Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 7d24cf8ea99c
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: c9e13806267f
Choose a head ref

Commits on Oct 8, 2018

  1. konqueror: init at 18.08

    colemickens committed Oct 8, 2018
    Copy the full SHA
    056c03a View commit details

Commits on Oct 15, 2018

  1. nixos/syncthing: move configuration to condigDir

    fixes #47513 following the upstream recommended settings:
    syncthing/syncthing#3434 (comment)
    rnhmjoj committed Oct 15, 2018
    Copy the full SHA
    16f6763 View commit details

Commits on Oct 16, 2018

  1. z3: 4.7.1 -> 4.8.1

    dtzWill committed Oct 16, 2018
    Copy the full SHA
    51e5111 View commit details

Commits on Oct 22, 2018

  1. nixos/containers: Introduce several tweaks to systemd-nspawn from ups…

    …tream systemd
    
    * Lets container@.service  be activated by machines.target instead of
      multi-user.target
    
      According to the systemd manpages, all containers that are registered
      by machinectl, should be inside machines.target for easy stopping
      and starting container units altogether
    
    * make sure container@.service and container.slice instances are
      actually located in machine.slice
    
      https://plus.google.com/112206451048767236518/posts/SYAueyXHeEX
      See original commit: NixOS/systemd@45d383a3b8
    
    * Enable Cgroup delegation for nixos-containers
    
      Delegate=yes should be set for container scopes where a systemd instance
      inside the container shall manage the hierarchies below its own cgroup
      and have access to all controllers.
    
      This is equivalent to enabling all accounting options on the systemd
      process inside the system container.  This means that systemd inside
      the container is responsible for managing Cgroup resources for
      unit files that enable accounting options inside.  Without this
      option, units that make use of cgroup features within system
      containers might misbehave
    
      See original commit: NixOS/systemd@a931ad47a8
    
      from the manpage:
        Turns on delegation of further resource control partitioning to
        processes of the unit. Units where this is enabled may create and
        manage their own private subhierarchy of control groups below the
        control group of the unit itself. For unprivileged services (i.e.
        those using the User= setting) the unit's control group will be made
        accessible to the relevant user. When enabled the service manager
        will refrain from manipulating control groups or moving processes
        below the unit's control group, so that a clear concept of ownership
        is established: the control group tree above the unit's control
        group (i.e. towards the root control group) is owned and managed by
        the service manager of the host, while the control group tree below
        the unit's control group is owned and managed by the unit itself.
        Takes either a boolean argument or a list of control group
        controller names. If true, delegation is turned on, and all
        supported controllers are enabled for the unit, making them
        available to the unit's processes for management. If false,
        delegation is turned off entirely (and no additional controllers are
        enabled). If set to a list of controllers, delegation is turned on,
        and the specified controllers are enabled for the unit. Note that
        additional controllers than the ones specified might be made
        available as well, depending on configuration of the containing
        slice unit or other units contained in it. Note that assigning the
        empty string will enable delegation, but reset the list of
        controllers, all assignments prior to this will have no effect.
        Defaults to false.
    
        Note that controller delegation to less privileged code is only safe
        on the unified control group hierarchy. Accordingly, access to the
        specified controllers will not be granted to unprivileged services
        on the legacy hierarchy, even when requested.
    
        The following controller names may be specified: cpu, cpuacct, io,
        blkio, memory, devices, pids. Not all of these controllers are
        available on all kernels however, and some are specific to the
        unified hierarchy while others are specific to the legacy hierarchy.
        Also note that the kernel might support further controllers, which
        aren't covered here yet as delegation is either not supported at all
        for them or not defined cleanly.
    arianvp committed Oct 22, 2018
    Copy the full SHA
    9f72791 View commit details

Commits on Oct 24, 2018

  1. Copy the full SHA
    7e81407 View commit details

Commits on Oct 25, 2018

  1. Copy the full SHA
    8b5a759 View commit details

Commits on Oct 26, 2018

  1. brlaser: fix install dir

    Fixes #49092
    symphorien committed Oct 26, 2018
    Copy the full SHA
    26ee8d6 View commit details

Commits on Oct 27, 2018

  1. nim: 0.18.0 -> 0.19.0

    - remove sqlite as dependency (I don't see why it's needed)
    - run checkPhase after installPhase (at least one test assumes the
    standard library in ../lib relative to the nim binary)
    - the broken tests pass now or don't exist anymore
    - two of the tests requiring network access pass now without network access
    - the tests in manyloc do not download dependencies and are passing now
    royneary committed Oct 27, 2018
    Copy the full SHA
    9bf79ad View commit details
  2. nim: don't hardcode gcc

    royneary committed Oct 27, 2018
    Copy the full SHA
    89d71c5 View commit details
  3. Copy the full SHA
    651c178 View commit details

