Commit Graph

170253 Commits

Author SHA1 Message Date
Austin Seipp
c36c048c0e dockerTools: mark store-path-to-layer.sh as executable
bcf54ce5bb introduced a treewide change to
use ${stdenv.shell} where-ever possible. However, this broke a script
used by dockerTools, store-path-to-layer.sh, as it did not preserve the
+x mode bit. This meant the file got put into the store as mode 0444,
resulting in a build-time error later on that looked like:

    xargs: /nix/store/jixivxhh3c8sncp9xlkc4ls3y5f2mmxh-store-path-to-layer.sh: Permission denied

However, in a twist of fate, bcf54ce5bb
not only introduced this regression but, in this particular instance,
didn't even fix the original bug: the store-path-to-layer.sh script
*still* uses /bin/sh as its shebang line, rather than an absolute path
to stdenv. (Fixing this can be done in a separate commit.)

Signed-off-by: Austin Seipp <aseipp@pobox.com>
2019-02-21 08:30:47 -06:00
Franz Pletz
bd3fdc99e3
Merge pull request #56147 from callahad/linux-kernel-sed
linux: Enable support for Self-Encrypting Drives
2019-02-21 14:02:01 +00:00
Sarah Brofeldt
49d963855a
Merge pull request #56148 from adamtulinius/morph-v1.2.0
morph: 1.1.0 -> 1.2.0
2019-02-21 14:28:07 +01:00
Robert Schütz
255f67e50f abcmidi: 2019.01.01 -> 2019.02.08 2019-02-21 14:18:22 +01:00
Robert Schütz
3382d93982 home-assistant-cli: 0.5.0 -> 0.6.0 2019-02-21 14:03:35 +01:00
Adam Finn Tulinius
3ad5550d21 morph: 1.1.0 -> 1.2.0 2019-02-21 13:55:46 +01:00
Dan Callahan
0ea8c6e3de
linux: Enable support for Self-Encrypting Drives
To quote block/Kconfig:

> Builds Logic for interfacing with Opal enabled controllers.
> Enabling this option enables users to setup/unlock/lock
> Locking ranges for SED devices using the Opal protocol.

Without `BLK_SED_OPAL`, it is impossible to resume from sleep when using
a locked self-encrypting drive.

This configuration option appeared in earlier kernels, but only reached
maturity in 4.14 according to discussion at:

- https://github.com/Drive-Trust-Alliance/sedutil/issues/90 and
- https://github.com/Drive-Trust-Alliance/sedutil/pull/190

This kernel option is enabled in the default kernels shipped with
Fedora, Debian, and other mainstream Linux distributions.
2019-02-21 12:14:47 +00:00
Peter Simons
6450d8c5ca haskell-hledger: drop obsolete (and already commented-out) overrides 2019-02-21 12:12:18 +01:00
Peter Simons
7a6bbb41ac haskell-hledger: don't install data files that don't belong to this package
Fixes https://github.com/NixOS/nixpkgs/issues/53936.
2019-02-21 12:12:18 +01:00
Peter Simons
1d6532d976
Merge pull request #56137 from jacereda/cereal-check-head
cereal: run test suite on ghc-head
2019-02-21 11:54:11 +01:00
Peter Simons
62eae63a49
Merge pull request #56139 from jacereda/psqueues-check-head
psqueues: run test suite on ghc-head
2019-02-21 11:53:25 +01:00
Peter Simons
48db7bf9d9
Merge pull request #56138 from jacereda/psqueues-check-86
psqueues: run test suite on ghc-8.6
2019-02-21 11:53:05 +01:00
Peter Simons
1c6855a0f7
Merge pull request #56136 from jacereda/cereal-check-86
cereal: run test suite on ghc-8.6
2019-02-21 11:52:25 +01:00
Michael Raskin
ecfcf8bdf0
Merge pull request #53878 from msteen/nix-prefetch
nix-prefetch: init at 0.1.0
2019-02-21 09:48:49 +00:00
Michael Raskin
0b91fa43e4
Merge pull request #54980 from danbst/etc-relative
nixos: make symlinks in `/etc` relative (except `/etc/static`)
2019-02-21 09:45:42 +00:00
Jörg Thalheim
183919a0c0
Merge pull request #56004 from eskimor/add-nix-serve-help
nixos-nix-serve: Add some hint on howto get valid signing keys.
2019-02-21 09:43:50 +00:00
Michael Raskin
a059fc7420
Merge pull request #56067 from oxij/tree/fetchurl-boot
treewide: assemble all `fetchurlBoot` uses in overrides to `fetchurl`
2019-02-21 09:43:11 +00:00
Michael Raskin
95039d0668
nixos/xserver: drop intel from videoDrivers (#55583)
* nixos/xserver: drop intel from videoDrivers

