Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: e0e5dca23576
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: fa6ff572d33e
Choose a head ref

Commits on Apr 14, 2019

  1. hepmc3: 3.1.0 -> 3.1.1

    Semi-automatic update generated by
    https://github.com/ryantm/nixpkgs-update tools. This update was made
    based on information from
    https://repology.org/metapackage/hepmc3/versions
    r-ryantm committed Apr 14, 2019
    Copy the full SHA
    30a3f2b View commit details

Commits on Apr 15, 2019

  1. kafkacat: 1.3.1 -> 1.4.0

    Semi-automatic update generated by
    https://github.com/ryantm/nixpkgs-update tools. This update was made
    based on information from
    https://repology.org/metapackage/kafkacat/versions
    r-ryantm committed Apr 15, 2019
    Copy the full SHA
    68265ae View commit details

Commits on Apr 20, 2019

  1. Copy the full SHA
    68b4cf3 View commit details
  2. jool: removed kernel version assertion

    I don't think this really makes sense, because upstream doesn't list any constraints on supported kernel versions, and worst case it'll just fail to build.
    liclac committed Apr 20, 2019
    Copy the full SHA
    d88c681 View commit details

Commits on Apr 22, 2019

  1. Copy the full SHA
    fccea6b View commit details
  2. python3.pkgs.aioesphomeapi: 1.8.0 -> 2.0.1

    Pin the protobuf version used by Home Assistant to the version
    required by aioesphomeapi and some components.
    Robert Schütz committed Apr 22, 2019
    Copy the full SHA
    59b1cdb View commit details

Commits on Apr 23, 2019

  1. bitwarden_rs: init at 1.8.0

    msteen committed Apr 23, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    Copy the full SHA
    8a0a971 View commit details
  2. Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    2f59db4 View commit details
  3. Merge pull request #59937 from tex/lilypond

    LilyPond: Fix configure error - incorrectly detected fontforge version
    infinisil authored Apr 23, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    9a8d764 View commit details
  4. tedicross: init at 0.8.7

    pacien committed Apr 23, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    df04850 View commit details
  5. nixos/tedicross: add module

    pacien committed Apr 23, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    d3423dd View commit details
  6. Merge pull request #58096 from pacien/tedicross-init

    tedicross: init at 0.8.7
    infinisil authored Apr 23, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    ca37c23 View commit details
  7. gettext: fix cross build (#60123)

    lopsided98 authored and veprbl committed Apr 23, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    16fe069 View commit details
  8. nixos/bitwarden_rs: init

    msteen committed Apr 23, 2019
    Copy the full SHA
    ef1a430 View commit details
  9. Merge pull request #59550 from r-ryantm/auto-update/kafkacat

    kafkacat: 1.3.1 -> 1.4.0
    Lassulus authored Apr 23, 2019
    Copy the full SHA
    b2d5a5b View commit details
  10. Merge pull request #60017 from dywedir/libvterm-neovim

    libvterm-neovim: 2017-11-05 -> 2018-11-26
    adisbladis authored Apr 23, 2019
    Copy the full SHA
    b561092 View commit details
  11. Merge pull request #55413 from msteen/bitwarden_rs

    bitwarden_rs: init at 1.8.0
    infinisil authored Apr 23, 2019
    Copy the full SHA
    508fd8f View commit details
  12. Merge pull request #59534 from r-ryantm/auto-update/hepmc3

    hepmc3: 3.1.0 -> 3.1.1
    c0bw3b authored Apr 23, 2019
    Copy the full SHA
    a36cff2 View commit details
  13. klavaro: 3.04 -> 3.05 (#59554)

    * klavaro: 3.04 -> 3.05
    
    Semi-automatic update generated by
    https://github.com/ryantm/nixpkgs-update tools. This update was made
    based on information from
    https://repology.org/metapackage/klavaro/versions
    r-ryantm authored and c0bw3b committed Apr 23, 2019

