lol

Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
450e6608 bc1f4b79

+178 -136
-1
nixos/tests/systemd-networkd.nix
··· 6 networking.firewall.enable = false; 7 virtualisation.vlans = [ 1 ]; 8 environment.systemPackages = with pkgs; [ wireguard-tools ]; 9 - boot.extraModulePackages = [ config.boot.kernelPackages.wireguard ]; 10 systemd.network = { 11 enable = true; 12 netdevs = {
··· 6 networking.firewall.enable = false; 7 virtualisation.vlans = [ 1 ]; 8 environment.systemPackages = with pkgs; [ wireguard-tools ]; 9 systemd.network = { 10 enable = true; 11 netdevs = {
+2 -2
pkgs/applications/audio/squeezelite/default.nix
··· 2 , alsaLib, flac, libmad, libvorbis, mpg123 3 , dsdSupport ? true 4 , faad2Support ? true, faad2 5 - , ffmpegSupport ? true, ffmpeg_3 6 , opusSupport ? true, opusfile 7 , resampleSupport ? true, soxr 8 , sslSupport ? true, openssl ··· 35 36 buildInputs = [ alsaLib flac libmad libvorbis mpg123 ] 37 ++ optional faad2Support faad2 38 - ++ optional ffmpegSupport ffmpeg_3 39 ++ optional opusSupport opusfile 40 ++ optional resampleSupport soxr 41 ++ optional sslSupport openssl;
··· 2 , alsaLib, flac, libmad, libvorbis, mpg123 3 , dsdSupport ? true 4 , faad2Support ? true, faad2 5 + , ffmpegSupport ? true, ffmpeg 6 , opusSupport ? true, opusfile 7 , resampleSupport ? true, soxr 8 , sslSupport ? true, openssl ··· 35 36 buildInputs = [ alsaLib flac libmad libvorbis mpg123 ] 37 ++ optional faad2Support faad2 38 + ++ optional ffmpegSupport ffmpeg 39 ++ optional opusSupport opusfile 40 ++ optional resampleSupport soxr 41 ++ optional sslSupport openssl;
+2 -2
pkgs/applications/networking/browsers/palemoon/default.nix
··· 142 ac_add_options --enable-jemalloc 143 ac_add_options --enable-strip 144 ac_add_options --enable-devtools 145 146 ac_add_options --disable-eme 147 ac_add_options --disable-webrtc ··· 158 export MOZILLA_OFFICIAL=1 159 160 ac_add_options --x-libraries=${lib.makeLibraryPath [ xorg.libX11 ]} 161 - 162 - export MOZ_PKG_SPECIAL=gtk$_GTK_VERSION 163 164 # 165 # NixOS-specific adjustments
··· 142 ac_add_options --enable-jemalloc 143 ac_add_options --enable-strip 144 ac_add_options --enable-devtools 145 + # Missing from build instructions, https://forum.palemoon.org/viewtopic.php?f=5&t=25843#p214767 146 + ac_add_options --enable-av1 147 148 ac_add_options --disable-eme 149 ac_add_options --disable-webrtc ··· 160 export MOZILLA_OFFICIAL=1 161 162 ac_add_options --x-libraries=${lib.makeLibraryPath [ xorg.libX11 ]} 163 164 # 165 # NixOS-specific adjustments
+2 -2
pkgs/applications/version-management/git-repo/default.nix
··· 4 5 stdenv.mkDerivation rec { 6 pname = "git-repo"; 7 - version = "2.13.1"; 8 9 src = fetchFromGitHub { 10 owner = "android"; 11 repo = "tools_repo"; 12 rev = "v${version}"; 13 - sha256 = "sha256-D6gh14XOZ6Fjypfhg9l5ozPhyf6u6M0Wc8HdagdPM/Q="; 14 }; 15 16 patches = [ ./import-ssl-module.patch ];
··· 4 5 stdenv.mkDerivation rec { 6 pname = "git-repo"; 7 + version = "2.14.5"; 8 9 src = fetchFromGitHub { 10 owner = "android"; 11 repo = "tools_repo"; 12 rev = "v${version}"; 13 + sha256 = "sha256-3FSkWpHda1jVhy/633B+ippWcbKd83IlQcJYS9Qx5wQ="; 14 }; 15 16 patches = [ ./import-ssl-module.patch ];
-25
pkgs/development/idris-modules/data.nix
