Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
30f43d1c 17e29460

+775 -312
+124 -45
nixos/modules/services/backup/syncoid.nix
··· 5 5 let 6 6 cfg = config.services.syncoid; 7 7 8 - # Extract pool names of local datasets (ones that don't contain "@") that 9 - # have the specified type (either "source" or "target") 10 - getPools = type: unique (map (d: head (builtins.match "([^/]+).*" d)) ( 11 - # Filter local datasets 12 - filter (d: !hasInfix "@" d) 13 - # Get datasets of the specified type 14 - (catAttrs type (attrValues cfg.commands)) 15 - )); 8 + # Extract the pool name of a local dataset (any dataset not containing "@") 9 + localPoolName = d: optionals (d != null) ( 10 + let m = builtins.match "([^/@]+)[^@]*" d; in 11 + optionals (m != null) m); 12 + 13 + # Escape as required by: https://www.freedesktop.org/software/systemd/man/systemd.unit.html 14 + escapeUnitName = name: 15 + lib.concatMapStrings (s: if lib.isList s then "-" else s) 16 + (builtins.split "[^a-zA-Z0-9_.\\-]+" name); 16 17 in { 17 18 18 19 # Interface ··· 77 78 ''; 78 79 }; 79 80 81 + service = mkOption { 82 + type = types.attrs; 83 + default = {}; 84 + description = '' 85 + Systemd configuration common to all syncoid services. 86 + ''; 87 + }; 88 + 80 89 commands = mkOption { 81 90 type = types.attrsOf (types.submodule ({ name, ... }: { 82 91 options = { ··· 99 108 ''; 100 109 }; 101 110 102 - recursive = mkOption { 103 - type = types.bool; 104 - default = false; 105 - description = '' 106 - Whether to also transfer child datasets. 107 - ''; 108 - }; 111 + recursive = mkEnableOption ''the transfer of child datasets''; 109 112 110 113 sshKey = mkOption { 111 114 type = types.nullOr types.path; ··· 145 148 ''; 146 149 }; 147 150 151 + service = mkOption { 152 + type = types.attrs; 153 + default = {}; 154 + description = '' 155 + Systemd configuration specific to this syncoid service. 156 + ''; 157 + }; 158 + 148 159 extraArgs = mkOption { 149 160 type = types.listOf types.str; 150 161 default = []; ··· 170 181 # Implementation 171 182 172 183 config = mkIf cfg.enable { 173 - users = { 184 + users = { 174 185 users = mkIf (cfg.user == "syncoid") { 175 186 syncoid = { 176 187 group = cfg.group; 177 188 isSystemUser = true; 189 + # For syncoid to be able to create /var/lib/syncoid/.ssh/ 190 + # and to use custom ssh_config or known_hosts. 191 + home = "/var/lib/syncoid"; 192 + createHome = false; 178 193 }; 179 194 }; 180 195 groups = mkIf (cfg.group == "syncoid") { ··· 182 197 }; 183 198 }; 184 199 185 - systemd.services.syncoid = { 186 - description = "Syncoid ZFS synchronization service"; 187 - script = concatMapStringsSep "\n" (c: lib.escapeShellArgs 188 - ([ "${pkgs.sanoid}/bin/syncoid" ] 189 - ++ (optionals c.useCommonArgs cfg.commonArgs) 190 - ++ (optional c.recursive "-r") 191 - ++ (optionals (c.sshKey != null) [ "--sshkey" c.sshKey ]) 192 - ++ c.extraArgs 193 - ++ [ "--sendoptions" c.sendOptions 194 - "--recvoptions" c.recvOptions 195 - "--no-privilege-elevation" 196 - c.source c.target 197 - ])) (attrValues cfg.commands); 198 - after = [ "zfs.target" ]; 199 - serviceConfig = { 200 - ExecStartPre = let 201 - allowCmd = permissions: pool: lib.escapeShellArgs [ 202 - "+/run/booted-system/sw/bin/zfs" "allow" 203 - cfg.user (concatStringsSep "," permissions) pool 204 - ]; 205 - in 206 - (map (allowCmd [ "hold" "send" "snapshot" "destroy" ]) (getPools "source")) ++ 207 - (map (allowCmd [ "create" "mount" "receive" "rollback" ]) (getPools "target")); 208 - User = cfg.user; 209 - Group = cfg.group; 210 - }; 211 - startAt = cfg.interval; 212 - }; 200 + systemd.services = mapAttrs' (name: c: 201 + nameValuePair "syncoid-${escapeUnitName name}" (mkMerge [ 202 + { description = "Syncoid ZFS synchronization from ${c.source} to ${c.target}"; 203 + after = [ "zfs.target" ]; 204 + startAt = cfg.interval; 205 + # syncoid may need zpool to get feature@extensible_dataset 206 + path = [ "/run/booted-system/sw/bin/" ]; 207 + serviceConfig = { 208 + ExecStartPre = 209 + map (pool: lib.escapeShellArgs [ 210 + "+/run/booted-system/sw/bin/zfs" "allow" 211 + cfg.user "bookmark,hold,send,snapshot,destroy" pool 212 + # Permissions snapshot and destroy are in case --no-sync-snap is not used 213 + ]) (localPoolName c.source) ++ 214 + map (pool: lib.escapeShellArgs [ 215 + "+/run/booted-system/sw/bin/zfs" "allow" 216 + cfg.user "create,mount,receive,rollback" pool 217 + ]) (localPoolName c.target); 218 + ExecStart = lib.escapeShellArgs ([ "${pkgs.sanoid}/bin/syncoid" ] 219 + ++ optionals c.useCommonArgs cfg.commonArgs 220 + ++ optional c.recursive "-r" 221 + ++ optionals (c.sshKey != null) [ "--sshkey" c.sshKey ] 222 + ++ c.extraArgs 223 + ++ [ "--sendoptions" c.sendOptions 224 + "--recvoptions" c.recvOptions 225 + "--no-privilege-elevation" 226 + c.source c.target 227 + ]); 228 + User = cfg.user; 229 + Group = cfg.group; 230 + StateDirectory = [ "syncoid" ]; 231 + StateDirectoryMode = "700"; 232 + # Prevent SSH control sockets of different syncoid services from interfering 233 + PrivateTmp = true; 234 + # Permissive access to /proc because syncoid 235 + # calls ps(1) to detect ongoing `zfs receive`. 236 + ProcSubset = "all"; 237 + ProtectProc = "default"; 238 + 239 + # The following options are only for optimizing: 240 + # systemd-analyze security | grep syncoid-'*' 241 + AmbientCapabilities = ""; 242 + CapabilityBoundingSet = ""; 243 + DeviceAllow = ["/dev/zfs"]; 244 + LockPersonality = true; 245 + MemoryDenyWriteExecute = true; 246 + NoNewPrivileges = true; 247 + PrivateDevices = true; 248 + PrivateMounts = true; 249 + PrivateNetwork = mkDefault false; 250 + PrivateUsers = true; 251 + ProtectClock = true; 252 + ProtectControlGroups = true; 253 + ProtectHome = true; 254 + ProtectHostname = true; 255 + ProtectKernelLogs = true; 256 + ProtectKernelModules = true; 257 + ProtectKernelTunables = true; 258 + ProtectSystem = "strict"; 259 + RemoveIPC = true; 260 + RestrictAddressFamilies = [ "AF_UNIX" "AF_INET" "AF_INET6" ]; 261 + RestrictNamespaces = true; 262 + RestrictRealtime = true; 263 + RestrictSUIDSGID = true; 264 + RootDirectory = "/run/syncoid/${escapeUnitName name}"; 265 + RootDirectoryStartOnly = true; 266 + BindPaths = [ "/dev/zfs" ]; 267 + BindReadOnlyPaths = [ builtins.storeDir "/etc" "/run" "/bin/sh" ]; 268 + # Avoid useless mounting of RootDirectory= in the own RootDirectory= of ExecStart='s mount namespace. 269 + InaccessiblePaths = ["-+/run/syncoid/${escapeUnitName name}"]; 270 + MountAPIVFS = true; 271 + # Create RootDirectory= in the host's mount namespace. 272 + RuntimeDirectory = [ "syncoid/${escapeUnitName name}" ]; 273 + RuntimeDirectoryMode = "700"; 274 + SystemCallFilter = [ 275 + "@system-service" 276 + # Groups in @system-service which do not contain a syscall listed by: 277 + # perf stat -x, 2>perf.log -e 'syscalls:sys_enter_*' syncoid … 278 + # awk >perf.syscalls -F "," '$1 > 0 {sub("syscalls:sys_enter_","",$3); print $3}' perf.log 279 + # systemd-analyze syscall-filter | grep -v -e '#' | sed -e ':loop; /^[^ ]/N; s/\n //; t loop' | grep $(printf ' -e \\<%s\\>' $(cat perf.syscalls)) | cut -f 1 -d ' ' 280 + "~@aio" "~@chown" "~@keyring" "~@memlock" "~@privileged" 281 + "~@resources" "~@setuid" "~@sync" "~@timer" 282 + ]; 283 + SystemCallArchitectures = "native"; 284 + # This is for BindPaths= and BindReadOnlyPaths= 285 + # to allow traversal of directories they create in RootDirectory=. 286 + UMask = "0066"; 287 + }; 288 + } 289 + cfg.service 290 + c.service 291 + ])) cfg.commands; 213 292 }; 214 293 215 - meta.maintainers = with maintainers; [ lopsided98 ]; 294 + meta.maintainers = with maintainers; [ julm lopsided98 ]; 216 295 }
+3 -2
nixos/tests/sanoid.nix
··· 44 44 # Sync snapshot taken by sanoid 45 45 "pool/sanoid" = { 46 46 target = "root@target:pool/sanoid"; 47 - extraArgs = [ "--no-sync-snap" ]; 47 + extraArgs = [ "--no-sync-snap" "--create-bookmark" ]; 48 48 }; 49 49 # Take snapshot and sync 50 50 "pool/syncoid".target = "root@target:pool/syncoid"; ··· 92 92 # Sync snapshots 93 93 target.wait_for_open_port(22) 94 94 source.succeed("touch /mnt/pool/syncoid/test.txt") 95 - source.systemctl("start --wait syncoid.service") 95 + source.systemctl("start --wait syncoid-pool-sanoid.service") 96 96 target.succeed("cat /mnt/pool/sanoid/test.txt") 97 + source.systemctl("start --wait syncoid-pool-syncoid.service") 97 98 target.succeed("cat /mnt/pool/syncoid/test.txt") 98 99 ''; 99 100 })
+10 -1
pkgs/applications/editors/aseprite/skia.nix
