Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: dbed8e977c54
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 28b4f7b6ace4
Choose a head ref

Commits on Feb 19, 2019

  1. services.tahoe: Use networking.hostName.

    Previously we used nothing, leading to #25273.
    
    Big thanks to @t184256 for developing and testing this fix.
    
    Fixes #25273.
    MostAwesomeDude committed Feb 19, 2019

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    NeQuissimus Tim Steinbach
    Copy the full SHA
    fa6ad02 View commit details
  2. Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    NeQuissimus Tim Steinbach
    Copy the full SHA
    00d6b4c View commit details

Commits on May 24, 2019

  1. Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    NeQuissimus Tim Steinbach
    Copy the full SHA
    f55969b View commit details

Commits on May 25, 2019

  1. wireguard service: allow empty interfaces

    This is needed in case one wants to use wg-quick on NixOS.
    abbradar committed May 25, 2019

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    NeQuissimus Tim Steinbach
    Copy the full SHA
    cfadd98 View commit details
  2. kvirc: init at 5.0.0

    suhr committed May 25, 2019
    Copy the full SHA
    8adf033 View commit details
  3. Copy the full SHA
    8de2c9e View commit details
  4. aws-sam-cli: Fix pyyaml override

    dhl committed May 25, 2019
    Copy the full SHA
    93a90e1 View commit details
  5. Copy the full SHA
    3342953 View commit details
  6. Copy the full SHA
    700e8bc View commit details
  7. Merge pull request #62051 from dhl/serverlessrepo-fix-pyyaml

    pythonPackages.serverlessrepo: fix pyyaml override
    Ma27 authored May 25, 2019
    Copy the full SHA
    09e2189 View commit details
  8. wireguard service: allow empty interfaces (#61743)

    wireguard service: allow empty interfaces
    flokli authored May 25, 2019
    Copy the full SHA
    e4de353 View commit details
  9. wireguard: restart on failure

    As a oneshot service, if the startup failed it would never be attempted again.
    This is problematic when peer's addresses require DNS. DNS may not be reliably available at
    the time wireguard starts. Converting this to a simple service with Restart
    and RestartAfter directives allows the service to be reattempted, but at
    the cost of losing the oneshot semantics.
    
    Signed-off-by: Maximilian Bosch <maximilian@mbosch.me>
    sjau authored and Ma27 committed May 25, 2019
    Copy the full SHA
    1bff53c View commit details
  10. Merge pull request #61971 from sjau/wg_client_start

    wireguard: restart on failure\nAs a oneshot service, if the startup f…
    Ma27 authored May 25, 2019
    Copy the full SHA
    5fa9351 View commit details
  11. Copy the full SHA
    e73f42b View commit details
  12. maintainer-list.nix: email update

    Free Potion committed May 25, 2019
    Copy the full SHA
    3015c66 View commit details
  13. axel: update meta.homepage

    alioth.debian.org is gone
    c0bw3b authored May 25, 2019
    Copy the full SHA
    f5e9f0f View commit details
  14. added mschneider to maintainers

    mschneiderwng authored and Lassulus committed May 25, 2019
    Copy the full SHA
    0da0911 View commit details
  15. leftwm: init at 0.1.9

    mschneiderwng authored and Lassulus committed May 25, 2019
    Copy the full SHA
    0ae372d View commit details
  16. leftwm: enable service

    mschneiderwng authored and Lassulus committed May 25, 2019
    Copy the full SHA
    c30bd38 View commit details
  17. Merge pull request #62058 from freepotion/maintainer-email-update

    maintainer-list.nix: email update
    teto authored May 25, 2019
    Copy the full SHA
    cdf0dba View commit details
  18. perlPackages.Po4a: 0.47 -> 0.55 (#62060)

    + refresh meta.homepage
    c0bw3b authored May 25, 2019
    Copy the full SHA
    e2d1da7 View commit details
  19. evince: CVE-2019-11459

    mmahut committed May 25, 2019
    Copy the full SHA
    ace58eb View commit details
  20. Merge pull request #61976 from suhr/kvirc

    kvirc: init at 5.0.0
    aanderse authored May 25, 2019
    Copy the full SHA
    10ed05e View commit details
  21. pythonPackages.python-axolotl: 0.2.2 -> 0.2.3

