Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 7808b5d3ce8f
Choose a base ref
...
head repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 375c381f7f86
Choose a head ref

Commits on Mar 10, 2020

  1. afew: 2.0.0 -> 3.0.0

    MailMover: many fixes
    
      Previously, MailMover didn't properly preserve flags when renaming files, and
      moved all mail to `cur`. This was fixed. Also, MailMover gained a test suite.
    
    New filters: PropagateTags[ByRegex]InThreadFilter
    
      These filters allow propagating tags set to a message to the whole thread.
    
    New command line argument: --notmuch-args= in move mode
    
      In move mode, afew calls `notmuch new` after moving mails around. This
      prevents `afew -m` from being used in a pre-new hook in `notmuch`.
    
      Now it's possible to specify notmuch args, so something like `afew -m
      --notmuch-args=--no-hooks` can live happily in a pre-new hook.
    
    Python 3.4 and 3.5 support dropped
    
      afew stopped supporting the older python versions 3.4 and 3.5, and removed
      some more Python 2 compatibility code. (`from __future__ import …`, utf-8
      headers, relative imports, …)
    flokli committed Mar 10, 2020
    Copy the full SHA
    906dccf View commit details

Commits on Mar 24, 2020

  1. znapzend: 0.18.0 -> 0.20.0

    * Update znapzend and the dependencies
    * add autoreconfHook
    Rail Aliiev committed Mar 24, 2020
    Copy the full SHA
    0c08595 View commit details
  2. Add new znapzend features to modules

    Rail Aliiev committed Mar 24, 2020
    Copy the full SHA
    ba7e3c6 View commit details

Commits on Apr 27, 2020

  1. Copy the full SHA
    730d542 View commit details
  2. firefox: wrapper: use ffmpeg_4 for vaapi

    without this, adding libva is insufficient to get VA-API working in
    Firefox.
    colemickens committed Apr 27, 2020
    Copy the full SHA
    552d729 View commit details

Commits on May 4, 2020

  1. nixos/hostapd: use CRDA

    Needed for regulatory compliance and unlocking some channels.
    rardiol committed May 4, 2020
    Copy the full SHA
    151d32d View commit details
  2. Copy the full SHA
    c09c054 View commit details
  3. Copy the full SHA
    d6d0442 View commit details
  4. Copy the full SHA
    c683bee View commit details
  5. stella: 6.1.1 -> 6.1.2

    r-ryantm committed May 4, 2020
    Copy the full SHA
    d33679a View commit details
  6. Copy the full SHA
    be75fae View commit details
  7. Copy the full SHA
    e31b4c3 View commit details
  8. Copy the full SHA
    55e40ed View commit details
  9. bmake: 20200318 -> 20200402

    r-ryantm committed May 4, 2020
    Copy the full SHA
    4748748 View commit details
  10. criu: 3.13 -> 3.14

    r-ryantm committed May 4, 2020
    Copy the full SHA
    6967ad7 View commit details

Commits on May 5, 2020

  1. Copy the full SHA
    a55b736 View commit details
  2. hwinfo: 21.69 -> 21.70

    r-ryantm committed May 5, 2020
    Copy the full SHA
    03369ef View commit details
  3. gromacs: 2020.1 -> 2020.2

    r-ryantm committed May 5, 2020
    Copy the full SHA
    ed55750 View commit details
  4. ninjas2: init at 0.2.0

    magnetophon committed May 5, 2020
    Copy the full SHA
    ad62779 View commit details
  5. Copy the full SHA
    c013748 View commit details
  6. gthumb: 3.8.3 -> 3.10.0

    r-ryantm committed May 5, 2020
    Copy the full SHA
    67ee391 View commit details
  7. spotify-tui: 0.18.0 -> 0.19.0

    marsam committed May 5, 2020
    Copy the full SHA
    6898f49 View commit details
  8. Copy the full SHA
    7f306cd View commit details
  9. Copy the full SHA
    07f093f View commit details
  10. Copy the full SHA
    53dd392 View commit details
  11. Copy the full SHA
    8277f8a View commit details
  12. Copy the full SHA
    4cd1b7a View commit details
  13. Copy the full SHA
    f68a003 View commit details
  14. Copy the full SHA
    ce6107b View commit details
  15. sd: 0.7.4 -> 0.7.5

