Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 6b4633884789
Choose a base ref
...
head repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 1a55b2b6b061
Choose a head ref
  • 19 commits
  • 19 files changed
  • 11 contributors

Commits on Sep 21, 2019

  1. orangefs: init at 2.9.7

    markuskowa committed Sep 21, 2019
    Copy the full SHA
    2906718 View commit details

Commits on Sep 25, 2019

  1. Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    8b4ce06 View commit details
  2. nixos/orangefs: add test

    markuskowa committed Sep 25, 2019
    Copy the full SHA
    7ced973 View commit details

Commits on Oct 28, 2019

  1. ec2-amis.nix: add 19.09 amis

    replace /home/deploy -> $HOME to allow running the script from outside
    the bastion.
    AmineChikhaoui committed Oct 28, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    dc13a7f View commit details

Commits on Oct 29, 2019

  1. forge: init at 1.0.4

    chessai committed Oct 29, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    5ac9eed View commit details

Commits on Oct 30, 2019

  1. Copy the full SHA
    d124858 View commit details
  2. firestarter: 1.7.3 -> 1.7.4

    astro committed Oct 30, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    0757b20 View commit details

Commits on Oct 31, 2019

  1. codeowners: add jonringer as vimplugin and vscode ext owner

    Jonathan Ringer committed Oct 31, 2019
    1
    Copy the full SHA
    4c810e7 View commit details
  2. stress-ng: 0.10.05 -> 0.10.08 (#72333)

    + fixes #72292
    c0bw3b authored Oct 31, 2019
    Copy the full SHA
    cbc94a0 View commit details
  3. welle-io: 1.0 -> 2.0

    markuskowa committed Oct 31, 2019
    Copy the full SHA
    b612241 View commit details
  4. cargo-audit: 0.9.3 -> 0.10.0

    0.10.0 (2019-10-13)
    
    * Upgrade rustsec to v0.16; new self-audit system (#155)
    * Upgrade to Abscissa v0.4; MSRV 1.36 (#154)
    basvandijk committed Oct 31, 2019
    Copy the full SHA
    e2b0849 View commit details
  5. nixos/orangefs: init at 2.9.7, add modules and test (#67591)

    nixos/orangefs: init at 2.9.7, add modules and test
    Mic92 authored Oct 31, 2019
    Copy the full SHA
    c91a1be View commit details
  6. Merge pull request #72355 from markuskowa/upd-welle

    welle-io: 1.0 -> 2.0
    mmahut authored Oct 31, 2019
    Copy the full SHA
    1d9e1d4 View commit details
  7. Merge pull request #72352 from jonringer/codeowner-vscode-vim

    codeowners: add jonringer as vimplugin and vscode ext owner
    mmahut authored Oct 31, 2019
    Copy the full SHA
    0bbd890 View commit details
  8. Merge pull request #72089 from prusnak/trezor-udev-rules

    trezor-udev-rules: init at unstable-2019-07-17
    mmahut authored Oct 31, 2019
    Copy the full SHA
    392b12f View commit details
  9. Merge pull request #72186 from AmineChikhaoui/ec2-19-09-amis

    ec2-amis.nix: add 19.09 amis
    grahamc authored Oct 31, 2019
    Copy the full SHA
    cda4a36 View commit details
  10. Merge pull request #71486 from chessai/forge-add

    forge: init at 1.0.4
    c0bw3b authored Oct 31, 2019
    Copy the full SHA
    ccae78c View commit details
  11. Merge pull request #72334 from astro/firestarter

    firestarter: 1.7.3 -> 1.7.4
    c0bw3b authored Oct 31, 2019
    Copy the full SHA
    46911eb View commit details
  12. Merge pull request #72356 from basvandijk/cargo-audit-0.10.0

    cargo-audit: 0.9.3 -> 0.10.0
    basvandijk authored Oct 31, 2019
    Copy the full SHA
    1a55b2b View commit details
6 changes: 6 additions & 0 deletions .github/CODEOWNERS
Original file line number Diff line number Diff line change
@@ -157,6 +157,12 @@
/pkgs/applications/editors/emacs @adisbladis
/pkgs/top-level/emacs-packages.nix @adisbladis

