Merge master into haskell-updates

Changed files
+1488 -693
doc
builders
languages-frameworks
maintainers
nixos
modules
services
backup
mail
misc
monitoring
prometheus
web-servers
lighttpd
pkgs
applications
build-support
data
fonts
ocr-a
themes
greybird
desktops
xfce
applications
xfdashboard
core
thunar
development
compilers
interpreters
libraries
capnproto
libarchive-qt
libgpg-error
mapnik
nsss
proj
skalibs
utmps
lua-modules
misc
ocaml-modules
batteries
containers
gen
iter
lru
psq
qcheck
reason-native
stdint
stringext
syslog-message
python-modules
cartopy
fe25519
ge25519
geopandas
lupupy
mypy-boto3-s3
phonenumbers
pyproj
r-modules
tools
build-managers
shards
misc
bashdb
sigrok-cli
sumneko-lua-language-server
misc
emulators
vim-plugins
vscode-extensions
os-specific
servers
home-assistant
http
lighttpd
monitoring
prometheus
zabbix
teleport
web-apps
discourse
plugins
discourse-calendar
discourse-canned-replies
discourse-checklist
discourse-github
discourse-math
discourse-solved
discourse-spoiler-alert
discourse-yearly-review
rubyEnv
vikunja
tools
filesystems
apfsprogs
inputmethods
misc
execline
fclones
fdtools
s6-portable-utils
networking
s6-dns
s6-networking
ytcc
system
top-level
+1 -1
doc/builders/fetchers.chapter.md
···
Because fixed output derivations are _identified_ by their hash, a common mistake is to update a fetcher's URL or a version parameter, without updating the hash. **This will cause the old contents to be used.** So remember to always invalidate the hash argument.
-
For those who develop and maintain fetcheres, a similar problem arises with changes to the implementation of a fetcher. These may cause a fixed output derivation to fail, but won't normally be caught by tests because the supposed output is already in the store or cache. For the purpose of testing, you can use a trick that is embodied by the [`invalidateFetcherByDrvHash`](#sec-pkgs-invalidateFetcherByDrvHash) function. It uses the derivation `name` to create a unique output path per fetcher implementation, defeating the caching precisely where it would be harmful.
+
For those who develop and maintain fetchers, a similar problem arises with changes to the implementation of a fetcher. These may cause a fixed output derivation to fail, but won't normally be caught by tests because the supposed output is already in the store or cache. For the purpose of testing, you can use a trick that is embodied by the [`invalidateFetcherByDrvHash`](#sec-pkgs-invalidateFetcherByDrvHash) function. It uses the derivation `name` to create a unique output path per fetcher implementation, defeating the caching precisely where it would be harmful.
## `fetchurl` and `fetchzip` {#fetchurl}
+12 -8
doc/languages-frameworks/r.section.md
···
## Updating the package set {#updating-the-package-set}
+
There is a script and associated environment for regenerating the package
+
sets and synchronising the rPackages tree to the current CRAN and matching
+
BIOC release. These scripts are found in the `pkgs/development/r-modules`
+
directory and executed as follows:
+
```bash
nix-shell generate-shell.nix
···
mv bioc-experiment-packages.nix.new bioc-experiment-packages.nix
```
-
`generate-r-packages.R <repo>` reads `<repo>-packages.nix`, therefor the renaming.
+
`generate-r-packages.R <repo>` reads `<repo>-packages.nix`, therefore
+
the renaming.
-
## Testing if the Nix-expression could be evaluated {#testing-if-the-nix-expression-could-be-evaluated}
-
-
```bash
-
nix-build test-evaluation.nix --dry-run
-
```
-
-
If this exits fine, the expression is ok. If not, you have to edit `default.nix`
+
Some packages require overrides to specify external dependencies or other
+
patches and special requirements. These overrides are specified in the
+
`pkgs/development/r-modules/default.nix` file. As the `*-packages.nix`
+
contents are automatically generated it should not be edited and broken
+
builds should be addressed using overrides.
+1 -1
maintainers/scripts/luarocks-packages.csv
···
luazip,,,,,,
lua-yajl,,,,,,pstn
luuid,,,,,,
-
luv,,,,1.30.0-0,,
+
luv,,,,1.42.0-0,,
lyaml,,,,,,lblasc
markdown,,,,,,
mediator_lua,,,,,,
+65 -14
nixos/modules/services/backup/syncoid.nix
···
lib.concatMapStrings (s: if lib.isList s then "-" else s)
(builtins.split "[^a-zA-Z0-9_.\\-]+" name);
-
# Function to build "zfs allow" and "zfs unallow" commands for the
-
# filesystems we've delegated permissions to.
-
buildAllowCommand = zfsAction: permissions: dataset: lib.escapeShellArgs [
-
# Here we explicitly use the booted system to guarantee the stable API needed by ZFS
-
"-+/run/booted-system/sw/bin/zfs"
-
zfsAction
-
cfg.user
-
(concatStringsSep "," permissions)
-
dataset
-
];
+
# Function to build "zfs allow" commands for the filesystems we've
+
# delegated permissions to. It also checks if the target dataset
+
# exists before delegating permissions, if it doesn't exist we
+
# delegate it to the parent dataset. This should solve the case of
+
# provisoning new datasets.
+
buildAllowCommand = permissions: dataset: (
+
"-+${pkgs.writeShellScript "zfs-allow-${dataset}" ''
+
# Here we explicitly use the booted system to guarantee the stable API needed by ZFS
+
+
# Run a ZFS list on the dataset to check if it exists
+
if ${lib.escapeShellArgs [
+
"/run/booted-system/sw/bin/zfs"
+
"list"
+
dataset
+
]} 2> /dev/null; then
+
${lib.escapeShellArgs [
+
"/run/booted-system/sw/bin/zfs"
+
"allow"
+
cfg.user
+
(concatStringsSep "," permissions)
+
dataset
+
]}
+
else
+
${lib.escapeShellArgs [
+
"/run/booted-system/sw/bin/zfs"
+
"allow"
+
cfg.user
+
(concatStringsSep "," permissions)
+
# Remove the last part of the path
+
(builtins.dirOf dataset)
+
]}
+
fi
+
''}"
+
);
+
+
# Function to build "zfs unallow" commands for the filesystems we've
+
# delegated permissions to. Here we unallow both the target but also
+
# on the parent dataset because at this stage we have no way of
+
# knowing if the allow command did execute on the parent dataset or
+
# not in the pre-hook. We can't run the same if in the post hook
+
# since the dataset should have been created at this point.
+
buildUnallowCommand = permissions: dataset: (
+
"-+${pkgs.writeShellScript "zfs-unallow-${dataset}" ''
+
# Here we explicitly use the booted system to guarantee the stable API needed by ZFS
+
${lib.escapeShellArgs [
+
"/run/booted-system/sw/bin/zfs"
+
"unallow"
+
cfg.user
+
(concatStringsSep "," permissions)
+
dataset
+
]}
+
${lib.escapeShellArgs [
+
"/run/booted-system/sw/bin/zfs"
+
"unallow"
+
cfg.user
+
(concatStringsSep "," permissions)
+
# Remove the last part of the path
+
(builtins.dirOf dataset)
+
]}
+
''}"
+
);
in
{
···
path = [ "/run/booted-system/sw/bin/" ];
serviceConfig = {
ExecStartPre =
-
(map (buildAllowCommand "allow" c.localSourceAllow) (localDatasetName c.source)) ++
-
(map (buildAllowCommand "allow" c.localTargetAllow) (localDatasetName c.target));
+
(map (buildAllowCommand c.localSourceAllow) (localDatasetName c.source)) ++
+
(map (buildAllowCommand c.localTargetAllow) (localDatasetName c.target));
ExecStopPost =
-
(map (buildAllowCommand "unallow" c.localSourceAllow) (localDatasetName c.source)) ++
-
(map (buildAllowCommand "unallow" c.localTargetAllow) (localDatasetName c.target));
+
(map (buildUnallowCommand c.localSourceAllow) (localDatasetName c.source)) ++
+
(map (buildUnallowCommand c.localTargetAllow) (localDatasetName c.target));
ExecStart = lib.escapeShellArgs ([ "${pkgs.sanoid}/bin/syncoid" ]
++ optionals c.useCommonArgs cfg.commonArgs
++ optional c.recursive "-r"
+1 -1
nixos/modules/services/mail/postfix.nix
···
type = types.lines;
default = "";
description = "
-
Entries for the virtual alias map, cf. man-page virtual(8).
+
Entries for the virtual alias map, cf. man-page virtual(5).
";
};
+30 -9
nixos/modules/services/misc/snapper.nix
···
{
options.services.snapper = {
+
snapshotRootOnBoot = mkOption {
+
type = types.bool;
+
default = false;
+
description = ''
+
Whether to snapshot root on boot
+
'';
+
};
+
snapshotInterval = mkOption {
type = types.str;
default = "hourly";
···
Type = "dbus";
BusName = "org.opensuse.Snapper";
ExecStart = "${pkgs.snapper}/bin/snapperd";
+
CapabilityBoundingSet = "CAP_DAC_OVERRIDE CAP_FOWNER CAP_CHOWN CAP_FSETID CAP_SETFCAP CAP_SYS_ADMIN CAP_SYS_MODULE CAP_IPC_LOCK CAP_SYS_NICE";
+
LockPersonality = true;
+
NoNewPrivileges = false;
+
PrivateNetwork = true;
+
ProtectHostname = true;
+
RestrictAddressFamilies = "AF_UNIX";
+
RestrictRealtime = true;
};
};
systemd.services.snapper-timeline = {
description = "Timeline of Snapper Snapshots";
inherit documentation;
+
requires = [ "local-fs.target" ];
serviceConfig.ExecStart = "${pkgs.snapper}/lib/snapper/systemd-helper --timeline";
-
};
-
-
systemd.timers.snapper-timeline = {
-
description = "Timeline of Snapper Snapshots";
-
inherit documentation;
-
wantedBy = [ "basic.target" ];
-
timerConfig.OnCalendar = cfg.snapshotInterval;
+
startAt = cfg.snapshotInterval;
};
systemd.services.snapper-cleanup = {
···
systemd.timers.snapper-cleanup = {
description = "Cleanup of Snapper Snapshots";
inherit documentation;
-
wantedBy = [ "basic.target" ];
+
wantedBy = [ "timers.target" ];
+
requires = [ "local-fs.target" ];
timerConfig.OnBootSec = "10m";
timerConfig.OnUnitActiveSec = cfg.cleanupInterval;
};
+
+
systemd.services.snapper-boot = lib.optionalAttrs cfg.snapshotRootOnBoot {
+
description = "Take snapper snapshot of root on boot";
+
inherit documentation;
+
serviceConfig.ExecStart = "${pkgs.snapper}/bin/snapper --config root create --cleanup-algorithm number --description boot";
+
serviceConfig.type = "oneshot";
+
requires = [ "local-fs.target" ];
+
wantedBy = [ "multi-user.target" ];
+
unitConfig.ConditionPathExists = "/etc/snapper/configs/root";
+
};
+
});
}
-
+1
nixos/modules/services/monitoring/prometheus/exporters.nix
···
"dnsmasq"
"domain"
"dovecot"
+
"fastly"
"fritzbox"
"influxdb"
"json"
+41
nixos/modules/services/monitoring/prometheus/exporters/fastly.nix
···
+
{ config, lib, pkgs, options }:
+
+
with lib;
+
+
let cfg = config.services.prometheus.exporters.fastly;
+
in
+
{
+
port = 9118;
+
extraOpts = {
+
debug = mkEnableOption "Debug logging mode for fastly-exporter";
+
+
configFile = mkOption {
+
type = types.nullOr types.path;
+
default = null;
+
description = ''
+
Path to a fastly-exporter configuration file.
+
Example one can be generated with <literal>fastly-exporter --config-file-example</literal>.
+
'';
+
example = "./fastly-exporter-config.txt";
+
};
+
+
tokenPath = mkOption {
+
type = types.nullOr types.path;
+
apply = final: if final == null then null else toString final;
+
description = ''
+
A run-time path to the token file, which is supposed to be provisioned
+
outside of Nix store.
+
'';
+
};
+
};
+
serviceOpts = {
+
script = ''
+
${optionalString (cfg.tokenPath != null)
+
"export FASTLY_API_TOKEN=$(cat ${toString cfg.tokenPath})"}
+
${pkgs.fastly-exporter}/bin/fastly-exporter \
+
-endpoint http://${cfg.listenAddress}:${cfg.port}/metrics
+
${optionalString cfg.debug "-debug true"} \
+
${optionalString cfg.configFile "-config-file ${cfg.configFile}"}
+
'';
+
};
+
}
+13 -1
nixos/modules/services/web-servers/lighttpd/default.nix
···
"mod_rrdtool"
"mod_accesslog"
# Remaining list of modules, order assumed to be unimportant.
+
"mod_authn_dbi"
"mod_authn_file"
"mod_authn_gssapi"
"mod_authn_ldap"
"mod_authn_mysql"
+
"mod_authn_pam"
+
"mod_authn_sasl"
"mod_cml"
"mod_deflate"
"mod_evasive"
···
type = types.bool;
description = ''
Enable the lighttpd web server.
+
'';
+
};
+
+
package = mkOption {
+
default = pkgs.lighttpd;
+
defaultText = "pkgs.lighttpd";
+
type = types.package;
+
description = ''
+
lighttpd package to use.
'';
};
···
description = "Lighttpd Web Server";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
-
serviceConfig.ExecStart = "${pkgs.lighttpd}/sbin/lighttpd -D -f ${configFile}";
+
serviceConfig.ExecStart = "${cfg.package}/sbin/lighttpd -D -f ${configFile}";
# SIGINT => graceful shutdown
serviceConfig.KillSignal = "SIGINT";
};
+3
pkgs/applications/audio/spot/default.nix
···
libpulseaudio
];
+
# https://github.com/xou816/spot/issues/313
+
mesonBuildType = "release";
+
postPatch = ''
chmod +x build-aux/cargo.sh
patchShebangs build-aux/cargo.sh build-aux/meson/postinstall.py
+1
pkgs/applications/editors/leo-editor/default.nix
···
longDescription = "Leo is a PIM, IDE and outliner that accelerates the work flow of programmers, authors and web designers.";
license = licenses.mit;
maintainers = with maintainers; [ leonardoce ];
+
mainProgram = "leo";
};
}
+2 -2
pkgs/applications/editors/neovim/default.nix
···
in
stdenv.mkDerivation rec {
pname = "neovim-unwrapped";
-
version = "0.5.0";
+
version = "0.5.1";
src = fetchFromGitHub {
owner = "neovim";
repo = "neovim";
rev = "v${version}";
-
sha256 = "0lgbf90sbachdag1zm9pmnlbn35964l3khs27qy4462qzpqyi9fi";
+
sha256 = "0b2gda9h14lvwahrr7kq3ix8wsw99g4ngy1grmhv5544n93ypcyk";
};
patches = [
+47 -8
pkgs/applications/gis/qgis/unwrapped.nix
···
-
{ mkDerivation, lib, fetchFromGitHub, cmake, ninja, flex, bison, proj, geos
-
, xlibsWrapper, sqlite, gsl, qwt, fcgi, python3Packages, libspatialindex
-
, libspatialite, postgresql, txt2tags, openssl, libzip, hdf5, netcdf, exiv2
-
, protobuf, qtbase, qtsensors, qca-qt5, qtkeychain, qscintilla, qtserialport
-
, qtxmlpatterns, withGrass ? true, grass, withWebKit ? true, qtwebkit }:
-
with lib;
+
{ lib
+
, mkDerivation
+
, fetchFromGitHub
+
, fetchpatch
+
, cmake
+
, ninja
+
, flex
+
, bison
+
, proj
+
, geos
+
, xlibsWrapper
+
, sqlite
+
, gsl
+
, qwt
+
, fcgi
+
, python3Packages
+
, libspatialindex
+
, libspatialite
+
, postgresql
+
, txt2tags
+
, openssl
+
, libzip
+
, hdf5
+
, netcdf
+
, exiv2
+
, protobuf
+
, qtbase
+
, qtsensors
+
, qca-qt5
+
, qtkeychain
+
, qscintilla
+
, qtserialport
+
, qtxmlpatterns
+
, withGrass ? true
+
, grass
+
, withWebKit ? true
+
, qtwebkit
+
}:
+
let
pythonBuildInputs = with python3Packages; [
qscintilla-qt5
···
];
in mkDerivation rec {
version = "3.16.10";
-
pname = "qgis";
-
name = "${pname}-unwrapped-${version}";
+
pname = "qgis-unwrapped";
src = fetchFromGitHub {
owner = "qgis";
···
rev = "final-${lib.replaceStrings [ "." ] [ "_" ] version}";
sha256 = "sha256-/lsfyTDlkZNIVHg5qgZW7qfOyTC2+1r3ZbsnQmEdy30=";
};
+
+
patches = [
+
(fetchpatch {
+
url = "https://github.com/qgis/QGIS/commit/fc1ac8bef8dcc3194857ecd32519aca4867b4fa1.patch";
+
sha256 = "106smg3drx8c7yxzfhd1c7xrq757l5cfxx8lklihyvr4a7wc9gpy";
+
})
+
];
passthru = {
inherit pythonBuildInputs;
+2 -2
pkgs/applications/graphics/feh/default.nix
···
stdenv.mkDerivation rec {
pname = "feh";
-
version = "3.7.1";
+
version = "3.7.2";
src = fetchurl {
url = "https://feh.finalrewind.org/${pname}-${version}.tar.bz2";
-
sha256 = "sha256-V6scph9XyWWVh4Bp9VDTb1GFMPiPoxt0zDnNc5+SWLY=";
+
sha256 = "sha256-hHGP0nIM9UDSRXaElP4OtOWY9Es54jJrrow2ioKcglg=";
};
outputs = [ "out" "man" "doc" ];
+2
pkgs/applications/kde/akregator.nix
···
mkDerivation {
pname = "akregator";
meta = {
+
homepage = "https://apps.kde.org/akregator/";
+
description = "KDE feed reader";
license = with lib.licenses; [ gpl2 lgpl21 fdl12 ];
maintainers = kdepimTeam;
};
+1
pkgs/applications/kde/ark/default.nix
···
qtWrapperArgs = [ "--prefix" "PATH" ":" (lib.makeBinPath extraTools) ];
meta = with lib; {
+
homepage = "https://apps.kde.org/ark/";
description = "Graphical file compression/decompression utility";
license = with licenses; [ gpl2 lgpl3 ] ++ optional unfreeEnableUnrar unfree;
maintainers = [ maintainers.ttuegel ];
+2
pkgs/applications/kde/dolphin.nix
···
mkDerivation {
pname = "dolphin";
meta = {
+
homepage = "https://apps.kde.org/dolphin/";
+
description = "KDE file manager";
license = with lib.licenses; [ gpl2 fdl12 ];
maintainers = [ lib.maintainers.ttuegel ];
broken = lib.versionOlder qtbase.version "5.14";
+1
pkgs/applications/kde/dragon.nix
···
mkDerivation {
pname = "dragon";
meta = {
+
homepage = "https://apps.kde.org/dragonplayer/";
license = with lib.licenses; [ gpl2 fdl12 ];
description = "A simple media player for KDE";
maintainers = [ lib.maintainers.jonathanreeve ];
+1
pkgs/applications/kde/elisa.nix
···
];
meta = with lib; {
+
homepage = "https://apps.kde.org/elisa/";
description = "A simple media player for KDE";
license = licenses.gpl3;
maintainers = with maintainers; [ peterhoeg ];
+2
pkgs/applications/kde/filelight.nix
···
mkDerivation {
pname = "filelight";
meta = {
+
description = "Disk usage statistics";
+
homepage = "https://apps.kde.org/filelight/";
license = with lib.licenses; [ gpl2 ];
maintainers = with lib.maintainers; [ fridh vcunat ];
broken = lib.versionOlder qtbase.version "5.13";
+2
pkgs/applications/kde/gwenview.nix
···
mkDerivation {
pname = "gwenview";
meta = {
+
homepage = "https://apps.kde.org/gwenview/";
+
description = "KDE image viewer";
license = with lib.licenses; [ gpl2 fdl12 ];
maintainers = [ lib.maintainers.ttuegel ];
};
+2
pkgs/applications/kde/k3b.nix
···
mkDerivation {
pname = "k3b";
meta = with lib; {
+
homepage = "https://apps.kde.org/k3b/";
+
description = "Disk burning application";
license = with licenses; [ gpl2Plus ];
maintainers = with maintainers; [ sander phreedom ];
platforms = platforms.linux;
+2
pkgs/applications/kde/kaddressbook.nix
···
mkDerivation {
pname = "kaddressbook";
meta = {
+
homepage = "https://apps.kde.org/kaddressbook/";
+
description = "KDE contact manager";
license = with lib.licenses; [ gpl2 lgpl21 fdl12 ];
maintainers = kdepimTeam;
};
+2
pkgs/applications/kde/kalarm.nix
···
mkDerivation {
pname = "kalarm";
meta = {
+
homepage = "https://apps.kde.org/kalarm/";
+
description = "Personal alarm scheduler";
license = with lib.licenses; [ gpl2 ];
maintainers = [ lib.maintainers.rittelle ];
};
+5 -1
pkgs/applications/kde/kamoso.nix
···
"--prefix GST_PLUGIN_PATH : ${lib.makeSearchPath "lib/gstreamer-1.0" gst}"
];
-
meta.license = with lib.licenses; [ lgpl21Only gpl3Only ];
+
meta = {
+
homepage = "https://apps.kde.org/kamoso/";
+
description = "A simple and friendly program to use your camera";
+
license = with lib.licenses; [ lgpl21Only gpl3Only ];
+
};
}
+2
pkgs/applications/kde/kate.nix
···
mkDerivation {
pname = "kate";
meta = {
+
homepage = "https://apps.kde.org/kate/";
+
description = "Advanced text editor";
license = with lib.licenses; [ gpl3 lgpl3 lgpl2 ];
maintainers = [ lib.maintainers.ttuegel ];
};
+5 -1
pkgs/applications/kde/kbreakout.nix
···
mkDerivation {
pname = "kbreakout";
-
meta.license = with lib.licenses; [ lgpl21 gpl3 ];
+
meta = {
+
homepage = "KBreakOut";
+
description = "Breakout-like game";
+
license = with lib.licenses; [ lgpl21 gpl3 ];
+
};
outputs = [ "out" "dev" ];
nativeBuildInputs = [
cmake extra-cmake-modules
+2
pkgs/applications/kde/kcachegrind.nix
···
mkDerivation {
pname = "kcachegrind";
meta = {
+
homepage = "https://apps.kde.org/kcachegrind/";
+
description = "Profiler frontend";
license = with lib.licenses; [ gpl2 ];
maintainers = with lib.maintainers; [ orivej ];
};
+2
pkgs/applications/kde/kcalc.nix
···
mkDerivation {
pname = "kcalc";
meta = {
+
homepage = "https://apps.kde.org/kcalc/";
+
description = "Scientific calculator";
license = with lib.licenses; [ gpl2 ];
maintainers = [ lib.maintainers.fridh ];
};
+1
pkgs/applications/kde/kcharselect.nix
···
mkDerivation {
pname = "kcharselect";
meta = {
+
homepage = "https://apps.kde.org/kcharselect/";
license = lib.licenses.gpl2Plus;
maintainers = [ lib.maintainers.schmittlauch ];
description = "A tool to select special characters from all installed fonts and copy them into the clipboard";
+2
pkgs/applications/kde/kcolorchooser.nix