Commits on Oct 28, 2018

  1. Copy the full SHA
    83a65a9 View commit details

Commits on Oct 29, 2018

  1. openjdk: 10.0.2 -> 11.0.1

    * the jre is no longer an official part of the jdk (jmod is
      recommended as a replacement when needing to create smaller runtime
      images)
    
    * darwin continues to use zulu from azul
    
    * apps that used 10 now use 11 (eclipse, bazel, josm)
    jerith666 committed Oct 29, 2018
    Copy the full SHA
    1bd7b98 View commit details
  2. Copy the full SHA
    a586c14 View commit details

Commits on Oct 30, 2018

  1. Copy the full SHA
    0cf2c6f View commit details
  2. Copy the full SHA
    7dd7190 View commit details
  3. Copy the full SHA
    1ac9d8e View commit details
  4. cudatoolkit, cudnn: many updates

    cudatoolkit_9_1: 9.1.85.1 -> 9.1.85.3
    cudatoolkit_9_2: init at 9.2.148.1
    cudatoolkit_9: 9.1.85.1 -> 9.2.148.1
    cudatoolkit_10, cudatoolkit_10_0: init at 10.0.130
    
    cudnn_cudatoolkit_9_0: 7.0.5 -> 7.3.0
    cudnn_cudatoolkit_9_1: init at 7.1.3
    cudnn_cudatoolkit_9_2: init at 7.2.1
    cudnn_cudatoolkit_9: 7.0.5 (9.1) -> 7.3.1 (9.2)
    cudnn_cudatoolkit_10, cudnn_cudatoolkit_10_0: init at 7.3.1
    Synthetica9 committed Oct 30, 2018
    Copy the full SHA
    4cfeb9d View commit details
  5. nixos/ddclient: fix #49258

    typetetris committed Oct 30, 2018
    Copy the full SHA
    1b4e310 View commit details
  6. thunderbolt: cleanup

    dtzWill committed Oct 30, 2018
    Copy the full SHA
    5d61690 View commit details

Commits on Oct 31, 2018

  1. Copy the full SHA
    ea1024e View commit details
  2. easysnap: init at 2018-10-28

    sjau committed Oct 31, 2018
    Copy the full SHA
    df51c5e View commit details
  3. fstrcmp: init at 0.7

    sephalon committed Oct 31, 2018
    Copy the full SHA
    beeaeba View commit details
  4. Copy the full SHA
    b786a47 View commit details
  5. nim: update nodejs-slim

    royneary committed Oct 31, 2018
    Copy the full SHA
    9dcdf5a View commit details
  6. Copy the full SHA
    43f6d9a View commit details
  7. LTS Haskell 12.16

    peti committed Oct 31, 2018
    Copy the full SHA
    771849a View commit details
  8. hackage-packages.nix: automatic Haskell package set update

    This update was generated by hackage2nix v2.11.1-2-g57c4f0f from Hackage revision
    commercialhaskell/all-cabal-hashes@b6545b2.
    peti committed Oct 31, 2018
    Copy the full SHA
    5d18129 View commit details
  9. Copy the full SHA
    b376d55 View commit details
  10. Copy the full SHA
    1bc42cb View commit details
  11. Copy the full SHA
    cd68a8c View commit details
  12. Copy the full SHA
    3d5f7e3 View commit details
  13. Copy the full SHA
    8c717a5 View commit details
  14. Copy the full SHA
    cd1ff3b View commit details
  15. Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    6ff1783 View commit details
  16. Merge pull request #49522 from timokau/youtube-dl-2018.10.29

    youtube-dl: 2018.10.05 -> 2018.10.29
    timokau authored Oct 31, 2018
    Copy the full SHA
    fdba693 View commit details
  17. Merge pull request #49330 from sephalon/fstrcmp

    fstrcmp: init at 0.7
    joachifm authored Oct 31, 2018
    Copy the full SHA
    e4bfc70 View commit details
  18. systemd: 239 -> 239.20181031

    Fixes CVE-2018-15688 and updates latest upstream stable v239 branch.
    
    See NixOS/systemd#24 for details.
    
    Co-authored-by: Andreas Rammhold <andreas@rammhold.de>
    fpletz and andir committed Oct 31, 2018

    Verified

    This commit was signed with the committer’s verified signature.
    veprbl Dmitry Kalinkin
    Copy the full SHA
    a7912ec View commit details
  19. gitAndTools.grv: 0.2.0 -> 0.3.0

    Remove 'update_latest_release.go' so we don't try to build it
    since this fails due to unmet dependencies.
    
