Merge branch 'master' into staging-next

+4703 -2071
+7 -7
doc/languages-frameworks/agda.section.md
··· 3 3 ## How to use Agda 4 4 5 5 Agda can be installed from `agda`: 6 - ``` 6 + ```ShellSession 7 7 $ nix-env -iA agda 8 8 ``` 9 9 ··· 15 15 16 16 For example, suppose we wanted a version of Agda which has access to the standard library. This can be obtained with the expressions: 17 17 18 - ``` 18 + ```nix 19 19 agda.withPackages [ agdaPackages.standard-library ] 20 20 ``` 21 21 22 22 or 23 23 24 - ``` 24 + ```nix 25 25 agda.withPackages (p: [ p.standard-library ]) 26 26 ``` 27 27 ··· 32 32 Agda will not by default use these libraries. To tell Agda to use the library we have some options: 33 33 34 34 * Call `agda` with the library flag: 35 - ``` 35 + ```ShellSession 36 36 $ agda -l standard-library -i . MyFile.agda 37 37 ``` 38 38 * Write a `my-library.agda-lib` file for the project you are working on which may look like: ··· 49 49 Agda modules can be compiled with the `--compile` flag. A version of `ghc` with `ieee754` is made available to the Agda program via the `--with-compiler` flag. 50 50 This can be overridden by a different version of `ghc` as follows: 51 51 52 - ``` 52 + ```nix 53 53 agda.withPackages { 54 54 pkgs = [ ... ]; 55 55 ghc = haskell.compiler.ghcHEAD; ··· 80 80 ## Adding Agda packages to Nixpkgs 81 81 82 82 To add an Agda package to `nixpkgs`, the derivation should be written to `pkgs/development/libraries/agda/${library-name}/` and an entry should be added to `pkgs/top-level/agda-packages.nix`. Here it is called in a scope with access to all other Agda libraries, so the top line of the `default.nix` can look like: 83 - ``` 83 + ```nix 84 84 { mkDerivation, standard-library, fetchFromGitHub }: 85 85 ``` 86 86 and `mkDerivation` should be called instead of `agdaPackages.mkDerivation`. Here is an example skeleton derivation for iowa-stdlib: 87 87 88 - ``` 88 + ```nix 89 89 mkDerivation { 90 90 version = "1.5.0"; 91 91 pname = "iowa-stdlib";
+3 -3
doc/languages-frameworks/dotnet.section.md
··· 4 4 5 5 For local development, it's recommended to use nix-shell to create a dotnet environment: 6 6 7 - ``` 7 + ```nix 8 8 # shell.nix 9 9 with import <nixpkgs> {}; 10 10 ··· 20 20 21 21 It's very likely that more than one sdk will be needed on a given project. Dotnet provides several different frameworks (E.g dotnetcore, aspnetcore, etc.) as well as many versions for a given framework. Normally, dotnet is able to fetch a framework and install it relative to the executable. However, this would mean writing to the nix store in nixpkgs, which is read-only. To support the many-sdk use case, one can compose an environment using `dotnetCorePackages.combinePackages`: 22 22 23 - ``` 23 + ```nix 24 24 with import <nixpkgs> {}; 25 25 26 26 mkShell { ··· 37 37 38 38 This will produce a dotnet installation that has the dotnet 3.1, 3.0, and 2.1 sdk. The first sdk listed will have it's cli utility present in the resulting environment. Example info output: 39 39 40 - ``` 40 + ```ShellSesssion 41 41 $ dotnet --info 42 42 .NET Core SDK (reflecting any global.json): 43 43 Version: 3.1.101
+9 -9
doc/languages-frameworks/idris.section.md
··· 4 4 5 5 The easiest way to get a working idris version is to install the `idris` attribute: 6 6 7 - ``` 7 + ```ShellSesssion 8 8 $ # On NixOS 9 9 $ nix-env -i nixos.idris 10 10 $ # On non-NixOS ··· 21 21 22 22 And then: 23 23 24 - ``` 24 + ```ShellSesssion 25 25 $ # On NixOS 26 26 $ nix-env -iA nixos.myIdris 27 27 $ # On non-NixOS ··· 29 29 ``` 30 30 31 31 To see all available Idris packages: 32 - ``` 32 + ```ShellSesssion 33 33 $ # On NixOS 34 34 $ nix-env -qaPA nixos.idrisPackages 35 35 $ # On non-NixOS ··· 37 37 ``` 38 38 39 39 Similarly, entering a `nix-shell`: 40 - ``` 40 + ```ShellSesssion 41 41 $ nix-shell -p 'idrisPackages.with-packages (with idrisPackages; [ contrib pruviloj ])' 42 42 ``` 43 43 ··· 45 45 46 46 To have access to these libraries in idris, call it with an argument `-p <library name>` for each library: 47 47 48 - ``` 48 + ```ShellSesssion 49 49 $ nix-shell -p 'idrisPackages.with-packages (with idrisPackages; [ contrib pruviloj ])' 50 50 [nix-shell:~]$ idris -p contrib -p pruviloj 51 51 ``` 52 52 53 53 A listing of all available packages the Idris binary has access to is available via `--listlibs`: 54 54 55 - ``` 55 + ```ShellSesssion 56 56 $ idris --listlibs 57 57 00prelude-idx.ibc 58 58 pruviloj ··· 105 105 106 106 Assuming this file is saved as `yaml.nix`, it's buildable using 107 107 108 - ``` 108 + ```ShellSesssion 109 109 $ nix-build -E '(import <nixpkgs> {}).idrisPackages.callPackage ./yaml.nix {}' 110 110 ``` 111 111 ··· 121 121 122 122 in another file (say `default.nix`) to be able to build it with 123 123 124 - ``` 124 + ```ShellSesssion 125 125 $ nix-build -A yaml 126 126 ``` 127 127 ··· 133 133 134 134 For example you could set 135 135 136 - ``` 136 + ```nix 137 137 build-idris-package { 138 138 idrisBuildOptions = [ "--log" "1" "--verbose" ] 139 139
+4 -4
doc/languages-frameworks/python.section.md
··· 79 79 By default `nix-shell` will start a `bash` session with this interpreter in our 80 80 `PATH`, so if we then run: 81 81 82 - ``` 82 + ```Python console 83 83 [nix-shell:~/src/nixpkgs]$ python3 84 84 Python 3.8.1 (default, Dec 18 2019, 19:06:26) 85 85 [GCC 9.2.0] on linux ··· 90 90 Note that no other modules are in scope, even if they were imperatively 91 91 installed into our user environment as a dependency of a Python application: 92 92 93 - ``` 93 + ```Python console 94 94 >>> import requests 95 95 Traceback (most recent call last): 96 96 File "<stdin>", line 1, in <module> ··· 146 146 Executing this script requires a `python3` that has `numpy`. Using what we learned 147 147 in the previous section, we could startup a shell and just run it like so: 148 148 149 - ``` 150 - nix-shell -p 'python38.withPackages(ps: with ps; [ numpy ])' --run 'python3 foo.py' 149 + ```ShellSesssion 150 + $ nix-shell -p 'python38.withPackages(ps: with ps; [ numpy ])' --run 'python3 foo.py' 151 151 The dot product of [1 2] and [3 4] is: 11 152 152 ``` 153 153
+3 -3
doc/languages-frameworks/qt.section.md
··· 103 103 ### Example adding a Qt library {#qt-library-all-packages-nix} 104 104 105 105 The following represents the contents of `qt5-packages.nix`. 106 - ``` 106 + ```nix 107 107 { 108 108 # ... 109 109 ··· 133 133 ### Example adding a Qt application {#qt-application-all-packages-nix} 134 134 135 135 The following represents the contents of `qt5-packages.nix`. 136 - ``` 136 + ```nix 137 137 { 138 138 # ... 139 139 ··· 144 144 ``` 145 145 146 146 The following represents the contents of `all-packages.nix`. 147 - ``` 147 + ```nix 148 148 { 149 149 # ... 150 150
+27 -26
doc/languages-frameworks/rust.section.md
··· 2 2 3 3 To install the rust compiler and cargo put 4 4 5 - ``` 6 - rustc 7 - cargo 5 + ```nix 6 + environment.systemPackages = [ 7 + rustc 8 + cargo 9 + ]; 8 10 ``` 9 11 10 - into the `environment.systemPackages` or bring them into 11 - scope with `nix-shell -p rustc cargo`. 12 + into your `configuration.nix` or bring them into scope with `nix-shell -p rustc cargo`. 12 13 13 14 For other versions such as daily builds (beta and nightly), 14 15 use either `rustup` from nixpkgs (which will manage the rust installation in your home directory), ··· 18 19 19 20 Rust applications are packaged by using the `buildRustPackage` helper from `rustPlatform`: 20 21 21 - ``` 22 + ```nix 22 23 { lib, rustPlatform }: 23 24 24 25 rustPlatform.buildRustPackage rec { ··· 49 50 such as the one in the example above. `cargoHash` should instead be 50 51 used for [SRI](https://www.w3.org/TR/SRI/) hashes. For example: 51 52 52 - ``` 53 + ```nix 53 54 cargoHash = "sha256-l1vL2ZdtDRxSGvP0X/l3nMw8+6WF67KPutJEzUROjg8="; 54 55 ``` 55 56 ··· 59 60 then be taken from the failed build. A fake hash can be used for 60 61 `cargoSha256` as follows: 61 62 62 - ``` 63 + ```nix 63 64 cargoSha256 = lib.fakeSha256; 64 65 ``` 65 66 66 67 For `cargoHash` you can use: 67 68 68 - ``` 69 + ```nix 69 70 cargoHash = lib.fakeHash; 70 71 ``` 71 72 ··· 262 263 source code in a reproducible way. If it is missing or out-of-date one can use 263 264 the `cargoPatches` attribute to update or add it. 264 265 265 - ``` 266 + ```nix 266 267 rustPlatform.buildRustPackage rec { 267 268 (...) 268 269 cargoPatches = [ ··· 489 490 490 491 Now, the file produced by the call to `carnix`, called `hello.nix`, looks like: 491 492 492 - ``` 493 + ```nix 493 494 # Generated by carnix 0.6.5: carnix -o hello.nix --src ./. Cargo.lock --standalone 494 495 { stdenv, buildRustCrate, fetchgit }: 495 496 let kernel = stdenv.buildPlatform.parsed.kernel.name; ··· 518 519 `Cargo.lock`. Then, `carnix` needs to be run again, and produces the 519 520 following nix file: 520 521 521 - ``` 522 + ```nix 522 523 # Generated by carnix 0.6.5: carnix -o hello.nix --src ./. Cargo.lock --standalone 523 524 { stdenv, buildRustCrate, fetchgit }: 524 525 let kernel = stdenv.buildPlatform.parsed.kernel.name; ··· 573 574 Starting from that file, one can add more overrides, to add features 574 575 or build inputs by overriding the hello crate in a seperate file. 575 576 576 - ``` 577 + ```nix 577 578 with import <nixpkgs> {}; 578 579 ((import ./hello.nix).hello {}).override { 579 580 crateOverrides = defaultCrateOverrides // { ··· 593 594 the override above can be read, as in the following example, which 594 595 patches the derivation: 595 596 596 - ``` 597 + ```nix 597 598 with import <nixpkgs> {}; 598 599 ((import ./hello.nix).hello {}).override { 599 600 crateOverrides = defaultCrateOverrides // { ··· 614 615 `libc` in the example above, where `libc` is a dependency of the main 615 616 crate, we could do: 616 617 617 - ``` 618 + ```nix 618 619 with import <nixpkgs> {}; 619 620 ((import hello.nix).hello {}).override { 620 621 crateOverrides = defaultCrateOverrides // { ··· 630 631 631 632 - The version of rustc used to compile the crate: 632 633 633 - ``` 634 + ```nix 634 635 (hello {}).override { rust = pkgs.rust; }; 635 636 ``` 636 637 637 638 - Whether to build in release mode or debug mode (release mode by 638 639 default): 639 640 640 - ``` 641 + ```nix 641 642 (hello {}).override { release = false; }; 642 643 ``` 643 644 644 645 - Whether to print the commands sent to rustc when building 645 646 (equivalent to `--verbose` in cargo: 646 647 647 - ``` 648 + ```nix 648 649 (hello {}).override { verbose = false; }; 649 650 ``` 650 651 651 652 - Extra arguments to be passed to `rustc`: 652 653 653 - ``` 654 + ```nix 654 655 (hello {}).override { extraRustcOpts = "-Z debuginfo=2"; }; 655 656 ``` 656 657 ··· 662 663 `postInstall`. As an example, here is how to create a new module 663 664 before running the build script: 664 665 665 - ``` 666 + ```nix 666 667 (hello {}).override { 667 668 preConfigure = '' 668 669 echo "pub const PATH=\"${hi.out}\";" >> src/path.rs" ··· 676 677 compile `diesel_cli` only with the `postgres` feature, and no default 677 678 features, we would write: 678 679 679 - ``` 680 + ```nix 680 681 (callPackage ./diesel.nix {}).diesel { 681 682 default = false; 682 683 postgres = true; ··· 699 700 700 701 A typical `shell.nix` might look like: 701 702 702 - ``` 703 + ```nix 703 704 with import <nixpkgs> {}; 704 705 705 706 stdenv.mkDerivation { ··· 721 722 ``` 722 723 723 724 You should now be able to run the following: 724 - ``` 725 + ```ShellSesssion 725 726 $ nix-shell --pure 726 727 $ cargo build 727 728 $ cargo test ··· 731 732 To control your rust version (i.e. use nightly) from within `shell.nix` (or 732 733 other nix expressions) you can use the following `shell.nix` 733 734 734 - ``` 735 + ```nix 735 736 # Latest Nightly 736 737 with import <nixpkgs> {}; 737 738 let src = fetchFromGitHub { ··· 759 760 ``` 760 761 761 762 Now run: 762 - ``` 763 + ```ShellSession 763 764 $ rustc --version 764 765 rustc 1.26.0-nightly (188e693b3 2018-03-26) 765 766 ``` ··· 794 795 795 796 Add the following to your `configuration.nix`, `home-configuration.nix`, `shell.nix`, or similar: 796 797 797 - ``` 798 + ```nix 798 799 { pkgs ? import <nixpkgs> { 799 800 overlays = [ 800 801 (import (builtins.fetchTarball https://github.com/mozilla/nixpkgs-mozilla/archive/master.tar.gz))
+4 -4
doc/languages-frameworks/vim.section.md
··· 156 156 157 157 First create a vim-scripts file having one plugin name per line. Example: 158 158 159 - ``` 159 + ```vim 160 160 "tlib" 161 161 {'name': 'vim-addon-sql'} 162 162 {'filetype_regex': '\%(vim)$', 'names': ['reload', 'vim-dev-plugin']} ··· 197 197 You should get a Vim buffer with the nix derivations (output1) and vam.pluginDictionaries (output2). 198 198 You can add your Vim to your system's configuration file like this and start it by "vim-my": 199 199 200 - ``` 200 + ```nix 201 201 my-vim = 202 202 let plugins = let inherit (vimUtils) buildVimPluginFrom2Nix; in { 203 203 copy paste output1 here ··· 217 217 218 218 Sample output1: 219 219 220 - ``` 220 + ```nix 221 221 "reload" = buildVimPluginFrom2Nix { # created by nix#NixDerivation 222 222 name = "reload"; 223 223 src = fetchgit { ··· 248 248 249 249 Some plugins require overrides in order to function properly. Overrides are placed in [overrides.nix](/pkgs/misc/vim-plugins/overrides.nix). Overrides are most often required when a plugin requires some dependencies, or extra steps are required during the build process. For example `deoplete-fish` requires both `deoplete-nvim` and `vim-fish`, and so the following override was added: 250 250 251 - ``` 251 + ```nix 252 252 deoplete-fish = super.deoplete-fish.overrideAttrs(old: { 253 253 dependencies = with super; [ deoplete-nvim vim-fish ]; 254 254 });
+1 -1
lib/trivial.nix
··· 158 158 seq deepSeq genericClosure; 159 159 160 160 161 - ## nixpks version strings 161 + ## nixpkgs version strings 162 162 163 163 /* Returns the current full nixpkgs version number. */ 164 164 version = release + versionSuffix;
+46
maintainers/maintainer-list.nix
··· 698 698 githubId = 1078530; 699 699 name = "Alexandre Peyroux"; 700 700 }; 701 + applePrincess = { 702 + email = "appleprincess@appleprincess.io"; 703 + github = "applePrincess"; 704 + githubId = 17154507; 705 + name = "Lein Matsumaru"; 706 + keys = [{ 707 + longkeyid = "rsa4096/0xAAA50652F0479205"; 708 + fingerprint = "BF8B F725 DA30 E53E 7F11 4ED8 AAA5 0652 F047 9205"; 709 + }]; 710 + }; 701 711 ar1a = { 702 712 email = "aria@ar1as.space"; 703 713 github = "ar1a"; ··· 1299 1309 github = "boj"; 1300 1310 githubId = 50839; 1301 1311 name = "Brian Jones"; 1312 + }; 1313 + bootstrap-prime = { 1314 + email = "bootstrap.prime@gmail.com"; 1315 + github = "bootstrap-prime"; 1316 + githubId = 68566724; 1317 + name = "bootstrap-prime"; 1302 1318 }; 1303 1319 commandodev = { 1304 1320 email = "ben@perurbis.com"; ··· 2413 2429 githubId = 10913120; 2414 2430 name = "Dje4321"; 2415 2431 }; 2432 + djwf = { 2433 + email = "dave@weller-fahy.com"; 2434 + github = "djwf"; 2435 + githubId = 73162; 2436 + name = "David J. Weller-Fahy"; 2437 + }; 2416 2438 dkabot = { 2417 2439 email = "dkabot@dkabot.com"; 2418 2440 github = "dkabot"; ··· 2769 2791 githubId = 1753498; 2770 2792 name = "Dejan Lukan"; 2771 2793 }; 2794 + electrified = { 2795 + email = "ed@maidavale.org"; 2796 + github = "electrified"; 2797 + githubId = 103082; 2798 + name = "Ed Brindley"; 2799 + }; 2772 2800 elliottvillars = { 2773 2801 email = "elliottvillars@gmail.com"; 2774 2802 github = "elliottvillars"; ··· 3676 3704 github = "groodt"; 3677 3705 githubId = 343415; 3678 3706 name = "Greg Roodt"; 3707 + }; 3708 + gschwartz = { 3709 + email = "gsch@pennmedicine.upenn.edu"; 3710 + github = "GregorySchwartz"; 3711 + githubId = 2490088; 3712 + name = "Gregory Schwartz"; 3679 3713 }; 3680 3714 gtrunsec = { 3681 3715 email = "gtrunsec@hardenedlinux.org"; ··· 5005 5039 github = "KibaFox"; 5006 5040 githubId = 16481032; 5007 5041 name = "Kiba Fox"; 5042 + }; 5043 + kidd = { 5044 + email = "raimonster@gmail.com"; 5045 + github = "kidd"; 5046 + githubId = 25607; 5047 + name = "Raimon Grau"; 5008 5048 }; 5009 5049 kierdavis = { 5010 5050 email = "kierdavis@gmail.com"; ··· 8674 8714 github = "seb314"; 8675 8715 githubId = 19472270; 8676 8716 name = "Sebastian"; 8717 + }; 8718 + sebbadk = { 8719 + email = "sebastian@sebba.dk"; 8720 + github = "SEbbaDK"; 8721 + githubId = 1567527; 8722 + name = "Sebastian Hyberts"; 8677 8723 }; 8678 8724 sellout = { 8679 8725 email = "greg@technomadic.org";
+7 -7
nixos/modules/config/users-groups.nix
··· 591 591 # password or an SSH authorized key. Privileged accounts are 592 592 # root and users in the wheel group. 593 593 assertion = !cfg.mutableUsers -> 594 - any id ((mapAttrsToList (name: cfg: 595 - (name == "root" 594 + any id ((mapAttrsToList (_: cfg: 595 + (cfg.name == "root" 596 596 || cfg.group == "wheel" 597 597 || elem "wheel" cfg.extraGroups) 598 598 && ··· 613 613 assertion = (user.hashedPassword != null) 614 614 -> (builtins.match ".*:.*" user.hashedPassword == null); 615 615 message = '' 616 - The password hash of user "${name}" contains a ":" character. 616 + The password hash of user "${user.name}" contains a ":" character. 617 617 This is invalid and would break the login system because the fields 618 618 of /etc/shadow (file where hashes are stored) are colon-separated. 619 - Please check the value of option `users.users."${name}".hashedPassword`.''; 619 + Please check the value of option `users.users."${user.name}".hashedPassword`.''; 620 620 } 621 621 ); 622 622 623 623 warnings = 624 624 builtins.filter (x: x != null) ( 625 - flip mapAttrsToList cfg.users (name: user: 625 + flip mapAttrsToList cfg.users (_: user: 626 626 # This regex matches a subset of the Modular Crypto Format (MCF)[1] 627 627 # informal standard. Since this depends largely on the OS or the 628 628 # specific implementation of crypt(3) we only support the (sane) ··· 645 645 && user.hashedPassword != "" # login without password 646 646 && builtins.match mcf user.hashedPassword == null) 647 647 then '' 648 - The password hash of user "${name}" may be invalid. You must set a 648 + The password hash of user "${user.name}" may be invalid. You must set a 649 649 valid hash or the user will be locked out of their account. Please 650 - check the value of option `users.users."${name}".hashedPassword`.'' 650 + check the value of option `users.users."${user.name}".hashedPassword`.'' 651 651 else null 652 652 )); 653 653
+2
nixos/modules/module-list.nix
··· 126 126 ./programs/dconf.nix 127 127 ./programs/digitalbitbox/default.nix 128 128 ./programs/dmrconfig.nix 129 + ./programs/droidcam.nix 129 130 ./programs/environment.nix 130 131 ./programs/evince.nix 131 132 ./programs/file-roller.nix ··· 233 234 ./services/audio/alsa.nix 234 235 ./services/audio/jack.nix 235 236 ./services/audio/icecast.nix 237 + ./services/audio/jmusicbot.nix 236 238 ./services/audio/liquidsoap.nix 237 239 ./services/audio/mpd.nix 238 240 ./services/audio/mpdscribble.nix
+16
nixos/modules/programs/droidcam.nix
··· 1 + { lib, pkgs, config, ... }: 2 + 3 + with lib; 4 + 5 + { 6 + options.programs.droidcam = { 7 + enable = mkEnableOption "DroidCam client"; 8 + }; 9 + 10 + config = lib.mkIf config.programs.droidcam.enable { 11 + environment.systemPackages = [ pkgs.droidcam ]; 12 + 13 + boot.extraModulePackages = [ config.boot.kernelPackages.v4l2loopback ]; 14 + boot.kernelModules = [ "v4l2loopback" "snd-aloop" ]; 15 + }; 16 + }
+1 -1
nixos/modules/programs/mininet.nix
··· 8 8 cfg = config.programs.mininet; 9 9 10 10 generatedPath = with pkgs; makeSearchPath "bin" [ 11 - iperf ethtool iproute socat 11 + iperf ethtool iproute2 socat 12 12 ]; 13 13 14 14 pyEnv = pkgs.python.withPackages(ps: [ ps.mininet-python ]);
+41
nixos/modules/services/audio/jmusicbot.nix
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; 4 + let 5 + cfg = config.services.jmusicbot; 6 + in 7 + { 8 + options = { 9 + services.jmusicbot = { 10 + enable = mkEnableOption "jmusicbot, a Discord music bot that's easy to set up and run yourself"; 11 + 12 + stateDir = mkOption { 13 + type = types.path; 14 + description = '' 15 + The directory where config.txt and serversettings.json is saved. 16 + If left as the default value this directory will automatically be created before JMusicBot starts, otherwise the sysadmin is responsible for ensuring the directory exists with appropriate ownership and permissions. 17 + Untouched by the value of this option config.txt needs to be placed manually into this directory. 18 + ''; 19 + default = "/var/lib/jmusicbot/"; 20 + }; 21 + }; 22 + }; 23 + 24 + config = mkIf cfg.enable { 25 + systemd.services.jmusicbot = { 26 + wantedBy = [ "multi-user.target" ]; 27 + after = [ "network-online.target" ]; 28 + description = "Discord music bot that's easy to set up and run yourself!"; 29 + serviceConfig = mkMerge [{ 30 + ExecStart = "${pkgs.jmusicbot}/bin/JMusicBot"; 31 + WorkingDirectory = cfg.stateDir; 32 + Restart = "always"; 33 + RestartSec = 20; 34 + DynamicUser = true; 35 + } 36 + (mkIf (cfg.stateDir == "/var/lib/jmusicbot") { StateDirectory = "jmusicbot"; })]; 37 + }; 38 + }; 39 + 40 + meta.maintainers = with maintainers; [ SuperSandro2000 ]; 41 + }
+11 -1
nixos/modules/services/hardware/sane.nix
··· 30 30 }; 31 31 32 32 backends = [ pkg netConf ] ++ optional config.services.saned.enable sanedConf ++ config.hardware.sane.extraBackends; 33 - saneConfig = pkgs.mkSaneConfig { paths = backends; }; 33 + saneConfig = pkgs.mkSaneConfig { paths = backends; inherit (config.hardware.sane) disabledDefaultBackends; }; 34 34 35 35 enabled = config.hardware.sane.enable || config.services.saned.enable; 36 36 ··· 71 71 </para></note> 72 72 ''; 73 73 example = literalExample "[ pkgs.hplipWithPlugin ]"; 74 + }; 75 + 76 + hardware.sane.disabledDefaultBackends = mkOption { 77 + type = types.listOf types.str; 78 + default = []; 79 + example = [ "v4l" ]; 80 + description = '' 81 + Names of backends which are enabled by default but should be disabled. 82 + See <literal>$SANE_CONFIG_DIR/dll.conf</literal> for the list of possible names. 83 + ''; 74 84 }; 75 85 76 86 hardware.sane.configDir = mkOption {
+23 -20
nixos/modules/services/logging/vector.nix
··· 3 3 with lib; 4 4 let cfg = config.services.vector; 5 5 6 - in { 6 + in 7 + { 7 8 options.services.vector = { 8 9 enable = mkEnableOption "Vector"; 9 10 ··· 37 38 wantedBy = [ "multi-user.target" ]; 38 39 after = [ "network-online.target" ]; 39 40 requires = [ "network-online.target" ]; 40 - serviceConfig = let 41 - format = pkgs.formats.toml { }; 42 - conf = format.generate "vector.toml" cfg.settings; 43 - validateConfig = file: 44 - pkgs.runCommand "validate-vector-conf" { } '' 45 - ${pkgs.vector}/bin/vector validate --no-topology --no-environment "${file}" 46 - ln -s "${file}" "$out" 47 - ''; 48 - in { 49 - ExecStart = "${pkgs.vector}/bin/vector --config ${validateConfig conf}"; 50 - User = "vector"; 51 - Group = "vector"; 52 - Restart = "no"; 53 - StateDirectory = "vector"; 54 - ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID"; 55 - AmbientCapabilities = "CAP_NET_BIND_SERVICE"; 56 - # This group is required for accessing journald. 57 - SupplementaryGroups = mkIf cfg.journaldAccess "systemd-journal"; 58 - }; 41 + serviceConfig = 42 + let 43 + format = pkgs.formats.toml { }; 44 + conf = format.generate "vector.toml" cfg.settings; 45 + validateConfig = file: 46 + pkgs.runCommand "validate-vector-conf" { } '' 47 + ${pkgs.vector}/bin/vector validate --no-environment "${file}" 48 + ln -s "${file}" "$out" 49 + ''; 50 + in 51 + { 52 + ExecStart = "${pkgs.vector}/bin/vector --config ${validateConfig conf}"; 53 + User = "vector"; 54 + Group = "vector"; 55 + Restart = "no"; 56 + StateDirectory = "vector"; 57 + ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID"; 58 + AmbientCapabilities = "CAP_NET_BIND_SERVICE"; 59 + # This group is required for accessing journald. 60 + SupplementaryGroups = mkIf cfg.journaldAccess "systemd-journal"; 61 + }; 59 62 }; 60 63 }; 61 64 }
+1 -1
nixos/modules/services/misc/home-assistant.nix
··· 63 63 }; 64 64 65 65 in { 66 - meta.maintainers = with maintainers; [ dotlambda ]; 66 + meta.maintainers = with maintainers; [ ]; 67 67 68 68 options.services.home-assistant = { 69 69 enable = mkEnableOption "Home Assistant";
+1 -1
nixos/modules/services/misc/mame.nix
··· 53 53 description = "MAME TUN/TAP Ethernet interface"; 54 54 after = [ "network.target" ]; 55 55 wantedBy = [ "multi-user.target" ]; 56 - path = [ pkgs.iproute ]; 56 + path = [ pkgs.iproute2 ]; 57 57 serviceConfig = { 58 58 Type = "oneshot"; 59 59 RemainAfterExit = true;
+49 -42
nixos/modules/services/misc/packagekit.nix
··· 1 1 { config, lib, pkgs, ... }: 2 2 3 - with lib; 4 - 5 3 let 6 - 7 4 cfg = config.services.packagekit; 8 5 9 - packagekitConf = '' 10 - [Daemon] 11 - DefaultBackend=${cfg.backend} 12 - KeepCache=false 13 - ''; 6 + inherit (lib) 7 + mkEnableOption mkOption mkIf mkRemovedOptionModule types 8 + listToAttrs recursiveUpdate; 14 9 15 - vendorConf = '' 16 - [PackagesNotFound] 17 - DefaultUrl=https://github.com/NixOS/nixpkgs 18 - CodecUrl=https://github.com/NixOS/nixpkgs 19 - HardwareUrl=https://github.com/NixOS/nixpkgs 20 - FontUrl=https://github.com/NixOS/nixpkgs 21 - MimeUrl=https://github.com/NixOS/nixpkgs 22 - ''; 10 + iniFmt = pkgs.formats.ini { }; 23 11 24 - in 12 + confFiles = [ 13 + (iniFmt.generate "PackageKit.conf" (recursiveUpdate 14 + { 15 + Daemon = { 16 + DefaultBackend = "test_nop"; 17 + KeepCache = false; 18 + }; 19 + } 20 + cfg.settings)) 25 21 22 + (iniFmt.generate "Vendor.conf" (recursiveUpdate 23 + { 24 + PackagesNotFound = rec { 25 + DefaultUrl = "https://github.com/NixOS/nixpkgs"; 26 + CodecUrl = DefaultUrl; 27 + HardwareUrl = DefaultUrl; 28 + FontUrl = DefaultUrl; 29 + MimeUrl = DefaultUrl; 30 + }; 31 + } 32 + cfg.vendorSettings)) 33 + ]; 34 + 35 + in 26 36 { 37 + imports = [ 38 + (mkRemovedOptionModule [ "services" "packagekit" "backend" ] "The only backend that doesn't blow up is `test_nop`.") 39 + ]; 27 40 28 - options = { 41 + options.services.packagekit = { 42 + enable = mkEnableOption '' 43 + PackageKit provides a cross-platform D-Bus abstraction layer for 44 + installing software. Software utilizing PackageKit can install 45 + software regardless of the package manager. 46 + ''; 29 47 30 - services.packagekit = { 31 - enable = mkEnableOption 32 - '' 33 - PackageKit provides a cross-platform D-Bus abstraction layer for 34 - installing software. Software utilizing PackageKit can install 35 - software regardless of the package manager. 36 - ''; 48 + settings = mkOption { 49 + type = iniFmt.type; 50 + default = { }; 51 + description = "Additional settings passed straight through to PackageKit.conf"; 52 + }; 37 53 38 - # TODO: integrate with PolicyKit if the nix backend matures to the point 39 - # where it will require elevated permissions 40 - backend = mkOption { 41 - type = types.enum [ "test_nop" ]; 42 - default = "test_nop"; 43 - description = '' 44 - PackageKit supports multiple different backends and <literal>auto</literal> which 45 - should do the right thing. 46 - </para> 47 - <para> 48 - On NixOS however, we do not have a backend compatible with nix 2.0 49 - (refer to <link xlink:href="https://github.com/NixOS/nix/issues/233">this issue</link> so we have to force 50 - it to <literal>test_nop</literal> for now. 51 - ''; 52 - }; 54 + vendorSettings = mkOption { 55 + type = iniFmt.type; 56 + default = { }; 57 + description = "Additional settings passed straight through to Vendor.conf"; 53 58 }; 54 59 }; 55 60 ··· 59 64 60 65 systemd.packages = with pkgs; [ packagekit ]; 61 66 62 - environment.etc."PackageKit/PackageKit.conf".text = packagekitConf; 63 - environment.etc."PackageKit/Vendor.conf".text = vendorConf; 67 + environment.etc = listToAttrs (map 68 + (e: 69 + lib.nameValuePair "PackageKit/${e.name}" { source = e; }) 70 + confFiles); 64 71 }; 65 72 }
+2 -2
nixos/modules/services/monitoring/datadog-agent.nix
··· 225 225 }; 226 226 }; 227 227 config = mkIf cfg.enable { 228 - environment.systemPackages = [ datadogPkg pkgs.sysstat pkgs.procps pkgs.iproute ]; 228 + environment.systemPackages = [ datadogPkg pkgs.sysstat pkgs.procps pkgs.iproute2 ]; 229 229 230 230 users.users.datadog = { 231 231 description = "Datadog Agent User"; ··· 239 239 240 240 systemd.services = let 241 241 makeService = attrs: recursiveUpdate { 242 - path = [ datadogPkg pkgs.python pkgs.sysstat pkgs.procps pkgs.iproute ]; 242 + path = [ datadogPkg pkgs.python pkgs.sysstat pkgs.procps pkgs.iproute2 ]; 243 243 wantedBy = [ "multi-user.target" ]; 244 244 serviceConfig = { 245 245 User = "datadog";
+1
nixos/modules/services/monitoring/prometheus/exporters.nix
··· 25 25 "artifactory" 26 26 "bind" 27 27 "bird" 28 + "bitcoin" 28 29 "blackbox" 29 30 "collectd" 30 31 "dnsmasq"
+82
nixos/modules/services/monitoring/prometheus/exporters/bitcoin.nix
··· 1 + { config, lib, pkgs, options }: 2 + 3 + with lib; 4 + 5 + let 6 + cfg = config.services.prometheus.exporters.bitcoin; 7 + in 8 + { 9 + port = 9332; 10 + extraOpts = { 11 + rpcUser = mkOption { 12 + type = types.str; 13 + default = "bitcoinrpc"; 14 + description = '' 15 + RPC user name. 16 + ''; 17 + }; 18 + 19 + rpcPasswordFile = mkOption { 20 + type = types.path; 21 + description = '' 22 + File containing RPC password. 23 + ''; 24 + }; 25 + 26 + rpcScheme = mkOption { 27 + type = types.enum [ "http" "https" ]; 28 + default = "http"; 29 + description = '' 30 + Whether to connect to bitcoind over http or https. 31 + ''; 32 + }; 33 + 34 + rpcHost = mkOption { 35 + type = types.str; 36 + default = "localhost"; 37 + description = '' 38 + RPC host. 39 + ''; 40 + }; 41 + 42 + rpcPort = mkOption { 43 + type = types.port; 44 + default = 8332; 45 + description = '' 46 + RPC port number. 47 + ''; 48 + }; 49 + 50 + refreshSeconds = mkOption { 51 + type = types.ints.unsigned; 52 + default = 300; 53 + description = '' 54 + How often to ask bitcoind for metrics. 55 + ''; 56 + }; 57 + 58 + extraEnv = mkOption { 59 + type = types.attrsOf types.str; 60 + default = {}; 61 + description = '' 62 + Extra environment variables for the exporter. 63 + ''; 64 + }; 65 + }; 66 + serviceOpts = { 67 + script = '' 68 + export BITCOIN_RPC_PASSWORD=$(cat ${cfg.rpcPasswordFile}) 69 + exec ${pkgs.prometheus-bitcoin-exporter}/bin/bitcoind-monitor.py 70 + ''; 71 + 72 + environment = { 73 + BITCOIN_RPC_USER = cfg.rpcUser; 74 + BITCOIN_RPC_SCHEME = cfg.rpcScheme; 75 + BITCOIN_RPC_HOST = cfg.rpcHost; 76 + BITCOIN_RPC_PORT = toString cfg.rpcPort; 77 + METRICS_ADDR = cfg.listenAddress; 78 + METRICS_PORT = toString cfg.port; 79 + REFRESH_SECONDS = toString cfg.refreshSeconds; 80 + } // cfg.extraEnv; 81 + }; 82 + }
+1 -1
nixos/modules/services/monitoring/scollector.nix
··· 113 113 description = "scollector metrics collector (part of Bosun)"; 114 114 wantedBy = [ "multi-user.target" ]; 115 115 116 - path = [ pkgs.coreutils pkgs.iproute ]; 116 + path = [ pkgs.coreutils pkgs.iproute2 ]; 117 117 118 118 serviceConfig = { 119 119 User = cfg.user;
+1 -1
nixos/modules/services/networking/consul.nix
··· 191 191 ExecStop = "${cfg.package}/bin/consul leave"; 192 192 }); 193 193 194 - path = with pkgs; [ iproute gnugrep gawk consul ]; 194 + path = with pkgs; [ iproute2 gnugrep gawk consul ]; 195 195 preStart = '' 196 196 mkdir -m 0700 -p ${dataDir} 197 197 chown -R consul ${dataDir}
+1 -1
nixos/modules/services/networking/ircd-hybrid/default.nix
··· 10 10 name = "ircd-hybrid-service"; 11 11 scripts = [ "=>/bin" ./control.in ]; 12 12 substFiles = [ "=>/conf" ./ircd.conf ]; 13 - inherit (pkgs) ircdHybrid coreutils su iproute gnugrep procps; 13 + inherit (pkgs) ircdHybrid coreutils su iproute2 gnugrep procps; 14 14 15 15 ipv6Enabled = boolToString config.networking.enableIPv6; 16 16
+1 -1
nixos/modules/services/networking/libreswan.nix
··· 85 85 86 86 config = mkIf cfg.enable { 87 87 88 - environment.systemPackages = [ pkgs.libreswan pkgs.iproute ]; 88 + environment.systemPackages = [ pkgs.libreswan pkgs.iproute2 ]; 89 89 90 90 systemd.services.ipsec = { 91 91 description = "Internet Key Exchange (IKE) Protocol Daemon for IPsec";
+1 -1
nixos/modules/services/networking/networkmanager.nix
··· 465 465 restartTriggers = [ configFile overrideNameserversScript ]; 466 466 467 467 # useful binaries for user-specified hooks 468 - path = [ pkgs.iproute pkgs.util-linux pkgs.coreutils ]; 468 + path = [ pkgs.iproute2 pkgs.util-linux pkgs.coreutils ]; 469 469 aliases = [ "dbus-org.freedesktop.nm-dispatcher.service" ]; 470 470 }; 471 471
+1 -1
nixos/modules/services/networking/openvpn.nix
··· 63 63 wantedBy = optional cfg.autoStart "multi-user.target"; 64 64 after = [ "network.target" ]; 65 65 66 - path = [ pkgs.iptables pkgs.iproute pkgs.nettools ]; 66 + path = [ pkgs.iptables pkgs.iproute2 pkgs.nettools ]; 67 67 68 68 serviceConfig.ExecStart = "@${openvpn}/sbin/openvpn openvpn --suppress-timestamps --config ${configFile}"; 69 69 serviceConfig.Restart = "always";
+1 -1
nixos/modules/services/networking/sslh.nix
··· 132 132 { table = "mangle"; command = "OUTPUT ! -o lo -p tcp -m connmark --mark 0x02/0x0f -j CONNMARK --restore-mark --mask 0x0f"; } 133 133 ]; 134 134 in { 135 - path = [ pkgs.iptables pkgs.iproute pkgs.procps ]; 135 + path = [ pkgs.iptables pkgs.iproute2 pkgs.procps ]; 136 136 137 137 preStart = '' 138 138 # Cleanup old iptables entries which might be still there
+1 -1
nixos/modules/services/networking/strongswan-swanctl/module.nix
··· 63 63 description = "strongSwan IPsec IKEv1/IKEv2 daemon using swanctl"; 64 64 wantedBy = [ "multi-user.target" ]; 65 65 after = [ "network-online.target" ]; 66 - path = with pkgs; [ kmod iproute iptables util-linux ]; 66 + path = with pkgs; [ kmod iproute2 iptables util-linux ]; 67 67 environment = { 68 68 STRONGSWAN_CONF = pkgs.writeTextFile { 69 69 name = "strongswan.conf";
+1 -1
nixos/modules/services/networking/strongswan.nix
··· 152 152 systemd.services.strongswan = { 153 153 description = "strongSwan IPSec Service"; 154 154 wantedBy = [ "multi-user.target" ]; 155 - path = with pkgs; [ kmod iproute iptables util-linux ]; # XXX Linux 155 + path = with pkgs; [ kmod iproute2 iptables util-linux ]; # XXX Linux 156 156 after = [ "network-online.target" ]; 157 157 environment = { 158 158 STRONGSWAN_CONF = strongswanConf { inherit setup connections ca secretsFile managePlugins enabledPlugins; };
+3 -3
nixos/modules/services/networking/wireguard.nix
··· 63 63 64 64 preSetup = mkOption { 65 65 example = literalExample '' 66 - ${pkgs.iproute}/bin/ip netns add foo 66 + ${pkgs.iproute2}/bin/ip netns add foo 67 67 ''; 68 68 default = ""; 69 69 type = with types; coercedTo (listOf str) (concatStringsSep "\n") lines; ··· 278 278 wantedBy = [ "multi-user.target" "wireguard-${interfaceName}.service" ]; 279 279 environment.DEVICE = interfaceName; 280 280 environment.WG_ENDPOINT_RESOLUTION_RETRIES = "infinity"; 281 - path = with pkgs; [ iproute wireguard-tools ]; 281 + path = with pkgs; [ iproute2 wireguard-tools ]; 282 282 283 283 serviceConfig = { 284 284 Type = "oneshot"; ··· 333 333 after = [ "network.target" "network-online.target" ]; 334 334 wantedBy = [ "multi-user.target" ]; 335 335 environment.DEVICE = name; 336 - path = with pkgs; [ kmod iproute wireguard-tools ]; 336 + path = with pkgs; [ kmod iproute2 wireguard-tools ]; 337 337 338 338 serviceConfig = { 339 339 Type = "oneshot";
+1 -1
nixos/modules/services/security/fail2ban.nix
··· 243 243 restartTriggers = [ fail2banConf jailConf pathsConf ]; 244 244 reloadIfChanged = true; 245 245 246 - path = [ cfg.package cfg.packageFirewall pkgs.iproute ]; 246 + path = [ cfg.package cfg.packageFirewall pkgs.iproute2 ]; 247 247 248 248 unitConfig.Documentation = "man:fail2ban(1)"; 249 249
+2 -2
nixos/modules/services/security/sshguard.nix
··· 108 108 partOf = optional config.networking.firewall.enable "firewall.service"; 109 109 110 110 path = with pkgs; if config.networking.nftables.enable 111 - then [ nftables iproute systemd ] 112 - else [ iptables ipset iproute systemd ]; 111 + then [ nftables iproute2 systemd ] 112 + else [ iptables ipset iproute2 systemd ]; 113 113 114 114 # The sshguard ipsets must exist before we invoke 115 115 # iptables. sshguard creates the ipsets after startup if
+6 -3
nixos/modules/system/boot/systemd.nix
··· 1188 1188 systemd.services.systemd-remount-fs.unitConfig.ConditionVirtualization = "!container"; 1189 1189 systemd.services.systemd-random-seed.unitConfig.ConditionVirtualization = "!container"; 1190 1190 1191 - boot.kernel.sysctl = mkIf (!cfg.coredump.enable) { 1192 - "kernel.core_pattern" = "core"; 1193 - }; 1191 + boot.kernel.sysctl."kernel.core_pattern" = mkIf (!cfg.coredump.enable) "core"; 1192 + 1193 + # Increase numeric PID range (set directly instead of copying a one-line file from systemd) 1194 + # https://github.com/systemd/systemd/pull/12226 1195 + boot.kernel.sysctl."kernel.pid_max" = mkIf pkgs.stdenv.is64bit (lib.mkDefault 4194304); 1196 + 1194 1197 boot.kernelParams = optional (!cfg.enableUnifiedCgroupHierarchy) "systemd.unified_cgroup_hierarchy=0"; 1195 1198 }; 1196 1199
+9 -9
nixos/modules/tasks/network-interfaces-scripted.nix
··· 101 101 102 102 unitConfig.ConditionCapability = "CAP_NET_ADMIN"; 103 103 104 - path = [ pkgs.iproute ]; 104 + path = [ pkgs.iproute2 ]; 105 105 106 106 serviceConfig = { 107 107 Type = "oneshot"; ··· 185 185 # Restart rather than stop+start this unit to prevent the 186 186 # network from dying during switch-to-configuration. 187 187 stopIfChanged = false; 188 - path = [ pkgs.iproute ]; 188 + path = [ pkgs.iproute2 ]; 189 189 script = 190 190 '' 191 191 state="/run/nixos/network/addresses/${i.name}" ··· 258 258 wantedBy = [ "network-setup.service" (subsystemDevice i.name) ]; 259 259 partOf = [ "network-setup.service" ]; 260 260 before = [ "network-setup.service" ]; 261 - path = [ pkgs.iproute ]; 261 + path = [ pkgs.iproute2 ]; 262 262 serviceConfig = { 263 263 Type = "oneshot"; 264 264 RemainAfterExit = true; ··· 284 284 before = [ "network-setup.service" ]; 285 285 serviceConfig.Type = "oneshot"; 286 286 serviceConfig.RemainAfterExit = true; 287 - path = [ pkgs.iproute ]; 287 + path = [ pkgs.iproute2 ]; 288 288 script = '' 289 289 # Remove Dead Interfaces 290 290 echo "Removing old bridge ${n}..." ··· 372 372 wants = deps; # if one or more interface fails, the switch should continue to run 373 373 serviceConfig.Type = "oneshot"; 374 374 serviceConfig.RemainAfterExit = true; 375 - path = [ pkgs.iproute config.virtualisation.vswitch.package ]; 375 + path = [ pkgs.iproute2 config.virtualisation.vswitch.package ]; 376 376 preStart = '' 377 377 echo "Resetting Open vSwitch ${n}..." 378 378 ovs-vsctl --if-exists del-br ${n} -- add-br ${n} \ ··· 413 413 before = [ "network-setup.service" ]; 414 414 serviceConfig.Type = "oneshot"; 415 415 serviceConfig.RemainAfterExit = true; 416 - path = [ pkgs.iproute pkgs.gawk ]; 416 + path = [ pkgs.iproute2 pkgs.gawk ]; 417 417 script = '' 418 418 echo "Destroying old bond ${n}..." 419 419 ${destroyBond n} ··· 451 451 before = [ "network-setup.service" ]; 452 452 serviceConfig.Type = "oneshot"; 453 453 serviceConfig.RemainAfterExit = true; 454 - path = [ pkgs.iproute ]; 454 + path = [ pkgs.iproute2 ]; 455 455 script = '' 456 456 # Remove Dead Interfaces 457 457 ip link show "${n}" >/dev/null 2>&1 && ip link delete "${n}" ··· 476 476 before = [ "network-setup.service" ]; 477 477 serviceConfig.Type = "oneshot"; 478 478 serviceConfig.RemainAfterExit = true; 479 - path = [ pkgs.iproute ]; 479 + path = [ pkgs.iproute2 ]; 480 480 script = '' 481 481 # Remove Dead Interfaces 482 482 ip link show "${n}" >/dev/null 2>&1 && ip link delete "${n}" ··· 504 504 before = [ "network-setup.service" ]; 505 505 serviceConfig.Type = "oneshot"; 506 506 serviceConfig.RemainAfterExit = true; 507 - path = [ pkgs.iproute ]; 507 + path = [ pkgs.iproute2 ]; 508 508 script = '' 509 509 # Remove Dead Interfaces 510 510 ip link show "${n}" >/dev/null 2>&1 && ip link delete "${n}"
+1 -1
nixos/modules/tasks/network-interfaces-systemd.nix
··· 259 259 wants = deps; # if one or more interface fails, the switch should continue to run 260 260 serviceConfig.Type = "oneshot"; 261 261 serviceConfig.RemainAfterExit = true; 262 - path = [ pkgs.iproute config.virtualisation.vswitch.package ]; 262 + path = [ pkgs.iproute2 config.virtualisation.vswitch.package ]; 263 263 preStart = '' 264 264 echo "Resetting Open vSwitch ${n}..." 265 265 ovs-vsctl --if-exists del-br ${n} -- add-br ${n} \
+3 -3
nixos/modules/tasks/network-interfaces.nix
··· 1171 1171 wantedBy = [ "network.target" ]; 1172 1172 after = [ "network-pre.target" ]; 1173 1173 unitConfig.ConditionCapability = "CAP_NET_ADMIN"; 1174 - path = [ pkgs.iproute ]; 1174 + path = [ pkgs.iproute2 ]; 1175 1175 serviceConfig.Type = "oneshot"; 1176 1176 serviceConfig.RemainAfterExit = true; 1177 1177 script = '' ··· 1249 1249 ${optionalString (current.type == "mesh" && current.meshID!=null) "${pkgs.iw}/bin/iw dev ${device} set meshid ${current.meshID}"} 1250 1250 ${optionalString (current.type == "monitor" && current.flags!=null) "${pkgs.iw}/bin/iw dev ${device} set monitor ${current.flags}"} 1251 1251 ${optionalString (current.type == "managed" && current.fourAddr!=null) "${pkgs.iw}/bin/iw dev ${device} set 4addr ${if current.fourAddr then "on" else "off"}"} 1252 - ${optionalString (current.mac != null) "${pkgs.iproute}/bin/ip link set dev ${device} address ${current.mac}"} 1252 + ${optionalString (current.mac != null) "${pkgs.iproute2}/bin/ip link set dev ${device} address ${current.mac}"} 1253 1253 ''; 1254 1254 1255 1255 # Udev script to execute for a new WLAN interface. The script configures the new WLAN interface. ··· 1260 1260 ${optionalString (new.type == "mesh" && new.meshID!=null) "${pkgs.iw}/bin/iw dev ${device} set meshid ${new.meshID}"} 1261 1261 ${optionalString (new.type == "monitor" && new.flags!=null) "${pkgs.iw}/bin/iw dev ${device} set monitor ${new.flags}"} 1262 1262 ${optionalString (new.type == "managed" && new.fourAddr!=null) "${pkgs.iw}/bin/iw dev ${device} set 4addr ${if new.fourAddr then "on" else "off"}"} 1263 - ${optionalString (new.mac != null) "${pkgs.iproute}/bin/ip link set dev ${device} address ${new.mac}"} 1263 + ${optionalString (new.mac != null) "${pkgs.iproute2}/bin/ip link set dev ${device} address ${new.mac}"} 1264 1264 ''; 1265 1265 1266 1266 # Udev attributes for systemd to name the device and to create a .device target.
