+1
-1
nixos/doc/manual/configuration.xml
+1
-1
nixos/doc/manual/configuration.xml
···
+1
-1
nixos/lib/eval-config.nix
+1
-1
nixos/lib/eval-config.nix
···
+1
-1
nixos/lib/test-driver/Machine.pm
+1
-1
nixos/lib/test-driver/Machine.pm
···+my ($status, $out) = $self->execute("journalctl -b SYSLOG_IDENTIFIER=systemd | grep 'session opened'");
+1
-1
nixos/modules/config/gnu.nix
+1
-1
nixos/modules/config/gnu.nix
+6
-1
nixos/modules/config/i18n.nix
+6
-1
nixos/modules/config/i18n.nix
···
+14
-7
nixos/modules/config/no-x-libs.nix
+14
-7
nixos/modules/config/no-x-libs.nix
······
+1
-5
nixos/modules/config/power-management.nix
+1
-5
nixos/modules/config/power-management.nix
···
+1
-12
nixos/modules/config/sysctl.nix
+1
-12
nixos/modules/config/sysctl.nix
···
+2
nixos/modules/installer/tools/nixos-rebuild.sh
+2
nixos/modules/installer/tools/nixos-rebuild.sh
+2
-5
nixos/modules/profiles/minimal.nix
+2
-5
nixos/modules/profiles/minimal.nix
···
+1
-2
nixos/modules/programs/environment.nix
+1
-2
nixos/modules/programs/environment.nix
···
+36
nixos/modules/programs/ssh.nix
+36
nixos/modules/programs/ssh.nix
······
+3
-2
nixos/modules/rename.nix
+3
-2
nixos/modules/rename.nix
···use = x: builtins.trace "Obsolete option `${showOption from}' is used. It was renamed to `${showOption to}'." x;-define = x: builtins.trace "Obsolete option `${showOption from}' is used. It was renamed to `${showOption to}'." x;+define = x: builtins.trace "Obsolete option `${showOption from}' is used. It was renamed to `${showOption to}'." x;···use = x: abort "Deprecated option `${showOption from}' is used. It was renamed to `${showOption to}'.";-define = x: abort "Deprecated option `${showOption from}' is used. It was renamed to `${showOption to}'.";+define = x: abort "Deprecated option `${showOption from}' is used. It was renamed to `${showOption to}'.";···++ obsolete [ "services" "sshd" "permitRootLogin" ] [ "services" "openssh" "permitRootLogin" ]++ obsolete [ "services" "xserver" "startSSHAgent" ] [ "services" "xserver" "startOpenSSHAgent" ]++ obsolete [ "services" "xserver" "windowManager" "xbmc" ] [ "services" "xserver" "desktopManager" "xbmc" ]
+2
-2
nixos/modules/security/pam.nix
+2
-2
nixos/modules/security/pam.nix
······
+3
nixos/modules/security/polkit.nix
+3
nixos/modules/security/polkit.nix
···
+7
-7
nixos/modules/security/setuid-wrapper.c
+7
-7
nixos/modules/security/setuid-wrapper.c
·········
+5
-5
nixos/modules/security/setuid-wrappers.nix
+5
-5
nixos/modules/security/setuid-wrappers.nix
······
+1
-1
nixos/modules/services/databases/postgresql.nix
+1
-1
nixos/modules/services/databases/postgresql.nix
···-KillMode = "process"; # FIXME: this may cause processes to be left behind in the cgroup even after the final SIGKILL
+13
nixos/modules/services/hardware/80-net-name-slot.rules
+13
nixos/modules/services/hardware/80-net-name-slot.rules
···
+6
-2
nixos/modules/services/hardware/udev.nix
+6
-2
nixos/modules/services/hardware/udev.nix
······${config.systemd.package}/bin/udevadm hwdb --update && ln -sfn ${config.systemd.package} /var/lib/udev/prev-systemd
+1
-1
nixos/modules/services/hardware/udisks2.nix
+1
-1
nixos/modules/services/hardware/udisks2.nix
+6
-17
nixos/modules/services/misc/nix-daemon.nix
+6
-17
nixos/modules/services/misc/nix-daemon.nix
······
+4
-1
nixos/modules/services/networking/dhcpcd.nix
+4
-1
nixos/modules/services/networking/dhcpcd.nix
