Merge staging-next into staging

Changed files
+4298 -2237
.github
doc
maintainers
nixos
pkgs
applications
altcoins
audio
ecasound
pulseaudio-modules-bt
pulseeffects
qmmp
editors
graphics
kde
misc
1password
alacritty
calcurse
copyq
electron-cash
gpscorrelate
jekyll
latte-dock
lutris
merkaartor
pdfpc
qmapshack
termdown
viking
zola
networking
browsers
cluster
helmfile
kops
kube3d
kubecfg
nomad
instant-messengers
irc
irssi
weechat
scripts
weechat-matrix-bridge
p2p
znc
office
gnucash
timetable
watson
radio
soapyuhd
urh
science
astronomy
stellarium
biology
mosdepth
octopus
electronics
verilator
math
version-management
git-and-tools
git-recent
hub
pre-commit
video
clipgrab
mythtv
plex-media-player
smtube
virtualization
virt-manager
virtualbox
window-managers
build-support
build-bazel-package
data
fonts
amiri
icons
papirus-icon-theme
misc
osinfo-db
themes
matcha
desktops
deepin
dde-control-center
dde-daemon
dde-launcher
deepin-calculator
dtkcore
gnome-3
extensions
appindicator
xfce4-13
exo
garcon
gigolo
libxfce4ui
libxfce4util
parole
ristretto
thunar
thunar-volman
tumbler
xfce4-appfinder
xfce4-battery-plugin
xfce4-clipman-plugin
xfce4-cpufreq-plugin
xfce4-dict
xfce4-notifyd
xfce4-panel
xfce4-power-manager
xfce4-screenshooter
xfce4-session
xfce4-settings
xfce4-taskmanager
xfce4-whiskermenu-plugin
xfconf
xfdesktop
xfwm4
development
compilers
coq-modules
gappalib
mathcomp
go-modules
generic
haskell-modules
libraries
arrow-cpp
cimg
exiv2
intel-media-driver
kerberos
libcouchbase
libextractor
libhandy
libpqxx
libressl
libsass
libtoxcore
liburcu
libvirt
matio
mtxclient
ogre
olm
openmpi
opensubdiv
packr
physics
pyotherside
sqlite
trompeloeil
unixODBCDrivers
vulkan-loader
lua-modules
ocaml-modules
python-modules
baselines
braintree
chameleon
cherrypy
cmd2
confluent-kafka
datadog
django_taggit
dm-sonnet
execnet
google-pasta
libversion
libvirt
luftdaten
mpi4py
pip-tools
pytesseract
pytest-django
python-dotenv
qtpy
requests-toolbelt
robotframework-seleniumlibrary
sabyenc
snakeviz
statsmodels
tensorflow
tensorflow-estimator
tensorflow-probability
tensorflow-tensorboard
tomlkit
twilio
vega
virtual-display
xarray
yamllint
zconfig
tools
analysis
checkstyle
cppcheck
tflint
bazel-watcher
bazelisk
build-managers
drm_info
flatpak-builder
github
github-release
go-protobuf
go-tools
haskell
multi-ghc-travis
pet
protoc-gen-doc
prototool
rust
bindgen
rustfmt
sassc
scalafmt
vagrant
web
nodejs
games
factorio
klavaro
openjk
redeclipse
tintin
misc
screensavers
xlockmore
vim-plugins
os-specific
servers
shells
zsh
oh-my-zsh
zsh-autosuggestions
tools
X11
xtrace
admin
dehydrated
filesystems
misc
catimg
mc
plantuml
psrecord
stow
youtube-dl
yubikey-manager-qt
networking
dhcpcd
lldpd
shadowsocks-libev
package-management
cargo-outdated
conda
home-manager
nix
security
gnupg
lynis
tpm2-tools
system
text
languagetool
typesetting
top-level
+3
.github/FUNDING.yml
···
+
# These are supported funding model platforms
+
+
custom: https://nixos.org/nixos/foundation.html
+1 -1
.github/PULL_REQUEST_TEMPLATE.md
···
- [ ] Tested compilation of all pkgs that depend on this change using `nix-shell -p nix-review --run "nix-review wip"`
- [ ] Tested execution of all binary files (usually in `./result/bin/`)
- [ ] Determined the impact on package closure size (by running `nix path-info -S` before and after)
-
- [ ] Assured whether relevant documentation is up to date
+
- [ ] Ensured that relevant documentation is up to date
- [ ] Fits [CONTRIBUTING.md](https://github.com/NixOS/nixpkgs/blob/master/.github/CONTRIBUTING.md).
---
+12
doc/package-notes.xml
···
elm2nix</link>.
</para>
</section>
+
<section xml:id="sec-kakoune">
+
<title>Kakoune</title>
+
+
<para>
+
Kakoune can be built to autoload plugins:
+
<programlisting>(kakoune.override {
+
configure = {
+
plugins = with pkgs.kakounePlugins; [ parinfer-rust ];
+
};
+
})</programlisting>
+
</para>
+
</section>
<section xml:id="sec-shell-helpers">
<title>Interactive shell helpers</title>
+25
maintainers/maintainer-list.nix
···
github = "bergey";
name = "Daniel Bergey";
};
+
betaboon = {
+
email = "betaboon@0x80.ninja";
+
github = "betaboon";
+
name = "betaboon";
+
};
bfortz = {
email = "bernard.fortz@gmail.com";
github = "bfortz";
···
github = "glenns";
name = "Glenn Searby";
};
+
gloaming = {
+
email = "ch9871@gmail.com";
+
github = "gloaming";
+
name = "Craig Hall";
+
};
globin = {
email = "mail@glob.in";
github = "globin";
···
github = "lasandell";
name = "Luke Sandell";
};
+
lambda-11235 = {
+
email = "taranlynn0@gmail.com";
+
github = "lambda-11235";
+
name = "Taran Lynn";
+
};
lassulus = {
email = "lassulus@gmail.com";
github = "Lassulus";
···
email = "nathan@nathan.gs";
github = "nathan-gs";
name = "Nathan Bijnens";
+
};
+
nathyong = {
+
email = "nathyong@noreply.github.com";
+
github = "nathyong";
+
name = "Nathan Yong";
};
nckx = {
email = "github@tobias.gr";
···
email = "severen@shrike.me";
github = "severen";
name = "Severen Redwood";
+
};
+
steell = {
+
email = "steve@steellworks.com";
+
github = "Steell";
+
name = "Steve Elliott";
};
stephenmw = {
email = "stephen@q5comm.com";
+1 -1
nixos/doc/manual/configuration/ipv6-config.xml
···
<xref linkend="opt-networking.defaultGateway6"/> = {
address = "fe00::1";
interface = "enp0s3";
-
}
+
};
</programlisting>
</para>
+1 -1
nixos/modules/installer/cd-dvd/sd-image-raspberrypi.nix
···
boot.kernelPackages = pkgs.linuxPackages_rpi;
sdImage = {
-
populateBootCommands = let
+
populateFirmwareCommands = let
configTxt = pkgs.writeText "config.txt" ''
# Prevent the firmware from smashing the framebuffer setup done by the mainline kernel
# when attempting to show low-voltage or overtemperature warnings.
+1
nixos/modules/module-list.nix
···
./services/audio/liquidsoap.nix
./services/audio/mpd.nix
./services/audio/mopidy.nix
+
./services/audio/roon-server.nix
./services/audio/slimserver.nix
./services/audio/snapserver.nix
./services/audio/squeezelite.nix
+7
nixos/modules/rename.nix
···
(mkRemovedOptionModule [ "boot" "zfs" "enableLegacyCrypto" ] "The corresponding package was removed from nixpkgs.")
(mkRemovedOptionModule [ "services" "winstone" ] "The corresponding package was removed from nixpkgs.")
(mkRemovedOptionModule [ "services" "mysql" "pidDir" ] "Don't wait for pidfiles, describe dependencies through systemd")
+
(mkRemovedOptionModule [ "services" "mysql" "rootPassword" ] "Use socket authentication or set the password outside of the nix store.")
# ZSH
(mkRenamedOptionModule [ "programs" "zsh" "enableSyntaxHighlighting" ] [ "programs" "zsh" "syntaxHighlighting" "enable" ])
···
# binfmt
(mkRenamedOptionModule [ "boot" "binfmtMiscRegistrations" ] [ "boot" "binfmt" "registrations" ])
+
+
# PHP-FPM
+
(mkRemovedOptionModule [ "services" "phpfpm" "poolConfigs" ] "Use services.phpfpm.pools instead.")
+
(mkRemovedOptionModule [ "services" "phpfpm" "phpPackage" ] "Use services.phpfpm.pools.<name>.phpPackage instead.")
+
(mkRemovedOptionModule [ "services" "phpfpm" "phpOptions" ] "Use services.phpfpm.pools.<name>.phpOptions instead.")
+
(mkRenamedOptionModule [ "services" "phpfpm" "extraConfig" ] [ "services" "phpfpm" "globalExtraConfig" ])
] ++ (flip map [ "blackboxExporter" "collectdExporter" "fritzboxExporter"
"jsonExporter" "minioExporter" "nginxExporter" "nodeExporter"
+5 -5
nixos/modules/services/audio/mopidy.nix
···
config = mkIf cfg.enable {
+
systemd.tmpfiles.rules = [
+
"d '${cfg.dataDir}' - mopidy mopidy - -"
+
];
+
systemd.services.mopidy = {
wantedBy = [ "multi-user.target" ];
after = [ "network.target" "sound.target" ];
description = "mopidy music player daemon";
-
preStart = "mkdir -p ${cfg.dataDir} && chown -R mopidy:mopidy ${cfg.dataDir}";
serviceConfig = {
ExecStart = "${mopidyEnv}/bin/mopidy --config ${concatStringsSep ":" ([mopidyConf] ++ cfg.extraConfigFiles)}";
User = "mopidy";
-
PermissionsStartOnly = true;
};
};
systemd.services.mopidy-scan = {
description = "mopidy local files scanner";
-
preStart = "mkdir -p ${cfg.dataDir} && chown -R mopidy:mopidy ${cfg.dataDir}";
serviceConfig = {
ExecStart = "${mopidyEnv}/bin/mopidy --config ${concatStringsSep ":" ([mopidyConf] ++ cfg.extraConfigFiles)} local scan";
User = "mopidy";
-
PermissionsStartOnly = true;
Type = "oneshot";
};
};
···
group = "mopidy";
extraGroups = [ "audio" ];
description = "Mopidy daemon user";
-
home = "${cfg.dataDir}";
+
home = cfg.dataDir;
};
users.groups.mopidy.gid = gid;
+49
nixos/modules/services/audio/roon-server.nix
···
+
{ config, lib, pkgs, ... }:
+
+
with lib;
+
+
let
+
name = "roon-server";
+
cfg = config.services.roon-server;
+
in {
+
options = {
+
services.roon-server = {
+
enable = mkEnableOption "Roon Server";
+
openFirewall = mkOption {
+
type = types.bool;
+
default = false;
+
description = ''
+
Open ports in the firewall for the server.
+
+
UDP: 9003
+
TCP: 9100 - 9200
+
'';
+
};
+
};
+
};
+
+
config = mkIf cfg.enable {
+
systemd.services.roon-server = {
+
after = [ "network.target" ];
+
description = "Roon Server";
+
wantedBy = [ "multi-user.target" ];
+
+
environment.ROON_DATAROOT = "/var/lib/${name}";
+
+
serviceConfig = {
+
ExecStart = "${pkgs.roon-server}/opt/start.sh";
+
LimitNOFILE = 8192;
+
DynamicUser = true;
+
SupplementaryGroups = "audio";
+
StateDirectory = name;
+
};
+
};
+
+
networking.firewall = mkIf cfg.openFirewall {
+
allowedTCPPortRanges = [
+
{ from = 9100; to = 9200; }
+
];
+
allowedUDPPorts = [ 9003 ];
+
};
+
};
+
}
+4 -2
nixos/modules/services/audio/slimserver.nix
···
config = mkIf cfg.enable {
+
systemd.tmpfiles.rules = [
+
"d '${cfg.dataDir}' - slimserver slimserver - -"
+
];
+
systemd.services.slimserver = {
after = [ "network.target" ];
description = "Slim Server for Logitech Squeezebox Players";
wantedBy = [ "multi-user.target" ];
-
preStart = "mkdir -p ${cfg.dataDir} && chown -R slimserver:slimserver ${cfg.dataDir}";
serviceConfig = {
User = "slimserver";
-
PermissionsStartOnly = true;
# Issue 40589: Disable broken image/video support (audio still works!)
ExecStart = "${cfg.package}/slimserver.pl --logdir ${cfg.dataDir}/logs --prefsdir ${cfg.dataDir}/prefs --cachedir ${cfg.dataDir}/cache --noimage --novideo";
};
+1 -5
nixos/modules/services/backup/duplicati.nix
···
wantedBy = [ "multi-user.target" ];
serviceConfig = {
User = cfg.user;
-
PermissionsStartOnly = true;
Group = "duplicati";
+
StateDirectory = "duplicati";
ExecStart = "${pkgs.duplicati}/bin/duplicati-server --webservice-interface=${cfg.interface} --webservice-port=${toString cfg.port} --server-datafolder=/var/lib/duplicati";
Restart = "on-failure";
};
-
preStart = ''
-
mkdir -p /var/lib/duplicati
-
chown -R ${cfg.user}:duplicati /var/lib/duplicati
-
'';
};
users.users.duplicati = lib.optionalAttrs (cfg.user == "duplicati") {
+4 -5
nixos/modules/services/computing/boinc/client.nix
···
isSystemUser = true;
};
+
systemd.tmpfiles.rules = [
+
"d '${cfg.dataDir}' - boinc - - -"
+
];
+
systemd.services.boinc = {
description = "BOINC Client";
after = ["network.target" "local-fs.target"];
wantedBy = ["multi-user.target"];
-
preStart = ''
-
mkdir -p ${cfg.dataDir}
-
chown boinc ${cfg.dataDir}
-
'';
script = ''
${fhsEnvExecutable} --dir ${cfg.dataDir} --redirectio ${allowRemoteGuiRpcFlag}
'';
serviceConfig = {
-
PermissionsStartOnly = true; # preStart must be run as root
User = "boinc";
Nice = 10;
};
+7 -7
nixos/modules/services/databases/firebird.nix
···
environment.systemPackages = [cfg.package];
+
systemd.tmpfiles.rules = [
+
"d '${dataDir}' 0700 ${cfg.user} - - -"
+
"d '${systemDir}' 0700 ${cfg.user} - - -"
+
];
+
systemd.services.firebird =
{ description = "Firebird Super-Server";
···
# is a better way
preStart =
''
-
mkdir -m 0700 -p \
-
"${dataDir}" \
-
"${systemDir}" \
-
/var/log/firebird
-
if ! test -e "${systemDir}/security2.fdb"; then
cp ${firebird}/security2.fdb "${systemDir}"
fi
-
chown -R ${cfg.user} "${dataDir}" "${systemDir}" /var/log/firebird
chmod -R 700 "${dataDir}" "${systemDir}" /var/log/firebird
'';
-
serviceConfig.PermissionsStartOnly = true; # preStart must be run as root
serviceConfig.User = cfg.user;
+
serviceConfig.LogsDirectory = "firebird";
+
serviceConfig.LogsDirectoryMode = "0700";
serviceConfig.ExecStart = ''${firebird}/bin/fbserver -d'';
# TODO think about shutdown
+8 -14
nixos/modules/services/databases/foundationdb.nix
···
}
];
+
systemd.tmpfiles.rules = [
+
"d /etc/foundationdb 0755 ${cfg.user} ${cfg.group} - -"
+
"d '${cfg.dataDir}' 0770 ${cfg.user} ${cfg.group} - -"
+
"d '${cfg.logDir}' 0770 ${cfg.user} ${cfg.group} - -"
+
"F '${cfg.pidFile}' - ${cfg.user} ${cfg.group} - -"
+
];
+
systemd.services.foundationdb = {
description = "FoundationDB Service";
···
path = [ pkg pkgs.coreutils ];
preStart = ''
-
rm -f ${cfg.pidfile} && \
-
touch ${cfg.pidfile} && \
-
chown -R ${cfg.user}:${cfg.group} ${cfg.pidfile}
-
-
for x in "${cfg.logDir}" "${cfg.dataDir}"; do
-
[ ! -d "$x" ] && mkdir -m 0770 -vp "$x";
-
chown -R ${cfg.user}:${cfg.group} "$x";
-
done
-
-
[ ! -d /etc/foundationdb ] && \
-
mkdir -m 0775 -vp /etc/foundationdb && \
-
chown -R ${cfg.user}:${cfg.group} "/etc/foundationdb"
-
if [ ! -f /etc/foundationdb/fdb.cluster ]; then
cf=/etc/foundationdb/fdb.cluster
desc=$(tr -dc A-Za-z0-9 </dev/urandom 2>/dev/null | head -c8)
rand=$(tr -dc A-Za-z0-9 </dev/urandom 2>/dev/null | head -c8)
echo ''${desc}:''${rand}@${initialIpAddr}:${builtins.toString cfg.listenPortStart} > $cf
-
chmod 0664 $cf && chown -R ${cfg.user}:${cfg.group} $cf
+
chmod 0664 $cf
touch "${cfg.dataDir}/.first_startup"
fi
'';
+5 -12
nixos/modules/services/databases/hbase.nix
···
config = mkIf config.services.hbase.enable {
+
systemd.tmpfiles.rules = [
+
"d '${cfg.dataDir}' - ${cfg.user} ${cfg.group} - -"
+
"d '${cfg.logDir}' - ${cfg.user} ${cfg.group} - -"
+
];
+
systemd.services.hbase = {
description = "HBase Server";
wantedBy = [ "multi-user.target" ];
···
HBASE_LOG_DIR = cfg.logDir;
};
-
preStart =
-
''
-
mkdir -p ${cfg.dataDir};
-
mkdir -p ${cfg.logDir};
-
-
if [ "$(id -u)" = 0 ]; then
-
chown ${cfg.user}:${cfg.group} ${cfg.dataDir}
-
chown ${cfg.user}:${cfg.group} ${cfg.logDir}
-
fi
-
'';
-
serviceConfig = {
-
PermissionsStartOnly = true;
User = cfg.user;
Group = cfg.group;
ExecStart = "${cfg.package}/bin/hbase --config ${configDir} master start";
+87 -102
nixos/modules/services/databases/mysql.nix
···
'';
};
-
# FIXME: remove this option; it's a really bad idea.
-
rootPassword = mkOption {
-
default = null;
-
description = "Path to a file containing the root password, modified on the first startup. Not specifying a root password will leave the root password empty.";
-
};
-
replication = {
role = mkOption {
type = types.enum [ "master" "slave" "none" ];
···
RuntimeDirectoryMode = "0755";
# The last two environment variables are used for starting Galera clusters
ExecStart = "${mysql}/bin/mysqld --defaults-file=/etc/my.cnf ${mysqldOptions} $_WSREP_NEW_CLUSTER $_WSREP_START_POSITION";
-
};
+
ExecStartPost =
+
let
+
setupScript = pkgs.writeShellScript "mysql-setup" ''
+
${optionalString (!hasNotify) ''
+
# Wait until the MySQL server is available for use
+
count=0
+
while [ ! -e /run/mysqld/mysqld.sock ]
+
do
+
if [ $count -eq 30 ]
+
then
+
echo "Tried 30 times, giving up..."
+
exit 1
+
fi
+
+
echo "MySQL daemon not yet started. Waiting for 1 second..."
+
count=$((count++))
+
sleep 1
+
done
+
''}
+
+
if [ -f /tmp/mysql_init ]
+
then
+
${concatMapStrings (database: ''
+
# Create initial databases
+
if ! test -e "${cfg.dataDir}/${database.name}"; then
+
echo "Creating initial database: ${database.name}"
+
( echo 'create database `${database.name}`;'
-
postStart =
-
let
-
cmdWatchForMysqlSocket = ''
-
# Wait until the MySQL server is available for use
-
count=0
-
while [ ! -e /run/mysqld/mysqld.sock ]
-
do
-
if [ $count -eq 30 ]
-
then
-
echo "Tried 30 times, giving up..."
-
exit 1
-
fi
+
${optionalString (database.schema != null) ''
+
echo 'use `${database.name}`;'
-
echo "MySQL daemon not yet started. Waiting for 1 second..."
-
count=$((count++))
-
sleep 1
-
done
-
'';
-
cmdInitialDatabases = concatMapStrings (database: ''
-
# Create initial databases
-
if ! test -e "${cfg.dataDir}/${database.name}"; then
-
echo "Creating initial database: ${database.name}"
-
( echo 'create database `${database.name}`;'
+
# TODO: this silently falls through if database.schema does not exist,
+
# we should catch this somehow and exit, but can't do it here because we're in a subshell.
+
if [ -f "${database.schema}" ]
+
then
+
cat ${database.schema}
+
elif [ -d "${database.schema}" ]
+
then
+
cat ${database.schema}/mysql-databases/*.sql
+
fi
+
''}
+
) | ${mysql}/bin/mysql -u root -N
+
fi
+
'') cfg.initialDatabases}
-
${optionalString (database.schema != null) ''
-
echo 'use `${database.name}`;'
+
${optionalString (cfg.replication.role == "master")
+
''
+
# Set up the replication master
-
# TODO: this silently falls through if database.schema does not exist,
-
# we should catch this somehow and exit, but can't do it here because we're in a subshell.
-
if [ -f "${database.schema}" ]
-
then
-
cat ${database.schema}
-
elif [ -d "${database.schema}" ]
-
then
-
cat ${database.schema}/mysql-databases/*.sql
-
fi
-
''}
-
) | ${mysql}/bin/mysql -u root -N
-
fi
-
'') cfg.initialDatabases;
-
in
+
( echo "use mysql;"
+
echo "CREATE USER '${cfg.replication.masterUser}'@'${cfg.replication.slaveHost}' IDENTIFIED WITH mysql_native_password;"
+
echo "SET PASSWORD FOR '${cfg.replication.masterUser}'@'${cfg.replication.slaveHost}' = PASSWORD('${cfg.replication.masterPassword}');"
+
echo "GRANT REPLICATION SLAVE ON *.* TO '${cfg.replication.masterUser}'@'${cfg.replication.slaveHost}';"
+
) | ${mysql}/bin/mysql -u root -N
+
''}
-
lib.optionalString (!hasNotify) cmdWatchForMysqlSocket + ''
-
if [ -f /tmp/mysql_init ]
-
then
-
${cmdInitialDatabases}
-
${optionalString (cfg.replication.role == "master")
-
''
-
# Set up the replication master
+
${optionalString (cfg.replication.role == "slave")
+
''
+
# Set up the replication slave
-
( echo "use mysql;"
-
echo "CREATE USER '${cfg.replication.masterUser}'@'${cfg.replication.slaveHost}' IDENTIFIED WITH mysql_native_password;"
-
echo "SET PASSWORD FOR '${cfg.replication.masterUser}'@'${cfg.replication.slaveHost}' = PASSWORD('${cfg.replication.masterPassword}');"
-
echo "GRANT REPLICATION SLAVE ON *.* TO '${cfg.replication.masterUser}'@'${cfg.replication.slaveHost}';"
-
) | ${mysql}/bin/mysql -u root -N
-
''}
+
( echo "stop slave;"
+
echo "change master to master_host='${cfg.replication.masterHost}', master_user='${cfg.replication.masterUser}', master_password='${cfg.replication.masterPassword}';"
+
echo "start slave;"
+
) | ${mysql}/bin/mysql -u root -N
+
''}
-
${optionalString (cfg.replication.role == "slave")
-
''
-
# Set up the replication slave
+
${optionalString (cfg.initialScript != null)
+
''
+
# Execute initial script
+
# using toString to avoid copying the file to nix store if given as path instead of string,
+
# as it might contain credentials
+
cat ${toString cfg.initialScript} | ${mysql}/bin/mysql -u root -N
+
''}
-
( echo "stop slave;"
-
echo "change master to master_host='${cfg.replication.masterHost}', master_user='${cfg.replication.masterUser}', master_password='${cfg.replication.masterPassword}';"
-
echo "start slave;"
-
) | ${mysql}/bin/mysql -u root -N
-
''}
+
rm /tmp/mysql_init
+
fi
-
${optionalString (cfg.initialScript != null)
-
''
-
# Execute initial script
-
# using toString to avoid copying the file to nix store if given as path instead of string,
-
# as it might contain credentials
-
cat ${toString cfg.initialScript} | ${mysql}/bin/mysql -u root -N
-
''}
+
${optionalString (cfg.ensureDatabases != []) ''
+
(
+
${concatMapStrings (database: ''
+
echo "CREATE DATABASE IF NOT EXISTS \`${database}\`;"
+
'') cfg.ensureDatabases}
+
) | ${mysql}/bin/mysql -u root -N
+
''}
-
${optionalString (cfg.rootPassword != null)
+
${concatMapStrings (user:
''
-
# Change root password
-
-
( echo "use mysql;"
-
echo "update user set Password=password('$(cat ${cfg.rootPassword})') where User='root';"
-
echo "flush privileges;"
+
( echo "CREATE USER IF NOT EXISTS '${user.name}'@'localhost' IDENTIFIED WITH ${if isMariaDB then "unix_socket" else "auth_socket"};"
+
${concatStringsSep "\n" (mapAttrsToList (database: permission: ''
+
echo "GRANT ${permission} ON ${database} TO '${user.name}'@'localhost';"
+
'') user.ensurePermissions)}
) | ${mysql}/bin/mysql -u root -N
-
''}
-
-
rm /tmp/mysql_init
-
fi
-
-
${optionalString (cfg.ensureDatabases != []) ''
-
(
-
${concatMapStrings (database: ''
-
echo "CREATE DATABASE IF NOT EXISTS \`${database}\`;"
-
'') cfg.ensureDatabases}
-
) | ${mysql}/bin/mysql -u root -N
-
''}
-
-
${concatMapStrings (user:
-
''
-
( echo "CREATE USER IF NOT EXISTS '${user.name}'@'localhost' IDENTIFIED WITH ${if isMariaDB then "unix_socket" else "auth_socket"};"
-
${concatStringsSep "\n" (mapAttrsToList (database: permission: ''
-
echo "GRANT ${permission} ON ${database} TO '${user.name}'@'localhost';"
-
'') user.ensurePermissions)}
-
) | ${mysql}/bin/mysql -u root -N
-
'') cfg.ensureUsers}
-
-
''; # */
+
'') cfg.ensureUsers}
+
'';
+
in
+
# ensureDatbases & ensureUsers depends on this script being run as root
+
# when the user has secured their mysql install
+
"+${setupScript}";
+
};
};
};
+4
nixos/modules/services/desktops/deepin/deepin.nix
···
environment.systemPackages = [
pkgs.deepin.dde-api
pkgs.deepin.dde-calendar
+
pkgs.deepin.dde-control-center
pkgs.deepin.dde-daemon
pkgs.deepin.dde-dock
+
pkgs.deepin.dde-launcher
pkgs.deepin.dde-file-manager
pkgs.deepin.dde-session-ui
pkgs.deepin.deepin-anything
···
services.dbus.packages = [
pkgs.deepin.dde-api
pkgs.deepin.dde-calendar
+
pkgs.deepin.dde-control-center
pkgs.deepin.dde-daemon
pkgs.deepin.dde-dock
+
pkgs.deepin.dde-launcher
pkgs.deepin.dde-file-manager
pkgs.deepin.dde-session-ui
pkgs.deepin.deepin-anything
+5 -7
nixos/modules/services/logging/graylog.nix
···
};
};
+
systemd.tmpfiles.rules = [
+
"d '${cfg.messageJournalDir}' - ${cfg.user} - - -"
+
];
+
systemd.services.graylog = with pkgs; {
description = "Graylog Server";
wantedBy = [ "multi-user.target" ];
···
};
path = [ pkgs.jre_headless pkgs.which pkgs.procps ];
preStart = ''
-
mkdir -p /var/lib/graylog -m 755
-
rm -rf /var/lib/graylog/plugins || true
mkdir -p /var/lib/graylog/plugins -m 755
···
for includedplugin in `ls ${cfg.package}/plugin/`; do
ln -s ${cfg.package}/plugin/$includedplugin /var/lib/graylog/plugins/$includedplugin || true
done
-
chown -R ${cfg.user} /var/lib/graylog
-
-
mkdir -p ${cfg.messageJournalDir} -m 755
-
chown -R ${cfg.user} ${cfg.messageJournalDir}
'';
serviceConfig = {
User="${cfg.user}";
-
PermissionsStartOnly=true;
+
StateDirectory = "graylog";
ExecStart = "${cfg.package}/bin/graylogctl run";
};
};
+4 -2
nixos/modules/services/logging/heartbeat.nix
···
config = mkIf cfg.enable {
+
systemd.tmpfiles.rules = [
+
"d '${cfg.stateDir}' - nobody nogroup - -"
+
];
+
systemd.services.heartbeat = with pkgs; {
description = "heartbeat log shipper";
wantedBy = [ "multi-user.target" ];
preStart = ''
mkdir -p "${cfg.stateDir}"/{data,logs}
-
chown nobody:nogroup "${cfg.stateDir}"/{data,logs}
'';
serviceConfig = {
User = "nobody";
-
PermissionsStartOnly = true;
AmbientCapabilities = "cap_net_raw";
ExecStart = "${pkgs.heartbeat}/bin/heartbeat -c \"${heartbeatYml}\" -path.data \"${cfg.stateDir}/data\" -path.logs \"${cfg.stateDir}/logs\"";
};
+4 -9
nixos/modules/services/mail/dspam.nix
···
Group = cfg.group;
RuntimeDirectory = optional (cfg.domainSocket == defaultSock) "dspam";
RuntimeDirectoryMode = optional (cfg.domainSocket == defaultSock) "0750";
-
PermissionsStartOnly = true;
+
StateDirectory = "dspam";
+
StateDirectoryMode = "0750";
+
LogsDirectory = "dspam";
+
LogsDirectoryMode = "0750";
# DSPAM segfaults on just about every error
Restart = "on-abort";
RestartSec = "1s";
};
-
-
preStart = ''
-
mkdir -m750 -p /var/lib/dspam
-
chown -R "${cfg.user}:${cfg.group}" /var/lib/dspam
-
-
mkdir -m750 -p /var/log/dspam
-
chown -R "${cfg.user}:${cfg.group}" /var/log/dspam
-
'';
};
}
+4 -3
nixos/modules/services/mail/opendkim.nix
···
environment.systemPackages = [ pkgs.opendkim ];
+
systemd.tmpfiles.rules = [
+
"d '${cfg.keyPath}' - ${cfg.user} ${cfg.group} - -"
+
];
+
systemd.services.opendkim = {
description = "OpenDKIM signing and verification daemon";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
preStart = ''
-
mkdir -p "${cfg.keyPath}"
cd "${cfg.keyPath}"
if ! test -f ${cfg.selector}.private; then
${pkgs.opendkim}/bin/opendkim-genkey -s ${cfg.selector} -d all-domains-generic-key
···
cat ${cfg.selector}.txt
echo "-------------------------------------------------------------"
fi
-
chown ${cfg.user}:${cfg.group} ${cfg.selector}.private
'';
serviceConfig = {
···
User = cfg.user;
Group = cfg.group;
RuntimeDirectory = optional (cfg.socket == defaultSock) "opendkim";
-
PermissionsStartOnly = true;
};
};
+23 -19
nixos/modules/services/mail/roundcube.nix
···
extraConfig = ''
location ~* \.php$ {
fastcgi_split_path_info ^(.+\.php)(/.+)$;
-
fastcgi_pass unix:/run/phpfpm/roundcube;
+
fastcgi_pass unix:/run/phpfpm-roundcube/roundcube.sock;
include ${pkgs.nginx}/conf/fastcgi_params;
include ${pkgs.nginx}/conf/fastcgi.conf;
}
···
enable = true;
};
-
services.phpfpm.poolConfigs.roundcube = ''
-
listen = /run/phpfpm/roundcube
-
listen.owner = nginx
-
listen.group = nginx
-
listen.mode = 0660
-
user = nginx
-
pm = dynamic
-
pm.max_children = 75
-
pm.start_servers = 2
-
pm.min_spare_servers = 1
-
pm.max_spare_servers = 20
-
pm.max_requests = 500
-
php_admin_value[error_log] = 'stderr'
-
php_admin_flag[log_errors] = on
-
php_admin_value[post_max_size] = 25M
-
php_admin_value[upload_max_filesize] = 25M
-
catch_workers_output = yes
-
'';
+
services.phpfpm.pools.roundcube = {
+
socketName = "roundcube";
+
phpPackage = pkgs.php;
+
user = "${config.services.nginx.user}";
+
group = "${config.services.nginx.group}";
+
extraConfig = ''
+
listen.owner = ${config.services.nginx.user}
+
listen.group = ${config.services.nginx.group}
+
listen.mode = 0600
+
pm = dynamic
+
pm.max_children = 75
+
pm.start_servers = 2
+
pm.min_spare_servers = 1
+
pm.max_spare_servers = 20
+
pm.max_requests = 500
+
php_admin_value[error_log] = 'stderr'
+
php_admin_flag[log_errors] = on
+
php_admin_value[post_max_size] = 25M
+
php_admin_value[upload_max_filesize] = 25M
+
catch_workers_output = yes
+
'';
+
};
systemd.services.phpfpm-roundcube.after = [ "roundcube-setup.service" ];
systemd.services.roundcube-setup = let
+2 -7
nixos/modules/services/misc/apache-kafka.nix
···
home = head cfg.logDirs;
};
+
systemd.tmpfiles.rules = map (logDir: "d '${logDir} 0700 apache-kafka - - -") cfg.logDirs;
+
systemd.services.apache-kafka = {
description = "Apache Kafka Daemon";
wantedBy = [ "multi-user.target" ];
···
${serverConfig}
'';
User = "apache-kafka";
-
PermissionsStartOnly = true;
SuccessExitStatus = "0 143";
};
-
preStart = ''
-
mkdir -m 0700 -p ${concatStringsSep " " cfg.logDirs}
-
if [ "$(id -u)" = 0 ]; then
-
chown apache-kafka ${concatStringsSep " " cfg.logDirs};
-
fi
-
'';
};
};
+1 -6
nixos/modules/services/misc/couchpotato.nix
···
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
-
preStart = ''
-
mkdir -p /var/lib/couchpotato
-
chown -R couchpotato:couchpotato /var/lib/couchpotato
-
'';
-
serviceConfig = {
Type = "simple";
User = "couchpotato";
Group = "couchpotato";
-
PermissionsStartOnly = "true";
+
StateDirectory = "couchpotato";
ExecStart = "${pkgs.couchpotato}/bin/couchpotato";
Restart = "on-failure";
};
+12 -4
nixos/modules/services/misc/gitea.nix
···
HTTP_PORT = ${toString cfg.httpPort}
ROOT_URL = ${cfg.rootUrl}
STATIC_ROOT_PATH = ${cfg.staticRootPath}
+
LFS_JWT_SECRET = #jwtsecret#
[session]
COOKIE_NAME = session
···
preStart = let
runConfig = "${cfg.stateDir}/custom/conf/app.ini";
secretKey = "${cfg.stateDir}/custom/conf/secret_key";
+
jwtSecret = "${cfg.stateDir}/custom/conf/jwt_secret";
in ''
# copy custom configuration and generate a random secret key if needed
${optionalString (cfg.useWizard == false) ''
cp -f ${configFile} ${runConfig}
if [ ! -e ${secretKey} ]; then
-
head -c 16 /dev/urandom | base64 > ${secretKey}
+
${gitea.bin}/bin/gitea generate secret SECRET_KEY > ${secretKey}
fi
-
KEY=$(head -n1 ${secretKey})
-
DBPASS=$(head -n1 ${cfg.database.passwordFile})
+
if [ ! -e ${jwtSecret} ]; then
+
${gitea.bin}/bin/gitea generate secret LFS_JWT_SECRET > ${jwtSecret}
+
fi
+
+
KEY="$(head -n1 ${secretKey})"
+
DBPASS="$(head -n1 ${cfg.database.passwordFile})"
+
JWTSECRET="$(head -n1 ${jwtSecret})"
sed -e "s,#secretkey#,$KEY,g" \
-e "s,#dbpass#,$DBPASS,g" \
+
-e "s,#jwtsecet#,$JWTSECET,g" \
-i ${runConfig}
-
chmod 640 ${runConfig} ${secretKey}
+
chmod 640 ${runConfig} ${secretKey} ${jwtSecret}
''}
# update all hooks' binary paths
+6 -9
nixos/modules/services/misc/gollum.nix
···
users.groups.gollum = { };
+
systemd.tmpfiles.rules = [
+
"d '${cfg.stateDir}' - ${config.users.users.gollum.name} ${config.users.groups.gollum.name} - -"
+
];
+
systemd.services.gollum = {
description = "Gollum wiki";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
path = [ pkgs.git ];
-
preStart = let
-
userName = config.users.users.gollum.name;
-
groupName = config.users.groups.gollum.name;
-
in ''
-
# All of this is safe to be run on an existing repo
-
mkdir -p ${cfg.stateDir}
+
preStart = ''
+
# This is safe to be run on an existing repo
git init ${cfg.stateDir}
-
chmod 755 ${cfg.stateDir}
-
chown -R ${userName}:${groupName} ${cfg.stateDir}
'';
serviceConfig = {
User = config.users.users.gollum.name;
Group = config.users.groups.gollum.name;
-
PermissionsStartOnly = true;
ExecStart = ''
${pkgs.gollum}/bin/gollum \
--port ${toString cfg.port} \
+8 -1
nixos/modules/services/misc/lidarr.nix
···
options = {
services.lidarr = {
enable = mkEnableOption "Lidarr";
+
+
package = mkOption {
+
type = types.package;
+
default = pkgs.lidarr;
+
defaultText = "pkgs.lidarr";
+
description = "The Lidarr package to use";
+
};
};
};
···
Type = "simple";
User = "lidarr";
Group = "lidarr";
-
ExecStart = "${pkgs.lidarr}/bin/Lidarr";
+
ExecStart = "${cfg.package}/bin/Lidarr";
Restart = "on-failure";
StateDirectory = "lidarr";
+4 -1
nixos/modules/services/misc/nix-daemon.nix
···
binaryCaches = mkOption {
type = types.listOf types.str;
-
default = [ https://cache.nixos.org/ ];
description = ''
List of binary cache URLs used to obtain pre-built binaries
of Nix packages.
+
+
By default https://cache.nixos.org/ is added,
+
to override it use <literal>lib.mkForce []</literal>.
'';
};
···
config = {
nix.binaryCachePublicKeys = [ "cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY=" ];
+
nix.binaryCaches = [ "https://cache.nixos.org/" ];
environment.etc."nix/nix.conf".source = nixConf;
+4 -3
nixos/modules/services/misc/octoprint.nix
···
gid = config.ids.gids.octoprint;
});
+
systemd.tmpfiles.rules = [
+
"d '${cfg.stateDir}' - ${cfg.user} ${cfg.group} - -"
+
];
+
systemd.services.octoprint = {
description = "OctoPrint, web interface for 3D printers";
wantedBy = [ "multi-user.target" ];
···
environment.PYTHONPATH = makeSearchPathOutput "lib" pkgs.python.sitePackages [ pluginsEnv ];
preStart = ''
-
mkdir -p "${cfg.stateDir}"
if [ -e "${cfg.stateDir}/config.yaml" ]; then
${pkgs.yaml-merge}/bin/yaml-merge "${cfg.stateDir}/config.yaml" "${cfgUpdate}" > "${cfg.stateDir}/config.yaml.tmp"
mv "${cfg.stateDir}/config.yaml.tmp" "${cfg.stateDir}/config.yaml"
···
cp "${cfgUpdate}" "${cfg.stateDir}/config.yaml"
chmod 600 "${cfg.stateDir}/config.yaml"
fi
-
chown -R ${cfg.user}:${cfg.group} "${cfg.stateDir}"
'';
serviceConfig = {
ExecStart = "${pkgs.octoprint}/bin/octoprint serve -b ${cfg.stateDir}";
User = cfg.user;
Group = cfg.group;
-
PermissionsStartOnly = true;
};
};
+22 -11
nixos/modules/services/misc/zoneminder.nix
···
useCustomDir = cfg.storageDir != null;
-
socket = "/run/phpfpm/${dirName}.sock";
+
socket = "/run/phpfpm-zoneminder/zoneminder.sock";
zms = "/cgi-bin/zms";
···
ZM_DB_TYPE=mysql
ZM_DB_HOST=${cfg.database.host}
ZM_DB_NAME=${cfg.database.name}
-
ZM_DB_USER=${if cfg.database.createLocally then user else cfg.database.username}
+
ZM_DB_USER=${cfg.database.username}
ZM_DB_PASS=${cfg.database.password}
# Web
···
default = "zmpass";
description = ''
Username for accessing the database.
+
Not used if <literal>createLocally</literal> is set.
'';
};
};
···
config = lib.mkIf cfg.enable {
+
assertions = [
+
{ assertion = cfg.database.createLocally -> cfg.database.username == user;
+
message = "services.zoneminder.database.username must be set to ${user} if services.zoneminder.database.createLocally is set true";
+
}
+
];
+
environment.etc = {
"zoneminder/60-defaults.conf".source = defaultsFile;
"zoneminder/80-nixos.conf".source = configFile;
···
};
mysql = lib.mkIf cfg.database.createLocally {
+
enable = true;
+
package = lib.mkDefault pkgs.mariadb;
ensureDatabases = [ cfg.database.name ];
-
initialDatabases = [{
-
inherit (cfg.database) name; schema = "${pkg}/share/zoneminder/db/zm_create.sql";
-
}];
ensureUsers = [{
name = cfg.database.username;
ensurePermissions = { "${cfg.database.name}.*" = "ALL PRIVILEGES"; };
···
phpfpm = lib.mkIf useNginx {
pools.zoneminder = {
-
listen = socket;
+
socketName = "zoneminder";
+
phpPackage = pkgs.php;
+
user = "${user}";
+
group = "${group}";
phpOptions = ''
date.timezone = "${config.time.timeZone}"
···
"extension=${e.pkg}/lib/php/extensions/${e.name}.so") phpExtensions)}
'';
extraConfig = ''
-
user = ${user}
-
group = ${group}
-
listen.owner = ${user}
listen.group = ${group}
listen.mode = 0660
···
procps
psmisc
];
-
after = [ "mysql.service" "nginx.service" ];
+
after = [ "nginx.service" ] ++ lib.optional cfg.database.createLocally "mysql.service";
wantedBy = [ "multi-user.target" ];
restartTriggers = [ defaultsFile configFile ];
-
preStart = lib.mkIf useCustomDir ''
+
preStart = lib.optionalString useCustomDir ''
install -dm775 -o ${user} -g ${group} ${cfg.storageDir}/{${lib.concatStringsSep "," libDirs}}
+
'' + lib.optionalString cfg.database.createLocally ''
+
if ! test -e "/var/lib/${dirName}/db-created"; then
+
${config.services.mysql.package}/bin/mysql < ${pkg}/share/zoneminder/db/zm_create.sql
+
touch "/var/lib/${dirName}/db-created"
+
fi
'';
serviceConfig = {
User = user;
+4 -5
nixos/modules/services/monitoring/alerta.nix
···
};
config = mkIf cfg.enable {
+
systemd.tmpfiles.rules = [
+
"d '${cfg.logDir}' - alerta alerta - -"
+
];
+
systemd.services.alerta = {
description = "Alerta Monitoring System";
wantedBy = [ "multi-user.target" ];
···
ExecStart = "${pkgs.python36Packages.alerta-server}/bin/alertad run --port ${toString cfg.port} --host ${cfg.bind}";
User = "alerta";
Group = "alerta";
-
PermissionsStartOnly = true;
};
-
preStart = ''
-
mkdir -p ${cfg.logDir}
-
chown alerta:alerta ${cfg.logDir}
-
'';
};
environment.systemPackages = [ pkgs.python36Packages.alerta ];
+4 -5
nixos/modules/services/monitoring/kapacitor.nix
···
config = mkIf cfg.enable {
environment.systemPackages = [ pkgs.kapacitor ];
+
systemd.tmpfiles.rules = [
+
"d '${cfg.dataDir}' - ${cfg.user} ${cfg.group} - -"
+
];
+
systemd.services.kapacitor = {
description = "Kapacitor Real-Time Stream Processing Engine";
wantedBy = [ "multi-user.target" ];
···
ExecStart = "${pkgs.kapacitor}/bin/kapacitord -config ${kapacitorConf}";
User = "kapacitor";
Group = "kapacitor";
-
PermissionsStartOnly = true;
};
-
preStart = ''
-
mkdir -p ${cfg.dataDir}
-
chown ${cfg.user}:${cfg.group} ${cfg.dataDir}
-
'';
};
users.users.kapacitor = {
-1
nixos/modules/services/monitoring/netdata.nix
···
User = cfg.user;
Group = cfg.group;
Environment="PYTHONPATH=${pkgs.netdata}/libexec/netdata/python.d/python_modules";
-
PermissionsStartOnly = true;
ExecStart = "${pkgs.netdata}/bin/netdata -D -c ${configFile}";
TimeoutStopSec = 60;
};
+5 -3
nixos/modules/services/monitoring/riemann-dash.nix
···
group = "riemanndash";
};
+
systemd.tmpfiles.rules = [
+
"d '${cfg.dataDir}' - riemanndash riemanndash - -"
+
];
+
systemd.services.riemann-dash = {
wantedBy = [ "multi-user.target" ];
wants = [ "riemann.service" ];
after = [ "riemann.service" ];
preStart = ''
-
mkdir -p ${cfg.dataDir}/config
-
chown -R riemanndash:riemanndash ${cfg.dataDir}
+
mkdir -p '${cfg.dataDir}/config'
'';
serviceConfig = {
User = "riemanndash";
ExecStart = "${launcher}/bin/riemann-dash";
-
PermissionsStartOnly = true;
};
};
-1
nixos/modules/services/monitoring/riemann-tools.nix
···
serviceConfig = {
User = "riemanntools";
ExecStart = "${healthLauncher}/bin/riemann-health";
-
PermissionsStartOnly = true;
};
};
-1
nixos/modules/services/monitoring/scollector.nix
···
path = [ pkgs.coreutils pkgs.iproute ];
serviceConfig = {
-
PermissionsStartOnly = true;
User = cfg.user;
Group = cfg.group;
ExecStart = "${cfg.package.bin}/bin/scollector -conf=${conf} ${lib.concatStringsSep " " cfg.extraOpts}";
+5 -9
nixos/modules/services/networking/aria2.nix
···
users.groups.aria2.gid = config.ids.gids.aria2;
+
systemd.tmpfiles.rules = [
+
"d '${homeDir}' 0770 aria2 aria2 - -"
+
"d '${config.services.aria2.downloadDir}' 0770 aria2 aria2 - -"
+
];
+
systemd.services.aria2 = {
description = "aria2 Service";
after = [ "local-fs.target" "network.target" ];
wantedBy = [ "multi-user.target" ];
preStart = ''
-
mkdir -m 0770 -p "${homeDir}"
-
chown aria2:aria2 "${homeDir}"
-
if [[ ! -d "${config.services.aria2.downloadDir}" ]]
-
then
-
mkdir -m 0770 -p "${config.services.aria2.downloadDir}"
-
chown aria2:aria2 "${config.services.aria2.downloadDir}"
-
fi
if [[ ! -e "${sessionFile}" ]]
then
touch "${sessionFile}"
-
chown aria2:aria2 "${sessionFile}"
fi
cp -f "${settingsFile}" "${settingsDir}/aria2.conf"
'';
···
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
User = "aria2";
Group = "aria2";
-
PermissionsStartOnly = true;
};
};
};
-1
nixos/modules/services/networking/autossh.nix
···
serviceConfig = {
User = "${s.user}";
-
PermissionsStartOnly = true;
# AutoSSH may exit with 0 code if the SSH session was
# gracefully terminated by either local or remote side.
Restart = "on-success";
+4 -5
nixos/modules/services/networking/charybdis.nix
···
gid = config.ids.gids.ircd;
};
+
systemd.tmpfiles.rules = [
+
"d ${cfg.statedir} - ${cfg.user} ${cfg.group} - -"
+
];
+
systemd.services.charybdis = {
description = "Charybdis IRC daemon";
wantedBy = [ "multi-user.target" ];
···
ExecStart = "${charybdis}/bin/charybdis -foreground -logfile /dev/stdout -configfile ${configFile}";
Group = cfg.group;
User = cfg.user;
-
PermissionsStartOnly = true; # preStart needs to run with root permissions
};
-
preStart = ''
-
${coreutils}/bin/mkdir -p ${cfg.statedir}
-
${coreutils}/bin/chown ${cfg.user}:${cfg.group} ${cfg.statedir}
-
'';
};
}
+12 -2
nixos/modules/services/networking/hostapd.nix
···
ctrl_interface=/run/hostapd
ctrl_interface_group=${cfg.group}
-
${if cfg.wpa then ''
+
${optionalString cfg.wpa ''
wpa=2
wpa_passphrase=${cfg.wpaPassphrase}
-
'' else ""}
+
''}
+
${optionalString cfg.noScan "noscan=1"}
${cfg.extraConfig}
'' ;
···
example = "wlp2s0";
description = ''
The interfaces <command>hostapd</command> will use.
+
'';
+
};
+
+
noScan = mkOption {
+
default = false;
+
description = ''
+
Do not scan for overlapping BSSs in HT40+/- mode.
+
Caution: turning this on will violate regulatory requirements!
'';
};
···
after = [ "sys-subsystem-net-devices-${escapedInterface}.device" ];
bindsTo = [ "sys-subsystem-net-devices-${escapedInterface}.device" ];
requiredBy = [ "network-link-${cfg.interface}.service" ];
+
wantedBy = [ "multi-user.target" ];
serviceConfig =
{ ExecStart = "${pkgs.hostapd}/bin/hostapd ${configFile}";
+1 -7
nixos/modules/services/networking/minidlna.nix
···
wantedBy = [ "multi-user.target" ];
after = [ "network.target" "local-fs.target" ];
-
preStart =
-
''
-
mkdir -p /var/cache/minidlna
-
chown -R minidlna:minidlna /var/cache/minidlna
-
'';
-
serviceConfig =
{ User = "minidlna";
Group = "minidlna";
-
PermissionsStartOnly = true;
+
CacheDirectory = "minidlna";
RuntimeDirectory = "minidlna";
PIDFile = "/run/minidlna/pid";
ExecStart =
+4 -6
nixos/modules/services/networking/quassel.nix
···
gid = config.ids.gids.quassel;
}];
+
systemd.tmpfiles.rules = [
+
"d '${cfg.dataDir}' - ${user} - - -"
+
];
+
systemd.services.quassel =
{ description = "Quassel IRC client daemon";
···
after = [ "network.target" ] ++ optional config.services.postgresql.enable "postgresql.service"
++ optional config.services.mysql.enable "mysql.service";
-
preStart = ''
-
mkdir -p ${cfg.dataDir}
-
chown ${user} ${cfg.dataDir}
-
'';
-
serviceConfig =
{
ExecStart = concatStringsSep " " ([
···
] ++ optional cfg.requireSSL "--require-ssl"
++ optional (cfg.certificateFile != null) "--ssl-cert=${cfg.certificateFile}");
User = user;
-
PermissionsStartOnly = true;
};
};
+1 -2
nixos/modules/services/networking/squid.nix
···
serviceConfig = {
Type="forking";
PIDFile="/run/squid.pid";
-
PermissionsStartOnly = true;
ExecStart = "${pkgs.squid}/bin/squid -YCs -f ${squidConfig}";
};
};
};
-
}
+
}
+4 -6
nixos/modules/services/networking/teamspeak3.nix
···
gid = config.ids.gids.teamspeak;
};
+
systemd.tmpfiles.rules = [
+
"d '${cfg.logPath}' - ${user} ${group} - -"
+
];
+
systemd.services.teamspeak3-server = {
description = "Teamspeak3 voice communication server daemon";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
-
-
preStart = ''
-
mkdir -p ${cfg.logPath}
-
chown ${user}:${group} ${cfg.logPath}
-
'';
serviceConfig = {
ExecStart = ''
···
WorkingDirectory = cfg.dataDir;
User = user;
Group = group;
-
PermissionsStartOnly = true;
};
};
};
+5 -6
nixos/modules/services/networking/unifi.nix
···
where = where;
}) mountPoints;
+
systemd.tmpfiles.rules = [
+
"e '${stateDir}' 0700 unifi - - -"
+
"e '${stateDir}/data' 0700 unifi - - -"
+
];
+
systemd.services.unifi = {
description = "UniFi controller daemon";
wantedBy = [ "multi-user.target" ];
···
environment.LD_LIBRARY_PATH = with pkgs.stdenv; "${cc.cc.lib}/lib";
preStart = ''
-
# Ensure privacy of state and data.
-
chown unifi "${stateDir}" "${stateDir}/data"
-
chmod 0700 "${stateDir}" "${stateDir}/data"
-
# Create the volatile webapps
rm -rf "${stateDir}/webapps"
mkdir -p "${stateDir}/webapps"
-
chown unifi "${stateDir}/webapps"
ln -s "${cfg.unifiPackage}/webapps/ROOT" "${stateDir}/webapps/ROOT"
'';
···
ExecStart = "${(removeSuffix "\n" cmd)} start";
ExecStop = "${(removeSuffix "\n" cmd)} stop";
User = "unifi";
-
PermissionsStartOnly = true;
UMask = "0077";
WorkingDirectory = "${stateDir}";
};
+5 -8
nixos/modules/services/networking/zeronet.nix
···
'';
};
+
systemd.tmpfiles.rules = [
+
"d '${cfg.dataDir}' 750 zeronet zeronet - -"
+
"d '${cfg.logDir}' 750 zeronet zeronet - -"
+
];
+
systemd.services.zeronet = {
description = "zeronet";
after = [ "network.target" (optionalString cfg.tor "tor.service") ];
wantedBy = [ "multi-user.target" ];
-
preStart = ''
-
# Ensure folder exists or create it and permissions are correct
-
mkdir -p ${escapeShellArg cfg.dataDir} ${escapeShellArg cfg.logDir}
-
chmod 750 ${escapeShellArg cfg.dataDir} ${escapeShellArg cfg.logDir}
-
chown zeronet:zeronet ${escapeShellArg cfg.dataDir} ${escapeShellArg cfg.logDir}
-
'';
-
serviceConfig = {
-
PermissionsStartOnly = true;
PrivateTmp = "yes";
User = "zeronet";
Group = "zeronet";
+11 -7
nixos/modules/services/web-apps/atlassian/confluence.nix
···
users.groups."${cfg.group}" = {};
+
systemd.tmpfiles.rules = [
+
"d '${cfg.home}' - ${cfg.user} - - -"
+
"d /run/confluence - - - - -"
+
+
"L+ /run/confluence/home - - - - ${cfg.home}"
+
"L+ /run/confluence/logs - - - - ${cfg.home}/logs"
+
"L+ /run/confluence/temp - - - - ${cfg.home}/temp"
+
"L+ /run/confluence/work - - - - ${cfg.home}/work"
+
"L+ /run/confluence/server.xml - - - - ${cfg.home}/server.xml"
+
];
+
systemd.services.confluence = {
description = "Atlassian Confluence";
···
preStart = ''
mkdir -p ${cfg.home}/{logs,work,temp,deploy}
-
mkdir -p /run/confluence
-
ln -sf ${cfg.home}/{logs,work,temp,server.xml} /run/confluence
-
ln -sf ${cfg.home} /run/confluence/home
-
-
chown ${cfg.user} ${cfg.home}
-
sed -e 's,port="8090",port="${toString cfg.listenPort}" address="${cfg.listenAddress}",' \
'' + (lib.optionalString cfg.proxy.enable ''
-e 's,protocol="org.apache.coyote.http11.Http11NioProtocol",protocol="org.apache.coyote.http11.Http11NioProtocol" proxyName="${cfg.proxy.name}" proxyPort="${toString cfg.proxy.port}" scheme="${cfg.proxy.scheme}",' \
···
User = cfg.user;
Group = cfg.group;
PrivateTmp = true;
-
PermissionsStartOnly = true;
ExecStart = "${pkg}/bin/start-confluence.sh -fg";
ExecStop = "${pkg}/bin/stop-confluence.sh";
};
+10 -7
nixos/modules/services/web-apps/atlassian/crowd.nix
···
users.groups."${cfg.group}" = {};
+
systemd.tmpfiles.rules = [
+
"d '${cfg.home}' - ${cfg.user} ${cfg.group} - -"
+
"d /run/atlassian-crowd - - - - -"
+
+
"L+ /run/atlassian-crowd/database - - - - ${cfg.home}/database"
+
"L+ /run/atlassian-crowd/logs - - - - ${cfg.home}/logs"
+
"L+ /run/atlassian-crowd/work - - - - ${cfg.home}/work"
+
"L+ /run/atlassian-crowd/server.xml - - - - ${cfg.home}/server.xml"
+
];
+
systemd.services.atlassian-crowd = {
description = "Atlassian Crowd";
···
rm -rf ${cfg.home}/work
mkdir -p ${cfg.home}/{logs,database,work}
-
mkdir -p /run/atlassian-crowd
-
ln -sf ${cfg.home}/{database,logs,work,server.xml} /run/atlassian-crowd
-
-
chown ${cfg.user}:${cfg.group} ${cfg.home}
-
chown ${cfg.user}:${cfg.group} ${cfg.home}/{logs,database,work}
-
sed -e 's,port="8095",port="${toString cfg.listenPort}" address="${cfg.listenAddress}",' \
'' + (lib.optionalString cfg.proxy.enable ''
-e 's,compression="on",compression="off" protocol="HTTP/1.1" proxyName="${cfg.proxy.name}" proxyPort="${toString cfg.proxy.port}" scheme="${cfg.proxy.scheme}" secure="${boolToString cfg.proxy.secure}",' \
···
User = cfg.user;
Group = cfg.group;
PrivateTmp = true;
-
PermissionsStartOnly = true;
ExecStart = "${pkg}/start_crowd.sh -fg";
};
};
+11 -7
nixos/modules/services/web-apps/atlassian/jira.nix
···
users.groups."${cfg.group}" = {};
+
systemd.tmpfiles.rules = [
+
"d '${cfg.home}' - ${cfg.user} - - -"
+
"d /run/atlassian-jira - - - - -"
+
+
"L+ /run/atlassian-jira/home - - - - ${cfg.home}"
+
"L+ /run/atlassian-jira/logs - - - - ${cfg.home}/logs"
+
"L+ /run/atlassian-jira/work - - - - ${cfg.home}/work"
+
"L+ /run/atlassian-jira/temp - - - - ${cfg.home}/temp"
+
"L+ /run/atlassian-jira/server.xml - - - - ${cfg.home}/server.xml"
+
];
+
systemd.services.atlassian-jira = {
description = "Atlassian JIRA";
···
preStart = ''
mkdir -p ${cfg.home}/{logs,work,temp,deploy}
-
mkdir -p /run/atlassian-jira
-
ln -sf ${cfg.home}/{logs,work,temp,server.xml} /run/atlassian-jira
-
ln -sf ${cfg.home} /run/atlassian-jira/home
-
-
chown ${cfg.user} ${cfg.home}
-
sed -e 's,port="8080",port="${toString cfg.listenPort}" address="${cfg.listenAddress}",' \
'' + (lib.optionalString cfg.proxy.enable ''
-e 's,protocol="HTTP/1.1",protocol="HTTP/1.1" proxyName="${cfg.proxy.name}" proxyPort="${toString cfg.proxy.port}" scheme="${cfg.proxy.scheme}" secure="${toString cfg.proxy.secure}",' \
···
User = cfg.user;
Group = cfg.group;
PrivateTmp = true;
-
PermissionsStartOnly = true;
ExecStart = "${pkg}/bin/start-jira.sh -fg";
ExecStop = "${pkg}/bin/stop-jira.sh";
};
+5 -5
nixos/modules/services/web-apps/frab.nix
···
users.groups = [ { name = cfg.group; } ];
+
systemd.tmpfiles.rules = [
+
"d '${cfg.statePath}/system/attachments' - ${cfg.user} ${cfg.group} - -"
+
];
+
systemd.services.frab = {
after = [ "network.target" "gitlab.service" ];
wantedBy = [ "multi-user.target" ];
environment = frabEnv;
preStart = ''
-
mkdir -p ${cfg.statePath}/system/attachments
-
chown ${cfg.user}:${cfg.group} -R ${cfg.statePath}
-
-
mkdir /run/frab -p
ln -sf ${pkgs.writeText "frab-database.yml" databaseConfig} /run/frab/database.yml
ln -sf ${cfg.statePath}/system /run/frab/system
···
'';
serviceConfig = {
-
PermissionsStartOnly = true;
PrivateTmp = true;
PrivateDevices = true;
Type = "simple";
···
TimeoutSec = "300s";
Restart = "on-failure";
RestartSec = "10s";
+
RuntimeDirectory = "frab";
WorkingDirectory = "${package}/share/frab";
ExecStart = "${frab-rake}/bin/frab-bundle exec rails server " +
"--binding=${cfg.listenAddress} --port=${toString cfg.listenPort}";
+21 -15
nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix
···
{ config, lib, pkgs, ... }: with lib; let
cfg = config.services.icingaweb2;
poolName = "icingaweb2";
-
phpfpmSocketName = "/var/run/phpfpm/${poolName}.sock";
defaultConfig = {
global = {
···
};
config = mkIf cfg.enable {
-
services.phpfpm.poolConfigs = mkIf (cfg.pool == "${poolName}") {
-
"${poolName}" = ''
-
listen = "${phpfpmSocketName}"
-
listen.owner = nginx
-
listen.group = nginx
-
listen.mode = 0600
-
user = icingaweb2
-
pm = dynamic
-
pm.max_children = 75
-
pm.start_servers = 2
-
pm.min_spare_servers = 2
-
pm.max_spare_servers = 10
-
'';
+
services.phpfpm.pools = mkIf (cfg.pool == "${poolName}") {
+
"${poolName}" = {
+
socketName = "${poolName}";
+
phpPackage = pkgs.php;
+
user = "icingaweb2";
+
group = "icingaweb2";
+
extraConfig = ''
+
listen.owner = ${config.services.nginx.user}
+
listen.group = ${config.services.nginx.group}
+
listen.mode = 0600
+
pm = dynamic
+
pm.max_children = 75
+
pm.start_servers = 2
+
pm.min_spare_servers = 2
+
pm.max_spare_servers = 10
+
'';
+
};
};
services.phpfpm.phpOptions = mkIf (cfg.pool == "${poolName}")
···
include ${config.services.nginx.package}/conf/fastcgi.conf;
try_files $uri =404;
fastcgi_split_path_info ^(.+\.php)(/.+)$;
-
fastcgi_pass unix:${phpfpmSocketName};
+
fastcgi_pass unix:/run/phpfpm-${poolName}/${poolName}.sock;
fastcgi_param SCRIPT_FILENAME ${pkgs.icingaweb2}/public/index.php;
'';
};
···
description = "Icingaweb2 service user";
group = "icingaweb2";
isSystemUser = true;
+
};
+
users.users.nginx = {
+
extraGroups = [ "icingaweb2" ];
};
};
}
+4 -4
nixos/modules/services/web-apps/limesurvey.nix
···
};
services.phpfpm.pools.limesurvey = {
+
socketName = "limesurvey";
phpPackage = php;
-
listen = "/run/phpfpm/limesurvey.sock";
+
user = "${user}";
+
group = "${group}";
extraConfig = ''
listen.owner = ${config.services.httpd.user};
listen.group = ${config.services.httpd.group};
-
user = ${user};
-
group = ${group};
env[LIMESURVEY_CONFIG] = ${limesurveyConfig}
···
<Directory "${pkg}/share/limesurvey">
<FilesMatch "\.php$">
<If "-f %{REQUEST_FILENAME}">
-
SetHandler "proxy:unix:/run/phpfpm/limesurvey.sock|fcgi://localhost/"
+
SetHandler "proxy:unix:/run/phpfpm-limesurvey/limesurvey.sock|fcgi://localhost/"
</If>
</FilesMatch>
+23 -15
nixos/modules/services/web-apps/matomo.nix
···
cfg = config.services.matomo;
user = "matomo";
+
group = "matomo";
dataDir = "/var/lib/${user}";
deprecatedDataDir = "/var/lib/piwik";
pool = user;