+1 -1
nixos/modules/virtualisation/brightbox-image.nix
··· 119 119 wants = [ "network-online.target" ]; 120 120 after = [ "network-online.target" ]; 121 121 122 - path = [ pkgs.wget pkgs.iproute ]; 122 + path = [ pkgs.wget pkgs.iproute2 ]; 123 123 124 124 script = 125 125 ''
+1 -1
nixos/modules/virtualisation/ec2-data.nix
··· 19 19 wantedBy = [ "multi-user.target" "sshd.service" ]; 20 20 before = [ "sshd.service" ]; 21 21 22 - path = [ pkgs.iproute ]; 22 + path = [ pkgs.iproute2 ]; 23 23 24 24 script = 25 25 ''
+1 -1
nixos/modules/virtualisation/google-compute-config.nix
··· 110 110 systemd.services.google-network-daemon = { 111 111 description = "Google Compute Engine Network Daemon"; 112 112 after = [ "network-online.target" "network.target" "google-instance-setup.service" ]; 113 - path = with pkgs; [ iproute ]; 113 + path = with pkgs; [ iproute2 ]; 114 114 serviceConfig = { 115 115 ExecStart = "${gce}/bin/google_network_daemon"; 116 116 StandardOutput="journal+console";
+1 -1
nixos/modules/virtualisation/nixos-containers.nix
··· 739 739 740 740 unitConfig.RequiresMountsFor = "/var/lib/containers/%i"; 741 741 742 - path = [ pkgs.iproute ]; 742 + path = [ pkgs.iproute2 ]; 743 743 744 744 environment = { 745 745 root = "/var/lib/containers/%i";
+1 -1
nixos/modules/virtualisation/xe-guest-utilities.nix
··· 17 17 wantedBy = [ "multi-user.target" ]; 18 18 after = [ "xe-linux-distribution.service" ]; 19 19 requires = [ "proc-xen.mount" ]; 20 - path = [ pkgs.coreutils pkgs.iproute ]; 20 + path = [ pkgs.coreutils pkgs.iproute2 ]; 21 21 serviceConfig = { 22 22 PIDFile = "/run/xe-daemon.pid"; 23 23 ExecStart = "${pkgs.xe-guest-utilities}/bin/xe-daemon -p /run/xe-daemon.pid";
+1 -1
nixos/modules/virtualisation/xen-dom0.nix
··· 248 248 # Xen provides udev rules. 249 249 services.udev.packages = [ cfg.package ]; 250 250 251 - services.udev.path = [ pkgs.bridge-utils pkgs.iproute ]; 251 + services.udev.path = [ pkgs.bridge-utils pkgs.iproute2 ]; 252 252 253 253 systemd.services.xen-store = { 254 254 description = "Xen Store Daemon";
+1 -1
nixos/tests/mysql/mariadb-galera-mariabackup.nix
··· 2 2 3 3 let 4 4 mysqlenv-common = pkgs.buildEnv { name = "mysql-path-env-common"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ bash gawk gnutar inetutils which ]; }; 5 - mysqlenv-mariabackup = pkgs.buildEnv { name = "mysql-path-env-mariabackup"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ gzip iproute netcat procps pv socat ]; }; 5 + mysqlenv-mariabackup = pkgs.buildEnv { name = "mysql-path-env-mariabackup"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ gzip iproute2 netcat procps pv socat ]; }; 6 6 7 7 in { 8 8 name = "mariadb-galera-mariabackup";
+18
nixos/tests/prometheus-exporters.nix
··· 136 136 ''; 137 137 }; 138 138 139 + bitcoin = { 140 + exporterConfig = { 141 + enable = true; 142 + rpcUser = "bitcoinrpc"; 143 + rpcPasswordFile = pkgs.writeText "password" "hunter2"; 144 + }; 145 + metricProvider = { 146 + services.bitcoind.default.enable = true; 147 + services.bitcoind.default.rpc.users.bitcoinrpc.passwordHMAC = "e8fe33f797e698ac258c16c8d7aadfbe$872bdb8f4d787367c26bcfd75e6c23c4f19d44a69f5d1ad329e5adf3f82710f7"; 148 + }; 149 + exporterTest = '' 150 + wait_for_unit("prometheus-bitcoin-exporter.service") 151 + wait_for_unit("bitcoind-default.service") 152 + wait_for_open_port(9332) 153 + succeed("curl -sSf http://localhost:9332/metrics | grep -q '^bitcoin_blocks '") 154 + ''; 155 + }; 156 + 139 157 blackbox = { 140 158 exporterConfig = { 141 159 enable = true;
+3 -3
nixos/tests/wireguard/basic.nix
··· 52 52 inherit (wg-snakeoil-keys.peer0) publicKey; 53 53 }; 54 54 55 - postSetup = let inherit (pkgs) iproute; in '' 56 - ${iproute}/bin/ip route replace 10.23.42.1/32 dev wg0 57 - ${iproute}/bin/ip route replace fc00::1/128 dev wg0 55 + postSetup = let inherit (pkgs) iproute2; in '' 56 + ${iproute2}/bin/ip route replace 10.23.42.1/32 dev wg0 57 + ${iproute2}/bin/ip route replace fc00::1/128 dev wg0 58 58 ''; 59 59 }; 60 60 };
+2 -2
pkgs/applications/audio/aj-snapshot/default.nix
··· 1 - { lib, stdenv, fetchurl, alsaLib, jack2Full, minixml, pkg-config }: 1 + { lib, stdenv, fetchurl, alsaLib, jack2, minixml, pkg-config }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = packageName + "-" + version ; ··· 13 13 doCheck = false; 14 14 15 15 nativeBuildInputs = [ pkg-config ]; 16 - buildInputs = [ alsaLib minixml jack2Full ]; 16 + buildInputs = [ alsaLib minixml jack2 ]; 17 17 18 18 meta = with lib; { 19 19 description = "Tool for storing/restoring JACK and/or ALSA connections to/from cml files";
+2 -2
pkgs/applications/audio/faust/faust2jack.nix
··· 1 1 { faust 2 2 , gtk2 3 - , jack2Full 3 + , jack2 4 4 , alsaLib 5 5 , opencv 6 6 , libsndfile ··· 18 18 19 19 propagatedBuildInputs = [ 20 20 gtk2 21 - jack2Full 21 + jack2 22 22 alsaLib 23 23 opencv 24 24 libsndfile
+2 -2
pkgs/applications/audio/faust/faust2jaqt.nix
··· 1 1 { faust 2 - , jack2Full 2 + , jack2 3 3 , qt4 4 4 , libsndfile 5 5 , alsaLib ··· 16 16 ]; 17 17 18 18 propagatedBuildInputs = [ 19 - jack2Full 19 + jack2 20 20 qt4 21 21 libsndfile 22 22 alsaLib
+2 -2
pkgs/applications/audio/ft2-clone/default.nix
··· 13 13 14 14 stdenv.mkDerivation rec { 15 15 pname = "ft2-clone"; 16 - version = "1.44_fix"; 16 + version = "1.46"; 17 17 18 18 src = fetchFromGitHub { 19 19 owner = "8bitbubsy"; 20 20 repo = "ft2-clone"; 21 21 rev = "v${version}"; 22 - sha256 = "sha256-2HhG2cDzAvpSm655M1KQnjbfVvqqOZDz2ty7xnttskA="; 22 + sha256 = "sha256-Y6FgIbNCsxnM/B2bEB7oufBjU1BnBYaz7/oysWttIOc="; 23 23 }; 24 24 25 25 # Adapt the linux-only CMakeLists to darwin (more reliable than make-macos.sh)
+31
pkgs/applications/audio/jmusicbot/default.nix
··· 1 + { stdenv, lib, fetchurl, makeWrapper, jre }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "JMusicBot"; 5 + version = "0.3.4"; 6 + 7 + src = fetchurl { 8 + url = "https://github.com/jagrosh/MusicBot/releases/download/${version}/JMusicBot-${version}.jar"; 9 + sha256 = "sha256-++/ot9k74pkN9Wl7IEjiMIv/q5zklIEdU6uFjam0tmU="; 10 + }; 11 + 12 + dontUnpack = true; 13 + 14 + nativeBuildInputs = [ makeWrapper ]; 15 + 16 + installPhase = '' 17 + mkdir -p $out/lib 18 + cp $src $out/lib/JMusicBot 19 + 20 + makeWrapper ${jre}/bin/java $out/bin/JMusicBot \ 21 + --add-flags "-Xmx1G -Dnogui=true -jar $out/lib/JMusicBot" 22 + ''; 23 + 24 + meta = with lib; { 25 + description = "Discord music bot that's easy to set up and run yourself"; 26 + homepage = "https://github.com/jagrosh/MusicBot"; 27 + license = licenses.asl20; 28 + maintainers = with maintainers; [ SuperSandro2000 ]; 29 + platforms = platforms.all; 30 + }; 31 + }
+2 -2
pkgs/applications/audio/lsp-plugins/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, pkg-config, makeWrapper 2 - , libsndfile, jack2Full 2 + , libsndfile, jack2 3 3 , libGLU, libGL, lv2, cairo 4 4 , ladspaH, php }: 5 5 ··· 15 15 }; 16 16 17 17 nativeBuildInputs = [ pkg-config php makeWrapper ]; 18 - buildInputs = [ jack2Full libsndfile libGLU libGL lv2 cairo ladspaH ]; 18 + buildInputs = [ jack2 libsndfile libGLU libGL lv2 cairo ladspaH ]; 19 19 20 20 makeFlags = [ 21 21 "PREFIX=${placeholder "out"}"
+644 -298
pkgs/applications/audio/netease-music-tui/cargo-lock.patch
··· 1 1 diff --git a/Cargo.lock b/Cargo.lock 2 2 new file mode 100644 3 - index 0000000..45720a8 3 + index 0000000..f191345 4 4 --- /dev/null 5 5 +++ b/Cargo.lock 6 - @@ -0,0 +1,2303 @@ 6 + @@ -0,0 +1,2649 @@ 7 7 +# This file is automatically @generated by Cargo. 8 8 +# It is not intended for manual editing. 9 9 +[[package]] 10 10 +name = "addr2line" 11 - +version = "0.14.0" 11 + +version = "0.14.1" 12 12 +source = "registry+https://github.com/rust-lang/crates.io-index" 13 - +checksum = "7c0929d69e78dd9bf5408269919fcbcaeb2e35e5d43e5815517cdc6a8e11a423" 13 + +checksum = "a55f82cfe485775d02112886f4169bde0c5894d75e79ead7eafe7e40a25e45f7" 14 14 +dependencies = [ 15 15 + "gimli", 16 16 +] 17 17 + 18 18 +[[package]] 19 19 +name = "adler" 20 - +version = "0.2.3" 20 + +version = "1.0.2" 21 21 +source = "registry+https://github.com/rust-lang/crates.io-index" 22 - +checksum = "ee2a4ec343196209d6594e19543ae87a39f96d5534d7174822a3ad825dd6ed7e" 22 + +checksum = "f26201604c87b1e01bd3d98f8d5d9a8fcbb815e8cedb41ffccbeb4bf593a35fe" 23 23 + 24 24 +[[package]] 25 25 +name = "aho-corasick" ··· 31 31 +] 32 32 + 33 33 +[[package]] 34 + +name = "alsa" 35 + +version = "0.5.0" 36 + +source = "registry+https://github.com/rust-lang/crates.io-index" 37 + +checksum = "75c4da790adcb2ce5e758c064b4f3ec17a30349f9961d3e5e6c9688b052a9e18" 38 + +dependencies = [ 39 + + "alsa-sys", 40 + + "bitflags", 41 + + "libc", 42 + + "nix", 43 + +] 44 + + 45 + +[[package]] 34 46 +name = "alsa-sys" 35 - +version = "0.1.2" 47 + +version = "0.3.1" 36 48 +source = "registry+https://github.com/rust-lang/crates.io-index" 37 - +checksum = "b0edcbbf9ef68f15ae1b620f722180b82a98b6f0628d30baa6b8d2a5abc87d58" 49 + +checksum = "db8fee663d06c4e303404ef5f40488a53e062f89ba8bfed81f42325aafad1527" 38 50 +dependencies = [ 39 51 + "libc", 40 52 + "pkg-config", ··· 62 74 + "flate2", 63 75 + "futures-core", 64 76 + "memchr", 65 - + "pin-project-lite 0.2.0", 77 + + "pin-project-lite 0.2.6", 66 78 +] 67 79 + 68 80 +[[package]] ··· 73 85 + 74 86 +[[package]] 75 87 +name = "backtrace" 76 - +version = "0.3.55" 88 + +version = "0.3.56" 77 89 +source = "registry+https://github.com/rust-lang/crates.io-index" 78 - +checksum = "ef5140344c85b01f9bbb4d4b7288a8aa4b3287ccef913a14bcc78a1063623598" 90 + +checksum = "9d117600f438b1707d4e4ae15d3595657288f8235a0eb593e80ecc98ab34e1bc" 79 91 +dependencies = [ 80 92 + "addr2line", 81 93 + "cfg-if 1.0.0", ··· 141 153 + 142 154 +[[package]] 143 155 +name = "bumpalo" 144 - +version = "3.4.0" 156 + +version = "3.6.1" 145 157 +source = "registry+https://github.com/rust-lang/crates.io-index" 146 - +checksum = "2e8c087f005730276d1096a652e92a8bacee2e2472bcc9715a74d2bec38b5820" 158 + +checksum = "63396b8a4b9de3f4fdfb320ab6080762242f66a8ef174c49d8e19b674db4cdbe" 147 159 + 148 160 +[[package]] 149 161 +name = "byteorder" 150 - +version = "1.3.4" 162 + +version = "1.4.3" 151 163 +source = "registry+https://github.com/rust-lang/crates.io-index" 152 - +checksum = "08c48aae112d48ed9f069b33538ea9e3e90aa263cfa3d1c24309612b1f7472de" 164 + +checksum = "14c189c53d098945499cdfa7ecc63567cf3886b3332b312a5b4585d8d3a6a610" 153 165 + 154 166 +[[package]] 155 167 +name = "bytes" ··· 168 180 +checksum = "0e4cec68f03f32e44924783795810fa50a7035d8c8ebe78580ad7e6c703fba38" 169 181 + 170 182 +[[package]] 183 + +name = "bytes" 184 + +version = "1.0.1" 185 + +source = "registry+https://github.com/rust-lang/crates.io-index" 186 + +checksum = "b700ce4376041dcd0a327fd0097c41095743c4c8af8887265942faf1100bd040" 187 + + 188 + +[[package]] 171 189 +name = "cassowary" 172 190 +version = "0.3.0" 173 191 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 175 193 + 176 194 +[[package]] 177 195 +name = "cc" 178 - +version = "1.0.66" 196 + +version = "1.0.67" 179 197 +source = "registry+https://github.com/rust-lang/crates.io-index" 180 - +checksum = "4c0496836a84f8d0495758516b8621a622beb77c0fed418570e50764093ced48" 198 + +checksum = "e3c69b077ad434294d3ce9f1f6143a2a4b89a8a2d54ef813d85003a4fd1137fd" 199 + +dependencies = [ 200 + + "jobserver", 201 + +] 202 + + 203 + +[[package]] 204 + +name = "cesu8" 205 + +version = "1.1.0" 206 + +source = "registry+https://github.com/rust-lang/crates.io-index" 207 + +checksum = "6d43a04d8753f35258c91f8ec639f792891f748a1edbd759cf1dcea3382ad83c" 181 208 + 182 209 +[[package]] 183 210 +name = "cexpr" ··· 209 236 + "libc", 210 237 + "num-integer", 211 238 + "num-traits 0.2.14", 212 - + "time 0.1.44", 239 + + "time 0.1.43", 213 240 + "winapi 0.3.9", 214 241 +] 215 242 + 216 243 +[[package]] 217 244 +name = "clang-sys" 218 - +version = "1.0.3" 245 + +version = "1.1.1" 219 246 +source = "registry+https://github.com/rust-lang/crates.io-index" 220 - +checksum = "0659001ab56b791be01d4b729c44376edc6718cf389a502e579b77b758f3296c" 247 + +checksum = "f54d78e30b388d4815220c8dd03fea5656b6c6d32adb59e89061552a102f8da1" 221 248 +dependencies = [ 222 249 + "glob", 223 250 + "libc", ··· 231 258 +checksum = "4bfbf56724aa9eca8afa4fcfadeb479e722935bb2a0900c2d37e0cc477af0688" 232 259 + 233 260 +[[package]] 261 + +name = "combine" 262 + +version = "4.5.2" 263 + +source = "registry+https://github.com/rust-lang/crates.io-index" 264 + +checksum = "cc4369b5e4c0cddf64ad8981c0111e7df4f7078f4d6ba98fb31f2e17c4c57b7e" 265 + +dependencies = [ 266 + + "bytes 1.0.1", 267 + + "memchr", 268 + +] 269 + + 270 + +[[package]] 234 271 +name = "config" 235 272 +version = "0.9.3" 236 273 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 239 276 + "lazy_static 1.4.0", 240 277 + "nom 4.2.3", 241 278 + "rust-ini", 242 - + "serde 1.0.118", 279 + + "serde 1.0.125", 243 280 + "serde-hjson", 244 281 + "serde_json", 245 - + "toml", 282 + + "toml 0.4.10", 246 283 + "yaml-rust", 247 284 +] 248 285 + 249 286 +[[package]] 250 287 +name = "const_fn" 251 - +version = "0.4.4" 288 + +version = "0.4.6" 252 289 +source = "registry+https://github.com/rust-lang/crates.io-index" 253 - +checksum = "cd51eab21ab4fd6a3bf889e2d0958c0a6e3a61ad04260325e919e652a2a62826" 290 + +checksum = "076a6803b0dacd6a88cfe64deba628b01533ff5ef265687e6938280c1afd0a28" 254 291 + 255 292 +[[package]] 256 293 +name = "constant_time_eq" ··· 260 297 + 261 298 +[[package]] 262 299 +name = "cookie" 263 - +version = "0.14.3" 300 + +version = "0.14.4" 264 301 +source = "registry+https://github.com/rust-lang/crates.io-index" 265 - +checksum = "784ad0fbab4f3e9cef09f20e0aea6000ae08d2cb98ac4c0abc53df18803d702f" 302 + +checksum = "03a5d7b21829bc7b4bf4754a978a241ae54ea55a40f92bb20216e54096f4b951" 266 303 +dependencies = [ 267 304 + "percent-encoding", 268 - + "time 0.2.23", 269 - + "version_check 0.9.2", 305 + + "time 0.2.26", 306 + + "version_check 0.9.3", 270 307 +] 271 308 + 272 309 +[[package]] ··· 279 316 + "idna", 280 317 + "log", 281 318 + "publicsuffix", 282 - + "serde 1.0.118", 319 + + "serde 1.0.125", 283 320 + "serde_json", 284 - + "time 0.2.23", 321 + + "time 0.2.26", 285 322 + "url", 286 323 +] 287 324 + ··· 309 346 + 310 347 +[[package]] 311 348 +name = "coreaudio-rs" 312 - +version = "0.9.1" 349 + +version = "0.10.0" 313 350 +source = "registry+https://github.com/rust-lang/crates.io-index" 314 - +checksum = "f229761965dad3e9b11081668a6ea00f1def7aa46062321b5ec245b834f6e491" 351 + +checksum = "11894b20ebfe1ff903cbdc52259693389eea03b94918a2def2c30c3bf227ad88" 315 352 +dependencies = [ 316 353 + "bitflags", 317 354 + "coreaudio-sys", ··· 328 365 + 329 366 +[[package]] 330 367 +name = "cpal" 331 - +version = "0.10.0" 368 + +version = "0.13.3" 332 369 +source = "registry+https://github.com/rust-lang/crates.io-index" 333 - +checksum = "3ded070249be850b5b59e1e3a44a70b8ae395e0e5c65b487131d8909a8208120" 370 + +checksum = "8351ddf2aaa3c583fa388029f8b3d26f3c7035a20911fdd5f2e2ed7ab57dad25" 334 371 +dependencies = [ 335 - + "alsa-sys", 372 + + "alsa", 336 373 + "core-foundation-sys 0.6.2", 337 374 + "coreaudio-rs", 338 - + "failure", 375 + + "jni", 376 + + "js-sys", 339 377 + "lazy_static 1.4.0", 340 378 + "libc", 341 - + "num-traits 0.2.14", 379 + + "mach", 380 + + "ndk", 381 + + "ndk-glue", 382 + + "nix", 383 + + "oboe", 384 + + "parking_lot", 342 385 + "stdweb 0.1.3", 386 + + "thiserror", 387 + + "web-sys", 343 388 + "winapi 0.3.9", 344 389 +] 345 390 + ··· 354 399 + 355 400 +[[package]] 356 401 +name = "crossbeam-utils" 357 - +version = "0.8.1" 402 + +version = "0.8.3" 358 403 +source = "registry+https://github.com/rust-lang/crates.io-index" 359 - +checksum = "02d96d1e189ef58269ebe5b97953da3274d83a93af647c2ddd6f9dab28cedb8d" 404 + +checksum = "e7e9d99fa91428effe99c5c6d4634cdeba32b8cf784fc428a2a687f61a952c49" 360 405 +dependencies = [ 361 406 + "autocfg", 362 407 + "cfg-if 1.0.0", ··· 364 409 +] 365 410 + 366 411 +[[package]] 412 + +name = "darling" 413 + +version = "0.10.2" 414 + +source = "registry+https://github.com/rust-lang/crates.io-index" 415 + +checksum = "0d706e75d87e35569db781a9b5e2416cff1236a47ed380831f959382ccd5f858" 416 + +dependencies = [ 417 + + "darling_core", 418 + + "darling_macro", 419 + +] 420 + + 421 + +[[package]] 422 + +name = "darling_core" 423 + +version = "0.10.2" 424 + +source = "registry+https://github.com/rust-lang/crates.io-index" 425 + +checksum = "f0c960ae2da4de88a91b2d920c2a7233b400bc33cb28453a2987822d8392519b" 426 + +dependencies = [ 427 + + "fnv", 428 + + "ident_case", 429 + + "proc-macro2", 430 + + "quote", 431 + + "strsim", 432 + + "syn", 433 + +] 434 + + 435 + +[[package]] 436 + +name = "darling_macro" 437 + +version = "0.10.2" 438 + +source = "registry+https://github.com/rust-lang/crates.io-index" 439 + +checksum = "d9b5a2f4ac4969822c62224815d069952656cadc7084fdca9751e6d959189b72" 440 + +dependencies = [ 441 + + "darling_core", 442 + + "quote", 443 + + "syn", 444 + +] 445 + + 446 + +[[package]] 367 447 +name = "dbus" 368 448 +version = "0.7.1" 369 449 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 374 454 +] 375 455 + 376 456 +[[package]] 457 + +name = "derivative" 458 + +version = "2.2.0" 459 + +source = "registry+https://github.com/rust-lang/crates.io-index" 460 + +checksum = "fcc3dd5e9e9c0b295d6e1e4d811fb6f157d5ffd784b8d202fc62eac8035a770b" 461 + +dependencies = [ 462 + + "proc-macro2", 463 + + "quote", 464 + + "syn", 465 + +] 466 + + 467 + +[[package]] 377 468 +name = "dirs" 378 469 +version = "2.0.2" 379 470 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 402 493 + 403 494 +[[package]] 404 495 +name = "dtoa" 405 - +version = "0.4.6" 496 + +version = "0.4.8" 406 497 +source = "registry+https://github.com/rust-lang/crates.io-index" 407 - +checksum = "134951f4028bdadb9b84baf4232681efbf277da25144b9b0ad65df75946c422b" 498 + +checksum = "56899898ce76aaf4a0f24d914c97ea6ed976d42fec6ad33fcbb0a1103e07b2b0" 408 499 + 409 500 +[[package]] 410 501 +name = "either" ··· 414 505 + 415 506 +[[package]] 416 507 +name = "encoding_rs" 417 - +version = "0.8.26" 508 + +version = "0.8.28" 418 509 +source = "registry+https://github.com/rust-lang/crates.io-index" 419 - +checksum = "801bbab217d7f79c0062f4f7205b5d4427c6d1a7bd7aafdd1475f7c59d62b283" 510 + +checksum = "80df024fbc5ac80f87dfef0d9f5209a252f2a497f7f42944cff24d8253cac065" 420 511 +dependencies = [ 421 512 + "cfg-if 1.0.0", 422 513 +] 423 514 + 424 515 +[[package]] 425 - +name = "error-chain" 426 - +version = "0.12.4" 427 - +source = "registry+https://github.com/rust-lang/crates.io-index" 428 - +checksum = "2d2f06b9cac1506ece98fe3231e3cc9c4410ec3d5b1f24ae1c8946f0742cdefc" 429 - +dependencies = [ 430 - + "version_check 0.9.2", 431 - +] 432 - + 433 - +[[package]] 434 516 +name = "failure" 435 517 +version = "0.1.8" 436 518 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 454 536 + 455 537 +[[package]] 456 538 +name = "flate2" 457 - +version = "1.0.19" 539 + +version = "1.0.20" 458 540 +source = "registry+https://github.com/rust-lang/crates.io-index" 459 - +checksum = "7411863d55df97a419aa64cb4d2f167103ea9d767e2c54a1868b7ac3f6b47129" 541 + +checksum = "cd3aec53de10fe96d7d8c565eb17f2c687bb5518a2ec453b5b1252964526abe0" 460 542 +dependencies = [ 461 543 + "cfg-if 1.0.0", 462 544 + "crc32fast", ··· 487 569 + 488 570 +[[package]] 489 571 +name = "form_urlencoded" 490 - +version = "1.0.0" 572 + +version = "1.0.1" 491 573 +source = "registry+https://github.com/rust-lang/crates.io-index" 492 - +checksum = "ece68d15c92e84fa4f19d3780f1294e5ca82a78a6d515f1efaabcc144688be00" 574 + +checksum = "5fc25a87fa4fd2094bffb06925852034d90a17f0d1e05197d4956d3555752191" 493 575 +dependencies = [ 494 576 + "matches", 495 577 + "percent-encoding", ··· 513 595 + 514 596 +[[package]] 515 597 +name = "futures" 516 - +version = "0.3.8" 598 + +version = "0.3.13" 517 599 +source = "registry+https://github.com/rust-lang/crates.io-index" 518 - +checksum = "9b3b0c040a1fe6529d30b3c5944b280c7f0dcb2930d2c3062bca967b602583d0" 600 + +checksum = "7f55667319111d593ba876406af7c409c0ebb44dc4be6132a783ccf163ea14c1" 519 601 +dependencies = [ 520 602 + "futures-channel", 521 603 + "futures-core", ··· 528 610 + 529 611 +[[package]] 530 612 +name = "futures-channel" 531 - +version = "0.3.8" 613 + +version = "0.3.13" 532 614 +source = "registry+https://github.com/rust-lang/crates.io-index" 533 - +checksum = "4b7109687aa4e177ef6fe84553af6280ef2778bdb7783ba44c9dc3399110fe64" 615 + +checksum = "8c2dd2df839b57db9ab69c2c9d8f3e8c81984781937fe2807dc6dcf3b2ad2939" 534 616 +dependencies = [ 535 617 + "futures-core", 536 618 + "futures-sink", ··· 538 620 + 539 621 +[[package]] 540 622 +name = "futures-core" 541 - +version = "0.3.8" 623 + +version = "0.3.13" 542 624 +source = "registry+https://github.com/rust-lang/crates.io-index" 543 - +checksum = "847ce131b72ffb13b6109a221da9ad97a64cbe48feb1028356b836b47b8f1748" 625 + +checksum = "15496a72fabf0e62bdc3df11a59a3787429221dd0710ba8ef163d6f7a9112c94" 544 626 + 545 627 +[[package]] 546 628 +name = "futures-executor" 547 - +version = "0.3.8" 629 + +version = "0.3.13" 548 630 +source = "registry+https://github.com/rust-lang/crates.io-index" 549 - +checksum = "4caa2b2b68b880003057c1dd49f1ed937e38f22fcf6c212188a121f08cf40a65" 631 + +checksum = "891a4b7b96d84d5940084b2a37632dd65deeae662c114ceaa2c879629c9c0ad1" 550 632 +dependencies = [ 551 633 + "futures-core", 552 634 + "futures-task", ··· 555 637 + 556 638 +[[package]] 557 639 +name = "futures-io" 558 - +version = "0.3.8" 640 + +version = "0.3.13" 559 641 +source = "registry+https://github.com/rust-lang/crates.io-index" 560 - +checksum = "611834ce18aaa1bd13c4b374f5d653e1027cf99b6b502584ff8c9a64413b30bb" 642 + +checksum = "d71c2c65c57704c32f5241c1223167c2c3294fd34ac020c807ddbe6db287ba59" 561 643 + 562 644 +[[package]] 563 645 +name = "futures-macro" 564 - +version = "0.3.8" 646 + +version = "0.3.13" 565 647 +source = "registry+https://github.com/rust-lang/crates.io-index" 566 - +checksum = "77408a692f1f97bcc61dc001d752e00643408fbc922e4d634c655df50d595556" 648 + +checksum = "ea405816a5139fb39af82c2beb921d52143f556038378d6db21183a5c37fbfb7" 567 649 +dependencies = [ 568 650 + "proc-macro-hack", 569 651 + "proc-macro2", ··· 573 655 + 574 656 +[[package]] 575 657 +name = "futures-sink" 576 - +version = "0.3.8" 658 + +version = "0.3.13" 577 659 +source = "registry+https://github.com/rust-lang/crates.io-index" 578 - +checksum = "f878195a49cee50e006b02b93cf7e0a95a38ac7b776b4c4d9cc1207cd20fcb3d" 660 + +checksum = "85754d98985841b7d4f5e8e6fbfa4a4ac847916893ec511a2917ccd8525b8bb3" 579 661 + 580 662 +[[package]] 581 663 +name = "futures-task" 582 - +version = "0.3.8" 664 + +version = "0.3.13" 583 665 +source = "registry+https://github.com/rust-lang/crates.io-index" 584 - +checksum = "7c554eb5bf48b2426c4771ab68c6b14468b6e76cc90996f528c3338d761a4d0d" 585 - +dependencies = [ 586 - + "once_cell", 587 - +] 666 + +checksum = "fa189ef211c15ee602667a6fcfe1c1fd9e07d42250d2156382820fba33c9df80" 588 667 + 589 668 +[[package]] 590 669 +name = "futures-util" 591 - +version = "0.3.8" 670 + +version = "0.3.13" 592 671 +source = "registry+https://github.com/rust-lang/crates.io-index" 593 - +checksum = "d304cff4a7b99cfb7986f7d43fbe93d175e72e704a8860787cc95e9ffd85cbd2" 672 + +checksum = "1812c7ab8aedf8d6f2701a43e1243acdbcc2b36ab26e2ad421eb99ac963d96d1" 594 673 +dependencies = [ 595 674 + "futures-channel", 596 675 + "futures-core", ··· 599 678 + "futures-sink", 600 679 + "futures-task", 601 680 + "memchr", 602 - + "pin-project 1.0.2", 681 + + "pin-project-lite 0.2.6", 603 682 + "pin-utils", 604 683 + "proc-macro-hack", 605 684 + "proc-macro-nested", ··· 608 687 + 609 688 +[[package]] 610 689 +name = "getrandom" 611 - +version = "0.1.15" 690 + +version = "0.1.16" 612 691 +source = "registry+https://github.com/rust-lang/crates.io-index" 613 - +checksum = "fc587bc0ec293155d5bfa6b9891ec18a1e330c234f896ea47fbada4cadbe47e6" 692 + +checksum = "8fc3cb4d91f53b50155bdcfd23f6a4c39ae1969c2ae85982b135750cccaf5fce" 614 693 +dependencies = [ 615 - + "cfg-if 0.1.10", 694 + + "cfg-if 1.0.0", 616 695 + "libc", 617 696 + "wasi 0.9.0+wasi-snapshot-preview1", 618 697 +] 619 698 + 620 699 +[[package]] 700 + +name = "getrandom" 701 + +version = "0.2.2" 702 + +source = "registry+https://github.com/rust-lang/crates.io-index" 703 + +checksum = "c9495705279e7140bf035dde1f6e750c162df8b625267cd52cc44e0b156732c8" 704 + +dependencies = [ 705 + + "cfg-if 1.0.0", 706 + + "libc", 707 + + "wasi 0.10.2+wasi-snapshot-preview1", 708 + +] 709 + + 710 + +[[package]] 621 711 +name = "gimli" 622 712 +version = "0.23.0" 623 713 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 657 747 + 658 748 +[[package]] 659 749 +name = "hermit-abi" 660 - +version = "0.1.17" 750 + +version = "0.1.18" 661 751 +source = "registry+https://github.com/rust-lang/crates.io-index" 662 - +checksum = "5aca5565f760fb5b220e499d72710ed156fdb74e631659e99377d9ebfbd13ae8" 752 + +checksum = "322f4de77956e22ed0e5032c359a0f1273f1f7f0d79bfa3b8ffbc730d7fbcc5c" 663 753 +dependencies = [ 664 754 + "libc", 665 755 +] 666 756 + 667 757 +[[package]] 668 758 +name = "hex" 669 - +version = "0.4.2" 759 + +version = "0.4.3" 670 760 +source = "registry+https://github.com/rust-lang/crates.io-index" 671 - +checksum = "644f9158b2f133fd50f5fb3242878846d9eb792e445c893805ff0e3824006e35" 761 + +checksum = "7f24254aa9a54b5c858eaee2f5bccdb46aaf0e486a595ed5fd8f86ba55232a70" 672 762 + 673 763 +[[package]] 674 764 +name = "hound" ··· 678 768 + 679 769 +[[package]] 680 770 +name = "http" 681 - +version = "0.2.2" 771 + +version = "0.2.3" 682 772 +source = "registry+https://github.com/rust-lang/crates.io-index" 683 - +checksum = "84129d298a6d57d246960ff8eb831ca4af3f96d29e2e28848dae275408658e26" 773 + +checksum = "7245cd7449cc792608c3c8a9eaf69bd4eabbabf802713748fd739c98b82f0747" 684 774 +dependencies = [ 685 - + "bytes 0.5.6", 775 + + "bytes 1.0.1", 686 776 + "fnv", 687 777 + "itoa", 688 778 +] ··· 699 789 + 700 790 +[[package]] 701 791 +name = "httparse" 702 - +version = "1.3.4" 792 + +version = "1.3.5" 703 793 +source = "registry+https://github.com/rust-lang/crates.io-index" 704 - +checksum = "cd179ae861f0c2e53da70d892f5f3029f9594be0c41dc5269cd371691b1dc2f9" 794 + +checksum = "615caabe2c3160b313d52ccc905335f4ed5f10881dd63dc5699d47e90be85691" 705 795 + 706 796 +[[package]] 707 797 +name = "httpdate" ··· 711 801 + 712 802 +[[package]] 713 803 +name = "hyper" 714 - +version = "0.13.9" 804 + +version = "0.13.10" 715 805 +source = "registry+https://github.com/rust-lang/crates.io-index" 716 - +checksum = "f6ad767baac13b44d4529fcf58ba2cd0995e36e7b435bc5b039de6f47e880dbf" 806 + +checksum = "8a6f157065790a3ed2f88679250419b5cdd96e714a0d65f7797fd337186e96bb" 717 807 +dependencies = [ 718 808 + "bytes 0.5.6", 719 809 + "futures-channel", ··· 725 815 + "httparse", 726 816 + "httpdate", 727 817 + "itoa", 728 - + "pin-project 1.0.2", 818 + + "pin-project", 729 819 + "socket2", 730 820 + "tokio", 731 821 + "tower-service", ··· 747 837 +] 748 838 + 749 839 +[[package]] 840 + +name = "ident_case" 841 + +version = "1.0.1" 842 + +source = "registry+https://github.com/rust-lang/crates.io-index" 843 + +checksum = "b9e0384b61958566e926dc50660321d12159025e767c18e043daf26b70104c39" 844 + + 845 + +[[package]] 750 846 +name = "idna" 751 - +version = "0.2.0" 847 + +version = "0.2.2" 752 848 +source = "registry+https://github.com/rust-lang/crates.io-index" 753 - +checksum = "02e2673c30ee86b5b96a9cb52ad15718aa1f966f5ab9ad54a8b95d5ca33120a9" 849 + +checksum = "89829a5d69c23d348314a7ac337fe39173b61149a9864deabd260983aed48c21" 754 850 +dependencies = [ 755 851 + "matches", 756 852 + "unicode-bidi", ··· 759 855 + 760 856 +[[package]] 761 857 +name = "indexmap" 762 - +version = "1.6.1" 858 + +version = "1.6.2" 763 859 +source = "registry+https://github.com/rust-lang/crates.io-index" 764 - +checksum = "4fb1fa934250de4de8aef298d81c729a7d33d8c239daa3a7575e6b92bfc7313b" 860 + +checksum = "824845a0bf897a9042383849b02c1bc219c2383772efcd5c6f9766fa4b81aef3" 765 861 +dependencies = [ 766 862 + "autocfg", 767 863 + "hashbrown", 768 864 +] 769 865 + 770 866 +[[package]] 867 + +name = "instant" 868 + +version = "0.1.9" 869 + +source = "registry+https://github.com/rust-lang/crates.io-index" 870 + +checksum = "61124eeebbd69b8190558df225adf7e4caafce0d743919e5d6b19652314ec5ec" 871 + +dependencies = [ 872 + + "cfg-if 1.0.0", 873 + +] 874 + + 875 + +[[package]] 771 876 +name = "iovec" 772 877 +version = "0.1.4" 773 878 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 793 898 + 794 899 +[[package]] 795 900 +name = "itoa" 796 - +version = "0.4.6" 901 + +version = "0.4.7" 902 + +source = "registry+https://github.com/rust-lang/crates.io-index" 903 + +checksum = "dd25036021b0de88a0aff6b850051563c6516d0bf53f8638938edbb9de732736" 904 + + 905 + +[[package]] 906 + +name = "jni" 907 + +version = "0.18.0" 908 + +source = "registry+https://github.com/rust-lang/crates.io-index" 909 + +checksum = "24967112a1e4301ca5342ea339763613a37592b8a6ce6cf2e4494537c7a42faf" 910 + +dependencies = [ 911 + + "cesu8", 912 + + "combine", 913 + + "jni-sys", 914 + + "log", 915 + + "thiserror", 916 + + "walkdir", 917 + +] 918 + + 919 + +[[package]] 920 + +name = "jni-sys" 921 + +version = "0.3.0" 922 + +source = "registry+https://github.com/rust-lang/crates.io-index" 923 + +checksum = "8eaf4bc02d17cbdd7ff4c7438cafcdf7fb9a4613313ad11b4f8fefe7d3fa0130" 924 + + 925 + +[[package]] 926 + +name = "jobserver" 927 + +version = "0.1.21" 797 928 +source = "registry+https://github.com/rust-lang/crates.io-index" 798 - +checksum = "dc6f3ad7b9d11a0c00842ff8de1b60ee58661048eb8049ed33c73594f359d7e6" 929 + +checksum = "5c71313ebb9439f74b00d9d2dcec36440beaf57a6aa0623068441dd7cd81a7f2" 930 + +dependencies = [ 931 + + "libc", 932 + +] 799 933 + 800 934 +[[package]] 801 935 +name = "js-sys" 802 - +version = "0.3.46" 936 + +version = "0.3.50" 803 937 +source = "registry+https://github.com/rust-lang/crates.io-index" 804 - +checksum = "cf3d7383929f7c9c7c2d0fa596f325832df98c3704f2c60553080f7127a58175" 938 + +checksum = "2d99f9e3e84b8f67f846ef5b4cbbc3b1c29f6c759fcbce6f01aa0e73d932a24c" 805 939 +dependencies = [ 806 940 + "wasm-bindgen", 807 941 +] ··· 836 970 + 837 971 +[[package]] 838 972 +name = "lewton" 839 - +version = "0.9.4" 973 + +version = "0.10.2" 840 974 +source = "registry+https://github.com/rust-lang/crates.io-index" 841 - +checksum = "8d542c1a317036c45c2aa1cf10cc9d403ca91eb2d333ef1a4917e5cb10628bd0" 975 + +checksum = "777b48df9aaab155475a83a7df3070395ea1ac6902f5cd062b8f2b028075c030" 842 976 +dependencies = [ 843 977 + "byteorder", 844 978 + "ogg", 845 - + "smallvec", 979 + + "tinyvec", 846 980 +] 847 981 + 848 982 +[[package]] 849 983 +name = "libc" 850 - +version = "0.2.81" 984 + +version = "0.2.92" 851 985 +source = "registry+https://github.com/rust-lang/crates.io-index" 852 - +checksum = "1482821306169ec4d07f6aca392a4681f66c75c9918aa49641a2595db64053cb" 986 + +checksum = "56d855069fafbb9b344c0f962150cd2c1187975cb1c22c1522c240d8c4986714" 853 987 + 854 988 +[[package]] 855 989 +name = "libdbus-sys" ··· 862 996 + 863 997 +[[package]] 864 998 +name = "libloading" 865 - +version = "0.6.6" 999 + +version = "0.7.0" 866 1000 +source = "registry+https://github.com/rust-lang/crates.io-index" 867 - +checksum = "e9367bdfa836b7e3cf895867f7a570283444da90562980ec2263d6e1569b16bc" 1001 + +checksum = "6f84d96438c15fcd6c3f244c8fce01d1e2b9c6b5623e9c711dc9286d8fc92d6a" 868 1002 +dependencies = [ 869 1003 + "cfg-if 1.0.0", 870 1004 + "winapi 0.3.9", ··· 882 1016 + 883 1017 +[[package]] 884 1018 +name = "linked-hash-map" 885 - +version = "0.5.3" 1019 + +version = "0.5.4" 1020 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1021 + +checksum = "7fb9b38af92608140b86b693604b9ffcc5824240a484d1ecd4795bacb2fe88f3" 1022 + + 1023 + +[[package]] 1024 + +name = "lock_api" 1025 + +version = "0.4.2" 886 1026 +source = "registry+https://github.com/rust-lang/crates.io-index" 887 - +checksum = "8dd5a6d5999d9907cda8ed67bbd137d3af8085216c2ac62de5be860bd41f304a" 1027 + +checksum = "dd96ffd135b2fd7b973ac026d28085defbe8983df057ced3eb4f2130b0831312" 1028 + +dependencies = [ 1029 + + "scopeguard", 1030 + +] 888 1031 + 889 1032 +[[package]] 890 1033 +name = "log" 891 - +version = "0.4.11" 1034 + +version = "0.4.14" 892 1035 +source = "registry+https://github.com/rust-lang/crates.io-index" 893 - +checksum = "4fabed175da42fed1fa0746b0ea71f412aa9d35e76e95e59b192c64b9dc2bf8b" 1036 + +checksum = "51b9bbe6c47d51fc3e1a9b945965946b4c44142ab8792c50835a980d362c2710" 894 1037 +dependencies = [ 895 - + "cfg-if 0.1.10", 1038 + + "cfg-if 1.0.0", 896 1039 +] 897 1040 + 898 1041 +[[package]] ··· 920 1063 +checksum = "7ffc5c5338469d4d3ea17d269fa8ea3512ad247247c30bd2df69e68309ed0a08" 921 1064 + 922 1065 +[[package]] 923 - +name = "maybe-uninit" 924 - +version = "2.0.0" 925 - +source = "registry+https://github.com/rust-lang/crates.io-index" 926 - +checksum = "60302e4db3a61da70c0cb7991976248362f30319e88850c487b9b95bbf059e00" 927 - + 928 - +[[package]] 929 1066 +name = "memchr" 930 1067 +version = "2.3.4" 931 1068 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 949 1086 + 950 1087 +[[package]] 951 1088 +name = "minimp3" 952 - +version = "0.3.5" 1089 + +version = "0.5.1" 953 1090 +source = "registry+https://github.com/rust-lang/crates.io-index" 954 - +checksum = "dce0cff6a0bfd3f8b6b2350819bbddd63bc65cc45e53888bdd0ff49dde16d2d5" 1091 + +checksum = "985438f75febf74c392071a975a29641b420dd84431135a6e6db721de4b74372" 955 1092 +dependencies = [ 956 1093 + "minimp3-sys", 957 1094 + "slice-deque", 1095 + + "thiserror", 958 1096 +] 959 1097 + 960 1098 +[[package]] ··· 968 1106 + 969 1107 +[[package]] 970 1108 +name = "miniz_oxide" 971 - +version = "0.4.3" 1109 + +version = "0.4.4" 972 1110 +source = "registry+https://github.com/rust-lang/crates.io-index" 973 - +checksum = "0f2d26ec3309788e423cfbf68ad1800f061638098d76a83681af979dc4eda19d" 1111 + +checksum = "a92518e98c078586bc6c934028adcca4c92a53d6a958196de835170a01d84e4b" 974 1112 +dependencies = [ 975 1113 + "adler", 976 1114 + "autocfg", ··· 1018 1156 + 1019 1157 +[[package]] 1020 1158 +name = "native-tls" 1021 - +version = "0.2.6" 1159 + +version = "0.2.7" 1022 1160 +source = "registry+https://github.com/rust-lang/crates.io-index" 1023 - +checksum = "6fcc7939b5edc4e4f86b1b4a04bb1498afaaf871b1a6691838ed06fcb48d3a3f" 1161 + +checksum = "b8d96b2e1c8da3957d58100b09f102c6d9cfdfced01b7ec5a8974044bb09dbd4" 1024 1162 +dependencies = [ 1025 1163 + "lazy_static 1.4.0", 1026 1164 + "libc", ··· 1035 1173 +] 1036 1174 + 1037 1175 +[[package]] 1176 + +name = "ndk" 1177 + +version = "0.3.0" 1178 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1179 + +checksum = "8794322172319b972f528bf90c6b467be0079f1fa82780ffb431088e741a73ab" 1180 + +dependencies = [ 1181 + + "jni-sys", 1182 + + "ndk-sys", 1183 + + "num_enum", 1184 + + "thiserror", 1185 + +] 1186 + + 1187 + +[[package]] 1188 + +name = "ndk-glue" 1189 + +version = "0.3.0" 1190 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1191 + +checksum = "c5caf0c24d51ac1c905c27d4eda4fa0635bbe0de596b8f79235e0b17a4d29385" 1192 + +dependencies = [ 1193 + + "lazy_static 1.4.0", 1194 + + "libc", 1195 + + "log", 1196 + + "ndk", 1197 + + "ndk-macro", 1198 + + "ndk-sys", 1199 + +] 1200 + + 1201 + +[[package]] 1202 + +name = "ndk-macro" 1203 + +version = "0.2.0" 1204 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1205 + +checksum = "05d1c6307dc424d0f65b9b06e94f88248e6305726b14729fd67a5e47b2dc481d" 1206 + +dependencies = [ 1207 + + "darling", 1208 + + "proc-macro-crate", 1209 + + "proc-macro2", 1210 + + "quote", 1211 + + "syn", 1212 + +] 1213 + + 1214 + +[[package]] 1215 + +name = "ndk-sys" 1216 + +version = "0.2.1" 1217 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1218 + +checksum = "c44922cb3dbb1c70b5e5f443d63b64363a898564d739ba5198e3a9138442868d" 1219 + + 1220 + +[[package]] 1038 1221 +name = "net2" 1039 1222 +version = "0.2.37" 1040 1223 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1047 1230 + 1048 1231 +[[package]] 1049 1232 +name = "netease_music_tui" 1050 - +version = "0.1.1" 1233 + +version = "0.1.3" 1051 1234 +dependencies = [ 1052 1235 + "base64 0.11.0", 1053 1236 + "byteorder", ··· 1065 1248 + "mp3-duration", 1066 1249 + "num-bigint", 1067 1250 + "openssl", 1068 - + "rand", 1251 + + "rand 0.7.3", 1069 1252 + "regex", 1070 1253 + "reqwest", 1071 1254 + "rodio", 1072 - + "serde 1.0.118", 1255 + + "serde 1.0.125", 1073 1256 + "serde_derive", 1074 1257 + "serde_json", 1075 1258 + "serde_urlencoded 0.6.1", ··· 1082 1265 +] 1083 1266 + 1084 1267 +[[package]] 1268 + +name = "nix" 1269 + +version = "0.20.0" 1270 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1271 + +checksum = "fa9b4819da1bc61c0ea48b63b7bc8604064dd43013e7cc325df098d49cd7c18a" 1272 + +dependencies = [ 1273 + + "bitflags", 1274 + + "cc", 1275 + + "cfg-if 1.0.0", 1276 + + "libc", 1277 + +] 1278 + + 1279 + +[[package]] 1085 1280 +name = "nom" 1086 1281 +version = "4.2.3" 1087 1282 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1098 1293 +checksum = "ffb4262d26ed83a1c0a33a38fe2bb15797329c85770da05e6b828ddb782627af" 1099 1294 +dependencies = [ 1100 1295 + "memchr", 1101 - + "version_check 0.9.2", 1296 + + "version_check 0.9.3", 1102 1297 +] 1103 1298 + 1104 1299 +[[package]] ··· 1113 1308 +] 1114 1309 + 1115 1310 +[[package]] 1311 + +name = "num-derive" 1312 + +version = "0.3.3" 1313 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1314 + +checksum = "876a53fff98e03a936a674b29568b0e605f06b29372c2489ff4de23f1949743d" 1315 + +dependencies = [ 1316 + + "proc-macro2", 1317 + + "quote", 1318 + + "syn", 1319 + +] 1320 + + 1321 + +[[package]] 1116 1322 +name = "num-integer" 1117 1323 +version = "0.1.44" 1118 1324 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1151 1357 +] 1152 1358 + 1153 1359 +[[package]] 1360 + +name = "num_enum" 1361 + +version = "0.5.1" 1362 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1363 + +checksum = "226b45a5c2ac4dd696ed30fa6b94b057ad909c7b7fc2e0d0808192bced894066" 1364 + +dependencies = [ 1365 + + "derivative", 1366 + + "num_enum_derive", 1367 + +] 1368 + + 1369 + +[[package]] 1370 + +name = "num_enum_derive" 1371 + +version = "0.5.1" 1372 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1373 + +checksum = "1c0fd9eba1d5db0994a239e09c1be402d35622277e35468ba891aa5e3188ce7e" 1374 + +dependencies = [ 1375 + + "proc-macro-crate", 1376 + + "proc-macro2", 1377 + + "quote", 1378 + + "syn", 1379 + +] 1380 + + 1381 + +[[package]] 1154 1382 +name = "numtoa" 1155 1383 +version = "0.1.0" 1156 1384 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1158 1386 + 1159 1387 +[[package]] 1160 1388 +name = "object" 1161 - +version = "0.22.0" 1389 + +version = "0.23.0" 1390 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1391 + +checksum = "a9a7ab5d64814df0fe4a4b5ead45ed6c5f181ee3ff04ba344313a6c80446c5d4" 1392 + + 1393 + +[[package]] 1394 + +name = "oboe" 1395 + +version = "0.4.1" 1396 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1397 + +checksum = "4cfb2390bddb9546c0f7448fd1d2abdd39e6075206f960991eb28c7fa7f126c4" 1398 + +dependencies = [ 1399 + + "jni", 1400 + + "ndk", 1401 + + "ndk-glue", 1402 + + "num-derive", 1403 + + "num-traits 0.2.14", 1404 + + "oboe-sys", 1405 + +] 1406 + + 1407 + +[[package]] 1408 + +name = "oboe-sys" 1409 + +version = "0.4.0" 1162 1410 +source = "registry+https://github.com/rust-lang/crates.io-index" 1163 - +checksum = "8d3b63360ec3cb337817c2dbd47ab4a0f170d285d8e5a2064600f3def1402397" 1411 + +checksum = "fe069264d082fc820dfa172f79be3f2e088ecfece9b1c47b0c9fd838d2bef103" 1412 + +dependencies = [ 1413 + + "cc", 1414 + +] 1164 1415 + 1165 1416 +[[package]] 1166 1417 +name = "ogg" 1167 - +version = "0.7.1" 1418 + +version = "0.8.0" 1168 1419 +source = "registry+https://github.com/rust-lang/crates.io-index" 1169 - +checksum = "13e571c3517af9e1729d4c63571a27edd660ade0667973bfc74a67c660c2b651" 1420 + +checksum = "6951b4e8bf21c8193da321bcce9c9dd2e13c858fe078bf9054a288b419ae5d6e" 1170 1421 +dependencies = [ 1171 1422 + "byteorder", 1172 1423 +] 1173 1424 + 1174 1425 +[[package]] 1175 1426 +name = "once_cell" 1176 - +version = "1.5.2" 1427 + +version = "1.7.2" 1177 1428 +source = "registry+https://github.com/rust-lang/crates.io-index" 1178 - +checksum = "13bd41f508810a131401606d54ac32a467c97172d74ba7662562ebba5ad07fa0" 1429 + +checksum = "af8b08b04175473088b46763e51ee54da5f9a164bc162f615b91bc179dbf15a3" 1179 1430 + 1180 1431 +[[package]] 1181 1432 +name = "openssl" 1182 - +version = "0.10.32" 1433 + +version = "0.10.33" 1183 1434 +source = "registry+https://github.com/rust-lang/crates.io-index" 1184 - +checksum = "038d43985d1ddca7a9900630d8cd031b56e4794eecc2e9ea39dd17aa04399a70" 1435 + +checksum = "a61075b62a23fef5a29815de7536d940aa35ce96d18ce0cc5076272db678a577" 1185 1436 +dependencies = [ 1186 1437 + "bitflags", 1187 1438 + "cfg-if 1.0.0", 1188 1439 + "foreign-types", 1189 - + "lazy_static 1.4.0", 1190 1440 + "libc", 1441 + + "once_cell", 1191 1442 + "openssl-sys", 1192 1443 +] 1193 1444 + ··· 1199 1450 + 1200 1451 +[[package]] 1201 1452 +name = "openssl-sys" 1202 - +version = "0.9.60" 1453 + +version = "0.9.61" 1203 1454 +source = "registry+https://github.com/rust-lang/crates.io-index" 1204 - +checksum = "921fc71883267538946025deffb622905ecad223c28efbfdef9bb59a0175f3e6" 1455 + +checksum = "313752393519e876837e09e1fa183ddef0be7735868dced3196f4472d536277f" 1205 1456 +dependencies = [ 1206 1457 + "autocfg", 1207 1458 + "cc", ··· 1211 1462 +] 1212 1463 + 1213 1464 +[[package]] 1465 + +name = "parking_lot" 1466 + +version = "0.11.1" 1467 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1468 + +checksum = "6d7744ac029df22dca6284efe4e898991d28e3085c706c972bcd7da4a27a15eb" 1469 + +dependencies = [ 1470 + + "instant", 1471 + + "lock_api", 1472 + + "parking_lot_core", 1473 + +] 1474 + + 1475 + +[[package]] 1476 + +name = "parking_lot_core" 1477 + +version = "0.8.3" 1478 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1479 + +checksum = "fa7a782938e745763fe6907fc6ba86946d72f49fe7e21de074e08128a99fb018" 1480 + +dependencies = [ 1481 + + "cfg-if 1.0.0", 1482 + + "instant", 1483 + + "libc", 1484 + + "redox_syscall 0.2.5", 1485 + + "smallvec", 1486 + + "winapi 0.3.9", 1487 + +] 1488 + + 1489 + +[[package]] 1214 1490 +name = "peeking_take_while" 1215 1491 +version = "0.1.2" 1216 1492 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1224 1500 + 1225 1501 +[[package]] 1226 1502 +name = "pin-project" 1227 - +version = "0.4.27" 1503 + +version = "1.0.6" 1228 1504 +source = "registry+https://github.com/rust-lang/crates.io-index" 1229 - +checksum = "2ffbc8e94b38ea3d2d8ba92aea2983b503cd75d0888d75b86bb37970b5698e15" 1505 + +checksum = "bc174859768806e91ae575187ada95c91a29e96a98dc5d2cd9a1fed039501ba6" 1230 1506 +dependencies = [ 1231 - + "pin-project-internal 0.4.27", 1232 - +] 1233 - + 1234 - +[[package]] 1235 - +name = "pin-project" 1236 - +version = "1.0.2" 1237 - +source = "registry+https://github.com/rust-lang/crates.io-index" 1238 - +checksum = "9ccc2237c2c489783abd8c4c80e5450fc0e98644555b1364da68cc29aa151ca7" 1239 - +dependencies = [ 1240 - + "pin-project-internal 1.0.2", 1507 + + "pin-project-internal", 1241 1508 +] 1242 1509 + 1243 1510 +[[package]] 1244 1511 +name = "pin-project-internal" 1245 - +version = "0.4.27" 1512 + +version = "1.0.6" 1246 1513 +source = "registry+https://github.com/rust-lang/crates.io-index" 1247 - +checksum = "65ad2ae56b6abe3a1ee25f15ee605bacadb9a764edaba9c2bf4103800d4a1895" 1248 - +dependencies = [ 1249 - + "proc-macro2", 1250 - + "quote", 1251 - + "syn", 1252 - +] 1253 - + 1254 - +[[package]] 1255 - +name = "pin-project-internal" 1256 - +version = "1.0.2" 1257 - +source = "registry+https://github.com/rust-lang/crates.io-index" 1258 - +checksum = "f8e8d2bf0b23038a4424865103a4df472855692821aab4e4f5c3312d461d9e5f" 1514 + +checksum = "a490329918e856ed1b083f244e3bfe2d8c4f336407e4ea9e1a9f479ff09049e5" 1259 1515 +dependencies = [ 1260 1516 + "proc-macro2", 1261 1517 + "quote", ··· 1264 1520 + 1265 1521 +[[package]] 1266 1522 +name = "pin-project-lite" 1267 - +version = "0.1.11" 1523 + +version = "0.1.12" 1268 1524 +source = "registry+https://github.com/rust-lang/crates.io-index" 1269 - +checksum = "c917123afa01924fc84bb20c4c03f004d9c38e5127e3c039bbf7f4b9c76a2f6b" 1525 + +checksum = "257b64915a082f7811703966789728173279bdebb956b143dbcd23f6f970a777" 1270 1526 + 1271 1527 +[[package]] 1272 1528 +name = "pin-project-lite" 1273 - +version = "0.2.0" 1529 + +version = "0.2.6" 1274 1530 +source = "registry+https://github.com/rust-lang/crates.io-index" 1275 - +checksum = "6b063f57ec186e6140e2b8b6921e5f1bd89c7356dda5b33acc5401203ca6131c" 1531 + +checksum = "dc0e1f259c92177c30a4c9d177246edd0a3568b25756a977d0632cf8fa37e905" 1276 1532 + 1277 1533 +[[package]] 1278 1534 +name = "pin-utils" ··· 1293 1549 +checksum = "ac74c624d6b2d21f425f752262f42188365d7b8ff1aff74c82e45136510a4857" 1294 1550 + 1295 1551 +[[package]] 1552 + +name = "proc-macro-crate" 1553 + +version = "0.1.5" 1554 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1555 + +checksum = "1d6ea3c4595b96363c13943497db34af4460fb474a95c43f4446ad341b8c9785" 1556 + +dependencies = [ 1557 + + "toml 0.5.8", 1558 + +] 1559 + + 1560 + +[[package]] 1296 1561 +name = "proc-macro-hack" 1297 1562 +version = "0.5.19" 1298 1563 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1300 1565 + 1301 1566 +[[package]] 1302 1567 +name = "proc-macro-nested" 1303 - +version = "0.1.6" 1568 + +version = "0.1.7" 1304 1569 +source = "registry+https://github.com/rust-lang/crates.io-index" 1305 - +checksum = "eba180dafb9038b050a4c280019bbedf9f2467b61e5d892dcad585bb57aadc5a" 1570 + +checksum = "bc881b2c22681370c6a780e47af9840ef841837bc98118431d4e1868bd0c1086" 1306 1571 + 1307 1572 +[[package]] 1308 1573 +name = "proc-macro2" 1309 - +version = "1.0.24" 1574 + +version = "1.0.26" 1310 1575 +source = "registry+https://github.com/rust-lang/crates.io-index" 1311 - +checksum = "1e0704ee1a7e00d7bb417d0770ea303c1bccbabf0ef1667dae92b5967f5f8a71" 1576 + +checksum = "a152013215dca273577e18d2bf00fa862b89b24169fb78c4c95aeb07992c9cec" 1312 1577 +dependencies = [ 1313 1578 + "unicode-xid", 1314 1579 +] 1315 1580 + 1316 1581 +[[package]] 1317 1582 +name = "publicsuffix" 1318 - +version = "1.5.4" 1583 + +version = "1.5.6" 1319 1584 +source = "registry+https://github.com/rust-lang/crates.io-index" 1320 - +checksum = "3bbaa49075179162b49acac1c6aa45fb4dafb5f13cf6794276d77bc7fd95757b" 1585 + +checksum = "95b4ce31ff0a27d93c8de1849cf58162283752f065a90d508f1105fa6c9a213f" 1321 1586 +dependencies = [ 1322 - + "error-chain", 1323 1587 + "idna", 1324 - + "lazy_static 1.4.0", 1325 - + "regex", 1326 1588 + "url", 1327 1589 +] 1328 1590 + 1329 1591 +[[package]] 1330 1592 +name = "quote" 1331 - +version = "1.0.8" 1593 + +version = "1.0.9" 1332 1594 +source = "registry+https://github.com/rust-lang/crates.io-index" 1333 - +checksum = "991431c3519a3f36861882da93630ce66b52918dcf1b8e2fd66b397fc96f28df" 1595 + +checksum = "c3d0b9745dc2debf507c8422de05d7226cc1f0644216dfdfead988f9b1ab32a7" 1334 1596 +dependencies = [ 1335 1597 + "proc-macro2", 1336 1598 +] ··· 1341 1603 +source = "registry+https://github.com/rust-lang/crates.io-index" 1342 1604 +checksum = "6a6b1679d49b24bbfe0c803429aa1874472f50d9b363131f0e89fc356b544d03" 1343 1605 +dependencies = [ 1344 - + "getrandom", 1606 + + "getrandom 0.1.16", 1607 + + "libc", 1608 + + "rand_chacha 0.2.2", 1609 + + "rand_core 0.5.1", 1610 + + "rand_hc 0.2.0", 1611 + +] 1612 + + 1613 + +[[package]] 1614 + +name = "rand" 1615 + +version = "0.8.3" 1616 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1617 + +checksum = "0ef9e7e66b4468674bfcb0c81af8b7fa0bb154fa9f28eb840da5c447baeb8d7e" 1618 + +dependencies = [ 1345 1619 + "libc", 1346 - + "rand_chacha", 1347 - + "rand_core", 1348 - + "rand_hc", 1620 + + "rand_chacha 0.3.0", 1621 + + "rand_core 0.6.2", 1622 + + "rand_hc 0.3.0", 1349 1623 +] 1350 1624 + 1351 1625 +[[package]] ··· 1355 1629 +checksum = "f4c8ed856279c9737206bf725bf36935d8666ead7aa69b52be55af369d193402" 1356 1630 +dependencies = [ 1357 1631 + "ppv-lite86", 1358 - + "rand_core", 1632 + + "rand_core 0.5.1", 1633 + +] 1634 + + 1635 + +[[package]] 1636 + +name = "rand_chacha" 1637 + +version = "0.3.0" 1638 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1639 + +checksum = "e12735cf05c9e10bf21534da50a147b924d555dc7a547c42e6bb2d5b6017ae0d" 1640 + +dependencies = [ 1641 + + "ppv-lite86", 1642 + + "rand_core 0.6.2", 1359 1643 +] 1360 1644 + 1361 1645 +[[package]] ··· 1364 1648 +source = "registry+https://github.com/rust-lang/crates.io-index" 1365 1649 +checksum = "90bde5296fc891b0cef12a6d03ddccc162ce7b2aff54160af9338f8d40df6d19" 1366 1650 +dependencies = [ 1367 - + "getrandom", 1651 + + "getrandom 0.1.16", 1652 + +] 1653 + + 1654 + +[[package]] 1655 + +name = "rand_core" 1656 + +version = "0.6.2" 1657 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1658 + +checksum = "34cf66eb183df1c5876e2dcf6b13d57340741e8dc255b48e40a26de954d06ae7" 1659 + +dependencies = [ 1660 + + "getrandom 0.2.2", 1368 1661 +] 1369 1662 + 1370 1663 +[[package]] ··· 1373 1666 +source = "registry+https://github.com/rust-lang/crates.io-index" 1374 1667 +checksum = "ca3129af7b92a17112d59ad498c6f81eaf463253766b90396d39ea7a39d6613c" 1375 1668 +dependencies = [ 1376 - + "rand_core", 1669 + + "rand_core 0.5.1", 1670 + +] 1671 + + 1672 + +[[package]] 1673 + +name = "rand_hc" 1674 + +version = "0.3.0" 1675 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1676 + +checksum = "3190ef7066a446f2e7f42e239d161e905420ccab01eb967c9eb27d21b2322a73" 1677 + +dependencies = [ 1678 + + "rand_core 0.6.2", 1377 1679 +] 1378 1680 + 1379 1681 +[[package]] ··· 1383 1685 +checksum = "41cc0f7e4d5d4544e8861606a285bb08d3e70712ccc7d2b84d7c0ccfaf4b05ce" 1384 1686 + 1385 1687 +[[package]] 1688 + +name = "redox_syscall" 1689 + +version = "0.2.5" 1690 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1691 + +checksum = "94341e4e44e24f6b591b59e47a8a027df12e008d73fd5672dbea9cc22f4507d9" 1692 + +dependencies = [ 1693 + + "bitflags", 1694 + +] 1695 + + 1696 + +[[package]] 1386 1697 +name = "redox_termios" 1387 - +version = "0.1.1" 1698 + +version = "0.1.2" 1388 1699 +source = "registry+https://github.com/rust-lang/crates.io-index" 1389 - +checksum = "7e891cfe48e9100a70a3b6eb652fef28920c117d366339687bd5576160db0f76" 1700 + +checksum = "8440d8acb4fd3d277125b4bd01a6f38aee8d814b3b5fc09b3f2b825d37d3fe8f" 1390 1701 +dependencies = [ 1391 - + "redox_syscall", 1702 + + "redox_syscall 0.2.5", 1392 1703 +] 1393 1704 + 1394 1705 +[[package]] ··· 1397 1708 +source = "registry+https://github.com/rust-lang/crates.io-index" 1398 1709 +checksum = "de0737333e7a9502c789a36d7c7fa6092a49895d4faa31ca5df163857ded2e9d" 1399 1710 +dependencies = [ 1400 - + "getrandom", 1401 - + "redox_syscall", 1711 + + "getrandom 0.1.16", 1712 + + "redox_syscall 0.1.57", 1402 1713 + "rust-argon2", 1403 1714 +] 1404 1715 + 1405 1716 +[[package]] 1406 1717 +name = "regex" 1407 - +version = "1.4.2" 1718 + +version = "1.4.5" 1408 1719 +source = "registry+https://github.com/rust-lang/crates.io-index" 1409 - +checksum = "38cf2c13ed4745de91a5eb834e11c00bcc3709e773173b2ce4c56c9fbde04b9c" 1720 + +checksum = "957056ecddbeba1b26965114e191d2e8589ce74db242b6ea25fc4062427a5c19" 1410 1721 +dependencies = [ 1411 1722 + "aho-corasick", 1412 1723 + "memchr", 1413 1724 + "regex-syntax", 1414 - + "thread_local", 1415 1725 +] 1416 1726 + 1417 1727 +[[package]] 1418 1728 +name = "regex-syntax" 1419 - +version = "0.6.21" 1729 + +version = "0.6.23" 1420 1730 +source = "registry+https://github.com/rust-lang/crates.io-index" 1421 - +checksum = "3b181ba2dcf07aaccad5448e8ead58db5b742cf85dfe035e2227f137a539a189" 1731 + +checksum = "24d5f089152e60f62d28b835fbff2cd2e8dc0baf1ac13343bef92ab7eed84548" 1422 1732 + 1423 1733 +[[package]] 1424 1734 +name = "remove_dir_all" ··· 1455 1765 + "mime_guess", 1456 1766 + "native-tls", 1457 1767 + "percent-encoding", 1458 - + "pin-project-lite 0.2.0", 1459 - + "serde 1.0.118", 1768 + + "pin-project-lite 0.2.6", 1769 + + "serde 1.0.125", 1460 1770 + "serde_urlencoded 0.7.0", 1461 - + "time 0.2.23", 1771 + + "time 0.2.26", 1462 1772 + "tokio", 1463 1773 + "tokio-socks", 1464 1774 + "tokio-tls", ··· 1471 1781 + 1472 1782 +[[package]] 1473 1783 +name = "rodio" 1474 - +version = "0.10.0" 1784 + +version = "0.13.1" 1475 1785 +source = "registry+https://github.com/rust-lang/crates.io-index" 1476 - +checksum = "1e0e0dfa7c8b17c6428f6e992a22ea595922cc86f946191b6b59e7ce96b77262" 1786 + +checksum = "b65c2eda643191f6d1bb12ea323a9db8d9ba95374e9be3780b5a9fb5cfb8520f" 1477 1787 +dependencies = [ 1478 1788 + "claxon", 1479 1789 + "cpal", 1480 1790 + "hound", 1481 - + "lazy_static 1.4.0", 1482 1791 + "lewton", 1483 1792 + "minimp3", 1484 1793 +] ··· 1529 1838 +checksum = "71d301d4193d031abdd79ff7e3dd721168a9572ef3fe51a1517aba235bd8f86e" 1530 1839 + 1531 1840 +[[package]] 1841 + +name = "same-file" 1842 + +version = "1.0.6" 1843 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1844 + +checksum = "93fc1dc3aaa9bfed95e02e6eadabb4baf7e3078b0bd1b4d7b6b0b68378900502" 1845 + +dependencies = [ 1846 + + "winapi-util", 1847 + +] 1848 + + 1849 + +[[package]] 1532 1850 +name = "schannel" 1533 1851 +version = "0.1.19" 1534 1852 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 1537 1855 + "lazy_static 1.4.0", 1538 1856 + "winapi 0.3.9", 1539 1857 +] 1858 + + 1859 + +[[package]] 1860 + +name = "scopeguard" 1861 + +version = "1.1.0" 1862 + +source = "registry+https://github.com/rust-lang/crates.io-index" 1863 + +checksum = "d29ab0c6d3fc0ee92fe66e2d99f700eab17a8d57d1c1d3b748380fb20baa78cd" 1540 1864 + 1541 1865 +[[package]] 1542 1866 +name = "security-framework" 1543 - +version = "2.0.0" 1867 + +version = "2.2.0" 1544 1868 +source = "registry+https://github.com/rust-lang/crates.io-index" 1545 - +checksum = "c1759c2e3c8580017a484a7ac56d3abc5a6c1feadf88db2f3633f12ae4268c69" 1869 + +checksum = "3670b1d2fdf6084d192bc71ead7aabe6c06aa2ea3fbd9cc3ac111fa5c2b1bd84" 1546 1870 +dependencies = [ 1547 1871 + "bitflags", 1548 1872 + "core-foundation", ··· 1553 1877 + 1554 1878 +[[package]] 1555 1879 +name = "security-framework-sys" 1556 - +version = "2.0.0" 1880 + +version = "2.2.0" 1557 1881 +source = "registry+https://github.com/rust-lang/crates.io-index" 1558 - +checksum = "f99b9d5e26d2a71633cc4f2ebae7cc9f874044e0c351a27e17892d76dce5678b" 1882 + +checksum = "3676258fd3cfe2c9a0ec99ce3038798d847ce3e4bb17746373eb9f0f1ac16339" 1559 1883 +dependencies = [ 1560 1884 + "core-foundation-sys 0.8.2", 1561 1885 + "libc", ··· 1584 1908 + 1585 1909 +[[package]] 1586 1910 +name = "serde" 1587 - +version = "1.0.118" 1911 + +version = "1.0.125" 1588 1912 +source = "registry+https://github.com/rust-lang/crates.io-index" 1589 - +checksum = "06c64263859d87aa2eb554587e2d23183398d617427327cf2b3d0ed8c69e4800" 1913 + +checksum = "558dc50e1a5a5fa7112ca2ce4effcb321b0300c0d4ccf0776a9f60cd89031171" 1590 1914 +dependencies = [ 1591 1915 + "serde_derive", 1592 1916 +] ··· 1606 1930 + 1607 1931 +[[package]] 1608 1932 +name = "serde_derive" 1609 - +version = "1.0.118" 1933 + +version = "1.0.125" 1610 1934 +source = "registry+https://github.com/rust-lang/crates.io-index" 1611 - +checksum = "c84d3526699cd55261af4b941e4e725444df67aa4f9e6a3564f18030d12672df" 1935 + +checksum = "b093b7a2bb58203b5da3056c05b4ec1fed827dcfdb37347a8841695263b3d06d" 1612 1936 +dependencies = [ 1613 1937 + "proc-macro2", 1614 1938 + "quote", ··· 1617 1941 + 1618 1942 +[[package]] 1619 1943 +name = "serde_json" 1620 - +version = "1.0.60" 1944 + +version = "1.0.64" 1621 1945 +source = "registry+https://github.com/rust-lang/crates.io-index" 1622 - +checksum = "1500e84d27fe482ed1dc791a56eddc2f230046a040fa908c08bda1d9fb615779" 1946 + +checksum = "799e97dc9fdae36a5c8b8f2cae9ce2ee9fdce2058c57a93e6099d919fd982f79" 1623 1947 +dependencies = [ 1624 1948 + "itoa", 1625 1949 + "ryu", 1626 - + "serde 1.0.118", 1950 + + "serde 1.0.125", 1627 1951 +] 1628 1952 + 1629 1953 +[[package]] ··· 1643 1967 +dependencies = [ 1644 1968 + "dtoa", 1645 1969 + "itoa", 1646 - + "serde 1.0.118", 1970 + + "serde 1.0.125", 1647 1971 + "url", 1648 1972 +] 1649 1973 + ··· 1656 1980 + "form_urlencoded", 1657 1981 + "itoa", 1658 1982 + "ryu", 1659 - + "serde 1.0.118", 1983 + + "serde 1.0.125", 1660 1984 +] 1661 1985 + 1662 1986 +[[package]] ··· 1701 2025 + 1702 2026 +[[package]] 1703 2027 +name = "smallvec" 1704 - +version = "0.6.13" 2028 + +version = "1.6.1" 1705 2029 +source = "registry+https://github.com/rust-lang/crates.io-index" 1706 - +checksum = "f7b0758c52e15a8b5e3691eae6cc559f08eee9406e548a4477ba4e67770a82b6" 1707 - +dependencies = [ 1708 - + "maybe-uninit", 1709 - +] 2030 + +checksum = "fe0f37c9e8f3c5a4a66ad655a93c74daac4ad00c441533bf5c6e7990bb42604e" 1710 2031 + 1711 2032 +[[package]] 1712 2033 +name = "socket2" ··· 1721 2042 + 1722 2043 +[[package]] 1723 2044 +name = "standback" 1724 - +version = "0.2.13" 2045 + +version = "0.2.17" 1725 2046 +source = "registry+https://github.com/rust-lang/crates.io-index" 1726 - +checksum = "cf906c8b8fc3f6ecd1046e01da1d8ddec83e48c8b08b84dcc02b585a6bedf5a8" 2047 + +checksum = "e113fb6f3de07a243d434a56ec6f186dfd51cb08448239fe7bcae73f87ff28ff" 1727 2048 +dependencies = [ 1728 - + "version_check 0.9.2", 2049 + + "version_check 0.9.3", 1729 2050 +] 1730 2051 + 1731 2052 +[[package]] ··· 1756 2077 +dependencies = [ 1757 2078 + "proc-macro2", 1758 2079 + "quote", 1759 - + "serde 1.0.118", 2080 + + "serde 1.0.125", 1760 2081 + "serde_derive", 1761 2082 + "syn", 1762 2083 +] ··· 1770 2091 + "base-x", 1771 2092 + "proc-macro2", 1772 2093 + "quote", 1773 - + "serde 1.0.118", 2094 + + "serde 1.0.125", 1774 2095 + "serde_derive", 1775 2096 + "serde_json", 1776 2097 + "sha1", ··· 1784 2105 +checksum = "213701ba3370744dcd1a12960caa4843b3d68b4d1c0a5d575e0d65b2ee9d16c0" 1785 2106 + 1786 2107 +[[package]] 2108 + +name = "strsim" 2109 + +version = "0.9.3" 2110 + +source = "registry+https://github.com/rust-lang/crates.io-index" 2111 + +checksum = "6446ced80d6c486436db5c078dde11a9f73d42b57fb273121e160b84f63d894c" 2112 + + 2113 + +[[package]] 1787 2114 +name = "syn" 1788 - +version = "1.0.55" 2115 + +version = "1.0.68" 1789 2116 +source = "registry+https://github.com/rust-lang/crates.io-index" 1790 - +checksum = "a571a711dddd09019ccc628e1b17fe87c59b09d513c06c026877aa708334f37a" 2117 + +checksum = "3ce15dd3ed8aa2f8eeac4716d6ef5ab58b6b9256db41d7e1a0224c2788e8fd87" 1791 2118 +dependencies = [ 1792 2119 + "proc-macro2", 1793 2120 + "quote", ··· 1808 2135 + 1809 2136 +[[package]] 1810 2137 +name = "tempfile" 1811 - +version = "3.1.0" 2138 + +version = "3.2.0" 1812 2139 +source = "registry+https://github.com/rust-lang/crates.io-index" 1813 - +checksum = "7a6e24d9338a0a5be79593e2fa15a648add6138caa803e2d5bc782c371732ca9" 2140 + +checksum = "dac1c663cfc93810f88aed9b8941d48cabf856a1b111c29a40439018d870eb22" 1814 2141 +dependencies = [ 1815 - + "cfg-if 0.1.10", 2142 + + "cfg-if 1.0.0", 1816 2143 + "libc", 1817 - + "rand", 1818 - + "redox_syscall", 2144 + + "rand 0.8.3", 2145 + + "redox_syscall 0.2.5", 1819 2146 + "remove_dir_all", 1820 2147 + "winapi 0.3.9", 1821 2148 +] 1822 2149 + 1823 2150 +[[package]] 1824 2151 +name = "termion" 1825 - +version = "1.5.5" 2152 + +version = "1.5.6" 1826 2153 +source = "registry+https://github.com/rust-lang/crates.io-index" 1827 - +checksum = "c22cec9d8978d906be5ac94bceb5a010d885c626c4c8855721a4dbd20e3ac905" 2154 + +checksum = "077185e2eac69c3f8379a4298e1e07cd36beb962290d4a51199acf0fdc10607e" 1828 2155 +dependencies = [ 1829 2156 + "libc", 1830 2157 + "numtoa", 1831 - + "redox_syscall", 2158 + + "redox_syscall 0.2.5", 1832 2159 + "redox_termios", 1833 2160 +] 1834 2161 + 1835 2162 +[[package]] 1836 2163 +name = "thiserror" 1837 - +version = "1.0.22" 2164 + +version = "1.0.24" 1838 2165 +source = "registry+https://github.com/rust-lang/crates.io-index" 1839 - +checksum = "0e9ae34b84616eedaaf1e9dd6026dbe00dcafa92aa0c8077cb69df1fcfe5e53e" 2166 + +checksum = "e0f4a65597094d4483ddaed134f409b2cb7c1beccf25201a9f73c719254fa98e" 1840 2167 +dependencies = [ 1841 2168 + "thiserror-impl", 1842 2169 +] 1843 2170 + 1844 2171 +[[package]] 1845 2172 +name = "thiserror-impl" 1846 - +version = "1.0.22" 2173 + +version = "1.0.24" 1847 2174 +source = "registry+https://github.com/rust-lang/crates.io-index" 1848 - +checksum = "9ba20f23e85b10754cd195504aebf6a27e2e6cbe28c17778a0c930724628dd56" 2175 + +checksum = "7765189610d8241a44529806d6fd1f2e0a08734313a35d5b3a556f92b381f3c0" 1849 2176 +dependencies = [ 1850 2177 + "proc-macro2", 1851 2178 + "quote", ··· 1859 2186 +checksum = "c7fbf4c9d56b320106cd64fd024dadfa0be7cb4706725fc44a7d7ce952d820c1" 1860 2187 +dependencies = [ 1861 2188 + "libc", 1862 - + "redox_syscall", 2189 + + "redox_syscall 0.1.57", 1863 2190 + "winapi 0.3.9", 1864 2191 +] 1865 2192 + 1866 2193 +[[package]] 1867 - +name = "thread_local" 1868 - +version = "1.0.1" 1869 - +source = "registry+https://github.com/rust-lang/crates.io-index" 1870 - +checksum = "d40c6d1b69745a6ec6fb1ca717914848da4b44ae29d9b3080cbee91d72a69b14" 1871 - +dependencies = [ 1872 - + "lazy_static 1.4.0", 1873 - +] 1874 - + 1875 - +[[package]] 1876 2194 +name = "time" 1877 - +version = "0.1.44" 2195 + +version = "0.1.43" 1878 2196 +source = "registry+https://github.com/rust-lang/crates.io-index" 1879 - +checksum = "6db9e6914ab8b1ae1c260a4ae7a49b6c5611b40328a735b21862567685e73255" 2197 + +checksum = "ca8a50ef2360fbd1eeb0ecd46795a87a19024eb4b53c5dc916ca1fd95fe62438" 1880 2198 +dependencies = [ 1881 2199 + "libc", 1882 - + "wasi 0.10.0+wasi-snapshot-preview1", 1883 2200 + "winapi 0.3.9", 1884 2201 +] 1885 2202 + 1886 2203 +[[package]] 1887 2204 +name = "time" 1888 - +version = "0.2.23" 2205 + +version = "0.2.26" 1889 2206 +source = "registry+https://github.com/rust-lang/crates.io-index" 1890 - +checksum = "bcdaeea317915d59b2b4cd3b5efcd156c309108664277793f5351700c02ce98b" 2207 + +checksum = "08a8cbfbf47955132d0202d1662f49b2423ae35862aee471f3ba4b133358f372" 1891 2208 +dependencies = [ 1892 2209 + "const_fn", 1893 2210 + "libc", 1894 2211 + "standback", 1895 2212 + "stdweb 0.4.20", 1896 2213 + "time-macros", 1897 - + "version_check 0.9.2", 2214 + + "version_check 0.9.3", 1898 2215 + "winapi 0.3.9", 1899 2216 +] 1900 2217 + ··· 1923 2240 + 1924 2241 +[[package]] 1925 2242 +name = "tinyvec" 1926 - +version = "1.1.0" 2243 + +version = "1.1.1" 1927 2244 +source = "registry+https://github.com/rust-lang/crates.io-index" 1928 - +checksum = "ccf8dbc19eb42fba10e8feaaec282fb50e2c14b2726d6301dbfeed0f73306a6f" 2245 + +checksum = "317cca572a0e89c3ce0ca1f1bdc9369547fe318a683418e42ac8f59d14701023" 1929 2246 +dependencies = [ 1930 2247 + "tinyvec_macros", 1931 2248 +] ··· 1938 2255 + 1939 2256 +[[package]] 1940 2257 +name = "tokio" 1941 - +version = "0.2.24" 2258 + +version = "0.2.25" 1942 2259 +source = "registry+https://github.com/rust-lang/crates.io-index" 1943 - +checksum = "099837d3464c16a808060bb3f02263b412f6fafcb5d01c533d309985fbeebe48" 2260 + +checksum = "6703a273949a90131b290be1fe7b039d0fc884aa1935860dfcbe056f28cd8092" 1944 2261 +dependencies = [ 1945 2262 + "bytes 0.5.6", 1946 2263 + "fnv", ··· 1950 2267 + "memchr", 1951 2268 + "mio", 1952 2269 + "num_cpus", 1953 - + "pin-project-lite 0.1.11", 2270 + + "pin-project-lite 0.1.12", 1954 2271 + "slab", 1955 2272 + "tokio-macros", 1956 2273 +] ··· 1999 2316 + "futures-core", 2000 2317 + "futures-sink", 2001 2318 + "log", 2002 - + "pin-project-lite 0.1.11", 2319 + + "pin-project-lite 0.1.12", 2003 2320 + "tokio", 2004 2321 +] 2005 2322 + ··· 2009 2326 +source = "registry+https://github.com/rust-lang/crates.io-index" 2010 2327 +checksum = "758664fc71a3a69038656bee8b6be6477d2a6c315a6b81f7081f591bffa4111f" 2011 2328 +dependencies = [ 2012 - + "serde 1.0.118", 2329 + + "serde 1.0.125", 2330 + +] 2331 + + 2332 + +[[package]] 2333 + +name = "toml" 2334 + +version = "0.5.8" 2335 + +source = "registry+https://github.com/rust-lang/crates.io-index" 2336 + +checksum = "a31142970826733df8241ef35dc040ef98c679ab14d7c3e54d827099b3acecaa" 2337 + +dependencies = [ 2338 + + "serde 1.0.125", 2013 2339 +] 2014 2340 + 2015 2341 +[[package]] 2016 2342 +name = "tower-service" 2017 - +version = "0.3.0" 2343 + +version = "0.3.1" 2018 2344 +source = "registry+https://github.com/rust-lang/crates.io-index" 2019 - +checksum = "e987b6bf443f4b5b3b6f38704195592cca41c5bb7aedd3c3693c7081f8289860" 2345 + +checksum = "360dfd1d6d30e05fda32ace2c8c70e9c0a9da713275777f5a4dbb8a1893930c6" 2020 2346 + 2021 2347 +[[package]] 2022 2348 +name = "tracing" 2023 - +version = "0.1.22" 2349 + +version = "0.1.25" 2024 2350 +source = "registry+https://github.com/rust-lang/crates.io-index" 2025 - +checksum = "9f47026cdc4080c07e49b37087de021820269d996f581aac150ef9e5583eefe3" 2351 + +checksum = "01ebdc2bb4498ab1ab5f5b73c5803825e60199229ccba0698170e3be0e7f959f" 2026 2352 +dependencies = [ 2027 2353 + "cfg-if 1.0.0", 2028 2354 + "log", 2029 - + "pin-project-lite 0.2.0", 2355 + + "pin-project-lite 0.2.6", 2030 2356 + "tracing-core", 2031 2357 +] 2032 2358 + ··· 2041 2367 + 2042 2368 +[[package]] 2043 2369 +name = "tracing-futures" 2044 - +version = "0.2.4" 2370 + +version = "0.2.5" 2045 2371 +source = "registry+https://github.com/rust-lang/crates.io-index" 2046 - +checksum = "ab7bb6f14721aa00656086e9335d363c5c8747bae02ebe32ea2c7dece5689b4c" 2372 + +checksum = "97d095ae15e245a057c8e8451bab9b3ee1e1f68e9ba2b4fbc18d0ac5237835f2" 2047 2373 +dependencies = [ 2048 - + "pin-project 0.4.27", 2374 + + "pin-project", 2049 2375 + "tracing", 2050 2376 +] 2051 2377 + ··· 2077 2403 +source = "registry+https://github.com/rust-lang/crates.io-index" 2078 2404 +checksum = "50f37be617794602aabbeee0be4f259dc1778fabe05e2d67ee8f79326d5cb4f6" 2079 2405 +dependencies = [ 2080 - + "version_check 0.9.2", 2406 + + "version_check 0.9.3", 2081 2407 +] 2082 2408 + 2083 2409 +[[package]] ··· 2091 2417 + 2092 2418 +[[package]] 2093 2419 +name = "unicode-normalization" 2094 - +version = "0.1.16" 2420 + +version = "0.1.17" 2095 2421 +source = "registry+https://github.com/rust-lang/crates.io-index" 2096 - +checksum = "a13e63ab62dbe32aeee58d1c5408d35c36c392bba5d9d3142287219721afe606" 2422 + +checksum = "07fbfce1c8a97d547e8b5334978438d9d6ec8c20e38f56d4a4374d181493eaef" 2097 2423 +dependencies = [ 2098 2424 + "tinyvec", 2099 2425 +] ··· 2118 2444 + 2119 2445 +[[package]] 2120 2446 +name = "url" 2121 - +version = "2.2.0" 2447 + +version = "2.2.1" 2122 2448 +source = "registry+https://github.com/rust-lang/crates.io-index" 2123 - +checksum = "5909f2b0817350449ed73e8bcd81c8c3c8d9a7a5d8acba4b27db277f1868976e" 2449 + +checksum = "9ccd964113622c8e9322cfac19eb1004a07e636c545f325da085d5cdde6f1f8b" 2124 2450 +dependencies = [ 2125 2451 + "form_urlencoded", 2126 2452 + "idna", ··· 2142 2468 + 2143 2469 +[[package]] 2144 2470 +name = "version_check" 2145 - +version = "0.9.2" 2471 + +version = "0.9.3" 2472 + +source = "registry+https://github.com/rust-lang/crates.io-index" 2473 + +checksum = "5fecdca9a5291cc2b8dcf7dc02453fee791a280f3743cb0905f8822ae463b3fe" 2474 + + 2475 + +[[package]] 2476 + +name = "walkdir" 2477 + +version = "2.3.2" 2146 2478 +source = "registry+https://github.com/rust-lang/crates.io-index" 2147 - +checksum = "b5a972e5669d67ba988ce3dc826706fb0a8b01471c088cb0b6110b805cc36aed" 2479 + +checksum = "808cf2735cd4b6866113f648b791c6adc5714537bc222d9347bb203386ffda56" 2480 + +dependencies = [ 2481 + + "same-file", 2482 + + "winapi 0.3.9", 2483 + + "winapi-util", 2484 + +] 2148 2485 + 2149 2486 +[[package]] 2150 2487 +name = "want" ··· 2164 2501 + 2165 2502 +[[package]] 2166 2503 +name = "wasi" 2167 - +version = "0.10.0+wasi-snapshot-preview1" 2504 + +version = "0.10.2+wasi-snapshot-preview1" 2168 2505 +source = "registry+https://github.com/rust-lang/crates.io-index" 2169 - +checksum = "1a143597ca7c7793eff794def352d41792a93c481eb1042423ff7ff72ba2c31f" 2506 + +checksum = "fd6fbd9a79829dd1ad0cc20627bf1ed606756a7f77edff7b66b7064f9cb327c6" 2170 2507 + 2171 2508 +[[package]] 2172 2509 +name = "wasm-bindgen" 2173 - +version = "0.2.69" 2510 + +version = "0.2.73" 2174 2511 +source = "registry+https://github.com/rust-lang/crates.io-index" 2175 - +checksum = "3cd364751395ca0f68cafb17666eee36b63077fb5ecd972bbcd74c90c4bf736e" 2512 + +checksum = "83240549659d187488f91f33c0f8547cbfef0b2088bc470c116d1d260ef623d9" 2176 2513 +dependencies = [ 2177 2514 + "cfg-if 1.0.0", 2178 - + "serde 1.0.118", 2515 + + "serde 1.0.125", 2179 2516 + "serde_json", 2180 2517 + "wasm-bindgen-macro", 2181 2518 +] 2182 2519 + 2183 2520 +[[package]] 2184 2521 +name = "wasm-bindgen-backend" 2185 - +version = "0.2.69" 2522 + +version = "0.2.73" 2186 2523 +source = "registry+https://github.com/rust-lang/crates.io-index" 2187 - +checksum = "1114f89ab1f4106e5b55e688b828c0ab0ea593a1ea7c094b141b14cbaaec2d62" 2524 + +checksum = "ae70622411ca953215ca6d06d3ebeb1e915f0f6613e3b495122878d7ebec7dae" 2188 2525 +dependencies = [ 2189 2526 + "bumpalo", 2190 2527 + "lazy_static 1.4.0", ··· 2197 2534 + 2198 2535 +[[package]] 2199 2536 +name = "wasm-bindgen-futures" 2200 - +version = "0.4.19" 2537 + +version = "0.4.23" 2201 2538 +source = "registry+https://github.com/rust-lang/crates.io-index" 2202 - +checksum = "1fe9756085a84584ee9457a002b7cdfe0bfff169f45d2591d8be1345a6780e35" 2539 + +checksum = "81b8b767af23de6ac18bf2168b690bed2902743ddf0fb39252e36f9e2bfc63ea" 2203 2540 +dependencies = [ 2204 2541 + "cfg-if 1.0.0", 2205 2542 + "js-sys", ··· 2209 2546 + 2210 2547 +[[package]] 2211 2548 +name = "wasm-bindgen-macro" 2212 - +version = "0.2.69" 2549 + +version = "0.2.73" 2213 2550 +source = "registry+https://github.com/rust-lang/crates.io-index" 2214 - +checksum = "7a6ac8995ead1f084a8dea1e65f194d0973800c7f571f6edd70adf06ecf77084" 2551 + +checksum = "3e734d91443f177bfdb41969de821e15c516931c3c3db3d318fa1b68975d0f6f" 2215 2552 +dependencies = [ 2216 2553 + "quote", 2217 2554 + "wasm-bindgen-macro-support", ··· 2219 2556 + 2220 2557 +[[package]] 2221 2558 +name = "wasm-bindgen-macro-support" 2222 - +version = "0.2.69" 2559 + +version = "0.2.73" 2223 2560 +source = "registry+https://github.com/rust-lang/crates.io-index" 2224 - +checksum = "b5a48c72f299d80557c7c62e37e7225369ecc0c963964059509fbafe917c7549" 2561 + +checksum = "d53739ff08c8a68b0fdbcd54c372b8ab800b1449ab3c9d706503bc7dd1621b2c" 2225 2562 +dependencies = [ 2226 2563 + "proc-macro2", 2227 2564 + "quote", ··· 2232 2569 + 2233 2570 +[[package]] 2234 2571 +name = "wasm-bindgen-shared" 2235 - +version = "0.2.69" 2572 + +version = "0.2.73" 2236 2573 +source = "registry+https://github.com/rust-lang/crates.io-index" 2237 - +checksum = "7e7811dd7f9398f14cc76efd356f98f03aa30419dea46aa810d71e819fc97158" 2574 + +checksum = "d9a543ae66aa233d14bb765ed9af4a33e81b8b58d1584cf1b47ff8cd0b9e4489" 2238 2575 + 2239 2576 +[[package]] 2240 2577 +name = "web-sys" 2241 - +version = "0.3.46" 2578 + +version = "0.3.50" 2242 2579 +source = "registry+https://github.com/rust-lang/crates.io-index" 2243 - +checksum = "222b1ef9334f92a21d3fb53dc3fd80f30836959a90f9274a626d7e06315ba3c3" 2580 + +checksum = "a905d57e488fec8861446d3393670fb50d27a262344013181c2cdf9fff5481be" 2244 2581 +dependencies = [ 2245 2582 + "js-sys", 2246 2583 + "wasm-bindgen", ··· 2275 2612 +checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6" 2276 2613 + 2277 2614 +[[package]] 2615 + +name = "winapi-util" 2616 + +version = "0.1.5" 2617 + +source = "registry+https://github.com/rust-lang/crates.io-index" 2618 + +checksum = "70ec6ce85bb158151cae5e5c87f95a8e97d2c0c4b001223f33a334e3ce5de178" 2619 + +dependencies = [ 2620 + + "winapi 0.3.9", 2621 + +] 2622 + + 2623 + +[[package]] 2278 2624 +name = "winapi-x86_64-pc-windows-gnu" 2279 2625 +version = "0.4.0" 2280 2626 +source = "registry+https://github.com/rust-lang/crates.io-index" ··· 2301 2647 + 2302 2648 +[[package]] 2303 2649 +name = "yaml-rust" 2304 - +version = "0.4.4" 2650 + +version = "0.4.5" 2305 2651 +source = "registry+https://github.com/rust-lang/crates.io-index" 2306 - +checksum = "39f0c922f1a334134dc2f7a8b67dc5d25f0735263feec974345ff706bcf20b0d" 2652 + +checksum = "56c1936c4cc7a1c9ab21a1ebb602eb942ba868cbd44a99cb7cdc5892335e1c85" 2307 2653 +dependencies = [ 2308 - + "linked-hash-map 0.5.3", 2654 + + "linked-hash-map 0.5.4", 2309 2655 +]
+4 -4
pkgs/applications/audio/netease-music-tui/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "netease-music-tui"; 5 - version = "v0.1.2"; 5 + version = "0.1.3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "betta-cyber"; 9 9 repo = "netease-music-tui"; 10 - rev = version; 11 - sha256 = "0m5b3q493d32kxznm4apn56216l07b1c49km236i03mpfvdw7m1f"; 10 + rev = "v${version}"; 11 + sha256 = "09355a6d197ckayh9833y39dsarklgpgrq3raapiv25z59di30qq"; 12 12 }; 13 13 14 14 cargoPatches = [ ./cargo-lock.patch ]; ··· 16 16 nativeBuildInputs = [ pkg-config ]; 17 17 buildInputs = [ alsaLib openssl ]; 18 18 19 - cargoSha256 = "1kfbnwy3lkbhz0ggxwr5n6qd1plipkr1ycr3z2r7c0amrzzbkc7l"; 19 + cargoSha256 = "0f06wc7h2zjipifvxsskxvihjf6mykrjrm7yk0zf98ra079bc9g9"; 20 20 21 21 meta = with lib; { 22 22 homepage = "https://github.com/betta-cyber/netease-music-tui";
+20
pkgs/applications/audio/netease-music-tui/update-cargo-lock.sh
··· 1 + #!nix-shell 2 + #!nix-shell -i bash -p coreutils gnugrep git cargo 3 + 4 + # This updates cargo-lock.patch for the netease-music-tui version listed in 5 + # default.nix. 6 + 7 + set -eu -o verbose 8 + 9 + here=$PWD 10 + version=$(cat default.nix | grep '^ version = "' | cut -d '"' -f 2) 11 + checkout=$(mktemp -d) 12 + git clone -b "$version" --depth=1 https://github.com/betta-cyber/netease-music-tui "$checkout" 13 + cd "$checkout" 14 + 15 + cargo generate-lockfile 16 + git add -f Cargo.lock 17 + git diff HEAD -- Cargo.lock > "$here"/cargo-lock.patch 18 + 19 + cd "$here" 20 + rm -rf "$checkout"
+2 -2
pkgs/applications/audio/sonic-pi/default.nix
··· 9 9 , pkg-config 10 10 , boost 11 11 , bash 12 - , jack2Full 12 + , jack2 13 13 , supercollider 14 14 , qwt 15 15 , osmid ··· 102 102 dontWrapQtApps = true; 103 103 preFixup = '' 104 104 wrapQtApp "$out/bin/sonic-pi" \ 105 - --prefix PATH : ${ruby}/bin:${bash}/bin:${supercollider}/bin:${jack2Full}/bin \ 105 + --prefix PATH : ${ruby}/bin:${bash}/bin:${supercollider}/bin:${jack2}/bin \ 106 106 --set AUBIO_LIB "${aubio}/lib/libaubio.so" 107 107 ''; 108 108
+2 -2
pkgs/applications/audio/tetraproc/default.nix
··· 1 1 { lib, stdenv, fetchurl, makeWrapper 2 - , expat, fftwFloat, fontconfig, freetype, libjack2, jack2Full, libclthreads, libclxclient 2 + , expat, fftwFloat, fontconfig, freetype, libjack2, jack2, libclthreads, libclxclient 3 3 , libsndfile, libxcb, xorg 4 4 }: 5 5 ··· 30 30 31 31 postInstall = '' 32 32 # Make sure Jack is avalable in $PATH for tetraproc 33 - wrapProgram $out/bin/tetraproc --prefix PATH : "${jack2Full}/bin" 33 + wrapProgram $out/bin/tetraproc --prefix PATH : "${jack2}/bin" 34 34 ''; 35 35 36 36 meta = with lib; {
+2 -2
pkgs/applications/editors/emacs/27.nix
··· 1 1 import ./generic.nix (rec { 2 - version = "27.1"; 3 - sha256 = "0h9f2wpmp6rb5rfwvqwv1ia1nw86h74p7hnz3vb3gjazj67i4k2a"; 2 + version = "27.2"; 3 + sha256 = "sha256-tKfMTnjmPzeGJOCRkhW5EK9bsqCvyBn60pgnLp9Awbk="; 4 4 patches = [ 5 5 ./tramp-detect-wrapped-gvfsd.patch 6 6 ];
+5 -6
pkgs/applications/editors/emacs/tramp-detect-wrapped-gvfsd.patch
··· 1 1 diff --git a/lisp/net/tramp-gvfs.el b/lisp/net/tramp-gvfs.el 2 - index 34a234c..b5a471c 100644 2 + index 9e26c8fd6d..fa220e513c 100644 3 3 --- a/lisp/net/tramp-gvfs.el 4 4 +++ b/lisp/net/tramp-gvfs.el 5 - @@ -122,6 +122,7 @@ 6 - (tramp-compat-funcall 'dbus-get-unique-name :system) 7 - (tramp-compat-funcall 'dbus-get-unique-name :session) 8 - (or (tramp-compat-process-running-p "gvfs-fuse-daemon") 5 + @@ -125,5 +125,6 @@ 6 + ;; for some processes. Better we don't check. 7 + (<= emacs-major-version 25) 8 + (tramp-compat-process-running-p "gvfs-fuse-daemon") 9 9 + (tramp-compat-process-running-p ".gvfsd-fuse-wrapped") 10 10 (tramp-compat-process-running-p "gvfsd-fuse")))) 11 11 "Non-nil when GVFS is available.") 12 -
+2 -2
pkgs/applications/editors/sigil/default.nix
··· 6 6 7 7 mkDerivation rec { 8 8 pname = "sigil"; 9 - version = "1.4.3"; 9 + version = "1.5.1"; 10 10 11 11 src = fetchFromGitHub { 12 12 repo = "Sigil"; 13 13 owner = "Sigil-Ebook"; 14 14 rev = version; 15 - sha256 = "1hk8kmhvkwfimbxzhwbnb8qdpf4n36cdzl9wfvi574i9pps36hnz"; 15 + sha256 = "sha256-BqNaIsUJE0KmFcmTjJERbclzaRe1dMjareWxUye2se0="; 16 16 }; 17 17 18 18 pythonPath = with python3Packages; [ lxml ];
+2 -2
pkgs/applications/gis/saga/default.nix
··· 12 12 , dxflib 13 13 , curl 14 14 , libiodbc 15 - , lzma 15 + , xz 16 16 , libharu 17 17 , opencv 18 18 , vigra ··· 64 64 vigra 65 65 postgresql 66 66 libiodbc 67 - lzma 67 + xz 68 68 qhull 69 69 giflib 70 70 ]
+2 -2
pkgs/applications/graphics/hydrus/default.nix
··· 1 1 { lib 2 2 , fetchFromGitHub 3 - , lzma 3 + , xz 4 4 , qt5 5 5 , wrapQtAppsHook 6 6 , miniupnpc_2 ··· 39 39 service-identity 40 40 twisted 41 41 lz4 42 - lzma 42 + xz 43 43 pysocks 44 44 matplotlib 45 45 qtpy
+2 -2
pkgs/applications/graphics/opentoonz/default.nix
··· 1 1 { boost, cmake, fetchFromGitHub, freeglut, freetype, glew, libjpeg, libmypaint 2 - , libpng, libtiff, libusb1, lz4, lzma, lzo, openblas, pkg-config, qtbase 2 + , libpng, libtiff, libusb1, lz4, xz, lzo, openblas, pkg-config, qtbase 3 3 , qtmultimedia, qtscript, lib, stdenv, superlu, wrapQtAppsHook, }: 4 4 let source = import ./source.nix { inherit fetchFromGitHub; }; 5 5 in stdenv.mkDerivation rec { ··· 21 21 libtiff 22 22 libusb1 23 23 lz4 24 - lzma 24 + xz 25 25 lzo 26 26 openblas 27 27 qtbase
+10 -3
pkgs/applications/graphics/sane/config.nix
··· 1 1 { lib, stdenv }: 2 2 3 - { paths }: 3 + { paths, disabledDefaultBackends ? [] }: 4 4 5 5 with lib; 6 - let installSanePath = path: '' 6 + let 7 + installSanePath = path: '' 7 8 if [ -e "${path}/lib/sane" ]; then 8 9 find "${path}/lib/sane" -maxdepth 1 -not -type d | while read backend; do 9 10 symlink "$backend" "$out/lib/sane/$(basename "$backend")" ··· 27 28 done 28 29 fi 29 30 ''; 31 + disableBackend = backend: '' 32 + grep -q '${backend}' $out/etc/sane.d/dll.conf || { echo '${backend} is not a default plugin in $SANE_CONFIG_DIR/dll.conf'; exit 1; } 33 + substituteInPlace $out/etc/sane.d/dll.conf --replace '${backend}' '# ${backend} disabled in nixos config' 34 + ''; 30 35 in 31 36 stdenv.mkDerivation { 32 37 name = "sane-config"; ··· 42 47 } 43 48 44 49 mkdir -p $out/etc/sane.d $out/etc/sane.d/dll.d $out/lib/sane 45 - '' + concatMapStrings installSanePath paths; 50 + '' 51 + + (concatMapStrings installSanePath paths) 52 + + (concatMapStrings disableBackend disabledDefaultBackends); 46 53 }
+7 -7
pkgs/applications/kde/akonadi/default.nix
··· 2 2 mkDerivation, lib, kdepimTeam, 3 3 extra-cmake-modules, shared-mime-info, qtbase, accounts-qt, 4 4 boost, kaccounts-integration, kcompletion, kconfigwidgets, kcrash, kdbusaddons, 5 - kdesignerplugin, ki18n, kiconthemes, kio, kitemmodels, kwindowsystem, mysql, qttools, 6 - signond, lzma, 5 + kdesignerplugin, ki18n, kiconthemes, kio, kitemmodels, kwindowsystem, mariadb, qttools, 6 + signond, xz, 7 7 }: 8 8 9 9 mkDerivation { ··· 21 21 nativeBuildInputs = [ extra-cmake-modules shared-mime-info ]; 22 22 buildInputs = [ 23 23 kaccounts-integration kcompletion kconfigwidgets kcrash kdbusaddons kdesignerplugin 24 - ki18n kiconthemes kio kwindowsystem lzma accounts-qt qttools signond 24 + ki18n kiconthemes kio kwindowsystem xz accounts-qt qttools signond 25 25 ]; 26 26 propagatedBuildInputs = [ boost kitemmodels ]; 27 27 outputs = [ "out" "dev" ]; 28 28 CXXFLAGS = [ 29 - ''-DNIXPKGS_MYSQL_MYSQLD=\"${lib.getBin mysql}/bin/mysqld\"'' 30 - ''-DNIXPKGS_MYSQL_MYSQLADMIN=\"${lib.getBin mysql}/bin/mysqladmin\"'' 31 - ''-DNIXPKGS_MYSQL_MYSQL_INSTALL_DB=\"${lib.getBin mysql}/bin/mysql_install_db\"'' 32 - ''-DNIXPKGS_MYSQL_MYSQLCHECK=\"${lib.getBin mysql}/bin/mysqlcheck\"'' 29 + ''-DNIXPKGS_MYSQL_MYSQLD=\"${lib.getBin mariadb}/bin/mysqld\"'' 30 + ''-DNIXPKGS_MYSQL_MYSQLADMIN=\"${lib.getBin mariadb}/bin/mysqladmin\"'' 31 + ''-DNIXPKGS_MYSQL_MYSQL_INSTALL_DB=\"${lib.getBin mariadb}/bin/mysql_install_db\"'' 32 + ''-DNIXPKGS_MYSQL_MYSQLCHECK=\"${lib.getBin mariadb}/bin/mysqlcheck\"'' 33 33 ''-DNIXPKGS_POSTGRES_PG_CTL=\"\"'' 34 34 ''-DNIXPKGS_POSTGRES_PG_UPGRADE=\"\"'' 35 35 ''-DNIXPKGS_POSTGRES_INITDB=\"\"''
+2 -2
pkgs/applications/misc/azuredatastudio/default.nix
··· 12 12 , at-spi2-atk 13 13 , gnutar 14 14 , atomEnv 15 - , kerberos 15 + , libkrb5 16 16 }: 17 17 18 18 # from justinwoo/azuredatastudio-nix ··· 70 70 at-spi2-core 71 71 at-spi2-atk 72 72 stdenv.cc.cc.lib 73 - kerberos 73 + libkrb5 74 74 ] 75 75 ) 76 76 targetPath
