lol
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
4b360da6 7bb1bfbf

+362 -140
+12 -8
doc/languages-frameworks/r.section.md
··· 96 96 97 97 ## Updating the package set {#updating-the-package-set} 98 98 99 + There is a script and associated environment for regenerating the package 100 + sets and synchronising the rPackages tree to the current CRAN and matching 101 + BIOC release. These scripts are found in the `pkgs/development/r-modules` 102 + directory and executed as follows: 103 + 99 104 ```bash 100 105 nix-shell generate-shell.nix 101 106 ··· 112 117 mv bioc-experiment-packages.nix.new bioc-experiment-packages.nix 113 118 ``` 114 119 115 - `generate-r-packages.R <repo>` reads `<repo>-packages.nix`, therefor the renaming. 120 + `generate-r-packages.R <repo>` reads `<repo>-packages.nix`, therefore 121 + the renaming. 116 122 117 - ## Testing if the Nix-expression could be evaluated {#testing-if-the-nix-expression-could-be-evaluated} 118 - 119 - ```bash 120 - nix-build test-evaluation.nix --dry-run 121 - ``` 122 - 123 - If this exits fine, the expression is ok. If not, you have to edit `default.nix` 123 + Some packages require overrides to specify external dependencies or other 124 + patches and special requirements. These overrides are specified in the 125 + `pkgs/development/r-modules/default.nix` file. As the `*-packages.nix` 126 + contents are automatically generated it should not be edited and broken 127 + builds should be addressed using overrides.
+1 -1
nixos/modules/services/mail/postfix.nix
··· 544 544 type = types.lines; 545 545 default = ""; 546 546 description = " 547 - Entries for the virtual alias map, cf. man-page virtual(8). 547 + Entries for the virtual alias map, cf. man-page virtual(5). 548 548 "; 549 549 }; 550 550
+7 -3
pkgs/development/interpreters/erlang/generic-builder.nix
··· 84 84 85 85 in 86 86 stdenv.mkDerivation ({ 87 - name = "${baseName}-${version}" 88 - + optionalString javacSupport "-javac" 89 - + optionalString odbcSupport "-odbc"; 87 + # name is used instead of pname to 88 + # - not have to pass pnames as argument 89 + # - have a separate pname for erlang (main module) 90 + name = "${baseName}" 91 + + optionalString javacSupport "_javac" 92 + + optionalString odbcSupport "_odbc" 93 + + "-${version}"; 90 94 91 95 inherit src version; 92 96
+41 -10
pkgs/development/misc/resholve/README.md
··· 2 2 3 3 resholve converts bare executable references in shell scripts to absolute 4 4 paths. This will hopefully make its way into the Nixpkgs manual soon, but 5 - until then I'll outline how to use the `resholvePackage` function. 5 + until then I'll outline how to use the `resholvePackage`, `resholveScript`, 6 + and `resholveScriptBin` functions. 6 7 7 8 > Fair warning: resholve does *not* aspire to resolving all valid Shell 8 9 > scripts. It depends on the OSH/Oil parser, which aims to support most (but ··· 21 22 > - Packages with scripts that require conflicting directives can use multiple 22 23 > solutions to resolve the scripts separately, but produce a single package. 23 24 24 - ## Basic Example 25 + The `resholveScript` and `resholveScriptBin` functions support a _single_ 26 + `solution` attrset. This is basically the same as any single solution in `resholvePackage`, except that it doesn't need a `scripts` attr (it is automatically added). 27 + 28 + ## Basic `resholvePackage` Example 25 29 26 30 Here's a simple example from one of my own projects, with annotations: 27 31 <!