* Some more notes about possible regressions
2019-02-21 09:42:11 +00:00
Cray Elliott
4cfb4ec5f4 dolphinEmuMaster: 2018-12-25 -> 2019-02-16 2019-02-21 01:27:28 -08:00
Jörg Thalheim
6fed64710a
Merge pull request #56113 from Mic92/radare2
radare2: 3.2.1 -> 3.3.0
2019-02-21 09:27:13 +00:00
Jörg Thalheim
bf1b39d127
Merge pull request #56129 from dywedir/alacritty
alacritty: add wayland, libxkbcommon to rpath
2019-02-21 09:21:24 +00:00
Jörg Thalheim
a9b16ad4e7
Merge pull request #56111 from NeQuissimus/xterm_344
xterm: 342 -> 344
2019-02-21 09:19:48 +00:00
Cray Elliott
da4484c9a6 mwprocapture: 1.2.3950 -> 1.2.4054 2019-02-21 01:11:09 -08:00
Jorge Acereda
7e153d9e2d psqueues: run test suite on ghc-head 2019-02-21 10:08:04 +01:00
Jorge Acereda
5aa3f23a98 psqueues: run test suite on ghc-8.6 2019-02-21 10:06:42 +01:00
Jorge Acereda
d5f45a6566 cereal: run test suite on ghc-head 2019-02-21 10:04:11 +01:00
Jorge Acereda
c8e61efae3 cereal: run test suite on ghc-8.6 2019-02-21 10:02:43 +01:00
Cray Elliott
6959c375a5 openjdk11: 11.0.1+13 -> 11.0.2+9 2019-02-21 01:01:04 -08:00
Cray Elliott
c210206b7a mgba: 0.6.3 -> 0.7.0 2019-02-21 00:56:52 -08:00
dywedir
cf549409ce
alacritty: add wayland, libxkbcommon to rpath 2019-02-21 10:49:36 +02:00
Robert Schütz
2ca0cfb0d1
Merge pull request #56100 from ceedubs/ddgr-to-1.6
ddgr: 1.1 -> 1.6
2019-02-21 08:33:53 +01:00
Matthijs Steen
b0ec4c1fd3 nix-prefetch: init at 0.1.0 2019-02-21 01:52:51 +01:00
Maximilian Bosch
de2bb1094b
Merge pull request #56108 from artemist/lepton
lepton: init at 1.2.1
2019-02-21 01:28:47 +01:00
Jörg Thalheim
1a78500fe4
Merge pull request #56112 from NixOS/xsel-08-01-10
xsel: 2016-09-02 -> 2018-01-10
2019-02-21 00:21:25 +00:00
Jörg Thalheim
c41ed752dc
radare2: 3.2.1 -> 3.3.0 2019-02-21 00:06:55 +00:00
Tim Steinbach
51483ec5c9
xsel: 2016-09-02 -> 2018-01-10 2019-02-20 19:03:47 -05:00
Tim Steinbach
f4e98fde9b
xterm: 342 -> 344 2019-02-20 19:00:04 -05:00
Maximilian Bosch
a55d96bf9e
lepton: only build on x86_64-linux for now
Darwin and `aarch64-linux` builds currently fail[1][2].

Also cleaned up the `meta` section a bit.

[1] https://github.com/NixOS/nixpkgs/pull/56108/checks?check_run_id=66442317
[2] https://github.com/NixOS/nixpkgs/pull/56108#issue-254801596
2019-02-21 00:59:46 +01:00
Franz Pletz
2935a67eb9
Merge pull request #45670 from johanot/kubernetes-1.11
nixos/kubernetes: Module refactor
2019-02-20 23:31:47 +00:00
Jaka Hudoklin
97a27fd2d2
nixos/kubernetes: fix flannel and kubelet startup 2019-02-21 00:26:11 +01:00
Vladyslav M
e09be19275
Merge pull request #56104 from 0x4A6F/master-zola
zola: 0.5.0 -> 0.5.1
2019-02-21 01:13:37 +02:00
Artemis Tosini
3fa211dfb8
lepton: init at 1.2.1 2019-02-20 22:55:13 +00:00
Cody Allen
0094157f86
ddgr: 1.1 -> 1.6
ddgr (DuckDuckGo CLI) 1.6 no longer requires the `requests` Python
package and includes the commit that patched zsh-completion.
2019-02-20 14:21:37 -08:00
Cody Allen
96dde14360
Add Cody Allen (ceedubs) to maintainer list 2019-02-20 14:00:17 -08:00
Frederik Rietdijk
2a81eceeba python.pkgs.acoustics: 0.2.0.post1 -> 0.2.0.post2 2019-02-20 21:52:31 +01:00
Tor Hedin Brønner
bba6de611a
Merge pull request #56046 from callahad/bolt
Add and enable Bolt to support Thunderbolt 3 settings in GNOME
2019-02-20 21:43:02 +01:00
0x4A6F
64335de9ae
zola: 0.5.0 -> 0.5.1 2019-02-20 20:37:43 +00:00
zimbatm
288f353cdb
firecracker: 0.13.0 -> 0.14.0 2019-02-20 21:16:30 +01:00
Orivej Desh
d7f4b13ccf lftp: do not look for expat and zlib in /usr/include
This behaviour affects builds without sandboxing.
2019-02-20 20:11:15 +00:00
Franz Pletz
3a02205496
nixos/kubernetes: bootstrap docker without networking
Before flannel is ready there is a brief time where docker will be
running with a default docker0 bridge. If kubernetes happens to spawn
containers before flannel is ready, docker can't be restarted when
flannel is ready because some containers are still running on the
docker0 bridge with potentially different network addresses.

Environment variables in `EnvironmentFile` override those defined via
`Environment` in the systemd service config.

Co-authored-by: Christian Albrecht <christian.albrecht@mayflower.de>
2019-02-20 21:08:58 +01:00