+2 -2
pkgs/applications/misc/bashSnippets/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, makeWrapper 2 - , curl, python3, bind, iproute, bc, gitMinimal }: 2 + , curl, python3, bind, iproute2, bc, gitMinimal }: 3 3 let 4 4 version = "1.23.0"; 5 5 deps = lib.makeBinPath [ 6 6 curl 7 7 python3 8 8 bind.dnsutils 9 - iproute 9 + iproute2 10 10 bc 11 11 gitMinimal 12 12 ];
+33 -4
pkgs/applications/misc/cura/plugins.nix
··· 1 - { lib, stdenv, fetchFromGitHub, fetchpatch, python3Packages }: 1 + { lib, stdenv, fetchFromGitHub, fetchpatch, python3Packages, libspnav }: 2 2 3 3 let 4 4 ··· 6 6 7 7 octoprint = stdenv.mkDerivation rec { 8 8 pname = "Cura-OctoPrintPlugin"; 9 - version = "3.5.16"; 9 + version = "3.5.18"; 10 10 11 11 src = fetchFromGitHub { 12 12 owner = "fieldOfView"; 13 13 repo = pname; 14 - rev = "8affa8aa9796cb37129d3b7222fff03f86c936cd"; 15 - sha256 = "0l4qfcashkdmpdm8nm3klz6hmi1f0bmbpb9b1yn4mvg0fam6c5xi"; 14 + rev = "7bd73946fbf22d18337dc900a81a011ece26bee0"; 15 + sha256 = "057b2f5f49p96lkh2wsr9w6yh2003x4a85irqsgbzp6igmk8imdn"; 16 16 }; 17 17 18 18 propagatedBuildInputs = with python3Packages; [ ··· 28 28 description = "Enables printing directly to OctoPrint and monitoring the process"; 29 29 homepage = "https://github.com/fieldOfView/Cura-OctoPrintPlugin"; 30 30 license = licenses.agpl3; 31 + maintainers = with maintainers; [ gebner ]; 32 + }; 33 + }; 34 + 35 + rawmouse = stdenv.mkDerivation rec { 36 + pname = "RawMouse"; 37 + version = "1.0.13"; 38 + 39 + src = fetchFromGitHub { 40 + owner = "smartavionics"; 41 + repo = pname; 42 + rev = version; 43 + sha256 = "1cj40pgsfcwliz47mkiqjbslkwcm34qb1pajc2mcljgflcnickly"; 44 + }; 45 + 46 + buildPhase = '' 47 + substituteInPlace RawMouse/config.json --replace \ 48 + /usr/local/lib/libspnav.so ${libspnav}/lib/libspnav.so 49 + ''; 50 + 51 + installPhase = '' 52 + mkdir -p $out/lib/cura/plugins/RawMouse 53 + cp -rv . $out/lib/cura/plugins/RawMouse/ 54 + ''; 55 + 56 + meta = with lib; { 57 + description = "Cura plugin for HID mice such as 3Dconnexion spacemouse"; 58 + homepage = "https://github.com/smartavionics/RawMouse"; 59 + license = licenses.agpl3Plus; 31 60 maintainers = with maintainers; [ gebner ]; 32 61 }; 33 62 };
+2 -2
pkgs/applications/misc/dbeaver/default.nix
··· 18 18 19 19 stdenv.mkDerivation rec { 20 20 pname = "dbeaver-ce"; 21 - version = "21.0.1"; # When updating also update fetchedMavenDeps.sha256 21 + version = "21.0.2"; # When updating also update fetchedMavenDeps.sha256 22 22 23 23 src = fetchFromGitHub { 24 24 owner = "dbeaver"; 25 25 repo = "dbeaver"; 26 26 rev = version; 27 - sha256 = "sha256-9l8604STqmdoUjD+EJCp4aDk4juKsPCmFnD/WYpajxo="; 27 + sha256 = "sha256-3EMSiEq1wdg4dxBU90RVVv0Hrf5dXPc1MPI0+WMk48k="; 28 28 }; 29 29 30 30 fetchedMavenDeps = stdenv.mkDerivation {
+2 -2
pkgs/applications/misc/golden-cheetah/default.nix
··· 1 1 { lib, fetchFromGitHub, fetchpatch, mkDerivation 2 2 , qtbase, qtsvg, qtserialport, qtwebengine, qtmultimedia, qttools 3 3 , qtconnectivity, qtcharts, libusb-compat-0_1 4 - , yacc, flex, zlib, qmake, makeDesktopItem, makeWrapper 4 + , bison, flex, zlib, qmake, makeDesktopItem, makeWrapper 5 5 }: 6 6 7 7 let ··· 29 29 qtbase qtsvg qtserialport qtwebengine qtmultimedia qttools zlib 30 30 qtconnectivity qtcharts libusb-compat-0_1 31 31 ]; 32 - nativeBuildInputs = [ flex makeWrapper qmake yacc ]; 32 + nativeBuildInputs = [ flex makeWrapper qmake bison ]; 33 33 34 34 patches = [ 35 35 # allow building with bison 3.7
+2 -2
pkgs/applications/misc/mediainfo/default.nix
··· 1 1 { lib, stdenv, fetchurl, autoreconfHook, pkg-config, libzen, libmediainfo, zlib }: 2 2 3 3 stdenv.mkDerivation rec { 4 - version = "20.09"; 4 + version = "21.03"; 5 5 pname = "mediainfo"; 6 6 src = fetchurl { 7 7 url = "https://mediaarea.net/download/source/mediainfo/${version}/mediainfo_${version}.tar.xz"; 8 - sha256 = "0rqg9z7s5bk7vlvjrs4gackzg7ib05a0dffi2ihsjf5a7kw7wcir"; 8 + sha256 = "07h2a1lbw5ak6c9bcn8qydchl0wpgk945rf9sfcqjyv05h5wll6y"; 9 9 }; 10 10 11 11 nativeBuildInputs = [ autoreconfHook pkg-config ];
+2 -2
pkgs/applications/misc/mob/default.nix
··· 2 2 3 3 buildGoPackage rec { 4 4 pname = "mob"; 5 - version = "1.3.0"; 5 + version = "1.4.0"; 6 6 goPackagePath = "github.com/remotemobprogramming/mob"; 7 7 8 8 src = fetchFromGitHub { 9 9 rev = "v${version}"; 10 10 owner = "remotemobprogramming"; 11 11 repo = pname; 12 - sha256 = "sha256-uzWr6wWO6niocJ8yLc1Uu9Wt/FXlCuQrC0RJkgVlphM="; 12 + sha256 = "sha256-JiTRTH8ai27H1xySyKTWiu/MG0C61Tz+hVI6tkSRp+k="; 13 13 }; 14 14 15 15 meta = with lib; {
+39 -17
pkgs/applications/misc/mupdf/default.nix
··· 1 - { stdenv, lib, fetchurl, fetchpatch, pkg-config, freetype, harfbuzz, openjpeg 2 - , jbig2dec, libjpeg , darwin 1 + { stdenv 2 + , lib 3 + , fetchurl 4 + , fetchpatch 5 + , pkg-config 6 + , freetype 7 + , harfbuzz 8 + , openjpeg 9 + , jbig2dec 10 + , libjpeg 11 + , darwin 3 12 , gumbo 4 - , enableX11 ? true, libX11, libXext, libXi, libXrandr 5 - , enableCurl ? true, curl, openssl 6 - , enableGL ? true, freeglut, libGLU 13 + , enableX11 ? true 14 + , libX11 15 + , libXext 16 + , libXi 17 + , libXrandr 18 + , enableCurl ? true 19 + , curl 20 + , openssl 21 + , enableGL ? true 22 + , freeglut 23 + , libGLU 7 24 }: 8 - 9 25 let 10 26 11 27 # OpenJPEG version is hardcoded in package source ··· 13 29 lib.versions.majorMinor (lib.getVersion openjpeg); 14 30 15 31 16 - in stdenv.mkDerivation rec { 32 + in 33 + stdenv.mkDerivation rec { 17 34 version = "1.18.0"; 18 35 pname = "mupdf"; 19 36 ··· 52 69 # Use shared libraries to decrease size 53 70 buildFlags = [ "shared" ]; 54 71 55 - makeFlags = [ "prefix=$(out) USE_SYSTEM_LIBS=yes" ]; 72 + makeFlags = [ "prefix=$(out)" "USE_SYSTEM_LIBS=yes" ] 73 + ++ lib.optionals (!enableX11) [ "HAVE_X11=no" ] 74 + ++ lib.optionals (!enableGL) [ "HAVE_GLUT=no" ]; 75 + 56 76 nativeBuildInputs = [ pkg-config ]; 57 - buildInputs = [ freetype harfbuzz openjpeg jbig2dec libjpeg freeglut libGLU gumbo ] 58 - ++ lib.optionals enableX11 [ libX11 libXext libXi libXrandr ] 59 - ++ lib.optionals enableCurl [ curl openssl ] 60 - ++ lib.optionals enableGL ( 61 - if stdenv.isDarwin then 62 - with darwin.apple_sdk.frameworks; [ GLUT OpenGL ] 63 - else 64 - [ freeglut libGLU ]) 65 - ; 77 + buildInputs = [ freetype harfbuzz openjpeg jbig2dec libjpeg gumbo ] 78 + ++ lib.optionals enableX11 [ libX11 libXext libXi libXrandr ] 79 + ++ lib.optionals enableCurl [ curl openssl ] 80 + ++ lib.optionals enableGL ( 81 + if stdenv.isDarwin then 82 + with darwin.apple_sdk.frameworks; [ GLUT OpenGL ] 83 + else 84 + [ freeglut libGLU ] 85 + ) 86 + ; 66 87 outputs = [ "bin" "dev" "out" "man" "doc" ]; 67 88 68 89 preConfigure = '' ··· 85 106 EOF 86 107 87 108 moveToOutput "bin" "$bin" 109 + '' + lib.optionalString enableX11 '' 88 110 ln -s "$bin/bin/mupdf-x11" "$bin/bin/mupdf" 89 111 mkdir -p $bin/share/applications 90 112 cat > $bin/share/applications/mupdf.desktop <<EOF
+86
pkgs/applications/misc/openlp/default.nix
··· 1 + # This file contains all runtime glue: Bindings to optional runtime dependencies 2 + # for pdfSupport, presentationSupport, and media playback. 3 + { lib, mkDerivation, wrapGAppsHook, python3Packages 4 + 5 + # qt deps 6 + , qtbase, qtmultimedia 7 + 8 + # optional deps 9 + , pdfSupport ? false, mupdf # alternatively could use ghostscript 10 + , presentationSupport ? false, libreoffice-unwrapped 11 + , vlcSupport ? false 12 + , gstreamerSupport ? false, gst_all_1, gstPlugins ? (gst: [ 13 + gst.gst-plugins-base 14 + gst.gst-plugins-good 15 + gst.gst-plugins-bad 16 + gst.gst-plugins-ugly 17 + ]) 18 + 19 + #, enableMySql ? false # Untested. If interested, contact maintainer. 20 + #, enablePostgreSql ? false # Untested. If interested, contact maintainer. 21 + #, enableJenkinsApi ? false # Untested. If interested, contact maintainer. 22 + }: 23 + 24 + let p = gstPlugins gst_all_1; 25 + # If gstreamer is activated but no plugins are given, it will at runtime 26 + # create the false illusion of being usable. 27 + in assert gstreamerSupport -> (builtins.isList p && builtins.length p > 0); 28 + 29 + let 30 + # optional packages 31 + libreofficePath = "${libreoffice-unwrapped}/lib/libreoffice/program"; 32 + 33 + # lib functions 34 + inherit (lib.lists) optional optionals; 35 + wrapSetVar = var: ''--set ${var} "''$${var}"''; 36 + 37 + # base pkg/lib 38 + baseLib = python3Packages.callPackage ./lib.nix { }; 39 + in mkDerivation { 40 + inherit (baseLib) pname version src; 41 + 42 + nativeBuildInputs = [ python3Packages.wrapPython wrapGAppsHook ]; 43 + buildInputs = [ qtbase ] ++ optionals gstreamerSupport 44 + ([ qtmultimedia.bin gst_all_1.gstreamer ] ++ gstPlugins gst_all_1); 45 + propagatedBuildInputs = optional pdfSupport mupdf 46 + ++ optional presentationSupport libreoffice-unwrapped; 47 + pythonPath = [ baseLib ] ++ optional vlcSupport python3Packages.python-vlc; 48 + # ++ optional enableMySql mysql-connector # Untested. If interested, contact maintainer. 49 + # ++ optional enablePostgreSql psycopg2 # Untested. If interested, contact maintainer. 50 + # ++ optional enableJenkinsApi jenkinsapi # Untested. If interested, contact maintainer. 51 + 52 + PYTHONPATH = libreofficePath; 53 + URE_BOOTSTRAP = "vnd.sun.star.pathname:${libreofficePath}/fundamentalrc"; 54 + UNO_PATH = libreofficePath; 55 + LD_LIBRARY_PATH = libreofficePath; 56 + JAVA_HOME = "${libreoffice-unwrapped.jdk.home}"; 57 + 58 + dontWrapQtApps = true; 59 + dontWrapGApps = true; 60 + 61 + # defined in gappsWrapperHook 62 + wrapPrefixVariables = optionals presentationSupport 63 + [ "PYTHONPATH" "LD_LIBRARY_PATH" "JAVA_HOME" ]; 64 + makeWrapperArgs = [ 65 + "\${gappsWrapperArgs[@]}" 66 + "\${qtWrapperArgs[@]}" 67 + ] ++ optionals presentationSupport 68 + ([ "--prefix PATH : ${libreoffice-unwrapped}/bin" ] 69 + ++ map wrapSetVar [ "URE_BOOTSTRAP" "UNO_PATH" ]); 70 + 71 + installPhase = '' 72 + install -D openlp.py $out/bin/openlp 73 + ''; 74 + 75 + preFixup = '' 76 + wrapPythonPrograms 77 + ''; 78 + 79 + meta = baseLib.meta // { 80 + hydraPlatforms = [ ]; # this is only the wrapper; baseLib gets built 81 + }; 82 + 83 + passthru = { 84 + inherit baseLib; 85 + }; 86 + }
+103
pkgs/applications/misc/openlp/lib.nix
··· 1 + # This file contains the base package, some of which is compiled. 2 + # Runtime glue to optinal runtime dependencies is in 'default.nix'. 3 + { fetchurl, lib, qt5 4 + 5 + # python deps 6 + , python, buildPythonPackage 7 + , alembic, beautifulsoup4, chardet, lxml, Mako, pyenchant 8 + , pyqt5_with_qtwebkit, pyxdg, sip, sqlalchemy, sqlalchemy_migrate 9 + }: 10 + 11 + buildPythonPackage rec { 12 + pname = "openlp"; 13 + version = "2.4.6"; 14 + 15 + src = fetchurl { 16 + url = "https://get.openlp.org/${version}/OpenLP-${version}.tar.gz"; 17 + sha256 = "f63dcf5f1f8a8199bf55e806b44066ad920d26c9cf67ae432eb8cdd1e761fc30"; 18 + }; 19 + 20 + doCheck = false; 21 + # FIXME: checks must be disabled because they are lacking the qt env. 22 + # They fail like this, even if built and wrapped with all Qt and 23 + # runtime dependencies: 24 + # 25 + # running install tests 26 + # qt.qpa.plugin: Could not find the Qt platform plugin "xcb" in "" 27 + # This application failed to start because no Qt platform plugin could be initialized. Reinstalling the application may fix this problem. 28 + # 29 + # Available platform plugins are: wayland-egl, wayland, wayland-xcomposite-egl, wayland-xcomposite-glx. 30 + # 31 + # See also https://discourse.nixos.org/t/qt-plugin-path-unset-in-test-phase/ 32 + 33 + #checkInputs = [ mock nose ]; 34 + nativeBuildInputs = [ qt5.qttools ]; 35 + propagatedBuildInputs = [ 36 + alembic 37 + beautifulsoup4 38 + chardet 39 + lxml 40 + Mako 41 + pyenchant 42 + pyqt5_with_qtwebkit 43 + pyxdg 44 + sip 45 + sqlalchemy 46 + sqlalchemy_migrate 47 + ]; 48 + 49 + prePatch = '' 50 + echo 'from vlc import *' > openlp/core/ui/media/vendor/vlc.py 51 + ''; 52 + 53 + dontWrapQtApps = true; 54 + dontWrapGApps = true; 55 + postInstall = '' 56 + ( # use subshell because of cd 57 + tdestdir="$out/i18n" 58 + mkdir -p "$tdestdir" 59 + cd ./resources/i18n 60 + for file in *.ts; do 61 + lconvert -i "$file" -o "$tdestdir/''${file%%ts}qm" 62 + done 63 + ) 64 + ''; 65 + 66 + preFixup = '' 67 + rm -r $out/${python.sitePackages}/tests 68 + rm -r $out/bin 69 + ''; 70 + 71 + meta = with lib; { 72 + description = "Free church presentation software"; 73 + homepage = "https://openlp.org/"; 74 + downloadPage = "https://openlp.org/#downloads"; 75 + platforms = platforms.unix; 76 + license = licenses.gpl2Only; 77 + maintainers = [ maintainers.jorsn ]; 78 + 79 + longDescription = '' 80 + OpenLP is a free church presentation software. 81 + 82 + Features: 83 + 84 + * Cross platform between Linux, Windows, OS X and FreeBSD 85 + * Display songs, Bible verses, presentations, images, audio and video 86 + * Control OpenLP remotely via the Android remote, iOS remote or mobile web browser 87 + * Quickly and easily import songs from other popular presentation packages 88 + * Easy enough to use to get up and running in less than 10 minutes 89 + 90 + Remark: This pkg only supports sqlite dbs. If you wish to have support for 91 + mysql or postgresql dbs, or Jenkins, please contact the maintainer. 92 + 93 + Bugs which affect this software packaged in Nixpkgs: 94 + 95 + 1. The package must disable checks, because they are lacking the qt env. 96 + (see pkg source and https://discourse.nixos.org/t/qt-plugin-path-unset-in-test-phase/) 97 + 2. There is a segfault on exit. Not a real problem, according to debug log, everything 98 + shuts down correctly. Maybe related to https://forums.openlp.org/discussion/3620/crash-on-exit. 99 + Plan: Wait for OpenLP-3, since it is already in beta 1 100 + (2021-02-09; news: https://openlp.org/blog/). 101 + ''; 102 + }; 103 + }
+25
pkgs/applications/misc/openring/default.nix
··· 1 + { buildGoModule, fetchFromSourcehut, lib }: 2 + 3 + buildGoModule rec { 4 + pname = "openring"; 5 + version = "unstable-2021-04-03"; 6 + 7 + src = fetchFromSourcehut { 8 + owner = "~sircmpwn"; 9 + repo = pname; 10 + rev = "f13edb5dfd882ce608d61cf6b6740650ce9d84a3"; 11 + sha256 = "sha256-Z65V77JZ9jCzBg7T2+d5Agxxd+MV2R7nYcLedYP5eOE="; 12 + }; 13 + 14 + vendorSha256 = "sha256-BbBTmkGyLrIWphXC+dBaHaVzHuXRZ+4N/Jt2k3nF7Z4="; 15 + 16 + # The package has no tests. 17 + doCheck = false; 18 + 19 + meta = with lib; { 20 + description = "A webring for static site generators"; 21 + homepage = "https://git.sr.ht/~sircmpwn/openring"; 22 + license = licenses.gpl3Only; 23 + maintainers = with maintainers; [ sumnerevans ]; 24 + }; 25 + }
+2 -2
pkgs/applications/misc/sc-im/default.nix
··· 4 4 , makeWrapper 5 5 , pkg-config 6 6 , which 7 - , yacc 7 + , bison 8 8 , gnuplot 9 9 , libxls 10 10 , libxml2 ··· 29 29 makeWrapper 30 30 pkg-config 31 31 which 32 - yacc 32 + bison 33 33 ]; 34 34 35 35 buildInputs = [
+19 -17
pkgs/applications/misc/tellico/default.nix
··· 1 1 { lib 2 2 , fetchurl 3 3 , mkDerivation 4 - , libkcddb 5 - , kinit 6 - , kdelibs4support 7 - , solid 8 - , kxmlgui 4 + , cmake 5 + , exempi 6 + , extra-cmake-modules 9 7 , karchive 8 + , kdoctools 10 9 , kfilemetadata 11 10 , khtml 11 + , kitemmodels 12 12 , knewstuff 13 + , kxmlgui 14 + , libcdio 15 + , libkcddb 13 16 , libksane 14 - , cmake 15 - , exempi 16 - , extra-cmake-modules 17 - , libcdio 18 - , poppler 19 17 , makeWrapper 20 - , kdoctools 18 + , poppler 19 + , qtcharts 20 + , qtwebengine 21 + , solid 21 22 , taglib 22 23 }: 23 24 24 25 mkDerivation rec { 25 - name = "tellico"; 26 - version = "3.3.3"; 26 + pname = "tellico"; 27 + version = "3.4"; 27 28 28 29 src = fetchurl { 29 30 # version 3.3.0 just uses 3.3 in its name ··· 31 32 "https://tellico-project.org/files/tellico-${version}.tar.xz" 32 33 "https://tellico-project.org/files/tellico-${lib.versions.majorMinor version}.tar.xz" 33 34 ]; 34 - sha256 = "sha256-9cdbUTa2Mt3/yNylOSdGjgDETD74sR0dU4C58uW0Y6o="; 35 + sha256 = "sha256-YXMJrAkfehe3ox4WZ19igyFbXwtjO5wxN3bmgP01jPs="; 35 36 }; 36 37 37 38 nativeBuildInputs = [ ··· 43 44 44 45 buildInputs = [ 45 46 exempi 46 - extra-cmake-modules 47 47 karchive 48 - libkcddb 49 - kdelibs4support 50 48 kfilemetadata 51 49 khtml 50 + kitemmodels 52 51 knewstuff 53 52 kxmlgui 54 53 libcdio 54 + libkcddb 55 55 libksane 56 56 poppler 57 + qtcharts 58 + qtwebengine 57 59 solid 58 60 taglib 59 61 ];
+2 -2
pkgs/applications/networking/appgate-sdp/default.nix
··· 17 17 , glib 18 18 , gtk3 19 19 , icu 20 - , iproute 20 + , iproute2 21 21 , krb5 22 22 , lib 23 23 , mesa ··· 169 169 patchelf --set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" --set-rpath "$ORIGIN:$out/opt/appgate/service/:$out/opt/appgate/:${rpath}" $binary 170 170 done 171 171 172 - wrapProgram $out/opt/appgate/appgate-driver --prefix PATH : ${lib.makeBinPath [ iproute networkmanager dnsmasq ]} 172 + wrapProgram $out/opt/appgate/appgate-driver --prefix PATH : ${lib.makeBinPath [ iproute2 networkmanager dnsmasq ]} 173 173 wrapProgram $out/opt/appgate/linux/set_dns --set PYTHONPATH $PYTHONPATH 174 174 ''; 175 175 meta = with lib; {
+2 -2
pkgs/applications/networking/browsers/chromium/common.nix
··· 8 8 , libusb1, pciutils, nss, re2 9 9 10 10 , python2Packages, perl, pkg-config 11 - , nspr, systemd, kerberos 11 + , nspr, systemd, libkrb5 12 12 , util-linux, alsaLib 13 13 , bison, gperf 14 14 , glib, gtk3, dbus-glib ··· 135 135 buildInputs = defaultDependencies ++ [ 136 136 nspr nss systemd 137 137 util-linux alsaLib 138 - bison gperf kerberos 138 + bison gperf libkrb5 139 139 glib gtk3 dbus-glib 140 140 libXScrnSaver libXcursor libXtst libxshmfence libGLU libGL 141 141 pciutils protobuf speechd libXdamage at-spi2-core
+2 -2
pkgs/applications/networking/browsers/elinks/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, fetchpatch, ncurses, xlibsWrapper, bzip2, zlib 2 - , brotli, zstd, lzma, openssl, autoreconfHook, gettext, pkg-config, libev 2 + , brotli, zstd, xz, openssl, autoreconfHook, gettext, pkg-config, libev 3 3 , gpm, libidn, tre, expat 4 4 , # Incompatible licenses, LGPLv3 - GPLv2 5 5 enableGuile ? false, guile ? null ··· 23 23 }; 24 24 25 25 buildInputs = [ 26 - ncurses xlibsWrapper bzip2 zlib brotli zstd lzma 26 + ncurses xlibsWrapper bzip2 zlib brotli zstd xz 27 27 openssl libidn tre expat libev 28 28 ] 29 29 ++ lib.optional stdenv.isLinux gpm
+2 -2
pkgs/applications/networking/browsers/firefox-bin/default.nix
··· 13 13 , glibc 14 14 , gtk2 15 15 , gtk3 16 - , kerberos 16 + , libkrb5 17 17 , libX11 18 18 , libXScrnSaver 19 19 , libxcb ··· 106 106 glibc 107 107 gtk2 108 108 gtk3 109 - kerberos 109 + libkrb5 110 110 mesa 111 111 libX11 112 112 libXScrnSaver
+2 -2
pkgs/applications/networking/browsers/firefox/common.nix
··· 24 24 , gtk3Support ? true, gtk2, gtk3, wrapGAppsHook 25 25 , waylandSupport ? true, libxkbcommon 26 26 , ltoSupport ? (stdenv.isLinux && stdenv.is64bit), overrideCC, buildPackages 27 - , gssSupport ? true, kerberos 27 + , gssSupport ? true, libkrb5 28 28 , pipewireSupport ? waylandSupport && webrtcSupport, pipewire 29 29 30 30 ## privacy-related options ··· 174 174 ++ lib.optional alsaSupport alsaLib 175 175 ++ lib.optional pulseaudioSupport libpulseaudio # only headers are needed 176 176 ++ lib.optional gtk3Support gtk3 177 - ++ lib.optional gssSupport kerberos 177 + ++ lib.optional gssSupport libkrb5 178 178 ++ lib.optional waylandSupport libxkbcommon 179 179 ++ lib.optional pipewireSupport pipewire 180 180 ++ lib.optional (lib.versionAtLeast ffversion "82") gnum4
+2 -2
pkgs/applications/networking/browsers/firefox/wrapper.nix
··· 8 8 , tridactyl-native 9 9 , fx_cast_bridge 10 10 , udev 11 - , kerberos 11 + , libkrb5 12 12 , libva 13 13 , mesa # firefox wants gbm for drm+dmabuf 14 14 }: ··· 65 65 libs = lib.optionals stdenv.isLinux [ udev libva mesa libnotify xorg.libXScrnSaver ] 66 66 ++ lib.optional (pipewireSupport && lib.versionAtLeast version "83") pipewire 67 67 ++ lib.optional ffmpegSupport ffmpeg 68 - ++ lib.optional gssSupport kerberos 68 + ++ lib.optional gssSupport libkrb5 69 69 ++ lib.optional useGlvnd libglvnd 70 70 ++ lib.optionals (cfg.enableQuakeLive or false) 71 71 (with xorg; [ stdenv.cc libX11 libXxf86dga libXxf86vm libXext libXt alsaLib zlib ])
+2 -2
pkgs/applications/networking/browsers/google-chrome/default.nix
··· 5 5 , libXcursor, libXext, libXfixes, libXrender, libXScrnSaver, libXcomposite, libxcb 6 6 , alsaLib, libXdamage, libXtst, libXrandr, libxshmfence, expat, cups 7 7 , dbus, gtk3, gdk-pixbuf, gcc-unwrapped, at-spi2-atk, at-spi2-core 8 - , kerberos, libdrm, mesa 8 + , libkrb5, libdrm, mesa 9 9 , libxkbcommon, wayland # ozone/wayland 10 10 11 11 # Command line programs ··· 66 66 liberation_ttf curl util-linux xdg-utils wget 67 67 flac harfbuzz icu libpng opusWithCustomModes snappy speechd 68 68 bzip2 libcap at-spi2-atk at-spi2-core 69 - kerberos libdrm mesa coreutils 69 + libkrb5 libdrm mesa coreutils 70 70 libxkbcommon wayland 71 71 ] ++ optional pulseSupport libpulseaudio 72 72 ++ optional libvaSupport libva
+2 -2
pkgs/applications/networking/cluster/k3s/default.nix
··· 3 3 , makeWrapper 4 4 , socat 5 5 , iptables 6 - , iproute 6 + , iproute2 7 7 , bridge-utils 8 8 , conntrack-tools 9 9 , buildGoPackage ··· 240 240 kmod 241 241 socat 242 242 iptables 243 - iproute 243 + iproute2 244 244 bridge-utils 245 245 ethtool 246 246 util-linux
+2 -2
pkgs/applications/networking/cluster/openshift/default.nix
··· 1 1 { lib, fetchFromGitHub, buildGoPackage, which, go-bindata, rsync, util-linux 2 - , coreutils, kerberos, ncurses, clang, installShellFiles 2 + , coreutils, libkrb5, ncurses, clang, installShellFiles 3 3 , components ? [ 4 4 "cmd/oc" 5 5 "cmd/openshift" ··· 33 33 34 34 goPackagePath = "github.com/openshift/origin"; 35 35 36 - buildInputs = [ kerberos ncurses ]; 36 + buildInputs = [ libkrb5 ncurses ]; 37 37 38 38 nativeBuildInputs = [ which rsync go-bindata clang installShellFiles ]; 39 39
+2 -2
pkgs/applications/networking/cluster/qbec/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "qbec"; 5 - version = "0.14.1"; 5 + version = "0.14.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "splunk"; 9 9 repo = "qbec"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-+CzY/ifH+U3I36uHXyO2FSkPCz+SWRpSPnxfd2LHHhY="; 11 + sha256 = "sha256-F5xnW9069Xrl6isvmeYtfTZUZSiSq47HLs5/p3HCf6E="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-wtpXqIixjRYYSIPe43Q5627g6mu05WdvwCi9cXVgCBs=";
+2 -2
pkgs/applications/networking/cluster/velero/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "velero"; 5 - version = "1.5.3"; 5 + version = "1.5.4"; 6 6 7 7 src = fetchFromGitHub { 8 8 rev = "v${version}"; 9 9 owner = "vmware-tanzu"; 10 10 repo = "velero"; 11 - sha256 = "sha256-DZ6phJxc8n9LCSsER09K3j+pUJxkYrBZQaI4h+bcV94="; 11 + sha256 = "sha256-YHBqIM3NV2L13w9WCzldUWmdBMec7ZndzYgGHblS8Dg="; 12 12 }; 13 13 14 14 buildFlagsArray = ''
+2 -2
pkgs/applications/networking/compactor/default.nix
··· 1 1 { autoconf, automake, boost, cbor-diag, cddl, fetchFromGitHub, file, libctemplate, libmaxminddb 2 - , libpcap, libtins, libtool, lzma, openssl, pkg-config, lib, stdenv, tcpdump, wireshark-cli 2 + , libpcap, libtins, libtool, xz, openssl, pkg-config, lib, stdenv, tcpdump, wireshark-cli 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { ··· 20 20 libpcap 21 21 openssl 22 22 libtins 23 - lzma 23 + xz 24 24 libctemplate 25 25 libmaxminddb 26 26 ];
+2 -2
pkgs/applications/networking/firehol/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, pkgs 2 - , autoconf, automake, curl, iprange, iproute, ipset, iptables, iputils 2 + , autoconf, automake, curl, iprange, iproute2, ipset, iptables, iputils 3 3 , kmod, nettools, procps, tcpdump, traceroute, util-linux, whois 4 4 5 5 # If true, just install FireQOS without FireHOL ··· 35 35 36 36 nativeBuildInputs = [ autoconf automake ]; 37 37 buildInputs = [ 38 - curl iprange iproute ipset iptables iputils kmod 38 + curl iprange iproute2 ipset iptables iputils kmod 39 39 nettools procps tcpdump traceroute util-linux whois 40 40 ]; 41 41
+2 -2
pkgs/applications/networking/ike/default.nix
··· 1 1 { lib, stdenv, fetchurl, fetchpatch, cmake, openssl, libedit, flex, bison, qt4, makeWrapper 2 - , gcc, nettools, iproute, linuxHeaders }: 2 + , gcc, nettools, iproute2, linuxHeaders }: 3 3 4 4 # NOTE: use $out/etc/iked.conf as sample configuration and also set: dhcp_file "/etc/iked.dhcp"; 5 5 # launch with "iked -f /etc/iked.conf" ··· 26 26 ]; 27 27 28 28 nativeBuildInputs = [ cmake flex bison makeWrapper ]; 29 - buildInputs = [ openssl libedit qt4 nettools iproute ]; 29 + buildInputs = [ openssl libedit qt4 nettools iproute2 ]; 30 30 31 31 postPatch = '' 32 32 # fix build with bison3
+2 -2
pkgs/applications/networking/instant-messengers/telegram/kotatogram-desktop/default.nix
··· 1 1 { mkDerivation, lib, fetchFromGitHub, pkg-config, python3, cmake, ninja 2 2 , qtbase, qtimageformats, libdbusmenu, hunspell, xdg-utils, ffmpeg_3, openalSoft 3 - , lzma, lz4, xxHash, zlib, minizip, openssl, libtgvoip, microsoft_gsl, tl-expected 3 + , xz, lz4, xxHash, zlib, minizip, openssl, libtgvoip, microsoft_gsl, tl-expected 4 4 , range-v3 5 5 }: 6 6 ··· 21 21 nativeBuildInputs = [ pkg-config python3 cmake ninja ]; 22 22 23 23 buildInputs = [ 24 - qtbase qtimageformats ffmpeg_3 openalSoft lzma lz4 xxHash libdbusmenu 24 + qtbase qtimageformats ffmpeg_3 openalSoft xz lz4 xxHash libdbusmenu 25 25 zlib minizip openssl hunspell libtgvoip microsoft_gsl tl-expected range-v3 26 26 ]; 27 27
+2 -2
pkgs/applications/networking/instant-messengers/zoom-us/default.nix
··· 29 29 assert pulseaudioSupport -> libpulseaudio != null; 30 30 31 31 let 32 - version = "5.5.7938.0228"; 32 + version = "5.6.13632.0328"; 33 33 srcs = { 34 34 x86_64-linux = fetchurl { 35 35 url = "https://zoom.us/client/${version}/zoom_x86_64.pkg.tar.xz"; 36 - sha256 = "KM8o2tgIn0lecOM4gKdTOdk/zsohlFqtNX+ca/S6FGY="; 36 + sha256 = "0nskpg3rbv40jcbih95sfdr0kfv5hjv50z9jdz1cddl8v7hbqg71"; 37 37 }; 38 38 }; 39 39
+2 -2
pkgs/applications/networking/mailreaders/alpine/default.nix
··· 1 - {lib, stdenv, fetchurl, ncurses, tcl, openssl, pam, kerberos 1 + {lib, stdenv, fetchurl, ncurses, tcl, openssl, pam, libkrb5 2 2 , openldap 3 3 }: 4 4 ··· 12 12 }; 13 13 14 14 buildInputs = [ 15 - ncurses tcl openssl pam kerberos openldap 15 + ncurses tcl openssl pam libkrb5 openldap 16 16 ]; 17 17 18 18 hardeningDisable = [ "format" ];
+2 -2
pkgs/applications/networking/mailreaders/mutt/default.nix
··· 4 4 , cyrus_sasl ? null 5 5 , gnupg ? null 6 6 , gpgme ? null 7 - , kerberos ? null 7 + , libkrb5 ? null 8 8 , headerCache ? true 9 9 , sslSupport ? true 10 10 , saslSupport ? true ··· 43 43 [ ncurses which perl ] 44 44 ++ optional headerCache gdbm 45 45 ++ optional sslSupport openssl 46 - ++ optional gssSupport kerberos 46 + ++ optional gssSupport libkrb5 47 47 ++ optional saslSupport cyrus_sasl 48 48 ++ optional gpgmeSupport gpgme; 49 49
+2 -2
pkgs/applications/networking/mailreaders/neomutt/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, gettext, makeWrapper, tcl, which 2 - , ncurses, perl , cyrus_sasl, gss, gpgme, kerberos, libidn, libxml2, notmuch, openssl 2 + , ncurses, perl , cyrus_sasl, gss, gpgme, libkrb5, libidn, libxml2, notmuch, openssl 3 3 , lmdb, libxslt, docbook_xsl, docbook_xml_dtd_42, w3m, mailcap, sqlite, zlib 4 4 }: 5 5 ··· 15 15 }; 16 16 17 17 buildInputs = [ 18 - cyrus_sasl gss gpgme kerberos libidn ncurses 18 + cyrus_sasl gss gpgme libkrb5 libidn ncurses 19 19 notmuch openssl perl lmdb 20 20 mailcap sqlite 21 21 ];
+2 -2
pkgs/applications/networking/mailreaders/thunderbird-bin/68.nix
··· 16 16 , glibc 17 17 , gtk2 18 18 , gtk3 19 - , kerberos 19 + , libkrb5 20 20 , libX11 21 21 , libXScrnSaver 22 22 , libXcomposite ··· 94 94 glibc 95 95 gtk2 96 96 gtk3 97 - kerberos 97 + libkrb5 98 98 libX11 99 99 libXScrnSaver 100 100 libXcomposite
+2 -2
pkgs/applications/networking/mailreaders/thunderbird-bin/default.nix
··· 20 20 , gpgme 21 21 , gtk2 22 22 , gtk3 23 - , kerberos 23 + , libkrb5 24 24 , libcanberra 25 25 , libGL 26 26 , libGLU ··· 93 93 glibc 94 94 gtk2 95 95 gtk3 96 - kerberos 96 + libkrb5 97 97 libX11 98 98 libXScrnSaver 99 99 libXcomposite
+2 -2
pkgs/applications/networking/remote/aws-workspaces/default.nix
··· 1 1 { stdenv, lib 2 2 , makeWrapper, dpkg, fetchurl, autoPatchelfHook 3 - , curl, kerberos, lttng-ust, libpulseaudio, gtk3, openssl_1_1, icu, webkitgtk, librsvg, gdk-pixbuf, libsoup, glib-networking 3 + , curl, libkrb5, lttng-ust, libpulseaudio, gtk3, openssl_1_1, icu, webkitgtk, librsvg, gdk-pixbuf, libsoup, glib-networking 4 4 }: 5 5 6 6 stdenv.mkDerivation rec { ··· 27 27 28 28 buildInputs = [ 29 29 stdenv.cc.cc.lib 30 - kerberos 30 + libkrb5 31 31 curl 32 32 lttng-ust 33 33 libpulseaudio
+2 -2
pkgs/applications/networking/remote/x2goserver/default.nix
··· 1 1 { stdenv, lib, fetchurl, perlPackages, makeWrapper, perl, which, nx-libs 2 2 , util-linux, coreutils, glibc, gawk, gnused, gnugrep, findutils, xorg 3 - , nettools, iproute, bc, procps, psmisc, lsof, pwgen, openssh, sshfs, bash 3 + , nettools, iproute2, bc, procps, psmisc, lsof, pwgen, openssh, sshfs, bash 4 4 }: 5 5 6 6 let ··· 31 31 32 32 binaryDeps = [ 33 33 perlEnv which nx-libs util-linux coreutils glibc.bin gawk gnused gnugrep 34 - findutils nettools iproute bc procps psmisc lsof pwgen openssh sshfs 34 + findutils nettools iproute2 bc procps psmisc lsof pwgen openssh sshfs 35 35 xorg.xauth xorg.xinit xorg.xrandr xorg.xmodmap xorg.xwininfo xorg.fontutil 36 36 xorg.xkbcomp xorg.setxkbmap 37 37 ];
+1 -1
pkgs/applications/networking/sniffers/wireshark/default.nix
··· 74 74 install -Dm644 ../image/wsicon.svg $out/share/icons/wireshark.svg 75 75 mkdir $dev/include/{epan/{wmem,ftypes,dfilter},wsutil,wiretap} -pv 76 76 77 - cp config.h $dev/include/ 77 + cp config.h $dev/include/wireshark/ 78 78 cp ../ws_*.h $dev/include 79 79 cp ../epan/*.h $dev/include/epan/ 80 80 cp ../epan/wmem/*.h $dev/include/epan/wmem/
+2 -2
pkgs/applications/office/wpsoffice/default.nix
··· 23 23 , libtool 24 24 , libuuid 25 25 , libxml2 26 - , lzma 26 + , xz 27 27 , nspr 28 28 , nss 29 29 , openssl ··· 97 97 libuuid 98 98 libxcb 99 99 libxml2 100 - lzma 100 + xz 101 101 nspr 102 102 nss 103 103 openssl
+2 -2
pkgs/applications/radio/gnss-sdr/default.nix
··· 4 4 , cmake 5 5 , gmp 6 6 , glog 7 - , gmock 7 + , gtest 8 8 , openssl 9 9 , gflags 10 10 , gnuradio3_8 ··· 42 42 armadillo 43 43 gnuradio3_8.unwrapped.boost 44 44 glog 45 - gmock 45 + gtest 46 46 openssl 47 47 gflags 48 48 orc
+7 -16
pkgs/applications/radio/multimon-ng/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, qt4, qmake4Hook, libpulseaudio }: 2 - let 3 - version = "1.1.9"; 4 - in 5 - stdenv.mkDerivation { 1 + { lib, stdenv, fetchFromGitHub, cmake, libpulseaudio, libX11 }: 2 + 3 + stdenv.mkDerivation rec { 6 4 pname = "multimon-ng"; 7 - inherit version; 5 + version = "1.1.9"; 8 6 9 7 src = fetchFromGitHub { 10 8 owner = "EliasOenal"; ··· 13 11 sha256 = "01716cfhxfzsab9zjply9giaa4nn4b7rm3p3vizrwi7n253yiwm2"; 14 12 }; 15 13 16 - buildInputs = [ qt4 libpulseaudio ]; 14 + buildInputs = [ libpulseaudio libX11 ]; 17 15 18 - nativeBuildInputs = [ qmake4Hook ]; 19 - 20 - qmakeFlags = [ "multimon-ng.pro" ]; 21 - 22 - installPhase = '' 23 - mkdir -p $out/bin 24 - cp multimon-ng $out/bin 25 - ''; 16 + nativeBuildInputs = [ cmake ]; 26 17 27 18 meta = with lib; { 28 19 description = "Multimon is a digital baseband audio protocol decoder"; ··· 39 30 homepage = "https://github.com/EliasOenal/multimon-ng"; 40 31 license = licenses.gpl2Only; 41 32 platforms = platforms.linux; 42 - maintainers = [ maintainers.markuskowa ]; 33 + maintainers = with maintainers; [ markuskowa ]; 43 34 }; 44 35 }
+2 -2
pkgs/applications/science/biology/bcftools/default.nix
··· 1 - { lib, stdenv, fetchurl, htslib, zlib, bzip2, lzma, curl, perl, python3, bash }: 1 + { lib, stdenv, fetchurl, htslib, zlib, bzip2, xz, curl, perl, python3, bash }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "bcftools"; ··· 14 14 python3 15 15 ]; 16 16 17 - buildInputs = [ htslib zlib bzip2 lzma curl ]; 17 + buildInputs = [ htslib zlib bzip2 xz curl ]; 18 18 19 19 strictDeps = true; 20 20
+3 -2
pkgs/applications/science/biology/bedtools/default.nix
··· 1 - {lib, stdenv, fetchFromGitHub, zlib, python3, bzip2, lzma}: 1 + {lib, stdenv, fetchFromGitHub, zlib, python3, bzip2, xz}: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "bedtools"; ··· 17 17 python3 18 18 ]; 19 19 20 - buildInputs = [ zlib bzip2 lzma ]; 20 + buildInputs = [ zlib bzip2 xz ]; 21 + 21 22 cxx = if stdenv.cc.isClang then "clang++" else "g++"; 22 23 cc = if stdenv.cc.isClang then "clang" else "gcc"; 23 24 buildPhase = "make prefix=$out SHELL=${stdenv.shell} CXX=${cxx} CC=${cc} -j $NIX_BUILD_CORES";
+2 -2
pkgs/applications/science/biology/delly/default.nix
··· 1 - { lib, stdenv, fetchpatch, fetchFromGitHub, htslib, zlib, bzip2, lzma, ncurses, boost }: 1 + { lib, stdenv, fetchpatch, fetchFromGitHub, htslib, zlib, bzip2, xz, ncurses, boost }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "delly"; ··· 11 11 sha256 = "sha256-DWwC35r8cQbePUzppkFQlev0YZdxk2+BSrNTW/DOY3M="; 12 12 }; 13 13 14 - buildInputs = [ zlib htslib bzip2 lzma ncurses boost ]; 14 + buildInputs = [ zlib htslib bzip2 xz ncurses boost ]; 15 15 16 16 EBROOTHTSLIB = htslib; 17 17
+2 -2
pkgs/applications/science/biology/freebayes/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, zlib, bzip2, lzma }: 1 + { lib, stdenv, fetchFromGitHub, zlib, bzip2, xz }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "freebayes"; ··· 13 13 fetchSubmodules = true; 14 14 }; 15 15 16 - buildInputs = [ zlib bzip2 lzma ]; 16 + buildInputs = [ zlib bzip2 xz ]; 17 17 18 18 installPhase = '' 19 19 install -vD bin/freebayes bin/bamleftalign scripts/* -t $out/bin
+2 -2
pkgs/applications/science/biology/kent/default.nix
··· 3 3 , libuuid 4 4 , zlib 5 5 , bzip2 6 - , lzma 6 + , xz 7 7 , openssl 8 8 , curl 9 9 , libmysqlclient ··· 22 22 sha256 = "0l5lmqqc6sqkf4hyk3z4825ly0vdlj5xdfad6zd0708cb1v81nbx"; 23 23 }; 24 24 25 - buildInputs = [ libpng libuuid zlib bzip2 lzma openssl curl libmysqlclient ]; 25 + buildInputs = [ libpng libuuid zlib bzip2 xz openssl curl libmysqlclient ]; 26 26 27 27 patchPhase = '' 28 28 substituteInPlace ./src/checkUmask.sh \
+21
pkgs/applications/science/biology/meme-suite/default.nix
··· 1 + { lib, stdenv, fetchurl, python3, perl, glibc, zlib }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "meme-suite"; 5 + version = "5.1.1"; 6 + 7 + src = fetchurl { 8 + url = "https://meme-suite.org/meme-software/${version}/meme-${version}.tar.gz"; 9 + sha256 = "38d73d256d431ad4eb7da2c817ce56ff2b4e26c39387ff0d6ada088938b38eb5"; 10 + }; 11 + 12 + buildInputs = [ zlib ]; 13 + nativeBuildInputs = [ perl python3 ]; 14 + 15 + meta = with lib; { 16 + description = "Motif-based sequence analysis tools"; 17 + license = licenses.unfree; 18 + maintainers = with maintainers; [ gschwartz ]; 19 + platforms = platforms.linux; 20 + }; 21 + }
+2 -2
pkgs/applications/science/biology/octopus/default.nix
··· 1 - {lib, stdenv, fetchpatch, fetchFromGitHub, cmake, boost, gmp, htslib, zlib, lzma, pkg-config}: 1 + {lib, stdenv, fetchpatch, fetchFromGitHub, cmake, boost, gmp, htslib, zlib, xz, pkg-config}: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "octopus"; ··· 24 24 ]; 25 25 26 26 nativeBuildInputs = [ cmake pkg-config ]; 27 - buildInputs = [ boost gmp htslib zlib lzma ]; 27 + buildInputs = [ boost gmp htslib zlib xz ]; 28 28 29 29 postInstall = '' 30 30 mkdir $out/bin
+2 -2
pkgs/applications/science/biology/svaba/default.nix
··· 1 - { lib, stdenv, zlib, bzip2, lzma, fetchFromGitHub } : 1 + { lib, stdenv, zlib, bzip2, xz, fetchFromGitHub } : 2 2 3 3 stdenv.mkDerivation rec { 4 4 version = "1.1.0"; ··· 12 12 fetchSubmodules = true; 13 13 }; 14 14 15 - buildInputs = [ zlib bzip2 lzma ]; 15 + buildInputs = [ zlib bzip2 xz ]; 16 16 17 17 installPhase = '' 18 18 runHook preInstall
+2 -2
pkgs/applications/science/electronics/tkgate/1.x.nix
··· 1 - { lib, stdenv, fetchurl, tcl, tk, libX11, glibc, which, yacc, flex, imake, xorgproto, gccmakedep }: 1 + { lib, stdenv, fetchurl, tcl, tk, libX11, glibc, which, bison, flex, imake, xorgproto, gccmakedep }: 2 2 3 3 let 4 4 libiconvInc = lib.optionalString stdenv.isLinux "${glibc.dev}/include"; ··· 12 12 sha256 = "1pqywkidfpdbj18i03h97f4cimld4fb3mqfy8jjsxs12kihm18fs"; 13 13 }; 14 14 15 - nativeBuildInputs = [ which yacc flex imake gccmakedep ]; 15 + nativeBuildInputs = [ which bison flex imake gccmakedep ]; 16 16 buildInputs = [ tcl tk libX11 xorgproto ]; 17 17 dontUseImakeConfigure = true; 18 18
+2 -2
pkgs/applications/science/machine-learning/shogun/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, fetchpatch, fetchurl, cmake, ctags, swig 2 2 # data, compression 3 - , bzip2, curl, hdf5, json_c, lzma, lzo, protobuf, snappy 3 + , bzip2, curl, hdf5, json_c, xz, lzo, protobuf, snappy 4 4 # maths 5 5 , blas, lapack, eigen, nlopt, lp_solve, colpack, glpk 6 6 # libraries ··· 67 67 68 68 nativeBuildInputs = [ cmake ]; 69 69 buildInputs = with lib; [ 70 - blas lapack bzip2 colpack curl ctags eigen hdf5 json_c lp_solve lzma lzo 70 + blas lapack bzip2 colpack curl ctags eigen hdf5 json_c lp_solve xz lzo 71 71 protobuf nlopt snappy swig (libarchive.dev) libxml2 lapack glpk 72 72 ] 73 73 ++ optionals (pythonSupport) (with pythonPackages; [ python ply numpy ])
+2 -2
pkgs/applications/science/misc/root/5.nix
··· 1 1 { lib, stdenv, fetchurl, fetchpatch, cmake, pcre, pkg-config, python2 2 - , libX11, libXpm, libXft, libXext, libGLU, libGL, zlib, libxml2, lz4, lzma, gsl_1, xxHash 2 + , libX11, libXpm, libXft, libXext, libGLU, libGL, zlib, libxml2, lz4, xz, gsl_1, xxHash 3 3 , Cocoa, OpenGL, noSplash ? false }: 4 4 5 5 stdenv.mkDerivation rec { ··· 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake pkg-config ]; 15 - buildInputs = [ pcre python2 zlib libxml2 lz4 lzma gsl_1 xxHash ] 15 + buildInputs = [ pcre python2 zlib libxml2 lz4 xz gsl_1 xxHash ] 16 16 ++ lib.optionals (!stdenv.isDarwin) [ libX11 libXpm libXft libXext libGLU libGL ] 17 17 ++ lib.optionals (stdenv.isDarwin) [ Cocoa OpenGL ] 18 18 ;
+4 -4
pkgs/applications/science/misc/root/default.nix
··· 1 1 { stdenv, lib, fetchurl, makeWrapper, cmake, ftgl, gl2ps, glew, gsl, llvm_5 2 - , libX11, libXpm, libXft, libXext, libGLU, libGL, libxml2, lz4, lzma, pcre 2 + , libX11, libXpm, libXft, libXext, libGLU, libGL, libxml2, lz4, xz, pcre 3 3 , pkg-config, python, xxHash, zlib, zstd 4 4 , libAfterImage, giflib, libjpeg, libtiff, libpng 5 5 , Cocoa, OpenGL, noSplash ? false }: 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "root"; 9 - version = "6.22.06"; 9 + version = "6.22.08"; 10 10 11 11 src = fetchurl { 12 12 url = "https://root.cern.ch/download/root_v${version}.source.tar.gz"; 13 - sha256 = "0mqvj42nax0bmz8h83jjlwjm3xxjy1n0n10inc8csip9ly28fs64"; 13 + sha256 = "0vrgi83hrw4n9zgx873fn4ba3vk54slrwk1cl4cc4plgxzv1y1kg"; 14 14 }; 15 15 16 16 nativeBuildInputs = [ makeWrapper cmake pkg-config ]; 17 - buildInputs = [ ftgl gl2ps glew pcre zlib zstd llvm_5 libxml2 lz4 lzma gsl xxHash libAfterImage giflib libjpeg libtiff libpng python.pkgs.numpy ] 17 + buildInputs = [ ftgl gl2ps glew pcre zlib zstd llvm_5 libxml2 lz4 xz gsl xxHash libAfterImage giflib libjpeg libtiff libpng python.pkgs.numpy ] 18 18 ++ lib.optionals (!stdenv.isDarwin) [ libX11 libXpm libXft libXext libGLU libGL ] 19 19 ++ lib.optionals (stdenv.isDarwin) [ Cocoa OpenGL ] 20 20 ;
-2
pkgs/applications/search/recoll/default.nix
··· 33 33 , withGui ? true 34 34 }: 35 35 36 - assert stdenv.hostPlatform.system != "powerpc-linux"; 37 - 38 36 mkDerivation rec { 39 37 pname = "recoll"; 40 38 version = "1.28.6";
+2 -2
pkgs/applications/version-management/monotone-viz/default.nix
··· 1 1 { lib, stdenv, fetchurl, ocamlPackages, gnome2, pkg-config, makeWrapper, glib 2 - , libtool, libpng, yacc, expat, fontconfig, gd, pango, libjpeg, libwebp, xlibsWrapper, libXaw 2 + , libtool, libpng, bison, expat, fontconfig, gd, pango, libjpeg, libwebp, xlibsWrapper, libXaw 3 3 }: 4 4 # We need an old version of Graphviz for format compatibility reasons. 5 5 # This version is vulnerable, but monotone-viz will never feed it bad input. 6 6 let graphviz_2_0 = import ./graphviz-2.0.nix { 7 7 inherit lib stdenv fetchurl pkg-config xlibsWrapper libpng libjpeg expat libXaw 8 - yacc libtool fontconfig pango gd libwebp; 8 + bison libtool fontconfig pango gd libwebp; 9 9 }; in 10 10 let inherit (gnome2) libgnomecanvas; in 11 11 let inherit (ocamlPackages) ocaml lablgtk camlp4; in