-
# it's not possible to use /run/phpfpm/${pool}.sock because /run/phpfpm/ is root:root 0770,
+
# it's not possible to use /run/phpfpm-${pool}/${pool}.sock because /run/phpfpm/ is root:root 0770,
# and therefore is not accessible by the web server.
-
phpSocket = "/run/phpfpm-${pool}.sock";
+
phpSocket = "/run/phpfpm-${pool}/${pool}.sock";
phpExecutionUnit = "phpfpm-${pool}";
databaseService = "mysql.service";
···
isSystemUser = true;
createHome = true;
home = dataDir;
-
group = user;
+
group = "${group}";
+
};
+
users.users.${config.services.nginx.user} = {
+
extraGroups = [ "${group}" ];
};
-
users.groups.${user} = {};
+
users.groups.${group} = {};
systemd.services.matomo-setup-update = {
# everything needs to set up and up to date before Matomo php files are executed
···
echo "Migrating from ${deprecatedDataDir} to ${dataDir}"
mv -T ${deprecatedDataDir} ${dataDir}
fi
-
chown -R ${user}:${user} ${dataDir}
+
chown -R ${user}:${group} ${dataDir}
chmod -R ug+rwX,o-rwx ${dataDir}
'';
script = ''
···
serviceConfig.UMask = "0007";
};
-
services.phpfpm.poolConfigs = let
+
services.phpfpm.pools = let
# workaround for when both are null and need to generate a string,
# which is illegal, but as assertions apparently are being triggered *after* config generation,
# we have to avoid already throwing errors at this previous stage.
socketOwner = if (cfg.nginx != null) then config.services.nginx.user
else if (cfg.webServerUser != null) then cfg.webServerUser else "";
in {
-
${pool} = ''
-
listen = "${phpSocket}"
-
listen.owner = ${socketOwner}
-
listen.group = root
-
listen.mode = 0600
-
user = ${user}
-
env[PIWIK_USER_PATH] = ${dataDir}
-
${cfg.phpfpmProcessManagerConfig}
-
'';
+
${pool} = {
+
socketName = "${pool}";
+
phpPackage = pkgs.php;
+
user = "${user}";
+
group = "${group}";
+
extraConfig = ''
+
listen.owner = ${socketOwner}
+
listen.group = ${group}
+
listen.mode = 0600
+
env[PIWIK_USER_PATH] = ${dataDir}
+
${cfg.phpfpmProcessManagerConfig}
+
'';
+
};
};
+7 -6
nixos/modules/services/web-apps/nextcloud.nix
···
phpOptions)));
in {
phpOptions = phpOptionsExtensions;
+
socketName = "nextcloud";
phpPackage = phpPackage;
-
listen = "/run/phpfpm/nextcloud";
+
user = "nextcloud";
+
group = "${config.services.nginx.group}";
extraConfig = ''
-
listen.owner = nginx
-
listen.group = nginx
-
user = nextcloud
-
group = nginx
+
listen.owner = ${config.services.nginx.user}
+
listen.group = ${config.services.nginx.group}
+
listen.mode = 0600
${cfg.poolConfig}
env[NEXTCLOUD_CONFIG_DIR] = ${cfg.home}/config
env[PATH] = /run/wrappers/bin:/nix/var/nix/profiles/default/bin:/run/current-system/sw/bin:/usr/bin:/bin
···
fastcgi_param HTTPS ${if cfg.https then "on" else "off"};
fastcgi_param modHeadersAvailable true;
fastcgi_param front_controller_active true;
-
fastcgi_pass unix:/run/phpfpm/nextcloud;
+
fastcgi_pass unix:/run/phpfpm-nextcloud/nextcloud.sock;
fastcgi_intercept_errors on;
fastcgi_request_buffering off;
fastcgi_read_timeout 120s;
+11 -7
nixos/modules/services/web-apps/restya-board.nix
···
runDir = "/run/restya-board";
poolName = "restya-board";
-
phpfpmSocketName = "/run/phpfpm/${poolName}.sock";
+
phpfpmSocketName = "/run/phpfpm-${poolName}/${poolName}.sock";
in
···
config = mkIf cfg.enable {
-
services.phpfpm.poolConfigs = {
+
services.phpfpm.pools = {
"${poolName}" = {
-
listen = phpfpmSocketName;
+
socketName = "${poolName}";
+
phpPackage = pkgs.php;
+
user = "${cfg.user}";
+
group = "${cfg.group}";
phpOptions = ''
date.timezone = "CET"
···
''}
'';
extraConfig = ''
-
listen.owner = nginx
-
listen.group = nginx
+
listen.owner = ${config.services.nginx.user}
+
listen.group = ${config.services.nginx.group}
listen.mode = 0600
-
user = ${cfg.user}
-
group = ${cfg.group}
pm = dynamic
pm.max_children = 75
pm.start_servers = 10
···
home = runDir;
group = "restya-board";
};
+
users.users.nginx = {
+
extraGroups = [ "restya-board" ];
+
};
users.groups.restya-board = {};
services.postgresql.enable = mkIf (cfg.database.host == null) true;
+26 -19
nixos/modules/services/web-apps/selfoss.nix
···
let
cfg = config.services.selfoss;
-
poolName = "selfoss_pool";
-
phpfpmSocketName = "/run/phpfpm/${poolName}.sock";
-
+
poolName = "selfoss";
+
phpfpmSocketName = "/run/phpfpm-${poolName}/${poolName}.sock";
+
group = "${cfg.user}";
dataDir = "/var/lib/selfoss";
selfoss-config =
···
config = mkIf cfg.enable {
-
services.phpfpm.poolConfigs = mkIf (cfg.pool == "${poolName}") {
-
"${poolName}" = ''
-
listen = "${phpfpmSocketName}";
-
listen.owner = nginx
-
listen.group = nginx
-
listen.mode = 0600
-
user = nginx
-
pm = dynamic
-
pm.max_children = 75
-
pm.start_servers = 10
-
pm.min_spare_servers = 5
-
pm.max_spare_servers = 20
-
pm.max_requests = 500
-
catch_workers_output = 1
-
'';
+
services.phpfpm.pools = mkIf (cfg.pool == "${poolName}") {
+
"${poolName}" = {
+
socketName = "${poolName}";
+
phpPackage = pkgs.php;
+
user = "${cfg.user}";
+
group = "${group}";
+
extraConfig = ''
+
listen.owner = ${config.services.nginx.user}
+
listen.group = ${config.services.nginx.group}
+
listen.mode = 0600
+
pm = dynamic
+
pm.max_children = 75
+
pm.start_servers = 10
+
pm.min_spare_servers = 5
+
pm.max_spare_servers = 20
+
pm.max_requests = 500
+
catch_workers_output = 1
+
'';
+
};
};
systemd.services.selfoss-config = {
···
# Create the files
cp -r "${pkgs.selfoss}/"* "${dataDir}"
ln -sf "${selfoss-config}" "${dataDir}/config.ini"
-
chown -R "${cfg.user}" "${dataDir}"
+
chown -R "${cfg.user}":"${group}" "${dataDir}"
chmod -R 755 "${dataDir}"
'';
wantedBy = [ "multi-user.target" ];
···
};
+
users.users.nginx = {
+
extraGroups = [ "${group}" ];
+
};
};
}
+7 -5
nixos/modules/services/web-apps/tt-rss.nix
···
services.phpfpm.pools = mkIf (cfg.pool == "${poolName}") {
"${poolName}" = {
-
listen = "/var/run/phpfpm/${poolName}.sock";
+
socketName = "${poolName}";
+
phpPackage = pkgs.php;
+
user = "${config.services.nginx.user}";
+
group = "${config.services.nginx.group}";
extraConfig = ''
-
listen.owner = nginx
-
listen.group = nginx
+
listen.owner = ${config.services.nginx.user}
+
listen.group = ${config.services.nginx.group}
listen.mode = 0600
-
user = ${cfg.user}
pm = dynamic
pm.max_children = 75
pm.start_servers = 10
···
locations."~ \.php$" = {
extraConfig = ''
fastcgi_split_path_info ^(.+\.php)(/.+)$;
-
fastcgi_pass unix:${config.services.phpfpm.pools.${cfg.pool}.listen};
+
fastcgi_pass unix:/run/phpfpm-${poolName}/${poolName}.sock;
fastcgi_index index.php;
'';
};
+2 -2
nixos/modules/services/web-servers/lighttpd/cgit.nix
···
configText = mkOption {
default = "";
example = ''
+
source-filter=''${pkgs.cgit}/lib/cgit/filters/syntax-highlighting.py
+
about-filter=''${pkgs.cgit}/lib/cgit/filters/about-formatting.sh
cache-size=1000
scan-path=/srv/git
-
source-filter=''${pkgs.cgit}/lib/cgit/filters/syntax-highlighting.py
-
about-filter=''${pkgs.cgit}/lib/cgit/filters/about-formatting.sh
'';
type = types.lines;
description = ''
+95 -88
nixos/modules/services/web-servers/phpfpm/default.nix
···
let
cfg = config.services.phpfpm;
-
enabled = cfg.poolConfigs != {} || cfg.pools != {};
-
-
stateDir = "/run/phpfpm";
+
enabled = cfg.pools != {};
-
poolConfigs =
-
(mapAttrs mapPoolConfig cfg.poolConfigs) //
-
(mapAttrs mapPool cfg.pools);
-
-
mapPoolConfig = n: p: {
-
phpPackage = cfg.phpPackage;
-
phpOptions = cfg.phpOptions;
-
config = p;
-
};
+
poolConfigs = (mapAttrs mapPool cfg.pools);
mapPool = n: p: {
phpPackage = p.phpPackage;
phpOptions = p.phpOptions;
-
config = ''
-
listen = ${p.listen}
-
${p.extraConfig}
-
'';
+
userPool = p.user;
+
groupPool = p.group;
};
fpmCfgFile = pool: conf: pkgs.writeText "phpfpm-${pool}.conf" ''
[global]
error_log = syslog
daemonize = no
-
${cfg.extraConfig}
+
${cfg.globalExtraConfig}
[${pool}]
-
${conf}
+
listen = /run/phpfpm-${pool}/${cfg.pools.${pool}.socketName}.sock
+
${cfg.pools.${pool}.extraConfig}
'';
phpIni = pool: pkgs.runCommand "php.ini" {
···
'';
in {
-
options = {
services.phpfpm = {
-
extraConfig = mkOption {
+
globalExtraConfig = mkOption {
type = types.lines;
default = "";
description = ''
-
Extra configuration that should be put in the global section of
+
Global extra configuration that should be put in the global section of
the PHP-FPM configuration file. Do not specify the options
<literal>error_log</literal> or
-
<literal>daemonize</literal> here, since they are generated by
-
NixOS.
+
<literal>daemonize</literal> here, since they are generated by NixOS.
'';
};
-
phpPackage = mkOption {
-
type = types.package;
-
default = pkgs.php;
-
defaultText = "pkgs.php";
-
description = ''
-
The PHP package to use for running the PHP-FPM service.
-
'';
-
};
+
pools = mkOption {
+
default = {};
+
type = types.attrsOf (types.submodule {
+
options = {
+
socketName = mkOption {
+
type = types.str;
+
example = "php-fpm";
+
description = ''
+
The address on which to accept FastCGI requests.
+
'';
+
};
+
+
phpPackage = mkOption {
+
type = types.package;
+
default = pkgs.php;
+
defaultText = "pkgs.php";
+
description = ''
+
The PHP package to use for running this PHP-FPM pool.
+
'';
+
};
+
+
phpOptions = mkOption {
+
type = types.lines;
+
default = "";
+
description = ''
+
Options appended to the PHP configuration file <filename>php.ini</filename> used for this PHP-FPM pool.
+
'';
+
};
+
+
user = mkOption {
+
type = types.string;
+
default = "phpfpm";
+
description = "User account under which phpfpm runs.";
+
};
+
+
group = mkOption {
+
type = types.string;
+
default = "phpfpm";
+
description = "Group account under which phpfpm runs.";
+
};
+
+
extraConfig = mkOption {
+
type = types.lines;
+
example = ''
+
pm = dynamic
+
pm.max_children = 75
+
pm.start_servers = 10
+
pm.min_spare_servers = 5
+
pm.max_spare_servers = 20
+
pm.max_requests = 500
+
'';
-
phpOptions = mkOption {
-
type = types.lines;
-
default = "";
-
example =
-
''
-
date.timezone = "CET"
-
'';
-
description =
-
"Options appended to the PHP configuration file <filename>php.ini</filename>.";
-
};
+
description = ''
+
Extra lines that go into the pool configuration.
+
See the documentation on <literal>php-fpm.conf</literal> for
+
details on configuration directives.
+
'';
+
};
+
};
+
});
-
poolConfigs = mkOption {
-
default = {};
-
type = types.attrsOf types.lines;
example = literalExample ''
-
{ mypool = '''
-
listen = /run/phpfpm/mypool
-
user = nobody
-
pm = dynamic
-
pm.max_children = 75
-
pm.start_servers = 10
-
pm.min_spare_servers = 5
-
pm.max_spare_servers = 20
-
pm.max_requests = 500
-
''';
+
{
+
mypool = {
+
socketName = "example";
+
phpPackage = pkgs.php;
+
user = "phpfpm";
+
group = "phpfpm";
+
extraConfig = '''
+
pm = dynamic
+
pm.max_children = 75
+
pm.start_servers = 10
+
pm.min_spare_servers = 5
+
pm.max_spare_servers = 20
+
pm.max_requests = 500
+
''';
+
}
}
'';
description = ''
-
A mapping between PHP-FPM pool names and their configurations.
-
See the documentation on <literal>php-fpm.conf</literal> for
-
details on configuration directives. If no pools are defined,
-
the phpfpm service is disabled.
-
'';
-
};
-
-
pools = mkOption {
-
type = types.attrsOf (types.submodule (import ./pool-options.nix {
-
inherit lib config;
-
}));
-
default = {};
-
example = literalExample ''
-
{
-
mypool = {
-
listen = "/path/to/unix/socket";
-
phpPackage = pkgs.php;
-
extraConfig = '''
-
user = nobody
-
pm = dynamic
-
pm.max_children = 75
-
pm.start_servers = 10
-
pm.min_spare_servers = 5
-
pm.max_spare_servers = 20
-
pm.max_requests = 500
-
''';
-
}
-
}'';
-
description = ''
PHP-FPM pools. If no pools or poolConfigs are defined, the PHP-FPM
service is disabled.
'';
···
after = [ "network.target" ];
wantedBy = [ "phpfpm.target" ];
partOf = [ "phpfpm.target" ];
-
preStart = ''
-
mkdir -p ${stateDir}
-
'';
serviceConfig = let
cfgFile = fpmCfgFile pool poolConfig.config;
iniFile = phpIni poolConfig;
···
ProtectSystem = "full";
ProtectHome = true;
# XXX: We need AF_NETLINK to make the sendmail SUID binary from postfix work
-
RestrictAddressFamilies = "AF_UNIX AF_INET AF_INET6 AF_NETLINK";
+
RestrictAddressFamilies = [ "AF_UNIX" "AF_INET" "AF_INET6" "AF_NETLINK" ];
Type = "notify";
-
ExecStart = "${poolConfig.phpPackage}/bin/php-fpm -y ${cfgFile} -c ${iniFile}";
+
ExecStart = "${poolConfig.phpPackage}/bin/php-fpm -y '${cfgFile}' -c '${iniFile}'";
ExecReload = "${pkgs.coreutils}/bin/kill -USR2 $MAINPID";
+
# User and group
+
User = "${poolConfig.userPool}";
+
Group = "${poolConfig.groupPool}";
+
# Runtime directory and mode
+
RuntimeDirectory = "phpfpm-${pool}";
+
RuntimeDirectoryMode = "0750";
+
# Capabilities
+
AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" "CAP_SETGID" "CAP_SETUID" "CAP_CHOWN" "CAP_SYS_RESOURCE" ];
+
CapabilityBoundingSet = [ "CAP_NET_BIND_SERVICE" "CAP_SETGID" "CAP_SETUID" "CAP_CHOWN" "CAP_SYS_RESOURCE" ];
};
}
);
-57
nixos/modules/services/web-servers/phpfpm/pool-options.nix
···
-
{ lib, config }:
-
-
let
-
fpmCfg = config.services.phpfpm;
-
in
-
-
with lib; {
-
-
options = {
-
-
listen = mkOption {
-
type = types.str;
-
example = "/path/to/unix/socket";
-
description = ''
-
The address on which to accept FastCGI requests.
-
'';
-
};
-
-
phpPackage = mkOption {
-
type = types.package;
-
default = fpmCfg.phpPackage;
-
defaultText = "config.services.phpfpm.phpPackage";
-
description = ''
-
The PHP package to use for running this PHP-FPM pool.
-
'';
-
};
-
-
phpOptions = mkOption {
-
type = types.lines;
-
default = fpmCfg.phpOptions;
-
defaultText = "config.services.phpfpm.phpOptions";
-
description = ''
-
"Options appended to the PHP configuration file <filename>php.ini</filename> used for this PHP-FPM pool."
-
'';
-
};
-
-
extraConfig = mkOption {
-
type = types.lines;
-
example = ''
-
user = nobody
-
pm = dynamic
-
pm.max_children = 75
-
pm.start_servers = 10
-
pm.min_spare_servers = 5
-
pm.max_spare_servers = 20
-
pm.max_requests = 500
-
'';
-
-
description = ''
-
Extra lines that go into the pool configuration.
-
See the documentation on <literal>php-fpm.conf</literal> for
-
details on configuration directives.
-
'';
-
};
-
};
-
}
-
+64 -40
nixos/modules/virtualisation/libvirtd.nix
···
''}
${cfg.qemuVerbatimConfig}
'';
+
dirName = "libvirt";
+
subDirs = list: [ dirName ] ++ map (e: "${dirName}/${e}") list;
in {
###### interface
-
options = {
+
options.virtualisation.libvirtd = {
-
virtualisation.libvirtd.enable = mkOption {
+
enable = mkOption {
type = types.bool;
default = false;
description = ''
···
'';
};
-
virtualisation.libvirtd.qemuPackage = mkOption {
+
qemuPackage = mkOption {
type = types.package;
default = pkgs.qemu;
description = ''
···
'';
};
-
virtualisation.libvirtd.extraConfig = mkOption {
+
extraConfig = mkOption {
type = types.lines;
default = "";
description = ''
···
'';
};
-
virtualisation.libvirtd.qemuRunAsRoot = mkOption {
+
qemuRunAsRoot = mkOption {
type = types.bool;
default = true;
description = ''
···
'';
};
-
virtualisation.libvirtd.qemuVerbatimConfig = mkOption {
+
qemuVerbatimConfig = mkOption {
type = types.lines;
default = ''
namespaces = []
···
'';
};
-
virtualisation.libvirtd.qemuOvmf = mkOption {
+
qemuOvmf = mkOption {
type = types.bool;
default = true;
description = ''
···
'';
};
-
virtualisation.libvirtd.extraOptions = mkOption {
+
extraOptions = mkOption {
type = types.listOf types.str;
default = [ ];
example = [ "--verbose" ];
···
'';
};
-
virtualisation.libvirtd.onShutdown = mkOption {
+
onShutdown = mkOption {
type = types.enum ["shutdown" "suspend" ];
default = "suspend";
description = ''
···
'';
};
+
allowedBridges = mkOption {
+
type = types.listOf types.str;
+
default = [ "virbr0" ];
+
description = ''
+
List of bridge devices that can be used by qemu:///session
+
'';
+
};
+
};
···
config = mkIf cfg.enable {
-
environment.systemPackages = with pkgs; [ libvirt libressl.nc cfg.qemuPackage ];
+
environment = {
+
# this file is expected in /etc/qemu and not sysconfdir (/var/lib)
+
etc."qemu/bridge.conf".text = lib.concatMapStringsSep "\n" (e:
+
"allow ${e}") cfg.allowedBridges;
+
systemPackages = with pkgs; [ libvirt libressl.nc cfg.qemuPackage ];
+
};
boot.kernelModules = [ "tun" ];
···
group = "qemu-libvirtd";
};
-
systemd.packages = [ pkgs.libvirt ];
-
-
systemd.services.libvirtd = {
-
description = "Libvirt Virtual Machine Management Daemon";
-
-
wantedBy = [ "multi-user.target" ];
-
after = [ "systemd-udev-settle.service" ]
-
++ optional vswitch.enable "vswitchd.service";
-
-
environment.LIBVIRTD_ARGS = ''--config "${configFile}" ${concatStringsSep " " cfg.extraOptions}'';
-
-
path = [ cfg.qemuPackage ] # libvirtd requires qemu-img to manage disk images
-
++ optional vswitch.enable vswitch.package;
-
-
preStart = ''
-
mkdir -p /var/log/libvirt/qemu -m 755
-
rm -f /var/run/libvirtd.pid
-
-
mkdir -p /var/lib/libvirt
-
mkdir -p /var/lib/libvirt/dnsmasq
+
security.wrappers.qemu-bridge-helper = {
+
source = "/run/${dirName}/nix-helpers/qemu-bridge-helper";
+
};
-
chmod 755 /var/lib/libvirt
-
chmod 755 /var/lib/libvirt/dnsmasq
+
systemd.packages = [ pkgs.libvirt ];
+
systemd.services.libvirtd-config = {
+
description = "Libvirt Virtual Machine Management Daemon - configuration";
+
script = ''
# Copy default libvirt network config .xml files to /var/lib
# Files modified by the user will not be overwritten
for i in $(cd ${pkgs.libvirt}/var/lib && echo \
···
done
# Copy generated qemu config to libvirt directory
-
cp -f ${qemuConfigFile} /var/lib/libvirt/qemu.conf
+
cp -f ${qemuConfigFile} /var/lib/${dirName}/qemu.conf
# stable (not GC'able as in /nix/store) paths for using in <emulator> section of xml configs
-
mkdir -p /run/libvirt/nix-emulators
for emulator in ${pkgs.libvirt}/libexec/libvirt_lxc ${cfg.qemuPackage}/bin/qemu-kvm ${cfg.qemuPackage}/bin/qemu-system-*; do
-
ln -s --force "$emulator" /run/libvirt/nix-emulators/
+
ln -s --force "$emulator" /run/${dirName}/nix-emulators/
+
done
+
+
for helper in libexec/qemu-bridge-helper bin/qemu-pr-helper; do
+
ln -s --force ${cfg.qemuPackage}/$helper /run/${dirName}/nix-helpers/
done
${optionalString cfg.qemuOvmf ''
-
mkdir -p /run/libvirt/nix-ovmf
-
ln -s --force ${pkgs.OVMF.fd}/FV/OVMF_CODE.fd /run/libvirt/nix-ovmf/
-
ln -s --force ${pkgs.OVMF.fd}/FV/OVMF_VARS.fd /run/libvirt/nix-ovmf/
+
ln -s --force ${pkgs.OVMF.fd}/FV/OVMF_CODE.fd /run/${dirName}/nix-ovmf/
+
ln -s --force ${pkgs.OVMF.fd}/FV/OVMF_VARS.fd /run/${dirName}/nix-ovmf/
''}
'';
serviceConfig = {
+
Type = "oneshot";
+
RuntimeDirectoryPreserve = "yes";
+
LogsDirectory = subDirs [ "qemu" ];
+
RuntimeDirectory = subDirs [ "nix-emulators" "nix-helpers" "nix-ovmf" ];
+
StateDirectory = subDirs [ "dnsmasq" ];
+
};
+
};
+
+
systemd.services.libvirtd = {
+
description = "Libvirt Virtual Machine Management Daemon";
+
+
wantedBy = [ "multi-user.target" ];
+
requires = [ "libvirtd-config.service" ];
+
after = [ "systemd-udev-settle.service" "libvirtd-config.service" ]
+
++ optional vswitch.enable "vswitchd.service";
+
+
environment.LIBVIRTD_ARGS = ''--config "${configFile}" ${concatStringsSep " " cfg.extraOptions}'';
+
+
path = [ cfg.qemuPackage ] # libvirtd requires qemu-img to manage disk images
+
++ optional vswitch.enable vswitch.package;
+
+
serviceConfig = {
Type = "notify";
KillMode = "process"; # when stopping, leave the VMs alone
Restart = "no";
···
systemd.sockets.virtlogd = {
description = "Virtual machine log manager socket";
wantedBy = [ "sockets.target" ];
-
listenStreams = [ "/run/libvirt/virtlogd-sock" ];
+
listenStreams = [ "/run/${dirName}/virtlogd-sock" ];
};
systemd.services.virtlogd = {
···
systemd.sockets.virtlockd = {
description = "Virtual machine lock manager socket";
wantedBy = [ "sockets.target" ];
-
listenStreams = [ "/run/libvirt/virtlockd-sock" ];
+
listenStreams = [ "/run/${dirName}/virtlockd-sock" ];
};
systemd.services.virtlockd = {
+6
nixos/tests/mysql.nix
···
{
users.users.testuser = { };
services.mysql.enable = true;
+
services.mysql.initialScript = pkgs.writeText "mariadb-init.sql" ''
+
echo "ALTER USER root@localhost IDENTIFIED WITH unix_socket;"
+
echo "DELETE FROM mysql.user WHERE password = ''' AND plugin = ''';"
+
echo "DELETE FROM mysql.user WHERE user = ''';"
+
echo "FLUSH PRIVILEGES;"
+
'';
services.mysql.ensureDatabases = [ "testdb" ];
services.mysql.ensureUsers = [{
name = "testuser";
+3 -3
pkgs/applications/altcoins/parity/beta.nix
···
let
-
version = "2.5.1";
-
sha256 = "0nnrgc2qyqqld3znjigryqpg5jaqh3jnmin4a334dbr4jw50dz3d";
-
cargoSha256 = "184vfhsalk5dims3k13zrsv4lmm45a7nm3r0b84g72q7hhbl8pkf";
+
version = "2.5.3";
+
sha256 = "04z38ba4f1kmaa3d9b4gqz7dwr5blbppnkngw758xdm56772hfmj";
+
cargoSha256 = "03dlzl96g8k02lifymwp1xs0b2mrnj5c1xzpwp014ijqlnzcfgsv";
in
import ./parity.nix { inherit version sha256 cargoSha256; }
+3 -3
pkgs/applications/altcoins/parity/default.nix
···
let
-
version = "2.4.6";
-
sha256 = "0vfq1pyd92n60h9gimn4d5j56xanvl43sgxk9h2kb16amy0mmh3z";
-
cargoSha256 = "04gi9vddahq1q207f83n3wriwdjnmmnby6mq4crdh7yx1p4b26m9";
+
version = "2.4.8";
+
sha256 = "1kr7hzv27vxa14wafhpaq5a4fv97zh71xjjmwzaqq4gj3k9yj0rm";
+
cargoSha256 = "1yjyk6mhr3ws73aq6h8z5iabvj03ch7mxhkrfdkmhw3cjj0jgx6j";
in
import ./parity.nix { inherit version sha256 cargoSha256; }
+4 -2
pkgs/applications/altcoins/parity/parity.nix
···
{ stdenv
, fetchFromGitHub
-
, rustPlatform
+
, rustPlatform
, pkgconfig
, openssl
, systemd
···
systemd.lib systemd.dev openssl openssl.dev
];
+
cargoBuildFlags = [ "--features final" ];
+
# test result: FAILED. 80 passed; 12 failed; 0 ignored; 0 measured; 0 filtered out
doCheck = false;
meta = with stdenv.lib; {
description = "Fast, light, robust Ethereum implementation";
-
homepage = http://parity.io;
+
homepage = "http://parity.io";
license = licenses.gpl3;
maintainers = [ maintainers.akru ];
platforms = platforms.linux;
+2 -2
pkgs/applications/audio/ecasound/default.nix
···
stdenv.mkDerivation rec {
name = "ecasound-${version}";
-
version = "2.9.1";
+
version = "2.9.2";
src = fetchurl {
url = "https://ecasound.seul.org/download/ecasound-${version}.tar.gz";
-
sha256 = "1wyws3xc4f9pglrrqv6k9137sarv4asizqrxz8h0dn44rnzfiz1r";
+
sha256 = "15rcs28fq2wfvfs66p5na7adq88b55qszbhshpizgdbyqzgr2jf1";
};
buildInputs = [ alsaLib audiofile libjack2 liblo liboil libsamplerate libsndfile lilv lv2 ];
+1
pkgs/applications/audio/pulseaudio-modules-bt/default.nix
···
patches = [
./fix-install-path.patch
+
./fix-aac-defaults.patch
];
nativeBuildInputs = [
+15
pkgs/applications/audio/pulseaudio-modules-bt/fix-aac-defaults.patch
···
+
diff --git a/src/modules/bluetooth/a2dp/a2dp_aac.c b/src/modules/bluetooth/a2dp/a2dp_aac.c
+
index 394a7a0..cf5abaf 100644
+
--- a/src/modules/bluetooth/a2dp/a2dp_aac.c
+
+++ b/src/modules/bluetooth/a2dp/a2dp_aac.c
+
@@ -90,8 +90,8 @@ pa_aac_encoder_init(pa_a2dp_source_read_cb_t read_cb, pa_a2dp_source_read_buf_fr
+
info->read_pcm = read_cb;
+
info->read_buf_free = free_cb;
+
info->aacenc_handle_opened = false;
+
- info->aac_enc_bitrate_mode = 5;
+
- info->aac_afterburner = false;
+
+ info->aac_enc_bitrate_mode = 0;
+
+ info->aac_afterburner = true;
+
info->force_pa_fmt = PA_SAMPLE_INVALID;
+
return true;
+
}
+2 -2
pkgs/applications/audio/pulseeffects/default.nix
···
];
in stdenv.mkDerivation rec {
pname = "pulseeffects";
-
version = "4.6.3";
+
version = "4.6.5";
src = fetchFromGitHub {
owner = "wwmm";
repo = "pulseeffects";
rev = "v${version}";
-
sha256 = "1gp23hpsnbiymbbhn6hp8sg1pnysgf04bj9k4h9dfinbgshlq6m7";
+
sha256 = "11ihr29szpqlk9wkscns00ijihyvn5659bj1p7r1ixwgfv708apq";
};
nativeBuildInputs = [
+2 -2
pkgs/applications/audio/qmmp/default.nix
···
# handle that.
stdenv.mkDerivation rec {
-
name = "qmmp-1.3.2";
+
name = "qmmp-1.3.3";
src = fetchurl {
url = "http://qmmp.ylsoftware.com/files/${name}.tar.bz2";
-
sha256 = "1rh063kcyg7gs9yj2r4v5irpnq4pjaxaxsgrw30mdr21xhhc15cz";
+
sha256 = "1777kqgvbkshqlawy00gbgwflxflwmjjidqdq29mhqszs76r6727";
};
nativeBuildInputs = [ cmake pkgconfig ];
+3 -3
pkgs/applications/editors/android-studio/default.nix
···
sha256Hash = "0y4l9d1yrvv1csx6vl4jnqgqy96y44rl6p8hcxrnbvrg61iqnj30";
};
betaVersion = {
-
version = "3.5.0.16"; # "Android Studio 3.5 Beta 4"
-
build = "191.5619324";
-
sha256Hash = "1rg6v9b8fdnmslpv80khhpx59lvwhj1vwbkyabz2fryfj67wz01z";
+
version = "3.5.0.17"; # "Android Studio 3.5 Beta 5"
+
build = "191.5675373";
+
sha256Hash = "0iw9v2rzr32dhs3z4vgz93zvxcv111q4cvwzi2cb83hn8kl050ip";
};
latestVersion = { # canary & dev
version = "3.6.0.3"; # "Android Studio 3.6 Canary 3"
+1 -1
pkgs/applications/editors/kakoune/default.nix
···
with stdenv.lib;
stdenv.mkDerivation rec {
-
name = "kakoune-${version}";
+
pname = "kakoune-unwrapped";
version = "2019.01.20";
src = fetchFromGitHub {
repo = "kakoune";
+5
pkgs/applications/editors/kakoune/plugins.nix
···
+
{ parinfer-rust }:
+
+
{
+
inherit parinfer-rust;
+
}
+44
pkgs/applications/editors/kakoune/wrapper.nix
···
+
{ stdenv, bash }:
+
with stdenv.lib;
+
+
kakoune:
+
+
let
+
getPlugins = { plugins ? [] }: plugins;
+
+
wrapper = { configure ? {} }:
+
stdenv.mkDerivation rec {
+
pname = "kakoune";
+
version = getVersion kakoune;
+
+
src = ./.;
+
buildCommand = ''
+
mkdir -p $out/share/kak
+
for plugin in ${strings.escapeShellArgs (getPlugins configure)}; do
+
if [[ -d $plugin/share/kak/autoload ]]; then
+
find "$plugin/share/kak/autoload" -type f -name '*.kak'| while read rcfile; do
+
printf 'source "%s"\n' "$rcfile"
+
done
+
fi
+
done >>$out/share/kak/plugins.kak
+
+
mkdir -p $out/bin
+
substitute ${src}/wrapper.sh $out/bin/kak \
+
--subst-var-by bash "${bash}" \
+
--subst-var-by kakoune "${kakoune}" \
+
--subst-var-by out "$out"
+
chmod +x $out/bin/kak
+
'';
+
+
preferLocalBuild = true;
+
buildInputs = [ bash kakoune ];
+
passthru = { unwrapped = kakoune; };
+
+
meta = kakoune.meta // {
+
# prefer wrapper over the package
+
priority = (kakoune.meta.priority or 0) - 1;
+
hydraPlatforms = [];
+
};
+
};
+
in
+
makeOverridable wrapper
+30
pkgs/applications/editors/kakoune/wrapper.sh
···
+
#!@bash@/bin/bash
+
+
# We use the -E option to load plugins. This only makes sense when we are
+
# starting a new session, so we detect that. Also, Kakoune can only handle
+
# one -E option, so we prepend loading plugins to an existing one.
+
args=( "$@" )
+
loadPlugins=true
+
EValueOffset=-1
+
pluginScript='@out@/share/kak/plugins.kak'
+
+
for (( i = 0; i < ${#args[@]}; i++ )); do
+
case "${args[i]}" in
+
-n|-c|-l|-p|-clear|-version) loadPlugins=false;;
+
-E) EValueOffset=$(( i + 1 ));;
+
--) break;;
+
esac
+
case "${args[i]}" in
+
-E|-c|-e|-s|-p|-f|-i|-ui|-debug) i=$(( i + 1 ));;
+
esac
+
done
+
+
if [[ $loadPlugins = true ]]; then
+
if (( EValueOffset >= 0 )); then
+
args[EValueOffset]="source '$pluginScript'"$'\n'"${args[EValueOffset]}"
+
else
+
args=( "-E" "source '$pluginScript'" "${args[@]}" )
+
fi
+
fi
+
+
exec @kakoune@/bin/kak "${args[@]}"
+2 -2
pkgs/applications/editors/typora/default.nix
···
stdenv.mkDerivation rec {
pname = "typora";
-
version = "0.9.70";
+
version = "0.9.72";
src = fetchurl {
url = "https://www.typora.io/linux/typora_${version}_amd64.deb";
-
sha256 = "08bgllbvgrpdkk9bryj4s16n274ps4igwrzdvsdbyw8wpp44vcy2";
+
sha256 = "0q7fj77pr3ykpwgip87h12qxvpvlzs15mi9w3phqm3p9mmm9rlrs";
};
nativeBuildInputs = [
+1
pkgs/applications/editors/vscode/with-extensions.nix
···
ln -sT "${vscode}/share/pixmaps/code.png" "$out/share/pixmaps/code.png"
ln -sT "${vscode}/share/applications/${executableName}.desktop" "$out/share/applications/${executableName}.desktop"
+
ln -sT "${vscode}/share/applications/${executableName}-url-handler.desktop" "$out/share/applications/${executableName}-url-handler.desktop"
makeWrapper "${vscode}/bin/${executableName}" "$out/bin/${executableName}" ${lib.optionalString (vscodeExtensions != []) ''
--add-flags "--extensions-dir ${combinedExtensionsDrv}/share/${wrappedPkgName}/extensions"
''}
+2 -2
pkgs/applications/graphics/drawpile/default.nix
···
in stdenv.mkDerivation rec {
name = "drawpile-${version}";
-
version = "2.1.10";
+
version = "2.1.11";
src = fetchurl {
url = "https://drawpile.net/files/src/drawpile-${version}.tar.gz";
-
sha256 = "074lp5z5kh6qwar3y4ik7gma5mdgafdsb50q425xcd3pv00gy0hm";
+
sha256 = "00r5vzracvjk369rri2jxzgfaa1ll4qj5gdmzgflvidz8420bcvm";
};
nativeBuildInputs = [
+15 -3
pkgs/applications/graphics/geeqie/default.nix
···
{ stdenv, fetchurl, pkgconfig, autoconf, automake, gettext, intltool
, gtk3, lcms2, exiv2, libchamplain, clutter-gtk, ffmpegthumbnailer, fbida
-
, wrapGAppsHook
+
, wrapGAppsHook, fetchpatch
}:
stdenv.mkDerivation rec {
···
sha256 = "0ciygvcxb78pqg59r6p061mkbpvkgv2rv3r79j3kgv3kalb3ln2w";
};
-
# Do not build the changelog as this requires markdown.
-
patches = [ ./geeqie-no-changelog.patch ];
+
patches = [
+
# Do not build the changelog as this requires markdown.
+
(fetchpatch {
+
name = "geeqie-1.4-goodbye-changelog.patch";
+
url = "https://src.fedoraproject.org/rpms/geeqie/raw/132fb04a1a5e74ddb333d2474f7edb9a39dc8d27/f/geeqie-1.4-goodbye-changelog.patch";
+
sha256 = "00a35dds44kjjdqsbbfk0x9y82jspvsbpm2makcm1ivzlhjjgszn";
+
})
+
# Fixes build with exiv2 0.27.1
+
(fetchpatch {
+
name = "geeqie-exiv2-0.27.patch";
+
url = "https://git.archlinux.org/svntogit/packages.git/plain/trunk/geeqie-exiv2-0.27.patch?h=packages/geeqie&id=dee28a8b3e9039b9cd6927b5a93ef2a07cd8271d";
+
sha256 = "05skpbyp8pcq92psgijyccc8liwfy2cpwprw6m186pf454yb5y9p";
+
})
+
];
preConfigure = "./autogen.sh";
-14
pkgs/applications/graphics/geeqie/geeqie-no-changelog.patch
···
-
--- geeqie-1.4.orig/Makefile.am 2017-12-31 07:31:21.000000000 -0500
-
+++ geeqie-1.4/Makefile.am 2018-01-01 15:05:58.742068166 -0500
-
@@ -10,9 +10,9 @@
-
readmedir = @readmedir@
-
-
if HAVE_MARKDOWN
-
-readme_DATA = README.md COPYING ChangeLog TODO README.lirc AUTHORS README.html ChangeLog.html
-
+readme_DATA = README.md COPYING TODO README.lirc AUTHORS README.html
-
else
-
-readme_DATA = README.md COPYING ChangeLog TODO README.lirc AUTHORS ChangeLog.html
-
+readme_DATA = README.md COPYING TODO README.lirc AUTHORS
-
endif
-
-
desktopdir = $(datadir)/applications
+9 -1
pkgs/applications/graphics/hugin/default.nix
···
-
{ stdenv, cmake, fetchurl, gnumake, makeWrapper, pkgconfig
+
{ stdenv, cmake, fetchurl, gnumake, makeWrapper, pkgconfig, fetchpatch
, autopanosiftc, boost, cairo, enblend-enfuse, exiv2, fftw, flann, gettext
, glew, ilmbase, lcms2, lensfun, libjpeg, libpng, libtiff, libX11, libXi
, libXmu, libGLU_combined, openexr, panotools, perlPackages, sqlite, vigra, wxGTK, zlib
···
url = "mirror://sourceforge/hugin/${name}.tar.bz2";
sha256 = "1l925qslp98gg7yzmgps10h6dq0nb60wbfk345anlxsv0g2ifizr";
};
+
+
patches = [
+
# Fixes build with exiv2 0.27.1
+
(fetchpatch {
+
url = "https://git.archlinux.org/svntogit/community.git/plain/trunk/hugin-exiv2-0.27.1.patch?h=packages/hugin";
+
sha256 = "1yxvlpvrhyrfd2w6kwx1w3mncsvlzdhp0w7xchy8q6kc2kd5nf7r";
+
})
+
];
buildInputs = [
boost cairo exiv2 fftw flann gettext glew ilmbase lcms2 lensfun libjpeg
+13 -11
pkgs/applications/graphics/luminance-hdr/default.nix
···
-
{ stdenv, cmake, fetchurl, pkgconfig, boost, exiv2, fftwFloat, gsl
+
{ stdenv, cmake, fetchFromGitHub, pkgconfig, boost, exiv2, fftwFloat, gsl
, ilmbase, lcms2, libraw, libtiff, openexr
-
, qtbase, qtdeclarative, qttools, qtwebengine
+
, qtbase, qtdeclarative, qttools, qtwebengine, eigen
}:
stdenv.mkDerivation rec {
-
name = "luminance-hdr-2.5.1";
+
pname = "luminance-hdr";
+
version = "2.6.0";
-
src = fetchurl {
-
url = "mirror://sourceforge/qtpfsgui/${name}.tar.bz2";
-
sha256 = "15hnyk9yjkkc97dmnrg2ipfgwqxprlcyv2kyvbls4d54zc56x658";
+
src = fetchFromGitHub {
+
owner = "LuminanceHDR";
+
repo = "LuminanceHDR";
+
rev = "v.${version}";
+
sha256 = "1izmgjjp8mgyxv57sjjr05z7g7059ykb5wchlcn4wrnnb6aslnvn";
};
NIX_CFLAGS_COMPILE = "-I${ilmbase.dev}/include/OpenEXR";
-
buildInputs =
-
[
-
qtbase qtdeclarative qttools qtwebengine
-
boost exiv2 fftwFloat gsl ilmbase lcms2 libraw libtiff openexr
-
];
+
buildInputs = [
+
qtbase qtdeclarative qttools qtwebengine eigen
+
boost exiv2 fftwFloat gsl ilmbase lcms2 libraw libtiff openexr
+
];
nativeBuildInputs = [ cmake pkgconfig ];
+4
pkgs/applications/graphics/nomacs/default.nix
···
sha256 = "12582i5v85da7vwjxj8grj99hxg34ij5cn3b1578wspdfw1xfy1i";
};
+
patches = [
+
./nomacs-iostream.patch
+
];
+
enableParallelBuilding = true;
setSourceRoot = ''
+26
pkgs/applications/graphics/nomacs/nomacs-iostream.patch
···
+
diff --git a/src/DkCore/DkMetaData.cpp b/src/DkCore/DkMetaData.cpp
+
index d195757e..affec7be 100644
+
--- a/src/DkCore/DkMetaData.cpp
+
+++ b/src/DkCore/DkMetaData.cpp
+
@@ -42,6 +42,8 @@
+
#include <QApplication>
+
#pragma warning(pop) // no warnings from includes - end
+
+
+#include <iostream>
+
+
+
namespace nmc {
+
+
// DkMetaDataT --------------------------------------------------------------------
+
diff --git a/src/DkGui/DkNoMacs.cpp b/src/DkGui/DkNoMacs.cpp
+
index 6a412f70..bbfba233 100644
+
--- a/src/DkGui/DkNoMacs.cpp
+
+++ b/src/DkGui/DkNoMacs.cpp
+
@@ -96,6 +96,8 @@
+
#include <QWinTaskbarButton>
+
#endif
+
+
+#include <iostream>
+
+
+
namespace nmc {
+
+
DkNomacsOSXEventFilter::DkNomacsOSXEventFilter(QObject *parent) : QObject(parent) {
+1
pkgs/applications/graphics/photivo/default.nix
···
meta = with stdenv.lib; {
platforms = platforms.linux;
license = licenses.gpl3;
+
broken = true; # exiv2 0.27.1 FTBFS
};
}
+21 -8
pkgs/applications/graphics/photoqt/default.nix
···
-
{ stdenv, fetchurl, cmake, exiv2, graphicsmagick, libraw
+
{ stdenv, fetchurl, cmake, exiv2, graphicsmagick, libraw, fetchpatch
, qtbase, qtdeclarative, qtmultimedia, qtquickcontrols, qttools, qtgraphicaleffects
+
, extra-cmake-modules, poppler, kimageformats, libarchive, libdevil
}:
stdenv.mkDerivation rec {
-
name = "photoqt-${version}";
-
version = "1.5.1";
+
pname = "photoqt";
+
version = "1.7.1";
src = fetchurl {
-
url = "https://photoqt.org/pkgs/photoqt-${version}.tar.gz";
-
sha256 = "17kkpzkmzfnigs26jjyd75iy58qffjsclif81cmviq73lzmqy0b1";
+
url = "https://${pname}.org/pkgs/${pname}-${version}.tar.gz";
+
sha256 = "1qvxdh3cbjcywqx0da2qp8z092660qyzv5yknqbps2zr12qqb103";
};
-
patches = [ ./photoqt-1.5.1-qt-5.9.patch ];
+
patches = [
+
# Fixes build with exiv2 0.27.1
+
(fetchpatch {
+
url = "https://gitlab.com/luspi/photoqt/commit/c6fd41478e818f3a651d40f96cab3d790e1c09a4.patch";
+
sha256 = "1j2pdr7hm3js7lswhb4qkf9sj9viclhjqz50qxpyd7pqrl1gf2va";
+
})
+
];
-
nativeBuildInputs = [ cmake ];
+
nativeBuildInputs = [ cmake extra-cmake-modules qttools ];
buildInputs = [
-
qtbase qtquickcontrols qttools exiv2 graphicsmagick
+
qtbase qtquickcontrols exiv2 graphicsmagick poppler
qtmultimedia qtdeclarative libraw qtgraphicaleffects
+
kimageformats libarchive
+
];
+
+
cmakeFlags = [
+
"-DFREEIMAGE=OFF"
+
"-DDEVIL=OFF"
];
preConfigure = ''
-13
pkgs/applications/graphics/photoqt/photoqt-1.5.1-qt-5.9.patch
···
-
diff --git a/CMakeLists.txt b/CMakeLists.txt
-
index 97abcb5..fd4877a 100644
-
--- a/CMakeLists.txt
-
+++ b/CMakeLists.txt
-
@@ -50,7 +50,7 @@ SET(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -std=c++11 -O3 -Wall")
-
#### FIND REQUIRED PACKAGES ####
-
################################
-
-
-FIND_PACKAGE(Qt5 COMPONENTS LinguistTools Quick Widgets Core Svg REQUIRED)
-
+FIND_PACKAGE(Qt5 COMPONENTS LinguistTools Quick Widgets Core Svg Sql Xml REQUIRED)
-
SET(CMAKE_MODULE_PATH "${CMAKE_CURRENT_SOURCE_DIR}/CMake" ${CMAKE_MODULE_PATH})
-
FIND_PACKAGE(Magick)
-
FIND_PACKAGE(Exiv2)
-41
pkgs/applications/graphics/qtpfsgui/default.nix
···
-
{stdenv, fetchurl, qt4, qmake4Hook, exiv2, openexr, fftwSinglePrec, libtiff, ilmbase }:
-
-
stdenv.mkDerivation rec {
-
name = "qtpfsgui-1.9.3";
-
-
src = fetchurl {
-
url = "mirror://sourceforge/qtpfsgui/${name}.tar.gz";
-
sha256 = "1mlg9dry4mfnnjlnwsw375hzsiagssdhccfmapx5nh6ykqrslsh1";
-
};
-
-
buildInputs = [ qt4 exiv2 openexr fftwSinglePrec libtiff ];
-
nativeBuildInputs = [ qmake4Hook ];
-
-
hardeningDisable = [ "format" ];
-
-
preConfigure = ''
-
export CPATH="${ilmbase.dev}/include/OpenEXR:$CPATH"
-
'';
-
-
qmakeFlags = [
-
"EXIV2PATH=${exiv2.dev}/include/exiv2"
-
"OPENEXRDIR=${openexr.dev}/include/OpenEXR"
-
"FFTW3DIR=${fftwSinglePrec.dev}/include"
-
"LIBTIFFDIR=${libtiff.dev}/include"
-
];
-
-
meta = {
-
homepage = http://qtpfsgui.sourceforge.net/;
-
description = "Qtpfsqui, a graphical application for high dynamic range (HDR) imaging";
-
-
longDescription =
-
'' Qtpfsgui is an open source graphical user interface application that
-
aims to provide a workflow for high dynamic range (HDR) imaging.
-
'';
-
-
license = stdenv.lib.licenses.gpl2Plus;
-
-
maintainers = [ ];
-
platforms = stdenv.lib.platforms.gnu ++ stdenv.lib.platforms.linux;
-
};
-
}
+9 -1
pkgs/applications/kde/gwenview.nix
···
extra-cmake-modules, kdoctools,
exiv2, lcms2,
baloo, kactivities, kdelibs4support, kio, kipi-plugins, libkdcraw, libkipi,
-
phonon, qtimageformats, qtsvg, qtx11extras, kinit
+
phonon, qtimageformats, qtsvg, qtx11extras, kinit, fetchpatch
}:
mkDerivation {
···
qtimageformats qtsvg qtx11extras
];
propagatedUserEnvPkgs = [ kipi-plugins libkipi (lib.getBin kinit) ];
+
+
# Fixes build with exiv2-0.27.1. Drop in 19.04.2
+
patches = [
+
(fetchpatch {
+
url = "https://github.com/KDE/gwenview/commit/172560b845460b6121154f88221c855542219943.patch";
+
sha256 = "0y1l34h2s7rhfknvg6ggcc389jfzhpq69wf0s3xd5ccwfw7c0ycq";
+
})
+
];
}
+4 -4
pkgs/applications/misc/1password/default.nix
···
stdenv.mkDerivation rec {
pname = "1password";
-
version = "0.5.6-003";
+
version = "0.5.7";
src =
if stdenv.hostPlatform.system == "i686-linux" then
fetchzip {
url = "https://cache.agilebits.com/dist/1P/op/pkg/v${version}/op_linux_386_v${version}.zip";
-
sha256 = "11smnx8fh32qm3b82x2ps4y46q29h77x1j1dj3d5vs0vha9b8frj";
+
sha256 = "1193lq6cvqkv2cy07l6wzb25gb5vb3s3pxm534q3izhzrrz6lisz";
stripRoot = false;
}
else if stdenv.hostPlatform.system == "x86_64-linux" then
fetchzip {
url = "https://cache.agilebits.com/dist/1P/op/pkg/v${version}/op_linux_amd64_v${version}.zip";
-
sha256 = "1qwxga6qmb3n76h2fl1lxhnz676cqbx8gic1b5c9hw88gnqwykb9";
+
sha256 = "0hlw1jasxzg31293d2n3ydzj62q7ji7nig7aaighcvzi3c9j7v51";
stripRoot = false;
}
else if stdenv.hostPlatform.system == "x86_64-darwin" then
fetchzip {
url = "https://cache.agilebits.com/dist/1P/op/pkg/v${version}/op_darwin_amd64_v${version}.zip";
-
sha256 = "0gzmwc20liqx2cqply06yarwp228ydfgfb26bmpxbvlp0cq7d07g";
+
sha256 = "05z5k63fza6v0vhydyiq4sh9xhxnd9rcfxyym7jihv6b3fv3fnx3";
stripRoot = false;
}
else throw "Architecture not supported";
+1 -1
pkgs/applications/misc/alacritty/default.nix
···
homepage = https://github.com/jwilm/alacritty;
license = with licenses; [ asl20 ];
maintainers = with maintainers; [ mic92 ];
-
platforms = [ "x86_64-linux" "x86_64-darwin" "aarch64-linux" ];
+
platforms = [ "x86_64-linux" "i686-linux" "x86_64-darwin" "aarch64-linux" ];
};
}
+2 -2
pkgs/applications/misc/calcurse/default.nix
···
stdenv.mkDerivation rec {
name = "calcurse-${version}";
-
version = "4.4.0";
+
version = "4.5.0";
src = fetchurl {
url = "https://calcurse.org/files/${name}.tar.gz";
-
sha256 = "0vw2xi6a2lrhrb8n55zq9lv4mzxhby4xdf3hmi1vlfpyrpdwkjzd";
+
sha256 = "1vjwcmp51h7dsvwn0qx93w9chp3wp970v7d9mjhk7jyamcbfywn3";
};
buildInputs = [ ncurses gettext python3 python3Packages.wrapPython ];
+2 -2
pkgs/applications/misc/copyq/default.nix
···
stdenv.mkDerivation rec {
name = "CopyQ-${version}";
-
version = "3.8.0";
+
version = "3.9.0";
src = fetchFromGitHub {
owner = "hluk";
repo = "CopyQ";
rev = "v${version}";
-
sha256 = "0kbhgg0j6iqfrpixvwl1mk3m0bz5s8bd6npk5xqcgzp1giywdc4i";
+
sha256 = "1l9f0hg2ggy944sjlyiyglln5mjm9fvgmvwp3pnvmmc6mfbmslq3";
};
nativeBuildInputs = [ cmake ];
+2 -2
pkgs/applications/misc/electron-cash/default.nix
···
python3Packages.buildPythonApplication rec {
pname = "electron-cash";
-
version = "4.0.2";
+
version = "4.0.7";
src = fetchurl {
url = "https://electroncash.org/downloads/${version}/win-linux/Electron-Cash-${version}.tar.gz";
# Verified using official SHA-1 and signature from
# https://github.com/fyookball/keys-n-hashes
-
sha256 = "6255cd0493442ec57c10ae70ca2e84c6a29497f90a1393e6ac5772afe7572acf";
+
sha256 = "d63ef2d52cff0b821b745067d752fd0c7f2902fa23eaf8e9392c54864cae5c77";
};
propagatedBuildInputs = with python3Packages; [
+30 -17
pkgs/applications/misc/gpscorrelate/default.nix
···
-
{ fetchFromGitHub, stdenv, pkgconfig, exiv2, libxml2, gtk2
-
, libxslt, docbook_xsl, docbook_xml_dtd_42 }:
+
{ fetchFromGitHub, stdenv, fetchpatch, pkgconfig, exiv2, libxml2, gtk3
+
, libxslt, docbook_xsl, docbook_xml_dtd_42, desktop-file-utils }:
stdenv.mkDerivation rec {
-
name = "gpscorrelate-${version}";
-
version = "1.6.1";
+
pname = "gpscorrelate";
+
version = "unstable-2019-06-05";
src = fetchFromGitHub {
-
owner = "freefoote";
-
repo = "gpscorrelate";
-
rev = version;
-
sha256 = "1z0fc75rx7dl6nnydksa578qv116j2c2xs1czfiijzxjghx8njdj";
+
owner = "dfandrich";
+
repo = pname;
+
rev = "80b14fe7c10c1cc8f62c13f517c062577ce88c85";
+
sha256 = "1gaan0nd7ai0bwilfnkza7lg5mz87804mvlygj0gjc672izr37r6";
};
-
nativeBuildInputs = [ pkgconfig ];
+
nativeBuildInputs = [
+
desktop-file-utils
+
docbook_xml_dtd_42
+
docbook_xsl
+
libxslt
+
pkgconfig
+
];
+
buildInputs = [
-
exiv2 libxml2 gtk2
-
libxslt docbook_xsl
-
docbook_xml_dtd_42
+
exiv2
+
gtk3
+
libxml2
+
];
+
+
makeFlags = [
+
"prefix=${placeholder ''out''}"
+
"GTK=3"
+
"CC=cc"
+
"CXX=c++"
];
-
patchPhase = ''
-
sed -i "Makefile" \
-
-es",^[[:blank:]]*prefix[[:blank:]]*=.*$,prefix = $out,g"
-
'';
+
doCheck = true;
+
+
installTargets = [ "install" "install-desktop-file" ];
meta = with stdenv.lib; {
description = "A GPS photo correlation tool, to add EXIF geotags";
···
'';
license = licenses.gpl2Plus;
-
homepage = https://github.com/freefoote/gpscorrelate;
+
homepage = "https://github.com/dfandrich/gpscorrelate";
platforms = platforms.linux;
};
}
+26 -1
pkgs/applications/misc/jekyll/default.nix
···
{ lib, bundlerApp, ruby
+
, writeShellScriptBin, makeWrapper
, withOptionalDependencies ? false
}:
-
bundlerApp rec {
+
let
+
rubyWrapper = writeShellScriptBin "ruby" ''
+
if [[ "$#" -eq 2 ]]; then
+
if [[ "''${1##*/}" == "bundle" && "$2" == "install" ]]; then
+
# See https://github.com/NixOS/nixpkgs/issues/58126 for more details.
+
echo 'Skipping "bundle install" as it fails due to the Nix wrapper.'
