Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
4c8e9368 3c14d660

+391 -208
+7
maintainers/maintainer-list.nix
··· 5088 5088 fingerprint = "1412 816B A9FA F62F D051 1975 D3E1 B013 B463 1293"; 5089 5089 }]; 5090 5090 }; 5091 + ius = { 5092 + email = "j.de.gram@gmail.com"; 5093 + name = "Joerie de Gram"; 5094 + matrix = "@ius:nltrix.net"; 5095 + github = "ius"; 5096 + githubId = 529626; 5097 + }; 5091 5098 ivan = { 5092 5099 email = "ivan@ludios.org"; 5093 5100 github = "ivan";
+5
nixos/modules/services/monitoring/collectd.nix
··· 132 132 users.users = optionalAttrs (cfg.user == "collectd") { 133 133 collectd = { 134 134 isSystemUser = true; 135 + group = "collectd"; 135 136 }; 137 + }; 138 + 139 + users.groups = optionalAttrs (cfg.user == "collectd") { 140 + collectd = {}; 136 141 }; 137 142 }; 138 143 }
+5 -7
nixos/modules/services/network-filesystems/drbd.nix
··· 47 47 options drbd usermode_helper=/run/current-system/sw/bin/drbdadm 48 48 ''; 49 49 50 - environment.etc.drbd.conf = 50 + environment.etc."drbd.conf" = 51 51 { source = pkgs.writeText "drbd.conf" cfg.config; }; 52 52 53 53 systemd.services.drbd = { 54 54 after = [ "systemd-udev.settle.service" "network.target" ]; 55 55 wants = [ "systemd-udev.settle.service" ]; 56 56 wantedBy = [ "multi-user.target" ]; 57 - script = '' 58 - ${pkgs.drbd}/sbin/drbdadm up all 59 - ''; 60 - serviceConfig.ExecStop = '' 61 - ${pkgs.drbd}/sbin/drbdadm down all 62 - ''; 57 + serviceConfig = { 58 + ExecStart = "${pkgs.drbd}/sbin/drbdadm up all"; 59 + ExecStop = "${pkgs.drbd}/sbin/drbdadm down all"; 60 + }; 63 61 }; 64 62 }; 65 63 }
+1
nixos/tests/all-tests.nix
··· 111 111 dokuwiki = handleTest ./dokuwiki.nix {}; 112 112 domination = handleTest ./domination.nix {}; 113 113 dovecot = handleTest ./dovecot.nix {}; 114 + drbd = handleTest ./drbd.nix {}; 114 115 ec2-config = (handleTestOn ["x86_64-linux"] ./ec2.nix {}).boot-ec2-config or {}; 115 116 ec2-nixops = (handleTestOn ["x86_64-linux"] ./ec2.nix {}).boot-ec2-nixops or {}; 116 117 ecryptfs = handleTest ./ecryptfs.nix {};
+87
nixos/tests/drbd.nix
··· 1 + import ./make-test-python.nix ( 2 + { pkgs, lib, ... }: 3 + let 4 + drbdPort = 7789; 5 + 6 + drbdConfig = 7 + { nodes, ... }: 8 + { 9 + virtualisation.emptyDiskImages = [ 1 ]; 10 + networking.firewall.allowedTCPPorts = [ drbdPort ]; 11 + 12 + services.drbd = { 13 + enable = true; 14 + config = '' 15 + global { 16 + usage-count yes; 17 + } 18 + 19 + common { 20 + net { 21 + protocol C; 22 + ping-int 1; 23 + } 24 + } 25 + 26 + resource r0 { 27 + volume 0 { 28 + device /dev/drbd0; 29 + disk /dev/vdb; 30 + meta-disk internal; 31 + } 32 + 33 + on drbd1 { 34 + address ${nodes.drbd1.config.networking.primaryIPAddress}:${toString drbdPort}; 35 + } 36 + 37 + on drbd2 { 38 + address ${nodes.drbd2.config.networking.primaryIPAddress}:${toString drbdPort}; 39 + } 40 + } 41 + ''; 42 + }; 43 + }; 44 + in 45 + { 46 + name = "drbd"; 47 + meta = with pkgs.lib.maintainers; { 48 + maintainers = [ ryantm astro ]; 49 + }; 50 + 51 + nodes.drbd1 = drbdConfig; 52 + nodes.drbd2 = drbdConfig; 53 + 54 + testScript = { nodes }: '' 55 + drbd1.start() 56 + drbd2.start() 57 + 58 + drbd1.wait_for_unit("network.target") 59 + drbd2.wait_for_unit("network.target") 60 + 61 + drbd1.succeed( 62 + "drbdadm create-md r0", 63 + "drbdadm up r0", 64 + "drbdadm primary r0 --force", 65 + ) 66 + 67 + drbd2.succeed("drbdadm create-md r0", "drbdadm up r0") 68 + 69 + drbd1.succeed( 70 + "mkfs.ext4 /dev/drbd0", 71 + "mkdir -p /mnt/drbd", 72 + "mount /dev/drbd0 /mnt/drbd", 73 + "touch /mnt/drbd/hello", 74 + "umount /mnt/drbd", 75 + "drbdadm secondary r0", 76 + ) 77 + drbd1.sleep(1) 78 + 79 + drbd2.succeed( 80 + "drbdadm primary r0", 81 + "mkdir -p /mnt/drbd", 82 + "mount /dev/drbd0 /mnt/drbd", 83 + "ls /mnt/drbd/hello", 84 + ) 85 + ''; 86 + } 87 + )
+2 -2
pkgs/applications/gis/qmapshack/default.nix
··· 3 3 4 4 mkDerivation rec { 5 5 pname = "qmapshack"; 6 - version = "1.16.0"; 6 + version = "1.16.1"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "Maproom"; 10 10 repo = pname; 11 11 rev = "V_${version}"; 12 - sha256 = "1yzgkdjxwyg8ggbxyjwr0zjrx99ckrbz2p2524iii9i7qqn8wfsx"; 12 + sha256 = "sha256-2otvRKtFb51PLrIh/Hxltp69n5nyR63HGGvk73TFjqA="; 13 13 }; 14 14 15 15 patches = [
+8 -3
pkgs/applications/version-management/git-and-tools/git-branchless/default.nix
