From 121e2f7e1554794e7392427cf77e94ab9887871e Mon Sep 17 00:00:00 2001 From: wucke13 Date: Sun, 19 Dec 2021 13:39:42 +0100 Subject: [PATCH 01/91] honor sdImage.compressImage in intermediate build steps --- nixos/lib/make-ext4-fs.nix | 9 +++++++++ nixos/modules/installer/sd-card/sd-image.nix | 15 ++++++++++----- 2 files changed, 19 insertions(+), 5 deletions(-) diff --git a/nixos/lib/make-ext4-fs.nix b/nixos/lib/make-ext4-fs.nix index 416beeb32f2..b8e1b8d24c4 100644 --- a/nixos/lib/make-ext4-fs.nix +++ b/nixos/lib/make-ext4-fs.nix @@ -78,6 +78,15 @@ pkgs.stdenv.mkDerivation { # get rid of the unnecessary slack here--but see # https://github.com/NixOS/nixpkgs/issues/125121 for caveats. + # shrink to fit + resize2fs -M $img + + # Add 16 MebiByte to the current_size + new_size=$(dumpe2fs -h $img | awk -F: \ + '/Block count/{count=$2} /Block size/{size=$2} END{print (count*size+16*2**20)/size}') + + resize2fs $img $new_size + if [ ${builtins.toString compressImage} ]; then echo "Compressing image" zstd -v --no-progress ./$img -o $out diff --git a/nixos/modules/installer/sd-card/sd-image.nix b/nixos/modules/installer/sd-card/sd-image.nix index a964cf2d6f8..1fd2db39fc5 100644 --- a/nixos/modules/installer/sd-card/sd-image.nix +++ b/nixos/modules/installer/sd-card/sd-image.nix @@ -18,7 +18,7 @@ with lib; let rootfsImage = pkgs.callPackage ../../../lib/make-ext4-fs.nix ({ inherit (config.sdImage) storePaths; - compressImage = true; + compressImage = config.sdImage.compressImage; populateImageCommands = config.sdImage.populateRootCommands; volumeLabel = "NIXOS_SD"; } // optionalAttrs (config.sdImage.rootPartitionUUID != null) { @@ -174,7 +174,8 @@ in mtools, libfaketime, util-linux, zstd }: stdenv.mkDerivation { name = config.sdImage.imageName; - nativeBuildInputs = [ dosfstools e2fsprogs mtools libfaketime util-linux zstd ]; + nativeBuildInputs = [ dosfstools e2fsprogs libfaketime mtools util-linux ] + ++ lib.optional config.sdImage.compressImage zstd; inherit (config.sdImage) compressImage; @@ -189,14 +190,18 @@ in echo "file sd-image $img" >> $out/nix-support/hydra-build-products fi + root_fs=${rootfsImage} + ${lib.optionalString config.sdImage.compressImage '' + root_fs=./root-fs.img echo "Decompressing rootfs image" - zstd -d --no-progress "${rootfsImage}" -o ./root-fs.img + zstd -d --no-progress "${rootfsImage}" -o $root_fs + ''} # Gap in front of the first partition, in MiB gap=${toString config.sdImage.firmwarePartitionOffset} # Create the image file sized to fit /boot/firmware and /, plus slack for the gap. - rootSizeBlocks=$(du -B 512 --apparent-size ./root-fs.img | awk '{ print $1 }') + rootSizeBlocks=$(du -B 512 --apparent-size $root_fs | awk '{ print $1 }') firmwareSizeBlocks=$((${toString config.sdImage.firmwareSize} * 1024 * 1024 / 512)) imageSize=$((rootSizeBlocks * 512 + firmwareSizeBlocks * 512 + gap * 1024 * 1024)) truncate -s $imageSize $img @@ -214,7 +219,7 @@ in # Copy the rootfs into the SD image eval $(partx $img -o START,SECTORS --nr 2 --pairs) - dd conv=notrunc if=./root-fs.img of=$img seek=$START count=$SECTORS + dd conv=notrunc if=$root_fs of=$img seek=$START count=$SECTORS # Create a FAT32 /boot/firmware partition of suitable size into firmware_part.img eval $(partx $img -o START,SECTORS --nr 1 --pairs) From 83602a5aba89105ba5b8d6cbf30c88e497d1e482 