Merge master into staging-next

+481 -484
+3 -26
doc/languages-frameworks/python.section.md
··· 1290 1290 1291 1291 ### How to use Intel's MKL with numpy and scipy? 1292 1292 1293 - A `site.cfg` is created that configures BLAS based on the `blas` parameter of 1294 - the `numpy` derivation. By passing in `mkl`, `numpy` and packages depending on 1295 - `numpy` will be built with `mkl`. 1296 - 1297 - The following is an overlay that configures `numpy` to use `mkl`: 1298 - 1299 - ```nix 1300 - self: super: { 1301 - python37 = super.python37.override { 1302 - packageOverrides = python-self: python-super: { 1303 - numpy = python-super.numpy.override { 1304 - blas = super.pkgs.mkl; 1305 - }; 1306 - }; 1307 - }; 1308 - } 1309 - ``` 1310 - 1311 - `mkl` requires an `openmp` implementation when running with multiple processors. 1312 - By default, `mkl` will use Intel's `iomp` implementation if no other is 1313 - specified, but this is a runtime-only dependency and binary compatible with the 1314 - LLVM implementation. To use that one instead, Intel recommends users set it with 1315 - `LD_PRELOAD`. 1316 - 1317 - Note that `mkl` is only available on `x86_64-{linux,darwin}` platforms; 1318 - moreover, Hydra is not building and distributing pre-compiled binaries using it. 1293 + MKL can be configured using an overlay. See the section “[Using 1294 + overlays to configure 1295 + alternatives](#sec-overlays-alternatives-blas-lapack)”. 1319 1296 1320 1297 ### What inputs do `setup_requires`, `install_requires` and `tests_require` map to? 1321 1298
+114
doc/using/overlays.xml
··· 137 137 Overlays are similar to other methods for customizing Nixpkgs, in particular the <literal>packageOverrides</literal> attribute described in <xref linkend="sec-modify-via-packageOverrides"/>. Indeed, <literal>packageOverrides</literal> acts as an overlay with only the <varname>super</varname> argument. It is therefore appropriate for basic use, but overlays are more powerful and easier to distribute. 138 138 </para> 139 139 </section> 140 + <section xml:id="sec-overlays-alternatives"> 141 + <title>Using overlays to configure alternatives</title> 142 + <para> 143 + Certain software has different implementations of the same 144 + interface. Other distributions have functionality to switch 145 + between these. For example, Debian provides <link 146 + xlink:href="https://wiki.debian.org/DebianAlternatives">DebianAlternatives</link>. 147 + Nixpkgs has what we call <literal>alternatives</literal>, which 148 + are configured through overlays. 149 + </para> 150 + <section xml:id="sec-overlays-alternatives-blas-lapack"> 151 + <title>BLAS/LAPACK</title> 152 + <para> 153 + In Nixpkgs, we have multiple implementations of the BLAS/LAPACK 154 + numerical linear algebra interfaces. They are: 155 + </para> 156 + <itemizedlist> 157 + <listitem> 158 + <para> 159 + <link xlink:href="https://www.openblas.net/">OpenBLAS</link> 160 + </para> 161 + <para> 162 + The Nixpkgs attribute is <literal>openblas</literal> for 163 + ILP64 and <literal>openblasCompat</literal> for LP64. This 164 + is the default. 165 + </para> 166 + </listitem> 167 + <listitem> 168 + <para> 169 + <link xlink:href="http://www.netlib.org/lapack/">LAPACK 170 + reference</link> (also provides BLAS) 171 + </para> 172 + <para> 173 + The Nixpkgs attribute is <literal>lapack-reference</literal>. 174 + </para> 175 + </listitem> 176 + <listitem> 177 + <para> 178 + <link 179 + xlink:href="https://software.intel.com/en-us/mkl">Intel 180 + MKL</link> (only works on x86 architecture, unfree) 181 + </para> 182 + <para> 183 + The Nixpkgs attribute is <literal>mkl</literal>. 184 + </para> 185 + </listitem> 186 + </itemizedlist> 187 + <para> 188 + Introduced in <link 189 + xlink:href="https://github.com/NixOS/nixpkgs/pull/83888">PR 190 + #83888</link>, we are able to override the ‘blas’ and ‘lapack’ 191 + packages to use different implementations, through the 192 + ‘blasProvider’ and ‘lapackProvider’ argument. This can be used 193 + to select a different provider. For example, an overlay can be 194 + created that looks like: 195 + </para> 196 + <programlisting> 197 + self: super: 198 + 199 + { 200 + blas = super.blas.override { 201 + blasProvider = self.mkl; 202 + } 203 + lapack = super.lapack.override { 204 + lapackProvider = self.mkl; 205 + } 206 + } 207 + </programlisting> 208 + <para> 209 + This overlay uses Intel’s MKL library for both BLAS and LAPACK 210 + interfaces. Note that the same can be accomplished at runtime 211 + using <literal>LD_PRELOAD</literal> of libblas.so.3 and 212 + liblapack.so.3. 213 + </para> 214 + <para> 215 + Intel MKL requires an <literal>openmp</literal> implementation 216 + when running with multiple processors. By default, 217 + <literal>mkl</literal> will use Intel’s <literal>iomp</literal> 218 + implementation if no other is specified, but this is a 219 + runtime-only dependency and binary compatible with the LLVM 220 + implementation. To use that one instead, Intel recommends users 221 + set it with <literal>LD_PRELOAD</literal>. Note that 222 + <literal>mkl</literal> is only available on 223 + <literal>x86_64-linux</literal> and 224 + <literal>x86_64-darwin</literal>. Moreover, Hydra is not build 225 + and distributing pre-compiled binaries using it. 226 + </para> 227 + <para> 228 + For BLAS/LAPACK switching to work correctly, all packages must 229 + depend on <literal>blas</literal> or <literal>lapack</literal>. 230 + This ensures that only one BLAS/LAPACK library is used at one 231 + time. There are two versions versions of BLAS/LAPACK currently 232 + in the wild, <literal>LP64</literal> (integer size = 32 bits) 233 + and <literal>ILP64</literal> (integer size = 64 bits). Some 234 + software needs special flags or patches to work with 235 + <literal>ILP64</literal>. You can check if 236 + <literal>ILP64</literal> is used in Nixpkgs with 237 + <varname>blas.isILP64</varname> and 238 + <varname>lapack.isILP64</varname>. Some software does NOT work 239 + with <literal>ILP64</literal>, and derivations need to specify 240 + an assertion to prevent this. You can prevent 241 + <literal>ILP64</literal> from being used with the following: 242 + </para> 243 + <programlisting> 244 + { stdenv, blas, lapack, ... }: 245 + 246 + assert (!blas.isILP64) &amp;&amp; (!lapack.isILP64); 247 + 248 + stdenv.mkDerivation { 249 + ... 250 + } 251 + </programlisting> 252 + </section> 253 + </section> 140 254 </chapter>
+4 -4
nixos/modules/installer/tools/tools.nix
··· 111 111 # networking.proxy.noProxy = "127.0.0.1,localhost,internal.domain"; 112 112 113 113 # Select internationalisation properties. 114 - # i18n = { 115 - # consoleFont = "Lat2-Terminus16"; 116 - # consoleKeyMap = "us"; 117 - # defaultLocale = "en_US.UTF-8"; 114 + # i18n.defaultLocale = "en_US.UTF-8"; 115 + # console = { 116 + # font = "Lat2-Terminus16"; 117 + # keyMap = "us"; 118 118 # }; 119 119 120 120 # Set your time zone.
+1
nixos/modules/programs/cdemu.nix
··· 8 8 options = { 9 9 programs.cdemu = { 10 10 enable = mkOption { 11 + type = types.bool; 11 12 default = false; 12 13 description = '' 13 14 <command>cdemu</command> for members of
+1
nixos/modules/programs/criu.nix
··· 8 8 options = { 9 9 programs.criu = { 10 10 enable = mkOption { 11 + type = types.bool; 11 12 default = false; 12 13 description = '' 13 14 Install <command>criu</command> along with necessary kernel options.
+1
nixos/modules/programs/systemtap.nix
··· 8 8 options = { 9 9 programs.systemtap = { 10 10 enable = mkOption { 11 + type = types.bool; 11 12 default = false; 12 13 description = '' 13 14 Install <command>systemtap</command> along with necessary kernel options.
+1
nixos/modules/programs/zsh/oh-my-zsh.nix
··· 39 39 options = { 40 40 programs.zsh.ohMyZsh = { 41 41 enable = mkOption { 42 + type = types.bool; 42 43 default = false; 43 44 description = '' 44 45 Enable oh-my-zsh.
+1
nixos/modules/services/amqp/rabbitmq.nix
··· 17 17 options = { 18 18 services.rabbitmq = { 19 19 enable = mkOption { 20 + type = types.bool; 20 21 default = false; 21 22 description = '' 22 23 Whether to enable the RabbitMQ server, an Advanced Message
+1 -6
nixos/modules/services/backup/mysql-backup.nix
··· 37 37 38 38 services.mysqlBackup = { 39 39 40 - enable = mkOption { 41 - default = false; 42 - description = '' 43 - Whether to enable MySQL backups. 44 - ''; 45 - }; 40 + enable = mkEnableOption "MySQL backups"; 46 41 47 42 calendar = mkOption { 48 43 type = types.str;
+1 -6
nixos/modules/services/backup/postgresql-backup.nix
··· 44 44 45 45 options = { 46 46 services.postgresqlBackup = { 47 - enable = mkOption { 48 - default = false; 49 - description = '' 50 - Whether to enable PostgreSQL dumps. 51 - ''; 52 - }; 47 + enable = mkEnableOption "PostgreSQL dumps"; 53 48 54 49 startAt = mkOption { 55 50 default = "*-*-* 01:15:00";
+1 -4
nixos/modules/services/databases/clickhouse.nix
··· 11 11 12 12 services.clickhouse = { 13 13 14 - enable = mkOption { 15 - default = false; 16 - description = "Whether to enable ClickHouse database server."; 17 - }; 14 + enable = mkEnableOption "ClickHouse database server"; 18 15 19 16 }; 20 17
+1 -6
nixos/modules/services/databases/firebird.nix
··· 40 40 41 41 services.firebird = { 42 42 43 - enable = mkOption { 44 - default = false; 45 - description = '' 46 - Whether to enable the Firebird super server. 47 - ''; 48 - }; 43 + enable = mkEnableOption "the Firebird super server"; 49 44 50 45 package = mkOption { 51 46 default = pkgs.firebirdSuper;
+1 -6
nixos/modules/services/databases/memcached.nix
··· 18 18 19 19 services.memcached = { 20 20 21 - enable = mkOption { 22 - default = false; 23 - description = " 24 - Whether to enable Memcached. 25 - "; 26 - }; 21 + enable = mkEnableOption "Memcached"; 27 22 28 23 user = mkOption { 29 24 default = "memcached";
+1 -6
nixos/modules/services/databases/mongodb.nix
··· 29 29 30 30 services.mongodb = { 31 31 32 - enable = mkOption { 33 - default = false; 34 - description = " 35 - Whether to enable the MongoDB server. 36 - "; 37 - }; 32 + enable = mkEnableOption "the MongoDB server"; 38 33 39 34 package = mkOption { 40 35 default = pkgs.mongodb;
+1 -4
nixos/modules/services/databases/virtuoso.nix
··· 13 13 14 14 services.virtuoso = { 15 15 16 - enable = mkOption { 17 - default = false; 18 - description = "Whether to enable Virtuoso Opensource database server."; 19 - }; 16 + enable = mkEnableOption "Virtuoso Opensource database server"; 20 17 21 18 config = mkOption { 22 19 default = "";
+1 -6
nixos/modules/services/hardware/ratbagd.nix
··· 10 10 11 11 options = { 12 12 services.ratbagd = { 13 - enable = mkOption { 14 - default = false; 15 - description = '' 16 - Whether to enable ratbagd for configuring gaming mice. 17 - ''; 18 - }; 13 + enable = mkEnableOption "ratbagd for configuring gaming mice"; 19 14 }; 20 15 }; 21 16
+1 -6
nixos/modules/services/hardware/thermald.nix
··· 8 8 ###### interface 9 9 options = { 10 10 services.thermald = { 11 - enable = mkOption { 12 - default = false; 13 - description = '' 14 - Whether to enable thermald, the temperature management daemon. 15 - ''; 16 - }; 11 + enable = mkEnableOption "thermald, the temperature management daemon"; 17 12 18 13 debug = mkOption { 19 14 type = types.bool;
+1 -4
nixos/modules/services/mail/spamassassin.nix
··· 12 12 options = { 13 13 14 14 services.spamassassin = { 15 - enable = mkOption { 16 - default = false; 17 - description = "Whether to run the SpamAssassin daemon"; 18 - }; 15 + enable = mkEnableOption "the SpamAssassin daemon"; 19 16 20 17 debug = mkOption { 21 18 default = false;
+1
nixos/modules/services/misc/autofs.nix
··· 19 19 services.autofs = { 20 20 21 21 enable = mkOption { 22 + type = types.bool; 22 23 default = false; 23 24 description = '' 24 25 Mount filesystems on demand. Unmount them automatically.