    AFAICT this utility is only meant for developer use anyway,
    and helps manage/create new github releases for the project.
    dtzWill committed Oct 31, 2018
    Copy the full SHA
    8798de6 View commit details
  20. Merge pull request #48771 from arianvp/container-tweaks

    nixos/containers: Introduce several tweaks to systemd-nspawn from upstream systemd
    Mic92 authored Oct 31, 2018
    Copy the full SHA
    553e0d8 View commit details
  21. Merge pull request #48183 from costrouc/costrouc/python-atomman

    pythonPackages.atomman: init at 1.2.3
    dotlambda authored Oct 31, 2018
    Copy the full SHA
    e0772e6 View commit details
  22. wolf-shaper: init at 0.1.6 (#49087)

    magnetophon authored and xeji committed Oct 31, 2018
    Copy the full SHA
    0f601b7 View commit details
  23. Copy the full SHA
    98fd559 View commit details
  24. gxplugins-lv2: init at 0.5 (#48847)

    magnetophon authored and xeji committed Oct 31, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    alyssais Alyssa Ross
    Copy the full SHA
    56b88fb View commit details
  25. python3Packages.aioh2: init at 0.2.2

    Tests skipped due to decentfox/aioh2#17.
    alyssais committed Oct 31, 2018
    Copy the full SHA
    1f1bd5c View commit details
  26. doh-proxy: init at 0.0.8

    alyssais committed Oct 31, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    globin Robin Gloster
    Copy the full SHA
    39edfe5 View commit details
  27. python3Packages.gplaycli: 3.21 -> 3.25 (#49521)

    The version 3.21 isn't compatible with our currently packaged
    `pythonPackages.gpapi` which is now at version 0.4.3.
    
    See https://hydra.nixos.org/build/83154918
    Ma27 authored and xeji committed Oct 31, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    globin Robin Gloster
    Copy the full SHA
    c6fc3bb View commit details
  28. hugo: 0.49.2 -> 0.50 (#49525)

    Daniël de Kok authored and xeji committed Oct 31, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    globin Robin Gloster
    Copy the full SHA
    f9a8abe View commit details
  29. smartgithg: 18.1.4 -> 18.1.5 (#49527)

    Bugfix version
    baracoder authored and xeji committed Oct 31, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    globin Robin Gloster
    Copy the full SHA
    a920279 View commit details
  30. saml2aws: 2.6.1 -> 2.10.0

    Tristan Helmich (omniIT) committed Oct 31, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    globin Robin Gloster
    Copy the full SHA
    41880ae View commit details
  31. eternal-terminal: 5.1.7 -> 5.1.8.