··· 1 - { build-idris-package 2 - , fetchFromGitHub 3 - , contrib 4 - , lib 5 - }: 6 - build-idris-package { 7 - name = "data"; 8 - version = "2018-03-19"; 9 - 10 - idrisDeps = [ contrib ]; 11 - 12 - src = fetchFromGitHub { 13 - owner = "jdevuyst"; 14 - repo = "idris-data"; 15 - rev = "105b78ac13235edc596287367a675d7cd04ce5d5"; 16 - sha256 = "17wz4jddan39984qibx2x7nv2zkqznv0fpab20nrm4zgy17v77ii"; 17 - }; 18 - 19 - meta = { 20 - description = "Functional data structures in Idris"; 21 - homepage = "https://github.com/jdevuyst/idris-data"; 22 - license = lib.licenses.bsd3; 23 - maintainers = [ lib.maintainers.brainrape ]; 24 - }; 25 - }
···
-2
pkgs/development/idris-modules/default.nix
··· 75 76 cube = callPackage ./cube.nix {}; 77 78 - data = callPackage ./data.nix {}; 79 - 80 derive = callPackage ./derive.nix {}; 81 82 descncrunch = callPackage ./descncrunch.nix {};
··· 75 76 cube = callPackage ./cube.nix {}; 77 78 derive = callPackage ./derive.nix {}; 79 80 descncrunch = callPackage ./descncrunch.nix {};
+2 -2
pkgs/development/php-packages/phpcbf/default.nix
··· 1 { mkDerivation, fetchurl, lib, php, makeWrapper }: 2 let 3 pname = "phpcbf"; 4 - version = "3.5.8"; 5 in 6 mkDerivation { 7 inherit pname version; 8 9 src = fetchurl { 10 url = "https://github.com/squizlabs/PHP_CodeSniffer/releases/download/${version}/phpcbf.phar"; 11 - sha256 = "15ci30yvw3p9zlmzsk9s4mxzb3wax3gl9p55slhf1bzwn1xxwyb0"; 12 }; 13 14 phases = [ "installPhase" ];
··· 1 { mkDerivation, fetchurl, lib, php, makeWrapper }: 2 let 3 pname = "phpcbf"; 4 + version = "3.6.0"; 5 in 6 mkDerivation { 7 inherit pname version; 8 9 src = fetchurl { 10 url = "https://github.com/squizlabs/PHP_CodeSniffer/releases/download/${version}/phpcbf.phar"; 11 + sha256 = "04wb1imm4934mpy2hxcmqh4cn7md1vwmfii39p6mby809325b5z1"; 12 }; 13 14 phases = [ "installPhase" ];
+2 -2
pkgs/development/php-packages/phpcs/default.nix
··· 1 { mkDerivation, fetchurl, makeWrapper, lib, php }: 2 let 3 pname = "phpcs"; 4 - version = "3.5.8"; 5 in 6 mkDerivation { 7 inherit pname version; 8 9 src = fetchurl { 10 url = "https://github.com/squizlabs/PHP_CodeSniffer/releases/download/${version}/phpcs.phar"; 11 - sha256 = "037mdnpbgd9xaj556pf14h02a4a6f5zzdg58p2z1sivxcygf8aka"; 12 }; 13 14 phases = [ "installPhase" ];
··· 1 { mkDerivation, fetchurl, makeWrapper, lib, php }: 2 let 3 pname = "phpcs"; 4 + version = "3.6.0"; 5 in 6 mkDerivation { 7 inherit pname version; 8 9 src = fetchurl { 10 url = "https://github.com/squizlabs/PHP_CodeSniffer/releases/download/${version}/phpcs.phar"; 11 + sha256 = "0sdi78hrwd3r5p1b38qmp89m41kfszh2qn4n5zhq2dmhsjdhjziz"; 12 }; 13 14 phases = [ "installPhase" ];
+36
pkgs/development/python-modules/ldaptor/19.nix
···
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchPypi 4 + , twisted 5 + , passlib 6 + , pyopenssl 7 + , pyparsing 8 + , service-identity 9 + , zope_interface 10 + , isPy3k 11 + , python 12 + }: 13 + 14 + buildPythonPackage rec { 15 + pname = "ldaptor"; 16 + version = "19.1.0"; 17 + 18 + src = fetchPypi { 19 + inherit pname version; 20 + sha256 = "64c7b870c77e34e4f5f9cfdf330b9702e89b4dd0f64275704f86c1468312c755"; 21 + }; 22 + 23 + propagatedBuildInputs = [ 24 + twisted passlib pyopenssl pyparsing service-identity zope_interface 25 + ]; 26 + 27 + disabled = isPy3k; 28 + 29 + doCheck = false; 30 + 31 + meta = { 32 + description = "A Pure-Python Twisted library for LDAP"; 33 + homepage = "https://github.com/twisted/ldaptor"; 34 + license = lib.licenses.mit; 35 + }; 36 + }
+6 -6
pkgs/development/python-modules/msal/default.nix
