lol

Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
6f6e1d46 b0455caf

+368 -253
+1 -3
nixos/modules/services/hardware/sane.nix
··· 4 4 5 5 let 6 6 7 - pkg = if config.hardware.sane.snapshot 8 - then pkgs.sane-backends-git 9 - else pkgs.sane-backends; 7 + pkg = pkgs.sane-backends; 10 8 11 9 sanedConf = pkgs.writeTextFile { 12 10 name = "saned.conf";
+103 -6
pkgs/applications/graphics/sane/backends/default.nix
··· 1 - { callPackage, fetchurl, ... } @ args: 1 + { stdenv, lib, fetchurl, runtimeShell 2 + , gettext, pkg-config, python3 3 + , avahi, libgphoto2, libieee1284, libjpeg, libpng, libtiff, libusb1, libv4l, net-snmp 4 + , curl, systemd, libxml2, poppler 2 5 3 - callPackage ./generic.nix (args // rec { 4 - version = "1.0.30"; 6 + # List of { src name backend } attibute sets - see installFirmware below: 7 + , extraFirmware ? [] 8 + 9 + # For backwards compatibility with older setups; use extraFirmware instead: 10 + , gt68xxFirmware ? null, snapscanFirmware ? null 11 + }: 12 + 13 + stdenv.mkDerivation { 14 + pname = "sane-backends"; 15 + version = "1.0.32"; 5 16 6 17 src = fetchurl { 7 - url = "https://gitlab.com/sane-project/backends/uploads/c3dd60c9e054b5dee1e7b01a7edc98b0/sane-backends-${version}.tar.gz"; 8 - sha256 = "18vryaycps3zpjzxh0wjgg8nv2f4pdvcfxxmdfj28qbzqjlrcp9z"; 18 + # raw checkouts of the repo do not work because, the configure script is 19 + # only functional in manually uploaded release tarballs. 20 + # https://gitlab.com/sane-project/backends/-/issues/440 21 + # unfortunately this make the url unpredictable on update, to find the link 22 + # go to https://gitlab.com/sane-project/backends/-/releases and choose 23 + # the link with other in the URL. 24 + url = "https://gitlab.com/sane-project/backends/uploads/104f09c07d35519cc8e72e604f11643f/sane-backends-1.0.32.tar.gz"; 25 + sha256 = "055iicihxa6b28iv5fnz13n67frdr5nrydq2c846f9x7q0vw4a1s"; 26 + }; 27 + 28 + outputs = [ "out" "doc" "man" ]; 29 + 30 + nativeBuildInputs = [ 31 + gettext 32 + pkg-config 33 + python3 34 + ]; 35 + 36 + buildInputs = [ 37 + avahi 38 + libgphoto2 39 + libieee1284 40 + libjpeg 41 + libpng 42 + libtiff 43 + libusb1 44 + libv4l 45 + net-snmp 46 + curl 47 + systemd 48 + libxml2 49 + poppler 50 + ]; 51 + 52 + enableParallelBuilding = true; 53 + 54 + configureFlags = 55 + lib.optional (avahi != null) "--with-avahi" 56 + ++ lib.optional (libusb1 != null) "--with-usb" 57 + ; 58 + 59 + postInstall = let 60 + 61 + compatFirmware = extraFirmware 62 + ++ lib.optional (gt68xxFirmware != null) { 63 + src = gt68xxFirmware.fw; 64 + inherit (gt68xxFirmware) name; 65 + backend = "gt68xx"; 66 + } 67 + ++ lib.optional (snapscanFirmware != null) { 68 + src = snapscanFirmware; 69 + name = "your-firmwarefile.bin"; 70 + backend = "snapscan"; 71 + }; 72 + 73 + installFirmware = f: '' 74 + mkdir -p $out/share/sane/${f.backend} 75 + ln -sv ${f.src} $out/share/sane/${f.backend}/${f.name} 76 + ''; 77 + 78 + in '' 79 + mkdir -p $out/etc/udev/rules.d/ 80 + ./tools/sane-desc -m udev > $out/etc/udev/rules.d/49-libsane.rules || \ 81 + cp tools/udev/libsane.rules $out/etc/udev/rules.d/49-libsane.rules 82 + # the created 49-libsane references /bin/sh 83 + substituteInPlace $out/etc/udev/rules.d/49-libsane.rules \ 84 + --replace "RUN+=\"/bin/sh" "RUN+=\"${runtimeShell}" 85 + 86 + substituteInPlace $out/lib/libsane.la \ 87 + --replace "-ljpeg" "-L${lib.getLib libjpeg}/lib -ljpeg" 88 + 89 + # net.conf conflicts with the file generated by the nixos module 90 + rm $out/etc/sane.d/net.conf 91 + '' + lib.concatStrings (builtins.map installFirmware compatFirmware); 92 + 93 + meta = with lib; { 94 + description = "SANE (Scanner Access Now Easy) backends"; 95 + longDescription = '' 96 + Collection of open-source SANE backends (device drivers). 97 + SANE is a universal scanner interface providing standardized access to 98 + any raster image scanner hardware: flatbed scanners, hand-held scanners, 99 + video- and still-cameras, frame-grabbers, etc. For a list of supported 100 + scanners, see http://www.sane-project.org/sane-backends.html. 101 + ''; 102 + homepage = "http://www.sane-project.org/"; 103 + license = licenses.gpl2Plus; 104 + maintainers = with maintainers; [ peti ]; 105 + platforms = platforms.linux; 9 106 }; 10 - }) 107 + }
-95
pkgs/applications/graphics/sane/backends/generic.nix
