediately, use `immediate`.
diff --git a/nixos/modules/system/activation/activation-script.nix b/nixos/modules/system/activation/activation-script.nix
index 88b3ac1d18e8..3a57642a53ee 100644
--- a/nixos/modules/system/activation/activation-script.nix
+++ b/nixos/modules/system/activation/activation-script.nix
@@ -92,8 +92,8 @@ let
Whether this activation script supports being dry-activated.
These activation scripts will also be executed on dry-activate
activations with the environment variable
- NIXOS_ACTION being set to dry-activate
- . it's important that these activation scripts don't
+ NIXOS_ACTION being set to dry-activate.
+ it's important that these activation scripts don't
modify anything about the system when the variable is set.
'';
};
diff --git a/nixos/modules/system/boot/kernel_config.nix b/nixos/modules/system/boot/kernel_config.nix
index 448835c3e625..997c404be168 100644
--- a/nixos/modules/system/boot/kernel_config.nix
+++ b/nixos/modules/system/boot/kernel_config.nix
@@ -91,7 +91,7 @@ in
USB? y
DEBUG n
'';
- description = ''
+ description = lib.mdDoc ''
The result of converting the structured kernel configuration in settings
to an intermediate string that can be parsed by generate-config.pl to
answer the kernel `make defconfig`.
diff --git a/nixos/modules/system/boot/luksroot.nix b/nixos/modules/system/boot/luksroot.nix
index 78301a57bd97..8cd16974916c 100644
--- a/nixos/modules/system/boot/luksroot.nix
+++ b/nixos/modules/system/boot/luksroot.nix
@@ -532,15 +532,15 @@ in
boot.initrd.luks.reusePassphrases = mkOption {
type = types.bool;
default = true;
- description = ''
+ description = lib.mdDoc ''
When opening a new LUKS device try reusing last successful
passphrase.
Useful for mounting a number of devices that use the same
passphrase without retyping it several times.
- Such setup can be useful if you use cryptsetup
- luksSuspend. Different LUKS devices will still have
+ Such setup can be useful if you use {command}`cryptsetup luksSuspend`.
+ Different LUKS devices will still have
different master keys even when using the same passphrase.
'';
};
diff --git a/nixos/modules/tasks/auto-upgrade.nix b/nixos/modules/tasks/auto-upgrade.nix
index bfc5265518d2..29e3e313336f 100644
--- a/nixos/modules/tasks/auto-upgrade.nix
+++ b/nixos/modules/tasks/auto-upgrade.nix
@@ -46,11 +46,11 @@ in {
type = types.nullOr types.str;
default = null;
example = "https://nixos.org/channels/nixos-14.12-small";
- description = ''
+ description = lib.mdDoc ''
The URI of the NixOS channel to use for automatic
upgrades. By default, this is the channel set using
- nix-channel (run nix-channel
- --list to see the current value).
+ {command}`nix-channel` (run `nix-channel --list`
+ to see the current value).
'';
};
diff --git a/nixos/modules/tasks/filesystems.nix b/nixos/modules/tasks/filesystems.nix
index 318740a44f4a..2a17baf65167 100644
--- a/nixos/modules/tasks/filesystems.nix
+++ b/nixos/modules/tasks/filesystems.nix
@@ -175,21 +175,20 @@ in
}
'';
type = types.attrsOf (types.submodule [coreFileSystemOpts fileSystemOpts]);
- description = ''
+ description = lib.mdDoc ''
The file systems to be mounted. It must include an entry for
- the root directory (mountPoint = "/"). Each
+ the root directory (`mountPoint = "/"`). Each
entry in the list is an attribute set with the following fields:
- mountPoint, device,
- fsType (a file system type recognised by
- mount; defaults to
- "auto"), and options
- (the mount options passed to mount using the
- flag; defaults to [ "defaults" ]).
+ `mountPoint`, `device`,
+ `fsType` (a file system type recognised by
+ {command}`mount`; defaults to
+ `"auto"`), and `options`
+ (the mount options passed to {command}`mount` using the
+ {option}`-o` flag; defaults to `[ "defaults" ]`).
- Instead of specifying device, you can also
- specify a volume label (label) for file
- systems that support it, such as ext2/ext3 (see mke2fs
- -L).
+ Instead of specifying `device`, you can also
+ specify a volume label (`label`) for file
+ systems that support it, such as ext2/ext3 (see {command}`mke2fs -L`).
'';
};
diff --git a/nixos/modules/tasks/filesystems/zfs.nix b/nixos/modules/tasks/filesystems/zfs.nix
index 2ff6c1067c76..0975ed0aab9b 100644
--- a/nixos/modules/tasks/filesystems/zfs.nix
+++ b/nixos/modules/tasks/filesystems/zfs.nix
@@ -426,7 +426,7 @@ in
type = types.either (types.enum [ "disabled" "all" ]) (types.listOf types.str);
default = "disabled";
example = [ "tank" "dozer" ];
- description = ''
+ description = lib.mdDoc ''
After importing, expand each device in the specified pools.
Set the value to the plain string "all" to expand all pools on boot:
diff --git a/nixos/modules/tasks/network-interfaces.nix b/nixos/modules/tasks/network-interfaces.nix
index fabddece376b..eb4818756bb1 100644
--- a/nixos/modules/tasks/network-interfaces.nix
+++ b/nixos/modules/tasks/network-interfaces.nix
@@ -785,7 +785,7 @@ in
default = null;
example = "fast";
type = types.nullOr types.str;
- description = ''
+ description = lib.mdDoc ''
DEPRECATED, use `driverOptions`.
Option specifying the rate in which we'll ask our link partner
to transmit LACPDU packets in 802.3ad mode.
@@ -796,7 +796,7 @@ in
default = null;
example = 100;
type = types.nullOr types.int;
- description = ''
+ description = lib.mdDoc ''
DEPRECATED, use `driverOptions`.
Miimon is the number of millisecond in between each round of polling
by the device driver for failed links. By default polling is not
@@ -809,7 +809,7 @@ in
default = null;
example = "active-backup";
type = types.nullOr types.str;
- description = ''
+ description = lib.mdDoc ''
DEPRECATED, use `driverOptions`.
The mode which the bond will be running. The default mode for
the bonding driver is balance-rr, optimizing for throughput.
@@ -822,7 +822,7 @@ in
default = null;
example = "layer2+3";
type = types.nullOr types.str;
- description = ''
+ description = lib.mdDoc ''
DEPRECATED, use `driverOptions`.
Selects the transmit hash policy to use for slave selection in
balance-xor, 802.3ad, and tlb modes.
diff --git a/nixos/modules/virtualisation/amazon-options.nix b/nixos/modules/virtualisation/amazon-options.nix
index 52c960d453d3..ef0ad52b905b 100644
--- a/nixos/modules/virtualisation/amazon-options.nix
+++ b/nixos/modules/virtualisation/amazon-options.nix
@@ -14,7 +14,7 @@ in {
};
datasets = lib.mkOption {
- description = ''
+ description = lib.mdDoc ''
Datasets to create under the `tank` and `boot` zpools.
**NOTE:** This option is used only at image creation time, and
diff --git a/nixos/modules/virtualisation/azure-image.nix b/nixos/modules/virtualisation/azure-image.nix
index 03dd3c051309..17cfd3938305 100644
--- a/nixos/modules/virtualisation/azure-image.nix
+++ b/nixos/modules/virtualisation/azure-image.nix
@@ -12,7 +12,7 @@ in
type = with types; either (enum [ "auto" ]) int;
default = "auto";
example = 2048;
- description = ''
+ description = lib.mdDoc ''
Size of disk image. Unit is MB.
'';
};
diff --git a/nixos/modules/virtualisation/google-compute-image.nix b/nixos/modules/virtualisation/google-compute-image.nix
index 0c72696f802b..197ebb18b9ad 100644
--- a/nixos/modules/virtualisation/google-compute-image.nix
+++ b/nixos/modules/virtualisation/google-compute-image.nix
@@ -21,7 +21,7 @@ in
type = with types; either (enum [ "auto" ]) int;
default = "auto";
example = 1536;
- description = ''
+ description = lib.mdDoc ''
Size of disk image. Unit is MB.
'';
};
@@ -29,7 +29,7 @@ in
virtualisation.googleComputeImage.configFile = mkOption {
type = with types; nullOr str;
default = null;
- description = ''
+ description = lib.mdDoc ''
A path to a configuration file which will be placed at `/etc/nixos/configuration.nix`
and be used when switching to a new configuration.
If set to `null`, a default configuration is used, where the only import is
@@ -40,7 +40,7 @@ in
virtualisation.googleComputeImage.compressionLevel = mkOption {
type = types.int;
default = 6;
- description = ''
+ description = lib.mdDoc ''
GZIP compression level of the resulting disk image (1-9).
'';
};
diff --git a/nixos/modules/virtualisation/hyperv-image.nix b/nixos/modules/virtualisation/hyperv-image.nix
index 6845d6750092..efaea0c110d2 100644
--- a/nixos/modules/virtualisation/hyperv-image.nix
+++ b/nixos/modules/virtualisation/hyperv-image.nix
@@ -12,21 +12,21 @@ in {
type = with types; either (enum [ "auto" ]) int;
default = "auto";
example = 2048;
- description = ''
+ description = lib.mdDoc ''
The size of the hyper-v base image in MiB.
'';
};
vmDerivationName = mkOption {
type = types.str;
default = "nixos-hyperv-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}";
- description = ''
+ description = lib.mdDoc ''
The name of the derivation for the hyper-v appliance.
'';
};
vmFileName = mkOption {
type = types.str;
default = "nixos-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}.vhdx";
- description = ''
+ description = lib.mdDoc ''
The file name of the hyper-v appliance.
'';
};
diff --git a/nixos/modules/virtualisation/kvmgt.nix b/nixos/modules/virtualisation/kvmgt.nix
index 5ea71c3a9143..5671e5b66dbb 100644
--- a/nixos/modules/virtualisation/kvmgt.nix
+++ b/nixos/modules/virtualisation/kvmgt.nix
@@ -10,7 +10,7 @@ let
vgpuOptions = {
uuid = mkOption {
type = with types; listOf str;
- description = "UUID(s) of VGPU device. You can generate one with libossp_uuid.";
+ description = lib.mdDoc "UUID(s) of VGPU device. You can generate one with `libossp_uuid`.";
};
};
@@ -31,9 +31,9 @@ in {
vgpus = mkOption {
default = {};
type = with types; attrsOf (submodule [ { options = vgpuOptions; } ]);
- description = ''
- Virtual GPUs to be used in Qemu. You can find devices via ls /sys/bus/pci/devices/*/mdev_supported_types
- and find info about device via cat /sys/bus/pci/devices/*/mdev_supported_types/i915-GVTg_V5_4/description
+ description = lib.mdDoc ''
+ Virtual GPUs to be used in Qemu. You can find devices via {command}`ls /sys/bus/pci/devices/*/mdev_supported_types`
+ and find info about device via {command}`cat /sys/bus/pci/devices/*/mdev_supported_types/i915-GVTg_V5_4/description`
'';
example = {
i915-GVTg_V5_8.uuid = [ "a297db4a-f4c2-11e6-90f6-d3b88d6c9525" ];
diff --git a/nixos/modules/virtualisation/libvirtd.nix b/nixos/modules/virtualisation/libvirtd.nix
index 817d7180a022..c2ff6b611af5 100644
--- a/nixos/modules/virtualisation/libvirtd.nix
+++ b/nixos/modules/virtualisation/libvirtd.nix
@@ -81,7 +81,7 @@ let
type = types.package;
default = pkgs.qemu;
defaultText = literalExpression "pkgs.qemu";
- description = ''
+ description = lib.mdDoc ''
Qemu package to use with libvirt.
`pkgs.qemu` can emulate alien architectures (e.g. aarch64 on x86)
`pkgs.qemu_kvm` saves disk space allowing to emulate only host architectures.
diff --git a/nixos/modules/virtualisation/lxc.nix b/nixos/modules/virtualisation/lxc.nix
index d7bbc3f8414c..5bd64a5f9a56 100644
--- a/nixos/modules/virtualisation/lxc.nix
+++ b/nixos/modules/virtualisation/lxc.nix
@@ -53,10 +53,9 @@ in
type = types.lines;
default = "";
description =
- ''
+ lib.mdDoc ''
This is the config file for managing unprivileged user network
- administration access in LXC. See lxc-usernet5
- .
+ administration access in LXC. See {manpage}`lxc-usernet(5)`.
'';
};
};
diff --git a/nixos/modules/virtualisation/nixos-containers.nix b/nixos/modules/virtualisation/nixos-containers.nix
index 1285563c6463..f15511f2df54 100644
--- a/nixos/modules/virtualisation/nixos-containers.nix
+++ b/nixos/modules/virtualisation/nixos-containers.nix
@@ -536,13 +536,13 @@ in
type = types.path;
default = pkgs.path;
defaultText = literalExpression "pkgs.path";
- description = ''
+ description = lib.mdDoc ''
A path to the nixpkgs that provide the modules, pkgs and lib for evaluating the container.
- To only change the pkgs argument used inside the container modules,
- set the nixpkgs.* options in the container .
- Setting config.nixpkgs.pkgs = pkgs speeds up the container evaluation
- by reusing the system pkgs, but the nixpkgs.config option in the
+ To only change the `pkgs` argument used inside the container modules,
+ set the `nixpkgs.*` options in the container {option}`config`.
+ Setting `config.nixpkgs.pkgs = pkgs` speeds up the container evaluation
+ by reusing the system pkgs, but the `nixpkgs.config` option in the
container config is ignored in this case.
'';
};
diff --git a/nixos/modules/virtualisation/openstack-options.nix b/nixos/modules/virtualisation/openstack-options.nix
index eded418c9c91..e1985a20732c 100644
--- a/nixos/modules/virtualisation/openstack-options.nix
+++ b/nixos/modules/virtualisation/openstack-options.nix
@@ -15,7 +15,7 @@ in
};
datasets = lib.mkOption {
- description = ''
+ description = lib.mdDoc ''
Datasets to create under the `tank` and `boot` zpools.
**NOTE:** This option is used only at image creation time, and
diff --git a/nixos/modules/virtualisation/parallels-guest.nix b/nixos/modules/virtualisation/parallels-guest.nix
index d3affe2b8f2c..07a61bf208db 100644
--- a/nixos/modules/virtualisation/parallels-guest.nix
+++ b/nixos/modules/virtualisation/parallels-guest.nix
@@ -23,7 +23,7 @@ in
autoMountShares = mkOption {
type = types.bool;
default = true;
- description = ''
+ description = lib.mdDoc ''
Control prlfsmountd service. When this service is running, shares can not be manually
mounted through `mount -t prl_fs ...` as this service will remount and trample any set options.
Recommended to enable for simple file sharing, but extended share use such as for code should
diff --git a/nixos/modules/virtualisation/podman/network-socket.nix b/nixos/modules/virtualisation/podman/network-socket.nix
index 523cbd00715b..a10597175ab9 100644
--- a/nixos/modules/virtualisation/podman/network-socket.nix
+++ b/nixos/modules/virtualisation/podman/network-socket.nix
@@ -17,16 +17,16 @@ in
enable = mkOption {
type = types.bool;
default = false;
- description = ''
+ description = lib.mdDoc ''
Make the Podman and Docker compatibility API available over the network
with TLS client certificate authentication.
This allows Docker clients to connect with the equivalents of the Docker
- CLI -H and --tls* family of options.
+ CLI `-H` and `--tls*` family of options.
For certificate setup, see https://docs.docker.com/engine/security/protect-access/
- This option is independent of .
+ This option is independent of [](#opt-virtualisation.podman.dockerSocket.enable).
'';
};
diff --git a/nixos/modules/virtualisation/proxmox-image.nix b/nixos/modules/virtualisation/proxmox-image.nix
index e07d1d1eb3fc..4076d68b93ef 100644
--- a/nixos/modules/virtualisation/proxmox-image.nix
+++ b/nixos/modules/virtualisation/proxmox-image.nix
@@ -10,7 +10,7 @@ with lib;
type = types.str;
default = "";
example = "order=scsi0;net0";
- description = ''
+ description = lib.mdDoc ''
Default boot device. PVE will try all devices in its default order if this value is empty.
'';
};
@@ -18,16 +18,16 @@ with lib;
type = types.str;
default = "virtio-scsi-pci";
example = "lsi";
- description = ''
+ description = lib.mdDoc ''
SCSI controller type. Must be one of the supported values given in
-
+
'';
};
virtio0 = mkOption {
type = types.str;
default = "local-lvm:vm-9999-disk-0";
example = "ceph:vm-123-disk-0";
- description = ''
+ description = lib.mdDoc ''
Configuration for the default virtio disk. It can be used as a cue for PVE to autodetect the target sotrage.
This parameter is required by PVE even if it isn't used.
