Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
20ebbe6b 17305d2d

+594 -116
+16
maintainers/maintainer-list.nix
··· 3991 3991 githubId = 19825977; 3992 3992 name = "Hiren Shah"; 3993 3993 }; 3994 + hiro98 = { 3995 + email = "hiro@protagon.space"; 3996 + github = "vale981"; 3997 + githubId = 4025991; 3998 + name = "Valentin Boettcher"; 3999 + keys = [{ 4000 + longkeyid = "rsa2048/0xC22D4DE4D7B32D19"; 4001 + fingerprint = "45A9 9917 578C D629 9F5F B5B4 C22D 4DE4 D7B3 2D19"; 4002 + }]; 4003 + }; 3994 4004 hjones2199 = { 3995 4005 email = "hjones2199@gmail.com"; 3996 4006 github = "hjones2199"; ··· 7030 7040 github = "nequissimus"; 7031 7041 githubId = 628342; 7032 7042 name = "Tim Steinbach"; 7043 + }; 7044 + netcrns = { 7045 + email = "jason.wing@gmx.de"; 7046 + github = "netcrns"; 7047 + githubId = 34162313; 7048 + name = "Jason Wing"; 7033 7049 }; 7034 7050 netixx = { 7035 7051 email = "dev.espinetfrancois@gmail.com";
+115 -3
nixos/modules/services/misc/gitlab.nix
··· 155 155 GITLAB_REDIS_CONFIG_FILE = pkgs.writeText "redis.yml" (builtins.toJSON redisConfig); 156 156 prometheus_multiproc_dir = "/run/gitlab"; 157 157 RAILS_ENV = "production"; 158 + MALLOC_ARENA_MAX = "2"; 158 159 }; 159 160 160 161 gitlab-rake = pkgs.stdenv.mkDerivation { ··· 652 653 description = "Extra configuration to merge into shell-config.yml"; 653 654 }; 654 655 656 + puma.workers = mkOption { 657 + type = types.int; 658 + default = 2; 659 + apply = x: builtins.toString x; 660 + description = '' 661 + The number of worker processes Puma should spawn. This 662 + controls the amount of parallel Ruby code can be 663 + executed. GitLab recommends <quote>Number of CPU cores - 664 + 1</quote>, but at least two. 665 + 666 + <note> 667 + <para> 668 + Each worker consumes quite a bit of memory, so 669 + be careful when increasing this. 670 + </para> 671 + </note> 672 + ''; 673 + }; 674 + 675 + puma.threadsMin = mkOption { 676 + type = types.int; 677 + default = 0; 678 + apply = x: builtins.toString x; 679 + description = '' 680 + The minimum number of threads Puma should use per 681 + worker. 682 + 683 + <note> 684 + <para> 685 + Each thread consumes memory and contributes to Global VM 686 + Lock contention, so be careful when increasing this. 687 + </para> 688 + </note> 689 + ''; 690 + }; 691 + 692 + puma.threadsMax = mkOption { 693 + type = types.int; 694 + default = 4; 695 + apply = x: builtins.toString x; 696 + description = '' 697 + The maximum number of threads Puma should use per 698 + worker. This limits how many threads Puma will automatically 699 + spawn in response to requests. In contrast to workers, 700 + threads will never be able to run Ruby code in parallel, but 701 + give higher IO parallelism. 702 + 703 + <note> 704 + <para> 705 + Each thread consumes memory and contributes to Global VM 706 + Lock contention, so be careful when increasing this. 707 + </para> 708 + </note> 709 + ''; 710 + }; 711 + 712 + sidekiq.memoryKiller.enable = mkOption { 713 + type = types.bool; 714 + default = true; 715 + description = '' 716 + Whether the Sidekiq MemoryKiller should be turned 717 + on. MemoryKiller kills Sidekiq when its memory consumption 718 + exceeds a certain limit. 719 + 720 + See <link xlink:href="https://docs.gitlab.com/ee/administration/operations/sidekiq_memory_killer.html"/> 721 + for details. 722 + ''; 723 + }; 724 + 725 + sidekiq.memoryKiller.maxMemory = mkOption { 726 + type = types.int; 727 + default = 2000; 728 + apply = x: builtins.toString (x * 1024); 729 + description = '' 730 + The maximum amount of memory, in MiB, a Sidekiq worker is 731 + allowed to consume before being killed. 732 + ''; 733 + }; 734 + 735 + sidekiq.memoryKiller.graceTime = mkOption { 736 + type = types.int; 737 + default = 900; 738 + apply = x: builtins.toString x; 739 + description = '' 740 + The time MemoryKiller waits after noticing excessive memory 741 + consumption before killing Sidekiq. 742 + ''; 743 + }; 744 + 745 + sidekiq.memoryKiller.shutdownWait = mkOption { 746 + type = types.int; 747 + default = 30; 748 + apply = x: builtins.toString x; 749 + description = '' 750 + The time allowed for all jobs to finish before Sidekiq is 751 + killed forcefully. 752 + ''; 753 + }; 754 + 655 755 extraConfig = mkOption { 656 756 type = types.attrs; 657 757 default = {}; ··· 993 1093 ] ++ optional (cfg.databaseHost == "") "postgresql.service"; 994 1094 wantedBy = [ "gitlab.target" ]; 995 1095 partOf = [ "gitlab.target" ]; 996 - environment = gitlabEnv; 1096 + environment = gitlabEnv // (optionalAttrs cfg.sidekiq.memoryKiller.enable { 1097 + SIDEKIQ_MEMORY_KILLER_MAX_RSS = cfg.sidekiq.memoryKiller.maxMemory; 1098 + SIDEKIQ_MEMORY_KILLER_GRACE_TIME = cfg.sidekiq.memoryKiller.graceTime; 1099 + SIDEKIQ_MEMORY_KILLER_SHUTDOWN_WAIT = cfg.sidekiq.memoryKiller.shutdownWait; 1100 + }); 997 1101 path = with pkgs; [ 998 1102 postgresqlPackage 999 1103 git ··· 1005 1109 # Needed for GitLab project imports 1006 1110 gnutar 1007 1111 gzip 1112 + 1113 + procps # Sidekiq MemoryKiller 1008 1114 ]; 1009 1115 serviceConfig = { 1010 1116 Type = "simple"; 1011 1117 User = cfg.user; 1012 1118 Group = cfg.group; 1013 1119 TimeoutSec = "infinity"; 1014 - Restart = "on-failure"; 1120 + Restart = "always"; 1015 1121 WorkingDirectory = "${cfg.packages.gitlab}/share/gitlab"; 1016 1122 ExecStart="${cfg.packages.gitlab.rubyEnv}/bin/sidekiq -C \"${cfg.packages.gitlab}/share/gitlab/config/sidekiq_queues.yml\" -e production"; 1017 1123 }; ··· 1145 1251 TimeoutSec = "infinity"; 1146 1252 Restart = "on-failure"; 1147 1253 WorkingDirectory = "${cfg.packages.gitlab}/share/gitlab"; 1148 - ExecStart = "${cfg.packages.gitlab.rubyEnv}/bin/puma -C ${cfg.statePath}/config/puma.rb -e production"; 1254 + ExecStart = concatStringsSep " " [ 1255 + "${cfg.packages.gitlab.rubyEnv}/bin/puma" 1256 + "-e production" 1257 + "-C ${cfg.statePath}/config/puma.rb" 1258 + "-w ${cfg.puma.workers}" 1259 + "-t ${cfg.puma.threadsMin}:${cfg.puma.threadsMax}" 1260 + ]; 1149 1261 }; 1150 1262 1151 1263 };
+1 -1
nixos/tests/all-tests.nix
··· 48 48 buildkite-agents = handleTest ./buildkite-agents.nix {}; 49 49 caddy = handleTest ./caddy.nix {}; 50 50 cadvisor = handleTestOn ["x86_64-linux"] ./cadvisor.nix {}; 51 - cage = handleTest ./cage.nix {}; 51 + cage = handleTestOn ["x86_64-linux"] ./cage.nix {}; 52 52 cagebreak = handleTest ./cagebreak.nix {}; 53 53 calibre-web = handleTest ./calibre-web.nix {}; 54 54 cassandra_2_1 = handleTest ./cassandra.nix { testPackage = pkgs.cassandra_2_1; };
+5
nixos/tests/cage.nix
··· 25 25 testScript = { nodes, ... }: let 26 26 user = nodes.machine.config.users.users.alice; 27 27 in '' 28 + # Need to switch to a different VGA card / GPU driver because Cage segfaults with the default one (std): 29 + # machine # [ 14.355893] .cage-wrapped[736]: segfault at 20 ip 00007f035fa0d8c7 sp 00007ffce9e4a2f0 error 4 in libwlroots.so.8[7f035fa07000+5a000] 30 + # machine # [ 14.358108] Code: 4f a8 ff ff eb aa 0f 1f 44 00 00 c3 0f 1f 80 00 00 00 00 41 54 49 89 f4 55 31 ed 53 48 89 fb 48 8d 7f 18 48 8d 83 b8 00 00 00 <80> 7f 08 00 75 0d 48 83 3f 00 0f 85 91 00 00 00 48 89 fd 48 83 c7 31 + os.environ["QEMU_OPTS"] = "-vga virtio" 32 + 28 33 with subtest("Wait for cage to boot up"): 29 34 start_all() 30 35 machine.wait_for_file("/run/user/${toString user.uid}/wayland-0.lock")
+9 -8
pkgs/applications/misc/josm/default.nix
··· 1 - { lib, stdenv, fetchurl, fetchsvn, makeWrapper, unzip, jre, libXxf86vm }: 1 + { lib, stdenv, fetchurl, fetchsvn, makeWrapper, unzip, jre, libXxf86vm 2 + , extraJavaOpts ? "-Djosm.restart=true -Djava.net.useSystemProxies=true" 3 + }: 2 4 let 3 5 pname = "josm"; 4 - version = "17702"; 6 + version = "17833"; 5 7 srcs = { 6 8 jar = fetchurl { 7 9 url = "https://josm.openstreetmap.de/download/josm-snapshot-${version}.jar"; 8 - sha256 = "1p7p0jd87sxrs5n0r82apkilx0phgmjw7vpdg8qrr5msda4rsmpk"; 10 + sha256 = "sha256-i3seRVfCLXNvUkWAAPZK0XloRHuXWCNp1tqnVr7CQ7Y="; 9 11 }; 10 12 macosx = fetchurl { 11 13 url = "https://josm.openstreetmap.de/download/macosx/josm-macos-${version}-java16.zip"; 12 - sha256 = "0r17cphxm852ykb8mkil29rr7sb0bj5w69qd5wz8zf2f9djk9npk"; 14 + sha256 = "sha256-PM/wNXqtEwalhorWHqVHWsaiGv60SFrHXZrb1Mw/QqQ="; 13 15 }; 14 16 pkg = fetchsvn { 15 17 url = "https://josm.openstreetmap.de/svn/trunk/native/linux/tested"; 16 18 rev = version; 17 - sha256 = "1b7dryvakph8znh2ahgywch66l4bl5rmgsr79axnz1xi12g8ac12"; 19 + sha256 = "sha256-IjCFngixh2+7SifrV3Ohi1BjIOP+QSWg/QjeqbbP7aw="; 18 20 }; 19 21 }; 20 22 in 21 - stdenv.mkDerivation { 23 + stdenv.mkDerivation rec { 22 24 inherit pname version; 23 25 24 26 dontUnpack = true; ··· 36 38 37 39 # Add libXxf86vm to path because it is needed by at least Kendzi3D plugin 38 40 makeWrapper ${jre}/bin/java $out/bin/josm \ 39 - --add-flags "-Djosm.restart=true -Djava.net.useSystemProxies=true" \ 40 - --add-flags "-jar $out/share/josm/josm.jar" \ 41 + --add-flags "${extraJavaOpts} -jar $out/share/josm/josm.jar" \ 41 42 --prefix LD_LIBRARY_PATH ":" '${libXxf86vm}/lib' 42 43 ''; 43 44
+3 -9
pkgs/applications/networking/browsers/firefox/common.nix
··· 9 9 , hunspell, libevent, libstartup_notification 10 10 , libvpx_1_8 11 11 , icu67, libpng, jemalloc, glib, pciutils 12 - , autoconf213, which, gnused, rustPackages, rustPackages_1_45 12 + , autoconf213, which, gnused, rustPackages 13 13 , rust-cbindgen, nodejs, nasm, fetchpatch 14 14 , gnum4 15 15 , debugBuild ? false ··· 90 90 then "/Applications/${binaryNameCapitalized}.app/Contents/MacOS" 91 91 else "/bin"; 92 92 93 - # 78 ESR won't build with rustc 1.47 94 - inherit (if lib.versionAtLeast ffversion "82" then rustPackages else rustPackages_1_45) 95 - rustc cargo; 93 + inherit (rustPackages) rustc cargo; 96 94 97 95 # Darwin's stdenv provides the default llvmPackages version, match that since 98 96 # clang LTO on Darwin is broken so the stdenv is not being changed. 99 - # Target the LLVM version that rustc -Vv reports it is built with for LTO. 100 - # rustPackages_1_45 -> LLVM 10, rustPackages -> LLVM 11 101 97 llvmPackages = if stdenv.isDarwin 102 98 then buildPackages.llvmPackages 103 - else if lib.versionAtLeast rustc.llvm.version "11" 104 - then buildPackages.llvmPackages_11 105 - else buildPackages.llvmPackages_10; 99 + else buildPackages.llvmPackages_11; 106 100 107 101 # When LTO for Darwin is fixed, the following will need updating as lld 108 102 # doesn't work on it. For now it is fine since ltoSupport implies no Darwin.
