Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 74a80c5a9ab0
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 9137f05564eb
Choose a head ref
  • 12 commits
  • 9 files changed
  • 8 contributors

Commits on Apr 26, 2020

  1. wireguard-tools: reference tests

    (cherry picked from commit 77dc7ef)
    Mic92 authored and Ma27 committed Apr 26, 2020

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    Ma27 Maximilian Bosch
    Copy the full SHA
    24cf10d View commit details
  2. wireguard: 1.0.20200401 -> 1.0.20200413

    (cherry picked from commit 21ec1f5)
    Mic92 authored and Ma27 committed Apr 26, 2020

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    Ma27 Maximilian Bosch
    Copy the full SHA
    a49a2fb View commit details
  3. zulip: 4.0.0 -> 5.0.0 (#85770)

    Zulip 5.0 fixes multiple security issues. See:
    https://blog.zulip.org/2020/04/01/zulip-desktop-5-0-0-security-release/
    
    (cherry picked from commit 1586f28)
    Reason: Zulip < 5.0.0 no longer works with the Zulip server---if you run
    it with an up to date Zulip server you get an error message requesting
    you upgrade to 5.0 and the app will otherwise not be functional.
    alevy authored Apr 26, 2020

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    c0c339b View commit details
  4. ec2-amis.nix: add NixOS 20.03 images

    Fixes #85857.
    
    (cherry picked from commit 9cf9e66)
    AmineChikhaoui committed Apr 26, 2020

    Verified

    This commit was signed with the committer’s verified signature.
    AmineChikhaoui Amine Chikhaoui
    Copy the full SHA
    a1e2b64 View commit details
  5. Merge pull request #86060 from AmineChikhaoui/20.03-amis-backport

    [20.03] ec2-amis.nix: add NixOS 20.03 images
    grahamc authored Apr 26, 2020

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    0cd47d9 View commit details
  6. Update commit policy for stable release branches

    only very few people followed the strict policy in the last 5 years. the
    maintainers accept backports without reason when it's obvious, so i
    updated the policy to reflect that
    
    (cherry picked from commit bcc269e6c87a4f445a7ede5207fe3537b0ce7648)
    davidak committed Apr 26, 2020
    Copy the full SHA
    57e2dcb View commit details
  7. linux: 4.14.176 -> 4.14.177

    (cherry picked from commit 6617a79)
    NeQuissimus committed Apr 26, 2020

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    NeQuissimus Tim Steinbach
    Copy the full SHA
    e98c886 View commit details
  8. linux: 4.4.219 -> 4.4.220

    (cherry picked from commit 6efb2ba)
    NeQuissimus committed Apr 26, 2020

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    NeQuissimus Tim Steinbach
    Copy the full SHA
    29b1136 View commit details
  9. linux: 4.9.219 -> 4.9.220

    (cherry picked from commit 4883dde)
    NeQuissimus committed Apr 26, 2020

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    NeQuissimus Tim Steinbach
    Copy the full SHA
    ba710d9 View commit details
  10. Merge pull request #86066 from davidak/backport-commit-policy

    [20.03] Update commit policy for stable release branches
    worldofpeace authored Apr 26, 2020

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    5bc2da9 View commit details
  11. lua51Packages.luaexpat: Removing broken meta attribute.

    It seems like luaexpat as been mistakenly marked as broken during a
    20.03 a zero hydra failures tree-wide commit. Removing the broken meta
    attribute.
    
    Discovered this problem when trying to rebuild the prosody XMPP server.
    picnoir committed Apr 26, 2020

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    picnoir Félix
    Copy the full SHA
    5a31e46 View commit details
  12. Merge pull request #86071 from NinjaTrappeur/luaexpat-remove-broken

    lua51Packages.luaexpat: Removing broken meta attribute.
    worldofpeace authored Apr 26, 2020

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    9137f05 View commit details
48 changes: 36 additions & 12 deletions doc/contributing/submitting-changes.xml
Original file line number Diff line number Diff line change
@@ -407,23 +407,47 @@ Additional information.
<section xml:id="submitting-changes-stable-release-branches">
<title>Stable release branches</title>

<itemizedlist>
<para>
For cherry-picking a commit to a stable release branch (<quote>backporting</quote>), use <literal>git cherry-pick -x &lt;original commit&gt;</literal> so that the original commit id is included in the commit.
</para>

<para>
Add a reason for the backport by using <literal>git cherry-pick -xe &lt;original commit&gt;</literal> instead when it is not obvious from the original commit message. It is not needed when it’s a minor version update that includes security and bug fixes but don’t add new features or when the commit fixes an otherwise broken package.
</para>

<para>
Here is an example of a cherry-picked commit message with good reason description:
</para>

<screen>
zfs: Keep trying root import until it works

Works around #11003.

