Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: d2326cc24a6c
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: f68549c338c2
Choose a head ref

Commits on Feb 27, 2019

  1. ejabberd: 18.12.1 -> 19.02

    Izorkin committed Feb 27, 2019
    Copy the full SHA
    86059b4 View commit details

Commits on Mar 10, 2019

  1. fltk: 1.3.4 -> 1.3.5

    Semi-automatic update generated by
    https://github.com/ryantm/nixpkgs-update tools. This update was made
    based on information from
    https://repology.org/metapackage/fltk/versions
    r-ryantm committed Mar 10, 2019
    Copy the full SHA
    29e03ca View commit details

Commits on Mar 12, 2019

  1. rtv: 1.25.1 -> 1.26.0

    Semi-automatic update generated by
    https://github.com/ryantm/nixpkgs-update tools. This update was made
    based on information from
    https://repology.org/metapackage/rtv/versions
    r-ryantm committed Mar 12, 2019
    Copy the full SHA
    0c5eef6 View commit details
  2. xmrig-proxy: 2.11.0 -> 2.14.0

    Semi-automatic update generated by
    https://github.com/ryantm/nixpkgs-update tools. This update was made
    based on information from
    https://repology.org/metapackage/xmrig-proxy/versions
    r-ryantm committed Mar 12, 2019
    Copy the full SHA
    a5e96b0 View commit details

Commits on Mar 19, 2019

  1. Copy the full SHA
    bad7d82 View commit details
  2. Copy the full SHA
    45d43a6 View commit details
  3. Copy the full SHA
    8f6aaa8 View commit details
  4. Copy the full SHA
    9d4bc79 View commit details
  5. Copy the full SHA
    66fb3aa View commit details
  6. Copy the full SHA
    651f05c View commit details
  7. Copy the full SHA
    660ee99 View commit details
  8. Copy the full SHA
    09d3ea4 View commit details
  9. Copy the full SHA
    af03809 View commit details
  10. Copy the full SHA
    e843478 View commit details
  11. Copy the full SHA
    0438ad4 View commit details
  12. Copy the full SHA
    edd5c88 View commit details
  13. Copy the full SHA
    c67f2f0 View commit details
  14. Copy the full SHA
    e1376dd View commit details
  15. Copy the full SHA
    231d815 View commit details
  16. Copy the full SHA
    3f17dcb View commit details
  17. Copy the full SHA
    78acc82 View commit details
  18. Copy the full SHA
    3068252 View commit details
  19. Copy the full SHA
    40679eb View commit details

Commits on Mar 21, 2019

  1. babl: 0.1.60 -> 0.1.62

    Semi-automatic update generated by
    https://github.com/ryantm/nixpkgs-update tools. This update was made
    based on information from
    https://repology.org/metapackage/babl/versions
    r-ryantm committed Mar 21, 2019
    Copy the full SHA
    3f43e8d View commit details

