Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 4707311e2020
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: b719c465f25e
Choose a head ref
  • 13 commits
  • 25 files changed
  • 7 contributors

Commits on Mar 4, 2020

  1. codimd: 1.5.0 -> 1.6.0

    (cherry picked from commit 6c22840)
    WilliButz authored and Ma27 committed Mar 4, 2020
    Copy the full SHA
    9cefdd7 View commit details
  2. nixos/codimd: update useCDN default to false

    (cherry picked from commit 68410b0)
    WilliButz authored and Ma27 committed Mar 4, 2020
    Copy the full SHA
    0419b78 View commit details

Commits on Mar 5, 2020

  1. palemoon: 28.8.2.1 -> 28.8.4

    (cherry picked from commit e633927)
    r-ryantm authored and OPNA2608 committed Mar 5, 2020
    Copy the full SHA
    f5fa7bf View commit details

Commits on Mar 6, 2020

  1. Merge pull request #81757 from Ma27/backport-codimd

    [20.03] codimd: 1.5.0 -> 1.6.0
    WilliButz authored Mar 6, 2020
    Copy the full SHA
    3fbd8bd View commit details
  2. Copy the full SHA
    5c35647 View commit details
  3. nixos/prometheus-*-exporter: escape shell args

    (cherry picked from commit 0ac24cc)
    mmilata authored and WilliButz committed Mar 6, 2020
    Copy the full SHA
    c3bb46e View commit details
  4. nixos/prometheus-snmp-exporter: update log options

    The allowed values have changed in bd3319d.
    
    0.15:
          --log.level="info"        Only log messages with the given severity or above. Valid levels: [debug, info, warn, error, fatal]
          --log.format="logger:stderr"
                                    Set the log target and format. Example: "logger:syslog?appname=bob&local=7" or "logger:stdout?json=true"
    
    0.17:
          --log.level=info          Only log messages with the given severity or above. One of: [debug, info, warn, error]
          --log.format=logfmt       Output format of log messages. One of: [logfmt, json]
    
    (cherry picked from commit 87f87fb)
    mmilata authored and WilliButz committed Mar 6, 2020
    Copy the full SHA
    6673c4f View commit details
  5. nixos/prometheus-snmp-exporter: fix assertion

    The assertion was printed when user explicitly defined only the
    configurationPath option.
    
    (cherry picked from commit 2a080ac)
    mmilata authored and WilliButz committed Mar 6, 2020
    Copy the full SHA
    bddb172 View commit details
  6. nixos/prometheus-mail-exporter: fix assertion

    The assertion was printed when user explicitly defined only the
    configFile option.
    
    (cherry picked from commit 3b5cf35)
    mmilata authored and WilliButz committed Mar 6, 2020
    Copy the full SHA
    f382c70 View commit details
  7. nixos/prometheus-mail-exporter: misc fixes

     - Fix misspelled option. mkRenamedOptionModule is not used because the
       option hasn't really worked before.
     - Add missing cfg.telemetryPath arg to ExecStart.
     - Fix mkdir invocation in test.
    
    (cherry picked from commit e7ed790)
    mmilata authored and WilliButz committed Mar 6, 2020
    Copy the full SHA
    ebb7ec3 View commit details
  8. nixos/tests/prometheus-exporters: increase memory for rspamd

    Before this, the test failed because rspamd did invoke the oom-killer.
    
