Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 537f10f04427
Choose a base ref
...
head repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 20e67f1fb83b
Choose a head ref

Commits on Mar 26, 2020

  1. emacs-modes: build MELPA package sets without null packages

    The current algorithm creates attributes with null values for packages
    with no source in a variant of MELPA. Though will satify dependencies
    they produce no files, and though a build that transitively depends on
    one them will be successful, Emacs won't find them and any code
    depending on them won't work.
    
    The solution with minimal code change would have been filtering the
    list of results from melpaDerivation by comparing the value against
    null, but that leads to an infinite recursion.
    
    This commit also moves legacy renames from the shared to the unstable
    set, as the corresponding null value elements won't exist in the
    stable set anymore.
    
    The test used for the problem was:
    
      $ nix-build --show-trace ./default.nix -A emacs26Packages.melpaStablePackages.findr
      error: expression does not evaluate to a derivation (or a set or list of those)
    
    The expected output, obtained with this commit is:
    
      $ nix-build --show-trace ./default.nix -A emacs26Packages.melpaStablePackages.findr
      error: attribute 'findr' in selection path 'emacs26Packages.melpaStablePackages.findr' not found
    Servilio Afre Puentes committed Mar 26, 2020

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    b2c8626 View commit details

Commits on Apr 14, 2020

  1. Copy the full SHA
    849f26d View commit details

Commits on Apr 22, 2020

  1. Copy the full SHA
    84ff95a View commit details

Commits on Apr 25, 2020

  1. thermald: 1.9.1 -> 2.1

    eadwu committed Apr 25, 2020
    Copy the full SHA
    3e051b0 View commit details
  2. nixos/printing: make access to web-interface configurable

    Otherwise you'd always get a 403 when hosting the web-interface of cups
    at a different location than `localhost`.
    Ma27 committed Apr 25, 2020
    Copy the full SHA
    4062592 View commit details

Commits on Apr 27, 2020

  1. nixpkgs-review: 2.3.0 -> 2.3.1

    Mic92 committed Apr 27, 2020
    Copy the full SHA
    2805d68 View commit details
  2. nixos/qemu-vm: don't set -vga std

    This has been default since QEMU 2.2, it also prevents using a different
    -vga
    worldofpeace authored and teto committed Apr 27, 2020
    Copy the full SHA
    a7ca287 View commit details
  3. nix-prefetch-docker: Add jq into path

    Otheriwse running the tool fails with
    
        line 41: jq: command not found
    nagisa committed Apr 27, 2020
    Copy the full SHA
    dde3e8e View commit details
  4. Merge pull request #85246 from matthewbauer/use-system-libraries-for-…

    …grpcio
    
    python.pkgs.grpcio: use system openssl, zlib, and c-ares
    matthewbauer authored Apr 27, 2020
    Copy the full SHA
    712026e View commit details
  5. pulseeffects: fix build

    Meson 0.54 is no longer able to find Boost:
    
    See #86131
    jtojnar committed Apr 27, 2020
    Copy the full SHA
    61a2045 View commit details
  6. Copy the full SHA
    301ede4 View commit details
  7. libquotient: rename from libqmatrixclient; v0.5.2 -> v0.5.3.2

    aliases: throw messages for libqmatrixclient and quaternion-git
    colemickens committed Apr 27, 2020
    Copy the full SHA
    c15f590 View commit details
  8. Copy the full SHA
    3ceefd2 View commit details
  9. PULL_REQUEST_TEMPLATE: try to simplify call-for-review

    The text is quite long and hard to read in hub (because it is one whole line
    with no line breaks). Also simplified the language/sentence structure a bit for
    non-native speakers.
    Mic92 committed Apr 27, 2020
    Copy the full SHA
    93862d0 View commit details
  10. Merge pull request #86110 from Mic92/pr-template

    PULL_REQUEST_TEMPLATE: try to simplify call-for-review
    Mic92 authored Apr 27, 2020
    Copy the full SHA
    974d11d View commit details
  11. Copy the full SHA
    12a614b View commit details
  12. Copy the full SHA
    1f20c08 View commit details
  13. Copy the full SHA
    1066f11 View commit details
  14. diffoscope: 142 -> 143

    Ma27 committed Apr 27, 2020
    Copy the full SHA
    caadc44 View commit details
  15. Merge pull request #86135 from Mic92/nixpkgs-review

    nixpkgs-review: 2.3.0 -> 2.3.1
    bhipple authored Apr 27, 2020
    Copy the full SHA
    697bff7 View commit details

Commits on Apr 28, 2020

  1. Merge pull request #86144 from danielfullmer/hcxdumptool-rename

    hcxdumptool: fix incorrect pname
    Lassulus authored Apr 28, 2020
    Copy the full SHA
    b83ab97 View commit details
  2. emacsPackages.filesets-plus: Remove package

    It's refering to an unversioned emacswiki file with the wrong hash.
    adisbladis committed Apr 28, 2020
    Copy the full SHA
    cd49c48 View commit details
  3. emacsPackages.hexrgb: Remove package

    It's refering to an unversioned emacswiki file with the wrong hash.
    adisbladis committed Apr 28, 2020
    Copy the full SHA
    9b52db9 View commit details
  4. emacsPackages.header2: Remove package

    It's refering to an unversioned emacswiki file with the wrong hash.
    adisbladis committed Apr 28, 2020
    Copy the full SHA
    576e67a View commit details
  5. emacsPackages.icicles: Remove package