··· 1 - { lib, stdenv 2 - , gettext, pkg-config 3 - , avahi, libgphoto2, libieee1284, libjpeg, libpng, libtiff, libusb1, libv4l, net-snmp 4 - 5 - # List of { src name backend } attibute sets - see installFirmware below: 6 - , extraFirmware ? [] 7 - 8 - # For backwards compatibility with older setups; use extraFirmware instead: 9 - , gt68xxFirmware ? null, snapscanFirmware ? null 10 - 11 - # Passed from versioned package (e.g. default.nix, git.nix): 12 - , version, src, ... 13 - }: 14 - 15 - stdenv.mkDerivation { 16 - inherit src version; 17 - 18 - name = "sane-backends-${version}"; 19 - 20 - outputs = [ "out" "doc" "man" ]; 21 - 22 - nativeBuildInputs = [ 23 - gettext 24 - pkg-config 25 - ]; 26 - 27 - buildInputs = [ 28 - avahi 29 - libgphoto2 30 - libieee1284 31 - libjpeg 32 - libpng 33 - libtiff 34 - libusb1 35 - libv4l 36 - net-snmp 37 - ]; 38 - 39 - enableParallelBuilding = true; 40 - 41 - configureFlags = [] 42 - ++ lib.optional (avahi != null) "--enable-avahi" 43 - ++ lib.optional (libusb1 != null) "--with-usb" 44 - ; 45 - 46 - postInstall = let 47 - 48 - compatFirmware = extraFirmware 49 - ++ lib.optional (gt68xxFirmware != null) { 50 - src = gt68xxFirmware.fw; 51 - inherit (gt68xxFirmware) name; 52 - backend = "gt68xx"; 53 - } 54 - ++ lib.optional (snapscanFirmware != null) { 55 - src = snapscanFirmware; 56 - name = "your-firmwarefile.bin"; 57 - backend = "snapscan"; 58 - }; 59 - 60 - installFirmware = f: '' 61 - mkdir -p $out/share/sane/${f.backend} 62 - ln -sv ${f.src} $out/share/sane/${f.backend}/${f.name} 63 - ''; 64 - 65 - in '' 66 - mkdir -p $out/etc/udev/rules.d/ 67 - ./tools/sane-desc -m udev > $out/etc/udev/rules.d/49-libsane.rules || \ 68 - cp tools/udev/libsane.rules $out/etc/udev/rules.d/49-libsane.rules 69 - # the created 49-libsane references /bin/sh 70 - substituteInPlace $out/etc/udev/rules.d/49-libsane.rules \ 71 - --replace "RUN+=\"/bin/sh" "RUN+=\"${stdenv.shell}" 72 - 73 - substituteInPlace $out/lib/libsane.la \ 74 - --replace "-ljpeg" "-L${libjpeg.out}/lib -ljpeg" 75 - 76 - # net.conf conflicts with the file generated by the nixos module 77 - rm -f $out/etc/sane.d/net.conf 78 - '' + lib.concatStrings (builtins.map installFirmware compatFirmware); 79 - 80 - meta = with lib; { 81 - description = "SANE (Scanner Access Now Easy) backends"; 82 - longDescription = '' 83 - Collection of open-source SANE backends (device drivers). 84 - SANE is a universal scanner interface providing standardized access to 85 - any raster image scanner hardware: flatbed scanners, hand-held scanners, 86 - video- and still-cameras, frame-grabbers, etc. For a list of supported 87 - scanners, see http://www.sane-project.org/sane-backends.html. 88 - ''; 89 - homepage = "http://www.sane-project.org/"; 90 - license = licenses.gpl2Plus; 91 - 92 - maintainers = with maintainers; [ peti ]; 93 - platforms = platforms.linux; 94 - }; 95 - }
-10
pkgs/applications/graphics/sane/backends/git.nix
··· 1 - { callPackage, fetchgit, ... } @ args: 2 - 3 - callPackage ./generic.nix (args // { 4 - version = "2017-12-01"; 5 - src = fetchgit { 6 - sha256 = "0qf7d7268kdxnb723c03m6icxhbgx0vw8gqvck2q1w5b948dy9g8"; 7 - rev = "e895ee55bec8a3320a0e972b32c05d35b47fe226"; 8 - url = "https://gitlab.com/sane-project/backends.git"; 9 - }; 10 - })
+2 -1
pkgs/development/compilers/adoptopenjdk-bin/jdk-darwin-base.nix
··· 1 - sourcePerArch: 1 + { sourcePerArch, knownVulnerabilities ? [] }: 2 2 3 3 { swingSupport ? true # not used for now 4 4 , lib, stdenv ··· 48 48 description = "AdoptOpenJDK, prebuilt OpenJDK binary"; 49 49 platforms = [ "x86_64-darwin" ]; # some inherit jre.meta.platforms 50 50 maintainers = with lib.maintainers; [ taku0 ]; 51 + inherit knownVulnerabilities; 51 52 }; 52 53 53 54 }; in result
+2 -1
pkgs/development/compilers/adoptopenjdk-bin/jdk-linux-base.nix
··· 1 - sourcePerArch: 1 + { sourcePerArch, knownVulnerabilities ? [] }: 2 2 3 3 { stdenv 4 4 , lib ··· 107 107 description = "AdoptOpenJDK, prebuilt OpenJDK binary"; 108 108 platforms = lib.mapAttrsToList (arch: _: arch + "-linux") sourcePerArch; # some inherit jre.meta.platforms 109 109 maintainers = with lib.maintainers; [ taku0 ]; 110 + inherit knownVulnerabilities; 110 111 }; 111 112 112 113 }; in result
+4 -4
pkgs/development/compilers/adoptopenjdk-bin/jdk11-darwin.nix