'';
@@ -35,21 +35,21 @@ with lib;
ostype = mkOption {
type = types.str;
default = "l26";
- description = ''
+ description = lib.mdDoc ''
Guest OS type
'';
};
cores = mkOption {
type = types.ints.positive;
default = 1;
- description = ''
+ description = lib.mdDoc ''
Guest core count
'';
};
memory = mkOption {
type = types.ints.positive;
default = 1024;
- description = ''
+ description = lib.mdDoc ''
Guest memory in MB
'';
};
@@ -58,14 +58,14 @@ with lib;
name = mkOption {
type = types.str;
default = "nixos-${config.system.nixos.label}";
- description = ''
+ description = lib.mdDoc ''
VM name
'';
};
net0 = mkOption {
type = types.commas;
default = "virtio=00:00:00:00:00:00,bridge=vmbr0,firewall=1";
- description = ''
+ description = lib.mdDoc ''
Configuration for the default interface. When restoring from VMA, check the
"unique" box to ensure device mac is randomized.
'';
@@ -74,7 +74,7 @@ with lib;
type = types.str;
default = "socket";
example = "/dev/ttyS0";
- description = ''
+ description = lib.mdDoc ''
Create a serial device inside the VM (n is 0 to 3), and pass through a host serial device (i.e. /dev/ttyS0),
or create a unix socket on the host side (use qm terminal to open a terminal connection).
'';
@@ -83,7 +83,7 @@ with lib;
type = types.bool;
apply = x: if x then "1" else "0";
default = true;
- description = ''
+ description = lib.mdDoc ''
Expect guest to have qemu agent running
'';
};
@@ -95,7 +95,7 @@ with lib;
cpu = "host";
onboot = 1;
}'';
- description = ''
+ description = lib.mdDoc ''
Additional options appended to qemu-server.conf
'';
};
@@ -103,7 +103,7 @@ with lib;
type = types.str;
default = config.proxmox.qemuConf.name;
example = "999-nixos_template";
- description = ''
+ description = lib.mdDoc ''
Filename of the image will be vzdump-qemu-''${filenameSuffix}.vma.zstd.
This will also determine the default name of the VM on restoring the VMA.
Start this value with a number if you want the VMA to be detected as a backup of
diff --git a/nixos/modules/virtualisation/qemu-vm.nix b/nixos/modules/virtualisation/qemu-vm.nix
index 6bfae74f6366..5cb2a99bc3f7 100644
--- a/nixos/modules/virtualisation/qemu-vm.nix
+++ b/nixos/modules/virtualisation/qemu-vm.nix
@@ -739,10 +739,10 @@ in
type = types.nullOr types.package;
default = null;
description =
- ''
- An alternate BIOS (such as qboot) with which to start the VM.
- Should contain a file named bios.bin.
- If null, QEMU's builtin SeaBIOS will be used.
+ lib.mdDoc ''
+ An alternate BIOS (such as `qboot`) with which to start the VM.
+ Should contain a file named `bios.bin`.
+ If `null`, QEMU's builtin SeaBIOS will be used.
'';
};
diff --git a/nixos/modules/virtualisation/vmware-image.nix b/nixos/modules/virtualisation/vmware-image.nix
index f6cd12e2bb79..a38713b4d4ee 100644
--- a/nixos/modules/virtualisation/vmware-image.nix
+++ b/nixos/modules/virtualisation/vmware-image.nix
@@ -21,34 +21,34 @@ in {
type = with types; either (enum [ "auto" ]) int;
default = "auto";
example = 2048;
- description = ''
+ description = lib.mdDoc ''
The size of the VMWare base image in MiB.
'';
};
vmDerivationName = mkOption {
type = types.str;
default = "nixos-vmware-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}";
- description = ''
+ description = lib.mdDoc ''
The name of the derivation for the VMWare appliance.
'';
};
vmFileName = mkOption {
type = types.str;
default = "nixos-${config.system.nixos.label}-${pkgs.stdenv.hostPlatform.system}.vmdk";
- description = ''
+ description = lib.mdDoc ''
The file name of the VMWare appliance.
'';
};
vmSubformat = mkOption {
type = types.enum subformats;
default = "monolithicSparse";
- description = "Specifies which VMDK subformat to use.";
+ description = lib.mdDoc "Specifies which VMDK subformat to use.";
};
vmCompat6 = mkOption {
type = types.bool;
default = false;
example = true;
- description = "Create a VMDK version 6 image (instead of version 4).";
+ description = lib.mdDoc "Create a VMDK version 6 image (instead of version 4).";
};
};
};
diff --git a/nixos/tests/installed-tests/default.nix b/nixos/tests/installed-tests/default.nix
index b81384aa8c0b..3bb678d36782 100644
--- a/nixos/tests/installed-tests/default.nix
+++ b/nixos/tests/installed-tests/default.nix
@@ -98,6 +98,7 @@ in
gnome-photos = callInstalledTest ./gnome-photos.nix {};
graphene = callInstalledTest ./graphene.nix {};
gsconnect = callInstalledTest ./gsconnect.nix {};
+ json-glib = callInstalledTest ./json-glib.nix {};
ibus = callInstalledTest ./ibus.nix {};
libgdata = callInstalledTest ./libgdata.nix {};
librsvg = callInstalledTest ./librsvg.nix {};
diff --git a/nixos/tests/installed-tests/json-glib.nix b/nixos/tests/installed-tests/json-glib.nix
new file mode 100644
index 000000000000..3dfd3dd0b098
--- /dev/null
+++ b/nixos/tests/installed-tests/json-glib.nix
@@ -0,0 +1,5 @@
+{ pkgs, makeInstalledTest, ... }:
+
+makeInstalledTest {
+ tested = pkgs.json-glib;
+}
diff --git a/pkgs/applications/audio/bitwig-studio/bitwig-studio1.nix b/pkgs/applications/audio/bitwig-studio/bitwig-studio1.nix
index a66a5e6c9dc4..d803b09c198b 100644
--- a/pkgs/applications/audio/bitwig-studio/bitwig-studio1.nix
+++ b/pkgs/applications/audio/bitwig-studio/bitwig-studio1.nix
@@ -27,10 +27,6 @@ stdenv.mkDerivation rec {
libxkbfile pixman xcbutil xcbutilwm zlib
];
- binPath = lib.makeBinPath [
- xdg-utils zenity ffmpeg
- ];
-
installPhase = ''
mkdir -p $out
cp -r opt/bitwig-studio $out/libexec
@@ -77,7 +73,8 @@ stdenv.mkDerivation rec {
-not -path '*/resources/*' | \
while IFS= read -r f ; do
wrapProgram $f \
- --prefix PATH : "${binPath}" \
+ --suffix PATH : "${lib.makeBinPath [ ffmpeg zenity ]}" \
+ --prefix PATH : "${lib.makeBinPath [ xdg-utils ]}" \
"''${gappsWrapperArgs[@]}" \
--set LD_PRELOAD "${libxkbcommon.out}/lib/libxkbcommon.so" || true
done
diff --git a/pkgs/applications/audio/bitwig-studio/bitwig-studio3.nix b/pkgs/applications/audio/bitwig-studio/bitwig-studio3.nix
index 6b272a408ab0..5eb94f8445e0 100644
--- a/pkgs/applications/audio/bitwig-studio/bitwig-studio3.nix
+++ b/pkgs/applications/audio/bitwig-studio/bitwig-studio3.nix
@@ -27,10 +27,6 @@ stdenv.mkDerivation rec {
alsa-lib cairo freetype gdk-pixbuf glib gtk3 libxcb xcbutil xcbutilwm zlib libXtst libxkbcommon pulseaudio libjack2 libX11 libglvnd libXcursor stdenv.cc.cc.lib
];
- binPath = lib.makeBinPath [
- xdg-utils ffmpeg
- ];
-
ldLibraryPath = lib.strings.makeLibraryPath buildInputs;
installPhase = ''
@@ -60,8 +56,9 @@ stdenv.mkDerivation rec {
patchelf --set-interpreter "${stdenv.cc.bintools.dynamicLinker}" $f
wrapProgram $f \
"''${gappsWrapperArgs[@]}" \
- --prefix PATH : "${binPath}" \
- --suffix LD_LIBRARY_PATH : "${ldLibraryPath}"
+ --prefix LD_LIBRARY_PATH : "${ldLibraryPath}" \
+ --prefix PATH : "${lib.makeBinPath [ ffmpeg ]}" \
+ --suffix PATH : "${lib.makeBinPath [ xdg-utils ]}"
done
'';
diff --git a/pkgs/applications/audio/bitwig-studio/bitwig-studio4.nix b/pkgs/applications/audio/bitwig-studio/bitwig-studio4.nix
index 2ad0b6bf6aff..b51419784d18 100644
--- a/pkgs/applications/audio/bitwig-studio/bitwig-studio4.nix
+++ b/pkgs/applications/audio/bitwig-studio/bitwig-studio4.nix
@@ -53,9 +53,11 @@ stdenv.mkDerivation rec {
-not -path '*/resources/*' | \
while IFS= read -r f ; do
patchelf --set-interpreter "${stdenv.cc.bintools.dynamicLinker}" $f
+ # make xdg-open overrideable at runtime
wrapProgram $f \
"''${gappsWrapperArgs[@]}" \
- --prefix PATH : "${lib.makeBinPath [ xdg-utils ffmpeg ]}" \
+ --prefix PATH : "${lib.makeBinPath [ ffmpeg ]}" \
+ --suffix PATH : "${lib.makeBinPath [ xdg-utils ]}" \
--suffix LD_LIBRARY_PATH : "${lib.strings.makeLibraryPath buildInputs}"
done
diff --git a/pkgs/applications/audio/mid2key/default.nix b/pkgs/applications/audio/mid2key/default.nix
index 0a5aecfecb0f..d4af7108c159 100644
--- a/pkgs/applications/audio/mid2key/default.nix
+++ b/pkgs/applications/audio/mid2key/default.nix
@@ -7,12 +7,10 @@ stdenv.mkDerivation rec {
src = fetchFromGitHub {
owner = "dnschneid";
repo = "mid2key";
- rev = "v${version}";
- sha256 = "0j2vsjvdgx51nd1qmaa18mcy0yw9pwrhbv2mdwnf913bwsk4y904";
+ rev = "r${version}";
+ sha256 = "Zo0mqdBJ1JKD9ZCA8te3f5opyYslFncYcx9iuXq2B9g=";
};
- unpackPhase = "tar xvzf $src";
-
buildInputs = [ alsa-lib libX11 libXi libXtst xorgproto ];
buildPhase = "make";
diff --git a/pkgs/applications/finance/irpf/default.nix b/pkgs/applications/finance/irpf/default.nix
index d855586c4381..0e52893dedae 100644
--- a/pkgs/applications/finance/irpf/default.nix
+++ b/pkgs/applications/finance/irpf/default.nix
@@ -44,11 +44,12 @@ stdenvNoCC.mkDerivation rec {
install -Dm755 irpf.jar "$BASEDIR/${pname}.jar"
install -Dm644 Leia-me.htm offline.png online.png pgd-updater.jar "$BASEDIR"
+ # make xdg-open overrideable at runtime
makeWrapper ${jdk11}/bin/java $out/bin/${pname} \
--add-flags "-Dawt.useSystemAAFontSettings=on" \
--add-flags "-Dswing.aatext=true" \
--add-flags "-jar $BASEDIR/${pname}.jar" \
- --prefix PATH : ${lib.makeBinPath [ xdg-utils ]} \
+ --suffix PATH : ${lib.makeBinPath [ xdg-utils ]} \
--set _JAVA_AWT_WM_NONREPARENTING 1 \
--set AWT_TOOLKIT MToolkit
diff --git a/pkgs/applications/graphics/shutter/default.nix b/pkgs/applications/graphics/shutter/default.nix
index a6430f4889b9..e5659fb7fe2a 100644
--- a/pkgs/applications/graphics/shutter/default.nix
+++ b/pkgs/applications/graphics/shutter/default.nix
@@ -94,9 +94,11 @@ stdenv.mkDerivation rec {
'';
preFixup = ''
+ # make xdg-open overrideable at runtime
gappsWrapperArgs+=(
--set PERL5LIB ${perlPackages.makePerlPath perlModules} \
- --prefix PATH : ${lib.makeBinPath [ imagemagick xdg-utils ] }
+ --prefix PATH : ${lib.makeBinPath [ imagemagick ] }
+ --suffix PATH : ${lib.makeBinPath [ xdg-utils ] }
)
'';
diff --git a/pkgs/applications/misc/1password-gui/beta.nix b/pkgs/applications/misc/1password-gui/beta.nix
index 310df03b766c..bd1b0b6e0e63 100644
--- a/pkgs/applications/misc/1password-gui/beta.nix
+++ b/pkgs/applications/misc/1password-gui/beta.nix
@@ -126,8 +126,9 @@ in stdenv.mkDerivation rec {
# Electron is trying to open udev via dlopen()
# and for some reason that doesn't seem to be impacted from the rpath.
# Adding udev to LD_LIBRARY_PATH fixes that.
+ # Make xdg-open overrideable at runtime.
makeWrapper $out/share/1password/1password $out/bin/1password \
- --prefix PATH : ${lib.makeBinPath [ xdg-utils ]} \
+ --suffix PATH : ${lib.makeBinPath [ xdg-utils ]} \
--prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ udev ]}
runHook postInstall
diff --git a/pkgs/applications/misc/1password-gui/default.nix b/pkgs/applications/misc/1password-gui/default.nix
index 9a09cb10f62c..ead45054cc28 100644
--- a/pkgs/applications/misc/1password-gui/default.nix
+++ b/pkgs/applications/misc/1password-gui/default.nix
@@ -126,8 +126,9 @@ in stdenv.mkDerivation rec {
# Electron is trying to open udev via dlopen()
# and for some reason that doesn't seem to be impacted from the rpath.
# Adding udev to LD_LIBRARY_PATH fixes that.
+ # Make xdg-open overrideable at runtime.
makeWrapper $out/share/1password/1password $out/bin/1password \
- --prefix PATH : ${lib.makeBinPath [ xdg-utils ]} \
+ --suffix PATH : ${lib.makeBinPath [ xdg-utils ]} \
--prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ udev ]}
runHook postInstall
diff --git a/pkgs/applications/misc/avrdudess/default.nix b/pkgs/applications/misc/avrdudess/default.nix
index 20c36b745893..e4047e26b846 100644
--- a/pkgs/applications/misc/avrdudess/default.nix
+++ b/pkgs/applications/misc/avrdudess/default.nix
@@ -25,7 +25,7 @@ stdenv.mkDerivation {
export LD_LIBRARY_PATH="${lib.makeLibraryPath [gtk2 mono]}"
