Merge staging-next into staging

authored by github-actions[bot] and committed by GitHub 335de1a8 f89ef2c9

+209 -26
+2 -2
pkgs/applications/editors/geany/default.nix
··· 12 13 stdenv.mkDerivation rec { 14 pname = "geany"; 15 - version = "1.37.1"; 16 17 outputs = [ "out" "dev" "doc" "man" ]; 18 19 src = fetchurl { 20 url = "https://download.geany.org/${pname}-${version}.tar.bz2"; 21 - sha256 = "060sachn33xpx3a609f09y97qq5ky17gvv686zbvrn618ij7bi8q"; 22 }; 23 24 nativeBuildInputs = [
··· 12 13 stdenv.mkDerivation rec { 14 pname = "geany"; 15 + version = "1.38"; 16 17 outputs = [ "out" "dev" "doc" "man" ]; 18 19 src = fetchurl { 20 url = "https://download.geany.org/${pname}-${version}.tar.bz2"; 21 + sha256 = "abff176e4d48bea35ee53037c49c82f90b6d4c23e69aed6e4a5ca8ccd3aad546"; 22 }; 23 24 nativeBuildInputs = [
+4 -4
pkgs/applications/editors/neovim/neovide/default.nix
··· 22 }: 23 rustPlatform.buildRustPackage rec { 24 pname = "neovide"; 25 - version = "unstable-2021-08-08"; 26 27 src = fetchFromGitHub { 28 owner = "Kethku"; 29 repo = "neovide"; 30 - rev = "725f12cafd4a26babd0d6bbcbca9a99c181991ac"; 31 - sha256 = "sha256-ThMobWKe3wHhR15TmmKrI6Gp1wvGVfJ52MzibK0ubkc="; 32 }; 33 34 - cargoSha256 = "sha256-5lOGncnyA8DwetY5bU6k2KXNClFgp+xIBEeA0/iwGF0="; 35 36 SKIA_SOURCE_DIR = 37 let
··· 22 }: 23 rustPlatform.buildRustPackage rec { 24 pname = "neovide"; 25 + version = "unstable-2021-10-09"; 26 27 src = fetchFromGitHub { 28 owner = "Kethku"; 29 repo = "neovide"; 30 + rev = "7f76ad4764197ba75bb9263d25b265d801563ccf"; 31 + sha256 = "sha256-kcP0WSk3quTaWCGQYN4zYlDQ9jhx/Vu6AamSLGFszwQ="; 32 }; 33 34 + cargoSha256 = "sha256-TQEhz9FtvIb/6Qtyz018dPle0+nub1oMZMFtKAqYcoI="; 35 36 SKIA_SOURCE_DIR = 37 let
+6 -4
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 768 "version": "0.1.1" 769 }, 770 "openstack": { 771 - "owner": "terraform-providers", 772 "repo": "terraform-provider-openstack", 773 - "rev": "v1.28.0", 774 - "sha256": "1g2nxv312ddvkgpph17m9sh4zmy5ddj8gqwnfb3frbfbbamrgar6", 775 - "version": "1.28.0" 776 }, 777 "opentelekomcloud": { 778 "owner": "terraform-providers",
··· 768 "version": "0.1.1" 769 }, 770 "openstack": { 771 + "owner": "terraform-provider-openstack", 772 + "provider-source-address": "registry.terraform.io/terraform-provider-openstack/openstack", 773 "repo": "terraform-provider-openstack", 774 + "rev": "v1.43.1", 775 + "sha256": "0n6r88p3a6p8p0gjys2r1kcgkwq450jmyd741g45lxmaf3jz2ynb", 776 + "vendorSha256": "0k4srszs8xgf8gz4fa7ysqyww52d7kvqy6zf22f1gkcjyiks9pl7", 777 + "version": "1.43.1" 778 }, 779 "opentelekomcloud": { 780 "owner": "terraform-providers",
+14
pkgs/build-support/libredirect/libredirect.c
··· 279 rewriteSystemCall(command, newCommand); 280 return _system(newCommand); 281 }
