No known key found for this signature in database
GPG Key ID: E747DF1F9575A3AA
282 changed files with 6491 additions and 4756 deletions
-
16.github/CONTRIBUTING.md
-
31doc/cross-compilation.xml
-
5lib/licenses.nix
-
3lib/maintainers.nix
-
24nixos/doc/manual/release-notes/rl-1703.xml
-
2nixos/modules/hardware/video/amdgpu-pro.nix
-
2nixos/modules/hardware/video/ati.nix
-
2nixos/modules/hardware/video/bumblebee.nix
-
16nixos/modules/installer/tools/nixos-generate-config.pl
-
2nixos/modules/misc/ids.nix
-
3nixos/modules/module-list.nix
-
3nixos/modules/profiles/all-hardware.nix
-
4nixos/modules/rename.nix
-
38nixos/modules/security/grsecurity.xml
-
51nixos/modules/services/hardware/bluetooth.nix
-
35nixos/modules/services/hardware/illum.nix
-
2nixos/modules/services/hardware/sane.nix
-
54nixos/modules/services/hardware/trezord.nix
-
2nixos/modules/services/mail/postfix.nix
-
1nixos/modules/services/misc/gogs.nix
-
8nixos/modules/services/misc/taskserver/default.nix
-
84nixos/modules/services/network-filesystems/glusterfs.nix
-
97nixos/modules/services/network-filesystems/nfsd.nix
-
47nixos/modules/services/networking/chrony.nix
-
5nixos/modules/services/networking/cjdns.nix
-
177nixos/modules/services/networking/dnschain.nix
-
4nixos/modules/services/networking/firewall.nix
-
211nixos/modules/services/networking/namecoind.nix
-
52nixos/modules/services/networking/rpcbind.nix
-
3nixos/modules/services/networking/supplicant.nix
-
2nixos/modules/services/web-servers/apache-httpd/default.nix
-
198nixos/modules/services/web-servers/apache-httpd/moodle.nix
-
17nixos/modules/services/web-servers/nginx/default.nix
-
8nixos/modules/system/boot/systemd-lib.nix
-
6nixos/modules/system/boot/systemd-unit-options.nix
-
23nixos/modules/system/boot/systemd.nix
-
2nixos/modules/tasks/filesystems.nix
-
11nixos/modules/tasks/filesystems/glusterfs.nix
-
97nixos/modules/tasks/filesystems/nfs.nix
-
5nixos/modules/tasks/kbd.nix
-
4nixos/modules/tasks/network-interfaces-systemd.nix
-
39nixos/tests/chromium.nix
-
6nixos/tests/nfs.nix
-
25pkgs/applications/audio/audio-recorder/default.nix
-
51pkgs/applications/audio/audio-recorder/icon-names.diff
-
28pkgs/applications/audio/gbsplay/default.nix
-
9pkgs/applications/audio/qjackctl/default.nix
-
484pkgs/applications/editors/emacs-modes/melpa-generated.nix
-
84pkgs/applications/editors/emacs-modes/melpa-stable-generated.nix
-
11pkgs/applications/editors/emacs/macport-25.1.nix
-
4pkgs/applications/editors/vim/configurable.nix
-
5pkgs/applications/editors/vscode/default.nix
-
4pkgs/applications/graphics/digikam/5.nix
-
6pkgs/applications/graphics/rawtherapee/default.nix
-
96pkgs/applications/misc/googleearth/default.nix
-
4pkgs/applications/misc/keepassx/community.nix
-
0pkgs/applications/misc/krename/kde4.nix
-
35pkgs/applications/misc/krename/kde5.nix
-
19pkgs/applications/misc/llpp/default.nix
-
40pkgs/applications/misc/redshift-plasma-applet/default.nix
-
28pkgs/applications/misc/taskwarrior/0001-bash-completion-quote-pattern-argument-to-grep.patch
-
4pkgs/applications/misc/taskwarrior/default.nix
-
6pkgs/applications/networking/browsers/chromium/upstream-info.nix
-
5pkgs/applications/networking/browsers/firefox/wrapper.nix
