Merge branch 'master' into staging

+1414 -459
+1 -1
COPYING
··· 1 - Copyright (c) 2003-2016 Eelco Dolstra and the Nixpkgs/NixOS contributors 1 + Copyright (c) 2003-2017 Eelco Dolstra and the Nixpkgs/NixOS contributors 2 2 3 3 Permission is hereby granted, free of charge, to any person obtaining 4 4 a copy of this software and associated documentation files (the
+3
lib/maintainers.nix
··· 201 201 ianwookim = "Ian-Woo Kim <ianwookim@gmail.com>"; 202 202 igsha = "Igor Sharonov <igor.sharonov@gmail.com>"; 203 203 ikervagyok = "Balázs Lengyel <ikervagyok@gmail.com>"; 204 + ivan-tkatchev = "Ivan Tkatchev <tkatchev@gmail.com>"; 204 205 j-keck = "Jürgen Keck <jhyphenkeck@gmail.com>"; 205 206 jagajaga = "Arseniy Seroka <ars.seroka@gmail.com>"; 206 207 javaguirre = "Javier Aguirre <contacto@javaguirre.net>"; ··· 241 242 lassulus = "Lassulus <lassulus@gmail.com>"; 242 243 layus = "Guillaume Maudoux <layus.on@gmail.com>"; 243 244 ldesgoui = "Lucas Desgouilles <ldesgoui@gmail.com>"; 245 + league = "Christopher League <league@contrapunctus.net>"; 244 246 lebastr = "Alexander Lebedev <lebastr@gmail.com>"; 245 247 leenaars = "Michiel Leenaars <ml.software@leenaa.rs>"; 246 248 leonardoce = "Leonardo Cecchi <leonardo.cecchi@gmail.com>"; ··· 315 317 mudri = "James Wood <lamudri@gmail.com>"; 316 318 muflax = "Stefan Dorn <mail@muflax.com>"; 317 319 myrl = "Myrl Hex <myrl.0xf@gmail.com>"; 320 + namore = "Roman Naumann <namor@hemio.de>"; 318 321 nand0p = "Fernando Jose Pando <nando@hex7.com>"; 319 322 Nate-Devv = "Nathan Moore <natedevv@gmail.com>"; 320 323 nathan-gs = "Nathan Bijnens <nathan@nathan.gs>";
+1 -1
nixos/lib/make-system-tarball.sh
··· 54 54 55 55 rm env-vars 56 56 57 - tar --sort=name --mtime='1970-01-01' -cvJf $out/tarball/$fileName.tar.xz * $extraArgs 57 + tar --sort=name --mtime='@1' --owner=0 --group=0 --numeric-owner -cvJf $out/tarball/$fileName.tar.xz * $extraArgs 58 58 59 59 mkdir -p $out/nix-support 60 60 echo $system > $out/nix-support/system
+2
nixos/modules/misc/ids.nix
··· 281 281 riak-cs = 263; 282 282 infinoted = 264; 283 283 keystone = 265; 284 + glance = 266; 284 285 285 286 # When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399! 286 287 ··· 532 533 riak-cs = 263; 533 534 infinoted = 264; 534 535 keystone = 265; 536 + glance = 266; 535 537 536 538 # When adding a gid, make sure it doesn't match an existing 537 539 # uid. Users and groups with the same name should have equal
+3
nixos/modules/module-list.nix
··· 71 71 ./programs/environment.nix 72 72 ./programs/fish.nix 73 73 ./programs/freetds.nix 74 + ./programs/gphoto2.nix 74 75 ./programs/info.nix 75 76 ./programs/java.nix 76 77 ./programs/kbdlight.nix ··· 392 393 ./services/networking/minidlna.nix 393 394 ./services/networking/miniupnpd.nix 394 395 ./services/networking/mosquitto.nix 396 + ./services/networking/miredo.nix 395 397 ./services/networking/mstpd.nix 396 398 ./services/networking/murmur.nix 397 399 ./services/networking/namecoind.nix ··· 632 634 ./virtualisation/xen-dom0.nix 633 635 ./virtualisation/xe-guest-utilities.nix 634 636 ./virtualisation/openstack/keystone.nix 637 + ./virtualisation/openstack/glance.nix 635 638 ]
+31
nixos/modules/programs/gphoto2.nix
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; 4 + 5 + { 6 + meta.maintainers = [ maintainers.league ]; 7 + 8 + ###### interface 9 + options = { 10 + programs.gphoto2 = { 11 + enable = mkOption { 12 + default = false; 13 + example = true; 14 + type = types.bool; 15 + description = '' 16 + Whether to configure system to use gphoto2. 17 + To grant digital camera access to a user, the user must 18 + be part of the camera group: 19 + <code>users.extraUsers.alice.extraGroups = ["camera"];</code> 20 + ''; 21 + }; 22 + }; 23 + }; 24 + 25 + ###### implementation 26 + config = mkIf config.programs.gphoto2.enable { 27 + services.udev.packages = [ pkgs.libgphoto2 ]; 28 + environment.systemPackages = [ pkgs.gphoto2 ]; 29 + users.extraGroups.camera = {}; 30 + }; 31 + }
+3
nixos/modules/rename.nix
··· 150 150 # tarsnap 151 151 (mkRemovedOptionModule [ "services" "tarsnap" "cachedir" ] "Use services.tarsnap.archives.<name>.cachedir") 152 152 153 + # alsa 154 + (mkRenamedOptionModule [ "sound" "enableMediaKeys" ] [ "sound" "mediaKeys" "enable" ]) 155 + 153 156 # Options that are obsolete and have no replacement. 154 157 (mkRemovedOptionModule [ "boot" "initrd" "luks" "enable" ] "") 155 158 (mkRemovedOptionModule [ "programs" "bash" "enable" ] "")
+28 -13
nixos/modules/services/audio/alsa.nix
··· 33 33 ''; 34 34 }; 35 35 36 - enableMediaKeys = mkOption { 37 - type = types.bool; 38 - default = false; 39 - description = '' 40 - Whether to enable volume and capture control with keyboard media keys. 41 - 42 - Enabling this will turn on <option>services.actkbd</option>. 43 - ''; 44 - }; 45 - 46 36 extraConfig = mkOption { 47 37 type = types.lines; 48 38 default = ""; ··· 54 44 ''; 55 45 }; 56 46 47 + mediaKeys = { 48 + 49 + enable = mkOption { 50 + type = types.bool; 51 + default = false; 52 + description = '' 53 + Whether to enable volume and capture control with keyboard media keys. 54 + 55 + Enabling this will turn on <option>services.actkbd</option>. 56 + ''; 57 + }; 58 + 59 + volumeStep = mkOption { 60 + type = types.string; 61 + default = "1"; 62 + example = "1%"; 63 + description = '' 64 + The value by which to increment/decrement volume on media keys. 65 + 66 + See amixer(1) for allowed values. 67 + ''; 68 + }; 69 + 70 + }; 71 + 57 72 }; 58 73 59 74 }; ··· 90 105 }; 91 106 }; 92 107 93 - services.actkbd = mkIf config.sound.enableMediaKeys { 108 + services.actkbd = mkIf config.sound.mediaKeys.enable { 94 109 enable = true; 95 110 bindings = [ 96 111 # "Mute" media key 97 112 { keys = [ 113 ]; events = [ "key" ]; command = "${alsaUtils}/bin/amixer -q set Master toggle"; } 98 113 99 114 # "Lower Volume" media key 100 - { keys = [ 114 ]; events = [ "key" "rep" ]; command = "${alsaUtils}/bin/amixer -q set Master 1- unmute"; } 115 + { keys = [ 114 ]; events = [ "key" "rep" ]; command = "${alsaUtils}/bin/amixer -q set Master ${config.sound.mediaKeys.volumeStep}- unmute"; } 101 116 102 117 # "Raise Volume" media key 103 - { keys = [ 115 ]; events = [ "key" "rep" ]; command = "${alsaUtils}/bin/amixer -q set Master 1+ unmute"; } 118 + { keys = [ 115 ]; events = [ "key" "rep" ]; command = "${alsaUtils}/bin/amixer -q set Master ${config.sound.mediaKeys.volumeStep}+ unmute"; } 104 119 105 120 # "Mic Mute" media key 106 121 { keys = [ 190 ]; events = [ "key" ]; command = "${alsaUtils}/bin/amixer -q set Capture toggle"; }
+4 -4
nixos/modules/services/audio/mpd.nix
··· 83 83 84 84 listenAddress = mkOption { 85 85 type = types.str; 86 - default = "any"; 86 + default = "127.0.0.1"; 87 + example = "any"; 87 88 description = '' 88 - This setting sets the address for the daemon to listen on. Careful attention 89 - should be paid if this is assigned to anything other then the default, any. 90 - This setting can deny access to control of the daemon. 89 + The address for the daemon to listen on. 90 + Use <literal>any</literal> to listen on all addresses. 91 91 ''; 92 92 }; 93 93
+2
nixos/modules/services/networking/dnscrypt-proxy.nix
··· 263 263 systemd.services.dnscrypt-proxy = { 264 264 description = "dnscrypt-proxy daemon"; 265 265 266 + before = [ "nss-lookup.target" ]; 267 + 266 268 after = [ "network.target" ] 267 269 ++ optional apparmorEnabled "apparmor.service" 268 270 ++ optional useUpstreamResolverList "init-dnscrypt-proxy-statedir.service";
+93
nixos/modules/services/networking/miredo.nix
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; 4 + 5 + let 6 + cfg = config.services.miredo; 7 + pidFile = "/run/miredo.pid"; 8 + miredoConf = pkgs.writeText "miredo.conf" '' 9 + InterfaceName ${cfg.interfaceName} 10 + ServerAddress ${cfg.serverAddress} 11 + ${optionalString (cfg.bindAddress != null) "BindAddress ${cfg.bindAddress}"} 12 + ${optionalString (cfg.bindPort != null) "BindPort ${cfg.bindPort}"} 13 + ''; 14 + in 15 + { 16 + 17 + ###### interface 18 + 19 + options = { 20 + 21 + services.miredo = { 22 + 23 + enable = mkEnableOption "Whether miredo should be run on startup."; 24 + 25 + package = mkOption { 26 + type = types.package; 27 + default = pkgs.miredo; 28 + defaultText = "pkgs.miredo"; 29 + description = '' 30 + The package to use for the miredo daemon's binary. 31 + ''; 32 + }; 33 + 34 + serverAddress = mkOption { 35 + default = "teredo.remlab.net"; 36 + type = types.str; 37 + description = '' 38 + The hostname or primary IPv4 address of the Teredo server. 39 + This setting is required if Miredo runs as a Teredo client. 40 + "teredo.remlab.net" is an experimental service for testing only. 41 + Please use another server for production and/or large scale deployments. 42 + ''; 43 + }; 44 + 45 + interfaceName = mkOption { 46 + default = "teredo"; 47 + type = types.str; 48 + description = '' 49 + Name of the network tunneling interface. 50 + ''; 51 + }; 52 + 53 + bindAddress = mkOption { 54 + default = null; 55 + type = types.nullOr types.str; 56 + description = '' 57 + Depending on the local firewall/NAT rules, you might need to force 58 + Miredo to use a fixed UDP port and or IPv4 address. 59 + ''; 60 + }; 61 + 62 + bindPort = mkOption { 63 + default = null; 64 + type = types.nullOr types.str; 65 + description = '' 66 + Depending on the local firewall/NAT rules, you might need to force 67 + Miredo to use a fixed UDP port and or IPv4 address. 68 + ''; 69 + }; 70 + }; 71 + }; 72 + 73 + 74 + ###### implementation 75 + 76 + config = mkIf cfg.enable { 77 + 78 + systemd.services.miredo = { 79 + wantedBy = [ "multi-user.target" ]; 80 + after = [ "network.target" ]; 81 + description = "Teredo IPv6 Tunneling Daemon"; 82 + serviceConfig = { 83 + Restart = "always"; 84 + RestartSec = "5s"; 85 + ExecStartPre = "${cfg.package}/bin/miredo-checkconf -f ${miredoConf}"; 86 + ExecStart = "${cfg.package}/bin/miredo -c ${miredoConf} -p ${pidFile} -f"; 87 + ExecReload = "/bin/kill -HUP $MAINPID"; 88 + }; 89 + }; 90 + 91 + }; 92 + 93 + }
+3 -3
nixos/modules/services/torrent/flexget.nix
··· 4 4 5 5 let 6 6 cfg = config.services.flexget; 7 - pkg = pkgs.python27Packages.flexget; 7 + pkg = pkgs.flexget; 8 8 ymlFile = pkgs.writeText "flexget.yml" '' 9 9 ${cfg.config} 10 10 ··· 54 54 55 55 config = mkIf cfg.enable { 56 56 57 - environment.systemPackages = [ pkgs.python27Packages.flexget ]; 57 + environment.systemPackages = [ pkg ]; 58 58 59 59 systemd.services = { 60 60 flexget = { 61 61 description = "FlexGet Daemon"; 62 - path = [ pkgs.pythonPackages.flexget ]; 62 + path = [ pkg ]; 63 63 serviceConfig = { 64 64 User = cfg.user; 65 65 Environment = "TZ=${config.time.timeZone}";
+1
nixos/modules/services/x11/desktop-managers/gnome3.nix
··· 123 123 services.packagekit.enable = mkDefault true; 124 124 hardware.bluetooth.enable = mkDefault true; 125 125 services.xserver.libinput.enable = mkDefault true; # for controlling touchpad settings via gnome control center 126 + services.udev.packages = [ pkgs.gnome3.gnome_settings_daemon ]; 126 127 127 128 fonts.fonts = [ pkgs.dejavu_fonts pkgs.cantarell_fonts ]; 128 129
+4
nixos/modules/virtualisation/docker.nix
··· 130 130 } 131 131 ]); 132 132 133 + imports = [ 134 + (mkRemovedOptionModule ["virtualisation" "docker" "socketActivation"] "This option was removed in favor of starting docker at boot") 135 + ]; 136 + 133 137 }
+30
nixos/modules/virtualisation/openstack/common.nix
··· 51 51 }; 52 52 };}); 53 53 }; 54 + 55 + databaseOption = name: { 56 + host = mkOption { 57 + type = types.str; 58 + default = "localhost"; 59 + description = '' 60 + Host of the database. 61 + ''; 62 + }; 63 + 64 + name = mkOption { 65 + type = types.str; 66 + default = name; 67 + description = '' 68 + Name of the existing database. 69 + ''; 70 + }; 71 + 72 + user = mkOption { 73 + type = types.str; 74 + default = name; 75 + description = '' 76 + The database user. The user must exist and has access to 77 + the specified database. 78 + ''; 79 + }; 80 + password = mkSecretOption { 81 + name = name + "MysqlPassword"; 82 + description = "The database user's password";}; 83 + }; 54 84 }
+245
nixos/modules/virtualisation/openstack/glance.nix
