Merge branch 'master' into staging

+1414 -459
+1 -1
COPYING
··· 1 - Copyright (c) 2003-2016 Eelco Dolstra and the Nixpkgs/NixOS contributors 2 3 Permission is hereby granted, free of charge, to any person obtaining 4 a copy of this software and associated documentation files (the
··· 1 + Copyright (c) 2003-2017 Eelco Dolstra and the Nixpkgs/NixOS contributors 2 3 Permission is hereby granted, free of charge, to any person obtaining 4 a copy of this software and associated documentation files (the
+3
lib/maintainers.nix
··· 201 ianwookim = "Ian-Woo Kim <ianwookim@gmail.com>"; 202 igsha = "Igor Sharonov <igor.sharonov@gmail.com>"; 203 ikervagyok = "Balázs Lengyel <ikervagyok@gmail.com>"; 204 j-keck = "Jürgen Keck <jhyphenkeck@gmail.com>"; 205 jagajaga = "Arseniy Seroka <ars.seroka@gmail.com>"; 206 javaguirre = "Javier Aguirre <contacto@javaguirre.net>"; ··· 241 lassulus = "Lassulus <lassulus@gmail.com>"; 242 layus = "Guillaume Maudoux <layus.on@gmail.com>"; 243 ldesgoui = "Lucas Desgouilles <ldesgoui@gmail.com>"; 244 lebastr = "Alexander Lebedev <lebastr@gmail.com>"; 245 leenaars = "Michiel Leenaars <ml.software@leenaa.rs>"; 246 leonardoce = "Leonardo Cecchi <leonardo.cecchi@gmail.com>"; ··· 315 mudri = "James Wood <lamudri@gmail.com>"; 316 muflax = "Stefan Dorn <mail@muflax.com>"; 317 myrl = "Myrl Hex <myrl.0xf@gmail.com>"; 318 nand0p = "Fernando Jose Pando <nando@hex7.com>"; 319 Nate-Devv = "Nathan Moore <natedevv@gmail.com>"; 320 nathan-gs = "Nathan Bijnens <nathan@nathan.gs>";
··· 201 ianwookim = "Ian-Woo Kim <ianwookim@gmail.com>"; 202 igsha = "Igor Sharonov <igor.sharonov@gmail.com>"; 203 ikervagyok = "Balázs Lengyel <ikervagyok@gmail.com>"; 204 + ivan-tkatchev = "Ivan Tkatchev <tkatchev@gmail.com>"; 205 j-keck = "Jürgen Keck <jhyphenkeck@gmail.com>"; 206 jagajaga = "Arseniy Seroka <ars.seroka@gmail.com>"; 207 javaguirre = "Javier Aguirre <contacto@javaguirre.net>"; ··· 242 lassulus = "Lassulus <lassulus@gmail.com>"; 243 layus = "Guillaume Maudoux <layus.on@gmail.com>"; 244 ldesgoui = "Lucas Desgouilles <ldesgoui@gmail.com>"; 245 + league = "Christopher League <league@contrapunctus.net>"; 246 lebastr = "Alexander Lebedev <lebastr@gmail.com>"; 247 leenaars = "Michiel Leenaars <ml.software@leenaa.rs>"; 248 leonardoce = "Leonardo Cecchi <leonardo.cecchi@gmail.com>"; ··· 317 mudri = "James Wood <lamudri@gmail.com>"; 318 muflax = "Stefan Dorn <mail@muflax.com>"; 319 myrl = "Myrl Hex <myrl.0xf@gmail.com>"; 320 + namore = "Roman Naumann <namor@hemio.de>"; 321 nand0p = "Fernando Jose Pando <nando@hex7.com>"; 322 Nate-Devv = "Nathan Moore <natedevv@gmail.com>"; 323 nathan-gs = "Nathan Bijnens <nathan@nathan.gs>";
+1 -1
nixos/lib/make-system-tarball.sh
··· 54 55 rm env-vars 56 57 - tar --sort=name --mtime='1970-01-01' -cvJf $out/tarball/$fileName.tar.xz * $extraArgs 58 59 mkdir -p $out/nix-support 60 echo $system > $out/nix-support/system
··· 54 55 rm env-vars 56 57 + tar --sort=name --mtime='@1' --owner=0 --group=0 --numeric-owner -cvJf $out/tarball/$fileName.tar.xz * $extraArgs 58 59 mkdir -p $out/nix-support 60 echo $system > $out/nix-support/system
+2
nixos/modules/misc/ids.nix
··· 281 riak-cs = 263; 282 infinoted = 264; 283 keystone = 265; 284 285 # When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399! 286 ··· 532 riak-cs = 263; 533 infinoted = 264; 534 keystone = 265; 535 536 # When adding a gid, make sure it doesn't match an existing 537 # uid. Users and groups with the same name should have equal
··· 281 riak-cs = 263; 282 infinoted = 264; 283 keystone = 265; 284 + glance = 266; 285 286 # When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399! 287 ··· 533 riak-cs = 263; 534 infinoted = 264; 535 keystone = 265; 536 + glance = 266; 537 538 # When adding a gid, make sure it doesn't match an existing 539 # uid. Users and groups with the same name should have equal
+3
nixos/modules/module-list.nix
··· 71 ./programs/environment.nix 72 ./programs/fish.nix 73 ./programs/freetds.nix 74 ./programs/info.nix 75 ./programs/java.nix 76 ./programs/kbdlight.nix ··· 392 ./services/networking/minidlna.nix 393 ./services/networking/miniupnpd.nix 394 ./services/networking/mosquitto.nix 395 ./services/networking/mstpd.nix 396 ./services/networking/murmur.nix 397 ./services/networking/namecoind.nix ··· 632 ./virtualisation/xen-dom0.nix 633 ./virtualisation/xe-guest-utilities.nix 634 ./virtualisation/openstack/keystone.nix 635 ]
··· 71 ./programs/environment.nix 72 ./programs/fish.nix 73 ./programs/freetds.nix 74 + ./programs/gphoto2.nix 75 ./programs/info.nix 76 ./programs/java.nix 77 ./programs/kbdlight.nix ··· 393 ./services/networking/minidlna.nix 394 ./services/networking/miniupnpd.nix 395 ./services/networking/mosquitto.nix 396 + ./services/networking/miredo.nix 397 ./services/networking/mstpd.nix 398 ./services/networking/murmur.nix 399 ./services/networking/namecoind.nix ··· 634 ./virtualisation/xen-dom0.nix 635 ./virtualisation/xe-guest-utilities.nix 636 ./virtualisation/openstack/keystone.nix 637 + ./virtualisation/openstack/glance.nix 638 ]
+31
nixos/modules/programs/gphoto2.nix
···
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; 4 + 5 + { 6 + meta.maintainers = [ maintainers.league ]; 7 + 8 + ###### interface 9 + options = { 10 + programs.gphoto2 = { 11 + enable = mkOption { 12 + default = false; 13 + example = true; 14 + type = types.bool; 15 + description = '' 16 + Whether to configure system to use gphoto2. 17 + To grant digital camera access to a user, the user must 18 + be part of the camera group: 19 + <code>users.extraUsers.alice.extraGroups = ["camera"];</code> 20 + ''; 21 + }; 22 + }; 23 + }; 24 + 25 + ###### implementation 26 + config = mkIf config.programs.gphoto2.enable { 27 + services.udev.packages = [ pkgs.libgphoto2 ]; 28 + environment.systemPackages = [ pkgs.gphoto2 ]; 29 + users.extraGroups.camera = {}; 30 + }; 31 + }
+3
nixos/modules/rename.nix
··· 150 # tarsnap 151 (mkRemovedOptionModule [ "services" "tarsnap" "cachedir" ] "Use services.tarsnap.archives.<name>.cachedir") 152 153 # Options that are obsolete and have no replacement. 154 (mkRemovedOptionModule [ "boot" "initrd" "luks" "enable" ] "") 155 (mkRemovedOptionModule [ "programs" "bash" "enable" ] "")
··· 150 # tarsnap 151 (mkRemovedOptionModule [ "services" "tarsnap" "cachedir" ] "Use services.tarsnap.archives.<name>.cachedir") 152 153 + # alsa 154 + (mkRenamedOptionModule [ "sound" "enableMediaKeys" ] [ "sound" "mediaKeys" "enable" ]) 155 + 156 # Options that are obsolete and have no replacement. 157 (mkRemovedOptionModule [ "boot" "initrd" "luks" "enable" ] "") 158 (mkRemovedOptionModule [ "programs" "bash" "enable" ] "")
+28 -13
nixos/modules/services/audio/alsa.nix
··· 33 ''; 34 }; 35 36 - enableMediaKeys = mkOption { 37 - type = types.bool; 38 - default = false; 39 - description = '' 40 - Whether to enable volume and capture control with keyboard media keys. 41 - 42 - Enabling this will turn on <option>services.actkbd</option>. 43 - ''; 44 - }; 45 - 46 extraConfig = mkOption { 47 type = types.lines; 48 default = ""; ··· 54 ''; 55 }; 56 57 }; 58 59 }; ··· 90 }; 91 }; 92 93 - services.actkbd = mkIf config.sound.enableMediaKeys { 94 enable = true; 95 bindings = [ 96 # "Mute" media key 97 { keys = [ 113 ]; events = [ "key" ]; command = "${alsaUtils}/bin/amixer -q set Master toggle"; } 98 99 # "Lower Volume" media key 100 - { keys = [ 114 ]; events = [ "key" "rep" ]; command = "${alsaUtils}/bin/amixer -q set Master 1- unmute"; } 101 102 # "Raise Volume" media key 103 - { keys = [ 115 ]; events = [ "key" "rep" ]; command = "${alsaUtils}/bin/amixer -q set Master 1+ unmute"; } 104 105 # "Mic Mute" media key 106 { keys = [ 190 ]; events = [ "key" ]; command = "${alsaUtils}/bin/amixer -q set Capture toggle"; }
··· 33 ''; 34 }; 35 36 extraConfig = mkOption { 37 type = types.lines; 38 default = ""; ··· 44 ''; 45 }; 46 47 + mediaKeys = { 48 + 49 + enable = mkOption { 50 + type = types.bool; 51 + default = false; 52 + description = '' 53 + Whether to enable volume and capture control with keyboard media keys. 54 + 55 + Enabling this will turn on <option>services.actkbd</option>. 56 + ''; 57 + }; 58 + 59 + volumeStep = mkOption { 60 + type = types.string; 61 + default = "1"; 62 + example = "1%"; 63 + description = '' 64 + The value by which to increment/decrement volume on media keys. 65 + 66 + See amixer(1) for allowed values. 67 + ''; 68 + }; 69 + 70 + }; 71 + 72 }; 73 74 }; ··· 105 }; 106 }; 107 108 + services.actkbd = mkIf config.sound.mediaKeys.enable { 109 enable = true; 110 bindings = [ 111 # "Mute" media key 112 { keys = [ 113 ]; events = [ "key" ]; command = "${alsaUtils}/bin/amixer -q set Master toggle"; } 113 114 # "Lower Volume" media key 115 + { keys = [ 114 ]; events = [ "key" "rep" ]; command = "${alsaUtils}/bin/amixer -q set Master ${config.sound.mediaKeys.volumeStep}- unmute"; } 116 117 # "Raise Volume" media key 118 + { keys = [ 115 ]; events = [ "key" "rep" ]; command = "${alsaUtils}/bin/amixer -q set Master ${config.sound.mediaKeys.volumeStep}+ unmute"; } 119 120 # "Mic Mute" media key 121 { keys = [ 190 ]; events = [ "key" ]; command = "${alsaUtils}/bin/amixer -q set Capture toggle"; }
+4 -4
nixos/modules/services/audio/mpd.nix
··· 83 84 listenAddress = mkOption { 85 type = types.str; 86 - default = "any"; 87 description = '' 88 - This setting sets the address for the daemon to listen on. Careful attention 89 - should be paid if this is assigned to anything other then the default, any. 90 - This setting can deny access to control of the daemon. 91 ''; 92 }; 93
··· 83 84 listenAddress = mkOption { 85 type = types.str; 86 + default = "127.0.0.1"; 87 + example = "any"; 88 description = '' 89 + The address for the daemon to listen on. 90 + Use <literal>any</literal> to listen on all addresses. 91 ''; 92 }; 93
+2
nixos/modules/services/networking/dnscrypt-proxy.nix
··· 263 systemd.services.dnscrypt-proxy = { 264 description = "dnscrypt-proxy daemon"; 265 266 after = [ "network.target" ] 267 ++ optional apparmorEnabled "apparmor.service" 268 ++ optional useUpstreamResolverList "init-dnscrypt-proxy-statedir.service";
··· 263 systemd.services.dnscrypt-proxy = { 264 description = "dnscrypt-proxy daemon"; 265 266 + before = [ "nss-lookup.target" ]; 267 + 268 after = [ "network.target" ] 269 ++ optional apparmorEnabled "apparmor.service" 270 ++ optional useUpstreamResolverList "init-dnscrypt-proxy-statedir.service";
+93
nixos/modules/services/networking/miredo.nix
···
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; 4 + 5 + let 6 + cfg = config.services.miredo; 7 + pidFile = "/run/miredo.pid"; 8 + miredoConf = pkgs.writeText "miredo.conf" '' 9 + InterfaceName ${cfg.interfaceName} 10 + ServerAddress ${cfg.serverAddress} 11 + ${optionalString (cfg.bindAddress != null) "BindAddress ${cfg.bindAddress}"} 12 + ${optionalString (cfg.bindPort != null) "BindPort ${cfg.bindPort}"} 13 + ''; 14 + in 15 + { 16 + 17 + ###### interface 18 + 19 + options = { 20 + 21 + services.miredo = { 22 + 23 + enable = mkEnableOption "Whether miredo should be run on startup."; 24 + 25 + package = mkOption { 26 + type = types.package; 27 + default = pkgs.miredo; 28 + defaultText = "pkgs.miredo"; 29 + description = '' 30 + The package to use for the miredo daemon's binary. 31 + ''; 32 + }; 33 + 34 + serverAddress = mkOption { 35 + default = "teredo.remlab.net"; 36 + type = types.str; 37 + description = '' 38 + The hostname or primary IPv4 address of the Teredo server. 39 + This setting is required if Miredo runs as a Teredo client. 40 + "teredo.remlab.net" is an experimental service for testing only. 41 + Please use another server for production and/or large scale deployments. 42 + ''; 43 + }; 44 + 45 + interfaceName = mkOption { 46 + default = "teredo"; 47 + type = types.str; 48 + description = '' 49 + Name of the network tunneling interface. 50 + ''; 51 + }; 52 + 53 + bindAddress = mkOption { 54 + default = null; 55 + type = types.nullOr types.str; 56 + description = '' 57 + Depending on the local firewall/NAT rules, you might need to force 58 + Miredo to use a fixed UDP port and or IPv4 address. 59 + ''; 60 + }; 61 + 62 + bindPort = mkOption { 63 + default = null; 64 + type = types.nullOr types.str; 65 + description = '' 66 + Depending on the local firewall/NAT rules, you might need to force 67 + Miredo to use a fixed UDP port and or IPv4 address. 68 + ''; 69 + }; 70 + }; 71 + }; 72 + 73 + 74 + ###### implementation 75 + 76 + config = mkIf cfg.enable { 77 + 78 + systemd.services.miredo = { 79 + wantedBy = [ "multi-user.target" ]; 80 + after = [ "network.target" ]; 81 + description = "Teredo IPv6 Tunneling Daemon"; 82 + serviceConfig = { 83 + Restart = "always"; 84 + RestartSec = "5s"; 85 + ExecStartPre = "${cfg.package}/bin/miredo-checkconf -f ${miredoConf}"; 86 + ExecStart = "${cfg.package}/bin/miredo -c ${miredoConf} -p ${pidFile} -f"; 87 + ExecReload = "/bin/kill -HUP $MAINPID"; 88 + }; 89 + }; 90 + 91 + }; 92 + 93 + }
+3 -3
nixos/modules/services/torrent/flexget.nix
··· 4 5 let 6 cfg = config.services.flexget; 7 - pkg = pkgs.python27Packages.flexget; 8 ymlFile = pkgs.writeText "flexget.yml" '' 9 ${cfg.config} 10 ··· 54 55 config = mkIf cfg.enable { 56 57 - environment.systemPackages = [ pkgs.python27Packages.flexget ]; 58 59 systemd.services = { 60 flexget = { 61 description = "FlexGet Daemon"; 62 - path = [ pkgs.pythonPackages.flexget ]; 63 serviceConfig = { 64 User = cfg.user; 65 Environment = "TZ=${config.time.timeZone}";
··· 4 5 let 6 cfg = config.services.flexget; 7 + pkg = pkgs.flexget; 8 ymlFile = pkgs.writeText "flexget.yml" '' 9 ${cfg.config} 10 ··· 54 55 config = mkIf cfg.enable { 56 57 + environment.systemPackages = [ pkg ]; 58 59 systemd.services = { 60 flexget = { 61 description = "FlexGet Daemon"; 62 + path = [ pkg ]; 63 serviceConfig = { 64 User = cfg.user; 65 Environment = "TZ=${config.time.timeZone}";
+1
nixos/modules/services/x11/desktop-managers/gnome3.nix
··· 123 services.packagekit.enable = mkDefault true; 124 hardware.bluetooth.enable = mkDefault true; 125 services.xserver.libinput.enable = mkDefault true; # for controlling touchpad settings via gnome control center 126 127 fonts.fonts = [ pkgs.dejavu_fonts pkgs.cantarell_fonts ]; 128
··· 123 services.packagekit.enable = mkDefault true; 124 hardware.bluetooth.enable = mkDefault true; 125 services.xserver.libinput.enable = mkDefault true; # for controlling touchpad settings via gnome control center 126 + services.udev.packages = [ pkgs.gnome3.gnome_settings_daemon ]; 127 128 fonts.fonts = [ pkgs.dejavu_fonts pkgs.cantarell_fonts ]; 129
+4
nixos/modules/virtualisation/docker.nix
··· 130 } 131 ]); 132 133 }
··· 130 } 131 ]); 132 133 + imports = [ 134 + (mkRemovedOptionModule ["virtualisation" "docker" "socketActivation"] "This option was removed in favor of starting docker at boot") 135 + ]; 136 + 137 }
+30
nixos/modules/virtualisation/openstack/common.nix
··· 51 }; 52 };}); 53 }; 54 }
