Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 29624f6bb269
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 26537f537923
Choose a head ref
  • 9 commits
  • 41 files changed
  • 3 contributors

Commits on Sep 29, 2018

  1. systemd: Replace meta.available checks

    This sort of code breaks config.{allowBroken, allowUnsupportedSystem} =
    true by making them do unpredictable things.
    
    (cherry picked from commit fe7919f)
    dezgeg committed Sep 29, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    NeQuissimus Tim Steinbach
    Copy the full SHA
    6b1ebeb View commit details
  2. nix: Replace meta.available checks

    This sort of code breaks config.{allowBroken, allowUnsupportedSystem} =
    true by making them do unpredictable things.
    
    (cherry picked from commit cdeafe7)
    
    Conflicts:
    	pkgs/tools/package-management/nix/default.nix
    dezgeg committed Sep 29, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    NeQuissimus Tim Steinbach
    Copy the full SHA
    50da319 View commit details
  3. apparmor: Replace meta.available checks

    This sort of code breaks config.{allowBroken, allowUnsupportedSystem} =
    true by making them do unpredictable things.
    
    (cherry picked from commit 50d0360)
    dezgeg committed Sep 29, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    NeQuissimus Tim Steinbach
    Copy the full SHA
    2c3443e View commit details
  4. treewide: Replace meta.available checks in shouldUsePackages copypasta

    This reverts commit 79d8353.
    
    This sort of code breaks config.{allowBroken, allowUnsupportedSystem} =
    true by making them do unpredictable things.
    
    (cherry picked from commit 5e84926)
    dezgeg committed Sep 29, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    NeQuissimus Tim Steinbach
    Copy the full SHA
    ae63055 View commit details
  5. ghc: Replace meta.available checks for enableIntegerSimple

    This sort of code breaks config.{allowBroken, allowUnsupportedSystem} =
    true by making them do unpredictable things.
    
    (cherry picked from commit f4dd2fe)
    dezgeg committed Sep 29, 2018
    Copy the full SHA
    5330aba View commit details

Commits on Sep 30, 2018

  1. nixos/kexec: Replace meta.available checks

    This sort of code breaks config.{allowBroken, allowUnsupportedSystem} =
    true by making them do unpredictable things.
    
    [dezgeg: Also squash in the bugfix commit "nixos/kexec: Fix typo in meta.platforms" by aszlig]
    
    (cherry picked from commit 599c4df)
    (cherry picked from commit fd8bca4)
    dezgeg committed Sep 30, 2018
    Copy the full SHA
    aa0c7bd View commit details
  2. nix-daemon: only add channels dir to NIX_PATH if exists

    Per reviewer comment (thanks!).
    
    (cherry picked from commit 243e28b)
    dtzWill authored and grahamc committed Sep 30, 2018
    Copy the full SHA
    4c3a0ae View commit details
  3. Revert "Revert "doc: Update section about imperative containers""

    I fixed the problem.
    
    This reverts commit 29624f6.
    grahamc committed Sep 30, 2018
    Copy the full SHA
    4867086 View commit details
  4. docs: format

    grahamc committed Sep 30, 2018
    Copy the full SHA
    26537f5 View commit details
Showing with 1,906 additions and 1,653 deletions.
  1. +9 −9 nixos/doc/manual/administration/imperative-containers.xml
  2. +9 −10 nixos/doc/manual/configuration/linux-kernel.xml
  3. +4 −3 nixos/doc/manual/development/debugging-nixos-tests.xml
  4. +24 −23 nixos/doc/manual/installation/installing-behind-a-proxy.xml
  5. +2 −2 nixos/doc/manual/installation/installing.xml
  6. +2 −2 nixos/doc/manual/manual.xml
  7. +5 −5 nixos/doc/manual/release-notes/rl-1509.xml
  8. +148 −118 nixos/doc/manual/release-notes/rl-1809.xml
  9. +204 −115 nixos/modules/i18n/input-method/default.xml
  10. +43 −54 nixos/modules/programs/digitalbitbox/doc.xml
  11. +21 −16 nixos/modules/programs/plotinus.xml
  12. +106 −76 nixos/modules/programs/zsh/oh-my-zsh.xml
  13. +55 −49 nixos/modules/security/acme.xml
  14. +16 −21 nixos/modules/security/hidepid.xml
  15. +355 −266 nixos/modules/services/databases/foundationdb.xml
  16. +47 −47 nixos/modules/services/databases/postgresql.xml
  17. +37 −34 nixos/modules/services/desktops/flatpak.xml
  18. +394 −427 nixos/modules/services/editors/emacs.xml
  19. +65 −59 nixos/modules/services/misc/gitlab.xml
  20. +3 −1 nixos/modules/services/misc/nix-daemon.nix
  21. +100 −109 nixos/modules/services/misc/taskserver/doc.xml
  22. +39 −34 nixos/modules/services/misc/weechat.xml
  23. +100 −48 nixos/modules/services/monitoring/prometheus/exporters.xml
  24. +33 −36 nixos/modules/services/networking/dnscrypt-proxy.xml
  25. +63 −68 nixos/modules/services/web-apps/matomo-doc.xml
  26. +1 −1 nixos/modules/system/boot/kexec.nix
  27. +1 −1 pkgs/development/compilers/ghc/7.10.3.nix
  28. +1 −1 pkgs/development/compilers/ghc/8.0.2.nix
  29. +1 −1 pkgs/development/compilers/ghc/8.2.2.nix
  30. +1 −1 pkgs/development/compilers/ghc/8.4.3.nix
  31. +1 −1 pkgs/development/compilers/ghc/8.6.1.nix
  32. +1 −1 pkgs/development/compilers/ghc/head.nix
  33. +1 −1 pkgs/development/libraries/wiredtiger/default.nix
  34. +1 −1 pkgs/misc/jackaudio/default.nix
  35. +1 −1 pkgs/misc/jackaudio/jack1.nix
  36. +3 −3 pkgs/os-specific/linux/apparmor/default.nix
  37. +1 −1 pkgs/os-specific/linux/ffado/default.nix
  38. +3 −3 pkgs/os-specific/linux/systemd/default.nix
  39. +1 −1 pkgs/servers/shishi/default.nix
  40. +2 −1 pkgs/tools/filesystems/ceph/generic.nix
  41. +2 −2 pkgs/tools/package-management/nix/default.nix
18 changes: 9 additions & 9 deletions nixos/doc/manual/administration/imperative-containers.xml
Original file line number Diff line number Diff line change
@@ -73,8 +73,7 @@ Linux foo 3.4.82 #1-NixOS SMP Thu Mar 20 14:44:05 UTC 2014 x86_64 GNU/Linux
</para>