+
echo 'Please enter the new directory and run the following commands to serve the page:'
+
echo 'nix-shell -p bundler --run "bundle install --gemfile=Gemfile --path vendor/cache"'
+
echo 'nix-shell -p bundler --run "bundle exec jekyll serve"'
+
exit 0
+
# The following nearly works:
+
unset BUNDLE_FROZEN
+
exec ${ruby}/bin/ruby "$@" --gemfile=Gemfile --path=vendor/cache
+
fi
+
fi
+
# Else: Don't modify the arguments:
+
exec ${ruby}/bin/ruby "$@"
+
'';
+
in bundlerApp rec {
pname = "jekyll";
exes = [ "jekyll" ];
···
gemdir = if withOptionalDependencies
then ./full
else ./basic;
+
+
buildInputs = [ makeWrapper ];
+
+
postBuild = ''
+
wrapProgram $out/bin/jekyll --prefix PATH : ${rubyWrapper}/bin
+
'';
meta = with lib; {
description = "A blog-aware, static site generator, written in Ruby";
+2 -2
pkgs/applications/misc/latte-dock/default.nix
···
mkDerivation rec {
pname = "latte-dock";
-
version = "0.8.8";
+
version = "0.8.9";
name = "${pname}-${version}";
src = fetchurl {
url = "https://download.kde.org/stable/${pname}/${name}.tar.xz";
-
sha256 = "137s7rx35a5qrfww3q8bllj4zyjfa7l709snvdfj34y7jbq7p6cd";
+
sha256 = "1kkpxa39crjpqgamrcpgp1mrcdg0aq9850yb6cf7lw7d3x2fdrxj";
name = "${name}.tar.xz";
};
+1 -1
pkgs/applications/misc/lutris/default.nix
···
perl which p7zip gnused gnugrep psmisc cups lcms2 mpg123 cairo unixODBC
samba4 sane-backends openldap opencl-headers ocl-icd utillinux
-
(wine.override { wineBuild = "wineWow"; })
+
wineWowPackages.staging
# ZDOOM
soundfont-fluid bzip2 game-music-emu
+7 -2
pkgs/applications/misc/merkaartor/default.nix
···
-
{ stdenv, fetchFromGitHub, qmake, pkgconfig, boost, gdal, proj
+
{ stdenv, fetchFromGitHub, makeWrapper, qmake, pkgconfig, boost, gdal, proj
, qtbase, qtsvg, qtwebkit }:
stdenv.mkDerivation rec {
···
sha256 = "0ls3q8m1hxiwyrypy6qca8wczhl4969ncl0sszfdwfv70rzxjk88";
};
-
nativeBuildInputs = [ qmake pkgconfig ];
+
nativeBuildInputs = [ makeWrapper qmake pkgconfig ];
buildInputs = [ boost gdal proj qtbase qtsvg qtwebkit ];
enableParallelBuilding = true;
+
+
postInstall = ''
+
wrapProgram $out/bin/merkaartor \
+
--set QT_QPA_PLATFORM_PLUGIN_PATH ${qtbase.bin}/lib/qt-*/plugins/platforms
+
'';
meta = with stdenv.lib; {
description = "OpenStreetMap editor";
+2 -2
pkgs/applications/misc/pdfpc/default.nix
···
stdenv.mkDerivation rec {
name = "${product}-${version}";
product = "pdfpc";
-
version = "4.3.2";
+
version = "4.3.4";
src = fetchFromGitHub {
repo = product;
owner = product;
rev = "v${version}";
-
sha256 = "15y6g92fp6x6dwwhrhkfny5z20w7pq9c8w19fh2vzff9aa6m2h9z";
+
sha256 = "07aafsm4jzdgpahz83p0ajv40hry7gviyadqi13ahr8xdhhwy2sd";
};
nativeBuildInputs = [
+15 -4
pkgs/applications/misc/qmapshack/default.nix
···
-
{ stdenv, fetchurl, cmake, qtscript, qtwebengine, gdal, proj, routino, quazip }:
+
{ stdenv, fetchurl, fetchpatch, cmake, qtscript, qtwebengine, gdal, proj, routino, quazip }:
stdenv.mkDerivation rec {
name = "qmapshack-${version}";
-
version = "1.12.3";
+
version = "1.13.0";
src = fetchurl {
url = "https://bitbucket.org/maproom/qmapshack/downloads/${name}.tar.gz";
-
sha256 = "1yp5gw4q4gwiwr9w4dz19am0bhsla9n2l3bdlk98a7f46kxgnkrx";
+
sha256 = "1cv1f718r8vqyk2l6w3alz2aqjvb4msz8705pm9yr5ndi28qyrba";
};
nativeBuildInputs = [ cmake ];
···
cmakeFlags = [
"-DROUTINO_XML_PATH=${routino}/share/routino"
-
"-DQUAZIP_INCLUDE_DIR=${quazip}/include/quazip"
+
"-DQUAZIP_INCLUDE_DIR=${quazip}/include/quazip5"
"-DLIBQUAZIP_LIBRARY=${quazip}/lib/libquazip.so"
];
enableParallelBuilding = true;
+
+
patches = [
+
(fetchpatch {
+
url = "https://bitbucket.org/maproom/qmapshack/raw/d0b1b595578a83fda981ccc1ff24166fa636ba1d/FindPROJ4.patch";
+
sha256 = "1nx4ax233bnnj478cmjpm5c1qqmyn1navlihf10q6hhbanay9n99";
+
})
+
(fetchpatch {
+
url = "https://bitbucket.org/maproom/qmapshack/raw/d0b1b595578a83fda981ccc1ff24166fa636ba1d/FindQuaZip5.patch";
+
sha256 = "0z1b2dz2zlz685mxgn8bmh1fyhxpf6dzd6jvkkjyk2kvnrdxv3b9";
+
})
+
];
meta = with stdenv.lib; {
homepage = https://bitbucket.org/maproom/qmapshack/wiki/Home;
+2 -2
pkgs/applications/misc/termdown/default.nix
···
buildPythonApplication rec {
name = "termdown-${version}";
-
version = "1.14.1";
+
version = "1.15.0";
src = fetchFromGitHub {
rev = version;
-
sha256 = "0jgjzglna0gwp0j31l48pny69szslczl13aahwjfjypkv9lx8w2a";
+
sha256 = "08l03yk5jc1g0gps789q1s2knnaqzlidy4s5q5nhwg9g25la19nr";
repo = "termdown";
owner = "trehn";
};
+5 -3
pkgs/applications/misc/viking/default.nix
···
{ fetchurl, stdenv, makeWrapper, pkgconfig, intltool, gettext, gtk2, expat, curl
, gpsd, bc, file, gnome-doc-utils, libexif, libxml2, libxslt, scrollkeeper
-
, docbook_xml_dtd_412, gexiv2, sqlite, gpsbabel, expect, hicolor-icon-theme }:
+
, docbook_xml_dtd_412, gexiv2, sqlite, gpsbabel, expect, hicolor-icon-theme
+
, geoclue2, liboauth }:
stdenv.mkDerivation rec {
name = "viking-${version}";
-
version = "1.6.2";
+
version = "1.7";
src = fetchurl {
url = "mirror://sourceforge/viking/viking/viking-${version}.tar.bz2";
-
sha256 = "09kq0sxs2czps0d6xzgkkp41746v44ip63m72qvfs7rsrnqj7qnz";
+
sha256 = "092q2dv0rcz12nh2js1z1ralib1553dmzy9pdrvz9nv2vf61wybw";
};
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ makeWrapper intltool gettext gtk2 expat curl gpsd bc file gnome-doc-utils
libexif libxml2 libxslt scrollkeeper docbook_xml_dtd_412 gexiv2 sqlite hicolor-icon-theme
+
geoclue2 liboauth
];
configureFlags = [ "--disable-scrollkeeper --disable-mapnik" ];
+3 -3
pkgs/applications/misc/zola/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "zola";
-
version = "0.7.0";
+
version = "0.8.0";
src = fetchFromGitHub {
owner = "getzola";
repo = pname;
rev = "v${version}";
-
sha256 = "02lr1n3gf0agj8x451ndyvv16lq7rccazp4nz9zy0pzwxwrlwhra";
+
sha256 = "166kmlkzd1qyw9yq2jqs58z8b3d956jjhw9r15jzw98md949psr5";
};
-
cargoSha256 = "003dhh41fh337k3djibpj6hyd16xprbgws3lbp7x37p4lx7qlnfy";
+
cargoSha256 = "1brmlg6nqyls1v62z0fg0km150q9m7h71wy67lidcnw76icmqr24";
nativeBuildInputs = [ cmake pkgconfig ];
buildInputs = [ openssl ] ++ stdenv.lib.optionals stdenv.isDarwin [ CoreServices cf-private ];
+8 -1
pkgs/applications/networking/browsers/firefox/common.nix
···
browserPatches = [
./env_var_for_system_dir.patch
-
] ++ lib.optionals (stdenv.isAarch64 && lib.versionAtLeast ffversion "66" && lib.versionOlder ffversion "67") [
+
]
+
++ lib.optional (lib.versionAtLeast ffversion "63" && lib.versionOlder ffversion "69")
+
(fetchpatch { # https://bugzilla.mozilla.org/show_bug.cgi?id=1500436#c29
+
name = "write_error-parallel_make.diff";
+
url = "https://hg.mozilla.org/mozilla-central/raw-diff/562655fe/python/mozbuild/mozbuild/action/node.py";
+
sha256 = "11d7rgzinb4mwl7yzhidjkajynmxgmffr4l9isgskfapyax9p88y";
+
})
+
++ lib.optionals (stdenv.isAarch64 && lib.versionAtLeast ffversion "66" && lib.versionOlder ffversion "67") [
(fetchpatch {
url = "https://raw.githubusercontent.com/archlinuxarm/PKGBUILDs/09c7fa0dc1d87922e3b464c0fa084df1227fca79/extra/firefox/arm.patch";
sha256 = "1vbpih23imhv5r3g21m3m541z08n9n9j1nvmqax76bmyhn7mxp32";
+2 -2
pkgs/applications/networking/browsers/qutebrowser/default.nix
···
in python3Packages.buildPythonApplication rec {
pname = "qutebrowser";
-
version = "1.6.2";
+
version = "1.6.3";
# the release tarballs are different from the git checkout!
src = fetchurl {
url = "https://github.com/qutebrowser/qutebrowser/releases/download/v${version}/${pname}-${version}.tar.gz";
-
sha256 = "1yzwrpqpghlpy2d7pbjgcb73dbngw835l4xbimz5aa90mvqkbwg1";
+
sha256 = "0z9an14vlv0r48x7fk0mk7465gnhh19dx1w63lyhsgnfqy5pzlhy";
};
# Needs tox
+8 -3
pkgs/applications/networking/browsers/vivaldi/default.nix
···
, patchelf, makeWrapper
, isSnapshot ? false
, proprietaryCodecs ? false, vivaldi-ffmpeg-codecs ? null
+
, enableWidevine ? false, vivaldi-widevine ? null
}:
let
···
--set-rpath "${libPath}" \
opt/${vivaldiName}/vivaldi-bin
'' + stdenv.lib.optionalString proprietaryCodecs ''
-
sed -i '/^VIVALDI_FFMPEG_FOUND/ a \
-
checkffmpeg "${vivaldi-ffmpeg-codecs}/lib/libffmpeg.so"' opt/${vivaldiName}/vivaldi
+
sed -i '/^if \[ "$VIVALDI_FFMPEG_FOUND/i \
+
VIVALDI_FFMPEG_FOUND=YES\nCACHED_FFMPEG=${vivaldi-ffmpeg-codecs}/lib/libffmpeg.so' opt/${vivaldiName}/${vivaldiName}
'' + ''
echo "Finished patching Vivaldi binaries"
'';
···
"$out"/share/icons/hicolor/''${d}x''${d}/apps/vivaldi.png
done
wrapProgram "$out/bin/vivaldi" \
-
--suffix XDG_DATA_DIRS : ${gtk3}/share/gsettings-schemas/${gtk3.name}/
+
--suffix XDG_DATA_DIRS : ${gtk3}/share/gsettings-schemas/${gtk3.name}/ \
+
${stdenv.lib.optionalString enableWidevine "--suffix LD_LIBRARY_PATH : ${libPath}"}
+
'' + stdenv.lib.optionalString enableWidevine ''
+
rm $out/opt/${vivaldiName}/libwidevinecdm.so
+
ln -s ${vivaldi-widevine}/lib/libwidevinecdm.so $out/opt/${vivaldiName}/libwidevinecdm.so
'';
meta = with stdenv.lib; {
+11 -32
pkgs/applications/networking/browsers/vivaldi/ffmpeg-codecs.nix
···
{ stdenv, fetchurl
-
, dbus-glib, gtk3, libexif, libXScrnSaver, ninja, nss
-
, pciutils, pkgconfig, python2, xdg_utils, gn, at-spi2-core
+
, dpkg
}:
stdenv.mkDerivation rec {
-
name = "${product}-${version}";
-
product = "vivaldi-ffmpeg-codecs";
-
version = "72.0.3626.122";
+
name = "chromium-codecs-ffmpeg";
+
version = "74.0.3729.169";
src = fetchurl {
-
url = "https://commondatastorage.googleapis.com/chromium-browser-official/chromium-${version}.tar.xz";
-
sha512 = "1477g5dgi4m0zbiqwm9w6jqkmjfmgjlbl3qs9ljldx8bif8my1jbz4hzws954aqxyxdbf5rjpvmrrqqppk5347prvsyl37rbsndaaqf";
+
url = "https://launchpadlibrarian.net/424938057/${name}-extra_${version}-0ubuntu0.16.04.1_amd64.deb";
+
sha256 = "1ls2fshfk08hqsfvbd7p6rp2gv3n0xdy86rdh00wiz5qgl3skfzc";
};
-
buildInputs = [ ];
+
buildInputs = [ dpkg ];
-
nativeBuildInputs = [
-
gtk3 libexif libXScrnSaver ninja nss pciutils python2 xdg_utils gn
-
pkgconfig dbus-glib at-spi2-core.dev
-
];
-
-
patches = [
-
];
-
-
configurePhase = ''
-
runHook preConfigure
-
-
local args="ffmpeg_branding=\"ChromeOS\" proprietary_codecs=true enable_hevc_demuxing=true use_gnome_keyring=false use_sysroot=false use_gold=false use_allocator=\"none\" linux_use_bundled_binutils=false fatal_linker_warnings=false treat_warnings_as_errors=false enable_nacl=false enable_nacl_nonsfi=false is_clang=false clang_use_chrome_plugins=false is_component_build=true is_debug=false symbol_level=0 use_custom_libcxx=false use_lld=false use_jumbo_build=false"
-
gn gen out/Release -v --args="$args"
-
-
runHook postConfigure
+
unpackPhase = ''
+
dpkg-deb -x $src .
+
find .
'';
-
buildPhase = ''
-
ninja -C out/Release -v libffmpeg.so
-
'';
-
-
dontStrip = true;
-
installPhase = ''
-
mkdir -p "$out/lib"
-
cp out/Release/libffmpeg.so "$out/lib/libffmpeg.so"
+
install -vD usr/lib/chromium-browser/libffmpeg.so $out/lib/libffmpeg.so
'';
meta = with stdenv.lib; {
description = "Additional support for proprietary codecs for Vivaldi";
homepage = "https://ffmpeg.org/";
license = licenses.lgpl21;
-
maintainers = with maintainers; [ lluchs ];
+
maintainers = with maintainers; [ betaboon lluchs ];
platforms = [ "x86_64-linux" ];
};
}
+32
pkgs/applications/networking/browsers/vivaldi/widevine.nix
···
+
{ stdenv, fetchurl
+
, unzip
+
}:
+
+
stdenv.mkDerivation rec {
+
name = "widevine";
+
version = "4.10.1196.0";
+
+
src = fetchurl {
+
url = "https://dl.google.com/widevine-cdm/${version}-linux-x64.zip";
+
sha256 = "01c7nr7d2xs718jymicbk4ipzfx6q253109qv3lk4lryrrhvw14y";
+
};
+
+
buildInputs = [ unzip ];
+
+
unpackPhase = ''
+
unzip $src libwidevinecdm.so
+
find .
+
'';
+
+
installPhase = ''
+
install -vD libwidevinecdm.so $out/lib/libwidevinecdm.so
+
'';
+
+
meta = with stdenv.lib; {
+
description = "Widevine support for Vivaldi";
+
homepage = "https://www.widevine.com";
+
license = licenses.unfree;
+
maintainers = with maintainers; [ betaboon ];
+
platforms = [ "x86_64-linux" ];
+
};
+
}
+2 -2
pkgs/applications/networking/cluster/helmfile/default.nix
···
{ lib, buildGoModule, fetchFromGitHub, makeWrapper, kubernetes-helm, ... }:
-
let version = "0.77.0"; in
+
let version = "0.79.3"; in
buildGoModule {
pname = "helmfile";
···
owner = "roboll";
repo = "helmfile";
rev = "v${version}";
-
sha256 = "0nj8gs7aqkxpj6bd80ks7g34qqa4y53a8sim1znbxs6mb678c2x2";
+
sha256 = "0wgfpidpqyvh41dnw351v91z4szi1s6lqak9li2pmddz1rdkx66v";
};
goPackagePath = "github.com/roboll/helmfile";
+2 -2
pkgs/applications/networking/cluster/kops/default.nix
···
buildGoPackage rec {
name = "kops-${version}";
-
version = "1.11.1";
+
version = "1.12.1";
goPackagePath = "k8s.io/kops";
···
rev = version;
owner = "kubernetes";
repo = "kops";
-
sha256 = "0jia8dhawh786grnbpn64hvsdm6wz5p7hqir01q5xxpd1psnzygj";
+
sha256 = "09rmgazdrmnh1lqaayzfbn0ld7mbj9whihs9ijv5gf6si9p0ml9y";
};
buildInputs = [go-bindata];
+25
pkgs/applications/networking/cluster/kube3d/default.nix
···
+
{ stdenv, buildGoPackage, fetchFromGitHub }:
+
+
buildGoPackage rec {
+
pname = "kube3d";
+
version = "1.1.0";
+
+
goPackagePath = "github.com/rancher/k3d";
+
+
src = fetchFromGitHub {
+
owner = "rancher";
+
repo = "k3d";
+
rev = "v${version}";
+
sha256 = "180q7a95znpkhfqcaw3asqrq22r6ppw98qsggp2wfm746mllg5pc";
+
};
+
+
goDeps = ./deps.nix;
+
+
meta = with stdenv.lib; {
+
homepage = "https://github.com/rancher/k3d";
+
description = "A helper to run k3s (Lightweight Kubernetes. 5 less than k8s) in a docker container";
+
license = licenses.mit;
+
platforms = platforms.linux;
+
maintainers = with maintainers; [ kuznero ];
+
};
+
}
+174
pkgs/applications/networking/cluster/kube3d/deps.nix
···
+
# file generated from go.mod using vgo2nix (https://github.com/adisbladis/vgo2nix)
+
[
+
{
+
goPackagePath = "github.com/Microsoft/go-winio";
+
fetch = {
+
type = "git";
+
url = "https://github.com/Microsoft/go-winio";
+
rev = "v0.4.12";
+
sha256 = "10v2f1xaw2cc97mjqnxzgs9ydpqv71f0ynp1spcywqw97la56zqw";
+
};
+
}
+
{
+
goPackagePath = "github.com/davecgh/go-spew";
+
fetch = {
+
type = "git";
+
url = "https://github.com/davecgh/go-spew";
+
rev = "v1.1.0";
+
sha256 = "0d4jfmak5p6lb7n2r6yvf5p1zcw0l8j74kn55ghvr7zr7b7axm6c";
+
};
+
}
+
{
+
goPackagePath = "github.com/docker/distribution";
+
fetch = {
+
type = "git";
+
url = "https://github.com/docker/distribution";
+
rev = "v2.7.1";
+
sha256 = "1nx8b5a68rn81alp8wkkw6qd5v32mgf0fk23mxm60zdf63qk1nzw";
+
};
+
}
+
{
+
goPackagePath = "github.com/docker/docker";
+
fetch = {
+
type = "git";
+
url = "https://github.com/docker/docker";
+
rev = "v1.13.1";
+
sha256 = "0l9kjibnpwcgk844sibxk9ppyqniw9r0np1mzp95f8f461jb0iar";
+
};
+
}
+
{
+
goPackagePath = "github.com/docker/go-connections";
+
fetch = {
+
type = "git";
+
url = "https://github.com/docker/go-connections";
+
rev = "v0.4.0";
+
sha256 = "0mv6f6b5nljc17dmwmc28hc0y11pqglz7x0d2mjrwdmfxf64hwqq";
+
};
+
}
+
{
+
goPackagePath = "github.com/docker/go-units";
+
fetch = {
+
type = "git";
+
url = "https://github.com/docker/go-units";
+
rev = "v0.3.3";
+
sha256 = "0npxsb3pp89slwf4a73fxm20hykad8xggij6i6hcd5jy19bjrd93";
+
};
+
}
+
{
+
goPackagePath = "github.com/mattn/go-runewidth";
+
fetch = {
+
type = "git";
+
url = "https://github.com/mattn/go-runewidth";
+
rev = "v0.0.4";
+
sha256 = "00b3ssm7wiqln3k54z2wcnxr3k3c7m1ybyhb9h8ixzbzspld0qzs";
+
};
+
}
+
{
+
goPackagePath = "github.com/mitchellh/go-homedir";
+
fetch = {
+
type = "git";
+
url = "https://github.com/mitchellh/go-homedir";
+
rev = "v1.1.0";
+
sha256 = "0ydzkipf28hwj2bfxqmwlww47khyk6d152xax4bnyh60f4lq3nx1";
+
};
+
}
+
{
+
goPackagePath = "github.com/olekukonko/tablewriter";
+
fetch = {
+
type = "git";
+
url = "https://github.com/olekukonko/tablewriter";
+
rev = "v0.0.1";
+
sha256 = "0hh95glg7d2md185r03wn52j2r33jc4zil0qvcrs66ka7bdxi7vj";
+
};
+
}
+
{
+
goPackagePath = "github.com/opencontainers/go-digest";
+
fetch = {
+
type = "git";
+
url = "https://github.com/opencontainers/go-digest";
+
rev = "v1.0.0-rc1";
+
sha256 = "01gc7fpn8ax429024p2fcx3yb18axwz5bjf2hqxlii1jbsgw4bh9";
+
};
+
}
+
{
+
goPackagePath = "github.com/pkg/errors";
+
fetch = {
+
type = "git";
+
url = "https://github.com/pkg/errors";
+
rev = "v0.8.1";
+
sha256 = "0g5qcb4d4fd96midz0zdk8b9kz8xkzwfa8kr1cliqbg8sxsy5vd1";
+
};
+
}
+
{
+
goPackagePath = "github.com/pmezard/go-difflib";
+
fetch = {
+
type = "git";
+
url = "https://github.com/pmezard/go-difflib";
+
rev = "v1.0.0";
+
sha256 = "0c1cn55m4rypmscgf0rrb88pn58j3ysvc2d0432dp3c6fqg6cnzw";
+
};
+
}
+
{
+
goPackagePath = "github.com/stretchr/objx";
+
fetch = {
+
type = "git";
+
url = "https://github.com/stretchr/objx";
+
rev = "v0.1.0";
+
sha256 = "19ynspzjdynbi85xw06mh8ad5j0qa1vryvxjgvbnyrr8rbm4vd8w";
+
};
+
}
+
{
+
goPackagePath = "github.com/stretchr/testify";
+
fetch = {
+
type = "git";
+
url = "https://github.com/stretchr/testify";
+
rev = "v1.3.0";
+
sha256 = "0wjchp2c8xbgcbbq32w3kvblk6q6yn533g78nxl6iskq6y95lxsy";
+
};
+
}
+
{
+
goPackagePath = "github.com/urfave/cli";
+
fetch = {
+
type = "git";
+
url = "https://github.com/urfave/cli";
+
rev = "v1.20.0";
+
sha256 = "0y6f4sbzkiiwrxbl15biivj8c7qwxnvm3zl2dd3mw4wzg4x10ygj";
+
};
+
}
+
{
+
goPackagePath = "golang.org/x/crypto";
+
fetch = {
+
type = "git";
+
url = "https://go.googlesource.com/crypto";
+
rev = "c2843e01d9a2";
+
sha256 = "01xgxbj5r79nmisdvpq48zfy8pzaaj90bn6ngd4nf33j9ar1dp8r";
+
};
+
}
+
{
+
goPackagePath = "golang.org/x/net";
+
fetch = {
+
type = "git";
+
url = "https://go.googlesource.com/net";
+
rev = "b630fd6fe46b";
+
sha256 = "0m84kwckmmc0z05kjb4dd43g1g61al32a4z593flpcbaqx8di5sd";
+
};
+
}
+
{
+
goPackagePath = "golang.org/x/sys";
+
fetch = {
+
type = "git";
+
url = "https://go.googlesource.com/sys";
+
rev = "d0b11bdaac8a";
+
sha256 = "18yfsmw622l7gc5sqriv5qmck6903vvhivpzp8i3xfy3z33dybdl";
+
};
+
}
+
{
+
goPackagePath = "golang.org/x/text";
+
fetch = {
+
type = "git";
+
url = "https://go.googlesource.com/text";
+
rev = "v0.3.0";
+
sha256 = "0r6x6zjzhr8ksqlpiwm5gdd7s209kwk5p4lw54xjvz10cs3qlq19";
+
};
+
}
+
]
+5 -5
pkgs/applications/networking/cluster/kubecfg/default.nix
···
{ lib, buildGoPackage, fetchFromGitHub, ... }:
-
let version = "0.9.1"; in
+
let version = "0.12.0"; in
buildGoPackage {
name = "kubecfg-${version}";
src = fetchFromGitHub {
-
owner = "ksonnet";
+
owner = "bitnami";
repo = "kubecfg";
rev = "v${version}";
-
sha256 = "010k33arxa4spaq923iazsisxgsaj8c7w4z250y9yrch8xxd74bi";
+
sha256 = "118p1fy6cihswwz03vp62cz8395hgfqd82nmfkw88fx7av23rfhb";
};
-
goPackagePath = "github.com/ksonnet/kubecfg";
+
goPackagePath = "github.com/bitnami/kubecfg";
meta = {
description = "A tool for managing Kubernetes resources as code";
-
homepage = https://github.com/ksonnet/kubecfg;
+
homepage = https://github.com/bitnami/kubecfg;
license = lib.licenses.asl20;
maintainers = with lib.maintainers; [ benley ];
platforms = lib.platforms.unix;
+6 -2
pkgs/applications/networking/cluster/nomad/default.nix
···
buildGoPackage rec {
name = "nomad-${version}";
-
version = "0.8.7";
+
version = "0.9.3";
rev = "v${version}";
goPackagePath = "github.com/hashicorp/nomad";
···
owner = "hashicorp";
repo = "nomad";
inherit rev;
-
sha256 = "0nkqiqkrccfmn7qkbhd48m9m56ix4xb0a3ar0z0pl4sbm25rlj0b";
+
sha256 = "0hn9rr5v2y2pw0pmn27gz8dx5n964dsaf48sh0jhwc95b5q1rjwr";
};
+
+
# We disable Nvidia GPU scheduling on Linux, as it doesn't work there:
+
# Ref: https://github.com/hashicorp/nomad/issues/5535
+
buildFlags = stdenv.lib.optionalString (stdenv.isLinux) "-tags nonvidia";
meta = with stdenv.lib; {
homepage = https://www.nomadproject.io/;
+2 -2
pkgs/applications/networking/instant-messengers/baresip/default.nix
···
, gsm, speex, portaudio, spandsp, libuuid, ccache, libvpx
}:
stdenv.mkDerivation rec {
-
version = "0.6.2";
+
version = "0.6.3";
name = "baresip-${version}";
src=fetchurl {
url = "http://www.creytiv.com/pub/baresip-${version}.tar.gz";
-
sha256 = "1qi8im5sc3jbpic1sn46mmd98y0pckpnngf4n8dqdp76m4gf3yp1";
+
sha256 = "031hjm30v45h1sfknrf2f2ci10n712bdkcyf92y2hzllnik58068";
};
nativeBuildInputs = [ pkgconfig ];
buildInputs = [zlib openssl libre librem cairo mpg123
+3 -3
pkgs/applications/networking/instant-messengers/discord/default.nix
···
pname = "discord-canary";
binaryName = "DiscordCanary";
desktopName = "Discord Canary";
-
version = "0.0.84";
+
version = "0.0.85";
src = fetchurl {
-
url = "https://dl-canary.discordapp.net/apps/linux/0.0.84/discord-canary-0.0.84.tar.gz";
-
sha256 = "1s4m7qvwyb0zglgdcixfnp5asachkybfafbmr74c7zrb0scl80s1";
+
url = "https://dl-canary.discordapp.net/apps/linux/0.0.85/discord-canary-0.0.85.tar.gz";
+
sha256 = "0kr2mxpghqbj856l09fgw3cmlbdv9h2cd5gxwaymnnywif7czp4j";
};
};
}.${branch}
+9 -1
pkgs/applications/networking/instant-messengers/fractal/default.nix
···
{ stdenv, fetchFromGitLab, meson, ninja, gettext, cargo, rustc, python3, rustPlatform, pkgconfig, gtksourceview
-
, hicolor-icon-theme, glib, libhandy, gtk3, libsecret, dbus, openssl, sqlite, gst_all_1, wrapGAppsHook }:
+
, hicolor-icon-theme, glib, libhandy, gtk3, libsecret, dbus, openssl, sqlite, gst_all_1, wrapGAppsHook, fetchpatch }:
rustPlatform.buildRustPackage rec {
version = "4.0.0";
···
buildInputs = [
glib gtk3 libhandy dbus openssl sqlite gst_all_1.gstreamer gst_all_1.gst-plugins-base gst_all_1.gst-plugins-bad
gtksourceview hicolor-icon-theme libsecret
+
];
+
+
patches = [
+
# Fixes build with >= gstreamer 1.15.1
+
(fetchpatch {
+
url = "https://gitlab.gnome.org/GNOME/fractal/commit/e78f36c25c095ea09c9c421187593706ad7c4065.patch";
+
sha256 = "1qv7ayhkhgrrldag2lzs9ql17nbc1d72j375ljhhf6cms89r19ir";
+
})
];
postPatch = ''
+10 -8
pkgs/applications/networking/instant-messengers/gomuks/default.nix
···
-
{ stdenv, buildGo110Package, fetchFromGitHub }:
+
{ stdenv, buildGoModule, fetchFromGitHub }:
-
buildGo110Package rec {
-
name = "gomuks-${version}";
-
version = "2018-07-10";
+
buildGoModule rec {
+
pname = "gomuks";
+
version = "2019-06-28";
goPackagePath = "maunium.net/go/gomuks";
src = fetchFromGitHub {
owner = "tulir";
-
repo = "gomuks";
-
rev = "68db26bcace31297471641fe95f8882e301f5699";
-
sha256 = "0dagdvsvn8nwqsvjbqk1c6gg2q1m40869nayrkwm3ndg2xkfdpm6";
+
repo = pname;
+
rev = "37df8eb454088e61db7a14f382851205bc1806ad";
+
sha256 = "1hr15d9sbq6mddaxv3pwz86qp1hhzssgrvakfpc49xl4h04dq33g";
};
+
modSha256 = "1qrqgzzsxqvmy4m9shypa94bzw34mc941jhmyccip9grk9fzsxws";
+
meta = with stdenv.lib; {
-
homepage = https://maunium.net/go/gomuks/;
+
homepage = "https://maunium.net/go/gomuks/";
description = "A terminal based Matrix client written in Go";
license = licenses.gpl3;
maintainers = with maintainers; [ tilpner ];
+1 -1
pkgs/applications/networking/instant-messengers/riot/riot-desktop-package.json
···
"name": "riot-web",
"productName": "Riot",
"main": "src/electron-main.js",
-
"version": "1.2.1",
+
"version": "1.2.2",
"description": "A feature-rich client for Matrix.org",
"author": "New Vector Ltd.",
"dependencies": {
+2 -2
pkgs/applications/networking/instant-messengers/riot/riot-desktop.nix
···
let
executableName = "riot-desktop";
-
version = "1.2.1";
+
version = "1.2.2";
riot-web-src = fetchFromGitHub {
owner = "vector-im";
repo = "riot-web";
rev = "v${version}";
-
sha256 = "0l50swqzdzbzbnrlkvwi133d54jgj15cj3awmlc1qdhnfdc3wxbb";
+
sha256 = "0ak1icl3apqn1b210jqj9ysnn40808lzrdwibdmv47c30hhq10fb";
};
in mkYarnPackage rec {
+2 -2
pkgs/applications/networking/instant-messengers/riot/riot-web.nix
···
let configFile = writeText "riot-config.json" conf; in
stdenv.mkDerivation rec {
name= "riot-web-${version}";
-
version = "1.2.1";
+
version = "1.2.2";
src = fetchurl {
url = "https://github.com/vector-im/riot-web/releases/download/v${version}/riot-v${version}.tar.gz";
-
sha256 = "1h96c4yy06ag5lmsbm5h2ws1l7sp4qm5dcchw25k3937fdhwq840";
+
sha256 = "19nb6gyjaijah068ika6hvk18hraivm71830i9cd4ssl6g5j4k8x";
};
installPhase = ''
+2 -2
pkgs/applications/networking/instant-messengers/signal-desktop/default.nix
···
in stdenv.mkDerivation rec {
name = "signal-desktop-${version}";
-
version = "1.25.1";
+
version = "1.25.3";
src = fetchurl {
url = "https://updates.signal.org/desktop/apt/pool/main/s/signal-desktop/signal-desktop_${version}_amd64.deb";
-
sha256 = "1185psv93amqj0s7rgm8bhl3y4jcxc1945paslvjbmw01vi3p1lp";
+
sha256 = "0f7pip4d97xixwf667xpi50r0r65givvmry862zhp2cq24bs0693";
};
phases = [ "unpackPhase" "installPhase" ];
+2 -2
pkgs/applications/networking/irc/irssi/default.nix
···
{ stdenv, fetchurl, pkgconfig, ncurses, glib, openssl, perl, libintl }:
stdenv.mkDerivation rec {
-
version = "1.2.0";
+
version = "1.2.1";
name = "irssi-${version}";
src = fetchurl {
url = "https://github.com/irssi/irssi/releases/download/${version}/${name}.tar.gz";
-
sha256 = "1sp3fc5fkdx0mmllvag94xaifnqbj1k09nl235pix26vv1gzq39m";
+
sha256 = "01lay6bxgsk2vzkiknw12zr8gvgnvk9xwg992496knsgakr0x2zx";
};
nativeBuildInputs = [ pkgconfig ];
+4
pkgs/applications/networking/irc/weechat/scripts/weechat-matrix-bridge/default.nix
···
maintainers = with maintainers; [ ma27 ];
license = licenses.mit; # see https://github.com/torhve/weechat-matrix-protocol-script/blob/0052e7275ae149dc5241226391c9b1889ecc3c6b/matrix.lua#L53
platforms = platforms.unix;
+
+
# As of 2019-06-30, all of the dependencies are available on macOS but the
+
# package itself does not build.
+
broken = stdenv.isDarwin;
};
}
+11 -10
pkgs/applications/networking/p2p/transgui/default.nix
···
-
{ stdenv, fetchsvn, pkgconfig, makeDesktopItem, unzip, fpc, lazarus,
+
{ stdenv, fetchFromGitHub, pkgconfig, makeDesktopItem, unzip, fpc, lazarus,
libX11, glib, gtk2, gdk_pixbuf, pango, atk, cairo, openssl }:
stdenv.mkDerivation rec {
-
name = "transgui-5.0.1-svn-r${revision}";
-
revision = "988";
+
pname = "transgui";
+
version = "5.17.0";
-
src = fetchsvn {
-
url = "https://svn.code.sf.net/p/transgui/code/trunk/";
-
rev = revision;
-
sha256 = "1i6ysxs6d2wsmqi6ha10rl3n562brmhizlanhcfad04i53y8pyxf";
+
src = fetchFromGitHub {
+
owner = "transmission-remote-gui";
+
repo = "transgui";
+
rev = "v${version}";
+
sha256 = "0p76vavny5asi5naa4jn67raxlarsmrkbchfn96y6gh5p2vzwpl7";
};
nativeBuildInputs = [ pkgconfig ];
···
substituteInPlace restranslator.pas --replace /usr/ $out/
'';
-
patches = [
-
./r988-compile-fix.patch
-
];
+
preBuild = ''
+
lazbuild -B transgui.lpr --lazarusdir=${lazarus}/share/lazarus
+
'';
makeFlags = [
"FPC=fpc"
-22
pkgs/applications/networking/p2p/transgui/r988-compile-fix.patch
···
-
diff --git a/utils.pas b/utils.pas
-
index eb8b828..1ff2440 100644
-
--- a/utils.pas
-
+++ b/utils.pas
-
@@ -100,7 +100,7 @@ uses
-
{$ifdef CALLSTACK}
-
lineinfo2,
-
{$endif CALLSTACK}
-
- LazFileUtils, LazUtf8, StdCtrls, Graphics;
-
+ LazFileUtils, LazUtf8, StdCtrls, Graphics, FileUtil;
-
-
{$ifdef windows}
-
function FileOpenUTF8(Const FileName : string; Mode : Integer) : THandle;
-
@@ -235,7 +235,7 @@ end;
-
-
function ParamStrUTF8(Param: Integer): utf8string;
-
begin
-
- Result:=FileUtil.ParamStrUTF8(Param);
-
+ Result:=LazUtf8.ParamStrUTF8(Param);
-
end;
-
-
function ParamCount: integer;
+2 -2
pkgs/applications/networking/znc/default.nix
···
stdenv.mkDerivation rec {
name = "znc-${version}";
-
version = "1.7.3";
+
version = "1.7.4";
src = fetchurl {
url = "https://znc.in/releases/archive/${name}.tar.gz";
-
sha256 = "0g8i5hsl4kinpz1wp0a2zniidv3w2sd6awq8676fds516wcc6k0y";
+
sha256 = "0wcvqkpin8w4i72alnn0nxnrc9ih543qs34hqpk9xmz6m0hjk8xi";
};
nativeBuildInputs = [ pkgconfig ];
+2 -2
pkgs/applications/office/gnucash/default.nix
···
stdenv.mkDerivation rec {
name = "gnucash-${version}";
-
version = "3.5";
+
version = "3.6";
src = fetchurl {
url = "mirror://sourceforge/gnucash/${name}.tar.bz2";
-
sha256 = "0ibp7g6aknvnkwkin97kv04ipksy3l18dsz9qysjb7h2nr8hnvbp";
+
sha256 = "09azp17ghn7i8kwk0ci3gq0qkn5pvbknhf1cbk7v43mvc3g8djzi";
};
nativeBuildInputs = [ pkgconfig makeWrapper cmake gtest ];
+57
pkgs/applications/office/timetable/default.nix
···
+
{ stdenv
+
, fetchFromGitHub
+
, glib
+
, gtk3
+
, hicolor-icon-theme
+
, json-glib
+
, libgee
+
, meson
+
, ninja
+
, pkgconfig
+
, pantheon
+
, python3
+
, wrapGAppsHook
+
}:
+
+
+
stdenv.mkDerivation rec {
+
pname = "timetable";
+
version = "1.0.6";
+
+
src = fetchFromGitHub {
+
owner = "lainsce";
+
repo = pname;
+
rev = version;
+
sha256 = "080xgp917v6j40qxy0y1iycz01yylbcr8pahx6zd6mpi022ccfv0";
+
};
+
+
nativeBuildInputs = [
+
meson
+
ninja
+
pkgconfig
+
pantheon.vala
+
python3
+
wrapGAppsHook
+
];
+
+
buildInputs = [
+
glib
+
gtk3
+
hicolor-icon-theme
+
json-glib
+
libgee
+
pantheon.granite
+
];
+
+
postPatch = ''
+
chmod +x meson/post_install.py
+
patchShebangs meson/post_install.py
+
'';
+
+
meta = with stdenv.lib; {
+
description = "Plot out your own timetable for the week and organize it";
+
homepage = "https://github.com/lainsce/timetable";
+
maintainers = [ maintainers.kjuvi ] ++ pantheon.maintainers;
+
license = licenses.gpl2Plus;
+
};
+
}
+7 -15
pkgs/applications/office/watson/default.nix
···
with pythonPackages;
buildPythonApplication rec {
-
pname = "td-watson";
-
version = "1.5.2";
+
pname = "watson";
+
version = "1.7.0";
src = fetchPypi {
-
inherit version pname;
-
sha256 = "6e03d44a9278807fe5245e9ed0943f13ffb88e11249a02655c84cb86260b27c8";
+
inherit version;
+
pname = "td-watson";
+
sha256 = "249313996751f32f38817d424cbf8d74956461df1439f0ee3a962fcc3c77225d";
};
-
# uses tox, test invocation fails
-
doCheck = true;
checkPhase = ''
-
py.test -vs tests
+
pytest -vs tests
'';
-
patches = [
-
(fetchpatch {
-
url = https://github.com/TailorDev/Watson/commit/f5760c71cbc22de4e12ede8f6f7257515a9064d3.patch;
-
sha256 = "0s9h26915ilpbd0qhmvk77r3gmrsdrl5l7dqxj0l5q66fp0z6b0g";
-
})
-
];
-
checkInputs = [ py pytest pytest-datafiles mock pytest-mock pytestrunner ];
propagatedBuildInputs = [ requests click arrow ];
···
homepage = https://tailordev.github.io/Watson/;
description = "A wonderful CLI to track your time!";
license = licenses.mit;
-
maintainers = with maintainers; [ mguentner ] ;
+
maintainers = with maintainers; [ mguentner nathyong ] ;
};
}
+2 -2
pkgs/applications/radio/soapyuhd/default.nix
···
} :
let
-
version = "0.3.5";
+
version = "0.3.6";
in stdenv.mkDerivation {
name = "soapyuhd-${version}";
···
owner = "pothosware";
repo = "SoapyUHD";
rev = "soapy-uhd-${version}";
-
sha256 = "07cr4zk42d0l5g03wm7dzl5lmqr104hmzp1fdjqa1z7xq4v9c9b1";
+
sha256 = "11kp5iv21k8lqwjjydzqmcxdgpm6yicw6d3jhzvcvwcavd41crs7";
};
nativeBuildInputs = [ cmake pkgconfig ];
+2 -2
pkgs/applications/radio/urh/default.nix
···
python3Packages.buildPythonApplication rec {
pname = "urh";
-
version = "2.7.0";
+
version = "2.7.2";
src = fetchFromGitHub {
owner = "jopohl";
repo = pname;
rev = "v${version}";
-
sha256 = "0yxv38p8a2srk9c55jj96vcib6m6pb6m485ysfg2ilwjzipx2ab0";
+
sha256 = "14027dcq0ag2qjpxcmsb9n1c64ypmi4rycwxzm2hajj7hk2736hv";
};
buildInputs = [ hackrf rtl-sdr airspy limesuite ];
+2 -2
pkgs/applications/science/astronomy/stellarium/default.nix
···
mkDerivation rec {
name = "stellarium-${version}";
-
version = "0.19.0";
+
version = "0.19.1";
src = fetchFromGitHub {
owner = "Stellarium";
repo = "stellarium";
rev = "v${version}";
-
sha256 = "1x9s9v9ann93nyqd8n8adwhx66xgq5vp0liyzl1h1ji6qk8jla3c";
+
sha256 = "0hf1wv2bb5j7ny2xh29mj9m4hjblhn02zylay8gl85w7xlqs7s5r";
};
nativeBuildInputs = [ cmake perl ];
+6 -6
pkgs/applications/science/biology/mosdepth/default.nix
···
hts-nim = fetchFromGitHub {
owner = "brentp";
repo = "hts-nim";
-
rev = "v0.2.5";
-
sha256 = "1fma99rjqxgg9dihkd10hm1jjp5amsk5wsxnvq1lk4mcsjix5xqb";
+
rev = "v0.2.14";
+
sha256 = "0d1z4b6mrppmz3hgkxd4wcy79w68icvhi7q7n3m2k17n8f3xbdx3";
};
docopt = fetchFromGitHub {
owner = "docopt";
repo = "docopt.nim";
-
rev = "v0.6.5";
-
sha256 = "0yx79m4jkdcazwlky55nwf39zj5kdhymrrdrjq29mahiwx83x5zr";
+
rev = "v0.6.7";
+
sha256 = "1ga7ckg21fzwwvh26jp2phn2h3pvkn8g8sm13dxif33rp471bv37";
};
in stdenv.mkDerivation rec {
name = "mosdepth-${version}";
-
version = "0.2.3";
+
version = "0.2.6";
src = fetchFromGitHub {
owner = "brentp";
repo = "mosdepth";
rev = "v${version}";
-
sha256 = "1b9frrwhcvay3alhn0d02jccc2qlbij1732hzq9nhwnr4kvsvxx7";
+
sha256 = "0i9pl9lsli3y84ygxanrr525gfg8fs9h481944cbzsmqmbldwvgk";
};
buildInputs = [ nim ];
+30
pkgs/applications/science/biology/octopus/default.nix
···
+
{stdenv, fetchFromGitHub, cmake, boost, gmp, htslib, zlib, lzma, pkg-config}:
+
+
stdenv.mkDerivation rec {
+
pname = "octopus";
+
version = "0.6.3-beta";
+
name = "${pname}-${version}";
+
+
src = fetchFromGitHub {
+
owner = "luntergroup";
+
repo = "octopus";
+
rev = "v${version}";
+
sha256 = "042fycg8ppld7iajpzq2d8h8wr0nw43zbl57y125sfihryvr373n";
+
};
+
+
nativeBuildInputs = [ cmake pkg-config ];
+
buildInputs = [ boost gmp htslib zlib lzma ];
+
+
postInstall = ''
+
mkdir $out/bin
+
mv $out/octopus $out/bin
+
'';
+
+
meta = with stdenv.lib; {
+
description = "Bayesian haplotype-based mutation calling";
+
license = licenses.mit;
+
homepage = "https://github.com/luntergroup/octopus";
+
maintainers = with maintainers; [ jbedo ];
+
platforms = platforms.x86_64;
+
};
+
}
+2 -2
pkgs/applications/science/electronics/verilator/default.nix
···
stdenv.mkDerivation rec {
name = "verilator-${version}";
-
version = "4.014";
+
version = "4.016";
src = fetchurl {
url = "https://www.veripool.org/ftp/${name}.tgz";
-
sha256 = "1srk9a03hbq8rdp4mma817aiq61c2hbrs66qv25zj3dfnfqigxgd";
+
sha256 = "18fqm6pgscy504ql27i150fdsd2j91hw5qsnpymws3pvqj2qz2ij";
};
enableParallelBuilding = true;
+2 -2
pkgs/applications/science/math/gap/default.nix
···
stdenv.mkDerivation rec {
pname = "gap";
# https://www.gap-system.org/Releases/
-
version = "4.10.1";
+
version = "4.10.2";
src = fetchurl {
url = "https://www.gap-system.org/pub/gap/gap-${lib.versions.major version}.${lib.versions.minor version}/tar.bz2/gap-${version}.tar.bz2";
-
sha256 = "136s0zvhcw41fshj5zgsrjcy2kd58cdh2m3ddp5rdizi4rx54f10";
+
sha256 = "0cp6ddk0469zzv1m1vair6gm27ic6c5m77ri8rn0znq3gaps6x94";
};
# remove all non-essential packages (which take up a lot of space)
+1 -1
pkgs/applications/science/math/sage/default.nix
···
singular = pkgs.singular.override { inherit flint; };
# https://trac.sagemath.org/ticket/26625
-
maxima-ecl = pkgs.maxima-ecl-5_41;
+
maxima-ecl = pkgs.maxima-ecl;
# *not* to confuse with the python package "pynac"
pynac = pkgs.pynac.override { inherit singular flint; };
-26
pkgs/applications/science/math/sage/patches/do-not-test-package-manifests.patch
···
-
diff --git a/src/sage/misc/package.py b/src/sage/misc/package.py
-
index 3bca15d53b..7cf04ff8d1 100644
-
--- a/src/sage/misc/package.py
-
+++ b/src/sage/misc/package.py
-
@@ -478,16 +478,16 @@ def package_manifest(package):
-
-
EXAMPLES::
-
-
- sage: from sage.misc.package import package_manifest
-
- sage: sagetex_manifest = package_manifest('sagetex')
-
- sage: sagetex_manifest['package_name'] == 'sagetex'
-
+ sage: from sage.misc.package import package_manifest # optional - buildsystem
-
+ sage: sagetex_manifest = package_manifest('sagetex') # optional - buildsystem
-
+ sage: sagetex_manifest['package_name'] == 'sagetex' # optional - buildsystem
-
True
-
- sage: 'files' in sagetex_manifest
-
+ sage: 'files' in sagetex_manifest # optional - buildsystem
-
True
-
-
Test a nonexistent package::
-
-
- sage: package_manifest('dummy-package')
-
+ sage: package_manifest('dummy-package') # optional - buildsystem
-
Traceback (most recent call last):
-
...
-
KeyError: 'dummy-package'
+57
pkgs/applications/science/math/sage/patches/sphinx-docbuild-subprocesses.patch
···
+
diff --git a/src/sage_setup/docbuild/__init__.py b/src/sage_setup/docbuild/__init__.py
+
index 0f2700168a..60f71357d2 100644
+
--- a/src/sage_setup/docbuild/__init__.py
+
+++ b/src/sage_setup/docbuild/__init__.py
+
@@ -86,26 +86,6 @@ def builder_helper(type):
+
"""
+
Returns a function which builds the documentation for
+
output type ``type``.
+
-
+
- TESTS:
+
-
+
- Check that :trac:`25161` has been resolved::
+
-
+
- sage: from sage_setup.docbuild import DocBuilder, setup_parser
+
- sage: DocBuilder._options = setup_parser().parse_args([])[0] # builder_helper needs _options to be set
+
-
+
- sage: import sage_setup.docbuild.sphinxbuild
+
- sage: def raiseBaseException():
+
- ....: raise BaseException("abort pool operation")
+
- sage: original_runsphinx, sage_setup.docbuild.sphinxbuild.runsphinx = sage_setup.docbuild.sphinxbuild.runsphinx, raiseBaseException
+
-
+
- sage: from sage_setup.docbuild import builder_helper, build_many, build_ref_doc
+
- sage: helper = builder_helper("html")
+
- sage: try:
+
- ....: build_many(build_ref_doc, [("docname", "en", "html", {})])
+
- ....: except Exception as E:
+
- ....: "Non-exception during docbuild: abort pool operation" in str(E)
+
- True
+
"""
+
def f(self, *args, **kwds):
+
output_dir = self._output_dir(type)
+
@@ -127,10 +107,9 @@ def builder_helper(type):
+
logger.debug(build_command)
+
+
# Run Sphinx with Sage's special logger
+
- sys.argv = ["sphinx-build"] + build_command.split()
+
- from .sphinxbuild import runsphinx
+
+ args = "python -um sage_setup.docbuild.sphinxbuild -N".split() + build_command.split()
+
try:
+
- runsphinx()
+
+ subprocess.check_call(args)
+
except Exception:
+
if ABORT_ON_ERROR:
+
raise
+
diff --git a/src/sage_setup/docbuild/sphinxbuild.py b/src/sage_setup/docbuild/sphinxbuild.py
+
index 9a2fba79bc..77c8ed3592 100644
+
--- a/src/sage_setup/docbuild/sphinxbuild.py
+
+++ b/src/sage_setup/docbuild/sphinxbuild.py
+
@@ -318,3 +318,8 @@ def runsphinx():
+
sys.stderr = saved_stderr
+
sys.stdout.flush()
+
sys.stderr.flush()
+
+
+
+if __name__ == '__main__':
+
+ import sys
+
+ sys.argv[0] = "sphinx-build"
+
+ runsphinx()
+7 -66
pkgs/applications/science/math/sage/sage-src.nix
···
# all get the same sources with the same patches applied.
stdenv.mkDerivation rec {
-
version = "8.7";
+
version = "8.8";
pname = "sage-src";
src = fetchFromGitHub {
owner = "sagemath";
repo = "sage";
rev = version;
-
sha256 = "05vvrd6syh0hlmrk6kzjrwd0hpmvxp8vr8p3mkjb0jh5p2kjdd27";
+
sha256 = "0jm7zdkz8wfgrmf6620jfr8kgvprrz3qfl8gzx6rl5z5cm734b6x";
};
# Patches needed because of particularities of nix or the way this is packaged.
···
# Fixes a potential race condition which can lead to transient doctest failures.
./patches/fix-ecl-race.patch
-
# Parallelize docubuild using subprocesses, fixing an isolation issue. See
-
# https://groups.google.com/forum/#!topic/sage-packaging/YGOm8tkADrE
-
(fetchpatch {
-
name = "sphinx-docbuild-subprocesses.patch";
-
url = "https://salsa.debian.org/science-team/sagemath/raw/8a215b17e6f791ddfae6df8ce6d01dfb89acb434/debian/patches/df-subprocess-sphinx.patch";
-
sha256 = "07p9i0fwjgapmfvmi436yn6v60p8pvmxqjc93wsssqgh5kd8qw3n";
-
stripLen = 1;
-
})
-
-
# Part of the build system. Should become unnecessary with sage 8.8.
-
# Upstream discussion here: https://trac.sagemath.org/ticket/27124#comment:33
-
./patches/do-not-test-package-manifests.patch
-
# Not necessary since library location is set explicitly
# https://trac.sagemath.org/ticket/27660#ticket
./patches/do-not-test-find-library.patch
-
# https://trac.sagemath.org/ticket/27697#ticket
-
(fetchpatch {
-
name = "pplpy-doc-location-configurable.patch";
-
url = "https://git.sagemath.org/sage.git/patch/?h=c4d966e7cb0c7b87c55d52dc6f46518433a2a0a2";
-
sha256 = "0pqbbsx8mriwny422s9mp3z5d095cnam32sm62q4mxk8g8jb9vm9";
-
})
# https://trac.sagemath.org/ticket/28007
./patches/threejs-offline.patch
+
+
# Parallelize docubuild using subprocesses, fixing an isolation issue. See
+
# https://groups.google.com/forum/#!topic/sage-packaging/YGOm8tkADrE
+
./patches/sphinx-docbuild-subprocesses.patch
];
# Since sage unfortunately does not release bugfix releases, packagers must
# fix those bugs themselves. This is for critical bugfixes, where "critical"
# == "causes (transient) doctest failures / somebody complained".
-
bugfixPatches = [
-
# Transient doctest failure in src/sage/modular/abvar/torsion_subgroup.py
-
# https://trac.sagemath.org/ticket/27477
-
(fetchpatch {
-
name = "sig_on_in_matrix_sparce.patch";
-
url = "https://git.sagemath.org/sage.git/patch?id2=10407524b18659e14e184114b61c043fb816f3c2&id=c9b0cc9d0b8748ab85e568f8f57f316c5e8cbe54";
-
sha256 = "0wgp7yvn9sm1ynlhcr4l0hzmvr2n28llg4xc01p6k1zz4im64c17";
-
})
-
];
+
bugfixPatches = [ ];
# Patches needed because of package updates. We could just pin the versions of
# dependencies, but that would lead to rebuilds, confusion and the burdons of
···
stripLen = 1;
})
-
# https://trac.sagemath.org/ticket/26451
-
(fetchSageDiff {
-
name = "sphinx-1.8.patch";
-
base = "8.7";
-
rev = "737afd8f314bd1e16feaec562bb4b5efa2effa8b";
-
sha256 = "0n56ss88ds662bp49j23z5c2i6hsn3jynxw13wv76hyl0h7l1hjh";
-
})
-
-
# https://trac.sagemath.org/ticket/27653
-
(fetchpatch {
-
name = "sympy-1.4.patch";
-
url = "https://git.sagemath.org/sage.git/patch/?h=3277ba76d0ba7174608a31a0c6623e9210c63e3d";
-
sha256 = "09avaanwmdgqv14mmllbgw9z2scf4lc0y0kzdhlriiq8ss9j8iir";
-
})
-
-
# https://trac.sagemath.org/ticket/27094
-
(fetchpatch {
-
name = "gap-4.10.1.patch";
-
url = "https://git.sagemath.org/sage.git/patch?id=d3483110474591ea6cc8e3210cd884f3e0018b3e";
-
sha256 = "028i6h8l8npwzx5z0ax0rcywl85gc83qw1jf93zf523msdfcsk0n";
-
})
-
-
# https://trac.sagemath.org/ticket/27738
-
(fetchpatch {
-
name = "R-3.6.0.patch";
-
url = "https://git.sagemath.org/sage.git/patch/?h=8b7dbd0805d02d0e8674a272e161ceb24a637966";
-
sha256 = "1c81f13z1w62s06yvp43gz6vkp8mxcs289n6l4gj9xj10slimzff";
-
})
-
# https://trac.sagemath.org/ticket/26932
(fetchSageDiff {
name = "givaro-4.1.0_fflas-ffpack-2.4.0_linbox-1.6.0.patch";
base = "8.8.beta4";
rev = "c11d9cfa23ff9f77681a8f12742f68143eed4504";
sha256 = "0xzra7mbgqvahk9v45bjwir2mqz73hrhhy314jq5nxrb35ysdxyi";
-
})
-
-
# https://trac.sagemath.org/ticket/26718
-
(fetchpatch {
-
name = "threejs-r100.patch";
-
url = "https://git.sagemath.org/sage.git/patch/?h=86c5bb000259e6de5d7c60afc608a4b0d010b690";
-
sha256 = "0sgqqd4df2bxsq19b6kfy7dvgyxprlpg7f3xx7g3fs8ij937m352";
})
];
+3 -3
pkgs/applications/version-management/git-and-tools/git-recent/default.nix
···
}:
stdenv.mkDerivation rec {
-
name = "git-recent-${version}";
-
version = "1.1.0";
+
pname = "git-recent";
+
version = "1.1.1";
src = fetchFromGitHub {
owner = "paulirish";
repo = "git-recent";
rev = "v${version}";
-
sha256 = "06r1jzmzdv3d4vxdh5qyf5g5rgavxfmh2rpbs7a7byg3k7d77hpn";
+
sha256 = "1g8i6vpjnnfh7vc1269c91bap267w4bxdqqwnzb8x18vqgn2fx8i";
};
buildInputs = [ makeWrapper ];
+2 -2
pkgs/applications/version-management/git-and-tools/hub/default.nix
···
buildGoPackage rec {
pname = "hub";
-
version = "2.12.0";
+
version = "2.12.1";
goPackagePath = "github.com/github/hub";
···
owner = "github";
repo = pname;
rev = "v${version}";
-
sha256 = "0wv0s0bhl7akyshzcsqlk8ws84cjdjizfpn6m9674lw9vs9rj2sj";
+
sha256 = "0i9bqcgdidl5zawkpq2fjrimzbb37i1m2fisvj32d27fsp1824bk";
};
nativeBuildInputs = [ groff utillinux ];
+2 -2
pkgs/applications/version-management/git-and-tools/pre-commit/default.nix
···
{ stdenv, python3Packages }:
with python3Packages; buildPythonApplication rec {
pname = "pre-commit";
-
version = "1.16.1";
+
version = "1.17.0";
src = fetchPypi {
inherit version;
pname = "pre_commit";
-
sha256 = "6ca409d1f22d444af427fb023a33ca8b69625d508a50e1b7eaabd59247c93043";
+
sha256 = "1qswk30w2cq8xvj16mhszsi3npp0z08s8lki1w67nif23c2kkk6c";
};
propagatedBuildInputs = [
+2 -2
pkgs/applications/video/clipgrab/default.nix
···
stdenv.mkDerivation rec {
name = "clipgrab-${version}";
-
version = "3.8.2";
+
version = "3.8.3";
src = fetchurl {
-
sha256 = "0dhiv1mldp5f555im6mkjxdh6iivn1hnx2xdaqa6wxzsrwrvv5dd";
+
sha256 = "1v8vvlqgjqy3gyzwaz9iq0m4fwlkimy5gzg6z3bqwp61p9zzw0zf";
# The .tar.bz2 "Download" link is a binary blob, the source is the .tar.gz!
url = "https://download.clipgrab.org/${name}.tar.gz";
};
+10 -1
pkgs/applications/video/mythtv/default.nix
···
, libpulseaudio, fftwSinglePrec , lame, zlib, libGLU_combined, alsaLib, freetype
, perl, pkgconfig , libX11, libXv, libXrandr, libXvMC, libXinerama, libXxf86vm
, libXmu , yasm, libuuid, taglib, libtool, autoconf, automake, file, exiv2
-
, linuxHeaders
+
, linuxHeaders, fetchpatch
}:
stdenv.mkDerivation rec {
···
rev = "v${version}";
sha256 = "0pjxv4bmq8h285jsr02svgaa03614arsyk12fn9d4rndjsi2cc3x";
};
+
+
patches = [
+
# Fixes build with exiv2 0.27.1.
+
(fetchpatch {
+
name = "004-exiv2.patch";
+
url = "https://aur.archlinux.org/cgit/aur.git/plain/004-exiv2.patch?h=mythtv&id=76ea37f8556805b205878772ad7874e487c0d946";
+
sha256 = "0mh542f53qgky0w3s2bv0gmcxzvmb10834z3cfff40fby2ffr6k8";
+
})
+
];
setSourceRoot = ''sourceRoot=$(echo */mythtv)'';
+11 -11
pkgs/applications/video/plex-media-player/default.nix
···
# plex-media-player is updated, the versions for these files are changed,
# so the build IDs (and SHAs) below will need to be updated!
depSrcs = rec {
-
webClientBuildId = "85-88b3ac67015f76";
-
webClientDesktopBuildId = "3.77.2-7015f76";
-
webClientTvBuildId = "3.78.0-88b3ac6";
+
webClientBuildId = "129-669a5eed7ae231";
+
webClientDesktopBuildId = "3.100.1-d7ae231";
+
webClientTvBuildId = "3.105.0-669a5ee";
webClient = fetchurl {
url = "https://artifacts.plex.tv/web-client-pmp/${webClientBuildId}/buildid.cmake";
-
sha256 = "0j7i4yr95ljw9cwyaygld41j7yvndj3dza3cbydv4x8mh2hn05v1";
+
sha256 = "0gd7x0rf7sf696zd24y6pji9iam851vjjqbpm4xkqwpadwrwzhwk";
};
webClientDesktopHash = fetchurl {
url = "https://artifacts.plex.tv/web-client-pmp/${webClientBuildId}/web-client-desktop-${webClientDesktopBuildId}.tar.xz.sha1";
-
sha256 = "106kx9ahz7jgskpjraff2g235n1whwvf18yw0nmp5dwr9ys9h8jp";
+
sha256 = "136hk7p6gxxmhq1d09jfjljkv76b5h2p16s5jwf28xixkp0ab2jg";
};
webClientDesktop = fetchurl {
url = "https://artifacts.plex.tv/web-client-pmp/${webClientBuildId}/web-client-desktop-${webClientDesktopBuildId}.tar.xz";
-
sha256 = "0h23h3fd3w43glvnhrg9qiajs0ql490kb00g3i4cpi29hy1ky45r";
+
sha256 = "0yvjqar72jq58jllsp51b8ybiv6kad8w51bfzss87m1cv3qdbzpa";
};
webClientTvHash = fetchurl {
url = "https://artifacts.plex.tv/web-client-pmp/${webClientBuildId}/web-client-tv-${webClientTvBuildId}.tar.xz.sha1";
-
sha256 = "05zk2zpmcdf276ys5zyirsmvhvyvz99fa6hlgymma8ql6w67133r";
+
sha256 = "0kkw9dd0kr5n4ip1pwfs2dkfjwrph88i0dlw64dca9i885gyjvhd";
};
webClientTv = fetchurl {
url = "https://artifacts.plex.tv/web-client-pmp/${webClientBuildId}/web-client-tv-${webClientTvBuildId}.tar.xz";
-
sha256 = "1cflpgaf4kyj6ccqa11j28rkp8s7zlbnid7s00m5n2c907dihmw2";
+
sha256 = "0yssii01nx6ixg3mikqjn8hz34dalma0rfr8spj115xwr7aq8ixk";
};
};
in stdenv.mkDerivation rec {
name = "plex-media-player-${version}";
-
version = "2.23.0.920";
-
vsnHash = "5bc1a2e5";
+
version = "2.36.0.988";
+
vsnHash = "0150ae52";
src = fetchFromGitHub {
owner = "plexinc";
repo = "plex-media-player";
rev = "v${version}-${vsnHash}";
-
sha256 = "1jzlyj32gr3ar89qnk8slazrbchqkjfx9dchzkzfvpi6742v9igm";
+
sha256 = "104arb0afv3jz0bvj8ij5s7av289ms9n91b4y4077la2wd6r1bq0";
};
nativeBuildInputs = [ pkgconfig cmake python3 ];
+2 -2
pkgs/applications/video/smtube/default.nix
···
{ stdenv, fetchurl, qmake, qtscript, qtwebkit }:
stdenv.mkDerivation rec {
-
version = "18.11.0";
+
version = "19.6.0";
name = "smtube-${version}";
src = fetchurl {
url = "mirror://sourceforge/smtube/SMTube/${version}/${name}.tar.bz2";
-
sha256 = "0rda7mdsr0awhra9yrmsdzp2c4s6xx5nax107d1fydnk084pygqp";
+
sha256 = "0d3hskd6ar51zq29xj899i8sii9g4cxq99gz2y1dhgsnqbn36hpm";
};
makeFlags = [
+2 -2
pkgs/applications/virtualization/virt-manager/default.nix
···
python3Packages.buildPythonApplication rec {
name = "virt-manager-${version}";
-
version = "2.1.0";
+
version = "2.2.0";
namePrefix = "";
src = fetchurl {
url = "http://virt-manager.org/download/sources/virt-manager/${name}.tar.gz";
-
sha256 = "1m038kyngmxlgz91c7z8g73lb2wy0ajyah871a3g3wb5cnd0dsil";
+
sha256 = "0186c2fjqm3wdr3wik4fcyl5l3gv5j6sxn18d0vclw83w4yrhjz9";
};
nativeBuildInputs = [
+1 -1
pkgs/applications/virtualization/virtualbox/default.nix
···
, pkgconfig, which, docbook_xsl, docbook_xml_dtd_43
, alsaLib, curl, libvpx, nettools, dbus
, makeself, perl
-
, javaBindings ? false, jdk ? null
+
, javaBindings ? true, jdk ? null # Almost doesn't affect closure size
, pythonBindings ? false, python3 ? null
, extensionPack ? null, fakeroot ? null
, pulseSupport ? config.pulseaudio or stdenv.isLinux, libpulseaudio ? null
+4 -5
pkgs/applications/window-managers/i3/pystatus.nix
···
python3Packages.buildPythonApplication rec {
# i3pystatus moved to rolling release:
# https://github.com/enkore/i3pystatus/issues/584
-
version = "unstable-2019-02-10";
+
version = "unstable-2019-06-10";
pname = "i3pystatus";
-
disabled = !python3Packages.isPy3k;
src = fetchFromGitHub
{
owner = "enkore";
repo = "i3pystatus";
-
rev = "bcd8f12b18d491029fdd5bd0f433b4500fcdc68e";
-
sha256 = "0gw6sla73cid6gwxn2n4zmsg2svq5flf9zxly6x2rfljizgf0720";
+
rev = "56ce08d0ff8d5d64950d6b588ebede35a95e0ce2";
+
sha256 = "12938860jbcly1xwhd71jvy2dff28pwv9kqh6mab1859148bzmcg";
};
-
propagatedBuildInputs = with python3Packages; [ keyring colour netifaces praw psutil basiciw ] ++
+
propagatedBuildInputs = with python3Packages; [ keyring colour netifaces psutil basiciw ] ++
[ libpulseaudio ] ++ extraLibs;
libpulseaudioPath = stdenv.lib.makeLibraryPath [ libpulseaudio ];
+6 -4
pkgs/build-support/build-bazel-package/default.nix
···
rm -rf $bazelOut/external/{local_*,\@local_*}
# Patching markers to make them deterministic
-
sed -i 's, -\?[0-9][0-9]*$, 1,' $bazelOut/external/\@*.marker
-
sed -i '/^ENV:TMP.*/d' $bazelOut/external/\@*.marker
+
find $bazelOut/external -name '@*\.marker' -exec sed -i \
+
-e 's, -\?[0-9][0-9]*$, 1,' \
+
-e '/^ENV:TMP.*/d' \
+
'{}' \;
# Remove all vcs files
rm -rf $(find $bazelOut/external -type d -name .git)
···
'';
preConfigure = ''
-
mkdir -p $bazelOut/external
-
cp -r $deps/* $bazelOut/external
+
mkdir -p "$bazelOut"
+
cp -r $deps $bazelOut/external
chmod -R +w $bazelOut
find $bazelOut -type l | while read symlink; do
ln -sf $(readlink "$symlink" | sed "s,NIX_BUILD_TOP,$NIX_BUILD_TOP,") "$symlink"
+1 -1
pkgs/build-support/trivial-builders.nix
···
* Automatically includes interpreter above the contents passed.
