Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 642134d5ad76
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 690dd986b234
Choose a head ref

Commits on Jan 23, 2020

  1. Copy the full SHA
    2c9bff9 View commit details

Commits on Jan 26, 2020

  1. gpodder: 3.10.11 -> 3.10.12

    r-ryantm committed Jan 26, 2020
    Copy the full SHA
    c685471 View commit details

Commits on Jan 28, 2020

  1. bitwarden_rs: 1.9.1 -> 1.13.1

    msteen committed Jan 28, 2020
    Copy the full SHA
    44dff89 View commit details

Commits on Jan 29, 2020

  1. Copy the full SHA
    7b2ba1b View commit details

Commits on Jan 30, 2020

  1. dino: 2019-10-28 -> 0.1.0

    The system libsignal-protocol-c is preferred now, so fetching
    submodules is no longer required.
    
    The other libraries added are ones that the build complained about.  I
    suspect they are optional dependencies.  Adding them makes the build
    quieter, and has basically no impact on runtime closure size, so no
    harm in making them available to keep the build system happy.
    alyssais committed Jan 30, 2020
    Copy the full SHA
    d506e9d View commit details
  2. dino: drop unnecessary enableParallelBuilding

    This is the default.
    alyssais committed Jan 30, 2020
    Copy the full SHA
    131ec9d View commit details
  3. Copy the full SHA
    adb89be View commit details
  4. dino: fix rendering of logo in about window

    Previously:
    
    ** (dino:7442): CRITICAL **: 00:35:22.373: file /build/source/main/src/ui/unified_window.vala: line 86: uncaught error: Unrecognized image file format (gdk-pixbuf-error-quark, 3)
    
    (dino:7442): Gtk-WARNING **: 00:35:22.601: Found an icon but could not load it. Most likely gdk-pixbuf does not provide SVG support.
    alyssais committed Jan 30, 2020
    Copy the full SHA
    091b710 View commit details
  5. Copy the full SHA
    2778f02 View commit details
  6. Merge pull request #78813 from stigtsp/package/ripasso-cursive-0.4.0

    ripasso-cursive: 0.3.0 -> 0.4.0
    etu authored Jan 30, 2020
    Copy the full SHA
    5f6bf6c View commit details
  7. Merge pull request #78241 from andrew-d/andrew/systemd-tests-python

    nixosTests.systemd: port to Python
    worldofpeace authored Jan 30, 2020
    Copy the full SHA
    b46a1b5 View commit details
  8. dino: 2019-10-28 -> 0.1.0 (#78789)

    dino: 2019-10-28 -> 0.1.0
    Mic92 authored Jan 30, 2020
    Copy the full SHA
    acf3b25 View commit details
  9. Copy the full SHA
    b81d1b1 View commit details
  10. python27Packages.ROPGadget: 5.9 -> 6.0

    r-ryantm authored and bennofs committed Jan 30, 2020
    Copy the full SHA
    aecdd87 View commit details
  11. qdigidoc: 4.1.0 -> 4.2.3

    using mkDerivation
    mmahut authored and bennofs committed Jan 30, 2020
    Copy the full SHA
    c4594f8 View commit details
  12. qdigidoc: adding mmahut as maintainer

    mmahut authored and bennofs committed Jan 30, 2020
    Copy the full SHA
    84eb0be View commit details
  13. nim: 1.0.4 -> 1.0.6

    ehmry authored and bennofs committed Jan 30, 2020
    Copy the full SHA
    b4fd657 View commit details
  14. Merge pull request #77082 from misuzu/git-workspace-init

    gitAndTools.git-workspace: init at 0.4.1
    worldofpeace authored Jan 30, 2020
    Copy the full SHA
    183e706 View commit details
  15. argbash: fix build

    * Fixed sourceRoot as it's not possible to write in a different
      store-path (`${src}` in this case).
    * Patched shebangs to not use `/bin/bash`.
    * Added `docutils` to nativeBuildInputs to fix build of the man-pages
    
