Skip to content

Commit

Permalink
Merge branch 'master' into staging
Browse files Browse the repository at this point in the history
  • Loading branch information
vcunat committed Dec 15, 2017
2 parents 774559a + b256afa commit 24d81d6
Show file tree
Hide file tree
Showing 170 changed files with 8,581 additions and 8,016 deletions.
16 changes: 8 additions & 8 deletions doc/languages-frameworks/haskell.md
Expand Up @@ -777,14 +777,14 @@ to find out the store path of the system's zlib library. Now, you can
stack --extra-lib-dirs=/nix/store/alsvwzkiw4b7ip38l4nlfjijdvg3fvzn-zlib-1.2.8/lib build
```

Typically, you'll need `--extra-include-dirs` as well. It's possible
to add those flag to the project's `stack.yaml` or your user's
global `~/.stack/global/stack.yaml` file so that you don't have to
specify them manually every time. But again, you're likely better off
using Stack's Nix support instead.

The same thing applies to `cabal configure`, of course, if you're
building with `cabal-install` instead of Stack.
Typically, you'll need `--extra-include-dirs` as well. It's possible
to add those flag to the project's `stack.yaml` or your user's
global `~/.stack/global/stack.yaml` file so that you don't have to
specify them manually every time. But again, you're likely better off
using Stack's Nix support instead.

The same thing applies to `cabal configure`, of course, if you're
building with `cabal-install` instead of Stack.

### Creating statically linked binaries

Expand Down
1 change: 1 addition & 0 deletions lib/maintainers.nix
Expand Up @@ -286,6 +286,7 @@
iblech = "Ingo Blechschmidt <iblech@speicherleck.de>";
igsha = "Igor Sharonov <igor.sharonov@gmail.com>";
ikervagyok = "Balázs Lengyel <ikervagyok@gmail.com>";
ilya-kolpakov = "Ilya Kolpakov <ilya.kolpakov@gmail.com>";
infinisil = "Silvan Mosberger <infinisil@icloud.com>";
ironpinguin = "Michele Catalano <michele@catalano.de>";
ivan-tkatchev = "Ivan Tkatchev <tkatchev@gmail.com>";
Expand Down
2 changes: 1 addition & 1 deletion nixos/lib/make-squashfs.nix
Expand Up @@ -36,7 +36,7 @@ stdenv.mkDerivation {
hasBadPaths=1
fi
if [ "$mode" != 444 ] && [ "$mode" != 555 ]; then
echo "Store path '$path' has invalid permissions."
echo "Store path '$path' has invalid permissions ($mode)."
hasBadPaths=1
fi
done
Expand Down
8 changes: 4 additions & 4 deletions nixos/modules/misc/ids.nix
Expand Up @@ -281,8 +281,8 @@
stanchion = 262;
riak-cs = 263;
infinoted = 264;
keystone = 265;
glance = 266;
# keystone = 265; # unused, removed 2017-12-13
# glance = 266; # unused, removed 2017-12-13
couchpotato = 267;
gogs = 268;
pdns-recursor = 269;
Expand Down Expand Up @@ -551,8 +551,8 @@
stanchion = 262;
riak-cs = 263;
infinoted = 264;
keystone = 265;
glance = 266;
# keystone = 265; # unused, removed 2017-12-13
# glance = 266; # unused, removed 2017-12-13
couchpotato = 267;
gogs = 268;
kresd = 270;
Expand Down
3 changes: 1 addition & 2 deletions nixos/modules/module-list.nix
Expand Up @@ -354,6 +354,7 @@
./services/misc/taskserver
./services/misc/tzupdate.nix
./services/misc/uhub.nix
./services/misc/xmr-stak.nix
./services/misc/zookeeper.nix
