aboutsummaryrefslogtreecommitdiff
path: root/gnu/packages/finance.scm
diff options
context:
space:
mode:
authorFelix Gruber <felgru@posteo.net>2023-08-12 09:12:02 +0000
committerGuillaume Le Vaillant <glv@posteo.net>2023-08-13 15:50:49 +0200
commitbe6f5edd445850720dfcec2642db643b84fc0645 (patch)
tree18cb6cfa70bbf44265cc8d5689c01cebf6c7c578 /gnu/packages/finance.scm
parentab373de30c43f7597eac711adb7754e9dd64b231 (diff)
downloadguix-be6f5edd445850720dfcec2642db643b84fc0645.tar.gz
guix-be6f5edd445850720dfcec2642db643b84fc0645.zip
gnu: spatialite-tools: Update to 5.1.0.
* gnu/packages/geo.scm (spatialite-tools): Update to 5.1.0. Signed-off-by: Guillaume Le Vaillant <glv@posteo.net>
Diffstat (limited to 'gnu/packages/finance.scm')
0 files changed, 0 insertions, 0 deletions
ng max-cache-ttl) "\n" "default-cache-ttl-ssh " (number->string default-cache-ttl-ssh) "\n" "max-cache-ttl-ssh " (number->string max-cache-ttl-ssh) "\n" extra-content))) (define (home-gpg-agent-shepherd-services config) "Return the possibly-empty list of Shepherd services for @var{config}." (match-record config <home-gpg-agent-configuration> (gnupg ssh-support?) ;; 'gpg-agent' is started on demand by GnuPG's programs, but it has to be ;; started explicitly when OpenSSH support is enabled (info "(gnupg) Agent ;; Options"). (if ssh-support? (let ((endpoint (lambda (name socket) #~(endpoint (make-socket-address AF_UNIX (string-append %user-runtime-dir "/gnupg/" #$socket)) #:name #$name #:socket-directory-permissions #o700)))) (list (shepherd-service (provision '(gpg-agent ssh-agent)) (modules '((shepherd support))) ;for '%user-runtime-dir' (start #~(make-systemd-constructor (list #$(file-append gnupg "/bin/gpg-agent") "--supervised" "--enable-ssh-support") (list #$(endpoint "ssh" "S.gpg-agent.ssh") #$(endpoint "browser" "S.gpg-agent.browser") #$(endpoint "extra" "S.gpg-agent.extra") ;; #$(endpoint "scdaemon" "S.scdaemon") #$(endpoint "std" "S.gpg-agent")))) (stop #~(make-systemd-destructor)) (documentation "Start 'gpg-agent', the GnuPG passphrase agent, with support for handling OpenSSH material.")))) '()))) (define (home-gpg-agent-files config) `((".gnupg/gpg-agent.conf" ,(home-gpg-agent-configuration-file config)))) (define (home-gpg-agent-environment-variables config) "Return GnuPG environment variables needed for @var{config}." (if (home-gpg-agent-configuration-ssh-support? config) `(("SSH_AUTH_SOCK" . "$XDG_RUNTIME_DIR/gnupg/S.gpg-agent.ssh")) '())) (define gpg-agent-activation (with-imported-modules (source-module-closure '((gnu build activation))) #~(begin (use-modules (gnu build activation)) ;; Make sure ~/.gnupg is #o700. (let* ((home (getenv "HOME")) (dot-ssh (string-append home "/.gnupg"))) (mkdir-p/perms dot-ssh (getpw (getuid)) #o700))))) (define home-gpg-agent-service-type (service-type (name 'home-gpg-agent) (extensions (list (service-extension home-files-service-type home-gpg-agent-files) (service-extension home-shepherd-service-type home-gpg-agent-shepherd-services) (service-extension home-activation-service-type (const gpg-agent-activation)) (service-extension home-environment-variables-service-type home-gpg-agent-environment-variables))) (default-value (home-gpg-agent-configuration)) (description "Configure GnuPG's agent, @command{gpg-agent}, which is responsible for managing OpenPGP and optionally SSH private keys. When SSH support is enabled, @command{gpg-agent} acts as a drop-in replacement for OpenSSH's @command{ssh-agent}."))) (define-configuration/no-serialization home-parcimonie-configuration (parcimonie (file-like parcimonie) "The parcimonie package to use.") (verbose? (boolean #f) "Provide extra output to the log file.") (gnupg-already-torified? (boolean #f) "GnuPG is already configured to use tor and parcimonie won't attempt to use tor directly.") (refresh-guix-keyrings? (boolean #f) "Also refresh any Guix keyrings found in the XDG_CONFIG_DIR.") (extra-content (raw-configuration-string "") "Raw content to add to the parcimonie service.")) (define (home-parcimonie-shepherd-service config) "Return a user service to run parcimonie." (match-record config <home-parcimonie-configuration> (parcimonie verbose? gnupg-already-torified? refresh-guix-keyrings? extra-content) (let ((log-file #~(string-append %user-log-dir "/parcimonie.log"))) (list (shepherd-service (provision '(parcimonie)) (modules '((shepherd support) ;for '%user-log-dir' (guix build utils) (srfi srfi-1))) (start #~(make-forkexec-constructor (cons* #$(file-append parcimonie "/bin/parcimonie") #$@(if verbose? '("--verbose") '()) #$@(if gnupg-already-torified? '("--gnupg_already_torified") '()) #$@(if (not (string=? extra-content "")) (list extra-content) '()) #$@(if refresh-guix-keyrings? '((append-map (lambda (item) (list (string-append "--gnupg_extra_args=" "--keyring=" item))) (find-files (string-append (getenv "XDG_CONFIG_HOME") "/guix") "^trustedkeys\\.kbx$"))) '((list)))) #:log-file #$log-file)) (stop #~(make-kill-destructor)) (respawn? #t) (documentation "Incrementally refresh gnupg keyring over Tor")))))) (define home-parcimonie-service-type (service-type (name 'home-parcimonie) (extensions (list (service-extension home-shepherd-service-type home-parcimonie-shepherd-service))) (default-value (home-parcimonie-configuration)) (description "Incrementally refresh GnuPG keyrings over Tor.")))