Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 17b5c0297595
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 72158c231ae4
Choose a head ref

Commits on Mar 24, 2020

  1. Copy the full SHA
    75afd2f View commit details

Commits on May 25, 2020

  1. networking-interfaces.nix: remove broken NDP bits from proxyARP

    The `networking.interfaces.<name?>.proxyARP` option previously mentioned it would also enable IPv6 forwarding and `proxy_ndp`.
    
    However, the `proxy_ndp` option was never actually set (the non-existing `net.ipv6.conf.proxy_arp` sysctl was set
    instead). In addition `proxy_ndp` also needs individual entries for each ip to proxy for.
    
    Proxy ARP and Proxy NDP are two different concepts, and enabling the latter
    should be a conscious decision.
    
    This commit removes the broken NDP support, and disables explicitly
    enabling IPv6 forwarding (which is the default in most cases anyways)
    
    Fixes #62339.
    Doro Rose committed May 25, 2020
    Copy the full SHA
    5d3a72f View commit details

Commits on May 30, 2020

  1. Copy the full SHA
    9b5df08 View commit details
  2. out-of-tree: 1.2.1 -> 1.3.0

    jollheef committed May 30, 2020
    Copy the full SHA
    3f99cc7 View commit details
  3. intel-media-sdk: remove samples

    fix #88939
    midchildan committed May 30, 2020
    Copy the full SHA
    22ff785 View commit details

Commits on May 31, 2020

  1. todoist-electron: 1.20 -> 1.22

    Imran Hossain committed May 31, 2020
    Copy the full SHA
    7fb8730 View commit details
  2. Copy the full SHA
    4983263 View commit details
  3. gnuchess: 6.2.6 -> 6.2.7

    lsix committed May 31, 2020
    Copy the full SHA
    7c3ff4d View commit details
  4. rabbitmq: fix darwin build

    ed16f83 made all dependencies explicit, including systemd, which makes the
    build step to fail on macOS. Here systemd is added to runtimePath only if the
    target system is Linux
    tssm authored and veprbl committed May 31, 2020
    Copy the full SHA
    0e3a28a View commit details
  5. cawbird: 1.0.5 -> 1.1.0

    schmittlauch committed May 31, 2020
    Copy the full SHA
    4e45534 View commit details
  6. v2ray: 4.23.0 -> 4.23.2

    servalcatty committed May 31, 2020
    Copy the full SHA
    25776e4 View commit details
  7. Copy the full SHA
    14fceb0 View commit details
  8. Copy the full SHA
    e90c5fe View commit details
  9. Copy the full SHA
    f32733f View commit details
  10. Copy the full SHA
    5e898d1 View commit details
  11. Merge pull request #89223 from midchildan/cleanup/intel-media-sdk

     intel-media-sdk: remove samples
    flokli authored May 31, 2020
    Copy the full SHA
    5cad739 View commit details
  12. Merge pull request #62671 from kfiz/networking-proxy_arp-fix

     tasks/network-interfaces.nix: Enable ip_forwarding for ipv4 and p…
    flokli authored May 31, 2020
    Copy the full SHA
    4cd605f View commit details
  13. nixos/haproxy: add reloading support, use upstream service hardening

    Refactor the systemd service definition for the haproxy reverse proxy,
    using the upstream systemd service definition. This allows the service
    to be reloaded on changes, preserving existing server state, and adds
    some hardening options.
    pstch committed May 31, 2020
    Copy the full SHA
    c784d3a View commit details
  14. Merge pull request #88434 from pstch/patch-2

    nixos/haproxy: add reloading support, use upstream service hardening
    flokli authored May 31, 2020
    Copy the full SHA
    09a7612 View commit details
  15. Merge pull request #89258 from lsix/gnuchess-6.2.7

    gnuchess: 6.2.6 -> 6.2.7
    Ma27 authored May 31, 2020
    Copy the full SHA
    5a75e74 View commit details
  16. Merge pull request #89256 from i077/todoist-electron/1.22

    todoist-electron: 1.20 -> 1.22
    Ma27 authored May 31, 2020
    Copy the full SHA
    ad40d3e View commit details
  17. Merge pull request #83307 from servalcatty/fix/v2ray-check

    nixos/v2ray: check v2ray config during the build time
    marsam authored May 31, 2020
    Copy the full SHA
    c9d9ba0 View commit details
  18. Merge pull request #89261 from servalcatty/v2ray

    v2ray: 4.23.0 -> 4.23.2
    marsam authored May 31, 2020
    Copy the full SHA
    579ab87 View commit details
  19. Merge pull request #89220 from jollheef/out-of-tree-v1.3.0

    out-of-tree: 1.2.1 -> 1.3.0
    marsam authored May 31, 2020
    Copy the full SHA
    56a111c View commit details
  20. Merge pull request #89202 from plumelo/attlasian-jira-8.9.0

    atlassian-jira: 8.8.0 -> 8.9.0
    marsam authored May 31, 2020
    Copy the full SHA
    72158c2 View commit details
32 changes: 28 additions & 4 deletions nixos/modules/services/networking/haproxy.nix
Original file line number Diff line number Diff line change
@@ -56,6 +56,9 @@ with lib;
message = "You must provide services.haproxy.config.";
}];