Mon Sep 17 00:00:00 2001 From: FliegendeWurst <2012gdwu+github@posteo.de> Date: Sun, 22 May 2022 17:54:13 +0200 Subject: [PATCH 02/91] htmldoc: 1.9.15 -> 1.9.16 --- pkgs/tools/typesetting/htmldoc/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/tools/typesetting/htmldoc/default.nix b/pkgs/tools/typesetting/htmldoc/default.nix index 9ce2de02d30..06c660625ae 100644 --- a/pkgs/tools/typesetting/htmldoc/default.nix +++ b/pkgs/tools/typesetting/htmldoc/default.nix @@ -2,12 +2,12 @@ stdenv.mkDerivation rec { pname = "htmldoc"; - version = "1.9.15"; + version = "1.9.16"; src = fetchFromGitHub { owner = "michaelrsweet"; repo = "htmldoc"; rev = "v${version}"; - sha256 = "sha256-WNsYJacZBYoZ8Bxj+InQ9ePvelqhU5y9nY7aikUNxEk="; + sha256 = "117cj5sfzl18gan53ld8lxb0wycizcp9jcakcs3nsvnss99rw3a6"; }; nativeBuildInputs = [ pkg-config ]; From fa22eab4c1313eeb57a8c77b4bf6b01bd3f05e6e Mon Sep 17 00:00:00 2001 From: Thomas Gerbet Date: Sun, 22 May 2022 18:20:49 +0200 Subject: [PATCH 03/91] metabase: 0.42.1 -> 0.43.1 Fixes CVE-2022-24853, CVE-2022-24854 and CVE-2022-24855 https://github.com/metabase/metabase/releases/tag/v0.43.1 https://github.com/metabase/metabase/releases/tag/v0.43.0 --- pkgs/servers/metabase/default.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/servers/metabase/default.nix b/pkgs/servers/metabase/default.nix index 814626fec12..f31b2547f52 100644 --- a/pkgs/servers/metabase/default.nix +++ b/pkgs/servers/metabase/default.nix @@ -2,11 +2,11 @@ stdenv.mkDerivation rec { pname = "metabase"; - version = "0.42.1"; + version = "0.43.1"; src = fetchurl { url = "https://downloads.metabase.com/v${version}/metabase.jar"; - hash = "sha256-PmcVVAS/5mDhmOSoFvkZeYkbvFD/KOcgVYuScwD4Olg="; + hash = "sha256-WGbIsmCWsSxgE7Ktr539qTt/o5cJrYi0yu3ZkfbxOV0="; }; nativeBuildInputs = [ makeWrapper ]; From c3182eace3fe93b30e4e245254bd0503c6bd183f Mon Sep 17 00:00:00 2001 From: Thomas Gerbet Date: Sun, 22 May 2022 18:45:16 +0200 Subject: [PATCH 04/91] panotools: 2.9.20 -> 2.9.21 Fixes CVE-2021-33293 https://sourceforge.net/projects/panotools/files/libpano13/libpano13-2.9.21/ --- pkgs/applications/graphics/panotools/default.nix | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/pkgs/applications/graphics/panotools/default.nix b/pkgs/applications/graphics/panotools/default.nix index 52351fab4ce..dbc5b973fe9 100644 --- a/pkgs/applications/graphics/panotools/default.nix +++ b/pkgs/applications/graphics/panotools/default.nix @@ -1,15 +1,16 @@ -{ fetchurl, lib, stdenv, libjpeg, libpng, libtiff, perl }: +{ fetchurl, lib, stdenv, libjpeg, libpng, libtiff, perl, cmake }: stdenv.mkDerivation rec { pname = "libpano13"; - version = "2.9.20"; + version = "2.9.21"; src = fetchurl { url = "mirror://sourceforge/panotools/${pname}-${version}.tar.gz"; - sha256 = "12cv4886l1czfjwy7k6ipgf3zjksgwhdjzr2s9fdg33vqcv2hlrv"; + sha256 = "sha256-eeWhRSGZMF4pYUYnIO9ZQRUnecEnxblvw0DSSS5jNZA="; }; buildInputs = [ perl libjpeg libpng libtiff ]; + nativeBuildInputs = [ cmake ]; # one of the tests succeeds on my machine but fails on Hydra (no idea why) #doCheck = true; From 116832edbf8da93dedaca69384083e57b7c9f9a0 Mon Sep 17 00:00:00 2001 From: Robert Hensing Date: Fri, 3 Dec 2021 12:23:23 +0000 Subject: [PATCH 05/91] dockerTools: Add example of using NixOS' etc (cherry picked from commit 