-- ··· 68 72 } 69 73 ``` 70 74 75 + ## Basic `resholveScript` and `resholveScriptBin` examples 76 + 77 + Both of these functions have the same basic API. This example is a little 78 + trivial for now. If you have a real usage that you find helpful, please PR it. 79 + 80 + ```nix 81 + resholvedScript = resholveScript "name" { 82 + inputs = [ file ]; 83 + interpreter = "${bash}/bin/bash"; 84 + } '' 85 + echo "Hello" 86 + file . 87 + ''; 88 + resholvedScriptBin = resholveScriptBin "name" { 89 + inputs = [ file ]; 90 + interpreter = "${bash}/bin/bash"; 91 + } '' 92 + echo "Hello" 93 + file . 94 + ''; 95 + ``` 96 + 71 97 ## Options 72 98 73 99 `resholvePackage` maps Nix types/idioms into the flags and environment variables ··· 79 105 | inputs | list | packages to resolve executables from | 80 106 | interpreter | string | 'none' or abspath for shebang | 81 107 | prologue | file | text to insert before the first code-line | 82 - | epilogue | file | text to isnert after the last code-line | 108 + | epilogue | file | text to insert after the last code-line | 83 109 | flags | list | strings to pass as flags | 84 110 | fake | attrset | [directives](#controlling-resolution-with-directives) | 85 111 | fix | attrset | [directives](#controlling-resolution-with-directives) | ··· 135 161 ```nix 136 162 # --fake 'f:setUp;tearDown builtin:setopt source:/etc/bashrc' 137 163 fake = { 138 - # fake accepts the initial of valid identifier types as a CLI convienience. 164 + # fake accepts the initial of valid identifier types as a CLI convenience. 139 165 # Use full names in the Nix API. 140 166 function = [ "setUp" "tearDown" ]; 141 167 builtin = [ "setopt" ]; 142 168 source = [ "/etc/bashrc" ]; 143 169 }; 144 170 145 - # --fix 'aliases xargs:ls $GIT:gix' 171 + # --fix 'aliases $GIT:gix /bin/bash' 146 172 fix = { 147 173 # all single-word directives use `true` as value 148 174 aliases = true; 149 - xargs = [ "ls" ]; 150 175 "$GIT" = [ "gix" ]; 176 + "/bin/bash"; 151 177 }; 152 178 153 - # --keep 'which:git;ls .:$HOME $LS:exa /etc/bashrc ~/.bashrc' 179 + # --keep 'source:$HOME /etc/bashrc ~/.bashrc' 154 180 keep = { 155 - which = [ "git" "ls" ]; 156 - "." = [ "$HOME" ]; 157 - "$LS" = [ "exa" ]; 181 + source = [ "$HOME" ]; 158 182 "/etc/bashrc" = true; 159 183 "~/.bashrc" = true; 160 184 }; 161 185 ``` 186 + 187 + > **Note:** For now, at least, you'll need to reference the manpage to completely understand these examples. 162 188 163 189 ## Controlling nested resolution with lore 164 190 ··· 176 202 either built-in rules for finding the executable, or human triage. 177 203 - "wrapper" lore maps shell exec wrappers to the programs they exec so 178 204 that resholve can substitute an executable's verdict for its wrapper's. 205 + 206 + > **Caution:** At least when it comes to common utilities, it's best to treat 207 + > overrides as a stopgap until they can be properly handled in resholve and/or 208 + > binlore. Please report things you have to override and, if possible, help 209 + > get them sorted. 179 210 180 211 There will be more mechanisms for controlling this process in the future 181 212 (and your reports/experiences will play a role in shaping them...) For now,
+39 -4
pkgs/development/misc/resholve/default.nix