-
8pkgs/applications/networking/browsers/opera/default.nix
-
35pkgs/applications/networking/cluster/minikube/default.nix
-
6pkgs/applications/networking/cluster/terragrunt/default.nix
-
60pkgs/applications/networking/cluster/terragrunt/deps.nix
-
8pkgs/applications/networking/instant-messengers/scudcloud/default.nix
-
21pkgs/applications/networking/mailreaders/notmuch/muchsync.nix
-
466pkgs/applications/networking/mailreaders/thunderbird-bin/sources.nix
-
4pkgs/applications/networking/mailreaders/thunderbird/default.nix
-
111pkgs/applications/networking/remote/freerdp/default.nix
-
73pkgs/applications/networking/remote/freerdp/legacy.nix
-
56pkgs/applications/networking/remote/freerdp/unstable.nix
-
34pkgs/applications/networking/remote/remmina/default.nix
-
6pkgs/applications/networking/sync/unison/default.nix
-
15pkgs/applications/office/cb2bib/default.nix
-
1pkgs/applications/office/libreoffice/default.nix
-
1pkgs/applications/office/libreoffice/still.nix
-
37pkgs/applications/science/biology/ecopcr/default.nix
-
6pkgs/applications/science/biology/emboss/default.nix
-
4pkgs/applications/version-management/git-and-tools/git/default.nix
-
122pkgs/applications/video/gnash/default.nix
-
6pkgs/applications/video/kodi/plugins.nix
-
15pkgs/applications/video/vokoscreen/default.nix
-
4pkgs/applications/virtualization/rkt/default.nix
-
23pkgs/applications/virtualization/virt-top/default.nix
-
4pkgs/applications/window-managers/jwm/default.nix
-
2pkgs/build-support/fetchurl/mirrors.nix
-
33pkgs/data/fonts/liberastika/default.nix
-
20pkgs/data/fonts/redhat-liberation-fonts/binary.nix
-
100pkgs/data/fonts/redhat-liberation-fonts/default.nix
-
4pkgs/desktops/gnome-2/platform/gnome-vfs/default.nix
-
4pkgs/desktops/kde-4.14/kdenetwork/krdc.nix
-
1pkgs/desktops/kde-5/applications/default.nix
-
6pkgs/desktops/kde-5/applications/gwenview.nix
-
26pkgs/desktops/kde-5/applications/okteta.nix
-
6pkgs/development/compilers/julia/0.5.nix
-
25pkgs/development/compilers/julia/0004-hardened-0.4.7.patch
@ -0,0 +1,35 @@ |
|||
{ config, lib, pkgs, ... }: |
|||
|
|||
with lib; |
|||
|
|||
let |
|||
cfg = config.services.illum; |
|||
in { |
|||
|
|||
options = { |
|||
|
|||
services.illum = { |
|||
|
|||
enable = mkOption { |
|||
default = false; |
|||
type = types.bool; |
|||
description = '' |
|||
Enable illum, a daemon for controlling screen brightness with brightness buttons. |
|||
''; |
|||
}; |
|||
|
|||
}; |
|||
|
|||
}; |
|||
|
|||
config = mkIf cfg.enable { |
|||
|
|||
systemd.services.illum = { |
|||
description = "Backlight Adjustment Service"; |
|||
wantedBy = [ "multi-user.target" ]; |
|||
serviceConfig.ExecStart = "${pkgs.illum}/bin/illum-d"; |
|||
}; |
|||
|
|||
}; |
|||
|
|||
} |
@ -0,0 +1,54 @@ |
|||
{ config, lib, pkgs, ... }: |
|||
|
|||
with lib; |
|||
let |
|||
cfg = config.services.trezord; |
|||
in { |
|||
|
|||
### interface |
|||
|
|||
options = { |
|||
services.trezord = { |
|||
enable = mkOption { |
|||
type = types.bool; |
|||
default = false; |
|||
description = '' |
|||
Enable Trezor bridge daemon, for use with Trezor hardware bitcoin wallets. |
|||
''; |
|||
}; |
|||
}; |
|||
}; |
|||
|
|||
