lol

Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
a2994c58 b88b5299

+570 -190
+1 -1
.github/CONTRIBUTING.md
··· 37 37 * Not start with the package name. 38 38 * Not have a period at the end. 39 39 * `meta.license` must be set and fit the upstream license. 40 - * If there is no upstream license, `meta.license` should default to `stdenv.lib.licenses.unfree`. 40 + * If there is no upstream license, `meta.license` should default to `lib.licenses.unfree`. 41 41 * `meta.maintainers` must be set. 42 42 43 43 See the nixpkgs manual for more details on [standard meta-attributes](https://nixos.org/nixpkgs/manual/#sec-standard-meta-attributes) and on how to [submit changes to nixpkgs](https://nixos.org/nixpkgs/manual/#chap-submitting-changes).
+8 -8
lib/systems/examples.nix
··· 179 179 iphone64 = { 180 180 config = "aarch64-apple-ios"; 181 181 # config = "aarch64-apple-darwin14"; 182 - sdkVer = "13.2"; 183 - xcodeVer = "11.3.1"; 182 + sdkVer = "14.3"; 183 + xcodeVer = "12.3"; 184 184 xcodePlatform = "iPhoneOS"; 185 185 useiOSPrebuilt = true; 186 186 }; ··· 188 188 iphone32 = { 189 189 config = "armv7a-apple-ios"; 190 190 # config = "arm-apple-darwin10"; 191 - sdkVer = "13.2"; 192 - xcodeVer = "11.3.1"; 191 + sdkVer = "14.3"; 192 + xcodeVer = "12.3"; 193 193 xcodePlatform = "iPhoneOS"; 194 194 useiOSPrebuilt = true; 195 195 }; ··· 197 197 iphone64-simulator = { 198 198 config = "x86_64-apple-ios"; 199 199 # config = "x86_64-apple-darwin14"; 200 - sdkVer = "13.2"; 201 - xcodeVer = "11.3.1"; 200 + sdkVer = "14.3"; 201 + xcodeVer = "12.3"; 202 202 xcodePlatform = "iPhoneSimulator"; 203 203 useiOSPrebuilt = true; 204 204 }; ··· 206 206 iphone32-simulator = { 207 207 config = "i686-apple-ios"; 208 208 # config = "i386-apple-darwin11"; 209 - sdkVer = "13.2"; 210 - xcodeVer = "11.3.1"; 209 + sdkVer = "14.3"; 210 + xcodeVer = "12.3"; 211 211 xcodePlatform = "iPhoneSimulator"; 212 212 useiOSPrebuilt = true; 213 213 };
+6
maintainers/maintainer-list.nix
··· 1084 1084 githubId = 75972; 1085 1085 name = "Ben Booth"; 1086 1086 }; 1087 + berberman = { 1088 + email = "berberman@yandex.com"; 1089 + github = "berberman"; 1090 + githubId = 26041945; 1091 + name = "Potato Hatsue"; 1092 + }; 1087 1093 berce = { 1088 1094 email = "bert.moens@gmail.com"; 1089 1095 github = "berce";
+1 -1
maintainers/scripts/luarocks-packages.csv
··· 6 6 binaryheap,,,,,vcunat 7 7 bit32,,,,lua5_1,lblasc 8 8 busted,,,,, 9 - cassowary,,,,,marsam 9 + cassowary,,,,,marsam alerque 10 10 cjson,lua-cjson,,,, 11 11 compat53,,,,,vcunat 12 12 cosmo,,,,,marsam
+1 -1
maintainers/scripts/update-luarocks-packages
··· 66 66 67 67 These packages are manually refined in lua-overrides.nix 68 68 */ 69 - { self, stdenv, fetchurl, fetchgit, pkgs, ... } @ args: 69 + { self, stdenv, lib, fetchurl, fetchgit, pkgs, ... } @ args: 70 70 self: super: 71 71 with self; 72 72 {
+1 -1
nixos/doc/manual/contributing-to-this-manual.xml
··· 1 1 <chapter xmlns="http://docbook.org/ns/docbook" 2 2 xmlns:xlink="http://www.w3.org/1999/xlink" 3 3 xml:id="chap-contributing"> 4 - <title>Contributing to this documentation</title> 4 + <title>Contributing to this manual</title> 5 5 <para> 6 6 The DocBook sources of NixOS' manual are in the <filename 7 7 xlink:href="https://github.com/NixOS/nixpkgs/tree/master/nixos/doc/manual">
+5 -1
nixos/doc/manual/preface.xml
··· 21 21 xlink:href="https://discourse.nixos.org">Discourse</literal> or 22 22 on the <link 23 23 xlink:href="irc://irc.freenode.net/#nixos"> 24 - <literal>#nixos</literal> channel on Freenode</link>. Bugs should be 24 + <literal>#nixos</literal> channel on Freenode</link>, or 25 + consider 26 + <link 27 + xlink:href="#chap-contributing"> 28 + contributing to this manual</link>. Bugs should be 25 29 reported in 26 30 <link 27 31 xlink:href="https://github.com/NixOS/nixpkgs/issues">NixOS’
+1
nixos/modules/i18n/input-method/default.nix
··· 42 42 <itemizedlist> 43 43 <listitem><para>ibus: The intelligent input bus, extra input engines can be added using <literal>i18n.inputMethod.ibus.engines</literal>.</para></listitem> 44 44 <listitem><para>fcitx: A customizable lightweight input method, extra input engines can be added using <literal>i18n.inputMethod.fcitx.engines</literal>.</para></listitem> 45 + <listitem><para>fcitx5: The next generation of fcitx, addons (including engines, dictionaries, skins) can be added using <literal>i18n.inputMethod.fcitx5.addons</literal>.</para></listitem> 45 46 <listitem><para>nabi: A Korean input method based on XIM. Nabi doesn't support Qt 5.</para></listitem> 46 47 <listitem><para>uim: The universal input method, is a library with a XIM bridge. uim mainly support Chinese, Japanese and Korean.</para></listitem> 47 48 <listitem><para>hime: An extremely easy-to-use input method framework.</para></listitem>
+1 -1
nixos/tests/usbguard.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "usbguard"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ tnias ]; 5 5 }; 6 6
+2 -2
pkgs/applications/graphics/hdr-plus/default.nix
··· 1 - { stdenv, fetchFromGitHub, fetchpatch 1 + { lib, stdenv, fetchFromGitHub, fetchpatch 2 2 , cmake, halide 3 3 , libpng, libjpeg, libtiff, libraw 4 4 }: ··· 32 32 done 33 33 ''; 34 34 35 - meta = with stdenv.lib; { 35 + meta = with lib; { 36 36 description = "Burst photography pipeline based on Google's HDR+"; 37 37 homepage = "https://www.timothybrooks.com/tech/hdr-plus/"; 38 38 license = licenses.mit;
+2 -2
pkgs/applications/misc/koreader/default.nix
··· 11 11 let font-droid = nerdfonts.override { fonts = [ "DroidSansMono" ]; }; 12 12 in stdenv.mkDerivation rec { 13 13 pname = "koreader"; 14 - version = "2020.12"; 14 + version = "2021.01"; 15 15 16 16 src = fetchurl { 17 17 url = 18 18 "https://github.com/koreader/koreader/releases/download/v${version}/koreader-${version}-amd64.deb"; 19 - sha256 = "0x97mm7h8kr1jps0hzdgl9irakma85ikrhzr18wc1plmffgv6kwm"; 19 + sha256 = "0cc7pk27wlvziihggzlrb3wsjmndafa13cy1snqr5x71bb81fv6r"; 20 20 }; 21 21 22 22 sourceRoot = ".";
+2 -2
pkgs/applications/misc/rescuetime/default.nix
··· 38 38 passthru.updateScript = writeScript "${pname}-updater" '' 39 39 #!${stdenv.shell} 40 40 set -eu -o pipefail 41 - PATH=${stdenv.lib.makeBinPath [curl pup common-updater-scripts]}:$PATH 41 + PATH=${lib.makeBinPath [curl pup common-updater-scripts]}:$PATH 42 42 latestVersion="$(curl -sS https://www.rescuetime.com/release-notes/linux | pup '.release:first-of-type h2 strong text{}' | tr -d '\n')" 43 43 44 - for platform in ${stdenv.lib.concatStringsSep " " meta.platforms}; do 44 + for platform in ${lib.concatStringsSep " " meta.platforms}; do 45 45 # The script will not perform an update when the version attribute is up to date from previous platform run 46 46 # We need to clear it before each run 47 47 update-source-version ${pname} 0 $(yes 0 | head -64 | tr -d "\n") --system=$platform
+2 -2
pkgs/applications/radio/klog/default.nix
··· 1 - { stdenv, fetchurl, hamlib, pkg-config, qt5, qtbase, qttools, qtserialport, qtcharts, qmake, wrapQtAppsHook }: 1 + { lib, stdenv, fetchurl, hamlib, pkg-config, qt5, qtbase, qttools, qtserialport, qtcharts, qmake, wrapQtAppsHook }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "klog"; ··· 14 14 15 15 qmakeFlags = [ "KLog.pro" ]; 16 16 17 - meta = with stdenv.lib; { 17 + meta = with lib; { 18 18 description = "A multiplatform free hamradio logger"; 19 19 longDescription = '' 20 20 KLog provides QSO management, useful QSL management DX-Cluster client, DXCC management,
+2 -2
pkgs/applications/science/biology/migrate/default.nix