··· 9 10 buildPythonPackage rec { 11 pname = "msal"; 12 - version = "1.10.0"; 13 14 src = fetchPypi { 15 inherit pname version; 16 - sha256 = "582e92e3b9fa68084dca6ecfd8db866ddc75cd9043de267c79d6b6277dd27f55"; 17 }; 18 19 propagatedBuildInputs = [ ··· 22 ]; 23 24 # Tests assume Network Connectivity: 25 - # https://github.com/AzureAD/microsoft-authentication-library-for-python/blob/e2958961e8ec16d0af4199f60c36c3f913497e48/tests/test_authority.py#L73 26 doCheck = false; 27 28 meta = with lib; { 29 description = "The Microsoft Authentication Library (MSAL) for Python library enables your app to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect"; 30 homepage = "https://github.com/AzureAD/microsoft-authentication-library-for-python"; 31 license = licenses.mit; 32 - maintainers = with maintainers; [ 33 - kamadorueda 34 - ]; 35 }; 36 }
··· 9 10 buildPythonPackage rec { 11 pname = "msal"; 12 + version = "1.11.0"; 13 14 src = fetchPypi { 15 inherit pname version; 16 + sha256 = "sha256-RnrwK7lKh6G2lbUb+GdmfoKKzA3Twd5fpUP2kALbSfo="; 17 }; 18 19 propagatedBuildInputs = [ ··· 22 ]; 23 24 # Tests assume Network Connectivity: 25 + # https://github.com/AzureAD/microsoft-authentication-library-for-python/blob/e2958961e8ec16d0af4199f60c36c3f913497e48/tests/test_authority.py#L73 26 doCheck = false; 27 28 + pythonImportsCheck = [ "msal" ]; 29 + 30 meta = with lib; { 31 description = "The Microsoft Authentication Library (MSAL) for Python library enables your app to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect"; 32 homepage = "https://github.com/AzureAD/microsoft-authentication-library-for-python"; 33 license = licenses.mit; 34 + maintainers = with maintainers; [ kamadorueda ]; 35 }; 36 }
+18 -4
pkgs/development/python-modules/mwoauth/default.nix
··· 17 sha256 = "9e0d70a1fa6f452584de1cb853ae6c11f41233549f7839cfb879f99410f6ad46"; 18 }; 19 20 - # package has no tests 21 doCheck = false; 22 23 - propagatedBuildInputs = [ six pyjwt requests oauthlib requests_oauthlib ]; 24 25 meta = with lib; { 26 - description = "A library designed to provide a simple means to performing an OAuth handshake with a MediaWiki installation with the OAuth Extension installed."; 27 - homepage = "https://github.com/mediawiki-utilities/python-mwoauth"; 28 license = licenses.mit; 29 maintainers = with maintainers; [ ixxie ]; 30 };
··· 17 sha256 = "9e0d70a1fa6f452584de1cb853ae6c11f41233549f7839cfb879f99410f6ad46"; 18 }; 19 20 + propagatedBuildInputs = [ 21 + oauthlib 22 + pyjwt 23 + requests 24 + requests_oauthlib 25 + six 26 + ]; 27 + 28 + postPatch = '' 29 + # https://github.com/mediawiki-utilities/python-mwoauth/pull/43 30 + substituteInPlace setup.py --replace "PyJWT>=1.0.1,<2.0.0" "PyJWT>=1.0.1" 31 + ''; 32 + 33 + # PyPI source has no tests included 34 + # https://github.com/mediawiki-utilities/python-mwoauth/issues/44 35 doCheck = false; 36 37 + pythonImportsCheck = [ "mwoauth" ]; 38 39 meta = with lib; { 40 + description = "Python library to perform OAuth handshakes with a MediaWiki installation"; 41 + homepage = "https://github.com/mediawiki-utilities/python-mwoauth"; 42 license = licenses.mit; 43 maintainers = with maintainers; [ ixxie ]; 44 };
+16 -4
pkgs/development/python-modules/oauthenticator/default.nix
··· 14 15 buildPythonPackage rec { 16 pname = "oauthenticator"; 17 - version = "0.13.0"; 18 disabled = pythonOlder "3.6"; 19 20 src = fetchPypi { 21 inherit pname version; 22 - sha256 = "5202adcd96ddbbccbc267da02f2d14e977300c81291aaa77be4fd9f2e27cfa37"; 23 }; 24 25 propagatedBuildInputs = [ 26 jupyterhub 27 ]; 28 29 - pytestFlagsArray = [ "oauthenticator/tests" ]; 30 - 31 checkInputs = [ 32 google-api-python-client 33 google-auth-oauthlib ··· 37 pytestCheckHook 38 requests-mock 39 ]; 40 41 meta = with lib; { 42 description = "Authenticate JupyterHub users with common OAuth providers, including GitHub, Bitbucket, and more.";
