diff --git a/nixos/doc/manual/release-notes/rl-1909.xml b/nixos/doc/manual/release-notes/rl-1909.xml
index ef23099f4f3..7d2d98ddfee 100644
--- a/nixos/doc/manual/release-notes/rl-1909.xml
+++ b/nixos/doc/manual/release-notes/rl-1909.xml
@@ -263,6 +263,16 @@
false.
+
+
+ The module has been removed from nixpkgs due to lack of maintainer.
+
+
+
+
+ The module has been removed from nixpkgs due to lack of maintainer.
+
+
diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix
index 0c33075a900..27df3c39117 100644
--- a/nixos/modules/module-list.nix
+++ b/nixos/modules/module-list.nix
@@ -437,7 +437,6 @@
./services/misc/logkeys.nix
./services/misc/leaps.nix
./services/misc/lidarr.nix
- ./services/misc/mantisbt.nix
./services/misc/mathics.nix
./services/misc/matrix-synapse.nix
./services/misc/mbpfan.nix
@@ -522,7 +521,6 @@
./services/monitoring/scollector.nix
./services/monitoring/smartd.nix
./services/monitoring/sysstat.nix
- ./services/monitoring/systemhealth.nix
./services/monitoring/teamviewer.nix
./services/monitoring/telegraf.nix
./services/monitoring/thanos.nix
diff --git a/nixos/modules/services/logging/awstats.nix b/nixos/modules/services/logging/awstats.nix
index 612ae06d0a7..54799d699a7 100644
--- a/nixos/modules/services/logging/awstats.nix
+++ b/nixos/modules/services/logging/awstats.nix
@@ -4,6 +4,7 @@ with lib;
let
cfg = config.services.awstats;
+ httpd = config.services.httpd;
package = pkgs.awstats;
in
@@ -67,50 +68,43 @@ in
environment.etc."awstats/awstats.conf".source = pkgs.runCommand "awstats.conf"
{ preferLocalBuild = true; }
( let
- cfg-httpd = config.services.httpd;
logFormat =
- if cfg-httpd.logFormat == "combined" then "1" else
- if cfg-httpd.logFormat == "common" then "4" else
- throw "awstats service doesn't support Apache log format `${cfg-httpd.logFormat}`";
+ if httpd.logFormat == "combined" then "1" else
+ if httpd.logFormat == "common" then "4" else
+ throw "awstats service doesn't support Apache log format `${httpd.logFormat}`";
in
''
sed \
-e 's|^\(DirData\)=.*$|\1="${cfg.vardir}"|' \
-e 's|^\(DirIcons\)=.*$|\1="icons"|' \
-e 's|^\(CreateDirDataIfNotExists\)=.*$|\1=1|' \
- -e 's|^\(SiteDomain\)=.*$|\1="${cfg-httpd.hostName}"|' \
- -e 's|^\(LogFile\)=.*$|\1="${cfg-httpd.logDir}/access_log"|' \
+ -e 's|^\(SiteDomain\)=.*$|\1="${httpd.hostName}"|' \
+ -e 's|^\(LogFile\)=.*$|\1="${httpd.logDir}/access_log"|' \
-e 's|^\(LogFormat\)=.*$|\1=${logFormat}|' \
< '${package.out}/wwwroot/cgi-bin/awstats.model.conf' > "$out"
echo '${cfg.extraConfig}' >> "$out"
'');
- # The httpd sub-service showing awstats.
- services.httpd.enable = mkIf cfg.service.enable true;
- services.httpd.extraSubservices = mkIf cfg.service.enable [ { function = { serverInfo, ... }: {
- extraConfig =
- ''
- Alias ${cfg.service.urlPrefix}/classes "${package.out}/wwwroot/classes/"
- Alias ${cfg.service.urlPrefix}/css "${package.out}/wwwroot/css/"
- Alias ${cfg.service.urlPrefix}/icons "${package.out}/wwwroot/icon/"
- ScriptAlias ${cfg.service.urlPrefix}/ "${package.out}/wwwroot/cgi-bin/"
+ systemd.tmpfiles.rules = optionals cfg.service.enable [
+ "d '${cfg.vardir}' - ${httpd.user} ${httpd.group} - -"
+ "Z '${cfg.vardir}' - ${httpd.user} ${httpd.group} - -"
+ ];
-
- Options None
- AllowOverride None
- Order allow,deny
- Allow from all
-
- '';
- startupScript =
- let
- inherit (serverInfo.serverConfig) user group;
- in pkgs.writeScript "awstats_startup.sh"
- ''
- mkdir -p '${cfg.vardir}'
- chown '${user}:${group}' '${cfg.vardir}'
- '';
- };}];
+ # The httpd sub-service showing awstats.
