Merge branch 'master' into staging

+1972 -1686
+2 -2
README.md
··· 1 1 [<img src="http://nixos.org/logo/nixos-hires.png" width="500px" alt="logo" />](https://nixos.org/nixos) 2 2 3 3 [![Build Status](https://travis-ci.org/NixOS/nixpkgs.svg?branch=master)](https://travis-ci.org/NixOS/nixpkgs) 4 - [![Issue Stats](http://www.issuestats.com/github/nixos/nixpkgs/badge/pr)](http://www.issuestats.com/github/nixos/nixpkgs) 5 - [![Issue Stats](http://www.issuestats.com/github/nixos/nixpkgs/badge/issue)](http://www.issuestats.com/github/nixos/nixpkgs) 4 + [![Issue Stats](http://www.issuestats.com/github/nixos/nixpkgs/badge/pr?style=flat)](http://www.issuestats.com/github/nixos/nixpkgs) 5 + [![Issue Stats](http://www.issuestats.com/github/nixos/nixpkgs/badge/issue?style=flat)](http://www.issuestats.com/github/nixos/nixpkgs) 6 6 7 7 Nixpkgs is a collection of packages for the [Nix](https://nixos.org/nix/) package 8 8 manager. It is periodically built and tested by the [hydra](http://hydra.nixos.org/)
+2 -1
lib/maintainers.nix
··· 231 231 palo = "Ingolf Wanger <palipalo9@googlemail.com>"; 232 232 pashev = "Igor Pashev <pashev.igor@gmail.com>"; 233 233 pesterhazy = "Paulus Esterhazy <pesterhazy@gmail.com>"; 234 - phausmann = "Philipp Hausmann <nix@314.ch>"; 234 + phile314 = "Philipp Hausmann <nix@314.ch>"; 235 235 philandstuff = "Philip Potter <philip.g.potter@gmail.com>"; 236 236 phreedom = "Evgeny Egorochkin <phreedom@yandex.ru>"; 237 237 phunehehe = "Hoang Xuan Phu <phunehehe@gmail.com>"; ··· 294 294 steveej = "Stefan Junker <mail@stefanjunker.de>"; 295 295 szczyp = "Szczyp <qb@szczyp.com>"; 296 296 sztupi = "Attila Sztupak <attila.sztupak@gmail.com>"; 297 + taeer = "Taeer Bar-Yam <taeer@necsi.edu>"; 297 298 tailhook = "Paul Colomiets <paul@colomiets.name>"; 298 299 taktoa = "Remy Goldschmidt <taktoa@gmail.com>"; 299 300 telotortium = "Robert Irelan <rirelan@gmail.com>";
+52
nixos/doc/manual/man-nixos-rebuild.xml
··· 281 281 </listitem> 282 282 </varlistentry> 283 283 284 + <varlistentry> 285 + <term><option>--build-host</option></term> 286 + <listitem> 287 + <para>Instead of building the new configuration locally, use the 288 + specified host to perform the build. The host needs to be accessible 289 + with ssh, and must be able to perform Nix builds. If the option 290 + <option>--target-host</option> is not set, the build will be copied back 291 + to the local machine when done.</para> 292 + 293 + <para>Note that, if <option>--no-build-nix</option> is not specified, 294 + Nix will be built both locally and remotely. This is because the 295 + configuration will always be evaluated locally even though the building 296 + might be performed remotely.</para> 297 + 298 + <para>You can include a remote user name in 299 + the host name (<replaceable>user@host</replaceable>). You can also set 300 + ssh options by defining the <envar>NIX_SSHOPTS</envar> environment 301 + variable.</para> 302 + </listitem> 303 + </varlistentry> 304 + 305 + <varlistentry> 306 + <term><option>--target-host</option></term> 307 + <listitem> 308 + <para>Specifies the NixOS target host. By setting this to something other 309 + than <replaceable>localhost</replaceable>, the system activation will 310 + happen on the remote host instead of the local machine. The remote host 311 + needs to be accessible over ssh, and for the commands 312 + <option>switch</option>, <option>boot</option> and <option>test</option> 313 + you need root access.</para> 314 + 315 + <para>If <option>--build-host</option> is not explicitly 316 + specified, <option>--build-host</option> will implicitly be set to the 317 + same value as <option>--target-host</option>. So, if you only specify 318 + <option>--target-host</option> both building and activation will take 319 + place remotely (and no build artifacts will be copied to the local 320 + machine).</para> 321 + 322 + <para>You can include a remote user name in 323 + the host name (<replaceable>user@host</replaceable>). You can also set 324 + ssh options by defining the <envar>NIX_SSHOPTS</envar> environment 325 + variable.</para> 326 + </listitem> 327 + </varlistentry> 328 + 284 329 </variablelist> 285 330 286 331 <para>In addition, <command>nixos-rebuild</command> accepts various ··· 303 348 <para>Path to the main NixOS configuration module. Defaults to 304 349 <filename>/etc/nixos/configuration.nix</filename>.</para> 305 350 </listitem> 351 + </varlistentry> 352 + 353 + <varlistentry><term><envar>NIX_SSHOPTS</envar></term> 354 + 355 + <listitem><para>Additional options to be passed to 356 + <command>ssh</command> on the command line.</para></listitem> 357 + 306 358 </varlistentry> 307 359 308 360 </variablelist>
+1 -1
nixos/modules/config/users-groups.nix
··· 26 26 ''; 27 27 28 28 hashedPasswordDescription = '' 29 - To generate hashed password install <literal>mkpassword</literal> 29 + To generate hashed password install <literal>mkpasswd</literal> 30 30 package and run <literal>mkpasswd -m sha-512</literal>. 31 31 ''; 32 32
+1 -1
nixos/modules/installer/cd-dvd/system-tarball-fuloong2f.nix
··· 74 74 75 75 # Tools to create / manipulate filesystems. 76 76 pkgs.ntfsprogs # for resizing NTFS partitions 77 - pkgs.btrfsProgs 77 + pkgs.btrfs-progs 78 78 pkgs.jfsutils 79 79 80 80 # Some compression/archiver tools.
+1 -1
nixos/modules/installer/cd-dvd/system-tarball-sheevaplug.nix
··· 67 67 pkgs.dmraid 68 68 69 69 # Tools to create / manipulate filesystems. 70 - pkgs.btrfsProgs 70 + pkgs.btrfs-progs 71 71 72 72 # Some compression/archiver tools. 73 73 pkgs.unzip
+160 -27
nixos/modules/installer/tools/nixos-rebuild.sh
··· 19 19 upgrade= 20 20 repair= 21 21 profile=/nix/var/nix/profiles/system 22 + buildHost= 23 + targetHost= 22 24 23 25 while [ "$#" -gt 0 ]; do 24 26 i="$1"; shift 1 ··· 73 75 fi 74 76 shift 1 75 77 ;; 78 + --build-host|h) 79 + buildHost="$1" 80 + shift 1 81 + ;; 82 + --target-host|t) 83 + targetHost="$1" 84 + shift 1 85 + ;; 76 86 *) 77 87 echo "$0: unknown option \`$i'" 78 88 exit 1 79 89 ;; 80 90 esac 81 91 done 92 + 93 + 94 + if [ -z "$buildHost" -a -n "$targetHost" ]; then 95 + buildHost="$targetHost" 96 + fi 97 + if [ "$targetHost" = localhost ]; then 98 + targetHost= 99 + fi 100 + if [ "$buildHost" = localhost ]; then 101 + buildHost= 102 + fi 103 + 104 + buildHostCmd() { 105 + if [ -z "$buildHost" ]; then 106 + "$@" 107 + elif [ -n "$remoteNix" ]; then 108 + ssh $SSHOPTS "$buildHost" PATH="$remoteNix:$PATH" "$@" 109 + else 110 + ssh $SSHOPTS "$buildHost" "$@" 111 + fi 112 + } 113 + 114 + targetHostCmd() { 115 + if [ -z "$targetHost" ]; then 116 + "$@" 117 + else 118 + ssh $SSHOPTS "$targetHost" "$@" 119 + fi 120 + } 121 + 122 + copyToTarget() { 123 + if ! [ "$targetHost" = "$buildHost" ]; then 124 + if [ -z "$targetHost" ]; then 125 + NIX_SSHOPTS=$SSH_OPTS nix-copy-closure --from "$buildHost" "$1" 126 + elif [ -z "$buildHost" ]; then 127 + NIX_SSHOPTS=$SSH_OPTS nix-copy-closure --to "$targetHost" "$1" 128 + else 129 + buildHostCmd nix-copy-closure --to "$targetHost" "$1" 130 + fi 131 + fi 132 + } 133 + 134 + nixBuild() { 135 + if [ -z "$buildHost" ]; then 136 + nix-build "$@" 137 + else 138 + local instArgs=() 139 + local buildArgs=() 140 + 141 + while [ "$#" -gt 0 ]; do 142 + local i="$1"; shift 1 143 + case "$i" in 144 + -o) 145 + local out="$1"; shift 1 146 + buildArgs+=("--add-root" "$out" "--indirect") 147 + ;; 148 + -A) 149 + local j="$1"; shift 1 150 + instArgs+=("$i" "$j") 151 + ;; 152 + -I) 153 + # We don't want this in buildArgs 154 + shift 1 155 + ;; 156 + "<"*) # nix paths 157 + instArgs+=("$i") 158 + ;; 159 + *) 160 + buildArgs+=("$i") 161 + ;; 162 + esac 163 + done 164 + 165 + local drv="$(nix-instantiate "${instArgs[@]}" "${extraBuildFlags[@]}")" 166 + if [ -a "$drv" ]; then 167 + NIX_SSHOPTS=$SSH_OPTS nix-copy-closure --to "$buildHost" "$drv" 168 + buildHostCmd nix-store -r "$drv" "${buildArgs[@]}" 169 + else 170 + echo "nix-instantiate failed" 171 + exit 1 172 + fi 173 + fi 174 + } 175 + 82 176 83 177 if [ -z "$action" ]; then showSyntax; fi 84 178 ··· 128 222 129 223 130 224 tmpDir=$(mktemp -t -d nixos-rebuild.XXXXXX) 131 - trap 'rm -rf "$tmpDir"' EXIT 225 + SSHOPTS="$NIX_SSHOPTS -o ControlMaster=auto -o ControlPath=$tmpDir/ssh-%n -o ControlPersist=60" 226 + 227 + cleanup() { 228 + for ctrl in "$tmpDir"/ssh-*; do 229 + ssh -o ControlPath="$ctrl" -O exit dummyhost 2>/dev/null || true 230 + done 231 + rm -rf "$tmpDir" 232 + } 233 + trap cleanup EXIT 234 + 132 235 133 236 134 237 # If the Nix daemon is running, then use it. This allows us to use ··· 150 253 buildNix= 151 254 fi 152 255 256 + prebuiltNix() { 257 + machine="$1" 258 + if [ "$machine" = x86_64 ]; then 259 + return /nix/store/xryr9g56h8yjddp89d6dw12anyb4ch7c-nix-1.10 260 + elif [[ "$machine" =~ i.86 ]]; then 261 + return /nix/store/2w92k5wlpspf0q2k9mnf2z42prx3bwmv-nix-1.10 262 + else 263 + echo "$0: unsupported platform" 264 + exit 1 265 + fi 266 + } 267 + 268 + remotePATH= 269 + 153 270 if [ -n "$buildNix" ]; then 154 271 echo "building Nix..." >&2 155 - if ! nix-build '<nixpkgs/nixos>' -A config.nix.package -o $tmpDir/nix "${extraBuildFlags[@]}" > /dev/null; then 156 - if ! nix-build '<nixpkgs/nixos>' -A nixFallback -o $tmpDir/nix "${extraBuildFlags[@]}" > /dev/null; then 157 - if ! nix-build '<nixpkgs>' -A nix -o $tmpDir/nix "${extraBuildFlags[@]}" > /dev/null; then 158 - machine="$(uname -m)" 159 - if [ "$machine" = x86_64 ]; then 160 - nixStorePath=/nix/store/xryr9g56h8yjddp89d6dw12anyb4ch7c-nix-1.10 161 - elif [[ "$machine" =~ i.86 ]]; then 162 - nixStorePath=/nix/store/2w92k5wlpspf0q2k9mnf2z42prx3bwmv-nix-1.10 163 - else 164 - echo "$0: unsupported platform" 165 - exit 1 166 - fi 272 + nixDrv= 273 + if ! nixDrv="$(nix-instantiate '<nixpkgs/nixos>' --add-root $tmpDir/nixdrv --indirect -A config.nix.package "${extraBuildFlags[@]}")"; then 274 + if ! nixDrv="$(nix-instantiate '<nixpkgs/nixos>' --add-root $tmpDir/nixdrv --indirect -A nixFallback "${extraBuildFlags[@]}")"; then 275 + if ! nixDrv="$(nix-instantiate '<nixpkgs>' --add-root $tmpDir/nixdrv --indirect -A nix "${extraBuildFlags[@]}")"; then 276 + nixStorePath="$(prebuiltNix "$(uname -m)")" 167 277 if ! nix-store -r $nixStorePath --add-root $tmpDir/nix --indirect \ 168 278 --option extra-binary-caches https://cache.nixos.org/; then 169 279 echo "warning: don't know how to get latest Nix" >&2 170 280 fi 171 281 # Older version of nix-store -r don't support --add-root. 172 282 [ -e $tmpDir/nix ] || ln -sf $nixStorePath $tmpDir/nix 283 + if [ -n "$buildHost" ]; then 284 + remoteNixStorePath="$(prebuiltNix "$(buildHostCmd uname -m)")" 285 + remoteNix="$remoteNixStorePath/bin" 286 + if ! buildHostCmd nix-store -r $remoteNixStorePath \ 287 + --option extra-binary-caches https://cache.nixos.org/ >/dev/null; then 288 + remoteNix= 289 + echo "warning: don't know how to get latest Nix" >&2 290 + fi 291 + fi 173 292 fi 174 293 fi 175 294 fi 176 - PATH=$tmpDir/nix/bin:$PATH 295 + if [ -a "$nixDrv" ]; then 296 + nix-store -r "$nixDrv" --add-root $tmpDir/nix --indirect >/dev/null 297 + if [ -n "$buildHost" ]; then 298 + nix-copy-closure --to "$buildHost" "$nixDrv" 299 + # The nix build produces multiple outputs, we add them all to the remote path 300 + for p in $(buildHostCmd nix-store -r "$(readlink "$nixDrv")" "${buildArgs[@]}"); do 301 + remoteNix="$remoteNix${remoteNix:+:}$p/bin" 302 + done 303 + fi 304 + fi 305 + PATH="$tmpDir/nix/bin:$PATH" 177 306 fi 178 307 179 308 ··· 200 329 if [ -z "$rollback" ]; then 201 330 echo "building the system configuration..." >&2 202 331 if [ "$action" = switch -o "$action" = boot ]; then 203 - nix-env "${extraBuildFlags[@]}" -p "$profile" -f '<nixpkgs/nixos>' --set -A system 204 - pathToConfig="$profile" 332 + pathToConfig="$(nixBuild '<nixpkgs/nixos>' -A system "${extraBuildFlags[@]}")" 333 + copyToTarget "$pathToConfig" 334 + targetHostCmd nix-env -p "$profile" --set "$pathToConfig" 205 335 elif [ "$action" = test -o "$action" = build -o "$action" = dry-build -o "$action" = dry-activate ]; then 206 - nix-build '<nixpkgs/nixos>' -A system -k "${extraBuildFlags[@]}" > /dev/null 207 - pathToConfig=./result 336 + pathToConfig="$(nixBuild '<nixpkgs/nixos>' -A system -k "${extraBuildFlags[@]}")" 208 337 elif [ "$action" = build-vm ]; then 209 - nix-build '<nixpkgs/nixos>' -A vm -k "${extraBuildFlags[@]}" > /dev/null 210 - pathToConfig=./result 338 + pathToConfig="$(nixBuild '<nixpkgs/nixos>' -A vm -k "${extraBuildFlags[@]}")" 211 339 elif [ "$action" = build-vm-with-bootloader ]; then 212 - nix-build '<nixpkgs/nixos>' -A vmWithBootLoader -k "${extraBuildFlags[@]}" > /dev/null 213 - pathToConfig=./result 340 + pathToConfig="$(nixBuild '<nixpkgs/nixos>' -A vmWithBootLoader -k "${extraBuildFlags[@]}")" 214 341 else 215 342 showSyntax 216 343 fi 344 + # Copy build to target host if we haven't already done it 345 + if ! [ "$action" = switch -o "$action" = boot ]; then 346 + copyToTarget "$pathToConfig" 347 + fi 217 348 else # [ -n "$rollback" ] 218 349 if [ "$action" = switch -o "$action" = boot ]; then 219 - nix-env --rollback -p "$profile" 350 + targetHostCmd nix-env --rollback -p "$profile" 220 351 pathToConfig="$profile" 221 352 elif [ "$action" = test -o "$action" = build ]; then 222 353 systemNumber=$( 223 - nix-env -p "$profile" --list-generations | 354 + targetHostCmd nix-env -p "$profile" --list-generations | 224 355 sed -n '/current/ {g; p;}; s/ *\([0-9]*\).*/\1/; h' 225 356 ) 226 - ln -sT "$profile"-${systemNumber}-link ./result 227 - pathToConfig=./result 357 + pathToConfig="$profile"-${systemNumber}-link 358 + if [ -z "$targetHost" ]; then 359 + ln -sT "$pathToConfig" ./result 360 + fi 228 361 else 229 362 showSyntax 230 363 fi ··· 234 367 # If we're not just building, then make the new configuration the boot 235 368 # default and/or activate it now. 236 369 if [ "$action" = switch -o "$action" = boot -o "$action" = test -o "$action" = dry-activate ]; then 237 - if ! $pathToConfig/bin/switch-to-configuration "$action"; then 370 + if ! targetHostCmd $pathToConfig/bin/switch-to-configuration "$action"; then 238 371 echo "warning: error(s) occurred while switching to the new configuration" >&2 239 372 exit 1 240 373 fi
+1 -1
nixos/modules/installer/tools/tools.nix
··· 38 38 nixos-generate-config = makeProg { 39 39 name = "nixos-generate-config"; 40 40 src = ./nixos-generate-config.pl; 41 - path = [ pkgs.btrfsProgs ]; 41 + path = [ pkgs.btrfs-progs ]; 42 42 perl = "${pkgs.perl}/bin/perl -I${pkgs.perlPackages.FileSlurp}/lib/perl5/site_perl"; 43 43 inherit (config.system) nixosRelease; 44 44 };
+2
nixos/modules/misc/ids.nix
··· 239 239 bepasty = 215; 240 240 pumpio = 216; 241 241 nm-openvpn = 217; 242 + mathics = 218; 242 243 243 244 # When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399! 244 245 ··· 455 456 bepasty = 215; 456 457 pumpio = 216; 457 458 nm-openvpn = 217; 459 + mathics = 218; 458 460 459 461 # When adding a gid, make sure it doesn't match an existing 460 462 # uid. Users and groups with the same name should have equal
+1
nixos/modules/module-list.nix
··· 209 209 ./services/misc/gitolite.nix 210 210 ./services/misc/gpsd.nix 211 211 ./services/misc/ihaskell.nix 212 + ./services/misc/mathics.nix 212 213 ./services/misc/mbpfan.nix 213 214 ./services/misc/mediatomb.nix 214 215 ./services/misc/mesos-master.nix
+1
nixos/modules/profiles/graphical.nix
··· 8 8 enable = true; 9 9 displayManager.kdm.enable = true; 10 10 desktopManager.kde4.enable = true; 11 + synaptics.enable = true; # for touchpad support on many laptops 11 12 }; 12 13 13 14 environment.systemPackages = [ pkgs.glxinfo ];
+3 -3
nixos/modules/programs/command-not-found/command-not-found.nix
··· 16 16 isExecutable = true; 17 17 inherit (pkgs) perl; 18 18 perlFlags = concatStrings (map (path: "-I ${path}/lib/perl5/site_perl ") 19 - [ pkgs.perlPackages.DBI pkgs.perlPackages.DBDSQLite ]); 19 + [ pkgs.perlPackages.DBI pkgs.perlPackages.DBDSQLite pkgs.perlPackages.StringShellQuote ]); 20 20 }; 21 21 22 22 in ··· 30 30 local p=/run/current-system/sw/bin/command-not-found 31 31 if [ -x $p -a -f /nix/var/nix/profiles/per-user/root/channels/nixos/programs.sqlite ]; then 32 32 # Run the helper program. 33 - $p "$1" 33 + $p "$@" 34 34 # Retry the command if we just installed it. 35 35 if [ $? = 126 ]; then 36 36 "$@" ··· 51 51 local p=/run/current-system/sw/bin/command-not-found 52 52 if [ -x $p -a -f /nix/var/nix/profiles/per-user/root/channels/nixos/programs.sqlite ]; then 53 53 # Run the helper program. 54 - $p "$1" 54 + $p "$@" 55 55 56 56 # Retry the command if we just installed it. 57 57 if [ $? = 126 ]; then
+3
nixos/modules/programs/command-not-found/command-not-found.pl
··· 3 3 use strict; 4 4 use DBI; 5 5 use DBD::SQLite; 6 + use String::ShellQuote; 6 7 use Config; 7 8 8 9 my $program = $ARGV[0]; ··· 31 32 EOF 32 33 ; 33 34 exit 126 if system("nix-env", "-iA", "nixos.$package") == 0; 35 + } elsif ($ENV{"NIX_AUTO_RUN"} // "") { 36 + exec("nix-shell", "-p", $package, "--run", shell_quote("exec", @ARGV)); 34 37 } else { 35 38 print STDERR <<EOF; 36 39 The program ‘$program’ is currently not installed. You can install it by typing:
+3 -1
nixos/modules/services/hardware/sane.nix
··· 4 4 5 5 let 6 6 7 - pkg = if config.hardware.sane.snapshot then pkgs.saneBackendsGit else pkgs.saneBackends; 7 + pkg = if config.hardware.sane.snapshot 8 + then pkgs.sane-backends-git 9 + else pkgs.sane-backends; 8 10 backends = [ pkg ] ++ config.hardware.sane.extraBackends; 9 11 saneConfig = pkgs.mkSaneConfig { paths = backends; }; 10 12
+17 -7
nixos/modules/services/hardware/thinkfan.nix
··· 43 43 44 44 sensor ${cfg.sensor} (0, 10, 15, 2, 10, 5, 0, 3, 0, 3) 45 45 46 - (0, 0, 55) 47 - (1, 48, 60) 48 - (2, 50, 61) 49 - (3, 52, 63) 50 - (6, 56, 65) 51 - (7, 60, 85) 52 - (127, 80, 32767) 46 + ${cfg.levels} 53 47 ''; 54 48 55 49 in { ··· 71 65 Sensor used by thinkfan 72 66 ''; 73 67 }; 68 + 69 + levels = mkOption { 70 + default = '' 71 + (0, 0, 55) 72 + (1, 48, 60) 73 + (2, 50, 61) 74 + (3, 52, 63) 75 + (6, 56, 65) 76 + (7, 60, 85) 77 + (127, 80, 32767) 78 + ''; 79 + description ='' 80 + Sensor used by thinkfan 81 + ''; 82 + }; 83 + 74 84 75 85 }; 76 86
+54
nixos/modules/services/misc/mathics.nix
··· 1 + { pkgs, lib, config, ... }: 2 + 3 + with lib; 4 + 5 + let 6 + cfg = config.services.mathics; 7 + 8 + in { 9 + options = { 10 + services.mathics = { 11 + enable = mkEnableOption "Mathics notebook service"; 12 + 13 + external = mkOption { 14 + type = types.bool; 15 + default = false; 16 + description = "Listen on all interfaces, rather than just localhost?"; 17 + }; 18 + 19 + port = mkOption { 20 + type = types.int; 21 + default = 8000; 22 + description = "TCP port to listen on."; 23 + }; 24 + }; 25 + }; 26 + 27 + config = mkIf cfg.enable { 28 + 29 + users.extraUsers.mathics = { 30 + group = config.users.extraGroups.mathics.name; 31 + description = "Mathics user"; 32 + home = "/var/lib/mathics"; 33 + createHome = true; 34 + uid = config.ids.uids.mathics; 35 + }; 36 + 37 + users.extraGroups.mathics.gid = config.ids.gids.mathics; 38 + 39 + systemd.services.mathics = { 40 + description = "Mathics notebook server"; 41 + wantedBy = [ "multi-user.target" ]; 42 + after = [ "network.target" ]; 43 + serviceConfig = { 44 + User = config.users.extraUsers.mathics.name; 45 + Group = config.users.extraGroups.mathics.name; 46 + ExecStart = concatStringsSep " " [ 47 + "${pkgs.mathics}/bin/mathicsserver" 48 + "--port" (toString cfg.port) 49 + (if cfg.external then "--external" else "") 50 + ]; 51 + }; 52 + }; 53 + }; 54 + }
+2 -2
nixos/modules/services/monitoring/graphite.nix
··· 256 256 }; 257 257 258 258 enableAggregator = mkOption { 259 - description = "Whether to enable carbon agregator, the carbon buffering service."; 259 + description = "Whether to enable carbon aggregator, the carbon buffering service."; 260 260 default = false; 261 261 type = types.bool; 262 262 }; 263 263 264 264 aggregationRules = mkOption { 265 - description = "Defines if and how received metrics will be agregated."; 265 + description = "Defines if and how received metrics will be aggregated."; 266 266 default = null; 267 267 type = types.uniq (types.nullOr types.string); 268 268 example = ''
+1
nixos/modules/services/security/fail2ban.nix
··· 138 138 findtime = 600 139 139 maxretry = 3 140 140 backend = systemd 141 + enabled = true 141 142 ''; 142 143 143 144 # Block SSH if there are too many failing connection attempts.
+8 -1
nixos/modules/services/ttys/kmscon.nix
··· 32 32 default = ""; 33 33 example = "font-size=14"; 34 34 }; 35 + 36 + extraOptions = mkOption { 37 + description = "Extra flags to pass to kmscon."; 38 + type = types.separatedString " "; 39 + default = ""; 40 + example = "--term xterm-256color"; 41 + }; 35 42 }; 36 43 }; 37 44 ··· 53 60 ConditionPathExists=/dev/tty0 54 61 55 62 [Service] 56 - ExecStart=${pkgs.kmscon}/bin/kmscon "--vt=%I" --seats=seat0 --no-switchvt --configdir ${configDir} --login -- ${pkgs.shadow}/bin/login -p 63 + ExecStart=${pkgs.kmscon}/bin/kmscon "--vt=%I" ${cfg.extraOptions} --seats=seat0 --no-switchvt --configdir ${configDir} --login -- ${pkgs.shadow}/bin/login -p 57 64 UtmpIdentifier=%I 58 65 TTYPath=/dev/%I 59 66 TTYReset=yes
+1 -1
nixos/modules/system/boot/kernel.nix
··· 158 158 159 159 boot.kernel.sysctl."kernel.printk" = config.boot.consoleLogLevel; 160 160 161 - boot.kernelModules = [ "loop" "configs" "atkbd" ]; 161 + boot.kernelModules = [ "loop" "atkbd" ]; 162 162 163 163 boot.initrd.availableKernelModules = 164 164 [ # Note: most of these (especially the SATA/PATA modules)
+1 -1
nixos/modules/system/boot/loader/grub/grub.nix
··· 56 56 extraEntriesBeforeNixOS extraPrepareConfig configurationLimit copyKernels timeout 57 57 default fsIdentifier efiSupport gfxmodeEfi gfxmodeBios; 58 58 path = (makeSearchPath "bin" ([ 59 - pkgs.coreutils pkgs.gnused pkgs.gnugrep pkgs.findutils pkgs.diffutils pkgs.btrfsProgs 59 + pkgs.coreutils pkgs.gnused pkgs.gnugrep pkgs.findutils pkgs.diffutils pkgs.btrfs-progs 60 60 pkgs.utillinux ] ++ (if cfg.efiSupport && (cfg.version == 2) then [pkgs.efibootmgr ] else []) 61 61 )) + ":" + (makeSearchPath "sbin" [ 62 62 pkgs.mdadm pkgs.utillinux
+1
nixos/modules/system/boot/stage-1-init.sh
··· 140 140 141 141 142 142 # Create device nodes in /dev. 143 + @preDeviceCommands@ 143 144 echo "running udev..." 144 145 mkdir -p /etc/udev 145 146 ln -sfn @udevRules@ /etc/udev/rules.d
+10 -1
nixos/modules/system/boot/stage-1.nix
··· 203 203 inherit (config.boot) resumeDevice devSize runSize; 204 204 205 205 inherit (config.boot.initrd) checkJournalingFS 206 - postEarlyDeviceCommands preLVMCommands postDeviceCommands postMountCommands kernelModules; 206 + preLVMCommands preDeviceCommands postEarlyDeviceCommands postDeviceCommands postMountCommands kernelModules; 207 207 208 208 resumeDevices = map (sd: if sd ? device then sd.device else "/dev/disk/by-label/${sd.label}") 209 209 (filter (sd: (sd ? label || hasPrefix "/dev/" sd.device) && !sd.randomEncryption) config.swapDevices); ··· 300 300 type = types.lines; 301 301 description = '' 302 302 Shell commands to be executed immediately before LVM discovery. 303 + ''; 304 + }; 305 + 306 + boot.initrd.preDeviceCommands = mkOption { 307 + default = ""; 308 + type = types.lines; 309 + description = '' 310 + Shell commands to be executed before udev is started to create 311 + device nodes. 303 312 ''; 304 313 }; 305 314
+3 -3
nixos/modules/tasks/filesystems/btrfs.nix
··· 11 11 { 12 12 config = mkIf (any (fs: fs == "btrfs") config.boot.supportedFilesystems) { 13 13 14 - system.fsPackages = [ pkgs.btrfsProgs ]; 14 + system.fsPackages = [ pkgs.btrfs-progs ]; 15 15 16 16 boot.initrd.kernelModules = mkIf inInitrd [ "btrfs" "crc32c" ]; 17 17 18 18 boot.initrd.extraUtilsCommands = mkIf inInitrd 19 19 '' 20 - copy_bin_and_libs ${pkgs.btrfsProgs}/bin/btrfs 20 + copy_bin_and_libs ${pkgs.btrfs-progs}/bin/btrfs 21 21 ln -sv btrfs $out/bin/btrfsck 22 22 ln -sv btrfsck $out/bin/fsck.btrfs 23 23 ''; ··· 36 36 # new devices are discovered. 37 37 jobs.udev.postStart = 38 38 '' 39 - ${pkgs.btrfsProgs}/bin/btrfs device scan 39 + ${pkgs.btrfs-progs}/bin/btrfs device scan 40 40 ''; 41 41 42 42 };
+5
nixos/modules/testing/test-instrumentation.nix
··· 43 43 # into thinking they're running interactively. 44 44 environment.variables.PAGER = ""; 45 45 46 + boot.initrd.preDeviceCommands = 47 + '' 48 + echo 600 > /proc/sys/kernel/hung_task_timeout_secs 49 + ''; 50 + 46 51 boot.initrd.postDeviceCommands = 47 52 '' 48 53 # Using acpi_pm as a clock source causes the guest clock to
+1 -1
nixos/modules/virtualisation/lxd.nix
··· 45 45 after = [ "systemd-udev-settle.service" ]; 46 46 47 47 # TODO(wkennington): Add lvm2 and thin-provisioning-tools 48 - path = with pkgs; [ acl rsync gnutar xz btrfsProgs ]; 48 + path = with pkgs; [ acl rsync gnutar xz btrfs-progs ]; 49 49 50 50 serviceConfig.ExecStart = "@${pkgs.lxd}/bin/lxd lxd --syslog --group lxd"; 51 51 serviceConfig.Type = "simple";
+1
nixos/release.nix
··· 252 252 #tests.lightdm = callTest tests/lightdm.nix {}; 253 253 tests.login = callTest tests/login.nix {}; 254 254 #tests.logstash = callTest tests/logstash.nix {}; 255 + tests.mathics = callTest tests/mathics.nix {}; 255 256 tests.misc = callTest tests/misc.nix {}; 256 257 tests.mumble = callTest tests/mumble.nix {}; 257 258 tests.munin = callTest tests/munin.nix {};
+20
nixos/tests/mathics.nix
··· 1 + import ./make-test.nix ({ pkgs, ... }: { 2 + name = "mathics"; 3 + meta = with pkgs.stdenv.lib.maintainers; { 4 + maintainers = [ benley ]; 5 + }; 6 + 7 + nodes = { 8 + machine = { config, pkgs, ... }: { 9 + services.mathics.enable = true; 10 + services.mathics.port = 8888; 11 + }; 12 + }; 13 + 14 + testScript = '' 15 + startAll; 16 + $machine->waitForUnit("mathics.service"); 17 + $machine->waitForOpenPort(8888); 18 + $machine->succeed("curl http://localhost:8888/"); 19 + ''; 20 + })
+1 -1
nixos/tests/partition.nix
··· 68 68 machine = { config, pkgs, ... }: { 69 69 environment.systemPackages = [ 70 70 pkgs.pythonPackages.nixpart0 71 - pkgs.file pkgs.btrfsProgs pkgs.xfsprogs pkgs.lvm2 71 + pkgs.file pkgs.btrfs-progs pkgs.xfsprogs pkgs.lvm2 72 72 ]; 73 73 virtualisation.emptyDiskImages = [ 4096 4096 ]; 74 74 };
+2 -2
pkgs/applications/audio/snd/default.nix
··· 4 4 }: 5 5 6 6 stdenv.mkDerivation rec { 7 - name = "snd-15.4"; 7 + name = "snd-15.9"; 8 8 9 9 src = fetchurl { 10 10 url = "mirror://sourceforge/snd/${name}.tar.gz"; 11 - sha256 = "1dari02ind445h5hpb6dhi0kix1vmlk64lyxwv1zrqagw3ajmpwh"; 11 + sha256 = "0hs9ailgaphgyi3smnrpwksvdww85aa7szqgi6l6d2jwfx9g4bhd"; 12 12 }; 13 13 14 14 nativeBuildInputs = [ pkgconfig ];
+3 -3
pkgs/applications/editors/flpsed/default.nix
··· 1 1 {stdenv, fetchurl, fltk13, ghostscript}: 2 2 3 3 stdenv.mkDerivation { 4 - name = "flpsed-0.7.2"; 4 + name = "flpsed-0.7.3"; 5 5 6 6 src = fetchurl { 7 - url = "http://www.ecademix.com/JohannesHofmann/flpsed-0.7.2.tar.gz"; 8 - sha256 = "1132nlganr6x4f4lzcp9l0xihg2ky1l7xk8vq7r2l2qxs97vbif8"; 7 + url = "http://www.ecademix.com/JohannesHofmann/flpsed-0.7.3.tar.gz"; 8 + sha256 = "0vngqxanykicabhfdznisv82k5ypkxwg0s93ms9ribvhpm8vf2xp"; 9 9 }; 10 10 11 11 buildInputs = [ fltk13 ghostscript ];
+2 -2
pkgs/applications/graphics/fbida/default.nix
··· 1 1 { stdenv, fetchurl, libjpeg, libexif, libungif, libtiff, libpng, libwebp 2 - , pkgconfig, freetype, fontconfig, which, imagemagick, curl, saneBackends 2 + , pkgconfig, freetype, fontconfig, which, imagemagick, curl, sane-backends 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { ··· 13 13 nativeBuildInputs = [ pkgconfig which ]; 14 14 buildInputs = 15 15 [ libexif libjpeg libpng libungif freetype fontconfig libtiff libwebp 16 - imagemagick curl saneBackends 16 + imagemagick curl sane-backends 17 17 ]; 18 18 19 19 makeFlags = [ "prefix=$(out)" "verbose=yes" ];
+3 -3
pkgs/applications/graphics/sane/backends/git.nix
··· 1 1 { callPackage, fetchgit, ... } @ args: 2 2 3 3 callPackage ./generic.nix (args // { 4 - version = "2015-12-27"; 4 + version = "2016-01-01"; 5 5 src = fetchgit { 6 - sha256 = "4bf6e8815d2edbbc75255928d0fb030639a9fea9a5aa953dcf1f00e167eff527"; 7 - rev = "cadb4b0fff00540159625320416e5601c4704627"; 6 + sha256 = "412c88b2b2b699b5a2ab28c7696c715e46b600398391ae038840c6b8674aea7c"; 7 + rev = "3f0c3df2fcde8d0cf30ab68c70cb5cad984dda6f"; 8 8 url = "git://alioth.debian.org/git/sane/sane-backends.git"; 9 9 }; 10 10 })
+2 -2
pkgs/applications/graphics/sane/frontends.nix
··· 1 - { stdenv, fetchurl, saneBackends, libX11, gtk, pkgconfig, libusb ? null}: 1 + { stdenv, fetchurl, sane-backends, libX11, gtk, pkgconfig, libusb ? null}: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "sane-frontends-1.0.14"; ··· 12 12 sed -e '/SANE_CAP_ALWAYS_SETTABLE/d' -i src/gtkglue.c 13 13 ''; 14 14 15 - buildInputs = [saneBackends libX11 gtk pkgconfig] ++ 15 + buildInputs = [sane-backends libX11 gtk pkgconfig] ++ 16 16 (if libusb != null then [libusb] else []); 17 17 18 18 meta = {
+2 -2
pkgs/applications/graphics/sane/xsane.nix
··· 1 - { stdenv, fetchurl, saneBackends, saneFrontends, libX11, gtk, pkgconfig, libpng 1 + { stdenv, fetchurl, sane-backends, saneFrontends, libX11, gtk, pkgconfig, libpng 2 2 , libusb ? null 3 3 , gimpSupport ? false, gimp_2_8 ? null 4 4 }: ··· 18 18 chmod a+rX -R . 19 19 ''; 20 20 21 - buildInputs = [libpng saneBackends saneFrontends libX11 gtk pkgconfig ] 21 + buildInputs = [libpng sane-backends saneFrontends libX11 gtk pkgconfig ] 22 22 ++ (if libusb != null then [libusb] else []) 23 23 ++ stdenv.lib.optional gimpSupport gimp_2_8; 24 24
+2 -2
pkgs/applications/graphics/simple-scan/default.nix
··· 1 1 { stdenv, fetchurl, cairo, colord, glib, gtk3, gusb, intltool, itstool 2 - , libusb1, libxml2, pkgconfig, saneBackends, vala, wrapGAppsHook }: 2 + , libusb1, libxml2, pkgconfig, sane-backends, vala, wrapGAppsHook }: 3 3 4 4 let version = "3.19.3"; in 5 5 stdenv.mkDerivation rec { ··· 10 10 url = "https://launchpad.net/simple-scan/3.19/${version}/+download/${name}.tar.xz"; 11 11 }; 12 12 13 - buildInputs = [ cairo colord glib gusb gtk3 libusb1 libxml2 saneBackends 13 + buildInputs = [ cairo colord glib gusb gtk3 libusb1 libxml2 sane-backends 14 14 vala ]; 15 15 nativeBuildInputs = [ intltool itstool pkgconfig wrapGAppsHook ]; 16 16
+10 -8
pkgs/applications/graphics/sxiv/default.nix