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; with import ./common.nix {inherit lib;}; 4 + 5 + let 6 + cfg = config.virtualisation.openstack.glance; 7 + commonConf = '' 8 + [database] 9 + connection = "mysql://${cfg.database.user}:${cfg.database.password.pattern}@${cfg.database.host}/${cfg.database.name}" 10 + notification_driver = noop 11 + 12 + [keystone_authtoken] 13 + auth_url = ${cfg.authUrl} 14 + auth_plugin = password 15 + project_name = service 16 + project_domain_id = default 17 + user_domain_id = default 18 + username = ${cfg.serviceUsername} 19 + password = ${cfg.servicePassword.pattern} 20 + 21 + [glance_store] 22 + default_store = file 23 + filesystem_store_datadir = /var/lib/glance/images/ 24 + ''; 25 + glanceApiConfTpl = pkgs.writeText "glance-api.conf" '' 26 + ${commonConf} 27 + 28 + [paste_deploy] 29 + flavor = keystone 30 + config_file = ${cfg.package}/etc/glance-api-paste.ini 31 + ''; 32 + glanceRegistryConfTpl = pkgs.writeText "glance-registry.conf" '' 33 + ${commonConf} 34 + 35 + [paste_deploy] 36 + config_file = ${cfg.package}/etc/glance-registry-paste.ini 37 + ''; 38 + glanceApiConf = "/var/lib/glance/glance-api.conf"; 39 + glanceRegistryConf = "/var/lib/glance/glance-registry.conf"; 40 + 41 + in { 42 + options.virtualisation.openstack.glance = { 43 + package = mkOption { 44 + type = types.package; 45 + default = pkgs.glance; 46 + example = literalExample "pkgs.glance"; 47 + description = '' 48 + Glance package to use. 49 + ''; 50 + }; 51 + 52 + enable = mkOption { 53 + default = false; 54 + type = types.bool; 55 + description = '' 56 + This option enables Glance as a single-machine 57 + installation. That is, all of Glance's components are 58 + enabled on this machine. This is useful for evaluating and 59 + experimenting with Glance. Note we are currently not 60 + providing any configurations for a multi-node setup. 61 + ''; 62 + }; 63 + 64 + authUrl = mkOption { 65 + type = types.str; 66 + default = http://localhost:5000; 67 + description = '' 68 + Complete public Identity (Keystone) API endpoint. Note this is 69 + unversionned. 70 + ''; 71 + }; 72 + 73 + serviceUsername = mkOption { 74 + type = types.str; 75 + default = "glance"; 76 + description = '' 77 + The Glance service username. This user is created if bootstrap 78 + is enable, otherwise it has to be manually created before 79 + starting this service. 80 + ''; 81 + }; 82 + 83 + servicePassword = mkSecretOption { 84 + name = "glanceAdminPassword"; 85 + description = '' 86 + The Glance service user's password. 87 + ''; 88 + }; 89 + 90 + database = databaseOption "glance"; 91 + 92 + bootstrap = { 93 + enable = mkOption { 94 + default = false; 95 + type = types.bool; 96 + description = '' 97 + Bootstrap the Glance service by creating the service tenant, 98 + an admin account and a public endpoint. This option provides 99 + a ready-to-use glance service. This is only done at the 100 + first Glance execution by the systemd post start section. 101 + The keystone admin account is used to create required 102 + Keystone resource for the Glance service. 103 + 104 + <note><para> This option is a helper for setting up 105 + development or testing environments.</para></note> 106 + ''; 107 + }; 108 + 109 + endpointPublic = mkOption { 110 + type = types.str; 111 + default = "http://localhost:9292"; 112 + description = '' 113 + The public image endpoint. The link <link 114 + xlink:href="http://docs.openstack.org/liberty/install-guide-rdo/keystone-services.html"> 115 + create endpoint</link> provides more informations 116 + about that. 117 + ''; 118 + }; 119 + 120 + keystoneAdminUsername = mkOption { 121 + type = types.str; 122 + default = "admin"; 123 + description = '' 124 + The keystone admin user name used to create the Glance account. 125 + ''; 126 + }; 127 + 128 + keystoneAdminPassword = mkSecretOption { 129 + name = "keystoneAdminPassword"; 130 + description = '' 131 + The keystone admin user's password. 132 + ''; 133 + }; 134 + 135 + keystoneAdminTenant = mkOption { 136 + type = types.str; 137 + default = "admin"; 138 + description = '' 139 + The keystone admin tenant used to create the Glance account. 140 + ''; 141 + }; 142 + keystoneAuthUrl = mkOption { 143 + type = types.str; 144 + default = "http://localhost:5000/v2.0"; 145 + description = '' 146 + The keystone auth url used to create the Glance account. 147 + ''; 148 + }; 149 + }; 150 + }; 151 + 152 + config = mkIf cfg.enable { 153 + users.extraUsers = [{ 154 + name = "glance"; 155 + group = "glance"; 156 + uid = config.ids.gids.glance; 157 + 158 + }]; 159 + users.extraGroups = [{ 160 + name = "glance"; 161 + gid = config.ids.gids.glance; 162 + }]; 163 + 164 + systemd.services.glance-registry = { 165 + description = "OpenStack Glance Registry Daemon"; 166 + after = [ "network.target"]; 167 + path = [ pkgs.curl pkgs.pythonPackages.keystoneclient pkgs.gawk ]; 168 + wantedBy = [ "multi-user.target" ]; 169 + preStart = '' 170 + mkdir -m 775 -p /var/lib/glance/{images,scrubber,image_cache} 171 + chown glance:glance /var/lib/glance/{images,scrubber,image_cache} 172 + 173 + # Secret file managment 174 + cp ${glanceRegistryConfTpl} ${glanceRegistryConf}; 175 + chown glance:glance ${glanceRegistryConf}; 176 + chmod 640 ${glanceRegistryConf} 177 + ${replaceSecret cfg.database.password glanceRegistryConf} 178 + ${replaceSecret cfg.servicePassword glanceRegistryConf} 179 + 180 + cp ${glanceApiConfTpl} ${glanceApiConf}; 181 + chown glance:glance ${glanceApiConf}; 182 + chmod 640 ${glanceApiConf} 183 + ${replaceSecret cfg.database.password glanceApiConf} 184 + ${replaceSecret cfg.servicePassword glanceApiConf} 185 + 186 + # Initialise the database 187 + ${cfg.package}/bin/glance-manage --config-file=${glanceApiConf} --config-file=${glanceRegistryConf} db_sync 188 + ''; 189 + postStart = '' 190 + set -eu 191 + export OS_AUTH_URL=${cfg.bootstrap.keystoneAuthUrl} 192 + export OS_USERNAME=${cfg.bootstrap.keystoneAdminUsername} 193 + export OS_PASSWORD=${getSecret cfg.bootstrap.keystoneAdminPassword} 194 + export OS_TENANT_NAME=${cfg.bootstrap.keystoneAdminTenant} 195 + 196 + # Wait until the keystone is available for use 197 + count=0 198 + while ! keystone user-get ${cfg.bootstrap.keystoneAdminUsername} > /dev/null 199 + do 200 + if [ $count -eq 30 ] 201 + then 202 + echo "Tried 30 times, giving up..." 203 + exit 1 204 + fi 205 + 206 + echo "Keystone not yet started. Waiting for 1 second..." 207 + count=$((count++)) 208 + sleep 1 209 + done 210 + 211 + # If the service glance doesn't exist, we consider glance is 212 + # not initialized 213 + if ! keystone service-get glance 214 + then 215 + keystone service-create --type image --name glance 216 + ID=$(keystone service-get glance | awk '/ id / { print $4 }') 217 + keystone endpoint-create --region RegionOne --service $ID --internalurl http://localhost:9292 --adminurl http://localhost:9292 --publicurl ${cfg.bootstrap.endpointPublic} 218 + 219 + keystone user-create --name ${cfg.serviceUsername} --tenant service --pass ${getSecret cfg.servicePassword} 220 + keystone user-role-add --tenant service --user ${cfg.serviceUsername} --role admin 221 + fi 222 + ''; 223 + serviceConfig = { 224 + PermissionsStartOnly = true; # preStart must be run as root 225 + TimeoutStartSec = "600"; # 10min for initial db migrations 226 + User = "glance"; 227 + Group = "glance"; 228 + ExecStart = "${cfg.package}/bin/glance-registry --config-file=${glanceRegistryConf}"; 229 + }; 230 + }; 231 + systemd.services.glance-api = { 232 + description = "OpenStack Glance API Daemon"; 233 + after = [ "glance-registry.service" "network.target"]; 234 + requires = [ "glance-registry.service" "network.target"]; 235 + wantedBy = [ "multi-user.target" ]; 236 + serviceConfig = { 237 + PermissionsStartOnly = true; # preStart must be run as root 238 + User = "glance"; 239 + Group = "glance"; 240 + ExecStart = "${cfg.package}/bin/glance-api --config-file=${glanceApiConf}"; 241 + }; 242 + }; 243 + }; 244 + 245 + }
+1
nixos/release.nix
··· 242 242 tests.firewall = callTest tests/firewall.nix {}; 243 243 tests.fleet = hydraJob (import tests/fleet.nix { system = "x86_64-linux"; }); 244 244 #tests.gitlab = callTest tests/gitlab.nix {}; 245 + tests.glance = callTest tests/glance.nix {}; 245 246 tests.gocd-agent = callTest tests/gocd-agent.nix {}; 246 247 tests.gocd-server = callTest tests/gocd-server.nix {}; 247 248 tests.gnome3 = callTest tests/gnome3.nix {};
+77
nixos/tests/glance.nix
··· 1 + { system ? builtins.currentSystem }: 2 + 3 + with import ../lib/testing.nix { inherit system; }; 4 + with pkgs.lib; 5 + 6 + let 7 + glanceMysqlPassword = "glanceMysqlPassword"; 8 + glanceAdminPassword = "glanceAdminPassword"; 9 + 10 + createDb = pkgs.writeText "db-provisionning.sql" '' 11 + create database keystone; 12 + GRANT ALL PRIVILEGES ON keystone.* TO 'keystone'@'localhost' IDENTIFIED BY 'keystone'; 13 + GRANT ALL PRIVILEGES ON keystone.* TO 'keystone'@'%' IDENTIFIED BY 'keystone'; 14 + 15 + create database glance; 16 + GRANT ALL PRIVILEGES ON glance.* TO 'glance'@'localhost' IDENTIFIED BY '${glanceMysqlPassword}'; 17 + GRANT ALL PRIVILEGES ON glance.* TO 'glance'@'%' IDENTIFIED BY '${glanceMysqlPassword}'; 18 + ''; 19 + 20 + image = 21 + (import ../lib/eval-config.nix { 22 + inherit system; 23 + modules = [ ../../nixos/modules/virtualisation/nova-image.nix ]; 24 + }).config.system.build.novaImage; 25 + 26 + # The admin keystone account 27 + adminOpenstackCmd = "OS_TENANT_NAME=admin OS_USERNAME=admin OS_PASSWORD=keystone OS_AUTH_URL=http://localhost:5000/v3 OS_IDENTITY_API_VERSION=3 openstack"; 28 + 29 + in makeTest { 30 + meta = with pkgs.stdenv.lib.maintainers; { 31 + maintainers = [ lewo ]; 32 + }; 33 + machine = 34 + { config, pkgs, ... }: 35 + { 36 + services.mysql.enable = true; 37 + services.mysql.package = pkgs.mysql; 38 + services.mysql.initialScript = createDb; 39 + 40 + virtualisation = { 41 + openstack.keystone = { 42 + enable = true; 43 + database.password = { value = "keystone"; storage = "fromNixStore"; }; 44 + adminToken = { value = "adminToken"; storage = "fromNixStore"; }; 45 + bootstrap.enable = true; 46 + bootstrap.adminPassword = { value = "keystone"; storage = "fromNixStore"; }; 47 + }; 48 + 49 + openstack.glance = { 50 + enable = true; 51 + database.password = { value = glanceMysqlPassword; storage = "fromNixStore"; }; 52 + servicePassword = { value = glanceAdminPassword; storage = "fromNixStore"; }; 53 + 54 + bootstrap = { 55 + enable = true; 56 + keystoneAdminPassword = { value = "keystone"; storage = "fromNixStore"; }; 57 + }; 58 + }; 59 + 60 + memorySize = 2096; 61 + diskSize = 4 * 1024; 62 + }; 63 + 64 + environment.systemPackages = with pkgs.pythonPackages; with pkgs; [ 65 + openstackclient 66 + ]; 67 + }; 68 + 69 + testScript = 70 + '' 71 + $machine->waitForUnit("glance-api.service"); 72 + 73 + # Since Glance api can take time to start, we retry until success 74 + $machine->waitUntilSucceeds("${adminOpenstackCmd} image create nixos --file ${image}/nixos.img --disk-format qcow2 --container-format bare --public"); 75 + $machine->succeed("${adminOpenstackCmd} image list") =~ /nixos/ or die; 76 + ''; 77 + }
+5 -4
pkgs/applications/editors/kakoune/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 name = "kakoune-nightly-${version}"; 7 - version = "2016-12-10"; 7 + version = "2016-12-30"; 8 8 src = fetchFromGitHub { 9 9 repo = "kakoune"; 10 10 owner = "mawww"; 11 - rev = "e44129577a010ebb4dc609b806104d3175659074"; 12 - sha256 = "1jkpbk6wa9x5nlv002y1whv6ddhqawxzbp3jcbzcb51cg8bz0b1l"; 11 + rev = "76c58aa022a896dc170c207ff821992ee354d934"; 12 + sha256 = "0hgpcp6444cyg4bm0a9ypywjwfh19qpqpfr5w0wcd2y3clnsvsdz"; 13 13 }; 14 14 buildInputs = [ ncurses boost asciidoc docbook_xsl libxslt ]; 15 15 16 16 buildPhase = '' 17 17 sed -ie 's#--no-xmllint#--no-xmllint --xsltproc-opts="--nonet"#g' src/Makefile 18 + substituteInPlace src/Makefile --replace "boost_regex-mt" "boost_regex" 18 19 export PREFIX=$out 19 20 (cd src && make ) 20 21 ''; ··· 28 29 description = "A vim inspired text editor"; 29 30 license = licenses.publicDomain; 30 31 maintainers = with maintainers; [ vrthra ]; 31 - platforms = platforms.linux; 32 + platforms = platforms.unix; 32 33 }; 33 34 }
+2 -2
pkgs/applications/editors/nano/default.nix
··· 12 12 13 13 stdenv.mkDerivation rec { 14 14 name = "nano-${version}"; 15 - version = "2.7.2"; 15 + version = "2.7.3"; 16 16 src = fetchurl { 17 17 url = "mirror://gnu/nano/${name}.tar.xz"; 18 - sha256 = "1hlhwgvzdgkc7k74fbbn49hn6vmvzqr7h8gclgl7r1c6qrrny0bp"; 18 + sha256 = "1z0bfyc5cvv83l3bjmlcwl49mpxrp65k5ffsfpnayfyjc18fy9nr"; 19 19 }; 20 20 nativeBuildInputs = [ texinfo ] ++ optional enableNls gettext; 21 21 buildInputs = [ ncurses ];
+1
pkgs/applications/gis/grass/default.nix