# We need PATH from user env for xdg-open to find its tools, which
# typically depend on the currently running desktop environment.
- export PATH="${lib.makeBinPath [ avrdude xdg-utils ]}:\$PATH"
+ export PATH="\$PATH:${lib.makeBinPath [ avrdude xdg-utils ]}"
# avrdudess must have its resource files in its current working directory
cd $out/avrdudess && exec ${mono}/bin/mono "$out/avrdudess/avrdudess.exe" "\$@"
diff --git a/pkgs/applications/misc/blender/default.nix b/pkgs/applications/misc/blender/default.nix
index 83e25a37e5d3..ea59e9bd108f 100644
--- a/pkgs/applications/misc/blender/default.nix
+++ b/pkgs/applications/misc/blender/default.nix
@@ -6,6 +6,7 @@
, zlib, zstd, fftw, opensubdiv, freetype, jemalloc, ocl-icd, addOpenGLRunpath
, jackaudioSupport ? false, libjack2
, cudaSupport ? config.cudaSupport or false, cudaPackages ? {}
+, hipSupport ? false, hip # comes with a significantly larger closure size
, colladaSupport ? true, opencollada
, spaceNavSupport ? stdenv.isLinux, libspnav
, makeWrapper
@@ -86,7 +87,11 @@ stdenv.mkDerivation rec {
'${python310Packages.numpy}/${python.sitePackages}/numpy'
'' else ''
substituteInPlace extern/clew/src/clew.c --replace '"libOpenCL.so"' '"${ocl-icd}/lib/libOpenCL.so"'
- '');
+ '') +
+ (if hipSupport then ''
+ substituteInPlace extern/hipew/src/hipew.c --replace '"/opt/rocm/hip/lib/libamdhip64.so"' '"${hip}/lib/libamdhip64.so"'
+ substituteInPlace extern/hipew/src/hipew.c --replace '"opt/rocm/hip/bin"' '"${hip}/bin"'
+ '' else "");
cmakeFlags =
[
diff --git a/pkgs/applications/misc/far2l/default.nix b/pkgs/applications/misc/far2l/default.nix
index f7637534de04..aafc332f6b9c 100644
--- a/pkgs/applications/misc/far2l/default.nix
+++ b/pkgs/applications/misc/far2l/default.nix
@@ -61,12 +61,13 @@ stdenv.mkDerivation rec {
PYTHON = withPython;
};
- runtimeDeps = [ unzip zip p7zip xz gzip bzip2 gnutar xdg-utils ];
+ runtimeDeps = [ unzip zip p7zip xz gzip bzip2 gnutar ];
postInstall = ''
wrapProgram $out/bin/far2l \
--argv0 $out/bin/far2l \
- --prefix PATH : ${lib.makeBinPath runtimeDeps}
+ --prefix PATH : ${lib.makeBinPath runtimeDeps} \
+ --suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
'';
meta = with lib; {
diff --git a/pkgs/applications/misc/nwg-drawer/default.nix b/pkgs/applications/misc/nwg-drawer/default.nix
index 1aa4a3660c2e..f15279ff4393 100644
--- a/pkgs/applications/misc/nwg-drawer/default.nix
+++ b/pkgs/applications/misc/nwg-drawer/default.nix
@@ -33,8 +33,9 @@ buildGoModule rec {
'';
preFixup = ''
+ # make xdg-open overrideable at runtime
gappsWrapperArgs+=(
- --prefix PATH : ${xdg-utils}/bin
+ --suffix PATH : ${xdg-utils}/bin
--prefix XDG_DATA_DIRS : $out/share
)
'';
diff --git a/pkgs/applications/networking/appgate-sdp/default.nix b/pkgs/applications/networking/appgate-sdp/default.nix
index 7dd69aeebcdc..a5bc03596d4d 100644
--- a/pkgs/applications/networking/appgate-sdp/default.nix
+++ b/pkgs/applications/networking/appgate-sdp/default.nix
@@ -141,8 +141,9 @@ stdenv.mkDerivation rec {
--prefix PATH : ${makeBinPath [ iproute2 networkmanager dnsmasq ]} \
--set LD_LIBRARY_PATH $out/opt/appgate/service
+ # make xdg-open overrideable at runtime
makeWrapper $out/opt/appgate/Appgate $out/bin/appgate \
- --prefix PATH : ${makeBinPath [ xdg-utils ]} \
+ --suffix PATH : ${makeBinPath [ xdg-utils ]} \
--set LD_LIBRARY_PATH $out/opt/appgate:${makeLibraryPath deps}
wrapProgram $out/opt/appgate/linux/set_dns --set PYTHONPATH $PYTHONPATH
diff --git a/pkgs/applications/networking/browsers/brave/default.nix b/pkgs/applications/networking/browsers/brave/default.nix
index 67c950f3f9a2..932e33026f78 100644
--- a/pkgs/applications/networking/browsers/brave/default.nix
+++ b/pkgs/applications/networking/browsers/brave/default.nix
@@ -73,7 +73,7 @@ let
libxkbcommon libXScrnSaver libXcomposite libXcursor libXdamage
libXext libXfixes libXi libXrandr libXrender libxshmfence
libXtst libuuid mesa nspr nss pango pipewire udev wayland
- xdg-utils xorg.libxcb zlib snappy
+ xorg.libxcb zlib snappy
]
++ optional pulseSupport libpulseaudio
++ optional libvaSupport libva;
@@ -170,6 +170,7 @@ stdenv.mkDerivation rec {
gappsWrapperArgs+=(
--prefix LD_LIBRARY_PATH : ${rpath}
--prefix PATH : ${binpath}
+ --suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
${optionalString (enableFeatures != []) ''
--add-flags "--enable-features=${strings.concatStringsSep "," enableFeatures}"
''}
diff --git a/pkgs/applications/networking/browsers/firefox/wrapper.nix b/pkgs/applications/networking/browsers/firefox/wrapper.nix
index 35a98e6c8c60..6f1de80c24bd 100644
--- a/pkgs/applications/networking/browsers/firefox/wrapper.nix
+++ b/pkgs/applications/networking/browsers/firefox/wrapper.nix
@@ -271,11 +271,12 @@ let
mv "$executablePath" "$oldExe"
fi
+ # make xdg-open overrideable at runtime
makeWrapper "$oldExe" \
"''${executablePath}${nameSuffix}" \
--prefix LD_LIBRARY_PATH ':' "$libs" \
--suffix-each GTK_PATH ':' "$gtk_modules" \
- --prefix PATH ':' "${xdg-utils}/bin" \
+ --suffix PATH ':' "${xdg-utils}/bin" \
--suffix PATH ':' "$out/bin" \
--set MOZ_APP_LAUNCHER "${launcherName}" \
--set MOZ_SYSTEM_DIR "$out/lib/mozilla" \
diff --git a/pkgs/applications/networking/browsers/google-chrome/default.nix b/pkgs/applications/networking/browsers/google-chrome/default.nix
index c1c431f7300d..def7c989e5bc 100644
--- a/pkgs/applications/networking/browsers/google-chrome/default.nix
+++ b/pkgs/applications/networking/browsers/google-chrome/default.nix
@@ -63,7 +63,7 @@ let
dbus gdk-pixbuf gcc-unwrapped.lib
systemd
libexif pciutils
- liberation_ttf curl util-linux xdg-utils wget
+ liberation_ttf curl util-linux wget
flac harfbuzz icu libpng opusWithCustomModes snappy speechd
bzip2 libcap at-spi2-atk at-spi2-core
libkrb5 libdrm libglvnd mesa coreutils
@@ -145,6 +145,7 @@ in stdenv.mkDerivation {
makeWrapper "$out/share/google/$appname/google-$appname" "$exe" \
--prefix LD_LIBRARY_PATH : "$rpath" \
--prefix PATH : "$binpath" \
+ --suffix PATH : "${lib.makeBinPath [ xdg-utils ]}" \
--prefix XDG_DATA_DIRS : "$XDG_ICON_DIRS:$GSETTINGS_SCHEMAS_PATH:${addOpenGLRunpath.driverLink}/share" \
--set CHROME_WRAPPER "google-chrome-$dist" \
--add-flags ${escapeShellArg commandLineArgs} \
diff --git a/pkgs/applications/networking/browsers/vivaldi/default.nix b/pkgs/applications/networking/browsers/vivaldi/default.nix
index c917ba5d3498..69cb5562109a 100644
--- a/pkgs/applications/networking/browsers/vivaldi/default.nix
+++ b/pkgs/applications/networking/browsers/vivaldi/default.nix
@@ -20,11 +20,11 @@ let
vivaldiName = if isSnapshot then "vivaldi-snapshot" else "vivaldi";
in stdenv.mkDerivation rec {
pname = "vivaldi";
- version = "5.4.2753.33-1";
+ version = "5.4.2753.37-1";
src = fetchurl {
url = "https://downloads.vivaldi.com/${branch}/vivaldi-${branch}_${version}_amd64.deb";
- sha256 = "0bs6324m5l5vmg1x1sj6g3qb1958c5c8z35r87r3rpnv52lqr501";
+ sha256 = "05aaprv1bqnb7iml1m6vlzv038dizy05ycwkrgb5nw1wiz9w6cyw";
};
unpackPhase = ''
diff --git a/pkgs/applications/networking/instant-messengers/armcord/default.nix b/pkgs/applications/networking/instant-messengers/armcord/default.nix
index 6f6a6e0b337e..9a0766a92655 100644
--- a/pkgs/applications/networking/instant-messengers/armcord/default.nix
+++ b/pkgs/applications/networking/instant-messengers/armcord/default.nix
@@ -108,7 +108,7 @@ stdenv.mkDerivation rec {
# Wrap the startup command
makeWrapper $out/opt/ArmCord/armcord $out/bin/armcord \
--prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath buildInputs}" \
- --prefix PATH : ${lib.makeBinPath [ xdg-utils ]} \
+ --suffix PATH : ${lib.makeBinPath [ xdg-utils ]} \
"''${gappsWrapperArgs[@]}"
# Fix desktop link
diff --git a/pkgs/applications/networking/instant-messengers/bluejeans/default.nix b/pkgs/applications/networking/instant-messengers/bluejeans/default.nix
index c74bffdd5e2a..3779624aaa77 100644
--- a/pkgs/applications/networking/instant-messengers/bluejeans/default.nix
+++ b/pkgs/applications/networking/instant-messengers/bluejeans/default.nix
@@ -111,10 +111,11 @@ stdenv.mkDerivation rec {
cc $localtime64_stub -shared -o "${placeholder "out"}"/opt/BlueJeans/liblocaltime64_stub.so
+ # make xdg-open overrideable at runtime
makeWrapper $out/opt/BlueJeans/bluejeans-v2 $out/bin/bluejeans \
--set LD_LIBRARY_PATH "${libPath}":"${placeholder "out"}"/opt/BlueJeans \
--set LD_PRELOAD "$out"/opt/BlueJeans/liblocaltime64_stub.so \
- --prefix PATH : ${lib.makeBinPath [ xdg-utils ]}
+ --suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
substituteInPlace "$out"/share/applications/bluejeans-v2.desktop \
--replace "/opt/BlueJeans/bluejeans-v2" "$out/bin/bluejeans"
diff --git a/pkgs/applications/networking/instant-messengers/franz/generic.nix b/pkgs/applications/networking/instant-messengers/franz/generic.nix
index 7438e5496acd..44546aabe223 100644
--- a/pkgs/applications/networking/instant-messengers/franz/generic.nix
+++ b/pkgs/applications/networking/instant-messengers/franz/generic.nix
@@ -85,9 +85,10 @@ stdenv.mkDerivation rec {
dontWrapGApps = true;
postFixup = ''
+ # make xdg-open overrideable at runtime
wrapProgram $out/opt/${name}/${pname} \
--prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath runtimeDependencies}" \
- --prefix PATH : ${xdg-utils}/bin \
+ --suffix PATH : ${xdg-utils}/bin \
"''${gappsWrapperArgs[@]}"
'';
}
diff --git a/pkgs/applications/networking/instant-messengers/slack/default.nix b/pkgs/applications/networking/instant-messengers/slack/default.nix
index 5d497546095b..50693abe8ba7 100644
--- a/pkgs/applications/networking/instant-messengers/slack/default.nix
+++ b/pkgs/applications/networking/instant-messengers/slack/default.nix
@@ -164,11 +164,12 @@ let
patchelf --set-rpath ${rpath}:$out/lib/slack $file || true
done
- # Replace the broken bin/slack symlink with a startup wrapper
+ # Replace the broken bin/slack symlink with a startup wrapper.
+ # Make xdg-open overrideable at runtime.
rm $out/bin/slack
makeWrapper $out/lib/slack/slack $out/bin/slack \
--prefix XDG_DATA_DIRS : $GSETTINGS_SCHEMAS_PATH \
- --prefix PATH : ${lib.makeBinPath [xdg-utils]} \
+ --suffix PATH : ${lib.makeBinPath [xdg-utils]} \
--add-flags "\''${NIXOS_OZONE_WL:+\''${WAYLAND_DISPLAY:+--enable-features=UseOzonePlatform --ozone-platform=wayland}}"
# Fix the desktop link
diff --git a/pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix b/pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix
index 3f1468126fd8..bc7fa4a14bca 100644
--- a/pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix
+++ b/pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix
@@ -173,7 +173,7 @@ env.mkDerivation rec {
wrapProgram $out/bin/telegram-desktop \
"''${gappsWrapperArgs[@]}" \
"''${qtWrapperArgs[@]}" \
- --prefix PATH : ${lib.makeBinPath [ xdg-utils]} \
+ --suffix PATH : ${lib.makeBinPath [ xdg-utils]} \
--set XDG_RUNTIME_DIR "XDG-RUNTIME-DIR"
sed -i $out/bin/telegram-desktop \
-e "s,'XDG-RUNTIME-DIR',\"\''${XDG_RUNTIME_DIR:-/run/user/\$(id --user)}\","
diff --git a/pkgs/applications/networking/instant-messengers/wavebox/default.nix b/pkgs/applications/networking/instant-messengers/wavebox/default.nix
index 26a6b43d4489..cf6410def0d1 100644
--- a/pkgs/applications/networking/instant-messengers/wavebox/default.nix
+++ b/pkgs/applications/networking/instant-messengers/wavebox/default.nix
@@ -53,8 +53,9 @@ in stdenv.mkDerivation {
'';
postFixup = ''
+ # make xdg-open overrideable at runtime
makeWrapper $out/opt/wavebox/Wavebox $out/bin/wavebox \
- --prefix PATH : ${xdg-utils}/bin
+ --suffix PATH : ${xdg-utils}/bin
'';
meta = with lib; {
diff --git a/pkgs/applications/networking/mailreaders/thunderbird-bin/release_sources.nix b/pkgs/applications/networking/mailreaders/thunderbird-bin/release_sources.nix
index c0bc4f5dbbee..cf020f2c53c7 100644
--- a/pkgs/applications/networking/mailreaders/thunderbird-bin/release_sources.nix
+++ b/pkgs/applications/networking/mailreaders/thunderbird-bin/release_sources.nix
@@ -1,665 +1,665 @@
{
- version = "102.0.3";
+ version = "102.1.2";
sources = [
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/af/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/af/thunderbird-102.1.2.tar.bz2";
locale = "af";
arch = "linux-x86_64";
- sha256 = "acbb0b0467c0f83179c301e6435d6fb09d784d793bf56eb9d10a2240f40972cf";
+ sha256 = "045a2ae8a4da72b4ebe18800b03a5a5f722fcf2a26a3fb382b4412f5be1958bf";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ar/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ar/thunderbird-102.1.2.tar.bz2";
locale = "ar";
arch = "linux-x86_64";
- sha256 = "c15a7753c36d20da261a4819a49429196d839a7288b756478330bcf69cd93611";
+ sha256 = "5d3b5ef861ef742025be92e49233b6f1ed91ae5bbc19e4819cfc68ad139663a7";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ast/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ast/thunderbird-102.1.2.tar.bz2";
locale = "ast";
arch = "linux-x86_64";
- sha256 = "2e0747bfa96640d8c4998d08b3e1096797d870773bc805a2d9726da110799e35";
+ sha256 = "8a9255162105f0148aa12a5833a5a27294dcc5dd48841d871808031bf08d0e64";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/be/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/be/thunderbird-102.1.2.tar.bz2";
locale = "be";
arch = "linux-x86_64";
- sha256 = "1316efa7b999c1ecd6470520ae90beec9575e549bd1735ea523bb61b1edc3230";
+ sha256 = "b46b07e20417ea588645893d3aa256acabf1689bb226e439983c55d99049dbab";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/bg/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/bg/thunderbird-102.1.2.tar.bz2";
locale = "bg";
arch = "linux-x86_64";
- sha256 = "502f8aef0eab71e3b07404e888962930d3fd751d4402c178ed4ab2b38b1f9fb4";
+ sha256 = "090e8d450209b3584cf77bbe304c914d903be40491113d8667126cc7607d0ae2";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/br/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/br/thunderbird-102.1.2.tar.bz2";
locale = "br";
arch = "linux-x86_64";
- sha256 = "1d3ec6f206083eca2b72f65bf50134163f58e800607e768892765f040feea94b";
+ sha256 = "b5aebf8f6210a2234041cc8774ff94459c38da193abfc222ae2994bba1f9b5b5";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ca/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ca/thunderbird-102.1.2.tar.bz2";
locale = "ca";
arch = "linux-x86_64";
- sha256 = "aaae5de848334d5ebc3f761ec6780aa9826e43424308c256d40469c63699b6cc";
+ sha256 = "67e6fc3cd2a4ba0ba9b4a45cf4acc7a3cded9dea42a4e2826f06a750739a61ab";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/cak/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/cak/thunderbird-102.1.2.tar.bz2";
locale = "cak";
arch = "linux-x86_64";
- sha256 = "f391f7d47c1fd9cb5ad7f5e1d79e20400521449404842cedaa7e5ac613e71e10";
+ sha256 = "bba56f6fbeb8441df134eb4a3179a6e95494e55feda1f8e697e7d1d8c45cbfc5";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/cs/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/cs/thunderbird-102.1.2.tar.bz2";
locale = "cs";
arch = "linux-x86_64";
- sha256 = "9ba13380b2ac7c54f15e294fdd1534eb6687056865dad5f72aa4c7120fb2740b";
+ sha256 = "d6d586b4c28f189006928605537e73d33d4e6f3cb2cac7762961d300f180d7b7";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/cy/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/cy/thunderbird-102.1.2.tar.bz2";
locale = "cy";
arch = "linux-x86_64";
- sha256 = "3f93b8fbe6cb9928a546768fbf0976b69361fd1ca34acc207b74a267cab32b7b";
+ sha256 = "80bedee4129f6ad3cbe452ffd744ae1273d230bff6b5ea1a149f7884f6c3a856";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/da/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/da/thunderbird-102.1.2.tar.bz2";
locale = "da";
arch = "linux-x86_64";
- sha256 = "45a5500cad37d4a50ae16801362a1b32f4233f9febd2400deb239e082fd59421";
+ sha256 = "fe828dcd369eecce999dcada43703e7ae64f40d65e1a527aa1c8b5a12872da4b";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/de/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/de/thunderbird-102.1.2.tar.bz2";
locale = "de";