+1 -7
nixos/modules/services/misc/cgminer.nix
··· 31 31 32 32 services.cgminer = { 33 33 34 - enable = mkOption { 35 - default = false; 36 - description = '' 37 - Whether to enable cgminer, an ASIC/FPGA/GPU miner for bitcoin and 38 - litecoin. 39 - ''; 40 - }; 34 + enable = mkEnableOption "cgminer, an ASIC/FPGA/GPU miner for bitcoin and litecoin"; 41 35 42 36 package = mkOption { 43 37 default = pkgs.cgminer;
+1 -6
nixos/modules/services/misc/devmon.nix
··· 8 8 in { 9 9 options = { 10 10 services.devmon = { 11 - enable = mkOption { 12 - default = false; 13 - description = '' 14 - Whether to enable devmon, an automatic device mounting daemon. 15 - ''; 16 - }; 11 + enable = mkEnableOption "devmon, an automatic device mounting daemon"; 17 12 }; 18 13 }; 19 14
+1 -4
nixos/modules/services/misc/disnix.nix
··· 17 17 18 18 services.disnix = { 19 19 20 - enable = mkOption { 21 - default = false; 22 - description = "Whether to enable Disnix"; 23 - }; 20 + enable = mkEnableOption "Disnix"; 24 21 25 22 enableMultiUser = mkOption { 26 23 type = types.bool;
+1 -4
nixos/modules/services/misc/felix.nix
··· 17 17 18 18 services.felix = { 19 19 20 - enable = mkOption { 21 - default = false; 22 - description = "Whether to enable the Apache Felix OSGi service"; 23 - }; 20 + enable = mkEnableOption "the Apache Felix OSGi service"; 24 21 25 22 bundles = mkOption { 26 23 type = types.listOf types.package;
+1
nixos/modules/services/misc/ihaskell.nix
··· 15 15 options = { 16 16 services.ihaskell = { 17 17 enable = mkOption { 18 + type = types.bool; 18 19 default = false; 19 20 description = "Autostart an IHaskell notebook service."; 20 21 };
+1 -4
nixos/modules/services/misc/safeeyes.nix
··· 16 16 17 17 services.safeeyes = { 18 18 19 - enable = mkOption { 20 - default = false; 21 - description = "Whether to enable the safeeyes OSGi service"; 22 - }; 19 + enable = mkEnableOption "the safeeyes OSGi service"; 23 20 24 21 }; 25 22
+1
nixos/modules/services/misc/svnserve.nix
··· 18 18 services.svnserve = { 19 19 20 20 enable = mkOption { 21 + type = types.bool; 21 22 default = false; 22 23 description = "Whether to enable svnserve to serve Subversion repositories through the SVN protocol."; 23 24 };
+4 -12
nixos/modules/services/misc/synergy.nix
··· 19 19 # !!! All these option descriptions needs to be cleaned up. 20 20 21 21 client = { 22 - enable = mkOption { 23 - default = false; 24 - description = " 25 - Whether to enable the Synergy client (receive keyboard and mouse events from a Synergy server). 26 - "; 27 - }; 22 + enable = mkEnableOption "the Synergy client (receive keyboard and mouse events from a Synergy server)"; 23 + 28 24 screenName = mkOption { 29 25 default = ""; 30 26 description = '' ··· 47 43 }; 48 44 49 45 server = { 50 - enable = mkOption { 51 - default = false; 52 - description = '' 53 - Whether to enable the Synergy server (send keyboard and mouse events). 54 - ''; 55 - }; 46 + enable = mkEnableOption "the Synergy server (send keyboard and mouse events)"; 47 + 56 48 configFile = mkOption { 57 49 default = "/etc/synergy-server.conf"; 58 50 description = "The Synergy server configuration file.";
+2 -4
nixos/modules/services/network-filesystems/netatalk.nix
··· 43 43 options = { 44 44 services.netatalk = { 45 45 46 - enable = mkOption { 47 - default = false; 48 - description = "Whether to enable the Netatalk AFP fileserver."; 49 - }; 46 + enable = mkEnableOption "the Netatalk AFP fileserver"; 50 47 51 48 port = mkOption { 52 49 default = 548; ··· 65 62 66 63 homes = { 67 64 enable = mkOption { 65 + type = types.bool; 68 66 default = false; 69 67 description = "Enable sharing of the UNIX server user home directories."; 70 68 };
+1 -4
nixos/modules/services/network-filesystems/rsyncd.nix
··· 29 29 options = { 30 30 services.rsyncd = { 31 31 32 - enable = mkOption { 33 - default = false; 34 - description = "Whether to enable the rsync daemon."; 35 - }; 32 + enable = mkEnableOption "the rsync daemon"; 36 33 37 34 motd = mkOption { 38 35 type = types.str;
+6
nixos/modules/services/network-filesystems/xtreemfs.nix
··· 100 100 101 101 dir = { 102 102 enable = mkOption { 103 + type = types.bool; 103 104 default = true; 104 105 description = '' 105 106 Whether to enable XtreemFS DIR service. 106 107 ''; 107 108 }; 109 + 108 110 uuid = mkOption { 109 111 example = "eacb6bab-f444-4ebf-a06a-3f72d7465e40"; 110 112 description = '' ··· 218 220 219 221 mrc = { 220 222 enable = mkOption { 223 + type = types.bool; 221 224 default = true; 222 225 description = '' 223 226 Whether to enable XtreemFS MRC service. 224 227 ''; 225 228 }; 229 + 226 230 uuid = mkOption { 227 231 example = "eacb6bab-f444-4ebf-a06a-3f72d7465e41"; 228 232 description = '' ··· 354 358 355 359 osd = { 356 360 enable = mkOption { 361 + type = types.bool; 357 362 default = true; 358 363 description = '' 359 364 Whether to enable XtreemFS OSD service. 360 365 ''; 361 366 }; 367 + 362 368 uuid = mkOption { 363 369 example = "eacb6bab-f444-4ebf-a06a-3f72d7465e42"; 364 370 description = ''
+1
nixos/modules/services/network-filesystems/yandex-disk.nix
··· 21 21 services.yandex-disk = { 22 22 23 23 enable = mkOption { 24 + type = types.bool; 24 25 default = false; 25 26 description = " 26 27 Whether to enable Yandex-disk client. See https://disk.yandex.ru/
+1
nixos/modules/services/networking/amuled.nix
··· 16 16 services.amule = { 17 17 18 18 enable = mkOption { 19 + type = types.bool; 19 20 default = false; 20 21 description = '' 21 22 Whether to run the AMule daemon. You need to manually run "amuled --ec-config" to configure the service for the first time.
+1 -6
nixos/modules/services/networking/babeld.nix
··· 35 35 36 36 services.babeld = { 37 37 38 - enable = mkOption { 39 - default = false; 40 - description = '' 41 - Whether to run the babeld network routing daemon. 42 - ''; 43 - }; 38 + enable = mkEnableOption "the babeld network routing daemon"; 44 39 45 40 interfaceDefaults = mkOption { 46 41 default = null;
+1 -6
nixos/modules/services/networking/bind.nix
··· 68 68 69 69 services.bind = { 70 70 71 - enable = mkOption { 72 - default = false; 73 - description = " 74 - Whether to enable BIND domain name server. 75 - "; 76 - }; 71 + enable = mkEnableOption "BIND domain name server"; 77 72 78 73 cacheNetworks = mkOption { 79 74 default = ["127.0.0.0/24"];
+1
nixos/modules/services/networking/bitlbee.nix
··· 48 48 services.bitlbee = { 49 49 50 50 enable = mkOption { 51 + type = types.bool; 51 52 default = false; 52 53 description = '' 53 54 Whether to run the BitlBee IRC to other chat network gateway.
+1 -6
nixos/modules/services/networking/cntlm.nix
··· 33 33 34 34 options.services.cntlm = { 35 35 36 - enable = mkOption { 37 - default = false; 38 - description = '' 39 - Whether to enable the cntlm, which start a local proxy. 40 - ''; 41 - }; 36 + enable = mkEnableOption "cntlm, which starts a local proxy"; 42 37 43 38 username = mkOption { 44 39 description = ''
+1
nixos/modules/services/networking/flashpolicyd.nix
··· 39 39 services.flashpolicyd = { 40 40 41 41 enable = mkOption { 42 + type = types.bool; 42 43 default = false; 43 44 description = 44 45 ''
+2 -6
nixos/modules/services/networking/gvpe.nix
··· 42 42 { 43 43 options = { 44 44 services.gvpe = { 45 - enable = mkOption { 46 - default = false; 47 - description = '' 48 - Whether to run gvpe 49 - ''; 50 - }; 45 + enable = lib.mkEnableOption "gvpe"; 46 + 51 47 nodename = mkOption { 52 48 default = null; 53 49 description =''
+1
nixos/modules/services/networking/hostapd.nix
··· 49 49 services.hostapd = { 50 50 51 51 enable = mkOption { 52 + type = types.bool; 52 53 default = false; 53 54 description = '' 54 55 Enable putting a wireless interface into infrastructure mode,
+1 -6
nixos/modules/services/networking/ircd-hybrid/default.nix
··· 36 36 37 37 services.ircdHybrid = { 38 38 39 - enable = mkOption { 40 - default = false; 41 - description = " 42 - Enable IRCD. 43 - "; 44 - }; 39 + enable = mkEnableOption "IRCD"; 45 40 46 41 serverName = mkOption { 47 42 default = "hades.arpa";
+2 -6
nixos/modules/services/networking/mailpile.nix
··· 18 18 options = { 19 19 20 20 services.mailpile = { 21 - enable = mkOption { 22 - default = false; 23 - description = " 24 - Whether to enable Mailpile the mail client. 25 - "; 26 - }; 21 + enable = mkEnableOption "Mailpile the mail client"; 22 + 27 23 hostname = mkOption { 28 24 default = "localhost"; 29 25 description = "Listen to this hostname or ip.";
+1
nixos/modules/services/networking/ntp/chrony.nix
··· 30 30 options = { 31 31 services.chrony = { 32 32 enable = mkOption { 33 + type = types.bool; 33 34 default = false; 34 35 description = '' 35 36 Whether to synchronise your machine's time using chrony.
+1
nixos/modules/services/networking/ntp/ntpd.nix
··· 40 40 services.ntp = { 41 41 42 42 enable = mkOption { 43 + type = types.bool; 43 44 default = false; 44 45 description = '' 45 46 Whether to synchronise your machine's time using ntpd, as a peer in
+1 -6
nixos/modules/services/networking/openfire.nix
··· 9 9 10 10 services.openfire = { 11 11 12 - enable = mkOption { 13 - default = false; 14 - description = " 15 - Whether to enable OpenFire XMPP server. 16 - "; 17 - }; 12 + enable = mkEnableOption "OpenFire XMPP server"; 18 13 19 14 usePostgreSQL = mkOption { 20 15 default = true;
+1 -6
nixos/modules/services/networking/prayer.nix
··· 41 41 42 42 services.prayer = { 43 43 44 - enable = mkOption { 45 - default = false; 46 - description = '' 47 - Whether to run the prayer webmail http server. 48 - ''; 49 - }; 44 + enable = mkEnableOption "the prayer webmail http server"; 50 45 51 46 port = mkOption { 52 47 default = "2080";
+1 -6
nixos/modules/services/networking/quassel.nix
··· 16 16 17 17 services.quassel = { 18 18 19 - enable = mkOption { 20 - default = false; 21 - description = '' 22 - Whether to run the Quassel IRC client daemon. 23 - ''; 24 - }; 19 + enable = mkEnableOption "the Quassel IRC client daemon"; 25 20 26 21 certificateFile = mkOption { 27 22 type = types.nullOr types.str;
+1
nixos/modules/services/networking/radvd.nix
··· 19 19 options = { 20 20 21 21 services.radvd.enable = mkOption { 22 + type = types.bool; 22 23 default = false; 23 24 description = 24 25 ''
+1
nixos/modules/services/networking/rdnssd.nix
··· 17 17 options = { 18 18 19 19 services.rdnssd.enable = mkOption { 20 + type = types.bool; 20 21 default = false; 21 22 #default = config.networking.enableIPv6; 22 23 description =
+2 -4
nixos/modules/services/networking/sabnzbd.nix
··· 15 15 16 16 options = { 17 17 services.sabnzbd = { 18 - enable = mkOption { 19 - default = false; 20 - description = "Whether to enable the sabnzbd server."; 21 - }; 18 + enable = mkEnableOption "the sabnzbd server"; 19 + 22 20 configFile = mkOption { 23 21 default = "/var/lib/sabnzbd/sabnzbd.ini"; 24 22 description = "Path to config file.";
+1
nixos/modules/services/networking/shairport-sync.nix
··· 17 17 services.shairport-sync = { 18 18 19 19 enable = mkOption { 20 + type = types.bool; 20 21 default = false; 21 22 description = '' 22 23 Enable the shairport-sync daemon.