··· 1 - { gccStdenv, fetchurl, zlib, mpi }: 1 + { lib, gccStdenv, fetchurl, zlib, mpi }: 2 2 3 3 gccStdenv.mkDerivation rec { 4 4 version = "3.7.2"; ··· 14 14 buildFlags = [ "thread" "mpis" ]; 15 15 preInstall = "mkdir -p $out/man/man1"; 16 16 17 - meta = with gccStdenv.lib; { 17 + meta = with lib; { 18 18 description = "Estimates population size, migration, population splitting parameters using genetic/genomic data"; 19 19 homepage = "https://peterbeerli.com/migrate-html5/index.html"; 20 20 license = licenses.mit;
+1 -1
pkgs/build-support/alternatives/blas/default.nix
··· 132 132 Cflags: -I$dev/include 133 133 Libs: -L$out/lib -lcblas 134 134 EOF 135 - '' + stdenv.lib.optionalString (blasImplementation == "mkl") '' 135 + '' + lib.optionalString (blasImplementation == "mkl") '' 136 136 mkdir -p $out/nix-support 137 137 echo 'export MKL_INTERFACE_LAYER=${lib.optionalString isILP64 "I"}LP64,GNU' > $out/nix-support/setup-hook 138 138 ln -s $out/lib/libblas${canonicalExtension} $out/lib/libmkl_rt${stdenv.hostPlatform.extensions.sharedLibrary}
+1 -1
pkgs/build-support/alternatives/lapack/default.nix
··· 98 98 Cflags: -I$dev/include 99 99 Libs: -L$out/lib -llapacke 100 100 EOF 101 - '' + stdenv.lib.optionalString (lapackImplementation == "mkl") '' 101 + '' + lib.optionalString (lapackImplementation == "mkl") '' 102 102 mkdir -p $out/nix-support 103 103 echo 'export MKL_INTERFACE_LAYER=${lib.optionalString isILP64 "I"}LP64,GNU' > $out/nix-support/setup-hook 104 104 ln -s $out/lib/liblapack${canonicalExtension} $out/lib/libmkl_rt${stdenv.hostPlatform.extensions.sharedLibrary}
+3 -2
pkgs/build-support/appimage/default.nix
··· 1 - { stdenv 1 + { lib 2 + , stdenv 2 3 , bash 3 4 , binutils-unwrapped 4 5 , coreutils ··· 15 16 src = ./appimage-exec.sh; 16 17 isExecutable = true; 17 18 dir = "bin"; 18 - path = with pkgs; stdenv.lib.makeBinPath [ 19 + path = lib.makeBinPath [ 19 20 bash 20 21 binutils-unwrapped 21 22 coreutils
+1 -1
pkgs/build-support/docker/default.nix
··· 94 94 inherit imageDigest; 95 95 imageName = finalImageName; 96 96 imageTag = finalImageTag; 97 - impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 97 + impureEnvVars = lib.fetchers.proxyImpureEnvVars; 98 98 outputHashMode = "flat"; 99 99 outputHashAlgo = "sha256"; 100 100 outputHash = sha256;
+3 -5
pkgs/build-support/docker/nix-prefetch-docker.nix
··· 1 - { stdenv, makeWrapper, nix, skopeo, jq }: 2 - 3 - with stdenv.lib; 1 + { lib, stdenv, makeWrapper, nix, skopeo, jq }: 4 2 5 3 stdenv.mkDerivation { 6 4 name = "nix-prefetch-docker"; ··· 12 10 installPhase = '' 13 11 install -vD ${./nix-prefetch-docker} $out/bin/$name; 14 12 wrapProgram $out/bin/$name \ 15 - --prefix PATH : ${makeBinPath [ nix skopeo jq ]} \ 13 + --prefix PATH : ${lib.makeBinPath [ nix skopeo jq ]} \ 16 14 --set HOME /homeless-shelter 17 15 ''; 18 16 19 17 preferLocalBuild = true; 20 18 21 - meta = { 19 + meta = with lib; { 22 20 description = "Script used to obtain source hashes for dockerTools.pullImage"; 23 21 maintainers = with maintainers; [ offline ]; 24 22 platforms = platforms.unix;
+2 -2
pkgs/build-support/dotnetenv/build-solution.nix
··· 1 - {stdenv, dotnetfx}: 1 + { lib, stdenv, dotnetfx }: 2 2 { name 3 3 , src 4 4 , baseDir ? "." ··· 24 24 ''; 25 25 26 26 preBuild = '' 27 - ${stdenv.lib.optionalString modifyPublicMain '' 27 + ${lib.optionalString modifyPublicMain '' 28 28 sed -i -e "s|static void Main|public static void Main|" ${mainClassFile} 29 29 ''} 30 30 ${preBuild}
+2 -2
pkgs/build-support/dotnetenv/default.nix
··· 1 - {stdenv, dotnetfx}: 1 + { lib, stdenv, dotnetfx }: 2 2 3 3 let dotnetenv = 4 4 { 5 5 buildSolution = import ./build-solution.nix { 6 - inherit stdenv; 6 + inherit lib stdenv; 7 7 dotnetfx = dotnetfx.pkg; 8 8 }; 9 9
+8 -9
pkgs/build-support/fetchmavenartifact/default.nix
··· 1 1 # Adaptation of the MIT-licensed work on `sbt2nix` done by Charles O'Farrell 2 2 3 - { fetchurl, stdenv }: 3 + { lib, fetchurl, stdenv }: 4 4 let 5 5 defaultRepos = [ 6 6 "https://repo1.maven.org/maven2" ··· 36 36 # if repos is empty, then url or urls must be specified. 37 37 assert (repos != []) || (url != "") || (urls != []); 38 38 39 - 40 39 let 41 40 name_ = 42 - with stdenv.lib; concatStrings [ 43 - (replaceChars ["."] ["_"] groupId) "_" 44 - (replaceChars ["."] ["_"] artifactId) "-" 41 + lib.concatStrings [ 42 + (lib.replaceChars ["."] ["_"] groupId) "_" 43 + (lib.replaceChars ["."] ["_"] artifactId) "-" 45 44 version 46 45 ]; 47 46 mkJarUrl = repoUrl: 48 - with stdenv.lib; concatStringsSep "/" [ 49 - (removeSuffix "/" repoUrl) 50 - (replaceChars ["."] ["/"] groupId) 47 + lib.concatStringsSep "/" [ 48 + (lib.removeSuffix "/" repoUrl) 49 + (lib.replaceChars ["."] ["/"] groupId) 51 50 artifactId 52 51 version 53 - "${artifactId}-${version}${optionalString (!isNull classifier) "-${classifier}"}.jar" 52 + "${artifactId}-${version}${lib.optionalString (!isNull classifier) "-${classifier}"}.jar" 54 53 ]; 55 54 urls_ = 56 55 if url != "" then [url]
+4 -4
pkgs/build-support/icon-conv-tools/default.nix
··· 1 - { stdenv, icoutils }: 1 + { lib, stdenv, icoutils }: 2 2 3 3 stdenv.mkDerivation { 4 4 name = "icon-conv-tools-0.0.0"; ··· 23 23 dontPatchELF = true; 24 24 dontStrip = true; 25 25 26 - meta = { 26 + meta = with lib; { 27 27 description = "Tools for icon conversion specific to nix package manager"; 28 - maintainers = with stdenv.lib.maintainers; [ jraygauthier ]; 29 - platforms = with stdenv.lib.platforms; linux; 28 + maintainers = with maintainers; [ jraygauthier ]; 29 + platforms = platforms.linux; 30 30 }; 31 31 }
+2 -2
pkgs/build-support/libredirect/default.nix
··· 46 46 ) 47 47 ''; 48 48 49 - meta = { 50 - platforms = stdenv.lib.platforms.unix; 49 + meta = with lib; { 50 + platforms = platforms.unix; 51 51 description = "An LD_PRELOAD library to intercept and rewrite the paths in glibc calls"; 52 52 longDescription = '' 53 53 libredirect is an LD_PRELOAD library to intercept and rewrite the paths in
+2 -2
pkgs/build-support/ocaml/default.nix
··· 1 - { stdenv, writeText, ocaml, findlib, ocamlbuild, camlp4 }: 1 + { lib, stdenv, writeText, ocaml, findlib, ocamlbuild, camlp4 }: 2 2 3 3 { name, version, buildInputs ? [], 4 4 createFindlibDestdir ? true, ··· 14 14 }; 15 15 in 16 16 assert minimumSupportedOcamlVersion != null -> 17 - stdenv.lib.versionOlder minimumSupportedOcamlVersion ocaml.version; 17 + lib.versionOlder minimumSupportedOcamlVersion ocaml.version; 18 18 19 19 stdenv.mkDerivation (args // { 20 20 name = "ocaml-${name}-${version}";
+2 -2
pkgs/build-support/ocaml/dune.nix
··· 1 - { stdenv, ocaml, findlib, dune, dune_2 }: 1 + { lib, stdenv, ocaml, findlib, dune, dune_2 }: 2 2 3 3 { pname, version, buildInputs ? [], enableParallelBuilding ? true, ... }@args: 4 4 5 5 let Dune = if args.useDune2 or false then dune_2 else dune; in 6 6 7 7 if args ? minimumOCamlVersion && 8 - ! stdenv.lib.versionAtLeast ocaml.version args.minimumOCamlVersion 8 + ! lib.versionAtLeast ocaml.version args.minimumOCamlVersion 9 9 then throw "${pname}-${version} is not available for OCaml ${ocaml.version}" 10 10 else 11 11
+2 -2
pkgs/build-support/ocaml/oasis.nix
··· 1 - { stdenv, ocaml_oasis, ocaml, findlib, ocamlbuild }: 1 + { lib, stdenv, ocaml_oasis, ocaml, findlib, ocamlbuild }: 2 2 3 3 { pname, version, buildInputs ? [], meta ? { platforms = ocaml.meta.platforms or []; }, 4 4 minimumOCamlVersion ? null, ··· 8 8 }@args: 9 9 10 10 if args ? minimumOCamlVersion && 11 - ! stdenv.lib.versionAtLeast ocaml.version args.minimumOCamlVersion 11 + ! lib.versionAtLeast ocaml.version args.minimumOCamlVersion 12 12 then throw "${pname}-${version} is not available for OCaml ${ocaml.version}" 13 13 else 14 14