    (cherry picked from commit 0d832ee)
    WilliButz committed Mar 6, 2020
    Copy the full SHA
    9db4062 View commit details
  9. Merge pull request #81880 from OPNA2608/palemoon_28.8.4_cherrypick_20.03

    [20.03] palemoon: 28.8.2.1 -> 28.8.4
    AndersonTorres authored Mar 6, 2020
    Copy the full SHA
    253e2d9 View commit details
  10. pulumi: 1.4.0 -> 1.12.0

    (cherry picked from commit c4f5f95)
    Dillen Meijboom authored and Mic92 committed Mar 6, 2020
    Copy the full SHA
    b719c46 View commit details
Showing with 3,677 additions and 8,030 deletions.
  1. +6 −2 nixos/modules/services/monitoring/prometheus/exporters.nix
  2. +1 −1 nixos/modules/services/monitoring/prometheus/exporters/blackbox.nix
  3. +1 −1 nixos/modules/services/monitoring/prometheus/exporters/collectd.nix
  4. +1 −1 nixos/modules/services/monitoring/prometheus/exporters/dnsmasq.nix
  5. +1 −1 nixos/modules/services/monitoring/prometheus/exporters/dovecot.nix
  6. +1 −1 nixos/modules/services/monitoring/prometheus/exporters/json.nix
  7. +5 −4 nixos/modules/services/monitoring/prometheus/exporters/mail.nix
  8. +2 −2 nixos/modules/services/monitoring/prometheus/exporters/minio.nix
  9. +1 −1 nixos/modules/services/monitoring/prometheus/exporters/nextcloud.nix
  10. +3 −3 nixos/modules/services/monitoring/prometheus/exporters/postfix.nix
  11. +8 −8 nixos/modules/services/monitoring/prometheus/exporters/snmp.nix
  12. +2 −2 nixos/modules/services/monitoring/prometheus/exporters/unifi.nix
  13. +2 −2 nixos/modules/services/monitoring/prometheus/exporters/varnish.nix
  14. +1 −1 nixos/modules/services/monitoring/prometheus/exporters/wireguard.nix
  15. +1 −1 nixos/modules/services/web-apps/codimd.nix
  16. +2 −1 nixos/tests/prometheus-exporters.nix
  17. +2 −2 pkgs/applications/networking/browsers/palemoon/default.nix
  18. +2 −2 pkgs/servers/web-apps/codimd/default.nix
  19. +29 −32 pkgs/servers/web-apps/codimd/package.json
  20. +1,894 −4,075 pkgs/servers/web-apps/codimd/yarn.lock
  21. +1,680 −3,856 pkgs/servers/web-apps/codimd/yarn.nix
  22. +21 −21 pkgs/tools/admin/pulumi/data.nix
  23. +3 −2 pkgs/tools/admin/pulumi/default.nix
  24. +5 −5 pkgs/tools/admin/pulumi/update.sh
  25. +3 −3 pkgs/tools/misc/youtube-dl/default.nix
8 changes: 6 additions & 2 deletions nixos/modules/services/monitoring/prometheus/exporters.nix
Original file line number Diff line number Diff line change
@@ -197,13 +197,17 @@ in