··· 1 - { stdenv, fetchgit, libX11, imlib2, giflib, libexif }: 2 - 3 - stdenv.mkDerivation { 4 - name = "sxiv-2015.03.25"; 1 + { stdenv, fetchFromGitHub, libX11, imlib2, giflib, libexif }: 5 2 6 - src = fetchgit { 7 - url = "https://github.com/muennich/sxiv.git"; 8 - rev = "01ed483b50f506fcba928af43e2ca017897e7c77"; 9 - sha256 = "18s64l3dvibqg9biznzy4mdkkn9qmmpqxpdx7ljx7c0832aqy94k"; 3 + stdenv.mkDerivation rec { 4 + name = "sxiv-${version}"; 5 + version = "v1.3.2"; 6 + #https://github.com/muennich/sxiv/archive/v1.3.2.zip 7 + src = fetchFromGitHub { 8 + owner = "muennich"; 9 + repo = "sxiv"; 10 + rev = version; 11 + sha256 = "1f4gz1qjhb44bbb3q5fqk439zyipkwnr19zhg89yq2pgmzzzqr2h"; 10 12 }; 11 13 12 14 postUnpack = ''
+27
pkgs/applications/graphics/xzgv/default.nix
··· 1 + { stdenv, fetchurl, gtk, pkgconfig, texinfo }: 2 + 3 + stdenv.mkDerivation rec { 4 + name = "xzgv-${version}"; 5 + version = "0.9.1"; 6 + src = fetchurl { 7 + url = "mirror://sourceforge/xzgv/xzgv-${version}.tar.gz"; 8 + sha256 = "1rh432wnvzs434knzbda0fslhfx0gngryrrnqkfm6gwd2g5mxcph"; 9 + }; 10 + buildInputs = [ gtk pkgconfig texinfo ]; 11 + patches = [ ./fix-linker-paths.patch ]; 12 + postPatch = '' 13 + substituteInPlace config.mk \ 14 + --replace /usr/local $out 15 + substituteInPlace config.mk \ 16 + --replace "CFLAGS=-O2 -Wall" "CFLAGS=-Wall" 17 + substituteInPlace Makefile \ 18 + --replace "all: src man" "all: src man info" 19 + ''; 20 + meta = with stdenv.lib; { 21 + homepage = http://sourceforge.net/projects/xzgv/; 22 + description = "Picture viewer for X with a thumbnail-based selector"; 23 + license = licenses.gpl2; 24 + maintainers = [ maintainers.womfoo ]; 25 + platforms = platforms.linux; 26 + }; 27 + }
+25
pkgs/applications/graphics/xzgv/fix-linker-paths.patch
··· 1 + taken from http://sourceforge.net/p/xzgv/code/53/tree//trunk/xzgv/src/Makefile?diff=514dada434309d2ec11f5eff:52 2 + --- a/src/Makefile 3 + +++ b/src/Makefile 4 + @@ -9,8 +9,10 @@ 5 + # This gets definitions for CC, CFLAGS, BINDIR etc. 6 + include ../config.mk 7 + 8 + -CFLAGS+=`pkg-config --cflags gtk+-2.0` `pkg-config --cflags gdk-pixbuf-2.0` 9 + -LDFLAGS+=`pkg-config --libs gtk+-2.0` `pkg-config --libs gdk-pixbuf-2.0` 10 + +CFLAGS+=`pkg-config --cflags gtk+-2.0` `pkg-config --cflags gdk-pixbuf-2.0` \ 11 + + `pkg-config --cflags x11` 12 + +LDFLAGS+=`pkg-config --libs gtk+-2.0` `pkg-config --libs gdk-pixbuf-2.0` \ 13 + + `pkg-config --libs x11` -lm 14 + 15 + all: xzgv 16 + 17 + @@ -23,7 +25,7 @@ 18 + backend.o 19 + 20 + xzgv: $(OBJS) 21 + - $(CC) $(LDFLAGS) -o xzgv $(OBJS) 22 + + $(CC) -o xzgv $(OBJS) $(LDFLAGS) 23 + 24 + installdirs: 25 + /bin/sh ../mkinstalldirs $(BINDIR)
+7 -6
pkgs/applications/misc/calibre/default.nix
··· 1 1 { stdenv, fetchurl, python, pyqt5, sip_4_16, poppler_utils, pkgconfig, libpng 2 2 , imagemagick, libjpeg, fontconfig, podofo, qtbase, icu, sqlite 3 - , makeWrapper, unrar, chmlib, pythonPackages, xz, libusb1, libmtp 3 + , makeWrapper, unrarSupport ? false, chmlib, pythonPackages, xz, libusb1, libmtp 4 4 , xdg_utils 5 5 }: 6 6 7 7 stdenv.mkDerivation rec { 8 - version = "2.46.0"; 8 + version = "2.48.0"; 9 9 name = "calibre-${version}"; 10 10 11 11 src = fetchurl { 12 12 url = "http://download.calibre-ebook.com/${version}/${name}.tar.xz"; 13 - sha256 = "0ig1pb62w57l6nhwg391mkjhw9dyicix6xigpdyw0320jdw9nlkb"; 13 + sha256 = "0bjzw806czqxkhq9qqkhff8bhfc428pijkidb1h6gr47jqdp4hpg"; 14 14 }; 15 15 16 16 inherit python; 17 17 18 - patchPhase = '' 18 + patches = stdenv.lib.optional (!unrarSupport) ./dont_build_unrar_plugin.patch; 19 + 20 + prePatch = '' 19 21 sed -i "/pyqt_sip_dir/ s:=.*:= '${pyqt5}/share/sip':" \ 20 22 setup/build_environment.py 21 23 ''; ··· 53 55 54 56 for a in $out/bin/*; do 55 57 wrapProgram $a --prefix PYTHONPATH : $PYTHONPATH \ 56 - --prefix LD_LIBRARY_PATH : ${unrar}/lib \ 57 58 --prefix PATH : ${poppler_utils}/bin 58 59 done 59 60 ''; ··· 61 62 meta = with stdenv.lib; { 62 63 description = "Comprehensive e-book software"; 63 64 homepage = http://calibre-ebook.com; 64 - license = licenses.gpl3; 65 + license = with licenses; if unrarSupport then unfreeRedistributable else gpl3; 65 66 maintainers = with maintainers; [ viric iElectric pSub AndersonTorres ]; 66 67 platforms = platforms.linux; 67 68 inherit version;
+47
pkgs/applications/misc/calibre/dont_build_unrar_plugin.patch
··· 1 + Author: Dmitry Shachnev <mitya57@gmail.com> 2 + Description: do not build unrar extension as we strip unrar from the tarball 3 + Forwarded: not-needed 4 + Last-Update: 2013-04-04 5 + 6 + Index: calibre/setup/extensions.py 7 + =================================================================== 8 + --- calibre.orig/setup/extensions.py 2014-02-02 10:42:14.510954007 +0100 9 + +++ calibre/setup/extensions.py 2014-02-02 10:42:14.502954007 +0100 10 + @@ -209,24 +209,6 @@ 11 + sip_files=['calibre/ebooks/pdf/render/qt_hack.sip'] 12 + ), 13 + 14 + - Extension('unrar', 15 + - ['unrar/%s.cpp'%(x.partition('.')[0]) for x in ''' 16 + - rar.o strlist.o strfn.o pathfn.o savepos.o smallfn.o global.o file.o 17 + - filefn.o filcreat.o archive.o arcread.o unicode.o system.o 18 + - isnt.o crypt.o crc.o rawread.o encname.o resource.o match.o 19 + - timefn.o rdwrfn.o consio.o options.o ulinks.o errhnd.o rarvm.o 20 + - secpassword.o rijndael.o getbits.o sha1.o extinfo.o extract.o 21 + - volume.o list.o find.o unpack.o cmddata.o filestr.o scantree.o 22 + - '''.split()] + ['calibre/utils/unrar.cpp'], 23 + - inc_dirs=['unrar'], 24 + - cflags=[('/' if iswindows else '-') + x for x in ( 25 + - 'DSILENT', 'DRARDLL', 'DUNRAR')] + ( 26 + - [] if iswindows else ['-D_FILE_OFFSET_BITS=64', 27 + - '-D_LARGEFILE_SOURCE']), 28 + - optimize_level=2, 29 + - libraries=['User32', 'Advapi32', 'kernel32', 'Shell32'] if iswindows else [] 30 + - ), 31 + - 32 + ] 33 + 34 + 35 + Index: calibre/src/calibre/ebooks/metadata/archive.py 36 + =================================================================== 37 + --- calibre.orig/src/calibre/ebooks/metadata/archive.py 2014-02-02 10:42:14.510954007 +0100 38 + +++ calibre/src/calibre/ebooks/metadata/archive.py 2014-02-02 10:42:14.502954007 +0100 39 + @@ -42,7 +42,7 @@ 40 + description = _('Extract common e-book formats from archives ' 41 + '(zip/rar) files. Also try to autodetect if they are actually ' 42 + 'cbz/cbr files.') 43 + - file_types = set(['zip', 'rar']) 44 + + file_types = set(['zip']) 45 + supported_platforms = ['windows', 'osx', 'linux'] 46 + on_import = True 47 +
+3 -2
pkgs/applications/misc/cool-retro-term/default.nix
··· 1 - { stdenv, fetchgit, makeQtWrapper, qtbase, qtquick1, qmltermwidget }: 1 + { stdenv, fetchgit, makeQtWrapper, qtbase, qtquick1, qmltermwidget, 2 + qtquickcontrols, qtgraphicaleffects }: 2 3 3 4 stdenv.mkDerivation rec { 4 5 version = "1.0.0"; ··· 15 16 sed -i -e '/qmltermwidget/d' cool-retro-term.pro 16 17 ''; 17 18 18 - buildInputs = [ qtbase qtquick1 qmltermwidget ]; 19 + buildInputs = [ qtbase qtquick1 qmltermwidget qtquickcontrols qtgraphicaleffects ]; 19 20 nativeBuildInputs = [ makeQtWrapper ]; 20 21 21 22 configurePhase = "qmake PREFIX=$out";
+2
pkgs/applications/misc/ding/default.nix
··· 34 34 35 35 sed -i "s@/usr/bin/fortune@fortune@g" ding 36 36 37 + sed -i "s@/usr/bin/ding@$out/bin/ding@g" ding.desktop 38 + 37 39 cp ding $out/bin/ 38 40 cp de-en.txt $out/share/dict/ 39 41 cp ding.1 $out/share/man/man1/
+11 -4
pkgs/applications/misc/redshift/default.nix
··· 7 7 }: 8 8 9 9 let 10 - version = "1.10"; 11 - mkFlag = flag: name: if flag then "--enable-${name}" else "--disable-${name}"; 10 + version = "1.11"; 11 + mkFlag = flag: name: if flag 12 + then "--enable-${name}" 13 + else "--disable-${name}"; 12 14 in 13 15 stdenv.mkDerivation { 14 16 name = "redshift-${version}"; 15 17 src = fetchurl { 16 - sha256 = "19pfk9il5x2g2ivqix4a555psz8mj3m0cvjwnjpjvx0llh5fghjv"; 18 + sha256 = "0ngkwj7rg8nfk806w0sg443w6wjr91xdc0zisqfm5h2i77wm1qqh"; 17 19 url = "https://github.com/jonls/redshift/releases/download/v${version}/redshift-${version}.tar.xz"; 18 20 }; 19 21 20 22 buildInputs = [ geoclue2 ] 21 - ++ stdenv.lib.optionals guiSupport [ hicolor_icon_theme gtk3 python pygobject3 pyxdg ] 23 + ++ stdenv.lib.optionals guiSupport [ hicolor_icon_theme gtk3 python 24 + pygobject3 pyxdg ] 22 25 ++ stdenv.lib.optionals drmSupport [ libdrm ] 23 26 ++ stdenv.lib.optionals randrSupport [ libxcb ] 24 27 ++ stdenv.lib.optionals vidModeSupport [ libX11 libXxf86vm ]; ··· 31 34 (mkFlag vidModeSupport "vidmode") 32 35 ]; 33 36 37 + enableParallelBuilding = true; 38 + 34 39 preInstall = stdenv.lib.optionalString guiSupport '' 35 40 substituteInPlace src/redshift-gtk/redshift-gtk \ 36 41 --replace "/usr/bin/env python3" "${python}/bin/${python.executable}" ··· 41 46 --prefix PYTHONPATH : "$PYTHONPATH" \ 42 47 --prefix GI_TYPELIB_PATH : "$GI_TYPELIB_PATH" \ 43 48 --prefix XDG_DATA_DIRS : "$out/share:${hicolor_icon_theme}/share" 49 + 50 + install -Dm644 {.,$out/share/doc/redshift}/redshift.conf.sample 44 51 ''; 45 52 46 53 meta = with stdenv.lib; {
+5 -7
pkgs/applications/misc/surf/default.nix pkgs/applications/networking/browsers/surf/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "surf-${version}"; 5 - version="0.6"; 5 + version="0.7"; 6 6 7 7 src = fetchurl { 8 8 url = "http://dl.suckless.org/surf/surf-${version}.tar.gz"; 9 - sha256 = "01b8hq8z2wd7ssym5bypx2b15mrs1lhgkrcgxf700kswxvxcrhgx"; 9 + sha256 = "0jj93izd8fizxfa6ln9w1h9bwki81sz5dhskh5x1rl34zd38aq4m"; 10 10 }; 11 11 12 12 buildInputs = [ gtk makeWrapper webkit gsettings_desktop_schemas pkgconfig glib libsoup ]; ··· 16 16 17 17 buildPhase = " make "; 18 18 19 - # `-lX11' to make sure libX11's store path is in the RPATH 19 + # `-lX11' to make sure libX11's store path is in the RPATH 20 20 NIX_LDFLAGS = "-lX11"; 21 - preConfigure = [ ''sed -i "s@PREFIX = /usr/local@PREFIX = $out@g" config.mk'' ]; 22 - installPhase = '' 23 - make PREFIX=/ DESTDIR=$out install 24 - ''; 21 + preConfigure = ''sed -i "s@PREFIX = /usr/local@PREFIX = $out@g" config.mk''; 22 + installFlags = [ "PREFIX=/" "DESTDIR=$(out)" ]; 25 23 26 24 preFixup = '' 27 25 wrapProgram "$out/bin/surf" \
+5 -4
pkgs/applications/misc/viking/default.nix
··· 1 1 { fetchurl, stdenv, makeWrapper, pkgconfig, intltool, gettext, gtk, expat, curl 2 2 , gpsd, bc, file, gnome_doc_utils, libexif, libxml2, libxslt, scrollkeeper 3 - , docbook_xml_dtd_412, gexiv2, sqlite, gpsbabel }: 3 + , docbook_xml_dtd_412, gexiv2, sqlite, gpsbabel, expect }: 4 4 5 5 stdenv.mkDerivation rec { 6 6 name = "viking-${version}"; 7 - version = "1.6.1"; 7 + version = "1.6.2"; 8 8 9 9 src = fetchurl { 10 10 url = "mirror://sourceforge/viking/viking/viking-${version}.tar.bz2"; 11 - sha256 = "0ic445f85z1sdx1ifgcijn379m7amr5mcjpg10343972sam4rz1s"; 11 + sha256 = "09kq0sxs2czps0d6xzgkkp41746v44ip63m72qvfs7rsrnqj7qnz"; 12 12 }; 13 13 14 14 buildInputs = [ makeWrapper pkgconfig intltool gettext gtk expat curl gpsd bc file gnome_doc_utils ··· 27 27 28 28 postInstall = '' 29 29 wrapProgram $out/bin/viking \ 30 - --prefix PATH : "${gpsbabel}/bin" 30 + --prefix PATH : "${gpsbabel}/bin" \ 31 + --prefix PATH : "${expect}/bin" 31 32 ''; 32 33 33 34 meta = with stdenv.lib; {
+37
pkgs/applications/misc/xxkb/default.nix
··· 1 + { stdenv, fetchurl, libX11, libXt, libXext, libXpm, imake 2 + , svgSupport ? true, librsvg, glib, gdk_pixbuf, pkgconfig 3 + }: 4 + 5 + assert svgSupport -> 6 + librsvg != null && glib != null && gdk_pixbuf != null && pkgconfig != null; 7 + 8 + stdenv.mkDerivation rec { 9 + name = "xxkb-1.11.1"; 10 + 11 + src = fetchurl { 12 + url = "mirror://sourceforge/xxkb/${name}-src.tar.gz"; 13 + sha256 = "0hl1i38z9xnbgfjkaz04vv1n8xbgfg88g5z8fyzyb2hxv2z37anf"; 14 + }; 15 + 16 + buildInputs = [ 17 + imake 18 + libX11 libXt libXext libXpm 19 + ] ++ stdenv.lib.optional svgSupport [ librsvg glib gdk_pixbuf pkgconfig ]; 20 + 21 + configurePhase = '' 22 + xmkmf ${stdenv.lib.optionalString svgSupport "-DWITH_SVG_SUPPORT"} 23 + ''; 24 + 25 + preBuild = '' 26 + makeFlagsArray=( BINDIR=$out/bin PIXMAPDIR=$out/share/xxkb XAPPLOADDIR=$out/etc/X11/app-defaults MANDIR=$out/man ) 27 + ''; 28 + 29 + installTargets = "install install.man"; 30 + 31 + meta = { 32 + description = "A keyboard layout indicator and switcher"; 33 + homepage = "http://xxkb.sourceforge.net/"; 34 + license = stdenv.lib.licenses.artistic2; 35 + platforms = stdenv.lib.platforms.linux; 36 + }; 37 + }
+179 -179
pkgs/applications/networking/browsers/firefox-bin/sources.nix
··· 4 4 # ruby generate_sources.rb > sources.nix 5 5 6 6 { 7 - version = "43.0.2"; 7 + version = "43.0.3"; 8 8 sources = [ 9 - { locale = "ach"; arch = "linux-i686"; sha256 = "da9307cb24c75665adc6a5e02d3045eac9babd33c6da778167644d13cc685de2"; } 10 - { locale = "ach"; arch = "linux-x86_64"; sha256 = "1a8f13b44107e9689aa339f19c8247142ce82ef9a63bb4be077c212d4d4ad03c"; } 11 - { locale = "af"; arch = "linux-i686"; sha256 = "b8dcbf287b350becd7a4e1d812a2251bf10861fe6fe3c85ea9b56e4aafa2a156"; } 12 - { locale = "af"; arch = "linux-x86_64"; sha256 = "241a503d4cd2793c538a5cc1ad0990b2a5cd40a584504cf5dde77a28d2f47049"; } 13 - { locale = "an"; arch = "linux-i686"; sha256 = "530f5e4743384e543e4cf829f00e5f37adccf64b4af5067aab1e316aba72c579"; } 14 - { locale = "an"; arch = "linux-x86_64"; sha256 = "1bbde5a3c897ebed7c7820362257626835c1adfafb29a20e80bcc4b1c40407b4"; } 15 - { locale = "ar"; arch = "linux-i686"; sha256 = "f254b2f7117b866e2c8611d5367fc1e2a8e20e1997746204234ae6869c01f6e9"; } 16 - { locale = "ar"; arch = "linux-x86_64"; sha256 = "bec6a50c9ce11906edb09591ed1f37d94291fb67b2d4ab9a8f5f87b0e837c0be"; } 17 - { locale = "as"; arch = "linux-i686"; sha256 = "b894da79ba753489a3f0509aa54abb9cf67c84e80a73bc00d0e7e7483e1c4ac9"; } 18 - { locale = "as"; arch = "linux-x86_64"; sha256 = "ef435b67eac29cf4024ad8df1d4efd413ea58fd76c0e4ec2f2595e7c90743953"; } 19 - { locale = "ast"; arch = "linux-i686"; sha256 = "96566e2de543bb4b3bba195b99efb8ec1c01f6ec969dc75293ed66033b52a92b"; } 20 - { locale = "ast"; arch = "linux-x86_64"; sha256 = "29f9ccdfc93a72db314df43564fce754ddc678b89a55035f23582bf4a7c66135"; } 21 - { locale = "az"; arch = "linux-i686"; sha256 = "cc58914388b53df51d5bd78f0e63286166bbf278e691b8589bc7db18257627c5"; } 22 - { locale = "az"; arch = "linux-x86_64"; sha256 = "7f1db3428190e1bbc01506a029df8c81a0ea67b301f161a5bb297c47d5db41d8"; } 23 - { locale = "be"; arch = "linux-i686"; sha256 = "c8bd88c4ffb98d8611d760b144f46ab3cef4f7808f2b1008cd5aa75eadaf02eb"; } 24 - { locale = "be"; arch = "linux-x86_64"; sha256 = "1b063e4e4a33b9d29f01d7c98a942446d738b195877a617dd454c2697fd6a539"; } 25 - { locale = "bg"; arch = "linux-i686"; sha256 = "1186851b6a27a2d23572c9fa0a9bfabcfca1925d36e7fa79e5918541892bcda9"; } 26 - { locale = "bg"; arch = "linux-x86_64"; sha256 = "d185c5eb1640d13ee9fd049db41d267af728de56f833bc32a182f69c4921d1c0"; } 27 - { locale = "bn-BD"; arch = "linux-i686"; sha256 = "fcc0a0c46e913cb7b4d44c502f62ece83ae8d22703419edafd15321b77758625"; } 28 - { locale = "bn-BD"; arch = "linux-x86_64"; sha256 = "d1e066c2347e109fab28e525b5780edb9c5c063322745d971e4ad79a110568f6"; } 29 - { locale = "bn-IN"; arch = "linux-i686"; sha256 = "3a85767878b840411c57d176af597666aaeaede9a290032f374629eac536eeca"; } 30 - { locale = "bn-IN"; arch = "linux-x86_64"; sha256 = "a3314e2a9f74d9f2c85e592a74e1353b2f048349ba65bf4cfdf35c72b130cd61"; } 31 - { locale = "br"; arch = "linux-i686"; sha256 = "a6cd3445e65ca3c818856d6a3b9069aa437ea638f11bb8be520db73604150090"; } 32 - { locale = "br"; arch = "linux-x86_64"; sha256 = "9c9f5720b568d768933d7d55bfa7853bb7918bcc651b7c2e281ccf3d2a5e2218"; } 33 - { locale = "bs"; arch = "linux-i686"; sha256 = "9c0844cc1dde7712219626148988df642ab10e81494d4794a51a61bb92ddd110"; } 34 - { locale = "bs"; arch = "linux-x86_64"; sha256 = "44d91b25d18aa108adf49677069ebd75236f82c7016ee9d518e2ff3f6ad40ffb"; } 35 - { locale = "ca"; arch = "linux-i686"; sha256 = "5669828dec411832064e790e65203dabd3703a86090e87a931c6bd495fd39bc7"; } 36 - { locale = "ca"; arch = "linux-x86_64"; sha256 = "1e1cec512fb7038327488ce884e171ecda23ae26f98d39159ca96b8acea2029a"; } 37 - { locale = "cs"; arch = "linux-i686"; sha256 = "a7bdf99153ae8351c3f4f98db5e65d2a0598457dc0774508fc6ebe26c40ff43e"; } 38 - { locale = "cs"; arch = "linux-x86_64"; sha256 = "16fd46498fa33334a5bd1cf06351b410f7df41526c195de21959bf837ce5d488"; } 39 - { locale = "cy"; arch = "linux-i686"; sha256 = "8a251c77bbdb6a44163285cacb3a78ffe85835cbe0b9156ad300e733c9ee3934"; } 40 - { locale = "cy"; arch = "linux-x86_64"; sha256 = "61f2b6b13d9ce1066b6207b16865a038cb35c51f61a5bc05503cf948704320f7"; } 41 - { locale = "da"; arch = "linux-i686"; sha256 = "d1e5d20f7b396bb8b823e7a15a6e220fb930601c2df6e9fc5ca588d3ffce1698"; } 42 - { locale = "da"; arch = "linux-x86_64"; sha256 = "a5f20fb678a51a526ebd135b149c6769dda46827174259cabbc4912c6f0619d5"; } 43 - { locale = "de"; arch = "linux-i686"; sha256 = "74e9e40b191fd56e99708910c8798d4a8588271a90eef6f7658e042a0765d0e5"; } 44 - { locale = "de"; arch = "linux-x86_64"; sha256 = "470781e1debb2085fa538008cd3203c64b534b5a88c6a6ac01418a3ef344216b"; } 45 - { locale = "dsb"; arch = "linux-i686"; sha256 = "459e0d6c55ad822bae10a47a7b14004153a3f3363026556568d7108411318104"; } 46 - { locale = "dsb"; arch = "linux-x86_64"; sha256 = "97fd138bb33c80a3213b33d4796573b65d4659b888959730cc02e726bcc65388"; } 47 - { locale = "el"; arch = "linux-i686"; sha256 = "41b684530ed9bd80c03cb0cd8b1e4de8b3af383f611884965e98215ade1dd8c7"; } 48 - { locale = "el"; arch = "linux-x86_64"; sha256 = "b1a7f2a4de87510b9630c6cade94b7f628bbf04289119d3912ea0eb5260b55b2"; } 49 - { locale = "en-GB"; arch = "linux-i686"; sha256 = "3c40217b451bd28dd5f1aebcb9a9f7aafdfa3c9c7fd635d69674912a9e73f77c"; } 50 - { locale = "en-GB"; arch = "linux-x86_64"; sha256 = "6aa6cd0945bbe97b30e431fdb09a4deb45a0aba6e1283f881a35732b7403e247"; } 51 - { locale = "en-US"; arch = "linux-i686"; sha256 = "dd6c585c24e1e9212b65eabee8e52c5dbc9e4acce4fc51c32aacd82b3c6333e3"; } 52 - { locale = "en-US"; arch = "linux-x86_64"; sha256 = "9c56ff8734eb860a6038f6bd00d98aeabe57037e230c66d551aac451a27efa79"; } 53 - { locale = "en-ZA"; arch = "linux-i686"; sha256 = "0335775eb1a073d1889e8a43f913ea096bbd735a0b98687c75c7fde5eb636f44"; } 54 - { locale = "en-ZA"; arch = "linux-x86_64"; sha256 = "5ab68e226bfc141167a477779181c48a84cabe80f250c874182ad0364d0c3dd5"; } 55 - { locale = "eo"; arch = "linux-i686"; sha256 = "99a0cf562a067cd30d1047814c1984364b1702e93e638016a4fe8910868cfcdf"; } 56 - { locale = "eo"; arch = "linux-x86_64"; sha256 = "ba0bc0093bf2b0ea82eb958fdf06683f4941bd9a44138c793175a0b9e5a86ad4"; } 57 - { locale = "es-AR"; arch = "linux-i686"; sha256 = "3adaec2ccb2b1949492c27c466daa5809afc690bf0559418d2d60faae0b5456a"; } 58 - { locale = "es-AR"; arch = "linux-x86_64"; sha256 = "67f774442c64d653d624a270eea1202fad389f926c6b7dee56ef965e65311ef0"; } 59 - { locale = "es-CL"; arch = "linux-i686"; sha256 = "ee56546d943795434a6759a55dec6e848f244691dc234f4c62746aa1f73cb85d"; } 60 - { locale = "es-CL"; arch = "linux-x86_64"; sha256 = "cdbf12f21efb2e18d23ef9c6322c96469c72140200fa47c554067df3a9f89b8d"; } 61 - { locale = "es-ES"; arch = "linux-i686"; sha256 = "d3518ffe26d3c21beb009c657b93cf2f01be416f697d89beac497c71044f134a"; } 62 - { locale = "es-ES"; arch = "linux-x86_64"; sha256 = "ae34d9f586b28b1063cfebb755edc2a11214085f3a185f31d757c2358493ed13"; } 63 - { locale = "es-MX"; arch = "linux-i686"; sha256 = "09a03624363efba7e5d707c312f58e577019b8b7987d817fe1cf77bf2afa7dfc"; } 64 - { locale = "es-MX"; arch = "linux-x86_64"; sha256 = "820c50a0991779f664be8013e10a6db2833caa4b1fed370a7d6a8eb71f5766f3"; } 65 - { locale = "et"; arch = "linux-i686"; sha256 = "bb2d259606836c5d01d149f2735639cad7411efcd5e0e5deacdc3f1bbae8d80d"; } 66 - { locale = "et"; arch = "linux-x86_64"; sha256 = "17265f828cb3232cca73b3bf5b806cf361769c77bfef0e6571a16eb73036cccb"; } 67 - { locale = "eu"; arch = "linux-i686"; sha256 = "0bedcadc3b60ecb58af25d5950fe693063eb80f65d6d85e72ff0cdab3e7f2030"; } 68 - { locale = "eu"; arch = "linux-x86_64"; sha256 = "371d5648c7ffaf325ef34030ad0a9971246bc1df354fc11dd66bc461dce303fc"; } 69 - { locale = "fa"; arch = "linux-i686"; sha256 = "a7c55492f08e5f44d5cccb015d00abf8b8e74dec7da37e937f8d0f76a4c49338"; } 70 - { locale = "fa"; arch = "linux-x86_64"; sha256 = "6fe831c56d96dbed1c4a6859ba58dc20bbdf43efbc2bb225a707df7966f8b9dc"; } 71 - { locale = "ff"; arch = "linux-i686"; sha256 = "5cf4f3235db02c385ffc355e0fa1060b79afd5a8899ff31da1d0dad4d065e4cf"; } 72 - { locale = "ff"; arch = "linux-x86_64"; sha256 = "0576772ddcbdbe3d26ae20dd47b4e635de709c34eb6a797afab7743ac68815bf"; } 73 - { locale = "fi"; arch = "linux-i686"; sha256 = "8edd2e8058fc848456b2dc1bb54f669159b232b5423dcde6638e5d61294f1ffe"; } 74 - { locale = "fi"; arch = "linux-x86_64"; sha256 = "94bd189308502abea3d6d762378220097d3d743cc42872e6c43cdcd86aa51b4f"; } 75 - { locale = "fr"; arch = "linux-i686"; sha256 = "652f87501ba2a5baf1de865d7a607837a9ed623834c2d796baf4e3891fc78a6b"; } 76 - { locale = "fr"; arch = "linux-x86_64"; sha256 = "94c3725ea6fc2a7833e9ee60fdcd0ae3a53c80ce7f13ca00634b5d99b12a4607"; } 77 - { locale = "fy-NL"; arch = "linux-i686"; sha256 = "8d9ed839afa148da954acfdca139dbcf9f235c097fc7c562a8ab52f9ece68b4b"; } 78 - { locale = "fy-NL"; arch = "linux-x86_64"; sha256 = "650c8a50b8473fd09dbcd1c818ca8c3ab0c6618696198124f32e0153307e2aa3"; } 79 - { locale = "ga-IE"; arch = "linux-i686"; sha256 = "a70af727b36bc7d084211a880318f3a9f73977ff75f728b50cc4bfa9398c61d2"; } 80 - { locale = "ga-IE"; arch = "linux-x86_64"; sha256 = "01d3635c38068facc135fcca979517d729999db52f4a00c0b2ee27cf830df870"; } 81 - { locale = "gd"; arch = "linux-i686"; sha256 = "9763cbe0387cb86f91cdd6b1dfa6e257cc40c4525c753869ee091bfe49f172e8"; } 82 - { locale = "gd"; arch = "linux-x86_64"; sha256 = "16d3452fdbabada41626d981dee0e48282d672d9d6073b363ede9e86c4ed56ce"; } 83 - { locale = "gl"; arch = "linux-i686"; sha256 = "facde8f17e2f90e49a02b36d016535e1123c7f78ac44ee1110c80dc472e84133"; } 84 - { locale = "gl"; arch = "linux-x86_64"; sha256 = "b0955c4381f7f0013e9e0b1dcf8d8c53a3bf694af6970638b2e88dc080771ed7"; } 85 - { locale = "gu-IN"; arch = "linux-i686"; sha256 = "cb42e0750736bd14c81bbb76bb05e02c97e798b01d9f41bad091295f9bbb5655"; } 86 - { locale = "gu-IN"; arch = "linux-x86_64"; sha256 = "c497650eda2e4fc0f99b9d9c1ef0df33b0ea7b6e32d2eb7d4ee109e5ae1f2add"; } 87 - { locale = "he"; arch = "linux-i686"; sha256 = "d4cc561b6ce55f0820e6bd8479de9fd1ed53fd228e7cef28a890aebd687c26aa"; } 88 - { locale = "he"; arch = "linux-x86_64"; sha256 = "9294083a0ce8b06cc565c9d643d3e45d50393a5abff230dde8fe42aa29d8b870"; } 89 - { locale = "hi-IN"; arch = "linux-i686"; sha256 = "3493dda678fe94e13d34a62d194b612037f472546b96a94de2390706139636ef"; } 90 - { locale = "hi-IN"; arch = "linux-x86_64"; sha256 = "db45625e758d3db82705373004cc16176f8376bf087ac11da06c7c22e613dc2a"; } 91 - { locale = "hr"; arch = "linux-i686"; sha256 = "227399d033c4a7877387ac965d84ac265600bc16614de1b99618f39808b92894"; } 92 - { locale = "hr"; arch = "linux-x86_64"; sha256 = "a4f061ed24c66f936da13f8d93eb311f8fda7cc468d7cc9f71a4c747bbd9af19"; } 93 - { locale = "hsb"; arch = "linux-i686"; sha256 = "41bc010d4cca63bc77b8d637e6ca2731e3c5900b6783955335aae0ee3d2eedae"; } 94 - { locale = "hsb"; arch = "linux-x86_64"; sha256 = "4618d03269cad3fe8ca3d618de581d37fef37b9276e72613d2c12b212bb2c894"; } 95 - { locale = "hu"; arch = "linux-i686"; sha256 = "be456ef5df061985f7413fc7af45b4f0b86ac4a99a57d3574d8ad6dba727a8fe"; } 96 - { locale = "hu"; arch = "linux-x86_64"; sha256 = "c229ca2c9fba2ac98e912e5c5f4500d423b1f2cbf768e539112e97c0f0fe410b"; } 97 - { locale = "hy-AM"; arch = "linux-i686"; sha256 = "0a569d1b8c8d685c3eb5701471420aa47110c737504a105f660dca72a82490af"; } 98 - { locale = "hy-AM"; arch = "linux-x86_64"; sha256 = "b15c86feb6d69005244f409290489d8f5ffaff0c85ec876ba931be38c7de07b0"; } 99 - { locale = "id"; arch = "linux-i686"; sha256 = "dc8ca98414ccc67087c896c84a0a223026f12ed9fec499eba6203b8ec0b3e6e7"; } 100 - { locale = "id"; arch = "linux-x86_64"; sha256 = "6a831ab4c2605fdbac15ac81853a19f5c8633756ad5136f93c3eb76637e2b997"; } 101 - { locale = "is"; arch = "linux-i686"; sha256 = "02e9a2022c0da27e069689d25ba80c1d04dc29e6a045833fa1c5e503b5ca9f9a"; } 102 - { locale = "is"; arch = "linux-x86_64"; sha256 = "0ffd2b8f1fdafd91ae4e089c075446f57adcc748bea4994d40207e5cba9a5655"; } 103 - { locale = "it"; arch = "linux-i686"; sha256 = "f84d5304a37e33883322c9c508f4d342f99901c9339d293308ef78bb561a3c40"; } 104 - { locale = "it"; arch = "linux-x86_64"; sha256 = "78c5cb912d6c24d5a7636fd400470d298e4f58493ca6fd3e5f6b88e4b8037e77"; } 105 - { locale = "ja"; arch = "linux-i686"; sha256 = "a3d563846ef60176712574a9f66d24a785f749390afde21cbc4823e9d30cc3ba"; } 106 - { locale = "ja"; arch = "linux-x86_64"; sha256 = "56bdf673d645dff09e96970fc4cb33b1810d57051e7c12f6fe1ba01fa971e293"; } 107 - { locale = "kk"; arch = "linux-i686"; sha256 = "a5b10502bacf265e2157b7246457c33adcf037e4e28291e26a7fdd9f53f94638"; } 108 - { locale = "kk"; arch = "linux-x86_64"; sha256 = "2a7c74168d040653cbc31d6d03846b9165f617cebb74388818d73d681056561d"; } 109 - { locale = "km"; arch = "linux-i686"; sha256 = "26e696f0a03d7d6c3541563f89ba08d06a47039ca93f15d2f1909db7ca1b8d08"; } 110 - { locale = "km"; arch = "linux-x86_64"; sha256 = "18676450680d18631a855dcf91fd4592f8e3e908b04122476ae62d619bfbdd4f"; } 111 - { locale = "kn"; arch = "linux-i686"; sha256 = "cf6c95c0f06381f3aa4eb03c8854a530e63b0b5c6d971dc019a5c6cf81f80b0b"; } 112 - { locale = "kn"; arch = "linux-x86_64"; sha256 = "fabd1b824a4593454f8c9d7c6c47f7244ec9d1800cbe397042fb3bc41a75d09b"; } 113 - { locale = "ko"; arch = "linux-i686"; sha256 = "d3d9ff36de18ca424511df1ddbd4c49c84499491510a064a6f55f15599e1c172"; } 114 - { locale = "ko"; arch = "linux-x86_64"; sha256 = "e8eef3e4c6201e1d1e936ee6ec53f875b6c2a0496d308b8fbe03b5cbdf229bec"; } 115 - { locale = "lij"; arch = "linux-i686"; sha256 = "de6b35a675539d1bf0ff1c8f3837ba030da64b0e51c30e594515ac13578495f5"; } 116 - { locale = "lij"; arch = "linux-x86_64"; sha256 = "9d2351a7bed09127b618cfd86f2d394fdefcbbf2801da3a60a697982b5bbb9f1"; } 117 - { locale = "lt"; arch = "linux-i686"; sha256 = "5e5c3d5083b8d71a249f9e5009072132c9524063fa0cdb1f47ad0ff5260725c7"; } 118 - { locale = "lt"; arch = "linux-x86_64"; sha256 = "c57df2ce20d09070514f783a12e179ff05a4ac14e7ec67b0081f284f70079468"; } 119 - { locale = "lv"; arch = "linux-i686"; sha256 = "30267f85939965eab0ec50f4c869a0a42fa0d0775ae516088f9a3ff57f1bf3d2"; } 120 - { locale = "lv"; arch = "linux-x86_64"; sha256 = "c1389231d627df347910d28172a823da18f2ebd5697093035faa499da24755eb"; } 121 - { locale = "mai"; arch = "linux-i686"; sha256 = "6dec829e1ea28f8c4480d0517f72909d2d652fd827693dc919298906b62b47d2"; } 122 - { locale = "mai"; arch = "linux-x86_64"; sha256 = "29ed57ad173243d7cc2460a534c3f63709e235db74810a0d6f12dc460c5f4a52"; } 123 - { locale = "mk"; arch = "linux-i686"; sha256 = "98d4c529ca979e4ba03b3c1640feb0c93ca1ac2a92ac07403a39a07adce8df44"; } 124 - { locale = "mk"; arch = "linux-x86_64"; sha256 = "53d6752d67e3277afe3ea239ceb1f890edc5a15fe078d41bc074246598376603"; } 125 - { locale = "ml"; arch = "linux-i686"; sha256 = "321d682e8e1e42e8e4522d791e7e7ae13d1622d740038f3586813099f0275d96"; } 126 - { locale = "ml"; arch = "linux-x86_64"; sha256 = "f0dfba4cd8fd961ef6c088ef9139b8ce5e33fcefa8cda142c9f51bfae663c092"; } 127 - { locale = "mr"; arch = "linux-i686"; sha256 = "b40b8fbbe5ab56055d57f7b9a67ff00e84b7c7d19afc7bb07b4311ef3fb6c66b"; } 128 - { locale = "mr"; arch = "linux-x86_64"; sha256 = "3bb64e13d59a1c65460282e4236655a0c2997d894e9b897a8dc3b20a4baca3c9"; } 129 - { locale = "ms"; arch = "linux-i686"; sha256 = "15aeda467f0c0c893dd923ee56fcf2547242f0a4089709ce0cbdb27778c71b1b"; } 130 - { locale = "ms"; arch = "linux-x86_64"; sha256 = "32cea21ff68efd7c384746c32c0138464fbae4d25065fe58d6d56e191ee5b082"; } 131 - { locale = "nb-NO"; arch = "linux-i686"; sha256 = "371af3de1ae68ba242cc55cb7c080008ca305c61d5c8c4e687f53568bcb8f416"; } 132 - { locale = "nb-NO"; arch = "linux-x86_64"; sha256 = "54e17787e0d31893dcba314e98cfb795fd6f85e335a0e84ce35a0f44a56b6e1d"; } 133 - { locale = "nl"; arch = "linux-i686"; sha256 = "92df7a99107ccd938800161e759beb6269a6a30f69c892064e130280a3caa692"; } 134 - { locale = "nl"; arch = "linux-x86_64"; sha256 = "41c1bfc828917d58cf8f334b8d2b333ddb50dd416faaae41a0c063bd8c23942c"; } 135 - { locale = "nn-NO"; arch = "linux-i686"; sha256 = "ad96e3c670c244d366ce0d600d87a308d95e51309ab86becf1c8c69245dbed0f"; } 136 - { locale = "nn-NO"; arch = "linux-x86_64"; sha256 = "eee10d92a2bcc32507936c3c2c5c2c220a4de955aa8b48d23f0d923c9b0faa48"; } 137 - { locale = "or"; arch = "linux-i686"; sha256 = "1ddaa000c9b3d5a7dccdddaeb8fda53ba821935bf24ee5c2ca0053e3b2900bd7"; } 138 - { locale = "or"; arch = "linux-x86_64"; sha256 = "0d62ab80bdd5853d8dfae01d9420929d9321d1f6b9f40d372c6241f1345de76a"; } 139 - { locale = "pa-IN"; arch = "linux-i686"; sha256 = "accdde423ac5c518d14b435d00e1f536cd240f31108b58f0b5e1a925637faab4"; } 140 - { locale = "pa-IN"; arch = "linux-x86_64"; sha256 = "89ae2f460c6fdab846d6b41dba84f63c94a7bfc1f61e3e79da5d643d4c1a1fca"; } 141 - { locale = "pl"; arch = "linux-i686"; sha256 = "d8e043d8ba0c223f0232facef10b6d2e2ee13733bf8670a9101796bfddb3c2f1"; } 142 - { locale = "pl"; arch = "linux-x86_64"; sha256 = "f6ada91433d48b699c02fddf22e2d8aa36e6b0cc365b73625bf6fb80ed3fb877"; } 143 - { locale = "pt-BR"; arch = "linux-i686"; sha256 = "b2d294d7761cfc3c8a58ee072bb8a0b82cc79724f6b103073632e682fda32f60"; } 144 - { locale = "pt-BR"; arch = "linux-x86_64"; sha256 = "642c56b5d510f5efc8a365be956789d7760bfe983aa397ae194eef5bd15f601b"; } 145 - { locale = "pt-PT"; arch = "linux-i686"; sha256 = "6bc224414c39047c42040ebaaa7e7d61bb09939a9878ec4a2d7d7e8c31a7ecfc"; } 146 - { locale = "pt-PT"; arch = "linux-x86_64"; sha256 = "cc00a2fb38fed6ffef5a6a6931b043c65948c18f3d502a0e3ae641a1847203b7"; } 147 - { locale = "rm"; arch = "linux-i686"; sha256 = "2cebf2678e1a469447205a7495f17185259d73a72439f8fd400eee957e571bbc"; } 148 - { locale = "rm"; arch = "linux-x86_64"; sha256 = "32fe2ef01b0d495476768eff7e4750c2c82196e60f50c2e824adbf611f275289"; } 149 - { locale = "ro"; arch = "linux-i686"; sha256 = "289cef6b438a59bac459c203a6b1b2965b089f1487ea78ff524a6a68f5996862"; } 150 - { locale = "ro"; arch = "linux-x86_64"; sha256 = "7df67b1a5a12297a214d1f794c84b58ca12a182ee780e2574116214dfc785388"; } 151 - { locale = "ru"; arch = "linux-i686"; sha256 = "65fd6a9a90b4e5c8fc784850dd5bce41901b0d241dae9c37110bf99643d52d32"; } 