··· 60 60 wrapProgram $out/bin/grass70 \ 61 61 --set PYTHONPATH $PYTHONPATH \ 62 62 --set GRASS_PYTHON ${python2Packages.python}/bin/${python2Packages.python.executable} 63 + --suffix LD_LIBRARY_PATH ':' '${gdal}/lib' 63 64 ln -s $out/grass-*/lib $out/lib 64 65 ''; 65 66
+12 -2
pkgs/applications/graphics/darktable/default.nix
··· 11 11 assert stdenv ? glibc; 12 12 13 13 stdenv.mkDerivation rec { 14 - version = "2.0.7"; 14 + version = "2.2.0"; 15 15 name = "darktable-${version}"; 16 16 17 17 src = fetchurl { 18 18 url = "https://github.com/darktable-org/darktable/releases/download/release-${version}/darktable-${version}.tar.xz"; 19 - sha256 = "1aqxiaw89xdx0s0h3gb9nvdzw4690y3kp7h794sihf2581bn28m9"; 19 + sha256 = "3eca193831faae58200bb1cb6ef29e658bce43a81706b54420953a7c33d79377"; 20 20 }; 21 21 22 22 buildInputs = ··· 34 34 "-DBUILD_USERMANUAL=False" 35 35 ]; 36 36 37 + # darktable changed its rpath handling in commit 38 + # 83c70b876af6484506901e6b381304ae0d073d3c and as a result the 39 + # binaries can't find libdarktable.so, so change LD_LIBRARY_PATH in 40 + # the wrappers: 41 + preFixup = '' 42 + gappsWrapperArgs+=( 43 + --prefix LD_LIBRARY_PATH ":" "$out/lib/darktable" 44 + ) 45 + ''; 46 + 37 47 meta = with stdenv.lib; { 38 48 description = "Virtual lighttable and darkroom for photographers"; 39 49 homepage = https://www.darktable.org;
+3 -3
pkgs/applications/misc/calibre/default.nix
··· 5 5 }: 6 6 7 7 stdenv.mkDerivation rec { 8 - version = "2.73.0"; 8 + version = "2.76.0"; 9 9 name = "calibre-${version}"; 10 10 11 11 src = fetchurl { 12 12 url = "https://download.calibre-ebook.com/${version}/${name}.tar.xz"; 13 - sha256 = "17qs7dakzd25wbshsny2x82ppdqa6kwwfbp2vp1i8qmfc1nq61gc"; 13 + sha256 = "1xfm586n6gm44mkyn25mbiyhj6w9ji9yl6fvmnr4zk1q6qcga3v8"; 14 14 }; 15 15 16 16 patches = [ ··· 56 56 apsw beautifulsoup cssselect cssutils dateutil lxml mechanize netifaces pillow 57 57 python pyqt5 sip 58 58 # the following are distributed with calibre, but we use upstream instead 59 - chardet cherrypy html5lib odfpy routes 59 + chardet cherrypy html5lib_0_9999999 odfpy routes 60 60 ]); 61 61 62 62 installPhase = ''
+1
pkgs/applications/misc/font-manager/default.nix
··· 35 35 gnome3.gucharmap 36 36 gnome3.libgee 37 37 gnome3.file-roller 38 + gnome3.defaultIconTheme 38 39 ]; 39 40 40 41 enableParallelBuilding = true;
+5 -5
pkgs/applications/misc/rofi/default.nix
··· 1 - { stdenv, fetchurl, autoreconfHook, pkgconfig, libxkbcommon, pango 1 + { stdenv, fetchurl, autoreconfHook, pkgconfig, libxkbcommon, pango, which, git 2 2 , cairo, glib, libxcb, xcbutil, xcbutilwm, xcbutilxrm, libstartup_notification 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { 6 - version = "1.2.0"; 6 + version = "1.3.0"; 7 7 name = "rofi-${version}"; 8 8 9 9 src = fetchurl { 10 10 url = "https://github.com/DaveDavenport/rofi/releases/download/${version}/${name}.tar.xz"; 11 - sha256 = "0xxx0xpxhrhlhi2axq9867zqrhwqavc1qrr833k1xr0pvm5m0aqc"; 11 + sha256 = "1a65ai93ygras5bi7wc0s5i3zqslzqlnw3klq3sdnp2p0d6hjjqn"; 12 12 }; 13 13 14 14 preConfigure = '' ··· 17 17 sed -i 's/~root/~nobody/g' test/helper-expand.c 18 18 ''; 19 19 20 - buildInputs = [ autoreconfHook pkgconfig libxkbcommon pango cairo 21 - libstartup_notification libxcb xcbutil xcbutilwm xcbutilxrm 20 + buildInputs = [ autoreconfHook pkgconfig libxkbcommon pango cairo git 21 + libstartup_notification libxcb xcbutil xcbutilwm xcbutilxrm which 22 22 ]; 23 23 doCheck = true; 24 24
+3 -3
pkgs/applications/networking/dropbox/default.nix
··· 23 23 let 24 24 # NOTE: When updating, please also update in current stable, 25 25 # as older versions stop working 26 - version = "16.4.29"; 26 + version = "16.4.30"; 27 27 sha256 = 28 28 { 29 - "x86_64-linux" = "0zng19qisbr3c9d312ar43p1b44xidabj4x2l3g3q85i300vj661"; 30 - "i686-linux" = "0hc5fs0akc437valbxwlymk7ncjkdnhc51pja5bbiy48gqmd42bb"; 29 + "x86_64-linux" = "0inwc12d14i6gyfllxbhizb434a7vy0l5nvc07kz0bca7c4665wb"; 30 + "i686-linux" = "0pdn8558ll317k3jrrjir90pn6abwbm99y9wzdq39wxj4dmrlh6w"; 31 31 }."${stdenv.system}" or (throw "system ${stdenv.system} not supported"); 32 32 33 33 arch =
+1
pkgs/applications/networking/dyndns/cfdyndns/default.nix
··· 27 27 license = stdenv.lib.licenses.mit; 28 28 maintainers = with maintainers; [ colemickens ]; 29 29 platforms = with platforms; linux; 30 + broken = true; 30 31 }; 31 32 }
+39
pkgs/applications/networking/flexget/default.nix
··· 1 + { lib 2 + , pythonPackages 3 + , fetchurl 4 + , transmission 5 + , deluge 6 + , config 7 + }: 8 + 9 + with pythonPackages; 10 + 11 + buildPythonPackage rec { 12 + version = "1.2.337"; 13 + name = "FlexGet-${version}"; 14 + disabled = isPy3k; 15 + 16 + src = fetchurl { 17 + url = "mirror://pypi/F/FlexGet/${name}.tar.gz"; 18 + sha256 = "0f7aaf0bf37860f0c5adfb0ba59ca228aa3f5c582131445623a4c3bc82d45346"; 19 + }; 20 + 21 + doCheck = false; 22 + 23 + buildInputs = [ nose ]; 24 + propagatedBuildInputs = [ 25 + paver feedparser sqlalchemy pyyaml rpyc 26 + beautifulsoup_4_1_3 html5lib_0_9999999 pyrss2gen pynzb progressbar jinja2 flask 27 + cherrypy requests dateutil_2_1 jsonschema python_tvrage tmdb3 28 + guessit pathpy apscheduler ] 29 + # enable deluge and transmission plugin support, if they're installed 30 + ++ lib.optional (config.deluge or false) deluge 31 + ++ lib.optional (transmission != null) transmissionrpc; 32 + 33 + meta = { 34 + homepage = http://flexget.com/; 35 + description = "Multipurpose automation tool for content like torrents"; 36 + license = lib.licenses.mit; 37 + maintainers = with lib.maintainers; [ domenkozar ]; 38 + }; 39 + }
+36
pkgs/applications/networking/mailreaders/astroid/default.nix
··· 1 + { stdenv, fetchFromGitHub, scons, pkgconfig, gnome3, gmime, webkitgtk24x 2 + , libsass, notmuch, boost, makeWrapper }: 3 + 4 + stdenv.mkDerivation rec { 5 + name = "astroid-${version}"; 6 + version = "0.6"; 7 + 8 + src = fetchFromGitHub { 9 + owner = "astroidmail"; 10 + repo = "astroid"; 11 + rev = "v${version}"; 12 + sha256 = "0zashjmqv8ips9q8ckyhgm9hfyf01wpgs6g21cwl05q5iklc5x7r"; 13 + }; 14 + 15 + patches = [ ./propagate-environment.patch ]; 16 + 17 + buildInputs = [ scons pkgconfig gnome3.gtkmm gmime webkitgtk24x libsass 18 + gnome3.libpeas notmuch boost gnome3.gsettings_desktop_schemas 19 + makeWrapper ]; 20 + 21 + buildPhase = "scons --prefix=$out build"; 22 + installPhase = "scons --prefix=$out install"; 23 + 24 + preFixup = '' 25 + wrapProgram "$out/bin/astroid" \ 26 + --prefix XDG_DATA_DIRS : "$GSETTINGS_SCHEMAS_PATH" 27 + ''; 28 + 29 + meta = { 30 + homepage = "https://astroidmail.github.io/"; 31 + description = "GTK+ frontend to the notmuch mail system"; 32 + maintainers = [ stdenv.lib.maintainers.bdimcheff ]; 33 + license = stdenv.lib.licenses.gpl3Plus; 34 + platforms = stdenv.lib.platforms.linux; 35 + }; 36 + }
+13
pkgs/applications/networking/mailreaders/astroid/propagate-environment.patch
··· 1 + diff --git a/SConstruct b/SConstruct 2 + index a80bca3..ed2cd6d 100644 3 + --- a/SConstruct 4 + +++ b/SConstruct 5 + @@ -5,7 +5,7 @@ from subprocess import * 6 + def getGitDesc(): 7 + return Popen('git describe --abbrev=8 --tags --always', stdout=PIPE, shell=True).stdout.read ().strip () 8 + 9 + -env = Environment () 10 + +env = Environment(ENV = os.environ) 11 + 12 + AddOption ("--release", action="store", dest="release", default="git", help="Make a release (default: git describe output)") 13 + AddOption ("--enable-debug", action="store", dest="debug", default=None, help="Enable the -g flag for debugging (default: true when release is git)")
+5 -4
pkgs/applications/networking/mailreaders/neomutt/default.nix
··· 1 1 { stdenv, fetchFromGitHub, which, autoconf, automake, ncurses, perl 2 - , cyrus_sasl, gdbm, gpgme, kerberos, libidn, notmuch, openssl }: 2 + , cyrus_sasl, gdbm, gpgme, kerberos, libidn, notmuch, openssl, lmdb }: 3 3 4 4 stdenv.mkDerivation rec { 5 - version = "20161104"; 5 + version = "20161126"; 6 6 name = "neomutt-${version}"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "neomutt"; 10 10 repo = "neomutt"; 11 11 rev = "neomutt-${version}"; 12 - sha256 = "070p18khvxsrcn30jhyrnagka5mgza9mi5vmrrr6xl8mpgkyrlaw"; 12 + sha256 = "10ycfya11pvwv0rdyyak56r6f8ia8yf0h8qyi904bbpvm8lqvqfd"; 13 13 }; 14 14 15 15 buildInputs = 16 16 [ autoconf automake cyrus_sasl gdbm gpgme kerberos libidn ncurses 17 - notmuch which openssl perl ]; 17 + notmuch which openssl perl lmdb ]; 18 18 19 19 configureFlags = [ 20 20 "--enable-debug" ··· 36 36 "--with-curses" 37 37 "--with-regex" 38 38 "--with-idn" 39 + "--with-lmdb" 39 40 40 41 # Look in $PATH at runtime, instead of hardcoding /usr/bin/sendmail 41 42 "ac_cv_path_SENDMAIL=sendmail"
+2
pkgs/applications/office/ppl-address-book/Gemfile
··· 1 + source 'https://rubygems.org' 2 + gem 'ppl'
+34
pkgs/applications/office/ppl-address-book/Gemfile.lock
··· 1 + GEM 2 + remote: https://rubygems.org/ 3 + specs: 4 + colored (1.2) 5 + greencard (0.0.5) 6 + i18n (0.7.0) 7 + inifile (2.0.2) 8 + mail (2.5.3) 9 + i18n (>= 0.4.0) 10 + mime-types (~> 1.16) 11 + treetop (~> 1.4.8) 12 + mime-types (1.25.1) 13 + morphine (0.1.1) 14 + polyglot (0.3.5) 15 + ppl (2.4.0) 16 + colored (= 1.2) 17 + greencard (= 0.0.5) 18 + inifile (= 2.0.2) 19 + mail (= 2.5.3) 20 + morphine (= 0.1.1) 21 + rugged (= 0.17.0.b6) 22 + rugged (0.17.0.b6) 23 + treetop (1.4.15) 24 + polyglot 25 + polyglot (>= 0.3.1) 26 + 27 + PLATFORMS 28 + ruby 29 + 30 + DEPENDENCIES 31 + ppl 32 + 33 + BUNDLED WITH 34 + 1.12.5
+38
pkgs/applications/office/ppl-address-book/default.nix
··· 1 + { stdenv, lib, bundlerEnv, ruby, makeWrapper, which }: 2 + 3 + let 4 + pname = "ppl-address-book"; 5 + 6 + version = (import ./gemset.nix).ppl.version; 7 + 8 + env = bundlerEnv rec { 9 + name = "${pname}-env-${version}"; 10 + inherit ruby; 11 + gemfile = ./Gemfile; 12 + lockfile = ./Gemfile.lock; 13 + gemset = ./gemset.nix; 14 + 15 + gemConfig.rugged = attrs: { buildInputs = [ which ]; }; 16 + }; 17 + 18 + in stdenv.mkDerivation { 19 + name = "${pname}-${version}"; 20 + 21 + phases = [ "installPhase" ]; 22 + 23 + buildInputs = [ env makeWrapper ]; 24 + 25 + installPhase = '' 26 + mkdir -p $out/bin 27 + makeWrapper ${env}/bin/ppl $out/bin/ppl 28 + ''; 29 + 30 + meta = with lib; { 31 + description = "Address book software for command-line users"; 32 + homepage = http://ppladdressbook.org/; 33 + license = with licenses; mit; 34 + maintainers = with maintainers; [ chris-martin ]; 35 + platforms = platforms.unix; 36 + }; 37 + 38 + }
+90
pkgs/applications/office/ppl-address-book/gemset.nix
··· 1 + { 2 + colored = { 3 + source = { 4 + remotes = ["https://rubygems.org"]; 5 + sha256 = "0b0x5jmsyi0z69bm6sij1k89z7h0laag3cb4mdn7zkl9qmxb90lx"; 6 + type = "gem"; 7 + }; 8 + version = "1.2"; 9 + }; 10 + greencard = { 11 + source = { 12 + remotes = ["https://rubygems.org"]; 13 + sha256 = "11pxrl1w8c7m7rmnnmdaplrv53qgylyvkv8bzsfyjna7k16hynvq"; 14 + type = "gem"; 15 + }; 16 + version = "0.0.5"; 17 + }; 18 + i18n = { 19 + source = { 20 + remotes = ["https://rubygems.org"]; 21 + sha256 = "1i5z1ykl8zhszsxcs8mzl8d0dxgs3ylz8qlzrw74jb0gplkx6758"; 22 + type = "gem"; 23 + }; 24 + version = "0.7.0"; 25 + }; 26 + inifile = { 27 + source = { 28 + remotes = ["https://rubygems.org"]; 29 + sha256 = "03rpacxnrnisjhd2zhc7629ica958bkdbakicl5kipw1wbprck25"; 30 + type = "gem"; 31 + }; 32 + version = "2.0.2"; 33 + }; 34 + mail = { 35 + source = { 36 + remotes = ["https://rubygems.org"]; 37 + sha256 = "1afr3acz7vsvr4gp6wnrkw1iwbjhf14mh8g8mlm40r86wcwzr39k"; 38 + type = "gem"; 39 + }; 40 + version = "2.5.3"; 41 + }; 42 + mime-types = { 43 + source = { 44 + remotes = ["https://rubygems.org"]; 45 + sha256 = "0mhzsanmnzdshaba7gmsjwnv168r1yj8y0flzw88frw1cickrvw8"; 46 + type = "gem"; 47 + }; 48 + version = "1.25.1"; 49 + }; 50 + morphine = { 51 + source = { 52 + remotes = ["https://rubygems.org"]; 53 + sha256 = "05aw93cijd1gq39ikw2dw3i2c79bjq05kvxrs81mqxqdlini5wwa"; 54 + type = "gem"; 55 + }; 56 + version = "0.1.1"; 57 + }; 58 + polyglot = { 59 + source = { 60 + remotes = ["https://rubygems.org"]; 61 + sha256 = "1bqnxwyip623d8pr29rg6m8r0hdg08fpr2yb74f46rn1wgsnxmjr"; 62 + type = "gem"; 63 + }; 64 + version = "0.3.5"; 65 + }; 66 + ppl = { 67 + source = { 68 + remotes = ["https://rubygems.org"]; 69 + sha256 = "0vpp4s12ggbk5kpl9z1i7vi9vvghgxrc8my35yk8knckg5waxg47"; 70 + type = "gem"; 71 + }; 72 + version = "2.4.0"; 73 + }; 74 + rugged = { 75 + source = { 76 + remotes = ["https://rubygems.org"]; 77 + sha256 = "025rj3rkj5yxf4pjj1s8x4yzshlyni3hgrjwhggg54nvw6b688qi"; 78 + type = "gem"; 79 + }; 80 + version = "0.17.0.b6"; 81 + }; 82 + treetop = { 83 + source = { 84 + remotes = ["https://rubygems.org"]; 85 + sha256 = "1zqj5y0mvfvyz11nhsb4d5ch0i0rfcyj64qx19mw4qhg3hh8z9pz"; 86 + type = "gem"; 87 + }; 88 + version = "1.4.15"; 89 + }; 90 + }