··· 51 }; 52 };}); 53 }; 54 + 55 + databaseOption = name: { 56 + host = mkOption { 57 + type = types.str; 58 + default = "localhost"; 59 + description = '' 60 + Host of the database. 61 + ''; 62 + }; 63 + 64 + name = mkOption { 65 + type = types.str; 66 + default = name; 67 + description = '' 68 + Name of the existing database. 69 + ''; 70 + }; 71 + 72 + user = mkOption { 73 + type = types.str; 74 + default = name; 75 + description = '' 76 + The database user. The user must exist and has access to 77 + the specified database. 78 + ''; 79 + }; 80 + password = mkSecretOption { 81 + name = name + "MysqlPassword"; 82 + description = "The database user's password";}; 83 + }; 84 }
+245
nixos/modules/virtualisation/openstack/glance.nix
···
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; with import ./common.nix {inherit lib;}; 4 + 5 + let 6 + cfg = config.virtualisation.openstack.glance; 7 + commonConf = '' 8 + [database] 9 + connection = "mysql://${cfg.database.user}:${cfg.database.password.pattern}@${cfg.database.host}/${cfg.database.name}" 10 + notification_driver = noop 11 + 12 + [keystone_authtoken] 13 + auth_url = ${cfg.authUrl} 14 + auth_plugin = password 15 + project_name = service 16 + project_domain_id = default 17 + user_domain_id = default 18 + username = ${cfg.serviceUsername} 19 + password = ${cfg.servicePassword.pattern} 20 + 21 + [glance_store] 22 + default_store = file 23 + filesystem_store_datadir = /var/lib/glance/images/ 24 + ''; 25 + glanceApiConfTpl = pkgs.writeText "glance-api.conf" '' 26 + ${commonConf} 27 + 28 + [paste_deploy] 29 + flavor = keystone 30 + config_file = ${cfg.package}/etc/glance-api-paste.ini 31 + ''; 32 + glanceRegistryConfTpl = pkgs.writeText "glance-registry.conf" '' 33 + ${commonConf} 34 + 35 + [paste_deploy] 36 + config_file = ${cfg.package}/etc/glance-registry-paste.ini 37 + ''; 38 + glanceApiConf = "/var/lib/glance/glance-api.conf"; 39 + glanceRegistryConf = "/var/lib/glance/glance-registry.conf"; 40 + 41 + in { 42 + options.virtualisation.openstack.glance = { 43 + package = mkOption { 44 + type = types.package; 45 + default = pkgs.glance; 46 + example = literalExample "pkgs.glance"; 47 + description = '' 48 + Glance package to use. 49 + ''; 50 + }; 51 + 52 + enable = mkOption { 53 + default = false; 54 + type = types.bool; 55 + description = '' 56 + This option enables Glance as a single-machine 57 + installation. That is, all of Glance's components are 58 + enabled on this machine. This is useful for evaluating and 59 + experimenting with Glance. Note we are currently not 60 + providing any configurations for a multi-node setup. 61 + ''; 62 + }; 63 + 64 + authUrl = mkOption { 65 + type = types.str; 66 + default = http://localhost:5000; 67 + description = '' 68 + Complete public Identity (Keystone) API endpoint. Note this is 69 + unversionned. 70 + ''; 71 + }; 72 + 73 + serviceUsername = mkOption { 74 + type = types.str; 75 + default = "glance"; 76 + description = '' 77 + The Glance service username. This user is created if bootstrap 78 + is enable, otherwise it has to be manually created before 79 + starting this service. 80 + ''; 81 + }; 82 + 83 + servicePassword = mkSecretOption { 84 + name = "glanceAdminPassword"; 85 + description = '' 86 + The Glance service user's password. 87 + ''; 88 + }; 89 + 90 + database = databaseOption "glance"; 91 + 92 + bootstrap = { 93 + enable = mkOption { 94 + default = false; 95 + type = types.bool; 96 + description = '' 97 + Bootstrap the Glance service by creating the service tenant, 98 + an admin account and a public endpoint. This option provides 99 + a ready-to-use glance service. This is only done at the 100 + first Glance execution by the systemd post start section. 101 + The keystone admin account is used to create required 102 + Keystone resource for the Glance service. 103 + 104 + <note><para> This option is a helper for setting up 105 + development or testing environments.</para></note> 106 + ''; 107 + }; 108 + 109 + endpointPublic = mkOption { 110 + type = types.str; 111 + default = "http://localhost:9292"; 112 + description = '' 113 + The public image endpoint. The link <link 114 + xlink:href="http://docs.openstack.org/liberty/install-guide-rdo/keystone-services.html"> 115 + create endpoint</link> provides more informations 116 + about that. 117 + ''; 118 + }; 119 + 120 + keystoneAdminUsername = mkOption { 121 + type = types.str; 122 + default = "admin"; 123 + description = '' 124 + The keystone admin user name used to create the Glance account. 125 + ''; 126 + }; 127 + 128 + keystoneAdminPassword = mkSecretOption { 129 + name = "keystoneAdminPassword"; 130 + description = '' 131 + The keystone admin user's password. 132 + ''; 133 + }; 134 + 135 + keystoneAdminTenant = mkOption { 136 + type = types.str; 137 + default = "admin"; 138 + description = '' 139 + The keystone admin tenant used to create the Glance account. 140 + ''; 141 + }; 142 + keystoneAuthUrl = mkOption { 143 + type = types.str; 144 + default = "http://localhost:5000/v2.0"; 145 + description = '' 146 + The keystone auth url used to create the Glance account. 147 + ''; 148 + }; 149 + }; 150 + }; 151 + 152 + config = mkIf cfg.enable { 153 + users.extraUsers = [{ 154 + name = "glance"; 155 + group = "glance"; 156 + uid = config.ids.gids.glance; 157 + 158 + }]; 159 + users.extraGroups = [{ 160 + name = "glance"; 161 + gid = config.ids.gids.glance; 162 + }]; 163 + 164 + systemd.services.glance-registry = { 165 + description = "OpenStack Glance Registry Daemon"; 166 + after = [ "network.target"]; 167 + path = [ pkgs.curl pkgs.pythonPackages.keystoneclient pkgs.gawk ]; 168 + wantedBy = [ "multi-user.target" ]; 169 + preStart = '' 170 + mkdir -m 775 -p /var/lib/glance/{images,scrubber,image_cache} 171 + chown glance:glance /var/lib/glance/{images,scrubber,image_cache} 172 + 173 + # Secret file managment 174 + cp ${glanceRegistryConfTpl} ${glanceRegistryConf}; 175 + chown glance:glance ${glanceRegistryConf}; 176 + chmod 640 ${glanceRegistryConf} 177 + ${replaceSecret cfg.database.password glanceRegistryConf} 178 + ${replaceSecret cfg.servicePassword glanceRegistryConf} 179 + 180 + cp ${glanceApiConfTpl} ${glanceApiConf}; 181 + chown glance:glance ${glanceApiConf}; 182 + chmod 640 ${glanceApiConf} 183 + ${replaceSecret cfg.database.password glanceApiConf} 184 + ${replaceSecret cfg.servicePassword glanceApiConf} 185 + 186 + # Initialise the database 187 + ${cfg.package}/bin/glance-manage --config-file=${glanceApiConf} --config-file=${glanceRegistryConf} db_sync 188 + ''; 189 + postStart = '' 190 + set -eu 191 + export OS_AUTH_URL=${cfg.bootstrap.keystoneAuthUrl} 192 + export OS_USERNAME=${cfg.bootstrap.keystoneAdminUsername} 193 + export OS_PASSWORD=${getSecret cfg.bootstrap.keystoneAdminPassword} 194 + export OS_TENANT_NAME=${cfg.bootstrap.keystoneAdminTenant} 195 + 196 + # Wait until the keystone is available for use 197 + count=0 198 + while ! keystone user-get ${cfg.bootstrap.keystoneAdminUsername} > /dev/null 199 + do 200 + if [ $count -eq 30 ] 201 + then 202 + echo "Tried 30 times, giving up..." 203 + exit 1 204 + fi 205 + 206 + echo "Keystone not yet started. Waiting for 1 second..." 207 + count=$((count++)) 208 + sleep 1 209 + done 210 + 211 + # If the service glance doesn't exist, we consider glance is 212 + # not initialized 213 + if ! keystone service-get glance 214 + then 215 + keystone service-create --type image --name glance 216 + ID=$(keystone service-get glance | awk '/ id / { print $4 }') 217 + keystone endpoint-create --region RegionOne --service $ID --internalurl http://localhost:9292 --adminurl http://localhost:9292 --publicurl ${cfg.bootstrap.endpointPublic} 218 + 219 + keystone user-create --name ${cfg.serviceUsername} --tenant service --pass ${getSecret cfg.servicePassword} 220 + keystone user-role-add --tenant service --user ${cfg.serviceUsername} --role admin 221 + fi 222 + ''; 223 + serviceConfig = { 224 + PermissionsStartOnly = true; # preStart must be run as root 225 + TimeoutStartSec = "600"; # 10min for initial db migrations 226 + User = "glance"; 227 + Group = "glance"; 228 + ExecStart = "${cfg.package}/bin/glance-registry --config-file=${glanceRegistryConf}"; 229 + }; 230 + }; 231 + systemd.services.glance-api = { 232 + description = "OpenStack Glance API Daemon"; 233 + after = [ "glance-registry.service" "network.target"]; 234 + requires = [ "glance-registry.service" "network.target"]; 235 + wantedBy = [ "multi-user.target" ]; 236 + serviceConfig = { 237 + PermissionsStartOnly = true; # preStart must be run as root 238 + User = "glance"; 239 + Group = "glance"; 240 + ExecStart = "${cfg.package}/bin/glance-api --config-file=${glanceApiConf}"; 241 + }; 242 + }; 243 + }; 244 + 245 + }
+1
nixos/release.nix
··· 242 tests.firewall = callTest tests/firewall.nix {}; 243 tests.fleet = hydraJob (import tests/fleet.nix { system = "x86_64-linux"; }); 244 #tests.gitlab = callTest tests/gitlab.nix {}; 245 tests.gocd-agent = callTest tests/gocd-agent.nix {}; 246 tests.gocd-server = callTest tests/gocd-server.nix {}; 247 tests.gnome3 = callTest tests/gnome3.nix {};
··· 242 tests.firewall = callTest tests/firewall.nix {}; 243 tests.fleet = hydraJob (import tests/fleet.nix { system = "x86_64-linux"; }); 244 #tests.gitlab = callTest tests/gitlab.nix {}; 245 + tests.glance = callTest tests/glance.nix {}; 246 tests.gocd-agent = callTest tests/gocd-agent.nix {}; 247 tests.gocd-server = callTest tests/gocd-server.nix {}; 248 tests.gnome3 = callTest tests/gnome3.nix {};
+77
nixos/tests/glance.nix
···
··· 1 + { system ? builtins.currentSystem }: 2 + 3 + with import ../lib/testing.nix { inherit system; }; 4 + with pkgs.lib; 5 + 6 + let 7 + glanceMysqlPassword = "glanceMysqlPassword"; 8 + glanceAdminPassword = "glanceAdminPassword"; 9 + 10 + createDb = pkgs.writeText "db-provisionning.sql" '' 11 + create database keystone; 12 + GRANT ALL PRIVILEGES ON keystone.* TO 'keystone'@'localhost' IDENTIFIED BY 'keystone'; 13 + GRANT ALL PRIVILEGES ON keystone.* TO 'keystone'@'%' IDENTIFIED BY 'keystone'; 14 + 15 + create database glance; 16 + GRANT ALL PRIVILEGES ON glance.* TO 'glance'@'localhost' IDENTIFIED BY '${glanceMysqlPassword}'; 17 + GRANT ALL PRIVILEGES ON glance.* TO 'glance'@'%' IDENTIFIED BY '${glanceMysqlPassword}'; 18 + ''; 19 + 20 + image = 21 + (import ../lib/eval-config.nix { 22 + inherit system; 23 + modules = [ ../../nixos/modules/virtualisation/nova-image.nix ]; 24 + }).config.system.build.novaImage; 25 + 26 + # The admin keystone account 27 + adminOpenstackCmd = "OS_TENANT_NAME=admin OS_USERNAME=admin OS_PASSWORD=keystone OS_AUTH_URL=http://localhost:5000/v3 OS_IDENTITY_API_VERSION=3 openstack"; 28 + 29 + in makeTest { 30 + meta = with pkgs.stdenv.lib.maintainers; { 31 + maintainers = [ lewo ]; 32 + }; 33 + machine = 34 + { config, pkgs, ... }: 35 + { 36 + services.mysql.enable = true; 37 + services.mysql.package = pkgs.mysql; 38 + services.mysql.initialScript = createDb; 39 + 40 + virtualisation = { 41 + openstack.keystone = { 42 + enable = true; 43 + database.password = { value = "keystone"; storage = "fromNixStore"; }; 44 + adminToken = { value = "adminToken"; storage = "fromNixStore"; }; 45 + bootstrap.enable = true; 46 + bootstrap.adminPassword = { value = "keystone"; storage = "fromNixStore"; }; 47 + }; 48 + 49 + openstack.glance = { 50 + enable = true; 51 + database.password = { value = glanceMysqlPassword; storage = "fromNixStore"; }; 52 + servicePassword = { value = glanceAdminPassword; storage = "fromNixStore"; }; 53 + 54 + bootstrap = { 55 + enable = true; 56 + keystoneAdminPassword = { value = "keystone"; storage = "fromNixStore"; }; 57 + }; 58 + }; 59 + 60 + memorySize = 2096; 61 + diskSize = 4 * 1024; 62 + }; 63 + 64 + environment.systemPackages = with pkgs.pythonPackages; with pkgs; [ 65 + openstackclient 66 + ]; 67 + }; 68 + 69 + testScript = 70 + '' 71 + $machine->waitForUnit("glance-api.service"); 72 + 73 + # Since Glance api can take time to start, we retry until success 74 + $machine->waitUntilSucceeds("${adminOpenstackCmd} image create nixos --file ${image}/nixos.img --disk-format qcow2 --container-format bare --public"); 75 + $machine->succeed("${adminOpenstackCmd} image list") =~ /nixos/ or die; 76 + ''; 77 + }
+5 -4
pkgs/applications/editors/kakoune/default.nix
··· 4 5 stdenv.mkDerivation rec { 6 name = "kakoune-nightly-${version}"; 7 - version = "2016-12-10"; 8 src = fetchFromGitHub { 9 repo = "kakoune"; 10 owner = "mawww"; 11 - rev = "e44129577a010ebb4dc609b806104d3175659074"; 12 - sha256 = "1jkpbk6wa9x5nlv002y1whv6ddhqawxzbp3jcbzcb51cg8bz0b1l"; 13 }; 14 buildInputs = [ ncurses boost asciidoc docbook_xsl libxslt ]; 15 16 buildPhase = '' 17 sed -ie 's#--no-xmllint#--no-xmllint --xsltproc-opts="--nonet"#g' src/Makefile 18 export PREFIX=$out 19 (cd src && make ) 20 ''; ··· 28 description = "A vim inspired text editor"; 29 license = licenses.publicDomain; 30 maintainers = with maintainers; [ vrthra ]; 31 - platforms = platforms.linux; 32 }; 33 }
··· 4 5 stdenv.mkDerivation rec { 6 name = "kakoune-nightly-${version}"; 7 + version = "2016-12-30"; 8 src = fetchFromGitHub { 9 repo = "kakoune"; 10 owner = "mawww"; 11 + rev = "76c58aa022a896dc170c207ff821992ee354d934"; 12 + sha256 = "0hgpcp6444cyg4bm0a9ypywjwfh19qpqpfr5w0wcd2y3clnsvsdz"; 13 }; 14 buildInputs = [ ncurses boost asciidoc docbook_xsl libxslt ]; 15 16 buildPhase = '' 17 sed -ie 's#--no-xmllint#--no-xmllint --xsltproc-opts="--nonet"#g' src/Makefile 18 + substituteInPlace src/Makefile --replace "boost_regex-mt" "boost_regex" 19 export PREFIX=$out 20 (cd src && make ) 21 ''; ··· 29 description = "A vim inspired text editor"; 30 license = licenses.publicDomain; 31 maintainers = with maintainers; [ vrthra ]; 32 + platforms = platforms.unix; 33 }; 34 }
+2 -2
pkgs/applications/editors/nano/default.nix
··· 12 13 stdenv.mkDerivation rec { 14 name = "nano-${version}"; 15 - version = "2.7.2"; 16 src = fetchurl { 17 url = "mirror://gnu/nano/${name}.tar.xz"; 18 - sha256 = "1hlhwgvzdgkc7k74fbbn49hn6vmvzqr7h8gclgl7r1c6qrrny0bp"; 19 }; 20 nativeBuildInputs = [ texinfo ] ++ optional enableNls gettext; 21 buildInputs = [ ncurses ];
··· 12 13 stdenv.mkDerivation rec { 14 name = "nano-${version}"; 15 + version = "2.7.3"; 16 src = fetchurl { 17 url = "mirror://gnu/nano/${name}.tar.xz"; 18 + sha256 = "1z0bfyc5cvv83l3bjmlcwl49mpxrp65k5ffsfpnayfyjc18fy9nr"; 19 }; 20 nativeBuildInputs = [ texinfo ] ++ optional enableNls gettext; 21 buildInputs = [ ncurses ];
+1
pkgs/applications/gis/grass/default.nix
··· 60 wrapProgram $out/bin/grass70 \ 61 --set PYTHONPATH $PYTHONPATH \ 62 --set GRASS_PYTHON ${python2Packages.python}/bin/${python2Packages.python.executable} 63 ln -s $out/grass-*/lib $out/lib 64 ''; 65
··· 60 wrapProgram $out/bin/grass70 \ 61 --set PYTHONPATH $PYTHONPATH \ 62 --set GRASS_PYTHON ${python2Packages.python}/bin/${python2Packages.python.executable} 63 + --suffix LD_LIBRARY_PATH ':' '${gdal}/lib' 64 ln -s $out/grass-*/lib $out/lib 65 ''; 66
+12 -2
pkgs/applications/graphics/darktable/default.nix
··· 11 assert stdenv ? glibc; 12 13 stdenv.mkDerivation rec { 14 - version = "2.0.7"; 15 name = "darktable-${version}"; 16 17 src = fetchurl { 18 url = "https://github.com/darktable-org/darktable/releases/download/release-${version}/darktable-${version}.tar.xz"; 19 - sha256 = "1aqxiaw89xdx0s0h3gb9nvdzw4690y3kp7h794sihf2581bn28m9"; 20 }; 21 22 buildInputs = ··· 34 "-DBUILD_USERMANUAL=False" 35 ]; 36 37 meta = with stdenv.lib; { 38 description = "Virtual lighttable and darkroom for photographers"; 39 homepage = https://www.darktable.org;