152 - { locale = "ru"; arch = "linux-x86_64"; sha256 = "585683dca4c427ecbcc17d42465b6e374a76d5266b908df1b47f4a1ad81e7794"; } 153 - { locale = "si"; arch = "linux-i686"; sha256 = "6567d5ab15a1bd20426569a6480d6e44f2c1917145fa607357f0d3d0502c840a"; } 154 - { locale = "si"; arch = "linux-x86_64"; sha256 = "f0aad93013b6070516851a13352d1aabd0d10bd7891eaea878d3632c1b295296"; } 155 - { locale = "sk"; arch = "linux-i686"; sha256 = "c6da9d539302dca6ad8e3165ca595eb80438fb4caea11979c0e07ca215696929"; } 156 - { locale = "sk"; arch = "linux-x86_64"; sha256 = "236dd9171f471849e8cddb2b8ff0166e41bdedcb0bb3c1662fdffa83c3e89374"; } 157 - { locale = "sl"; arch = "linux-i686"; sha256 = "4b9160bfa7579fc893a40387f0185cb74d7db2cfb0eabd2aa032259ed53b7a97"; } 158 - { locale = "sl"; arch = "linux-x86_64"; sha256 = "56bc853e4e5e21d08b2ccd04687388473c45ac4403d0b51ed41d8a6a3a26e396"; } 159 - { locale = "son"; arch = "linux-i686"; sha256 = "b73fcee703ce937ec25993da5e09163541fef9eaa4e65ec7d5358f1dfa1b596f"; } 160 - { locale = "son"; arch = "linux-x86_64"; sha256 = "95ef838ac58e82ec435ddf7e2ea0bbf8b8d1bdb34832aa664d1ad8f5abbd9a13"; } 161 - { locale = "sq"; arch = "linux-i686"; sha256 = "370313d2cf543ab3aeaa5de11f748d69a168a82d6e29c27d4c398bb577fdb06d"; } 162 - { locale = "sq"; arch = "linux-x86_64"; sha256 = "a86a6604169ab6d9bc2657a0d26db0a3f96b2927223c5a43128dcf49bad243f1"; } 163 - { locale = "sr"; arch = "linux-i686"; sha256 = "a7ad2ec678944f37cfee69025871369b658013f77df9df0f1bbfd9cbc03666d2"; } 164 - { locale = "sr"; arch = "linux-x86_64"; sha256 = "b081bc35064722b4de95f4e29c4ee203bca124ebe0c33bbf91f0e11f904928f7"; } 165 - { locale = "sv-SE"; arch = "linux-i686"; sha256 = "5a6fe1f1c7e1d5bd91a0c82e47ce5b88e31611cf51d6452afde3ef06d2d1a695"; } 166 - { locale = "sv-SE"; arch = "linux-x86_64"; sha256 = "9a09a020acabfaef4fa25d94723fa437c57761f0dbd9bda880b8ca3acb5248df"; } 167 - { locale = "ta"; arch = "linux-i686"; sha256 = "0e0839d5a899576f3fd796079748dba8612526bd5f855e8718eccb3ed05944c0"; } 168 - { locale = "ta"; arch = "linux-x86_64"; sha256 = "cdcd8e06216289df7cdb4f82f01207a7112fa4f52040bd70c2f497b3d701730a"; } 169 - { locale = "te"; arch = "linux-i686"; sha256 = "e4609f803edb243ba8c8fbfb7ecea2e652a9e94adeec2f6c03af42c2e8bc5b74"; } 170 - { locale = "te"; arch = "linux-x86_64"; sha256 = "b9151a27be6a8de94fa25b53dfb85e765cc2ff823c2de6a0d0583883fc30ea48"; } 171 - { locale = "th"; arch = "linux-i686"; sha256 = "48349866a10948cc0b4f8b6bc2fecd5dcbd4d09ff4ba569f7fb3e569edadd976"; } 172 - { locale = "th"; arch = "linux-x86_64"; sha256 = "ef38e6a99cc8cb9e32e95af0ae7f7c99b82310e28b082b6aa085aa80f180ef60"; } 173 - { locale = "tr"; arch = "linux-i686"; sha256 = "fbad5fa2196dddb5061fec1f47fa7af85c0a824f520588b7446d2740928e34cd"; } 174 - { locale = "tr"; arch = "linux-x86_64"; sha256 = "c644f251f1e43acc3baa550b540750fb7d11c2f440c7906e1955d34694a0d718"; } 175 - { locale = "uk"; arch = "linux-i686"; sha256 = "9db7dc494734011ed61c5286fcb1f4b4dfb418528792ef92fbfc3734a9618129"; } 176 - { locale = "uk"; arch = "linux-x86_64"; sha256 = "06cbcceb189bad7174cf46678535cd4bfb1062e5ac878fd313fc341315001106"; } 177 - { locale = "uz"; arch = "linux-i686"; sha256 = "cfa94474277edc7739c11795b2907b894c87f5c573c43aaf5a951a2f13a9c8ef"; } 178 - { locale = "uz"; arch = "linux-x86_64"; sha256 = "e3a581e965fbb3711e6ca6d6d5b378eded8e8ea9767f94993c50632b6f4a7aed"; } 179 - { locale = "vi"; arch = "linux-i686"; sha256 = "ecd4a5b8fa66e78cdb93b04eb2b3a5ac354bd5e231d8f4bcbf2acfb94b5190b5"; } 180 - { locale = "vi"; arch = "linux-x86_64"; sha256 = "1d52852d973d5d6bea8ef860b216aff4eea59dff576f13ae67aa9b96ef0c9878"; } 181 - { locale = "xh"; arch = "linux-i686"; sha256 = "24befe5e2fe2001ab3827543f97b52ecd15f5cbad89d977584aa4dc08a0e9c11"; } 182 - { locale = "xh"; arch = "linux-x86_64"; sha256 = "4cafc2a6028d8141e47b09a9d8d96404cb4b5806cfaab452566f9a7baff89f25"; } 183 - { locale = "zh-CN"; arch = "linux-i686"; sha256 = "80ec43ed8918fa452271988d53875f184196460b15086fe793af4842458ab790"; } 184 - { locale = "zh-CN"; arch = "linux-x86_64"; sha256 = "1d3fc933a5b3f4082fac9176f6a802e01f8a26d711c339116799e58629843f27"; } 185 - { locale = "zh-TW"; arch = "linux-i686"; sha256 = "a255ce81f6ac1774ae6c8a5b9208169864a672f22f7037c93f01758c4eaa357b"; } 186 - { locale = "zh-TW"; arch = "linux-x86_64"; sha256 = "27b048c3df2ff25fd6f7c33cc30016e8a657a2f30ef7b0da9a2f4097c1b5e494"; } 9 + { locale = "ach"; arch = "linux-i686"; sha256 = "1274cb4148d115ab4d8bc5b5c6826e80863e2bf0f76f0165521beb5da2fb5d22"; } 10 + { locale = "ach"; arch = "linux-x86_64"; sha256 = "2184a0a1b3bcb833369959cb1fb641ac9501dad40828d7260022dc3492f4444b"; } 11 + { locale = "af"; arch = "linux-i686"; sha256 = "807efe3a2277494f04e957b60f033c31d58145b5dd1e13fac3c027e811849932"; } 12 + { locale = "af"; arch = "linux-x86_64"; sha256 = "53f654dca168125a1c55842125c3480f41d3f66b5ea2b0978912f5602d7a317b"; } 13 + { locale = "an"; arch = "linux-i686"; sha256 = "ad97be84a2c59570919939ad72542d140a7c46c45ae2747c24f5cbebbf201222"; } 14 + { locale = "an"; arch = "linux-x86_64"; sha256 = "1608d249fb454be2d241f512d74662d0089f85a1d7ff8888d43aa3efcd6c2f73"; } 15 + { locale = "ar"; arch = "linux-i686"; sha256 = "d464251e1734271cf5854d2b9dcc7bb391205f78f6f80263b5648e0e03e841b8"; } 16 + { locale = "ar"; arch = "linux-x86_64"; sha256 = "0cfb84665d40bc40f3a2bf77f58fd499ec9a33aec3c82aa384edda9fb64756eb"; } 17 + { locale = "as"; arch = "linux-i686"; sha256 = "d20fe776c5a036016a89754e30a773082ec018112d7f8848b532f56aa3f91bd6"; } 18 + { locale = "as"; arch = "linux-x86_64"; sha256 = "4eec5f44fa188e84376cb87249410decd7662271782f347d7f9cda40a52b40ad"; } 19 + { locale = "ast"; arch = "linux-i686"; sha256 = "2c75f6b6cc9202d090eb349f9fc4f5995724d6c5675149dfdfb0476475e964d6"; } 20 + { locale = "ast"; arch = "linux-x86_64"; sha256 = "39b23638d5e2aea613ec0f32b7ad71b7084dd333146413c82d5f91c42d7bc099"; } 21 + { locale = "az"; arch = "linux-i686"; sha256 = "b07d6481777a4b9bf1f06a00c820e4cad6e7ae414099afb1619bb1ae71fc8b5d"; } 22 + { locale = "az"; arch = "linux-x86_64"; sha256 = "da5852870bda9c27ec1a16893d990180e08031565c54390828c0ae2d38cedc89"; } 23 + { locale = "be"; arch = "linux-i686"; sha256 = "a04ee5c4521e46675919aa9cac9a56277cd741195248ffcf260eaf875e992afb"; } 24 + { locale = "be"; arch = "linux-x86_64"; sha256 = "41d8a66b2f39575c7fd5164464c0c8430255e86a2c56eaaef1283107fe92832d"; } 25 + { locale = "bg"; arch = "linux-i686"; sha256 = "edf94d80e1a9641569123f6a711699f840919398e5e7230fa4fde9d35b0ad09c"; } 26 + { locale = "bg"; arch = "linux-x86_64"; sha256 = "8e1fc0d661c3b54ecc2848fb9309040c4250e0eb9be206e515474dc0cf893ed4"; } 27 + { locale = "bn-BD"; arch = "linux-i686"; sha256 = "76237b91fd2efe99f07c11d6a0080e85dd7ea6c0414e917a74da6d1361297439"; } 28 + { locale = "bn-BD"; arch = "linux-x86_64"; sha256 = "c6cc9b00423124879b4900918ff791531c7b3b3f11866ad16fb27630aba6a1a8"; } 29 + { locale = "bn-IN"; arch = "linux-i686"; sha256 = "ea378725ca575e30f42dabff703acfc7246498fd765dcd3fc2922f0fbb0cda31"; } 30 + { locale = "bn-IN"; arch = "linux-x86_64"; sha256 = "fbf01a2b84d8aa35a388baaf56b2034207a12f4a2a9b79faaccf772f8a23d705"; } 31 + { locale = "br"; arch = "linux-i686"; sha256 = "adbbcfd6cff2e0dc5fbcaa91dd6b2dfc13d04a80be35ea365907d8aa2f17256a"; } 32 + { locale = "br"; arch = "linux-x86_64"; sha256 = "7b557210b559f920dd3b9e69371d98f08ce2fe0d929e04a1b88fd56fcc793122"; } 33 + { locale = "bs"; arch = "linux-i686"; sha256 = "32508d4c75f5e23e1082513ebc4a20f5f6d98277c5121abde475eaf48a762b81"; } 34 + { locale = "bs"; arch = "linux-x86_64"; sha256 = "a2c6354582d8dd42b8e180a705c158d4b85ba3ff68d97863129dc71b05a83612"; } 35 + { locale = "ca"; arch = "linux-i686"; sha256 = "e8155974306fd84d7fc3330ed7a8da5b234f1790dc6792c9e59648c93660866a"; } 36 + { locale = "ca"; arch = "linux-x86_64"; sha256 = "46cd90407fe839356b63eecdee839dbde68651ebb631419273b6c4d7d31d84ce"; } 37 + { locale = "cs"; arch = "linux-i686"; sha256 = "50cdc07a438ef44ff6a7585583c38c604a71081770f38add190079300afe3b54"; } 38 + { locale = "cs"; arch = "linux-x86_64"; sha256 = "1e4bf0b42a263a99b16bf083d0152e667fdd534c0a2cdcd6557f6b85506aa0e4"; } 39 + { locale = "cy"; arch = "linux-i686"; sha256 = "95c184685fa32bfa8999a953b1b1001d5d8a73ae82bd2b70d70e6feb990f5b77"; } 40 + { locale = "cy"; arch = "linux-x86_64"; sha256 = "7117b1067f753c7d692b73c6aab610fa0eabf423e24444f7ac8893339264414f"; } 41 + { locale = "da"; arch = "linux-i686"; sha256 = "46d179f893df3e7af77da5f3355d2418b0fcffd3060d0c9aebc62087075177b8"; } 42 + { locale = "da"; arch = "linux-x86_64"; sha256 = "0514a6f88470681b93a9d8202f48159d031387e5e42d14923cfa1cea2113d753"; } 43 + { locale = "de"; arch = "linux-i686"; sha256 = "4d30e8a59ba3ac04e387df7df6be1edf88b08ca37463fd9ccf301def3542cc35"; } 44 + { locale = "de"; arch = "linux-x86_64"; sha256 = "ae6f94e6a782103efd18515a6596a5ee06943b2d1321f03127d54ae7ed147131"; } 45 + { locale = "dsb"; arch = "linux-i686"; sha256 = "62880a87963abf9e36e820644a8165f980f7b48634b1a1f825f5aee0d2e19e74"; } 46 + { locale = "dsb"; arch = "linux-x86_64"; sha256 = "ff2a596f46b02bea98fa36defa0afd96c064912a79ea8b4f98aae46901624f22"; } 47 + { locale = "el"; arch = "linux-i686"; sha256 = "5fb00e56adfd520d114208ba72b9a3fb5306903e0b2b3669bb109549b0b4ef6e"; } 48 + { locale = "el"; arch = "linux-x86_64"; sha256 = "df3fd6d2206918c324182ada0a3bce912726a48383537be69a695e678a0cbeb5"; } 49 + { locale = "en-GB"; arch = "linux-i686"; sha256 = "d3e21c467cf25b5629cb9bfa5c18daba024e3665e5c69830f472dfc93b062e04"; } 50 + { locale = "en-GB"; arch = "linux-x86_64"; sha256 = "210d41c4e9861713dba228d34781b05850b9839606a975580b0dedca556e8e53"; } 51 + { locale = "en-US"; arch = "linux-i686"; sha256 = "78b95a47e73d2ef7d436f59fb1e7f300c6075bae4ab41d3557b6b17520416d57"; } 52 + { locale = "en-US"; arch = "linux-x86_64"; sha256 = "6f27b0499ee599b6dae1e7ef5a79e935fb186b6fdfb2f09274cdf40bcbf2006f"; } 53 + { locale = "en-ZA"; arch = "linux-i686"; sha256 = "f16af1ead4c5ba73ec2b137764cac5e610574f107763c20667f9d565f10b4ca6"; } 54 + { locale = "en-ZA"; arch = "linux-x86_64"; sha256 = "de561c70c19a8e921fe8035af4513a0b1c3fc184739f42e4d6e76051278a0e75"; } 55 + { locale = "eo"; arch = "linux-i686"; sha256 = "78670d675bff447c654717763157e4726e0fe3612568e993c2eb7cfd9b893ef7"; } 56 + { locale = "eo"; arch = "linux-x86_64"; sha256 = "fa8d9ddc8113a33c2c9776cee0eeeccf46b00aa2f099e9ebda3aef370104212c"; } 57 + { locale = "es-AR"; arch = "linux-i686"; sha256 = "77366f398047143357cf250903cc0ccc99c58bbf882e8de7f106237632a5c944"; } 58 + { locale = "es-AR"; arch = "linux-x86_64"; sha256 = "453245f940832fd4f3e3d3509d83e0e6d900d0154623b779a830d3d990652027"; } 59 + { locale = "es-CL"; arch = "linux-i686"; sha256 = "ff985d60ce0ae316c7b9452bd3f385d80a1ab5e1671119a859450e2a930edd65"; } 60 + { locale = "es-CL"; arch = "linux-x86_64"; sha256 = "992ae0721558d042041d46da1f8ed3763a2c9dbd2c54063e3ce074ef7a49329a"; } 61 + { locale = "es-ES"; arch = "linux-i686"; sha256 = "2195599d5d196903b21a27e3447524a31fc69845af2a02cd7e4e5ebc8d1695b2"; } 62 + { locale = "es-ES"; arch = "linux-x86_64"; sha256 = "9e7cafa1a4b9712c58812acaadd49f41c027dd41af569df326b9668d64fedfc3"; } 63 + { locale = "es-MX"; arch = "linux-i686"; sha256 = "63ed5abc352b5eb16e0f91c7da69cb9121363607c312674c6d9c9d2c45211bda"; } 64 + { locale = "es-MX"; arch = "linux-x86_64"; sha256 = "063c73c0285ec2761e7483d21f6e43769fc9cb7aeb7a93803e63fffb7c4245c4"; } 65 + { locale = "et"; arch = "linux-i686"; sha256 = "b331149411d855616857bd4eca5911f570deb601b203ce21ddf11b854de363e5"; } 66 + { locale = "et"; arch = "linux-x86_64"; sha256 = "a482ce4d21251a5757dafaf86d5afc708989db0a367357a34c3b5fba0a05f8ef"; } 67 + { locale = "eu"; arch = "linux-i686"; sha256 = "3ec3222f06b468a3d94b68c2dccbc21d9b63de765be90fdcb594be4146885786"; } 68 + { locale = "eu"; arch = "linux-x86_64"; sha256 = "411490db2e9acd6cc6170b8a6c90d7e2a9beb83f4437d087e755b0845aac8c4a"; } 69 + { locale = "fa"; arch = "linux-i686"; sha256 = "b7804d3f0c8c43ef256b44b0bd9e32caa2aab5c7a7ef3b072cd14adfc5b24e0e"; } 70 + { locale = "fa"; arch = "linux-x86_64"; sha256 = "91601b52dc9557e17eb80db60a0c9a023ea9ef5d06f8355b077b9e7ffd3800b3"; } 71 + { locale = "ff"; arch = "linux-i686"; sha256 = "2143e1d2629b4b1aa6f35f4dfbfaaece09711b65a9da80d6a7303d70362ca8a2"; } 72 + { locale = "ff"; arch = "linux-x86_64"; sha256 = "20fd859ea943e3d0a3bfd0427b07117233ac6c980aedf1c4461dc71f2f132ee4"; } 73 + { locale = "fi"; arch = "linux-i686"; sha256 = "6bea2d99cd49e3ddadecec22d4832abfd037b7e4a7036b2638f8dd61ba33e227"; } 74 + { locale = "fi"; arch = "linux-x86_64"; sha256 = "0eb961fd7512d0223dac43c4895a69404c1d533224d880e619ec91809ae476cc"; } 75 + { locale = "fr"; arch = "linux-i686"; sha256 = "86f07727d64fa4122291d9de053b8654d190833f89d3b4d382786c697ee47bf0"; } 76 + { locale = "fr"; arch = "linux-x86_64"; sha256 = "63b23116db3c464d6a7bd3e72f9fe82aa236c4e542994621194736fa76c16451"; } 77 + { locale = "fy-NL"; arch = "linux-i686"; sha256 = "de6ba7ee545d59c4d60380bc21a68e00cf88f6ce598d326cc04c57b104267610"; } 78 + { locale = "fy-NL"; arch = "linux-x86_64"; sha256 = "48a1e32a6f110119d729584cd0c5002bdbff2d67e3ed58e777e6eaf443449295"; } 79 + { locale = "ga-IE"; arch = "linux-i686"; sha256 = "42d784a229b674016e51ddd71d634fc20a39c6f6c3c9b98f8f52c1be2146a447"; } 80 + { locale = "ga-IE"; arch = "linux-x86_64"; sha256 = "7b8c257448701a7f252da43a6fd466bb80326405d81683525feefb1d1947856c"; } 81 + { locale = "gd"; arch = "linux-i686"; sha256 = "f192ee509e71d58dc8cdca8cfdae4d103bb9542b6c9a807f2b8e9e1b81f0309b"; } 82 + { locale = "gd"; arch = "linux-x86_64"; sha256 = "03135f6eb67046aee154040c1d089504ff307bc3fcbacc55c6266827e3675d6e"; } 83 + { locale = "gl"; arch = "linux-i686"; sha256 = "73fb03a71ccf7d6bd1dcb0fa28c21745f3944c28e51e700b190f1b872b38c2a0"; } 84 + { locale = "gl"; arch = "linux-x86_64"; sha256 = "33832cee5dabd5e9114b9848cebe505b59bbf9a0151f6ac9f3229edcf9462e6e"; } 85 + { locale = "gu-IN"; arch = "linux-i686"; sha256 = "8f2a45c81547a2b89194bdbc9e52f22d7d1b3bd356960433c970d59b2ce3b4d4"; } 86 + { locale = "gu-IN"; arch = "linux-x86_64"; sha256 = "4be14ca66c881c81f525d997cadc291632159722b5b9baabb430c9dfba6218e5"; } 87 + { locale = "he"; arch = "linux-i686"; sha256 = "452a9742ac4fc7ed3daa436bebe16a7d9530fe9c1587591e2a2a5247adcd4ce4"; } 88 + { locale = "he"; arch = "linux-x86_64"; sha256 = "57a347dccb36b7f53af06e850ea8170364fe4c50b2164fa6b51231eb834f777a"; } 89 + { locale = "hi-IN"; arch = "linux-i686"; sha256 = "8a4b1d09f715742fd9465d2fdd525d271b94ed1d0face088b8d1ae10b5ee00c6"; } 90 + { locale = "hi-IN"; arch = "linux-x86_64"; sha256 = "7a5f1dee1cd04118c366c315ed5d7228829e097e39405dd7115d85d0c4791517"; } 91 + { locale = "hr"; arch = "linux-i686"; sha256 = "05e80b6d007cd3cdfe2f993c5194ce84b9d111b500378f8da675b7c478a6ab51"; } 92 + { locale = "hr"; arch = "linux-x86_64"; sha256 = "570b5eb8072f39af37fa0f9bf3eb51ef538862c6488295ec8d193d84b8ed8206"; } 93 + { locale = "hsb"; arch = "linux-i686"; sha256 = "2b6a3c03d2f4c8e59503c896bb3654452cb75115aeec24c3b10f4a528c4c0322"; } 94 + { locale = "hsb"; arch = "linux-x86_64"; sha256 = "c94b2af1158abb85e0883c6cd8f6f361debfa99d2291f62c47fc7a2413c33758"; } 95 + { locale = "hu"; arch = "linux-i686"; sha256 = "0082c743077a1e50575b96e6e4ce4bd65c4fe6830b112d87fc0157556aa4d38d"; } 96 + { locale = "hu"; arch = "linux-x86_64"; sha256 = "3dba1ec3efed6f27429ddb7fb3cef5f5061783f6ca7ce3fc64de40e22159c1bd"; } 97 + { locale = "hy-AM"; arch = "linux-i686"; sha256 = "4ccb6b342a9a914392fa3a242136b39cba32f0d6029c5f5c4cb9c5c2658a9813"; } 98 + { locale = "hy-AM"; arch = "linux-x86_64"; sha256 = "632b713c29d84da3e3e800e7b520a84e3647b5717e08710fc32047270f037de5"; } 99 + { locale = "id"; arch = "linux-i686"; sha256 = "6bf6556a9ea92d2dfa3e49bb8563e2de5cc53b264c2e43fed08183717babeee8"; } 100 + { locale = "id"; arch = "linux-x86_64"; sha256 = "9d321c03c2392f590288c6f928838e2d5dffd27a7cd7b047199b8170a99619bc"; } 101 + { locale = "is"; arch = "linux-i686"; sha256 = "cb6f3d253b4f3bc010a3ea5be449c68050f893d7af912a7b161ef09af881774d"; } 102 + { locale = "is"; arch = "linux-x86_64"; sha256 = "edab26c92c2e5e3590775adfca72cddc876e0974cc4101ffe0554c79cec79f51"; } 103 + { locale = "it"; arch = "linux-i686"; sha256 = "7e09f9e10f216659afc0e4395e5914c99914dc62742b47091ffe104c70c5158d"; } 104 + { locale = "it"; arch = "linux-x86_64"; sha256 = "e1d362fea0f3abed1e9894d5c5ceb9648d4d29e908a99b0b31725d2fbd2f97d0"; } 105 + { locale = "ja"; arch = "linux-i686"; sha256 = "db2f20165e5f9d940e409694f10e045855a8dcbdc08004f637827348cea8d760"; } 106 + { locale = "ja"; arch = "linux-x86_64"; sha256 = "425784e5502ca41ec131fbb71a0f8390468d08a80848cbf8e8c27de752755646"; } 107 + { locale = "kk"; arch = "linux-i686"; sha256 = "c7faf20960a5882f61173974c62ce4f57e6d65f210a608c4ad29c6135f3f9de2"; } 108 + { locale = "kk"; arch = "linux-x86_64"; sha256 = "56849c7caa7b8058e65438a090e8d1c9465548afc8413ed9b62846147573649b"; } 109 + { locale = "km"; arch = "linux-i686"; sha256 = "1df201969617dd64f9532128216305780130871c2bd7b52632e9d6759efa633f"; } 110 + { locale = "km"; arch = "linux-x86_64"; sha256 = "5445cc000d95bf43a822d9f95581a75aee4ed267aa291a377c8bbd6e10d99bae"; } 111 + { locale = "kn"; arch = "linux-i686"; sha256 = "d6388df75df201b0d876fd2da6d4865fe9803a81ad385e3ec51cd0f1e23ee581"; } 112 + { locale = "kn"; arch = "linux-x86_64"; sha256 = "6fa81e2c9077ace3215de6583e860887209ef68d4cc15243a585771453a6e98f"; } 113 + { locale = "ko"; arch = "linux-i686"; sha256 = "2c7d2fa3727b5befdf8e538b0f31ea43a9f1ce4cd164ead8cddd231525f6d523"; } 114 + { locale = "ko"; arch = "linux-x86_64"; sha256 = "91f89a54979bd625ad5ff840bf876205a151e023b7fcfbd3a917fb2d9e586ce0"; } 115 + { locale = "lij"; arch = "linux-i686"; sha256 = "3bab33ddca338da11b75b34f2db6c78ac89ceec4b0936c1a0e54f71b00926da6"; } 116 + { locale = "lij"; arch = "linux-x86_64"; sha256 = "ad470c6c38adee3ba65098dd69a358176d8fc750b9e4062a4adffbd9d610a4cf"; } 117 + { locale = "lt"; arch = "linux-i686"; sha256 = "a2e50a5330a18ea49edbcc45f7cd0c6daf8044bb8e4393569bf937a03ea44be7"; } 118 + { locale = "lt"; arch = "linux-x86_64"; sha256 = "761ab112b43a21553bee96a845a0300b492f4189e49cf3952a5f2abb3ef3da98"; } 119 + { locale = "lv"; arch = "linux-i686"; sha256 = "08ee4150abdf8f6a5e609e7c7a86ad0624b65b6750df7f7e89fdcaeb2af3ab58"; } 120 + { locale = "lv"; arch = "linux-x86_64"; sha256 = "32e2ccb0b162c7b48a1b331547fb4449470833397662e37cad054885ddc22a1f"; } 121 + { locale = "mai"; arch = "linux-i686"; sha256 = "33733010e364be12ce023ae890afe14a95426a904429c422875d5cd0fbbbdd05"; } 122 + { locale = "mai"; arch = "linux-x86_64"; sha256 = "621886c515627faa305c3029b880d88f88671e2bf1dee55c07f29adeb7b3b07b"; } 123 + { locale = "mk"; arch = "linux-i686"; sha256 = "64833dae9d93818289edae4b3964dd6abcfe7b1a35751e6b4836d635ed383262"; } 124 + { locale = "mk"; arch = "linux-x86_64"; sha256 = "344f82fa85ba3ec1fc945aaf7e185b2fb7b6077ae9d178ba0bd31e381096b0da"; } 125 + { locale = "ml"; arch = "linux-i686"; sha256 = "7f659b446ead282c12be202510f42b0b286cf4667399ce891f2e412b23b9c39c"; } 126 + { locale = "ml"; arch = "linux-x86_64"; sha256 = "9277acf9c4836fbeef17482f87343cc14c81adaf0939b12dc943e28cdb42dbda"; } 127 + { locale = "mr"; arch = "linux-i686"; sha256 = "ab8a5d5282c43ba3e7b3007f9c85a8bb90f981a9eaaaaa2825b4767791a98aaf"; } 128 + { locale = "mr"; arch = "linux-x86_64"; sha256 = "032aa9462b189faee85aa41da633c44d91962ccf7e0f58ba332ef039d8c909f0"; } 129 + { locale = "ms"; arch = "linux-i686"; sha256 = "05446c324dd379bddb4adf457c8b889512383f97f3402fff915a331977fbad19"; } 130 + { locale = "ms"; arch = "linux-x86_64"; sha256 = "92f9ab50f8f6acc962408fccf2d04a431689a8b3ebfb7267b5354f3fd45f2ee1"; } 131 + { locale = "nb-NO"; arch = "linux-i686"; sha256 = "5f17aa376b3b427be78149330f39d7551c0662c96e3748353aaff66a0678d76a"; } 132 + { locale = "nb-NO"; arch = "linux-x86_64"; sha256 = "c80518adfb3297e9b86b6e756543af0c00b93b94a582ae0d2ea9ae09e492aa39"; } 133 + { locale = "nl"; arch = "linux-i686"; sha256 = "3742c55f29df607949a022c58198047c85bca9cce92bcac2ad3edd1d59369d3e"; } 134 + { locale = "nl"; arch = "linux-x86_64"; sha256 = "821242ff332f747a7e64e191821d5ef364ce60e81bc6469b578f418f6247138c"; } 135 + { locale = "nn-NO"; arch = "linux-i686"; sha256 = "666fde211cb7bafbc16d225a06717f12f3bc00b4bb1a1c370ae36013037ce8df"; } 136 + { locale = "nn-NO"; arch = "linux-x86_64"; sha256 = "0b552296bd154d78fb615f60feb63442ad9790c31101ede4bdb8dc101d163a26"; } 137 + { locale = "or"; arch = "linux-i686"; sha256 = "28453ca9c48bc0c06bd5f57f110d4a9d4d8418dd7175b353664eea3547dd2f94"; } 138 + { locale = "or"; arch = "linux-x86_64"; sha256 = "dc273e392c654be0160ee60c2db2ef90acff7771ed0aeade38dd96051df9ee29"; } 139 + { locale = "pa-IN"; arch = "linux-i686"; sha256 = "e690cf215c693ef3e934a5d4a2b06c98e4da3b205bf44b3392b6fbfaee464167"; } 140 + { locale = "pa-IN"; arch = "linux-x86_64"; sha256 = "b399037e89c83872238489ec82d6683f0383bd9efd559f497ca4c60f6b32d6b0"; } 141 + { locale = "pl"; arch = "linux-i686"; sha256 = "f455c411b3c46155bb37086f16878e18cbf493d6845ff5c9731ce86bf8743f1b"; } 142 + { locale = "pl"; arch = "linux-x86_64"; sha256 = "37561debefd6e7cc0790517bc0afa8e924b65abebee654390f1e175797b98eea"; } 143 + { locale = "pt-BR"; arch = "linux-i686"; sha256 = "f98e9944ae43b739f44743392e5aedf8eb968a1cdee85ee9e458225c2e250305"; } 144 + { locale = "pt-BR"; arch = "linux-x86_64"; sha256 = "b10a4c8ce4be229a384c48663fe1391b2a6ae276bacf0475660989fc795c9494"; } 145 + { locale = "pt-PT"; arch = "linux-i686"; sha256 = "9bbe3af6bad4f052332621e2cd2fbeefed70bdb1726045c49db23b2e5ccd116a"; } 146 + { locale = "pt-PT"; arch = "linux-x86_64"; sha256 = "b1b5df4587b7706e8f2ef95978cd1e8ff3d13e57f003a82918005a358175e87d"; } 147 + { locale = "rm"; arch = "linux-i686"; sha256 = "0e36c1f71249c93c2d7ed4e950f05e6879a57e5c2bd95da53ce7ebb5ce7b0264"; } 148 + { locale = "rm"; arch = "linux-x86_64"; sha256 = "91b165b2703605bf3fd53f610c1362b54ae4814eaeee4ee79e3dbca76c29f3f5"; } 149 + { locale = "ro"; arch = "linux-i686"; sha256 = "ec74d573c28236eee3e0db9f4f618666816598becca2547e6532d2c9ba49af59"; } 150 + { locale = "ro"; arch = "linux-x86_64"; sha256 = "da44dd696ecfa24ac80edd7b3270f960c35235e8be5c315a21a34305858fb14a"; } 151 + { locale = "ru"; arch = "linux-i686"; sha256 = "4c6a0778715f18eeebe377cb097c8871c30e704674ec28c96a239f24d7104256"; } 152 + { locale = "ru"; arch = "linux-x86_64"; sha256 = "be1f22e43c9bccc89dfe03bd5888fff08e7e15c9660d381435d86e0e9b55467c"; } 153 + { locale = "si"; arch = "linux-i686"; sha256 = "d4f78ac52a4457a8e28d7b87d1c9a58224f4b30f3b70178b721eef4207014ae2"; } 154 + { locale = "si"; arch = "linux-x86_64"; sha256 = "246c553262c646a5065c684b752f7e410973c3c7354b051ce404188efdd7393c"; } 155 + { locale = "sk"; arch = "linux-i686"; sha256 = "629fff240304c8e45854ec3d9d9e66b67430663484f17e93eb109738cf5c7d8b"; } 156 + { locale = "sk"; arch = "linux-x86_64"; sha256 = "804c9b3a7377ad0863e510e4a07166bcbe3fc89ba0704983e1b44122e0d1c6b4"; } 157 + { locale = "sl"; arch = "linux-i686"; sha256 = "546882ca19cc9b764264df9565ae13f0a72c167b641bfde2c5f040f1a62445a3"; } 158 + { locale = "sl"; arch = "linux-x86_64"; sha256 = "e6981343cdf05ac4e8f0b5f8477e3dbfaf852415089485e95dca74168a720489"; } 159 + { locale = "son"; arch = "linux-i686"; sha256 = "77d7c08293b29e773fdcd5bf3e9adab80b6bc838cb7557436b43cfd5db3b4247"; } 160 + { locale = "son"; arch = "linux-x86_64"; sha256 = "8853c8b5b650a1ec898c2819e3d185662fc2c1823a5c2c3db90154c023280a1d"; } 161 + { locale = "sq"; arch = "linux-i686"; sha256 = "1a9c4879b63973a02d6f4b9d7d07f0cfbcd1da2da5af82f0dba167d651f22126"; } 162 + { locale = "sq"; arch = "linux-x86_64"; sha256 = "6f713b8fdd256c0062bcd1f653a852cd2fb0d63c8bd5016d6bb72a70184b7fac"; } 163 + { locale = "sr"; arch = "linux-i686"; sha256 = "79efab1a2d6597ffbeef32b969febe70cf589695e0142208df1f4fdc8018d791"; } 164 + { locale = "sr"; arch = "linux-x86_64"; sha256 = "e2ae5c1b10e70c729c263f9950d3d20d1ecd011a76e3919c6b67cd410ac214b9"; } 165 + { locale = "sv-SE"; arch = "linux-i686"; sha256 = "79e75bf8894b5102373c58c19fbcf3bcc3c2c59bfdf3cf76c97306bd6def34da"; } 166 + { locale = "sv-SE"; arch = "linux-x86_64"; sha256 = "3dfbf13fefa507d6975de0e92ce5d32da1e0b7c1d6deb4fe7551b305cc818a51"; } 167 + { locale = "ta"; arch = "linux-i686"; sha256 = "9f3b56250f344da8bbb3fb23dda1c7bd5bd6dcb8997df27af3b92a259d0102cd"; } 168 + { locale = "ta"; arch = "linux-x86_64"; sha256 = "9ec347d26885049750c3a0d17c75557bcf67d3a28048920a6d7aafee5805e8f8"; } 169 + { locale = "te"; arch = "linux-i686"; sha256 = "b25bab31e21ff3fbb0eea10d1b127837c73e8e4bada958385c21482dafc1a7e4"; } 170 + { locale = "te"; arch = "linux-x86_64"; sha256 = "1c1e6b3dfa8ee24e40f05d41cf0da97c92108d7ca97645b4c4ce671c3fed641d"; } 171 + { locale = "th"; arch = "linux-i686"; sha256 = "350caf486c89265b61bfd91cc9df4a20d7ff1071fdf995e7aa03b8c27d83c702"; } 172 + { locale = "th"; arch = "linux-x86_64"; sha256 = "7a8784265237951140b62a219da144e2f5091cb1d75d8af3e5a4d3ebdc4a2d0e"; } 173 + { locale = "tr"; arch = "linux-i686"; sha256 = "b623db840358f2275143f0748fb988c7088799ab55ce4570ce8e47fa891b2c98"; } 174 + { locale = "tr"; arch = "linux-x86_64"; sha256 = "65f7883a2f03881949196c90ca2b3c13c374ccf51b749348a92040361671ace7"; } 175 + { locale = "uk"; arch = "linux-i686"; sha256 = "8ce4cae2d1fd912b9fd4e440012fa4dad7a912f6c78d3349cfa2a4764f609a94"; } 176 + { locale = "uk"; arch = "linux-x86_64"; sha256 = "53ac6bae5e8efbfc819df8f16eb9ebba2bce886db423743ac760c89dc48739a2"; } 177 + { locale = "uz"; arch = "linux-i686"; sha256 = "22a5e05529c6a4fb6488bfcc1e0c2b2297e72e18a47464e8e8148f1dc94c639e"; } 178 + { locale = "uz"; arch = "linux-x86_64"; sha256 = "8a3fa76e01715c602238bf0a5d31b8acb733d0efe9fbad390f6c2aa5d9e6ebb1"; } 179 + { locale = "vi"; arch = "linux-i686"; sha256 = "453f93b065b5e4f66d549c8482ef31edbbef5d9a77fefb87b25808540d368dd0"; } 180 + { locale = "vi"; arch = "linux-x86_64"; sha256 = "2965dbde06aa9207236b33636bec971dbd01f71f9b0d13681d991befec931242"; } 181 + { locale = "xh"; arch = "linux-i686"; sha256 = "edfffe8ab6f446760f13d5351be2c8f4cb2db28e9f1d6b9bb80b1e8fca191b42"; } 182 + { locale = "xh"; arch = "linux-x86_64"; sha256 = "ac3308380a60489a5965968215f7134fdb5e1f8586925fbb0c4d42cff940b794"; } 183 + { locale = "zh-CN"; arch = "linux-i686"; sha256 = "8058ee0f3a6ab3d229ce1f34ed4c38cbdc53e05cf1bb1a06535b7c12e7d5570d"; } 184 + { locale = "zh-CN"; arch = "linux-x86_64"; sha256 = "ea91bbd7af46d63996260a32737d55e191a2dce4827561ab1c60ade26ed4ca91"; } 185 + { locale = "zh-TW"; arch = "linux-i686"; sha256 = "18e9090333dd6a174feb0bc98dc849e933dd806205ea62d7cf292d8a6b65a2ca"; } 186 + { locale = "zh-TW"; arch = "linux-x86_64"; sha256 = "9dc786ddb1b87245c1fcc5e88e601a1b2680141c363336ae099d953405c2d6cb"; } 187 187 ]; 188 188 }
+2 -2
pkgs/applications/networking/browsers/mozilla-plugins/flashplayer-11/default.nix
··· 57 57 in 58 58 stdenv.mkDerivation rec { 59 59 name = "flashplayer-${version}"; 60 - version = "11.2.202.554"; 60 + version = "11.2.202.559"; 61 61 62 62 src = fetchurl { 63 63 url = "https://fpdownload.macromedia.com/pub/flashplayer/installers/archive/fp_${version}_archive.zip"; 64 - sha256 = "0pjan07k419pk3lmfdl5vww0ipf5b76cxqhxwjrikb1fc4x993fi"; 64 + sha256 = "1vb01pd1jhhh86r01nwdzcf66d72jksiyiyp92hs4khy6n5qfsl3"; 65 65 }; 66 66 67 67 buildInputs = [ unzip ];
+9 -6
pkgs/applications/networking/feedreaders/rawdog/default.nix
··· 1 1 { stdenv, fetchurl, pythonPackages }: 2 2 3 + let version = "2.21"; in 3 4 pythonPackages.buildPythonPackage rec { 4 - name = "rawdog-2.20"; 5 + name = "rawdog-${version}"; 5 6 6 7 src = fetchurl { 7 8 url = "http://offog.org/files/${name}.tar.gz"; 8 - sha256 = "0a63b26cc111b0deca441f498177b49be0330760c5c0e24584cdb9ba1e7fd5a6"; 9 + sha256 = "0f5z7b70pyhjl6s28hgxninsr86s4dj5ycd50sv6bfz4hm1c2030"; 9 10 }; 10 11 11 12 propagatedBuildInputs = with pythonPackages; [ feedparser ]; 12 13 13 14 namePrefix = ""; 14 15 15 - meta = { 16 + meta = with stdenv.lib; { 17 + inherit version; 16 18 homepage = "http://offog.org/code/rawdog/"; 17 - description = "An RSS Aggregator Without Delusions Of Grandeur"; 18 - license = stdenv.lib.licenses.gpl2; 19 - platform = stdenv.lib.platforms.unix; 19 + description = "RSS Aggregator Without Delusions Of Grandeur"; 20 + license = licenses.gpl2; 21 + platform = platforms.unix; 22 + maintainers = with maintainers; [ nckx ]; 20 23 }; 21 24 }
+5
pkgs/applications/networking/irc/hexchat/default.nix
··· 20 20 desktop_file_utils hicolor_icon_theme 21 21 ]; 22 22 23 + #hexchat and heachat-text loads enchant spell checking library at run time and so it needs to have route to the path 24 + patchPhase = '' 25 + sed -i "s,libenchant.so.1,${enchant}/lib/libenchant.so.1,g" src/fe-gtk/sexy-spell-entry.c 26 + ''; 27 + 23 28 configureFlags = [ "--enable-shm" "--enable-textfe" ]; 24 29 25 30 meta = with stdenv.lib; {
+3 -3
pkgs/applications/networking/irc/xchat/default.nix
··· 1 - {stdenv, fetchurl, pkgconfig, tcl, gtk}: 1 + {stdenv, fetchurl, pkgconfig, tcl, gtk, gtkspell }: 2 2 3 3 stdenv.mkDerivation { 4 4 name = "xchat-2.8.8"; ··· 6 6 url = http://www.xchat.org/files/source/2.8/xchat-2.8.8.tar.bz2; 7 7 sha256 = "0d6d69437b5e1e45f3e66270fe369344943de8a1190e498fafa5296315a27db0"; 8 8 }; 9 - buildInputs = [pkgconfig tcl gtk]; 10 - configureFlags = "--disable-nls"; 9 + buildInputs = [pkgconfig tcl gtk gtkspell]; 10 + configureFlags = "--disable-nls --enable-spell=gtkspell"; 11 11 12 12 patches = [ ./glib-top-level-header.patch ]; 13 13
+3 -3
pkgs/applications/networking/mailreaders/imapfilter.nix
··· 1 1 { stdenv, fetchurl, openssl, lua, pcre }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "imapfilter-2.5.7"; 4 + name = "imapfilter-2.6.3"; 5 5 6 6 src = fetchurl { 7 - url = "https://github.com/lefcha/imapfilter/archive/v2.5.7.tar.gz"; 8 - sha256 = "1l7sg7pyw1i8cxqnyb5xv983fakj8mxq6w44qd7w3kc7l6ixd4n7"; 7 + url = "https://github.com/lefcha/imapfilter/archive/v2.6.3.tar.gz"; 8 + sha256 = "0i6j9ilzh43b9gyqs3y3rv0d9yvbbg12gcbqbar9i92wdlnqcx0i"; 9 9 }; 10 10 11 11 makeFlagsArray = "PREFIX=$(out)";
+3 -1
pkgs/applications/networking/mumble/default.nix
··· 54 54 cp man/mum* $out/share/man/man1 55 55 '' + (overrides.installPhase or ""); 56 56 57 + enableParallelBuilding = true; 58 + 57 59 meta = { 58 60 description = "Low-latency, high quality voice chat software"; 59 61 homepage = "http://mumble.sourceforge.net/"; ··· 95 97 type = "murmur"; 96 98 97 99 postPatch = optional iceSupport '' 98 - sed -i 's,/usr/share/Ice/,${zeroc_ice}/,g' src/murmur/murmur.pro 100 + grep -Rl '/usr/share/Ice' . | xargs sed -i 's,/usr/share/Ice/,${zeroc_ice}/,g' 99 101 ''; 100 102 101 103 configureFlags = [