    Br1ght0ne committed May 5, 2020
    Copy the full SHA
    65a8e78 View commit details
  16. Copy the full SHA
    d3c814b View commit details
  17. Copy the full SHA
    53effac View commit details
  18. jbake: 2.6.4 -> 2.6.5

    r-ryantm committed May 5, 2020
    Copy the full SHA
    ca141f7 View commit details
  19. khard: 0.16.0 -> 0.16.1

    r-ryantm committed May 5, 2020
    Copy the full SHA
    b337337 View commit details
  20. nixos/systemd/resolved: add resolve to nss hosts database if enabled

    We keep the "only add the nss module if nscd is enabled" logic for now.
    
    The assertion never was triggered, so it can be removed.
    flokli committed May 5, 2020
    Copy the full SHA
    7426bec View commit details
  21. nixos/systemd: move NSS module logic to systemd module

    We keep the conditional on only adding if nscd is enabled for now.
    flokli committed May 5, 2020
    Copy the full SHA
    c0995d2 View commit details
  22. Copy the full SHA
    ff0da3a View commit details
  23. Merge pull request #86942 from r-ryantm/auto-update/khard

    khard: 0.16.0 -> 0.16.1
    Mic92 authored May 5, 2020
    Copy the full SHA
    34b9b13 View commit details
  24. Copy the full SHA
    4c9d179 View commit details
  25. Merge pull request #86941 from r-ryantm/auto-update/jbake

    jbake: 2.6.4 -> 2.6.5
    Mic92 authored May 5, 2020
    Copy the full SHA
    2c3e8e6 View commit details
  26. Merge pull request #86935 from marsam/update-git-subtrac

    gitAndTools.git-subtrac: 0.01 -> 0.02
    Mic92 authored May 5, 2020
    Copy the full SHA
    694ac1b View commit details
  27. golangci-lint: 1.25.1 -> 1.26.0

    Signed-off-by: Vincent Demeester <vincent@sbr.pm>
    vdemeester committed May 5, 2020
    Copy the full SHA
    96274c6 View commit details
  28. languagetool: 4.9 -> 4.9.1

    r-ryantm committed May 5, 2020
    Copy the full SHA
    3da38dd View commit details
  29. Copy the full SHA
    3a901d2 View commit details
  30. Copy the full SHA
    87b3ad9 View commit details
  31. Merge pull request #86887 from r-ryantm/auto-update/gromacs

    gromacs: 2020.1 -> 2020.2
    markuskowa authored May 5, 2020
    Copy the full SHA
    73dc3fc View commit details
  32. Merge pull request #86712 from rardiol/hostapd

    nixos/hostapd: country selection, CRDA, logging
    Lassulus authored May 5, 2020
    Copy the full SHA
    ef0f57f View commit details
  33. just: use installShellFiles

    xrelkd authored and Lassulus committed May 5, 2020
    Copy the full SHA
    8085245 View commit details
  34. elixir_1_10: 1.10.2 -> 1.10.3