··· 15 15 16 16 rustPlatform.buildRustPackage rec { 17 17 pname = "git-branchless"; 18 - version = "0.3.7"; 18 + version = "0.3.8"; 19 19 20 20 src = fetchFromGitHub { 21 21 owner = "arxanas"; 22 22 repo = "git-branchless"; 23 23 rev = "v${version}"; 24 - sha256 = "sha256-knRRjTjnhpedcQTVpJnBsrnaeRbjZ2i3aABeE0LrQ+c="; 24 + sha256 = "sha256-eDVC1tvAkCioV0Mi5f/Qkc0MMTNaoFXuvWXpllZ7PgE="; 25 25 }; 26 26 27 - cargoSha256 = "sha256-NyzsY5d4iC3zMSzmh9Qmd211oT6lmhUdvIfQdnzrtok="; 27 + cargoSha256 = "sha256-wtG/WTmZ13jxIawI9j9QKQm7jPx5TUs7MjqX+lq/Vf0="; 28 28 29 29 nativeBuildInputs = [ pkg-config ]; 30 30 ··· 42 42 export PATH_TO_GIT=${git}/bin/git 43 43 export GIT_EXEC_PATH=$(${git}/bin/git --exec-path) 44 44 ''; 45 + # FIXME: these tests deadlock when run in the Nix sandbox 46 + checkFlags = [ 47 + "--skip=test_checkout_pty" 48 + "--skip=test_next_ambiguous_interactive" 49 + ]; 45 50 46 51 meta = with lib; { 47 52 description = "A suite of tools to help you visualize, navigate, manipulate, and repair your commit history";
+3 -3
pkgs/applications/virtualization/cloud-hypervisor/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "cloud-hypervisor"; 5 - version = "19.0"; 5 + version = "20.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "cloud-hypervisor"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "0h3varacv9696mih8zrz3fp6xa8hxxvwzkrslhpf9ilcjs1bjihd"; 11 + sha256 = "1j2p2phv1fxsa2mdr66gyswqgij33m3sdaa460xrf98dm581bqw2"; 12 12 }; 13 13 14 14 nativeBuildInputs = [ pkg-config ]; 15 15 buildInputs = [ openssl ] ++ lib.optional stdenv.isAarch64 dtc; 16 16 17 - cargoSha256 = "015r9m9fr634ppn4qy0b8w1khjlxsv3wbpf3s7crmklzy57wakxl"; 17 + cargoSha256 = "12fmpq1y29mawa3xdwbwa3fw2hnhy5rqhlx54qp0s3x9g2jd7gsa"; 18 18 19 19 meta = with lib; { 20 20 homepage = "https://github.com/cloud-hypervisor/cloud-hypervisor";
+1 -1
pkgs/desktops/gnome/core/mutter/default.nix
··· 136 136 PKG_CONFIG_UDEV_UDEVDIR = "${placeholder "out"}/lib/udev"; 137 137 138 138 passthru = { 139 - libdir = "${self}/lib/mutter-8"; 139 + libdir = "${self}/lib/mutter-9"; 140 140 141 141 tests = { 142 142 libdirExists = runCommand "mutter-libdir-exists" {} ''
+2 -2
pkgs/desktops/gnome/misc/gnome-flashback/default.nix
··· 30 30 }: 31 31 let 32 32 pname = "gnome-flashback"; 33 - version = "3.42.0"; 33 + version = "3.42.1"; 34 34 35 35 # From data/sessions/Makefile.am 36 36 requiredComponentsCommon = enableGnomePanel: ··· 61 61 62 62 src = fetchurl { 63 63 url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${name}.tar.xz"; 64 - sha256 = "1CcdwHrHOyceS07cgfMfZPVzGqbUSOehXX2TOXbc3Us="; 64 + sha256 = "sha256:0kl4m05whm03m2v0y3jd69lghkggn8s0hxdhvchcas7jmhh940n8"; 65 65 }; 66 66 67 67 # make .desktop Execs absolute
+2 -2
pkgs/development/libraries/cgreen/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "cgreen"; 5 - version = "1.4.0"; 5 + version = "1.4.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "cgreen-devs"; 9 9 repo = "cgreen"; 10 10 rev = version; 11 - sha256 = "JEpvkM0EZiiQUZRngICNxHbNqS/qjqkEdMPckGbdWac="; 11 + sha256 = "sha256-aQrfsiPuNrEMscZrOoONiN665KlNmnOiYj9ZIyzW304="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake ];
-9
pkgs/development/python-modules/celery/default.nix
··· 12 12 sha256 = "b41a590b49caf8e6498a57db628e580d5f8dc6febda0f42de5d783aed5b7f808"; 13 13 }; 14 14 15 - # click is only used for the repl, in most cases this shouldn't impact 16 - # downstream packages 17 - postPatch = '' 18 - substituteInPlace requirements/test.txt \ 19 - --replace "moto==1.3.7" moto 20 - substituteInPlace requirements/default.txt \ 21 - --replace "click>=7.0,<8.0" click 22 - ''; 23 - 24 15 propagatedBuildInputs = [ billiard click click-didyoumean click-plugins click-repl kombu pytz vine ]; 25 16 26 17 checkInputs = [ boto3 case moto pytest pytest-celery pytest-subtests pytest-timeout ];
+2 -2
pkgs/development/tools/build-managers/redo-apenwarr/default.nix
··· 4 4 }: stdenv.mkDerivation rec { 5 5 6 6 pname = "redo-apenwarr"; 7 - version = "0.42c"; 7 + version = "0.42d"; 8 8 9 9 src = fetchFromGitHub rec { 10 10 owner = "apenwarr"; 11 11 repo = "redo"; 12 12 rev = "${repo}-${version}"; 13 - sha256 = "0kc2gag1n5583195gs38gjm8mb7in9y70c07fxibsay19pvvb8iw"; 13 + sha256 = "/QIMXpVhVLAIJa3LiOlRKzbUztIWZygkWZUKN4Nrh+M="; 14 14 }; 15 15 16 16 postPatch = ''
+2 -2
pkgs/development/tools/misc/kibana/6.x.nix
··· 27 27 }; 28 28 29 29 in stdenv.mkDerivation rec { 30 - name = "kibana-${optionalString (!enableUnfree) "oss-"}${version}"; 30 + pname = "kibana${optionalString (!enableUnfree) "-oss"}"; 31 31 version = elk6Version; 32 32 33 33 src = fetchurl { 34 - url = "https://artifacts.elastic.co/downloads/kibana/${name}-${plat}-${arch}.tar.gz"; 34 + url = "https://artifacts.elastic.co/downloads/kibana/${pname}-${version}-${plat}-${arch}.tar.gz"; 35 35 sha256 = shas.${stdenv.hostPlatform.system} or (throw "Unknown architecture"); 36 36 }; 37 37