    It's refering to an unversioned emacswiki file with the wrong hash.
    adisbladis committed Apr 28, 2020
    Copy the full SHA
    7e69b3f View commit details
  6. emacsPackages.lib-requires: Remove package

    It's refering to an unversioned emacswiki file with the wrong hash.
    adisbladis committed Apr 28, 2020
    Copy the full SHA
    fe218d1 View commit details
  7. emacsPackages.thingatpt-plus: Remove package

    It's refering to an unversioned emacswiki file with the wrong hash.
    adisbladis committed Apr 28, 2020
    Copy the full SHA
    5e62edd View commit details
  8. emacsPackages.yaoddmuse: Remove package

    It's refering to an unversioned emacswiki file with the wrong hash.
    adisbladis committed Apr 28, 2020
    Copy the full SHA
    caeae90 View commit details
  9. Merge pull request #86082 from eadwu/thermald/2.1

    thermald: 1.9.1 -> 2.1
    Ma27 authored Apr 28, 2020
    Copy the full SHA
    c6518b5 View commit details
  10. Merge pull request #86013 from Ma27/cups-allow-from

    nixos/printing: make access to web-interface configurable
    Ma27 authored Apr 28, 2020
    Copy the full SHA
    1f6d33e View commit details
  11. Merge pull request #84160 from colemickens/nixpkgs-quaternion

    quaternion: update, libquotient: init
    worldofpeace authored Apr 28, 2020
    Copy the full SHA
    f1d1dca View commit details
  12. Merge pull request #86143 from nagisa/nix-prefetch-docker-jq-fix

    Add `jq` into path for `nix-prefetch-docker`
    offlinehacker authored Apr 28, 2020
    Copy the full SHA
    87e090c View commit details
  13. python3.pkgs.pyusb: remove unnecessary libusb-compat dependency

    It was added in 4d7cc55
    without any rationale. python2.pkgs.nxt-python seems to build without it.
    Maybe it for some reason uses the libusb-0.1 backend but propagating the compat library would not enable that.
    jtojnar committed Apr 28, 2020
    Copy the full SHA
    8fd2c89 View commit details
  14. Copy the full SHA
    3dc1caa View commit details
  15. Copy the full SHA
    4f422e4 View commit details
  16. palemoon: 28.8.4 -> 28.9.1, add GTK3 option

    OPNA2608 authored and Jon committed Apr 28, 2020
    Copy the full SHA
    1e814e3 View commit details
  17. jid: 0.7.2 -> 0.7.6

    jerith666 authored and Jon committed Apr 28, 2020
    Copy the full SHA
    8d1d645 View commit details
  18. Copy the full SHA
    a217a1a View commit details
  19. watson: format with nixpkgs-fmt

    paumr committed Apr 28, 2020
    Copy the full SHA
    7c18590 View commit details
  20. Copy the full SHA
    2d0a063 View commit details
  21. nixos/gitlab: Fix services.gitlab.enableStartTLSAuto

    'toString false' results in an empty string, which, in this context,
    is a syntax error. Use boolToString instead.
    
    Fixes #86160
    talyz committed Apr 28, 2020
    Copy the full SHA
    c0a838d View commit details
  22. ocamlPackages.tsdl: 0.9.4 -> 0.9.7

    From the release notes:
    * Require OCaml 4.03 and handle stdlib deprecations.
    * Drop result depency.
    * Drop ocb-stubblr dependency
    
    The library has also been re-licensed from BSD3 to ISC.
    droyo authored and vbgl committed Apr 28, 2020
    Copy the full SHA
    9c3bb10 View commit details
  23. kapacitor: 1.5.1 -> 1.5.4

    elohmeier committed Apr 28, 2020
    Copy the full SHA
    5933af6 View commit details
  24. Merge pull request #86172 from foxit64/master

    update telegraf 1.14.0 => 1.14.1
    Mic92 authored Apr 28, 2020
    Copy the full SHA
    2cd07f1 View commit details
  25. Merge pull request #86173 from talyz/gitlab-enable-starttlsauto

    nixos/gitlab: Fix services.gitlab.enableStartTLSAuto
    talyz authored Apr 28, 2020
    Copy the full SHA
    0043181 View commit details
  26. gopherclient: remove

    - no updated since 2016
    - broken since 2018
    Mic92 committed Apr 28, 2020
    Copy the full SHA
    7dfada5 View commit details
  27. libpsm2: init at 11.2.156 (#85920)

    * libpsm2: init at 11.2.156
    bzizou authored Apr 28, 2020
    Copy the full SHA
    5a16436 View commit details
  28. Merge pull request #86188 from Mic92/gopherclient

    gopherclient: remove
    adisbladis authored Apr 28, 2020
    Copy the full SHA
    453dca2 View commit details
  29. Merge pull request #86176 from elohmeier/kapacitor