<para>
There are several ways to change the configuration of the container. First,
on the host, you can edit
To change the configuration of the container, you can edit
<literal>/var/lib/container/<replaceable>name</replaceable>/etc/nixos/configuration.nix</literal>,
and run
<screen>
@@ -87,8 +86,7 @@ Linux foo 3.4.82 #1-NixOS SMP Thu Mar 20 14:44:05 UTC 2014 x86_64 GNU/Linux
<xref linkend="opt-services.httpd.enable"/> = true;
<xref linkend="opt-services.httpd.adminAddr"/> = "foo@example.org";
<xref linkend="opt-networking.firewall.allowedTCPPorts"/> = [ 80 ];
'

'
# curl http://$(nixos-container show-ip foo)/
&lt;!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">…
</screen>
@@ -97,11 +95,13 @@ Linux foo 3.4.82 #1-NixOS SMP Thu Mar 20 14:44:05 UTC 2014 x86_64 GNU/Linux
</para>

<para>
Alternatively, you can change the configuration from within the container
itself by running <command>nixos-rebuild switch</command> inside the
container. Note that the container by default does not have a copy of the
NixOS channel, so you should run <command>nix-channel --update</command>
first.
Note that in previous versions of NixOS (17.09 and earlier) one could also
use all nix-related commands (like <command>nixos-rebuild switch</command>)
from inside the container. However, since the release of Nix 2.0 this is not
supported anymore. Supporting Nix commands inside the container might be
possible again in future versions. See
<link xlink:href="https://github.com/NixOS/nixpkgs/issues/40355">the github
issue</link> for tracking progress on this issue.
</para>

<para>
19 changes: 9 additions & 10 deletions nixos/doc/manual/configuration/linux-kernel.xml
Original file line number Diff line number Diff line change
@@ -84,18 +84,17 @@ nixpkgs.config.packageOverrides = pkgs:
allowImportFromDerivation = true;
};
]]></screen>

You can edit the config with this snippet (by default <command>make menuconfig</command> won't work
out of the box on nixos):
<screen><![CDATA[
You can edit the config with this snippet (by default <command>make
menuconfig</command> won't work out of the box on nixos):
<screen><![CDATA[
nix-shell -E 'with import <nixpkgs> {}; kernelToOverride.overrideAttrs (o: {nativeBuildInputs=o.nativeBuildInputs ++ [ pkgconfig ncurses ];})'
]]></screen>


or you can let nixpkgs generate the configuration.
Nixpkgs generates it via answering the interactive kernel utility <command>make config</command>.
The answers depend on parameters passed to <filename>pkgs/os-specific/linux/kernel/generic.nix</filename>
(which you can influence by overriding <literal>extraConfig, autoModules, modDirVersion, preferBuiltin, extraConfig</literal>).
or you can let nixpkgs generate the configuration. Nixpkgs generates it via
answering the interactive kernel utility <command>make config</command>. The
answers depend on parameters passed to
<filename>pkgs/os-specific/linux/kernel/generic.nix</filename> (which you
can influence by overriding <literal>extraConfig, autoModules,
modDirVersion, preferBuiltin, extraConfig</literal>).
<screen><![CDATA[
mptcp93.override ({
7 changes: 4 additions & 3 deletions nixos/doc/manual/development/debugging-nixos-tests.xml
Original file line number Diff line number Diff line change
@@ -26,11 +26,12 @@ nix-shell -p socat --run "socat STDIO,raw,echo=0,escape=0x11 UNIX:/tmp/nix-build
</programlisting>