+1
nixos/modules/services/networking/ssh/lshd.nix
··· 19 19 services.lshd = { 20 20 21 21 enable = mkOption { 22 + type = types.bool; 22 23 default = false; 23 24 description = '' 24 25 Whether to enable the GNU lshd SSH2 daemon, which allows
+1 -6
nixos/modules/services/networking/xinetd.nix
··· 44 44 45 45 options = { 46 46 47 - services.xinetd.enable = mkOption { 48 - default = false; 49 - description = '' 50 - Whether to enable the xinetd super-server daemon. 51 - ''; 52 - }; 47 + services.xinetd.enable = mkEnableOption "the xinetd super-server daemon"; 53 48 54 49 services.xinetd.extraDefaults = mkOption { 55 50 default = "";
+1 -6
nixos/modules/services/security/fprot.nix
··· 10 10 11 11 services.fprot = { 12 12 updater = { 13 - enable = mkOption { 14 - default = false; 15 - description = '' 16 - Whether to enable automatic F-Prot virus definitions database updates. 17 - ''; 18 - }; 13 + enable = mkEnableOption "automatic F-Prot virus definitions database updates"; 19 14 20 15 productData = mkOption { 21 16 description = ''
+1 -6
nixos/modules/services/system/kerberos/default.nix
··· 51 51 ###### interface 52 52 options = { 53 53 services.kerberos_server = { 54 - enable = mkOption { 55 - default = false; 56 - description = '' 57 - Enable the kerberos authentification server. 58 - ''; 59 - }; 54 + enable = lib.mkEnableOption "the kerberos authentification server"; 60 55 61 56 realms = mkOption { 62 57 type = types.attrsOf (types.submodule realm);
+1
nixos/modules/services/system/localtime.nix
··· 8 8 options = { 9 9 services.localtime = { 10 10 enable = mkOption { 11 + type = types.bool; 11 12 default = false; 12 13 description = '' 13 14 Enable <literal>localtime</literal>, simple daemon for keeping the system
+1
nixos/modules/services/system/uptimed.nix
··· 10 10 options = { 11 11 services.uptimed = { 12 12 enable = mkOption { 13 + type = types.bool; 13 14 default = false; 14 15 description = '' 15 16 Enable <literal>uptimed</literal>, allowing you to track
+1
nixos/modules/services/web-servers/jboss/default.nix
··· 24 24 services.jboss = { 25 25 26 26 enable = mkOption { 27 + type = types.bool; 27 28 default = false; 28 29 description = "Whether to enable JBoss. WARNING : this package is outdated and is known to have vulnerabilities."; 29 30 };
+1
nixos/modules/services/x11/desktop-managers/enlightenment.nix
··· 23 23 options = { 24 24 25 25 services.xserver.desktopManager.enlightenment.enable = mkOption { 26 + type = types.bool; 26 27 default = false; 27 28 description = "Enable the Enlightenment desktop environment."; 28 29 };
+1
nixos/modules/services/x11/desktop-managers/gnome3.nix
··· 72 72 73 73 services.xserver.desktopManager.gnome3 = { 74 74 enable = mkOption { 75 + type = types.bool; 75 76 default = false; 76 77 description = "Enable Gnome 3 desktop manager."; 77 78 };
+1
nixos/modules/services/x11/desktop-managers/kodi.nix
··· 10 10 options = { 11 11 services.xserver.desktopManager.kodi = { 12 12 enable = mkOption { 13 + type = types.bool; 13 14 default = false; 14 15 description = "Enable the kodi multimedia center."; 15 16 };
+1
nixos/modules/services/x11/display-managers/startx.nix
··· 15 15 options = { 16 16 services.xserver.displayManager.startx = { 17 17 enable = mkOption { 18 + type = types.bool; 18 19 default = false; 19 20 description = '' 20 21 Whether to enable the dummy "startx" pseudo-display manager,
+1
nixos/modules/services/x11/hardware/wacom.nix
··· 15 15 services.xserver.wacom = { 16 16 17 17 enable = mkOption { 18 + type = types.bool; 18 19 default = false; 19 20 description = '' 20 21 Whether to enable the Wacom touchscreen/digitizer/tablet.
-5
nixos/release-combined.nix
··· 20 20 else pkgs.lib.mapAttrs (n: v: removeMaintainers v) set 21 21 else set; 22 22 23 - allSupportedNixpkgs = builtins.removeAttrs (removeMaintainers (import ../pkgs/top-level/release.nix { 24 - supportedSystems = supportedSystems ++ limitedSupportedSystems; 25 - nixpkgs = nixpkgsSrc; 26 - })) [ "unstable" ]; 27 - 28 23 in rec { 29 24 30 25 nixos = removeMaintainers (import ./release.nix {
+2 -2
pkgs/applications/audio/openmpt123/default.nix
··· 2 2 , usePulseAudio ? config.pulseaudio or false, libpulseaudio }: 3 3 4 4 let 5 - version = "0.4.11"; 5 + version = "0.4.12"; 6 6 in stdenv.mkDerivation { 7 7 pname = "openmpt123"; 8 8 inherit version; 9 9 10 10 src = fetchurl { 11 11 url = "https://lib.openmpt.org/files/libopenmpt/src/libopenmpt-${version}+release.autotools.tar.gz"; 12 - sha256 = "1g96bpwh419s429wb387lkmhjsn3ldsjrzrb8h9p3wva5z6943i6"; 12 + sha256 = "0q2yf9g6hcwvr2nk3zggkscyf0np6i03q2g7fx10i2kcdr3n9k8c"; 13 13 }; 14 14 15 15 enableParallelBuilding = true;
+3 -3
pkgs/applications/editors/apostrophe/default.nix
··· 11 11 12 12 in stdenv.mkDerivation rec { 13 13 pname = "apostrophe"; 14 - version = "unstable-2020-03-29"; 14 + version = "2.2.0.2"; 15 15 16 16 src = fetchFromGitLab { 17 17 owner = "somas"; 18 18 repo = pname; 19 19 domain = "gitlab.gnome.org"; 20 - rev = "219fa8976e3b8a6f0cea15cfefe4e336423f2bdb"; 21 - sha256 = "192n5qs3x6rx62mqxd6wajwm453pns8kjyz5v3xc891an6bm1kqx"; 20 + rev = "v${version}"; 21 + sha256 = "13wvfkg0jw9mayd9ifzkqnhf8fmfjgr1lsj4niqbyrw130y9r9f6"; 22 22 }; 23 23 24 24 nativeBuildInputs = [ meson ninja cmake pkgconfig desktop-file-utils
+3 -3
pkgs/applications/editors/vscode/vscode.nix
··· 11 11 archive_fmt = if system == "x86_64-darwin" then "zip" else "tar.gz"; 12 12 13 13 sha256 = { 14 - x86_64-linux = "15jg39hmlnicq0zrz77yar1bmn5y6gp2670dya2qm5klhva9hd0f"; 15 - x86_64-darwin = "1ghqhn46jpbj3is8q5zcj0biyc7gwinhiz3qdpcnf88ga2blcsz8"; 14 + x86_64-linux = "1n083pzp2dsz6z6rcl1ldcwhd4i03sjigdfslfardhc4v5lbvmv8"; 15 + x86_64-darwin = "1qk3gscyskf4fwc8i09afr3wsyd1lwwycx6rf02wwh4n9py50b20"; 16 16 }.${system}; 17 17 in 18 18 callPackage ./generic.nix rec { ··· 21 21 22 22 # Please backport all compatible updates to the stable release. 23 23 # This is important for the extension ecosystem. 24 - version = "1.44.1"; 24 + version = "1.44.2"; 25 25 pname = "vscode"; 26 26 27 27 executableName = "code" + lib.optionalString isInsiders "-insiders";
+3 -3
pkgs/applications/editors/vscode/vscodium.nix
··· 11 11 archive_fmt = if system == "x86_64-darwin" then "zip" else "tar.gz"; 12 12 13 13 sha256 = { 14 - x86_64-linux = "16qwhnxpwarnwvlxwvy13g687g1cnfzysq16qkykkhqig0cnalmb"; 15 - x86_64-darwin = "1p9qkbj59bfc0kn9fzg99gqxbzwxq297qxivxcjflsapd712s4vm"; 14 + x86_64-linux = "141hwj1a2bsgzpfk354dnnmg4ak00fss3xsgqplyk949pbk6v1af"; 15 + x86_64-darwin = "0fi8nz1gayzw5dp6d3m7jsmij3jj4yjg5rk1s9w6falpgka76dm1"; 16 16 }.${system}; 17 17 18 18 sourceRoot = { ··· 27 27 28 28 # Please backport all compatible updates to the stable release. 29 29 # This is important for the extension ecosystem. 30 - version = "1.44.1"; 30 + version = "1.44.2"; 31 31 pname = "vscodium"; 32 32 33 33 executableName = "codium";
+2 -2
pkgs/applications/graphics/xournalpp/default.nix
··· 22 22 23 23 stdenv.mkDerivation rec { 24 24 pname = "xournalpp"; 25 - version = "1.0.17"; 25 + version = "1.0.18"; 26 26 27 27 src = fetchFromGitHub { 28 28 owner = "xournalpp"; 29 29 repo = pname; 30 30 rev = version; 31 - sha256 = "0xw2mcgnm4sa9hrhfgp669lfypw97drxjmz5w8i5whaprpvmkxzw"; 31 + sha256 = "0a9ygbmd4dwgck3k8wsrm2grynqa0adb12wwspzmzvpisbadffjy"; 32 32 }; 33 33 34 34 nativeBuildInputs = [ cmake gettext pkgconfig wrapGAppsHook ];
+2 -2
pkgs/applications/misc/kanboard/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "kanboard"; 5 - version = "1.2.13"; 5 + version = "1.2.14"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "kanboard"; 9 9 repo = "kanboard"; 10 10 rev = "v${version}"; 11 - sha256 = "0mm5sx323v1rwykd1dhvk4d3ipgvgvi3wvhrlavbja3lgay3mdwk"; 11 + sha256 = "11bwajzidnyagdyip7i8rwni1f66acv0k4lybdm0mc4195anivjh"; 12 12 }; 13 13 14 14 dontBuild = true;
+2 -2
pkgs/applications/misc/sidequest/default.nix
··· 1 1 { stdenv, lib, fetchurl, buildFHSUserEnv, makeDesktopItem, makeWrapper, atomEnv, libuuid, at-spi2-atk, icu, openssl, zlib }: 2 2 let 3 3 pname = "sidequest"; 4 - version = "0.8.7"; 4 + version = "0.10.2"; 5 5 6 6 desktopItem = makeDesktopItem rec { 7 7 name = "SideQuest"; ··· 16 16 17 17 src = fetchurl { 18 18 url = "https://github.com/the-expanse/SideQuest/releases/download/v${version}/SideQuest-${version}.tar.xz"; 19 - sha256 = "1hbr6ml689zq4k3mzmn2xcn4r4dy717rgq3lgm32pzwgy5w92i2j"; 19 + sha256 = "1vfxn4gx5b138gj6nk4w3jlp2l56cqpb8hq2kn5mrf4dhjii8n88"; 20 20 }; 21 21 22 22 buildInputs = [ makeWrapper ];
