mirror of
https://github.com/nix-community/home-manager.git
synced 2026-01-12 01:59:37 +08:00
Compare commits
21 Commits
backport/r
...
release-25
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
82fb7dedaa | ||
|
|
8c8a16d413 | ||
|
|
c08430923e | ||
|
|
6bd04da47c | ||
|
|
7a06e8a2f8 | ||
|
|
d49d2543f0 | ||
|
|
34578a2fdf | ||
|
|
e298a14801 | ||
|
|
0999ed8f96 | ||
|
|
aaf4650642 | ||
|
|
6ef8697671 | ||
|
|
71c2a550e6 | ||
|
|
fdec8815a8 | ||
|
|
d3135ab747 | ||
|
|
7df150f0d3 | ||
|
|
af31796621 | ||
|
|
5960558067 | ||
|
|
90b62096f0 | ||
|
|
4477715265 | ||
|
|
20561be440 | ||
|
|
f63d0fe9d8 |
2
.github/workflows/backport.yml
vendored
2
.github/workflows/backport.yml
vendored
@@ -37,7 +37,7 @@ jobs:
|
||||
ref: ${{ github.event.pull_request.head.sha }}
|
||||
- name: Create backport PRs
|
||||
id: backport
|
||||
uses: korthout/backport-action@v3
|
||||
uses: korthout/backport-action@v4
|
||||
with:
|
||||
# See https://github.com/korthout/backport-action#inputs
|
||||
github_token: ${{ steps.app-token.outputs.token || secrets.GITHUB_TOKEN }}
|
||||
|
||||
@@ -57,3 +57,9 @@ changes are only active if the `home.stateVersion` option is set to
|
||||
|
||||
now default to `true` which is consistent with the default values
|
||||
for those options used by `i3` and `sway`.
|
||||
|
||||
- The [](#opt-programs.swaylock.enable) option now defaults to `false`
|
||||
and must be explicitly enabled. Previously, it would be implicitly
|
||||
enabled when `programs.swaylock.settings` was non-empty. Users with
|
||||
`home.stateVersion` set to earlier versions will continue to get the
|
||||
old implicit behavior.
|
||||
|
||||
@@ -27,4 +27,8 @@ The state version in this release includes the changes below. These
|
||||
changes are only active if the `home.stateVersion` option is set to
|
||||
\"25.05\" or later.
|
||||
|
||||
- No changes.
|
||||
- The [](#opt-programs.git.signing.format) option no longer defaults to
|
||||
`"openpgp"`. Users who use Git signing with GPG should explicitly set
|
||||
this option to `"openpgp"` to maintain the previous behavior. Users
|
||||
with `home.stateVersion` set to earlier versions will continue to get
|
||||
the `"openpgp"` default for backwards compatibility.
|
||||
|
||||
@@ -80,3 +80,10 @@ changes are only active if the `home.stateVersion` option is set to
|
||||
`{ PASSWORD_STORE_DIR = $XDG_DATA_HOME/password-store; }` anymore by its
|
||||
default value. This will revert to the default behaviour of the program,
|
||||
namely `$HOME/.password-store` to be used as the store path.
|
||||
|
||||
- On macOS, [](#opt-targets.darwin.copyApps.enable) is now enabled by
|
||||
default instead of [](#opt-targets.darwin.linkApps.enable). This means
|
||||
applications from `home.packages` will be copied to
|
||||
`~/Applications/Home Manager Apps` rather than symlinked, making them
|
||||
work properly with Spotlight. Users with `home.stateVersion` set to
|
||||
earlier versions will continue to use `linkApps` by default.