··· 1 1 { callPackage 2 - , ... 2 + , writeTextFile 3 3 }: 4 4 5 5 let ··· 8 8 in 9 9 rec { 10 10 resholve = callPackage ./resholve.nix { 11 - inherit (source) rSrc; 12 - inherit (source) version; 11 + inherit (source) rSrc version; 13 12 inherit (deps.oil) oildev; 14 13 }; 14 + resholve-utils = callPackage ./resholve-utils.nix { 15 + inherit resholve; 16 + }; 15 17 resholvePackage = callPackage ./resholve-package.nix { 16 - inherit resholve; 18 + inherit resholve resholve-utils; 17 19 }; 20 + resholveScript = name: partialSolution: text: 21 + writeTextFile { 22 + inherit name text; 23 + executable = true; 24 + checkPhase = '' 25 + ( 26 + PS4=$'\x1f'"\033[33m[resholve context]\033[0m " 27 + set -x 28 + ${resholve-utils.makeInvocation name (partialSolution // { 29 + scripts = [ "${placeholder "out"}" ]; 30 + })} 31 + ) 32 + ${partialSolution.interpreter} -n $out 33 + ''; 34 + }; 35 + resholveScriptBin = name: partialSolution: text: 36 + writeTextFile rec { 37 + inherit name text; 38 + executable = true; 39 + destination = "/bin/${name}"; 40 + checkPhase = '' 41 + ( 42 + cd "$out" 43 + PS4=$'\x1f'"\033[33m[resholve context]\033[0m " 44 + set -x 45 + : changing directory to $PWD 46 + ${resholve-utils.makeInvocation name (partialSolution // { 47 + scripts = [ "bin/${name}" ]; 48 + })} 49 + ) 50 + ${partialSolution.interpreter} -n $out/bin/${name} 51 + ''; 52 + }; 18 53 }
+16 -7
pkgs/development/misc/resholve/oildev.nix
··· 46 46 nativeBuildInputs = [ git ]; 47 47 }; 48 48 49 + /* 50 + Upstream isn't interested in packaging this as a library 51 + (or accepting all of the patches we need to do so). 52 + This creates one without disturbing upstream too much. 53 + */ 49 54 oildev = python27Packages.buildPythonPackage rec { 50 55 pname = "oildev-unstable"; 51 56 version = "2021-07-14"; ··· 61 66 It's not critical to drop most of these; the primary target is 62 67 the vendored fork of Python-2.7.13, which is ~ 55M and over 3200 63 68 files, dozens of which get interpreter script patches in fixup. 69 + 70 + Note: -f is necessary to keep it from being a pain to update 71 + hash on rev updates. Command will fail w/o and not print hash. 64 72 */ 65 73 extraPostFetch = '' 66 74 rm -rf Python-2.7.13 benchmarks metrics py-yajl rfc gold web testdata services demo devtools cpp 67 75 ''; 68 76 }; 69 - 70 - # TODO: not sure why I'm having to set this for nix-build... 71 - # can anyone tell if I'm doing something wrong? 72 - SOURCE_DATE_EPOCH = 315532800; 73 77 74 78 # patch to support a python package, pass tests on macOS, etc. 75 79 patchSrc = fetchFromGitHub { 76 80 owner = "abathur"; 77 81 repo = "nix-py-dev-oil"; 78 - rev = "v0.8.12"; 79 - hash = "sha256-/EvwxL201lGsioL0lIhzM8VTghe6FuVbc3PBJgY8c8E="; 82 + rev = "v0.8.12.1"; 83 + hash = "sha256-7JVnosdcvmVFN3h6SIeeqcJFcyFkai//fFuzi7ThNMY="; 80 84 }; 81 85 patches = [ 82 86 "${patchSrc}/0001-add_setup_py.patch" ··· 102 106 patchShebangs asdl build core doctools frontend native oil_lang 103 107 ''; 104 108 105 - # TODO: this may be obsolete? 109 + /* 110 + We did convince oil to upstream an env for specifying 111 + this to support a shell.nix. Would need a patch if they 112 + later drop this support. See: 113 + https://github.com/oilshell/oil/blob/46900310c7e4a07a6223eb6c08e4f26460aad285/doctools/cmark.py#L30-L34 114 + */ 106 115 _NIX_SHELL_LIBCMARK = "${cmark}/lib/libcmark${stdenv.hostPlatform.extensions.sharedLibrary}"; 107 116 108 117 # See earlier note on glibcLocales TODO: verify needed?
+3 -73
pkgs/development/misc/resholve/resholve-package.nix