···
mkDerivation {
pname = "kcolorchooser";
meta = {
+
homepage = "https://apps.kde.org/kcolorchooser/";
+
description = "Color chooser";
license = with lib.licenses; [ mit ];
maintainers = [ lib.maintainers.ttuegel ];
};
+2
pkgs/applications/kde/kdebugsettings.nix
···
mkDerivation {
pname = "kdebugsettings";
meta = {
+
homepage = "https://apps.kde.org/kdebugsettings/";
+
description = "KDE debug settings";
license = with lib.licenses; [ gpl2 ];
maintainers = [ lib.maintainers.rittelle ];
broken = lib.versionOlder qtbase.version "5.13";
+2
pkgs/applications/kde/kdenlive/default.nix
···
'';
meta = {
+
homepage = "https://apps.kde.org/kdenlive/";
+
description = "Video editor";
license = with lib.licenses; [ gpl2Plus ];
maintainers = with lib.maintainers; [ turion ];
};
+2
pkgs/applications/kde/kdialog.nix
···
pname = "kdialog";
meta = {
+
homepage = "https://apps.kde.org/kdialog/";
+
description = "Display dialog boxes from shell scripts";
license = with lib.licenses; [ gpl2 fdl12 ];
maintainers = with lib.maintainers; [ peterhoeg ];
};
+2
pkgs/applications/kde/kfind.nix
···
mkDerivation {
pname = "kfind";
meta = {
+
homepage = "https://apps.kde.org/kfind/";
+
description = "Find files/folders";
license = with lib.licenses; [ gpl2 ];
maintainers = [ lib.maintainers.iblech ];
};
+2
pkgs/applications/kde/kgeography.nix
···
mkDerivation {
pname = "kgeography";
meta = {
+
homepage = "https://apps.kde.org/kgeography/";
+
description = "Geography trainer";
license = with lib.licenses; [ gpl2 ];
maintainers = [ lib.maintainers.globin ];
};
+2
pkgs/applications/kde/kget.nix
···
];
meta = with lib; {
+
homepage = "https://apps.kde.org/kget/";
+
description = "Download manager";
license = with licenses; [ gpl2 ];
maintainers = with maintainers; [ peterhoeg ];
};
+2
pkgs/applications/kde/kgpg.nix
···
wrapProgram "$out/bin/kgpg" --prefix PATH : "${lib.makeBinPath [ gnupg ]}"
'';
meta = {
+
homepage = "https://apps.kde.org/kgpg/";
+
description = "Encryption tool";
license = [ lib.licenses.gpl2 ];
maintainers = [ lib.maintainers.ttuegel ];
};
+9 -5
pkgs/applications/kde/khelpcenter.nix
···
-
{
-
mkDerivation,
-
extra-cmake-modules, kdoctools,
-
grantlee, kcmutils, kconfig, kcoreaddons, kdbusaddons, ki18n,
-
kinit, khtml, kservice, xapian
+
{ lib, mkDerivation
+
, extra-cmake-modules, kdoctools
+
, grantlee, kcmutils, kconfig, kcoreaddons, kdbusaddons, ki18n
+
, kinit, khtml, kservice, xapian
}:
mkDerivation {
···
grantlee kcmutils kconfig kcoreaddons kdbusaddons khtml
ki18n kinit kservice xapian
];
+
meta = with lib; {
+
homepage = "https://apps.kde.org/help/";
+
description = "Help center";
+
license = licenses.gpl2Plus;
+
};
}
+2 -1
pkgs/applications/kde/kig.nix
···
mkDerivation {
pname = "kig";
meta = {
+
homepage = "https://apps.kde.org/kig/";
+
description = "Interactive geometry";
license = with lib.licenses; [ gpl2 ];
maintainers = with lib.maintainers; [ raskin ];
};
···
boost karchive kcrash kiconthemes kparts ktexteditor qtsvg qtxmlpatterns
];
}
-
+2
pkgs/applications/kde/kleopatra.nix
···
mkDerivation {
pname = "kleopatra";
meta = {
+
homepage = "https://apps.kde.org/kleopatra/";
+
description = "Certificate manager and unified crypto GUI";
license = with lib.licenses; [ gpl2 lgpl21 fdl12 ];
maintainers = kdepimTeam;
};
+2
pkgs/applications/kde/kmahjongg.nix
···
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
buildInputs = [ kdeclarative libkmahjongg knewstuff libkdegames ];
meta = {
+
description = "Mahjongg solitaire";
+
homepage = "https://apps.kde.org/kmahjongg/";
license = with lib.licenses; [ gpl2 ];
maintainers = with lib.maintainers; [ ];
};
+2
pkgs/applications/kde/kmail.nix
···
mkDerivation {
pname = "kmail";
meta = {
+
homepage = "https://apps.kde.org/kmail2/";
+
description = "Mail client";
license = with lib.licenses; [ gpl2 lgpl21 fdl12 ];
maintainers = kdepimTeam;
};
+2
pkgs/applications/kde/kmix.nix
···
mkDerivation {
pname = "kmix";
meta = {
+
homepage = "https://apps.kde.org/kmix/";
+
description = "Sound mixer";
license = with lib.licenses; [ gpl2 lgpl21 fdl12 ];
maintainers = [ lib.maintainers.rongcuid ];
};
+2
pkgs/applications/kde/kmplot.nix
···
mkDerivation {
pname = "kmplot";
meta = {
+
homepage = "https://apps.kde.org/kmplot/";
+
description = "Mathematical function plotter";
license = with lib.licenses; [ gpl2Plus fdl12 ];
maintainers = [ lib.maintainers.orivej ];
};
+15 -11
pkgs/applications/kde/knotes.nix
···
-
{
-
mkDerivation,
-
extra-cmake-modules, kdoctools,
-
kcompletion, kconfig, kconfigwidgets, kcoreaddons, kcrash,
-
kdbusaddons, kdnssd, kglobalaccel, kiconthemes, kitemmodels,
-
kitemviews, kcmutils, knewstuff, knotifications, knotifyconfig,
-
kparts, ktextwidgets, kwidgetsaddons, kwindowsystem,
-
grantlee, grantleetheme, qtx11extras,
-
akonadi, akonadi-notes, akonadi-search, kcalutils,
-
kontactinterface, libkdepim, kmime, pimcommon, kpimtextedit,
-
kcalendarcore
+
{ lib, mkDerivation
+
, extra-cmake-modules, kdoctools
+
, kcompletion, kconfig, kconfigwidgets, kcoreaddons, kcrash
+
, kdbusaddons, kdnssd, kglobalaccel, kiconthemes, kitemmodels
+
, kitemviews, kcmutils, knewstuff, knotifications, knotifyconfig
+
, kparts, ktextwidgets, kwidgetsaddons, kwindowsystem
+
, grantlee, grantleetheme, qtx11extras
+
, akonadi, akonadi-notes, akonadi-search, kcalutils
+
, kontactinterface, libkdepim, kmime, pimcommon, kpimtextedit
+
, kcalendarcore
}:
mkDerivation {
···
akonadi-search
kcalendarcore
];
+
meta = with lib; {
+
homepage = "https://apps.kde.org/knotes/";
+
description = "Popup notes";
+
license = licenses.gpl2Plus;
+
};
}
+2
pkgs/applications/kde/kolf.nix
···
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
buildInputs = [ libkdegames kio ktextwidgets ];
meta = {
+
homepage = "https://apps.kde.org/kolf/";
+
description = "Miniature golf";
license = with lib.licenses; [ gpl2 ];
maintainers = with lib.maintainers; [ peterhoeg ];
};
+2
pkgs/applications/kde/kolourpaint.nix
···
kguiaddons kio ktextwidgets kwidgetsaddons kxmlgui libkexiv2
];
meta = {
+
homepage = "https://apps.kde.org/kolourpaint/";
+
description = "Paint program";
maintainers = [ lib.maintainers.fridh ];
license = with lib.licenses; [ gpl2 ];
};
+5 -1
pkgs/applications/kde/kompare.nix
···
mkDerivation {
pname = "kompare";
-
meta = { license = with lib.licenses; [ gpl2 ]; };
+
meta = {
+
homepage = "https://apps.kde.org/kompare/";
+
description = "Diff/patch frontend";
+
license = with lib.licenses; [ gpl2 ];
+
};
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
buildInputs = [
kiconthemes kparts ktexteditor kwidgetsaddons libkomparediff2
+2
pkgs/applications/kde/konqueror.nix
···
'';
meta = {
+
homepage = "https://apps.kde.org/konqueror/";
+
description = "Web browser, file manager and viewer";
license = with lib.licenses; [ gpl2 ];
maintainers = with lib.maintainers; [ ];
broken = lib.versionOlder qtbase.version "5.13";
+2
pkgs/applications/kde/konquest.nix
···
qtquickcontrols
];
meta = {
+
homepage = "https://apps.kde.org/konquest/";
+
description = "Galactic strategy game";
license = with lib.licenses; [ gpl2 ];
maintainers = with lib.maintainers; [ lheckemann ];
};
+2
pkgs/applications/kde/konsole.nix
···
mkDerivation {
pname = "konsole";
meta = {
+
homepage = "https://apps.kde.org/konsole/";
+
description = "KDE terminal emulator";
license = with lib.licenses; [ gpl2 lgpl21 fdl12 ];
maintainers = with lib.maintainers; [ ttuegel turion ];
};
+2
pkgs/applications/kde/kontact.nix
···
mkDerivation {
pname = "kontact";
meta = {
+
homepage = "https://apps.kde.org/kontact/";
+
description = "Personal information manager";
license = with lib.licenses; [ gpl2 lgpl21 fdl12 ];
maintainers = kdepimTeam;
};
+2
pkgs/applications/kde/korganizer.nix
···
mkDerivation {
pname = "korganizer";
meta = {
+
homepage = "https://apps.kde.org/korganizer/";
+
description = "Personal organizer";
license = with lib.licenses; [ gpl2 lgpl21 fdl12 ];
maintainers = kdepimTeam;
};
+1
pkgs/applications/kde/krdc.nix
···
'';
meta = with lib; {
homepage = "http://www.kde.org";
+
description = "Remote desktop client";
license = with licenses; [ gpl2 lgpl21 fdl12 bsd3 ];
maintainers = with maintainers; [ peterhoeg ];
platforms = platforms.linux;
+2
pkgs/applications/kde/krfb.nix
···
mkDerivation {
pname = "krfb";
meta = {
+
homepage = "https://apps.kde.org/krfb/";
+
description = "Desktop sharing (VNC)";
license = with lib.licenses; [ gpl2 fdl12 ];
maintainers = with lib.maintainers; [ jerith666 ];
};
+2
pkgs/applications/kde/kruler.nix
···
mkDerivation {
pname = "kruler";
meta = {
+
homepage = "https://apps.kde.org/kruler/";
+
description = "Screen ruler";
license = with lib.licenses; [ gpl2 ];
maintainers = [ lib.maintainers.vandenoever ];
};
+5 -1
pkgs/applications/kde/kspaceduel.nix
···
mkDerivation {
pname = "kspaceduel";
-
meta.license = with lib.licenses; [ lgpl21 gpl3 ];
+
meta = {
+
homepage = "https://apps.kde.org/kspaceduel/";
+
description = "Space arcade game";
+
license = with lib.licenses; [ lgpl21 gpl3 ];
+
};
outputs = [ "out" "dev" ];
nativeBuildInputs = [
cmake extra-cmake-modules
+2
pkgs/applications/kde/ksudoku.nix
···
nativeBuildInputs = [ extra-cmake-modules kdoctools ];
buildInputs = [ libGLU kdeclarative libkdegames ];
meta = {
+
homepage = "https://apps.kde.org/ksudoku/";
+
description = "Suduko game";
license = with lib.licenses; [ gpl2 ];
maintainers = with lib.maintainers; [ ];
};
+2
pkgs/applications/kde/ksystemlog.nix
···
propagatedBuildInputs = [ karchive kconfig kio ];
meta = with lib; {
+
homepage = "https://apps.kde.org/ksystemlog/";
+
description = "System log viewer";
license = with licenses; [ gpl2 ];
maintainers = with maintainers; [ peterhoeg ];
};
+17 -17
pkgs/applications/kde/ktouch.nix
···
, xorg
}:
-
-
mkDerivation {
-
pname = "ktouch";
-
meta = {
-
license = lib.licenses.gpl2;
-
maintainers = [ lib.maintainers.schmittlauch ];
-
description = "A touch typing tutor from the KDE software collection";
-
};
-
nativeBuildInputs = [ extra-cmake-modules kdoctools qtdeclarative ];
-
buildInputs = [
-
kconfig kconfigwidgets kcoreaddons kdeclarative ki18n
-
kitemviews kcmutils kio knewstuff ktexteditor kwidgetsaddons
-
kwindowsystem kxmlgui qtscript qtdeclarative kqtquickcharts
-
qtx11extras qtgraphicaleffects qtxmlpatterns qtquickcontrols2
-
xorg.libxkbfile xorg.libxcb
-
];
+
mkDerivation {
+
pname = "ktouch";
+
meta = {
+
homepage = "https://apps.kde.org/ktouch/";
+
license = lib.licenses.gpl2;
+
maintainers = [ lib.maintainers.schmittlauch ];
+
description = "A touch typing tutor from the KDE software collection";
+
};
+
nativeBuildInputs = [ extra-cmake-modules kdoctools qtdeclarative ];
+
buildInputs = [
+
kconfig kconfigwidgets kcoreaddons kdeclarative ki18n
+
kitemviews kcmutils kio knewstuff ktexteditor kwidgetsaddons
+
kwindowsystem kxmlgui qtscript qtdeclarative kqtquickcharts
+
qtx11extras qtgraphicaleffects qtxmlpatterns qtquickcontrols2
+
xorg.libxkbfile xorg.libxcb
+
];
-
enableParallelBuilding = true;
+
enableParallelBuilding = true;
}
+3
pkgs/applications/kde/kwalletmanager.nix
···
mkDerivation {
pname = "kwalletmanager";
meta = {
+
homepage = "https://apps.kde.org/kwalletmanager5/";
+
+
description = "KDE wallet management tool";
license = with lib.licenses; [ gpl2 ];
maintainers = with lib.maintainers; [ fridh ];
};
+5 -1
pkgs/applications/kde/marble.nix
···
mkDerivation {
pname = "marble";
-
meta.license = with lib.licenses; [ lgpl21 gpl3 ];
+
meta = {
+
homepage = "https://apps.kde.org/marble/";
+
description = "Virtual globe";
+
license = with lib.licenses; [ lgpl21 gpl3 ];
+
};
outputs = [ "out" "dev" ];
nativeBuildInputs = [ extra-cmake-modules kdoctools perl ];
propagatedBuildInputs = [
+2
pkgs/applications/kde/minuet.nix
···
mkDerivation {
pname = "minuet";
meta = with lib; {
+
homepage = "https://apps.kde.org/minuet/";
+
description = "Music Education Software";
license = with licenses; [ lgpl21 gpl3 ];
maintainers = with maintainers; [ peterhoeg HaoZeke ];
broken = lib.versionOlder qtbase.version "5.14";
+1
pkgs/applications/kde/okular.nix
···
meta = with lib; {
homepage = "http://www.kde.org";
+
description = "KDE document viewer";
license = with licenses; [ gpl2 lgpl21 fdl12 bsd3 ];
maintainers = with maintainers; [ ttuegel turion ];
platforms = lib.platforms.linux;
+1
pkgs/applications/kde/picmi.nix
···
mkDerivation {
pname = "picmi";
meta = with lib; {
+
homepage = "https://apps.kde.org/picmi/";
description = "Nonogram game";
longDescription = ''The goal is to reveal the hidden pattern in the board by coloring or
leaving blank the cells in a grid according to numbers given at the side of the grid.
+2
pkgs/applications/kde/pim-data-exporter.nix
···
mkDerivation {
pname = "pim-data-exporter";
meta = {
+
homepage = "https://apps.kde.org/pimdataexporter/";
+
description = "Saves and restores all data from PIM apps";
license = with lib.licenses; [ gpl2 lgpl21 fdl12 ];
maintainers = kdepimTeam;
};
+2
pkgs/applications/kde/spectacle.nix
···
'';
propagatedUserEnvPkgs = [ kipi-plugins libkipi ];
meta = with lib; {
+
homepage = "https://apps.kde.org/spectacle/";
+
description = "Screenshot capture utility";
maintainers = with maintainers; [ ttuegel ];
broken = versionOlder qtbase.version "5.15";
};
+3 -3
pkgs/applications/misc/osm2xmap/default.nix
···
-
{ lib, stdenv, fetchFromGitHub, libroxml, proj, libyamlcpp, boost } :
+
{ lib, stdenv, fetchFromGitHub, libroxml, proj_7, libyamlcpp, boost } :
stdenv.mkDerivation rec {
pname = "osm2xmap";
···
makeFlags = [
"GIT_VERSION=${version}"
"GIT_TIMESTAMP="
-
"SHAREDIR=${placeholder "out"}/share/osm2xmap"
+
"SHAREDIR=${placeholder "out"}/share/osm2xmap/"
"INSTALL_BINDIR=${placeholder "out"}/bin"
"INSTALL_MANDIR=${placeholder "out"}/share/man/man1"
];
NIX_CFLAGS_COMPILE = "-DACCEPT_USE_OF_DEPRECATED_PROJ_API_H";
-
buildInputs = [ libroxml proj libyamlcpp boost ];
+
buildInputs = [ libroxml proj_7 libyamlcpp boost ];
meta = with lib; {
homepage = "https://github.com/sembruk/osm2xmap";
+2 -2
pkgs/applications/misc/survex/default.nix
···
, wxGTK30-gtk3
, wxmac
, ffmpeg
-
, proj
+
, proj_7
, perl532
, unscii
, python
···
nativeBuildInputs = [ docbook5 docbook2x autoreconfHook pkg-config perlenv python ];
buildInputs = [
-
libGL libGLU ffmpeg proj
+
libGL libGLU ffmpeg proj_7
] ++ lib.optionals stdenv.hostPlatform.isDarwin [
wxmac Carbon Cocoa
] ++ lib.optionals stdenv.hostPlatform.isLinux [
+2 -2
pkgs/applications/misc/xygrib/default.nix
···
-
{ lib, stdenv, fetchFromGitHub, wrapQtAppsHook, cmake, bzip2, qtbase, qttools, libnova, proj, libpng, openjpeg }:
+
{ lib, stdenv, fetchFromGitHub, wrapQtAppsHook, cmake, bzip2, qtbase, qttools, libnova, proj_7, libpng, openjpeg }:
stdenv.mkDerivation rec {
version = "1.2.6.1";
···
};
nativeBuildInputs = [ cmake qttools wrapQtAppsHook ];
-
buildInputs = [ bzip2 qtbase libnova proj openjpeg libpng ];
+
buildInputs = [ bzip2 qtbase libnova proj_7 openjpeg libpng ];
cmakeFlags = [ "-DOPENJPEG_INCLUDE_DIR=${openjpeg.dev}/include/openjpeg-${lib.versions.majorMinor openjpeg.version}" ]
++ lib.optionals stdenv.isDarwin [ "-DLIBNOVA_LIBRARY=${libnova}/lib/libnova.dylib" ];
+2
pkgs/applications/networking/irc/weechat/scripts/default.nix
···
buffer_autoset = callPackage ./buffer_autoset { };
highmon = callPackage ./highmon { };
+
+
zncplayback = callPackage ./zncplayback { };
}
+28
pkgs/applications/networking/irc/weechat/scripts/zncplayback/default.nix
···
+
{ lib, stdenv, fetchurl }:
+
+
stdenv.mkDerivation {
+
pname = "weechat-zncplayback";
+
version = "0.2.1";
+
+
src = fetchurl {
+
url = "https://github.com/weechat/scripts/raw/bcc9643136addd2cd68ac957dd64e336e4f88aa1/python/zncplayback.py";
+
sha256 = "1k32p6naxg40g664ip48zvm61xza7l9az3v3rawmjw97i0mwz7y3";
+
};
+
+
dontUnpack = true;
+
+
installPhase = ''
+
mkdir -p $out/share
+
cp $src $out/share/zncplayback.py
+
'';
+
+
passthru = {
+
scripts = [ "zncplayback.py" ];
+
};
+
+
meta = with lib; {
+
description = "Add support for the ZNC Playback module";
+
license = licenses.gpl2Plus;
+
maintainers = with maintainers; [ qyliss ];
+
};
+
}
+2 -2
pkgs/applications/radio/sdrangel/default.nix
···
mkDerivation rec {
pname = "sdrangel";
-
version = "6.16.2";
+
version = "6.16.3";
src = fetchFromGitHub {
owner = "f4exb";
repo = "sdrangel";
rev = "v${version}";
-
sha256 = "sha256-wWGKJWd3JDaT0dDMUrxv9ShMVe+q4zvH8SjyKw7UIbo=";
+
sha256 = "sha256-qgFnl9IliKRI4TptpXyK9JHzpLEUQ7NZLIfc0AROCvA=";
fetchSubmodules = false;
};
+54 -16
pkgs/applications/science/misc/gplates/default.nix
···
-
{ lib, stdenv, fetchurl, qt4, qwt6_qt4, libGLU, libGL, glew, gdal, cgal
-
, proj, boost, cmake, python2, doxygen, graphviz, gmp, mpfr }:
+
{ lib
+
, mkDerivation
+
, fetchurl
+
, cmake
+
, doxygen
+
, graphviz
+
, boost
+
, cgal_5
+
, gdal
+
, glew
+
, gmp
+
, libGL
+
, libGLU
+
, mpfr
+
, proj
+
, python3
+
, qtxmlpatterns
+
, qwt
+
}:
-
stdenv.mkDerivation rec {
+
let
+
python = python3.withPackages (ps: with ps; [
+
numpy
+
]);
+
boost' = boost.override {
+
enablePython = true;
+
inherit python;
+
};
+
cgal = cgal_5.override {
+
boost = boost';
+
};
+
in mkDerivation rec {
pname = "gplates";
-
version = "2.2.0";
+
version = "2.3.0";
src = fetchurl {
-
url = "mirror://sourceforge/gplates/${pname}-${version}-unixsrc.tar.bz2";
-
sha256 = "1jrcv498vpcs8xklhbsgg12yfa90f96p2mwq6x5sjnrlpf8mh50b";
+
name = "gplates_${version}_src.tar.bz2";
+
url = "https://www.earthbyte.org/download/8421/?uid=b89bb31428";
+
sha256 = "0lrcmcxc924ixddii8cyglqlwwxvk7f00g4yzbss5i3fgcbh8n96";
};
-
nativeBuildInputs = [ cmake ];
+
nativeBuildInputs = [
+
cmake
+
doxygen
+
graphviz
+
];
+
buildInputs = [
-
qt4 qwt6_qt4 libGLU libGL glew gdal cgal proj python2
-
doxygen graphviz gmp mpfr
-
(boost.override {
-
enablePython = true;
-
python = python2;
-
})
+
boost'
+
cgal
+
gdal
+
glew
+
gmp
+
libGL
+
libGLU
+
mpfr
+
proj
+
python
+
qtxmlpatterns
+
qwt
];
-
NIX_CFLAGS_LINK="-ldl -lpthread -lutil";
-
meta = with lib; {
description = "Desktop software for the interactive visualisation of plate-tectonics";
homepage = "https://www.gplates.org";
-
license = licenses.gpl2;
+
license = licenses.gpl2Only;
platforms = platforms.all;
};
}
+2 -2
pkgs/applications/version-management/git-and-tools/thicket/default.nix
···
{ lib
, fetchFromGitHub
-
, crystal_0_33
+
, crystal_1_0
}:
let
-
crystal = crystal_0_33;
+
crystal = crystal_1_0;
in crystal.buildCrystalPackage rec {
pname = "thicket";
+2 -2
pkgs/applications/version-management/git-and-tools/thicket/shards.nix
···
ameba = {
owner = "veelenga";
repo = "ameba";
-
rev = "v0.10.0";
-
sha256 = "1yjxzwdhigsyjn0qp362jkj85qvg4dsyzal00pgr1srnh2xry912";
+
rev = "v0.14.3";
+
sha256 = "1cfr95xi6hsyxw1wlrh571hc775xhwmssk3k14i8b7dgbwfmm5x1";
};
}
+4 -4
pkgs/applications/video/shotcut/default.nix
···
mkDerivation rec {
pname = "shotcut";
-
version = "21.03.21";
+
version = "21.09.20";
src = fetchFromGitHub {
owner = "mltframework";
repo = "shotcut";
rev = "v${version}";
-
sha256 = "UdeHbNkJ0U9FeTmpbcU4JxiyIHkrlC8ErhtY6zdCZEk=";
+
sha256 = "1y46n5gmlayfl46l0vhg5g5dbbc0sg909mxb68sia0clkaas8xrh";
};
nativeBuildInputs = [ pkg-config qmake ];
···
];
prePatch = ''
-
sed 's_shotcutPath, "melt"_"${mlt}/bin/melt"_' -i src/jobs/meltjob.cpp
+
sed 's_shotcutPath, "melt[^"]*"_"${mlt}/bin/melt"_' -i src/jobs/meltjob.cpp
sed 's_shotcutPath, "ffmpeg"_"${mlt.ffmpeg}/bin/ffmpeg"_' -i src/jobs/ffmpegjob.cpp
sed 's_qApp->applicationDirPath(), "ffmpeg"_"${mlt.ffmpeg}/bin/ffmpeg"_' -i src/docks/encodedock.cpp
NICE=$(type -P nice)
···
please use the official build from shotcut.org instead.