    Unverified

    This commit is not signed, but one or more authors requires that any commit attributed to them is signed.
    Copy the full SHA
    e95e702 View commit details
  14. Merge pull request #59920 from liclac/update/jool-v4.0.0

    jool: unstable-20180706 -> 4.0.0
    fpletz authored Apr 23, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    afe0d73 View commit details
  15. Merge pull request #60064 from dotlambda/aioesphomeapi-2.0.1

    python3.pkgs.aioesphomeapi: 1.8.0 -> 2.0.1
    fpletz authored Apr 23, 2019
    Copy the full SHA
    fa6ff57 View commit details
2 changes: 2 additions & 0 deletions nixos/modules/module-list.nix
Original file line number Diff line number Diff line change
@@ -673,6 +673,7 @@
./services/networking/syncthing-relay.nix
./services/networking/tcpcrypt.nix
./services/networking/teamspeak3.nix
./services/networking/tedicross.nix
./services/networking/tinc.nix
./services/networking/tinydns.nix
./services/networking/tftpd.nix
@@ -706,6 +707,7 @@
./services/search/hound.nix
./services/search/kibana.nix
./services/search/solr.nix
./services/security/bitwarden_rs/default.nix
./services/security/certmgr.nix
./services/security/cfssl.nix
./services/security/clamav.nix
100 changes: 100 additions & 0 deletions nixos/modules/services/networking/tedicross.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,100 @@
{ config, pkgs, lib, ... }:

with lib;

let
dataDir = "/var/lib/tedicross";
cfg = config.services.tedicross;
configJSON = pkgs.writeText "tedicross-settings.json" (builtins.toJSON cfg.config);
configYAML = pkgs.runCommand "tedicross-settings.yaml" { preferLocalBuild = true; } ''
${pkgs.remarshal}/bin/json2yaml -i ${configJSON} -o $out
'';

in {
options = {
services.tedicross = {
enable = mkEnableOption "the TediCross Telegram-Discord bridge service";

config = mkOption {
type = types.attrs;
# from https://github.com/TediCross/TediCross/blob/master/example.settings.yaml
example = literalExample ''
{
telegram = {
useFirstNameInsteadOfUsername = false;
colonAfterSenderName = false;
skipOldMessages = true;
sendEmojiWithStickers = true;
};
discord = {
useNickname = false;
skipOldMessages = true;
displayTelegramReplies = "embed";
replyLength = 100;
};
bridges = [
{
name = "Default bridge";
direction = "both";
telegram = {
chatId = -123456789;
relayJoinMessages = true;
relayLeaveMessages = true;
sendUsernames = true;
ignoreCommands = true;
};
discord = {
serverId = "DISCORD_SERVER_ID";
channelId = "DISCORD_CHANNEL_ID";
relayJoinMessages = true;
relayLeaveMessages = true;
sendUsernames = true;
crossDeleteOnTelegram = true;
};
}
];
debug = false;
}
'';
description = ''
<filename>settings.yaml</filename> configuration as a Nix attribute set.
Secret tokens should be specified using <option>environmentFile</option>
instead of this world-readable file.
'';
};

environmentFile = mkOption {
type = types.nullOr types.path;
default = null;
description = ''
File containing environment variables to be passed to the TediCross service,
in which secret tokens can be specified securely using the
<literal>TELEGRAM_BOT_TOKEN</literal> and <literal>DISCORD_BOT_TOKEN</literal>
keys.
'';
};
};
};

config = mkIf cfg.enable {
# from https://github.com/TediCross/TediCross/blob/master/guides/autostart/Linux.md
systemd.services.tedicross = {
description = "TediCross Telegram-Discord bridge service";
wantedBy = [ "multi-user.target" ];
wants = [ "network-online.target" ];
after = [ "network-online.target" ];
serviceConfig = {
Type = "simple";
ExecStart = "${pkgs.nodePackages.tedicross}/bin/tedicross --config='${configYAML}' --data-dir='${dataDir}'";
Restart = "always";
DynamicUser = true;
StateDirectory = baseNameOf dataDir;
EnvironmentFile = cfg.environmentFile;
};
};
};

meta.maintainers = with maintainers; [ pacien ];
}

17 changes: 17 additions & 0 deletions nixos/modules/services/security/bitwarden_rs/backup.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
#!/usr/bin/env bash