+1 -1
pkgs/applications/networking/newsreaders/liferea/default.nix
··· 38 38 ''; 39 39 40 40 meta = with stdenv.lib; { 41 - description = "A GTK-based news feed agregator"; 41 + description = "A GTK-based news feed aggregator"; 42 42 homepage = http://lzone.de/liferea/; 43 43 license = licenses.gpl2Plus; 44 44 maintainers = with maintainers; [ vcunat romildo ];
+7 -4
pkgs/applications/networking/p2p/qbittorrent/default.nix
··· 1 1 { stdenv, fetchurl, pkgconfig, which 2 - , boost, libtorrentRasterbar, qt4 2 + , boost, libtorrentRasterbar, qt5 3 3 , debugSupport ? false # Debugging 4 4 , guiSupport ? true, dbus_libs ? null # GUI (disable to run headless) 5 5 , webuiSupport ? true # WebUI ··· 10 10 with stdenv.lib; 11 11 stdenv.mkDerivation rec { 12 12 name = "qbittorrent-${version}"; 13 - version = "3.2.3"; 13 + version = "3.3.1"; 14 14 15 15 src = fetchurl { 16 16 url = "mirror://sourceforge/qbittorrent/${name}.tar.xz"; 17 - sha256 = "05590ak4nnqkah8dy71cxf7mqv6phw0ih1719dm761mxf8vrz9w6"; 17 + sha256 = "1li9law732n4vc7sn6i92pwxn8li7ypqaxcmfpm17kk978immlfs"; 18 18 }; 19 19 20 20 nativeBuildInputs = [ pkgconfig which ]; 21 21 22 - buildInputs = [ boost libtorrentRasterbar qt4 ] 22 + buildInputs = [ boost libtorrentRasterbar qt5.qtbase qt5.qttools ] 23 23 ++ optional guiSupport dbus_libs; 24 24 25 25 configureFlags = [ ··· 28 28 (if guiSupport then "" else "--disable-gui") 29 29 (if webuiSupport then "" else "--disable-webui") 30 30 ] ++ optional debugSupport "--enable-debug"; 31 + 32 + # The lrelease binary is named lrelease instead of lrelease-qt4 33 + patches = [ ./fix-lrelease.patch]; 31 34 32 35 # https://github.com/qbittorrent/qBittorrent/issues/1992 33 36 enableParallelBuilding = false;
+13
pkgs/applications/networking/p2p/qbittorrent/fix-lrelease.patch
··· 1 + diff --git a/qm_gen.pri b/qm_gen.pri 2 + index ed29b76..2d5990c 100644 3 + --- a/qm_gen.pri 4 + +++ b/qm_gen.pri 5 + @@ -5,7 +5,7 @@ isEmpty(QMAKE_LRELEASE) { 6 + win32|os2:QMAKE_LRELEASE = $$[QT_INSTALL_BINS]\\lrelease.exe 7 + else:QMAKE_LRELEASE = $$[QT_INSTALL_BINS]/lrelease 8 + unix { 9 + - !exists($$QMAKE_LRELEASE) { QMAKE_LRELEASE = lrelease-qt4 } 10 + + !exists($$QMAKE_LRELEASE) { QMAKE_LRELEASE = lrelease } 11 + } else { 12 + !exists($$QMAKE_LRELEASE) { QMAKE_LRELEASE = lrelease } 13 + }
+8 -4
pkgs/applications/office/kmymoney/default.nix
··· 1 1 { stdenv, fetchurl, cmake, kdelibs, automoc4, kdepimlibs, gettext, pkgconfig 2 2 , shared_mime_info, perl, boost, gpgme, gmpxx, libalkimia, libofx, libical 3 - , doxygen }: 3 + , doxygen, aqbanking, gwenhywfar }: 4 4 5 5 stdenv.mkDerivation rec { 6 - name = "kmymoney-4.6.4"; 6 + name = "kmymoney-4.7.2"; 7 7 8 8 src = fetchurl { 9 9 url = "mirror://sourceforge/kmymoney2/${name}.tar.xz"; 10 - sha256 = "04n0lgi2yrx67bgjzbdbcm10pxs7l53srmp240znzw59njnjyll9"; 10 + sha256 = "0g9rakjx7zmw4bf7m5516rrx0n3bl2by3nn24iiz9209yfgw5cmz"; 11 11 }; 12 12 13 + cmakeFlags = [ 14 + "-DENABLE_KBANKING='true'" 15 + ]; 16 + 13 17 buildInputs = [ kdepimlibs perl boost gpgme gmpxx libalkimia libofx libical 14 - doxygen ]; 18 + doxygen aqbanking gwenhywfar ]; 15 19 nativeBuildInputs = [ cmake automoc4 gettext shared_mime_info pkgconfig ]; 16 20 17 21 KDEDIRS = libalkimia;
+3 -3
pkgs/applications/office/libreoffice/default.nix
··· 7 7 , librsvg, gnome_vfs, mesa, bsh, CoinMP, libwps, libabw 8 8 , autoconf, automake, openldap, bash, hunspell, librdf_redland, nss, nspr 9 9 , libwpg, dbus_glib, glibc, qt4, kde4, clucene_core, libcdr, lcms, vigra 10 - , unixODBC, mdds, saneBackends, mythes, libexttextcat, libvisio 10 + , unixODBC, mdds, sane-backends, mythes, libexttextcat, libvisio 11 11 , fontsConf, pkgconfig, libzip, bluez5, libtool, maven 12 12 , libatomic_ops, graphite2, harfbuzz, libodfgen 13 13 , librevenge, libe-book, libmwaw, glm, glew, gst_all_1 14 14 , gdb, commonsLogging 15 - , langs ? [ "en-US" "en-GB" "ca" "ru" "eo" "fr" "nl" "de" "sl" ] 15 + , langs ? [ "en-US" "en-GB" "ca" "ru" "eo" "fr" "nl" "de" "sl" "pl" ] 16 16 , withHelp ? true 17 17 }: 18 18 ··· 220 220 libXdmcp libpthreadstubs mesa mythes gst_all_1.gstreamer 221 221 gst_all_1.gst-plugins-base 222 222 neon nspr nss openldap openssl ORBit2 pam perl pkgconfigUpstream poppler 223 - python3 sablotron saneBackends tcsh unzip vigra which zip zlib 223 + python3 sablotron sane-backends tcsh unzip vigra which zip zlib 224 224 mdds bluez5 glibc libcmis libwps libabw 225 225 libxshmfence libatomic_ops graphite2 harfbuzz 226 226 librevenge libe-book libmwaw glm glew
+3 -3
pkgs/applications/office/skrooge/default.nix
··· 2 2 , libxslt, kdelibs, kdepimlibs, grantlee, qjson, qca2, libofx, sqlite, boost }: 3 3 4 4 stdenv.mkDerivation rec { 5 - name = "skrooge-1.10.0"; 5 + name = "skrooge-1.12.5"; 6 6 7 7 src = fetchurl { 8 - url = "http://download.kde.org/stable/skrooge/${name}.tar.bz2"; 9 - sha256 = "0rsw2xdgws5bvnf3h4hg16liahigcxgaxls7f8hzr9wipxx5xqda"; 8 + url = "http://download.kde.org/stable/skrooge/${name}.tar.xz"; 9 + sha256 = "1mnkm0367knh0a65gifr20p42ql9zndw7d6kmbvfshvpfsmghl40"; 10 10 }; 11 11 12 12 buildInputs = [ libxslt kdelibs kdepimlibs grantlee qjson qca2 libofx sqlite boost ];
+4 -4
pkgs/applications/office/zotero/default.nix
··· 4 4 5 5 xpi = fetchurl { 6 6 url = "https://download.zotero.org/extension/zotero-${version}.xpi"; 7 - sha256 = "15wdbwnaxs748psjnxw40wld45npjjmvwx70c0jx2p63y6ks2gcx"; 7 + sha256 = "02h2ja08v8as4fawj683rh5rmxsjf5d0qmvqa77i176nm20y5s7s"; 8 8 }; 9 9 10 - version = "4.0.26"; 10 + version = "4.0.28"; 11 11 12 12 in 13 13 stdenv.mkDerivation { ··· 15 15 inherit version; 16 16 17 17 src = fetchurl { 18 - url = "https://github.com/zotero/zotero-standalone-build/archive/${version}.tar.gz"; 19 - sha256 = "11gbislxkhfycnii05v6d8h9qdp5rk5xag7kdnsih67gicnn467g"; 18 + url = "https://github.com/zotero/zotero-standalone-build/archive/4.0.28.8.tar.gz"; 19 + sha256 = "ab1fd5dde9bd2a6b6d31cc9a53183a04de3698f1273a943ef31ecc4c42808a68"; 20 20 }; 21 21 22 22 nativeBuildInputs = [ perl unzipNLS ];
+2 -2
pkgs/applications/science/logic/alt-ergo/default.nix
··· 1 - { fetchurl, stdenv, ocaml, ocamlPackages }: 1 + { fetchurl, stdenv, ocamlPackages }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "alt-ergo-${version}"; ··· 17 17 description = "High-performance theorem prover and SMT solver"; 18 18 homepage = "http://alt-ergo.ocamlpro.com/"; 19 19 license = stdenv.lib.licenses.cecill-c; # LGPL-2 compatible 20 - platforms = stdenv.lib.platforms.linux; 20 + platforms = stdenv.lib.platforms.linux ++ stdenv.lib.platforms.darwin; 21 21 maintainers = [ stdenv.lib.maintainers.thoughtpolice ]; 22 22 }; 23 23 }
+3 -2
pkgs/applications/science/logic/metis-prover/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "metis-prover-${version}"; 5 - version = "2.3"; 5 + version = "2.3.20160101"; 6 6 7 7 src = fetchurl { 8 8 url = "http://www.gilith.com/software/metis/metis.tar.gz"; 9 - sha256 = "07wqhic66i5ip2j194x6pswwrxyxrimpc4vg0haa5aqv9pfpmxad"; 9 + sha256 = "0wkh506ggwmfacwl19n84n1xi6ak4xhrc96d9pdkpk8zdwh5w58l"; 10 10 }; 11 11 12 12 nativeBuildInputs = [ perl ]; ··· 25 25 homepage = http://www.gilith.com/research/metis/; 26 26 license = licenses.mit; 27 27 maintainers = with maintainers; [ gebner ]; 28 + platforms = platforms.unix; 28 29 }; 29 30 }
+4 -4
pkgs/applications/video/avidemux/default.nix
··· 7 7 assert faacSupport -> faac != null; 8 8 9 9 stdenv.mkDerivation { 10 - name = "avidemux-2.6.9"; 10 + name = "avidemux-2.5.6"; 11 11 12 12 src = fetchurl { 13 - url = mirror://sourceforge/avidemux/avidemux_2.6.9.tar.gz; 14 - sha256 = "01jhgricd7m9hdhr22yrdjfrnl41zccm2yxw7gfb02mwcswvswy0"; 13 + url = mirror://sourceforge/avidemux/avidemux_2.5.6.tar.gz; 14 + sha256 = "12wvxz0n2g85f079d8mdkkp2zm279d34m9v7qgcqndh48cn7znnn"; 15 15 }; 16 16 17 17 buildInputs = [ cmake pkgconfig libxml2 qt4 gtk gettext SDL libXv ··· 40 40 meta = { 41 41 homepage = http://fixounet.free.fr/avidemux/; 42 42 description = "Free video editor designed for simple video editing tasks"; 43 - maintainers = with stdenv.lib.maintainers; [ viric jagajaga ]; 43 + maintainers = with stdenv.lib.maintainers; [viric]; 44 44 platforms = with stdenv.lib.platforms; linux; 45 45 }; 46 46 }
+1
pkgs/applications/video/bomi/default.nix
··· 56 56 libvdpau 57 57 libva 58 58 libbluray 59 + qtquickcontrols 59 60 ] 60 61 ++ optional jackSupport jack 61 62 ++ optional portaudioSupport portaudio
+2 -2
pkgs/applications/video/mkvtoolnix/default.nix
··· 18 18 19 19 stdenv.mkDerivation rec { 20 20 name = "mkvtoolnix-${version}"; 21 - version = "8.3.0"; 21 + version = "8.4.0"; 22 22 23 23 src = fetchurl { 24 24 url = "http://www.bunkus.org/videotools/mkvtoolnix/sources/${name}.tar.xz"; 25 - sha256 = "0dzwmwa76y4nhb5brp5a1kxgxjr71czd8vj218qmrlwm54i85gc7"; 25 + sha256 = "0y7qm8q9vpvjiw7b69k9140pw9nhvs6ggmk56yxnmcd02inm19gn"; 26 26 }; 27 27 28 28 patchPhase = ''
+2 -2
pkgs/applications/virtualization/docker/default.nix
··· 1 1 { stdenv, fetchFromGitHub, makeWrapper 2 2 , go, sqlite, iproute, bridge-utils, devicemapper 3 - , btrfsProgs, iptables, e2fsprogs, xz, utillinux 3 + , btrfs-progs, iptables, e2fsprogs, xz, utillinux 4 4 , enableLxc ? false, lxc 5 5 }: 6 6 ··· 20 20 }; 21 21 22 22 buildInputs = [ 23 - makeWrapper go sqlite iproute bridge-utils devicemapper btrfsProgs 23 + makeWrapper go sqlite iproute bridge-utils devicemapper btrfs-progs 24 24 iptables e2fsprogs 25 25 ]; 26 26
+3 -3
pkgs/build-support/fetchgitlocal/default.nix
··· 10 10 preferLocalBuild = true; 11 11 } '' 12 12 cd ${srcStr} 13 - ROOT=$(git rev-parse --show-toplevel) # path to repo 13 + DOT_GIT=$(git rev-parse --resolve-git-dir .git) # path to repo 14 14 15 - cp $ROOT/.git/index $ROOT/.git/index-user # backup index 15 + cp $DOT_GIT/index $DOT_GIT/index-user # backup index 16 16 git reset # reset index 17 17 git add . # add current directory 18 18 ··· 21 21 git rev-parse $(git write-tree) \ 22 22 | tr -d '\n' > $out 23 23 24 - mv $ROOT/.git/index-user $ROOT/.git/index # restore index 24 + mv $DOT_GIT/index-user $DOT_GIT/index # restore index 25 25 ''; 26 26 27 27 gitHash = builtins.readFile gitHashFile; # cache against git hash
-16
pkgs/build-support/native-darwin-cctools-wrapper/builder.sh
··· 1 - source $stdenv/setup 2 - 3 - mkdir -p $out/bin 4 - for i in $binaries 5 - do 6 - ln -s "/usr/bin/$i" "$out/bin/" 7 - done 8 - 9 - # MIG assumes the standard Darwin core utilities (e.g., `rm -d'), so 10 - # let it see the impure directories. 11 - cat > "$out/bin/mig" <<EOF 12 - #!/bin/sh 13 - export PATH="/usr/bin:/bin:\$PATH" 14 - exec /usr/bin/mig "\$@" 15 - EOF 16 - chmod +x "$out/bin/mig"
-15
pkgs/build-support/native-darwin-cctools-wrapper/default.nix
··· 1 - {stdenv}: 2 - 3 - stdenv.mkDerivation { 4 - name = "native-darwin-cctools-wrapper"; 5 - 6 - # Standard binaries normally found under /usr/bin (MIG is omitted here, and 7 - # handled specially in ./builder.sh). 8 - binaries = 9 - [ "ar" "as" "c++filt" "gprof" "ld" "nm" "nmedit" "ranlib" 10 - "size" "strings" "strip" "dsymutil" "libtool" "lipo" 11 - "install_name_tool" "arch" "sw_vers" 12 - ]; 13 - 14 - builder = ./builder.sh; 15 - }
+118
pkgs/build-support/upstream-updater/update-walker.txt
··· 1 + update-walker is an imperative semiautomated update helper. 2 + 3 + It runs the X.upstream file to find the freshest version of the package in 4 + the specified upstream source and updates the corresponding X.nix file. 5 + 6 + 7 + 8 + The simplest available commands: 9 + 10 + url: set the upstream source list URL equal to $1; the default is 11 + meta.downloadPage with meta.homepage fallback 12 + 13 + dl_url_re: set the regular expression used to select download links to $1; the 14 + default is meta.downloadURLRegexp or '[.]tar[.]([^./])+\$' if it is not set 15 + 16 + target: specify target expression; default is to replace .upstream extension 17 + with .nix extension 18 + 19 + name: specify the derivation name; default is the basename of the dirname 20 + of the .upstream file 21 + 22 + attribute_name: specify the attribute name to evaluate for getting the current 23 + version from meta.version; default is to use the derivation name 24 + 25 + minimize_overwrite: set config options that mean that only version= and 26 + sha256= have to be replaced; the default is to regenerate a full upstream 27 + description block with url, name, version, hash etc. 28 + 29 + 30 + 31 + A lot of packages can be updated in a pseudo-declarative style using only 32 + the commands from the previous paragraph. 33 + 34 + Some packages do not need any non-default settings, in these case just setting 35 + meta.updateWalker to true is enough, you can run update-walker directly on the 36 + .nix file afterwards. In this case minimize_overwrite it implied unless 37 + meta.fullRegenerate is set. 38 + 39 + 40 + 41 + The packages that require more fine-grained control than the described options 42 + allow, you need to take into account the default control flow of the tool. 43 + 44 + First, the definitions from update-walker script and additional definitions 45 + from update-walker-service-specific.sh are loaded. Then the config is executed 46 + as a shell script. Some of the commands it can use do remember whether they 47 + have been used. Afterwards the following steps happen: 48 + 49 + attribute_name is set to name unless it has been already set 50 + 51 + meta.version is read from the NixPkgs package called attribute_name 52 + 53 + download URL regexp is set to default unless it has been already set in the 54 + updater script 55 + 56 + the download page URL gets set to default value unless it has been set 57 + previously 58 + 59 + if the action of getting the download page and choosing the freshest link by 60 + version has not yet been taken, it happens 61 + 62 + if the version has not yet been extracted from the URL, it gets extracted 63 + 64 + target nix expression to update gets set to the default value unless it has 65 + been set explicitly 66 + 67 + if the URL version is fresher than the packaged version, the new file gets 68 + downloaded and its hash is calculated 69 + 70 + do_overwrite function is called; the default calculates a big upstream data 71 + block and puts it after the '# Generated upstream information' marker (the 72 + marker can be changed by the command marker) 73 + 74 + 75 + 76 + If the update needs some special logic, it is put into the updater script and 77 + the corresponding steps are skipped because the needed action has already been 78 + performed. 79 + 80 + For example: 81 + 82 + minimize_overwrite is exactly the same as 83 + 84 + do_overwrite() { do_overwrite_just_version; } 85 + 86 + redefinition. You can do a more complex do_overwrite redifinition, if needed. 87 + It can probably use ensure_hash to download the source and calculate the hash 88 + and set_var_value. 89 + 90 + set_var_value alters the $3-th instance of assigning the $1 name in the 91 + expression to the value $2. $3 defaults to 1. It can modify $4 instead of the 92 + current target, it can put the value without quotes if $5 is 1. 93 + 94 + 95 + 96 + Typical steps include: 97 + 98 + ensure_choice: download current URL and find the freshest version link on the 99 + page, it is now the new URL 100 + 101 + ensure_hash: download current URL and calculate the source package hash 102 + 103 + ensure_version: extract version from the URL 104 + 105 + SF_redirect: replace the current URL with a SourceForge.net mirror:// URL 106 + 107 + SF_version_dir: assume SourceForge.net layout and choose the freshest 108 + version-named subdirectory in the file catalog; you can optionally specify $1 109 + as a directory name regexp (digits and periods will be required after it) 110 + 111 + SF_version_tarball: assume SourceForge.net layout and choose the freshest 112 + tarball download link 113 + 114 + version: apply replacement of $1 with $2 (extended regexp format) to extract 115 + the version from URL 116 + 117 + version_link: choose the freshest versioned link, $1 is the regexp of 118 + acceptable links
+2 -2
pkgs/data/documentation/man-pages/default.nix
··· 1 1 { stdenv, fetchurl }: 2 2 3 - let version = "4.03"; in 3 + let version = "4.04"; in 4 4 stdenv.mkDerivation rec { 5 5 name = "man-pages-${version}"; 6 6 7 7 src = fetchurl { 8 8 url = "mirror://kernel/linux/docs/man-pages/${name}.tar.xz"; 9 - sha256 = "177w71rwsw3lsh9pjqy625s5iwz1ahdaj7prys1bpc4bqi78q5mh"; 9 + sha256 = "0v8zxq4scfixy3pjpw9ankvv5v8frv62khv4xm1jpkswyq6rbqcg"; 10 10 }; 11 11 12 12 makeFlags = [ "MANDIR=$(out)/share/man" ];
+3 -3
pkgs/data/fonts/cantarell-fonts/default.nix
··· 1 1 { stdenv, fetchurl }: 2 2 3 3 stdenv.mkDerivation { 4 - name = "cantarell-fonts-0.0.16"; 4 + name = "cantarell-fonts-0.0.17"; 5 5 6 6 src = fetchurl { 7 - url = mirror://gnome/sources/cantarell-fonts/0.0/cantarell-fonts-0.0.16.tar.xz; 8 - sha256 = "071g2l89gdjgqhapw9dbm1ch6hnzydhf7b38pi86fm91adaqggqm"; 7 + url = mirror://gnome/sources/cantarell-fonts/0.0/cantarell-fonts-0.0.17.tar.xz; 8 + sha256 = "0kx05fw1i11zcqx5yv9y9iprpl49k51sibz86bc58a50n1w6gcwn"; 9 9 }; 10 10 11 11 meta = {
+2 -2
pkgs/data/fonts/fira-code/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "fira-code-${version}"; 5 - version = "1.101"; 5 + version = "1.102"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/tonsky/FiraCode/releases/download/${version}/FiraCode_${version}.zip"; 9 - sha256 = "0wbjk4cyibyjp7kjvwnm7as1ch312zwjbi469v26sl41svf53s5v"; 9 + sha256 = "0vcrzf7dmcy3n2ic05ihadmfgzmmmp0vz8grnqaxfi3y1jpw8ggy"; 10 10 }; 11 11 12 12 buildInputs = [ unzip ];
+2 -2
pkgs/desktops/kde-4.14/kdegraphics/libksane.nix
··· 1 - { stdenv, kde, kdelibs, saneBackends }: 1 + { stdenv, kde, kdelibs, sane-backends }: 2 2 3 3 kde { 4 - buildInputs = [ kdelibs saneBackends ]; 4 + buildInputs = [ kdelibs sane-backends ]; 5 5 6 6 meta = { 7 7 description = "An image scanning library that provides a QWidget that contains all the logic needed to interface a sacanner";
+2 -2
pkgs/desktops/kde-4.14/kdeutils/print-manager.nix
··· 1 1 { kde, kdelibs 2 - , pythonPackages, cups, pyqt4, pykde4, pycups, system_config_printer }: 2 + , pythonPackages, cups, pyqt4, pykde4, pycups, system-config-printer }: 3 3 4 - let s_c_p = system_config_printer.override { withGUI = false; }; in 4 + let s_c_p = system-config-printer.override { withGUI = false; }; in 5 5 6 6 kde rec { 7 7 buildInputs = [ kdelibs pythonPackages.python pythonPackages.wrapPython
+1
pkgs/development/compilers/go/1.5.nix
··· 77 77 sed -i '/TestCgoLookupIP/areturn' src/net/cgo_unix_test.go 78 78 sed -i '/TestChdirAndGetwd/areturn' src/os/os_test.go 79 79 sed -i '/TestRead0/areturn' src/os/os_test.go 80 + sed -i '/TestNohup/areturn' src/os/signal/signal_test.go 80 81 sed -i '/TestSystemRoots/areturn' src/crypto/x509/root_darwin_test.go 81 82 82 83 sed -i '/TestGoInstallRebuildsStalePackagesInOtherGOPATH/areturn' src/cmd/go/go_test.go
+2 -2
pkgs/development/compilers/orc/default.nix
··· 1 1 { stdenv, fetchurl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "orc-0.4.23"; 4 + name = "orc-0.4.24"; 5 5 6 6 src = fetchurl { 7 7 url = "http://gstreamer.freedesktop.org/src/orc/${name}.tar.xz"; 8 - sha256 = "1ryz1gfgrxcj806cakcblxf0bcwq8p2mw8k86fs3f5wlwayawzkn"; 8 + sha256 = "16ykgdrgxr6pfpy931p979cs68klvwmk3ii1k0a00wr4nn9x931k"; 9 9 }; 10 10 11 11 outputs = [ "out" "doc" ];
+1 -1
pkgs/development/compilers/uhc/default.nix
··· 41 41 meta = with stdenv.lib; { 42 42 homepage = "http://www.cs.uu.nl/wiki/UHC"; 43 43 description = "Utrecht Haskell Compiler"; 44 - maintainers = [ maintainers.phausmann ]; 44 + maintainers = [ maintainers.phile314 ]; 45 45 46 46 # UHC i686 support is broken, see 47 47 # https://github.com/UU-ComputerScience/uhc/issues/52
+3 -3
pkgs/development/coq-modules/flocq/default.nix
··· 3 3 stdenv.mkDerivation rec { 4 4 5 5 name = "coq-flocq-${coq.coq-version}-${version}"; 6 - version = "2.5.0"; 6 + version = "2.5.1"; 7 7 8 8 src = fetchurl { 9 - url = "https://gforge.inria.fr/frs/download.php/file/33979/flocq-${version}.tar.gz"; 10 - sha256 = "0v3qiaz7vxfc5nk8rxwi39mik7hm7p5kb040q2pimb69qgfl6vml"; 9 + url = https://gforge.inria.fr/frs/download.php/file/35430/flocq-2.5.1.tar.gz; 10 + sha256 = "1a0gznvg32ckxgs3jzznc1368p8x2ny4vfwrnavb3h0ljcl1mlzy"; 11 11 }; 12 12 13 13 buildInputs = [ coq.ocaml coq.camlp5 bash which autoconf automake ];
+1
pkgs/development/coq-modules/mathcomp/generic.nix
··· 18 18 buildFlags = stdenv.lib.optionalString withDoc "doc"; 19 19 20 20 preBuild = '' 21 + patchShebangs etc/utils/ssrcoqdep 21 22 cd mathcomp 22 23 export COQBIN=${coq}/bin/ 23 24 '';
+1
pkgs/development/coq-modules/ssreflect/generic.nix
··· 18 18 inherit patches; 19 19 20 20 preBuild = '' 21 + patchShebangs etc/utils/ssrcoqdep 21 22 cd mathcomp/ssreflect 22 23 export COQBIN=${coq}/bin/ 23 24 '';
+4
pkgs/development/haskell-modules/configuration-common.nix
··· 926 926 # https://github.com/sol/hpack/issues/53 927 927 hpack = dontCheck super.hpack; 928 928 929 + # Tests require `docker` command in PATH 930 + # Tests require running docker service :on localhost 931 + docker = dontCheck super.docker; 932 + 929 933 # https://github.com/deech/fltkhs/issues/16 930 934 fltkhs = overrideCabal super.fltkhs (drv: { 931 935 libraryToolDepends = (drv.libraryToolDepends or []) ++ [pkgs.autoconf];
+3 -3
pkgs/development/haskell-modules/hackage-packages.nix
··· 35389 35389 }) {}; 35390 35390 35391 35391 "bindings-sane" = callPackage 35392 - ({ mkDerivation, base, bindings-DSL, saneBackends }: 35392 + ({ mkDerivation, base, bindings-DSL, sane-backends }: 35393 35393 mkDerivation { 35394 35394 pname = "bindings-sane"; 35395 35395 version = "0.0.1"; 35396 35396 sha256 = "a27eb00e69a804e65f39246611a747f3a833a87dab536c7f3cde60583a60b04b"; 35397 35397 libraryHaskellDepends = [ base bindings-DSL ]; 35398 - libraryPkgconfigDepends = [ saneBackends ]; 35398 + libraryPkgconfigDepends = [ sane-backends ]; 35399 35399 homepage = "http://floss.scru.org/bindings-sane"; 35400 35400 description = "FFI bindings to libsane"; 35401 35401 license = stdenv.lib.licenses.gpl3; 35402 35402 hydraPlatforms = [ "i686-linux" "x86_64-linux" ]; 35403 - }) {inherit (pkgs) saneBackends;}; 35403 + }) {inherit (pkgs) sane-backends;}; 35404 35404 35405 35405 "bindings-sc3" = callPackage 35406 35406 ({ mkDerivation, base, bindings-DSL, scsynth }:
+3 -3
pkgs/development/interpreters/ceptre/default.nix
··· 1 1 { stdenv, fetchgit, mlton }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "ceptre-2015-11-20"; 4 + name = "ceptre-2016-01-01"; 5 5 6 6 src = fetchgit { 7 7 url = https://github.com/chrisamaphone/interactive-lp; 8 - rev = "adb59d980f903e49a63b668618241d1b8beb28be"; 9 - sha256 = "1pyl2imrvq2icr2rr4ys7djnizppbgqldgsv5525xsvzm78w3ac7"; 8 + rev = "b3d21489d4994f03d2982de273eea90bc7fba5d0"; 9 + sha256 = "01f72q435kmf3mkgnn47hlnv6k3i5kjb26pbjrwvysc6am33jlcb"; 10 10 }; 11 11 12 12 nativeBuildInputs = [ mlton ];
+3 -3
pkgs/development/libraries/boolstuff/default.nix
··· 3 3 let baseurl = "http://perso.b2b2c.ca/sarrazip/dev"; in 4 4 5 5 stdenv.mkDerivation rec { 6 - name = "boolstuff-0.1.14"; 6 + name = "boolstuff-0.1.15"; 7 7 8 8 src = fetchurl { 9 9 url = "${baseurl}/${name}.tar.gz"; 10 - sha256 = "1ccn9v3kxz44pv3mr8q0l2i9769jiigw1gfv47ia50mbspwb87r6"; 10 + sha256 = "1mzw4368hqw0b6xr01yqcbs9jk9ma3qq9hk3iqxmkiwqqxgirgln"; 11 11 }; 12 12 13 13 nativeBuildInputs = [ pkgconfig ]; 14 14 15 - meta = { 15 + meta = { 16 16 description = "Library for operations on boolean expression binary trees"; 17 17 homepage = "${baseurl}/boolstuff.html"; 18 18 license = "GPL";
+19
pkgs/development/libraries/cmark/default.nix
··· 1 + { stdenv, fetchurl, cmake }: 2 + 3 + stdenv.mkDerivation rec { 4 + version = "0.23.0"; 5 + name = "cmark-${version}"; 6 + 7 + src = fetchurl { 8 + url = "https://github.com/jgm/cmark/archive/${version}.tar.gz"; 9 + sha256 = "87d289965066fce7be247d44c0304af1b20817dcc1b563702302ae33f2be0596"; 10 + }; 11 + 12 + buildInputs = [ cmake ]; 13 + 14 + meta = { 15 + description = "CommonMark parsing and rendering library and program in C"; 16 + homepage = https://github.com/jgm/cmark; 17 + maintainers = [ stdenv.lib.maintainers.michelk ]; 18 + }; 19 + }
+2 -2
pkgs/development/libraries/enet/default.nix
··· 1 1 {stdenv, fetchurl}: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "enet-1.3.12"; 4 + name = "enet-1.3.13"; 5 5 6 6 src = fetchurl { 7 7 url = "http://enet.bespin.org/download/${name}.tar.gz"; 8 - sha256 = "02qxgsn20m306hg3pklfa35mjlc2fqcsd1x4pi3xnbfy1nyir1d5"; 8 + sha256 = "0p53mnmjbm56wizwraznynx13fcibcxiqny110dp6a5a3w174q73"; 9 9 }; 10 10 11 11 meta = {
+3 -3
pkgs/development/libraries/ffms/default.nix
··· 1 1 { stdenv, fetchurl, zlib, ffmpeg, pkgconfig }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "ffms-2.20"; 4 + name = "ffms-2.21"; 5 5 6 6 src = fetchurl { 7 - url = https://codeload.github.com/FFMS/ffms2/tar.gz/2.20; 7 + url = https://codeload.github.com/FFMS/ffms2/tar.gz/2.21; 8 8 name = "${name}.tar.gz"; 9 - sha256 = "183klnhl57zf0i8xlr7yvj89ih83pzd48c37qpr57hjn4wbq1n67"; 9 + sha256 = "00h2a5yhvr1qzbrzwbjv1ybxrx25lchgral6yxv36aaf4pi3rhn2"; 10 10 }; 11 11 12 12 NIX_CFLAGS_COMPILE = "-fPIC";
+2 -2
pkgs/development/libraries/gloox/default.nix
··· 9 9 assert idnSupport -> libidn != null; 10 10 11 11 let 12 - version = "1.0.13"; 12 + version = "1.0.14"; 13 13 in 14 14 stdenv.mkDerivation rec { 15 15 name = "gloox-${version}"; 16 16 17 17 src = fetchurl { 18 18 url = "http://camaya.net/download/gloox-${version}.tar.bz2"; 19 - sha256 = "12payqyx1ly8nm3qn24bj0kyy9d08sixnjqxw7fn6rbwr7m1x7sd"; 19 + sha256 = "0h9r4382qv0vqc91x1qz1nivxw1r2l874s1kl0bskzm9dyk742sj"; 20 20 }; 21 21 22 22 buildInputs = [ ]
+11 -5
pkgs/development/libraries/libpsl/default.nix
··· 1 1 { stdenv, fetchFromGitHub, autoreconfHook, docbook_xsl, gtk_doc, icu 2 - , libxslt, pkgconfig }: 2 + , libxslt, pkgconfig, python }: 3 3 4 4 let 5 5 ··· 13 13 owner = "publicsuffix"; 14 14 }; 15 15 16 - libVersion = "0.11.0"; 16 + libVersion = "0.12.0"; 17 17 18 18 in stdenv.mkDerivation { 19 19 name = "libpsl-${version}"; 20 20 21 21 src = fetchFromGitHub { 22 - sha256 = "08k7prrr83lg6jmm5r5k4alpm2in4qlnx49ypb4bxv16lq8dcnmm"; 22 + sha256 = "13w3lc752az2swymg408f3w2lbqs0f2h5ri6d5jw1vv9z0ij9xlw"; 23 23 rev = "libpsl-${libVersion}"; 24 24 repo = "libpsl"; 25 25 owner = "rockdaboot"; 26 26 }; 27 27 28 28 buildInputs = [ icu libxslt ]; 29 - nativeBuildInputs = [ autoreconfHook docbook_xsl gtk_doc pkgconfig ]; 29 + nativeBuildInputs = [ autoreconfHook docbook_xsl gtk_doc pkgconfig python ]; 30 30 31 31 postPatch = '' 32 32 substituteInPlace src/psl.c --replace bits/stat.h sys/stat.h 33 + patchShebangs src/make_dafsa.py 33 34 ''; 34 35 35 36 preAutoreconf = '' ··· 41 42 # The libpsl check phase requires the list's test scripts (tests/) as well 42 43 cp -Rv "${listSources}"/* list 43 44 ''; 44 - configureFlags = [ "--disable-static" "--enable-gtk-doc" "--enable-man" ]; 45 + configureFlags = [ 46 + "--disable-builtin" 47 + "--disable-static" 48 + "--enable-gtk-doc" 49 + "--enable-man" 50 + ]; 45 51 46 52 enableParallelBuilding = true; 47 53
+58
pkgs/development/libraries/libvirt/build-on-bsd.patch
··· 1 + diff -Naur libvirt-1.3.0.orig/src/admin/admin_protocol.c libvirt-1.3.0/src/admin/admin_protocol.c 2 + --- libvirt-1.3.0.orig/src/admin/admin_protocol.c 2015-12-02 16:17:07.000000000 +0100 3 + +++ libvirt-1.3.0/src/admin/admin_protocol.c 2016-01-04 17:57:10.043412857 +0100 4 + @@ -6,6 +6,25 @@ 5 + 6 + #include "admin_protocol.h" 7 + 8 + +/* cygwin's xdr implementation defines xdr_u_int64_t instead of xdr_uint64_t 9 + + * and lacks IXDR_PUT_INT32 and IXDR_GET_INT32 10 + + */ 11 + +#ifdef HAVE_XDR_U_INT64_T 12 + +# define xdr_uint64_t xdr_u_int64_t 13 + +#endif 14 + +#ifndef IXDR_PUT_INT32 15 + +# define IXDR_PUT_INT32 IXDR_PUT_LONG 16 + +#endif 17 + +#ifndef IXDR_GET_INT32 18 + +# define IXDR_GET_INT32 IXDR_GET_LONG 19 + +#endif 20 + +#ifndef IXDR_PUT_U_INT32 21 + +# define IXDR_PUT_U_INT32 IXDR_PUT_U_LONG 22 + +#endif 23 + +#ifndef IXDR_GET_U_INT32 24 + +# define IXDR_GET_U_INT32 IXDR_GET_U_LONG 25 + +#endif 26 + + 27 + bool_t 28 + xdr_admin_nonnull_string (XDR *xdrs, admin_nonnull_string *objp) 29 + { 30 + diff -Naur libvirt-1.3.0.orig/src/logging/log_protocol.c libvirt-1.3.0/src/logging/log_protocol.c 31 + --- libvirt-1.3.0.orig/src/logging/log_protocol.c 2015-12-08 13:07:35.000000000 +0100 32 + +++ libvirt-1.3.0/src/logging/log_protocol.c 2016-01-04 17:56:50.673463563 +0100 33 + @@ -7,6 +7,25 @@ 34 + #include "log_protocol.h" 35 + #include "internal.h" 36 + 37 + +/* cygwin's xdr implementation defines xdr_u_int64_t instead of xdr_uint64_t 38 + + * and lacks IXDR_PUT_INT32 and IXDR_GET_INT32 39 + + */ 40 + +#ifdef HAVE_XDR_U_INT64_T 41 + +# define xdr_uint64_t xdr_u_int64_t 42 + +#endif 43 + +#ifndef IXDR_PUT_INT32 44 + +# define IXDR_PUT_INT32 IXDR_PUT_LONG 45 + +#endif 46 + +#ifndef IXDR_GET_INT32 47 + +# define IXDR_GET_INT32 IXDR_GET_LONG 48 + +#endif 49 + +#ifndef IXDR_PUT_U_INT32 50 + +# define IXDR_PUT_U_INT32 IXDR_PUT_U_LONG 51 + +#endif 52 + +#ifndef IXDR_GET_U_INT32 53 + +# define IXDR_GET_U_INT32 IXDR_GET_U_LONG 54 + +#endif 55 + + 56 + bool_t 57 + xdr_virLogManagerProtocolUUID (XDR *xdrs, virLogManagerProtocolUUID objp) 58 + {
+11 -6
pkgs/development/libraries/libvirt/default.nix
··· 1 - { stdenv, fetchurl, pkgconfig, libxml2, gnutls, devicemapper, perl, python 1 + { stdenv, fetchurl, fetchpatch 2 + , pkgconfig, makeWrapper 3 + , libxml2, gnutls, devicemapper, perl, python 2 4 , iproute, iptables, readline, lvm2, utillinux, udev, libpciaccess, gettext 3 - , libtasn1, ebtables, libgcrypt, yajl, makeWrapper, pmutils, libcap_ng 5 + , libtasn1, ebtables, libgcrypt, yajl, pmutils, libcap_ng 4 6 , dnsmasq, libnl, libpcap, libxslt, xhtml1, numad, numactl, perlPackages 5 7 , curl, libiconv, gmp, xen 6 8 }: 7 9 8 10 stdenv.mkDerivation rec { 9 11 name = "libvirt-${version}"; 10 - version = "1.2.19"; 12 + version = "1.3.0"; 11 13 12 14 src = fetchurl { 13 15 url = "http://libvirt.org/sources/${name}.tar.gz"; 14 - sha256 = "0vnxmqf04frrj18lrvq7wc70wh179d382py14006879k0cgi8b18"; 16 + sha256 = "ebcf5645fa565e3fe2fe94a86e841db9b768cf0e0a7e6cf395c6327f9a23bd64"; 15 17 }; 16 18 19 + patches = [ ./build-on-bsd.patch ]; 20 + 21 + nativeBuildInputs = [ makeWrapper pkgconfig ]; 17 22 buildInputs = [ 18 - pkgconfig libxml2 gnutls perl python readline 19 - gettext libtasn1 libgcrypt yajl makeWrapper 23 + libxml2 gnutls perl python readline 24 + gettext libtasn1 libgcrypt yajl 20 25 libxslt xhtml1 perlPackages.XMLXPath curl libpcap 21 26 ] ++ stdenv.lib.optionals stdenv.isLinux [ 22 27 libpciaccess devicemapper lvm2 utillinux udev libcap_ng