Commits on Mar 24, 2019

  1. Copy the full SHA
    0855824 View commit details
  2. Copy the full SHA
    9afbe4c View commit details
  3. Copy the full SHA
    82dee48 View commit details
  4. Copy the full SHA
    1a56768 View commit details
  5. Copy the full SHA
    937e733 View commit details
  6. Copy the full SHA
    1e48222 View commit details
  7. Copy the full SHA
    321bc43 View commit details
  8. Copy the full SHA
    cc5f08f View commit details
  9. Copy the full SHA
    34738de View commit details
  10. Copy the full SHA
    8062476 View commit details
  11. Copy the full SHA
    b9e27ec View commit details
  12. Copy the full SHA
    210b713 View commit details
  13. Copy the full SHA
    323e8ef View commit details
  14. Copy the full SHA
    0cf1944 View commit details
  15. Copy the full SHA
    7989311 View commit details
  16. Copy the full SHA
    60481ba View commit details
  17. Copy the full SHA
    bde23ec View commit details
  18. Copy the full SHA
    cdc6f2e View commit details
  19. Copy the full SHA
    9b100c4 View commit details
  20. Copy the full SHA
    f09fb4d View commit details
  21. Copy the full SHA
    65710d1 View commit details
  22. Copy the full SHA
    889bb1e View commit details
  23. Copy the full SHA
    1eefda5 View commit details
  24. Copy the full SHA
    8c1e000 View commit details
  25. Copy the full SHA
    d8dc122 View commit details
  26. Copy the full SHA
    09bff92 View commit details
Showing with 6,921 additions and 3,278 deletions.
  1. +7 −0 nixos/doc/manual/release-notes/rl-1903.xml
  2. +0 −2 nixos/modules/programs/bash/bash.nix
  3. +0 −1 nixos/modules/programs/fish.nix
  4. +0 −1 nixos/modules/programs/xonsh.nix
  5. +0 −1 nixos/modules/programs/zsh/zsh.nix
  6. +1 −1 nixos/modules/rename.nix
  7. +3 −3 nixos/modules/services/backup/bacula.nix
  8. +1 −1 nixos/modules/services/databases/couchdb.nix
  9. +1 −1 nixos/modules/services/databases/mongodb.nix
  10. +2 −2 nixos/modules/services/databases/openldap.nix
  11. +1 −1 nixos/modules/services/databases/redis.nix
  12. +1 −1 nixos/modules/services/databases/rethinkdb.nix
  13. +2 −2 nixos/modules/services/mail/pfix-srsd.nix
  14. +2 −2 nixos/modules/services/mail/postgrey.nix
  15. +1 −1 nixos/modules/services/mail/spamassassin.nix
  16. +1 −1 nixos/modules/services/misc/matrix-synapse.nix
  17. +1 −1 nixos/modules/services/misc/mbpfan.nix
  18. +1 −1 nixos/modules/services/misc/spice-vdagentd.nix
  19. +1 −1 nixos/modules/services/misc/svnserve.nix
  20. +1 −1 nixos/modules/services/monitoring/nagios.nix
  21. +1 −1 nixos/modules/services/monitoring/zabbix-agent.nix
  22. +1 −1 nixos/modules/services/monitoring/zabbix-server.nix
  23. +2 −2 nixos/modules/services/networking/asterisk.nix
  24. +2 −2 nixos/modules/services/networking/avahi-daemon.nix
  25. +4 −4 nixos/modules/services/networking/bind.nix
  26. +1 −1 nixos/modules/services/networking/hostapd.nix
  27. +1 −1 nixos/modules/services/networking/htpdate.nix
  28. +1 −1 nixos/modules/services/networking/ircd-hybrid/ircd.conf
  29. +1 −1 nixos/modules/services/networking/lldpd.nix
  30. +1 −1 nixos/modules/services/networking/miniupnpd.nix
  31. +4 −4 nixos/modules/services/networking/ocserv.nix