··· 2 2 sources = builtins.fromJSON (builtins.readFile ./sources.json); 3 3 in 4 4 { 5 - jdk-hotspot = import ./jdk-darwin-base.nix sources.openjdk11.mac.jdk.hotspot; 6 - jre-hotspot = import ./jdk-darwin-base.nix sources.openjdk11.mac.jre.hotspot; 7 - jdk-openj9 = import ./jdk-darwin-base.nix sources.openjdk11.mac.jdk.openj9; 8 - jre-openj9 = import ./jdk-darwin-base.nix sources.openjdk11.mac.jre.openj9; 5 + jdk-hotspot = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk11.mac.jdk.hotspot; }; 6 + jre-hotspot = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk11.mac.jre.hotspot; }; 7 + jdk-openj9 = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk11.mac.jdk.openj9; }; 8 + jre-openj9 = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk11.mac.jre.openj9; }; 9 9 }
+4 -4
pkgs/development/compilers/adoptopenjdk-bin/jdk11-linux.nix
··· 2 2 sources = builtins.fromJSON (builtins.readFile ./sources.json); 3 3 in 4 4 { 5 - jdk-hotspot = import ./jdk-linux-base.nix sources.openjdk11.linux.jdk.hotspot; 6 - jre-hotspot = import ./jdk-linux-base.nix sources.openjdk11.linux.jre.hotspot; 7 - jdk-openj9 = import ./jdk-linux-base.nix sources.openjdk11.linux.jdk.openj9; 8 - jre-openj9 = import ./jdk-linux-base.nix sources.openjdk11.linux.jre.openj9; 5 + jdk-hotspot = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk11.linux.jdk.hotspot; }; 6 + jre-hotspot = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk11.linux.jre.hotspot; }; 7 + jdk-openj9 = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk11.linux.jdk.openj9; }; 8 + jre-openj9 = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk11.linux.jre.openj9; }; 9 9 }
+4 -4
pkgs/development/compilers/adoptopenjdk-bin/jdk13-darwin.nix
··· 2 2 sources = builtins.fromJSON (builtins.readFile ./sources.json); 3 3 in 4 4 { 5 - jdk-hotspot = import ./jdk-darwin-base.nix sources.openjdk13.mac.jdk.hotspot; 6 - jre-hotspot = import ./jdk-darwin-base.nix sources.openjdk13.mac.jre.hotspot; 7 - jdk-openj9 = import ./jdk-darwin-base.nix sources.openjdk13.mac.jdk.openj9; 8 - jre-openj9 = import ./jdk-darwin-base.nix sources.openjdk13.mac.jre.openj9; 5 + jdk-hotspot = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk13.mac.jdk.hotspot; knownVulnerabilities = ["Support ended"]; }; 6 + jre-hotspot = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk13.mac.jre.hotspot; knownVulnerabilities = ["Support ended"]; }; 7 + jdk-openj9 = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk13.mac.jdk.openj9; knownVulnerabilities = ["Support ended"]; }; 8 + jre-openj9 = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk13.mac.jre.openj9; knownVulnerabilities = ["Support ended"]; }; 9 9 }
+4 -4
pkgs/development/compilers/adoptopenjdk-bin/jdk13-linux.nix
··· 2 2 sources = builtins.fromJSON (builtins.readFile ./sources.json); 3 3 in 4 4 { 5 - jdk-hotspot = import ./jdk-linux-base.nix sources.openjdk13.linux.jdk.hotspot; 6 - jre-hotspot = import ./jdk-linux-base.nix sources.openjdk13.linux.jre.hotspot; 7 - jdk-openj9 = import ./jdk-linux-base.nix sources.openjdk13.linux.jdk.openj9; 8 - jre-openj9 = import ./jdk-linux-base.nix sources.openjdk13.linux.jre.openj9; 5 + jdk-hotspot = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk13.linux.jdk.hotspot; knownVulnerabilities = ["Support ended"]; }; 6 + jre-hotspot = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk13.linux.jre.hotspot; knownVulnerabilities = ["Support ended"]; }; 7 + jdk-openj9 = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk13.linux.jdk.openj9; knownVulnerabilities = ["Support ended"]; }; 8 + jre-openj9 = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk13.linux.jre.openj9; knownVulnerabilities = ["Support ended"]; }; 9 9 }
+4 -4
pkgs/development/compilers/adoptopenjdk-bin/jdk14-darwin.nix
··· 2 2 sources = builtins.fromJSON (builtins.readFile ./sources.json); 3 3 in 4 4 { 5 - jdk-hotspot = import ./jdk-darwin-base.nix sources.openjdk14.mac.jdk.hotspot; 6 - jre-hotspot = import ./jdk-darwin-base.nix sources.openjdk14.mac.jre.hotspot; 7 - jdk-openj9 = import ./jdk-darwin-base.nix sources.openjdk14.mac.jdk.openj9; 8 - jre-openj9 = import ./jdk-darwin-base.nix sources.openjdk14.mac.jre.openj9; 5 + jdk-hotspot = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk14.mac.jdk.hotspot; knownVulnerabilities = ["Support ended"]; }; 6 + jre-hotspot = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk14.mac.jre.hotspot; knownVulnerabilities = ["Support ended"]; }; 7 + jdk-openj9 = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk14.mac.jdk.openj9; knownVulnerabilities = ["Support ended"]; }; 8 + jre-openj9 = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk14.mac.jre.openj9; knownVulnerabilities = ["Support ended"]; }; 9 9 }
