-
-
Notifications
You must be signed in to change notification settings - Fork 15k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
(nixos/calibre-server): Add new http & auth options #216497
Conversation
eead884
to
c335a74
Compare
c335a74
to
a303d60
Compare
e9abdd4
to
83ad549
Compare
83ad549
to
740a975
Compare
740a975
to
1056196
Compare
0dffbc1
to
899ac1a
Compare
@GrahamcOfBorg test calibre-server |
899ac1a
to
9dd2f60
Compare
9dd2f60
to
5cc6fea
Compare
5cc6fea
to
37def1a
Compare
22a753b
to
f129289
Compare
@GrahamcOfBorg test calibre-server |
nixos/doc: add calibre-server new options
f129289
to
caa3c0f
Compare
serviceConfig = { | ||
User = cfg.user; | ||
Restart = "always"; | ||
ExecStart = "${cfg.package}/bin/calibre-server ${lib.concatStringsSep " " cfg.libraries} ${execFlags}"; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't know if the /bin/calibre-server
is required
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The package calibre
contains multiple executables and calibre-server
is not the default one.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fair enough. If needed, the meta attribute mainProgram
can be set in the derivation so it's not needed here.
@GrahamcOfBorg test calibre-server |
Description of changes
It is my first contribution to the nixpkgs repository and I hope my changes are not that bad!
This PR adds 4 new options to the
calibre-server
service. It will allow to configure host interface & port and auth configuration.I also add a test for a simple custom case.
Things done
sandbox = true
set innix.conf
? (See Nix manual)nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)