  32. +2 −2 nixos/modules/services/networking/racoon.nix
  33. +2 −2 nixos/modules/services/networking/supplicant.nix
  34. +1 −1 nixos/modules/services/networking/wpa_supplicant.nix
  35. +4 −4 nixos/modules/services/networking/xrdp.nix
  36. +1 −1 nixos/modules/services/printing/cupsd.nix
  37. +2 −2 nixos/modules/services/scheduling/fcron.nix
  38. +1 −1 nixos/modules/services/security/hologram-agent.nix
  39. +1 −1 nixos/modules/services/web-apps/codimd.nix
  40. +1 −1 nixos/modules/services/web-apps/restya-board.nix
  41. +1 −1 nixos/modules/services/web-apps/selfoss.nix
  42. +1 −1 nixos/modules/services/web-apps/tt-rss.nix
  43. +1 −1 nixos/modules/services/web-servers/mighttpd2.nix
  44. +1 −1 nixos/modules/services/x11/desktop-managers/kodi.nix
  45. +2 −2 nixos/modules/services/x11/display-managers/xpra.nix
  46. +1 −1 nixos/modules/virtualisation/docker.nix
  47. +9 −9 nixos/modules/virtualisation/openvswitch.nix
  48. +1 −1 nixos/tests/nghttpx.nix
  49. +2 −2 nixos/tests/osquery.nix
  50. +1 −1 nixos/tests/printing.nix
  51. +2 −2 pkgs/applications/audio/pianobar/default.nix
  52. +2 −2 pkgs/applications/graphics/ImageMagick/7.0.nix
  53. +2 −2 pkgs/applications/misc/rtv/default.nix
  54. +4 −4 pkgs/applications/misc/sequeler/default.nix
  55. +2 −2 pkgs/applications/networking/cluster/cni/plugins.nix
  56. +2 −2 pkgs/applications/networking/dropbox/cli.nix
  57. +3 −3 pkgs/applications/networking/instant-messengers/teamspeak/server.nix
  58. +2 −2 pkgs/applications/networking/mailreaders/mailnag/default.nix
  59. +2 −2 pkgs/applications/networking/p2p/ncdc/default.nix
  60. +14 −10 pkgs/build-support/trivial-builders.nix
  61. +2 −2 pkgs/data/themes/qogir/default.nix
  62. +44 −0 pkgs/desktops/deepin/deepin-turbo/default.nix
  63. +1 −0 pkgs/desktops/deepin/default.nix
  64. +1 −1 pkgs/desktops/deepin/setup-hook.sh
  65. +1 −1 pkgs/desktops/xfce/panel-plugins/xfce4-mailwatch-plugin.nix
  66. +1 −1 pkgs/desktops/xfce/panel-plugins/xfce4-mpc-plugin.nix
  67. +1 −1 pkgs/desktops/xfce/panel-plugins/xfce4-timer-plugin.nix
  68. +3 −0 pkgs/development/haskell-modules/configuration-common.nix
  69. +2 −2 pkgs/development/libraries/babl/default.nix
  70. +2 −2 pkgs/development/libraries/fltk/default.nix
  71. +2 −2 pkgs/development/libraries/glog/default.nix
  72. +2 −2 pkgs/development/libraries/leatherman/default.nix
  73. +2 −2 pkgs/development/libraries/libpqxx/default.nix
  74. +2 −2 pkgs/development/libraries/libx86emu/default.nix
  75. +1 −1 pkgs/development/libraries/vo-amrwbenc/default.nix
  76. +0 −17 pkgs/development/node-packages/composition-v6.nix
  77. +0 −1 pkgs/development/node-packages/generate.sh
  78. +24 −0 pkgs/development/ocaml-modules/base64/2.0.nix
  79. +12 −10 pkgs/development/ocaml-modules/base64/default.nix
  80. +2 −2 pkgs/development/python-modules/APScheduler/default.nix
  81. +2 −2 pkgs/development/python-modules/agate-dbf/default.nix
  82. +2 −2 pkgs/development/python-modules/aniso8601/default.nix
  83. +2 −2 pkgs/development/python-modules/backports_csv/default.nix
  84. +2 −2 pkgs/development/python-modules/braintree/default.nix
  85. +0 −21 pkgs/development/python-modules/pybcrypt/default.nix
  86. +1 −1 pkgs/development/ruby-modules/gem/default.nix
