Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: ae1645930506
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 57568628beff
Choose a head ref

Commits on Jun 26, 2020

  1. ArchiSteamFarm: 4.2.2.1 -> 4.2.3.3

    gnidorah committed Jun 26, 2020

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    093dba3 View commit details

Commits on Jul 1, 2020

  1. protonvpn-cli-ng: 2.2.2 -> 2.2.4

    Changed version number and added Jinja2 to propagatedBuildInputs.
    CloudArtAdmins authored and Seabass committed Jul 1, 2020

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    53bee28 View commit details
  2. zeal: 0.6.1 -> 0.6.999

    peterhoeg committed Jul 1, 2020
    Copy the full SHA
    b25c98e View commit details
  3. nixos/lib/make-ext4-fs: use mkfs.ext4 instead of cptofs

    This fixes image creation on armv7l when image is bigger than 2G.
    Also fix some reproducibility issues and other cptofs issues.
    misuzu committed Jul 1, 2020
    Copy the full SHA
    9ac1ab1 View commit details
  4. ceph: 14.2.9 -> 14.2.10

    Add new dependency on rdkafka
    Also removed now-obsolete cve patch as it's integrated already
    srhb committed Jul 1, 2020
    Copy the full SHA
    a1f6898 View commit details
  5. heroku: 7.41.1 -> 7.42.2

    marsam committed Jul 1, 2020
    Copy the full SHA
    a8a49b4 View commit details
  6. cypress: 4.8.0 -> 4.9.0

    DamienCassou committed Jul 1, 2020
    Copy the full SHA
    896c5ef View commit details
  7. Fix typos in documentation (#91934)

    Sami Bouhlel committed Jul 1, 2020
    Copy the full SHA
    c179ae6 View commit details
  8. nixos/openldap: add option for configuring OpenLDAP package to use

    In certain cases, for example when custom OpenLDAP modules are
    compiled into the binary, users may want to override the package used
    for OpenLDAP.
    
    This is especially common in setups where LDAP is the primary
    authentication source, as good password hashing mechanisms need to be
    enabled as extra modules.
    tazjin committed Jul 1, 2020
    Copy the full SHA
    c0122d3 View commit details
  9. Merge pull request #91924 from marsam/update-heroku

    heroku: 7.41.1 -> 7.42.2
    marsam authored Jul 1, 2020
    Copy the full SHA
    c343436 View commit details

Commits on Jul 2, 2020

  1. Merge pull request #91963 from tazjin/feat/openldap-package

    nixos/openldap: add option for configuring OpenLDAP package to use
    edef1c authored Jul 2, 2020
    Copy the full SHA
    e226b12 View commit details
  2. Merge pull request #82718 from misuzu/armv7l-ext4-fs-fix

    nixos/lib/make-ext4-fs: use mkfs.ext4 instead of cptofs
    samueldr authored Jul 2, 2020
    Copy the full SHA
    736c7ca View commit details
  3. Merge pull request #91913 from peterhoeg/u/zeal

    zeal: 0.6.1 -> 0.6.999
    peterhoeg authored Jul 2, 2020
    Copy the full SHA
    2676464 View commit details
  4. Merge pull request #91328 from privateseabass/patch-4

    protonvpn-cli-ng: 2.2.2 -> 2.2.4
    bhipple authored Jul 2, 2020
    Copy the full SHA
    42ea899 View commit details
  5. ceph: Add srhb to maintainers

    srhb committed Jul 2, 2020
    Copy the full SHA
    e1a8707 View commit details
  6. Merge pull request #91919 from srhb/ceph-14.2.10

    ceph: 14.2.9 -> 14.2.10
    srhb authored Jul 2, 2020
    Copy the full SHA
    f4a34b2 View commit details
  7. Copy the full SHA
    885fb14 View commit details
  8. Merge pull request #91954 from Bsami/Fix-typos-in-doc#91934

    Fix typos in documentation (#91934)
    srhb authored Jul 2, 2020
    Copy the full SHA
    5392291 View commit details
  9. Merge pull request #91617 from gnidorah/asf

    ArchiSteamFarm: 4.2.2.1 -> 4.2.3.3
    srhb authored Jul 2, 2020
    Copy the full SHA
    6cf0ed0 View commit details
  10. Merge pull request #91942 from DamienCassou/cypress-4.9.0

    cypress: 4.8.0 -> 4.9.0
    DamienCassou authored Jul 2, 2020
    Copy the full SHA
    629def7 View commit details
  11. quartus-prime-lite: 19.1 -> 20.1

    kwohlfahrt authored and bjornfor committed Jul 2, 2020
    Copy the full SHA
    35b8671 View commit details
  12. nixos/doc/manual: Fix parted's set subcommand for esp partition