··· 16 16 }); 17 17 in 18 18 stdenv.mkDerivation { 19 - name = "skia-aseprite-m71"; 19 + pname = "skia"; 20 + version = "aseprite-m71"; 20 21 21 22 src = fetchFromGitHub { 22 23 owner = "aseprite"; ··· 73 74 third_party/externals/angle2/include \ 74 75 third_party/skcms/**/*.h 75 76 ''; 77 + 78 + meta = with lib; { 79 + description = "Skia is a complete 2D graphic library for drawing Text, Geometries, and Images"; 80 + homepage = "https://skia.org/"; 81 + license = licenses.bsd3; 82 + maintainers = with maintainers; [ ]; 83 + platforms = platforms.all; 84 + }; 76 85 }
+27 -27
pkgs/applications/graphics/hydrus/default.nix
··· 1 1 { lib 2 2 , fetchFromGitHub 3 - , xz 4 3 , wrapQtAppsHook 5 4 , miniupnpc_2 5 + , ffmpeg 6 6 , enableSwftools ? false 7 7 , swftools 8 - , pythonPackages 8 + , python3Packages 9 9 }: 10 10 11 - pythonPackages.buildPythonPackage rec { 11 + python3Packages.buildPythonPackage rec { 12 12 pname = "hydrus"; 13 - version = "441"; 13 + version = "447"; 14 14 format = "other"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "hydrusnetwork"; 18 18 repo = "hydrus"; 19 19 rev = "v${version}"; 20 - sha256 = "13h4qcz0iqba4mwyvgmdqh99jy22x7kw20f3g43b5aq3qyk9ca2h"; 20 + sha256 = "0a9nrsbw3w1229bm90xayixvkpvr6g338w64x4v75sqxvpbx84lz"; 21 21 }; 22 22 23 23 nativeBuildInputs = [ 24 24 wrapQtAppsHook 25 25 ]; 26 26 27 - propagatedBuildInputs = with pythonPackages; [ 27 + propagatedBuildInputs = with python3Packages; [ 28 28 beautifulsoup4 29 + chardet 30 + cloudscraper 29 31 html5lib 30 32 lxml 33 + lz4 34 + nose 31 35 numpy 32 36 opencv4 33 37 pillow 34 38 psutil 39 + pylzma 35 40 pyopenssl 41 + pyside2 42 + pysocks 43 + pythonPackages.mpv 36 44 pyyaml 45 + qtpy 37 46 requests 38 47 send2trash 39 48 service-identity 49 + six 40 50 twisted 41 - lz4 42 - xz 43 - pysocks 44 - matplotlib 45 - qtpy 46 - pyside2 47 - mpv 48 51 ]; 49 52 50 - checkInputs = with pythonPackages; [ nose httmock ]; 53 + checkInputs = with python3Packages; [ nose mock httmock ]; 51 54 52 55 # most tests are failing, presumably because we are not using test.py 53 56 checkPhase = '' ··· 76 79 ''; 77 80 78 81 outputs = [ "out" "doc" ]; 79 - 80 - postPatch = '' 81 - sed 's;os\.path\.join(\sHC\.BIN_DIR,.*;"${miniupnpc_2}/bin/upnpc";' \ 82 - -i ./hydrus/core/networking/HydrusNATPunch.py 83 - '' + lib.optionalString enableSwftools '' 84 - sed 's;os\.path\.join(\sHC\.BIN_DIR,.*;"${swftools}/bin/swfrender";' \ 85 - -i ./hydrus/core/HydrusFlashHandling.py 86 - ''; 87 - 88 - #doCheck = true; 89 82 90 83 installPhase = '' 91 84 # Move the hydrus module and related directories 92 - mkdir -p $out/${pythonPackages.python.sitePackages} 93 - mv {hydrus,static} $out/${pythonPackages.python.sitePackages} 85 + mkdir -p $out/${python3Packages.python.sitePackages} 86 + mv {hydrus,static} $out/${python3Packages.python.sitePackages} 94 87 mv help $out/doc/ 95 88 96 89 # install the hydrus binaries 97 90 mkdir -p $out/bin 98 91 install -m0755 server.py $out/bin/hydrus-server 99 92 install -m0755 client.py $out/bin/hydrus-client 93 + '' + lib.optionalString enableSwftools '' 94 + mkdir -p $out/${python3Packages.python.sitePackages}/bin 95 + # swfrender seems to have to be called sfwrender_linux 96 + # not sure if it can be loaded through PATH, but this is simpler 97 + # $out/python3Packages.python.sitePackages/bin is correct NOT .../hydrus/bin 98 + ln -s ${swftools}/bin/swfrender $out/${python3Packages.python.sitePackages}/bin/swfrender_linux 100 99 ''; 101 100 102 101 dontWrapQtApps = true; 103 102 preFixup = '' 104 103 makeWrapperArgs+=("''${qtWrapperArgs[@]}") 104 + makeWrapperArgs+=(--prefix PATH : ${lib.makeBinPath [ ffmpeg miniupnpc_2 ]}) 105 105 ''; 106 106 107 107 meta = with lib; { 108 108 description = "Danbooru-like image tagging and searching system for the desktop"; 109 109 license = licenses.wtfpl; 110 110 homepage = "https://hydrusnetwork.github.io/hydrus/"; 111 - maintainers = [ maintainers.evanjs ]; 111 + maintainers = with maintainers; [ dandellion evanjs ]; 112 112 }; 113 113 }
+4 -2
pkgs/applications/graphics/xournalpp/default.nix
··· 9 9 , glib 10 10 , gsettings-desktop-schemas 11 11 , gtk3 12 + , librsvg 12 13 , libsndfile 13 14 , libxml2 14 15 , libzip ··· 22 23 23 24 stdenv.mkDerivation rec { 24 25 pname = "xournalpp"; 25 - version = "1.0.20"; 26 + version = "1.1.0"; 26 27 27 28 src = fetchFromGitHub { 28 29 owner = "xournalpp"; 29 30 repo = pname; 30 31 rev = version; 31 - sha256 = "1c7n03xm3m4lwcwxgplkn25i8c6s3i7rijbkcx86br1j4jadcs3k"; 32 + sha256 = "sha256-FIIpWgWvq1uo/lIQXpOkUTZ6YJPtOtxKF8VjXSgqrlE="; 32 33 }; 33 34 34 35 nativeBuildInputs = [ cmake gettext pkg-config wrapGAppsHook ]; ··· 36 37 [ glib 37 38 gsettings-desktop-schemas 38 39 gtk3 40 + librsvg 39 41 libsndfile 40 42 libxml2 41 43 libzip
+4 -4
pkgs/applications/misc/josm/default.nix
··· 3 3 }: 4 4 let 5 5 pname = "josm"; 6 - version = "17919"; 6 + version = "18004"; 7 7 srcs = { 8 8 jar = fetchurl { 9 9 url = "https://josm.openstreetmap.de/download/josm-snapshot-${version}.jar"; 10 - sha256 = "sha256-Bj1s3vFSHPiZNTjp7hQhu1X2v8nlynC37Cm6sMNOi3g="; 10 + sha256 = "sha256-Cd+/sE6A0MddHeAxy3gx7ev+9UR3ZNcR0tCTmdX2FtY="; 11 11 }; 12 12 macosx = fetchurl { 13 13 url = "https://josm.openstreetmap.de/download/macosx/josm-macos-${version}-java16.zip"; 14 - sha256 = "sha256-W+s6ARA5lyRwTuRD89wm4HChb2Up5AXQwh5uk0U7pQk="; 14 + sha256 = "sha256-QSVh8043K/f7gPEjosGo/DNj1d75LUFwf6EMeHk68fM="; 15 15 }; 16 16 pkg = fetchsvn { 17 17 url = "https://josm.openstreetmap.de/svn/trunk/native/linux/tested"; 18 18 rev = version; 19 - sha256 = "sha256-IjCFngixh2+7SifrV3Ohi1BjIOP+QSWg/QjeqbbP7aw="; 19 + sha256 = "sha256-Ic6RtQPqpQIci1IbKgTcFmLfMdPxSVybrEAk+ttM0j8="; 20 20 }; 21 21 }; 22 22 in
+28
pkgs/applications/misc/snixembed/default.nix
··· 1 + { fetchFromSourcehut, gtk3, lib, libdbusmenu-gtk3, pkg-config, stdenv, vala }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "snixembed"; 5 + version = "0.3.1"; 6 + 7 + src = fetchFromSourcehut { 8 + owner = "~steef"; 9 + repo = pname; 10 + rev = version; 11 + sha256 = "0yy1i4463q43aq98qk4nvvzpw4i6bid2bywwgf6iq545pr3glfj5"; 12 + }; 13 + 14 + nativeBuildInputs = [ pkg-config vala ]; 15 + 16 + buildInputs = [ gtk3 libdbusmenu-gtk3 ]; 17 + 18 + makeFlags = [ "PREFIX=$(out)" ]; 19 + 20 + meta = with lib; { 21 + description = "Proxy StatusNotifierItems as XEmbedded systemtray-spec icons"; 22 + homepage = "https://git.sr.ht/~steef/snixembed"; 23 + changelog = "https://git.sr.ht/~steef/snixembed/refs/${version}"; 24 + license = licenses.isc; 25 + platforms = platforms.unix; 26 + maintainers = with maintainers; [ figsoda ]; 27 + }; 28 + }
+3 -3
pkgs/applications/networking/cluster/linkerd/default.nix
··· 64 64 }; 65 65 edge = generic { 66 66 channel = "edge"; 67 - version = "21.7.3"; 68 - sha256 = "sha256-fEkqZ/4BQVnmOKUrrLmi6DKlMVNeqvW95bxbZX0o7iI="; 69 - vendorSha256 = "sha256-NqOmmeEGWvy/LYfSpIdnJZX4lGweCgiL008ed05XIFs="; 67 + version = "21.7.4"; 68 + sha256 = "sha256-yorxP4SQVV6MWlx8+8l0f7qOaF7aJ1XiPfnMqKC8m/o="; 69 + vendorSha256 = "sha256-2ZDsBiIV9ng8P0cDURbqDqMTxFKUFcBxHsPGWp5WjPo="; 70 70 }; 71 71 }
+3 -3
pkgs/applications/networking/cluster/temporal/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "temporal"; 5 - version = "1.11.1"; 5 + version = "1.11.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "temporalio"; 9 9 repo = "temporal"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-upoWftm82QBdax0lbeu+Nmwscsj/fsOzGUPI+fzcKUM="; 11 + sha256 = "sha256-DskJtZGp8zmSWC5GJijNbhwKQF0Y0FXXh7wCzlbAgy8="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-eO/23MQpdXQNPCIzMC9nxvrgUFuEPABJ7vkBZKv+XZI"; 14 + vendorSha256 = "sha256-eO/23MQpdXQNPCIzMC9nxvrgUFuEPABJ7vkBZKv+XZI="; 15 15 16 16 # Errors: 17 17 # > === RUN TestNamespaceHandlerGlobalNamespaceDisabledSuite
+8 -8
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 375 375 "owner": "hashicorp", 376 376 "provider-source-address": "registry.terraform.io/hashicorp/google", 377 377 "repo": "terraform-provider-google", 378 - "rev": "v3.62.0", 379 - "sha256": "0x0qp8nk88667hvlpgxrdjsgirw8iwv85gn3k9xb37a3lw7xs4qz", 380 - "vendorSha256": "0w6aavj1c4blpvsy00vz4dcj8rnxx6a586b16lqp6s1flqmlqrbi", 381 - "version": "3.62.0" 378 + "rev": "v3.76.0", 379 + "sha256": "1j3q07v4r0a3mlkmpqw8nav5z09fwyms9xmlyk6k6xkkzr520xcp", 380 + "vendorSha256": "1ffxfracj4545fzh6p6b0wal0j07807qc2q83qzchbalqvi7yhky", 381 + "version": "3.76.0" 382 382 }, 383 383 "google-beta": { 384 384 "owner": "hashicorp", 385 385 "provider-source-address": "registry.terraform.io/hashicorp/google-beta", 386 386 "repo": "terraform-provider-google-beta", 387 - "rev": "v3.47.0", 388 - "sha256": "1nk0bg2q7dg65rn3j5pkdjv07x0gs7bkv1bpfvlhi9p4fzx9g4by", 389 - "vendorSha256": "0c2q4d2khsi3v9b659q1kmncnlshv4px6ch99jpcymwqg3xrxda2", 390 - "version": "3.47.0" 387 + "rev": "v3.76.0", 388 + "sha256": "1bdhk4vfn8pn7ql5q8m4r8js8d73zyp3dbhrmh4p07g7i5z57pjq", 389 + "vendorSha256": "0cwvkzw45b057gwbj24z9gyldjpyfgv3fyr5x160spj0ksfn0ki0", 390 + "version": "3.76.0" 391 391 }, 392 392 "grafana": { 393 393 "owner": "grafana",