+5 -32
pkgs/development/tools/rust/rust-analyzer/default.nix
··· 1 1 { lib 2 2 , stdenv 3 3 , fetchFromGitHub 4 - , fetchpatch 5 4 , rustPlatform 6 5 , CoreServices 7 6 , cmake ··· 12 11 13 12 rustPlatform.buildRustPackage rec { 14 13 pname = "rust-analyzer-unwrapped"; 15 - version = "2021-10-25"; 16 - cargoSha256 = "sha256-PCQxXNpv4krdLBhyINoZT5QxV2hCqXpp1mqs0dUu4Ag="; 14 + version = "2021-11-29"; 15 + cargoSha256 = "sha256-UgYR0e3Pt3lcbkSDnizlwtwjnqTaqGlXRgR724U4rSU="; 17 16 18 17 src = fetchFromGitHub { 19 18 owner = "rust-analyzer"; 20 19 repo = "rust-analyzer"; 21 20 rev = version; 22 - sha256 = "sha256-3AMRwtEmITIvUdR/NINQTPatkjhmS1dQsbbsefIDYAE="; 21 + sha256 = "sha256-vh7z8jupVxXPOko3sWUsOB7eji/7lKfwJ/CE3iw97Sw="; 23 22 }; 24 23 25 24 patches = [ ··· 28 27 ./ignore-git-and-rustfmt-tests.patch 29 28 ]; 30 29 31 - # Revert edition 2021 related code since we have rust 1.55.0 in nixpkgs currently. 32 - # Remove them when we have rust >= 1.56.0 33 - # They change Cargo.toml so go `cargoPatches`. 34 - cargoPatches = [ 35 - (fetchpatch { 36 - url = "https://github.com/rust-analyzer/rust-analyzer/commit/f0ad6fa68bf98d317518bb75da01b7bb7abe98d3.patch"; 37 - revert = true; 38 - sha256 = "sha256-ksX2j1Pgtd+M+FmXTEljm1nUxJwcY8GDQ9784Lb1uM4="; 39 - }) 40 - (fetchpatch { 41 - url = "https://github.com/rust-analyzer/rust-analyzer/commit/8457ae34bdbca117b2ef73787b214161440e21f9.patch"; 42 - revert = true; 43 - sha256 = "sha256-w1Py1bvZ2/tDQDZVMNmPRo6i6uA4H3YYZY4rXlo0iqg="; 44 - }) 45 - (fetchpatch { 46 - url = "https://github.com/rust-analyzer/rust-analyzer/commit/ca44b6892e3e66765355d4e645f74df3d184c03b.patch"; 47 - revert = true; 48 - sha256 = "sha256-N1TWlLxEg6oxFkns1ieVVvLAkrHq2WOr1tbkNvZvDFg="; 49 - }) 50 - (fetchpatch { 51 - url = "https://github.com/rust-analyzer/rust-analyzer/commit/1294bfce865c556184c9327af4a8953ca940aec8.patch"; 52 - revert = true; 53 - sha256 = "sha256-65eZxAjsuUln6lzSihIP26x15PELLDL4yk9wiVzJ0hE="; 54 - }) 55 - ]; 56 - 57 30 buildAndTestSubdir = "crates/rust-analyzer"; 58 31 59 32 nativeBuildInputs = lib.optional useMimalloc cmake; ··· 84 57 passthru.updateScript = ./update.sh; 85 58 86 59 meta = with lib; { 87 - description = "An experimental modular compiler frontend for the Rust language"; 88 - homepage = "https://github.com/rust-analyzer/rust-analyzer"; 60 + description = "A modular compiler frontend for the Rust language"; 61 + homepage = "https://rust-analyzer.github.io"; 89 62 license = with licenses; [ mit asl20 ]; 90 63 maintainers = with maintainers; [ oxalica ]; 91 64 };
+2 -2
pkgs/misc/vscode-extensions/rust-analyzer/build-deps/package.json
··· 1 1 { 2 2 "name": "rust-analyzer", 3 - "version": "0.2.792", 3 + "version": "0.2.834", 4 4 "dependencies": { 5 5 "https-proxy-agent": "^5.0.0", 6 6 "node-fetch": "^2.6.1", ··· 20 20 "tslib": "^2.3.0", 21 21 "typescript": "^4.3.5", 22 22 "typescript-formatter": "^7.2.2", 23 - "vsce": "=1.95.1", 23 + "vsce": "^1.95.1", 24 24 "vscode-test": "^1.5.1" 25 25 } 26 26 }
+3 -5
pkgs/os-specific/linux/autofs/default.nix
··· 1 1 { lib, stdenv, fetchurl, flex, bison, linuxHeaders, libtirpc, mount, umount, nfs-utils, e2fsprogs 2 2 , libxml2, libkrb5, kmod, openldap, sssd, cyrus_sasl, openssl, rpcsvc-proto }: 3 3 4 - let 4 + stdenv.mkDerivation rec { 5 5 version = "5.1.6"; 6 - name = "autofs-${version}"; 7 - in stdenv.mkDerivation { 8 - inherit name; 6 + pname = "autofs"; 9 7 10 8 src = fetchurl { 11 - url = "mirror://kernel/linux/daemons/autofs/v5/${name}.tar.xz"; 9 + url = "mirror://kernel/linux/daemons/autofs/v5/autofs-${version}.tar.xz"; 12 10 sha256 = "1vya21mb4izj3khcr3flibv7xc15vvx2v0rjfk5yd31qnzcy7pnx"; 13 11 }; 14 12
+106 -27
pkgs/os-specific/linux/drbd/default.nix