    cw789 authored and Lassulus committed May 5, 2020
    Copy the full SHA
    e506284 View commit details
  35. Copy the full SHA
    37676e7 View commit details
Showing with 488 additions and 297 deletions.
  1. +10 −0 maintainers/maintainer-list.nix
  2. +0 −20 nixos/modules/config/nsswitch.nix
  3. +35 −0 nixos/modules/services/backup/znapzend.nix
  4. +35 −2 nixos/modules/services/networking/hostapd.nix
  5. +1 −1 nixos/modules/services/x11/desktop-managers/pantheon.nix
  6. +4 −0 nixos/modules/system/boot/resolved.nix
  7. +21 −0 nixos/modules/system/boot/systemd.nix
  8. +11 −2 nixos/modules/virtualisation/qemu-vm.nix
  9. +1 −0 nixos/tests/all-tests.nix
  10. +31 −0 nixos/tests/systemd-boot.nix
  11. +2 −2 pkgs/applications/audio/faust/faust2jack.nix
  12. +2 −2 pkgs/applications/audio/faust/faust2jaqt.nix
  13. +39 −0 pkgs/applications/audio/ninjas2/default.nix
  14. +6 −6 pkgs/applications/audio/spotify-tui/default.nix
  15. +2 −2 pkgs/applications/blockchains/particl/particl-core.nix
  16. +2 −2 pkgs/applications/editors/leo-editor/default.nix
  17. +2 −2 pkgs/applications/editors/tiled/default.nix
  18. +2 −2 pkgs/applications/gis/saga/default.nix
  19. +2 −2 pkgs/applications/graphics/gthumb/default.nix
  20. +2 −2 pkgs/applications/misc/calibre/default.nix
  21. +2 −2 pkgs/applications/misc/curaengine/default.nix
  22. +2 −2 pkgs/applications/misc/gcalcli/default.nix
  23. +2 −2 pkgs/applications/misc/khard/default.nix
  24. +2 −2 pkgs/applications/misc/klayout/default.nix
  25. +2 −2 pkgs/applications/misc/minder/default.nix
  26. +2 −2 pkgs/applications/misc/moolticute/default.nix
  27. +2 −2 pkgs/applications/misc/xiphos/default.nix
  28. +4 −3 pkgs/applications/networking/browsers/firefox/wrapper.nix
  29. +7 −3 pkgs/applications/networking/mailreaders/afew/default.nix
  30. +3 −3 pkgs/applications/networking/syncthing/default.nix
  31. +2 −2 pkgs/applications/office/homebank/default.nix
  32. +2 −2 pkgs/applications/radio/dablin/default.nix
  33. +2 −2 pkgs/applications/radio/fldigi/default.nix
  34. +2 −2 pkgs/applications/radio/urh/default.nix
  35. +48 −0 pkgs/applications/science/astronomy/kstars/default.nix
  36. +2 −2 pkgs/applications/science/math/mathematica/10.nix
  37. +2 −2 pkgs/applications/science/math/mathematica/11.nix
  38. +2 −2 pkgs/applications/science/math/mathematica/9.nix
  39. +2 −2 pkgs/applications/science/math/mathematica/default.nix
  40. +3 −3 pkgs/applications/science/molecular-dynamics/gromacs/default.nix
  41. +2 −2 pkgs/applications/version-management/git-and-tools/git-subtrac/default.nix
  42. +2 −2 pkgs/applications/video/p2pvc/default.nix
  43. +2 −2 pkgs/development/compilers/closure/default.nix
  44. +2 −2 pkgs/development/interpreters/elixir/1.10.nix
  45. +2 −2 pkgs/development/libraries/faudio/default.nix
  46. +2 −2 pkgs/development/libraries/intel-media-sdk/default.nix
  47. +2 −2 pkgs/development/libraries/libgnurl/default.nix
  48. +2 −9 pkgs/development/libraries/libjcat/default.nix
  49. +2 −2 pkgs/development/libraries/rdkafka/default.nix
  50. +2 −2 pkgs/development/python-modules/ansible/default.nix
  51. +4 −0 pkgs/development/python-modules/powerline/default.nix
  52. +0 −26 pkgs/development/python-modules/pymssql/default.nix
  53. +3 −1 pkgs/development/python-modules/rl-coach/default.nix
  54. +2 −2 pkgs/development/tools/analysis/hopper/default.nix
  55. +2 −2 pkgs/development/tools/build-managers/bmake/default.nix
  56. +2 −2 pkgs/development/tools/build-managers/mill/default.nix
  57. +3 −3 pkgs/development/tools/golangci-lint/default.nix
  58. +2 −2 pkgs/development/tools/jbake/default.nix
  59. +8 −7 pkgs/development/tools/just/default.nix
  60. +2 −2 pkgs/development/tools/kubectx/default.nix
  61. +2 −2 pkgs/development/tools/omnisharp-roslyn/default.nix
  62. +3 −10 pkgs/development/tools/wabt/default.nix
  63. +0 −28 pkgs/development/tools/wabt/version.patch
  64. +2 −2 pkgs/development/web/nodejs/v14.nix
  65. +32 −0 pkgs/games/netris/default.nix
  66. +2 −2 pkgs/misc/emulators/stella/default.nix
  67. +2 −2 pkgs/os-specific/linux/conntrack-tools/default.nix
  68. +2 −2 pkgs/os-specific/linux/criu/default.nix
  69. +2 −30 pkgs/os-specific/linux/firmware/fwupd/default.nix
  70. +2 −2 pkgs/os-specific/linux/kernel/linux-4.14.nix
  71. +2 −2 pkgs/os-specific/linux/kernel/linux-4.4.nix
  72. +2 −2 pkgs/os-specific/linux/kernel/linux-4.9.nix
  73. +2 −2 pkgs/servers/mpd/default.nix
  74. +2 −2 pkgs/servers/sickbeard/sickgear.nix
  75. +2 −2 pkgs/servers/sql/postgresql/ext/pg_auto_failover.nix
  76. +2 −2 pkgs/tools/admin/acme.sh/default.nix
  77. +4 −4 pkgs/tools/admin/ansible/default.nix
  78. +20 −19 pkgs/tools/backup/znapzend/default.nix
  79. +2 −2 pkgs/tools/graphics/pfstools/default.nix
  80. +11 −2 pkgs/tools/security/gopass/default.nix
  81. +2 −2 pkgs/tools/system/acpica-tools/default.nix
  82. +2 −2 pkgs/tools/system/hwinfo/default.nix
  83. +2 −2 pkgs/tools/text/languagetool/default.nix
  84. +4 −4 pkgs/tools/text/sd/default.nix
  85. +2 −2 pkgs/tools/typesetting/asciidoctorj/default.nix
  86. +10 −2 pkgs/top-level/all-packages.nix
  87. +14 −0 pkgs/top-level/perl-packages.nix
  88. +1 −1 pkgs/top-level/python-packages.nix
10 changes: 10 additions & 0 deletions maintainers/maintainer-list.nix
Original file line number Diff line number Diff line change
@@ -5862,6 +5862,16 @@
githubId = 131844;
name = "Igor Pashev";
};
patryk27 = {
email = "wychowaniec.patryk@gmail.com";
github = "Patryk27";
githubId = 3395477;
name = "Patryk Wychowaniec";
keys = [{
longkeyid = "rsa4096/0xF62547D075E09767";
fingerprint = "196A BFEC 6A1D D1EC 7594 F8D1 F625 47D0 75E0 9767";
}];
};
patternspandemic = {
email = "patternspandemic@live.com";
github = "patternspandemic";
20 changes: 0 additions & 20 deletions nixos/modules/config/nsswitch.nix
Original file line number Diff line number Diff line change
@@ -8,30 +8,22 @@ let