    With 'set 3 boot on' the error 'file system "/boot" is not a FAT EFI
    system partition (ESP) file system' occurs when running
    "nixos-install" during the basic installation (tested in in a
    VirtualBox VM).
    konrad authored and bjornfor committed Jul 2, 2020
    Copy the full SHA
    7ec38ad View commit details
  13. syslinux: make reproducible

    ajs124 authored and bjornfor committed Jul 2, 2020
    Copy the full SHA
    5756862 View commit details
6 changes: 3 additions & 3 deletions doc/using/configuration.xml
Original file line number Diff line number Diff line change
@@ -85,19 +85,19 @@
<title>Installing packages on unsupported systems</title>

<para>
There are also two ways to try compiling a package which has been marked as unsuported for the given system.
There are also two ways to try compiling a package which has been marked as unsupported for the given system.
</para>

<itemizedlist>
<listitem>
<para>
For allowing the build of a broken package once, you can use an environment variable for a single invocation of the nix tools:
For allowing the build of an unsupported package once, you can use an environment variable for a single invocation of the nix tools:
<programlisting>$ export NIXPKGS_ALLOW_UNSUPPORTED_SYSTEM=1</programlisting>
</para>
</listitem>
<listitem>
<para>
For permanently allowing broken packages to be built, you may add <literal>allowUnsupportedSystem = true;</literal> to your user's configuration file, like this:
For permanently allowing unsupported packages to be built, you may add <literal>allowUnsupportedSystem = true;</literal> to your user's configuration file, like this:
<programlisting>
{
allowUnsupportedSystem = true;
4 changes: 2 additions & 2 deletions nixos/doc/manual/installation/installing.xml
Original file line number Diff line number Diff line change
@@ -146,7 +146,7 @@
partition. It uses the initially reserved 512MiB at the start of the
disk.
<screen language="commands"><prompt># </prompt>parted /dev/sda -- mkpart ESP fat32 1MiB 512MiB
<prompt># </prompt>parted /dev/sda -- set 3 boot on</screen>
<prompt># </prompt>parted /dev/sda -- set 3 esp on</screen>
</para>
</listitem>
</orderedlist>
@@ -513,7 +513,7 @@ Retype new UNIX password: ***</screen>
<prompt># </prompt>parted /dev/sda -- mkpart primary 512MiB -8GiB
<prompt># </prompt>parted /dev/sda -- mkpart primary linux-swap -8GiB 100%
<prompt># </prompt>parted /dev/sda -- mkpart ESP fat32 1MiB 512MiB
<prompt># </prompt>parted /dev/sda -- set 3 boot on</screen>
<prompt># </prompt>parted /dev/sda -- set 3 esp on</screen>
</example>

<example xml:id="ex-install-sequence">
39 changes: 19 additions & 20 deletions nixos/lib/make-ext4-fs.nix
Original file line number Diff line number Diff line change
@@ -17,7 +17,7 @@
, e2fsprogs
, libfaketime
, perl
, lkl
, fakeroot
}:

let
@@ -26,7 +26,7 @@ in
pkgs.stdenv.mkDerivation {
name = "ext4-fs.img${lib.optionalString compressImage ".zst"}";

nativeBuildInputs = [ e2fsprogs.bin libfaketime perl lkl ]
nativeBuildInputs = [ e2fsprogs.bin libfaketime perl fakeroot ]
++ lib.optional compressImage zstd;

