Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 7815c86c104a
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: a1dd419c1ffa
Choose a head ref
Loading
Showing with 3,896 additions and 2,093 deletions.
  1. +5 −0 maintainers/maintainer-list.nix
  2. +54 −1 nixos/doc/manual/release-notes/rl-1909.xml
  3. +44 −0 nixos/modules/misc/nixops-autoluks.nix
  4. +1 −0 nixos/modules/misc/version.nix
  5. +1 −1 nixos/modules/module-list.nix
  6. +17 −3 nixos/modules/programs/captive-browser.nix
  7. +191 −19 nixos/modules/services/databases/cassandra.nix
  8. +0 −13 nixos/modules/services/hardware/80-net-setup-link.rules
  9. +2 −4 nixos/modules/services/hardware/udev.nix
  10. +0 −52 nixos/modules/services/misc/phd.nix
  11. +9 −1 nixos/modules/services/networking/ssh/sshd.nix
  12. +0 −50 nixos/modules/services/web-servers/apache-httpd/phabricator.nix
  13. +1 −1 nixos/modules/services/x11/desktop-managers/enlightenment.nix
  14. +1 −1 nixos/modules/services/x11/desktop-managers/pantheon.nix
  15. +1 −1 nixos/modules/system/boot/networkd.nix
  16. +3 −2 nixos/modules/system/boot/systemd.nix
  17. +9 −0 nixos/modules/system/boot/timesyncd.nix
  18. +9 −2 nixos/modules/tasks/network-interfaces-systemd.nix
  19. +0 −3 nixos/modules/testing/test-instrumentation.nix
  20. +3 −0 nixos/tests/all-tests.nix
  21. +69 −27 nixos/tests/cassandra.nix
  22. +20 −1 nixos/tests/containers-imperative.nix
  23. +19 −0 nixos/tests/flatpak-builder.nix
  24. +0 −77 nixos/tests/phabricator.nix
  25. +1 −1 nixos/tests/radicale.nix
  26. +52 −0 nixos/tests/systemd-timesyncd.nix
  27. +2 −1 pkgs/applications/audio/deadbeef/plugins/infobar.nix
  28. +26 −0 pkgs/applications/audio/deadbeef/plugins/lyricbar.nix
  29. +4 −4 pkgs/applications/editors/vscode/vscode.nix
  30. +5 −5 pkgs/applications/editors/vscode/vscodium.nix
  31. +2 −2 pkgs/applications/graphics/gimp/default.nix
  32. +10 −11 pkgs/applications/misc/cbatticon/default.nix
  33. +96 −91 pkgs/applications/networking/browsers/brave/default.nix
  34. +2 −2 pkgs/applications/networking/cluster/cni/plugins.nix
  35. +3 −3 pkgs/applications/networking/gns3/default.nix
  36. +2 −2 pkgs/applications/networking/instant-messengers/telegram/tdesktop/default.nix
  37. +233 −233 pkgs/applications/networking/mailreaders/thunderbird-bin/release_sources.nix
  38. +2 −2 pkgs/applications/networking/mailreaders/thunderbird/default.nix
  39. +6 −5 pkgs/applications/office/libreoffice/default.nix
  40. +34 −0 pkgs/applications/science/biology/cd-hit/default.nix
  41. +5 −3 pkgs/applications/version-management/git-and-tools/git/default.nix
  42. +3 −3 pkgs/applications/video/makemkv/default.nix
  43. +12 −8 pkgs/build-support/setup-hooks/patch-shebangs.sh
  44. +2 −2 pkgs/data/misc/hackage/default.nix
  45. +1 −0 pkgs/desktops/gnome-3/core/gnome-control-center/default.nix
  46. +4 −4 pkgs/desktops/gnome-3/default.nix
  47. +2 −2 pkgs/desktops/gnome-3/misc/geary/default.nix
