Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 8cb0252b1e50
Choose a base ref
...
head repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: d1165dba9979
Choose a head ref
  • 4 commits
  • 40 files changed
  • 2 contributors

Commits on Apr 4, 2018

  1. 1

    Verified

    This commit was signed with the committer’s verified signature.
    tilpner Till Höppner
    Copy the full SHA
    a683d2c View commit details

Commits on Apr 11, 2018

  1. Copy the full SHA
    42a8459 View commit details

Commits on Apr 16, 2018

  1. Fixed indentation

    rdnetto committed Apr 16, 2018
    Copy the full SHA
    7292c5a View commit details

Commits on May 1, 2018

  1. Merge pull request #38831 from rdnetto/improve-cross-refs

    Improve cross referencing in NixOS Manual
    grahamc authored May 1, 2018
    Copy the full SHA
    d1165db View commit details
Showing with 349 additions and 338 deletions.
  1. +2 −2 .editorconfig
  2. +2 −2 nixos/doc/manual/administration/cleaning-store.xml
  3. +3 −3 nixos/doc/manual/administration/container-networking.xml
  4. +2 −2 nixos/doc/manual/administration/control-groups.xml
  5. +7 −7 nixos/doc/manual/administration/declarative-containers.xml
  6. +5 −5 nixos/doc/manual/administration/imperative-containers.xml
  7. +6 −6 nixos/doc/manual/configuration/abstractions.xml
  8. +2 −2 nixos/doc/manual/configuration/ad-hoc-network-config.xml
  9. +3 −3 nixos/doc/manual/configuration/adding-custom-packages.xml
  10. +13 −13 nixos/doc/manual/configuration/config-file.xml
  11. +3 −3 nixos/doc/manual/configuration/customizing-packages.xml
  12. +3 −3 nixos/doc/manual/configuration/declarative-packages.xml
  13. +4 −4 nixos/doc/manual/configuration/file-systems.xml
  14. +7 −7 nixos/doc/manual/configuration/firewall.xml
  15. +8 −5 nixos/doc/manual/configuration/ipv4-config.xml
  16. +7 −4 nixos/doc/manual/configuration/ipv6-config.xml
  17. +7 −7 nixos/doc/manual/configuration/linux-kernel.xml
  18. +3 −3 nixos/doc/manual/configuration/luks-file-systems.xml
  19. +18 −18 nixos/doc/manual/configuration/modularity.xml
  20. +2 −2 nixos/doc/manual/configuration/network-manager.xml
  21. +3 −3 nixos/doc/manual/configuration/ssh.xml
  22. +14 −14 nixos/doc/manual/configuration/user-mgmt.xml
  23. +2 −2 nixos/doc/manual/configuration/wireless.xml
  24. +23 −23 nixos/doc/manual/configuration/x-windows.xml
  25. +12 −12 nixos/doc/manual/configuration/xfce.xml
  26. +1 −1 nixos/doc/manual/installation/changing-config.xml
  27. +8 −4 nixos/doc/manual/installation/installing-from-other-distro.xml
  28. +2 −2 nixos/doc/manual/installation/installing-virtualbox-guest.xml
  29. +38 −36 nixos/doc/manual/installation/installing.xml
  30. +2 −2 nixos/doc/manual/installation/upgrading.xml
  31. +39 −39 nixos/modules/i18n/input-method/default.xml
  32. +19 −19 nixos/modules/programs/digitalbitbox/doc.xml
  33. +1 −1 nixos/modules/programs/plotinus.xml
  34. +11 −11 nixos/modules/security/acme.xml
  35. +6 −6 nixos/modules/security/hidepid.xml
  36. +6 −6 nixos/modules/services/databases/postgresql.xml
  37. +10 −10 nixos/modules/services/editors/emacs.xml
  38. +29 −30 nixos/modules/services/misc/gitlab.xml
  39. +6 −6 nixos/modules/services/misc/taskserver/doc.xml
  40. +10 −10 nixos/modules/services/networking/dnscrypt-proxy.xml
4 changes: 2 additions & 2 deletions .editorconfig
Original file line number Diff line number Diff line change
@@ -13,8 +13,8 @@ charset = utf-8