# only with nscd up and running we can load NSS modules that are not integrated in NSS
canLoadExternalModules = config.services.nscd.enable;
myhostname = canLoadExternalModules;
mymachines = canLoadExternalModules;
# XXX Move these to their respective modules
nssmdns = canLoadExternalModules && config.services.avahi.nssmdns;
nsswins = canLoadExternalModules && config.services.samba.nsswins;
ldap = canLoadExternalModules && (config.users.ldap.enable && config.users.ldap.nsswitch);
resolved = canLoadExternalModules && config.services.resolved.enable;

hostArray = mkMerge [
(mkBefore [ "files" ])
(mkIf mymachines [ "mymachines" ])
(mkIf nssmdns [ "mdns_minimal [NOTFOUND=return]" ])
(mkIf nsswins [ "wins" ])
(mkIf resolved [ "resolve [!UNAVAIL=return]" ])
(mkAfter [ "dns" ])
(mkIf nssmdns (mkOrder 1501 [ "mdns" ])) # 1501 to ensure it's after dns
(mkIf myhostname (mkOrder 1600 [ "myhostname" ])) # 1600 to ensure it's always the last
];

passwdArray = mkMerge [
(mkBefore [ "files" ])
(mkIf ldap [ "ldap" ])
(mkIf mymachines [ "mymachines" ])
(mkIf canLoadExternalModules (mkAfter [ "systemd" ]))
];

shadowArray = mkMerge [
@@ -134,11 +126,6 @@ in {
assertion = config.system.nssModules.path != "" -> canLoadExternalModules;
message = "Loading NSS modules from path ${config.system.nssModules.path} requires nscd being enabled.";
}
{
# resolved does not need to add to nssModules, therefore needs an extra assertion
assertion = resolved -> canLoadExternalModules;
message = "Loading systemd-resolved's nss-resolve NSS module requires nscd being enabled.";
}
];

# Name Service Switch configuration file. Required by the C
@@ -164,12 +151,5 @@ in {
hosts = hostArray;
services = mkBefore [ "files" ];
};