··· 11 assert stdenv ? glibc; 12 13 stdenv.mkDerivation rec { 14 + version = "2.2.0"; 15 name = "darktable-${version}"; 16 17 src = fetchurl { 18 url = "https://github.com/darktable-org/darktable/releases/download/release-${version}/darktable-${version}.tar.xz"; 19 + sha256 = "3eca193831faae58200bb1cb6ef29e658bce43a81706b54420953a7c33d79377"; 20 }; 21 22 buildInputs = ··· 34 "-DBUILD_USERMANUAL=False" 35 ]; 36 37 + # darktable changed its rpath handling in commit 38 + # 83c70b876af6484506901e6b381304ae0d073d3c and as a result the 39 + # binaries can't find libdarktable.so, so change LD_LIBRARY_PATH in 40 + # the wrappers: 41 + preFixup = '' 42 + gappsWrapperArgs+=( 43 + --prefix LD_LIBRARY_PATH ":" "$out/lib/darktable" 44 + ) 45 + ''; 46 + 47 meta = with stdenv.lib; { 48 description = "Virtual lighttable and darkroom for photographers"; 49 homepage = https://www.darktable.org;
+3 -3
pkgs/applications/misc/calibre/default.nix
··· 5 }: 6 7 stdenv.mkDerivation rec { 8 - version = "2.73.0"; 9 name = "calibre-${version}"; 10 11 src = fetchurl { 12 url = "https://download.calibre-ebook.com/${version}/${name}.tar.xz"; 13 - sha256 = "17qs7dakzd25wbshsny2x82ppdqa6kwwfbp2vp1i8qmfc1nq61gc"; 14 }; 15 16 patches = [ ··· 56 apsw beautifulsoup cssselect cssutils dateutil lxml mechanize netifaces pillow 57 python pyqt5 sip 58 # the following are distributed with calibre, but we use upstream instead 59 - chardet cherrypy html5lib odfpy routes 60 ]); 61 62 installPhase = ''
··· 5 }: 6 7 stdenv.mkDerivation rec { 8 + version = "2.76.0"; 9 name = "calibre-${version}"; 10 11 src = fetchurl { 12 url = "https://download.calibre-ebook.com/${version}/${name}.tar.xz"; 13 + sha256 = "1xfm586n6gm44mkyn25mbiyhj6w9ji9yl6fvmnr4zk1q6qcga3v8"; 14 }; 15 16 patches = [ ··· 56 apsw beautifulsoup cssselect cssutils dateutil lxml mechanize netifaces pillow 57 python pyqt5 sip 58 # the following are distributed with calibre, but we use upstream instead 59 + chardet cherrypy html5lib_0_9999999 odfpy routes 60 ]); 61 62 installPhase = ''
+1
pkgs/applications/misc/font-manager/default.nix
··· 35 gnome3.gucharmap 36 gnome3.libgee 37 gnome3.file-roller 38 ]; 39 40 enableParallelBuilding = true;
··· 35 gnome3.gucharmap 36 gnome3.libgee 37 gnome3.file-roller 38 + gnome3.defaultIconTheme 39 ]; 40 41 enableParallelBuilding = true;
+5 -5
pkgs/applications/misc/rofi/default.nix
··· 1 - { stdenv, fetchurl, autoreconfHook, pkgconfig, libxkbcommon, pango 2 , cairo, glib, libxcb, xcbutil, xcbutilwm, xcbutilxrm, libstartup_notification 3 }: 4 5 stdenv.mkDerivation rec { 6 - version = "1.2.0"; 7 name = "rofi-${version}"; 8 9 src = fetchurl { 10 url = "https://github.com/DaveDavenport/rofi/releases/download/${version}/${name}.tar.xz"; 11 - sha256 = "0xxx0xpxhrhlhi2axq9867zqrhwqavc1qrr833k1xr0pvm5m0aqc"; 12 }; 13 14 preConfigure = '' ··· 17 sed -i 's/~root/~nobody/g' test/helper-expand.c 18 ''; 19 20 - buildInputs = [ autoreconfHook pkgconfig libxkbcommon pango cairo 21 - libstartup_notification libxcb xcbutil xcbutilwm xcbutilxrm 22 ]; 23 doCheck = true; 24
··· 1 + { stdenv, fetchurl, autoreconfHook, pkgconfig, libxkbcommon, pango, which, git 2 , cairo, glib, libxcb, xcbutil, xcbutilwm, xcbutilxrm, libstartup_notification 3 }: 4 5 stdenv.mkDerivation rec { 6 + version = "1.3.0"; 7 name = "rofi-${version}"; 8 9 src = fetchurl { 10 url = "https://github.com/DaveDavenport/rofi/releases/download/${version}/${name}.tar.xz"; 11 + sha256 = "1a65ai93ygras5bi7wc0s5i3zqslzqlnw3klq3sdnp2p0d6hjjqn"; 12 }; 13 14 preConfigure = '' ··· 17 sed -i 's/~root/~nobody/g' test/helper-expand.c 18 ''; 19 20 + buildInputs = [ autoreconfHook pkgconfig libxkbcommon pango cairo git 21 + libstartup_notification libxcb xcbutil xcbutilwm xcbutilxrm which 22 ]; 23 doCheck = true; 24
+3 -3
pkgs/applications/networking/dropbox/default.nix
··· 23 let 24 # NOTE: When updating, please also update in current stable, 25 # as older versions stop working 26 - version = "16.4.29"; 27 sha256 = 28 { 29 - "x86_64-linux" = "0zng19qisbr3c9d312ar43p1b44xidabj4x2l3g3q85i300vj661"; 30 - "i686-linux" = "0hc5fs0akc437valbxwlymk7ncjkdnhc51pja5bbiy48gqmd42bb"; 31 }."${stdenv.system}" or (throw "system ${stdenv.system} not supported"); 32 33 arch =
··· 23 let 24 # NOTE: When updating, please also update in current stable, 25 # as older versions stop working 26 + version = "16.4.30"; 27 sha256 = 28 { 29 + "x86_64-linux" = "0inwc12d14i6gyfllxbhizb434a7vy0l5nvc07kz0bca7c4665wb"; 30 + "i686-linux" = "0pdn8558ll317k3jrrjir90pn6abwbm99y9wzdq39wxj4dmrlh6w"; 31 }."${stdenv.system}" or (throw "system ${stdenv.system} not supported"); 32 33 arch =
+1
pkgs/applications/networking/dyndns/cfdyndns/default.nix
··· 27 license = stdenv.lib.licenses.mit; 28 maintainers = with maintainers; [ colemickens ]; 29 platforms = with platforms; linux; 30 }; 31 }
··· 27 license = stdenv.lib.licenses.mit; 28 maintainers = with maintainers; [ colemickens ]; 29 platforms = with platforms; linux; 30 + broken = true; 31 }; 32 }
+39
pkgs/applications/networking/flexget/default.nix
···
··· 1 + { lib 2 + , pythonPackages 3 + , fetchurl 4 + , transmission 5 + , deluge 6 + , config 7 + }: 8 + 9 + with pythonPackages; 10 + 11 + buildPythonPackage rec { 12 + version = "1.2.337"; 13 + name = "FlexGet-${version}"; 14 + disabled = isPy3k; 15 + 16 + src = fetchurl { 17 + url = "mirror://pypi/F/FlexGet/${name}.tar.gz"; 18 + sha256 = "0f7aaf0bf37860f0c5adfb0ba59ca228aa3f5c582131445623a4c3bc82d45346"; 19 + }; 20 + 21 + doCheck = false; 22 + 23 + buildInputs = [ nose ]; 24 + propagatedBuildInputs = [ 25 + paver feedparser sqlalchemy pyyaml rpyc 26 + beautifulsoup_4_1_3 html5lib_0_9999999 pyrss2gen pynzb progressbar jinja2 flask 27 + cherrypy requests dateutil_2_1 jsonschema python_tvrage tmdb3 28 + guessit pathpy apscheduler ] 29 + # enable deluge and transmission plugin support, if they're installed 30 + ++ lib.optional (config.deluge or false) deluge 31 + ++ lib.optional (transmission != null) transmissionrpc; 32 + 33 + meta = { 34 + homepage = http://flexget.com/; 35 + description = "Multipurpose automation tool for content like torrents"; 36 + license = lib.licenses.mit; 37 + maintainers = with lib.maintainers; [ domenkozar ]; 38 + }; 39 + }
+36
pkgs/applications/networking/mailreaders/astroid/default.nix
···
··· 1 + { stdenv, fetchFromGitHub, scons, pkgconfig, gnome3, gmime, webkitgtk24x 2 + , libsass, notmuch, boost, makeWrapper }: 3 + 4 + stdenv.mkDerivation rec { 5 + name = "astroid-${version}"; 6 + version = "0.6"; 7 + 8 + src = fetchFromGitHub { 9 + owner = "astroidmail"; 10 + repo = "astroid"; 11 + rev = "v${version}"; 12 + sha256 = "0zashjmqv8ips9q8ckyhgm9hfyf01wpgs6g21cwl05q5iklc5x7r"; 13 + }; 14 + 15 + patches = [ ./propagate-environment.patch ]; 16 + 17 + buildInputs = [ scons pkgconfig gnome3.gtkmm gmime webkitgtk24x libsass 18 + gnome3.libpeas notmuch boost gnome3.gsettings_desktop_schemas 19 + makeWrapper ]; 20 + 21 + buildPhase = "scons --prefix=$out build"; 22 + installPhase = "scons --prefix=$out install"; 23 + 24 + preFixup = '' 25 + wrapProgram "$out/bin/astroid" \ 26 + --prefix XDG_DATA_DIRS : "$GSETTINGS_SCHEMAS_PATH" 27 + ''; 28 + 29 + meta = { 30 + homepage = "https://astroidmail.github.io/"; 31 + description = "GTK+ frontend to the notmuch mail system"; 32 + maintainers = [ stdenv.lib.maintainers.bdimcheff ]; 33 + license = stdenv.lib.licenses.gpl3Plus; 34 + platforms = stdenv.lib.platforms.linux; 35 + }; 36 + }
+13
pkgs/applications/networking/mailreaders/astroid/propagate-environment.patch
···
··· 1 + diff --git a/SConstruct b/SConstruct 2 + index a80bca3..ed2cd6d 100644 3 + --- a/SConstruct 4 + +++ b/SConstruct 5 + @@ -5,7 +5,7 @@ from subprocess import * 6 + def getGitDesc(): 7 + return Popen('git describe --abbrev=8 --tags --always', stdout=PIPE, shell=True).stdout.read ().strip () 8 + 9 + -env = Environment () 10 + +env = Environment(ENV = os.environ) 11 + 12 + AddOption ("--release", action="store", dest="release", default="git", help="Make a release (default: git describe output)") 13 + AddOption ("--enable-debug", action="store", dest="debug", default=None, help="Enable the -g flag for debugging (default: true when release is git)")
+5 -4
pkgs/applications/networking/mailreaders/neomutt/default.nix
··· 1 { stdenv, fetchFromGitHub, which, autoconf, automake, ncurses, perl 2 - , cyrus_sasl, gdbm, gpgme, kerberos, libidn, notmuch, openssl }: 3 4 stdenv.mkDerivation rec { 5 - version = "20161104"; 6 name = "neomutt-${version}"; 7 8 src = fetchFromGitHub { 9 owner = "neomutt"; 10 repo = "neomutt"; 11 rev = "neomutt-${version}"; 12 - sha256 = "070p18khvxsrcn30jhyrnagka5mgza9mi5vmrrr6xl8mpgkyrlaw"; 13 }; 14 15 buildInputs = 16 [ autoconf automake cyrus_sasl gdbm gpgme kerberos libidn ncurses 17 - notmuch which openssl perl ]; 18 19 configureFlags = [ 20 "--enable-debug" ··· 36 "--with-curses" 37 "--with-regex" 38 "--with-idn" 39 40 # Look in $PATH at runtime, instead of hardcoding /usr/bin/sendmail 41 "ac_cv_path_SENDMAIL=sendmail"
··· 1 { stdenv, fetchFromGitHub, which, autoconf, automake, ncurses, perl 2 + , cyrus_sasl, gdbm, gpgme, kerberos, libidn, notmuch, openssl, lmdb }: 3 4 stdenv.mkDerivation rec { 5 + version = "20161126"; 6 name = "neomutt-${version}"; 7 8 src = fetchFromGitHub { 9 owner = "neomutt"; 10 repo = "neomutt"; 11 rev = "neomutt-${version}"; 12 + sha256 = "10ycfya11pvwv0rdyyak56r6f8ia8yf0h8qyi904bbpvm8lqvqfd"; 13 }; 14 15 buildInputs = 16 [ autoconf automake cyrus_sasl gdbm gpgme kerberos libidn ncurses 17 + notmuch which openssl perl lmdb ]; 18 19 configureFlags = [ 20 "--enable-debug" ··· 36 "--with-curses" 37 "--with-regex" 38 "--with-idn" 39 + "--with-lmdb" 40 41 # Look in $PATH at runtime, instead of hardcoding /usr/bin/sendmail 42 "ac_cv_path_SENDMAIL=sendmail"
+2
pkgs/applications/office/ppl-address-book/Gemfile
···
··· 1 + source 'https://rubygems.org' 2 + gem 'ppl'
+34
pkgs/applications/office/ppl-address-book/Gemfile.lock
···
··· 1 + GEM 2 + remote: https://rubygems.org/ 3 + specs: 4 + colored (1.2) 5 + greencard (0.0.5) 6 + i18n (0.7.0) 7 + inifile (2.0.2) 8 + mail (2.5.3) 9 + i18n (>= 0.4.0) 10 + mime-types (~> 1.16) 11 + treetop (~> 1.4.8) 12 + mime-types (1.25.1) 13 + morphine (0.1.1) 14 + polyglot (0.3.5) 15 + ppl (2.4.0) 16 + colored (= 1.2) 17 + greencard (= 0.0.5) 18 + inifile (= 2.0.2) 19 + mail (= 2.5.3) 20 + morphine (= 0.1.1) 21 + rugged (= 0.17.0.b6) 22 + rugged (0.17.0.b6) 23 + treetop (1.4.15) 24 + polyglot 25 + polyglot (>= 0.3.1) 26 + 27 + PLATFORMS 28 + ruby 29 + 30 + DEPENDENCIES 31 + ppl 32 + 33 + BUNDLED WITH 34 + 1.12.5
+38
pkgs/applications/office/ppl-address-book/default.nix
···
··· 1 + { stdenv, lib, bundlerEnv, ruby, makeWrapper, which }: 2 + 3 + let 4 + pname = "ppl-address-book"; 5 + 6 + version = (import ./gemset.nix).ppl.version; 7 + 8 + env = bundlerEnv rec { 9 + name = "${pname}-env-${version}"; 10 + inherit ruby; 11 + gemfile = ./Gemfile; 12 + lockfile = ./Gemfile.lock; 13 + gemset = ./gemset.nix; 14 + 15 + gemConfig.rugged = attrs: { buildInputs = [ which ]; }; 16 + }; 17 + 18 + in stdenv.mkDerivation { 19 + name = "${pname}-${version}"; 20 + 21 + phases = [ "installPhase" ]; 22 + 23 + buildInputs = [ env makeWrapper ]; 24 + 25 + installPhase = '' 26 + mkdir -p $out/bin 27 + makeWrapper ${env}/bin/ppl $out/bin/ppl 28 + ''; 29 + 30 + meta = with lib; { 31 + description = "Address book software for command-line users"; 32 + homepage = http://ppladdressbook.org/; 33 + license = with licenses; mit; 34 + maintainers = with maintainers; [ chris-martin ]; 35 + platforms = platforms.unix; 36 + }; 37 + 38 + }
+90
pkgs/applications/office/ppl-address-book/gemset.nix
···
··· 1 + { 2 + colored = { 3 + source = { 4 + remotes = ["https://rubygems.org"]; 5 + sha256 = "0b0x5jmsyi0z69bm6sij1k89z7h0laag3cb4mdn7zkl9qmxb90lx"; 6 + type = "gem"; 7 + }; 8 + version = "1.2"; 9 + }; 10 + greencard = { 11 + source = { 12 + remotes = ["https://rubygems.org"]; 13 + sha256 = "11pxrl1w8c7m7rmnnmdaplrv53qgylyvkv8bzsfyjna7k16hynvq"; 14 + type = "gem"; 15 + }; 16 + version = "0.0.5"; 17 + }; 18 + i18n = { 19 + source = { 20 + remotes = ["https://rubygems.org"]; 21 + sha256 = "1i5z1ykl8zhszsxcs8mzl8d0dxgs3ylz8qlzrw74jb0gplkx6758"; 22 + type = "gem"; 23 + }; 24 + version = "0.7.0"; 25 + }; 26 + inifile = { 27 + source = { 28 + remotes = ["https://rubygems.org"]; 29 + sha256 = "03rpacxnrnisjhd2zhc7629ica958bkdbakicl5kipw1wbprck25"; 30 + type = "gem"; 31 + }; 32 + version = "2.0.2"; 33 + }; 34 + mail = { 35 + source = { 36 + remotes = ["https://rubygems.org"]; 37 + sha256 = "1afr3acz7vsvr4gp6wnrkw1iwbjhf14mh8g8mlm40r86wcwzr39k"; 38 + type = "gem"; 39 + }; 40 + version = "2.5.3"; 41 + }; 42 + mime-types = { 43 + source = { 44 + remotes = ["https://rubygems.org"]; 45 + sha256 = "0mhzsanmnzdshaba7gmsjwnv168r1yj8y0flzw88frw1cickrvw8"; 46 + type = "gem"; 47 + }; 48 + version = "1.25.1"; 49 + }; 50 + morphine = { 51 + source = { 52 + remotes = ["https://rubygems.org"]; 53 + sha256 = "05aw93cijd1gq39ikw2dw3i2c79bjq05kvxrs81mqxqdlini5wwa"; 54 + type = "gem"; 55 + }; 56 + version = "0.1.1"; 57 + }; 58 + polyglot = { 59 + source = { 60 + remotes = ["https://rubygems.org"]; 61 + sha256 = "1bqnxwyip623d8pr29rg6m8r0hdg08fpr2yb74f46rn1wgsnxmjr"; 62 + type = "gem"; 63 + }; 64 + version = "0.3.5"; 65 + }; 66 + ppl = { 67 + source = { 68 + remotes = ["https://rubygems.org"]; 69 + sha256 = "0vpp4s12ggbk5kpl9z1i7vi9vvghgxrc8my35yk8knckg5waxg47"; 70 + type = "gem"; 71 + }; 72 + version = "2.4.0"; 73 + }; 74 + rugged = { 75 + source = { 76 + remotes = ["https://rubygems.org"]; 77 + sha256 = "025rj3rkj5yxf4pjj1s8x4yzshlyni3hgrjwhggg54nvw6b688qi"; 78 + type = "gem"; 79 + }; 80 + version = "0.17.0.b6"; 81 + }; 82 + treetop = { 83 + source = { 84 + remotes = ["https://rubygems.org"]; 85 + sha256 = "1zqj5y0mvfvyz11nhsb4d5ch0i0rfcyj64qx19mw4qhg3hh8z9pz"; 86 + type = "gem"; 87 + }; 88 + version = "1.4.15"; 89 + }; 90 + }
+3 -3
pkgs/applications/science/logic/lean/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 name = "lean-${version}"; 5 - version = "2016-12-08"; 6 7 src = fetchFromGitHub { 8 owner = "leanprover"; 9 repo = "lean"; 10 - rev = "7b63d6566faaf1dc0f2c8e873c61f51dce9ab618"; 11 - sha256 = "0xxr7dnh7pmdbpxhl3cq9clwamxjk54zcxplsrz6xirk0qy7ga4l"; 12 }; 13 14 buildInputs = [ gmp mpfr cmake gperftools ];
··· 2 3 stdenv.mkDerivation rec { 4 name = "lean-${version}"; 5 + version = "2016-12-30"; 6 7 src = fetchFromGitHub { 8 owner = "leanprover"; 9 repo = "lean"; 10 + rev = "fd4fffea27c442b12a45f664a8680ebb47482ca3"; 11 + sha256 = "1izbjxbr1nvv5kv2b7qklqjx2b1qmwrxhmvk0f2lrl9pxz9h0bmd"; 12 }; 13 14 buildInputs = [ gmp mpfr cmake gperftools ];
+2 -2
pkgs/applications/science/misc/fityk/default.nix
··· 3 4 let 5 name = "fityk"; 6 - version = "1.3.0"; 7 in 8 stdenv.mkDerivation { 9 name = "${name}-${version}"; ··· 12 owner = "wojdyr"; 13 repo = "fityk"; 14 rev = "v${version}"; 15 - sha256 = "07xzhy47q5ddg1qn51qds4wp6r5g2cx8bla0hm0a9ipr2hg92lm9"; 16 }; 17 18 buildInputs = [ autoreconfHook wxGTK30 boost lua zlib bzip2 xylib readline