# see https://nixos.org/nixpkgs/manual/#chap-conventions

# Match nix/ruby files, set indent to spaces with width of two
[*.{nix,rb}]
# Match nix/ruby/docbook files, set indent to spaces with width of two
[*.{nix,rb,xml}]
indent_style = space
indent_size = 2

4 changes: 2 additions & 2 deletions nixos/doc/manual/administration/cleaning-store.xml
Original file line number Diff line number Diff line change
@@ -29,8 +29,8 @@ this unit automatically at certain points in time, for instance, every
night at 03:15:

<programlisting>
nix.gc.automatic = true;
nix.gc.dates = "03:15";
<xref linkend="opt-nix.gc.automatic"/> = true;
<xref linkend="opt-nix.gc.dates"/> = "03:15";
</programlisting>

</para>
6 changes: 3 additions & 3 deletions nixos/doc/manual/administration/container-networking.xml
Original file line number Diff line number Diff line change
@@ -39,9 +39,9 @@ IP address. This can be accomplished using the following configuration
on the host:

<programlisting>
networking.nat.enable = true;
networking.nat.internalInterfaces = ["ve-+"];
networking.nat.externalInterface = "eth0";
<xref linkend="opt-networking.nat.enable"/> = true;
<xref linkend="opt-networking.nat.internalInterfaces"/> = ["ve-+"];
<xref linkend="opt-networking.nat.externalInterface"/> = "eth0";
</programlisting>
where <literal>eth0</literal> should be replaced with the desired
external interface. Note that <literal>ve-+</literal> is a wildcard
4 changes: 2 additions & 2 deletions nixos/doc/manual/administration/control-groups.xml
Original file line number Diff line number Diff line change
@@ -47,7 +47,7 @@ would get 1/1001 of the cgroup’s CPU time.) You can limit a service’s
CPU share in <filename>configuration.nix</filename>:

<programlisting>
systemd.services.httpd.serviceConfig.CPUShares = 512;
<link linkend="opt-systemd.services._name_.serviceConfig">systemd.services.httpd.serviceConfig</link>.CPUShares = 512;
</programlisting>

By default, every cgroup has 1024 CPU shares, so this will halve the
@@ -61,7 +61,7 @@ available memory. Per-cgroup memory limits can be specified in
<literal>httpd.service</literal> to 512 MiB of RAM (excluding swap):

<programlisting>
systemd.services.httpd.serviceConfig.MemoryLimit = "512M";
<link linkend="opt-systemd.services._name_.serviceConfig">systemd.services.httpd.serviceConfig</link>.MemoryLimit = "512M";
</programlisting>

</para>
14 changes: 7 additions & 7 deletions nixos/doc/manual/administration/declarative-containers.xml
Original file line number Diff line number Diff line change
@@ -15,8 +15,8 @@ following specifies that there shall be a container named
containers.database =
{ config =
{ config, pkgs, ... }:
{ services.postgresql.enable = true;
services.postgresql.package = pkgs.postgresql96;
{ <xref linkend="opt-services.postgresql.enable"/> = true;
<xref linkend="opt-services.postgresql.package"/> = pkgs.postgresql96;
};
};
</programlisting>
@@ -33,11 +33,11 @@ ports. However, they cannot change the network configuration. You can
give a container its own network as follows:

<programlisting>
containers.database =
{ privateNetwork = true;
hostAddress = "192.168.100.10";
localAddress = "192.168.100.11";
};
containers.database = {
<link linkend="opt-containers._name_.privateNetwork">privateNetwork</link> = true;
<link linkend="opt-containers._name_.hostAddress">hostAddress</link> = "192.168.100.10";
<link linkend="opt-containers._name_.localAddress">localAddress</link> = "192.168.100.11";
};
</programlisting>

This gives the container a private virtual Ethernet interface with IP
10 changes: 5 additions & 5 deletions nixos/doc/manual/administration/imperative-containers.xml
Original file line number Diff line number Diff line change
@@ -30,8 +30,8 @@ line. For instance, to create a container that has

<screen>
# nixos-container create foo --config '
services.openssh.enable = true;
users.extraUsers.root.openssh.authorizedKeys.keys = ["ssh-dss AAAAB3N…"];
<xref linkend="opt-services.openssh.enable"/> = true;
<link linkend="opt-users.users._name__.openssh.authorizedKeys.keys">users.extraUsers.root.openssh.authorizedKeys.keys</link> = ["ssh-dss AAAAB3N…"];
'
</screen>

