Merge master into staging-next

authored by github-actions[bot] and committed by GitHub 4a997ba4 ad8197eb

+571 -182
+3 -3
nixos/modules/installer/cd-dvd/system-tarball-sheevaplug.nix
··· 87 boot.initrd.availableKernelModules = 88 [ "mvsdio" "reiserfs" "ext3" "ums-cypress" "rtc_mv" "ext4" ]; 89 90 - boot.postBootCommands = 91 '' 92 mkdir -p /mnt 93 94 cp ${dummyConfiguration} /etc/nixos/configuration.nix 95 ''; 96 97 - boot.initrd.extraUtilsCommands = 98 '' 99 copy_bin_and_libs ${pkgs.util-linux}/sbin/hwclock 100 ''; 101 102 - boot.initrd.postDeviceCommands = 103 '' 104 hwclock -s 105 '';
··· 87 boot.initrd.availableKernelModules = 88 [ "mvsdio" "reiserfs" "ext3" "ums-cypress" "rtc_mv" "ext4" ]; 89 90 + boot.postBootCommands = lib.mkIf (!boot.initrd.systemd.enable) 91 '' 92 mkdir -p /mnt 93 94 cp ${dummyConfiguration} /etc/nixos/configuration.nix 95 ''; 96 97 + boot.initrd.extraUtilsCommands = lib.mkIf (!boot.initrd.systemd.enable) 98 '' 99 copy_bin_and_libs ${pkgs.util-linux}/sbin/hwclock 100 ''; 101 102 + boot.initrd.postDeviceCommands = lib.mkIf (!boot.initrd.systemd.enable) 103 '' 104 hwclock -s 105 '';
+1 -4
nixos/modules/system/boot/systemd/initrd.nix
··· 65 "systemd-kexec.service" 66 "systemd-modules-load.service" 67 "systemd-poweroff.service" 68 - "systemd-random-seed.service" 69 "systemd-reboot.service" 70 "systemd-sysctl.service" 71 "systemd-tmpfiles-setup-dev.service" ··· 193 description = '' 194 Store paths to copy into the initrd as well. 195 ''; 196 - type = types.listOf types.singleLineStr; 197 default = []; 198 }; 199 ··· 396 "${cfg.package}/lib/systemd/systemd-journald" 397 "${cfg.package}/lib/systemd/systemd-makefs" 398 "${cfg.package}/lib/systemd/systemd-modules-load" 399 - "${cfg.package}/lib/systemd/systemd-random-seed" 400 "${cfg.package}/lib/systemd/systemd-remount-fs" 401 "${cfg.package}/lib/systemd/systemd-shutdown" 402 "${cfg.package}/lib/systemd/systemd-sulogin-shell" ··· 507 }; 508 509 boot.kernelParams = lib.mkIf (config.boot.resumeDevice != "") [ "resume=${config.boot.resumeDevice}" ]; 510 - 511 }; 512 }
··· 65 "systemd-kexec.service" 66 "systemd-modules-load.service" 67 "systemd-poweroff.service" 68 "systemd-reboot.service" 69 "systemd-sysctl.service" 70 "systemd-tmpfiles-setup-dev.service" ··· 192 description = '' 193 Store paths to copy into the initrd as well. 194 ''; 195 + type = with types; listOf (oneOf [ singleLineStr package ]); 196 default = []; 197 }; 198 ··· 395 "${cfg.package}/lib/systemd/systemd-journald" 396 "${cfg.package}/lib/systemd/systemd-makefs" 397 "${cfg.package}/lib/systemd/systemd-modules-load" 398 "${cfg.package}/lib/systemd/systemd-remount-fs" 399 "${cfg.package}/lib/systemd/systemd-shutdown" 400 "${cfg.package}/lib/systemd/systemd-sulogin-shell" ··· 505 }; 506 507 boot.kernelParams = lib.mkIf (config.boot.resumeDevice != "") [ "resume=${config.boot.resumeDevice}" ]; 508 }; 509 }
+16 -6
nixos/modules/tasks/bcache.nix
··· 1 - { pkgs, ... }: 2 3 { 4 5 - environment.systemPackages = [ pkgs.bcache-tools ]; 6 7 - services.udev.packages = [ pkgs.bcache-tools ]; 8 9 - boot.initrd.extraUdevRulesCommands = '' 10 - cp -v ${pkgs.bcache-tools}/lib/udev/rules.d/*.rules $out/ 11 - ''; 12 13 }
··· 1 + { config, lib, pkgs, ... }: 2 3 { 4 + options.boot.initrd.services.bcache.enable = (lib.mkEnableOption "bcache support in the initrd") // { 5 + visible = false; # only works with systemd stage 1 6 + }; 7 8 + config = { 9 10 + environment.systemPackages = [ pkgs.bcache-tools ]; 11 12 + services.udev.packages = [ pkgs.bcache-tools ]; 13 + 14 + boot.initrd.extraUdevRulesCommands = lib.mkIf (!config.boot.initrd.systemd.enable) '' 15 + cp -v ${pkgs.bcache-tools}/lib/udev/rules.d/*.rules $out/ 16 + ''; 17 18 + boot.initrd.services.udev = lib.mkIf config.boot.initrd.services.bcache.enable { 19 + packages = [ pkgs.bcache-tools ]; 20 + binPackages = [ pkgs.bcache-tools ]; 21 + }; 22 + }; 23 }
+3 -3
nixos/modules/tasks/filesystems/btrfs.nix
··· 66 ] 67 ); 68 69 - boot.initrd.extraUtilsCommands = mkIf inInitrd 70 '' 71 copy_bin_and_libs ${pkgs.btrfs-progs}/bin/btrfs 72 ln -sv btrfs $out/bin/btrfsck 73 ln -sv btrfsck $out/bin/fsck.btrfs 74 ''; 75 76 - boot.initrd.extraUtilsCommandsTest = mkIf inInitrd 77 '' 78 $out/bin/btrfs --version 79 ''; 80 81 - boot.initrd.postDeviceCommands = mkIf inInitrd 82 '' 83 btrfs device scan 84 '';
··· 66 ] 67 ); 68 69 + boot.initrd.extraUtilsCommands = mkIf (inInitrd && !config.boot.initrd.systemd.enable) 70 '' 71 copy_bin_and_libs ${pkgs.btrfs-progs}/bin/btrfs 72 ln -sv btrfs $out/bin/btrfsck 73 ln -sv btrfsck $out/bin/fsck.btrfs 74 ''; 75 76 + boot.initrd.extraUtilsCommandsTest = mkIf (inInitrd && !config.boot.initrd.systemd.enable) 77 '' 78 $out/bin/btrfs --version 79 ''; 80 81 + boot.initrd.postDeviceCommands = mkIf (inInitrd && !config.boot.initrd.systemd.enable) 82 '' 83 btrfs device scan 84 '';
+1 -1
nixos/modules/tasks/filesystems/cifs.nix
··· 16 boot.initrd.availableKernelModules = mkIf inInitrd 17 [ "cifs" "nls_utf8" "hmac" "md4" "ecb" "des_generic" "sha256" ]; 18 19 - boot.initrd.extraUtilsCommands = mkIf inInitrd 20 '' 21 copy_bin_and_libs ${pkgs.cifs-utils}/sbin/mount.cifs 22 '';
··· 16 boot.initrd.availableKernelModules = mkIf inInitrd 17 [ "cifs" "nls_utf8" "hmac" "md4" "ecb" "des_generic" "sha256" ]; 18 19 + boot.initrd.extraUtilsCommands = mkIf (inInitrd && !config.boot.initrd.systemd.enable) 20 '' 21 copy_bin_and_libs ${pkgs.cifs-utils}/sbin/mount.cifs 22 '';
+10 -4
nixos/modules/tasks/filesystems/ext.nix
··· 1 - { pkgs, ... }: 2 3 { 4 config = { 5 6 - system.fsPackages = [ pkgs.e2fsprogs ]; 7 8 # As of kernel 4.3, there is no separate ext3 driver (they're also handled by ext4.ko) 9 - boot.initrd.availableKernelModules = [ "ext2" "ext4" ]; 10 11 - boot.initrd.extraUtilsCommands = 12 '' 13 # Copy e2fsck and friends. 14 copy_bin_and_libs ${pkgs.e2fsprogs}/sbin/e2fsck
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + let 4 + 5 + inInitrd = lib.any (fs: fs == "ext2" || fs == "ext3" || fs == "ext4") config.boot.initrd.supportedFilesystems; 6 + 7 + in 8 9 { 10 config = { 11 12 + system.fsPackages = lib.mkIf (config.boot.initrd.systemd.enable -> inInitrd) [ pkgs.e2fsprogs ]; 13 14 # As of kernel 4.3, there is no separate ext3 driver (they're also handled by ext4.ko) 15 + boot.initrd.availableKernelModules = lib.mkIf (config.boot.initrd.systemd.enable -> inInitrd) [ "ext2" "ext4" ]; 16 17 + boot.initrd.extraUtilsCommands = lib.mkIf (!config.boot.initrd.systemd.enable) 18 '' 19 # Copy e2fsck and friends. 20 copy_bin_and_libs ${pkgs.e2fsprogs}/sbin/e2fsck
+1 -1
nixos/modules/tasks/filesystems/f2fs.nix
··· 13 14 boot.initrd.availableKernelModules = mkIf inInitrd [ "f2fs" "crc32" ]; 15 16 - boot.initrd.extraUtilsCommands = mkIf inInitrd '' 17 copy_bin_and_libs ${pkgs.f2fs-tools}/sbin/fsck.f2fs 18 ${optionalString (any (fs: fs.autoResize) fileSystems) '' 19 # We need f2fs-tools' tools to resize filesystems
··· 13 14 boot.initrd.availableKernelModules = mkIf inInitrd [ "f2fs" "crc32" ]; 15 16 + boot.initrd.extraUtilsCommands = mkIf (inInitrd && !config.boot.initrd.systemd.enable) '' 17 copy_bin_and_libs ${pkgs.f2fs-tools}/sbin/fsck.f2fs 18 ${optionalString (any (fs: fs.autoResize) fileSystems) '' 19 # We need f2fs-tools' tools to resize filesystems
+1 -1
nixos/modules/tasks/filesystems/jfs.nix
··· 12 13 boot.initrd.kernelModules = mkIf inInitrd [ "jfs" ]; 14 15 - boot.initrd.extraUtilsCommands = mkIf inInitrd '' 16 copy_bin_and_libs ${pkgs.jfsutils}/sbin/fsck.jfs 17 ''; 18 };