  87. +2 −2 pkgs/development/tools/analysis/checkstyle/default.nix
  88. +6 −6 pkgs/development/tools/electron/default.nix
  89. +3 −3 pkgs/development/tools/misc/doclifter/default.nix
  90. +2 −2 pkgs/development/tools/misc/pwndbg/default.nix
  91. +0 −10 pkgs/development/web/nodejs/v6.nix
  92. +1 −1 pkgs/development/web/remarkjs/generate.sh
  93. +2,341 −400 pkgs/development/web/remarkjs/node-packages.nix
  94. +1 −1 pkgs/development/web/remarkjs/nodepkgs.nix
  95. +0 −8 pkgs/misc/base16-builder/default.nix
  96. +7 −0 pkgs/misc/base16-builder/generate.sh
  97. +96 −96 pkgs/misc/base16-builder/node-packages-generated.nix
  98. +1 −1 pkgs/misc/base16-builder/node-packages.nix
  99. +10 −0 pkgs/os-specific/linux/fuse/fuse3-install.patch
  100. +8 −8 pkgs/os-specific/linux/tomb/default.nix
  101. +3 −3 pkgs/servers/plex/default.nix
  102. +2 −2 pkgs/servers/web-apps/codimd/CodeMirror/default.nix
  103. +1 −1 pkgs/servers/web-apps/codimd/CodeMirror/generate.sh
  104. +114 −100 pkgs/servers/web-apps/codimd/CodeMirror/node-packages.nix
  105. +2 −2 pkgs/servers/web-apps/codimd/CodeMirror/node.nix
  106. +59 −17 pkgs/servers/web-apps/codimd/default.nix
  107. +0 −1 pkgs/servers/web-apps/codimd/deps.json
  108. +1 −1 pkgs/servers/web-apps/codimd/generate.sh
  109. +31 −0 pkgs/servers/web-apps/codimd/js-sequence-diagrams/default.nix
  110. +2,894 −2,214 pkgs/servers/web-apps/codimd/node-packages.nix
  111. +2 −2 pkgs/servers/web-apps/codimd/node.nix
  112. +3 −3 pkgs/servers/xmpp/ejabberd/default.nix
  113. +2 −2 pkgs/shells/zsh/grml-zsh-config/default.nix
  114. +6 −6 pkgs/tools/admin/nomachine-client/default.nix
  115. +7 −1 pkgs/tools/filesystems/nilfs-utils/default.nix
  116. +4 −4 pkgs/tools/inputmethods/fcitx/unwrapped.nix
  117. +2 −2 pkgs/tools/misc/entr/default.nix
  118. +2 −2 pkgs/tools/misc/linuxquota/default.nix
  119. +1 −1 pkgs/tools/networking/airfield/deps.sh
  120. +158 −135 pkgs/tools/networking/airfield/node-packages.nix
  121. +1 −1 pkgs/tools/networking/airfield/node.nix
  122. +2 −2 pkgs/tools/networking/dropbear/default.nix
  123. +2 −2 pkgs/tools/networking/pcapfix/default.nix
  124. +2 −2 pkgs/tools/package-management/dpkg/default.nix
  125. +1 −1 pkgs/tools/package-management/nixui/generate.sh
  126. +1 −1 pkgs/tools/package-management/nixui/nixui.nix
  127. +1 −1 pkgs/tools/package-management/nixui/node-packages.nix
  128. +8 −0 pkgs/tools/security/bitwarden-cli/generate.sh
  129. +883 −26 pkgs/tools/security/bitwarden-cli/node-packages-generated.nix
  130. +1 −1 pkgs/tools/security/bitwarden-cli/node-packages.nix
  131. +2 −2 pkgs/tools/security/eid-mw/default.nix
  132. +1 −8 pkgs/top-level/all-packages.nix
  133. +14 −3 pkgs/top-level/ocaml-packages.nix
  134. +0 −2 pkgs/top-level/python-packages.nix
7 changes: 7 additions & 0 deletions nixos/doc/manual/release-notes/rl-1903.xml
Original file line number Diff line number Diff line change
@@ -534,6 +534,13 @@
Same applies to the new <literal>users.ldap.daemon.rootpwmodpwFile</literal> option.
</para>
</listitem>
<listitem>
<para>
<literal>nodejs-6_x</literal> is end-of-life.
<literal>nodejs-6_x</literal>, <literal>nodejs-slim-6_x</literal> and
<literal>nodePackages_6_x</literal> are removed.
</para>
</listitem>
</itemizedlist>
</section>