    See also https://hydra.nixos.org/build/110901127
    Ma27 committed Jan 30, 2020
    Copy the full SHA
    8539d5f View commit details
  16. Merge pull request #78615 from msteen/bitwarden_rs

    bitwarden_rs: 1.9.1 -> 1.13.1
    Mic92 authored Jan 30, 2020
    Copy the full SHA
    d72905c View commit details
  17. gpodder: 3.10.11 -> 3.10.12 (#78507)

    gpodder: 3.10.11 -> 3.10.12
    Mic92 authored Jan 30, 2020
    Copy the full SHA
    afa36de View commit details
  18. Merge pull request #78768 from romildo/upd.qogir-icon-theme

    qogir-icon-theme: 2019-09-15 -> 2020-01-29
    romildo authored Jan 30, 2020
    Copy the full SHA
    690dd98 View commit details
44 changes: 30 additions & 14 deletions nixos/modules/services/security/bitwarden_rs/default.nix
Original file line number Diff line number Diff line change
@@ -18,15 +18,33 @@ let
else key + toUpper x) "" parts;
in if builtins.match "[A-Z0-9_]+" name != null then name else partsToEnvVar parts;

configFile = pkgs.writeText "bitwarden_rs.env" (concatMapStrings (s: s + "\n") (
(concatLists (mapAttrsToList (name: value:
if value != null then [ "${nameToEnvVar name}=${if isBool value then boolToString value else toString value}" ] else []
) cfg.config))));
# Due to the different naming schemes allowed for config keys,
# we can only check for values consistently after converting them to their corresponding environment variable name.
configEnv =
let
configEnv = listToAttrs (concatLists (mapAttrsToList (name: value:
if value != null then [ (nameValuePair (nameToEnvVar name) (if isBool value then boolToString value else toString value)) ] else []
) cfg.config));
in { DATA_FOLDER = "/var/lib/bitwarden_rs"; } // optionalAttrs (!(configEnv ? WEB_VAULT_ENABLED) || configEnv.WEB_VAULT_ENABLED == "true") {
WEB_VAULT_FOLDER = "${pkgs.bitwarden_rs-vault}/share/bitwarden_rs/vault";
} // configEnv;

configFile = pkgs.writeText "bitwarden_rs.env" (concatStrings (mapAttrsToList (name: value: "${name}=${value}\n") configEnv));

bitwarden_rs = pkgs.bitwarden_rs.override { inherit (cfg) dbBackend; };

in {
options.services.bitwarden_rs = with types; {
enable = mkEnableOption "bitwarden_rs";

dbBackend = mkOption {
type = enum [ "sqlite" "mysql" "postgresql" ];
default = "sqlite";
description = ''
Which database backend bitwarden_rs will be using.
'';
};

backupDir = mkOption {
type = nullOr str;
default = null;
@@ -56,23 +74,20 @@ in {
even though foo2 would have been converted to FOO_2.
This allows working around any potential future conflicting naming conventions.
Based on the attributes passed to this config option a environment file will be generated
Based on the attributes passed to this config option an environment file will be generated
that is passed to bitwarden_rs's systemd service.
The available configuration options can be found in
<link xlink:href="https://github.com/dani-garcia/bitwarden_rs/blob/1.8.0/.env.template">the environment template file</link>.
<link xlink:href="https://github.com/dani-garcia/bitwarden_rs/blob/${bitwarden_rs.version}/.env.template">the environment template file</link>.
'';
apply = config: optionalAttrs config.webVaultEnabled {
webVaultFolder = "${pkgs.bitwarden_rs-vault}/share/bitwarden_rs/vault";
} // config;
};
};

config = mkIf cfg.enable {
services.bitwarden_rs.config = {
dataFolder = "/var/lib/bitwarden_rs";
webVaultEnabled = mkDefault true;
};
assertions = [ {
assertion = cfg.backupDir != null -> cfg.dbBackend == "sqlite";
message = "Backups for database backends other than sqlite will need customization";
} ];