    qolii authored and xeji committed Oct 31, 2018

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    globin Robin Gloster
    Copy the full SHA
    30c9294 View commit details
Showing with 6,748 additions and 4,308 deletions.
  1. +6 −0 .github/CODEOWNERS
  2. +4 −0 lib/licenses.nix
  3. +1 −0 lib/systems/platforms.nix
  4. +5 −0 maintainers/maintainer-list.nix
  5. +10 −0 nixos/doc/manual/release-notes/rl-1903.xml
  6. +2 −0 nixos/modules/misc/ids.nix
  7. +1 −0 nixos/modules/module-list.nix
  8. +2 −2 nixos/modules/programs/shell.nix
  9. +4 −1 nixos/modules/rename.nix
  10. +1 −0 nixos/modules/services/misc/home-assistant.nix
  11. +154 −0 nixos/modules/services/monitoring/kapacitor.nix
  12. +2 −0 nixos/modules/services/networking/chrony.nix
  13. +2 −0 nixos/modules/services/networking/ntpd.nix
  14. +13 −1 nixos/modules/services/networking/syncthing.nix
  15. +2 −1 nixos/modules/services/networking/zerotierone.nix
  16. +1 −0 nixos/modules/system/activation/activation-script.nix
  17. +1 −0 nixos/modules/system/boot/systemd-nspawn.nix
  18. +6 −1 nixos/modules/virtualisation/containers.nix
  19. +6 −4 nixos/tests/chromium.nix
  20. +30 −0 pkgs/applications/audio/avldrums-lv2/default.nix
  21. +29 −0 pkgs/applications/audio/gxplugins-lv2/default.nix
  22. +49 −0 pkgs/applications/audio/hybridreverb2/default.nix
  23. +47 −0 pkgs/applications/audio/wolf-shaper/default.nix
  24. +3 −3 pkgs/applications/display-managers/lightdm-mini-greeter/default.nix
  25. +3 −3 pkgs/applications/editors/android-studio/default.nix
  26. +4 −4 pkgs/applications/editors/atom/default.nix
  27. +1 −0 pkgs/applications/kde/default.nix
  28. +20 −0 pkgs/applications/kde/konqueror.nix
  29. +71 −0 pkgs/applications/misc/gImageReader/default.nix
  30. +3 −10 pkgs/applications/misc/hugo/default.nix
  31. +8 −8 pkgs/applications/misc/hugo/deps.nix
  32. +3 −3 pkgs/applications/misc/josm/default.nix
  33. +9 −4 pkgs/applications/misc/polybar/default.nix
  34. +3 −2 pkgs/applications/misc/urh/default.nix
  35. +2 −0 pkgs/applications/networking/browsers/chromium/common.nix
  36. +2 −2 pkgs/applications/networking/instant-messengers/signal-desktop/default.nix
  37. +5 −3 pkgs/applications/networking/p2p/tribler/default.nix
  38. +4 −4 pkgs/applications/networking/protonmail-bridge/default.nix
  39. +6 −3 pkgs/applications/science/biology/mosdepth/default.nix
  40. +2 −2 pkgs/applications/science/electronics/kicad/default.nix
  41. +3 −3 pkgs/applications/science/logic/z3/default.nix
  42. +4 −4 pkgs/applications/science/misc/simgrid/default.nix
  43. +6 −2 pkgs/applications/version-management/git-and-tools/grv/default.nix
  44. +5 −4 pkgs/applications/version-management/git-and-tools/hub/default.nix
  45. +2 −2 pkgs/applications/version-management/smartgithg/default.nix
  46. +61 −8 pkgs/development/arduino/platformio/core.nix
  47. +2 −2 pkgs/development/compilers/closure/default.nix
  48. +35 −5 pkgs/development/compilers/cudatoolkit/default.nix
  49. +20 −21 pkgs/development/compilers/nim/default.nix
  50. +20 −50 pkgs/development/compilers/openjdk/{10.nix → 11.nix}
  51. +2 −2 pkgs/development/compilers/openjdk/bootstrap.nix
  52. +7 −8 pkgs/development/compilers/openjdk/darwin/{10.nix → 11.nix}
  53. +0 −156 pkgs/development/compilers/oraclejdk/jdk10-linux.nix
  54. +6 −7 pkgs/development/compilers/sbcl/default.nix
  55. +22 −21 pkgs/development/compilers/swift/default.nix
  56. +1 −1 pkgs/development/compilers/swift/patches/0001-build-presets-linux-don-t-require-using-Ninja.patch
  57. +1 −1 pkgs/development/compilers/swift/patches/0002-build-presets-linux-allow-custom-install-prefix.patch
  58. +1 −1 pkgs/development/compilers/swift/patches/0004-build-presets-linux-plumb-extra-cmake-options.patch
  59. +2 −2 pkgs/development/compilers/swift/patches/build-script-pax.patch
  60. +13 −0 pkgs/development/compilers/swift/patches/glibc-arch-headers.patch
  61. +13 −0 pkgs/development/compilers/swift/patches/llvm-include-dirs.patch
  62. +1 −1 pkgs/development/compilers/swift/purity.patch
  63. +0 −15 pkgs/development/haskell-modules/configuration-ghc-8.6.x.nix
  64. +21 −14 pkgs/development/haskell-modules/configuration-hackage2nix.yaml
  65. +1,382 −511 pkgs/development/haskell-modules/hackage-packages.nix
  66. +2 −2 pkgs/development/interpreters/perl/default.nix
  67. +31 −0 pkgs/development/libraries/fstrcmp/default.nix
  68. +4 −2 pkgs/development/libraries/imlib/default.nix
  69. +4 −3 pkgs/development/libraries/incrtcl/default.nix