2 changes: 0 additions & 2 deletions nixos/modules/programs/bash/bash.nix
Original file line number Diff line number Diff line change
@@ -226,9 +226,7 @@ in

environment.shells =
[ "/run/current-system/sw/bin/bash"
"/var/run/current-system/sw/bin/bash"
"/run/current-system/sw/bin/sh"
"/var/run/current-system/sw/bin/sh"
"${pkgs.bashInteractive}/bin/bash"
"${pkgs.bashInteractive}/bin/sh"
];
1 change: 0 additions & 1 deletion nixos/modules/programs/fish.nix
Original file line number Diff line number Diff line change
@@ -232,7 +232,6 @@ in

environment.shells = [
"/run/current-system/sw/bin/fish"
"/var/run/current-system/sw/bin/fish"
"${pkgs.fish}/bin/fish"
];

1 change: 0 additions & 1 deletion nixos/modules/programs/xonsh.nix
Original file line number Diff line number Diff line change
@@ -50,7 +50,6 @@ in

environment.shells =
[ "/run/current-system/sw/bin/xonsh"
"/var/run/current-system/sw/bin/xonsh"
"${pkgs.xonsh}/bin/xonsh"
];

1 change: 0 additions & 1 deletion nixos/modules/programs/zsh/zsh.nix
Original file line number Diff line number Diff line change
@@ -230,7 +230,6 @@ in

environment.shells =
[ "/run/current-system/sw/bin/zsh"
"/var/run/current-system/sw/bin/zsh"
"${pkgs.zsh}/bin/zsh"
];

2 changes: 1 addition & 1 deletion nixos/modules/rename.nix
Original file line number Diff line number Diff line change
@@ -134,7 +134,7 @@ with lib;
inetPort = [ "services" "postgrey" "inetPort" ];
in
if value inetAddr == null
then { path = "/var/run/postgrey.sock"; }
then { path = "/run/postgrey.sock"; }
else { addr = value inetAddr; port = value inetPort; }
))

6 changes: 3 additions & 3 deletions nixos/modules/services/backup/bacula.nix
Original file line number Diff line number Diff line change
@@ -15,7 +15,7 @@ let
Name = "${fd_cfg.name}";
FDPort = ${toString fd_cfg.port};
WorkingDirectory = "${libDir}";
Pid Directory = "/var/run";
Pid Directory = "/run";
${fd_cfg.extraClientConfig}
}
@@ -41,7 +41,7 @@ let
Name = "${sd_cfg.name}";
SDPort = ${toString sd_cfg.port};
WorkingDirectory = "${libDir}";
Pid Directory = "/var/run";
Pid Directory = "/run";
${sd_cfg.extraStorageConfig}
}
@@ -77,7 +77,7 @@ let
Password = "${dir_cfg.password}";
DirPort = ${toString dir_cfg.port};
Working Directory = "${libDir}";
Pid Directory = "/var/run/";
Pid Directory = "/run/";
QueryFile = "${pkgs.bacula}/etc/query.sql";
${dir_cfg.extraDirectorConfig}
}
2 changes: 1 addition & 1 deletion nixos/modules/services/databases/couchdb.nix
Original file line number Diff line number Diff line change
@@ -85,7 +85,7 @@ in {

uriFile = mkOption {
type = types.path;
default = "/var/run/couchdb/couchdb.uri";
default = "/run/couchdb/couchdb.uri";
description = ''
This file contains the full URI that can be used to access this
instance of CouchDB. It is used to help discover the port CouchDB is
2 changes: 1 addition & 1 deletion nixos/modules/services/databases/mongodb.nix
Original file line number Diff line number Diff line change
@@ -65,7 +65,7 @@ in
};

pidFile = mkOption {
default = "/var/run/mongodb.pid";
default = "/run/mongodb.pid";
description = "Location of MongoDB pid file";
};

4 changes: 2 additions & 2 deletions nixos/modules/services/databases/openldap.nix
Original file line number Diff line number Diff line change
@@ -226,8 +226,8 @@ in
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
preStart = ''
mkdir -p /var/run/slapd
chown -R "${cfg.user}:${cfg.group}" /var/run/slapd
mkdir -p /run/slapd
chown -R "${cfg.user}:${cfg.group}" /run/slapd
${optionalString (cfg.declarativeContents != null) ''
rm -Rf "${cfg.dataDir}"
''}
2 changes: 1 addition & 1 deletion nixos/modules/services/databases/redis.nix
Original file line number Diff line number Diff line change
@@ -95,7 +95,7 @@ in
type = with types; nullOr path;
default = null;
description = "The path to the socket to bind to.";
example = "/var/run/redis.sock";
example = "/run/redis.sock";
};

logLevel = mkOption {
2 changes: 1 addition & 1 deletion nixos/modules/services/databases/rethinkdb.nix
Original file line number Diff line number Diff line change
@@ -41,7 +41,7 @@ in
};

pidpath = mkOption {
default = "/var/run/rethinkdb";
default = "/run/rethinkdb";
description = "Location where each instance's pid file is located.";
};