    Fixes corrupted OMEMO messages from Gajim.
    abbradar committed May 25, 2019
    Copy the full SHA
    f8a4e79 View commit details
  22. gajim: 1.1.2 -> 1.1.3

    abbradar committed May 25, 2019
    Copy the full SHA
    8f7e1fd View commit details
  23. Copy the full SHA
    bb2a49d View commit details
  24. ghostscript: add patches for CVE-2019-3839 (#62029)

    ghostscript: add patches for CVE-2019-3839
    andir authored May 25, 2019
    Copy the full SHA
    ef35ad1 View commit details
  25. Copy the full SHA
    0040ca9 View commit details
  26. l-smash: init at 2.4.15

    tadeokondrak authored and Lassulus committed May 25, 2019
    Copy the full SHA
    0dfa25e View commit details
  27. Copy the full SHA
    d9153a6 View commit details
  28. Merge pull request #62052 from timokau/rl-coach-init

    python.pkgs.rl-coach: init at 0.12.0
    timokau authored May 25, 2019
    Copy the full SHA
    28b4f7b View commit details
6 changes: 5 additions & 1 deletion maintainers/maintainer-list.nix
Original file line number Diff line number Diff line change
@@ -1769,7 +1769,7 @@
name = "Frede Emil";
};
freepotion = {
email = "freepotion@protonmail.com";
email = "free.potion@yandex.ru";
github = "freepotion";
name = "Free Potion";
};
@@ -3398,6 +3398,10 @@
email = "matthew@wellquite.org";
name = "Matthew Sackman";
};
mschneider = {
email = "markus.schneider.sic+nix@gmail.com";
name = "Markus Schneider";
};
mschristiansen = {
email = "mikkel@rheosystems.com";
github = "mschristiansen";
13 changes: 8 additions & 5 deletions nixos/modules/services/network-filesystems/tahoe.nix
Original file line number Diff line number Diff line change
@@ -234,16 +234,19 @@ in
Type = "simple";
PIDFile = pidfile;
# Believe it or not, Tahoe is very brittle about the order of
# arguments to $(tahoe start). The node directory must come first,
# arguments to $(tahoe run). The node directory must come first,
# and arguments which alter Twisted's behavior come afterwards.
ExecStart = ''
${settings.package}/bin/tahoe start ${lib.escapeShellArg nodedir} -n -l- --pidfile=${lib.escapeShellArg pidfile}
${settings.package}/bin/tahoe run ${lib.escapeShellArg nodedir} --pidfile=${lib.escapeShellArg pidfile}
'';
};
preStart = ''
if [ ! -d ${lib.escapeShellArg nodedir} ]; then
mkdir -p /var/db/tahoe-lafs
tahoe create-introducer ${lib.escapeShellArg nodedir}
# See https://github.com/NixOS/nixpkgs/issues/25273
tahoe create-introducer \
--hostname="${config.networking.hostName}" \
${lib.escapeShellArg nodedir}
fi
# Tahoe has created a predefined tahoe.cfg which we must now
@@ -334,10 +337,10 @@ in
Type = "simple";
PIDFile = pidfile;
# Believe it or not, Tahoe is very brittle about the order of
# arguments to $(tahoe start). The node directory must come first,
# arguments to $(tahoe run). The node directory must come first,
# and arguments which alter Twisted's behavior come afterwards.
ExecStart = ''
${settings.package}/bin/tahoe start ${lib.escapeShellArg nodedir} -n -l- --pidfile=${lib.escapeShellArg pidfile}
${settings.package}/bin/tahoe run ${lib.escapeShellArg nodedir} --pidfile=${lib.escapeShellArg pidfile}
'';
};
preStart = ''
16 changes: 13 additions & 3 deletions nixos/modules/services/networking/wireguard.nix
Original file line number Diff line number Diff line change
@@ -245,7 +245,9 @@ let
path = with pkgs; [ kmod iproute wireguard-tools ];

serviceConfig = {
Type = "oneshot";
Type = "simple";
Restart = "on-failure";
RestartSec = "5s";
RemainAfterExit = true;
};