|
||||
|
||||
6
flake.lock
generated
6
flake.lock
generated
@@ -2,11 +2,11 @@
|
||||
"nodes": {
|
||||
"nixpkgs": {
|
||||
"locked": {
|
||||
"lastModified": 1764522689,
|
||||
"narHash": "sha256-SqUuBFjhl/kpDiVaKLQBoD8TLD+/cTUzzgVFoaHrkqY=",
|
||||
"lastModified": 1767799921,
|
||||
"narHash": "sha256-r4GVX+FToWVE2My8VVZH4V0pTIpnu2ZE8/Z4uxGEMBE=",
|
||||
"owner": "NixOS",
|
||||
"repo": "nixpkgs",
|
||||
"rev": "8bb5646e0bed5dbd3ab08c7a7cc15b75ab4e1d0f",
|
||||
"rev": "d351d0653aeb7877273920cd3e823994e7579b0b",
|
||||
"type": "github"
|
||||
},
|
||||
"original": {
|
||||
|
||||
@@ -8,6 +8,10 @@
|
||||
let
|
||||
cfg = config.qt;
|
||||
|
||||
qtctFormat = pkgs.formats.ini {
|
||||
listToValue = values: lib.concatStringsSep ", " values;
|
||||
};
|
||||
|
||||
# Map platform names to their packages.
|
||||
platformPackages = with pkgs; {
|
||||
gnome = [
|
||||
@@ -286,7 +290,34 @@ in
|
||||
'';
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
// (lib.genAttrs' [ "qt5ct" "qt6ct" ] (
|
||||
name:
|
||||
lib.nameValuePair "${name}Settings" (
|
||||
lib.mkOption {
|
||||
type = lib.types.nullOr qtctFormat.type;
|
||||
default = null;
|
||||
example = lib.literalExpression ''
|
||||
{
|
||||
Appearance = {
|
||||
style = "kvantum";
|
||||
icon_theme = "Papirus-Dark";
|
||||
standar_dialogs = "xdgdesktopportal";
|
||||
};
|
||||
Fonts = {
|
||||
fixed = "\"DejaVuSansM Nerd Font Mono,12\"";
|
||||
general = "\"DejaVu Sans,12\"";
|
||||
};
|
||||
}
|
||||
'';
|
||||
description = ''
|
||||
Qtct configuration. Writes settings to `${name}/${name}.conf`
|
||||
file. Lists will be translated to comma-separated strings.
|
||||
Fonts must be quoted (see example).
|
||||
'';
|
||||
}
|
||||
)
|
||||
));
|
||||
};
|
||||
|
||||
config =
|
||||
@@ -397,5 +428,18 @@ in
|
||||
]
|
||||
++ lib.optionals (platformTheme.name != null) [ "QT_QPA_PLATFORMTHEME" ]
|
||||
++ lib.optionals (cfg.style.name != null) [ "QT_STYLE_OVERRIDE" ];
|
||||
|
||||
xdg.configFile =
|
||||
lib.pipe
|
||||
[ "qt5ct" "qt6ct" ]
|
||||
[
|
||||
(lib.filter (qtct: cfg."${qtct}Settings" != null))
|
||||
(lib.flip lib.genAttrs' (
|
||||
qtct:
|
||||
lib.nameValuePair "${qtct}/${qtct}.conf" {
|
||||
source = qtctFormat.generate "${qtct}-config" cfg."${qtct}Settings";
|
||||
}
|
||||
))
|
||||
];
|
||||
};
|
||||
}
|
||||
|
||||
@@ -40,6 +40,12 @@ let
|
||||
description = "The remote path to mount.";
|
||||
};
|
||||
|
||||
mountDestPath = mkOption {
|
||||
type = types.nullOr types.str;
|
||||
default = null;
|
||||
description = "The path on the current machine where the remote path would be mounted.";
|
||||
};
|
||||
|
||||
authType = mkOption {
|
||||
type = types.enum [
|
||||
"password"
|
||||
@@ -47,6 +53,7 @@ let
|
||||
"hostbased"
|
||||
"keyboard-interactive"
|
||||
"gssapi-with-mic"
|
||||
"authentication-agent"
|
||||
];
|
||||
default = "publickey";
|
||||