+4 -4
pkgs/development/compilers/adoptopenjdk-bin/jdk14-linux.nix
··· 2 2 sources = builtins.fromJSON (builtins.readFile ./sources.json); 3 3 in 4 4 { 5 - jdk-hotspot = import ./jdk-linux-base.nix sources.openjdk14.linux.jdk.hotspot; 6 - jre-hotspot = import ./jdk-linux-base.nix sources.openjdk14.linux.jre.hotspot; 7 - jdk-openj9 = import ./jdk-linux-base.nix sources.openjdk14.linux.jdk.openj9; 8 - jre-openj9 = import ./jdk-linux-base.nix sources.openjdk14.linux.jre.openj9; 5 + jdk-hotspot = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk14.linux.jdk.hotspot; knownVulnerabilities = ["Support ended"]; }; 6 + jre-hotspot = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk14.linux.jre.hotspot; knownVulnerabilities = ["Support ended"]; }; 7 + jdk-openj9 = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk14.linux.jdk.openj9; knownVulnerabilities = ["Support ended"]; }; 8 + jre-openj9 = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk14.linux.jre.openj9; knownVulnerabilities = ["Support ended"]; }; 9 9 }
+4 -4
pkgs/development/compilers/adoptopenjdk-bin/jdk15-darwin.nix
··· 2 2 sources = builtins.fromJSON (builtins.readFile ./sources.json); 3 3 in 4 4 { 5 - jdk-hotspot = import ./jdk-darwin-base.nix sources.openjdk15.mac.jdk.hotspot; 6 - jre-hotspot = import ./jdk-darwin-base.nix sources.openjdk15.mac.jre.hotspot; 7 - jdk-openj9 = import ./jdk-darwin-base.nix sources.openjdk15.mac.jdk.openj9; 8 - jre-openj9 = import ./jdk-darwin-base.nix sources.openjdk15.mac.jre.openj9; 5 + jdk-hotspot = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk15.mac.jdk.hotspot; }; 6 + jre-hotspot = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk15.mac.jre.hotspot; }; 7 + jdk-openj9 = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk15.mac.jdk.openj9; }; 8 + jre-openj9 = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk15.mac.jre.openj9; }; 9 9 }
+4 -4
pkgs/development/compilers/adoptopenjdk-bin/jdk15-linux.nix
··· 2 2 sources = builtins.fromJSON (builtins.readFile ./sources.json); 3 3 in 4 4 { 5 - jdk-hotspot = import ./jdk-linux-base.nix sources.openjdk15.linux.jdk.hotspot; 6 - jre-hotspot = import ./jdk-linux-base.nix sources.openjdk15.linux.jre.hotspot; 7 - jdk-openj9 = import ./jdk-linux-base.nix sources.openjdk15.linux.jdk.openj9; 8 - jre-openj9 = import ./jdk-linux-base.nix sources.openjdk15.linux.jre.openj9; 5 + jdk-hotspot = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk15.linux.jdk.hotspot; }; 6 + jre-hotspot = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk15.linux.jre.hotspot; }; 7 + jdk-openj9 = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk15.linux.jdk.openj9; }; 8 + jre-openj9 = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk15.linux.jre.openj9; }; 9 9 }
+4 -4
pkgs/development/compilers/adoptopenjdk-bin/jdk8-darwin.nix
··· 2 2 sources = builtins.fromJSON (builtins.readFile ./sources.json); 3 3 in 4 4 { 5 - jdk-hotspot = import ./jdk-darwin-base.nix sources.openjdk8.mac.jdk.hotspot; 6 - jre-hotspot = import ./jdk-darwin-base.nix sources.openjdk8.mac.jre.hotspot; 7 - jdk-openj9 = import ./jdk-darwin-base.nix sources.openjdk8.mac.jdk.openj9; 8 - jre-openj9 = import ./jdk-darwin-base.nix sources.openjdk8.mac.jre.openj9; 5 + jdk-hotspot = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk8.mac.jdk.hotspot; }; 6 + jre-hotspot = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk8.mac.jre.hotspot; }; 7 + jdk-openj9 = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk8.mac.jdk.openj9; }; 8 + jre-openj9 = import ./jdk-darwin-base.nix { sourcePerArch = sources.openjdk8.mac.jre.openj9; }; 9 9 }
+4 -4
pkgs/development/compilers/adoptopenjdk-bin/jdk8-linux.nix
··· 2 2 sources = builtins.fromJSON (builtins.readFile ./sources.json); 3 3 in 4 4 { 5 - jdk-hotspot = import ./jdk-linux-base.nix sources.openjdk8.linux.jdk.hotspot; 6 - jre-hotspot = import ./jdk-linux-base.nix sources.openjdk8.linux.jre.hotspot; 7 - jdk-openj9 = import ./jdk-linux-base.nix sources.openjdk8.linux.jdk.openj9; 8 - jre-openj9 = import ./jdk-linux-base.nix sources.openjdk8.linux.jre.openj9; 5 + jdk-hotspot = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk8.linux.jdk.hotspot; }; 6 + jre-hotspot = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk8.linux.jre.hotspot; }; 7 + jdk-openj9 = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk8.linux.jdk.openj9; }; 8 + jre-openj9 = import ./jdk-linux-base.nix { sourcePerArch = sources.openjdk8.linux.jre.openj9; }; 9 9 }