+3 -2
pkgs/build-support/pkg-config-wrapper/default.nix
··· 2 2 # PKG_CONFIG_PATH_FOR_BUILD work properly. 3 3 4 4 { stdenvNoCC 5 + , lib 5 6 , buildPackages 6 7 , pkg-config 7 8 , baseBinName ? "pkg-config" ··· 19 20 # 20 21 # TODO(@Ericson2314) Make unconditional, or optional but always true by 21 22 # default. 22 - targetPrefix = stdenv.lib.optionalString (targetPlatform != hostPlatform) 23 + targetPrefix = lib.optionalString (targetPlatform != hostPlatform) 23 24 (targetPlatform.config + "-"); 24 25 25 26 # See description in cc-wrapper. ··· 119 120 let pkg-config_ = if pkg-config != null then pkg-config else {}; in 120 121 (if pkg-config_ ? meta then removeAttrs pkg-config.meta ["priority"] else {}) // 121 122 { description = 122 - stdenv.lib.attrByPath ["meta" "description"] "pkg-config" pkg-config_ 123 + lib.attrByPath ["meta" "description"] "pkg-config" pkg-config_ 123 124 + " (wrapper script)"; 124 125 priority = 10; 125 126 };
+2 -2
pkgs/build-support/plugins.nix
··· 1 - { stdenv }: 1 + { lib, stdenv }: 2 2 # helper functions for packaging programs with plugin systems 3 3 { 4 4 ··· 13 13 diffPlugins = expectedPlugins: foundPluginsFilePath: '' 14 14 # sort both lists first 15 15 plugins_expected=$(mktemp) 16 - (${stdenv.lib.concatMapStrings (s: "echo \"${s}\";") expectedPlugins}) \ 16 + (${lib.concatMapStrings (s: "echo \"${s}\";") expectedPlugins}) \ 17 17 | sort -u > "$plugins_expected" 18 18 plugins_found=$(mktemp) 19 19 sort -u "${foundPluginsFilePath}" > "$plugins_found"
+3 -4
pkgs/build-support/release/debian-build.nix
··· 2 2 # that contains a Debian-like (i.e. dpkg-based) OS. 3 3 4 4 { name ? "debian-build" 5 + , lib 5 6 , diskImage 6 7 , src, stdenv, vmTools, checkinstall 7 8 , fsTranslation ? false ··· 10 11 , # Features required by this package. 11 12 debRequires ? [] 12 13 , ... } @ args: 13 - 14 - with stdenv.lib; 15 14 16 15 vmTools.runInLinuxImage (stdenv.mkDerivation ( 17 16 ··· 59 58 export PAGER=cat 60 59 ${checkinstall}/sbin/checkinstall --nodoc -y -D \ 61 60 --fstrans=${if fsTranslation then "yes" else "no"} \ 62 - --requires="${concatStringsSep "," debRequires}" \ 63 - --provides="${concatStringsSep "," debProvides}" \ 61 + --requires="${lib.concatStringsSep "," debRequires}" \ 62 + --provides="${lib.concatStringsSep "," debProvides}" \ 64 63 ${if (src ? version) then "--pkgversion=$(echo ${src.version} | tr _ -)" 65 64 else "--pkgversion=0.0.0"} \ 66 65 ''${debMaintainer:+--maintainer="'$debMaintainer'"} \
+4 -4
pkgs/build-support/release/default.nix
··· 1 - { pkgs }: 1 + { lib, pkgs }: 2 2 3 3 with pkgs; 4 4 ··· 23 23 } // args); 24 24 25 25 nixBuild = args: import ./nix-build.nix ( 26 - { inherit stdenv; 26 + { inherit lib stdenv; 27 27 } // args); 28 28 29 29 coverageAnalysis = args: nixBuild ( ··· 46 46 } // args); 47 47 48 48 debBuild = args: import ./debian-build.nix ( 49 - { inherit stdenv vmTools checkinstall; 49 + { inherit lib stdenv vmTools checkinstall; 50 50 } // args); 51 51 52 52 aggregate = ··· 94 94 95 95 phases = [ "unpackPhase" "patchPhase" "installPhase" ]; 96 96 97 - patchPhase = stdenv.lib.optionalString isNixOS '' 97 + patchPhase = lib.optionalString isNixOS '' 98 98 touch .update-on-nixos-rebuild 99 99 ''; 100 100
+6 -6
pkgs/build-support/release/nix-build.nix
··· 12 12 , doCoverityAnalysis ? false 13 13 , lcovFilter ? [] 14 14 , lcovExtraTraceFiles ? [] 15 - , src, stdenv 15 + , src, lib, stdenv 16 16 , name ? if doCoverageAnalysis then "nix-coverage" else "nix-build" 17 17 , failureHook ? null 18 18 , prePhases ? [] ··· 69 69 fi 70 70 ''; 71 71 72 - failureHook = (stdenv.lib.optionalString (failureHook != null) failureHook) + 72 + failureHook = (lib.optionalString (failureHook != null) failureHook) + 73 73 '' 74 74 if test -n "$succeedOnFailure"; then 75 75 if test -n "$keepBuildDirectory"; then ··· 136 136 137 137 buildInputs = 138 138 buildInputs ++ 139 - (stdenv.lib.optional doCoverageAnalysis args.makeGCOVReport) ++ 140 - (stdenv.lib.optional doClangAnalysis args.clang-analyzer) ++ 141 - (stdenv.lib.optional doCoverityAnalysis args.cov-build) ++ 142 - (stdenv.lib.optional doCoverityAnalysis args.xz); 139 + (lib.optional doCoverageAnalysis args.makeGCOVReport) ++ 140 + (lib.optional doClangAnalysis args.clang-analyzer) ++ 141 + (lib.optional doCoverityAnalysis args.cov-build) ++ 142 + (lib.optional doCoverityAnalysis args.xz); 143 143 144 144 lcovFilter = ["/nix/store/*"] ++ lcovFilter; 145 145
+3 -3
pkgs/build-support/rust/default-crate-overrides.nix
··· 1 - { stdenv, pkg-config, curl, darwin, libiconv, libgit2, libssh2, 1 + { lib, stdenv, pkg-config, curl, darwin, libiconv, libgit2, libssh2, 2 2 openssl, sqlite, zlib, dbus, dbus-glib, gdk-pixbuf, cairo, python3, 3 3 libsodium, postgresql, gmp, foundationdb, capnproto, nettle, clang, 4 4 llvmPackages, ... }: ··· 17 17 18 18 cargo = attrs: { 19 19 buildInputs = [ openssl zlib curl ] 20 - ++ stdenv.lib.optionals stdenv.isDarwin [ CoreFoundation Security libiconv ]; 20 + ++ lib.optionals stdenv.isDarwin [ CoreFoundation Security libiconv ]; 21 21 }; 22 22 23 23 libz-sys = attrs: { ··· 149 149 }; 150 150 151 151 serde_derive = attrs: { 152 - buildInputs = stdenv.lib.optional stdenv.isDarwin Security; 152 + buildInputs = lib.optional stdenv.isDarwin Security; 153 153 }; 154 154 155 155 thrussh-libsodium = attrs: {
+14 -13
pkgs/build-support/rust/default.nix
··· 1 1 { stdenv 2 + , lib 2 3 , buildPackages 3 4 , cacert 4 5 , cargo ··· 83 84 cargoDepsCopy="$sourceRoot/${cargoVendorDir}" 84 85 ''; 85 86 86 - targetIsJSON = stdenv.lib.hasSuffix ".json" target; 87 + targetIsJSON = lib.hasSuffix ".json" target; 87 88 useSysroot = targetIsJSON && !__internal_dontAddSysroot; 88 89 89 90 # see https://github.com/rust-lang/cargo/blob/964a16a28e234a3d397b2a7031d4ab4a428b1391/src/cargo/core/compiler/compile_kind.rs#L151-L168 90 91 # the "${}" is needed to transform the path into a /nix/store path before baseNameOf 91 92 shortTarget = if targetIsJSON then 92 - (stdenv.lib.removeSuffix ".json" (builtins.baseNameOf "${target}")) 93 + (lib.removeSuffix ".json" (builtins.baseNameOf "${target}")) 93 94 else target; 94 95 95 96 sysroot = (callPackage ./sysroot {}) { ··· 116 117 # See https://os.phil-opp.com/testing/ for more information. 117 118 assert useSysroot -> !(args.doCheck or true); 118 119 119 - stdenv.mkDerivation ((removeAttrs args ["depsExtraArgs"]) // stdenv.lib.optionalAttrs useSysroot { 120 + stdenv.mkDerivation ((removeAttrs args ["depsExtraArgs"]) // lib.optionalAttrs useSysroot { 120 121 RUSTFLAGS = "--sysroot ${sysroot} " + (args.RUSTFLAGS or ""); 121 122 } // { 122 123 inherit cargoDeps; ··· 124 125 patchRegistryDeps = ./patch-registry-deps; 125 126 126 127 nativeBuildInputs = nativeBuildInputs ++ [ cacert git cargo rustc ]; 127 - buildInputs = buildInputs ++ stdenv.lib.optional stdenv.hostPlatform.isMinGW windows.pthreads; 128 + buildInputs = buildInputs ++ lib.optional stdenv.hostPlatform.isMinGW windows.pthreads; 128 129 129 130 patches = cargoPatches ++ patches; 130 131 ··· 147 148 cat >> .cargo/config <<'EOF' 148 149 [target."${rust.toRustTarget stdenv.buildPlatform}"] 149 150 "linker" = "${ccForBuild}" 150 - ${stdenv.lib.optionalString (stdenv.buildPlatform.config != stdenv.hostPlatform.config) '' 151 + ${lib.optionalString (stdenv.buildPlatform.config != stdenv.hostPlatform.config) '' 151 152 [target."