@@ -100,9 +100,9 @@ specify a new configuration on the command line:

<screen>
# nixos-container update foo --config '
services.httpd.enable = true;
services.httpd.adminAddr = "foo@example.org";
networking.firewall.allowedTCPPorts = [ 80 ];
<xref linkend="opt-services.httpd.enable"/> = true;
<xref linkend="opt-services.httpd.adminAddr"/> = "foo@example.org";
<xref linkend="opt-networking.firewall.allowedTCPPorts"/> = [ 80 ];
'

# curl http://$(nixos-container show-ip foo)/
12 changes: 6 additions & 6 deletions nixos/doc/manual/configuration/abstractions.xml
Original file line number Diff line number Diff line change
@@ -11,7 +11,7 @@ to abstract. Take, for instance, this Apache HTTP Server configuration:

<programlisting>
{
services.httpd.virtualHosts =
<xref linkend="opt-services.httpd.virtualHosts"/> =
[ { hostName = "example.org";
documentRoot = "/webroot";
adminAddr = "alice@example.org";
@@ -43,7 +43,7 @@ let
};
in
{
services.httpd.virtualHosts =
<xref linkend="opt-services.httpd.virtualHosts"/> =
[ exampleOrgCommon
(exampleOrgCommon // {
enableSSL = true;
@@ -66,7 +66,7 @@ allowed. Thus, you also could have written:

<programlisting>
{
services.httpd.virtualHosts =
<xref linkend="opt-services.httpd.virtualHosts"/> =
let exampleOrgCommon = <replaceable>...</replaceable>; in
[ exampleOrgCommon
(exampleOrgCommon // { <replaceable>...</replaceable> })
@@ -86,7 +86,7 @@ the host name. This can be done as follows:

<programlisting>
{
services.httpd.virtualHosts =
<xref linkend="opt-services.httpd.virtualHosts"/> =
let
makeVirtualHost = name:
{ hostName = name;
@@ -113,7 +113,7 @@ element in a list:

<programlisting>
{
services.httpd.virtualHosts =
<xref linkend="opt-services.httpd.virtualHosts"/> =
let
makeVirtualHost = <replaceable>...</replaceable>;
in map makeVirtualHost
@@ -132,7 +132,7 @@ function that takes a <emphasis>set</emphasis> as its argument, like this:

<programlisting>
{
services.httpd.virtualHosts =
<xref linkend="opt-services.httpd.virtualHosts"/> =
let
makeVirtualHost = { name, root }:
{ hostName = name;
4 changes: 2 additions & 2 deletions nixos/doc/manual/configuration/ad-hoc-network-config.xml
Original file line number Diff line number Diff line change
@@ -6,14 +6,14 @@

<title>Ad-Hoc Configuration</title>

<para>You can use <option>networking.localCommands</option> to specify
<para>You can use <xref linkend="opt-networking.localCommands"/> to specify
shell commands to be run at the end of
<literal>network-setup.service</literal>. This is useful for doing
network configuration not covered by the existing NixOS modules. For
instance, to statically configure an IPv6 address:

<programlisting>
networking.localCommands =
<xref linkend="opt-networking.localCommands"/> =
''
ip -6 addr add 2001:610:685:1::1/64 dev eth0
'';
6 changes: 3 additions & 3 deletions nixos/doc/manual/configuration/adding-custom-packages.xml
Original file line number Diff line number Diff line change
@@ -24,7 +24,7 @@ manual. Finally, you add it to
<literal>environment.systemPackages</literal>, e.g.