9b2af8673be82d48ce76c8c152de85ad921d26ba) --- nixos/tests/docker-tools.nix | 5 ++++ pkgs/build-support/docker/examples.nix | 41 ++++++++++++++++++++++++++ 2 files changed, 46 insertions(+) diff --git a/nixos/tests/docker-tools.nix b/nixos/tests/docker-tools.nix index 80859ac7a96..99a968f17af 100644 --- a/nixos/tests/docker-tools.nix +++ b/nixos/tests/docker-tools.nix @@ -419,5 +419,10 @@ import ./make-test-python.nix ({ pkgs, ... }: { "docker rmi layered-image-with-path", ) + with subtest("etc"): + docker.succeed("${examples.etc} | docker load") + docker.succeed("docker run --rm etc | grep localhost") + docker.succeed("docker image rm etc:latest") + ''; }) diff --git a/pkgs/build-support/docker/examples.nix b/pkgs/build-support/docker/examples.nix index 9b9a21a1469..a1be3a111fb 100644 --- a/pkgs/build-support/docker/examples.nix +++ b/pkgs/build-support/docker/examples.nix @@ -9,6 +9,16 @@ { pkgs, buildImage, buildLayeredImage, fakeNss, pullImage, shadowSetup, buildImageWithNixDb, pkgsCross }: +let + nixosLib = import ../../../nixos/lib { + # Experimental features need testing too, but there's no point in warning + # about it, so we enable the feature flag. + featureFlags.minimalModules = {}; + }; + evalMinimalConfig = module: nixosLib.evalModules { modules = [ module ]; }; + +in + rec { # 1. basic example bash = buildImage { @@ -582,6 +592,37 @@ rec { includeStorePaths = false; }; + etc = + let + inherit (pkgs) lib; + nixosCore = (evalMinimalConfig ({ config, ... }: { + imports = [ + pkgs.pkgsModule + ../../../nixos/modules/system/etc/etc.nix + ]; + environment.etc."hosts" = { + text = '' + 127.0.0.1 localhost + ::1 localhost + ''; + # For executables: + # mode = "0755"; + }; + })); + in pkgs.dockerTools.streamLayeredImage { + name = "etc"; + tag = "latest"; + enableFakechroot = true; + fakeRootCommands = '' + mkdir -p /etc + ${nixosCore.config.system.build.etcActivationCommands} + ''; + config.Cmd = pkgs.writeScript "etc-cmd" '' + #!${pkgs.busybox}/bin/sh + ${pkgs.busybox}/bin/cat /etc/hosts + ''; + }; + # Example export of the bash image exportBash = pkgs.dockerTools.exportImage { fromImage = bash; }; From 44522c1d5996ac1a16a2f7672b7306d557bd5a26 Mon Sep 17 00:00:00 2001 From: Robert Hensing Date: Mon, 30 May 2022 14:32:14 +0200 Subject: [PATCH 06/91] dockerTools.examples.etc: Make it a reliable test /etc/hosts is generally also provided by the container runtime. --- pkgs/build-support/docker/examples.nix | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pkgs/build-support/docker/examples.nix b/pkgs/build-support/docker/examples.nix index a1be3a111fb..f0535f59dfc 100644 --- a/pkgs/build-support/docker/examples.nix +++ b/pkgs/build-support/docker/examples.nix @@ -600,7 +600,7 @@ rec { pkgs.pkgsModule ../../../nixos/modules/system/etc/etc.nix ]; - environment.etc."hosts" = { + environment.etc."some-config-file" = { text = '' 127.0.0.1 localhost ::1 localhost @@ -619,7 +619,7 @@ rec { ''; config.Cmd = pkgs.writeScript "etc-cmd" '' #!${pkgs.busybox}/bin/sh - ${pkgs.busybox}/bin/cat /etc/hosts + ${pkgs.busybox}/bin/cat /etc/some-config-file ''; }; From 95052027078143e62c65869474d33bb2023ab184 Mon Sep 17 00:00:00 2001 From: Nikolay Korotkiy Date: Tue, 7 Jun 2022 23:44:08 +0300 Subject: [PATCH 07/91] =?UTF-8?q?gpxsee:=2011.0=20=E2=86=92=2011.1?