# configuration file indirection is needed to support reloading
environment.etc."haproxy.cfg".source = haproxyCfg;

systemd.services.haproxy = {
description = "HAProxy";
after = [ "network.target" ];
@@ -64,11 +67,32 @@ with lib;
User = cfg.user;
Group = cfg.group;
Type = "notify";
# when running the config test, don't be quiet so we can see what goes wrong
ExecStartPre = "${pkgs.haproxy}/sbin/haproxy -c -f ${haproxyCfg}";
ExecStart = "${pkgs.haproxy}/sbin/haproxy -Ws -f ${haproxyCfg}";
Restart = "on-failure";
ExecStartPre = [
# when the master process receives USR2, it reloads itself using exec(argv[0]),
# so we create a symlink there and update it before reloading
"${pkgs.coreutils}/bin/ln -sf ${pkgs.haproxy}/sbin/haproxy /run/haproxy/haproxy"
# when running the config test, don't be quiet so we can see what goes wrong
"/run/haproxy/haproxy -c -f ${haproxyCfg}"
];
ExecStart = "/run/haproxy/haproxy -Ws -f /etc/haproxy.cfg -p /run/haproxy/haproxy.pid";
# support reloading
ExecReload = [
"${pkgs.haproxy}/sbin/haproxy -c -f ${haproxyCfg}"
"${pkgs.coreutils}/bin/ln -sf ${pkgs.haproxy}/sbin/haproxy /run/haproxy/haproxy"
"${pkgs.coreutils}/bin/kill -USR2 $MAINPID"
];
KillMode = "mixed";
SuccessExitStatus = "143";
Restart = "always";
RuntimeDirectory = "haproxy";
# upstream hardening options
NoNewPrivileges = true;
ProtectHome = true;
ProtectSystem = "strict";
ProtectKernelTunables = true;
ProtectKernelModules = true;
ProtectControlGroups = true;
SystemCallFilter= "~@cpu-emulation @keyring @module @obsolete @raw-io @reboot @swap @sync";
# needed in case we bind to port < 1024
AmbientCapabilities = "CAP_NET_BIND_SERVICE";
};
8 changes: 7 additions & 1 deletion nixos/modules/services/networking/v2ray.nix
Original file line number Diff line number Diff line change
@@ -58,7 +58,13 @@ with lib;
cfg = config.services.v2ray;
configFile = if cfg.configFile != null
then cfg.configFile
else (pkgs.writeText "v2ray.json" (builtins.toJSON cfg.config));
else pkgs.writeTextFile {
name = "v2ray.json";
text = builtins.toJSON cfg.config;
checkPhase = ''
${pkgs.v2ray}/bin/v2ray -test -config $out
'';
};

in mkIf cfg.enable {
assertions = [
6 changes: 3 additions & 3 deletions nixos/modules/tasks/network-interfaces.nix
Original file line number Diff line number Diff line change
@@ -283,7 +283,7 @@ let
default = false;
type = types.bool;
description = ''
Turn on proxy_arp for this device (and proxy_ndp for ipv6).
Turn on proxy_arp for this device.
This is mainly useful for creating pseudo-bridges between a real
interface and a virtual network such as VPN or a virtual machine for
interfaces that don't support real bridging (most wlan interfaces).
@@ -1065,11 +1065,11 @@ in
optionalString hasBonds "options bonding max_bonds=0";

boot.kernel.sysctl = {
"net.ipv4.conf.all.forwarding" = mkDefault (any (i: i.proxyARP) interfaces);
"net.ipv6.conf.all.disable_ipv6" = mkDefault (!cfg.enableIPv6);
"net.ipv6.conf.default.disable_ipv6" = mkDefault (!cfg.enableIPv6);
"net.ipv6.conf.all.forwarding" = mkDefault (any (i: i.proxyARP) interfaces);
} // listToAttrs (flip concatMap (filter (i: i.proxyARP) interfaces)
(i: forEach [ "4" "6" ] (v: nameValuePair "net.ipv${v}.conf.${replaceChars ["."] ["/"] i.name}.proxy_arp" true)))
(i: [(nameValuePair "net.ipv4.conf.${replaceChars ["."] ["/"] i.name}.proxy_arp" true)]))
// listToAttrs (forEach interfaces
(i: let
opt = i.tempAddress;
8 changes: 8 additions & 0 deletions nixos/tests/haproxy.nix
Original file line number Diff line number Diff line change
@@ -43,5 +43,13 @@ import ./make-test-python.nix ({ pkgs, ...}: {
assert "haproxy_process_pool_allocated_bytes" in machine.succeed(
"curl -k http://localhost:80/metrics"
)
with subtest("reload"):
machine.succeed("systemctl reload haproxy")
# wait some time to ensure the following request hits the reloaded haproxy
machine.sleep(5)
assert "We are all good!" in machine.succeed(
"curl -k http://localhost:80/index.txt"
)
'';
})
4 changes: 2 additions & 2 deletions pkgs/applications/misc/todoist-electron/default.nix
Original file line number Diff line number Diff line change
@@ -4,11 +4,11 @@

