Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 2faa76db27c4
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 365ca1112115
Choose a head ref
  • 6 commits
  • 22 files changed
  • 5 contributors

Commits on Apr 27, 2020

  1. Copy the full SHA
    1b290e7 View commit details
  2. python.pkgs.grpcio: use system openssl, zlib, and c-ares

    (cherry picked from commit 849f26d)
    matthewbauer authored and bhipple committed Apr 27, 2020
    Copy the full SHA
    b6ec576 View commit details
  3. aspell, tla: use HTTPS instead of FTP

    ftp.gnu.org intends to disable the FTP protocol for downloads on this
    server, and strongly recommends using https instead.
    
    (cherry picked from commit 295475a)
    kevinastock committed Apr 27, 2020
    Copy the full SHA
    31cab04 View commit details
  4. Merge pull request #86155 from kevinastock/ftp.gnu.org

    [20.03] aspell, tla: use HTTPS instead of FTP
    bhipple authored Apr 27, 2020
    Copy the full SHA
    3aeaf74 View commit details

Commits on Apr 28, 2020

  1. Merge pull request #86118 from xaverdh/options-types-backport

    [20.03] treewide: add types to boolean / enable options
    worldofpeace authored Apr 28, 2020
    Copy the full SHA
    f18719c View commit details
  2. Merge pull request #86154 from bhipple/bp/grpcio

    [20.03] python.pkgs.grpcio: use system openssl, zlib, and c-ares
    matthewbauer authored Apr 28, 2020
    Copy the full SHA
    365ca11 View commit details
1 change: 1 addition & 0 deletions nixos/modules/config/fonts/fontdir.nix
Original file line number Diff line number Diff line change
@@ -25,6 +25,7 @@ in
fonts = {

enableFontDir = mkOption {
type = types.bool;
default = false;
description = ''
Whether to create a directory with links to all fonts in
1 change: 1 addition & 0 deletions nixos/modules/config/fonts/ghostscript.nix
Original file line number Diff line number Diff line change
@@ -9,6 +9,7 @@ with lib;
fonts = {

enableGhostscriptFonts = mkOption {
type = types.bool;
default = false;
description = ''
Whether to add the fonts provided by Ghostscript (such as
2 changes: 2 additions & 0 deletions nixos/modules/config/ldap.nix
Original file line number Diff line number Diff line change
@@ -88,6 +88,7 @@ in
};

useTLS = mkOption {
type = types.bool;
default = false;
description = ''
If enabled, use TLS (encryption) over an LDAP (port 389)
@@ -109,6 +110,7 @@ in

daemon = {
enable = mkOption {
type = types.bool;
default = false;
description = ''
Whether to let the nslcd daemon (nss-pam-ldapd) handle the
1 change: 1 addition & 0 deletions nixos/modules/security/apparmor-suid.nix
Original file line number Diff line number Diff line change
@@ -9,6 +9,7 @@ with lib;
];

options.security.apparmor.confineSUIDApplications = mkOption {
type = types.bool;
default = true;
description = ''
Install AppArmor profiles for commonly-used SUID application
15 changes: 3 additions & 12 deletions nixos/modules/security/pam.nix
Original file line number Diff line number Diff line change
@@ -545,6 +545,7 @@ in
};

security.pam.enableSSHAgentAuth = mkOption {
type = types.bool;
default = false;
description =
''
@@ -555,12 +556,7 @@ in
'';
};

security.pam.enableOTPW = mkOption {
default = false;
description = ''
Enable the OTPW (one-time password) PAM module.
'';
};
security.pam.enableOTPW = mkEnableOption "the OTPW (one-time password) PAM module";

security.pam.u2f = {
enable = mkOption {
@@ -719,12 +715,7 @@ in
};
};

security.pam.enableEcryptfs = mkOption {
default = false;
description = ''
Enable eCryptfs PAM module (mounting ecryptfs home directory on login).
'';
};
security.pam.enableEcryptfs = mkEnableOption "eCryptfs PAM module (mounting ecryptfs home directory on login)";

users.motd = mkOption {
default = null;
1 change: 1 addition & 0 deletions nixos/modules/services/mail/postfix.nix
Original file line number Diff line number Diff line change
@@ -269,6 +269,7 @@ in
};