+33
pkgs/applications/networking/instant-messengers/pidgin-plugins/pidgin-indicator/default.nix
··· 1 + { autoreconfHook 2 + , fetchFromGitHub 3 + , glib 4 + , intltool 5 + , lib 6 + , libappindicator-gtk2 7 + , libtool 8 + , pidgin 9 + , stdenv 10 + }: 11 + 12 + stdenv.mkDerivation rec { 13 + pname = "pidgin-indicator"; 14 + version = "1.0.1"; 15 + 16 + src = fetchFromGitHub { 17 + owner = "philipl"; 18 + repo = pname; 19 + rev = version; 20 + sha256 = "sha256-CdA/aUu+CmCRbVBKpJGydicqFQa/rEsLWS3MBKlH2/M="; 21 + }; 22 + 23 + nativeBuildInputs = [ autoreconfHook ]; 24 + buildInputs = [ glib intltool libappindicator-gtk2 libtool pidgin ]; 25 + 26 + meta = with lib; { 27 + description = "An AppIndicator and KStatusNotifierItem Plugin for Pidgin"; 28 + homepage = "https://github.com/philipl/pidgin-indicator"; 29 + maintainers = with maintainers; [ imalison ]; 30 + license = licenses.gpl2; 31 + platforms = with platforms; linux; 32 + }; 33 + }
+2 -2
pkgs/applications/science/biology/bedops/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "bedops"; 5 - version = "2.4.39"; 5 + version = "2.4.40"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "bedops"; 9 9 repo = "bedops"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-vPrut3uhZK1Eg9vPcyxVNWW4zKeypdsb28oM1xbbpJo="; 11 + sha256 = "sha256-rJVl3KbzGblyQZ7FtJXeEv/wjQJmzYGNjzhvkoMoBWY="; 12 12 }; 13 13 14 14 buildInputs = [ zlib bzip2 jansson ];
+2 -2
pkgs/applications/version-management/git-and-tools/git-annex-remote-googledrive/default.nix
··· 10 10 11 11 buildPythonApplication rec { 12 12 pname = "git-annex-remote-googledrive"; 13 - version = "1.3.0"; 13 + version = "1.3.2"; 14 14 15 15 src = fetchPypi { 16 16 inherit pname version; 17 - sha256 = "118w0fyy6pck8hyj925ym6ak0xxqhkaq2vharnpl9b97nab4mqg8"; 17 + sha256 = "0rwjcdvfgzdlfgrn1rrqwwwiqqzyh114qddrbfwd46ld5spry6r1"; 18 18 }; 19 19 20 20 propagatedBuildInputs = [ annexremote drivelib GitPython tenacity humanfriendly ];
+8 -12
pkgs/applications/window-managers/hikari/default.nix
··· 1 - { lib, stdenv, fetchzip, fetchpatch, 2 - pkg-config, bmake, 3 - cairo, glib, libevdev, libinput, libxkbcommon, linux-pam, pango, pixman, 4 - libucl, wayland, wayland-protocols, wlroots, mesa, 5 - features ? { 1 + { lib, stdenv, fetchzip 2 + , pkg-config, bmake 3 + , cairo, glib, libevdev, libinput, libxkbcommon, linux-pam, pango, pixman 4 + , libucl, wayland, wayland-protocols, wlroots, mesa 5 + , features ? { 6 6 gammacontrol = true; 7 7 layershell = true; 8 8 screencopy = true; ··· 10 10 } 11 11 }: 12 12 13 - let 13 + stdenv.mkDerivation rec { 14 14 pname = "hikari"; 15 - version = "2.3.1"; 16 - in 17 - 18 - stdenv.mkDerivation { 19 - inherit pname version; 15 + version = "2.3.2"; 20 16 21 17 src = fetchzip { 22 18 url = "https://hikari.acmelabs.space/releases/${pname}-${version}.tar.gz"; 23 - sha256 = "sha256-o6YsUATcWHSuAEfU7WnwxKNxRNuBt069qCv0FKDWStg="; 19 + sha256 = "sha256-At4b6mkArKe6knNWouLdZ9v8XhfHaUW+aB+CHyEBg8o="; 24 20 }; 25 21 26 22 nativeBuildInputs = [ pkg-config bmake ];
+2 -2
pkgs/data/fonts/noto-fonts/default.nix
··· 110 110 }; 111 111 112 112 noto-fonts-emoji = let 113 - version = "2020-09-16-unicode13_1"; 113 + version = "2.028"; 114 114 emojiPythonEnv = 115 115 python3.withPackages (p: with p; [ fonttools nototools ]); 116 116 in stdenv.mkDerivation { ··· 121 121 owner = "googlefonts"; 122 122 repo = "noto-emoji"; 123 123 rev = "v${version}"; 124 - sha256 = "0659336dp0l2nkac153jpcb9yvp0p3dx1crcyxjd14i8cqkfi2hh"; 124 + sha256 = "0dy7px7wfl6bqkfzz82jm4gvbjp338ddsx0mwfl6m7z48l7ng4v6"; 125 125 }; 126 126 127 127 nativeBuildInputs = [
+9 -10
pkgs/development/libraries/drogon/default.nix
··· 1 - { stdenv, fetchFromGitHub, cmake, jsoncpp, libossp_uuid, zlib, openssl, lib 2 - # miscellaneous 3 - , brotli, c-ares 4 - # databases 1 + { stdenv, fetchFromGitHub, cmake, jsoncpp, libossp_uuid, zlib, lib 2 + # optional but of negligible size 3 + , openssl, brotli, c-ares 4 + # optional databases 5 5 , sqliteSupport ? true, sqlite 6 6 , postgresSupport ? false, postgresql 7 7 , redisSupport ? false, hiredis ··· 12 12 version = "1.7.1"; 13 13 14 14 src = fetchFromGitHub { 15 - owner = "an-tao"; 15 + owner = "drogonframework"; 16 16 repo = "drogon"; 17 17 rev = "v${version}"; 18 18 sha256 = "0rhwbz3m5x3vy5zllfs8r347wqprg29pff5q7i53f25bh8y0n49i"; ··· 36 36 ] ++ lib.optional sqliteSupport sqlite 37 37 ++ lib.optional postgresSupport postgresql 38 38 ++ lib.optional redisSupport hiredis 39 - # drogon uses mariadb for mysql (see https://github.com/an-tao/drogon/wiki/ENG-02-Installation#Library-Dependencies) 39 + # drogon uses mariadb for mysql (see https://github.com/drogonframework/drogon/wiki/ENG-02-Installation#Library-Dependencies) 40 40 ++ lib.optional mysqlSupport [ libmysqlclient mariadb ]; 41 41 42 42 patches = [ ··· 48 48 # modifying PATH here makes drogon_ctl visible to the test 49 49 installCheckPhase = '' 50 50 cd .. 51 - patchShebangs test.sh 52 - PATH=$PATH:$out/bin ./test.sh 51 + PATH=$PATH:$out/bin bash test.sh 53 52 ''; 54 53 55 54 doInstallCheck = true; 56 55 57 56 meta = with lib; { 58 - homepage = "https://github.com/an-tao/drogon"; 57 + homepage = "https://github.com/drogonframework/drogon"; 59 58 description = "C++14/17 based HTTP web application framework"; 60 59 license = licenses.mit; 61 - maintainers = [ maintainers.urlordjames ]; 60 + maintainers = with maintainers; [ urlordjames ]; 62 61 platforms = platforms.all; 63 62 }; 64 63 }
+3
pkgs/development/libraries/ffmpeg-full/default.nix
··· 74 74 , libcaca ? null # Textual display (ASCII art) 75 75 #, libcdio-paranoia ? null # Audio CD grabbing 76 76 , libdc1394 ? null, libraw1394 ? null # IIDC-1394 grabbing (ieee 1394) 77 + , libdrm ? null # libdrm support 77 78 , libiconv ? null 78 79 #, libiec61883 ? null, libavc1394 ? null # iec61883 (also uses libraw1394) 79 80 , libmfx ? null # Hardware acceleration vis libmfx ··· 348 349 #(enableFeature (libcaca != null) "libcaca") 349 350 #(enableFeature (cdio-paranoia != null && gplLicensing) "libcdio") 350 351 (enableFeature (if isLinux then libdc1394 != null && libraw1394 != null else false) "libdc1394") 352 + (enableFeature ((isLinux || isFreeBSD) && libdrm != null) "libdrm") 351 353 (enableFeature (libiconv != null) "iconv") 352 354 (enableFeature (libjack2 != null) "libjack") 353 355 #(enableFeature (if isLinux then libiec61883 != null && libavc1394 != null && libraw1394 != null else false) "libiec61883") ··· 432 434 ] ++ optionals openglExtlib [ libGL libGLU ] 433 435 ++ optionals nonfreeLicensing [ fdk_aac openssl ] 434 436 ++ optional ((isLinux || isFreeBSD) && libva != null) libva 437 + ++ optional ((isLinux || isFreeBSD) && libdrm != null) libdrm 435 438 ++ optional (!isAarch64 && libvmaf != null && version3Licensing) libvmaf 436 439 ++ optionals isLinux [ alsa-lib libraw1394 libv4l vulkan-loader glslang ] 437 440 ++ optional (isLinux && !isAarch64 && libmfx != null) libmfx
+10 -12
pkgs/development/libraries/gstreamer/default.nix
··· 1 1 { callPackage, AudioToolbox, AVFoundation, Cocoa, CoreFoundation, CoreMedia, CoreServices, CoreVideo, DiskArbitration, Foundation, IOKit, MediaToolbox, OpenGL, VideoToolbox }: 2 2 3 - rec { 3 + { 4 4 gstreamer = callPackage ./core { inherit CoreServices; }; 5 5 6 6 gstreamermm = callPackage ./gstreamermm { }; 7 7 8 - gst-plugins-base = callPackage ./base { inherit gstreamer Cocoa OpenGL; }; 8 + gst-plugins-base = callPackage ./base { inherit Cocoa OpenGL; }; 9 9 10 - gst-plugins-good = callPackage ./good { inherit gst-plugins-base Cocoa; }; 10 + gst-plugins-good = callPackage ./good { inherit Cocoa; }; 11 11 12 - gst-plugins-bad = callPackage ./bad { inherit gst-plugins-base AudioToolbox AVFoundation CoreMedia CoreVideo Foundation MediaToolbox VideoToolbox; }; 12 + gst-plugins-bad = callPackage ./bad { inherit AudioToolbox AVFoundation CoreMedia CoreVideo Foundation MediaToolbox VideoToolbox; }; 13 13 14 - gst-plugins-ugly = callPackage ./ugly { inherit gst-plugins-base CoreFoundation DiskArbitration IOKit; }; 14 + gst-plugins-ugly = callPackage ./ugly { inherit CoreFoundation DiskArbitration IOKit; }; 15 15 16 - gst-rtsp-server = callPackage ./rtsp-server { inherit gst-plugins-base gst-plugins-bad; }; 16 + gst-rtsp-server = callPackage ./rtsp-server { }; 17 17 18 - gst-libav = callPackage ./libav { inherit gst-plugins-base; }; 18 + gst-libav = callPackage ./libav { }; 19 19 20 - gst-devtools = callPackage ./devtools { inherit gstreamer gst-plugins-base; }; 20 + gst-devtools = callPackage ./devtools { }; 21 21 22 - gst-editing-services = callPackage ./ges { inherit gst-plugins-base gst-plugins-bad gst-devtools; }; 22 + gst-editing-services = callPackage ./ges { }; 23 23 24 - gst-vaapi = callPackage ./vaapi { 25 - inherit gst-plugins-base gstreamer gst-plugins-bad; 26 - }; 24 + gst-vaapi = callPackage ./vaapi { }; 27 25 28 26 # note: gst-python is in ./python/default.nix - called under pythonPackages 29 27 }