*
* Example:
-
* # Writes my-file to /nix/store/<store path>/my-file and makes executable.
+
* # Writes my-file to /nix/store/<store path> and makes executable.
* writeShellScript "my-file"
* ''
* Contents of File
+27
pkgs/data/fonts/amiri/default.nix
···
+
{ lib, fetchzip }:
+
+
let
+
version = "0.111";
+
+
in fetchzip rec {
+
name = "Amiri-${version}";
+
+
url = "https://github.com/alif-type/amiri/releases/download/${version}/${name}.zip";
+
+
sha256 = "1w3a5na4mazspwy8j2hvpjha10sgd287kamm51p49jcr90cvwbdr";
+
+
postFetch = ''
+
unzip $downloadedFile
+
install -m444 -Dt $out/share/fonts/truetype ${name}/*.ttf
+
install -m444 -Dt $out/share/doc/${name} ${name}/{*.txt,*.pdf}
+
'';
+
+
meta = with lib; {
+
description = "A classical Arabic typeface in Naskh style";
+
homepage = "https://www.amirifont.org/";
+
license = licenses.ofl;
+
maintainers = [ maintainers.vbgl ];
+
platforms = platforms.all;
+
};
+
}
+
+2 -2
pkgs/data/icons/papirus-icon-theme/default.nix
···
stdenv.mkDerivation rec {
pname = "papirus-icon-theme";
-
version = "20190521";
+
version = "20190615";
src = fetchFromGitHub {
owner = "PapirusDevelopmentTeam";
repo = pname;
rev = version;
-
sha256 = "192s14bf2ni46jkiifbsl82qy1miy8fnxs2fpqwf6s6jlv9x4zxs";
+
sha256 = "1999q6jw4ib8xrw3ydmprnq0mbmzqj8l92rx4rrh22lw9kdvig8w";
};
nativeBuildInputs = [ gtk3 ];
+2 -2
pkgs/data/misc/osinfo-db/default.nix
···
stdenv.mkDerivation rec {
pname = "osinfo-db";
-
version = "20190504";
+
version = "20190611";
src = fetchurl {
url = "https://releases.pagure.org/libosinfo/${pname}-${version}.tar.xz";
-
sha256 = "1yik26gbm3y3wviyabfpyx7pnqx72z5j7267hdgfscdvrwwmyi5z";
+
sha256 = "00gkdkycicl4rlr8by61sfsgpjsiswr8b148fl2arinr4vz3n46h";
};
nativeBuildInputs = [ osinfo-db-tools intltool libxml2 ];
+3 -3
pkgs/data/themes/matcha/default.nix
···
stdenv.mkDerivation rec {
name = "matcha-${version}";
-
version = "2019_05_09";
+
version = "2019-06-22";
src = fetchFromGitHub {
owner = "vinceliuice";
repo = "matcha";
-
rev = version;
-
sha256 = "0xnv89appivrnbppyjqaa35pls120mkz253p2lblyxzbvi5kgn73";
+
rev = "f42df7a3219d7fbacb7be1b2e0e416d74339865e";
+
sha256 = "1x954rmxv14xndn4ybhbr4pmzccnwqp462bpvzd2hak5wsqs4wxc";
};
buildInputs = [ gdk_pixbuf librsvg ];
+112
pkgs/desktops/deepin/dde-control-center/default.nix
···
+
{ stdenv, fetchFromGitHub, pkgconfig, cmake, deepin, qttools, qtdeclarative,
+
networkmanager, qtsvg, qtx11extras, dtkcore, dtkwidget, geoip, gsettings-qt,
+
dde-network-utils, networkmanager-qt, xorg, mtdev, fontconfig, freetype, dde-api,
+
dde-daemon, qt5integration, deepin-desktop-base, deepin-desktop-schemas, dbus,
+
systemd, dde-qt-dbus-factory, qtmultimedia, qtbase, glib, gnome3, which,
+
substituteAll, wrapGAppsHook, tzdata
+
}:
+
+
stdenv.mkDerivation rec {
+
name = "${pname}-${version}";
+
pname = "dde-control-center";
+
version = "4.10.11";
+
+
src = fetchFromGitHub {
+
owner = "linuxdeepin";
+
repo = pname;
+
rev = version;
+
sha256 = "1ip8wjwf0n9q8xnqymzh8lz0j5gcnns976n291np6k5kdh2wqhr5";
+
};
+
+
nativeBuildInputs = [
+
cmake
+
deepin.setupHook
+
pkgconfig
+
wrapGAppsHook
+
];
+
+
buildInputs = [
+
dde-api
+
dde-daemon
+
dde-network-utils
+
dde-qt-dbus-factory
+
deepin-desktop-base
+
deepin-desktop-schemas
+
dtkcore
+
dtkwidget
+
fontconfig
+
freetype
+
geoip
+
glib
+
gnome3.networkmanager-l2tp
+
gnome3.networkmanager-openconnect
+
gnome3.networkmanager-openvpn
+
gnome3.networkmanager-vpnc
+
gsettings-qt
+
mtdev
+
networkmanager-qt
+
qt5integration
+
qtbase
+
qtdeclarative
+
qtmultimedia
+
qtsvg
+
qttools
+
qtx11extras
+
xorg.libX11
+
xorg.libXext
+
xorg.libXrandr
+
xorg.libxcb
+
];
+
+
cmakeFlags = [
+
"-DDISABLE_SYS_UPDATE=YES"
+
"-DDCC_DISABLE_GRUB=YES"
+
];
+
+
patches = [
+
(substituteAll {
+
src = ./fix-paths.patch;
+
nmcli = "${networkmanager}/bin/nmcli";
+
which = "${which}/bin/which";
+
# not packaged
+
# dman = "${deepin-manual}/bin/dman";
+
inherit tzdata;
+
# exclusive to deepin linux?
+
# allows to synchronize configuration files to cloud networks
+
# deepin_sync = "${deepin-sync}";
+
})
+
];
+
+
postPatch = ''
+
searchHardCodedPaths
+
+
patchShebangs translate_ts2desktop.sh
+
patchShebangs translate_generation.sh
+
patchShebangs translate_desktop2ts.sh
+
+
fixPath $out /usr dde-control-center-autostart.desktop \
+
com.deepin.dde.ControlCenter.service \
+
src/frame/widgets/utils.h
+
+
substituteInPlace dde-control-center.desktop \
+
--replace "dbus-send" "${dbus}/bin/dbus-send"
+
substituteInPlace com.deepin.controlcenter.addomain.policy \
+
--replace "/bin/systemctl" "${systemd}/bin/systemctl"
+
'';
+
+
postFixup = ''
+
# debuging
+
searchForUnresolvedDLL $out
+
searchHardCodedPaths $out
+
'';
+
+
passthru.updateScript = deepin.updateScript { inherit name; };
+
+
meta = with stdenv.lib; {
+
description = "Control panel of Deepin Desktop Environment";
+
homepage = https://github.com/linuxdeepin/dde-control-center;
+
license = licenses.gpl3;
+
platforms = platforms.linux;
+
maintainers = with maintainers; [ romildo worldofpeace ];
+
};
+
}
+65
pkgs/desktops/deepin/dde-control-center/fix-paths.patch
···
+
diff --git a/src/frame/frame.cpp b/src/frame/frame.cpp
+
index 90d06f8..7cdad04 100644
+
--- a/src/frame/frame.cpp
+
+++ b/src/frame/frame.cpp
+
@@ -375,7 +375,7 @@ void Frame::keyPressEvent(QKeyEvent *e)
+
#ifdef QT_DEBUG
+
case Qt::Key_Escape: qApp->quit(); break;
+
#endif
+
- case Qt::Key_F1: QProcess::startDetached("dman", QStringList("dde")); break;
+
+ case Qt::Key_F1: QProcess::startDetached("@dman@", QStringList("dde")); break;
+
default:;
+
}
+
}
+
diff --git a/src/frame/modules/datetime/timezone_dialog/timezone.cpp b/src/frame/modules/datetime/timezone_dialog/timezone.cpp
+
index 3dd4aad..5f1b363 100644
+
--- a/src/frame/modules/datetime/timezone_dialog/timezone.cpp
+
+++ b/src/frame/modules/datetime/timezone_dialog/timezone.cpp
+
@@ -46,7 +46,7 @@ namespace installer {
+
namespace {
+
+
// Absolute path to zone.tab file.
+
-const char kZoneTabFile[] = "/usr/share/zoneinfo/zone.tab";
+
+const char kZoneTabFile[] = "@tzdata@/share/zoneinfo/zone.tab";
+
+
// Absolute path to backward timezone file.
+
const char kTimezoneAliasFile[] = "/timezone_alias";
+
diff --git a/src/frame/modules/network/connectionvpneditpage.cpp b/src/frame/modules/network/connectionvpneditpage.cpp
+
index e292865..95c5a2b 100644
+
--- a/src/frame/modules/network/connectionvpneditpage.cpp
+
+++ b/src/frame/modules/network/connectionvpneditpage.cpp
+
@@ -215,7 +215,7 @@ void ConnectionVpnEditPage::exportConnConfig()
+
qDebug() << Q_FUNC_INFO << args;
+
+
QProcess p;
+
- p.start("nmcli", args);
+
+ p.start("@nmcli@", args);
+
p.waitForFinished();
+
qDebug() << p.readAllStandardOutput();
+
qDebug() << p.readAllStandardError();
+
diff --git a/src/frame/modules/network/vpnpage.cpp b/src/frame/modules/network/vpnpage.cpp
+
index 521a603..450d1a6 100644
+
--- a/src/frame/modules/network/vpnpage.cpp
+
+++ b/src/frame/modules/network/vpnpage.cpp
+
@@ -224,7 +224,7 @@ void VpnPage::importVPN()
+
qDebug() << args;
+
+
QProcess p;
+
- p.start("nmcli", args);
+
+ p.start("@nmcli@", args);
+
p.waitForFinished();
+
const auto stat = p.exitCode();
+
const QString output = p.readAllStandardOutput();
+
diff --git a/src/frame/modules/sync/syncworker.cpp b/src/frame/modules/sync/syncworker.cpp
+
index 3f929bf..6f240d9 100644
+
--- a/src/frame/modules/sync/syncworker.cpp
+
+++ b/src/frame/modules/sync/syncworker.cpp
+
@@ -24,7 +24,7 @@ SyncWorker::SyncWorker(SyncModel *model, QObject *parent)
+
+
m_model->setSyncIsValid(
+
QProcess::execute(
+
- "which", QStringList() << "/usr/lib/deepin-sync-daemon/deepin-sync-daemon") ==
+
+ "@which@", QStringList() << "@deepin_sync@/lib/deepin-sync-daemon/deepin-sync-daemon") ==
+
0 &&
+
valueByQSettings<bool>(DCC_CONFIG_FILES, "CloudSync", "AllowCloudSync", false));
+
}
+8 -3
pkgs/desktops/deepin/dde-daemon/default.nix
···
deepin-wallpapers, deepin-desktop-base, alsaLib, glib, gtk3,
libgudev, libinput, libnl, librsvg, linux-pam, networkmanager,
pulseaudio, python3, hicolor-icon-theme, glibc, tzdata, go,
-
deepin, makeWrapper, wrapGAppsHook }:
+
deepin, makeWrapper, xkeyboard_config, wrapGAppsHook }:
buildGoPackage rec {
name = "${pname}-${version}";
pname = "dde-daemon";
-
version = "3.27.2.5";
+
version = "3.27.2.6";
goPackagePath = "pkg.deepin.io/dde/daemon";
···
owner = "linuxdeepin";
repo = pname;
rev = version;
-
sha256 = "117yhsb0axwblncyj02fhcyl4b7jl7vvh1bbx08bscih5lnvjihx";
+
sha256 = "14g138h23f1lh1y98pdrfhnph1m7pw8lq8ypiwv9qf3fmdyn35d4";
};
patches = [
···
librsvg
pulseaudio
tzdata
+
xkeyboard_config
];
postPatch = ''
···
patchShebangs network/nm_generator/gen_nm_consts.py
fixPath $out /usr/share/dde/data launcher/manager.go dock/dock_manager_init.go
+
fixPath $out /usr/share/dde-daemon launcher/manager.go gesture/config.go
fixPath ${networkmanager.dev} /usr/share/gir-1.0/NM-1.0.gir network/nm_generator/Makefile
fixPath ${glibc.bin} /usr/bin/getconf systeminfo/utils.go
fixPath ${deepin-desktop-base} /etc/deepin-version systeminfo/version.go accounts/deepinversion.go
fixPath ${tzdata} /usr/share/zoneinfo timedate/zoneinfo/zone.go
fixPath ${dde-api} /usr/lib/deepin-api grub2/modify_manger.go accounts/image_blur.go
fixPath ${deepin-wallpapers} /usr/share/wallpapers appearance/background/list.go accounts/user.go
+
fixPath ${xkeyboard_config} /usr/share/X11/xkb inputdevices/layout_list.go
+
+
# TODO: deepin-system-monitor comes from dde-extra
sed -i -e "s|{DESTDIR}/etc|{DESTDIR}$out/etc|" Makefile
sed -i -e "s|{DESTDIR}/lib|{DESTDIR}$out/lib|" Makefile
+76
pkgs/desktops/deepin/dde-launcher/default.nix
···
+
{ stdenv, fetchFromGitHub, pkgconfig, cmake, dde-qt-dbus-factory,
+
dde-session-ui, deepin, deepin-desktop-schemas, deepin-wallpapers,
+
dtkcore, dtkwidget, gsettings-qt, qtsvg, qttools, qtx11extras,
+
which, xdg_utils, wrapGAppsHook }:
+
+
stdenv.mkDerivation rec {
+
name = "${pname}-${version}";
+
pname = "dde-launcher";
+
version = "4.6.13";
+
+
src = fetchFromGitHub {
+
owner = "linuxdeepin";
+
repo = pname;
+
rev = version;
+
sha256 = "1lwwn2qjbd4i7wx18mi8n7hzdh832i3kdadrivr10sbafdank7ky";
+
};
+
+
nativeBuildInputs = [
+
cmake
+
pkgconfig
+
qttools
+
wrapGAppsHook
+
deepin.setupHook
+
];
+
+
buildInputs = [
+
dde-qt-dbus-factory
+
dde-session-ui
+
deepin-desktop-schemas
+
deepin-wallpapers
+
dtkcore
+
dtkwidget
+
gsettings-qt
+
qtsvg
+
qtx11extras
+
which
+
xdg_utils
+
];
+
+
postPatch = ''
+
# debugging
+
searchHardCodedPaths
+
+
substituteInPlace CMakeLists.txt --replace "/usr/share" "$out/share"
+
+
substituteInPlace src/dbusservices/com.deepin.dde.Launcher.service --replace "/usr" "$out"
+
+
substituteInPlace src/historywidget.cpp --replace "xdg-open" "${xdg_utils}/bin/xdg-open"
+
substituteInPlace src/widgets/miniframebottombar.cpp --replace "dde-shutdown" "${dde-session-ui}/bin/dde-shutdown"
+
substituteInPlace src/widgets/miniframerightbar.cpp --replace "which" "${which}/bin/which"
+
+
# Uncomment (and remove space after $) after packaging deepin-manual
+
#substituteInPlace src/sharedeventfilter.cpp --replace "dman" "$ {deepin-manual}/bin/dman"
+
+
for f in src/boxframe/*.cpp; do
+
substituteInPlace $f --replace "/usr/share/backgrounds/default_background.jpg" "${deepin-wallpapers}/share/backgrounds/deepin/desktop.jpg"
+
done
+
+
# note: `dbus-send` path does not need to be hard coded because it is not used for dtkcore >= 2.0.8.0
+
'';
+
+
postFixup = ''
+
# debugging
+
searchHardCodedPaths $out
+
'';
+
+
passthru.updateScript = deepin.updateScript { inherit name; };
+
+
meta = with stdenv.lib; {
+
description = "Deepin Desktop Environment launcher module";
+
homepage = https://github.com/linuxdeepin/dde-launcher;
+
license = licenses.gpl3;
+
platforms = platforms.linux;
+
maintainers = with maintainers; [ romildo ];
+
};
+
}
+49
pkgs/desktops/deepin/deepin-calculator/default.nix
···
+
{ stdenv, fetchFromGitHub, pkgconfig, qmake, qttools, qtsvg, dtkcore,
+
dtkwidget, deepin }:
+
+
stdenv.mkDerivation rec {
+
name = "${pname}-${version}";
+
pname = "deepin-calculator";
+
version = "1.0.11";
+
+
src = fetchFromGitHub {
+
owner = "linuxdeepin";
+
repo = pname;
+
rev = version;
+
sha256 = "10bfq0h8v0a8i46gcbsy79l194g8sc0ysg289ndrra209fhwlidq";
+
};
+
+
nativeBuildInputs = [
+
qmake
+
pkgconfig
+
qttools
+
deepin.setupHook
+
];
+
+
buildInputs = [
+
dtkcore
+
dtkwidget
+
qtsvg
+
];
+
+
postPatch = ''
+
searchHardCodedPaths # debugging
+
patchShebangs translate_generation.sh
+
fixPath $out /usr deepin-calculator.pro
+
substituteInPlace deepin-calculator.desktop --replace "Exec=deepin-calculator" "Exec=$out/bin/deepin-calculator"
+
'';
+
+
postFixup = ''
+
searchHardCodedPaths $out # debugging
+
'';
+
+
passthru.updateScript = deepin.updateScript { inherit name; };
+
+
meta = with stdenv.lib; {
+
description = "Easy to use calculator for Deepin Desktop Environment";
+
homepage = https://github.com/linuxdeepin/deepin-calculator;
+
license = licenses.gpl3;
+
platforms = platforms.linux;
+
maintainers = with maintainers; [ romildo ];
+
};
+
}
+3
pkgs/desktops/deepin/default.nix
···
dbus-factory = callPackage ./dbus-factory { };
dde-api = callPackage ./dde-api { };
dde-calendar = callPackage ./dde-calendar { };
+
dde-control-center = callPackage ./dde-control-center { };
dde-daemon = callPackage ./dde-daemon { };
dde-dock = callPackage ./dde-dock { };
dde-file-manager = callPackage ./dde-file-manager { };
+
dde-launcher = callPackage ./dde-launcher { };
dde-network-utils = callPackage ./dde-network-utils { };
dde-polkit-agent = callPackage ./dde-polkit-agent { };
dde-qt-dbus-factory = callPackage ./dde-qt-dbus-factory { };
dde-session-ui = callPackage ./dde-session-ui { };
deepin-anything = callPackage ./deepin-anything { };
+
deepin-calculator = callPackage ./deepin-calculator { };
deepin-desktop-base = callPackage ./deepin-desktop-base { };
deepin-desktop-schemas = callPackage ./deepin-desktop-schemas { };
deepin-gettext-tools = callPackage ./deepin-gettext-tools { };
+4 -1
pkgs/desktops/deepin/dtkcore/default.nix
···
sed -i tools/script/dtk-translate.py -e "s,#!env,#!/usr/bin/env,"
'';
-
qmakeFlags = [ "MKSPECS_INSTALL_DIR=${placeholder "out"}/mkspecs" ];
+
qmakeFlags = [
+
"DTK_VERSION=${version}"
+
"MKSPECS_INSTALL_DIR=${placeholder "out"}/mkspecs"
+
];
postFixup = ''
chmod +x $out/lib/dtk2/*.py
+2 -2
pkgs/desktops/gnome-3/extensions/appindicator/default.nix
···
stdenv.mkDerivation rec {
name = "gnome-shell-extension-appindicator-${version}";
-
version = "28";
+
version = "29";
src = fetchFromGitHub {
owner = "Ubuntu";
repo = "gnome-shell-extension-appindicator";
rev = "v${version}";
-
sha256 = "03sgb2xkb4lzp8pbb7g56q29y1r764qzpc0j4d4m1gi0sb39sxrl";
+
sha256 = "02cr6rhi3dfk49jcjm6vh7yx117bv5wqyvd34cyv1kzwzsla8v2i";
};
# This package has a Makefile, but it's used for building a zip for
+5 -4
pkgs/desktops/xfce4-13/exo/default.nix
···
-
{ mkXfceDerivation, docbook_xsl, libxslt, perlPackages, gtk2, gtk3
+
{ mkXfceDerivation, docbook_xsl, libxslt, perlPackages, gtk3
, libxfce4ui, libxfce4util }:
mkXfceDerivation rec {
category = "xfce";
pname = "exo";
-
version = "0.12.2";
+
version = "4.14pre1";
+
rev = "xfce-4.14pre1";
-
sha256 = "1b4hl9yxvf8b8akqf2zngq3m93yqnqcmxqqds1dwzm9vm5sqydgh";
+
sha256 = "1gf9fb48nkafb4jj0hmm2s00mpl32dp5iqxfaxm5i1nc6884hipw";
nativeBuildInputs = [ libxslt perlPackages.URI ];
-
buildInputs = [ gtk2 gtk3 libxfce4ui libxfce4util ];
+
buildInputs = [ gtk3 libxfce4ui libxfce4util ];
postPatch = ''
substituteInPlace docs/reference/Makefile.am \
-37
pkgs/desktops/xfce4-13/garcon/12700.patch
···
-
From: Yegor Timoshenko <yegortimoshenko@gmail.com>
-
Date: Thu, 14 Dec 2017 21:13:02 +0000
-
Subject: [PATCH] Decrement allocation counter on item unref (#12700)
-
-
diff --git a/garcon/garcon-menu-item-pool.c b/garcon/garcon-menu-item-pool.c
-
index 2017180..355e520 100644
-
--- a/garcon/garcon-menu-item-pool.c
-
+++ b/garcon/garcon-menu-item-pool.c
-
@@ -191,7 +191,12 @@ garcon_menu_item_pool_filter_exclude (const gchar *desktop_id,
-
g_return_val_if_fail (GARCON_IS_MENU_ITEM (item), FALSE);
-
g_return_val_if_fail (node != NULL, FALSE);
-
-
- return garcon_menu_node_tree_rule_matches (node, item);
-
+ gboolean matches = garcon_menu_node_tree_rule_matches (node, item);
-
+
-
+ if (matches)
-
+ garcon_menu_item_increment_allocated (item);
-
+
-
+ return matches;
-
}
-
-
-
diff --git a/garcon/garcon-menu-item.c b/garcon/garcon-menu-item.c
-
index ca8cb63..b44acfe 100644
-
--- a/garcon/garcon-menu-item.c
-
+++ b/garcon/garcon-menu-item.c
-
@@ -1908,6 +1908,8 @@ garcon_menu_item_unref (GarconMenuItem *item)
-
{
-
g_return_if_fail (GARCON_IS_MENU_ITEM (item));
-
-
+ garcon_menu_item_decrement_allocated (item);
-
+
-
/* Decrement the reference counter */
-
g_object_unref (G_OBJECT (item));
-
}
-
--
-
2.15.1
-75
pkgs/desktops/xfce4-13/garcon/13785.patch
···
-
From 4387496fe332a50945e7db76bc2196b419656fe3 Mon Sep 17 00:00:00 2001
-
From: Stefan Berzl <stefanberzl@gmail.com>
-
Date: Mon, 21 Aug 2017 18:39:07 +0300
-
Subject: [PATCH] fix: some menu icons are too big (Bug #13785)
-
-
Some packages only provide icons in sizes much bigger than the standard
-
GTK menu size of 16px.
-
-
The clipboard manager qlipper for example provides the following icon:
-
/usr/share/icons/hicolor/128x128/apps/qlipper.png
-
-
In GTK 3.22.18 the function gtk_image_new_from_icon_name when given
-
GTK_ICON_SIZE_MENU as second argument still returns an image with 128x128.
-
-
The patch I have supplied uses existing code to scale such an image.
-
-
Signed-off-by: Eric Koegel <eric.koegel@gmail.com>
-
---
-
garcon-gtk/garcon-gtk-menu.c | 33 +++++++++++++++++++--------------
-
1 file changed, 19 insertions(+), 14 deletions(-)
-
-
diff --git a/garcon-gtk/garcon-gtk-menu.c b/garcon-gtk/garcon-gtk-menu.c
-
index 41990f2..f31a1ed 100644
-
--- a/garcon-gtk/garcon-gtk-menu.c
-
+++ b/garcon-gtk/garcon-gtk-menu.c
-
@@ -650,7 +650,11 @@ garcon_gtk_menu_load_icon (const gchar *icon_name)
-
gtk_icon_size_lookup (GTK_ICON_SIZE_MENU, &w, &h);
-
size = MIN (w, h);
-
-
- if (! gtk_icon_theme_has_icon (icon_theme, icon_name))
-
+ if (gtk_icon_theme_has_icon (icon_theme, icon_name))
-
+ {
-
+ pixbuf = gtk_icon_theme_load_icon (icon_theme, icon_name, size, 0, NULL);;
-
+ }
-
+ else
-
{
-
if (g_path_is_absolute (icon_name))
-
{
-
@@ -684,22 +688,23 @@ garcon_gtk_menu_load_icon (const gchar *icon_name)
-
g_free (name);
-
}
-
}
-
+ }
-
-
- /* Turn the pixbuf into a gtk_image */
-
- if (G_LIKELY (pixbuf))
-
- {
-
- /* scale the pixbuf down if it needs it */
-
- GdkPixbuf *tmp = gdk_pixbuf_scale_simple (pixbuf, w, h, GDK_INTERP_BILINEAR);
-
- g_object_unref (pixbuf);
-
- pixbuf = tmp;
-
+ /* Turn the pixbuf into a gtk_image */
-
+ if (G_LIKELY (pixbuf))
-
+ {
-
+ /* scale the pixbuf down if it needs it */
-
+ GdkPixbuf *pixbuf_scaled = gdk_pixbuf_scale_simple (pixbuf, w, h, GDK_INTERP_BILINEAR);
-
+ g_object_unref (G_OBJECT (pixbuf));
-
-
- image = gtk_image_new_from_pixbuf (pixbuf);
-
- g_object_unref (G_OBJECT (pixbuf));
-
- }
-
+ image = gtk_image_new_from_pixbuf (pixbuf_scaled);
-
+ g_object_unref (G_OBJECT (pixbuf_scaled));
-
+ }
-
+ else
-
+ {
-
+ /* display the placeholder at least */
-
+ image = gtk_image_new_from_icon_name (icon_name, GTK_ICON_SIZE_MENU);
-
}
-
-
-
- if (image == NULL)
-
- image = gtk_image_new_from_icon_name (icon_name, GTK_ICON_SIZE_MENU);
-
-
return image;
-
}
+5 -5
pkgs/desktops/xfce4-13/garcon/default.nix
···
-
{ mkXfceDerivation, gtk2 ? null, gtk3, libxfce4ui, libxfce4util }:
+
{ mkXfceDerivation, gtk3, libxfce4ui, libxfce4util }:
mkXfceDerivation rec {
category = "xfce";
pname = "garcon";
-
version = "0.6.1";
+
version = "4.14pre1";
+
rev = "xfce-4.14pre1";
-
sha256 = "19k8bwn29x7hkg882pxv5xxmrbfagdqgkxg166pwz2k0prab6hl8";
+
sha256 = "0gmvi6m3iww7m3xxx5wiqd8vsi18igzhcpjfzknfc8z741vc38yj";
-
patches = [ ./12700.patch ./13785.patch ];
-
buildInputs = [ gtk2 gtk3 libxfce4ui libxfce4util ];
+
buildInputs = [ gtk3 libxfce4ui libxfce4util ];
}
+5 -4
pkgs/desktops/xfce4-13/gigolo/default.nix
···
-
{ mkXfceDerivation, gtk2, libX11 }:
+
{ mkXfceDerivation, exo, gtk3 }:
mkXfceDerivation rec {
category = "apps";
pname = "gigolo";
-
version = "0.4.2";
+
version = "0.4.91";
-
sha256 = "0qd2jkf3zsvfyd9jn8bfnljja1xfj3ph4wjh3fx10dcwcd791al1";
+
sha256 = "1r075hw1jxbpv7jxzyqgfmd2rsw1lykd7snnx736gm55v84k15i7";
-
buildInputs = [ gtk2 libX11 ];
+
nativeBuildInputs = [ exo ];
+
buildInputs = [ gtk3 ];
}
+3 -2
pkgs/desktops/xfce4-13/libxfce4ui/default.nix
···
mkXfceDerivation rec {
category = "xfce";
pname = "libxfce4ui";
-
version = "4.13.4";
+
version = "4.14pre1";
+
rev = "xfce-4.14pre1";
-
sha256 = "0m9h3kvkk2nx8pxxmsg9sjnyp6ajwjrz9djjxxvranjsdw3ilydy";
+
sha256 = "0z4sadqwp71b3qmxlbms26d8vnxd9cks84mr2f1qaiww6rp7v69y";
buildInputs = [ gobject-introspection gtk2 gtk3 libstartup_notification xfconf ];
propagatedBuildInputs = [ libxfce4util libICE libSM ];
+3 -2
pkgs/desktops/xfce4-13/libxfce4util/default.nix
···
mkXfceDerivation rec {
category = "xfce";
pname = "libxfce4util";
-
version = "4.13.2";
+
version = "4.14pre1";
+
rev = "xfce-4.14pre1";
-
sha256 = "0sb6pzhmh0qzfdhixj1ard56zi68318k86z3a1h3f2fhqy7gyf98";
+
sha256 = "13cqv4b34rmr9h7nr9gmk3x2mi2y0v91xzwrwhikd1lmz9ir5lkf";
buildInputs = [ gobject-introspection ];
+2 -2
pkgs/desktops/xfce4-13/parole/default.nix
···
mkXfceDerivation rec {
category = "apps";
pname = "parole";
-
version = "1.0.1";
+
version = "1.0.2";
-
sha256 = "0zq1imbjqmwfk3yrsha2s7lclzbh8xgggz0rbksa51siqk73swbb";
+
sha256 = "11i20pvbrcf1jbn77skb1cg72jdmdd0jvmf5khfn91slqky8gcbl";
postPatch = ''
substituteInPlace src/plugins/mpris2/Makefile.am \
+2 -2
pkgs/desktops/xfce4-13/ristretto/default.nix
···
mkXfceDerivation rec {
category = "apps";
pname = "ristretto";
-
version = "0.8.3";
+
version = "0.8.4";
postPatch = ''
automakeAddFlags src/Makefile.am ristretto_CFLAGS DBUS_GLIB_CFLAGS
···
nativeBuildInputs = [ automakeAddFlags exo ];
buildInputs = [ dbus-glib gtk2 libexif libxfce4ui libxfce4util xfconf ];
-
sha256 = "02i61ddzpv0qjwahkksnzla57zdmkywyg1qrqs57z4bzj6l4nmkx";
+
sha256 = "0vnivwl0xwhzpflys9zwds6x9gqd3v069qn04afmakhi2m8qr6hf";
}
+3 -2
pkgs/desktops/xfce4-13/thunar-volman/default.nix
···
mkXfceDerivation rec {
category = "xfce";
pname = "thunar-volman";
-
version = "0.9.0";
+
version = "4.14pre1";
+
rev = "xfce-4.14pre1";
buildInputs = [ exo gtk3 libgudev libxfce4ui libxfce4util xfconf ];
-
sha256 = "08aqbp3i0z6frj7z3laz9nj641iakrcr7vh2dxb057ky24gj61i7";
+
sha256 = "1g784yjhjacjnkhr8m62xyhnxlfbwk0fwb366p9kkz035k51idrv";
}
+3 -2
pkgs/desktops/xfce4-13/thunar/default.nix
···
mkXfceDerivation rec {
category = "xfce";
pname = "thunar";
-
version = "1.8.1";
+
version = "4.14pre1";
+
rev = "xfce-4.14pre1";
-
sha256 = "00n5iinhg3xgzj2rcy7zl6g9449i59x2l09cnlkhyrjzghb4k5ha";
+
sha256 = "13l1nw526jz80p0ynhxqd3a8flp561z0321z7h4rvnidicvdr32n";
postPatch = ''
substituteInPlace docs/Makefile.am \
+3 -2
pkgs/desktops/xfce4-13/tumbler/default.nix
···
mkXfceDerivation rec {
category = "xfce";
pname = "tumbler";
-
version = "0.2.3";
+
version = "4.14pre1";
+
rev = "xfce-4.14pre1";
-
sha256 = "1gb4dav6q9bn64c2ayi4896cr79lb8k63ja2sm3lwsjxgg1r4hw9";
+
sha256 = "1bvcxqs3391dkf36gpfr0hbylsk84nqhv6kf3lf1hq6p7s9f9z3z";
buildInputs = [ gdk_pixbuf ffmpegthumbnailer libgsf poppler ];
}
+3 -2
pkgs/desktops/xfce4-13/xfce4-appfinder/default.nix
···
mkXfceDerivation rec {
category = "xfce";
pname = "xfce4-appfinder";
-
version = "4.13.0";
+
version = "4.14pre1";
+
rev = "xfce-4.14pre1";
-
sha256 = "13xsshzw04gx5rhalx4r0khjb0dbq26fv6n20biyiai1ykznyryy";
+
sha256 = "02ds3s7wbpxka7qnliq4c5p428ricdf0jwv01dkfg88gpgqgvswg";
nativeBuildInputs = [ exo ];
buildInputs = [ garcon gtk3 libxfce4ui libxfce4util xfconf ];
+2 -2
pkgs/desktops/xfce4-13/xfce4-battery-plugin/default.nix
···
mkXfceDerivation rec {
category = "panel-plugins";
pname = "xfce4-battery-plugin";
-
version = "1.1.0";
+
version = "1.1.2";
rev = version;
-
sha256 = "0mz0lj3wjrsj9n4wcqrvv08430g38nkjbdimxdy8316n6bqgngfn";
+
sha256 = "0329miiclc8da6j0sz495p99hyrf9fjhvpmdl0556fphybz5agc0";
buildInputs = [ gtk3 libxfce4ui libxfce4util xfce4-panel xfconf ];
}
+2 -2
pkgs/desktops/xfce4-13/xfce4-clipman-plugin/default.nix
···
mkXfceDerivation rec {
category = "panel-plugins";
pname = "xfce4-clipman-plugin";
-
version = "1.4.2";
+
version = "1.4.3";
rev = version;
-
sha256 = "1c2h1cs7pycf1rhpirmvb0l0dfvlacb7xgm31q9rxmhihnycd2na";
+
sha256 = "1xk79xh1zk0x4r1z9m1dakp79pip0zh3naviybvl1dnpwwfc03gq";
buildInputs = [ exo gtk3 libXtst libxfce4ui libxfce4util xfce4-panel xfconf ];
}
+2 -2
pkgs/desktops/xfce4-13/xfce4-cpufreq-plugin/default.nix
···
mkXfceDerivation rec {
category = "panel-plugins";
pname = "xfce4-cpufreq-plugin";
-
version = "1.2.0";
-
sha256 = "0zhs7b7py1njczmpnib4532fwpnd3vnpqfhss2r136cfgy72kp6g";
+
version = "1.2.1";
+
sha256 = "1p7c4g3yfc19ksdckxpzq1q35jvplh5g55299cvv0afhdb5l8zhv";
buildInputs = [ gtk3 libxfce4ui libxfce4util xfce4-panel xfconf ];
}
+2 -2
pkgs/desktops/xfce4-13/xfce4-dict/default.nix
···
mkXfceDerivation rec {
category = "apps";
pname = "xfce4-dict";
-
version = "0.8.1";
+
version = "0.8.2";
-
sha256 = "0kxirzqmpp7qlr8220i8kipz4bgzkam7h1lpx7yzld5xf7wdzvaf";
+
sha256 = "1zbb0k0984ny7wy4gbk6ymkh87rbfakpim54yq4r3h5ymslx7iv7";
patches = [ ./configure-gio.patch ];
+2 -2
pkgs/desktops/xfce4-13/xfce4-notifyd/default.nix
···
mkXfceDerivation rec {
category = "apps";
pname = "xfce4-notifyd";
-
version = "0.4.2";
+
version = "0.4.4";
-
sha256 = "1zxwzigrhms74crasbqpnzidmq2mnyxpmc9pqr4p4qj14yw4sam9";
+
sha256 = "1lmm9h3ych8dz9jpjkxg91f9ln14xs527nxjxsryks00kmqk4kai";
buildInputs = [ dbus-glib exo gtk3 libnotify libxfce4ui libxfce4util xfce4-panel xfconf ];
}
+3 -2
pkgs/desktops/xfce4-13/xfce4-panel/default.nix
···
mkXfceDerivation rec {
category = "xfce";
pname = "xfce4-panel";
-
version = "4.13.4";
+
version = "4.14pre1";
+
rev = "xfce-4.14pre1";
-
sha256 = "13hnzh31d2b1331lnsbfaxg4fqhqa7hmdwkiqsl9hyr8pqimjb2g";
+
sha256 = "03jyglimm4wgpmg5a128fshrygzwmpf5wdw26l9azqj8b6iz55al";
nativeBuildInputs = [ makeWrapper ];
buildInputs = [ exo garcon gtk2 gtk3 libxfce4ui libxfce4util libwnck3 xfconf ];
+3 -2
pkgs/desktops/xfce4-13/xfce4-power-manager/default.nix
···
mkXfceDerivation rec {
category = "xfce";
pname = "xfce4-power-manager";
-
version = "1.6.1";
+
version = "4.14pre1";
+
rev = "xfce-4.14pre1";
-
sha256 = "0b32m46v3dv1ln3xwlpqbnpflknm4gyfk2w6gn7xjx1k7igcjym3";
+
sha256 = "1n9i62jh5ldf8g9n64mm6nh1182abbf96444j14dppb82r94q077";
nativeBuildInputs = [ automakeAddFlags exo ];
buildInputs = [ gtk3 libnotify libxfce4ui libxfce4util upower xfconf ];
+2 -2
pkgs/desktops/xfce4-13/xfce4-screenshooter/default.nix
···
mkXfceDerivation rec {
category = "apps";
pname = "xfce4-screenshooter";
-
version = "1.9.2";
+
version = "1.9.5";
-
sha256 = "1zl16xcmgrb1s6rsrn37mpl5w522i1i9s7x167xf2d092x333yx2";
+
sha256 = "1h14sywvk9l06p3z1cpb79911j8w2wqbk03ldknjkia2rfymjk06";
nativeBuildInputs = [ wrapGAppsHook ]; # fix "No GSettings schemas are installed on the system"
buildInputs = [ exo gtk3 libsoup libxfce4ui libxfce4util xfce4-panel glib-networking ];
+3 -2
pkgs/desktops/xfce4-13/xfce4-session/default.nix
···
mkXfceDerivation rec {
category = "xfce";
pname = "xfce4-session";
-
version = "4.13.0";
+
version = "4.14pre1";
+
rev = "xfce-4.14pre1";
-
sha256 = "0d6h1kgqq6g084jrxx4jxw98h5g0vwsxqrvk0bmapyxh2sbrg07y";
+
sha256 = "14bn3wn5qrciy2nbhbx634bz0d6lnxb135bx1qglcf35wn6f0hqk";
buildInputs = [ exo dbus-glib dbus gtk3 libxfce4ui libxfce4util libwnck3 xfconf polkit iceauth ];
+3 -2
pkgs/desktops/xfce4-13/xfce4-settings/default.nix
···
mkXfceDerivation rec {
category = "xfce";
pname = "xfce4-settings";
-
version = "4.13.4";
+
version = "4.14pre1";
+
rev = "xfce-4.14pre1";
-
sha256 = "0qnnpvcs2hpfq3n4byjwq343p95i9xw96rq7ym4md4mahnk176dy";
+
sha256 = "0q6jh3fqw9n9agp018xiwidrld445irnli5jgwpszi9hc435dbpc";
postPatch = ''
automakeAddFlags xfce4-settings-editor/Makefile.am xfce4_settings_editor_CFLAGS DBUS_GLIB_CFLAGS
+5 -11
pkgs/desktops/xfce4-13/xfce4-taskmanager/default.nix
···
-
{ lib, mkXfceDerivation, exo, gtk2, gtk3 ? null, libwnck3 ? null, libXmu }:
-
-
let
-
inherit (lib) enableFeature;
-
in
+
{ lib, mkXfceDerivation, exo, gtk3, libwnck3, libXmu }:
-
mkXfceDerivation rec {
+
mkXfceDerivation {
category = "apps";
pname = "xfce4-taskmanager";
-
version = "1.2.1";
+
version = "1.2.2";
-
sha256 = "1p0496r1fb5zqvn6c41kb6rjqwlqghqahgg6hkzw0gjy911im99w";
+
sha256 = "03js0pmhrybxa7hrp3gx4rm7j061ansv0bp2dwhnbrdpmzjysysc";
nativeBuildInputs = [ exo ];
-
buildInputs = [ gtk2 gtk3 libwnck3 libXmu ];
-
-
configureFlags = [ (enableFeature (gtk3 != null) "gtk3") ];
+
buildInputs = [ gtk3 libwnck3 libXmu ];
}
+2 -2
pkgs/desktops/xfce4-13/xfce4-whiskermenu-plugin/default.nix
···
mkXfceDerivation rec {
category = "panel-plugins";
pname = "xfce4-whiskermenu-plugin";
-
version = "2.2.0";
+
version = "2.3.2";
rev = "v${version}";
-
sha256 = "1d35xxkdzw8pl3d5ps226mmrrjk0hqczsbvl5smh7l7jbwfambjm";
+
sha256 = "0ha6c259d7a0wzpf87ynyzpj3y178iwhpcb87m9zxm66i513qmbs";
nativeBuildInputs = [ cmake ];
+3 -2
pkgs/desktops/xfce4-13/xfconf/default.nix
···
mkXfceDerivation rec {
category = "xfce";
pname = "xfconf";
-
version = "4.13.5";
+
version = "4.14pre1";
+
rev = "xfce-4.14pre1";
-
sha256 = "0xpnwb04yw5qdn0bj8b740a7rmiy316vhja5pp8p6sdiqm32yi8a";
+
sha256 = "0n9cjiz3mj011p3w4jv0n2ifz38whmykdl888mczc26l1gflxnr3";
buildInputs = [ libxfce4util ];
}
+3 -2
pkgs/desktops/xfce4-13/xfdesktop/default.nix
···
mkXfceDerivation rec {
category = "xfce";
pname = "xfdesktop";
-
version = "4.13.2";
+
version = "4.14pre1";
+
rev = "xfce-4.14pre1";
-
sha256 = "0v6dlhraqh9v20qciyj03cbjmg3jb6gvmf0hqzavxqi2di3mv5fl";
+
sha256 = "1mni8gzgglhwicaw093i2vpk8q2vilmgg5qbr3izbb8ighhr09jl";
buildInputs = [
exo
+8 -7
pkgs/desktops/xfce4-13/xfwm4/default.nix
···
-
{ mkXfceDerivation, exo, dbus-glib, epoxy, gtk2, libXdamage
-
, libstartup_notification, libxfce4ui, libxfce4util, libwnck
+
{ mkXfceDerivation, exo, librsvg, dbus-glib, epoxy, gtk3, libXdamage
+
, libstartup_notification, libxfce4ui, libxfce4util, libwnck3
, libXpresent, xfconf }:
mkXfceDerivation rec {
category = "xfce";
pname = "xfwm4";
-
version = "4.13.0";
+
version = "4.14pre1";
+
rev = "xfce-4.14pre1";
-
sha256 = "19ikyls4xawsbz07qdz60g5yl2jbvpb90sfy5zql7ghypd69cgn9";
+
sha256 = "0kdlkpb7phcrsqhyhnw82f03fzmd5xb4w9fdj94frfprfja0b468";
-
nativeBuildInputs = [ exo ];
+
nativeBuildInputs = [ exo librsvg ];
buildInputs = [
dbus-glib
epoxy
-
gtk2
+
gtk3
libXdamage
libstartup_notification
libxfce4ui
libxfce4util
-
libwnck
+
libwnck3
libXpresent
xfconf
];
+2 -2
pkgs/development/compilers/chicken/5/chicken.nix
···
{ stdenv, fetchurl, makeWrapper, bootstrap-chicken ? null }:
let
-
version = "5.0.0";
+
version = "5.1.0";
platform = with stdenv;
if isDarwin then "macosx"
else if isCygwin then "cygwin"
···
src = fetchurl {
url = "https://code.call-cc.org/releases/${version}/chicken-${version}.tar.gz";
-
sha256 = "15b5yrzfa8aimzba79x7v6y282f898rxqxfxrr446sjx9jwlpfd8";
+
sha256 = "0jsbp3kp0134f318j3wpd1n85gf8qzh034fn198gvazsv2l024aw";
};
setupHook = lib.ifEnable (bootstrap-chicken != null) ./setup-hook.sh;
+2 -2
pkgs/development/compilers/kotlin/default.nix
···
{ stdenv, fetchurl, makeWrapper, jre, unzip }:
let
-
version = "1.3.31";
+
version = "1.3.40";
in stdenv.mkDerivation rec {
inherit version;
name = "kotlin-${version}";
src = fetchurl {
url = "https://github.com/JetBrains/kotlin/releases/download/v${version}/kotlin-compiler-${version}.zip";
-
sha256 = "0sldhjxh2ghzwkabgziyiq4609iws0vninr8zxclzbqmcgajawqh";
+
sha256 = "14n3x0771d0a1yqncig97lk4bigkx2nvx20khpcnvf873c2b3h28";
};
propagatedBuildInputs = [ jre ] ;
+3 -1
pkgs/development/compilers/llvm/7/llvm.nix
···
, debugVersion ? false
, enableManpages ? false
, enableSharedLibraries ? true
-
, enablePFM ? !stdenv.isDarwin
+
, enablePFM ? !(stdenv.isDarwin
+
|| stdenv.isAarch64 # broken for Ampere eMAG 8180 (c2.large.arm on Packet) #56245
+
)
, enablePolly ? false
}:
+3 -1
pkgs/development/compilers/llvm/8/llvm.nix
···
, debugVersion ? false
, enableManpages ? false
, enableSharedLibraries ? true
-
, enablePFM ? !stdenv.isDarwin
+
, enablePFM ? !(stdenv.isDarwin
+
|| stdenv.isAarch64 # broken for Ampere eMAG 8180 (c2.large.arm on Packet) #56245
+
)
, enablePolly ? false
}:
+47 -23
pkgs/development/compilers/nim/default.nix
···
# based on https://github.com/nim-lang/Nim/blob/v0.18.0/.travis.yml
-
{ stdenv, lib, fetchurl, makeWrapper, nodejs-slim-10_x, openssl, pcre, readline, boehmgc, sfml, tzdata, coreutils }:
+
{ stdenv, lib, fetchurl, makeWrapper, nodejs-slim-11_x, openssl, pcre, readline,
+
boehmgc, sfml, tzdata, coreutils, sqlite }:
stdenv.mkDerivation rec {
name = "nim-${version}";
-
version = "0.19.4";
+
version = "0.20.0";
src = fetchurl {
url = "https://nim-lang.org/download/${name}.tar.xz";
-
sha256 = "0k59dhfsg5wnkc3nxg5a336pjd9jnfxabns63bl9n28iwdg16hgl";
+
sha256 = "144sd7icg2p6qsrr29jdnl11hr34daxq4h16ywwrayz866w7kx2i";
};
doCheck = !stdenv.isDarwin;
···
"-lpcre"
"-lreadline"
"-lgc"
+
"-lsqlite3"
];
# 1. nodejs is only needed for tests
···
# used for bootstrapping, but koch insists on moving the nim compiler around
# as part of building it, so it cannot be read-only
+
checkInputs = [
+
nodejs-slim-11_x tzdata coreutils
+
];
+
nativeBuildInputs = [
-
makeWrapper nodejs-slim-10_x tzdata coreutils
+
makeWrapper
];
buildInputs = [
-
openssl pcre readline boehmgc sfml
+
openssl pcre readline boehmgc sfml sqlite
];
-
phases = [ "unpackPhase" "patchPhase" "buildPhase" "installPhase" "checkPhase" ];
+
buildPhase = ''
+
runHook preBuild
-
buildPhase = ''
-
# use $CC to trigger the linker since calling ld in build.sh causes an error
-
LD=$CC
# build.sh wants to write to $HOME/.cache
HOME=$TMPDIR
sh build.sh
···
-d:useGnuReadline \
${lib.optionals (stdenv.isDarwin || stdenv.isLinux) "-d:nativeStacktrace"}
./koch tools -d:release
-
'';
-
installPhase = ''
-
install -Dt $out/bin bin/* koch
-
./koch install $out
-
mv $out/nim/bin/* $out/bin/ && rmdir $out/nim/bin
-
mv $out/nim/* $out/ && rmdir $out/nim
-
wrapProgram $out/bin/nim \
-
--suffix PATH : ${lib.makeBinPath [ stdenv.cc ]}
+
runHook postBuild
'';
-
patchPhase =
+
prePatch =
let disableTest = ''sed -i '1i discard \"\"\"\n disabled: true\n\"\"\"\n\n' '';
disableStdLibTest = ''sed -i -e '/^when isMainModule/,/^END$/{s/^/#/}' '';
+
disableCompile = ''sed -i -e 's/^/#/' '';
in ''
-
substituteInPlace ./tests/async/tioselectors.nim --replace "/bin/sleep" "sleep"
substituteInPlace ./tests/osproc/tworkingdir.nim --replace "/usr/bin" "${coreutils}/bin"
substituteInPlace ./tests/stdlib/ttimes.nim --replace "/usr/share/zoneinfo" "${tzdata}/share/zoneinfo"
-
# disable tests requiring network access (not available in the build container)
+
# reported upstream: https://github.com/nim-lang/Nim/issues/11435
+
${disableTest} ./tests/misc/tstrace.nim
+
+
# runs out of memory on a machine with 8GB RAM
+
${disableTest} ./tests/system/t7894.nim
+
+
# requires network access (not available in the build container)
${disableTest} ./tests/stdlib/thttpclient.nim
'' + lib.optionalString stdenv.isAarch64 ''
-
# disable test supposedly broken on aarch64
+
# supposedly broken on aarch64
${disableStdLibTest} ./lib/pure/stats.nim
+
+
# reported upstream: https://github.com/nim-lang/Nim/issues/11463
+
${disableCompile} ./lib/nimhcr.nim
+
${disableTest} ./tests/dll/nimhcr_unit.nim
+
${disableTest} ./tests/dll/nimhcr_integration.nim
'';
checkPhase = ''
-
PATH=$PATH:$out/bin
-
./koch tests
+
runHook preCheck
+
+
./koch tests --nim:bin/nim all
+
+
runHook postCheck
+
'';
+
+
installPhase = ''
+
runHook preInstall
+
+
install -Dt $out/bin bin/* koch
+
./koch install $out
+
mv $out/nim/bin/* $out/bin/ && rmdir $out/nim/bin
+
mv $out/nim/* $out/ && rmdir $out/nim
+
wrapProgram $out/bin/nim \
+
--suffix PATH : ${lib.makeBinPath [ stdenv.cc ]}
+
+
runHook postInstall
'';
meta = with stdenv.lib; {
+2
pkgs/development/compilers/openjdk/11.nix
···
, libjpeg, giflib
, setJavaClassPath
, minimal ? false
+
, enableJavaFX ? true, openjfx
, enableGnome2 ? true, gtk3, gnome_vfs, glib, GConf
}:
···
''
+ lib.optionalString (architecture == "amd64") " \"--with-jvm-features=zgc\""
+ lib.optionalString minimal " \"--enable-headless-only\""
+
+ lib.optionalString (!minimal && enableJavaFX) " \"--with-import-modules=${openjfx}\""
+ ");"
# https://bugzilla.redhat.com/show_bug.cgi?id=1306558
# https://github.com/JetBrains/jdk8u/commit/eaa5e0711a43d64874111254d74893fa299d5716
+110
pkgs/development/compilers/openjdk/openjfx/11.nix
···
+
{ stdenv, fetchurl, writeText, openjdk, bootjdk, gradleGen, pkgconfig, perl, cmake, gperf
+
, gtk2, gtk3, libXtst, libXxf86vm, glib, alsaLib, ffmpeg, python, ruby }:
+
+
let
+
major = "11";
+
update = ".0.3";
+
build = "1";
+
repover = "${major}${update}+${build}";
+
gradle_ = (gradleGen.override {
+
jdk = bootjdk;
+
}).gradle_4_10;
+
+
makePackage = args: stdenv.mkDerivation ({
+
version = "${major}${update}-${repover}";
+
+
src = fetchurl {
+
url = "http://hg.openjdk.java.net/openjfx/${major}/rt/archive/${repover}.tar.gz";
+
sha256 = "1h7qsylr7rnwnbimqjyn3whszp9kv4h3gpicsrb3mradxc9yv194";
+
};
+
+
buildInputs = [ gtk2 gtk3 libXtst libXxf86vm glib alsaLib ffmpeg ];
+
nativeBuildInputs = [ gradle_ perl pkgconfig cmake gperf python ruby ];
+
+
dontUseCmakeConfigure = true;
+
+
config = writeText "gradle.properties" (''
+
CONF = Release
+
JDK_HOME = ${bootjdk}/lib/openjdk
+
'' + args.gradleProperties or "");
+
+
buildPhase = ''
+
runHook preBuild
+
+
export GRADLE_USER_HOME=$(mktemp -d)
+
ln -s $config gradle.properties
+
export NIX_CFLAGS_COMPILE="$(pkg-config --cflags glib-2.0) $NIX_CFLAGS_COMPILE"
+
gradle --no-daemon $gradleFlags sdk
+
+
runHook postBuild
+
'';
+
} // args);
+
+
# Fake build to pre-download deps into fixed-output derivation.
+
# We run nearly full build because I see no other way to download everything that's needed.
+
# Anyone who knows a better way?
+
deps = makePackage {
+
pname = "openjfx-deps";
+
+
# perl code mavenizes pathes (com.squareup.okio/okio/1.13.0/a9283170b7305c8d92d25aff02a6ab7e45d06cbe/okio-1.13.0.jar -> com/squareup/okio/okio/1.13.0/okio-1.13.0.jar)
+
installPhase = ''
+
find $GRADLE_USER_HOME -type f -regex '.*\.\(jar\|pom\)' \
+
| perl -pe 's#(.*/([^/]+)/([^/]+)/([^/]+)/[0-9a-f]{30,40}/([^/\s]+))$# ($x = $2) =~ tr|\.|/|; "install -Dm444 $1 \$out/$x/$3/$4/$5" #e' \
+
| sh
+
rm -rf $out/tmp
+
'';
+
+
outputHashAlgo = "sha256";
+
outputHashMode = "recursive";
+
outputHash =
+
# Downloaded AWT jars differ by platform.
+
if stdenv.system == "x86_64-linux" then "0d4msxswdav1xsfkpr0qd3xgqkcbxzf47v1zdy5jmg5w4bs6a78a"
+
else if stdenv.system == "i686-linux" then "0mjlyf6jvbis7nrm5d394sjv4hjw6k3753hr1nwdxk8skwc3ry08"
+
else throw "Unsupported platform";
+
};
+
+
in makePackage {
+
pname = "openjfx-modular-sdk";
+
+
gradleProperties = ''
+
COMPILE_MEDIA = true
+
COMPILE_WEBKIT = true
+
'';
+
+
preBuild = ''
+
swtJar="$(find ${deps} -name org.eclipse.swt\*.jar)"
+
substituteInPlace build.gradle \
+
--replace 'mavenCentral()' 'mavenLocal(); maven { url uri("${deps}") }' \
+
--replace 'name: SWT_FILE_NAME' "files('$swtJar')"
+
'';
+
+
installPhase = ''
+
cp -r build/modular-sdk $out
+
'';
+
+
stripDebugList = [ "." ];
+
+
postFixup = ''
+
# Remove references to bootstrap.
+
find "$out" -name \*.so | while read lib; do
+
new_refs="$(patchelf --print-rpath "$lib" | sed -E 's,:?${bootjdk}[^:]*,,')"
+
patchelf --set-rpath "$new_refs" "$lib"
+
done
+
+
# Test to make sure that we don't depend on the bootstrap
+
if grep -q -r '${bootjdk}' "$out"; then
+
echo "Extraneous references to ${bootjdk} detected" >&2
+
exit 1
+
fi
+
'';
+
+
passthru.deps = deps;
+
+
meta = with stdenv.lib; {
+
homepage = http://openjdk.java.net/projects/openjfx/;
+
license = openjdk.meta.license;
+
description = "The next-generation Java client toolkit.";
+
maintainers = with maintainers; [ abbradar ];
+
platforms = openjdk.meta.platforms;
+
};
+
}
+22
pkgs/development/compilers/qbe/default.nix
···
+
{ stdenv, fetchgit }:
+
+
stdenv.mkDerivation {
+
pname = "qbe";
+
version = "unstable-2019-05-15";
+
+
src = fetchgit {
+
url = "git://c9x.me/qbe.git";
+
rev = "acc3af47330fd6610cf0fbdb28e9fbd05160888f";
+
sha256 = "1c8ynqbakgz3hfdcyhwdmz7i1hnyd9m25f9y47sc21bvxwfrbzpi";
+
};
+
+
makeFlags = [ "PREFIX=$(out)" ];
+
meta = with stdenv.lib; {
+
homepage = "https://c9x.me/compile/";
+
description = "A small compiler backend written in C";
+
maintainers = with maintainers; [ fgaz ];
+
license = licenses.mit;
+
platforms = platforms.all;
+
};
+
}
+
+4 -19
pkgs/development/compilers/rust/binaryBuild.nix
···
license = [ licenses.mit licenses.asl20 ];
};
-
buildInputs = [ bash ] ++ stdenv.lib.optional stdenv.isDarwin Security;
+
buildInputs = [ bash ]
+
++ stdenv.lib.optional stdenv.isDarwin Security;
postPatch = ''
patchShebangs .
···
"$out/bin/cargo"
''}
-
${optionalString (stdenv.isDarwin && bootstrapping) ''
-
install_name_tool -change /usr/lib/libresolv.9.dylib '${darwin.libresolv}/lib/libresolv.9.dylib' "$out/bin/rustc"
-
install_name_tool -change /usr/lib/libresolv.9.dylib '${darwin.libresolv}/lib/libresolv.9.dylib' "$out/bin/rustdoc"
-
install_name_tool -change /usr/lib/libiconv.2.dylib '${darwin.libiconv}/lib/libiconv.2.dylib' "$out/bin/cargo"
-
install_name_tool -change /usr/lib/libresolv.9.dylib '${darwin.libresolv}/lib/libresolv.9.dylib' "$out/bin/cargo"
-
install_name_tool -change /usr/lib/libcurl.4.dylib '${stdenv.lib.getLib curl}/lib/libcurl.4.dylib' "$out/bin/cargo"
-
for f in $out/lib/lib*.dylib; do
-
install_name_tool -change /usr/lib/libresolv.9.dylib '${darwin.libresolv}/lib/libresolv.9.dylib' "$f"
-
done
-
''}
-
# Do NOT, I repeat, DO NOT use `wrapProgram` on $out/bin/rustc
# (or similar) here. It causes strange effects where rustc loads
# the wrong libraries in a bootstrap-build causing failures that
···
license = [ licenses.mit licenses.asl20 ];
};
-
buildInputs = [ makeWrapper bash ] ++ stdenv.lib.optional stdenv.isDarwin Security;
+
buildInputs = [ makeWrapper bash ]
+
++ stdenv.lib.optional stdenv.isDarwin Security;
postPatch = ''
patchShebangs .