··· 14 15 buildPythonPackage rec { 16 pname = "oauthenticator"; 17 + version = "14.0.0"; 18 disabled = pythonOlder "3.6"; 19 20 src = fetchPypi { 21 inherit pname version; 22 + sha256 = "1zfcl3dq9ladqg7fnpx6kgxf1ckjzlc8v3j6wa8w6iwglm40ax4r"; 23 }; 24 25 propagatedBuildInputs = [ 26 jupyterhub 27 ]; 28 29 checkInputs = [ 30 google-api-python-client 31 google-auth-oauthlib ··· 35 pytestCheckHook 36 requests-mock 37 ]; 38 + 39 + postPatch = '' 40 + # The constraint was removed. No longer needed for > 14.0.0 41 + # https://github.com/jupyterhub/oauthenticator/pull/431 42 + substituteInPlace test-requirements.txt --replace "pyjwt>=1.7,<2.0" "pyjwt" 43 + ''; 44 + 45 + disabledTests = [ 46 + # Test are outdated, https://github.com/jupyterhub/oauthenticator/issues/432 47 + "test_azuread" 48 + "test_mediawiki" 49 + ]; 50 + 51 + pythonImportsCheck = [ "oauthenticator" ]; 52 53 meta = with lib; { 54 description = "Authenticate JupyterHub users with common OAuth providers, including GitHub, Bitbucket, and more.";
+4 -4
pkgs/development/python-modules/privacyidea/default.nix
··· 1 { lib, buildPythonPackage, fetchFromGitHub, cacert, openssl, python, nixosTests 2 3 , cryptography, pyrad, pymysql, python-dateutil, flask-versioned, flask_script 4 - , defusedxml, croniter, flask_migrate, pyjwt, configobj, sqlsoup, pillow 5 , python-gnupg, passlib, pyopenssl, beautifulsoup4, smpplib, flask-babel 6 , ldap3, huey, pyyaml, qrcode, oauth2client, requests, lxml, cbor2, psycopg2 7 - , pydash 8 9 , mock, pytestCheckHook, responses, testfixtures 10 }: ··· 29 30 propagatedBuildInputs = [ 31 cryptography pyrad pymysql python-dateutil flask-versioned flask_script 32 - defusedxml croniter flask_migrate pyjwt configobj sqlsoup pillow 33 python-gnupg passlib pyopenssl beautifulsoup4 smpplib flask-babel 34 ldap3 huey pyyaml qrcode oauth2client requests lxml cbor2 psycopg2 35 - pydash 36 ]; 37 38 passthru.tests = { inherit (nixosTests) privacyidea; };
··· 1 { lib, buildPythonPackage, fetchFromGitHub, cacert, openssl, python, nixosTests 2 3 , cryptography, pyrad, pymysql, python-dateutil, flask-versioned, flask_script 4 + , defusedxml, croniter, flask_migrate, pyjwt1, configobj, sqlsoup, pillow 5 , python-gnupg, passlib, pyopenssl, beautifulsoup4, smpplib, flask-babel 6 , ldap3, huey, pyyaml, qrcode, oauth2client, requests, lxml, cbor2, psycopg2 7 + , pydash, ecdsa 8 9 , mock, pytestCheckHook, responses, testfixtures 10 }: ··· 29 30 propagatedBuildInputs = [ 31 cryptography pyrad pymysql python-dateutil flask-versioned flask_script 32 + defusedxml croniter flask_migrate pyjwt1 configobj sqlsoup pillow 33 python-gnupg passlib pyopenssl beautifulsoup4 smpplib flask-babel 34 ldap3 huey pyyaml qrcode oauth2client requests lxml cbor2 psycopg2 35 + pydash ecdsa 36 ]; 37 38 passthru.tests = { inherit (nixosTests) privacyidea; };
+9
pkgs/development/python-modules/pyflume/default.nix
··· 41 pytestCheckHook 42 ]; 43 44 pythonImportsCheck = [ "pyflume" ]; 45 46 meta = with lib; {
··· 41 pytestCheckHook 42 ]; 43 44 + postPatch = '' 45 + # https://github.com/ChrisMandich/PyFlume/issues/18 46 + substituteInPlace setup.py \ 47 + --replace "pyjwt==2.0.1" "pyjwt>=2.0.1" \ 48 + --replace "ratelimit==2.2.1" "ratelimit>=2.2.1" \ 49 + --replace "pytz==2019.2" "pytz>=2019.2" \ 50 + --replace "requests==2.24.0" "requests>=2.24.0" 51 + ''; 52 + 53 pythonImportsCheck = [ "pyflume" ]; 54 55 meta = with lib; {