+64
pkgs/development/libraries/hamlib/4.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , perl 5 + , swig 6 + , gd 7 + , ncurses 8 + , python3 9 + , libxml2 10 + , tcl 11 + , libusb-compat-0_1 12 + , pkg-config 13 + , boost 14 + , libtool 15 + , perlPackages 16 + , pythonBindings ? true 17 + , tclBindings ? true 18 + , perlBindings ? true 19 + }: 20 + 21 + stdenv.mkDerivation rec { 22 + pname = "hamlib"; 23 + version = "4.2"; 24 + 25 + src = fetchurl { 26 + url = "mirror://sourceforge/${pname}/${pname}-${version}.tar.gz"; 27 + sha256 = "1m8gb20i8ga6ndnnw187ry1h4z8wx27v1hl7c610r6ky60pv4072"; 28 + }; 29 + 30 + nativeBuildInputs = [ 31 + swig 32 + pkg-config 33 + libtool 34 + ]; 35 + 36 + buildInputs = [ 37 + gd 38 + libxml2 39 + libusb-compat-0_1 40 + boost 41 + ] ++ lib.optionals pythonBindings [ python3 ncurses ] 42 + ++ lib.optionals tclBindings [ tcl ] 43 + ++ lib.optionals perlBindings [ perl perlPackages.ExtUtilsMakeMaker ]; 44 + 45 + configureFlags = lib.optionals perlBindings [ "--with-perl-binding" ] 46 + ++ lib.optionals tclBindings [ "--with-tcl-binding" "--with-tcl=${tcl}/lib/" ] 47 + ++ lib.optionals pythonBindings [ "--with-python-binding" ]; 48 + 49 + meta = with lib; { 50 + description = "Runtime library to control radio transceivers and receivers"; 51 + longDescription = '' 52 + Hamlib provides a standardized programming interface that applications 53 + can use to send the appropriate commands to a radio. 54 + 55 + Also included in the package is a simple radio control program 'rigctl', 56 + which lets one control a radio transceiver or receiver, either from 57 + command line interface or in a text-oriented interactive interface. 58 + ''; 59 + license = with licenses; [ gpl2Plus lgpl2Plus ]; 60 + homepage = "http://hamlib.sourceforge.net"; 61 + maintainers = with maintainers; [ relrod ]; 62 + platforms = with platforms; unix; 63 + }; 64 + }
+40 -10
pkgs/development/libraries/hamlib/default.nix
··· 1 - {lib, stdenv, fetchurl, perl, python2, swig, gd, libxml2, tcl, libusb-compat-0_1, pkg-config, 2 - boost, libtool, perlPackages }: 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , perl 5 + , swig 6 + , gd 7 + , ncurses 8 + , python3 9 + , libxml2 10 + , tcl 11 + , libusb-compat-0_1 12 + , pkg-config 13 + , boost 14 + , libtool 15 + , perlPackages 16 + , pythonBindings ? true 17 + , tclBindings ? true 18 + , perlBindings ? true 19 + }: 3 20 4 21 stdenv.mkDerivation rec { 5 22 pname = "hamlib"; ··· 10 27 sha256 = "10788mgrhbc57zpzakcxv5aqnr2819pcshml6fbh8zvnkja562y9"; 11 28 }; 12 29 13 - buildInputs = [ perl perlPackages.ExtUtilsMakeMaker python2 swig gd libxml2 14 - tcl libusb-compat-0_1 pkg-config boost libtool ]; 30 + nativeBuildInputs = [ 31 + swig 32 + pkg-config 33 + libtool 34 + ]; 15 35 16 - configureFlags = [ "--with-perl-binding" "--with-python-binding" 17 - "--with-tcl-binding" "--with-rigmatrix" ]; 36 + buildInputs = [ 37 + gd 38 + libxml2 39 + libusb-compat-0_1 40 + boost 41 + ] ++ lib.optionals pythonBindings [ python3 ncurses ] 42 + ++ lib.optionals tclBindings [ tcl ] 43 + ++ lib.optionals perlBindings [ perl perlPackages.ExtUtilsMakeMaker ]; 44 + 45 + configureFlags = lib.optionals perlBindings [ "--with-perl-binding" ] 46 + ++ lib.optionals tclBindings [ "--with-tcl-binding" "--with-tcl=${tcl}/lib/" ] 47 + ++ lib.optionals pythonBindings [ "--with-python-binding" ]; 18 48 19 - meta = { 49 + meta = with lib; { 20 50 description = "Runtime library to control radio transceivers and receivers"; 21 51 longDescription = '' 22 52 Hamlib provides a standardized programming interface that applications ··· 26 56 which lets one control a radio transceiver or receiver, either from 27 57 command line interface or in a text-oriented interactive interface. 28 58 ''; 29 - license = with lib.licenses; [ gpl2Plus lgpl2Plus ]; 59 + license = with licenses; [ gpl2Plus lgpl2Plus ]; 30 60 homepage = "http://hamlib.sourceforge.net"; 31 - maintainers = with lib.maintainers; [ relrod ]; 32 - platforms = with lib.platforms; unix; 61 + maintainers = with maintainers; [ relrod ]; 62 + platforms = with platforms; unix; 33 63 }; 34 64 }
-26
pkgs/development/libraries/librsync/0.9.nix
··· 1 - { lib, stdenv, fetchurl }: 2 - 3 - stdenv.mkDerivation { 4 - name = "librsync-0.9.7"; 5 - 6 - src = fetchurl { 7 - url = "mirror://sourceforge/librsync/librsync-0.9.7.tar.gz"; 8 - sha256 = "1mj1pj99mgf1a59q9f2mxjli2fzxpnf55233pc1klxk2arhf8cv6"; 9 - }; 10 - 11 - hardeningDisable = [ "format" ]; 12 - 13 - configureFlags = [ 14 - (lib.enableFeature stdenv.isCygwin "static") 15 - (lib.enableFeature (!stdenv.isCygwin) "shared") 16 - ]; 17 - 18 - dontStrip = stdenv.hostPlatform != stdenv.buildPlatform; 19 - 20 - meta = { 21 - homepage = "http://librsync.sourceforge.net/"; 22 - license = lib.licenses.lgpl2Plus; 23 - description = "Implementation of the rsync remote-delta algorithm"; 24 - platforms = lib.platforms.unix; 25 - }; 26 - }
+2 -2
pkgs/development/libraries/libxlsxwriter/default.nix
··· 8 8 9 9 stdenv.mkDerivation rec { 10 10 pname = "libxlsxwriter"; 11 - version = "1.0.9"; 11 + version = "1.1.1"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "jmcnamara"; 15 15 repo = "libxlsxwriter"; 16 16 rev = "RELEASE_${version}"; 17 - sha256 = "sha256-6MMQr0ynMmfZj+RFoKtLB/f1nTBfn9tcYpzyUwnfB3M="; 17 + sha256 = "1bi8a1pj18836yfqsnmfp45nqhq2d9r2r7gzi2v1y0qyk9jh6xln"; 18 18 }; 19 19 20 20 nativeBuildInputs = [
+5 -4
pkgs/development/python-modules/GitPython/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "GitPython"; 15 - version = "3.1.18"; 16 - disabled = isPy27; # no longer supported 15 + version = "3.1.19"; 16 + disabled = isPy27; 17 17 18 18 src = fetchPypi { 19 19 inherit pname version; 20 - sha256 = "b838a895977b45ab6f0cc926a9045c8d1c44e2b653c1fcc39fe91f42c6e8f05b"; 20 + sha256 = "0lqf5plm02aw9zl73kffk7aa4mp4girm3f2yfk27nmmmjsdh7x0q"; 21 21 }; 22 22 23 23 patches = [ ··· 30 30 propagatedBuildInputs = [ 31 31 gitdb 32 32 ddt 33 - ] ++ lib.optionals (pythonOlder "3.8") [ 33 + ] ++ lib.optionals (pythonOlder "3.10") [ 34 34 typing-extensions 35 35 ]; 36 36 37 37 # Tests require a git repo 38 38 doCheck = false; 39 + 39 40 pythonImportsCheck = [ "git" ]; 40 41 41 42 meta = with lib; {
-1
pkgs/development/python-modules/apache-airflow/default.nix
··· 3 3 , python 4 4 , buildPythonPackage 5 5 , fetchFromGitHub 6 - , writeText 7 6 , alembic 8 7 , argcomplete 9 8 , attrs
+2 -2
pkgs/development/python-modules/boost-histogram/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "boost-histogram"; 5 - version = "1.0.2"; 5 + version = "1.1.0"; 6 6 disabled = !isPy3k; 7 7 8 8 src = fetchPypi { 9 9 pname = "boost_histogram"; 10 10 inherit version; 11 - sha256 = "b79cb9a00c5b8e44ff24ffcbec0ce5d3048dd1570c8592066344b6d2f2369fa2"; 11 + sha256 = "370e8e44a0bac4ebbedb7e62570be3a75a7a3807a297d6e82a94301b4681fc22"; 12 12 }; 13 13 14 14 buildInputs = [ boost ];
+29 -9
pkgs/development/python-modules/channels/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, 2 - asgiref, django, daphne 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , asgiref 5 + , django 6 + , daphne 7 + , pytest-asyncio 8 + , pytest-django 9 + , pytestCheckHook 3 10 }: 11 + 4 12 buildPythonPackage rec { 5 13 pname = "channels"; 6 - version = "3.0.3"; 14 + version = "3.0.4"; 7 15 8 - src = fetchPypi { 9 - inherit pname version; 10 - sha256 = "056b72e51080a517a0f33a0a30003e03833b551d75394d6636c885d4edb8188f"; 16 + src = fetchFromGitHub { 17 + owner = "django"; 18 + repo = pname; 19 + rev = version; 20 + sha256 = "0jdylcb77n04rqyzg9v6qfzaxp1dnvdvnxddwh3x1qazw3csi5y2"; 11 21 }; 12 22 13 - # Files are missing in the distribution 14 - doCheck = false; 23 + propagatedBuildInputs = [ 24 + asgiref 25 + django 26 + daphne 27 + ]; 28 + 29 + checkInputs = [ 30 + pytest-asyncio 31 + pytest-django 32 + pytestCheckHook 33 + ]; 15 34 16 - propagatedBuildInputs = [ asgiref django daphne ]; 35 + pythonImportsCheck = [ "channels" ]; 17 36 18 37 meta = with lib; { 19 38 description = "Brings event-driven capabilities to Django with a channel system"; 20 39 license = licenses.bsd3; 21 40 homepage = "https://github.com/django/channels"; 41 + maintainers = with maintainers; [ fab ]; 22 42 }; 23 43 }