# Based on: https://github.com/dani-garcia/bitwarden_rs/wiki/Backing-up-your-vault
if ! mkdir -p "$BACKUP_FOLDER"; then
echo "Could not create backup folder '$BACKUP_FOLDER'" >&2
exit 1
fi

if [[ ! -f "$DATA_FOLDER"/db.sqlite3 ]]; then
echo "Could not find SQLite database file '$DATA_FOLDER/db.sqlite3'" >&2
exit 1
fi

sqlite3 "$DATA_FOLDER"/db.sqlite3 ".backup '$BACKUP_FOLDER/db.sqlite3'"
cp "$DATA_FOLDER"/rsa_key.{der,pem,pub.der} "$BACKUP_FOLDER"
cp -r "$DATA_FOLDER"/attachments "$BACKUP_FOLDER"
cp -r "$DATA_FOLDER"/icon_cache "$BACKUP_FOLDER"
126 changes: 126 additions & 0 deletions nixos/modules/services/security/bitwarden_rs/default.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,126 @@
{ config, lib, pkgs, ... }:

with lib;

let
cfg = config.services.bitwarden_rs;
user = config.users.users.bitwarden_rs.name;
group = config.users.groups.bitwarden_rs.name;

# Convert name from camel case (e.g. disable2FARemember) to upper case snake case (e.g. DISABLE_2FA_REMEMBER).
nameToEnvVar = name:
let
parts = builtins.split "([A-Z0-9]+)" name;
partsToEnvVar = parts: foldl' (key: x: let last = stringLength key - 1; in
if isList x then key + optionalString (key != "" && substring last 1 key != "_") "_" + head x
else if key != "" && elem (substring 0 1 x) lowerChars then # to handle e.g. [ "disable" [ "2FAR" ] "emember" ]
substring 0 last key + optionalString (substring (last - 1) 1 key != "_") "_" + substring last 1 key + toUpper x
else key + toUpper x) "" parts;
in if builtins.match "[A-Z0-9_]+" name != null then name else partsToEnvVar parts;

configFile = pkgs.writeText "bitwarden_rs.env" (concatMapStrings (s: s + "\n") (
(concatLists (mapAttrsToList (name: value:
if value != null then [ "${nameToEnvVar name}=${if isBool value then boolToString value else toString value}" ] else []
) cfg.config))));

in {
options.services.bitwarden_rs = with types; {
enable = mkEnableOption "bitwarden_rs";

backupDir = mkOption {
type = nullOr str;
default = null;
description = ''
The directory under which bitwarden_rs will backup its persistent data.
'';
};

config = mkOption {
type = attrsOf (nullOr (either (either bool int) str));
default = {};
example = literalExample ''
{
domain = https://bw.domain.tld:8443;
signupsAllowed = true;
rocketPort = 8222;
rocketLog = "critical";
}
'';
description = ''
The configuration of bitwarden_rs is done through environment variables,
therefore the names are converted from camel case (e.g. disable2FARemember)
to upper case snake case (e.g. DISABLE_2FA_REMEMBER).
In this conversion digits (0-9) are handled just like upper case characters,
so foo2 would be converted to FOO_2.
Names already in this format remain unchanged, so FOO2 remains FOO2 if passed as such,
even though foo2 would have been converted to FOO_2.
This allows working around any potential future conflicting naming conventions.
Based on the attributes passed to this config option a environment file will be generated
that is passed to bitwarden_rs's systemd service.
The available configuration options can be found in
<link xlink:href="https://github.com/dani-garcia/bitwarden_rs/blob/1.8.0/.env.template">the environment template file</link>.
'';
apply = config: optionalAttrs config.webVaultEnabled {
webVaultFolder = "${pkgs.bitwarden_rs-vault}/share/bitwarden_rs/vault";
} // config;
};
};

config = mkIf cfg.enable {
services.bitwarden_rs.config = {
dataFolder = "/var/lib/bitwarden_rs";
webVaultEnabled = mkDefault true;
};

users.users.bitwarden_rs = { inherit group; };
users.groups.bitwarden_rs = { };

systemd.services.bitwarden_rs = {
after = [ "network.target" ];
path = with pkgs; [ openssl ];
serviceConfig = {
User = user;
Group = group;
EnvironmentFile = configFile;
ExecStart = "${pkgs.bitwarden_rs}/bin/bitwarden_rs";
LimitNOFILE = "1048576";
LimitNPROC = "64";
PrivateTmp = "true";
PrivateDevices = "true";
ProtectHome = "true";
ProtectSystem = "strict";
AmbientCapabilities = "CAP_NET_BIND_SERVICE";
StateDirectory = "bitwarden_rs";
};
wantedBy = [ "multi-user.target" ];
};