··· 3 4 let 5 name = "fityk"; 6 + version = "1.3.1"; 7 in 8 stdenv.mkDerivation { 9 name = "${name}-${version}"; ··· 12 owner = "wojdyr"; 13 repo = "fityk"; 14 rev = "v${version}"; 15 + sha256 = "0kmrjjjwrh6xgw590awcd52b86kksmv6rfgih75zvpiavr1ygwsi"; 16 }; 17 18 buildInputs = [ autoreconfHook wxGTK30 boost lua zlib bzip2 xylib readline
+23
pkgs/applications/science/physics/sherpa/default.nix
···
··· 1 + { stdenv, fetchurl, gfortran, sqlite }: 2 + 3 + stdenv.mkDerivation rec { 4 + name = "sherpa-${version}"; 5 + version = "2.2.1"; 6 + 7 + src = fetchurl { 8 + url = "http://www.hepforge.org/archive/sherpa/SHERPA-MC-${version}.tar.gz"; 9 + sha256 = "13vkz6w8kqyv8sgy3mxnlps5ykml5rnlj50vjj0pp9rgbl5y8ali"; 10 + }; 11 + 12 + buildInputs = [ gfortran sqlite ]; 13 + 14 + enableParallelBuilding = true; 15 + 16 + meta = { 17 + description = "Simulation of High-Energy Reactions of PArticles in lepton-lepton, lepton-photon, photon-photon, lepton-hadron and hadron-hadron collisions"; 18 + license = stdenv.lib.licenses.gpl2; 19 + homepage = https://sherpa.hepforge.org; 20 + platforms = stdenv.lib.platforms.unix; 21 + maintainers = with stdenv.lib.maintainers; [ veprbl ]; 22 + }; 23 + }
-23
pkgs/applications/version-management/cvsps/01_ignoretrunk.dpatch
··· 1 - #! /bin/sh /usr/share/dpatch/dpatch-run 2 - ## 01_ignoretrunk.dpatch by <crafterm@debian.org> 3 - ## 4 - ## All lines beginning with `## DP:' are a description of the patch. 5 - ## DP: Ignore TRUNK branch name patch 6 - 7 - @DPATCH@ 8 - 9 - diff -urN cvsps-2.1.orig/cvsps.c cvsps-2.1/cvsps.c 10 - --- cvsps-2.1.orig/cvsps.c 2005-05-25 22:39:40.000000000 -0500 11 - +++ cvsps-2.1/cvsps.c 2005-06-19 23:07:20.000000000 -0500 12 - @@ -2104,6 +2109,11 @@ 13 - 14 - if (!get_branch_ext(rev, eot, &leaf)) 15 - { 16 - + if (strcmp(tag, "TRUNK") == 0) 17 - + { 18 - + debug(DEBUG_STATUS, "ignoring the TRUNK branch/tag"); 19 - + return; 20 - + } 21 - debug(DEBUG_APPERROR, "malformed revision"); 22 - exit(1); 23 - }
···
-125
pkgs/applications/version-management/cvsps/02_dynamicbufferalloc.dpatch
··· 1 - #! /bin/sh /usr/share/dpatch/dpatch-run 2 - ## 02_dynamicbufferalloc.dpatch by <crafterm@debian.org> 3 - ## 4 - ## All lines beginning with `## DP:' are a description of the patch. 5 - ## DP: Dynamic buffer allocation 6 - 7 - @DPATCH@ 8 - 9 - diff -urN cvsps-2.1-orig/cache.c cvsps-2.1/cache.c 10 - --- cvsps-2.1-orig/cache.c 2005-05-25 22:39:40.000000000 -0500 11 - +++ cvsps-2.1/cache.c 2005-07-26 15:21:29.716569500 -0500 12 - @@ -108,10 +108,19 @@ 13 - int tag_flags = 0; 14 - char branchbuff[LOG_STR_MAX] = ""; 15 - int branch_add = 0; 16 - - char logbuff[LOG_STR_MAX] = ""; 17 - + int logbufflen = LOG_STR_MAX + 1; 18 - + char * logbuff = malloc(logbufflen); 19 - time_t cache_date = -1; 20 - int read_version; 21 - 22 - + if (logbuff == NULL) 23 - + { 24 - + debug(DEBUG_SYSERROR, "could not malloc %d bytes for logbuff in read_cache", logbufflen); 25 - + exit(1); 26 - + } 27 - + 28 - + logbuff[0] = 0; 29 - + 30 - if (!(fp = cache_open("r"))) 31 - goto out; 32 - 33 - @@ -299,8 +308,19 @@ 34 - else 35 - { 36 - /* Make sure we have enough in the buffer */ 37 - - if (strlen(logbuff)+strlen(buff)<LOG_STR_MAX) 38 - - strcat(logbuff, buff); 39 - + int len = strlen(buff); 40 - + if (strlen(logbuff) + len >= LOG_STR_MAX) 41 - + { 42 - + logbufflen += (len >= LOG_STR_MAX ? (len+1) : LOG_STR_MAX); 43 - + char * newlogbuff = realloc(logbuff, logbufflen); 44 - + if (newlogbuff == NULL) 45 - + { 46 - + debug(DEBUG_SYSERROR, "could not realloc %d bytes for logbuff in read_cache", logbufflen); 47 - + exit(1); 48 - + } 49 - + logbuff = newlogbuff; 50 - + } 51 - + strcat(logbuff, buff); 52 - } 53 - break; 54 - case CACHE_NEED_PS_MEMBERS: 55 - @@ -332,6 +352,7 @@ 56 - out_close: 57 - fclose(fp); 58 - out: 59 - + free(logbuff); 60 - return cache_date; 61 - } 62 - 63 - diff -urN cvsps-2.1-orig/cvsps.c cvsps-2.1/cvsps.c 64 - --- cvsps-2.1-orig/cvsps.c 2005-05-25 22:39:40.000000000 -0500 65 - +++ cvsps-2.1/cvsps.c 2005-07-26 15:22:02.558230700 -0500 66 - @@ -265,7 +265,8 @@ 67 - PatchSetMember * psm = NULL; 68 - char datebuff[20]; 69 - char authbuff[AUTH_STR_MAX]; 70 - - char logbuff[LOG_STR_MAX + 1]; 71 - + int logbufflen = LOG_STR_MAX + 1; 72 - + char * logbuff = malloc(logbufflen); 73 - int loglen = 0; 74 - int have_log = 0; 75 - char cmd[BUFSIZ]; 76 - @@ -273,6 +274,12 @@ 77 - char use_rep_buff[PATH_MAX]; 78 - char * ltype; 79 - 80 - + if (logbuff == NULL) 81 - + { 82 - + debug(DEBUG_SYSERROR, "could not malloc %d bytes for logbuff in load_from_cvs", logbufflen); 83 - + exit(1); 84 - + } 85 - + 86 - if (!no_rlog && !test_log_file && cvs_check_cap(CAP_HAVE_RLOG)) 87 - { 88 - ltype = "rlog"; 89 - @@ -480,24 +487,22 @@ 90 - */ 91 - if (have_log || !is_revision_metadata(buff)) 92 - { 93 - - /* if the log buffer is full, that's it. 94 - - * 95 - - * Also, read lines (fgets) always have \n in them 96 - - * which we count on. So if truncation happens, 97 - - * be careful to put a \n on. 98 - - * 99 - - * Buffer has LOG_STR_MAX + 1 for room for \0 if 100 - - * necessary 101 - - */ 102 - - if (loglen < LOG_STR_MAX) 103 - + /* If the log buffer is full, try to reallocate more. */ 104 - + if (loglen < logbufflen) 105 - { 106 - int len = strlen(buff); 107 - 108 - - if (len >= LOG_STR_MAX - loglen) 109 - + if (len >= logbufflen - loglen) 110 - { 111 - - debug(DEBUG_APPMSG1, "WARNING: maximum log length exceeded, truncating log"); 112 - - len = LOG_STR_MAX - loglen; 113 - - buff[len - 1] = '\n'; 114 - + debug(DEBUG_STATUS, "reallocating logbufflen to %d bytes for file %s", logbufflen, file->filename); 115 - + logbufflen += (len >= LOG_STR_MAX ? (len+1) : LOG_STR_MAX); 116 - + char * newlogbuff = realloc(logbuff, logbufflen); 117 - + if (newlogbuff == NULL) 118 - + { 119 - + debug(DEBUG_SYSERROR, "could not realloc %d bytes for logbuff in load_from_cvs", logbufflen); 120 - + exit(1); 121 - + } 122 - + logbuff = newlogbuff; 123 - } 124 - 125 - debug(DEBUG_STATUS, "appending %s to log", buff);
···
-19
pkgs/applications/version-management/cvsps/03_diffoptstypo.dpatch
··· 1 - #! /bin/sh /usr/share/dpatch/dpatch-run 2 - ## 03_diffoptstypo.dpatch by <crafterm@debian.org> 3 - ## 4 - ## All lines beginning with `## DP:' are a description of the patch. 5 - ## DP: Diff opts typo fix 6 - 7 - @DPATCH@ 8 - 9 - --- cvsps-2.1-orig/cvsps.1 2005-05-26 05:39:40.000000000 +0200 10 - +++ cvsps-2.1/cvsps.1 2005-07-28 15:17:48.885112048 +0200 11 - @@ -83,7 +83,7 @@ 12 - disable the use of rlog internally. Note: rlog is 13 - required for stable PatchSet numbering. Use with care. 14 - .TP 15 - -.B \-\-diffs\-opts <option string> 16 - +.B \-\-diff\-opts <option string> 17 - send a custom set of options to diff, for example to increase 18 - the number of context lines, or change the diff format. 19 - .TP
···
+40 -8
pkgs/applications/version-management/cvsps/default.nix
··· 1 - { fetchurl, stdenv, cvs, zlib }: 2 3 stdenv.mkDerivation rec { 4 - name = "cvsps-2.1"; 5 src = fetchurl { 6 - url = "http://www.cobite.com/cvsps/${name}.tar.gz"; 7 sha256 = "0nh7q7zcmagx0i63h6fqqkkq9i55k77myvb8h6jn2f266f5iklwi"; 8 }; 9 10 - # Patches from Debian's `cvsps-2.1-4'. 11 - patches = [ ./01_ignoretrunk.dpatch 12 - ./02_dynamicbufferalloc.dpatch 13 - ./03_diffoptstypo.dpatch ]; 14 15 buildInputs = [ cvs zlib ]; 16 17 - installPhase = "make install prefix=$out"; 18 19 meta = { 20 longDescription = '' 21 CVSps is a program for generating `patchset' information from a 22 CVS repository. A patchset in this case is defined as a set of ··· 25 ''; 26 homepage = http://www.cobite.com/cvsps/; 27 license = stdenv.lib.licenses.gpl2; 28 }; 29 }
··· 1 + { stdenv, fetchurl, fetchpatch, cvs, zlib }: 2 3 stdenv.mkDerivation rec { 4 + name = "cvsps-${version}"; 5 + version = "2.1"; 6 + 7 src = fetchurl { 8 + url = "mirror://debian/pool/main/c/cvsps/cvsps_${version}.orig.tar.gz"; 9 sha256 = "0nh7q7zcmagx0i63h6fqqkkq9i55k77myvb8h6jn2f266f5iklwi"; 10 }; 11 12 + # Patches from https://sources.debian.net/src/cvsps/2.1-7/debian/patches 13 + patches = 14 + [ (fetchpatch { 15 + url = "https://sources.debian.net/data/main/c/cvsps/2.1-7/debian/patches/01_ignoretrunk.patch"; 16 + sha256 = "1gzb97dw2a6bm0bmim7p7wvsn0r82y3a8n22ln6rbbkkd8vlnzcb"; 17 + }) 18 + 19 + (fetchpatch { 20 + url = "https://sources.debian.net/data/main/c/cvsps/2.1-7/debian/patches/02_dynamicbufferalloc.patch"; 21 + sha256 = "0dm7azxnw0g9pdqkb3y4y2h047zgrclbh40av6c868wfp2j6l9sc"; 22 + }) 23 + 24 + (fetchpatch { 25 + url = "https://sources.debian.net/data/main/c/cvsps/2.1-7/debian/patches/03_diffoptstypo.patch"; 26 + sha256 = "06n8652g7inpv8cgqir7ijq00qw1fr0v44m2pbmgx7ilmna2vrcw"; 27 + }) 28 + 29 + (fetchpatch { 30 + url = "https://sources.debian.net/data/main/c/cvsps/2.1-7/debian/patches/05-inet_addr_fix.patch"; 31 + sha256 = "10w6px96dz8bb69asjzshvp787ccazmqnjsggqc4gwdal95q3cn7"; 32 + }) 33 + 34 + (fetchpatch { 35 + url = "https://sources.debian.net/data/main/c/cvsps/2.1-7/debian/patches/fix-makefile"; 36 + sha256 = "0m92b55hgldwg6lwdaybbj0n3lw1b3wj2xkk1cz1ywq073bpf3jm"; 37 + }) 38 + 39 + (fetchpatch { 40 + url = "https://sources.debian.net/data/main/c/cvsps/2.1-7/debian/patches/fix-manpage"; 41 + sha256 = "0gky14rhx82wv0gj8bkc74ki5xilhv5i3k1jc7khklr4lb6mmhpx"; 42 + }) 43 + ]; 44 45 buildInputs = [ cvs zlib ]; 46 47 + installFlags = [ "prefix=$(out)" ]; 48 49 meta = { 50 + description = ''A tool to generate CVS patch set information''; 51 longDescription = '' 52 CVSps is a program for generating `patchset' information from a 53 CVS repository. A patchset in this case is defined as a set of ··· 56 ''; 57 homepage = http://www.cobite.com/cvsps/; 58 license = stdenv.lib.licenses.gpl2; 59 + platforms = stdenv.lib.platforms.unix; 60 }; 61 }
+2 -2
pkgs/applications/version-management/git-and-tools/transcrypt/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 name = "transcrypt-${version}"; 5 - version = "0.9.9"; 6 7 src = fetchFromGitHub { 8 owner = "elasticdog"; 9 repo = "transcrypt"; 10 rev = "v${version}"; 11 - sha256 = "0brsgj3qmvkgxzqqamk8krwyarwff1dlb3jjd09snnbfl0kdq1a5"; 12 }; 13 14 buildInputs = [ git makeWrapper openssl ];
··· 2 3 stdenv.mkDerivation rec { 4 name = "transcrypt-${version}"; 5 + version = "1.0.0"; 6 7 src = fetchFromGitHub { 8 owner = "elasticdog"; 9 repo = "transcrypt"; 10 rev = "v${version}"; 11 + sha256 = "195hi8lq1i9rfcwj3raw4pa7fhvv3ghznxp4crmbjm7c0sqilcpd"; 12 }; 13 14 buildInputs = [ git makeWrapper openssl ];
+1
pkgs/applications/version-management/pijul/default.nix
··· 33 license = licenses.gpl3; 34 platforms = stdenv.lib.platforms.x86_64; # i686 builds fail due to lmdb 35 maintainers = with maintainers; [ puffnfresh ]; 36 }; 37 }
··· 33 license = licenses.gpl3; 34 platforms = stdenv.lib.platforms.x86_64; # i686 builds fail due to lmdb 35 maintainers = with maintainers; [ puffnfresh ]; 36 + broken = true; 37 }; 38 }
+1 -1
pkgs/build-support/replace-dependency.nix
··· 22 with lib; 23 24 let 25 - warn = if verbose then builtins.trace else (x:y:y); 26 references = import (runCommand "references.nix" { exportReferencesGraph = [ "graph" drv ]; } '' 27 (echo { 28 while read path
··· 22 with lib; 23 24 let 25 + warn = if verbose then builtins.trace else (x: y: y); 26 references = import (runCommand "references.nix" { exportReferencesGraph = [ "graph" drv ]; } '' 27 (echo { 28 while read path
+6 -6
pkgs/development/compilers/rust/bootstrap.nix
··· 14 then "x86_64-apple-darwin" 15 else abort "missing boostrap url for platform ${stdenv.system}"; 16 17 - # fetch hashes by running `print-hashes.sh 1.12.1` 18 bootstrapHash = 19 if stdenv.system == "i686-linux" 20 - then "ede9b9d14d1ddbc29975d1ead73fcf2758719b4b371363afe1c32eb8d6e96bb3" 21 else if stdenv.system == "x86_64-linux" 22 - then "9e546aec13e389429ba2d86c8f4e67eba5af146c979e4faa16ffb40ddaf9984c" 23 else if stdenv.system == "i686-darwin" 24 - then "2648645c4fe1ecf36beb7de63501dd99e9547a7a6d5683acf2693b919a550b69" 25 else if stdenv.system == "x86_64-darwin" 26 - then "0ac5e58dba3d24bf09dcc90eaac02d2df053122b0def945ec4cfe36ac6d4d011" 27 else throw "missing boostrap hash for platform ${stdenv.system}"; 28 29 needsPatchelf = stdenv.isLinux; ··· 33 sha256 = bootstrapHash; 34 }; 35 36 - version = "1.12.1"; 37 in 38 39 rec {
··· 14 then "x86_64-apple-darwin" 15 else abort "missing boostrap url for platform ${stdenv.system}"; 16 17 + # fetch hashes by running `print-hashes.sh 1.13.0` 18 bootstrapHash = 19 if stdenv.system == "i686-linux" 20 + then "239734113f6750d31085c7a08c260d492991cc1ef10817b6d44154515f3f9439" 21 else if stdenv.system == "x86_64-linux" 22 + then "95f4c372b1b81ac1038161e87e932dd7ab875d25c167a861c3949b0f6a65516d" 23 else if stdenv.system == "i686-darwin" 24 + then "f6e01cab3bf8d0a6fe9cc2447aa10ce894569daaa72d44063c229da918b96023" 25 else if stdenv.system == "x86_64-darwin" 26 + then "f538ca5732b844cf7f00fc4aaaf200a49a845b58b4ec8aef38da0b00e2cf6efe" 27 else throw "missing boostrap hash for platform ${stdenv.system}"; 28 29 needsPatchelf = stdenv.isLinux; ··· 33 sha256 = bootstrapHash; 34 }; 35 36 + version = "1.13.0"; 37 in 38 39 rec {
+2 -2
pkgs/development/compilers/rust/cargo.nix
··· 24 LIBGIT2_SYS_USE_PKG_CONFIG=1; 25 26 configurePhase = '' 27 - ./configure --enable-optimize --prefix=$out --local-cargo=${rustPlatform.rust.cargo}/bin/cargo 28 ''; 29 30 buildPhase = "make"; ··· 60 cargo test 61 ''; 62 63 - # Disable check phase as there are failures (author_prefers_cargo test fails) 64 doCheck = false; 65 66 meta = with stdenv.lib; {
··· 24 LIBGIT2_SYS_USE_PKG_CONFIG=1; 25 26 configurePhase = '' 27 + ./configure --enable-optimize --prefix=$out 28 ''; 29 30 buildPhase = "make"; ··· 60 cargo test 61 ''; 62 63 + # Disable check phase as there are failures (4 tests fail) 64 doCheck = false; 65 66 meta = with stdenv.lib; {
+7 -7
pkgs/development/compilers/rust/default.nix
··· 7 8 rec { 9 rustc = callPackage ./rustc.nix { 10 - shortVersion = "1.13"; 11 isRelease = true; 12 forceBundledLLVM = false; 13 configureFlags = [ "--release-channel=stable" ]; 14 - srcRev = "2c6933acc05c61e041be764cb1331f6281993f3f"; 15 - srcSha = "1w0alyyc29cy2lczrqvg1kfycjxy0xg8fpzdac80m88fxpv23glp"; 16 17 patches = [ 18 ./patches/disable-lockfile-check-stable.patch ··· 25 }; 26 27 cargo = callPackage ./cargo.nix rec { 28 - version = "0.14.0"; 29 - srcRev = "eca9e159b6b0d484788ac757cf23052eba75af55"; 30 - srcSha = "1zm5rzw1mvixnkzr4775pcxx6k235qqxbysyp179cbxsw3dm045s"; 31 - depsSha256 = "0gpn0cpwgpzwhc359qn6qplx371ag9pqbwayhqrsydk1zm5bm3zr"; 32 33 inherit rustc; # the rustc that will be wrapped by cargo 34 inherit rustPlatform; # used to build cargo
··· 7 8 rec { 9 rustc = callPackage ./rustc.nix { 10 + shortVersion = "1.14"; 11 isRelease = true; 12 forceBundledLLVM = false; 13 configureFlags = [ "--release-channel=stable" ]; 14 + srcRev = "e8a0123241f0d397d39cd18fcc4e5e7edde22730"; 15 + srcSha = "1sla3gnx9dqvivnyhvwz299mc3jmdy805q2y5xpmpi1vhfk0bafx"; 16 17 patches = [ 18 ./patches/disable-lockfile-check-stable.patch ··· 25 }; 26 27 cargo = callPackage ./cargo.nix rec { 28 + version = "0.15.0"; 29 + srcRev = "298a0127f703d4c2500bb06d309488b92ef84ae1"; 30 + srcSha = "0v74r18vszapw2rfk7w72czkp9gbq4s1sggphm5vx0kyh058dxc5"; 31 + depsSha256 = "0ksiywli8r4lkprfknm0yz1w27060psi3db6wblqmi8sckzdm44h"; 32 33 inherit rustc; # the rustc that will be wrapped by cargo 34 inherit rustPlatform; # used to build cargo