description = "The authentication method to use.";
|
||||
|
||||
@@ -9,6 +9,7 @@ let
|
||||
attrValues
|
||||
concatStringsSep
|
||||
filter
|
||||
flatten
|
||||
length
|
||||
literalExpression
|
||||
mapAttrsToList
|
||||
@@ -918,7 +919,14 @@ in
|
||||
calendarAccounts = getAccountsForProfile name enabledCalendarAccountsWithId;
|
||||
contactAccounts = getAccountsForProfile name enabledContactAccountsWithId;
|
||||
|
||||
smtp = filter (a: a.smtp != null) emailAccounts;
|
||||
accountsSmtp = filter (a: a.smtp != null) emailAccounts;
|
||||
aliasesSmtp =
|
||||
let
|
||||
getAliasesWithSmtp = a: filter (al: builtins.isAttrs al && al.smtp != null) a.aliases;
|
||||
getAliasesWithId = a: map (al: al // { id = getId a al; }) (getAliasesWithSmtp a);
|
||||
in
|
||||
flatten (map getAliasesWithId emailAccounts);
|
||||
smtp = accountsSmtp ++ aliasesSmtp;
|
||||
|
||||
feedAccounts = addId (attrValues profile.feedAccounts);
|
||||
|
||||
|
||||
@@ -84,13 +84,11 @@ in
|
||||
'';
|
||||
in
|
||||
{
|
||||
bash.initExtra = lib.mkIf cfg.enableBashIntegration bashIntegration;
|
||||
|
||||
zsh.initContent = lib.mkIf cfg.enableZshIntegration bashIntegration;
|
||||
|
||||
fish.interactiveShellInit = lib.mkIf cfg.enableFishIntegration fishIntegration;
|
||||
|
||||
nushell.extraConfig = lib.mkIf cfg.enableNushellIntegration nushellIntegration;
|
||||
# $SSH_AUTH_SOCK has to be set early since other tools rely on it
|
||||
bash.profileExtra = lib.mkIf cfg.enableBashIntegration (lib.mkOrder 900 bashIntegration);
|
||||
fish.shellInit = lib.mkIf cfg.enableFishIntegration (lib.mkOrder 900 fishIntegration);
|
||||
nushell.extraConfig = lib.mkIf cfg.enableNushellIntegration (lib.mkOrder 900 nushellIntegration);
|
||||
zsh.envExtra = lib.mkIf cfg.enableZshIntegration (lib.mkOrder 900 bashIntegration);
|
||||
};
|
||||
}
|
||||
|
||||
|
||||
@@ -85,7 +85,7 @@ in
|
||||
backupCommand = mkOption {
|
||||
type = types.nullOr (types.either types.str types.path);
|
||||
default = null;
|
||||
example = lib.literalExpression "''${pkgs.trash-cli}/bin/trash";
|
||||
example = lib.literalExpression "\${pkgs.trash-cli}/bin/trash";
|
||||
description = ''
|
||||
On activation run this command on each existing file
|
||||
rather than exiting with an error.
|
||||
|
||||
@@ -4,4 +4,7 @@
|
||||
qt-platform-theme-gtk3 = ./qt-platform-theme-gtk3.nix;
|
||||
qt-platform-theme-gnome = ./qt-platform-theme-gnome.nix;
|
||||
qt-platform-theme-kde6-migration = ./qt-platform-theme-kde6-migration.nix;
|
||||
qt-qt5ct-settings = ./qt-qt5ct-settings.nix;
|
||||
qt-qt6ct-settings = ./qt-qt6ct-settings.nix;
|
||||
qt-qtct-settings = ./qt-qtct-settings.nix;
|
||||
}
|
||||
|
||||
13
tests/modules/misc/qt/qt-qt5ct-settings.nix
Normal file
13
tests/modules/misc/qt/qt-qt5ct-settings.nix
Normal file
@@ -0,0 +1,13 @@
|
||||
{
|
||||
qt = {
|
||||
enable = true;
|
||||
qt5ctSettings = {
|
||||