'';
homepage = "https://shotcut.org";
-
license = licenses.gpl3;
+
license = licenses.gpl3Plus;
maintainers = with maintainers; [ goibhniu woffs peti ];
platforms = platforms.linux;
};
+6 -1
pkgs/build-support/skaware/build-skaware-package.nix
···
, postInstall
# : list Maintainer
, maintainers ? []
-
+
# : passtrhu arguments (e.g. tests)
+
, passthru ? {}
}:
···
"CHANGELOG"
"README"
"README.*"
+
"DCO"
+
"CONTRIBUTING"
];
in stdenv.mkDerivation {
···
maintainers = with lib.maintainers;
[ pmahoney Profpatsch qyliss ] ++ maintainers;
};
+
+
inherit passthru;
}
+24
pkgs/data/fonts/ocr-a/default.nix
···
+
{ lib, stdenv, fetchurl }:
+
+
stdenv.mkDerivation rec {
+
pname = "OCR-A";
+
version = "1.0";
+
+
src = fetchurl {
+
url = "mirror://sourceforge/ocr-a-font/OCR-A/${version}/OCRA.ttf";
+
sha256 = "0kpmjjxwzm84z8maz6lq9sk1b0xv1zkvl28lwj7i0m2xf04qixd0";
+
};
+
+
dontUnpack = true;
+
+
installPhase = ''
+
install -D -m 0644 $src $out/share/fonts/truetype/OCRA.ttf
+
'';
+
+
meta = with lib; {
+
description = "ANSI OCR font from the '60s. CYBER";
+
homepage = "https://sourceforge.net/projects/ocr-a-font/";
+
license = licenses.publicDomain;
+
maintainers = with maintainers; [ V ];
+
};
+
}
+2 -2
pkgs/data/themes/greybird/default.nix
···
stdenv.mkDerivation rec {
pname = "greybird";
-
version = "3.22.14";
+
version = "3.22.15";
src = fetchFromGitHub {
owner = "shimmerproject";
repo = pname;
rev = "v${version}";
-
sha256 = "0b0axzrvdsv7aa029idz4rs1jm6df4ff3v4j4d5wf4yiypb48js9";
+
sha256 = "1fk66fxy2lif9ngazlgkpsziw216i4b1ld2zm97cadf7n97376g9";
};
nativeBuildInputs = [
+2 -2
pkgs/desktops/xfce/applications/xfdashboard/default.nix
···
mkXfceDerivation {
category = "apps";
pname = "xfdashboard";
-
version = "0.9.3";
+
version = "0.9.4";
rev-prefix = "";
odd-unstable = false;
-
sha256 = "sha256-xoeqVsfvBH2zzQqDUJGiA47hgVvEkvVf9bNYQmyiytk=";
+
sha256 = "sha256-ZDrBLSfRBw5/nIs/x1jJQCVgNJer85b8Hm1kkX1Dk3s=";
buildInputs = [
clutter
+2 -2
pkgs/desktops/xfce/core/thunar/default.nix
···
let unwrapped = mkXfceDerivation {
category = "xfce";
pname = "thunar";
-
version = "4.16.9";
+
version = "4.16.10";
-
sha256 = "sha256-TpazNC4TwNhcEGQ4AQICxbmfZ1i4RE9vXkM9Zln80vE=";
+
sha256 = "sha256-BeEy8+zEsJ5fJAbvP37tfekqF5LTHil0RDcE5RY0f64=";
nativeBuildInputs = [
docbook_xsl
+3 -4
pkgs/development/compilers/crystal/build-package.nix
···
, format ? "make"
, installManPages ? true
# Specify binaries to build in the form { foo.src = "src/foo.cr"; }
-
# The default `crystal build` options can be overridden with { foo.options = [ "--no-debug" ]; }
+
# The default `crystal build` options can be overridden with { foo.options = [ "--optionname" ]; }
, crystalBinaries ? { }
, ...
}@args:
···
})
(import shardsFile));
-
# we previously had --no-debug here but that is not recommended by upstream
-
defaultOptions = [ "--release" "--progress" "--verbose" ];
+
defaultOptions = [ "--release" "--progress" "--verbose" "--no-debug" ];
buildDirectly = shardsFile == null || crystalBinaries != { };
···
installCheckPhase = args.installCheckPhase or ''
for f in $out/bin/*; do
-
$f --help
+
$f --help > /dev/null
done
'';
+24 -60
pkgs/development/compilers/crystal/default.nix
···
buildCommand = ''
mkdir -p $out
tar --strip-components=1 -C $out -xf ${src}
+
patchShebangs $out/bin/crystal
'';
};
···
outputs = [ "out" "lib" "bin" ];
postPatch = ''
+
export TMP=$(mktemp -d)
+
export HOME=$TMP
+
mkdir -p $HOME/test
+
# Add dependency of crystal to docs to avoid issue on flag changes between releases
# https://github.com/crystal-lang/crystal/pull/8792#issuecomment-614004782
substituteInPlace Makefile \
···
ln -sf spec/compiler spec/std
-
# Dirty fix for when no sandboxing is enabled
-
rm -rf /tmp/crystal
-
mkdir -p /tmp/crystal
+
mkdir -p $TMP/crystal
substituteInPlace spec/std/file_spec.cr \
--replace '/bin/ls' '${coreutils}/bin/ls' \
-
--replace '/usr/share' '/tmp/crystal' \
-
--replace '/usr' '/tmp'
+
--replace '/usr/share' "$TMP/crystal" \
+
--replace '/usr' "$TMP" \
+
--replace '/tmp' "$TMP"
substituteInPlace spec/std/process_spec.cr \
--replace '/bin/cat' '${coreutils}/bin/cat' \
--replace '/bin/ls' '${coreutils}/bin/ls' \
--replace '/usr/bin/env' '${coreutils}/bin/env' \
--replace '"env"' '"${coreutils}/bin/env"' \
-
--replace '"/usr"' '"/tmp"'
-
-
substituteInPlace spec/std/socket/tcp_server_spec.cr \
-
--replace '{% if flag?(:gnu) %}"listen: "{% else %}"bind: "{% end %}' '"bind: "'
+
--replace '/usr' "$TMP" \
+
--replace '/tmp' "$TMP"
substituteInPlace spec/std/system_spec.cr \
--replace '`hostname`' '`${hostname}/bin/hostname`'
-
# See https://github.com/crystal-lang/crystal/pull/8640
-
substituteInPlace spec/std/http/cookie_spec.cr \
-
--replace '01 Jan 2020' '01 Jan #{Time.utc.year + 2}'
-
# See https://github.com/crystal-lang/crystal/issues/8629
substituteInPlace spec/std/socket/udp_socket_spec.cr \
--replace 'it "joins and transmits to multicast groups"' 'pending "joins and transmits to multicast groups"'
+
'';
-
# See https://github.com/crystal-lang/crystal/pull/8699
-
substituteInPlace spec/std/xml/xml_spec.cr \
-
--replace 'it "handles errors"' 'pending "handles errors"'
+
# Defaults are 4
+
preBuild = ''
+
export CRYSTAL_WORKERS=$NIX_BUILD_CORES
+
export threads=$NIX_BUILD_CORES
+
export CRYSTAL_CACHE_DIR=$TMP
'';
buildInputs = commonBuildInputs extraBuildInputs;
···
checkTarget = "compiler_spec";
preCheck = ''
-
export HOME=/tmp
-
mkdir -p $HOME/test
-
export LIBRARY_PATH=${lib.makeLibraryPath checkInputs}:$LIBRARY_PATH
export PATH=${lib.makeBinPath checkInputs}:$PATH
'';
···
license = licenses.asl20;
maintainers = with maintainers; [ david50407 fabianhjr manveru peterhoeg ];
platforms = builtins.attrNames archs;
-
# Error running at_exit handler: Nil assertion failed
-
broken = lib.versions.minor version == "32" && stdenv.isDarwin;
+
broken = lib.versionOlder version "0.36.1" && stdenv.isDarwin;
};
})
);
in
rec {
-
binaryCrystal_0_31 = genericBinary {
-
version = "0.31.1";
+
binaryCrystal_0_36 = genericBinary {
+
version = "0.36.1";
sha256s = {
-
x86_64-linux = "0r8salf572xrnr4m6ll9q5hz6jj8q7ff1rljlhmqb1r26a8mi2ih";
-
i686-linux = "0hridnis5vvrswflx0q67xfg5hryhz6ivlwrb9n4pryj5d1gwjrr";
-
x86_64-darwin = "1dgxgv0s3swkc5cwawzgpbc6bcd2nx4hjxc7iw2h907y1vgmbipz";
+
x86_64-linux = "065vzq34g7hgzl2mrzy9gwwsfikc78nj7xxsbrk67r6rz0a7bk1q";
+
i686-linux = "18m4b1lnd682i5ygbg6cljqjny60nn2mlrzrk765h2ip6fljqbm1";
+
x86_64-darwin = "0xggayk92zh64pb5sz77n12hkcd1hg8kw90z7gb18594q551sf1v";
};
};
-
crystal_0_31 = generic {
-
version = "0.31.1";
-
sha256 = "1dswxa32w16gnc6yjym12xj7ibg0g6zk3ngvl76lwdjqb1h6lwz8";
-
doCheck = false; # 5 checks are failing now
-
binary = binaryCrystal_0_31;
-
};
-
-
crystal_0_32 = generic {
-
version = "0.32.1";
-
sha256 = "120ndi3nhh2r52hjvhwfb49cdggr1bzdq6b8xg7irzavhjinfza6";
-
binary = crystal_0_31;
-
};
-
-
crystal_0_33 = generic {
-
version = "0.33.0";
-
sha256 = "1zg0qixcws81s083wrh54hp83ng2pa8iyyafaha55mzrh8293jbi";
-
binary = crystal_0_32;
-
};
-
-
crystal_0_34 = generic {
-
version = "0.34.0";
-
sha256 = "110lfpxk9jnqyznbfnilys65ixj5sdmy8pvvnlhqhc3ccvrlnmq4";
-
binary = crystal_0_33;
-
};
-
-
crystal_0_35 = generic {
-
version = "0.35.1";
-
sha256 = "0p51bjl1nsvwsm64lqq421dcsxa201w7wwq8plw4r8wqarpq0g69";
-
binary = crystal_0_34;
-
# Needs git to build as per https://github.com/crystal-lang/crystal/issues/9789
-
extraBuildInputs = [ git ];
-
};
-
crystal_0_36 = generic {
version = "0.36.1";
sha256 = "sha256-5rjrvwZKM4lHpmxLyUVbi0Zw98xT+iJKonxwfUwS/Wk=";
-
binary = crystal_0_35;
+
binary = binaryCrystal_0_36;
};
crystal_1_0 = generic {
+7 -3
pkgs/development/interpreters/erlang/generic-builder.nix
···
in
stdenv.mkDerivation ({
-
name = "${baseName}-${version}"
-
+ optionalString javacSupport "-javac"
-
+ optionalString odbcSupport "-odbc";
+
# name is used instead of pname to
+
# - not have to pass pnames as argument
+
# - have a separate pname for erlang (main module)
+
name = "${baseName}"
+
+ optionalString javacSupport "_javac"
+
+ optionalString odbcSupport "_odbc"
+
+ "-${version}";
inherit src version;
+11 -52
pkgs/development/interpreters/lua-5/build-lua-package.nix
···
# configured trees)
luarocks_config = "luarocks-config.lua";
luarocks_content = let
-
extraVariablesStr = lib.concatStringsSep "\n "
-
(lib.mapAttrsToList (k: v: "${k}='${v}';") extraVariables);
-
in ''
-
local_cache = ""
-
-- To prevent collisions when creating environments, we install the rock
-
-- files into per-package subdirectories
-
rocks_subdir = '${rocksSubdir}'
-
-- Then we need to tell luarocks where to find the rock files per
-
-- dependency
-
rocks_trees = {
-
${lib.concatStringsSep "\n, " rocksTrees}
-
}
-
'' + lib.optionalString lua.pkgs.isLuaJIT ''
-
-- Luajit provides some additional functionality built-in; this exposes
-
-- that to luarock's dependency system
-
rocks_provided = {
-
jit='${lua.luaversion}-1';
-
ffi='${lua.luaversion}-1';
-
luaffi='${lua.luaversion}-1';
-
bit='${lua.luaversion}-1';
-
}
-
'' + ''
-
-- For single-output external dependencies
-
external_deps_dirs = {
-
${lib.concatStringsSep "\n, " externalDepsDirs}
-
}
-
variables = {
-
-- Some needed machinery to handle multiple-output external dependencies,
-
-- as per https://github.com/luarocks/luarocks/issues/766
-
${lib.optionalString (lib.length depVariables > 0) ''
-
${lib.concatStringsSep "\n " depVariables}''}
-
${extraVariablesStr}
-
}
-
${extraConfig}
-
'';
+
generatedConfig = lua.pkgs.lib.generateLuarocksConfig {
+
inherit externalDeps;
+
inherit extraVariables;
+
inherit rocksSubdir;
+
inherit requiredLuaRocks;
+
};
+
in
+
''
+
${generatedConfig}
+
${extraConfig}
+
'';
rocksSubdir = "${attrs.pname}-${version}-rocks";
-
externalDepsDirs = map
-
(x: "'${builtins.toString x}'")
-
(lib.filter (lib.isDerivation) externalDeps);
-
-
rocksTrees = lib.imap0
-
(i: dep: "{ name = [[dep-${toString i}]], root = '${dep}', rocks_dir = '${dep}/${dep.rocksSubdir}' }")
-
requiredLuaRocks;
-
# Filter out the lua derivation itself from the Lua module dependency
# closure, as it doesn't have a rock tree :)
requiredLuaRocks = lib.filter (d: d ? luaModule)
(lua.pkgs.requiredLuaModules propagatedBuildInputs);
-
-
# Explicitly point luarocks to the relevant locations for multiple-output
-
# derivations that are external dependencies, to work around an issue it has
-
# (https://github.com/luarocks/luarocks/issues/766)
-
depVariables = lib.concatMap ({name, dep}: [
-
"${name}_INCDIR='${lib.getDev dep}/include';"
-
"${name}_LIBDIR='${lib.getLib dep}/lib';"
-
"${name}_BINDIR='${lib.getBin dep}/bin';"
-
]) externalDeps';
# example externalDeps': [ { name = "CRYPTO"; dep = pkgs.openssl; } ]
externalDeps' = lib.filter (dep: !lib.isDerivation dep) externalDeps;
+27
pkgs/development/interpreters/lua-5/hooks/default.nix
···
+
# Hooks for building lua packages.
+
{ lua
+
, lib
+
, makeSetupHook
+
, findutils
+
, runCommand
+
}:
+
+
let
+
callPackage = lua.pkgs.callPackage;
+
luaInterpreter = lua.interpreter;
+
in {
+
+
lua-setup-hook = LuaPathSearchPaths: LuaCPathSearchPaths:
+
let
+
hook = ./setup-hook.sh;
+
in runCommand "lua-setup-hook.sh" {
+
# hum doesn't seem to like caps !! BUG ?
+
luapathsearchpaths=lib.escapeShellArgs LuaPathSearchPaths;
+
luacpathsearchpaths=lib.escapeShellArgs LuaCPathSearchPaths;
+
} ''
+
cp ${hook} hook.sh
+
substituteAllInPlace hook.sh
+
mv hook.sh $out
+
'';
+
+
}
-15
pkgs/development/interpreters/lua-5/setup-hook.nix
···
-
{ runCommand, lib, }:
-
-
LuaPathSearchPaths: LuaCPathSearchPaths:
-
-
let
-
hook = ./setup-hook.sh;
-
in runCommand "lua-setup-hook.sh" {
-
# hum doesn't seem to like caps !! BUG ?
-
luapathsearchpaths=lib.escapeShellArgs LuaPathSearchPaths;
-
luacpathsearchpaths=lib.escapeShellArgs LuaCPathSearchPaths;
-
} ''
-
cp ${hook} hook.sh
-
substituteAllInPlace hook.sh
-
mv hook.sh $out
-
''
pkgs/development/interpreters/lua-5/setup-hook.sh pkgs/development/interpreters/lua-5/hooks/setup-hook.sh
+6 -1
pkgs/development/libraries/capnproto/default.nix
···
-
{ lib, stdenv, fetchurl }:
+
{ lib, stdenv, fetchurl, capnproto, cmake }:
stdenv.mkDerivation rec {
pname = "capnproto";
···
url = "https://capnproto.org/capnproto-c++-${version}.tar.gz";
sha256 = "sha256-soBUp6K/6kK/w5LI0AljDZTXLozoaiOtbxi15yV0Bk8=";
};
+
+
nativeBuildInputs = [ cmake ]
+
++ lib.optional (!(stdenv.hostPlatform.isCompatible stdenv.buildPlatform)) capnproto;
+
+
cmakeFlags = lib.optional (!(stdenv.hostPlatform.isCompatible stdenv.buildPlatform)) "-DEXTERNAL_CAPNP";
meta = with lib; {
homepage = "https://capnproto.org/";
+2 -2
pkgs/development/libraries/libarchive-qt/default.nix
···
mkDerivation rec {
pname = "libarchive-qt";
-
version = "2.0.4";
+
version = "2.0.6";
src = fetchFromGitLab {
owner = "marcusbritanicus";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-onTV9dgk6Yl9H35EvA6/8vk1IrYH8vg9OQNVgzkt4q4";
+
sha256 = "sha256-Z+2zjQolV1Ncr6v9r7fGrc/fEMt0iMtGwv9eZ2Tu2cA=";
};
nativeBuildInputs = [
+2
pkgs/development/libraries/libgpg-error/default.nix
···
ln -s lock-obj-pub.arm-unknown-linux-gnueabi.h src/syscfg/lock-obj-pub.linux-gnueabi.h
'' + lib.optionalString (stdenv.hostPlatform.isx86_64 && stdenv.hostPlatform.isMusl) ''
ln -s lock-obj-pub.x86_64-pc-linux-musl.h src/syscfg/lock-obj-pub.linux-musl.h
+
'' + lib.optionalString (stdenv.hostPlatform.isi686 && stdenv.hostPlatform.isMusl) ''
+
ln -s lock-obj-pub.i686-unknown-linux-gnu.h src/syscfg/lock-obj-pub.linux-musl.h
'' + lib.optionalString (stdenv.hostPlatform.isAarch32 && stdenv.hostPlatform.isMusl) ''
ln -s src/syscfg/lock-obj-pub.arm-unknown-linux-gnueabi.h src/syscfg/lock-obj-pub.arm-unknown-linux-musleabihf.h
ln -s src/syscfg/lock-obj-pub.arm-unknown-linux-gnueabi.h src/syscfg/lock-obj-pub.linux-musleabihf.h
+2
pkgs/development/libraries/mapnik/default.nix
···
maintainers = with maintainers; [ hrdinka ];
license = licenses.lgpl21;
platforms = platforms.all;
+
# https://github.com/mapnik/mapnik/issues/4232
+
broken = lib.versionAtLeast proj.version "8.0.0";
};
}
+2 -2
pkgs/development/libraries/nsss/default.nix
···
buildPackage {
pname = "nsss";
-
version = "0.1.0.1";
-
sha256 = "1nair10m7fddp50mpqnwj0qiggnh5qmnffmyzxis5l1ixcav1ir0";
+
version = "0.2.0.0";
+
sha256 = "0zg0lwkvx9ch4a6h9ryc73nqfz733v2pv4gbf65qzpz7ccniwagi";
description = "An implementation of a subset of the pwd.h, group.h and shadow.h family of functions.";
+58
pkgs/development/libraries/proj/7.nix
···
+
{ lib
+
, stdenv
+
, fetchFromGitHub
+
, cmake
+
, pkg-config
+
, sqlite
+
, libtiff
+
, curl
+
, gtest
+
, fetchpatch
+
}:
+
+
stdenv.mkDerivation rec {
+
pname = "proj";
+
version = "7.2.1";
+
+
src = fetchFromGitHub {
+
owner = "OSGeo";
+
repo = "PROJ";
+
rev = version;
+
sha256 = "0mymvfvs8xggl4axvlj7kc1ksd9g94kaz6w1vdv0x2y5mqk93gx9";
+
};
+
+
patches = [
+
(fetchpatch { # https://github.com/OSGeo/PROJ/issues/2557
+
name = "gie_self_tests-fail.diff"; # included in >= 8.0.1
+
url = "https://github.com/OSGeo/PROJ/commit/6f1a3c4648bf06862dca0b3725cbb3b7ee0284e3.diff";
+
sha256 = "0gapny0a9c3r0x9szjgn86sspjrrf4vwbija77b17w6ci5cq4pdf";
+
})
+
];
+
+
postPatch = lib.optionalString (version == "7.2.1") ''
+
substituteInPlace CMakeLists.txt \
+
--replace "MAJOR 7 MINOR 2 PATCH 0" "MAJOR 7 MINOR 2 PATCH 1"
+
'';
+
+
outputs = [ "out" "dev"];
+
+
nativeBuildInputs = [ cmake pkg-config ];
+
+
buildInputs = [ sqlite libtiff curl ];
+
+
checkInputs = [ gtest ];
+
+
cmakeFlags = [
+
"-DUSE_EXTERNAL_GTEST=ON"
+
];
+
+
doCheck = true;
+
+
meta = with lib; {
+
description = "Cartographic Projections Library";
+
homepage = "https://proj4.org";
+
license = licenses.mit;
+
platforms = platforms.unix;
+
maintainers = with maintainers; [ vbgl dotlambda ];
+
};
+
}
+5 -22
pkgs/development/libraries/proj/default.nix
···
, libtiff
, curl
, gtest
-
, fetchpatch
}:
stdenv.mkDerivation rec {
pname = "proj";
-
version = "7.2.1";
+
version = "8.1.1";
src = fetchFromGitHub {
owner = "OSGeo";
repo = "PROJ";
rev = version;
-
sha256 = "0mymvfvs8xggl4axvlj7kc1ksd9g94kaz6w1vdv0x2y5mqk93gx9";
+
sha256 = "sha256-Z2nruyowC3NG4Wb8AFBL0PME/zp9D7SwQdMSl6VjH/w=";
};
-
patches = [
-
(fetchpatch { # https://github.com/OSGeo/PROJ/issues/2557
-
name = "gie_self_tests-fail.diff"; # included in >= 8.0.1
-
url = "https://github.com/OSGeo/PROJ/commit/6f1a3c4648bf06862dca0b3725cbb3b7ee0284e3.diff";
-
sha256 = "0gapny0a9c3r0x9szjgn86sspjrrf4vwbija77b17w6ci5cq4pdf";
-
})
-
];
-
-
postPatch = lib.optionalString (version == "7.2.1") ''
-
substituteInPlace CMakeLists.txt \
-
--replace "MAJOR 7 MINOR 2 PATCH 0" "MAJOR 7 MINOR 2 PATCH 1"
-
'';
-
outputs = [ "out" "dev"];
nativeBuildInputs = [ cmake pkg-config ];
···
cmakeFlags = [
"-DUSE_EXTERNAL_GTEST=ON"
+
"-DRUN_NETWORK_DEPENDENT_TESTS=OFF"
];
-
doCheck = stdenv.is64bit;
-
-
preCheck = ''
-
export HOME=$TMPDIR
-
'';
+
doCheck = true;
meta = with lib; {
description = "Cartographic Projections Library";
-
homepage = "https://proj4.org";
+
homepage = "https://proj.org/";
license = licenses.mit;
platforms = platforms.unix;
maintainers = with maintainers; [ vbgl dotlambda ];
+31
pkgs/development/libraries/skalibs/2_10.nix
···
+
{ skawarePackages }:
+
+
skawarePackages.buildPackage {
+
pname = "skalibs";
+
version = "2.10.0.3";
+
sha256 = "0ka6n5rnxd5sn5lycarf596d5wlak5s535zqqlz0rnhdcnpb105p";
+
+
description = "A set of general-purpose C programming libraries";
+
+
outputs = [ "lib" "dev" "doc" "out" ];
+
+
configureFlags = [
+
# assume /dev/random works
+
"--enable-force-devr"
+
"--libdir=\${lib}/lib"
+
"--dynlibdir=\${lib}/lib"
+
"--includedir=\${dev}/include"
+
"--sysdepdir=\${lib}/lib/skalibs/sysdeps"