arch = "linux-x86_64";
- sha256 = "4b36a09e6945c0a4674982e726ceaccf7b7724d9f394640f190ab0b2597cff4c";
+ sha256 = "c1caf3070b417ef809203a4da6bf93cdc328a9b240304ea609b52f707627bb69";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/dsb/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/dsb/thunderbird-102.1.2.tar.bz2";
locale = "dsb";
arch = "linux-x86_64";
- sha256 = "3ab10a155916f89c803738fcac21a66b670321795b2aed813d3007e34f00b996";
+ sha256 = "8c3c81ad3b6067d51261aed574a6fd9df2188e6533540794763d6d58cf323849";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/el/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/el/thunderbird-102.1.2.tar.bz2";
locale = "el";
arch = "linux-x86_64";
- sha256 = "2bcdedd483a0724714e20416fe4ff57d5f8d7e07da32e54430ab1af20a6f6089";
+ sha256 = "81ad4bc8a3d1fc7da97bb8655b12363c2a4033f39ece73ba37097315b6df0c70";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/en-CA/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/en-CA/thunderbird-102.1.2.tar.bz2";
locale = "en-CA";
arch = "linux-x86_64";
- sha256 = "0b5bc27fd53c7b19a81d0dd502866237e0861770cc8e7caba5b5771b5321cdf3";
+ sha256 = "3487c91dc802bb0c284bd87dfaddd2aac907aca7ed9bcdde8d8d74d79a51eea9";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/en-GB/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/en-GB/thunderbird-102.1.2.tar.bz2";
locale = "en-GB";
arch = "linux-x86_64";
- sha256 = "4bd0315b1b1f8d9d83e91b845df10807274c3ee921551fdece8a25cf51db08f2";
+ sha256 = "631f9c56e3b9dd3d606cf031a432c05f84c333c47067649264fd35e295d00910";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/en-US/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/en-US/thunderbird-102.1.2.tar.bz2";
locale = "en-US";
arch = "linux-x86_64";
- sha256 = "16c2db5a24db5f9a7b449a73ebe0b881fd6965c4060f9b005df2ec819dded4e0";
+ sha256 = "5227881c30d9723386a9296c44c5253fe930c2f32b094c63972e4ba3a6c316eb";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/es-AR/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/es-AR/thunderbird-102.1.2.tar.bz2";
locale = "es-AR";
arch = "linux-x86_64";
- sha256 = "a9cb0bbc9ea7cfe759cf19e9e27cf23ca88967d26e7a951a5b58908fdd535cdc";
+ sha256 = "094652b5b87bfe24389ef15acdb8a62b2bdee5b16d0ea3fa8b10b47ea8371391";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/es-ES/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/es-ES/thunderbird-102.1.2.tar.bz2";
locale = "es-ES";
arch = "linux-x86_64";
- sha256 = "462ebc50ec7fb4a4f6fe81fcec48d2e50ae6ae0c90768499104692fdd5e78396";
+ sha256 = "63fa635cfc4e0d1c1365589090a1d01025f4b03d826f09530876329d23ab3f8f";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/es-MX/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/es-MX/thunderbird-102.1.2.tar.bz2";
locale = "es-MX";
arch = "linux-x86_64";
- sha256 = "bb025a6d3bda7916ecba63b400386fa046d0a075ad1f82213d7b6577d6605edc";
+ sha256 = "efa60acc622b904efbf99f8708f236221f474da529741da7ae411300c0a839ac";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/et/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/et/thunderbird-102.1.2.tar.bz2";
locale = "et";
arch = "linux-x86_64";
- sha256 = "7914cf39516159f769f29ca73985ae45d587c8db953fea10aa9814d65bbc341d";
+ sha256 = "c9eb969de36dddd32eca24c9845093caa9afffaba2e22e1c84ca8b1a1c39850f";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/eu/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/eu/thunderbird-102.1.2.tar.bz2";
locale = "eu";
arch = "linux-x86_64";
- sha256 = "b34813f880a4a48152695a65d5ff24e206e34bdbdaeb8edef59c0075d3b130de";
+ sha256 = "65348b4703f68daa83f2964593c38fda497fe2426472138bdbc5c7a7eb48f348";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/fi/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/fi/thunderbird-102.1.2.tar.bz2";
locale = "fi";
arch = "linux-x86_64";
- sha256 = "33aff0a00102765d0e102eea520f615a3d4d0f1d93a00e8768e6fc93492fd16e";
+ sha256 = "a229d9e9d7ea87e940d2aff60b0ee8e0288d3e584b0c73a45d1bb34d16d57117";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/fr/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/fr/thunderbird-102.1.2.tar.bz2";
locale = "fr";
arch = "linux-x86_64";
- sha256 = "0cce5a940d8c3a2b9d15d3102108d21c3165d69c30a62618da0a93b95a52cf99";
+ sha256 = "714f5aefaab686cf6daa699f4e00455e2a4abf2414b5bbf3436e9020694ed27d";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/fy-NL/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/fy-NL/thunderbird-102.1.2.tar.bz2";
locale = "fy-NL";
arch = "linux-x86_64";
- sha256 = "bba6ccedface111987459a370352972853fd0af65a61a1a0032faf24113730df";
+ sha256 = "89198e512ee6a8384a95739f718b89b3309b51c2afbe3f86841724e829990d05";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ga-IE/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ga-IE/thunderbird-102.1.2.tar.bz2";
locale = "ga-IE";
arch = "linux-x86_64";
- sha256 = "18960a121ffc43f27e9fa733ec2a80881f4ca9316bf6114ccc693de772416c89";
+ sha256 = "4b68b313a633aab863abad1ebf80385a8a2bc95915ce74b7277e9bd6ec95fba0";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/gd/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/gd/thunderbird-102.1.2.tar.bz2";
locale = "gd";
arch = "linux-x86_64";
- sha256 = "6e4430667839fbab52acc968036d9a08d99eec0eed5ceb5284ac747c4026c5ff";
+ sha256 = "8703b7388f1f183707682dc9f29d847a56a3e61b8018361e583bdb2081d0a92e";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/gl/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/gl/thunderbird-102.1.2.tar.bz2";
locale = "gl";
arch = "linux-x86_64";
- sha256 = "0c871f1f195fc35b78c9f6b1f93220635231f117da3c5b470b852724408390e9";
+ sha256 = "f46a7c1a5e6d6b413220b2edcd8d0e9c3d0ebb7fe55599b3f151e8b82d0d0d6f";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/he/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/he/thunderbird-102.1.2.tar.bz2";
locale = "he";
arch = "linux-x86_64";
- sha256 = "e0f6dc98cebe0a00361b05292547d338d767837b5a29740786049f0af9bdbf38";
+ sha256 = "cb79bc77109b9e36874755f497ff55e7df29dd45a411df134e342efae4df91a0";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/hr/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/hr/thunderbird-102.1.2.tar.bz2";
locale = "hr";
arch = "linux-x86_64";
- sha256 = "af6a7cd558d9ce3f30c98fc1f6d4d5ffab8342dbab27b381943f8d21aab05f37";
+ sha256 = "f7f83473148269479dfa94211c3465e2dfb1e746a61c749d8a4648e37790832f";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/hsb/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/hsb/thunderbird-102.1.2.tar.bz2";
locale = "hsb";
arch = "linux-x86_64";
- sha256 = "fc121b9b7ff2a74562dd239345d8754b3f21d5ea99eea47eee2436c71aad39fe";
+ sha256 = "f26ebf4f971502b6a5681b6888a65b4dbbd49bc7e44d99b2580bdad1e656be44";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/hu/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/hu/thunderbird-102.1.2.tar.bz2";
locale = "hu";
arch = "linux-x86_64";
- sha256 = "e8df28798a07a4a43265f5a8c29ae0844f083f51bffe54afc9b173881407021b";
+ sha256 = "d05150adc28458e01b52a45d633ce895713bc4fbbc1a867bf61efa4459682fc2";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/hy-AM/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/hy-AM/thunderbird-102.1.2.tar.bz2";
locale = "hy-AM";
arch = "linux-x86_64";
- sha256 = "8a7c705633a98937550b8c22199dfba8f9908fd6ea2c41cccf504bcb8c1b0c05";
+ sha256 = "bb2d7f8167dc30c1a927701022b927f6cd21aab4e60e02cee8274badb196c77c";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/id/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/id/thunderbird-102.1.2.tar.bz2";
locale = "id";
arch = "linux-x86_64";
- sha256 = "ed2d44255fc8d227a602743619b6bab606bbc17de96f90503c644347fa99cc58";
+ sha256 = "06342277629f9f42fb6a2ccaeed5421047cf2dec9dd912b0825ee9ffee2d1aba";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/is/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/is/thunderbird-102.1.2.tar.bz2";
locale = "is";
arch = "linux-x86_64";
- sha256 = "309d47fece404ef7717d95cf0b4920be48ecee0b69c73a1431e7044fab5c46d2";
+ sha256 = "ffa8a785f1a7c5c670782e87d492c9d2831ede93c178b1038f8735484036f8be";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/it/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/it/thunderbird-102.1.2.tar.bz2";
locale = "it";
arch = "linux-x86_64";
- sha256 = "e92bd95955e9e6964394d95dd6564956e14c618e73f9853a72473cc89f6e68b7";
+ sha256 = "97d0433d6c49d445006738fe43cccca9c76216e065b0d6f126eb50084f5ab265";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ja/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ja/thunderbird-102.1.2.tar.bz2";
locale = "ja";
arch = "linux-x86_64";
- sha256 = "81299c0ccaf3dd52d92a081a828d01573bcfe7f821c7cb6d0697acb505591189";
+ sha256 = "d8f885cb04693fc9a079ac541350b03805ab053b5aa60e49b037ebdfd5532019";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ka/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ka/thunderbird-102.1.2.tar.bz2";
locale = "ka";
arch = "linux-x86_64";
- sha256 = "8445a72ae12af5c11d56e0dc1d8bc3beb5c368386950b3815bc63c6b3ff48837";
+ sha256 = "e07636d63fc6b22ea1534022a7e1433da1a3ddc5a22dd0e9e2245f2a18d4bdd6";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/kab/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/kab/thunderbird-102.1.2.tar.bz2";
locale = "kab";
arch = "linux-x86_64";
- sha256 = "c403ad18c89ba13550484a4cf83afd0e28c6a11dead70f4a40ad81e136b5c4a7";
+ sha256 = "a0a087c5bbdc1acf2ab45ba164ce3a390cb40496b5c82a8821fff9e23641a193";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/kk/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/kk/thunderbird-102.1.2.tar.bz2";
locale = "kk";
arch = "linux-x86_64";
- sha256 = "924ddb7c862291732f58dd3e57b9a3b30e39eea24efc1a02a6226f580c6878ca";
+ sha256 = "97548dde66cc92df20e2f807e70d57a4a72b4a6f5ff18caecf26e218ac218ca5";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ko/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ko/thunderbird-102.1.2.tar.bz2";
locale = "ko";
arch = "linux-x86_64";
- sha256 = "7663f31cc759cf0115a75bba540f57f6c64905c63d204825a5fc63ad6e274edd";
+ sha256 = "bc51227d4f7bfd5c45b0234da669d8b6998c2cf109fe298e6edac65a34df5b02";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/lt/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/lt/thunderbird-102.1.2.tar.bz2";
locale = "lt";
arch = "linux-x86_64";
- sha256 = "039d08152f607f6a8190cdb306e37ec2434447c655e9a86a5703170a36116a4b";
+ sha256 = "438017e6f6f6dd71553a0248282dfe25922121af6c4b14fce45dd95defd3a519";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/lv/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/lv/thunderbird-102.1.2.tar.bz2";
locale = "lv";
arch = "linux-x86_64";
- sha256 = "0f40dbd570823d52abf7739024f1dda2a52303b02edf63939b6a544f15231252";
+ sha256 = "4e631147ed90b5eaf92f9c324f85620e59b22d96d4dba225567d13123393713e";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ms/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ms/thunderbird-102.1.2.tar.bz2";
locale = "ms";
arch = "linux-x86_64";
- sha256 = "6f8abab920d8755f94bbbaa151fa6400be664b7e6dedc57e7c94c0bb2dfc4752";
+ sha256 = "26046b38c260068dadb29d779a0a7a4a15fda0c5aba9ace9e078554d01f337e4";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/nb-NO/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/nb-NO/thunderbird-102.1.2.tar.bz2";
locale = "nb-NO";
arch = "linux-x86_64";
- sha256 = "4938fe75b54544ff7888c6db0a52b94ab4d71af15cfe429d6420ace100f47f0d";
+ sha256 = "933a7042a64c0f730aeef00449f4b05ef1f72bf031c31f3f4348c57f75243ff1";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/nl/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/nl/thunderbird-102.1.2.tar.bz2";
locale = "nl";
arch = "linux-x86_64";
- sha256 = "769484d34082d656720e92f737bc7b80c39685e74aefa3148e8988d54c3fb96e";
+ sha256 = "8a221cb6c2f308c8b1761e436ac69b3e4367afc5d0b0bafe8463a19605d23307";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/nn-NO/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/nn-NO/thunderbird-102.1.2.tar.bz2";
locale = "nn-NO";
arch = "linux-x86_64";
- sha256 = "2f6628897a9dda07bbf8f0d5df020b073b081ebb5d77942f23a38900b56f0cc5";
+ sha256 = "ab4182c6d11c0c4deb3ce09608e2c8ef771400562f3dceaa1c41e6592d376bf5";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/pa-IN/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/pa-IN/thunderbird-102.1.2.tar.bz2";
locale = "pa-IN";
arch = "linux-x86_64";
- sha256 = "d5381e984b7f180c743f1572ee156c9b23350eacf3cea6b005aa159022bcb5c5";
+ sha256 = "bb9a7c35ee2b73217a80c6a9fc05c9ddf41cedf04b4fe872c11959ee5e80e95c";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/pl/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/pl/thunderbird-102.1.2.tar.bz2";
locale = "pl";
arch = "linux-x86_64";
- sha256 = "2322ce9c3979e01d3bad6af964b1917293a654fa24e1ae70413194e93ebc4016";
+ sha256 = "aa705ada7e847104cfffc8e67cf2261b0c546a0fb6522aae8288cb0332ef480b";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/pt-BR/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/pt-BR/thunderbird-102.1.2.tar.bz2";
locale = "pt-BR";
arch = "linux-x86_64";
- sha256 = "c427e30ce35ae73c9f214aaccbd61880dc896f18619d85e81f166d068d01a107";
+ sha256 = "1871803eb0df4341aca0a5e49956fdaa5b8a180b1a9b5d4891a6b5145141f0fa";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/pt-PT/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/pt-PT/thunderbird-102.1.2.tar.bz2";
locale = "pt-PT";
arch = "linux-x86_64";
- sha256 = "8593bd34d6c87882d38cb521bd7e64e698565376bc50198a840f48516d2d1473";
+ sha256 = "dde614c584721d3d0ac34f022000691d9138777f5bf016b1f73b50eaec5297e6";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/rm/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/rm/thunderbird-102.1.2.tar.bz2";
locale = "rm";
arch = "linux-x86_64";
- sha256 = "8afd7611f7a3604fd1b720ca4fd8f91b46e43a905874d87ef1befaefcfb73c16";
+ sha256 = "748b3db1b3984cfaa6deb55ab14bae5001a43a44013a9f0533b20dfb0914a171";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ro/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ro/thunderbird-102.1.2.tar.bz2";
locale = "ro";
arch = "linux-x86_64";
- sha256 = "322faa61dc5524d84fadbd57df1cf6a12631c12b02af79807f6c0042c2d7906a";
+ sha256 = "9ac16bcebfb28ab3f0eeec7504c62b8965d25d0d199b4e2f371feed0daf71298";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/ru/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/ru/thunderbird-102.1.2.tar.bz2";
locale = "ru";
arch = "linux-x86_64";
- sha256 = "696b98e0a1309bb66355051a0dd507a323e16fd98425fe8fff9688625edd6669";
+ sha256 = "32db96e0aafba6a886e90c2adb89363aaf06b0a03abadca558cbd8c97051d41c";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/sk/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/sk/thunderbird-102.1.2.tar.bz2";
locale = "sk";
arch = "linux-x86_64";
- sha256 = "4370208682ced071070f798a5f3f024a6a154e12150435550ddb96334dd773de";
+ sha256 = "7a16cbfa0944c6592285d26a9a88ddd4f7d3100af139bfc079aced2252e6564d";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/sl/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/sl/thunderbird-102.1.2.tar.bz2";
locale = "sl";
arch = "linux-x86_64";
- sha256 = "c7b15cbd62fcc90503f16ca6cfccded4205cd2af058886f23435317b0f085425";
+ sha256 = "165468dc4a5a012e7d84d7cb5a83d0ebc907fe95581dc9faf838bfcdf7958f49";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/sq/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/sq/thunderbird-102.1.2.tar.bz2";
locale = "sq";
arch = "linux-x86_64";
- sha256 = "e5827847a7d987fdc0484bdc70110213b1d3a1ee4ba8e0b10bcebfc39c9f3e5a";
+ sha256 = "7ada316a5bad8752666d7497365863589a5693a6f9579a7978aafea69ab95be8";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/sr/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/sr/thunderbird-102.1.2.tar.bz2";
locale = "sr";
arch = "linux-x86_64";
- sha256 = "a17962cbf4cc6b302a7b06432fa9a5ba11e33505089619bb677293d6f3529832";