+24 -9
pkgs/development/libraries/lib3mf/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, cmake, ninja, libuuid, libossp_uuid, gtest }: 1 + { lib, stdenv, fetchFromGitHub, cmake, ninja, automaticcomponenttoolkit 2 + , pkg-config, libzip, gtest, openssl, libuuid, libossp_uuid }: 2 3 3 4 stdenv.mkDerivation rec { 4 5 pname = "lib3mf"; 5 - version = "2.0.0"; 6 + version = "2.1.1"; 6 7 7 8 src = fetchFromGitHub { 8 9 owner = "3MFConsortium"; 9 10 repo = pname; 10 11 rev = "v${version}"; 11 - sha256 = "0w4d9zvl95g1x3r5nyd6cr27g6fwhhwaivh8a5r1xs5l6if21x19"; 12 + sha256 = "1417xlxc1y5jnipixhbjfrrjgkrprbbraj8647sff9051m3hpxc3"; 12 13 }; 13 14 14 - nativeBuildInputs = [ cmake ninja ]; 15 + nativeBuildInputs = [ cmake ninja pkg-config ]; 16 + 17 + outputs = [ "out" "dev" ]; 18 + 19 + cmakeFlags = [ 20 + "-DCMAKE_INSTALL_INCLUDEDIR=${placeholder "out"}/include/lib3mf" 21 + "-DUSE_INCLUDED_ZLIB=OFF" 22 + "-DUSE_INCLUDED_LIBZIP=OFF" 23 + "-DUSE_INCLUDED_GTEST=OFF" 24 + "-DUSE_INCLUDED_SSL=OFF" 25 + ]; 15 26 16 - buildInputs = if stdenv.isDarwin then [ libossp_uuid ] else [ libuuid ]; 27 + buildInputs = [ 28 + libzip gtest openssl 29 + ] ++ (if stdenv.isDarwin then [ libossp_uuid ] else [ libuuid ]); 17 30 18 31 postPatch = '' 19 - rmdir Tests/googletest 20 - ln -s ${gtest.src} Tests/googletest 21 - 22 32 # fix libdir=''${exec_prefix}/@CMAKE_INSTALL_LIBDIR@ 23 - sed -i 's,=''${\(exec_\)\?prefix}/,=,' lib3MF.pc.in 33 + sed -i 's,=''${\(exec_\)\?prefix}/,=,' lib3mf.pc.in 34 + 35 + # replace bundled binaries 36 + for i in AutomaticComponentToolkit/bin/act.*; do 37 + ln -sf ${automaticcomponenttoolkit}/bin/act $i 38 + done 24 39 ''; 25 40 26 41 meta = with lib; {
+2 -2
pkgs/development/libraries/libquotient/default.nix
··· 2 2 3 3 mkDerivation rec { 4 4 pname = "libquotient"; 5 - version = "0.6.5"; 5 + version = "0.6.6"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "quotient-im"; 9 9 repo = "libQuotient"; 10 10 rev = version; 11 - sha256 = "sha256-TAfo4BkNHE8r32FPT2iDjddq2lk1yC9DrRGZurSO48c="; 11 + sha256 = "sha256-QSpkcQEDTMsFbQBa7dTuL/5HraVChUHqUuJdNMty/4s="; 12 12 }; 13 13 14 14 buildInputs = [ qtbase qtmultimedia ];
+2 -2
pkgs/development/libraries/mimalloc/default.nix
··· 7 7 in 8 8 stdenv.mkDerivation rec { 9 9 pname = "mimalloc"; 10 - version = "1.6.7"; 10 + version = "2.0.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "microsoft"; 14 14 repo = pname; 15 15 rev = "v${version}"; 16 - sha256 = "1ymffs3ixc4vkhpr09ph6xhyknm2cx8ij8j5l70cq6119mwilnwa"; 16 + sha256 = "sha256-BMDCreY41CxJaPo9BdSRZlqh/YjtPC9aI/Zxt501e+0="; 17 17 }; 18 18 19 19 nativeBuildInputs = [ cmake ninja ];
+2 -2
pkgs/development/libraries/qwt/6.nix
··· 1 1 { lib, stdenv, fetchurl, qtbase, qtsvg, qttools, qmake }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "qwt-6.1.5"; 4 + name = "qwt-6.1.6"; 5 5 6 6 src = fetchurl { 7 7 url = "mirror://sourceforge/qwt/${name}.tar.bz2"; 8 - sha256 = "0hf0mpca248xlqn7xnzkfj8drf19gdyg5syzklvq8pibxiixwxj0"; 8 + sha256 = "sha256-mUYNMcEV7kEXsBddiF9HwsWQ14QgbwmBXcBY++Xt4fY="; 9 9 }; 10 10 11 11 propagatedBuildInputs = [ qtbase qtsvg qttools ];
+2 -2
pkgs/development/python-modules/humanize/default.nix
··· 9 9 }: 10 10 11 11 buildPythonPackage rec { 12 - version = "3.1.0"; 12 + version = "3.2.0"; 13 13 pname = "humanize"; 14 14 disabled = isPy27; # setup.py no longer compatible 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "fd3eb915310335c63a54d4507289ecc7b3a7454cd2c22ac5086d061a3cbfd592"; 18 + sha256 = "09ph6fd1362xdn2hgwdgh30z0zqjp3bgvr1akyvm36b8jm400sdb"; 19 19 }; 20 20 21 21 nativeBuildInputs = [ setuptools_scm ];
+37 -11
pkgs/development/python-modules/influxdb/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 - , fetchPypi 4 - , requests 5 3 , dateutil 4 + , fetchFromGitHub 5 + , fetchpatch 6 + , mock 7 + , msgpack 8 + , nose 9 + , pandas 10 + , pytestCheckHook 6 11 , pytz 12 + , requests 13 + , requests-mock 7 14 , six 8 - , msgpack 9 - , fetchpatch 10 15 }: 11 16 12 17 buildPythonPackage rec { 13 18 pname = "influxdb"; 14 19 version = "5.3.0"; 15 20 16 - src = fetchPypi { 17 - inherit pname version; 18 - sha256 = "9bcaafd57ac152b9824ab12ed19f204206ef5df8af68404770554c5b55b475f6"; 21 + src = fetchFromGitHub { 22 + owner = "influxdata"; 23 + repo = "influxdb-python"; 24 + rev = "v${version}"; 25 + sha256 = "1jfkf53jcf8lcq98qc0bw5d1d0yp3558mh8l2dqc9jlsm0smigjs"; 19 26 }; 20 27 28 + propagatedBuildInputs = [ 29 + requests 30 + dateutil 31 + pytz 32 + six 33 + msgpack 34 + ]; 35 + 36 + checkInputs = [ 37 + pytestCheckHook 38 + requests-mock 39 + mock 40 + nose 41 + pandas 42 + ]; 43 + 21 44 patches = [ 22 45 (fetchpatch { 23 46 url = "https://github.com/influxdata/influxdb-python/commit/cc41e290f690c4eb67f75c98fa9f027bdb6eb16b.patch"; ··· 25 48 }) 26 49 ]; 27 50 28 - # ImportError: No module named tests 29 - doCheck = false; 30 - propagatedBuildInputs = [ requests dateutil pytz six msgpack ]; 51 + disabledTests = [ 52 + # Disable failing test 53 + "test_write_points_from_dataframe_with_tags_and_nan_json" 54 + ]; 55 + 56 + pythonImportsCheck = [ "influxdb" ]; 31 57 32 58 meta = with lib; { 33 59 description = "Python client for InfluxDB"; 34 60 homepage = "https://github.com/influxdb/influxdb-python"; 35 61 license = licenses.mit; 62 + maintainers = with maintainers; [ fab ]; 36 63 }; 37 - 38 64 }
+2 -2
pkgs/development/python-modules/llfuse/default.nix
··· 1 1 { lib, stdenv, fetchPypi, fetchpatch, buildPythonPackage, pkg-config, pytest, fuse, attr, which 2 - , contextlib2, osxfuse 2 + , contextlib2, macfuse-stubs, DiskArbitration 3 3 }: 4 4 5 5 buildPythonPackage rec { ··· 23 23 24 24 buildInputs = 25 25 lib.optionals stdenv.isLinux [ fuse ] 26 - ++ lib.optionals stdenv.isDarwin [ osxfuse ]; 26 + ++ lib.optionals stdenv.isDarwin [ DiskArbitration macfuse-stubs ]; 27 27 28 28 checkInputs = [ pytest which ] ++ 29 29 lib.optionals stdenv.isLinux [ attr ];
+9 -4
pkgs/development/python-modules/simplekml/default.nix
··· 1 - { lib , buildPythonPackage , fetchPypi }: 1 + { lib 2 + , buildPythonPackage 3 + , fetchPypi 4 + }: 2 5 3 6 buildPythonPackage rec { 4 7 pname = "simplekml"; ··· 9 12 sha256 = "17h48r1dsfz4g9xcxh1xq85h20hiz7qzzymc1gla96bj2wh4wyv5"; 10 13 }; 11 14 12 - doCheck = false; # no tests are defined in 1.3.5 15 + # no tests are defined in 1.3.5 16 + doCheck = false; 17 + pythonImportsCheck = [ "simplekml" ]; 13 18 14 19 meta = with lib; { 15 - description = "Generate KML with as little effort as possible"; 16 - homepage = "https://readthedocs.org/projects/simplekml/"; 20 + description = "Python package to generate KML"; 21 + homepage = "https://simplekml.readthedocs.io/"; 17 22 license = licenses.lgpl3Plus; 18 23 maintainers = with maintainers; [ rvolosatovs ]; 19 24 };
+33
pkgs/development/tools/misc/automaticcomponenttoolkit/default.nix
··· 1 + { stdenv, lib, fetchFromGitHub, go }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "AutomaticComponentToolkit"; 5 + version = "1.6.0"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "Autodesk"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "1r0sbw82cf9dbcj3vgnbd4sc1lklzvijic2z5wgkvs21azcm0yzh"; 12 + }; 13 + 14 + nativeBuildInputs = [ go ]; 15 + 16 + buildPhase = '' 17 + cd Source 18 + export HOME=/tmp 19 + go build -o act *.go 20 + ''; 21 + 22 + installPhase = '' 23 + install -Dm0755 act $out/bin/act 24 + ''; 25 + 26 + meta = with lib; { 27 + description = "Toolkit to automatically generate software components: abstract API, implementation stubs and language bindings"; 28 + homepage = "https://github.com/Autodesk/AutomaticComponentToolkit"; 29 + license = licenses.bsd2; 30 + maintainers = with maintainers; [ gebner ]; 31 + platforms = platforms.all; 32 + }; 33 + }
+53
pkgs/os-specific/darwin/macfuse/default.nix
··· 1 + { lib, stdenv, fetchurl, cpio, xar, undmg, libtapi }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "macfuse-stubs"; 5 + version = "4.1.0"; 6 + 7 + src = fetchurl { 8 + url = "https://github.com/osxfuse/osxfuse/releases/download/macfuse-${version}/macfuse-${version}.dmg"; 9 + sha256 = "118hg64w5wb95lbxw6w1hbqxrx3plcbxfjhvxx86q0zx0saa9diw"; 10 + }; 11 + 12 + nativeBuildInputs = [ cpio xar undmg libtapi ]; 13 + 14 + postUnpack = '' 15 + xar -xf 'Install macFUSE.pkg' 16 + cd Core.pkg 17 + gunzip -dc Payload | cpio -i 18 + ''; 19 + 20 + sourceRoot = "."; 21 + 22 + buildPhase = '' 23 + pushd usr/local/lib 24 + for f in *.dylib; do 25 + tapi stubify --filetype=tbd-v2 "$f" -o "''${f%%.dylib}.tbd" 26 + done 27 + sed -i "s|^prefix=.