diff options
author | Tuomas Tynkkynen <tuomas@tuxera.com> | 2016-04-28 00:13:53 +0300 |
---|---|---|
committer | Tuomas Tynkkynen <tuomas@tuxera.com> | 2016-04-28 00:13:53 +0300 |
commit | 4ff8f377afcfcb206c585f165dc1332c9fb1eba1 (patch) | |
tree | 2df363c4be265610f3982377b3a1dc61870a544a /nixos | |
parent | 7ac1ef05fa162d8e3c35925034df72288df77c8b (diff) | |
parent | 49d1acb50f6465aceb5502de62e0c5d3a3d1d1a4 (diff) | |
download | nixlib-4ff8f377afcfcb206c585f165dc1332c9fb1eba1.tar nixlib-4ff8f377afcfcb206c585f165dc1332c9fb1eba1.tar.gz nixlib-4ff8f377afcfcb206c585f165dc1332c9fb1eba1.tar.bz2 nixlib-4ff8f377afcfcb206c585f165dc1332c9fb1eba1.tar.lz nixlib-4ff8f377afcfcb206c585f165dc1332c9fb1eba1.tar.xz nixlib-4ff8f377afcfcb206c585f165dc1332c9fb1eba1.tar.zst nixlib-4ff8f377afcfcb206c585f165dc1332c9fb1eba1.zip |
Merge remote-tracking branch 'upstream/master' into staging
Diffstat (limited to 'nixos')
-rw-r--r-- | nixos/modules/config/pulseaudio.nix | 4 | ||||
-rw-r--r-- | nixos/modules/hardware/all-firmware.nix | 6 | ||||
-rw-r--r-- | nixos/modules/module-list.nix | 1 | ||||
-rw-r--r-- | nixos/modules/services/backup/crashplan.nix | 7 | ||||
-rw-r--r-- | nixos/modules/services/databases/postgresql.nix | 2 | ||||
-rw-r--r-- | nixos/modules/services/logging/logcheck.nix | 5 | ||||
-rw-r--r-- | nixos/modules/services/mail/dovecot.nix | 6 | ||||
-rw-r--r-- | nixos/modules/services/networking/logmein-hamachi.nix | 50 | ||||
-rw-r--r-- | nixos/modules/services/system/dbus.nix | 2 | ||||
-rw-r--r-- | nixos/modules/system/etc/etc.nix | 2 | ||||
-rw-r--r-- | nixos/modules/tasks/network-interfaces.nix | 10 | ||||
-rw-r--r-- | nixos/release-small.nix | 3 |
12 files changed, 78 insertions, 20 deletions
diff --git a/nixos/modules/config/pulseaudio.nix b/nixos/modules/config/pulseaudio.nix index 1654d31cfeb4..f2db428a4441 100644 --- a/nixos/modules/config/pulseaudio.nix +++ b/nixos/modules/config/pulseaudio.nix @@ -134,7 +134,7 @@ in { } (mkIf cfg.enable { - environment.systemPackages = [ cfg.package.out ]; + environment.systemPackages = [ cfg.package ]; environment.etc = singleton { target = "asound.conf"; @@ -158,7 +158,7 @@ in { wantedBy = [ "default.target" ]; serviceConfig = { Type = "notify"; - ExecStart = "${cfg.package}/bin/pulseaudio --daemonize=no"; + ExecStart = "${cfg.package.out}/bin/pulseaudio --daemonize=no"; Restart = "on-failure"; }; }; diff --git a/nixos/modules/hardware/all-firmware.nix b/nixos/modules/hardware/all-firmware.nix index d0d481f72a40..fb8e1ccab667 100644 --- a/nixos/modules/hardware/all-firmware.nix +++ b/nixos/modules/hardware/all-firmware.nix @@ -22,7 +22,11 @@ with lib; ###### implementation config = mkIf config.hardware.enableAllFirmware { - hardware.firmware = [ pkgs.firmwareLinuxNonfree pkgs.intel2200BGFirmware ]; + hardware.firmware = with pkgs; [ + firmwareLinuxNonfree + intel2200BGFirmware + rtl8723bs-firmware + ]; }; } diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index b238003dd0ca..ec14fd2e3631 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -338,6 +338,7 @@ ./services/networking/kippo.nix ./services/networking/lambdabot.nix ./services/networking/libreswan.nix + ./services/networking/logmein-hamachi.nix ./services/networking/mailpile.nix ./services/networking/mfi.nix ./services/networking/mjpg-streamer.nix diff --git a/nixos/modules/services/backup/crashplan.nix b/nixos/modules/services/backup/crashplan.nix index 94aa3b17b663..a69526f968b0 100644 --- a/nixos/modules/services/backup/crashplan.nix +++ b/nixos/modules/services/backup/crashplan.nix @@ -50,11 +50,8 @@ with lib; ensureDir ${crashplan.vardir}/log 777 cp -avn ${crashplan}/conf.template/* ${crashplan.vardir}/conf for x in app.asar bin EULA.txt install.vars lang lib libjniwrap64.so libjniwrap.so libjtux64.so libjtux.so libmd564.so libmd5.so share skin upgrade; do - if [ -e ${crashplan.vardir}/$x ]; then - true; - else - ln -s ${crashplan}/$x ${crashplan.vardir}/$x; - fi; + rm -f ${crashplan.vardir}/$x; + ln -sf ${crashplan}/$x ${crashplan.vardir}/$x; done ''; diff --git a/nixos/modules/services/databases/postgresql.nix b/nixos/modules/services/databases/postgresql.nix index 31ffe51c11ef..80ee32f4ee33 100644 --- a/nixos/modules/services/databases/postgresql.nix +++ b/nixos/modules/services/databases/postgresql.nix @@ -242,7 +242,7 @@ in if test -e "${cfg.dataDir}/.first_startup"; then ${optionalString (cfg.initialScript != null) '' - cat "${cfg.initialScript}" | psql --port=${toString cfg.port} postgres + psql -f "${cfg.initialScript}" --port=${toString cfg.port} postgres ''} rm -f "${cfg.dataDir}/.first_startup" fi diff --git a/nixos/modules/services/logging/logcheck.nix b/nixos/modules/services/logging/logcheck.nix index 6069262b4705..3a85fa60fe7a 100644 --- a/nixos/modules/services/logging/logcheck.nix +++ b/nixos/modules/services/logging/logcheck.nix @@ -11,7 +11,10 @@ let rm $out/logcheck.* ''; - rulesDir = pkgs.symlinkJoin "logcheck-rules-dir" ([ defaultRules ] ++ cfg.extraRulesDirs); + rulesDir = pkgs.symlinkJoin + { name = "logcheck-rules-dir"; + paths = ([ defaultRules ] ++ cfg.extraRulesDirs); + }; configFile = pkgs.writeText "logcheck.conf" cfg.config; diff --git a/nixos/modules/services/mail/dovecot.nix b/nixos/modules/services/mail/dovecot.nix index 127c3da69d14..47e374d8edc3 100644 --- a/nixos/modules/services/mail/dovecot.nix +++ b/nixos/modules/services/mail/dovecot.nix @@ -63,8 +63,10 @@ let cfg.extraConfig ]; - modulesDir = pkgs.symlinkJoin "dovecot-modules" - (map (pkg: "${pkg}/lib/dovecot") ([ dovecotPkg ] ++ map (module: module.override { dovecot = dovecotPkg; }) cfg.modules)); + modulesDir = pkgs.symlinkJoin { + name = "dovecot-modules"; + paths = map (pkg: "${pkg}/lib/dovecot") ([ dovecotPkg ] ++ map (module: module.override { dovecot = dovecotPkg; }) cfg.modules); + }; in { diff --git a/nixos/modules/services/networking/logmein-hamachi.nix b/nixos/modules/services/networking/logmein-hamachi.nix new file mode 100644 index 000000000000..406626a8a343 --- /dev/null +++ b/nixos/modules/services/networking/logmein-hamachi.nix @@ -0,0 +1,50 @@ +{ config, lib, pkgs, ... }: + +with lib; + +let + + cfg = config.services.logmein-hamachi; + +in + +{ + + ###### interface + + options = { + + services.logmein-hamachi.enable = mkOption { + type = types.bool; + default = false; + description = + '' + Whether to enable LogMeIn Hamachi, a proprietary + (closed source) commercial VPN software. + ''; + }; + + }; + + + ###### implementation + + config = mkIf cfg.enable { + + systemd.services.logmein-hamachi = { + description = "LogMeIn Hamachi Daemon"; + + wantedBy = [ "multi-user.target" ]; + after = [ "network.target" "local-fs.target" ]; + + serviceConfig = { + Type = "forking"; + ExecStart = "${pkgs.logmein-hamachi}/bin/hamachid"; + }; + }; + + environment.systemPackages = [ pkgs.logmein-hamachi ]; + + }; + +} diff --git a/nixos/modules/services/system/dbus.nix b/nixos/modules/services/system/dbus.nix index 2e29ef6a8f53..59c2e482e1ad 100644 --- a/nixos/modules/services/system/dbus.nix +++ b/nixos/modules/services/system/dbus.nix @@ -121,7 +121,7 @@ in security.setuidOwners = singleton { program = "dbus-daemon-launch-helper"; - source = "${pkgs.dbus_daemon.lib}/libexec/dbus-daemon-launch-helper"; + source = "${pkgs.dbus_daemon.out}/libexec/dbus-daemon-launch-helper"; owner = "root"; group = "messagebus"; setuid = true; diff --git a/nixos/modules/system/etc/etc.nix b/nixos/modules/system/etc/etc.nix index 9d5b3db472c3..163f4f4106e8 100644 --- a/nixos/modules/system/etc/etc.nix +++ b/nixos/modules/system/etc/etc.nix @@ -36,7 +36,7 @@ in type = types.loaOf types.optionSet; default = {}; example = literalExample '' - { hosts = + { example-configuration-file = { source = "/nix/store/.../etc/dir/file.conf.example"; mode = "0440"; }; diff --git a/nixos/modules/tasks/network-interfaces.nix b/nixos/modules/tasks/network-interfaces.nix index 0528012adfd8..c52bd904caec 100644 --- a/nixos/modules/tasks/network-interfaces.nix +++ b/nixos/modules/tasks/network-interfaces.nix @@ -523,7 +523,7 @@ in networking.bonds = mkOption { default = { }; - example = { + example = literalExample { bond0 = { interfaces = [ "eth0" "wlan0" ]; miimon = 100; @@ -598,7 +598,7 @@ in networking.macvlans = mkOption { type = types.attrsOf types.optionSet; default = { }; - example = { + example = literalExample { wan = { interface = "enp2s0"; mode = "vepa"; @@ -629,7 +629,7 @@ in networking.sits = mkOption { type = types.attrsOf types.optionSet; default = { }; - example = { + example = literalExample { hurricane = { remote = "10.0.0.1"; local = "10.0.0.22"; @@ -688,7 +688,7 @@ in networking.vlans = mkOption { default = { }; - example = { + example = literalExample { vlan0 = { id = 3; interface = "enp3s0"; @@ -727,7 +727,7 @@ in networking.wlanInterfaces = mkOption { default = { }; - example = { + example = literalExample { "wlan-station0" = { device = "wlp6s0"; }; diff --git a/nixos/release-small.nix b/nixos/release-small.nix index 08ca4cfb3e40..fb5a97f98ab9 100644 --- a/nixos/release-small.nix +++ b/nixos/release-small.nix @@ -31,7 +31,8 @@ in rec { inherit (nixos') channel manual iso_minimal dummy; tests = { inherit (nixos'.tests) - containers + containers-imperative + containers-ipv4 firewall ipv6 login |