+2 -9
pkgs/development/python-modules/debugpy/default.nix
··· 2 2 , stdenv 3 3 , buildPythonPackage 4 4 , fetchFromGitHub 5 - , fetchpatch 6 5 , substituteAll 7 6 , gdb 8 7 , flask ··· 18 17 19 18 buildPythonPackage rec { 20 19 pname = "debugpy"; 21 - version = "1.3.0"; 20 + version = "1.4.1"; 22 21 23 22 src = fetchFromGitHub { 24 23 owner = "Microsoft"; 25 24 repo = pname; 26 25 rev = "v${version}"; 27 - hash = "sha256-YGzc9mMIzPTmUgIXuZROLdYKjUm69x9SR+JtYRVpn24="; 26 + hash = "sha256-W51Y9tZB1Uyp175+hWCpXChwL+MBpDWjudF87F1MRso="; 28 27 }; 29 28 30 29 patches = [ ··· 49 48 # To avoid this issue, debugpy should be installed using python.withPackages: 50 49 # python.withPackages (ps: with ps; [ debugpy ]) 51 50 ./fix-test-pythonpath.patch 52 - 53 - # Fix tests with flask>=2.0 54 - (fetchpatch { 55 - url = "https://github.com/microsoft/debugpy/commit/0a7f2cd67dda27ea4d38389b49a4e2a1899b834e.patch"; 56 - sha256 = "1g070fn07n7jj01jaf5s570zn70akf6klkamigs3ix11gh736rpn"; 57 - }) 58 51 ]; 59 52 60 53 # Remove pre-compiled "attach" libraries and recompile for host platform
+2 -2
pkgs/development/python-modules/debugpy/hardcode-gdb.patch
··· 1 1 diff --git a/src/debugpy/_vendored/pydevd/pydevd_attach_to_process/add_code_to_python_process.py b/src/debugpy/_vendored/pydevd/pydevd_attach_to_process/add_code_to_python_process.py 2 - index 6d031b4..ecf21f2 100644 2 + index 51017f2..46654ab 100644 3 3 --- a/src/debugpy/_vendored/pydevd/pydevd_attach_to_process/add_code_to_python_process.py 4 4 +++ b/src/debugpy/_vendored/pydevd/pydevd_attach_to_process/add_code_to_python_process.py 5 - @@ -293,7 +293,7 @@ def run_python_code_linux(pid, python_code, connect_debugger_tracing=False, show 5 + @@ -398,7 +398,7 @@ def run_python_code_linux(pid, python_code, connect_debugger_tracing=False, show 6 6 is_debug = 0 7 7 # Note that the space in the beginning of each line in the multi-line is important! 8 8 cmd = [
+8 -6
pkgs/development/python-modules/flower/default.nix
··· 7 7 , pytz 8 8 , tornado 9 9 , prometheus_client 10 + , pytestCheckHook 10 11 }: 11 12 12 13 buildPythonPackage rec { 13 14 pname = "flower"; 14 - version = "0.9.7"; 15 + version = "1.0.0"; 15 16 16 17 src = fetchPypi { 17 18 inherit pname version; 18 - sha256 = "cf27a254268bb06fd4972408d0518237fcd847f7da4b4cd8055e228150ace8f3"; 19 + sha256 = "1gcczr04g7wx99h7pxxx1p9n50sbyi0zxrzy7f7m0sf5apxw85rf"; 19 20 }; 20 21 21 22 postPatch = '' 22 23 # rely on using example programs (flowers/examples/tasks.py) which 23 24 # are not part of the distribution 24 25 rm tests/load.py 25 - substituteInPlace requirements/default.txt --replace "prometheus_client==0.8.0" "prometheus_client>=0.8.0" 26 26 ''; 27 27 28 28 propagatedBuildInputs = [ ··· 33 33 prometheus_client 34 34 ]; 35 35 36 - checkInputs = [ mock ]; 36 + checkInputs = [ 37 + mock 38 + pytestCheckHook 39 + ]; 37 40 38 41 pythonImportsCheck = [ "flower" ]; 39 42 ··· 41 44 description = "Celery Flower"; 42 45 homepage = "https://github.com/mher/flower"; 43 46 license = licenses.bsdOriginal; 44 - maintainers = [ maintainers.arnoldfarkas ]; 45 - broken = (celery.version >= "5.0.2"); # currently broken with celery>=5.0 by https://github.com/mher/flower/pull/1021 47 + maintainers = with maintainers; [ arnoldfarkas ]; 46 48 }; 47 49 }
+38
pkgs/development/python-modules/frilouz/default.nix
··· 1 + { lib 2 + , astunparse 3 + , buildPythonPackage 4 + , fetchFromGitHub 5 + , isPy3k 6 + }: 7 + 8 + buildPythonPackage rec { 9 + pname = "frilouz"; 10 + version = "0.0.2"; 11 + disabled = !isPy3k; 12 + 13 + src = fetchFromGitHub { 14 + owner = "QuantStack"; 15 + repo = "frilouz"; 16 + rev = version; 17 + sha256 = "0w2qzi4zb10r9iw64151ay01vf0yzyhh0bsjkx1apxp8fs15cdiw"; 18 + }; 19 + 20 + checkInputs = [ astunparse ]; 21 + 22 + preCheck = "cd test"; 23 + 24 + checkPhase = '' 25 + runHook preCheck 26 + python -m unittest 27 + runHook postCheck 28 + ''; 29 + 30 + pythonImportsCheck = [ "frilouz" ]; 31 + 32 + meta = with lib; { 33 + homepage = "https://github.com/QuantStack/frilouz"; 34 + description = "Python AST parser adapter with partial error recovery"; 35 + license = licenses.bsd3; 36 + maintainers = with maintainers; [ cpcloud ]; 37 + }; 38 + }
+2 -5
pkgs/development/python-modules/hap-python/default.nix
··· 4 4 , cryptography 5 5 , curve25519-donna 6 6 , ecdsa 7 - , ed25519 8 7 , fetchFromGitHub 9 8 , h11 10 9 , pyqrcode ··· 17 16 18 17 buildPythonPackage rec { 19 18 pname = "hap-python"; 20 - version = "3.5.1"; 19 + version = "3.5.2"; 21 20 disabled = pythonOlder "3.6"; 22 21 23 - # pypi package does not include tests 24 22 src = fetchFromGitHub { 25 23 owner = "ikalchev"; 26 24 repo = "HAP-python"; 27 25 rev = "v${version}"; 28 - sha256 = "sha256-ZHTqlb7LIDp8MFNW8MFg6jX7QwaxT40cLi3H13ONLCI="; 26 + sha256 = "1irf4dcq9fcqvvjbijkymm63n2s7a19igs1zsbv7y8fa5a2yprhd"; 29 27 }; 30 28 31 29 propagatedBuildInputs = [ ··· 33 31 cryptography 34 32 curve25519-donna 35 33 ecdsa 36 - ed25519 37 34 h11 38 35 pyqrcode 39 36 zeroconf
+2 -2
pkgs/development/python-modules/influxdb-client/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "influxdb-client"; 17 - version = "1.18.0"; 17 + version = "1.19.0"; 18 18 disabled = pythonOlder "3.6"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "influxdata"; 22 22 repo = "influxdb-client-python"; 23 23 rev = "v${version}"; 24 - sha256 = "0xgp1wxdfa4y316dfkpmj38chlh68mndr8kqphckpnw16qxsl3d9"; 24 + sha256 = "0k1qcwd2qdw8mcr8ywy3wi1x9j6i57axgcps5kmkbx773s8qf155"; 25 25 }; 26 26 27 27 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/jeepney/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "jeepney"; 15 - version = "0.6.0"; 15 + version = "0.7.0"; 16 16 17 17 disabled = pythonOlder "3.6"; 18 18 19 19 src = fetchPypi { 20 20 inherit pname version; 21 - sha256 = "7d59b6622675ca9e993a6bd38de845051d315f8b0c72cca3aef733a20b648657"; 21 + sha256 = "1237cd64c8f7ac3aa4b3f332c4d0fb4a8216f39eaa662ec904302d4d77de5a54"; 22 22 }; 23 23 24 24 checkInputs = [
+2 -2
pkgs/development/python-modules/meshio/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "meshio"; 13 - version = "4.3.10"; 13 + version = "4.4.6"; 14 14 format = "pyproject"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "1i34bk8bbc0dnizrlgj0yxnbzyvndkmnl6ryymxgcl9rv1abkfki"; 18 + sha256 = "0kv832s2vyff30zz8yqypw5jifwdanvh5x56d2bzkvy94h4jlddy"; 19 19 }; 20 20 21 21 propagatedBuildInputs = [
+23
pkgs/development/python-modules/pylzma/default.nix
··· 1 + { lib, buildPythonPackage, fetchPypi }: 2 + 3 + buildPythonPackage rec { 4 + pname = "pylzma"; 5 + version = "0.5.0"; 6 + 7 + # This vendors an old LZMA SDK 8 + # After some discussion, it seemed most reasonable to keep it that way 9 + # xz, and uefi-firmware-parser also does this 10 + src = fetchPypi { 11 + inherit pname version; 12 + sha256 = "074anvhyjgsv2iby2ql1ixfvjgmhnvcwjbdz8gk70xzkzcm1fx5q"; 13 + }; 14 + 15 + pythonImportsCheck = [ "pylzma" ]; 16 + 17 + meta = with lib; { 18 + homepage = "https://www.joachim-bauch.de/projects/pylzma/"; 19 + description = "Platform independent python bindings for the LZMA compression library"; 20 + license = licenses.lgpl21Only; 21 + maintainers = with maintainers; [ dandellion ]; 22 + }; 23 + }
+1 -1
pkgs/development/python-modules/pysyncthru/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "pysyncthru"; 12 - version = "0.7.3"; 12 + version = "0.7.5"; 13 13 14 14 disabled = isPy27; 15 15
+11 -6
pkgs/development/python-modules/requests-unixsocket/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi 2 - , pbr, requests 3 - , pytest, waitress }: 1 + { lib 2 + , buildPythonPackage 3 + , fetchPypi 4 + , pbr 5 + , requests 6 + , pytestCheckHook 7 + , waitress 8 + }: 4 9 5 10 buildPythonPackage rec { 6 11 pname = "requests-unixsocket"; ··· 14 19 nativeBuildInputs = [ pbr ]; 15 20 propagatedBuildInputs = [ requests ]; 16 21 17 - checkInputs = [ pytest waitress ]; 18 - checkPhase = '' 22 + checkInputs = [ pytestCheckHook waitress ]; 23 + 24 + preCheck = '' 19 25 rm pytest.ini 20 - py.test 21 26 ''; 22 27 23 28 meta = with lib; {