+9 -8
pkgs/applications/networking/instant-messengers/jackline/default.nix
··· 1 1 { stdenv, fetchFromGitHub, ocamlPackages }: 2 2 3 - assert stdenv.lib.versionAtLeast ocamlPackages.ocaml.version "4.02.2"; 3 + assert stdenv.lib.versionAtLeast ocamlPackages.ocaml.version "4.07"; 4 4 5 5 stdenv.mkDerivation { 6 6 pname = "jackline"; 7 - version = "2019-08-08"; 7 + version = "unstable-2020-03-22"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "hannesm"; 11 11 repo = "jackline"; 12 - rev = "b934594010a563ded9c0f436e3fab8f1cae29856"; 13 - sha256 = "076h03jd970xlii90ax6kvgyq67g81gs30yvdzps366n7zzy3yfc"; 12 + rev = "52f84525c74c43e8d03fb1e6ff025ccb2699e4aa"; 13 + sha256 = "0wir573ah1w16xzdn9rfwk3569zq4ff5frp0ywq70va4gdlb679c"; 14 14 }; 15 15 16 16 buildInputs = with ocamlPackages; [ 17 - ocaml ocamlbuild findlib topkg ppx_sexp_conv 18 - erm_xmpp tls nocrypto x509 ocaml_lwt otr astring 19 - ptime notty sexplib hex uutf 17 + ocaml ocamlbuild findlib topkg ppx_sexp_conv ppx_deriving 18 + erm_xmpp tls mirage-crypto mirage-crypto-pk x509 domain-name 19 + ocaml_lwt otr astring ptime mtime notty sexplib hex uutf 20 + dns-client base64 20 21 ]; 21 22 22 23 buildPhase = "${ocamlPackages.topkg.run} build --pinned true"; ··· 25 26 26 27 meta = with stdenv.lib; { 27 28 homepage = "https://github.com/hannesm/jackline"; 28 - description = "Terminal-based XMPP client in OCaml"; 29 + description = "minimalistic secure XMPP client in OCaml"; 29 30 license = licenses.bsd2; 30 31 maintainers = with maintainers; [ sternenseemann ]; 31 32 };
+2 -15
pkgs/applications/networking/instant-messengers/psi-plus/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "psi-plus"; 9 - version = "1.4.984"; 9 + version = "1.4.1086"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "psi-plus"; 13 13 repo = "psi-plus-snapshots"; 14 14 rev = version; 15 - sha256 = "1nii2nfi37i6mn79xmygscmm8ax75ky244wxkzlga0ya8i8wfjh7"; 15 + sha256 = "0war4hbjs1m7ll6rvpl3lj44lb0p5fi0g2siinnxpjffz2ydi97p"; 16 16 }; 17 17 18 - resources = fetchFromGitHub { 19 - owner = "psi-plus"; 20 - repo = "resources"; 21 - rev = "2f1c12564f7506bf902a26040fdb47ead4df6b73"; 22 - sha256 = "1dgm9k052fq7f2bpx13kchg7sxb227dkn115lyspzvhnhprnypz2"; 23 - }; 24 - 25 - postUnpack = '' 26 - cp -a "${resources}/iconsets" "$sourceRoot" 27 - ''; 28 - 29 18 cmakeFlags = [ 30 19 "-DENABLE_PLUGINS=ON" 31 20 ]; ··· 37 26 libidn qca2-qt5 libsecret libXScrnSaver hunspell 38 27 libgcrypt libotr html-tidy libgpgerror libsignal-protocol-c 39 28 ]; 40 - 41 - enableParallelBuilding = true; 42 29 43 30 meta = with stdenv.lib; { 44 31 description = "XMPP (Jabber) client";
+13 -2
pkgs/applications/networking/remote/citrix-workspace/default.nix
··· 24 24 , gtk_engines 25 25 , alsaLib 26 26 , zlib 27 - , version ? "19.12.0" 27 + , version ? "20.04.0" 28 28 }: 29 29 30 30 let ··· 71 71 x86hash = "07rfp90ksnvr8zv7ix7f0z6a59n48s7bd4kqbzilfwxgs4ddqmcy"; 72 72 x64suffix = "19"; 73 73 x86suffix = "19"; 74 - homepage = "https://www.citrix.com/de-de/downloads/workspace-app/linux/workspace-app-for-linux-latest.html"; 74 + homepage = "https://www.citrix.com/downloads/workspace-app/legacy-workspace-app-for-linux/workspace-app-for-linux-1912.html"; 75 + }; 76 + 77 + "20.04.0" = { 78 + major = "20"; 79 + minor = "04"; 80 + patch = "0"; 81 + x64hash = "E923592216F9541173846F932784E6C062CB09C9E8858219C7489607BF82A0FB"; 82 + x86hash = "A2E2E1882723DA6796E68916B3BB2B44DD575A83DEB03CA90A262F6C81B1A53F"; 83 + x64suffix = "21"; 84 + x86suffix = "21"; 85 + homepage = "https://www.citrix.com/downloads/workspace-app/linux/workspace-app-for-linux-latest.html"; 75 86 }; 76 87 }; 77 88
+3 -3
pkgs/applications/office/trilium/default.nix
··· 19 19 maintainers = with maintainers; [ emmanuelrosa dtzWill kampka ]; 20 20 }; 21 21 22 - version = "0.40.5"; 22 + version = "0.40.7"; 23 23 24 24 in { 25 25 ··· 30 30 31 31 src = fetchurl { 32 32 url = "https://github.com/zadam/trilium/releases/download/v${version}/trilium-linux-x64-${version}.tar.xz"; 33 - sha256 = "02hmfgv8viy1hn2ix4b0gdzbcj7piddsmjdnb0b5hpwahqrikiyi"; 33 + sha256 = "0xi3bb0kbphbgpk2wlsad509g0hwwb259q2vkv0kgyr4i4wcyc1f"; 34 34 }; 35 35 36 36 # Fetch from source repo, no longer included in release. ··· 78 78 79 79 src = fetchurl { 80 80 url = "https://github.com/zadam/trilium/releases/download/v${version}/trilium-linux-x64-server-${version}.tar.xz"; 81 - sha256 = "00b7qx2h26qrdhw2a7y0irhbr442yynnzpm1pz55hi33zpckbrc7"; 81 + sha256 = "15bspngnnbq6mhp1f82j9hccg0ymhm6i4rddpgz3n7dw5wxdj0sm"; 82 82 }; 83 83 84 84 nativeBuildInputs = [
+2 -2
pkgs/applications/science/astronomy/stellarium/default.nix
··· 6 6 7 7 mkDerivation rec { 8 8 pname = "stellarium"; 9 - version = "0.20.0"; 9 + version = "0.20.1"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "Stellarium"; 13 13 repo = "stellarium"; 14 14 rev = "v${version}"; 15 - sha256 = "1732dxkgyqd4xf0ry7v930vcbv60l8iry596869z1d47j2piibs4"; 15 + sha256 = "1x8svan03k1x9jwqflimbpj7jpg6mjrbz26bg1sbhsqdlc8rbhky"; 16 16 }; 17 17 18 18 nativeBuildInputs = [ cmake perl wrapQtAppsHook ];
+4 -4
pkgs/applications/science/biology/mosdepth/default.nix
··· 4 4 hts-nim = fetchFromGitHub { 5 5 owner = "brentp"; 6 6 repo = "hts-nim"; 7 - rev = "v0.2.14"; 8 - sha256 = "0d1z4b6mrppmz3hgkxd4wcy79w68icvhi7q7n3m2k17n8f3xbdx3"; 7 + rev = "v0.3.4"; 8 + sha256 = "0670phk1bq3l9j2zaa8i5wcpc5dyfrc0l2a6c21g0l2mmdczffa7"; 9 9 }; 10 10 11 11 docopt = fetchFromGitHub { ··· 17 17 18 18 in stdenv.mkDerivation rec { 19 19 pname = "mosdepth"; 20 - version = "0.2.6"; 20 + version = "0.2.9"; 21 21 22 22 src = fetchFromGitHub { 23 23 owner = "brentp"; 24 24 repo = "mosdepth"; 25 25 rev = "v${version}"; 26 - sha256 = "0i9pl9lsli3y84ygxanrr525gfg8fs9h481944cbzsmqmbldwvgk"; 26 + sha256 = "01gm9gj2x2zs4yx6wk761fi1papi7qr3gp4ln1kkn8n2f9y9h849"; 27 27 }; 28 28 29 29 buildInputs = [ nim ];
+1 -1
pkgs/applications/science/chemistry/octopus/default.nix
··· 2 2 , libyaml, libxc, fftw, blas, lapack, gsl, netcdf, arpack, autoreconfHook 3 3 }: 4 4 5 - assert (!blas.is64bit) && (!lapack.is64bit); 5 + assert (!blas.isILP64) && (!lapack.isILP64); 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "octopus";
+1 -1
pkgs/applications/science/machine-learning/shogun/default.nix
··· 13 13 assert pythonSupport -> pythonPackages != null; 14 14 assert opencvSupport -> opencv != null; 15 15 16 - assert (!blas.is64bit) && (!lapack.is64bit); 16 + assert (!blas.isILP64) && (!lapack.isILP64); 17 17 18 18 let 19 19 pname = "shogun";
+1 -1
pkgs/applications/science/math/R/default.nix
··· 9 9 , static ? false 10 10 }: 11 11 12 - assert (!blas.is64bit) && (!lapack.is64bit); 12 + assert (!blas.isILP64) && (!lapack.isILP64); 13 13 14 14 stdenv.mkDerivation rec { 15 15 name = "R-3.6.3";
+1 -1
pkgs/applications/science/math/giac/default.nix
··· 5 5 }: 6 6 7 7 assert enableGUI -> libGLU != null && libGL != null && xorg != null && fltk != null; 8 - assert (!blas.is64bit) && (!lapack.is64bit); 8 + assert (!blas.isILP64) && (!lapack.isILP64); 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "giac${lib.optionalString enableGUI "-with-xcas"}";
+1 -1
pkgs/applications/science/math/gmsh/default.nix
··· 1 1 { stdenv, fetchurl, cmake, blas, lapack, gfortran, gmm, fltk, libjpeg 2 2 , zlib, libGL, libGLU, xorg, opencascade-occt }: 3 3 4 - assert (!blas.is64bit) && (!lapack.is64bit); 4 + assert (!blas.isILP64) && (!lapack.isILP64); 5 5 6 6 stdenv.mkDerivation rec { 7 7 pname = "gmsh";
+1 -1
pkgs/applications/science/math/sage/sage-env.nix
··· 54 54 , less 55 55 }: 56 56 57 - assert (!blas.is64bit) && (!lapack.is64bit); 57 + assert (!blas.isILP64) && (!lapack.isILP64); 58 58 59 59 # This generates a `sage-env` shell file that will be sourced by sage on startup. 60 60 # It sets up various environment variables, telling sage where to find its
+1 -1
pkgs/applications/science/math/sage/sage-with-env.nix
··· 23 23 }: 24 24 25 25 # lots of segfaults with (64 bit) blas 26 - assert (!blas.is64bit) && (!lapack.is64bit); 26 + assert (!blas.isILP64) && (!lapack.isILP64); 27 27 28 28 # Wrapper that combined `sagelib` with `sage-env` to produce an actually 29 29 # executable sage. No tests are run yet and no documentation is built.