··· 12 13 boot.initrd.kernelModules = mkIf inInitrd [ "jfs" ]; 14 15 + boot.initrd.extraUtilsCommands = mkIf (inInitrd && !boot.initrd.systemd.enable) '' 16 copy_bin_and_libs ${pkgs.jfsutils}/sbin/fsck.jfs 17 ''; 18 };
+1 -1
nixos/modules/tasks/filesystems/reiserfs.nix
··· 15 16 boot.initrd.kernelModules = mkIf inInitrd [ "reiserfs" ]; 17 18 - boot.initrd.extraUtilsCommands = mkIf inInitrd 19 '' 20 copy_bin_and_libs ${pkgs.reiserfsprogs}/sbin/reiserfsck 21 ln -s reiserfsck $out/bin/fsck.reiserfs
··· 15 16 boot.initrd.kernelModules = mkIf inInitrd [ "reiserfs" ]; 17 18 + boot.initrd.extraUtilsCommands = mkIf (inInitrd && !config.boot.initrd.systemd.enable) 19 '' 20 copy_bin_and_libs ${pkgs.reiserfsprogs}/sbin/reiserfsck 21 ln -s reiserfsck $out/bin/fsck.reiserfs
+13 -2
nixos/modules/tasks/filesystems/unionfs-fuse.nix
··· 6 (lib.mkIf (lib.any (fs: fs == "unionfs-fuse") config.boot.initrd.supportedFilesystems) { 7 boot.initrd.kernelModules = [ "fuse" ]; 8 9 - boot.initrd.extraUtilsCommands = '' 10 copy_bin_and_libs ${pkgs.fuse}/sbin/mount.fuse 11 copy_bin_and_libs ${pkgs.unionfs-fuse}/bin/unionfs 12 substitute ${pkgs.unionfs-fuse}/sbin/mount.unionfs-fuse $out/bin/mount.unionfs-fuse \ ··· 16 chmod +x $out/bin/mount.unionfs-fuse 17 ''; 18 19 - boot.initrd.postDeviceCommands = '' 20 # Hacky!!! fuse hard-codes the path to mount 21 mkdir -p /nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-${pkgs.util-linux.name}-bin/bin 22 ln -s $(which mount) /nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-${pkgs.util-linux.name}-bin/bin 23 ln -s $(which umount) /nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-${pkgs.util-linux.name}-bin/bin 24 ''; 25 }) 26 27 (lib.mkIf (lib.any (fs: fs == "unionfs-fuse") config.boot.supportedFilesystems) {
··· 6 (lib.mkIf (lib.any (fs: fs == "unionfs-fuse") config.boot.initrd.supportedFilesystems) { 7 boot.initrd.kernelModules = [ "fuse" ]; 8 9 + boot.initrd.extraUtilsCommands = lib.mkIf (!config.boot.initrd.systemd.enable) '' 10 copy_bin_and_libs ${pkgs.fuse}/sbin/mount.fuse 11 copy_bin_and_libs ${pkgs.unionfs-fuse}/bin/unionfs 12 substitute ${pkgs.unionfs-fuse}/sbin/mount.unionfs-fuse $out/bin/mount.unionfs-fuse \ ··· 16 chmod +x $out/bin/mount.unionfs-fuse 17 ''; 18 19 + boot.initrd.postDeviceCommands = lib.mkIf (!config.boot.initrd.systemd.enable) '' 20 # Hacky!!! fuse hard-codes the path to mount 21 mkdir -p /nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-${pkgs.util-linux.name}-bin/bin 22 ln -s $(which mount) /nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-${pkgs.util-linux.name}-bin/bin 23 ln -s $(which umount) /nix/store/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-${pkgs.util-linux.name}-bin/bin 24 ''; 25 + 26 + boot.initrd.systemd.extraBin = { 27 + "mount.fuse" = "${pkgs.fuse}/bin/mount.fuse"; 28 + "unionfs" = "${pkgs.unionfs-fuse}/bin/unionfs"; 29 + "mount.unionfs-fuse" = pkgs.runCommand "mount.unionfs-fuse" {} '' 30 + substitute ${pkgs.unionfs-fuse}/sbin/mount.unionfs-fuse $out \ 31 + --replace '${pkgs.bash}/bin/bash' /bin/sh \ 32 + --replace '${pkgs.fuse}/sbin' /bin \ 33 + --replace '${pkgs.unionfs-fuse}/bin' /bin 34 + ''; 35 + }; 36 }) 37 38 (lib.mkIf (lib.any (fs: fs == "unionfs-fuse") config.boot.supportedFilesystems) {
+1 -1
nixos/modules/tasks/filesystems/vfat.nix
··· 15 16 boot.initrd.kernelModules = mkIf inInitrd [ "vfat" "nls_cp437" "nls_iso8859-1" ]; 17 18 - boot.initrd.extraUtilsCommands = mkIf inInitrd 19 '' 20 copy_bin_and_libs ${pkgs.dosfstools}/sbin/dosfsck 21 ln -sv dosfsck $out/bin/fsck.vfat
··· 15 16 boot.initrd.kernelModules = mkIf inInitrd [ "vfat" "nls_cp437" "nls_iso8859-1" ]; 17 18 + boot.initrd.extraUtilsCommands = mkIf (inInitrd && !config.boot.initrd.systemd.enable) 19 '' 20 copy_bin_and_libs ${pkgs.dosfstools}/sbin/dosfsck 21 ln -sv dosfsck $out/bin/fsck.vfat
+2 -2
nixos/modules/tasks/filesystems/xfs.nix
··· 15 16 boot.initrd.availableKernelModules = mkIf inInitrd [ "xfs" "crc32c" ]; 17 18 - boot.initrd.extraUtilsCommands = mkIf inInitrd 19 '' 20 copy_bin_and_libs ${pkgs.xfsprogs.bin}/bin/fsck.xfs 21 copy_bin_and_libs ${pkgs.xfsprogs.bin}/bin/xfs_repair 22 ''; 23 24 # Trick just to set 'sh' after the extraUtils nuke-refs. 25 - boot.initrd.extraUtilsCommandsTest = mkIf inInitrd 26 '' 27 sed -i -e 's,^#!.*,#!'$out/bin/sh, $out/bin/fsck.xfs 28 '';
··· 15 16 boot.initrd.availableKernelModules = mkIf inInitrd [ "xfs" "crc32c" ]; 17 18 + boot.initrd.extraUtilsCommands = mkIf (inInitrd && !boot.initrd.systemd.enable) 19 '' 20 copy_bin_and_libs ${pkgs.xfsprogs.bin}/bin/fsck.xfs 21 copy_bin_and_libs ${pkgs.xfsprogs.bin}/bin/xfs_repair 22 ''; 23 24 # Trick just to set 'sh' after the extraUtils nuke-refs. 25 + boot.initrd.extraUtilsCommandsTest = mkIf (inInitrd && !boot.initrd.systemd.enable) 26 '' 27 sed -i -e 's,^#!.*,#!'$out/bin/sh, $out/bin/fsck.xfs 28 '';
+1
nixos/tests/all-tests.nix
··· 524 systemd-confinement = handleTest ./systemd-confinement.nix {}; 525 systemd-cryptenroll = handleTest ./systemd-cryptenroll.nix {}; 526 systemd-escaping = handleTest ./systemd-escaping.nix {}; 527 systemd-initrd-luks-keyfile = handleTest ./systemd-initrd-luks-keyfile.nix {}; 528 systemd-initrd-luks-password = handleTest ./systemd-initrd-luks-password.nix {}; 529 systemd-initrd-shutdown = handleTest ./systemd-shutdown.nix { systemdStage1 = true; };
··· 524 systemd-confinement = handleTest ./systemd-confinement.nix {}; 525 systemd-cryptenroll = handleTest ./systemd-cryptenroll.nix {}; 526 systemd-escaping = handleTest ./systemd-escaping.nix {}; 527 + systemd-initrd-btrfs-raid = handleTest ./systemd-initrd-btrfs-raid.nix {}; 528 systemd-initrd-luks-keyfile = handleTest ./systemd-initrd-luks-keyfile.nix {}; 529 systemd-initrd-luks-password = handleTest ./systemd-initrd-luks-password.nix {}; 530 systemd-initrd-shutdown = handleTest ./systemd-shutdown.nix { systemdStage1 = true; };
+45
nixos/tests/systemd-initrd-btrfs-raid.nix
···
··· 1 + import ./make-test-python.nix ({ lib, pkgs, ... }: { 2 + name = "systemd-initrd-btrfs-raid"; 3 + 4 + nodes.machine = { pkgs, ... }: { 5 + # Use systemd-boot 6 + virtualisation = { 7 + emptyDiskImages = [ 512 512 ]; 8 + useBootLoader = true; 9 + useEFIBoot = true; 10 + }; 11 + boot.loader.systemd-boot.enable = true; 12 + boot.loader.efi.canTouchEfiVariables = true; 13 + 14 + environment.systemPackages = with pkgs; [ btrfs-progs ]; 15 + boot.initrd.systemd = { 16 + enable = true; 17 + emergencyAccess = true; 18 + }; 19 + 20 + specialisation.boot-btrfs-raid.configuration = { 21 + fileSystems = lib.mkVMOverride { 22 + "/".fsType = lib.mkForce "btrfs"; 23 + }; 24 + virtualisation.bootDevice = "/dev/vdc"; 25 + }; 26 + }; 27 + 28 + testScript = '' 29 + # Create RAID 30 + machine.succeed("mkfs.btrfs -d raid0 /dev/vdc /dev/vdd") 31 + machine.succeed("mkdir -p /mnt && mount /dev/vdc /mnt && echo hello > /mnt/test && umount /mnt") 32 + 33 + # Boot from the RAID 34 + machine.succeed("bootctl set-default nixos-generation-1-specialisation-boot-btrfs-raid.conf") 35 + machine.succeed("sync") 36 + machine.crash() 37 + machine.wait_for_unit("multi-user.target") 38 + 39 + # Ensure we have successfully booted from the RAID 40 + assert "(initrd)" in machine.succeed("systemd-analyze") # booted with systemd in stage 1 41 + assert "/dev/vdc on / type btrfs" in machine.succeed("mount") 42 + assert "hello" in machine.succeed("cat /test") 43 + assert "Total devices 2" in machine.succeed("btrfs filesystem show") 44 + ''; 45 + })
+76
pkgs/applications/audio/ChowPhaser/default.nix
···