+43
pkgs/development/python-modules/synergy/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , pytestCheckHook 5 + , pythonOlder 6 + , numpy 7 + , scipy 8 + , matplotlib 9 + , plotly 10 + , pandas 11 + }: 12 + 13 + buildPythonPackage rec { 14 + pname = "synergy"; 15 + version = "0.5.1"; 16 + disabled = pythonOlder "3.5"; 17 + 18 + # Pypi does not contain unit tests 19 + src = fetchFromGitHub { 20 + owner = "djwooten"; 21 + repo = "synergy"; 22 + rev = "v${version}"; 23 + sha256 = "1c60dpvr72g4wjqg6bc601kssl5z55v9bg09xbyh9ahch58bi212"; 24 + }; 25 + 26 + propagatedBuildInputs = [ 27 + numpy 28 + scipy 29 + matplotlib 30 + plotly 31 + pandas 32 + ]; 33 + 34 + checkInputs = [ pytestCheckHook ]; 35 + pythonImportsCheck = [ "synergy" ]; 36 + 37 + meta = with lib; { 38 + description = "A Python library for calculating, analyzing, and visualizing drug combination synergy"; 39 + homepage = "https://github.com/djwooten/synergy"; 40 + maintainers = [ maintainers.ivar ]; 41 + license = licenses.gpl3Plus; 42 + }; 43 + }
+2 -2
pkgs/development/tools/analysis/frama-c/default.nix
··· 31 31 32 32 stdenv.mkDerivation rec { 33 33 pname = "frama-c"; 34 - version = "23.0"; 34 + version = "23.1"; 35 35 slang = "Vanadium"; 36 36 37 37 src = fetchurl { 38 38 url = "https://frama-c.com/download/frama-c-${version}-${slang}.tar.gz"; 39 - sha256 = "0pdm3y2nfyjhpnicv1pg9j48llq86dmb591d2imnafp4xfqani0s"; 39 + sha256 = "1rgkq9sg436smw005ag0j6y3xryhjn18a07m5wjfrfp0s1438nnj"; 40 40 }; 41 41 42 42 preConfigure = lib.optionalString stdenv.cc.isClang "configureFlagsArray=(\"--with-cpp=clang -E -C\")";
+2 -2
pkgs/development/tools/apksigcopier/default.nix
··· 4 4 , installShellFiles 5 5 , bash 6 6 , pandoc 7 + , apksigner 7 8 }: 8 - 9 - # FIXME: how to "recommend" apksigner like the Debian package? 10 9 11 10 python3.pkgs.buildPythonApplication rec { 12 11 pname = "apksigcopier"; ··· 22 21 nativeBuildInputs = [ installShellFiles pandoc ]; 23 22 propagatedBuildInputs = with python3.pkgs; [ click ]; 24 23 checkInputs = with python3.pkgs; [ flake8 mypy pylint ]; 24 + makeWrapperArgs = [ "--prefix" "PATH" ":" "${lib.makeBinPath [ apksigner ]}" ]; 25 25 26 26 postPatch = '' 27 27 substituteInPlace Makefile \
+15
pkgs/development/tools/apksigner/default.nix
··· 1 + { runCommand 2 + , makeWrapper 3 + , jre 4 + , build-tools 5 + }: 6 + let 7 + tools = builtins.head build-tools; 8 + in 9 + runCommand "apksigner" { 10 + nativeBuildInputs = [ makeWrapper ]; 11 + } '' 12 + mkdir -p $out/bin 13 + makeWrapper "${jre}/bin/java" "$out/bin/apksigner" \ 14 + --add-flags "-jar ${tools}/libexec/android-sdk/build-tools/${tools.version}/lib/apksigner.jar" 15 + ''
+6 -3
pkgs/development/tools/fdroidserver/default.nix
··· 1 - { docker 2 - , fetchFromGitLab 1 + { fetchFromGitLab 3 2 , python 4 - , lib }: 3 + , lib 4 + , apksigner 5 + }: 5 6 6 7 python.pkgs.buildPythonApplication rec { 7 8 version = "2.0.3"; ··· 46 47 ruamel_yaml 47 48 yamllint 48 49 ]; 50 + 51 + makeWrapperArgs = [ "--prefix" "PATH" ":" "${lib.makeBinPath [ apksigner ]}" ]; 49 52 50 53 # no tests 51 54 doCheck = false;
+6 -6
pkgs/development/tools/misc/remarkable/remarkable-toolchain/default.nix
··· 1 - { lib, stdenv, fetchurl, libarchive, python, file, which }: 1 + { lib, stdenv, fetchurl, libarchive, python3, file, which }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "remarkable-toolchain"; 5 - version = "1.8-23.9.2019"; 5 + version = "3.1.2"; 6 6 7 7 src = fetchurl { 8 - url = "https://remarkable.engineering/oecore-x86_64-cortexa9hf-neon-toolchain-zero-gravitas-${version}.sh"; 9 - sha256 = "1rk1r80m5d18sw6hrybj6f78s8pna0wrsa40ax6j8jzfwahgzmfb"; 8 + url = "https://storage.googleapis.com/remarkable-codex-toolchain/codex-x86_64-cortexa9hf-neon-rm10x-toolchain-${version}.sh"; 9 + sha256 = "sha256-ocODUUx2pgmqxMk8J+D+OvqlSHBSay6YzcqnxC9n59w="; 10 10 executable = true; 11 11 }; 12 12 13 13 nativeBuildInputs = [ 14 14 libarchive 15 - python 15 + python3 16 16 file 17 17 which 18 18 ]; ··· 28 28 meta = with lib; { 29 29 description = "A toolchain for cross-compiling to reMarkable tablets"; 30 30 homepage = "https://remarkable.engineering/"; 31 - license = licenses.gpl2; 31 + license = licenses.gpl2Plus; 32 32 maintainers = with maintainers; [ nickhu siraben ]; 33 33 platforms = [ "x86_64-linux" ]; 34 34 };
+10 -14
pkgs/development/tools/misc/remarkable/remarkable2-toolchain/default.nix
··· 1 - { lib, stdenv, fetchurl, libarchive, python3, file }: 1 + { lib, stdenv, fetchurl, libarchive, python3, file, which }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "remarkable2-toolchain"; 5 - version = "2.5.2"; 5 + version = "3.1.2"; 6 6 7 7 src = fetchurl { 8 - url = "https://storage.googleapis.com/codex-public-bucket/codex-x86_64-cortexa7hf-neon-rm11x-toolchain-${version}.sh"; 9 - sha256 = "1v410q1jn8flisdpkrymxd4pa1ylawd0rh3rljjpkqw1bp8a5vw1"; 8 + url = "https://storage.googleapis.com/remarkable-codex-toolchain/codex-x86_64-cortexa7hf-neon-rm11x-toolchain-${version}.sh"; 9 + sha256 = "sha256-JKMDRbkvoxwHiTm/o4JdLn3Mm2Ld1LyxTnCCwvnxk4c="; 10 + executable = true; 10 11 }; 11 12 12 13 nativeBuildInputs = [ 13 14 libarchive 14 15 python3 15 16 file 17 + which 16 18 ]; 17 19 18 - unpackCmd = '' 19 - mkdir src 20 - install $curSrc src/install-toolchain.sh 21 - ''; 22 - 20 + dontUnpack = true; 23 21 dontBuild = true; 24 22 25 23 installPhase = '' 26 - patchShebangs install-toolchain.sh 27 - sed -i -e '3,9d' install-toolchain.sh # breaks PATH 28 - sed -i 's|PYTHON=.*$|PYTHON=${python3}/bin/python|' install-toolchain.sh 29 - ./install-toolchain.sh -D -y -d $out 24 + mkdir -p $out 25 + ENVCLEANED=1 $src -y -d $out 30 26 ''; 31 27 32 28 meta = with lib; { ··· 34 30 homepage = "https://remarkable.engineering/"; 35 31 license = licenses.gpl2Plus; 36 32 maintainers = with maintainers; [ tadfisher ]; 37 - platforms = platforms.x86_64; 33 + platforms = [ "x86_64-linux" ]; 38 34 }; 39 35 }
+4 -5
pkgs/development/tools/scalafix/default.nix
··· 17 17 }; 18 18 in 19 19 stdenv.mkDerivation { 20 - name = "${baseName}-${version}"; 20 + pname = baseName; 21 + inherit version; 21 22 22 23 nativeBuildInputs = [ makeWrapper ]; 23 24 buildInputs = [ jdk deps ]; 24 25 25 - doCheck = true; 26 - 27 - phases = [ "installPhase" "checkPhase" ]; 26 + dontUnpack = true; 28 27 29 28 installPhase = '' 30 29 makeWrapper ${jre}/bin/java $out/bin/${baseName} \ 31 30 --add-flags "-cp $CLASSPATH scalafix.cli.Cli" 32 31 ''; 33 32 34 - checkPhase = '' 33 + installCheckPhase = '' 35 34 $out/bin/${baseName} --version | grep -q "${version}" 36 35 ''; 37 36
+1 -1
pkgs/games/minecraft-server/default.nix
··· 23 23 chmod +x $out/bin/minecraft-server 24 24 ''; 25 25 26 - phases = "installPhase"; 26 + dontUnpack = true; 27 27 28 28 passthru = { 29 29 tests = { inherit (nixosTests) minecraft-server; };
+1 -1
pkgs/games/tcl2048/default.nix
··· 10 10 }; 11 11 12 12 buildInputs = [ tcllib ]; 13 - phases = "installPhase fixupPhase"; 13 + dontUnpack = true; 14 14 15 15 installPhase = '' 16 16 mkdir -pv $out/bin
+20 -1
pkgs/misc/vscode-extensions/default.nix
··· 1 - { config, lib, buildEnv, callPackage, vscode-utils, asciidoctor, nodePackages, jdk, llvmPackages_8, nixpkgs-fmt, jq, shellcheck, moreutils, racket-minimal }: 1 + { config, lib, buildEnv, callPackage, vscode-utils, asciidoctor, nodePackages, jdk, llvmPackages_8, nixpkgs-fmt, jq 2 + , shellcheck, moreutils, racket-minimal, clojure-lsp 3 + }: 2 4 3 5 let 4 6 inherit (vscode-utils) buildVscodeMarketplaceExtension; ··· 201 203 version = "1.0.1"; 202 204 sha256 = "0zd0n9f5z1f0ckzfjr38xw2zzmcxg1gjrava7yahg5cvdcw6l35b"; 203 205 }; 206 + meta = with lib; { 207 + license = licenses.mit; 208 + }; 209 + }; 210 + 211 + betterthantomorrow.calva = buildVscodeMarketplaceExtension { 212 + mktplcRef = { 213 + name = "calva"; 214 + publisher = "betterthantomorrow"; 215 + version = "2.0.205"; 216 + sha256 = "sha256-umnG1uLB42fUNKjANaKcABjVmqbdOQakd/6TPsEpF9c"; 217 + }; 218 + nativeBuildInputs = [ jq moreutils ]; 219 + postInstall = '' 220 + cd "$out/$installPrefix" 221 + jq '.contributes.configuration[0].properties."calva.clojureLspPath".default = "${clojure-lsp}/bin/clojure-lsp"' package.json | sponge package.json 222 + ''; 204 223 meta = with lib; { 205 224 license = licenses.mit; 206 225 };
-2
pkgs/servers/atlassian/crowd.nix
··· 10 10 sha256 = "1gg4jcwvk4za6j4260dx1vz2dprrnqv8paqf6z86s7ka3y1nx1aj"; 11 11 }; 12 12 13 - phases = [ "unpackPhase" "buildPhase" "installPhase" "fixupPhase" ]; 14 - 15 13 buildPhase = '' 16 14 mv apache-tomcat/conf/server.xml apache-tomcat/conf/server.xml.dist 17 15 ln -s /run/atlassian-crowd/server.xml apache-tomcat/conf/server.xml