    kapacitor: 1.5.1 -> 1.5.4
    Mic92 authored Apr 28, 2020
    Copy the full SHA
    4dc492d View commit details
  30. Copy the full SHA
    3f17518 View commit details
Showing with 515 additions and 859 deletions.
  1. +10 −1 .github/PULL_REQUEST_TEMPLATE.md
  2. +0 −12 doc/languages-frameworks/go.xml
  3. +5 −0 nixos/doc/manual/release-notes/rl-2009.xml
  4. +2 −2 nixos/modules/programs/singularity.nix
  5. +1 −1 nixos/modules/services/continuous-integration/gitlab-runner.nix
  6. +1 −1 nixos/modules/services/misc/confd.nix
  7. +1 −1 nixos/modules/services/misc/etcd.nix
  8. +8 −8 nixos/modules/services/misc/gitea.nix
  9. +1 −1 nixos/modules/services/misc/gitlab.nix
  10. +3 −3 nixos/modules/services/misc/gogs.nix
  11. +1 −1 nixos/modules/services/misc/leaps.nix
  12. +1 −2 nixos/modules/services/misc/ssm-agent.nix
  13. +1 −1 nixos/modules/services/monitoring/bosun.nix
  14. +1 −1 nixos/modules/services/monitoring/grafana-reporter.nix
  15. +1 −1 nixos/modules/services/monitoring/grafana.nix
  16. +1 −1 nixos/modules/services/monitoring/prometheus/exporters/snmp.nix
  17. +1 −1 nixos/modules/services/monitoring/scollector.nix
  18. +4 −4 nixos/modules/services/networking/consul.nix
  19. +3 −3 nixos/modules/services/networking/flannel.nix
  20. +1 −1 nixos/modules/services/networking/skydns.nix
  21. +13 −3 nixos/modules/services/printing/cupsd.nix
  22. +2 −2 nixos/modules/services/security/hologram-agent.nix
  23. +1 −1 nixos/modules/services/security/hologram-server.nix
  24. +1 −1 nixos/modules/services/security/oauth2_proxy.nix
  25. +1 −1 nixos/modules/services/web-apps/mattermost.nix
  26. +1 −2 nixos/modules/virtualisation/ecs-agent.nix
  27. +1 −1 nixos/modules/virtualisation/lxd.nix
  28. +3 −5 nixos/modules/virtualisation/podman.nix
  29. +1 −1 nixos/modules/virtualisation/qemu-vm.nix
  30. +5 −0 pkgs/applications/audio/pulseeffects/default.nix
  31. +2 −2 pkgs/applications/blockchains/dcrwallet.nix
  32. +2 −2 pkgs/applications/blockchains/quorum.nix
  33. +0 −22 pkgs/applications/editors/emacs-modes/filesets-plus/default.nix
  34. +0 −23 pkgs/applications/editors/emacs-modes/header2/default.nix
  35. +0 −23 pkgs/applications/editors/emacs-modes/hexrgb/default.nix
  36. +0 −43 pkgs/applications/editors/emacs-modes/icicles/default.nix
  37. +0 −23 pkgs/applications/editors/emacs-modes/lib-requires/default.nix
  38. +6 −3 pkgs/applications/editors/emacs-modes/libgenerated.nix
  39. +0 −15 pkgs/applications/editors/emacs-modes/manual-packages.nix
  40. +13 −9 pkgs/applications/editors/emacs-modes/melpa-packages.nix
  41. +0 −23 pkgs/applications/editors/emacs-modes/thingatpt-plus/default.nix
  42. +0 −30 pkgs/applications/editors/emacs-modes/yaoddmuse/default.nix
  43. +2 −2 pkgs/applications/misc/dbeaver/default.nix
  44. +1 −1 pkgs/applications/misc/lutris/chrootenv.nix
  45. +1 −1 pkgs/applications/misc/overmind/default.nix
  46. +58 −40 pkgs/applications/networking/browsers/palemoon/default.nix
  47. +4 −4 pkgs/applications/networking/cluster/k3s/default.nix
  48. +1 −1 pkgs/applications/networking/cluster/kompose/default.nix
  49. +1 −1 pkgs/applications/networking/cluster/kops/default.nix
  50. +1 −1 pkgs/applications/networking/cluster/minishift/default.nix
  51. +2 −2 pkgs/applications/networking/cluster/openshift/default.nix
  52. +1 −1 pkgs/applications/networking/cluster/stern/default.nix
  53. +2 −2 pkgs/applications/networking/cluster/terraform/default.nix
  54. +1 −1 pkgs/applications/networking/cluster/terragrunt/default.nix
  55. +0 −45 pkgs/applications/networking/gopher/gopherclient/default.nix
  56. +40 −39 pkgs/applications/networking/instant-messengers/quaternion/default.nix
  57. +2 −2 pkgs/applications/networking/instant-messengers/signal-desktop/default.nix
  58. +2 −2 pkgs/applications/networking/sync/rclone/default.nix
  59. +9 −3 pkgs/applications/office/watson/default.nix
  60. +1 −1 pkgs/applications/version-management/git-and-tools/grv/default.nix
  61. +2 −2 pkgs/applications/version-management/gitea/default.nix
  62. +1 −1 pkgs/applications/version-management/gitlab/gitaly/default.nix
  63. +2 −2 pkgs/applications/version-management/gitlab/gitlab-shell/default.nix
  64. +2 −2 pkgs/applications/version-management/gogs/default.nix
  65. +2 −2 pkgs/applications/virtualization/containerd/default.nix
  66. +3 −4 pkgs/applications/virtualization/cri-o/default.nix
  67. +1 −1 pkgs/applications/virtualization/docker-slim/default.nix
  68. +1 −1 pkgs/applications/virtualization/docker/proxy.nix
  69. +2 −2 pkgs/applications/virtualization/podman/default.nix
  70. +2 −2 pkgs/applications/virtualization/runc/default.nix
  71. +6 −6 pkgs/applications/virtualization/singularity/default.nix
  72. +2 −2 pkgs/build-support/docker/nix-prefetch-docker.nix
  73. +1 −3 pkgs/desktops/deepin/dde-api/default.nix
  74. +0 −2 pkgs/desktops/deepin/dde-daemon/default.nix
  75. +1 −3 pkgs/desktops/deepin/startdde/default.nix
  76. +3 −6 pkgs/development/go-packages/generic/default.nix
  77. +0 −38 pkgs/development/libraries/libqmatrixclient/default.nix
  78. +24 −0 pkgs/development/libraries/libquotient/default.nix
  79. +3 −3 pkgs/development/ocaml-modules/angstrom/default.nix
  80. +5 −5 pkgs/development/ocaml-modules/tsdl/default.nix
  81. +6 −1 pkgs/development/python-modules/grpcio/default.nix
  82. +2 −4 pkgs/development/python-modules/pyusb/default.nix
  83. +2 −2 pkgs/development/tools/buildah/default.nix
  84. +1 −1 pkgs/development/tools/cloudfoundry-cli/default.nix
  85. +2 −2 pkgs/development/tools/container-linux-config-transpiler/default.nix