+2 -1
pkgs/development/compilers/rust/patches/disable-lockfile-check-stable.patch
··· 11 index 2839bbd..50142ff 100644 12 --- a/src/tools/tidy/src/main.rs 13 +++ b/src/tools/tidy/src/main.rs 14 - @@ -47,7 +47,7 @@ fn main() { 15 errors::check(&path, &mut bad); 16 cargo::check(&path, &mut bad); 17 features::check(&path, &mut bad); 18 - cargo_lock::check(&path, &mut bad); 19 + //cargo_lock::check(&path, &mut bad); 20 21 if bad { 22 panic!("some tidy checks failed");
··· 11 index 2839bbd..50142ff 100644 12 --- a/src/tools/tidy/src/main.rs 13 +++ b/src/tools/tidy/src/main.rs 14 + @@ -48,7 +48,7 @@ fn main() { 15 errors::check(&path, &mut bad); 16 cargo::check(&path, &mut bad); 17 features::check(&path, &mut bad); 18 - cargo_lock::check(&path, &mut bad); 19 + //cargo_lock::check(&path, &mut bad); 20 + pal::check(&path, &mut bad); 21 22 if bad { 23 panic!("some tidy checks failed");
+30
pkgs/development/idris-modules/httpclient.nix
···
··· 1 + { pkgs 2 + , build-idris-package 3 + , fetchFromGitHub 4 + , lightyear 5 + , contrib 6 + , lib 7 + , idris 8 + }: 9 + 10 + let 11 + date = "2016-12-20"; 12 + in 13 + build-idris-package { 14 + name = "httpclient-${date}"; 15 + 16 + src = fetchFromGitHub { 17 + owner = "justjoheinz"; 18 + repo = "idris-httpclient"; 19 + rev = "4a7296d572d7f7fde87d27da07d5c9566dc4ff14"; 20 + sha256 = "0sy0q7gri9lwbqdmx9720pby3w1470w7wzn62bf2rir532219hhl"; 21 + }; 22 + 23 + propagatedBuildInputs = [ pkgs.curl lightyear contrib ]; 24 + 25 + meta = { 26 + description = "HTTP Client for Idris"; 27 + homepage = https://github.com/justjoheinz/idris-httpclient; 28 + inherit (idris.meta) platforms; 29 + }; 30 + }
+3 -2
pkgs/development/libraries/gmime/default.nix
··· 1 - { stdenv, fetchurl, pkgconfig, glib, zlib, libgpgerror }: 2 3 stdenv.mkDerivation rec { 4 name = "gmime-2.6.20"; ··· 10 11 outputs = [ "out" "dev" ]; 12 13 - nativeBuildInputs = [ pkgconfig ]; 14 propagatedBuildInputs = [ glib zlib libgpgerror ]; 15 16 enableParallelBuilding = true; 17
··· 1 + { stdenv, fetchurl, pkgconfig, glib, zlib, libgpgerror, gobjectIntrospection }: 2 3 stdenv.mkDerivation rec { 4 name = "gmime-2.6.20"; ··· 10 11 outputs = [ "out" "dev" ]; 12 13 + nativeBuildInputs = [ pkgconfig gobjectIntrospection ]; 14 propagatedBuildInputs = [ glib zlib libgpgerror ]; 15 + configureFlags = [ "--enable-introspection=yes" ]; 16 17 enableParallelBuilding = true; 18
+23
pkgs/development/libraries/kirigami/v2.nix
···
··· 1 + { stdenv, fetchurl, cmake, ecm, pkgconfig, plasma-framework, qtbase, qtquickcontrols2 }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "kirigami"; 5 + version = "1.90.0"; 6 + name = "${pname}2-${version}"; 7 + 8 + src = fetchurl { 9 + url = "mirror://kde/unstable/${pname}/${pname}-${version}.tar.xz"; 10 + sha256 = "a5ca094a60d1cc48116cbed07bbe68be016773d2488a91e278859c90f59e64a8"; 11 + }; 12 + 13 + buildInputs = [ qtbase qtquickcontrols2 plasma-framework ]; 14 + 15 + nativeBuildInputs = [ cmake pkgconfig ecm ]; 16 + 17 + meta = with stdenv.lib; { 18 + license = licenses.lgpl2; 19 + homepage = http://www.kde.org; 20 + maintainers = with maintainers; [ ttuegel peterhoeg ]; 21 + platforms = platforms.unix; 22 + }; 23 + }
+5 -1
pkgs/development/libraries/libgphoto2/default.nix
··· 25 26 hardeningDisable = [ "format" ]; 27 28 meta = { 29 homepage = http://www.gphoto.org/proj/libgphoto2/; 30 description = "A library for accessing digital cameras"; ··· 41 maintainers = with stdenv.lib.maintainers; [ jcumming ]; 42 }; 43 } 44 -
··· 25 26 hardeningDisable = [ "format" ]; 27 28 + postInstall = '' 29 + mkdir -p $out/lib/udev/rules.d 30 + $out/lib/libgphoto2/print-camera-list udev-rules version 175 group camera >$out/lib/udev/rules.d/40-gphoto2.rules 31 + ''; 32 + 33 meta = { 34 homepage = http://www.gphoto.org/proj/libgphoto2/; 35 description = "A library for accessing digital cameras"; ··· 46 maintainers = with stdenv.lib.maintainers; [ jcumming ]; 47 }; 48 }
+30
pkgs/development/libraries/libmd/default.nix
···
··· 1 + { stdenv, fetchurl, autoreconfHook }: 2 + 3 + stdenv.mkDerivation rec { 4 + name = "${pname}-${version}"; 5 + pname = "libmd"; 6 + version = "0.0.0"; 7 + 8 + src = fetchurl { 9 + url = "https://archive.hadrons.org/software/${pname}/${pname}-${version}.tar.xz"; 10 + sha256 = "121s73pgbqsnmy6xblbrkj9y44c5zzzpf2hcmh6zvcvg4dk26gzx"; 11 + }; 12 + 13 + buildInputs = [ autoreconfHook ]; 14 + 15 + # Writing the version to a .dist-version file is required for the get-version 16 + # shell script because fetchgit removes the .git directory. 17 + prePatch = '' 18 + echo '${version}' > .dist-version; 19 + ''; 20 + 21 + autoreconfPhase = "./autogen"; 22 + 23 + meta = with stdenv.lib; { 24 + homepage = "https://www.hadrons.org/software/${pname}/"; 25 + description = "Message Digest functions from BSD systems"; 26 + license = with licenses; [ bsd3 bsd2 isc beerware publicDomain ]; 27 + maintainers = with maintainers; [ primeos ]; 28 + platforms = platforms.linux; 29 + }; 30 + }
+6 -6
pkgs/development/libraries/openbabel/default.nix
··· 1 - {stdenv, fetchurl, cmake, zlib, libxml2, eigen, python, cairo, pkgconfig }: 2 3 stdenv.mkDerivation rec { 4 - name = "openbabel-2.3.2"; 5 6 src = fetchurl { 7 - url = "mirror://sourceforge/openbabel/${name}.tar.gz"; 8 - sha256 = "122if0jkm71ngd1b0dic8k567b3j2hcikbwnpxgchv5ag5ka5b2f"; 9 }; 10 11 # TODO : perl & python bindings; 12 # TODO : wxGTK: I have no time to compile 13 # TODO : separate lib and apps 14 - buildInputs = [ zlib libxml2 eigen python cairo ]; 15 16 nativeBuildInputs = [ cmake pkgconfig ]; 17 18 meta = { 19 platforms = stdenv.lib.platforms.all; 20 maintainers = [ stdenv.lib.maintainers.urkud ]; 21 - broken = true; # doesn't build with GCC 5; fix in GitHub 22 }; 23 }
··· 1 + {stdenv, fetchurl, cmake, zlib, libxml2, eigen, python, cairo, pcre, pkgconfig }: 2 3 stdenv.mkDerivation rec { 4 + name = "openbabel-${version}"; 5 + version = "2.4.1"; 6 7 src = fetchurl { 8 + url = "https://github.com/openbabel/openbabel/archive/openbabel-${stdenv.lib.replaceStrings ["."] ["-"] version}.tar.gz"; 9 + sha256 = "0xm7y859ivq2cp0q08mwshfxm0jq31xkyr4x8s0j6l7khf57yk2r"; 10 }; 11 12 # TODO : perl & python bindings; 13 # TODO : wxGTK: I have no time to compile 14 # TODO : separate lib and apps 15 + buildInputs = [ zlib libxml2 eigen python cairo pcre ]; 16 17 nativeBuildInputs = [ cmake pkgconfig ]; 18 19 meta = { 20 platforms = stdenv.lib.platforms.all; 21 maintainers = [ stdenv.lib.maintainers.urkud ]; 22 }; 23 }
+23
pkgs/development/libraries/physics/fastnlo/default.nix
···
··· 1 + { stdenv, fetchurl, boost, lhapdf, root, yoda }: 2 + 3 + stdenv.mkDerivation rec { 4 + name = "fastnlo_toolkit-${version}"; 5 + version = "2.3.1pre-2212"; 6 + 7 + src = fetchurl { 8 + url = "http://fastnlo.hepforge.org/code/v23/${name}.tar.gz"; 9 + sha256 = "0xgnnwc002awvz6dhn7792jc8kdff843yjgvwmgcs60yvcj6blgp"; 10 + }; 11 + 12 + buildInputs = [ boost lhapdf root yoda ]; 13 + 14 + enableParallelBuilding = true; 15 + 16 + meta = { 17 + descritption = "A computer code to create and evaluate fast interpolation tables of pre-computed coefficients in perturbation theory for observables in hadron-induced processes"; 18 + license = stdenv.lib.licenses.gpl3; 19 + homepage = http://fastnlo.hepforge.org; 20 + platforms = stdenv.lib.platforms.unix; 21 + maintainers = with stdenv.lib.maintainers; [ veprbl ]; 22 + }; 23 + }
+29
pkgs/development/libraries/physics/mcgrid/default.nix
···
··· 1 + { stdenv, fetchurl, fastnlo, rivet, sherpa }: 2 + 3 + stdenv.mkDerivation rec { 4 + name = "mcgrid-${version}"; 5 + version = "2.0.2"; 6 + 7 + src = fetchurl { 8 + url = "http://www.hepforge.org/archive/mcgrid/${name}.tar.gz"; 9 + sha256 = "1mw82x7zqbdchnd6shj3dirsav5i2cndp2hjwb8a8xdh4xh9zvfy"; 10 + }; 11 + 12 + buildInputs = [ fastnlo rivet ]; 13 + 14 + preConfigure = '' 15 + substituteInPlace mcgrid.pc.in \ 16 + --replace "Cflags:" "Cflags: -std=c++11" 17 + ''; 18 + 19 + CXXFLAGS = "-std=c++11"; 20 + enableParallelBuilding = true; 21 + 22 + meta = { 23 + description = "A software package that provides access to the APPLgrid and fastNLO interpolation tools for Monte Carlo event generator codes, allowing for fast and flexible variations of scales, coupling parameters and PDFs in cutting edge leading- and next-to-leading-order QCD calculations"; 24 + license = stdenv.lib.licenses.gpl3; 25 + homepage = http://mcgrid.hepforge.org; 26 + platforms = stdenv.lib.platforms.unix; 27 + maintainers = with stdenv.lib.maintainers; [ veprbl ]; 28 + }; 29 + }
+4 -7
pkgs/development/libraries/physics/rivet/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 name = "rivet-${version}"; 5 - version = "2.5.2"; 6 7 src = fetchurl { 8 url = "http://www.hepforge.org/archive/rivet/Rivet-${version}.tar.bz2"; 9 - sha256 = "01agf0bswqvci8nwp67kvrlwc2k0sg1s0lxpq2a9q58l99v2gakh"; 10 }; 11 12 pythonPath = []; # python wrapper support 13 - 14 - patches = [ 15 - ./key_val.patch 16 - ./zaxis_fix.patch 17 - ]; 18 19 latex = texlive.combine { inherit (texlive) 20 scheme-basic
··· 2 3 stdenv.mkDerivation rec { 4 name = "rivet-${version}"; 5 + version = "2.5.3"; 6 7 src = fetchurl { 8 url = "http://www.hepforge.org/archive/rivet/Rivet-${version}.tar.bz2"; 9 + sha256 = "1r0x575ivvm68nnh9qlfvdra5298i047qcbxcg37ki2aaqq07qcr"; 10 }; 11 + 12 + postPatch = "patchShebangs ./src/Analyses/cat_with_lines"; 13 14 pythonPath = []; # python wrapper support 15 16 latex = texlive.combine { inherit (texlive) 17 scheme-basic
+1
pkgs/development/libraries/qt-5/5.7/default.nix
··· 82 inherit (pkgs.gst_all_1) gstreamer gst-plugins-base; 83 }; 84 qtquickcontrols = callPackage ./qtquickcontrols.nix {}; 85 qtscript = callPackage ./qtscript {}; 86 qtsensors = callPackage ./qtsensors.nix {}; 87 qtserialport = callPackage ./qtserialport {};
··· 82 inherit (pkgs.gst_all_1) gstreamer gst-plugins-base; 83 }; 84 qtquickcontrols = callPackage ./qtquickcontrols.nix {}; 85 + qtquickcontrols2 = callPackage ./qtquickcontrols2.nix {}; 86 qtscript = callPackage ./qtscript {}; 87 qtsensors = callPackage ./qtsensors.nix {}; 88 qtserialport = callPackage ./qtserialport {};
+6
pkgs/development/libraries/qt-5/5.7/qtquickcontrols2.nix
···
··· 1 + { qtSubmodule, qtdeclarative }: 2 + 3 + qtSubmodule { 4 + name = "qtquickcontrols2"; 5 + qtInputs = [ qtdeclarative ]; 6 + }
+3
pkgs/development/libraries/science/math/clblas/cuda/default.nix
··· 7 , python 8 , cudatoolkit 9 , nvidia_x11 10 }: 11 12 stdenv.mkDerivation rec { ··· 40 cmake ../src -DCMAKE_INSTALL_PREFIX=$out \ 41 -DCMAKE_BUILD_TYPE=Release \ 42 -DOPENCL_ROOT=${cudatoolkit} \ 43 ''; 44 45 dontStrip = true; ··· 51 python 52 cudatoolkit 53 nvidia_x11 54 ]; 55 56 meta = with stdenv.lib; {
··· 7 , python 8 , cudatoolkit 9 , nvidia_x11 10 + , gtest 11 }: 12 13 stdenv.mkDerivation rec { ··· 41 cmake ../src -DCMAKE_INSTALL_PREFIX=$out \ 42 -DCMAKE_BUILD_TYPE=Release \ 43 -DOPENCL_ROOT=${cudatoolkit} \ 44 + -DUSE_SYSTEM_GTEST=ON 45 ''; 46 47 dontStrip = true; ··· 53 python 54 cudatoolkit 55 nvidia_x11 56 + gtest 57 ]; 58 59 meta = with stdenv.lib; {
+10 -4
pkgs/development/libraries/wxGTK-2.9/default.nix
··· 1 { stdenv, fetchurl, pkgconfig, gtk2, libXinerama, libSM, libXxf86vm, xf86vidmodeproto 2 , gstreamer, gst_plugins_base, GConf, setfile 3 - , withMesa ? true, mesa ? null, compat24 ? false, compat26 ? true, unicode ? true, 4 }: 5 6 assert withMesa -> mesa != null; ··· 22 [ gtk2 libXinerama libSM libXxf86vm xf86vidmodeproto gstreamer 23 gst_plugins_base GConf ] 24 ++ optional withMesa mesa 25 - ++ optional stdenv.isDarwin setfile; 26 27 nativeBuildInputs = [ pkgconfig ]; 28 29 configureFlags = 30 [ "--enable-gtk2" "--disable-precomp-headers" "--enable-mediactrl" ··· 34 ++ optional withMesa "--with-opengl" 35 ++ optionals stdenv.isDarwin 36 # allow building on 64-bit 37 - [ "--with-cocoa" "--enable-universal-binaries" ]; 38 39 SEARCH_LIB = optionalString withMesa "${mesa}/lib"; 40 ··· 46 substituteInPlace configure --replace \ 47 'ac_cv_prog_SETFILE="/Developer/Tools/SetFile"' \ 48 'ac_cv_prog_SETFILE="${setfile}/bin/SetFile"' 49 ''; 50 51 postInstall = " ··· 60 enableParallelBuilding = true; 61 62 meta = { 63 - platforms = stdenv.lib.platforms.linux; 64 }; 65 }
··· 1 { stdenv, fetchurl, pkgconfig, gtk2, libXinerama, libSM, libXxf86vm, xf86vidmodeproto 2 , gstreamer, gst_plugins_base, GConf, setfile 3 + , withMesa ? true, mesa ? null, compat24 ? false, compat26 ? true, unicode ? true 4 + , Carbon ? null, Cocoa ? null, Kernel ? null, QuickTime ? null, AGL ? null 5 }: 6 7 assert withMesa -> mesa != null; ··· 23 [ gtk2 libXinerama libSM libXxf86vm xf86vidmodeproto gstreamer 24 gst_plugins_base GConf ] 25 ++ optional withMesa mesa 26 + ++ optionals stdenv.isDarwin [ setfile Carbon Cocoa Kernel QuickTime ]; 27 28 nativeBuildInputs = [ pkgconfig ]; 29 + 30 + propagatedBuildInputs = optional stdenv.isDarwin AGL; 31 32 configureFlags = 33 [ "--enable-gtk2" "--disable-precomp-headers" "--enable-mediactrl" ··· 37 ++ optional withMesa "--with-opengl" 38 ++ optionals stdenv.isDarwin 39 # allow building on 64-bit 40 + [ "--with-cocoa" "--enable-universal-binaries" "--with-macosx-version-min=10.7" ]; 41 42 SEARCH_LIB = optionalString withMesa "${mesa}/lib"; 43 ··· 49 substituteInPlace configure --replace \ 50 'ac_cv_prog_SETFILE="/Developer/Tools/SetFile"' \ 51 'ac_cv_prog_SETFILE="${setfile}/bin/SetFile"' 52 + substituteInPlace configure --replace \ 53 + "-framework System" \ 54 + -lSystem 55 ''; 56 57 postInstall = " ··· 66 enableParallelBuilding = true; 67 68 meta = { 69 + platforms = with stdenv.lib.platforms; darwin ++ linux; 70 }; 71 }
+9 -3
pkgs/development/libraries/wxGTK-3.0/default.nix
··· 2 , gstreamer, gst_plugins_base, GConf, setfile 3 , withMesa ? true, mesa ? null, compat24 ? false, compat26 ? true, unicode ? true 4 , withWebKit ? false, webkitgtk2 ? null 5 }: 6 7 ··· 26 gst_plugins_base GConf ] 27 ++ optional withMesa mesa 28 ++ optional withWebKit webkitgtk2 29 - ++ optional stdenv.isDarwin setfile; 30 31 nativeBuildInputs = [ pkgconfig ]; 32 33 configureFlags = 34 [ "--enable-gtk2" "--disable-precomp-headers" "--enable-mediactrl" ··· 38 ++ optional withMesa "--with-opengl" 39 ++ optionals stdenv.isDarwin 40 # allow building on 64-bit 41 - [ "--with-cocoa" "--enable-universal-binaries" ] 42 ++ optionals withWebKit 43 ["--enable-webview" "--enable-webview-webkit"]; 44 ··· 52 substituteInPlace configure --replace \ 53 'ac_cv_prog_SETFILE="/Developer/Tools/SetFile"' \ 54 'ac_cv_prog_SETFILE="${setfile}/bin/SetFile"' 55 ''; 56 57 postInstall = " ··· 66 enableParallelBuilding = true; 67 68 meta = { 69 - platforms = stdenv.lib.platforms.linux; 70 }; 71 }