···+dhcpcd = if !config.boot.isContainer then pkgs.dhcpcd else pkgs.dhcpcd.override { udev = null; };·········
+12
-5
nixos/modules/services/networking/firewall.nix
+12
-5
nixos/modules/services/networking/firewall.nix
······
-1
nixos/modules/services/networking/ssh/sshd.nix
-1
nixos/modules/services/networking/ssh/sshd.nix
+9
-11
nixos/modules/services/ttys/agetty.nix
+9
-11
nixos/modules/services/ttys/agetty.nix
···-serviceConfig.ExecStart = "@${pkgs.utillinux}/sbin/agetty agetty --noclear --login-program ${pkgs.shadow}/bin/login %I 38400";+{ serviceConfig.ExecStart = "@${pkgs.utillinux}/sbin/agetty agetty --noclear --login-program ${pkgs.shadow}/bin/login --keep-baud %I 115200,38400,9600 $TERM";-sed '/ExecStart/ d' < ${config.systemd.package}/example/systemd/system/serial-getty@.service > $out-in "@${pkgs.utillinux}/sbin/agetty agetty --login-program ${pkgs.shadow}/bin/login %I ${speeds}";+in "@${pkgs.utillinux}/sbin/agetty agetty --login-program ${pkgs.shadow}/bin/login %I ${speeds} $TERM";+{ unitConfig.ConditionPathExists = "/dev/pts/%I"; # Work around being respawned when "machinectl login" exits.+serviceConfig.ExecStart = "@${pkgs.utillinux}/sbin/agetty agetty --noclear --login-program ${pkgs.shadow}/bin/login --keep-baud pts/%I 115200,38400,9600 $TERM";
+7
-4
nixos/modules/services/ttys/gpm.nix
+7
-4
nixos/modules/services/ttys/gpm.nix
···
+1
-1
nixos/modules/services/web-servers/apache-httpd/default.nix
+1
-1
nixos/modules/services/web-servers/apache-httpd/default.nix
···-example = literalExample ''[ "proxy_connect" { name = "php5"; path = "''${php}/modules/libphp5.so"; } ]'';+example = literalExample ''[ "proxy_connect" { name = "php5"; path = "''${pkgs.php}/modules/libphp5.so"; } ]'';
+1
-1
nixos/modules/services/x11/desktop-managers/kde4.nix
+1
-1
nixos/modules/services/x11/desktop-managers/kde4.nix
···
-11
nixos/modules/services/x11/display-managers/default.nix
-11
nixos/modules/services/x11/display-managers/default.nix
···
+3
-14
nixos/modules/services/x11/xserver.nix
+3
-14
nixos/modules/services/x11/xserver.nix
······
+18
-8
nixos/modules/system/activation/switch-to-configuration.pl
+18
-8
nixos/modules/system/activation/switch-to-configuration.pl
······+parseKeyValues($info, read_file("${filename}.d/overrides.conf")) if -f "${filename}.d/overrides.conf";+return abs_path($s) . (-f "${s}.d/overrides.conf" ? " " . abs_path "${s}.d/overrides.conf" : "");···if ($unit eq "sysinit.target" || $unit eq "basic.target" || $unit eq "multi-user.target" || $unit eq "graphical.target") {···
+1
nixos/modules/system/activation/top-level.nix
+1
nixos/modules/system/activation/top-level.nix
···echo -n "systemd ${toString config.systemd.package.interfaceVersion}" > $out/init-interface-version
+8
-19
nixos/modules/system/boot/kernel.nix
+8
-19
nixos/modules/system/boot/kernel.nix
···
-2
nixos/modules/system/boot/stage-1-init.sh
-2
nixos/modules/system/boot/stage-1-init.sh
+1
-1
nixos/modules/system/boot/stage-1.nix
+1
-1
nixos/modules/system/boot/stage-1.nix
···
+15
-15
nixos/modules/system/boot/stage-2-init.sh
+15
-15
nixos/modules/system/boot/stage-2-init.sh
·········
+3
nixos/modules/system/boot/stage-2.nix
+3
nixos/modules/system/boot/stage-2.nix
······
+37
-22
nixos/modules/system/boot/systemd-unit-options.nix
+37
-22
nixos/modules/system/boot/systemd-unit-options.nix
······-description = "Path to an upstream unit file on which the NixOS unit configuration will be based.";························