+ sha256 = "b7a3a141050b189051010a977bf85f27135f8ee10af0c70dcbe04780c7f05489";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/sv-SE/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/sv-SE/thunderbird-102.1.2.tar.bz2";
locale = "sv-SE";
arch = "linux-x86_64";
- sha256 = "bb11f3928321898f0c746dc988995bf853e102f753b91c602073c8357cfb1d00";
+ sha256 = "35b058a42ca3627f9695eb22d1c8d71ee72aa4bc3be2e072aa9561cded1d6686";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/th/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/th/thunderbird-102.1.2.tar.bz2";
locale = "th";
arch = "linux-x86_64";
- sha256 = "38696729272f4ca48d918767135e03a24226f86529d243482c729196d645f94b";
+ sha256 = "39cc0214918f882ed19b0986f500d7b24a29026b2651f35b798571460f3cf022";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/tr/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/tr/thunderbird-102.1.2.tar.bz2";
locale = "tr";
arch = "linux-x86_64";
- sha256 = "3857970887245300da2d764a2da99a64fcdd725ae9456dbe423a79483666cd93";
+ sha256 = "b8f2d411457ce94ee48f98725f996098f3868406ba82ecd4a9305a17e42aaccf";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/uk/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/uk/thunderbird-102.1.2.tar.bz2";
locale = "uk";
arch = "linux-x86_64";
- sha256 = "743b5f2b7e04af087acbf75ca47ea5ec9588530908a33c8e2025d1ee6d91b70e";
+ sha256 = "e41fb8cbe8da3f632992f4fd15e812b2e10e5ade070f3970446a213724b3736d";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/uz/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/uz/thunderbird-102.1.2.tar.bz2";
locale = "uz";
arch = "linux-x86_64";
- sha256 = "ab498aa09a784ca8f42ecae1cfb7ed6b54afbf7381fc3f32391cf160983fdbc6";
+ sha256 = "26fdadcb748baf1c699a23fc90caa9cb342cf93bc18b110c6efcce89b3eb555a";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/vi/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/vi/thunderbird-102.1.2.tar.bz2";
locale = "vi";
arch = "linux-x86_64";
- sha256 = "57d18f28b4ebe93093657aab133c58da1859ad8261fe5eb14f156a813c9feb53";
+ sha256 = "a91cf22c3592346599ede9495f51b0aac22823194f4ceb4d34b785dfd494d47d";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/zh-CN/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/zh-CN/thunderbird-102.1.2.tar.bz2";
locale = "zh-CN";
arch = "linux-x86_64";
- sha256 = "7922f00281084e18f3a27f661c14730de81b7df0ed3052374ad6ee1f93d15ed3";
+ sha256 = "db5c8a102bd3038105f032339a055c7f859ba64ed5f013aeaabae66a5f9b7c97";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-x86_64/zh-TW/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-x86_64/zh-TW/thunderbird-102.1.2.tar.bz2";
locale = "zh-TW";
arch = "linux-x86_64";
- sha256 = "c8119e17541bd649728d3fa4f725231ded11f37809048c5b20e8847b8c222ec5";
+ sha256 = "6eb7070f15f25eed3a4af81ac4d10444e9bf8fc16dcc20d1d0b2877ca508c3ad";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/af/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/af/thunderbird-102.1.2.tar.bz2";
locale = "af";
arch = "linux-i686";
- sha256 = "dd728dbb96d781c4ad0b2a01d67807d2b8235c7b77f652b4d226248f84f2bb92";
+ sha256 = "0389d59440492dba14c4600618da93b1d6164c2942b160398ef48d2d33ff6afe";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ar/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ar/thunderbird-102.1.2.tar.bz2";
locale = "ar";
arch = "linux-i686";
- sha256 = "68314d9ce2afc0a91578b7761df736b16d3016629ac191474a014e662bf4e419";
+ sha256 = "b1aa3d6f9bd3b124ebc81e4b7bd244e07267aa9fdb433a15cc55259678b65d59";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ast/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ast/thunderbird-102.1.2.tar.bz2";
locale = "ast";
arch = "linux-i686";
- sha256 = "e9e82165023f075e6380794487474856ef0420530f94f8c1c233d3112fcc2ca5";
+ sha256 = "39557a3ff8b1b9f334fb60ba0f21f652eb052e2ce52ca69132c256ab18f36484";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/be/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/be/thunderbird-102.1.2.tar.bz2";
locale = "be";
arch = "linux-i686";
- sha256 = "3722fc4b2a9f42104f4bb2267923320c392f817486c1dcfbe4a92c01764a900c";
+ sha256 = "c8ad677a9c20d462cca53030ef21708668fad7f6ca2432e48159cdc35b283416";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/bg/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/bg/thunderbird-102.1.2.tar.bz2";
locale = "bg";
arch = "linux-i686";
- sha256 = "719f8571d79cdef43abba3bd2e453d875652b9bde7b24ed987cbb83b313e8cf0";
+ sha256 = "248fb0b4259c9936d0ab7246d49749d79cac136843393cfb42fb8fb1e60a3c4d";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/br/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/br/thunderbird-102.1.2.tar.bz2";
locale = "br";
arch = "linux-i686";
- sha256 = "8195d158a2770707073ae0ed18bcf578ff061c052d593b4feb02e9f10facb6be";
+ sha256 = "4f7b9cb23ce763d4c80bbbfa55f37dc950c768620891a1540a4cd2c2add61120";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ca/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ca/thunderbird-102.1.2.tar.bz2";
locale = "ca";
arch = "linux-i686";
- sha256 = "f97b5247b38c00f2e6db3a2edd878de0059dec8a59b92663ea2d9f7175a4eb7e";
+ sha256 = "95335a5eca928b64cfd3b66bc3fd04c013300122ebd6120d53fffa5450544532";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/cak/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/cak/thunderbird-102.1.2.tar.bz2";
locale = "cak";
arch = "linux-i686";
- sha256 = "247f1be0ebac1033b519dadefb35c645c02c6352658a24e9b2864d449bc91ab3";
+ sha256 = "f70d912d44e5d86dc565ac1ea517178e1c02a054805a1fe2f46c0749bbc94327";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/cs/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/cs/thunderbird-102.1.2.tar.bz2";
locale = "cs";
arch = "linux-i686";
- sha256 = "39bec8757b777aeadf5e3803a1b8ca52bf8c62f906d792b1d47a68b67593162f";
+ sha256 = "27ca0c7c25ea1eddda5416a8e79e21f5c56d11c58d25f7716f8aa5e7628dc3fd";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/cy/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/cy/thunderbird-102.1.2.tar.bz2";
locale = "cy";
arch = "linux-i686";
- sha256 = "d9899c8f3b6c538828b559af3990d44bb93fa085539815f4c800bcd3f7f2029c";
+ sha256 = "24927b8410cef3c9ed234fe1ae4d264333e4d14577715580817117479d4039b5";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/da/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/da/thunderbird-102.1.2.tar.bz2";
locale = "da";
arch = "linux-i686";
- sha256 = "359ffd538a7f5f2870d8bd379f1538800defe296766a0cae57432e545f0ee49e";
+ sha256 = "bf34f47b5397ba7abaf8df61deea65a28f61d66dc91502d41fec5f8593fecc75";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/de/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/de/thunderbird-102.1.2.tar.bz2";
locale = "de";
arch = "linux-i686";
- sha256 = "1f372cd57db1e564d960c12dd34317747017d4255e2c5dc8f960d5075bf2a835";
+ sha256 = "372606ca06a8e86ec7d39f9da0d6943b1dac6389aa5223ceab572d7b17aef4e1";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/dsb/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/dsb/thunderbird-102.1.2.tar.bz2";
locale = "dsb";
arch = "linux-i686";
- sha256 = "fca6872c8bc3fd832ceb96b4cabe189fb4b679592fbf4fd4e27df514da917d4e";
+ sha256 = "b771a808ed13d2e21b4411e3e1b22e0a4159593cdf2e5eb7aad37a19b58892dc";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/el/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/el/thunderbird-102.1.2.tar.bz2";
locale = "el";
arch = "linux-i686";
- sha256 = "81ba36edd7ce98f44a86511fc7b03e030e2fc2ec1821640114a6546babc1b042";
+ sha256 = "da57fe1f356d9b26bf49289e4755e3faefa31f0719ff00f8af7e3b832bf59e4a";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/en-CA/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/en-CA/thunderbird-102.1.2.tar.bz2";
locale = "en-CA";
arch = "linux-i686";
- sha256 = "bf3ec87dd0842e92d0a759e8bad1eb5fbce8917277fabfd70b8366bfab9f011f";
+ sha256 = "a4abeea1e5477fcdbb2a5606610eefeb40fdd65e6e418042058e684b86b2c30e";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/en-GB/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/en-GB/thunderbird-102.1.2.tar.bz2";
locale = "en-GB";
arch = "linux-i686";
- sha256 = "9b1ac42adceab6ddc19bc432ae4568fe4008f0063c59b86871041a299890d9fe";
+ sha256 = "8ff8ca611dfdbd03b63eff740fa70c4fceeb292157af3718a79499b77d6954f7";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/en-US/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/en-US/thunderbird-102.1.2.tar.bz2";
locale = "en-US";
arch = "linux-i686";
- sha256 = "acd7b35b5d7d2e863a0a37a850b60d6ce91d156476ce1c7974256339000d86bb";
+ sha256 = "5eb0b8c567be77cd8231ebab5269acbac310c2d01cf6f810c5e321496884b94c";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/es-AR/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/es-AR/thunderbird-102.1.2.tar.bz2";
locale = "es-AR";
arch = "linux-i686";
- sha256 = "4b2715d15add631a1158e843108cbcc0eefce833ec42d7d35b4d856b473cb48f";
+ sha256 = "6e19e0ba0a54e175b5810a42a2f086a07be421dd6f6c227c60b870324042b2ca";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/es-ES/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/es-ES/thunderbird-102.1.2.tar.bz2";
locale = "es-ES";
arch = "linux-i686";
- sha256 = "6b3dcd54b1e948ee36a3e674c22e56356b66503bd40e149b9a24ea3116cf98e5";
+ sha256 = "a626601734b040c32a1e54309799a6d953719a38eec731c6ef23b09d544c282c";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/es-MX/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/es-MX/thunderbird-102.1.2.tar.bz2";
locale = "es-MX";
arch = "linux-i686";
- sha256 = "49fedc894cd933770536eea6359c31a01e47ad9e797274284bfaf3ea8de8ff15";
+ sha256 = "209a1a0b6d86301740846943ea62acd1781456210f3b5c3b9191017730a2dc72";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/et/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/et/thunderbird-102.1.2.tar.bz2";
locale = "et";
arch = "linux-i686";
- sha256 = "78d961730172ae310bc08139d0eff9471745900d85fd8a568c97d649bca1b354";
+ sha256 = "9e4bb92b59ab36e317e38986c42a3231c18761a9fe6c3cc3aba7e672fc8c4334";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/eu/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/eu/thunderbird-102.1.2.tar.bz2";
locale = "eu";
arch = "linux-i686";
- sha256 = "d8dbc084f38f86598cb1efe16a6c48634c57830318d9a9d1f5ac9ef7c63ef7ea";
+ sha256 = "68ed1a1137601c4f2f57e6afc146dc8700041b5c39931f1eb80b3c3807ab515e";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/fi/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/fi/thunderbird-102.1.2.tar.bz2";
locale = "fi";
arch = "linux-i686";
- sha256 = "71d303185d5ec95d607507bb9836a01940908e27c15117575280b13dcb5788c0";
+ sha256 = "71fbf151a51727cd43f56dda7039442246bd6faa98a45ccef5c8b8c040315064";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/fr/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/fr/thunderbird-102.1.2.tar.bz2";
locale = "fr";
arch = "linux-i686";
- sha256 = "55e158f1204517652d03e2b7d1600cee41f8c024db794f4676826f960440a6a4";
+ sha256 = "a2119c1e7e652d1f2423e62be999c70303fafe1498df31c74e9254f8f6b7a63d";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/fy-NL/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/fy-NL/thunderbird-102.1.2.tar.bz2";
locale = "fy-NL";
arch = "linux-i686";
- sha256 = "329d42fef604eba4f3b5d036ba5b9acf055673205dd30f8651c94f5c7684bbf6";
+ sha256 = "6dc49239f5e7abfbd460e35d79872edf264911ebede3bbaed30f36af9ba16400";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ga-IE/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ga-IE/thunderbird-102.1.2.tar.bz2";
locale = "ga-IE";
arch = "linux-i686";
- sha256 = "4c4d3de0d9db04caf2b46238c47c6b897f2d7fe52fe21cfa14d71568671dbf02";
+ sha256 = "e5faa22d057228ca0a982601469e2bb41a1782e61fac694b5ae458e74f84fe37";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/gd/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/gd/thunderbird-102.1.2.tar.bz2";
locale = "gd";
arch = "linux-i686";
- sha256 = "f14761057f6d1d6934e5e1cc55335a46f26a2382dc4708632665265331b4f08b";
+ sha256 = "ea99f37e3310978ae95bd04b2dbfa8f7e7f4f2f7dc41c72df662c3778c9941a5";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/gl/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/gl/thunderbird-102.1.2.tar.bz2";
locale = "gl";
arch = "linux-i686";
- sha256 = "2078e7499593799d76b2242f44c0097d5a1ec357da62802d5d1cce47732a75a3";
+ sha256 = "6bafaa93902648eb3964e0e1bbf6743fb4b4415e98e29b6f678ccfaf99a7120d";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/he/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/he/thunderbird-102.1.2.tar.bz2";
locale = "he";
arch = "linux-i686";
- sha256 = "2fa1c357cfb849d61562bca9146939eda36f0af909022dbd21029b3c47f683ae";
+ sha256 = "3f7abb2eadbb725b5e2e3a71863b0ac5a2f5b2747d4f207c1cf712ba36d1d9ed";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/hr/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/hr/thunderbird-102.1.2.tar.bz2";
locale = "hr";
arch = "linux-i686";
- sha256 = "c1b8fd464affaa87903856b9c959a09b120814d6887ce946db14e1f429a85304";
+ sha256 = "2dea47835e6b7b1c40148b449dceb993368558f9c8c40a9c5b4506a8409c9bb8";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/hsb/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/hsb/thunderbird-102.1.2.tar.bz2";
locale = "hsb";
arch = "linux-i686";
- sha256 = "db8ac9b2463293d8360cb04df2a5a7c92f4b8eee7f1e705ca3b2f19031ff2d4e";
+ sha256 = "d58fab220f516fbf1a4e219b9d1e64882a7b1fbd905bc07b9930815857eab991";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/hu/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/hu/thunderbird-102.1.2.tar.bz2";
locale = "hu";
arch = "linux-i686";
- sha256 = "3749911e71ef81a89a3009bf691c8a06abbc1ca537dedb68c785dca9f0257d4f";
+ sha256 = "40fd326287e681413b5631ffdfbbb07bae2aedd15d35f73c4dd0058fe622a315";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/hy-AM/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/hy-AM/thunderbird-102.1.2.tar.bz2";
locale = "hy-AM";
arch = "linux-i686";
- sha256 = "07988301e82d78494e478fd5f99a0639642364bf53f8cd9711ff643112cf25c2";
+ sha256 = "2e3976460f2e49805fef9e455eb24647bb0a9c77f4302b8e1f9e7caf0a4f69dd";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/id/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/id/thunderbird-102.1.2.tar.bz2";
locale = "id";
arch = "linux-i686";
- sha256 = "8af0ece3ba77f12ed9053ff9bcf311cebcf8159b34bded5df09748c2fbfb208a";
+ sha256 = "4d1782b347f631547902c4896eb809927e459e031cbadd69e561cec0d67f0be9";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/is/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/is/thunderbird-102.1.2.tar.bz2";
locale = "is";
arch = "linux-i686";
- sha256 = "663b1af1fb3977edcb5524769effd6a94da93860c9c7206c4b31aadb85e5c8bf";
+ sha256 = "948dbf54d7a325500ad93fcb2664fe2a198defda12cc46ed9df60658c1dee3ef";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/it/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/it/thunderbird-102.1.2.tar.bz2";
locale = "it";
arch = "linux-i686";
- sha256 = "83739d727628ef7b60c5732d41bb6c708d3adfa5fb2ccfbb0f1a62f4ac0317c5";
+ sha256 = "b8b56dbdeb2649473971d9b0dbfb759c615f300dda0484536083be1b9bfa0f9e";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ja/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ja/thunderbird-102.1.2.tar.bz2";
locale = "ja";
arch = "linux-i686";
- sha256 = "79d20840657d20afbe7d1dcf5e86d26ded6e72a52d41b4433dbd7c08e77a239b";
+ sha256 = "156f2aada12af105f8751ebd15c9fe0e55e7c590e899eec1c45560d6ae36af80";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ka/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ka/thunderbird-102.1.2.tar.bz2";
locale = "ka";
arch = "linux-i686";
- sha256 = "86b332459621f593e9f311b1b606e38923ad8862b4d0b6a35e113cda67ad4255";
+ sha256 = "2ef2f49658a117de9de1ac194b83efa3a3b2a30c64ddd6c9296f14c2618bc1ee";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/kab/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/kab/thunderbird-102.1.2.tar.bz2";
locale = "kab";
arch = "linux-i686";