${shortTarget}"] 152 153 "linker" = "${ccForHost}" 153 154 ${# https://github.com/rust-lang/rust/issues/46651#issuecomment-433611633 154 - stdenv.lib.optionalString (stdenv.hostPlatform.isMusl && stdenv.hostPlatform.isAarch64) '' 155 + lib.optionalString (stdenv.hostPlatform.isMusl && stdenv.hostPlatform.isAarch64) '' 155 156 "rustflags" = [ "-C", "target-feature=+crt-static", "-C", "link-arg=-lgcc" ] 156 157 ''} 157 158 ''} ··· 163 164 # After unpacking and applying patches, check that the Cargo.lock matches our 164 165 # src package. Note that we do this after the patchPhase, because the 165 166 # patchPhase may create the Cargo.lock if upstream has not shipped one. 166 - postPatch = (args.postPatch or "") + stdenv.lib.optionalString validateCargoDeps '' 167 + postPatch = (args.postPatch or "") + lib.optionalString validateCargoDeps '' 167 168 cargoDepsLockfile=$NIX_BUILD_TOP/$cargoDepsCopy/Cargo.lock 168 169 srcLockfile=$NIX_BUILD_TOP/$sourceRoot/Cargo.lock 169 170 ··· 206 207 ''; 207 208 208 209 buildPhase = with builtins; args.buildPhase or '' 209 - ${stdenv.lib.optionalString (buildAndTestSubdir != null) "pushd ${buildAndTestSubdir}"} 210 + ${lib.optionalString (buildAndTestSubdir != null) "pushd ${buildAndTestSubdir}"} 210 211 runHook preBuild 211 212 212 213 ( ··· 217 218 "CC_${rust.toRustTarget stdenv.hostPlatform}"="${ccForHost}" \ 218 219 "CXX_${rust.toRustTarget stdenv.hostPlatform}"="${cxxForHost}" \ 219 220 cargo build -j $NIX_BUILD_CORES \ 220 - ${stdenv.lib.optionalString (buildType == "release") "--release"} \ 221 + ${lib.optionalString (buildType == "release") "--release"} \ 221 222 --target ${target} \ 222 223 --frozen ${concatStringsSep " " cargoBuildFlags} 223 224 ) 224 225 225 226 runHook postBuild 226 227 227 - ${stdenv.lib.optionalString (buildAndTestSubdir != null) "popd"} 228 + ${lib.optionalString (buildAndTestSubdir != null) "popd"} 228 229 229 230 # This needs to be done after postBuild: packages like `cargo` do a pushd/popd in 230 231 # the pre/postBuild-hooks that need to be taken into account before gathering ··· 238 239 ''; 239 240 240 241 checkPhase = args.checkPhase or (let 241 - argstr = "${stdenv.lib.optionalString (checkType == "release") "--release"} --target ${target} --frozen"; 242 + argstr = "${lib.optionalString (checkType == "release") "--release"} --target ${target} --frozen"; 242 243 threads = if cargoParallelTestThreads then "$NIX_BUILD_CORES" else "1"; 243 244 in '' 244 - ${stdenv.lib.optionalString (buildAndTestSubdir != null) "pushd ${buildAndTestSubdir}"} 245 + ${lib.optionalString (buildAndTestSubdir != null) "pushd ${buildAndTestSubdir}"} 245 246 runHook preCheck 246 247 echo "Running cargo test ${argstr} -- ''${checkFlags} ''${checkFlagsArray+''${checkFlagsArray[@]}}" 247 248 cargo test -j $NIX_BUILD_CORES ${argstr} -- --test-threads=${threads} ''${checkFlags} ''${checkFlagsArray+"''${checkFlagsArray[@]}"} 248 249 runHook postCheck 249 - ${stdenv.lib.optionalString (buildAndTestSubdir != null) "popd"} 250 + ${lib.optionalString (buildAndTestSubdir != null) "popd"} 250 251 ''); 251 252 252 253 doCheck = args.doCheck or true;
+2 -2
pkgs/build-support/rust/fetchCargoTarball.nix
··· 1 - { stdenv, cacert, git, cargo, python3 }: 1 + { lib, stdenv, cacert, git, cargo, python3 }: 2 2 let cargo-vendor-normalise = stdenv.mkDerivation { 3 3 name = "cargo-vendor-normalise"; 4 4 src = ./cargo-vendor-normalise.py; ··· 80 80 81 81 inherit (hash_) outputHashAlgo outputHash; 82 82 83 - impureEnvVars = stdenv.lib.fetchers.proxyImpureEnvVars; 83 + impureEnvVars = lib.fetchers.proxyImpureEnvVars; 84 84 } // (builtins.removeAttrs args [ 85 85 "name" "sha256" "cargoUpdateHook" 86 86 ]))
+2 -1
pkgs/build-support/singularity-tools/default.nix
··· 1 1 { runCommand 2 + , lib 2 3 , stdenv 3 4 , storeDir ? builtins.storeDir 4 5 , writeScript ··· 64 65 mkdir proc sys dev 65 66 66 67 # Run root script 67 - ${stdenv.lib.optionalString (runAsRoot != null) '' 68 + ${lib.optionalString (runAsRoot != null) '' 68 69 mkdir -p ./${storeDir} 69 70 mount --rbind ${storeDir} ./${storeDir} 70 71 unshare -imnpuf --mount-proc chroot ./ ${runAsRootFile}
+3 -4
pkgs/build-support/skaware/build-skaware-package.nix
··· 1 - { stdenv, cleanPackaging, fetchurl }: 2 - let lib = stdenv.lib; 3 - in { 1 + { lib, stdenv, cleanPackaging, fetchurl }: 2 + { 4 3 # : string 5 4 pname 6 5 # : string ··· 98 97 meta = { 99 98 homepage = "https://skarnet.org/software/${pname}/"; 100 99 inherit description platforms; 101 - license = stdenv.lib.licenses.isc; 100 + license = lib.licenses.isc; 102 101 maintainers = with lib.maintainers; 103 102 [ pmahoney Profpatsch ] ++ maintainers; 104 103 };
+2 -2
pkgs/build-support/skaware/clean-packaging.nix
··· 3 3 # files were either discarded or moved to outputs. 4 4 # This ensures nothing is forgotten and new files 5 5 # are correctly handled on update. 6 - { stdenv, file, writeScript }: 6 + { lib, stdenv, file, writeScript }: 7 7 8 8 let 9 - globWith = stdenv.lib.concatMapStringsSep "\n"; 9 + globWith = lib.concatMapStringsSep "\n"; 10 10 rmNoise = noiseGlobs: globWith (f: 11 11 ''rm -rf ${f}'') noiseGlobs; 12 12 mvDoc = docGlobs: globWith
+3 -3
pkgs/build-support/substitute-files/substitute-all-files.nix
··· 1 - { stdenv }: 1 + { lib, stdenv }: 2 2 3 3 args: 4 4 5 5 stdenv.mkDerivation ({ 6 6 name = if args ? name then args.name else baseNameOf (toString args.src); 7 - builder = with stdenv.lib; builtins.toFile "builder.sh" '' 7 + builder = builtins.toFile "builder.sh" '' 8 8 source $stdenv/setup 9 9 set -o pipefail 10 10 ··· 13 13 args= 14 14 15 15 pushd "$src" 16 - echo -ne "${concatStringsSep "\\0" args.files}" | xargs -0 -n1 -I {} -- find {} -type f -print0 | while read -d "" line; do 16 + echo -ne "${lib.concatStringsSep "\\0" args.files}" | xargs -0 -n1 -I {} -- find {} -type f -print0 | while read -d "" line; do 17 17 mkdir -p "$out/$(dirname "$line")" 18 18 substituteAll "$line" "$out/$line" 19 19 done
+1 -1
pkgs/build-support/templaterpm/default.nix
··· 18 18 meta = with lib; { 19 19 description = "Create templates of nix expressions from RPM .spec files"; 20 20 maintainers = with maintainers; [ tstrobel ]; 21 - platforms = with stdenv.lib.platforms; unix; 21 + platforms = platforms.unix; 22 22 hydraPlatforms = []; 23 23 }; 24 24 }
+3 -2
pkgs/build-support/vm/default.nix
··· 1 - { pkgs 1 + { lib 2 + , pkgs 2 3 , kernel ? pkgs.linux 3 4 , img ? pkgs.stdenv.hostPlatform.linux-kernel.target 4 5 , storeDir ? builtins.storeDir ··· 572 573 buildCommand = '' 573 574 ${createRootFS} 574 575 575 - PATH=$PATH:${stdenv.lib.makeBinPath [ dpkg dpkg glibc lzma ]} 576 + PATH=$PATH:${lib.makeBinPath [ dpkg dpkg glibc lzma ]} 576 577 577 578 # Unpack the .debs. We do this to prevent pre-install scripts 578 579 # (which have lots of circular dependencies) from barfing.
+1 -1
pkgs/build-support/writers/test.nix
··· 196 196 197 197 in runCommand "test-writers" { 198 198 passthru = { inherit writeTest bin simple; }; 199 - meta.platforms = stdenv.lib.platforms.all; 199 + meta.platforms = lib.platforms.all; 200 200 } '' 201 201 ${lib.concatMapStringsSep "\n" (test: writeTest "success" "${test}/bin/test_writers") (lib.attrValues bin)} 202 202 ${lib.concatMapStringsSep "\n" (test: writeTest "success" test) (lib.attrValues simple)}
+2 -2
pkgs/common-updater/scripts.nix
··· 1 - { stdenv, makeWrapper, coreutils, gnused, gnugrep, diffutils, nix, git, jq }: 1 + { lib, stdenv, makeWrapper, coreutils, gnused, gnugrep, diffutils, nix, git, jq }: 2 2 3 3 stdenv.mkDerivation { 4 4 name = "common-updater-scripts"; ··· 12 12 cp ${./scripts}/* $out/bin 13 13 14 14 for f in $out/bin/*; do 15 - wrapProgram $f --prefix PATH : ${stdenv.lib.makeBinPath [ coreutils gnused gnugrep nix diffutils git jq ]} 15 + wrapProgram $f --prefix PATH : ${lib.makeBinPath [ coreutils gnused gnugrep nix diffutils git jq ]} 16 16 done 17 17 ''; 18 18 }