···
patchelf \
--set-interpreter $(cat $NIX_CC/nix-support/dynamic-linker) \
"$out/bin/cargo"
-
''}
-
-
${optionalString (stdenv.isDarwin && bootstrapping) ''
-
install_name_tool -change /usr/lib/libiconv.2.dylib '${darwin.libiconv}/lib/libiconv.2.dylib' "$out/bin/cargo"
-
install_name_tool -change /usr/lib/libresolv.9.dylib '${darwin.libresolv}/lib/libresolv.9.dylib' "$out/bin/cargo"
-
install_name_tool -change /usr/lib/libcurl.4.dylib '${stdenv.lib.getLib curl}/lib/libcurl.4.dylib' "$out/bin/cargo"
''}
wrapProgram "$out/bin/cargo" \
+8 -8
pkgs/development/compilers/rust/bootstrap.nix
···
let
# Note: the version MUST be one version prior to the version we're
# building
-
version = "1.33.0";
+
version = "1.34.2";
-
# fetch hashes by running `print-hashes.sh 1.33.0`
+
# fetch hashes by running `print-hashes.sh 1.34.2`
hashes = {
-
i686-unknown-linux-gnu = "c379203687d98e60623aa88c4df4992dd5a9548bc30674b9fc8e671a979e9f3a";
-
x86_64-unknown-linux-gnu = "6623168b9ee9de79deb0d9274c577d741ea92003768660aca184e04fe774393f";
-
armv7-unknown-linux-gnueabihf = "f6f0ec0a98d922c4bfd79703bc9e9eef439ba347453f33608a87cd63c47e7245";
-
aarch64-unknown-linux-gnu = "a308044e4076b62f637313ea803fa0a8f340b0f1b53136856f2c43afcabe5387";
-
i686-apple-darwin = "ed20809d56bbaea041721ce6fc9f10f7ae7a720c5821587f01a537d07a5454b1";
-
x86_64-apple-darwin = "864e7c074a0b88e38883c87c169513d072300bb52e1d320a067bd34cf14f66bd";
+
i686-unknown-linux-gnu = "926bafd09eb90ba7d5a0195fcffb8f33dd57e515af4f8987a143459f6b1d3f04";
+
x86_64-unknown-linux-gnu = "2bf6622d980a52832bae141304e96f317c8a1ccd2dfd69a134a14033e6e43c0f";
+
armv7-unknown-linux-gnueabihf = "70d1057fcc133dc3e44377060a00d2f9d3a134e2670963d3f1d93f3dbfa0548e";
+
aarch64-unknown-linux-gnu = "15fc6b7ec121df9d4e42483dd12c677203680bec8c69b6f4f62e5a35a07341a8";
+
i686-apple-darwin = "b9fc44cbb06050975664f1033d1337bb38d5ea73b503a5d3af5409033397be5c";
+
x86_64-apple-darwin = "6fdd4bf7fe26dded0cd57b41ab5f0500a5a99b7bc770523a425e9e34f63d0fd8";
};
platform =
+23 -24
pkgs/development/compilers/rust/patches/net-tcp-disable-tests.patch
···
-
diff --git a/src/libstd/net/tcp.rs b/src/libstd/net/tcp.rs
-
index 86ecb10edf..626be0a52d 100644
-
--- a/src/libstd/net/tcp.rs
-
+++ b/src/libstd/net/tcp.rs
-
@@ -955,6 +955,7 @@ mod tests {
+
diff -ru -x '*~' rustc-1.35.0-src-orig/src/libstd/net/tcp.rs rustc-1.35.0-src/src/libstd/net/tcp.rs
+
--- rustc-1.35.0-src-orig/src/libstd/net/tcp.rs 2019-05-20 14:10:15.000000000 +0200
+
+++ rustc-1.35.0-src/src/libstd/net/tcp.rs 2019-06-13 19:59:46.740611889 +0200
+
@@ -973,6 +973,7 @@
}
}
···
#[test]
fn listen_localhost() {
let socket_addr = next_test_ip4();
-
@@ -1013,6 +1014,7 @@ mod tests {
+
@@ -1031,6 +1032,7 @@
})
}
···
#[test]
fn read_eof() {
each_ip(&mut |addr| {
-
@@ -1032,6 +1034,7 @@ mod tests {
+
@@ -1050,6 +1052,7 @@
})
}
···
#[test]
fn write_close() {
each_ip(&mut |addr| {
-
@@ -1058,6 +1061,7 @@ mod tests {
+
@@ -1076,6 +1079,7 @@
})
}
···
#[test]
fn multiple_connect_serial() {
each_ip(&mut |addr| {
-
@@ -1080,6 +1084,7 @@ mod tests {
+
@@ -1098,6 +1102,7 @@
})
}
···
#[test]
fn multiple_connect_interleaved_greedy_schedule() {
const MAX: usize = 10;
-
@@ -1116,6 +1121,7 @@ mod tests {
+
@@ -1134,6 +1139,7 @@
}
#[test]
···
fn multiple_connect_interleaved_lazy_schedule() {
const MAX: usize = 10;
each_ip(&mut |addr| {
-
@@ -1394,6 +1400,7 @@ mod tests {
+
@@ -1467,6 +1473,7 @@
}
#[test]
···
fn clone_while_reading() {
each_ip(&mut |addr| {
let accept = t!(TcpListener::bind(&addr));
-
@@ -1504,7 +1511,10 @@ mod tests {
+
@@ -1597,7 +1604,10 @@
// FIXME: re-enabled bitrig/openbsd tests once their socket timeout code
// no longer has rounding errors.
···
+ target_os = "netbsd",
+ target_os = "openbsd",
+ target_os = "macos"), ignore)]
+
#[cfg_attr(target_env = "sgx", ignore)] // FIXME: https://github.com/fortanix/rust-sgx/issues/31
#[test]
fn timeouts() {
-
let addr = next_test_ip4();
-
@@ -1591,6 +1601,7 @@ mod tests {
+
@@ -1643,6 +1653,7 @@
drop(listener);
}
+ #[cfg_attr(target_os = "macos", ignore)]
#[test]
-
fn nodelay() {
-
let addr = next_test_ip4();
-
@@ -1605,6 +1616,7 @@ mod tests {
-
assert_eq!(false, t!(stream.nodelay()));
+
#[cfg_attr(target_env = "sgx", ignore)] // FIXME: https://github.com/fortanix/rust-sgx/issues/31
+
fn test_read_with_timeout() {
+
@@ -1687,6 +1698,7 @@
+
drop(listener);
}
+ #[cfg_attr(target_os = "macos", ignore)]
#[test]
-
fn ttl() {
-
let ttl = 100;
-
@@ -1642,6 +1654,7 @@ mod tests {
-
}
+
#[cfg_attr(target_env = "sgx", ignore)]
+
fn nodelay() {
+
@@ -1719,6 +1731,7 @@
+
assert_eq!(ttl, t!(stream.ttl()));
}
+ #[cfg_attr(target_os = "macos", ignore)]
#[test]
-
fn peek() {
-
each_ip(&mut |addr| {
+
#[cfg_attr(target_env = "sgx", ignore)]
+
fn set_nonblocking() {
+2 -2
pkgs/development/compilers/rust/rustc.nix
···
llvmShared = llvm_7.override { enableSharedLibraries = true; };
in stdenv.mkDerivation rec {
pname = "rustc";
-
version = "1.34.2";
+
version = "1.35.0";
src = fetchurl {
url = "https://static.rust-lang.org/dist/rustc-${version}-src.tar.gz";
-
sha256 = "0mig0prkmlnpbba1cmi17vlsl88ikv5pi26zjy2kcr64l62lm6n6";
+
sha256 = "0bbizy6b7002v1rdhrxrf5gijclbyizdhkglhp81ib3bf5x66kas";
};
__darwinAllowLocalNetworking = true;
+1 -1
pkgs/development/coq-modules/gappalib/default.nix
···
};
passthru = {
-
compatibleCoqVersions = stdenv.lib.flip stdenv.lib.versionAtLeast "8.7";
+
compatibleCoqVersions = stdenv.lib.flip builtins.elem [ "8.7" "8.8" "8.9" ];
};
}
+13 -2
pkgs/development/coq-modules/mathcomp/default.nix
···
}:
with builtins // stdenv.lib;
let
+
####################################
+
# CONFIGURATION (please edit this) #
+
####################################
# sha256 of released mathcomp versions
mathcomp-sha256 = {
"1.9.0" = "0lid9zaazdi3d38l8042lczb02pw5m9wq0yysiilx891hgq2p81r";
···
};
# computes the default version of mathcomp given a version of Coq
max-mathcomp-version = last (naturalSort (attrNames mathcomp-coq-versions));
-
default-mathcomp-version = let v = last (naturalSort (["0.0.0"]
-
++ (attrNames (filterAttrs (_: vs: vs coq.coq-version) mathcomp-coq-versions))));
+
# mathcomp prefered version by decreasing order
+
# (the first version in the list will be tried first)
+
mathcomp-version-preference = [ "1.8.0" "1.9.0" "1.7.0" "1.6.1" ];
+
+
##############################################################
+
# COMPUTED using the configuration above (edit with caution) #
+
##############################################################
+
default-mathcomp-version = let v = head (
+
filter (mc: mathcomp-coq-versions."${mc}" coq.coq-version)
+
mathcomp-version-preference ++ ["0.0.0"]);
in if v == "0.0.0" then max-mathcomp-version else v;
# list of core mathcomp packages sorted by dependency order
+46 -23
pkgs/development/coq-modules/mathcomp/extra.nix
···
-
{ stdenv, fetchFromGitHub, coq, mathcomp, coqPackages,
+
{ stdenv, fetchFromGitHub, coq, ssreflect, coqPackages,
recurseIntoAttrs }:
with builtins // stdenv.lib;
-
let current-mathcomp = mathcomp; in
+
let current-ssreflect = ssreflect; in
let
# configuring packages
param = {
···
};
multinomials = {
version-sha256 = {
+
"1.3" = "0l3vi5n094nx3qmy66hsv867fnqm196r8v605kpk24gl0aa57wh4";
"1.2" = "1mh1w339dslgv4f810xr1b8v2w7rpx6fgk9pz96q0fyq49fw2xcq";
"1.1" = "1q8alsm89wkc0lhcvxlyn0pd8rbl2nnxg81zyrabpz610qqjqc3s";
"1.0" = "1qmbxp1h81cy3imh627pznmng0kvv37k4hrwi2faa101s6bcx55m";
···
"0.2.0" = "1186xjxgns4ns1szyi931964bjm0mp126qzlv10mkqqgfw07nhrd";
"0.1.0" = "0hwkr2wzy710pcyh274fcarzdx8sv8myp16pv0vq5978nmih46al";
};
+
compatibleCoqVersions = flip elem ["8.8" "8.9"];
description = "Analysis library compatible with Mathematical Components";
+
license = stdenv.lib.licenses.cecill-c;
};
real-closed = {
version-sha256 = {
···
};
description = "Mathematical Components Library on real closed fields";
};
+
coqeal = {
+
version-sha256 = {
+
"1.0.0" = "1had6f1n85lmh9x31avbmgl3m0rsiw9f8ma95qzk5b57fjg5k1ii";
+
};
+
description = "CoqEAL - The Coq Effective Algebra Library";
+
owner = "CoqEAL";
+
compatibleCoqVersions = flip elem ["8.7" "8.8" "8.9"];
+
license = stdenv.lib.licenses.mit;
+
};
};
versions = {
"1.9.0" = {
···
bigenough.version = "1.0.0";
analysis = {
version = "0.2.2";
-
core-deps = with coqPackages; [ mathcomp_1_9-field ];
+
core-deps = with coqPackages; [ mathcomp-field_1_9 ];
+
extra-deps = with coqPackages; [ mathcomp_1_9-finmap mathcomp_1_9-bigenough ];
+
};
+
multinomials = {
+
version = "1.3";
+
core-deps = with coqPackages; [ mathcomp-algebra_1_9 ];
extra-deps = with coqPackages; [ mathcomp_1_9-finmap mathcomp_1_9-bigenough ];
};
-
multinomials = {};
real-closed = {
version = "1.0.3";
-
core-deps = with coqPackages; [ mathcomp_1_9-field ];
+
core-deps = with coqPackages; [ mathcomp-field_1_9 ];
extra-deps = with coqPackages; [ mathcomp_1_9-bigenough ];
};
};
···
bigenough.version = "1.0.0";
analysis = {
version = "0.2.2";
-
core-deps = with coqPackages; [ mathcomp_1_8-field ];
+
core-deps = with coqPackages; [ mathcomp-field_1_8 ];
extra-deps = with coqPackages; [ mathcomp_1_8-finmap mathcomp_1_8-bigenough ];
};
multinomials = {
-
version = "1.2";
-
core-deps = with coqPackages; [ mathcomp_1_8-algebra ];
+
version = "1.3";
+
core-deps = with coqPackages; [ mathcomp-algebra_1_8 ];
extra-deps = with coqPackages; [ mathcomp_1_8-finmap mathcomp_1_8-bigenough ];
};
real-closed = {
version = "1.0.3";
-
core-deps = with coqPackages; [ mathcomp_1_8-field ];
+
core-deps = with coqPackages; [ mathcomp-field_1_8 ];
extra-deps = with coqPackages; [ mathcomp_1_8-bigenough ];
};
+
coqeal = {
+
version = "1.0.0";
+
core-deps = with coqPackages; [ mathcomp-algebra_1_8 ];
+
extra-deps = with coqPackages; [ bignums paramcoq mathcomp_1_8-multinomials ];
+
};
};
"1.7.0" = {
finmap.version = "1.1.0";
bigenough.version = "1.0.0";
analysis = {
version = "0.1.0";
-
core-deps = with coqPackages; [ mathcomp_1_7-field ];
+
core-deps = with coqPackages; [ mathcomp-field_1_7 ];
extra-deps = with coqPackages; [ mathcomp_1_7-finmap mathcomp_1_7-bigenough ];
};
multinomials = {
version = "1.1";
-
core-deps = with coqPackages; [ mathcomp_1_7-algebra ];
+
core-deps = with coqPackages; [ mathcomp-algebra_1_7 ];
extra-deps = with coqPackages; [ mathcomp_1_7-finmap_1_0 mathcomp_1_7-bigenough ];
};
real-closed = {
version = "1.0.1";
-
core-deps = with coqPackages; [ mathcomp_1_8-field ];
-
extra-deps = with coqPackages; [ mathcomp_1_8-bigenough ];
+
core-deps = with coqPackages; [ mathcomp-field_1_7 ];
+
extra-deps = with coqPackages; [ mathcomp_1_7-bigenough ];
};
};
};
···
# optional arguments
src ? "",
owner ? "math-comp",
-
core-deps ? [ coqPackages.mathcomp-ssreflect ],
extra-deps ? [],
-
mathcomp ? current-mathcomp,
+
ssreflect ? current-ssreflect,
+
core-deps ? null,
compatibleCoqVersions ? null,
-
license ? mathcomp.meta.license,
+
license ? ssreflect.meta.license,
# mandatory
package, version ? "broken", version-sha256, description
}:
let
theCompatibleCoqVersions = if compatibleCoqVersions == null
-
then mathcomp.compatibleCoqVersions
+
then ssreflect.compatibleCoqVersions
else compatibleCoqVersions;
+
mc-core-deps = if builtins.isNull core-deps then [ssreflect] else core-deps;
in
{ "${package}" = let from = src; in
stdenv.mkDerivation rec {
inherit version;
-
name = "coq${coq.coq-version}-mathcomp-${mathcomp.version}-${package}-${version}";
+
name = "coq${coq.coq-version}-mathcomp${ssreflect.version}-${package}-${version}";
src = if from == "" then fetchFromGitHub {
owner = owner;
···
sha256 = version-sha256."${version}";
} else from;
-
propagatedBuildInputs = [ coq mathcomp ] ++ extra-deps;
+
propagatedBuildInputs = [ coq ] ++ mc-core-deps ++ extra-deps;
installFlags = "-f Makefile.coq COQLIB=$(out)/lib/coq/${coq.coq-version}/";
···
inherit description;
inherit license;
inherit (src.meta) homepage;
-
inherit (mathcomp.meta) platforms;
+
inherit (ssreflect.meta) platforms;
maintainers = [ stdenv.lib.maintainers.vbgl ];
broken = (version == "broken");
};
···
};
};
-
current-versions = versions."${current-mathcomp.version}" or {};
+
current-versions = versions."${current-ssreflect.version}" or {};
select = x: mapAttrs (n: pkg: {package = n;} // pkg) (recursiveUpdate param x);
for-version = v: suffix: (mapAttrs' (n: pkg:
{name = "mathcomp_${suffix}-${n}";
value = (packageGen ({
-
mathcomp = coqPackages."mathcomp_${suffix}";
+
ssreflect = coqPackages."mathcomp-ssreflect_${suffix}";
} // pkg))."${n}";})
(select versions."${v}"));
···
mathcompExtraGen = packageGen;
mathcomp_1_7-finmap_1_0 =
(packageGen (select {finmap = {version = "1.0.0";
-
mathcomp = coqPackages.mathcomp_1_7;};
+
ssreflect = coqPackages.mathcomp-ssreflect_1_7;};
}).finmap).finmap;
multinomials = all.mathcomp-multinomials;
+
coqeal = all.mathcomp-coqeal;
} // all
+2 -1
pkgs/development/go-modules/generic/default.nix
···
local type;
type="$1"
if [ -n "$subPackages" ]; then
-
echo "./$subPackages"
+
echo "$subPackages" | sed "s,\(^\| \),\1./,g"
else
find . -type f -name \*$type.go -exec dirname {} \; | grep -v "/vendor/" | sort --unique
fi
···
export NIX_BUILD_CORES=1
fi
for pkg in $(getGoDirs ""); do
+
echo "Building subPackage $pkg"
buildGoDir install "$pkg"
done
'' + lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) ''
+4 -4
pkgs/development/haskell-modules/configuration-common.nix
···
# The latest release version is ancient. You really need this tool from git.
haskell-ci = generateOptparseApplicativeCompletion "haskell-ci"
(addBuildDepend (overrideSrc (dontCheck super.haskell-ci) {
-
version = "20190307-git";
+
version = "20190625-git";
src = pkgs.fetchFromGitHub {
owner = "haskell-CI";
repo = "haskell-ci";
-
rev = "2baceb59bc2f36e798ff9fb6e8865c449f01d3a2";
-
sha256 = "1wqhqajxni6h9rrj22xj6421d4m0gs8qk2glghpdp307ns5gr2j4";
+
rev = "260f967c6973dfb22ecc8061a1811a2ea4b79e01";
+
sha256 = "1mvn6pqa6wfcm4jxhlhm4l54pwrlgnz7vdrmkwabliwz4q0bzgqk";
};
-
}) (with self; [base-compat generic-lens microlens optparse-applicative ShellCheck]));
+
}) (with self; [base-compat generic-lens microlens optparse-applicative ShellCheck exceptions temporary]));
# Fix build with attr-2.4.48 (see #53716)
xattr = appendPatch super.xattr ./patches/xattr-fix-build.patch;
+3 -2
pkgs/development/libraries/arrow-cpp/default.nix
···
-
{ stdenv, fetchurl, fetchFromGitHub, autoconf, boost, brotli, cmake, double-conversion, flatbuffers, gflags, glog, gtest, lz4, perl, python, rapidjson, snappy, thrift, uriparser, which, zlib, zstd }:
+
{ stdenv, fetchurl, fetchFromGitHub, fixDarwinDylibNames, autoconf, boost, brotli, cmake, double-conversion, flatbuffers, gflags, glog, gtest, lz4, perl, python, rapidjson, snappy, thrift, uriparser, which, zlib, zstd }:
let
parquet-testing = fetchFromGitHub {
···
./darwin.patch
];
-
nativeBuildInputs = [ cmake autoconf /* for vendored jemalloc */ ];
+
nativeBuildInputs = [ cmake autoconf /* for vendored jemalloc */ ]
+
++ stdenv.lib.optional stdenv.isDarwin fixDarwinDylibNames;
buildInputs = [
boost brotli double-conversion flatbuffers gflags glog gtest lz4 rapidjson
snappy thrift uriparser zlib zstd python.pkgs.python python.pkgs.numpy
+2 -2
pkgs/development/libraries/cimg/default.nix
···
stdenv.mkDerivation rec {
name = "cimg-${version}";
-
version = "2.6.5";
+
version = "2.6.6";
src = fetchurl {
url = "http://cimg.eu/files/CImg_${version}.zip";
-
sha256 = "1q409xrri67vqhda6f6jfqnvzj1b3b9xlpi27vm9vl10k2lv4m3a";
+
sha256 = "06a6qgs7q79asfbfp615h5iin23y7g8y1achnmsp3rpkikssskzv";
};
nativeBuildInputs = [ unzip ];
+77 -11
pkgs/development/libraries/exiv2/default.nix
···
-
{ stdenv, fetchFromGitHub, zlib, expat, gettext
-
, autoconf }:
+
{ stdenv
+
, fetchFromGitHub
+
, zlib
+
, expat
+
, cmake
+
, which
+
, libxml2
+
, python3
+
, gettext
+
, doxygen
+
, graphviz
+
, libxslt
+
}:
stdenv.mkDerivation rec {
-
name = "exiv2-0.26.2018.12.30";
+
pname = "exiv2";
+
version = "0.27.1";
-
#url = "https://www.exiv2.org/builds/${name}-trunk.tar.gz";
src = fetchFromGitHub rec {
owner = "exiv2";
repo = "exiv2";
-
rev = "f5d0b25"; # https://github.com/Exiv2/exiv2/commits/0.26
-
sha256 = "1blaz3g8dlij881g14nv2nsgr984wy6ypbwgi2pixk978p0gm70i";
+
rev = version;
+
sha256 = "0b5m921070fkyif0zlyb49gly3p6xd0hv1jyym4j25hx12gzbx0c";
};
-
postPatch = "patchShebangs ./src/svn_version.sh";
+
patches = [
+
# https://github.com/Exiv2/exiv2/commit/aae88060ca85a483cd7fe791ba116c04d96c0bf9#comments
+
./fix-cmake.patch
+
];
-
preConfigure = "make config"; # needed because not using tarball
+
cmakeFlags = [
+
"-DEXIV2_BUILD_PO=ON"
+
"-DEXIV2_BUILD_DOC=ON"
+
];
-
outputs = [ "out" "dev" ];
+
outputs = [ "out" "dev" "doc" "man" ];
nativeBuildInputs = [
+
cmake
+
doxygen
gettext
-
autoconf # needed because not using tarball
+
graphviz
+
libxslt
];
-
propagatedBuildInputs = [ zlib expat ];
+
+
propagatedBuildInputs = [
+
expat
+
zlib
+
];
+
+
checkInputs = [
+
libxml2.bin
+
python3
+
which
+
];
+
+
buildFlags = [
+
"doc"
+
];
+
+
doCheck = stdenv.isLinux;
+
+
# Test setup found by inspecting ${src}/.travis/run.sh; problems without cmake.
+
checkTarget = "tests";
+
+
preCheck = ''
+
patchShebangs ../test/
+
mkdir ../test/tmp
+
export LD_LIBRARY_PATH="$(realpath ../build/lib)"
+
+
# Fix tests on Aarch64
+
${stdenv.lib.optionalString stdenv.isAarch64 ''
+
rm -f ../tests/bugfixes/github/test_CVE_2018_12265.py
+
''}
+
'';
+
+
postCheck = ''
+
(cd ../tests/ && python3 runner.py)
+
'';
+
+
# With cmake we have to enable samples or there won't be
+
# a tests target. This removes them.
+
postInstall = ''
+
( cd "$out/bin"
+
mv exiv2 .exiv2
+
rm *
+
mv .exiv2 exiv2
+
)
+
'';
+
+
enableParallelBuilding = true;
meta = with stdenv.lib; {
homepage = https://www.exiv2.org/;
+16
pkgs/development/libraries/exiv2/fix-cmake.patch
···
+
diff --git a/src/CMakeLists.txt b/src/CMakeLists.txt
+
index 34087004..41b3a068 100644
+
--- a/src/CMakeLists.txt
+
+++ b/src/CMakeLists.txt
+
@@ -239,9 +239,9 @@ install(FILES
+
${CMAKE_BINARY_DIR}/exiv2lib_export.h
+
DESTINATION ${CMAKE_INSTALL_INCLUDEDIR}/exiv2)
+
+
-install(EXPORT exiv2Config DESTINATION "${CMAKE_INSTALL_LIBDIR}/exiv2/cmake")
+
+install(EXPORT exiv2Config DESTINATION "${CMAKE_INSTALL_LIBDIR}/cmake/exiv2")
+
+
-install(FILES ${CMAKE_CURRENT_BINARY_DIR}/exiv2ConfigVersion.cmake DESTINATION "${CMAKE_INSTALL_LIBDIR}/exiv2/cmake")
+
+install(FILES ${CMAKE_CURRENT_BINARY_DIR}/exiv2ConfigVersion.cmake DESTINATION "${CMAKE_INSTALL_LIBDIR}/cmake/exiv2")
+
+
# ******************************************************************************
+
# exiv2 application
+2
pkgs/development/libraries/intel-media-driver/default.nix
···
cmakeFlags = [
"-DINSTALL_DRIVER_SYSCONF=OFF"
"-DLIBVA_DRIVERS_PATH=${placeholder "out"}/lib/dri"
+
# Works only on hosts with suitable CPUs.
+
"-DMEDIA_RUN_TEST_SUITE=OFF"
];
nativeBuildInputs = [ cmake pkgconfig ];
+2 -2
pkgs/development/libraries/kerberos/heimdal.nix
···
with stdenv.lib;
stdenv.mkDerivation rec {
name = "heimdal-${version}";
-
version = "7.6.0";
+
version = "7.7.0";
src = fetchFromGitHub {
owner = "heimdal";
repo = "heimdal";
rev = "heimdal-${version}";
-
sha256 = "1i70xas6wddkw2840lk0ah9w6ddx0dzrslby1ggxlwfmcax8rcgp";
+
sha256 = "099qn9b8q20invvi5r8d8q9rnwpcm3nr89hx5rj7gj2ah2x5vgxs";
};
outputs = [ "out" "dev" "man" "info" ];
+2 -2
pkgs/development/libraries/libcouchbase/default.nix
···
stdenv.mkDerivation rec {
name = "libcouchbase-${version}";
-
version = "2.10.3";
+
version = "2.10.4";
src = fetchFromGitHub {
owner = "couchbase";
repo = "libcouchbase";
rev = version;
-
sha256 = "0a3fin5rcwa3xwd980mrzrkr7dpjdwbri81mqwxw1fkppjqw23z4";
+
sha256 = "1yfmcx65aqd5l87scha6kmm2s38n85ci3gg0h6qfs16s3jfi6bw7";
};
cmakeFlags = "-DLCB_NO_MOCK=ON";
+10 -1
pkgs/development/libraries/libextractor/default.nix
···
{ fetchurl, stdenv, libtool, gettext, zlib, bzip2, flac, libvorbis
-
, exiv2, libgsf, rpm, pkgconfig
+
, exiv2, libgsf, rpm, pkgconfig, fetchpatch
, gtkSupport ? true, glib ? null, gtk3 ? null
, videoSupport ? true, ffmpeg ? null, libmpeg2 ? null}:
···
url = "mirror://gnu/libextractor/${name}.tar.gz";
sha256 = "1zz2zvikvfibxnk1va3kgzs7djsmiqy7bmk8y01vbsf54ryjb3zh";
};
+
+
patches = [
+
# Fixes build with exiv2 0.27
+
(fetchpatch {
+
name = "libextractor-exiv2-0.27.patch";
+
url = "https://git.archlinux.org/svntogit/community.git/plain/trunk/libextractor-exiv2-0.27.patch?h=packages/libextractor&id=4dc53f7fc69210ae571285dface108ed65d8ee53";
+
sha256 = "0w4gc1q1m1yxsd4hv105nblmif465nw3g5nxzldy0x2rl9mdncg6";
+
})
+
];
preConfigure =
'' echo "patching installation directory in \`extractor.c'..."
+2 -2
pkgs/development/libraries/libhandy/default.nix
···
let
pname = "libhandy";
-
version = "0.0.9";
+
version = "0.0.10";
in stdenv.mkDerivation rec {
name = "${pname}-${version}";
···
owner = "Librem5";
repo = pname;
rev = "v${version}";
-
sha256 = "0smfnvfba6cnxbrcm1vh3zbr1hww43qcxhawka3hzn2hjr06rfzn";
+
sha256 = "1702hbdqhfpgw0c4vj2ag08vgl83byiryrbngbq11b9azmj3jhzs";
};
nativeBuildInputs = [
+2 -2
pkgs/development/libraries/libpqxx/default.nix
···
stdenv.mkDerivation rec {
pname = "libpqxx";
-
version = "6.4.4";
+
version = "6.4.5";
src = fetchFromGitHub {
owner = "jtv";
repo = pname;
rev = version;
-
sha256 = "0l62qlln5q1qhapbnm8n1k0hbzf3287gld1jpcbwr0yj79l9j579";
+
sha256 = "0djmjr2b5x5nd2a4idv5j8s6w0kdmvil910iv1kyc7x94dirbrni";
};
nativeBuildInputs = [ gnused python2 ];
+1 -1
pkgs/development/libraries/libressl/default.nix
···
meta = with lib; {
description = "Free TLS/SSL implementation";
homepage = "https://www.libressl.org";
-
license = with licenses; [ publicDomain bsdOriginal bsd0 bsd3 gpl3 isc ];
+
license = with licenses; [ publicDomain bsdOriginal bsd0 bsd3 gpl3 isc openssl ];
platforms = platforms.all;
maintainers = with maintainers; [ thoughtpolice fpletz globin ];
};
+2 -2
pkgs/development/libraries/libsass/default.nix
···
stdenv.mkDerivation rec {
pname = "libsass";
-
version = "3.6.0";
+
version = "3.6.1";
src = fetchFromGitHub {
owner = "sass";
repo = pname;
rev = version;
-
sha256 = "0c2cfmxv1h4f258l9ph6jrnk1ip5bngapzbw1x3vsqxw7hy20n4a";
+
sha256 = "1599j2lbsygy3883x9si7rbad1pkjhl6y72aimaapcv90ga5kxkm";
# Remove unicode file names which leads to different checksums on HFS+
# vs. other filesystems because of unicode normalisation.
extraPostFetch = ''
+2 -2
pkgs/development/libraries/libtoxcore/default.nix
···
};
libtoxcore_0_2 = generic {
-
version = "0.2.9";
-
sha256 = "0aljr9hqybla6p61af6fdkv0x8gph7c2wacqqa9hq2z9w0p4fs5j";
+
version = "0.2.10";
+
sha256 = "0r5j2s5n8ikayvr1zylvv3ai3smbhm2m0yhpa9lfcsxhvyn9phcn";
};
}
+2 -2
pkgs/development/libraries/liburcu/default.nix
···
{ stdenv, fetchurl, perl }:
stdenv.mkDerivation rec {
-
version = "0.11.0";
+
version = "0.11.1";
name = "liburcu-${version}";
src = fetchurl {
url = "https://lttng.org/files/urcu/userspace-rcu-${version}.tar.bz2";
-
sha256 = "1rxk5vbkbmqlsnjnvkjz0pkx2076mqnq6jzblpmz8rk29x66kx8s";
+
sha256 = "0l1kxgzch4m8fxiz2hc8fwg56hrvzzspp7n0svnl7i7iycdrgfcj";
};
checkInputs = [ perl ];
+30 -5
pkgs/development/libraries/libvirt/default.nix
···
{ stdenv, fetchurl, fetchgit
-
, pkgconfig, makeWrapper, libtool, autoconf, automake
+
, pkgconfig, makeWrapper, libtool, autoconf, automake, fetchpatch
, coreutils, libxml2, gnutls, perl, python2, attr
, iproute, iptables, readline, lvm2, utillinux, systemd, libpciaccess, gettext
, libtasn1, ebtables, libgcrypt, yajl, pmutils, libcap_ng, libapparmor
···
buildFromTarball = stdenv.isDarwin;
in stdenv.mkDerivation rec {
name = "libvirt-${version}";
-
version = "4.10.0";
+
version = "5.4.0";
src =
if buildFromTarball then
fetchurl {
url = "http://libvirt.org/sources/${name}.tar.xz";
-
sha256 = "0v17zzyyb25nn9l18v5244myg7590dp6ppwgi8xysipifc0q77bz";
+
sha256 = "0ywf8m9yz2hxnic7fylzlmgy4m353r4vv5zsvp89zq5yh4h81yhw";
}
else
fetchgit {
url = git://libvirt.org/libvirt.git;
rev = "v${version}";
-
sha256 = "0dlpv3v6jpbmgvhpn29ryp0w2a1xny8ciqid8hnlf3klahz9kwz9";
+
sha256 = "1dja1mf295w0sl83zag62c4j55cfbzzfbhdxpkyv2zm3zv0mwdyc";
fetchSubmodules = true;
};
+
patches = optionals (!stdenv.isDarwin) [
+
(fetchpatch {
+
name = "5.4.0-CVE-2019-10161.patch";
+
url = "https://libvirt.org/git/?p=libvirt.git;a=patch;h=aed6a032cead4386472afb24b16196579e239580";
+
sha256 = "19k9z9xx68nf03igbgy1imxnlp5ppj7cgdbq9kri3s834hkjcygs";
+
})
+
] ++ [
+
(fetchpatch {
+
name = "5.4.0-CVE-2019-10166.patch";
+
url = "https://libvirt.org/git/?p=libvirt.git;a=patch;h=db0b78457f183e4c7ac45bc94de86044a1e2056a";
+
sha256 = "17pd1rab2mxj4q0vg30vi2gh78mf52ik1p5l12wrghb0wjf7swml";
+
})
+
(fetchpatch {
+
name = "5.4.0-CVE-2019-10167.patch";
+
url = "https://libvirt.org/git/?p=libvirt.git;a=patch;h=8afa68bac0cf99d1f8aaa6566685c43c22622f26";
+
sha256 = "0hgbwk0y2n6ihzjk8vqabhw914axjqgzcb7c5xx893r86c54c0ml";
+
})
+
(fetchpatch {
+
name = "5.4.0-CVE-2019-10168.patch";
+
url = "https://libvirt.org/git/?p=libvirt.git;a=patch;h=bf6c2830b6c338b1f5699b095df36f374777b291";
+
sha256 = "0s4hc3hsjncx1852ndjas1nng9v23pxf4mi1jxcajsqvhw89la0g";
+
})
+
];
+
nativeBuildInputs = [ makeWrapper pkgconfig ];
buildInputs = [
libxml2 gnutls perl python2 readline gettext libtasn1 libgcrypt yajl
···
"--with-esx"
"--with-remote"
] ++ optionals stdenv.isLinux [
+
"QEMU_BRIDGE_HELPER=/run/wrappers/bin/qemu-bridge-helper"
+
"QEMU_PR_HELPER=/run/libvirt/nix-helpers/qemu-pr-helper"
"--with-attr"
"--with-apparmor"
"--with-secdriver-apparmor"
"--with-numad"
"--with-macvtap"
"--with-virtualport"
-
"--with-init-script=systemd+redhat"
"--with-storage-disk"
] ++ optionals (stdenv.isLinux && zfs != null) [
"--with-storage-zfs"
+2 -2
pkgs/development/libraries/matio/default.nix
···
{ stdenv, fetchurl }:
stdenv.mkDerivation rec {
-
name = "matio-1.5.15";
+
name = "matio-1.5.16";
src = fetchurl {
url = "mirror://sourceforge/matio/${name}.tar.gz";
-
sha256 = "1kxi15ph68nnbi0s1m8icb0685wg8ql8gj7wnkdk20kzpf3lbgr1";
+
sha256 = "0i2g7jqbb4j8xlf1ly7gfpw5zyxmr245qf57v6w0jmwx4rfkvfj7";
};
meta = with stdenv.lib; {
+4
pkgs/development/libraries/mtxclient/default.nix
···
license = licenses.mit;
maintainers = with maintainers; [ fpletz ];
platforms = platforms.unix;
+
+
# As of 2019-06-30, all of the dependencies are available on macOS but the
+
# package itself does not build.
+
broken = stdenv.isDarwin;
};
}
+2 -2
pkgs/development/libraries/ogre/default.nix
···
stdenv.mkDerivation rec {
name = "ogre-${version}";
-
version = "1.12.0";
+
version = "1.12.1";
src = fetchurl {
url = "https://github.com/OGRECave/ogre/archive/v${version}.zip";
-
sha256 = "1hkkg5prixppiq1p5jz7wz1npm5s7kwm1s86079280waccvr2v6x";
+
sha256 = "1iv6k0dwdzg5nnzw2mcgcl663q4f7p2kj7nhs8afnsikrzxxgsi4";
};
cmakeFlags = [ "-DOGRE_BUILD_SAMPLES=${toString withSamples}" ]
+3 -1
pkgs/development/libraries/olm/default.nix
···
description = "Implements double cryptographic ratchet and Megolm ratchet";
license = stdenv.lib.licenses.asl20;
homepage = https://matrix.org/git/olm/about;
-
platforms = stdenv.lib.platforms.linux;
+
platforms = with stdenv.lib.platforms; darwin ++ linux;
};
src = fetchurl {
···
# requires optimisation but memory operations are compiled with -O0
hardeningDisable = ["fortify"];
+
+
makeFlags = if stdenv.cc.isClang then [ "CC=cc" ] else null;
installFlags = "PREFIX=$(out)";
}
+9 -1
pkgs/development/libraries/openmpi/default.nix
···
-
{ stdenv, fetchurl, gfortran, perl, libnl
+
{ stdenv, fetchurl, fetchpatch, gfortran, perl, libnl
, rdma-core, zlib, numactl, libevent, hwloc
# Enable the Sun Grid Engine bindings
···
url = "http://www.open-mpi.org/software/ompi/v${major version}.${minor version}/downloads/${name}.tar.bz2";
sha256 = "02cpzcp113gj5hb0j2xc0cqma2fn04i2i0bzf80r71120p9bdryc";
};
+
+
patches = [
+
(fetchpatch {
+
name = "openmpi-mca_btl_vader_component_close-segfault.patch";
+
url = "https://github.com/open-mpi/ompi/pull/6526.patch";
+
sha256 = "0s7ac9rkcj3fi6ampkvy76njlj478yyr4zvypjc7licy6dgr595x";
+
})
+
];
postPatch = ''
patchShebangs ./
+2 -2
pkgs/development/libraries/opensubdiv/default.nix
···
stdenv.mkDerivation rec {
name = "opensubdiv-${version}";
-
version = "3.3.3";
+
version = "3.4.0";
src = fetchFromGitHub {
owner = "PixarAnimationStudios";
repo = "OpenSubdiv";
rev = "v${lib.replaceChars ["."] ["_"] version}";
-
sha256 = "1rld4hgl9yrbnk5sd6bhvnm8jdnqq09hq93hrmx0nhccccximi9z";
+
sha256 = "0cippg6aqc5dlya1cmh3908pwssrg52fwgyylnvz5343yrxmgk12";
};
outputs = [ "out" "dev" ];
+25
pkgs/development/libraries/packr/default.nix
···
+
{ buildGoModule
+
, fetchFromGitHub
+
, lib
+
}:
+
+
buildGoModule rec {
+
pname = "packr";
+
version = "2.5.1";
+
+
src = fetchFromGitHub {
+
owner = "gobuffalo";
+
repo = pname;
+
rev = "v${version}";
+
sha256 = "070hpnsr5w1r1cg9wl80cafmhkx4z3s29wq04fa7rk49hmwml4jy";
+
};
+
+
modSha256 = "0xvpk9jjcqac44s4fp0jwpljxvs0ypjwc5qfg0w90s2r7jn50fxn";
+
+
meta = with lib; {
+
description = "The simple and easy way to embed static files into Go binaries";
+
homepage = "https://github.com/gobuffalo/packr";
+
license = licenses.mit;
+
maintainers = with maintainers; [ mmahut ];
+
};
+
}
+1 -1
pkgs/development/libraries/physics/rivet/default.nix
···
stdenv.mkDerivation rec {
name = "rivet-${version}";
-
version = "2.7.0";
+
version = "2.7.2";
src = fetchurl {
url = "https://www.hepforge.org/archive/rivet/Rivet-${version}.tar.bz2";
+2 -2
pkgs/development/libraries/physics/yoda/default.nix
···
stdenv.mkDerivation rec {
name = "yoda-${version}";
-
version = "1.7.4";
+
version = "1.7.7";
src = fetchurl {
url = "https://www.hepforge.org/archive/yoda/YODA-${version}.tar.bz2";
-
sha256 = "0w9s3qv87hrmpq4dkrxcrl2hn2vcsbvy8ml99w85404wksw1dwrx";
+
sha256 = "1ki88rscnym0vjxpfgql8m1lrc7vm1jb9w4jhw9lvv3rk84lpdng";
};
pythonPath = []; # python wrapper support
+2 -2
pkgs/development/libraries/pyotherside/default.nix
···
stdenv.mkDerivation rec {
pname = "pyotherside";
-
version = "1.5.6";
+
version = "1.5.8";
src = fetchFromGitHub {
owner = "thp";
repo = "pyotherside";
rev = version;
-
sha256 = "1cjx0fbrq9qvbirwy76pw1f5skm2afd51k4qb269ql4gpl67d5lv";
+
sha256 = "0dnsvyg990ln3bdjdyc5b4lbb63wcjij0skq8pb4x4jglfy7vz4z";
};
nativeBuildInputs = [ qmake ];
+1 -2
pkgs/development/libraries/sqlite/default.nix
···
in
stdenv.mkDerivation rec {
-
pname = "sqlite";
+
name = "sqlite-${version}";
version = "3.28.0";
# NB! Make sure to update analyzer.nix src (in the same directory).
···
sed -i $out/lib/libsqlite3.la -e "s/dependency_libs=.*/dependency_libs='''/"
'';
-
enableParallelBuilding = true;
doCheck = false; # fails to link against tcl
meta = {
+23
pkgs/development/libraries/trompeloeil/default.nix
···
+
{ stdenv, fetchFromGitHub, cmake }:
+
+
stdenv.mkDerivation rec {
+
name = "trompeloeil-${version}";
+
version = "34";
+
+
src = fetchFromGitHub {
+
owner = "rollbear";
+
repo = "trompeloeil";
+
rev = "v${version}";
+
sha256 = "0mj3zni18kfm04jrqjaa1p6ii5q0dz6qdm3hi57z9lzygaxbdc97";
+
};
+
+
nativeBuildInputs = [ cmake ];
+
+
meta = with stdenv.lib; {
+
description = "Header only C++14 mocking framework";
+
homepage = "https://github.com/rollbear/trompeloeil";
+
license = licenses.boost;
+
maintainers = [ maintainers.bjornfor ];
+
platforms = platforms.unix;
+
};
+
}
+2 -2
pkgs/development/libraries/unixODBCDrivers/default.nix
···
-
{ fetchurl, stdenv, unixODBC, cmake, postgresql, mysql55, mariadb, sqlite, zlib, libxml2, dpkg, lib, openssl, kerberos, curl, libuuid, autoPatchelfHook }:
+
{ fetchurl, stdenv, unixODBC, cmake, postgresql, mysql, mariadb, sqlite, zlib, libxml2, dpkg, lib, openssl, kerberos, curl, libuuid, autoPatchelfHook }:
# I haven't done any parameter tweaking.. So the defaults provided here might be bad
···
};
nativeBuildInputs = [ cmake ];
-
buildInputs = [ unixODBC mysql55 ];
+
buildInputs = [ unixODBC mysql ];
cmakeFlags = [ "-DWITH_UNIXODBC=1" ];
+3 -1
pkgs/development/libraries/vulkan-loader/default.nix
···
buildInputs = [ cmake python3 xlibsWrapper libxcb libXrandr libXext wayland ];
enableParallelBuilding = true;
+
patches = [ ./system-search-path.patch ];
+
cmakeFlags = [
-
"-DFALLBACK_DATA_DIRS=${addOpenGLRunpath.driverLink}/share:/usr/local/share:/usr/share"
+
"-DSYSTEM_SEARCH_PATH=${addOpenGLRunpath.driverLink}/share"
"-DVULKAN_HEADERS_INSTALL_DIR=${vulkan-headers}"
];
+45
pkgs/development/libraries/vulkan-loader/system-search-path.patch
···
+
diff --git a/CMakeLists.txt b/CMakeLists.txt
+
index 9ac5ce835..cbdb0ff56 100644
+
--- a/CMakeLists.txt
+
+++ b/CMakeLists.txt
+
@@ -88,6 +88,12 @@ if(UNIX)
+
STRING
+
"Search path to use when XDG_DATA_DIRS is unset or empty or the current process is SUID/SGID. Default is freedesktop compliant."
+
)
+
+ set(
+
+ SYSTEM_SEARCH_PATH ""
+
+ CACHE
+
+ STRING
+
+ "Search path to always use, after all other search paths."
+
+ )
+
endif()
+
+
if(UNIX AND NOT APPLE) # i.e.: Linux
+
@@ -184,6 +190,7 @@ if(UNIX)
+
add_definitions(-DFALLBACK_CONFIG_DIRS="${FALLBACK_CONFIG_DIRS}")
+
add_definitions(-DFALLBACK_DATA_DIRS="${FALLBACK_DATA_DIRS}")
+
add_definitions(-DSYSCONFDIR="${CMAKE_INSTALL_FULL_SYSCONFDIR}")
+
+ add_definitions(-DSYSTEM_SEARCH_PATH="${SYSTEM_SEARCH_PATH}")
+
+
# Make sure /etc is searched by the loader
+
if(NOT (CMAKE_INSTALL_FULL_SYSCONFDIR STREQUAL "/etc"))
+
diff --git a/loader/loader.c b/loader/loader.c
+
index 0d3b5a947..abe357004 100644
+
--- a/loader/loader.c
+
+++ b/loader/loader.c
+
@@ -3688,6 +3688,7 @@ static VkResult ReadDataFilesInSearchPaths(const struct loader_instance *inst, e
+
search_path_size += DetermineDataFilePathSize(xdgdatahome, rel_size);
+
search_path_size += DetermineDataFilePathSize(home_root, rel_size);
+
}
+
+ search_path_size += DetermineDataFilePathSize(SYSTEM_SEARCH_PATH, rel_size);
+
#endif
+
}
+
}
+
@@ -3737,6 +3738,7 @@ static VkResult ReadDataFilesInSearchPaths(const struct loader_instance *inst, e
+
CopyDataFilePath(xdgdatahome, relative_location, rel_size, &cur_path_ptr);
+
CopyDataFilePath(home_root, relative_location, rel_size, &cur_path_ptr);
+
}
+
+ CopyDataFilePath(SYSTEM_SEARCH_PATH, relative_location, rel_size, &cur_path_ptr);
+
}
+
+
// Remove the last path separator
+14
pkgs/development/lua-modules/bit32.patch
···
+
diff -Naur lua-compat-5.2/c-api/compat-5.2.h lua-compat-5.2-patched/c-api/compat-5.2.h
+
--- lua-compat-5.2/c-api/compat-5.2.h 2015-02-19 09:23:42.000000000 +1100
+
+++ lua-compat-5.2-patched/c-api/compat-5.2.h 2019-06-17 17:58:13.585361793 +1000
+
@@ -146,8 +146,10 @@
+
#define lua_pushglobaltable(L) \
+
lua_pushvalue(L, LUA_GLOBALSINDEX)
+
+
+#if !defined(luaL_newlib)
+
#define luaL_newlib(L, l) \
+
(lua_newtable((L)),luaL_setfuncs((L), (l), 0))
+
+#endif
+
+
void luaL_checkversion (lua_State *L);
+
+6 -4
pkgs/development/lua-modules/overrides.nix
···
#### manual fixes for generated packages
##########################################3
bit32 = super.bit32.override({
-
disabled = !isLua51;
-
# Theoretically works with luajit, but it does redefine at least one Lua
-
# 5.2 function that Luajit 2.1 provides, see:
-
# https://github.com/LuaJIT/LuaJIT/issues/325
+
# Small patch in order to no longer redefine a Lua 5.2 function that Luajit
+
# 2.1 also provides, see https://github.com/LuaJIT/LuaJIT/issues/325 for
+
# more
+
patches = [
+
./bit32.patch
+
];
});
busted = super.busted.override({
+10 -22
pkgs/development/ocaml-modules/elpi/default.nix
···
-
{ stdenv, fetchFromGitHub, ocaml, findlib, camlp5
+
{ lib, fetchFromGitHub, buildDunePackage, camlp5
, ppx_tools_versioned, ppx_deriving, re
}:
-
if !stdenv.lib.versionAtLeast ocaml.version "4.03"
-
then throw "elpi is not available for OCaml ${ocaml.version}"
-
else
+
buildDunePackage rec {
+
pname = "elpi";
+
version = "1.4.1";
-
stdenv.mkDerivation rec {
-
name = "ocaml${ocaml.version}-elpi-${version}";
-
version = "1.2.0";
src = fetchFromGitHub {
owner = "LPCIC";
repo = "elpi";
rev = "v${version}";
-
sha256 = "1n4jpidx0vk4y66bhd704ajn8n6f1fd5wsi1shj6wijfmjl14h7s";
+
sha256 = "0sj2jbimg3jqwz4bsfcdqbrh45bb1dbgxj5g234pg1xjy9kxzl2w";
};
-
buildInputs = [ ocaml findlib ppx_tools_versioned ];
-
-
propagatedBuildInputs = [ camlp5 ppx_deriving re ];
-
-
createFindlibDestdir = true;
+
minimumOCamlVersion = "4.04";
-
preInstall = "make byte";
+
buildInputs = [ ppx_tools_versioned ];
-
postInstall = ''
-
mkdir -p $out/bin
-
make install-bin BIN=$out/bin
-
make install-bin BYTE=1 BIN=$out/bin
-
'';
+
propagatedBuildInputs = [ camlp5 ppx_deriving re ];
meta = {
description = "Embeddable λProlog Interpreter";
-
license = stdenv.lib.licenses.lgpl21Plus;
-
maintainers = [ stdenv.lib.maintainers.vbgl ];
+
license = lib.licenses.lgpl21Plus;
+
maintainers = [ lib.maintainers.vbgl ];
inherit (src.meta) homepage;
-
inherit (ocaml.meta) platforms;
};
}
+15 -10
pkgs/development/python-modules/baselines/default.nix
···
{ lib
, buildPythonPackage
-
, fetchPypi
+
, fetchFromGitHub
, pytest
, gym
, scipy
···
buildPythonPackage rec {
pname = "baselines";
-
version = "0.1.5";
+
version = "0.1.6"; # remember to manually adjust the rev
-
src = fetchPypi {
-
inherit pname version;
-
sha256 = "0n1mxkcg82gzhkb4j5zzwm335r3rc1sblknqs4x6nkrrh42d65cm";
+
src = fetchFromGitHub {
+
owner = "openai";
+
repo = "baselines";
+
# Unfortunately releases are not tagged. This commit bumps the version in setup.py
+
rev = "2bca7901f51c88cdef3ca0666c6a87c454a4dbe8";
+
sha256 = "0j2ck7rsrcyny9qbmrw9aqvzfhv70nbign8iva2dsisa2x24gbcl";
};
-
patches = [
-
# already fixed upstream
-
./fix-dep-names.patch
-
];
-
propagatedBuildInputs = [
gym
scipy
···
tensorflow
click
];
+
+
postPatch = ''
+
# Needed for the atari wrapper, but the gym-atari package is not supported
+
# in nixos anyways. Since opencv-python is not currently packaged, we
+
# disable it.
+
sed -ie '/opencv-python/d' setup.py
+
'';
# fails to create a daemon, probably because of sandboxing
doCheck = false;
-18
pkgs/development/python-modules/baselines/fix-dep-names.patch
···
-
diff --git a/setup.py b/setup.py
-
index bf8badc..570be20 100644
-
--- a/setup.py
-
+++ b/setup.py
-
@@ -10,11 +10,11 @@ setup(name='baselines',
-
packages=[package for package in find_packages()
-
if package.startswith('baselines')],
-
install_requires=[
-
- 'gym[mujoco,atari,classic_control,robotics]',
-
+ 'gym',
-
'scipy',
-
'tqdm',
-
'joblib',
-
- 'zmq',
-
+ 'pyzmq',
-
'dill',
-
'progressbar2',
-
'mpi4py',
+2 -2
pkgs/development/python-modules/braintree/default.nix
···
buildPythonPackage rec {
pname = "braintree";
-
version = "3.54.0";
+
version = "3.55.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "09dbj04r55hnm8zvfz8wbnxkxb1pfy7g43pzcgs4hhh5xh45ppfd";
+
sha256 = "0l3i0ayzykrsraqf87z4h39qm3kxyfwrm09n81gnkvsn2126izsd";
};
propagatedBuildInputs = [ requests ];
+2 -2
pkgs/development/python-modules/chameleon/default.nix
···
buildPythonPackage rec {
pname = "Chameleon";
-
version = "3.6.1";
+
version = "3.6.2";
src = fetchPypi {
inherit pname version;
-
sha256 = "850f74f756bcb99423dd2658b99f448b09f09ccc2c60c0a2d6dec52294d7f9ed";
+
sha256 = "0aw6cqnychmsxjjgihwr7df92xw6ac1wr4x70mvq28z3iq35x7ls";
};
meta = with stdenv.lib; {
+2 -2
pkgs/development/python-modules/cherrypy/default.nix
···
buildPythonPackage rec {
pname = "cherrypy";
-
version = "18.1.1";
+
version = "18.1.2";
disabled = !isPy3k;
src = fetchPypi {
pname = "CherryPy";
inherit version;
-
sha256 = "6585c19b5e4faffa3613b5bf02c6a27dcc4c69a30d302aba819639a2af6fa48b";
+
sha256 = "1w3hpsg7q8shdmscmbqk00w90lcw3brary7wl1a56k5h7nx33pj8";
};
propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/cmd2/default.nix
···
}:
buildPythonPackage rec {
pname = "cmd2";
-
version = "0.9.13";
+
version = "0.9.14";
src = fetchPypi {
inherit pname version;
-
sha256 = "b873ade57ebf6c42a9d4e8c705fc2b16777e9d2e53fec5b113914dc65f2eae38";
+
sha256 = "0rllwc4h89xdivy85nmgqdi2s0sk1zw31mlvrnlr9gz2902cnq93";
};
LC_ALL="en_US.UTF-8";
+2 -2
pkgs/development/python-modules/confluent-kafka/default.nix
···
{ stdenv, buildPythonPackage, fetchPypi, isPy3k, rdkafka, requests, avro3k, avro, futures, enum34 }:
buildPythonPackage rec {
-
version = "1.0.0";
+
version = "1.0.1";
pname = "confluent-kafka";
src = fetchPypi {
inherit pname version;
-
sha256 = "a7427944af963410479c2aaae27cc9d28db39c9a93299f14dcf16df80092c63a";
+
sha256 = "04bsnyhldcvscdj0dg3hm5k27vmhfi9k6bwz963sd3q2h7g9k6kg";
};
buildInputs = [ rdkafka requests ] ++ (if isPy3k then [ avro3k ] else [ enum34 avro futures ]) ;
+2 -2
pkgs/development/python-modules/datadog/default.nix
···
buildPythonPackage rec {
pname = "datadog";
-
version = "0.26.0";
+
version = "0.29.3";
src = fetchPypi {
inherit pname version;
-
sha256 = "cbaa6b4b2b88fd552605e6730f60d5437017bb76d6b701432eaafbc983735b79";
+
sha256 = "0p47hy1p2hf233blalyz0yr6nf13iwk9ndkqdk428dmf8b8m2plr";
};
postPatch = ''
+12 -1
pkgs/development/python-modules/django_taggit/default.nix
···
{ stdenv
, buildPythonPackage
+
, python
, fetchPypi
, pythonOlder
+
, django
+
, mock
+
, isort
}:
buildPythonPackage rec {
···
sha256 = "a21cbe7e0879f1364eef1c88a2eda89d593bf000ebf51c3f00423c6927075dce";
};
-
doCheck = false;
+
propagatedBuildInputs = [ isort django ];
+
+
checkInputs = [ mock ];
+
checkPhase = ''
+
# prove we're running tests against installed package, not build dir
+
rm -r taggit
+
${python.interpreter} -m django test --settings=tests.settings
+
'';
meta = with stdenv.lib; {
description = "django-taggit is a reusable Django application for simple tagging";
+10 -3
pkgs/development/python-modules/dm-sonnet/default.nix
···
, wrapt
, tensorflow
, tensorflow-probability
+
, tensorflow-estimator
}:
let
-
version = "1.30";
+
version = "1.33";
# first build all binaries and generate setup.py using bazel
bazel-build = buildBazelPackage rec {
···
owner = "deepmind";
repo = "sonnet";
rev = "v${version}";
-
sha256 = "1dli4a4arx2gmb4p676pfibvnpag9f13znisrk9381g7xpqqmaw6";
+
sha256 = "1nqsja1s8jrkq6v1whgh7smk17313mjr9vs3k5c1m8px4yblzhqc";
};
nativeBuildInputs = [
···
bazelTarget = ":install";
fetchAttrs = {
-
sha256 = "0q7mz69nzng8i6pn3h0va79q4nh60jfjjj9crric8g6dmdwc3h1i";
+
sha256 = "0f2rlzrlazmgjrsin8vq3jfv431cc8sx8lxsr6x4wgd4jx5d1zzy";
};
+
bazelFlags = [
+
# https://github.com/deepmind/sonnet/issues/134
+
"--incompatible_disable_deprecated_attr_params=false"
+
];
+
buildAttrs = {
preBuild = ''
patchShebangs .
···
wrapt
tensorflow
tensorflow-probability
+
tensorflow-estimator
];
# not sure how to properly run the real test suite -- through bazel?
+1 -1
pkgs/development/python-modules/execnet/default.nix
···
src = fetchPypi {
inherit pname version;
-
sha256 = "752a3786f17416d491f833a29217dda3ea4a471fc5269c492eebcee8cc4772d3";
+
sha256 = "1lvj8z6fikpb5r4rq9n53x3lmsm3vlbr58ikz28x85kly633fakm";
};
checkInputs = [ pytest ];
+26
pkgs/development/python-modules/google-pasta/default.nix
···
+
{ lib
+
, buildPythonPackage
+
, fetchPypi
+
, six
+
}:
+
+
buildPythonPackage rec {
+
pname = "google-pasta";
+
version = "0.1.7";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "1zmqfvy28i2509277s6sz098kddd16cx21vpxyc8xml1nclcxlbr";
+
};
+
+
propagatedBuildInputs = [
+
six
+
];
+
+
meta = {
+
description = "An AST-based Python refactoring library";
+
homepage = https://github.com/google/pasta;
+
license = lib.licenses.asl20;
+
maintainers = with lib.maintainers; [ timokau ];
+
};
+
}
+2 -2
pkgs/development/python-modules/libversion/default.nix
···
buildPythonPackage rec {
pname = "libversion";
-
version = "1.1.3";
+
version = "1.1.4";
src = fetchPypi {
inherit pname version;
-
sha256 = "1ax1bq5hrbs2pq2krya83yj1s5cm33pcpwalnc15cgj73kmhb5fn";
+
sha256 = "0xp0wv4s1537s0iqa1ih3kfh1p70s7d1fkwhvrnbj8m98yjij84q";
};
nativeBuildInputs = [ pkgconfig ];
+2 -2
pkgs/development/python-modules/libvirt/default.nix
···
buildPythonPackage rec {
pname = "libvirt";
-
version = "4.10.0";
+
version = "5.4.0";
src = assert version == libvirt.version; fetchgit {
url = git://libvirt.org/libvirt-python.git;
rev = "v${version}";
-
sha256 = "184gd857fkks9ivh4zzbmva2fs2dfxg9lihvhfrwyd2pxflglvyf";
+
sha256 = "0ja35z90i3m7vsjfpzfm7awkmja3h0150376i5pzmf2q8vp61fi5";
};
nativeBuildInputs = [ pkgconfig ];
+2 -2
pkgs/development/python-modules/luftdaten/default.nix
···
buildPythonPackage rec {
pname = "luftdaten";
-
version = "0.5.0";
+
version = "0.6.1";
disabled = !isPy3k;
src = fetchPypi {
inherit pname version;
-
sha256 = "4672f807c0e22bde2606dd887b0358de1da77068d1a1afe6dd8e331d2391b02c";
+
sha256 = "0jxp9yfabdgn2d6w69ijrw1bk1d9g897425cyybiyc13zhhs0kwg";
};
propagatedBuildInputs = [ aiohttp async-timeout ];
+3 -9
pkgs/development/python-modules/mpi4py/default.nix
···
-
{ stdenv, fetchPypi, fetchpatch, python, buildPythonPackage, mpi, openssh }:
+
{ stdenv, fetchPypi, python, buildPythonPackage, mpi, openssh }:
buildPythonPackage rec {
pname = "mpi4py";
-
version = "3.0.1";
+
version = "3.0.2";
src = fetchPypi {
inherit pname version;
-
sha256 = "0ld8rjmsjr0dklvj2g1gr3ax32sdq0xjxyh0cspknc1i36waajb5";
+
sha256 = "1q28xl36difma1wq0acq111cqxjya32kn3lxp6fbidz3wg8jkmpq";
};
passthru = {
inherit mpi;
};
-
-
patches = [ ( fetchpatch {
-
# Upstream patch to ensure compatibility with openmpi-4.0.1
-
url = "https://github.com/mpi4py/mpi4py/commit/42f5e35a6a90454516c11131549a08cd766edbb0.patch";
-
sha256 = "1dm0i3amwj1cddzz1m9ssd7qp655c8rv1wzjs9ww3kzd90fm4w72";
-
})];
postPatch = ''
substituteInPlace test/test_spawn.py --replace \
+17 -9
pkgs/development/python-modules/pip-tools/default.nix
···
-
{ stdenv, fetchurl, buildPythonPackage, pip, pytest, click, six, first
+
{ stdenv, fetchPypi, buildPythonPackage, pip, pytest, click, six, first
, setuptools_scm, git, glibcLocales, mock }:
buildPythonPackage rec {
pname = "pip-tools";
-
version = "3.3.2";
-
name = pname + "-" + version;
+
version = "3.8.0";
-
src = fetchurl {
-
url = "mirror://pypi/p/pip-tools/${name}.tar.gz";
-
sha256 = "100496b15463155f4da3df04c2ca0068677e1ee74d346ebade2d85eef4de8cda";
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "1vwh3hx4jrzf51yj9h31nk9ji53lqaq63mlqd7n84hcmfwy3rwz4";
};
LC_ALL = "en_US.UTF-8";
···
disabledTests = stdenv.lib.concatMapStringsSep " and " (s: "not " + s) [
# Depend on network tests:
+
"test_allow_unsafe_option" #paramaterized, but all fail
+
"test_annotate_option" #paramaterized, but all fail
"test_editable_package_vcs"
+
"test_editable_top_level_deps_preserved" # can't figure out how to select only one parameter to ignore
+
"test_filter_pip_markers"
+
"test_filter_pip_markes"
"test_generate_hashes_all_platforms"
+
"test_generate_hashes_verbose"
+
"test_generate_hashes_with_editable"
+
"test_generate_hashes_with_url"
"test_generate_hashes_without_interfering_with_each_other"
+
"test_get_hashes_local_repository_cache_miss"
"test_realistic_complex_sub_dependencies"
-
"test_generate_hashes_with_editable"
-
"test_filter_pip_markes"
-
"test_get_hashes_local_repository_cache_miss"
+
"test_stdin"
+
"test_upgrade_packages_option"
+
"test_url_package"
# Expect specific version of "six":
"test_editable_package"
"test_input_file_without_extension"
+2 -2
pkgs/development/python-modules/pytesseract/default.nix
···
buildPythonPackage rec {
pname = "pytesseract";
-
version = "0.2.6";
+
version = "0.2.7";
src = fetchPypi {
inherit pname version;
-
sha256 = "0w4phjw0gn52hqlm3ixs2cmj25x7y7nk6ijr9f82wvjvb4hh7hhi";
+
sha256 = "0vyv6wnch1l5kcxqzngakx948qz90q604bl5h93x54381lq3ndj6";
};
patches = [
+2 -2
pkgs/development/python-modules/pytest-django/default.nix
···
}:
buildPythonPackage rec {
pname = "pytest-django";
-
version = "3.4.8";
+
version = "3.5.1";
src = fetchPypi {
inherit pname version;
-
sha256 = "1vj2xfb6jl570zmmwlhvfpj7af5q554z72z51ril07gyfkkq6cjd";
+
sha256 = "1fynkswykgnqn8wqibavf598md5p005ilcac6sk4hpfv0v2v8kr6";
};
nativeBuildInputs = [ pytest setuptools_scm ];
+17 -4
pkgs/development/python-modules/python-dotenv/default.nix
···
-
{ lib, buildPythonPackage, fetchPypi, click, ipython }:
+
{ lib, buildPythonPackage, fetchPypi, isPy27
+
, click
+
, ipython
+
, pytest
+
, sh
+
, typing
+
}:
buildPythonPackage rec {
pname = "python-dotenv";
-
version = "0.10.2";
+
version = "0.10.3";
src = fetchPypi {
inherit pname version;
-
sha256 = "6640acd76e6cab84648e4fec16c9d19de6700971f9d91d045e7120622167bfda";
+
sha256 = "0i25gh8wi87l4g0iflp81rlgmps4cdmp90hwypalp7gcbwfxfmzi";
};
-
checkInputs = [ click ipython ];
+
propagatedBuildInputs = [ click ] ++ lib.optionals isPy27 [ typing ];
+
+
checkInputs = [ ipython pytest sh ];
+
+
# cli tests are impure
+
checkPhase = ''
+
pytest tests/ -k 'not cli'
+
'';
meta = with lib; {
description = "Add .env support to your django/flask apps in development and deployments";
+2 -2
pkgs/development/python-modules/qtpy/default.nix
···
buildPythonPackage rec {
pname = "QtPy";
-
version = "1.7.1";
+
version = "1.8.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "17pdn4d77gjjrsq7m1i6dz9px0dfi6wgaqz2v3sa3crl15spawp9";
+
sha256 = "14hws3zc2d548bfkxk1j2xy4ll368rak3z16bz3pdlj9j259jrpb";
};
# no concrete propagatedBuildInputs as multiple backends are supposed
+2 -1
pkgs/development/python-modules/requests-toolbelt/default.nix
···
, betamax
, mock
, pytest
+
, pyopenssl
}:
buildPythonPackage rec {
···
sha256 = "968089d4584ad4ad7c171454f0a5c6dac23971e9472521ea3b6d49d610aa6fc0";
};
-
checkInputs = [ betamax mock pytest ];
+
checkInputs = [ pyopenssl betamax mock pytest ];
propagatedBuildInputs = [ requests ];
checkPhase = ''
+2 -2
pkgs/development/python-modules/robotframework-seleniumlibrary/default.nix
···
{ stdenv, buildPythonPackage, fetchFromGitHub, python, robotframework, selenium, mockito, robotstatuschecker, approvaltests }:
buildPythonPackage rec {
-
version = "3.2.0";
+
version = "3.3.1";
pname = "robotframework-seleniumlibrary";
# no tests included in PyPI tarball
···
owner = "robotframework";
repo = "SeleniumLibrary";
rev = "v${version}";
-
sha256 = "106dl0qgf52wqk1xn4ghj7n2fjhaq0fh2wlnqn29aczbv5q581y3";
+
sha256 = "0dabc5dwx0pwsyiy74d7wj97k72yl28a17sasjzrdq819pyc3dvq";
};
propagatedBuildInputs = [ robotframework selenium ];
+2 -2
pkgs/development/python-modules/sabyenc/default.nix
···
buildPythonPackage rec {
pname = "sabyenc";
-
version = "3.3.5";
+
version = "3.3.6";
src = fetchPypi {
inherit pname version;
-
sha256 = "0fpvd5mckf1kbn0bhc5ybm08y41ps7sc5f9khz08qyjbikbcww85";
+
sha256 = "1qbymi1626mmcxnsqdwnz2krxg7jvl4qbh8nwjj54z2p681wvjm4";
};
# tests are not included in pypi distribution
+2 -2
pkgs/development/python-modules/snakeviz/default.nix
···
buildPythonPackage rec {
pname = "snakeviz";
-
version = "2.0.0";
+
version = "2.0.1";
src = fetchPypi {
inherit pname version;
-
sha256 = "0hvfc7c25cz6p3m3p3klm3njiysp7lkrs9sxm4p40spldl0jlfpa";
+
sha256 = "11a8cd4g98vq2x61i99ncl5w83clnndwg909ya4y1cdf0k1ckb40";
};
# Upstream doesn't run tests from setup.py
+2 -2
pkgs/development/python-modules/statsmodels/default.nix
···
buildPythonPackage rec {
pname = "statsmodels";
-
version = "0.9.0";
+
version = "0.10.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "6461f93a842c649922c2c9a9bc9d9c4834110b89de8c4af196a791ab8f42ba3b";
+
sha256 = "1fhsq3bz5ya54ipa0cb8qgfj7gfgxprv4briig0ly4r11rj23wv5";
};
checkInputs = with self; [ nose ];
+2 -2
pkgs/development/python-modules/tensorflow-estimator/default.nix
···
buildPythonPackage rec {
pname = "tensorflow-estimator";
-
version = "1.13.0";
+
version = "1.14.0";
format = "wheel";
src = fetchPypi {
pname = "tensorflow_estimator";
inherit version format;
-
sha256 = "068l4w0w7dj9gqkf8avjclq9zsp7ifwzw4rpf4qjylz3hczamzbw";
+
sha256 = "14irpsyj14vn2dpwr601f54058wywci1pv0hss8s01rl0rk3y1ya";
};
propagatedBuildInputs = [ mock numpy absl-py ];
+82 -13
pkgs/development/python-modules/tensorflow-probability/default.nix
···
{ lib
, fetchFromGitHub
+
, buildBazelPackage
, buildPythonPackage
+
, python
+
, setuptools
+
, wheel
, tensorflow
+
, six
+
, numpy
+
, decorator
+
, cloudpickle
+
, hypothesis
+
, scipy
+
, matplotlib
+
, mock
, pytest
}:
-
buildPythonPackage rec {
-
pname = "tensorflow-probability";
-
version = "0.6.0";
+
let
+
version = "0.7";
+
pname = "tensorflow_probability";
+
+
# first build all binaries and generate setup.py using bazel
+
bazel-wheel = buildBazelPackage {
+
name = "${pname}-${version}-py2.py3-none-any.whl";
+
+
src = fetchFromGitHub {
+
owner = "tensorflow";
+
repo = "probability";
+
rev = "v${version}";
+
sha256 = "0sy9gmjcvmwciamqvd7kd9qw2wd7ksklk80815fsn7sj0wiqxjyd";
+
};
+
+
nativeBuildInputs = [
+
# needed to create the output wheel in installPhase
+
python
+
setuptools
+
wheel
+
];
+
+
bazelTarget = ":pip_pkg";
+
+
fetchAttrs = {
+
sha256 = "0sjjj9z1dhilhpc8pq4154czrb79z9cm044jvn75kxcjv6v5l2m5";
+
};
+
+
buildAttrs = {
+
preBuild = ''
+
patchShebangs .