./services/monitoring/apcupsd.nix
./services/monitoring/arbtt.nix
Expand Down Expand Up @@ -748,6 +749,4 @@
./virtualisation/vmware-guest.nix
./virtualisation/xen-dom0.nix
./virtualisation/xe-guest-utilities.nix
./virtualisation/openstack/keystone.nix
./virtualisation/openstack/glance.nix
]
21 changes: 11 additions & 10 deletions nixos/modules/services/desktops/gnome3/at-spi2-core.nix
Expand Up @@ -28,14 +28,15 @@ with lib;

###### implementation

config = mkIf config.services.gnome3.at-spi2-core.enable {

environment.systemPackages = [ pkgs.at_spi2_core ];

services.dbus.packages = [ pkgs.at_spi2_core ];

systemd.packages = [ pkgs.at_spi2_core ];

};

config = mkMerge [
(mkIf config.services.gnome3.at-spi2-core.enable {
environment.systemPackages = [ pkgs.at_spi2_core ];
services.dbus.packages = [ pkgs.at_spi2_core ];
systemd.packages = [ pkgs.at_spi2_core ];
})

(mkIf (!config.services.gnome3.at-spi2-core.enable) {
environment.variables.NO_AT_BRIDGE = "1";
})
];
}
73 changes: 73 additions & 0 deletions nixos/modules/services/misc/xmr-stak.nix
@@ -0,0 +1,73 @@
{ lib, config, pkgs, ... }:

with lib;

let

cfg = config.services.xmr-stak;

pkg = pkgs.xmr-stak.override {
inherit (cfg) openclSupport cudaSupport;
};

xmrConfArg = optionalString (cfg.configText != "") ("-c " +
pkgs.writeText "xmr-stak-config.txt" cfg.configText);

in

{
options = {
services.xmr-stak = {
enable = mkEnableOption "xmr-stak miner";
openclSupport = mkEnableOption "support for OpenCL (AMD/ATI graphics cards)";
cudaSupport = mkEnableOption "support for CUDA (NVidia graphics cards)";

extraArgs = mkOption {
type = types.listOf types.str;
default = [];
example = [ "--noCPU" "--currency monero" ];
description = "List of parameters to pass to xmr-stak.";
};

configText = mkOption {
type = types.lines;
default = "";
example = ''
"currency" : "monero",
"pool_list" :
[ { "pool_address" : "pool.supportxmr.com:5555",
"wallet_address" : "<long-hash>",
"pool_password" : "minername",
"pool_weight" : 1,
},
],
'';
description = ''
Verbatim xmr-stak config.txt. If empty, the <literal>-c</literal>
parameter will not be added to the xmr-stak command.
'';
};
};
};

config = mkIf cfg.enable {
systemd.services.xmr-stak = {
wantedBy = [ "multi-user.target" ];
bindsTo = [ "network-online.target" ];
after = [ "network-online.target" ];
environment = mkIf cfg.cudaSupport {
LD_LIBRARY_PATH = "${pkgs.linuxPackages_latest.nvidia_x11}/lib";
};
script = ''
exec ${pkg}/bin/xmr-stak ${xmrConfArg} ${concatStringsSep " " cfg.extraArgs}
'';
serviceConfig = let rootRequired = cfg.openclSupport || cfg.cudaSupport; in {
# xmr-stak generates cpu and/or gpu configuration files
WorkingDirectory = "/tmp";
PrivateTmp = true;
DynamicUser = !rootRequired;
LimitMEMLOCK = toString (1024*1024);
};
};
};
}
1 change: 1 addition & 0 deletions nixos/modules/services/network-filesystems/samba.nix
Expand Up @@ -56,6 +56,7 @@ let
serviceConfig = {
ExecStart = "${samba}/sbin/${appName} ${args}";
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
LimitNOFILE = 16384;
Type = "notify";
};

Expand Down