*|prefix=$out|" pkgconfig/fuse.pc 28 + popd 29 + ''; 30 + 31 + # NOTE: Keep in mind that different parts of macFUSE are distributed under a 32 + # different license 33 + installPhase = '' 34 + mkdir -p $out/include $out/lib/pkgconfig 35 + cp usr/local/lib/*.tbd $out/lib 36 + cp usr/local/lib/pkgconfig/*.pc $out/lib/pkgconfig 37 + cp -R usr/local/include/* $out/include 38 + ''; 39 + 40 + meta = with lib; { 41 + homepage = "https://osxfuse.github.io"; 42 + description = "Build time stubs for FUSE on macOS"; 43 + platforms = platforms.darwin; 44 + maintainers = with maintainers; [ midchildan ]; 45 + 46 + # macFUSE as a whole includes code with restrictions on commercial 47 + # redistribution. However, the build artifacts that we actually touch for 48 + # this derivation are distributed under a free license. 49 + license = with licenses; [ 50 + lgpl2Plus # libfuse 51 + ]; 52 + }; 53 + }
-48
pkgs/os-specific/darwin/osxfuse/default.nix
··· 1 - { lib, stdenv, runCommand, fetchFromGitHub, autoreconfHook }: 2 - 3 - let 4 - version = "3.8.3"; 5 - 6 - headers = runCommand "osxfuse-common-${version}" { 7 - src = fetchFromGitHub { 8 - owner = "osxfuse"; 9 - repo = "osxfuse"; 10 - rev = "osxfuse-${version}"; 11 - sha256 = "13lmg41zcyiajh8m42w7szkbg2is4551ryx2ia2mmzvvd23pag0z"; 12 - }; 13 - } '' 14 - mkdir -p $out/include 15 - cp --target-directory=$out/include $src/common/*.h 16 - ''; 17 - in 18 - 19 - stdenv.mkDerivation { 20 - 21 - pname = "osxfuse"; 22 - inherit version; 23 - 24 - src = fetchFromGitHub { 25 - owner = "osxfuse"; 26 - repo = "fuse"; 27 - rev = "1a1977a"; # Submodule reference from osxfuse/osxfuse at tag osxfuse-${version} 28 - sha256 = "101fw8j40ylfbbrjycnwr5qp422agyf9sfbczyb9w5ivrkds3rfw"; 29 - }; 30 - 31 - postPatch = '' 32 - touch config.rpath 33 - ''; 34 - 35 - postInstall = '' 36 - ln -s osxfuse.pc $out/lib/pkgconfig/fuse.pc 37 - ''; 38 - 39 - nativeBuildInputs = [ autoreconfHook ]; 40 - buildInputs = [ headers ]; 41 - 42 - meta = with lib; { 43 - homepage = "https://osxfuse.github.io"; 44 - description = "C-based FUSE for macOS SDK"; 45 - platforms = platforms.darwin; 46 - license = licenses.gpl2; 47 - }; 48 - }
+34
pkgs/os-specific/linux/mbp-modules/mbp2018-bridge-drv/default.nix
··· 1 + { lib, stdenv, kernel, fetchFromGitHub, }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "mbp2018-bridge-drv"; 5 + version = "0.01"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "MCMrARM"; 9 + repo = "mbp2018-bridge-drv"; 10 + rev = "${version}"; 11 + sha256 = "0ac2l51ybfrvg8m36x67rsvgjqs1vwp7c89ssvbjkrcq3y4qdb53"; 12 + }; 13 + 14 + buildPhase = '' 15 + make -C ${kernel.dev}/lib/modules/${kernel.modDirVersion}/build \ 16 + -j$NIX_BUILD_CORES M=$(pwd) modules 17 + ''; 18 + 19 + installPhase = '' 20 + make -C ${kernel.dev}/lib/modules/${kernel.modDirVersion}/build \ 21 + INSTALL_MOD_PATH=$out M=$(pwd) modules_install 22 + ''; 23 + 24 + meta = with lib; { 25 + description = "A driver for MacBook models 2018 and newer, which makes the keyboard, mouse and audio output work."; 26 + longDescription = '' 27 + A driver for MacBook models 2018 and newer, implementing the VHCI (required for mouse/keyboard/etc.) and audio functionality. 28 + ''; 29 + homepage = "https://github.com/MCMrARM/mbp2018-bridge-drv"; 30 + license = lib.licenses.gpl2Only; 31 + platforms = platforms.linux; 32 + maintainers = [ lib.maintainers.hlolli ]; 33 + }; 34 + }
+2 -2
pkgs/servers/monitoring/munin/default.nix
··· 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { 6 - version = "2.0.65"; 6 + version = "2.0.66"; 7 7 pname = "munin"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "munin-monitoring"; 11 11 repo = "munin"; 12 12 rev = version; 13 - sha256 = "0gz9kp1x39xpklq77xpm8kldsc4w87732if90w5p9pw0ip4cn6df"; 13 + sha256 = "sha256-1aikMRY1YiSQNUnYqsw1Eew9D9JHbkX+BXNCof6YK50="; 14 14 }; 15 15 16 16 buildInputs = [
+2 -2
pkgs/tools/filesystems/bindfs/default.nix
··· 1 - { lib, stdenv, fetchurl, fuse, pkg-config, osxfuse }: 1 + { lib, stdenv, fetchurl, fuse, pkg-config, macfuse-stubs }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 version = "1.15.1"; ··· 11 11 12 12 nativeBuildInputs = [ pkg-config ]; 13 13 buildInputs = if stdenv.isDarwin 14 - then [ osxfuse ] 14 + then [ macfuse-stubs ] 15 15 else [ fuse ]; 16 16 postFixup = '' 17 17 ln -s $out/bin/bindfs $out/bin/mount.fuse.bindfs
+2 -2