+2 -2
pkgs/applications/version-management/monotone-viz/graphviz-2.0.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, xlibsWrapper, libpng, libjpeg, expat, libXaw 2 - , yacc, libtool, fontconfig, pango, gd, libwebp 2 + , bison, libtool, fontconfig, pango, gd, libwebp 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { ··· 12 12 13 13 nativeBuildInputs = [ pkg-config ]; 14 14 buildInputs = [ 15 - xlibsWrapper libpng libjpeg expat libXaw yacc 15 + xlibsWrapper libpng libjpeg expat libXaw bison 16 16 libtool fontconfig pango gd libwebp 17 17 ]; 18 18
+2 -2
pkgs/applications/video/handbrake/default.nix
··· 9 9 10 10 { stdenv, lib, fetchFromGitHub, 11 11 # Main build tools 12 - pkg-config, autoconf, automake, libtool, m4, lzma, python3, 12 + pkg-config, autoconf, automake, libtool, m4, xz, python3, 13 13 numactl, 14 14 # Processing, video codecs, containers 15 15 ffmpeg-full, nv-codec-headers, libogg, x264, x265, libvpx, libtheora, dav1d, ··· 100 100 ffmpeg-full libogg libtheora x264 x265 libvpx dav1d 101 101 libopus lame libvorbis a52dec speex libsamplerate 102 102 libiconv fribidi fontconfig freetype libass jansson libxml2 harfbuzz 103 - libdvdread libdvdnav libdvdcss libbluray lzma 103 + libdvdread libdvdnav libdvdcss libbluray xz 104 104 ] ++ lib.optional (!stdenv.isDarwin) numactl 105 105 ++ lib.optionals useGtk [ 106 106 glib gtk3 libappindicator-gtk3 libnotify
+2 -2
pkgs/applications/video/kodi-packages/vfs-libarchive/default.nix
··· 1 - { lib, rel, buildKodiBinaryAddon, fetchFromGitHub, libarchive, lzma, bzip2, zlib, lz4, lzo, openssl }: 1 + { lib, rel, buildKodiBinaryAddon, fetchFromGitHub, libarchive, xz, bzip2, zlib, lz4, lzo, openssl }: 2 2 buildKodiBinaryAddon rec { 3 3 pname = namespace; 4 4 namespace = "vfs.libarchive"; ··· 11 11 sha256 = "1q62p1i6rvqk2zv6f1cpffkh95lgclys2xl4dwyhj3acmqdxd9i5"; 12 12 }; 13 13 14 - extraBuildInputs = [ libarchive lzma bzip2 zlib lz4 lzo openssl ]; 14 + extraBuildInputs = [ libarchive xz bzip2 zlib lz4 lzo openssl ]; 15 15 16 16 meta = with lib; { 17 17 description = "LibArchive Virtual Filesystem add-on for Kodi";
+560
pkgs/applications/video/kodi/packages.nix
··· 1 + { lib, stdenv, callPackage, fetchFromGitHub 2 + , cmake, kodi, libcec_platform, tinyxml, pugixml 3 + , steam, udev, libusb1, jsoncpp, libhdhomerun, zlib 4 + , python3Packages, expat, glib, nspr, nss, openssl 5 + , libssh, libarchive, xz, bzip2, lz4, lzo }: 6 + 7 + with lib; 8 + 9 + let self = rec { 10 + 11 + addonDir = "/share/kodi/addons"; 12 + rel = "Matrix"; 13 + 14 + inherit kodi; 15 + 16 + # Convert derivation to a kodi module. Stolen from ../../../top-level/python-packages.nix 17 + toKodiAddon = drv: drv.overrideAttrs(oldAttrs: { 18 + # Use passthru in order to prevent rebuilds when possible. 19 + passthru = (oldAttrs.passthru or {})// { 20 + kodiAddonFor = kodi; 21 + requiredKodiAddons = requiredKodiAddons drv.propagatedBuildInputs; 22 + }; 23 + }); 24 + 25 + # Check whether a derivation provides a Kodi addon. 26 + hasKodiAddon = drv: drv ? kodiAddonFor && drv.kodiAddonFor == kodi; 27 + 28 + # Get list of required Kodi addons given a list of derivations. 29 + requiredKodiAddons = drvs: let 30 + modules = filter hasKodiAddon drvs; 31 + in unique (modules ++ concatLists (catAttrs "requiredKodiAddons" modules)); 32 + 33 + kodi-platform = stdenv.mkDerivation rec { 34 + project = "kodi-platform"; 35 + version = "17.1"; 36 + name = "${project}-${version}"; 37 + 38 + src = fetchFromGitHub { 39 + owner = "xbmc"; 40 + repo = project; 41 + rev = "c8188d82678fec6b784597db69a68e74ff4986b5"; 42 + sha256 = "1r3gs3c6zczmm66qcxh9mr306clwb3p7ykzb70r3jv5jqggiz199"; 43 + }; 44 + 45 + nativeBuildInputs = [ cmake ]; 46 + buildInputs = [ kodi libcec_platform tinyxml ]; 47 + }; 48 + 49 + buildKodiAddon = 50 + { name ? "${attrs.pname}-${attrs.version}" 51 + , namespace 52 + , sourceDir ? "" 53 + , ... } @ attrs: 54 + toKodiAddon (stdenv.mkDerivation ({ 55 + name = "kodi-" + name; 56 + 57 + dontStrip = true; 58 + 59 + extraRuntimeDependencies = [ ]; 60 + 61 + installPhase = '' 62 + cd $src/$sourceDir 63 + d=$out${addonDir}/${namespace} 64 + mkdir -p $d 65 + sauce="." 66 + [ -d ${namespace} ] && sauce=${namespace} 67 + cp -R "$sauce/"* $d 68 + ''; 69 + } // attrs)); 70 + 71 + buildKodiBinaryAddon = 72 + { name ? "${attrs.pname}-${attrs.version}" 73 + , namespace 74 + , version 75 + , extraBuildInputs ? [] 76 + , extraRuntimeDependencies ? [] 77 + , extraInstallPhase ? "", ... } @ attrs: 78 + toKodiAddon (stdenv.mkDerivation ({ 79 + name = "kodi-" + name; 80 + 81 + dontStrip = true; 82 + 83 + nativeBuildInputs = [ cmake ]; 84 + buildInputs = [ kodi kodi-platform libcec_platform ] ++ extraBuildInputs; 85 + 86 + inherit extraRuntimeDependencies; 87 + 88 + # disables check ensuring install prefix is that of kodi 89 + cmakeFlags = [ 90 + "-DOVERRIDE_PATHS=1" 91 + ]; 92 + 93 + # kodi checks for addon .so libs existance in the addon folder (share/...) 94 + # and the non-wrapped kodi lib/... folder before even trying to dlopen 95 + # them. Symlinking .so, as setting LD_LIBRARY_PATH is of no use 96 + installPhase = let n = namespace; in '' 97 + make install 98 + ln -s $out/lib/addons/${n}/${n}.so.${version} $out${addonDir}/${n}/${n}.so.${version} 99 + ${extraInstallPhase} 100 + ''; 101 + } // attrs)); 102 + 103 + advanced-launcher = buildKodiAddon rec { 104 + 105 + pname = "advanced-launcher"; 106 + namespace = "plugin.program.advanced.launcher"; 107 + version = "2.5.8"; 108 + 109 + src = fetchFromGitHub { 110 + owner = "edwtjo"; 111 + repo = pname; 112 + rev = version; 113 + sha256 = "142vvgs37asq5m54xqhjzqvgmb0xlirvm0kz6lxaqynp0vvgrkx2"; 114 + }; 115 + 116 + meta = { 117 + homepage = "https://forum.kodi.tv/showthread.php?tid=85724"; 118 + description = "A program launcher for Kodi"; 119 + longDescription = '' 120 + Advanced Launcher allows you to start any Linux, Windows and 121 + macOS external applications (with command line support or not) 122 + directly from the Kodi GUI. Advanced Launcher also give you 123 + the possibility to edit, download (from Internet resources) 124 + and manage all the meta-data (informations and images) related 125 + to these applications. 126 + ''; 127 + platforms = platforms.all; 128 + maintainers = with maintainers; [ edwtjo ]; 129 + broken = true; # requires port to python3 130 + }; 131 + 132 + }; 133 + 134 + advanced-emulator-launcher = buildKodiAddon rec { 135 + 136 + pname = "advanced-emulator-launcher"; 137 + namespace = "plugin.program.advanced.emulator.launcher"; 138 + version = "0.9.6"; 139 + 140 + src = fetchFromGitHub { 141 + owner = "Wintermute0110"; 142 + repo = namespace; 143 + rev = version; 144 + sha256 = "1sv9z77jj6bam6llcnd9b3dgkbvhwad2m1v541rv3acrackms2z2"; 145 + }; 146 + 147 + meta = { 148 + homepage = "https://forum.kodi.tv/showthread.php?tid=287826"; 149 + description = "A program launcher for Kodi"; 150 + longDescription = '' 151 + Advanced Emulator Launcher is a multi-emulator front-end for Kodi 152 + scalable to collections of thousands of ROMs. Includes offline scrapers 153 + for MAME and No-Intro ROM sets and also supports scrapping ROM metadata 154 + and artwork online. ROM auditing for No-Intro ROMs using No-Intro XML 155 + DATs. Launching of games and standalone applications is also available. 156 + ''; 157 + platforms = platforms.all; 158 + maintainers = with maintainers; [ edwtjo ]; 159 + broken = true; # requires port to python3 160 + }; 161 + 162 + }; 163 + 164 + controllers = let 165 + pname = "game-controller"; 166 + version = "1.0.3"; 167 + 168 + src = fetchFromGitHub { 169 + owner = "kodi-game"; 170 + repo = "kodi-game-controllers"; 171 + rev = "01acb5b6e8b85392b3cb298b034aadb1b24ccf18"; 172 + sha256 = "0sbc0w0fwbp7rbmbgb6a1kglhnn5g85hijcbbvf5x6jdq9v3f1qb"; 173 + }; 174 + 175 + meta = { 176 + description = "Add support for different gaming controllers."; 177 + platforms = platforms.all; 178 + maintainers = with maintainers; [ edwtjo ]; 179 + }; 180 + 181 + mkController = controller: { 182 + ${controller} = buildKodiAddon rec { 183 + pname = pname + "-" + controller; 184 + namespace = "game.controller." + controller; 185 + sourceDir = "addons/" + namespace; 186 + inherit version src meta; 187 + }; 188 + }; 189 + in (mkController "default") 190 + // (mkController "dreamcast") 191 + // (mkController "gba") 192 + // (mkController "genesis") 193 + // (mkController "mouse") 194 + // (mkController "n64") 195 + // (mkController "nes") 196 + // (mkController "ps") 197 + // (mkController "snes"); 198 + 199 + hyper-launcher = let 200 + pname = "hyper-launcher"; 201 + version = "1.5.2"; 202 + src = fetchFromGitHub rec { 203 + name = pname + "-" + version + ".tar.gz"; 204 + owner = "teeedubb"; 205 + repo = owner + "-xbmc-repo"; 206 + rev = "f958ba93fe85b9c9025b1745d89c2db2e7dd9bf6"; 207 + sha256 = "1dvff24fbas25k5kvca4ssks9l1g5rfa3hl8lqxczkaqi3pp41j5"; 208 + }; 209 + meta = { 210 + homepage = "https://forum.kodi.tv/showthread.php?tid=258159"; 211 + description = "A ROM launcher for Kodi that uses HyperSpin assets."; 212 + maintainers = with maintainers; [ edwtjo ]; 213 + broken = true; # requires port to python3 214 + }; 215 + in { 216 + service = buildKodiAddon { 217 + pname = pname + "-service"; 218 + version = "1.2.1"; 219 + namespace = "service.hyper.launcher"; 220 + inherit src meta; 221 + }; 222 + plugin = buildKodiAddon { 223 + namespace = "plugin.hyper.launcher"; 224 + inherit pname version src meta; 225 + }; 226 + }; 227 + 228 + joystick = buildKodiBinaryAddon rec { 229 + pname = namespace; 230 + namespace = "peripheral.joystick"; 231 + version = "1.7.1"; 232 + 233 + src = fetchFromGitHub { 234 + owner = "xbmc"; 235 + repo = namespace; 236 + rev = "${version}-${rel}"; 237 + sha256 = "1dhj4afr9kj938xx70fq5r409mz6lbw4n581ljvdjj9lq7akc914"; 238 + }; 239 + 240 + meta = { 241 + description = "Binary addon for raw joystick input."; 242 + platforms = platforms.all; 243 + maintainers = with maintainers; [ edwtjo ]; 244 + }; 245 + 246 + extraBuildInputs = [ tinyxml udev ]; 247 + }; 248 + 249 + simpleplugin = buildKodiAddon rec { 250 + pname = "simpleplugin"; 251 + namespace = "script.module.simpleplugin"; 252 + version = "2.3.2"; 253 + 254 + src = fetchFromGitHub { 255 + owner = "romanvm"; 256 + repo = namespace; 257 + rev = "v.${version}"; 258 + sha256 = "0myar8dqjigb75pcc8zx3i5z79p1ifgphgb82s5syqywk0zaxm3j"; 259 + }; 260 + 261 + meta = { 262 + homepage = src.meta.homepage; 263 + description = "Simpleplugin API"; 264 + license = licenses.gpl3; 265 + broken = true; # requires port to python3 266 + }; 267 + }; 268 + 269 + svtplay = buildKodiAddon rec { 270 + 271 + pname = "svtplay"; 272 + namespace = "plugin.video.svtplay"; 273 + version = "5.1.12"; 274 + 275 + src = fetchFromGitHub { 276 + name = pname + "-" + version + ".tar.gz"; 277 + owner = "nilzen"; 278 + repo = "xbmc-" + pname; 279 + rev = "v${version}"; 280 + sha256 = "04j1nhm7mh9chs995lz6bv1vsq5xzk7a7c0lmk4bnfv8jrfpj0w6"; 281 + }; 282 + 283 + meta = { 284 + homepage = "https://forum.kodi.tv/showthread.php?tid=67110"; 285 + description = "Watch content from SVT Play"; 286 + longDescription = '' 287 + With this addon you can stream content from SVT Play 288 + (svtplay.se). The plugin fetches the video URL from the SVT 289 + Play website and feeds it to the Kodi video player. HLS (m3u8) 290 + is the preferred video format by the plugin. 291 + ''; 292 + platforms = platforms.all; 293 + maintainers = with maintainers; [ edwtjo ]; 294 + }; 295 + 296 + }; 297 + 298 + steam-controller = buildKodiBinaryAddon rec { 299 + pname = namespace; 300 + namespace = "peripheral.steamcontroller"; 301 + version = "0.11.0"; 302 + 303 + src = fetchFromGitHub { 304 + owner = "kodi-game"; 305 + repo = namespace; 306 + rev = "f68140ca44f163a03d3a625d1f2005a6edef96cb"; 307 + sha256 = "09lm8i119xlsxxk0c64rnp8iw0crr90v7m8iwi9r31qdmxrdxpmg"; 308 + }; 309 + 310 + extraBuildInputs = [ libusb1 ]; 311 + 312 + meta = { 313 + description = "Binary addon for steam controller."; 314 + platforms = platforms.all; 315 + maintainers = with maintainers; [ edwtjo ]; 316 + }; 317 + 318 + }; 319 + 320 + steam-launcher = buildKodiAddon { 321 + 322 + pname = "steam-launcher"; 323 + namespace = "script.steam.launcher"; 324 + version = "3.5.1"; 325 + 326 + src = fetchFromGitHub rec { 327 + owner = "teeedubb"; 328 + repo = owner + "-xbmc-repo"; 329 + rev = "8260bf9b464846a1f1965da495d2f2b7ceb81d55"; 330 + sha256 = "1fj3ry5s44nf1jzxk4bmnpa4b9p23nrpmpj2a4i6xf94h7jl7p5k"; 331 + }; 332 + 333 + propagatedBuildInputs = [ steam ]; 334 + 335 + meta = { 336 + homepage = "https://forum.kodi.tv/showthread.php?tid=157499"; 337 + description = "Launch Steam in Big Picture Mode from Kodi"; 338 + longDescription = '' 339 + This add-on will close/minimise Kodi, launch Steam in Big 340 + Picture Mode and when Steam BPM is exited (either by quitting 341 + Steam or returning to the desktop) Kodi will 342 + restart/maximise. Running pre/post Steam scripts can be 343 + configured via the addon. 344 + ''; 345 + maintainers = with maintainers; [ edwtjo ]; 346 + }; 347 + }; 348 + 349 + pdfreader = buildKodiAddon rec { 350 + pname = "pdfreader"; 351 + namespace = "plugin.image.pdf"; 352 + version = "2.0.2"; 353 + 354 + src = fetchFromGitHub { 355 + owner = "i96751414"; 356 + repo = "plugin.image.pdfreader"; 357 + rev = "v${version}"; 358 + sha256 = "0nkqhlm1gyagq6xpdgqvd5qxyr2ngpml9smdmzfabc8b972mwjml"; 359 + }; 360 + 361 + meta = { 362 + homepage = "https://forum.kodi.tv/showthread.php?tid=187421"; 363 + description = "A comic book reader"; 364 + maintainers = with maintainers; [ edwtjo ]; 365 + }; 366 + }; 367 + 368 + pvr-hts = buildKodiBinaryAddon rec { 369 + 370 + pname = "pvr-hts"; 371 + namespace = "pvr.hts"; 372 + version = "8.2.2"; 373 + 374 + src = fetchFromGitHub { 375 + owner = "kodi-pvr"; 376 + repo = "pvr.hts"; 377 + rev = "${version}-${rel}"; 378 + sha256 = "0jnn9gfjl556acqjf92wzzn371gxymhbbi665nqgg2gjcan0a49q"; 379 + }; 380 + 381 + meta = { 382 + homepage = "https://github.com/kodi-pvr/pvr.hts"; 383 + description = "Kodi's Tvheadend HTSP client addon"; 384 + platforms = platforms.all; 385 + maintainers = with maintainers; [ cpages ]; 386 + }; 387 + 388 + }; 389 + 390 + pvr-hdhomerun = buildKodiBinaryAddon rec { 391 + 392 + pname = "pvr-hdhomerun"; 393 + namespace = "pvr.hdhomerun"; 394 + version = "7.1.0"; 395 + 396 + src = fetchFromGitHub { 397 + owner = "kodi-pvr"; 398 + repo = "pvr.hdhomerun"; 399 + rev = "${version}-${rel}"; 400 + sha256 = "0gbwjssnd319csq2kwlyjj1rskg19m1dxac5dl2dymvx5hn3zrgm"; 401 + }; 402 + 403 + meta = { 404 + homepage = "https://github.com/kodi-pvr/pvr.hdhomerun"; 405 + description = "Kodi's HDHomeRun PVR client addon"; 406 + platforms = platforms.all; 407 + maintainers = with maintainers; [ titanous ]; 408 + }; 409 + 410 + extraBuildInputs = [ jsoncpp libhdhomerun ]; 411 + 412 + }; 413 + 414 + pvr-iptvsimple = buildKodiBinaryAddon rec { 415 + 416 + pname = "pvr-iptvsimple"; 417 + namespace = "pvr.iptvsimple"; 418 + version = "7.4.2"; 419 + 420 + src = fetchFromGitHub { 421 + owner = "kodi-pvr"; 422 + repo = "pvr.iptvsimple"; 423 + rev = "${version}-${rel}"; 424 + sha256 = "062i922qi0izkvn7v47yhyy2cf3fa7xc3k95b1gm9abfdwkk8ywr"; 425 + }; 426 + 427 + meta = { 428 + homepage = "https://github.com/kodi-pvr/pvr.iptvsimple"; 429 + description = "Kodi's IPTV Simple client addon"; 430 + platforms = platforms.all; 431 + maintainers = with maintainers; [ ]; 432 + license = licenses.gpl2Plus; 433 + }; 434 + 435 + extraBuildInputs = [ zlib pugixml ]; 436 + }; 437 + 438 + osmc-skin = buildKodiAddon rec { 439 + 440 + pname = "osmc-skin"; 441 + namespace = "skin.osmc"; 442 + version = "18.0.0"; 443 + 444 + src = fetchFromGitHub { 445 + owner = "osmc"; 446 + repo = namespace; 447 + rev = "40a6c318641e2cbeac58fb0e7dde9c2beac737a0"; 448 + sha256 = "1l7hyfj5zvjxjdm94y325bmy1naak455b9l8952sb0gllzrcwj6s"; 449 + }; 450 + 451 + meta = { 452 + homepage = "https://github.com/osmc/skin.osmc"; 453 + description = "The default skin for OSMC"; 454 + platforms = platforms.all; 455 + maintainers = with maintainers; [ worldofpeace ]; 456 + license = licenses.cc-by-nc-sa-30; 457 + }; 458 + }; 459 + 460 + yatp = python3Packages.toPythonModule (buildKodiAddon rec { 461 + pname = "yatp"; 462 + namespace = "plugin.video.yatp"; 463 + version = "3.3.2"; 464 + 465 + src = fetchFromGitHub { 466 + owner = "romanvm"; 467 + repo = "kodi.yatp"; 468 + rev = "v.${version}"; 469 + sha256 = "12g1f57sx7dy6wy7ljl7siz2qs1kxcmijcg7xx2xpvmq61x9qa2d"; 470 + }; 471 + 472 + patches = [ ./yatp/dont-monkey.patch ]; 473 + 474 + propagatedBuildInputs = [ 475 + simpleplugin 476 + python3Packages.requests 477 + python3Packages.libtorrent-rasterbar 478 + ]; 479 + 480 + meta = { 481 + homepage = src.meta.homepage; 482 + description = "Yet Another Torrent Player: libtorrent-based torrent streaming for Kodi"; 483 + license = licenses.gpl3; 484 + broken = true; # requires port to python3 485 + }; 486 + }); 487 + 488 + inputstream-adaptive = buildKodiBinaryAddon rec { 489 + 490 + pname = "inputstream-adaptive"; 491 + namespace = "inputstream.adaptive"; 492 + version = "2.6.7"; 493 + 494 + src = fetchFromGitHub { 495 + owner = "peak3d"; 496 + repo = "inputstream.adaptive"; 497 + rev = "${version}-${rel}"; 498 + sha256 = "1pwqmbr78wp12jn6rwv63npdfc456adwz0amlxf6gvgg43li6p7s"; 499 + }; 500 + 501 + extraBuildInputs = [ expat ]; 502 + 503 + extraRuntimeDependencies = [ glib nspr nss stdenv.cc.cc.lib ]; 504 + 505 + extraInstallPhase = let n = namespace; in '' 506 + ln -s $out/lib/addons/${n}/libssd_wv.so $out/${addonDir}/${n}/libssd_wv.so 507 + ''; 508 + 509 + meta = { 510 + homepage = "https://github.com/peak3d/inputstream.adaptive"; 511 + description = "Kodi inputstream addon for several manifest types"; 512 + platforms = platforms.all; 513 + maintainers = with maintainers; [ sephalon ]; 514 + }; 515 + }; 516 + 517 + vfs-sftp = buildKodiBinaryAddon rec { 518 + pname = namespace; 519 + namespace = "vfs.sftp"; 520 + version = "2.0.0"; 521 + 522 + src = fetchFromGitHub { 523 + owner = "xbmc"; 524 + repo = namespace; 525 + rev = "${version}-${rel}"; 526 + sha256 = "06w74sh8yagrrp7a7rjaz3xrh1j3wdqald9c4b72c33gpk5997dk"; 527 + }; 528 + 529 + meta = with lib; { 530 + description = "SFTP Virtual Filesystem add-on for Kodi"; 531 + license = licenses.gpl2Plus; 532 + platforms = platforms.all; 533 + maintainers = with maintainers; [ minijackson ]; 534 + }; 535 + 536 + extraBuildInputs = [ openssl libssh zlib ]; 537 + }; 538 + 539 + vfs-libarchive = buildKodiBinaryAddon rec { 540 + pname = namespace; 541 + namespace = "vfs.libarchive"; 542 + version = "2.0.0"; 543 + 544 + src = fetchFromGitHub { 545 + owner = "xbmc"; 546 + repo = namespace; 547 + rev = "${version}-${rel}"; 548 + sha256 = "1q62p1i6rvqk2zv6f1cpffkh95lgclys2xl4dwyhj3acmqdxd9i5"; 549 + }; 550 + 551 + meta = with lib; { 552 + description = "LibArchive Virtual Filesystem add-on for Kodi"; 553 + license = licenses.gpl2Plus; 554 + platforms = platforms.all; 555 + maintainers = with maintainers; [ minijackson ]; 556 + }; 557 + 558 + extraBuildInputs = [ libarchive xz bzip2 zlib lz4 lzo openssl ]; 559 + }; 560 + }; in self
+2 -2
pkgs/applications/video/mpv/default.nix
··· 95 95 96 96 in stdenv.mkDerivation rec { 97 97 pname = "mpv"; 98 - version = "0.33.0"; 98 + version = "0.33.1"; 99 99 100 100 src = fetchFromGitHub { 101 101 owner = "mpv-player"; 102 102 repo = "mpv"; 103 103 rev = "v${version}"; 104 - sha256 = "sha256-3l32qQBpvWVjbLp5CZtO039oDQeH7C/cNAKtJxrzlRk="; 104 + sha256 = "06rw1f55zcsj78ql8w70j9ljp2qb1pv594xj7q9cmq7i92a7hq45"; 105 105 }; 106 106 107 107 patches = [
+3 -11
pkgs/applications/virtualization/crun/default.nix
··· 12 12 , nixosTests 13 13 , criu 14 14 , system 15 - , fetchpatch 16 15 }: 17 16 18 17 let ··· 29 28 "test_pid_file.py" 30 29 "test_preserve_fds.py" 31 30 "test_resources" 31 + "test_seccomp" 32 32 "test_start.py" 33 33 "test_uid_gid.py" 34 34 "test_update.py" ··· 38 38 in 39 39 stdenv.mkDerivation rec { 40 40 pname = "crun"; 41 - version = "0.18"; 41 + version = "0.19"; 42 42 43 43 src = fetchFromGitHub { 44 44 owner = "containers"; 45 45 repo = pname; 46 46 rev = version; 47 - sha256 = "sha256-VjMpfj2qUQdhqdnLpZsYigfo2sM7gNl0GrE4nitp13g="; 47 + sha256 = "sha256-G9asWedX03cP5Qg5HIzlSIwwqNL16kiyWairk+6Kabw="; 48 48 fetchSubmodules = true; 49 49 }; 50 - 51 - patches = [ 52 - # For 0.18 some tests switched to static builds, this was reverted after 0.18 was released 53 - (fetchpatch { 54 - url = "https://github.com/containers/crun/commit/d26579bfe56aa36dd522745d47a661ce8c70d4e7.patch"; 55 - sha256 = "1xmc0wj0j2xcg0915vxn0pplc4s94rpmw0s5g8cyf8dshfl283f9"; 56 - }) 57 - ]; 58 50 59 51 nativeBuildInputs = [ autoreconfHook go-md2man pkg-config python3 ]; 60 52
+2 -2
pkgs/applications/virtualization/docker/default.nix
··· 13 13 , stdenv, fetchFromGitHub, fetchpatch, buildGoPackage 14 14 , makeWrapper, installShellFiles, pkg-config 15 15 , go-md2man, go, containerd, runc, docker-proxy, tini, libtool 16 - , sqlite, iproute, lvm2, systemd, docker-buildx 16 + , sqlite, iproute2, lvm2, systemd, docker-buildx 17 17 , btrfs-progs, iptables, e2fsprogs, xz, util-linux, xfsprogs, git 18 18 , procps, libseccomp 19 19 , nixosTests ··· 72 72 nativeBuildInputs = [ makeWrapper pkg-config go-md2man go libtool installShellFiles ]; 73 73 buildInputs = [ sqlite lvm2 btrfs-progs systemd libseccomp ]; 74 74 75 - extraPath = optionals (stdenv.isLinux) (makeBinPath [ iproute iptables e2fsprogs xz xfsprogs procps util-linux git ]); 75 + extraPath = optionals (stdenv.isLinux) (makeBinPath [ iproute2 iptables e2fsprogs xz xfsprogs procps util-linux git ]); 76 76 77 77 buildPhase = '' 78 78 export GOCACHE="$TMPDIR/go-cache"
+2 -2
pkgs/applications/virtualization/gvisor/default.nix
··· 5 5 , git 6 6 , glibcLocales 7 7 , go 8 - , iproute 8 + , iproute2 9 9 , iptables 10 10 , makeWrapper 11 11 , procps ··· 87 87 88 88 # Needed for the 'runsc do' subcomand 89 89 wrapProgram $out/bin/runsc \ 90 - --prefix PATH : ${lib.makeBinPath [ iproute iptables procps ]} 90 + --prefix PATH : ${lib.makeBinPath [ iproute2 iptables procps ]} 91 91 ''; 92 92 }; 93 93
+2 -2
pkgs/applications/virtualization/open-vm-tools/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, makeWrapper, autoreconfHook, 2 2 fuse, libmspack, openssl, pam, xercesc, icu, libdnet, procps, libtirpc, rpcsvc-proto, 3 3 libX11, libXext, libXinerama, libXi, libXrender, libXrandr, libXtst, 4 - pkg-config, glib, gdk-pixbuf-xlib, gtk3, gtkmm3, iproute, dbus, systemd, which, 4 + pkg-config, glib, gdk-pixbuf-xlib, gtk3, gtkmm3, iproute2, dbus, systemd, which, 5 5 withX ? true }: 6 6 7 7 stdenv.mkDerivation rec { ··· 59 59 60 60 postInstall = '' 61 61 wrapProgram "$out/etc/vmware-tools/scripts/vmware/network" \ 62 - --prefix PATH ':' "${lib.makeBinPath [ iproute dbus systemd which ]}" 62 + --prefix PATH ':' "${lib.makeBinPath [ iproute2 dbus systemd which ]}" 63 63 ''; 64 64 65 65 meta = with lib; {
+2 -2
pkgs/applications/virtualization/x11docker/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, makeWrapper, nx-libs, xorg, getopt, gnugrep, gawk, ps, mount, iproute }: 1 + { lib, stdenv, fetchFromGitHub, makeWrapper, nx-libs, xorg, getopt, gnugrep, gawk, ps, mount, iproute2 }: 2 2 stdenv.mkDerivation rec { 3 3 pname = "x11docker"; 4 4 version = "6.6.2"; ··· 16 16 installPhase = '' 17 17 install -D x11docker "$out/bin/x11docker"; 18 18 wrapProgram "$out/bin/x11docker" \ 19 - --prefix PATH : "${lib.makeBinPath [ getopt gnugrep gawk ps mount iproute nx-libs xorg.xdpyinfo xorg.xhost xorg.xinit ]}" 19 + --prefix PATH : "${lib.makeBinPath [ getopt gnugrep gawk ps mount iproute2 nx-libs xorg.xdpyinfo xorg.xhost xorg.xinit ]}" 20 20 ''; 21 21 22 22 meta = {
+2 -2
pkgs/applications/virtualization/xen/generic.nix
··· 13 13 14 14 # Scripts 15 15 , coreutils, gawk, gnused, gnugrep, diffutils, multipath-tools 16 - , iproute, inetutils, iptables, bridge-utils, openvswitch, nbd, drbd 16 + , iproute2, inetutils, iptables, bridge-utils, openvswitch, nbd, drbd 17 17 , lvm2, util-linux, procps, systemd 18 18 19 19 # Documentation ··· 31 31 scriptEnvPath = concatMapStringsSep ":" (x: "${x}/bin") [ 32 32 which perl 33 33 coreutils gawk gnused gnugrep diffutils util-linux multipath-tools 34 - iproute inetutils iptables bridge-utils openvswitch nbd drbd 34 + iproute2 inetutils iptables bridge-utils openvswitch nbd drbd 35 35 ]; 36 36 37 37 withXenfiles = f: concatStringsSep "\n" (mapAttrsToList f config.xenfiles);
+2 -2
pkgs/applications/window-managers/cwm/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, libX11, libXinerama, libXrandr, libXft, yacc, pkg-config }: 1 + { lib, stdenv, fetchFromGitHub, libX11, libXinerama, libXrandr, libXft, bison, pkg-config }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 ··· 13 13 }; 14 14 15 15 nativeBuildInputs = [ pkg-config ]; 16 - buildInputs = [ libX11 libXinerama libXrandr libXft yacc ]; 16 + buildInputs = [ libX11 libXinerama libXrandr libXft bison ]; 17 17 18 18 prePatch = ''sed -i "s@/usr/local@$out@" Makefile''; 19 19
+2 -2
pkgs/applications/window-managers/dwm/dwm-status.nix
··· 1 1 { lib, rustPlatform, fetchFromGitHub, dbus, gdk-pixbuf, libnotify, makeWrapper, pkg-config, xorg 2 2 , enableAlsaUtils ? true, alsaUtils, coreutils 3 - , enableNetwork ? true, dnsutils, iproute, wirelesstools }: 3 + , enableNetwork ? true, dnsutils, iproute2, wirelesstools }: 4 4 5 5 let 6 6 bins = lib.optionals enableAlsaUtils [ alsaUtils coreutils ] 7 - ++ lib.optionals enableNetwork [ dnsutils iproute wirelesstools ]; 7 + ++ lib.optionals enableNetwork [ dnsutils iproute2 wirelesstools ]; 8 8 in 9 9 10 10 rustPlatform.buildRustPackage rec {
+3 -3
pkgs/applications/window-managers/i3/blocks-gaps.nix
··· 1 1 { fetchFromGitHub, lib, stdenv, perl, makeWrapper 2 - , iproute, acpi, sysstat, alsaUtils 2 + , iproute2, acpi, sysstat, alsaUtils 3 3 , scripts ? [ "bandwidth" "battery" "cpu_usage" "disk" "iface" 4 4 "load_average" "memory" "volume" "wifi" ] 5 5 }: ··· 30 30 31 31 postFixup = '' 32 32 wrapProgram $out/libexec/i3blocks/bandwidth \ 33 - --prefix PATH : ${makeBinPath (optional (elem "bandwidth" scripts) iproute)} 33 + --prefix PATH : ${makeBinPath (optional (elem "bandwidth" scripts) iproute2)} 34 34 wrapProgram $out/libexec/i3blocks/battery \ 35 35 --prefix PATH : ${makeBinPath (optional (elem "battery" scripts) acpi)} 36 36 wrapProgram $out/libexec/i3blocks/cpu_usage \ 37 37 --prefix PATH : ${makeBinPath (optional (elem "cpu_usage" scripts) sysstat)} 38 38 wrapProgram $out/libexec/i3blocks/iface \ 39 - --prefix PATH : ${makeBinPath (optional (elem "iface" scripts) iproute)} 39 + --prefix PATH : ${makeBinPath (optional (elem "iface" scripts) iproute2)} 40 40 wrapProgram $out/libexec/i3blocks/volume \ 41 41 --prefix PATH : ${makeBinPath (optional (elem "volume" scripts) alsaUtils)} 42 42 '';
+33
pkgs/applications/window-managers/i3/wsr.nix
··· 1 + { lib, fetchFromGitHub, rustPlatform, libxcb, python3 }: 2 + 3 + rustPlatform.buildRustPackage rec { 4 + pname = "i3wsr"; 5 + version = "1.3.1"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "roosta"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "1zpyncg29y8cv5nw0vgd69nywbj1ppxf6qfm4zc6zz0gk0vxy4pn"; 12 + }; 13 + 14 + cargoSha256 = "0snys419d32anf73jcvrq8h9kp1fq0maqcxz6ww04yg2jv6j47nc"; 15 + 16 + nativeBuildInputs = [ python3 ]; 17 + buildInputs = [ libxcb ]; 18 + 19 + # has not tests 20 + doCheck = false; 21 + 22 + meta = with lib; { 23 + description = "Automatically change i3 workspace names based on their contents"; 24 + longDescription = '' 25 + Automatically sets the workspace names to match the windows on the workspace. 26 + The chosen name for a workspace is a user-defined composite of the WM_CLASS X11 27 + window property for each window in a workspace. 28 + ''; 29 + homepage = "https://github.com/roosta/i3wsr"; 30 + license = licenses.mit; 31 + maintainers = [ maintainers.sebbadk ]; 32 + }; 33 + }
+33
pkgs/applications/window-managers/sway/wsr.nix
··· 1 + { lib, fetchFromGitHub, rustPlatform, libxcb, python3 }: 2 + 3 + rustPlatform.buildRustPackage rec { 4 + pname = "swaywsr"; 5 + version = "1.1.0"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "pedroscaff"; 9 + repo = pname; 10 + rev = "6c4671c702f647395d983aaf607286db1c692db6"; 11 + sha256 = "0bmpbhyvgnbi5baj6v0wdxpdh9cnlzvcc44vh3vihmzsp6i5q05a"; 12 + }; 13 + 14 + cargoSha256 = "15wa03279lflr16a6kw7zcn3nvalnjydk9g6nj7xqxmc7zkpf0rm"; 15 + 16 + nativeBuildInputs = [ python3 ]; 17 + buildInputs = [ libxcb ]; 18 + 19 + # has not tests 20 + doCheck = false; 21 + 22 + meta = with lib; { 23 + description = "Automatically change sway workspace names based on their contents"; 24 + longDescription = '' 25 + Automatically sets the workspace names to match the windows on the workspace. 26 + The chosen name for a workspace is a composite of the app_id or WM_CLASS X11 27 + window property for each window in a workspace. 28 + ''; 29 + homepage = "https://github.com/pedroscaff/swaywsr"; 30 + license = licenses.mit; 31 + maintainers = [ maintainers.sebbadk ]; 32 + }; 33 + }
+1 -1
pkgs/build-support/build-fhs-userenv-bubblewrap/default.nix
··· 95 95 if [[ $path == '/etc' ]]; then 96 96 : 97 97 elif [[ -L $i ]]; then 98 - symlinks+=(--symlink "$(readlink "$i")" "$path") 98 + symlinks+=(--symlink "$(${coreutils}/bin/readlink "$i")" "$path") 99 99 blacklist+=("$path") 100 100 else 101 101 ro_mounts+=(--ro-bind "$i" "$path")
+1 -1
pkgs/build-support/vm/default.nix
··· 573 573 buildCommand = '' 574 574 ${createRootFS} 575 575 576 - PATH=$PATH:${lib.makeBinPath [ dpkg dpkg glibc lzma ]} 576 + PATH=$PATH:${lib.makeBinPath [ dpkg dpkg glibc xz ]} 577 577 578 578 # Unpack the .debs. We do this to prevent pre-install scripts 579 579 # (which have lots of circular dependencies) from barfing.
+2 -2
pkgs/data/fonts/julia-mono/default.nix
··· 1 1 { lib, fetchzip }: 2 2 3 3 let 4 - version = "0.034"; 4 + version = "0.035"; 5 5 6 6 in fetchzip { 7 7 name = "JuliaMono-${version}"; 8 8 url = "https://github.com/cormullion/juliamono/releases/download/v${version}/JuliaMono.zip"; 9 - sha256 = "sha256:0xx3mhzs17baaich67kvwyzqg8h9ga11jrja2i8sxx4861dp1z85"; 9 + sha256 = "sha256:17w8rn37wadxnmakhd6mpmqdx14dsrc3qym4k9b47albl1a34i1j"; 10 10 11 11 postFetch = '' 12 12 mkdir -p $out/share/fonts/truetype
+5 -3
pkgs/data/themes/matcha/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "matcha-gtk-theme"; 5 - version = "2021-02-04"; 5 + version = "2021-04-05"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "vinceliuice"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "sha256-CDym+yqLu7QpqmdUpXAbJTCjQf/r9D1sl7ZdpaWaXFE="; 11 + sha256 = "0bm7hr4lqqz3z2miif38628r4qcy7i5hdk6sm0ngjacm43cl0qvg"; 12 12 }; 13 13 14 14 buildInputs = [ gdk-pixbuf librsvg ]; ··· 16 16 propagatedUserEnvPkgs = [ gtk-engine-murrine ]; 17 17 18 18 installPhase = '' 19 + runHook preInstall 19 20 patchShebangs . 20 21 mkdir -p $out/share/themes 21 22 name= ./install.sh -d $out/share/themes 22 23 install -D -t $out/share/gtksourceview-3.0/styles src/extra/gedit/matcha.xml 23 24 mkdir -p $out/share/doc/${pname} 24 25 cp -a src/extra/firefox $out/share/doc/${pname} 26 + runHook postInstall 25 27 ''; 26 28 27 29 meta = with lib; { 28 - description = "A stylish flat Design theme for GTK based desktop environments"; 30 + description = "A stylish flat design theme for GTK based desktop environments"; 29 31 homepage = "https://vinceliuice.github.io/theme-matcha"; 30 32 license = licenses.gpl3Only; 31 33 platforms = platforms.unix;
+2 -2
pkgs/desktops/gnome-3/core/evolution-data-server/default.nix
··· 1 1 { fetchurl, lib, stdenv, substituteAll, pkg-config, gnome3, python3, gobject-introspection 2 2 , intltool, libsoup, libxml2, libsecret, icu, sqlite, tzdata, libcanberra-gtk3, gcr, p11-kit 3 3 , db, nspr, nss, libical, gperf, wrapGAppsHook, glib-networking, pcre, vala, cmake, ninja 4 - , kerberos, openldap, webkitgtk, libaccounts-glib, json-glib, glib, gtk3, libphonenumber 4 + , libkrb5, openldap, webkitgtk, libaccounts-glib, json-glib, glib, gtk3, libphonenumber 5 5 , gnome-online-accounts, libgweather, libgdata, gsettings-desktop-schemas, boost, protobuf }: 6 6 7 7 stdenv.mkDerivation rec { ··· 34 34 buildInputs = [ 35 35 glib libsoup libxml2 gtk3 gnome-online-accounts 36 36 gcr p11-kit libgweather libgdata libaccounts-glib json-glib 37 - icu sqlite kerberos openldap webkitgtk glib-networking 37 + icu sqlite libkrb5 openldap webkitgtk glib-networking 38 38 libcanberra-gtk3 pcre libphonenumber boost protobuf 39 39 ]; 40 40
+1
pkgs/desktops/plasma-5/default.nix
··· 138 138 plasma-workspace-wallpapers = callPackage ./plasma-workspace-wallpapers.nix {}; 139 139 polkit-kde-agent = callPackage ./polkit-kde-agent.nix {}; 140 140 powerdevil = callPackage ./powerdevil.nix {}; 141 + qqc2-breeze-style = callPackage ./qqc2-breeze-style.nix {}; 141 142 sddm-kcm = callPackage ./sddm-kcm.nix {}; 142 143 systemsettings = callPackage ./systemsettings.nix {}; 143 144 xdg-desktop-portal-kde = callPackage ./xdg-desktop-portal-kde.nix {};
+26
pkgs/desktops/plasma-5/qqc2-breeze-style.nix
··· 1 + { mkDerivation 2 + , lib 3 + , extra-cmake-modules 4 + , kconfig 5 + , kconfigwidgets 6 + , kdoctools 7 + , kguiaddons 8 + , kiconthemes 9 + , kirigami2 10 + , qtquickcontrols2 11 + , qtx11extras 12 + }: 13 + 14 + mkDerivation { 15 + name = "qqc2-breeze-style"; 16 + nativeBuildInputs = [ extra-cmake-modules kdoctools ]; 17 + buildInputs = [ 18 + kconfig 19 + kconfigwidgets 20 + kguiaddons 21 + kiconthemes 22 + kirigami2 23 + qtquickcontrols2 24 + qtx11extras 25 + ]; 26 + }
-25
pkgs/desktops/xfce/applications/mousepad/allow-checking-parent-sources-when-looking-up-schema.patch
··· 1 - From 3b06d6129033ddaa8dc455a6a572077fd63a3816 Mon Sep 17 00:00:00 2001 2 - From: =?UTF-8?q?Jos=C3=A9=20Romildo=20Malaquias?= <malaquias@gmail.com> 3 - Date: Mon, 1 Mar 2021 17:03:07 -0300 4 - Subject: [PATCH] Allow checking parent sources when looking up schema 5 - 6 - --- 7 - mousepad/mousepad-settings-store.c | 2 +- 8 - 1 file changed, 1 insertion(+), 1 deletion(-) 9 - 10 - diff --git a/mousepad/mousepad-settings-store.c b/mousepad/mousepad-settings-store.c 11 - index e5a848b..de989bd 100644 12 - --- a/mousepad/mousepad-settings-store.c 13 - +++ b/mousepad/mousepad-settings-store.c 14 - @@ -181,7 +181,7 @@ mousepad_settings_store_add_settings (MousepadSettingsStore *self, 15 - const gchar *prefix; 16 - 17 - /* loop through keys in schema and store mapping of their setting name to GSettings */ 18 - - schema = g_settings_schema_source_lookup (source, schema_id, FALSE); 19 - + schema = g_settings_schema_source_lookup (source, schema_id, TRUE); 20 - keys = g_settings_schema_list_keys (schema); 21 - prefix = schema_id + MOUSEPAD_ID_LEN + 1; 22 - for (key = keys; key && *key; key++) 23 - -- 24 - 2.30.0 25 -
+4 -6
pkgs/desktops/xfce/applications/mousepad/default.nix
··· 1 - { mkXfceDerivation, gobject-introspection, vala, gtk3, gtksourceview3, xfconf }: 1 + { mkXfceDerivation, gobject-introspection, vala, gtk3, gtksourceview4, xfconf }: 2 2 3 3 mkXfceDerivation { 4 4 category = "apps"; 5 5 pname = "mousepad"; 6 - version = "0.5.3"; 6 + version = "0.5.4"; 7 7 odd-unstable = false; 8 8 9 - sha256 = "0ki5k5p24dpawkyq4k8am1fcq02njhnmhq5vf2ah1zqbc0iyl5yn"; 9 + sha256 = "0yrmjs6cyzm08jz8wzrx8wdxj7zdbxn6x625109ckfcfxrkp4a2f"; 10 10 11 11 nativeBuildInputs = [ gobject-introspection vala ]; 12 12 13 - buildInputs = [ gtk3 gtksourceview3 xfconf ]; 14 - 15 - patches = [ ./allow-checking-parent-sources-when-looking-up-schema.patch ]; 13 + buildInputs = [ gtk3 gtksourceview4 xfconf ]; 16 14 17 15 meta = { 18 16 description = "Simple text editor for Xfce";
+2 -2
pkgs/development/compilers/graalvm/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, fetchurl, fetchzip, fetchgit, mercurial_4, python27, setJavaClassPath, 2 2 which, zlib, makeWrapper, openjdk, unzip, git, clang, llvm, icu, ruby, glibc, bash, gcc, libobjc, 3 - xcodebuild, gfortran, readline, bzip2, lzma, pcre, curl, ed, libresolv, libiconv, writeScriptBin, 3 + xcodebuild, gfortran, readline, bzip2, xz, pcre, curl, ed, libresolv, libiconv, writeScriptBin, 4 4 openssl, perl, CoreFoundation, Foundation, JavaNativeFoundation, JavaRuntimeSupport, JavaVM, Cocoa 5 5 }: 6 6 ··· 372 372 373 373 buildInputs = [ mx zlib.dev mercurial jvmci8 git llvm clang 374 374 python27withPackages icu ruby bzip2 which 375 - readline bzip2 lzma pcre curl ed gfortran 375 + readline bzip2 xz pcre curl ed gfortran 376 376 ] ++ lib.optional stdenv.isDarwin [ 377 377 CoreFoundation gcc.cc.lib libiconv perl openssl 378 378 ];
+17 -4
pkgs/development/compilers/ispc/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub 1 + { lib, stdenv, fetchFromGitHub, fetchpatch 2 2 , cmake, which, m4, python3, bison, flex, llvmPackages 3 3 4 4 # the default test target is sse4, but that is not supported by all Hydra agents ··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "ispc"; 10 - version = "1.13.0"; 10 + version = "unstable-2021-04-02"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = pname; 14 14 repo = pname; 15 - rev = "v${version}"; 16 - sha256 = "1l74xkpwwxc38k2ngg7mpvswziiy91yxslgfad6688hh1n5jvayd"; 15 + # ISPC release 1.15.0 doesn't build against LLVM 11.1, only against 11.0. So we 16 + # use latest ISPC main branch for now, until they support an LLVM version we have. 17 + # https://github.com/ispc/ispc/issues/2027#issuecomment-784470530 18 + rev = "3e8313568265d2adfbf95bd6b6e1a4c70ef59bed"; 19 + sha256 = "sha256-gvr+VpoacmwQlP5gT4MnfmKdACZWJduVMIpR0YRzseg="; 17 20 }; 21 + 22 + patches = [ 23 + # Fix cmake error: `Failed to find clang++` 24 + # https://github.com/ispc/ispc/pull/2055 25 + (fetchpatch { 26 + url = "https://github.com/erictapen/ispc/commit/338119b2f4e11fcf0b0852de296c320928e572a2.patch"; 27 + sha256 = "sha256-+RqDq1LMWomu/K4SgK0Nip47b1RwyM6W0cTSNGD4+m4="; 28 + }) 29 + ]; 18 30 19 31 nativeBuildInputs = [ cmake which m4 bison flex python3 ]; 20 32 buildInputs = with llvmPackages; [ ··· 55 67 56 68 cmakeFlags = [ 57 69 "-DCLANG_EXECUTABLE=${llvmPackages.clang}/bin/clang" 70 + "-DCLANGPP_EXECUTABLE=${llvmPackages.clang}/bin/clang++" 58 71 "-DISPC_INCLUDE_EXAMPLES=OFF" 59 72 "-DISPC_INCLUDE_UTILS=OFF" 60 73 "-DARM_ENABLED=FALSE"
+32
pkgs/development/compilers/sjasmplus/default.nix
··· 1 + { lib, stdenv, fetchFromGitHub }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "sjasmplus"; 5 + version = "1.18.2"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "z00m128"; 9 + repo = "sjasmplus"; 10 + rev = "v${version}"; 11 + sha256 = "04348zcmc0b3crzwhvj1shx6f1n3x05vs8d5qdm7qhgdfki8r74v"; 12 + }; 13 + 14 + buildFlags = [ 15 + "CC=${stdenv.cc.targetPrefix}cc" 16 + "CXX=${stdenv.cc.targetPrefix}c++" 17 + ]; 18 + 19 + installPhase = '' 20 + runHook preInstall 21 + install -D sjasmplus $out/bin/sjasmplus 22 + runHook postInstall 23 + ''; 24 + 25 + meta = with lib; { 26 + homepage = "https://z00m128.github.io/sjasmplus/"; 27 + description = "A Z80 assembly language cross compiler. It is based on the SjASM source code by Sjoerd Mastijn"; 28 + license = licenses.bsd3; 29 + platforms = platforms.all; 30 + maintainers = with maintainers; [ electrified ]; 31 + }; 32 + }
+2 -2
pkgs/development/interpreters/python/cpython/default.nix
··· 3 3 , expat 4 4 , libffi 5 5 , gdbm 6 - , lzma 6 + , xz 7 7 , mime-types ? null, mimetypesSupport ? true 8 8 , ncurses 9 9 , openssl ··· 103 103 ]; 104 104 105 105 buildInputs = filter (p: p != null) ([ 106 - zlib bzip2 expat lzma libffi gdbm sqlite readline ncurses openssl ] 106 + zlib bzip2 expat xz libffi gdbm sqlite readline ncurses openssl ] 107 107 ++ optionals x11Support [ tcl tk libX11 xorgproto ] 108 108 ++ optionals (bluezSupport && stdenv.isLinux) [ bluez ] 109 109 ++ optionals stdenv.isDarwin [ configd ])
+2 -2
pkgs/development/interpreters/python/pypy/default.nix