  86. +2 −2 pkgs/development/tools/continuous-integration/buildkite-agent/default.nix
  87. +6 −6 pkgs/development/tools/continuous-integration/buildkite-agent/generic.nix
  88. +4 −4 pkgs/development/tools/continuous-integration/gitlab-runner/default.nix
  89. +2 −2 pkgs/development/tools/deis/default.nix
  90. +1 −1 pkgs/development/tools/dep2nix/default.nix
  91. +1 −1 pkgs/development/tools/doctl/default.nix
  92. +1 −1 pkgs/development/tools/fac/default.nix
  93. +2 −2 pkgs/development/tools/go2nix/default.nix
  94. +1 −1 pkgs/development/tools/gocode-gomod/default.nix
  95. +3 −3 pkgs/development/tools/jid/default.nix
  96. +29 −11 pkgs/development/tools/jid/deps.nix
  97. +1 −1 pkgs/development/tools/kind/default.nix
  98. +1 −1 pkgs/development/tools/misc/hound/default.nix
  99. +1 −1 pkgs/development/tools/out-of-tree/default.nix
  100. +1 −1 pkgs/development/tools/skaffold/default.nix
  101. +1 −1 pkgs/development/tools/skopeo/default.nix
  102. +2 −2 pkgs/development/tools/toxiproxy/default.nix
  103. +1 −1 pkgs/development/tools/vgo2nix/default.nix
  104. +1 −1 pkgs/development/tools/wally-cli/default.nix
  105. +1 −1 pkgs/games/boohu/default.nix
  106. +1 −1 pkgs/games/harmonist/default.nix
  107. +4 −4 pkgs/misc/arm-trusted-firmware/default.nix
  108. +1 −1 pkgs/misc/logging/beats/6.x.nix
  109. +1 −1 pkgs/misc/logging/beats/7.x.nix
  110. +42 −0 pkgs/os-specific/linux/libpsm2/default.nix
  111. +2 −2 pkgs/servers/dex/default.nix
  112. +1 −1 pkgs/servers/etcd/default.nix
  113. +4 −4 pkgs/servers/mautrix-whatsapp/default.nix
  114. +3 −3 pkgs/servers/meguca/default.nix
  115. +1 −1 pkgs/servers/miniflux/default.nix
  116. +1 −1 pkgs/servers/monitoring/grafana-reporter/default.nix
  117. +3 −3 pkgs/servers/monitoring/grafana/default.nix
  118. +3 −3 pkgs/servers/monitoring/kapacitor/default.nix
  119. +1 −1 pkgs/servers/monitoring/loki/default.nix
  120. +1 −1 pkgs/servers/monitoring/prometheus/alertmanager.nix
  121. +3 −3 pkgs/servers/monitoring/prometheus/default.nix
  122. +1 −1 pkgs/servers/monitoring/prometheus/postfix-exporter.nix
  123. +1 −1 pkgs/servers/monitoring/prometheus/pushgateway.nix
  124. +2 −2 pkgs/servers/monitoring/telegraf/default.nix
  125. +2 −2 pkgs/servers/monitoring/uchiwa/default.nix
  126. +2 −2 pkgs/servers/nginx-sso/default.nix
  127. +2 −6 pkgs/servers/sql/cockroachdb/default.nix
  128. +3 −3 pkgs/tools/admin/docker-credential-helpers/default.nix
  129. +2 −2 pkgs/tools/admin/lxd/default.nix
  130. +1 −1 pkgs/tools/backup/diskrsync/default.nix
  131. +1 −1 pkgs/tools/backup/duplicacy/default.nix
  132. +1 −1 pkgs/tools/backup/restic/default.nix
  133. +1 −1 pkgs/tools/backup/restic/rest-server.nix
  134. +2 −2 pkgs/tools/filesystems/gcsfuse/default.nix
  135. +1 −1 pkgs/tools/misc/aptly/default.nix
  136. +2 −2 pkgs/tools/misc/diffoscope/default.nix
  137. +3 −3 pkgs/tools/misc/direnv/default.nix
  138. +1 −1 pkgs/tools/misc/mongodb-tools/default.nix
  139. +1 −1 pkgs/tools/misc/phraseapp-client/default.nix
  140. +3 −3 pkgs/tools/misc/tewisay/default.nix
  141. +1 −1 pkgs/tools/networking/assh/default.nix
  142. +8 −8 pkgs/tools/networking/dd-agent/datadog-agent.nix
  143. +4 −4 pkgs/tools/networking/guardian-agent/default.nix
  144. +2 −2 pkgs/tools/package-management/morph/default.nix
  145. +2 −2 pkgs/tools/package-management/nixpkgs-review/default.nix
  146. +2 −2 pkgs/tools/security/brutespray/default.nix
  147. +2 −2 pkgs/tools/security/gopass/default.nix
  148. +1 −1 pkgs/tools/security/hcxdumptool/default.nix
  149. +1 −1 pkgs/tools/security/notary/default.nix
  150. +0 −175 pkgs/tools/security/pass/extensions/audit/0001-Make-it-possible-to-run-the-tests-offline.patch
  151. +5 −4 pkgs/tools/security/pass/extensions/audit/default.nix
  152. +1 −1 pkgs/tools/security/vault/default.nix
  153. +2 −2 pkgs/tools/security/verifpal/default.nix
  154. +1 −1 pkgs/tools/system/localtime/default.nix
  155. +5 −5 pkgs/tools/system/thermald/default.nix
  156. +1 −1 pkgs/tools/virtualization/cri-tools/default.nix
  157. +1 −1 pkgs/tools/virtualization/distrobuilder/default.nix
  158. +2 −0 pkgs/top-level/aliases.nix
  159. +4 −9 pkgs/top-level/all-packages.nix
11 changes: 10 additions & 1 deletion .github/PULL_REQUEST_TEMPLATE.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,13 @@
<!-- Nixpkgs has a lot of new incoming Pull Requests, but not enough people to review this constant stream. Even if you aren't a committer, we would appreciate reviews of other PRs, especially simple ones like package updates. Just testing the relevant package/service and leaving a comment saying what you tested, how you tested it and whether it worked would be great. List of open PRs: <https://github.com/NixOS/nixpkgs/pulls>, for more about reviewing contributions: <https://hydra.nixos.org/job/nixpkgs/trunk/manual/latest/download/1/nixpkgs/manual.html#chap-reviewing-contributions>. Reviewing isn't mandatory, but it would help out a lot and reduce the average time-to-merge for all of us. Thanks a lot if you do! -->
<!--
To help with the large amounts of pull requests, we would appreciate your
reviews of other pull requests, especially simple package updates. Just leave a
comment describing what you have tested in the relevant package/service.
Reviewing helps to reduce the average time-to-merge for everyone.
Thanks a lot if you do!
List of open PRs: https://github.com/NixOS/nixpkgs/pulls
Reviewing guidelines: https://hydra.nixos.org/job/nixpkgs/trunk/manual/latest/download/1/nixpkgs/manual.html#chap-reviewing-contributions
-->