··· 1 - { lib, stdenv, fetchurl, flex, systemd, perl }: 1 + { lib 2 + , stdenv 3 + , docbook_xml_dtd_44 4 + , docbook_xml_dtd_45 5 + , docbook_xsl 6 + , asciidoctor 7 + , fetchurl 8 + , flex 9 + , kmod 10 + , libxslt 11 + , nixosTests 12 + , perl 13 + , systemd 14 + 15 + # drbd-utils are compiled twice, once with forOCF = true to extract 16 + # its OCF definitions for use in the ocf-resource-agents derivation, 17 + # then again with forOCF = false, where the ocf-resource-agents is 18 + # provided as the OCF_ROOT. 19 + , forOCF ? false 20 + , ocf-resource-agents 21 + }: 2 22 3 23 stdenv.mkDerivation rec { 4 24 pname = "drbd"; 5 - version = "8.4.4"; 25 + version = "9.19.1"; 6 26 7 27 src = fetchurl { 8 - url = "http://oss.linbit.com/drbd/8.4/drbd-${version}.tar.gz"; 9 - sha256 = "1w4889h1ak7gy9w33kd4fgjlfpgmp6hzfya16p1pkc13bjf22mm0"; 28 + url = "https://pkg.linbit.com/downloads/drbd/utils/${pname}-utils-${version}.tar.gz"; 29 + sha256 = "1l99kcrb0j85wxxmrdihpx9bk1a4sdi7wlp5m1x5l24k8ck1m5cf"; 10 30 }; 11 31 12 - patches = [ ./pass-force.patch ./fix-glibc-compilation.patch ]; 32 + nativeBuildInputs = [ 33 + flex 34 + libxslt 35 + docbook_xsl 36 + asciidoctor 37 + ]; 13 38 14 - nativeBuildInputs = [ flex ]; 15 - buildInputs = [ perl ]; 39 + buildInputs = [ 40 + perl 41 + # perlPackages.Po4a used by ja documentation 42 + ]; 16 43 17 44 configureFlags = [ 18 - "--without-distro" 19 - "--without-pacemaker" 45 + "--libdir=${placeholder "out"}/lib" 46 + "--sbindir=${placeholder "out"}/bin" 20 47 "--localstatedir=/var" 21 48 "--sysconfdir=/etc" 49 + "--without-distro" 22 50 ]; 23 51 24 - preConfigure = 25 - '' 26 - export PATH=${systemd}/sbin:$PATH 27 - substituteInPlace user/Makefile.in \ 28 - --replace /sbin '$(sbindir)' 29 - substituteInPlace user/legacy/Makefile.in \ 30 - --replace '$(DESTDIR)/lib/drbd' '$(DESTDIR)$(LIBDIR)' 31 - substituteInPlace user/drbdadm_usage_cnt.c --replace /lib/drbd $out/lib/drbd 32 - substituteInPlace scripts/drbd.rules --replace /usr/sbin/drbdadm $out/sbin/drbdadm 33 - ''; 34 - 35 - makeFlags = [ "SHELL=${stdenv.shell}" ]; 52 + makeFlags = [ 53 + "SOURCE_DATE_EPOCH=1" 54 + "WANT_DRBD_REPRODUCIBLE_BUILD=1" 55 + ] ++ lib.optional (!forOCF) "OCF_ROOT=${ocf-resource-agents}/usr/lib/ocf}"; 36 56 37 57 installFlags = [ 38 - "localstatedir=$(TMPDIR)/var" 39 - "sysconfdir=$(out)/etc" 40 - "INITDIR=$(out)/etc/init.d" 58 + "prefix=" 59 + "DESTDIR=${placeholder "out"}" 60 + "localstatedir=/var" 61 + "DRBD_LIB_DIR=/var/lib" 62 + "INITDIR=/etc/init.d" 63 + "udevrulesdir=/etc/udev/rules.d" 64 + "sysconfdir=/etc" 65 + "sbindir=/bin" 66 + "datadir=" 67 + "LIBDIR=/lib/drbd" 68 + "mandir=/share/man" 41 69 ]; 42 70 71 + postPatch = '' 72 + patchShebangs . 73 + substituteInPlace user/v84/drbdadm_usage_cnt.c \ 74 + --replace '"/lib/drbd");' \ 75 + '"${placeholder "out"}/lib/drbd");' 76 + substituteInPlace user/v9/drbdsetup_linux.c \ 77 + --replace 'ret = system("/sbin/modprobe drbd");' \ 78 + 'ret = system("${kmod}/bin/modprobe drbd");' 79 + substituteInPlace user/v84/drbdsetup.c \ 80 + --replace 'system("/sbin/modprobe drbd")' \ 81 + 'system("${kmod}/bin/modprobe drbd")' 82 + substituteInPlace documentation/ra2refentry.xsl \ 83 + --replace "http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd" \ 84 + "${docbook_xml_dtd_44}/xml/dtd/docbook/docbookx.dtd" 85 + function patch_docbook45() { 86 + substituteInPlace $1 \ 87 + --replace "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" \ 88 + "${docbook_xml_dtd_45}/xml/dtd/docbook/docbookx.dtd" 89 + } 90 + patch_docbook45 documentation/v9/drbd.conf.xml.in 91 + patch_docbook45 documentation/v9/drbdsetup.xml.in 92 + patch_docbook45 documentation/v84/drbdsetup.xml 93 + patch_docbook45 documentation/v84/drbd.conf.xml 94 + # The ja documentation is disabled because: 95 + # make[1]: Entering directory '/build/drbd-utils-9.16.0/documentation/ja/v84' 96 + # /nix/store/wyx2nn2pjcn50lc95c6qgsgm606rn0x2-perl5.32.1-po4a-0.62/bin/po4a-translate -f docbook -M utf-8 -L utf-8 -keep 0 -m ../../v84/drbdsetup.xml -p drbdsetup.xml.po -l drbdsetup.xml 97 + # Use of uninitialized value $args[1] in sprintf at /nix/store/wyx2nn2pjcn50lc95c6qgsgm606rn0x2-perl5.32.1-po4a-0.62/lib/perl5/site_perl/Locale/Po4a/Common.pm line 134. 98 + # Invalid po file drbdsetup.xml.po: 99 + substituteInPlace Makefile.in \ 100 + --replace 'DOC_DIRS := documentation/v9 documentation/ja/v9' \ 101 + 'DOC_DIRS := documentation/v9' \ 102 + --replace 'DOC_DIRS += documentation/v84 documentation/ja/v84' \ 103 + 'DOC_DIRS += documentation/v84' \ 104 + --replace '$(MAKE) -C documentation/ja/v9 doc' \ 105 + "" \ 106 + --replace '$(MAKE) -C documentation/ja/v84 doc' \ 107 + "" 108 + substituteInPlace user/v9/drbdtool_common.c \ 109 + --replace 'add_component_to_path("/lib/drbd");' \ 110 + 'add_component_to_path("${placeholder "out"}/lib/drbd");' 111 + ''; 112 + 113 + preConfigure = '' 114 + export PATH=${systemd}/sbin:$PATH 115 + ''; 116 + 117 + enableParallelBuilding = true; 118 + 119 + passthru.tests.drbd = nixosTests.drbd; 120 + 43 121 meta = with lib; { 44 - homepage = "http://www.drbd.org/"; 45 - description = "Distributed Replicated Block Device, a distributed storage system for Linux"; 46 - license = licenses.gpl2; 122 + homepage = "https://linbit.com/drbd/"; 123 + description = "Distributed Replicated Block Device, a distributed storage system for Linux (userspace utilities)"; 124 + license = licenses.gpl2Plus; 47 125 platforms = platforms.linux; 126 + maintainers = with maintainers; [ ryantm astro ]; 48 127 }; 49 128 }
