This repository was archived by the owner on Apr 12, 2021. It is now read-only.
-
-
Notifications
You must be signed in to change notification settings - Fork 104
Permalink
Choose a base ref
{{ refName }}
default
Choose a head ref
{{ refName }}
default
Comparing changes
Choose two branches to see what’s changed or to start a new pull request.
If you need to, you can also or
learn more about diff comparisons.
Open a pull request
Create a new pull request by comparing changes across two branches. If you need to, you can also .
Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 7d24cf8ea99c
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 56b88fb03f3e
Could not load branches
Nothing to show
Loading
Could not load tags
Nothing to show
{{ refName }}
default
Loading
- 19 commits
- 15 files changed
- 10 contributors
Commits on Oct 22, 2018
-
nixos/containers: Introduce several tweaks to systemd-nspawn from ups…
…tream systemd * Lets container@.service be activated by machines.target instead of multi-user.target According to the systemd manpages, all containers that are registered by machinectl, should be inside machines.target for easy stopping and starting container units altogether * make sure container@.service and container.slice instances are actually located in machine.slice https://plus.google.com/112206451048767236518/posts/SYAueyXHeEX See original commit: NixOS/systemd@45d383a3b8 * Enable Cgroup delegation for nixos-containers Delegate=yes should be set for container scopes where a systemd instance inside the container shall manage the hierarchies below its own cgroup and have access to all controllers. This is equivalent to enabling all accounting options on the systemd process inside the system container. This means that systemd inside the container is responsible for managing Cgroup resources for unit files that enable accounting options inside. Without this option, units that make use of cgroup features within system containers might misbehave See original commit: NixOS/systemd@a931ad47a8 from the manpage: Turns on delegation of further resource control partitioning to processes of the unit. Units where this is enabled may create and manage their own private subhierarchy of control groups below the control group of the unit itself. For unprivileged services (i.e. those using the User= setting) the unit's control group will be made accessible to the relevant user. When enabled the service manager will refrain from manipulating control groups or moving processes below the unit's control group, so that a clear concept of ownership is established: the control group tree above the unit's control group (i.e. towards the root control group) is owned and managed by the service manager of the host, while the control group tree below the unit's control group is owned and managed by the unit itself. Takes either a boolean argument or a list of control group controller names. If true, delegation is turned on, and all supported controllers are enabled for the unit, making them available to the unit's processes for management. If false, delegation is turned off entirely (and no additional controllers are enabled). If set to a list of controllers, delegation is turned on, and the specified controllers are enabled for the unit. Note that additional controllers than the ones specified might be made available as well, depending on configuration of the containing slice unit or other units contained in it. Note that assigning the empty string will enable delegation, but reset the list of controllers, all assignments prior to this will have no effect. Defaults to false. Note that controller delegation to less privileged code is only safe on the unified control group hierarchy. Accordingly, access to the specified controllers will not be granted to unprivileged services on the legacy hierarchy, even when requested. The following controller names may be specified: cpu, cpuacct, io, blkio, memory, devices, pids. Not all of these controllers are available on all kernels however, and some are specific to the unified hierarchy while others are specific to the legacy hierarchy. Also note that the kernel might support further controllers, which aren't covered here yet as delegation is either not supported at all for them or not defined cleanly.
Configuration menu - View commit details
-
Copy full SHA for 9f72791 - Browse repository at this point
Copy the full SHA 9f72791View commit details
Commits on Oct 30, 2018
-
Configuration menu - View commit details
-
Copy full SHA for 0cf2c6f - Browse repository at this point
Copy the full SHA 0cf2c6fView commit details -
Configuration menu - View commit details
-
Copy full SHA for 7dd7190 - Browse repository at this point
Copy the full SHA 7dd7190View commit details -
Configuration menu - View commit details
-
Copy full SHA for 1ac9d8e - Browse repository at this point
Copy the full SHA 1ac9d8eView commit details
Commits on Oct 31, 2018
-
Configuration menu - View commit details
-
Copy full SHA for beeaeba - Browse repository at this point
Copy the full SHA beeaebaView commit details -
Configuration menu - View commit details
-
Copy full SHA for 771849a - Browse repository at this point
Copy the full SHA 771849aView commit details -
hackage-packages.nix: automatic Haskell package set update
This update was generated by hackage2nix v2.11.1-2-g57c4f0f from Hackage revision commercialhaskell/all-cabal-hashes@b6545b2.
Configuration menu - View commit details
-
Copy full SHA for 5d18129 - Browse repository at this point
Copy the full SHA 5d18129View commit details -
Configuration menu - View commit details
-
Copy full SHA for b376d55 - Browse repository at this point
Copy the full SHA b376d55View commit details -
Configuration menu - View commit details
-
Copy full SHA for 1bc42cb - Browse repository at this point
Copy the full SHA 1bc42cbView commit details -
Configuration menu - View commit details
-
Copy full SHA for cd68a8c - Browse repository at this point
Copy the full SHA cd68a8cView commit details -
Configuration menu - View commit details
-
Copy full SHA for 3d5f7e3 - Browse repository at this point
Copy the full SHA 3d5f7e3View commit details -
Configuration menu - View commit details
-
Copy full SHA for 6ff1783 - Browse repository at this point
Copy the full SHA 6ff1783View commit details -
Merge pull request #49522 from timokau/youtube-dl-2018.10.29
youtube-dl: 2018.10.05 -> 2018.10.29
Configuration menu - View commit details
-
Copy full SHA for fdba693 - Browse repository at this point
Copy the full SHA fdba693View commit details -
Configuration menu - View commit details
-
Copy full SHA for e4bfc70 - Browse repository at this point
Copy the full SHA e4bfc70View commit details -
Merge pull request #48771 from arianvp/container-tweaks
nixos/containers: Introduce several tweaks to systemd-nspawn from upstream systemd
Configuration menu - View commit details
-
Copy full SHA for 553e0d8 - Browse repository at this point
Copy the full SHA 553e0d8View commit details -
Merge pull request #48183 from costrouc/costrouc/python-atomman
pythonPackages.atomman: init at 1.2.3
Configuration menu - View commit details
-
Copy full SHA for e0772e6 - Browse repository at this point
Copy the full SHA e0772e6View commit details -
Configuration menu - View commit details
-
Copy full SHA for 0f601b7 - Browse repository at this point
Copy the full SHA 0f601b7View commit details -
Configuration menu - View commit details
-
Copy full SHA for 98fd559 - Browse repository at this point
Copy the full SHA 98fd559View commit details -
Configuration menu - View commit details
-
Copy full SHA for 56b88fb - Browse repository at this point
Copy the full SHA 56b88fbView commit details
There are no files selected for viewing