aboutsummaryrefslogtreecommitdiff
path: root/gnu/packages/aidc.scm
diff options
context:
space:
mode:
authorAndy Tai <atai@atai.org>2024-03-06 21:43:48 -0800
committerGuillaume Le Vaillant <glv@posteo.net>2024-03-08 09:26:47 +0100
commitce0435f8280cdf481284302f8e8229903733b734 (patch)
treede5cb4b04ccda96b2a0934c4e1b132d876f80aea /gnu/packages/aidc.scm
parent0b5cbca689b2f91949e191ca256ffc9bb48c1141 (diff)
downloadguix-ce0435f8280cdf481284302f8e8229903733b734.tar.gz
guix-ce0435f8280cdf481284302f8e8229903733b734.zip
gnu: gnuradio: Update to 3.10.8.0.
* gnu/packages/radio.scm (gnuradio): Update to 3.10.8.0. Change-Id: Ibf1560b642dd7d54f06eba0288f5068d7077e7ec Reviewed-by: Juliana Sims <juli@incana.org> Signed-off-by: Guillaume Le Vaillant <glv@posteo.net>
Diffstat (limited to 'gnu/packages/aidc.scm')
0 files changed, 0 insertions, 0 deletions
it")) (command `(,git "daemon" "--syslog" "--reuseaddr" ,@(if export-all? '("--export-all") '()) ,@(if base-path `(,(string-append "--base-path=" base-path)) '()) ,@(if user-path `(,(string-append "--user-path=" user-path)) '()) ,@(map (cut string-append "--listen=" <>) listen) ,@(if port `(,(string-append "--port=" (number->string port))) '()) ,@extra-options ,@whitelist))) (list (shepherd-service (documentation "Run the git-daemon.") (requirement '(networking)) (provision '(git-daemon)) (start #~(make-forkexec-constructor '#$command #:user "git-daemon" #:group "git-daemon")) (stop #~(make-kill-destructor)))))))) (define %git-daemon-accounts ;; User account and group for git-daemon. (list (user-group (name "git-daemon") (system? #t)) (user-account (name "git-daemon") (system? #t) (group "git-daemon") (comment "Git daemon user") (home-directory "/var/empty") (shell (file-append shadow "/sbin/nologin"))))) (define (git-daemon-activation config) "Return the activation gexp for git-daemon using CONFIG." (let ((base-path (git-daemon-configuration-base-path config))) #~(begin (use-modules (guix build utils)) ;; Create the 'base-path' directory when it's not '#f'. (and=> #$base-path mkdir-p)))) (define git-daemon-service-type (service-type (name 'git-daemon) (extensions (list (service-extension shepherd-root-service-type git-daemon-shepherd-service) (service-extension account-service-type (const %git-daemon-accounts)) (service-extension activation-service-type git-daemon-activation))) (description "Expose Git repositories over the insecure @code{git://} TCP-based protocol.") (default-value (git-daemon-configuration)))) (define-deprecated (git-daemon-service #:key (config (git-daemon-configuration))) git-daemon-service-type "Return a service that runs @command{git daemon}, a simple TCP server to expose repositories over the Git protocol for anonymous access. The optional @var{config} argument should be a @code{<git-daemon-configuration>} object, by default it allows read-only access to exported repositories under @file{/srv/git}." (service git-daemon-service-type config)) ;;; ;;; HTTP access. Add the result of calling ;;; git-http-nginx-location-configuration to an nginx-server-configuration's ;;; "locations" field. ;;; (define-record-type* <git-http-configuration> git-http-configuration make-git-http-configuration git-http-configuration? (package git-http-configuration-package ;file-like (default git)) (git-root git-http-configuration-git-root ;string (default "/srv/git")) (export-all? git-http-configuration-export-all? ;boolean (default #f)) (uri-path git-http-configuration-uri-path ;string (default "/git/")) (fcgiwrap-socket git-http-configuration-fcgiwrap-socket ;string (default "127.0.0.1:9000"))) (define* (git-http-nginx-location-configuration #:optional (config (git-http-configuration))) (match config (($ <git-http-configuration> package git-root export-all? uri-path fcgiwrap-socket) (nginx-location-configuration (uri (string-append "~ /" (string-trim-both uri-path #\/) "(/.