··· 1 + { alsa-lib, at-spi2-core, cmake, curl, dbus, libepoxy, fetchFromGitHub, freeglut 2 + , freetype, gcc-unwrapped, gtk3, lib, libGL, libXcursor, libXdmcp, libXext 3 + , libXinerama, libXrandr, libXtst, libdatrie, libjack2, libpsl, libselinux 4 + , libsepol, libsysprof-capture, libthai, libxkbcommon, pcre, pkg-config 5 + , python3, sqlite, stdenv }: 6 + 7 + stdenv.mkDerivation rec { 8 + pname = "ChowPhaser"; 9 + version = "1.1.1"; 10 + 11 + src = fetchFromGitHub { 12 + owner = "jatinchowdhury18"; 13 + repo = "ChowPhaser"; 14 + rev = "v${version}"; 15 + fetchSubmodules = true; 16 + sha256 = "sha256-9wo7ZFMruG3QNvlpILSvrFh/Sx6J1qnlWc8+aQyS4tQ="; 17 + }; 18 + 19 + nativeBuildInputs = [ pkg-config cmake ]; 20 + 21 + buildInputs = [ 22 + alsa-lib 23 + at-spi2-core 24 + curl 25 + dbus 26 + libepoxy 27 + freeglut 28 + freetype 29 + gtk3 30 + libGL 31 + libXcursor 32 + libXdmcp 33 + libXext 34 + libXinerama 35 + libXrandr 36 + libXtst 37 + libdatrie 38 + libjack2 39 + libpsl 40 + libselinux 41 + libsepol 42 + libsysprof-capture 43 + libthai 44 + libxkbcommon 45 + pcre 46 + python3 47 + sqlite 48 + gcc-unwrapped 49 + ]; 50 + 51 + cmakeFlags = [ 52 + "-DCMAKE_AR=${gcc-unwrapped}/bin/gcc-ar" 53 + "-DCMAKE_RANLIB=${gcc-unwrapped}/bin/gcc-ranlib" 54 + "-DCMAKE_NM=${gcc-unwrapped}/bin/gcc-nm" 55 + ]; 56 + 57 + installPhase = '' 58 + mkdir -p $out/lib/lv2 $out/lib/vst3 $out/bin $out/share/doc/ChowPhaser/ 59 + cd ChowPhaserMono_artefacts/Release 60 + cp libChowPhaserMono_SharedCode.a $out/lib 61 + cp -r VST3/ChowPhaserMono.vst3 $out/lib/vst3 62 + cp Standalone/ChowPhaserMono $out/bin 63 + cd ../../ChowPhaserStereo_artefacts/Release 64 + cp libChowPhaserStereo_SharedCode.a $out/lib 65 + cp -r VST3/ChowPhaserStereo.vst3 $out/lib/vst3 66 + cp Standalone/ChowPhaserStereo $out/bin 67 + ''; 68 + 69 + meta = with lib; { 70 + homepage = "https://github.com/jatinchowdhury18/ChowPhaser"; 71 + description = "Phaser effect based loosely on the Schulte Compact Phasing 'A'"; 72 + license = with licenses; [ bsd3 ]; 73 + maintainers = with maintainers; [ magnetophon ]; 74 + platforms = platforms.linux; 75 + }; 76 + }
+9 -12
pkgs/applications/audio/shortwave/default.nix
··· 14 , ninja 15 , openssl 16 , pkg-config 17 - , python3 18 , rustPlatform 19 , sqlite 20 - , wrapGAppsHook 21 }: 22 23 stdenv.mkDerivation rec { 24 pname = "shortwave"; 25 - version = "2.0.1"; 26 27 src = fetchFromGitLab { 28 domain = "gitlab.gnome.org"; 29 owner = "World"; 30 repo = "Shortwave"; 31 rev = version; 32 - sha256 = "sha256-25qPb7qlqCwYJzl4qZxAZYx5asxSlXBlc/0dGyBdk1o="; 33 }; 34 35 cargoDeps = rustPlatform.fetchCargoTarball { 36 inherit src; 37 name = "${pname}-${version}"; 38 - hash = "sha256-00dQXcSNmdZb2nSLG3q7jm4sugF9XR4LbH0OmcuHVxA="; 39 }; 40 41 nativeBuildInputs = [ ··· 46 meson 47 ninja 48 pkg-config 49 - python3 50 rustPlatform.rust.cargo 51 rustPlatform.cargoSetupHook 52 rustPlatform.rust.rustc 53 - wrapGAppsHook 54 ]; 55 56 buildInputs = [ ··· 61 libadwaita 62 openssl 63 sqlite 64 ] ++ (with gst_all_1; [ 65 gstreamer 66 gst-plugins-base ··· 68 gst-plugins-bad 69 ]); 70 71 - postPatch = '' 72 - patchShebangs build-aux/meson/postinstall.py 73 - ''; 74 - 75 meta = with lib; { 76 homepage = "https://gitlab.gnome.org/World/Shortwave"; 77 description = "Find and listen to internet radio stations"; ··· 80 desktop. It is the successor to the older Gradio application. 81 ''; 82 maintainers = with maintainers; [ lasandell ]; 83 - broken = true; # incompatible with latest libadwaita 84 license = licenses.gpl3Plus; 85 platforms = platforms.linux; 86 };
··· 14 , ninja 15 , openssl 16 , pkg-config 17 , rustPlatform 18 , sqlite 19 + , wrapGAppsHook4 20 + , cmake 21 + , libshumate 22 }: 23 24 stdenv.mkDerivation rec { 25 pname = "shortwave"; 26 + version = "3.0.0"; 27 28 src = fetchFromGitLab { 29 domain = "gitlab.gnome.org"; 30 owner = "World"; 31 repo = "Shortwave"; 32 rev = version; 33 + sha256 = "sha256-qwk63o9pfqpAm6l9ioj3RccacemQU8R6LF6El4yHkjQ"; 34 }; 35 36 cargoDeps = rustPlatform.fetchCargoTarball { 37 inherit src; 38 name = "${pname}-${version}"; 39 + hash = "sha256-YrB322nv9CgZqt5//VMvVwjWA51ePlX2PI6raRJGBxA="; 40 }; 41 42 nativeBuildInputs = [ ··· 47 meson 48 ninja 49 pkg-config 50 rustPlatform.rust.cargo 51 rustPlatform.cargoSetupHook 52 rustPlatform.rust.rustc 53 + wrapGAppsHook4 54 + cmake 55 ]; 56 57 buildInputs = [ ··· 62 libadwaita 63 openssl 64 sqlite 65 + libshumate 66 ] ++ (with gst_all_1; [ 67 gstreamer 68 gst-plugins-base ··· 70 gst-plugins-bad 71 ]); 72 73 meta = with lib; { 74 homepage = "https://gitlab.gnome.org/World/Shortwave"; 75 description = "Find and listen to internet radio stations"; ··· 78 desktop. It is the successor to the older Gradio application. 79 ''; 80 maintainers = with maintainers; [ lasandell ]; 81 license = licenses.gpl3Plus; 82 platforms = platforms.linux; 83 };
+20 -2
pkgs/applications/editors/lapce/default.nix
··· 17 , vulkan-loader 18 , copyDesktopItems 19 , makeDesktopItem 20 }: 21 22 rustPlatform.buildRustPackage rec { ··· 40 copyDesktopItems 41 ]; 42 43 buildInputs = [ 44 freetype 45 fontconfig 46 libxkbcommon ··· 50 libXrandr 51 libXi 52 vulkan-loader 53 ]; 54 55 # Add missing vulkan dependency to rpath 56 - preFixup = '' 57 patchelf --add-needed ${vulkan-loader}/lib/libvulkan.so.1 $out/bin/lapce 58 ''; 59 ··· 76 homepage = "https://github.com/lapce/lapce"; 77 license = with licenses; [ asl20 ]; 78 maintainers = with maintainers; [ elliot ]; 79 - broken = stdenv.isDarwin; 80 }; 81 }
··· 17 , vulkan-loader 18 , copyDesktopItems 19 , makeDesktopItem 20 + , openssl 21 + , libobjc 22 + , Security 23 + , CoreServices 24 + , ApplicationServices 25 + , Carbon 26 + , AppKit 27 }: 28 29 rustPlatform.buildRustPackage rec { ··· 47 copyDesktopItems 48 ]; 49 50 + # Get openssl-sys to use pkg-config 51 + OPENSSL_NO_VENDOR = 1; 52 + 53 buildInputs = [ 54 + openssl 55 + ] ++ lib.optionals stdenv.isLinux [ 56 freetype 57 fontconfig 58 libxkbcommon ··· 62 libXrandr 63 libXi 64 vulkan-loader 65 + ] ++ lib.optionals stdenv.isDarwin [ 66 + libobjc 67 + Security 68 + CoreServices 69 + ApplicationServices 70 + Carbon 71 + AppKit 72 ]; 73 74 # Add missing vulkan dependency to rpath 75 + preFixup = lib.optionalString stdenv.isLinux '' 76 patchelf --add-needed ${vulkan-loader}/lib/libvulkan.so.1 $out/bin/lapce 77 ''; 78 ··· 95 homepage = "https://github.com/lapce/lapce"; 96 license = with licenses; [ asl20 ]; 97 maintainers = with maintainers; [ elliot ]; 98 }; 99 }
+9 -3
pkgs/applications/misc/archivy/default.nix
··· 1 - { lib, stdenv, python3, fetchPypi }: 2 3 let 4 defaultOverrides = [ ··· 37 38 buildPythonApplication rec { 39 pname = "archivy"; 40 - version = "1.7.1"; 41 42 src = fetchPypi { 43 inherit pname version; 44 - sha256 = "sha256-UNGl5Dl/E3+uQ4HIxzHYliHF4lqD3GYdeoL+DtqUwCo="; 45 }; 46 47 # Relax some dependencies ··· 54 --replace 'python_frontmatter == 0.5.0' 'python_frontmatter' \ 55 --replace 'requests ==' 'requests >=' \ 56 --replace 'validators ==' 'validators >=' \ 57 --replace 'tinydb ==' 'tinydb >=' \ 58 --replace 'Flask_WTF == 0.14.3' 'Flask_WTF' \ 59 --replace 'Flask ==' 'Flask >='
··· 1 + { lib 2 + , stdenv 3 + , python3 4 + , fetchPypi 5 + }: 6 7 let 8 defaultOverrides = [ ··· 41 42 buildPythonApplication rec { 43 pname = "archivy"; 44 + version = "1.7.2"; 45 + format = "setuptools"; 46 47 src = fetchPypi { 48 inherit pname version; 49 + hash = "sha256-o5dVJDbdKgo6hMMU9mKzoouSgVWl7xSAp+Aq61VcfeU="; 50 }; 51 52 # Relax some dependencies ··· 59 --replace 'python_frontmatter == 0.5.0' 'python_frontmatter' \ 60 --replace 'requests ==' 'requests >=' \ 61 --replace 'validators ==' 'validators >=' \ 62 + --replace 'flask-login == ' 'flask-login >= ' \ 63 --replace 'tinydb ==' 'tinydb >=' \ 64 --replace 'Flask_WTF == 0.14.3' 'Flask_WTF' \ 65 --replace 'Flask ==' 'Flask >='