4 changes: 2 additions & 2 deletions nixos/modules/services/mail/pfix-srsd.nix
Original file line number Diff line number Diff line change
@@ -48,8 +48,8 @@ with lib;
requiredBy = [ "postfix.service" ];
serviceConfig = {
Type = "forking";
PIDFile = "/var/run/pfix-srsd.pid";
ExecStart = "${pkgs.pfixtools}/bin/pfix-srsd -p /var/run/pfix-srsd.pid -I ${config.services.pfix-srsd.domain} ${config.services.pfix-srsd.secretsFile}";
PIDFile = "/run/pfix-srsd.pid";
ExecStart = "${pkgs.pfixtools}/bin/pfix-srsd -p /run/pfix-srsd.pid -I ${config.services.pfix-srsd.domain} ${config.services.pfix-srsd.secretsFile}";
};
};
};
4 changes: 2 additions & 2 deletions nixos/modules/services/mail/postgrey.nix
Original file line number Diff line number Diff line change
@@ -29,7 +29,7 @@ with lib; let
options = {
path = mkOption {
type = path;
default = "/var/run/postgrey.sock";
default = "/run/postgrey.sock";
description = "Path of the unix socket";
};

@@ -53,7 +53,7 @@ in {
socket = mkOption {
type = socket;
default = {
path = "/var/run/postgrey.sock";
path = "/run/postgrey.sock";
mode = "0777";
};
example = {
2 changes: 1 addition & 1 deletion nixos/modules/services/mail/spamassassin.nix
Original file line number Diff line number Diff line change
@@ -174,7 +174,7 @@ in
after = [ "network.target" ];

serviceConfig = {
ExecStart = "${pkgs.spamassassin}/bin/spamd ${optionalString cfg.debug "-D"} --username=spamd --groupname=spamd --siteconfigpath=${spamdEnv} --virtual-config-dir=/var/lib/spamassassin/user-%u --allow-tell --pidfile=/var/run/spamd.pid";
ExecStart = "${pkgs.spamassassin}/bin/spamd ${optionalString cfg.debug "-D"} --username=spamd --groupname=spamd --siteconfigpath=${spamdEnv} --virtual-config-dir=/var/lib/spamassassin/user-%u --allow-tell --pidfile=/run/spamd.pid";
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
};

2 changes: 1 addition & 1 deletion nixos/modules/services/misc/matrix-synapse.nix
Original file line number Diff line number Diff line change
@@ -30,7 +30,7 @@ ${optionalString (cfg.bind_host != null) ''
bind_host: "${cfg.bind_host}"
''}
server_name: "${cfg.server_name}"
pid_file: "/var/run/matrix-synapse.pid"
pid_file: "/run/matrix-synapse.pid"
web_client: ${boolToString cfg.web_client}
${optionalString (cfg.public_baseurl != null) ''
public_baseurl: "${cfg.public_baseurl}"
2 changes: 1 addition & 1 deletion nixos/modules/services/misc/mbpfan.nix
Original file line number Diff line number Diff line change
@@ -101,7 +101,7 @@ in {
Type = "simple";
ExecStart = "${cfg.package}/bin/mbpfan -f${verbose}";
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
PIDFile = "/var/run/mbpfan.pid";
PIDFile = "/run/mbpfan.pid";
Restart = "always";
};
};
2 changes: 1 addition & 1 deletion nixos/modules/services/misc/spice-vdagentd.nix
Original file line number Diff line number Diff line change
@@ -19,7 +19,7 @@ in
description = "spice-vdagent daemon";
wantedBy = [ "graphical.target" ];
preStart = ''
mkdir -p "/var/run/spice-vdagentd/"
mkdir -p "/run/spice-vdagentd/"
'';
serviceConfig = {
Type = "forking";
2 changes: 1 addition & 1 deletion nixos/modules/services/misc/svnserve.nix
Original file line number Diff line number Diff line change
@@ -38,7 +38,7 @@ in
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
preStart = "mkdir -p ${cfg.svnBaseDir}";
script = "${pkgs.subversion.out}/bin/svnserve -r ${cfg.svnBaseDir} -d --foreground --pid-file=/var/run/svnserve.pid";
script = "${pkgs.subversion.out}/bin/svnserve -r ${cfg.svnBaseDir} -d --foreground --pid-file=/run/svnserve.pid";
};
};
}
2 changes: 1 addition & 1 deletion nixos/modules/services/monitoring/nagios.nix
Original file line number Diff line number Diff line change
@@ -24,7 +24,7 @@ let
status_file=${nagiosState}/status.dat
object_cache_file=${nagiosState}/objects.cache
temp_file=${nagiosState}/nagios.tmp
lock_file=/var/run/nagios.lock # Not used I think.
lock_file=/run/nagios.lock # Not used I think.
state_retention_file=${nagiosState}/retention.dat
query_socket=${nagiosState}/nagios.qh
check_result_path=${nagiosState}
2 changes: 1 addition & 1 deletion nixos/modules/services/monitoring/zabbix-agent.nix
Original file line number Diff line number Diff line change
@@ -9,7 +9,7 @@ let