pkgs/tools/filesystems/s3fs/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, curl, openssl, libxml2, fuse, osxfuse }: 1 + { lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, curl, openssl, libxml2, fuse, macfuse-stubs }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "s3fs-fuse"; ··· 13 13 14 14 buildInputs = [ curl openssl libxml2 ] 15 15 ++ lib.optionals stdenv.isLinux [ fuse ] 16 - ++ lib.optionals stdenv.isDarwin [ osxfuse ]; 16 + ++ lib.optionals stdenv.isDarwin [ macfuse-stubs ]; 17 17 nativeBuildInputs = [ autoreconfHook pkg-config ]; 18 18 19 19 configureFlags = [
+3 -5
pkgs/tools/filesystems/unionfs-fuse/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, cmake, fuse, osxfuse }: 1 + { lib, stdenv, fetchFromGitHub, cmake, fuse, macfuse-stubs }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "unionfs-fuse"; ··· 21 21 22 22 postPatch = lib.optionalString stdenv.isDarwin '' 23 23 substituteInPlace CMakeLists.txt \ 24 - --replace '/usr/local/include/osxfuse/fuse' '${osxfuse}/include/osxfuse/fuse' 25 - substituteInPlace src/CMakeLists.txt \ 26 - --replace 'target_link_libraries(unionfs fuse pthread)' 'target_link_libraries(unionfs osxfuse pthread)' 24 + --replace '/usr/local/include/osxfuse/fuse' '${macfuse-stubs}/include/fuse' 27 25 ''; 28 26 29 27 nativeBuildInputs = [ cmake ]; 30 - buildInputs = [ (if stdenv.isDarwin then osxfuse else fuse) ]; 28 + buildInputs = [ (if stdenv.isDarwin then macfuse-stubs else fuse) ]; 31 29 32 30 # Put the unionfs mount helper in place as mount.unionfs-fuse. This makes it 33 31 # possible to do:
+3 -1
pkgs/top-level/aliases.nix
··· 460 460 openssh_with_kerberos = openssh; # added 2018-01-28 461 461 onnxruntime = throw "onnxruntime has been removed due to poor maintainability"; # added 2020-12-04 462 462 osquery = throw "osquery has been removed."; # added 2019-11-24 463 + osxfuse = macfuse-stubs; # added 2021-03-20 463 464 otter-browser = throw "otter-browser has been removed from nixpkgs, as it was unmaintained"; # added 2020-02-02 464 465 owncloudclient = owncloud-client; # added 2016-08 465 466 p11_kit = p11-kit; # added 2018-02-25 ··· 636 637 sambaMaster = throw "sambaMaster was removed in 2019-09-13: outdated and no longer needed"; 637 638 samsungUnifiedLinuxDriver = samsung-unified-linux-driver; # added 2016-01-25 638 639 saneBackends = sane-backends; # added 2016-01-02 639 - saneBackendsGit = sane-backends-git; # added 2016-01-02 640 + saneBackendsGit = sane-backends; # added 2016-01-02 641 + sane-backends-git = sane-backends; # added 2021-02-19 640 642 saneFrontends = sane-frontends; # added 2016-01-02 641 643 sapic = throw "sapic was deprecated on 2019-1-19: sapic is bundled with 'tamarin-prover' now"; 642 644 scaff = throw "scaff is deprecated - replaced by https://gitlab.com/jD91mZM2/inc (not in nixpkgs yet)"; # added 2020-03-01
+7 -3
pkgs/top-level/all-packages.nix
··· 11978 11978 11979 11979 astyle = callPackage ../development/tools/misc/astyle { }; 11980 11980 11981 + automaticcomponenttoolkit = callPackage ../development/tools/misc/automaticcomponenttoolkit { }; 11982 + 11981 11983 awf = callPackage ../development/tools/misc/awf { }; 11982 11984 11983 11985 aws-adfs = with python3Packages; toPythonApplication aws-adfs; ··· 19402 19404 inherit (pkgs.darwin.apple_sdk.frameworks) IOKit; 19403 19405 }; 19404 19406 19405 - osxfuse = callPackage ../os-specific/darwin/osxfuse { }; 19407 + macfuse-stubs = callPackage ../os-specific/darwin/macfuse { 19408 + inherit (darwin) libtapi; 19409 + }; 19406 19410 19407 19411 osxsnarf = callPackage ../os-specific/darwin/osxsnarf { }; 19408 19412 ··· 19668 19672 broadcom_sta = callPackage ../os-specific/linux/broadcom-sta { }; 19669 19673 19670 19674 tbs = callPackage ../os-specific/linux/tbs { }; 19675 + 19676 + mbp2018-bridge-drv = callPackage ../os-specific/linux/mbp-modules/mbp2018-bridge-drv { }; 19671 19677 19672 19678 nvidiabl = callPackage ../os-specific/linux/nvidiabl { }; 19673 19679 ··· 29729 29735 samsung-unified-linux-driver = res.samsung-unified-linux-driver_4_01_17; 29730 29736 29731 29737 sane-backends = callPackage ../applications/graphics/sane/backends (config.sane or {}); 29732 - 29733 - sane-backends-git = callPackage ../applications/graphics/sane/backends/git.nix (config.sane or {}); 29734 29738 29735 29739 senv = callPackage ../applications/misc/senv { }; 29736 29740
+1
pkgs/top-level/python-packages.nix
··· 3970 3970 3971 3971 llfuse = callPackage ../development/python-modules/llfuse { 3972 3972 inherit (pkgs) fuse; 3973 + inherit (pkgs.darwin.apple_sdk.frameworks) DiskArbitration; 3973 3974 }; 3974 3975 3975 3976 llvmlite = callPackage ../development/python-modules/llvmlite {