test_section.test_option = "test";
|
||||
};
|
||||
};
|
||||
|
||||
nmt.script = ''
|
||||
assertFileExists "home-files/.config/qt5ct/qt5ct.conf"
|
||||
assertPathNotExists "home-files/.config/qt6ct/qt6ct.conf"
|
||||
'';
|
||||
}
|
||||
13
tests/modules/misc/qt/qt-qt6ct-settings.nix
Normal file
13
tests/modules/misc/qt/qt-qt6ct-settings.nix
Normal file
@@ -0,0 +1,13 @@
|
||||
{
|
||||
qt = {
|
||||
enable = true;
|
||||
qt6ctSettings = {
|
||||
test_section.test_option = "test";
|
||||
};
|
||||
};
|
||||
|
||||
nmt.script = ''
|
||||
assertFileExists "home-files/.config/qt6ct/qt6ct.conf"
|
||||
assertPathNotExists "home-files/.config/qt5ct/qt5ct.conf"
|
||||
'';
|
||||
}
|
||||
16
tests/modules/misc/qt/qt-qtct-settings.nix
Normal file
16
tests/modules/misc/qt/qt-qtct-settings.nix
Normal file
@@ -0,0 +1,16 @@
|
||||
{
|
||||
qt = {
|
||||
enable = true;
|
||||
qt5ctSettings = {
|
||||
test_section.test_option = "test";
|
||||
};
|
||||
qt6ctSettings = {
|
||||
test_section.test_option = "test";
|
||||
};
|
||||
};
|
||||
|
||||
nmt.script = ''
|
||||
assertFileExists "home-files/.config/qt5ct/qt5ct.conf"
|
||||
assertFileExists "home-files/.config/qt6ct/qt6ct.conf"
|
||||
'';
|
||||
}
|
||||
@@ -12,7 +12,7 @@
|
||||
{
|
||||
source = realPkgs.fetchurl {
|
||||
url = "https://keys.openpgp.org/pks/lookup?op=get&options=mr&search=0x44CF42371ADF842E12F116EAA9D3F98FCCF5460B";
|
||||
hash = "sha256-bSluCZh6ijwppigk8iF2BwWKZgq1WDbIjyYQRK772dM=";
|
||||
hash = "sha256-csrFDI6QSPfNN+adOPEAupAtspYNBCybFZExvVS+vRY=";
|
||||
};
|
||||
trust = 1; # "unknown"
|
||||
}
|
||||
|
||||
@@ -23,6 +23,13 @@
|
||||
user = "user";
|
||||
sshKey = "/home/user/.ssh/id_rsa";
|
||||
};
|
||||
mount4 = {
|
||||
host = "host4.example.com";
|
||||
mountPoint = "/another/path/somewhere/else";
|
||||
user = "user";
|
||||
authType = "authentication-agent";
|
||||
mountDestPath = "/mnt/host4";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
@@ -36,5 +43,8 @@
|
||||
assertFileContent \
|
||||
home-files/.config/sftpman/mounts/mount3.json \
|
||||
${./expected-mount3.json}
|
||||
assertFileContent \
|
||||
home-files/.config/sftpman/mounts/mount4.json \
|
||||
${./expected-mount4.json}
|
||||
'';
|
||||
}
|
||||
|
||||
@@ -3,6 +3,7 @@
|
||||
"beforeMount": "true",
|
||||
"host": "host1.example.com",
|
||||
"id": "mount1",
|
||||
"mountDestPath": null,
|
||||
"mountOptions": [
|
||||
"idmap=user"
|
||||
],
|
||||
|
||||
@@ -3,6 +3,7 @@
|
||||
"beforeMount": "true",
|
||||
"host": "host2.example.com",
|
||||
"id": "mount2",
|
||||
"mountDestPath": null,
|
||||
"mountOptions": [],
|
||||
"mountPoint": "/another/path",
|
||||
"port": 22,
|
||||
|
||||
@@ -3,6 +3,7 @@
|
||||
"beforeMount": "true",
|
||||
"host": "host3.example.com",
|
||||
"id": "mount3",
|
||||
"mountDestPath": null,
|
||||
"mountOptions": [],
|
||||
"mountPoint": "/yet/another/path",
|
||||