+1 -1
pkgs/applications/networking/browsers/google-chrome/default.nix
··· 146 146 --prefix XDG_DATA_DIRS : "$XDG_ICON_DIRS:$GSETTINGS_SCHEMAS_PATH" \ 147 147 --add-flags ${escapeShellArg commandLineArgs} 148 148 149 - for elf in $out/share/google/$appname/{chrome,chrome-sandbox,nacl_helper}; do 149 + for elf in $out/share/google/$appname/{chrome,chrome-sandbox,crashpad_handler,nacl_helper}; do 150 150 patchelf --set-rpath $rpath $elf 151 151 patchelf --set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" $elf 152 152 done
+3 -3
pkgs/applications/networking/cluster/helm/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "helm"; 5 - version = "3.5.3"; 5 + version = "3.5.4"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "helm"; 9 9 repo = "helm"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-7xO07JDy6ujWlDF+5Xd3myRQ8ajTppCXz9fNe4yizVw="; 11 + sha256 = "sha256-u8GJVOubPlIG88TFG5+OvbovMz4Q595wWo2YCwuTgG8="; 12 12 }; 13 - vendorSha256 = "sha256-lpEoUgABtJczwShNdvD+zYAPDFTJqILSei2YY6mQ2mw="; 13 + vendorSha256 = "sha256-zdZxGiwgx8c0zt9tQebJi7k/LNNYjhNInsVeBbxPsgE="; 14 14 15 15 doCheck = false; 16 16
+4 -3
pkgs/applications/networking/dyndns/dyndnsc/default.nix
··· 2 2 3 3 python3Packages.buildPythonApplication rec { 4 4 pname = "dyndnsc"; 5 - version = "0.5.1"; 5 + version = "0.6.1"; 6 6 7 7 src = python3Packages.fetchPypi { 8 8 inherit pname version; 9 - hash = "sha256-Sy6U0XhIQ9mPmznmWKqoyqE34vaE84fwlivouaF7Dd0="; 9 + sha256 = "13078d29eea2f9a4ca01f05676c3309ead5e341dab047e0d51c46f23d4b7fbb4"; 10 10 }; 11 11 12 12 postPatch = '' ··· 19 19 dnspython 20 20 netifaces 21 21 requests 22 + json-logging 22 23 setuptools 23 24 ]; 24 - checkInputs = with python3Packages; [ bottle pytestCheckHook ]; 25 + checkInputs = with python3Packages; [ bottle mock pytest-console-scripts pytestCheckHook ]; 25 26 26 27 disabledTests = [ 27 28 # dnswanip connects to an external server to discover the
+14 -9
pkgs/applications/version-management/yadm/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, git, gnupg }: 1 + { lib, stdenv, fetchFromGitHub, git, gnupg, installShellFiles }: 2 2 3 - let version = "2.5.0"; in 4 - stdenv.mkDerivation { 3 + stdenv.mkDerivation rec { 5 4 pname = "yadm"; 6 - inherit version; 5 + version = "3.1.0"; 7 6 8 7 buildInputs = [ git gnupg ]; 8 + 9 + nativeBuildInputs = [ installShellFiles ]; 9 10 10 11 src = fetchFromGitHub { 11 12 owner = "TheLocehiliosan"; 12 13 repo = "yadm"; 13 14 rev = version; 14 - sha256 = "128qlx8mp7h5ifapqqgsj3fwghn3q6x6ya0y33h5r7gnassd3njr"; 15 + sha256 = "0ga0p28nvqilswa07bzi93adk7wx6d5pgxlacr9wl9v1h6cds92s"; 15 16 }; 16 17 17 18 dontConfigure = true; ··· 20 21 installPhase = '' 21 22 runHook preInstall 22 23 install -Dt $out/bin yadm 23 - install -Dt $out/share/man/man1 yadm.1 24 - install -D completion/yadm.zsh_completion $out/share/zsh/site-functions/_yadm 25 - install -D completion/yadm.bash_completion $out/share/bash-completion/completions/yadm.bash 26 24 runHook postInstall 25 + ''; 26 + 27 + postInstall = '' 28 + installManPage yadm.1 29 + installShellCompletion --cmd yadm \ 30 + --zsh completion/zsh/_yadm \ 31 + --bash completion/bash/yadm 27 32 ''; 28 33 29 34 meta = { ··· 35 40 * Provides a way to use alternate files on a specific OS or host. 36 41 * Supplies a method of encrypting confidential data so it can safely be stored in your repository. 37 42 ''; 38 - license = lib.licenses.gpl3; 43 + license = lib.licenses.gpl3Plus; 39 44 maintainers = with lib.maintainers; [ abathur ]; 40 45 platforms = lib.platforms.unix; 41 46 };
+2 -2
pkgs/applications/video/kodi-packages/inputstream-adaptive/default.nix
··· 2 2 buildKodiBinaryAddon rec { 3 3 pname = "inputstream-adaptive"; 4 4 namespace = "inputstream.adaptive"; 5 - version = "2.6.13"; 5 + version = "2.6.14"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "xbmc"; 9 9 repo = "inputstream.adaptive"; 10 10 rev = "${version}-${rel}"; 11 - sha256 = "1xvinmwyx7mai84i8c394dqw86zb6ib9wnxjmv7zpky6x64lvv10"; 11 + sha256 = "sha256-5hYB9J4syY+2XOTdg9h7xLk8MMEG88EETIgkUmz4KOU="; 12 12 }; 13 13 14 14 extraNativeBuildInputs = [ gtest ];
+2 -7
pkgs/applications/window-managers/cage/default.nix
··· 8 8 9 9 stdenv.mkDerivation rec { 10 10 pname = "cage"; 11 - version = "0.1.2.1"; 11 + version = "0.1.3"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "Hjdskes"; 15 15 repo = "cage"; 16 16 rev = "v${version}"; 17 - sha256 = "1i4rm3dpmk7gkl6hfs6a7vwz76ba7yqcdp63nlrdbnq81m9cy2am"; 17 + sha256 = "0ixl45g0m8b75gvbjm3gf5qg0yplspgs0xpm2619wn5sygc47sb1"; 18 18 }; 19 - 20 - postPatch = '' 21 - substituteInPlace meson.build --replace \ 22 - "0.1.2" "${version}" 23 - ''; 24 19 25 20 nativeBuildInputs = [ meson ninja pkg-config wayland scdoc makeWrapper ]; 26 21
+4 -8
pkgs/development/libraries/amdvlk/default.nix
··· 21 21 22 22 in stdenv.mkDerivation rec { 23 23 pname = "amdvlk"; 24 - version = "2021.Q1.6"; 24 + version = "2021.Q2.2"; 25 25 26 26 src = fetchRepoProject { 27 27 name = "${pname}-src"; 28 28 manifest = "https://github.com/GPUOpen-Drivers/AMDVLK.git"; 29 29 rev = "refs/tags/v-${version}"; 30 - sha256 = "FSQ/bYlvdw0Ih3Yl329o8Gizw0YcZTLtiI222Ju4M8w="; 30 + sha256 = "4k9ZkBxJGuNUO44F9D+u54eUREl5/8zxjxhaShhzGv0="; 31 31 }; 32 32 33 33 buildInputs = [ ··· 70 70 71 71 installPhase = '' 72 72 install -Dm755 -t $out/lib icd/amdvlk${suffix}.so 73 - install -Dm644 -t $out/share/vulkan/icd.d ../drivers/AMDVLK/json/Redhat/amd_icd${suffix}.json 74 - 75 - substituteInPlace $out/share/vulkan/icd.d/amd_icd${suffix}.json --replace \ 76 - "/usr/lib64" "$out/lib" 77 - substituteInPlace $out/share/vulkan/icd.d/amd_icd${suffix}.json --replace \ 78 - "/usr/lib" "$out/lib" 73 + install -Dm644 -t $out/share/vulkan/icd.d icd/amd_icd${suffix}.json 74 + install -Dm644 -t $out/share/vulkan/implicit_layer.d icd/amd_icd${suffix}.json 79 75 80 76 patchelf --set-rpath "$rpath" $out/lib/amdvlk${suffix}.so 81 77 '';