··· 2 , gstreamer, gst_plugins_base, GConf, setfile 3 , withMesa ? true, mesa ? null, compat24 ? false, compat26 ? true, unicode ? true 4 , withWebKit ? false, webkitgtk2 ? null 5 + , AGL ? null, Carbon ? null, Cocoa ? null, Kernel ? null, QTKit ? null 6 }: 7 8 ··· 27 gst_plugins_base GConf ] 28 ++ optional withMesa mesa 29 ++ optional withWebKit webkitgtk2 30 + ++ optionals stdenv.isDarwin [ setfile Carbon Cocoa Kernel QTKit ]; 31 32 nativeBuildInputs = [ pkgconfig ]; 33 + 34 + propagatedBuildInputs = optional stdenv.isDarwin AGL; 35 36 configureFlags = 37 [ "--enable-gtk2" "--disable-precomp-headers" "--enable-mediactrl" ··· 41 ++ optional withMesa "--with-opengl" 42 ++ optionals stdenv.isDarwin 43 # allow building on 64-bit 44 + [ "--with-cocoa" "--enable-universal-binaries" "--with-macosx-version-min=10.7" ] 45 ++ optionals withWebKit 46 ["--enable-webview" "--enable-webview-webkit"]; 47 ··· 55 substituteInPlace configure --replace \ 56 'ac_cv_prog_SETFILE="/Developer/Tools/SetFile"' \ 57 'ac_cv_prog_SETFILE="${setfile}/bin/SetFile"' 58 + substituteInPlace configure --replace \ 59 + "-framework System" \ 60 + -lSystem 61 ''; 62 63 postInstall = " ··· 72 enableParallelBuilding = true; 73 74 meta = { 75 + platforms = with stdenv.lib.platforms; darwin ++ linux; 76 }; 77 }
+5 -5
pkgs/development/libraries/xylib/default.nix
··· 1 - { stdenv, fetchurl, boost, zlib, bzip2 }: 2 3 stdenv.mkDerivation rec { 4 name = "xylib-${version}"; 5 - version = "1.4"; 6 7 src = fetchurl { 8 - url = "https://github.com/wojdyr/xylib/releases/download/v${version}/${name}-${version}.tar.bz2"; 9 - sha256 = "09j426qjbg3damch1hfw16j992kn2hj8gs4lpvqgfqdw61kvqivh"; 10 }; 11 12 - buildInputs = [ boost zlib bzip2 ]; 13 14 meta = with stdenv.lib; { 15 description = "Portable library for reading files that contain x-y data from powder diffraction, spectroscopy and other experimental methods";
··· 1 + { stdenv, fetchurl, boost, zlib, bzip2, wxGTK30 }: 2 3 stdenv.mkDerivation rec { 4 name = "xylib-${version}"; 5 + version = "1.5"; 6 7 src = fetchurl { 8 + url = "https://github.com/wojdyr/xylib/releases/download/v${version}/${name}.tar.bz2"; 9 + sha256 = "1r2kx80zhdvz39k6h2fsncm2742xxvxl3z8a3fnr13jl9sl7mnnd"; 10 }; 11 12 + buildInputs = [ boost zlib bzip2 wxGTK30 ]; 13 14 meta = with stdenv.lib; { 15 description = "Portable library for reading files that contain x-y data from powder diffraction, spectroscopy and other experimental methods";
+9 -17
pkgs/development/ocaml-modules/eliom/default.nix
··· 1 - { stdenv, fetchurl, ocaml, findlib, which, ocsigen_server, ocsigen_deriving, 2 js_of_ocaml, ocaml_react, ocaml_lwt, calendar, cryptokit, tyxml, 3 ipaddr, ocamlnet, ocaml_ssl, ocaml_pcre, ocaml_optcomp, 4 - reactivedata, opam, ppx_tools, camlp4}: 5 6 - let ocamlVersion = (stdenv.lib.getVersion ocaml); 7 - in 8 - 9 - ( 10 - assert stdenv.lib.versionAtLeast ocamlVersion "4"; 11 - 12 - stdenv.mkDerivation rec 13 { 14 pname = "eliom"; 15 version = "5.0.0"; ··· 22 23 patches = [ ./camlp4.patch ]; 24 25 - buildInputs = [ocaml which ocsigen_server findlib ocsigen_deriving 26 - js_of_ocaml ocaml_optcomp opam ppx_tools camlp4 ]; 27 28 - propagatedBuildInputs = [ ocaml_lwt reactivedata tyxml ipaddr 29 - calendar cryptokit ocamlnet ocaml_react ocaml_ssl 30 - ocaml_pcre ]; 31 32 preConfigure = stdenv.lib.optionalString (!stdenv.lib.versionAtLeast ocamlVersion "4.02") '' 33 export PPX=false ··· 57 58 license = stdenv.lib.licenses.lgpl21; 59 60 - platforms = ocaml.meta.platforms or []; 61 - 62 maintainers = [ stdenv.lib.maintainers.gal_bolle ]; 63 }; 64 - })
··· 1 + { buildOcaml, stdenv, fetchurl, which, ocsigen_server, ocsigen_deriving, ocaml, 2 js_of_ocaml, ocaml_react, ocaml_lwt, calendar, cryptokit, tyxml, 3 ipaddr, ocamlnet, ocaml_ssl, ocaml_pcre, ocaml_optcomp, 4 + reactivedata, opam, ppx_tools, ppx_deriving, camlp4}: 5 6 + let ocamlVersion = (stdenv.lib.getVersion ocaml); in 7 + buildOcaml rec 8 { 9 pname = "eliom"; 10 version = "5.0.0"; ··· 17 18 patches = [ ./camlp4.patch ]; 19 20 + buildInputs = [ which ocaml_optcomp opam ppx_tools camlp4 ]; 21 22 + propagatedBuildInputs = [ ocaml_lwt reactivedata tyxml ipaddr ocsigen_server ppx_deriving 23 + ocsigen_deriving js_of_ocaml 24 + calendar cryptokit ocamlnet ocaml_react ocaml_ssl ocaml_pcre ]; 25 26 preConfigure = stdenv.lib.optionalString (!stdenv.lib.versionAtLeast ocamlVersion "4.02") '' 27 export PPX=false ··· 51 52 license = stdenv.lib.licenses.lgpl21; 53 54 maintainers = [ stdenv.lib.maintainers.gal_bolle ]; 55 }; 56 + }
+10 -8
pkgs/development/ocaml-modules/pgocaml/default.nix
··· 1 - { stdenv, fetchurl, ocaml, findlib, ocamlbuild, camlp4, calendar, csv, ocaml_pcre }: 2 3 - stdenv.mkDerivation { 4 - name = "ocaml-pgocaml-2.2"; 5 src = fetchurl { 6 - url = http://forge.ocamlcore.org/frs/download.php/1506/pgocaml-2.2.tgz; 7 - sha256 = "0x0dhlz2rqxpwfdqi384f9fn0ng2irifadmxfm2b4gcz7y1cl9rh"; 8 }; 9 10 - buildInputs = [ ocaml findlib ocamlbuild camlp4 ]; 11 - propagatedBuildInputs = [ calendar csv ocaml_pcre ]; 12 13 createFindlibDestdir = true; 14 ··· 16 description = "An interface to PostgreSQL databases for OCaml applications"; 17 homepage = http://pgocaml.forge.ocamlcore.org/; 18 license = licenses.lgpl2; 19 - platforms = ocaml.meta.platforms or []; 20 maintainers = with maintainers; [ vbgl ]; 21 }; 22 }
··· 1 + { stdenv, fetchurl, buildOcaml, calendar, csv, re }: 2 3 + buildOcaml { 4 + name = "pgocaml"; 5 + version = "2.3"; 6 src = fetchurl { 7 + url = https://github.com/darioteixeira/pgocaml/archive/v2.3.tar.gz; 8 + sha256 = "18lymxlvcf4nwxawkidq3pilsp5rhl0l8ifq6pjk3ssjlx9w53pg"; 9 }; 10 11 + buildInputs = [ ]; 12 + propagatedBuildInputs = [ calendar csv re ]; 13 + 14 + configureFlags = [ "--enable-p4" ]; 15 16 createFindlibDestdir = true; 17 ··· 19 description = "An interface to PostgreSQL databases for OCaml applications"; 20 homepage = http://pgocaml.forge.ocamlcore.org/; 21 license = licenses.lgpl2; 22 maintainers = with maintainers; [ vbgl ]; 23 }; 24 }
+2 -2
pkgs/development/tools/analysis/kcov/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 name = "kcov-${version}"; 5 - version = "29"; 6 7 src = fetchurl { 8 url = "https://github.com/SimonKagstrom/kcov/archive/v${version}.tar.gz"; 9 - sha256 = "0nspf1bfq8zv7zmcmvkbgg3c90k10qcd56gyg8ln5z64nadvha9d"; 10 }; 11 12 preConfigure = "patchShebangs src/bin-to-c-source.py";
··· 2 3 stdenv.mkDerivation rec { 4 name = "kcov-${version}"; 5 + version = "32"; 6 7 src = fetchurl { 8 url = "https://github.com/SimonKagstrom/kcov/archive/v${version}.tar.gz"; 9 + sha256 = "0ic5w6r3cpwb32iky1jmyvfclgkqr0rnfyim7j2r6im21846sa85"; 10 }; 11 12 preConfigure = "patchShebangs src/bin-to-c-source.py";
+28
pkgs/development/tools/makerpm/default.nix
···
··· 1 + { stdenv, fetchFromGitHub, zlib, libarchive, openssl }: 2 + 3 + stdenv.mkDerivation rec { 4 + version = "1.0"; 5 + name = "makerpm-${version}"; 6 + 7 + installPhase = '' 8 + mkdir -p $out/bin 9 + cp makerpm $out/bin 10 + ''; 11 + 12 + buildInputs = [ zlib libarchive openssl ]; 13 + 14 + src = fetchFromGitHub { 15 + owner = "ivan-tkatchev"; 16 + repo = "makerpm"; 17 + rev = "${version}"; 18 + sha256 = "089dkbh5705ppyi920rd0ksjc0143xmvnhm8qrx93rsgwc1ggi1y"; 19 + }; 20 + 21 + meta = with stdenv.lib; { 22 + homepage = https://github.com/ivan-tkatchev/makerpm/; 23 + description = "A clean, simple RPM packager reimplemented completely from scratch"; 24 + license = licenses.free; 25 + platforms = platforms.all; 26 + maintainers = [ maintainers.ivan-tkatchev ]; 27 + }; 28 + }
+44
pkgs/development/tools/nrpl/default.nix
···
··· 1 + { stdenv, lib, fetchFromGitHub, fetchpatch, makeWrapper, nim, pcre, tinycc }: 2 + 3 + stdenv.mkDerivation rec { 4 + name = "nrpl-${version}"; 5 + version = "20150522"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "wheineman"; 9 + repo = "nrpl"; 10 + rev = "6d6c189ab7d1c905cc29dc678d66e9e132026f69"; 11 + sha256 = "1cly9lhrawnc42r31b7r0p0i6hcx8r00aa17gv7w9pcpj8ngb4v2"; 12 + }; 13 + 14 + buildInputs = [ makeWrapper nim pcre ]; 15 + 16 + patches = [ 17 + (fetchpatch { 18 + url = https://patch-diff.githubusercontent.com/raw/wheineman/nrpl/pull/12.patch; 19 + name = "update_for_new_nim.patch"; 20 + sha256 = "1zff7inhn3l1jnxcnidy705lzi3wqib1chf4rayh1g9i23an7wg1"; 21 + }) 22 + ]; 23 + 24 + NIX_LDFLAGS = [ 25 + "-lpcre" 26 + ]; 27 + 28 + buildPhase = "nim c -d:release nrpl.nim"; 29 + 30 + installPhase = "install -Dt $out/bin nrpl"; 31 + 32 + postFixup = '' 33 + wrapProgram $out/bin/nrpl \ 34 + --prefix PATH : ${lib.makeBinPath [ nim tinycc ]} 35 + ''; 36 + 37 + meta = with stdenv.lib; { 38 + description = "REPL for the Nim programming language"; 39 + homepage = https://github.com/wheineman/nrpl; 40 + license = licenses.mit; 41 + maintainers = with maintainers; [ peterhoeg ]; 42 + platforms = with platforms; linux ++ darwin; 43 + }; 44 + }
+2 -2
pkgs/development/tools/ocaml/js_of_ocaml/default.nix
··· 8 sha256 = "1dali1akyd4zmkwav0d957ynxq2jj6cc94r4xiaql7ca89ajz4jj"; 9 }; 10 11 - buildInputs = [ ocaml findlib menhir ocsigen_deriving ppx_deriving 12 cmdliner tyxml reactivedata cppo which base64]; 13 - propagatedBuildInputs = [ ocaml_lwt camlp4 ]; 14 15 patches = [ ./Makefile.conf.diff ]; 16
··· 8 sha256 = "1dali1akyd4zmkwav0d957ynxq2jj6cc94r4xiaql7ca89ajz4jj"; 9 }; 10 11 + buildInputs = [ ocaml findlib menhir ocsigen_deriving 12 cmdliner tyxml reactivedata cppo which base64]; 13 + propagatedBuildInputs = [ ocaml_lwt camlp4 ppx_deriving ]; 14 15 patches = [ ./Makefile.conf.diff ]; 16
+3 -1
pkgs/games/chessx/default.nix
··· 17 qmakeHook 18 ]; 19 20 - enableParallelBuilding = true; 21 installPhase = '' 22 runHook preInstall 23 mkdir -p "$out/bin"
··· 17 qmakeHook 18 ]; 19 20 + # RCC: Error in 'resources.qrc': Cannot find file 'i18n/chessx_da.qm' 21 + #enableParallelBuilding = true; 22 + 23 installPhase = '' 24 runHook preInstall 25 mkdir -p "$out/bin"
-19
pkgs/games/freeorion/92455f9.patch
··· 1 - diff -Naur GG/src/Font.cpp 2 - --- /GG/src/Font.cpp 3 - +++ /GG/src/Font.cpp 4 - @@ -1586,8 +1586,13 @@ 5 - using boost::lexical_cast; 6 - FT_UInt index = FT_Get_Char_Index(face, ch); 7 - if (index) { 8 - - if (FT_Load_Glyph(face, index, FT_LOAD_DEFAULT)) 9 - - ThrowBadGlyph("GG::Font::GetGlyphBitmap : Freetype could not load the glyph for character '%1%'", ch); 10 - + if (FT_Load_Glyph(face, index, FT_LOAD_DEFAULT)) { 11 - + // loading of a glpyh failed so we replace it with 12 - + // the 'Replacement Character' at codepoint 0xFFFD 13 - + FT_UInt tmp_index = FT_Get_Char_Index(face, 0xFFFD); 14 - + if (FT_Load_Glyph(face, tmp_index, FT_LOAD_DEFAULT)) 15 - + ThrowBadGlyph("GG::Font::GetGlyphBitmap : Freetype could not load the glyph for character '%1%'", ch); 16 - + } 17 - 18 - FT_GlyphSlot glyph = face->glyph; 19 -
···
+6 -5
pkgs/games/freeorion/default.nix
··· 2 , libxslt, makeWrapper }: 3 4 stdenv.mkDerivation rec { 5 - version = "0.4.5"; 6 name = "freeorion-${version}"; 7 8 src = fetchurl { 9 - url = "https://github.com/freeorion/freeorion/releases/download/v0.4.5/FreeOrion_v0.4.5_2015-09-01.f203162_Source.tar.gz"; 10 - sha256 = "3b99b92eeac72bd059566dbabfab54368989ba83f72e769bc94eb8dd4fe414c0"; 11 }; 12 13 buildInputs = [ cmake boost SDL2 python2 freetype openal libogg libvorbis zlib libpng libtiff libjpeg mesa glew doxygen makeWrapper ]; 14 15 - # cherry pick for acceptable performance https://github.com/freeorion/freeorion/commit/92455f97c28055e296718230d2e3744eccd738ec 16 - patches = [ ./92455f9.patch ]; 17 18 enableParallelBuilding = true; 19
··· 2 , libxslt, makeWrapper }: 3 4 stdenv.mkDerivation rec { 5 + version = "0.4.6"; 6 name = "freeorion-${version}"; 7 8 src = fetchurl { 9 + url = "https://github.com/freeorion/freeorion/releases/download/v0.4.6/FreeOrion_v0.4.6_2016-09-16.49f9123_Source.tar.gz"; 10 + sha256 = "04g3x1cymf7mnmc2f5mm3c2r5izjmy7z3pvk2ykzz8f8b2kz6gry"; 11 }; 12 13 buildInputs = [ cmake boost SDL2 python2 freetype openal libogg libvorbis zlib libpng libtiff libjpeg mesa glew doxygen makeWrapper ]; 14 15 + patches = [ 16 + ./fix_rpaths.patch 17 + ]; 18 19 enableParallelBuilding = true; 20
+11
pkgs/games/freeorion/fix_rpaths.patch
···
··· 1 + --- a/CMakeLists.txt 2 + +++ b/CMakeLists.txt 3 + @@ -46,7 +46,7 @@ 4 + set(FreeOrion_INSTALL_LIBDIR "${CMAKE_INSTALL_LIBDIR}/freeorion") 5 + endif() 6 + 7 + -set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_PREFIX}/${FreeOrion_INSTALL_LIBDIR}") 8 + +set(CMAKE_INSTALL_RPATH "${CMAKE_INSTALL_FULL_LIBDIR}/freeorion") 9 + set(CMAKE_INSTALL_RPATH_USE_LINK_PATH TRUE) 10 + 11 + if (WIN32)
+8 -6
pkgs/games/opendungeons/default.nix
··· 1 - { stdenv, fetchurl, ogre, cegui, boost, sfml, openal, cmake, ois }: 2 3 stdenv.mkDerivation rec { 4 name = "opendungeons-${version}"; 5 - version = "0.6.0"; 6 7 - src = fetchurl { 8 - url = "ftp://download.tuxfamily.org/opendungeons/${version}/${name}.tar.xz"; 9 - sha256 = "1g0sjh732794h26cbkr0p96i3c0avm0mx9ip5zbvb2y3sbpjcbib"; 10 }; 11 12 patches = [ ./cmakepaths.patch ]; 13 14 - buildInputs = [ cmake ogre cegui boost sfml openal ois ]; 15 16 meta = with stdenv.lib; { 17 description = "An open source, real time strategy game sharing game elements with the Dungeon Keeper series and Evil Genius.";
··· 1 + { stdenv, fetchFromGitHub, ogre, cegui, boost, sfml, openal, cmake, ois, pkgconfig }: 2 3 stdenv.mkDerivation rec { 4 name = "opendungeons-${version}"; 5 + version = "0.7.1"; 6 7 + src = fetchFromGitHub { 8 + owner = "OpenDungeons"; 9 + repo = "OpenDungeons"; 10 + rev = version; 11 + sha256 = "0nipb2h0gn628yxlahjgnfhmpfqa19mjdbj3aqabimdfqds9pryh"; 12 }; 13 14 patches = [ ./cmakepaths.patch ]; 15 16 + buildInputs = [ cmake ogre cegui boost sfml openal ois pkgconfig ]; 17 18 meta = with stdenv.lib; { 19 description = "An open source, real time strategy game sharing game elements with the Dungeon Keeper series and Evil Genius.";
+6 -6
pkgs/misc/screensavers/physlock/default.nix
··· 1 { stdenv, fetchFromGitHub }: 2 3 stdenv.mkDerivation rec { 4 - version = "git-20150126"; 5 - name = "physlock-${version}"; 6 src = fetchFromGitHub { 7 - owner = "muennich"; 8 - repo = "physlock"; 9 - rev = "b64dccc8c22710f8bf01eb5419590cdb0e65cabb"; 10 - sha256 = "1dapkwj3y6bb4j8q4glms7zsqm7drr37nrnr30sbahwq67rnvzcc"; 11 }; 12 13 preConfigure = ''
··· 1 { stdenv, fetchFromGitHub }: 2 3 stdenv.mkDerivation rec { 4 + version = "0.5"; 5 + name = "physlock-v${version}"; 6 src = fetchFromGitHub { 7 + owner = "muennich"; 8 + repo = "physlock"; 9 + rev = "v${version}"; 10 + sha256 = "102kdixrf7xxsxr69lbz73i1ss7959716cmdf8d5kbnhmk6argv7"; 11 }; 12 13 preConfigure = ''
+7 -5
pkgs/misc/vim-plugins/default.nix
··· 1309 dependencies = []; 1310 buildInputs = [ 1311 python go cmake 1312 - (if stdenv.isDarwin then llvmPackages.clang else llvmPackages.clang-unwrapped) 1313 - llvmPackages.llvm 1314 ] ++ stdenv.lib.optional stdenv.isDarwin Cocoa; 1315 1316 propagatedBuildInputs = stdenv.lib.optional (!stdenv.isDarwin) rustracerd; 1317 1318 patches = [ 1319 - ./patches/youcompleteme/1-top-cmake.patch 1320 ./patches/youcompleteme/2-ycm-cmake.patch 1321 ]; 1322 1323 buildPhase = '' 1324 patchShebangs . 1325 substituteInPlace plugin/youcompleteme.vim \ ··· 1327 1328 mkdir build 1329 pushd build 1330 - cmake -G "Unix Makefiles" . ../third_party/ycmd/cpp -DPYTHON_LIBRARIES:PATH=${python}/lib/libpython2.7.so -DPYTHON_INCLUDE_DIR:PATH=${python}/include/python2.7 -DUSE_CLANG_COMPLETER=ON -DUSE_SYSTEM_LIBCLANG=ON 1331 make ycm_core -j''${NIX_BUILD_CORES} -l''${NIX_BUILD_CORES}} 1332 - ${python}/bin/python ../third_party/ycmd/build.py --gocode-completer --clang-completer --system-libclang 1333 popd 1334 ''; 1335