-24
pkgs/os-specific/linux/drbd/fix-glibc-compilation.patch
··· 1 - diff --git a/user/drbdadm_adjust.c b/user/drbdadm_adjust.c 2 - index cb23270..3a751ca 100644 3 - --- a/user/drbdadm_adjust.c 4 - +++ b/user/drbdadm_adjust.c 5 - @@ -29,6 +29,7 @@ 6 - #include <sys/types.h> 7 - #include <sys/stat.h> 8 - #include <sys/wait.h> 9 - +#include <sys/sysmacros.h> 10 - #include <unistd.h> 11 - #include <fcntl.h> 12 - 13 - diff --git a/user/legacy/drbdadm_adjust.c b/user/legacy/drbdadm_adjust.c 14 - index c79163c..6990ffb 100644 15 - --- a/user/legacy/drbdadm_adjust.c 16 - +++ b/user/legacy/drbdadm_adjust.c 17 - @@ -27,6 +27,7 @@ 18 - #include <sys/types.h> 19 - #include <sys/stat.h> 20 - #include <sys/wait.h> 21 - +#include <sys/sysmacros.h> 22 - #include <unistd.h> 23 - #include <fcntl.h> 24 -
-15
pkgs/os-specific/linux/drbd/pass-force.patch
··· 1 - Propagate the --force flag in the legacy drbdadm to drbdsetup. 2 - Otherwise "drbdadm primary --force" won't work as expected (the kernel 3 - will say "State change failed: Need access to UpToDate data"). 4 - 5 - diff -ru -x '*~' drbd-8.4.0-orig/user/legacy/drbdadm_main.c drbd-8.4.0/user/legacy/drbdadm_main.c 6 - --- drbd-8.4.0-orig/user/legacy/drbdadm_main.c 2011-07-07 06:55:39.000000000 -0400 7 - +++ drbd-8.4.0/user/legacy/drbdadm_main.c 2011-11-02 14:51:04.000000000 -0400 8 - @@ -1547,6 +1547,7 @@ 9 - for (i = 0; i < soi; i++) { 10 - argv[NA(argc)] = setup_opts[i]; 11 - } 12 - + if (force) argv[NA(argc)] = "--force"; 13 - argv[NA(argc)] = 0; 14 - 15 - setenv("DRBD_RESOURCE", res->name, 1);
+4 -7
pkgs/os-specific/linux/gogoclient/default.nix
··· 1 1 {lib, stdenv, fetchurl, openssl, nettools, iproute2, sysctl}: 2 2 3 - let baseName = "gogoclient"; 4 - version = "1.2"; 5 - in 6 - 7 3 stdenv.mkDerivation rec { 8 - name = "${baseName}-${version}"; 4 + pname = "gogoclient"; 5 + version = "1.2"; 9 6 10 7 src = fetchurl { 11 8 #url = "http://gogo6.com/downloads/gogoc-1_2-RELEASE.tar.gz"; ··· 21 18 buildInputs = [openssl]; 22 19 23 20 preFixup = '' 24 - mkdir -p $out/share/${name} 21 + mkdir -p $out/share/gogoclient-${version} 25 22 chmod 444 $out/bin/gogoc.conf 26 - mv $out/bin/gogoc.conf $out/share/${name}/gogoc.conf.sample 23 + mv $out/bin/gogoc.conf $out/share/gogoclient-${version}/gogoc.conf.sample 27 24 rm $out/bin/gogoc.conf.sample 28 25 29 26 substituteInPlace "$out/template/linux.sh" \
+56
pkgs/os-specific/linux/ocf-resource-agents/default.nix
··· 1 + { stdenv 2 + , lib 3 + , runCommand 4 + , lndir 5 + , fetchFromGitHub 6 + , autoreconfHook 7 + , pkg-config 8 + , python3 9 + , glib 10 + , drbd 11 + }: 12 + 13 + let 14 + drbdForOCF = drbd.override { 15 + forOCF = true; 16 + }; 17 + 18 + resource-agentsForOCF = stdenv.mkDerivation rec { 19 + pname = "resource-agents"; 20 + version = "4.10.0"; 21 + 22 + src = fetchFromGitHub { 23 + owner = "ClusterLabs"; 24 + repo = pname; 25 + rev = "v${version}"; 26 + sha256 = "0haryi3yrszdfpqnkfnppxj1yiy6ipah6m80snvayc7v0ss0wnir"; 27 + }; 28 + 29 + nativeBuildInputs = [ 30 + autoreconfHook 31 + pkg-config 32 + ]; 33 + 34 + buildInputs = [ 35 + glib 36 + python3 37 + ]; 38 + 39 + meta = with lib; { 40 + homepage = "https://github.com/ClusterLabs/resource-agents"; 41 + description = "Combined repository of OCF agents from the RHCS and Linux-HA projects"; 42 + license = licenses.gpl2Plus; 43 + platforms = platforms.linux; 44 + maintainers = with maintainers; [ ryantm astro ]; 45 + }; 46 + }; 47 + 48 + in 49 + 50 + # This combines together OCF definitions from other derivations. 51 + # https://github.com/ClusterLabs/resource-agents/blob/master/doc/dev-guides/ra-dev-guide.asc 52 + runCommand "ocf-resource-agents" {} '' 53 + mkdir -p $out/usr/lib/ocf 54 + ${lndir}/bin/lndir -silent "${resource-agentsForOCF}/lib/ocf/" $out/usr/lib/ocf 55 + ${lndir}/bin/lndir -silent "${drbdForOCF}/usr/lib/ocf/" $out/usr/lib/ocf 56 + ''
+2 -1
pkgs/os-specific/linux/wpa_supplicant/gui.nix
··· 1 1 { lib, mkDerivation, fetchpatch, qtbase, qmake, inkscape, imagemagick, wpa_supplicant }: 2 2 3 3 mkDerivation { 4 - name = "wpa_gui-${wpa_supplicant.version}"; 4 + pname = "wpa_gui"; 5 + version = wpa_supplicant.version; 5 6 6 7 inherit (wpa_supplicant) src; 7 8