+
# Empty the default path, which would be "/usr/bin:bin".
+
# It would be set when PATH is empty. This hurts hermeticity.
+
"--with-default-path="
+
];
+
+
postInstall = ''
+
rm -rf sysdeps.cfg
+
rm libskarnet.*
+
+
mv doc $doc/share/doc/skalibs/html
+
'';
+
+
}
+9 -3
pkgs/development/libraries/skalibs/default.nix
···
-
{ skawarePackages }:
+
{ skawarePackages, pkgs }:
with skawarePackages;
buildPackage {
pname = "skalibs";
-
version = "2.10.0.3";
-
sha256 = "0ka6n5rnxd5sn5lycarf596d5wlak5s535zqqlz0rnhdcnpb105p";
+
version = "2.11.0.0";
+
sha256 = "1n9l7mb54dlb0iijjaf446jba6nmq1ql9n39s095ngrk5ahcipwq";
description = "A set of general-purpose C programming libraries";
···
mv doc $doc/share/doc/skalibs/html
'';
+
+
passthru.tests = {
+
# fdtools is one of the few non-skalib packages that depends on skalibs
+
# and might break if skalibs gets an breaking update.
+
fdtools = pkgs.fdtools;
+
};
}
+2 -2
pkgs/development/libraries/utmps/default.nix
···
buildPackage {
pname = "utmps";
-
version = "0.1.0.2";
-
sha256 = "1vjza7m65ziq54q0sv46kb3lss9cmxkkv0n9h3i8505x0h2hlvlb";
+
version = "0.1.0.3";
+
sha256 = "0npgg90lzxmhld6hp296gbnrsixip28s7axirc2g6yjpjz2bvcan";
description = "A secure utmpx and wtmp implementation";
+93 -52
pkgs/development/lua-modules/generated-packages.nix
···
"date": "2017-01-06T13:50:55+03:00",
"path": "/nix/store/z72v77cw9188408ynsppwhlzii2dr740-lua-alt-getopt",
"sha256": "1kq7r5668045diavsqd1j6i9hxdpsk99w8q4zr8cby9y3ws4q6rv",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2020-07-08T11:17:50+10:00",
"path": "/nix/store/vjm6c826hgvj7h7vqlbgkfpvijsd8yaf-argparse",
"sha256": "0idg79d0dfis4qhbkbjlmddq87np75hb2vj41i6prjpvqacvg5v1",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2015-02-17T10:44:04+01:00",
"path": "/nix/store/9kz7kgjmq0w9plrpha866bmwsgp4rfhn-lua-compat-5.2",
"sha256": "1ipqlbvb5w394qwhm2f3w6pdrgy8v4q8sps5hh3pqz14dcqwakhj",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2021-07-19T14:37:34+03:00",
"path": "/nix/store/rzsbr6gqg8vhchl24ma3p1h4slhk0xp7-cassowary.lua",
"sha256": "1r668qcvd2a1rx17xp7ajp5wjhyvh2fwn0c60xmw0mnarjb5w1pq",
-
"fetchSubmodules": false,
+
"fetchLFS": false,
+
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
}
···
disabled = (luaOlder "5.1");
propagatedBuildInputs = [ lua penlight ];
-
checkInputs = [ busted ];
-
# Avoid circular dependency issue with busted / penlight, see:
-
# https://github.com/NixOS/nixpkgs/pull/136453/files#r700982255
-
doCheck = false;
meta = {
homepage = "https://github.com/sile-typesetter/cassowary.lua";
···
pname = "compat53";
version = "0.7-1";
knownRockspec = (fetchurl {
-
url = "https://luarocks.org/compat53-0.7-1.rockspec";
+
url = "https://luafr.org/luarocks/compat53-0.7-1.rockspec";
sha256 = "1r7a3q1cjrcmdycrv2ikgl83irjhxs53sa88v2fdpr9aaamlb101";
}).outPath;
src = fetchurl {
···
"date": "2016-06-17T05:39:58-07:00",
"path": "/nix/store/k3p4xc4cfihp4h8aj6vacr25rpcsjd96-cosmo",
"sha256": "03b5gwsgxd777970d2h6rx86p7ivqx7bry8xmx2r396g3w85qy2p",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2018-02-26T19:53:11-03:00",
"path": "/nix/store/1q4p5qvr6rlwisyarlgnmk4dx6vp8xdl-coxpcall",
"sha256": "1k3q1rr2kavkscf99b5njxhibhp6iwhclrjk6nnnp233iwc2jvqi",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2015-08-21T18:24:54-04:00",
"path": "/nix/store/s7n7f80pz8k6lvfav55a5rwy5l45vs4l-lua-cyrussasl",
"sha256": "14kzm3vk96k2i1m9f5zvpvq4pnzaf7s91h5g4h4x2bq1mynzw2s1",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
"url": "https://github.com/astoff/digestif",
-
"rev": "3a9076f76d8121526adcdbb9303d04dd3c721a34",
-
"date": "2021-06-24T16:18:41+02:00",
-
"path": "/nix/store/alzrvcxdmdfqqmm0diaxfljyr3jz1zk3-digestif",
-
"sha256": "110vsqyyp2pvn6nk492a9r56iyzymy0w1f2hvx26pv5x01mxm20x",
+
"rev": "9f8f299cf7094d72edbd32a455869751246028b7",
+
"date": "2021-09-25T14:32:42+02:00",
+
"path": "/nix/store/ln1zx9cw2b7q4x5vzd6hv5nd01c1gsy3-digestif",
+
"sha256": "1cf14m03jvfs1mwaywfgv759jh0ha3pxrnyj7jxjxlsj6cim89v0",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
"url": "https://github.com/lewis6991/gitsigns.nvim",
-
"rev": "daa233aabb4dbc7c870ea7300bcfeef96d49c2a3",
-
"date": "2021-08-29T23:08:52+01:00",
-
"path": "/nix/store/4685c871dzh0kqf3fs5iqmaysag4m9nx-gitsigns.nvim",
-
"sha256": "0y0il8v0g8kvsyzir4hbkwvzv9wk2iqs1apxlvijk9ccfdk9ya0p",
+
"rev": "7e5c1a831f555dc398dd1564489e2b8a5c867754",
+
"date": "2021-09-25T16:49:34+01:00",
+
"path": "/nix/store/a1h8xxb9w4kvvmq7q30m1ny2pq3zbmin-gitsigns.nvim",
+
"sha256": "02kssw0lpprf9k3il6gfd00gj9fbjbksipa4f6xqkgfdq5c9l9fr",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
pname = "http";
version = "0.3-0";
knownRockspec = (fetchurl {
-
url = "https://luarocks.org/http-0.3-0.rockspec";
+
url = "https://luafr.org/luarocks/http-0.3-0.rockspec";
sha256 = "0fn3irkf5nnmfc83alc40b316hs8l7zdq2xlaiaa65sjd8acfvia";
}).outPath;
src = fetchurl {
···
pname = "inspect";
version = "3.1.1-0";
knownRockspec = (fetchurl {
-
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/inspect-3.1.1-0.rockspec";
+
url = "https://luarocks.org/inspect-3.1.1-0.rockspec";
sha256 = "00spibq2h4an8v0204vr1hny4vv6za720c37ipsahpjk198ayf1p";
}).outPath;
src = fetchurl {
···
"date": "2019-08-16T14:26:05+10:00",
"path": "/nix/store/gg4zldd6kx048d6p65b9cimg3arma8yh-ldbus",
"sha256": "06wcz4i5b7kphqbry274q3ivnsh331rxiyf7n4qk3zx2kvarq08s",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2021-06-24T13:07:51+02:00",
"path": "/nix/store/pzk1qi4fdviz2pq5bg3q91jmrg8wziqx-LDoc",
"sha256": "05wd5m5v3gv777kgikj46216slxyf1zdbzl4idara9lcfw3mfyyw",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2017-10-09T20:55:55+02:00",
"path": "/nix/store/vh82n8pc8dy5c8nph0vssk99vv7q4qg2-lgi",
"sha256": "03rbydnj411xpjvwsyvhwy4plm96481d7jax544mvk7apd8sd5jj",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
pname = "lpty";
version = "1.2.2-1";
knownRockspec = (fetchurl {
-
url = "https://luarocks.org/lpty-1.2.2-1.rockspec";
+
url = "https://luafr.org/luarocks/lpty-1.2.2-1.rockspec";
sha256 = "04af4mhiqrw3br4qzz7yznw9zy2m50wddwzgvzkvhd99ng71fkzg";
}).outPath;
src = fetchurl {
···
pname = "lrexlib-gnu";
version = "2.9.1-1";
knownRockspec = (fetchurl {
-
url = "https://luarocks.org/lrexlib-gnu-2.9.1-1.rockspec";
+
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/lrexlib-gnu-2.9.1-1.rockspec";
sha256 = "1jfjxh26iwsavipkwmscwv52l77qxzvibfmlvpskcpawyii7xcw8";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
···
"date": "2020-08-07T12:10:29+03:00",
"path": "/nix/store/vnnhcc0r9zhqwshmfzrn0ryai61l6xrd-lrexlib",
"sha256": "15dsxq0363940rij9za8mc224n9n58i2iqw1z7r1jh3qpkaciw7j",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2020-08-07T12:10:29+03:00",
"path": "/nix/store/vnnhcc0r9zhqwshmfzrn0ryai61l6xrd-lrexlib",
"sha256": "15dsxq0363940rij9za8mc224n9n58i2iqw1z7r1jh3qpkaciw7j",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
pname = "lrexlib-posix";
version = "2.9.1-1";
knownRockspec = (fetchurl {
-
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/lrexlib-posix-2.9.1-1.rockspec";
+
url = "https://luafr.org/luarocks/lrexlib-posix-2.9.1-1.rockspec";
sha256 = "1zxrx9yifm9ry4wbjgv86rlvq3ff6qivldvib3ha4767azla0j0r";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
···
"date": "2020-08-07T12:10:29+03:00",
"path": "/nix/store/vnnhcc0r9zhqwshmfzrn0ryai61l6xrd-lrexlib",
"sha256": "15dsxq0363940rij9za8mc224n9n58i2iqw1z7r1jh3qpkaciw7j",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2018-04-19T12:03:43-07:00",
"path": "/nix/store/qdpqx2g0xi1c9fknzxx280mcdq6fi8rw-lua-cjson",
"sha256": "0i2sjsi6flax1k0bm647yijgmc02jznq9bn88mj71pgii79pfjhw",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2015-06-03T08:39:04+02:00",
"path": "/nix/store/ksqvl7hbd5s7nb6hjffyic1shldac4z2-lua-cmsgpack",
"sha256": "0j0ahc9rprgl6dqxybaxggjam2r5i2wqqsd6764n0d7fdpj9fqm0",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2020-10-17T15:07:11-04:00",
"path": "/nix/store/qn9syhm875k1qardhhsp025cm3dbnqvm-lua-lsp",
"sha256": "17k3jq61jz6j9bz4vc3hmsfx1s26cfgq1acja8fqyixljklmsbqp",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2021-04-09T17:11:35+01:00",
"path": "/nix/store/zzd1xj4r0iy3srs2hgv4mlm6wflmk24x-lua-resty-http",
"sha256": "1whwn2fwm8c9jda4z1sb5636sfy4pfgjdxw0grcgmf6451xi57nw",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2021-01-20T16:53:57-05:00",
"path": "/nix/store/z4a8ffxj2i3gbjp0f8r377cdp88lkzl4-lua-resty-jwt",
"sha256": "07w8r8gqbby06x493qzislig7a3giw0anqr4ivp3g2ms8v9fnng6",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
pname = "lua-resty-openidc";
version = "1.7.4-1";
knownRockspec = (fetchurl {
-
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/lua-resty-openidc-1.7.4-1.rockspec";
+
url = "https://luarocks.org/lua-resty-openidc-1.7.4-1.rockspec";
sha256 = "12r03pzx1lpaxzy71iqh0kf1zs6gx1k89vpxc5va9r7nr47a56vy";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
···
"date": "2020-11-17T17:42:16+01:00",
"path": "/nix/store/240kss5xx1br5n3qz6djw21cs1fj4pfg-lua-resty-openidc",
"sha256": "1gw71av1r0c6v4f1h0bj0l6way2hmipic6wmipnavr17bz7m1q7z",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
lua-resty-openssl = buildLuarocksPackage {
pname = "lua-resty-openssl";
-
version = "0.7.4-1";
+
version = "0.7.5-1";
knownRockspec = (fetchurl {
-
url = "https://luarocks.org/lua-resty-openssl-0.7.4-1.rockspec";
-
sha256 = "1h87nc8rnay2h0hcc9rylkdzrssibjs6whyim53k647wqkm3fslm";
+
url = "https://luafr.org/luarocks/lua-resty-openssl-0.7.5-1.rockspec";
+
sha256 = "13v14in9cgmjgarmy6br9629ns1qlhw7a30c061y6gncjannnv6y";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
"url": "https://github.com/fffonion/lua-resty-openssl.git",
-
"rev": "5b113a6059e63dbcf7c6fa95a149a9381b904219",
-
"date": "2021-08-02T18:09:14+08:00",
-
"path": "/nix/store/qk6fcp5hwqsm4mday34l1mdkx0ba76bx-lua-resty-openssl",
-
"sha256": "1iar6znh0i45zkx03n8vrkwhx732158hmxfmfjgbpv547mh30ly6",
+
"rev": "6a7f4a1649da7e0499b542b73c61e8dbdf91f57e",
+
"date": "2021-09-18T06:15:54+08:00",
+
"path": "/nix/store/01bninsbgix30zl97lk0p10ycqkc37kx-lua-resty-openssl",
+
"sha256": "1ypji678lna9z3a48lhxs7wrw8d1prln7yfvqfm96lbmfvr5wfxw",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2021-01-04T14:02:41+02:00",
"path": "/nix/store/jqc8arr46mx1xbmrsw503zza1kmz7mcv-lua-resty-session",
"sha256": "09q8xbxkr431i2k21vdyx740rv325v0zmnx0qa3q9x15kcfsd2fm",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2017-12-08T16:30:50-08:00",
"path": "/nix/store/cnpflpyj441c65jhb68hjr2bcvnj9han-lua-toml",
"sha256": "0lklhgs4n7gbgva5frs39240da1y4nwlx6yxaj3ix6r5lp9sh07b",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2020-11-12T06:22:23-08:00",
"path": "/nix/store/9acgxpqk52kwn03m5xasn4f6mmsby2r9-lua-yajl",
"sha256": "1frry90y7vqnw1rd1dfnksilynh0n24gfhkmjd6wwba73prrg0pf",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
pname = "lua-zlib";
version = "1.2-1";
knownRockspec = (fetchurl {
-
url = "https://luarocks.org/lua-zlib-1.2-1.rockspec";
+
url = "https://luafr.org/luarocks/lua-zlib-1.2-1.rockspec";
sha256 = "18rpbg9b4vsnh3svapiqrvwwshw1abb5l5fd7441byx1nm3fjq9w";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
···
"date": "2017-10-07T08:26:37-07:00",
"path": "/nix/store/6hjfczd3xkilkdxidgqzdrwmaiwnlf05-lua-zlib",
"sha256": "1cv12s5c5lihmf3hb0rz05qf13yihy1bjpb7448v8mkiss6y1s5c",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2021-08-30T10:14:03+02:00",
"path": "/nix/store/sdnza0zpmlkz9jppnysasbvqy29f4zia-luabitop",
"sha256": "1b57f99lrjbwsi4m23cq5kpj0dbpxh3xwr0mxs2rzykr2ijpgwrw",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2020-08-20T19:21:52-03:00",
"path": "/nix/store/8r4x8snxp0kjabn9bsxwh62pfczd8wma-luacheck",
"sha256": "08jsqibksdvpl6mvf8d6rlh5pii78hqm3fkhbkgzrs6k8kk5a7lf",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
pname = "luacov";
version = "0.15.0-1";
knownRockspec = (fetchurl {
-
url = "https://luarocks.org/luacov-0.15.0-1.rockspec";
+
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/luacov-0.15.0-1.rockspec";
sha256 = "18byfl23c73pazi60hsx0vd74hqq80mzixab76j36cyn8k4ni9db";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
···
"date": "2021-02-15T18:47:58-03:00",
"path": "/nix/store/9vm38il9knzx2m66m250qj1fzdfzqg0y-luacov",
"sha256": "08550nna6qcb5jn6ds1hjm6010y8973wx4qbf9vrvrcn1k2yr6ki",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2019-01-14T09:39:17+00:00",
"path": "/nix/store/a3qgawila4r4jc2lpdc4mwyzd1gvzazd-luadbi",
"sha256": "167ivwmczhp98bxzpz3wdxcfj6vi0a10gpi7rdfjs2rbfwkzqvjh",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
pname = "luadbi-mysql";
version = "0.7.2-1";
knownRockspec = (fetchurl {
-
url = "https://luarocks.org/luadbi-mysql-0.7.2-1.rockspec";
+
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/luadbi-mysql-0.7.2-1.rockspec";
sha256 = "0gnyqnvcfif06rzzrdw6w6hchp4jrjiwm0rmfx2r8ljchj2bvml5";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
···
"date": "2019-01-14T09:39:17+00:00",
"path": "/nix/store/a3qgawila4r4jc2lpdc4mwyzd1gvzazd-luadbi",
"sha256": "167ivwmczhp98bxzpz3wdxcfj6vi0a10gpi7rdfjs2rbfwkzqvjh",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2019-01-14T09:39:17+00:00",
"path": "/nix/store/a3qgawila4r4jc2lpdc4mwyzd1gvzazd-luadbi",
"sha256": "167ivwmczhp98bxzpz3wdxcfj6vi0a10gpi7rdfjs2rbfwkzqvjh",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2019-01-14T09:39:17+00:00",
"path": "/nix/store/a3qgawila4r4jc2lpdc4mwyzd1gvzazd-luadbi",
"sha256": "167ivwmczhp98bxzpz3wdxcfj6vi0a10gpi7rdfjs2rbfwkzqvjh",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
pname = "luaepnf";
version = "0.3-2";
knownRockspec = (fetchurl {
-
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/luaepnf-0.3-2.rockspec";
+
url = "https://luafr.org/luarocks/luaepnf-0.3-2.rockspec";
sha256 = "0kqmnj11wmfpc9mz04zzq8ab4mnbkrhcgc525wrq6pgl3p5li8aa";
}).outPath;
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
···
"date": "2015-01-15T16:54:10+01:00",
"path": "/nix/store/n7gb0z26sl7dzdyy3bx1y3cz3npsna7d-lua-luaepnf",
"sha256": "1lvsi3fklhvz671jgg0iqn0xbkzn9qjcbf2ks41xxjz3lapjr6c9",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2021-03-01T11:46:30-05:00",
"path": "/nix/store/6dwfn64p3clcsxkq41b307q8izi0fvji-luaffifb",
"sha256": "0nj76fw3yi57vfn35yvbdmpdbg9gmn5j1gw84ajs9w1j86sc0661",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2017-09-15T20:07:33-03:00",
"path": "/nix/store/20xm4942kvnb8kypg76jl7zrym5cz03c-luafilesystem",
"sha256": "0zmprgkm9zawdf9wnw0v3w6ibaj442wlc6alp39hmw610fl4vghi",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2021-08-12T19:29:39+02:00",
"path": "/nix/store/q1v28n04hh3r7aw37cxakzksfa3kw5qa-lualogging",
"sha256": "0nj0ik91lgl9rwgizdkn7vy9brddsz1kxfn70c01x861vaxi63iz",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2021-08-14T10:28:09-03:00",
"path": "/nix/store/jk2npg54asnmj5fnpldn8dxym9gx8x4g-luasec",
"sha256": "14hx72qw3gjgz12v5bwpz3irgbf69f8584z8y7lglccbyydp4jla",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2021-08-27T15:17:22-03:00",
"path": "/nix/store/2374agarn72cnlnk2vripfy1zz2y50la-luasql",
"sha256": "13xs1g67d2p69x4wzxk1h97xh25388h0kkh9bjgw3l1yss9zlxhx",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
pname = "luautf8";
version = "0.1.3-1";
knownRockspec = (fetchurl {
-
url = "https://raw.githubusercontent.com/rocks-moonscript-org/moonrocks-mirror/master/luautf8-0.1.3-1.rockspec";
+
url = "https://luarocks.org/luautf8-0.1.3-1.rockspec";
sha256 = "16i9wfgd0f299g1afgjp0hhczlrk5g8i0kq3ka0f8bwj3mp2wmcp";
}).outPath;
src = fetchurl {
···
"date": "2017-09-05T14:02:52+03:00",
"path": "/nix/store/idllj442c0iwnx1cpkrifx2afb7vh821-luazip",
"sha256": "1jlqzqlds3aa3hnp737fm2awcx0hzmwyd87klv0cv13ny5v9f2x4",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
luv = buildLuarocksPackage {
pname = "luv";
-
version = "1.30.0-0";
+
version = "1.42.0-0";
knownRockspec = (fetchurl {
-
url = "https://luarocks.org/luv-1.30.0-0.rockspec";
-
sha256 = "05j231z6vpfjbxxmsizbigrsr80bk2dg48fcz12isj668lhia32h";
+
url = "https://luarocks.org/luv-1.42.0-0.rockspec";
+
sha256 = "0pr2gjjnm60w0csb0dacrjalan7ifsfw4lki4ykxx1f4m5snam09";
}).outPath;
src = fetchurl {
-
url = "https://github.com/luvit/luv/releases/download/1.30.0-0/luv-1.30.0-0.tar.gz";
-
sha256 = "1vxmxgdjk2bdnm8d9n3z5lfg6x34cx97j5nh8camm6ps5c0mmisw";
+
url = "https://github.com/luvit/luv/releases/download/1.42.0-0/luv-1.42.0-0.tar.gz";
+
sha256 = "0dkzjkkm0h516ag6sfz5iji761y9slrcfw325f39zkda1sfql8mm";
};
disabled = (luaOlder "5.1");
···
"date": "2015-09-27T17:49:28+03:00",
"path": "/nix/store/akl80hh077hm20bdqj1lksy0fn2285b5-markdown",
"sha256": "019bk2qprszqncnm8zy6ns6709iq1nwkf7i86nr38f035j4lc11y",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2021-03-18T11:51:52-07:00",
"path": "/nix/store/xijbk0bgjpxjgmvscbqnghj4r3zdzgxl-moonscript",
"sha256": "14xx6pij0djblfv3g2hi0xlljh7h0yrbb03f4x90q5j66v693gx7",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