systemd.services.backup-bitwarden_rs = mkIf (cfg.backupDir != null) {
description = "Backup bitwarden_rs";
environment = {
DATA_FOLDER = "/var/lib/bitwarden_rs";
BACKUP_FOLDER = cfg.backupDir;
};
path = with pkgs; [ sqlite ];
serviceConfig = {
SyslogIdentifier = "backup-bitwarden_rs";
User = mkDefault user;
Group = mkDefault group;
ExecStart = "${pkgs.bash}/bin/bash ${./backup.sh}";
};
wantedBy = [ "multi-user.target" ];
};

systemd.timers.backup-bitwarden_rs = mkIf (cfg.backupDir != null) {
description = "Backup bitwarden_rs on time";
timerConfig = {
OnCalendar = mkDefault "23:00";
Persistent = "true";
Unit = "backup-bitwarden_rs.service";
};
wantedBy = [ "multi-user.target" ];
};
};
}
10 changes: 5 additions & 5 deletions pkgs/development/libraries/gettext/default.nix
Original file line number Diff line number Diff line change
@@ -54,11 +54,11 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [
xz
xz.bin
] ++ lib.optional allowBisonDependency [
# Only necessary for CVE-2018-18751.patch (unless CVE-2018-18751-bison.patch
# is also applied):
bison
] ++ [
]
# Only necessary for CVE-2018-18751.patch (unless CVE-2018-18751-bison.patch
# is also applied):
++ lib.optional allowBisonDependency bison
++ [
# Only necessary for CVE-2018-18751.patch:
automake115x
autoconf
8 changes: 4 additions & 4 deletions pkgs/development/libraries/libvterm-neovim/default.nix
Original file line number Diff line number Diff line change
@@ -5,14 +5,14 @@
}:

stdenv.mkDerivation rec {
name = "neovim-libvterm-${version}";
version = "2017-11-05";
pname = "libvterm-neovim";
version = "2018-11-26";

src = fetchFromGitHub {
owner = "neovim";
repo = "libvterm";
rev = "4ca7ebf7d25856e90bc9d9cc49412e80be7c4ea8";
sha256 = "05kyvvz8af90mvig11ya5xd8f4mbvapwyclyrihm9lwas706lzf6";
rev = "f600f523545b7d4018ebf320e3273795dbe43c8a";
sha256 = "08lxd8xs9cg4axgq6bkb7afjxg3s29s1a3niqqm4wjb7iyi2jx5b";
};

buildInputs = [ perl ];
4 changes: 2 additions & 2 deletions pkgs/development/libraries/physics/hepmc3/default.nix
Original file line number Diff line number Diff line change
@@ -2,11 +2,11 @@

stdenv.mkDerivation rec {
name = "hepmc3-${version}";
version = "3.1.0";
version = "3.1.1";

src = fetchurl {
url = "http://hepmc.web.cern.ch/hepmc/releases/HepMC3-${version}.tar.gz";
sha256 = "12kzdqdbq7md0nn58jvilhh00yddfir65f0q2026k0ym37bfwdyd";
sha256 = "1fs8ha5issls886g03azpwamry1k633zjrcx51v7g7vg9nbckjrg";
};

buildInputs = [ cmake root ];
8 changes: 8 additions & 0 deletions pkgs/development/node-packages/default-v10.nix
Original file line number Diff line number Diff line change
@@ -91,6 +91,14 @@ nodePackages // {
buildInputs = [ pkgs.automake pkgs.autoconf nodePackages.node-gyp-build ];
};

tedicross = nodePackages."tedicross-git+https://github.com/TediCross/TediCross.git#v0.8.7".override {
nativeBuildInputs = [ pkgs.makeWrapper ];
postInstall = ''
makeWrapper '${nodejs}/bin/node' "$out/bin/tedicross" \
--add-flags "$out/lib/node_modules/tedicross/main.js"
'';
};

webtorrent-cli = nodePackages.webtorrent-cli.override {
buildInputs = [ nodePackages.node-gyp-build ];
};
1 change: 1 addition & 0 deletions pkgs/development/node-packages/node-packages-v10.json
Original file line number Diff line number Diff line change
@@ -108,6 +108,7 @@
, "stackdriver-statsd-backend"
, "svgo"
, "swagger"
, { "tedicross": "git+https://github.com/TediCross/TediCross.git#v0.8.7" }
, "tern"
, "textlint"
, "three"
Loading