+2
pkgs/applications/misc/nut/default.nix
··· 36 37 enableParallelBuilding = true; 38 39 postInstall = '' 40 wrapProgram $out/bin/nut-scanner --prefix LD_LIBRARY_PATH : \ 41 "$out/lib:${neon}/lib:${libusb-compat-0_1.out}/lib:${avahi}/lib:${freeipmi}/lib"
··· 36 37 enableParallelBuilding = true; 38 39 + NIX_CFLAGS_COMPILE = [ "-std=c++14" ]; 40 + 41 postInstall = '' 42 wrapProgram $out/bin/nut-scanner --prefix LD_LIBRARY_PATH : \ 43 "$out/lib:${neon}/lib:${libusb-compat-0_1.out}/lib:${avahi}/lib:${freeipmi}/lib"
+21 -9
pkgs/applications/networking/cluster/helm/default.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub, installShellFiles }: 2 3 buildGoModule rec { 4 - pname = "helm"; 5 - version = "3.8.1"; 6 - gitCommit = "5cb9af4b1b271d11d7a97a71df3ac337dd94ad37"; 7 8 src = fetchFromGitHub { 9 owner = "helm"; 10 repo = "helm"; 11 rev = "v${version}"; 12 - sha256 = "sha256-AjNrn46l9gVC7MtGF59QWv+l6qYn+jzopsZtM/2faXY="; 13 }; 14 - vendorSha256 = "sha256-ffbp7J8XDxo/s79pjoiDVbft0pr/lJpuJuKiMpQwkT0="; 15 - 16 - doCheck = false; 17 18 subPackages = [ "cmd/helm" ]; 19 ldflags = [ ··· 23 "-X helm.sh/helm/v3/internal/version.gitCommit=${gitCommit}" 24 ]; 25 26 nativeBuildInputs = [ installShellFiles ]; 27 postInstall = '' 28 $out/bin/helm completion bash > helm.bash ··· 33 meta = with lib; { 34 homepage = "https://github.com/kubernetes/helm"; 35 description = "A package manager for kubernetes"; 36 license = licenses.asl20; 37 - maintainers = with maintainers; [ rlupton20 edude03 saschagrunert Frostman Chili-Man ]; 38 }; 39 }
··· 1 + { lib, stdenv, buildGoModule, fetchFromGitHub, installShellFiles }: 2 3 buildGoModule rec { 4 + pname = "kubernetes-helm"; 5 + version = "3.8.2"; 6 + gitCommit = "6e3701edea09e5d55a8ca2aae03a68917630e91b"; 7 8 src = fetchFromGitHub { 9 owner = "helm"; 10 repo = "helm"; 11 rev = "v${version}"; 12 + sha256 = "sha256-lFAzp7ZxyMZAEO1cNFkEPLgTLEGa6azv36xiTIz4FZY="; 13 }; 14 + vendorSha256 = "sha256-FLEydmR+UEZ80VYLxBU1ZdwpdLgTjUpqiMItnt9UuLY="; 15 16 subPackages = [ "cmd/helm" ]; 17 ldflags = [ ··· 21 "-X helm.sh/helm/v3/internal/version.gitCommit=${gitCommit}" 22 ]; 23 24 + preCheck = '' 25 + # skipping version tests because they require dot git directory 26 + substituteInPlace cmd/helm/version_test.go \ 27 + --replace "TestVersion" "SkipVersion" 28 + '' + lib.optionalString stdenv.isLinux '' 29 + # skipping plugin tests on linux 30 + substituteInPlace cmd/helm/plugin_test.go \ 31 + --replace "TestPluginDynamicCompletion" "SkipPluginDynamicCompletion" \ 32 + --replace "TestLoadPlugins" "SkipLoadPlugins" 33 + substituteInPlace cmd/helm/helm_test.go \ 34 + --replace "TestPluginExitCode" "SkipPluginExitCode" 35 + ''; 36 + 37 nativeBuildInputs = [ installShellFiles ]; 38 postInstall = '' 39 $out/bin/helm completion bash > helm.bash ··· 44 meta = with lib; { 45 homepage = "https://github.com/kubernetes/helm"; 46 description = "A package manager for kubernetes"; 47 + mainProgram = "helm"; 48 license = licenses.asl20; 49 + maintainers = with maintainers; [ rlupton20 edude03 saschagrunert Frostman Chili-Man techknowlogick ]; 50 }; 51 }
+2 -1
pkgs/applications/networking/instant-messengers/jitsi-meet-electron/default.nix
··· 46 postFixup = '' 47 makeWrapper ${electron}/bin/electron $out/bin/${pname} \ 48 --add-flags $out/share/${pname}/resources/app.asar \ 49 - --prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath [ stdenv.cc.cc xorg.libXtst pipewire ]}" 50 ''; 51 52 meta = with lib; {
··· 46 postFixup = '' 47 makeWrapper ${electron}/bin/electron $out/bin/${pname} \ 48 --add-flags $out/share/${pname}/resources/app.asar \ 49 + --prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath [ stdenv.cc.cc xorg.libXtst pipewire ]}" \ 50 + --add-flags "\''${NIXOS_OZONE_WL:+\''${WAYLAND_DISPLAY:+--enable-features=UseOzonePlatform --ozone-platform=wayland}}" 51 ''; 52 53 meta = with lib; {
+2 -2
pkgs/applications/virtualization/docker-slim/default.nix
··· 6 7 buildGoPackage rec { 8 pname = "docker-slim"; 9 - version = "1.37.5"; 10 11 goPackagePath = "github.com/docker-slim/docker-slim"; 12 ··· 14 owner = "docker-slim"; 15 repo = "docker-slim"; 16 rev = version; 17 - sha256 = "sha256-MBs0ybBXsanNFt6R7+ZYvtCh7iHE3FtWXE9uy9tbrE4="; 18 }; 19 20 subPackages = [ "cmd/docker-slim" "cmd/docker-slim-sensor" ];
··· 6 7 buildGoPackage rec { 8 pname = "docker-slim"; 9 + version = "1.37.6"; 10 11 goPackagePath = "github.com/docker-slim/docker-slim"; 12 ··· 14 owner = "docker-slim"; 15 repo = "docker-slim"; 16 rev = version; 17 + sha256 = "sha256-Jzi6JC6DRklZhNqmFx6eHx6qR8/fb/JuSpgwtPThcc4="; 18 }; 19 20 subPackages = [ "cmd/docker-slim" "cmd/docker-slim-sensor" ];
+2 -2
pkgs/development/python-modules/deezer-python/default.nix
··· 13 14 buildPythonPackage rec { 15 pname = "deezer-python"; 16 - version = "5.3.0"; 17 format = "pyproject"; 18 19 disabled = pythonOlder "3.6"; ··· 22 owner = "browniebroke"; 23 repo = pname; 24 rev = "refs/tags/v${version}"; 25 - sha256 = "sha256-Y3nn7q6wGBqWN2JxfpGYd/KDxW5yeuwkos0w1AENkJA="; 26 }; 27 28 nativeBuildInputs = [
··· 13 14 buildPythonPackage rec { 15 pname = "deezer-python"; 16 + version = "5.3.1"; 17 format = "pyproject"; 18 19 disabled = pythonOlder "3.6"; ··· 22 owner = "browniebroke"; 23 repo = pname; 24 rev = "refs/tags/v${version}"; 25 + sha256 = "sha256-x1iZP+dGHeWwIr/AwQr1rYSFECtM6iDXEq9DrGH5J+s="; 26 }; 27 28 nativeBuildInputs = [
+36 -10
pkgs/development/python-modules/dropbox/default.nix
··· 1 { lib 2 , buildPythonPackage 3 , fetchFromGitHub 4 , requests 5 - , urllib3 6 - , mock 7 - , setuptools 8 , stone 9 - , pythonOlder 10 }: 11 12 buildPythonPackage rec { ··· 20 owner = "dropbox"; 21 repo = "dropbox-sdk-python"; 22 rev = "v${version}"; 23 - sha256 = "sha256-pq/LkyOCS0PnujfN9aIx42aeZ8tw4XvRQ4Vid/nXgWE="; 24 }; 25 26 propagatedBuildInputs = [ 27 requests 28 - urllib3 29 mock 30 - setuptools 31 - stone 32 ]; 33 34 postPatch = '' ··· 36 --replace "'pytest-runner == 5.2.0'," "" 37 ''; 38 39 - # Set DROPBOX_TOKEN environment variable to a valid token. 40 - doCheck = false; 41 42 pythonImportsCheck = [ 43 "dropbox" 44 ]; 45 46 meta = with lib; {
··· 1 { lib 2 , buildPythonPackage 3 + , pythonOlder 4 , fetchFromGitHub 5 , requests 6 + , six 7 , stone 8 + , mock 9 + , pytest-mock 10 + , pytestCheckHook 11 }: 12 13 buildPythonPackage rec { ··· 21 owner = "dropbox"; 22 repo = "dropbox-sdk-python"; 23 rev = "v${version}"; 24 + hash = "sha256-w07r95MBAClf0F3SICiZsHLdslzf+JuxC+BVdTACCog="; 25 }; 26 27 propagatedBuildInputs = [ 28 requests 29 + six 30 + stone 31 + ]; 32 + 33 + checkInputs = [ 34 mock 35 + pytest-mock 36 + pytestCheckHook 37 ]; 38 39 postPatch = '' ··· 41 --replace "'pytest-runner == 5.2.0'," "" 42 ''; 43 44 + doCheck = true; 45 46 pythonImportsCheck = [ 47 "dropbox" 48 + ]; 49 + 50 + # Set SCOPED_USER_DROPBOX_TOKEN environment variable to a valid value. 51 + disabledTests = [ 52 + "test_default_oauth2_urls" 53 + "test_bad_auth" 54 + "test_multi_auth" 55 + "test_refresh" 56 + "test_app_auth" 57 + "test_downscope" 58 + "test_rpc" 59 + "test_upload_download" 60 + "test_bad_upload_types" 61 + "test_clone_when_user_linked" 62 + "test_with_path_root_constructor" 63 + "test_path_root" 64 + "test_path_root_err" 65 + "test_versioned_route" 66 + "test_team" 67 + "test_as_user" 68 + "test_as_admin" 69 + "test_clone_when_team_linked" 70 ]; 71 72 meta = with lib; {