+1 -1
pkgs/applications/science/math/sage/sagelib.nix
··· 53 53 , pplpy 54 54 }: 55 55 56 - assert (!blas.is64bit) && (!lapack.is64bit); 56 + assert (!blas.isILP64) && (!lapack.isILP64); 57 57 58 58 # This is the core sage python package. Everything else is just wrappers gluing 59 59 # stuff together. It is not very useful on its own though, since it will not
+2 -2
pkgs/applications/version-management/git-and-tools/git/update.sh
··· 4 4 set -eu -o pipefail 5 5 6 6 oldVersion="$(nix-instantiate --eval -E "with import ./. {}; lib.getVersion git" | tr -d '"')" 7 - latestTag="$(git ls-remote --tags --sort="v:refname" git://github.com/git/git.git | grep -v '\{\}' | grep -v '\-rc' | tail -1 | sed 's|^.*/v\(.*\)|\1|')" 8 - targetVersion="${1:-latestTag}" 7 + latestTag="$(git ls-remote --tags --sort="v:refname" https://github.com/git/git.git | grep -v '\{\}' | grep -v '\-rc' | tail -1 | sed 's|^.*/v\(.*\)|\1|')" 8 + targetVersion="${1:-$latestTag}" 9 9 10 10 if [ ! "${oldVersion}" = "${targetVersion}" ]; then 11 11 update-source-version git "${targetVersion}"
+3 -3
pkgs/applications/window-managers/dwm/dwm-status.nix
··· 9 9 10 10 rustPlatform.buildRustPackage rec { 11 11 pname = "dwm-status"; 12 - version = "1.6.3"; 12 + version = "1.6.4"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "Gerschtli"; 16 16 repo = "dwm-status"; 17 17 rev = version; 18 - sha256 = "02sprsr7822ynkwpf3xdgmkdrgkw3vgijhlh65bayiv3b5lwb54n"; 18 + sha256 = "05dhd2gy7ysrnchdimrdd7jvzs1db9fyrk4ci7850jhrgavfd7c4"; 19 19 }; 20 20 21 21 nativeBuildInputs = [ makeWrapper pkgconfig ]; 22 22 buildInputs = [ dbus gdk-pixbuf libnotify xorg.libX11 ]; 23 23 24 - cargoSha256 = "0xybd6110b29ghl66kxfs64704qlhnn9jb5vl7lfk9sv62cs564i"; 24 + cargoSha256 = "0zkbps8vsjcvy7x0sgb07kacszi57dlyq8j6ia6yy0jyqnvlaqa7"; 25 25 26 26 postInstall = lib.optionalString (bins != []) '' 27 27 wrapProgram $out/bin/dwm-status --prefix "PATH" : "${stdenv.lib.makeBinPath bins}"
+10 -6
pkgs/build-support/alternatives/blas/default.nix
··· 1 1 { lib, stdenv 2 2 , lapack-reference, openblasCompat, openblas 3 - , is64bit ? false 4 - , blasProvider ? if is64bit then openblas else openblasCompat }: 3 + , isILP64 ? false 4 + , blasProvider ? if isILP64 then openblas else openblasCompat }: 5 5 6 6 let 7 7 blasFortranSymbols = [ ··· 31 31 else stdenv.hostPlatform.extensions.sharedLibrary; 32 32 33 33 34 - is64bit = blasProvider.blas64 or false; 34 + isILP64 = blasProvider.blas64 or false; 35 35 blasImplementation = lib.getName blasProvider; 36 36 37 37 in 38 38 39 - assert is64bit -> (blasImplementation == "openblas" && blasProvider.blas64) || blasImplementation == "mkl"; 39 + assert isILP64 -> (blasImplementation == "openblas" && blasProvider.blas64) || blasImplementation == "mkl"; 40 40 41 41 stdenv.mkDerivation { 42 42 pname = "blas"; ··· 49 49 }; 50 50 51 51 passthru = { 52 - inherit is64bit; 52 + inherit isILP64; 53 53 provider = blasProvider; 54 54 implementation = blasImplementation; 55 55 }; ··· 57 57 dontBuild = true; 58 58 dontConfigure = true; 59 59 unpackPhase = "src=$PWD"; 60 + 61 + dontPatchELF = true; 60 62 61 63 installPhase = ('' 62 64 mkdir -p $out/lib $dev/include $dev/lib/pkgconfig ··· 132 134 EOF 133 135 '' + stdenv.lib.optionalString (blasImplementation == "mkl") '' 134 136 mkdir -p $out/nix-support 135 - echo 'export MKL_INTERFACE_LAYER=${lib.optionalString is64bit "I"}LP64,GNU' > $out/nix-support/setup-hook 137 + echo 'export MKL_INTERFACE_LAYER=${lib.optionalString isILP64 "I"}LP64,GNU' > $out/nix-support/setup-hook 138 + ln -s $out/lib/libblas${canonicalExtension} $out/lib/libmkl_rt${stdenv.hostPlatform.extensions.sharedLibrary} 139 + ln -sf ${blasProvider}/include/* $dev/include 136 140 ''); 137 141 }
+9 -5
pkgs/build-support/alternatives/lapack/default.nix
··· 1 1 { lib, stdenv 2 2 , lapack-reference, openblasCompat, openblas 3 - , is64bit ? false 4 - , lapackProvider ? if is64bit then openblas else openblasCompat }: 3 + , isILP64 ? false 4 + , lapackProvider ? if isILP64 then openblas else openblasCompat }: 5 5 6 6 let 7 7 ··· 14 14 15 15 in 16 16 17 - assert is64bit -> (lapackImplementation == "openblas" && lapackProvider.blas64) || lapackImplementation == "mkl"; 17 + assert isILP64 -> (lapackImplementation == "openblas" && lapackProvider.blas64) || lapackImplementation == "mkl"; 18 18 19 19 stdenv.mkDerivation { 20 20 pname = "lapack"; ··· 27 27 }; 28 28 29 29 passthru = { 30 - inherit is64bit; 30 + inherit isILP64; 31 31 provider = lapackProvider; 32 32 implementation = lapackImplementation; 33 33 }; ··· 35 35 dontBuild = true; 36 36 dontConfigure = true; 37 37 unpackPhase = "src=$PWD"; 38 + 39 + dontPatchELF = true; 38 40 39 41 installPhase = ('' 40 42 mkdir -p $out/lib $dev/include $dev/lib/pkgconfig ··· 106 108 EOF 107 109 '' + stdenv.lib.optionalString (lapackImplementation == "mkl") '' 108 110 mkdir -p $out/nix-support 109 - echo 'export MKL_INTERFACE_LAYER=${lib.optionalString is64bit "I"}LP64,GNU' > $out/nix-support/setup-hook 111 + echo 'export MKL_INTERFACE_LAYER=${lib.optionalString isILP64 "I"}LP64,GNU' > $out/nix-support/setup-hook 112 + ln -s $out/lib/liblapack${canonicalExtension} $out/lib/libmkl_rt${stdenv.hostPlatform.extensions.sharedLibrary} 113 + ln -sf ${lapackProvider}/include/* $dev/include 110 114 ''); 111 115 }
+1 -1
pkgs/development/compilers/bs-platform/build-bs-platform.nix
··· 52 52 installPhase = '' 53 53 mkdir -p $out/bin 54 54 cp -rf jscomp lib ${bin_folder} vendor odoc_gen native bsb bsc bsrefmt $out 55 - mkdir $out/lib/ocaml 55 + mkdir -p $out/lib/ocaml 56 56 cp jscomp/runtime/js.* jscomp/runtime/*.cm* $out/lib/ocaml 57 57 cp jscomp/others/*.ml jscomp/others/*.mli jscomp/others/*.cm* $out/lib/ocaml 58 58 cp jscomp/stdlib-406/*.ml jscomp/stdlib-406/*.mli jscomp/stdlib-406/*.cm* $out/lib/ocaml
+2 -2
pkgs/development/compilers/bs-platform/default.nix
··· 4 4 in 5 5 (build-bs-platform rec { 6 6 inherit stdenv runCommand fetchFromGitHub ninja nodejs python3; 7 - version = "7.2.0"; 7 + version = "7.3.1"; 8 8 ocaml-version = "4.06.1"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "BuckleScript"; 12 12 repo = "bucklescript"; 13 13 rev = version; 14 - sha256 = "1fsx7gvcp6rbqd0qf5fix02mbbmk9rgm09zbwjrx0lp5cjv3n2s4"; 14 + sha256 = "14vp6cl5ml7xb3pd0paqajb50qv62l8j5m8hi3b6fh0pm68j1yxd"; 15 15 fetchSubmodules = true; 16 16 }; 17 17 }).overrideAttrs (attrs: {
+2 -2
pkgs/development/compilers/julia/1.3.nix
··· 12 12 , CoreServices, ApplicationServices 13 13 }: 14 14 15 - assert (!blas.is64bit) && (!lapack.is64bit); 15 + assert (!blas.isILP64) && (!lapack.isILP64); 16 16 17 17 with stdenv.lib; 18 18 ··· 88 88 "SHELL=${stdenv.shell}" 89 89 90 90 "USE_SYSTEM_BLAS=1" 91 - "USE_BLAS64=${if blas.is64bit then "1" else "0"}" 91 + "USE_BLAS64=${if blas.isILP64 then "1" else "0"}" 92 92 93 93 "USE_SYSTEM_LAPACK=1" 94 94
+2 -2
pkgs/development/compilers/julia/shared.nix
··· 22 22 23 23 with stdenv.lib; 24 24 25 - assert (!blas.is64bit) && (!lapack.is64bit); 25 + assert (!blas.isILP64) && (!lapack.isILP64); 26 26 27 27 let 28 28 dsfmtVersion = "2.2.3"; ··· 137 137 "SHELL=${stdenv.shell}" 138 138 139 139 "USE_SYSTEM_BLAS=1" 140 - "USE_BLAS64=${if blas.is64bit then "1" else "0"}" 140 + "USE_BLAS64=${if blas.isILP64 then "1" else "0"}" 141 141 142 142 "USE_SYSTEM_LAPACK=1" 143 143
+3 -3
pkgs/development/interpreters/octave/default.nix
··· 53 53 , darwin 54 54 }: 55 55 56 - assert (!blas.is64bit) && (!lapack.is64bit); 56 + assert (!blas.isILP64) && (!lapack.isILP64); 57 57 58 58 stdenv.mkDerivation rec { 59 59 version = "5.2.0"; ··· 125 125 enableParallelBuilding = true; 126 126 127 127 # See https://savannah.gnu.org/bugs/?50339 128 - F77_INTEGER_8_FLAG = if blas.is64bit then "-fdefault-integer-8" else ""; 128 + F77_INTEGER_8_FLAG = if blas.isILP64 then "-fdefault-integer-8" else ""; 129 129 130 130 configureFlags = [ 131 131 "--with-blas=blas" 132 132 "--with-lapack=lapack" 133 - (if blas.is64bit then "--enable-64" else "--disable-64") 133 + (if blas.isILP64 then "--enable-64" else "--disable-64") 134 134 ] 135 135 ++ (if stdenv.isDarwin then [ "--enable-link-all-dependencies" ] else [ ]) 136 136 ++ stdenv.lib.optionals enableReadline [ "--enable-readline" ]
+1 -1
pkgs/development/libraries/fflas-ffpack/default.nix
··· 2 2 , gmpxx 3 3 }: 4 4 5 - assert (!blas.is64bit) && (!lapack.is64bit); 5 + assert (!blas.isILP64) && (!lapack.isILP64); 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "fflas-ffpack";
+1 -1
pkgs/development/libraries/linbox/default.nix
··· 10 10 , withSage ? false # sage support 11 11 }: 12 12 13 - assert (!blas.is64bit) && (!lapack.is64bit); 13 + assert (!blas.isILP64) && (!lapack.isILP64); 14 14 15 15 stdenv.mkDerivation rec { 16 16 pname = "linbox";
+1 -1
pkgs/development/libraries/qrupdate/default.nix
··· 18 18 -e 's,^LAPACK=.*,LAPACK=-L${lapack}/lib -llapack,' \ 19 19 Makeconf 20 20 '' 21 - + stdenv.lib.optionalString blas.is64bit 21 + + stdenv.lib.optionalString blas.isILP64 22 22 '' 23 23 sed -i Makeconf -e '/^FFLAGS=.*/ s/$/-fdefault-integer-8/' 24 24 '';
+1 -1
pkgs/development/libraries/science/math/arpack/default.nix
··· 27 27 28 28 cmakeFlags = [ 29 29 "-DBUILD_SHARED_LIBS=ON" 30 - "-DINTERFACE64=${optionalString blas.is64bit "1"}" 30 + "-DINTERFACE64=${optionalString blas.isILP64 "1"}" 31 31 ]; 32 32 33 33 preCheck = if stdenv.isDarwin then ''
+1 -1
pkgs/development/libraries/science/math/ipopt/default.nix
··· 1 1 { stdenv, fetchurl, unzip, blas, lapack, gfortran }: 2 2 3 - assert (!blas.is64bit) && (!lapack.is64bit); 3 + assert (!blas.isILP64) && (!lapack.isILP64); 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "ipopt";
+2 -9
pkgs/development/libraries/science/math/magma/default.nix
··· 1 - { stdenv, fetchurl, cmake, gfortran, cudatoolkit, libpthreadstubs, lapack, blas 2 - , mklSupport ? false, mkl ? null 3 - }: 4 - 5 - assert !mklSupport || mkl != null; 1 + { stdenv, fetchurl, cmake, gfortran, cudatoolkit, libpthreadstubs, lapack, blas }: 6 2 7 3 with stdenv.lib; 8 4 ··· 17 13 name = "magma-${version}.tar.gz"; 18 14 }; 19 15 20 - buildInputs = [ gfortran cudatoolkit libpthreadstubs cmake ] 21 - ++ (if mklSupport then [ mkl ] else [ lapack blas ]); 16 + buildInputs = [ gfortran cudatoolkit libpthreadstubs cmake lapack blas ]; 22 17 23 18 doCheck = false; 24 - 25 - MKLROOT = optionalString mklSupport mkl; 26 19 27 20 preConfigure = '' 28 21 export CC=${cudatoolkit.cc}/bin/gcc CXX=${cudatoolkit.cc}/bin/g++