  70. +4 −3 pkgs/development/libraries/jama/default.nix
  71. +1 −0 pkgs/development/libraries/jasper/default.nix
  72. +4 −3 pkgs/development/libraries/java/dbus-java/default.nix
  73. +5 −4 pkgs/development/libraries/java/gwt-dragdrop/default.nix
  74. +5 −4 pkgs/development/libraries/java/gwt-widgets/default.nix
  75. +4 −3 pkgs/development/libraries/java/hsqldb/default.nix
  76. +4 −2 pkgs/development/libraries/java/httpunit/default.nix
  77. +5 −2 pkgs/development/libraries/java/jdom/default.nix
  78. +4 −3 pkgs/development/libraries/java/libmatthew-java/default.nix
  79. +4 −2 pkgs/development/libraries/java/lucene/default.nix
  80. +4 −2 pkgs/development/libraries/java/mockobjects/default.nix
  81. +3 −3 pkgs/development/libraries/java/saxon/default.nix
  82. +7 −6 pkgs/development/libraries/leveldb/default.nix
  83. +9 −13 pkgs/development/libraries/lightstep-tracer-cpp/default.nix
  84. +2 −2 pkgs/development/libraries/nlohmann_json/default.nix
  85. +13 −6 pkgs/development/libraries/nlopt/default.nix
  86. +2 −2 pkgs/development/libraries/openh264/default.nix
  87. +39 −0 pkgs/development/libraries/openscenegraph/3.4.0.nix
  88. +3 −3 pkgs/development/libraries/openscenegraph/default.nix
  89. +28 −12 pkgs/development/libraries/science/math/cudnn/default.nix
  90. +3 −4 pkgs/development/libraries/simgear/default.nix
  91. +2 −2 pkgs/development/libraries/webkitgtk/2.22.nix
  92. +4 −0 pkgs/development/node-packages/default-v8.nix
  93. +23 −0 pkgs/development/python-modules/aioh2/default.nix
  94. +34 −0 pkgs/development/python-modules/aiohttp-remotes/default.nix
  95. +40 −0 pkgs/development/python-modules/atomman/default.nix
  96. +27 −0 pkgs/development/python-modules/datamodeldict/default.nix
  97. +4 −4 pkgs/development/python-modules/gplaycli/default.nix
  98. +24 −0 pkgs/development/python-modules/numericalunits/default.nix
  99. +23 −0 pkgs/development/python-modules/priority/default.nix
  100. +2 −2 pkgs/development/python-modules/pyzmq/default.nix
  101. +28 −0 pkgs/development/python-modules/trueskill/default.nix
  102. +49 −0 pkgs/development/python-modules/zstd/default.nix
  103. +161 −137 pkgs/development/r-modules/bioc-annotation-packages.nix
  104. +92 −72 pkgs/development/r-modules/bioc-experiment-packages.nix
  105. +819 −720 pkgs/development/r-modules/bioc-packages.nix
  106. +2,734 −2,168 pkgs/development/r-modules/cran-packages.nix
  107. +9 −11 pkgs/development/r-modules/default.nix
  108. +2 −2 pkgs/development/tools/misc/strace/default.nix
  109. +4 −1 pkgs/development/tools/nrpl/default.nix
  110. +2 −2 pkgs/development/tools/yarn/default.nix
  111. +4 −4 pkgs/games/flightgear/default.nix
  112. +6 −0 pkgs/games/speed-dreams/default.nix
  113. +1 −1 pkgs/misc/cups/drivers/brlaser/default.nix
  114. +2 −6 pkgs/misc/drivers/sc-controller/default.nix
  115. +35 −0 pkgs/os-specific/linux/dropwatch/default.nix
  116. +3 −3 pkgs/os-specific/linux/kernel/linux-hardkernel-4.14.nix
  117. +0 −23 pkgs/os-specific/linux/pmtools/default.nix
  118. +4 −3 pkgs/os-specific/linux/systemd/default.nix
  119. +6 −15 pkgs/os-specific/linux/thunderbolt/default.nix
  120. +22 −0 pkgs/servers/dns/doh-proxy/default.nix
  121. +2 −2 pkgs/servers/dns/knot-resolver/default.nix
  122. +8 −5 pkgs/servers/http/apache-modules/tomcat-connectors/default.nix
  123. +2 −2 pkgs/servers/icecast/default.nix
  124. +2 −2 pkgs/servers/monitoring/kapacitor/default.nix
  125. +11 −11 pkgs/stdenv/linux/make-bootstrap-tools.nix
  126. +0 −6 pkgs/tools/X11/virtualgl/lib.nix
  127. +31 −0 pkgs/tools/backup/easysnap/default.nix
  128. +4 −4 pkgs/tools/graphics/vulkan-tools/default.nix
  129. +5 −2 pkgs/tools/misc/youtube-dl/default.nix
  130. +3 −3 pkgs/tools/networking/eternal-terminal/default.nix
  131. +22 −10 pkgs/tools/networking/ntp/seccomp.patch
  132. +3 −3 pkgs/tools/package-management/cargo-tree/default.nix
  133. +2 −2 pkgs/tools/security/saml2aws/default.nix
  134. +1 −0 pkgs/top-level/aliases.nix
  135. +47 −33 pkgs/top-level/all-packages.nix
  136. +2 −2 pkgs/top-level/dotnet-packages.nix
  137. +4 −4 pkgs/top-level/perl-packages.nix
  138. +19 −13 pkgs/top-level/python-packages.nix
  139. +4 −4 pkgs/top-level/release-cross.nix
  140. +59 −36 pkgs/top-level/release-lib.nix
6 changes: 6 additions & 0 deletions .github/CODEOWNERS
Original file line number Diff line number Diff line change
@@ -97,3 +97,9 @@
/pkgs/desktops/plasma-5 @ttuegel
/pkgs/development/libraries/kde-frameworks @ttuegel
/pkgs/development/libraries/qt-5 @ttuegel