··· 279 rewriteSystemCall(command, newCommand); 280 return _system(newCommand); 281 } 282 + 283 + int mkdir(const char *path, mode_t mode) 284 + { 285 + int (*mkdir_real) (const char *path, mode_t mode) = dlsym(RTLD_NEXT, "mkdir"); 286 + char buf[PATH_MAX]; 287 + return mkdir_real(rewrite(path, buf), mode); 288 + } 289 + 290 + int mkdirat(int dirfd, const char *path, mode_t mode) 291 + { 292 + int (*mkdirat_real) (int dirfd, const char *path, mode_t mode) = dlsym(RTLD_NEXT, "mkdirat"); 293 + char buf[PATH_MAX]; 294 + return mkdirat_real(dirfd, rewrite(path, buf), mode); 295 + }
+2 -2
pkgs/development/python-modules/deezer-python/default.nix
··· 12 13 buildPythonPackage rec { 14 pname = "deezer-python"; 15 - version = "2.4.0"; 16 format = "pyproject"; 17 18 disabled = pythonOlder "3.6"; ··· 21 owner = "browniebroke"; 22 repo = pname; 23 rev = "v${version}"; 24 - sha256 = "sha256-4Jjkhlv3wK4j2uU8dT11WYuBttlFtg+/ZBrc57UVeao="; 25 }; 26 27 nativeBuildInputs = [
··· 12 13 buildPythonPackage rec { 14 pname = "deezer-python"; 15 + version = "3.1.0"; 16 format = "pyproject"; 17 18 disabled = pythonOlder "3.6"; ··· 21 owner = "browniebroke"; 22 repo = pname; 23 rev = "v${version}"; 24 + sha256 = "1ln9hlix6rbyajgvwd2lk0i7nshvrbkvj9xx1i0q1z1caly9yl0g"; 25 }; 26 27 nativeBuildInputs = [
-5
pkgs/development/python-modules/labgrid/default.nix
··· 65 pytest-dependency 66 ]; 67 68 - disabledTests = [ 69 - "docker" 70 - "sshmanager" 71 - ]; 72 - 73 meta = with lib; { 74 description = "Embedded control & testing library"; 75 homepage = "https://labgrid.org";
··· 65 pytest-dependency 66 ]; 67 68 meta = with lib; { 69 description = "Embedded control & testing library"; 70 homepage = "https://labgrid.org";
+41
pkgs/development/python-modules/smbus2/default.nix
···
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , nose 5 + , pythonOlder 6 + }: 7 + 8 + buildPythonPackage rec { 9 + pname = "smbus2"; 10 + version = "0.4.1"; 11 + 12 + disabled = pythonOlder "3.6"; 13 + 14 + src = fetchFromGitHub { 15 + owner = "kplindegaard"; 16 + repo = pname; 17 + rev = version; 18 + sha256 = "0xgqs7bzhr8y3irc9gq3dnw1l3f5gc1yv4r2v4qxj95i3vvzpg5s"; 19 + }; 20 + 21 + checkInputs = [ 22 + nose 23 + ]; 24 + 25 + checkPhase = '' 26 + runHook preCheck 27 + nosetests 28 + runHook postCheck 29 + ''; 30 + 31 + pythonImportsCheck = [ 32 + "smbus2" 33 + ]; 34 + 35 + meta = with lib; { 36 + description = "Drop-in replacement for smbus-cffi/smbus-python"; 37 + homepage = "https://smbus2.readthedocs.io/"; 38 + license = licenses.mit; 39 + maintainers = with maintainers; [ fab ]; 40 + }; 41 + }
+4 -2
pkgs/development/python-modules/teslajsonpy/default.nix