enableSmtp = mkOption {
type = types.bool;
default = true;
description = "Whether to enable smtp in master.cf.";
};
1 change: 1 addition & 0 deletions nixos/modules/services/mail/spamassassin.nix
Original file line number Diff line number Diff line change
@@ -15,6 +15,7 @@ in
enable = mkEnableOption "the SpamAssassin daemon";

debug = mkOption {
type = types.bool;
default = false;
description = "Whether to run the SpamAssassin daemon in debug mode";
};
1 change: 1 addition & 0 deletions nixos/modules/services/misc/autofs.nix
Original file line number Diff line number Diff line change
@@ -57,6 +57,7 @@ in
};

debug = mkOption {
type = types.bool;
default = false;
description = ''
Pass -d and -7 to automount and write log to the system journal.
5 changes: 1 addition & 4 deletions nixos/modules/services/misc/disnix.nix
Original file line number Diff line number Diff line change
@@ -25,10 +25,7 @@ in
description = "Whether to support multi-user mode by enabling the Disnix D-Bus service";
};

useWebServiceInterface = mkOption {
default = false;
description = "Whether to enable the DisnixWebService interface running on Apache Tomcat";
};
useWebServiceInterface = mkEnableOption "the DisnixWebService interface running on Apache Tomcat";

package = mkOption {
type = types.path;
1 change: 1 addition & 0 deletions nixos/modules/services/networking/gogoclient.nix
Original file line number Diff line number Diff line change
@@ -19,6 +19,7 @@ in
'';
};
autorun = mkOption {
type = types.bool;
default = true;
description = ''
Whether to automatically start the tunnel.
2 changes: 2 additions & 0 deletions nixos/modules/services/networking/hostapd.nix
Original file line number Diff line number Diff line change
@@ -72,6 +72,7 @@ in
};

noScan = mkOption {
type = types.bool;
default = false;
description = ''
Do not scan for overlapping BSSs in HT40+/- mode.
@@ -127,6 +128,7 @@ in
};

wpa = mkOption {
type = types.bool;
default = true;
description = ''
Enable WPA (IEEE 802.11i/D3.0) to authenticate with the access point.
1 change: 1 addition & 0 deletions nixos/modules/services/networking/openfire.nix
Original file line number Diff line number Diff line change
@@ -12,6 +12,7 @@ with lib;
enable = mkEnableOption "OpenFire XMPP server";

usePostgreSQL = mkOption {
type = types.bool;
default = true;
description = "
Whether you use PostgreSQL service for your storage back-end.
6 changes: 6 additions & 0 deletions nixos/modules/services/networking/ssh/lshd.nix
Original file line number Diff line number Diff line change
@@ -54,21 +54,25 @@ in
};

syslog = mkOption {
type = types.bool;
default = true;
description = ''Whether to enable syslog output.'';
};

passwordAuthentication = mkOption {
type = types.bool;
default = true;
description = ''Whether to enable password authentication.'';
};

publicKeyAuthentication = mkOption {
type = types.bool;
default = true;
description = ''Whether to enable public key authentication.'';
};

rootLogin = mkOption {
type = types.bool;
default = false;
description = ''Whether to enable remote root login.'';
};
@@ -90,11 +94,13 @@ in
};

tcpForwarding = mkOption {
type = types.bool;
default = true;
description = ''Whether to enable TCP/IP forwarding.'';
};

x11Forwarding = mkOption {
type = types.bool;
default = true;
description = ''Whether to enable X11 forwarding.'';
};
1 change: 1 addition & 0 deletions nixos/modules/services/networking/tcpcrypt.nix
Original file line number Diff line number Diff line change
@@ -15,6 +15,7 @@ in
options = {

networking.tcpcrypt.enable = mkOption {
type = types.bool;
default = false;
description = ''
Whether to enable opportunistic TCP encryption. If the other end
1 change: 1 addition & 0 deletions nixos/modules/services/networking/wicd.nix
Original file line number Diff line number Diff line change
@@ -9,6 +9,7 @@ with lib;
options = {

networking.wicd.enable = mkOption {
type = types.bool;
default = false;
description = ''
Whether to start <command>wicd</command>. Wired and
1 change: 1 addition & 0 deletions nixos/modules/services/web-servers/jboss/default.nix
Original file line number Diff line number Diff line change
@@ -60,6 +60,7 @@ in
};