··· 1 - { stdenv, lib, resholve, binlore }: 1 + { stdenv, lib, resholve, resholve-utils }: 2 2 3 3 { pname 4 4 , src ··· 9 9 }@attrs: 10 10 let 11 11 inherit stdenv; 12 - /* These functions break up the work of partially validating the 13 - 'solutions' attrset and massaging it into env/cli args. 14 - 15 - Note: some of the left-most args do not *have* to be passed as 16 - deep as they are, but I've done so to provide more error context 17 - */ 18 - 19 - # for brevity / line length 20 - spaces = l: builtins.concatStringsSep " " l; 21 - semicolons = l: builtins.concatStringsSep ";" l; 22 - 23 - /* Throw a fit with dotted attr path context */ 24 - nope = path: msg: 25 - throw "${builtins.concatStringsSep "." path}: ${msg}"; 26 - 27 - /* Special-case directive value representations by type */ 28 - makeDirective = solution: env: name: val: 29 - if builtins.isInt val then builtins.toString val 30 - else if builtins.isString val then name 31 - else if true == val then name 32 - else if false == val then "" # omit! 33 - else if null == val then "" # omit! 34 - else if builtins.isList val then "${name}:${semicolons val}" 35 - else nope [ solution env name ] "unexpected type: ${builtins.typeOf val}"; 36 - 37 - /* Build fake/fix/keep directives from Nix types */ 38 - makeDirectives = solution: env: val: 39 - lib.mapAttrsToList (makeDirective solution env) val; 40 - 41 - /* Special-case value representation by type/name */ 42 - makeEnvVal = solution: env: val: 43 - if env == "inputs" then lib.makeBinPath val 44 - else if builtins.isString val then val 45 - else if builtins.isList val then spaces val 46 - else if builtins.isAttrs val then spaces (makeDirectives solution env val) 47 - else nope [ solution env ] "unexpected type: ${builtins.typeOf val}"; 48 - 49 - /* Shell-format each env value */ 50 - shellEnv = solution: env: value: 51 - lib.escapeShellArg (makeEnvVal solution env value); 52 - 53 - /* Build a single ENV=val pair */ 54 - makeEnv = solution: env: value: 55 - "RESHOLVE_${lib.toUpper env}=${shellEnv solution env value}"; 56 - 57 - /* Discard attrs claimed by makeArgs */ 58 - removeCliArgs = value: 59 - removeAttrs value [ "scripts" "flags" ]; 60 - 61 - /* Verify required arguments are present */ 62 - validateSolution = { scripts, inputs, interpreter, ... }: true; 63 - 64 - /* Pull out specific solution keys to build ENV=val pairs */ 65 - makeEnvs = solution: value: 66 - spaces (lib.mapAttrsToList (makeEnv solution) (removeCliArgs value)); 67 - 68 - /* Pull out specific solution keys to build CLI argstring */ 69 - makeArgs = { flags ? [ ], scripts, ... }: 70 - spaces (flags ++ scripts); 71 - 72 - /* Build a single resholve invocation */ 73 - makeInvocation = solution: value: 74 - if validateSolution value then 75 - # we pass resholve a directory 76 - "RESHOLVE_LORE=${binlore.collect { drvs = value.inputs; } } ${makeEnvs solution value} resholve --overwrite ${makeArgs value}" 77 - else throw "invalid solution"; # shouldn't trigger for now 78 - 79 - /* Build resholve invocation for each solution. */ 80 - makeCommands = solutions: 81 - lib.mapAttrsToList makeInvocation solutions; 82 12 83 13 self = (stdenv.mkDerivation ((removeAttrs attrs [ "solutions" ]) 84 14 // { 85 15 inherit pname version src; 86 - buildInputs = [ resholve ]; 16 + buildInputs = (lib.optionals (builtins.hasAttr "buildInputs" attrs) attrs.buildInputs) ++ [ resholve ]; 87 17 88 18 # enable below for verbose debug info if needed 89 19 # supports default python.logging levels ··· 99 29 PS4=$'\x1f'"\033[33m[resholve context]\033[0m " 100 30 set -x 101 31 : changing directory to $PWD 102 - ${builtins.concatStringsSep "\n" (makeCommands solutions)} 32 + ${builtins.concatStringsSep "\n" (resholve-utils.makeCommands solutions)} 103 33 ) 104 34 ''; 105 35 }));
+74
pkgs/development/misc/resholve/resholve-utils.nix