-2
pkgs/servers/http/jboss/default.nix
··· 8 8 sha256 = "1bdjw0ib9qr498vpfbg8klqw6rl11vbz7vwn6gp1r5gpqkd3zzc8"; 9 9 }; 10 10 11 - phases = [ "unpackPhase" "installPhase" "fixupPhase" ]; 12 - 13 11 installPhase = '' 14 12 mv $PWD $out 15 13 find $out/bin -name \*.sh -print0 | xargs -0 sed -i -e '/#!\/bin\/sh/aJAVA_HOME=${jdk}'
-1
pkgs/servers/mastodon/update.nix
··· 8 8 patchShebangs $out/bin/update.sh 9 9 wrapProgram $out/bin/update.sh --prefix PATH : ${lib.makeBinPath buildInputs} 10 10 ''; 11 - phases = [ "installPhase" ]; 12 11 13 12 nativeBuildInputs = [ makeWrapper ]; 14 13 buildInputs = [ yarn2nix bundix coreutils diffutils nix-prefetch-github gnused jq ];
-2
pkgs/servers/misc/subsonic/default.nix
··· 33 33 maintainers = with maintainers; [ telotortium ]; 34 34 platforms = platforms.unix; 35 35 }; 36 - 37 - phases = ["unpackPhase" "installPhase"]; 38 36 }
+1 -1
pkgs/servers/monitoring/prometheus/jmx-httpserver.nix
··· 17 17 nativeBuildInputs = [ makeWrapper ]; 18 18 buildInputs = [ jre ]; 19 19 20 - phases = "installPhase"; 20 + dontUnpack = true; 21 21 22 22 installPhase = '' 23 23 mkdir -p $out/libexec
-2
pkgs/servers/monitoring/riemann/default.nix
··· 11 11 12 12 nativeBuildInputs = [ makeWrapper ]; 13 13 14 - phases = [ "unpackPhase" "installPhase" ]; 15 - 16 14 installPhase = '' 17 15 substituteInPlace bin/riemann --replace '$top/lib/riemann.jar' "$out/share/java/riemann.jar" 18 16
+2 -2
pkgs/servers/tautulli/default.nix
··· 2 2 3 3 buildPythonApplication rec { 4 4 pname = "Tautulli"; 5 - version = "2.7.3"; 5 + version = "2.7.5"; 6 6 format = "other"; 7 7 8 8 pythonPath = [ setuptools ]; ··· 12 12 owner = "Tautulli"; 13 13 repo = pname; 14 14 rev = "v${version}"; 15 - sha256 = "1ig2vq19sb6n2x2w2zbf54izynaqay9l8xq1zds116v0z729wlkh"; 15 + sha256 = "h4IRPUaqgb/AgqKJJEsHBydJOH2i//fpWzMFa0VM2ns="; 16 16 }; 17 17 18 18 installPhase = ''
+17 -8
pkgs/tools/backup/btar/default.nix
··· 1 - { lib, stdenv, fetchurl, librsync }: 1 + { lib, stdenv, fetchurl, fetchpatch, librsync }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "btar-1.1.1"; 4 + pname = "btar"; 5 + version = "1.1.1"; 6 + 5 7 src = fetchurl { 6 - url = "http://vicerveza.homeunix.net/~viric/soft/btar/${name}.tar.gz"; 8 + url = "https://vicerveza.homeunix.net/~viric/soft/btar/btar-${version}.tar.gz"; 7 9 sha256 = "0miklk4bqblpyzh1bni4x6lqn88fa8fjn15x1k1n8bxkx60nlymd"; 8 10 }; 9 11 12 + patches = [ 13 + (fetchpatch { 14 + url = "https://build.opensuse.org/public/source/openSUSE:Factory/btar/btar-librsync.patch?rev=2"; 15 + sha256 = "1awqny9489vsfffav19s73xxg26m7zrhvsgf1wxb8c2izazwr785"; 16 + }) 17 + ]; 18 + 10 19 buildInputs = [ librsync ]; 11 20 12 - installPhase = "make install PREFIX=$out"; 21 + makeFlags = [ "PREFIX=$(out)" ]; 13 22 14 - meta = { 23 + meta = with lib; { 15 24 description = "Tar-compatible block-based archiver"; 16 25 license = lib.licenses.gpl3Plus; 17 - homepage = "http://viric.name/cgi-bin/btar"; 18 - platforms = with lib.platforms; all; 19 - maintainers = with lib.maintainers; [viric]; 26 + homepage = "https://viric.name/cgi-bin/btar"; 27 + platforms = platforms.all; 28 + maintainers = with maintainers; [ viric ]; 20 29 }; 21 30 }
+2 -2
pkgs/tools/graphics/astc-encoder/default.nix
··· 31 31 32 32 gccStdenv.mkDerivation rec { 33 33 pname = "astc-encoder"; 34 - version = "3.0"; 34 + version = "3.1"; 35 35 36 36 src = fetchFromGitHub { 37 37 owner = "ARM-software"; 38 38 repo = "astc-encoder"; 39 39 rev = version; 40 - sha256 = "sha256-+vYEO2zS144ZuVN8b4/EpvTcakC9U0uc/eV4pB7lHiY="; 40 + sha256 = "sha256-WWxk8F1MtFv1tWbSs45fmu4k9VCAAOjJP8zBz80zLTo="; 41 41 }; 42 42 43 43 nativeBuildInputs = [ cmake ];
+2 -2
pkgs/tools/graphics/goverlay/default.nix
··· 34 34 ''; 35 35 in stdenv.mkDerivation rec { 36 36 pname = "goverlay"; 37 - version = "0.5.1"; 37 + version = "0.6"; 38 38 39 39 src = fetchFromGitHub { 40 40 owner = "benjamimgois"; 41 41 repo = pname; 42 42 rev = version; 43 - hash = "sha256-Zl1pq2MeGJsPdNlwUEpov5MHlsr9pSMkWHVprt8ImKs="; 43 + hash = "sha256-E4SMUL9rpDSSdprX4fPyGCHCowdQavjhGIhV3r4jeiw="; 44 44 }; 45 45 46 46 outputs = [ "out" "man" ];
+5 -5
pkgs/tools/graphics/goverlay/find-xdg-data-files.patch
··· 1 1 diff --git a/overlayunit.pas b/overlayunit.pas 2 - index 59f6a81..a096543 100644 2 + index de8725f..005f171 100644 3 3 --- a/overlayunit.pas 4 4 +++ b/overlayunit.pas 5 - @@ -4871,7 +4871,7 @@ begin 5 + @@ -5377,7 +5377,7 @@ begin 6 6 //Determine Mangohud dependency status 7 7 8 8 //locate MangoHud and store result in tmp folder ··· 11 11 12 12 // Assign Text file dependency_mangohud to variable mangohudVAR 13 13 AssignFile(mangohudVAR, '/tmp/goverlay/dependency_mangohud'); 14 - @@ -4880,7 +4880,7 @@ begin 14 + @@ -5386,7 +5386,7 @@ begin 15 15 CloseFile(mangohudVAR); 16 16 17 17 // Read String and store value on mangohuddependencyVALUE based on result ··· 20 20 mangohuddependencyVALUE := 1 21 21 else 22 22 mangohuddependencyVALUE := 0; 23 - @@ -4889,7 +4889,7 @@ begin 23 + @@ -5395,7 +5395,7 @@ begin 24 24 //Determine vkBasalt dependency staus 25 25 26 26 //locate vkBasalt and store result in tmp folder ··· 29 29 30 30 // Assign Text file dependency_mangohud to variable mangohudVAR 31 31 AssignFile(vkbasaltVAR, '/tmp/goverlay/dependency_vkbasalt'); 32 - @@ -4898,7 +4898,7 @@ begin 32 + @@ -5404,7 +5404,7 @@ begin 33 33 CloseFile(vkbasaltVAR); 34 34 35 35 // Read String and store value on vkbasaltdependencyVALUE based on result
+2 -9
pkgs/tools/misc/diffoscope/default.nix
··· 1 - { lib, stdenv, fetchurl, runCommand, makeWrapper, python3Packages, docutils, help2man, installShellFiles 2 - , abootimg, acl, apktool, binutils-unwrapped, build-tools, bzip2, cbfstool, cdrkit, colord, colordiff, coreutils, cpio, db, diffutils, dtc 1 + { lib, stdenv, fetchurl, python3Packages, docutils, help2man, installShellFiles 2 + , abootimg, acl, apksigner, apktool, binutils-unwrapped, bzip2, cbfstool, cdrkit, colord, colordiff, coreutils, cpio, db, diffutils, dtc 3 3 , e2fsprogs, file, findutils, fontforge-fonttools, ffmpeg, fpc, gettext, ghc, ghostscriptX, giflib, gnumeric, gnupg, gnutar 4 4 , gzip, hdf5, imagemagick, jdk, libarchive, libcaca, llvm, lz4, mono, openssh, openssl, pdftk, pgpdump, poppler_utils, qemu, R 5 5 , radare2, sng, sqlite, squashfsTools, tcpdump, odt2txt, unzip, wabt, xxd, xz, zip, zstd ··· 7 7 }: 8 8 9 9 # Note: when upgrading this package, please run the list-missing-tools.sh script as described below! 10 - let 11 - apksigner = runCommand "apksigner" { nativeBuildInputs = [ makeWrapper ]; } '' 12 - mkdir -p $out/bin 13 - makeWrapper "${jdk}/bin/java" "$out/bin/apksigner" \ 14 - --add-flags "-jar ${builtins.head build-tools}/libexec/android-sdk/build-tools/28.0.3/lib/apksigner.jar" 15 - ''; 16 - in 17 10 python3Packages.buildPythonApplication rec { 18 11 pname = "diffoscope"; 19 12 version = "178";
+2 -2
pkgs/tools/security/fail2ban/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, python3 }: 2 2 3 - let version = "0.11.1"; in 3 + let version = "0.11.2"; in 4 4 5 5 python3.pkgs.buildPythonApplication { 6 6 pname = "fail2ban"; ··· 10 10 owner = "fail2ban"; 11 11 repo = "fail2ban"; 12 12 rev = version; 13 - sha256 = "0kqvkxpb72y3kgmxf6g36w67499c6gcd2a9yyblagwx12y05f1sh"; 13 + sha256 = "q4U9iWCa1zg8sA+6pPNejt6v/41WGIKN5wITJCrCqQE="; 14 14 }; 15 15 16 16 pythonPath = with python3.pkgs;
+22
pkgs/tools/security/minio-certgen/default.nix
··· 1 + { lib, fetchFromGitHub, buildGoModule }: 2 + 3 + buildGoModule rec { 4 + pname = "minio-certgen"; 5 + version = "0.0.2"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "minio"; 9 + repo = "certgen"; 10 + rev = "v${version}"; 11 + sha256 = "sha256-HtzcoEUMt3LpQNyT0wGcmc4Q70QqHx7QpjrDh4YSO/Q="; 12 + }; 13 + 14 + vendorSha256 = "sha256-pQpattmS9VmO3ZIQUFn66az8GSmB4IvYhTTCFn6SUmo="; 15 + 16 + meta = with lib; { 17 + description = "A simple Minio tool to generate self-signed certificates, and provides SAN certificates with DNS and IP entries"; 18 + downloadPage = "https://github.com/minio/certgen"; 19 + license = licenses.bsd3; 20 + maintainers = with maintainers; [ superherointj ]; 21 + }; 22 + }
+56
pkgs/tools/typesetting/pdfchain/default.nix