<programlisting>
environment.systemPackages = [ pkgs.my-package ];
<xref linkend="opt-environment.systemPackages"/> = [ pkgs.my-package ];
</programlisting>

and you run <command>nixos-rebuild</command>, specifying your own
@@ -41,7 +41,7 @@ Nixpkgs tree. For instance, here is how you specify a build of the
package directly in <filename>configuration.nix</filename>:

<programlisting>
environment.systemPackages =
<xref linkend="opt-environment.systemPackages"/> =
let
my-hello = with pkgs; stdenv.mkDerivation rec {
name = "hello-2.8";
@@ -57,7 +57,7 @@ environment.systemPackages =
Of course, you can also move the definition of
<literal>my-hello</literal> into a separate Nix expression, e.g.
<programlisting>
environment.systemPackages = [ (import ./my-hello.nix) ];
<xref linkend="opt-environment.systemPackages"/> = [ (import ./my-hello.nix) ];
</programlisting>
where <filename>my-hello.nix</filename> contains:
<programlisting>
26 changes: 13 additions & 13 deletions nixos/doc/manual/configuration/config-file.xml
Original file line number Diff line number Diff line change
@@ -28,9 +28,9 @@ form <literal><replaceable>name</replaceable> =
<programlisting>
{ config, pkgs, ... }:

{ services.httpd.enable = true;
services.httpd.adminAddr = "alice@example.org";
services.httpd.documentRoot = "/webroot";
{ <xref linkend="opt-services.httpd.enable"/> = true;
<xref linkend="opt-services.httpd.adminAddr"/> = "alice@example.org";
<xref linkend="opt-services.httpd.documentRoot"/> = "/webroot";
}
</programlisting>

@@ -40,7 +40,7 @@ the document root.</para>

<para>Sets can be nested, and in fact dots in option names are
shorthand for defining a set containing another set. For instance,
<option>services.httpd.enable</option> defines a set named
<xref linkend="opt-services.httpd.enable"/> defines a set named
<varname>services</varname> that contains a set named
<varname>httpd</varname>, which in turn contains an option definition
named <varname>enable</varname> with value <literal>true</literal>.
@@ -89,7 +89,7 @@ The option value `services.httpd.enable' in `/etc/nixos/configuration.nix' is no
<para>Strings are enclosed in double quotes, e.g.

<programlisting>
networking.hostName = "dexter";
<xref linkend="opt-networking.hostName"/> = "dexter";
</programlisting>

Special characters can be escaped by prefixing them with a
@@ -99,7 +99,7 @@ networking.hostName = "dexter";
single quotes</emphasis>, e.g.

<programlisting>
networking.extraHosts =
<xref linkend="opt-networking.extraHosts"/> =
''
127.0.0.2 other-localhost
10.0.0.1 server
@@ -125,8 +125,8 @@ networking.extraHosts =
<literal>false</literal>, e.g.

<programlisting>
networking.firewall.enable = true;
networking.firewall.allowPing = false;
<xref linkend="opt-networking.firewall.enable"/> = true;
<xref linkend="opt-networking.firewall.allowPing"/> = false;
</programlisting>
</para>
</listitem>
@@ -138,7 +138,7 @@ networking.firewall.allowPing = false;
<para>For example,

<programlisting>
boot.kernel.sysctl."net.ipv4.tcp_keepalive_time" = 60;
<xref linkend="opt-boot.kernel.sysctl"/>."net.ipv4.tcp_keepalive_time" = 60;
</programlisting>

(Note that here the attribute name
@@ -158,7 +158,7 @@ boot.kernel.sysctl."net.ipv4.tcp_keepalive_time" = 60;
enclosed in braces, as in the option definition

<programlisting>
fileSystems."/boot" =
<xref linkend="opt-fileSystems"/>."/boot" =
{ device = "/dev/sda1";
fsType = "ext4";
options = [ "rw" "data=ordered" "relatime" ];
@@ -175,7 +175,7 @@ fileSystems."/boot" =
elements are separated by whitespace, like this:

<programlisting>
boot.kernelModules = [ "fuse" "kvm-intel" "coretemp" ];
<xref linkend="opt-boot.kernelModules"/> = [ "fuse" "kvm-intel" "coretemp" ];
</programlisting>

List elements can be any other type, e.g. sets:
@@ -195,12 +195,12 @@ swapDevices = [ { device = "/dev/disk/by-label/swap"; } ];
the function argument <varname>pkgs</varname>. Typical uses:

<programlisting>
environment.systemPackages =
<xref linkend="opt-environment.systemPackages"/> =
[ pkgs.thunderbird
pkgs.emacs
];

postgresql.package = pkgs.postgresql90;
<xref linkend="opt-services.postgresql.package"/> = pkgs.postgresql90;
</programlisting>