users.users.bitwarden_rs = {
inherit group;
@@ -87,7 +102,7 @@ in {
User = user;
Group = group;
EnvironmentFile = configFile;
ExecStart = "${pkgs.bitwarden_rs}/bin/bitwarden_rs";
ExecStart = "${bitwarden_rs}/bin/bitwarden_rs";
LimitNOFILE = "1048576";
LimitNPROC = "64";
PrivateTmp = "true";
@@ -109,6 +124,7 @@ in {
path = with pkgs; [ sqlite ];
serviceConfig = {
SyslogIdentifier = "backup-bitwarden_rs";
Type = "oneshot";
User = mkDefault user;
Group = mkDefault group;
ExecStart = "${pkgs.bash}/bin/bash ${./backup.sh}";
93 changes: 56 additions & 37 deletions nixos/tests/systemd.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
import ./make-test.nix ({ pkgs, ... }: {
import ./make-test-python.nix ({ pkgs, ... }: {
name = "systemd";

machine = { lib, ... }: {
@@ -53,50 +53,69 @@ import ./make-test.nix ({ pkgs, ... }: {
};

testScript = ''
$machine->waitForX;
import re
import subprocess
machine.wait_for_x()
# wait for user services
$machine->waitForUnit("default.target","alice");
machine.wait_for_unit("default.target", "alice")
# Regression test for https://github.com/NixOS/nixpkgs/issues/35415
subtest "configuration files are recognized by systemd", sub {
$machine->succeed('test -e /system_conf_read');
$machine->succeed('test -e /home/alice/user_conf_read');
$machine->succeed('test -z $(ls -1 /var/log/journal)');
};
with subtest("configuration files are recognized by systemd"):
machine.succeed("test -e /system_conf_read")
machine.succeed("test -e /home/alice/user_conf_read")
machine.succeed("test -z $(ls -1 /var/log/journal)")
# Regression test for https://github.com/NixOS/nixpkgs/issues/50273
subtest "DynamicUser actually allocates a user", sub {
$machine->succeed('systemd-run --pty --property=Type=oneshot --property=DynamicUser=yes --property=User=iamatest whoami | grep iamatest');
};
with subtest("DynamicUser actually allocates a user"):
assert "iamatest" in machine.succeed(
"systemd-run --pty --property=Type=oneshot --property=DynamicUser=yes --property=User=iamatest whoami"
)
# Regression test for https://github.com/NixOS/nixpkgs/issues/35268
subtest "file system with x-initrd.mount is not unmounted", sub {
$machine->succeed('mountpoint -q /test-x-initrd-mount');
$machine->shutdown;
system('qemu-img', 'convert', '-O', 'raw',
'vm-state-machine/empty2.qcow2', 'x-initrd-mount.raw');
my $extinfo = `${pkgs.e2fsprogs}/bin/dumpe2fs x-initrd-mount.raw`;
die "File system was not cleanly unmounted: $extinfo"
unless $extinfo =~ /^Filesystem state: *clean$/m;
};
with subtest("file system with x-initrd.mount is not unmounted"):
machine.succeed("mountpoint -q /test-x-initrd-mount")
machine.shutdown()
subtest "systemd-shutdown works", sub {
$machine->shutdown;
$machine->waitForUnit('multi-user.target');
$machine->succeed('test -e /tmp/shared/shutdown-test');
};
subprocess.check_call(
[
"qemu-img",
"convert",
"-O",
"raw",
"vm-state-machine/empty0.qcow2",
"x-initrd-mount.raw",
]
)
extinfo = subprocess.check_output(
[
"${pkgs.e2fsprogs}/bin/dumpe2fs",
"x-initrd-mount.raw",
]
).decode("utf-8")
assert (
re.search(r"^Filesystem state: *clean$", extinfo, re.MULTILINE) is not None
), ("File system was not cleanly unmounted: " + extinfo)
with subtest("systemd-shutdown works"):
machine.shutdown()
machine.wait_for_unit("multi-user.target")
machine.succeed("test -e /tmp/shared/shutdown-test")
# Test settings from /etc/sysctl.d/50-default.conf are applied
with subtest("systemd sysctl settings are applied"):
machine.wait_for_unit("multi-user.target")
assert "fq_codel" in machine.succeed("sysctl net.core.default_qdisc")
# Test cgroup accounting is enabled
with subtest("systemd cgroup accounting is enabled"):
machine.wait_for_unit("multi-user.target")
assert "yes" in machine.succeed(
"systemctl show testservice1.service -p IOAccounting"
)
# Test settings from /etc/sysctl.d/50-default.conf are applied
subtest "systemd sysctl settings are applied", sub {
$machine->waitForUnit('multi-user.target');
$machine->succeed('sysctl net.core.default_qdisc | grep -q "fq_codel"');
};
# Test cgroup accounting is enabled
subtest "systemd cgroup accounting is enabled", sub {
$machine->waitForUnit('multi-user.target');
$machine->succeed('systemctl show testservice1.service -p IOAccounting | grep -q "yes"');
$machine->succeed('systemctl status testservice1.service | grep -q "CPU:"');
};
retcode, output = machine.execute("systemctl status testservice1.service")
assert retcode in [0, 3] # https://bugs.freedesktop.org/show_bug.cgi?id=77507
assert "CPU:" in output
'';
})
4 changes: 2 additions & 2 deletions pkgs/applications/audio/gpodder/default.nix
Original file line number Diff line number Diff line change
@@ -5,14 +5,14 @@