+4 -4
pkgs/servers/ma1sd/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, jre, git, gradle_6, perl, makeWrapper }: 2 2 3 3 let 4 - name = "ma1sd-${version}"; 4 + pname = "ma1sd"; 5 5 version = "2.4.0"; 6 6 rev = version; 7 7 ··· 14 14 15 15 16 16 deps = stdenv.mkDerivation { 17 - name = "${name}-deps"; 18 - inherit src; 17 + pname = "${pname}-deps"; 18 + inherit src version; 19 19 nativeBuildInputs = [ gradle_6 perl git ]; 20 20 21 21 buildPhase = '' ··· 40 40 41 41 in 42 42 stdenv.mkDerivation { 43 - inherit name src version; 43 + inherit pname src version; 44 44 nativeBuildInputs = [ gradle_6 perl makeWrapper ]; 45 45 buildInputs = [ jre ]; 46 46
+2 -2
pkgs/shells/loksh/default.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "loksh"; 12 - version = "6.9"; 12 + version = "7.0"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "dimkr"; 16 16 repo = pname; 17 17 rev = version; 18 18 fetchSubmodules = true; 19 - sha256 = "0x33plxqhh5202hgqidgccz5hpg8d2q71ylgnm437g60mfi9z0px"; 19 + sha256 = "sha256-q5RiY9/xEFCk+oHlxgNwDOB+TNjRWHKzU2kQH2LjCWY="; 20 20 }; 21 21 22 22 nativeBuildInputs = [
+3 -4
pkgs/tools/X11/xgeometry-select/default.nix
··· 1 1 { lib, stdenv, fetchurl, libX11 }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "${baseName}-${version}"; 5 - baseName = "xgeometry-select"; 4 + pname = "xgeometry-select"; 6 5 version = "0.1"; 7 6 8 7 src = fetchurl { ··· 15 14 buildInputs = [ libX11 ]; 16 15 17 16 buildPhase = '' 18 - gcc -Wall -lX11 ${src} -o ${baseName} 17 + gcc -Wall -lX11 ${src} -o xgeometry-select 19 18 ''; 20 19 21 20 installPhase = '' 22 21 mkdir -p $out/bin 23 - mv -v ${baseName} $out/bin 22 + mv -v xgeometry-select $out/bin 24 23 ''; 25 24 26 25 meta = with lib; {
+1 -1
pkgs/tools/audio/alsaequal/default.nix
··· 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { 6 - name = "alsaequal"; 6 + pname = "alsaequal"; 7 7 version = "0.6"; 8 8 9 9 src = fetchurl {
+7 -5
pkgs/tools/audio/kaldi/default.nix
··· 17 17 openfst = fetchFromGitHub { 18 18 owner = "kkm000"; 19 19 repo = "openfst"; 20 - rev = "0bca6e76d24647427356dc242b0adbf3b5f1a8d9"; 21 - sha256 = "1802rr14a03zl1wa5a0x1fa412kcvbgprgkadfj5s6s3agnn11rx"; 20 + rev = "338225416178ac36b8002d70387f5556e44c8d05"; 21 + sha256 = "sha256-MGEUuw7ex+WcujVdxpO2Bf5sB6Z0edcAeLGqW/Lo1Hs="; 22 22 }; 23 23 in 24 24 stdenv.mkDerivation { 25 25 pname = "kaldi"; 26 - version = "2020-12-26"; 26 + version = "2021-12-03"; 27 27 28 28 src = fetchFromGitHub { 29 29 owner = "kaldi-asr"; 30 30 repo = "kaldi"; 31 - rev = "813b73185a18725e4f6021981d17221d6ee23a19"; 32 - sha256 = "sha256-lTqXTG5ZTPmhCgt+BVzOwjKEIj+bLGUa+IxJq+XtHUg="; 31 + rev = "2b016ab8cb018e031ab3bf01ec36cc2950c7e509"; 32 + sha256 = "sha256-R8CrY7cwU5XfeGEgeFuZ0ApsEcEmWN/lrZaCjz85tyk="; 33 33 }; 34 34 35 35 cmakeFlags = [ 36 36 "-DKALDI_BUILD_TEST=off" 37 37 "-DBUILD_SHARED_LIBS=on" 38 38 ]; 39 + 40 + enableParallelBuilding = true; 39 41 40 42 preConfigure = '' 41 43 mkdir bin
+2 -2
pkgs/tools/backup/s3ql/default.nix
··· 2 2 3 3 python3Packages.buildPythonApplication rec { 4 4 pname = "s3ql"; 5 - version = "3.7.3"; 5 + version = "3.8.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = pname; 9 9 repo = pname; 10 10 rev = "release-${version}"; 11 - sha256 = "042fvkvranfnv2xxxz9d92cgia14p1hwmpjgm0rr94pjd36n1sfs"; 11 + sha256 = "0a6ll5vs7faj1klfz3j674399qfbhy3blp3c5wwsqvcdkpcjcx11"; 12 12 }; 13 13 14 14 checkInputs = [ which ] ++ (with python3Packages; [ cython pytest pytest-trio ]);
+3 -4
pkgs/tools/bluetooth/bluez-tools/default.nix
··· 2 2 , fetchFromGitHub, glib, pkg-config }: 3 3 4 4 stdenv.mkDerivation rec { 5 - date = "2016-12-12"; 6 - name = "bluez-tools-${date}"; 7 - rev = "97efd29"; 5 + version = "unstable-2016-12-12"; 6 + pname = "bluez-tools"; 8 7 9 8 src = fetchFromGitHub { 10 - inherit rev; 11 9 owner = "khvzak"; 12 10 repo = "bluez-tools"; 11 + rev = "97efd293491ad7ec96a655665339908f2478b3d1"; 13 12 sha256 = "08xp77sf5wnq5086halmyk3vla4bfls06q1zrqdcq36hw6d409i6"; 14 13 }; 15 14
+2 -2
pkgs/tools/cd-dvd/xorriso/default.nix
··· 1 1 { fetchurl, lib, stdenv, libcdio, zlib, bzip2, readline, acl, attr, libiconv }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "xorriso-${version}"; 4 + pname = "xorriso"; 5 5 version = "1.5.4.pl02"; 6 6 7 7 src = fetchurl { 8 - url = "mirror://gnu/xorriso/${name}.tar.gz"; 8 + url = "mirror://gnu/xorriso/xorriso-${version}.tar.gz"; 9 9 sha256 = "sha256-Psc5PUqdy/X3QwnCikFfVSJ+xidwuVrpk6yNejsVKXI="; 10 10 }; 11 11
+6 -7