config = mkMerge ([{
assertions = [ {
assertion = (cfg.snmp.configurationPath == null) != (cfg.snmp.configuration == null);
assertion = cfg.snmp.enable -> (
(cfg.snmp.configurationPath == null) != (cfg.snmp.configuration == null)
);
message = ''
Please ensure you have either `services.prometheus.exporters.snmp.configuration'
or `services.prometheus.exporters.snmp.configurationPath' set!
'';
} {
assertion = (cfg.mail.configFile == null) != (cfg.mail.configuration == {});
assertion = cfg.mail.enable -> (
(cfg.mail.configFile == null) != (cfg.mail.configuration == null)
);
message = ''
Please specify either 'services.prometheus.exporters.mail.configuration'
or 'services.prometheus.exporters.mail.configFile'.
Original file line number Diff line number Diff line change
@@ -61,7 +61,7 @@ in {
ExecStart = ''
${pkgs.prometheus-blackbox-exporter}/bin/blackbox_exporter \
--web.listen-address ${cfg.listenAddress}:${toString cfg.port} \
--config.file ${adjustedConfigFile} \
--config.file ${escapeShellArg adjustedConfigFile} \
${concatStringsSep " \\\n " cfg.extraFlags}
'';
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
Original file line number Diff line number Diff line change
@@ -66,7 +66,7 @@ in
serviceConfig = {
ExecStart = ''
${pkgs.prometheus-collectd-exporter}/bin/collectd_exporter \
-log.format ${cfg.logFormat} \
-log.format ${escapeShellArg cfg.logFormat} \
-log.level ${cfg.logLevel} \
-web.listen-address ${cfg.listenAddress}:${toString cfg.port} \
${collectSettingsArgs} \
Original file line number Diff line number Diff line change
@@ -30,7 +30,7 @@ in
${pkgs.prometheus-dnsmasq-exporter}/bin/dnsmasq_exporter \
--listen ${cfg.listenAddress}:${toString cfg.port} \
--dnsmasq ${cfg.dnsmasqListenAddress} \
--leases_path ${cfg.leasesPath} \
--leases_path ${escapeShellArg cfg.leasesPath} \
${concatStringsSep " \\\n " cfg.extraFlags}
'';
};
Original file line number Diff line number Diff line change
@@ -64,7 +64,7 @@ in
${pkgs.prometheus-dovecot-exporter}/bin/dovecot_exporter \
--web.listen-address ${cfg.listenAddress}:${toString cfg.port} \
--web.telemetry-path ${cfg.telemetryPath} \
--dovecot.socket-path ${cfg.socketPath} \
--dovecot.socket-path ${escapeShellArg cfg.socketPath} \
--dovecot.scopes ${concatStringsSep "," cfg.scopes} \
${concatStringsSep " \\\n " cfg.extraFlags}
'';
Original file line number Diff line number Diff line change
@@ -27,7 +27,7 @@ in
ExecStart = ''
${pkgs.prometheus-json-exporter}/bin/prometheus-json-exporter \
--port ${toString cfg.port} \
${cfg.url} ${cfg.configFile} \
${cfg.url} ${escapeShellArg cfg.configFile} \
${concatStringsSep " \\\n " cfg.extraFlags}
'';
};
Original file line number Diff line number Diff line change
@@ -90,7 +90,7 @@ let
Timeout until mails are considered "didn't make it".