python3Packages.buildPythonApplication rec {
pname = "gpodder";
version = "3.10.11";
version = "3.10.12";
format = "other";

src = fetchFromGitHub {
owner = pname;
repo = pname;
rev = version;
sha256 = "15f5z3cnch9lpzbz73l4wjykv9n74y8djz5db53la2ql4ihaxfz9";
sha256 = "0q95am079gg01dkivr972mm2k87y8z296a9yf7amzsf9hxfycdra";
};

patches = [
25 changes: 16 additions & 9 deletions pkgs/applications/networking/instant-messengers/dino/default.nix
Original file line number Diff line number Diff line change
@@ -2,7 +2,8 @@
, vala, cmake, ninja, wrapGAppsHook, pkgconfig, gettext
, gobject-introspection, gnome3, glib, gdk-pixbuf, gtk3, glib-networking
, xorg, libXdmcp, libxkbcommon
, libnotify, libsoup, libgee
, libnotify, libsoup, libgee, utillinux, libselinux, libsepol, libpsl, brotli
, librsvg, libsignal-protocol-c
, libgcrypt
, epoxy
, at-spi2-core
@@ -14,15 +15,15 @@
, icu
}:

stdenv.mkDerivation {
name = "dino-unstable-2019-10-28";
stdenv.mkDerivation rec {
pname = "dino";
version = "0.1.0";

src = fetchFromGitHub {
owner = "dino";
repo = "dino";
rev = "388cc56674487e7b9e339637369fc55f0e271daf";
sha256 = "1v8rnjbzi8qhwb1fv787byxk8ygfs16z2j64h0s6sd3asr4n0kz1";
fetchSubmodules = true;
rev = "v${version}";
sha256 = "1k5cgj5n8s40i71wqdh6m1q0njl45ichfdbbywx9rga5hljz1c54";
};

nativeBuildInputs = [
@@ -51,21 +52,27 @@ stdenv.mkDerivation {
pcre
xorg.libxcb
xorg.libpthreadstubs
xorg.libXtst
libXdmcp
libxkbcommon
epoxy
at-spi2-core
dbus
icu
utillinux
libselinux
libsepol
libpsl
brotli
libsignal-protocol-c
librsvg
];

enableParallelBuilding = true;

meta = with stdenv.lib; {
description = "Modern Jabber/XMPP Client using GTK/Vala";
homepage = https://github.com/dino/dino;
license = licenses.gpl3;
platforms = platforms.linux;
maintainers = [ maintainers.mic92 ];
maintainers = with maintainers; [ mic92 qyliss ];
};
}
Original file line number Diff line number Diff line change
@@ -135,6 +135,10 @@ let