+1 -1
pkgs/development/libraries/science/math/scalapack/default.nix
··· 2 2 , gfortran, mpi, blas, lapack 3 3 } : 4 4 5 - assert (!blas.is64bit) && (!lapack.is64bit); 5 + assert (!blas.isILP64) && (!lapack.isILP64); 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "scalapack";
+1 -1
pkgs/development/libraries/science/math/scs/default.nix
··· 1 1 { stdenv, fetchFromGitHub, blas, lapack, gfortran, fixDarwinDylibNames }: 2 2 3 - assert (!blas.is64bit) && (!lapack.is64bit); 3 + assert (!blas.isILP64) && (!lapack.isILP64); 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "scs";
+1 -1
pkgs/development/libraries/science/math/suitesparse/4.2.nix
··· 1 1 { stdenv, fetchurl, gfortran, blas, lapack }: 2 2 3 3 let 4 - int_t = if blas.is64bit then "int64_t" else "int32_t"; 4 + int_t = if blas.isILP64 then "int64_t" else "int32_t"; 5 5 in 6 6 stdenv.mkDerivation rec { 7 7 version = "4.2.1";
+1 -1
pkgs/development/libraries/science/math/suitesparse/4.4.nix
··· 6 6 version = "4.4.4"; 7 7 name = "suitesparse-${version}"; 8 8 9 - int_t = if blas.is64bit then "int64_t" else "int32_t"; 9 + int_t = if blas.isILP64 then "int64_t" else "int32_t"; 10 10 SHLIB_EXT = stdenv.hostPlatform.extensions.sharedLibrary; 11 11 in 12 12 stdenv.mkDerivation {
+1 -1
pkgs/development/libraries/science/math/suitesparse/default.nix
··· 44 44 "BLAS=-lblas" 45 45 "LAPACK=-llapack" 46 46 "MY_METIS_LIB=-lmetis" 47 - ] ++ stdenv.lib.optionals blas.is64bit [ 47 + ] ++ stdenv.lib.optionals blas.isILP64 [ 48 48 "CFLAGS=-DBLAS64" 49 49 ] ++ stdenv.lib.optionals enableCuda [ 50 50 "CUDA_PATH=${cudatoolkit}"
+1 -1
pkgs/development/libraries/science/math/superlu/default.nix
··· 1 1 { stdenv, fetchurl, cmake, 2 2 gfortran, blas, lapack}: 3 3 4 - assert (!blas.is64bit) && (!lapack.is64bit); 4 + assert (!blas.isILP64) && (!lapack.isILP64); 5 5 6 6 stdenv.mkDerivation rec { 7 7 version = "5.2.1";
+1 -1
pkgs/development/libraries/sundials/2.x.nix
··· 8 8 , gfortran 9 9 , lapackSupport ? true }: 10 10 11 - assert (!blas.is64bit) && (!lapack.is64bit); 11 + assert (!blas.isILP64) && (!lapack.isILP64); 12 12 13 13 stdenv.mkDerivation rec { 14 14 pname = "sundials";
+1 -1
pkgs/development/libraries/sundials/default.nix
··· 7 7 , gfortran 8 8 , lapackSupport ? true }: 9 9 10 - assert (!blas.is64bit) && (!lapack.is64bit); 10 + assert (!blas.isILP64) && (!lapack.isILP64); 11 11 12 12 stdenv.mkDerivation rec { 13 13 pname = "sundials";
+11 -34
pkgs/development/ocaml-modules/alcotest/default.nix
··· 1 - { stdenv, fetchzip, ocaml, findlib, ocamlbuild, topkg, dune 2 - , cmdliner, astring, fmt, result, uuidm 1 + { lib, buildDunePackage, fetchurl 2 + , astring, cmdliner, fmt, uuidm, re, stdlib-shims 3 3 }: 4 4 5 - let param = 6 - if stdenv.lib.versionAtLeast ocaml.version "4.02" then { 7 - version = "0.8.5"; 8 - sha256 = "1mhckvdcxkikbzgvy24kjz4265l15b86a6swz7m3ynbgvqdcfzqn"; 9 - nativeBuildInputs = [ dune ]; 10 - propagatedBuildInputs = [ uuidm ]; 11 - buildPhase = "dune build -p alcotest"; 12 - inherit (dune) installPhase; 13 - } else { 14 - version = "0.7.2"; 15 - sha256 = "1qgsz2zz5ky6s5pf3j3shc4fjc36rqnjflk8x0wl1fcpvvkr52md"; 16 - buildInputs = [ topkg ]; 17 - nativeBuildInputs = [ ocamlbuild ]; 18 - inherit (topkg) buildPhase installPhase; 19 - }; 20 - in 5 + buildDunePackage rec { 6 + pname = "alcotest"; 7 + version = "1.0.1"; 21 8 22 - stdenv.mkDerivation rec { 23 - name = "ocaml${ocaml.version}-alcotest-${version}"; 24 - inherit (param) version buildPhase installPhase; 25 - 26 - src = fetchzip { 27 - url = "https://github.com/mirage/alcotest/archive/${version}.tar.gz"; 28 - inherit (param) sha256; 9 + src = fetchurl { 10 + url = "https://github.com/mirage/alcotest/releases/download/${version}/alcotest-${version}.tbz"; 11 + sha256 = "1xlklxb83gamqbg8j5dzm5jk4mvcwkspxajh93p6vpw9ia1li1qc"; 29 12 }; 30 13 31 - nativeBuildInputs = [ ocaml findlib ] ++ (param.nativeBuildInputs or []); 32 - buildInputs = [ findlib ] ++ (param.buildInputs or []); 33 - 34 - propagatedBuildInputs = [ cmdliner astring fmt result ] 35 - ++ (param.propagatedBuildInputs or []); 14 + propagatedBuildInputs = [ astring cmdliner fmt uuidm re stdlib-shims ]; 36 15 37 - createFindlibDestdir = true; 38 - 39 - meta = with stdenv.lib; { 16 + meta = with lib; { 40 17 homepage = "https://github.com/mirage/alcotest"; 41 18 description = "A lightweight and colourful test framework"; 42 - license = stdenv.lib.licenses.isc; 19 + license = licenses.isc; 43 20 maintainers = [ maintainers.ericbmerritt ]; 44 21 }; 45 22 }
+5 -5
pkgs/development/ocaml-modules/angstrom/default.nix
··· 1 - { stdenv, fetchFromGitHub, buildDunePackage, alcotest, result, bigstringaf }: 1 + { lib, fetchFromGitHub, buildDunePackage, ocaml, alcotest, result, bigstringaf }: 2 2 3 3 buildDunePackage rec { 4 4 pname = "angstrom"; ··· 13 13 sha256 = "0w0wavqzdy2hrh7cjyl9w72ad4vndhwhknwvyacvkwkja5wys5b2"; 14 14 }; 15 15 16 - buildInputs = [ alcotest ]; 16 + checkInputs = [ alcotest ]; 17 17 propagatedBuildInputs = [ bigstringaf result ]; 18 - doCheck = true; 18 + doCheck = lib.versionAtLeast ocaml.version "4.05"; 19 19 20 20 meta = { 21 21 homepage = "https://github.com/inhabitedtype/angstrom"; 22 22 description = "OCaml parser combinators built for speed and memory efficiency"; 23 - license = stdenv.lib.licenses.bsd3; 24 - maintainers = with stdenv.lib.maintainers; [ sternenseemann ]; 23 + license = lib.licenses.bsd3; 24 + maintainers = with lib.maintainers; [ sternenseemann ]; 25 25 }; 26 26 }
+10 -3
pkgs/development/ocaml-modules/base64/default.nix
··· 1 - { lib, fetchzip, buildDunePackage, alcotest, bos }: 1 + { lib, fetchpatch, fetchzip, buildDunePackage, alcotest, bos }: 2 2 3 3 let version = "3.2.0"; in 4 4 5 - buildDunePackage { 5 + buildDunePackage rec { 6 6 pname = "base64"; 7 7 inherit version; 8 8 ··· 13 13 14 14 minimumOCamlVersion = "4.03"; 15 15 16 - buildInputs = [ alcotest bos ]; 16 + buildInputs = [ bos ]; 17 + 18 + # Fix test-suite for alcotest ≥ 1.0 19 + patches = [(fetchpatch { 20 + url = "https://github.com/mirage/ocaml-base64/commit/8d334d02aa52875158fae3e2fb8fe0a5596598d0.patch"; 21 + sha256 = "0lvqdp98qavpzis1wgwh3ijajq79hq47898gsrk37fpyjbrdzf5q"; 22 + })]; 17 23 18 24 doCheck = true; 25 + checkInputs = [ alcotest ]; 19 26 20 27 meta = { 21 28 homepage = "https://github.com/mirage/ocaml-base64";
+3 -3
pkgs/development/ocaml-modules/bigstringaf/default.nix
··· 1 - { lib, fetchFromGitHub, buildDunePackage, alcotest, bigarray-compat }: 1 + { lib, fetchFromGitHub, buildDunePackage, ocaml, alcotest, bigarray-compat }: 2 2 3 3 buildDunePackage rec { 4 4 pname = "bigstringaf"; ··· 13 13 sha256 = "04b088vrqzmxsyan9f9nr8721bxip4b930cgvb5zkbbmrw3ylmwc"; 14 14 }; 15 15 16 - buildInputs = [ alcotest ]; 16 + checkInputs = [ alcotest ]; 17 17 propagatedBuildInputs = [ bigarray-compat ]; 18 - doCheck = true; 18 + doCheck = lib.versionAtLeast ocaml.version "4.05"; 19 19 20 20 meta = { 21 21 description = "Bigstring intrinsics and fast blits based on memcpy/memmove";
+1 -2
pkgs/development/ocaml-modules/cstruct/ppx.nix
··· 10 10 11 11 minimumOCamlVersion = "4.03"; 12 12 13 - buildInputs = [ sexplib ppx_tools_versioned ]; 14 - propagatedBuildInputs = [ cstruct ]; 13 + propagatedBuildInputs = [ cstruct ppx_tools_versioned sexplib ]; 15 14 }
+7 -1
pkgs/development/ocaml-modules/digestif/default.nix
··· 1 - { lib, fetchurl, buildDunePackage 1 + { lib, fetchurl, fetchpatch, buildDunePackage 2 2 , bigarray-compat, eqaf, stdlib-shims 3 3 , alcotest 4 4 }: ··· 11 11 url = "https://github.com/mirage/digestif/releases/download/v${version}/digestif-v${version}.tbz"; 12 12 sha256 = "09g4zngqiw97cljv8ds4m063wcxz3y7c7vzaprsbpjzi0ja5jdcy"; 13 13 }; 14 + 15 + # Fix tests with alcotest ≥ 1 16 + patches = [ (fetchpatch { 17 + url = "https://github.com/mirage/digestif/commit/b65d996c692d75da0a81323253429e07d14b72b6.patch"; 18 + sha256 = "0sf7qglcp19dhs65pwrrc7d9v57icf18jsrhpmvwskx8b4dchfiv"; 19 + })]; 14 20 15 21 buildInputs = lib.optional doCheck alcotest; 16 22 propagatedBuildInputs = [ bigarray-compat eqaf stdlib-shims ];
+1 -1
pkgs/development/ocaml-modules/lacaml/default.nix
··· 1 1 { stdenv, fetchFromGitHub, darwin, ocaml, findlib, dune, base, stdio, lapack, blas }: 2 2 3 3 assert stdenv.lib.versionAtLeast (stdenv.lib.getVersion ocaml) "4.05.0"; 4 - assert (!blas.is64bit) && (!lapack.is64bit); 4 + assert (!blas.isILP64) && (!lapack.isILP64); 5 5 6 6 stdenv.mkDerivation rec { 7 7 pname = "ocaml${ocaml.version}-lacaml";
+13 -9
pkgs/development/ocaml-modules/otr/default.nix
··· 1 - { lib, fetchFromGitHub, buildDunePackage 2 - , cstruct, sexplib0, rresult, nocrypto, astring 1 + { lib, fetchurl, buildDunePackage 2 + , cstruct, sexplib0, rresult, mirage-crypto, mirage-crypto-pk, astring, base64 3 + , mirage-crypto-rng 3 4 }: 4 5 5 6 buildDunePackage rec { 6 7 pname = "otr"; 7 - version = "0.3.6"; 8 + version = "0.3.8"; 8 9 9 - src = fetchFromGitHub { 10 - owner = "hannesm"; 11 - repo = "ocaml-otr"; 12 - rev = version; 13 - sha256 = "0iz6p85a0jxng9aq9blqsky173zaqfr6wlc5j48ad55lgwzlbih5"; 10 + src = fetchurl { 11 + url = "https://github.com/hannesm/ocaml-otr/releases/download/v${version}/otr-v${version}.tbz"; 12 + sha256 = "18hn9l8wznqnlh2jf1hpnp36f1cx80ncwiiivsbj34llhgp3893d"; 14 13 }; 15 14 16 - propagatedBuildInputs = [ cstruct sexplib0 rresult nocrypto astring ]; 15 + useDune2 = true; 16 + 17 + propagatedBuildInputs = [ cstruct sexplib0 mirage-crypto mirage-crypto-pk 18 + astring rresult base64 ]; 17 19 18 20 doCheck = true; 21 + checkInputs = [ mirage-crypto-rng ]; 22 + 19 23 meta = with lib; { 20 24 homepage = "https://github.com/hannesm/ocaml-otr"; 21 25 description = "Off-the-record messaging protocol, purely in OCaml";
+1 -1