··· 6 , buildPythonPackage 7 , fetchFromGitHub 8 , fetchpatch 9 , poetry-core 10 , pytest-asyncio 11 , pytestCheckHook ··· 14 15 buildPythonPackage rec { 16 pname = "teslajsonpy"; 17 - version = "0.21.0"; 18 format = "pyproject"; 19 20 src = fetchFromGitHub { 21 owner = "zabuldon"; 22 repo = pname; 23 rev = "v${version}"; 24 - sha256 = "1rwp3aag21hdkis2wx680ckja0203grm7naldaj8d2kpy4697m54"; 25 }; 26 27 nativeBuildInputs = [ ··· 33 aiohttp 34 backoff 35 beautifulsoup4 36 wrapt 37 ]; 38
··· 6 , buildPythonPackage 7 , fetchFromGitHub 8 , fetchpatch 9 + , httpx 10 , poetry-core 11 , pytest-asyncio 12 , pytestCheckHook ··· 15 16 buildPythonPackage rec { 17 pname = "teslajsonpy"; 18 + version = "1.0.0"; 19 format = "pyproject"; 20 21 src = fetchFromGitHub { 22 owner = "zabuldon"; 23 repo = pname; 24 rev = "v${version}"; 25 + sha256 = "1xkr0pmz458vh8b90ydykmgddhisay347vp48j50d1v0a55xvqsa"; 26 }; 27 28 nativeBuildInputs = [ ··· 34 aiohttp 35 backoff 36 beautifulsoup4 37 + httpx 38 wrapt 39 ]; 40
+4 -2
pkgs/development/tools/yarn2nix-moretea/yarn2nix/lib/generateNix.js
··· 45 name = "${fileName}"; 46 path = 47 let${builtinFetchGit ? ` 48 - repo = builtins.fetchGit { 49 url = "${url}"; 50 ref = "${branch}"; 51 rev = "${rev}"; 52 - }; 53 ` : ` 54 repo = fetchgit { 55 url = "${url}";
··· 45 name = "${fileName}"; 46 path = 47 let${builtinFetchGit ? ` 48 + repo = builtins.fetchGit ({ 49 url = "${url}"; 50 ref = "${branch}"; 51 rev = "${rev}"; 52 + } // (if builtins.substring 0 3 builtins.nixVersion == "2.4" then { 53 + allRefs = true; 54 + } else {})); 55 ` : ` 56 repo = fetchgit { 57 url = "${url}";
+2 -3
pkgs/misc/lilypond/with-fonts.nix
··· 1 - { lib, lndir, symlinkJoin, makeWrapper 2 , lilypond, openlilylib-fonts 3 }: 4 ··· 8 paths = [ lilypond ] ++ openlilylib-fonts.all; 9 10 nativeBuildInputs = [ makeWrapper ]; 11 - buildInputs = [ lndir ]; 12 13 postBuild = '' 14 for p in $out/bin/*; do 15 - wrapProgram "$p" --set LILYPOND_DATADIR "$datadir" 16 done 17 ''; 18 })
··· 1 + { lib, symlinkJoin, makeWrapper 2 , lilypond, openlilylib-fonts 3 }: 4 ··· 8 paths = [ lilypond ] ++ openlilylib-fonts.all; 9 10 nativeBuildInputs = [ makeWrapper ]; 11 12 postBuild = '' 13 for p in $out/bin/*; do 14 + wrapProgram "$p" --set LILYPOND_DATADIR "$out/share/lilypond/${lilypond.version}" 15 done 16 ''; 17 })
+2 -2
pkgs/servers/mpd/default.nix
··· 116 117 in stdenv.mkDerivation rec { 118 pname = "mpd"; 119 - version = "0.22.10"; 120 121 src = fetchFromGitHub { 122 owner = "MusicPlayerDaemon"; 123 repo = "MPD"; 124 rev = "v${version}"; 125 - sha256 = "sha256-h9dmi8AI8ZCjF4nlTi07uOWKs+8gly2HhSbPRB3Jl0g="; 126 }; 127 128 buildInputs = [