+3 -3
pkgs/applications/science/logic/lean/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "lean-${version}"; 5 - version = "2016-12-08"; 5 + version = "2016-12-30"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "leanprover"; 9 9 repo = "lean"; 10 - rev = "7b63d6566faaf1dc0f2c8e873c61f51dce9ab618"; 11 - sha256 = "0xxr7dnh7pmdbpxhl3cq9clwamxjk54zcxplsrz6xirk0qy7ga4l"; 10 + rev = "fd4fffea27c442b12a45f664a8680ebb47482ca3"; 11 + sha256 = "1izbjxbr1nvv5kv2b7qklqjx2b1qmwrxhmvk0f2lrl9pxz9h0bmd"; 12 12 }; 13 13 14 14 buildInputs = [ gmp mpfr cmake gperftools ];
+2 -2
pkgs/applications/science/misc/fityk/default.nix
··· 3 3 4 4 let 5 5 name = "fityk"; 6 - version = "1.3.0"; 6 + version = "1.3.1"; 7 7 in 8 8 stdenv.mkDerivation { 9 9 name = "${name}-${version}"; ··· 12 12 owner = "wojdyr"; 13 13 repo = "fityk"; 14 14 rev = "v${version}"; 15 - sha256 = "07xzhy47q5ddg1qn51qds4wp6r5g2cx8bla0hm0a9ipr2hg92lm9"; 15 + sha256 = "0kmrjjjwrh6xgw590awcd52b86kksmv6rfgih75zvpiavr1ygwsi"; 16 16 }; 17 17 18 18 buildInputs = [ autoreconfHook wxGTK30 boost lua zlib bzip2 xylib readline
+23
pkgs/applications/science/physics/sherpa/default.nix
··· 1 + { stdenv, fetchurl, gfortran, sqlite }: 2 + 3 + stdenv.mkDerivation rec { 4 + name = "sherpa-${version}"; 5 + version = "2.2.1"; 6 + 7 + src = fetchurl { 8 + url = "http://www.hepforge.org/archive/sherpa/SHERPA-MC-${version}.tar.gz"; 9 + sha256 = "13vkz6w8kqyv8sgy3mxnlps5ykml5rnlj50vjj0pp9rgbl5y8ali"; 10 + }; 11 + 12 + buildInputs = [ gfortran sqlite ]; 13 + 14 + enableParallelBuilding = true; 15 + 16 + meta = { 17 + description = "Simulation of High-Energy Reactions of PArticles in lepton-lepton, lepton-photon, photon-photon, lepton-hadron and hadron-hadron collisions"; 18 + license = stdenv.lib.licenses.gpl2; 19 + homepage = https://sherpa.hepforge.org; 20 + platforms = stdenv.lib.platforms.unix; 21 + maintainers = with stdenv.lib.maintainers; [ veprbl ]; 22 + }; 23 + }
-23
pkgs/applications/version-management/cvsps/01_ignoretrunk.dpatch
··· 1 - #! /bin/sh /usr/share/dpatch/dpatch-run 2 - ## 01_ignoretrunk.dpatch by <crafterm@debian.org> 3 - ## 4 - ## All lines beginning with `## DP:' are a description of the patch. 5 - ## DP: Ignore TRUNK branch name patch 6 - 7 - @DPATCH@ 8 - 9 - diff -urN cvsps-2.1.orig/cvsps.c cvsps-2.1/cvsps.c 10 - --- cvsps-2.1.orig/cvsps.c 2005-05-25 22:39:40.000000000 -0500 11 - +++ cvsps-2.1/cvsps.c 2005-06-19 23:07:20.000000000 -0500 12 - @@ -2104,6 +2109,11 @@ 13 - 14 - if (!get_branch_ext(rev, eot, &leaf)) 15 - { 16 - + if (strcmp(tag, "TRUNK") == 0) 17 - + { 18 - + debug(DEBUG_STATUS, "ignoring the TRUNK branch/tag"); 19 - + return; 20 - + } 21 - debug(DEBUG_APPERROR, "malformed revision"); 22 - exit(1); 23 - }
-125
pkgs/applications/version-management/cvsps/02_dynamicbufferalloc.dpatch
··· 1 - #! /bin/sh /usr/share/dpatch/dpatch-run 2 - ## 02_dynamicbufferalloc.dpatch by <crafterm@debian.org> 3 - ## 4 - ## All lines beginning with `## DP:' are a description of the patch. 5 - ## DP: Dynamic buffer allocation 6 - 7 - @DPATCH@ 8 - 9 - diff -urN cvsps-2.1-orig/cache.c cvsps-2.1/cache.c 10 - --- cvsps-2.1-orig/cache.c 2005-05-25 22:39:40.000000000 -0500 11 - +++ cvsps-2.1/cache.c 2005-07-26 15:21:29.716569500 -0500 12 - @@ -108,10 +108,19 @@ 13 - int tag_flags = 0; 14 - char branchbuff[LOG_STR_MAX] = ""; 15 - int branch_add = 0; 16 - - char logbuff[LOG_STR_MAX] = ""; 17 - + int logbufflen = LOG_STR_MAX + 1; 18 - + char * logbuff = malloc(logbufflen); 19 - time_t cache_date = -1; 20 - int read_version; 21 - 22 - + if (logbuff == NULL) 23 - + { 24 - + debug(DEBUG_SYSERROR, "could not malloc %d bytes for logbuff in read_cache", logbufflen); 25 - + exit(1); 26 - + } 27 - + 28 - + logbuff[0] = 0; 29 - + 30 - if (!(fp = cache_open("r"))) 31 - goto out; 32 - 33 - @@ -299,8 +308,19 @@ 34 - else 35 - { 36 - /* Make sure we have enough in the buffer */ 37 - - if (strlen(logbuff)+strlen(buff)<LOG_STR_MAX) 38 - - strcat(logbuff, buff); 39 - + int len = strlen(buff); 40 - + if (strlen(logbuff) + len >= LOG_STR_MAX) 41 - + { 42 - + logbufflen += (len >= LOG_STR_MAX ? (len+1) : LOG_STR_MAX); 43 - + char * newlogbuff = realloc(logbuff, logbufflen); 44 - + if (newlogbuff == NULL) 45 - + { 46 - + debug(DEBUG_SYSERROR, "could not realloc %d bytes for logbuff in read_cache", logbufflen); 47 - + exit(1); 48 - + } 49 - + logbuff = newlogbuff; 50 - + } 51 - + strcat(logbuff, buff); 52 - } 53 - break; 54 - case CACHE_NEED_PS_MEMBERS: 55 - @@ -332,6 +352,7 @@ 56 - out_close: 57 - fclose(fp); 58 - out: 59 - + free(logbuff); 60 - return cache_date; 61 - } 62 - 63 - diff -urN cvsps-2.1-orig/cvsps.c cvsps-2.1/cvsps.c 64 - --- cvsps-2.1-orig/cvsps.c 2005-05-25 22:39:40.000000000 -0500 65 - +++ cvsps-2.1/cvsps.c 2005-07-26 15:22:02.558230700 -0500 66 - @@ -265,7 +265,8 @@ 67 - PatchSetMember * psm = NULL; 68 - char datebuff[20]; 69 - char authbuff[AUTH_STR_MAX]; 70 - - char logbuff[LOG_STR_MAX + 1]; 71 - + int logbufflen = LOG_STR_MAX + 1; 72 - + char * logbuff = malloc(logbufflen); 73 - int loglen = 0; 74 - int have_log = 0; 75 - char cmd[BUFSIZ]; 76 - @@ -273,6 +274,12 @@ 77 - char use_rep_buff[PATH_MAX]; 78 - char * ltype; 79 - 80 - + if (logbuff == NULL) 81 - + { 82 - + debug(DEBUG_SYSERROR, "could not malloc %d bytes for logbuff in load_from_cvs", logbufflen); 83 - + exit(1); 84 - + } 85 - + 86 - if (!no_rlog && !test_log_file && cvs_check_cap(CAP_HAVE_RLOG)) 87 - { 88 - ltype = "rlog"; 89 - @@ -480,24 +487,22 @@ 90 - */ 91 - if (have_log || !is_revision_metadata(buff)) 92 - { 93 - - /* if the log buffer is full, that's it. 94 - - * 95 - - * Also, read lines (fgets) always have \n in them 96 - - * which we count on. So if truncation happens, 97 - - * be careful to put a \n on. 98 - - * 99 - - * Buffer has LOG_STR_MAX + 1 for room for \0 if 100 - - * necessary 101 - - */ 102 - - if (loglen < LOG_STR_MAX) 103 - + /* If the log buffer is full, try to reallocate more. */ 104 - + if (loglen < logbufflen) 105 - { 106 - int len = strlen(buff); 107 - 108 - - if (len >= LOG_STR_MAX - loglen) 109 - + if (len >= logbufflen - loglen) 110 - { 111 - - debug(DEBUG_APPMSG1, "WARNING: maximum log length exceeded, truncating log"); 112 - - len = LOG_STR_MAX - loglen; 113 - - buff[len - 1] = '\n'; 114 - + debug(DEBUG_STATUS, "reallocating logbufflen to %d bytes for file %s", logbufflen, file->filename); 115 - + logbufflen += (len >= LOG_STR_MAX ? (len+1) : LOG_STR_MAX); 116 - + char * newlogbuff = realloc(logbuff, logbufflen); 117 - + if (newlogbuff == NULL) 118 - + { 119 - + debug(DEBUG_SYSERROR, "could not realloc %d bytes for logbuff in load_from_cvs", logbufflen); 120 - + exit(1); 121 - + } 122 - + logbuff = newlogbuff; 123 - } 124 - 125 - debug(DEBUG_STATUS, "appending %s to log", buff);
-19
pkgs/applications/version-management/cvsps/03_diffoptstypo.dpatch
··· 1 - #! /bin/sh /usr/share/dpatch/dpatch-run 2 - ## 03_diffoptstypo.dpatch by <crafterm@debian.org> 3 - ## 4 - ## All lines beginning with `## DP:' are a description of the patch. 5 - ## DP: Diff opts typo fix 6 - 7 - @DPATCH@ 8 - 9 - --- cvsps-2.1-orig/cvsps.1 2005-05-26 05:39:40.000000000 +0200 10 - +++ cvsps-2.1/cvsps.1 2005-07-28 15:17:48.885112048 +0200 11 - @@ -83,7 +83,7 @@ 12 - disable the use of rlog internally. Note: rlog is 13 - required for stable PatchSet numbering. Use with care. 14 - .TP 15 - -.B \-\-diffs\-opts <option string> 16 - +.B \-\-diff\-opts <option string> 17 - send a custom set of options to diff, for example to increase 18 - the number of context lines, or change the diff format. 19 - .TP
+40 -8
pkgs/applications/version-management/cvsps/default.nix
··· 1 - { fetchurl, stdenv, cvs, zlib }: 1 + { stdenv, fetchurl, fetchpatch, cvs, zlib }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "cvsps-2.1"; 4 + name = "cvsps-${version}"; 5 + version = "2.1"; 6 + 5 7 src = fetchurl { 6 - url = "http://www.cobite.com/cvsps/${name}.tar.gz"; 8 + url = "mirror://debian/pool/main/c/cvsps/cvsps_${version}.orig.tar.gz"; 7 9 sha256 = "0nh7q7zcmagx0i63h6fqqkkq9i55k77myvb8h6jn2f266f5iklwi"; 8 10 }; 9 11 10 - # Patches from Debian's `cvsps-2.1-4'. 11 - patches = [ ./01_ignoretrunk.dpatch 12 - ./02_dynamicbufferalloc.dpatch 13 - ./03_diffoptstypo.dpatch ]; 12 + # Patches from https://sources.debian.net/src/cvsps/2.1-7/debian/patches 13 + patches = 14 + [ (fetchpatch { 15 + url = "https://sources.debian.net/data/main/c/cvsps/2.1-7/debian/patches/01_ignoretrunk.patch"; 16 + sha256 = "1gzb97dw2a6bm0bmim7p7wvsn0r82y3a8n22ln6rbbkkd8vlnzcb"; 17 + }) 18 + 19 + (fetchpatch { 20 + url = "https://sources.debian.net/data/main/c/cvsps/2.1-7/debian/patches/02_dynamicbufferalloc.patch"; 21 + sha256 = "0dm7azxnw0g9pdqkb3y4y2h047zgrclbh40av6c868wfp2j6l9sc"; 22 + }) 23 + 24 + (fetchpatch { 25 + url = "https://sources.debian.net/data/main/c/cvsps/2.1-7/debian/patches/03_diffoptstypo.patch"; 26 + sha256 = "06n8652g7inpv8cgqir7ijq00qw1fr0v44m2pbmgx7ilmna2vrcw"; 27 + }) 28 + 29 + (fetchpatch { 30 + url = "https://sources.debian.net/data/main/c/cvsps/2.1-7/debian/patches/05-inet_addr_fix.patch"; 31 + sha256 = "10w6px96dz8bb69asjzshvp787ccazmqnjsggqc4gwdal95q3cn7"; 32 + }) 33 + 34 + (fetchpatch { 35 + url = "https://sources.debian.net/data/main/c/cvsps/2.1-7/debian/patches/fix-makefile"; 36 + sha256 = "0m92b55hgldwg6lwdaybbj0n3lw1b3wj2xkk1cz1ywq073bpf3jm"; 37 + }) 38 + 39 + (fetchpatch { 40 + url = "https://sources.debian.net/data/main/c/cvsps/2.1-7/debian/patches/fix-manpage"; 41 + sha256 = "0gky14rhx82wv0gj8bkc74ki5xilhv5i3k1jc7khklr4lb6mmhpx"; 42 + }) 43 + ]; 14 44 15 45 buildInputs = [ cvs zlib ]; 16 46 17 - installPhase = "make install prefix=$out"; 47 + installFlags = [ "prefix=$(out)" ]; 18 48 19 49 meta = { 50 + description = ''A tool to generate CVS patch set information''; 20 51 longDescription = '' 21 52 CVSps is a program for generating `patchset' information from a 22 53 CVS repository. A patchset in this case is defined as a set of ··· 25 56 ''; 26 57 homepage = http://www.cobite.com/cvsps/; 27 58 license = stdenv.lib.licenses.gpl2; 59 + platforms = stdenv.lib.platforms.unix; 28 60 }; 29 61 }
+2 -2
pkgs/applications/version-management/git-and-tools/transcrypt/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "transcrypt-${version}"; 5 - version = "0.9.9"; 5 + version = "1.0.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "elasticdog"; 9 9 repo = "transcrypt"; 10 10 rev = "v${version}"; 11 - sha256 = "0brsgj3qmvkgxzqqamk8krwyarwff1dlb3jjd09snnbfl0kdq1a5"; 11 + sha256 = "195hi8lq1i9rfcwj3raw4pa7fhvv3ghznxp4crmbjm7c0sqilcpd"; 12 12 }; 13 13 14 14 buildInputs = [ git makeWrapper openssl ];
+1
pkgs/applications/version-management/pijul/default.nix
··· 33 33 license = licenses.gpl3; 34 34 platforms = stdenv.lib.platforms.x86_64; # i686 builds fail due to lmdb 35 35 maintainers = with maintainers; [ puffnfresh ]; 36 + broken = true; 36 37 }; 37 38 }
+1 -1
pkgs/build-support/replace-dependency.nix
··· 22 22 with lib; 23 23 24 24 let 25 - warn = if verbose then builtins.trace else (x:y:y); 25 + warn = if verbose then builtins.trace else (x: y: y); 26 26 references = import (runCommand "references.nix" { exportReferencesGraph = [ "graph" drv ]; } '' 27 27 (echo { 28 28 while read path
+6 -6
pkgs/development/compilers/rust/bootstrap.nix
··· 14 14 then "x86_64-apple-darwin" 15 15 else abort "missing boostrap url for platform ${stdenv.system}"; 16 16 17 - # fetch hashes by running `print-hashes.sh 1.12.1` 17 + # fetch hashes by running `print-hashes.sh 1.13.0` 18 18 bootstrapHash = 19 19 if stdenv.system == "i686-linux" 20 - then "ede9b9d14d1ddbc29975d1ead73fcf2758719b4b371363afe1c32eb8d6e96bb3" 20 + then "239734113f6750d31085c7a08c260d492991cc1ef10817b6d44154515f3f9439" 21 21 else if stdenv.system == "x86_64-linux" 22 - then "9e546aec13e389429ba2d86c8f4e67eba5af146c979e4faa16ffb40ddaf9984c" 22 + then "95f4c372b1b81ac1038161e87e932dd7ab875d25c167a861c3949b0f6a65516d" 23 23 else if stdenv.system == "i686-darwin" 24 - then "2648645c4fe1ecf36beb7de63501dd99e9547a7a6d5683acf2693b919a550b69" 24 + then "f6e01cab3bf8d0a6fe9cc2447aa10ce894569daaa72d44063c229da918b96023" 25 25 else if stdenv.system == "x86_64-darwin" 26 - then "0ac5e58dba3d24bf09dcc90eaac02d2df053122b0def945ec4cfe36ac6d4d011" 26 + then "f538ca5732b844cf7f00fc4aaaf200a49a845b58b4ec8aef38da0b00e2cf6efe" 27 27 else throw "missing boostrap hash for platform ${stdenv.system}"; 28 28 29 29 needsPatchelf = stdenv.isLinux; ··· 33 33 sha256 = bootstrapHash; 34 34 }; 35 35 36 - version = "1.12.1"; 36 + version = "1.13.0"; 37 37 in 38 38 39 39 rec {