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- pkgs/applications/misc/gpxsee/default.nix | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/pkgs/applications/misc/gpxsee/default.nix b/pkgs/applications/misc/gpxsee/default.nix index fa85ad367ec..7ce85dc6f76 100644 --- a/pkgs/applications/misc/gpxsee/default.nix +++ b/pkgs/applications/misc/gpxsee/default.nix @@ -1,14 +1,14 @@ -{ lib, stdenv, fetchFromGitHub, qmake, qttools, qttranslations, qtlocation, wrapQtAppsHook, substituteAll }: +{ lib, stdenv, fetchFromGitHub, qmake, qttools, qttranslations, qtlocation, qtpbfimageplugin, wrapQtAppsHook, substituteAll }: stdenv.mkDerivation rec { pname = "gpxsee"; - version = "11.0"; + version = "11.1"; src = fetchFromGitHub { owner = "tumic0"; repo = "GPXSee"; rev = version; - sha256 = "sha256-UT3Q7pirEXvwQmqHHiSivX/VNZPVLwRJ/aiP7wpkhqQ="; + sha256 = "sha256-0n1XPrJ+gssIP/7k9CI8AWXs9ddKOg3Lo3DfrXGUl84="; }; patches = (substituteAll { @@ -17,7 +17,7 @@ stdenv.mkDerivation rec { inherit qttranslations; }); - buildInputs = [ qtlocation ]; + buildInputs = [ qtlocation qtpbfimageplugin ]; nativeBuildInputs = [ qmake qttools wrapQtAppsHook ]; From a12e52541099e5239d645018daf26a02cc60dd5d Mon Sep 17 00:00:00 2001 From: lassulus Date: Thu, 9 Jun 2022 21:05:16 +0200 Subject: [PATCH 08/91] nixos/bitlbee: allow writing to configDir --- nixos/modules/services/networking/bitlbee.nix | 1 + 1 file changed, 1 insertion(+) diff --git a/nixos/modules/services/networking/bitlbee.nix b/nixos/modules/services/networking/bitlbee.nix index 8bf04e3a1a2..f76cffc79bf 100644 --- a/nixos/modules/services/networking/bitlbee.nix +++ b/nixos/modules/services/networking/bitlbee.nix @@ -174,6 +174,7 @@ in serviceConfig = { DynamicUser = true; StateDirectory = "bitlbee"; + ReadWritePaths = [ cfg.configDir ]; ExecStart = "${bitlbeePkg}/sbin/bitlbee -F -n -c ${bitlbeeConfig}"; }; }; From 04a5460f05815736fb9bfe53332eb218453cbe9d Mon Sep 17 00:00:00 2001 From: Luflosi Date: Mon, 9 May 2022 22:08:55 +0200 Subject: [PATCH 09/91] ipfs-cluster: 1.0.0 -> 1.0.1 https://github.com/ipfs/ipfs-cluster/releases/tag/v1.0.1 --- pkgs/applications/networking/ipfs-cluster/default.nix | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/pkgs/applications/networking/ipfs-cluster/default.nix b/pkgs/applications/networking/ipfs-cluster/default.nix index 85ad97f41b0..459610feea7 100644 --- a/pkgs/applications/networking/ipfs-cluster/default.nix +++ b/pkgs/applications/networking/ipfs-cluster/default.nix @@ -2,15 +2,15 @@ buildGoModule rec { pname = "ipfs-cluster"; - version = "1.0.0"; + version = "1.0.1"; - vendorSha256 = "sha256-b0k1V1+JikGemSQjyiKcH7cgyDEt0Nn5aVUf6nnE+/0="; + vendorSha256 = "sha256-V+fqyrol+hXjjaCBlAs6f7FeqBqa2jTmMO2bvb6HfgY="; src = fetchFromGitHub { owner = "ipfs"; repo = "ipfs-cluster"; rev = "v${version}"; - sha256 = "sha256-vwu+Fj7PegbK9pmnsNuEl/AQz2gejRiFAAAov5+VNMQ="; + sha256 = "sha256-dwV5fx52QS2QiBUV8gkJ47tBqT54tEOfSpdXF6hmeLQ="; }; meta = with lib; { From c078673f07aa272309bb6d26902c5d92d25be8eb Mon Sep 17 00:00:00 2001 From: Azat Bahawi Date: Sat, 11 Jun 2022 15:52:57 +0300 Subject: [PATCH 10/91] hyperledger-fabric: 1.3.0 -> 2.4.3 --- .../tools/misc/hyperledger-fabric/default.nix | 60 ++++++++++++------- 1 file changed, 40 insertions(+), 20 deletions(-) diff --git a/pkgs/tools/misc/hyperledger-fabric/default.nix