# PostgreSQL and related stuff
/pkgs/servers/sql/postgresql @thoughtpolice
/nixos/modules/services/databases/postgresql.xml @thoughtpolice
/nixos/modules/services/databases/postgresql.nix @thoughtpolice
/nixos/tests/postgresql.nix @thoughtpolice
4 changes: 4 additions & 0 deletions lib/licenses.nix
Original file line number Diff line number Diff line change
@@ -400,6 +400,10 @@ lib.mapAttrs (n: v: v // { shortName = n; }) rec {
free = false;
};

jasper = spdx {
spdxId = "JasPer-2.0";
fullName = "JasPer License";
};

lgpl2 = spdx {
spdxId = "LGPL-2.0";
1 change: 1 addition & 0 deletions lib/systems/platforms.nix
Original file line number Diff line number Diff line change
@@ -471,6 +471,7 @@ rec {
"x86_64-linux" = pc64;
"armv5tel-linux" = sheevaplug;
"armv6l-linux" = raspberrypi;
"armv7a-linux" = armv7l-hf-multiplatform;
"armv7l-linux" = armv7l-hf-multiplatform;
"aarch64-linux" = aarch64-multiplatform;
"mipsel-linux" = fuloong2f_n32;
5 changes: 5 additions & 0 deletions maintainers/maintainer-list.nix
Original file line number Diff line number Diff line change
@@ -3910,6 +3910,11 @@
github = "sjagoe";
name = "Simon Jagoe";
};
sjau = {
email = "nixos@sjau.ch";
github = "sjau";
name = "Stephan Jau";
};
sjmackenzie = {
email = "setori88@gmail.com";
github = "sjmackenzie";
10 changes: 10 additions & 0 deletions nixos/doc/manual/release-notes/rl-1903.xml
Original file line number Diff line number Diff line change
@@ -97,6 +97,16 @@
start org.nixos.nix-daemon</command>.
</para>
</listitem>
<listitem>
<para>
The Syncthing state and configuration data has been moved from
<varname>services.syncthing.dataDir</varname> to the newly defined
<varname>services.syncthing.configDir</varname>, which default to
<literal>/var/lib/syncthing/.config/syncthing</literal>.
This change makes possible to share synced directories using ACLs
without Syncthing resetting the permission on every start.
</para>
</listitem>
</itemizedlist>
</listitem>
<listitem>
2 changes: 2 additions & 0 deletions nixos/modules/misc/ids.nix
Original file line number Diff line number Diff line change
@@ -332,6 +332,7 @@
lirc = 305;
lidarr = 306;
slurm = 307;
kapacitor = 308;

# When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399!

@@ -624,6 +625,7 @@
lirc = 305;
lidarr = 306;
slurm = 307;
kapacitor = 308;

# When adding a gid, make sure it doesn't match an existing
# uid. Users and groups with the same name should have equal
1 change: 1 addition & 0 deletions nixos/modules/module-list.nix
Original file line number Diff line number Diff line change
@@ -433,6 +433,7 @@
./services/monitoring/hdaps.nix
./services/monitoring/heapster.nix
./services/monitoring/incron.nix
./services/monitoring/kapacitor.nix
./services/monitoring/longview.nix
./services/monitoring/monit.nix
./services/monitoring/munin.nix
4 changes: 2 additions & 2 deletions nixos/modules/programs/shell.nix
Original file line number Diff line number Diff line change
@@ -13,7 +13,7 @@ with lib;
# Set up the per-user profile.
mkdir -m 0755 -p "$NIX_USER_PROFILE_DIR"
if [ "$(stat --printf '%u' "$NIX_USER_PROFILE_DIR")" != "$(id -u)" ]; then
echo "WARNING: bad ownership on $NIX_USER_PROFILE_DIR, should be $(id -u)" >&2
echo "WARNING: the per-user profile dir $NIX_USER_PROFILE_DIR should belong to user id $(id -u)" >&2
fi
if [ -w "$HOME" ]; then
@@ -35,7 +35,7 @@ with lib;
NIX_USER_GCROOTS_DIR="/nix/var/nix/gcroots/per-user/$USER"
mkdir -m 0755 -p "$NIX_USER_GCROOTS_DIR"
if [ "$(stat --printf '%u' "$NIX_USER_GCROOTS_DIR")" != "$(id -u)" ]; then
echo "WARNING: bad ownership on $NIX_USER_GCROOTS_DIR, should be $(id -u)" >&2
echo "WARNING: the per-user gcroots dir $NIX_USER_GCROOTS_DIR should belong to user id $(id -u)" >&2
fi
# Set up a default Nix expression from which to install stuff.
5 changes: 4 additions & 1 deletion nixos/modules/rename.nix
Original file line number Diff line number Diff line change
@@ -28,7 +28,10 @@ with lib;
(config:
let enabled = getAttrFromPath [ "services" "printing" "gutenprint" ] config;
in if enabled then [ pkgs.gutenprint ] else [ ]))
(mkRenamedOptionModule [ "services" "ddclient" "domain" ] [ "services" "ddclient" "domains" ])
(mkChangedOptionModule [ "services" "ddclient" "domain" ] [ "services" "ddclient" "domains" ]
(config:
let value = getAttrFromPath [ "services" "ddclient" "domain" ] config;
in if value != "" then [ value ] else []))
(mkRemovedOptionModule [ "services" "ddclient" "homeDir" ] "")
(mkRenamedOptionModule [ "services" "elasticsearch" "host" ] [ "services" "elasticsearch" "listenAddress" ])
(mkRenamedOptionModule [ "services" "graphite" "api" "host" ] [ "services" "graphite" "api" "listenAddress" ])
1 change: 1 addition & 0 deletions nixos/modules/services/misc/home-assistant.nix
Original file line number Diff line number Diff line change
@@ -157,6 +157,7 @@ in {
Restart = "on-failure";
ProtectSystem = "strict";
ReadWritePaths = "${cfg.configDir}";
KillSignal = "SIGINT";
PrivateTmp = true;
RemoveIPC = true;
};
154 changes: 154 additions & 0 deletions nixos/modules/services/monitoring/kapacitor.nix
Original file line number Diff line number Diff line change
@@ -0,0 +1,154 @@
{ options, config, lib, pkgs, ... }:

with lib;

let
cfg = config.services.kapacitor;

kapacitorConf = pkgs.writeTextFile {
name = "kapacitord.conf";
text = ''
hostname="${config.networking.hostName}"
data_dir="${cfg.dataDir}"
[http]
bind-address = "${cfg.bind}:${toString cfg.port}"
log-enabled = false
auth-enabled = false
[task]
dir = "${cfg.dataDir}/tasks"
snapshot-interval = "${cfg.taskSnapshotInterval}"
[replay]
dir = "${cfg.dataDir}/replay"
[storage]
boltdb = "${cfg.dataDir}/kapacitor.db"
${optionalString (cfg.loadDirectory != null) ''
[load]
enabled = true
dir = "${cfg.loadDirectory}"
''}
${optionalString (cfg.defaultDatabase.enable) ''
[[influxdb]]
name = "default"
enabled = true
default = true
urls = [ "${cfg.defaultDatabase.url}" ]
username = "${cfg.defaultDatabase.username}"
password = "${cfg.defaultDatabase.password}"
''}
${cfg.extraConfig}
'';
};
in
{
options.services.kapacitor = {
enable = mkEnableOption "kapacitor";

dataDir = mkOption {
type = types.path;
example = "/var/lib/kapacitor";
default = "/var/lib/kapacitor";
description = "Location where Kapacitor stores its state";
};

port = mkOption {
type = types.int;
default = 9092;
description = "Port of Kapacitor";
};

bind = mkOption {
type = types.str;
default = "";
example = literalExample "0.0.0.0";
description = "Address to bind to. The default is to bind to all addresses";
};

extraConfig = mkOption {
description = "These lines go into kapacitord.conf verbatim.";
default = "";
type = types.lines;
};

user = mkOption {
type = types.str;
default = "kapacitor";
description = "User account under which Kapacitor runs";
};

group = mkOption {
type = types.str;
default = "kapacitor";
description = "Group under which Kapacitor runs";
};

taskSnapshotInterval = mkOption {
type = types.str;
description = "Specifies how often to snapshot the task state (in InfluxDB time units)";
default = "1m0s";
example = "1m0s";
};

loadDirectory = mkOption {
type = types.nullOr types.path;
description = "Directory where to load services from, such as tasks, templates and handlers (or null to disable service loading on startup)";
default = null;
};

defaultDatabase = {
enable = mkEnableOption "kapacitor.defaultDatabase";

url = mkOption {
description = "The URL to an InfluxDB server that serves as the default database";
example = "http://localhost:8086";
type = types.string;
};

username = mkOption {
description = "The username to connect to the remote InfluxDB server";
type = types.string;
};

password = mkOption {
description = "The password to connect to the remote InfluxDB server";
type = types.string;
};
};
};

config = mkIf cfg.enable {
environment.systemPackages = [ pkgs.kapacitor ];