··· 1 1 { lib, stdenv, substituteAll, fetchurl 2 2 , zlib ? null, zlibSupport ? true, bzip2, pkg-config, libffi, libunwind, Security 3 3 , sqlite, openssl, ncurses, python, expat, tcl, tk, tix, xlibsWrapper, libX11 4 - , self, gdbm, db, lzma 4 + , self, gdbm, db, xz 5 5 , python-setup-hook 6 6 # For the Python package set 7 7 , packageOverrides ? (self: super: {}) ··· 53 53 buildInputs = [ 54 54 bzip2 openssl pythonForPypy libffi ncurses expat sqlite tk tcl xlibsWrapper libX11 gdbm db 55 55 ] ++ optionals isPy3k [ 56 - lzma 56 + xz 57 57 ] ++ optionals (stdenv ? cc && stdenv.cc.libc != null) [ 58 58 stdenv.cc.libc 59 59 ] ++ optionals zlibSupport [
+15 -8
pkgs/development/interpreters/wasmer/default.nix
··· 8 8 9 9 rustPlatform.buildRustPackage rec { 10 10 pname = "wasmer"; 11 - version = "0.17.0"; 11 + version = "1.0.2"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "wasmerio"; 15 15 repo = pname; 16 16 rev = version; 17 - sha256 = "05g4h0xkqd14wnmijiiwmhk6l909fjxr6a2zplrjfxk5bypdalpm"; 17 + sha256 = "0ciia8hhkkyh6rmrxgbk3bgwjwzkcba6645wlcm0vlgk2w4i5m3z"; 18 18 fetchSubmodules = true; 19 19 }; 20 20 21 - cargoSha256 = "1ssmgx9fjvkq7ycyzjanqmlm5b80akllq6qyv3mj0k5fvs659wcq"; 21 + cargoSha256 = "08r2b4s005w8r207jwq2fd43y3prgd8pg1m72aww1r7yrbxdr0v2"; 22 22 23 23 nativeBuildInputs = [ cmake pkg-config ]; 24 24 25 - # Since wasmer 0.17 no backends are enabled by default. Backends are now detected 26 - # using the [makefile](https://github.com/wasmerio/wasmer/blob/master/Makefile). 27 - # Enabling cranelift as this used to be the old default. At least one backend is 28 - # needed for the run subcommand to work. 29 - cargoBuildFlags = [ "--features" "backend-cranelift" ]; 25 + cargoBuildFlags = [ 26 + # cranelift+jit works everywhere, see: 27 + # https://github.com/wasmerio/wasmer/blob/master/Makefile#L22 28 + "--features" "cranelift,jit" 29 + # must target manifest and desired output bin, otherwise output is empty 30 + "--manifest-path" "lib/cli/Cargo.toml" 31 + "--bin" "wasmer" 32 + ]; 33 + 34 + cargoTestFlags = [ 35 + "--features" "test-cranelift,test-jit" 36 + ]; 30 37 31 38 LIBCLANG_PATH = "${llvmPackages.libclang}/lib"; 32 39
+2 -2
pkgs/development/libraries/comedilib/default.nix
··· 3 3 , fetchFromGitHub 4 4 , autoreconfHook 5 5 , flex 6 - , yacc 6 + , bison 7 7 , xmlto 8 8 , docbook_xsl 9 9 , docbook_xml_dtd_44 ··· 26 26 nativeBuildInputs = [ 27 27 autoreconfHook 28 28 flex 29 - yacc 29 + bison 30 30 swig 31 31 xmlto 32 32 docbook_xml_dtd_44
+2 -2
pkgs/development/libraries/cyrus-sasl/default.nix
··· 1 - { lib, stdenv, fetchurl, openssl, openldap, kerberos, db, gettext 1 + { lib, stdenv, fetchurl, openssl, openldap, libkrb5, db, gettext 2 2 , pam, fixDarwinDylibNames, autoreconfHook, enableLdap ? false 3 3 , buildPackages, pruneLibtoolFiles, fetchpatch }: 4 4 ··· 22 22 nativeBuildInputs = [ autoreconfHook pruneLibtoolFiles ] 23 23 ++ lib.optional stdenv.hostPlatform.isDarwin fixDarwinDylibNames; 24 24 buildInputs = 25 - [ openssl db gettext kerberos ] 25 + [ openssl db gettext libkrb5 ] 26 26 ++ lib.optional enableLdap openldap 27 27 ++ lib.optional stdenv.isLinux pam; 28 28
+2 -2
pkgs/development/libraries/entt/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, cmake }: 2 2 stdenv.mkDerivation rec { 3 3 pname = "entt"; 4 - version = "3.6.0"; 4 + version = "3.7.0"; 5 5 6 6 src = fetchFromGitHub { 7 7 owner = "skypjack"; 8 8 repo = "entt"; 9 9 rev = "v${version}"; 10 - sha256 = "sha256-XaQQOt3UekjE4QUUW6+W5M4tkTqeGjZDExJB1U1/gJ8="; 10 + sha256 = "sha256-qDjt74nijZhXW7F7GW0CSv6JWOc/kXN7ndbkwSO0+1s="; 11 11 }; 12 12 13 13 nativeBuildInputs = [ cmake ];
+3 -3
pkgs/development/libraries/ffmpeg-full/default.nix
··· 99 99 , libxcbshapeExtlib ? true # X11 grabbing shape rendering 100 100 , libXv ? null # Xlib support 101 101 , libXext ? null # Xlib support 102 - , lzma ? null # xz-utils 102 + , xz ? null # xz-utils 103 103 , nvenc ? !stdenv.isDarwin && !stdenv.isAarch64, nv-codec-headers ? null # NVIDIA NVENC support 104 104 , openal ? null # OpenAL 1.1 capture support 105 105 #, opencl ? null # OpenCL code ··· 381 381 (enableFeature libxcbshmExtlib "libxcb-shm") 382 382 (enableFeature libxcbxfixesExtlib "libxcb-xfixes") 383 383 (enableFeature libxcbshapeExtlib "libxcb-shape") 384 - (enableFeature (lzma != null) "lzma") 384 + (enableFeature (xz != null) "lzma") 385 385 (enableFeature nvenc "nvenc") 386 386 (enableFeature (openal != null) "openal") 387 387 #(enableFeature opencl "opencl") ··· 431 431 bzip2 celt dav1d fontconfig freetype frei0r fribidi game-music-emu gnutls gsm 432 432 libjack2 ladspaH lame libaom libass libbluray libbs2b libcaca libdc1394 libmodplug libmysofa 433 433 libogg libopus librsvg libssh libtheora libvdpau libvorbis libvpx libwebp libX11 434 - libxcb libXv libXext lzma openal openjpeg libpulseaudio rav1e svt-av1 rtmpdump opencore-amr 434 + libxcb libXv libXext xz openal openjpeg libpulseaudio rav1e svt-av1 rtmpdump opencore-amr 435 435 samba SDL2 soxr speex srt vid-stab vo-amrwbenc wavpack x264 x265 xavs xvidcore 436 436 zeromq4 zlib 437 437 ] ++ optionals openglExtlib [ libGL libGLU ]
+2 -2
pkgs/development/libraries/ffmpeg/generic.nix
··· 1 1 { lib, stdenv, buildPackages, fetchurl, pkg-config, addOpenGLRunpath, perl, texinfo, yasm 2 2 , alsaLib, bzip2, fontconfig, freetype, gnutls, libiconv, lame, libass, libogg 3 - , libssh, libtheora, libva, libdrm, libvorbis, libvpx, lzma, libpulseaudio, soxr 3 + , libssh, libtheora, libva, libdrm, libvorbis, libvpx, xz, libpulseaudio, soxr 4 4 , x264, x265, xvidcore, zlib, libopus, speex, nv-codec-headers, dav1d 5 5 , openglSupport ? false, libGLU ? null, libGL ? null 6 6 , libmfxSupport ? false, intel-media-sdk ? null ··· 171 171 172 172 buildInputs = [ 173 173 bzip2 fontconfig freetype gnutls libiconv lame libass libogg libssh libtheora 174 - libvorbis lzma soxr x264 x265 xvidcore zlib libopus speex nv-codec-headers 174 + libvorbis xz soxr x264 x265 xvidcore zlib libopus speex nv-codec-headers 175 175 ] ++ optionals openglSupport [ libGL libGLU ] 176 176 ++ optional libmfxSupport intel-media-sdk 177 177 ++ optional libaomSupport libaom
+4 -4
pkgs/development/libraries/flatpak/default.nix
··· 13 13 , xmlto 14 14 , appstream-glib 15 15 , substituteAll 16 - , yacc 16 + , bison 17 17 , xdg-dbus-proxy 18 18 , p11-kit 19 19 , bubblewrap ··· 35 35 , fuse 36 36 , nixosTests 37 37 , libsoup 38 - , lzma 38 + , xz 39 39 , zstd 40 40 , ostree 41 41 , polkit ··· 114 114 pkg-config 115 115 xmlto 116 116 appstream-glib 117 - yacc 117 + bison 118 118 wrapGAppsNoGuiHook 119 119 ]; 120 120 ··· 129 129 libcap 130 130 libseccomp 131 131 libsoup 132 - lzma 132 + xz 133 133 zstd 134 134 polkit 135 135 python3
+2 -2
pkgs/development/libraries/folly/default.nix
··· 8 8 , gflags 9 9 , libiberty 10 10 , lz4 11 - , lzma 11 + , xz 12 12 , zlib 13 13 , jemalloc 14 14 , openssl ··· 43 43 libiberty 44 44 openssl 45 45 lz4 46 - lzma 46 + xz 47 47 zlib 48 48 jemalloc 49 49 libunwind
+2 -2
pkgs/development/libraries/gnome-online-accounts/default.nix
··· 22 22 , docbook_xml_dtd_412 23 23 , gnome3 24 24 , gcr 25 - , kerberos 25 + , libkrb5 26 26 , gvfs 27 27 , dbus 28 28 , wrapGAppsHook ··· 75 75 gvfs # OwnCloud, Google Drive 76 76 icu 77 77 json-glib 78 - kerberos 78 + libkrb5 79 79 librest 80 80 libsecret 81 81 libsoup
+2 -2
pkgs/development/libraries/gnutls-kdh/generic.nix
··· 2 2 , perl, gmp, autogen, libidn, p11-kit, unbound, libiconv 3 3 , guileBindings ? config.gnutls.guile or false, guile 4 4 , tpmSupport ? true, trousers, nettools, gperftools, gperf, gettext, automake 5 - , yacc, texinfo 5 + , bison, texinfo 6 6 7 7 # Version dependent args 8 8 , version, src, patches ? [], postPatch ? "", nativeBuildInputs ? [] ··· 55 55 enableParallelBuilding = false; 56 56 57 57 buildInputs = [ lzo lzip nettle libtasn1 libidn p11-kit zlib gmp 58 - autogen gperftools gperf gettext automake yacc texinfo ] 58 + autogen gperftools gperf gettext automake bison texinfo ] 59 59 ++ lib.optional doCheck nettools 60 60 ++ lib.optional (stdenv.isFreeBSD || stdenv.isDarwin) libiconv 61 61 ++ lib.optional (tpmSupport && stdenv.isLinux) trousers
+2 -2
pkgs/development/libraries/gsasl/default.nix
··· 1 - { fetchurl, lib, stdenv, libidn, kerberos }: 1 + { fetchurl, lib, stdenv, libidn, libkrb5 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "gsasl-1.10.0"; ··· 8 8 sha256 = "sha256-hby9juYJWt54cCY6KOvLiDL1Qepzk5dUlJJgFcB1aNM="; 9 9 }; 10 10 11 - buildInputs = [ libidn kerberos ]; 11 + buildInputs = [ libidn libkrb5 ]; 12 12 13 13 configureFlags = [ "--with-gssapi-impl=mit" ]; 14 14
+2 -2
pkgs/development/libraries/kde-frameworks/karchive.nix
··· 1 1 { 2 2 mkDerivation, lib, 3 3 extra-cmake-modules, 4 - bzip2, lzma, qtbase, zlib, 4 + bzip2, xz, qtbase, zlib, 5 5 }: 6 6 7 7 mkDerivation { ··· 11 11 broken = builtins.compareVersions qtbase.version "5.14.0" < 0; 12 12 }; 13 13 nativeBuildInputs = [ extra-cmake-modules ]; 14 - buildInputs = [ bzip2 lzma zlib ]; 14 + buildInputs = [ bzip2 xz zlib ]; 15 15 propagatedBuildInputs = [ qtbase ]; 16 16 outputs = [ "out" "dev" ]; 17 17 }
+2 -2
pkgs/development/libraries/kerberos/heimdal.nix
··· 1 - { lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, python3, perl, yacc, flex 1 + { lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, python3, perl, bison, flex 2 2 , texinfo, perlPackages 3 3 , openldap, libcap_ng, sqlite, openssl, db, libedit, pam 4 4 , CoreFoundation, Security, SystemConfiguration ··· 20 20 21 21 patches = [ ./heimdal-make-missing-headers.patch ]; 22 22 23 - nativeBuildInputs = [ autoreconfHook pkg-config python3 perl yacc flex texinfo ] 23 + nativeBuildInputs = [ autoreconfHook pkg-config python3 perl bison flex texinfo ] 24 24 ++ (with perlPackages; [ JSON ]); 25 25 buildInputs = optionals (stdenv.isLinux) [ libcap_ng ] 26 26 ++ [ db sqlite openssl libedit openldap pam]
+2 -2
pkgs/development/libraries/kerberos/krb5.nix
··· 1 - { lib, stdenv, fetchurl, pkg-config, perl, yacc, bootstrap_cmds 1 + { lib, stdenv, fetchurl, pkg-config, perl, bison, bootstrap_cmds 2 2 , openssl, openldap, libedit, keyutils 3 3 4 4 # Extra Arguments ··· 50 50 ]; 51 51 52 52 nativeBuildInputs = [ pkg-config perl ] 53 - ++ optional (!libOnly) yacc 53 + ++ optional (!libOnly) bison 54 54 # Provides the mig command used by the build scripts 55 55 ++ optional stdenv.isDarwin bootstrap_cmds; 56 56
+2 -2
pkgs/development/libraries/libaacs/default.nix
··· 1 - { lib, stdenv, fetchurl, libgcrypt, libgpgerror, yacc, flex }: 1 + { lib, stdenv, fetchurl, libgcrypt, libgpgerror, bison, flex }: 2 2 3 3 # library that allows libbluray to play AACS protected bluray disks 4 4 # libaacs does not infringe DRM's right or copyright. See the legal page of the website for more info. ··· 18 18 19 19 buildInputs = [ libgcrypt libgpgerror ]; 20 20 21 - nativeBuildInputs = [ yacc flex ]; 21 + nativeBuildInputs = [ bison flex ]; 22 22 23 23 meta = with lib; { 24 24 homepage = "https://www.videolan.org/developers/libaacs.html";
+95
pkgs/development/libraries/libdmapsharing/default.nix
··· 1 + { stdenv 2 + , lib 3 + , fetchFromGitLab 4 + , autoconf 5 + , automake 6 + , libtool 7 + , which 8 + , pkg-config 9 + , python3 10 + , vala 11 + , avahi 12 + , gdk-pixbuf 13 + , gst_all_1 14 + , glib 15 + , gtk3 16 + , libgee 17 + , check 18 + , gtk-doc 19 + , docbook-xsl-nons 20 + , docbook_xml_dtd_43 21 + , gobject-introspection 22 + , libsoup 23 + }: 24 + 25 + stdenv.mkDerivation rec { 26 + pname = "libdmapsharing"; 27 + version = "3.9.10"; 28 + 29 + outputs = [ "out" "dev" "devdoc" ]; 30 + outputBin = "dev"; 31 + 32 + src = fetchFromGitLab { 33 + domain = "gitlab.gnome.org"; 34 + owner = "GNOME"; 35 + repo = pname; 36 + rev = "${lib.toUpper pname}_${lib.replaceStrings ["."] ["_"] version}"; 37 + sha256 = "04y1wjwnbw4pzg05h383d83p6an6ylwy4b4g32jmjxpfi388x33g"; 38 + }; 39 + 40 + nativeBuildInputs = [ 41 + autoconf 42 + automake 43 + libtool 44 + which 45 + pkg-config 46 + python3 47 + gobject-introspection 48 + vala 49 + gtk-doc 50 + docbook-xsl-nons 51 + docbook_xml_dtd_43 52 + ]; 53 + 54 + buildInputs = [ 55 + avahi 56 + gdk-pixbuf 57 + gst_all_1.gstreamer 58 + gst_all_1.gst-plugins-base 59 + ]; 60 + 61 + propagatedBuildInputs = [ 62 + glib 63 + libsoup 64 + ]; 65 + 66 + checkInputs = [ 67 + libgee 68 + check 69 + gtk3 70 + ]; 71 + 72 + configureFlags = [ 73 + "--enable-gtk-doc" 74 + ]; 75 + 76 + # Cannot disable tests here or `check` from checkInputs would not be included. 77 + # Cannot disable building the tests or docs will not build: 78 + # https://gitlab.gnome.org/GNOME/libdmapsharing/-/issues/49 79 + doCheck = true; 80 + 81 + preConfigure = '' 82 + NOCONFIGURE=1 ./autogen.sh 83 + ''; 84 + 85 + # Tests require mDNS server. 86 + checkPhase = ":"; 87 + 88 + meta = with lib; { 89 + homepage = "https://www.flyn.org/projects/libdmapsharing/"; 90 + description = "Library that implements the DMAP family of protocols"; 91 + maintainers = teams.gnome.members; 92 + license = licenses.lgpl21Plus; 93 + platforms = platforms.linux; 94 + }; 95 + }
+2 -2
pkgs/development/libraries/libgssglue/default.nix
··· 1 - { lib, stdenv, fetchurl, kerberos }: 1 + { lib, stdenv, fetchurl, libkrb5 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "libgssglue-0.4"; ··· 15 15 postInstall = '' 16 16 mkdir -p $out/etc 17 17 cat <<EOF > $out/etc/gssapi_mech.conf 18 - ${kerberos}/lib/libgssapi_krb5.so mechglue_internal_krb5_init 18 + ${libkrb5}/lib/libgssapi_krb5.so mechglue_internal_krb5_init 19 19 EOF 20 20 ''; 21 21
+31
pkgs/development/libraries/libpg_query/default.nix
··· 1 + { lib, stdenv, fetchFromGitHub, which }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "libpg_query"; 5 + version = "13-2.0.4"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "pganalyze"; 9 + repo = "libpg_query"; 10 + rev = version; 11 + sha256 = "0d88fh613kh1izb6w288bfh7s3db4nz8cxyhmhq3lb7gl4axs2pv"; 12 + }; 13 + 14 + nativeBuildInputs = [ which ]; 15 + 16 + makeFlags = [ "build" ]; 17 + 18 + installPhase = '' 19 + install -Dm644 -t $out/lib libpg_query.a 20 + install -Dm644 -t $out/include pg_query.h 21 + ''; 22 + 23 + meta = with lib; { 24 + homepage = "https://github.com/pganalyze/libpg_query"; 25 + description = "C library for accessing the PostgreSQL parser outside of the server environment"; 26 + changelog = "https://github.com/pganalyze/libpg_query/raw/${version}/CHANGELOG.md"; 27 + license = licenses.bsd3; 28 + platforms = platforms.x86_64; 29 + maintainers = [ maintainers.marsam ]; 30 + }; 31 + }
+2 -2
pkgs/development/libraries/libphonenumber/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, cmake, gmock, boost, pkg-config, protobuf, icu }: 1 + { lib, stdenv, fetchFromGitHub, cmake, gtest, boost, pkg-config, protobuf, icu }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "phonenumber"; ··· 13 13 14 14 nativeBuildInputs = [ 15 15 cmake 16 - gmock 16 + gtest 17 17 pkg-config 18 18 ]; 19 19
+3 -3
pkgs/development/libraries/libraspberrypi/default.nix
··· 7 7 8 8 stdenv.mkDerivation rec { 9 9 pname = "libraspberrypi"; 10 - version = "unstable-2020-11-30"; 10 + version = "unstable-2021-03-17"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "raspberrypi"; 14 14 repo = "userland"; 15 - rev = "093b30bbc2fd083d68cc3ee07e6e555c6e592d11"; 16 - sha256 = "0n2psqyxlsic9cc5s8h65g0blblw3xws4czhpbbgjm58px3822d7"; 15 + rev = "3fd8527eefd8790b4e8393458efc5f94eb21a615"; 16 + sha256 = "099qxh4bjzwd431ffpdhzx0gzlrkdyf66wplgkwg2rrfrc9zlv5a"; 17 17 }; 18 18 19 19 patches = [
+2 -2
pkgs/development/libraries/librime/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, cmake, boost, glog, leveldb, marisa, opencc, 2 - libyamlcpp, gmock }: 2 + libyamlcpp, gtest }: 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "librime"; ··· 14 14 15 15 nativeBuildInputs = [ cmake ]; 16 16 17 - buildInputs = [ boost glog leveldb marisa opencc libyamlcpp gmock ]; 17 + buildInputs = [ boost glog leveldb marisa opencc libyamlcpp gtest ]; 18 18 19 19 meta = with lib; { 20 20 homepage = "https://rime.im/";
+2 -2
pkgs/development/libraries/libticalcs2/default.nix
··· 7 7 , libticonv 8 8 , libtifiles2 9 9 , libticables2 10 - , lzma 10 + , xz 11 11 , bzip2 12 12 , acl 13 13 , libobjc ··· 31 31 libticonv 32 32 libtifiles2 33 33 libticables2 34 - lzma 34 + xz 35 35 bzip2 36 36 ] ++ lib.optionals stdenv.isLinux [ 37 37 acl
+3 -3
pkgs/development/libraries/libvirt/5.9.0.nix
··· 1 1 { lib, stdenv, fetchurl, fetchgit 2 2 , pkg-config, makeWrapper, libtool, autoconf, automake, fetchpatch 3 3 , coreutils, libxml2, gnutls, perl, python2, attr 4 - , iproute, iptables, readline, lvm2, util-linux, systemd, libpciaccess, gettext 4 + , iproute2, iptables, readline, lvm2, util-linux, systemd, libpciaccess, gettext 5 5 , libtasn1, ebtables, libgcrypt, yajl, pmutils, libcap_ng, libapparmor 6 6 , dnsmasq, libnl, libpcap, libxslt, xhtml1, numad, numactl, perlPackages 7 7 , curl, libiconv, gmp, zfs, parted, bridge-utils, dmidecode, glib, rpcsvc-proto, libtirpc ··· 54 54 55 55 preConfigure = '' 56 56 ${ optionalString (!buildFromTarball) "./bootstrap --no-git --gnulib-srcdir=$(pwd)/.gnulib" } 57 - PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute iptables ebtables lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH 57 + PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute2 iptables ebtables lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH 58 58 # the path to qemu-kvm will be stored in VM's .xml and .save files 59 59 # do not use "''${qemu_kvm}/bin/qemu-kvm" to avoid bound VMs to particular qemu derivations 60 60 substituteInPlace src/lxc/lxc_conf.c \ ··· 101 101 102 102 103 103 postInstall = let 104 - binPath = [ iptables iproute pmutils numad numactl bridge-utils dmidecode dnsmasq ebtables ] ++ optionals enableIscsi [ openiscsi ]; 104 + binPath = [ iptables iproute2 pmutils numad numactl bridge-utils dmidecode dnsmasq ebtables ] ++ optionals enableIscsi [ openiscsi ]; 105 105 in '' 106 106 substituteInPlace $out/libexec/libvirt-guests.sh \ 107 107 --replace 'ON_BOOT=start' 'ON_BOOT=''${ON_BOOT:-start}' \
+3 -3
pkgs/development/libraries/libvirt/default.nix
··· 1 1 { lib, stdenv, fetchurl, fetchgit 2 2 , makeWrapper, autoreconfHook, fetchpatch 3 3 , coreutils, libxml2, gnutls, perl, python3, attr, glib, docutils 4 - , iproute, readline, lvm2, util-linux, systemd, libpciaccess, gettext 4 + , iproute2, readline, lvm2, util-linux, systemd, libpciaccess, gettext 5 5 , libtasn1, iptables, ebtables, libgcrypt, yajl, pmutils, libcap_ng, libapparmor 6 6 , dnsmasq, libnl, libpcap, libxslt, xhtml1, numad, numactl, perlPackages 7 7 , curl, libiconv, gmp, zfs, parted, bridge-utils, dmidecode, dbus, libtirpc, rpcsvc-proto, darwin ··· 85 85 sed -i meson.build -e "s|conf.set_quoted('${var}',.*|conf.set_quoted('${var}','${value}')|" 86 86 ''; 87 87 in '' 88 - PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute iptables ebtables-compat lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH 88 + PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute2 iptables ebtables-compat lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH 89 89 # the path to qemu-kvm will be stored in VM's .xml and .save files 90 90 # do not use "''${qemu_kvm}/bin/qemu-kvm" to avoid bound VMs to particular qemu derivations 91 91 substituteInPlace src/lxc/lxc_conf.c \ ··· 126 126 127 127 postInstall = let 128 128 # Keep the legacy iptables binary for now for backwards compatibility (comment on #109332) 129 - binPath = [ iptables ebtables-compat iproute pmutils numad numactl bridge-utils dmidecode dnsmasq ] ++ optionals enableIscsi [ openiscsi ]; 129 + binPath = [ iptables ebtables-compat iproute2 pmutils numad numactl bridge-utils dmidecode dnsmasq ] ++ optionals enableIscsi [ openiscsi ]; 130 130 in '' 131 131 substituteInPlace $out/libexec/libvirt-guests.sh \ 132 132 --replace 'ON_BOOT="start"' 'ON_BOOT=''${ON_BOOT:-start}' \
+2 -2
pkgs/development/libraries/libxkbcommon/default.nix
··· 1 - { lib, stdenv, fetchurl, meson, ninja, pkg-config, yacc, doxygen 1 + { lib, stdenv, fetchurl, meson, ninja, pkg-config, bison, doxygen 2 2 , xkeyboard_config, libxcb, libxml2 3 3 , python3 4 4 , libX11 ··· 21 21 22 22 outputs = [ "out" "dev" "doc" ]; 23 23 24 - nativeBuildInputs = [ meson ninja pkg-config yacc doxygen ] 24 + nativeBuildInputs = [ meson ninja pkg-config bison doxygen ] 25 25 ++ lib.optional withWaylandSupport wayland; 26 26 buildInputs = [ xkeyboard_config libxcb libxml2 ] 27 27 ++ lib.optionals withWaylandSupport [ wayland wayland-protocols ];
+2 -2
pkgs/development/libraries/libxkbcommon/libxkbcommon_7.nix
··· 1 - { lib, stdenv, fetchurl, pkg-config, yacc, flex, xkeyboard_config, libxcb, libX11 }: 1 + { lib, stdenv, fetchurl, pkg-config, bison, flex, xkeyboard_config, libxcb, libX11 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "libxkbcommon-0.7.2"; ··· 11 11 outputs = [ "out" "dev" ]; 12 12 13 13 nativeBuildInputs = [ pkg-config ]; 14 - buildInputs = [ yacc flex xkeyboard_config libxcb ]; 14 + buildInputs = [ bison flex xkeyboard_config libxcb ]; 15 15 16 16 configureFlags = [ 17 17 "--with-xkb-config-root=${xkeyboard_config}/etc/X11/xkb"
+2 -4
pkgs/development/libraries/physics/yoda/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "yoda"; 5 - version = "1.8.5"; 5 + version = "1.9.0"; 6 6 7 7 src = fetchurl { 8 8 url = "https://www.hepforge.org/archive/yoda/YODA-${version}.tar.bz2"; 9 - sha256 = "1z9jmabsaddhs003zzq73fpq2absd12rnc2sa5qn45zwf62nnbjc"; 9 + sha256 = "1x7xi6w7lb92x8202kbaxgqg1sly534wana4f38l3gpbzw9dwmcs"; 10 10 }; 11 11 12 12 nativeBuildInputs = with python.pkgs; [ cython makeWrapper ]; ··· 39 39 homepage = "https://yoda.hepforge.org"; 40 40 platforms = lib.platforms.unix; 41 41 maintainers = with lib.maintainers; [ veprbl ]; 42 - # https://gitlab.com/hepcedar/yoda/-/issues/24 43 - broken = withRootSupport; 44 42 }; 45 43 }
+3 -3
pkgs/development/libraries/protobuf/generic-v3.nix
··· 1 1 { lib, stdenv 2 2 , fetchFromGitHub 3 - , autoreconfHook, zlib, gmock, buildPackages 3 + , autoreconfHook, zlib, gtest, buildPackages 4 4 , version, sha256 5 5 , ... 6 6 }: ··· 20 20 21 21 postPatch = '' 22 22 rm -rf gmock 23 - cp -r ${gmock.src}/googlemock gmock 24 - cp -r ${gmock.src}/googletest googletest 23 + cp -r ${gtest.src}/googlemock gmock 24 + cp -r ${gtest.src}/googletest googletest 25 25 chmod -R a+w gmock 26 26 chmod -R a+w googletest 27 27 ln -s ../googletest gmock/gtest
+2 -2
pkgs/development/libraries/pupnp/default.nix
··· 6 6 7 7 stdenv.mkDerivation rec { 8 8 pname = "libupnp"; 9 - version = "1.14.2"; 9 + version = "1.14.4"; 10 10 11 11 outputs = [ "out" "dev" ]; 12 12 ··· 14 14 owner = "mrjimenez"; 15 15 repo = "pupnp"; 16 16 rev = "release-${version}"; 17 - sha256 = "sha256-PVlmAtiozF1dqgXsRXPuDY13TchHdb0UnK6mam4chBE="; 17 + sha256 = "sha256-4VuTbcEjr9Ffrowb3eOtXFU8zPNu1NXS531EOZpI07A="; 18 18 }; 19 19 20 20 nativeBuildInputs = [
+2 -2
pkgs/development/libraries/rabbitmq-c/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "rabbitmq-c"; 5 - version = "0.10.0"; 5 + version = "0.11.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "alanxz"; 9 9 repo = "rabbitmq-c"; 10 10 rev = "v${version}"; 11 - sha256 = "1iv7aww4pam8497s524xjxbbxypyqd01qgrb0b429y3q9x06m4sw"; 11 + sha256 = "sha256-u1uOrZRiQOU/6vlLdQHypBRSCo3zw7FC1AI9v3NlBVE="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake ];
+2 -2
pkgs/development/libraries/science/biology/htslib/default.nix
··· 1 - { lib, stdenv, fetchurl, zlib, bzip2, lzma, curl, perl }: 1 + { lib, stdenv, fetchurl, zlib, bzip2, xz, curl, perl }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "htslib"; ··· 12 12 # perl is only used during the check phase. 13 13 nativeBuildInputs = [ perl ]; 14 14 15 - buildInputs = [ zlib bzip2 lzma curl ]; 15 + buildInputs = [ zlib bzip2 xz curl ]; 16 16 17 17 configureFlags = [ "--enable-libcurl" ]; # optional but strongly recommended 18 18
+3 -3
pkgs/development/libraries/serf/default.nix
··· 1 - { lib, stdenv, fetchurl, apr, scons, openssl, aprutil, zlib, kerberos 1 + { lib, stdenv, fetchurl, apr, scons, openssl, aprutil, zlib, libkrb5 2 2 , pkg-config, libiconv }: 3 3 4 4 stdenv.mkDerivation rec { ··· 12 12 13 13 nativeBuildInputs = [ pkg-config scons ]; 14 14 buildInputs = [ apr openssl aprutil zlib libiconv ] 15 - ++ lib.optional (!stdenv.isCygwin) kerberos; 15 + ++ lib.optional (!stdenv.isCygwin) libkrb5; 16 16 17 17 patches = [ ./scons.patch ]; 18 18 ··· 25 25 sconsFlags+=" OPENSSL=${openssl}" 26 26 sconsFlags+=" ZLIB=${zlib}" 27 27 '' + lib.optionalString (!stdenv.isCygwin) '' 28 - sconsFlags+=" GSSAPI=${kerberos.dev}" 28 + sconsFlags+=" GSSAPI=${libkrb5.dev}" 29 29 ''; 30 30 31 31 enableParallelBuilding = true;
+2 -2
pkgs/development/libraries/simdjson/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "simdjson"; 5 - version = "0.9.1"; 5 + version = "0.9.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "simdjson"; 9 9 repo = "simdjson"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-e9Y5QEs9xqfJpaWxnA6iFwHE6TTGyVM7hfFuMEmpW78="; 11 + sha256 = "sha256-L/a/vTthh7XkiwuvlGk9q+uLEBf8vaPoV1x1fG44zeg="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake ];
+3 -3
pkgs/development/libraries/sope/default.nix
··· 1 1 { gnustep, lib, fetchFromGitHub , libxml2, openssl_1_1 2 - , openldap, mysql, libmysqlclient, postgresql }: 2 + , openldap, mariadb, libmysqlclient, postgresql }: 3 3 with lib; 4 4 5 5 gnustep.stdenv.mkDerivation rec { ··· 17 17 nativeBuildInputs = [ gnustep.make ]; 18 18 buildInputs = flatten ([ gnustep.base libxml2 openssl_1_1 ] 19 19 ++ optional (openldap != null) openldap 20 - ++ optionals (mysql != null) [ libmysqlclient mysql ] 20 + ++ optionals (mariadb != null) [ libmysqlclient mariadb ] 21 21 ++ optional (postgresql != null) postgresql); 22 22 23 23 postPatch = '' ··· 31 31 32 32 configureFlags = [ "--prefix=" "--disable-debug" "--enable-xml" "--with-ssl=ssl" ] 33 33 ++ optional (openldap != null) "--enable-openldap" 34 - ++ optional (mysql != null) "--enable-mysql" 34 + ++ optional (mariadb != null) "--enable-mysql" 35 35 ++ optional (postgresql != null) "--enable-postgresql"; 36 36 37 37 # Yes, this is ugly.
+2 -2
pkgs/development/libraries/tpm2-tss/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub 2 2 , autoreconfHook, autoconf-archive, pkg-config, doxygen, perl 3 3 , openssl, json_c, curl, libgcrypt 4 - , cmocka, uthash, ibm-sw-tpm2, iproute, procps, which 4 + , cmocka, uthash, ibm-sw-tpm2, iproute2, procps, which 5 5 }: 6 6 7 7 stdenv.mkDerivation rec { ··· 20 20 ]; 21 21 buildInputs = [ openssl json_c curl libgcrypt ]; 22 22 checkInputs = [ 23 - cmocka uthash ibm-sw-tpm2 iproute procps which 23 + cmocka uthash ibm-sw-tpm2 iproute2 procps which 24 24 ]; 25 25 26 26 preAutoreconf = "./bootstrap";
+3 -3
pkgs/development/libraries/unixODBCDrivers/default.nix
··· 1 - { fetchurl, stdenv, unixODBC, cmake, postgresql, mysql, sqlite, zlib, libxml2, dpkg, lib, openssl, kerberos, libuuid, patchelf, libiconv, fetchFromGitHub }: 1 + { fetchurl, stdenv, unixODBC, cmake, postgresql, mariadb, sqlite, zlib, libxml2, dpkg, lib, openssl, libkrb5, libuuid, patchelf, libiconv, fetchFromGitHub }: 2 2 3 3 # I haven't done any parameter tweaking.. So the defaults provided here might be bad 4 4 ··· 79 79 }; 80 80 81 81 nativeBuildInputs = [ cmake ]; 82 - buildInputs = [ unixODBC mysql ]; 82 + buildInputs = [ unixODBC mariadb ]; 83 83 84 84 cmakeFlags = [ "-DWITH_UNIXODBC=1" ]; 85 85 ··· 157 157 ''; 158 158 159 159 postFixup = '' 160 - patchelf --set-rpath ${lib.makeLibraryPath [ unixODBC openssl.out kerberos libuuid stdenv.cc.cc ]} \ 160 + patchelf --set-rpath ${lib.makeLibraryPath [ unixODBC openssl.out libkrb5 libuuid stdenv.cc.cc ]} \ 161 161 $out/lib/libmsodbcsql-${versionMajor}.${versionMinor}.so.${versionAdditional} 162 162 ''; 163 163
+3 -3
pkgs/development/libraries/uriparser/default.nix
··· 1 - { lib, stdenv, fetchurl, fetchpatch, cmake, gtest }: 1 + { lib, stdenv, fetchurl, cmake, gtest }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "uriparser"; 5 - version = "0.9.4"; 5 + version = "0.9.5"; 6 6 7 7 # Release tarball differs from source tarball 8 8 src = fetchurl { 9 9 url = "https://github.com/uriparser/uriparser/releases/download/${pname}-${version}/${pname}-${version}.tar.bz2"; 10 - sha256 = "0yzqp1j6sglyrmwcasgn7zlwg841p3nbxy0h78ngq20lc7jspkdp"; 10 + sha256 = "0v30qr5hl3xybl9nzwaw46kblwn94w5xpri22wanrrpjlzmn306x"; 11 11 }; 12 12 13 13 nativeBuildInputs = [ cmake ];
+2
pkgs/development/ocaml-modules/gnuplot/default.nix
··· 4 4 pname = "gnuplot"; 5 5 version = "0.7"; 6 6 7 + useDune2 = true; 8 + 7 9 minimumOCamlVersion = "4.03"; 8 10 9 11 src = fetchFromGitHub {
+3 -3
pkgs/development/ocaml-modules/mimic/default.nix
··· 5 5 6 6 buildDunePackage rec { 7 7 pname = "mimic"; 8 - version = "0.0.1"; 8 + version = "0.0.2"; 9 9 10 10 minimumOCamlVersion = "4.08"; 11 11 useDune2 = true; 12 12 13 13 src = fetchurl { 14 14 url = "https://github.com/mirage/ocaml-git/releases/download/${pname}-v${version}/${pname}-${pname}-v${version}.tbz"; 15 - sha256 = "0j4l99sgm5mdmv67vakkz2pw45l6i89bpza88xqkgmskfk50c5pk"; 15 + sha256 = "3ad5af3caa1120ecfdf022de41ba5be8edfbf50270fc99238b82d3d2d6e7c317"; 16 16 }; 17 17 18 18 # don't install changelogs for other packages ··· 25 25 mirage-flow 26 26 result 27 27 rresult 28 - cstruct 29 28 logs 30 29 ]; 31 30 ··· 35 34 alcotest-lwt 36 35 bigstringaf 37 36 bigarray-compat 37 + cstruct 38 38 ke 39 39 ]; 40 40
+5 -3
pkgs/development/ocaml-modules/minisat/default.nix
··· 2 2 3 3 buildDunePackage rec { 4 4 pname = "minisat"; 5 - version = "0.2"; 5 + version = "0.3"; 6 + 7 + useDune2 = true; 6 8 7 9 minimumOCamlVersion = "4.05"; 8 10 9 11 src = fetchFromGitHub { 10 12 owner = "c-cube"; 11 13 repo = "ocaml-minisat"; 12 - rev = version; 13 - sha256 = "1jibylmb1ww0x42n6wl8bdwicaysgxp0ag244x7w5m3jifq3xs6q"; 14 + rev = "v${version}"; 15 + sha256 = "01wggbziqz5x6d7mwdl40sbf6qal7fd853b224zjf9n0kzzsnczh"; 14 16 }; 15 17 16 18 meta = {
+2 -2
pkgs/development/ocaml-modules/mirage-crypto/default.nix
··· 7 7 minimumOCamlVersion = "4.08"; 8 8 9 9 pname = "mirage-crypto"; 10 - version = "0.9.0"; 10 + version = "0.9.1"; 11 11 12 12 src = fetchurl { 13 13 url = "https://github.com/mirage/mirage-crypto/releases/download/v${version}/mirage-crypto-v${version}.tbz"; 14 - sha256 = "716684f8a70031f16115e3c84d42141c75fb1e688b7a699bbd09166176ed5217"; 14 + sha256 = "53e0ae90f19651ab7f09156557ea5ec07bce7a52468ec6687471e0333f3e2133"; 15 15 }; 16 16 17 17 useDune2 = true;
+2
pkgs/development/ocaml-modules/opti/default.nix
··· 4 4 pname = "opti"; 5 5 version = "1.0.3"; 6 6 7 + useDune2 = true; 8 + 7 9 minimumOCamlVersion = "4.02"; 8 10 9 11 src = fetchurl {
+5 -1
pkgs/development/ocaml-modules/parmap/default.nix
··· 1 - { lib, buildDunePackage, fetchurl }: 1 + { lib, buildDunePackage, fetchurl, dune-configurator }: 2 2 3 3 buildDunePackage rec { 4 4 pname = "parmap"; 5 5 version = "1.2"; 6 6 7 + useDune2 = true; 8 + 7 9 src = fetchurl { 8 10 url = "https://github.com/rdicosmo/${pname}/releases/download/${version}/${pname}-${version}.tbz"; 9 11 sha256 = "sha256-XUXptzD0eytaypaBQ+EBp4iVFRE6/Y0inS93t/YZrM8="; 10 12 }; 13 + 14 + buildInputs = [ dune-configurator ]; 11 15 12 16 doCheck = true; 13 17
+30
pkgs/development/ocaml-modules/pbkdf/default.nix
··· 1 + { lib 2 + , buildDunePackage 3 + , fetchurl 4 + , mirage-crypto 5 + , alcotest 6 + }: 7 + 8 + buildDunePackage rec { 9 + pname = "pbkdf"; 10 + version = "1.1.0"; 11 + 12 + useDune2 = true; 13 + 14 + src = fetchurl { 15 + url = "https://github.com/abeaumont/ocaml-pbkdf/releases/download/${version}/pbkdf-${version}.tbz"; 16 + sha256 = "e53ed1bd9abf490c858a341c10fb548bc9ad50d4479acdf95a9358a73d042264"; 17 + }; 18 + 19 + propagatedBuildInputs = [ mirage-crypto ]; 20 + checkInputs = [ alcotest ]; 21 + doCheck = true; 22 + 23 + meta = { 24 + description = "Password based key derivation functions (PBKDF) from PKCS#5"; 25 + maintainers = [ lib.maintainers.sternenseemann ]; 26 + license = lib.licenses.bsd2; 27 + homepage = "https://github.com/abeaumont/ocaml-pbkdf"; 28 + }; 29 + } 30 +
-53
pkgs/development/perl-modules/Net-CIDR-Lite-prevent-leading-zeroes-ipv4.patch
··· 1 - From 734d31aa2f65b69f5558b9b0dd67af0461ca7f80 Mon Sep 17 00:00:00 2001 2 - From: Stig Palmquist <stig@stig.io> 3 - Date: Tue, 30 Mar 2021 12:13:37 +0200 4 - Subject: [PATCH] Security: Prevent leading zeroes in ipv4 octets 5 - 6 - https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/ 7 - Related to CVE-2021-28918 8 - --- 9 - Lite.pm | 2 +- 10 - t/base.t | 13 ++++++++++++- 11 - 2 files changed, 13 insertions(+), 2 deletions(-) 12 - 13 - diff --git a/Lite.pm b/Lite.pm 14 - index fd6df73..d44f881 100644 15 - --- a/Lite.pm 16 - +++ b/Lite.pm 17 - @@ -181,7 +181,7 @@ sub _pack_ipv4 { 18 - my @nums = split /\./, shift(), -1; 19 - return unless @nums == 4; 20 - for (@nums) { 21 - - return unless /^\d{1,3}$/ and $_ <= 255; 22 - + return unless /^\d{1,3}$/ and !/^0\d{1,2}$/ and $_ <= 255; 23 - } 24 - pack("CC*", 0, @nums); 25 - } 26 - diff --git a/t/base.t b/t/base.t 27 - index cf32c5e..292456d 100644 28 - --- a/t/base.t 29 - +++ b/t/base.t 30 - @@ -8,7 +8,7 @@ 31 - use Test; 32 - use strict; 33 - $|++; 34 - -BEGIN { plan tests => 39 }; 35 - +BEGIN { plan tests => 42 }; 36 - use Net::CIDR::Lite; 37 - ok(1); # If we made it this far, we are ok. 38 - 39 - @@ -133,3 +133,14 @@ ok(join(', ', @list_short_range), '10.0.0.1-2, 10.0.0.5'); 40 - })->list_short_range; 41 - ok(join(', ', @list_short_range), '10.0.0.250-255, 10.0.1.0-20, 10.0.1.22, 10.0.2.250-255, 10.0.3.0-255, 10.0.4.0-255, 10.0.5.0-8'); 42 - 43 - + 44 - +# Tests for vulnerability: https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/ 45 - +eval { Net::CIDR::Lite->new("010.0.0.0/8") }; 46 - +ok($@=~/Can't determine ip format/); 47 - + 48 - +my $err_octal = Net::CIDR::Lite->new; 49 - +eval { $err_octal->add("010.0.0.0/8") }; 50 - +ok($@=~/Can't determine ip format/); 51 - + 52 - +eval { $err_octal->add("10.01.0.0/8") }; 53 - +ok($@=~/Can't determine ip format/);
+2 -2
pkgs/development/python-modules/adafruit-platformdetect/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "adafruit-platformdetect"; 9 - version = "3.4.1"; 9 + version = "3.5.0"; 10 10 11 11 src = fetchPypi { 12 12 pname = "Adafruit-PlatformDetect"; 13 13 inherit version; 14 - sha256 = "31275dcf949c8b00598aaf2b0da65d970a0cba28e7cb45691d5f354b8e82fe85"; 14 + sha256 = "sha256-QJeb9+iiS4QZ7poOBp5oKD5KuagkG6cfTalbNRwrI1M="; 15 15 }; 16 16 17 17 nativeBuildInputs = [ setuptools-scm ];
+4 -4
pkgs/development/python-modules/aiosmtpd/default.nix
··· 1 1 { lib, isPy3k, fetchFromGitHub, buildPythonPackage 2 - , atpublic }: 2 + , attrs, atpublic }: 3 3 4 4 buildPythonPackage rec { 5 5 pname = "aiosmtpd"; 6 - version = "1.2.1"; 6 + version = "1.4.2"; 7 7 disabled = !isPy3k; 8 8 9 9 # Release not published to Pypi ··· 11 11 owner = "aio-libs"; 12 12 repo = pname; 13 13 rev = version; 14 - sha256 = "14c30dm6jzxiblnsah53fdv68vqhxwvb9x0aq9bc4vcdas747vr7"; 14 + sha256 = "0hbpyns1j1fpvpj7gyb8cz359j7l4hzfqbig74xp4xih59sih0wj"; 15 15 }; 16 16 17 17 propagatedBuildInputs = [ 18 - atpublic 18 + atpublic attrs 19 19 ]; 20 20 21 21 # Tests need network access
+2 -2
pkgs/development/python-modules/backports_lzma/default.nix
··· 2 2 , buildPythonPackage 3 3 , fetchPypi 4 4 , isPy3k 5 - , lzma 5 + , xz 6 6 , python 7 7 , pythonOlder 8 8 }: ··· 18 18 sha256 = "16d8b68e4d3cd4e6c9ddb059850452946da3914c8a8e197a7f2b0954559f2df4"; 19 19 }; 20 20 21 - buildInputs = [ lzma ]; 21 + buildInputs = [ xz ]; 22 22 23 23 checkPhase = '' 24 24 ${python.interpreter} test/test_lzma.py
+1 -2
pkgs/development/python-modules/binwalk/default.nix
··· 14 14 , cramfsswap 15 15 , sasquatch 16 16 , squashfsTools 17 - , lzma 18 17 , matplotlib 19 18 , nose 20 19 , pycrypto ··· 32 31 sha256 = "1bxgj569fzwv6jhcbl864nmlsi9x1k1r20aywjxc8b9b1zgqrlvc"; 33 32 }; 34 33 35 - propagatedBuildInputs = [ zlib xz ncompress gzip bzip2 gnutar p7zip cabextract squashfsTools lzma pycrypto ] 34 + propagatedBuildInputs = [ zlib xz ncompress gzip bzip2 gnutar p7zip cabextract squashfsTools xz pycrypto ] 36 35 ++ lib.optionals visualizationSupport [ matplotlib pyqtgraph ] 37 36 ++ lib.optionals (!stdenv.isDarwin) [ cramfsprogs cramfsswap sasquatch ]; 38 37
+3 -2
pkgs/development/python-modules/cairocffi/default.nix
··· 12 12 , glibcLocales 13 13 , cairo 14 14 , cffi 15 + , numpy 15 16 , withXcffib ? false, xcffib 16 17 , python 17 18 , glib ··· 19 20 }@args: 20 21 21 22 import ./generic.nix ({ 22 - version = "1.1.0"; 23 - sha256 = "1nq53f5jipgy9jgyfxp43j40qfbmrhgn1cj8bp5rrb3liy3wbh7i"; 23 + version = "1.2.0"; 24 + sha256 = "sha256-mpebUAxkyBef7ChvM36P5kTsovLNBYYM4LYtJfIuoUA="; 24 25 dlopen_patch = ./dlopen-paths.patch; 25 26 disabled = pythonOlder "3.5"; 26 27 inherit withXcffib;
+1 -1
pkgs/development/python-modules/cairocffi/generic.nix
··· 23 23 fontDirectories = [ freefont_ttf ]; 24 24 }; 25 25 26 - checkInputs = [ pytest pytestrunner glibcLocales ]; 26 + checkInputs = [ numpy pytest pytestrunner glibcLocales ]; 27 27 propagatedBuildInputs = [ cairo cffi ] ++ lib.optional withXcffib xcffib; 28 28 29 29 checkPhase = ''
+5 -5
pkgs/development/python-modules/configargparse/default.nix
··· 6 6 }: 7 7 8 8 buildPythonPackage rec { 9 - pname = "ConfigArgParse"; 10 - version = "1.3"; 9 + pname = "configargparse"; 10 + version = "1.4"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "bw2"; 14 - repo = pname; 15 - rev = version; 16 - sha256 = "147x781lgahn9r3gbhayhx1pf0iysf7q1hnr3kypy3p2k9v7a9mh"; 14 + repo = "ConfigArgParse"; 15 + rev = "v${version}"; 16 + sha256 = "0x6ar7d8qhr7gb1s8asbhqymg9jd635h7cyczqrbmvm8689zhj1d"; 17 17 }; 18 18 19 19 checkInputs = [
+2 -2
pkgs/development/python-modules/crytic-compile/default.nix
··· 2 2 3 3 buildPythonPackage rec { 4 4 pname = "crytic-compile"; 5 - version = "0.1.12"; 5 + version = "0.1.13"; 6 6 7 7 disabled = pythonOlder "3.6"; 8 8 ··· 14 14 owner = "crytic"; 15 15 repo = "crytic-compile"; 16 16 rev = version; 17 - sha256 = "1q75n84yxv2cb6x7gqyk3vcwkxpq7pni30wgz3d1bk6pmi2pqgw6"; 17 + sha256 = "sha256-KJRfkUyUI0M7HevY4XKOtCvU+SFlsJIl3kTIccWfNmw="; 18 18 }; 19 19 20 20 propagatedBuildInputs = [ pysha3 setuptools ];
+2 -2
pkgs/development/python-modules/deeptoolsintervals/default.nix
··· 3 3 , fetchPypi 4 4 , pytest 5 5 , zlib 6 - , lzma 6 + , xz 7 7 }: 8 8 9 9 buildPythonPackage rec { ··· 15 15 sha256 = "1xnl80nblysj6dylj4683wgrfa425rkx4dp5k65hvwdns9pw753x"; 16 16 }; 17 17 18 - buildInputs = [ zlib lzma ]; 18 + buildInputs = [ zlib xz ]; 19 19 20 20 checkInputs = [ pytest ]; 21 21
+2 -3
pkgs/development/python-modules/discordpy/default.nix
··· 9 9 10 10 buildPythonPackage rec { 11 11 pname = "discord.py"; 12 - version = "1.6.0"; 12 + version = "1.7.0"; 13 13 disabled = pythonOlder "3.5.3"; 14 14 15 15 # only distributes wheels on pypi now ··· 17 17 owner = "Rapptz"; 18 18 repo = pname; 19 19 rev = "v${version}"; 20 - sha256 = "036prc4iw91qx31zz48hy3b30kn2qnlg68lgrvv2mcvsjxf2gd1l"; 20 + sha256 = "1i5k2qb894rjksn21pk9shash1y7v4138rkk8mqr1a1yvgnr5ibg"; 21 21 }; 22 22 23 23 propagatedBuildInputs = [ aiohttp websockets ]; 24 24 patchPhase = '' 25 25 substituteInPlace "requirements.txt" \ 26 - --replace "aiohttp>=3.6.0,<3.7.0" "aiohttp" \ 27 26 --replace "websockets>=6.0,!=7.0,!=8.0,!=8.0.1,<9.0" "websockets" 28 27 '' + lib.optionalString withVoice '' 29 28 substituteInPlace "discord/opus.py" \
+30
pkgs/development/python-modules/docx2python/default.nix
··· 1 + { lib, buildPythonPackage, fetchFromGitHub, pytestCheckHook }: 2 + 3 + buildPythonPackage rec { 4 + pname = "docx2python"; 5 + version = "unstable-2020-11-15"; 6 + 7 + # Pypi does not contain tests 8 + src = fetchFromGitHub { 9 + owner = "ShayHill"; 10 + repo = pname; 11 + rev = "21b2edafc0a01a6cfb73aefc61747a65917e2cad"; 12 + sha256 = "1nwg17ziwm9a2x7yxsscj8zgc1d383ifsk5w7qa2fws6gf627kyi"; 13 + }; 14 + 15 + preCheck = "cd test"; # Tests require the `test/resources` folder to be accessible 16 + checkInputs = [ pytestCheckHook ]; 17 + disabledTests = [ # asserts related to file deletions fail 18 + "test_docx2python.py" 19 + "test_docx_context.py" 20 + "test_google_docs.py" 21 + ]; 22 + pythonImportsCheck = [ "docx2python" ]; 23 + 24 + meta = with lib; { 25 + homepage = "https://github.com/ShayHill/docx2python"; 26 + description = "Extract docx headers, footers, (formatted) text, footnotes, endnotes, properties, and images"; 27 + maintainers = [ maintainers.ivar ]; 28 + license = licenses.mit; 29 + }; 30 + }