+9 -4
pkgs/development/python-modules/flake8-bugbear/default.nix
··· 4 , attrs 5 , flake8 6 , pytestCheckHook 7 , hypothesis 8 , hypothesmith 9 }: 10 11 buildPythonPackage rec { 12 pname = "flake8-bugbear"; 13 - version = "22.3.23"; 14 15 src = fetchFromGitHub { 16 owner = "PyCQA"; 17 repo = pname; 18 - rev = version; 19 - sha256 = "sha256-s1EnPM2He+R+vafu14XI1Xuft8Rg6W3vPH2Atc6N7I0="; 20 }; 21 22 propagatedBuildInputs = [ ··· 32 ]; 33 34 meta = with lib; { 35 homepage = "https://github.com/PyCQA/flake8-bugbear"; 36 changelog = "https://github.com/PyCQA/flake8-bugbear/blob/${version}/README.rst#change-log"; 37 - description = '' 38 A plugin for flake8 finding likely bugs and design problems in your 39 program. 40 '';
··· 4 , attrs 5 , flake8 6 , pytestCheckHook 7 + , pythonOlder 8 , hypothesis 9 , hypothesmith 10 }: 11 12 buildPythonPackage rec { 13 pname = "flake8-bugbear"; 14 + version = "22.4.25"; 15 + format = "setuptools"; 16 + 17 + disabled = pythonOlder "3.6"; 18 19 src = fetchFromGitHub { 20 owner = "PyCQA"; 21 repo = pname; 22 + rev = "refs/tags/${version}"; 23 + hash = "sha256-y/hpBlIQ3aJj3Y1snpArOCIv2w1ncQNMSYJ+G0CeM84="; 24 }; 25 26 propagatedBuildInputs = [ ··· 36 ]; 37 38 meta = with lib; { 39 + description = "Plugin for Flake8 to find bugs and design problems"; 40 homepage = "https://github.com/PyCQA/flake8-bugbear"; 41 changelog = "https://github.com/PyCQA/flake8-bugbear/blob/${version}/README.rst#change-log"; 42 + longDescription = '' 43 A plugin for flake8 finding likely bugs and design problems in your 44 program. 45 '';
+8 -7
pkgs/development/python-modules/pyrogram/default.nix
··· 1 { lib 2 , buildPythonPackage 3 , pythonOlder 4 - , fetchPypi 5 , pyaes 6 , pysocks 7 , async-lru ··· 12 13 buildPythonPackage rec { 14 pname = "pyrogram"; 15 - version = "1.4.16"; 16 17 - disabled = pythonOlder "3.6"; 18 19 - src = fetchPypi { 20 - pname = "Pyrogram"; 21 - inherit version; 22 - hash = "sha256-ZYAPaAa92z3KtciVHOexdZf9bwZjKQ9WKg6+We0dW+Q="; 23 }; 24 25 propagatedBuildInputs = [
··· 1 { lib 2 , buildPythonPackage 3 , pythonOlder 4 + , fetchFromGitHub 5 , pyaes 6 , pysocks 7 , async-lru ··· 12 13 buildPythonPackage rec { 14 pname = "pyrogram"; 15 + version = "2.0.13"; 16 17 + disabled = pythonOlder "3.7"; 18 19 + src = fetchFromGitHub { 20 + owner = "pyrogram"; 21 + repo = "pyrogram"; 22 + rev = "v${version}"; 23 + hash = "sha256-8mnGfW8/2RbU4gFS8e72KAxMGGkb8XrhsyK01wD97rI="; 24 }; 25 26 propagatedBuildInputs = [
+48 -10
pkgs/development/python-modules/pytest-isort/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, isPy27, mock, pytest, isort }: 2 3 buildPythonPackage rec { 4 pname = "pytest-isort"; 5 version = "3.0.0"; 6 7 - src = fetchPypi { 8 - inherit pname version; 9 - sha256 = "sha256-T+Sybq0q93ZzDsI/WHDXQh81qs4ipBxOk4WG702Hh8s="; 10 }; 11 12 - propagatedBuildInputs = [ isort ]; 13 14 - checkInputs = [ pytest ] 15 - ++ lib.optionals isPy27 [ mock ]; 16 17 - checkPhase = '' 18 - py.test -vs --cache-clear 19 - ''; 20 21 meta = with lib; { 22 description = "Pytest plugin to perform isort checks (import ordering)"; 23 homepage = "https://github.com/moccu/pytest-isort/"; 24 license = licenses.bsd3; 25 }; 26 }
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , fetchpatch 5 + , importlib-metadata 6 + , isort 7 + , poetry-core 8 + , pytest 9 + , pytestCheckHook 10 + , pythonOlder 11 + }: 12 13 buildPythonPackage rec { 14 pname = "pytest-isort"; 15 version = "3.0.0"; 16 + format = "pyproject"; 17 + 18 + disabled = pythonOlder "3.7"; 19 20 + src = fetchFromGitHub { 21 + owner = "stephrdev"; 22 + repo = pname; 23 + rev = version; 24 + hash = "sha256-gbEO3HBDeZ+nUACzpeV6iVuCdNHS5956wFzIYkbam+M="; 25 }; 26 27 + nativeBuildInputs = [ 28 + poetry-core 29 + ]; 30 31 + buildInputs = [ 32 + pytest 33 + ]; 34 35 + propagatedBuildInputs = [ 36 + isort 37 + ] ++ lib.optionals (pythonOlder "3.8") [ 38 + importlib-metadata 39 + ]; 40 + 41 + checkInputs = [ 42 + pytestCheckHook 43 + ]; 44 + 45 + patches = [ 46 + # Can be removed with the next release, https://github.com/stephrdev/pytest-isort/pull/44 47 + (fetchpatch { 48 + name = "switch-to-poetry-core.patch"; 49 + url = "https://github.com/stephrdev/pytest-isort/commit/f17ed2d294ae90e415d051e1c720982e3dd01bff.patch"; 50 + sha256 = "sha256-PiOs0c61BNx/tZN11DYblOd7tNzGthNnlkmYMTI9v18="; 51 + }) 52 + ]; 53 + 54 + pythonImportsCheck = [ 55 + "pytest_isort" 56 + ]; 57 58 meta = with lib; { 59 description = "Pytest plugin to perform isort checks (import ordering)"; 60 homepage = "https://github.com/moccu/pytest-isort/"; 61 license = licenses.bsd3; 62 + maintainers = with maintainers; [ ]; 63 }; 64 }
+37
pkgs/development/python-modules/rjpl/default.nix
···
··· 1 + { lib 2 + , buildPythonPackage 3 + , requests 4 + , fetchPypi 5 + , pythonOlder 6 + }: 7 + 8 + buildPythonPackage rec { 9 + pname = "rjpl"; 10 + version = "0.3.6"; 11 + format = "setuptools"; 12 + 13 + disabled = pythonOlder "3.7"; 14 + 15 + src = fetchPypi { 16 + inherit pname version; 17 + hash = "sha256-GLNIpZuM3yuCnPyjBa8KjdaL5cFK8InluuY+LTCrimc="; 18 + }; 19 + 20 + propagatedBuildInputs = [ 21 + requests 22 + ]; 23 + 24 + # Module has no tests 25 + doCheck = false; 26 + 27 + pythonImportsCheck = [ 28 + "rjpl" 29 + ]; 30 + 31 + meta = with lib; { 32 + description = "Library for interacting with the Rejseplanen API"; 33 + homepage = "https://github.com/tomatpasser/python-rejseplanen"; 34 + license = with licenses; [ mit ]; 35 + maintainers = with maintainers; [ fab ]; 36 + }; 37 + }
+1
pkgs/development/python-modules/scikit-learn-extra/default.nix
··· 38 ]; 39 disabledTests = [ 40 "build" # needs network connection 41 ]; 42 43 # Check packages with cythonized modules
··· 38 ]; 39 disabledTests = [ 40 "build" # needs network connection 41 + "test_all_estimators" # sklearn.exceptions.NotFittedError: Estimator fails to pass `check_is_fitted` even though it has been fit. 42 ]; 43 44 # Check packages with cythonized modules
+27 -3
pkgs/development/python-modules/vivisect/default.nix
··· 2 , buildPythonPackage 3 , isPy3k 4 , fetchPypi 5 , pyasn1 6 , pyasn1-modules 7 , cxxfilt 8 , msgpack 9 , pycparser 10 }: 11 buildPythonPackage rec { 12 pname = "vivisect"; 13 version = "1.0.7"; 14 - disabled = isPy3k; 15 16 src = fetchPypi { 17 inherit pname version; 18 sha256 = "727a27ac1eb95d5a41f4430f6912e79940525551314fe68a2811fc9d51eaf2e9"; 19 }; 20 21 propagatedBuildInputs = [ 22 pyasn1 23 pyasn1-modules 24 cxxfilt 25 msgpack 26 pycparser 27 ]; 28 29 - preBuild = '' 30 - sed "s@==.*'@'@" -i setup.py 31 ''; 32 33 # requires another repo for test files
··· 2 , buildPythonPackage 3 , isPy3k 4 , fetchPypi 5 + , wrapQtAppsHook 6 + 7 + # propagates 8 , pyasn1 9 , pyasn1-modules 10 , cxxfilt 11 , msgpack 12 , pycparser 13 + 14 + # extras: gui 15 + , pyqt5 16 + , pyqtwebengine 17 + 18 + # knobs 19 + , withGui ? false 20 }: 21 + 22 buildPythonPackage rec { 23 pname = "vivisect"; 24 version = "1.0.7"; 25 26 src = fetchPypi { 27 inherit pname version; 28 sha256 = "727a27ac1eb95d5a41f4430f6912e79940525551314fe68a2811fc9d51eaf2e9"; 29 }; 30 31 + postPatch = '' 32 + substituteInPlace setup.py \ 33 + --replace 'cxxfilt>=0.2.1,<0.3.0' 'cxxfilt' 34 + ''; 35 + 36 + nativeBuildInputs = [ 37 + wrapQtAppsHook 38 + ]; 39 + 40 propagatedBuildInputs = [ 41 pyasn1 42 pyasn1-modules 43 cxxfilt 44 msgpack 45 pycparser 46 + ] ++ lib.optionals (withGui) passthru.extras-require.gui; 47 + 48 + passthru.extras-require.gui = [ 49 + pyqt5 50 + pyqtwebengine 51 ]; 52 53 + postFixup = '' 54 + wrapQtApp $out/bin/vivbin 55 ''; 56 57 # requires another repo for test files