+2 -2
pkgs/development/compilers/rust/cargo.nix
··· 24 24 LIBGIT2_SYS_USE_PKG_CONFIG=1; 25 25 26 26 configurePhase = '' 27 - ./configure --enable-optimize --prefix=$out --local-cargo=${rustPlatform.rust.cargo}/bin/cargo 27 + ./configure --enable-optimize --prefix=$out 28 28 ''; 29 29 30 30 buildPhase = "make"; ··· 60 60 cargo test 61 61 ''; 62 62 63 - # Disable check phase as there are failures (author_prefers_cargo test fails) 63 + # Disable check phase as there are failures (4 tests fail) 64 64 doCheck = false; 65 65 66 66 meta = with stdenv.lib; {
+7 -7
pkgs/development/compilers/rust/default.nix
··· 7 7 8 8 rec { 9 9 rustc = callPackage ./rustc.nix { 10 - shortVersion = "1.13"; 10 + shortVersion = "1.14"; 11 11 isRelease = true; 12 12 forceBundledLLVM = false; 13 13 configureFlags = [ "--release-channel=stable" ]; 14 - srcRev = "2c6933acc05c61e041be764cb1331f6281993f3f"; 15 - srcSha = "1w0alyyc29cy2lczrqvg1kfycjxy0xg8fpzdac80m88fxpv23glp"; 14 + srcRev = "e8a0123241f0d397d39cd18fcc4e5e7edde22730"; 15 + srcSha = "1sla3gnx9dqvivnyhvwz299mc3jmdy805q2y5xpmpi1vhfk0bafx"; 16 16 17 17 patches = [ 18 18 ./patches/disable-lockfile-check-stable.patch ··· 25 25 }; 26 26 27 27 cargo = callPackage ./cargo.nix rec { 28 - version = "0.14.0"; 29 - srcRev = "eca9e159b6b0d484788ac757cf23052eba75af55"; 30 - srcSha = "1zm5rzw1mvixnkzr4775pcxx6k235qqxbysyp179cbxsw3dm045s"; 31 - depsSha256 = "0gpn0cpwgpzwhc359qn6qplx371ag9pqbwayhqrsydk1zm5bm3zr"; 28 + version = "0.15.0"; 29 + srcRev = "298a0127f703d4c2500bb06d309488b92ef84ae1"; 30 + srcSha = "0v74r18vszapw2rfk7w72czkp9gbq4s1sggphm5vx0kyh058dxc5"; 31 + depsSha256 = "0ksiywli8r4lkprfknm0yz1w27060psi3db6wblqmi8sckzdm44h"; 32 32 33 33 inherit rustc; # the rustc that will be wrapped by cargo 34 34 inherit rustPlatform; # used to build cargo
+2 -1
pkgs/development/compilers/rust/patches/disable-lockfile-check-stable.patch
··· 11 11 index 2839bbd..50142ff 100644 12 12 --- a/src/tools/tidy/src/main.rs 13 13 +++ b/src/tools/tidy/src/main.rs 14 - @@ -47,7 +47,7 @@ fn main() { 14 + @@ -48,7 +48,7 @@ fn main() { 15 15 errors::check(&path, &mut bad); 16 16 cargo::check(&path, &mut bad); 17 17 features::check(&path, &mut bad); 18 18 - cargo_lock::check(&path, &mut bad); 19 19 + //cargo_lock::check(&path, &mut bad); 20 + pal::check(&path, &mut bad); 20 21 21 22 if bad { 22 23 panic!("some tidy checks failed");
+30
pkgs/development/idris-modules/httpclient.nix
··· 1 + { pkgs 2 + , build-idris-package 3 + , fetchFromGitHub 4 + , lightyear 5 + , contrib 6 + , lib 7 + , idris 8 + }: 9 + 10 + let 11 + date = "2016-12-20"; 12 + in 13 + build-idris-package { 14 + name = "httpclient-${date}"; 15 + 16 + src = fetchFromGitHub { 17 + owner = "justjoheinz"; 18 + repo = "idris-httpclient"; 19 + rev = "4a7296d572d7f7fde87d27da07d5c9566dc4ff14"; 20 + sha256 = "0sy0q7gri9lwbqdmx9720pby3w1470w7wzn62bf2rir532219hhl"; 21 + }; 22 + 23 + propagatedBuildInputs = [ pkgs.curl lightyear contrib ]; 24 + 25 + meta = { 26 + description = "HTTP Client for Idris"; 27 + homepage = https://github.com/justjoheinz/idris-httpclient; 28 + inherit (idris.meta) platforms; 29 + }; 30 + }
+3 -2
pkgs/development/libraries/gmime/default.nix
··· 1 - { stdenv, fetchurl, pkgconfig, glib, zlib, libgpgerror }: 1 + { stdenv, fetchurl, pkgconfig, glib, zlib, libgpgerror, gobjectIntrospection }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "gmime-2.6.20"; ··· 10 10 11 11 outputs = [ "out" "dev" ]; 12 12 13 - nativeBuildInputs = [ pkgconfig ]; 13 + nativeBuildInputs = [ pkgconfig gobjectIntrospection ]; 14 14 propagatedBuildInputs = [ glib zlib libgpgerror ]; 15 + configureFlags = [ "--enable-introspection=yes" ]; 15 16 16 17 enableParallelBuilding = true; 17 18
+23
pkgs/development/libraries/kirigami/v2.nix
··· 1 + { stdenv, fetchurl, cmake, ecm, pkgconfig, plasma-framework, qtbase, qtquickcontrols2 }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "kirigami"; 5 + version = "1.90.0"; 6 + name = "${pname}2-${version}"; 7 + 8 + src = fetchurl { 9 + url = "mirror://kde/unstable/${pname}/${pname}-${version}.tar.xz"; 10 + sha256 = "a5ca094a60d1cc48116cbed07bbe68be016773d2488a91e278859c90f59e64a8"; 11 + }; 12 + 13 + buildInputs = [ qtbase qtquickcontrols2 plasma-framework ]; 14 + 15 + nativeBuildInputs = [ cmake pkgconfig ecm ]; 16 + 17 + meta = with stdenv.lib; { 18 + license = licenses.lgpl2; 19 + homepage = http://www.kde.org; 20 + maintainers = with maintainers; [ ttuegel peterhoeg ]; 21 + platforms = platforms.unix; 22 + }; 23 + }
+5 -1
pkgs/development/libraries/libgphoto2/default.nix
··· 25 25 26 26 hardeningDisable = [ "format" ]; 27 27 28 + postInstall = '' 29 + mkdir -p $out/lib/udev/rules.d 30 + $out/lib/libgphoto2/print-camera-list udev-rules version 175 group camera >$out/lib/udev/rules.d/40-gphoto2.rules 31 + ''; 32 + 28 33 meta = { 29 34 homepage = http://www.gphoto.org/proj/libgphoto2/; 30 35 description = "A library for accessing digital cameras"; ··· 41 46 maintainers = with stdenv.lib.maintainers; [ jcumming ]; 42 47 }; 43 48 } 44 -
+30
pkgs/development/libraries/libmd/default.nix
··· 1 + { stdenv, fetchurl, autoreconfHook }: 2 + 3 + stdenv.mkDerivation rec { 4 + name = "${pname}-${version}"; 5 + pname = "libmd"; 6 + version = "0.0.0"; 7 + 8 + src = fetchurl { 9 + url = "https://archive.hadrons.org/software/${pname}/${pname}-${version}.tar.xz"; 10 + sha256 = "121s73pgbqsnmy6xblbrkj9y44c5zzzpf2hcmh6zvcvg4dk26gzx"; 11 + }; 12 + 13 + buildInputs = [ autoreconfHook ]; 14 + 15 + # Writing the version to a .dist-version file is required for the get-version 16 + # shell script because fetchgit removes the .git directory. 17 + prePatch = '' 18 + echo '${version}' > .dist-version; 19 + ''; 20 + 21 + autoreconfPhase = "./autogen"; 22 + 23 + meta = with stdenv.lib; { 24 + homepage = "https://www.hadrons.org/software/${pname}/"; 25 + description = "Message Digest functions from BSD systems"; 26 + license = with licenses; [ bsd3 bsd2 isc beerware publicDomain ]; 27 + maintainers = with maintainers; [ primeos ]; 28 + platforms = platforms.linux; 29 + }; 30 + }
+6 -6
pkgs/development/libraries/openbabel/default.nix
··· 1 - {stdenv, fetchurl, cmake, zlib, libxml2, eigen, python, cairo, pkgconfig }: 1 + {stdenv, fetchurl, cmake, zlib, libxml2, eigen, python, cairo, pcre, pkgconfig }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "openbabel-2.3.2"; 4 + name = "openbabel-${version}"; 5 + version = "2.4.1"; 5 6 6 7 src = fetchurl { 7 - url = "mirror://sourceforge/openbabel/${name}.tar.gz"; 8 - sha256 = "122if0jkm71ngd1b0dic8k567b3j2hcikbwnpxgchv5ag5ka5b2f"; 8 + url = "https://github.com/openbabel/openbabel/archive/openbabel-${stdenv.lib.replaceStrings ["."] ["-"] version}.tar.gz"; 9 + sha256 = "0xm7y859ivq2cp0q08mwshfxm0jq31xkyr4x8s0j6l7khf57yk2r"; 9 10 }; 10 11 11 12 # TODO : perl & python bindings; 12 13 # TODO : wxGTK: I have no time to compile 13 14 # TODO : separate lib and apps 14 - buildInputs = [ zlib libxml2 eigen python cairo ]; 15 + buildInputs = [ zlib libxml2 eigen python cairo pcre ]; 15 16 16 17 nativeBuildInputs = [ cmake pkgconfig ]; 17 18 18 19 meta = { 19 20 platforms = stdenv.lib.platforms.all; 20 21 maintainers = [ stdenv.lib.maintainers.urkud ]; 21 - broken = true; # doesn't build with GCC 5; fix in GitHub 22 22 }; 23 23 }
+23
pkgs/development/libraries/physics/fastnlo/default.nix
··· 1 + { stdenv, fetchurl, boost, lhapdf, root, yoda }: 2 + 3 + stdenv.mkDerivation rec { 4 + name = "fastnlo_toolkit-${version}"; 5 + version = "2.3.1pre-2212"; 6 + 7 + src = fetchurl { 8 + url = "http://fastnlo.hepforge.org/code/v23/${name}.tar.gz"; 9 + sha256 = "0xgnnwc002awvz6dhn7792jc8kdff843yjgvwmgcs60yvcj6blgp"; 10 + }; 11 + 12 + buildInputs = [ boost lhapdf root yoda ]; 13 + 14 + enableParallelBuilding = true; 15 + 16 + meta = { 17 + descritption = "A computer code to create and evaluate fast interpolation tables of pre-computed coefficients in perturbation theory for observables in hadron-induced processes"; 18 + license = stdenv.lib.licenses.gpl3; 19 + homepage = http://fastnlo.hepforge.org; 20 + platforms = stdenv.lib.platforms.unix; 21 + maintainers = with stdenv.lib.maintainers; [ veprbl ]; 22 + }; 23 + }
+29
pkgs/development/libraries/physics/mcgrid/default.nix
··· 1 + { stdenv, fetchurl, fastnlo, rivet, sherpa }: 2 + 3 + stdenv.mkDerivation rec { 4 + name = "mcgrid-${version}"; 5 + version = "2.0.2"; 6 + 7 + src = fetchurl { 8 + url = "http://www.hepforge.org/archive/mcgrid/${name}.tar.gz"; 9 + sha256 = "1mw82x7zqbdchnd6shj3dirsav5i2cndp2hjwb8a8xdh4xh9zvfy"; 10 + }; 11 + 12 + buildInputs = [ fastnlo rivet ]; 13 + 14 + preConfigure = '' 15 + substituteInPlace mcgrid.pc.in \ 16 + --replace "Cflags:" "Cflags: -std=c++11" 17 + ''; 18 + 19 + CXXFLAGS = "-std=c++11"; 20 + enableParallelBuilding = true; 21 + 22 + meta = { 23 + description = "A software package that provides access to the APPLgrid and fastNLO interpolation tools for Monte Carlo event generator codes, allowing for fast and flexible variations of scales, coupling parameters and PDFs in cutting edge leading- and next-to-leading-order QCD calculations"; 24 + license = stdenv.lib.licenses.gpl3; 25 + homepage = http://mcgrid.hepforge.org; 26 + platforms = stdenv.lib.platforms.unix; 27 + maintainers = with stdenv.lib.maintainers; [ veprbl ]; 28 + }; 29 + }
+4 -7
pkgs/development/libraries/physics/rivet/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "rivet-${version}"; 5 - version = "2.5.2"; 5 + version = "2.5.3"; 6 6 7 7 src = fetchurl { 8 8 url = "http://www.hepforge.org/archive/rivet/Rivet-${version}.tar.bz2"; 9 - sha256 = "01agf0bswqvci8nwp67kvrlwc2k0sg1s0lxpq2a9q58l99v2gakh"; 9 + sha256 = "1r0x575ivvm68nnh9qlfvdra5298i047qcbxcg37ki2aaqq07qcr"; 10 10 }; 11 + 12 + postPatch = "patchShebangs ./src/Analyses/cat_with_lines"; 11 13 12 14 pythonPath = []; # python wrapper support 13 - 14 - patches = [ 15 - ./key_val.patch 16 - ./zaxis_fix.patch 17 - ]; 18 15 19 16 latex = texlive.combine { inherit (texlive) 20 17 scheme-basic
+1
pkgs/development/libraries/qt-5/5.7/default.nix
··· 82 82 inherit (pkgs.gst_all_1) gstreamer gst-plugins-base; 83 83 }; 84 84 qtquickcontrols = callPackage ./qtquickcontrols.nix {}; 85 + qtquickcontrols2 = callPackage ./qtquickcontrols2.nix {}; 85 86 qtscript = callPackage ./qtscript {}; 86 87 qtsensors = callPackage ./qtsensors.nix {}; 87 88 qtserialport = callPackage ./qtserialport {};
+6
pkgs/development/libraries/qt-5/5.7/qtquickcontrols2.nix
··· 1 + { qtSubmodule, qtdeclarative }: 2 + 3 + qtSubmodule { 4 + name = "qtquickcontrols2"; 5 + qtInputs = [ qtdeclarative ]; 6 + }
+3
pkgs/development/libraries/science/math/clblas/cuda/default.nix
··· 7 7 , python 8 8 , cudatoolkit 9 9 , nvidia_x11 10 + , gtest 10 11 }: 11 12 12 13 stdenv.mkDerivation rec { ··· 40 41 cmake ../src -DCMAKE_INSTALL_PREFIX=$out \ 41 42 -DCMAKE_BUILD_TYPE=Release \ 42 43 -DOPENCL_ROOT=${cudatoolkit} \ 44 + -DUSE_SYSTEM_GTEST=ON 43 45 ''; 44 46 45 47 dontStrip = true; ··· 51 53 python 52 54 cudatoolkit 53 55 nvidia_x11 56 + gtest 54 57 ]; 55 58 56 59 meta = with stdenv.lib; {
+10 -4
pkgs/development/libraries/wxGTK-2.9/default.nix
··· 1 1 { stdenv, fetchurl, pkgconfig, gtk2, libXinerama, libSM, libXxf86vm, xf86vidmodeproto 2 2 , gstreamer, gst_plugins_base, GConf, setfile 3 - , withMesa ? true, mesa ? null, compat24 ? false, compat26 ? true, unicode ? true, 3 + , withMesa ? true, mesa ? null, compat24 ? false, compat26 ? true, unicode ? true 4 + , Carbon ? null, Cocoa ? null, Kernel ? null, QuickTime ? null, AGL ? null 4 5 }: 5 6 6 7 assert withMesa -> mesa != null; ··· 22 23 [ gtk2 libXinerama libSM libXxf86vm xf86vidmodeproto gstreamer 23 24 gst_plugins_base GConf ] 24 25 ++ optional withMesa mesa 25 - ++ optional stdenv.isDarwin setfile; 26 + ++ optionals stdenv.isDarwin [ setfile Carbon Cocoa Kernel QuickTime ]; 26 27 27 28 nativeBuildInputs = [ pkgconfig ]; 29 + 30 + propagatedBuildInputs = optional stdenv.isDarwin AGL; 28 31 29 32 configureFlags = 30 33 [ "--enable-gtk2" "--disable-precomp-headers" "--enable-mediactrl" ··· 34 37 ++ optional withMesa "--with-opengl" 35 38 ++ optionals stdenv.isDarwin 36 39 # allow building on 64-bit 37 - [ "--with-cocoa" "--enable-universal-binaries" ]; 40 + [ "--with-cocoa" "--enable-universal-binaries" "--with-macosx-version-min=10.7" ]; 38 41 39 42 SEARCH_LIB = optionalString withMesa "${mesa}/lib"; 40 43 ··· 46 49 substituteInPlace configure --replace \ 47 50 'ac_cv_prog_SETFILE="/Developer/Tools/SetFile"' \ 48 51 'ac_cv_prog_SETFILE="${setfile}/bin/SetFile"' 52 + substituteInPlace configure --replace \ 53 + "-framework System" \ 54 + -lSystem 49 55 ''; 50 56 51 57 postInstall = " ··· 60 66 enableParallelBuilding = true; 61 67 62 68 meta = { 63 - platforms = stdenv.lib.platforms.linux; 69 + platforms = with stdenv.lib.platforms; darwin ++ linux; 64 70 }; 65 71 }