### implementation |
|||
|
|||
config = mkIf cfg.enable { |
|||
services.udev.packages = lib.singleton (pkgs.writeTextFile { |
|||
name = "trezord-udev-rules"; |
|||
destination = "/etc/udev/rules.d/51-trezor.rules"; |
|||
text = '' |
|||
SUBSYSTEM=="usb", ATTR{idVendor}=="534c", ATTR{idProduct}=="0001", MODE="0666", GROUP="dialout", SYMLINK+="trezor%n" |
|||
KERNEL=="hidraw*", ATTRS{idVendor}=="534c", ATTRS{idProduct}=="0001", MODE="0666", GROUP="dialout" |
|||
''; |
|||
}); |
|||
|
|||
systemd.services.trezord = { |
|||
description = "TREZOR Bridge"; |
|||
after = [ "systemd-udev-settle.service" "network.target" ]; |
|||
wantedBy = [ "multi-user.target" ]; |
|||
path = []; |
|||
serviceConfig = { |
|||
Type = "simple"; |
|||
ExecStart = "${pkgs.trezord}/bin/trezord -f"; |
|||
User = "trezord"; |
|||
}; |
|||
}; |
|||
|
|||
users.users.trezord = { |
|||
group = "trezord"; |
|||
description = "Trezor bridge daemon user"; |
|||
}; |
|||
|
|||
users.groups.trezord = {}; |
|||
}; |
|||
} |
|||
|
@ -0,0 +1,84 @@ |
|||
{ config, lib, pkgs, ... }: |
|||
|
|||
with lib; |
|||
|
|||
let |
|||
inherit (pkgs) glusterfs; |
|||
|
|||
cfg = config.services.glusterfs; |
|||
|
|||
in |
|||
|
|||
{ |
|||
|
|||
###### interface |
|||
|
|||
options = { |
|||
|
|||
services.glusterfs = { |
|||
|
|||
enable = mkEnableOption "GlusterFS Daemon"; |
|||
|
|||
logLevel = mkOption { |
|||
type = types.enum ["DEBUG" "INFO" "WARNING" "ERROR" "CRITICAL" "TRACE" "NONE"]; |
|||
description = "Log level used by the GlusterFS daemon"; |
|||
default = "INFO"; |
|||
}; |
|||
|
|||
extraFlags = mkOption { |
|||
type = types.listOf types.str; |
|||
description = "Extra flags passed to the GlusterFS daemon"; |
|||
default = []; |
|||
}; |
|||
}; |
|||
}; |
|||
|
|||
###### implementation |
|||
|
|||
config = mkIf cfg.enable { |
|||
environment.systemPackages = [ pkgs.glusterfs ]; |
|||
|
|||
services.rpcbind.enable = true; |
|||
|
|||
systemd.services.glusterd = { |
|||
|
|||
description = "GlusterFS, a clustered file-system server"; |
|||
|
|||
wantedBy = [ "multi-user.target" ]; |
|||
|
|||
requires = [ "rpcbind.service" ]; |
|||
after = [ "rpcbind.service" "network.target" "local-fs.target" ]; |
|||
before = [ "network-online.target" ]; |
|||
|
|||
preStart = '' |
|||
install -m 0755 -d /var/log/glusterfs |
|||
''; |
|||
|
|||
serviceConfig = { |
|||
Type="forking"; |
|||
PIDFile="/run/glusterd.pid"; |
|||
LimitNOFILE=65536; |
|||
ExecStart="${glusterfs}/sbin/glusterd -p /run/glusterd.pid --log-level=${cfg.logLevel} ${toString cfg.extraFlags}"; |
|||
KillMode="process"; |
|||
}; |
|||
}; |
|||
|
|||
systemd.services.glustereventsd = { |
|||
|
|||
description = "Gluster Events Notifier"; |
|||
|
|||
wantedBy = [ "multi-user.target" ]; |
|||
|
|||
after = [ "syslog.target" "network.target" ]; |
|||
|
|||
serviceConfig = { |
|||
Type="simple"; |
|||
Environment="PYTHONPATH=${glusterfs}/usr/lib/python2.7/site-packages"; |
|||
PIDFile="/run/glustereventsd.pid"; |
|||
ExecStart="${glusterfs}/sbin/glustereventsd --pid-file /run/glustereventsd.pid"; |
|||
ExecReload="/bin/kill -SIGUSR2 $MAINPID"; |
|||
KillMode="control-group"; |
|||
}; |
|||
}; |
|||
}; |
|||
} |