zabbix = cfg.package;

stateDir = "/var/run/zabbix";
stateDir = "/run/zabbix";

logDir = "/var/log/zabbix";

2 changes: 1 addition & 1 deletion nixos/modules/services/monitoring/zabbix-server.nix
Original file line number Diff line number Diff line change
@@ -7,7 +7,7 @@ let

cfg = config.services.zabbixServer;

stateDir = "/var/run/zabbix";
stateDir = "/run/zabbix";

logDir = "/var/log/zabbix";

4 changes: 2 additions & 2 deletions nixos/modules/services/networking/asterisk.nix
Original file line number Diff line number Diff line change
@@ -45,7 +45,7 @@ let
astdatadir => /var/lib/asterisk
astagidir => /var/lib/asterisk/agi-bin
astspooldir => /var/spool/asterisk
astrundir => /var/run/asterisk
astrundir => /run/asterisk
astlogdir => /var/log/asterisk
astsbindir => ${cfg.package}/sbin
'';
@@ -257,7 +257,7 @@ in
ExecReload = ''${cfg.package}/bin/asterisk -x "core reload"
'';
Type = "forking";
PIDFile = "/var/run/asterisk/asterisk.pid";
PIDFile = "/run/asterisk/asterisk.pid";
};
};
};
4 changes: 2 additions & 2 deletions nixos/modules/services/networking/avahi-daemon.nix
Original file line number Diff line number Diff line change
@@ -214,7 +214,7 @@ in

systemd.sockets.avahi-daemon =
{ description = "Avahi mDNS/DNS-SD Stack Activation Socket";
listenStreams = [ "/var/run/avahi-daemon/socket" ];
listenStreams = [ "/run/avahi-daemon/socket" ];
wantedBy = [ "sockets.target" ];
};

@@ -229,7 +229,7 @@ in

path = [ pkgs.coreutils pkgs.avahi ];

preStart = "mkdir -p /var/run/avahi-daemon";
preStart = "mkdir -p /run/avahi-daemon";

script =
''
8 changes: 4 additions & 4 deletions nixos/modules/services/networking/bind.nix
Original file line number Diff line number Diff line change
@@ -25,8 +25,8 @@ let
blackhole { badnetworks; };
forward first;
forwarders { ${concatMapStrings (entry: " ${entry}; ") cfg.forwarders} };
directory "/var/run/named";
pid-file "/var/run/named/named.pid";
directory "/run/named";
pid-file "/run/named/named.pid";
${cfg.extraOptions}
};
@@ -187,8 +187,8 @@ in
${pkgs.bind.out}/sbin/rndc-confgen -r /dev/urandom -c /etc/bind/rndc.key -u ${bindUser} -a -A hmac-sha256 2>/dev/null
fi
${pkgs.coreutils}/bin/mkdir -p /var/run/named
chown ${bindUser} /var/run/named
${pkgs.coreutils}/bin/mkdir -p /run/named
chown ${bindUser} /run/named
'';