penlight = buildLuarocksPackage {
pname = "penlight";
-
version = "1.11.0-1";
-
knownRockspec = (fetchurl {
-
url = "https://luarocks.org/penlight-1.11.0-1.rockspec";
-
sha256 = "1sjhnywvamyi9fadhra5pw2an1rhy2hk2byfxmr3n5wi0xrqv004";
-
}).outPath;
+
version = "dev-1";
+
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
"url": "https://github.com/lunarmodules/penlight.git",
-
"rev": "e3712f00fae09a166dd62540b677600165d5bcd7",
-
"date": "2021-08-18T21:37:47+02:00",
-
"path": "/nix/store/i70ndw8qhvcm828ifb3vyj08y22xp0ka-penlight",
-
"sha256": "19n9xqkb4hlak0k7hamk4ixwjvyxslsnyh1zjazdzrl8n736xhkl",
-
"fetchSubmodules": false,
+
"rev": "0653cdb05591454a9804a7fee8c873b8f06b0b8f",
+
"date": "2021-08-31T23:42:29+02:00",
+
"path": "/nix/store/zf3k6z36bxsrbxkkmsa4w6m7vxvlpfgn-penlight",
+
"sha256": "0l1819dyr9hzmimnjjg99fad6k3ksmlm77hgvdybgz8558lj4g1i",
+
"fetchLFS": false,
+
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
disabled = (luaOlder "5.1");
propagatedBuildInputs = [ lua luafilesystem ];
-
checkInputs = [ busted ];
+
checkInputs = [ busted busted ];
doCheck = false;
meta = {
···
src = fetchgit ( removeAttrs (builtins.fromJSON ''{
"url": "https://github.com/nvim-lua/plenary.nvim",
-
"rev": "15c3cb9e6311dc1a875eacb9fc8df69ca48d7402",
-
"date": "2021-08-19T19:04:12+02:00",
-
"path": "/nix/store/fjj6gs1yc9gw3qh3xabf7mra4dlyac5a-plenary.nvim",
-
"sha256": "0gdysws82vdcyfsfpkpg9wqw223vg6hh74pf821wxh8p6qg3r26m",
+
"rev": "8c6cc07a68b65eb707be44598f0084647d495978",
+
"date": "2021-09-26T16:13:25+02:00",
+
"path": "/nix/store/j8hmr48blm4brq8rqv7b9m08vmalg8sp-plenary.nvim",
+
"sha256": "05h5n7jj33y9vs6gc8hqlfd628j6i33s3c8fmfl6ahxwfygx2wpd",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2021-04-09T19:59:20+08:00",
"path": "/nix/store/65l71ph27pmipgrq8j4whg6n8h2avvs4-lua-rapidjson",
"sha256": "1a6srvximxlh6gjkaj5y86d1kf06pc4gby2r6wpdw2pdac8k7xyb",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2020-04-15T16:34:01-07:00",
"path": "/nix/store/rgbn0nn7glm7s52d90ds87j10bx20nij-_debug",
"sha256": "0p6jz6syh2r8qfk08jf2hp4p902rkamjzpzl8xhkpzf8rdzs937w",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2020-04-15T17:16:16-07:00",
"path": "/nix/store/jr4agcn13fk56b8105p6yr9gn767fkds-normalize",
"sha256": "0jiykdjxc4b5my12fnzrw3bxracjgxc265xrn8kfx95350kvbzl1",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
···
"date": "2020-05-06T23:13:06-04:00",
"path": "/nix/store/a4i9k5hx9xiz38bij4hb505dg088jkss-vstruct",
"sha256": "0sl9v874mckhh6jbxsan48s5xajzx193k4qlphw69sdbf8kr3p57",
+
"fetchLFS": false,
"fetchSubmodules": true,
"deepClone": false,
"leaveDotGit": false
+68
pkgs/development/lua-modules/lib.nix
···
requiredLuaModules = requiredLuaModules drv.propagatedBuildInputs;
};
});
+
+
/* generate luarocks config
+
+
generateLuarocksConfig {
+
externalDeps = [ { name = "CRYPTO"; dep = pkgs.openssl; } ];
+
rocksSubdir = "subdir";
+
};
+
*/
+
generateLuarocksConfig = {
+
externalDeps
+
, requiredLuaRocks
+
, extraVariables ? {}
+
, rocksSubdir
+
}: let
+
rocksTrees = lib.imap0
+
(i: dep: "{ name = [[dep-${toString i}]], root = '${dep}', rocks_dir = '${dep}/${dep.rocksSubdir}' }")
+
requiredLuaRocks;
+
+
# Explicitly point luarocks to the relevant locations for multiple-output
+
# derivations that are external dependencies, to work around an issue it has
+
# (https://github.com/luarocks/luarocks/issues/766)
+
depVariables = lib.concatMap ({name, dep}: [
+
"${name}_INCDIR='${lib.getDev dep}/include';"
+
"${name}_LIBDIR='${lib.getLib dep}/lib';"
+
"${name}_BINDIR='${lib.getBin dep}/bin';"
+
]) externalDeps';
+
+
# example externalDeps': [ { name = "CRYPTO"; dep = pkgs.openssl; } ]
+
externalDeps' = lib.filter (dep: !lib.isDerivation dep) externalDeps;
+
+
externalDepsDirs = map
+
(x: "'${builtins.toString x}'")
+
(lib.filter (lib.isDerivation) externalDeps);
+
+
extraVariablesStr = lib.concatStringsSep "\n "
+
(lib.mapAttrsToList (k: v: "${k}='${v}';") extraVariables);
+
in ''
+
local_cache = ""
+
-- To prevent collisions when creating environments, we install the rock
+
-- files into per-package subdirectories
+
rocks_subdir = '${rocksSubdir}'
+
-- Then we need to tell luarocks where to find the rock files per
+
-- dependency
+
rocks_trees = {
+
${lib.concatStringsSep "\n, " rocksTrees}
+
}
+
'' + lib.optionalString lua.pkgs.isLuaJIT ''
+
-- Luajit provides some additional functionality built-in; this exposes
+
-- that to luarock's dependency system
+
rocks_provided = {
+
jit='${lua.luaversion}-1';
+
ffi='${lua.luaversion}-1';
+
luaffi='${lua.luaversion}-1';
+
bit='${lua.luaversion}-1';
+
}
+
'' + ''
+
-- For single-output external dependencies
+
external_deps_dirs = {
+
${lib.concatStringsSep "\n, " externalDepsDirs}
+
}
+
variables = {
+
-- Some needed machinery to handle multiple-output external dependencies,
+
-- as per https://github.com/luarocks/luarocks/issues/766
+
${lib.optionalString (lib.length depVariables > 0) ''
+
${lib.concatStringsSep "\n " depVariables}''}
+
${extraVariablesStr}
+
}
+
'';
}
+1 -1
pkgs/development/lua-modules/overrides.nix
···
preBuild = self.luv.preBuild + ''
sed -i 's,\(option(BUILD_MODULE.*\)ON,\1OFF,' CMakeLists.txt
sed -i 's,\(option(BUILD_SHARED_LIBS.*\)OFF,\1ON,' CMakeLists.txt
-
sed -i 's,${"\${INSTALL_INC_DIR}"},${placeholder "out"}/include/luv,' CMakeLists.txt
+
sed -i 's,${"\${.*INSTALL_INC_DIR}"},${placeholder "out"}/include/luv,' CMakeLists.txt
'';
nativeBuildInputs = [ pkgs.fixDarwinDylibNames ];
+41 -10
pkgs/development/misc/resholve/README.md
···
resholve converts bare executable references in shell scripts to absolute
paths. This will hopefully make its way into the Nixpkgs manual soon, but
-
until then I'll outline how to use the `resholvePackage` function.
+
until then I'll outline how to use the `resholvePackage`, `resholveScript`,
+
and `resholveScriptBin` functions.
> Fair warning: resholve does *not* aspire to resolving all valid Shell
> scripts. It depends on the OSH/Oil parser, which aims to support most (but
···
> - Packages with scripts that require conflicting directives can use multiple
> solutions to resolve the scripts separately, but produce a single package.
-
## Basic Example
+
The `resholveScript` and `resholveScriptBin` functions support a _single_
+
`solution` attrset. This is basically the same as any single solution in `resholvePackage`, except that it doesn't need a `scripts` attr (it is automatically added).
+
+
## Basic `resholvePackage` Example
Here's a simple example from one of my own projects, with annotations:
<!--
···
}
```
+
## Basic `resholveScript` and `resholveScriptBin` examples
+
+
Both of these functions have the same basic API. This example is a little
+
trivial for now. If you have a real usage that you find helpful, please PR it.
+
+
```nix
+
resholvedScript = resholveScript "name" {
+
inputs = [ file ];
+
interpreter = "${bash}/bin/bash";
+
} ''
+
echo "Hello"
+
file .
+
'';
+
resholvedScriptBin = resholveScriptBin "name" {
+
inputs = [ file ];
+
interpreter = "${bash}/bin/bash";
+
} ''
+
echo "Hello"
+
file .
+
'';
+
```
+
## Options
`resholvePackage` maps Nix types/idioms into the flags and environment variables
···
| inputs | list | packages to resolve executables from |
| interpreter | string | 'none' or abspath for shebang |
| prologue | file | text to insert before the first code-line |
-
| epilogue | file | text to isnert after the last code-line |
+
| epilogue | file | text to insert after the last code-line |
| flags | list | strings to pass as flags |
| fake | attrset | [directives](#controlling-resolution-with-directives) |
| fix | attrset | [directives](#controlling-resolution-with-directives) |
···
```nix
# --fake 'f:setUp;tearDown builtin:setopt source:/etc/bashrc'
fake = {
-
# fake accepts the initial of valid identifier types as a CLI convienience.
+
# fake accepts the initial of valid identifier types as a CLI convenience.
# Use full names in the Nix API.
function = [ "setUp" "tearDown" ];
builtin = [ "setopt" ];
source = [ "/etc/bashrc" ];
};
-
# --fix 'aliases xargs:ls $GIT:gix'
+
# --fix 'aliases $GIT:gix /bin/bash'
fix = {
# all single-word directives use `true` as value
aliases = true;
-
xargs = [ "ls" ];
"$GIT" = [ "gix" ];
+
"/bin/bash";
};
-
# --keep 'which:git;ls .:$HOME $LS:exa /etc/bashrc ~/.bashrc'
+
# --keep 'source:$HOME /etc/bashrc ~/.bashrc'
keep = {
-
which = [ "git" "ls" ];
-
"." = [ "$HOME" ];
-
"$LS" = [ "exa" ];
+
source = [ "$HOME" ];
"/etc/bashrc" = true;
"~/.bashrc" = true;
};
```
+
+
> **Note:** For now, at least, you'll need to reference the manpage to completely understand these examples.
## Controlling nested resolution with lore
···
either built-in rules for finding the executable, or human triage.
- "wrapper" lore maps shell exec wrappers to the programs they exec so
that resholve can substitute an executable's verdict for its wrapper's.
+
+
> **Caution:** At least when it comes to common utilities, it's best to treat
+
> overrides as a stopgap until they can be properly handled in resholve and/or
+
> binlore. Please report things you have to override and, if possible, help
+
> get them sorted.
There will be more mechanisms for controlling this process in the future
(and your reports/experiences will play a role in shaping them...) For now,
+39 -4
pkgs/development/misc/resholve/default.nix
···
{ callPackage
-
, ...
+
, writeTextFile
}:
let
···
in
rec {
resholve = callPackage ./resholve.nix {
-
inherit (source) rSrc;
-
inherit (source) version;
+
inherit (source) rSrc version;
inherit (deps.oil) oildev;
};
+
resholve-utils = callPackage ./resholve-utils.nix {
+
inherit resholve;
+
};
resholvePackage = callPackage ./resholve-package.nix {
-
inherit resholve;
+
inherit resholve resholve-utils;
};
+
resholveScript = name: partialSolution: text:
+
writeTextFile {
+
inherit name text;
+
executable = true;
+
checkPhase = ''
+
(
+
PS4=$'\x1f'"\033[33m[resholve context]\033[0m "
+
set -x
+
${resholve-utils.makeInvocation name (partialSolution // {
+
scripts = [ "${placeholder "out"}" ];
+
})}
+
)
+
${partialSolution.interpreter} -n $out
+
'';
+
};
+
resholveScriptBin = name: partialSolution: text:
+
writeTextFile rec {
+
inherit name text;
+
executable = true;
+
destination = "/bin/${name}";
+
checkPhase = ''
+
(
+
cd "$out"
+
PS4=$'\x1f'"\033[33m[resholve context]\033[0m "
+
set -x
+
: changing directory to $PWD
+
${resholve-utils.makeInvocation name (partialSolution // {
+
scripts = [ "bin/${name}" ];
+
})}
+
)
+
${partialSolution.interpreter} -n $out/bin/${name}
+
'';
+
};
}
+16 -7
pkgs/development/misc/resholve/oildev.nix
···
nativeBuildInputs = [ git ];
};
+
/*
+
Upstream isn't interested in packaging this as a library
+
(or accepting all of the patches we need to do so).
+
This creates one without disturbing upstream too much.
+
*/
oildev = python27Packages.buildPythonPackage rec {
pname = "oildev-unstable";
version = "2021-07-14";
···
It's not critical to drop most of these; the primary target is
the vendored fork of Python-2.7.13, which is ~ 55M and over 3200
files, dozens of which get interpreter script patches in fixup.
+
+
Note: -f is necessary to keep it from being a pain to update
+
hash on rev updates. Command will fail w/o and not print hash.
*/
extraPostFetch = ''
rm -rf Python-2.7.13 benchmarks metrics py-yajl rfc gold web testdata services demo devtools cpp
'';
};
-
-
# TODO: not sure why I'm having to set this for nix-build...
-
# can anyone tell if I'm doing something wrong?
-
SOURCE_DATE_EPOCH = 315532800;
# patch to support a python package, pass tests on macOS, etc.
patchSrc = fetchFromGitHub {
owner = "abathur";
repo = "nix-py-dev-oil";
-
rev = "v0.8.12";
-
hash = "sha256-/EvwxL201lGsioL0lIhzM8VTghe6FuVbc3PBJgY8c8E=";
+
rev = "v0.8.12.1";
+
hash = "sha256-7JVnosdcvmVFN3h6SIeeqcJFcyFkai//fFuzi7ThNMY=";
};
patches = [
"${patchSrc}/0001-add_setup_py.patch"
···
patchShebangs asdl build core doctools frontend native oil_lang
'';
-
# TODO: this may be obsolete?
+
/*
+
We did convince oil to upstream an env for specifying
+
this to support a shell.nix. Would need a patch if they
+
later drop this support. See:
+
https://github.com/oilshell/oil/blob/46900310c7e4a07a6223eb6c08e4f26460aad285/doctools/cmark.py#L30-L34
+
*/
_NIX_SHELL_LIBCMARK = "${cmark}/lib/libcmark${stdenv.hostPlatform.extensions.sharedLibrary}";
# See earlier note on glibcLocales TODO: verify needed?
+3 -73
pkgs/development/misc/resholve/resholve-package.nix
···
-
{ stdenv, lib, resholve, binlore }:
+
{ stdenv, lib, resholve, resholve-utils }:
{ pname
, src
···
}@attrs:
let
inherit stdenv;
-
/* These functions break up the work of partially validating the
-
'solutions' attrset and massaging it into env/cli args.
-
-
Note: some of the left-most args do not *have* to be passed as
-
deep as they are, but I've done so to provide more error context
-
*/
-
-
# for brevity / line length
-
spaces = l: builtins.concatStringsSep " " l;
-
semicolons = l: builtins.concatStringsSep ";" l;
-
-
/* Throw a fit with dotted attr path context */
-
nope = path: msg:
-
throw "${builtins.concatStringsSep "." path}: ${msg}";
-
-
/* Special-case directive value representations by type */
-
makeDirective = solution: env: name: val:
-
if builtins.isInt val then builtins.toString val
-
else if builtins.isString val then name
-
else if true == val then name
-
else if false == val then "" # omit!
-
else if null == val then "" # omit!
-
else if builtins.isList val then "${name}:${semicolons val}"
-
else nope [ solution env name ] "unexpected type: ${builtins.typeOf val}";
-
-
/* Build fake/fix/keep directives from Nix types */
-
makeDirectives = solution: env: val:
-
lib.mapAttrsToList (makeDirective solution env) val;
-
-
/* Special-case value representation by type/name */
-
makeEnvVal = solution: env: val:
-
if env == "inputs" then lib.makeBinPath val
-
else if builtins.isString val then val
-
else if builtins.isList val then spaces val
-
else if builtins.isAttrs val then spaces (makeDirectives solution env val)
-
else nope [ solution env ] "unexpected type: ${builtins.typeOf val}";
-
-
/* Shell-format each env value */
-
shellEnv = solution: env: value:
-
lib.escapeShellArg (makeEnvVal solution env value);
-
-
/* Build a single ENV=val pair */
-
makeEnv = solution: env: value:
-
"RESHOLVE_${lib.toUpper env}=${shellEnv solution env value}";
-
-
/* Discard attrs claimed by makeArgs */
-
removeCliArgs = value:
-
removeAttrs value [ "scripts" "flags" ];
-
-
/* Verify required arguments are present */
-
validateSolution = { scripts, inputs, interpreter, ... }: true;
-
-
/* Pull out specific solution keys to build ENV=val pairs */
-
makeEnvs = solution: value:
-
spaces (lib.mapAttrsToList (makeEnv solution) (removeCliArgs value));
-
-
/* Pull out specific solution keys to build CLI argstring */
-
makeArgs = { flags ? [ ], scripts, ... }:
-
spaces (flags ++ scripts);
-
-
/* Build a single resholve invocation */
-
makeInvocation = solution: value:
-
if validateSolution value then
-
# we pass resholve a directory
-
"RESHOLVE_LORE=${binlore.collect { drvs = value.inputs; } } ${makeEnvs solution value} resholve --overwrite ${makeArgs value}"
-
else throw "invalid solution"; # shouldn't trigger for now
-
-
/* Build resholve invocation for each solution. */
-
makeCommands = solutions:
-
lib.mapAttrsToList makeInvocation solutions;
self = (stdenv.mkDerivation ((removeAttrs attrs [ "solutions" ])
// {
inherit pname version src;
-
buildInputs = [ resholve ];
+
buildInputs = (lib.optionals (builtins.hasAttr "buildInputs" attrs) attrs.buildInputs) ++ [ resholve ];
# enable below for verbose debug info if needed
# supports default python.logging levels
···
PS4=$'\x1f'"\033[33m[resholve context]\033[0m "
set -x
: changing directory to $PWD
-
${builtins.concatStringsSep "\n" (makeCommands solutions)}
+
${builtins.concatStringsSep "\n" (resholve-utils.makeCommands solutions)}
)
'';
}));
+74
pkgs/development/misc/resholve/resholve-utils.nix
···
+
{ lib, resholve, binlore }:
+
+
rec {
+
/* These functions break up the work of partially validating the
+
'solutions' attrset and massaging it into env/cli args.
+
+
Note: some of the left-most args do not *have* to be passed as
+
deep as they are, but I've done so to provide more error context
+
*/
+
+
# for brevity / line length
+
spaces = l: builtins.concatStringsSep " " l;
+
semicolons = l: builtins.concatStringsSep ";" l;
+
+
/* Throw a fit with dotted attr path context */
+
nope = path: msg:
+
throw "${builtins.concatStringsSep "." path}: ${msg}";
+
+
/* Special-case directive value representations by type */
+
makeDirective = solution: env: name: val:
+
if builtins.isInt val then builtins.toString val
+
else if builtins.isString val then name
+
else if true == val then name
+
else if false == val then "" # omit!
+
else if null == val then "" # omit!