··· 1 + { lib, resholve, binlore }: 2 + 3 + rec { 4 + /* These functions break up the work of partially validating the 5 + 'solutions' attrset and massaging it into env/cli args. 6 + 7 + Note: some of the left-most args do not *have* to be passed as 8 + deep as they are, but I've done so to provide more error context 9 + */ 10 + 11 + # for brevity / line length 12 + spaces = l: builtins.concatStringsSep " " l; 13 + semicolons = l: builtins.concatStringsSep ";" l; 14 + 15 + /* Throw a fit with dotted attr path context */ 16 + nope = path: msg: 17 + throw "${builtins.concatStringsSep "." path}: ${msg}"; 18 + 19 + /* Special-case directive value representations by type */ 20 + makeDirective = solution: env: name: val: 21 + if builtins.isInt val then builtins.toString val 22 + else if builtins.isString val then name 23 + else if true == val then name 24 + else if false == val then "" # omit! 25 + else if null == val then "" # omit! 26 + else if builtins.isList val then "${name}:${semicolons val}" 27 + else nope [ solution env name ] "unexpected type: ${builtins.typeOf val}"; 28 + 29 + /* Build fake/fix/keep directives from Nix types */ 30 + makeDirectives = solution: env: val: 31 + lib.mapAttrsToList (makeDirective solution env) val; 32 + 33 + /* Special-case value representation by type/name */ 34 + makeEnvVal = solution: env: val: 35 + if env == "inputs" then lib.makeBinPath val 36 + else if builtins.isString val then val 37 + else if builtins.isList val then spaces val 38 + else if builtins.isAttrs val then spaces (makeDirectives solution env val) 39 + else nope [ solution env ] "unexpected type: ${builtins.typeOf val}"; 40 + 41 + /* Shell-format each env value */ 42 + shellEnv = solution: env: value: 43 + lib.escapeShellArg (makeEnvVal solution env value); 44 + 45 + /* Build a single ENV=val pair */ 46 + makeEnv = solution: env: value: 47 + "RESHOLVE_${lib.toUpper env}=${shellEnv solution env value}"; 48 + 49 + /* Discard attrs claimed by makeArgs */ 50 + removeCliArgs = value: 51 + removeAttrs value [ "scripts" "flags" ]; 52 + 53 + /* Verify required arguments are present */ 54 + validateSolution = { scripts, inputs, interpreter, ... }: true; 55 + 56 + /* Pull out specific solution keys to build ENV=val pairs */ 57 + makeEnvs = solution: value: 58 + spaces (lib.mapAttrsToList (makeEnv solution) (removeCliArgs value)); 59 + 60 + /* Pull out specific solution keys to build CLI argstring */ 61 + makeArgs = { flags ? [ ], scripts, ... }: 62 + spaces (flags ++ scripts); 63 + 64 + /* Build a single resholve invocation */ 65 + makeInvocation = solution: value: 66 + if validateSolution value then 67 + # we pass resholve a directory 68 + "RESHOLVE_LORE=${binlore.collect { drvs = value.inputs; } } ${makeEnvs solution value} ${resholve}/bin/resholve --overwrite ${makeArgs value}" 69 + else throw "invalid solution"; # shouldn't trigger for now 70 + 71 + /* Build resholve invocation for each solution. */ 72 + makeCommands = solutions: 73 + lib.mapAttrsToList makeInvocation solutions; 74 + }
+2 -2
pkgs/development/misc/resholve/source.nix
··· 3 3 }: 4 4 5 5 rec { 6 - version = "0.6.0"; 6 + version = "0.6.6"; 7 7 rSrc = 8 8 # local build -> `make ci`; `make clean` to restore 9 9 # return to remote source ··· 14 14 owner = "abathur"; 15 15 repo = "resholve"; 16 16 rev = "v${version}"; 17 - hash = "sha256-GfhhU9f5kiYcuYTPKWXCIkAGsz7GhAUGjAmIZ8Ww5X4="; 17 + hash = "sha256-bupf3c9tNPAEMzFEDcvg483bSiwZFuB3ZqveG89dgkE="; 18 18 }; 19 19 }
+17 -1
pkgs/development/misc/resholve/test.nix