serviceConfig = {
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/hostapd.nix
Original file line number Diff line number Diff line change
@@ -25,7 +25,7 @@ let
logger_stdout=-1
logger_stdout_level=2
ctrl_interface=/var/run/hostapd
ctrl_interface=/run/hostapd
ctrl_interface_group=${cfg.group}
${if cfg.wpa then ''
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/htpdate.nix
Original file line number Diff line number Diff line change
@@ -62,7 +62,7 @@ in
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "forking";
PIDFile = "/var/run/htpdate.pid";
PIDFile = "/run/htpdate.pid";
ExecStart = concatStringsSep " " [
"${htpdate}/bin/htpdate"
"-D -u nobody"
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/ircd-hybrid/ircd.conf
Original file line number Diff line number Diff line change
@@ -987,7 +987,7 @@ general {
* egdpool_path: path to EGD pool. Not necessary for OpenSSL >= 0.9.7
* which automatically finds the path.
*/
# egdpool_path = "/var/run/egd-pool";
# egdpool_path = "/run/egd-pool";


/*
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/lldpd.nix
Original file line number Diff line number Diff line change
@@ -23,7 +23,7 @@ in
users.users._lldpd = {
description = "lldpd user";
group = "_lldpd";
home = "/var/run/lldpd";
home = "/run/lldpd";
isSystemUser = true;
};
users.groups._lldpd = {};
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/miniupnpd.nix
Original file line number Diff line number Diff line change
@@ -71,7 +71,7 @@ in
wantedBy = [ "multi-user.target" ];
serviceConfig = {
ExecStart = "${pkgs.miniupnpd}/bin/miniupnpd -f ${configFile}";
PIDFile = "/var/run/miniupnpd.pid";
PIDFile = "/run/miniupnpd.pid";
Type = "forking";
};
};
8 changes: 4 additions & 4 deletions nixos/modules/services/networking/ocserv.nix
Original file line number Diff line number Diff line change
@@ -31,7 +31,7 @@ in
udp-port = 443
run-as-user = nobody
run-as-group = nogroup
socket-file = /var/run/ocserv-socket
socket-file = /run/ocserv-socket
server-cert = certs/server-cert.pem
server-key = certs/server-key.pem
keepalive = 32400
@@ -50,7 +50,7 @@ in
rekey-time = 172800
rekey-method = ssl
use-occtl = true
pid-file = /var/run/ocserv.pid
pid-file = /run/ocserv.pid
device = vpns
predictable-ips = true
default-domain = example.com
@@ -90,8 +90,8 @@ in

serviceConfig = {
PrivateTmp = true;
PIDFile = "/var/run/ocserv.pid";
ExecStart = "${pkgs.ocserv}/bin/ocserv --foreground --pid-file /var/run/ocesrv.pid --config /etc/ocserv/ocserv.conf";
PIDFile = "/run/ocserv.pid";
ExecStart = "${pkgs.ocserv}/bin/ocserv --foreground --pid-file /run/ocesrv.pid --config /etc/ocserv/ocserv.conf";
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
};
};
4 changes: 2 additions & 2 deletions nixos/modules/services/networking/racoon.nix
Original file line number Diff line number Diff line change
@@ -32,12 +32,12 @@ in {
else cfg.configPath
}";
ExecReload = "${pkgs.ipsecTools}/bin/racoonctl reload-config";
PIDFile = "/var/run/racoon.pid";
PIDFile = "/run/racoon.pid";
Type = "forking";
Restart = "always";
};
preStart = ''
rm /var/run/racoon.pid || true
rm /run/racoon.pid || true
mkdir -p /var/racoon
'';
};
4 changes: 2 additions & 2 deletions nixos/modules/services/networking/supplicant.nix
Original file line number Diff line number Diff line change
@@ -132,7 +132,7 @@ in
extraCmdArgs = mkOption {
type = types.str;
default = "";
example = "-e/var/run/wpa_supplicant/entropy.bin";
example = "-e/run/wpa_supplicant/entropy.bin";
description =
"Command line arguments to add when executing <literal>wpa_supplicant</literal>.";
};
@@ -164,7 +164,7 @@ in

socketDir = mkOption {
type = types.str;
default = "/var/run/wpa_supplicant";
default = "/run/wpa_supplicant";
description = "Directory of sockets for controlling wpa_supplicant.";
};

Loading