git-test = callPackage ./git-test { };

git-workspace = callPackage ./git-workspace {
inherit (darwin.apple_sdk.frameworks) Security;
};

git2cl = callPackage ./git2cl { };

gitFastExport = callPackage ./fast-export { };
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
{ stdenv
, fetchFromGitHub
, rustPlatform
, Security
}:

rustPlatform.buildRustPackage rec {
pname = "git-workspace";
version = "0.4.1";

src = fetchFromGitHub {
owner = "orf";
repo = pname;
rev = "v${version}";
sha256 = "01qxm00c5wqpy1clrvjr44v7cg4nqawaf5a6qnvvgswvis4kakzr";
};

cargoSha256 = "16rkmk888alfvq8nsggi26vck1c7ya0fa5j7gv219g5py4gw2n34";

verifyCargoDeps = true;

buildInputs = with stdenv; lib.optional isDarwin Security;

meta = with stdenv.lib; {
description = "Sync personal and work git repositories from multiple providers";
homepage = "https://github.com/orf/git-workspace";
license = with licenses; [ mit ];
platforms = platforms.all;
maintainers = with maintainers; [ misuzu ];
};
}
10 changes: 6 additions & 4 deletions pkgs/data/icons/qogir-icon-theme/default.nix
Original file line number Diff line number Diff line change
@@ -2,17 +2,19 @@

stdenv.mkDerivation rec {
pname = "qogir-icon-theme";
version = "2019-09-15";
version = "2020-01-29";

src = fetchFromGitHub {
owner = "vinceliuice";
repo = pname;
rev = "4e1b6c693615bc2c7c7a11df6f4b90f2e6fb67db";
sha256 = "1vp1wp4fgmy5af8z8nb3m6wgmb6wbwlvx5smf9dxfcn254hdg8g0";
rev = version;
sha256 = "0g6qiry4gzkr48xn4qi8sdna0hi3982sywskz9adkzqcznir542h";
};

nativeBuildInputs = [ gtk3 ];

dontDropIconThemeCache = true;

installPhase = ''
patchShebangs install.sh
mkdir -p $out/share/icons
@@ -21,7 +23,7 @@ stdenv.mkDerivation rec {

meta = with stdenv.lib; {
description = "A colorful design icon theme for linux desktops";
homepage = https://github.com/vinceliuice/Qogir-icon-theme;
homepage = "https://github.com/vinceliuice/Qogir-icon-theme";
license = with licenses; [ gpl3 ];
platforms = platforms.linux;
maintainers = with maintainers; [ romildo ];
4 changes: 2 additions & 2 deletions pkgs/development/compilers/nim/default.nix
Original file line number Diff line number Diff line change
@@ -5,11 +5,11 @@

stdenv.mkDerivation rec {
pname = "nim";
version = "1.0.4";
version = "1.0.6";

src = fetchurl {
url = "https://nim-lang.org/download/${pname}-${version}.tar.xz";
sha256 = "1q5fx9g40bk4ajghi856w5l34fmrl7avq5j6p0dr2xa4l52ib149";
sha256 = "1cv6bxc7w21455c0pv0r2h64ljyzw266jsk1fsgiiyk2rx8mfkhk";
};

enableParallelBuilding = true;
4 changes: 2 additions & 2 deletions pkgs/development/python-modules/ROPGadget/default.nix
Original file line number Diff line number Diff line change
@@ -3,11 +3,11 @@

buildPythonPackage rec {
pname = "ROPGadget";
version = "5.9";
version = "6.0";

src = fetchPypi {
inherit pname version;
sha256 = "0lggiqws4dzq6k6c20l515pmjajl19gymsxfggkv771dv5kr1gbs";
sha256 = "02wgrdrg0s0cr9yjsb4945244m8x8rr8jzxr8h8c6k2na4d17xf4";
};

propagatedBuildInputs = [ capstone ];
Loading