··· 1 + { lib, stdenv, fetchurl, fetchpatch 2 + , autoconf, gtkmm3, glib, pdftk, pkg-config, wrapGAppsHook 3 + }: 4 + 5 + stdenv.mkDerivation rec { 6 + pname = "pdfchain"; 7 + version = "0.4.4.2"; 8 + 9 + src = fetchurl { 10 + url = "mirror://sourceforge/${pname}/${pname}-${version}/${pname}-${version}.tar.gz"; 11 + sha256 = "sha256-Hu4Pk9voyc75+f5OwKEOCkXKjN5nzWzv+izmyEN1Lz0="; 12 + }; 13 + 14 + nativeBuildInputs = [ 15 + pkg-config wrapGAppsHook autoconf 16 + ]; 17 + 18 + buildInputs = [ 19 + gtkmm3 pdftk glib 20 + ]; 21 + 22 + patches = let 23 + fetchDebianPatch = {name, sha256}: fetchpatch { 24 + url = "https://salsa.debian.org/debian/pdfchain/raw/2d29107756a3194fb522bdea8e9b9e393b15a8f3/debian/patches/${name}"; 25 + inherit name sha256; 26 + }; 27 + in 28 + [ 29 + (fetchDebianPatch { 30 + name = "fix_crash_on_startup"; 31 + sha256 = "sha256-1UyMHHGrmUIFhY53ILdMMsyocSIbcV6CKQ7sLVNhNQw="; 32 + }) 33 + (fetchDebianPatch { 34 + name = "fix_desktop_file"; 35 + sha256 = "sha256-L6lhUs7GqVN1XOQO6bbz6BT29n4upsJtlHCAIGzk1Bw="; 36 + }) 37 + (fetchDebianPatch { 38 + name = "fix_spelling"; 39 + sha256 = "sha256-sOUUslPfcOo2K3zuaLcux+CNdgfWM0phsfe6g4GUFes="; 40 + }) 41 + ]; 42 + 43 + postPatch = '' 44 + substituteInPlace src/constant.h \ 45 + --replace '"pdftk"' '"${pdftk}/bin/pdftk"' \ 46 + --replace "/usr/share" "$out/share" 47 + ''; 48 + 49 + meta = with lib; { 50 + description = "A graphical user interface for the PDF Toolkit (PDFtk)"; 51 + homepage = "https://pdfchain.sourceforge.io"; 52 + license = licenses.gpl3Only; 53 + maintainers = with maintainers; [ hqurve ]; 54 + platforms = platforms.linux; 55 + }; 56 + }
-1
pkgs/tools/video/swftools/default.nix
··· 19 19 license = licenses.gpl2Only; 20 20 maintainers = [ maintainers.koral ]; 21 21 platforms = lib.platforms.unix; 22 - broken = true; 23 22 knownVulnerabilities = [ 24 23 "CVE-2017-10976" 25 24 "CVE-2017-11096"
+1
pkgs/top-level/aliases.nix
··· 424 424 libqrencode = qrencode; # added 2019-01-01 425 425 librdf = lrdf; # added 2020-03-22 426 426 librecad2 = librecad; # backwards compatibility alias, added 2015-10 427 + librsync_0_9 = throw "librsync_0_9 has been removed"; # added 2021-07-24 427 428 libseat = seatd; # added 2021-06-24 428 429 libsysfs = sysfsutils; # added 2018-04-25 429 430 libtidy = html-tidy; # added 2014-12-21
+29 -12
pkgs/top-level/all-packages.nix
··· 1105 1105 1106 1106 apksigcopier = callPackage ../development/tools/apksigcopier { }; 1107 1107 1108 + apksigner = callPackage ../development/tools/apksigner { 1109 + inherit (androidenv.androidPkgs_9_0) build-tools; 1110 + }; 1111 + 1108 1112 apktool = callPackage ../development/tools/apktool { 1109 1113 inherit (androidenv.androidPkgs_9_0) build-tools; 1110 1114 }; ··· 3543 3547 3544 3548 bsdiff = callPackage ../tools/compression/bsdiff { }; 3545 3549 3546 - btar = callPackage ../tools/backup/btar { 3547 - librsync = librsync_0_9; 3548 - }; 3550 + btar = callPackage ../tools/backup/btar { }; 3549 3551 3550 3552 bud = callPackage ../tools/networking/bud { }; 3551 3553 ··· 4202 4204 diff-so-fancy = callPackage ../applications/version-management/git-and-tools/diff-so-fancy { }; 4203 4205 4204 4206 diffoscopeMinimal = callPackage ../tools/misc/diffoscope { 4205 - inherit (androidenv.androidPkgs_9_0) build-tools; 4206 4207 jdk = jdk8; 4207 4208 }; 4208 4209 ··· 5509 5510 5510 5511 gpp = callPackage ../development/tools/gpp { }; 5511 5512 5512 - gpredict = callPackage ../applications/science/astronomy/gpredict { }; 5513 + gpredict = callPackage ../applications/science/astronomy/gpredict { 5514 + hamlib = hamlib_4; 5515 + }; 5513 5516 5514 5517 gptfdisk = callPackage ../tools/system/gptfdisk { }; 5515 5518 ··· 7074 7077 minetime = callPackage ../applications/office/minetime { }; 7075 7078 7076 7079 minio-client = callPackage ../tools/networking/minio-client { }; 7080 + 7081 + minio-certgen = callPackage ../tools/security/minio-certgen { }; 7077 7082 7078 7083 minissdpd = callPackage ../tools/networking/minissdpd { }; 7079 7084 ··· 15537 15542 gsettings-qt = libsForQt5.callPackage ../development/libraries/gsettings-qt { }; 15538 15543 15539 15544 gst_all_1 = recurseIntoAttrs(callPackage ../development/libraries/gstreamer { 15540 - callPackage = newScope { libav = pkgs.ffmpeg; }; 15545 + callPackage = newScope (gst_all_1 // { libav = pkgs.ffmpeg; }); 15541 15546 inherit (darwin.apple_sdk.frameworks) AudioToolbox AVFoundation Cocoa CoreFoundation CoreMedia CoreServices CoreVideo DiskArbitration Foundation IOKit MediaToolbox OpenGL VideoToolbox; 15542 15547 }); 15543 15548 ··· 15760 15765 15761 15766 gwenhywfar = callPackage ../development/libraries/aqbanking/gwenhywfar.nix { }; 15762 15767 15763 - hamlib = callPackage ../development/libraries/hamlib { }; 15768 + hamlib = hamlib_3; 15769 + hamlib_3 = callPackage ../development/libraries/hamlib { }; 15770 + hamlib_4 = callPackage ../development/libraries/hamlib/4.nix { }; 15764 15771 15765 15772 heimdal = callPackage ../development/libraries/kerberos/heimdal.nix { 15766 15773 inherit (darwin.apple_sdk.frameworks) CoreFoundation Security SystemConfiguration; ··· 17043 17050 17044 17051 librsync = callPackage ../development/libraries/librsync { }; 17045 17052 17046 - librsync_0_9 = callPackage ../development/libraries/librsync/0.9.nix { }; 17047 - 17048 17053 librttopo = callPackage ../development/libraries/librttopo { }; 17049 17054 17050 17055 libs3 = callPackage ../development/libraries/libs3 { }; ··· 23517 23522 python3Packages = python37Packages; 23518 23523 }; 23519 23524 23520 - cqrlog = callPackage ../applications/radio/cqrlog { }; 23525 + cqrlog = callPackage ../applications/radio/cqrlog { 23526 + hamlib = hamlib_4; 23527 + }; 23521 23528 23522 23529 crun = callPackage ../applications/virtualization/crun {}; 23523 23530 ··· 23596 23603 inherit (pkgs.gnome2) libart_lgpl libgnomeui; 23597 23604 }; 23598 23605 23599 - direwolf = callPackage ../applications/radio/direwolf { }; 23606 + direwolf = callPackage ../applications/radio/direwolf { 23607 + hamlib = hamlib_4; 23608 + }; 23600 23609 23601 23610 dirt = callPackage ../applications/audio/dirt {}; 23602 23611 ··· 23928 23937 23929 23938 flexget = callPackage ../applications/networking/flexget { }; 23930 23939 23931 - fldigi = callPackage ../applications/radio/fldigi { }; 23940 + fldigi = callPackage ../applications/radio/fldigi { 23941 + hamlib = hamlib_4; 23942 + }; 23932 23943 23933 23944 flink = callPackage ../applications/networking/cluster/flink { }; 23934 23945 ··· 26374 26385 inherit (gnome2) libgnomecanvas; 26375 26386 }; 26376 26387 26388 + pdfchain = callPackage ../tools/typesetting/pdfchain { }; 26389 + 26377 26390 pdfcpu = callPackage ../applications/graphics/pdfcpu { }; 26378 26391 pdftk = callPackage ../tools/typesetting/pdftk { 26379 26392 jre = jre8; # TODO: remove override https://github.com/NixOS/nixpkgs/pull/89731 ··· 26434 26447 startupnotification = libstartup_notification; 26435 26448 plugins = []; 26436 26449 }; 26450 + 26451 + pidgin-indicator = callPackage ../applications/networking/instant-messengers/pidgin-plugins/pidgin-indicator { }; 26437 26452 26438 26453 pidgin-latex = callPackage ../applications/networking/instant-messengers/pidgin-plugins/pidgin-latex { 26439 26454 texLive = texlive.combined.scheme-basic; ··· 26961 26976 slrn = callPackage ../applications/networking/newsreaders/slrn { }; 26962 26977 26963 26978 sniproxy = callPackage ../applications/networking/sniproxy { }; 26979 + 26980 + snixembed = callPackage ../applications/misc/snixembed { }; 26964 26981 26965 26982 sooperlooper = callPackage ../applications/audio/sooperlooper { }; 26966 26983
+6
pkgs/top-level/python-packages.nix
··· 2734 2734 2735 2735 freezegun = callPackage ../development/python-modules/freezegun { }; 2736 2736 2737 + frilouz = callPackage ../development/python-modules/frilouz { }; 2738 + 2737 2739 fritzconnection = callPackage ../development/python-modules/fritzconnection { }; 2738 2740 2739 2741 fritzprofiles = callPackage ../development/python-modules/fritzprofiles { }; ··· 6215 6217 6216 6218 pylxd = callPackage ../development/python-modules/pylxd { }; 6217 6219 6220 + pylzma = callPackage ../development/python-modules/pylzma { }; 6221 + 6218 6222 pymacaroons = callPackage ../development/python-modules/pymacaroons { }; 6219 6223 6220 6224 pymaging = callPackage ../development/python-modules/pymaging { }; ··· 8457 8461 sympy = callPackage ../development/python-modules/sympy { }; 8458 8462 8459 8463 syncer = callPackage ../development/python-modules/syncer { }; 8464 + 8465 + synergy = callPackage ../development/python-modules/synergy { }; 8460 8466 8461 8467 synologydsm-api = callPackage ../development/python-modules/synologydsm-api { }; 8462 8468