+ services.httpd = optionalAttrs cfg.service.enable {
+ enable = true;
+ extraConfig = ''
+ Alias ${cfg.service.urlPrefix}/classes "${package.out}/wwwroot/classes/"
+ Alias ${cfg.service.urlPrefix}/css "${package.out}/wwwroot/css/"
+ Alias ${cfg.service.urlPrefix}/icons "${package.out}/wwwroot/icon/"
+ ScriptAlias ${cfg.service.urlPrefix}/ "${package.out}/wwwroot/cgi-bin/"
+
+
+ Options None
+ Require all granted
+
+ '';
+ };
systemd.services.awstats-update = mkIf (cfg.updateAt != null) {
description = "awstats log collector";
diff --git a/nixos/modules/services/misc/mantisbt.nix b/nixos/modules/services/misc/mantisbt.nix
deleted file mode 100644
index 7e3474feb67..00000000000
--- a/nixos/modules/services/misc/mantisbt.nix
+++ /dev/null
@@ -1,68 +0,0 @@
-{ config, lib, pkgs, ... }:
-
-with lib;
-let
- cfg = config.services.mantisbt;
-
- freshInstall = cfg.extraConfig == "";
-
- # combined code+config directory
- mantisbt = let
- config_inc = pkgs.writeText "config_inc.php" ("${configFile} << EOF
- [paths]
- rrdtool = ${pkgs.rrdtool}/bin/rrdtool
- loadavg_rrd = loadavg
- ps = /run/current-system/sw/bin/ps
- df = /run/current-system/sw/bin/df
- meminfo_rrd = meminfo
- uptime_rrd = uptime
- rrd_path = ${rrdDir}
- png_path = ${htmlDir}
-
- [processes]
-
- [interfaces]
- ${interfacesSection}
-
- [drives]
- ${drivesSection}
-
- [graphs]
- width = 400
- time = ['-3hours', '-32hours', '-8days', '-5weeks', '-13months']
- height = 100
-
- [external]
-
- EOF
-
- chown wwwrun:wwwrun ${configFile}
-
- ${pkgs.su}/bin/su -s "/bin/sh" -c "${command} --check" wwwrun
- ${pkgs.su}/bin/su -s "/bin/sh" -c "${command} --html" wwwrun
- '';
-
- services.httpd.extraSubservices = [
- { function = f: {
- extraConfig = ''
- Alias ${cfg.urlPrefix} ${htmlDir}
-
-
- Order allow,deny
- Allow from all
-
- '';
- };
- }
- ];
- };
-}
diff --git a/nixos/tests/php-pcre.nix b/nixos/tests/php-pcre.nix
index 19bde9babad..ae44aec7944 100644
--- a/nixos/tests/php-pcre.nix
+++ b/nixos/tests/php-pcre.nix
@@ -8,30 +8,25 @@ import ./make-test.nix ({ ...}: {
services.httpd = {
enable = true;
adminAddr = "please@dont.contact";
- extraSubservices = lib.singleton {
- function = f: {
- enablePHP = true;
- phpOptions = "pcre.jit = true";
+ enablePHP = true;
+ phpOptions = "pcre.jit = true";
+ extraConfig =
+ let
+ testRoot = pkgs.writeText "index.php"
+ ''
+
+ '';
+ in
+ ''
+ Alias / ${testRoot}/
- extraConfig =
- let
- testRoot = pkgs.writeText "index.php"
- ''
-
- '';
- in
- ''
- Alias / ${testRoot}/
-
-
- Require all granted
-
- '';
- };
- };
+
+ Require all granted
+
+ '';
};
};
testScript = { ... }:
diff --git a/nixos/tests/subversion.nix b/nixos/tests/subversion.nix
deleted file mode 100644
index e7b99b10602..00000000000
--- a/nixos/tests/subversion.nix
+++ /dev/null
@@ -1,121 +0,0 @@
-import ./make-test.nix ({ pkgs, ...} :
-
-let
-
- # Build some packages with coverage instrumentation.