# VimPlugins
/pkgs/misc/vim-plugins @jonringer

# VsCode Extensions
/pkgs/misc/vscode-extensions @jonringer

# Prometheus exporter modules and tests
/nixos/modules/services/monitoring/prometheus/exporters.nix @WilliButz
/nixos/modules/services/monitoring/prometheus/exporters.xml @WilliButz
2 changes: 1 addition & 1 deletion nixos/maintainers/scripts/ec2/create-amis.sh
Original file line number Diff line number Diff line change
@@ -14,7 +14,7 @@
set -euo pipefail

# configuration
state_dir=/home/deploy/amis/ec2-images
state_dir=$HOME/amis/ec2-images
home_region=eu-west-1
bucket=nixos-amis

2 changes: 2 additions & 0 deletions nixos/modules/module-list.nix
Original file line number Diff line number Diff line change
@@ -550,6 +550,8 @@
./services/network-filesystems/nfsd.nix
./services/network-filesystems/openafs/client.nix
./services/network-filesystems/openafs/server.nix
./services/network-filesystems/orangefs/server.nix
./services/network-filesystems/orangefs/client.nix
./services/network-filesystems/rsyncd.nix
./services/network-filesystems/samba.nix
./services/network-filesystems/tahoe.nix
15 changes: 1 addition & 14 deletions nixos/modules/services/hardware/trezord.nix
Original file line number Diff line number Diff line change
@@ -44,20 +44,7 @@ in {
### implementation

config = mkIf cfg.enable {
services.udev.packages = lib.singleton (pkgs.writeTextFile {
name = "trezord-udev-rules";
destination = "/etc/udev/rules.d/51-trezor.rules";
text = ''
# TREZOR v1 (One)
SUBSYSTEM=="usb", ATTR{idVendor}=="534c", ATTR{idProduct}=="0001", MODE="0660", GROUP="trezord", TAG+="uaccess", SYMLINK+="trezor%n"
KERNEL=="hidraw*", ATTRS{idVendor}=="534c", ATTRS{idProduct}=="0001", MODE="0660", GROUP="trezord", TAG+="uaccess"
# TREZOR v2 (T)
SUBSYSTEM=="usb", ATTR{idVendor}=="1209", ATTR{idProduct}=="53c0", MODE="0660", GROUP="trezord", TAG+="uaccess", SYMLINK+="trezor%n"
SUBSYSTEM=="usb", ATTR{idVendor}=="1209", ATTR{idProduct}=="53c1", MODE="0660", GROUP="trezord", TAG+="uaccess", SYMLINK+="trezor%n"
KERNEL=="hidraw*", ATTRS{idVendor}=="1209", ATTRS{idProduct}=="53c1", MODE="0660", GROUP="trezord", TAG+="uaccess"
'';
});
services.udev.packages = [ pkgs.trezor-udev-rules ];

systemd.services.trezord = {
description = "TREZOR Bridge";
97 changes: 97 additions & 0 deletions nixos/modules/services/network-filesystems/orangefs/client.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,97 @@
{ config, lib, pkgs, ...} :

with lib;

let
cfg = config.services.orangefs.client;

in {
###### interface

options = {
services.orangefs.client = {
enable = mkEnableOption "OrangeFS client daemon";

extraOptions = mkOption {
type = with types; listOf str;
default = [];
description = "Extra command line options for pvfs2-client.";
};

fileSystems = mkOption {
description = ''
The orangefs file systems to be mounted.
This option is prefered over using <option>fileSystems</option> directly since
the pvfs client service needs to be running for it to be mounted.
'';

example = [{
mountPoint = "/orangefs";
target = "tcp://server:3334/orangefs";
}];

type = with types; listOf (submodule ({ ... } : {
options = {

mountPoint = mkOption {
type = types.str;
default = "/orangefs";
description = "Mount point.";
};

options = mkOption {
type = with types; listOf str;
default = [];
description = "Mount options";
};

target = mkOption {
type = types.str;
default = null;
example = "tcp://server:3334/orangefs";
description = "Target URL";
};
};
}));
};
};
};