+
else if builtins.isList val then "${name}:${semicolons val}"
+
else nope [ solution env name ] "unexpected type: ${builtins.typeOf val}";
+
+
/* Build fake/fix/keep directives from Nix types */
+
makeDirectives = solution: env: val:
+
lib.mapAttrsToList (makeDirective solution env) val;
+
+
/* Special-case value representation by type/name */
+
makeEnvVal = solution: env: val:
+
if env == "inputs" then lib.makeBinPath val
+
else if builtins.isString val then val
+
else if builtins.isList val then spaces val
+
else if builtins.isAttrs val then spaces (makeDirectives solution env val)
+
else nope [ solution env ] "unexpected type: ${builtins.typeOf val}";
+
+
/* Shell-format each env value */
+
shellEnv = solution: env: value:
+
lib.escapeShellArg (makeEnvVal solution env value);
+
+
/* Build a single ENV=val pair */
+
makeEnv = solution: env: value:
+
"RESHOLVE_${lib.toUpper env}=${shellEnv solution env value}";
+
+
/* Discard attrs claimed by makeArgs */
+
removeCliArgs = value:
+
removeAttrs value [ "scripts" "flags" ];
+
+
/* Verify required arguments are present */
+
validateSolution = { scripts, inputs, interpreter, ... }: true;
+
+
/* Pull out specific solution keys to build ENV=val pairs */
+
makeEnvs = solution: value:
+
spaces (lib.mapAttrsToList (makeEnv solution) (removeCliArgs value));
+
+
/* Pull out specific solution keys to build CLI argstring */
+
makeArgs = { flags ? [ ], scripts, ... }:
+
spaces (flags ++ scripts);
+
+
/* Build a single resholve invocation */
+
makeInvocation = solution: value:
+
if validateSolution value then
+
# we pass resholve a directory
+
"RESHOLVE_LORE=${binlore.collect { drvs = value.inputs; } } ${makeEnvs solution value} ${resholve}/bin/resholve --overwrite ${makeArgs value}"
+
else throw "invalid solution"; # shouldn't trigger for now
+
+
/* Build resholve invocation for each solution. */
+
makeCommands = solutions:
+
lib.mapAttrsToList makeInvocation solutions;
+
}
+2 -2
pkgs/development/misc/resholve/source.nix
···
}:
rec {
-
version = "0.6.0";
+
version = "0.6.6";
rSrc =
# local build -> `make ci`; `make clean` to restore
# return to remote source
···
owner = "abathur";
repo = "resholve";
rev = "v${version}";
-
hash = "sha256-GfhhU9f5kiYcuYTPKWXCIkAGsz7GhAUGjAmIZ8Ww5X4=";
+
hash = "sha256-bupf3c9tNPAEMzFEDcvg483bSiwZFuB3ZqveG89dgkE=";
};
}
+17 -1
pkgs/development/misc/resholve/test.nix
···
let
inherit (callPackage ./default.nix { })
-
resholve resholvePackage;
+
resholve resholvePackage resholveScript resholveScriptBin;
# ourCoreutils = coreutils.override { singleBinary = false; };
···
fi
'';
};
+
+
# Caution: ci.nix asserts the equality of both of these w/ diff
+
resholvedScript = resholveScript "resholved-script" {
+
inputs = [ file ];
+
interpreter = "${bash}/bin/bash";
+
} ''
+
echo "Hello"
+
file .
+
'';
+
resholvedScriptBin = resholveScriptBin "resholved-script-bin" {
+
inputs = [ file ];
+
interpreter = "${bash}/bin/bash";
+
} ''
+
echo "Hello"
+
file .
+
'';
}
+4 -2
pkgs/development/ocaml-modules/batteries/default.nix
···
-
{ stdenv, lib, fetchurl, ocaml, findlib, ocamlbuild, qtest, num }:
+
{ stdenv, lib, fetchurl, ocaml, findlib, ocamlbuild, qtest, num
+
, doCheck ? lib.versionAtLeast ocaml.version "4.08" && !stdenv.isAarch64
+
}:
let version = "3.3.0"; in
···
checkInputs = [ qtest ];
propagatedBuildInputs = [ num ];
-
doCheck = lib.versionAtLeast ocaml.version "4.04" && !stdenv.isAarch64;
+
inherit doCheck;
checkTarget = "test";
createFindlibDestdir = true;
+1 -2
pkgs/development/ocaml-modules/containers/data.nix
···
buildDunePackage {
pname = "containers-data";
-
inherit (containers) src version useDune2;
+
inherit (containers) src version doCheck useDune2;
buildInputs = [ dune-configurator ];
-
doCheck = true;
checkInputs = [ gen iter qcheck ];
propagatedBuildInputs = [ containers ];
+1 -1
pkgs/development/ocaml-modules/containers/default.nix
···
checkInputs = [ gen iter ounit qcheck uutf ];
-
doCheck = true;
+
doCheck = lib.versionAtLeast ocaml.version "4.08";
meta = {
homepage = "https://github.com/c-cube/ocaml-containers";
+7 -10
pkgs/development/ocaml-modules/gen/default.nix
···
{ stdenv, lib, fetchFromGitHub, ocaml, findlib, ocamlbuild, qtest, ounit }:
-
let version = "0.5"; in
-
-
stdenv.mkDerivation {
-
name = "ocaml${ocaml.version}-gen-${version}";
+
stdenv.mkDerivation rec {
+
version = "0.5";
+
pname = "ocaml${ocaml.version}-gen";
src = fetchFromGitHub {
owner = "c-cube";
···
};
nativeBuildInputs = [ ocaml findlib ocamlbuild ];
-
buildInputs = [ qtest ounit ];
+
buildInputs = lib.optionals doCheck [ qtest ounit ];
strictDeps = true;
-
configureFlags = [
-
"--enable-tests"
-
];
+
configureFlags = lib.optional doCheck "--enable-tests";
-
doCheck = true;
+
doCheck = lib.versionAtLeast ocaml.version "4.08";
checkTarget = "test";
createFindlibDestdir = true;
···
homepage = "https://github.com/c-cube/gen";
description = "Simple, efficient iterators for OCaml";
license = lib.licenses.bsd3;
-
platforms = ocaml.meta.platforms or [];
+
inherit (ocaml.meta) platforms;
};
}
+1 -1
pkgs/development/ocaml-modules/iter/default.nix
···
buildInputs = [ dune-configurator ];
propagatedBuildInputs = [ result ];
-
doCheck = lib.versionAtLeast ocaml.version "4.07";
+
doCheck = lib.versionAtLeast ocaml.version "4.08";
checkInputs = [ mdx.bin qtest ];
meta = {
+1 -1
pkgs/development/ocaml-modules/lru/default.nix
···
propagatedBuildInputs = [ psq ];
-
doCheck = lib.versionAtLeast ocaml.version "4.05";
+
doCheck = lib.versionAtLeast ocaml.version "4.08";
checkInputs = [ qcheck-alcotest ];
meta = {
+1 -1
pkgs/development/ocaml-modules/psq/default.nix
···
propagatedBuildInputs = [ seq ];
-
doCheck = lib.versionAtLeast ocaml.version "4.07";
+
doCheck = lib.versionAtLeast ocaml.version "4.08";
checkInputs = [ qcheck-alcotest ];
meta = {
+4 -4
pkgs/development/ocaml-modules/qcheck/core.nix
···
buildDunePackage rec {
pname = "qcheck-core";
-
version = "0.17";
+
version = "0.18";
useDune2 = true;
-
minimumOCamlVersion = "4.03";
+
minimalOCamlVersion = "4.08";
src = fetchFromGitHub {
owner = "c-cube";
repo = "qcheck";
-
rev = version;
-
sha256 = "0qfyqhfg98spmfci9z6f527a16gwjnx2lrbbgw67p37ys5acrfar";
+
rev = "v${version}";
+
sha256 = "1s652hrj2sxqj30dfl300zjvvqk3r62a1bnzqw1hqyf6pi88qn8x";
};
meta = {
+1
pkgs/development/ocaml-modules/reason-native/qcheck-rely.nix
···
meta = {
description = "A library containing custom Rely matchers allowing for easily using QCheck with Rely. QCheck is a 'QuickCheck inspired property-based testing for OCaml, and combinators to generate random values to run tests on'";
downloadPage = "https://github.com/reasonml/reason-native/tree/master/src/qcheck-rely";
+
broken = true;
};
}
+2 -2
pkgs/development/ocaml-modules/stdint/default.nix
···
-
{ lib, fetchurl, fetchpatch, buildDunePackage, qcheck }:
+
{ lib, fetchurl, fetchpatch, buildDunePackage, ocaml, qcheck }:
buildDunePackage rec {
pname = "stdint";
···
'let pos_int = QCheck.int_range 0 maxi'
'';
-
doCheck = true;
+
doCheck = lib.versionAtLeast ocaml.version "4.08";
checkInputs = [ qcheck ];
meta = {
+1 -1
pkgs/development/ocaml-modules/stringext/default.nix
···
{ lib, fetchurl, ocaml, buildDunePackage, ounit, qtest
# Optionally enable tests; test script use OCaml-4.01+ features
-
, doCheck ? lib.versionAtLeast ocaml.version "4.04"
+
, doCheck ? lib.versionAtLeast ocaml.version "4.08"
}:
let version = "1.6.0"; in
+2 -1
pkgs/development/ocaml-modules/syslog-message/default.nix
···
{ lib, buildDunePackage, fetchurl
+
, ocaml
, astring, ptime, rresult, qcheck
}:
···
rresult
];
-
doCheck = true;
+
doCheck = lib.versionAtLeast ocaml.version "4.08";
checkInputs = [
qcheck
];
+9 -2
pkgs/development/python-modules/cartopy/default.nix
···
buildPythonPackage rec {
pname = "cartopy";
-
version = "0.19.0.post1";
+
version = "0.20.0";
src = fetchPypi {
inherit version;
pname = "Cartopy";
-
sha256 = "0xnm8z3as3hriivdfd26s6vn5b63gb46x6vxw6gh1mwfm5rlg2sb";
+
sha256 = "eae58aff26806e63cf115b2bce9477cedc4aa9f578c5e477b2c25cfa404f2b7a";
};
+
+
postPatch = ''
+
# https://github.com/SciTools/cartopy/issues/1880
+
substituteInPlace lib/cartopy/tests/test_crs.py \
+
--replace "test_osgb(" "dont_test_osgb(" \
+
--replace "test_epsg(" "dont_test_epsg("
+
'';
buildInputs = [
geos proj
+2 -2
pkgs/development/python-modules/fe25519/default.nix
···
buildPythonPackage rec {
pname = "fe25519";
-
version = "0.3.0";
+
version = "1.0.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "8819659f19b51713199a75fda5107c93fbb6e2cb4afef3164ce7932b5eb276b9";
+
sha256 = "sha256-947DIkmg56mAegEgLKq8iqETWf2SCvtmeDZi5cxVSJA=";
};
propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/ge25519/default.nix
···
buildPythonPackage rec {
pname = "ge25519";
-
version = "0.2.0";
+
version = "1.0.0";
src = fetchPypi {
inherit pname version;
-
sha256 = "1wgv0vqg8iv9y5d7if14gmcgslwd5zzgk322w9jaxdfbndldddik";
+
sha256 = "sha256-f7xvZ92zRO3GLSdfgEyhkWVwAFT2TvKHy6+iF+k43bI=";
};
propagatedBuildInputs = [
+14 -1
pkgs/development/python-modules/geopandas/default.nix
···
-
{ lib, stdenv, buildPythonPackage, fetchFromGitHub, pythonOlder
+
{ lib, stdenv, buildPythonPackage, fetchFromGitHub, fetchpatch, pythonOlder
, pandas, shapely, fiona, pyproj
, pytestCheckHook, Rtree }:
···
rev = "v${version}";
sha256 = "sha256-58X562OkRzZ4UTNMTwXW4U5czoa5tbSMBCcE90DqbaE=";
};
+
+
patches = [
+
(fetchpatch {
+
name = "skip-pandas-master-fillna-test.patch";
+
url = "https://github.com/geopandas/geopandas/pull/1878.patch";
+
sha256 = "1yw3i4dbhaq7f02n329b9y2cqxbwlz9db81mhgrfc7af3whwysdb";
+
})
+
(fetchpatch {
+
name = "fix-proj4strings-test.patch";
+
url = "https://github.com/geopandas/geopandas/pull/1958.patch";
+
sha256 = "0kzmpq5ry87yvhqr6gnh9p2606b06d3ynzjvw0hpp9fncczpc2yn";
+
})
+
];
propagatedBuildInputs = [
pandas
+39
pkgs/development/python-modules/lupupy/default.nix
···
+
{ lib
+
, buildPythonPackage
+
, colorlog
+
, demjson
+
, fetchPypi
+
, pythonOlder
+
, requests
+
}:
+
+
buildPythonPackage rec {
+
pname = "lupupy";
+
version = "0.0.21";
+
format = "setuptools";
+
+
disabled = pythonOlder "3.6";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "0cpamb1fp84psiqm7xr156zi4f2fv2wijbjjyk6w87z8fl2aw8xc";
+
};
+
+
propagatedBuildInputs = [
+
colorlog
+
demjson
+
requests
+
];
+
+
# Project has no tests
+
doCheck = false;
+
+
pythonImportsCheck = [ "lupupy" ];
+
+
meta = with lib; {
+
description = "Python module to control Lupusec alarm control panels";
+
homepage = "https://github.com/majuss/lupupy";
+
license = with licenses; [ mit ];
+
maintainers = with maintainers; [ fab ];
+
};
+
}
+2 -2
pkgs/development/python-modules/mypy-boto3-s3/default.nix
···
buildPythonPackage rec {
pname = "mypy-boto3-s3";
-
version = "1.18.47";
+
version = "1.18.48";
disabled = pythonOlder "3.6";
src = fetchPypi {
inherit pname version;
-
sha256 = "0687354a1970a157f293ff57f8b38379497b606643633912cc28f76e0333b301";
+
sha256 = "a14917021aac10432887b2acb634be8d66401ffb87cdb0fc271aff867929538c";
};
propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/phonenumbers/default.nix
···
buildPythonPackage rec {
pname = "phonenumbers";
-
version = "8.12.32";
+
version = "8.12.33";
src = fetchPypi {
inherit pname version;
-
sha256 = "c52c9c3607483072303ba8d8759063edc44d2f8fe7b85afef40bd8d1aafb6483";
+
sha256 = "de3d5a3cb421c7421f584bb13cb9287e23ee2dd97d832fc35c9b55b96a576a3c";
};
checkInputs = [
+17 -25
pkgs/development/python-modules/pyproj/001.proj.patch
···
-
diff -Nur a/pyproj/datadir.py b/pyproj/datadir.py
-
--- a/pyproj/datadir.py 2021-04-10 18:26:52.829018483 +0100
-
+++ b/pyproj/datadir.py 2021-04-10 18:44:59.155190614 +0100
-
@@ -70,7 +70,7 @@
+
diff --git a/pyproj/datadir.py b/pyproj/datadir.py
+
index 9ca1d25..4198490 100644
+
--- a/pyproj/datadir.py
+
+++ b/pyproj/datadir.py
+
@@ -70,7 +70,7 @@ def get_data_dir() -> str:
+
global _VALIDATED_PROJ_DATA
if _VALIDATED_PROJ_DATA is not None:
return _VALIDATED_PROJ_DATA
-
global _USER_PROJ_DATA
- internal_datadir = Path(__file__).absolute().parent / "proj_dir" / "share" / "proj"
+ internal_datadir = Path("@proj@/share/proj")
proj_lib_dirs = os.environ.get("PROJ_LIB", "")
prefix_datadir = Path(sys.prefix, "share", "proj")
-
diff -Nur a/setup.py b/setup.py
-
--- a/setup.py 2021-04-10 18:26:52.817018512 +0100
-
+++ b/setup.py 2021-04-10 18:46:01.652324424 +0100
-
@@ -11,7 +11,7 @@
+
diff --git a/setup.py b/setup.py
+
index 6bb0c6c..b3d0321 100644
+
--- a/setup.py
+
+++ b/setup.py
+
@@ -12,7 +12,7 @@ from setuptools import Extension, setup
PROJ_MIN_VERSION = parse_version("7.2.0")
CURRENT_FILE_PATH = Path(__file__).absolute().parent
BASE_INTERNAL_PROJ_DIR = Path("proj_dir")
···
def get_proj_version(proj_dir: Path) -> str:
-
@@ -150,7 +150,7 @@
+
@@ -155,7 +155,7 @@ def get_extension_modules():
# By default we'll try to get options PROJ_DIR or the local version of proj
proj_dir = get_proj_dir()
library_dirs = get_proj_libdirs(proj_dir)
···
proj_version = get_proj_version(proj_dir)
check_proj_version(proj_version)
-
diff -Nur a/test/conftest.py b/test/conftest.py
-
--- a/test/conftest.py 2021-04-10 18:26:52.831018478 +0100
-
+++ b/test/conftest.py 2021-04-10 18:37:01.605682432 +0100
-
@@ -2,6 +2,7 @@
-
from contextlib import contextmanager
-
from distutils.version import LooseVersion
-
from pathlib import Path
-
+import stat
-
-
import pyproj
-
from pyproj.datadir import get_data_dir, get_user_data_dir, set_data_dir
-
diff -Nur a/test/test_cli.py b/test/test_cli.py
-
--- a/test/test_cli.py 2021-04-10 18:26:52.831018478 +0100
-
+++ b/test/test_cli.py 2021-04-10 22:17:04.665088162 +0100
-
@@ -14,7 +14,7 @@
+
diff --git a/test/test_cli.py b/test/test_cli.py
+
index 7a696de..1b9b777 100644
+
--- a/test/test_cli.py
+
+++ b/test/test_cli.py
+
@@ -14,7 +14,7 @@ from pyproj.sync import _load_grid_geojson
from test.conftest import grids_available, proj_env, tmp_chdir
PYPROJ_CLI_ENDPONTS = pytest.mark.parametrize(
+2 -2
pkgs/development/python-modules/pyproj/default.nix
···
buildPythonPackage rec {
pname = "pyproj";
-
version = "3.1.0";
+
version = "3.2.1";
disabled = pythonOlder "3.7";
src = fetchFromGitHub {
owner = "pyproj4";
repo = "pyproj";
rev = version;
-
sha256 = "sha256-UN8cJk5Lgd+d2tKmFuF6QvKr36w1435RKovzGfMXi1E=";
+
sha256 = "sha256-r343TvXpSr+EMAbvzSUpsfipwP8TFmitOfT0gjgoO00=";
};
# force pyproj to use ${proj}
+12
pkgs/development/r-modules/generate-r-packages.R
···
nix <- apply(pkgs, 1, function(p) formatPackage(p[1], p[2], p[18], p[4], p[5], p[6]))
write("done", stderr())
+
# Mark deleted packages as broken
+
setkey(readFormatted, V2)
+
markBroken <- function(name) {
+
str <- paste0(readFormatted[name], collapse='"')
+
if(sum(grep("broken = true;", str)))
+
return(str)
+
write(paste("marked", name, "as broken"), stderr())
+
gsub("};$", "broken = true; };", str)
+
}
+
broken <- lapply(setdiff(readFormatted[[2]], pkgs[[1]]), markBroken)
+
cat("# This file is generated from generate-r-packages.R. DO NOT EDIT.\n")
cat("# Execute the following command to update the file.\n")
cat("#\n")
···
cat(";\n")
cat("in with self; {\n")
cat(paste(nix, collapse="\n"), "\n", sep="")
+
cat(paste(broken, collapse="\n"), "\n", sep="")
cat("}\n")
stopCluster(cl)
+5 -12
pkgs/development/tools/build-managers/shards/default.nix
···
{ lib
, fetchFromGitHub
-
, crystal_0_34
-
, crystal_0_36
+
, crystal_1_0
}:
let
generic =
···
in
rec {
-
# needed for anything that requires the old v1 shards format
-
shards_0_11 = generic {
-
version = "0.11.1";
-
sha256 = "05qnhc23xbmicdl4fwyxfpcvd8jq4inzh6v7jsjjw4n76vzb1f71";
-
crystal = crystal_0_34;
-
};
-
shards_0_14 = generic {
-
version = "0.14.1";
+
shards_0_15 = generic {
+
version = "0.15.0";
sha256 = "sha256-/C6whh5RbTBkFWqpn0GqyVe0opbrklm8xPv5MIG99VU=";
-
crystal = crystal_0_36;
+
crystal = crystal_1_0;
};
-
shards = shards_0_14;
+
shards = shards_0_15;
}
+19 -3
pkgs/development/tools/misc/bashdb/default.nix
···
-
{ lib, stdenv, fetchurl, makeWrapper, python3Packages }:
+
{ lib
+
, stdenv
+
, fetchurl
+
, fetchpatch
+
, makeWrapper
+
, python3Packages
+
}:
stdenv.mkDerivation rec {
pname = "bashdb";
-
version = "4.4-1.0.0";
+
version = "5.0-1.1.2";
src = fetchurl {
url = "mirror://sourceforge/bashdb/${pname}-${version}.tar.bz2";
-
sha256 = "0p7i7bpzs6q1i7swnkr89kxqgzr146xw8d2acmqwqbslzm9dqlml";
+
sha256 = "sha256-MBdtKtKMWwCy4tIcXqGu+PuvQKj52fcjxnxgUx87czA=";
};
+
+
patches = [
+
# Enable building with bash 5.1/5.2
+
# Remove with any upstream 5.1-x.y.z release
+
(fetchpatch {
+
url = "https://raw.githubusercontent.com/freebsd/freebsd-ports/569fbb806d9ee813afa8b27d2098a44f93433922/devel/bashdb/files/patch-configure";
+
sha256 = "19zfzcnxavndyn6kfxp775kjcd0gigsm4y3bnh6fz5ilhnnbbbgr";
+
})
+
];
+
patchFlags = "-p0";
nativeBuildInputs = [
makeWrapper
+2 -2
pkgs/development/tools/sigrok-cli/default.nix
···
stdenv.mkDerivation rec {
pname = "sigrok-cli";
-
version = "0.7.1";
+
version = "0.7.2";
src = fetchurl {
url = "https://sigrok.org/download/source/${pname}/${pname}-${version}.tar.gz";
-
sha256 = "15vpn1psriadcbl6v9swwgws7dva85ld03yv6g1mgm27kx11697m";
+
sha256 = "sha256-cdBEPzaJe/Vlcy3sIGgw2+oPJ4m2YBzxBTayhtEUCrg=";
};
nativeBuildInputs = [ pkg-config ];
+1
pkgs/development/tools/sumneko-lua-language-server/default.nix
···
license = licenses.mit;
maintainers = with maintainers; [ mjlbach ];
platforms = platforms.linux;