+38
pkgs/desktops/gnome-3/extensions/dynamic-panel-transparency/default.nix
··· 1 + { lib, stdenv, fetchFromGitHub, gnome3, glib }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "gnome-shell-extension-dynamic-panel-transparency"; 5 + version = "35"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "ewlsh"; 9 + repo = "dynamic-panel-transparency"; 10 + rev = "0800c0a921bb25f51f6a5ca2e6981b1669a69aec"; 11 + sha256 = "0200mx861mlsi9lf7h108yam02jfqqw55r521chkgmk4fy6z99pq"; 12 + }; 13 + 14 + uuid = "dynamic-panel-transparency@rockon999.github.io"; 15 + 16 + nativeBuildInputs = [ glib ]; 17 + 18 + buildPhase = '' 19 + runHook preBuild 20 + glib-compile-schemas --strict --targetdir=${uuid}/schemas/ ${uuid}/schemas 21 + runHook postBuild 22 + ''; 23 + 24 + installPhase = '' 25 + runHook preInstall 26 + mkdir -p $out/share/gnome-shell/extensions/${uuid} 27 + cp -r ${uuid} $out/share/gnome-shell/extensions 28 + runHook postInstall 29 + ''; 30 + 31 + meta = with lib; { 32 + description = "This extension fades your top panel to nothingness when there are no maximized windows present"; 33 + license = licenses.gpl3Only; 34 + maintainers = with maintainers; [ rhoriguchi ]; 35 + homepage = "https://github.com/ewlsh/dynamic-panel-transparency"; 36 + broken = versionOlder gnome3.gnome-shell.version "3.36"; 37 + }; 38 + }
+1 -1
pkgs/development/lua-modules/generated-packages.nix
··· 5 5 6 6 These packages are manually refined in lua-overrides.nix 7 7 */ 8 - { self, lib, stdenv, fetchurl, fetchgit, pkgs, ... } @ args: 8 + { self, stdenv, lib, fetchurl, fetchgit, pkgs, ... } @ args: 9 9 self: super: 10 10 with self; 11 11 {
+30
pkgs/development/misc/breakpad/default.nix
··· 1 + { lib, stdenv, fetchgit }: 2 + let 3 + lss = fetchgit { 4 + url = "https://chromium.googlesource.com/linux-syscall-support"; 5 + rev = "d9ad2969b369a9f1c455fef92d04c7628f7f9eb8"; 6 + sha256 = "952dv+ZE1ge/WF5RyHmEqht+AofoRHKAeFmGasVF9BA="; 7 + }; 8 + in stdenv.mkDerivation { 9 + pname = "breakpad"; 10 + 11 + version = "unstable-3b3469e"; 12 + 13 + src = fetchgit { 14 + url = "https://chromium.googlesource.com/breakpad/breakpad"; 15 + rev = "3b3469e9ed0de3d02e4450b9b95014a4266cf2ff"; 16 + sha256 = "bRGOBrGPK+Zxp+KK+E5MFkYlDUNVhVeInVSwq+eCAF0="; 17 + }; 18 + 19 + postUnpack = '' 20 + ln -s ${lss} $sourceRoot/src/third_party/lss 21 + ''; 22 + 23 + meta = with lib; { 24 + description = "An open-source multi-platform crash reporting system"; 25 + homepage = "https://chromium.googlesource.com/breakpad"; 26 + license = licenses.bsd3; 27 + maintainers = with maintainers; [ berberman ]; 28 + platforms = platforms.all; 29 + }; 30 + }
+10 -4
pkgs/development/python-modules/build/default.nix
··· 19 19 20 20 src = fetchPypi { 21 21 inherit pname version; 22 - sha256 = "sha256-CLK1gJj/YX0RVAVsefinC+7Rj3z6cQvKI6ByGWkQ1bQ="; 22 + sha256 = "1d6m21lijwm04g50nwgsgj7x3vhblzw7jv05ah8psqgzk20bbch8"; 23 23 }; 24 24 25 25 nativeBuildInputs = [ ··· 39 39 # No tests in archive 40 40 doCheck = false; 41 41 42 - meta = { 43 - description = "A simple, correct PEP517 package builder"; 44 - license = lib.licenses.mit; 42 + meta = with lib; { 43 + description = "Simple, correct PEP517 package builder"; 44 + longDescription = '' 45 + build will invoke the PEP 517 hooks to build a distribution package. It 46 + is a simple build tool and does not perform any dependency management. 47 + ''; 48 + homepage = "https://github.com/pypa/build"; 49 + maintainers = with maintainers; [ fab ]; 50 + license = licenses.mit; 45 51 }; 46 52 }
+9 -4
pkgs/development/python-modules/dulwich/default.nix
··· 4 4 , git, glibcLocales }: 5 5 6 6 buildPythonPackage rec { 7 - version = "0.20.14"; 7 + version = "0.20.15"; 8 8 pname = "dulwich"; 9 9 10 10 src = fetchPypi { 11 11 inherit pname version; 12 - sha256 = "21d6ee82708f7c67ce3fdcaf1f1407e524f7f4f7411a410a972faa2176baec0d"; 12 + sha256 = "1248942fr12av2rkzpm2fq0qn6rajvv2lcgq65h8kby27qvp65zv"; 13 13 }; 14 14 15 15 LC_ALL = "en_US.UTF-8"; ··· 23 23 24 24 meta = with lib; { 25 25 description = "Simple Python implementation of the Git file formats and protocols"; 26 - homepage = "https://samba.org/~jelmer/dulwich/"; 27 - license = licenses.gpl2Plus; 26 + longDescription = '' 27 + Dulwich is a Python implementation of the Git file formats and protocols, which 28 + does not depend on Git itself. All functionality is available in pure Python. 29 + ''; 30 + homepage = "https://www.dulwich.io/"; 31 + changelog = "https://github.com/dulwich/dulwich/blob/dulwich-${version}/NEWS"; 32 + license = with licenses; [ asl20 gpl2Plus]; 28 33 maintainers = with maintainers; [ koral ]; 29 34 }; 30 35 }
+34
pkgs/development/python-modules/pyahocorasick/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchFromGitHub 4 + , pytestCheckHook 5 + }: 6 + 7 + buildPythonPackage rec { 8 + pname = "pyahocorasick"; 9 + version = "1.4.0"; 10 + 11 + src = fetchFromGitHub { 12 + owner = "WojciechMula"; 13 + repo = pname; 14 + rev = version; 15 + sha256 = "0plm9x2gziayjsl7flsgn1z8qx88c9vqm4fs1wq7dv7fr188liik"; 16 + }; 17 + 18 + checkInputs = [ pytestCheckHook ]; 19 + 20 + pytestFlagsArray = [ "unittests.py" ]; 21 + pythonImportsCheck = [ "ahocorasick" ]; 22 + 23 + meta = with lib; { 24 + description = "Python module implementing Aho-Corasick algorithm"; 25 + longDescription = '' 26 + This Python module is a fast and memory efficient library for exact or 27 + approximate multi-pattern string search meaning that you can find multiple 28 + key strings occurrences at once in some input text. 29 + ''; 30 + homepage = "https://github.com/WojciechMula/pyahocorasick"; 31 + license = with licenses; [ bsd3 ]; 32 + maintainers = with maintainers; [ fab ]; 33 + }; 34 + }
+38 -14
pkgs/development/tools/detect-secrets/default.nix
··· 1 - { lib, buildPythonApplication, fetchFromGitHub, isPy27, pyyaml, unidiff, configparser, enum34, future, functools32, mock, pytest }: 1 + { lib 2 + , buildPythonApplication 3 + , configparser 4 + , enum34 5 + , fetchFromGitHub 6 + , functools32 7 + , future 8 + , isPy27 9 + , mock 10 + , pyahocorasick 11 + , pytestCheckHook 12 + , pyyaml 13 + , requests 14 + , responses 15 + , unidiff 16 + }: 2 17 3 18 buildPythonApplication rec { 4 19 pname = "detect-secrets"; 5 - version = "0.12.4"; 20 + version = "0.14.3"; 21 + disabled = isPy27; 6 22 7 23 # PyPI tarball doesn't ship tests 8 24 src = fetchFromGitHub { 9 25 owner = "Yelp"; 10 - repo = "detect-secrets"; 26 + repo = pname; 11 27 rev = "v${version}"; 12 - sha256 = "01y5xd0irxxib4wnf5834gwa7ibb81h5y4dl8b26gyzgvm5zfpk1"; 28 + sha256 = "0c4hxih9ljmv0d3izq5idyspk5zci26gdb6lv9klwcshwrfkvxj0"; 13 29 }; 14 30 15 - propagatedBuildInputs = [ pyyaml ] 16 - ++ lib.optionals isPy27 [ configparser enum34 future functools32 ]; 31 + propagatedBuildInputs = [ 32 + pyyaml 33 + requests 34 + ]; 17 35 18 - checkInputs = [ mock pytest unidiff ]; 36 + checkInputs = [ 37 + mock 38 + pyahocorasick 39 + pytestCheckHook 40 + responses 41 + unidiff 42 + ]; 19 43 20 - # deselect tests which require git setup 21 - checkPhase = '' 22 - PYTHONPATH=$PWD:$PYTHONPATH pytest \ 23 - --deselect tests/main_test.py::TestMain \ 24 - --deselect tests/pre_commit_hook_test.py::TestPreCommitHook \ 25 - --deselect tests/core/baseline_test.py::TestInitializeBaseline 26 - ''; 44 + disabledTests = [ 45 + "TestMain" 46 + "TestPreCommitHook" 47 + "TestInitializeBaseline" 48 + ]; 49 + 50 + pythonImportsCheck = [ "detect_secrets" ]; 27 51 28 52 meta = with lib; { 29 53 description = "An enterprise friendly way of detecting and preventing secrets in code";