··· 1309 dependencies = []; 1310 buildInputs = [ 1311 python go cmake 1312 ] ++ stdenv.lib.optional stdenv.isDarwin Cocoa; 1313 1314 propagatedBuildInputs = stdenv.lib.optional (!stdenv.isDarwin) rustracerd; 1315 1316 patches = [ 1317 ./patches/youcompleteme/2-ycm-cmake.patch 1318 ]; 1319 1320 + # YCM requires path to external libclang 3.9 1321 + # For explicit use and as env variable for ../third_party/ycmd/build.py 1322 + EXTRA_CMAKE_ARGS="-DEXTERNAL_LIBCLANG_PATH=${llvmPackages.clang.cc}/lib/libclang.${if stdenv.isDarwin then "dylib" else "so"}"; 1323 + 1324 buildPhase = '' 1325 patchShebangs . 1326 substituteInPlace plugin/youcompleteme.vim \ ··· 1328 1329 mkdir build 1330 pushd build 1331 + cmake -G "Unix Makefiles" . ../third_party/ycmd/cpp -DPYTHON_LIBRARIES:PATH=${python}/lib/libpython2.7.so -DPYTHON_INCLUDE_DIR:PATH=${python}/include/python2.7 -DUSE_CLANG_COMPLETER=ON \ 1332 + $EXTRA_CMAKE_ARGS 1333 make ycm_core -j''${NIX_BUILD_CORES} -l''${NIX_BUILD_CORES}} 1334 + ${python}/bin/python ../third_party/ycmd/build.py --gocode-completer --clang-completer 1335 popd 1336 ''; 1337
-14
pkgs/misc/vim-plugins/patches/youcompleteme/1-top-cmake.patch
··· 1 - 2 - --- ./third_party/ycmd/cpp/CMakeLists.txt 3 - +++ ./third_party/ycmd/cpp/CMakeLists.txt 4 - @@ -121,8 +121,8 @@ 5 - set( CPP11_AVAILABLE true ) 6 - endif() 7 - elseif( COMPILER_IS_CLANG ) 8 - - set( CPP11_AVAILABLE true ) 9 - - set( CMAKE_XCODE_ATTRIBUTE_CLANG_CXX_LANGUAGE_STANDARD "c++11" ) 10 - + #set( CPP11_AVAILABLE true ) 11 - + # set( CMAKE_XCODE_ATTRIBUTE_CLANG_CXX_LANGUAGE_STANDARD "c++11" ) 12 - set( CMAKE_XCODE_ATTRIBUTE_CLANG_CXX_LIBRARY "libc++" ) 13 - endif() 14 -
···
+7 -5
pkgs/misc/vim-plugins/vim2nix/additional-nix-code/youcompleteme
··· 1 buildInputs = [ 2 python go cmake 3 - (if stdenv.isDarwin then llvmPackages.clang else llvmPackages.clang-unwrapped) 4 - llvmPackages.llvm 5 ] ++ stdenv.lib.optional stdenv.isDarwin Cocoa; 6 7 propagatedBuildInputs = stdenv.lib.optional (!stdenv.isDarwin) rustracerd; 8 9 patches = [ 10 - ./patches/youcompleteme/1-top-cmake.patch 11 ./patches/youcompleteme/2-ycm-cmake.patch 12 ]; 13 14 buildPhase = '' 15 patchShebangs . 16 substituteInPlace plugin/youcompleteme.vim \ ··· 18 19 mkdir build 20 pushd build 21 - cmake -G "Unix Makefiles" . ../third_party/ycmd/cpp -DPYTHON_LIBRARIES:PATH=${python}/lib/libpython2.7.so -DPYTHON_INCLUDE_DIR:PATH=${python}/include/python2.7 -DUSE_CLANG_COMPLETER=ON -DUSE_SYSTEM_LIBCLANG=ON 22 make ycm_core -j''${NIX_BUILD_CORES} -l''${NIX_BUILD_CORES}} 23 - ${python}/bin/python ../third_party/ycmd/build.py --gocode-completer --clang-completer --system-libclang 24 popd 25 ''; 26
··· 1 buildInputs = [ 2 python go cmake 3 ] ++ stdenv.lib.optional stdenv.isDarwin Cocoa; 4 5 propagatedBuildInputs = stdenv.lib.optional (!stdenv.isDarwin) rustracerd; 6 7 patches = [ 8 ./patches/youcompleteme/2-ycm-cmake.patch 9 ]; 10 11 + # YCM requires path to external libclang 3.9 12 + # For explicit use and as env variable for ../third_party/ycmd/build.py 13 + EXTRA_CMAKE_ARGS="-DEXTERNAL_LIBCLANG_PATH=${llvmPackages.clang.cc}/lib/libclang.${if stdenv.isDarwin then "dylib" else "so"}"; 14 + 15 buildPhase = '' 16 patchShebangs . 17 substituteInPlace plugin/youcompleteme.vim \ ··· 19 20 mkdir build 21 pushd build 22 + cmake -G "Unix Makefiles" . ../third_party/ycmd/cpp -DPYTHON_LIBRARIES:PATH=${python}/lib/libpython2.7.so -DPYTHON_INCLUDE_DIR:PATH=${python}/include/python2.7 -DUSE_CLANG_COMPLETER=ON \ 23 + $EXTRA_CMAKE_ARGS 24 make ycm_core -j''${NIX_BUILD_CORES} -l''${NIX_BUILD_CORES}} 25 + ${python}/bin/python ../third_party/ycmd/build.py --gocode-completer --clang-completer 26 popd 27 ''; 28
+3 -3
pkgs/os-specific/linux/bcc/default.nix
··· 2 flex, bison, elfutils, python, pythonPackages, luajit, netperf, iperf }: 3 4 stdenv.mkDerivation rec { 5 - version = "git-2016-08-30"; 6 name = "bcc-${version}"; 7 8 src = fetchFromGitHub { 9 owner = "iovisor"; 10 repo = "bcc"; 11 - rev = "4c2b5388f8d685a127a4d757c254a380e0aa915c"; 12 - sha256 = "1bd4darmr60vfr5414zq0bd9rq42r6h3cwiiwjllksbi4v2jvx77"; 13 }; 14 15 buildInputs = [ makeWrapper cmake llvmPackages.llvm llvmPackages.clang-unwrapped kernel
··· 2 flex, bison, elfutils, python, pythonPackages, luajit, netperf, iperf }: 3 4 stdenv.mkDerivation rec { 5 + version = "0.2.0"; 6 name = "bcc-${version}"; 7 8 src = fetchFromGitHub { 9 owner = "iovisor"; 10 repo = "bcc"; 11 + rev = "v${version}"; 12 + sha256 = "1xifh8lcqmn4mk6w4srjf4zk6mlwgck4fpcyhhliy39963ch5k08"; 13 }; 14 15 buildInputs = [ makeWrapper cmake llvmPackages.llvm llvmPackages.clang-unwrapped kernel
+3 -3
pkgs/os-specific/linux/dpdk/default.nix
··· 4 5 stdenv.mkDerivation rec { 6 name = "dpdk-${version}-${kernel.version}"; 7 - version = "16.07"; 8 9 src = fetchurl { 10 - url = "http://dpdk.org/browse/dpdk/snapshot/dpdk-${version}.tar.gz"; 11 - sha256 = "1sgh55w3xpc0lb70s74cbyryxdjijk1fbv9b25jy8ms3lxaj966c"; 12 }; 13 14 buildInputs = [ pkgconfig libvirt ];
··· 4 5 stdenv.mkDerivation rec { 6 name = "dpdk-${version}-${kernel.version}"; 7 + version = "16.07.2"; 8 9 src = fetchurl { 10 + url = "http://fast.dpdk.org/rel/dpdk-${version}.tar.xz"; 11 + sha256 = "1mzwazmzpq8mvwiham80y6h53qpvjpp76v0d58gz9bfiphbi9876"; 12 }; 13 14 buildInputs = [ pkgconfig libvirt ];
+2 -2
pkgs/os-specific/linux/kernel/patches.nix
··· 96 97 grsecurity_testing = grsecPatch 98 { kver = "4.8.15"; 99 - grrev = "201612151923"; 100 - sha256 = "1di4v0b0sn7ibg9vrn8w7d5vjxd2mdlxdmqsnyd6xyn8g00fra89"; 101 }; 102 103 # This patch relaxes grsec constraints on the location of usermode helpers,
··· 96 97 grsecurity_testing = grsecPatch 98 { kver = "4.8.15"; 99 + grrev = "201612301949"; 100 + sha256 = "1083r30ipvdi3kjixlsp3f1mmf7848f2p32ds956caarvr4vkm3b"; 101 }; 102 103 # This patch relaxes grsec constraints on the location of usermode helpers,
+3 -9
pkgs/os-specific/linux/odp-dpdk/default.nix
··· 2 3 stdenv.mkDerivation rec { 4 name = "odp-dpdk-${version}"; 5 - version = "2016-08-16"; 6 7 src = fetchgit { 8 url = "https://git.linaro.org/lng/odp-dpdk.git"; 9 - rev = "7068593f600e2b5a23ee1780d5c722c54e966df1"; 10 - sha256 = "0pz0zkxqaac193x21wmj3x88gfza6bvhmv5yf8fzkpm9zxnl2sy4"; 11 }; 12 13 nativeBuildInputs = [ autoreconfHook ]; ··· 15 16 RTE_SDK = "${dpdk}"; 17 RTE_TARGET = "x86_64-native-linuxapp-gcc"; 18 - 19 - patchPhase = '' 20 - substituteInPlace scripts/git_hash.sh --replace /bin/bash /bin/sh 21 - substituteInPlace scripts/get_impl_str.sh --replace /bin/bash /bin/sh 22 - echo -n ${version} > .scmversion 23 - ''; 24 25 dontDisableStatic = true; 26
··· 2 3 stdenv.mkDerivation rec { 4 name = "odp-dpdk-${version}"; 5 + version = "1.12.0.0"; 6 7 src = fetchgit { 8 url = "https://git.linaro.org/lng/odp-dpdk.git"; 9 + rev = "5e370e1113973feafb43a8e57d4c59be40e9aeab"; 10 + sha256 = "0rrakbxnbsqaj148xaz2hwxjvg3cmzlynfkvcp8w56sqyly75d0n"; 11 }; 12 13 nativeBuildInputs = [ autoreconfHook ]; ··· 15 16 RTE_SDK = "${dpdk}"; 17 RTE_TARGET = "x86_64-native-linuxapp-gcc"; 18 19 dontDisableStatic = true; 20
+3 -8
pkgs/os-specific/linux/pktgen/default.nix
··· 5 6 stdenv.mkDerivation rec { 7 name = "pktgen-${version}"; 8 - version = "3.0.13"; 9 10 src = fetchurl { 11 - url = "http://dpdk.org/browse/apps/pktgen-dpdk/snapshot/pktgen-${version}.tar.gz"; 12 - sha256 = "64629b454ed8dc036d5e9bb30b3ae84a0bab0142b651c72da85ab1454e9ae0d6"; 13 }; 14 15 nativeBuildInputs = stdenv.lib.optionals withGtk [ pkgconfig ]; ··· 23 GUI = stdenv.lib.optionalString withGtk "true"; 24 25 NIX_CFLAGS_COMPILE = [ "-march=core2" ]; 26 - 27 - postPatch = '' 28 - substituteInPlace lib/lua/src/luaconf.h --replace /usr/local $out 29 - substituteInPlace lib/common/wr_lscpu.h --replace /usr/bin/lscpu ${utillinux}/bin/lscpu 30 - ''; 31 32 installPhase = '' 33 install -d $out/bin
··· 5 6 stdenv.mkDerivation rec { 7 name = "pktgen-${version}"; 8 + version = "3.1.0"; 9 10 src = fetchurl { 11 + url = "http://dpdk.org/browse/apps/pktgen-dpdk/snapshot/pktgen-v${version}.tar.gz"; 12 + sha256 = "1a1dl8h8p76wlcjlvn736mz4nc2nc5c3764rlydiz86wl45mb0nb"; 13 }; 14 15 nativeBuildInputs = stdenv.lib.optionals withGtk [ pkgconfig ]; ··· 23 GUI = stdenv.lib.optionalString withGtk "true"; 24 25 NIX_CFLAGS_COMPILE = [ "-march=core2" ]; 26 27 installPhase = '' 28 install -d $out/bin
+2 -2
pkgs/os-specific/linux/wireguard/default.nix
··· 6 let 7 name = "wireguard-${version}"; 8 9 - version = "0.0.20161223"; 10 11 src = fetchurl { 12 url = "https://git.zx2c4.com/WireGuard/snapshot/WireGuard-${version}.tar.xz"; 13 - sha256 = "0wmrsap34nd1x4gvz80isgsjjxbplvkrxnw56qlaqxkycvv8zndv"; 14 }; 15 16 meta = with stdenv.lib; {
··· 6 let 7 name = "wireguard-${version}"; 8 9 + version = "0.0.20161230"; 10 11 src = fetchurl { 12 url = "https://git.zx2c4.com/WireGuard/snapshot/WireGuard-${version}.tar.xz"; 13 + sha256 = "15p3k8msk3agr0i96k12y5h4fxv0gc8zqjk15mizd3wwmw6pgjb9"; 14 }; 15 16 meta = with stdenv.lib; {
+2 -2
pkgs/servers/matrix-synapse/default.nix
··· 24 }; 25 in pythonPackages.buildPythonApplication rec { 26 name = "matrix-synapse-${version}"; 27 - version = "0.18.5"; 28 29 src = fetchFromGitHub { 30 owner = "matrix-org"; 31 repo = "synapse"; 32 rev = "v${version}"; 33 - sha256 = "1l9vfx08alf71323jrfjjvcb7pww613dwxskdgc1bplnva4khj4f"; 34 }; 35 36 patches = [ ./matrix-synapse.patch ];
··· 24 }; 25 in pythonPackages.buildPythonApplication rec { 26 name = "matrix-synapse-${version}"; 27 + version = "0.18.6-rc2"; 28 29 src = fetchFromGitHub { 30 owner = "matrix-org"; 31 repo = "synapse"; 32 rev = "v${version}"; 33 + sha256 = "0alsby8hghhzgpzism2f9v5pmz91v20bd18nflfka79f3ss03h0q"; 34 }; 35 36 patches = [ ./matrix-synapse.patch ];
+6 -5
pkgs/tools/backup/borg/default.nix
··· 15 # For building documentation: 16 sphinx sphinx_rtd_theme 17 ]; 18 - propagatedBuildInputs = [ 19 - acl lz4 openssl 20 - ] ++ (with python3Packages; [ 21 - cython msgpack llfuse tox detox setuptools_scm 22 - ]); 23 24 preConfigure = '' 25 export BORG_OPENSSL_PREFIX="${openssl.dev}"
··· 15 # For building documentation: 16 sphinx sphinx_rtd_theme 17 ]; 18 + buildInputs = [ 19 + acl lz4 openssl python3Packages.setuptools_scm 20 + ]; 21 + propagatedBuildInputs = with python3Packages; [ 22 + cython llfuse msgpack 23 + ]; 24 25 preConfigure = '' 26 export BORG_OPENSSL_PREFIX="${openssl.dev}"
+3 -1
pkgs/tools/graphics/netpbm/default.nix
··· 24 echo "STATICLIB_TOO = n" >> config.mk 25 substituteInPlace "config.mk" \ 26 --replace "TIFFLIB = NONE" "TIFFLIB = ${libtiff.out}/lib/libtiff.so" \ 27 - --replace "TIFFHDR_DIR =" "TIFFHDR_DIR = ${libtiff.dev}/include" 28 '' + stdenv.lib.optionalString stdenv.isDarwin '' 29 echo "LDSHLIB=-dynamiclib -install_name $out/lib/libnetpbm.\$(MAJ).dylib" >> config.mk 30 echo "NETPBMLIBTYPE = dylib" >> config.mk
··· 24 echo "STATICLIB_TOO = n" >> config.mk 25 substituteInPlace "config.mk" \ 26 --replace "TIFFLIB = NONE" "TIFFLIB = ${libtiff.out}/lib/libtiff.so" \ 27 + --replace "TIFFHDR_DIR =" "TIFFHDR_DIR = ${libtiff.dev}/include" \ 28 + --replace "JPEGLIB = NONE" "JPEGLIB = ${libjpeg.out}/lib/libjpeg.so" \ 29 + --replace "JPEGHDR_DIR =" "JPEGHDR_DIR = ${libjpeg.dev}/include" 30 '' + stdenv.lib.optionalString stdenv.isDarwin '' 31 echo "LDSHLIB=-dynamiclib -install_name $out/lib/libnetpbm.\$(MAJ).dylib" >> config.mk 32 echo "NETPBMLIBTYPE = dylib" >> config.mk
+4 -6
pkgs/tools/misc/bmon/default.nix
··· 1 - { stdenv, fetchFromGitHub, autoconf, automake, pkgconfig, ncurses, confuse 2 , libnl }: 3 4 stdenv.mkDerivation rec { 5 name = "bmon-${version}"; 6 - version = "3.9"; 7 8 src = fetchFromGitHub { 9 owner = "tgraf"; 10 repo = "bmon"; 11 rev = "v${version}"; 12 - sha256 = "1a4sj8pf02392zghr9wa1dc8x38fj093d4hg1fcakzrdjvrg1p2h"; 13 }; 14 15 - nativeBuildInputs = [ autoconf automake pkgconfig ]; 16 17 buildInputs = [ ncurses confuse libnl ]; 18 - 19 - preConfigure = "sh ./autogen.sh"; 20 21 meta = with stdenv.lib; { 22 description = "Network bandwidth monitor";
··· 1 + { stdenv, fetchFromGitHub, autoreconfHook, pkgconfig, ncurses, confuse 2 , libnl }: 3 4 stdenv.mkDerivation rec { 5 name = "bmon-${version}"; 6 + version = "4.0"; 7 8 src = fetchFromGitHub { 9 owner = "tgraf"; 10 repo = "bmon"; 11 rev = "v${version}"; 12 + sha256 = "1ilba872c09mnlvylslv4hqv6c9cz36l76q74rr99jvis1dg69gf"; 13 }; 14 15 + nativeBuildInputs = [ autoreconfHook pkgconfig ]; 16 17 buildInputs = [ ncurses confuse libnl ]; 18 19 meta = with stdenv.lib; { 20 description = "Network bandwidth monitor";
+34
pkgs/tools/networking/miredo/default.nix
···
··· 1 + { stdenv, fetchurl, nettools, iproute, judy }: 2 + 3 + stdenv.mkDerivation rec { 4 + version = "1.2.6"; 5 + name = "miredo-${version}"; 6 + 7 + buildInputs = [ judy ]; 8 + 9 + src = fetchurl { 10 + url = "http://www.remlab.net/files/miredo/miredo-${version}.tar.xz"; 11 + sha256 = "0j9ilig570snbmj48230hf7ms8kvcwi2wblycqrmhh85lksd49ps"; 12 + }; 13 + 14 + postPatch = '' 15 + substituteInPlace misc/client-hook.bsd \ 16 + --replace '/sbin/route' '${nettools}/bin/route' \ 17 + --replace '/sbin/ifconfig' '${nettools}/bin/ifconfig' 18 + substituteInPlace misc/client-hook.iproute --replace '/sbin/ip' '${iproute}/bin/ip' 19 + ''; 20 + 21 + configureFlags = [ "--with-Judy" ]; 22 + 23 + postInstall = '' 24 + rm -rf $out/lib/systemd $out/var $out/etc/miredo/miredo.conf 25 + ''; 26 + 27 + meta = with stdenv.lib; { 28 + description = "Teredo IPv6 Tunneling Daemon"; 29 + homepage = http://www.remlab.net/miredo/; 30 + license = licenses.gpl2; 31 + maintainers = [ maintainers.volth ]; 32 + platforms = platforms.unix; 33 + }; 34 + }
+12 -7
pkgs/tools/networking/ndjbdns/default.nix
··· 1 - { stdenv, fetchurl, systemd, pkgconfig }: 2 3 stdenv.mkDerivation rec { 4 version = "1.06"; 5 name = "ndjbdns-${version}"; 6 7 - src = fetchurl { 8 - url = "http://pjp.dgplug.org/ndjbdns/${name}.tar.gz"; 9 - sha256 = "09qi5a9abqm08iqmxj74fzzq9x1w5lzr1jlbzj2hl8hz0g2sgraw"; 10 }; 11 12 - buildInputs = [ pkgconfig systemd ]; 13 14 - meta = with stdenv.lib; { 15 description = "A brand new release of the Djbdns"; 16 longDescription = '' 17 Djbdns is a fully‐fledged Domain Name System(DNS), originally written by the eminent author of qmail, Dr. D J Bernstein. ··· 19 homepage = http://pjp.dgplug.org/ndjbdns/; 20 license = licenses.gpl2; 21 maintainers = [ maintainers.msackman ]; 22 - platforms = platforms.linux; 23 }; 24 25 }
··· 1 + { stdenv, fetchFromGitHub, autoreconfHook, systemd, pkgconfig }: 2 + 3 + with stdenv.lib; 4 5 stdenv.mkDerivation rec { 6 version = "1.06"; 7 name = "ndjbdns-${version}"; 8 9 + src = fetchFromGitHub { 10 + owner = "pjps"; 11 + repo = "ndjbdns"; 12 + rev = "64d371b6f887621de7bf8bd495be10442b2accd0"; 13 + sha256 = "0gjyvn8r66kp49gasd6sqfvg2pj0c6v67hnq7cqwl04kj69rfy86"; 14 }; 15 16 + buildInputs = [ autoreconfHook pkgconfig ] 17 + ++ optional stdenv.isLinux systemd; 18 19 + meta = { 20 description = "A brand new release of the Djbdns"; 21 longDescription = '' 22 Djbdns is a fully‐fledged Domain Name System(DNS), originally written by the eminent author of qmail, Dr. D J Bernstein. ··· 24 homepage = http://pjp.dgplug.org/ndjbdns/; 25 license = licenses.gpl2; 26 maintainers = [ maintainers.msackman ]; 27 + platforms = platforms.linux ++ platforms.darwin; 28 }; 29 30 }