pkgs/development/ocaml-modules/owl/default.nix
··· 11 11 , npy 12 12 }: 13 13 14 - assert (!blas.is64bit) && (!lapack.is64bit); 14 + assert (!blas.isILP64) && (!lapack.isILP64); 15 15 assert blas.implementation == "openblas" && lapack.implementation == "openblas"; 16 16 17 17 buildDunePackage rec {
+16 -28
pkgs/development/ocaml-modules/tls/default.nix
··· 1 - { stdenv, fetchFromGitHub, ocaml, findlib, ocamlbuild, topkg 2 - , ppx_sexp_conv, result, x509, nocrypto, cstruct-sexp, ppx_cstruct, cstruct-unix, ounit 3 - , lwt ? null}: 1 + { stdenv, fetchurl, buildDunePackage, ppx_sexp_conv, ppx_cstruct, cstruct 2 + , cstruct-sexp, sexplib, mirage-crypto, mirage-crypto-pk, mirage-crypto-rng 3 + , x509, domain-name, fmt, cstruct-unix, ounit2, ocaml_lwt, ptime }: 4 4 5 - with stdenv.lib; 6 - 7 - let withLwt = lwt != null; in 8 - 9 - if !versionAtLeast ocaml.version "4.04" 10 - then throw "tls is not available for OCaml ${ocaml.version}" 11 - else 5 + buildDunePackage rec { 6 + minimumOCamlVersion = "4.07"; 12 7 13 - stdenv.mkDerivation rec { 14 - version = "0.10.4"; 15 - name = "ocaml${ocaml.version}-tls-${version}"; 8 + version = "0.11.1"; 9 + pname = "tls"; 16 10 17 - src = fetchFromGitHub { 18 - owner = "mirleft"; 19 - repo = "ocaml-tls"; 20 - rev = version; 21 - sha256 = "02wv4lia583imn3sfci4nqv6ac5nzig5j3yfdnlqa0q8bp9rfc6g"; 11 + src = fetchurl { 12 + url = "https://github.com/mirleft/ocaml-tls/releases/download/v${version}/tls-v${version}.tbz"; 13 + sha256 = "0ms13fbaxgmpbviazlfa4hb7nmi7s22nklc7ns926b0rr1aq1069"; 22 14 }; 23 15 24 - nativeBuildInputs = [ ocaml ocamlbuild findlib ]; 25 - buildInputs = [ findlib topkg ppx_sexp_conv ppx_cstruct ] 26 - ++ optionals doCheck [ ounit cstruct-unix ]; 27 - propagatedBuildInputs = [ cstruct-sexp nocrypto result x509 ] ++ 28 - optional withLwt lwt; 16 + useDune2 = true; 29 17 30 - buildPhase = "${topkg.run} build --tests ${boolToString doCheck} --with-mirage false --with-lwt ${boolToString withLwt}"; 18 + doCheck = true; 19 + buildInputs = [ cstruct-unix ounit2 ]; 31 20 32 - doCheck = versionAtLeast ocaml.version "4.06"; 33 - checkPhase = "${topkg.run} test"; 34 - 35 - inherit (topkg) installPhase; 21 + propagatedBuildInputs = [ ppx_sexp_conv ppx_cstruct cstruct cstruct-sexp 22 + sexplib mirage-crypto mirage-crypto-pk mirage-crypto-rng 23 + x509 domain-name fmt ocaml_lwt ptime ]; 36 24 37 25 meta = with stdenv.lib; { 38 26 homepage = "https://github.com/mirleft/ocaml-tls";
+12 -7
pkgs/development/ocaml-modules/x509/default.nix
··· 1 - { lib, fetchurl, buildDunePackage, ocaml 1 + { lib, fetchurl, buildDunePackage 2 2 , alcotest, cstruct-unix 3 - , asn1-combinators, domain-name, fmt, gmap, nocrypto, rresult 3 + , asn1-combinators, domain-name, fmt, gmap, rresult, mirage-crypto, mirage-crypto-pk 4 + , logs, base64 4 5 }: 5 6 6 7 buildDunePackage rec { 8 + minimumOCamlVersion = "4.07"; 9 + 7 10 pname = "x509"; 8 - version = "0.7.1"; 11 + version = "0.11.0"; 9 12 10 13 src = fetchurl { 11 14 url = "https://github.com/mirleft/ocaml-x509/releases/download/v${version}/x509-v${version}.tbz"; 12 - sha256 = "0hnklgdm1fwwqi0nfvpdbp7ddqvrh9h8697mr99bxqdfhg6sxh1w"; 15 + sha256 = "0gcs3vpmixxxx2q4b2iphb1xw1jffya1wkp0p1xbmsfcghzrj20m"; 13 16 }; 14 17 15 - buildInputs = lib.optionals doCheck [ alcotest cstruct-unix ]; 16 - propagatedBuildInputs = [ asn1-combinators domain-name fmt gmap nocrypto rresult ]; 18 + useDune2 = true; 19 + 20 + buildInputs = [ alcotest cstruct-unix ]; 21 + propagatedBuildInputs = [ asn1-combinators domain-name fmt gmap mirage-crypto mirage-crypto-pk rresult logs base64 ]; 17 22 18 - doCheck = lib.versionAtLeast ocaml.version "4.06"; 23 + doCheck = true; 19 24 20 25 meta = with lib; { 21 26 homepage = "https://github.com/mirleft/ocaml-x509";
+1 -1
pkgs/development/python-modules/cvxopt/default.nix
··· 14 14 , withFftw ? true 15 15 }: 16 16 17 - assert (!blas.is64bit) && (!lapack.is64bit); 17 + assert (!blas.isILP64) && (!lapack.isILP64); 18 18 19 19 buildPythonPackage rec { 20 20 pname = "cvxopt";
+3 -5
pkgs/development/python-modules/numpy/default.nix
··· 12 12 , setuptoolsBuildHook 13 13 }: 14 14 15 - assert (!blas.is64bit) && (!lapack.is64bit); 15 + assert (!blas.isILP64) && (!lapack.isILP64); 16 16 17 17 let 18 18 cfg = writeTextFile { 19 19 name = "site.cfg"; 20 20 text = (lib.generators.toINI {} { 21 21 ${blas.implementation} = { 22 - include_dirs = "${blas}/include:${lapack}/include"; 22 + include_dirs = "${lib.getDev blas}/include:${lib.getDev lapack}/include"; 23 23 library_dirs = "${blas}/lib:${lapack}/lib"; 24 - } // lib.optionalAttrs (blas.implementation == "mkl") { 25 - mkl_libs = "mkl_rt"; 26 - lapack_libs = ""; 24 + libraries = "lapack,lapacke,blas,cblas"; 27 25 }; 28 26 }); 29 27 };
+2 -2
pkgs/development/tools/clj-kondo/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec{ 4 4 pname = "clj-kondo"; 5 - version = "2020.03.20"; 5 + version = "2020.04.05"; 6 6 7 7 reflectionJson = fetchurl { 8 8 name = "reflection.json"; ··· 12 12 13 13 src = fetchurl { 14 14 url = "https://github.com/borkdude/${pname}/releases/download/v${version}/${pname}-${version}-standalone.jar"; 15 - sha256 = "05z80cdzk8aw3j0nxfynzwpb9hhpbl54bbrv18dpqj5dj893mbgm"; 15 + sha256 = "0k9samcqkpkdgzbzr2bpixf75987lsabh97101v1fg12qvjhf187"; 16 16 }; 17 17 18 18 dontUnpack = true;
+2 -2
pkgs/development/tools/metals/default.nix
··· 2 2 3 3 let 4 4 baseName = "metals"; 5 - version = "0.8.3"; 5 + version = "0.8.4"; 6 6 deps = stdenv.mkDerivation { 7 7 name = "${baseName}-deps-${version}"; 8 8 buildCommand = '' ··· 15 15 ''; 16 16 outputHashMode = "recursive"; 17 17 outputHashAlgo = "sha256"; 18 - outputHash = "1l196glr7rbsvrqmq6i7iw532jkz8d1w5m9nh0kh5z12visc7bkk"; 18 + outputHash = "1r8aff082m3kh6wy5diyvq8bzg5x4dp1da9sfz223ii0kc1yp6w5"; 19 19 }; 20 20 in 21 21 stdenv.mkDerivation rec {
+2 -2
pkgs/development/tools/ocaml/ocamlformat/default.nix
··· 2 2 3 3 with ocamlPackages; buildDunePackage rec { 4 4 pname = "ocamlformat"; 5 - version = "0.14.0"; 5 + version = "0.14.1"; 6 6 7 7 minimumOCamlVersion = "4.06"; 8 8 ··· 10 10 11 11 src = fetchurl { 12 12 url = "https://github.com/ocaml-ppx/ocamlformat/releases/download/${version}/ocamlformat-${version}.tbz"; 13 - sha256 = "070c0x6z5y0lyls56zm34g8lyc093wkr0jfp50dvrkr9fk1sx2wi"; 13 + sha256 = "03wn46xib63748157xchj7gflkw5000fcjw6n89h9g82q9slazaa"; 14 14 }; 15 15 16 16 buildInputs = [
+5 -5
pkgs/development/tools/ocaml/opam/default.nix
··· 55 55 sha256 = "02lb2d9i12bxrz2ba5wygk2bycan316skqlyri0597q7j9210g8r"; 56 56 }; 57 57 opam = fetchurl { 58 - url = "https://github.com/ocaml/opam/archive/2.0.6.zip"; 59 - sha256 = "076070qwf7rqp5bh0mmgc5b3vyihgp4qpkd6fscxzya4in66bzf8"; 58 + url = "https://github.com/ocaml/opam/archive/2.0.7.zip"; 59 + sha256 = "03yxj4hw9p5dh34b1yzl3xd0l1v2l2az0n7ix453yjrkn0wn0xic"; 60 60 }; 61 61 }; 62 62 in stdenv.mkDerivation { 63 63 pname = "opam"; 64 - version = "2.0.6"; 64 + version = "2.0.7"; 65 65 66 66 buildInputs = [ unzip curl ncurses ocaml makeWrapper getconf ] ++ lib.optional stdenv.isLinux bubblewrap; 67 67 ··· 113 113 meta = with stdenv.lib; { 114 114 description = "A package manager for OCaml"; 115 115 homepage = "https://opam.ocaml.org/"; 116 - maintainers = [ maintainers.henrytill ]; 116 + maintainers = [ maintainers.henrytill maintainers.marsam ]; 117 117 platforms = platforms.all; 118 118 }; 119 119 } 120 - # Generated by: ./opam.nix.pl -v 2.0.6 -p opam-shebangs.patch 120 + # Generated by: ./opam.nix.pl -v 2.0.7 -p opam-shebangs.patch
+1 -1
pkgs/development/tools/ocaml/opam/opam.nix.pl
··· 123 123 meta = with stdenv.lib; { 124 124 description = "A package manager for OCaml"; 125 125 homepage = "https://opam.ocaml.org/"; 126 - maintainers = [ maintainers.henrytill ]; 126 + maintainers = [ maintainers.henrytill maintainers.marsam ]; 127 127 platforms = platforms.all; 128 128 }; 129 129 }
+7 -11
pkgs/development/tools/rust/cargo-expand/default.nix
··· 1 - { stdenv, rustPlatform, fetchFromGitHub, llvmPackages, darwin }: 1 + { lib, rustPlatform, fetchFromGitHub }: 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "cargo-expand"; 5 - version = "0.4.19"; 5 + version = "0.5.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "dtolnay"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "15izqd6nbpxjjymdmcpzjmaiygs1vdrpg9cw1nzmrkb8fc4h5ch5"; 11 + sha256 = "1zpnhigsa0cyr3lj0h7z2xhi01zjrnakvvrgmqz4lyf5gabh9vcg"; 12 12 }; 13 13 14 - cargoSha256 = "0sbpymxhhwxg13w9821b17nda6p3ycqr81i7bj4fxil0n3sb910h"; 15 - 16 - buildInputs = [ llvmPackages.libclang ] 17 - ++ stdenv.lib.optional stdenv.isDarwin darwin.apple_sdk.frameworks.Security; 14 + cargoSha256 = "1rdh1b240gcjbk3wc384x459lbp8dy9a9mgrampqjk1n115zgbzp"; 18 15 19 - LIBCLANG_PATH = "${llvmPackages.libclang}/lib"; 20 - 21 - meta = with stdenv.lib; { 22 - description = "A utility and Cargo subcommand designed to let people expand macros in their Rust source code"; 16 + meta = with lib; { 17 + description = 18 + "A utility and Cargo subcommand designed to let people expand macros in their Rust source code"; 23 19 homepage = "https://github.com/dtolnay/cargo-expand"; 24 20 license = with licenses; [ mit asl20 ]; 25 21 platforms = platforms.all;
+7 -8
pkgs/games/openrct2/default.nix
··· 4 4 }: 5 5 6 6 let 7 - name = "openrct2-${version}"; 8 - version = "0.2.4"; 7 + version = "0.2.6"; 9 8 10 9 openrct2-src = fetchFromGitHub { 11 10 owner = "OpenRCT2"; 12 11 repo = "OpenRCT2"; 13 12 rev = "v${version}"; 14 - sha256 = "1rlw3w20llg36sj3bk50g661qw766ng8ma3p42sdkj8br9dw800h"; 13 + sha256 = "1vikbkg3wh5ngzdfilb6irbh6nqinf138qpdz8wz9izlvl8s36k4"; 15 14 }; 16 15 17 16 objects-src = fetchFromGitHub { 18 17 owner = "OpenRCT2"; 19 18 repo = "objects"; 20 - rev = "v1.0.12"; 21 - sha256 = "0vfhyldc8nfvkg4d9kry669haxz2165walbxzgza7pqpnd7aqgrf"; 19 + rev = "v1.0.14"; 20 + sha256 = "1bqbia5y73v4r0sv5cvi5729jh2ns7cxn557blh715yxswk91590"; 22 21 }; 23 22 24 23 title-sequences-src = fetchFromGitHub { ··· 29 28 }; 30 29 in 31 30 stdenv.mkDerivation { 32 - inherit name; 31 + inherit version; 32 + pname = "openrct2"; 33 33 34 34 src = openrct2-src; 35 35 ··· 61 61 ''; 62 62 63 63 cmakeFlags = [ 64 - "-DCMAKE_BUILD_TYPE=RELWITHDEBINFO" 65 64 "-DDOWNLOAD_OBJECTS=OFF" 66 65 "-DDOWNLOAD_TITLE_SEQUENCES=OFF" 67 66 ]; 68 67 69 - makeFlags = ["all" "g2"]; 68 + enableParallelBuilding = true; 70 69 71 70 preFixup = "ln -s $out/share/openrct2 $out/bin/data"; 72 71