useJK = mkOption {
type = types.bool;
default = false;
description = "Whether to use to connector to the Apache HTTP server";
};
3 changes: 2 additions & 1 deletion nixos/modules/services/x11/display-managers/gdm.nix
Original file line number Diff line number Diff line change
@@ -89,16 +89,17 @@ in
};

wayland = mkOption {
type = types.bool;
default = true;
description = ''
Allow GDM to run on Wayland instead of Xserver.
Note to enable Wayland with Nvidia you need to
enable the <option>nvidiaWayland</option>.
'';
type = types.bool;
};

nvidiaWayland = mkOption {
type = types.bool;
default = false;
description = ''
Whether to allow wayland to be used with the proprietary
7 changes: 1 addition & 6 deletions nixos/modules/services/x11/hardware/digimend.nix
Original file line number Diff line number Diff line change
@@ -16,12 +16,7 @@ in

services.xserver.digimend = {

enable = mkOption {
default = false;
description = ''
Whether to enable the digimend drivers for Huion/XP-Pen/etc. tablets.
'';
};
enable = mkEnableOption "the digimend drivers for Huion/XP-Pen/etc. tablets";

};

11 changes: 3 additions & 8 deletions nixos/modules/virtualisation/xen-dom0.nix
Original file line number Diff line number Diff line change
@@ -103,6 +103,7 @@ in
};

forwardDns = mkOption {
type = types.bool;
default = false;
description = ''
If set to <literal>true</literal>, the DNS queries from the
@@ -135,14 +136,8 @@ in
};
};

virtualisation.xen.trace =
mkOption {
default = false;
description =
''
Enable Xen tracing.
'';
};
virtualisation.xen.trace = mkEnableOption "Xen tracing";

};


2 changes: 1 addition & 1 deletion pkgs/applications/version-management/arch/default.nix
Original file line number Diff line number Diff line change
@@ -4,7 +4,7 @@ stdenv.mkDerivation rec {
name = "tla-1.3.5";

src = fetchurl {
url = "ftp://ftp.gnu.org/old-gnu/gnu-arch/" + name + ".tar.gz";
url = "https://ftp.gnu.org/old-gnu/gnu-arch/" + name + ".tar.gz";
sha256 = "01mfzj1i6p4s8191cgd5850hds1zls88hkf9rb6qx1vqjv585aj0";
};

2 changes: 1 addition & 1 deletion pkgs/development/libraries/aspell/default.nix
Original file line number Diff line number Diff line change
@@ -8,7 +8,7 @@ let
# dictionary like Debian does.
devaMapsSource = fetchzip {
name = "aspell-u-deva";
url = "ftp://ftp.gnu.org/gnu/aspell/dict/mr/aspell6-mr-0.10-0.tar.bz2";
url = "https://ftp.gnu.org/gnu/aspell/dict/mr/aspell6-mr-0.10-0.tar.bz2";
sha256 = "1v8cdl8x2j1d4vbvsq1xrqys69bbccd6mi03fywrhkrrljviyri1";
};

7 changes: 6 additions & 1 deletion pkgs/development/python-modules/grpcio/default.nix
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{ stdenv, buildPythonPackage, darwin, grpc
, six, protobuf, enum34, futures, isPy27, pkgconfig
, cython}:
, cython, c-ares, openssl, zlib }:

buildPythonPackage rec {
inherit (grpc) src version;
@@ -9,11 +9,16 @@ buildPythonPackage rec {
nativeBuildInputs = [ cython pkgconfig ]
++ stdenv.lib.optional stdenv.isDarwin darwin.cctools;

buildInputs = [ c-ares openssl zlib ];
propagatedBuildInputs = [ six protobuf ]
++ stdenv.lib.optionals (isPy27) [ enum34 futures ];

preBuild = stdenv.lib.optionalString stdenv.isDarwin "unset AR";

GRPC_PYTHON_BUILD_SYSTEM_OPENSSL = 1;
GRPC_PYTHON_BUILD_SYSTEM_ZLIB = 1;
GRPC_PYTHON_BUILD_SYSTEM_CARES = 1;

meta = with stdenv.lib; {
description = "HTTP/2-based RPC framework";
license = licenses.asl20;