*)")) (body (list (list "fastcgi_pass " fcgiwrap-socket ";") (list "fastcgi_param SCRIPT_FILENAME " package "/libexec/git-core/git-http-backend" ";") "fastcgi_param QUERY_STRING $query_string;" "fastcgi_param REQUEST_METHOD $request_method;" "fastcgi_param CONTENT_TYPE $content_type;" "fastcgi_param CONTENT_LENGTH $content_length;" (if export-all? "fastcgi_param GIT_HTTP_EXPORT_ALL \"\";" "") (list "fastcgi_param GIT_PROJECT_ROOT " git-root ";") "fastcgi_param PATH_INFO $1;")))))) ;;; ;;; Gitolite ;;; (define-record-type* <gitolite-rc-file> gitolite-rc-file make-gitolite-rc-file gitolite-rc-file? (umask gitolite-rc-file-umask (default #o0077)) (local-code gitolite-rc-file-local-code (default "$rc{GL_ADMIN_BASE}/local")) (unsafe-pattern gitolite-rc-file-unsafe-pattern (default #f)) (git-config-keys gitolite-rc-file-git-config-keys (default "")) (roles gitolite-rc-file-roles (default '(("READERS" . 1) ("WRITERS" . 1)))) (enable gitolite-rc-file-enable (default '("help" "desc" "info" "perms" "writable" "ssh-authkeys" "git-config" "daemon" "gitweb")))) (define-gexp-compiler (gitolite-rc-file-compiler (file <gitolite-rc-file>) system target) (match file (($ <gitolite-rc-file> umask local-code unsafe-pattern git-config-keys roles enable) (apply text-file* "gitolite.rc" `("%RC = (\n" " UMASK => " ,(format #f "~4,'0o" umask) ",\n" " GIT_CONFIG_KEYS => '" ,git-config-keys "',\n" ,(if local-code (simple-format #f " LOCAL_CODE => \"~A\",\n" local-code) "") " ROLES => {\n" ,@(map (match-lambda ((role . value) (simple-format #f " ~A => ~A,\n" role value))) roles) " },\n" "\n" " ENABLE => [\n" ,@(map (lambda (value) (simple-format #f " '~A',\n" value)) enable) " ],\n" ");\n" "\n" ,(if unsafe-pattern (string-append "$UNSAFE_PATT = qr(" unsafe-pattern ");") "") "1;\n"))))) (define-record-type* <gitolite-configuration> gitolite-configuration make-gitolite-configuration gitolite-configuration? (package gitolite-configuration-package (default gitolite)) (user gitolite-configuration-user (default "git")) (group gitolite-configuration-group (default "git")) (home-directory gitolite-configuration-home-directory (default "/var/lib/gitolite")) (rc-file gitolite-configuration-rc-file (default (gitolite-rc-file))) (admin-pubkey gitolite-configuration-admin-pubkey)) (define gitolite-accounts (match-lambda (($ <gitolite-configuration> package user group home-directory rc-file admin-pubkey) ;; User group and account to run Gitolite. (list (user-group (name group) (system? #t)) (user-account (name user) (group group) (system? #t) (comment "Gitolite user") (home-directory home-directory)))))) (define gitolite-activation (match-lambda (($ <gitolite-configuration> package user group home rc-file admin-pubkey) #~(begin (use-modules (ice-9 match) (guix build utils)) (let* ((user-info (getpwnam #$user)) (admin-pubkey #$admin-pubkey) (pubkey-file (string-append #$home "/" (basename (strip-store-file-name admin-pubkey)))) (rc-file #$(string-append home "/.gitolite.rc"))) ;; activate-users+groups in (gnu build activation) sets the ;; permission flags of home directories to #o700 and mentions that ;; services needing looser permissions should chmod it during ;; service activation. We also want the git group to be able to ;; read from the gitolite home directory, so a chmod'ing we will ;; go! (chmod #$home #o750) (simple-format #t "guix: gitolite: installing ~A\n" #$rc-file) (copy-file #$rc-file rc-file) ;; ensure gitolite's user can read the configuration (chown rc-file (passwd:uid user-info) (passwd:gid user-info)) ;; The key must be writable, so copy it from the store (copy-file admin-pubkey pubkey-file) (chmod pubkey-file #o500) (chown pubkey-file (passwd:uid user-info) (passwd:gid user-info)) ;; Set the git configuration, to avoid gitolite trying to use ;; the hostname command, as the network might not be up yet (with-output-to-file #$(string-append home "/.gitconfig") (lambda () (display "[user] name = GNU Guix email = guix@localhost "))) ;; Run Gitolite setup, as this updates the hooks and include the ;; admin pubkey if specified. The admin pubkey is required for ;; initial setup, and will replace the previous key if run after ;; initial setup (match (primitive-fork) (0 ;; Exit with a non-zero status code if an exception is thrown. (dynamic-wind (const #t) (lambda () (setenv "HOME" (passwd:dir user-info)) (setenv "USER" #$user) (setgid (passwd:gid user-info)) (setuid (passwd:uid user-info)) (primitive-exit (system* #$(file-append package "/bin/gitolite") "setup" "-m" "gitolite setup by GNU Guix" "-pk" pubkey-file))) (lambda () (primitive-exit 1)))) (pid (waitpid pid))) (when (file-exists? pubkey-file) (delete-file pubkey-file))))))) (define gitolite-service-type (service-type (name 'gitolite) (extensions (list (service-extension activation-service-type gitolite-activation) (service-extension account-service-type gitolite-accounts) (service-extension profile-service-type ;; The Gitolite package in Guix uses ;; gitolite-shell in the authorized_keys file, so ;; gitolite-shell needs to be on the PATH for ;; gitolite to work. (lambda (config) (list (gitolite-configuration-package config)))))) (description "Set up @command{gitolite}, a Git hosting tool providing access over SSH. By default, the @code{git} user is used, but this is configurable. Additionally, Gitolite can integrate with with tools like gitweb or cgit to provide a web interface to view selected repositories."))) ;;; ;;; Gitile ;;; (define-record-type* <gitile-configuration> gitile-configuration make-gitile-configuration gitile-configuration? (package gitile-configuration-package (default gitile)) (host gitile-configuration-host (default "127.0.0.1")) (port gitile-configuration-port (default 8080)) (database gitile-configuration-database (default "/var/lib/gitile/gitile-db.sql")) (repositories gitile-configuration-repositories (default "/var/lib/gitolite/repositories")) (base-git-url gitile-configuration-base-git-url) (index-title gitile-configuration-index-title (default "Index")) (intro gitile-configuration-intro (default '())) (footer gitile-configuration-footer (default '())) (nginx gitile-configuration-nginx)) (define (gitile-config-file host port database repositories base-git-url index-title intro footer) (define build #~(write `(config (port #$port) (host #$host) (database #$database) (repositories #$repositories) (base-git-url #$base-git-url) (index-title #$index-title) (intro #$intro) (footer #$footer)) (open-output-file #$output))) (computed-file "gitile.conf" build)) (define gitile-nginx-server-block (match-lambda (($ <gitile-configuration> package host port database repositories base-git-url index-title intro footer nginx) (list (nginx-server-configuration (inherit nginx) (locations (append (list (nginx-location-configuration (uri "/") (body (list #~(string-append "proxy_pass http://" #$host ":" (number->string #$port) "/;"))))) (map (lambda (loc) (nginx-location-configuration (uri loc) (body (list #~(string-append "root " #$package "/share/gitile/assets;"))))) '("/css" "/js" "/images")) (nginx-server-configuration-locations nginx)))))))) (define gitile-shepherd-service (match-lambda (($ <gitile-configuration> package host port database repositories base-git-url index-title intro footer nginx) (list (shepherd-service (provision '(gitile)) (requirement '(loopback)) (documentation "gitile") (start (let ((gitile (file-append package "/bin/gitile"))) #~(make-forkexec-constructor `(,#$gitile "-c" #$(gitile-config-file host port database repositories base-git-url index-title intro footer)) #:user "gitile" #:group "git"))) (stop #~(make-kill-destructor))))))) (define %gitile-accounts (list (user-group (name "git") (system? #t)) (user-account (name "gitile") (group "git") (system? #t) (comment "Gitile user") (home-directory "/var/empty") (shell (file-append shadow "/sbin/nologin"))))) (define gitile-service-type (service-type (name 'gitile) (description "Run Gitile, a small Git forge. Expose public repositories on the web.") (extensions (list (service-extension account-service-type (const %gitile-accounts)) (service-extension shepherd-root-service-type gitile-shepherd-service) (service-extension nginx-service-type gitile-nginx-server-block)))))