systemd.services.kapacitor = {
description = "Kapacitor Real-Time Stream Processing Engine";
wantedBy = [ "multi-user.target" ];
after = [ "networking.target" ];
serviceConfig = {
ExecStart = "${pkgs.kapacitor}/bin/kapacitord -config ${kapacitorConf}";
User = "kapacitor";
Group = "kapacitor";
PermissionsStartOnly = true;
};
preStart = ''
mkdir -p ${cfg.dataDir}
chown ${cfg.user}:${cfg.group} ${cfg.dataDir}
'';
};

users.users.kapacitor = {
uid = config.ids.uids.kapacitor;
description = "Kapacitor user";
home = cfg.dataDir;
};

users.groups.kapacitor = {
gid = config.ids.gids.kapacitor;
};
};
}
2 changes: 2 additions & 0 deletions nixos/modules/services/networking/chrony.nix
Original file line number Diff line number Diff line change
@@ -93,6 +93,8 @@ in

services.timesyncd.enable = mkForce false;

systemd.services.systemd-timedated.environment = { SYSTEMD_TIMEDATED_NTP_SERVICES = "chronyd.service"; };

systemd.services.chronyd =
{ description = "chrony NTP daemon";

2 changes: 2 additions & 0 deletions nixos/modules/services/networking/ntpd.nix
Original file line number Diff line number Diff line change
@@ -67,6 +67,8 @@ in
environment.systemPackages = [ pkgs.ntp ];
services.timesyncd.enable = mkForce false;

systemd.services.systemd-timedated.environment = { SYSTEMD_TIMEDATED_NTP_SERVICES = "ntpd.service"; };

users.users = singleton
{ name = ntpUser;
uid = config.ids.uids.ntp;
14 changes: 13 additions & 1 deletion nixos/modules/services/networking/syncthing.nix
Original file line number Diff line number Diff line change
@@ -62,9 +62,21 @@ in {
dataDir = mkOption {
type = types.path;
default = "/var/lib/syncthing";
description = ''
Path where synced directories will exist.
'';
};

configDir = mkOption {
type = types.path;
description = ''
Path where the settings and keys will exist.
'';
default =
let
nixos = config.system.stateVersion;
cond = versionAtLeast nixos "19.03";
in cfg.dataDir + (optionalString cond "/.config/syncthing");
};

openDefaultPorts = mkOption {
@@ -144,7 +156,7 @@ in {
${cfg.package}/bin/syncthing \
-no-browser \
-gui-address=${cfg.guiAddress} \
-home=${cfg.dataDir}
-home=${cfg.configDir}
'';
};
};
3 changes: 2 additions & 1 deletion nixos/modules/services/networking/zerotierone.nix
Original file line number Diff line number Diff line change
@@ -39,7 +39,8 @@ in
systemd.services.zerotierone = {
description = "ZeroTierOne";
path = [ cfg.package ];
after = [ "network.target" ];
bindsTo = [ "network-online.target" ];
after = [ "network-online.target" ];
wantedBy = [ "multi-user.target" ];
preStart = ''
mkdir -p /var/lib/zerotier-one/networks.d
1 change: 1 addition & 0 deletions nixos/modules/system/activation/activation-script.nix
Original file line number Diff line number Diff line change
@@ -22,6 +22,7 @@ let
gnugrep
findutils
getent
stdenv.cc.libc # nscd in update-users-groups.pl
shadow
nettools # needed for hostname
utillinux # needed for mount and mountpoint
1 change: 1 addition & 0 deletions nixos/modules/system/boot/systemd-nspawn.nix
Original file line number Diff line number Diff line change
@@ -112,6 +112,7 @@ in {

environment.etc."systemd/nspawn".source = generateUnits "nspawn" units [] [];

systemd.targets."multi-user".wants = [ "machines.target "];
};

}
7 changes: 6 additions & 1 deletion nixos/modules/virtualisation/containers.nix
Original file line number Diff line number Diff line change
@@ -243,6 +243,9 @@ let

Restart = "on-failure";

Slice = "machine.slice";
Delegate = true;

# Hack: we don't want to kill systemd-nspawn, since we call
# "machinectl poweroff" in preStop to shut down the
# container cleanly. But systemd requires sending a signal
@@ -657,6 +660,8 @@ in
serviceConfig = serviceDirectives dummyConfig;
};
in {
systemd.targets."multi-user".wants = [ "machines.target" ];

systemd.services = listToAttrs (filter (x: x.value != null) (
# The generic container template used by imperative containers
[{ name = "container@"; value = unit; }]
@@ -680,7 +685,7 @@ in
} // (
if config.autoStart then
{
wantedBy = [ "multi-user.target" ];
wantedBy = [ "machines.target" ];
wants = [ "network.target" ];
after = [ "network.target" ];
restartTriggers = [ config.path ];
Loading