3 changes: 3 additions & 0 deletions nixos/modules/services/web-servers/lighttpd/default.nix
Expand Up @@ -50,11 +50,14 @@ let
"mod_geoip"
"mod_magnet"
"mod_mysql_vhost"
"mod_openssl" # since v1.4.46
"mod_scgi"
"mod_setenv"
"mod_trigger_b4_dl"
"mod_uploadprogress"
"mod_vhostdb" # since v1.4.46
"mod_webdav"
"mod_wstunnel" # since v1.4.46
];

maybeModuleString = moduleName:
Expand Down
10 changes: 0 additions & 10 deletions nixos/modules/services/x11/desktop-managers/plasma5.nix
Expand Up @@ -193,16 +193,6 @@ in
theme = mkDefault "breeze";
};

boot.plymouth = {
theme = mkDefault "breeze";
themePackages = mkDefault [
(pkgs.breeze-plymouth.override {
nixosBranding = true;
nixosVersion = config.system.nixosRelease;
})
];
};

security.pam.services.kde = { allowNullPassword = true; };

# Doing these one by one seems silly, but we currently lack a better
Expand Down
9 changes: 7 additions & 2 deletions nixos/modules/system/boot/plymouth.nix
Expand Up @@ -8,9 +8,14 @@ let

cfg = config.boot.plymouth;

breezePlymouth = pkgs.breeze-plymouth.override {
nixosBranding = true;
nixosVersion = config.system.nixosRelease;
};

themesEnv = pkgs.buildEnv {
name = "plymouth-themes";
paths = [ plymouth ] ++ cfg.themePackages;
paths = [ plymouth breezePlymouth ] ++ cfg.themePackages;
};

configFile = pkgs.writeText "plymouthd.conf" ''
Expand Down Expand Up @@ -38,7 +43,7 @@ in
};

theme = mkOption {
default = "fade-in";
default = "breeze";
type = types.str;
description = ''
Splash screen theme.
Expand Down
30 changes: 15 additions & 15 deletions nixos/modules/virtualisation/ec2-amis.nix
Expand Up @@ -223,21 +223,21 @@ let self = {
"17.03".us-west-2.hvm-ebs = "ami-a93daac9";
"17.03".us-west-2.hvm-s3 = "ami-5139ae31";

# 17.09.1483.d0f0657ca0
"17.09".eu-west-1.hvm-ebs = "ami-cf33e7b6";
"17.09".eu-west-2.hvm-ebs = "ami-7d061419";
"17.09".eu-central-1.hvm-ebs = "ami-7548fa1a";
"17.09".us-east-1.hvm-ebs = "ami-6f669d15";
"17.09".us-east-2.hvm-ebs = "ami-cbe1ccae";
"17.09".us-west-1.hvm-ebs = "ami-9d95a5fd";
"17.09".us-west-2.hvm-ebs = "ami-d3956fab";
"17.09".ca-central-1.hvm-ebs = "ami-ee4ef78a";
"17.09".ap-southeast-1.hvm-ebs = "ami-1dfc807e";
"17.09".ap-southeast-2.hvm-ebs = "ami-dcb350be";
"17.09".ap-northeast-1.hvm-ebs = "ami-00ec3d66";
"17.09".ap-northeast-2.hvm-ebs = "ami-1107dd7f";
"17.09".sa-east-1.hvm-ebs = "ami-0377086f";
"17.09".ap-south-1.hvm-ebs = "ami-4a064625";
# 17.09.2356.cb751f9b1c3
"17.09".eu-west-1.hvm-ebs = "ami-d40185ad";
"17.09".eu-west-2.hvm-ebs = "ami-c5445da1";
"17.09".eu-central-1.hvm-ebs = "ami-e758d388";
"17.09".us-east-1.hvm-ebs = "ami-865327fc";
"17.09".us-east-2.hvm-ebs = "ami-074d6562";
"17.09".us-west-1.hvm-ebs = "ami-992c28f9";
"17.09".us-west-2.hvm-ebs = "ami-2bd87953";
"17.09".ca-central-1.hvm-ebs = "ami-c4bb01a0";
"17.09".ap-southeast-1.hvm-ebs = "ami-5ff79723";
"17.09".ap-southeast-2.hvm-ebs = "ami-57e71135";
"17.09".ap-northeast-1.hvm-ebs = "ami-5249c434";
"17.09".ap-northeast-2.hvm-ebs = "ami-f1288e9f";
"17.09".sa-east-1.hvm-ebs = "ami-5492d438";
"17.09".ap-south-1.hvm-ebs = "ami-c4fab2ab";

latest = self."17.09";
}; in self

0 comments on commit 24d81d6

Please sign in to comment.