+2 -2
pkgs/development/libraries/libgpiod/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "libgpiod"; 7 - version = "1.6.2"; 7 + version = "1.6.3"; 8 8 9 9 src = fetchurl { 10 10 url = "https://git.kernel.org/pub/scm/libs/libgpiod/libgpiod.git/snapshot/libgpiod-${version}.tar.gz"; 11 - sha256 = "1k8mxkzvd6y9aawxghddrjkldzskhb6607qhbwjfl9f945ns87qa"; 11 + sha256 = "sha256-60RgcL4URP19MtMrvKU8Lzu7CiEZPbhhmM9gULeihEE="; 12 12 }; 13 13 14 14 patches = [
+38
pkgs/development/python-modules/importlib-resources/2.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchPypi 4 + , setuptools-scm 5 + , importlib-metadata 6 + , typing 7 + , singledispatch 8 + , python 9 + }: 10 + 11 + buildPythonPackage rec { 12 + pname = "importlib-resources"; 13 + version = "3.3.1"; 14 + 15 + src = fetchPypi { 16 + pname = "importlib_resources"; 17 + inherit version; 18 + sha256 = "0ed250dbd291947d1a298e89f39afcc477d5a6624770503034b72588601bcc05"; 19 + }; 20 + 21 + nativeBuildInputs = [ setuptools-scm ]; 22 + propagatedBuildInputs = [ 23 + importlib-metadata 24 + singledispatch 25 + typing 26 + ]; 27 + 28 + checkPhase = '' 29 + ${python.interpreter} -m unittest discover 30 + ''; 31 + 32 + meta = with lib; { 33 + description = "Read resources from Python packages"; 34 + homepage = "https://importlib-resources.readthedocs.io/"; 35 + license = licenses.asl20; 36 + maintainers = [ ]; 37 + }; 38 + }
+6 -5
pkgs/development/python-modules/importlib-resources/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchPypi 4 - , setuptools_scm 5 - , toml 4 + , setuptools-scm 6 5 , importlib-metadata 7 6 , typing ? null 8 7 , singledispatch ? null ··· 11 10 }: 12 11 13 12 buildPythonPackage rec { 14 - pname = "importlib_resources"; 13 + pname = "importlib-resources"; 15 14 version = "5.1.2"; 16 15 17 16 src = fetchPypi { 18 - inherit pname version; 17 + pname = "importlib_resources"; 18 + inherit version; 19 19 sha256 = "642586fc4740bd1cad7690f836b3321309402b20b332529f25617ff18e8e1370"; 20 20 }; 21 21 22 - nativeBuildInputs = [ setuptools_scm toml ]; 22 + nativeBuildInputs = [ setuptools-scm ]; 23 23 propagatedBuildInputs = [ 24 24 importlib-metadata 25 25 ] ++ lib.optional (pythonOlder "3.4") singledispatch ··· 34 34 description = "Read resources from Python packages"; 35 35 homepage = "https://importlib-resources.readthedocs.io/"; 36 36 license = licenses.asl20; 37 + maintainers = [ ]; 37 38 }; 38 39 }
+49
pkgs/development/python-modules/json-logging/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , fetchpatch 5 + , pytestCheckHook 6 + , wheel 7 + , flask 8 + , sanic 9 + , fastapi 10 + , uvicorn 11 + , requests 12 + }: 13 + 14 + buildPythonPackage rec { 15 + pname = "json-logging"; 16 + version = "1.3.0"; 17 + 18 + src = fetchFromGitHub { 19 + owner = "bobbui"; 20 + repo = "json-logging-python"; 21 + rev = version; 22 + hash = "sha256-0eIhOi30r3ApyVkiBdTQps5tNj7rI+q8TjNWxTnhtMQ="; 23 + }; 24 + patches = [ 25 + # Fix tests picking up test modules instead of real packages. 26 + (fetchpatch { 27 + url = "https://github.com/bobbui/json-logging-python/commit/6fdb64deb42fe48b0b12bda0442fd5ac5f03107f.patch"; 28 + sha256 = "sha256-BLfARsw2FdvY22NCaFfdFgL9wTmEZyVIi3CQpB5qU0Y="; 29 + }) 30 + ]; 31 + 32 + # - Quart is not packaged for Nixpkgs. 33 + # - FastAPI is broken, see #112701 and tiangolo/fastapi#2335. 34 + checkInputs = [ wheel flask /*quart*/ sanic /*fastapi*/ uvicorn requests pytestCheckHook ]; 35 + disabledTests = [ "quart" "fastapi" ]; 36 + disabledTestPaths = [ "tests/test_fastapi.py" ]; 37 + # Tests spawn servers and try to connect to them. 38 + __darwinAllowLocalNetworking = true; 39 + 40 + meta = with lib; { 41 + description = "Python library to emit logs in JSON format"; 42 + longDescription = '' 43 + Python logging library to emit JSON log that can be easily indexed and searchable by logging infrastructure such as ELK, EFK, AWS Cloudwatch, GCP Stackdriver. 44 + ''; 45 + homepage = "https://github.com/bobbui/json-logging-python"; 46 + license = licenses.asl20; 47 + maintainers = with maintainers; [ AluisioASG ]; 48 + }; 49 + }
+4 -2
pkgs/development/python-modules/pyface/default.nix
··· 1 1 { lib, fetchPypi, buildPythonPackage 2 - , setuptools, six, traits 2 + , importlib-metadata, importlib-resources, six, traits 3 3 }: 4 4 5 5 buildPythonPackage rec { ··· 11 11 sha256 = "a7031ec4cfff034affc822e47ff5e6c1a0272e576d79465cdbbe25f721740322"; 12 12 }; 13 13 14 - propagatedBuildInputs = [ setuptools six traits ]; 14 + propagatedBuildInputs = [ importlib-metadata importlib-resources six traits ]; 15 15 16 16 doCheck = false; # Needs X server 17 + 18 + pythonImportsCheck = [ "pyface" ]; 17 19 18 20 meta = with lib; { 19 21 description = "Traits-capable windowing framework";
+41