stdenv.mkDerivation rec {
pname = "todoist-electron";
version = "1.20";
version = "1.22";

src = fetchurl {
url = "https://github.com/KryDos/todoist-linux/releases/download/${version}/Todoist_${version}.0_amd64.deb";
sha256 = "0w885xqy1304cp6b0jll5lvm6b1zd1ciqjl97d2hkdi8c9gv3bqx";
sha256 = "09w2040xkvv78190fmhx99c0dwy7vpab5fvxs67s7yyjwh5n4693";
};

desktopItem = makeDesktopItem {
4 changes: 2 additions & 2 deletions pkgs/applications/misc/udiskie/default.nix
Original file line number Diff line number Diff line change
@@ -6,13 +6,13 @@

python3Packages.buildPythonApplication rec {
pname = "udiskie";
version = "2.1.0";
version = "2.2.0";

src = fetchFromGitHub {
owner = "coldfix";
repo = "udiskie";
rev = version;
sha256 = "1d8fz0jrnpgldvdwpl27az2kjhpbcjd8nqn3qc2v6682q12p3jqb";
sha256 = "0kn5w6bm3rmbszphzbxpjfnkawb2naa230svzkpmh3n6dcdvk4qa";
};

nativeBuildInputs = [
4 changes: 2 additions & 2 deletions pkgs/applications/networking/cawbird/default.nix
Original file line number Diff line number Diff line change
@@ -20,14 +20,14 @@
}:

stdenv.mkDerivation rec {
version = "1.0.5";
version = "1.1.0";
pname = "cawbird";

src = fetchFromGitHub {
owner = "IBBoard";
repo = "cawbird";
rev = "v${version}";
sha256 = "sha256:0prrrkgmnm78sq2c6yvy86qb3lcl51d250q7gvmqili2ffnjmamf";
sha256 = "sha256:0zghryx5y47ff8kxa65lvgmy1cnhvhazxml7r1lxixxj3d88wh7p";
};

nativeBuildInputs = [
16 changes: 11 additions & 5 deletions pkgs/development/libraries/intel-media-sdk/default.nix
Original file line number Diff line number Diff line change
@@ -1,6 +1,5 @@
{ stdenv, fetchurl, autoPatchelfHook, cmake, pkgconfig, libdrm, libpciaccess
, libva , libX11, libXau, libXdmcp, libpthreadstubs
}:
{ stdenv, fetchurl, cmake, pkgconfig, gtest, libdrm, libpciaccess, libva, libX11
, libXau, libXdmcp, libpthreadstubs }:

stdenv.mkDerivation rec {
pname = "intel-media-sdk";
@@ -11,12 +10,19 @@ stdenv.mkDerivation rec {
sha256 = "1p13b4abslq31pbgqf0bzs2ixns85yfdsm94326h2vcg0q7hqc24";
};

# patchelf is needed for binaries in $out/share/samples
nativeBuildInputs = [ autoPatchelfHook cmake pkgconfig ];
nativeBuildInputs = [ cmake pkgconfig ];
buildInputs = [
libdrm libva libpciaccess libX11 libXau libXdmcp libpthreadstubs
];
checkInputs = [ gtest ];

cmakeFlags = [
"-DBUILD_SAMPLES=OFF"
"-DBUILD_TESTS=${if doCheck then "ON" else "OFF"}"
"-DUSE_SYSTEM_GTEST=ON"
];

doCheck = true;
enableParallelBuild = true;

meta = with stdenv.lib; {
12 changes: 5 additions & 7 deletions pkgs/development/tools/out-of-tree/default.nix
Original file line number Diff line number Diff line change
@@ -1,20 +1,18 @@
{ stdenv, buildGoPackage, fetchgit, qemu, docker, which, makeWrapper }:
{ stdenv, buildGoModule, fetchgit, qemu, docker, which, makeWrapper }:

buildGoPackage rec {
buildGoModule rec {
pname = "out-of-tree";
version = "1.2.1";
version = "1.3.0";