+
mainProgram = "lua-language-server";
};
}
+1 -1
pkgs/misc/emulators/wine/base.nix
···
postInstall = let
links = prefix: pkg: "ln -s ${pkg} $out/${prefix}/${pkg.name}";
-
in ''
+
in lib.optionalString supportFlags.embedInstallers ''
mkdir -p $out/share/wine/gecko $out/share/wine/mono/
${lib.strings.concatStringsSep "\n"
((map (links "share/wine/gecko") geckos)
+2 -1
pkgs/misc/emulators/wine/default.nix
···
faudioSupport ? false,
vkd3dSupport ? false,
mingwSupport ? wineRelease != "stable",
+
embedInstallers ? false # The Mono and Gecko MSI installers
}:
let wine-build = build: release:
···
gsmSupport gphoto2Support ldapSupport fontconfigSupport alsaSupport
pulseaudioSupport xineramaSupport gtkSupport openclSupport xmlSupport tlsSupport
openglSupport gstreamerSupport udevSupport vulkanSupport sdlSupport faudioSupport
-
vkd3dSupport mingwSupport;
+
vkd3dSupport mingwSupport embedInstallers;
};
});
-12
pkgs/misc/vim-plugins/generated.nix
···
meta.homepage = "https://github.com/deoplete-plugins/deoplete-dictionary/";
};
-
deoplete-emoji = buildVimPluginFrom2Nix {
-
pname = "deoplete-emoji";
-
version = "2019-01-20";
-
src = fetchFromGitHub {
-
owner = "fszymanski";
-
repo = "deoplete-emoji";
-
rev = "1dfa2da6ae3ee146ddfbfdba48cf45f0c1d57d7d";
-
sha256 = "0drqbdmy8igq6rv7s2qlxsp391pydcynlr9gkaadzrg7pk4nlgsb";
-
};
-
meta.homepage = "https://github.com/fszymanski/deoplete-emoji/";
-
};
-
deoplete-fish = buildVimPluginFrom2Nix {
pname = "deoplete-fish";
version = "2020-04-04";
-1
pkgs/misc/vim-plugins/vim-plugin-names
···
fruit-in/brainfuck-vim
fruit-in/vim-nong-theme
fsharp/vim-fsharp
-
fszymanski/deoplete-emoji
garbas/vim-snipmate
gcmt/taboo.vim
gcmt/wildfire.vim
+1
pkgs/misc/vim-plugins/vim-utils.nix
···
rec {
inherit vimrcFile;
inherit vimrcContent;
+
inherit packDir;
# shell script with custom name passing [-u vimrc] [-U gvimrc] to vim
vimWithRC = {
+18
pkgs/misc/vscode-extensions/default.nix
···
, jdk
, llvmPackages_8
, nixpkgs-fmt
+
, protobuf
, jq
, shellcheck
, moreutils
···
version = "0.0.8";
sha256 = "1ln9gly5bb7nvbziilnay4q448h9npdh7sd9xy277122h0qawkci";
};
+
meta = {
+
license = lib.licenses.mit;
+
};
+
};
+
+
zxh404.vscode-proto3 = buildVscodeMarketplaceExtension {
+
mktplcRef = {
+
name = "vscode-proto3";
+
publisher = "zxh404";
+
version = "0.5.4";
+
sha256 = "08dfl5h1k6s542qw5qx2czm1wb37ck9w2vpjz44kp2az352nmksb";
+
};
+
nativeBuildInputs = [ jq moreutils ];
+
postInstall = ''
+
cd "$out/$installPrefix"
+
jq '.contributes.configuration.properties.protoc.properties.path.default = "${protobuf}/bin/protoc"' package.json | sponge package.json
+
'';
meta = {
license = lib.licenses.mit;
};
+15 -15
pkgs/os-specific/linux/kernel/hardened/patches.json
···
{
"4.14": {
"extra": "-hardened1",
-
"name": "linux-hardened-4.14.246-hardened1.patch",
-
"sha256": "1b15687ac2pkz46qliq1blyja7cjwn19q2bkd0c5912kzly76ghd",
-
"url": "https://github.com/anthraxx/linux-hardened/releases/download/4.14.246-hardened1/linux-hardened-4.14.246-hardened1.patch"
+
"name": "linux-hardened-4.14.248-hardened1.patch",
+
"sha256": "1lwqlpd21f8rwqfyz61083w0lg2bjzdjf7rzrqxsw1jz0l879035",
+
"url": "https://github.com/anthraxx/linux-hardened/releases/download/4.14.248-hardened1/linux-hardened-4.14.248-hardened1.patch"
},
"4.19": {
"extra": "-hardened1",
-
"name": "linux-hardened-4.19.206-hardened1.patch",
-
"sha256": "12ylhvjvabal29gi00cpjh3s47qj0vav6f2y145z4c9r2z77816k",
-
"url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.206-hardened1/linux-hardened-4.19.206-hardened1.patch"
+
"name": "linux-hardened-4.19.208-hardened1.patch",
+
"sha256": "0bg45n1kgd628gwjkp1vxslxyci6589ygy9mmmhpl7kj3y7370ck",
+
"url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.208-hardened1/linux-hardened-4.19.208-hardened1.patch"
},
"5.10": {
"extra": "-hardened1",
-
"name": "linux-hardened-5.10.67-hardened1.patch",
-
"sha256": "1yvfqkcffrva9hf4ns0jkksnvkj58h87msim0yhanlyp5jyz3l1p",
-
"url": "https://github.com/anthraxx/linux-hardened/releases/download/5.10.67-hardened1/linux-hardened-5.10.67-hardened1.patch"
+
"name": "linux-hardened-5.10.69-hardened1.patch",
+
"sha256": "11frhnprvxnqxm8yn1kay2jv2i473i9glnvsjnqz6kj8f0q2gl4v",
+
"url": "https://github.com/anthraxx/linux-hardened/releases/download/5.10.69-hardened1/linux-hardened-5.10.69-hardened1.patch"
},
"5.13": {
"extra": "-hardened1",
···
},
"5.14": {
"extra": "-hardened1",
-
"name": "linux-hardened-5.14.6-hardened1.patch",
-
"sha256": "0db5jvbvrk93x745ylxwnmx6ldwhmaqdnb2hfa35j0i2xjaw4hxx",
-
"url": "https://github.com/anthraxx/linux-hardened/releases/download/5.14.6-hardened1/linux-hardened-5.14.6-hardened1.patch"
+
"name": "linux-hardened-5.14.8-hardened1.patch",
+
"sha256": "1kg02ixyd2dbk97iz28g26k1nnxi96s0bcyr90wc7diylhf7kz4a",
+
"url": "https://github.com/anthraxx/linux-hardened/releases/download/5.14.8-hardened1/linux-hardened-5.14.8-hardened1.patch"
},
"5.4": {
"extra": "-hardened1",
-
"name": "linux-hardened-5.4.147-hardened1.patch",
-
"sha256": "1jkvfpckmj9ig4nsxxiigawkay05lk8r9fps16iaq6lz2mf9vqsb",
-
"url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.147-hardened1/linux-hardened-5.4.147-hardened1.patch"
+
"name": "linux-hardened-5.4.149-hardened1.patch",
+
"sha256": "1v21dz66ngsdsdcld23rgmidz955x74al5nsxnvwasc5gh18ahh9",
+
"url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.149-hardened1/linux-hardened-5.4.149-hardened1.patch"
}
}
+2 -2
pkgs/os-specific/linux/kernel/linux-4.14.nix
···
with lib;
buildLinux (args // rec {
-
version = "4.14.247";
+
version = "4.14.248";
# modDirVersion needs to be x.y.z, will automatically add .0 if needed
modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg;
···
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
-
sha256 = "1kdhlsqpmw68xnfiyx98id8wis6kkxca2d4n7w2ncax0kyzrwyz7";
+
sha256 = "0m5nsd41b08xppcf7vvx8zgj3h3sp3n6xrgxfkccn6n4bk7yx4y9";
};
} // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-4.19.nix
···
with lib;
buildLinux (args // rec {
-
version = "4.19.207";
+
version = "4.19.208";
# modDirVersion needs to be x.y.z, will automatically add .0 if needed
modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg;
···
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
-
sha256 = "1fb658n89xf9asnaqi0bnh64ir2f78bdqyjvfb983qad9wqsadym";
+
sha256 = "1556bk46v7pjd2xrvkldq254yc18cn9jll25ba8zig57562ahkg7";
};
} // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-4.4.nix
···
{ buildPackages, fetchurl, perl, buildLinux, nixosTests, stdenv, ... } @ args:
buildLinux (args // rec {
-
version = "4.4.284";
+
version = "4.4.285";
extraMeta.branch = "4.4";
extraMeta.broken = stdenv.isAarch64;
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
-
sha256 = "00xkd2p181cfkys4nri93xy7snmn8g2481x3qz0js7g9p3kz5bqf";
+
sha256 = "0h8jzb2cg0wg4s07iqkghfxkxrnlxadwk3i3gvg2xs3ra0wrisp1";
};
} // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-4.9.nix
···
{ buildPackages, fetchurl, perl, buildLinux, nixosTests, stdenv, ... } @ args:
buildLinux (args // rec {
-
version = "4.9.283";
+
version = "4.9.284";
extraMeta.branch = "4.9";
extraMeta.broken = stdenv.isAarch64;
src = fetchurl {
url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz";
-
sha256 = "0pdh1lyhdp5c5n39wpr622kgchgf30iqk853a2rv9m3s3fry50lm";
+
sha256 = "0054b0cm0h2mbf6rxzdgd3c2rfz7xa32qkyr5lv58l2852hf0ri8";
};
} // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.10.nix
···
with lib;
buildLinux (args // rec {
-
version = "5.10.68";
+
version = "5.10.69";
# modDirVersion needs to be x.y.z, will automatically add .0 if needed
modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg;
···
src = fetchurl {
url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz";
-
sha256 = "08cl4bg9k331apj5fjl3jx6s6l543dnbjc1cfvin951m7l787ahv";
+
sha256 = "1jhcl8qh4w4m2jnbp0glr6xbpn7phv17q6w3d247djnc7g2rwbr3";
};
} // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.14.nix
···
with lib;
buildLinux (args // rec {
-
version = "5.14.7";
+
version = "5.14.8";
# modDirVersion needs to be x.y.z, will automatically add .0 if needed
modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg;
···
src = fetchurl {
url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz";
-
sha256 = "1avypasvic298823xzpzzkjbmfv9s8bjnmq92ri62qbakx23j9dg";
+
sha256 = "12cvvrxky92z1g9kj7pgb83yg9pnv2fvi7jf0pyagvqjqladl3na";
};
} // (args.argsOverride or { }))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.4.nix
···
with lib;
buildLinux (args // rec {
-
version = "5.4.148";
+
version = "5.4.149";
# modDirVersion needs to be x.y.z, will automatically add .0 if needed
modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg;
···
src = fetchurl {
url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz";
-
sha256 = "1cwibh0y112hip5yd0n692rv44jh4sk2g6mj5n44g754k4i366a6";
+
sha256 = "1s1zka0iay0drgkdnmzf587jbrg1gx13xv26k5r1qc7dik8xc6p7";
};
} // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/mdevd/default.nix
···
buildPackage {
pname = "mdevd";
-
version = "0.1.4.0";
-
sha256 = "1lnwk7qa6x7iia0v12i2jckg42ypi35hk3sa7cjm23ngnhiv5lzz";
+
version = "0.1.5.0";
+
sha256 = "01ykxgnbm53wijdrbld10664xy2wkvyzbbs98mfnqnf4h1y064n0";
description = "mdev-compatible Linux hotplug manager daemon";
platforms = lib.platforms.linux;
+2 -2
pkgs/os-specific/linux/s6-linux-init/default.nix
···
buildPackage {
pname = "s6-linux-init";
-
version = "1.0.6.3";
-
sha256 = "1idqjcxhl5wgff8yrsvx2812wahjri2hcs7qs6k62g0sdd8niqr9";
+
version = "1.0.6.4";
+
sha256 = "0grqk111d6aqym1c4l9j26fdqcgra1hvwb9vdgylrfbvn1c3hlpb";
description = "A set of minimalistic tools used to create a s6-based init system, including a /sbin/init binary, on a Linux kernel";
platforms = lib.platforms.linux;
+2 -2
pkgs/os-specific/linux/s6-linux-utils/default.nix
···
buildPackage {
pname = "s6-linux-utils";
-
version = "2.5.1.5";
-
sha256 = "1fj5ldlrc6bx40pphg29rp3byd6fal6869v85kw86c2kdgrxn063";
+
version = "2.5.1.6";
+
sha256 = "0hr49nl0d7a6i5w8cfg43xzvzayb8kpqij9xg7bmw2fyvc2z338z";
description = "A set of minimalistic Linux-specific system utilities";
platforms = lib.platforms.linux;
+4 -6
pkgs/os-specific/linux/sdnotify-wrapper/sdnotify-wrapper.c
···
Copyright: (C)2015-2020 Laurent Bercot. http://skarnet.org/
ISC license. See http://opensource.org/licenses/ISC
-
Build-time requirements: skalibs. http://skarnet.org/software/skalibs/
+
Build-time requirements: skalibs. https://skarnet.org/software/skalibs/
Run-time requirements: none, if you link skalibs statically.
-
+
Compilation:
gcc -o sdnotify-wrapper -L/usr/lib/skalibs sdnotify-wrapper.c -lskarnet
Use /usr/lib/skalibs/libskarnet.a instead of -lskarnet to link statically.
···
#include <skalibs/tai.h>
#include <skalibs/iopause.h>
#include <skalibs/djbunix.h>
-
//#include <skalibs/webipc.h>
-
// svanderburg: This header no longer exists, but socket.h provides the functions this module needs
#include <skalibs/socket.h>
#include <skalibs/exec.h>
···
{
char dummy[4096] ;
iopause_fd x = { .fd = fd, .events = IOPAUSE_READ } ;
-
tain_t deadline ;
+
tain deadline ;
tain_now_g() ;
if (timeout) tain_from_millisecs(&deadline, timeout) ;
else deadline = tain_infinite_relative ;
···
int df = 1, keep = 0 ;
PROG = "sdnotify-wrapper" ;
{
-
subgetopt_t l = SUBGETOPT_ZERO ;
+
subgetopt l = SUBGETOPT_ZERO ;
for (;;)
{
int opt = subgetopt_r(argc, argv, "d:ft:k", &l) ;
+77
pkgs/os-specific/linux/sydbox/default.nix
···
+
{ lib
+
, stdenv
+
, fetchurl
+
, pkg-config
+
, autoreconfHook
+
, python3
+
, perl
+
, libxslt
+
, docbook_xsl
+
, docbook_xml_dtd_42
+
, libseccomp
+
, installTests ? true, gnumake, which
+
, debugBuild ? false, libunwind
+
}:
+
+
stdenv.mkDerivation rec {
+
pname = "sydbox-1";
+
version = "2.2.0";
+
+
outputs = [ "out" "dev" "man" "doc" ]
+
++ lib.optional installTests "installedTests";
+
+
src = fetchurl {
+
url = "https://git.exherbo.org/${pname}.git/snapshot/${pname}-${version}.tar.xz";
+
sha256 = "0664myrrzbvsw73q5b7cqwgv4hl9a7vkm642s1r96gaxm16jk0z7";
+
};
+
+
nativeBuildInputs = [
+
pkg-config
+
autoreconfHook
+
python3
+
perl
+
libxslt.bin
+
docbook_xsl
+
docbook_xml_dtd_42
+
];
+
+
buildInputs = [
+
libseccomp
+
] ++ lib.optional debugBuild libunwind
+
++ lib.optionals installTests [
+
gnumake
+
python3
+
perl
+
which
+
];
+
+
enableParallelBuilding = true;
+
+
configureFlags = [ ]
+
++ lib.optionals installTests [ "--enable-installed-tests"
+
"--libexecdir=${placeholder "installedTests"}/libexec" ]
+
++ lib.optional debugBuild "--enable-debug";
+
+
makeFlags = [ "SYD_INCLUDEDIR=${stdenv.cc.libc.dev}/include" ];
+
+
doCheck = true;
+
checkPhase = ''
+
# Many of the regular test cases in t/ do not work inside the build sandbox
+
make -C syd check
+
'';
+
+
postInstall = if installTests then ''
+
moveToOutput bin/syd-test $installedTests
+
'' else ''
+
# Tests are installed despite --disable-installed-tests
+
rm -r $out/bin/syd-test $out/libexec
+
'';
+
+
meta = with lib; {
+
homepage = "https://sydbox.exherbo.org/";
+
description = "seccomp-based application sandbox";
+
license = licenses.gpl2;
+
platforms = platforms.linux;
+
maintainers = with maintainers; [ mvs ];
+
};
+
}
+1 -1
pkgs/servers/home-assistant/component-packages.nix
···
"lovelace" = ps: with ps; [ ];
"luci" = ps: with ps; [ openwrt-luci-rpc ];
"luftdaten" = ps: with ps; [ luftdaten ];
-
"lupusec" = ps: with ps; [ ]; # missing inputs: lupupy
+
"lupusec" = ps: with ps; [ lupupy ];
"lutron" = ps: with ps; [ pylutron ];
"lutron_caseta" = ps: with ps; [ aiolip pylutron-caseta ];
"lw12wifi" = ps: with ps; [ ]; # missing inputs: lw12
+16 -13
pkgs/servers/http/lighttpd/default.nix
···
{ lib, stdenv, buildPackages, fetchurl, pkg-config, pcre, libxml2, zlib, bzip2, which, file
-
, openssl, enableMagnet ? false, lua5_1 ? null
-
, enableMysql ? false, libmysqlclient ? null
-
, enableLdap ? false, openldap ? null
-
, enableWebDAV ? false, sqlite ? null, libuuid ? null
-
, enableExtendedAttrs ? false, attr ? null
+
, openssl
+
, enableDbi ? false, libdbi
+
, enableMagnet ? false, lua5_1
+
, enableMysql ? false, libmysqlclient
+
, enableLdap ? false, openldap
+
, enablePam ? false, linux-pam
+
, enableSasl ? false, cyrus_sasl
+
, enableWebDAV ? false, sqlite, libuuid
+
, enableExtendedAttrs ? false, attr
, perl
}:
-
assert enableMagnet -> lua5_1 != null;
-
assert enableMysql -> libmysqlclient != null;
-
assert enableLdap -> openldap != null;
-
assert enableWebDAV -> sqlite != null;
-
assert enableWebDAV -> libuuid != null;
-
assert enableExtendedAttrs -> attr != null;
-
stdenv.mkDerivation rec {
pname = "lighttpd";
version = "1.4.59";
···
nativeBuildInputs = [ pkg-config ];
buildInputs = [ pcre pcre.dev libxml2 zlib bzip2 which file openssl ]
+
++ lib.optional enableDbi libdbi
++ lib.optional enableMagnet lua5_1
++ lib.optional enableMysql libmysqlclient
++ lib.optional enableLdap openldap
+
++ lib.optional enablePam linux-pam
+
++ lib.optional enableSasl cyrus_sasl
++ lib.optional enableWebDAV sqlite
++ lib.optional enableWebDAV libuuid;
configureFlags = [ "--with-openssl" ]
+
++ lib.optional enableDbi "--with-dbi"
++ lib.optional enableMagnet "--with-lua"
++ lib.optional enableMysql "--with-mysql"
++ lib.optional enableLdap "--with-ldap"
+
++ lib.optional enablePam "--with-pam"
+
++ lib.optional enableSasl "--with-sasl"
++ lib.optional enableWebDAV "--with-webdav-props"
++ lib.optional enableWebDAV "--with-webdav-locks"
++ lib.optional enableExtendedAttrs "--with-attr";
···
homepage = "http://www.lighttpd.net/";
license = lib.licenses.bsd3;
platforms = platforms.linux ++ platforms.darwin;
-
maintainers = [ maintainers.bjornfor ];
+
maintainers = with maintainers; [ bjornfor brecht ];
};
}
+22
pkgs/servers/monitoring/prometheus/fastly-exporter.nix
···
+
{ lib, buildGoModule, fetchFromGitHub }:
+
+
buildGoModule rec {
+
pname = "fastly-exporter";
+
version = "6.1.0";
+
+
src = fetchFromGitHub {
+
owner = "peterbourgon";
+
repo = pname;
+
rev = "v${version}";
+
sha256 = "0my0pcxix5rk73m5ciz513nwmjcm7vjs6r8wg3vddm0xixv7zq94";
+
};
+
+
vendorSha256 = "1w9asky8h8l5gc0c6cv89m38qw50hyhma8qbsw3zirplhk9mb3r2";
+
+
meta = with lib; {
+
description = "Prometheus exporter for the Fastly Real-time Analytics API";
+
homepage = "https://github.com/peterbourgon/fastly-exporter";
+
license = licenses.asl20;
+
maintainers = teams.deshaw.members;
+
};
+
}
+5 -2
pkgs/servers/monitoring/zabbix/server.nix
···
, sshSupport ? true, libssh2
, mysqlSupport ? false, libmysqlclient
, postgresqlSupport ? false, postgresql
+
, ipmiSupport ? false, openipmi
}:
# ensure exactly one primary database type is selected
···
++ optional snmpSupport net-snmp
++ optional sshSupport libssh2
++ optional mysqlSupport libmysqlclient
-
++ optional postgresqlSupport postgresql;
+
++ optional postgresqlSupport postgresql
+
++ optional ipmiSupport openipmi;
configureFlags = [
"--enable-server"
···
++ optional snmpSupport "--with-net-snmp"
++ optional sshSupport "--with-ssh2=${libssh2.dev}"
++ optional mysqlSupport "--with-mysql"
-
++ optional postgresqlSupport "--with-postgresql";
+
++ optional postgresqlSupport "--with-postgresql"
+
++ optional ipmiSupport "--with-openipmi=${openipmi.dev}";
prePatch = ''
find database -name data.sql -exec sed -i 's|/usr/bin/||g' {} +
+2 -2
pkgs/servers/teleport/default.nix
···
in
buildGoModule rec {
pname = "teleport";
-
version = "7.1.2";
+
version = "7.1.3";