pkgs/development/python-modules/pytest-console-scripts/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchPypi 4 + , pytestCheckHook 5 + , python 6 + , mock 7 + , setuptools-scm 8 + }: 9 + 10 + buildPythonPackage rec { 11 + pname = "pytest-console-scripts"; 12 + version = "1.2.0"; 13 + 14 + src = fetchPypi { 15 + inherit pname version; 16 + sha256 = "4a2138d7d567bc581fe081b6a5975849a2a36b3925cb0f066d2380103e13741c"; 17 + }; 18 + postPatch = '' 19 + # setuptools-scm is pinned to <6 because it dropped Python 3.5 20 + # support. That's not something that affects us. 21 + substituteInPlace setup.py --replace "'setuptools_scm<6'" "'setuptools_scm'" 22 + # Patch the shebang of a script generated during test. 23 + substituteInPlace tests/test_run_scripts.py --replace "#!/usr/bin/env python" "#!${python.interpreter}" 24 + ''; 25 + 26 + SETUPTOOLS_SCM_PRETEND_VERSION = version; 27 + nativeBuildInputs = [ setuptools-scm ]; 28 + 29 + checkInputs = [ mock pytestCheckHook ]; 30 + 31 + meta = with lib; { 32 + description = "Pytest plugin for testing console scripts"; 33 + longDescription = '' 34 + Pytest-console-scripts is a pytest plugin for running python scripts from within tests. 35 + It's quite similar to subprocess.run(), but it also has an in-process mode, where the scripts are executed by the interpreter that's running pytest (using some amount of sandboxing). 36 + ''; 37 + homepage = "https://github.com/kvas-it/pytest-console-scripts"; 38 + license = licenses.mit; 39 + maintainers = with maintainers; [ AluisioASG ]; 40 + }; 41 + }
+4
pkgs/development/python-modules/pytest-sanic/default.nix
··· 46 46 homepage = "https://github.com/yunstanford/pytest-sanic/"; 47 47 license = licenses.asl20; 48 48 maintainers = [ maintainers.costrouc ]; 49 + # pytest-sanic is incompatible with Sanic 21.3, see 50 + # https://github.com/sanic-org/sanic/issues/2095 and 51 + # https://github.com/yunstanford/pytest-sanic/issues/50. 52 + broken = lib.versionAtLeast sanic.version "21.3.0"; 49 53 }; 50 54 }
+2 -2
pkgs/development/python-modules/sanic-auth/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, sanic, pytestCheckHook }: 1 + { lib, buildPythonPackage, fetchPypi, sanic, sanic-testing, pytestCheckHook }: 2 2 3 3 buildPythonPackage rec { 4 4 pname = "Sanic-Auth"; ··· 11 11 12 12 propagatedBuildInputs = [ sanic ]; 13 13 14 - checkInputs = [ pytestCheckHook ]; 14 + checkInputs = [ pytestCheckHook sanic-testing ]; 15 15 16 16 pythonImportsCheck = [ "sanic_auth" ]; 17 17
+28
pkgs/development/python-modules/sanic-routing/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , pytestCheckHook 5 + , pytest-asyncio 6 + }: 7 + 8 + buildPythonPackage rec { 9 + pname = "sanic-routing"; 10 + version = "0.6.2"; 11 + 12 + src = fetchFromGitHub { 13 + owner = "sanic-org"; 14 + repo = "sanic-routing"; 15 + rev = "v${version}"; 16 + hash = "sha256-ZMl8PB9E401pUfUJ4tW7nBx1TgPQQtx9erVni3zP+lo="; 17 + }; 18 + 19 + checkInputs = [ pytestCheckHook pytest-asyncio ]; 20 + pythonImportsCheck = [ "sanic_routing" ]; 21 + 22 + meta = with lib; { 23 + description = "Core routing component for the Sanic web framework"; 24 + homepage = "https://github.com/sanic-org/sanic-routing"; 25 + license = licenses.mit; 26 + maintainers = with maintainers; [ AluisioASG ]; 27 + }; 28 + }
+40
pkgs/development/python-modules/sanic-testing/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , pytestCheckHook 5 + , httpcore 6 + , httpx 7 + , pytest-asyncio 8 + , sanic 9 + , websockets 10 + }: 11 + 12 + buildPythonPackage rec { 13 + pname = "sanic-testing"; 14 + version = "0.3.1"; 15 + 16 + src = fetchFromGitHub { 17 + owner = "sanic-org"; 18 + repo = "sanic-testing"; 19 + rev = "v${version}"; 20 + hash = "sha256-hBAq+/BKs0a01M89Nb8HaClqxB+W5PTfjVzef/m9SWs="; 21 + }; 22 + 23 + propagatedBuildInputs = [ httpx sanic websockets httpcore ]; 24 + 25 + # `sanic` is explicitly set to null when building `sanic` itself 26 + # to prevent infinite recursion. In that case we skip running 27 + # the package at all. 28 + doCheck = sanic != null; 29 + dontUsePythonImportsCheck = sanic == null; 30 + 31 + checkInputs = [ pytestCheckHook pytest-asyncio ]; 32 + pythonImportsCheck = [ "sanic_testing" ]; 33 + 34 + meta = with lib; { 35 + description = "Core testing clients for the Sanic web framework"; 36 + homepage = "https://github.com/sanic-org/sanic-testing"; 37 + license = licenses.mit; 38 + maintainers = with maintainers; [ AluisioASG ]; 39 + }; 40 + }
+18 -16
pkgs/development/python-modules/sanic/default.nix
··· 1 1 { lib, buildPythonPackage, fetchPypi, doCheck ? true 2 - , aiofiles, httptools, httpx, multidict, ujson, uvloop, websockets 3 - , pytestCheckHook, beautifulsoup4, gunicorn, httpcore, uvicorn 4 - , pytest-asyncio, pytest-benchmark, pytest-dependency, pytest-sanic, pytest-sugar, pytestcov 2 + , aiofiles, httptools, multidict, sanic-routing, ujson, uvloop, websockets 3 + , pytestCheckHook, beautifulsoup4, gunicorn, uvicorn, sanic-testing 4 + , pytest-benchmark, pytest-sanic, pytest-sugar, pytestcov 5 5 }: 6 6 7 7 buildPythonPackage rec { 8 8 pname = "sanic"; 9 - version = "21.3.2"; 9 + version = "21.3.4"; 10 10 11 11 src = fetchPypi { 12 12 inherit pname version; 13 - sha256 = "84a04c5f12bf321bed3942597787f1854d15c18f157aebd7ced8c851ccc49e08"; 13 + sha256 = "1cbd12b9138b3ca69656286b0be91fff02b826e8cb72dd76a2ca8c5eb1288d8e"; 14 14 }; 15 15 16 16 postPatch = '' 17 + # Loosen dependency requirements. 