###### Motivation for this change


12 changes: 0 additions & 12 deletions doc/languages-frameworks/go.xml
Original file line number Diff line number Diff line change
@@ -191,18 +191,6 @@ deis = buildGoPackage rec {
To extract dependency information from a Go package in automated way use <link xlink:href="https://github.com/kamilchm/go2nix">go2nix</link>. It can produce complete derivation and <varname>goDeps</varname> file for Go programs.
</para>

<para>
<varname>buildGoPackage</varname> produces <xref linkend='chap-multiple-output' xrefstyle="select: title" /> where <varname>bin</varname> includes program binaries. You can test build a Go binary as follows:
<screen>
<prompt>$ </prompt>nix-build -A deis.bin
</screen>
or build all outputs with:
<screen>
<prompt>$ </prompt>nix-build -A deis.all
</screen>
<varname>bin</varname> output will be installed by default with <varname>nix-env -i</varname> or <varname>systemPackages</varname>.
</para>

<para>
You may use Go packages installed into the active Nix profiles by adding the following to your ~/.bashrc:
<screen>
5 changes: 5 additions & 0 deletions nixos/doc/manual/release-notes/rl-2009.xml
Original file line number Diff line number Diff line change
@@ -312,6 +312,11 @@ environment.systemPackages = [
the <literal>notmuch.emacs</literal> output.
</para>
</listitem>
<listitem>
<para>
The default output of <literal>buildGoPackage</literal> is now <literal>$out</literal> instead of <literal>$bin</literal>.
</para>
</listitem>
</itemizedlist>
</section>
</section>
4 changes: 2 additions & 2 deletions nixos/modules/programs/singularity.nix
Original file line number Diff line number Diff line change
@@ -5,8 +5,8 @@ let
cfg = config.programs.singularity;
singularity = pkgs.singularity.overrideAttrs (attrs : {
installPhase = attrs.installPhase + ''
mv $bin/libexec/singularity/bin/starter-suid $bin/libexec/singularity/bin/starter-suid.orig
ln -s /run/wrappers/bin/singularity-suid $bin/libexec/singularity/bin/starter-suid
mv $out/libexec/singularity/bin/starter-suid $out/libexec/singularity/bin/starter-suid.orig
ln -s /run/wrappers/bin/singularity-suid $out/libexec/singularity/bin/starter-suid
'';
});
in {
Original file line number Diff line number Diff line change
@@ -127,7 +127,7 @@ in
serviceConfig = {
StateDirectory = "gitlab-runner";
ExecReload= "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
ExecStart = ''${cfg.package.bin}/bin/gitlab-runner run \
ExecStart = ''${cfg.package}/bin/gitlab-runner run \
--working-directory ${cfg.workDir} \
--config /etc/gitlab-runner/config.toml \
--service gitlab-runner \
2 changes: 1 addition & 1 deletion nixos/modules/services/misc/confd.nix
Original file line number Diff line number Diff line change
@@ -75,7 +75,7 @@ in {
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
serviceConfig = {
ExecStart = "${cfg.package.bin}/bin/confd";
ExecStart = "${cfg.package}/bin/confd";
};
};