··· 23 23 24 24 let 25 25 inherit (callPackage ./default.nix { }) 26 - resholve resholvePackage; 26 + resholve resholvePackage resholveScript resholveScriptBin; 27 27 28 28 # ourCoreutils = coreutils.override { singleBinary = false; }; 29 29 ··· 224 224 fi 225 225 ''; 226 226 }; 227 + 228 + # Caution: ci.nix asserts the equality of both of these w/ diff 229 + resholvedScript = resholveScript "resholved-script" { 230 + inputs = [ file ]; 231 + interpreter = "${bash}/bin/bash"; 232 + } '' 233 + echo "Hello" 234 + file . 235 + ''; 236 + resholvedScriptBin = resholveScriptBin "resholved-script-bin" { 237 + inputs = [ file ]; 238 + interpreter = "${bash}/bin/bash"; 239 + } '' 240 + echo "Hello" 241 + file . 242 + ''; 227 243 }
+2 -2
pkgs/development/python-modules/fe25519/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "fe25519"; 13 - version = "0.3.0"; 13 + version = "1.0.0"; 14 14 15 15 src = fetchPypi { 16 16 inherit pname version; 17 - sha256 = "8819659f19b51713199a75fda5107c93fbb6e2cb4afef3164ce7932b5eb276b9"; 17 + sha256 = "sha256-947DIkmg56mAegEgLKq8iqETWf2SCvtmeDZi5cxVSJA="; 18 18 }; 19 19 20 20 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/ge25519/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "ge25519"; 14 - version = "0.2.0"; 14 + version = "1.0.0"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "1wgv0vqg8iv9y5d7if14gmcgslwd5zzgk322w9jaxdfbndldddik"; 18 + sha256 = "sha256-f7xvZ92zRO3GLSdfgEyhkWVwAFT2TvKHy6+iF+k43bI="; 19 19 }; 20 20 21 21 propagatedBuildInputs = [
+39
pkgs/development/python-modules/lupupy/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , colorlog 4 + , demjson 5 + , fetchPypi 6 + , pythonOlder 7 + , requests 8 + }: 9 + 10 + buildPythonPackage rec { 11 + pname = "lupupy"; 12 + version = "0.0.21"; 13 + format = "setuptools"; 14 + 15 + disabled = pythonOlder "3.6"; 16 + 17 + src = fetchPypi { 18 + inherit pname version; 19 + sha256 = "0cpamb1fp84psiqm7xr156zi4f2fv2wijbjjyk6w87z8fl2aw8xc"; 20 + }; 21 + 22 + propagatedBuildInputs = [ 23 + colorlog 24 + demjson 25 + requests 26 + ]; 27 + 28 + # Project has no tests 29 + doCheck = false; 30 + 31 + pythonImportsCheck = [ "lupupy" ]; 32 + 33 + meta = with lib; { 34 + description = "Python module to control Lupusec alarm control panels"; 35 + homepage = "https://github.com/majuss/lupupy"; 36 + license = with licenses; [ mit ]; 37 + maintainers = with maintainers; [ fab ]; 38 + }; 39 + }
+12
pkgs/development/r-modules/generate-r-packages.R
··· 82 82 nix <- apply(pkgs, 1, function(p) formatPackage(p[1], p[2], p[18], p[4], p[5], p[6])) 83 83 write("done", stderr()) 84 84 85 + # Mark deleted packages as broken 86 + setkey(readFormatted, V2) 87 + markBroken <- function(name) { 88 + str <- paste0(readFormatted[name], collapse='"') 89 + if(sum(grep("broken = true;", str))) 90 + return(str) 91 + write(paste("marked", name, "as broken"), stderr()) 92 + gsub("};$", "broken = true; };", str) 93 + } 94 + broken <- lapply(setdiff(readFormatted[[2]], pkgs[[1]]), markBroken) 95 + 85 96 cat("# This file is generated from generate-r-packages.R. DO NOT EDIT.\n") 86 97 cat("# Execute the following command to update the file.\n") 87 98 cat("#\n") ··· 95 106 cat(";\n") 96 107 cat("in with self; {\n") 97 108 cat(paste(nix, collapse="\n"), "\n", sep="") 109 + cat(paste(broken, collapse="\n"), "\n", sep="") 98 110 cat("}\n") 99 111 100 112 stopCluster(cl)
+2 -2