buildCommand =
@@ -37,32 +37,31 @@ pkgs.stdenv.mkDerivation {
${populateImageCommands}
)
# Add the closures of the top-level store objects.
storePaths=$(cat ${sdClosureInfo}/store-paths)
echo "Preparing store paths for image..."
# Create nix/store before copying path
mkdir -p ./rootImage/nix/store
xargs -I % cp -a --reflink=auto % -t ./rootImage/nix/store/ < ${sdClosureInfo}/store-paths
(
GLOBIGNORE=".:.."
shopt -u dotglob
cp -a --reflink=auto ./files/* -t ./rootImage/
)
# Also include a manifest of the closures in a format suitable for nix-store --load-db
cp ${sdClosureInfo}/registration ./rootImage/nix-path-registration
# Make a crude approximation of the size of the target image.
# If the script starts failing, increase the fudge factors here.
numInodes=$(find $storePaths ./files | wc -l)
numDataBlocks=$(du -s -c -B 4096 --apparent-size $storePaths ./files | tail -1 | awk '{ print int($1 * 1.10) }')
numInodes=$(find ./rootImage | wc -l)
numDataBlocks=$(du -s -c -B 4096 --apparent-size ./rootImage | tail -1 | awk '{ print int($1 * 1.10) }')
bytes=$((2 * 4096 * $numInodes + 4096 * $numDataBlocks))
echo "Creating an EXT4 image of $bytes bytes (numInodes=$numInodes, numDataBlocks=$numDataBlocks)"
truncate -s $bytes $img
faketime -f "1970-01-01 00:00:01" mkfs.ext4 -L ${volumeLabel} -U ${uuid} $img
# Also include a manifest of the closures in a format suitable for nix-store --load-db.
cp ${sdClosureInfo}/registration nix-path-registration
cptofs -t ext4 -i $img nix-path-registration /
# Create nix/store before copying paths
faketime -f "1970-01-01 00:00:01" mkdir -p nix/store
cptofs -t ext4 -i $img nix /
echo "copying store paths to image..."
cptofs -t ext4 -i $img $storePaths /nix/store/
echo "copying files to image..."
cptofs -t ext4 -i $img ./files/* /
faketime -f "1970-01-01 00:00:01" fakeroot mkfs.ext4 -L ${volumeLabel} -U ${uuid} -d ./rootImage $img
export EXT2FS_NO_MTAB_OK=yes
# I have ended up with corrupted images sometimes, I suspect that happens when the build machine's disk gets full during the build.
30 changes: 21 additions & 9 deletions nixos/modules/services/databases/openldap.nix
Original file line number Diff line number Diff line change
@@ -5,14 +5,14 @@ with lib;
let

cfg = config.services.openldap;
openldap = pkgs.openldap;
openldap = cfg.package;

dataFile = pkgs.writeText "ldap-contents.ldif" cfg.declarativeContents;
configFile = pkgs.writeText "slapd.conf" ((optionalString cfg.defaultSchemas ''
include ${pkgs.openldap.out}/etc/schema/core.schema
include ${pkgs.openldap.out}/etc/schema/cosine.schema
include ${pkgs.openldap.out}/etc/schema/inetorgperson.schema
include ${pkgs.openldap.out}/etc/schema/nis.schema
include ${openldap.out}/etc/schema/core.schema
include ${openldap.out}/etc/schema/cosine.schema
include ${openldap.out}/etc/schema/inetorgperson.schema
include ${openldap.out}/etc/schema/nis.schema
'') + ''
${cfg.extraConfig}
database ${cfg.database}
@@ -46,6 +46,18 @@ in
";
};

package = mkOption {
type = types.package;
default = pkgs.openldap;
description = ''
OpenLDAP package to use.
This can be used to, for example, set an OpenLDAP package
with custom overrides to enable modules or other
functionality.
'';
};

user = mkOption {
type = types.str;
default = "openldap";
@@ -152,10 +164,10 @@ in
";
example = literalExample ''
'''
include ${pkgs.openldap.out}/etc/schema/core.schema
include ${pkgs.openldap.out}/etc/schema/cosine.schema
include ${pkgs.openldap.out}/etc/schema/inetorgperson.schema
include ${pkgs.openldap.out}/etc/schema/nis.schema
include ${openldap.out}/etc/schema/core.schema
include ${openldap.out}/etc/schema/cosine.schema
include ${openldap.out}/etc/schema/inetorgperson.schema
include ${openldap.out}/etc/schema/nis.schema
database bdb
suffix dc=example,dc=org
21 changes: 9 additions & 12 deletions pkgs/applications/editors/quartus-prime/default.nix
Original file line number Diff line number Diff line change
@@ -24,7 +24,7 @@ let
) deviceIds;

quartus = stdenv.mkDerivation rec {
version = "19.1.0.670";
version = "20.1.0.711";
pname = "quartus-prime-lite-unwrapped";

src = let
@@ -34,12 +34,12 @@ let
};