pkgs/tools/filesystems/hfsprogs/default.nix
··· 1 1 { lib, stdenv, fetchurl, openssl, libbsd }: 2 2 3 - let version = "332.25"; 4 - package_name = "hfsprogs"; in 5 - stdenv.mkDerivation { 6 - name = "${package_name}-${version}"; 3 + stdenv.mkDerivation rec { 4 + version = "332.25"; 5 + pname = "hfsprogs"; 7 6 srcs = [ 8 7 (fetchurl { 9 - url = "http://ftp.de.debian.org/debian/pool/main/h/hfsprogs/${package_name}_${version}-11.debian.tar.gz"; 8 + url = "http://ftp.de.debian.org/debian/pool/main/h/hfsprogs/hfsprogs_${version}-11.debian.tar.gz"; 10 9 sha256 = "62d9b8599c66ebffbc57ce5d776e20b41341130d9b27341d63bda08460ebde7c"; 11 10 }) 12 11 (fetchurl { ··· 29 28 installPhase = '' 30 29 # Create required package directories 31 30 install -m 755 -d "$out/bin" 32 - install -m 755 -d "$out/share/${package_name}" 31 + install -m 755 -d "$out/share/hfsprogs" 33 32 install -m 755 -d "$out/share/man/man8/" 34 33 # Copy executables 35 34 install -m 755 "newfs_hfs.tproj/newfs_hfs" "$out/bin/mkfs.hfsplus" 36 35 install -m 755 "fsck_hfs.tproj/fsck_hfs" "$out/bin/fsck.hfsplus" 37 36 # Copy shared data 38 - install -m 644 "newfs_hfs.tproj/hfsbootdata.img" "$out/share/${package_name}/hfsbootdata" 37 + install -m 644 "newfs_hfs.tproj/hfsbootdata.img" "$out/share/hfsprogs/hfsbootdata" 39 38 # Copy man pages 40 39 install -m 644 "newfs_hfs.tproj/newfs_hfs.8" "$out/share/man/man8/mkfs.hfsplus.8" 41 40 install -m 644 "fsck_hfs.tproj/fsck_hfs.8" "$out/share/man/man8/fsck.hfsplus.8"
+3 -6
pkgs/tools/filesystems/nixpart/0.4/lvm2.nix
··· 1 1 { lib, stdenv, fetchurl, fetchpatch, pkg-config, systemd, util-linux, coreutils }: 2 2 3 - let 4 - v = "2.02.106"; 5 - in 6 - 7 3 stdenv.mkDerivation { 8 - name = "lvm2-${v}"; 4 + pname = "lvm2"; 5 + version = "2.02.106"; 9 6 10 7 src = fetchurl { 11 - url = "ftp://sources.redhat.com/pub/lvm2/releases/LVM2.${v}.tgz"; 8 + url = "ftp://sources.redhat.com/pub/lvm2/releases/LVM2.${version}.tgz"; 12 9 sha256 = "0nr833bl0q4zq52drjxmmpf7bs6kqxwa5kahwwxm9411khkxz0vc"; 13 10 }; 14 11
+1 -1
pkgs/tools/filesystems/wiimms-iso-tools/default.nix
··· 1 1 {lib, stdenv, fetchurl, fetchpatch, zlib, ncurses, fuse}: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "wiimms-iso-tools"; 4 + pname = "wiimms-iso-tools"; 5 5 version = "3.02a"; 6 6 7 7 src = fetchurl {
+1 -1
pkgs/tools/inputmethods/fcitx-engines/fcitx-mozc/default.nix
··· 13 13 sha256 = "10bdjn481jsh32vll7r756l392anz44h6207vjqwby3rplk31np1"; 14 14 }; 15 15 in clangStdenv.mkDerivation rec { 16 - name = "fcitx-mozc-${version}"; 16 + pname = "fcitx-mozc"; 17 17 version = "2.23.2815.102"; 18 18 19 19 src = fetchFromGitHub {
+2 -2
pkgs/tools/misc/mdbtools/default.nix
··· 5 5 6 6 stdenv.mkDerivation rec { 7 7 pname = "mdbtools"; 8 - version = "0.9.4"; 8 + version = "1.0.0"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "mdbtools"; 12 12 repo = "mdbtools"; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-Hnub8h0a3qx5cxVn1tp/IVbz9aORjGGWizD3Z4rPl2s="; 14 + sha256 = "sha256-e9rgTWu8cwuccpp/wAfas1ZeQPTpGcgE6YjLz7KRnhw="; 15 15 }; 16 16 17 17 configureFlags = [ "--disable-scrollkeeper" ];
+5 -5
pkgs/tools/security/afl/qemu.nix
··· 5 5 with lib; 6 6 7 7 let 8 - qemuName = "qemu-2.10.0"; 9 8 cpuTarget = if stdenv.hostPlatform.system == "x86_64-linux" then "x86_64-linux-user" 10 9 else if stdenv.hostPlatform.system == "i686-linux" then "i386-linux-user" 11 10 else throw "afl: no support for ${stdenv.hostPlatform.system}!"; 12 11 in 13 - stdenv.mkDerivation { 14 - name = "afl-${qemuName}"; 12 + stdenv.mkDerivation rec { 13 + pname = "afl-qemu"; 14 + version = "2.10.0"; 15 15 16 16 srcs = [ 17 17 (fetchurl { 18 - url = "http://wiki.qemu.org/download/${qemuName}.tar.bz2"; 18 + url = "http://wiki.qemu.org/download/qemu-${version}.tar.bz2"; 19 19 sha256 = "0j3dfxzrzdp1w21k21fjvmakzc6lcha1rsclaicwqvbf63hkk7vy"; 20 20 }) 21 21 afl.src 22 22 ]; 23 23 24 - sourceRoot = qemuName; 24 + sourceRoot = "qemu-${version}"; 25 25 26 26 postUnpack = '' 27 27 cp ${afl.src.name}/types.h $sourceRoot/afl-types.h
+1 -1
pkgs/tools/security/nmap/default.nix
··· 11 11 with lib; 12 12 13 13 stdenv.mkDerivation rec { 14 - name = "nmap${optionalString graphicalSupport "-graphical"}-${version}"; 14 + pname = "nmap${optionalString graphicalSupport "-graphical"}"; 15 15 version = "7.92"; 16 16 17 17 src = fetchurl {
+5 -6
pkgs/tools/security/open-ecard/default.nix