###### implementation

config = mkIf cfg.enable {
environment.systemPackages = [ pkgs.orangefs ];

boot.supportedFilesystems = [ "pvfs2" ];
boot.kernelModules = [ "orangefs" ];

systemd.services.orangefs-client = {
requires = [ "network-online.target" ];
after = [ "network-online.target" ];

serviceConfig = {
Type = "simple";

ExecStart = ''
${pkgs.orangefs}/bin/pvfs2-client-core \
--logtype=syslog ${concatStringsSep " " cfg.extraOptions}
'';

TimeoutStopSec = "120";
};
};

systemd.mounts = map (fs: {
requires = [ "orangefs-client.service" ];
after = [ "orangefs-client.service" ];
bindsTo = [ "orangefs-client.service" ];
wantedBy = [ "remote-fs.target" ];
type = "pvfs2";
options = concatStringsSep "," fs.options;
what = fs.target;
where = fs.mountPoint;
}) cfg.fileSystems;
};
}

225 changes: 225 additions & 0 deletions nixos/modules/services/network-filesystems/orangefs/server.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,225 @@
{ config, lib, pkgs, ...} :

with lib;

let
cfg = config.services.orangefs.server;

aliases = mapAttrsToList (alias: url: alias) cfg.servers;

# Maximum handle number is 2^63
maxHandle = 9223372036854775806;

# One range of handles for each meta/data instance
handleStep = maxHandle / (length aliases) / 2;

fileSystems = mapAttrsToList (name: fs: ''
<FileSystem>
Name ${name}
ID ${toString fs.id}
RootHandle ${toString fs.rootHandle}
${fs.extraConfig}
<MetaHandleRanges>
${concatStringsSep "\n" (
imap0 (i: alias:
let
begin = i * handleStep + 3;
end = begin + handleStep - 1;
in "Range ${alias} ${toString begin}-${toString end}") aliases
)}
</MetaHandleRanges>
<DataHandleRanges>
${concatStringsSep "\n" (
imap0 (i: alias:
let
begin = i * handleStep + 3 + (length aliases) * handleStep;
end = begin + handleStep - 1;
in "Range ${alias} ${toString begin}-${toString end}") aliases
)}
</DataHandleRanges>
<StorageHints>
TroveSyncMeta ${if fs.troveSyncMeta then "yes" else "no"}
TroveSyncData ${if fs.troveSyncData then "yes" else "no"}
${fs.extraStorageHints}
</StorageHints>
</FileSystem>
'') cfg.fileSystems;

configFile = ''
<Defaults>
LogType ${cfg.logType}
DataStorageSpace ${cfg.dataStorageSpace}
MetaDataStorageSpace ${cfg.metadataStorageSpace}
BMIModules ${concatStringsSep "," cfg.BMIModules}
${cfg.extraDefaults}
</Defaults>
${cfg.extraConfig}
<Aliases>
${concatStringsSep "\n" (mapAttrsToList (alias: url: "Alias ${alias} ${url}") cfg.servers)}
</Aliases>
${concatStringsSep "\n" fileSystems}
'';

in {
###### interface

options = {
services.orangefs.server = {
enable = mkEnableOption "OrangeFS server";

logType = mkOption {
type = with types; enum [ "file" "syslog" ];
default = "syslog";
description = "Destination for log messages.";
};

dataStorageSpace = mkOption {
type = types.str;
default = null;
example = "/data/storage";
description = "Directory for data storage.";
};

metadataStorageSpace = mkOption {
type = types.str;
default = null;
example = "/data/meta";
description = "Directory for meta data storage.";
};