+9 -3
pkgs/development/libraries/wxGTK-3.0/default.nix
··· 2 2 , gstreamer, gst_plugins_base, GConf, setfile 3 3 , withMesa ? true, mesa ? null, compat24 ? false, compat26 ? true, unicode ? true 4 4 , withWebKit ? false, webkitgtk2 ? null 5 + , AGL ? null, Carbon ? null, Cocoa ? null, Kernel ? null, QTKit ? null 5 6 }: 6 7 7 8 ··· 26 27 gst_plugins_base GConf ] 27 28 ++ optional withMesa mesa 28 29 ++ optional withWebKit webkitgtk2 29 - ++ optional stdenv.isDarwin setfile; 30 + ++ optionals stdenv.isDarwin [ setfile Carbon Cocoa Kernel QTKit ]; 30 31 31 32 nativeBuildInputs = [ pkgconfig ]; 33 + 34 + propagatedBuildInputs = optional stdenv.isDarwin AGL; 32 35 33 36 configureFlags = 34 37 [ "--enable-gtk2" "--disable-precomp-headers" "--enable-mediactrl" ··· 38 41 ++ optional withMesa "--with-opengl" 39 42 ++ optionals stdenv.isDarwin 40 43 # allow building on 64-bit 41 - [ "--with-cocoa" "--enable-universal-binaries" ] 44 + [ "--with-cocoa" "--enable-universal-binaries" "--with-macosx-version-min=10.7" ] 42 45 ++ optionals withWebKit 43 46 ["--enable-webview" "--enable-webview-webkit"]; 44 47 ··· 52 55 substituteInPlace configure --replace \ 53 56 'ac_cv_prog_SETFILE="/Developer/Tools/SetFile"' \ 54 57 'ac_cv_prog_SETFILE="${setfile}/bin/SetFile"' 58 + substituteInPlace configure --replace \ 59 + "-framework System" \ 60 + -lSystem 55 61 ''; 56 62 57 63 postInstall = " ··· 66 72 enableParallelBuilding = true; 67 73 68 74 meta = { 69 - platforms = stdenv.lib.platforms.linux; 75 + platforms = with stdenv.lib.platforms; darwin ++ linux; 70 76 }; 71 77 }
+5 -5
pkgs/development/libraries/xylib/default.nix
··· 1 - { stdenv, fetchurl, boost, zlib, bzip2 }: 1 + { stdenv, fetchurl, boost, zlib, bzip2, wxGTK30 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "xylib-${version}"; 5 - version = "1.4"; 5 + version = "1.5"; 6 6 7 7 src = fetchurl { 8 - url = "https://github.com/wojdyr/xylib/releases/download/v${version}/${name}-${version}.tar.bz2"; 9 - sha256 = "09j426qjbg3damch1hfw16j992kn2hj8gs4lpvqgfqdw61kvqivh"; 8 + url = "https://github.com/wojdyr/xylib/releases/download/v${version}/${name}.tar.bz2"; 9 + sha256 = "1r2kx80zhdvz39k6h2fsncm2742xxvxl3z8a3fnr13jl9sl7mnnd"; 10 10 }; 11 11 12 - buildInputs = [ boost zlib bzip2 ]; 12 + buildInputs = [ boost zlib bzip2 wxGTK30 ]; 13 13 14 14 meta = with stdenv.lib; { 15 15 description = "Portable library for reading files that contain x-y data from powder diffraction, spectroscopy and other experimental methods";
+9 -17
pkgs/development/ocaml-modules/eliom/default.nix
··· 1 - { stdenv, fetchurl, ocaml, findlib, which, ocsigen_server, ocsigen_deriving, 1 + { buildOcaml, stdenv, fetchurl, which, ocsigen_server, ocsigen_deriving, ocaml, 2 2 js_of_ocaml, ocaml_react, ocaml_lwt, calendar, cryptokit, tyxml, 3 3 ipaddr, ocamlnet, ocaml_ssl, ocaml_pcre, ocaml_optcomp, 4 - reactivedata, opam, ppx_tools, camlp4}: 4 + reactivedata, opam, ppx_tools, ppx_deriving, camlp4}: 5 5 6 - let ocamlVersion = (stdenv.lib.getVersion ocaml); 7 - in 8 - 9 - ( 10 - assert stdenv.lib.versionAtLeast ocamlVersion "4"; 11 - 12 - stdenv.mkDerivation rec 6 + let ocamlVersion = (stdenv.lib.getVersion ocaml); in 7 + buildOcaml rec 13 8 { 14 9 pname = "eliom"; 15 10 version = "5.0.0"; ··· 22 17 23 18 patches = [ ./camlp4.patch ]; 24 19 25 - buildInputs = [ocaml which ocsigen_server findlib ocsigen_deriving 26 - js_of_ocaml ocaml_optcomp opam ppx_tools camlp4 ]; 20 + buildInputs = [ which ocaml_optcomp opam ppx_tools camlp4 ]; 27 21 28 - propagatedBuildInputs = [ ocaml_lwt reactivedata tyxml ipaddr 29 - calendar cryptokit ocamlnet ocaml_react ocaml_ssl 30 - ocaml_pcre ]; 22 + propagatedBuildInputs = [ ocaml_lwt reactivedata tyxml ipaddr ocsigen_server ppx_deriving 23 + ocsigen_deriving js_of_ocaml 24 + calendar cryptokit ocamlnet ocaml_react ocaml_ssl ocaml_pcre ]; 31 25 32 26 preConfigure = stdenv.lib.optionalString (!stdenv.lib.versionAtLeast ocamlVersion "4.02") '' 33 27 export PPX=false ··· 57 51 58 52 license = stdenv.lib.licenses.lgpl21; 59 53 60 - platforms = ocaml.meta.platforms or []; 61 - 62 54 maintainers = [ stdenv.lib.maintainers.gal_bolle ]; 63 55 }; 64 - }) 56 + }
+10 -8
pkgs/development/ocaml-modules/pgocaml/default.nix
··· 1 - { stdenv, fetchurl, ocaml, findlib, ocamlbuild, camlp4, calendar, csv, ocaml_pcre }: 1 + { stdenv, fetchurl, buildOcaml, calendar, csv, re }: 2 2 3 - stdenv.mkDerivation { 4 - name = "ocaml-pgocaml-2.2"; 3 + buildOcaml { 4 + name = "pgocaml"; 5 + version = "2.3"; 5 6 src = fetchurl { 6 - url = http://forge.ocamlcore.org/frs/download.php/1506/pgocaml-2.2.tgz; 7 - sha256 = "0x0dhlz2rqxpwfdqi384f9fn0ng2irifadmxfm2b4gcz7y1cl9rh"; 7 + url = https://github.com/darioteixeira/pgocaml/archive/v2.3.tar.gz; 8 + sha256 = "18lymxlvcf4nwxawkidq3pilsp5rhl0l8ifq6pjk3ssjlx9w53pg"; 8 9 }; 9 10 10 - buildInputs = [ ocaml findlib ocamlbuild camlp4 ]; 11 - propagatedBuildInputs = [ calendar csv ocaml_pcre ]; 11 + buildInputs = [ ]; 12 + propagatedBuildInputs = [ calendar csv re ]; 13 + 14 + configureFlags = [ "--enable-p4" ]; 12 15 13 16 createFindlibDestdir = true; 14 17 ··· 16 19 description = "An interface to PostgreSQL databases for OCaml applications"; 17 20 homepage = http://pgocaml.forge.ocamlcore.org/; 18 21 license = licenses.lgpl2; 19 - platforms = ocaml.meta.platforms or []; 20 22 maintainers = with maintainers; [ vbgl ]; 21 23 }; 22 24 }
+2 -2
pkgs/development/tools/analysis/kcov/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "kcov-${version}"; 5 - version = "29"; 5 + version = "32"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/SimonKagstrom/kcov/archive/v${version}.tar.gz"; 9 - sha256 = "0nspf1bfq8zv7zmcmvkbgg3c90k10qcd56gyg8ln5z64nadvha9d"; 9 + sha256 = "0ic5w6r3cpwb32iky1jmyvfclgkqr0rnfyim7j2r6im21846sa85"; 10 10 }; 11 11 12 12 preConfigure = "patchShebangs src/bin-to-c-source.py";
+28
pkgs/development/tools/makerpm/default.nix
··· 1 + { stdenv, fetchFromGitHub, zlib, libarchive, openssl }: 2 + 3 + stdenv.mkDerivation rec { 4 + version = "1.0"; 5 + name = "makerpm-${version}"; 6 + 7 + installPhase = '' 8 + mkdir -p $out/bin 9 + cp makerpm $out/bin 10 + ''; 11 + 12 + buildInputs = [ zlib libarchive openssl ]; 13 + 14 + src = fetchFromGitHub { 15 + owner = "ivan-tkatchev"; 16 + repo = "makerpm"; 17 + rev = "${version}"; 18 + sha256 = "089dkbh5705ppyi920rd0ksjc0143xmvnhm8qrx93rsgwc1ggi1y"; 19 + }; 20 + 21 + meta = with stdenv.lib; { 22 + homepage = https://github.com/ivan-tkatchev/makerpm/; 23 + description = "A clean, simple RPM packager reimplemented completely from scratch"; 24 + license = licenses.free; 25 + platforms = platforms.all; 26 + maintainers = [ maintainers.ivan-tkatchev ]; 27 + }; 28 + }
+44
pkgs/development/tools/nrpl/default.nix
··· 1 + { stdenv, lib, fetchFromGitHub, fetchpatch, makeWrapper, nim, pcre, tinycc }: 2 + 3 + stdenv.mkDerivation rec { 4 + name = "nrpl-${version}"; 5 + version = "20150522"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "wheineman"; 9 + repo = "nrpl"; 10 + rev = "6d6c189ab7d1c905cc29dc678d66e9e132026f69"; 11 + sha256 = "1cly9lhrawnc42r31b7r0p0i6hcx8r00aa17gv7w9pcpj8ngb4v2"; 12 + }; 13 + 14 + buildInputs = [ makeWrapper nim pcre ]; 15 + 16 + patches = [ 17 + (fetchpatch { 18 + url = https://patch-diff.githubusercontent.com/raw/wheineman/nrpl/pull/12.patch; 19 + name = "update_for_new_nim.patch"; 20 + sha256 = "1zff7inhn3l1jnxcnidy705lzi3wqib1chf4rayh1g9i23an7wg1"; 21 + }) 22 + ]; 23 + 24 + NIX_LDFLAGS = [ 25 + "-lpcre" 26 + ]; 27 + 28 + buildPhase = "nim c -d:release nrpl.nim"; 29 + 30 + installPhase = "install -Dt $out/bin nrpl"; 31 + 32 + postFixup = '' 33 + wrapProgram $out/bin/nrpl \ 34 + --prefix PATH : ${lib.makeBinPath [ nim tinycc ]} 35 + ''; 36 + 37 + meta = with stdenv.lib; { 38 + description = "REPL for the Nim programming language"; 39 + homepage = https://github.com/wheineman/nrpl; 40 + license = licenses.mit; 41 + maintainers = with maintainers; [ peterhoeg ]; 42 + platforms = with platforms; linux ++ darwin; 43 + }; 44 + }
+2 -2
pkgs/development/tools/ocaml/js_of_ocaml/default.nix
··· 8 8 sha256 = "1dali1akyd4zmkwav0d957ynxq2jj6cc94r4xiaql7ca89ajz4jj"; 9 9 }; 10 10 11 - buildInputs = [ ocaml findlib menhir ocsigen_deriving ppx_deriving 11 + buildInputs = [ ocaml findlib menhir ocsigen_deriving 12 12 cmdliner tyxml reactivedata cppo which base64]; 13 - propagatedBuildInputs = [ ocaml_lwt camlp4 ]; 13 + propagatedBuildInputs = [ ocaml_lwt camlp4 ppx_deriving ]; 14 14 15 15 patches = [ ./Makefile.conf.diff ]; 16 16
+3 -1
pkgs/games/chessx/default.nix
··· 17 17 qmakeHook 18 18 ]; 19 19 20 - enableParallelBuilding = true; 20 + # RCC: Error in 'resources.qrc': Cannot find file 'i18n/chessx_da.qm' 21 + #enableParallelBuilding = true; 22 + 21 23 installPhase = '' 22 24 runHook preInstall 23 25 mkdir -p "$out/bin"
-19
pkgs/games/freeorion/92455f9.patch
··· 1 - diff -Naur GG/src/Font.cpp 2 - --- /GG/src/Font.cpp 3 - +++ /GG/src/Font.cpp 4 - @@ -1586,8 +1586,13 @@ 5 - using boost::lexical_cast; 6 - FT_UInt index = FT_Get_Char_Index(face, ch); 7 - if (index) { 8 - - if (FT_Load_Glyph(face, index, FT_LOAD_DEFAULT)) 9 - - ThrowBadGlyph("GG::Font::GetGlyphBitmap : Freetype could not load the glyph for character '%1%'", ch); 10 - + if (FT_Load_Glyph(face, index, FT_LOAD_DEFAULT)) { 11 - + // loading of a glpyh failed so we replace it with 12 - + // the 'Replacement Character' at codepoint 0xFFFD 13 - + FT_UInt tmp_index = FT_Get_Char_Index(face, 0xFFFD); 14 - + if (FT_Load_Glyph(face, tmp_index, FT_LOAD_DEFAULT)) 15 - + ThrowBadGlyph("GG::Font::GetGlyphBitmap : Freetype could not load the glyph for character '%1%'", ch); 16 - + } 17 - 18 - FT_GlyphSlot glyph = face->glyph; 19 -
+6 -5
pkgs/games/freeorion/default.nix
··· 2 2 , libxslt, makeWrapper }: 3 3 4 4 stdenv.mkDerivation rec { 5 - version = "0.4.5"; 5 + version = "0.4.6"; 6 6 name = "freeorion-${version}"; 7 7 8 8 src = fetchurl { 9 - url = "https://github.com/freeorion/freeorion/releases/download/v0.4.5/FreeOrion_v0.4.5_2015-09-01.f203162_Source.tar.gz"; 10 - sha256 = "3b99b92eeac72bd059566dbabfab54368989ba83f72e769bc94eb8dd4fe414c0"; 9 + url = "https://github.com/freeorion/freeorion/releases/download/v0.4.6/FreeOrion_v0.4.6_2016-09-16.49f9123_Source.tar.gz"; 10 + sha256 = "04g3x1cymf7mnmc2f5mm3c2r5izjmy7z3pvk2ykzz8f8b2kz6gry"; 11 11 }; 12 12 13 13 buildInputs = [ cmake boost SDL2 python2 freetype openal libogg libvorbis zlib libpng libtiff libjpeg mesa glew doxygen makeWrapper ]; 14 14 15 - # cherry pick for acceptable performance https://github.com/freeorion/freeorion/commit/92455f97c28055e296718230d2e3744eccd738ec 16 - patches = [ ./92455f9.patch ]; 15 + patches = [ 16 + ./fix_rpaths.patch 17 + ]; 17 18 18 19 enableParallelBuilding = true; 19 20
+11
pkgs/games/freeorion/fix_rpaths.patch
··· 1 + --- a/CMakeLists.txt 2 + +++ b/CMakeLists.txt 3 + @@ -46,7 +46,7 @@ 4 + set(FreeOrion_INSTALL_LIBDIR "${CMAKE_INSTALL_LIBDIR}/freeorion") 5 + endif() 6 + 7 + -set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/${FreeOrion_INSTALL_LIBDIR}") 8 + +set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_FULL_LIBDIR}/freeorion") 9 + set(CMAKE_INSTALL_RPATH_USE_LINK_PATH TRUE) 10 + 11 + if (WIN32)
+8 -6
pkgs/games/opendungeons/default.nix
··· 1 - { stdenv, fetchurl, ogre, cegui, boost, sfml, openal, cmake, ois }: 1 + { stdenv, fetchFromGitHub, ogre, cegui, boost, sfml, openal, cmake, ois, pkgconfig }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "opendungeons-${version}"; 5 - version = "0.6.0"; 5 + version = "0.7.1"; 6 6 7 - src = fetchurl { 8 - url = "ftp://download.tuxfamily.org/opendungeons/${version}/${name}.tar.xz"; 9 - sha256 = "1g0sjh732794h26cbkr0p96i3c0avm0mx9ip5zbvb2y3sbpjcbib"; 7 + src = fetchFromGitHub { 8 + owner = "OpenDungeons"; 9 + repo = "OpenDungeons"; 10 + rev = version; 11 + sha256 = "0nipb2h0gn628yxlahjgnfhmpfqa19mjdbj3aqabimdfqds9pryh"; 10 12 }; 11 13 12 14 patches = [ ./cmakepaths.patch ]; 13 15 14 - buildInputs = [ cmake ogre cegui boost sfml openal ois ]; 16 + buildInputs = [ cmake ogre cegui boost sfml openal ois pkgconfig ]; 15 17 16 18 meta = with stdenv.lib; { 17 19 description = "An open source, real time strategy game sharing game elements with the Dungeon Keeper series and Evil Genius.";