# Systemd provides nss-myhostname to ensure that our hostname
# always resolves to a valid IP address. It returns all locally
# configured IP addresses, or ::1 and 127.0.0.2 as
# fallbacks. Systemd also provides nss-mymachines to return IP
# addresses of local containers.
system.nssModules = (optionals canLoadExternalModules [ config.systemd.package.out ]);
};
}
35 changes: 35 additions & 0 deletions nixos/modules/services/backup/znapzend.nix
Original file line number Diff line number Diff line change
@@ -372,6 +372,41 @@ in
and <citerefentry><refentrytitle>zfs</refentrytitle><manvolnum>8</manvolnum></citerefentry>
for more info.
'';
features.sendRaw = mkEnableOption ''
sendRaw feature which adds the options <literal>-w</literal> to the
<command>zfs send</command> command. For encrypted source datasets this
instructs zfs not to decrypt before sending which results in a remote
backup that can't be read without the encryption key/passphrase, useful
when the remote isn't fully trusted or not physically secure. This
option must be used consistently, raw incrementals cannot be based on
non-raw snapshots and vice versa.
'';
features.skipIntermediates = mkEnableOption ''
Enable the skipIntermediates feature to send a single increment
between latest common snapshot and the newly made one. It may skip
several source snaps if the destination was offline for some time, and
it should skip snapshots not managed by znapzend. Normally for online
destinations, the new snapshot is sent as soon as it is created on the
source, so there are no automatic increments to skip.
'';
features.lowmemRecurse = mkEnableOption ''
use lowmemRecurse on systems where you have too many datasets, so a
recursive listing of attributes to find backup plans exhausts the
memory available to <command>znapzend</command>: instead, go the slower
way to first list all impacted dataset names, and then query their
configs one by one.
'';
features.zfsGetType = mkEnableOption ''
use zfsGetType if your <command>zfs get</command> supports a
<literal>-t</literal> argument for filtering by dataset type at all AND
lists properties for snapshots by default when recursing, so that there
is too much data to process while searching for backup plans.
If these two conditions apply to your system, the time needed for a
<literal>--recursive</literal> search for backup plans can literally
differ by hundreds of times (depending on the amount of snapshots in
that dataset tree... and a decent backup plan will ensure you have a lot
of those), so you would benefit from requesting this feature.
'';
};
};

37 changes: 35 additions & 2 deletions nixos/modules/services/networking/hostapd.nix
Original file line number Diff line number Diff line change
@@ -20,12 +20,14 @@ let
ssid=${cfg.ssid}
hw_mode=${cfg.hwMode}
channel=${toString cfg.channel}
${optionalString (cfg.countryCode != null) ''country_code=${cfg.countryCode}''}
${optionalString (cfg.countryCode != null) ''ieee80211d=1''}
# logging (debug level)
logger_syslog=-1
logger_syslog_level=2
logger_syslog_level=${toString cfg.logLevel}
logger_stdout=-1
logger_stdout_level=2
logger_stdout_level=${toString cfg.logLevel}
ctrl_interface=/run/hostapd
ctrl_interface_group=${cfg.group}
@@ -147,6 +149,35 @@ in
'';
};

logLevel = mkOption {
default = 2;
type = types.int;
description = ''
Levels (minimum value for logged events):
0 = verbose debugging
1 = debugging
2 = informational messages
3 = notification
4 = warning
'';
};

countryCode = mkOption {
default = null;
example = "US";
type = with types; nullOr str;
description = ''
Country code (ISO/IEC 3166-1). Used to set regulatory domain.
Set as needed to indicate country in which device is operating.
This can limit available channels and transmit power.
These two octets are used as the first two octets of the Country String
(dot11CountryString).
If set this enables IEEE 802.11d. This advertises the countryCode and
the set of allowed channels and transmit power levels based on the
regulatory limits.
'';
};

extraConfig = mkOption {
default = "";
example = ''
@@ -167,6 +198,8 @@ in

environment.systemPackages = [ pkgs.hostapd ];

services.udev.packages = optional (cfg.countryCode != null) [ pkgs.crda ];

systemd.services.hostapd =
{ description = "hostapd wireless AP";

2 changes: 1 addition & 1 deletion nixos/modules/services/x11/desktop-managers/pantheon.nix
Original file line number Diff line number Diff line change
@@ -109,7 +109,7 @@ in