+
'';
+
+
installPhase = ''
+
# work around timestamp issues
+
# https://github.com/NixOS/nixpkgs/issues/270#issuecomment-467583872
+
export SOURCE_DATE_EPOCH=315532800
-
src = fetchFromGitHub {
-
owner = "tensorflow";
-
repo = "probability";
-
rev = "v${version}";
-
sha256 = "1y210n4asv8j39pk68bdfrz01gddflvzhxbcvj5jw6rjgaagnhvx";
+
# First build, then move. Otherwise pip_pkg would create the dir $out
+
# and then put the wheel in that directory. However we want $out to
+
# point directly to the wheel file.
+
./bazel-bin/pip_pkg . --release
+
mv *.whl "$out"
+
'';
+
};
};
+
in buildPythonPackage rec {
+
inherit version pname;
+
format = "wheel";
+
+
src = bazel-wheel;
propagatedBuildInputs = [
tensorflow
+
six
+
numpy
+
decorator
+
cloudpickle
];
+
# Listed here:
+
# https://github.com/tensorflow/probability/blob/f01d27a6f256430f03b14beb14d37def726cb257/testing/run_tests.sh#L58
checkInputs = [
+
hypothesis
pytest
+
scipy
+
matplotlib
+
mock
];
-
# Tests have an invalid import (`tensorflow_probability.opensource`), should
-
# be resolved in the next version with
-
# https://github.com/tensorflow/probability/commit/77d5957f2f0bdddcb46582799cd9c5c5167a1a40
-
doCheck = false;
+
# actual checks currently fail because for some reason
+
# tf.enable_eager_execution is called too late. Probably because upstream
+
# intents these tests to be run by bazel, not plain pytest.
+
# checkPhase = ''
+
# # tests need to import from other test files
+
# export PYTHONPATH="$PWD/tensorflow-probability:$PYTHONPATH"
+
# py.test
+
# '';
+
+
# sanity check
checkPhase = ''
-
py.test
+
python -c 'import tensorflow_probability'
'';
meta = with lib; {
+3 -3
pkgs/development/python-modules/tensorflow-tensorboard/default.nix
···
buildPythonPackage rec {
pname = "tensorflow-tensorboard";
-
version = "1.13.0";
+
version = "1.14.0";
format = "wheel";
src = fetchPypi ({
···
format = "wheel";
} // (if isPy3k then {
python = "py3";
-
sha256 = "19ixs811ndx8qh72dif0ywjss3rv7pf1khsgg6rvfjb9nw8wgjc2";
+
sha256 = "1z631614jk5zgasgmwfr33gz8bwv11p9f5llzlwvx3a8rnyv3q2h";
} else {
python = "py2";
-
sha256 = "0qpv6jsf6jjvdl95qvarn006kfj5a99mq925d73xg4af50ssvkrf";
+
sha256 = "1clv29yy942l3mfar2z6wkkk6l18fz7j6mi2dfz24j9dln0scny3";
}));
propagatedBuildInputs = [
+20 -4
pkgs/development/python-modules/tensorflow/bin.nix
···
, isPy3k, pythonOlder
, astor
, gast
+
, google-pasta
+
, wrapt
, numpy
, six
, termcolor
···
in buildPythonPackage rec {
pname = "tensorflow";
-
version = "1.13.1";
+
version = "1.14.0";
format = "wheel";
src = let
···
dls = import (./. + "/tf${version}-hashes.nix");
in fetchurl dls.${key};
-
propagatedBuildInputs = [ protobuf numpy termcolor grpcio six astor absl-py gast tensorflow-estimator tensorflow-tensorboard keras-applications keras-preprocessing ]
-
++ lib.optional (!isPy3k) mock
-
++ lib.optionals (pythonOlder "3.4") [ backports_weakref ];
+
propagatedBuildInputs = [
+
protobuf
+
numpy
+
termcolor
+
grpcio
+
six
+
astor
+
absl-py
+
gast
+
google-pasta
+
wrapt
+
tensorflow-estimator
+
tensorflow-tensorboard
+
keras-applications
+
keras-preprocessing
+
] ++ lib.optional (!isPy3k) mock
+
++ lib.optionals (pythonOlder "3.4") [ backports_weakref ];
# Upstream has a pip hack that results in bin/tensorboard being in both tensorflow
# and the propageted input tensorflow-tensorboard which causes environment collisions.
+1 -1
pkgs/development/python-modules/tensorflow/prefetcher.sh
···
-
version=1.13.1
+
version=1.14.0
hashfile=tf${version}-hashes.nix
rm -f $hashfile
echo "{" >> $hashfile
-42
pkgs/development/python-modules/tensorflow/tf1.13.1-hashes.nix
···
-
{
-
linux_py_27_cpu = {
-
url = "https://storage.googleapis.com/tensorflow/linux/cpu/tensorflow-1.13.1-cp27-none-linux_x86_64.whl";
-
sha256 = "0y1vd3y5fxcjj5d35qbk8482b0s642nyp0c2sm068vx5wd4sjpcg";
-
};
-
linux_py_35_cpu = {
-
url = "https://storage.googleapis.com/tensorflow/linux/cpu/tensorflow-1.13.1-cp35-cp35m-linux_x86_64.whl";
-
sha256 = "0b27swk4c2vaimwzbzl4c7xnccr9cfak5a3848lfqlcavcmbp94j";
-
};
-
linux_py_36_cpu = {
-
url = "https://storage.googleapis.com/tensorflow/linux/cpu/tensorflow-1.13.1-cp36-cp36m-linux_x86_64.whl";
-
sha256 = "087jwjby3bym09z55cjhc587aasf01y6l009p1q2vcpfq7s7ljmk";
-
};
-
linux_py_37_cpu = {
-
url = "https://storage.googleapis.com/tensorflow/linux/cpu/tensorflow-1.13.1-cp37-cp37m-linux_x86_64.whl";
-
sha256 = "0as68dp87lh7ffcccb149km6vws15ap04604irxwz35fq9h7grxg";
-
};
-
linux_py_27_gpu = {
-
url = "https://storage.googleapis.com/tensorflow/linux/gpu/tensorflow_gpu-1.13.1-cp27-none-linux_x86_64.whl";
-
sha256 = "0bf239f2bnsbqs3qh4xdql9pgbsm0zk7j8q1hg0wn0wrq440n0ds";
-
};
-
linux_py_35_gpu = {
-
url = "https://storage.googleapis.com/tensorflow/linux/gpu/tensorflow_gpu-1.13.1-cp35-cp35m-linux_x86_64.whl";
-
sha256 = "1cqav22a8yz6fzk46z6kv1ha2i28h5wccbd7k66drrfxibmb93j0";
-
};
-
linux_py_36_gpu = {
-
url = "https://storage.googleapis.com/tensorflow/linux/gpu/tensorflow_gpu-1.13.1-cp36-cp36m-linux_x86_64.whl";
-
sha256 = "1xnbiz36z7nicqrv0cmymfnwb8mdz2hifcv71gh6gnyi1962f2d7";
-
};
-
linux_py_37_gpu = {
-
url = "https://storage.googleapis.com/tensorflow/linux/gpu/tensorflow_gpu-1.13.1-cp37-cp37m-linux_x86_64.whl";
-
sha256 = "10gcrmd9y5a89wpi4rpp9scc9l2krijv8yjp7iphlykmn54ps74k";
-
};
-
mac_py_2_cpu = {
-
url = "https://storage.googleapis.com/tensorflow/mac/cpu/tensorflow-1.13.1-py2-none-any.whl";
-
sha256 = "1a6y5xj2wqkd8qmabn2xjg3q7x2jfixwrz351dgcxlhy8qy5yc0g";
-
};
-
mac_py_3_cpu = {
-
url = "https://storage.googleapis.com/tensorflow/mac/cpu/tensorflow-1.13.1-py3-none-any.whl";
-
sha256 = "1klsv18k0isfd61z1wirfz1lnqmx8k73ga8g9s18yand65iycads";
-
};
-
}
+42
pkgs/development/python-modules/tensorflow/tf1.14.0-hashes.nix
···
+
{
+
linux_py_27_cpu = {
+
url = "https://storage.googleapis.com/tensorflow/linux/cpu/tensorflow-1.14.0-cp27-none-linux_x86_64.whl";
+
sha256 = "0yywdrfk97dh1bxhibspg0raz70fx9lcczj6xlimqy4xb60clx7k";
+
};
+
linux_py_35_cpu = {
+
url = "https://storage.googleapis.com/tensorflow/linux/cpu/tensorflow-1.14.0-cp35-cp35m-linux_x86_64.whl";
+
sha256 = "1xvyb6xcrjhlwvrmrhn5vs9xy7g98smqmpv4i3hhpry4qyasphhj";
+
};
+
linux_py_36_cpu = {
+
url = "https://storage.googleapis.com/tensorflow/linux/cpu/tensorflow-1.14.0-cp36-cp36m-linux_x86_64.whl";
+
sha256 = "1psd9vyxz9f39dwj77nvrg373sxv3p5vdp9fnz81dpsm0b0mwl44";
+
};
+
linux_py_37_cpu = {
+
url = "https://storage.googleapis.com/tensorflow/linux/cpu/tensorflow-1.14.0-cp37-cp37m-linux_x86_64.whl";
+
sha256 = "0bg2sb1n2ag27r7ww695kg5hb0mjrw4kc5893krmixx2j71860c5";
+
};
+
linux_py_27_gpu = {
+
url = "https://storage.googleapis.com/tensorflow/linux/gpu/tensorflow_gpu-1.14.0-cp27-none-linux_x86_64.whl";
+
sha256 = "0y1x91gayg6pjddgl8ndcm63wfzhyv4s5khgl7ffzsgni1ivaqw5";
+
};
+
linux_py_35_gpu = {
+
url = "https://storage.googleapis.com/tensorflow/linux/gpu/tensorflow_gpu-1.14.0-cp35-cp35m-linux_x86_64.whl";
+
sha256 = "03piggpbz1jx8m2b95spq3jrdff4w6xx63ji07am7hyw2nsgx3mx";
+
};
+
linux_py_36_gpu = {
+
url = "https://storage.googleapis.com/tensorflow/linux/gpu/tensorflow_gpu-1.14.0-cp36-cp36m-linux_x86_64.whl";
+
sha256 = "0ypkp8cfhharsyyikb1qgf44cfm6284km9xswzvzymjzz75vg3gd";
+
};
+
linux_py_37_gpu = {
+
url = "https://storage.googleapis.com/tensorflow/linux/gpu/tensorflow_gpu-1.14.0-cp37-cp37m-linux_x86_64.whl";
+
sha256 = "0virp8nn2ysx4855hq29kas6fm6b3dsiybwzdxy9nnb9n2d8qlm2";
+
};
+
mac_py_2_cpu = {
+
url = "https://storage.googleapis.com/tensorflow/mac/cpu/tensorflow-1.14.0-py2-none-any.whl";
+
sha256 = "14f86k3pgq7z6i4s4im55zpp38f0drnm7xlclavsgcc0nxnj3z26";
+
};
+
mac_py_3_cpu = {
+
url = "https://storage.googleapis.com/tensorflow/mac/cpu/tensorflow-1.14.0-py3-none-any.whl";
+
sha256 = "0f3swpcjfgqhj6h5wnx8snc0xjkx4hnkqx83fmlrwpncs8c131d3";
+
};
+
}
+2 -2
pkgs/development/python-modules/tomlkit/default.nix
···
buildPythonPackage rec {
pname = "tomlkit";
-
version = "0.5.3";
+
version = "0.5.4";
src = fetchPypi {
inherit pname version;
-
sha256 = "1hjfzlb6y694pkadygcaq1n63di97pxgq2zpc74in1axc5166l6n";
+
sha256 = "1pby2lbzwy2pwdbq8xaqi4560b1ih5m0y141mmbc446j3w168fvv";
};
propagatedBuildInputs =
+2 -2
pkgs/development/python-modules/twilio/default.nix
···
buildPythonPackage rec {
pname = "twilio";
-
version = "6.28.0";
+
version = "6.29.0";
# tests not included in PyPi, so fetch from github instead
src = fetchFromGitHub {
owner = "twilio";
repo = "twilio-python";
rev = version;
-
sha256 = "161s4nb4hhqgb8kc5wiq3s4jkv9a3fg9vycf5ga804vzfr04zlki";
+
sha256 = "1xsg862d68rdrl6m3v9zcq20h42jn6x9cv1bk2ydiizyn6ngqz8w";
};
buildInputs = [ nose mock ];
+2 -2
pkgs/development/python-modules/vega/default.nix
···
buildPythonPackage rec {
pname = "vega";
-
version = "2.1.0";
+
version = "2.3.2";
src = fetchPypi {
inherit pname version;
-
sha256 = "0lshwsvi242m0ybrqjvbag73x1mrb31w2jq3lnklqyzry153xfdb";
+
sha256 = "0f39kfinn297gjhms9jys3ixdlsn0dz3gndgacyimp77jhzir4v1";
};
buildInputs = [ pytest ];
+2 -2
pkgs/development/python-modules/virtual-display/default.nix
···
buildPythonPackage rec {
pname = "PyVirtualDisplay";
-
version = "0.2.3";
+
version = "0.2.4";
propagatedBuildInputs = [ EasyProcess ];
src = fetchPypi {
inherit pname version;
-
sha256 = "658d03ea2d6727cbe70c30af71e9014d3d39114a3c50bd661b75aad188fdd3aa";
+
sha256 = "0nybvd7sajig6vya2v3fd20dls6f3nnf12x8anrfxnjs41chgx87";
};
# requires X server
+2 -2
pkgs/development/python-modules/xarray/default.nix
···
buildPythonPackage rec {
pname = "xarray";
-
version = "0.12.1";
+
version = "0.12.2";
src = fetchPypi {
inherit pname version;
-
sha256 = "ac09a819e791be208ae33fa7ecee19d0fe7b5479906f927d358a61957ce27e10";
+
sha256 = "0wlpyzxdhcc043g9sjbrflky7xwdyq487v64i532zb2fpjskd59s";
};
checkInputs = [ pytest ];
+2 -2
pkgs/development/python-modules/yamllint/default.nix
···
buildPythonPackage rec {
pname = "yamllint";
-
version = "1.15.0";
+
version = "1.16.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "8f25759997acb42e52b96bf3af0b4b942e6516b51198bebd3402640102006af7";
+
sha256 = "1bw39aiyqspjsxps5m3skaszih8vap8kyialbzg7jjc080nyqkws";
};
checkInputs = [ nose ];
+2 -2
pkgs/development/python-modules/zconfig/default.nix
···
buildPythonPackage rec {
pname = "ZConfig";
-
version = "3.4.0";
+
version = "3.5.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "560f779c7dcca0593083cbdb3fac9bfc7974cd5061363e2254844192e5644998";
+
sha256 = "0s7aycxna07a04b4rswbkj4y5qh3gxy2mcsqb9dmy0iimj9f9550";
};
patches = stdenv.lib.optional stdenv.hostPlatform.isMusl ./remove-setlocale-test.patch;
+2 -2
pkgs/development/tools/analysis/checkstyle/default.nix
···
{ stdenv, fetchurl, makeWrapper, jre }:
stdenv.mkDerivation rec {
-
version = "8.21";
+
version = "8.22";
name = "checkstyle-${version}";
src = fetchurl {
url = "https://github.com/checkstyle/checkstyle/releases/download/checkstyle-${version}/checkstyle-${version}-all.jar";
-
sha256 = "1jd6kbfmvgr3mr8kjhhr1fj1i3j36ysnfi14g5027ngwbq7klm7d";
+
sha256 = "0lnpzh4c5m8xkdx8dxywp33i3zrnwj1nhgpqnqgx31aw3x0drw40";
};
nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/development/tools/analysis/cppcheck/default.nix
···
stdenv.mkDerivation rec {
pname = "cppcheck";
-
version = "1.87";
+
version = "1.88";
name = "${pname}-${version}";
src = fetchurl {
url = "mirror://sourceforge/${pname}/${name}.tar.bz2";
-
sha256 = "1jl1qlr8la1rix1ffcvl6s4arv2n9fvx85sl4zgp29428xks9c73";
+
sha256 = "1jiqv9pzzy2gxkdhxv3gqjarwgbvc7kxyc66dm3i6xwp94bl89dv";
};
buildInputs = [ pcre ];
+3 -3
pkgs/development/tools/analysis/tflint/default.nix
···
buildGoModule rec {
pname = "tflint";
-
version = "0.8.3";
+
version = "0.9.0";
src = fetchFromGitHub {
owner = "wata727";
repo = pname;
rev = "v${version}";
-
sha256 = "0kqlwncsxssi1jchmrg1wmv7dknp0shx33j7kkryy12wdxxcbwyb";
+
sha256 = "1k050kcgvy21jk01mkgscfl7hlfgaa1621920w111fghqxibssan";
};
-
modSha256 = "1j5hjr4l4ivvhrywk286zczsn9balaaq5l5qx4ga4v0llwspmygm";
+
modSha256 = "17pm6v34gya8bgz8g5hh1cijjldk78j53x9yvsjpcjnqm7l0clcd";
subPackages = [ "." ];
+21 -7
pkgs/development/tools/bazel-watcher/default.nix
···
{ buildBazelPackage
, fetchFromGitHub
+
, fetchpatch
, git
, go
, python
, stdenv
}:
+
let
+
patches = [
+
./use-go-in-path.patch
+
+
# update rules_go to fix the build. Remove these when updating past 0.10.3
+
(fetchpatch {
+
url = "https://github.com/bazelbuild/bazel-watcher/commit/686130f50cea274f7453f6abc8c5249654047462.patch";
+
sha256 = "0rzs01sfiinl5d3dq9sx1bhl8kkzppdwh964fr7bzafqcxv5llmb";
+
})
+
(fetchpatch {
+
url = "https://github.com/bazelbuild/bazel-watcher/commit/18bdb44832ccc533e0ab3923ef80060eeb24582d.patch";
+
sha256 = "0k5hvlxlg4n092d53cbfxqqhzc6f1jv4licdhhi1dhckkhb4sdk6";
+
})
+
];
+
in
buildBazelPackage rec {
name = "bazel-watcher-${version}";
version = "0.10.3";
···
bazelTarget = "//ibazel";
fetchAttrs = {
+
inherit patches;
+
preBuild = ''
patchShebangs .
-
-
# tell rules_go to use the Go binary found in the PATH
-
sed -e 's:go_register_toolchains():go_register_toolchains(go_version = "host"):g' -i WORKSPACE
'';
preInstall = ''
···
sed -e '/^FILE:@bazel_gazelle_go_repository_tools.*/d' -i $bazelOut/external/\@*.marker
'';
-
sha256 = "1ck1rsg5msd77abs889nl2n2i3jlah4d4vjz5wbsb3jyhzn8n5ny";
+
sha256 = "01d4m4kb2mhz8fxl9apzsdq0pd7i79w3q49x51rwa524caml9zfv";
};
buildAttrs = {
+
inherit patches;
+
preBuild = ''
patchShebangs .
-
-
# tell rules_go to use the Go binary found in the PATH
-
sed -e 's:go_register_toolchains():go_register_toolchains(go_version = "host"):g' -i WORKSPACE
'';
installPhase = ''
+13
pkgs/development/tools/bazel-watcher/use-go-in-path.patch
···
+
diff --git a/WORKSPACE b/WORKSPACE
+
index 51273b6..fcf9ffb 100644
+
--- a/WORKSPACE
+
+++ b/WORKSPACE
+
@@ -61,7 +61,7 @@ load("@io_bazel_rules_go//go:deps.bzl", "go_register_toolchains", "go_rules_depe
+
+
go_rules_dependencies()
+
+
-go_register_toolchains()
+
+go_register_toolchains(go_version = "host")
+
+
load("@bazel_gazelle//:deps.bzl", "gazelle_dependencies", "go_repository")
+
+7 -4
pkgs/development/tools/bazelisk/default.nix
···
buildGoModule rec {
pname = "bazelisk";
-
version = "0.0.7";
+
version = "0.0.8";
src = fetchFromGitHub {
-
owner = "philwo";
+
owner = "bazelbuild";
repo = pname;
rev = "v${version}";
-
sha256 = "177x0mal960gs8578h5ir51vgn1bndm9z091110gqxb9xs9jq8pf";
+
sha256 = "16jiy71x8zr3x94p3qms3xbl8632avhwi66i82wv03n4ahkyb6qr";
};
modSha256 = "1f73j6ryidzi3kfy3rhsqx047vzwvzaqcsl7ykhg87rn2l2s7fdl";
meta = with stdenv.lib; {
description = "A user-friendly launcher for Bazel";
-
homepage = https://github.com/philwo/bazelisk;
+
longDescription = ''
+
BEWARE: This package does not work on NixOS.
+
'';
+
homepage = "https://github.com/bazelbuild/bazelisk";
license = licenses.asl20;
maintainers = with maintainers; [ elasticdog ];
};
+49
pkgs/development/tools/build-managers/bazel/cpp-test.nix
···
+
{
+
bazel
+
, bazelTest
+
, bazel-examples
+
, gccStdenv
+
, lib
+
, runLocal
+
, runtimeShell
+
, writeScript
+
, writeText
+
}:
+
+
let
+
+
toolsBazel = writeScript "bazel" ''
+
#! ${runtimeShell}
+
+
export CXX='${gccStdenv.cc}/bin/g++'
+
export LD='${gccStdenv.cc}/bin/ld'
+
export CC='${gccStdenv.cc}/bin/gcc'
+
+
# XXX: hack for macosX, this flags disable bazel usage of xcode
+
# See: https://github.com/bazelbuild/bazel/issues/4231
+
export BAZEL_USE_CPP_ONLY_TOOLCHAIN=1
+
+
exec "$BAZEL_REAL" "$@"
+
'';
+
+
workspaceDir = runLocal "our_workspace" {} (''
+
cp -r ${bazel-examples}/cpp-tutorial/stage3 $out
+
find $out -type d -exec chmod 755 {} \;
+
''
+
+ (lib.optionalString gccStdenv.isDarwin ''
+
mkdir $out/tools
+
cp ${toolsBazel} $out/tools/bazel
+
''));
+
+
testBazel = bazelTest {
+
name = "bazel-test-cpp";
+
inherit workspaceDir;
+
bazelPkg = bazel;
+
bazelScript = ''
+
${bazel}/bin/bazel \
+
build --verbose_failures \
+
//...
+
'';
+
};
+
+
in testBazel
+34 -12
pkgs/development/tools/build-managers/bazel/default.nix
···
-
{ stdenv, callPackage, lib, fetchurl, runCommand, runCommandCC, makeWrapper
+
{ stdenv, callPackage, lib, fetchurl, fetchFromGitHub, runCommand, runCommandCC, makeWrapper
# this package (through the fixpoint glass)
, bazel
, lr, xe, zip, unzip, bash, writeCBin, coreutils
···
# however it contains prebuilt java binaries, with wrong interpreter
# and libraries path.
# We prefetch it, patch it, and override it in a global bazelrc.
-
system = if stdenv.hostPlatform.isDarwin
-
then "darwin" else "linux";
+
system = if stdenv.hostPlatform.isDarwin then "darwin" else "linux";
remote_java_tools = stdenv.mkDerivation {
name = "remote_java_tools_${system}";
···
sourceRoot = ".";
patches = [
+
# On Darwin, the last argument to gcc is coming up as an empty string. i.e: ''
+
# This is breaking the build of any C target. This patch removes the last
+
# argument if it's found to be an empty string.
+
./trim-last-argument-to-gcc-if-empty.patch
+
./python-stub-path-fix.patch
] ++ lib.optional enableNixHacks ./nix-hacks.patch;
···
# in the nixpkgs checkout root to exercise them locally.
passthru.tests =
let
-
runLocal = name: attrs: script: runCommandCC name ({
+
runLocal = name: attrs: script:
+
let
+
attrs' = removeAttrs attrs [ "buildInputs" ];
+
buildInputs = [ python3 ] ++ (attrs.buildInputs or []);
+
in
+
runCommandCC name ({
+
inherit buildInputs;
preferLocalBuild = true;
meta.platforms = platforms;
-
buildInputs = [ python3 ];
-
} // attrs) script;
+
} // attrs') script;
# bazel wants to extract itself into $install_dir/install every time it runs,
# so let’s do that only once.
···
cp -R ${install_dir} $out
'';
-
bazelTest = { name, bazelScript, workspaceDir, bazelPkg }:
+
bazelTest = { name, bazelScript, workspaceDir, bazelPkg, buildInputs ? [] }:
let
be = extracted bazelPkg;
-
in runLocal name {} (
+
in runLocal name { inherit buildInputs; } (
# skip extraction caching on Darwin, because nobody knows how Darwin works
(lib.optionalString (!stdenv.hostPlatform.isDarwin) ''
# set up home with pre-unpacked bazel
···
'');
bazelWithNixHacks = bazel.override { enableNixHacks = true; };
+
+
bazel-examples = fetchFromGitHub {
+
owner = "bazelbuild";
+
repo = "examples";
+
rev = "5d8c8961a2516ebf875787df35e98cadd08d43dc";
+
sha256 = "03c1bwlq5bs3hg96v4g4pg2vqwhqq6w538h66rcpw02f83yy7fs8";
+
};
+
in {
-
pythonBinPathWithoutNixHacks = callPackage ./python-bin-path-test.nix{ inherit runLocal bazelTest; };
-
bashToolsWithoutNixHacks = callPackage ./bash-tools-test.nix { inherit runLocal bazelTest; };
+
bashTools = callPackage ./bash-tools-test.nix { inherit runLocal bazelTest; };
+
cpp = callPackage ./cpp-test.nix { inherit runLocal bazelTest bazel-examples; };
+
java = callPackage ./java-test.nix { inherit runLocal bazelTest bazel-examples; };
+
protobuf = callPackage ./protobuf-test.nix { inherit runLocal bazelTest; };
+
pythonBinPath = callPackage ./python-bin-path-test.nix{ inherit runLocal bazelTest; };
+
bashToolsWithNixHacks = callPackage ./bash-tools-test.nix { inherit runLocal bazelTest; bazel = bazelWithNixHacks; };
+
cppWithNixHacks = callPackage ./cpp-test.nix { inherit runLocal bazelTest bazel-examples; bazel = bazelWithNixHacks; };
+
javaWithNixHacks = callPackage ./java-test.nix { inherit runLocal bazelTest bazel-examples; bazel = bazelWithNixHacks; };
+
protobufWithNixHacks = callPackage ./protobuf-test.nix { inherit runLocal bazelTest; bazel = bazelWithNixHacks; };
pythonBinPathWithNixHacks = callPackage ./python-bin-path-test.nix{ inherit runLocal bazelTest; bazel = bazelWithNixHacks; };
-
bashToolsWithNixHacks = callPackage ./bash-tools-test.nix { inherit runLocal bazelTest; bazel = bazelWithNixHacks; };
};
# update the list of workspace dependencies
···
__darwinAllowLocalNetworking = true;
# Bazel expects several utils to be available in Bash even without PATH. Hence this hack.
-
customBash = writeCBin "bash" ''
#include <stdio.h>
#include <stdlib.h>
+56
pkgs/development/tools/build-managers/bazel/java-test.nix
···
+
{
+
bazel
+
, bazelTest
+
, bazel-examples
+
, gccStdenv
+
, lib
+
, openjdk8
+
, runLocal
+
, runtimeShell
+
, writeScript
+
, writeText
+
}:
+
+
let
+
+
toolsBazel = writeScript "bazel" ''
+
#! ${runtimeShell}
+
+
export CXX='${gccStdenv.cc}/bin/g++'
+
export LD='${gccStdenv.cc}/bin/ld'
+
export CC='${gccStdenv.cc}/bin/gcc'
+
+
# XXX: hack for macosX, this flags disable bazel usage of xcode
+
# See: https://github.com/bazelbuild/bazel/issues/4231
+
export BAZEL_USE_CPP_ONLY_TOOLCHAIN=1
+
+
exec "$BAZEL_REAL" "$@"
+
'';
+
+
workspaceDir = runLocal "our_workspace" {} (''
+
cp -r ${bazel-examples}/java-tutorial $out
+
find $out -type d -exec chmod 755 {} \;
+
''
+
+ (lib.optionalString gccStdenv.isDarwin ''
+
mkdir $out/tools
+
cp ${toolsBazel} $out/tools/bazel
+
''));
+
+
testBazel = bazelTest {
+
name = "bazel-test-cpp";
+
inherit workspaceDir;
+
bazelPkg = bazel;
+
buildInputs = [ openjdk8 ];
+
bazelScript = ''
+
${bazel}/bin/bazel \
+
run \
+
--host_javabase='@local_jdk//:jdk' \
+
--java_toolchain='@bazel_tools//tools/jdk:toolchain_hostjdk8' \
+
--javabase='@local_jdk//:jdk' \
+
--verbose_failures \
+
//:ProjectRunner
+
'';
+
};
+
+
in testBazel
+
+152
pkgs/development/tools/build-managers/bazel/protobuf-test.nix
···
+
{
+
bazel
+
, bazelTest
+
, fetchFromGitHub
+
, fetchurl
+
, gccStdenv
+
, lib
+
, openjdk8
+
, runLocal
+
, runtimeShell
+
, writeScript
+
, writeText
+
}:
+
+
let
+
com_google_protobuf = fetchFromGitHub {
+
owner = "protocolbuffers";
+
repo = "protobuf";
+
rev = "v3.7.0";
+
sha256 = "0nlxif4cajqllsj2vdh7zp14ag48fb8lsa64zmq8625q9m2lcmdh";
+
};
+
+
bazel_skylib = fetchFromGitHub {
+
owner = "bazelbuild";
+
repo = "bazel-skylib";
+
rev = "f83cb8dd6f5658bc574ccd873e25197055265d1c";
+
sha256 = "091fb0ky0956wgv8gghy9ay3yfx6497mb72qvibf0y9dllmxyn9l";
+
};
+
+
net_zlib = fetchurl rec {
+
url = "https://zlib.net/zlib-1.2.11.tar.gz";
+
sha256 = "c3e5e9fdd5004dcb542feda5ee4f0ff0744628baf8ed2dd5d66f8ca1197cb1a1";
+
+
passthru.sha256 = sha256;
+
};
+
+
WORKSPACE = writeText "WORKSPACE" ''
+
workspace(name = "our_workspace")
+
+
load("//:proto-support.bzl", "protobuf_deps")
+
protobuf_deps()
+
'';
+
+
protoSupport = writeText "proto-support.bzl" ''
+
"""Load dependencies needed to compile the protobuf library as a 3rd-party consumer."""
+
+
load("@bazel_tools//tools/build_defs/repo:http.bzl", "http_archive")
+
+
def protobuf_deps():
+
"""Loads common dependencies needed to compile the protobuf library."""
+
+
if "zlib" not in native.existing_rules():
+
# proto_library, cc_proto_library, and java_proto_library rules implicitly
+
# depend on @com_google_protobuf for protoc and proto runtimes.
+
# This statement defines the @com_google_protobuf repo.
+
native.local_repository(
+
name = "com_google_protobuf",
+
path = "${com_google_protobuf}",
+
)
+
native.local_repository(
+
name = "bazel_skylib",
+
path = "${bazel_skylib}",
+
)
+
+
native.bind(
+
name = "zlib",
+
actual = "@net_zlib//:zlib",
+
)
+
http_archive(
+
name = "net_zlib",
+
build_file = "@com_google_protobuf//:third_party/zlib.BUILD",
+
sha256 = "${net_zlib.sha256}",
+
strip_prefix = "zlib-1.2.11",
+
urls = ["file://${net_zlib}"],
+
)
+
'';
+
+
personProto = writeText "person.proto" ''
+
syntax = "proto3";
+
+
package person;
+
+
message Person {
+
string name = 1;
+
int32 id = 2;
+
string email = 3;
+
}
+
'';
+
+
personBUILD = writeText "BUILD" ''
+
proto_library(
+
name = "person_proto",
+
srcs = ["person.proto"],
+
visibility = ["//visibility:public"],
+
)
+
+
java_proto_library(
+
name = "person_java_proto",
+
deps = [":person_proto"],
+
)
+
+
cc_proto_library(
+
name = "person_cc_proto",
+
deps = [":person_proto"],
+
)
+
'';
+
+
toolsBazel = writeScript "bazel" ''
+
#! ${runtimeShell}
+
+
export CXX='${gccStdenv.cc}/bin/g++'
+
export LD='${gccStdenv.cc}/bin/ld'
+
export CC='${gccStdenv.cc}/bin/gcc'
+
+
# XXX: hack for macosX, this flags disable bazel usage of xcode
+
# See: https://github.com/bazelbuild/bazel/issues/4231
+
export BAZEL_USE_CPP_ONLY_TOOLCHAIN=1
+
+
exec "$BAZEL_REAL" "$@"
+
'';
+
+
workspaceDir = runLocal "our_workspace" {} (''
+
mkdir $out
+
cp ${WORKSPACE} $out/WORKSPACE
+
touch $out/BUILD.bazel
+
cp ${protoSupport} $out/proto-support.bzl
+
mkdir $out/person
+
cp ${personProto} $out/person/person.proto
+
cp ${personBUILD} $out/person/BUILD.bazel
+
''
+
+ (lib.optionalString gccStdenv.isDarwin ''
+
mkdir $out/tools
+
cp ${toolsBazel} $out/tools/bazel
+
''));
+
+
testBazel = bazelTest {
+
name = "bazel-test-protocol-buffers";
+
inherit workspaceDir;
+
bazelPkg = bazel;
+
buildInputs = [ openjdk8 ];
+
bazelScript = ''
+
${bazel}/bin/bazel \
+
build \
+
--host_javabase='@local_jdk//:jdk' \
+
--java_toolchain='@bazel_tools//tools/jdk:toolchain_hostjdk8' \
+
--javabase='@local_jdk//:jdk' \
+
--verbose_failures \
+
//...
+
'';
+
};
+
+
in testBazel
-1
pkgs/development/tools/build-managers/bazel/python-bin-path-test.nix
···
bazelScript = ''
${bazel}/bin/bazel \
run \
-
--host_javabase='@local_jdk//:jdk' \
//python:bin
'';
};
+37
pkgs/development/tools/build-managers/bazel/trim-last-argument-to-gcc-if-empty.patch
···
+
From 177b4720d6fbaa7fdd17e5e11b2c79ac8f246786 Mon Sep 17 00:00:00 2001
+
From: "Wael M. Nasreddine" <wael.nasreddine@gmail.com>
+
Date: Thu, 27 Jun 2019 21:08:51 -0700
+
Subject: [PATCH] Trim last argument to gcc if empty, on Darwin
+
+
On Darwin, the last argument to GCC is coming up as an empty string.
+
This is breaking the build of proto_library targets. However, I was not
+
able to reproduce with the example cpp project[0].
+
+
This commit removes the last argument if it's an empty string. This is
+
not a problem on Linux.
+
+
[0]: https://github.com/bazelbuild/examples/tree/master/cpp-tutorial/stage3
+
---
+
tools/cpp/osx_cc_wrapper.sh.tpl | 6 +++++-
+
1 file changed, 5 insertions(+), 1 deletion(-)
+
+
diff --git a/tools/cpp/osx_cc_wrapper.sh.tpl b/tools/cpp/osx_cc_wrapper.sh.tpl
+
index 4c85cd9b6b..6c611e3d25 100644
+
--- a/tools/cpp/osx_cc_wrapper.sh.tpl
+
+++ b/tools/cpp/osx_cc_wrapper.sh.tpl
+
@@ -53,7 +53,11 @@ done
+
%{env}
+
+
# Call the C++ compiler
+
-%{cc} "$@"
+
+if [[ ${*: -1} = "" ]]; then
+
+ %{cc} "${@:0:$#}"
+
+else
+
+ %{cc} "$@"
+
+fi
+
+
function get_library_path() {
+
for libdir in ${LIB_DIRS}; do
+
--
+
2.19.2
+
+27
pkgs/development/tools/drm_info/default.nix
···
+
{ stdenv, fetchFromGitHub
+
, libdrm, json_c
+
, meson, ninja, pkgconfig
+
}:
+
+
stdenv.mkDerivation rec {
+
pname = "drm_info";
+
version = "2.1.0";
+
+
src = fetchFromGitHub {
+
owner = "ascent12";
+
repo = "drm_info";
+
rev = "v${version}";
+
sha256 = "1i5bzkgqxjjw34jpj1x1gfdl3sz0sl6i7s787a6mjjslsc5g422l";
+
};
+
+
nativeBuildInputs = [ meson ninja pkgconfig ];
+
buildInputs = [ libdrm json_c ];
+
+
meta = with stdenv.lib; {
+
description = "Small utility to dump info about DRM devices.";
+
homepage = "https://github.com/ascent12/drm_info";
+
license = licenses.mit;
+
maintainers = with maintainers; [ tadeokondrak ];
+
platforms = platforms.linux;
+
};
+
}
+2 -2
pkgs/development/tools/flatpak-builder/default.nix
···
let
installed_testdir = "${placeholder "installedTests"}/libexec/installed-tests/flatpak-builder";
installed_test_metadir = "${placeholder "installedTests"}/share/installed-tests/flatpak-builder";
-
version = "1.0.7";
+
version = "1.0.8";
in stdenv.mkDerivation rec {
name = "flatpak-builder-${version}";
···
src = fetchurl {
url = "https://github.com/flatpak/flatpak-builder/releases/download/${version}/${name}.tar.xz";
-
sha256 = "04z9i2kahj4mffzq8ny0jvc4g3ah8kv8ilqv2rx9r1l8fhbq30jj";
+
sha256 = "0ns1vv2phhd3vsi2749cajwapapx7xa841kkvssixwgfa575d912";
};
nativeBuildInputs = [
+8 -8
pkgs/development/tools/github/github-release/default.nix
···
-
{ stdenv, fetchurl }:
+
{ stdenv, system, fetchurl }:
let
-
linuxPredicate = stdenv.hostPlatform.system == "x86_64-linux";
-
bsdPredicate = stdenv.hostPlatform.system == "x86_64-freebsd";
-
darwinPredicate = stdenv.hostPlatform.system == "x86_64-darwin";
+
linuxPredicate = system == "x86_64-linux";
+
bsdPredicate = system == "x86_64-freebsd";
+
darwinPredicate = system == "x86_64-darwin";
metadata = assert linuxPredicate || bsdPredicate || darwinPredicate;
if linuxPredicate then
{ arch = "linux-amd64";
-
sha256 = "0b3h0d0qsrjx99kcd2cf71xijh44wm5rpm2sr54snh3f7macj2p1";
+
sha256 = "0p0qj911nmmdj0r7wx3363gid8g4bm3my6mj3d6s4mwgh9lfisiz";
archiveBinaryPath = "linux/amd64"; }
else if bsdPredicate then
{ arch = "freebsd-amd64";
-
sha256 = "1yydm4ndkh80phiwk41kcf6pizvwrfhsfk3jwrrgr42wsnkkgj0q";
+
sha256 = "0g618y9n39j11l1cbhyhwlbl2gv5a2a122c1dps3m2wmv7yzq5hk";
archiveBinaryPath = "freebsd/amd64"; }
else
{ arch = "darwin-amd64";
-
sha256 = "1dj74cf1ahihia2dr9ii9ky0cpmywn42z2iq1vkbrrcggjvyrnlf";
+
sha256 = "0l623fgnsix0y3f960bwx3dgnrqaxs21w5652kvaaal7dhnlgmwj";
archiveBinaryPath = "darwin/amd64"; };
in stdenv.mkDerivation rec {
shortname = "github-release";
name = "${shortname}-${version}";
-
version = "0.6.2";
+
version = "0.7.2";
src = fetchurl {
url = "https://github.com/aktau/github-release/releases/download/v${version}/${metadata.arch}-${shortname}.tar.bz2";
+7 -8
pkgs/development/tools/go-protobuf/default.nix
···
-
{ stdenv, buildGoPackage, fetchFromGitHub }:
+
{ stdenv, buildGoModule, fetchFromGitHub }:
-
buildGoPackage rec {
+
buildGoModule rec {
name = "go-protobuf-${version}";
-
version = "2018-01-04";
-
rev = "1e59b77b52bf8e4b449a57e6f79f21226d571845";
-
-
goPackagePath = "github.com/golang/protobuf";
+
version = "1.3.1";
src = fetchFromGitHub {
-
inherit rev;
owner = "golang";
repo = "protobuf";
-
sha256 = "19bkh81wnp6njg3931wky6hsnnl2d1ig20vfjxpv450sd3k6yys8";
+
rev = "v${version}";
+
sha256 = "15am4s4646qy6iv0g3kkqq52rzykqjhm4bf08dk0fy2r58knpsyl";
};
+
+
modSha256 = "0sjjj9z1dhilhpc8pq4154czrb79z9cm044jvn75kxcjv6v5l2m5";
meta = with stdenv.lib; {
homepage = "https://github.com/golang/protobuf";
+7 -8
pkgs/development/tools/go-tools/default.nix
···
-
{ buildGoPackage
+
{ buildGoModule
, lib
, fetchFromGitHub
}:
-
buildGoPackage rec {
-
name = "go-tools-${version}";
-
version = "2019.1.1";
+
buildGoModule rec {
+
pname = "go-tools";
+
version = "2019.2.1";
goPackagePath = "honnef.co/go/tools";
excludedPackages = ''\(simple\|ssa\|ssa/ssautil\|lint\|staticcheck\|stylecheck\|unused\)/testdata'';
···
src = fetchFromGitHub {
owner = "dominikh";
repo = "go-tools";
-
rev = "${version}";
-
sha256 = "1zwh64x3i32p6f6808q609n63xda3bq888n43wl4alpx1b08spha";
+
rev = version;
+
sha256 = "1frpy4pl9yp6j00mjj2yss3k8hip0cc7b5i5mz61n3dlw0kga9z1";
};
-
goDeps = ./deps.nix;
+
modSha256 = "0ysaq94m7pkziliz4z4dl8ad84mbn17m2hqxvs9wbw4iwhkpi7gz";
meta = with lib; {
description = "A collection of tools and libraries for working with Go code, including linters and static analysis.";
homepage = https://staticcheck.io;
license = licenses.mit;
maintainers = with maintainers; [ rvolosatovs kalbasit ];
-
platforms = platforms.linux ++ platforms.darwin;
};
}
-29
pkgs/development/tools/go-tools/deps.nix
···
-
[
-
{
-
goPackagePath = "github.com/BurntSushi/toml";
-
fetch = {
-
type = "git";
-
url = "https://github.com/BurntSushi/toml";
-
rev = "3012a1dbe2e4bd1391d42b32f0577cb7bbc7f005";
-
sha256 = "1fjdwwfzyzllgiwydknf1pwjvy49qxfsczqx5gz3y0izs7as99j6";
-
};
-
}
-
{
-
goPackagePath = "github.com/kisielk/gotool";
-
fetch = {
-
type = "git";
-
url = "https://github.com/kisielk/gotool";
-
rev = "80517062f582ea3340cd4baf70e86d539ae7d84d";
-
sha256 = "14af2pa0ssyp8bp2mvdw184s5wcysk6akil3wzxmr05wwy951iwn";
-
};
-
}
-
{
-
goPackagePath = "golang.org/x/tools";
-
fetch = {
-
type = "git";
-
url = "https://go.googlesource.com/tools";
-
rev = "2c0ae70061356820330c96810d9483beb9a6da8e";
-
sha256 = "1lsi2ssxajclj3bciz2a41v1vjv768ja3v6wnbyhxy8xphwkp4fk";
-
};
-
}
-
]
-29
pkgs/development/tools/haskell/multi-ghc-travis/default.nix
···
-
{ mkDerivation, ansi-terminal, base, bytestring, Cabal, containers
-
, deepseq, Diff, directory, filepath, ShellCheck, stdenv, tasty
-
, tasty-golden, transformers, fetchFromGitHub
-
}:
-
-
mkDerivation {
-
pname = "haskell-ci";
-
version = "0";
-
src = fetchFromGitHub {
-
owner = "haskell-CI";
-
repo = "haskell-ci";
-
rev = "18a7f5edcde360cea0740ff143eff1113ecda7d2";
-
sha256 = "00gxpxb5n1a1v562fd4cg1j92vwmd2zp00c2j60piyl8ppxxa115";
-
};
-
isLibrary = true;
-
isExecutable = true;
-
libraryHaskellDepends = [
-
base Cabal containers deepseq directory filepath ShellCheck
-
transformers
-
];
-
executableHaskellDepends = [ base ];
-
testHaskellDepends = [
-
ansi-terminal base bytestring Diff directory filepath tasty
-
tasty-golden transformers
-
];
-
homepage = "https://github.com/haskell-CI/haskell-ci";
-
description = "Script generator for Travis-CI";
-
license = stdenv.lib.licenses.bsd3;
-
}
+2 -2
pkgs/development/tools/pet/default.nix
···
buildGoModule rec {
name = "pet-${version}";
-
version = "0.3.4";
+
version = "0.3.5";
src = fetchFromGitHub {
owner = "knqyf263";
repo = "pet";
rev = "v${version}";
-
sha256 = "0m2fzpqxk7hrbxsgqplkg7h2p7gv6s1miymv3gvw0cz039skag0s";
+
sha256 = "03fzvvdmb06kf2zglaf8jkqxqv9h1kl7n586ww61z3n3mmp1x4rd";
};
modSha256 = "06ham8lsx5c1vk5jkwp1aa9g4q4g7sfq7gxz2gkffa98x2vlawyf";
+30
pkgs/development/tools/protoc-gen-doc/default.nix
···
+
{ buildGoModule, fetchFromGitHub, lib }:
+
+
buildGoModule rec {
+
name = "protoc-gen-doc-unstable-${version}";
+
version = "2019-04-22";
+
+
src = fetchFromGitHub {
+
owner = "pseudomuto";
+
repo = "protoc-gen-doc";
+
rev = "f824a8908ce33f213b2dba1bf7be83384c5c51e8";
+
sha256 = "004axh2gqc4f115mdxxg59d19hph3rr0bq9d08n3nyl315f590kj";
+
};
+
+
modSha256 = "1952ycdkgl00q2s3qmhislhhim15nn6nmlkwbfdvrsfzznqj47rd";
+
+
meta = with lib; {
+
description = "Documentation generator plugin for Google Protocol Buffers";
+
longDescription = ''
+
This is a documentation generator plugin for the Google Protocol Buffers
+
compiler (protoc). The plugin can generate HTML, JSON, DocBook and
+
Markdown documentation from comments in your .proto files.
+
+
It supports proto2 and proto3, and can handle having both in the same
+
context.
+
'';
+
homepage = "https://github.com/pseudomuto/protoc-gen-doc";
+
license = licenses.mit;
+
maintainers = with maintainers; [ kalbasit ];
+
};
+
}
+33
pkgs/development/tools/prototool/default.nix
···
+
{ lib, buildGoModule, fetchFromGitHub, makeWrapper, protobuf }:
+
+
buildGoModule rec {
+
pname = "prototool";
+
version = "1.8.0";
+
+
src = fetchFromGitHub {
+
owner = "uber";
+
repo = pname;
+
rev = "v${version}";
+
sha256 = "0m6g5p3jyf0ja5j9rqmw8mhipdqxk7rcxm0plmh65bxk1n22fzjc";
+
};
+
+
nativeBuildInputs = [ makeWrapper ];
+
+
modSha256 = "0l4nqb1c1lqqk70l9qwib1azavxlwghi2fv5siwrr5zw4jysz5ml";
+
+
postInstall = ''
+
wrapProgram "$out/bin/prototool" \
+
--prefix PROTOTOOL_PROTOC_BIN_PATH : "${protobuf}/bin/protoc" \
+
--prefix PROTOTOOL_PROTOC_WKT_PATH : "${protobuf}/include"
+
'';
+
+
subPackages = [ "cmd/prototool" ];
+
+
meta = with lib; {
+
homepage = "https://github.com/uber/prototool";
+
description = "Your Swiss Army Knife for Protocol Buffers";
+
maintainers = [ maintainers.marsam ];
+
license = licenses.mit;
+
platforms = platforms.unix;
+
};
+
}
+2 -2
pkgs/development/tools/rust/bindgen/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "rust-bindgen";
-
version = "0.49.2";
+
version = "0.49.3";
src = fetchFromGitHub {
owner = "rust-lang";
repo = pname;
rev = "v${version}";
-
sha256 = "0m9c7zswp87yj7y972ghbx5z7lwbhdxb9qyws5cwiazkl582q0qj";
+
sha256 = "032sgg27pdxlmas67clqldvamd2ncdiw1hmk1hiprcxng7073f4y";
};
cargoSha256 = "1311d0wjjj99m59zd2n6r4aq6lwbbpyj54ha2z9g4yd1hn344r91";
+2 -2
pkgs/development/tools/rust/rustfmt/default.nix
···
rustPlatform.buildRustPackage rec {
name = "rustfmt-${version}";
-
version = "1.2.1";
+
version = "1.2.2";
src = fetchFromGitHub {
owner = "rust-lang";
repo = "rustfmt";
rev = "v${version}";
-
sha256 = "153pas7d5fchkmiw6mkbhn75lv3y69k85spzmm5i4lqnq7f0yqap";
+
sha256 = "1k9p6sp8q87flx9vzg46880ir7likvbydai3g6q76278h86rn0v8";
};
cargoSha256 = "08x6vy5v2vgrk3gsw3qcvv52a7hifsgcsnsg1phlk1ikaff21y4z";
+2 -2
pkgs/development/tools/sassc/default.nix
···
stdenv.mkDerivation rec {
pname = "sassc";
-
version = "3.6.0";
+
version = "3.6.1";
src = fetchFromGitHub {
owner = "sass";
repo = pname;
rev = version;
-
sha256 = "14cbprnz70bv9qcs1aglvj9kkhf22as5xxz7gkv2ni8yjy8rp8q2";
+
sha256 = "1sxm54mkhs9m4vnl7vn11y17mhzamc403hv3966j1c7p2rbzg5pv";
};
patchPhase = ''
+2 -2
pkgs/development/tools/scalafmt/default.nix
···
let
baseName = "scalafmt";
-
version = "2.0.0-RC7";
+
version = "2.0.0";
deps = stdenv.mkDerivation {
name = "${baseName}-deps-${version}";
buildCommand = ''
···
'';
outputHashMode = "recursive";
outputHashAlgo = "sha256";
-
outputHash = "0scz3pp63z6xfj69kvsfr8l3ll9rq95j4xlhlyrzg1vfl1gf41ig";
+
outputHash = "18mf23ssy4lwvsi4pg6m4b003paz5yds5vs7nhl0bfcq57xg6qj1";
};
in
stdenv.mkDerivation rec {
+7
pkgs/development/tools/vagrant/default.nix
···
fi
'';
+
# `patchShebangsAuto` patches this one script which is intended to run
+
# on foreign systems.
+
postFixup = ''
+
sed -i -e '1c#!/bin/sh -' \
+
$out/lib/ruby/gems/*/gems/vagrant-*/plugins/provisioners/salt/bootstrap-salt.sh
+
'';
+
passthru = {
inherit ruby deps;
};
+2 -2
pkgs/development/web/nodejs/v12.nix
···
in
buildNodejs {
inherit enableNpm;
-
version = "12.4.0";
-
sha256 = "1qwcv8m1m3293vmb4x2xrpqlpaa1r1951gf0mva60b2hsdk27d90";
+
version = "12.5.0";
+
sha256 = "08haqs104lw44l92bxfii18sdn7y1k07cz3p0ni9bhw7kh4vf5c7";
}
+2 -2
pkgs/games/factorio/default.nix
···
x86_64-linux = let bdist = bdistForArch { inUrl = "linux64"; inTar = "x64"; }; in {
alpha = {
stable = bdist { sha256 = "0b4hbpdcrh5hgip9q5dkmw22p66lcdhnr0kmb0w5dw6yi7fnxxh0"; version = "0.16.51"; withAuth = true; };
-
experimental = bdist { sha256 = "0xgvvmyh49992y2r8yhafi80j3j4pcsp7pf0fg3rbc6zi1ariwsr"; version = "0.17.32"; withAuth = true; };
+
experimental = bdist { sha256 = "1q66chnxsdlaz1bj3al62iikyxvknj1vkwh5bcc46favy4wpqpzz"; version = "0.17.52"; withAuth = true; };
};
headless = {
stable = bdist { sha256 = "0zrnpg2js0ysvx9y50h3gajldk16mv02dvrwnkazh5kzr1d9zc3c"; version = "0.16.51"; };
-
experimental = bdist { sha256 = "1jfjbb0v7yiqpn7nxkr4fcd1rsz59s8k6qcl82d1j320l3y7nl9w"; version = "0.17.32"; };
+
experimental = bdist { sha256 = "03nv0qagv5pmqqbisf0hq6cb5rg2ih37lzkvcxihnnw72r78li94"; version = "0.17.52"; };
};
demo = {
stable = bdist { sha256 = "0zf61z8937yd8pyrjrqdjgd0rjl7snwrm3xw86vv7s7p835san6a"; version = "0.16.51"; };
+2 -2
pkgs/games/klavaro/default.nix
···
stdenv.mkDerivation rec {
name = "klavaro-${version}";
-
version = "3.07";
+
version = "3.08";
src = fetchurl {
url = "mirror://sourceforge/klavaro/${name}.tar.bz2";
-
sha256 = "1zz7kr3rhprn1ixmh58x8sdmdfl42lki7vgbina3sgnamx31zia5";
+
sha256 = "0qmvr6d8wshwp0xvk5wbig4vlzxzcxrakhyhd32v8v3s18nhqsrc";
};
nativeBuildInputs = [ intltool makeWrapper pkgconfig ];
+4 -3
pkgs/games/openjk/default.nix
···
categories = "Game;";
};
in stdenv.mkDerivation rec {
-
name = "OpenJK-2018-09-17";
+
pname = "OpenJK";
+
version = "2019-06-24";
src = fetchFromGitHub {
owner = "JACoders";
repo = "OpenJK";
-
rev = "cc4094c8fa989663eb8087b33d97bb2749295b9f";
-
sha256 = "1fzijlf4izpm6n92cwv951c10nb18pg5zhc5xx7pw3i4sy8h9nyk";
+
rev = "e8b5c135eccb05ddae67e00ff944001f373fddd4";
+
sha256 = "0qkbn59swhnb0anvy9gq945rkb58j6axlcfgb7sff0m4swqw2394";
};
dontAddPrefix = true;
+57
pkgs/games/redeclipse/default.nix
···
+
{ stdenv, fetchFromGitHub, fetchurl, fetchpatch
+
, curl, ed, pkgconfig, zlib, libX11
+
, SDL2, SDL2_image, SDL2_mixer
+
}:
+
+
stdenv.mkDerivation rec {
+
pname = "redeclipse";
+
version = "1.6.0";
+
+
src = fetchurl {
+
url = "https://github.com/red-eclipse/base/releases/download/v${version}/redeclipse_${version}_nix.tar.bz2";
+
sha256 = "0j98zk7nivdsap4y50dlqnql17hdila1ikvps6vicwaqb3l4gaa8";
+
};
+
+
buildInputs = [
+
libX11 zlib
+
SDL2 SDL2_image SDL2_mixer
+
];
+
+
nativeBuildInputs = [
+
curl ed pkgconfig
+
];
+
+
makeFlags = [ "-C" "src/" "prefix=$(out)" ];
+
+
patches = [
+
# "remove gamma name hack" - Can't find `____gammaf128_r_finite` otherwise
+
# Is likely to be included in next release
+
(fetchpatch {
+
url = "https://github.com/red-eclipse/base/commit/b16b4963c1ad81bb9ef784bc4913a4c8ab5f1bb4.diff";
+
sha256 = "1bm07qrq60bbmbf5k9255qq115mcyfphfy2f7xl1yx40mb9ns65p";
+
})
+
];
+
+
enableParallelBuilding = true;
+
+
installTargets = [ "system-install" ];
+
+
postInstall = ''
+
cp -R -t $out/share/redeclipse/data/ data/*
+
'';
+
+
meta = with stdenv.lib; {
+
description = "A first person arena shooter, featuring parkour, impulse boosts, and more.";
+
longDescription = ''
+
Red Eclipse is a fun-filled new take on the first person arena shooter,
+
featuring parkour, impulse boosts, and more. The development is geared
+
toward balanced gameplay, with a general theme of agility in a variety of
+
environments.