@@ -301,8 +303,16 @@ in

networking.wireguard = {

enable = mkOption {
description = "Whether to enable WireGuard.";
type = types.bool;
# 2019-05-25: Backwards compatibility.
default = cfg.interfaces != {};
example = true;
};

interfaces = mkOption {
description = "Wireguard interfaces.";
description = "WireGuard interfaces.";
default = {};
example = {
wg0 = {
@@ -325,7 +335,7 @@ in

###### implementation

config = mkIf (cfg.interfaces != {}) {
config = mkIf cfg.enable {

assertions = (attrValues (
mapAttrs (name: value: {
1 change: 1 addition & 0 deletions nixos/modules/services/x11/window-managers/default.nix
Original file line number Diff line number Diff line change
@@ -19,6 +19,7 @@ in
./herbstluftwm.nix
./i3.nix
./jwm.nix
./leftwm.nix
./metacity.nix
./mwm.nix
./openbox.nix
25 changes: 25 additions & 0 deletions nixos/modules/services/x11/window-managers/leftwm.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
{ config, lib, pkgs, ... }:

with lib;

let
cfg = config.services.xserver.windowManager.leftwm;
in
{
###### interface
options = {
services.xserver.windowManager.leftwm.enable = mkEnableOption "leftwm";
};

###### implementation
config = mkIf cfg.enable {
services.xserver.windowManager.session = singleton {
name = "leftwm";
start = ''
${pkgs.leftwm}/bin/leftwm &
waitPID=$!
'';
};
environment.systemPackages = [ pkgs.leftwm ];
};
}
8 changes: 6 additions & 2 deletions pkgs/applications/editors/android-studio/default.nix
Original file line number Diff line number Diff line change
@@ -12,12 +12,16 @@ let
build = "183.5522156";
sha256Hash = "0y4l9d1yrvv1csx6vl4jnqgqy96y44rl6p8hcxrnbvrg61iqnj30";
};
betaVersion = latestVersion;
latestVersion = { # canary & dev
betaVersion = {
version = "3.5.0.14"; # "Android Studio 3.5 Beta 2"
build = "191.5549111";
sha256Hash = "1zy2x0m1nsx3yy64cp1jvgb9aqkribwm64mv50g9355sdz7qjhcf";
};
latestVersion = { # canary & dev
version = "3.6.0.1"; # "Android Studio 3.6 Canary 1"
build = "191.5595896";
sha256Hash = "1nd0xmq1aplznxbsnmzgszbblj6vdyhir708mks5ss6achn21xxc";
};
in rec {
# Attributes are named by their corresponding release channels

Original file line number Diff line number Diff line change
@@ -20,11 +20,11 @@
python3.pkgs.buildPythonApplication rec {
pname = "gajim";
majorVersion = "1.1";
version = "${majorVersion}.2";
version = "${majorVersion}.3";

src = fetchurl {
url = "https://gajim.org/downloads/${majorVersion}/gajim-${version}.tar.bz2";
sha256 = "1lx03cgi58z54xb7mhs6bc715lc00w5mpysf9n3q8zgn759fm0rj";
sha256 = "0bzxwcpdd4ydh6d6mzpr0gxwhcb0x9ympk55fpvm1hcw9d28a716";
};

postPatch = ''
32 changes: 32 additions & 0 deletions pkgs/applications/networking/irc/kvirc/default.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
{ stdenv, fetchFromGitHub
, qtbase, qtmultimedia, qtsvg, qtx11extras
, pkgconfig, cmake, gettext
}:

stdenv.mkDerivation rec {
pname = "kvirc";
version = "5.0.0";

src = fetchFromGitHub {
owner = "kvirc";
repo = "KVIrc";
rev = version;
sha256 = "1dq7v6djw0gz56rvghs4r5gfhzx4sfg60rnv6b9zprw0vlvcxbn4";
};

buildInputs = [
qtbase qtmultimedia qtsvg qtx11extras
];

nativeBuildInputs = [
pkgconfig cmake gettext
];

meta = with stdenv.lib; {
description = "Advanced IRC Client";
homepage = "http://www.kvirc.net/";
license = licenses.gpl2;
maintainers = [ maintainers.suhr ];
platforms = platforms.linux;
};
}
Loading