# Without this, elementary LightDM greeter will pre-select non-existent `default` session
# https://github.com/elementary/greeter/issues/368
services.xserver.displayManager.defaultSession = "pantheon";
services.xserver.displayManager.defaultSession = mkDefault "pantheon";

services.xserver.displayManager.sessionCommands = ''
if test "$XDG_CURRENT_DESKTOP" = "Pantheon"; then
4 changes: 4 additions & 0 deletions nixos/modules/system/boot/resolved.nix
Original file line number Diff line number Diff line change
@@ -138,6 +138,10 @@ in

users.users.resolved.group = "systemd-resolve";

# add resolve to nss hosts database if enabled and nscd enabled
# system.nssModules is configured in nixos/modules/system/boot/systemd.nix
system.nssDatabases.hosts = optional config.services.nscd.enable "resolve [!UNAVAIL=return]";

systemd.additionalUpstreamSystemUnits = [
"systemd-resolved.service"
];
21 changes: 21 additions & 0 deletions nixos/modules/system/boot/systemd.nix
Original file line number Diff line number Diff line change
@@ -827,6 +827,27 @@ in

system.build.units = cfg.units;

# Systemd provides various NSS modules to look up dynamic users, locally
# configured IP adresses and local container hostnames.
# On NixOS, these can only be passed to the NSS system via nscd (and its
# LD_LIBRARY_PATH), which is why it's usually a very good idea to have nscd
# enabled (also see the config.nscd.enable description).
# While there is already an assertion in place complaining loudly about
# having nssModules configured and nscd disabled, for some reason we still
# check for nscd being enabled before adding to nssModules.
system.nssModules = optional config.services.nscd.enable systemd.out;
system.nssDatabases = mkIf config.services.nscd.enable {
hosts = (mkMerge [
[ "mymachines" ]
(mkOrder 1600 [ "myhostname" ] # 1600 to ensure it's always the last
)
]);
passwd = (mkMerge [
[ "mymachines" ]
(mkAfter [ "systemd" ])
]);
};

environment.systemPackages = [ systemd ];

environment.etc = let
13 changes: 11 additions & 2 deletions nixos/modules/virtualisation/qemu-vm.nix
Original file line number Diff line number Diff line change
@@ -189,9 +189,18 @@ let
mkdir /boot/grub
echo '(hd0) /dev/vda' > /boot/grub/device.map
# Install GRUB and generate the GRUB boot menu.
touch /etc/NIXOS
# This is needed for systemd-boot to find ESP, and udev is not available here to create this
mkdir -p /dev/block
ln -s /dev/vda2 /dev/block/254:2
# Set up system profile (normally done by nixos-rebuild / nix-env --set)
mkdir -p /nix/var/nix/profiles
ln -s ${config.system.build.toplevel} /nix/var/nix/profiles/system-1-link
ln -s /nix/var/nix/profiles/system-1-link /nix/var/nix/profiles/system
# Install bootloader
touch /etc/NIXOS
export NIXOS_INSTALL_BOOTLOADER=1
${config.system.build.toplevel}/bin/switch-to-configuration boot
umount /boot
1 change: 1 addition & 0 deletions nixos/tests/all-tests.nix
Original file line number Diff line number Diff line change
@@ -297,6 +297,7 @@ in
syncthing-relay = handleTest ./syncthing-relay.nix {};
systemd = handleTest ./systemd.nix {};
systemd-analyze = handleTest ./systemd-analyze.nix {};
systemd-boot = handleTestOn ["x86_64-linux"] ./systemd-boot.nix {};
systemd-confinement = handleTest ./systemd-confinement.nix {};
systemd-timesyncd = handleTest ./systemd-timesyncd.nix {};
systemd-networkd-vrf = handleTest ./systemd-networkd-vrf.nix {};
31 changes: 31 additions & 0 deletions nixos/tests/systemd-boot.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
{ system ? builtins.currentSystem,
config ? {},
pkgs ? import ../.. { inherit system config; }
}:

with import ../lib/testing-python.nix { inherit system pkgs; };
with pkgs.lib;

makeTest {
name = "systemd-boot";
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ danielfullmer ];

machine = { pkgs, lib, ... }: {
virtualisation.useBootLoader = true;
virtualisation.useEFIBoot = true;
boot.loader.systemd-boot.enable = true;
};