# This repo has a private submodule "e" which fetchgit cannot handle without failing.
src = fetchFromGitHub {
owner = "gravitational";
repo = "teleport";
rev = "v${version}";
-
sha256 = "sha256-1/Dmh7jTlGg3CqNZDFNIT8/OvgzkHG2m6Qs0ya4IM18=";
+
sha256 = "sha256-upzEfImMuYU/6F5HSR3Jah3QiMXEt0XMpNAPzEYV1Nk=";
};
vendorSha256 = null;
+6 -7
pkgs/servers/web-apps/discourse/default.nix
···
, fetchFromGitHub, bundlerEnv, callPackage
, ruby, replace, gzip, gnutar, git, cacert, util-linux, gawk
-
, imagemagick, optipng, pngquant, libjpeg, jpegoptim, gifsicle, libpsl
-
, redis, postgresql, which, brotli, procps, rsync, nodePackages, v8
+
, imagemagick, optipng, pngquant, libjpeg, jpegoptim, gifsicle, jhead
+
, libpsl, redis, postgresql, which, brotli, procps, rsync
+
, nodePackages, v8
, plugins ? []
}@args:
let
-
version = "2.7.7";
+
version = "2.7.8";
src = fetchFromGitHub {
owner = "discourse";
repo = "discourse";
rev = "v${version}";
-
sha256 = "sha256-rhcTQyirgPX0ITjgotJAYLLSU957GanxAYYhy9j123U=";
+
sha256 = "sha256-p4eViEvzIU6W89FZRtMBXsT7bvf2H12bTPZ/h3iD8rA=";
};
runtimeDeps = [
···
jpegoptim
gifsicle
nodePackages.svgo
+
jhead
];
runtimeEnv = {
···
# Add a noninteractive admin creation task
./admin_create.patch
-
-
# Disable jhead, which is currently marked as vulnerable
-
./disable_jhead.patch
# Add the path to the CA cert bundle to make TLS work
./action_mailer_ca_cert.patch
-12
pkgs/servers/web-apps/discourse/disable_jhead.patch
···
-
diff --git a/lib/file_helper.rb b/lib/file_helper.rb
-
index d87da5a85e..f5323292d7 100644
-
--- a/lib/file_helper.rb
-
+++ b/lib/file_helper.rb
-
@@ -127,6 +127,7 @@ class FileHelper
-
jpegrecompress: false,
-
# Skip looking for gifsicle, svgo binaries
-
gifsicle: false,
-
+ jhead: false,
-
svgo: false
-
)
-
end
+2 -2
pkgs/servers/web-apps/discourse/plugins/discourse-calendar/Gemfile.lock
···
GEM
remote: https://rubygems.org/
specs:
-
activesupport (6.1.4)
+
activesupport (6.1.4.1)
concurrent-ruby (~> 1.0, >= 1.0.2)
i18n (>= 1.6, < 2)
minitest (>= 5.1)
···
rrule (= 0.4.2)
BUNDLED WITH
-
2.2.20
+
2.2.24
+2 -2
pkgs/servers/web-apps/discourse/plugins/discourse-calendar/default.nix
···
src = fetchFromGitHub {
owner = "discourse";
repo = "discourse-calendar";
-
rev = "519cf403ae3003291de20145aca243e2ffbcb4a2";
-
sha256 = "0398cf7k03i7j7v5w1mysjzk2npbkvr7icj5sjwa8i8xzg34gck4";
+
rev = "2f76cdd3064735d484be1df77f43100aca21aea6";
+
sha256 = "1skpc8p5br1jkii1rksha1q95ias6xxyvi5bnli3q41w7fz1h5j2";
};
meta = with lib; {
homepage = "https://github.com/discourse/discourse-calendar";
+2 -2
pkgs/servers/web-apps/discourse/plugins/discourse-calendar/gemset.nix
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "0kqgywy4cj3h5142dh7pl0xx5nybp25jn0ykk0znziivzks68xdk";
+
sha256 = "19gx1jcq46x9d1pi1w8xq0bgvvfw239y4lalr8asm291gj3q3ds4";
type = "gem";
};
-
version = "6.1.4";
+
version = "6.1.4.1";
};
concurrent-ruby = {
groups = ["default"];
+2 -2
pkgs/servers/web-apps/discourse/plugins/discourse-canned-replies/default.nix
···
src = fetchFromGitHub {
owner = "discourse";
repo = "discourse-canned-replies";
-
rev = "672a96a8160d3767cf5fd6647309c7b5dcf8a55d";
-
sha256 = "105zgpc7j3xmlkaz3cgxw1rfgy5d3dzln58ix569jmzifbsijml7";
+
rev = "1bb77ebbe0577f257bc16783dc8b7bbf2d915092";
+
sha256 = "0qvx8k9jsxjllqsqpf4k0j4niv1k2sggy6ak067wigs8ha3dkcr0";
};
meta = with lib; {
homepage = "https://github.com/discourse/discourse-canned-replies";
+2 -2
pkgs/servers/web-apps/discourse/plugins/discourse-checklist/default.nix
···
src = fetchFromGitHub {
owner = "discourse";
repo = "discourse-checklist";
-
rev = "6e7b9c5040c55795c7fd4db9569b3e93dad092c2";
-
sha256 = "sha256-2KAVBrfAvhLZC9idi+ijbVqOCq9rSXbDVEOZS+mWJ10=";
+
rev = "48855d81b7c3a3274f7f78a64312125c344d92d1";
+
sha256 = "0139v5wpyglfzvd07ka6gic1ssfysisgfiq09dsbjy519gnc9kjw";
};
meta = with lib; {
homepage = "https://github.com/discourse/discourse-checklist";
+2 -2
pkgs/servers/web-apps/discourse/plugins/discourse-github/Gemfile.lock
···
specs:
addressable (2.8.0)
public_suffix (>= 2.0.2, < 5.0)
-
faraday (1.7.0)
+
faraday (1.8.0)
faraday-em_http (~> 1.0)
faraday-em_synchrony (~> 1.0)
faraday-excon (~> 1.1)
···
sawyer (= 0.8.2)
BUNDLED WITH
-
2.2.20
+
2.2.24
+2 -2
pkgs/servers/web-apps/discourse/plugins/discourse-github/default.nix
···
src = fetchFromGitHub {
owner = "discourse";
repo = "discourse-github";
-
rev = "b6ad8e39a13e2ad5c6943ea697ca23f2c5f9fec1";
-
sha256 = "0vxwp4kbf44clcqilb8ni0ykk4jrgiv4rbd05pgfvndcp3izm2i6";
+
rev = "9aaf4350968fb758f9bff3588f78e3ad24ddb4b0";
+
sha256 = "0nmpkh1rr0jv68a655f5610v2mn09xriiqv049a0gklap2lgv7p8";
};
meta = with lib; {
homepage = "https://github.com/discourse/discourse-github";
+2 -2
pkgs/servers/web-apps/discourse/plugins/discourse-github/gemset.nix
···
platforms = [];
source = {
remotes = ["https://rubygems.org"];
-
sha256 = "0r6ik2yvsbx6jj30vck32da2bbvj4m0gf4jhp09vr75i1d6jzfvb";
+
sha256 = "0afhlqgby2cizcwgh7h2sq5f77q01axjbdl25bsvfwsry9n7gyyi";
type = "gem";
};
-
version = "1.7.0";
+
version = "1.8.0";
};
faraday-em_http = {
groups = ["default"];
+2 -2
pkgs/servers/web-apps/discourse/plugins/discourse-math/default.nix
···
src = fetchFromGitHub {
owner = "discourse";
repo = "discourse-math";
-
rev = "aed0c83cee568d5239143bcf1df59c5fbe86b276";
-
sha256 = "1k6kpnhf8s2l0w9zr5pn3wvn8w0n3gwkv7qkv0mkhkzy246ag20z";
+
rev = "d7d0180352dd5a7dcb76c0817bfbb08c2a0f08c7";
+
sha256 = "0y72impvnq965ibbfc9877hr78fxkrwav1xmgyy3r9w87952vcwa";
};
meta = with lib; {
homepage = "https://github.com/discourse/discourse-math";
+2 -2
pkgs/servers/web-apps/discourse/plugins/discourse-solved/default.nix
···
src = fetchFromGitHub {
owner = "discourse";
repo = "discourse-solved";
-
rev = "8bf54370200fe9d94541f69339430a7dc1019d62";
-
sha256 = "1sk91h4dilkxm1wpv8zw59wgw860ywwlcgiw2kd23ybdk9n7b3lh";
+
rev = "55cb184f7ef2954326561cc44fc8134798b8a9e0";
+
sha256 = "0pv5i216zn0v8xfwlndvhvr06vkmxaynj8xjfnc5amy1sp6k76w7";
};
meta = with lib; {
homepage = "https://github.com/discourse/discourse-solved";
+2 -2
pkgs/servers/web-apps/discourse/plugins/discourse-spoiler-alert/default.nix
···
src = fetchFromGitHub {
owner = "discourse";
repo = "discourse-spoiler-alert";
-
rev = "ec14a2316da0a4fc055cfc21c68a60040188a2b4";
-
sha256 = "11n977gp8va7jkqa6i3ja279k4nmkhk5l4hg9xhs229450m1rnfp";
+
rev = "0b93227ea8e2c72afe72029382081ebff89c3638";
+
sha256 = "0x0dxb41ss15sv5ph7z7q55ayf8a7r22bgkmr17924mny5440b5a";
};
meta = with lib; {
homepage = "https://github.com/discourse/discourse-spoiler-alert";
+2 -2
pkgs/servers/web-apps/discourse/plugins/discourse-yearly-review/default.nix
···
src = fetchFromGitHub {
owner = "discourse";
repo = "discourse-yearly-review";
-
rev = "95149df2282d62eebeb265b4895df15a2b259d03";
-
sha256 = "02n27al8n8cxz3dx4awlnd4qhv8a0fmjac57yyblmpviapja1wj7";
+
rev = "cb040562f6af3163d70e8932867b530c6640ab9a";
+
sha256 = "07h6nq4bafs27ly2f5chkn5vb1wdy909qffwkgp5k1fanhbqvhvs";
};
meta = with lib; {
homepage = "https://github.com/discourse/discourse-yearly-review";
+1 -1
pkgs/servers/web-apps/discourse/rubyEnv/Gemfile.lock
···
yaml-lint
BUNDLED WITH
-
2.2.20
+
2.2.24
+3 -3
pkgs/servers/web-apps/vikunja/api.nix
···
buildGoModule rec {
pname = "vikunja-api";
-
version = "0.18.0";
+
version = "0.18.1";
src = fetchFromGitea {
domain = "kolaente.dev";
owner = "vikunja";
repo = "api";
rev = "v${version}";
-
sha256 = "sha256-43y9+y5VVgbCexHPsYZ9/Up84OoPSrThHWiKR0P1h3s=";
+
sha256 = "sha256-ngdtK8e4mLpbuY9OP1aHk99qPX/cKwnyhb/3ImTwF6M=";
};
nativeBuildInputs =
···
'';
in [ fakeGit mage ];
-
vendorSha256 = "sha256-1tXnlOlVH61Y4jN07XBfTgZhAsU2HeudiEVAtlP+Cpk=";
+
vendorSha256 = "sha256-0MP04KpWX17Fa1WhLwF4yzIsDqGAeTUXxv81B+BTNe4=";
# checks need to be disabled because of needed internet for some checks
doCheck = false;
+2 -2
pkgs/servers/web-apps/vikunja/frontend.nix
···
stdenv.mkDerivation rec {
pname = "vikunja-frontend";
-
version = "0.18.0";
+
version = "0.18.1";
src = fetchurl {
url = "https://dl.vikunja.io/frontend/${pname}-${version}.zip";
-
sha256 = "sha256-LV7+HfXeNcVHuoo+n6fuAQoIb/m0lOs6JYYMNLM/jTA=";
+
sha256 = "sha256-u4XA6Jqn+p2J0sB2KabwZY/lFwZakZEvUUh/enrhtN4=";
};
nativeBuildInputs = [ unzip ];
+3 -3
pkgs/tools/filesystems/apfsprogs/default.nix
···
stdenv.mkDerivation {
pname = "apfsprogs";
-
version = "unstable-2021-05-07";
+
version = "unstable-2021-08-24";
src = fetchFromGitHub {
owner = "linux-apfs";
repo = "apfsprogs";
-
rev = "d360211a30608a907e3ee8ad4468d606c40ec2d7";
-
sha256 = "sha256-SeFs/GQfIEvnxERyww+mnynjR7E02DdtBA6JsknEM+Q=";
+
rev = "5efac5a701bcb56e23cfc182b5b3901bff27d343";
+
sha256 = "sha256-vQE586HwrPkF0uaTKrJ7yXb24ntRI0QmBla7N2ErAU8=";
};
buildPhase = ''
+2 -2
pkgs/tools/inputmethods/fcitx5/default.nix
···
in
stdenv.mkDerivation rec {
pname = "fcitx5";
-
version = "5.0.8";
+
version = "5.0.9";
src = fetchFromGitHub {
owner = "fcitx";
repo = pname;
rev = version;
-
sha256 = "0czj2awvgk9apdh9rj3vcb04g8x2wp1d4sshvch31nwpqs10hssr";
+
sha256 = "161xgm2fs51v8l46raz6xxkjmshpgaaax64lz8208m7fcd32ll3a";
};
prePatch = ''
+2 -2
pkgs/tools/inputmethods/fcitx5/fcitx5-rime.nix
···
stdenv.mkDerivation rec {
pname = "fcitx5-rime";
-
version = "5.0.6";
+
version = "5.0.7";
src = fetchFromGitHub {
owner = "fcitx";
repo = pname;
rev = version;
-
sha256 = "1r36c1pl63vka9mxa8f5x0kijapjgxzz5b4db8h87ri9kcxk7i2g";
+
sha256 = "1djakg17rxc38smja4y76i0p4gwdj3lgwym8kybkaspk7lxr62zy";
};
cmakeFlags = [
+2 -2
pkgs/tools/misc/execline/default.nix
···
buildPackage {
pname = "execline";
-
version = "2.8.0.1";
-
sha256 = "1v9swmhw2rcrr9fmkmd7qh8qq0kslhmvxwz2a3bhan9ksabz8wx3";
+
version = "2.8.1.0";
+
sha256 = "0msmzf5zwjcsgjlvvq28rd2i0fkdb2skmv8ii0ix8dhyckwwjmav";
description = "A small scripting language, to be used in place of a shell in non-interactive scripts";
+3 -3
pkgs/tools/misc/fclones/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "fclones";
-
version = "0.15.0";
+
version = "0.16.0";
src = fetchFromGitHub {
owner = "pkolaczk";
repo = pname;
rev = "v${version}";
-
sha256 = "sha256-8NUneKJpnBjC4OcAABEpI9p+saBqAk+l43FS8/tIYjc=";
+
sha256 = "sha256-BoCbN7EY7SmBYCS3OLFrQ1j1MUvZ+/oQAdoHCw9kCQE=";
};
-
cargoSha256 = "sha256-5qX45FJFaiE1vTXjllM9U1w57MX18GgKEFOEBMc64Jk=";
+
cargoSha256 = "sha256-pAYPfRm7QN4mKwnYUMq5Td+bF1tmy3oGObWvMabmnpw=";
buildInputs = lib.optionals stdenv.isDarwin [
AppKit
+7 -2
pkgs/tools/misc/fdtools/default.nix
···
let
pname = "fdtools";
+
# When you update, check whether we can drop the skalibs pin.
version = "2020.05.04";
sha256 = "0lnafcp4yipi0dl8gh33zjs8wlpz0mim8mwmiz9s49id0b0fmlla";
+
skalibs = skawarePackages.skalibs_2_10;
in stdenv.mkDerivation {
inherit pname version;
···
patches = [ ./new-skalibs.patch ];
outputs = [ "bin" "lib" "dev" "doc" "out" ];
-
buildInputs = [ skawarePackages.skalibs ];
+
buildInputs = [
+
# temporary, until fdtools catches up to skalibs
+
skalibs
+
];
configurePhase = ''
cd ${pname}-${version}
···
conf-compile/defaults/host_compile.sh \
> conf-compile/host_compile.sh
-
echo "${skawarePackages.skalibs.lib}/lib/skalibs/sysdeps" \
+
echo "${skalibs.lib}/lib/skalibs/sysdeps" \
> conf-compile/depend_skalibs_sysdeps
'';
+2 -2
pkgs/tools/misc/s6-portable-utils/default.nix
···
buildPackage {
pname = "s6-portable-utils";
-
version = "2.2.3.2";
-
sha256 = "173nmygkp7ky3093dg4rx3ahvyl7ll86z8qj6pl3jd96xb9s49v6";
+
version = "2.2.3.3";
+
sha256 = "132jj5qk8x40kw6lrrn7jiqhvqj9d2h6g6mhl8zma1sp37bg0i84";
description = "A set of tiny general Unix utilities optimized for simplicity and small size";
+2 -2
pkgs/tools/networking/s6-dns/default.nix
···
buildPackage {
pname = "s6-dns";
-
version = "2.3.5.1";
-
sha256 = "0qsgqwdr5ms337fc9f2b4aa5cr7myvbzndvgkgswnrdwszjm078c";
+
version = "2.3.5.2";
+
sha256 = "0nczzjprvp6wirzycgf5h32dlgx4r8grzkqhif27n3ii6f5g78yw";
description = "A suite of DNS client programs and libraries for Unix systems";
+2 -3
pkgs/tools/networking/s6-networking/default.nix
···
buildPackage {
pname = "s6-networking";
-
version = "2.4.1.1";
-
sha256 = "0m55ibx7k2wgrqbpci1n667ij0h925ajzggxalq2pj65kmwcmyx3";
+
version = "2.5.0.0";
+
sha256 = "1fn3g9gkwgmnxallhk82f5rly81pnkilj7n49g5fbfmaalsq96mh";
description = "A suite of small networking utilities for Unix systems";
···
postInstall = ''
# remove all s6 executables from build directory
rm $(find -name "s6-*" -type f -mindepth 1 -maxdepth 1 -executable)
-
rm minidentd
rm libs6net.* libstls.* libs6tls.* libsbearssl.*
mv doc $doc/share/doc/s6-networking/html
+2 -2
pkgs/tools/networking/ytcc/default.nix
···
python3Packages.buildPythonApplication rec {
pname = "ytcc";
-
version = "2.3.0";
+
version = "2.4.1";
src = fetchFromGitHub {
owner = "woefe";
repo = "ytcc";
rev = "v${version}";
-
sha256 = "1q0w3b7r93416s28qra608n0d7cjh95nwkzgg23z5hp5sq3w3izr";
+
sha256 = "00fx1zlfz4gj46ahgvawc21rx6s49qrzd8am3p2yzmc12ibfqyhv";
};
nativeBuildInputs = [ gettext ];
+2 -2
pkgs/tools/system/s6-rc/default.nix
···
buildPackage {
pname = "s6-rc";
-
version = "0.5.2.2";
-
sha256 = "12bzc483jpd16xmhfsfrib84daj1k3kwy5s5nc18ap60apa1r39a";
+
version = "0.5.2.3";
+
sha256 = "1f92dxw1n8r8avamixi9k0gqbnkpm0r3fmwzz7jd82g6bb2vsg5z";
description = "A service manager for s6-based systems";
platforms = lib.platforms.unix;
+3 -2
pkgs/tools/system/s6/default.nix
···
buildPackage {
pname = "s6";
-
version = "2.10.0.3";
-
sha256 = "0mw7blp8dwr09z58m9mrxwmmvvpnjzq9klcf1vgm0hbha4qkf88x";
+
version = "2.11.0.0";
+
sha256 = "1a3lj0xfhn1w3a4ygqsxy8q4dr3n48hnwml4xzdpz3nrikhy8if5";
description = "skarnet.org's small & secure supervision software suite";
···
# remove all s6 executables from build directory
rm $(find -type f -mindepth 1 -maxdepth 1 -executable)
rm libs6.*
+
rm ./libs6lockd.a.xyzzy
mv doc $doc/share/doc/s6/html
mv examples $doc/share/doc/s6/examples
+19 -10
pkgs/top-level/all-packages.nix
···
swego = callPackage ../servers/swego { };
+
sydbox = callPackage ../os-specific/linux/sydbox { };
+
syscall_limiter = callPackage ../os-specific/linux/syscall_limiter {};
syslogng = callPackage ../tools/system/syslog-ng { };
···
inherit (callPackages ../development/compilers/crystal {
llvmPackages = llvmPackages_10;
-
crystal_0_33
-
crystal_0_34
-
crystal_0_35
crystal_0_36
crystal_1_0
crystal;
···
shallot = callPackage ../tools/misc/shallot { };
inherit (callPackage ../development/tools/build-managers/shards { })
-
shards_0_11
-
shards_0_14
+
shards_0_15
shards;
shellcheck = callPackage ../development/tools/shellcheck {};
···
proj = callPackage ../development/libraries/proj { };
+
proj_7 = callPackage ../development/libraries/proj/7.nix { };
+
proj-datumgrid = callPackage ../development/libraries/proj-datumgrid { };
proselint = callPackage ../tools/text/proselint {
···
skaffold = callPackage ../development/tools/skaffold { };
skalibs = skawarePackages.skalibs;
+
skalibs_2_10 = skawarePackages.skalibs_2_10;
skawarePackages = recurseIntoAttrs rec {
cleanPackaging = callPackage ../build-support/skaware/clean-packaging.nix { };
···
buildManPages = callPackage ../build-support/skaware/build-skaware-man-pages.nix { };
skalibs = callPackage ../development/libraries/skalibs { };
+
skalibs_2_10 = callPackage ../development/libraries/skalibs/2_10.nix { };
execline = callPackage ../tools/misc/execline { };
execline-man-pages = callPackage ../data/documentation/execline-man-pages {
···
prometheus-dnsmasq-exporter = callPackage ../servers/monitoring/prometheus/dnsmasq-exporter.nix { };
prometheus-dovecot-exporter = callPackage ../servers/monitoring/prometheus/dovecot-exporter.nix { };
prometheus-domain-exporter = callPackage ../servers/monitoring/prometheus/domain-exporter.nix { };
+
prometheus-fastly-exporter = callPackage ../servers/monitoring/prometheus/fastly-exporter.nix { };
prometheus-flow-exporter = callPackage ../servers/monitoring/prometheus/flow-exporter.nix { };
prometheus-fritzbox-exporter = callPackage ../servers/monitoring/prometheus/fritzbox-exporter.nix { };
prometheus-gitlab-ci-pipelines-exporter = callPackage ../servers/monitoring/prometheus/gitlab-ci-pipelines-exporter.nix { };
···
obsidian = callPackage ../applications/misc/obsidian { };
octoprint = callPackage ../applications/misc/octoprint { };
+
+
ocr-a = callPackage ../data/fonts/ocr-a {};
ocrad = callPackage ../applications/graphics/ocrad { };
···
qimgv = libsForQt5.callPackage ../applications/graphics/qimgv { };
-
qlandkartegt = libsForQt514.callPackage ../applications/misc/qlandkartegt {};
+
qlandkartegt = libsForQt514.callPackage ../applications/misc/qlandkartegt {
+
gdal = gdal.override {
+
libgeotiff = libgeotiff.override { proj = proj_7; };
+
libspatialite = libspatialite.override { proj = proj_7; };
+
proj = proj_7;
+
};
+
proj = proj_7;
+
};
garmindev = callPackage ../applications/misc/qlandkartegt/garmindev.nix {};
···
gildas = callPackage ../applications/science/astronomy/gildas { };
-
gplates = callPackage ../applications/science/misc/gplates {
-
boost = boost160;
-
cgal = cgal.override { boost = boost160; };
-
};
+
gplates = libsForQt5.callPackage ../applications/science/misc/gplates { };
gravit = callPackage ../applications/science/astronomy/gravit { };
+6 -10
pkgs/top-level/lua-packages.nix
···
, fetchFromGitHub, which, writeText
, pkgs
, lib
-
}:
+
}@args:
let
packages = ( self:
let
-
-
# a function of lua_path / lua_cpath
-
lua-setup-hook = callPackage ../development/interpreters/lua-5/setup-hook.nix {
-
inherit lib;
-
};
-
callPackage = pkgs.newScope self;
buildLuaApplication = args: buildLuarocksPackage ({namePrefix="";} // args );
···
# helper functions for dealing with LUA_PATH and LUA_CPATH
lib = luaLib;
-
getLuaPath = drv: luaLib.getPath drv (luaLib.luaPathList lua.luaversion) ;
-
getLuaCPath = drv: luaLib.getPath drv (luaLib.luaCPathList lua.luaversion) ;
+
getLuaPath = drv: getPath drv (luaLib.luaPathList lua.luaversion) ;
+
getLuaCPath = drv: getPath drv (luaLib.luaCPathList lua.luaversion) ;
+
inherit (callPackage ../development/interpreters/lua-5/hooks { inherit (args) lib;})
+
lua-setup-hook;
-
inherit lua lua-setup-hook callPackage;
+
inherit lua callPackage;
inherit buildLuaPackage buildLuarocksPackage buildLuaApplication;
inherit (luaLib) luaOlder luaAtLeast isLua51 isLua52 isLua53 isLuaJIT
requiredLuaModules toLuaModule hasLuaModule;
+2
pkgs/top-level/python-packages.nix
···
lupa = callPackage ../development/python-modules/lupa { };
+
lupupy = callPackage ../development/python-modules/lupupy { };
+
lxml = callPackage ../development/python-modules/lxml {
inherit (pkgs) libxml2 libxslt zlib;
};
+1
pkgs/top-level/wine-packages.nix
···
ldapSupport = true;
faudioSupport = true;
vkd3dSupport = true;
+
embedInstallers = true;
};
stable = base.override { wineRelease = "stable"; };