+171
-107
nixos/modules/system/boot/systemd.nix
+171
-107
nixos/modules/system/boot/systemd.nix
·····················let x = pkgs.writeTextFile { name = "unit-script"; executable = true; destination = "/bin/${name}"; inherit text; };···-[ (mkIf (config.baseUnit == null) { # Default path for systemd services. Should be quite minimal.·····················+<citerefentry><refentrytitle>tmpfiles.d</refentrytitle><manvolnum>5</manvolnum></citerefentry>···+assertion = service.serviceConfig.Type or "" == "oneshot" -> service.serviceConfig.Restart or "no" == "no";······
+1
-1
nixos/modules/system/upstart/upstart.nix
+1
-1
nixos/modules/system/upstart/upstart.nix
···if job.daemonType == "fork" || job.daemonType == "daemon" then { Type = "forking"; GuessMainPID = true; } else
+24
-22
nixos/modules/tasks/cpu-freq.nix
+24
-22
nixos/modules/tasks/cpu-freq.nix
······
+1
-13
nixos/modules/tasks/kbd.nix
+1
-13
nixos/modules/tasks/kbd.nix
···
+4
-2
nixos/modules/tasks/lvm.nix
+4
-2
nixos/modules/tasks/lvm.nix
+9
nixos/modules/tasks/network-interfaces.nix
+9
nixos/modules/tasks/network-interfaces.nix
···
+2
nixos/modules/testing/test-instrumentation.nix
+2
nixos/modules/testing/test-instrumentation.nix
+10
-26
nixos/modules/virtualisation/container-config.nix
+10
-26
nixos/modules/virtualisation/container-config.nix
···-ExecStart = "${pkgs.socat}/bin/socat -t0 - exec:${pkgs.shadow}/bin/login,pty,setsid,setpgid,stderr,ctty";
+11
-17
nixos/modules/virtualisation/containers.nix
+11
-17
nixos/modules/virtualisation/containers.nix
······+if [ "$(< ''${SYSTEM_PATH:-/nix/var/nix/profiles/per-container/$INSTANCE/system}/system)" = i686-linux ]; then···
+1
-1
nixos/modules/virtualisation/nixos-container.pl
+1
-1
nixos/modules/virtualisation/nixos-container.pl
+5
nixos/modules/virtualisation/qemu-vm.nix
+5
nixos/modules/virtualisation/qemu-vm.nix
···
+1
nixos/release-combined.nix
+1
nixos/release-combined.nix
+1
nixos/release.nix
+1
nixos/release.nix
+2
-2
nixos/tests/containers.nix
+2
-2
nixos/tests/containers.nix
······
+4
-1
nixos/tests/login.nix
+4
-1
nixos/tests/login.nix
······
+17
nixos/tests/misc.nix
+17
nixos/tests/misc.nix
······
+2
nixos/tests/printing.nix
+2
nixos/tests/printing.nix
···
+1
-1
nixos/tests/udisks.nix
+1
-1
nixos/tests/udisks.nix
···$machine->succeed("su - alice -c 'udisks --enumerate | grep /org/freedesktop/UDisks/devices/sda1'");
+56
nixos/tests/udisks2.nix
+56
nixos/tests/udisks2.nix
···+$machine->succeed("su - alice -c 'cat /run/media/alice/USBSTICK/test.txt'") =~ /Hello World/ or die;
+5
-18
pkgs/development/libraries/dbus/default.nix
+5
-18
pkgs/development/libraries/dbus/default.nix
·········
+42
pkgs/os-specific/linux/cpupower/default.nix
+42
pkgs/os-specific/linux/cpupower/default.nix
···
+19
-18
pkgs/os-specific/linux/firmware/firmware-linux-nonfree/default.nix
+19
-18
pkgs/os-specific/linux/firmware/firmware-linux-nonfree/default.nix
···
-61
pkgs/os-specific/linux/kernel-headers/2.6.28.nix
-61
pkgs/os-specific/linux/kernel-headers/2.6.28.nix
···
+71
pkgs/os-specific/linux/kernel-headers/3.14.nix
+71
pkgs/os-specific/linux/kernel-headers/3.14.nix
···
+1
pkgs/os-specific/linux/kernel/common-config.nix
+1
pkgs/os-specific/linux/kernel/common-config.nix
+2
-2
pkgs/os-specific/linux/kmod/default.nix
+2
-2
pkgs/os-specific/linux/kmod/default.nix
···
+41
-5
pkgs/os-specific/linux/kmod/module-dir.patch