+2 -2
pkgs/development/python-modules/exdown/default.nix
··· 3 3 4 4 buildPythonPackage rec { 5 5 pname = "exdown"; 6 - version = "0.8.5"; 6 + version = "0.8.6"; 7 7 format = "pyproject"; 8 8 9 9 disabled = isPy27; 10 10 11 11 src = fetchPypi { 12 12 inherit pname version; 13 - sha256 = "1ly67whyfn74nr0dncarf3xbd96hacvzgjihx4ibckkc4h9z46bj"; 13 + sha256 = "sha256-BCn+rkMxQSw/gO+dpzgpYSOqEiooWFzSh7LUYIFr6wE="; 14 14 }; 15 15 16 16 propagatedBuildInputs = lib.optionals (pythonOlder "3.8") [ importlib-metadata ];
+2
pkgs/development/python-modules/fiona/default.nix
··· 2 2 , attrs, click, cligj, click-plugins, six, munch, enum34 3 3 , pytest, boto3, mock, giflib, pytz 4 4 , gdal_2 # can't bump to 3 yet, https://github.com/Toblerity/Fiona/issues/745 5 + , certifi 5 6 }: 6 7 7 8 buildPythonPackage rec { ··· 25 26 26 27 propagatedBuildInputs = [ 27 28 attrs 29 + certifi 28 30 click 29 31 cligj 30 32 click-plugins
+30 -35
pkgs/development/python-modules/fipy/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 - , fetchPypi 4 3 , numpy 5 4 , scipy 6 5 , pyamg ··· 18 17 , fetchurl 19 18 }: 20 19 21 - let 22 - not_darwin_inputs = lib.optionals (! stdenv.isDarwin) [ gmsh ]; 23 - in 24 - buildPythonPackage rec { 25 - pname = "fipy"; 26 - version = "3.4.1"; 20 + buildPythonPackage rec { 21 + pname = "fipy"; 22 + version = "3.4.2.1"; 27 23 28 - src = fetchurl { 29 - url = "https://github.com/usnistgov/fipy/releases/download/${version}/FiPy-${version}.tar.gz"; 30 - sha256 = "0078yg96fknqhywn1v26ryc5z47c0j0c1qwz6p8wsjn0wmzggaqk"; 31 - }; 24 + src = fetchurl { 25 + url = "https://github.com/usnistgov/fipy/releases/download/${version}/FiPy-${version}.tar.gz"; 26 + sha256 = "0v5yk9b4hksy3176w4vm4gagb9kxqgv75zcyswlqvl371qwy1grk"; 27 + }; 32 28 33 - propagatedBuildInputs = [ 34 - numpy 35 - scipy 36 - pyamg 37 - matplotlib 38 - tkinter 39 - mpi4py 40 - future 41 - scikit-fmm 42 - openssh 43 - ] ++ lib.optionals isPy27 [ pysparse ] ++ not_darwin_inputs; 29 + propagatedBuildInputs = [ 30 + numpy 31 + scipy 32 + pyamg 33 + matplotlib 34 + tkinter 35 + mpi4py 36 + future 37 + scikit-fmm 38 + openssh 39 + ] ++ lib.optionals isPy27 [ pysparse ] 40 + ++ lib.optionals (!stdenv.isDarwin) [ gmsh ]; 44 41 45 - checkInputs = not_darwin_inputs; 46 - 47 - checkPhase = '' 48 - export OMPI_MCA_plm_rsh_agent=${openssh}/bin/ssh 49 - ${python.interpreter} setup.py test --modules 50 - ''; 42 + checkPhase = '' 43 + export OMPI_MCA_plm_rsh_agent=${openssh}/bin/ssh 44 + ${python.interpreter} setup.py test --modules 45 + ''; 51 46 52 - meta = with lib; { 53 - homepage = "https://www.ctcms.nist.gov/fipy/"; 54 - description = "A Finite Volume PDE Solver Using Python"; 55 - license = licenses.free; 56 - maintainers = with maintainers; [ costrouc wd15 ]; 57 - }; 58 - } 47 + meta = with lib; { 48 + homepage = "https://www.ctcms.nist.gov/fipy/"; 49 + description = "A Finite Volume PDE Solver Using Python"; 50 + license = licenses.free; 51 + maintainers = with maintainers; [ costrouc wd15 ]; 52 + }; 53 + }
+26 -8
pkgs/development/python-modules/freebox-api/default.nix
··· 2 2 , aiohttp 3 3 , buildPythonPackage 4 4 , fetchFromGitHub 5 - , poetry 5 + , fetchpatch 6 + , importlib-metadata 7 + , poetry-core 8 + , pytestCheckHook 6 9 , pythonOlder 7 - , pytestCheckHook 8 10 }: 9 11 10 12 buildPythonPackage rec { 11 13 pname = "freebox-api"; 12 - version = "0.0.9"; 14 + version = "0.0.10"; 13 15 format = "pyproject"; 14 - disabled = pythonOlder "3.6"; 16 + disabled = pythonOlder "3.7"; 15 17 16 18 src = fetchFromGitHub { 17 19 owner = "hacf-fr"; 18 20 repo = pname; 19 21 rev = "v${version}"; 20 - sha256 = "0qn7jqfbp850aqgfsxjfv14myi6idz6sf7024p6wpqpa2xk0vfiq"; 22 + sha256 = "sha256-yUcHdSHSgWxZl0z7Ue0MestvGhiXkDsxArNoDk0ZkR4="; 21 23 }; 22 24 23 - nativeBuildInputs = [ poetry ]; 25 + patches = [ 26 + # Switch to poetry-core, https://github.com/hacf-fr/freebox-api/pull/187 27 + (fetchpatch { 28 + name = "switch-to-poetry-core.patch"; 29 + url = "https://github.com/hacf-fr/freebox-api/commit/07356ac65483bc24fb1ed32612e77f2c2eed0134.patch"; 30 + sha256 = "1zwricrwsqy01pmhrjy41gh4kxb3gki8z8yxlpywd66y7gid547r"; 31 + }) 32 + ]; 24 33 25 - propagatedBuildInputs = [ aiohttp ]; 34 + nativeBuildInputs = [ 35 + poetry-core 36 + ]; 37 + 38 + propagatedBuildInputs = [ 39 + aiohttp 40 + ] ++ lib.optionals (pythonOlder "3.8") [ importlib-metadata ]; 26 41 27 - checkInputs = [ pytestCheckHook ]; 42 + checkInputs = [ 43 + pytestCheckHook 44 + ]; 45 + 28 46 pythonImportsCheck = [ "freebox_api" ]; 29 47 30 48 meta = with lib; {
+2 -2
pkgs/development/python-modules/google-api-core/default.nix
··· 15 15 16 16 buildPythonPackage rec { 17 17 pname = "google-api-core"; 18 - version = "1.25.1"; 18 + version = "1.26.3"; 19 19 20 20 src = fetchPypi { 21 21 inherit pname version; 22 - sha256 = "0e152ec37b8481d1be1258d95844a5a7031cd3d83d7c7046d9e9b2d807042440"; 22 + sha256 = "sha256-uRQ0XH6iOGEWJpOidwO6uASlVQT35umryv8XTYDfMqw="; 23 23 }; 24 24 25 25 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/google-auth-httplib2/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "google-auth-httplib2"; 15 - version = "0.0.4"; 15 + version = "0.1.0"; 16 16 17 17 src = fetchPypi { 18 18 inherit pname version; 19 - sha256 = "0fdwnx2yd65f5vhnmn39f4xnxac5j6x0pv2p42qifrdi1z32q2cd"; 19 + sha256 = "sha256-oHw5/WMr7KzT8HcY39YCG/OWl48DrTzkMh0GABXMMKw="; 20 20 }; 21 21 22 22 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/google-auth-oauthlib/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "google-auth-oauthlib"; 13 - version = "0.4.2"; 13 + version = "0.4.4"; 14 14 15 15 src = fetchPypi { 16 16 inherit pname version; 17 - sha256 = "1nai9k86g7g7w1pxk105dllncgax8nc5hpmk758b3jnqkb1mpdk5"; 17 + sha256 = "sha256-CYMsbnUDL5OBjt8a/+R0YSHWQMYlpb75tclq9nbpju4="; 18 18 }; 19 19 20 20 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/google-auth/default.nix
··· 18 18 19 19 buildPythonPackage rec { 20 20 pname = "google-auth"; 21 - version = "1.24.0"; 21 + version = "1.28.0"; 22 22 23 23 src = fetchPypi { 24 24 inherit pname version; 25 - sha256 = "0bmdqkyv8k8n6s8dss4zpbcq1cdxwicpb42kwybd02ia85mh43hb"; 25 + sha256 = "sha256-m9Q20ZqwRwAaE0ByDStinrlt1QMljFJJIewq8+6IqA4="; 26 26 }; 27 27 28 28 propagatedBuildInputs = [
+5
pkgs/development/python-modules/google-cloud-asset/default.nix
··· 24 24 sha256 = "05q0yaw6b553qmzylr45zin17h8mvi8yyyxhbv3cxa7f0ahviw8w"; 25 25 }; 26 26 27 + postPatch = '' 28 + substituteInPlace setup.py \ 29 + --replace '"google-cloud-org-policy >= 0.1.2, < 0.2.0dev"' '"google-cloud-org-policy >= 0.1.2, < 0.2.1"' 30 + ''; 31 + 27 32 propagatedBuildInputs = [ 28 33 grpc_google_iam_v1 29 34 google-api-core
+2 -2
pkgs/development/python-modules/google-cloud-bigquery-datatransfer/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "google-cloud-bigquery-datatransfer"; 14 - version = "3.0.1"; 14 + version = "3.1.0"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "c5669410018eb41cecf6f9c90136d24d0ca9ed141bda8fbb3d52cd3de7162960"; 18 + sha256 = "sha256-mAZSVxiTiLbMeXR4xLK9+G6ejNyspdFw3tAnZGREpYY="; 19 19 }; 20 20 21 21 propagatedBuildInputs = [ google-api-core libcst proto-plus ];
+2 -2
pkgs/development/python-modules/google-cloud-core/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "google-cloud-core"; 14 - version = "1.5.0"; 14 + version = "1.6.0"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "01liq4nrd2g3ingg8v0ly4c86db8agnr9h1fiz219c7fz0as0xqj"; 18 + sha256 = "sha256-xquxhSdUU3n8gu/E3nXOmjdyzK0vxkWtrOWTugl8uwI="; 19 19 }; 20 20 21 21 propagatedBuildInputs = [ google-api-core ];
+2 -2
pkgs/development/python-modules/google-cloud-dataproc/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "google-cloud-dataproc"; 14 - version = "2.3.0"; 14 + version = "2.3.1"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "09e53889a60d84a71c505fe77174d242f00f28f989977aea91f6005cadfa466b"; 18 + sha256 = "sha256-TADApBkE4DvEFkVFy56Flh2s6XR9uGxzGTf5aspohsA="; 19 19 }; 20 20 21 21 propagatedBuildInputs = [ google-api-core libcst proto-plus ];
+2 -2
pkgs/development/python-modules/google-cloud-error-reporting/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "google-cloud-error-reporting"; 15 - version = "1.1.0"; 15 + version = "1.1.2"; 16 16 17 17 src = fetchPypi { 18 18 inherit pname version; 19 - sha256 = "2fd6fe25343f7017c22e2733a0358c64b3171edc1669d0c8a1e1f07f86a048c4"; 19 + sha256 = "sha256-NT/+2mtIaEMyXnmM1fWX4kEV9pb1+aNas2lNobUPR14="; 20 20 }; 21 21 22 22 postPatch = ''
+2 -2
pkgs/development/python-modules/google-cloud-firestore/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "google-cloud-firestore"; 16 - version = "2.0.2"; 16 + version = "2.1.0"; 17 17 18 18 src = fetchPypi { 19 19 inherit pname version; 20 - sha256 = "1q5s2gpkibnjxal9zrz02jfnazf7rxk0bi0ln5a3di6i47kjnga9"; 20 + sha256 = "sha256-kG68fG9EqwvE72nzc89MXwEQ/YYEM9tYH6zK2iTCFJo="; 21 21 }; 22 22 23 23 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/google-cloud-logging/default.nix
··· 15 15 16 16 buildPythonPackage rec { 17 17 pname = "google-cloud-logging"; 18 - version = "2.3.0"; 18 + version = "2.3.1"; 19 19 20 20 src = fetchPypi { 21 21 inherit pname version; 22 - sha256 = "b5675ce159db4e9c1d755003b76190460766f426a7c3c1519014cdd5ce66e890"; 22 + sha256 = "sha256-yi3lG7tKi2BkU7vtMIEPsll1UX/JxrNj4G+DJaGQ/+k="; 23 23 }; 24 24 25 25 propagatedBuildInputs = [ google-api-core google-cloud-core proto-plus ];
+4 -3
pkgs/development/python-modules/google-cloud-monitoring/default.nix
··· 5 5 , google-cloud-testutils 6 6 , libcst 7 7 , proto-plus 8 + , pandas 8 9 , pytestCheckHook 9 10 , pytest-asyncio 10 11 , mock ··· 12 13 13 14 buildPythonPackage rec { 14 15 pname = "google-cloud-monitoring"; 15 - version = "2.0.1"; 16 + version = "2.2.1"; 16 17 17 18 src = fetchPypi { 18 19 inherit pname version; 19 - sha256 = "639408cac9660b6c7c2324bf1b2461c9c8e338518b9ebb7ebfac833a61d753eb"; 20 + sha256 = "sha256-QeMJBJKjW3Zu0p0mSmo5dVOJNwRmmA5FKXRXjCd+zN4="; 20 21 }; 21 22 22 23 propagatedBuildInputs = [ libcst google-api-core proto-plus ]; 23 24 24 - checkInputs = [ google-cloud-testutils mock pytestCheckHook pytest-asyncio ]; 25 + checkInputs = [ google-cloud-testutils mock pandas pytestCheckHook pytest-asyncio ]; 25 26 26 27 disabledTests = [ 27 28 # requires credentials
+4 -4
pkgs/development/python-modules/google-cloud-org-policy/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, pythonOlder, google-api-core }: 1 + { lib, buildPythonPackage, fetchPypi, pythonOlder, google-api-core, proto-plus }: 2 2 3 3 buildPythonPackage rec { 4 4 pname = "google-cloud-org-policy"; 5 - version = "0.1.2"; 5 + version = "0.2.0"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "0ncgcnbvmgqph54yh2pjx2hh82gnkhsrw5yirp4wlf7jclh6j9xh"; 9 + sha256 = "sha256-tGNwSv+rMnwdP6SvKAqFhjW19ZqIRWsqCNtiozajUqo="; 10 10 }; 11 11 12 - propagatedBuildInputs = [ google-api-core ]; 12 + propagatedBuildInputs = [ google-api-core proto-plus ]; 13 13 14 14 # No tests in repo 15 15 doCheck = false;
+2 -2
pkgs/development/python-modules/google-cloud-pubsub/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "google-cloud-pubsub"; 16 - version = "2.4.0"; 16 + version = "2.4.1"; 17 17 18 18 src = fetchPypi { 19 19 inherit pname version; 20 - sha256 = "ff9933573dadb02176dc514662354949d0ea784cc4588d22226c2bf7eb90e797"; 20 + sha256 = "sha256-5gyqZ+JthC/Qja8ZCX79r4K+evuZY5jPZ73cA6hrgSA="; 21 21 }; 22 22 23 23 propagatedBuildInputs = [ grpc_google_iam_v1 google-api-core libcst proto-plus ];
+2 -2
pkgs/development/python-modules/google-cloud-secret-manager/default.nix
··· 12 12 13 13 buildPythonPackage rec { 14 14 pname = "google-cloud-secret-manager"; 15 - version = "2.3.0"; 15 + version = "2.4.0"; 16 16 17 17 src = fetchPypi { 18 18 inherit pname version; 19 - sha256 = "4df4b7e3f83bc12d6bd29e69608172586b6ddfc7586dd2a2fd70cc4f18ed05c7"; 19 + sha256 = "sha256-/ROngNZJld6iA8WjbJLLNzu5vFWPFUNdTikc70kNkQ4="; 20 20 }; 21 21 22 22 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/google-cloud-spanner/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "google-cloud-spanner"; 17 - version = "3.0.0"; 17 + version = "3.3.0"; 18 18 19 19 src = fetchPypi { 20 20 inherit pname version; 21 - sha256 = "060c53bc6f541660a2fe868fd83a695207d4e7b050e04fe103d1e77634b813c7"; 21 + sha256 = "sha256-XnOCmxQ6YCO1C7RYHzcZY4ihrt2KommWTkTD9y+B5tg="; 22 22 }; 23 23 24 24 propagatedBuildInputs = [ google-cloud-core grpc_google_iam_v1 libcst proto-plus sqlparse ];
+2 -2
pkgs/development/python-modules/google-cloud-speech/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "google-cloud-speech"; 14 - version = "2.2.0"; 14 + version = "2.2.1"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "013279a411644545ee0d67a5c077d0f19db58b846d758f36a8cc759f9c9e0a19"; 18 + sha256 = "sha256-AviYDI68Z11M/rqHgQTQugYNemPTA5nW4aVQTiwMYxI="; 19 19 }; 20 20 21 21 propagatedBuildInputs = [ libcst google-api-core proto-plus ];
+4 -2
pkgs/development/python-modules/google-cloud-storage/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "google-cloud-storage"; 16 - version = "1.35.1"; 16 + version = "1.37.0"; 17 17 18 18 src = fetchPypi { 19 19 inherit pname version; 20 - sha256 = "dc076b6af6da991252416639cb93831f8e50c8328d5ac3fb8e03e40cd8de2290"; 20 + sha256 = "sha256-IAPF7Uc/mzfQRfMMTIvn0w19Dripe80sWLOovFScTMw="; 21 21 }; 22 22 23 23 propagatedBuildInputs = [ ··· 41 41 "get" 42 42 "post" 43 43 "test_build_api_url" 44 + "test_ctor_mtls" 45 + "test_open" 44 46 ]; 45 47 46 48 pytestFlagsArray = [
+4 -4
pkgs/development/python-modules/google-cloud-testutils/default.nix
··· 1 - { lib, buildPythonPackage, fetchPypi, google-auth, six }: 1 + { lib, buildPythonPackage, fetchPypi, click, google-auth, six }: 2 2 3 3 buildPythonPackage rec { 4 4 pname = "google-cloud-testutils"; 5 - version = "0.1.0"; 5 + version = "0.2.0"; 6 6 7 7 src = fetchPypi { 8 8 inherit pname version; 9 - sha256 = "1bn1pz00lxym3vkl6l45b3nydpmfdvmylwggh2lspldrxwx39a0k"; 9 + sha256 = "sha256-ojvnzCO8yxrm3rt0pH3FtRhYtjIvzwNMqS/npKy4lvM="; 10 10 }; 11 11 12 - propagatedBuildInputs = [ google-auth six ]; 12 + propagatedBuildInputs = [ click google-auth six ]; 13 13 14 14 # does not contain tests 15 15 doCheck = false;
+2 -2
pkgs/development/python-modules/google-cloud-texttospeech/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "google-cloud-texttospeech"; 14 - version = "2.2.0"; 14 + version = "2.3.0"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "17igfwh34369gkvsbrm46j1ii61i6268wg2g2dl9c65nf9z3kgfb"; 18 + sha256 = "sha256-zzssVnXA1xe3270yEOREJ9GdmyRPjV1F4EBelf9AQ/c="; 19 19 }; 20 20 21 21 propagatedBuildInputs = [ libcst google-api-core proto-plus ];
+2 -2
pkgs/development/python-modules/google-cloud-translate/default.nix
··· 14 14 15 15 buildPythonPackage rec { 16 16 pname = "google-cloud-translate"; 17 - version = "3.0.2"; 17 + version = "3.1.0"; 18 18 19 19 src = fetchPypi { 20 20 inherit pname version; 21 - sha256 = "1s2gvlzfqd2gsrzaz7yl9q8s1k03dlsjahgg95s017vlcn21d0v1"; 21 + sha256 = "sha256-zVRD2lWRaKtSlZn84Rqpj+a1OT7Wcak524TKsBctueE="; 22 22 }; 23 23 24 24 propagatedBuildInputs = [ google-api-core google-cloud-core libcst proto-plus ];
+2 -2
pkgs/development/python-modules/google-cloud-videointelligence/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "google-cloud-videointelligence"; 14 - version = "2.0.0"; 14 + version = "2.1.0"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "1yhmizig41ymr2dz0i6ccrwszp0ivyykmq11vqxp82l9ncjima82"; 18 + sha256 = "sha256-gn/KWf3A4SkTqt9rqwYcsaxvfKXPvb7DXJ+zryGjWIA="; 19 19 }; 20 20 21 21 propagatedBuildInputs = [ google-api-core proto-plus ];
+2 -2
pkgs/development/python-modules/google-cloud-vision/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "google-cloud-vision"; 14 - version = "2.2.0"; 14 + version = "2.3.0"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "9a205be275739c141873fa9fbd7c3f9ec6170972c85d5c75e9b4c53b5db839a3"; 18 + sha256 = "sha256-6XYHADzyk0/WSGk9wni9bOtVURJ+U2Eve8LAh0Eg7KI="; 19 19 }; 20 20 21 21 propagatedBuildInputs = [ libcst google-api-core proto-plus];
+2 -2
pkgs/development/python-modules/google-cloud-websecurityscanner/default.nix
··· 11 11 12 12 buildPythonPackage rec { 13 13 pname = "google-cloud-websecurityscanner"; 14 - version = "1.0.0"; 14 + version = "1.1.0"; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "14sky9bkl00n65ksig3f6psm31pkmkvlcprlk6s9if470j40zrhx"; 18 + sha256 = "sha256-lrMnp9jVndz0C8VdreVudYdwh7zSdRniPHYm9BNdjak="; 19 19 }; 20 20 21 21 propagatedBuildInputs = [ google-api-core libcst proto-plus ];
+2 -2
pkgs/development/python-modules/googleapis-common-protos/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "googleapis-common-protos"; 10 - version = "1.52.0"; 10 + version = "1.53.0"; 11 11 12 12 src = fetchPypi { 13 13 inherit pname version; 14 - sha256 = "0lakcsd35qm5x4visvw6z5f1niasv9a0mjyf2bd98wqi0z41c1sn"; 14 + sha256 = "sha256-qI7okDqgqB9sPOwtXPYtPIqmfAZDmwSWtJBI+xhU6/Q="; 15 15 }; 16 16 17 17 propagatedBuildInputs = [ grpc protobuf ];
+11 -7
pkgs/development/python-modules/gsd/default.nix
··· 1 1 { lib, buildPythonPackage, fetchFromGitHub, isPy27 2 - , numpy 3 - , pytest 2 + , cython, numpy 3 + , pytestCheckHook 4 4 }: 5 5 6 6 buildPythonPackage rec { 7 - version = "1.9.3"; 7 + version = "2.4.1"; 8 8 pname = "gsd"; 9 9 disabled = isPy27; 10 10 ··· 12 12 owner = "glotzerlab"; 13 13 repo = pname; 14 14 rev = "v${version}"; 15 - sha256 = "07hw29r2inyp493dia4fx3ysfr1wxi2jb3n9cmwdi0l54s2ahqvf"; 15 + sha256 = "02zxfmqw7a5kz8qjdph9a9961mbkd4haxwwa28yjkxs5hzs5x3c8"; 16 16 }; 17 17 18 + nativeBuildInputs = [ cython ]; 18 19 propagatedBuildInputs = [ numpy ]; 19 20 20 - checkInputs = [ pytest ]; 21 - checkPhase = '' 22 - pytest 21 + checkInputs = [ pytestCheckHook ]; 22 + preCheck = '' 23 + pushd gsd/test 24 + ''; 25 + postCheck = '' 26 + popd 23 27 ''; 24 28 25 29 meta = with lib; {
+3 -3
pkgs/development/python-modules/gssapi/default.nix
··· 17 17 18 18 buildPythonPackage rec { 19 19 pname = "gssapi"; 20 - version = "1.6.10"; 20 + version = "1.6.12"; 21 21 disabled = pythonOlder "3.6"; 22 22 23 23 src = fetchFromGitHub { 24 24 owner = "pythongssapi"; 25 25 repo = "python-${pname}"; 26 26 rev = "v${version}"; 27 - sha256 = "11w8z9ik6zzv3pw3319mz91cgbfkgx0mffxbapqnhilzij2jad4q"; 27 + sha256 = "sha256-x86/KMcXChPLzoCqR9xwemusWktf/seHLQmEKLco3GQ="; 28 28 }; 29 29 30 30 # It's used to locate headers 31 31 postPatch = '' 32 32 substituteInPlace setup.py \ 33 - --replace "get_output('krb5-config gssapi --prefix')" "'${lib.getDev krb5Full}'" 33 + --replace 'get_output(f"{kc} gssapi --prefix")' '"${lib.getDev krb5Full}"' 34 34 ''; 35 35 36 36 nativeBuildInputs = [
+2 -2
pkgs/development/python-modules/hetzner/default.nix
··· 5 5 6 6 buildPythonPackage rec { 7 7 pname = "hetzner"; 8 - version = "0.8.2"; 8 + version = "0.8.3"; 9 9 10 10 src = fetchFromGitHub { 11 11 repo = "hetzner"; 12 12 owner = "aszlig"; 13 13 rev = "v${version}"; 14 - sha256 = "152fklxff08s71v0b78yp5ajwpqyszm3sd7j0qsrwa2x9ik4968h"; 14 + sha256 = "0nhm7j2y4rgmrl0c1rklg982qllp7fky34dchqwd4czbsdnv9j7a"; 15 15 }; 16 16 17 17 meta = with lib; {
+2 -2
pkgs/development/python-modules/hstspreload/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "hstspreload"; 9 - version = "2021.2.15"; 9 + version = "2021.3.29"; 10 10 disabled = isPy27; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "sethmlarson"; 14 14 repo = pname; 15 15 rev = version; 16 - sha256 = "sha256-vHq4DjDh7hBNAK/h/KdzqaEgrG5bg7VQ8fVWuxV7vOg="; 16 + sha256 = "sha256-F5EXwCoXYmFkV0VWT5leIWZU2xH1t6T0LuxodAANS8E="; 17 17 }; 18 18 19 19 # tests require network connection
+2 -2
pkgs/development/python-modules/kerberos/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchPypi 4 - , kerberos 4 + , libkrb5 5 5 }: 6 6 7 7 buildPythonPackage rec { ··· 13 13 sha256 = "cdd046142a4e0060f96a00eb13d82a5d9ebc0f2d7934393ed559bac773460a2c"; 14 14 }; 15 15 16 - nativeBuildInputs = [ kerberos ]; 16 + nativeBuildInputs = [ libkrb5 ]; 17 17 18 18 # No tests in archive 19 19 doCheck = false;
+17 -9
pkgs/development/python-modules/lark-parser/default.nix
··· 1 1 { lib 2 2 , buildPythonPackage 3 3 , fetchFromGitHub 4 + , regex 5 + # Test inputs 6 + , pytestCheckHook 4 7 }: 5 8 6 9 buildPythonPackage rec { 7 10 pname = "lark-parser"; 8 - version = "0.8.8"; 11 + version = "0.11.2"; 9 12 10 13 src = fetchFromGitHub { 11 14 owner = "lark-parser"; 12 15 repo = "lark"; 13 16 rev = version; 14 - sha256 = "1q2dvkkfx9dvag5v5ps0ki4avh7i003gn9sj30jy1rsv1bg4y2mb"; 17 + sha256 = "1v1piaxpz4780km2z5i6sr9ygi9wpn09yyh999b3f4y0dcz20pbd"; 15 18 }; 16 19 17 - # tests of Nearley support require js2py 18 - preCheck = '' 19 - rm -r tests/test_nearley 20 - ''; 20 + propagatedBuildInputs = [ regex ]; 21 21 22 - meta = { 22 + checkInputs = [ pytestCheckHook ]; 23 + disabledTestPaths = [ 24 + "tests/test_nearley" # requires Js2Py package (not in nixpkgs) 25 + ]; 26 + disabledTests = [ 27 + "test_override_rule" # has issue with file access paths 28 + ]; 29 + 30 + meta = with lib; { 23 31 description = "A modern parsing library for Python, implementing Earley & LALR(1) and an easy interface"; 24 32 homepage = "https://github.com/lark-parser/lark"; 25 - license = lib.licenses.mit; 26 - maintainers = with lib.maintainers; [ fridh ]; 33 + license = licenses.mit; 34 + maintainers = with maintainers; [ fridh drewrisinger ]; 27 35 }; 28 36 }
+2 -2
pkgs/development/python-modules/libcst/default.nix
··· 15 15 16 16 buildPythonPackage rec { 17 17 pname = "libcst"; 18 - version = "0.3.17"; 18 + version = "0.3.18"; 19 19 20 20 # Some files for tests missing from PyPi 21 21 # https://github.com/Instagram/LibCST/issues/331 ··· 23 23 owner = "instagram"; 24 24 repo = pname; 25 25 rev = "v${version}"; 26 - sha256 = "sha256-mlSeB9OjCiUVYwcPYNrQdlfcj9DV/+wqVWt91uFsQsU="; 26 + sha256 = "sha256-19yGaKBLpGASSPv/aSX0kx9lh2JxKExHJDKKtuBbuqI="; 27 27 }; 28 28 29 29 disabled = pythonOlder "3.6";
+10 -9
pkgs/development/python-modules/milc/default.nix
··· 4 4 , appdirs 5 5 , argcomplete 6 6 , colorama 7 - , gnugrep 7 + , nose2 8 + , semver 8 9 }: 9 10 10 11 buildPythonPackage rec { 11 12 pname = "milc"; 12 - version = "1.0.10"; 13 + version = "1.3.0"; 13 14 14 15 src = fetchFromGitHub { 15 16 owner = "clueboard"; 16 17 repo = "milc"; 17 18 rev = version; 18 - sha256 = "04mk057b6jh0k4maqkg80kpilxak9r7vlr9xqwzczh2gs3g2x573"; 19 + sha256 = "sha256-koyOBz+pB/vkTHOR1p77ACO11/ULDIBzqsszUUpnE88="; 19 20 }; 20 21 21 - checkInputs = [ gnugrep ]; 22 22 propagatedBuildInputs = [ appdirs argcomplete colorama ]; 23 23 24 - # Upstream has a nose2 test suite that runs this hello script in a handful of 25 - # ways, but it's not in setup.py and makes assumptions about relative paths in 26 - # the src repo, so just sanity-check basic functionality. 24 + checkInputs = [ nose2 semver ]; 25 + 27 26 checkPhase = '' 28 - patchShebangs ./hello 29 - ./hello | grep "Hello, World" 27 + patchShebangs example hello 28 + nose2 30 29 ''; 30 + 31 + pythonImportsCheck = [ "milc" ]; 31 32 32 33 meta = with lib; { 33 34 description = "An Opinionated Batteries-Included Python 3 CLI Framework";
+2 -2
pkgs/development/python-modules/proto-plus/default.nix
··· 10 10 11 11 buildPythonPackage rec { 12 12 pname = "proto-plus"; 13 - version = "1.13.0"; 13 + version = "1.18.1"; 14 14 disabled = !isPy3k; 15 15 16 16 src = fetchPypi { 17 17 inherit pname version; 18 - sha256 = "1i5jjnwpd288378h37zads08h695iwmhxm0sxbr3ln6aax97rdb1"; 18 + sha256 = "sha256-z8RUdMftoP48S57KJUISTyoP9VQyQr7GHo0IvOD1vUg="; 19 19 }; 20 20 21 21 propagatedBuildInputs = [ protobuf ];
+5 -15
pkgs/development/python-modules/pyaxmlparser/default.nix
··· 1 - { buildPythonPackage, lib, lxml, click, fetchFromGitHub, pytest, isPy3k }: 1 + { buildPythonPackage, lib, lxml, click, fetchFromGitHub, pytestCheckHook, asn1crypto }: 2 2 3 3 buildPythonPackage rec { 4 - version = "0.3.24"; 4 + version = "0.3.26"; 5 5 pname = "pyaxmlparser"; 6 6 7 - # the PyPI tarball doesn't ship tests. 8 7 src = fetchFromGitHub { 9 8 owner = "appknox"; 10 9 repo = pname; 11 10 rev = "v${version}"; 12 - sha256 = "0fys26p7xhbnbdzp80zm6n3mragp38p08nyrsnilfgnlpi6rjpg0"; 11 + sha256 = "sha256-wD0rN00q4ipKnKubptrgrjNwkBpqsA+ix2xedOOr8Yg="; 13 12 }; 14 13 15 - disabled = !isPy3k; 16 - 17 - postPatch = '' 18 - substituteInPlace setup.py --replace "click==6.7" "click" 19 - ''; 20 - 21 - propagatedBuildInputs = [ lxml click ]; 14 + propagatedBuildInputs = [ asn1crypto click lxml ]; 22 15 23 - checkInputs = [ pytest ]; 24 - checkPhase = '' 25 - py.test tests/ 26 - ''; 16 + checkInputs = [ pytestCheckHook ]; 27 17 28 18 meta = with lib; { 29 19 description = "Python3 Parser for Android XML file and get Application Name without using Androguard";
+1 -1
pkgs/development/python-modules/pyelftools/default.nix
··· 16 16 sha256 = "09igdym2qj2fvfcazbz25qybmgz7ccrn25xn3havfkdkka0z0i3p"; 17 17 }; 18 18 19 - doCheck = stdenv.is64bit && !stdenv.isDarwin; 19 + doCheck = stdenv.hostPlatform.system == "x86_64-linux"; 20 20 21 21 checkPhase = '' 22 22 patchelf --set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" test/external_tools/readelf
+2 -2
pkgs/development/python-modules/pysam/default.nix
··· 7 7 , cython 8 8 , htslib 9 9 , libdeflate 10 - , lzma 10 + , xz 11 11 , pytest 12 12 , samtools 13 13 , zlib ··· 33 33 curl 34 34 cython 35 35 libdeflate 36 - lzma 36 + xz 37 37 zlib 38 38 ]; 39 39
+2 -2
pkgs/development/python-modules/python-smarttub/default.nix
··· 13 13 14 14 buildPythonPackage rec { 15 15 pname = "python-smarttub"; 16 - version = "0.0.19"; 16 + version = "0.0.21"; 17 17 disabled = pythonOlder "3.8"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "mdz"; 21 21 repo = pname; 22 22 rev = "v${version}"; 23 - sha256 = "01i4pvgvpl7inwhy53c6b34pi5zvfiv2scn507j8jdg5cjs04g80"; 23 + sha256 = "sha256-7phx6CI6sqUCZIUxL6ea25UWAcI3NAz66hIleUfN4bk="; 24 24 }; 25 25 26 26 propagatedBuildInputs = [
+2 -2
pkgs/development/python-modules/pytorch/default.nix
··· 116 116 in buildPythonPackage rec { 117 117 pname = "pytorch"; 118 118 # Don't forget to update pytorch-bin to the same version. 119 - version = "1.8.0"; 119 + version = "1.8.1"; 120 120 121 121 disabled = !isPy3k; 122 122 ··· 131 131 repo = "pytorch"; 132 132 rev = "v${version}"; 133 133 fetchSubmodules = true; 134 - sha256 = "sha256-qdZUtlxHZjCYoGfTdp5Bq3MtfXolWZrvib0kuzF3uIc="; 134 + sha256 = "sha256-HERbvmrfhWwH164GFHU/M0KbhVAuhI5sBZSxCZy8mRk="; 135 135 }; 136 136 137 137 patches = lib.optionals stdenv.isDarwin [
+29
pkgs/development/python-modules/riprova/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchPypi 4 + , six 5 + }: 6 + 7 + buildPythonPackage rec{ 8 + pname = "riprova"; 9 + version = "0.2.7"; 10 + 11 + src = fetchPypi { 12 + inherit pname version; 13 + sha256 = "04drdvjjbh370csv2vb5zamg2aanxqkfm6w361qkybnra4g4g0dz"; 14 + }; 15 + 16 + propagatedBuildInputs = [ six ]; 17 + 18 + # PyPI archive doesn't have tests 19 + doCheck = false; 20 + 21 + pythonImportsCheck = [ "riprova" ]; 22 + 23 + meta = with lib; { 24 + homepage = "https://github.com/h2non/riprova"; 25 + description = "Small and versatile library to retry failed operations using different backoff strategies"; 26 + license = licenses.mit; 27 + maintainers = with maintainers; [ mmilata ]; 28 + }; 29 + }
+2 -2
pkgs/development/python-modules/rpy2/2.nix
··· 9 9 , rWrapper 10 10 , rPackages 11 11 , pcre 12 - , lzma 12 + , xz 13 13 , bzip2 14 14 , zlib 15 15 , icu ··· 35 35 readline 36 36 R 37 37 pcre 38 - lzma 38 + xz 39 39 bzip2 40 40 zlib 41 41 icu
+2 -2
pkgs/development/python-modules/rpy2/default.nix
··· 7 7 , rWrapper 8 8 , rPackages 9 9 , pcre 10 - , lzma 10 + , xz 11 11 , bzip2 12 12 , zlib 13 13 , icu ··· 46 46 47 47 buildInputs = [ 48 48 pcre 49 - lzma 49 + xz 50 50 bzip2 51 51 zlib 52 52 icu
+2 -2
pkgs/development/python-modules/sphinxcontrib-bibtex/default.nix
··· 9 9 }: 10 10 11 11 buildPythonPackage rec { 12 - version = "2.1.4"; 12 + version = "2.2.0"; 13 13 pname = "sphinxcontrib-bibtex"; 14 14 15 15 disabled = !isPy3k; 16 16 17 17 src = fetchPypi { 18 18 inherit pname version; 19 - sha256 = "f53ec0cd534d2c8f0a51b4b3473ced46e9cb0dd99a7c5019249fe0ef9cbef18e"; 19 + sha256 = "sha256-dQCEPhVNdpg8I7ylynOAll4HJcRrj0hMEyLQtYps47I="; 20 20 }; 21 21 22 22 propagatedBuildInputs = [ oset pybtex pybtex-docutils sphinx ];
+2
pkgs/development/python-modules/sunpy/default.nix
··· 5 5 , pythonOlder 6 6 , asdf 7 7 , astropy 8 + , setuptools-scm 8 9 , astropy-helpers 9 10 , astropy-extension-helpers 10 11 , beautifulsoup4 ··· 38 39 }; 39 40 40 41 nativeBuildInputs = [ 42 + setuptools-scm 41 43 astropy-extension-helpers 42 44 ]; 43 45
+2 -2
pkgs/development/python-modules/uproot3-methods/default.nix
··· 6 6 }: 7 7 8 8 buildPythonPackage rec { 9 - version = "0.10.0"; 9 + version = "0.10.1"; 10 10 pname = "uproot3-methods"; 11 11 12 12 src = fetchPypi { 13 13 inherit pname version; 14 - sha256 = "1rk9i1ra3panli96ghz80ddpqk77xb1kpxs3wf8rw0jy5d88pc26"; 14 + sha256 = "sha256-3Wj5C+HqJ2NguWNpg2hJ3ykEX3/k5TT5rCHqAHmO41g="; 15 15 }; 16 16 17 17 nativeBuildInputs = [ awkward0 ];
+5 -5
pkgs/development/r-modules/default.nix
··· 310 310 RGtk2 = [ pkgs.gtk2.dev ]; 311 311 rhdf5 = [ pkgs.zlib ]; 312 312 Rhdf5lib = [ pkgs.zlib ]; 313 - Rhpc = [ pkgs.zlib pkgs.bzip2.dev pkgs.icu pkgs.lzma.dev pkgs.mpi pkgs.pcre.dev ]; 314 - Rhtslib = [ pkgs.zlib.dev pkgs.automake pkgs.autoconf pkgs.bzip2.dev pkgs.lzma.dev pkgs.curl.dev ]; 313 + Rhpc = [ pkgs.zlib pkgs.bzip2.dev pkgs.icu pkgs.xz.dev pkgs.mpi pkgs.pcre.dev ]; 314 + Rhtslib = [ pkgs.zlib.dev pkgs.automake pkgs.autoconf pkgs.bzip2.dev pkgs.xz.dev pkgs.curl.dev ]; 315 315 rjags = [ pkgs.jags ]; 316 - rJava = [ pkgs.zlib pkgs.bzip2.dev pkgs.icu pkgs.lzma.dev pkgs.pcre.dev pkgs.jdk pkgs.libzip ]; 316 + rJava = [ pkgs.zlib pkgs.bzip2.dev pkgs.icu pkgs.xz.dev pkgs.pcre.dev pkgs.jdk pkgs.libzip ]; 317 317 Rlibeemd = [ pkgs.gsl_1 ]; 318 318 rmatio = [ pkgs.zlib.dev ]; 319 319 Rmpfr = [ pkgs.gmp pkgs.mpfr.dev ]; ··· 334 334 RVowpalWabbit = [ pkgs.zlib.dev pkgs.boost ]; 335 335 rzmq = [ pkgs.zeromq pkgs.pkg-config ]; 336 336 clustermq = [ pkgs.zeromq ]; 337 - SAVE = [ pkgs.zlib pkgs.bzip2 pkgs.icu pkgs.lzma pkgs.pcre ]; 337 + SAVE = [ pkgs.zlib pkgs.bzip2 pkgs.icu pkgs.xz pkgs.pcre ]; 338 338 sdcTable = [ pkgs.gmp pkgs.glpk ]; 339 339 seewave = [ pkgs.fftw.dev pkgs.libsndfile.dev ]; 340 340 seqinr = [ pkgs.zlib.dev ]; ··· 939 939 }); 940 940 941 941 littler = old.littler.overrideAttrs (attrs: with pkgs; { 942 - buildInputs = [ pcre lzma zlib bzip2 icu which ] ++ attrs.buildInputs; 942 + buildInputs = [ pcre xz zlib bzip2 icu which ] ++ attrs.buildInputs; 943 943 postInstall = '' 944 944 install -d $out/bin $out/share/man/man1 945 945 ln -s ../library/littler/bin/r $out/bin/r
+2 -2
pkgs/development/ruby-modules/gem-config/default.nix
··· 17 17 # This seperates "what to build" (the exact gem versions) from "how to build" 18 18 # (to make gems behave if necessary). 19 19 20 - { lib, fetchurl, writeScript, ruby, kerberos, libxml2, libxslt, python, stdenv, which 20 + { lib, fetchurl, writeScript, ruby, libkrb5, libxml2, libxslt, python, stdenv, which 21 21 , libiconv, postgresql, v8, clang, sqlite, zlib, imagemagick, lasem 22 22 , pkg-config , ncurses, xapian, gpgme, util-linux, tzdata, icu, libffi 23 23 , cmake, libssh2, openssl, libmysqlclient, darwin, git, perl, pcre, gecode_3, curl ··· 609 609 }; 610 610 611 611 timfel-krb5-auth = attrs: { 612 - buildInputs = [ kerberos ]; 612 + buildInputs = [ libkrb5 ]; 613 613 }; 614 614 615 615 tiny_tds = attrs: {
+2 -2
pkgs/development/tools/analysis/flow/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "flow"; 5 - version = "0.147.0"; 5 + version = "0.148.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "facebook"; 9 9 repo = "flow"; 10 10 rev = "refs/tags/v${version}"; 11 - sha256 = "sha256-3U8BOYUHl1YiOnxAIV2V6Ib+LZ0DydtSfwAxN2Hj09g="; 11 + sha256 = "sha256-DPHDuTBCsRq+u5kYHwImIXPxq04kW2HiqYsxJrun6n8="; 12 12 }; 13 13 14 14 installPhase = ''
+2 -2
pkgs/development/tools/analysis/spin/default.nix
··· 1 - { stdenv, lib, fetchurl, makeWrapper, yacc, gcc 1 + { stdenv, lib, fetchurl, makeWrapper, bison, gcc 2 2 , withISpin ? true, tk, swarm, graphviz }: 3 3 4 4 let ··· 20 20 }; 21 21 22 22 nativeBuildInputs = [ makeWrapper ]; 23 - buildInputs = [ yacc ]; 23 + buildInputs = [ bison ]; 24 24 25 25 sourceRoot = "Spin/Src${version}"; 26 26
+2 -2
pkgs/development/tools/analysis/tfsec/default.nix
··· 2 2 3 3 buildGoPackage rec { 4 4 pname = "tfsec"; 5 - version = "0.39.14"; 5 + version = "0.39.16"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "tfsec"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-Peq51XN8EEvHWdSL3ngBx74t7V4RUrZa4RpGnvZ0Ml8="; 11 + sha256 = "sha256-5We3Nk/AU5dj37vG4pvqzvNztK01PAPadQV/CgHZe8w="; 12 12 }; 13 13 14 14 goPackagePath = "github.com/tfsec/tfsec";
+2 -2
pkgs/development/tools/build-managers/jam/default.nix
··· 1 - { lib, stdenv, fetchurl, yacc }: 1 + { lib, stdenv, fetchurl, bison }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "jam-2.6.1"; ··· 8 8 sha256 = "19xkvkpycxfsncxvin6yqrql3x3z9ypc1j8kzls5k659q4kv5rmc"; 9 9 }; 10 10 11 - nativeBuildInputs = [ yacc ]; 11 + nativeBuildInputs = [ bison ]; 12 12 13 13 preConfigure = '' 14 14 unset AR
+2 -2
pkgs/development/tools/build-managers/sbt/default.nix
··· 8 8 9 9 stdenv.mkDerivation rec { 10 10 pname = "sbt"; 11 - version = "1.4.9"; 11 + version = "1.5.0"; 12 12 13 13 src = fetchurl { 14 14 url = "https://github.com/sbt/sbt/releases/download/v${version}/sbt-${version}.tgz"; 15 - sha256 = "sha256-lUaBGfdkFJk2czCmCkuKYhHm6n+L3n1kfGexndj9224="; 15 + sha256 = "1dj241cj3v8kzqnz5s499rijpl7wv4rw171swqnc0xza90513pxa"; 16 16 }; 17 17 18 18 postPatch = ''
+2 -2
pkgs/development/tools/cdecl/default.nix
··· 1 - {lib, stdenv, fetchurl, yacc, flex, readline, ncurses, gnused}: 1 + {lib, stdenv, fetchurl, bison, flex, readline, ncurses, gnused}: 2 2 3 3 stdenv.mkDerivation { 4 4 name = "cdecl-2.5"; ··· 14 14 makeFlags="$makeFlags PREFIX=$out BINDIR=$out/bin MANDIR=$out/man1 CATDIR=$out/cat1 CC=$CC"; 15 15 mkdir -p $out/bin; 16 16 ''; 17 - buildInputs = [yacc flex readline ncurses]; 17 + buildInputs = [bison flex readline ncurses]; 18 18 19 19 meta = { 20 20 description = "Translator English -- C/C++ declarations";
+3 -3
pkgs/development/tools/dapr/cli/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "dapr"; 5 - version = "1.0.1"; 5 + version = "1.1.0"; 6 6 7 - vendorSha256 = "13fb6fdjqrsl74569nh2l7x9w7w61bcvkksj410s2f85bicc29rf"; 7 + vendorSha256 = "0fng5a1pvpbwil79xapdalzgkgc9dwsdxs6bznjfwnkyd1vvw6fm"; 8 8 9 9 src = fetchFromGitHub { 10 - sha256 = "15zz212sm83l6l7npislixxn23fg190b44bfxnrjrlyjbz370kch"; 10 + sha256 = "0x2mvlzlmcik6ys6xp722px9l4lj9ssyxb06bzxd7yj7m1wwcwp9"; 11 11 12 12 owner = "dapr"; 13 13 repo = "cli";
+2 -2
pkgs/development/tools/database/shmig/default.nix
··· 1 1 { stdenv, fetchFromGitHub 2 2 , withMySQL ? true, withPSQL ? false, withSQLite ? false 3 - , mysql, postgresql, sqlite, gawk, gnugrep, findutils, gnused 3 + , mariadb, postgresql, sqlite, gawk, gnugrep, findutils, gnused 4 4 , lib 5 5 }: 6 6 ··· 21 21 patchShebangs . 22 22 23 23 substituteInPlace shmig \ 24 - --replace "\`which mysql\`" "${lib.optionalString withMySQL "${mysql.client}/bin/mysql"}" \ 24 + --replace "\`which mysql\`" "${lib.optionalString withMySQL "${mariadb.client}/bin/mysql"}" \ 25 25 --replace "\`which psql\`" "${lib.optionalString withPSQL "${postgresql}/bin/psql"}" \ 26 26 --replace "\`which sqlite3\`" "${lib.optionalString withSQLite "${sqlite}/bin/sqlite3"}" \ 27 27 --replace "awk" "${gawk}/bin/awk" \
+2 -2
pkgs/development/tools/diesel-cli/default.nix
··· 1 1 { stdenv, lib, rustPlatform, fetchFromGitHub, openssl, pkg-config, Security 2 2 , sqliteSupport ? true, sqlite 3 3 , postgresqlSupport ? true, postgresql 4 - , mysqlSupport ? true, mysql, zlib, libiconv 4 + , mysqlSupport ? true, mariadb, zlib, libiconv 5 5 }: 6 6 7 7 assert lib.assertMsg (sqliteSupport == true || postgresqlSupport == true || mysqlSupport == true) ··· 55 55 ++ optional (stdenv.isDarwin && mysqlSupport) libiconv 56 56 ++ optional sqliteSupport sqlite 57 57 ++ optional postgresqlSupport postgresql 58 - ++ optionals mysqlSupport [ mysql zlib ]; 58 + ++ optionals mysqlSupport [ mariadb zlib ]; 59 59 60 60 buildAndTestSubdir = "diesel_cli"; 61 61
+3 -3
pkgs/development/tools/ginkgo/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "ginkgo"; 5 - version = "1.15.2"; 5 + version = "1.16.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "onsi"; 9 9 repo = "ginkgo"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-lZ2PIfZSvBxVIAEpRgsLvTWPFRsh2ZpXkame6pk0Cio="; 11 + sha256 = "sha256-phVpOKgMhebkVQlMDO/9IrETe72hXTgyGJtlKipKgv0="; 12 12 }; 13 - vendorSha256 = "sha256:1nqam6y2dar8320yb5fg9chsvswq8fb1rrvr5kbcaf4mzmqpy7vw"; 13 + vendorSha256 = "sha256-tS8YCGVOsfQp02vY6brmE3pxi70GG9DYcp1JDkcVG9Y="; 14 14 doCheck = false; 15 15 16 16 meta = with lib; {
+2 -2
pkgs/development/tools/git-quick-stats/default.nix
··· 11 11 12 12 stdenv.mkDerivation rec { 13 13 pname = "git-quick-stats"; 14 - version = "2.1.7"; 14 + version = "2.1.8"; 15 15 16 16 src = fetchFromGitHub { 17 17 repo = "git-quick-stats"; 18 18 owner = "arzzen"; 19 19 rev = version; 20 - sha256 = "sha256-DFssuvafgAZY26Ycv/SV5EF1B5rax3R41PCLZL09A0s="; 20 + sha256 = "sha256-sK8HOfeiV0xn540bU7inZl/hV6uzitJ4Szqk96a8DMc="; 21 21 }; 22 22 23 23 nativeBuildInputs = [ makeWrapper ];
+31
pkgs/development/tools/go-containerregistry/default.nix
··· 1 + { lib, buildGoModule, fetchFromGitHub }: 2 + 3 + buildGoModule rec { 4 + pname = "go-containerregistry"; 5 + version = "0.4.1"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "google"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + hash = "sha256-3mvGHAPKDUmrQkBKwlxnF6PG0ZpZDqlM9SMkCyC5ytE="; 12 + }; 13 + 14 + vendorSha256 = null; 15 + 16 + subPackages = [ "cmd/crane" "cmd/gcrane" ]; 17 + 18 + buildFlagsArray = [ 19 + "-ldflags=-s -w -X github.com/google/go-containerregistry/cmd/crane/cmd.Version=${version} -X github.com/google/go-containerregistry/pkg/v1/remote/transport.Version=${version}" 20 + ]; 21 + 22 + # NOTE: no tests 23 + doCheck = false; 24 + 25 + meta = with lib; { 26 + description = "A tool for interacting with remote images and registries"; 27 + homepage = "https://github.com/google/go-containerregistry"; 28 + license = licenses.apsl20; 29 + maintainers = with maintainers; [ yurrriq ]; 30 + }; 31 + }
+3 -3
pkgs/development/tools/go-swagger/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "go-swagger"; 5 - version = "0.26.1"; 5 + version = "0.27.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "go-swagger"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-gA7YpzroIP26u/kmbwlcYkWVfeJ8YDEAl0H9GGQrXA8="; 11 + sha256 = "sha256-S3/sXmgogxhMv53Gd/ir6ScirYQtt5kn04ZfRiS6NoA="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-eRcE6ai7076HqTWRJ8zKoV6/PJRgUpKvKF+0T7MgLQE="; 14 + vendorSha256 = "sha256-ABGjrMZdgsAaEhJlGbvbX77t7TsodraadNyItESMbEc="; 15 15 16 16 doCheck = false; 17 17
+3 -3
pkgs/development/tools/misc/act/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "act"; 5 - version = "0.2.20"; 5 + version = "0.2.21"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "nektos"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-HgFm58zdaycOH65jfu3QsfFemhXymp3OTekISih+8WA="; 11 + sha256 = "sha256-XDxG7F+oBatlb4ROBryt2Fop402riKmYoqZLJrUzBUQ="; 12 12 }; 13 13 14 - vendorSha256 = "sha256-9LEyxIBe4c938RQbLOQOsAb9MGNtjngm48P3P83BTNw="; 14 + vendorSha256 = "sha256-PwVDMSl36m+6ISJQvyrkCjaL3xp5VkaZtfxyMpNn+KI="; 15 15 16 16 doCheck = false; 17 17
+2 -2
pkgs/development/tools/misc/autoconf/2.13.nix
··· 1 - {lib, stdenv, fetchurl, m4, perl, lzma}: 1 + {lib, stdenv, fetchurl, m4, perl, xz}: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "autoconf-2.13"; ··· 8 8 sha256 = "07krzl4czczdsgzrrw9fiqx35xcf32naf751khg821g5pqv12qgh"; 9 9 }; 10 10 11 - nativebuildInputs = [ lzma ]; 11 + nativebuildInputs = [ xz ]; 12 12 buildInputs = [ m4 perl ]; 13 13 14 14 doCheck = true;
+2 -2