testScript = ''
machine.start()
machine.wait_for_unit("multi-user.target")
machine.succeed("test -e /boot/loader/entries/nixos-generation-1.conf")
# Ensure we actually booted using systemd-boot.
# Magic number is the vendor UUID used by systemd-boot.
machine.succeed(
"test -e /sys/firmware/efi/efivars/LoaderEntrySelected-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f"
)
'';
}
4 changes: 2 additions & 2 deletions pkgs/applications/audio/faust/faust2jack.nix
Original file line number Diff line number Diff line change
@@ -2,7 +2,7 @@
, gtk2
, jack2Full
, alsaLib
, opencv
, opencv2
, libsndfile
}:

@@ -20,7 +20,7 @@ faust.wrapWithBuildEnv {
gtk2
jack2Full
alsaLib
opencv
opencv2
libsndfile
];

4 changes: 2 additions & 2 deletions pkgs/applications/audio/faust/faust2jaqt.nix
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{ faust
, jack2Full
, opencv
, opencv2
, qt4
, libsndfile
, which
@@ -17,7 +17,7 @@ faust.wrapWithBuildEnv {

propagatedBuildInputs = [
jack2Full
opencv
opencv2
qt4
libsndfile
which
39 changes: 39 additions & 0 deletions pkgs/applications/audio/ninjas2/default.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
{ stdenv, fetchFromGitHub, libjack2, libGL, pkgconfig, xorg, mesa, libsndfile, libsamplerate }:

stdenv.mkDerivation rec {
pname = "ninjas2";
version = "0.2.0";

src = fetchFromGitHub {
owner = "clearly-broken-software";
repo = pname;
rev = "v${version}";
sha256 = "1kwp6pmnfar2ip9693gprfbcfscklgri1k1ycimxzlqr61nkd2k9";
fetchSubmodules = true;
};

patchPhase = ''
patchShebangs dpf/utils/generate-ttl.sh
'';

nativeBuildInputs = [ pkgconfig ];
buildInputs = [
libjack2 xorg.libX11 libGL mesa libsndfile libsamplerate
];

installPhase = ''
install -dD bin/ninjas2.lv2 $out/lib/lv2/ninjas2.lv2
install -D bin/ninjas2-vst.so $out/lib/vst/ninjas2-vst.so
install -D bin/ninjas2 $out/bin/ninjas2
'';

makeFlags = [ "PREFIX=$(out)" ];

meta = with stdenv.lib; {
homepage = "https://github.com/clearly-broken-software/ninjas2";
description = "sample slicer plugin for LV2, VST, and jack standalone";
license = with licenses; [ gpl3 ];
maintainers = [ maintainers.magnetophon ];
platforms = platforms.linux;
};
}
12 changes: 6 additions & 6 deletions pkgs/applications/audio/spotify-tui/default.nix
Original file line number Diff line number Diff line change
@@ -2,20 +2,20 @@

rustPlatform.buildRustPackage rec {
pname = "spotify-tui";
version = "0.18.0";
version = "0.19.0";

src = fetchFromGitHub {
owner = "Rigellute";
repo = "spotify-tui";
rev = "v${version}";
sha256 = "15icg332iyacdn4ydr4nivblayg4xkcnjh4f0sjnhj4q173v8fq2";
sha256 = "1bdcfkfbvvn262p4j0nb4kvjzzgrvn3kxlif48yipqkkykzsgz6g";
};

cargoSha256 = "0rw8pj74k88rvcr18837g356lwsn2vdq384yma9df462xd2cw823";
cargoSha256 = "13v2ilmfs9468kavlx6wrsp0dscppxbxgygwpdd35p5hq3vnhl7k";

nativeBuildInputs = [ pkgconfig ] ++ stdenv.lib.optionals stdenv.isLinux [ python3 ];
buildInputs = [ openssl ]
++ stdenv.lib.optional stdenv.isLinux libxcb
nativeBuildInputs = stdenv.lib.optionals stdenv.isLinux [ pkgconfig python3 ];
buildInputs = [ ]
++ stdenv.lib.optionals stdenv.isLinux [ openssl libxcb ]
++ stdenv.lib.optionals stdenv.isDarwin [ AppKit Security ];

meta = with stdenv.lib; {
Loading