'';
};
disableFileDelition = mkOption {
disableFileDeletion = mkOption {
type = types.bool;
default = false;
description = ''
@@ -127,8 +127,8 @@ in
'';
};
configuration = mkOption {
type = types.submodule exporterOptions;
default = {};
type = types.nullOr (types.submodule exporterOptions);
default = null;
description = ''
Specify the mailexporter configuration file to use.
'';
@@ -147,8 +147,9 @@ in
ExecStart = ''
${pkgs.prometheus-mail-exporter}/bin/mailexporter \
--web.listen-address ${cfg.listenAddress}:${toString cfg.port} \
--web.telemetry-path ${cfg.telemetryPath} \
--config.file ${
if cfg.configuration != {} then configurationFile else cfg.configFile
if cfg.configuration != null then configurationFile else (escapeShellArg cfg.configFile)
} \
${concatStringsSep " \\\n " cfg.extraFlags}
'';
Original file line number Diff line number Diff line change
@@ -54,8 +54,8 @@ in
${pkgs.prometheus-minio-exporter}/bin/minio-exporter \
-web.listen-address ${cfg.listenAddress}:${toString cfg.port} \
-minio.server ${cfg.minioAddress} \
-minio.access-key ${cfg.minioAccessKey} \
-minio.access-secret ${cfg.minioAccessSecret} \
-minio.access-key ${escapeShellArg cfg.minioAccessKey} \
-minio.access-secret ${escapeShellArg cfg.minioAccessSecret} \
${optionalString cfg.minioBucketStats "-minio.bucket-stats"} \
${concatStringsSep " \\\n " cfg.extraFlags}
'';
Original file line number Diff line number Diff line change
@@ -50,7 +50,7 @@ in
-u ${cfg.username} \
-t ${cfg.timeout} \
-l ${cfg.url} \
-p @${cfg.passwordFile} \
-p ${escapeShellArg "@${cfg.passwordFile}"} \
${concatStringsSep " \\\n " cfg.extraFlags}
'';
};
Original file line number Diff line number Diff line change
@@ -67,15 +67,15 @@ in
${pkgs.prometheus-postfix-exporter}/bin/postfix_exporter \
--web.listen-address ${cfg.listenAddress}:${toString cfg.port} \
--web.telemetry-path ${cfg.telemetryPath} \
--postfix.showq_path ${cfg.showqPath} \
--postfix.showq_path ${escapeShellArg cfg.showqPath} \
${concatStringsSep " \\\n " (cfg.extraFlags
++ optional cfg.systemd.enable "--systemd.enable"
++ optional cfg.systemd.enable (if cfg.systemd.slice != null
then "--systemd.slice ${cfg.systemd.slice}"
else "--systemd.unit ${cfg.systemd.unit}")
++ optional (cfg.systemd.enable && (cfg.systemd.journalPath != null))
"--systemd.journal_path ${cfg.systemd.journalPath}"
++ optional (!cfg.systemd.enable) "--postfix.logfile_path ${cfg.logfilePath}")}
"--systemd.journal_path ${escapeShellArg cfg.systemd.journalPath}"
++ optional (!cfg.systemd.enable) "--postfix.logfile_path ${escapeShellArg cfg.logfilePath}")}
'';
};
};
16 changes: 8 additions & 8 deletions nixos/modules/services/monitoring/prometheus/exporters/snmp.nix
Original file line number Diff line number Diff line change
@@ -19,7 +19,7 @@ in