(cherry picked from commit 98b213a11041af39b39473906b595290e2a4e2f9)

Reason: several people cannot boot with ZFS on NVMe
</screen>

<para>
Other examples of reasons are:
</para>

<itemizedlist spacing="compact">
<listitem>
<para>
If you're cherry-picking a commit to a stable release branch (“backporting”), always use <command>git cherry-pick -xe</command> and ensure the message contains a clear description about why this needs to be included in the stable branch.
Previously the build would fail due to, e.g., <literal>getaddrinfo</literal> not being defined
</para>
</listitem>
<listitem>
<para>
An example of a cherry-picked commit would look like this:
The previous download links were all broken
</para>
</listitem>
<listitem>
<para>
Crash when starting on some X11 systems
</para>
<screen>
nixos: Refactor the world.

The original commit message describing the reason why the world was torn apart.

(cherry picked from commit abcdef)
Reason: I just had a gut feeling that this would also be wanted by people from
the stone age.
</screen>
</listitem>
</itemizedlist>
</section>
21 changes: 20 additions & 1 deletion nixos/modules/virtualisation/ec2-amis.nix
Original file line number Diff line number Diff line change
@@ -307,5 +307,24 @@ let self = {
"19.09".ap-northeast-2.hvm-ebs = "ami-03d4ae7d0b5fc364f";
"19.09".ap-south-1.hvm-ebs = "ami-0b599690b35aeef23";

latest = self."19.09";
# 20.03.1554.94e39623a49
"20.03".eu-west-1.hvm-ebs = "ami-02c34db5766cc7013";
"20.03".eu-west-2.hvm-ebs = "ami-0e32bd8c7853883f1";
"20.03".eu-west-3.hvm-ebs = "ami-061edb1356c1d69fd";
"20.03".eu-central-1.hvm-ebs = "ami-0a1a94722dcbff94c";
"20.03".eu-north-1.hvm-ebs = "ami-02699abfacbb6464b";
"20.03".us-east-1.hvm-ebs = "ami-0c5e7760748b74e85";
"20.03".us-east-2.hvm-ebs = "ami-030296bb256764655";
"20.03".us-west-1.hvm-ebs = "ami-050be818e0266b741";
"20.03".us-west-2.hvm-ebs = "ami-06562f78dca68eda2";
"20.03".ca-central-1.hvm-ebs = "ami-02365684a173255c7";
"20.03".ap-southeast-1.hvm-ebs = "ami-0dbf353e168d155f7";
"20.03".ap-southeast-2.hvm-ebs = "ami-04c0f3a75f63daddd";
"20.03".ap-northeast-1.hvm-ebs = "ami-093d9cc49c191eb6c";
"20.03".ap-northeast-2.hvm-ebs = "ami-0087df91a7b6ebd45";
"20.03".ap-south-1.hvm-ebs = "ami-0a1a6b569af04af9d";
"20.03".ap-east-1.hvm-ebs = "ami-0d18fdd309cdefa86";
"20.03".sa-east-1.hvm-ebs = "ami-09859378158ae971d";

latest = self."20.03";
}; in self
Original file line number Diff line number Diff line change
@@ -5,12 +5,12 @@

let
pname = "zulip";
version = "4.0.0";
version = "5.0.0";
name = "${pname}-${version}";

src = fetchurl {
url = "https://github.com/zulip/zulip-desktop/releases/download/v${version}/Zulip-${version}-x86_64.AppImage";
sha256 = "1pni02mb5bvwx3k45vd6ga269ghdl633gjklyslai24rrhp16h9z";
sha256 = "0qwlhkzb3lbzk3piyfx8nn827kcafrl3j1nxrn18f8px9gwasinz";
name="${pname}-${version}.AppImage";
};

1 change: 0 additions & 1 deletion pkgs/development/lua-modules/generated-packages.nix
Original file line number Diff line number Diff line change
@@ -1558,4 +1558,3 @@ vstruct = buildLuarocksPackage {

}
/* GENERATED */

4 changes: 2 additions & 2 deletions pkgs/os-specific/linux/kernel/linux-4.14.nix
Original file line number Diff line number Diff line change
@@ -3,7 +3,7 @@
with stdenv.lib;

buildLinux (args // rec {
version = "4.14.176";
version = "4.14.177";