+4
pkgs/development/tools/go-minimock/default.nix
··· 11 11 sha256 = "0r0krbwvx5w1z0yv2qqi92irbsfhkvwvaigy350cvcz9gmcppj4h"; 12 12 }; 13 13 14 + buildFlagsArray = [ 15 + "-ldflags=-s -w -X main.version=${version}" 16 + ]; 17 + 14 18 vendorSha256 = "1macwm6hybjinwnx62v146yxydcn5k5r587nxwkf4ffy76s2m3jc"; 15 19 16 20 doCheck = true;
+3 -6
pkgs/development/tools/misc/luarocks/luarocks-nix.nix
··· 1 1 { luarocks, fetchFromGitHub }: 2 2 luarocks.overrideAttrs(old: { 3 3 pname = "luarocks-nix"; 4 - version = "2019-09-07"; 4 + version = "2021-01-22"; 5 5 src = fetchFromGitHub { 6 6 owner = "nix-community"; 7 7 repo = "luarocks-nix"; 8 - rev = "73b8772e56fd39dfffda9e3b13e9eb31e93d5cde"; 9 - sha256 = "00jgshygw439pbaxg7yph3ijia6nid9r1br416wdbyl5wqhlhm1y"; 8 + rev = "v3.5.0_nix"; 9 + sha256 = "sha256-Ea3PVkCaUPO/mvVZtHtD1G9T/Yom28M9oN6duY4ovHk="; 10 10 }; 11 - patches = [ 12 - ./darwin-3.1.3.patch 13 - ]; 14 11 })
+45
pkgs/development/tools/shadered/default.nix
··· 1 + { stdenv 2 + , lib 3 + , fetchFromGitHub 4 + , cmake 5 + , sfml 6 + , glm 7 + , python3 8 + , glew 9 + , pkg-config 10 + , SDL2 }: 11 + 12 + stdenv.mkDerivation rec { 13 + pname = "SHADERed"; 14 + version = "1.4.1"; 15 + 16 + src = fetchFromGitHub { 17 + owner = "dfranx"; 18 + repo = pname; 19 + rev = "v${version}"; 20 + fetchSubmodules = true; 21 + sha256 = "ivOd4NJgx5KWSDnXSBQLMrdvBuOm8NRzcb2S4lvOrms="; 22 + }; 23 + 24 + nativeBuildInputs = [ 25 + cmake 26 + pkg-config 27 + ]; 28 + 29 + buildInputs = [ 30 + SDL2 31 + glew 32 + glm 33 + python3 34 + sfml 35 + ]; 36 + 37 + NIX_CFLAGS_COMPILE = "-Wno-error=format-security"; 38 + 39 + meta = with lib; { 40 + description = "Lightweight, cross-platform & full-featured shader IDE"; 41 + homepage = "https://github.com/dfranx/SHADERed"; 42 + license = with licenses; [ mit ]; 43 + maintainers = with maintainers; [ Scriptkiddi ]; 44 + }; 45 + }
+6 -6
pkgs/games/multimc/default.nix
··· 1 - { lib, stdenv, mkDerivation, fetchFromGitHub, cmake, jdk8, zlib, file, makeWrapper, xorg, libpulseaudio, qtbase }: 1 + { lib, stdenv, mkDerivation, fetchFromGitHub, cmake, jdk8, zlib, file, makeWrapper, xorg, libpulseaudio, qtbase, libGL }: 2 2 3 3 let 4 4 jdk = jdk8; 5 - libpath = with xorg; lib.makeLibraryPath [ libX11 libXext libXcursor libXrandr libXxf86vm libpulseaudio ]; 5 + libpath = with xorg; lib.makeLibraryPath [ libX11 libXext libXcursor libXrandr libXxf86vm libpulseaudio libGL ]; 6 6 in mkDerivation rec { 7 7 pname = "multimc"; 8 - version = "0.6.11"; 8 + version = "unstable-2021-01-17"; 9 9 src = fetchFromGitHub { 10 10 owner = "MultiMC"; 11 11 repo = "MultiMC5"; 12 - rev = version; 13 - sha256 = "1jkbmb4sgfk8d93f5l1vd9pkpvhq9sxacc61w0rvf5xmz0wnszmz"; 12 + rev = "02887536f773643313f15442fc82cebf616da54a"; 13 + sha256 = "1aykvavcv415lq488hx4ig2a79g5a561jg92gw14fb964r43782i"; 14 14 fetchSubmodules = true; 15 15 }; 16 16 nativeBuildInputs = [ cmake file makeWrapper ]; ··· 34 34 ''; 35 35 platforms = platforms.linux; 36 36 license = licenses.lgpl21Plus; 37 - maintainers = [ maintainers.cleverca22 ]; 37 + maintainers = with maintainers; [ cleverca22 starcraft66 ]; 38 38 }; 39 39 }
+2 -2
pkgs/games/shattered-pixel-dungeon/default.nix
··· 35 35 buildPhase = '' 36 36 export GRADLE_USER_HOME=$(mktemp -d) 37 37 # https://github.com/gradle/gradle/issues/4426 38 - ${stdenv.lib.optionalString stdenv.isDarwin "export TERM=dumb"} 38 + ${lib.optionalString stdenv.isDarwin "export TERM=dumb"} 39 39 gradle --no-daemon desktop:release 40 40 ''; 41 41 # perl code mavenizes pathes (com.squareup.okio/okio/1.13.0/a9283170b7305c8d92d25aff02a6ab7e45d06cbe/okio-1.13.0.jar -> com/squareup/okio/okio/1.13.0/okio-1.13.0.jar) ··· 57 57 buildPhase = '' 58 58 export GRADLE_USER_HOME=$(mktemp -d) 59 59 # https://github.com/gradle/gradle/issues/4426 60 - ${stdenv.lib.optionalString stdenv.isDarwin "export TERM=dumb"} 60 + ${lib.optionalString stdenv.isDarwin "export TERM=dumb"} 61 61 # point to offline repo 62 62 sed -ie "s#repositories {#repositories { maven { url '${deps}' };#g" build.gradle 63 63 gradle --offline --no-daemon desktop:release
+1 -1
pkgs/misc/vim-plugins/overrides.nix
··· 698 698 ln -s ${fzy-lua-native}/static $target/${fzy-lua-native-path}/static 699 699 ln -s ${fzy-lua-native}/lua $target/${fzy-lua-native-path}/lua 700 700 ''; 701 - meta.platforms = stdenv.lib.platforms.all; 701 + meta.platforms = lib.platforms.all; 702 702 }); 703 703 704 704 } // (
+16 -3
pkgs/os-specific/darwin/xcode/default.nix
··· 1 - { stdenv, requireFile, lib }: 1 + { buildPlatform, requireFile, targetPlatform, lib }: 2 2 3 3 let requireXcode = version: sha256: 4 4 let 5 5 xip = "Xcode_" + version + ".xip"; 6 6 # TODO(alexfmpe): Find out how to validate the .xip signature in Linux 7 - unxip = if stdenv.isDarwin 7 + unxip = if buildPlatform.isDarwin 8 8 then '' 9 9 open -W ${xip} 10 10 rm -rf ${xip} ··· 53 53 xcode_10_2_1 = requireXcode "10.2.1" "11sdb54nr0x7kp987qq839x6k5gdx7vqdxjiy5xm5279n1n47bmg"; 54 54 xcode_10_3 = requireXcode "10.3" "1i628vfn6zad81fsz3zpc6z15chhskvyp8qnajp2wnpzvrwl6ngb"; 55 55 xcode_11 = requireXcode "11" "1r03j3kkp4blfp2kqpn538w3dx57ms930fj8apjkq6dk7fv3jcqh"; 56 + xcode_11_1 = requireXcode "11.1" "1c2gzc4jhhx5a7ncg19sh1r99izhipybaqxl1ll52x5y8689awc1"; 57 + xcode_11_2 = requireXcode "11.2" "1lm3q8zpvm184246h5j9mw4c1y9kk9sxnr3j98kfm0312n0l98gj"; 58 + xcode_11_3 = requireXcode "11.3" "04rv6xlywy8xqfx9ma8ygsdw4yhckk2mq0qnklxnfly899iw4wza"; 56 59 xcode_11_3_1 = requireXcode "11.3.1" "1p6nicj91kr6ad3rmycahd1i7z4hj7ccjs93ixsiximjzaahx3q4"; 57 - xcode = self."xcode_${lib.replaceStrings ["."] ["_"] (if (stdenv.targetPlatform ? xcodeVer) then stdenv.targetPlatform.xcodeVer else "11.3.1")}"; 60 + xcode_11_4 = requireXcode "11.4" "065rpb3rdk19nv3rwyf9bk32ccbd0lld12gj12l89cyg65mhpyy7"; 61 + xcode_11_5 = requireXcode "11.5" "1dizazq9nz1vjkc5gy7dd4x760mkfjiifk1hf6d9mscchdq8rfkw"; 62 + xcode_11_6 = requireXcode "11.6" "1y4fhw1kiphzxdb4wpv697z5r0algvaldwq5iqv266797rnfql4x"; 63 + xcode_11_7 = requireXcode "11.7" "0422rdc4j5qwyk59anbybxyfv0p26x0xryszm0wd8i44g66smlmj"; 64 + xcode_12 = requireXcode "12" "1w3xm268pyn5m04wv22invd5kr2k4jqllgrzapv6n1sxxynxrh8z"; 65 + xcode_12_0_1 = requireXcode "12.0.1" "1p6vd5ai0hh3cq6aflh4h21ar0shxnz8wlkaxwq7liwsdmkwzbl0"; 66 + xcode_12_1 = requireXcode "12.1" "1widy74dk43wx8iqgd7arzf6q4kzdmaz8pfwymzs8chnq9dqr3wp"; 67 + xcode_12_2 = requireXcode "12.2" "17i0wf4pwrxwfgjw7rpw9mcd59nkmys1k5h2rqsw81snzyxy9j0v"; 68 + xcode_12_3 = requireXcode "12.3" "0kwf1y4llysf1p0nsbqyzccn7d77my0ldagr5fi3by4k0xy3d189"; 69 + xcode = self."xcode_${lib.replaceStrings ["."] ["_"] (if (targetPlatform ? xcodeVer) then targetPlatform.xcodeVer else "12.3")}"; 58 70 }) 71 +
+2 -2
pkgs/os-specific/linux/statifier/default.nix
··· 1 - { multiStdenv, fetchurl }: 1 + { lib, multiStdenv, fetchurl }: 2 2 3 3 let version = "1.7.4"; in 4 4 multiStdenv.mkDerivation { ··· 16 16 sed -e s@/bin/bash@"${multiStdenv.shell}"@g -i src/*.sh 17 17 ''; 18 18 19 - meta = with multiStdenv.lib; { 19 + meta = with lib; { 20 20 description = "Tool for creating static Linux binaries"; 21 21 platforms = platforms.linux; 22 22 license = licenses.gpl2;
+2 -2
pkgs/servers/fiche/default.nix
··· 1 - { stdenv, fetchFromGitHub }: 1 + { lib, stdenv, fetchFromGitHub }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "fiche"; ··· 17 17 18 18 doCheck = true; 19 19 20 - meta = with stdenv.lib; { 20 + meta = with lib; { 21 21 description = "Command line pastebin for sharing terminal output"; 22 22 longDescription = '' 23 23 Fiche is a command line pastebin server for sharing terminal output.