2 changes: 1 addition & 1 deletion nixos/modules/services/misc/etcd.nix
Original file line number Diff line number Diff line change
@@ -178,7 +178,7 @@ in {

serviceConfig = {
Type = "notify";
ExecStart = "${pkgs.etcd.bin}/bin/etcd";
ExecStart = "${pkgs.etcd}/bin/etcd";
User = "etcd";
LimitNOFILE = 40000;
};
16 changes: 8 additions & 8 deletions nixos/modules/services/misc/gitea.nix
Original file line number Diff line number Diff line change
@@ -335,7 +335,7 @@ in
description = "gitea";
after = [ "network.target" ] ++ lib.optional usePostgresql "postgresql.service" ++ lib.optional useMysql "mysql.service";
wantedBy = [ "multi-user.target" ];
path = [ gitea.bin pkgs.gitAndTools.git ];
path = [ gitea pkgs.gitAndTools.git ];

preStart = let
runConfig = "${cfg.stateDir}/custom/conf/app.ini";
@@ -347,11 +347,11 @@ in
cp -f ${configFile} ${runConfig}
if [ ! -e ${secretKey} ]; then
${gitea.bin}/bin/gitea generate secret SECRET_KEY > ${secretKey}
${gitea}/bin/gitea generate secret SECRET_KEY > ${secretKey}
fi
if [ ! -e ${jwtSecret} ]; then
${gitea.bin}/bin/gitea generate secret LFS_JWT_SECRET > ${jwtSecret}
${gitea}/bin/gitea generate secret LFS_JWT_SECRET > ${jwtSecret}
fi
KEY="$(head -n1 ${secretKey})"
@@ -374,7 +374,7 @@ in
HOOKS=$(find ${cfg.repositoryRoot} -mindepth 4 -maxdepth 6 -type f -wholename "*git/hooks/*")
if [ "$HOOKS" ]
then
sed -ri 's,/nix/store/[a-z0-9.-]+/bin/gitea,${gitea.bin}/bin/gitea,g' $HOOKS
sed -ri 's,/nix/store/[a-z0-9.-]+/bin/gitea,${gitea}/bin/gitea,g' $HOOKS
sed -ri 's,/nix/store/[a-z0-9.-]+/bin/env,${pkgs.coreutils}/bin/env,g' $HOOKS
sed -ri 's,/nix/store/[a-z0-9.-]+/bin/bash,${pkgs.bash}/bin/bash,g' $HOOKS
sed -ri 's,/nix/store/[a-z0-9.-]+/bin/perl,${pkgs.perl}/bin/perl,g' $HOOKS
@@ -383,7 +383,7 @@ in
# update command option in authorized_keys
if [ -r ${cfg.stateDir}/.ssh/authorized_keys ]
then
sed -ri 's,/nix/store/[a-z0-9.-]+/bin/gitea,${gitea.bin}/bin/gitea,g' ${cfg.stateDir}/.ssh/authorized_keys
sed -ri 's,/nix/store/[a-z0-9.-]+/bin/gitea,${gitea}/bin/gitea,g' ${cfg.stateDir}/.ssh/authorized_keys
fi
'';

@@ -392,7 +392,7 @@ in
User = cfg.user;
Group = "gitea";
WorkingDirectory = cfg.stateDir;
ExecStart = "${gitea.bin}/bin/gitea web";
ExecStart = "${gitea}/bin/gitea web";
Restart = "always";

# Filesystem
@@ -450,7 +450,7 @@ in
description = "gitea dump";
after = [ "gitea.service" ];
wantedBy = [ "default.target" ];
path = [ gitea.bin ];
path = [ gitea ];

environment = {
USER = cfg.user;
@@ -461,7 +461,7 @@ in
serviceConfig = {
Type = "oneshot";
User = cfg.user;
ExecStart = "${gitea.bin}/bin/gitea dump";
ExecStart = "${gitea}/bin/gitea dump";
WorkingDirectory = cfg.stateDir;
};
};
2 changes: 1 addition & 1 deletion nixos/modules/services/misc/gitlab.nix
Original file line number Diff line number Diff line change
@@ -180,7 +180,7 @@ let
${optionalString (cfg.smtp.passwordFile != null) ''password: "@smtpPassword@",''}
domain: "${cfg.smtp.domain}",
${optionalString (cfg.smtp.authentication != null) "authentication: :${cfg.smtp.authentication},"}
enable_starttls_auto: ${toString cfg.smtp.enableStartTLSAuto},
enable_starttls_auto: ${boolToString cfg.smtp.enableStartTLSAuto},
ca_file: "/etc/ssl/certs/ca-certificates.crt",
openssl_verify_mode: '${cfg.smtp.opensslVerifyMode}'
}
6 changes: 3 additions & 3 deletions nixos/modules/services/misc/gogs.nix
Original file line number Diff line number Diff line change
@@ -200,7 +200,7 @@ in
description = "Gogs (Go Git Service)";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
path = [ pkgs.gogs.bin ];
path = [ pkgs.gogs ];