··· 116 117 in stdenv.mkDerivation rec { 118 pname = "mpd"; 119 + version = "0.22.11"; 120 121 src = fetchFromGitHub { 122 owner = "MusicPlayerDaemon"; 123 repo = "MPD"; 124 rev = "v${version}"; 125 + sha256 = "sha256-X+FnZ5W1p9GuOSIxTSp1Yok+kKsLjNPOKZkJSCYk8kM="; 126 }; 127 128 buildInputs = [
+39
pkgs/tools/compression/crabz/default.nix
···
··· 1 + { lib 2 + , rustPlatform 3 + , fetchFromGitHub 4 + , cmake 5 + , stdenv 6 + , libiconv 7 + , CoreFoundation 8 + , Security 9 + }: 10 + 11 + rustPlatform.buildRustPackage rec { 12 + pname = "crabz"; 13 + version = "0.7.2"; 14 + 15 + src = fetchFromGitHub { 16 + owner = "sstadick"; 17 + repo = pname; 18 + rev = "v${version}"; 19 + sha256 = "0ch9cqarsakihg9ymbdm0ka6wz77z84n4g6cdlcskczc5g3b9gp9"; 20 + }; 21 + 22 + cargoSha256 = "sha256-nrCYlhq/f8gk3NmltAg+xppRJ533ooEpetWvaF2vmP0="; 23 + 24 + nativeBuildInputs = [ cmake ]; 25 + 26 + buildInputs = lib.optionals stdenv.isDarwin [ 27 + libiconv 28 + CoreFoundation 29 + Security 30 + ]; 31 + 32 + meta = with lib; { 33 + description = "A cross platform, fast, compression and decompression tool"; 34 + homepage = "https://github.com/sstadick/crabz"; 35 + changelog = "https://github.com/sstadick/crabz/blob/v${version}/CHANGELOG.md"; 36 + license = with licenses; [ unlicense /* or */ mit ]; 37 + maintainers = with maintainers; [ figsoda ]; 38 + }; 39 + }
+36
pkgs/tools/networking/suckit/default.nix
···
··· 1 + { lib 2 + , rustPlatform 3 + , fetchFromGitHub 4 + , pkg-config 5 + , openssl 6 + , stdenv 7 + , Security 8 + }: 9 + 10 + rustPlatform.buildRustPackage rec { 11 + pname = "suckit"; 12 + version = "0.1.2"; 13 + 14 + src = fetchFromGitHub { 15 + owner = "skallwar"; 16 + repo = pname; 17 + rev = "v${version}"; 18 + sha256 = "0wr03yvrqa9p6m127fl4hcf9057i11zld898qz4kbdyiynpi0166"; 19 + }; 20 + 21 + cargoSha256 = "sha256-6otIWAAf9pI4A8kxK3dyOVpkw+SJ3/YAvTahDSXMWNc="; 22 + 23 + nativeBuildInputs = [ pkg-config ]; 24 + 25 + buildInputs = [ openssl ] ++ lib.optional stdenv.isDarwin Security; 26 + 27 + # requires internet access 28 + checkFlags = [ "--skip=test_download_url" ]; 29 + 30 + meta = with lib; { 31 + description = "Recursively visit and download a website's content to your disk"; 32 + homepage = "https://github.com/skallwar/suckit"; 33 + license = with licenses; [ asl20 /* or */ mit ]; 34 + maintainers = with maintainers; [ figsoda ]; 35 + }; 36 + }
+41
pkgs/tools/package-management/nix-eval-jobs/default.nix
···