+24 -17
pkgs/development/python-modules/pyjwt/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi 2 - , cryptography, ecdsa 3 - , pytestrunner, pytestcov, pytest }: 4 5 buildPythonPackage rec { 6 - pname = "PyJWT"; 7 - version = "2.0.1"; 8 9 src = fetchPypi { 10 - inherit pname version; 11 - sha256 = "a5c70a06e1f33d81ef25eecd50d50bd30e34de1ca8b2b9fa3fe0daaabcf69bf7"; 12 }; 13 14 - propagatedBuildInputs = [ cryptography ecdsa ]; 15 - 16 - checkInputs = [ pytestrunner pytestcov pytest ]; 17 18 - postPatch = '' 19 - substituteInPlace setup.py --replace "pytest>=4.0.1,<5.0.0" "pytest" 20 - ''; 21 22 - # ecdsa changed internal behavior 23 - checkPhase = '' 24 - pytest tests -k 'not ec_verify_should_return_false_if_signature_invalid' 25 - ''; 26 27 meta = with lib; { 28 description = "JSON Web Token implementation in Python";
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchPypi 4 + , cryptography 5 + , ecdsa 6 + , pytest-cov 7 + , pytestCheckHook 8 + , pythonOlder 9 + }: 10 11 buildPythonPackage rec { 12 + pname = "pyjwt"; 13 + version = "2.1.0"; 14 + disabled = pythonOlder "3.6"; 15 16 src = fetchPypi { 17 + pname = "PyJWT"; 18 + inherit version; 19 + sha256 = "sha256-+6ROeJi7yhYKKytQH0koJPyDgkhdOm8Rul0MGTfOYTA="; 20 }; 21 22 + propagatedBuildInputs = [ 23 + cryptography 24 + ecdsa 25 + ]; 26 27 + checkInputs = [ 28 + pytest-cov 29 + pytestCheckHook 30 + ]; 31 32 + pythonImportsCheck = [ "jwt" ]; 33 34 meta = with lib; { 35 description = "JSON Web Token implementation in Python";
+19 -15
pkgs/development/python-modules/snowflake-connector-python/default.nix
··· 1 - { buildPythonPackage 2 - , isPy27 3 , asn1crypto 4 , azure-storage-blob 5 , boto3 ··· 10 , idna 11 , ijson 12 , isPy3k 13 - , lib 14 , oscrypto 15 , pyarrow 16 , pyasn1-modules ··· 25 26 buildPythonPackage rec { 27 pname = "snowflake-connector-python"; 28 - version = "2.4.1"; 29 - disabled = isPy27; 30 31 src = fetchPypi { 32 inherit pname version; 33 - sha256 = "5c9180e61202a7beb1df83231688423091ca0a04ee559d2a78ff77f9c727baae"; 34 }; 35 36 - postPatch = '' 37 - substituteInPlace setup.py \ 38 - --replace "'pyOpenSSL>=16.2.0,<20.0.0'," "'pyOpenSSL'," \ 39 - --replace 'pytz<2021.0' 'pytz' 40 - ''; 41 - 42 propagatedBuildInputs = [ 43 azure-storage-blob 44 asn1crypto ··· 55 pytz 56 requests 57 six 58 - ] ++ lib.optionals (!isPy3k) [ 59 pyarrow 60 pyasn1-modules 61 urllib3 62 ]; 63 64 - # tests require encrypted secrets, see 65 # https://github.com/snowflakedb/snowflake-connector-python/tree/master/.github/workflows/parameters 66 doCheck = false; 67 - pythonImportsCheck = [ "snowflake" "snowflake.connector" ]; 68 69 meta = with lib; { 70 description = "Snowflake Connector for Python";
··· 1 + { lib 2 + , buildPythonPackage 3 + , pythonOlder 4 , asn1crypto 5 , azure-storage-blob 6 , boto3 ··· 11 , idna 12 , ijson 13 , isPy3k 14 , oscrypto 15 , pyarrow 16 , pyasn1-modules ··· 25 26 buildPythonPackage rec { 27 pname = "snowflake-connector-python"; 28 + version = "2.4.3"; 29 + disabled = pythonOlder "3.6"; 30 31 src = fetchPypi { 32 inherit pname version; 33 + sha256 = "sha256-+jAfUwaofWM5Ef1kk4AEAbBM/UES8/ZzLd4QJfkEQsM="; 34 }; 35 36 propagatedBuildInputs = [ 37 azure-storage-blob 38 asn1crypto ··· 49 pytz 50 requests 51 six 52 pyarrow 53 pyasn1-modules 54 urllib3 55 ]; 56 57 + postPatch = '' 58 + # https://github.com/snowflakedb/snowflake-connector-python/issues/705 59 + substituteInPlace setup.py \ 60 + --replace "idna>=2.5,<3" "idna" \ 61 + --replace "chardet>=3.0.2,<4" "chardet" 62 + ''; 63 + 64 + # Tests require encrypted secrets, see 65 # https://github.com/snowflakedb/snowflake-connector-python/tree/master/.github/workflows/parameters 66 doCheck = false; 67 + 68 + pythonImportsCheck = [ 69 + "snowflake" 70 + "snowflake.connector" 71 + ]; 72 73 meta = with lib; { 74 description = "Snowflake Connector for Python";