pkgs/development/tools/sigrok-cli/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "sigrok-cli"; 5 - version = "0.7.1"; 5 + version = "0.7.2"; 6 6 7 7 src = fetchurl { 8 8 url = "https://sigrok.org/download/source/${pname}/${pname}-${version}.tar.gz"; 9 - sha256 = "15vpn1psriadcbl6v9swwgws7dva85ld03yv6g1mgm27kx11697m"; 9 + sha256 = "sha256-cdBEPzaJe/Vlcy3sIGgw2+oPJ4m2YBzxBTayhtEUCrg="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ pkg-config ];
-12
pkgs/misc/vim-plugins/generated.nix
··· 1289 1289 meta.homepage = "https://github.com/deoplete-plugins/deoplete-dictionary/"; 1290 1290 }; 1291 1291 1292 - deoplete-emoji = buildVimPluginFrom2Nix { 1293 - pname = "deoplete-emoji"; 1294 - version = "2019-01-20"; 1295 - src = fetchFromGitHub { 1296 - owner = "fszymanski"; 1297 - repo = "deoplete-emoji"; 1298 - rev = "1dfa2da6ae3ee146ddfbfdba48cf45f0c1d57d7d"; 1299 - sha256 = "0drqbdmy8igq6rv7s2qlxsp391pydcynlr9gkaadzrg7pk4nlgsb"; 1300 - }; 1301 - meta.homepage = "https://github.com/fszymanski/deoplete-emoji/"; 1302 - }; 1303 - 1304 1292 deoplete-fish = buildVimPluginFrom2Nix { 1305 1293 pname = "deoplete-fish"; 1306 1294 version = "2020-04-04";
-1
pkgs/misc/vim-plugins/vim-plugin-names
··· 173 173 fruit-in/brainfuck-vim 174 174 fruit-in/vim-nong-theme 175 175 fsharp/vim-fsharp 176 - fszymanski/deoplete-emoji 177 176 garbas/vim-snipmate 178 177 gcmt/taboo.vim 179 178 gcmt/wildfire.vim
+77
pkgs/os-specific/linux/sydbox/default.nix
··· 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , pkg-config 5 + , autoreconfHook 6 + , python3 7 + , perl 8 + , libxslt 9 + , docbook_xsl 10 + , docbook_xml_dtd_42 11 + , libseccomp 12 + , installTests ? true, gnumake, which 13 + , debugBuild ? false, libunwind 14 + }: 15 + 16 + stdenv.mkDerivation rec { 17 + pname = "sydbox-1"; 18 + version = "2.2.0"; 19 + 20 + outputs = [ "out" "dev" "man" "doc" ] 21 + ++ lib.optional installTests "installedTests"; 22 + 23 + src = fetchurl { 24 + url = "https://git.exherbo.org/${pname}.git/snapshot/${pname}-${version}.tar.xz"; 25 + sha256 = "0664myrrzbvsw73q5b7cqwgv4hl9a7vkm642s1r96gaxm16jk0z7"; 26 + }; 27 + 28 + nativeBuildInputs = [ 29 + pkg-config 30 + autoreconfHook 31 + python3 32 + perl 33 + libxslt.bin 34 + docbook_xsl 35 + docbook_xml_dtd_42 36 + ]; 37 + 38 + buildInputs = [ 39 + libseccomp 40 + ] ++ lib.optional debugBuild libunwind 41 + ++ lib.optionals installTests [ 42 + gnumake 43 + python3 44 + perl 45 + which 46 + ]; 47 + 48 + enableParallelBuilding = true; 49 + 50 + configureFlags = [ ] 51 + ++ lib.optionals installTests [ "--enable-installed-tests" 52 + "--libexecdir=${placeholder "installedTests"}/libexec" ] 53 + ++ lib.optional debugBuild "--enable-debug"; 54 + 55 + makeFlags = [ "SYD_INCLUDEDIR=${stdenv.cc.libc.dev}/include" ]; 56 + 57 + doCheck = true; 58 + checkPhase = '' 59 + # Many of the regular test cases in t/ do not work inside the build sandbox 60 + make -C syd check 61 + ''; 62 + 63 + postInstall = if installTests then '' 64 + moveToOutput bin/syd-test $installedTests 65 + '' else '' 66 + # Tests are installed despite --disable-installed-tests 67 + rm -r $out/bin/syd-test $out/libexec 68 + ''; 69 + 70 + meta = with lib; { 71 + homepage = "https://sydbox.exherbo.org/"; 72 + description = "seccomp-based application sandbox"; 73 + license = licenses.gpl2; 74 + platforms = platforms.linux; 75 + maintainers = with maintainers; [ mvs ]; 76 + }; 77 + }
+1 -1
pkgs/servers/home-assistant/component-packages.nix