17 18 substituteInPlace setup.py \ 18 - --replace '"multidict==5.0.0"' '"multidict"' \ 19 - --replace '"httpx==0.15.4"' '"httpx"' \ 20 - --replace '"httpcore==0.3.0"' '"httpcore"' \ 21 - --replace '"pytest==5.2.1"' '"pytest"' 19 + --replace '"pytest==5.2.1"' '"pytest"' \ 20 + --replace '"gunicorn==20.0.4"' '"gunicorn"' \ 21 + --replace '"pytest-sanic",' "" 22 + # Patch a request headers test to allow brotli encoding 23 + # (we build httpx with brotli support, upstream doesn't). 24 + substituteInPlace tests/test_headers.py \ 25 + --replace "deflate\r\n" "deflate, br\r\n" 22 26 ''; 23 27 24 28 propagatedBuildInputs = [ 25 - aiofiles httptools httpx multidict ujson uvloop websockets 29 + sanic-routing httptools uvloop ujson aiofiles websockets multidict 26 30 ]; 27 31 28 32 checkInputs = [ 29 - pytestCheckHook beautifulsoup4 gunicorn httpcore uvicorn 30 - pytest-asyncio pytest-benchmark pytest-dependency pytest-sanic pytest-sugar pytestcov 33 + sanic-testing gunicorn pytestcov beautifulsoup4 pytest-sanic pytest-sugar 34 + pytest-benchmark pytestCheckHook uvicorn 31 35 ]; 32 36 33 37 inherit doCheck; 34 38 35 39 disabledTests = [ 36 40 "test_gunicorn" # No "examples" directory in pypi distribution. 37 - "test_logo" # Fails to filter out "DEBUG asyncio:selector_events.py:59 Using selector: EpollSelector" 38 41 "test_zero_downtime" # No "examples.delayed_response.app" module in pypi distribution. 39 - "test_reloader_live" # OSError: [Errno 98] error while attempting to bind on address ('127.0.0.1', 42104) 40 42 ]; 41 43 42 44 __darwinAllowLocalNetworking = true; ··· 45 47 46 48 meta = with lib; { 47 49 description = "A microframework based on uvloop, httptools, and learnings of flask"; 48 - homepage = "https://github.com/channelcat/sanic/"; 50 + homepage = "https://github.com/sanic-org/sanic/"; 49 51 license = licenses.mit; 50 - maintainers = [ maintainers.costrouc ]; 52 + maintainers = with maintainers; [ costrouc AluisioASG ]; 51 53 }; 52 54 }
+2 -2
pkgs/development/tools/analysis/rizin/cutter.nix
··· 11 11 12 12 mkDerivation rec { 13 13 pname = "cutter"; 14 - version = "2.0.1"; 14 + version = "2.0.2"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "rizinorg"; 18 18 repo = "cutter"; 19 19 rev = "v${version}"; 20 - sha256 = "sha256-IQCJOUgefSdMSa27E6I/CL35Kx5pHq/u+5Q0FHUAR1E="; 20 + sha256 = "sha256-CVVUXx6wt9vH3B7NrrlRGnOIrhXQPjV7GmX3O+KtMSM="; 21 21 fetchSubmodules = true; 22 22 }; 23 23
+2 -2
pkgs/development/tools/analysis/rizin/default.nix
··· 23 23 24 24 stdenv.mkDerivation rec { 25 25 pname = "rizin"; 26 - version = "0.2.0"; 26 + version = "0.2.1"; 27 27 28 28 src = fetchurl { 29 29 url = "https://github.com/rizinorg/rizin/releases/download/v${version}/rizin-src-v${version}.tar.xz"; 30 - sha256 = "sha256-CGHeo247syha+rVtiAQz0XkEYK9p4DHTnLK2FhBOvE8="; 30 + sha256 = "sha256-lxVsPI+qLenZ0pelvxtHlQ6fhWdQeqoEEHrUGZ5Rdmg="; 31 31 }; 32 32 33 33 mesonFlags = [
+54
pkgs/development/tools/database/movine/default.nix
··· 1 + { rustPlatform 2 + , fetchFromGitHub 3 + , lib 4 + , stdenv 5 + , pkg-config 6 + , postgresql 7 + , sqlite 8 + , openssl 9 + , Security 10 + , libiconv 11 + }: 12 + 13 + rustPlatform.buildRustPackage rec { 14 + pname = "movine"; 15 + version = "0.11.0"; 16 + 17 + src = fetchFromGitHub { 18 + owner = "byronwasti"; 19 + repo = pname; 20 + rev = "v${version}"; 21 + sha256 = "0rms8np8zd23xzrd5avhp2q1ndhdc8f49lfwpff9h0slw4rnzfnj"; 22 + }; 23 + 24 + cargoSha256 = "sha256-4ghfenwmauR4Ft9n7dvBflwIMXPdFq1vh6FpIegHnZk="; 25 + 26 + nativeBuildInputs = [ pkg-config ]; 27 + buildInputs = [ postgresql sqlite ] ++ ( 28 + if !stdenv.isDarwin then [ openssl ] else [ Security libiconv ] 29 + ); 30 + 31 + meta = with lib; { 32 + description = "A migration manager written in Rust, that attempts to be smart yet minimal"; 33 + homepage = "https://github.com/byronwasti/movine"; 34 + license = licenses.mit; 35 + longDescription = '' 36 + Movine is a simple database migration manager that aims to be compatible 37 + with real-world migration work. Many migration managers get confused 38 + with complicated development strategies for migrations. Oftentimes 39 + migration managers do not warn you if the SQL saved in git differs from 40 + what was actually run on the database. Movine solves this issue by 41 + keeping track of the unique hashes for the <literal>up.sql</literal> and 42 + <literal>down.sql</literal> for each migration, and provides tools for 43 + fixing issues. This allows users to easily keep track of whether their 44 + local migration history matches the one on the database. 45 + 46 + This project is currently in early stages. 47 + 48 + Movine does not aim to be an ORM. 49 + Consider <link xling:href="https://diesel.rs/">diesel</link> instead if 50 + you want an ORM. 51 + ''; 52 + maintainers = with maintainers; [ netcrns ]; 53 + }; 54 + }
+38
pkgs/development/tools/roswell/default.nix