+2 -2
pkgs/development/tools/misc/nimlsp/default.nix
··· 16 in 17 stdenv.mkDerivation rec { 18 pname = "nimlsp"; 19 - version = "0.2.6"; 20 21 src = fetchFromGitHub { 22 owner = "PMunch"; 23 repo = "nimlsp"; 24 rev = "v${version}"; 25 - sha256 = "13kw3zjh0iqymwqxwhyj8jz6hgswwahf1rjd6iad7c6gcwrrg6yl"; 26 }; 27 28 nativeBuildInputs = [ nim ];
··· 16 in 17 stdenv.mkDerivation rec { 18 pname = "nimlsp"; 19 + version = "0.3.2"; 20 21 src = fetchFromGitHub { 22 owner = "PMunch"; 23 repo = "nimlsp"; 24 rev = "v${version}"; 25 + sha256 = "1lm823nvpp3bj9527jd8n1jxh6y8p8ngkfkj91p94m7ffai6jazq"; 26 }; 27 28 nativeBuildInputs = [ nim ];
+4 -4
pkgs/servers/radarr/default.nix
··· 9 }."${stdenv.hostPlatform.system}" or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 10 11 hash = { 12 - x64-linux_hash = "sha256-bTh+Z5w5ZkL2iPteStqVcoFDGZIbpVjuXn20TZsfgtY="; 13 - arm64-linux_hash = "sha256-aIzVSIRuGNiIFJPToXCQwYsbICKuPtwKATnQhkxvJuA="; 14 - x64-osx_hash = "sha256-FxRSAJvRQya2x1kei6yRceGcyQ2mCaFveyeMGw0Jqw4="; 15 }."${arch}-${os}_hash"; 16 17 in stdenv.mkDerivation rec { 18 pname = "radarr"; 19 - version = "3.0.2.4552"; 20 21 src = fetchurl { 22 url = "https://github.com/Radarr/Radarr/releases/download/v${version}/Radarr.master.${version}.${os}-core-${arch}.tar.gz";
··· 9 }."${stdenv.hostPlatform.system}" or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 10 11 hash = { 12 + x64-linux_hash = "sha256-5W4X1E7794hFVPo4+s826CNIrw6Z/n0cDjj6pmsj2Dk="; 13 + arm64-linux_hash = "sha256-gqCgToAVIS+IEulFY4mo2Mtcb3nyFpzDBqVEewREQcs="; 14 + x64-osx_hash = "sha256-MFpIzSYAvAWVHMdEd+aP67s3po+yb3qWzSd/Ko++5Jc="; 15 }."${arch}-${os}_hash"; 16 17 in stdenv.mkDerivation rec { 18 pname = "radarr"; 19 + version = "3.1.1.4954"; 20 21 src = fetchurl { 22 url = "https://github.com/Radarr/Radarr/releases/download/v${version}/Radarr.master.${version}.${os}-core-${arch}.tar.gz";
+2 -2
pkgs/servers/sql/mariadb/default.nix
··· 22 }; 23 24 common = rec { # attributes common to both builds 25 - version = "10.5.8"; 26 27 src = fetchurl { 28 urls = [ 29 "https://downloads.mariadb.org/f/mariadb-${version}/source/mariadb-${version}.tar.gz" 30 "https://downloads.mariadb.com/MariaDB/mariadb-${version}/source/mariadb-${version}.tar.gz" 31 ]; 32 - sha256 = "1s3vfm73911cddjhgpcbkya6nz7ag2zygg56qqzwscn5ybv28j7b"; 33 name = "mariadb-${version}.tar.gz"; 34 }; 35
··· 22 }; 23 24 common = rec { # attributes common to both builds 25 + version = "10.5.10"; 26 27 src = fetchurl { 28 urls = [ 29 "https://downloads.mariadb.org/f/mariadb-${version}/source/mariadb-${version}.tar.gz" 30 "https://downloads.mariadb.com/MariaDB/mariadb-${version}/source/mariadb-${version}.tar.gz" 31 ]; 32 + sha256 = "1fxsq2xgcb8j81z043bifpmxblj6nb3wqjm9rgsnpwmazkwk5zx5"; 33 name = "mariadb-${version}.tar.gz"; 34 }; 35
+11 -28
pkgs/servers/sql/mariadb/galera/default.nix