+7 -8
pkgs/tools/security/gencfsm/default.nix
··· 1 { stdenv, fetchurl, autoconf, automake, intltool, libtool, pkgconfig, encfs 2 - , glib , gnome3, gtk3, libgnome_keyring, vala_0_23, wrapGAppsHook, xorg 3 - , libgee_0_6 4 }: 5 6 stdenv.mkDerivation rec { 7 - version = "1.8.16"; 8 name = "gnome-encfs-manager-${version}"; 9 10 src = fetchurl { 11 - url = "https://launchpad.net/gencfsm/trunk/1.8/+download/gnome-encfs-manager_${version}.tar.gz"; 12 - sha256 = "06sz6zcmvxkqww5gx4brcqs4hlpy9d8sal9nmw0pdsvh8k5vmpgn"; 13 }; 14 15 - buildInputs = [ autoconf automake intltool libtool pkgconfig vala_0_23 glib encfs 16 - gtk3 libgnome_keyring libgee_0_6 xorg.libSM xorg.libICE 17 wrapGAppsHook ]; 18 19 patches = [ ./makefile-mkdir.patch ]; ··· 28 29 meta = with stdenv.lib; { 30 homepage = http://www.libertyzero.com/GEncfsM/; 31 description = "EncFS manager and mounter with GNOME3 integration"; 32 license = licenses.gpl2Plus; 33 platforms = platforms.linux; 34 maintainers = [ maintainers.spacefrogg ]; 35 - broken = true; 36 }; 37 }
··· 1 { stdenv, fetchurl, autoconf, automake, intltool, libtool, pkgconfig, encfs 2 + , glib , gnome3, gtk3, libgnome_keyring, vala, wrapGAppsHook, xorg 3 }: 4 5 stdenv.mkDerivation rec { 6 + version = "1.8.18"; 7 name = "gnome-encfs-manager-${version}"; 8 9 src = fetchurl { 10 + url = "https://launchpad.net/gencfsm/trunk/1.8/+download/gnome-encfs-manager_${version}.tar.xz"; 11 + sha256 = "1rpf683lxa78fmxxb0hnq7vdh3yn7qid2gqq67q9mk65sp9vdhdj"; 12 }; 13 14 + buildInputs = [ autoconf automake intltool libtool pkgconfig vala glib encfs 15 + gtk3 libgnome_keyring gnome3.libgee xorg.libSM xorg.libICE 16 wrapGAppsHook ]; 17 18 patches = [ ./makefile-mkdir.patch ]; ··· 27 28 meta = with stdenv.lib; { 29 homepage = http://www.libertyzero.com/GEncfsM/; 30 + downloadPage = https://launchpad.net/gencfsm/; 31 description = "EncFS manager and mounter with GNOME3 integration"; 32 license = licenses.gpl2Plus; 33 platforms = platforms.linux; 34 maintainers = [ maintainers.spacefrogg ]; 35 }; 36 }
+41
pkgs/tools/security/gorilla-bin/default.nix
···
··· 1 + { fetchurl, makeWrapper, patchelf, pkgs, stdenv, libXft, libX11, freetype, fontconfig, libXrender, libXScrnSaver, libXext }: 2 + 3 + stdenv.mkDerivation rec { 4 + name = "gorilla-bin-${version}"; 5 + version = "1.5.3.7"; 6 + 7 + src = fetchurl { 8 + name = "gorilla1537_64.bin"; 9 + url = "http://gorilla.dp100.com/downloads/gorilla1537_64.bin"; 10 + sha256 = "19ir6x4c01825hpx2wbbcxkk70ymwbw4j03v8b2xc13ayylwzx0r"; 11 + }; 12 + 13 + buildInputs = [ patchelf makeWrapper ]; 14 + phases = [ "unpackPhase" "installPhase" ]; 15 + 16 + unpackCmd = '' 17 + mkdir gorilla; 18 + cp $curSrc gorilla/gorilla-${version}; 19 + ''; 20 + 21 + installPhase = let 22 + interpreter = "$(< \"$NIX_CC/nix-support/dynamic-linker\")"; 23 + libPath = stdenv.lib.makeLibraryPath [ libXft libX11 freetype fontconfig libXrender libXScrnSaver libXext ]; 24 + in '' 25 + mkdir -p $out/opt/password-gorilla 26 + mkdir -p $out/bin 27 + cp gorilla-${version} $out/opt/password-gorilla 28 + chmod ugo+x $out/opt/password-gorilla/gorilla-${version} 29 + patchelf --set-interpreter "${interpreter}" "$out/opt/password-gorilla/gorilla-${version}" 30 + makeWrapper "$out/opt/password-gorilla/gorilla-${version}" "$out/bin/gorilla" \ 31 + --prefix LD_LIBRARY_PATH : "${libPath}" 32 + ''; 33 + 34 + meta = { 35 + description = "Password Gorilla is a Tk based password manager"; 36 + homepage = https://github.com/zdia/gorilla/wiki; 37 + maintainers = [ stdenv.lib.maintainers.namore ]; 38 + platforms = [ "x86_64-linux" ]; 39 + license = stdenv.lib.licenses.gpl2; 40 + }; 41 + }
+31 -1
pkgs/top-level/all-packages.nix
··· 905 906 goa = callPackage ../development/tools/goa { }; 907 908 gringo = callPackage ../tools/misc/gringo { }; 909 910 gti = callPackage ../tools/misc/gti { }; ··· 2711 mairix = callPackage ../tools/text/mairix { }; 2712 2713 makemkv = callPackage ../applications/video/makemkv { }; 2714 2715 # See https://github.com/NixOS/nixpkgs/issues/15849. I'm switching on isLinux because 2716 # it looks like gnulib is broken on non-linux, so it seems likely that this would cause ··· 2799 2800 minixml = callPackage ../development/libraries/minixml { }; 2801 2802 mjpegtoolsFull = callPackage ../tools/video/mjpegtools { }; 2803 2804 mjpegtools = self.mjpegtoolsFull.override { ··· 5225 5226 nim = callPackage ../development/compilers/nim { }; 5227 nimble = callPackage ../development/tools/nimble { }; 5228 5229 neko = callPackage ../development/compilers/neko { }; 5230 ··· 8199 8200 libmcs = callPackage ../development/libraries/libmcs { }; 8201 8202 libmemcached = callPackage ../development/libraries/libmemcached { }; 8203 8204 libmicrohttpd = callPackage ../development/libraries/libmicrohttpd { }; ··· 9085 9086 grantlee = callPackage ../development/libraries/grantlee/5.x.nix { }; 9087 9088 - kirigami = callPackage ../development/libraries/kirigami { }; 9089 9090 libcommuni = callPackage ../development/libraries/libcommuni { }; 9091 ··· 9675 wxGTK29 = callPackage ../development/libraries/wxGTK-2.9/default.nix { 9676 inherit (gnome2) GConf; 9677 inherit (darwin.stubs) setfile; 9678 withMesa = lib.elem system lib.platforms.mesaPlatforms; 9679 }; 9680 9681 wxGTK30 = callPackage ../development/libraries/wxGTK-3.0/default.nix { 9682 inherit (gnome2) GConf; 9683 inherit (darwin.stubs) setfile; 9684 withMesa = lib.elem system lib.platforms.mesaPlatforms; 9685 }; 9686 ··· 12299 giflib = giflib_4_1; 12300 }; 12301 12302 audacious = callPackage ../applications/audio/audacious { }; 12303 audaciousQt5 = qt5.callPackage ../applications/audio/audacious/qt-5.nix { }; 12304 ··· 13003 fetchmail = callPackage ../applications/misc/fetchmail { }; 13004 13005 flacon = callPackage ../applications/audio/flacon { }; 13006 13007 fldigi = callPackage ../applications/audio/fldigi { }; 13008 ··· 14441 14442 posterazor = callPackage ../applications/misc/posterazor { }; 14443 14444 pqiv = callPackage ../applications/graphics/pqiv { }; 14445 14446 qiv = callPackage ../applications/graphics/qiv { }; ··· 16777 16778 sacrifice = callPackage ../applications/science/physics/sacrifice {}; 16779 16780 ### SCIENCE/PROGRAMMING 16781 16782 plm = callPackage ../applications/science/programming/plm { }; ··· 17129 17130 fastjet = callPackage ../development/libraries/physics/fastjet { }; 17131 17132 geant4 = callPackage ../development/libraries/physics/geant4 { 17133 enableMultiThreading = true; 17134 enableG3toG4 = false; ··· 17160 herwig = callPackage ../development/libraries/physics/herwig { }; 17161 17162 lhapdf = callPackage ../development/libraries/physics/lhapdf { }; 17163 17164 nlojet = callPackage ../development/libraries/physics/nlojet { }; 17165
··· 905 906 goa = callPackage ../development/tools/goa { }; 907 908 + gorilla-bin = callPackage ../tools/security/gorilla-bin { }; 909 + 910 gringo = callPackage ../tools/misc/gringo { }; 911 912 gti = callPackage ../tools/misc/gti { }; ··· 2713 mairix = callPackage ../tools/text/mairix { }; 2714 2715 makemkv = callPackage ../applications/video/makemkv { }; 2716 + 2717 + makerpm = callPackage ../development/tools/makerpm { }; 2718 2719 # See https://github.com/NixOS/nixpkgs/issues/15849. I'm switching on isLinux because 2720 # it looks like gnulib is broken on non-linux, so it seems likely that this would cause ··· 2803 2804 minixml = callPackage ../development/libraries/minixml { }; 2805 2806 + miredo = callPackage ../tools/networking/miredo { }; 2807 + 2808 mjpegtoolsFull = callPackage ../tools/video/mjpegtools { }; 2809 2810 mjpegtools = self.mjpegtoolsFull.override { ··· 5231 5232 nim = callPackage ../development/compilers/nim { }; 5233 nimble = callPackage ../development/tools/nimble { }; 5234 + nrpl = callPackage ../development/tools/nrpl { }; 5235 5236 neko = callPackage ../development/compilers/neko { }; 5237 ··· 8206 8207 libmcs = callPackage ../development/libraries/libmcs { }; 8208 8209 + libmd = callPackage ../development/libraries/libmd { }; 8210 + 8211 libmemcached = callPackage ../development/libraries/libmemcached { }; 8212 8213 libmicrohttpd = callPackage ../development/libraries/libmicrohttpd { }; ··· 9094 9095 grantlee = callPackage ../development/libraries/grantlee/5.x.nix { }; 9096 9097 + kirigami_1 = callPackage ../development/libraries/kirigami { }; 9098 + 9099 + kirigami_2 = callPackage ../development/libraries/kirigami/v2.nix { 9100 + # kirigami v2 requires qt 5.7 and above 9101 + inherit (qt57) qtbase qtquickcontrols2; 9102 + }; 9103 + 9104 + kirigami = kirigami_1; 9105 9106 libcommuni = callPackage ../development/libraries/libcommuni { }; 9107 ··· 9691 wxGTK29 = callPackage ../development/libraries/wxGTK-2.9/default.nix { 9692 inherit (gnome2) GConf; 9693 inherit (darwin.stubs) setfile; 9694 + inherit (darwin.apple_sdk.frameworks) AGL Carbon Cocoa Kernel QuickTime; 9695 withMesa = lib.elem system lib.platforms.mesaPlatforms; 9696 }; 9697 9698 wxGTK30 = callPackage ../development/libraries/wxGTK-3.0/default.nix { 9699 inherit (gnome2) GConf; 9700 inherit (darwin.stubs) setfile; 9701 + inherit (darwin.apple_sdk.frameworks) AGL Carbon Cocoa Kernel QTKit; 9702 withMesa = lib.elem system lib.platforms.mesaPlatforms; 9703 }; 9704 ··· 12317 giflib = giflib_4_1; 12318 }; 12319 12320 + astroid = callPackage ../applications/networking/mailreaders/astroid { }; 12321 + 12322 audacious = callPackage ../applications/audio/audacious { }; 12323 audaciousQt5 = qt5.callPackage ../applications/audio/audacious/qt-5.nix { }; 12324 ··· 13023 fetchmail = callPackage ../applications/misc/fetchmail { }; 13024 13025 flacon = callPackage ../applications/audio/flacon { }; 13026 + 13027 + flexget = callPackage ../applications/networking/flexget { }; 13028 13029 fldigi = callPackage ../applications/audio/fldigi { }; 13030 ··· 14463 14464 posterazor = callPackage ../applications/misc/posterazor { }; 14465 14466 + ppl-address-book = callPackage ../applications/office/ppl-address-book { }; 14467 + 14468 pqiv = callPackage ../applications/graphics/pqiv { }; 14469 14470 qiv = callPackage ../applications/graphics/qiv { }; ··· 16801 16802 sacrifice = callPackage ../applications/science/physics/sacrifice {}; 16803 16804 + sherpa = callPackage ../applications/science/physics/sherpa {}; 16805 + 16806 ### SCIENCE/PROGRAMMING 16807 16808 plm = callPackage ../applications/science/programming/plm { }; ··· 17155 17156 fastjet = callPackage ../development/libraries/physics/fastjet { }; 17157 17158 + fastnlo = callPackage ../development/libraries/physics/fastnlo { }; 17159 + 17160 geant4 = callPackage ../development/libraries/physics/geant4 { 17161 enableMultiThreading = true; 17162 enableG3toG4 = false; ··· 17188 herwig = callPackage ../development/libraries/physics/herwig { }; 17189 17190 lhapdf = callPackage ../development/libraries/physics/lhapdf { }; 17191 + 17192 + mcgrid = callPackage ../development/libraries/physics/mcgrid { }; 17193 17194 nlojet = callPackage ../development/libraries/physics/nlojet { }; 17195
+14 -37
pkgs/top-level/python-packages.nix
··· 2808 }; 2809 }; 2810 2811 - # Needed for bleach 1.5.0 2812 html5lib_0_9999999 = self.html5lib.override rec { 2813 name = "html5lib-${version}"; 2814 buildInputs = with self; [ nose flake8 ]; ··· 11485 homepage = https://github.com/wtforms/wtforms; 11486 description = "A flexible forms validation and rendering library for Python"; 11487 license = licenses.bsd3; 11488 - }; 11489 - }; 11490 - 11491 - flexget = buildPythonPackage rec { 11492 - version = "1.2.337"; 11493 - name = "FlexGet-${version}"; 11494 - disabled = isPy3k; 11495 - 11496 - src = pkgs.fetchurl { 11497 - url = "mirror://pypi/F/FlexGet/${name}.tar.gz"; 11498 - sha256 = "0f7aaf0bf37860f0c5adfb0ba59ca228aa3f5c582131445623a4c3bc82d45346"; 11499 - }; 11500 - 11501 - doCheck = false; 11502 - 11503 - buildInputs = with self; [ nose ]; 11504 - propagatedBuildInputs = with self; [ 11505 - paver feedparser sqlalchemy pyyaml rpyc 11506 - beautifulsoup_4_1_3 html5lib pyrss2gen pynzb progressbar jinja2 flask 11507 - cherrypy requests dateutil_2_1 jsonschema python_tvrage tmdb3 11508 - guessit pathpy apscheduler ] 11509 - # enable deluge and transmission plugin support, if they're installed 11510 - ++ stdenv.lib.optional (pkgs.config.pythonPackages.deluge or false) 11511 - pythonpackages.deluge 11512 - ++ stdenv.lib.optional (pkgs.transmission != null) 11513 - self.transmissionrpc; 11514 - 11515 - meta = { 11516 - homepage = http://flexget.com/; 11517 - description = "Multipurpose automation tool for content like torrents"; 11518 - license = licenses.mit; 11519 - maintainers = with maintainers; [ domenkozar ]; 11520 }; 11521 }; 11522 ··· 25088 }; 25089 25090 syncthing-gtk = buildPythonPackage rec { 25091 - version = "0.6.3"; 25092 name = "syncthing-gtk-${version}"; 25093 src = pkgs.fetchFromGitHub { 25094 owner = "syncthing"; 25095 repo = "syncthing-gtk"; 25096 rev = "v${version}"; 25097 - sha256 = "1qa5bw2qizjiqvkms8i31wsjf8cw9p0ciamxgfgq6n37wcalv6ms"; 25098 }; 25099 25100 disabled = isPy3k; 25101 25102 - propagatedBuildInputs = with self; [ pkgs.syncthing dateutil pyinotify pkgs.libnotify pkgs.psmisc 25103 - pygobject3 pkgs.gtk3 ]; 25104 25105 patchPhase = '' 25106 substituteInPlace "scripts/syncthing-gtk" \
··· 2808 }; 2809 }; 2810 2811 + # Needed for bleach 1.5.0 and calibre 2.76.0 2812 html5lib_0_9999999 = self.html5lib.override rec { 2813 name = "html5lib-${version}"; 2814 buildInputs = with self; [ nose flake8 ]; ··· 11485 homepage = https://github.com/wtforms/wtforms; 11486 description = "A flexible forms validation and rendering library for Python"; 11487 license = licenses.bsd3; 11488 }; 11489 }; 11490 ··· 25056 }; 25057 25058 syncthing-gtk = buildPythonPackage rec { 25059 + version = "0.9.2.3"; 25060 name = "syncthing-gtk-${version}"; 25061 src = pkgs.fetchFromGitHub { 25062 owner = "syncthing"; 25063 repo = "syncthing-gtk"; 25064 rev = "v${version}"; 25065 + sha256 = "0chl0f0kp6z0z00d1f3xjlicjfr9rzabw39wmjr66fwb5w5hcc42"; 25066 }; 25067 25068 disabled = isPy3k; 25069 25070 + propagatedBuildInputs = with self; [ pkgs.syncthing dateutil pyinotify 25071 + pkgs.libnotify 25072 + (pkgs.librsvg.override { withGTK = true; }) 25073 + pkgs.psmisc pygobject3 pkgs.gtk3 25074 + ]; 25075 + 25076 + preFixup = '' 25077 + wrapProgram $out/bin/syncthing-gtk \ 25078 + --set GDK_PIXBUF_MODULE_FILE "$GDK_PIXBUF_MODULE_FILE" \ 25079 + --prefix GI_TYPELIB_PATH : "$GI_TYPELIB_PATH" 25080 + ''; 25081 25082 patchPhase = '' 25083 substituteInPlace "scripts/syncthing-gtk" \
+3 -3
pkgs/top-level/rust-packages.nix
··· 7 { runCommand, fetchFromGitHub, git }: 8 9 let 10 - version = "2016-12-16"; 11 - rev = "1da5a7d0cd31d72324481760067bde5cf2e07be5"; 12 - sha256 = "0kbh3aq738sqns8w6yfia17fwrk98g6m763wqsqwhnrg2ndqrp8d"; 13 14 src = fetchFromGitHub { 15 inherit rev;
··· 7 { runCommand, fetchFromGitHub, git }: 8 9 let 10 + version = "2016-12-28"; 11 + rev = "3399254d4a021d07736944b339a8794eddcda517"; 12 + sha256 = "1vbixbgzv21anqayz8ya0x1qlzndb7fpdf9dyh4yyscl1kaibvg9"; 13 14 src = fetchFromGitHub { 15 inherit rev;