hashes = {
"arria_lite" = "1flj9w0vb2p9f9zll136izr6qvmxn0lg72bvaqxs3sxc9vj06wm1";
"cyclonev" = "0bqxpvjgph0y6slk0jq75mcqzglmqkm0jsx10y9xz5llm6zxzqab";
"cyclone" = "0pzs8y4s3snxg4g6lrb21qi88abm48g279xzd98qv17qxb2z82rr";
"cyclone10lp" = "1ccxq8n20y40y47zddkijcv41w3cddvydddr3m4844q31in3nxha";
"max" = "1cxzbqscxvlcy74dpqmvlnxjyyxfwcx3spygpvpwi6dfj3ipgm2z";
"max10" = "14k83javivbk65mpb17wdwsyb8xk7x9gzj9x0wnd24mmijrvdy9s";
"arria_lite" = "09g2knq23h3vj0s5y7hsdnqbbkr3pnv53dzpqcw2lq9mb5zfs9r0";
"cyclonev" = "05hrpysasyfb7xhxg68spdffxyvxcx0iagibd5jz643b7n6aalpa";
"cyclone" = "1x3rnwsvzrb5kwdz35sbcabxmcvj8xxpnjlpcjwfc69ybiyr6sgz";
"cyclone10lp" = "1x6d4hm697mjgzaxixrw5va8anr6ihhx96x2524r6axpwqf6wcja";
"max" = "060b7v0xh86kkjyiix7akfkzhx2kl1b3q117kp7xibnz6yrzwmy3";
"max10" = "05840l9pmqa4i1b3ajfaxkqz1hppls556vbq16a42acz2qs2g578";
};

devicePackages = map (id: {
@@ -48,10 +48,10 @@ let
}) (lib.attrValues supportedDeviceIds);
in map require ([{
name = "QuartusLiteSetup-${version}-linux.run";
sha256 = "15vxvqxqdk29ahlw3lkm1nzxyhzy4626wb9s5f2h6sjgq64r8m7f";
sha256 = "07ssrv8p8kacal6xd80n4h7l5xz13aw1m1gfqqaxig0ivsj971z5";
} {
name = "ModelSimSetup-${version}-linux.run";
sha256 = "0j1vfr91jclv88nam2plx68arxmz4g50sqb840i60wqd5b0l3y6r";
sha256 = "0smxasrmr1c8k6hy378knskpjmz4cgpgb35v5jclns0kx68y3c42";
}] ++ devicePackages);

nativeBuildInputs = [ unstick ];
@@ -81,9 +81,6 @@ let
--disable-components ${lib.concatStringsSep "," disabledComponents} \
--mode unattended --installdir $out --accept_eula 1
# This patch is from https://wiki.archlinux.org/index.php/Altera_Design_Software
patch --force --strip 0 --directory $out < ${./vsim.patch}
rm -r $out/uninstall $out/logs
'';

11 changes: 0 additions & 11 deletions pkgs/applications/editors/quartus-prime/vsim.patch

This file was deleted.

4 changes: 2 additions & 2 deletions pkgs/applications/misc/ArchiSteamFarm/default.nix
Original file line number Diff line number Diff line change
@@ -2,11 +2,11 @@

stdenv.mkDerivation rec {
pname = "ArchiSteamFarm";
version = "4.2.2.1";
version = "4.2.3.3";

src = fetchurl {
url = "https://github.com/JustArchiNET/ArchiSteamFarm/releases/download/${version}/ASF-generic.zip";
sha256 = "0pr9rrhi44yl99c2i12rimmc4mhbh0ma9jn17cgsh8p0kbj8sq94";
sha256 = "0v69rrs5fr1n5llfx42xkiish52al7kb36fjy3ng0j9qfp3g8pj7";
};

nativeBuildInputs = [ unzip makeWrapper jq ];
5 changes: 3 additions & 2 deletions pkgs/applications/networking/protonvpn-cli-ng/default.nix
Original file line number Diff line number Diff line change
@@ -2,19 +2,20 @@

python3Packages.buildPythonApplication rec {
pname = "protonvpn-cli-ng";
version = "2.2.2";
version = "2.2.4";

src = fetchFromGitHub {
owner = "protonvpn";
repo = "${pname}";
rev = "v${version}";
sha256 = "0ixjb02kj4z79whm1izd8mrn2h0rp9cmw4im1qvp93rahqxdd4n8";
sha256 = "08yca0a0prrnrc7ir7ajd56yxvxpcs4m1k8f5kf273f5whgr7wzw";
};