-35
pkgs/development/libraries/policykit/default.nix
··· 1 - { stdenv, fetchurl, pkgconfig, glib, dbus, dbus_glib, expat, pam 2 - , intltool, gettext, libxslt, docbook_xsl }: 3 - 4 - stdenv.mkDerivation rec { 5 - name = "policykit-0.9"; 6 - 7 - src = fetchurl { 8 - url = http://hal.freedesktop.org/releases/PolicyKit-0.9.tar.gz; 9 - sha256 = "1dw05s4xqj67i3c13knzl04l8jap0kywzpav6fidpmqrximpq37l"; 10 - }; 11 - 12 - buildInputs = 13 - [ pkgconfig glib dbus_glib pam intltool gettext libxslt ]; 14 - 15 - propagatedBuildInputs = [ expat dbus.libs ]; 16 - 17 - configureFlags = "--localstatedir=/var --sysconfdir=/etc"; 18 - 19 - installFlags = "localstatedir=$(TMPDIR)/var sysconfdir=$(out)/etc"; # keep `make install' happy 20 - 21 - # Read policy files from /etc/PolicyKit/policy instead of 22 - # /usr/share/PolicyKit/policy. Using PACKAGE_DATA_DIR is hacky, but 23 - # it works because it's only used in the C code for finding the 24 - # policy directory. 25 - NIX_CFLAGS_COMPILE = "-DPACKAGE_DATA_DIR=\"/etc\""; 26 - 27 - # Needed to build the manpages. 28 - XML_CATALOG_FILES = "${docbook_xsl}/xml/xsl/docbook/catalog.xml"; 29 - 30 - meta = { 31 - homepage = http://www.freedesktop.org/wiki/Software/PolicyKit; 32 - description = "A toolkit for defining and handling the policy that allows unprivileged processes to speak to privileged processes (obsolete)"; 33 - platforms = stdenv.lib.platforms.linux; 34 - }; 35 - }
+1 -1
pkgs/development/libraries/qmltermwidget/default.nix
··· 14 14 15 15 patchPhase = '' 16 16 substituteInPlace qmltermwidget.pro \ 17 - --replace '$$[QT_INSTALL_QML]' "/lib/qml/" 17 + --replace '$$[QT_INSTALL_QML]' "/lib/qt5/qml/" 18 18 ''; 19 19 20 20 configurePhase = "qmake PREFIX=$out";
+2 -2
pkgs/development/tools/analysis/checkstyle/default.nix
··· 1 1 { stdenv, fetchurl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - version = "6.13"; 4 + version = "6.14.1"; 5 5 name = "checkstyle-${version}"; 6 6 7 7 src = fetchurl { 8 8 url = "mirror://sourceforge/checkstyle/${name}-bin.tar.gz"; 9 - sha256 = "0k53kj0mx0shypagny134yrhkjgawzs5yixaxv87br52ablcqdvx"; 9 + sha256 = "1dcg7libqs797v6x5vdvvc44rqfvwcjh125wczy9v87nl8imc2l3"; 10 10 }; 11 11 12 12 installPhase = ''
+8 -8
pkgs/development/tools/build-managers/gnustep/make/default.nix
··· 1 1 { stdenv, fetchurl }: 2 2 3 + let version = "2.6.7"; in 3 4 stdenv.mkDerivation rec { 4 5 name = "gnustep-make-${version}"; 5 - version = "1.0"; 6 6 7 7 src = fetchurl { 8 - url = "http://ftpmain.gnustep.org/pub/gnustep/core/gnustep-make-2.6.6.tar.gz"; 9 - sha256 = "07cqr8x17bia9w6clbmiv7ay6r9nplrjz2cyzinv4w7zfpc19vxw"; 8 + url = "http://ftpmain.gnustep.org/pub/gnustep/core/${name}.tar.gz"; 9 + sha256 = "1r2is23xdg4qirckb6bd4lynfwnnw5d9522wib3ndk1xgirmfaqi"; 10 10 }; 11 11 12 12 patchPhase = '' 13 13 substituteInPlace GNUmakefile.in \ 14 - --replace which type \ 15 - --replace 'tooldir = $(DESTDIR)' 'tooldir = ' \ 16 - --replace 'makedir = $(DESTDIR)' 'makedir = ' \ 17 - --replace 'mandir = $(DESTDIR)' 'mandir = ' 14 + --replace which type 18 15 19 16 substituteInPlace FilesystemLayouts/apple \ 20 17 --replace /usr/local "" 18 + 19 + substituteInPlace configure \ 20 + --replace /Library/GNUstep "$out" 21 21 ''; 22 22 23 - installFlags = "DESTDIR=$(out)"; 23 + installFlags = [ "PREFIX=$(out)" ]; 24 24 25 25 postInstall = '' 26 26 mkdir -p $out/nix-support
+10 -1
pkgs/development/tools/misc/ccache/default.nix
··· 1 - { stdenv, fetchurl, runCommand, gcc, zlib }: 1 + { stdenv, fetchurl, fetchpatch, runCommand, gcc, zlib }: 2 2 3 3 let 4 4 name = "ccache-${version}"; ··· 12 12 inherit sha256; 13 13 url = "mirror://samba/ccache/${name}.tar.xz"; 14 14 }; 15 + 16 + patches = [ 17 + (fetchpatch { 18 + sha256 = "1gwnxx1w2nx1szi0v5vgwcx9i23pxygkqqnrawhal68qgz5c34wh"; 19 + name = "dont-update-manifest-in-readonly-modes.patch"; 20 + # The primary git.samba.org doesn't seem to like our curl much... 21 + url = "https://github.com/jrosdahl/ccache/commit/a7ab503f07e31ebeaaec34fbaa30e264308a299d.patch"; 22 + }) 23 + ]; 15 24 16 25 buildInputs = [ zlib ]; 17 26
+2 -2
pkgs/development/tools/misc/global/default.nix
··· 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { 6 - name = "global-6.5.1"; 6 + name = "global-6.5.2"; 7 7 8 8 src = fetchurl { 9 9 url = "mirror://gnu/global/${name}.tar.gz"; 10 - sha256 = "1y34nbazsw2p6r2jhv27z15qvm9mhy5xjchpz8pwps00shkm578f"; 10 + sha256 = "07qx3dbjwkbd1dn42qs7zgj77rxdj2psfrf7bx7yx9al38f87z60"; 11 11 }; 12 12 13 13 nativeBuildInputs = [ libtool makeWrapper ];
+1 -1
pkgs/development/tools/ocaml/omake/default.nix
··· 9 9 name = "${pname}-${version}"; 10 10 11 11 src = fetchurl { 12 - url = "${webpage}/downloads/${pname}-${version}.tar.gz"; 12 + url = "mirror://debian/pool/main/o/omake/omake_${version}.orig.tar.gz"; 13 13 sha256 = "1bfxbsimfivq0ar2g5fkzvr5ql97n5dg562pfyd29y4zyh4mwrsv"; 14 14 }; 15 15 patchFlags = "-p0";
+14 -11
pkgs/games/simutrans/default.nix
··· 12 12 ); 13 13 14 14 ver1 = "120"; 15 - ver2 = "0"; 15 + ver2 = "1"; 16 16 ver3 = "1"; 17 17 version = "${ver1}.${ver2}.${ver3}"; 18 18 ver_dash = "${ver1}-${ver2}-${ver3}"; ··· 20 20 21 21 binary_src = fetchurl { 22 22 url = "mirror://sourceforge/simutrans/simutrans/${ver_dash}/simutrans-src-${ver_dash}.zip"; 23 - sha256 = "10rn259nxq2hhfpar8zwgxi1p4djvyygcm2f6qhih7l9clvnw2h1"; 23 + sha256 = "00cyxbn17r9p1f08jvx1wrhydxknkrxj5wk6ld912yicfql998r0"; 24 24 }; 25 25 26 26 ··· 29 29 (pakName: attrs: mkPak (attrs // {inherit pakName;})) 30 30 { 31 31 pak64 = { 32 - srcPath = "${ver2_dash}/simupak64-${ver_dash}"; 32 + # No release for 120.1 yet! 33 + srcPath = "120-0/simupak64-120-0-1"; 33 34 sha256 = "0y5v1ncpjyhjkkznqmk13kg5d0slhjbbvg1y8q5jxhmhlkghk9q2"; 34 35 }; 35 36 "pak64.japan" = { 36 - srcPath = "${ver2_dash}/simupak64.japan-${ver_dash}"; 37 + # No release for 120.1 yet! 38 + srcPath = "120-0/simupak64.japan-120-0-1"; 37 39 sha256 = "14swy3h4ij74bgaw7scyvmivfb5fmp21nixmhlpk3mav3wr3167i"; 38 40 }; 39 41 40 42 pak128 = { 41 - srcPath = "pak128%20for%20ST%20120%20%282.5.2%2B%20nightly%20r1560%2C%20bugfixes%29/pak128-r1560--ST120"; 42 - sha256 = "1wd51brc4aglqi3w7s8fxgxrw0k7f653w4wbnmk83k07fwfdyf24"; 43 + srcPath = "pak128%20for%20ST%20120%20%282.5.3%2C%20minor%20changes%29/pak128-2.5.3--ST120"; 44 + sha256 = "19c66wvfg6rn7s9awi99cfp83hs9d8dmsjlmgn8m91a19fp9isdh"; 43 45 }; 44 46 "pak128.britain" = { 45 - srcPath = "pak128.Britain%20for%20${ver2_dash}/pak128.Britain.1.16-${ver2_dash}"; 46 - sha256 = "1rww9rnpk22l2z3s1d7y2gmd6iwhv72s7pff8krnh7z0q386waak"; 47 + srcPath = "pak128.Britain%20for%20${ver2_dash}/pak128.Britain.1.17-${ver2_dash}"; 48 + sha256 = "1nviwqizvch9n3n826nmmi7c707dxv0727m7lhc1n2zsrrxcxlr5"; 47 49 }; 48 50 "pak128.cs" = { # note: it needs pak128 to work 49 51 url = "mirror://sourceforge/simutrans/Pak128.CS/pak128.cz_v.0.2.1.zip"; ··· 51 53 }; 52 54 "pak128.german" = { 53 55 url = "mirror://sourceforge/simutrans/PAK128.german/" 54 - + "PAK128.german_0.7_${ver1}.x/PAK128.german_0.7.0.1_${ver1}.x.zip"; 55 - sha256 = "1575akms18raxaijy2kfyqm07wdx6y5q85n7wgvq2fqydrnx33w8"; 56 + + "PAK128.german_0.8_${ver1}.x/PAK128.german_0.8.0_${ver1}.x.zip"; 57 + sha256 = "1a8pc88vi59zlvff9i1f8nphdmisqmgg03qkdvrf5ks46aw8j6s5"; 56 58 }; 57 59 58 60 /* This release contains accented filenames that prevent unzipping. ··· 71 73 stdenv.mkDerivation { 72 74 name = "simutrans-${pakName}"; 73 75 unpackPhase = "true"; 76 + preferLocalBuild = true; 74 77 installPhase = let src = fetchurl { inherit url sha256; }; 75 78 in '' 76 79 mkdir -p "$out/share/simutrans/${pakName}" ··· 159 162 160 163 homepage = http://www.simutrans.com/; 161 164 license = with licenses; [ artistic1 gpl1Plus ]; 162 - maintainers = with maintainers; [ kkallio vcunat ]; 165 + maintainers = with maintainers; [ kkallio vcunat phile314 ]; 163 166 platforms = with platforms; linux ++ darwin; 164 167 }; 165 168 };
+21
pkgs/misc/cups/cups-pk-helper.nix
··· 1 + { stdenv, fetchurl, intltool, pkgconfig, glib, polkit, cups }: 2 + 3 + stdenv.mkDerivation rec { 4 + version = "0.2.5"; 5 + name = "cups-pk-helper-${version}"; 6 + 7 + src = fetchurl { 8 + url = "http://www.freedesktop.org/software/cups-pk-helper/releases/cups-pk-helper-${version}.tar.xz"; 9 + sha256 = "0651ij5p5s0n3xxbaqsy72s22nx9hfkrjgvg766lkqd1cpniw8hr"; 10 + }; 11 + 12 + buildInputs = [ intltool pkgconfig glib polkit cups ]; 13 + 14 + meta = with stdenv.lib; { 15 + description = "PolicyKit helper to configure cups with fine-grained privileges"; 16 + homepage = http://www.freedesktop.org/wiki/Software/cups-pk-helper/; 17 + license = licenses.gpl2; 18 + platforms = platforms.linux; 19 + maintainers = [ maintainers.bjornfor ]; 20 + }; 21 + }
+6
pkgs/misc/cups/drivers/cups-bjnp/default.nix
··· 14 14 NIX_CFLAGS_COMPILE = "-include stdio.h"; 15 15 16 16 meta = { 17 + description = "CUPS back-end for Canon printers"; 18 + longDescription = '' 19 + CUPS back-end for the canon printers using the proprietary USB over IP 20 + BJNP protocol. This back-end allows Cups to print over the network to a 21 + Canon printer. The design is based on reverse engineering of the protocol. 22 + ''; 17 23 homepage = http://cups-bjnp.sourceforge.net; 18 24 }; 19 25 }
+2 -2
pkgs/misc/drivers/hplip/3.15.9.nix
··· 1 1 { stdenv, fetchurl, substituteAll 2 2 , pkgconfig 3 - , cups, zlib, libjpeg, libusb1, pythonPackages, saneBackends, dbus, usbutils 3 + , cups, zlib, libjpeg, libusb1, pythonPackages, sane-backends, dbus, usbutils 4 4 , net_snmp, polkit 5 5 , qtSupport ? true, qt4, pyqt4 6 6 , withPlugin ? false ··· 56 56 libusb1 57 57 pythonPackages.python 58 58 pythonPackages.wrapPython 59 - saneBackends 59 + sane-backends 60 60 dbus 61 61 net_snmp 62 62 ] ++ stdenv.lib.optionals qtSupport [
+2 -2
pkgs/misc/drivers/hplip/default.nix
··· 1 1 { stdenv, fetchurl, substituteAll 2 2 , pkgconfig 3 - , cups, zlib, libjpeg, libusb1, pythonPackages, saneBackends, dbus, usbutils 3 + , cups, zlib, libjpeg, libusb1, pythonPackages, sane-backends, dbus, usbutils 4 4 , net_snmp, polkit 5 5 , qtSupport ? true, qt4, pyqt4 6 6 , withPlugin ? false ··· 56 56 libusb1 57 57 pythonPackages.python 58 58 pythonPackages.wrapPython 59 - saneBackends 59 + sane-backends 60 60 dbus 61 61 net_snmp 62 62 ] ++ stdenv.lib.optionals qtSupport [
+4 -1
pkgs/misc/emulators/wine/base.nix
··· 1 1 { stdenv, lib, pkgArches, 2 2 name, version, src, monos, geckos, platforms, 3 + pulseaudioSupport, 3 4 buildScript ? null, configureFlags ? "" 4 5 }: 5 6 ··· 19 20 20 21 nativeBuildInputs = toBuildInputs pkgArches (pkgs: (with pkgs; [ 21 22 freetype fontconfig mesa mesa_noglu.osmesa libdrm libpng libjpeg openssl gnutls cups ncurses 22 - ]) ++ (with pkgs.xorg; [ 23 + ]) 24 + ++ lib.optional pulseaudioSupport pkgs.libpulseaudio 25 + ++ (with pkgs.xorg; [ 23 26 xlibsWrapper libXi libXcursor libXinerama libXrandr libXrender libXxf86vm libXcomposite 24 27 ])); 25 28
+2
pkgs/misc/emulators/wine/default.nix
··· 9 9 { lib, pkgs, system, callPackage, 10 10 wineRelease ? "stable", 11 11 wineBuild ? (if system == "x86_64-linux" then "wineWow" else "wine32"), 12 + pulseaudioSupport ? false, 12 13 libtxc_dxtn_Name ? "libtxc_dxtn_s2tc" }: 13 14 14 15 let wine-build = build: release: 15 16 lib.getAttr build (callPackage ./packages.nix { 16 17 wineRelease = release; 18 + inherit pulseaudioSupport; 17 19 }); 18 20 19 21 in if wineRelease == "staging" then
+4
pkgs/misc/emulators/wine/packages.nix
··· 1 1 { system, stdenv, stdenv_32bit, lib, pkgs, pkgsi686Linux, fetchurl, 2 + pulseaudioSupport, 2 3 wineRelease ? "stable" 3 4 }: 4 5 ··· 30 31 name = "wine-${version}"; 31 32 inherit (sources) version src; 32 33 inherit (pkgsi686Linux) lib stdenv; 34 + inherit pulseaudioSupport; 33 35 pkgArches = [ pkgsi686Linux ]; 34 36 geckos = with sources; [ wineGecko32 ]; 35 37 monos = with sources; [ wineMono ]; ··· 39 41 name = "wine64-${version}"; 40 42 inherit (sources) version src; 41 43 inherit lib stdenv; 44 + inherit pulseaudioSupport; 42 45 pkgArches = [ pkgs ]; 43 46 geckos = with sources; [ wineGecko64 ]; 44 47 monos = with sources; [ wineMono ]; ··· 50 53 inherit (sources) version src; 51 54 inherit lib; 52 55 stdenv = stdenv_32bit; 56 + inherit pulseaudioSupport; 53 57 pkgArches = [ pkgs pkgsi686Linux ]; 54 58 geckos = with sources; [ wineGecko32 wineGecko64 ]; 55 59 monos = with sources; [ wineMono ];
+1 -1
pkgs/misc/emulators/wine/staging.nix
··· 15 15 in assert (builtins.parseDrvName wineUnstable.name).version == version; 16 16 17 17 stdenv.lib.overrideDerivation wineUnstable (self: { 18 - nativeBuildInputs = build-inputs [ "libpulseaudio" libtxc_dxtn_Name ] self.nativeBuildInputs; 18 + nativeBuildInputs = build-inputs [ libtxc_dxtn_Name ] self.nativeBuildInputs; 19 19 buildInputs = build-inputs [ "perl" "utillinux" "autoconf" ] self.buildInputs; 20 20 21 21 name = "${self.name}-staging";
+90 -90
pkgs/misc/vim-plugins/default.nix
··· 121 121 }; 122 122 123 123 Hoogle = buildVimPluginFrom2Nix { # created by nix#NixDerivation 124 - name = "Hoogle-2015-11-27"; 124 + name = "Hoogle-2015-12-24"; 125 125 src = fetchgit { 126 126 url = "git://github.com/Twinside/vim-hoogle"; 127 - rev = "f0deb22baad592329b158217143f8b324548b4bd"; 128 - sha256 = "e98b9b729b8c7dfcf34ccd36940e4d855975580864cf36f5e4bb88336fd1e263"; 127 + rev = "a5db36f048ac16ab9774fc86f36cd4ae9a444932"; 128 + sha256 = "31cb37f9fa38e15a52bc35c050e173afc2af5fe8b3d6e5f2026cd5a89bb1a5a0"; 129 129 }; 130 130 dependencies = []; 131 131 ··· 154 154 }; 155 155 156 156 Syntastic = buildVimPluginFrom2Nix { # created by nix#NixDerivation 157 - name = "Syntastic-2015-12-10"; 157 + name = "Syntastic-2016-01-04"; 158 158 src = fetchgit { 159 159 url = "git://github.com/scrooloose/syntastic"; 160 - rev = "48736aa376341518d7bedf3a39daf0ae9e1dcdc0"; 161 - sha256 = "2a523c7d54b5afee1eda6073c71ffcea7ba60e5240d91ea235f007ad89fb8e55"; 160 + rev = "3280220e6c612d03a451d7ee0624893093dcb87b"; 161 + sha256 = "6d066843aeacd9534df5b67c64bb4efd7afb1aaea9024f6dfb74a312a73c8bad"; 162 162 }; 163 163 dependencies = []; 164 164 ··· 209 209 }; 210 210 211 211 UltiSnips = buildVimPluginFrom2Nix { # created by nix#NixDerivation 212 - name = "UltiSnips-2015-12-09"; 212 + name = "UltiSnips-2015-12-22"; 213 213 src = fetchgit { 214 214 url = "git://github.com/SirVer/ultisnips"; 215 - rev = "5a2dcc5cbfa4c1e4a981d57544eb51fc5baeecea"; 216 - sha256 = "dd9b087b7a08b75a60f104cf734b604f8823a219b76531694b4957fce6a2a8d5"; 215 + rev = "dbd43ad27cbfed14c9dc3de6d5acb5f4edb8f649"; 216 + sha256 = "3a1c59ae4097e72c91724157249d6a578e7ef2b10ed675e4372ce9968d66af66"; 217 217 }; 218 218 dependencies = []; 219 219 ··· 269 269 }; 270 270 271 271 ctrlp-py-matcher = buildVimPluginFrom2Nix { # created by nix#NixDerivation 272 - name = "ctrlp-py-matcher-2015-07-18"; 272 + name = "ctrlp-py-matcher-2015-12-22"; 273 273 src = fetchgit { 274 274 url = "git://github.com/FelikZ/ctrlp-py-matcher"; 275 - rev = "9e84cf8072866b92faf5082cb93a554b75e35fd0"; 276 - sha256 = "7d4d5f7da148ddc9c8956aca87f53d9d0ff458b8fb4bc4ab2a9bff2ee6026cde"; 275 + rev = "08b98ff7ba5191616fa4f099a63cdcbad70a0c0f"; 276 + sha256 = "72514b65e12dfa249e51d676d38ff88933309827ef0ece71f3a90a21b4a943e6"; 277 277 }; 278 278 dependencies = []; 279 279 ··· 302 302 }; 303 303 304 304 fugitive = buildVimPluginFrom2Nix { # created by nix#NixDerivation 305 - name = "fugitive-2015-12-15"; 305 + name = "fugitive-2015-12-26"; 306 306 src = fetchgit { 307 307 url = "git://github.com/tpope/vim-fugitive"; 308 - rev = "8851b8fe643517af160f59dfc3d88a0c4eed1fa5"; 309 - sha256 = "bba527606ab63cc6cce24ca1b44226aa37aced7f1aac4c352a6b83ce522c4b5f"; 308 + rev = "18d6d1ab82d9ac15586d7d3c1a36f9ef6fb50eae"; 309 + sha256 = "f448970d07eaf35c0a6d29634ee2114650934943602da8f2bf5a4e3920d62aa2"; 310 310 }; 311 311 dependencies = []; 312 312 ··· 357 357 }; 358 358 359 359 neomake = buildVimPluginFrom2Nix { # created by nix#NixDerivation 360 - name = "neomake-2015-12-11"; 360 + name = "neomake-2015-12-31"; 361 361 src = fetchgit { 362 362 url = "git://github.com/benekastah/neomake"; 363 - rev = "d4c0a6f062a0d098126e87bb718b92fe7b79fd97"; 364 - sha256 = "1b2f1e024ffdfe0613c0aeb4c6fc64d64c6a25a00841538b7a371efd34cb8615"; 363 + rev = "6342a7d7e09083a549800a3cdc0ef95358a73ba7"; 364 + sha256 = "b7d3637b8575ae94dc0e68c4e5fcc41197b3083d1d7302c2e038431a24a3e9d7"; 365 365 }; 366 366 dependencies = []; 367 367 ··· 390 390 }; 391 391 392 392 ctrlp-vim = buildVimPluginFrom2Nix { # created by nix#NixDerivation 393 - name = "ctrlp-vim-2015-11-30"; 393 + name = "ctrlp-vim-2015-12-30"; 394 394 src = fetchgit { 395 395 url = "git://github.com/ctrlpvim/ctrlp.vim"; 396 - rev = "7a80267ed061f3dc30bb319f438bdadfd8c7b1fd"; 397 - sha256 = "ae29eb79ca32ca0edd32602cf6b1e1276ccd4f5086ac4297a7f0dea2dd2e1f1b"; 396 + rev = "97490deda3326182281133454b8813850db4c444"; 397 + sha256 = "1671dffe85dfc2655c06784b783b08f8553f5b90e04b7e9a861d7054c695adbc"; 398 398 }; 399 399 dependencies = []; 400 400 401 401 }; 402 402 403 403 vim-jade = buildVimPluginFrom2Nix { # created by nix#NixDerivation 404 - name = "vim-jade-2015-11-23"; 404 + name = "vim-jade-2016-01-03"; 405 405 src = fetchgit { 406 406 url = "git://github.com/digitaltoad/vim-jade"; 407 - rev = "f760e239386df055eb1892243624fdf7f7c58392"; 408 - sha256 = "812e65090e6a1c31f433878fd1012673a8244d8b6974b1c2ffd1558c30c716cc"; 407 + rev = "999cd2859a7772de707a70afc97f5a7d41a82df9"; 408 + sha256 = "039c1e9b91ac6417c2f38e8b30647115b10ad5485e78782a84100f22ae2da1d8"; 409 409 }; 410 410 dependencies = []; 411 411 ··· 434 434 }; 435 435 436 436 vim-go = buildVimPluginFrom2Nix { # created by nix#NixDerivation 437 - name = "vim-go-2015-12-15"; 437 + name = "vim-go-2016-01-03"; 438 438 src = fetchgit { 439 439 url = "git://github.com/fatih/vim-go"; 440 - rev = "70c363044df808e34d947815d01a37d4e7564421"; 441 - sha256 = "9f1764a5e8c7450c4af9fc64b3170e10d89c4d6b4ad69a758878bed16362cf09"; 440 + rev = "b26351b55a7a44e29f1bde3b82ead43a6980760d"; 441 + sha256 = "57cc4240de5ea185c645c37a0fc51f0b352ad7d2798124f58786ed95579d1bc3"; 442 442 }; 443 443 dependencies = []; 444 444 ··· 621 621 }; 622 622 623 623 vimtex = buildVimPluginFrom2Nix { # created by nix#NixDerivation 624 - name = "vimtex-2015-12-16"; 624 + name = "vimtex-2016-01-03"; 625 625 src = fetchgit { 626 626 url = "git://github.com/lervag/vimtex"; 627 - rev = "e982722e89462716e2ecdb6ce7aa9baea6dc8c98"; 628 - sha256 = "4c0e8399b97cbd24b0131c3e22fc8873d04576e21156b80e5c678b4ce3d19fe0"; 627 + rev = "2de4129abd6b7e441d625403ff420734452ed112"; 628 + sha256 = "0f7a69cd48c6cd6ff9981ec3e4e6bc678491d2b42cf80a274464c0cb762f3397"; 629 629 }; 630 630 dependencies = []; 631 631 632 632 }; 633 633 634 634 vim-easymotion = buildVimPluginFrom2Nix { # created by nix#NixDerivation 635 - name = "vim-easymotion-2015-10-27"; 635 + name = "vim-easymotion-2016-01-03"; 636 636 src = fetchgit { 637 637 url = "git://github.com/lokaltog/vim-easymotion"; 638 - rev = "a21d4474f0e9df7a721246e0a3b386068901965f"; 639 - sha256 = "96bb705e9ff626b139a7f92906468eda63d743b8457a1dc1e4de9c3cf9486525"; 638 + rev = "39abbf30a7bfc16de139b52ce0d7d2a286da52a8"; 639 + sha256 = "5c0be765c2fdb95c632020e0d03a70a2683a9d8f5b2d934be94b89cdb9bbd089"; 640 640 }; 641 641 dependencies = []; 642 642 ··· 658 658 }; 659 659 660 660 vim-startify = buildVimPluginFrom2Nix { # created by nix#NixDerivation 661 - name = "vim-startify-2015-12-11"; 661 + name = "vim-startify-2015-12-28"; 662 662 src = fetchgit { 663 663 url = "git://github.com/mhinz/vim-startify"; 664 - rev = "295fe7a09a881448eea1aa71d26f53dcda3c499b"; 665 - sha256 = "a561488ae8870364f822a93ef18d35511b4dd7e779fd18e365851e8d216df61e"; 664 + rev = "84fb86e5dab808dd99f10565f1aac066292a1289"; 665 + sha256 = "bb05abdd59e38dcb1985438ddfad7cd23f514a6bc2fe84b5e114872e1ca82dc0"; 666 666 }; 667 667 dependencies = []; 668 668 ··· 702 702 }; 703 703 704 704 vim-watchdogs = buildVimPluginFrom2Nix { # created by nix#NixDerivation 705 - name = "vim-watchdogs-2015-07-29"; 705 + name = "vim-watchdogs-2015-12-27"; 706 706 src = fetchgit { 707 707 url = "git://github.com/osyo-manga/vim-watchdogs"; 708 - rev = "e1fce3b4bbe07d55bd7340d25ca0dc900747ad6f"; 709 - sha256 = "72ec214364c674ee1ccd29a6dae925e6cbcaf90e57fef133385a96319108dd2c"; 708 + rev = "52842b03ab0c2e60563ff121d274f8a66ca7e0fc"; 709 + sha256 = "bbf304319a40e755d47afbe0f172ad47aea35f5253669e5da60d8bd717b67070"; 710 710 }; 711 711 dependencies = []; 712 712 713 713 }; 714 714 715 715 racer = buildVimPluginFrom2Nix { # created by nix#NixDerivation 716 - name = "racer-2015-12-11"; 716 + name = "racer-2016-01-02"; 717 717 src = fetchgit { 718 718 url = "git://github.com/phildawes/racer"; 719 - rev = "ce1915a6fd76f76433f30cfaf1fe1b2a8e21cdd4"; 720 - sha256 = "24d48cbf6d69e397cd7a9925c42e2a10fb8c9dc4a0ef8b9122894847224fd735"; 719 + rev = "c94a17f844c13d2f115a53013c0f9e063bc31f23"; 720 + sha256 = "fc42c224fbe12459e17c941ab6d084c838f11b1aabec55eaeebf617df2037124"; 721 721 }; 722 722 dependencies = []; 723 723 buildPhase = '' ··· 727 727 }; 728 728 729 729 neocomplete-vim = buildVimPluginFrom2Nix { # created by nix#NixDerivation 730 - name = "neocomplete-vim-2015-12-13"; 730 + name = "neocomplete-vim-2016-01-03"; 731 731 src = fetchgit { 732 732 url = "git://github.com/shougo/neocomplete.vim"; 733 - rev = "d1cb4c57e5eb8b453b63432dcbcb45a15c0fd07e"; 734 - sha256 = "a704696e66101875e98a1b2b6815acad647b87a07a3842fd6f9f91b8a70411e5"; 733 + rev = "4c108ddadcf44c83c2ee38e5ac0dc8b0b31ed9a8"; 734 + sha256 = "b112cfac177c142f09e4904f9d1b30ca402ed7642f0a4f8f003808dd804df52a"; 735 735 }; 736 736 dependencies = []; 737 737 738 738 }; 739 739 740 740 neosnippet-snippets = buildVimPluginFrom2Nix { # created by nix#NixDerivation 741 - name = "neosnippet-snippets-2015-12-13"; 741 + name = "neosnippet-snippets-2016-01-04"; 742 742 src = fetchgit { 743 743 url = "git://github.com/shougo/neosnippet-snippets"; 744 - rev = "ec9267240ecb855657de830c9c68e5f6e34cfe65"; 745 - sha256 = "319a7ac504b462f7e466c9e02ff6e54b8374e5970f148552986c83136c423854"; 744 + rev = "1c6dacb99fcbeb186646ecafda3f07e07484b326"; 745 + sha256 = "fd834aa6d612f124d9d443d1ac11a0749d4df18f012de0c3729de2ecc3cbead5"; 746 746 }; 747 747 dependencies = []; 748 748 749 749 }; 750 750 751 751 neosnippet-vim = buildVimPluginFrom2Nix { # created by nix#NixDerivation 752 - name = "neosnippet-vim-2015-12-16"; 752 + name = "neosnippet-vim-2016-01-04"; 753 753 src = fetchgit { 754 754 url = "git://github.com/shougo/neosnippet.vim"; 755 - rev = "cfc99eedb5caf3d6baf867db5220a891b4686699"; 756 - sha256 = "aa34c6e28eb281bec6e617f03eb5e094cd2cfe18951f9e4823dda0ccdabaffad"; 755 + rev = "ac6ac62a5bf259f2db5aaf0751b919b377d1a9b2"; 756 + sha256 = "e9eaf68211965a71619bd3ff477982af7eccc30e6cb430a8fbf553469b22c127"; 757 757 }; 758 758 dependencies = []; 759 759 760 760 }; 761 761 762 762 unite-vim = buildVimPluginFrom2Nix { # created by nix#NixDerivation 763 - name = "unite-vim-2015-12-13"; 763 + name = "unite-vim-2015-12-29"; 764 764 src = fetchgit { 765 765 url = "git://github.com/shougo/unite.vim"; 766 - rev = "aefd6c32ef8dc5b357efe7d8e5cd3dd4aa785d5c"; 767 - sha256 = "83562a15afc1c41a5d407fd0eb7d26beec216a9431dd80992bcd615afd595e5e"; 766 + rev = "da791c335135fbd460caa8c8e4671e324ef1f328"; 767 + sha256 = "93a892a9acfcf47953e234b69f80249cc2c1d7cc6d097f173cf6f721fd59068f"; 768 768 }; 769 769 dependencies = []; 770 770 ··· 790 790 }; 791 791 792 792 vimshell-vim = buildVimPluginFrom2Nix { # created by nix#NixDerivation 793 - name = "vimshell-vim-2015-11-24"; 793 + name = "vimshell-vim-2015-12-23"; 794 794 src = fetchgit { 795 795 url = "git://github.com/shougo/vimshell.vim"; 796 - rev = "7931e3bf9fbba738b26bb76143dfc1df17f7a99b"; 797 - sha256 = "f51ee4e8b16460226ce74d87236834f13008dca16dbc9090d89576a545f573bc"; 796 + rev = "a5b3d99ba84e76cf94195c37ab762aef5f7b6e25"; 797 + sha256 = "9a58b00cca9b2cf7ef73cdef2174ab69b7fb427130e5b125b96c6b385dec1947"; 798 798 }; 799 799 dependencies = [ "vimproc-vim" ]; 800 800 }; ··· 822 822 }; 823 823 824 824 vim-quickrun = buildVimPluginFrom2Nix { # created by nix#NixDerivation 825 - name = "vim-quickrun-2015-12-17"; 825 + name = "vim-quickrun-2015-12-28"; 826 826 src = fetchgit { 827 827 url = "git://github.com/thinca/vim-quickrun"; 828 - rev = "97e1c8f6674d3ccce4730510d67c4e15894adcdc"; 829 - sha256 = "c61167569d5b05767fdaffc1b09aab729c777d01afaff8c0efd641a61ebe758c"; 828 + rev = "da5328d0aec495e4dc25232fd769a8a2e56d8f7d"; 829 + sha256 = "a70e2ffa05a2cc2306483e3ecc09972bcdf2d11bfafcfbf3f8195e23475e7102"; 830 830 }; 831 831 dependencies = []; 832 832 ··· 877 877 }; 878 878 879 879 youcompleteme = buildVimPluginFrom2Nix { # created by nix#NixDerivation 880 - name = "youcompleteme-2015-12-13"; 880 + name = "youcompleteme-2016-01-01"; 881 881 src = fetchgit { 882 882 url = "git://github.com/valloric/youcompleteme"; 883 - rev = "93c2a8644bcfc84590bea5e19eab350fe245e504"; 884 - sha256 = "32aaa99c5398d65875c1fdf5ed22f58aeeb267a2840930479523815b94b4111c"; 883 + rev = "07f4402f49a6cb987ebb17a4c17790816e06c3e7"; 884 + sha256 = "cf801f2efe00b20244520cc0806c050b56d768d3826ea4143dc0ac658c6019ba"; 885 885 }; 886 886 dependencies = []; 887 887 buildInputs = [ ··· 1022 1022 }; 1023 1023 1024 1024 vim-wakatime = buildVimPluginFrom2Nix { # created by nix#NixDerivation 1025 - name = "vim-wakatime-2015-12-01"; 1025 + name = "vim-wakatime-2015-12-29"; 1026 1026 src = fetchgit { 1027 1027 url = "git://github.com/wakatime/vim-wakatime"; 1028 - rev = "2b758403d8637cacbab1de603258c611408b9fa7"; 1029 - sha256 = "e3a3da2dd40c4098b18815ca12d83ad1789f5342a8d822669a29e9900600e6ff"; 1028 + rev = "6cf829f08d72ffe56a794a2e4ada5689e7d68237"; 1029 + sha256 = "4913a63dd238bb14c04043e492b3d9f283ea821db86fad559b88ac9f65cf87d8"; 1030 1030 }; 1031 1031 dependencies = []; 1032 1032 buildInputs = [ python ]; 1033 1033 }; 1034 1034 1035 1035 command-t = buildVimPluginFrom2Nix { # created by nix#NixDerivation 1036 - name = "command-t-2015-04-29"; 1036 + name = "command-t-2016-01-01"; 1037 1037 src = fetchgit { 1038 1038 url = "git://github.com/wincent/command-t"; 1039 - rev = "f7344ebbe95c532b2ad01f19877d6d611db0193b"; 1040 - sha256 = "21d7ee2bbff3f79ec3c81bcf683acac6528ea89faef8b7dd075cc83662930a50"; 1039 + rev = "978c0a6bbd8a318023a19787f95cc2041c614db6"; 1040 + sha256 = "954bf0285ec37e975b227d3a1e80165fc52be673d9c5e510265dc911e06ff066"; 1041 1041 }; 1042 1042 dependencies = []; 1043 1043 buildInputs = [ perl ruby ]; ··· 1083 1083 }; 1084 1084 1085 1085 pathogen = buildVimPluginFrom2Nix { # created by nix#NixDerivation 1086 - name = "pathogen-2015-09-20"; 1086 + name = "pathogen-2015-12-25"; 1087 1087 src = fetchgit { 1088 1088 url = "git://github.com/tpope/vim-pathogen"; 1089 - rev = "b4174e4d1a16e7f0c5c6dfca923269a20a9f50c2"; 1090 - sha256 = "703a1d3022cdb03d3d14fbba48be119f4bd7d546ba4bd33185bddaa161bbc63e"; 1089 + rev = "4d584ea8c85408ca0d68b7b1693f3e2db8aa762a"; 1090 + sha256 = "1a1b5e650aa5ff107ce68fecf4d9a57cafc2c15ab74686c5ea3c5985de07470d"; 1091 1091 }; 1092 1092 dependencies = []; 1093 1093 ··· 1127 1127 }; 1128 1128 1129 1129 sensible = buildVimPluginFrom2Nix { # created by nix#NixDerivation 1130 - name = "sensible-2015-12-11"; 1130 + name = "sensible-2015-12-26"; 1131 1131 src = fetchgit { 1132 1132 url = "git://github.com/tpope/vim-sensible"; 1133 - rev = "8c4429c70c186f9be47121b126c13095793062a1"; 1134 - sha256 = "f3b5de776ae4fa2c8769f2f04639d2a0218c88345beba9364899d359d32cf6e5"; 1133 + rev = "680a5c693213daa158c816f068fffa895d961dc9"; 1134 + sha256 = "959b55a97974d85374eccb58379c3f69c0ec43459d4df2484e42a437c61e34bc"; 1135 1135 }; 1136 1136 dependencies = []; 1137 1137 ··· 1445 1445 }; 1446 1446 1447 1447 vim-airline = buildVimPluginFrom2Nix { # created by nix#NixDerivation 1448 - name = "vim-airline-2015-10-18"; 1448 + name = "vim-airline-2015-12-28"; 1449 1449 src = fetchgit { 1450 1450 url = "git://github.com/bling/vim-airline"; 1451 - rev = "14d14cf951c08fc88ca6c3e6f28fe47b99421e23"; 1452 - sha256 = "cfc686cad3749e3bd933b5ae3ea35c4a9c02765be9223e6b30e7d801a9174aa7"; 1451 + rev = "01383136565840a63aa056b82c74be40afcb8ba3"; 1452 + sha256 = "bc9dfb3a0fa15c1149bb8ca5e6e745ca66e141862bbc08e071afec86b8bf9da9"; 1453 1453 }; 1454 1454 dependencies = []; 1455 1455 ··· 1522 1522 }; 1523 1523 1524 1524 vim-multiple-cursors = buildVimPluginFrom2Nix { # created by nix#NixDerivation 1525 - name = "vim-multiple-cursors-2015-10-30"; 1525 + name = "vim-multiple-cursors-2016-01-01"; 1526 1526 src = fetchgit { 1527 1527 url = "git://github.com/terryma/vim-multiple-cursors"; 1528 - rev = "73a78c926ad208bd1984e575ceece276d61a1404"; 1529 - sha256 = "74f51c7c6a903621ee3fc5e78fbce4853b5da086463d015c652808d155cbc7e6"; 1528 + rev = "0dfd3f91b0ea1c70be8873d0a9e5c7d00369610f"; 1529 + sha256 = "820662a93102bc1fac679f108d5e3400f7f5431196d84abf24484849e004c325"; 1530 1530 }; 1531 1531 dependencies = []; 1532 1532 ··· 1544 1544 }; 1545 1545 1546 1546 vim-signify = buildVimPluginFrom2Nix { # created by nix#NixDerivation 1547 - name = "vim-signify-2015-12-09"; 1547 + name = "vim-signify-2015-12-27"; 1548 1548 src = fetchgit { 1549 1549 url = "git://github.com/mhinz/vim-signify"; 1550 - rev = "ecb796139eb0fc9b79fdc28e9b610fa1a2c5f589"; 1551 - sha256 = "6086fb614a0da7f676f2f567b5dfc6ddd765167141f629dc8dbb02862e7db34c"; 1550 + rev = "812b305b795144617cb44d5f4f6cf1c92e5366eb"; 1551 + sha256 = "34eaaa24e6caf07d0e942f482861a6328578a524d76b630ca41d2fc650084225"; 1552 1552 }; 1553 1553 dependencies = []; 1554 1554 1555 1555 }; 1556 1556 1557 1557 vim-snippets = buildVimPluginFrom2Nix { # created by nix#NixDerivation 1558 - name = "vim-snippets-2015-12-17"; 1558 + name = "vim-snippets-2016-01-04"; 1559 1559 src = fetchgit { 1560 1560 url = "git://github.com/honza/vim-snippets"; 1561 - rev = "d5153d63b16e956e892f039ac5982963660a1c68"; 1562 - sha256 = "c79fc743ec1e565111876357136cee1a04ed6b3f58d1586df322a38b026f8a49"; 1561 + rev = "40bcbf8a34a53d54e34fae9e4122ce25b7225144"; 1562 + sha256 = "ef88a33110115b611ed2d707d052c3a4969ff57d8c44d480dd3fc28c9a44fcec"; 1563 1563 }; 1564 1564 dependencies = []; 1565 1565 1566 1566 }; 1567 1567 1568 1568 vim-webdevicons = buildVimPluginFrom2Nix { # created by nix#NixDerivation 1569 - name = "vim-webdevicons-2015-12-01"; 1569 + name = "vim-webdevicons-2015-12-21"; 1570 1570 src = fetchgit { 1571 1571 url = "git://github.com/ryanoasis/vim-devicons"; 1572 - rev = "0e1b7864cfee4b0585daa277bedd992f858e1e75"; 1573 - sha256 = "e265c6c0906d0427409a98458192a4eb94afe671f26fc8de8890dae0e66f7764"; 1572 + rev = "8ac3e02537d32648c3f9738c711639f8b940460c"; 1573 + sha256 = "9d4ee89a551ab9e1ec3938e1eba1fd138bbee975ce3b247b5f56eb2613daefbc"; 1574 1574 }; 1575 1575 dependencies = []; 1576 1576