# modDirVersion needs to be x.y.z, will automatically add .0 if needed
modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg;
@@ -13,6 +13,6 @@ buildLinux (args // rec {

src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
sha256 = "18jwxhf29ax54xnylmz9zfkslnxw7y3h215dbfmmvddfp9b0kbmw";
sha256 = "04hq0i06mg2yc09jj2xk0vhf5q9yigzjzm55a5bvfy2a6j43r9rk";
};
} // (args.argsOverride or {}))
4 changes: 2 additions & 2 deletions pkgs/os-specific/linux/kernel/linux-4.4.nix
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
{ stdenv, buildPackages, fetchurl, perl, buildLinux, ... } @ args:

buildLinux (args // rec {
version = "4.4.219";
version = "4.4.220";
extraMeta.branch = "4.4";

src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
sha256 = "1mpxqb2m24ay4n9px4n2cyklxy4lhnv9q6wlvilx13rs5qfbb62f";
sha256 = "1knj3qsl7x3fysdz1h0s980ddbafs3658z2y67w6sn79wp7d8blg";
};
} // (args.argsOverride or {}))
4 changes: 2 additions & 2 deletions pkgs/os-specific/linux/kernel/linux-4.9.nix
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
{ stdenv, buildPackages, fetchurl, perl, buildLinux, ... } @ args:

buildLinux (args // rec {
version = "4.9.219";
version = "4.9.220";
extraMeta.branch = "4.9";

src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
sha256 = "0i5wlyp11ss9p035bhq73xjx8iyk5dk4ynvd7msw5qfkrs6265vb";
sha256 = "0bhbkybzbdsbmrjmb5m7hxxl8b3v6n79zhh86cbr95kzg1hcgnfs";
};
} // (args.argsOverride or {}))
28 changes: 15 additions & 13 deletions pkgs/os-specific/linux/wireguard/default.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{ stdenv, fetchzip, kernel, perl, wireguard-tools }:
{ stdenv, fetchzip, kernel, perl, wireguard-tools, bc }:

# module requires Linux >= 3.10 https://www.wireguard.io/install/#kernel-requirements
assert stdenv.lib.versionAtLeast kernel.version "3.10";
@@ -7,29 +7,31 @@ assert stdenv.lib.versionOlder kernel.version "5.6";

stdenv.mkDerivation rec {
pname = "wireguard";
version = "1.0.20200401";
version = "1.0.20200413";

src = fetchzip {
url = "https://git.zx2c4.com/wireguard-linux-compat/snapshot/wireguard-linux-compat-${version}.tar.xz";
sha256 = "1q4gfpbvbyracnl219xqfz5yqfc08i6g41z6bn2skx5x8jbll3aq";
sha256 = "11dpw1inszbc3qjcfnap74kgjxkyyrx90vxv6wmsgkbp8lsl4p66";
};

preConfigure = ''
cd src
sed -i '/depmod/,+1d' Makefile
'';

hardeningDisable = [ "pic" ];

KERNELDIR = "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build";
INSTALL_MOD_PATH = "\${out}";

NIX_CFLAGS = ["-Wno-error=cpp"];

nativeBuildInputs = [ perl ] ++ kernel.moduleBuildDependencies;
nativeBuildInputs = [ perl bc ] ++ kernel.moduleBuildDependencies;

preBuild = "cd src";
buildFlags = [ "module" ];
installTargets = [ "module-install" ];

INSTALL_MOD_PATH = placeholder "out";
installFlags = [ "DEPMOD=true" ];
enableParallelBuilding = true;

passthru = {
# remove this when our kernel comes with native wireguard support
# and our tests no longer tests this package
inherit (wireguard-tools) tests;
};

meta = with stdenv.lib; {
inherit (wireguard-tools.meta) homepage license maintainers;
25 changes: 15 additions & 10 deletions pkgs/tools/networking/wireguard-tools/default.nix
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
{
stdenv, fetchzip,

iptables ? null,
iproute ? null,
makeWrapper ? null,
openresolv ? null,
procps ? null,
wireguard-go ? null,
{ stdenv
, fetchzip
, nixosTests
, iptables ? null
, iproute ? null
, makeWrapper ? null
, openresolv ? null
, procps ? null
, wireguard-go ? null
}:

with stdenv.lib;
@@ -47,7 +47,12 @@ stdenv.mkDerivation rec {
done
'';

passthru.updateScript = ./update.sh;
passthru = {
updateScript = ./update.sh;
tests = {
inherit (nixosTests) wireguard wireguard-generated wireguard-namespaces;
};
};

meta = {
description = "Tools for the WireGuard secure network tunnel";