··· 1 + { lib, stdenv, fetchFromGitHub, curl, autoconf, automake, makeWrapper, sbcl }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "roswell"; 5 + version = "21.01.14.108"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "roswell"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "1hj9q3ig7naky3pb3jkl9yjc9xkg0k7js3glxicv0aqffx9hkp3p"; 12 + }; 13 + 14 + preConfigure = '' 15 + sh bootstrap 16 + ''; 17 + 18 + configureFlags = [ "--prefix=${placeholder "out"}" ]; 19 + 20 + postInstall = '' 21 + wrapProgram $out/bin/ros \ 22 + --add-flags 'lisp=sbcl-bin/system sbcl-bin.version=system' \ 23 + --prefix PATH : ${lib.makeBinPath [ sbcl ]} --argv0 ros 24 + ''; 25 + 26 + nativeBuildInputs = [ autoconf automake makeWrapper ]; 27 + 28 + buildInputs = [ sbcl curl ]; 29 + 30 + meta = with lib; { 31 + description = "Roswell is a Lisp implementation installer/manager, launcher, and much more"; 32 + license = licenses.mit; 33 + maintainers = with maintainers; [ hiro98 ]; 34 + platforms = platforms.linux; 35 + homepage = "https://github.com/roswell/roswell"; 36 + mainProgram = "ros"; 37 + }; 38 + }
+8 -9
pkgs/os-specific/linux/firmware/sof-firmware/default.nix
··· 3 3 with lib; 4 4 stdenv.mkDerivation rec { 5 5 pname = "sof-firmware"; 6 - version = "1.6"; 6 + version = "1.7"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "thesofproject"; 10 10 repo = "sof-bin"; 11 - rev = "cbdec6963b2c2d58b0080955d3c11b96ff4c92f0"; 12 - sha256 = "0la2pw1zpv50cywiqcfb00cxqvjc73drxwjchyzi54l508817nxh"; 11 + rev = "v${version}"; 12 + sha256 = "sha256-Z0Z4HLsIIuW8E1kFNhAECmzj1HkJVfbEw13B8V7PZLk="; 13 13 }; 14 14 15 - phases = [ "unpackPhase" "installPhase" ]; 15 + dontFixup = true; # binaries must not be stripped or patchelfed 16 16 17 17 installPhase = '' 18 - mkdir -p $out/lib/firmware 19 - 20 - patchShebangs go.sh 21 - ROOT=$out SOF_VERSION=v${version} ./go.sh 18 + mkdir -p $out/lib/firmware/intel/ 19 + cp -a sof-v${version} $out/lib/firmware/intel/sof 20 + cp -a sof-tplg-v${version} $out/lib/firmware/intel/sof-tplg 22 21 ''; 23 22 24 23 meta = with lib; { 25 24 description = "Sound Open Firmware"; 26 25 homepage = "https://www.sofproject.org/"; 27 26 license = with licenses; [ bsd3 isc ]; 28 - maintainers = with maintainers; [ lblasc evenbrenden ]; 27 + maintainers = with maintainers; [ lblasc evenbrenden hmenke ]; 29 28 platforms = with platforms; linux; 30 29 }; 31 30 }
+3 -2
pkgs/os-specific/linux/fuse/common.nix
··· 1 1 { version, sha256Hash }: 2 2 3 3 { lib, stdenv, fetchFromGitHub, fetchpatch 4 - , fusePackages, util-linux, gettext 4 + , fusePackages, util-linux, gettext, shadow 5 5 , meson, ninja, pkg-config 6 6 , autoreconfHook 7 7 , python3Packages, which ··· 54 54 # $PATH, so it should also work on non-NixOS systems. 55 55 export NIX_CFLAGS_COMPILE="-DFUSERMOUNT_DIR=\"/run/wrappers/bin\"" 56 56 57 - sed -e 's@/bin/@${util-linux}/bin/@g' -i lib/mount_util.c 57 + substituteInPlace lib/mount_util.c --replace "/bin/" "${util-linux}/bin/" 58 58 '' + (if isFuse3 then '' 59 59 # The configure phase will delete these files (temporary workaround for 60 60 # ./fuse3-install_man.patch) 61 61 install -D -m444 doc/fusermount3.1 $out/share/man/man1/fusermount3.1 62 62 install -D -m444 doc/mount.fuse3.8 $out/share/man/man8/mount.fuse3.8 63 63 '' else '' 64 + substituteInPlace util/mount.fuse.c --replace '"su"' '"${shadow.su}/bin/su"' 64 65 sed -e 's@CONFIG_RPATH=/usr/share/gettext/config.rpath@CONFIG_RPATH=${gettext}/share/gettext/config.rpath@' -i makeconf.sh 65 66 ./makeconf.sh 66 67 '');
+4 -4
pkgs/os-specific/linux/nvidia-x11/default.nix
··· 36 36 else legacy_390; 37 37 38 38 beta = generic { 39 - version = "460.27.04"; 40 - sha256_64bit = "plTqtc5QZQwM0f3MeMZV0N5XOiuSXCCDklL/qyy8HM8="; 41 - settingsSha256 = "hU9J0VSrLXs7N14zq6U5LbBLZXEIyTfih/Bj6eFcMf0="; 42 - persistencedSha256 = "PmqhoPskqhJe2FxMrQh9zX1BWQCR2kkfDwvA89+XALA="; 39 + version = "465.27"; 40 + sha256_64bit = "fmn/qFve5qqqa26n4dsoOwGZ+ash5Bon3JBI8kncMXE="; 41 + settingsSha256 = "3BFLCx0dcrQY4Mv1joMsiVPwTPyufgsNT5pFgp1Mk/A="; 42 + persistencedSha256 = "HtoFGTiBnAeQyRTOMlve5poaQh63LHRD+DHJxZO+c90="; 43 43 }; 44 44 45 45 # Vulkan developer beta driver
+5 -5
pkgs/servers/http/gitlab-pages/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "gitlab-pages"; 5 - version = "1.35.0"; 5 + version = "1.38.0"; 6 6 7 7 src = fetchFromGitLab { 8 8 owner = "gitlab-org"; 9 9 repo = "gitlab-pages"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-5AkzbOutBXy59XvMwfyH6A8ETwjP2QokG/Rz31/nCpk="; 11 + sha256 = "sha256-QaqZGTkNAzQEqlwccAWPDP91BSc9vRDEsCBca/lEXW4="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-g8FDWpZmbZSkJAzoEiI8/JZLTTgG7uJ4sS35axaEXLY="; 14 + vendorSha256 = "sha256-uuwuiGQWLIQ5UJuCKDBEvCPo2+AXtJ54ARK431qiakc="; 15 15 subPackages = [ "." ]; 16 - doCheck = false; # Broken 17 16 18 17 meta = with lib; { 19 18 description = "Daemon used to serve static websites for GitLab users"; 20 19 homepage = "https://gitlab.com/gitlab-org/gitlab-pages"; 20 + changelog = "https://gitlab.com/gitlab-org/gitlab-pages/-/blob/v${version}/CHANGELOG.md"; 21 21 license = licenses.mit; 22 - maintainers = with maintainers; [ das_j ]; 22 + maintainers = with maintainers; [ ajs124 das_j ]; 23 23 }; 24 24 }
+3 -2
pkgs/tools/misc/ffsend/default.nix
··· 1 1 { lib, stdenv, fetchFromGitLab, rustPlatform, cmake, pkg-config, openssl 2 - , darwin, installShellFiles 2 + , installShellFiles 3 + , CoreFoundation, CoreServices, Security, AppKit, libiconv 3 4 4 5 , x11Support ? stdenv.isLinux || stdenv.hostPlatform.isBSD 5 6 , xclip ? null, xsel ? null ··· 29 30 30 31 nativeBuildInputs = [ cmake pkg-config installShellFiles ]; 31 32 buildInputs = 32 - if stdenv.isDarwin then (with darwin.apple_sdk.frameworks; [ CoreFoundation CoreServices Security AppKit ]) 33 + if stdenv.isDarwin then [ libiconv CoreFoundation CoreServices Security AppKit ] 33 34 else [ openssl ]; 34 35 35 36 preBuild = lib.optionalString (x11Support && usesX11) (