+1 -1
pkgs/os-specific/linux/i2c-tools/default.nix
··· 5 5 version = "3.1.1"; 6 6 7 7 src = fetchurl { 8 - url = "http://dl.lm-sensors.org/i2c-tools/releases/${name}.tar.bz2"; 8 + url = "http://http.debian.net/debian/pool/main/i/i2c-tools/i2c-tools_${version}.orig.tar.bz2"; 9 9 sha256 = "000pvg995qy1b15ks59gd0klri55hb33kqpg5czy84hw1pbdgm0l"; 10 10 }; 11 11
+3 -3
pkgs/os-specific/linux/kernel/linux-testing.nix
··· 1 1 { stdenv, fetchurl, perl, buildLinux, ... } @ args: 2 2 3 3 import ./generic.nix (args // rec { 4 - version = "4.4-rc6"; 5 - modDirVersion = "4.4.0-rc6"; 4 + version = "4.4-rc7"; 5 + modDirVersion = "4.4.0-rc7"; 6 6 extraMeta.branch = "4.4"; 7 7 8 8 src = fetchurl { 9 9 url = "mirror://kernel/linux/kernel/v4.x/testing/linux-${version}.tar.xz"; 10 - sha256 = "1brb1v6185pf8gnff753hvpdsbdmjr5nsbvj0s4ljlpcgljrn6cb"; 10 + sha256 = "11lk368wqsj76djh4c70447hidldr16h28yb839lpx05z6dpzshx"; 11 11 }; 12 12 13 13 features.iwlwifi = true;
+1
pkgs/os-specific/linux/uksmtools/default.nix
··· 4 4 stdenv.mkDerivation { 5 5 name = "uksmtools-${version}"; 6 6 7 + # This project uses git submodules, which fetchFromGitHub doesn't support: 7 8 src = fetchgit { 8 9 sha256 = "0ngdmici2vgi2z02brzc3f78j1g1y9myzfxn46zlm1skg94fp692"; 9 10 rev = "9f59a3a0b494b758aa91d7d8fa04e21b5e6463c0";
+2 -2
pkgs/servers/mpd/default.nix
··· 29 29 opt = stdenv.lib.optional; 30 30 mkFlag = c: f: if c then "--enable-${f}" else "--disable-${f}"; 31 31 major = "0.19"; 32 - minor = "11"; 32 + minor = "12"; 33 33 34 34 in stdenv.mkDerivation rec { 35 35 name = "mpd-${major}.${minor}"; 36 36 src = fetchurl { 37 37 url = "http://www.musicpd.org/download/mpd/${major}/${name}.tar.xz"; 38 - sha256 = "1iin50s8cnlsgjgjwkm1cbyxlwa0b79f6jfwydx5nyprbam6cp3s"; 38 + sha256 = "0xg8w5vn6xd0yfw55qj6wnav7v14nmr00s3d4w5gixbjrv3ycvvv"; 39 39 }; 40 40 41 41 buildInputs = [ pkgconfig glib boost ]
+8 -8
pkgs/servers/owncloud/default.nix
··· 37 37 }; 38 38 39 39 owncloud70 = common { 40 - versiona = "7.0.11"; 41 - sha256 = "21dd75de4ed832f16f577eb6763d04c663ef13251153ba2e8847e3f5799d2ad2"; 40 + versiona = "7.0.12"; 41 + sha256 = "d1a0f73f5094ec1149b50e2409b5fea0a9bebb16d663789d4b8f98fed341aa91"; 42 42 }; 43 43 44 44 owncloud80 = common { 45 - versiona = "8.0.9"; 46 - sha256 = "0c1f915f4123dbe07d564cf0172930568690ab5257d2fca4fec4ec515858bef1"; 45 + versiona = "8.0.10"; 46 + sha256 = "3054b997f258178b57efc526e14384829ac8ab94757191f2d03c13fcb0a3cd93"; 47 47 }; 48 48 49 49 owncloud81 = common { 50 - versiona = "8.1.4"; 51 - sha256 = "e0f4bf0c85821fc1b6e7f6268080ad3ca3e98c41baa68a9d616809d74a77312d"; 50 + versiona = "8.1.5"; 51 + sha256 = "6d8687e40af32c5ca5adfea3fee556ed987b77ad15a1ead5d40cc87a8b76f4b4"; 52 52 }; 53 53 54 54 owncloud82 = common { 55 - versiona = "8.2.1"; 56 - sha256 = "5390b2172562a5bf97a46e9a621d1dd92f9b74efaccbb77978c39eb90d6988d4"; 55 + versiona = "8.2.2"; 56 + sha256 = "d5b935f904744b8b40b310f19679702387c852498d0dc7aaeda4555a3db9ad5b"; 57 57 }; 58 58 59 59 }
-21
pkgs/servers/x11/xorg/replacements.nix
··· 1 - {stdenv, fetchurl, xorg, automake, autoconf, libtool, makeOverridable}: 2 - { 3 - xf86videoati = {src, suffix}: 4 - makeOverridable stdenv.mkDerivation { 5 - name = "xf86-video-ati-${suffix}"; 6 - buildInputs = xorg.xf86videoati.buildInputs ++ 7 - [autoconf automake libtool]; 8 - builder = ./builder.sh; 9 - inherit src; 10 - preConfigure = '' 11 - export NIX_CFLAGS_COMPILE="$NIX_CFLAGS_COMPILE -DPACKAGE_VERSION_MAJOR=6" 12 - export NIX_CFLAGS_COMPILE="$NIX_CFLAGS_COMPILE -DPACKAGE_VERSION_MINOR=9" 13 - export NIX_CFLAGS_COMPILE="$NIX_CFLAGS_COMPILE -DPACKAGE_VERSION_PATCHLEVEL=999" 14 - 15 - sed -e 's/@DRIVER_MAN_SUFFIX@/man/g' -i man/Makefile.am 16 - export DRIVER_MAN_DIR=$out/share/man/man5 17 - 18 - ./autogen.sh 19 - ''; 20 - }; 21 - }
+13
pkgs/shells/fish/command-not-found.patch
··· 1 + diff --git a/share/functions/__fish_config_interactive.fish b/share/functions/__fish_config_interactive.fish 2 + index c3864a8..a12ac4d 100644 3 + --- a/share/functions/__fish_config_interactive.fish 4 + +++ b/share/functions/__fish_config_interactive.fish 5 + @@ -230,7 +230,7 @@ function __fish_config_interactive -d "Initializations that should be performed 6 + # Check for NixOS handler 7 + else if test -f /run/current-system/sw/bin/command-not-found 8 + function __fish_command_not_found_handler --on-event fish_command_not_found 9 + - /run/current-system/sw/bin/command-not-found $argv[1] 10 + + /run/current-system/sw/bin/command-not-found $argv 11 + end 12 + # Ubuntu Feisty places this command in the regular path instead 13 + else if type -q -p command-not-found
+2
pkgs/shells/fish/default.nix
··· 4 4 name = "fish-${version}"; 5 5 version = "2.2.0"; 6 6 7 + patches = [ ./command-not-found.patch ]; 8 + 7 9 src = fetchurl { 8 10 url = "http://fishshell.com/files/${version}/${name}.tar.gz"; 9 11 sha256 = "0ympqz7llmf0hafxwglykplw6j5cz82yhlrw50lw4bnf2kykjqx7";
+266 -105
pkgs/stdenv/darwin/default.nix
··· 1 - { system ? builtins.currentSystem 2 - , allPackages ? import ../../top-level/all-packages.nix 3 - , platform ? null 4 - , config ? {} 1 + { system ? builtins.currentSystem 2 + , allPackages ? import ../../top-level/all-packages.nix 3 + , platform ? null 4 + , config ? {} 5 + 6 + # Allow passing in bootstrap files directly so we can test the stdenv bootstrap process when changing the bootstrap tools 7 + , bootstrapFiles ? let 8 + fetch = { file, sha256, executable ? true }: import <nix/fetchurl.nix> { 9 + url = "http://tarballs.nixos.org/stdenv-darwin/x86_64/4f07c88d467216d9692fefc951deb5cd3c4cc722/${file}"; 10 + inherit sha256 system executable; 11 + }; in { 12 + sh = fetch { file = "sh"; sha256 = "1siix3wakzil31r2cydmh3v8a1nyq4605dwiabqc5lx73j4xzrzi"; }; 13 + bzip2 = fetch { file = "bzip2"; sha256 = "0zvqm977k11b5cl4ixxb5h0ds24g6z0f8m28z4pqxzpa353lqbla"; }; 14 + mkdir = fetch { file = "mkdir"; sha256 = "13frk8lsfgzlb65p9l26cvxf06aag43yjk7vg9msn7ix3v8cmrg1"; }; 15 + cpio = fetch { file = "cpio"; sha256 = "0ms5i9m1vdksj575sf1djwgm7zhnvfrrb44dxnfh9avr793rc2w4"; }; 16 + tarball = fetch { file = "bootstrap-tools.cpio.bz2"; sha256 = "1lz1b0grl4642h6n635xvi6imf0yyy1zyzdr9ing5aphzz0z5iic"; executable = false; }; 17 + } 5 18 }: 6 19 7 - rec { 20 + let 21 + libSystemProfile = '' 22 + (import "${./standard-sandbox.sb}") 23 + ''; 24 + in rec { 8 25 allPackages = import ../../top-level/all-packages.nix; 9 26 10 - bootstrapTools = derivation { 27 + commonPreHook = '' 28 + export NIX_ENFORCE_PURITY=1 29 + export NIX_IGNORE_LD_THROUGH_GCC=1 30 + stripAllFlags=" " # the Darwin "strip" command doesn't know "-s" 31 + export MACOSX_DEPLOYMENT_TARGET=10.7 32 + export SDKROOT= 33 + export CMAKE_OSX_ARCHITECTURES=x86_64 34 + # Workaround for https://openradar.appspot.com/22671534 on 10.11. 35 + export gl_cv_func_getcwd_abort_bug=no 36 + ''; 37 + 38 + # The one dependency of /bin/sh :( 39 + binShClosure = '' 40 + (allow file-read* (literal "/usr/lib/libncurses.5.4.dylib")) 41 + ''; 42 + 43 + bootstrapTools = derivation rec { 11 44 inherit system; 12 45 13 - name = "trivial-bootstrap-tools"; 14 - builder = "/bin/sh"; 15 - args = [ ./trivial-bootstrap.sh ]; 46 + name = "bootstrap-tools"; 47 + builder = bootstrapFiles.sh; # Not a filename! Attribute 'sh' on bootstrapFiles 48 + args = [ ./unpack-bootstrap-tools.sh ]; 16 49 17 - mkdir = "/bin/mkdir"; 18 - ln = "/bin/ln"; 50 + inherit (bootstrapFiles) mkdir bzip2 cpio tarball; 51 + 52 + __sandboxProfile = binShClosure + libSystemProfile; 19 53 }; 20 54 21 - # The simplest stdenv possible to run fetchadc and get the Apple command-line tools 22 - stage0 = rec { 23 - fetchurl = import ../../build-support/fetchurl { 24 - inherit stdenv; 25 - curl = bootstrapTools; 55 + stageFun = step: last: {shell ? "${bootstrapTools}/bin/sh", 56 + overrides ? (pkgs: {}), 57 + extraPreHook ? "", 58 + extraBuildInputs ? with last.pkgs; [ xz darwin.CF libcxx ], 59 + extraInitialPath ? [], 60 + allowedRequisites ? null}: 61 + let 62 + thisStdenv = import ../generic { 63 + inherit system config shell extraBuildInputs allowedRequisites; 64 + 65 + name = "stdenv-darwin-boot-${toString step}"; 66 + 67 + cc = if isNull last then "/dev/null" else import ../../build-support/cc-wrapper { 68 + inherit shell; 69 + inherit (last) stdenv; 70 + inherit (last.pkgs.darwin) dyld; 71 + 72 + nativeTools = true; 73 + nativePrefix = bootstrapTools; 74 + nativeLibc = false; 75 + libc = last.pkgs.darwin.Libsystem; 76 + isClang = true; 77 + cc = { name = "clang-9.9.9"; outPath = bootstrapTools; }; 78 + }; 79 + 80 + preHook = stage0.stdenv.lib.optionalString (shell == "${bootstrapTools}/bin/sh") '' 81 + # Don't patch #!/interpreter because it leads to retained 82 + # dependencies on the bootstrapTools in the final stdenv. 83 + dontPatchShebangs=1 84 + '' + '' 85 + ${commonPreHook} 86 + ${extraPreHook} 87 + ''; 88 + initialPath = extraInitialPath ++ [ bootstrapTools ]; 89 + fetchurlBoot = import ../../build-support/fetchurl { 90 + stdenv = stage0.stdenv; 91 + curl = bootstrapTools; 92 + }; 93 + 94 + # The stdenvs themselves don't use mkDerivation, so I need to specify this here 95 + stdenvSandboxProfile = binShClosure + libSystemProfile; 96 + extraSandboxProfile = binShClosure + libSystemProfile; 97 + 98 + extraAttrs = { inherit platform; }; 99 + overrides = pkgs: (overrides pkgs) // { fetchurl = thisStdenv.fetchurlBoot; }; 100 + }; 101 + 102 + thisPkgs = allPackages { 103 + inherit system platform; 104 + bootStdenv = thisStdenv; 105 + }; 106 + in { stdenv = thisStdenv; pkgs = thisPkgs; }; 107 + 108 + stage0 = stageFun 0 null { 109 + overrides = orig: with stage0; rec { 110 + darwin = orig.darwin // { 111 + Libsystem = stdenv.mkDerivation { 112 + name = "bootstrap-Libsystem"; 113 + buildCommand = '' 114 + mkdir -p $out 115 + ln -s ${bootstrapTools}/lib $out/lib 116 + ln -s ${bootstrapTools}/include-Libsystem $out/include 117 + ''; 118 + }; 119 + dyld = bootstrapTools; 120 + }; 121 + 122 + libcxx = stdenv.mkDerivation { 123 + name = "bootstrap-libcxx"; 124 + phases = [ "installPhase" "fixupPhase" ]; 125 + installPhase = '' 126 + mkdir -p $out/lib $out/include 127 + ln -s ${bootstrapTools}/lib/libc++.dylib $out/lib/libc++.dylib 128 + ln -s ${bootstrapTools}/include/c++ $out/include/c++ 129 + ''; 130 + linkCxxAbi = false; 131 + setupHook = ../../development/compilers/llvm/3.6/libc++/setup-hook.sh; 132 + }; 133 + 134 + libcxxabi = stdenv.mkDerivation { 135 + name = "bootstrap-libcxxabi"; 136 + buildCommand = '' 137 + mkdir -p $out/lib 138 + ln -s ${bootstrapTools}/lib/libc++abi.dylib $out/lib/libc++abi.dylib 139 + ''; 140 + }; 141 + 26 142 }; 27 143 28 - stdenv = import ../generic { 29 - inherit system config; 30 - name = "stdenv-darwin-boot-0"; 31 - shell = "/bin/bash"; 32 - initialPath = [ bootstrapTools ]; 33 - fetchurlBoot = fetchurl; 34 - cc = null; 144 + extraBuildInputs = []; 145 + }; 146 + 147 + persistent0 = _: {}; 148 + 149 + stage1 = with stage0; stageFun 1 stage0 { 150 + extraPreHook = "export NIX_CFLAGS_COMPILE+=\" -F${bootstrapTools}/Library/Frameworks\""; 151 + extraBuildInputs = [ pkgs.libcxx ]; 152 + 153 + allowedRequisites = 154 + [ bootstrapTools ] ++ (with pkgs; [ libcxx libcxxabi ]) ++ [ pkgs.darwin.Libsystem ]; 155 + 156 + overrides = persistent0; 157 + }; 158 + 159 + persistent1 = orig: with stage1.pkgs; { 160 + inherit 161 + zlib patchutils m4 scons flex perl bison unifdef unzip openssl icu python 162 + libxml2 gettext sharutils gmp libarchive ncurses pkg-config libedit groff 163 + openssh sqlite sed serf openldap db cyrus-sasl expat apr-util subversion xz 164 + findfreetype libssh curl cmake autoconf automake libtool ed cpio coreutils; 165 + 166 + darwin = orig.darwin // { 167 + inherit (darwin) 168 + dyld Libsystem xnu configd libdispatch libclosure launchd; 35 169 }; 36 170 }; 37 171 38 - buildTools = import ../../os-specific/darwin/command-line-tools { 39 - inherit (stage0) stdenv fetchurl; 40 - xar = bootstrapTools; 41 - gzip = bootstrapTools; 42 - cpio = bootstrapTools; 172 + stage2 = with stage1; stageFun 2 stage1 { 173 + extraPreHook = '' 174 + export PATH_LOCALE=${pkgs.darwin.locale}/share/locale 175 + ''; 176 + 177 + allowedRequisites = 178 + [ bootstrapTools ] ++ 179 + (with pkgs; [ xz libcxx libcxxabi icu ]) ++ 180 + (with pkgs.darwin; [ dyld Libsystem CF locale ]); 181 + 182 + overrides = persistent1; 183 + }; 184 + 185 + persistent2 = orig: with stage2.pkgs; { 186 + inherit 187 + patchutils m4 scons flex perl bison unifdef unzip openssl python 188 + gettext sharutils libarchive pkg-config groff bash subversion 189 + openssh sqlite sed serf openldap db cyrus-sasl expat apr-util 190 + findfreetype libssh curl cmake autoconf automake libtool cpio 191 + libcxx libcxxabi; 192 + 193 + darwin = orig.darwin // { 194 + inherit (darwin) 195 + dyld Libsystem xnu configd libdispatch libclosure launchd libiconv locale; 196 + }; 43 197 }; 44 198 45 - preHook = '' 46 - export NIX_IGNORE_LD_THROUGH_GCC=1 47 - export NIX_DONT_SET_RPATH=1 48 - export NIX_NO_SELF_RPATH=1 49 - dontFixLibtool=1 50 - stripAllFlags=" " # the Darwin "strip" command doesn't know "-s" 51 - xargsFlags=" " 52 - export MACOSX_DEPLOYMENT_TARGET=10.7 53 - # Use the 10.9 SDK if we're running on 10.9, and 10.10 if we're 54 - # running on 10.10. We need to use the 10.10 headers for functions 55 - # like readlinkat() that are dynamically detected by configure 56 - # scripts. Very impure, obviously. 57 - export SDKROOT=$(/usr/bin/xcrun --sdk macosx"$(/usr/bin/sw_vers -productVersion | /usr/bin/cut -d. -f1,2)" --show-sdk-path 2> /dev/null || echo /) 58 - export NIX_CFLAGS_COMPILE+=" --sysroot=/var/empty -idirafter $SDKROOT/usr/include -F$SDKROOT/System/Library/Frameworks -Wno-multichar -Wno-deprecated-declarations" 59 - export NIX_LDFLAGS_AFTER+=" -L$SDKROOT/usr/lib" 60 - export CMAKE_OSX_ARCHITECTURES=x86_64 61 - # Workaround for https://openradar.appspot.com/22671534 on 10.11. 62 - export gl_cv_func_getcwd_abort_bug=no 63 - ''; 199 + stage3 = with stage2; stageFun 3 stage2 { 200 + shell = "${pkgs.bash}/bin/bash"; 64 201 65 - # A stdenv that wraps the Apple command-line tools and our other trivial symlinked bootstrap tools 66 - stage1 = rec { 67 - nativePrefix = "${buildTools.tools}/Library/Developer/CommandLineTools/usr"; 202 + # We have a valid shell here (this one has no bootstrap-tools runtime deps) so stageFun 203 + # enables patchShebangs above. Unfortunately, patchShebangs ignores our $SHELL setting 204 + # and instead goes by $PATH, which happens to contain bootstrapTools. So it goes and 205 + # patches our shebangs back to point at bootstrapTools. This makes sure bash comes first. 206 + extraInitialPath = [ pkgs.bash ]; 68 207 69 - stdenv = import ../generic { 70 - name = "stdenv-darwin-boot-1"; 208 + extraPreHook = '' 209 + export PATH_LOCALE=${pkgs.darwin.locale}/share/locale 210 + ''; 71 211 72 - inherit system config; 73 - inherit (stage0.stdenv) shell fetchurlBoot; 212 + allowedRequisites = 213 + [ bootstrapTools ] ++ 214 + (with pkgs; [ icu bash libcxx libcxxabi ]) ++ 215 + (with pkgs.darwin; [ dyld Libsystem locale ]); 74 216 75 - initialPath = stage0.stdenv.initialPath ++ [ nativePrefix ]; 217 + overrides = persistent2; 218 + }; 76 219 77 - preHook = preHook + "\n" + '' 78 - export NIX_LDFLAGS_AFTER+=" -L/usr/lib" 79 - export NIX_ENFORCE_PURITY= 80 - export NIX_CFLAGS_COMPILE+=" -isystem ${nativePrefix}/include/c++/v1 -stdlib=libc++" 81 - export NIX_CFLAGS_LINK+=" -stdlib=libc++ -Wl,-rpath,${nativePrefix}/lib" 82 - ''; 220 + persistent3 = orig: with stage3.pkgs; { 221 + inherit 222 + gnumake gzip gnused bzip2 gawk ed xz patch bash 223 + libcxxabi libcxx ncurses libffi zlib gmp pcre gnugrep 224 + coreutils findutils diffutils patchutils; 83 225 84 - cc = import ../../build-support/cc-wrapper { 85 - nativeTools = true; 86 - nativePrefix = nativePrefix; 87 - nativeLibc = true; 88 - stdenv = stage0.stdenv; 89 - shell = "/bin/bash"; 90 - cc = { 91 - name = "clang-9.9.9"; 92 - cc = "/usr"; 93 - outPath = nativePrefix; 94 - }; 95 - isClang = true; 96 - }; 226 + llvmPackages = let llvmOverride = llvmPackages.llvm.override { inherit libcxxabi; }; 227 + in orig.llvmPackages // { 228 + llvm = llvmOverride; 229 + clang-unwrapped = llvmPackages.clang-unwrapped.override { llvm = llvmOverride; }; 97 230 }; 98 - pkgs = allPackages { 99 - inherit system platform; 100 - bootStdenv = stdenv; 231 + 232 + darwin = orig.darwin // { 233 + inherit (darwin) dyld Libsystem libiconv locale; 101 234 }; 102 235 }; 103 236 104 - stage2 = rec { 105 - stdenv = import ../generic { 106 - name = "stdenv-darwin-boot-2"; 237 + stage4 = with stage3; stageFun 4 stage3 { 238 + shell = "${pkgs.bash}/bin/bash"; 239 + extraInitialPath = [ pkgs.bash ]; 240 + extraPreHook = '' 241 + export PATH_LOCALE=${pkgs.darwin.locale}/share/locale 242 + ''; 243 + overrides = persistent3; 244 + }; 107 245 108 - inherit system config; 109 - inherit (stage1.stdenv) shell fetchurlBoot preHook cc; 246 + persistent4 = orig: with stage4.pkgs; { 247 + inherit 248 + gnumake gzip gnused bzip2 gawk ed xz patch bash 249 + libcxxabi libcxx ncurses libffi zlib icu llvm gmp pcre gnugrep 250 + coreutils findutils diffutils patchutils binutils binutils-raw; 110 251 111 - initialPath = [ stage1.pkgs.xz stage1.pkgs.gnused ] ++ stage1.stdenv.initialPath; 252 + llvmPackages = orig.llvmPackages // { 253 + inherit (llvmPackages) llvm clang-unwrapped; 112 254 }; 113 - pkgs = allPackages { 114 - inherit system platform; 115 - bootStdenv = stdenv; 255 + 256 + darwin = orig.darwin // { 257 + inherit (darwin) dyld Libsystem cctools libiconv; 116 258 }; 117 259 }; 118 260 119 - # Use stage1 to build a whole set of actual tools so we don't have to rely on the Apple prebuilt ones or 120 - # the ugly symlinked bootstrap tools anymore. 121 - stage3 = with stage2; import ../generic { 122 - name = "stdenv-darwin-boot-3"; 123 - 261 + stage5 = with stage4; import ../generic rec { 124 262 inherit system config; 125 263 inherit (stdenv) fetchurlBoot; 126 264 127 - initialPath = (import ../common-path.nix) { inherit pkgs; }; 265 + name = "stdenv-darwin"; 128 266 129 - preHook = preHook + "\n" + '' 130 - export NIX_ENFORCE_PURITY=1 267 + preHook = commonPreHook + '' 268 + export PATH_LOCALE=${pkgs.darwin.locale}/share/locale 131 269 ''; 132 270 271 + stdenvSandboxProfile = binShClosure + libSystemProfile; 272 + extraSandboxProfile = binShClosure + libSystemProfile; 273 + 274 + initialPath = import ../common-path.nix { inherit pkgs; }; 275 + shell = "${pkgs.bash}/bin/bash"; 276 + 133 277 cc = import ../../build-support/cc-wrapper { 134 - inherit stdenv; 135 - nativeTools = false; 136 - nativeLibc = true; 137 - binutils = pkgs.darwin.cctools; 138 - cc = pkgs.llvmPackages.clang-unwrapped; 139 - coreutils = pkgs.coreutils; 140 - shell = "${pkgs.bash}/bin/bash"; 141 - extraPackages = [ pkgs.libcxx ]; 142 - isClang = true; 278 + inherit stdenv shell; 279 + nativeTools = false; 280 + nativeLibc = false; 281 + inherit (pkgs) coreutils binutils; 282 + inherit (pkgs.darwin) dyld; 283 + cc = pkgs.llvmPackages.clang-unwrapped; 284 + libc = pkgs.darwin.Libsystem; 143 285 }; 144 286 145 - shell = "${pkgs.bash}/bin/bash"; 287 + extraBuildInputs = with pkgs; [ darwin.CF libcxx ]; 288 + 289 + extraAttrs = { 290 + inherit platform bootstrapTools; 291 + libc = pkgs.darwin.Libsystem; 292 + shellPackage = pkgs.bash; 293 + }; 294 + 295 + allowedRequisites = (with pkgs; [ 296 + xz libcxx libcxxabi icu gmp gnumake findutils bzip2 llvm zlib libffi 297 + coreutils ed diffutils gnutar gzip ncurses gnused bash gawk 298 + gnugrep llvmPackages.clang-unwrapped patch pcre binutils-raw binutils gettext 299 + ]) ++ (with pkgs.darwin; [ 300 + dyld Libsystem CF cctools libiconv locale 301 + ]); 302 + 303 + overrides = orig: persistent4 orig // { 304 + clang = cc; 305 + inherit cc; 306 + }; 146 307 }; 147 308 148 - stdenvDarwin = stage3; 309 + stdenvDarwin = stage5; 149 310 }
+53 -39
pkgs/stdenv/darwin/make-bootstrap-tools.nix
··· 1 - {system ? builtins.currentSystem}: 1 + { system ? builtins.currentSystem }: 2 2 3 - with import ../../top-level/all-packages.nix {inherit system;}; 3 + with import ../../top-level/all-packages.nix { inherit system; }; 4 4 5 5 rec { 6 6 # We want coreutils without ACL support. ··· 9 9 }); 10 10 11 11 build = stdenv.mkDerivation { 12 - name = "build"; 12 + name = "stdenv-bootstrap-tools"; 13 13 14 14 buildInputs = [nukeReferences cpio]; 15 15 ··· 62 62 cp -d ${openssl}/lib/*.dylib $out/lib 63 63 64 64 cp -d ${gnugrep.pcre}/lib/libpcre*.dylib $out/lib 65 - cp -d ${libiconv}/lib/libiconv*.dylib $out/lib 65 + cp -d ${libiconv}/lib/lib*.dylib $out/lib 66 + cp -d ${gettext}/lib/libintl*.dylib $out/lib 67 + chmod +x $out/lib/libintl*.dylib 68 + cp -d ${ncurses}/lib/libncurses*.dylib $out/lib 66 69 67 70 # Copy what we need of clang 68 - cp -d ${llvmPackages.clang}/bin/clang $out/bin 69 - cp -d ${llvmPackages.clang}/bin/clang++ $out/bin 70 - cp -d ${llvmPackages.clang}/bin/clang-3.5 $out/bin 71 + cp -d ${llvmPackages.clang-unwrapped}/bin/clang $out/bin 72 + cp -d ${llvmPackages.clang-unwrapped}/bin/clang++ $out/bin 73 + cp -d ${llvmPackages.clang-unwrapped}/bin/clang-[0-9].[0-9] $out/bin 71 74 72 - cp -rL ${llvmPackages.clang}/lib/clang $out/lib 75 + cp -rL ${llvmPackages.clang-unwrapped}/lib/clang $out/lib 73 76 74 77 cp -d ${libcxx}/lib/libc++*.dylib $out/lib 75 78 cp -d ${libcxxabi}/lib/libc++abi*.dylib $out/lib ··· 115 118 fi 116 119 done 117 120 118 - for i in $out/bin/* $out/lib/*.dylib $out/lib/clang/3.5.0/lib/darwin/*.dylib $out/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation; do 121 + for i in $out/bin/* $out/lib/*.dylib $out/lib/clang/*/lib/darwin/*.dylib $out/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation; do 119 122 if test -x $i -a ! -L $i; then 120 123 echo "Adding rpath to $i" 121 124 rpathify $i ··· 123 126 done 124 127 125 128 nuke-refs $out/lib/* 126 - nuke-refs $out/lib/clang/3.5.0/lib/darwin/* 129 + nuke-refs $out/lib/clang/*/lib/darwin/* 127 130 nuke-refs $out/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation 128 131 132 + set -x 129 133 mkdir $out/.pack 130 134 mv $out/* $out/.pack 131 135 mv $out/.pack $out/pack 132 136 133 137 mkdir $out/on-server 134 - (cd $out/pack && (find | cpio -o -H newc)) | bzip2 > $out/on-server/bootstrap-tools.cpio.bz2 138 + cp ${stdenv.shell} $out/on-server/sh 139 + cp ${cpio}/bin/cpio $out/on-server 140 + cp ${coreutils_}/bin/mkdir $out/on-server 141 + cp ${bzip2}/bin/bzip2 $out/on-server 135 142 136 - mkdir $out/in-nixpkgs 137 - cp ${stdenv.shell} $out/in-nixpkgs/sh 138 - cp ${cpio}/bin/cpio $out/in-nixpkgs 139 - cp ${coreutils_}/bin/mkdir $out/in-nixpkgs 140 - cp ${bzip2}/bin/bzip2 $out/in-nixpkgs 143 + chmod u+w $out/on-server/* 144 + strip $out/on-server/* 145 + nuke-refs $out/on-server/* 141 146 142 - chmod u+w $out/in-nixpkgs/* 143 - strip $out/in-nixpkgs/* 144 - nuke-refs $out/in-nixpkgs/* 145 - 146 - for i in $out/in-nixpkgs/*; do 147 + for i in $out/on-server/*; do 147 148 fix_dyld $i 148 149 done 150 + 151 + (cd $out/pack && (find | cpio -o -H newc)) | bzip2 > $out/on-server/bootstrap-tools.cpio.bz2 149 152 ''; 150 153 151 154 allowedReferences = []; 155 + 156 + meta = { 157 + maintainers = [ stdenv.lib.maintainers.copumpkin ]; 158 + }; 152 159 }; 153 160 154 - host = stdenv.mkDerivation { 155 - name = "host"; 161 + dist = stdenv.mkDerivation { 162 + name = "stdenv-bootstrap-tools"; 156 163 157 164 buildCommand = '' 158 165 mkdir -p $out/nix-support 159 - 160 - for i in "${build}/on-server/"*; do 161 - echo "file binary-dist $i" >> $out/nix-support/hydra-build-products 162 - done 163 - 164 - echo "darwin-bootstrap-tools-$(date +%Y.%m.%d)" >> $out/nix-support/hydra-release-name 166 + echo "file tarball ${build}/on-server/bootstrap-tools.cpio.bz2" >> $out/nix-support/hydra-build-products 167 + echo "file sh ${build}/on-server/sh" >> $out/nix-support/hydra-build-products 168 + echo "file cpio ${build}/on-server/cpio" >> $out/nix-support/hydra-build-products 169 + echo "file mkdir ${build}/on-server/mkdir" >> $out/nix-support/hydra-build-products 170 + echo "file bzip2 ${build}/on-server/bzip2" >> $out/nix-support/hydra-build-products 165 171 ''; 172 + }; 166 173 167 - allowedReferences = [ build ]; 174 + bootstrapFiles = { 175 + sh = "${build}/on-server/sh"; 176 + bzip2 = "${build}/on-server/bzip2"; 177 + mkdir = "${build}/on-server/mkdir"; 178 + cpio = "${build}/on-server/cpio"; 179 + tarball = "${build}/on-server/bootstrap-tools.cpio.bz2"; 168 180 }; 169 181 170 - unpack = stdenv.mkDerivation { 182 + unpack = stdenv.mkDerivation (bootstrapFiles // { 171 183 name = "unpack"; 172 184 173 185 # This is by necessity a near-duplicate of unpack-bootstrap-tools.sh. If we refer to it directly, ··· 214 226 EOF 215 227 ''; 216 228 217 - tarball = "${build}/on-server/bootstrap-tools.cpio.bz2"; 218 - 219 - mkdir = "${build}/in-nixpkgs/mkdir"; 220 - bzip2 = "${build}/in-nixpkgs/bzip2"; 221 - cpio = "${build}/in-nixpkgs/cpio"; 222 - 223 229 allowedReferences = [ "out" ]; 224 - }; 230 + }); 225 231 226 232 test = stdenv.mkDerivation { 227 233 name = "test"; ··· 247 253 # an SSL-capable curl 248 254 curl --version | grep SSL 249 255 250 - ${build}/in-nixpkgs/sh -c 'echo Hello World' 256 + ${build}/on-server/sh -c 'echo Hello World' 251 257 252 258 export flags="-idirafter ${unpack}/include-Libsystem --sysroot=${unpack} -L${unpack}/lib" 253 259 ··· 280 286 281 287 $out/bin/hello 282 288 ''; 289 + }; 290 + 291 + # The ultimate test: bootstrap a whole stdenv from the tools specified above and get a package set out of it 292 + test-pkgs = let 293 + stdenv = import ./. { inherit system bootstrapFiles; }; 294 + in import ../../top-level/all-packages.nix { 295 + inherit system; 296 + bootStdenv = stdenv.stdenvDarwin; 283 297 }; 284 298 }
-67
pkgs/stdenv/darwin/trivial-bootstrap.sh
··· 1 - 2 - # Building bootstrap tools 3 - echo Building the trivial bootstrap environment... 4 - $mkdir -p $out/bin 5 - 6 - $ln -s $ln $out/bin/ln 7 - 8 - PATH=$out/bin/ 9 - 10 - cd $out/bin 11 - 12 - ln -s $mkdir 13 - ln -s /bin/sh 14 - ln -s /bin/cp 15 - ln -s /bin/dd 16 - ln -s /bin/mv 17 - ln -s /bin/rm 18 - ln -s /bin/ls 19 - ln -s /bin/ps 20 - ln -s /bin/cat 21 - ln -s /bin/bash 22 - ln -s /bin/echo 23 - ln -s /bin/expr 24 - ln -s /bin/test 25 - ln -s /bin/date 26 - ln -s /bin/chmod 27 - ln -s /bin/rmdir 28 - ln -s /bin/sleep 29 - ln -s /bin/hostname 30 - 31 - ln -s /usr/bin/id 32 - ln -s /usr/bin/od 33 - ln -s /usr/bin/tr 34 - ln -s /usr/bin/wc 35 - ln -s /usr/bin/cut 36 - ln -s /usr/bin/cmp 37 - ln -s /usr/bin/sed 38 - ln -s /usr/bin/tar 39 - ln -s /usr/bin/xar 40 - ln -s /usr/bin/awk 41 - ln -s /usr/bin/env 42 - ln -s /usr/bin/tee 43 - ln -s /usr/bin/comm 44 - ln -s /usr/bin/cpio 45 - ln -s /usr/bin/curl 46 - ln -s /usr/bin/find 47 - ln -s /usr/bin/grep 48 - ln -s /usr/bin/gzip 49 - ln -s /usr/bin/head 50 - ln -s /usr/bin/tail 51 - ln -s /usr/bin/sort 52 - ln -s /usr/bin/uniq 53 - ln -s /usr/bin/less 54 - ln -s /usr/bin/true 55 - ln -s /usr/bin/diff 56 - ln -s /usr/bin/egrep 57 - ln -s /usr/bin/fgrep 58 - ln -s /usr/bin/patch 59 - ln -s /usr/bin/uname 60 - ln -s /usr/bin/touch 61 - ln -s /usr/bin/split 62 - ln -s /usr/bin/xargs 63 - ln -s /usr/bin/which 64 - ln -s /usr/bin/install 65 - ln -s /usr/bin/basename 66 - ln -s /usr/bin/dirname 67 - ln -s /usr/bin/readlink
+1 -8
pkgs/stdenv/default.nix
··· 38 38 # Linux standard environment. 39 39 stdenvLinux = (import ./linux { inherit system allPackages platform config lib; }).stdenvLinux; 40 40 41 - # Darwin standard environment. 42 41 stdenvDarwin = (import ./darwin { inherit system allPackages platform config;}).stdenvDarwin; 43 - 44 - # Pure Darwin standard environment. Allows building with the sandbox enabled. To use, 45 - # you can add this to your nixpkgs config: 46 - # 47 - # replaceStdenv = {pkgs}: pkgs.allStdenvs.stdenvDarwinPure 48 - stdenvDarwinPure = (import ./pure-darwin { inherit system allPackages platform config;}).stage5; 49 42 50 43 # Select the appropriate stdenv for the platform `system'. 51 44 stdenv = ··· 56 49 if system == "armv7l-linux" then stdenvLinux else 57 50 if system == "mips64el-linux" then stdenvLinux else 58 51 if system == "powerpc-linux" then /* stdenvLinux */ stdenvNative else 59 - if system == "x86_64-darwin" then stdenvDarwinPure else 52 + if system == "x86_64-darwin" then stdenvDarwin else 60 53 if system == "x86_64-solaris" then stdenvNix else 61 54 if system == "i686-cygwin" then stdenvNative else 62 55 if system == "x86_64-cygwin" then stdenvNative else
-309
pkgs/stdenv/pure-darwin/default.nix