buildInputs = [ makeWrapper ];

goPackagePath = "code.dumpstack.io/tools/${pname}";

src = fetchgit {
rev = "refs/tags/v${version}";
url = "https://code.dumpstack.io/tools/${pname}.git";
sha256 = "0wh4yh865wgl3hs203ncdjh1gaxznmhxdg56mciibng0dghgyw7n";
sha256 = "02xh23nbwyyf087jqkm97jbnwpja1myaz190q5r166mpwcdpz2dn";
};

goDeps = ./deps.nix;
vendorSha256 = "1dk0cipdgj2yyg1bc9l7nvy4y373pmqwy8xiyc0wg7pchb4h9p7s";

postFixup = ''
wrapProgram $out/bin/out-of-tree \
120 changes: 0 additions & 120 deletions pkgs/development/tools/out-of-tree/deps.nix

This file was deleted.

4 changes: 2 additions & 2 deletions pkgs/games/gnuchess/default.nix
Original file line number Diff line number Diff line change
@@ -3,10 +3,10 @@ let
s = # Generated upstream information
rec {
baseName="gnuchess";
version="6.2.6";
version="6.2.7";
name="${baseName}-${version}";
url="mirror://gnu/chess/${name}.tar.gz";
sha256="0kxhdv01ia91v2y0cmzbll391ns2vbmn65jjrv37h4s1srszh5yn";
sha256="0ilq4bfl0lwyzf11q7n2skydjhalfn3bgxhrp5hjxs5bc5d6fdp5";
};
buildInputs = [
flex
4 changes: 2 additions & 2 deletions pkgs/os-specific/linux/wireguard/default.nix
Original file line number Diff line number Diff line change
@@ -7,11 +7,11 @@ assert stdenv.lib.versionOlder kernel.version "5.6";

stdenv.mkDerivation rec {
pname = "wireguard";
version = "1.0.20200506";
version = "1.0.20200520";

src = fetchzip {
url = "https://git.zx2c4.com/wireguard-linux-compat/snapshot/wireguard-linux-compat-${version}.tar.xz";
sha256 = "05dphmcxm3lg860r5bj1b995avh43d1pap8p18p4ig4kv2r2g9nq";
sha256 = "1zggpm0zh6m30b9mchj3bg3z721k346r5m5a130inp779s4xm0sm";
};

hardeningDisable = [ "pic" ];
6 changes: 3 additions & 3 deletions pkgs/servers/amqp/rabbitmq-server/default.nix
Original file line number Diff line number Diff line change
@@ -29,12 +29,12 @@ stdenv.mkDerivation rec {
export LANG=C.UTF-8 # fix elixir locale warning
'';

runtimePath = stdenv.lib.makeBinPath [
runtimePath = stdenv.lib.makeBinPath ([
erlang
getconf # for getting memory limits
socat systemd procps # for systemd unit activation check
socat procps
gnused coreutils # used by helper scripts
];
] ++ stdenv.lib.optionals stdenv.isLinux [ systemd ]); # for systemd unit activation check
postInstall = ''
# rabbitmq-env calls to sed/coreutils, so provide everything early
sed -i $out/sbin/rabbitmq-env -e '2s|^|PATH=${runtimePath}\''${PATH:+:}\$PATH/\n|'
4 changes: 2 additions & 2 deletions pkgs/servers/atlassian/jira.nix
Original file line number Diff line number Diff line change
@@ -8,11 +8,11 @@

stdenv.mkDerivation rec {
pname = "atlassian-jira";
version = "8.8.0";
version = "8.9.0";

src = fetchurl {
url = "https://product-downloads.atlassian.com/software/jira/downloads/atlassian-jira-software-${version}.tar.gz";
sha256 = "1gn0iknli8pi3c3kxb8hdn19wzn2fx0193ppf0niw3cqf1h2c5cz";
sha256 = "1rpibkp57nw084yd018924g1mdcqk8gnj99m85fmmhpppgbh9ca9";
};

buildPhase = ''
4 changes: 2 additions & 2 deletions pkgs/tools/misc/diffoscope/default.nix
Original file line number Diff line number Diff line change
@@ -9,11 +9,11 @@
# Note: when upgrading this package, please run the list-missing-tools.sh script as described below!
python3Packages.buildPythonApplication rec {
pname = "diffoscope";
version = "144";
version = "146";

src = fetchurl {
url = "https://diffoscope.org/archive/diffoscope-${version}.tar.bz2";
sha256 = "1n916k6z35c8ffksjjglkbl52jjhjv3899w230sg7k4ayzylj6zi";
sha256 = "1iy4f05ws7qsd5p7hadc1979l77543pwi2c5zx1yr5zc674kwb3y";
};

outputs = [ "out" "man" ];
Loading