The latter option definition changes the default PostgreSQL
6 changes: 3 additions & 3 deletions nixos/doc/manual/configuration/customizing-packages.xml
Original file line number Diff line number Diff line change
@@ -28,7 +28,7 @@ has a dependency on GTK+ 2. If you want to build it against GTK+ 3,
you can specify that as follows:

<programlisting>
environment.systemPackages = [ (pkgs.emacs.override { gtk = pkgs.gtk3; }) ];
<xref linkend="opt-environment.systemPackages"/> = [ (pkgs.emacs.override { gtk = pkgs.gtk3; }) ];
</programlisting>

The function <varname>override</varname> performs the call to the Nix
@@ -38,7 +38,7 @@ the set of arguments specified by you. So here the function argument
causing Emacs to depend on GTK+ 3. (The parentheses are necessary
because in Nix, function application binds more weakly than list
construction, so without them,
<literal>environment.systemPackages</literal> would be a list with two
<xref linkend="opt-environment.systemPackages"/> would be a list with two
elements.)</para>

<para>Even greater customisation is possible using the function
@@ -51,7 +51,7 @@ For instance, if you want to override the source code of Emacs, you
can say:

<programlisting>
environment.systemPackages = [
<xref linkend="opt-environment.systemPackages"/> = [
(pkgs.emacs.overrideAttrs (oldAttrs: {
name = "emacs-25.0-pre";
src = /path/to/my/emacs/tree;
6 changes: 3 additions & 3 deletions nixos/doc/manual/configuration/declarative-packages.xml
Original file line number Diff line number Diff line change
@@ -8,12 +8,12 @@

<para>With declarative package management, you specify which packages
you want on your system by setting the option
<option>environment.systemPackages</option>. For instance, adding the
<xref linkend="opt-environment.systemPackages"/>. For instance, adding the
following line to <filename>configuration.nix</filename> enables the
Mozilla Thunderbird email application:

<programlisting>
environment.systemPackages = [ pkgs.thunderbird ];
<xref linkend="opt-environment.systemPackages"/> = [ pkgs.thunderbird ];
</programlisting>

The effect of this specification is that the Thunderbird package from
@@ -34,7 +34,7 @@ name</emphasis>, such as
different channels that you might have.)</para>

<para>To “uninstall” a package, simply remove it from
<option>environment.systemPackages</option> and run
<xref linkend="opt-environment.systemPackages"/> and run
<command>nixos-rebuild switch</command>.</para>

<xi:include href="customizing-packages.xml" />
8 changes: 4 additions & 4 deletions nixos/doc/manual/configuration/file-systems.xml
Original file line number Diff line number Diff line change
@@ -13,21 +13,21 @@ device <filename>/dev/disk/by-label/data</filename> onto the mount
point <filename>/data</filename>:

<programlisting>
fileSystems."/data" =
<xref linkend="opt-fileSystems"/>."/data" =
{ device = "/dev/disk/by-label/data";
fsType = "ext4";
};
</programlisting>

Mount points are created automatically if they don’t already exist.
For <option>device</option>, it’s best to use the topology-independent
For <option><link linkend="opt-fileSystems._name__.device">device</link></option>, it’s best to use the topology-independent
device aliases in <filename>/dev/disk/by-label</filename> and
<filename>/dev/disk/by-uuid</filename>, as these don’t change if the
topology changes (e.g. if a disk is moved to another IDE
controller).</para>

<para>You can usually omit the file system type
(<option>fsType</option>), since <command>mount</command> can usually
(<option><link linkend="opt-fileSystems._name__.fsType">fsType</link></option>), since <command>mount</command> can usually
detect the type and load the necessary kernel module automatically.
However, if the file system is needed at early boot (in the initial
ramdisk) and is not <literal>ext2</literal>, <literal>ext3</literal>
@@ -38,7 +38,7 @@ available.</para>
<note><para>System startup will fail if any of the filesystems fails to mount,
dropping you to the emergency shell.
You can make a mount asynchronous and non-critical by adding
<literal>options = [ "nofail" ];</literal>.
<literal><link linkend="opt-fileSystems._name__.options">options</link> = [ "nofail" ];</literal>.
</para></note>

<xi:include href="luks-file-systems.xml" />
Loading