··· 1 - { system ? builtins.currentSystem 2 - , allPackages ? import ../../top-level/all-packages.nix 3 - , platform ? null 4 - , config ? {} 5 - }: 6 - 7 - let 8 - libSystemProfile = '' 9 - (import "${./standard-sandbox.sb}") 10 - ''; 11 - 12 - fetch = { file, sha256, executable ? true }: import <nix/fetchurl.nix> { 13 - url = "http://tarballs.nixos.org/stdenv-darwin/x86_64/4f07c88d467216d9692fefc951deb5cd3c4cc722/${file}"; 14 - inherit sha256 system executable; 15 - }; 16 - 17 - bootstrapFiles = { 18 - sh = fetch { file = "sh"; sha256 = "1siix3wakzil31r2cydmh3v8a1nyq4605dwiabqc5lx73j4xzrzi"; }; 19 - bzip2 = fetch { file = "bzip2"; sha256 = "0zvqm977k11b5cl4ixxb5h0ds24g6z0f8m28z4pqxzpa353lqbla"; }; 20 - mkdir = fetch { file = "mkdir"; sha256 = "13frk8lsfgzlb65p9l26cvxf06aag43yjk7vg9msn7ix3v8cmrg1"; }; 21 - cpio = fetch { file = "cpio"; sha256 = "0ms5i9m1vdksj575sf1djwgm7zhnvfrrb44dxnfh9avr793rc2w4"; }; 22 - }; 23 - 24 - tarball = fetch { file = "bootstrap-tools.cpio.bz2"; sha256 = "1lz1b0grl4642h6n635xvi6imf0yyy1zyzdr9ing5aphzz0z5iic"; executable = false; }; 25 - in rec { 26 - allPackages = import ../../top-level/all-packages.nix; 27 - 28 - commonPreHook = '' 29 - export NIX_ENFORCE_PURITY=1 30 - export NIX_IGNORE_LD_THROUGH_GCC=1 31 - stripAllFlags=" " # the Darwin "strip" command doesn't know "-s" 32 - export MACOSX_DEPLOYMENT_TARGET=10.7 33 - export SDKROOT= 34 - export CMAKE_OSX_ARCHITECTURES=x86_64 35 - # Workaround for https://openradar.appspot.com/22671534 on 10.11. 36 - export gl_cv_func_getcwd_abort_bug=no 37 - ''; 38 - 39 - # The one dependency of /bin/sh :( 40 - binShClosure = '' 41 - (allow file-read* (literal "/usr/lib/libncurses.5.4.dylib")) 42 - ''; 43 - 44 - bootstrapTools = derivation rec { 45 - inherit system tarball; 46 - 47 - name = "bootstrap-tools"; 48 - builder = bootstrapFiles.sh; # Not a filename! Attribute 'sh' on bootstrapFiles 49 - args = [ ./unpack-bootstrap-tools.sh ]; 50 - 51 - inherit (bootstrapFiles) mkdir bzip2 cpio; 52 - 53 - __sandboxProfile = binShClosure + libSystemProfile; 54 - }; 55 - 56 - stageFun = step: last: {shell ? "${bootstrapTools}/bin/sh", 57 - overrides ? (pkgs: {}), 58 - extraPreHook ? "", 59 - extraBuildInputs ? with last.pkgs; [ xz darwin.CF libcxx ], 60 - extraInitialPath ? [], 61 - allowedRequisites ? null}: 62 - let 63 - thisStdenv = import ../generic { 64 - inherit system config shell extraBuildInputs allowedRequisites; 65 - 66 - name = "stdenv-darwin-boot-${toString step}"; 67 - 68 - cc = if isNull last then "/dev/null" else import ../../build-support/cc-wrapper { 69 - inherit shell; 70 - inherit (last) stdenv; 71 - inherit (last.pkgs.darwin) dyld; 72 - 73 - nativeTools = true; 74 - nativePrefix = bootstrapTools; 75 - nativeLibc = false; 76 - libc = last.pkgs.darwin.Libsystem; 77 - isClang = true; 78 - cc = { name = "clang-9.9.9"; outPath = bootstrapTools; }; 79 - }; 80 - 81 - preHook = stage0.stdenv.lib.optionalString (shell == "${bootstrapTools}/bin/sh") '' 82 - # Don't patch #!/interpreter because it leads to retained 83 - # dependencies on the bootstrapTools in the final stdenv. 84 - dontPatchShebangs=1 85 - '' + '' 86 - ${commonPreHook} 87 - ${extraPreHook} 88 - ''; 89 - initialPath = extraInitialPath ++ [ bootstrapTools ]; 90 - fetchurlBoot = import ../../build-support/fetchurl { 91 - stdenv = stage0.stdenv; 92 - curl = bootstrapTools; 93 - }; 94 - 95 - # The stdenvs themselves don't use mkDerivation, so I need to specify this here 96 - stdenvSandboxProfile = binShClosure + libSystemProfile; 97 - extraSandboxProfile = binShClosure + libSystemProfile; 98 - 99 - extraAttrs = { inherit platform; }; 100 - overrides = pkgs: (overrides pkgs) // { fetchurl = thisStdenv.fetchurlBoot; }; 101 - }; 102 - 103 - thisPkgs = allPackages { 104 - inherit system platform; 105 - bootStdenv = thisStdenv; 106 - }; 107 - in { stdenv = thisStdenv; pkgs = thisPkgs; }; 108 - 109 - stage0 = stageFun 0 null { 110 - overrides = orig: with stage0; rec { 111 - darwin = orig.darwin // { 112 - Libsystem = stdenv.mkDerivation { 113 - name = "bootstrap-Libsystem"; 114 - buildCommand = '' 115 - mkdir -p $out 116 - ln -s ${bootstrapTools}/lib $out/lib 117 - ln -s ${bootstrapTools}/include-Libsystem $out/include 118 - ''; 119 - }; 120 - dyld = bootstrapTools; 121 - }; 122 - 123 - libcxx = stdenv.mkDerivation { 124 - name = "bootstrap-libcxx"; 125 - phases = [ "installPhase" "fixupPhase" ]; 126 - installPhase = '' 127 - mkdir -p $out/lib $out/include 128 - ln -s ${bootstrapTools}/lib/libc++.dylib $out/lib/libc++.dylib 129 - ln -s ${bootstrapTools}/include/c++ $out/include/c++ 130 - ''; 131 - linkCxxAbi = false; 132 - setupHook = ../../development/compilers/llvm/3.6/libc++/setup-hook.sh; 133 - }; 134 - 135 - libcxxabi = stdenv.mkDerivation { 136 - name = "bootstrap-libcxxabi"; 137 - buildCommand = '' 138 - mkdir -p $out/lib 139 - ln -s ${bootstrapTools}/lib/libc++abi.dylib $out/lib/libc++abi.dylib 140 - ''; 141 - }; 142 - 143 - }; 144 - 145 - extraBuildInputs = []; 146 - }; 147 - 148 - persistent0 = _: {}; 149 - 150 - stage1 = with stage0; stageFun 1 stage0 { 151 - extraPreHook = "export NIX_CFLAGS_COMPILE+=\" -F${bootstrapTools}/Library/Frameworks\""; 152 - extraBuildInputs = [ pkgs.libcxx ]; 153 - 154 - allowedRequisites = 155 - [ bootstrapTools ] ++ (with pkgs; [ libcxx libcxxabi ]) ++ [ pkgs.darwin.Libsystem ]; 156 - 157 - overrides = persistent0; 158 - }; 159 - 160 - persistent1 = orig: with stage1.pkgs; { 161 - inherit 162 - zlib patchutils m4 scons flex perl bison unifdef unzip openssl icu python 163 - libxml2 gettext sharutils gmp libarchive ncurses pkg-config libedit groff 164 - openssh sqlite sed serf openldap db cyrus-sasl expat apr-util subversion xz 165 - findfreetype libssh curl cmake autoconf automake libtool ed cpio coreutils; 166 - 167 - darwin = orig.darwin // { 168 - inherit (darwin) 169 - dyld Libsystem xnu configd libdispatch libclosure launchd; 170 - }; 171 - }; 172 - 173 - stage2 = with stage1; stageFun 2 stage1 { 174 - extraPreHook = '' 175 - export PATH_LOCALE=${pkgs.darwin.locale}/share/locale 176 - ''; 177 - 178 - allowedRequisites = 179 - [ bootstrapTools ] ++ 180 - (with pkgs; [ xz libcxx libcxxabi icu ]) ++ 181 - (with pkgs.darwin; [ dyld Libsystem CF locale ]); 182 - 183 - overrides = persistent1; 184 - }; 185 - 186 - persistent2 = orig: with stage2.pkgs; { 187 - inherit 188 - patchutils m4 scons flex perl bison unifdef unzip openssl python 189 - gettext sharutils libarchive pkg-config groff bash subversion 190 - openssh sqlite sed serf openldap db cyrus-sasl expat apr-util 191 - findfreetype libssh curl cmake autoconf automake libtool cpio 192 - libcxx libcxxabi; 193 - 194 - darwin = orig.darwin // { 195 - inherit (darwin) 196 - dyld Libsystem xnu configd libdispatch libclosure launchd libiconv locale; 197 - }; 198 - }; 199 - 200 - stage3 = with stage2; stageFun 3 stage2 { 201 - shell = "${pkgs.bash}/bin/bash"; 202 - 203 - # We have a valid shell here (this one has no bootstrap-tools runtime deps) so stageFun 204 - # enables patchShebangs above. Unfortunately, patchShebangs ignores our $SHELL setting 205 - # and instead goes by $PATH, which happens to contain bootstrapTools. So it goes and 206 - # patches our shebangs back to point at bootstrapTools. This makes sure bash comes first. 207 - extraInitialPath = [ pkgs.bash ]; 208 - 209 - extraPreHook = '' 210 - export PATH_LOCALE=${pkgs.darwin.locale}/share/locale 211 - ''; 212 - 213 - allowedRequisites = 214 - [ bootstrapTools ] ++ 215 - (with pkgs; [ icu bash libcxx libcxxabi ]) ++ 216 - (with pkgs.darwin; [ dyld Libsystem locale ]); 217 - 218 - overrides = persistent2; 219 - }; 220 - 221 - persistent3 = orig: with stage3.pkgs; { 222 - inherit 223 - gnumake gzip gnused bzip2 gawk ed xz patch bash 224 - libcxxabi libcxx ncurses libffi zlib gmp pcre gnugrep 225 - coreutils findutils diffutils patchutils; 226 - 227 - llvmPackages = let llvmOverride = llvmPackages.llvm.override { inherit libcxxabi; }; 228 - in orig.llvmPackages // { 229 - llvm = llvmOverride; 230 - clang-unwrapped = llvmPackages.clang-unwrapped.override { llvm = llvmOverride; }; 231 - }; 232 - 233 - darwin = orig.darwin // { 234 - inherit (darwin) dyld Libsystem libiconv locale; 235 - }; 236 - }; 237 - 238 - stage4 = with stage3; stageFun 4 stage3 { 239 - shell = "${pkgs.bash}/bin/bash"; 240 - extraInitialPath = [ pkgs.bash ]; 241 - extraPreHook = '' 242 - export PATH_LOCALE=${pkgs.darwin.locale}/share/locale 243 - ''; 244 - overrides = persistent3; 245 - }; 246 - 247 - persistent4 = orig: with stage4.pkgs; { 248 - inherit 249 - gnumake gzip gnused bzip2 gawk ed xz patch bash 250 - libcxxabi libcxx ncurses libffi zlib icu llvm gmp pcre gnugrep 251 - coreutils findutils diffutils patchutils binutils binutils-raw; 252 - 253 - llvmPackages = orig.llvmPackages // { 254 - inherit (llvmPackages) llvm clang-unwrapped; 255 - }; 256 - 257 - darwin = orig.darwin // { 258 - inherit (darwin) dyld Libsystem cctools libiconv; 259 - }; 260 - }; 261 - 262 - stage5 = with stage4; import ../generic rec { 263 - inherit system config; 264 - inherit (stdenv) fetchurlBoot; 265 - 266 - name = "stdenv-darwin"; 267 - 268 - preHook = commonPreHook + '' 269 - export PATH_LOCALE=${pkgs.darwin.locale}/share/locale 270 - ''; 271 - 272 - stdenvSandboxProfile = binShClosure + libSystemProfile; 273 - extraSandboxProfile = binShClosure + libSystemProfile; 274 - 275 - initialPath = import ../common-path.nix { inherit pkgs; }; 276 - shell = "${pkgs.bash}/bin/bash"; 277 - 278 - cc = import ../../build-support/cc-wrapper { 279 - inherit stdenv shell; 280 - nativeTools = false; 281 - nativeLibc = false; 282 - inherit (pkgs) coreutils binutils; 283 - inherit (pkgs.darwin) dyld; 284 - cc = pkgs.llvmPackages.clang-unwrapped; 285 - libc = pkgs.darwin.Libsystem; 286 - }; 287 - 288 - extraBuildInputs = with pkgs; [ darwin.CF libcxx ]; 289 - 290 - extraAttrs = { 291 - inherit platform bootstrapTools; 292 - libc = pkgs.darwin.Libsystem; 293 - shellPackage = pkgs.bash; 294 - }; 295 - 296 - allowedRequisites = (with pkgs; [ 297 - xz libcxx libcxxabi icu gmp gnumake findutils bzip2 llvm zlib libffi 298 - coreutils ed diffutils gnutar gzip ncurses gnused bash gawk 299 - gnugrep llvmPackages.clang-unwrapped patch pcre binutils-raw binutils gettext 300 - ]) ++ (with pkgs.darwin; [ 301 - dyld Libsystem CF cctools libiconv locale 302 - ]); 303 - 304 - overrides = orig: persistent4 orig // { 305 - clang = cc; 306 - inherit cc; 307 - }; 308 - }; 309 - }
-286
pkgs/stdenv/pure-darwin/make-bootstrap-tools.nix
··· 1 - with import ../../top-level/all-packages.nix { system = "x86_64-darwin"; }; 2 - 3 - rec { 4 - # We want coreutils without ACL support. 5 - coreutils_ = coreutils.override (orig: { 6 - aclSupport = false; 7 - }); 8 - 9 - build = stdenv.mkDerivation { 10 - name = "stdenv-bootstrap-tools"; 11 - 12 - buildInputs = [nukeReferences cpio]; 13 - 14 - buildCommand = '' 15 - mkdir -p $out/bin $out/lib 16 - 17 - # Our (fake) loader 18 - cp -d ${darwin.dyld}/lib/dyld $out/lib/ 19 - 20 - # C standard library stuff 21 - cp -d ${darwin.Libsystem}/lib/*.o $out/lib/ 22 - cp -d ${darwin.Libsystem}/lib/*.dylib $out/lib/ 23 - cp -d ${darwin.Libsystem}/lib/system/*.dylib $out/lib/ 24 - 25 - # Resolv is actually a link to another package, so let's copy it properly 26 - rm $out/lib/libresolv.9.dylib 27 - cp -L ${darwin.Libsystem}/lib/libresolv.9.dylib $out/lib 28 - 29 - cp -rL ${darwin.Libsystem}/include $out 30 - chmod -R u+w $out/include 31 - cp -rL ${icu}/include* $out/include 32 - cp -rL ${libiconv}/include/* $out/include 33 - cp -rL ${gnugrep.pcre}/include/* $out/include 34 - mv $out/include $out/include-Libsystem 35 - 36 - # Copy coreutils, bash, etc. 37 - cp ${coreutils_}/bin/* $out/bin 38 - (cd $out/bin && rm vdir dir sha*sum pinky factor pathchk runcon shuf who whoami shred users) 39 - 40 - cp ${bash}/bin/bash $out/bin 41 - cp ${findutils}/bin/find $out/bin 42 - cp ${findutils}/bin/xargs $out/bin 43 - cp -d ${diffutils}/bin/* $out/bin 44 - cp -d ${gnused}/bin/* $out/bin 45 - cp -d ${gnugrep}/bin/grep $out/bin 46 - cp ${gawk}/bin/gawk $out/bin 47 - cp -d ${gawk}/bin/awk $out/bin 48 - cp ${gnutar}/bin/tar $out/bin 49 - cp ${gzip}/bin/gzip $out/bin 50 - cp ${bzip2}/bin/bzip2 $out/bin 51 - cp -d ${gnumake}/bin/* $out/bin 52 - cp -d ${patch}/bin/* $out/bin 53 - cp -d ${xz}/bin/xz $out/bin 54 - 55 - # This used to be in-nixpkgs, but now is in the bundle 56 - # because I can't be bothered to make it partially static 57 - cp ${curl}/bin/curl $out/bin 58 - cp -d ${curl}/lib/libcurl*.dylib $out/lib 59 - cp -d ${libssh2}/lib/libssh*.dylib $out/lib 60 - cp -d ${openssl}/lib/*.dylib $out/lib 61 - 62 - cp -d ${gnugrep.pcre}/lib/libpcre*.dylib $out/lib 63 - cp -d ${libiconv}/lib/lib*.dylib $out/lib 64 - cp -d ${gettext}/lib/libintl*.dylib $out/lib 65 - chmod +x $out/lib/libintl*.dylib 66 - cp -d ${ncurses}/lib/libncurses*.dylib $out/lib 67 - 68 - # Copy what we need of clang 69 - cp -d ${llvmPackages.clang-unwrapped}/bin/clang $out/bin 70 - cp -d ${llvmPackages.clang-unwrapped}/bin/clang++ $out/bin 71 - cp -d ${llvmPackages.clang-unwrapped}/bin/clang-[0-9].[0-9] $out/bin 72 - 73 - cp -rL ${llvmPackages.clang-unwrapped}/lib/clang $out/lib 74 - 75 - cp -d ${libcxx}/lib/libc++*.dylib $out/lib 76 - cp -d ${libcxxabi}/lib/libc++abi*.dylib $out/lib 77 - 78 - mkdir $out/include 79 - cp -rd ${libcxx}/include/c++ $out/include 80 - 81 - cp -d ${icu}/lib/libicu*.dylib $out/lib 82 - cp -d ${zlib}/lib/libz.* $out/lib 83 - cp -d ${gmpxx}/lib/libgmp*.* $out/lib 84 - cp -d ${xz}/lib/liblzma*.* $out/lib 85 - 86 - # Copy binutils. 87 - for i in as ld ar ranlib nm strip otool install_name_tool dsymutil; do 88 - cp ${darwin.cctools}/bin/$i $out/bin 89 - done 90 - 91 - cp -rd ${pkgs.darwin.CF}/Library $out 92 - 93 - chmod -R u+w $out 94 - 95 - nuke-refs $out/bin/* 96 - 97 - rpathify() { 98 - local libs=$(${darwin.cctools}/bin/otool -L "$1" | tail -n +2 | grep -o "$NIX_STORE.*-\S*") || true 99 - for lib in $libs; do 100 - ${darwin.cctools}/bin/install_name_tool -change $lib "@rpath/$(basename $lib)" "$1" 101 - done 102 - } 103 - 104 - fix_dyld() { 105 - # This is clearly a hack. Once we have an install_name_tool-alike that can patch dyld, this will be nicer. 106 - ${perl}/bin/perl -i -0777 -pe 's/\/nix\/store\/eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee-dyld-239\.4\/lib\/dyld/\/usr\/lib\/dyld\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00/sg' "$1" 107 - } 108 - 109 - # Strip executables even further 110 - for i in $out/bin/*; do 111 - if test -x $i -a ! -L $i; then 112 - chmod +w $i 113 - 114 - fix_dyld $i 115 - strip $i || true 116 - fi 117 - done 118 - 119 - for i in $out/bin/* $out/lib/*.dylib $out/lib/clang/*/lib/darwin/*.dylib $out/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation; do 120 - if test -x $i -a ! -L $i; then 121 - echo "Adding rpath to $i" 122 - rpathify $i 123 - fi 124 - done 125 - 126 - nuke-refs $out/lib/* 127 - nuke-refs $out/lib/clang/*/lib/darwin/* 128 - nuke-refs $out/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation 129 - 130 - set -x 131 - mkdir $out/.pack 132 - mv $out/* $out/.pack 133 - mv $out/.pack $out/pack 134 - 135 - mkdir $out/on-server 136 - cp ${stdenv.shell} $out/on-server/sh 137 - cp ${cpio}/bin/cpio $out/on-server 138 - cp ${coreutils_}/bin/mkdir $out/on-server 139 - cp ${bzip2}/bin/bzip2 $out/on-server 140 - 141 - chmod u+w $out/on-server/* 142 - strip $out/on-server/* 143 - nuke-refs $out/on-server/* 144 - 145 - for i in $out/on-server/*; do 146 - fix_dyld $i 147 - done 148 - 149 - (cd $out/pack && (find | cpio -o -H newc)) | bzip2 > $out/on-server/bootstrap-tools.cpio.bz2 150 - ''; 151 - 152 - allowedReferences = []; 153 - 154 - meta = { 155 - maintainers = [ stdenv.lib.maintainers.copumpkin ]; 156 - }; 157 - }; 158 - 159 - dist = stdenv.mkDerivation { 160 - name = "stdenv-bootstrap-tools"; 161 - 162 - buildCommand = '' 163 - mkdir -p $out/nix-support 164 - echo "file tarball ${build}/on-server/bootstrap-tools.cpio.bz2" >> $out/nix-support/hydra-build-products 165 - echo "file sh ${build}/on-server/sh" >> $out/nix-support/hydra-build-products 166 - echo "file cpio ${build}/on-server/cpio" >> $out/nix-support/hydra-build-products 167 - echo "file mkdir ${build}/on-server/mkdir" >> $out/nix-support/hydra-build-products 168 - echo "file bzip2 ${build}/on-server/bzip2" >> $out/nix-support/hydra-build-products 169 - ''; 170 - }; 171 - 172 - unpack = stdenv.mkDerivation { 173 - name = "unpack"; 174 - 175 - # This is by necessity a near-duplicate of unpack-bootstrap-tools.sh. If we refer to it directly, 176 - # we can't make any changes to it due to our testing stdenv depending on it. Think of this as the 177 - # unpack-bootstrap-tools.sh for the next round of bootstrap tools. 178 - # TODO: think through alternate designs, such as hosting this script as an output of the process. 179 - buildCommand = '' 180 - # Unpack the bootstrap tools tarball. 181 - echo Unpacking the bootstrap tools... 182 - $mkdir $out 183 - $bzip2 -d < $tarball | (cd $out && $cpio -i) 184 - 185 - # Set the ELF interpreter / RPATH in the bootstrap binaries. 186 - echo Patching the tools... 187 - 188 - export PATH=$out/bin 189 - 190 - for i in $out/bin/*; do 191 - if ! test -L $i; then 192 - echo patching $i 193 - install_name_tool -add_rpath $out/lib $i || true 194 - fi 195 - done 196 - 197 - for i in $out/lib/*.dylib $out/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation; do 198 - if ! test -L $i; then 199 - echo patching $i 200 - 201 - id=$(otool -D "$i" | tail -n 1) 202 - install_name_tool -id "$(dirname $i)/$(basename $id)" $i 203 - 204 - libs=$(otool -L "$i" | tail -n +2 | grep -v Libsystem | cat) 205 - if [ -n "$libs" ]; then 206 - install_name_tool -add_rpath $out/lib $i 207 - fi 208 - fi 209 - done 210 - 211 - ln -s bash $out/bin/sh 212 - ln -s bzip2 $out/bin/bunzip2 213 - 214 - cat >$out/bin/dsymutil << EOF 215 - #!$out/bin/sh 216 - EOF 217 - ''; 218 - 219 - tarball = "${build}/on-server/bootstrap-tools.cpio.bz2"; 220 - 221 - mkdir = "${build}/on-server/mkdir"; 222 - bzip2 = "${build}/on-server/bzip2"; 223 - cpio = "${build}/on-server/cpio"; 224 - 225 - allowedReferences = [ "out" ]; 226 - }; 227 - 228 - test = stdenv.mkDerivation { 229 - name = "test"; 230 - 231 - realBuilder = "${unpack}/bin/bash"; 232 - 233 - buildCommand = '' 234 - export PATH=${unpack}/bin 235 - ls -l 236 - mkdir $out 237 - mkdir $out/bin 238 - sed --version 239 - find --version 240 - diff --version 241 - patch --version 242 - make --version 243 - awk --version 244 - grep --version 245 - clang --version 246 - xz --version 247 - 248 - # The grep will return a nonzero exit code if there is no match, and we want to assert that we have 249 - # an SSL-capable curl 250 - curl --version | grep SSL 251 - 252 - ${build}/on-server/sh -c 'echo Hello World' 253 - 254 - export flags="-idirafter ${unpack}/include-Libsystem --sysroot=${unpack} -L${unpack}/lib" 255 - 256 - export CPP="clang -E $flags" 257 - export CC="clang $flags -Wl,-rpath,${unpack}/lib -Wl,-v" 258 - export CXX="clang++ $flags --stdlib=libc++ -lc++abi -isystem${unpack}/include/c++/v1 -Wl,-rpath,${unpack}/lib -Wl,-v" 259 - 260 - echo '#include <stdio.h>' >> foo.c 261 - echo '#include <float.h>' >> foo.c 262 - echo '#include <limits.h>' >> foo.c 263 - echo 'int main() { printf("Hello World\n"); return 0; }' >> foo.c 264 - $CC -o $out/bin/foo foo.c 265 - $out/bin/foo 266 - 267 - echo '#include <CoreFoundation/CoreFoundation.h>' >> bar.c 268 - echo 'int main() { CFShow(CFSTR("Hullo")); return 0; }' >> bar.c 269 - $CC -F${unpack}/Library/Frameworks -framework CoreFoundation -o $out/bin/bar bar.c 270 - $out/bin/bar 271 - 272 - echo '#include <iostream>' >> bar.cc 273 - echo 'int main() { std::cout << "Hello World\n"; }' >> bar.cc 274 - $CXX -v -o $out/bin/bar bar.cc 275 - $out/bin/bar 276 - 277 - tar xvf ${hello.src} 278 - cd hello-* 279 - ./configure --prefix=$out 280 - make 281 - make install 282 - 283 - $out/bin/hello 284 - ''; 285 - }; 286 - }
pkgs/stdenv/pure-darwin/standard-sandbox.sb pkgs/stdenv/darwin/standard-sandbox.sb
-66
pkgs/stdenv/pure-darwin/trivial-bootstrap.sh
··· 1 - 2 - # Building bootstrap tools 3 - echo Building the trivial bootstrap environment... 4 - $mkdir -p $out/bin 5 - 6 - $ln -s $ln $out/bin/ln 7 - 8 - PATH=$out/bin/ 9 - 10 - cd $out/bin 11 - 12 - ln -s $mkdir 13 - ln -s /bin/sh 14 - ln -s /bin/cp 15 - ln -s /bin/mv 16 - ln -s /bin/rm 17 - ln -s /bin/ls 18 - ln -s /bin/ps 19 - ln -s /bin/cat 20 - ln -s /bin/bash 21 - ln -s /bin/echo 22 - ln -s /bin/expr 23 - ln -s /bin/test 24 - ln -s /bin/date 25 - ln -s /bin/chmod 26 - ln -s /bin/rmdir 27 - ln -s /bin/sleep 28 - ln -s /bin/hostname 29 - 30 - ln -s /usr/bin/id 31 - ln -s /usr/bin/od 32 - ln -s /usr/bin/tr 33 - ln -s /usr/bin/wc 34 - ln -s /usr/bin/cut 35 - ln -s /usr/bin/cmp 36 - ln -s /usr/bin/sed 37 - ln -s /usr/bin/tar 38 - ln -s /usr/bin/xar 39 - ln -s /usr/bin/awk 40 - ln -s /usr/bin/env 41 - ln -s /usr/bin/tee 42 - ln -s /usr/bin/comm 43 - ln -s /usr/bin/cpio 44 - ln -s /usr/bin/curl 45 - ln -s /usr/bin/find 46 - ln -s /usr/bin/grep 47 - ln -s /usr/bin/gzip 48 - ln -s /usr/bin/head 49 - ln -s /usr/bin/tail 50 - ln -s /usr/bin/sort 51 - ln -s /usr/bin/uniq 52 - ln -s /usr/bin/less 53 - ln -s /usr/bin/true 54 - ln -s /usr/bin/diff 55 - ln -s /usr/bin/egrep 56 - ln -s /usr/bin/fgrep 57 - ln -s /usr/bin/patch 58 - ln -s /usr/bin/uname 59 - ln -s /usr/bin/touch 60 - ln -s /usr/bin/split 61 - ln -s /usr/bin/xargs 62 - ln -s /usr/bin/which 63 - ln -s /usr/bin/install 64 - ln -s /usr/bin/basename 65 - ln -s /usr/bin/dirname 66 - ln -s /usr/bin/readlink
-54
pkgs/stdenv/pure-darwin/unpack-bootstrap-tools.sh
··· 1 - set -e 2 - 3 - # Unpack the bootstrap tools tarball. 4 - echo Unpacking the bootstrap tools... 5 - $mkdir $out 6 - $bzip2 -d < $tarball | (cd $out && $cpio -i) 7 - 8 - # Set the ELF interpreter / RPATH in the bootstrap binaries. 9 - echo Patching the tools... 10 - 11 - export PATH=$out/bin 12 - 13 - for i in $out/bin/*; do 14 - if ! test -L $i; then 15 - echo patching $i 16 - install_name_tool -add_rpath $out/lib $i || true 17 - fi 18 - done 19 - 20 - for i in $out/lib/*.dylib $out/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation; do 21 - if ! test -L $i; then 22 - echo patching $i 23 - 24 - id=$(otool -D "$i" | tail -n 1) 25 - install_name_tool -id "$(dirname $i)/$(basename $id)" $i 26 - 27 - libs=$(otool -L "$i" | tail -n +2 | grep -v libSystem | cat) 28 - if [ -n "$libs" ]; then 29 - install_name_tool -add_rpath $out/lib $i 30 - fi 31 - fi 32 - done 33 - 34 - ln -s bash $out/bin/sh 35 - ln -s bzip2 $out/bin/bunzip2 36 - 37 - # Provide a gunzip script. 38 - cat > $out/bin/gunzip <<EOF 39 - #!$out/bin/sh 40 - exec $out/bin/gzip -d "\$@" 41 - EOF 42 - chmod +x $out/bin/gunzip 43 - 44 - # Provide fgrep/egrep. 45 - echo "#! $out/bin/sh" > $out/bin/egrep 46 - echo "exec $out/bin/grep -E \"\$@\"" >> $out/bin/egrep 47 - echo "#! $out/bin/sh" > $out/bin/fgrep 48 - echo "exec $out/bin/grep -F \"\$@\"" >> $out/bin/fgrep 49 - 50 - cat >$out/bin/dsymutil << EOF 51 - #!$out/bin/sh 52 - EOF 53 - 54 - chmod +x $out/bin/egrep $out/bin/fgrep $out/bin/dsymutil
+1 -1
pkgs/tools/archivers/unrar/default.nix
··· 28 28 meta = with stdenv.lib; { 29 29 description = "Utility for RAR archives"; 30 30 homepage = http://www.rarlab.com/; 31 - license = licenses.gpl2; 31 + license = licenses.unfreeRedistributable; 32 32 maintainers = [ maintainers.ehmry ]; 33 33 platforms = platforms.all; 34 34 };
+11 -3
pkgs/tools/cd-dvd/mkcue/default.nix
··· 1 1 { stdenv, fetchurl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "mkcue-1"; 4 + name = "mkcue-${version}"; 5 + version = "1"; 5 6 6 7 src = fetchurl { 7 - url = "https://diplodocus.org/dist/audio/${name}.tar.bz2"; 8 - sha256 = "08md7si3frb8sjfqf3pm7qbrcvkbd10mzszlbydkxnyxdb530b04"; 8 + url = "http://http.debian.net/debian/pool/main/m/mkcue/mkcue_${version}.orig.tar.gz"; 9 + sha256 = "0rs897wp08z4hd904bjb5sl4lb8qxj82x5ayklr28bhg9pd5gbra"; 9 10 }; 10 11 11 12 preInstall = "mkdir -pv $out/bin"; 12 13 postInstall = "chmod -v +w $out/bin/mkcue"; 14 + 15 + meta = with stdenv.lib; { 16 + description = "Generates CUE sheets from a CD TOC"; 17 + license = licenses.lgpl2Plus; 18 + platforms = platforms.linux; 19 + maintainers = with maintainers; [ pSub ]; 20 + }; 13 21 }
+44 -15
pkgs/tools/compression/zopfli/default.nix
··· 1 - { stdenv, fetchFromGitHub }: 1 + { stdenv, fetchFromGitHub, fetchpatch }: 2 2 3 + let version = "1.0.1"; in 3 4 stdenv.mkDerivation rec { 4 5 name = "zopfli-${version}"; 5 - version = "1.0.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "google"; 9 9 repo = "zopfli"; 10 10 rev = name; 11 11 name = "${name}-src"; 12 - sha256 = "0r2k3md24y5laslzsph7kh4synm5az4ppv64idrvjk5yh2qwwb62"; 12 + sha256 = "1dclll3b5azy79jfb8vhb21drivi7vaay5iw0lzs4lrh6dgyvg6y"; 13 13 }; 14 14 15 + patches = [ 16 + (fetchpatch { 17 + sha256 = "07z6df1ahx40hnsrcs5mx3fc58rqv8fm0pvyc7gb7kc5mwwghvvp"; 18 + name = "Fix-invalid-read-outside-allocated-memory.patch"; 19 + url = "https://github.com/google/zopfli/commit/9429e20de3885c0e0d9beac23f703fce58461021.patch"; 20 + }) 21 + (fetchpatch { 22 + sha256 = "07m8q5kipr84cg8i1l4zd22ai9bmdrblpdrsc96llg7cm51vqdqy"; 23 + name = "zopfli-bug-and-typo-fixes.patch"; 24 + url = "https://github.com/google/zopfli/commit/7190e08ecac2446c7c9157cfbdb7157b18912a92.patch"; 25 + }) 26 + ]; 27 + 28 + enableParallelBuilding = true; 29 + buildFlags = [ 30 + "zopfli" 31 + "libzopfli" 32 + "zopflipng" 33 + "libzopflipng" 34 + ]; 35 + 15 36 installPhase = '' 16 - install -D zopfli $out/bin/zopfli 37 + mkdir -p $out/bin 38 + install -m755 zopfli{,png} $out/bin 39 + 40 + mkdir -p $out/lib 41 + install -m755 libzopfli{,png}.so* $out/lib 42 + 43 + mkdir -p $out/share/doc/zopfli 44 + install -m644 README* $out/share/doc/zopfli 17 45 ''; 18 46 19 47 meta = with stdenv.lib; { 20 - homepage = https://github.com/google/zopfli; 21 - description = "A compression tool to perform very good, but slow, deflate or zlib compression"; 22 - longDescription = 23 - ''Zopfli Compression Algorithm is a compression library programmed 24 - in C to perform very good, but slow, deflate or zlib compression. 48 + inherit version; 49 + inherit (src.meta) homepage; 50 + description = "Very good, but slow, deflate or zlib compression"; 51 + longDescription = '' 52 + Zopfli Compression Algorithm is a compression library programmed 53 + in C to perform very good, but slow, deflate or zlib compression. 25 54 26 - This library can only compress, not decompress. Existing zlib or 27 - deflate libraries can decompress the data. 28 - ''; 29 - platforms = stdenv.lib.platforms.linux; 30 - license = stdenv.lib.licenses.asl20; 31 - maintainers = with maintainers; [ bobvanderlinden ]; 55 + This library can only compress, not decompress. Existing zlib or 56 + deflate libraries can decompress the data. 57 + ''; 58 + platforms = platforms.linux; 59 + license = licenses.asl20; 60 + maintainers = with maintainers; [ bobvanderlinden nckx ]; 32 61 }; 33 62 }
pkgs/tools/filesystems/btrfsprogs/default.nix pkgs/tools/filesystems/btrfs-progs/default.nix
+2 -2
pkgs/tools/filesystems/disorderfs/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "disorderfs-${version}"; 5 - version = "0.4.1"; 5 + version = "0.4.2"; 6 6 7 7 src = fetchurl { 8 8 url = "http://http.debian.net/debian/pool/main/d/disorderfs/disorderfs_${version}.orig.tar.gz"; 9 - sha256 = "1kiih49l3wi8nhybzrb0kn4aidhpy23s5h2grjwx8rwla5b4cja6"; 9 + sha256 = "1qr52lzynd5b5ancrn0g1ah95w7iikxgqsmixlacn2vlh8n9jym5"; 10 10 }; 11 11 12 12 nativeBuildInputs = [ pkgconfig asciidoc ];
+7 -12
pkgs/tools/filesystems/f2fs-tools/default.nix
··· 1 - { stdenv, fetchgit, autoconf, automake, libtool, pkgconfig, libuuid }: 1 + { stdenv, fetchurl, autoreconfHook, libuuid }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "f2fs-tools-${version}"; 5 - version = "1.4.1"; 5 + version = "1.5.0"; 6 6 7 - src = fetchgit { 8 - url = git://git.kernel.org/pub/scm/linux/kernel/git/jaegeuk/f2fs-tools.git; 9 - rev = "refs/tags/v${version}"; 10 - sha256 = "16i74r2656q6x4gg5kgjy2fxipr5czbm10r66s34pi2lfczbwhjr"; 7 + src = fetchurl { 8 + url = "http://git.kernel.org/cgit/linux/kernel/git/jaegeuk/f2fs-tools.git/snapshot/${name}.tar.gz"; 9 + sha256 = "1pdgl78xkagxlmavy6x118wjzz8yvl8n08fc1m6wah9bf93qlhdf"; 11 10 }; 12 11 13 - buildInputs = [ autoconf automake libtool pkgconfig libuuid ]; 14 - 15 - preConfigure = '' 16 - sed -i '/AC_SUBST/d' configure.ac 17 - autoreconf --install 18 - ''; 12 + nativeBuildInputs = [ autoreconfHook ]; 13 + buildInputs = [ libuuid ]; 19 14 20 15 meta = with stdenv.lib; { 21 16 homepage = "http://git.kernel.org/cgit/linux/kernel/git/jaegeuk/f2fs-tools.git/";
+6 -8
pkgs/tools/filesystems/zfstools/default.nix
··· 1 1 { stdenv, fetchFromGitHub, ruby, zfs }: 2 2 3 + let version = "0.3.3"; in 3 4 stdenv.mkDerivation rec { 4 5 name = "zfstools-${version}"; 5 - 6 - version = "0.3.2"; 7 6 8 7 src = fetchFromGitHub { 9 - sha256 = "1dzfir9413qrmx9kqpndi3l2m09f6l1wspnwn84lm3n1g9cr46nd"; 8 + sha256 = "1gj6jksc9crmjvhsx8yp3l06b5vcm415l0bmdjcil7jjbfhwwp2k"; 10 9 rev = "v${version}"; 11 10 repo = "zfstools"; 12 11 owner = "bdrewery"; ··· 27 26 sed -e 's|cmd.*=.*"zfs |cmd = "${zfs}/sbin/zfs |g' -i $out/lib/zfstools/{dataset,snapshot}.rb 28 27 ''; 29 28 30 - meta = { 29 + meta = with stdenv.lib; { 31 30 inherit version; 32 - homepage = https://github.com/bdrewery/zfstools; 33 - description = "OpenSolaris-like and compatible auto snapshotting script for ZFS"; 31 + inherit (src.meta) homepage; 32 + description = "OpenSolaris-compatible auto-snapshotting script for ZFS"; 34 33 longDescription = '' 35 34 zfstools is an OpenSolaris-like and compatible auto snapshotting script 36 35 for ZFS, which also supports auto snapshotting mysql databases. 37 36 ''; 38 - 39 - license = stdenv.lib.licenses.bsd2; 37 + license = licenses.bsd2; 40 38 }; 41 39 }
+8 -2
pkgs/tools/inputmethods/fcitx/fcitx-configtool.nix
··· 1 - { stdenv, fetchurl, pkgconfig, cmake, fcitx, gtk3, isocodes }: 1 + { stdenv, fetchurl, makeWrapper, pkgconfig, cmake, fcitx, gtk3, isocodes, gnome3 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "fcitx-configtool-0.4.8"; ··· 15 15 sha256 = "1vaim0namw58bfafbvws1vgd4010p19zwqfbx6bd1zi5sgchdg0f"; 16 16 }; 17 17 18 - buildInputs = [ fcitx cmake isocodes pkgconfig gtk3 ]; 18 + buildInputs = [ makeWrapper fcitx cmake isocodes pkgconfig gtk3 19 + gnome3.defaultIconTheme ]; 20 + 21 + preFixup = '' 22 + wrapProgram $out/bin/fcitx-config-gtk3 \ 23 + --prefix XDG_DATA_DIRS : "$XDG_ICON_DIRS"; 24 + ''; 19 25 } 20 26
+7 -1
pkgs/tools/misc/colord/default.nix
··· 16 16 configureFlags = [ 17 17 "--with-udevrulesdir=$out/lib/udev/rules.d" 18 18 "--with-systemdsystemunitdir=$(out)/etc/systemd/system" 19 + "--localstatedir=/var" 19 20 "--disable-bash-completion" 20 21 ]; 21 22 23 + # don't touch /var at install time, colord creates what it needs at runtime 24 + postPatch = '' 25 + sed -i -e "s|if test -w .*;|if false;|" src/Makefile.in 26 + sed -i -e "s|if test -w .*;|if false;|" src/Makefile.am 27 + ''; 28 + 22 29 buildInputs = [ glib polkit pkgconfig intltool gusb libusb1 lcms2 sqlite systemd dbus gobjectIntrospection 23 30 bashCompletion argyllcms automake autoconf libgudev ]; 24 31 25 32 postInstall = '' 26 - rm -fr $out/var/lib/colord 27 33 mkdir -p $out/etc/bash_completion.d 28 34 cp -v data/colormgr $out/etc/bash_completion.d 29 35 '';