BMIModules = mkOption {
type = with types; listOf str;
default = [ "bmi_tcp" ];
example = [ "bmi_tcp" "bmi_ib"];
description = "List of BMI modules to load.";
};

extraDefaults = mkOption {
type = types.lines;
default = "";
description = "Extra config for <literal>&lt;Defaults&gt;</literal> section.";
};

extraConfig = mkOption {
type = types.lines;
default = "";
description = "Extra config for the global section.";
};

servers = mkOption {
type = with types; attrsOf types.str;
default = {};
example = ''
{
node1="tcp://node1:3334";
node2="tcp://node2:3334";
}
'';
description = "URLs for storage server including port. The attribute names define the server alias.";
};

fileSystems = mkOption {
description = ''
These options will create the <literal>&lt;FileSystem&gt;</literal> sections of config file.
'';
default = { orangefs = {}; };
defaultText = literalExample "{ orangefs = {}; }";
example = literalExample ''
{
fs1 = {
id = 101;
};
fs2 = {
id = 102;
};
}
'';
type = with types; attrsOf (submodule ({ ... } : {
options = {
id = mkOption {
type = types.int;
default = 1;
description = "File system ID (must be unique within configuration).";
};

rootHandle = mkOption {
type = types.int;
default = 3;
description = "File system root ID.";
};

extraConfig = mkOption {
type = types.lines;
default = "";
description = "Extra config for <literal>&lt;FileSystem&gt;</literal> section.";
};

troveSyncMeta = mkOption {
type = types.bool;
default = true;
description = "Sync meta data.";
};

troveSyncData = mkOption {
type = types.bool;
default = false;
description = "Sync data.";
};

extraStorageHints = mkOption {
type = types.lines;
default = "";
description = "Extra config for <literal>&lt;StorageHints&gt;</literal> section.";
};
};
}));
};
};
};

###### implementation

config = mkIf cfg.enable {
environment.systemPackages = [ pkgs.orangefs ];

# orangefs daemon will run as user
users.users.orangefs.isSystemUser = true;
users.groups.orangefs = {};

# To format the file system the config file is needed.
environment.etc."orangefs/server.conf" = {
text = configFile;
user = "orangefs";
group = "orangefs";
};

systemd.services.orangefs-server = {
wantedBy = [ "multi-user.target" ];
requires = [ "network-online.target" ];
after = [ "network-online.target" ];

serviceConfig = {
# Run as "simple" in forground mode.
# This is more reliable
ExecStart = ''
${pkgs.orangefs}/bin/pvfs2-server -d \
/etc/orangefs/server.conf
'';
TimeoutStopSec = "120";
User = "orangefs";
Group = "orangefs";
};
};
};

}
18 changes: 17 additions & 1 deletion nixos/modules/virtualisation/ec2-amis.nix
Original file line number Diff line number Diff line change
@@ -291,5 +291,21 @@ let self = {
"19.03".sa-east-1.hvm-ebs = "ami-0c6a43c6e0ad1f4e2";
"19.03".ap-south-1.hvm-ebs = "ami-0303deb1b5890f878";

latest = self."19.03";
# 19.09.981.205691b7cbe
"19.09".eu-west-1.hvm-ebs = "ami-0ebd3156e21e9642f";
"19.09".eu-west-2.hvm-ebs = "ami-02a2b5480a79084b7";
"19.09".eu-west-3.hvm-ebs = "ami-09aa175c7588734f7";
"19.09".eu-central-1.hvm-ebs = "ami-00a7fafd7e237a330";
"19.09".us-east-1.hvm-ebs = "ami-00a8eeaf232a74f84";
"19.09".us-east-2.hvm-ebs = "ami-093efd3a57a1e03a8";
"19.09".us-west-1.hvm-ebs = "ami-0913e9a2b677fac30";
"19.09".us-west-2.hvm-ebs = "ami-02d9a19f77b47882a";
"19.09".ca-central-1.hvm-ebs = "ami-0627dd3f7b3627a29";
"19.09".ap-southeast-1.hvm-ebs = "ami-083614e4d08f2164d";
"19.09".ap-southeast-2.hvm-ebs = "ami-0048c704185ded6dc";
"19.09".ap-northeast-1.hvm-ebs = "ami-0329e7fc2d7f60bd0";
"19.09".ap-northeast-2.hvm-ebs = "ami-03d4ae7d0b5fc364f";
"19.09".ap-south-1.hvm-ebs = "ami-0b599690b35aeef23";

latest = self."19.09";
}; in self
Loading