+6 -6
pkgs/misc/screensavers/physlock/default.nix
··· 1 1 { stdenv, fetchFromGitHub }: 2 2 3 3 stdenv.mkDerivation rec { 4 - version = "git-20150126"; 5 - name = "physlock-${version}"; 4 + version = "0.5"; 5 + name = "physlock-v${version}"; 6 6 src = fetchFromGitHub { 7 - owner = "muennich"; 8 - repo = "physlock"; 9 - rev = "b64dccc8c22710f8bf01eb5419590cdb0e65cabb"; 10 - sha256 = "1dapkwj3y6bb4j8q4glms7zsqm7drr37nrnr30sbahwq67rnvzcc"; 7 + owner = "muennich"; 8 + repo = "physlock"; 9 + rev = "v${version}"; 10 + sha256 = "102kdixrf7xxsxr69lbz73i1ss7959716cmdf8d5kbnhmk6argv7"; 11 11 }; 12 12 13 13 preConfigure = ''
+7 -5
pkgs/misc/vim-plugins/default.nix
··· 1309 1309 dependencies = []; 1310 1310 buildInputs = [ 1311 1311 python go cmake 1312 - (if stdenv.isDarwin then llvmPackages.clang else llvmPackages.clang-unwrapped) 1313 - llvmPackages.llvm 1314 1312 ] ++ stdenv.lib.optional stdenv.isDarwin Cocoa; 1315 1313 1316 1314 propagatedBuildInputs = stdenv.lib.optional (!stdenv.isDarwin) rustracerd; 1317 1315 1318 1316 patches = [ 1319 - ./patches/youcompleteme/1-top-cmake.patch 1320 1317 ./patches/youcompleteme/2-ycm-cmake.patch 1321 1318 ]; 1322 1319 1320 + # YCM requires path to external libclang 3.9 1321 + # For explicit use and as env variable for ../third_party/ycmd/build.py 1322 + EXTRA_CMAKE_ARGS="-DEXTERNAL_LIBCLANG_PATH=${llvmPackages.clang.cc}/lib/libclang.${if stdenv.isDarwin then "dylib" else "so"}"; 1323 + 1323 1324 buildPhase = '' 1324 1325 patchShebangs . 1325 1326 substituteInPlace plugin/youcompleteme.vim \ ··· 1327 1328 1328 1329 mkdir build 1329 1330 pushd build 1330 - cmake -G "Unix Makefiles" . ../third_party/ycmd/cpp -DPYTHON_LIBRARIES:PATH=${python}/lib/libpython2.7.so -DPYTHON_INCLUDE_DIR:PATH=${python}/include/python2.7 -DUSE_CLANG_COMPLETER=ON -DUSE_SYSTEM_LIBCLANG=ON 1331 + cmake -G "Unix Makefiles" . ../third_party/ycmd/cpp -DPYTHON_LIBRARIES:PATH=${python}/lib/libpython2.7.so -DPYTHON_INCLUDE_DIR:PATH=${python}/include/python2.7 -DUSE_CLANG_COMPLETER=ON \ 1332 + $EXTRA_CMAKE_ARGS 1331 1333 make ycm_core -j''${NIX_BUILD_CORES} -l''${NIX_BUILD_CORES}} 1332 - ${python}/bin/python ../third_party/ycmd/build.py --gocode-completer --clang-completer --system-libclang 1334 + ${python}/bin/python ../third_party/ycmd/build.py --gocode-completer --clang-completer 1333 1335 popd 1334 1336 ''; 1335 1337
-14
pkgs/misc/vim-plugins/patches/youcompleteme/1-top-cmake.patch
··· 1 - 2 - --- ./third_party/ycmd/cpp/CMakeLists.txt 3 - +++ ./third_party/ycmd/cpp/CMakeLists.txt 4 - @@ -121,8 +121,8 @@ 5 - set( CPP11_AVAILABLE true ) 6 - endif() 7 - elseif( COMPILER_IS_CLANG ) 8 - - set( CPP11_AVAILABLE true ) 9 - - set( CMAKE_XCODE_ATTRIBUTE_CLANG_CXX_LANGUAGE_STANDARD "c++11" ) 10 - + #set( CPP11_AVAILABLE true ) 11 - + # set( CMAKE_XCODE_ATTRIBUTE_CLANG_CXX_LANGUAGE_STANDARD "c++11" ) 12 - set( CMAKE_XCODE_ATTRIBUTE_CLANG_CXX_LIBRARY "libc++" ) 13 - endif() 14 -
+7 -5
pkgs/misc/vim-plugins/vim2nix/additional-nix-code/youcompleteme
··· 1 1 buildInputs = [ 2 2 python go cmake 3 - (if stdenv.isDarwin then llvmPackages.clang else llvmPackages.clang-unwrapped) 4 - llvmPackages.llvm 5 3 ] ++ stdenv.lib.optional stdenv.isDarwin Cocoa; 6 4 7 5 propagatedBuildInputs = stdenv.lib.optional (!stdenv.isDarwin) rustracerd; 8 6 9 7 patches = [ 10 - ./patches/youcompleteme/1-top-cmake.patch 11 8 ./patches/youcompleteme/2-ycm-cmake.patch 12 9 ]; 13 10 11 + # YCM requires path to external libclang 3.9 12 + # For explicit use and as env variable for ../third_party/ycmd/build.py 13 + EXTRA_CMAKE_ARGS="-DEXTERNAL_LIBCLANG_PATH=${llvmPackages.clang.cc}/lib/libclang.${if stdenv.isDarwin then "dylib" else "so"}"; 14 + 14 15 buildPhase = '' 15 16 patchShebangs . 16 17 substituteInPlace plugin/youcompleteme.vim \ ··· 18 19 19 20 mkdir build 20 21 pushd build 21 - cmake -G "Unix Makefiles" . ../third_party/ycmd/cpp -DPYTHON_LIBRARIES:PATH=${python}/lib/libpython2.7.so -DPYTHON_INCLUDE_DIR:PATH=${python}/include/python2.7 -DUSE_CLANG_COMPLETER=ON -DUSE_SYSTEM_LIBCLANG=ON 22 + cmake -G "Unix Makefiles" . ../third_party/ycmd/cpp -DPYTHON_LIBRARIES:PATH=${python}/lib/libpython2.7.so -DPYTHON_INCLUDE_DIR:PATH=${python}/include/python2.7 -DUSE_CLANG_COMPLETER=ON \ 23 + $EXTRA_CMAKE_ARGS 22 24 make ycm_core -j''${NIX_BUILD_CORES} -l''${NIX_BUILD_CORES}} 23 - ${python}/bin/python ../third_party/ycmd/build.py --gocode-completer --clang-completer --system-libclang 25 + ${python}/bin/python ../third_party/ycmd/build.py --gocode-completer --clang-completer 24 26 popd 25 27 ''; 26 28
+3 -3
pkgs/os-specific/linux/bcc/default.nix
··· 2 2 flex, bison, elfutils, python, pythonPackages, luajit, netperf, iperf }: 3 3 4 4 stdenv.mkDerivation rec { 5 - version = "git-2016-08-30"; 5 + version = "0.2.0"; 6 6 name = "bcc-${version}"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "iovisor"; 10 10 repo = "bcc"; 11 - rev = "4c2b5388f8d685a127a4d757c254a380e0aa915c"; 12 - sha256 = "1bd4darmr60vfr5414zq0bd9rq42r6h3cwiiwjllksbi4v2jvx77"; 11 + rev = "v${version}"; 12 + sha256 = "1xifh8lcqmn4mk6w4srjf4zk6mlwgck4fpcyhhliy39963ch5k08"; 13 13 }; 14 14 15 15 buildInputs = [ makeWrapper cmake llvmPackages.llvm llvmPackages.clang-unwrapped kernel
+3 -3
pkgs/os-specific/linux/dpdk/default.nix
··· 4 4 5 5 stdenv.mkDerivation rec { 6 6 name = "dpdk-${version}-${kernel.version}"; 7 - version = "16.07"; 7 + version = "16.07.2"; 8 8 9 9 src = fetchurl { 10 - url = "http://dpdk.org/browse/dpdk/snapshot/dpdk-${version}.tar.gz"; 11 - sha256 = "1sgh55w3xpc0lb70s74cbyryxdjijk1fbv9b25jy8ms3lxaj966c"; 10 + url = "http://fast.dpdk.org/rel/dpdk-${version}.tar.xz"; 11 + sha256 = "1mzwazmzpq8mvwiham80y6h53qpvjpp76v0d58gz9bfiphbi9876"; 12 12 }; 13 13 14 14 buildInputs = [ pkgconfig libvirt ];
+2 -2
pkgs/os-specific/linux/kernel/patches.nix
··· 96 96 97 97 grsecurity_testing = grsecPatch 98 98 { kver = "4.8.15"; 99 - grrev = "201612151923"; 100 - sha256 = "1di4v0b0sn7ibg9vrn8w7d5vjxd2mdlxdmqsnyd6xyn8g00fra89"; 99 + grrev = "201612301949"; 100 + sha256 = "1083r30ipvdi3kjixlsp3f1mmf7848f2p32ds956caarvr4vkm3b"; 101 101 }; 102 102 103 103 # This patch relaxes grsec constraints on the location of usermode helpers,
+3 -9
pkgs/os-specific/linux/odp-dpdk/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "odp-dpdk-${version}"; 5 - version = "2016-08-16"; 5 + version = "1.12.0.0"; 6 6 7 7 src = fetchgit { 8 8 url = "https://git.linaro.org/lng/odp-dpdk.git"; 9 - rev = "7068593f600e2b5a23ee1780d5c722c54e966df1"; 10 - sha256 = "0pz0zkxqaac193x21wmj3x88gfza6bvhmv5yf8fzkpm9zxnl2sy4"; 9 + rev = "5e370e1113973feafb43a8e57d4c59be40e9aeab"; 10 + sha256 = "0rrakbxnbsqaj148xaz2hwxjvg3cmzlynfkvcp8w56sqyly75d0n"; 11 11 }; 12 12 13 13 nativeBuildInputs = [ autoreconfHook ]; ··· 15 15 16 16 RTE_SDK = "${dpdk}"; 17 17 RTE_TARGET = "x86_64-native-linuxapp-gcc"; 18 - 19 - patchPhase = '' 20 - substituteInPlace scripts/git_hash.sh --replace /bin/bash /bin/sh 21 - substituteInPlace scripts/get_impl_str.sh --replace /bin/bash /bin/sh 22 - echo -n ${version} > .scmversion 23 - ''; 24 18 25 19 dontDisableStatic = true; 26 20
+3 -8
pkgs/os-specific/linux/pktgen/default.nix
··· 5 5 6 6 stdenv.mkDerivation rec { 7 7 name = "pktgen-${version}"; 8 - version = "3.0.13"; 8 + version = "3.1.0"; 9 9 10 10 src = fetchurl { 11 - url = "http://dpdk.org/browse/apps/pktgen-dpdk/snapshot/pktgen-${version}.tar.gz"; 12 - sha256 = "64629b454ed8dc036d5e9bb30b3ae84a0bab0142b651c72da85ab1454e9ae0d6"; 11 + url = "http://dpdk.org/browse/apps/pktgen-dpdk/snapshot/pktgen-v${version}.tar.gz"; 12 + sha256 = "1a1dl8h8p76wlcjlvn736mz4nc2nc5c3764rlydiz86wl45mb0nb"; 13 13 }; 14 14 15 15 nativeBuildInputs = stdenv.lib.optionals withGtk [ pkgconfig ]; ··· 23 23 GUI = stdenv.lib.optionalString withGtk "true"; 24 24 25 25 NIX_CFLAGS_COMPILE = [ "-march=core2" ]; 26 - 27 - postPatch = '' 28 - substituteInPlace lib/lua/src/luaconf.h --replace /usr/local $out 29 - substituteInPlace lib/common/wr_lscpu.h --replace /usr/bin/lscpu ${utillinux}/bin/lscpu 30 - ''; 31 26 32 27 installPhase = '' 33 28 install -d $out/bin
+2 -2
pkgs/os-specific/linux/wireguard/default.nix
··· 6 6 let 7 7 name = "wireguard-${version}"; 8 8 9 - version = "0.0.20161223"; 9 + version = "0.0.20161230"; 10 10 11 11 src = fetchurl { 12 12 url = "https://git.zx2c4.com/WireGuard/snapshot/WireGuard-${version}.tar.xz"; 13 - sha256 = "0wmrsap34nd1x4gvz80isgsjjxbplvkrxnw56qlaqxkycvv8zndv"; 13 + sha256 = "15p3k8msk3agr0i96k12y5h4fxv0gc8zqjk15mizd3wwmw6pgjb9"; 14 14 }; 15 15 16 16 meta = with stdenv.lib; {
+2 -2
pkgs/servers/matrix-synapse/default.nix
··· 24 24 }; 25 25 in pythonPackages.buildPythonApplication rec { 26 26 name = "matrix-synapse-${version}"; 27 - version = "0.18.5"; 27 + version = "0.18.6-rc2"; 28 28 29 29 src = fetchFromGitHub { 30 30 owner = "matrix-org"; 31 31 repo = "synapse"; 32 32 rev = "v${version}"; 33 - sha256 = "1l9vfx08alf71323jrfjjvcb7pww613dwxskdgc1bplnva4khj4f"; 33 + sha256 = "0alsby8hghhzgpzism2f9v5pmz91v20bd18nflfka79f3ss03h0q"; 34 34 }; 35 35 36 36 patches = [ ./matrix-synapse.patch ];
+6 -5
pkgs/tools/backup/borg/default.nix
··· 15 15 # For building documentation: 16 16 sphinx sphinx_rtd_theme 17 17 ]; 18 - propagatedBuildInputs = [ 19 - acl lz4 openssl 20 - ] ++ (with python3Packages; [ 21 - cython msgpack llfuse tox detox setuptools_scm 22 - ]); 18 + buildInputs = [ 19 + acl lz4 openssl python3Packages.setuptools_scm 20 + ]; 21 + propagatedBuildInputs = with python3Packages; [ 22 + cython llfuse msgpack 23 + ]; 23 24 24 25 preConfigure = '' 25 26 export BORG_OPENSSL_PREFIX="${openssl.dev}"
+3 -1
pkgs/tools/graphics/netpbm/default.nix
··· 24 24 echo "STATICLIB_TOO = n" >> config.mk 25 25 substituteInPlace "config.mk" \ 26 26 --replace "TIFFLIB = NONE" "TIFFLIB = ${libtiff.out}/lib/libtiff.so" \ 27 - --replace "TIFFHDR_DIR =" "TIFFHDR_DIR = ${libtiff.dev}/include" 27 + --replace "TIFFHDR_DIR =" "TIFFHDR_DIR = ${libtiff.dev}/include" \ 28 + --replace "JPEGLIB = NONE" "JPEGLIB = ${libjpeg.out}/lib/libjpeg.so" \ 29 + --replace "JPEGHDR_DIR =" "JPEGHDR_DIR = ${libjpeg.dev}/include" 28 30 '' + stdenv.lib.optionalString stdenv.isDarwin '' 29 31 echo "LDSHLIB=-dynamiclib -install_name $out/lib/libnetpbm.\$(MAJ).dylib" >> config.mk 30 32 echo "NETPBMLIBTYPE = dylib" >> config.mk
+4 -6
pkgs/tools/misc/bmon/default.nix
··· 1 - { stdenv, fetchFromGitHub, autoconf, automake, pkgconfig, ncurses, confuse 1 + { stdenv, fetchFromGitHub, autoreconfHook, pkgconfig, ncurses, confuse 2 2 , libnl }: 3 3 4 4 stdenv.mkDerivation rec { 5 5 name = "bmon-${version}"; 6 - version = "3.9"; 6 + version = "4.0"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "tgraf"; 10 10 repo = "bmon"; 11 11 rev = "v${version}"; 12 - sha256 = "1a4sj8pf02392zghr9wa1dc8x38fj093d4hg1fcakzrdjvrg1p2h"; 12 + sha256 = "1ilba872c09mnlvylslv4hqv6c9cz36l76q74rr99jvis1dg69gf"; 13 13 }; 14 14 15 - nativeBuildInputs = [ autoconf automake pkgconfig ]; 15 + nativeBuildInputs = [ autoreconfHook pkgconfig ]; 16 16 17 17 buildInputs = [ ncurses confuse libnl ]; 18 - 19 - preConfigure = "sh ./autogen.sh"; 20 18 21 19 meta = with stdenv.lib; { 22 20 description = "Network bandwidth monitor";
+34
pkgs/tools/networking/miredo/default.nix
··· 1 + { stdenv, fetchurl, nettools, iproute, judy }: 2 + 3 + stdenv.mkDerivation rec { 4 + version = "1.2.6"; 5 + name = "miredo-${version}"; 6 + 7 + buildInputs = [ judy ]; 8 + 9 + src = fetchurl { 10 + url = "http://www.remlab.net/files/miredo/miredo-${version}.tar.xz"; 11 + sha256 = "0j9ilig570snbmj48230hf7ms8kvcwi2wblycqrmhh85lksd49ps"; 12 + }; 13 + 14 + postPatch = '' 15 + substituteInPlace misc/client-hook.bsd \ 16 + --replace '/sbin/route' '${nettools}/bin/route' \ 17 + --replace '/sbin/ifconfig' '${nettools}/bin/ifconfig' 18 + substituteInPlace misc/client-hook.iproute --replace '/sbin/ip' '${iproute}/bin/ip' 19 + ''; 20 + 21 + configureFlags = [ "--with-Judy" ]; 22 + 23 + postInstall = '' 24 + rm -rf $out/lib/systemd $out/var $out/etc/miredo/miredo.conf 25 + ''; 26 + 27 + meta = with stdenv.lib; { 28 + description = "Teredo IPv6 Tunneling Daemon"; 29 + homepage = http://www.remlab.net/miredo/; 30 + license = licenses.gpl2; 31 + maintainers = [ maintainers.volth ]; 32 + platforms = platforms.unix; 33 + }; 34 + }
+12 -7
pkgs/tools/networking/ndjbdns/default.nix