+4 -4
pkgs/servers/mautrix-whatsapp/default.nix
··· 2 2 3 3 buildGoModule { 4 4 pname = "mautrix-whatsapp-unstable"; 5 - version = "2020-04-12"; 5 + version = "2020-04-21"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "tulir"; 9 9 repo = "mautrix-whatsapp"; 10 - rev = "44bb623e7a7486a0cdd13fd67b2aaca2ddba20ce"; 11 - sha256 = "1fwxn6511pq9fdc8d2jp4vgkm1zag55pig75qdxfn63hl3i2607k"; 10 + rev = "53fe1b18184fc0967658805abc8560641f8d2cb0"; 11 + sha256 = "0rahj9v7cgvk4w3m41jbs8vnya37dhq5wxyhyg74kwrv8a2nqxra"; 12 12 }; 13 13 14 - modSha256 = "04pdap1q7zsa1wv2h0j9104fawn95g37yqslmp2mq7722hiqhp9x"; 14 + modSha256 = "0jn88a4hagwfkw9bv8cg12ywsg35znmfkmhi1v7k2qpj5qzi81w6"; 15 15 16 16 meta = with stdenv.lib; { 17 17 homepage = "https://github.com/tulir/mautrix-whatsapp";
+4 -2
pkgs/servers/nosql/mongodb/mongodb.nix
··· 6 6 7 7 with stdenv.lib; 8 8 9 - { version, sha256, patches ? [] }@args: 9 + { version, sha256, patches ? [] 10 + , license ? stdenv.lib.licenses.sspl 11 + }@args: 10 12 11 13 let 12 14 python = python27.withPackages (ps: with ps; [ pyyaml typing cheetah ]); ··· 109 111 meta = { 110 112 description = "A scalable, high-performance, open source NoSQL database"; 111 113 homepage = "http://www.mongodb.org"; 112 - license = licenses.sspl; 114 + inherit license; 113 115 114 116 maintainers = with maintainers; [ bluescreen303 offline cstrahan ]; 115 117 platforms = subtractLists systems.doubles.i686 systems.doubles.unix;
+1
pkgs/servers/nosql/mongodb/v3_4.nix
··· 12 12 version = "3.4.24"; 13 13 sha256 = "0j6mvgv0jnsnvgkl8505bl88kbxkba66qijlpi1la0dd5pd1imfr"; 14 14 patches = [ ./forget-build-dependencies-3-4.patch ]; 15 + license = stdenv.lib.licenses.agpl3; 15 16 }
+6 -4
pkgs/servers/tailscale/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "tailscale"; 5 - version = "0.97"; 5 + version = "0.97-219"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "tailscale"; 9 9 repo = "tailscale"; 10 - rev = "v${version}"; 11 - sha256 = "0ckjqhj99c25h8xgyfkrd19nw5w4a7972nvba9r5faw5micjs02n"; 10 + # Tailscale uses "git describe" as version numbers. v0.97-219 11 + # means "tag v0.97 plus 219 commits", which is what this rev is. 12 + rev = "afbfe4f217a2a202f0eefe943c7c1ef648311339"; 13 + sha256 = "1an897ys3gycdmclqd0yqs9f7q88zxqxyc6r0gcgs4678svxhb68"; 12 14 }; 13 15 14 16 nativeBuildInputs = [ makeWrapper ]; ··· 16 18 CGO_ENABLED = 0; 17 19 18 20 goPackagePath = "tailscale.com"; 19 - modSha256 = "0anpakcqz4irwxnm0iwm7wqzh84kv3yxxdvyr38154pbd0ys5pa2"; 21 + modSha256 = "1xgdhbck3pkix10lfshzdszrv6d3p0hbx8jdjvswz7jjd0vzm4x1"; 20 22 subPackages = [ "cmd/tailscale" "cmd/tailscaled" ]; 21 23 22 24 postInstall = ''
+3 -3
pkgs/tools/misc/chezmoi/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "chezmoi"; 5 - version = "1.7.18"; 5 + version = "1.8.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "twpayne"; 9 9 repo = "chezmoi"; 10 10 rev = "v${version}"; 11 - sha256 = "12gx78cbs7abizlqhs7y2w6lwlk5d1hhvixj0ki8d1d5vdr747bc"; 11 + sha256 = "1ww8xcf57csazj3q2569irxg5il29jrx43mq5cif8dvn8xjm00nn"; 12 12 }; 13 13 14 - modSha256 = "15b3hik3nzb7xnd6806dqdb36v7z2a0wmvxbrfwvnbigd8zd2y0j"; 14 + modSha256 = "1zmvav19nyqv6yp71mk3lx6szc5vwyf81m8kvcjj9rlzlygmcl8g"; 15 15 16 16 buildFlagsArray = [ 17 17 "-ldflags=-s -w -X main.version=${version} -X main.builtBy=nixpkgs"
+1 -1
pkgs/tools/misc/hpl/default.nix
··· 1 1 { stdenv, fetchurl, blas, lapack, mpi } : 2 2 3 - assert (!blas.is64bit) && (!lapack.is64bit); 3 + assert (!blas.isILP64) && (!lapack.isILP64); 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "hpl";
+2 -2
pkgs/tools/misc/ili2c/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "ili2c"; 5 - version = "5.0.0"; 5 + version = "5.0.8"; 6 6 7 7 nativeBuildInputs = [ ant jdk makeWrapper ]; 8 8 ··· 10 10 owner = "claeis"; 11 11 repo = pname; 12 12 rev = "${pname}-${version}"; 13 - sha256 = "0xps2343d5gdr2aj8j3l4cjq4k9zbxxlhnp8sjlhxh1wdczxlwx6"; 13 + sha256 = "1yhsyh940kb33y2n6xl7zhf0f6q0nrxbyg6c4g5n2imllpn54sgi"; 14 14 }; 15 15 16 16 buildPhase = "ant jar";
+12 -8
pkgs/tools/networking/ferm/default.nix
··· 3 3 let 4 4 inherit (stdenv.lib.versions) majorMinor; 5 5 in stdenv.mkDerivation rec { 6 - version = "2.5"; 6 + version = "2.5.1"; 7 7 pname = "ferm"; 8 8 9 9 src = fetchurl { 10 10 url = "http://ferm.foo-projects.org/download/${majorMinor version}/ferm-${version}.tar.xz"; 11 - sha256 = "0lxqcpirphihpvdqrh5kq0621aqq0h2vdy9q2v85gqdhd52js20p"; 11 + sha256 = "0awl9s243sxgayr2fcmfks8xydhrmb9gy8bd9sfq738dgq7vybjb"; 12 12 }; 13 13 14 - buildInputs = [ perl ipset ebtables iptables makeWrapper ]; 15 - preConfigure = '' 16 - substituteInPlace config.mk --replace "PERL = /usr/bin/perl" "PERL = ${perl}/bin/perl" 17 - substituteInPlace config.mk --replace "PREFIX = /usr" "PREFIX = $out" 18 - ''; 14 + # perl is used at build time to gather the ferm version. 15 + nativeBuildInputs = [ makeWrapper perl ]; 16 + buildInputs = [ perl ]; 17 + 18 + makeFlags = [ 19 + "PERL=perl" 20 + "PREFIX=${placeholder "out"}" 21 + ]; 22 + 19 23 postInstall = '' 20 24 rm -r $out/lib/systemd 21 25 for i in "$out/sbin/"*; do 22 - wrapProgram "$i" --prefix PATH : "${iptables}/bin:${ipset}/bin:${ebtables}/bin" 26 + wrapProgram "$i" --prefix PATH : "${stdenv.lib.makeBinPath [ iptables ipset ebtables ]}" 23 27 done 24 28 ''; 25 29
+1 -3
pkgs/tools/networking/mu/default.nix
··· 22 22 23 23 enableParallelBuilding = true; 24 24 25 - preConfigure = "./autogen.sh"; 26 - 27 25 preBuild = '' 28 26 # Fix mu4e-builddir (set it to $out) 29 27 substituteInPlace mu4e/mu4e-meta.el.in \ ··· 43 41 description = "A collection of utilties for indexing and searching Maildirs"; 44 42 license = licenses.gpl3Plus; 45 43 homepage = "https://www.djcbsoftware.nl/code/mu/"; 46 - platforms = platforms.mesaPlatforms; 47 44 maintainers = with maintainers; [ antono the-kenny peterhoeg ]; 45 + platforms = platforms.mesaPlatforms; 48 46 }; 49 47 }
+28
pkgs/tools/text/gjo/default.nix
··· 1 + { stdenv 2 + , buildGoModule 3 + , fetchFromGitHub 4 + }: 5 + 6 + buildGoModule rec { 7 + pname = "gjo"; 8 + version = "1.0.2"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "skanehira"; 12 + repo = "gjo"; 13 + rev = version; 14 + sha256 = "1m5nkv42ri150fgj590nrl24wp90p7ygg9xdh9zblibmnqrvbz4z"; 15 + }; 16 + 17 + doCheck = true; 18 + 19 + modSha256 = "0sjjj9z1dhilhpc8pq4154czrb79z9cm044jvn75kxcjv6v5l2m5"; 20 + 21 + meta = with stdenv.lib; { 22 + description = "Small utility to create JSON objects"; 23 + homepage = "https://github.com/skanehira/gjo"; 24 + license = licenses.mit; 25 + maintainers = with maintainers; [ doronbehar ]; 26 + }; 27 + } 28 +
+3 -3
pkgs/tools/text/transifex-client/default.nix
··· 3 3 4 4 buildPythonApplication rec { 5 5 pname = "transifex-client"; 6 - version = "0.13.6"; 6 + version = "0.13.9"; 7 7 8 8 propagatedBuildInputs = [ 9 9 urllib3 requests python-slugify six setuptools ··· 11 11 12 12 src = fetchPypi { 13 13 inherit pname version; 14 - sha256 = "0y6pprlmkmi7wfqr3k70sb913qa70p3i90q5mravrai7cr32y1w8"; 14 + sha256 = "0lgd77vrddvyn8afkxr7a7hblmp4k5sr0i9i1032xdih2bipdd9f"; 15 15 }; 16 16 17 17 prePatch = '' 18 18 substituteInPlace requirements.txt --replace "urllib3<1.24" "urllib3>=1.24" \ 19 19 --replace "six==1.11.0" "six>=1.11.0" \ 20 - --replace "python-slugify==1.2.6" "python-slugify>=1.2.6" 20 + --replace "python-slugify<2.0.0" "python-slugify>2.0.0" 21 21 ''; 22 22 23 23 # Requires external resources
+3
pkgs/top-level/all-packages.nix
··· 948 948 949 949 gjs = callPackage ../development/libraries/gjs { }; 950 950 951 + gjo = callPackage ../tools/text/gjo { }; 952 + 951 953 glances = python3Packages.callPackage ../applications/system/glances { }; 952 954 953 955 glasgow = with python3Packages; toPythonApplication glasgow; ··· 2470 2472 circus = callPackage ../tools/networking/circus { }; 2471 2473 2472 2474 citrix_workspace_unwrapped = callPackage ../applications/networking/remote/citrix-workspace { }; 2475 + citrix_workspace_unwrapped_20_04_0 = citrix_workspace_unwrapped.override { version = "20.04.0"; }; 2473 2476 citrix_workspace_unwrapped_19_12_0 = citrix_workspace_unwrapped.override { version = "19.12.0"; }; 2474 2477 citrix_workspace_unwrapped_19_10_0 = citrix_workspace_unwrapped.override { version = "19.10.0"; }; 2475 2478 citrix_workspace_unwrapped_19_8_0 = citrix_workspace_unwrapped.override { version = "19.8.0"; };
+1 -3
pkgs/top-level/ocaml-packages.nix
··· 767 767 768 768 textutils_p4 = callPackage ../development/ocaml-modules/textutils { }; 769 769 770 - tls = callPackage ../development/ocaml-modules/tls { 771 - lwt = ocaml_lwt; 772 - }; 770 + tls = callPackage ../development/ocaml-modules/tls { }; 773 771 774 772 type_conv_108_08_00 = callPackage ../development/ocaml-modules/type_conv/108.08.00.nix { }; 775 773 type_conv_109_60_01 = callPackage ../development/ocaml-modules/type_conv/109.60.01.nix { };
+3 -3
pkgs/top-level/release-alternatives.nix
··· 59 59 { 60 60 blas = mapListToAttrs supportedSystems (system': let system = lib.systems.elaborate { system = system'; }; 61 61 in mapListToAttrs (blasProviders system) (provider: let 62 - is64bit = builtins.elem provider (["mkl64"] ++ lib.optional system.is64bit "openblas"); 62 + isILP64 = builtins.elem provider (["mkl64"] ++ lib.optional system.is64bit "openblas"); 63 63 pkgs = pkgsFun { 64 64 config = { inherit allowUnfree; }; 65 65 system = system'; ··· 68 68 lapackProvider = if provider == "mkl64" 69 69 then super.mkl 70 70 else builtins.getAttr provider super; 71 - inherit is64bit; 71 + inherit isILP64; 72 72 }; 73 73 blas = super.blas.override { 74 74 blasProvider = if provider == "mkl64" 75 75 then super.mkl 76 76 else builtins.getAttr provider super; 77 - inherit is64bit; 77 + inherit isILP64; 78 78 }; 79 79 })]; 80 80 };