- sha256 = "9e4def077f06509440bc78d7ac2b7573c0e2140944bb0761d55472cb1a5465c8";
+ sha256 = "95b14e777593530ba764cfcc8c60726b41637b49801fdd22e9fb3c07e2abd84f";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/kk/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/kk/thunderbird-102.1.2.tar.bz2";
locale = "kk";
arch = "linux-i686";
- sha256 = "39bc019264f03f7f8a25bb42242629af3c7971965b7a448f02f862e76087b7c4";
+ sha256 = "f032b6a3295b85512b68ab436b8b83dca63a3867a56a3623555720d2905bbfe8";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ko/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ko/thunderbird-102.1.2.tar.bz2";
locale = "ko";
arch = "linux-i686";
- sha256 = "183bb61c5e4ab7ee00b5da58bee26557e82c9a9ced39e276c8a5b3f5f7974c42";
+ sha256 = "3b75a679e817c1c4eee93e91c71ee329b0b8fc35dc4695bbeb1b6fa3f4cd71b2";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/lt/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/lt/thunderbird-102.1.2.tar.bz2";
locale = "lt";
arch = "linux-i686";
- sha256 = "da9177b28632516fecdfdb0561a9af8c502872f1f79ed552d3c7f948597ff55f";
+ sha256 = "00c5a79529e8daf343eb0334d1e9e5a7506c2ef6b2005a715e5305a3403b4b23";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/lv/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/lv/thunderbird-102.1.2.tar.bz2";
locale = "lv";
arch = "linux-i686";
- sha256 = "5a808bff2a272396c43ecb2353dde36a1ef7f2b6c871f00e94f20f787e0ff84b";
+ sha256 = "84fd3ae0a1acf4af8dd00edbf612bd1186130f757a6523f8f8da124eef2d47a5";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ms/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ms/thunderbird-102.1.2.tar.bz2";
locale = "ms";
arch = "linux-i686";
- sha256 = "e6b6ab180f723936c8a8a870359ffec20347d9fc58eb1b6406b76c7fa292ca1a";
+ sha256 = "3ca1fe79a9f8d9ae49ad2815c74133126d4b1b6e982903a6d2d4612f8e40c2e6";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/nb-NO/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/nb-NO/thunderbird-102.1.2.tar.bz2";
locale = "nb-NO";
arch = "linux-i686";
- sha256 = "bf21182e27be5dd930b2cb2dcd31ed0c1c4c14b0c09a34e1be7f62b6aef85800";
+ sha256 = "1f26868424c8ee51d45254b8fd6e9695de1223d2574e7e4de2037b2f4c34af62";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/nl/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/nl/thunderbird-102.1.2.tar.bz2";
locale = "nl";
arch = "linux-i686";
- sha256 = "431ac204db5cce7c76e5221df0754dbbca2c4eaaf131b7a144b2e325f2df8e5c";
+ sha256 = "953cf766dcc14ca591ae5633f8dfa07abe757e0dfdd5dc3ba8e2caba506b6cf8";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/nn-NO/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/nn-NO/thunderbird-102.1.2.tar.bz2";
locale = "nn-NO";
arch = "linux-i686";
- sha256 = "52b6f7f08ee856f631376e78ecb0ab52ac3b88faee03f4604459b5ac8a98e18b";
+ sha256 = "1098dbaf39d678db1a8267f23f4e3dcffcf56cf29a3626db54d2d99f4323a14b";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/pa-IN/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/pa-IN/thunderbird-102.1.2.tar.bz2";
locale = "pa-IN";
arch = "linux-i686";
- sha256 = "b1e5cbd3ac22af04a17920831d79c953311a9e1163cc4ca6e8aecaca89411152";
+ sha256 = "8932202b4c411b5be0cfd13cab442998ca1799d2912ac65c5ba758bc5fab3b77";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/pl/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/pl/thunderbird-102.1.2.tar.bz2";
locale = "pl";
arch = "linux-i686";
- sha256 = "0a15a79b2be773aab7e9b719ce0212168479e78ceb4771096f3fbad13ee202af";
+ sha256 = "9bcacb8f37e8470f0550c11fab8b4a45ae3086856ba7fcb64a4065f9d3af3a84";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/pt-BR/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/pt-BR/thunderbird-102.1.2.tar.bz2";
locale = "pt-BR";
arch = "linux-i686";
- sha256 = "ec994c42a39304861c0d5994826aa7baa2e5e07359fc192059a5f4a7e75232a0";
+ sha256 = "7d2614cd3210ff0d352143105c08ffe4d5f3763a22683ab0710fa836fa1a12ca";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/pt-PT/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/pt-PT/thunderbird-102.1.2.tar.bz2";
locale = "pt-PT";
arch = "linux-i686";
- sha256 = "efc3b02b4f1ad379568aab7bcda964ace0ca6b041197522ab5beaed2f349f16d";
+ sha256 = "39f0165269f56e70d61b07d993b1d9ea06cfc08275fbee1d44a95b809cd8e701";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/rm/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/rm/thunderbird-102.1.2.tar.bz2";
locale = "rm";
arch = "linux-i686";
- sha256 = "68e891c973d3f1c0d3e375bda27c4b3f1d778996dcad1377601cff5a93aef613";
+ sha256 = "649efb2f33afa27db7a9b330b903b7804b640bb5bd63133590354b832439c83b";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ro/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ro/thunderbird-102.1.2.tar.bz2";
locale = "ro";
arch = "linux-i686";
- sha256 = "7d60e055c73d0b121e5e772447f6eb7ec7b2858ef99f2a60d5b30a6ee593d04c";
+ sha256 = "2634b9c82e303be352fda72c386517216da92a6e39928221c681f80afee11c5a";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/ru/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/ru/thunderbird-102.1.2.tar.bz2";
locale = "ru";
arch = "linux-i686";
- sha256 = "8df485fdf589942e5e0110401fde31dc33af56fb0b1e0f972990cd25460651dc";
+ sha256 = "3f223227cca70e3142fdd2f537dbf9a7511ddc47ee821cf4e90c8238333a41b3";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/sk/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/sk/thunderbird-102.1.2.tar.bz2";
locale = "sk";
arch = "linux-i686";
- sha256 = "b699730217177e392d0e51024dd86c93bd5655702e0e7ac628c1af729480fd8b";
+ sha256 = "63209953a283c2dd5a41d647eebfecb5b5da51bcb380cfe8c57fbb58228829be";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/sl/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/sl/thunderbird-102.1.2.tar.bz2";
locale = "sl";
arch = "linux-i686";
- sha256 = "5cd62795e8c2195bff851e077ddd4ba0b6b725a562d1e4f95100f1e7cfb00d49";
+ sha256 = "ecfb2460e9c35f52f2dfe159791f576ad25611cfe028c492e30a3b385b998c68";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/sq/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/sq/thunderbird-102.1.2.tar.bz2";
locale = "sq";
arch = "linux-i686";
- sha256 = "2cbe949408ec382b91fc056935014f800d13b7cc4fcd19e5d5699a6252698545";
+ sha256 = "6d087ac410aeda35b9b595904e28c5300226bef19a9a36b522504ae8ea3cd6a7";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/sr/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/sr/thunderbird-102.1.2.tar.bz2";
locale = "sr";
arch = "linux-i686";
- sha256 = "264ee1a41398ff754b6b3b349b2728812bb0bf651aa39e3d1661b15e7f15ed02";
+ sha256 = "6bb2e8a43ab378432afc917a0d211867b9bb25965d257675e0f935a08c5381c7";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/sv-SE/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/sv-SE/thunderbird-102.1.2.tar.bz2";
locale = "sv-SE";
arch = "linux-i686";
- sha256 = "05393be6b938ecb9327078305910204554ef34c413f95bf8bfc0fa846fd5e8da";
+ sha256 = "fcf9245e837e0c2514358410a074e19023ba7158668eef857daa67f5059e8411";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/th/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/th/thunderbird-102.1.2.tar.bz2";
locale = "th";
arch = "linux-i686";
- sha256 = "9282291d0668dd7ac340dec6ec15cc2f53a08fa280823072c5aa285cab741f2d";
+ sha256 = "5c33365f0b774dafec6ab8d86e865ffc99144bb36b176ca4f2b0659913c76880";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/tr/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/tr/thunderbird-102.1.2.tar.bz2";
locale = "tr";
arch = "linux-i686";
- sha256 = "415759235885f38a83269100df2492b48be42095e855841d31cd1b4b0875c280";
+ sha256 = "7071b53d00d2c16140c3de4867ddc0f58f27ceb8bb68f7d6c3f942a4e072db45";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/uk/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/uk/thunderbird-102.1.2.tar.bz2";
locale = "uk";
arch = "linux-i686";
- sha256 = "480923d1f68028250ca5b7170c5391fe39152c4597ed307f1e232a2f6efaf1dc";
+ sha256 = "dc85e271eafa9bb26d266c3c6019177b68444b4705757c961895f130e222ddb3";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/uz/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/uz/thunderbird-102.1.2.tar.bz2";
locale = "uz";
arch = "linux-i686";
- sha256 = "fdb1d65960820ebe14e6a8698abd11583652cd74f3f9412e2ff5c38df0a5b212";
+ sha256 = "a1ffa39b4a480560949ca42efed831f87c03e63b6532193f288298277efd6b46";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/vi/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/vi/thunderbird-102.1.2.tar.bz2";
locale = "vi";
arch = "linux-i686";
- sha256 = "eb2bab16ff71881bbc6590ddd731ecbf9a1a19d5f499c9d023626da42e4ff3c6";
+ sha256 = "10414a1ad61baf1da9319826e8deb20ba79644ffb4e8de5d038d931f54b23f7a";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/zh-CN/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/zh-CN/thunderbird-102.1.2.tar.bz2";
locale = "zh-CN";
arch = "linux-i686";
- sha256 = "0047b3f174dcd19556bf1f6f1f4bfa5fc87a6cab53d7e4d111ad7f321ffec09c";
+ sha256 = "379f4b36b6ceb7b357e8d140c062b9855cd3471573e867e4173947bf087df948";
}
- { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.0.3/linux-i686/zh-TW/thunderbird-102.0.3.tar.bz2";
+ { url = "http://archive.mozilla.org/pub/thunderbird/releases/102.1.2/linux-i686/zh-TW/thunderbird-102.1.2.tar.bz2";
locale = "zh-TW";
arch = "linux-i686";
- sha256 = "cdee1981e868cb8df03681051c02ecf07936d1f5dcdee1c0f30d6c4742042b64";
+ sha256 = "edd3c26c9e5e76d388c1a4f2b20f23902d81c530fdfc2b183a0714bee53a6921";
}
];
}
diff --git a/pkgs/applications/networking/mailreaders/thunderbird/packages.nix b/pkgs/applications/networking/mailreaders/thunderbird/packages.nix
index de8327940313..c01839918531 100644
--- a/pkgs/applications/networking/mailreaders/thunderbird/packages.nix
+++ b/pkgs/applications/networking/mailreaders/thunderbird/packages.nix
@@ -39,13 +39,13 @@ rec {
};
thunderbird-102 = (buildMozillaMach rec {
pname = "thunderbird";
- version = "102.0.3";
+ version = "102.1.2";
application = "comm/mail";
applicationName = "Mozilla Thunderbird";
binaryName = pname;
src = fetchurl {
url = "mirror://mozilla/thunderbird/releases/${version}/source/thunderbird-${version}.source.tar.xz";
- sha512 = "ac9f22935ef558890c95cf7fbbbe32a5bb1b7140acb10088ed0d037d1ca5c6e11695c131eb40844807003b77e83b1dd2d9008df420ec394fed5008d5c4c6c3cb";
+ sha512 = "f5c6c77e932b30b43eaa6384b1dd1ab511d0ae8262cb51a5789f7c633235d5f8f343000d1cc1cae12e00a1d73571a814f98b0bf78681e00d7a51a34cfefdfdf1";
};
extraPatches = [
# The file to be patched is different from firefox's `no-buildconfig-ffx90.patch`.
diff --git a/pkgs/applications/networking/nextcloud-client/default.nix b/pkgs/applications/networking/nextcloud-client/default.nix
index ec2d717e359d..51b95a3f2a4d 100644
--- a/pkgs/applications/networking/nextcloud-client/default.nix
+++ b/pkgs/applications/networking/nextcloud-client/default.nix
@@ -79,7 +79,8 @@ mkDerivation rec {
"--prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ libsecret ]}"
# See also: https://bugreports.qt.io/browse/QTBUG-85967
"--set QML_DISABLE_DISK_CACHE 1"
- "--prefix PATH : ${lib.makeBinPath [ xdg-utils ]}"
+ # make xdg-open overrideable at runtime
+ "--suffix PATH : ${lib.makeBinPath [ xdg-utils ]}"
];
cmakeFlags = [
diff --git a/pkgs/applications/office/jabref/default.nix b/pkgs/applications/office/jabref/default.nix
index 78fe02e944e5..8d3fffb709b4 100644
--- a/pkgs/applications/office/jabref/default.nix
+++ b/pkgs/applications/office/jabref/default.nix
@@ -119,7 +119,7 @@ stdenv.mkDerivation rec {
unzip $out/lib/javafx-web-18-linux${lib.optionalString stdenv.isAarch64 "-aarch64"}.jar libjfxwebkit.so -d $out/lib/
wrapProgram $out/bin/JabRef \
- --prefix PATH : ${lib.makeBinPath [ xdg-utils ]} \
+ --suffix PATH : ${lib.makeBinPath [ xdg-utils ]} \
--set JAVA_HOME "${jdk}" \
--set JAVA_OPTS "-Djava.library.path=$out/lib/ --patch-module org.jabref=$out/share/java/jabref/resources/main"
diff --git a/pkgs/applications/office/mytetra/default.nix b/pkgs/applications/office/mytetra/default.nix
index 5ffd178b055d..166210704aa3 100644
--- a/pkgs/applications/office/mytetra/default.nix
+++ b/pkgs/applications/office/mytetra/default.nix
@@ -26,8 +26,9 @@ mkDerivation rec {
'';
postFixup = ''
+ # make xdg-open overrideable at runtime
wrapProgram $out/bin/mytetra \
- --prefix PATH : ${xdg-utils}/bin
+ --suffix PATH : ${xdg-utils}/bin
'';
meta = with lib; {
diff --git a/pkgs/applications/version-management/git-and-tools/git-open/default.nix b/pkgs/applications/version-management/git-and-tools/git-open/default.nix
index 5d12c93b0b35..2c57ca1f8401 100644
--- a/pkgs/applications/version-management/git-and-tools/git-open/default.nix
+++ b/pkgs/applications/version-management/git-and-tools/git-open/default.nix
@@ -26,7 +26,8 @@ stdenv.mkDerivation rec {
cp git-open $out/bin
installManPage git-open.1
wrapProgram $out/bin/git-open \
- --prefix PATH : "${lib.makeBinPath [ git xdg-utils gnugrep ]}"
+ --prefix PATH : "${lib.makeBinPath [ git gnugrep ]}" \
+ --suffix PATH : "${lib.makeBinPath [ xdg-utils ]}"
'';
meta = with lib; {
diff --git a/pkgs/applications/version-management/git-and-tools/lab/default.nix b/pkgs/applications/version-management/git-and-tools/lab/default.nix
index 913466375628..754fa778fed9 100644
--- a/pkgs/applications/version-management/git-and-tools/lab/default.nix
+++ b/pkgs/applications/version-management/git-and-tools/lab/default.nix
@@ -22,7 +22,10 @@ buildGoModule rec {
ldflags = [ "-s" "-w" "-X main.version=${version}" ];
postInstall = ''
- wrapProgram $out/bin/lab --prefix PATH ":" "${lib.makeBinPath [ git xdg-utils ]}";
+ # make xdg-open overrideable at runtime
+ wrapProgram $out/bin/lab \
+ --prefix PATH ":" "${lib.makeBinPath [ git ]}" \
+ --suffix PATH ":" "${lib.makeBinPath [ xdg-utils ]}"
installShellCompletion --cmd lab \
--bash <($out/bin/lab completion bash) \
--fish <($out/bin/lab completion fish) \
diff --git a/pkgs/applications/video/pipe-viewer/default.nix b/pkgs/applications/video/pipe-viewer/default.nix
index 1ef08870c86a..53ffa9bcdc4c 100644
--- a/pkgs/applications/video/pipe-viewer/default.nix
+++ b/pkgs/applications/video/pipe-viewer/default.nix
@@ -72,8 +72,10 @@ buildPerlModule rec {
wrapProgram "$out/bin/pipe-viewer" \
--prefix PATH : "${lib.makeBinPath [ ffmpeg wget youtube-dl yt-dlp ]}"
'' + lib.optionalString withGtk3 ''
+ # make xdg-open overrideable at runtime
wrapProgram "$out/bin/gtk-pipe-viewer" ''${gappsWrapperArgs[@]} \
- --prefix PATH : "${lib.makeBinPath [ ffmpeg wget xdg-utils youtube-dl yt-dlp ]}"
+ --prefix PATH : "${lib.makeBinPath [ ffmpeg wget youtube-dl yt-dlp ]}" \
+ --suffix PATH : "${lib.makeBinPath [ xdg-utils ]}"
'';
meta = with lib; {
diff --git a/pkgs/development/libraries/cgreen/default.nix b/pkgs/development/libraries/cgreen/default.nix
index f8790791798d..164a010669dc 100644
--- a/pkgs/development/libraries/cgreen/default.nix
+++ b/pkgs/development/libraries/cgreen/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "cgreen";
- version = "1.4.1";
+ version = "1.6.0";
src = fetchFromGitHub {
owner = "cgreen-devs";
repo = "cgreen";
rev = version;
- sha256 = "sha256-aQrfsiPuNrEMscZrOoONiN665KlNmnOiYj9ZIyzW304=";
+ sha256 = "sha256-BXch/V73a35Y6MqUlmR8mDp3ttwEAQTnqDC+ygLbIPY=";
};
postPatch = ''
diff --git a/pkgs/development/libraries/json-glib/default.nix b/pkgs/development/libraries/json-glib/default.nix
index 1f8f4fd1acc0..e095945dabaa 100644
--- a/pkgs/development/libraries/json-glib/default.nix
+++ b/pkgs/development/libraries/json-glib/default.nix
@@ -4,6 +4,7 @@
, glib
, meson
, ninja
+, nixosTests
, pkg-config
, gettext
, gobject-introspection
@@ -17,13 +18,18 @@ stdenv.mkDerivation rec {
pname = "json-glib";
version = "1.6.6";
- outputs = [ "out" "dev" "devdoc" ];
+ outputs = [ "out" "dev" "devdoc" "installedTests" ];
src = fetchurl {
url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
sha256 = "luyYvnqR9t3jNjZyDj2i/27LuQ52zKpJSX8xpoVaSQ4=";
};
+ patches = [
+ # Add option for changing installation path of installed tests.