··· 2 2 3 3 let 4 4 version = "1.2.4"; 5 - 6 5 srcs = { 7 6 richclient = fetchurl { 8 7 url = "https://jnlp.openecard.org/richclient-${version}-20171212-0958.jar"; ··· 18 17 }; 19 18 }; 20 19 in stdenv.mkDerivation rec { 21 - appName = "open-ecard"; 22 - name = "${appName}-${version}"; 20 + pname = "open-ecard"; 21 + inherit version; 23 22 24 23 src = srcs.richclient; 25 24 ··· 28 27 nativeBuildInputs = [ makeWrapper ]; 29 28 30 29 desktopItem = makeDesktopItem { 31 - name = appName; 30 + name = pname; 32 31 desktopName = "Open eCard App"; 33 32 genericName = "eCard App"; 34 33 comment = "Client side implementation of the eCard-API-Framework"; 35 34 icon = "oec_logo_bg-transparent.svg"; 36 - exec = appName; 35 + exec = pname; 37 36 categories = "Utility;Security;"; 38 37 }; 39 38 ··· 47 46 cp ${srcs.logo} $out/share/pixmaps/oec_logo_bg-transparent.svg 48 47 49 48 mkdir -p $out/bin 50 - makeWrapper ${jre}/bin/java $out/bin/${appName} \ 49 + makeWrapper ${jre}/bin/java $out/bin/${pname} \ 51 50 --add-flags "-cp $out/share/java/cifs-${version}.jar" \ 52 51 --add-flags "-jar $out/share/java/richclient-${version}.jar" \ 53 52 --suffix LD_LIBRARY_PATH ':' ${lib.getLib pcsclite}/lib
+8 -1
pkgs/tools/security/tor/default.nix
··· 61 61 62 62 enableParallelBuilding = true; 63 63 64 - doCheck = true; 64 + # disable tests on aarch64-darwin, the following tests fail there: 65 + # oom/circbuf: [forking] 66 + # FAIL src/test/test_oom.c:187: assert(c1->marked_for_close) 67 + # [circbuf FAILED] 68 + # oom/streambuf: [forking] 69 + # FAIL src/test/test_oom.c:287: assert(x_ OP_GE 500 - 5): 0 vs 495 70 + # [streambuf FAILED] 71 + doCheck = !(stdenv.isDarwin && stdenv.isAarch64); 65 72 66 73 postInstall = '' 67 74 mkdir -p $geoip/share/tor
+25 -3
pkgs/tools/security/tor/disable-monotonic-timer-tests.patch
··· 2 2 index 0d86a5ab5..e93c6ba89 100644 3 3 --- a/src/test/test_util.c 4 4 +++ b/src/test/test_util.c 5 - @@ -5829,13 +5829,9 @@ test_util_monotonic_time(void *arg) 5 + @@ -6490,13 +6490,9 @@ test_util_monotonic_time(void *arg) 6 6 /* We need to be a little careful here since we don't know the system load. 7 7 */ 8 8 tt_i64_op(monotime_diff_msec(&mt1, &mt2), OP_GE, 175); ··· 16 16 17 17 tt_u64_op(msec1, OP_GE, nsec1 / 1000000); 18 18 tt_u64_op(usec1, OP_GE, nsec1 / 1000); 19 - @@ -5849,7 +5845,6 @@ test_util_monotonic_time(void *arg) 19 + @@ -6509,8 +6509,6 @@ test_util_monotonic_time(void *arg) 20 + 20 21 uint64_t coarse_stamp_diff = 21 22 monotime_coarse_stamp_units_to_approx_msec(stamp2-stamp1); 22 - tt_u64_op(coarse_stamp_diff, OP_GE, 120); 23 + - tt_u64_op(coarse_stamp_diff, OP_GE, 120); 23 24 - tt_u64_op(coarse_stamp_diff, OP_LE, 1200); 24 25 25 26 { 26 27 uint64_t units = monotime_msec_to_approx_coarse_stamp_units(5000); 28 + @@ -6515,8 +6515,8 @@ test_util_monotonic_time(void *arg) 29 + { 30 + uint64_t units = monotime_msec_to_approx_coarse_stamp_units(5000); 31 + uint64_t ms = monotime_coarse_stamp_units_to_approx_msec(units); 32 + - tt_u64_op(ms, OP_GE, 4950); 33 + - tt_u64_op(ms, OP_LT, 5050); 34 + + tt_u64_op(ms, OP_GE, 4000); 35 + + tt_u64_op(ms, OP_LT, 6000); 36 + } 37 + 38 + done: 39 + @@ -6640,9 +6640,6 @@ test_util_monotonic_time_add_msec(void *arg) 40 + monotime_coarse_add_msec(&ct2, &ct1, 1337); 41 + tt_i64_op(monotime_diff_msec(&t1, &t2), OP_EQ, 1337); 42 + tt_i64_op(monotime_coarse_diff_msec(&ct1, &ct2), OP_EQ, 1337); 43 + - // The 32-bit variant must be within 1% of the regular one. 44 + - tt_int_op(monotime_coarse_diff_msec32_(&ct1, &ct2), OP_GT, 1323); 45 + - tt_int_op(monotime_coarse_diff_msec32_(&ct1, &ct2), OP_LT, 1350); 46 + 47 + /* Add 1337 msec twice more; make sure that any second rollover issues 48 + * worked. */
+3 -5
pkgs/tools/system/lshw/default.nix
··· 2 2 , withGUI ? false, gtk2, pkg-config, sqlite # compile GUI 3 3 }: 4 4 5 - let numVersion = "02.18"; # :( 6 - in 7 5 stdenv.mkDerivation rec { 8 - name = "lshw-${numVersion}b"; 9 - version = numVersion; 6 + pname = "lshw"; 7 + version = "B.02.18"; 10 8 11 9 src = fetchurl { 12 - url = "https://ezix.org/software/files/lshw-B.${version}.tar.gz"; 10 + url = "https://ezix.org/software/files/lshw-${version}.tar.gz"; 13 11 sha256 = "0brwra4jld0d53d7jsgca415ljglmmx1l2iazpj4ndilr48yy8mf"; 14 12 }; 15 13
+2
pkgs/top-level/all-packages.nix
··· 22389 22389 22390 22390 system76-firmware = callPackage ../os-specific/linux/firmware/system76-firmware { }; 22391 22391 22392 + ocf-resource-agents = callPackage ../os-specific/linux/ocf-resource-agents { }; 22393 + 22392 22394 open-vm-tools = callPackage ../applications/virtualization/open-vm-tools { }; 22393 22395 open-vm-tools-headless = open-vm-tools.override { withX = false; }; 22394 22396