configuration = mkOption {
type = types.nullOr types.attrs;
default = {};
default = null;
description = ''
Snmp exporter configuration as nix attribute set. Mutually exclusive with 'configurationPath' option.
'';
@@ -36,15 +36,15 @@ in
};

logFormat = mkOption {
type = types.str;
default = "logger:stderr";
type = types.enum ["logfmt" "json"];
default = "logfmt";
description = ''
Set the log target and format.
Output format of log messages.
'';
};

logLevel = mkOption {
type = types.enum ["debug" "info" "warn" "error" "fatal"];
type = types.enum ["debug" "info" "warn" "error"];
default = "info";
description = ''
Only log messages with the given severity or above.
@@ -54,13 +54,13 @@ in
serviceOpts = let
configFile = if cfg.configurationPath != null
then cfg.configurationPath
else "${pkgs.writeText "snmp-eporter-conf.yml" (builtins.toJSON cfg.configuration)}";
else "${pkgs.writeText "snmp-exporter-conf.yml" (builtins.toJSON cfg.configuration)}";
in {
serviceConfig = {
ExecStart = ''
${pkgs.prometheus-snmp-exporter.bin}/bin/snmp_exporter \
--config.file=${configFile} \
--log.format=${cfg.logFormat} \
--config.file=${escapeShellArg configFile} \
--log.format=${escapeShellArg cfg.logFormat} \
--log.level=${cfg.logLevel} \
--web.listen-address=${cfg.listenAddress}:${toString cfg.port} \
${concatStringsSep " \\\n " cfg.extraFlags}
Original file line number Diff line number Diff line change
@@ -55,8 +55,8 @@ in
${pkgs.prometheus-unifi-exporter}/bin/unifi_exporter \
-telemetry.addr ${cfg.listenAddress}:${toString cfg.port} \
-unifi.addr ${cfg.unifiAddress} \
-unifi.username ${cfg.unifiUsername} \
-unifi.password ${cfg.unifiPassword} \
-unifi.username ${escapeShellArg cfg.unifiUsername} \
-unifi.password ${escapeShellArg cfg.unifiPassword} \
-unifi.timeout ${cfg.unifiTimeout} \
${optionalString cfg.unifiInsecure "-unifi.insecure" } \
${concatStringsSep " \\\n " cfg.extraFlags}
Original file line number Diff line number Diff line change
@@ -74,10 +74,10 @@ in
${pkgs.prometheus-varnish-exporter}/bin/prometheus_varnish_exporter \
--web.listen-address ${cfg.listenAddress}:${toString cfg.port} \
--web.telemetry-path ${cfg.telemetryPath} \
--varnishstat-path ${cfg.varnishStatPath} \
--varnishstat-path ${escapeShellArg cfg.varnishStatPath} \
${concatStringsSep " \\\n " (cfg.extraFlags
++ optional (cfg.healthPath != null) "--web.health-path ${cfg.healthPath}"
++ optional (cfg.instance != null) "-n ${cfg.instance}"
++ optional (cfg.instance != null) "-n ${escapeShellArg cfg.instance}"
++ optional cfg.noExit "--no-exit"
++ optional cfg.withGoMetrics "--with-go-metrics"
++ optional cfg.verbose "--verbose"
Original file line number Diff line number Diff line change
@@ -59,7 +59,7 @@ in {
${optionalString cfg.verbose "-v"} \
${optionalString cfg.singleSubnetPerField "-s"} \
${optionalString cfg.withRemoteIp "-r"} \
${optionalString (cfg.wireguardConfig != null) "-n ${cfg.wireguardConfig}"}
${optionalString (cfg.wireguardConfig != null) "-n ${escapeShellArg cfg.wireguardConfig}"}
'';
};
};
2 changes: 1 addition & 1 deletion nixos/modules/services/web-apps/codimd.nix
Original file line number Diff line number Diff line change
@@ -156,7 +156,7 @@ in
};
useCDN = mkOption {
type = types.bool;
default = true;
default = false;
description = ''
Whether to use CDN resources or not.
'';
3 changes: 2 additions & 1 deletion nixos/tests/prometheus-exporters.nix
Original file line number Diff line number Diff line change
@@ -224,7 +224,7 @@ let
after = [ "postfix.service" ];
requires = [ "postfix.service" ];
preStart = ''
mkdir -p 0600 mail-exporter/new
mkdir -p -m 0700 mail-exporter/new
'';
serviceConfig = {
ProtectHome = true;
@@ -363,6 +363,7 @@ let
};
metricProvider = {
services.rspamd.enable = true;
virtualisation.memorySize = 1024;
};
exporterTest = ''
wait_for_unit("rspamd.service")
4 changes: 2 additions & 2 deletions pkgs/applications/networking/browsers/palemoon/default.nix
Original file line number Diff line number Diff line change
@@ -13,13 +13,13 @@ let

in stdenv.mkDerivation rec {
pname = "palemoon";
version = "28.8.2.1";
version = "28.8.4";

src = fetchFromGitHub {
owner = "MoonchildProductions";
repo = "UXP";
rev = "PM${version}_Release";
sha256 = "1m7dfgy5vjw1ndjsh0aksvsp0ii2kj7gxn0sp3h0xgwi0yq7lwyb";
sha256 = "1k2j4rlgjwkns3a592pbiwwhrpja3fachvzby1his3d1mhdvyc6f";
};

desktopItem = makeDesktopItem {
4 changes: 2 additions & 2 deletions pkgs/servers/web-apps/codimd/default.nix
Original file line number Diff line number Diff line change
@@ -3,13 +3,13 @@

mkYarnPackage rec {
name = "codimd";
version = "1.5.0";
version = "1.6.0";

src = fetchFromGitHub {
owner = "codimd";
repo = "server";
rev = version;
sha256 = "1sd7r5ws1k7dxmr57m67c1k23pzbkn25k2wvcnbrqn7gza6mhlf0";
sha256 = "1208a24v664ha9qzr7ky6i3ynphkaj0xi5l3rsw743i22nv5aj33";
};

nativeBuildInputs = [ which makeWrapper ];
Loading