b/pkgs/tools/misc/hyperledger-fabric/default.nix index c2c48bfa7d8..ba3c9495a43 100644 --- a/pkgs/tools/misc/hyperledger-fabric/default.nix +++ b/pkgs/tools/misc/hyperledger-fabric/default.nix @@ -1,35 +1,55 @@ -{ lib, buildGoPackage, fetchFromGitHub }: +{ lib +, buildGoModule +, fetchFromGitHub +}: -buildGoPackage rec { +buildGoModule rec { pname = "hyperledger-fabric"; - version = "1.3.0"; - - goPackagePath = "github.com/hyperledger/fabric"; - - # taken from https://github.com/hyperledger/fabric/blob/v1.3.0/Makefile#L108 - subPackages = [ - "common/tools/configtxgen" - "common/tools/configtxlator" - "common/tools/cryptogen" - "common/tools/idemixgen" - "cmd/discover" - "peer" - "orderer" - ]; + version = "2.4.3"; + commit = "9711fb5d0c16297584f5c53123f589110828736f"; src = fetchFromGitHub { owner = "hyperledger"; repo = "fabric"; rev = "v${version}"; - sha256 = "08qrrxzgkqg9v7n3y8f2vggyqx9j65wisxi17hrabz5mzaq299xs"; + sha256 = "sha256-gXVahzpuIUWAHq4gJ1rbq943zIuWrl/ojDMQDFfI14I="; }; - doCheck = true; + vendorSha256 = null; + + postPatch = '' + # Broken + rm cmd/peer/main_test.go + ''; + + subPackages = [ + "cmd/configtxgen" + "cmd/configtxlator" + "cmd/cryptogen" + "cmd/discover" + "cmd/ledgerutil" + "cmd/orderer" + "cmd/osnadmin" + "cmd/peer" + ]; + + ldflags = lib.mapAttrsToList + (n: v: "github.com/hyperledger/fabric/common/metadata.${n}=${v}") { + Version = version; + CommitSha = commit; + }; meta = with lib; { - description = "An implementation of blockchain technology, leveraging familiar and proven technologies"; + description = "High-performance, secure, permissioned blockchain network"; + longDescription = '' + Hyperledger Fabric is an enterprise-grade permissioned distributed ledger + framework for developing solutions and applications. Its modular and + versatile design satisfies a broad range of industry use cases. It offers + a unique approach to consensus that enables performance at scale while + preserving privacy. + ''; homepage = "https://wiki.hyperledger.org/display/fabric"; license = licenses.asl20; - maintainers = [ maintainers.marsam ]; + maintainers = with maintainers; [ marsam ]; }; } From 5ed4944130468764f705fcc600bea923223252ec Mon Sep 17 00:00:00 2001 From: Adam Joseph Date: Mon, 2 May 2022 02:51:11 -0700 Subject: [PATCH 11/91] fetchgit: allow passing allowedRequisites through to stdenv.mkDerivation When maintainers override stages of `fetchgit' (e.g. `postPatch`) it is very easy for them to accidentally leak the outpath-hash of their current `stdenv` into `fetchgit''s output, and therefore into the value they paste into `sha256`. This is a problem, because the resulting expression will break whenever any change is made to `stdenv` or when anybody attempts to build the expression on a different platform than the one used by the original maintainer. Almost as much of a problem is the fact that CI **does not catch** these problems. The `fetchgit` is run only once, then its output goes into cachix, and all future builds (hydra, CI, ofborg) pull from cachix. Let's offer maintainers the option to check that they aren't making this mistake, by passing through `allowedRequisites`. The default value is `null`, but it might be worth changing that at some point in the future. It is also sometimes difficult to communicate to package maintainers why their expression is problematic. Having `allowedRequisites` passed through makes it easier to do this: "look, when I switch on `allowedRequisites` your package breaks; are you sure you meant to hardcode the hash today's `x86_64-linux.stdenv` into your expression?