preStart = let
runConfig = "${cfg.stateDir}/custom/conf/app.ini";
@@ -230,7 +230,7 @@ in
HOOKS=$(find ${cfg.repositoryRoot} -mindepth 4 -maxdepth 4 -type f -wholename "*git/hooks/*")
if [ "$HOOKS" ]
then
sed -ri 's,/nix/store/[a-z0-9.-]+/bin/gogs,${pkgs.gogs.bin}/bin/gogs,g' $HOOKS
sed -ri 's,/nix/store/[a-z0-9.-]+/bin/gogs,${pkgs.gogs}/bin/gogs,g' $HOOKS
sed -ri 's,/nix/store/[a-z0-9.-]+/bin/env,${pkgs.coreutils}/bin/env,g' $HOOKS
sed -ri 's,/nix/store/[a-z0-9.-]+/bin/bash,${pkgs.bash}/bin/bash,g' $HOOKS
sed -ri 's,/nix/store/[a-z0-9.-]+/bin/perl,${pkgs.perl}/bin/perl,g' $HOOKS
@@ -242,7 +242,7 @@ in
User = cfg.user;
Group = cfg.group;
WorkingDirectory = cfg.stateDir;
ExecStart = "${pkgs.gogs.bin}/bin/gogs web";
ExecStart = "${pkgs.gogs}/bin/gogs web";
Restart = "always";
};

2 changes: 1 addition & 1 deletion nixos/modules/services/misc/leaps.nix
Original file line number Diff line number Diff line change
@@ -55,7 +55,7 @@ in
Restart = "on-failure";
WorkingDirectory = stateDir;
PrivateTmp = true;
ExecStart = "${pkgs.leaps.bin}/bin/leaps -path ${toString cfg.path} -address ${cfg.address}:${toString cfg.port}";
ExecStart = "${pkgs.leaps}/bin/leaps -path ${toString cfg.path} -address ${cfg.address}:${toString cfg.port}";
};
};
};
3 changes: 1 addition & 2 deletions nixos/modules/services/misc/ssm-agent.nix
Original file line number Diff line number Diff line change
@@ -35,12 +35,11 @@ in {

path = [ fake-lsb-release ];
serviceConfig = {
ExecStart = "${cfg.package.bin}/bin/agent";
ExecStart = "${cfg.package}/bin/agent";
KillMode = "process";
Restart = "on-failure";
RestartSec = "15min";
};
};
};
}

2 changes: 1 addition & 1 deletion nixos/modules/services/monitoring/bosun.nix
Original file line number Diff line number Diff line change
@@ -148,7 +148,7 @@ in {
User = cfg.user;
Group = cfg.group;
ExecStart = ''
${cfg.package.bin}/bin/bosun -c ${configFile}
${cfg.package}/bin/bosun -c ${configFile}
'';
};
};
2 changes: 1 addition & 1 deletion nixos/modules/services/monitoring/grafana-reporter.nix
Original file line number Diff line number Diff line change
@@ -59,7 +59,7 @@ in {
"-templates ${cfg.templateDir}"
];
in {
ExecStart = "${pkgs.grafana_reporter.bin}/bin/grafana-reporter ${args}";
ExecStart = "${pkgs.grafana_reporter}/bin/grafana-reporter ${args}";
};
};
};
2 changes: 1 addition & 1 deletion nixos/modules/services/monitoring/grafana.nix
Original file line number Diff line number Diff line change
@@ -535,7 +535,7 @@ in {
${optionalString cfg.provision.enable ''
export GF_PATHS_PROVISIONING=${provisionConfDir};
''}
exec ${cfg.package.bin}/bin/grafana-server -homepath ${cfg.dataDir}
exec ${cfg.package}/bin/grafana-server -homepath ${cfg.dataDir}
'';
serviceConfig = {
WorkingDirectory = cfg.dataDir;
Original file line number Diff line number Diff line change
@@ -58,7 +58,7 @@ in
in {
serviceConfig = {
ExecStart = ''
${pkgs.prometheus-snmp-exporter.bin}/bin/snmp_exporter \
${pkgs.prometheus-snmp-exporter}/bin/snmp_exporter \
--config.file=${escapeShellArg configFile} \
--log.format=${escapeShellArg cfg.logFormat} \
--log.level=${cfg.logLevel} \
2 changes: 1 addition & 1 deletion nixos/modules/services/monitoring/scollector.nix
Original file line number Diff line number Diff line change
@@ -118,7 +118,7 @@ in {
serviceConfig = {
User = cfg.user;
Group = cfg.group;
ExecStart = "${cfg.package.bin}/bin/scollector -conf=${conf} ${lib.concatStringsSep " " cfg.extraOpts}";
ExecStart = "${cfg.package}/bin/scollector -conf=${conf} ${lib.concatStringsSep " " cfg.extraOpts}";
};
};