+34 -4
pkgs/tools/networking/fastd/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, bison, meson, ninja, pkg-config 2 - , libuecc, libsodium, libcap, json_c, openssl }: 1 + { lib 2 + , stdenv 3 + , fetchFromGitHub 4 + , bison 5 + , meson 6 + , ninja 7 + , pkg-config 8 + , libuecc 9 + , libsodium 10 + , libcap 11 + , json_c 12 + , openssl 13 + }: 3 14 4 15 stdenv.mkDerivation rec { 5 16 pname = "fastd"; ··· 12 23 sha256 = "1p4k50dk8byrghbr0fwmgwps8df6rlkgcd603r14i71m5g27z5gw"; 13 24 }; 14 25 15 - nativeBuildInputs = [ pkg-config bison meson ninja ]; 16 - buildInputs = [ libuecc libsodium libcap json_c openssl ]; 26 + nativeBuildInputs = [ 27 + bison 28 + meson 29 + ninja 30 + pkg-config 31 + ]; 32 + 33 + buildInputs = [ 34 + json_c 35 + libcap 36 + libsodium 37 + libuecc 38 + openssl 39 + ]; 40 + 41 + # some options are only available on x86 42 + mesonFlags = lib.optionals (!stdenv.isx86_64 && !stdenv.isi686) [ 43 + "-Dcipher_salsa20_xmm=disabled" 44 + "-Dcipher_salsa2012_xmm=disabled" 45 + "-Dmac_ghash_pclmulqdq=disabled" 46 + ]; 17 47 18 48 enableParallelBuilding = true; 19 49
+10 -4
pkgs/top-level/all-packages.nix
··· 4459 4459 4460 4460 ferm = callPackage ../tools/networking/ferm { }; 4461 4461 4462 - ffsend = callPackage ../tools/misc/ffsend { }; 4462 + ffsend = callPackage ../tools/misc/ffsend { 4463 + inherit (darwin.apple_sdk.frameworks) CoreFoundation CoreServices Security AppKit; 4464 + }; 4463 4465 4464 4466 fgallery = callPackage ../tools/graphics/fgallery { }; 4465 4467 ··· 11543 11545 sbcl_2_1_2 = callPackage ../development/compilers/sbcl/2.1.2.nix {}; 11544 11546 sbcl = sbcl_2_1_2; 11545 11547 11548 + roswell = callPackage ../development/tools/roswell/default.nix { }; 11549 + 11546 11550 scala_2_10 = callPackage ../development/compilers/scala/2.x.nix { majorVersion = "2.10"; jre = jdk8; }; 11547 11551 scala_2_11 = callPackage ../development/compilers/scala/2.x.nix { majorVersion = "2.11"; jre = jdk8; }; 11548 11552 scala_2_12 = callPackage ../development/compilers/scala/2.x.nix { majorVersion = "2.12"; jre = jdk8; }; ··· 16660 16664 16661 16665 mono-addins = callPackage ../development/libraries/mono-addins { }; 16662 16666 16667 + movine = callPackage ../development/tools/database/movine { 16668 + inherit (darwin.apple_sdk.frameworks) Security; 16669 + }; 16670 + 16663 16671 movit = callPackage ../development/libraries/movit { }; 16664 16672 16665 16673 mosquitto = callPackage ../servers/mqtt/mosquitto { }; ··· 22338 22346 22339 22347 caerbannog = callPackage ../applications/misc/caerbannog { }; 22340 22348 22341 - cage = callPackage ../applications/window-managers/cage { 22342 - wlroots = wlroots_0_12; 22343 - }; 22349 + cage = callPackage ../applications/window-managers/cage { }; 22344 22350 22345 22351 calf = callPackage ../applications/audio/calf { 22346 22352 inherit (gnome2) libglade;
+18 -1
pkgs/top-level/python-packages.nix
··· 3443 3443 3444 3444 jsonlines = callPackage ../development/python-modules/jsonlines { }; 3445 3445 3446 + json-logging = callPackage ../development/python-modules/json-logging { }; 3447 + 3446 3448 jsonmerge = callPackage ../development/python-modules/jsonmerge { }; 3447 3449 3448 3450 json-merge-patch = callPackage ../development/python-modules/json-merge-patch { }; ··· 6259 6261 6260 6262 pytest-click = callPackage ../development/python-modules/pytest-click { }; 6261 6263 6264 + pytest-console-scripts = callPackage ../development/python-modules/pytest-console-scripts { }; 6265 + 6262 6266 pytest-cov = self.pytestcov; # self 2021-01-04 6263 6267 pytestcov = callPackage ../development/python-modules/pytest-cov { }; 6264 6268 ··· 7195 7199 7196 7200 samsungtvws = callPackage ../development/python-modules/samsungtvws { }; 7197 7201 7202 + sanic = callPackage ../development/python-modules/sanic { 7203 + # pytest-sanic is doing ok for the sole purpose of testing Sanic. 7204 + pytest-sanic = self.pytest-sanic.overridePythonAttrs (oldAttrs: { 7205 + doCheck = false; 7206 + meta.broken = false; 7207 + }); 7208 + # Don't pass any `sanic` to avoid dependency loops. `sanic-testing` 7209 + # has special logic to disable tests when this is the case. 7210 + sanic-testing = self.sanic-testing.override { sanic = null; }; 7211 + }; 7212 + 7198 7213 sanic-auth = callPackage ../development/python-modules/sanic-auth { }; 7199 7214 7200 - sanic = callPackage ../development/python-modules/sanic { }; 7215 + sanic-routing = callPackage ../development/python-modules/sanic-routing { }; 7216 + 7217 + sanic-testing = callPackage ../development/python-modules/sanic-testing { }; 7201 7218 7202 7219 sapi-python-client = callPackage ../development/python-modules/sapi-python-client { }; 7203 7220
+2
pkgs/top-level/python2-packages.nix
··· 178 178 179 179 importlib-metadata = callPackage ../development/python-modules/importlib-metadata/2.nix { }; 180 180 181 + importlib-resources = callPackage ../development/python-modules/importlib-resources/2.nix { }; 182 + 181 183 ipaddr = callPackage ../development/python-modules/ipaddr { }; 182 184 183 185 ipykernel = callPackage ../development/python-modules/ipykernel/4.nix { };