+1 -1
pkgs/servers/foundationdb/vsmake.nix
··· 139 139 140 140 outputs = [ "out" "lib" "dev" "pythonsrc" ]; 141 141 142 - meta = with gcc6Stdenv.lib; { 142 + meta = with lib; { 143 143 description = "Open source, distributed, transactional key-value store"; 144 144 homepage = "https://www.foundationdb.org"; 145 145 license = licenses.asl20;
+3 -2
pkgs/servers/http/envoy/default.nix
··· 1 - { buildBazelPackage 1 + { lib 2 + , buildBazelPackage 2 3 , fetchFromGitHub 3 4 , stdenv 4 5 , cmake ··· 109 110 "--cxxopt=-Wno-uninitialized" 110 111 ]; 111 112 112 - meta = with stdenv.lib; { 113 + meta = with lib; { 113 114 homepage = "https://envoyproxy.io"; 114 115 description = "Cloud-native edge and service proxy"; 115 116 license = licenses.asl20;
+10 -10
pkgs/test/cc-wrapper/default.nix
··· 1 - { stdenv, glibc }: 2 - with stdenv.lib; 1 + { lib, stdenv, glibc }: 2 + 3 3 let 4 4 # Sanitizers are not supported on Darwin. 5 5 # Sanitizer headers aren't available in older libc++ stdenvs due to a bug 6 6 sanitizersWorking = !stdenv.hostPlatform.isMusl && ( 7 - (stdenv.cc.isClang && versionAtLeast (getVersion stdenv.cc.name) "5.0.0") 7 + (stdenv.cc.isClang && lib.versionAtLeast (lib.getVersion stdenv.cc.name) "5.0.0") 8 8 || (stdenv.cc.isGNU && stdenv.isLinux) 9 9 ); 10 - staticLibc = optionalString (stdenv.hostPlatform.libc == "glibc") "-L ${glibc.static}/lib"; 10 + staticLibc = lib.optionalString (stdenv.hostPlatform.libc == "glibc") "-L ${glibc.static}/lib"; 11 11 in stdenv.mkDerivation { 12 12 name = "cc-wrapper-test"; 13 13 ··· 23 23 $CXX -o cxx-check ${./cxx-main.cc} 24 24 ./cxx-check 25 25 26 - ${optionalString (stdenv.isDarwin && stdenv.cc.isClang) '' 26 + ${lib.optionalString (stdenv.isDarwin && stdenv.cc.isClang) '' 27 27 printf "checking whether compiler can build with CoreFoundation.framework... " >&2 28 28 mkdir -p foo/lib 29 29 $CC -framework CoreFoundation -o core-foundation-check ${./core-foundation-main.c} ··· 31 31 ''} 32 32 33 33 34 - ${optionalString (!stdenv.isDarwin) '' 34 + ${lib.optionalString (!stdenv.isDarwin) '' 35 35 printf "checking whether compiler builds valid static C binaries... " >&2 36 36 $CC ${staticLibc} -static -o cc-static ${./cc-main.c} 37 37 ./cc-static 38 38 # our glibc does not have pie enabled yet. 39 - ${optionalString (stdenv.hostPlatform.isMusl && stdenv.cc.isGNU) '' 39 + ${lib.optionalString (stdenv.hostPlatform.isMusl && stdenv.cc.isGNU) '' 40 40 printf "checking whether compiler builds valid static pie C binaries... " >&2 41 41 $CC ${staticLibc} -static-pie -o cc-static-pie ${./cc-main.c} 42 42 ./cc-static-pie ··· 52 52 printf "checking whether compiler uses NIX_LDFLAGS... " >&2 53 53 mkdir -p foo/lib 54 54 $CC -shared \ 55 - ${optionalString stdenv.isDarwin "-Wl,-install_name,@rpath/libfoo.dylib"} \ 55 + ${lib.optionalString stdenv.isDarwin "-Wl,-install_name,@rpath/libfoo.dylib"} \ 56 56 -DVALUE=42 \ 57 57 -o foo/lib/libfoo${stdenv.hostPlatform.extensions.sharedLibrary} \ 58 58 ${./foo.c} ··· 68 68 $CXX -I std-include -nostdinc++ -o nostdinc-main++ ${./nostdinc-main.c} 69 69 ./nostdinc-main++ 70 70 71 - ${optionalString sanitizersWorking '' 71 + ${lib.optionalString sanitizersWorking '' 72 72 printf "checking whether sanitizers are fully functional... ">&2 73 73 $CC -o sanitizers -fsanitize=address,undefined ${./sanitizers.c} 74 74 ./sanitizers ··· 77 77 touch $out 78 78 ''; 79 79 80 - meta.platforms = platforms.all; 80 + meta.platforms = lib.platforms.all; 81 81 }
+2 -2
pkgs/test/cc-wrapper/multilib.nix
··· 1 - { stdenv }: 1 + { lib, stdenv }: 2 2 3 3 stdenv.mkDerivation { 4 4 name = "cc-multilib-test"; ··· 33 33 touch $out 34 34 ''; 35 35 36 - meta.platforms = stdenv.lib.platforms.x86_64; 36 + meta.platforms = lib.platforms.x86_64; 37 37 }
+2 -2
pkgs/test/install-shell-files/default.nix
··· 1 - { stdenv, runCommandLocal, recurseIntoAttrs, installShellFiles }: 1 + { lib, stdenv, runCommandLocal, recurseIntoAttrs, installShellFiles }: 2 2 3 3 let 4 4 runTest = name: env: buildCommand: 5 5 runCommandLocal "install-shell-files--${name}" ({ 6 6 nativeBuildInputs = [ installShellFiles ]; 7 - meta.platforms = stdenv.lib.platforms.all; 7 + meta.platforms = lib.platforms.all; 8 8 } // env) buildCommand; 9 9 in 10 10
+2 -2
pkgs/test/ld-library-path/default.nix
··· 1 - { stdenv }: 1 + { lib, stdenv }: 2 2 3 3 # This tests that libraries listed in LD_LIBRARY_PATH take precedence over those listed in RPATH. 4 4 ··· 84 84 touch $out 85 85 ''; 86 86 87 - meta.platforms = stdenv.lib.platforms.linux; 87 + meta.platforms = lib.platforms.linux; 88 88 }
+2 -2
pkgs/test/patch-shebangs/default.nix
··· 1 - { stdenv, runCommand }: 1 + { lib, stdenv, runCommand }: 2 2 3 3 let 4 4 bad-shebang = stdenv.mkDerivation { ··· 13 13 }; 14 14 in runCommand "patch-shebangs-test" { 15 15 passthru = { inherit bad-shebang; }; 16 - meta.platforms = stdenv.lib.platforms.all; 16 + meta.platforms = lib.platforms.all; 17 17 } '' 18 18 printf "checking whether patchShebangs works properly... ">&2 19 19 if ! grep -q '^#!/bin/sh' ${bad-shebang}/bin/test; then
+4 -4
pkgs/test/stdenv-inputs/default.nix
··· 1 - { stdenv }: 1 + { lib, stdenv }: 2 2 3 3 let 4 4 foo = stdenv.mkDerivation { ··· 12 12 chmod +x $out/bin/foo 13 13 cp ${./foo.c} $out/include/foo.h 14 14 $CC -shared \ 15 - ${stdenv.lib.optionalString stdenv.isDarwin "-Wl,-install_name,$out/lib/libfoo.dylib"} \ 15 + ${lib.optionalString stdenv.isDarwin "-Wl,-install_name,$out/lib/libfoo.dylib"} \ 16 16 -o $out/lib/libfoo${stdenv.hostPlatform.extensions.sharedLibrary} \ 17 17 ${./foo.c} 18 18 ''; ··· 30 30 chmod +x $out/bin/bar 31 31 cp ${./bar.c} $dev/include/bar.h 32 32 $CC -shared \ 33 - ${stdenv.lib.optionalString stdenv.isDarwin "-Wl,-install_name,$dev/lib/libbar.dylib"} \ 33 + ${lib.optionalString stdenv.isDarwin "-Wl,-install_name,$dev/lib/libbar.dylib"} \ 34 34 -o $dev/lib/libbar${stdenv.hostPlatform.extensions.sharedLibrary} \ 35 35 ${./bar.c} 36 36 ''; ··· 64 64 touch $out 65 65 ''; 66 66 67 - meta.platforms = stdenv.lib.platforms.all; 67 + meta.platforms = lib.platforms.all; 68 68 }
+2 -2
pkgs/tools/graphics/metapixel/default.nix
··· 1 - { stdenv, fetchFromGitHub, libpng, libjpeg, giflib, perl, pkg-config }: 1 + { lib, stdenv, fetchFromGitHub, libpng, libjpeg, giflib, perl, pkg-config }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "metapixel"; ··· 24 24 cp metapixel-sizesort $out/bin/metapixel-sizesort 25 25 ''; 26 26 27 - meta = with stdenv.lib; { 27 + meta = with lib; { 28 28 homepage = "https://github.com/schani/metapixel"; 29 29 description = "Tool for generating photomosaics"; 30 30 license = licenses.gpl2Only;
+117
pkgs/tools/inputmethods/fcitx5/fcitx5-mozc.nix
··· 1 + { lib, clangStdenv, fetchFromGitHub, fetchurl, fetchpatch, fetchgit 2 + , python3Packages, mesa, ninja, pkg-config, protobuf, zinnia, qt5, fcitx5 3 + , jsoncpp, gtest, which, gtk2, unzip, abseil-cpp, breakpad }: 4 + let 5 + inherit (python3Packages) python gyp six; 6 + japanese_usage_dictionary = fetchFromGitHub { 7 + owner = "hiroyuki-komatsu"; 8 + repo = "japanese-usage-dictionary"; 9 + rev = "e5b3425575734c323e1d947009dd74709437b684"; 10 + sha256 = "0pyrpz9c8nxccwpgyr36w314mi8h132cis8ijvlqmmhqxwsi30hm"; 11 + }; 12 + # abseil-cpp in nixpkgs is too old 13 + abseil-cpp_2020923 = abseil-cpp.overrideAttrs (old: rec { 14 + version = "20200923.2"; 15 + src = fetchFromGitHub { 16 + owner = "abseil"; 17 + repo = "abseil-cpp"; 18 + rev = version; 19 + sha256 = "G+wkaC4IPtyc/xCUyVFJOcHppPFU7KkhIHjv6uhVKGU="; 20 + }; 21 + cmakeFlags = [ "-DCMAKE_CXX_STANDARD=17" "-DBUILD_SHARED_LIBS=ON" ]; 22 + }); 23 + zipcode_rel = "202011"; 24 + jigyosyo = fetchurl { 25 + url = "https://osdn.net/projects/ponsfoot-aur/storage/mozc/jigyosyo-${zipcode_rel}.zip"; 26 + sha256 = "j7MkNtd4+QTi91EreVig4/OV0o5y1+KIjEJBEmLK/mY="; 27 + }; 28 + x-ken-all = fetchurl { 29 + url = 30 + "https://osdn.net/projects/ponsfoot-aur/storage/mozc/x-ken-all-${zipcode_rel}.zip"; 31 + sha256 = "ExS0Cg3rs0I9IOVbZHLt8UEfk8/LmY9oAHPVVlYuTPw="; 32 + }; 33 + 34 + in clangStdenv.mkDerivation rec { 35 + pname = "fcitx5-mozc"; 36 + version = "2.26.4220.102"; 37 + 38 + src = fetchFromGitHub { 39 + owner = "fcitx"; 40 + repo = "mozc"; 41 + rev = "1882e33b61673b66d63277f82b4c80ae4e506c10"; 42 + sha256 = "R+w0slVFpqtt7PIr1pyupJjRoQsABVZiMdZ9fKGKAqw="; 43 + }; 44 + 45 + nativeBuildInputs = [ gyp ninja mesa python pkg-config qt5.wrapQtAppsHook six which unzip ]; 46 + 47 + buildInputs = [ protobuf zinnia qt5.qtbase fcitx5 abseil-cpp_2020923 jsoncpp gtest gtk2 ]; 48 + 49 + patches = [ 50 + # Support linking system abseil-cpp 51 + (fetchpatch { 52 + url = "https://salsa.debian.org/debian/mozc/-/raw/debian/sid/debian/patches/0007-Update-src-base-absl.gyp.patch"; 53 + sha256 = "UiS0UScDKyAusXOhc7Bg8dF8ARQQiVTylEhAOxqaZt8="; 54 + }) 55 + 56 + ]; 57 + 58 + postUnpack = '' 