propagatedBuildInputs = (with python3Packages; [
requests
docopt
setuptools
jinja2
pythondialog
]) ++ [
dialog
6 changes: 2 additions & 4 deletions pkgs/build-support/ocaml/oasis.nix
Original file line number Diff line number Diff line change
@@ -23,7 +23,7 @@ stdenv.mkDerivation (args // {
buildPhase = ''
runHook preBuild
oasis setup
ocaml setup.ml -configure
ocaml setup.ml -configure --prefix $OCAMLFIND_DESTDIR --exec-prefix $out
ocaml setup.ml -build
runHook postBuild
'';
@@ -37,9 +37,7 @@ stdenv.mkDerivation (args // {
installPhase = ''
runHook preInstall
mkdir -p $out
sed -i s+/usr/local+$out+g setup.ml
sed -i s+/usr/local+$out+g setup.data
prefix=$OCAMLFIND_DESTDIR ocaml setup.ml -install
ocaml setup.ml -install
runHook postInstall
'';

34 changes: 19 additions & 15 deletions pkgs/data/documentation/zeal/default.nix
Original file line number Diff line number Diff line change
@@ -1,40 +1,44 @@
{ stdenv, fetchFromGitHub, cmake, extra-cmake-modules, pkgconfig
, qtbase, qtimageformats, qtwebkit, qtx11extras, mkDerivation
, qtbase, qtimageformats, qtwebengine, qtx11extras, mkDerivation
, libarchive, libXdmcp, libpthreadstubs, xcbutilkeysyms }:

mkDerivation rec {
pname = "zeal";
version = "0.6.1";
version = "0.6.999";

src = fetchFromGitHub {
owner = "zealdocs";
repo = "zeal";
rev = "v${version}";
sha256 = "05qcjpibakv4ibhxgl5ajbkby3w7bkxsv3nfv2a0kppi1z0f8n8v";
owner = "zealdocs";
repo = "zeal";
rev = "1ce0e2e446232e7647c5588c1f603f1dd88e0f67";
sha256 = "0gj5qcm7ck8m5zfmiabay2f7wbxldmrkw8m3xi7v9i8y8hx0jkxr";
};

# while ads can be disabled from the user settings, by default they are not so
# we patch it out completely instead
patches = [ ./remove_ads.patch ];
# we only need this if we are using a version that hasn't been released. We
# could also match on the "VERSION x.y.z" bit but then it would have to be
# updated based on whatever is the latest release, so instead just rewrite the
# line.
postPatch = ''
sed -i CMakeLists.txt \
-e 's@^project.*@project(Zeal VERSION ${version})@'
'';

nativeBuildInputs = [ cmake extra-cmake-modules pkgconfig ];

buildInputs = [
qtbase qtimageformats qtwebkit qtx11extras
qtbase qtimageformats qtwebengine qtx11extras
libarchive
libXdmcp libpthreadstubs xcbutilkeysyms
];

enableParallelBuilding = true;

meta = with stdenv.lib; {
description = "A simple offline API documentation browser";
longDescription = ''
Zeal is a simple offline API documentation browser inspired by Dash (macOS
app), available for Linux and Windows.
'';
homepage = "https://zealdocs.org/";
license = licenses.gpl3;
homepage = "https://zealdocs.org/";
license = licenses.gpl3;
maintainers = with maintainers; [ skeidel peterhoeg ];
platforms = platforms.linux;
platforms = platforms.linux;
};
}
23 changes: 0 additions & 23 deletions pkgs/data/documentation/zeal/remove_ads.patch

This file was deleted.

6 changes: 3 additions & 3 deletions pkgs/development/tools/heroku/default.nix
Original file line number Diff line number Diff line change
@@ -2,11 +2,11 @@

stdenv.mkDerivation rec {
pname = "heroku";
version = "7.41.1";
version = "7.42.2";

src = fetchurl {
url = "https://cli-assets.heroku.com/heroku-v${version}/heroku-v${version}.tar.xz";
sha256 = "12ilk0rkpwx8n9b7dird2jfmwnkqndlwjf5wgdcbl014mkl1411b";
sha256 = "1fddqqn2nwvniignkq8d5jvh0217zb960s402h57l4wg3djq7phr";
};

nativeBuildInputs = [ makeWrapper ];
@@ -23,7 +23,7 @@ stdenv.mkDerivation rec {
'';

meta = {
homepage = "https://cli.heroku.com";
homepage = "https://devcenter.heroku.com/articles/heroku-cli";
description = "Everything you need to get started using Heroku";
maintainers = with lib.maintainers; [ aflatter mirdhyn peterhoeg marsam ];
license = lib.licenses.mit;
Loading