8 changes: 4 additions & 4 deletions nixos/modules/services/networking/consul.nix
Original file line number Diff line number Diff line change
@@ -179,15 +179,15 @@ in
(filterAttrs (n: _: hasPrefix "consul.d/" n) config.environment.etc);

serviceConfig = {
ExecStart = "@${cfg.package.bin}/bin/consul consul agent -config-dir /etc/consul.d"
ExecStart = "@${cfg.package}/bin/consul consul agent -config-dir /etc/consul.d"
+ concatMapStrings (n: " -config-file ${n}") configFiles;
ExecReload = "${cfg.package.bin}/bin/consul reload";
ExecReload = "${cfg.package}/bin/consul reload";
PermissionsStartOnly = true;
User = if cfg.dropPrivileges then "consul" else null;
Restart = "on-failure";
TimeoutStartSec = "infinity";
} // (optionalAttrs (cfg.leaveOnStop) {
ExecStop = "${cfg.package.bin}/bin/consul leave";
ExecStop = "${cfg.package}/bin/consul leave";
});

path = with pkgs; [ iproute gnugrep gawk consul ];
@@ -238,7 +238,7 @@ in

serviceConfig = {
ExecStart = ''
${cfg.alerts.package.bin}/bin/consul-alerts start \
${cfg.alerts.package}/bin/consul-alerts start \
--alert-addr=${cfg.alerts.listenAddr} \
--consul-addr=${cfg.alerts.consulAddr} \
${optionalString cfg.alerts.watchChecks "--watch-checks"} \
6 changes: 3 additions & 3 deletions nixos/modules/services/networking/flannel.nix
Original file line number Diff line number Diff line change
@@ -19,8 +19,8 @@ in {
package = mkOption {
description = "Package to use for flannel";
type = types.package;
default = pkgs.flannel.bin;
defaultText = "pkgs.flannel.bin";
default = pkgs.flannel;
defaultText = "pkgs.flannel";
};

publicIp = mkOption {
@@ -167,7 +167,7 @@ in {
touch /run/flannel/docker
'' + optionalString (cfg.storageBackend == "etcd") ''
echo "setting network configuration"
until ${pkgs.etcdctl.bin}/bin/etcdctl set /coreos.com/network/config '${builtins.toJSON networkConfig}'
until ${pkgs.etcdctl}/bin/etcdctl set /coreos.com/network/config '${builtins.toJSON networkConfig}'
do
echo "setting network configuration, retry"
sleep 1
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/skydns.nix
Original file line number Diff line number Diff line change
@@ -83,7 +83,7 @@ in {
SKYDNS_NAMESERVERS = concatStringsSep "," cfg.nameservers;
};
serviceConfig = {
ExecStart = "${cfg.package.bin}/bin/skydns";
ExecStart = "${cfg.package}/bin/skydns";
};
};

16 changes: 13 additions & 3 deletions nixos/modules/services/printing/cupsd.nix
Original file line number Diff line number Diff line change
@@ -153,6 +153,16 @@ in
'';
};

allowFrom = mkOption {
type = types.listOf types.str;
default = [ "localhost" ];
example = [ "all" ];
apply = concatMapStringsSep "\n" (x: "Allow ${x}");
description = ''
From which hosts to allow unconditional access.
'';
};

bindirCmds = mkOption {
type = types.lines;
internal = true;
@@ -403,19 +413,19 @@ in
<Location />
Order allow,deny
Allow localhost
${cfg.allowFrom}
</Location>
<Location /admin>
Order allow,deny
Allow localhost
${cfg.allowFrom}
</Location>
<Location /admin/conf>
AuthType Basic
Require user @SYSTEM
Order allow,deny
Allow localhost
${cfg.allowFrom}
</Location>
<Policy default>
4 changes: 2 additions & 2 deletions nixos/modules/services/security/hologram-agent.nix
Original file line number Diff line number Diff line change
@@ -43,12 +43,12 @@ in {
description = "Provide EC2 instance credentials to machines outside of EC2";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
requires = [ "network-link-dummy0.service" "network-addresses-dummy0.service" ];
requires = [ "network-link-dummy0.service" "network-addresses-dummy0.service" ];
preStart = ''
/run/current-system/sw/bin/rm -fv /run/hologram.sock
'';
serviceConfig = {
ExecStart = "${pkgs.hologram.bin}/bin/hologram-agent -debug -conf ${cfgFile} -port ${cfg.httpPort}";
ExecStart = "${pkgs.hologram}/bin/hologram-agent -debug -conf ${cfgFile} -port ${cfg.httpPort}";
};
};

2 changes: 1 addition & 1 deletion nixos/modules/services/security/hologram-server.nix
Original file line number Diff line number Diff line change
@@ -123,7 +123,7 @@ in {
wantedBy = [ "multi-user.target" ];

serviceConfig = {
ExecStart = "${pkgs.hologram.bin}/bin/hologram-server --debug --conf ${cfgFile}";
ExecStart = "${pkgs.hologram}/bin/hologram-server --debug --conf ${cfgFile}";
};
};
};
2 changes: 1 addition & 1 deletion nixos/modules/services/security/oauth2_proxy.nix
Original file line number Diff line number Diff line change
@@ -577,7 +577,7 @@ in
serviceConfig = {
User = "oauth2_proxy";
Restart = "always";
ExecStart = "${cfg.package.bin}/bin/oauth2_proxy ${configString}";
ExecStart = "${cfg.package}/bin/oauth2_proxy ${configString}";
EnvironmentFile = mkIf (cfg.keyFile != null) cfg.keyFile;
};
};
2 changes: 1 addition & 1 deletion nixos/modules/services/web-apps/mattermost.nix
Original file line number Diff line number Diff line change
@@ -224,7 +224,7 @@ in
serviceConfig = {
User = "nobody";
Group = "nogroup";
ExecStart = "${pkgs.matterircd.bin}/bin/matterircd ${concatStringsSep " " cfg.matterircd.parameters}";
ExecStart = "${pkgs.matterircd}/bin/matterircd ${concatStringsSep " " cfg.matterircd.parameters}";
WorkingDirectory = "/tmp";
PrivateTmp = true;
Restart = "always";
Loading