+
'';
+
homepage = "https://www.redeclipse.net";
+
license = with licenses; [ licenses.zlib cc-by-sa-30 ];
+
maintainers = with maintainers; [ lambda-11235 ];
+
platforms = platforms.linux;
+
hydraPlatforms = [];
+
};
+
}
+2 -2
pkgs/games/tintin/default.nix
···
{ stdenv, fetchurl, zlib, pcre }:
stdenv.mkDerivation rec {
-
name = "tintin-2.01.7";
+
name = "tintin-2.01.8";
src = fetchurl {
url = "mirror://sourceforge/tintin/${name}.tar.gz";
-
sha256 = "033n84pyxml3n3gd4dq0497n9w331bnrr1gppwipz9ashmq8jz7v";
+
sha256 = "056g82yi784mf4gbrida9fxqmz347m2l9vad2ksv2fhl7g553y2s";
};
buildInputs = [ zlib pcre ];
+2 -2
pkgs/misc/screensavers/xlockmore/default.nix
···
, libXdmcp, libXt }:
stdenv.mkDerivation rec {
-
name = "xlockmore-5.56";
+
name = "xlockmore-5.57";
src = fetchurl {
url = "http://sillycycle.com/xlock/${name}.tar.xz";
-
sha256 = "1dg1n79rnswhxqz36mxnl5lp8p37i9fbibnzzyrqknmvf2s8xpd0";
+
sha256 = "18r8rh8fzdn9miicbpc3qbdd4mm2g1jpsbcvj29sr66pxydzkb7r";
curlOpts = "--user-agent 'Mozilla/5.0'";
};
+300 -113
pkgs/misc/vim-plugins/generated.nix
···
ale = buildVimPluginFrom2Nix {
pname = "ale";
-
version = "2019-06-21";
+
version = "2019-06-30";
src = fetchFromGitHub {
owner = "w0rp";
repo = "ale";
-
rev = "65ba4b85ec3011cccb9ea7135183e7fc8d7a0d69";
+
rev = "89f7292138087e1410b2430ae6d359d42e7fe31f";
sha256 = "00g2yjrq7gbdc9wmj2bpcpx6frvsyk69bbi05a8b43lpdkj5yzz5";
};
};
···
camelcasemotion = buildVimPluginFrom2Nix {
pname = "camelcasemotion";
-
version = "2019-06-06";
+
version = "2019-06-28";
src = fetchFromGitHub {
owner = "bkad";
repo = "camelcasemotion";
-
rev = "2a62526721b6a4324bec3408e4ed9f8eebf96f3b";
-
sha256 = "1pj7q0ic6hs6niflp64izk5v3kdw951ram035v3xv1gjsp1aa5a6";
+
rev = "406368dea50303884aa321d2cdff714e010f951e";
+
sha256 = "0a1grafg05cb9mpk69j2y433ifm27ksy29wzlxlm5798dmb473mw";
};
};
···
coc-nvim = buildVimPluginFrom2Nix {
pname = "coc-nvim";
-
version = "2019-06-24";
+
version = "2019-07-02";
src = fetchFromGitHub {
owner = "neoclide";
repo = "coc.nvim";
-
rev = "5e9594d9da22e4eb840cb102513bebc77bab7300";
-
sha256 = "036ig6902vwrqnj052s6631lx4k4m0p5y2238287p8qmxgj7x9d6";
+
rev = "ac3f1933e331b4170ad59223def8fb10b666cfa5";
+
sha256 = "0i5y2nciqy1lgl5jbhlry3qnasly8sf1wximf84dq937yk79bxjj";
};
};
···
command-t = buildVimPluginFrom2Nix {
pname = "command-t";
-
version = "2019-05-12";
+
version = "2019-06-28";
src = fetchFromGitHub {
owner = "wincent";
repo = "command-t";
-
rev = "57e112c12c99185e062a4330896cfaf422d1ea64";
-
sha256 = "19ajaxga54kij9ii68cd38frq4y7lr7896wqa5xgs5qq83wh1b1z";
+
rev = "4f86fcb812b07a3d691d4b617e093b001a6ad839";
+
sha256 = "06i02632q6rkq7xljfn70shlfb301l31sv8pd738anshf8qwkfff";
fetchSubmodules = true;
};
};
···
};
};
+
dart-vim-plugin = buildVimPluginFrom2Nix {
+
pname = "dart-vim-plugin";
+
version = "2019-05-04";
+
src = fetchFromGitHub {
+
owner = "dart-lang";
+
repo = "dart-vim-plugin";
+
rev = "8ffc3e208c282f19afa237d343fa1533146bd2b4";
+
sha256 = "1ypcn3212d7gzfgvarrsma0pvaial692f3m2c0blyr1q83al1pm8";
+
};
+
};
+
denite-extra = buildVimPluginFrom2Nix {
pname = "denite-extra";
version = "2019-03-29";
···
denite-nvim = buildVimPluginFrom2Nix {
pname = "denite-nvim";
-
version = "2019-06-23";
+
version = "2019-07-01";
src = fetchFromGitHub {
owner = "Shougo";
repo = "denite.nvim";
-
rev = "9a5e321ced689771c052f68a8125c0a44ad3389a";
-
sha256 = "16l85820490h1l44idk3jsz5xyckyvcyi42a88bw0ms70nnh2569";
+
rev = "90f8367cefbb443ba0d5b363c63be087a5937d43";
+
sha256 = "164sxi42yyqbj2v4vklmphhjqfq54ci9n21hcl3hwbrfgrh5i67i";
};
};
deol-nvim = buildVimPluginFrom2Nix {
pname = "deol-nvim";
-
version = "2019-06-19";
+
version = "2019-06-24";
src = fetchFromGitHub {
owner = "Shougo";
repo = "deol.nvim";
-
rev = "ed807a398fd5120a5dfbff7877517b25cd801bea";
-
sha256 = "131wzadip0d0wgn32vy38w02mx199kvcg62ldfwr68nyad48j98l";
+
rev = "85f0e6dde132c670eda32eb98c6a6f3d7b31a984";
+
sha256 = "154cdczdwzwx24c8ggasll3yf86y1r4z5hb3rld42m2dpbnhcrns";
};
};
···
deoplete-jedi = buildVimPluginFrom2Nix {
pname = "deoplete-jedi";
-
version = "2019-06-22";
+
version = "2019-06-30";
src = fetchFromGitHub {
-
owner = "zchee";
+
owner = "deoplete-plugins";
repo = "deoplete-jedi";
-
rev = "afd01dc2204d5003f89f6a93e1d3e1910d31fcd9";
-
sha256 = "0p70v03wjdvyy8g13m8b2r288262zz5yw3yap11id38npykb0pvv";
+
rev = "763c7befa7bbe44aa00a0c832916958a16e71254";
+
sha256 = "1dvw8l8f0k9hkfv4n791lgm1lipf5n2xhjyrwx1px92j1h94i8f1";
fetchSubmodules = true;
};
};
···
repo = "deoplete-julia";
rev = "d60b976910685c99ca773c974e91c44eeda03a19";
sha256 = "0x5cc9g1g1w9myr6p1ahb9gpn2abpbggjdk2bc903f62pkrapvjf";
+
};
+
};
+
+
deoplete-lsp = buildVimPluginFrom2Nix {
+
pname = "deoplete-lsp";
+
version = "2018-12-05";
+
src = fetchFromGitHub {
+
owner = "Shougo";
+
repo = "deoplete-lsp";
+
rev = "c4837884f61a7699f328fb05b93bed0b6395dd70";
+
sha256 = "0ahfffpmc62pqnplm0lmzpam420i578rvyi7zda21nqlir9a53ij";
};
};
···
deoplete-nvim = buildVimPluginFrom2Nix {
pname = "deoplete-nvim";
-
version = "2019-06-22";
+
version = "2019-06-30";
src = fetchFromGitHub {
owner = "Shougo";
repo = "deoplete.nvim";
-
rev = "aebaec4adbb65339601063f1ee533eef09220145";
-
sha256 = "11kd4m3bwp8xn5i6am9am186rz8vw12zdissb3i86xa3dcgv856g";
+
rev = "2ac0da55367db0b9d8920bb7bcbc051f9b07b90c";
+
sha256 = "05j2s6332p7gbpwg2hfimvvmk0qaah9danl5d8brq1w34bs79vjd";
};
};
···
};
};
+
DoxygenToolkit-vim = buildVimPluginFrom2Nix {
+
pname = "DoxygenToolkit-vim";
+
version = "2010-11-06";
+
src = fetchFromGitHub {
+
owner = "vim-scripts";
+
repo = "DoxygenToolkit.vim";
+
rev = "afd8663d36d2ec19d26befdb10e89e912d26bbd3";
+
sha256 = "1za8li02j4nhqjjsyxg4p78638h5af4izim37zc0p1x55zr3i85r";
+
};
+
};
+
echodoc-vim = buildVimPluginFrom2Nix {
pname = "echodoc-vim";
version = "2019-06-12";
···
emmet-vim = buildVimPluginFrom2Nix {
pname = "emmet-vim";
-
version = "2019-06-19";
+
version = "2019-06-24";
src = fetchFromGitHub {
owner = "mattn";
repo = "emmet-vim";
-
rev = "5a7c7930c675220121e62d8eecfdbee653e95bac";
-
sha256 = "0ippqmdw2mhi34yvnpfh0v08v59zvn2nq815b8zfq1ci0j2q7smy";
+
rev = "15ef997d4d683afb4b1ee641d47980972445b61f";
+
sha256 = "09cm7wzl4gkb6whlfsprap1jd22f1yfp9wykw1aygj0zc5k6a106";
fetchSubmodules = true;
};
};
···
repo = "ferret";
rev = "f6d7d01de8a92baee83218001c0bdbade8458a72";
sha256 = "1zsh7yc2mv1hv6gj7bhzbx4qqmasc32sxsdlh4sz95nxsfnk28dr";
+
};
+
};
+
+
file-line = buildVimPluginFrom2Nix {
+
pname = "file-line";
+
version = "2016-10-21";
+
src = fetchFromGitHub {
+
owner = "bogado";
+
repo = "file-line";
+
rev = "559088afaf10124ea663ee0f4f73b1de48fb1632";
+
sha256 = "1w183g0hj8jvzm6m1jw7m6xz3x1dld8n8342vnycsh6hyzdcg3mg";
};
};
···
};
};
+
ir_black = buildVimPluginFrom2Nix {
+
pname = "ir_black";
+
version = "2012-03-05";
+
src = fetchFromGitHub {
+
owner = "twerth";
+
repo = "ir_black";
+
rev = "4e45f1cbcc9c04cf32c8681c6b3b4534a33610ed";
+
sha256 = "13g9nqlqsjsxnrq37y33ldh41dw9q9dw07spfi7qwrskiwa0ayk7";
+
};
+
};
+
jdaddy-vim = buildVimPluginFrom2Nix {
pname = "jdaddy-vim";
version = "2014-02-22";
···
julia-vim = buildVimPluginFrom2Nix {
pname = "julia-vim";
-
version = "2019-05-21";
+
version = "2019-06-26";
src = fetchFromGitHub {
owner = "JuliaEditorSupport";
repo = "julia-vim";
-
rev = "6468c3d4f9ee9c32c9e84c5a8743bff8cb429f45";
-
sha256 = "18qn0xdxf2ax9qnzib5gbpws1h0gmwfmwalhpismkbwnm8cswipk";
+
rev = "072e4861412e841d308aabc928112ccaedf07135";
+
sha256 = "1250a011mib5na5c769x2djjyz3rwhcdw80rmkvzv1xy7crxf5xn";
+
};
+
};
+
+
LanguageClient-neovim = buildVimPluginFrom2Nix {
+
pname = "LanguageClient-neovim";
+
version = "2018-08-07";
+
src = fetchFromGitHub {
+
owner = "autozimu";
+
repo = "LanguageClient-neovim";
+
rev = "dd45e31449511152f2127fe862d955237caa130f";
+
sha256 = "1i1c98r9fg1mzyl15b3grk6v7s7frwadh86rr1ggz7aq1gwfy7dq";
};
};
···
};
};
+
lh-brackets = buildVimPluginFrom2Nix {
+
pname = "lh-brackets";
+
version = "2019-05-23";
+
src = fetchFromGitHub {
+
owner = "LucHermitte";
+
repo = "lh-brackets";
+
rev = "f3240c3782a97720e9a344b5bd5f6808e156722b";
+
sha256 = "1qyh58xxp6hh86bykk17934pgg72q7xfsngrhrrr3cxb8jpnmx7z";
+
};
+
};
+
+
lh-vim-lib = buildVimPluginFrom2Nix {
+
pname = "lh-vim-lib";
+
version = "2019-05-24";
+
src = fetchFromGitHub {
+
owner = "LucHermitte";
+
repo = "lh-vim-lib";
+
rev = "113fe7d485a484471b0f8c78cea9acc897728661";
+
sha256 = "1fp3i8mbsb361f5llfxhdryymdzzb4b53sh6gsv49axg34sx4i53";
+
};
+
};
+
+
lightline-ale = buildVimPluginFrom2Nix {
+
pname = "lightline-ale";
+
version = "2018-06-12";
+
src = fetchFromGitHub {
+
owner = "maximbaz";
+
repo = "lightline-ale";
+
rev = "dd59077f9537b344f7ae80f713c1e4856ec1520c";
+
sha256 = "1f9v6nsksy36s5i27nfx6vmyfyjk27p2w2g6x25cw56b0r3sgxmx";
+
};
+
};
+
lightline-vim = buildVimPluginFrom2Nix {
pname = "lightline-vim";
version = "2019-06-12";
···
neomake = buildVimPluginFrom2Nix {
pname = "neomake";
-
version = "2019-06-18";
+
version = "2019-06-28";
src = fetchFromGitHub {
owner = "neomake";
repo = "neomake";
-
rev = "17f199f69fc9c4f93672293fdc2713e5c33987c2";
-
sha256 = "1mvk3v0z7xffn2rigzj8fab4rdvlj9chfwmrshri0i9hza8kp1za";
+
rev = "43007dac3e4c761caee7a5d8c74172da2af08ea6";
+
sha256 = "1bxz0czckmc2cw7kh8cd1rcg0sg2pj7vjdlgwd0bmqr6x9xarp0d";
};
};
neomru-vim = buildVimPluginFrom2Nix {
pname = "neomru-vim";
-
version = "2019-05-30";
+
version = "2019-06-30";
src = fetchFromGitHub {
owner = "Shougo";
repo = "neomru.vim";
-
rev = "57f89922ee03529b34334a82fa502be0e2a26d86";
-
sha256 = "0lx5g9wyjdq99lnmfm1hmi7n62m0gg5kx9m40x2kgx5x5fdnldhy";
+
rev = "53f9cd784b78839e865cabc43f6a7efacc4c8cad";
+
sha256 = "05xss5546n1pinhh1bpp4gmsxjbmdlp08lpzxrrq4gkyqddxdkqd";
};
};
···
nerdtree = buildVimPluginFrom2Nix {
pname = "nerdtree";
-
version = "2019-06-20";
+
version = "2019-06-27";
src = fetchFromGitHub {
owner = "scrooloose";
repo = "nerdtree";
-
rev = "33fe2fdf16a95c12e8284364c780ed405dbaad17";
-
sha256 = "01w3a6wkfjg55n27flsv3v0z0aav09nhwm70n2wfb25hgbqkcqxd";
+
rev = "1c803b36f632c151c755456b68101153f407ec5e";
+
sha256 = "1393xzf1j05rspyajbb8k91wp4v23xlj6lzjjqb9rjj032z1i1d1";
};
};
···
onehalf = buildVimPluginFrom2Nix {
pname = "onehalf";
-
version = "2019-06-21";
+
version = "2019-06-26";
src = fetchFromGitHub {
owner = "sonph";
repo = "onehalf";
-
rev = "da0ca0b0036f2e9afe1a25592cd1ac41cce61112";
-
sha256 = "0mrv6gmqfqc6lwnwhw788n6lpf36lwbwksbzw0l87rwj104ima9d";
+
rev = "408104a30ae4f220096e591350a72e60cc15f9b3";
+
sha256 = "0jyf8cri6d1s4pragarz02ma8kvxphlblp4i70f12z1yiazykzh2";
};
};
···
rust-vim = buildVimPluginFrom2Nix {
pname = "rust-vim";
-
version = "2019-06-06";
+
version = "2019-06-29";
src = fetchFromGitHub {
owner = "rust-lang";
repo = "rust.vim";
-
rev = "6d6c410d5997bda6b9de065049636be4ad3682f4";
-
sha256 = "1aq66v5j8fckq1bszs793z43fgkrss4w1p44k0x98zx7prx5z5lw";
+
rev = "de998a2014c997d6f8f749a9be195f1cd51aa9c0";
+
sha256 = "0fx9j0l8fjb54c7b1pzwypkmvr3sx39x5wpjbxkwa8a916nlylq2";
};
};
···
};
};
+
sky-color-clock-vim = buildVimPluginFrom2Nix {
+
pname = "sky-color-clock-vim";
+
version = "2018-11-03";
+
src = fetchFromGitHub {
+
owner = "mopp";
+
repo = "sky-color-clock.vim";
+
rev = "9d4232cc249083f3c5d2eb4e2848e491b52df4ca";
+
sha256 = "1ln50rahb177vilzr4zc7v9znm8xfid1v8gddl83gr9srdbn2bbz";
+
};
+
};
+
sourcemap-vim = buildVimPluginFrom2Nix {
pname = "sourcemap-vim";
version = "2012-09-19";
···
SpaceCamp = buildVimPluginFrom2Nix {
pname = "SpaceCamp";
-
version = "2019-06-13";
+
version = "2019-06-26";
src = fetchFromGitHub {
owner = "jaredgorski";
repo = "SpaceCamp";
-
rev = "e2503139a55f4c2631cca64feb596b44d5b88f73";
-
sha256 = "0zaa2dcgynwbhybyq3i3i9pxdz4hk2q3g0s48vm27sywr2kdzw63";
+
rev = "f0c31ff9e0b5359c43cfd33820f2b4790d94b1d8";
+
sha256 = "08kbcmqjr383sh8h7p1fwav72lvncx78c0zq0b72prbvfw8pfq5c";
};
};
···
};
};
+
tcomment_vim = buildVimPluginFrom2Nix {
+
pname = "tcomment_vim";
+
version = "2019-04-28";
+
src = fetchFromGitHub {
+
owner = "tomtom";
+
repo = "tcomment_vim";
+
rev = "622cc0551bef87a3dfb2846cb339412eeb8ef133";
+
sha256 = "0zd23520hn5lflcz2jpi22x13kvmy6ry7qqzbi438xyw4j4gwpfs";
+
};
+
};
+
tender-vim = buildVimPluginFrom2Nix {
pname = "tender-vim";
version = "2019-06-15";
···
};
};
+
vim-bufkill = buildVimPluginFrom2Nix {
+
pname = "vim-bufkill";
+
version = "2018-03-20";
+
src = fetchFromGitHub {
+
owner = "qpkorr";
+
repo = "vim-bufkill";
+
rev = "795dd38f3cff69d0d8fe9e71847907e200860959";
+
sha256 = "1nji86vjjbfjw4xy52yazq53hrlsr7v30xkx2awgiakz7ih0bdxa";
+
};
+
};
+
vim-choosewin = buildVimPluginFrom2Nix {
pname = "vim-choosewin";
version = "2018-06-11";
···
vim-cursorword = buildVimPluginFrom2Nix {
pname = "vim-cursorword";
-
version = "2017-10-19";
+
version = "2019-06-28";
src = fetchFromGitHub {
owner = "itchyny";
repo = "vim-cursorword";
-
rev = "4878d6185b99131c5f610cc6ad0e223439ac4601";
-
sha256 = "170nf0w7i5k3cr72dkvraq2p0lzsvb3cmdvslyz7cmxnz611n6bf";
+
rev = "c35c5e686769db02bb9ccf30cc21fc13786f7f14";
+
sha256 = "1115j8ch1p6q5x3y85pmdgib7ya0m0j8j52gblh0mlw823zf3lrf";
};
};
···
vim-devicons = buildVimPluginFrom2Nix {
pname = "vim-devicons";
-
version = "2019-06-23";
+
version = "2019-06-30";
src = fetchFromGitHub {
owner = "ryanoasis";
repo = "vim-devicons";
-
rev = "793fda61101f02fed05d30d606671f9b933452fb";
-
sha256 = "0x04rh5jy82g7q7im4lvlh1akz4jl3l5swc3xv82saxymzycpgyw";
+
rev = "4ba84019a5d4c10e01eff62089c7385a39af3be5";
+
sha256 = "0i0wdkhzpmhk6x08xgybc4l0fmlqyqn0ximhyzcxxqafmkv448ap";
};
};
···
vim-dispatch = buildVimPluginFrom2Nix {
pname = "vim-dispatch";
-
version = "2019-06-21";
+
version = "2019-06-30";
src = fetchFromGitHub {
owner = "tpope";
repo = "vim-dispatch";
-
rev = "219df23e822206a25e7c40bf4329774aa19f7732";
-
sha256 = "1f7dvdl8wz6g4ikz5gx6rdhxyvcf4z9y0axzlkljs2ixmr48sxbr";
+
rev = "a625661cd1d35b454c9b2a9452dbfec46c4d3e17";
+
sha256 = "1v7qjslkyrrpbb780j1450piv5jb02qbidfh0863g615hz2mbnni";
};
};
···
vim-elixir = buildVimPluginFrom2Nix {
pname = "vim-elixir";
-
version = "2019-05-14";
+
version = "2019-06-27";
src = fetchFromGitHub {
owner = "elixir-lang";
repo = "vim-elixir";
-
rev = "38e8bbfd0019033ae53d623e3fd1d9cf6ec2d335";
-
sha256 = "1mbgks1460vm8sl2hkag6hrsvbf9gfvdlswqr5hh8hy3laylh6qf";
+
rev = "a219dc1f702e581878f51746c4c31b8b4805aa4e";
+
sha256 = "1bw8i3nvqwrb8d0dbsz53jy3pvcx7kwz48xy7b9sslrhkf4llwpn";
};
};
···
vim-fireplace = buildVimPluginFrom2Nix {
pname = "vim-fireplace";
-
version = "2019-06-23";
+
version = "2019-06-30";
src = fetchFromGitHub {
owner = "tpope";
repo = "vim-fireplace";
-
rev = "e78995b7fc93357c86f66d78b65803e473b8e356";
-
sha256 = "05wbnpqpd65vyvaq5maxaq06dcc5k6z5hc7hbk82slm52avk92lm";
+
rev = "7c8008bfb7d1b1d380252bd115368d4344aef804";
+
sha256 = "10z8xcrf7dx327kiyv6fxkw3fb72c7j5n7qaa8mcapmz9nb2ffz2";
};
};
···
};
};
+
vim-flutter = buildVimPluginFrom2Nix {
+
pname = "vim-flutter";
+
version = "2019-06-23";
+
src = fetchFromGitHub {
+
owner = "thosakwe";
+
repo = "vim-flutter";
+
rev = "8d7a9158cca84c4ea2a5ebc066607652fab7a9e8";
+
sha256 = "0kjr7nlqkkzlvh6p9j996bbcgd0frakla591y4ln12qwa7ys0gd1";
+
};
+
};
+
vim-ft-diff_fold = buildVimPluginFrom2Nix {
pname = "vim-ft-diff_fold";
version = "2013-02-10";
···
vim-fugitive = buildVimPluginFrom2Nix {
pname = "vim-fugitive";
-
version = "2019-06-08";
+
version = "2019-07-01";
src = fetchFromGitHub {
owner = "tpope";
repo = "vim-fugitive";
-
rev = "6d42c7df44aa20252e5dac747c3ac9fa7450b21b";
-
sha256 = "002s7jsn8m4h98hpbcblhmxywsyxgajz23wm3w96awqqz4chrp0i";
+
rev = "17618402fa793d347d60540b9caf84210128ad49";
+
sha256 = "14algrw25l8fhvmk4lclpw3h1nklqmdkpwjsgci4775ihi9cdlyi";
};
};
···
vim-gitgutter = buildVimPluginFrom2Nix {
pname = "vim-gitgutter";
-
version = "2019-06-19";
+
version = "2019-07-01";
src = fetchFromGitHub {
owner = "airblade";
repo = "vim-gitgutter";
-
rev = "8aac968f1a617cc1c346707242af181e6b1f467e";
-
sha256 = "1vvixwlsnsxhrsz0dqg2i0s6a0xdpp60x0592gakjwihzplg4yp5";
+
rev = "91471746fe687ee867877508dfd809460dab5698";
+
sha256 = "0pbjvflhynzanb0hp5yyfiwpsnvv6ndnnrbmxdxk7iqjrc8765km";
};
};
···
vim-go = buildVimPluginFrom2Nix {
pname = "vim-go";
-
version = "2019-06-13";
+
version = "2019-06-30";
src = fetchFromGitHub {
owner = "fatih";
repo = "vim-go";
-
rev = "b6a0bde7d4c64a063ea1b6365e3dd24e2d4f4df1";
-
sha256 = "1lnwp4qqbzl6cwy75hhkafnppv2pgbaw2lf5fpbprwyd5aa5qh1q";
+
rev = "c67d72c476ff08bd631588429ef47d0aee75af27";
+
sha256 = "0x717yj7xmc2i8ahaxpzsnyx5ig012x70jysc73yrnwiasrhjim4";
};
};
···
vim-javascript = buildVimPluginFrom2Nix {
pname = "vim-javascript";
-
version = "2019-04-16";
+
version = "2019-06-24";
src = fetchFromGitHub {
owner = "pangloss";
repo = "vim-javascript";
-
rev = "ee445807a71ee6933cd6cbcd74940bc288815793";
-
sha256 = "0x4cscpfll8m7f9hvx4fjxff5vscz4kzvs14ai1sdg75b6dngxl0";
+
rev = "8a599c5e84bb064e2345867332ecbcc252e3b04a";
+
sha256 = "1hyn592812hav4n7g488ysmrqw0c2bjkwvfwkzz9xpwj1v25f2yl";
};
};
···
vim-ledger = buildVimPluginFrom2Nix {
pname = "vim-ledger";
-
version = "2017-12-12";
+
version = "2019-07-01";
src = fetchFromGitHub {
owner = "ledger";
repo = "vim-ledger";
-
rev = "6eb3bb21aa979cc295d0480b2179938c12b33d0d";
-
sha256 = "0rbwyaanvl2bqk8xm4kq8fkv8y92lpf9xx5n8gw54iij7xxhnj01";
+
rev = "0068e6fd36fbb13b6a9852fc91514df21b5bfb8b";
+
sha256 = "0rff0fd93jlzfq8afjil4qqqg1sga3r7lwqhwgia7xl6mbg7swj8";
};
};
···
vim-lsc = buildVimPluginFrom2Nix {
pname = "vim-lsc";
-
version = "2019-06-23";
+
version = "2019-06-25";
src = fetchFromGitHub {
owner = "natebosch";
repo = "vim-lsc";
-
rev = "57f6e1aaed6a89054335b71aac89be9a607faad3";
-
sha256 = "04mfxpszngmqw052h3yb9iq0xj95fg38jr8x7jqxdpgr3i5c5z9r";
+
rev = "c491351fcfdb58d36da739912701d7132a33110e";
+
sha256 = "1wvz493dk011kk113ml82vysr76zfarqrlk0v03hh9la33h23mh6";
};
};
···
vim-multiple-cursors = buildVimPluginFrom2Nix {
pname = "vim-multiple-cursors";
-
version = "2019-03-25";
+
version = "2019-06-26";
src = fetchFromGitHub {
owner = "terryma";
repo = "vim-multiple-cursors";
-
rev = "8cb8e83ffb040f25cefa597f21608ca6a64aed70";
-
sha256 = "1mdi0kbc1k4q8mw8f4anl819mgsll1sj38dd2w1a1lscg179j062";
+
rev = "730a11cee6deedc6f4ccc02e2c1d990f8629da25";
+
sha256 = "1m21bjdkah5b7pw5nl5r6lvj1dl4l7yhz05hwzhy43a31nbba2y3";
};
};
···
vim-pandoc-syntax = buildVimPluginFrom2Nix {
pname = "vim-pandoc-syntax";
-
version = "2019-05-16";
+
version = "2019-06-25";
src = fetchFromGitHub {
owner = "vim-pandoc";
repo = "vim-pandoc-syntax";
-
rev = "14c778e5bf069a1f13a4645aa8a34e1b46c980a8";
-
sha256 = "1a66f0shycqkl1329lgbvrbbzwdv8pgi9d8zaybw9jddn64rx9r7";
+
rev = "6710d46c8b772f77248f30d650c83f90c68f37ab";
+
sha256 = "1dir9h6s63lr10ffaxlpjar0xfmmjr3nhhgijsaa0vgnghc00r7x";
};
};
···
vim-polyglot = buildVimPluginFrom2Nix {
pname = "vim-polyglot";
-
version = "2019-06-16";
+
version = "2019-07-01";
src = fetchFromGitHub {
owner = "sheerun";
repo = "vim-polyglot";
-
rev = "d52700284984ada048ce325404dfa25237271ba1";
-
sha256 = "15ddnf9l9iqqwz8b0k6kpciv2qaqwr4s1k7klbc9qj8r254ys699";
+
rev = "3ddca5da461ebfaa82104f82e3cbf19d1c326ade";
+
sha256 = "0f3l0sknj4zbgmk7yx028f2qz72gdh1lnqra96c2n3xszpdvim22";
};
};
···
vim-rhubarb = buildVimPluginFrom2Nix {
pname = "vim-rhubarb";
-
version = "2019-04-24";
+
version = "2019-06-27";
src = fetchFromGitHub {
owner = "tpope";
repo = "vim-rhubarb";
-
rev = "70713ca031f882bd13ac7ffb163fb7e7a0a52b0c";
-
sha256 = "10x1n5jrrmw01rqh0qnyyx7f9l5qmzhfby8gkd5vpjx84kpabzqs";
+
rev = "c509c7eedeea641f5b0bdae708581ff610fbff5b";
+
sha256 = "19zhhnlrnkgsxacykck9q19rhk4gj31qjj6i4sl6bzi086kmf0z9";
};
};
···
vim-scala = buildVimPluginFrom2Nix {
pname = "vim-scala";
-
version = "2019-01-21";
+
version = "2019-06-24";
src = fetchFromGitHub {
owner = "derekwyatt";
repo = "vim-scala";
-
rev = "971ac9ab3fe945105ef88587cfe5273fa2c8e988";
-
sha256 = "0n28k3c2jyb4af0ql2sm3ngkcyvd4684c95j5yfvs7jjsvjibqcb";
+
rev = "bbdfea4b98fdb8866a8a6060ec1294643cfeb413";
+
sha256 = "14q8j6vwqad2nwia29d0844v2zdcx04xn9dyicv13sdpivzcm4rb";
};
};
···
};
};
+
vim-sourcetrail = buildVimPluginFrom2Nix {
+
pname = "vim-sourcetrail";
+
version = "2018-06-26";
+
src = fetchFromGitHub {
+
owner = "CoatiSoftware";
+
repo = "vim-sourcetrail";
+
rev = "0fd679321ce51f65a37d04e4ea9031be6eaed85d";
+
sha256 = "1xgvvmah3zn22rjaa093vghwrchmpm5wj30lwwl6h398dyywz8bg";
+
};
+
};
+
vim-speeddating = buildVimPluginFrom2Nix {
pname = "vim-speeddating";
version = "2019-02-27";
···
vim-test = buildVimPluginFrom2Nix {
pname = "vim-test";
-
version = "2019-06-01";
+
version = "2019-06-25";
src = fetchFromGitHub {
owner = "janko-m";
repo = "vim-test";
-
rev = "965704531f09988c7cde6e572741b408015ef4ff";
-
sha256 = "1y4ypg39fh8ys2mqmm2d7xqvq5zjs5x4xjyrn5nazmn5snbvgi86";
+
rev = "3507d31dccde27ea27e2858e00784d5be18565f4";
+
sha256 = "0ap9bbk0qa3cz1rxykgrd5hv582av2n36x6s52awg90d4hx37inp";
+
};
+
};
+
+
vim-textobj-comment = buildVimPluginFrom2Nix {
+
pname = "vim-textobj-comment";
+
version = "2014-04-11";
+
src = fetchFromGitHub {
+
owner = "glts";
+
repo = "vim-textobj-comment";
+
rev = "58ae4571b76a5bf74850698f23d235eef991dd4b";
+
sha256 = "00wc14chwjfx95gl3yzbxm1ajx88zpzqz0ckl7xvd7gvkrf0mx04";
+
};
+
};
+
+
vim-textobj-function = buildVimPluginFrom2Nix {
+
pname = "vim-textobj-function";
+
version = "2014-05-03";
+
src = fetchFromGitHub {
+
owner = "kana";
+
repo = "vim-textobj-function";
+
rev = "adb50f38499b1f558cbd58845e3e91117e4538cf";
+
sha256 = "0cwl102si9zhhhpg6c0fjnyq35v6bl5f34p2s7b47isxdn0qvris";
};
};
···
repo = "vim-textobj-multiblock";
rev = "670a5ba57d73fcd793f480e262617c6eb0103355";
sha256 = "1s71hdr73cl8yg9mrdflvzrdccpiv7qrlainai7gqw30r1hfhfzf";
+
};
+
};
+
+
vim-textobj-user = buildVimPluginFrom2Nix {
+
pname = "vim-textobj-user";
+
version = "2018-11-19";
+
src = fetchFromGitHub {
+
owner = "kana";
+
repo = "vim-textobj-user";
+
rev = "074ce2575543f790290b189860597a3dcac1f79d";
+
sha256 = "15wnqkxjjksgn8a7d3lkbf8d97r4w159bajrcf1adpxw8hhli1vc";
};
};
···
vim-unimpaired = buildVimPluginFrom2Nix {
pname = "vim-unimpaired";
-
version = "2019-03-21";
+
version = "2019-06-29";
src = fetchFromGitHub {
owner = "tpope";
repo = "vim-unimpaired";
-
rev = "e77923053fbce11323194ed04113b8d966be959c";
-
sha256 = "1cka410c94wa6mz0pr4m8n9j7s9jhqnw513479pkmzx435ffb6ak";
+
rev = "a49c4f2bf05f18a6e4f6572a19763ba7abba52b1";
+
sha256 = "0ivybshm1dvlqsbh153a3fq3dhwj144x049l78ss7zrqnbb70jsw";
};
};
···
src = fetchFromGitHub {
owner = "mg979";
repo = "vim-visual-multi";
-
rev = "8b1db5d83f1bc04f9e08fd5c57d84323e9007435";
-
sha256 = "0g6b9grd7j1p9rhbb56lvwvv90j9l0cqfsslxyrn9fwxwgkbiis0";
+
rev = "c91e356a33569bc39bb01392362b8747355b356e";
+
sha256 = "07xm2289932j7lrxaf1gx3rxbzx4f059mkx78chj915pndx72q33";
};
};
···
vim-wakatime = buildVimPluginFrom2Nix {
pname = "vim-wakatime";
-
version = "2019-05-08";
+
version = "2019-06-24";
src = fetchFromGitHub {
owner = "wakatime";
repo = "vim-wakatime";
-
rev = "40dbc1643088c0b677857cf7eae9354540b5e955";
-
sha256 = "17df8h7jgkl1q6p2g3328mnd21gvfcjks7zpbr8r5qzbyrm1pl5v";
+
rev = "7a544c979ed52042c67a4189687ac53c853f109c";
+
sha256 = "04n2hgyyiq4q9abcj867q30m4vhfz50gxwdvjj3844ppn104smsa";
};
};
···
vimtex = buildVimPluginFrom2Nix {
pname = "vimtex";
-
version = "2019-06-22";
+
version = "2019-07-01";
src = fetchFromGitHub {
owner = "lervag";
repo = "vimtex";
-
rev = "4240669fbb31f9bab15abe5e41a8d5a11f3d4ccb";
-
sha256 = "1yldk7pms48d6f82q547r2vy6xb8fa0c2s6f8mp0riwiypiaqj6l";
+
rev = "650b06020043a1b66aac3e478e620b40a2346d97";
+
sha256 = "1qimr20ima638f0s40xpap5hkr6h0fwp7cjfbbgv11njr0dmfzlc";
};
};
···
youcompleteme = buildVimPluginFrom2Nix {
pname = "youcompleteme";
-
version = "2019-06-02";
+
version = "2019-06-29";
src = fetchFromGitHub {
owner = "valloric";
repo = "youcompleteme";
-
rev = "59eea79da8acaf4cd01631b15d6c762f9b9bdb14";
-
sha256 = "1v8ich33j2rxifilpzzgj4pw6wnj3ra4rd8mc3m0yy7jrnhzcr13";
+
rev = "d556a43c1af6a4e4075e875934e250f589df0dee";
+
sha256 = "05vl8gri43k8psjmhaybhm27ycm8hdgrdaqcy89sznpww5lm1nx8";
fetchSubmodules = true;
};
};
+22 -5
pkgs/misc/vim-plugins/vim-plugin-names
···
ap/vim-css-color
arcticicestudio/nord-vim
artur-shaik/vim-javacomplete2
+
autozimu/LanguageClient-neovim
bazelbuild/vim-bazel
bbchung/clighter8
benmills/vimux
···
bitc/vim-hdevtools
bkad/camelcasemotion
bling/vim-bufferline
+
bogado/file-line
bronson/vim-trailing-whitespace
brooth/far.vim
carlitux/deoplete-ternjs
···
chriskempson/base16-vim
christoomey/vim-sort-motion
christoomey/vim-tmux-navigator
+
CoatiSoftware/vim-sourcetrail
cocopon/iceberg.vim
ctjhoa/spacevim
ctrlpvim/ctrlp.vim
+
dag/vim-fish
dag/vim2hs
-
dag/vim-fish
dannyob/quickfixstatus
+
dart-lang/dart-vim-plugin
davidhalter/jedi-vim
+
deoplete-plugins/deoplete-jedi
derekelkins/agda-vim
derekwyatt/vim-scala
dhruvasagar/vim-table-mode
···
floobits/floobits-neovim
frigoeu/psc-ide-vim
garbas/vim-snipmate
+
glts/vim-textobj-comment
gmarik/vundle
godlygeek/csapprox
godlygeek/tabular
···
kana/vim-operator-replace
kana/vim-operator-user
kana/vim-tabpagecd
+
kana/vim-textobj-function
+
kana/vim-textobj-user
kassio/neoterm
kchmck/vim-coffee-script
KeitaNakamura/neodark.vim
···
lervag/vimtex
lfilho/cosco.vim
LnL7/vim-nix
+
LucHermitte/lh-vim-lib
+
LucHermitte/lh-brackets
ludovicchabant/vim-gutentags
ludovicchabant/vim-lawrencium
lukaszkorecki/workflowish
···
mattn/emmet-vim
mattn/gist-vim
mattn/webapi-vim
+
maximbaz/lightline-ale
mbbill/undotree
megaannum/forms
megaannum/self
···
mileszs/ack.vim
mindriot101/vim-yapf
mkasa/lushtags
+
mopp/sky-color-clock.vim
morhetz/gruvbox
motus/pig.vim
mpickering/hlint-refactor-vim
···
neoclide/coc.nvim
neoclide/vim-easygit
neomake/neomake
+
neovim/nvimdev.nvim
neovimhaskell/haskell-vim
neovimhaskell/nvim-hs.vim
-
neovim/nvimdev.nvim
neutaaaaan/iosvkem
nixprime/cpsm
NLKNguyen/papercolor-theme
···
powerman/vim-plugin-AnsiEsc
PProvost/vim-ps1
python-mode/python-mode
+
qpkorr/vim-bufkill
Quramy/tsuquyomi
racer-rust/vim-racer
rafaqz/ranger.vim
···
Shougo/context_filetype.vim
Shougo/denite.nvim
Shougo/deol.nvim
+
Shougo/deoplete-lsp
Shougo/deoplete.nvim
Shougo/echodoc.vim
Shougo/neco-syntax
···
thinca/vim-scouter
thinca/vim-themis
thinca/vim-visualstar
+
thosakwe/vim-flutter
tomasr/molokai
tomlion/vim-solidity
tommcdo/vim-lion
+
tomtom/tcomment_vim
tomtom/tlib_vim
tpope/vim-abolish
tpope/vim-commentary
···
tpope/vim-vinegar
travitch/hasksyn
troydm/zoomwintab.vim
+
twerth/ir_black
twinside/vim-haskellconceal
Twinside/vim-hoogle
tyru/caw.vim
···
vhda/verilog_systemverilog.vim
vim-airline/vim-airline
vim-airline/vim-airline-themes
-
vimoutliner/vimoutliner
vim-pandoc/vim-pandoc
vim-pandoc/vim-pandoc-after
vim-pandoc/vim-pandoc-syntax
vim-ruby/vim-ruby
+
vim-scripts/a.vim
vim-scripts/align
vim-scripts/argtextobj.vim
vim-scripts/autoload_cscope.vim
-
vim-scripts/a.vim
vim-scripts/bats.vim
vim-scripts/changeColorScheme.vim
vim-scripts/Colour-Sampler-Pack
+
vim-scripts/DoxygenToolkit.vim
vim-scripts/emodeline
vim-scripts/Improved-AnsiEsc
vim-scripts/jdaddy.vim
···
vim-scripts/wombat256.vim
vim-scripts/YankRing.vim
vim-utils/vim-husk
+
vimoutliner/vimoutliner
vimwiki/vimwiki
vmchale/dhall-vim
w0rp/ale
···
zah/nim.vim
zchee/deoplete-clang
zchee/deoplete-go
-
zchee/deoplete-jedi
zig-lang/zig.vim
+11 -4
pkgs/os-specific/linux/hostapd/default.nix
···
{ stdenv, fetchurl, pkgconfig, libnl, openssl, sqlite ? null }:
-
with stdenv.lib;
stdenv.mkDerivation rec {
name = "hostapd-${version}";
version = "2.8";
···
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ libnl openssl sqlite ];
+
patches = [
+
(fetchurl {
+
# Note: fetchurl seems to be unhappy with openwrt git
+
# server's URLs containing semicolons. Using the github mirror instead.
+
url = "https://raw.githubusercontent.com/openwrt/openwrt/master/package/network/services/hostapd/patches/300-noscan.patch";
+
sha256 = "04wg4yjc19wmwk6gia067z99gzzk9jacnwxh5wyia7k5wg71yj5k";})
+
];
+
outputs = [ "out" "man" ];
extraConfig = ''
···
CONFIG_INTERNETWORKING=y
CONFIG_HS20=y
CONFIG_ACS=y
-
'' + optionalString (sqlite != null) ''
+
'' + stdenv.lib.optionalString (sqlite != null) ''
CONFIG_SQLITE=y
'';
···
install -vD hostapd_cli.1 -t $man/share/man/man1
'';
-
meta = {
+
meta = with stdenv.lib; {
homepage = http://hostap.epitest.fi;
repositories.git = git://w1.fi/hostap.git;
description = "A user space daemon for access point and authentication servers";
license = licenses.gpl2;
-
maintainers = with maintainers; [ phreedom ];
+
maintainers = with maintainers; [ phreedom ninjatrappeur ];
platforms = platforms.linux;
};
}
+22
pkgs/os-specific/linux/iproute/mptcp.nix
···
+
{ stdenv, iproute, fetchFromGitHub }:
+
+
iproute.overrideAttrs (oa: rec {
+
pname = "iproute_mptcp";
+
version = "0.95";
+
+
src = fetchFromGitHub {
+
owner = "multipath-tcp";
+
repo = "iproute-mptcp";
+
rev = "mptcp_v${version}";
+
sha256 = "07fihvwlaj0ng8s8sxqhd0a9h1narcnp4ibk88km9cpsd32xv4q3";
+
};
+
+
meta = with stdenv.lib; {
+
homepage = https://github.com/multipath-tcp/iproute-mptcp;
+
description = "IP-Route extensions for MultiPath TCP";
+
license = licenses.gpl2;
+
platforms = platforms.linux;
+
maintainers = with maintainers; [ teto ];
+
priority = 2;
+
};
+
})
+2 -2
pkgs/os-specific/linux/kernel/linux-4.14.nix
···
with stdenv.lib;
buildLinux (args // rec {
-
version = "4.14.130";
+
version = "4.14.131";
# modDirVersion needs to be x.y.z, will automatically add .0 if needed
modDirVersion = if (modDirVersionArg == null) then concatStrings (intersperse "." (take 3 (splitString "." "${version}.0"))) else modDirVersionArg;
···
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
-
sha256 = "0najfj0m8s61hjyag4ll6bvv1y4d03dbgm137fmvfq4szx891ji9";
+
sha256 = "1xcg7ij3r6271qmcymaxprqa8qvdddkh5f8m6gza3agl61641xhr";
};
} // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-4.4.nix
···
{ stdenv, buildPackages, fetchurl, perl, buildLinux, ... } @ args:
buildLinux (args // rec {
-
version = "4.4.183";
+
version = "4.4.184";
extraMeta.branch = "4.4";
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
-
sha256 = "10ic3ldn3p95y0qrl91j5kjqjp18k30xvpgw7mmc1g7lgi2r8j2h";
+
sha256 = "1jn3mwnfcvhnn0bqiyabkqii3rd6w5b982w3i085qj42q0pj6hv5";
};
} // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-4.9.nix
···
{ stdenv, buildPackages, fetchurl, perl, buildLinux, ... } @ args:
buildLinux (args // rec {
-
version = "4.9.183";
+
version = "4.9.184";
extraMeta.branch = "4.9";
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
-
sha256 = "1wv753a9z99nvvw881j6fxd6imk88xm3aq626gly5x6v3jcv0mzx";
+
sha256 = "1bwzmmpc7k9n7p2s383pipdjc3hvqfbbacaxk7gdw9856pai8c83";
};
} // (args.argsOverride or {}))
+8 -4
pkgs/os-specific/linux/kernel/linux-testing.nix
···
-
{ stdenv, buildPackages, fetchurl, perl, buildLinux, libelf, utillinux, ... } @ args:
+
{ stdenv, buildPackages, fetchurl, perl, buildLinux, modDirVersionArg ? null, ... } @ args:
+
+
with stdenv.lib;
buildLinux (args // rec {
-
version = "5.2-rc6";
-
modDirVersion = "5.2.0-rc6";
+
version = "5.2-rc7";
extraMeta.branch = "5.2";
+
# modDirVersion needs to be x.y.z, will always add .0
+
modDirVersion = if (modDirVersionArg == null) then builtins.replaceStrings ["-"] [".0-"] version else modDirVersionArg;
+
src = fetchurl {
url = "https://git.kernel.org/torvalds/t/linux-${version}.tar.gz";
-
sha256 = "15lwy9596v5sw8c6mhpl9ilfcmm39snvvyajg08ycsg61i2s58v0";
+
sha256 = "1128jb1y4gia5icv614ycp3c5mkvrb2l2wn20765b3si256g68n4";
};
# Should the testing kernels ever be built on Hydra?
+33
pkgs/os-specific/linux/linuxptp/default.nix
···
+
{ stdenv, fetchurl, linuxHeaders } :
+
+
+
stdenv.mkDerivation rec {
+
pname = "linuxptp";
+
version = "2.0";
+
+
src = fetchurl {
+
url = "mirror://sourceforge/linuxptp/${pname}-${version}.tgz";
+
sha256 = "0zcw8nllla06451r7bfsa31q4z8jj56j67i07l1azm473r0dj90a";
+
};
+
+
postPatch = ''
+
substituteInPlace incdefs.sh --replace \
+
'/usr/include/linux/' "${linuxHeaders}/include/linux/"
+
'';
+
+
makeFlags = [ "prefix=" ];
+
+
preInstall = ''
+
export DESTDIR=$out
+
'';
+
+
enableParallelBuilding = true;
+
+
meta = with stdenv.lib; {
+
description = "Implementation of the Precision Time Protocol (PTP) according to IEEE standard 1588 for Linux";
+
homepage = "http://linuxptp.sourceforge.net/";
+
maintainers = [ maintainers.markuskowa ];
+
license = licenses.gpl2;
+
platforms = platforms.linux;
+
};
+
}
+21
pkgs/os-specific/linux/net-tools/mptcp.nix
···
+
{ stdenv, nettools, fetchFromGitHub }:
+
+
nettools.overrideAttrs(oa: rec {
+
name = "net-tools-mptcp";
+
version = "0.95";
+
+
src = fetchFromGitHub {
+
owner = "multipath-tcp";
+
repo = "net-tools";
+
rev = "mptcp_v${version}";
+
sha256 = "0i7gr1y699nc7j9qllsx8kicqkpkhw51x4chcmyl5xs06b2mdjri";
+
};
+
+
meta = with stdenv.lib; {
+
homepage = https://github.com/multipath-tcp/net-tools;
+
description = "A set of tools for controlling the network subsystem in Linux";
+
license = licenses.gpl2Plus;
+
platforms = platforms.linux;
+
maintainers = with maintainers; [ teto ];
+
};
+
})
+2 -2
pkgs/os-specific/linux/nmon/default.nix
···
stdenv.mkDerivation rec {
name = "nmon-${version}";
-
version = "16j";
+
version = "16k";
src = fetchurl {
url = "mirror://sourceforge/nmon/lmon${version}.c";
-
sha256 = "05a6yc1w421r30qg32a8j0wajjv2ff1mwwsrariv3fz3ng4phf5s";
+
sha256 = "17nbxrnl7kqiaaxn2hwyi65gphbl3wybbyp9vri2q5ifdis3ssib";
};
buildInputs = [ ncurses ];
+7 -12
pkgs/os-specific/linux/nvidia-x11/default.nix
···
in
rec {
# Policy: use the highest stable version as the default (on our master).
-
stable = if stdenv.hostPlatform.system == "x86_64-linux" then stable_418 else legacy_390;
+
stable = if stdenv.hostPlatform.system == "x86_64-linux" then stable_430 else legacy_390;
# No active beta right now
-
beta = generic {
-
version = "430.14";
-
sha256_64bit = "05qgakc0sqv9zr6j4i49iqrd271nris8pmnv3l431r71ygx6zm00";
-
settingsSha256 = "1hh07258a6z0g8dl6mxrizdxqcgswv58r4rbamfhhwh9i42fpdgg";
-
persistencedSha256 = "1wmwmg9ma9rfx03s2qa249f0p7yf0lxdpiadab0raajk1lzlrrc8";
-
};
+
beta = stable;
-
stable_418 = generic {
-
version = "418.74";
-
sha256_64bit = "03qj42ppzkc9nphdr9zc12968bb8fc9cpcx5f66y29wnrgg3d1yw";
-
settingsSha256 = "15mbqdx5wyk7iq13kl2vd99lykpil618izwpi1kfldlabxdxsi9d";
-
persistencedSha256 = "0442qbby0r1b6l72wyw0b3iwvln6k20s6dn0zqlpxafnia9bvc8c";
+
stable_430 = generic {
+
version = "430.26";
+
sha256_64bit = "1rnfxl4dxa3jjidfdvfjmg1a8nc787ss15cakrp2wwrn8jlr9av6";
+
settingsSha256 = "0rjsj697s9jfls7iz1hs7aqp36ihf3l82yz1x1w9wdvlw94a3nym";
+
persistencedSha256 = "1n554i4g37hs49bb631x692ygfncn7a5hzb6mh9kx7hmv69yzazh";
};
# Last one supporting x86
+2 -2
pkgs/os-specific/linux/sysvinit/default.nix
···
{ stdenv, fetchurl, withoutInitTools ? false }:
-
let version = "2.94"; in
+
let version = "2.95"; in
stdenv.mkDerivation {
name = (if withoutInitTools then "sysvtools" else "sysvinit") + "-" + version;
src = fetchurl {
url = "mirror://savannah/sysvinit/sysvinit-${version}.tar.xz";
-
sha256 = "05wshfgrijp3pi9rpfsa0yx4w3bf5v6hlwjqw79nlhz53xjca2by";
+
sha256 = "1j46dydib9yd2a46w43is9b61lplwrsry46fw7cbmfrn7ywrq0n9";
};
prePatch = ''
+2 -2
pkgs/os-specific/linux/tomb/default.nix
···
stdenv.mkDerivation rec {
name = "tomb-${version}";
-
version = "2.5";
+
version = "2.6";
src = fetchFromGitHub {
owner = "dyne";
repo = "Tomb";
rev = "v${version}";
-
sha256 = "1wk1aanzfln88min29p5av2j8gd8vj5afbs2gvarv7lvx1vi7kh1";
+
sha256 = "0pr0lw1byxwkgv857zfmd8yqa03a7mckhzklrf9rkv1l6nisz0z0";
};
buildInputs = [ sudo zsh pinentry ];
+2 -2
pkgs/servers/atlassian/confluence.nix
···
stdenv.mkDerivation rec {
name = "atlassian-confluence-${version}";
-
version = "6.15.4";
+
version = "6.15.6";
src = fetchurl {
url = "https://product-downloads.atlassian.com/software/confluence/downloads/${name}.tar.gz";
-
sha256 = "0br51h8i99v6xc15280ra447c7fkiwf8nqgyzni0llhy1g1qcnmv";
+
sha256 = "0bb404d5i8jdry1jw8qdrcpgp9lvdkyxry58331pwpw16mlh0r2m";
};
buildPhase = ''
+2 -2
pkgs/servers/atlassian/jira.nix
···
stdenv.mkDerivation rec {
name = "atlassian-jira-${version}";
-
version = "8.2.1";
+
version = "8.2.2";
src = fetchurl {
url = "https://product-downloads.atlassian.com/software/jira/downloads/atlassian-jira-software-${version}.tar.gz";
-
sha256 = "1556hliywjiz6977249mlgxaq5xzpzq3xm9bcg9vk57s1hsv175i";
+
sha256 = "1azis5jxrdfviyvvbpzlrpqaayvzs9kggmj4rv9gbsn7ji96i781";
};
phases = [ "unpackPhase" "buildPhase" "installPhase" "fixupPhase" ];
+2 -2
pkgs/servers/beanstalkd/default.nix
···
{ stdenv, fetchurl }:
stdenv.mkDerivation rec {
-
version = "1.10";
+
version = "1.11";
name = "beanstalkd-${version}";
installPhase=''make install "PREFIX=$out"'';
src = fetchurl {
url = "https://github.com/kr/beanstalkd/archive/v${version}.tar.gz";
-
sha256 = "0n9dlmiddcfl7i0f1lwfhqiwyvf26493fxfcmn8jm30nbqciwfwj";
+
sha256 = "0i65d0pln1p6wxghzwziz2k8vafvdgjq6yc962ayzs80kpj18d2y";
};
hardeningDisable = [ "fortify" ];
+2 -2
pkgs/servers/dns/powerdns/default.nix
···
stdenv.mkDerivation rec {
name = "powerdns-${version}";
-
version = "4.1.7";
+
version = "4.1.9";
src = fetchurl {
url = "https://downloads.powerdns.com/releases/pdns-${version}.tar.bz2";
-
sha256 = "11c4r0mbq6ybbihm0jbl9hspb01pj1gi6x3m374liw9jij7dw8b4";
+
sha256 = "1dmx37xzg7qckq166jr7swcnw3m9wjh5169844ad59qhspfzflnk";
};
nativeBuildInputs = [ pkgconfig ];
+1 -1
pkgs/servers/headphones/default.nix
···
meta = with stdenv.lib; {
description = "Automatic music downloader for SABnzbd";
license = licenses.gpl3;
-
homepage = https:/github.com/rembo10/headphones;
+
homepage = "https://github.com/rembo10/headphones";
maintainers = with stdenv.lib.maintainers; [ rembo10 ];
};
}
+2 -2
pkgs/servers/http/apache-modules/mod_wsgi/default.nix
···
stdenv.mkDerivation rec {
name = "mod_wsgi-${version}";
-
version = "4.6.6";
+
version = "4.6.7";
src = fetchurl {
url = "https://github.com/GrahamDumpleton/mod_wsgi/archive/${version}.tar.gz";
-
sha256 = "1ic5lafqlwpld5jz2irj3yws883xhxldjyyh514w1lad1v085sbq";
+
sha256 = "1j8pqn0xhd502ardlmkqx8y85s1npmk9nifqps60wjh29nny03f2";
};
buildInputs = [ apacheHttpd python2 ];
+2 -2
pkgs/servers/http/tengine/default.nix
···
with stdenv.lib;
stdenv.mkDerivation rec {
-
version = "2.3.0";
+
version = "2.3.1";
name = "tengine-${version}";
src = fetchurl {
url = "https://github.com/alibaba/tengine/archive/${version}.tar.gz";
-
sha256 = "09165sdzad8bjxhnwphbags6yvxnz2rkf14p0w3vgvzssj017kqp";
+
sha256 = "075blm2d62a0bdixc3vngrxpgr7ngl1s4y8hm20pbvc07f0kzn9x";
};
buildInputs =
+3 -3
pkgs/servers/monitoring/grafana/default.nix
···
{ lib, buildGoPackage, fetchurl, fetchFromGitHub, phantomjs2 }:
buildGoPackage rec {
-
version = "6.2.4";
+
version = "6.2.5";
name = "grafana-${version}";
goPackagePath = "github.com/grafana/grafana";
···
rev = "v${version}";
owner = "grafana";
repo = "grafana";
-
sha256 = "1xfxvjhq96s3hchvigji7ppz777kggf39gh4dcqjzhls5qy6rm3i";
+
sha256 = "03wign7dkc2a9267mmqicvvzgya0g1i9ygr0dz3jvks2k1yhlv2j";
};
srcStatic = fetchurl {
url = "https://s3-us-west-2.amazonaws.com/grafana-releases/release/grafana-${version}.linux-amd64.tar.gz";
-
sha256 = "082mmwksv97r2g8ywvsj5f126ycp3jwxjp21jfq0135l8yz73vwh";
+
sha256 = "19zc9x1gkmdr7ijsrhrlln5cib20iyx0vgk0z79d8qyhq69nxfs8";
};
postPatch = ''
+2 -2
pkgs/servers/monitoring/riemann/default.nix
···
stdenv.mkDerivation rec {
name = "riemann-${version}";
-
version = "0.3.2";
+
version = "0.3.3";
src = fetchurl {
url = "https://github.com/riemann/riemann/releases/download/${version}/${name}.tar.bz2";
-
sha256 = "0vq7yr048sqy8dgs9l3kn1q6s3hhlhs5551hj445cng8z6n4bc4v";
+
sha256 = "11xcmmp5k78vr5ch42zwx9ym84y6kf81z9zwawqybvx7wmlbpdiq";
};
nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/servers/radarr/default.nix
···
stdenv.mkDerivation rec {
name = "radarr-${version}";
-
version = "0.2.0.1344";
+
version = "0.2.0.1358";
src = fetchurl {
url = "https://github.com/Radarr/Radarr/releases/download/v${version}/Radarr.develop.${version}.linux.tar.gz";
-
sha256 = "0zh1p92i61s6mx26s3fvzg1ihsx433b398wsl5p8zafwqq3zfrla";
+
sha256 = "0lyd9gcrfdp7nc4myg22ardsig30lgkvma03zzdjrwvsngqclmv7";
};
nativeBuildInputs = [ makeWrapper ];
+65
pkgs/servers/roon-server/default.nix
···
+
{ alsaLib, alsaUtils, cifs-utils, fetchurl, ffmpeg, libav, mono, stdenv }:
+
+
with stdenv.lib;
+
stdenv.mkDerivation rec {
+
name = "roon-server";
+
version = "100600401";
+
+
src = fetchurl {
+
url = "http://download.roonlabs.com/updates/stable/RoonServer_linuxx64_${version}.tar.bz2";
+
sha256 = "121mmdh35q4bpgsqhcps6a6q1f4ld9v4hq9gp181bf2n779pk8sh";
+
};
+
+
installPhase = ''
+
runHook preInstall
+
+
# Check script
+
sed -i '3i PATH=$PATH:${makeBinPath [ cifs-utils ffmpeg libav ]}' check.sh
+
sed -i '/check_ulimit$/d' check.sh
+
+
# Start script
+
sed -i '3i PATH=$PATH:${makeBinPath [ alsaUtils cifs-utils ffmpeg libav ]}' start.sh
+
+
# Debug logging
+
sed -i '/--debug--gc=sgen --server/exec "$HARDLINK" --debug --gc=sgen --server "$SCRIPT.exe" "$@" -storagetrace -watchertrace' Appliance/RoonAppliance
+
+
# Binaries
+
sed -i '/# boost ulimit/,+2 d' Appliance/RAATServer
+
sed -i '/# boost ulimit/,+2 d' Appliance/RoonAppliance
+
sed -i '/# boost ulimit/,+2 d' Server/RoonServer
+
sed -i '/ln -sf/ d' Appliance/RAATServer
+
sed -i '/ln -sf/ d' Appliance/RoonAppliance
+
sed -i '/ln -sf/ d' Server/RoonServer
+
mkdir -p $out/opt
+
mv * $out/opt
+
ln -sf $out/opt/RoonMono/bin/mono-sgen $out/opt/RoonMono/bin/RoonServer
+
ln -sf $out/opt/RoonMono/bin/mono-sgen $out/opt/RoonMono/bin/RoonAppliance
+
ln -sf $out/opt/RoonMono/bin/mono-sgen $out/opt/RoonMono/bin/RAATServer
+
+
runHook postInstall
+
'';
+
+
preFixup = ''
+
patchelf \
+
--set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" \
+
--set-rpath "${alsaLib}/lib" \
+
$out/opt/RoonMono/bin/mono-sgen
+
+
# Checkers
+
patchelf \
+
--set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" \
+
--set-rpath "${alsaLib}/lib" \
+
$out/opt/Appliance/check_alsa
+
patchelf \
+
--set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" \
+
$out/opt/Appliance/check_bincompat
+
'';
+
+
meta = {
+
description = "The music player for music lovers.";
+
homepage = https://roonlabs.com;
+
license = licenses.unfree;
+
maintainers = with maintainers; [ steell ];
+
platforms = platforms.linux;
+
};
+
}
+2 -2
pkgs/servers/search/groonga/default.nix
···
stdenv.mkDerivation rec {
name = "groonga-${version}";
-
version = "9.0.3";
+
version = "9.0.4";
src = fetchurl {
url = "https://packages.groonga.org/source/groonga/${name}.tar.gz";
-
sha256 = "1sj7vq0b6panh3q1br9r30g5nphxjw7brwncrkyxjyawgw7cc94j";
+
sha256 = "00cyzvk8303y0xcmb0hiy45wj2j6baqqzrfda9f6fv3zlfna1n2g";
};
buildInputs = with stdenv.lib;
+1 -1
pkgs/servers/sickbeard/default.nix
···
meta = with stdenv.lib; {
description = "PVR & episode guide that downloads and manages all your TV shows";
license = licenses.gpl3;
-
homepage = https:/github.com/midgetspy/Sick-Beard;
+
homepage = "https://github.com/midgetspy/Sick-Beard";
maintainers = with stdenv.lib.maintainers; [ ];
};
}
+1 -1
pkgs/servers/sickbeard/sickgear.nix
···
meta = with stdenv.lib; {
description = "The most reliable stable TV fork of the great Sick-Beard to fully automate TV enjoyment with innovation";
license = licenses.gpl3;
-
homepage = https:/github.com/SickGear/SickGear;
+
homepage = "https://github.com/SickGear/SickGear";
maintainers = with stdenv.lib.maintainers; [ ];
};
}
-44
pkgs/servers/sql/mysql/5.5.17-cygwin.patch
···
-
--- mysql-5.5.17/cmake/install_macros.cmake 2011-10-12 07:10:24.000000000 -0500
-
+++ mysql-5.5.17/cmake/install_macros.cmake 2011-11-07 23:19:35.772837800 -0600
-
@@ -230,7 +230,13 @@ FUNCTION(MYSQL_INSTALL_TARGETS)
-
IF(ARG_COMPONENT)
-
SET(COMP COMPONENT ${ARG_COMPONENT})
-
ENDIF()
-
- INSTALL(TARGETS ${TARGETS} DESTINATION ${ARG_DESTINATION} ${COMP})
-
+ IF(${ARG_DESTINATION} STREQUAL "${INSTALL_LIBDIR}")
-
+ INSTALL(TARGETS ${TARGETS} LIBRARY DESTINATION ${ARG_DESTINATION}
-
+ RUNTIME DESTINATION bin
-
+ ARCHIVE DESTINATION ${ARG_DESTINATION} ${COMP})
-
+ ELSE()
-
+ INSTALL(TARGETS ${TARGETS} DESTINATION ${ARG_DESTINATION} ${COMP})
-
+ ENDIF()
-
SET(INSTALL_LOCATION ${ARG_DESTINATION} )
-
INSTALL_DEBUG_SYMBOLS("${TARGETS}")
-
SET(INSTALL_LOCATION)
-
--- mysql-5.5.17/libmysql/CMakeLists.txt 2011-10-12 07:10:24.000000000 -0500
-
+++ mysql-5.5.17/libmysql/CMakeLists.txt 2011-11-08 03:19:31.379219300 -0600
-
@@ -214,6 +214,7 @@ IF(NOT DISABLE_SHARED)
-
SET_TARGET_PROPERTIES(mysqlclient PROPERTIES CLEAN_DIRECT_OUTPUT 1)
-
SET_TARGET_PROPERTIES(libmysql PROPERTIES CLEAN_DIRECT_OUTPUT 1)
-
-
+ IF(NOT CYGWIN)
-
# Install links to libmysqlclient.so (client_r)
-
GET_VERSIONED_LIBNAME(
-
"${CMAKE_SHARED_LIBRARY_PREFIX}mysqlclient_r"
-
@@ -231,5 +232,6 @@ IF(NOT DISABLE_SHARED)
-
linkname)
-
INSTALL_SYMLINK(${linkname} libmysql ${INSTALL_LIBDIR} SharedLibraries)
-
ENDFOREACH()
-
+ ENDIF(NOT CYGWIN)
-
ENDIF()
-
ENDIF()
-
--- mysql-5.5.17/strings/dtoa.c 2011-10-12 07:10:25.000000000 -0500
-
+++ mysql-5.5.17/strings/dtoa.c 2011-11-07 20:38:05.064690100 -0600
-
@@ -36,6 +36,7 @@
-
-
***************************************************************/
-
-
+#define __STRICT_ANSI__
-
#include <my_base.h> /* for EOVERFLOW on Windows */
-
#include <my_global.h>
-
#include <m_string.h> /* for memcpy and NOT_FIXED_DEC */
-22
pkgs/servers/sql/mysql/5.5.17-export-symbols.patch
···
-
--- mysql-5.5.17/libmysql/CMakeLists.txt 2011-10-12 07:10:24.000000000 -0500
-
+++ mysql-5.5.17/libmysql/CMakeLists.txt 2011-11-08 03:19:31.379219300 -0600
-
@@ -25,6 +25,11 @@ INCLUDE_DIRECTORIES(
-
ADD_DEFINITIONS(${SSL_DEFINES})
-
-
SET(CLIENT_API_FUNCTIONS
-
+dynstr_free
-
+dynstr_append_mem
-
+dynstr_append_os_quoted
-
+dynstr_realloc
-
+init_dynamic_string
-
get_tty_password
-
handle_options
-
load_defaults
-
@@ -131,6 +136,7 @@ mysql_server_end
-
mysql_set_character_set
-
mysql_get_character_set_info
-
mysql_stmt_next_result
-
+strfill
-
-
CACHE INTERNAL "Functions exported by client API"
-
-93
pkgs/servers/sql/mysql/5.5.x.nix
···
-
{ stdenv, fetchpatch, fetchurl, cmake, bison, ncurses, openssl
-
, readline, zlib, perl, cctools, CoreServices }:
-
-
# Note: zlib is not required; MySQL can use an internal zlib.
-
-
let
-
self = stdenv.mkDerivation rec {
-
name = "mysql-${version}";
-
version = "5.5.62";
-
-
src = fetchurl {
-
url = "mirror://mysql/MySQL-5.5/${name}.tar.gz";
-
sha256 = "1mwrzwk9ap09s430fpdkyhvx5j2syd3xj2hyfzvanjphq4xqbrxi";
-
};
-
-
patches =
-
# Minor type error that is a build failure as of clang 6.
-
stdenv.lib.optional stdenv.cc.isClang (fetchpatch {
-
url = "https://svn.freebsd.org/ports/head/databases/mysql55-server/files/patch-sql_sql_partition.cc?rev=469888";
-
extraPrefix = "";
-
sha256 = "09sya27z3ir3xy5mrv3x68hm274594y381n0i6r5s627x71jyszf";
-
}) ++
-
stdenv.lib.optionals stdenv.isCygwin [
-
./5.5.17-cygwin.patch
-
./5.5.17-export-symbols.patch
-
];
-
-
preConfigure = stdenv.lib.optional stdenv.isDarwin ''
-
ln -s /bin/ps $TMPDIR/ps
-
export PATH=$PATH:$TMPDIR
-
'';
-
-
buildInputs = [ cmake bison ncurses openssl readline zlib ]
-
++ stdenv.lib.optionals stdenv.isDarwin [ perl cctools CoreServices ];
-
-
enableParallelBuilding = true;
-
-
cmakeFlags = [
-
"-DWITH_SSL=yes"
-
"-DWITH_READLINE=yes"
-
"-DWITH_EMBEDDED_SERVER=yes"
-
"-DWITH_ZLIB=yes"
-
"-DHAVE_IPV6=yes"
-
"-DMYSQL_UNIX_ADDR=/run/mysqld/mysqld.sock"
-
"-DMYSQL_DATADIR=/var/lib/mysql"
-
"-DINSTALL_SYSCONFDIR=etc/mysql"
-
"-DINSTALL_INFODIR=share/mysql/docs"
-
"-DINSTALL_MANDIR=share/man"
-
"-DINSTALL_PLUGINDIR=lib/mysql/plugin"
-
"-DINSTALL_SCRIPTDIR=bin"
-
"-DINSTALL_INCLUDEDIR=include/mysql"
-
"-DINSTALL_DOCREADMEDIR=share/mysql"
-
"-DINSTALL_SUPPORTFILESDIR=share/mysql"
-
"-DINSTALL_MYSQLSHAREDIR=share/mysql"
-
"-DINSTALL_DOCDIR=share/mysql/docs"
-
"-DINSTALL_SHAREDIR=share/mysql"
-
"-DINSTALL_MYSQLTESTDIR="
-
"-DINSTALL_SQLBENCHDIR="
-
];
-
-
NIX_CFLAGS_COMPILE =
-
stdenv.lib.optionals stdenv.cc.isGNU [ "-fpermissive" ] # since gcc-7
-
++ stdenv.lib.optionals stdenv.cc.isClang [ "-Wno-c++11-narrowing" ]; # since clang 6
-
-
NIX_LDFLAGS = stdenv.lib.optionalString stdenv.isLinux "-lgcc_s";
-
-
prePatch = ''
-
sed -i -e "s|/usr/bin/libtool|libtool|" cmake/libutils.cmake
-
'';
-
postInstall = ''
-
sed -i -e "s|basedir=\"\"|basedir=\"$out\"|" $out/bin/mysql_install_db
-
rm -r $out/data "$out"/lib/*.a
-
'';
-
-
passthru = {
-
client = self;
-
connector-c = self;
-
server = self;
-
mysqlVersion = "5.5";
-
};
-
-
meta = with stdenv.lib; {
-
homepage = https://www.mysql.com/;
-
description = "The world's most popular open source database";
-
platforms = platforms.unix;
-
# See https://downloads.mysql.com/docs/licenses/mysqld-5.5-gpl-en.pdf
-
license = with licenses; [
-
artistic1 bsd0 bsd2 bsd3 bsdOriginal
-
gpl2 lgpl2 lgpl21 mit publicDomain licenses.zlib
-
];
-
broken = stdenv.isAarch64;
-
};
-
}; in self
+2 -2
pkgs/servers/sql/postgresql/ext/cstore_fdw.nix
···
mkdir -p $out/{lib,share/extension}
cp *.so $out/lib
-
cp *.sql $out/share/extension
-
cp *.control $out/share/extension
+
cp *.sql $out/share/postgresql/extension
+
cp *.control $out/share/postgresql/extension
'';
meta = with stdenv.lib; {
+2 -2
pkgs/servers/sql/postgresql/ext/pg_auto_failover.nix
···
installPhase = ''
install -D -t $out/bin src/bin/pg_autoctl/pg_autoctl
install -D -t $out/lib src/monitor/pgautofailover.so
-
install -D -t $out/share/extension src/monitor/*.sql
-
install -D -t $out/share/extension src/monitor/pgautofailover.control
+
install -D -t $out/share/postgresql/extension src/monitor/*.sql
+
install -D -t $out/share/postgresql/extension src/monitor/pgautofailover.control
'';
meta = with stdenv.lib; {
+2 -2
pkgs/servers/sql/postgresql/ext/pg_bigm.nix
···
mkdir -p $out/{lib,share/extension}
cp *.so $out/lib
-
cp *.sql $out/share/extension
-
cp *.control $out/share/extension
+
cp *.sql $out/share/postgresql/extension
+
cp *.control $out/share/postgresql/extension
'';
meta = with stdenv.lib; {
+2 -2
pkgs/servers/sql/postgresql/ext/pg_cron.nix
···
mkdir -p $out/{lib,share/extension}
cp *.so $out/lib
-
cp *.sql $out/share/extension
-
cp *.control $out/share/extension
+
cp *.sql $out/share/postgresql/extension
+
cp *.control $out/share/postgresql/extension
'';
meta = with stdenv.lib; {
+2 -2
pkgs/servers/sql/postgresql/ext/pg_hll.nix
···
mkdir -p $out/{lib,share/extension}
cp *.so $out/lib
-
cp *.sql $out/share/extension
-
cp *.control $out/share/extension
+
cp *.sql $out/share/postgresql/extension
+
cp *.control $out/share/postgresql/extension
'';
meta = with stdenv.lib; {
+3 -3
pkgs/servers/sql/postgresql/ext/pg_partman.nix
···
mkdir -p $out/{lib,share/extension}
cp src/*.so $out/lib
-
cp updates/* $out/share/extension
-
cp -r sql/* $out/share/extension
-
cp *.control $out/share/extension
+
cp updates/* $out/share/postgresql/extension
+
cp -r sql/* $out/share/postgresql/extension
+
cp *.control $out/share/postgresql/extension
'';
meta = with stdenv.lib; {
+1 -1
pkgs/servers/sql/postgresql/ext/pg_repack.nix
···
installPhase = ''
install -D bin/pg_repack -t $out/bin/
install -D lib/pg_repack.so -t $out/lib/
-
install -D lib/{pg_repack--${version}.sql,pg_repack.control} -t $out/share/extension
+
install -D lib/{pg_repack--${version}.sql,pg_repack.control} -t $out/share/postgresql/extension
'';
meta = with stdenv.lib; {
+1 -1
pkgs/servers/sql/postgresql/ext/pg_similarity.nix
···
installPhase = ''
mkdir -p $out/bin # for buildEnv to setup proper symlinks
install -D pg_similarity.so -t $out/lib/
-
install -D ./{pg_similarity--unpackaged--1.0.sql,pg_similarity--1.0.sql,pg_similarity.control} -t $out/share/extension
+
install -D ./{pg_similarity--unpackaged--1.0.sql,pg_similarity--1.0.sql,pg_similarity.control} -t $out/share/postgresql/extension
'';
meta = {
+2 -2
pkgs/servers/sql/postgresql/ext/pg_topn.nix
···
mkdir -p $out/{lib,share/extension}
cp *.so $out/lib
-
cp *.sql $out/share/extension
-
cp *.control $out/share/extension
+
cp *.sql $out/share/postgresql/extension
+
cp *.control $out/share/postgresql/extension
'';
meta = with stdenv.lib; {
+2 -2
pkgs/servers/sql/postgresql/ext/pgjwt.nix
···
buildPhase = ":";
installPhase = ''
mkdir -p $out/bin # current postgresql extension mechanism in nixos requires bin directory
-
mkdir -p $out/share/extension
-
cp pg*sql *.control $out/share/extension
+
mkdir -p $out/share/postgresql/extension
+
cp pg*sql *.control $out/share/postgresql/extension
'';
meta = with stdenv.lib; {
+1 -1
pkgs/servers/sql/postgresql/ext/pgroonga.nix
···
installPhase = ''
mkdir -p $out/bin
install -D pgroonga.so -t $out/lib/
-
install -D ./{pgroonga-*.sql,pgroonga.control} -t $out/share/extension
+
install -D ./{pgroonga-*.sql,pgroonga.control} -t $out/share/postgresql/extension
'';
meta = with stdenv.lib; {
+2 -2
pkgs/servers/sql/postgresql/ext/pgrouting.nix
···
installPhase = ''
mkdir -p $out/bin # for buildEnv, see https://github.com/NixOS/nixpkgs/issues/22653
install -D lib/*.so -t $out/lib
-
install -D sql/pgrouting--${version}.sql -t $out/share/extension
-
install -D sql/common/pgrouting.control -t $out/share/extension
+
install -D sql/pgrouting--${version}.sql -t $out/share/postgresql/extension
+
install -D sql/common/pgrouting.control -t $out/share/postgresql/extension
'';
meta = with stdenv.lib; {
+1 -1
pkgs/servers/sql/postgresql/ext/pgtap.nix
···
nativeBuildInputs = [ postgresql perl perlPackages.TAPParserSourceHandlerpgTAP which ];
installPhase = ''
-
install -D {sql/pgtap--${version}.sql,pgtap.control} -t $out/share/extension
+
install -D {sql/pgtap--${version}.sql,pgtap.control} -t $out/share/postgresql/extension
'';
meta = with stdenv.lib; {
+1 -1
pkgs/servers/sql/postgresql/ext/pipelinedb.nix
···
installPhase = ''
mkdir -p $out/bin
install -D -t $out/lib/ pipelinedb.so
-
install -D -t $out/share/extension {pipelinedb-*.sql,pipelinedb.control}
+
install -D -t $out/share/postgresql/extension {pipelinedb-*.sql,pipelinedb.control}
'';
meta = with stdenv.lib; {
+1 -1
pkgs/servers/sql/postgresql/ext/plv8.nix
···
installPhase = ''
mkdir -p $out/bin
install -D plv8*.so -t $out/lib
-
install -D {plls,plcoffee,plv8}{--${version}.sql,.control} -t $out/share/extension
+
install -D {plls,plcoffee,plv8}{--${version}.sql,.control} -t $out/share/postgresql/extension
'';
meta = with stdenv.lib; {
+2 -2
pkgs/servers/sql/postgresql/ext/postgis.nix
···
preConfigure = ''
sed -i 's@/usr/bin/file@${file}/bin/file@' configure
-
configureFlags="--datadir=$out/share --datarootdir=$out/share --bindir=$out/bin --with-gdalconfig=${gdal}/bin/gdal-config --with-jsondir=${json_c.dev}"
+
configureFlags="--datadir=$out/share/postgresql --datarootdir=$out/share/postgresql --bindir=$out/bin --with-gdalconfig=${gdal}/bin/gdal-config --with-jsondir=${json_c.dev}"
-
makeFlags="PERL=${perl}/bin/perl datadir=$out/share pkglibdir=$out/lib bindir=$out/bin"
+
makeFlags="PERL=${perl}/bin/perl datadir=$out/share/postgresql pkglibdir=$out/lib bindir=$out/bin"
'';
postConfigure = ''
sed -i "s|@mkdir -p \$(DESTDIR)\$(PGSQL_BINDIR)||g ;
+2 -2
pkgs/servers/sql/postgresql/ext/tds_fdw.nix
···
installPhase = ''
install -D tds_fdw.so -t $out/lib
-
install -D sql/tds_fdw--${version}.sql -t $out/share/extension
-
install -D tds_fdw.control -t $out/share/extension
+
install -D sql/tds_fdw--${version}.sql -t $out/share/postgresql/extension
+
install -D tds_fdw.control -t $out/share/postgresql/extension
'';
meta = with stdenv.lib; {
+2 -2
pkgs/servers/sql/postgresql/ext/temporal_tables.nix
···
mkdir -p $out/{bin,lib,share/extension}
cp *.so $out/lib
-
cp *.sql $out/share/extension
-
cp *.control $out/share/extension
+
cp *.sql $out/share/postgresql/extension
+
cp *.control $out/share/postgresql/extension
'';
meta = with stdenv.lib; {
+3 -3
pkgs/servers/sql/postgresql/ext/timescaledb.nix
···
stdenv.mkDerivation rec {
name = "timescaledb-${version}";
-
version = "1.3.1";
+
version = "1.3.2";
nativeBuildInputs = [ cmake ];
buildInputs = [ postgresql openssl ];
···
owner = "timescale";
repo = "timescaledb";
rev = "refs/tags/${version}";
-
sha256 = "1q3c4qsy4vb00a4p15km4w5d5xcppigf7rp4mqr3wln7i4d4lvnx";
+
sha256 = "117az52h8isi15p47r5d6k5y80ng9vj3x8ljq39iavgr364q716c";
};
cmakeFlags = [ "-DSEND_TELEMETRY_DEFAULT=OFF" ];
···
patchPhase = ''
for x in CMakeLists.txt sql/CMakeLists.txt; do
substituteInPlace "$x" \
-
--replace 'DESTINATION "''${PG_SHAREDIR}/extension"' "DESTINATION \"$out/share/extension\""
+
--replace 'DESTINATION "''${PG_SHAREDIR}/extension"' "DESTINATION \"$out/share/postgresql/extension\""
done
for x in src/CMakeLists.txt src/loader/CMakeLists.txt tsl/src/CMakeLists.txt; do
+1 -1
pkgs/servers/sql/postgresql/ext/tsearch_extras.nix
···
installPhase = ''
mkdir -p $out/bin
install -D tsearch_extras.so -t $out/lib/
-
install -D ./{tsearch_extras--1.0.sql,tsearch_extras.control} -t $out/share/extension
+
install -D ./{tsearch_extras--1.0.sql,tsearch_extras.control} -t $out/share/postgresql/extension
'';
meta = with stdenv.lib; {
+2 -2
pkgs/servers/tautulli/default.nix
···
{stdenv, fetchFromGitHub, python }:
stdenv.mkDerivation rec {
-
version = "2.1.29";
+
version = "2.1.32";
pname = "Tautulli";
name = "${pname}-${version}";
···
owner = "Tautulli";
repo = pname;
rev = "v${version}";
-
sha256 = "1n5kpfcm59qg27xhlan3w2x71dp1h3gycdlp0iyxaqzaaw5splry";
+
sha256 = "05z6l3qs2m72c1hcl3qd1lm17hsmyqk48f8dcsvrxa5hibmf84j4";
};
buildPhase = ":";
+3 -3
pkgs/shells/zsh/oh-my-zsh/default.nix
···
{ stdenv, fetchgit }:
stdenv.mkDerivation rec {
-
version = "2019-06-15";
+
version = "2019-07-01";
name = "oh-my-zsh-${version}";
-
rev = "c105c04b6b1ddb917c12eadacb26c252f44ddfad";
+
rev = "b259cdf7e71ad6c3cc1a66a48c6c79cf63f38590";
src = fetchgit { inherit rev;
url = "https://github.com/robbyrussell/oh-my-zsh";
-
sha256 = "0b3mdiygqvxgikaa95ixhnr6rib3wllls54hv7h50g4f86jhj62b";
+
sha256 = "1vk9misnvjs1lxlwzy4ld30vh67nhghzra1y5ckgxa019l9cvann";
};
pathsToLink = [ "/share/oh-my-zsh" ];
+2 -2
pkgs/shells/zsh/zsh-autosuggestions/default.nix
···
stdenv.mkDerivation rec {
name = "zsh-autosuggestions-${version}";
-
version = "0.5.2";
+
version = "0.6.3";
src = fetchFromGitHub {
owner = "zsh-users";
repo = "zsh-autosuggestions";
rev = "v${version}";
-
sha256 = "1xhrdv6cgmq9qslb476rcs8ifw8i2vf43yvmmscjcmpz0jac4sbx";
+
sha256 = "1h8h2mz9wpjpymgl2p7pc146c1jgb3dggpvzwm9ln3in336wl95c";
};
buildInputs = [ zsh ];
+21 -22
pkgs/tools/X11/xtrace/default.nix
···
-
{ stdenv, autoreconfHook, fetchgit, libX11, xauth, makeWrapper }:
+
{ stdenv, autoreconfHook, fetchFromGitLab, libX11, xauth, makeWrapper }:
-
let version = "1.3.1"; in
-
stdenv.mkDerivation {
-
name = "xtrace-${version}";
-
src = fetchgit {
-
url = "git://git.debian.org/xtrace/xtrace.git";
-
rev = "refs/tags/xtrace-1.3.1";
-
sha256 = "1g26hr6rl7bbb9cwqk606nbbapslq3wnsy8j28azrgi8hgfqhjfi";
+
stdenv.mkDerivation rec {
+
pname = "xtrace";
+
version = "1.4.0";
+
+
src = fetchFromGitLab rec {
+
domain = "salsa.debian.org";
+
owner = "debian";
+
repo = pname;
+
rev = "xtrace-${version}";
+
sha256 = "1yff6x847nksciail9jly41mv70sl8sadh0m5d847ypbjmxcwjpq";
};
-
nativeBuildInputs = [ autoreconfHook ];
-
buildInputs = [ libX11 makeWrapper ];
+
nativeBuildInputs = [ autoreconfHook makeWrapper ];
+
buildInputs = [ libX11 ];
-
preConfigure = ''
-
./autogen.sh
+
postInstall = ''
+
wrapProgram "$out/bin/xtrace" \
+
--prefix PATH ':' "${xauth}/bin"
'';
-
postInstall =
-
'' wrapProgram "$out/bin/xtrace" \
-
--prefix PATH ':' "${xauth}/bin"
-
'';
-
-
meta = {
-
homepage = http://xtrace.alioth.debian.org/;
+
meta = with stdenv.lib; {
+
homepage = "https://salsa.debian.org/debian/xtrace";
description = "Tool to trace X11 protocol connections";
-
license = stdenv.lib.licenses.gpl2;
-
maintainers = with stdenv.lib.maintainers; [viric];
-
platforms = with stdenv.lib.platforms; linux;
+
license = licenses.gpl2;
+
maintainers = with maintainers; [ viric ];
+
platforms = with platforms; linux;
};
}
+2 -2
pkgs/tools/admin/dehydrated/default.nix
···
{ stdenv, coreutils, curl, diffutils, gawk, gnugrep, gnused, openssl, makeWrapper, fetchFromGitHub }:
let
pkgName = "dehydrated";
-
version = "0.6.2";
+
version = "0.6.5";
in
stdenv.mkDerivation rec {
name = pkgName + "-" + version;
···
owner = "lukas2511";
repo = "dehydrated";
rev = "v${version}";
-
sha256 = "19d4kam0dl6l9wfd0v54w4d085jdgi1ljksnqpjj67d6sm23f2l4";
+
sha256 = "14k7ykry16zp09i0bqb5pqaclvnjcb6p3x8knm9v5q0bdvlplkjv";
};
buildInputs = [ makeWrapper ];
+2 -2
pkgs/tools/filesystems/avfs/default.nix
···
stdenv.mkDerivation rec {
name = "avfs-${version}";
-
version = "1.0.6";
+
version = "1.1.0";
src = fetchurl {
url = "mirror://sourceforge/avf/${version}/${name}.tar.bz2";
-
sha256 = "1hz39f7p5vw647xqk161v3nh88qnd599av6nfidpmkh1d9vkl6jc";
+
sha256 = "19rk2c0xd3mi66kr88ykrcn81fv09c09md0gf6mnm9z1bd7p7wx7";
};
nativeBuildInputs = [ pkgconfig ];
+2 -2
pkgs/tools/filesystems/f3/default.nix
···
stdenv.mkDerivation rec {
name = "${pname}-${version}";
pname = "f3";
-
version = "7.1";
+
version = "7.2";
enableParallelBuilding = true;
···
owner = "AltraMayor";
repo = pname;
rev = "v${version}";
-
sha256 = "0zglsmz683jg7f9wc6vmgljyg9w87pbnjw5x4w6x02w8233zvjqf";
+
sha256 = "1iwdg0r4wkgc8rynmw1qcqz62l0ldgc8lrazq33msxnk5a818jgy";
};
buildInputs = [ parted udev ];
+2 -2
pkgs/tools/misc/catimg/default.nix
···
stdenv.mkDerivation rec {
pname = "catimg";
-
version = "2.5.0";
+
version = "2.6.0";
src = fetchFromGitHub {
owner = "posva";
repo = pname;
rev = version;
-
sha256 = "0n74iczzgxrcq3zpa7ndycb9rinm829yvf81c747q4ngv5q6pzcm";
+
sha256 = "0g9ywbgy162wiam9hc3yqpq5q4gyxa8fj4jskr3fdz8z8jjaabzz";
};
nativeBuildInputs = [ cmake ];
+2 -2
pkgs/tools/misc/mc/default.nix
···
stdenv.mkDerivation rec {
name = "mc-${version}";
-
version = "4.8.22";
+
version = "4.8.23";
src = fetchurl {
url = "http://www.midnight-commander.org/downloads/${name}.tar.xz";
-
sha256 = "060kh3dmk8fmmsibn1l815qjazzfxzbhgqggrhncz604pbbnhy7f";
+
sha256 = "077z7phzq3m1sxyz7li77lyzv4rjmmh3wp2vy86pnc4387kpqzyx";
};
nativeBuildInputs = [ pkgconfig ];
+2 -2
pkgs/tools/misc/plantuml/default.nix
···
{ stdenv, fetchurl, makeWrapper, jre, graphviz }:
stdenv.mkDerivation rec {
-
version = "1.2019.6";
+
version = "1.2019.7";
name = "plantuml-${version}";
src = fetchurl {
url = "mirror://sourceforge/project/plantuml/${version}/plantuml.${version}.jar";
-
sha256 = "0sxpk7n96a3vwf0dlf62zs0rgm01gf36k62rbr8cyjf62qgf61lb";
+
sha256 = "1md8dyjlvwfg4hbvigcvzipj1gf8hb39rqqh825aa2swchs8nvhm";
};
nativeBuildInputs = [ makeWrapper ];
+31
pkgs/tools/misc/psrecord/default.nix
···
+
{ lib, buildPythonApplication, fetchPypi, psutil, matplotlib, pytest }:
+
buildPythonApplication rec {
+
pname = "psrecord";
+
version = "1.1";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "151rynca97v5wq1drl2yfrqmqil1km72cizn3159c2ip14626mp6";
+
};
+
+
propagatedBuildInputs = [
+
psutil matplotlib
+
];
+
+
checkInputs = [
+
pytest
+
];
+
+
checkPhase = ''
+
runHook preCheck
+
pytest psrecord
+
runHook postCheck
+
'';
+
+
meta = {
+
description = "Record the CPU and memory activity of a process";
+
homepage = "https://github.com/astrofrog/psrecord";
+
license = lib.licenses.bsd2;
+
maintainers = with lib.maintainers; [ johnazoidberg ];
+
};
+
}
+14 -5
pkgs/tools/misc/stow/default.nix
···
-
{ stdenv, fetchurl, perl, perlPackages }:
+
{ stdenv, fetchurl, perl, perlPackages, makeWrapper }:
let
-
version = "2.2.2";
+
pname = "stow";
+
version = "2.3.0";
in
stdenv.mkDerivation {
-
name = "stow-${version}";
+
name = "${pname}-${version}";
src = fetchurl {
url = "mirror://gnu/stow/stow-${version}.tar.bz2";
-
sha256 = "1zd6g9cm3whvy5f87j81j4npl7q6kxl25f7z7p9ahiqfjqs200m0";
+
sha256 = "1fnn83wwx3yaxpqkq8xyya3aiibz19fwrfj30nsiikm7igmwgiv5";
};
-
buildInputs = with perlPackages; [ perl IOStringy TestOutput ];
+
nativeBuildInputs = [ makeWrapper ];
+
buildInputs = with perlPackages; [ perl IOStringy TestOutput HashMerge Clone CloneChoose ];
+
+
postFixup = ''
+
wrapProgram "$out"/bin/stow \
+
--set PERL5LIB "$out/lib/perl5/site_perl:${with perlPackages; makePerlPath [
+
HashMerge Clone CloneChoose
+
]}"
+
'';
doCheck = true;
+2 -2
pkgs/tools/misc/youtube-dl/default.nix
···
# The websites youtube-dl deals with are a very moving target. That means that
# downloads break constantly. Because of that, updates should always be backported
# to the latest stable release.
-
version = "2019.06.21";
+
version = "2019.06.27";
src = fetchurl {
url = "https://yt-dl.org/downloads/${version}/${pname}-${version}.tar.gz";
-
sha256 = "03a729198zzhixbn7xixi9bprmk3qqh5dsyh3dqhji6lmlijx1w5";
+
sha256 = "1kxqiyhhgv0n85jc02kai5i6wdjs1696k88q1phq7ik2y6ky3c7y";
};
nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/tools/misc/yubikey-manager-qt/default.nix
···
in stdenv.mkDerivation rec {
pname = "yubikey-manager-qt";
-
version = "1.1.1";
+
version = "1.1.2";
src = fetchurl {
url = "https://developers.yubico.com/${pname}/Releases/${pname}-${version}.tar.gz";
-
sha256 = "0hcfl0mh4gqy9c8ghmi58asqr8v009n6li0mgcy3r8fyjr7qryvy";
+
sha256 = "01ax8zjrahs2sjbgsys2ahh57sdcap0ij3y1r1bbvsgzr7xxm2q8";
};
nativeBuildInputs = [ makeWrapper python3.pkgs.wrapPython qmake ];
+2 -2
pkgs/tools/networking/dhcpcd/default.nix
···
stdenv.mkDerivation rec {
# when updating this to >=7, check, see previous reverts:
# nix-build -A nixos.tests.networking.scripted.macvlan.x86_64-linux nixos/release-combined.nix
-
name = "dhcpcd-7.2.2";
+
name = "dhcpcd-7.2.3";
src = fetchurl {
url = "mirror://roy/dhcpcd/${name}.tar.xz";
-
sha256 = "17m0ig9n4p6m98j8wp4dwnl2cfg2rg3v6vqpsahls9x9rccgzdrx";
+
sha256 = "0vjnd27y6jm5q2v7fkyxmsn77dcpvpzyzb5bq9lfkas8flbkiavl";
};
nativeBuildInputs = [ pkgconfig ];
+2 -2
pkgs/tools/networking/lldpd/default.nix
···
stdenv.mkDerivation rec {
name = "lldpd-${version}";
-
version = "1.0.3";
+
version = "1.0.4";
src = fetchurl {
url = "https://media.luffy.cx/files/lldpd/${name}.tar.gz";
-
sha256 = "0q63wiaan85a6d204jgk87w6dw5c9x0rb2z7pwb580b8a4wyvz1r";
+
sha256 = "0kvj49y6slnldi9dha81nzxvpwd7d8kq1qlibn6h1wdb5w1vq6ak";
};
configureFlags = [
+4
pkgs/tools/networking/shadowsocks-libev/default.nix
···
cmakeFlags = [ "-DWITH_STATIC=OFF" "-DCMAKE_BUILD_WITH_INSTALL_NAME_DIR=ON" ];
+
postInstall = ''
+
cp lib/* $out/lib
+
'';
+
meta = with stdenv.lib; {
description = "A lightweight secured SOCKS5 proxy";
longDescription = ''
+3 -1
pkgs/tools/package-management/cargo-outdated/default.nix
···
-
{ stdenv, fetchFromGitHub, rustPlatform, pkgconfig, openssl, darwin }:
+
{ stdenv, fetchFromGitHub, rustPlatform, pkgconfig, openssl, libiconv, curl, darwin }:
rustPlatform.buildRustPackage rec {
pname = "cargo-outdated";
···
buildInputs = [ openssl ]
++ stdenv.lib.optionals stdenv.isDarwin [
darwin.apple_sdk.frameworks.Security
+
libiconv
+
curl
];
meta = with stdenv.lib; {
+3 -3
pkgs/tools/package-management/conda/default.nix
···
# $ conda-shell
# $ conda install spyder
let
-
version = "4.3.31";
+
version = "4.6.14";
src = fetchurl {
url = "https://repo.continuum.io/miniconda/Miniconda3-${version}-Linux-x86_64.sh";
-
sha256 = "1rklq81s9v7xz1q0ha99w2sl6kyc5vhk6b21cza0jr3b8cgz0lam";
+
sha256 = "1gn43z1y5zw4yv93q1qajwbmmqs83wx5ls5x4i4llaciba4j6sqd";
};
conda = runCommand "conda-install" { buildInputs = [ makeWrapper ]; }
···
'';
in
buildFHSUserEnv {
-
name = "conda-shell-${version}";
+
name = "conda-shell";
targetPkgs = pkgs: (builtins.concatLists [ [ conda ] condaDeps extraPkgs]);
profile = ''
# Add conda to PATH
+3 -3
pkgs/tools/package-management/home-manager/default.nix
···
stdenv.mkDerivation rec {
name = "home-manager-${version}";
-
version = "2019-05-24";
+
version = "2019-06-25";
src = fetchFromGitHub {
owner = "rycee";
repo = "home-manager";
-
rev = "d726afd9e45246fe68cfff0af80600ea26bd79fe";
-
sha256 = "1pwq475s6bbzhqbdx5v68gnlh02654r7apskl1s9lpxb9s5rg0hf";
+
rev = "95d55b8da152f1efffb7713c82ead83a3fcf476d";
+
sha256 = "1zbx051rc0b880wjl832m9sliwrhrm1dbdxw8734gvc0pfz6qwn1";
};
nativeBuildInputs = [ makeWrapper ];
+3 -3
pkgs/tools/package-management/nix/default.nix
···
nixUnstable = lib.lowPrio (callPackage common rec {
name = "nix-2.3${suffix}";
-
suffix = "pre6631_e58a7144";
+
suffix = "pre6779_324a5dc9";
src = fetchFromGitHub {
owner = "NixOS";
repo = "nix";
-
rev = "e58a71442ad4a538b48fc7a9938c3690628c4741";
-
sha256 = "1hbjhnvjbh8bi8cjjgyrj4z1gw03ws12m2wi5azzj3rmhnh4c802";
+
rev = "324a5dc92f8e50e6b637c5e67dea48c80be10837";
+
sha256 = "1g8gbam585q4kx8ilbx23ip64jw0r829i374qy0l8kvr8mhvj55r";
};
fromGit = true;
+10 -3
pkgs/tools/security/gnupg/22.nix
···
-
{ fetchurl, stdenv, pkgconfig, libgcrypt, libassuan, libksba, libgpgerror
-
, libiconv, npth, gettext, texinfo, pcsclite, sqlite
+
{ fetchurl, fetchpatch, stdenv, pkgconfig, libgcrypt, libassuan, libksba
+
, libgpgerror, libiconv, npth, gettext, texinfo, pcsclite, sqlite
, buildPackages
# Each of the dependencies below are optional.
···
patches = [
./fix-libusb-include-path.patch
+
(fetchpatch {
+
url = https://files.gnupg.net/file/data/qmxjhc6kuja3orybj7st/PHID-FILE-vvzlnw36427pdnug2amc/file;
+
sha256 = "13snxkmlgmvn0rgxh5k2sgxkp5mbxqiznzm45sw649nvs3ccghq8";
+
})
];
-
postPatch = stdenv.lib.optionalString stdenv.isLinux ''
+
postPatch = ''
+
sed -i 's,hkps://hkps.pool.sks-keyservers.net,hkps://keys.openpgp.org,g' \
+
configure doc/dirmngr.texi doc/gnupg.info-1
+
'' + stdenv.lib.optionalString stdenv.isLinux ''
sed -i 's,"libpcsclite\.so[^"]*","${stdenv.lib.getLib pcsclite}/lib/libpcsclite.so",g' scd/scdaemon.c
''; #" fix Emacs syntax highlighting :-(
+2 -2
pkgs/tools/security/lynis/default.nix
···
stdenv.mkDerivation rec {
pname = "lynis";
-
version = "2.7.4";
+
version = "2.7.5";
name = "${pname}-${version}";
src = fetchFromGitHub {
owner = "CISOfy";
repo = "${pname}";
rev = "${version}";
-
sha256 = "1jjk5hcxmp4f4ppsljiq95l2ln6b03azydap3b35lsvxkjybv88k";
+
sha256 = "1lkkbvxm0rgrrlx0szaxmf8ghc3d26wal96sgqk84m37mvs1f7p0";
};
nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/tools/security/tpm2-tools/default.nix
···
stdenv.mkDerivation rec {
pname = "tpm2-tools";
-
version = "3.1.4";
+
version = "3.2.0";
src = fetchurl {
url = "https://github.com/tpm2-software/${pname}/releases/download/${version}/${pname}-${version}.tar.gz";
-
sha256 = "0cv09wnf7sw17z1n898w0zmk58y8b1why58m63hqx5d7x4054l9g";
+
sha256 = "057gg84zly6gjp6ypj6bv6zzmnr77cqsygl8x0147cylwa1ywydd";
};
nativeBuildInputs = [ pandoc pkgconfig ];
+2 -2
pkgs/tools/system/bfs/default.nix
···
stdenv.mkDerivation rec {
name = "bfs-${version}";
-
version = "1.4.1";
+
version = "1.5";
src = fetchFromGitHub {
repo = "bfs";
owner = "tavianator";
rev = version;
-
sha256 = "1y5w8gws4j1i334ap4rsl64scr0hlyrdkdl7ffaghs8fqa6mjmsb";
+
sha256 = "0lyrxbmfr4ckz4hx5dgz8xbq479l5rlyrqf205v6c82cap4zyv4x";
};
buildInputs = stdenv.lib.optionals stdenv.isLinux [ libcap acl ];
+3 -3
pkgs/tools/system/netdata/default.nix
···
{ stdenv, fetchurl, autoreconfHook, pkgconfig, zlib, libuuid, libossp_uuid, CoreFoundation, IOKit, lm_sensors }:
stdenv.mkDerivation rec{
-
version = "1.11.1";
+
version = "1.15.0";
name = "netdata-${version}";
src = fetchurl {
url = "https://github.com/netdata/netdata/releases/download/v${version}/netdata-v${version}.tar.gz";
-
sha256 = "0djph4586cc14vavj6za6k255lscf3b415dx8k45q3nsc2hb4l01";
+
sha256 = "04frfy08k6m70y3s8j3gvnfnqqd9d5mwj3j6krk9dsh34332abvx";
};
nativeBuildInputs = [ autoreconfHook pkgconfig ];
···
postInstall = stdenv.lib.optionalString (!stdenv.isDarwin) ''
# rename this plugin so netdata will look for setuid wrapper
mv $out/libexec/netdata/plugins.d/apps.plugin \
-
$out/libexec/netdata/plugins.d/apps.plugin.org
+
$out/libexec/netdata/plugins.d/apps.plugin.org
'';
preConfigure = ''
+44 -37
pkgs/tools/system/netdata/no-files-in-etc-and-var.patch
···
-
diff -ruN orig/Makefile.am new/Makefile.am
-
--- orig/Makefile.am 2018-11-02 08:56:21.000000000 -0500
-
+++ new/Makefile.am 2018-11-16 10:30:22.000000000 -0500
-
@@ -99,10 +99,10 @@
+
diff --git a/Makefile.am b/Makefile.am
+
index f2087bb..7a70cfb 100644
+
--- a/Makefile.am
+
+++ b/Makefile.am
+
@@ -116,10 +116,10 @@ AM_CFLAGS = \
$(NULL)
sbin_PROGRAMS =
-
-dist_cache_DATA = installer/.keep
-
-dist_varlib_DATA = installer/.keep
-
-dist_registry_DATA = installer/.keep
-
-dist_log_DATA = installer/.keep
+
-dist_cache_DATA = packaging/installer/.keep
+
-dist_varlib_DATA = packaging/installer/.keep
+
-dist_registry_DATA = packaging/installer/.keep
+
-dist_log_DATA = packaging/installer/.keep
+dist_cache_DATA =
+dist_varlib_DATA =
+dist_registry_DATA =
···
plugins_PROGRAMS =
LIBNETDATA_FILES = \
-
diff -ruN orig/collectors/charts.d.plugin/Makefile.am new/collectors/charts.d.plugin/Makefile.am
-
--- orig/collectors/charts.d.plugin/Makefile.am 2018-11-02 08:56:21.000000000 -0500
-
+++ new/collectors/charts.d.plugin/Makefile.am 2018-11-16 11:16:47.000000000 -0500
-
@@ -32,7 +32,6 @@
+
diff --git a/collectors/charts.d.plugin/Makefile.am b/collectors/charts.d.plugin/Makefile.am
+
index 2989b4b..64de7d6 100644
+
--- a/collectors/charts.d.plugin/Makefile.am
+
+++ b/collectors/charts.d.plugin/Makefile.am
+
@@ -32,7 +32,6 @@ dist_charts_DATA = \
userchartsconfigdir=$(configdir)/charts.d
dist_userchartsconfig_DATA = \
-
- $(top_srcdir)/installer/.keep \
+
- .keep \
$(NULL)
chartsconfigdir=$(libconfigdir)/charts.d
-
diff -ruN orig/collectors/node.d.plugin/Makefile.am new/collectors/node.d.plugin/Makefile.am
-
--- orig/collectors/node.d.plugin/Makefile.am 2018-11-02 08:56:21.000000000 -0500
-
+++ new/collectors/node.d.plugin/Makefile.am 2018-11-16 11:16:42.000000000 -0500
-
@@ -23,7 +23,6 @@
+
diff --git a/collectors/node.d.plugin/Makefile.am b/collectors/node.d.plugin/Makefile.am
+
index 3b5a0a5..b7abe01 100644
+
--- a/collectors/node.d.plugin/Makefile.am
+
+++ b/collectors/node.d.plugin/Makefile.am
+
@@ -23,7 +23,6 @@ dist_noinst_DATA = \
usernodeconfigdir=$(configdir)/node.d
dist_usernodeconfig_DATA = \
-
- $(top_srcdir)/installer/.keep \
+
- .keep \
$(NULL)
nodeconfigdir=$(libconfigdir)/node.d
-
diff -ruN orig/collectors/python.d.plugin/Makefile.am new/collectors/python.d.plugin/Makefile.am
-
--- orig/collectors/python.d.plugin/Makefile.am 2018-11-02 08:56:21.000000000 -0500
-
+++ new/collectors/python.d.plugin/Makefile.am 2018-11-16 10:56:06.000000000 -0500
-
@@ -29,7 +29,6 @@
+
diff --git a/collectors/python.d.plugin/Makefile.am b/collectors/python.d.plugin/Makefile.am
+
index 652a35d..cf4b2cc 100644
+
--- a/collectors/python.d.plugin/Makefile.am
+
+++ b/collectors/python.d.plugin/Makefile.am
+
@@ -29,7 +29,6 @@ dist_python_DATA = \
userpythonconfigdir=$(configdir)/python.d
dist_userpythonconfig_DATA = \
-
- $(top_srcdir)/installer/.keep \
+
- .keep \
$(NULL)
pythonconfigdir=$(libconfigdir)/python.d
-
diff -ruN orig/collectors/statsd.plugin/Makefile.am new/collectors/statsd.plugin/Makefile.am
-
--- orig/collectors/statsd.plugin/Makefile.am 2018-11-02 08:56:21.000000000 -0500
-
+++ new/collectors/statsd.plugin/Makefile.am 2018-11-16 10:53:04.000000000 -0500
-
@@ -15,6 +15,5 @@
+
diff --git a/collectors/statsd.plugin/Makefile.am b/collectors/statsd.plugin/Makefile.am
+
index e63bf98..0f59782 100644
+
--- a/collectors/statsd.plugin/Makefile.am
+
+++ b/collectors/statsd.plugin/Makefile.am
+
@@ -14,6 +14,5 @@ dist_statsdconfig_DATA = \
userstatsdconfigdir=$(configdir)/statsd.d
dist_userstatsdconfig_DATA = \
-
- $(top_srcdir)/installer/.keep \
+
- .keep \
$(NULL)
-
diff -ruN orig/health/Makefile.am new/health/Makefile.am
-
--- orig/health/Makefile.am 2018-11-02 08:56:21.000000000 -0500
-
+++ new/health/Makefile.am 2018-11-16 10:56:30.000000000 -0500
-
@@ -16,7 +16,6 @@
+
diff --git a/health/Makefile.am b/health/Makefile.am
+
index 62a4c6d..4d651df 100644
+
--- a/health/Makefile.am
+
+++ b/health/Makefile.am
+
@@ -16,7 +16,6 @@ dist_noinst_DATA = \
userhealthconfigdir=$(configdir)/health.d
dist_userhealthconfig_DATA = \
-
- $(top_srcdir)/installer/.keep \
+
- .keep \
$(NULL)
healthconfigdir=$(libconfigdir)/health.d
-
diff -ruN orig/system/Makefile.am new/system/Makefile.am
-
--- orig/system/Makefile.am 2018-11-02 08:56:21.000000000 -0500
-
+++ new/system/Makefile.am 2018-11-16 10:29:21.000000000 -0500
-
@@ -17,10 +17,6 @@
+
diff --git a/system/Makefile.am b/system/Makefile.am
+
index b085dca..ccfa588 100644
+
--- a/system/Makefile.am
+
+++ b/system/Makefile.am
+
@@ -17,10 +17,6 @@ CLEANFILES = \
include $(top_srcdir)/build/subst.inc
SUFFIXES = .in
+2 -2
pkgs/tools/system/syslog-ng/default.nix
···
stdenv.mkDerivation rec {
name = "${pname}-${version}";
-
version = "3.21.1";
+
version = "3.22.1";
src = fetchurl {
url = "https://github.com/balabit/${pname}/releases/download/${name}/${name}.tar.gz";
-
sha256 = "09fdjschp3shy8xp0hh5fh6qv25433zd0biv0igkmkvrmnjks5ld";
+
sha256 = "1j3l9pn3lf9w87vvwbnxk098gprbqzmfpfw1rch46mgsfqvl8mh6";
};
nativeBuildInputs = [ pkgconfig which ];
+2 -2
pkgs/tools/text/languagetool/default.nix
···
stdenv.mkDerivation rec {
name = "LanguageTool-${version}";
-
version = "4.4";
+
version = "4.6";
src = fetchzip {
url = "https://www.languagetool.org/download/${name}.zip";
-
sha256 = "0cdrh59jcwrj5zp2lhbi9wp29pzabp35i8f7lbrs6z1wib6mgmp1";
+
sha256 = "1z3i6kz1dz7dw2ykyk1yamrv8h5h330sfyl037hhyy9hw6p30rhg";
};
nativeBuildInputs = [ makeWrapper ];
buildInputs = [ jre ];
+1
pkgs/tools/typesetting/asciidoctor/Gemfile
···
gem 'asciidoctor-mathematical'
gem 'coderay'
gem 'pygments.rb'
+
gem 'rouge'
+3 -1
pkgs/tools/typesetting/asciidoctor/Gemfile.lock
···
prawn-templates (0.1.1)
pdf-reader (~> 2.0)
prawn (~> 2.2)
-
public_suffix (3.1.0)
+
public_suffix (3.1.1)
pygments.rb (1.2.1)
multi_json (>= 1.0.0)
+
rouge (3.5.1)
ruby-enum (0.7.2)
i18n
ruby-rc4 (0.1.5)
···
asciidoctor-pdf
coderay
pygments.rb
+
rouge
BUNDLED WITH
1.17.2
+8 -2
pkgs/tools/typesetting/asciidoctor/default.nix
···
-
{ stdenv, lib, bundlerApp, ruby
+
{ stdenv, lib, bundlerApp, ruby, bundix, mkShell
# Dependencies of the 'mathematical' package
, cmake, bison, flex, glib, pkgconfig, cairo
, pango, gdk_pixbuf, libxml2, python3, patchelf
}:
-
bundlerApp {
+
bundlerApp rec {
inherit ruby;
pname = "asciidoctor";
gemdir = ./.;
···
"$soPath"
'';
};
+
};
+
+
passthru.updateShell = mkShell {
+
buildInputs = (gemConfig.mathematical {}).buildInputs ++ [
+
bundix
+
];
};
meta = with lib; {
+12 -2
pkgs/tools/typesetting/asciidoctor/gemset.nix
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "1c7c5xxkx91hwj4572hbnyvxmydb90q69wlpr2l0dxrmwx2p365l";
+
sha256 = "0g9ds2ffzljl6jjmkjffwxc1z6lh5nkqqmhhkxjk71q5ggv0rkpm";
type = "gem";
};
-
version = "3.1.0";
+
version = "3.1.1";
};
"pygments.rb" = {
dependencies = ["multi_json"];
···
type = "gem";
};
version = "1.2.1";
+
};
+
rouge = {
+
groups = ["default"];
+
platforms = [];
+
source = {
+
remotes = ["https://rubygems.org"];
+
sha256 = "0yfhazlhjc4abgzhkgq8zqmdphvkh52211widkl4zhsbhqh8wg2q";
+
type = "gem";
+
};
+
version = "3.5.1";
};
ruby-enum = {
dependencies = ["i18n"];
+6
pkgs/tools/typesetting/asciidoctor/update.sh
···
+
#!/usr/bin/env bash
+
rm gemset.nix Gemfile.lock
+
nix-shell ../../../.. -A asciidoctor.updateShell --run '
+
bundix -m --bundle-pack-path $TMPDIR/asciidoctor-ruby-bundle
+
'
+
rm -r .bundle
+1
pkgs/top-level/aliases.nix
···
qt_gstreamer1 = qt-gstreamer1; # added 2017-02
quake3game = ioquake3; # added 2016-01-14
qwt6 = libsForQt5.qwt; # added 2015-12-19
+
qtpfsgui = throw "Is now luminanceHDR"; # added 2019-06-26
rdiff_backup = rdiff-backup; # added 2014-11-23
rdmd = dtools; # added 2017-08-19
rhc = throw "deprecated in 2019-04-09: abandoned by upstream.";
+50 -21
pkgs/top-level/all-packages.nix
···
proto-contrib = callPackage ../development/tools/proto-contrib {};
+
protoc-gen-doc = callPackage ../development/tools/protoc-gen-doc {};
+
demoit = callPackage ../servers/demoit { };
diffPlugins = (callPackage ../build-support/plugins.nix {}).diffPlugins;
···
graph-easy = callPackage ../tools/graphics/graph-easy { };
packer = callPackage ../development/tools/packer { };
+
+
packr = callPackage ../development/libraries/packr { };
pet = callPackage ../development/tools/pet { };
···
link-grammar = callPackage ../tools/text/link-grammar { };
+
linuxptp = callPackage ../os-specific/linux/linuxptp { };
+
loadwatch = callPackage ../tools/system/loadwatch { };
loccount = callPackage ../development/tools/misc/loccount { };
···
procs = callPackage ../tools/admin/procs {
inherit (darwin.apple_sdk.frameworks) Security;
};
+
+
psrecord = python3Packages.callPackage ../tools/misc/psrecord {};
scour = with python3Packages; toPythonApplication scour;
···
tridactyl-native = callPackage ../tools/networking/tridactyl-native { };
+
trompeloeil = callPackage ../development/libraries/trompeloeil { };
+
uudeview = callPackage ../tools/misc/uudeview { };
uutils-coreutils = callPackage ../tools/misc/uutils-coreutils {
···
kalibrate-hackrf = callPackage ../applications/radio/kalibrate-hackrf { };
-
kakoune = callPackage ../applications/editors/kakoune { };
+
wrapKakoune = callPackage ../applications/editors/kakoune/wrapper.nix { };
+
kakounePlugins = callPackage ../applications/editors/kakoune/plugins.nix { };
+
kakoune-unwrapped = callPackage ../applications/editors/kakoune { };
+
kakoune = wrapKakoune kakoune-unwrapped { };
kbdd = callPackage ../applications/window-managers/kbdd { };
···
};
nodejs-12_x = callPackage ../development/web/nodejs/v12.nix {
openssl = openssl_1_1;
-
icu = icu63;
};
nodejs-slim-12_x = callPackage ../development/web/nodejs/v12.nix {
enableNpm = false;
openssl = openssl_1_1;
-
icu = icu63;
};
# Update this when adding the newest nodejs major version!
···
noip = callPackage ../tools/networking/noip { };
-
nomad = callPackage ../applications/networking/cluster/nomad {
-
buildGoPackage = buildGo110Package;
-
};
+
nomad = callPackage ../applications/networking/cluster/nomad { };
notable = callPackage ../applications/misc/notable { };
···
timelapse-deflicker = callPackage ../applications/graphics/timelapse-deflicker { };
timetrap = callPackage ../applications/office/timetrap { };
+
+
timetable = callPackage ../applications/office/timetable { };
tzupdate = callPackage ../applications/misc/tzupdate { };
···
bootjdk = callPackage ../development/compilers/openjdk/bootstrap.nix { version = "10"; };
+
openjfx11 =
+
if stdenv.isDarwin then
+
null
+
else
+
callPackage ../development/compilers/openjdk/openjfx/11.nix {
+
openjdk = openjdk11;
+
};
+
openjdk8 =
if stdenv.isDarwin then
callPackage ../development/compilers/openjdk/darwin/8.nix { }
···
callPackage ../development/compilers/openjdk/darwin/11.nix { }
else
callPackage ../development/compilers/openjdk/11.nix {
+
openjfx = openjfx11;
inherit (gnome2) GConf gnome_vfs;
};
···
};
pony-stable = callPackage ../development/compilers/ponyc/pony-stable.nix { };
+
+
qbe = callPackage ../development/compilers/qbe { };
rgbds = callPackage ../development/compilers/rgbds { };
···
drake = callPackage ../development/tools/build-managers/drake { };
drip = callPackage ../development/tools/drip { };
+
+
drm_info = callPackage ../development/tools/drm_info { };
drush = callPackage ../development/tools/misc/drush { };
···
influxdb = callPackage ../servers/nosql/influxdb { };
-
mysql55 = callPackage ../servers/sql/mysql/5.5.x.nix {
-
inherit (darwin) cctools;
-
inherit (darwin.apple_sdk.frameworks) CoreServices;
-
};
-
mysql57 = callPackage ../servers/sql/mysql/5.7.x.nix {
inherit (darwin) cctools developer_cmds;
inherit (darwin.apple_sdk.frameworks) CoreServices;
···
enableStatic = true;
+
+
roon-server = callPackage ../servers/roon-server { };
s6 = skawarePackages.s6;
···
iotop = callPackage ../os-specific/linux/iotop { };
iproute = callPackage ../os-specific/linux/iproute { };
+
+
iproute_mptcp = callPackage ../os-specific/linux/iproute/mptcp.nix { };
iputils = callPackage ../os-specific/linux/iputils { };
···
nettools = if stdenv.isLinux then callPackage ../os-specific/linux/net-tools { }
else unixtools.nettools;
+
nettools_mptcp = callPackage ../os-specific/linux/net-tools/mptcp.nix { };
+
nftables = callPackage ../os-specific/linux/nftables { };
noah = callPackage ../os-specific/darwin/noah {
···
semodule-utils = callPackage ../os-specific/linux/semodule-utils { };
-
powerdns = callPackage ../servers/dns/powerdns { };
+
powerdns = callPackage ../servers/dns/powerdns { libressl = libressl_2_8; };
dnsdist = callPackage ../servers/dns/dnsdist { };
···
else unixtools.procps;
procdump = callPackage ../os-specific/linux/procdump { };
+
+
prototool = callPackage ../development/tools/prototool { };
qemu_kvm = lowPrio (qemu.override { hostCpuOnly = true; });
···
agave = callPackage ../data/fonts/agave { };
aileron = callPackage ../data/fonts/aileron { };
+
+
amiri = callPackage ../data/fonts/amiri { };
andagii = callPackage ../data/fonts/andagii { };
···
mercurialFull = appendToName "full" (pkgs.mercurial.override { guiSupport = true; });
-
merkaartor = libsForQt5.callPackage ../applications/misc/merkaartor { };
+
merkaartor = libsForQt59.callPackage ../applications/misc/merkaartor { };
meshlab = libsForQt5.callPackage ../applications/graphics/meshlab { };
···
vivaldi-ffmpeg-codecs = callPackage ../applications/networking/browsers/vivaldi/ffmpeg-codecs.nix {};
+
vivaldi-widevine = callPackage ../applications/networking/browsers/vivaldi/widevine.nix { };
+
openmpt123 = callPackage ../applications/audio/openmpt123 { };
opusfile = callPackage ../applications/audio/opusfile { };
···
qtox = libsForQt5.callPackage ../applications/networking/instant-messengers/qtox { };
qtpass = libsForQt5.callPackage ../applications/misc/qtpass { };
-
-
qtpfsgui = callPackage ../applications/graphics/qtpfsgui { };
qtractor = libsForQt5.callPackage ../applications/audio/qtractor { };
···
racer = callPackage ../games/racer { };
+
redeclipse = callPackage ../games/redeclipse { };
+
residualvm = callPackage ../games/residualvm { };
rftg = callPackage ../games/rftg { };
···
niftyreg = callPackage ../applications/science/biology/niftyreg { };
niftyseg = callPackage ../applications/science/biology/niftyseg { };
+
+
octopus-caller = callPackage ../applications/science/biology/octopus { };
paml = callPackage ../applications/science/biology/paml { };
···
ecl-fasl = true;
sbcl = null;
-
# old version temporarily kept for sage
-
maxima-ecl-5_41 = callPackage ../applications/science/math/maxima/5.41.nix {
-
ecl = ecl_16_1_2;
-
ecl-fasl = true;
-
sbcl = null;
-
};
mxnet = callPackage ../applications/science/math/mxnet {
inherit (linuxPackages) nvidia_x11;
···
bemenu = callPackage ../applications/misc/bemenu { };
dapper = callPackage ../development/tools/dapper { };
+
+
kube3d = callPackage ../applications/networking/cluster/kube3d {};
+3 -3
pkgs/top-level/coq-packages.nix
···
mathcomp-ssreflect_1_9 mathcomp-fingroup_1_9 mathcomp-algebra_1_9
mathcomp-solvable_1_9 mathcomp-field_1_9 mathcomp-character_1_9;
inherit (callPackage ../development/coq-modules/mathcomp/extra.nix { })
-
mathcompExtraGen multinomials
+
mathcompExtraGen multinomials coqeal
mathcomp-finmap mathcomp-bigenough mathcomp-analysis
-
mathcomp-multinomials mathcomp-real-closed
+
mathcomp-multinomials mathcomp-real-closed mathcomp-coqeal
mathcomp_1_7-finmap mathcomp_1_7-bigenough mathcomp_1_7-analysis
mathcomp_1_7-multinomials mathcomp_1_7-real-closed
mathcomp_1_7-finmap_1_0
mathcomp_1_8-finmap mathcomp_1_8-bigenough mathcomp_1_8-analysis
-
mathcomp_1_8-multinomials mathcomp_1_8-real-closed
+
mathcomp_1_8-multinomials mathcomp_1_8-real-closed mathcomp_1_8-coqeal
mathcomp_1_9-finmap mathcomp_1_9-bigenough mathcomp_1_9-analysis
mathcomp_1_9-multinomials mathcomp_1_9-real-closed;
+5 -5
pkgs/top-level/dotnet-packages.nix
···
Boogie = buildDotnetPackage rec {
baseName = "Boogie";
-
version = "2018-05-28";
+
version = "2019-06-20";
name = "${baseName}-unstable-${version}";
src = fetchFromGitHub {
owner = "boogie-org";
repo = "boogie";
-
rev = "fc97aac639505f46cda7904dae95c9557716d037";
-
sha256 = "1hjksc5sapw1shxjwg0swja5afman8i15wnv5b6rzkqd4mg8y6nz";
+
rev = "2e8fae4dc1724d8f9e7b1f877116e56b0773337e";
+
sha256 = "01wjps3yfx8q0qy0zrmmfd1ixjxi2dhkn1wfazb5qm2slav39dp2";
};
# emulate `nuget restore Source/Boogie.sln`
···
Dafny = buildDotnetPackage rec {
baseName = "Dafny";
-
version = "2.1.0";
+
version = "2.3.0";
src = fetchurl {
url = "https://github.com/Microsoft/dafny/archive/v${version}.tar.gz";
-
sha256 = "1iyhy0zpi6wvqif7826anzgdipgsy5bk775ds9qqwfw27j7x6fy5";
+
sha256 = "0s6ihx32kda7400lvdrq60l46c11nki8b6kalir2g4ic508f6ypa";
};
postPatch = ''
+1 -1
pkgs/top-level/emacs-packages.nix
···
postInstall = ''
mkdir -p $out
mv $out/share/emacs/site-lisp/elpa/*/server/bin $out
-
rm -rf $out/share/emacs/site-lisp/*/server
+
rm -rf $out/share/emacs/site-lisp/elpa/*/server
'';
preCheck = ''
cd source/server
+2 -2
pkgs/top-level/perl-packages.nix
···
SysVirt = buildPerlModule rec {
pname = "Sys-Virt";
-
version = "4.10.0";
+
version = "5.4.0";
src = assert version == pkgs.libvirt.version; pkgs.fetchgit {
url = git://libvirt.org/libvirt-perl.git;
rev = "v${version}";
-
sha256 = "1dfwq4d46kx18lz27rb3jkxb0g1hirpq70vr4572sc38rybpq59v";
+
sha256 = "0csg10mydcif2l0qf16nlphq6ih5378nk6dk1vznf5bspws2ch7a";
nativeBuildInputs = [ pkgs.pkgconfig ];
buildInputs = [ pkgs.libvirt CPANChanges TestPod TestPodCoverage XMLXPath ];
+2
pkgs/top-level/python-packages.nix
···
google-music-utils = callPackage ../development/python-modules/google-music-utils { };
+
google-pasta = callPackage ../development/python-modules/google-pasta { };
+
gpapi = callPackage ../development/python-modules/gpapi { };
gplaycli = callPackage ../development/python-modules/gplaycli { };