  48. +2 −3 pkgs/desktops/pantheon/desktop/wingpanel-indicators/applications-menu/default.nix
  49. +13 −3 pkgs/development/compilers/ghc/head.nix
  50. +2 −2 pkgs/development/compilers/ocaml/4.08.nix
  51. +24 −4 pkgs/development/haskell-modules/configuration-common.nix
  52. +108 −60 pkgs/development/haskell-modules/configuration-hackage2nix.yaml
  53. +1,910 −950 pkgs/development/haskell-modules/hackage-packages.nix
  54. +4 −3 pkgs/development/libraries/babl/default.nix
  55. +2 −2 pkgs/development/libraries/dbus/default.nix
  56. +3 −1 pkgs/development/libraries/flatpak/default.nix
  57. +13 −0 pkgs/development/libraries/flatpak/validate-icon-pixbuf.patch
  58. +2 −2 pkgs/development/libraries/glib/default.nix
  59. +3 −3 pkgs/development/libraries/harfbuzz/default.nix
  60. +2 −14 pkgs/development/libraries/libevent/default.nix
  61. +3 −2 pkgs/development/libraries/libical/default.nix
  62. +2 −2 pkgs/development/libraries/libidn2/default.nix
  63. +4 −4 pkgs/development/libraries/libnftnl/default.nix
  64. +1 −1 pkgs/development/libraries/libpsl/default.nix
  65. +3 −3 pkgs/development/libraries/librime/default.nix
  66. +2 −2 pkgs/development/libraries/libsodium/default.nix
  67. +3 −3 pkgs/development/libraries/liburing/default.nix
  68. +2 −2 pkgs/development/libraries/libuv/default.nix
  69. +5 −7 pkgs/development/libraries/mesa/default.nix
  70. +4 −3 pkgs/development/libraries/newt/default.nix
  71. +36 −20 pkgs/development/libraries/opencascade/default.nix
  72. +4 −9 pkgs/development/libraries/openssl/default.nix
  73. +1 −1 pkgs/development/mobile/androidenv/compose-android-packages.nix
  74. +7 −7 pkgs/development/mobile/cocoapods/Gemfile-beta.lock
  75. +7 −7 pkgs/development/mobile/cocoapods/Gemfile.lock
  76. +8 −8 pkgs/development/mobile/cocoapods/gemset-beta.nix
  77. +8 −8 pkgs/development/mobile/cocoapods/gemset.nix
  78. 0 pkgs/development/python-modules/{aiohttp/cors.nix → aiohttp-cors/default.nix}
  79. +8 −0 pkgs/development/python-modules/aiohttp/default.nix
  80. +2 −9 pkgs/development/python-modules/asyncssh/default.nix
  81. +2 −2 pkgs/development/python-modules/cmd2/default.nix
  82. +2 −2 pkgs/development/python-modules/cryptography/default.nix
  83. +1 −1 pkgs/development/python-modules/cryptography/vectors.nix
  84. +8 −4 pkgs/development/python-modules/matchpy/default.nix
  85. +3 −2 pkgs/development/python-modules/pygraphviz/default.nix
  86. +4 −2 pkgs/development/python-modules/scandir/default.nix
  87. +1 −1 pkgs/development/r-modules/default.nix
  88. +24 −0 pkgs/development/tools/documentation/gtk-doc/0001-highlight-fix-permission-on-file-style.patch
  89. +41 −12 pkgs/development/tools/documentation/gtk-doc/default.nix
  90. +39 −3 pkgs/development/tools/flatpak-builder/default.nix
  91. +111 −0 pkgs/development/tools/flatpak-builder/fix-test-paths.patch
  92. +26 −0 pkgs/development/tools/misc/reviewdog/default.nix
  93. +3 −3 pkgs/development/tools/rust/cargo-xbuild/default.nix
  94. +5 −5 pkgs/misc/emulators/wine/sources.nix