+2 -2
pkgs/tools/misc/parallel/default.nix
··· 1 1 { fetchurl, stdenv, perl, makeWrapper, procps }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "parallel-20151122"; 4 + name = "parallel-20151222"; 5 5 6 6 src = fetchurl { 7 7 url = "mirror://gnu/parallel/${name}.tar.bz2"; 8 - sha256 = "0phn9dlkqlq3cq468ypxbbn78bsjcin743pyvf8ip4qg6jz662jm"; 8 + sha256 = "03czpnsj77xxzqxzzr1b39ym9acn94hknzbilbh28v5q1wk7r4mf"; 9 9 }; 10 10 11 11 nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/tools/misc/snapper/default.nix
··· 1 - { stdenv, fetchgit, autoconf, automake, boost, pkgconfig, libtool, acl, libxml2, btrfsProgs, dbus_libs, docbook_xsl, libxslt, docbook_xml_dtd_45, diffutils, pam, utillinux, attr, gettext }: 1 + { stdenv, fetchgit, autoconf, automake, boost, pkgconfig, libtool, acl, libxml2, btrfs-progs, dbus_libs, docbook_xsl, libxslt, docbook_xml_dtd_45, diffutils, pam, utillinux, attr, gettext }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "snapper-0.2.4"; ··· 9 9 sha256 = "ec4b829430bd7181995e66a26ac86e8ac71c27e77faf8eb06db71d645c6f859b"; 10 10 }; 11 11 12 - buildInputs = [ autoconf automake boost pkgconfig libtool acl libxml2 btrfsProgs dbus_libs docbook_xsl libxslt docbook_xml_dtd_45 diffutils pam utillinux attr gettext ]; 12 + buildInputs = [ autoconf automake boost pkgconfig libtool acl libxml2 btrfs-progs dbus_libs docbook_xsl libxslt docbook_xml_dtd_45 diffutils pam utillinux attr gettext ]; 13 13 14 14 patchPhase = '' 15 15 # work around missing btrfs/version.h; otherwise, use "-DHAVE_BTRFS_VERSION_H"
+4
pkgs/tools/misc/system-config-printer/default.nix
··· 36 36 ( cd $out/share/system-config-printer/troubleshoot 37 37 mv .__init__.py-wrapped __init__.py 38 38 ) 39 + 40 + # Upstream issue: https://github.com/twaugh/system-config-printer/issues/28 41 + sed -i -e "s|/usr/bin|$out/bin|" "$out/share/dbus-1/services/org.fedoraproject.Config.Printing.service" 39 42 ''; 40 43 41 44 meta = { 42 45 homepage = http://cyberelk.net/tim/software/system-config-printer/; 46 + platforms = stdenv.lib.platforms.linux; 43 47 }; 44 48 }
+37
pkgs/tools/misc/tldr/default.nix
··· 1 + {stdenv, clang, fetchurl, curl}: 2 + 3 + with stdenv.lib; 4 + 5 + let version = "1.0"; in 6 + stdenv.mkDerivation { 7 + name = "tldr-${version}"; 8 + 9 + src = fetchurl { 10 + url = "https://github.com/tldr-pages/tldr-cpp-client/archive/v${version}.tar.gz"; 11 + sha256 = "11k2pc4vfhx9q3cfd1145sdwhis9g0zhw4qnrv7s7mqnslzrrkgw"; 12 + }; 13 + 14 + meta = { 15 + inherit version; 16 + description = "Simplified and community-driven man pages"; 17 + longDescription = '' 18 + tldr pages gives common use cases for commands, so you don't need to hunt through a man page for the correct flags. 19 + ''; 20 + homepage = http://tldr-pages.github.io; 21 + license = licenses.mit; 22 + maintainers = [maintainers.taeer]; 23 + platforms = platforms.linux; 24 + 25 + }; 26 + 27 + buildInputs = [curl clang]; 28 + 29 + preBuild = '' 30 + cd src 31 + ''; 32 + 33 + installPhase = '' 34 + install -d $prefix/bin 35 + install tldr $prefix/bin 36 + ''; 37 + }
+2 -2
pkgs/tools/misc/youtube-dl/default.nix
··· 14 14 15 15 src = fetchurl { 16 16 url = "http://yt-dl.org/downloads/${meta.version}/${name}.tar.gz"; 17 - sha256 = "cceeb606e723c0291de85eecb9a551ca887f3be4db786ad621011a9201a482b1"; 17 + sha256 = "0b0pk8h2iswdiyf65c0zcwcad9dm2hid67fnfafj7d3ikp4kfbvk"; 18 18 }; 19 19 20 20 buildInputs = [ makeWrapper zip pandoc ]; ··· 24 24 ''wrapProgram $out/bin/youtube-dl --prefix PATH : "${ffmpeg}/bin"''; 25 25 26 26 meta = with stdenv.lib; { 27 - version = "2015.11.24"; 27 + version = "2016.01.01"; 28 28 homepage = http://rg3.github.io/youtube-dl/; 29 29 repositories.git = https://github.com/rg3/youtube-dl.git; 30 30 description = "Command-line tool to download videos from YouTube.com and other sites";
+2 -2
pkgs/tools/networking/babeld/default.nix
··· 1 1 { stdenv, fetchurl }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "babeld-1.5.1"; 4 + name = "babeld-1.6.1"; 5 5 6 6 src = fetchurl { 7 7 url = "http://www.pps.univ-paris-diderot.fr/~jch/software/files/${name}.tar.gz"; 8 - sha256 = "1ch9nn2jmmpyq6c7106lzd3cfnxq4ychjx0pvwn960kssn2cgakk"; 8 + sha256 = "1d45f12mhlxsf8jlpgb1gig5bjg5izdkfk173rd9a1wi7s82pisl"; 9 9 }; 10 10 11 11 preBuild = ''
+6 -6
pkgs/tools/networking/connman/default.nix
··· 1 1 { stdenv, fetchgit, autoconf, automake, libtool, pkgconfig, openconnect, file, 2 - openvpn, vpnc, glib, dbus, iptables, gnutls, policykit, polkit, 2 + openvpn, vpnc, glib, dbus, iptables, gnutls, polkit, 3 3 wpa_supplicant, readline6, pptp, ppp, tree }: 4 4 5 5 stdenv.mkDerivation rec { ··· 12 12 }; 13 13 14 14 buildInputs = [ autoconf automake libtool pkgconfig openconnect polkit 15 - file openvpn vpnc glib dbus iptables gnutls policykit 15 + file openvpn vpnc glib dbus iptables gnutls 16 16 wpa_supplicant readline6 pptp ppp tree ]; 17 17 18 18 preConfigure = '' ··· 49 49 cp ./client/connmanctl $out/sbin/connmanctl 50 50 ''; 51 51 52 - meta = { 52 + meta = with stdenv.lib; { 53 53 description = "Provides a daemon for managing internet connections"; 54 54 homepage = "https://connman.net/"; 55 - maintainers = [ stdenv.lib.maintainers.matejc ]; 55 + maintainers = [ maintainers.matejc ]; 56 56 # tested only on linux, might work on others also 57 - platforms = stdenv.lib.platforms.linux; 58 - license = stdenv.lib.licenses.gpl2; 57 + platforms = platforms.linux; 58 + license = licenses.gpl2; 59 59 }; 60 60 }
+34
pkgs/tools/networking/dhcping/default.nix
··· 1 + { stdenv, fetchurl }: 2 + 3 + let version = "1.2"; in 4 + stdenv.mkDerivation { 5 + name = "dhcping-${version}"; 6 + 7 + src = fetchurl { 8 + sha256 = "0sk4sg3hn88n44dxikipf3ggfj3ixrp22asb7nry9p0bkfaqdvrj"; 9 + url = "http://www.mavetju.org/download/dhcping-${version}.tar.gz"; 10 + }; 11 + 12 + enableParallelBuilding = true; 13 + 14 + doCheck = true; 15 + 16 + meta = with stdenv.lib; { 17 + inherit version; 18 + description = "Send DHCP request to find out if a DHCP server is running"; 19 + longDescription = '' 20 + dhcping sends either a DHCPREQUEST or DHCPINFORM packet to the server 21 + and waits for an answer. Then, if a DHCPREQUEST was send, it will send 22 + a DHCPRELEASE back to the server. 23 + 24 + This program should be installed setuid root or ran by root only, as it 25 + requires the privileges to bind itself to port 68 (bootpc). Root 26 + privileges are dropped as soon as the program has bound itself to that 27 + port. 28 + ''; 29 + homepage = http://www.mavetju.org/unix/general.php; 30 + license = licenses.bsd2; 31 + platforms = platforms.linux; 32 + maintainers = with maintainers; [ nckx ]; 33 + }; 34 + }
+11 -5
pkgs/tools/networking/gupnp-tools/default.nix
··· 1 - {fetchurl, stdenv, gupnp, gssdp, pkgconfig, gtk3, libuuid, intltool, gupnp_av, gnome3, makeWrapper}: 1 + {fetchurl, stdenv, gupnp, gssdp, pkgconfig, gtk3, libuuid, intltool, gupnp_av, gnome3, gnome2, makeWrapper}: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "gupnp-tools-${version}"; ··· 9 9 sha256 = "160dgh9pmlb85qfavwqz46lqawpshs8514bx2b57f9rbiny8kbij"; 10 10 }; 11 11 12 - buildInputs = [gupnp libuuid gssdp pkgconfig gtk3 intltool gupnp_av 13 - gnome3.defaultIconTheme gnome3.gnome_themes_standard makeWrapper]; 12 + buildInputs = [gupnp libuuid gssdp pkgconfig gtk3 intltool gupnp_av 13 + gnome2.gnome_icon_theme makeWrapper]; 14 14 15 15 postInstall = '' 16 - wrapProgram "$out/bin/gupnp-av-cp" --prefix XDG_DATA_DIRS : "${gtk3}/share:${gnome3.gnome_themes_standard}/share:${gnome3.defaultIconTheme}/share:$out/share" 17 - wrapProgram "$out/bin/gupnp-universal-cp" --prefix XDG_DATA_DIRS : "${gtk3}/share:${gnome3.gnome_themes_standard}/share:${gnome3.defaultIconTheme}/share:$out/share" 16 + for program in gupnp-av-cp gupnp-universal-cp; do 17 + wrapProgram "$out/bin/$program" \ 18 + --prefix XDG_DATA_DIRS : "${gtk3}/share:${gnome3.gnome_themes_standard}/share:${gnome2.gnome_icon_theme}/share:$out/share" 19 + done 18 20 ''; 21 + 22 + meta = { 23 + platforms = stdenv.lib.platforms.linux; 24 + }; 19 25 }
+8 -1
pkgs/tools/networking/netcat/default.nix
··· 1 - {stdenv, fetchurl}: 1 + { stdenv, fetchurl }: 2 2 3 3 stdenv.mkDerivation { 4 4 name = "netcat-gnu-0.7.1"; 5 + 5 6 src = fetchurl { 6 7 url = mirror://sourceforge/netcat/netcat-0.7.1.tar.bz2; 7 8 sha256 = "1frjcdkhkpzk0f84hx6hmw5l0ynpmji8vcbaxg8h5k2svyxz0nmm"; 9 + }; 10 + 11 + meta = with stdenv.lib; { 12 + description = "Utility which reads and writes data across network connections"; 13 + homepage = http://netcat.sourceforge.net/; 14 + license = licenses.gpl2Plus; 8 15 }; 9 16 }
+1 -2
pkgs/tools/networking/network-manager/default.nix
··· 15 15 16 16 preConfigure = '' 17 17 substituteInPlace tools/glib-mkenums --replace /usr/bin/perl ${perl}/bin/perl 18 - substituteInPlace src/ppp-manager/nm-ppp-manager.c --replace /sbin/modprobe /run/current-system/sw/sbin/modprobe 19 - substituteInPlace src/devices/nm-device.c --replace /sbin/modprobe /run/current-system/sw/sbin/modprobe 18 + substituteInPlace src/NetworkManagerUtils.c --replace /sbin/modprobe /run/current-system/sw/sbin/modprobe 20 19 substituteInPlace data/85-nm-unmanaged.rules \ 21 20 --replace /bin/sh ${stdenv.shell} \ 22 21 --replace /usr/sbin/ethtool ${ethtool}/sbin/ethtool \
+9 -7
pkgs/tools/networking/offlineimap/default.nix
··· 1 - { pkgs, fetchurl, buildPythonPackage, sqlite3 }: 1 + { stdenv, fetchFromGitHub, buildPythonPackage, sqlite3 }: 2 2 3 3 buildPythonPackage rec { 4 - version = "6.6.0"; 4 + version = "6.6.1"; 5 5 name = "offlineimap-${version}"; 6 6 namePrefix = ""; 7 7 8 - src = fetchurl { 9 - url = "https://github.com/OfflineIMAP/offlineimap/archive/v${version}.tar.gz"; 10 - sha256 = "1x33zxjm3y2p54lbcsgflrs6v2zq785y2k0xi6xia6akrvjmh4n4"; 8 + src = fetchFromGitHub { 9 + owner = "OfflineIMAP"; 10 + repo = "offlineimap"; 11 + rev = "v${version}"; 12 + sha256 = "0nn1qkxqy84h0a2acd1yx861wslh2fjfznkcq15856npbd34yqy5"; 11 13 }; 12 14 13 15 doCheck = false; ··· 19 21 meta = { 20 22 description = "Synchronize emails between two repositories, so that you can read the same mailbox from multiple computers"; 21 23 homepage = "http://offlineimap.org"; 22 - license = pkgs.lib.licenses.gpl2Plus; 23 - maintainers = [ pkgs.lib.maintainers.garbas ]; 24 + license = stdenv.lib.licenses.gpl2Plus; 25 + maintainers = [ stdenv.lib.maintainers.garbas ]; 24 26 }; 25 27 }
+34
pkgs/tools/networking/pcapc/default.nix
··· 1 + { stdenv, fetchFromGitHub, libpcap }: 2 + 3 + let version = "2015-03-06"; in 4 + stdenv.mkDerivation rec { 5 + name = "pcapc-${version}"; 6 + 7 + src = fetchFromGitHub { 8 + sha256 = "02j45wmxy8qcji0giwx3364pbqb6849s8y0xfvzx40g98mssl027"; 9 + rev = "9dddf52e65c8cff72c7c11758a951b31bf083436"; 10 + repo = "pcapc"; 11 + owner = "pfactum"; 12 + }; 13 + 14 + buildInputs = [ libpcap ]; 15 + 16 + makeFlags = [ "PREFIX=$(out)" ]; 17 + 18 + enableParallelBuilding = true; 19 + 20 + doCheck = false; 21 + 22 + postInstall = '' 23 + install -Dm644 {.,$out/share/doc/pcapc}/README.md 24 + ''; 25 + 26 + meta = with stdenv.lib; { 27 + inherit version; 28 + inherit (src.meta) homepage; 29 + description = "Compile libpcap filter expressions into BPF opcodes"; 30 + license = licenses.gpl3; 31 + platforms = platforms.linux; 32 + maintainers = with maintainers; [ nckx ]; 33 + }; 34 + }
+37
pkgs/tools/networking/pingtcp/default.nix
··· 1 + { stdenv, fetchgit, cmake }: 2 + 3 + let version = "0.0.3"; in 4 + stdenv.mkDerivation { 5 + name = "pingtcp-${version}"; 6 + 7 + # This project uses git submodules, which fetchFromGitHub doesn't support: 8 + src = fetchgit { 9 + sha256 = "0an4dbwcp2qv1n068q0s34lz88vl1z2rqfh3j9apbq7bislsrwdd"; 10 + rev = "refs/tags/v${version}"; 11 + url = "https://github.com/LanetNetwork/pingtcp.git"; 12 + }; 13 + 14 + nativeBuildInputs = [ cmake ]; 15 + 16 + postPatch = '' 17 + substituteInPlace {.,pfcquirks}/CMakeLists.txt \ 18 + --replace "-march=native" "" 19 + ''; 20 + 21 + enableParallelBuilding = true; 22 + 23 + doCheck = false; 24 + 25 + postInstall = '' 26 + install -Dm644 {..,$out/share/doc/pingtcp}/README.md 27 + ''; 28 + 29 + meta = with stdenv.lib; { 30 + inherit version; 31 + description = "Measure TCP handshake time"; 32 + homepage = https://github.com/LanetNetwork/pingtcp; 33 + license = licenses.gpl3; 34 + platforms = platforms.linux; 35 + maintainers = with maintainers; [ nckx ]; 36 + }; 37 + }
+1 -1
pkgs/tools/networking/wget/default.nix
··· 1 1 { stdenv, fetchurl, gettext, libidn, pkgconfig 2 2 , perl, perlPackages, LWP, python3 3 - , libiconv, libpsl, openssl ? null }: 3 + , libiconv, libpsl ? null, openssl ? null }: 4 4 5 5 stdenv.mkDerivation rec { 6 6 name = "wget-1.17.1";
+1 -1
pkgs/tools/security/pass/default.nix
··· 25 25 26 26 meta = with stdenv.lib; { 27 27 description = "Stores, retrieves, generates, and synchronizes passwords securely"; 28 - homepage = http://zx2c4.com/projects/password-store/; 28 + homepage = http://www.passwordstore.org/; 29 29 license = licenses.gpl2Plus; 30 30 maintainers = with maintainers; [ lovek323 the-kenny ]; 31 31 platforms = platforms.unix;
+1
pkgs/tools/security/sudo/default.nix
··· 20 20 "--with-rundir=/run/sudo" 21 21 "--with-vardir=/var/db/sudo" 22 22 "--with-logpath=/var/log/sudo.log" 23 + "--with-iologdir=/var/log/sudo-io" 23 24 "--with-sendmail=${sendmailPath}" 24 25 ] ++ stdenv.lib.optional withInsults [ 25 26 "--with-insults"
+2 -2
pkgs/tools/system/facter/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "facter-${version}"; 5 - version = "3.0.2"; 5 + version = "3.1.3"; 6 6 src = fetchurl { 7 7 url = "https://downloads.puppetlabs.com/facter/${name}.tar.gz"; 8 - sha256 = "1myf1r827bh3n0snkzwj2jnc0sax9bq6z1vv9gr90rqr73lixvig"; 8 + sha256 = "1ngp3xjdh6x1w7lsi4lji2xzqp0x950jngcdlq11lcr0wfnzwyxj"; 9 9 }; 10 10 11 11 libyamlcpp_ = libyamlcpp.override { makePIC = true; };
+31
pkgs/tools/text/a2ps/default.nix
··· 1 + { stdenv, fetchurl, libpaper, gperf, file }: 2 + 3 + stdenv.mkDerivation rec { 4 + name = "a2ps-4.14"; 5 + src = fetchurl { 6 + url = "mirror://gnu/a2ps/${name}.tar.gz"; 7 + sha256 = "195k78m1h03m961qn7jr120z815iyb93gwi159p1p9348lyqvbpk"; 8 + }; 9 + 10 + postPatch = '' 11 + substituteInPlace afm/make_fonts_map.sh --replace "/bin/rm" "rm" 12 + substituteInPlace tests/defs.in --replace "/bin/rm" "rm" 13 + ''; 14 + 15 + buildInputs = [ libpaper gperf file ]; 16 + 17 + meta = with stdenv.lib; { 18 + description = "An Anyithing to PostScript converter and pretty-printer"; 19 + longDescription = '' 20 + GNU a2ps converts files into PostScript for printing or viewing. It uses a nice default format, 21 + usually two pages on each physical page, borders surrounding pages, headers with useful information 22 + (page number, printing date, file name or supplied header), line numbering, symbol substitution as 23 + well as pretty printing for a wide range of programming languages. 24 + ''; 25 + homepage = http://www.inf.enst.fr/~demaille/a2ps/index.html; 26 + license = licenses.gpl3Plus; 27 + maintainers = [ maintainers.bennofs ]; 28 + platforms = platforms.linux; 29 + 30 + }; 31 + }
+36 -13
pkgs/top-level/all-packages.nix
··· 287 287 288 288 buildMaven = callPackage ../build-support/build-maven.nix {}; 289 289 290 + cmark = callPackage ../development/libraries/cmark { }; 291 + 290 292 dotnetenv = callPackage ../build-support/dotnetenv { 291 293 dotnetfx = dotnetfx40; 292 294 }; ··· 473 475 "3dfsb" = callPackage ../applications/misc/3dfsb { 474 476 glibc = glibc.override { debugSymbols = true; }; 475 477 }; 478 + 479 + a2ps = callPackage ../tools/text/a2ps { }; 476 480 477 481 abduco = callPackage ../tools/misc/abduco { }; 478 482 ··· 627 631 628 632 inherit (androidenv) androidsdk_4_4 androidndk; 629 633 634 + androidsdk = androidenv.androidsdk_6_0; 635 + 630 636 arc-gtk-theme = callPackage ../misc/themes/arc { }; 631 637 632 638 aria2 = callPackage ../tools/networking/aria2 { ··· 731 737 732 738 bsod = callPackage ../misc/emulators/bsod { }; 733 739 734 - btrfsProgs = callPackage ../tools/filesystems/btrfsprogs { }; 740 + btrfs-progs = callPackage ../tools/filesystems/btrfs-progs { }; 735 741 736 742 bwm_ng = callPackage ../tools/networking/bwm-ng { }; 737 743 ··· 1288 1294 dhcpdump = callPackage ../tools/networking/dhcpdump { }; 1289 1295 1290 1296 dhcpcd = callPackage ../tools/networking/dhcpcd { }; 1297 + 1298 + dhcping = callPackage ../tools/networking/dhcping { }; 1291 1299 1292 1300 di = callPackage ../tools/system/di { }; 1293 1301 ··· 1801 1809 1802 1810 gupnp_igd = callPackage ../development/libraries/gupnp-igd {}; 1803 1811 1804 - gupnptools = callPackage ../tools/networking/gupnp-tools {}; 1812 + gupnp-tools = callPackage ../tools/networking/gupnp-tools {}; 1805 1813 1806 1814 gvpe = callPackage ../tools/networking/gvpe { }; 1807 1815 ··· 2706 2714 2707 2715 bully = callPackage ../tools/networking/bully { }; 2708 2716 2717 + pcapc = callPackage ../tools/networking/pcapc { }; 2718 + 2709 2719 pdnsd = callPackage ../tools/networking/pdnsd { }; 2710 2720 2711 2721 peco = callPackage ../tools/text/peco { }; ··· 2737 2747 pinentry_qt5 = qt5.callPackage ../tools/security/pinentry/qt5.nix { 2738 2748 libcap = if stdenv.isDarwin then null else libcap; 2739 2749 }; 2750 + 2751 + pingtcp = callPackage ../tools/networking/pingtcp { }; 2740 2752 2741 2753 pius = callPackage ../tools/security/pius { }; 2742 2754 ··· 3190 3202 3191 3203 sysbench = callPackage ../development/tools/misc/sysbench {}; 3192 3204 3193 - system_config_printer = callPackage ../tools/misc/system-config-printer { 3205 + system-config-printer = callPackage ../tools/misc/system-config-printer { 3194 3206 libxml2 = libxml2Python; 3195 3207 }; 3196 3208 ··· 3250 3262 tiny8086 = callPackage ../applications/virtualization/8086tiny { }; 3251 3263 3252 3264 tlsdate = callPackage ../tools/networking/tlsdate { }; 3265 + 3266 + tldr = callPackage ../tools/misc/tldr { }; 3253 3267 3254 3268 tmate = callPackage ../tools/misc/tmate { }; 3255 3269 ··· 3520 3534 xsensors = callPackage ../os-specific/linux/xsensors { }; 3521 3535 3522 3536 xcruiser = callPackage ../applications/misc/xcruiser { }; 3537 + 3538 + xxkb = callPackage ../applications/misc/xxkb { }; 3523 3539 3524 3540 unarj = callPackage ../tools/archivers/unarj { }; 3525 3541 ··· 8093 8109 8094 8110 polkit_qt4 = callPackage ../development/libraries/polkit-qt-1 { }; 8095 8111 8096 - policykit = callPackage ../development/libraries/policykit { }; 8097 - 8098 8112 poppler = callPackage ../development/libraries/poppler { lcms = lcms2; }; 8099 8113 8100 8114 poppler_min = poppler.override { # TODO: maybe reduce even more ··· 9634 9648 libdrm = if stdenv.isLinux then libdrm else null; 9635 9649 } // { inherit xlibsWrapper; } ); 9636 9650 9637 - xorgReplacements = callPackage ../servers/x11/xorg/replacements.nix { }; 9638 - 9639 9651 xorgVideoUnichrome = callPackage ../servers/x11/xorg/unichrome/default.nix { }; 9640 9652 9641 9653 xwayland = callPackage ../servers/x11/xorg/xwayland.nix { }; ··· 13246 13258 13247 13259 subunit = callPackage ../development/libraries/subunit { }; 13248 13260 13249 - surf = callPackage ../applications/misc/surf { 13261 + surf = callPackage ../applications/networking/browsers/surf { 13250 13262 webkit = webkitgtk2; 13251 13263 }; 13252 13264 ··· 13906 13918 xvidcap = callPackage ../applications/video/xvidcap { 13907 13919 inherit (gnome) scrollkeeper libglade; 13908 13920 }; 13921 + 13922 + xzgv = callPackage ../applications/graphics/xzgv { }; 13909 13923 13910 13924 yate = callPackage ../applications/misc/yate { }; 13911 13925 ··· 15320 15334 15321 15335 cups_filters = callPackage ../misc/cups/filters.nix { }; 15322 15336 15337 + cups-pk-helper = callPackage ../misc/cups/cups-pk-helper.nix { }; 15338 + 15323 15339 crashplan = callPackage ../applications/backup/crashplan { }; 15324 15340 15325 15341 gutenprint = callPackage ../misc/drivers/gutenprint { }; 15326 15342 15327 15343 gutenprintBin = callPackage ../misc/drivers/gutenprint/bin.nix { }; 15328 15344 15329 - cupsBjnp = callPackage ../misc/cups/drivers/cups-bjnp { }; 15345 + cups-bjnp = callPackage ../misc/cups/drivers/cups-bjnp { }; 15330 15346 15331 15347 darcnes = callPackage ../misc/emulators/darcnes { }; 15332 15348 ··· 15581 15597 }; 15582 15598 }; 15583 15599 15584 - saneBackends = callPackage ../applications/graphics/sane/backends { 15600 + sane-backends = callPackage ../applications/graphics/sane/backends { 15585 15601 gt68xxFirmware = config.sane.gt68xxFirmware or null; 15586 15602 snapscanFirmware = config.sane.snapscanFirmware or null; 15587 15603 }; 15588 15604 15589 - saneBackendsGit = callPackage ../applications/graphics/sane/backends/git.nix { 15605 + sane-backends-git = callPackage ../applications/graphics/sane/backends/git.nix { 15590 15606 gt68xxFirmware = config.sane.gt68xxFirmware or null; 15591 15607 snapscanFirmware = config.sane.snapscanFirmware or null; 15592 15608 }; 15593 15609 15594 15610 mkSaneConfig = callPackage ../applications/graphics/sane/config.nix { }; 15595 15611 15596 - saneFrontends = callPackage ../applications/graphics/sane/frontends.nix { }; 15612 + sane-frontends = callPackage ../applications/graphics/sane/frontends.nix { }; 15597 15613 15598 15614 sct = callPackage ../tools/X11/sct {}; 15599 15615 ··· 15738 15754 wine = callPackage ../misc/emulators/wine { 15739 15755 wineRelease = config.wine.release or "stable"; 15740 15756 wineBuild = config.wine.build or "wine32"; 15757 + pulseaudioSupport = config.pulseaudio or stdenv.isLinux; 15741 15758 }; 15742 15759 wineStable = wine.override { wineRelease = "stable"; }; 15743 15760 wineUnstable = lowPrio (wine.override { wineRelease = "unstable"; }); ··· 15763 15780 15764 15781 xsane = callPackage ../applications/graphics/sane/xsane.nix { 15765 15782 libpng = libpng12; 15766 - saneBackends = saneBackends; 15767 15783 }; 15768 15784 15769 15785 xwiimote = callPackage ../misc/drivers/xwiimote { ··· 15854 15870 cheetahTemplate = pythonPackages.cheetah; # 2015-06-15 15855 15871 clangAnalyzer = clang-analyzer; # added 2015-02-20 15856 15872 cool-old-term = cool-retro-term; # added 2015-01-31 15873 + cupsBjnp = cups-bjnp; # added 2016-01-02 15857 15874 cv = progress; # added 2015-09-06 15858 15875 enblendenfuse = enblend-enfuse; # 2015-09-30 15859 15876 exfat-utils = exfat; # 2015-09-11 15860 15877 firefoxWrapper = firefox-wrapper; 15861 15878 fuse_exfat = exfat; # 2015-09-11 15862 15879 grantlee5 = qt5.grantlee; # added 2015-12-19 15880 + gupnptools = gupnp-tools; # added 2015-12-19 15863 15881 htmlTidy = html-tidy; # added 2014-12-06 15864 15882 inherit (haskell.compiler) jhc uhc; # 2015-05-15 15865 15883 inotifyTools = inotify-tools; ··· 15887 15905 signon = qt5.signon; # added 2015-12-19 15888 15906 speedtest_cli = speedtest-cli; # added 2015-02-17 15889 15907 sqliteInteractive = sqlite-interactive; # added 2014-12-06 15908 + system_config_printer = system-config-printer; # added 2016-01-03 15890 15909 telepathy_qt5 = qt5.telepathy; # added 2015-12-19 15891 15910 x11 = xlibsWrapper; # added 2015-09 15892 15911 xf86_video_nouveau = xorg.xf86videonouveau; # added 2015-09 ··· 15898 15917 manpages = man-pages; # added 2015-12-06 15899 15918 mssys = ms-sys; # added 2015-12-13 15900 15919 virtviewer = virt-viewer; # added 2015-12-24 15920 + saneBackends = sane-backends; # added 2016-01-02 15921 + saneBackendsGit = sane-backends-git; # added 2016-01-02 15922 + saneFrontends = sane-frontends; # added 2016-01-02 15923 + btrfsProgs = btrfs-progs; # added 2016-01-03 15901 15924 }; 15902 15925 15903 15926 tweakAlias = _n: alias: with lib;
-47
pkgs/top-level/emacs-packages.nix
··· 234 234 }; 235 235 }; 236 236 237 - async = melpaBuild rec { 238 - pname = "async"; 239 - version = "1.5"; 240 - src = fetchFromGitHub { 241 - owner = "jwiegley"; 242 - repo = "emacs-async"; 243 - rev = "v${version}"; 244 - sha256 = "1yq1aby4n5k3caasynhxhakng01qp4099zjbsm633d351ib3h20g"; 245 - }; 246 - meta = { 247 - description = "Asynchronous processing in Emacs"; 248 - license = gpl3Plus; 249 - }; 250 - }; 251 - 252 237 auctex = melpaBuild rec { 253 238 pname = "auctex"; 254 239 version = "11.87.7"; ··· 262 247 meta = { 263 248 description = "Extensible package for writing and formatting TeX files in GNU Emacs and XEmacs"; 264 249 homepage = https://www.gnu.org/software/auctex/; 265 - license = gpl3Plus; 266 - }; 267 - }; 268 - 269 - auto-complete = melpaBuild rec { 270 - pname = "auto-complete"; 271 - version = "1.4.0"; 272 - src = fetchFromGitHub { 273 - owner = pname; 274 - repo = pname; 275 - rev = "v${version}"; 276 - sha256 = "050lb8qjq7ra35mqp6j6qkwbvq5zj3yhz73aym5kf1vjd42rmjcw"; 277 - }; 278 - packageRequires = [ popup ]; 279 - meta = { 280 - description = "Auto-complete extension for Emacs"; 281 - homepage = http://cx4a.org/software/auto-complete/; 282 250 license = gpl3Plus; 283 251 }; 284 252 }; ··· 1290 1258 fileSpecs = [ "Documentation/with-editor.texi" "lisp/with-editor.el" ]; 1291 1259 meta = magit.meta // { 1292 1260 description = "Use the Emacsclient as EDITOR of child processes library for Emacs"; 1293 - }; 1294 - }; 1295 - 1296 - markdown-mode = melpaBuild rec { 1297 - pname = "markdown-mode"; 1298 - version = "2.0"; 1299 - src = fetchFromGitHub { 1300 - owner = "defunkt"; 1301 - repo = pname; 1302 - rev = "v${version}"; 1303 - sha256 = "1l2w0j9xl8pipz61426s79jq2yns42vjvysc6yjc29kbsnhalj29"; 1304 - }; 1305 - meta = { 1306 - description = "Major mode for editing markdown files in Emacs"; 1307 - license = gpl3Plus; 1308 1261 }; 1309 1262 }; 1310 1263
+3 -3
pkgs/top-level/perl-packages.nix
··· 12401 12401 }; 12402 12402 12403 12403 URI = buildPerlPackage { 12404 - name = "URI-1.68"; 12404 + name = "URI-1.69"; 12405 12405 src = fetchurl { 12406 - url = mirror://cpan/authors/id/E/ET/ETHER/URI-1.68.tar.gz; 12407 - sha256 = "c840d30f7657bfd4b2acbb311bd764232911cd3dc97e92415fbd0a242185c358"; 12406 + url = mirror://cpan/authors/id/E/ET/ETHER/URI-1.69.tar.gz; 12407 + sha256 = "0bdlk1cn7ipy4kdylrn73yz9i2k39ikm1cqvh9hq0vvbcbm1cjxp"; 12408 12408 }; 12409 12409 meta = { 12410 12410 description = "Uniform Resource Identifiers (absolute and relative)";
+30 -12
pkgs/top-level/python-packages.nix
··· 1430 1430 sha256 = "e61768fa19934bd176799f90bda3ea9f49a5def21fa2523a8e47df8a48e730e9"; 1431 1431 }; 1432 1432 1433 - buildInputs = with self; [ pkgs.btrfsProgs ]; 1433 + buildInputs = with self; [ pkgs.btrfs-progs ]; 1434 1434 propagatedBuildInputs = with self; [ contextlib2 pyxdg pycparser alembic ] 1435 1435 ++ optionals (!isPyPy) [ cffi ]; 1436 1436 ··· 3975 3975 3976 3976 decorator = buildPythonPackage rec { 3977 3977 name = "decorator-${version}"; 3978 - version = "4.0.4"; 3978 + version = "4.0.6"; 3979 3979 3980 3980 src = pkgs.fetchurl { 3981 3981 url = "http://pypi.python.org/packages/source/d/decorator/${name}.tar.gz"; 3982 - sha256 = "1qf3iiv401vhsdmf4bd08fwb3fq4xq769q2yl7zqqr1iml7w3l2s"; 3982 + sha256 = "1c6254597777fd003da2e8fb503c3dbf3d9e8f8d55f054709c0e65be3467209c"; 3983 3983 }; 3984 - 3985 - # no idea what that file is doing there (probably bad release) 3986 - preCheck = '' 3987 - rm src/tests/x.py 3988 - ''; 3989 3984 3990 3985 meta = { 3991 3986 homepage = http://pypi.python.org/pypi/decorator; ··· 8450 8445 }; 8451 8446 }; 8452 8447 8448 + git-sweep = buildPythonPackage rec { 8449 + name = "git-sweep-0.1.1"; 8450 + 8451 + src = pkgs.fetchurl { 8452 + url = "https://pypi.python.org/packages/source/g/git-sweep/${name}.tar.gz"; 8453 + sha256 = "1csp0zd049d643d409rfivbswwzrayb4i6gkypp5mc27fb1z2afd"; 8454 + }; 8455 + 8456 + propagatedBuildInputs = with self; [ GitPython ]; 8457 + 8458 + meta = { 8459 + description = "A command-line tool that helps you clean up Git branches"; 8460 + homepage = http://lab.arc90.com/2012/04/03/git-sweep/; 8461 + license = licenses.mit; 8462 + maintainers = with maintainers; [ pSub ]; 8463 + }; 8464 + }; 8465 + 8453 8466 glances = buildPythonPackage rec { 8454 8467 name = "glances-${version}"; 8455 8468 version = "2.4.2"; ··· 14169 14182 # failed tests: https://code.google.com/p/psutil/issues/detail?id=434 14170 14183 doCheck = false; 14171 14184 14185 + buildInputs = optional stdenv.isDarwin pkgs.darwin.IOKit; 14186 + 14172 14187 meta = { 14173 14188 description = "Process and system utilization information interface for python"; 14174 14189 homepage = http://code.google.com/p/psutil/; ··· 19120 19135 buildInputs = with self; [ nose coverage pkgs.glibcLocales flake8 ]; 19121 19136 propagatedBuildInputs = with self; [ matplotlib pandas ]; 19122 19137 19138 + # Performance test fails 19139 + prePatch = '' 19140 + rm tqdm/tests/tests_perf.py 19141 + ''; 19142 + 19123 19143 preBuild = '' 19124 19144 export LC_ALL="en_US.UTF-8" 19125 19145 ''; 19126 - 19127 - doCheck = !(isPy27); # Performance test fails 19128 19146 19129 19147 meta = { 19130 19148 description = "A Fast, Extensible Progress Meter"; ··· 21704 21722 }; 21705 21723 21706 21724 libvirt = let 21707 - version = "1.2.19"; 21725 + version = "1.3.0"; 21708 21726 in assert version == pkgs.libvirt.version; pkgs.stdenv.mkDerivation rec { 21709 21727 name = "libvirt-python-${version}"; 21710 21728 21711 21729 src = pkgs.fetchurl { 21712 21730 url = "http://libvirt.org/sources/python/${name}.tar.gz"; 21713 - sha256 = "0jgcggrwaz9512wzlkgxirq56cr7zq2ihmg8qv95nhryqnq67aw8"; 21731 + sha256 = "0z7w79mkx7w322d2mf9d4bz56mmfic3nx0q4bc6fa063aay42z89"; 21714 21732 }; 21715 21733 21716 21734 buildInputs = with self; [ python pkgs.pkgconfig pkgs.libvirt lxml ];
-1
pkgs/top-level/release-small.nix
··· 130 130 perl = all; 131 131 pkgconfig = all; 132 132 pmccabe = linux; 133 - policykit = linux; 134 133 portmap = linux; 135 134 procps = linux; 136 135 python = allBut cygwin;
+1 -1
pkgs/top-level/release.nix
··· 55 55 { inherit (import ../stdenv/linux/make-bootstrap-tools.nix { system = "x86_64-linux"; }) dist test; }; 56 56 57 57 stdenvBootstrapTools.x86_64-darwin = 58 - { inherit (import ../stdenv/pure-darwin/make-bootstrap-tools.nix) dist test; }; 58 + { inherit (import ../stdenv/darwin/make-bootstrap-tools.nix { system = "x86_64-darwin"; }) dist test; }; 59 59 60 60 } // (mapTestOn ((packagePlatforms pkgs) // rec { 61 61