` For an example use case, see https://github.com/NixOS/nixpkgs/pull/171223 The issue above is part of a larger problem with nixpkgs infra: there large parts of cachix cannot be reproduced easily if they are lost. Once something ends goes into cachix, we never ever again reverify the procedure by which it was placed into cachix. --- pkgs/build-support/fetchgit/default.nix | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/pkgs/build-support/fetchgit/default.nix b/pkgs/build-support/fetchgit/default.nix index 2ae1714e4af..84f2278db29 100644 --- a/pkgs/build-support/fetchgit/default.nix +++ b/pkgs/build-support/fetchgit/default.nix @@ -28,6 +28,7 @@ in # needed for netrcPhase netrcImpureEnvVars ? [] , meta ? {} +, allowedRequisites ? null }: /* NOTE: @@ -91,7 +92,8 @@ stdenvNoCC.mkDerivation { "GIT_PROXY_COMMAND" "NIX_GIT_SSL_CAINFO" "SOCKS_SERVER" ]; - inherit preferLocalBuild meta; + + inherit preferLocalBuild meta allowedRequisites; passthru = { gitRepoUrl = url; From f6281356b46526e11c47ed3240ed733fdac81e59 Mon Sep 17 00:00:00 2001 From: Azat Bahawi Date: Sun, 12 Jun 2022 02:55:48 +0300 Subject: [PATCH 12/91] elfinfo: use buildGoModule --- pkgs/development/tools/misc/elfinfo/default.nix | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-) diff --git a/pkgs/development/tools/misc/elfinfo/default.nix b/pkgs/development/tools/misc/elfinfo/default.nix index e3ee51c58fd..b9a6dc0c39b 100644 --- a/pkgs/development/tools/misc/elfinfo/default.nix +++ b/pkgs/development/tools/misc/elfinfo/default.nix @@ -1,20 +1,25 @@ -{ lib, buildGoPackage, fetchFromGitHub }: +{ lib +, buildGoModule +, fetchFromGitHub +}: -buildGoPackage rec { +buildGoModule rec { pname = "elfinfo"; version = "1.1.0"; - goPackagePath = "github.com/xyproto/elfinfo"; src = fetchFromGitHub { - rev = version; owner = "xyproto"; repo = "elfinfo"; + rev = version; sha256 = "1n8bg0rcq9fqa6rdnk6x9ngvm59hcayblkpjv9j5myn2vmm6fv8m"; }; + vendorSha256 = null; + meta = with lib; { description = "Small utility for showing information about ELF files"; homepage = "https://elfinfo.roboticoverlords.org/"; + changelog = "https://github.com/xyproto/elfinfo/releases/tag/${version}"; license = licenses.mit; maintainers = with maintainers; [ dtzWill ]; }; From cee66a8cd5288493c001376e9bf22825777d5326 Mon Sep 17 00:00:00 2001 From: Robert Hensing Date: Wed, 25 May 2022 11:49:17 +0200 Subject: [PATCH 13/91] make-options-doc: Support Nix-provided declaration links Previously, the location logic was hardcoded, supporting only Nixpkgs and NixOps properly, leaving other uses of the module system without good location support. --- .../lib/make-options-doc/options-to-docbook.xsl | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) diff --git a/nixos/lib/make-options-doc/options-to-docbook.xsl b/nixos/lib/make-options-doc/options-to-docbook.xsl index 03e14365cda..07d69649523 100644 --- a/nixos/lib/make-options-doc/options-to-docbook.xsl +++ b/nixos/lib/make-options-doc/options-to-docbook.xsl @@ -213,6 +213,23 @@ + + + + + + + + + + +