  95. +0 −33 pkgs/misc/phabricator/default.nix
  96. +81 −81 pkgs/misc/vim-plugins/generated.nix
  97. +1 −1 pkgs/os-specific/linux/busybox/default.nix
  98. +3 −1 pkgs/os-specific/linux/fuse/common.nix
  99. +2 −2 pkgs/os-specific/linux/fuse/default.nix
  100. +11 −0 pkgs/os-specific/linux/fuse/fuse2-Do-not-set-FUSERMOUNT_DIR.patch
  101. +12 −0 pkgs/os-specific/linux/fuse/fuse3-Do-not-set-FUSERMOUNT_DIR.patch
  102. +4 −32 pkgs/os-specific/linux/iptables/default.nix
  103. +2 −2 pkgs/os-specific/linux/kernel/linux-4.14.nix
  104. +2 −2 pkgs/os-specific/linux/kernel/linux-4.19.nix
  105. +2 −2 pkgs/os-specific/linux/kernel/linux-5.1.nix
  106. +7 −6 pkgs/os-specific/linux/multipath-tools/default.nix
  107. +5 −1 pkgs/os-specific/linux/nvidia-x11/builder.sh
  108. +6 −3 pkgs/os-specific/linux/nvidia-x11/generic.nix
  109. +46 −46 pkgs/os-specific/linux/systemd/default.nix
  110. +2 −2 pkgs/os-specific/windows/mingwrt/default.nix
  111. +14 −7 pkgs/servers/nosql/cassandra/generic.nix
  112. +15 −14 pkgs/servers/pulseaudio/default.nix
  113. +2 −1 pkgs/servers/sql/postgresql/default.nix
  114. +32 −0 pkgs/servers/sql/postgresql/ext/pg_bigm.nix
  115. +2 −0 pkgs/servers/sql/postgresql/packages.nix
  116. +59 −0 pkgs/servers/sql/postgresql/patches/findstring.patch
  117. +2 −2 pkgs/servers/web-apps/wallabag/default.nix
  118. +3 −3 pkgs/shells/zsh/oh-my-zsh/default.nix
  119. +40 −0 pkgs/tools/admin/eksctl/default.nix
  120. +2 −2 pkgs/tools/filesystems/e2fsprogs/default.nix
  121. +4 −4 pkgs/tools/filesystems/fuse-overlayfs/default.nix
  122. +10 −2 pkgs/tools/networking/mosh/default.nix
  123. +2 −2 pkgs/tools/package-management/opkg/default.nix
  124. +30 −0 pkgs/tools/package-management/reuse/default.nix
  125. +2 −2 pkgs/tools/security/gnupg/22.nix
  126. +25 −0 pkgs/tools/system/clinfo/default.nix
  127. +16 −13 pkgs/top-level/all-packages.nix
  128. +13 −0 pkgs/top-level/perl-packages.nix
  129. +1 −1 pkgs/top-level/python-packages.nix
  130. +0 −1 pkgs/top-level/release-cross.nix
5 changes: 5 additions & 0 deletions maintainers/maintainer-list.nix
Original file line number Diff line number Diff line change
@@ -507,6 +507,11 @@
github = "aszlig";
name = "aszlig";
};
athas = {
email = "athas@sigkill.dk";
github = "athas";
name = "Troels Henriksen";
};
atnnn = {
email = "etienne@atnnn.com";
github = "atnnn";
55 changes: 54 additions & 1 deletion nixos/doc/manual/release-notes/rl-1909.xml
Original file line number Diff line number Diff line change
@@ -137,6 +137,40 @@
</para>
</listitem>
<listitem>
<para>
The option <option>systemd.network.networks.&lt;name&gt;.routes.*.routeConfig.GatewayOnlink</option>
was renamed to <option>systemd.network.networks.&lt;name&gt;.routes.*.routeConfig.GatewayOnLink</option>
(capital <literal>L</literal>). This follows
<link xlink:href="https://github.com/systemd/systemd/commit/9cb8c5593443d24c19e40bfd4fc06d672f8c554c">
upstreams renaming
</link> of the setting.