<para>
You may need to find the correct path, replacing <literal>/tmp</literal>, <literal>*</literal> or <literal>machine</literal>.
You may need to find the correct path, replacing <literal>/tmp</literal>,
<literal>*</literal> or <literal>machine</literal>.
</para>

<para>
Press "enter" to open up console and login as "root". After you're done, press "ctrl-q" to exit the console.
Press "enter" to open up console and login as "root". After you're done,
press "ctrl-q" to exit the console.
</para>

</section>
47 changes: 24 additions & 23 deletions nixos/doc/manual/installation/installing-behind-a-proxy.xml
Original file line number Diff line number Diff line change
@@ -5,43 +5,44 @@
xml:id="sec-installing-behind-proxy">
<title>Installing behind a proxy</title>

<para>
<para>
To install NixOS behind a proxy, do the following before running
<literal>nixos-install</literal>.
</para>
<orderedlist numeration="arabic">
</para>

<orderedlist numeration="arabic">
<listitem>
<para>
Update proxy configuration in
<literal>/mnt/etc/nixos/configuration.nix</literal> to keep the
internet accessible after reboot.
</para>
<programlisting>
<para>
Update proxy configuration in
<literal>/mnt/etc/nixos/configuration.nix</literal> to keep the internet
accessible after reboot.
</para>
<programlisting>
networking.proxy.default = &quot;http://user:password@proxy:port/&quot;;
networking.proxy.noProxy = &quot;127.0.0.1,localhost,internal.domain&quot;;
</programlisting>
</listitem>
<listitem>
<para>
Setup the proxy environment variables in the shell where you are
running <literal>nixos-install</literal>.
</para>
<programlisting>
<para>
Setup the proxy environment variables in the shell where you are running
<literal>nixos-install</literal>.
</para>
<programlisting>
# proxy_url=&quot;http://user:password@proxy:port/&quot;
# export http_proxy=&quot;$proxy_url&quot;
# export HTTP_PROXY=&quot;$proxy_url&quot;
# export https_proxy=&quot;$proxy_url&quot;
# export HTTPS_PROXY=&quot;$proxy_url&quot;
</programlisting>
</listitem>
</orderedlist>
</orderedlist>

<note>
<para>
If you are switching networks with different proxy configurations, use the
<literal>nesting.clone</literal> option in
<literal>configuration.nix</literal> to switch proxies at runtime.
Refer to <xref linkend="ch-options" /> for more information.
</para>
</note>
<note>
<para>
If you are switching networks with different proxy configurations, use the
<literal>nesting.clone</literal> option in
<literal>configuration.nix</literal> to switch proxies at runtime. Refer to
<xref linkend="ch-options" /> for more information.
</para>
</note>
</section>
4 changes: 2 additions & 2 deletions nixos/doc/manual/installation/installing.xml
Original file line number Diff line number Diff line change
@@ -327,8 +327,8 @@ Retype new UNIX password: ***
<note>
<para>
For unattended installations, it is possible to use
<command>nixos-install --no-root-passwd</command>
in order to disable the password prompt entirely.
<command>nixos-install --no-root-passwd</command> in order to disable the
password prompt entirely.
</para>
</note>
</para>
4 changes: 2 additions & 2 deletions nixos/doc/manual/manual.xml
Original file line number Diff line number Diff line change
@@ -17,8 +17,8 @@
<para>
If you encounter problems, please report them on the
<literal
xlink:href="https://discourse.nixos.org">Discourse</literal>
or on the <link
xlink:href="https://discourse.nixos.org">Discourse</literal> or
on the <link
xlink:href="irc://irc.freenode.net/#nixos">
<literal>#nixos</literal> channel on Freenode</link>. Bugs should be
reported in
10 changes: 5 additions & 5 deletions nixos/doc/manual/release-notes/rl-1509.xml
Original file line number Diff line number Diff line change
@@ -435,11 +435,11 @@ system.autoUpgrade.enable = true;
<programlisting>
system.stateVersion = "14.12";
</programlisting>
The new option <option>system.stateVersion</option> ensures that
certain configuration changes that could break existing systems (such as
the <command>sshd</command> host key setting) will maintain compatibility
with the specified NixOS release. NixOps sets the state version of
existing deployments automatically.
The new option <option>system.stateVersion</option> ensures that certain
configuration changes that could break existing systems (such as the
<command>sshd</command> host key setting) will maintain compatibility with
the specified NixOS release. NixOps sets the state version of existing
deployments automatically.
</para>
</listitem>
<listitem>
Loading