··· 478 478 "lovelace" = ps: with ps; [ ]; 479 479 "luci" = ps: with ps; [ openwrt-luci-rpc ]; 480 480 "luftdaten" = ps: with ps; [ luftdaten ]; 481 - "lupusec" = ps: with ps; [ ]; # missing inputs: lupupy 481 + "lupusec" = ps: with ps; [ lupupy ]; 482 482 "lutron" = ps: with ps; [ pylutron ]; 483 483 "lutron_caseta" = ps: with ps; [ aiolip pylutron-caseta ]; 484 484 "lw12wifi" = ps: with ps; [ ]; # missing inputs: lw12
+2 -2
pkgs/servers/teleport/default.nix
··· 10 10 in 11 11 buildGoModule rec { 12 12 pname = "teleport"; 13 - version = "7.1.2"; 13 + version = "7.1.3"; 14 14 15 15 # This repo has a private submodule "e" which fetchgit cannot handle without failing. 16 16 src = fetchFromGitHub { 17 17 owner = "gravitational"; 18 18 repo = "teleport"; 19 19 rev = "v${version}"; 20 - sha256 = "sha256-1/Dmh7jTlGg3CqNZDFNIT8/OvgzkHG2m6Qs0ya4IM18="; 20 + sha256 = "sha256-upzEfImMuYU/6F5HSR3Jah3QiMXEt0XMpNAPzEYV1Nk="; 21 21 }; 22 22 23 23 vendorSha256 = null;
+3 -3
pkgs/servers/web-apps/vikunja/api.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "vikunja-api"; 5 - version = "0.18.0"; 5 + version = "0.18.1"; 6 6 7 7 src = fetchFromGitea { 8 8 domain = "kolaente.dev"; 9 9 owner = "vikunja"; 10 10 repo = "api"; 11 11 rev = "v${version}"; 12 - sha256 = "sha256-43y9+y5VVgbCexHPsYZ9/Up84OoPSrThHWiKR0P1h3s="; 12 + sha256 = "sha256-ngdtK8e4mLpbuY9OP1aHk99qPX/cKwnyhb/3ImTwF6M="; 13 13 }; 14 14 15 15 nativeBuildInputs = ··· 24 24 ''; 25 25 in [ fakeGit mage ]; 26 26 27 - vendorSha256 = "sha256-1tXnlOlVH61Y4jN07XBfTgZhAsU2HeudiEVAtlP+Cpk="; 27 + vendorSha256 = "sha256-0MP04KpWX17Fa1WhLwF4yzIsDqGAeTUXxv81B+BTNe4="; 28 28 29 29 # checks need to be disabled because of needed internet for some checks 30 30 doCheck = false;
+2 -2
pkgs/servers/web-apps/vikunja/frontend.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "vikunja-frontend"; 5 - version = "0.18.0"; 5 + version = "0.18.1"; 6 6 src = fetchurl { 7 7 url = "https://dl.vikunja.io/frontend/${pname}-${version}.zip"; 8 - sha256 = "sha256-LV7+HfXeNcVHuoo+n6fuAQoIb/m0lOs6JYYMNLM/jTA="; 8 + sha256 = "sha256-u4XA6Jqn+p2J0sB2KabwZY/lFwZakZEvUUh/enrhtN4="; 9 9 }; 10 10 11 11 nativeBuildInputs = [ unzip ];
+2 -2
pkgs/tools/inputmethods/fcitx5/default.nix
··· 41 41 in 42 42 stdenv.mkDerivation rec { 43 43 pname = "fcitx5"; 44 - version = "5.0.8"; 44 + version = "5.0.9"; 45 45 46 46 src = fetchFromGitHub { 47 47 owner = "fcitx"; 48 48 repo = pname; 49 49 rev = version; 50 - sha256 = "0czj2awvgk9apdh9rj3vcb04g8x2wp1d4sshvch31nwpqs10hssr"; 50 + sha256 = "161xgm2fs51v8l46raz6xxkjmshpgaaax64lz8208m7fcd32ll3a"; 51 51 }; 52 52 53 53 prePatch = ''
+2 -2
pkgs/tools/inputmethods/fcitx5/fcitx5-rime.nix
··· 11 11 12 12 stdenv.mkDerivation rec { 13 13 pname = "fcitx5-rime"; 14 - version = "5.0.6"; 14 + version = "5.0.7"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "fcitx"; 18 18 repo = pname; 19 19 rev = version; 20 - sha256 = "1r36c1pl63vka9mxa8f5x0kijapjgxzz5b4db8h87ri9kcxk7i2g"; 20 + sha256 = "1djakg17rxc38smja4y76i0p4gwdj3lgwym8kybkaspk7lxr62zy"; 21 21 }; 22 22 23 23 cmakeFlags = [
+2
pkgs/top-level/all-packages.nix
··· 3418 3418 3419 3419 swego = callPackage ../servers/swego { }; 3420 3420 3421 + sydbox = callPackage ../os-specific/linux/sydbox { }; 3422 + 3421 3423 syscall_limiter = callPackage ../os-specific/linux/syscall_limiter {}; 3422 3424 3423 3425 syslogng = callPackage ../tools/system/syslog-ng { };
+2
pkgs/top-level/python-packages.nix
··· 4384 4384 4385 4385 lupa = callPackage ../development/python-modules/lupa { }; 4386 4386 4387 + lupupy = callPackage ../development/python-modules/lupupy { }; 4388 + 4387 4389 lxml = callPackage ../development/python-modules/lxml { 4388 4390 inherit (pkgs) libxml2 libxslt zlib; 4389 4391 };