</para>
</listitem>
<listitem>
<para>
As of this release the NixOps feature <literal>autoLuks</literal> is deprecated. It no longer works
with our systemd version without manual intervention.
</para>
<para>
Whenever the usage of the module is detected the evaluation will fail with a message
explaining why and how to deal with the situation.
</para>
<para>
A new knob named <literal>nixops.enableDeprecatedAutoLuks</literal>
has been introduced to disable the eval failure and to acknowledge the notice was received and read.
If you plan on using the feature please note that it might break with subsequent updates.
</para>
<para>
Make sure you set the <literal>_netdev</literal> option for each of the file systems referring to block
devices provided by the autoLuks module. Not doing this might render the system in a
state where it doesn't boot anymore.
</para>
<para>
If you are actively using the <literal>autoLuks</literal> module please let us know in
<link xlink:href="https://github.com/NixOS/nixpkgs/issues/62211">issue #62211</link>.
</para>
</listitem>
<listitem>
<para>
The setopt declarations will be evaluated at the end of <literal>/etc/zshrc</literal>, so any code in <xref linkend="opt-programs.zsh.interactiveShellInit" />,
<xref linkend="opt-programs.zsh.loginShellInit" /> and <xref linkend="opt-programs.zsh.promptInit" /> may break if it relies on those options being set.
@@ -211,6 +245,20 @@
RuntimeDirectory and tmpfiles.
</para>
</listitem>
<listitem>
<para>
With the upgrade to systemd version 242 the <literal>systemd-timesyncd</literal>
service is no longer using <literal>DynamicUser=yes</literal>. In order for the
upgrade to work we rely on an activation script to move the state from the old
to the new directory. The older directory (prior <literal>19.09</literal>) was
<literal>/var/lib/private/systemd/timesync</literal>.
</para>
<para>
As long as the <literal>system.config.stateVersion</literal> is below
<literal>19.09</literal> the state folder will migrated to its proper location
(<literal>/var/lib/systemd/timesync</literal>), if required.
</para>
</listitem>
<listitem>
<para>
Since version 0.1.19, <literal>cargo-vendor</literal> honors package
@@ -221,7 +269,6 @@
vendored files for most Rust packages, the hash that use used to verify
the dependencies, <literal>cargoSha256</literal>, also changes.
</para>

<para>
The <literal>cargoSha256</literal> hashes of all in-tree derivations that
use <literal>buildRustPackage</literal> have been updated to reflect this
@@ -236,6 +283,12 @@
so you'll need to set <option>hardware.pulseaudio.daemon.config.resample-method</option> back to <literal>speex-float-1</literal>.
</para>
</listitem>
<listitem>
<para>
The <literal>phabricator</literal> package and associated <literal>httpd.extraSubservice</literal>, as well as the
<literal>phd</literal> service have been removed from nixpkgs due to lack of maintainer.
</para>
</listitem>
</itemizedlist>
</section>
</section>
44 changes: 44 additions & 0 deletions nixos/modules/misc/nixops-autoluks.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{ config, options, lib, ... }:
let
path = [ "deployment" "autoLuks" ];
hasAutoLuksOption = lib.hasAttrByPath path options;
hasAutoLuksConfig = lib.hasAttrByPath path config && (lib.attrByPath path {} config) != {};

inherit (config.nixops) enableDeprecatedAutoLuks;
in {
options.nixops.enableDeprecatedAutoLuks = lib.mkEnableOption "Enable the deprecated NixOps AutoLuks module";

config = {
assertions = [
{
assertion = if hasAutoLuksConfig then hasAutoLuksConfig && enableDeprecatedAutoLuks else true;
message = ''
⚠️ !!! WARNING !!! ⚠️
NixOps autoLuks is deprecated. The feature was never widely used and the maintenance did outgrow the benefit.