59 + unzip ${x-ken-all} -d $sourceRoot/src/ 60 + unzip ${jigyosyo} -d $sourceRoot/src/ 61 + 62 + rmdir $sourceRoot/src/third_party/breakpad/ 63 + ln -s ${breakpad} $sourceRoot/src/third_party/breakpad 64 + rmdir $sourceRoot/src/third_party/gtest/ 65 + ln -s ${gtest} $sourceRoot/src/third_party/gtest 66 + rmdir $sourceRoot/src/third_party/gyp/ 67 + ln -s ${gyp} $sourceRoot/src/third_party/gyp 68 + rmdir $sourceRoot/src/third_party/japanese_usage_dictionary/ 69 + ln -s ${japanese_usage_dictionary} $sourceRoot/src/third_party/japanese_usage_dictionary 70 + ''; 71 + 72 + # Copied from https://github.com/archlinux/svntogit-community/blob/packages/fcitx5-mozc/trunk/PKGBUILD 73 + configurePhase = '' 74 + cd src 75 + export GYP_DEFINES="document_dir=$out/share/doc/mozc use_libzinnia=1 use_libprotobuf=1 use_libabseil=1" 76 + 77 + # disable fcitx4 78 + rm unix/fcitx/fcitx.gyp 79 + 80 + # gen zip code seed 81 + PYTHONPATH="$PWD:$PYTHONPATH" python dictionary/gen_zip_code_seed.py --zip_code="x-ken-all.csv" --jigyosyo="JIGYOSYO.CSV" >> data/dictionary_oss/dictionary09.txt 82 + 83 + # use libstdc++ instead of libc++ 84 + sed "/stdlib=libc++/d;/-lc++/d" -i gyp/common.gypi 85 + 86 + # run gyp 87 + python build_mozc.py gyp --gypdir=${gyp}/bin --server_dir=$out/lib/mozc 88 + ''; 89 + 90 + buildPhase = '' 91 + python build_mozc.py build -c Release \ 92 + server/server.gyp:mozc_server \ 93 + gui/gui.gyp:mozc_tool \ 94 + unix/fcitx5/fcitx5.gyp:fcitx5-mozc 95 + ''; 96 + 97 + installPhase = '' 98 + export PREFIX=$out 99 + export _bldtype=Release 100 + ../scripts/install_server 101 + install -d $out/share/licenses/fcitx5-mozc 102 + head -n 29 server/mozc_server.cc > $out/share/licenses/fcitx5-mozc/LICENSE 103 + install -m644 data/installer/*.html $out/share/licenses/fcitx5-mozc/ 104 + install -d $out/share/fcitx5/addon 105 + install -d $out/share/fcitx5/inputmethod 106 + install -d $out/lib/fcitx5 107 + ../scripts/install_fcitx5 108 + ''; 109 + 110 + meta = with lib; { 111 + description = "Fcitx5 Module of A Japanese Input Method for Chromium OS, Windows, Mac and Linux (the Open Source Edition of Google Japanese Input)"; 112 + homepage = "https://github.com/fcitx/mozc"; 113 + license = licenses.bsd3; 114 + maintainers = with maintainers; [ berberman ]; 115 + platforms = platforms.linux; 116 + }; 117 + }
+2 -2
pkgs/tools/networking/lxi-tools/default.nix
··· 1 - { stdenv, fetchFromGitHub 1 + { lib, stdenv, fetchFromGitHub 2 2 , autoreconfHook, pkg-config 3 3 , liblxi, readline, lua 4 4 }: ··· 18 18 19 19 buildInputs = [ liblxi readline lua ]; 20 20 21 - meta = with stdenv.lib; { 21 + meta = with lib; { 22 22 description = "Tool for communicating with LXI compatible instruments"; 23 23 longDescription = '' 24 24 lxi-tools is a collection of open source software tools
+2 -2
pkgs/tools/package-management/nix/default.nix
··· 45 45 [ autoreconfHook 46 46 autoconf-archive 47 47 bison flex 48 - lowdown mdbook 48 + (lib.getBin lowdown) mdbook 49 49 jq 50 50 ]; 51 51 ··· 55 55 ] 56 56 ++ lib.optionals stdenv.isDarwin [ Security ] 57 57 ++ lib.optional (stdenv.isLinux || stdenv.isDarwin) libsodium 58 - ++ lib.optionals is24 [ libarchive gmock ] 58 + ++ lib.optionals is24 [ libarchive gmock lowdown ] 59 59 ++ lib.optional withLibseccomp libseccomp 60 60 ++ lib.optional withAWS 61 61 ((aws-sdk-cpp.override {
+1 -1
pkgs/tools/text/source-highlight/default.nix
··· 15 15 # source-highlight uses it's own binary to generate documentation. 16 16 # During cross-compilation, that binary was built for the target 17 17 # platform architecture, so it can't run on the build host. 18 - patchPhase = stdenv.lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) '' 18 + patchPhase = lib.optionalString (stdenv.hostPlatform != stdenv.buildPlatform) '' 19 19 substituteInPlace Makefile.in --replace "src doc tests" "src tests" 20 20 ''; 21 21
+5 -2
pkgs/tools/typesetting/lowdown/default.nix
··· 4 4 pname = "lowdown"; 5 5 version = "0.7.9"; 6 6 7 - outputs = [ "out" "dev" ]; 7 + outputs = [ "out" "lib" "dev" "man" ]; 8 8 9 9 src = fetchurl { 10 10 url = "https://kristaps.bsd.lv/lowdown/snapshots/lowdown-${version}.tar.gz"; ··· 16 16 configurePhase = '' 17 17 ./configure PREFIX=''${!outputDev} \ 18 18 BINDIR=''${!outputBin}/bin \ 19 - MANDIR=''${!outputBin}/share/man 19 + LIBDIR=''${!outputLib}/lib \ 20 + MANDIR=''${!outputMan}/share/man 20 21 ''; 22 + 23 + patches = lib.optional (!stdenv.hostPlatform.isStatic) ./shared.patch; 21 24 22 25 meta = with lib; { 23 26 homepage = "https://kristaps.bsd.lv/lowdown/";
+41
pkgs/tools/typesetting/lowdown/shared.patch
··· 1 + diff --git a/Makefile b/Makefile 2 + index 955f737..2c9532c 100644 3 + --- a/Makefile 4 + +++ b/Makefile 5 + @@ -80,7 +80,7 @@ REGRESS_ARGS += "--parse-no-autolink" 6 + REGRESS_ARGS += "--parse-no-cmark" 7 + REGRESS_ARGS += "--parse-no-deflists" 8 + 9 + -all: lowdown lowdown-diff lowdown.pc 10 + +all: lowdown lowdown-diff liblowdown.so lowdown.pc 11 + 12 + www: $(HTMLS) $(PDFS) $(THUMBS) lowdown.tar.gz lowdown.tar.gz.sha512 13 + 14 + @@ -101,6 +101,9 @@ lowdown-diff: lowdown 15 + liblowdown.a: $(OBJS) $(COMPAT_OBJS) 16 + $(AR) rs $@ $(OBJS) $(COMPAT_OBJS) 17 + 18 + +liblowdown.so: $(OBJS) $(COMPAT_OBJS) 19 + + $(CC) -shared -o $@ $(OBJS) $(COMPAT_OBJS) $(LDFLAGS) 20 + + 21 + install: all 22 + mkdir -p $(DESTDIR)$(BINDIR) 23 + mkdir -p $(DESTDIR)$(LIBDIR)/pkgconfig 24 + @@ -111,7 +114,7 @@ install: all 25 + $(INSTALL_DATA) lowdown.pc $(DESTDIR)$(LIBDIR)/pkgconfig 26 + $(INSTALL_PROGRAM) lowdown $(DESTDIR)$(BINDIR) 27 + $(INSTALL_PROGRAM) lowdown-diff $(DESTDIR)$(BINDIR) 28 + - $(INSTALL_LIB) liblowdown.a $(DESTDIR)$(LIBDIR) 29 + + $(INSTALL_LIB) liblowdown.so $(DESTDIR)$(LIBDIR) 30 + $(INSTALL_DATA) lowdown.h $(DESTDIR)$(INCLUDEDIR) 31 + for f in $(MANS) ; do \ 32 + name=`basename $$f .html` ; \ 33 + @@ -199,7 +202,7 @@ main.o: lowdown.h 34 + 35 + clean: 36 + rm -f $(OBJS) $(COMPAT_OBJS) main.o 37 + - rm -f lowdown lowdown-diff liblowdown.a lowdown.pc 38 + + rm -f lowdown lowdown-diff liblowdown.so lowdown.pc 39 + rm -f index.xml diff.xml diff.diff.xml README.xml lowdown.tar.gz.sha512 lowdown.tar.gz 40 + rm -f $(PDFS) $(HTMLS) $(THUMBS) 41 +
+9
pkgs/top-level/all-packages.nix
··· 156 156 157 157 bacnet-stack = callPackage ../tools/networking/bacnet-stack {}; 158 158 159 + breakpad = callPackage ../development/misc/breakpad { }; 160 + 159 161 # Zip file format only allows times after year 1980, which makes e.g. Python wheel building fail with: 160 162 # ValueError: ZIP does not support timestamps before 1980 161 163 ensureNewerSourcesForZipFilesHook = ensureNewerSourcesHook { year = "1980"; }; ··· 4016 4018 4017 4019 fcitx5-chinese-addons = libsForQt5.callPackage ../tools/inputmethods/fcitx5/fcitx5-chinese-addons.nix { }; 4018 4020 4021 + fcitx5-mozc = libsForQt5.callPackage ../tools/inputmethods/fcitx5/fcitx5-mozc.nix { }; 4022 + 4019 4023 fcitx5-configtool = libsForQt5.callPackage ../tools/inputmethods/fcitx5/fcitx5-configtool.nix { }; 4020 4024 4021 4025 fcitx5-lua = callPackage ../tools/inputmethods/fcitx5/fcitx5-lua.nix { }; ··· 7681 7685 sha1collisiondetection = callPackage ../tools/security/sha1collisiondetection { }; 7682 7686 7683 7687 shadowsocks-libev = callPackage ../tools/networking/shadowsocks-libev { }; 7688 + 7689 + shadered = callPackage ../development/tools/shadered { }; 7684 7690 7685 7691 go-shadowsocks2 = callPackage ../tools/networking/go-shadowsocks2 { }; 7686 7692 ··· 22487 22493 22488 22494 hdl-dump = callPackage ../tools/misc/hdl-dump { }; 22489 22495 22496 + hpack = haskell.lib.justStaticExecutables haskellPackages.hpack; 22497 + 22490 22498 hpcg = callPackage ../tools/misc/hpcg/default.nix { }; 22491 22499 22492 22500 hpl = callPackage ../tools/misc/hpl { }; ··· 27163 27171 dash-to-panel = callPackage ../desktops/gnome-3/extensions/dash-to-panel { }; 27164 27172 draw-on-your-screen = callPackage ../desktops/gnome-3/extensions/draw-on-your-screen { }; 27165 27173 drop-down-terminal = callPackage ../desktops/gnome-3/extensions/drop-down-terminal { }; 27174 + dynamic-panel-transparency = callPackage ../desktops/gnome-3/extensions/dynamic-panel-transparency { }; 27166 27175 easyScreenCast = callPackage ../desktops/gnome-3/extensions/EasyScreenCast { }; 27167 27176 emoji-selector = callPackage ../desktops/gnome-3/extensions/emoji-selector { }; 27168 27177 freon = callPackage ../desktops/gnome-3/extensions/freon { };
+2
pkgs/top-level/python-packages.nix
··· 5124 5124 5125 5125 pyaftership = callPackage ../development/python-modules/pyaftership { }; 5126 5126 5127 + pyahocorasick = callPackage ../development/python-modules/pyahocorasick { }; 5128 + 5127 5129 pyairvisual = callPackage ../development/python-modules/pyairvisual { }; 5128 5130 5129 5131 pyalgotrade = callPackage ../development/python-modules/pyalgotrade { };