··· 1 { lib, stdenv, fetchFromGitHub, buildEnv 2 - , asio, boost, check, openssl, scons 3 }: 4 5 let ··· 10 11 in stdenv.mkDerivation rec { 12 pname = "mariadb-galera"; 13 - version = "26.4.7"; 14 15 src = fetchFromGitHub { 16 owner = "codership"; 17 repo = "galera"; 18 rev = "release_${version}"; 19 - sha256 = "0h7s670pcasq8wzprhyxqfca2cghi62b8xz2kikb2a86wd453qil"; 20 fetchSubmodules = true; 21 }; 22 23 - buildInputs = [ asio boost check openssl scons ]; 24 - 25 - postPatch = '' 26 - substituteInPlace SConstruct \ 27 - --replace "boost_library_path = '''" "boost_library_path = '${boost}/lib'" 28 - ''; 29 30 preConfigure = '' 31 - export CPPFLAGS="-I${asio}/include -I${boost.dev}/include -I${check}/include -I${openssl.dev}/include" 32 - export LIBPATH="${galeraLibs}/lib" 33 ''; 34 35 - sconsFlags = "ssl=1 system_asio=1 strict_build_flags=0"; 36 - 37 - enableParallelBuilding = true; 38 - 39 - installPhase = '' 40 - # copied with modifications from scripts/packages/freebsd.sh 41 - GALERA_LICENSE_DIR="$share/licenses/${pname}-${version}" 42 - install -d $out/{bin,lib/galera,share/doc/galera,$GALERA_LICENSE_DIR} 43 - install -m 555 "garb/garbd" "$out/bin/garbd" 44 - install -m 444 "libgalera_smm.so" "$out/lib/galera/libgalera_smm.so" 45 - install -m 444 "scripts/packages/README" "$out/share/doc/galera/" 46 - install -m 444 "scripts/packages/README-MySQL" "$out/share/doc/galera/" 47 - install -m 444 "scripts/packages/freebsd/LICENSE" "$out/$GALERA_LICENSE_DIR" 48 - install -m 444 "LICENSE" "$out/$GALERA_LICENSE_DIR/GPLv2" 49 - install -m 444 "asio/LICENSE_1_0.txt" "$out/$GALERA_LICENSE_DIR/LICENSE.asio" 50 ''; 51 52 meta = with lib; { 53 description = "Galera 3 wsrep provider library"; 54 homepage = "https://galeracluster.com/"; 55 - license = licenses.lgpl2; 56 - maintainers = with maintainers; [ izorkin ]; 57 platforms = platforms.all; 58 }; 59 }
··· 1 { lib, stdenv, fetchFromGitHub, buildEnv 2 + , asio, boost, check, openssl, cmake 3 }: 4 5 let ··· 10 11 in stdenv.mkDerivation rec { 12 pname = "mariadb-galera"; 13 + version = "26.4.8"; 14 15 src = fetchFromGitHub { 16 owner = "codership"; 17 repo = "galera"; 18 rev = "release_${version}"; 19 + sha256 = "0rx710dfijiykpi41rhxx8vafk07bffv2nbl3d4ggc32rzv88369"; 20 fetchSubmodules = true; 21 }; 22 23 + buildInputs = [ asio boost check openssl cmake ]; 24 25 preConfigure = '' 26 + # make sure bundled asio cannot be used, but leave behind license, because it gets installed 27 + rm -r asio/{asio,asio.hpp} 28 ''; 29 30 + postInstall = '' 31 + # for backwards compatibility 32 + ln -s . $out/lib/galera 33 ''; 34 35 meta = with lib; { 36 description = "Galera 3 wsrep provider library"; 37 homepage = "https://galeracluster.com/"; 38 + license = licenses.lgpl2Only; 39 + maintainers = with maintainers; [ ajs124 izorkin ]; 40 platforms = platforms.all; 41 }; 42 }
+3 -3
pkgs/tools/admin/lxd/default.nix
··· 18 in 19 buildGoPackage rec { 20 pname = "lxd"; 21 - version = "4.13"; 22 23 goPackagePath = "github.com/lxc/lxd"; 24 25 src = fetchurl { 26 - url = "https://github.com/lxc/lxd/releases/download/${pname}-${version}/${pname}-${version}.tar.gz"; 27 - sha256 = "0w2r80wf86jijgfxbkv06lgfhz4p2aaidsqd96bx3q1382nrbzcf"; 28 }; 29 30 postPatch = ''
··· 18 in 19 buildGoPackage rec { 20 pname = "lxd"; 21 + version = "4.14"; 22 23 goPackagePath = "github.com/lxc/lxd"; 24 25 src = fetchurl { 26 + url = "https://linuxcontainers.org/downloads/lxd/lxd-${version}.tar.gz"; 27 + sha256 = "1x9gv70j333w254jgg1n0kvxpwv6vww0v0i862pglq48xhdaa7hy"; 28 }; 29 30 postPatch = ''
+2 -2
pkgs/tools/graphics/agi/default.nix