+2 -2
pkgs/development/tools/analysis/flow/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 pname = "flow"; 5 - version = "0.176.2"; 6 7 src = fetchFromGitHub { 8 owner = "facebook"; 9 repo = "flow"; 10 rev = "v${version}"; 11 - sha256 = "sha256-/4wEafdmrXj4ALUVYx8DM9XyRP/wvbwAl0St1S/+9Ws="; 12 }; 13 14 makeFlags = [ "FLOW_RELEASE=1" ];
··· 2 3 stdenv.mkDerivation rec { 4 pname = "flow"; 5 + version = "0.176.3"; 6 7 src = fetchFromGitHub { 8 owner = "facebook"; 9 repo = "flow"; 10 rev = "v${version}"; 11 + sha256 = "sha256-ZjWIaZ4XT7v66ozjQu+ld0Tz2gVjQFUD6JoL1nW/DmE="; 12 }; 13 14 makeFlags = [ "FLOW_RELEASE=1" ];
+2 -2
pkgs/development/tools/build-managers/bazel/bazel-remote/default.nix
··· 5 6 buildGoModule rec { 7 pname = "bazel-remote"; 8 - version = "2.3.6"; 9 10 src = fetchFromGitHub { 11 owner = "buchgr"; 12 repo = pname; 13 rev = "v${version}"; 14 - sha256 = "sha256-geb7uHCBvhmqyaDr8wK9sQUcHT3xVgSclovFDpHhIiw="; 15 }; 16 17 vendorSha256 = "sha256-wXgW7HigMIeUZAcZpm5TH9thfCHmpz+M42toWHgwIYo=";
··· 5 6 buildGoModule rec { 7 pname = "bazel-remote"; 8 + version = "2.3.7"; 9 10 src = fetchFromGitHub { 11 owner = "buchgr"; 12 repo = pname; 13 rev = "v${version}"; 14 + sha256 = "sha256-5VxPCfartTRYCmjwNrH7SM0o7IQ4+Tq8Q2IM8hFWyVc="; 15 }; 16 17 vendorSha256 = "sha256-wXgW7HigMIeUZAcZpm5TH9thfCHmpz+M42toWHgwIYo=";
+15 -8
pkgs/development/tools/dapr/cli/default.nix
··· 1 - { buildGoModule, fetchFromGitHub, lib }: 2 3 buildGoModule rec { 4 - pname = "dapr"; 5 - version = "1.1.0"; 6 - 7 - vendorSha256 = "0fng5a1pvpbwil79xapdalzgkgc9dwsdxs6bznjfwnkyd1vvw6fm"; 8 9 src = fetchFromGitHub { 10 - sha256 = "0x2mvlzlmcik6ys6xp722px9l4lj9ssyxb06bzxd7yj7m1wwcwp9"; 11 - 12 owner = "dapr"; 13 repo = "cli"; 14 rev = "v${version}"; 15 }; 16 17 - doCheck = false; 18 19 postInstall = '' 20 mv $out/bin/cli $out/bin/dapr 21 ''; 22 23 meta = with lib; {
··· 1 + { buildGoModule, fetchFromGitHub, installShellFiles, lib }: 2 3 buildGoModule rec { 4 + pname = "dapr-cli"; 5 + version = "1.7.0"; 6 7 src = fetchFromGitHub { 8 owner = "dapr"; 9 repo = "cli"; 10 rev = "v${version}"; 11 + sha256 = "sha256-+P1oXG+uvnFDGis5pz9VUQ4n1C7mjuetXz1OtN7IIrg="; 12 }; 13 14 + vendorSha256 = "sha256-EvOyOy7DFQtFavOC9eBUZRJsj3pNdx7jumVmZ/THdaM="; 15 + 16 + nativeBuildInputs = [ installShellFiles ]; 17 + 18 + preCheck = '' 19 + export HOME=$(mktemp -d) 20 + ''; 21 22 postInstall = '' 23 mv $out/bin/cli $out/bin/dapr 24 + 25 + installShellCompletion --cmd dapr \ 26 + --bash <($out/bin/dapr completion bash) \ 27 + --zsh <($out/bin/dapr completion zsh) 28 ''; 29 30 meta = with lib; {
-2
pkgs/development/tools/go-protobuf/default.nix
··· 13 14 vendorSha256 = "sha256-CcJjFMslSUiZMM0LLMM3BR53YMxyWk8m7hxjMI9tduE="; 15 16 - doCheck = false; 17 - 18 meta = with lib; { 19 homepage = "https://github.com/golang/protobuf"; 20 description = " Go bindings for protocol buffer";
··· 13 14 vendorSha256 = "sha256-CcJjFMslSUiZMM0LLMM3BR53YMxyWk8m7hxjMI9tduE="; 15 16 meta = with lib; { 17 homepage = "https://github.com/golang/protobuf"; 18 description = " Go bindings for protocol buffer";
+7 -7
pkgs/development/tools/misc/go-license-detector/default.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub }: 2 3 buildGoModule rec { 4 pname = "go-license-detector"; 5 - version = "3.1.0"; 6 7 src = fetchFromGitHub { 8 - owner = "src-d"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "0ln1z3y9q5igf9djkxw05ql2hb1ijcvvz0mrbwz11cdv9xrsa4z4"; 12 }; 13 14 - vendorSha256 = "0gan5l7vsq0hixxcymhhs8p07v92w60r0lhgvrr9a99nic12vmia"; 15 16 - doCheck = false; 17 18 meta = with lib; { 19 description = "Reliable project licenses detector"; 20 - homepage = "https://github.com/src-d/go-license-detector"; 21 license = licenses.asl20; 22 maintainers = with maintainers; [ dtzWill ]; 23 mainProgram = "license-detector";
··· 1 + { lib, buildGoModule, fetchFromGitHub, git }: 2 3 buildGoModule rec { 4 pname = "go-license-detector"; 5 + version = "4.3.0"; 6 7 src = fetchFromGitHub { 8 + owner = "go-enry"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-MubQpxpUCPDBVsEz4NmY8MFEoECXQtzAaZJ89vv5bDc="; 12 }; 13 14 + vendorSha256 = "sha256-a9yCnGg+4f+UoHbGG8a47z2duBD3qXcAzPKnE4PQsvM="; 15 16 + checkInputs = [ git ]; 17 18 meta = with lib; { 19 description = "Reliable project licenses detector"; 20 + homepage = "https://github.com/go-enry/go-license-detector"; 21 license = licenses.asl20; 22 maintainers = with maintainers; [ dtzWill ]; 23 mainProgram = "license-detector";
+8 -3
pkgs/development/tools/mockgen/default.nix
··· 1 - { buildGoModule, lib, fetchFromGitHub }: 2 buildGoModule rec { 3 pname = "mockgen"; 4 version = "1.6.0"; 5 src = fetchFromGitHub { 6 owner = "golang"; 7 repo = "mock"; 8 rev = "v${version}"; 9 sha256 = "sha256-5Kp7oTmd8kqUN+rzm9cLqp9nb3jZdQyltGGQDiRSWcE="; 10 }; 11 vendorSha256 = "sha256-5gkrn+OxbNN8J1lbgbxM8jACtKA7t07sbfJ7gVJWpJM="; 12 13 - doCheck = false; 14 15 - subPackages = [ "mockgen" ]; 16 17 meta = with lib; { 18 description = "GoMock is a mocking framework for the Go programming language";
··· 1 + { buildGoModule, fetchFromGitHub, lib }: 2 + 3 buildGoModule rec { 4 pname = "mockgen"; 5 version = "1.6.0"; 6 + 7 src = fetchFromGitHub { 8 owner = "golang"; 9 repo = "mock"; 10 rev = "v${version}"; 11 sha256 = "sha256-5Kp7oTmd8kqUN+rzm9cLqp9nb3jZdQyltGGQDiRSWcE="; 12 }; 13 + 14 vendorSha256 = "sha256-5gkrn+OxbNN8J1lbgbxM8jACtKA7t07sbfJ7gVJWpJM="; 15 16 + subPackages = [ "mockgen" ]; 17 18 + preCheck = '' 19 + export GOROOT="$(go env GOROOT)" 20 + ''; 21 22 meta = with lib; { 23 description = "GoMock is a mocking framework for the Go programming language";
+4 -6
pkgs/development/tools/protoc-gen-doc/default.nix
··· 1 { buildGoModule, fetchFromGitHub, lib }: 2 3 buildGoModule rec { 4 - pname = "protoc-gen-doc-unstable"; 5 - version = "1.5.0"; 6 7 src = fetchFromGitHub { 8 owner = "pseudomuto"; 9 repo = "protoc-gen-doc"; 10 rev = "v${version}"; 11 - sha256 = "1bpb5wv76p0sjffh5d1frbygp3q1p07sdh5c8pznl5bdh5pd7zxq"; 12 }; 13 14 - vendorSha256 = "08pk9nxsl28dw3qmrlb7vsm8xbdzmx98qwkxgg93ykrhzx235k1b"; 15 - 16 - doCheck = false; 17 18 meta = with lib; { 19 description = "Documentation generator plugin for Google Protocol Buffers";
··· 1 { buildGoModule, fetchFromGitHub, lib }: 2 3 buildGoModule rec { 4 + pname = "protoc-gen-doc"; 5 + version = "1.5.1"; 6 7 src = fetchFromGitHub { 8 owner = "pseudomuto"; 9 repo = "protoc-gen-doc"; 10 rev = "v${version}"; 11 + sha256 = "sha256-19CN62AwqQGq5Gb5kQqVYhs+LKsJ9K2L0VAakwzPD5Y="; 12 }; 13 14 + vendorSha256 = "sha256-K0rZBERSKob5ubZW28QpbcPhgFKOOASkd9UyC9f8gyQ="; 15 16 meta = with lib; { 17 description = "Documentation generator plugin for Google Protocol Buffers";
+3 -1
pkgs/servers/calibre-web/default.nix
··· 53 54 substituteInPlace setup.cfg \ 55 --replace "cps = calibreweb:main" "calibre-web = calibreweb:main" \ 56 --replace "flask-wtf>=0.14.2,<0.16.0" "flask-wtf>=0.14.2" \ 57 - --replace "lxml>=3.8.0,<4.7.0" "lxml>=3.8.0" \ 58 --replace "PyPDF3>=1.0.0,<1.0.4" "PyPDF3>=1.0.0" \ 59 --replace "requests>=2.11.1,<2.25.0" "requests" \ 60 --replace "unidecode>=0.04.19,<1.3.0" "unidecode>=0.04.19"