+41
-5
pkgs/os-specific/linux/kmod/module-dir.patch
·········
+4
-2
pkgs/os-specific/linux/lvm2/default.nix
+4
-2
pkgs/os-specific/linux/lvm2/default.nix
·········
+3
-3
pkgs/os-specific/linux/nvidia-x11/default.nix
+3
-3
pkgs/os-specific/linux/nvidia-x11/default.nix
······url = "http://us.download.nvidia.com/XFree86/Linux-x86/${versionNumber}/NVIDIA-Linux-x86-${versionNumber}.run";url = "http://us.download.nvidia.com/XFree86/Linux-x86_64/${versionNumber}/NVIDIA-Linux-x86_64-${versionNumber}-no-compat32.run";
+3
-3
pkgs/os-specific/linux/pam/default.nix
+3
-3
pkgs/os-specific/linux/pam/default.nix
···
+23
-28
pkgs/os-specific/linux/systemd/default.nix
+23
-28
pkgs/os-specific/linux/systemd/default.nix
·········-for i in src/remount-fs/remount-fs.c src/core/mount.c src/core/swap.c src/fsck/fsck.c units/emergency.service.in units/rescue.service.m4.in src/journal/cat.c src/core/shutdown.c; do+for i in src/remount-fs/remount-fs.c src/core/mount.c src/core/swap.c src/fsck/fsck.c units/emergency.service.in units/rescue.service.m4.in src/journal/cat.c src/core/shutdown.c src/nspawn/nspawn.c; do···+NIX_LDFLAGS = "-rpath ${pam}/lib -rpath ${libcap}/lib -rpath ${acl}/lib -rpath ${stdenv.gcc.gcc}/lib";···"-UPOLKIT_AGENT_BINARY_PATH" "-DPOLKIT_AGENT_BINARY_PATH=\"/run/current-system/sw/bin/pkttyagent\""···-installFlags = "localstatedir=$(TMPDIR)/var sysconfdir=$(out)/etc sysvinitdir=$(TMPDIR)/etc/init.d";······
-14
pkgs/os-specific/linux/systemd/fix_console_in_containers.patch
-14
pkgs/os-specific/linux/systemd/fix_console_in_containers.patch
···
+184
-628
pkgs/os-specific/linux/systemd/fixes.patch
+184
-628
pkgs/os-specific/linux/systemd/fixes.patch
···-SUBSYSTEM=="block", KERNEL!="ram*|loop*", ENV{DM_UDEV_DISABLE_OTHER_RULES_FLAG}=="1", ENV{SYSTEMD_READY}="0"+SUBSYSTEM=="block", KERNEL!="ram*", ENV{DM_UDEV_DISABLE_OTHER_RULES_FLAG}=="1", ENV{SYSTEMD_READY}="0"--SUBSYSTEM=="block", KERNEL!="ram*|loop*", ENV{DM_UUID}=="CRYPT-*", ENV{ID_PART_TABLE_TYPE}=="", ENV{ID_FS_USAGE}=="", ENV{SYSTEMD_READY}="0"+-SUBSYSTEM=="block", KERNEL!="ram*", ENV{DM_UUID}=="CRYPT-*", ENV{ID_PART_TABLE_TYPE}=="", ENV{ID_FS_USAGE}=="", ENV{SYSTEMD_READY}="0"SUBSYSTEM=="block", ENV{DEVTYPE}=="disk", KERNEL=="md*", TEST!="md/array_state", ENV{SYSTEMD_READY}="0"SUBSYSTEM=="block", ENV{DEVTYPE}=="disk", KERNEL=="md*", ATTR{md/array_state}=="|clear|inactive", ENV{SYSTEMD_READY}="0"-@@ -255,7 +255,7 @@ static int map_blkio(const CGroupSemantics *s, const char *value, char **ret) {-{ "memory", "memory.soft_limit_in_bytes", "MemorySoftLimit", false, parse_memory_limit, NULL, NULL },-@@ -1550,7 +1550,7 @@ static DBusHandlerResult bus_manager_message_handler(DBusConnection *connection,-@@ -1577,7 +1577,7 @@ static DBusHandlerResult bus_manager_message_handler(DBusConnection *connection,-@@ -1605,7 +1605,7 @@ static DBusHandlerResult bus_manager_message_handler(DBusConnection *connection,-@@ -93,6 +93,7 @@ static DEFINE_BUS_PROPERTY_APPEND_ENUM(bus_swap_append_swap_result, swap_result,-BUS_EXEC_COMMAND_PROPERTY("ExecActivate", offsetof(Swap, exec_command[SWAP_EXEC_ACTIVATE]), false),-BUS_EXEC_COMMAND_PROPERTY("ExecDeactivate", offsetof(Swap, exec_command[SWAP_EXEC_DEACTIVATE]), false),···-@@ -2776,6 +2779,14 @@ static int service_deserialize_item(Unit *u, const char *key, const char *value,-@@ -217,8 +217,10 @@ int snapshot_create(Manager *m, const char *name, bool cleanup, DBusError *e, Sn-@@ -435,6 +435,8 @@ static int mount_points_list_umount(MountPoint **head, bool *changed, bool log_e+@@ -404,6 +404,8 @@ static int mount_points_list_umount(MountPoint **head, bool *changed, bool log_e···-@@ -299,7 +299,7 @@ _public_ struct udev_list_entry *udev_enumerate_get_list_entry(struct udev_enume-@@ -718,6 +718,8 @@ static bool match_subsystem(struct udev_enumerate *udev_enumerate, const char *s-udev_list_entry_foreach(list_entry, udev_list_get_entry(&udev_enumerate->subsystem_nomatch_list)) {-static int parent_crawl_children(struct udev_enumerate *enumerate, const char *path, int maxdepth)···-- const char *unix_process = "unix-process", *pid = "pid", *starttime = "start-time", *cancel_id = "";-@@ -1482,7 +1482,7 @@ static DBusHandlerResult wait_filter(DBusConnection *connection, DBusMessage *me-} else if (dbus_message_is_signal(message, "org.freedesktop.systemd1.Manager", "JobRemoved")) {-@@ -1491,7 +1491,11 @@ static DBusHandlerResult wait_filter(DBusConnection *connection, DBusMessage *me-@@ -1511,7 +1515,11 @@ static DBusHandlerResult wait_filter(DBusConnection *connection, DBusMessage *me···ExecStartPre=-/bin/echo -e 'Welcome to emergency mode! After logging in, type "journalctl -xb" to view\\nsystem logs, "systemctl reboot" to reboot, "systemctl default" to try again\\nto boot into default mode.'+@@ -10,7 +10,6 @@ Description=Create list of required static device nodes for the current kernel···ExecStartPre=-/bin/echo -e 'Welcome to rescue mode! Type "systemctl default" or ^D to enter default mode.\\nType "journalctl -xb" to view system logs. Type "systemctl reboot" to reboot.'···-@@ -24,3 +24,8 @@ CapabilityBoundingSet=CAP_SYS_ADMIN CAP_DAC_OVERRIDE CAP_SYS_PTRACE CAP_SYSLOG C···diff --git a/units/systemd-user-sessions.service.in b/units/systemd-user-sessions.service.in
-81
pkgs/os-specific/linux/systemd/libc-bug-accept4-arm.patch
-81
pkgs/os-specific/linux/systemd/libc-bug-accept4-arm.patch
···-@@ -181,6 +182,7 @@ struct udev_ctrl_connection *udev_ctrl_get_connection(struct udev_ctrl *uctrl)-@@ -188,13 +190,19 @@ struct udev_ctrl_connection *udev_ctrl_get_connection(struct udev_ctrl *uctrl)
+4
-8
pkgs/os-specific/linux/util-linux/default.nix
+4
-8
pkgs/os-specific/linux/util-linux/default.nix
······
+3
-3
pkgs/servers/x11/xorg/default.nix
+3
-3
pkgs/servers/x11/xorg/default.nix
···xorgserver = (stdenv.mkDerivation ((if overrides ? xorgserver then overrides.xorgserver else x: x) {buildInputs = [pkgconfig renderproto libdrm openssl libX11 libXau libXaw libXdmcp libXfixes libxkbfile libXmu libXpm libXrender libXres libXt libXv ];
+1
-1
pkgs/servers/x11/xorg/tarballs-7.7.list
+1
-1
pkgs/servers/x11/xorg/tarballs-7.7.list
···
+8
-10
pkgs/stdenv/generic/default.nix
+8
-10
pkgs/stdenv/generic/default.nix
···pos' = if pos != null then "‘" + pos.file + ":" + toString pos.line + "’" else "«unknown-file»";if !allowUnfree && (let l = lib.lists.toList attrs.meta.license or []; in lib.lists.elem "unfree" l || lib.lists.elem "unfree-redistributable" l) then
+2
-2
pkgs/tools/networking/dhcpcd/default.nix
+2
-2
pkgs/tools/networking/dhcpcd/default.nix
···
+16
-15
pkgs/top-level/all-packages.nix
+16
-15
pkgs/top-level/all-packages.nix
·········-linuxHeaders26Cross = forceNativeDrv (import ../os-specific/linux/kernel-headers/2.6.32.nix {+linuxHeaders26Cross = forceNativeDrv (import ../os-specific/linux/kernel-headers/2.6.32.nix {·········