If you still want to use the module:
a) Please raise your voice in the issue tracking usage of the module:
https://github.com/NixOS/nixpkgs/issues/62211
b) make sure you set the `_netdev` option for each of the file
systems referring to block devices provided by the autoLuks module.
⚠️ If you do not set the option your system will not boot anymore! ⚠️
{
fileSystems."/secret" = { options = [ "_netdev" ]; };
}
b) set the option >nixops.enableDeprecatedAutoLuks = true< to remove this error.
For more details read through the following resources:
- https://github.com/NixOS/nixops/pull/1156
- https://github.com/NixOS/nixpkgs/issues/47550
- https://github.com/NixOS/nixpkgs/issues/62211
- https://github.com/NixOS/nixpkgs/pull/61321
'';
}
];
};

}
1 change: 1 addition & 0 deletions nixos/modules/misc/version.nix
Original file line number Diff line number Diff line change
@@ -95,6 +95,7 @@ in
PRETTY_NAME="NixOS ${cfg.version} (${cfg.codeName})"
LOGO="nix-snowflake"
HOME_URL="https://nixos.org/"
DOCUMENTATION_URL="https://nixos.org/nixos/manual/index.html"
SUPPORT_URL="https://nixos.org/nixos/support.html"
BUG_REPORT_URL="https://github.com/NixOS/nixpkgs/issues"
'';
2 changes: 1 addition & 1 deletion nixos/modules/module-list.nix
Original file line number Diff line number Diff line change
@@ -84,6 +84,7 @@
./misc/nixpkgs.nix
./misc/passthru.nix
./misc/version.nix
./misc/nixops-autoluks.nix
./programs/adb.nix
./programs/atop.nix
./programs/autojump.nix
@@ -443,7 +444,6 @@
./services/misc/packagekit.nix
./services/misc/paperless.nix
./services/misc/parsoid.nix
./services/misc/phd.nix
./services/misc/plex.nix
./services/misc/tautulli.nix
./services/misc/pykms.nix
20 changes: 17 additions & 3 deletions nixos/modules/programs/captive-browser.nix
Original file line number Diff line number Diff line change
@@ -15,6 +15,8 @@ in
package = mkOption {
type = types.package;
default = pkgs.captive-browser;
defaultText = "pkgs.captive-browser";
description = "Which package to use for captive-browser";
};

interface = mkOption {
@@ -35,7 +37,7 @@ in
''http://cache.nixos.org/''
];
description = ''
the shell (/bin/sh) command executed once the proxy starts.
The shell (/bin/sh) command executed once the proxy starts.
When browser exits, the proxy exits. An extra env var PROXY is available.
Here, we use a separate Chrome instance in Incognito mode, so that
@@ -51,7 +53,7 @@ in
dhcp-dns = mkOption {
type = types.str;
description = ''
the shell (/bin/sh) command executed to obtain the DHCP
The shell (/bin/sh) command executed to obtain the DHCP
DNS server address. The first match of an IPv4 regex is used.
IPv4 only, because let's be real, it's a captive portal.
'';
@@ -62,6 +64,16 @@ in
default = "localhost:1666";
description = ''the listen address for the SOCKS5 proxy server'';
};

bindInterface = mkOption {
default = true;
type = types.bool;
description = ''
Binds <package>captive-browser</package> to the network interface declared in
<literal>cfg.interface</literal>. This can be used to avoid collisions
with private subnets.
'';
};
};
};

@@ -99,7 +111,9 @@ in
browser = """${cfg.browser}"""
dhcp-dns = """${cfg.dhcp-dns}"""
socks5-addr = """${cfg.socks5-addr}"""
bind-device = """${cfg.interface}"""
${optionalString cfg.bindInterface ''
bind-device = """${cfg.interface}"""
''}
''}
exec ${cfg.package}/bin/captive-browser
'';
Loading