··· 53 54 substituteInPlace setup.cfg \ 55 --replace "cps = calibreweb:main" "calibre-web = calibreweb:main" \ 56 + --replace "Flask>=1.0.2,<2.1.0" "Flask>=1.0.2" \ 57 + --replace "Flask-Login>=0.3.2,<0.5.1" "Flask-Login>=0.3.2" \ 58 --replace "flask-wtf>=0.14.2,<0.16.0" "flask-wtf>=0.14.2" \ 59 + --replace "lxml>=3.8.0,<4.8.0" "lxml>=3.8.0" \ 60 --replace "PyPDF3>=1.0.0,<1.0.4" "PyPDF3>=1.0.0" \ 61 --replace "requests>=2.11.1,<2.25.0" "requests" \ 62 --replace "unidecode>=0.04.19,<1.3.0" "unidecode>=0.04.19"
+1 -2
pkgs/servers/gortr/default.nix
··· 10 rev = "v${version}"; 11 sha256 = "10dq42d3hb6a3ln3x1rag1lqzhwqb66xn4q8k4igjkn5my81nr6q"; 12 }; 13 - vendorSha256 = "1nwrzbpqycr4ixk8a90pgaxcwakv5nlfnql6hmcc518qrva198wp"; 14 15 - doCheck = false; 16 17 meta = with lib; { 18 description = "The RPKI-to-Router server used at Cloudflare";
··· 10 rev = "v${version}"; 11 sha256 = "10dq42d3hb6a3ln3x1rag1lqzhwqb66xn4q8k4igjkn5my81nr6q"; 12 }; 13 14 + vendorSha256 = "1nwrzbpqycr4ixk8a90pgaxcwakv5nlfnql6hmcc518qrva198wp"; 15 16 meta = with lib; { 17 description = "The RPKI-to-Router server used at Cloudflare";
+2 -1
pkgs/servers/home-assistant/component-packages.nix
··· 2146 praw 2147 ]; 2148 "rejseplanen" = ps: with ps; [ 2149 - ]; # missing inputs: rjpl 2150 "remember_the_milk" = ps: with ps; [ 2151 httplib2 2152 ]; # missing inputs: RtmAPI
··· 2146 praw 2147 ]; 2148 "rejseplanen" = ps: with ps; [ 2149 + rjpl 2150 + ]; 2151 "remember_the_milk" = ps: with ps; [ 2152 httplib2 2153 ]; # missing inputs: RtmAPI
+3 -3
pkgs/servers/routinator/default.nix
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "routinator"; 10 - version = "0.11.1"; 11 12 src = fetchFromGitHub { 13 owner = "NLnetLabs"; 14 repo = pname; 15 rev = "v${version}"; 16 - sha256 = "sha256-8rILHWxUrQQx/ZpZQECa3JBCGD+a5Po8jdqb/rTx6WA="; 17 }; 18 19 - cargoSha256 = "sha256-TYVpi4ZyM0Nl2RWRMEwLM+TeAEzk1IUCQTXZLG92vt4="; 20 21 buildInputs = lib.optionals stdenv.isDarwin [ Security ]; 22
··· 7 8 rustPlatform.buildRustPackage rec { 9 pname = "routinator"; 10 + version = "0.11.2"; 11 12 src = fetchFromGitHub { 13 owner = "NLnetLabs"; 14 repo = pname; 15 rev = "v${version}"; 16 + sha256 = "sha256-C6BY+Ba5KQgi+jMUKRi7osZNEDMLMDOhA4TQlbqb9jY="; 17 }; 18 19 + cargoSha256 = "sha256-5ZBE7jbhO4j4FwGSXLIbYjmtmNxFpiME9JqXBqwHSUA="; 20 21 buildInputs = lib.optionals stdenv.isDarwin [ Security ]; 22
+30 -9
pkgs/tools/admin/awslogs/default.nix
··· 1 - { lib, fetchFromGitHub, python3Packages }: 2 3 - python3Packages.buildPythonApplication rec { 4 pname = "awslogs"; 5 version = "0.14.0"; 6 7 src = fetchFromGitHub { 8 owner = "jorgebastida"; 9 - repo = "awslogs"; 10 rev = version; 11 - sha256 = "1gyry8b64psvmjcb2lb3yilpa7b17yllga06svls4hi69arvrd8f"; 12 }; 13 14 - propagatedBuildInputs = with python3Packages; [ 15 - boto3 termcolor python-dateutil docutils setuptools jmespath 16 ]; 17 18 - checkInputs = [ python3Packages.pytestCheckHook ]; 19 disabledTests = [ 20 "test_main_get_query" 21 "test_main_get_with_color" 22 ]; 23 24 meta = with lib; { 25 - homepage = "https://github.com/jorgebastida/awslogs"; 26 description = "AWS CloudWatch logs for Humans"; 27 - maintainers = with maintainers; [ dbrock ]; 28 license = licenses.bsd3; 29 }; 30 }
··· 1 + { lib 2 + , fetchFromGitHub 3 + , python3 4 + }: 5 6 + python3.pkgs.buildPythonApplication rec { 7 pname = "awslogs"; 8 version = "0.14.0"; 9 + format = "setuptools"; 10 11 src = fetchFromGitHub { 12 owner = "jorgebastida"; 13 + repo = pname; 14 rev = version; 15 + sha256 = "sha256-DrW8s0omQqLp1gaoR6k/YR11afRjUbGYrFtfYhby2b8="; 16 }; 17 18 + propagatedBuildInputs = with python3.pkgs; [ 19 + boto3 20 + termcolor 21 + python-dateutil 22 + docutils 23 + setuptools 24 + jmespath 25 + ]; 26 + 27 + checkInputs = with python3.pkgs; [ 28 + pytestCheckHook 29 ]; 30 31 + postPatch = '' 32 + substituteInPlace setup.py \ 33 + --replace "jmespath>=0.7.1,<1.0.0" "jmespath>=0.7.1" 34 + ''; 35 + 36 disabledTests = [ 37 "test_main_get_query" 38 "test_main_get_with_color" 39 + ]; 40 + 41 + pythonImportsCheck = [ 42 + "awslogs" 43 ]; 44 45 meta = with lib; { 46 description = "AWS CloudWatch logs for Humans"; 47 + homepage = "https://github.com/jorgebastida/awslogs"; 48 license = licenses.bsd3; 49 + maintainers = with maintainers; [ dbrock ]; 50 }; 51 }
+3 -3
pkgs/tools/misc/czkawka/default.nix
··· 14 15 rustPlatform.buildRustPackage rec { 16 pname = "czkawka"; 17 - version = "4.0.0"; 18 19 src = fetchFromGitHub { 20 owner = "qarmin"; 21 repo = "czkawka"; 22 rev = version; 23 - sha256 = "sha256-UIgyKWMVSKAgUNqfxFYSfP+l9x52XAzrXr1nnfKub9I="; 24 }; 25 26 - cargoSha256 = "sha256-jPrkNKFmdVk3LEa20jtXSx+7S98fSrX7Rt/lexC0Gwo="; 27 28 nativeBuildInputs = [ 29 pkg-config
··· 14 15 rustPlatform.buildRustPackage rec { 16 pname = "czkawka"; 17 + version = "4.1.0"; 18 19 src = fetchFromGitHub { 20 owner = "qarmin"; 21 repo = "czkawka"; 22 rev = version; 23 + sha256 = "sha256-N7fCYcjhYlFVkvWdFpR5cu98Vy+jStlBkR/vz/k1lLY="; 24 }; 25 26 + cargoSha256 = "sha256-4L7OjJ26Qpl5YuHil7JEYU8xWH65jiyFz0a/ufr7wYQ="; 27 28 nativeBuildInputs = [ 29 pkg-config
+4 -4
pkgs/tools/misc/dotter/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "dotter"; 5 - version = "0.12.9"; 6 7 src = fetchFromGitHub { 8 owner = "SuperCuber"; 9 repo = "dotter"; 10 - rev = version; 11 - sha256 = "0rxinrm110i5cbkl7c7vgk7dl0x79cg6g23bdjixsg7h0572c2gi"; 12 }; 13 14 - cargoSha256 = "0fr2dvzbpwqvf98wwrxv76nwbrv4m9ppx7br4x78gm8dhf2nj4zx"; 15 16 checkInputs = [ which ]; 17
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "dotter"; 5 + version = "0.12.10"; 6 7 src = fetchFromGitHub { 8 owner = "SuperCuber"; 9 repo = "dotter"; 10 + rev = "v${version}"; 11 + hash = "sha256-uSM7M//3LHzdLSOruTyu46sp1a6LeodT2cCEFsuoPW4="; 12 }; 13 14 + cargoHash = "sha256-JpMEC2HjAQLQiXHSE6L0HBDc0vLhd465wDK2+35aBXA="; 15 16 checkInputs = [ which ]; 17
+2 -2
pkgs/tools/misc/nix-direnv/default.nix
··· 7 }: 8 stdenv.mkDerivation rec { 9 pname = "nix-direnv"; 10 - version = "2.0.0"; 11 12 src = fetchFromGitHub { 13 owner = "nix-community"; 14 repo = "nix-direnv"; 15 rev = version; 16 - sha256 = "sha256-0gBb/U7tNNSjazJE/Z2qAxHPX53wRSPMJ8rHc7HtCNg="; 17 }; 18 19 # Substitute instead of wrapping because the resulting file is
··· 7 }: 8 stdenv.mkDerivation rec { 9 pname = "nix-direnv"; 10 + version = "2.0.1"; 11 12 src = fetchFromGitHub { 13 owner = "nix-community"; 14 repo = "nix-direnv"; 15 rev = version; 16 + sha256 = "sha256-edRdnMNYB5N9v9QlfSFNqJl93X0rSCllmzSZO9+sCOg="; 17 }; 18 19 # Substitute instead of wrapping because the resulting file is
+18 -15
pkgs/tools/security/chntpw/00-chntpw-build-arch-autodetect.patch
··· 1 - diff -urN chntpw-140201.orig/Makefile chntpw-140201/Makefile 2 - --- chntpw-140201.orig/Makefile 2014-02-01 20:54:37.000000000 +0400 3 - +++ chntpw-140201/Makefile 2014-08-03 20:26:56.497161881 +0400 4 - @@ -12,14 +12,13 @@ 5 6 - CC=gcc 7 - 8 -# Force 32 bit 9 -CFLAGS= -DUSEOPENSSL -g -I. -I$(OSSLINC) -Wall -m32 10 -OSSLLIB=$(OSSLPATH)/lib ··· 13 -#CFLAGS= -DUSEOPENSSL -g -I. -I$(OSSLINC) -Wall 14 -#OSSLLIB=$(OSSLPATH)/lib64 15 - 16 - +ifeq '$(shell gcc -dumpmachine)' 'x86_64-unknown-linux-gnu' 17 - + CFLAGS= -DUSEOPENSSL -g -I. -I$(OSSLINC) -Wall 18 - + OSSLLIB=$(OSSLPATH)/lib64 19 - +else ifeq '$(shell gcc -dumpmachine)' 'i686-unknown-linux-gnu' 20 - + CFLAGS= -DUSEOPENSSL -g -I. -I$(OSSLINC) -Wall -m32 21 - + OSSLLIB=$(OSSLPATH)/lib 22 - +endif 23 24 - # This is to link with whatever we have, SSL crypto lib we put in static 25 - #LIBS=-L$(OSSLLIB) $(OSSLLIB)/libcrypto.a