··· 1 - { stdenv, fetchurl, systemd, pkgconfig }: 1 + { stdenv, fetchFromGitHub, autoreconfHook, systemd, pkgconfig }: 2 + 3 + with stdenv.lib; 2 4 3 5 stdenv.mkDerivation rec { 4 6 version = "1.06"; 5 7 name = "ndjbdns-${version}"; 6 8 7 - src = fetchurl { 8 - url = "http://pjp.dgplug.org/ndjbdns/${name}.tar.gz"; 9 - sha256 = "09qi5a9abqm08iqmxj74fzzq9x1w5lzr1jlbzj2hl8hz0g2sgraw"; 9 + src = fetchFromGitHub { 10 + owner = "pjps"; 11 + repo = "ndjbdns"; 12 + rev = "64d371b6f887621de7bf8bd495be10442b2accd0"; 13 + sha256 = "0gjyvn8r66kp49gasd6sqfvg2pj0c6v67hnq7cqwl04kj69rfy86"; 10 14 }; 11 15 12 - buildInputs = [ pkgconfig systemd ]; 16 + buildInputs = [ autoreconfHook pkgconfig ] 17 + ++ optional stdenv.isLinux systemd; 13 18 14 - meta = with stdenv.lib; { 19 + meta = { 15 20 description = "A brand new release of the Djbdns"; 16 21 longDescription = '' 17 22 Djbdns is a fully‐fledged Domain Name System(DNS), originally written by the eminent author of qmail, Dr. D J Bernstein. ··· 19 24 homepage = http://pjp.dgplug.org/ndjbdns/; 20 25 license = licenses.gpl2; 21 26 maintainers = [ maintainers.msackman ]; 22 - platforms = platforms.linux; 27 + platforms = platforms.linux ++ platforms.darwin; 23 28 }; 24 29 25 30 }
+7 -8
pkgs/tools/security/gencfsm/default.nix
··· 1 1 { stdenv, fetchurl, autoconf, automake, intltool, libtool, pkgconfig, encfs 2 - , glib , gnome3, gtk3, libgnome_keyring, vala_0_23, wrapGAppsHook, xorg 3 - , libgee_0_6 2 + , glib , gnome3, gtk3, libgnome_keyring, vala, wrapGAppsHook, xorg 4 3 }: 5 4 6 5 stdenv.mkDerivation rec { 7 - version = "1.8.16"; 6 + version = "1.8.18"; 8 7 name = "gnome-encfs-manager-${version}"; 9 8 10 9 src = fetchurl { 11 - url = "https://launchpad.net/gencfsm/trunk/1.8/+download/gnome-encfs-manager_${version}.tar.gz"; 12 - sha256 = "06sz6zcmvxkqww5gx4brcqs4hlpy9d8sal9nmw0pdsvh8k5vmpgn"; 10 + url = "https://launchpad.net/gencfsm/trunk/1.8/+download/gnome-encfs-manager_${version}.tar.xz"; 11 + sha256 = "1rpf683lxa78fmxxb0hnq7vdh3yn7qid2gqq67q9mk65sp9vdhdj"; 13 12 }; 14 13 15 - buildInputs = [ autoconf automake intltool libtool pkgconfig vala_0_23 glib encfs 16 - gtk3 libgnome_keyring libgee_0_6 xorg.libSM xorg.libICE 14 + buildInputs = [ autoconf automake intltool libtool pkgconfig vala glib encfs 15 + gtk3 libgnome_keyring gnome3.libgee xorg.libSM xorg.libICE 17 16 wrapGAppsHook ]; 18 17 19 18 patches = [ ./makefile-mkdir.patch ]; ··· 28 27 29 28 meta = with stdenv.lib; { 30 29 homepage = http://www.libertyzero.com/GEncfsM/; 30 + downloadPage = https://launchpad.net/gencfsm/; 31 31 description = "EncFS manager and mounter with GNOME3 integration"; 32 32 license = licenses.gpl2Plus; 33 33 platforms = platforms.linux; 34 34 maintainers = [ maintainers.spacefrogg ]; 35 - broken = true; 36 35 }; 37 36 }
+41
pkgs/tools/security/gorilla-bin/default.nix
··· 1 + { fetchurl, makeWrapper, patchelf, pkgs, stdenv, libXft, libX11, freetype, fontconfig, libXrender, libXScrnSaver, libXext }: 2 + 3 + stdenv.mkDerivation rec { 4 + name = "gorilla-bin-${version}"; 5 + version = "1.5.3.7"; 6 + 7 + src = fetchurl { 8 + name = "gorilla1537_64.bin"; 9 + url = "http://gorilla.dp100.com/downloads/gorilla1537_64.bin"; 10 + sha256 = "19ir6x4c01825hpx2wbbcxkk70ymwbw4j03v8b2xc13ayylwzx0r"; 11 + }; 12 + 13 + buildInputs = [ patchelf makeWrapper ]; 14 + phases = [ "unpackPhase" "installPhase" ]; 15 + 16 + unpackCmd = '' 17 + mkdir gorilla; 18 + cp $curSrc gorilla/gorilla-${version}; 19 + ''; 20 + 21 + installPhase = let 22 + interpreter = "$(< \"$NIX_CC/nix-support/dynamic-linker\")"; 23 + libPath = stdenv.lib.makeLibraryPath [ libXft libX11 freetype fontconfig libXrender libXScrnSaver libXext ]; 24 + in '' 25 + mkdir -p $out/opt/password-gorilla 26 + mkdir -p $out/bin 27 + cp gorilla-${version} $out/opt/password-gorilla 28 + chmod ugo+x $out/opt/password-gorilla/gorilla-${version} 29 + patchelf --set-interpreter "${interpreter}" "$out/opt/password-gorilla/gorilla-${version}" 30 + makeWrapper "$out/opt/password-gorilla/gorilla-${version}" "$out/bin/gorilla" \ 31 + --prefix LD_LIBRARY_PATH : "${libPath}" 32 + ''; 33 + 34 + meta = { 35 + description = "Password Gorilla is a Tk based password manager"; 36 + homepage = https://github.com/zdia/gorilla/wiki; 37 + maintainers = [ stdenv.lib.maintainers.namore ]; 38 + platforms = [ "x86_64-linux" ]; 39 + license = stdenv.lib.licenses.gpl2; 40 + }; 41 + }
+31 -1
pkgs/top-level/all-packages.nix
··· 905 905 906 906 goa = callPackage ../development/tools/goa { }; 907 907 908 + gorilla-bin = callPackage ../tools/security/gorilla-bin { }; 909 + 908 910 gringo = callPackage ../tools/misc/gringo { }; 909 911 910 912 gti = callPackage ../tools/misc/gti { }; ··· 2711 2713 mairix = callPackage ../tools/text/mairix { }; 2712 2714 2713 2715 makemkv = callPackage ../applications/video/makemkv { }; 2716 + 2717 + makerpm = callPackage ../development/tools/makerpm { }; 2714 2718 2715 2719 # See https://github.com/NixOS/nixpkgs/issues/15849. I'm switching on isLinux because 2716 2720 # it looks like gnulib is broken on non-linux, so it seems likely that this would cause ··· 2799 2803 2800 2804 minixml = callPackage ../development/libraries/minixml { }; 2801 2805 2806 + miredo = callPackage ../tools/networking/miredo { }; 2807 + 2802 2808 mjpegtoolsFull = callPackage ../tools/video/mjpegtools { }; 2803 2809 2804 2810 mjpegtools = self.mjpegtoolsFull.override { ··· 5225 5231 5226 5232 nim = callPackage ../development/compilers/nim { }; 5227 5233 nimble = callPackage ../development/tools/nimble { }; 5234 + nrpl = callPackage ../development/tools/nrpl { }; 5228 5235 5229 5236 neko = callPackage ../development/compilers/neko { }; 5230 5237 ··· 8199 8206 8200 8207 libmcs = callPackage ../development/libraries/libmcs { }; 8201 8208 8209 + libmd = callPackage ../development/libraries/libmd { }; 8210 + 8202 8211 libmemcached = callPackage ../development/libraries/libmemcached { }; 8203 8212 8204 8213 libmicrohttpd = callPackage ../development/libraries/libmicrohttpd { }; ··· 9085 9094 9086 9095 grantlee = callPackage ../development/libraries/grantlee/5.x.nix { }; 9087 9096 9088 - kirigami = callPackage ../development/libraries/kirigami { }; 9097 + kirigami_1 = callPackage ../development/libraries/kirigami { }; 9098 + 9099 + kirigami_2 = callPackage ../development/libraries/kirigami/v2.nix { 9100 + # kirigami v2 requires qt 5.7 and above 9101 + inherit (qt57) qtbase qtquickcontrols2; 9102 + }; 9103 + 9104 + kirigami = kirigami_1; 9089 9105 9090 9106 libcommuni = callPackage ../development/libraries/libcommuni { }; 9091 9107 ··· 9675 9691 wxGTK29 = callPackage ../development/libraries/wxGTK-2.9/default.nix { 9676 9692 inherit (gnome2) GConf; 9677 9693 inherit (darwin.stubs) setfile; 9694 + inherit (darwin.apple_sdk.frameworks) AGL Carbon Cocoa Kernel QuickTime; 9678 9695 withMesa = lib.elem system lib.platforms.mesaPlatforms; 9679 9696 }; 9680 9697 9681 9698 wxGTK30 = callPackage ../development/libraries/wxGTK-3.0/default.nix { 9682 9699 inherit (gnome2) GConf; 9683 9700 inherit (darwin.stubs) setfile; 9701 + inherit (darwin.apple_sdk.frameworks) AGL Carbon Cocoa Kernel QTKit; 9684 9702 withMesa = lib.elem system lib.platforms.mesaPlatforms; 9685 9703 }; 9686 9704 ··· 12299 12317 giflib = giflib_4_1; 12300 12318 }; 12301 12319 12320 + astroid = callPackage ../applications/networking/mailreaders/astroid { }; 12321 + 12302 12322 audacious = callPackage ../applications/audio/audacious { }; 12303 12323 audaciousQt5 = qt5.callPackage ../applications/audio/audacious/qt-5.nix { }; 12304 12324 ··· 13003 13023 fetchmail = callPackage ../applications/misc/fetchmail { }; 13004 13024 13005 13025 flacon = callPackage ../applications/audio/flacon { }; 13026 + 13027 + flexget = callPackage ../applications/networking/flexget { }; 13006 13028 13007 13029 fldigi = callPackage ../applications/audio/fldigi { }; 13008 13030 ··· 14441 14463 14442 14464 posterazor = callPackage ../applications/misc/posterazor { }; 14443 14465 14466 + ppl-address-book = callPackage ../applications/office/ppl-address-book { }; 14467 + 14444 14468 pqiv = callPackage ../applications/graphics/pqiv { }; 14445 14469 14446 14470 qiv = callPackage ../applications/graphics/qiv { }; ··· 16777 16801 16778 16802 sacrifice = callPackage ../applications/science/physics/sacrifice {}; 16779 16803 16804 + sherpa = callPackage ../applications/science/physics/sherpa {}; 16805 + 16780 16806 ### SCIENCE/PROGRAMMING 16781 16807 16782 16808 plm = callPackage ../applications/science/programming/plm { }; ··· 17129 17155 17130 17156 fastjet = callPackage ../development/libraries/physics/fastjet { }; 17131 17157 17158 + fastnlo = callPackage ../development/libraries/physics/fastnlo { }; 17159 + 17132 17160 geant4 = callPackage ../development/libraries/physics/geant4 { 17133 17161 enableMultiThreading = true; 17134 17162 enableG3toG4 = false; ··· 17160 17188 herwig = callPackage ../development/libraries/physics/herwig { }; 17161 17189 17162 17190 lhapdf = callPackage ../development/libraries/physics/lhapdf { }; 17191 + 17192 + mcgrid = callPackage ../development/libraries/physics/mcgrid { }; 17163 17193 17164 17194 nlojet = callPackage ../development/libraries/physics/nlojet { }; 17165 17195
+14 -37
pkgs/top-level/python-packages.nix
··· 2808 2808 }; 2809 2809 }; 2810 2810 2811 - # Needed for bleach 1.5.0 2811 + # Needed for bleach 1.5.0 and calibre 2.76.0 2812 2812 html5lib_0_9999999 = self.html5lib.override rec { 2813 2813 name = "html5lib-${version}"; 2814 2814 buildInputs = with self; [ nose flake8 ]; ··· 11485 11485 homepage = https://github.com/wtforms/wtforms; 11486 11486 description = "A flexible forms validation and rendering library for Python"; 11487 11487 license = licenses.bsd3; 11488 - }; 11489 - }; 11490 - 11491 - flexget = buildPythonPackage rec { 11492 - version = "1.2.337"; 11493 - name = "FlexGet-${version}"; 11494 - disabled = isPy3k; 11495 - 11496 - src = pkgs.fetchurl { 11497 - url = "mirror://pypi/F/FlexGet/${name}.tar.gz"; 11498 - sha256 = "0f7aaf0bf37860f0c5adfb0ba59ca228aa3f5c582131445623a4c3bc82d45346"; 11499 - }; 11500 - 11501 - doCheck = false; 11502 - 11503 - buildInputs = with self; [ nose ]; 11504 - propagatedBuildInputs = with self; [ 11505 - paver feedparser sqlalchemy pyyaml rpyc 11506 - beautifulsoup_4_1_3 html5lib pyrss2gen pynzb progressbar jinja2 flask 11507 - cherrypy requests dateutil_2_1 jsonschema python_tvrage tmdb3 11508 - guessit pathpy apscheduler ] 11509 - # enable deluge and transmission plugin support, if they're installed 11510 - ++ stdenv.lib.optional (pkgs.config.pythonPackages.deluge or false) 11511 - pythonpackages.deluge 11512 - ++ stdenv.lib.optional (pkgs.transmission != null) 11513 - self.transmissionrpc; 11514 - 11515 - meta = { 11516 - homepage = http://flexget.com/; 11517 - description = "Multipurpose automation tool for content like torrents"; 11518 - license = licenses.mit; 11519 - maintainers = with maintainers; [ domenkozar ]; 11520 11488 }; 11521 11489 }; 11522 11490 ··· 25088 25056 }; 25089 25057 25090 25058 syncthing-gtk = buildPythonPackage rec { 25091 - version = "0.6.3"; 25059 + version = "0.9.2.3"; 25092 25060 name = "syncthing-gtk-${version}"; 25093 25061 src = pkgs.fetchFromGitHub { 25094 25062 owner = "syncthing"; 25095 25063 repo = "syncthing-gtk"; 25096 25064 rev = "v${version}"; 25097 - sha256 = "1qa5bw2qizjiqvkms8i31wsjf8cw9p0ciamxgfgq6n37wcalv6ms"; 25065 + sha256 = "0chl0f0kp6z0z00d1f3xjlicjfr9rzabw39wmjr66fwb5w5hcc42"; 25098 25066 }; 25099 25067 25100 25068 disabled = isPy3k; 25101 25069 25102 - propagatedBuildInputs = with self; [ pkgs.syncthing dateutil pyinotify pkgs.libnotify pkgs.psmisc 25103 - pygobject3 pkgs.gtk3 ]; 25070 + propagatedBuildInputs = with self; [ pkgs.syncthing dateutil pyinotify 25071 + pkgs.libnotify 25072 + (pkgs.librsvg.override { withGTK = true; }) 25073 + pkgs.psmisc pygobject3 pkgs.gtk3 25074 + ]; 25075 + 25076 + preFixup = '' 25077 + wrapProgram $out/bin/syncthing-gtk \ 25078 + --set GDK_PIXBUF_MODULE_FILE "$GDK_PIXBUF_MODULE_FILE" \ 25079 + --prefix GI_TYPELIB_PATH : "$GI_TYPELIB_PATH" 25080 + ''; 25104 25081 25105 25082 patchPhase = '' 25106 25083 substituteInPlace "scripts/syncthing-gtk" \
+3 -3
pkgs/top-level/rust-packages.nix
··· 7 7 { runCommand, fetchFromGitHub, git }: 8 8 9 9 let 10 - version = "2016-12-16"; 11 - rev = "1da5a7d0cd31d72324481760067bde5cf2e07be5"; 12 - sha256 = "0kbh3aq738sqns8w6yfia17fwrk98g6m763wqsqwhnrg2ndqrp8d"; 10 + version = "2016-12-28"; 11 + rev = "3399254d4a021d07736944b339a8794eddcda517"; 12 + sha256 = "1vbixbgzv21anqayz8ya0x1qlzndb7fpdf9dyh4yyscl1kaibvg9"; 13 13 14 14 src = fetchFromGitHub { 15 15 inherit rev;