+ ./meson-add-installed-tests-prefix-option.patch
+ ];
+
strictDeps = true;
depsBuildBuild = [
@@ -49,6 +55,9 @@ stdenv.mkDerivation rec {
glib
];
+ mesonFlags = [
+ "-Dinstalled_test_prefix=${placeholder "installedTests"}"
+ ];
# Run-time dependency gi-docgen found: NO (tried pkgconfig and cmake)
# it should be a build-time dep for build
@@ -73,6 +82,10 @@ stdenv.mkDerivation rec {
'';
passthru = {
+ tests = {
+ installedTests = nixosTests.installed-tests.json-glib;
+ };
+
updateScript = gnome.updateScript {
packageName = pname;
versionPolicy = "odd-unstable";
diff --git a/pkgs/development/libraries/json-glib/meson-add-installed-tests-prefix-option.patch b/pkgs/development/libraries/json-glib/meson-add-installed-tests-prefix-option.patch
new file mode 100644
index 000000000000..626db09cd03f
--- /dev/null
+++ b/pkgs/development/libraries/json-glib/meson-add-installed-tests-prefix-option.patch
@@ -0,0 +1,27 @@
+diff --git a/json-glib/tests/meson.build b/json-glib/tests/meson.build
+index 1eb56c8..dca444e 100644
+--- a/json-glib/tests/meson.build
++++ b/json-glib/tests/meson.build
+@@ -21,8 +21,9 @@ test_data = [
+ 'stream-load.json',
+ ]
+
+-installed_test_bindir = join_paths(json_libexecdir, 'installed-tests', json_api_name)
+-installed_test_datadir = join_paths(json_datadir, 'installed-tests', json_api_name)
++installed_test_prefix = get_option('installed_test_prefix')
++installed_test_bindir = join_paths(installed_test_prefix, 'libexec', 'installed-tests', json_api_name)
++installed_test_datadir = join_paths(installed_test_prefix, 'share', 'installed-tests', json_api_name)
+
+ install_data(test_data, install_dir: installed_test_bindir)
+
+diff --git a/meson_options.txt b/meson_options.txt
+index 068a03f..03f398a 100644
+--- a/meson_options.txt
++++ b/meson_options.txt
+@@ -10,3 +10,6 @@ option('man',
+ option('tests',
+ type: 'boolean', value: true,
+ description: 'Build the tests')
++option('installed_test_prefix',
++ description: 'Prefix for installed tests',
++ type: 'string')
diff --git a/pkgs/development/python-modules/fastapi-mail/default.nix b/pkgs/development/python-modules/fastapi-mail/default.nix
index 973c810b6347..f7e63bbd32eb 100644
--- a/pkgs/development/python-modules/fastapi-mail/default.nix
+++ b/pkgs/development/python-modules/fastapi-mail/default.nix
@@ -19,7 +19,7 @@
buildPythonPackage rec {
pname = "fastapi-mail";
- version = "1.0.9";
+ version = "1.1.4";
format = "pyproject";
disabled = pythonOlder "3.7";
@@ -28,7 +28,7 @@ buildPythonPackage rec {
owner = "sabuhish";
repo = pname;
rev = "refs/tags/${version}";
- hash = "sha256-2Nb+FzmhsKvauT/yOCLHCEld8r+6niu9kV6EmjhC6S0=";
+ hash = "sha256-eQVDPkoRWlzCLwsOh+ksYniRyg02fhda6ys5QMqeLM0=";
};
postPatch = ''
diff --git a/pkgs/development/python-modules/pep8-naming/default.nix b/pkgs/development/python-modules/pep8-naming/default.nix
index 248961d7f040..7e9642a2bc28 100644
--- a/pkgs/development/python-modules/pep8-naming/default.nix
+++ b/pkgs/development/python-modules/pep8-naming/default.nix
@@ -1,6 +1,7 @@
{ lib
-, fetchPypi
, buildPythonPackage
+, fetchFromGitHub
+, fetchpatch
, flake8
, python
}:
@@ -9,11 +10,22 @@ buildPythonPackage rec {
pname = "pep8-naming";
version = "0.13.1";
- src = fetchPypi {
- inherit pname version;
- sha256 = "sha256-Ovd82qnHll98haVs1Xk1RVPJu9P98weKd28S21TdaUQ=";
+ src = fetchFromGitHub {
+ owner = "PyCQA";
+ repo = pname;
+ rev = version;
+ sha256 = "sha256-NG4hLZcOMKprUyMnzkHRmUCFGyYgvT6ydBQNpgWE9h0=";
};
+ patches = [
+ # Fixes tests for flake8 => 5
+ # Remove on next release
+ (fetchpatch {
+ url = "https://github.com/PyCQA/pep8-naming/commit/c8808a0907f64b5d081cff8d3f9443e5ced1474e.patch";
+ sha256 = "sha256-4c+a0viS0rXuxj+TuIfgrKZjnrjiJjDoYBbNp3+6Ed0=";
+ })
+ ];
+
propagatedBuildInputs = [
flake8
];
diff --git a/pkgs/development/python-modules/pyviz-comms/default.nix b/pkgs/development/python-modules/pyviz-comms/default.nix
index 29b4d88fe73b..aabf04744af7 100644
--- a/pkgs/development/python-modules/pyviz-comms/default.nix
+++ b/pkgs/development/python-modules/pyviz-comms/default.nix
@@ -7,11 +7,11 @@
buildPythonPackage rec {
pname = "pyviz_comms";
- version = "2.2.0";
+ version = "2.2.1";
src = fetchPypi {
inherit pname version;
- sha256 = "sha256-uMncveAfOEeEP7TQTDs/TeeEkgxx5Eztnfu1YPbJIhg=";
+ sha256 = "sha256-omFFuM5D0tk0s8aCbXe5E84QXFKOsuSUyJCz41Jd3zM=";
};
propagatedBuildInputs = [ param ];
diff --git a/pkgs/development/python-modules/sentinel/default.nix b/pkgs/development/python-modules/sentinel/default.nix
index 0fd10294bbe9..048b4d37151c 100644
--- a/pkgs/development/python-modules/sentinel/default.nix
+++ b/pkgs/development/python-modules/sentinel/default.nix
@@ -2,11 +2,11 @@
buildPythonPackage rec {
pname = "sentinel";
- version = "0.3.0";
+ version = "1.0.0";
src = fetchPypi {
inherit pname version;
- sha256 = "f28143aa4716dbc8f6193f5682176a3c33cd26aaae05d9ecf66c186a9887cc2d";
+ sha256 = "sha256-GQko+ZUa9ulKH4Tu/K7XkcKAl90VK4jpiJBr4wBFH9I=";
};
meta = with lib; {
diff --git a/pkgs/development/python-modules/uamqp/default.nix b/pkgs/development/python-modules/uamqp/default.nix
index 261e50b9afab..1a087c10d8f1 100644
--- a/pkgs/development/python-modules/uamqp/default.nix
+++ b/pkgs/development/python-modules/uamqp/default.nix
@@ -9,6 +9,7 @@
, fetchpatch
, fetchPypi
, isPy3k
+, libcxxabi
, openssl
, Security
, six
@@ -58,6 +59,10 @@ buildPythonPackage rec {
enum34
];
+ LDFLAGS = lib.optionals stdenv.isDarwin [
+ "-L${lib.getLib libcxxabi}/lib"
+ ];
+
dontUseCmakeConfigure = true;
# Project has no tests
diff --git a/pkgs/development/tools/analysis/pmd/default.nix b/pkgs/development/tools/analysis/pmd/default.nix
index 25259ae64cd3..c0adbad33e8a 100644
--- a/pkgs/development/tools/analysis/pmd/default.nix
+++ b/pkgs/development/tools/analysis/pmd/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "pmd";
- version = "6.47.0";
+ version = "6.48.0";
src = fetchurl {
url = "https://github.com/pmd/pmd/releases/download/pmd_releases/${version}/pmd-bin-${version}.zip";
- hash = "sha256-0rOV6l5VCdBkk5+F/k2vYtHQWzwugvp3ogaTRuXUKXE=";
+ hash = "sha256-DXoiV5AunDGagfq8BWHFcgGBv9OdGij5DDuxOKJYnE4=";
};
nativeBuildInputs = [ unzip makeWrapper ];
diff --git a/pkgs/development/tools/analysis/tfsec/default.nix b/pkgs/development/tools/analysis/tfsec/default.nix
index c807cdeac0d3..a79fdf039aa7 100644
--- a/pkgs/development/tools/analysis/tfsec/default.nix
+++ b/pkgs/development/tools/analysis/tfsec/default.nix
@@ -5,13 +5,13 @@
buildGoModule rec {
pname = "tfsec";
- version = "1.27.1";
+ version = "1.27.2";
src = fetchFromGitHub {
owner = "aquasecurity";
repo = pname;
rev = "v${version}";
- hash = "sha256-9RMSSgpYAmQgIAy4pJRk3tKwx+unaFmSNgXdKK3HYTU=";
+ hash = "sha256-SFh8LHHEdyjPmQDWcDIH/zfGvJanHcuOfVAjTFBwnoY=";
};
ldflags = [
@@ -22,7 +22,7 @@ buildGoModule rec {
# "-extldflags '-fno-PIC -static'"
];
- vendorSha256 = "sha256-o3TGEsYtd7RVGcw7guhqpbKMFkiRBpvCFUeIhnKKIeQ=";
+ vendorSha256 = "sha256-Z1UIE2sqIoF74uSy6sIUubpvdWdDa04gZB5gDOYJzHk=";
subPackages = [
"cmd/tfsec"
diff --git a/pkgs/development/tools/build-managers/gnumake/default.nix b/pkgs/development/tools/build-managers/gnumake/default.nix
index 7c4b0ad4650e..7a6b78ec084b 100644
--- a/pkgs/development/tools/build-managers/gnumake/default.nix
+++ b/pkgs/development/tools/build-managers/gnumake/default.nix
@@ -1,4 +1,16 @@
-{ lib, stdenv, fetchurl, guileSupport ? false, pkg-config, guile }:
+{ lib
+, stdenv
+, fetchurl
+, guileSupport ? false, guile
+# avoid guile depend on bootstrap to prevent dependency cycles
+, inBootstrap ? false
+, pkg-config
+, gnumake
+}:
+
+let
+ guileEnabled = guileSupport && !inBootstrap;
+in
stdenv.mkDerivation rec {
pname = "gnumake";
@@ -19,10 +31,10 @@ stdenv.mkDerivation rec {
./0002-remove-impure-dirs.patch
];
- nativeBuildInputs = lib.optionals guileSupport [ pkg-config ];
- buildInputs = lib.optionals guileSupport [ guile ];
+ nativeBuildInputs = lib.optionals guileEnabled [ pkg-config ];
+ buildInputs = lib.optionals guileEnabled [ guile ];
- configureFlags = lib.optional guileSupport "--with-guile"
+ configureFlags = lib.optional guileEnabled "--with-guile"
# Make uses this test to decide whether it should keep track of
# subseconds. Apple made this possible with APFS and macOS 10.13.
@@ -36,6 +48,11 @@ stdenv.mkDerivation rec {
outputs = [ "out" "man" "info" ];
separateDebugInfo = true;
+ passthru.tests = {
+ # make sure that the override doesn't break bootstrapping
+ gnumakeWithGuile = gnumake.override { guileSupport = true; };
+ };
+
meta = with lib; {
description = "A tool to control the generation of non-source files from sources";
longDescription = ''
diff --git a/pkgs/development/tools/godot/default.nix b/pkgs/development/tools/godot/default.nix
index 1bf38bbacf36..dcf7a6219c44 100644
--- a/pkgs/development/tools/godot/default.nix
+++ b/pkgs/development/tools/godot/default.nix
@@ -16,6 +16,8 @@
, freetype
, openssl
, alsa-lib
+, alsa-plugins
+, makeWrapper
, libGLU
, zlib
, yasm
@@ -31,16 +33,16 @@ let
in
stdenv.mkDerivation rec {
pname = "godot";
- version = "3.4.4";
+ version = "3.5";
src = fetchFromGitHub {
owner = "godotengine";
repo = "godot";
rev = "${version}-stable";
- sha256 = "sha256-3AESLzqozi7Fc80u8Ml3ergZMkIhHy4tNlRe/3FsE6k=";
+ sha256 = "sha256-aU5cTiz7OaM0fsv0EzJDUA1Es+Ei63CKLE6GVspJexc=";
};
- nativeBuildInputs = [ pkg-config ];
+ nativeBuildInputs = [ pkg-config makeWrapper ];
buildInputs = [
scons
udev
@@ -91,6 +93,9 @@ stdenv.mkDerivation rec {
cp icon.png "$out/share/icons/godot.png"
substituteInPlace "$out/share/applications/org.godotengine.Godot.desktop" \
--replace "Exec=godot" "Exec=$out/bin/godot"
+
+ makeWrapper $out/bin/godot $out/bin/godot \
+ --set ALSA_PLUGIN_DIR ${alsa-plugins}/lib/alsa-lib
'';
meta = with lib; {
diff --git a/pkgs/development/tools/godot/pkg_config_additions.patch b/pkgs/development/tools/godot/pkg_config_additions.patch
index f5ab667f1808..23506a604a9e 100644
--- a/pkgs/development/tools/godot/pkg_config_additions.patch
+++ b/pkgs/development/tools/godot/pkg_config_additions.patch
@@ -1,32 +1,33 @@
diff --git a/platform/x11/detect.py b/platform/x11/detect.py
-index 91652aad55..d12389f9f2 100644
+index 98c9ddb..0cc2bff 100644
--- a/platform/x11/detect.py
+++ b/platform/x11/detect.py
-@@ -218,6 +218,11 @@ def configure(env):
+@@ -255,6 +255,10 @@ def configure(env):
env.ParseConfig("pkg-config xrender --cflags --libs")
env.ParseConfig("pkg-config xi --cflags --libs")
-
-+ env.ParseConfig("pkg-config xext --cflags --libs")
+
+ env.ParseConfig("pkg-config xfixes --cflags --libs")
+ env.ParseConfig("pkg-config glu --cflags --libs")
+ env.ParseConfig("pkg-config zlib --cflags --libs")
+
if env["touch"]:
env.Append(CPPDEFINES=["TOUCH_ENABLED"])
-
-@@ -323,6 +328,7 @@ def configure(env):
- print("Enabling ALSA")
+
+@@ -359,7 +363,7 @@ def configure(env):
+ if os.system("pkg-config --exists alsa") == 0: # 0 means found
env["alsa"] = True
env.Append(CPPDEFINES=["ALSA_ENABLED", "ALSAMIDI_ENABLED"])
+- env.ParseConfig("pkg-config alsa --cflags") # Only cflags, we dlopen the library.