"port": 22,
|
||||
|
||||
12
tests/modules/programs/sftpman/expected-mount4.json
Normal file
12
tests/modules/programs/sftpman/expected-mount4.json
Normal file
@@ -0,0 +1,12 @@
|
||||
{
|
||||
"authType": "authentication-agent",
|
||||
"beforeMount": "true",
|
||||
"host": "host4.example.com",
|
||||
"id": "mount4",
|
||||
"mountDestPath": "/mnt/host4",
|
||||
"mountOptions": [],
|
||||
"mountPoint": "/another/path/somewhere/else",
|
||||
"port": 22,
|
||||
"sshKey": "/home/user/.ssh/id_ed25519",
|
||||
"user": "user"
|
||||
}
|
||||
@@ -120,7 +120,7 @@ user_pref("mail.smtpserver.smtp_cda3f13b64c1db7d4b58ce07a31304a362d7dcaf14476bfa
|
||||
user_pref("mail.smtpserver.smtp_cda3f13b64c1db7d4b58ce07a31304a362d7dcaf14476bfabcca913ae41ada9f.port", 456);
|
||||
user_pref("mail.smtpserver.smtp_cda3f13b64c1db7d4b58ce07a31304a362d7dcaf14476bfabcca913ae41ada9f.try_ssl", 3);
|
||||
user_pref("mail.smtpserver.smtp_cda3f13b64c1db7d4b58ce07a31304a362d7dcaf14476bfabcca913ae41ada9f.username", "home.manager");
|
||||
user_pref("mail.smtpservers", "smtp_bcd3ace52bed41febb6cdc2fb1303aebaa573e0d993872da503950901bb6c6fc,smtp_cda3f13b64c1db7d4b58ce07a31304a362d7dcaf14476bfabcca913ae41ada9f");
|
||||
user_pref("mail.smtpservers", "smtp_bcd3ace52bed41febb6cdc2fb1303aebaa573e0d993872da503950901bb6c6fc,smtp_cda3f13b64c1db7d4b58ce07a31304a362d7dcaf14476bfabcca913ae41ada9f,smtp_b24ca86ede61ed219e6c87cfec261aae2c72785f812489ea943d114d1f39f55b");
|
||||
user_pref("privacy.donottrackheader.enabled", true);
|
||||
|
||||
user_pref("mail.html_compose", false);
|
||||
|
||||
@@ -120,7 +120,7 @@ user_pref("mail.smtpserver.smtp_cda3f13b64c1db7d4b58ce07a31304a362d7dcaf14476bfa
|
||||
user_pref("mail.smtpserver.smtp_cda3f13b64c1db7d4b58ce07a31304a362d7dcaf14476bfabcca913ae41ada9f.port", 456);
|
||||
user_pref("mail.smtpserver.smtp_cda3f13b64c1db7d4b58ce07a31304a362d7dcaf14476bfabcca913ae41ada9f.try_ssl", 3);
|
||||
user_pref("mail.smtpserver.smtp_cda3f13b64c1db7d4b58ce07a31304a362d7dcaf14476bfabcca913ae41ada9f.username", "home.manager");
|
||||
user_pref("mail.smtpservers", "smtp_bcd3ace52bed41febb6cdc2fb1303aebaa573e0d993872da503950901bb6c6fc,smtp_cda3f13b64c1db7d4b58ce07a31304a362d7dcaf14476bfabcca913ae41ada9f");
|
||||
user_pref("mail.smtpservers", "smtp_bcd3ace52bed41febb6cdc2fb1303aebaa573e0d993872da503950901bb6c6fc,smtp_cda3f13b64c1db7d4b58ce07a31304a362d7dcaf14476bfabcca913ae41ada9f,smtp_b24ca86ede61ed219e6c87cfec261aae2c72785f812489ea943d114d1f39f55b");
|
||||
user_pref("privacy.donottrackheader.enabled", true);
|
||||
|
||||
user_pref("mail.html_compose", false);
|
||||
|
||||
@@ -8,7 +8,7 @@
|
||||
|
||||
nmt.script = ''
|
||||
assertFileContains \
|
||||
home-files/.bashrc \
|
||||
home-files/.profile \
|
||||
'export SSH_AUTH_SOCK=$(@getconf-system_cmds@/bin/getconf DARWIN_USER_TEMP_DIR)/ssh-agent'
|
||||
'';
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user