··· 1 + { lib 2 + , boost 3 + , cmake 4 + , fetchFromGitHub 5 + , meson 6 + , ninja 7 + , nixUnstable 8 + , nlohmann_json 9 + , pkg-config 10 + , stdenv 11 + }: 12 + stdenv.mkDerivation rec { 13 + pname = "nix-eval-jobs"; 14 + version = "0.0.1"; 15 + src = fetchFromGitHub { 16 + owner = "nix-community"; 17 + repo = pname; 18 + rev = "v${version}"; 19 + hash = "sha256-LTMW4356f8pvIyfYdOyZbF9yzU8MH9mryQgB4LrwZMI="; 20 + }; 21 + buildInputs = [ 22 + boost 23 + nixUnstable 24 + nlohmann_json 25 + ]; 26 + nativeBuildInputs = [ 27 + meson 28 + ninja 29 + pkg-config 30 + # nlohmann_json can be only discovered via cmake files 31 + cmake 32 + ]; 33 + 34 + meta = { 35 + description = "Hydra's builtin hydra-eval-jobs as a standalone"; 36 + homepage = "https://github.com/nix-community/nix-eval-jobs"; 37 + license = lib.licenses.gpl3; 38 + maintainers = with lib.maintainers; [ adisbladis mic92 ]; 39 + platforms = lib.platforms.unix; 40 + }; 41 + }
+10
pkgs/top-level/all-packages.nix
··· 3914 3915 cpuminer-multi = callPackage ../tools/misc/cpuminer-multi { }; 3916 3917 cryptpad = callPackage ../servers/web-apps/cryptpad { 3918 nodejs = nodejs-12_x; 3919 }; ··· 9534 subsonic = callPackage ../servers/misc/subsonic { }; 9535 9536 subfinder = callPackage ../tools/networking/subfinder { }; 9537 9538 surfraw = callPackage ../tools/networking/surfraw { }; 9539 ··· 32034 nixdoc = callPackage ../tools/nix/nixdoc {}; 32035 32036 dnadd = callPackage ../tools/nix/dnadd { }; 32037 32038 nix-doc = callPackage ../tools/package-management/nix-doc { }; 32039
··· 3914 3915 cpuminer-multi = callPackage ../tools/misc/cpuminer-multi { }; 3916 3917 + crabz = callPackage ../tools/compression/crabz { 3918 + inherit (darwin.apple_sdk.frameworks) CoreFoundation Security; 3919 + }; 3920 + 3921 cryptpad = callPackage ../servers/web-apps/cryptpad { 3922 nodejs = nodejs-12_x; 3923 }; ··· 9538 subsonic = callPackage ../servers/misc/subsonic { }; 9539 9540 subfinder = callPackage ../tools/networking/subfinder { }; 9541 + 9542 + suckit = callPackage ../tools/networking/suckit { 9543 + inherit (darwin.apple_sdk.frameworks) Security; 9544 + }; 9545 9546 surfraw = callPackage ../tools/networking/surfraw { }; 9547 ··· 32042 nixdoc = callPackage ../tools/nix/nixdoc {}; 32043 32044 dnadd = callPackage ../tools/nix/dnadd { }; 32045 + 32046 + nix-eval-jobs = callPackage ../tools/package-management/nix-eval-jobs { }; 32047 32048 nix-doc = callPackage ../tools/package-management/nix-doc { }; 32049
+2
pkgs/top-level/python-packages.nix
··· 8459 8460 smbus-cffi = callPackage ../development/python-modules/smbus-cffi { }; 8461 8462 smdebug-rulesconfig = callPackage ../development/python-modules/smdebug-rulesconfig { }; 8463 8464 smhi-pkg = callPackage ../development/python-modules/smhi-pkg { };
··· 8459 8460 smbus-cffi = callPackage ../development/python-modules/smbus-cffi { }; 8461 8462 + smbus2 = callPackage ../development/python-modules/smbus2 { }; 8463 + 8464 smdebug-rulesconfig = callPackage ../development/python-modules/smdebug-rulesconfig { }; 8465 8466 smhi-pkg = callPackage ../development/python-modules/smhi-pkg { };