··· 1 + --- chntpw-140201.orig/Makefile 2014-02-01 17:54:37.000000000 +0100 2 + +++ chntpw-140201/Makefile 2022-04-21 00:14:45.000000000 +0200 3 + @@ -6,24 +6,7 @@ 4 + # See INSTALL for more info. 5 + # 6 7 + -#SSLPATH=/usr/local/ssl 8 + -OSSLPATH=/usr 9 + -OSSLINC=$(OSSLPATH)/include 10 + - 11 + -CC=gcc 12 + - 13 -# Force 32 bit 14 -CFLAGS= -DUSEOPENSSL -g -I. -I$(OSSLINC) -Wall -m32 15 -OSSLLIB=$(OSSLPATH)/lib ··· 18 -#CFLAGS= -DUSEOPENSSL -g -I. -I$(OSSLINC) -Wall 19 -#OSSLLIB=$(OSSLPATH)/lib64 20 - 21 + - 22 + -# This is to link with whatever we have, SSL crypto lib we put in static 23 + -#LIBS=-L$(OSSLLIB) $(OSSLLIB)/libcrypto.a 24 + -LIBS=-L$(OSSLLIB) 25 + +CFLAGS= -DUSEOPENSSL -g -I. -Wall 26 27 + 28 + all: chntpw chntpw.static cpnt reged reged.static samusrgrp samusrgrp.static sampasswd sampasswd.static
+7 -13
pkgs/tools/security/chntpw/01-chntpw-install-target.patch
··· 1 - diff -urN chntpw-140201.orig/Makefile chntpw-140201/Makefile 2 - --- chntpw-140201.orig/Makefile 2014-08-03 20:26:56.497161881 +0400 3 - +++ chntpw-140201/Makefile 2014-08-04 12:57:16.563818342 +0400 4 - @@ -10,6 +10,8 @@ 5 - OSSLPATH=/usr 6 - OSSLINC=$(OSSLPATH)/include 7 8 +PREFIX ?= /usr 9 + 10 - CC=gcc 11 - 12 - ifeq '$(shell gcc -dumpmachine)' 'x86_64-unknown-linux-gnu' 13 - @@ -24,8 +26,12 @@ 14 - #LIBS=-L$(OSSLLIB) $(OSSLLIB)/libcrypto.a 15 - LIBS=-L$(OSSLLIB) 16 17 - +BINARIES := chntpw chntpw.static cpnt reged reged.static samusrgrp samusrgrp.static sampasswd sampasswd.static 18 19 -all: chntpw chntpw.static cpnt reged reged.static samusrgrp samusrgrp.static sampasswd sampasswd.static 20 +all: $(BINARIES)
··· 1 + --- chntpw-140201/Makefile 2022-04-21 00:14:45.000000000 +0200 2 + +++ chntpw-140201.new/Makefile 2022-04-21 09:15:42.000000000 +0200 3 + @@ -6,10 +6,16 @@ 4 + # See INSTALL for more info. 5 + # 6 7 +PREFIX ?= /usr 8 + 9 + CFLAGS= -DUSEOPENSSL -g -I. -Wall 10 11 + +BINARIES := chntpw cpnt reged samusrgrp sampasswd 12 13 -all: chntpw chntpw.static cpnt reged reged.static samusrgrp samusrgrp.static sampasswd sampasswd.static 14 +all: $(BINARIES)
+39 -3
pkgs/tools/security/chntpw/default.nix
··· 1 - { lib, stdenv, fetchurl, unzip }: 2 3 stdenv.mkDerivation rec { 4 pname = "chntpw"; ··· 11 }; 12 13 nativeBuildInputs = [ unzip ]; 14 - buildInputs = lib.optionals stdenv.isLinux [ stdenv.glibc.out stdenv.glibc.static ]; 15 16 patches = [ 17 ./00-chntpw-build-arch-autodetect.patch 18 ./01-chntpw-install-target.patch 19 ]; 20 21 installPhase = '' ··· 27 description = "An utility to reset the password of any user that has a valid local account on a Windows system"; 28 maintainers = with lib.maintainers; [ deepfire ]; 29 license = licenses.gpl2; 30 - platforms = with lib.platforms; linux; 31 }; 32 }
··· 1 + { lib, stdenv, fetchurl, unzip, fetchpatch }: 2 3 stdenv.mkDerivation rec { 4 pname = "chntpw"; ··· 11 }; 12 13 nativeBuildInputs = [ unzip ]; 14 15 patches = [ 16 ./00-chntpw-build-arch-autodetect.patch 17 ./01-chntpw-install-target.patch 18 + # Import various bug fixes from debian 19 + (fetchpatch { 20 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/04_get_abs_path"; 21 + sha256 = "17h0gaczqd5b792481synr1ny72frwslb779lm417pyrz6kh9q8n"; 22 + }) 23 + (fetchpatch { 24 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/06_correct_test_open_syscall"; 25 + sha256 = "00lg83bimbki988n71w54mmhjp9529r0ngm40d7fdmnc2dlpj3hd"; 26 + }) 27 + (fetchpatch { 28 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/07_detect_failure_to_write_key"; 29 + sha256 = "0pk6xnprh2pqyx4n4lw3836z6fqsw3mclkzppl5rhjaahriwxw4l"; 30 + }) 31 + (fetchpatch { 32 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/08_no_deref_null"; 33 + sha256 = "1g7pfmjaj0c2sm64s3api2kglj7jbgddjjd3r4drw6phwdkah0zs"; 34 + }) 35 + (fetchpatch { 36 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/09_improve_robustness"; 37 + sha256 = "1nszkdy01ixnain7cwdmfbhjngphw1300ifagc1wgl9wvghzviaa"; 38 + }) 39 + (fetchpatch { 40 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/11_improve_documentation"; 41 + sha256 = "0yql6hj72q7cq69rrspsjkpiipdhcwb0b9w5j8nhq40cnx9mgqgg"; 42 + }) 43 + (fetchpatch { 44 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/12_readonly_filesystem"; 45 + sha256 = "1kxcy7f2pl6fqgmjg8bnl3pl5wgiw5xnbyx12arinmqkkggp4fa4"; 46 + }) 47 + (fetchpatch { 48 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/13_write_to_hive"; 49 + sha256 = "1638lcyxjkrkmbr3n28byixny0qrxvkciw1xd97x48mj6bnwqrkv"; 50 + }) 51 + (fetchpatch { 52 + url = "https://sources.debian.org/data/main/c/chntpw/140201-1/debian/patches/14_improve_description"; 53 + sha256 = "11y5kc4dh4zv24nkb0jw2zwlifx6nzsd4jbizn63l6dbpqgb25rs"; 54 + }) 55 ]; 56 57 installPhase = '' ··· 63 description = "An utility to reset the password of any user that has a valid local account on a Windows system"; 64 maintainers = with lib.maintainers; [ deepfire ]; 65 license = licenses.gpl2; 66 + platforms = lib.platforms.unix; 67 }; 68 }
+8 -1
pkgs/top-level/all-packages.nix
··· 3749 inherit (darwin.apple_sdk.frameworks) Security; 3750 }; 3751 3752 - lapce = callPackage ../applications/editors/lapce { }; 3753 3754 lcdproc = callPackage ../servers/monitoring/lcdproc { }; 3755 ··· 25405 25406 ChowKick = callPackage ../applications/audio/ChowKick { }; 25407 25408 CHOWTapeModel = callPackage ../applications/audio/CHOWTapeModel { }; 25409 25410 chromium = callPackage ../applications/networking/browsers/chromium (config.chromium or {}); ··· 34661 virglrenderer = callPackage ../development/libraries/virglrenderer { }; 34662 34663 vivid = callPackage ../tools/misc/vivid { }; 34664 34665 vokoscreen = libsForQt5.callPackage ../applications/video/vokoscreen { }; 34666
··· 3749 inherit (darwin.apple_sdk.frameworks) Security; 3750 }; 3751 3752 + lapce = callPackage ../applications/editors/lapce { 3753 + inherit (darwin) libobjc; 3754 + inherit (darwin.apple_sdk.frameworks) Security CoreServices ApplicationServices Carbon AppKit; 3755 + }; 3756 3757 lcdproc = callPackage ../servers/monitoring/lcdproc { }; 3758 ··· 25408 25409 ChowKick = callPackage ../applications/audio/ChowKick { }; 25410 25411 + ChowPhaser = callPackage ../applications/audio/ChowPhaser { }; 25412 + 25413 CHOWTapeModel = callPackage ../applications/audio/CHOWTapeModel { }; 25414 25415 chromium = callPackage ../applications/networking/browsers/chromium (config.chromium or {}); ··· 34666 virglrenderer = callPackage ../development/libraries/virglrenderer { }; 34667 34668 vivid = callPackage ../tools/misc/vivid { }; 34669 + 34670 + vivisect = with python3Packages; toPythonApplication (vivisect.override { withGui = true; }); 34671 34672 vokoscreen = libsForQt5.callPackage ../applications/video/vokoscreen { }; 34673
+5 -1
pkgs/top-level/python-packages.nix
··· 8957 python3 = python; 8958 }); 8959 8960 rjsmin = callPackage ../development/python-modules/rjsmin { }; 8961 8962 rki-covid-parser = callPackage ../development/python-modules/rki-covid-parser { }; ··· 10675 10676 vispy = callPackage ../development/python-modules/vispy { }; 10677 10678 - vivisect = callPackage ../development/python-modules/vivisect { }; 10679 10680 viv-utils = callPackage ../development/python-modules/viv-utils { }; 10681
··· 8957 python3 = python; 8958 }); 8959 8960 + rjpl = callPackage ../development/python-modules/rjpl { }; 8961 + 8962 rjsmin = callPackage ../development/python-modules/rjsmin { }; 8963 8964 rki-covid-parser = callPackage ../development/python-modules/rki-covid-parser { }; ··· 10677 10678 vispy = callPackage ../development/python-modules/vispy { }; 10679 10680 + vivisect = callPackage ../development/python-modules/vivisect { 10681 + inherit (pkgs.libsForQt5) wrapQtAppsHook; 10682 + }; 10683 10684 viv-utils = callPackage ../development/python-modules/viv-utils { }; 10685