+ env.ParseConfig("pkg-config alsa --cflags --libs")
else:
- print("ALSA libraries not found, disabling driver")
-
-@@ -340,6 +346,7 @@ def configure(env):
+ print("Warning: ALSA libraries not found. Disabling the ALSA audio driver.")
+
+@@ -375,7 +379,7 @@ def configure(env):
+ if env["udev"]:
if os.system("pkg-config --exists libudev") == 0: # 0 means found
- print("Enabling udev support")
env.Append(CPPDEFINES=["UDEV_ENABLED"])
+- env.ParseConfig("pkg-config libudev --cflags") # Only cflags, we dlopen the library.
+ env.ParseConfig("pkg-config libudev --cflags --libs")
else:
- print("libudev development libraries not found, disabling udev support")
+ print("Warning: libudev development libraries not found. Disabling controller hotplugging support.")
else:
diff --git a/pkgs/games/enigma/default.nix b/pkgs/games/enigma/default.nix
index 247d7b9dee19..c9f16918b490 100644
--- a/pkgs/games/enigma/default.nix
+++ b/pkgs/games/enigma/default.nix
@@ -31,7 +31,8 @@ stdenv.mkDerivation rec {
postInstall = ''
rm -r $out/include
- wrapProgram $out/bin/enigma --prefix PATH : "${lib.makeBinPath [ xdg-utils ]}"
+ # make xdg-open overrideable at runtime
+ wrapProgram $out/bin/enigma --suffix PATH : "${lib.makeBinPath [ xdg-utils ]}"
'';
meta = with lib; {
diff --git a/pkgs/games/grapejuice/default.nix b/pkgs/games/grapejuice/default.nix
index 23e245149ad7..24835f604ae3 100644
--- a/pkgs/games/grapejuice/default.nix
+++ b/pkgs/games/grapejuice/default.nix
@@ -56,7 +56,9 @@ python3Packages.buildPythonApplication rec {
makeWrapperArgs = [
"\${gappsWrapperArgs[@]}"
- "--prefix PATH : ${lib.makeBinPath [ xdg-user-dirs xdg-utils wine winetricks pciutils glxinfo ]}"
+ "--prefix PATH : ${lib.makeBinPath [ xdg-user-dirs wine winetricks pciutils glxinfo ]}"
+ # make xdg-open overrideable at runtime
+ "--suffix PATH : ${lib.makeBinPath [ xdg-utils ]}"
];
postPatch = ''
diff --git a/pkgs/os-specific/linux/kernel/zen-kernels.nix b/pkgs/os-specific/linux/kernel/zen-kernels.nix
index 58a71edf6fa9..568183114829 100644
--- a/pkgs/os-specific/linux/kernel/zen-kernels.nix
+++ b/pkgs/os-specific/linux/kernel/zen-kernels.nix
@@ -4,16 +4,16 @@ let
# comments with variant added for update script
# ./update-zen.py zen
zenVariant = {
- version = "5.19.1"; #zen
+ version = "5.19.2"; #zen
suffix = "zen1"; #zen
- sha256 = "1b906fa4hk56y5g1hx50kp395fakrphna4nnvy98vs8cxpcfyqi7"; #zen
+ sha256 = "0n21karcw9f861h26jxh29yiyg67kcxja7wh1xpdgx957avazacp"; #zen
isLqx = false;
};
# ./update-zen.py lqx
lqxVariant = {
- version = "5.18.17"; #lqx
+ version = "5.19.2"; #lqx
suffix = "lqx1"; #lqx
- sha256 = "1cf4ix9xx1yi781xsrkaxn673mzi98dxlccsfvky78gjchmc8d6p"; #lqx
+ sha256 = "00rssb305yxv085jhy642m8iyrbz5lvi4ynkc8vqr83y9w6ilf8y"; #lqx
isLqx = true;
};
zenKernelsFor = { version, suffix, sha256, isLqx }: buildLinux (args // {
diff --git a/pkgs/os-specific/linux/rtl8814au/default.nix b/pkgs/os-specific/linux/rtl8814au/default.nix
index cab36054f516..5e4b764431f4 100644
--- a/pkgs/os-specific/linux/rtl8814au/default.nix
+++ b/pkgs/os-specific/linux/rtl8814au/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation {
pname = "rtl8814au";
- version = "${kernel.version}-unstable-2022-05-23";
+ version = "${kernel.version}-unstable-2022-08-18";
src = fetchFromGitHub {
owner = "morrownr";
repo = "8814au";
- rev = "687f05c73e22dc14d5f24f2bb92f2ecac3cc71d5";
- sha256 = "08znnihk9rdrwgyzazxqcrzwdjnm5q8ah92bfb552wjv11r87zv1";
+ rev = "752d8ea365b2affc5d356e35659600995508849d";
+ hash = "sha256-m79IVoD3xFigmax13qELx5e3v0NfJSwmmC0PatA91HI=";
};
nativeBuildInputs = kernel.moduleBuildDependencies;
diff --git a/pkgs/os-specific/linux/rtl88x2bu/default.nix b/pkgs/os-specific/linux/rtl88x2bu/default.nix
index cd13c48779ea..adc11f17272a 100644
--- a/pkgs/os-specific/linux/rtl88x2bu/default.nix
+++ b/pkgs/os-specific/linux/rtl88x2bu/default.nix
@@ -2,13 +2,13 @@
stdenv.mkDerivation rec {
pname = "rtl88x2bu";
- version = "${kernel.version}-unstable-2022-05-23";
+ version = "${kernel.version}-unstable-2022-08-18";
src = fetchFromGitHub {
owner = "morrownr";
repo = "88x2bu-20210702";
- rev = "3fbe980a9a8cee223e4671449128212cf7514b3c";
- sha256 = "1p4bp8g94ny385nl3m2ca824dbm6lhjvh7s5rqyzk220il2sa0nd";
+ rev = "6dda660a6af1b18654bbbbedd933cdf30683b7a1";
+ sha256 = "sha256-o+SLc8EQA3DHYdZQToyoZS0TFkuVEnFStQQUOCFPYXI=";
};
hardeningDisable = [ "pic" ];
diff --git a/pkgs/servers/grocy/default.nix b/pkgs/servers/grocy/default.nix
index 059f325adaa2..99b502c13d4f 100644
--- a/pkgs/servers/grocy/default.nix
+++ b/pkgs/servers/grocy/default.nix
@@ -2,11 +2,11 @@
stdenv.mkDerivation rec {
pname = "grocy";
- version = "3.3.0";
+ version = "3.3.1";
src = fetchurl {
url = "https://github.com/grocy/grocy/releases/download/v${version}/grocy_${version}.zip";
- sha256 = "sha256-y0l0V+cTIfZYtyV8l6kdFW9UzJWb7eQMEocaPo7TLbg=";
+ sha256 = "sha256-XqjYDha9wwfITEDRZsnH/ig+9q1/SfKIwQYg1svUaXM=";
};
nativeBuildInputs = [ unzip ];
diff --git a/pkgs/servers/teleport/default.nix b/pkgs/servers/teleport/default.nix
index 8273e810a221..a7a9b5c8fe51 100644
--- a/pkgs/servers/teleport/default.nix
+++ b/pkgs/servers/teleport/default.nix
@@ -119,8 +119,9 @@ buildGoModule rec {
postInstall = ''
install -Dm755 -t $client/bin $out/bin/tsh
- wrapProgram $client/bin/tsh --prefix PATH : ${lib.makeBinPath [ xdg-utils ]}
- wrapProgram $out/bin/tsh --prefix PATH : ${lib.makeBinPath [ xdg-utils ]}
+ # make xdg-open overrideable at runtime
+ wrapProgram $client/bin/tsh --suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
+ wrapProgram $out/bin/tsh --suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
'';
doInstallCheck = true;
diff --git a/pkgs/stdenv/linux/default.nix b/pkgs/stdenv/linux/default.nix
index 7c0209b33aed..6e61b6f12be1 100644
--- a/pkgs/stdenv/linux/default.nix
+++ b/pkgs/stdenv/linux/default.nix
@@ -356,6 +356,10 @@ in
# stage5.gcc -> stage4.coreutils -> stage3.glibc -> bootstrap
gmp = lib.makeOverridable (super.gmp.override { stdenv = self.stdenv; }).overrideAttrs (a: { pname = "${a.pname}-stage4"; });
+ # To allow users' overrides inhibit dependencies too heavy for
+ # bootstrap, like guile: https://github.com/NixOS/nixpkgs/issues/181188
+ gnumake = super.gnumake.override { inBootstrap = true; };
+
gcc = lib.makeOverridable (import ../../build-support/cc-wrapper) {
nativeTools = false;
nativeLibc = false;
@@ -446,7 +450,7 @@ in
overrides = self: super: {
inherit (prevStage)
gzip bzip2 xz bash coreutils diffutils findutils gawk
- gnumake gnused gnutar gnugrep gnupatch patchelf
+ gnused gnutar gnugrep gnupatch patchelf
attr acl zlib pcre libunistring;
${localSystem.libc} = getLibc prevStage;
@@ -457,6 +461,7 @@ in
inherit (self) stdenv runCommandLocal patchelf libunistring;
};
+ gnumake = super.gnumake.override { inBootstrap = false; };
} // lib.optionalAttrs (super.stdenv.targetPlatform == localSystem) {
# Need to get rid of these when cross-compiling.
inherit (prevStage) binutils binutils-unwrapped;
diff --git a/pkgs/stdenv/linux/make-bootstrap-tools.nix b/pkgs/stdenv/linux/make-bootstrap-tools.nix
index b2d04c8667d5..c6112766781e 100644
--- a/pkgs/stdenv/linux/make-bootstrap-tools.nix
+++ b/pkgs/stdenv/linux/make-bootstrap-tools.nix
@@ -152,7 +152,6 @@ in with pkgs; rec {
cp -d ${mpfr.out}/lib/libmpfr*.so* $out/lib
cp -d ${libmpc.out}/lib/libmpc*.so* $out/lib
cp -d ${zlib.out}/lib/libz.so* $out/lib
- cp -d ${libelf}/lib/libelf.so* $out/lib
'' + lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) ''
# These needed for cross but not native tools because the stdenv
diff --git a/pkgs/tools/admin/aws-sso-cli/default.nix b/pkgs/tools/admin/aws-sso-cli/default.nix
index e248244204e7..f658597e8a7b 100644
--- a/pkgs/tools/admin/aws-sso-cli/default.nix
+++ b/pkgs/tools/admin/aws-sso-cli/default.nix
@@ -21,7 +21,7 @@ buildGoModule rec {
postInstall = ''
mv $out/bin/cmd $out/bin/aws-sso
wrapProgram $out/bin/aws-sso \
- --prefix PATH : ${lib.makeBinPath [ xdg-utils ]}
+ --suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
'';
meta = with lib; {
diff --git a/pkgs/tools/admin/aws-vault/default.nix b/pkgs/tools/admin/aws-vault/default.nix
index f861a22d8123..beaa3ccd9624 100644
--- a/pkgs/tools/admin/aws-vault/default.nix
+++ b/pkgs/tools/admin/aws-vault/default.nix
@@ -21,7 +21,8 @@ buildGoModule rec {
nativeBuildInputs = [ installShellFiles makeWrapper ];
postInstall = ''
- wrapProgram $out/bin/aws-vault --prefix PATH : ${lib.makeBinPath [ xdg-utils ]}
+ # make xdg-open overrideable at runtime
+ wrapProgram $out/bin/aws-vault --suffix PATH : ${lib.makeBinPath [ xdg-utils ]}
installShellCompletion --cmd aws-vault \
--bash $src/contrib/completions/bash/aws-vault.bash \
--fish $src/contrib/completions/fish/aws-vault.fish \
diff --git a/pkgs/tools/bluetooth/blueman/default.nix b/pkgs/tools/bluetooth/blueman/default.nix
index 45f5e5ce0b60..1aa668d86f4d 100644
--- a/pkgs/tools/bluetooth/blueman/default.nix
+++ b/pkgs/tools/bluetooth/blueman/default.nix
@@ -5,7 +5,6 @@
let
pythonPackages = python3Packages;
- binPath = lib.makeBinPath [ xdg-utils dnsmasq dhcp iproute2 ];
in stdenv.mkDerivation rec {
pname = "blueman";
@@ -41,8 +40,12 @@ in stdenv.mkDerivation rec {
(lib.enableFeature withPulseAudio "pulseaudio")
];
+ makeWrapperArgs = [
+ "--prefix PATH ':' ${lib.makeBinPath [ dnsmasq dhcp iproute2 ]}"
+ "--suffix PATH ':' ${lib.makeBinPath [ xdg-utils ]}"
+ ];
+
postFixup = ''
- makeWrapperArgs="--prefix PATH ':' ${binPath}"
# This mimics ../../../development/interpreters/python/wrap.sh
wrapPythonProgramsIn "$out/bin" "$out $pythonPath"
wrapPythonProgramsIn "$out/libexec" "$out $pythonPath"
diff --git a/pkgs/tools/misc/writedisk/default.nix b/pkgs/tools/misc/writedisk/default.nix
index 34f4581ba09d..5fb958f3f0ef 100644
--- a/pkgs/tools/misc/writedisk/default.nix
+++ b/pkgs/tools/misc/writedisk/default.nix
@@ -7,15 +7,15 @@
rustPlatform.buildRustPackage rec {
pname = "writedisk";
- version = "1.2.0";
+ version = "1.3.0";
src = fetchCrate {
inherit version;
pname = "writedisk";
- sha256 = "sha256-f5+Qw9Agepx2wIUmsAA2M9g/ajbFjjLR5RPPtQncRKU=";
+ sha256 = "sha256-MZFnNb8rJMu/nlH8rfnD//bhqPSkhyXucbTrwsRM9OY=";
};
- cargoSha256 = "sha256-SMAhh7na+XQyVtbfzsBGOCdBRLP58JL1fPSBVKFkhdc=";
+ cargoSha256 = "sha256-DGroBBozAViibbIYbtqH2SxIGLqdtyJ9XKyz7O1L05g=";
nativeBuildInputs = [ pkg-config ];
diff --git a/pkgs/tools/networking/ghz/default.nix b/pkgs/tools/networking/ghz/default.nix
new file mode 100644
index 000000000000..ddbb33ceceed
--- /dev/null
+++ b/pkgs/tools/networking/ghz/default.nix
@@ -0,0 +1,26 @@
+{ lib, buildGoModule, fetchFromGitHub }:
+
+buildGoModule rec {
+ pname = "ghz";
+ version = "0.109.0";
+
+ src = fetchFromGitHub {
+ owner = "bojand";
+ repo = "ghz";
+ rev = "v${version}";
+ sha256 = "sha256-5l2PeN+VxTaORAkmAfI9TCGd4W6y8BFs/eY4T9nYJuc=";
+ };
+
+ vendorSha256 = "sha256-qZD+qxjjFgyQDtjOQcilS4w2sS9I+7iCK2/ThaAJTy4=";
+
+ subPackages = [ "cmd/ghz" "cmd/ghz-web" ];
+
+ ldflags = [ "-s" "-w" ];
+
+ meta = with lib; {
+ description = "Simple gRPC benchmarking and load testing tool";
+ homepage = "https://ghz.sh";
+ license = licenses.asl20;
+ maintainers = [ maintainers.zombiezen ];
+ };
+}
diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix
index f8360461dacf..cd328fd7bbbe 100644
--- a/pkgs/top-level/all-packages.nix
+++ b/pkgs/top-level/all-packages.nix
@@ -6591,6 +6591,8 @@ with pkgs;
ghrepo-stats = with python3Packages; toPythonApplication ghrepo-stats;
+ ghz = callPackage ../tools/networking/ghz { };
+
gibberish-detector = with python3Packages; toPythonApplication gibberish-detector;
gibo = callPackage ../tools/misc/gibo { };
@@ -26342,6 +26344,8 @@ with pkgs;
blender-with-packages = callPackage ../applications/misc/blender/wrapper.nix {};
+ blender-hip = blender.override { hipSupport = true; };
+
blflash = callPackage ../tools/misc/blflash { };
blogc = callPackage ../applications/misc/blogc { };