- overrides = pkgs:
- with pkgs.stdenvAdapters;
- let
- do = pkg: pkg.override (args: {
- stdenv = addCoverageInstrumentation args.stdenv;
- });
- in
- rec {
- apr = do pkgs.apr;
- aprutil = do pkgs.aprutil;
- apacheHttpd = do pkgs.apacheHttpd;
- mod_python = do pkgs.mod_python;
- subversion = do pkgs.subversion;
-
- # To build the kernel with coverage instrumentation, we need a
- # special patch to make coverage data available under /proc.
- linux = pkgs.linux.override (orig: {
- stdenv = overrideInStdenv pkgs.stdenv [ pkgs.keepBuildTree ];
- extraConfig =
- ''
- GCOV_KERNEL y
- GCOV_PROFILE_ALL y
- '';
- });
- };
-
-in
-
-{
- name = "subversion";
- meta = with pkgs.stdenv.lib.maintainers; {
- maintainers = [ eelco ];
- };
-
- nodes =
- { webserver =
- { ... }:
-
- {
- services.httpd.enable = true;
- services.httpd.adminAddr = "e.dolstra@tudelft.nl";
- services.httpd.extraSubservices =
- [ { function = import ;
- urlPrefix = "";
- dataDir = "/data/subversion";
- userCreationDomain = "192.168.0.0/16";
- }
- ];
- nixpkgs.config.packageOverrides = overrides;
- };
-
- client =
- { pkgs, ... }:
-
- {
- environment.systemPackages = [ pkgs.subversion ];
- nixpkgs.config.packageOverrides = overrides;
- };
-
- };
-
- testScript =
- ''
- startAll;
-
- $webserver->waitForOpenPort(80);
-
- print STDERR $client->succeed("svn --version");
-
- print STDERR $client->succeed("curl --fail http://webserver/");
-
- # Create a new user through the web interface.
- $client->succeed("curl --fail -F username=alice -F fullname='Alice Lastname' -F address=alice\@example.org -F password=foobar -F password_again=foobar http://webserver/repoman/adduser");
-
- # Let Alice create a new repository.
- $client->succeed("curl --fail -u alice:foobar --form repo=xyzzy --form description=Xyzzy http://webserver/repoman/create");
-
- $client->succeed("curl --fail http://webserver/") =~ /alice/ or die;
-
- # Let Alice do a checkout.
- my $svnFlags = "--non-interactive --username alice --password foobar";
- $client->succeed("svn co $svnFlags http://webserver/repos/xyzzy wc");
- $client->succeed("echo hello > wc/world");
- $client->succeed("svn add wc/world");
- $client->succeed("svn ci $svnFlags -m 'Added world.' wc/world");
-
- # Create a new user on the server through the create-user.pl script.
- $webserver->execute("svn-server-create-user.pl bob bob\@example.org Bob");
- $webserver->succeed("svn-server-resetpw.pl bob fnord");
- $client->succeed("curl --fail http://webserver/") =~ /bob/ or die;
-
- # Bob should not have access to the repo.
- my $svnFlagsBob = "--non-interactive --username bob --password fnord";
- $client->fail("svn co $svnFlagsBob http://webserver/repos/xyzzy wc2");
-
- # Bob should not be able change the ACLs of the repo.
- # !!! Repoman should really return a 403 here.
- $client->succeed("curl --fail -u bob:fnord -F description=Xyzzy -F readers=alice,bob -F writers=alice -F watchers= -F tardirs= http://webserver/repoman/update/xyzzy")
- =~ /not authorised/ or die;
-
- # Give Bob access.
- $client->succeed("curl --fail -u alice:foobar -F description=Xyzzy -F readers=alice,bob -F writers=alice -F watchers= -F tardirs= http://webserver/repoman/update/xyzzy");
-
- # So now his checkout should succeed.
- $client->succeed("svn co $svnFlagsBob http://webserver/repos/xyzzy wc2");
-
- # Test ViewVC and WebSVN
- $client->succeed("curl --fail -u alice:foobar http://webserver/viewvc/xyzzy");
- $client->succeed("curl --fail -u alice:foobar http://webserver/websvn/xyzzy");
- $client->succeed("curl --fail -u alice:foobar http://webserver/repos-xml/xyzzy");
-
- # Stop Apache to gather all the coverage data.
- $webserver->stopJob("httpd");
- '';
-
-})