··· 14 15 stdenv.mkDerivation rec { 16 pname = "agi"; 17 - version = "1.1.0-dev-20210504"; 18 19 src = fetchzip { 20 url = "https://github.com/google/agi-dev-releases/releases/download/v${version}/agi-${version}-linux.zip"; 21 - sha256 = "sha256-q9xWe1gGX7SV/tAUHu/uBB709aqegIsNLTPM5zljgYY="; 22 }; 23 24 nativeBuildInputs = [
··· 14 15 stdenv.mkDerivation rec { 16 pname = "agi"; 17 + version = "1.1.0-dev-20210506"; 18 19 src = fetchzip { 20 url = "https://github.com/google/agi-dev-releases/releases/download/v${version}/agi-${version}-linux.zip"; 21 + sha256 = "sha256-VB9AL2h+e+92lhsfdYHbSgv5AIrgEPJsa74VGncDHGo="; 22 }; 23 24 nativeBuildInputs = [
+2 -2
pkgs/tools/misc/esphome/default.nix
··· 8 9 python3.pkgs.buildPythonApplication rec { 10 pname = "esphome"; 11 - version = "1.17.1"; 12 13 src = fetchFromGitHub { 14 owner = pname; 15 repo = pname; 16 rev = "v${version}"; 17 - sha256 = "0483glwi155ca1wnffwhmwn17d7kwk4hjwmckb8zs197rfqmb55v"; 18 }; 19 20 postPatch = ''
··· 8 9 python3.pkgs.buildPythonApplication rec { 10 pname = "esphome"; 11 + version = "1.17.2"; 12 13 src = fetchFromGitHub { 14 owner = pname; 15 repo = pname; 16 rev = "v${version}"; 17 + sha256 = "1md52xzlrzf99s5q2152s1b7yql2h02ss451g68ky207xz660aj1"; 18 }; 19 20 postPatch = ''
+3 -3
pkgs/tools/networking/croc/default.nix
··· 2 3 buildGoModule rec { 4 pname = "croc"; 5 - version = "9.1.1"; 6 7 src = fetchFromGitHub { 8 owner = "schollz"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-MiTc8uT4FUHqEgE37kZ0pc7y1aK6u+4LqYQ8l1j2jA4="; 12 }; 13 14 - vendorSha256 = "sha256-UGFFzpbBeL4YS3VSjCa31E2fiqND8j3E4FjRflg1NFc="; 15 16 doCheck = false; 17
··· 2 3 buildGoModule rec { 4 pname = "croc"; 5 + version = "9.1.2"; 6 7 src = fetchFromGitHub { 8 owner = "schollz"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-7v8vz0n35ATWdmMcM2U7z1sONbmsaWQahHsramivm88="; 12 }; 13 14 + vendorSha256 = "sha256-IAyiD4v2UEGlWj8oZ0E3YhqyThJTjwjWjOzQKuj6Q9s="; 15 16 doCheck = false; 17
+1
pkgs/tools/system/bottom/default.nix
··· 33 license = licenses.mit; 34 maintainers = with maintainers; [ berbiche ]; 35 platforms = platforms.unix; 36 }; 37 }
··· 33 license = licenses.mit; 34 maintainers = with maintainers; [ berbiche ]; 35 platforms = platforms.unix; 36 + mainProgram = "btm"; 37 }; 38 }
+3 -1
pkgs/top-level/python-packages.nix
··· 5181 5182 prison = callPackage ../development/python-modules/prison { }; 5183 5184 - privacyidea-ldap-proxy = callPackage ../development/python-modules/privacyidea/ldap-proxy.nix { }; 5185 5186 proboscis = callPackage ../development/python-modules/proboscis { }; 5187
··· 5181 5182 prison = callPackage ../development/python-modules/prison { }; 5183 5184 + privacyidea = callPackage ../development/python-modules/privacyidea { }; 5185 + 5186 + pyjwt1 = callPackage ../development/python-modules/pyjwt/1.nix { }; 5187 5188 proboscis = callPackage ../development/python-modules/proboscis { }; 5189
+3 -1
pkgs/top-level/python2-packages.nix
··· 383 384 prettytable = callPackage ../development/python-modules/prettytable/1.nix { }; 385 386 - privacyidea = callPackage ../development/python-modules/privacyidea { }; 387 388 progressbar231 = callPackage ../development/python-modules/progressbar231 { }; 389
··· 383 384 prettytable = callPackage ../development/python-modules/prettytable/1.nix { }; 385 386 + privacyidea-ldap-proxy = callPackage ../development/python-modules/privacyidea/ldap-proxy.nix { }; 387 + 388 + ldaptor = callPackage ../development/python-modules/ldaptor/19.nix { }; 389 390 progressbar231 = callPackage ../development/python-modules/progressbar231 { }; 391