pkgs/development/tools/misc/avrdude/default.nix
··· 1 - { lib, stdenv, fetchurl, yacc, flex, libusb-compat-0_1, libelf, libftdi1, readline 1 + { lib, stdenv, fetchurl, bison, flex, libusb-compat-0_1, libelf, libftdi1, readline 2 2 # docSupport is a big dependency, disabled by default 3 3 , docSupport ? false, texLive ? null, texinfo ? null, texi2html ? null 4 4 }: ··· 15 15 16 16 configureFlags = lib.optionals docSupport "--enable-doc"; 17 17 18 - buildInputs = [ yacc flex libusb-compat-0_1 libelf libftdi1 readline ] 18 + buildInputs = [ bison flex libusb-compat-0_1 libelf libftdi1 readline ] 19 19 ++ lib.optionals docSupport [ texLive texinfo texi2html ]; 20 20 21 21 meta = with lib; {
+2 -2
pkgs/development/tools/misc/hydra/common.nix
··· 2 2 , makeWrapper, autoconf, automake, libtool, unzip, pkg-config, sqlite, libpqxx 3 3 , top-git, mercurial, darcs, subversion, breezy, openssl, bzip2, libxslt 4 4 , perl, postgresql, nukeReferences, git, boehmgc, nlohmann_json 5 - , docbook_xsl, openssh, gnused, coreutils, findutils, gzip, lzma, gnutar 5 + , docbook_xsl, openssh, gnused, coreutils, findutils, gzip, xz, gnutar 6 6 , rpm, dpkg, cdrkit, pixz, lib, boost, autoreconfHook, src ? null, version ? null 7 7 , migration ? false, patches ? [] 8 8 , tests ? {}, mdbook ··· 89 89 90 90 hydraPath = lib.makeBinPath ( 91 91 [ sqlite subversion openssh nix coreutils findutils pixz 92 - gzip bzip2 lzma gnutar unzip git top-git mercurial /*darcs*/ gnused breezy 92 + gzip bzip2 xz gnutar unzip git top-git mercurial /*darcs*/ gnused breezy 93 93 ] ++ lib.optionals stdenv.isLinux [ rpm dpkg cdrkit ] ); 94 94 95 95 nativeBuildInputs = [ autoreconfHook pkg-config mdbook ];
+2 -2
pkgs/development/tools/misc/terracognita/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "terracognita"; 5 - version = "0.6.2"; 5 + version = "0.6.3"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "cycloidio"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-RX2L9EwxfZ+utptTDR3+W9ACVPALF/hiE40SJTmZuLs="; 11 + sha256 = "sha256-rRSBPnvv4941IUGN/6+8/hzgYDqgPErNkd7tFrslPiQ="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-sN9GTcG5cZxvMaLqNjY2jfLkf8a3lugM2aV3bBdT5Ww=";
+2 -2
pkgs/development/tools/misc/texinfo/4.13a.nix
··· 1 - { stdenv, fetchurl, texinfo, ncurses, lzma }: 1 + { stdenv, fetchurl, texinfo, ncurses, xz }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "texinfo"; ··· 10 10 }; 11 11 12 12 buildInputs = [ ncurses ]; 13 - nativeBuildInputs = [ lzma ]; 13 + nativeBuildInputs = [ xz ]; 14 14 15 15 # Disabled because we don't have zdiff in the stdenv bootstrap. 16 16 #doCheck = true;
+3 -3
pkgs/development/tools/packet-cli/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "packet-cli"; 5 - version = "0.1.1"; 5 + version = "0.3.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "packethost"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "089fcn7yslijjivyvwl85j32gfwif8aazqdhm6hi676lz80ssppp"; 11 + sha256 = "sha256-P1Bn6vli0d/MroHUsioTWBrjWN+UZmSo3qmzo+fCDwM="; 12 12 }; 13 13 14 - vendorSha256 = "1p3v4pzw9hc1iviv1zghw9imbd23nlp24dpa8hf0w8a03jvpy96x"; 14 + vendorSha256 = "sha256-PjKiUdhN87guPAa0loZrWYuwbl0HaspuIjmKgyq4Zp8="; 15 15 16 16 postInstall = '' 17 17 ln -s $out/bin/packet-cli $out/bin/packet
+1 -1
pkgs/development/tools/rubocop/Gemfile.lock
··· 8 8 rainbow (3.0.0) 9 9 regexp_parser (2.1.1) 10 10 rexml (3.2.4) 11 - rubocop (1.12.0) 11 + rubocop (1.12.1) 12 12 parallel (~> 1.10) 13 13 parser (>= 3.0.0.0) 14 14 rainbow (>= 2.2.2, < 4.0)
+1 -1
pkgs/development/tools/rubocop/default.nix
··· 11 11 12 12 meta = with lib; { 13 13 description = "Automatic Ruby code style checking tool"; 14 - homepage = "https://docs.rubocop.org/"; 14 + homepage = "https://rubocop.org/"; 15 15 license = licenses.mit; 16 16 maintainers = with maintainers; [ marsam leemachin ]; 17 17 };
+2 -2
pkgs/development/tools/rubocop/gemset.nix
··· 66 66 platforms = []; 67 67 source = { 68 68 remotes = ["https://rubygems.org"]; 69 - sha256 = "1i3y0h6awywx4rdmjdan908jmnyk589pndbjypxkfbkqvjx514fw"; 69 + sha256 = "0hi2c3a6alya9yx07nirnjzlc0mvmidnx67874njp6wf7d5xqqr9"; 70 70 type = "gem"; 71 71 }; 72 - version = "1.12.0"; 72 + version = "1.12.1"; 73 73 }; 74 74 rubocop-ast = { 75 75 dependencies = ["parser"];
+2 -2
pkgs/development/tools/sd-local/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "sd-local"; 5 - version = "1.0.29"; 5 + version = "1.0.30"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "screwdriver-cd"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-Po6kP6kAY5W3SQJ3iFCtzifSlQ+JgLIDhuk2UHSwAxM="; 11 + sha256 = "sha256-Ha0E0e9CPR8dnApw0cR4A7Tzi3shYVtSeaQ+6I80qcU="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-4xuWehRrmVdS2F6r00LZLKq/oHlWqCTQ/jYUKeIJ6DI=";
+10 -5
pkgs/development/tools/tracy/default.nix
··· 1 1 { stdenv, lib, darwin, fetchFromGitHub, tbb, gtk3, glfw, pkg-config, freetype, Carbon, AppKit, capstone }: 2 2 3 - stdenv.mkDerivation rec { 3 + let 4 + disableLTO = stdenv.cc.isClang && stdenv.isDarwin; # workaround issue #19098 5 + in stdenv.mkDerivation rec { 4 6 pname = "tracy"; 5 - version = "0.7.6"; 7 + version = "0.7.7"; 6 8 7 9 src = fetchFromGitHub { 8 10 owner = "wolfpld"; 9 11 repo = "tracy"; 10 12 rev = "v${version}"; 11 - sha256 = "sha256-Fk/Kuc7DwmdoyLx/YjdEHQ7S0M+ksAXl9QqeSPH2vJ8="; 13 + sha256 = "sha256-jp+Geqk39ZPoe2KzUJJ0w5hvCnyUlHGwVKn73lJJt94="; 12 14 }; 13 15 14 16 nativeBuildInputs = [ pkg-config ]; ··· 19 21 20 22 NIX_CFLAGS_COMPILE = [ ] 21 23 ++ lib.optional stdenv.isLinux "-ltbb" 22 - ++ lib.optional stdenv.cc.isClang "-faligned-allocation"; 24 + ++ lib.optional stdenv.cc.isClang "-faligned-allocation" 25 + ++ lib.optional disableLTO "-fno-lto"; 26 + 27 + NIX_CFLAGS_LINK = lib.optional disableLTO "-fno-lto"; 23 28 24 29 buildPhase = '' 25 30 make -j $NIX_BUILD_CORES -C profiler/build/unix release ··· 35 40 install -D ./update/build/unix/update-release $out/bin/update 36 41 ''; 37 42 38 - fixupPhase = lib.optionalString stdenv.isDarwin '' 43 + postFixup = lib.optionalString stdenv.isDarwin '' 39 44 install_name_tool -change libcapstone.4.dylib ${capstone}/lib/libcapstone.4.dylib $out/bin/Tracy 40 45 ''; 41 46
+2 -2
pkgs/development/tools/vendir/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "vendir"; 5 - version = "0.17.0"; 5 + version = "0.18.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "vmware-tanzu"; 9 9 repo = "carvel-vendir"; 10 10 rev = "v${version}"; 11 - sha256 = "14yd14z4666alwsn2jhcvg2kijvw4qjr4h3gikchiir38w520fs9"; 11 + sha256 = "sha256-+VZ1EWrEvTbWeO/o7EkkF2Xcro7UpCrnsOJjOCtfNzY="; 12 12 }; 13 13 14 14 vendorSha256 = null;
+2 -2
pkgs/development/tools/vogl/default.nix
··· 1 1 { mkDerivation, lib, fetchFromGitHub 2 2 , cmake, git, pkg-config, wget, zip 3 3 , qtbase, qtx11extras 4 - , libdwarf, libjpeg_turbo, libunwind, lzma, tinyxml, libX11 4 + , libdwarf, libjpeg_turbo, libunwind, xz, tinyxml, libX11 5 5 , SDL2, SDL2_gfx, SDL2_image, SDL2_ttf 6 6 , freeglut, libGLU 7 7 , fetchpatch ··· 31 31 buildInputs = [ 32 32 git wget zip 33 33 qtbase qtx11extras 34 - libdwarf libjpeg_turbo libunwind lzma tinyxml libX11 34 + libdwarf libjpeg_turbo libunwind xz tinyxml libX11 35 35 SDL2 SDL2_gfx SDL2_image SDL2_ttf 36 36 freeglut libGLU 37 37 ];
+2 -2
pkgs/development/tools/vultr-cli/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "vultr-cli"; 5 - version = "2.3.0"; 5 + version = "2.4.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "vultr"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-FXOwLYxUMkE+wDY30vjnSZ7zPWZWuWmIH4Uuc0CC7lU="; 11 + sha256 = "sha256-TNytKq2LqLWxNrqesOJbNQUTirvPkxLMqJmtbmFq+0Y="; 12 12 }; 13 13 14 14 vendorSha256 = null;
+2 -2
pkgs/development/tools/xcbuild/toolchains.nix
··· 44 44 fi 45 45 done 46 46 47 - ln -s ${buildPackages.yacc}/bin/yacc $toolchain/bin/yacc 48 - ln -s ${buildPackages.yacc}/bin/bison $toolchain/bin/bison 47 + ln -s ${buildPackages.bison}/bin/yacc $toolchain/bin/yacc 48 + ln -s ${buildPackages.bison}/bin/bison $toolchain/bin/bison 49 49 ln -s ${buildPackages.flex}/bin/flex $toolchain/bin/flex 50 50 ln -s ${buildPackages.flex}/bin/flex++ $toolchain/bin/flex++ 51 51 ln -s $toolchain/bin/flex $toolchain/bin/lex
+3 -3
pkgs/games/cockatrice/default.nix
··· 4 4 5 5 mkDerivation rec { 6 6 pname = "cockatrice"; 7 - version = "2021-01-26-Release-2.8.0"; 7 + version = "2021-02-03-Development-2.8.1-beta"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "Cockatrice"; 11 11 repo = "Cockatrice"; 12 12 rev = version; 13 - sha256 = "0q8ffcklb2b7hcqhy3d2f9kz9aw22pp04pc9y4sslyqmf17pwnz9"; 13 + sha256 = "0g1d7zq4lh4jf08mvvgp6m2r2gdvy4y1mhf46c0s8607h2l8vavh"; 14 14 }; 15 15 16 16 buildInputs = [ ··· 22 22 meta = { 23 23 homepage = "https://github.com/Cockatrice/Cockatrice"; 24 24 description = "A cross-platform virtual tabletop for multiplayer card games"; 25 - license = lib.licenses.gpl2; 25 + license = lib.licenses.gpl2Plus; 26 26 maintainers = with lib.maintainers; [ evanjs ]; 27 27 platforms = with lib.platforms; linux; 28 28 };
+2 -4
pkgs/games/devilutionx/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, cmake, SDL2, SDL2_mixer, SDL2_ttf, libsodium, pkg-config }: 2 2 stdenv.mkDerivation rec { 3 - version = "2020-10-20"; 4 - pname = "devilutionx-unstable"; 3 + pname = "devilutionx"; 4 + version = "unstable-2020-10-20"; 5 5 6 6 src = fetchFromGitHub { 7 7 owner = "diasurgical"; ··· 18 18 cmakeFlags = [ 19 19 "-DBINARY_RELEASE=ON" 20 20 ]; 21 - 22 - enableParallelBuilding = true; 23 21 24 22 nativeBuildInputs = [ pkg-config cmake ]; 25 23 buildInputs = [ libsodium SDL2 SDL2_mixer SDL2_ttf ];
+2 -2
pkgs/games/freeciv/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, autoreconfHook, lua5_3, pkg-config, python3 2 - , zlib, bzip2, curl, lzma, gettext, libiconv 2 + , zlib, bzip2, curl, xz, gettext, libiconv 3 3 , sdlClient ? true, SDL, SDL_mixer, SDL_image, SDL_ttf, SDL_gfx, freetype, fluidsynth 4 4 , gtkClient ? false, gtk3 5 5 , qtClient ? false, qt5 ··· 31 31 nativeBuildInputs = [ autoreconfHook pkg-config ] 32 32 ++ optional qtClient [ qt5.wrapQtAppsHook ]; 33 33 34 - buildInputs = [ lua5_3 zlib bzip2 curl lzma gettext libiconv ] 34 + buildInputs = [ lua5_3 zlib bzip2 curl xz gettext libiconv ] 35 35 ++ optionals sdlClient [ SDL SDL_mixer SDL_image SDL_ttf SDL_gfx freetype fluidsynth ] 36 36 ++ optionals gtkClient [ gtk3 ] 37 37 ++ optionals qtClient [ qt5.qtbase ]
+3 -3
pkgs/games/sm64ex/default.nix
··· 26 26 27 27 stdenv.mkDerivation rec { 28 28 pname = "sm64ex"; 29 - version = "unstable-2020-06-19"; 29 + version = "unstable-2020-10-09"; 30 30 31 31 src = fetchFromGitHub { 32 32 owner = "sm64pc"; 33 33 repo = "sm64ex"; 34 - rev = "f5005418348cf1a53bfa75ff415a513ef0b9b273"; 35 - sha256 = "0adyshkqk5c4lxhdxc3j6ax4svfka26486qpa5q2gl2nixwg9zxn"; 34 + rev = "57c203465b2b3eee03dcb796ed1fad07d8283a2c"; 35 + sha256 = "0k6a3r9f4spa7y2v1lyqs9lwa05lw8xgywllb7w828nal8y33cs6"; 36 36 }; 37 37 38 38 nativeBuildInputs = [ python3 pkg-config ];
+2 -2
pkgs/games/spring/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, cmake, lzma, boost, libdevil, zlib, p7zip 1 + { lib, stdenv, fetchFromGitHub, cmake, xz, boost, libdevil, zlib, p7zip 2 2 , openal, libvorbis, glew, freetype, xorg, SDL2, libGLU, libGL 3 3 , asciidoc, docbook_xsl, docbook_xsl_ns, curl, makeWrapper 4 4 , jdk ? null, python ? null, systemd, libunwind, which, minizip ··· 41 41 "-DPREFER_STATIC_LIBS:BOOL=OFF"]; 42 42 43 43 nativeBuildInputs = [ cmake makeWrapper docbook_xsl docbook_xsl_ns asciidoc ]; 44 - buildInputs = [ lzma boost libdevil zlib p7zip openal libvorbis freetype SDL2 44 + buildInputs = [ xz boost libdevil zlib p7zip openal libvorbis freetype SDL2 45 45 xorg.libX11 xorg.libXcursor libGLU libGL glew curl 46 46 systemd libunwind which minizip ] 47 47 ++ lib.optional withAI jdk
+2 -2
pkgs/games/unciv/default.nix
··· 25 25 in 26 26 stdenv.mkDerivation rec { 27 27 pname = "unciv"; 28 - version = "3.13.11-patch2"; 28 + version = "3.13.12-patch1"; 29 29 30 30 src = fetchurl { 31 31 url = "https://github.com/yairm210/Unciv/releases/download/${version}/Unciv.jar"; 32 - sha256 = "sha256-UN/M1G36nYy1mhKz0xA3/oZ8hWrkyeXWm9dMxL9PSDo="; 32 + sha256 = "sha256-SgDfa3henwUb+oKybFJhvo1GkmC24wWz3U78etk+Dsk="; 33 33 }; 34 34 35 35 dontUnpack = true;
+13 -16
pkgs/games/warzone2100/default.nix
··· 1 1 { lib 2 - , mkDerivation 2 + , stdenv 3 3 , fetchurl 4 4 , cmake 5 5 , ninja 6 - , zip, unzip 6 + , zip 7 7 , pkg-config 8 8 , asciidoctor 9 9 , gettext 10 10 11 - , qtbase 12 - , qtscript 13 11 , SDL2 14 12 , libtheora 15 13 , libvorbis 16 14 , openal 17 15 , openalSoft 18 - , glew 19 16 , physfs 20 - , fribidi 21 - , libXrandr 22 17 , miniupnpc 23 18 , libsodium 24 19 , curl ··· 27 22 , harfbuzz 28 23 , sqlite 29 24 , which 25 + , vulkan-headers 26 + , vulkan-loader 27 + , shaderc 30 28 31 29 , withVideos ? false 32 30 }: ··· 39 37 }; 40 38 in 41 39 42 - mkDerivation rec { 40 + stdenv.mkDerivation rec { 43 41 inherit pname; 44 - version = "3.4.1"; 42 + version = "4.0.0"; 45 43 46 44 src = fetchurl { 47 45 url = "mirror://sourceforge/${pname}/releases/${version}/${pname}_src.tar.xz"; 48 - sha256 = "0savalmw1kp1sf8vg5aqrl5hc77p4jacxy5y9qj8k2hi2vqdfb7a"; 46 + sha256 = "1d94072yns2xrjpagw1mqq7iyywhwz7vn3lgjdwmbgjy79jzcs1k"; 49 47 }; 50 48 51 49 buildInputs = [ 52 - qtbase 53 - qtscript 54 50 SDL2 55 51 libtheora 56 52 libvorbis 57 53 openal 58 54 openalSoft 59 - glew 60 55 physfs 61 - fribidi 62 - libXrandr 63 56 miniupnpc 64 57 libsodium 65 58 curl ··· 67 60 freetype 68 61 harfbuzz 69 62 sqlite 63 + vulkan-headers 64 + vulkan-loader 70 65 ]; 71 66 72 67 nativeBuildInputs = [ 68 + pkg-config 73 69 cmake 74 70 ninja 75 - zip unzip 71 + zip 76 72 asciidoctor 77 73 gettext 74 + shaderc 78 75 ]; 79 76 80 77 postPatch = ''
+4 -3
pkgs/misc/drivers/foo2zjs/default.nix
··· 1 1 { lib, stdenv, fetchurl, foomatic-filters, bc, unzip, ghostscript, systemd, vim, time }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "foo2zjs-20180519"; 4 + pname = "foo2zjs"; 5 + version = "20210116"; 5 6 6 7 src = fetchurl { 7 - url = "http://www.loegria.net/mirrors/foo2zjs/${name}.tar.gz"; 8 - sha256 = "1rmw4jmxn2lqp124mapvnic0ma8ipyvisx2vj848mvad5g5w9x3z"; 8 + url = "http://www.loegria.net/mirrors/foo2zjs/foo2zjs-${version}.tar.gz"; 9 + sha256 = "14x3wizvncdy0xgvmcx541qanwb7bg76abygqy17bxycn1zh5r1x"; 9 10 }; 10 11 11 12 nativeBuildInputs = [ unzip ];
+2 -2
pkgs/misc/emulators/cdemu/libmirage.nix
··· 1 1 { callPackage, gobject-introspection, cmake, pkg-config 2 - , glib, libsndfile, zlib, bzip2, lzma, libsamplerate, intltool 2 + , glib, libsndfile, zlib, bzip2, xz, libsamplerate, intltool 3 3 , pcre, util-linux, libselinux, libsepol }: 4 4 5 5 let pkg = import ./base.nix { ··· 8 8 pkgSha256 = "08mfvqyk3833ksfd47i4j3ppmrw5ry219km6h7lywdh9hm9x14yf"; 9 9 }; 10 10 in callPackage pkg { 11 - buildInputs = [ glib libsndfile zlib bzip2 lzma libsamplerate intltool ]; 11 + buildInputs = [ glib libsndfile zlib bzip2 xz libsamplerate intltool ]; 12 12 drvParams = { 13 13 PKG_CONFIG_GOBJECT_INTROSPECTION_1_0_GIRDIR = "${placeholder "out"}/share/gir-1.0"; 14 14 PKG_CONFIG_GOBJECT_INTROSPECTION_1_0_TYPELIBDIR = "${placeholder "out"}/lib/girepository-1.0";
+15 -17
pkgs/misc/emulators/dlx/default.nix
··· 1 - { lib, stdenv, fetchurl, unzip }: 1 + { lib, stdenv, fetchzip }: 2 2 3 - stdenv.mkDerivation { 4 - name = "dlx-2012.07.08"; 3 + stdenv.mkDerivation rec { 4 + pname = "dlx"; 5 + version = "2012-07-08"; 5 6 6 - src = fetchurl { 7 + src = fetchzip { 7 8 url = "https://www.davidviner.com/zip/dlx/dlx.zip"; 8 - sha256 = "0q5hildq2xcig7yrqi26n7fqlanyssjirm7swy2a9icfxpppfpkn"; 9 + sha256 = "0508linnar9ivy3xr99gzrb2l027ngx12dlxaxs7w67cnwqnb0dg"; 9 10 }; 10 11 11 - nativeBuildInputs = [ unzip ]; 12 - 13 12 makeFlags = [ "CC=${stdenv.cc.targetPrefix}cc" "LINK=${stdenv.cc.targetPrefix}cc" "CFLAGS=-O2" ]; 14 - 15 13 hardeningDisable = [ "format" ]; 16 14 17 15 installPhase = '' 18 16 mkdir -p $out/include/dlx $out/share/dlx/{examples,doc} $out/bin 19 - mv -v masm mon dasm $out/bin/ 20 - mv -v *.i auto.a $out/include/dlx/ 21 - mv -v *.a *.m $out/share/dlx/examples/ 22 - mv -v README.txt MANUAL.TXT $out/share/dlx/doc/ 17 + mv masm mon dasm $out/bin/ 18 + mv *.i auto.a $out/include/dlx/ 19 + mv *.a *.m $out/share/dlx/examples/ 20 + mv README.txt MANUAL.TXT $out/share/dlx/doc/ 23 21 ''; 24 22 25 - meta = { 26 - homepage = "http://www.davidviner.com/dlx.php"; 27 - description = "DLX Simulator"; 28 - license = lib.licenses.gpl2; 29 - platforms = lib.platforms.all; 23 + meta = with lib; { 24 + homepage = "https://www.davidviner.com/dlx.html?name=DLX+Simulator"; 25 + description = "An DLX simulator written in C"; 26 + license = licenses.gpl2Only; 27 + platforms = platforms.linux; 30 28 }; 31 29 }
+6 -5
pkgs/misc/emulators/ryujinx/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, fetchurl, makeWrapper, makeDesktopItem, linkFarmFromDrvs 2 2 , dotnet-sdk_5, dotnetPackages, dotnetCorePackages, cacert 3 - , SDL2, libX11, ffmpeg, openal, libsoundio 3 + , SDL2, libX11, libgdiplus, ffmpeg, openal, libsoundio 4 4 , gtk3, gobject-introspection, gdk-pixbuf, wrapGAppsHook 5 5 }: 6 6 ··· 9 9 SDL2 10 10 gtk3 11 11 libX11 12 + libgdiplus 12 13 ffmpeg 13 14 openal 14 15 libsoundio 15 16 ]; 16 17 in stdenv.mkDerivation rec { 17 18 pname = "ryujinx"; 18 - version = "1.0.6574"; # Versioning is based off of the official appveyor builds: https://ci.appveyor.com/project/gdkchan/ryujinx 19 + version = "1.0.6807"; # Versioning is based off of the official appveyor builds: https://ci.appveyor.com/project/gdkchan/ryujinx 19 20 20 21 src = fetchFromGitHub { 21 22 owner = "Ryujinx"; 22 23 repo = "Ryujinx"; 23 - rev = "80ed8596c165127fb52026c697a9b6b515dabbd4"; 24 - sha256 = "0jhrl8g9fbz3w2hzmy9jm22cvjfa0x5vh3912rz1rvnd41qb9vs8"; 24 + rev = "0ee314fb3b9d476d0d207a3595bde24af9c4b69b"; 25 + sha256 = "1yyjy5qblsdg186hr81qpc07n0cqla67q3hjf2rrzq5pyb10bldy"; 25 26 }; 26 27 27 28 nativeBuildInputs = [ dotnet-sdk_5 dotnetPackages.Nuget cacert makeWrapper wrapGAppsHook gobject-introspection gdk-pixbuf ]; ··· 36 37 37 38 patches = [ 38 39 ./log.patch # Without this, Ryujinx attempts to write logs to the nix store. This patch makes it write to "~/.config/Ryujinx/Logs" on Linux. 39 - ./disable-updater.patch # This disables the auto-updater, which does not work as it attempts to modify the nix store. 40 40 ]; 41 41 42 42 configurePhase = '' ··· 108 108 maintainers = [ maintainers.ivar ]; 109 109 platforms = [ "x86_64-linux" ]; 110 110 }; 111 + passthru.updateScript = ./updater.sh; 111 112 }
+183 -148
pkgs/misc/emulators/ryujinx/deps.nix
··· 50 50 sha256 = "0nb46jiscnsywwdfy7zhx1bw4jfmca3s6l8dhbi99gc4bvp8ar7p"; 51 51 }) 52 52 (fetchNuGet { 53 - name = "GtkSharp"; 54 - version = "3.22.25.128"; 55 - sha256 = "0z0wx0p3gc02r8d7y88k1rw307sb2vapbr1k1yc5qdc38fxz5jsy"; 56 - }) 57 - (fetchNuGet { 58 53 name = "GtkSharp.Dependencies"; 59 54 version = "1.1.0"; 60 55 sha256 = "1g1rhcn38ww97638rds6l5bysra43hkhv47fy71fvq89623zgyxn"; 56 + }) 57 + (fetchNuGet { 58 + name = "GtkSharp"; 59 + version = "3.22.25.128"; 60 + sha256 = "0z0wx0p3gc02r8d7y88k1rw307sb2vapbr1k1yc5qdc38fxz5jsy"; 61 61 }) 62 62 (fetchNuGet { 63 63 name = "LibHac"; ··· 95 95 sha256 = "0mp8ihqlb7fsa789frjzidrfjc1lrhk88qp3xm5qvr7vf4wy4z8x"; 96 96 }) 97 97 (fetchNuGet { 98 + name = "Microsoft.NET.Test.Sdk"; 99 + version = "16.8.0"; 100 + sha256 = "1ln2mva7j2mpsj9rdhpk8vhm3pgd8wn563xqdcwd38avnhp74rm9"; 101 + }) 102 + (fetchNuGet { 98 103 name = "Microsoft.NETCore.App.Host.osx-x64"; 99 104 version = "5.0.0"; 100 105 sha256 = "1nirb155gzn2ws1ayaqspjmjaizw87jq2684mzkn18jv4si0hbpf"; ··· 155 160 sha256 = "193xwf33fbm0ni3idxzbr5fdq3i2dlfgihsac9jj7whj0gd902nh"; 156 161 }) 157 162 (fetchNuGet { 158 - name = "Microsoft.NET.Test.Sdk"; 159 - version = "16.8.0"; 160 - sha256 = "1ln2mva7j2mpsj9rdhpk8vhm3pgd8wn563xqdcwd38avnhp74rm9"; 161 - }) 162 - (fetchNuGet { 163 163 name = "Microsoft.TestPlatform.ObjectModel"; 164 164 version = "16.8.0"; 165 165 sha256 = "0ii9d88py6mjsxzj9v3zx4izh6rb9ma6s9kj85xmc0xrw7jc2g3m"; ··· 205 205 sha256 = "0fnkv3ky12227zqg4zshx4kw2mvysq2ppxjibfw02cc3iprv4njq"; 206 206 }) 207 207 (fetchNuGet { 208 + name = "Microsoft.Win32.SystemEvents"; 209 + version = "5.0.0"; 210 + sha256 = "0sja4ba0mrvdamn0r9mhq38b9dxi08yb3c1hzh29n1z6ws1hlrcq"; 211 + }) 212 + (fetchNuGet { 208 213 name = "Mono.Posix.NETStandard"; 209 214 version = "1.0.0"; 210 215 sha256 = "0xlja36hwpjm837haq15mjh2prcf68lyrmn72nvgpz8qnf9vappw"; ··· 275 280 sha256 = "00j6nv2xgmd3bi347k00m7wr542wjlig53rmj28pmw7ddcn97jbn"; 276 281 }) 277 282 (fetchNuGet { 278 - name = "runtime.any.System.Globalization"; 283 + name = "runtime.any.System.Globalization.Calendars"; 279 284 version = "4.3.0"; 280 - sha256 = "1daqf33hssad94lamzg01y49xwndy2q97i2lrb7mgn28656qia1x"; 285 + sha256 = "1ghhhk5psqxcg6w88sxkqrc35bxcz27zbqm2y5p5298pv3v7g201"; 281 286 }) 282 287 (fetchNuGet { 283 - name = "runtime.any.System.Globalization.Calendars"; 288 + name = "runtime.any.System.Globalization"; 284 289 version = "4.3.0"; 285 - sha256 = "1ghhhk5psqxcg6w88sxkqrc35bxcz27zbqm2y5p5298pv3v7g201"; 290 + sha256 = "1daqf33hssad94lamzg01y49xwndy2q97i2lrb7mgn28656qia1x"; 286 291 }) 287 292 (fetchNuGet { 288 293 name = "runtime.any.System.IO"; ··· 290 295 sha256 = "0l8xz8zn46w4d10bcn3l4yyn4vhb3lrj2zw8llvz7jk14k4zps5x"; 291 296 }) 292 297 (fetchNuGet { 293 - name = "runtime.any.System.Reflection"; 294 - version = "4.3.0"; 295 - sha256 = "02c9h3y35pylc0zfq3wcsvc5nqci95nrkq0mszifc0sjx7xrzkly"; 296 - }) 297 - (fetchNuGet { 298 298 name = "runtime.any.System.Reflection.Extensions"; 299 299 version = "4.3.0"; 300 300 sha256 = "0zyri97dfc5vyaz9ba65hjj1zbcrzaffhsdlpxc9bh09wy22fq33"; ··· 305 305 sha256 = "0x1mm8c6iy8rlxm8w9vqw7gb7s1ljadrn049fmf70cyh42vdfhrf"; 306 306 }) 307 307 (fetchNuGet { 308 - name = "runtime.any.System.Resources.ResourceManager"; 308 + name = "runtime.any.System.Reflection"; 309 309 version = "4.3.0"; 310 - sha256 = "03kickal0iiby82wa5flar18kyv82s9s6d4xhk5h4bi5kfcyfjzl"; 310 + sha256 = "02c9h3y35pylc0zfq3wcsvc5nqci95nrkq0mszifc0sjx7xrzkly"; 311 311 }) 312 312 (fetchNuGet { 313 - name = "runtime.any.System.Runtime"; 313 + name = "runtime.any.System.Resources.ResourceManager"; 314 314 version = "4.3.0"; 315 - sha256 = "1cqh1sv3h5j7ixyb7axxbdkqx6cxy00p4np4j91kpm492rf4s25b"; 315 + sha256 = "03kickal0iiby82wa5flar18kyv82s9s6d4xhk5h4bi5kfcyfjzl"; 316 316 }) 317 317 (fetchNuGet { 318 318 name = "runtime.any.System.Runtime.Handles"; ··· 325 325 sha256 = "0c3g3g3jmhlhw4klrc86ka9fjbl7i59ds1fadsb2l8nqf8z3kb19"; 326 326 }) 327 327 (fetchNuGet { 328 - name = "runtime.any.System.Text.Encoding"; 328 + name = "runtime.any.System.Runtime"; 329 329 version = "4.3.0"; 330 - sha256 = "0aqqi1v4wx51h51mk956y783wzags13wa7mgqyclacmsmpv02ps3"; 330 + sha256 = "1cqh1sv3h5j7ixyb7axxbdkqx6cxy00p4np4j91kpm492rf4s25b"; 331 331 }) 332 332 (fetchNuGet { 333 333 name = "runtime.any.System.Text.Encoding.Extensions"; ··· 335 335 sha256 = "0lqhgqi0i8194ryqq6v2gqx0fb86db2gqknbm0aq31wb378j7ip8"; 336 336 }) 337 337 (fetchNuGet { 338 + name = "runtime.any.System.Text.Encoding"; 339 + version = "4.3.0"; 340 + sha256 = "0aqqi1v4wx51h51mk956y783wzags13wa7mgqyclacmsmpv02ps3"; 341 + }) 342 + (fetchNuGet { 338 343 name = "runtime.any.System.Threading.Tasks"; 339 344 version = "4.3.0"; 340 345 sha256 = "03mnvkhskbzxddz4hm113zsch1jyzh2cs450dk3rgfjp8crlw1va"; ··· 360 365 sha256 = "0c2p354hjx58xhhz7wv6div8xpi90sc6ibdm40qin21bvi7ymcaa"; 361 366 }) 362 367 (fetchNuGet { 363 - name = "runtime.native.System"; 364 - version = "4.0.0"; 365 - sha256 = "1ppk69xk59ggacj9n7g6fyxvzmk1g5p4fkijm0d7xqfkig98qrkf"; 366 - }) 367 - (fetchNuGet { 368 - name = "runtime.native.System"; 369 - version = "4.3.0"; 370 - sha256 = "15hgf6zaq9b8br2wi1i3x0zvmk410nlmsmva9p0bbg73v6hml5k4"; 371 - }) 372 - (fetchNuGet { 373 368 name = "runtime.native.System.IO.Compression"; 374 369 version = "4.1.0"; 375 370 sha256 = "0d720z4lzyfcabmmnvh0bnj76ll7djhji2hmfh3h44sdkjnlkknk"; ··· 378 373 name = "runtime.native.System.Net.Http"; 379 374 version = "4.0.1"; 380 375 sha256 = "1hgv2bmbaskx77v8glh7waxws973jn4ah35zysnkxmf0196sfxg6"; 376 + }) 377 + (fetchNuGet { 378 + name = "runtime.native.System.Security.Cryptography.OpenSsl"; 379 + version = "4.3.0"; 380 + sha256 = "18pzfdlwsg2nb1jjjjzyb5qlgy6xjxzmhnfaijq5s2jw3cm3ab97"; 381 381 }) 382 382 (fetchNuGet { 383 383 name = "runtime.native.System.Security.Cryptography"; ··· 385 385 sha256 = "0k57aa2c3b10wl3hfqbgrl7xq7g8hh3a3ir44b31dn5p61iiw3z9"; 386 386 }) 387 387 (fetchNuGet { 388 - name = "runtime.native.System.Security.Cryptography.OpenSsl"; 388 + name = "runtime.native.System"; 389 + version = "4.0.0"; 390 + sha256 = "1ppk69xk59ggacj9n7g6fyxvzmk1g5p4fkijm0d7xqfkig98qrkf"; 391 + }) 392 + (fetchNuGet { 393 + name = "runtime.native.System"; 389 394 version = "4.3.0"; 390 - sha256 = "18pzfdlwsg2nb1jjjjzyb5qlgy6xjxzmhnfaijq5s2jw3cm3ab97"; 395 + sha256 = "15hgf6zaq9b8br2wi1i3x0zvmk410nlmsmva9p0bbg73v6hml5k4"; 391 396 }) 392 397 (fetchNuGet { 393 398 name = "runtime.opensuse.13.2-x64.runtime.native.System.Security.Cryptography.OpenSsl"; ··· 515 520 sha256 = "1pizj82wisch28nfdaszwqm9bz19lnl0s5mq8c0zybm2vhnrhvk4"; 516 521 }) 517 522 (fetchNuGet { 523 + name = "SixLabors.Fonts"; 524 + version = "1.0.0-beta0013"; 525 + sha256 = "0r0aw8xxd32rwcawawcz6asiyggz02hnzg5hvz8gimq8hvwx1wql"; 526 + }) 527 + (fetchNuGet { 528 + name = "SixLabors.ImageSharp.Drawing"; 529 + version = "1.0.0-beta11"; 530 + sha256 = "0hl0rs3kr1zdnx3gdssxgli6fyvmwzcfp99f4db71s0i8j8b2bp5"; 531 + }) 532 + (fetchNuGet { 533 + name = "SixLabors.ImageSharp"; 534 + version = "1.0.2"; 535 + sha256 = "0fhk9sn8k18slfb26wz8mal0j699f7djwhxgv97snz6b10wynfaj"; 536 + }) 537 + (fetchNuGet { 518 538 name = "System.AppContext"; 519 539 version = "4.1.0"; 520 540 sha256 = "0fv3cma1jp4vgj7a8hqc9n7hr1f1kjp541s6z0q1r6nazb4iz9mz"; ··· 538 558 name = "System.CodeDom"; 539 559 version = "5.0.0"; 540 560 sha256 = "14zs2wqkmdlxzj8ikx19n321lsbarx5vl2a8wrachymxn8zb5njh"; 541 - }) 542 - (fetchNuGet { 543 - name = "System.Collections"; 544 - version = "4.0.11"; 545 - sha256 = "1ga40f5lrwldiyw6vy67d0sg7jd7ww6kgwbksm19wrvq9hr0bsm6"; 546 - }) 547 - (fetchNuGet { 548 - name = "System.Collections"; 549 - version = "4.3.0"; 550 - sha256 = "19r4y64dqyrq6k4706dnyhhw7fs24kpp3awak7whzss39dakpxk9"; 551 561 }) 552 562 (fetchNuGet { 553 563 name = "System.Collections.Concurrent"; ··· 565 575 sha256 = "1sdwkma4f6j85m3dpb53v9vcgd0zyc9jb33f8g63byvijcj39n20"; 566 576 }) 567 577 (fetchNuGet { 568 - name = "System.ComponentModel"; 578 + name = "System.Collections"; 579 + version = "4.0.11"; 580 + sha256 = "1ga40f5lrwldiyw6vy67d0sg7jd7ww6kgwbksm19wrvq9hr0bsm6"; 581 + }) 582 + (fetchNuGet { 583 + name = "System.Collections"; 569 584 version = "4.3.0"; 570 - sha256 = "0986b10ww3nshy30x9sjyzm0jx339dkjxjj3401r3q0f6fx2wkcb"; 585 + sha256 = "19r4y64dqyrq6k4706dnyhhw7fs24kpp3awak7whzss39dakpxk9"; 571 586 }) 572 587 (fetchNuGet { 573 588 name = "System.ComponentModel.EventBasedAsync"; ··· 583 598 name = "System.ComponentModel.TypeConverter"; 584 599 version = "4.3.0"; 585 600 sha256 = "17ng0p7v3nbrg3kycz10aqrrlw4lz9hzhws09pfh8gkwicyy481x"; 601 + }) 602 + (fetchNuGet { 603 + name = "System.ComponentModel"; 604 + version = "4.3.0"; 605 + sha256 = "0986b10ww3nshy30x9sjyzm0jx339dkjxjj3401r3q0f6fx2wkcb"; 586 606 }) 587 607 (fetchNuGet { 588 608 name = "System.Console"; ··· 630 650 sha256 = "0knqa0zsm91nfr34br8gx5kjqq4v81zdhqkacvs2hzc8nqk0ddhc"; 631 651 }) 632 652 (fetchNuGet { 653 + name = "System.Drawing.Common"; 654 + version = "5.0.1"; 655 + sha256 = "14h722wq58k1wmgxmpws91xc7kh8109ijw0hcxjq9qkbhbi6pwmb"; 656 + }) 657 + (fetchNuGet { 633 658 name = "System.Dynamic.Runtime"; 634 659 version = "4.0.11"; 635 660 sha256 = "1pla2dx8gkidf7xkciig6nifdsb494axjvzvann8g2lp3dbqasm9"; 636 661 }) 637 662 (fetchNuGet { 638 - name = "System.Globalization"; 639 - version = "4.0.11"; 640 - sha256 = "070c5jbas2v7smm660zaf1gh0489xanjqymkvafcs4f8cdrs1d5d"; 641 - }) 642 - (fetchNuGet { 643 - name = "System.Globalization"; 644 - version = "4.3.0"; 645 - sha256 = "1cp68vv683n6ic2zqh2s1fn4c2sd87g5hpp6l4d4nj4536jz98ki"; 646 - }) 647 - (fetchNuGet { 648 663 name = "System.Globalization.Calendars"; 649 664 version = "4.0.1"; 650 665 sha256 = "0bv0alrm2ck2zk3rz25lfyk9h42f3ywq77mx1syl6vvyncnpg4qh"; ··· 660 675 sha256 = "02a5zfxavhv3jd437bsncbhd2fp1zv4gxzakp1an9l6kdq1mcqls"; 661 676 }) 662 677 (fetchNuGet { 663 - name = "System.IO"; 664 - version = "4.1.0"; 665 - sha256 = "1g0yb8p11vfd0kbkyzlfsbsp5z44lwsvyc0h3dpw6vqnbi035ajp"; 678 + name = "System.Globalization"; 679 + version = "4.0.11"; 680 + sha256 = "070c5jbas2v7smm660zaf1gh0489xanjqymkvafcs4f8cdrs1d5d"; 666 681 }) 667 682 (fetchNuGet { 668 - name = "System.IO"; 683 + name = "System.Globalization"; 669 684 version = "4.3.0"; 670 - sha256 = "05l9qdrzhm4s5dixmx68kxwif4l99ll5gqmh7rqgw554fx0agv5f"; 685 + sha256 = "1cp68vv683n6ic2zqh2s1fn4c2sd87g5hpp6l4d4nj4536jz98ki"; 686 + }) 687 + (fetchNuGet { 688 + name = "System.IO.Compression.ZipFile"; 689 + version = "4.0.1"; 690 + sha256 = "0h72znbagmgvswzr46mihn7xm7chfk2fhrp5krzkjf29pz0i6z82"; 671 691 }) 672 692 (fetchNuGet { 673 693 name = "System.IO.Compression"; ··· 675 695 sha256 = "0iym7s3jkl8n0vzm3jd6xqg9zjjjqni05x45dwxyjr2dy88hlgji"; 676 696 }) 677 697 (fetchNuGet { 678 - name = "System.IO.Compression.ZipFile"; 698 + name = "System.IO.FileSystem.Primitives"; 679 699 version = "4.0.1"; 680 - sha256 = "0h72znbagmgvswzr46mihn7xm7chfk2fhrp5krzkjf29pz0i6z82"; 700 + sha256 = "1s0mniajj3lvbyf7vfb5shp4ink5yibsx945k6lvxa96r8la1612"; 701 + }) 702 + (fetchNuGet { 703 + name = "System.IO.FileSystem.Primitives"; 704 + version = "4.3.0"; 705 + sha256 = "0j6ndgglcf4brg2lz4wzsh1av1gh8xrzdsn9f0yznskhqn1xzj9c"; 681 706 }) 682 707 (fetchNuGet { 683 708 name = "System.IO.FileSystem"; ··· 690 715 sha256 = "0z2dfrbra9i6y16mm9v1v6k47f0fm617vlb7s5iybjjsz6g1ilmw"; 691 716 }) 692 717 (fetchNuGet { 693 - name = "System.IO.FileSystem.Primitives"; 694 - version = "4.0.1"; 695 - sha256 = "1s0mniajj3lvbyf7vfb5shp4ink5yibsx945k6lvxa96r8la1612"; 718 + name = "System.IO"; 719 + version = "4.1.0"; 720 + sha256 = "1g0yb8p11vfd0kbkyzlfsbsp5z44lwsvyc0h3dpw6vqnbi035ajp"; 696 721 }) 697 722 (fetchNuGet { 698 - name = "System.IO.FileSystem.Primitives"; 723 + name = "System.IO"; 699 724 version = "4.3.0"; 700 - sha256 = "0j6ndgglcf4brg2lz4wzsh1av1gh8xrzdsn9f0yznskhqn1xzj9c"; 725 + sha256 = "05l9qdrzhm4s5dixmx68kxwif4l99ll5gqmh7rqgw554fx0agv5f"; 726 + }) 727 + (fetchNuGet { 728 + name = "System.Linq.Expressions"; 729 + version = "4.1.0"; 730 + sha256 = "1gpdxl6ip06cnab7n3zlcg6mqp7kknf73s8wjinzi4p0apw82fpg"; 701 731 }) 702 732 (fetchNuGet { 703 733 name = "System.Linq"; ··· 708 738 name = "System.Linq"; 709 739 version = "4.3.0"; 710 740 sha256 = "1w0gmba695rbr80l1k2h4mrwzbzsyfl2z4klmpbsvsg5pm4a56s7"; 711 - }) 712 - (fetchNuGet { 713 - name = "System.Linq.Expressions"; 714 - version = "4.1.0"; 715 - sha256 = "1gpdxl6ip06cnab7n3zlcg6mqp7kknf73s8wjinzi4p0apw82fpg"; 716 741 }) 717 742 (fetchNuGet { 718 743 name = "System.Management"; ··· 745 770 sha256 = "05kji1mv4sl75iwmc613p873145nynm02xiajx8pn0h2kx53d23s"; 746 771 }) 747 772 (fetchNuGet { 773 + name = "System.Numerics.Vectors"; 774 + version = "4.5.0"; 775 + sha256 = "1kzrj37yzawf1b19jq0253rcs8hsq1l2q8g69d7ipnhzb0h97m59"; 776 + }) 777 + (fetchNuGet { 748 778 name = "System.ObjectModel"; 749 779 version = "4.0.12"; 750 780 sha256 = "1sybkfi60a4588xn34nd9a58png36i0xr4y4v4kqpg8wlvy5krrj"; ··· 755 785 sha256 = "04r1lkdnsznin0fj4ya1zikxiqr0h6r6a1ww2dsm60gqhdrf0mvx"; 756 786 }) 757 787 (fetchNuGet { 758 - name = "System.Reflection"; 759 - version = "4.1.0"; 760 - sha256 = "1js89429pfw79mxvbzp8p3q93il6rdff332hddhzi5wqglc4gml9"; 761 - }) 762 - (fetchNuGet { 763 - name = "System.Reflection"; 764 - version = "4.3.0"; 765 - sha256 = "0xl55k0mw8cd8ra6dxzh974nxif58s3k1rjv1vbd7gjbjr39j11m"; 766 - }) 767 - (fetchNuGet { 768 - name = "System.Reflection.Emit"; 769 - version = "4.0.1"; 770 - sha256 = "0ydqcsvh6smi41gyaakglnv252625hf29f7kywy2c70nhii2ylqp"; 771 - }) 772 - (fetchNuGet { 773 - name = "System.Reflection.Emit"; 774 - version = "4.3.0"; 775 - sha256 = "11f8y3qfysfcrscjpjym9msk7lsfxkk4fmz9qq95kn3jd0769f74"; 776 - }) 777 - (fetchNuGet { 778 788 name = "System.Reflection.Emit.ILGeneration"; 779 789 version = "4.0.1"; 780 790 sha256 = "1pcd2ig6bg144y10w7yxgc9d22r7c7ww7qn1frdfwgxr24j9wvv0"; ··· 795 805 sha256 = "0ql7lcakycrvzgi9kxz1b3lljd990az1x6c4jsiwcacrvimpib5c"; 796 806 }) 797 807 (fetchNuGet { 808 + name = "System.Reflection.Emit"; 809 + version = "4.0.1"; 810 + sha256 = "0ydqcsvh6smi41gyaakglnv252625hf29f7kywy2c70nhii2ylqp"; 811 + }) 812 + (fetchNuGet { 813 + name = "System.Reflection.Emit"; 814 + version = "4.3.0"; 815 + sha256 = "11f8y3qfysfcrscjpjym9msk7lsfxkk4fmz9qq95kn3jd0769f74"; 816 + }) 817 + (fetchNuGet { 798 818 name = "System.Reflection.Extensions"; 799 819 version = "4.0.1"; 800 820 sha256 = "0m7wqwq0zqq9gbpiqvgk3sr92cbrw7cp3xn53xvw7zj6rz6fdirn"; ··· 825 845 sha256 = "0y2ssg08d817p0vdag98vn238gyrrynjdj4181hdg780sif3ykp1"; 826 846 }) 827 847 (fetchNuGet { 848 + name = "System.Reflection"; 849 + version = "4.1.0"; 850 + sha256 = "1js89429pfw79mxvbzp8p3q93il6rdff332hddhzi5wqglc4gml9"; 851 + }) 852 + (fetchNuGet { 853 + name = "System.Reflection"; 854 + version = "4.3.0"; 855 + sha256 = "0xl55k0mw8cd8ra6dxzh974nxif58s3k1rjv1vbd7gjbjr39j11m"; 856 + }) 857 + (fetchNuGet { 828 858 name = "System.Resources.ResourceManager"; 829 859 version = "4.0.1"; 830 860 sha256 = "0b4i7mncaf8cnai85jv3wnw6hps140cxz8vylv2bik6wyzgvz7bi"; ··· 835 865 sha256 = "0sjqlzsryb0mg4y4xzf35xi523s4is4hz9q4qgdvlvgivl7qxn49"; 836 866 }) 837 867 (fetchNuGet { 838 - name = "System.Runtime"; 839 - version = "4.1.0"; 840 - sha256 = "02hdkgk13rvsd6r9yafbwzss8kr55wnj8d5c7xjnp8gqrwc8sn0m"; 841 - }) 842 - (fetchNuGet { 843 - name = "System.Runtime"; 844 - version = "4.3.0"; 845 - sha256 = "066ixvgbf2c929kgknshcxqj6539ax7b9m570cp8n179cpfkapz7"; 868 + name = "System.Runtime.CompilerServices.Unsafe"; 869 + version = "4.7.0"; 870 + sha256 = "16r6sn4czfjk8qhnz7bnqlyiaaszr0ihinb7mq9zzr1wba257r54"; 846 871 }) 847 872 (fetchNuGet { 848 873 name = "System.Runtime.CompilerServices.Unsafe"; ··· 870 895 sha256 = "0sw2gfj2xr7sw9qjn0j3l9yw07x73lcs97p8xfc9w1x9h5g5m7i8"; 871 896 }) 872 897 (fetchNuGet { 898 + name = "System.Runtime.InteropServices.RuntimeInformation"; 899 + version = "4.0.0"; 900 + sha256 = "0glmvarf3jz5xh22iy3w9v3wyragcm4hfdr17v90vs7vcrm7fgp6"; 901 + }) 902 + (fetchNuGet { 903 + name = "System.Runtime.InteropServices.RuntimeInformation"; 904 + version = "4.3.0"; 905 + sha256 = "0q18r1sh4vn7bvqgd6dmqlw5v28flbpj349mkdish2vjyvmnb2ii"; 906 + }) 907 + (fetchNuGet { 873 908 name = "System.Runtime.InteropServices"; 874 909 version = "4.1.0"; 875 910 sha256 = "01kxqppx3dr3b6b286xafqilv4s2n0gqvfgzfd4z943ga9i81is1"; ··· 880 915 sha256 = "00hywrn4g7hva1b2qri2s6rabzwgxnbpw9zfxmz28z09cpwwgh7j"; 881 916 }) 882 917 (fetchNuGet { 883 - name = "System.Runtime.InteropServices.RuntimeInformation"; 884 - version = "4.0.0"; 885 - sha256 = "0glmvarf3jz5xh22iy3w9v3wyragcm4hfdr17v90vs7vcrm7fgp6"; 886 - }) 887 - (fetchNuGet { 888 - name = "System.Runtime.InteropServices.RuntimeInformation"; 889 - version = "4.3.0"; 890 - sha256 = "0q18r1sh4vn7bvqgd6dmqlw5v28flbpj349mkdish2vjyvmnb2ii"; 891 - }) 892 - (fetchNuGet { 893 918 name = "System.Runtime.Numerics"; 894 919 version = "4.0.1"; 895 920 sha256 = "1y308zfvy0l5nrn46mqqr4wb4z1xk758pkk8svbz8b5ij7jnv4nn"; ··· 898 923 name = "System.Runtime.Serialization.Primitives"; 899 924 version = "4.1.1"; 900 925 sha256 = "042rfjixknlr6r10vx2pgf56yming8lkjikamg3g4v29ikk78h7k"; 926 + }) 927 + (fetchNuGet { 928 + name = "System.Runtime"; 929 + version = "4.1.0"; 930 + sha256 = "02hdkgk13rvsd6r9yafbwzss8kr55wnj8d5c7xjnp8gqrwc8sn0m"; 931 + }) 932 + (fetchNuGet { 933 + name = "System.Runtime"; 934 + version = "4.3.0"; 935 + sha256 = "066ixvgbf2c929kgknshcxqj6539ax7b9m570cp8n179cpfkapz7"; 901 936 }) 902 937 (fetchNuGet { 903 938 name = "System.Security.AccessControl"; ··· 955 990 sha256 = "0clg1bv55mfv5dq00m19cp634zx6inm31kf8ppbq1jgyjf2185dh"; 956 991 }) 957 992 (fetchNuGet { 958 - name = "System.Security.Principal"; 959 - version = "4.3.0"; 960 - sha256 = "12cm2zws06z4lfc4dn31iqv7072zyi4m910d4r6wm8yx85arsfxf"; 961 - }) 962 - (fetchNuGet { 963 993 name = "System.Security.Principal.Windows"; 964 994 version = "4.3.0"; 965 995 sha256 = "00a0a7c40i3v4cb20s2cmh9csb5jv2l0frvnlzyfxh848xalpdwr"; ··· 980 1010 sha256 = "1mpk7xj76lxgz97a5yg93wi8lj0l8p157a5d50mmjy3gbz1904q8"; 981 1011 }) 982 1012 (fetchNuGet { 983 - name = "System.Text.Encoding"; 984 - version = "4.0.11"; 985 - sha256 = "1dyqv0hijg265dwxg6l7aiv74102d6xjiwplh2ar1ly6xfaa4iiw"; 986 - }) 987 - (fetchNuGet { 988 - name = "System.Text.Encoding"; 1013 + name = "System.Security.Principal"; 989 1014 version = "4.3.0"; 990 - sha256 = "1f04lkir4iladpp51sdgmis9dj4y8v08cka0mbmsy0frc9a4gjqr"; 1015 + sha256 = "12cm2zws06z4lfc4dn31iqv7072zyi4m910d4r6wm8yx85arsfxf"; 991 1016 }) 992 1017 (fetchNuGet { 993 1018 name = "System.Text.Encoding.Extensions"; ··· 1000 1025 sha256 = "11q1y8hh5hrp5a3kw25cb6l00v5l5dvirkz8jr3sq00h1xgcgrxy"; 1001 1026 }) 1002 1027 (fetchNuGet { 1028 + name = "System.Text.Encoding"; 1029 + version = "4.0.11"; 1030 + sha256 = "1dyqv0hijg265dwxg6l7aiv74102d6xjiwplh2ar1ly6xfaa4iiw"; 1031 + }) 1032 + (fetchNuGet { 1033 + name = "System.Text.Encoding"; 1034 + version = "4.3.0"; 1035 + sha256 = "1f04lkir4iladpp51sdgmis9dj4y8v08cka0mbmsy0frc9a4gjqr"; 1036 + }) 1037 + (fetchNuGet { 1003 1038 name = "System.Text.RegularExpressions"; 1004 1039 version = "4.1.0"; 1005 1040 sha256 = "1mw7vfkkyd04yn2fbhm38msk7dz2xwvib14ygjsb8dq2lcvr18y7"; ··· 1010 1045 sha256 = "1bgq51k7fwld0njylfn7qc5fmwrk2137gdq7djqdsw347paa9c2l"; 1011 1046 }) 1012 1047 (fetchNuGet { 1013 - name = "System.Threading"; 1014 - version = "4.0.11"; 1015 - sha256 = "19x946h926bzvbsgj28csn46gak2crv2skpwsx80hbgazmkgb1ls"; 1048 + name = "System.Threading.Overlapped"; 1049 + version = "4.3.0"; 1050 + sha256 = "1nahikhqh9nk756dh8p011j36rlcp1bzz3vwi2b4m1l2s3vz8idm"; 1016 1051 }) 1017 1052 (fetchNuGet { 1018 - name = "System.Threading"; 1019 - version = "4.3.0"; 1020 - sha256 = "0rw9wfamvhayp5zh3j7p1yfmx9b5khbf4q50d8k5rk993rskfd34"; 1053 + name = "System.Threading.Tasks.Extensions"; 1054 + version = "4.0.0"; 1055 + sha256 = "1cb51z062mvc2i8blpzmpn9d9mm4y307xrwi65di8ri18cz5r1zr"; 1021 1056 }) 1022 1057 (fetchNuGet { 1023 - name = "System.Threading.Overlapped"; 1058 + name = "System.Threading.Tasks.Extensions"; 1024 1059 version = "4.3.0"; 1025 - sha256 = "1nahikhqh9nk756dh8p011j36rlcp1bzz3vwi2b4m1l2s3vz8idm"; 1060 + sha256 = "1xxcx2xh8jin360yjwm4x4cf5y3a2bwpn2ygkfkwkicz7zk50s2z"; 1026 1061 }) 1027 1062 (fetchNuGet { 1028 1063 name = "System.Threading.Tasks"; ··· 1035 1070 sha256 = "134z3v9abw3a6jsw17xl3f6hqjpak5l682k2vz39spj4kmydg6k7"; 1036 1071 }) 1037 1072 (fetchNuGet { 1038 - name = "System.Threading.Tasks.Extensions"; 1039 - version = "4.0.0"; 1040 - sha256 = "1cb51z062mvc2i8blpzmpn9d9mm4y307xrwi65di8ri18cz5r1zr"; 1041 - }) 1042 - (fetchNuGet { 1043 - name = "System.Threading.Tasks.Extensions"; 1044 - version = "4.3.0"; 1045 - sha256 = "1xxcx2xh8jin360yjwm4x4cf5y3a2bwpn2ygkfkwkicz7zk50s2z"; 1046 - }) 1047 - (fetchNuGet { 1048 1073 name = "System.Threading.Thread"; 1049 1074 version = "4.3.0"; 1050 1075 sha256 = "0y2xiwdfcph7znm2ysxanrhbqqss6a3shi1z3c779pj2s523mjx4"; ··· 1060 1085 sha256 = "15n54f1f8nn3mjcjrlzdg6q3520571y012mx7v991x2fvp73lmg6"; 1061 1086 }) 1062 1087 (fetchNuGet { 1088 + name = "System.Threading"; 1089 + version = "4.0.11"; 1090 + sha256 = "19x946h926bzvbsgj28csn46gak2crv2skpwsx80hbgazmkgb1ls"; 1091 + }) 1092 + (fetchNuGet { 1093 + name = "System.Threading"; 1094 + version = "4.3.0"; 1095 + sha256 = "0rw9wfamvhayp5zh3j7p1yfmx9b5khbf4q50d8k5rk993rskfd34"; 1096 + }) 1097 + (fetchNuGet { 1063 1098 name = "System.Xml.ReaderWriter"; 1064 1099 version = "4.0.11"; 1065 1100 sha256 = "0c6ky1jk5ada9m94wcadih98l6k1fvf6vi7vhn1msjixaha419l5"; ··· 1080 1115 sha256 = "0bmz1l06dihx52jxjr22dyv5mxv6pj4852lx68grjm7bivhrbfwi"; 1081 1116 }) 1082 1117 (fetchNuGet { 1083 - name = "System.Xml.XPath"; 1118 + name = "System.Xml.XPath.XmlDocument"; 1084 1119 version = "4.3.0"; 1085 - sha256 = "1cv2m0p70774a0sd1zxc8fm8jk3i5zk2bla3riqvi8gsm0r4kpci"; 1120 + sha256 = "1h9lh7qkp0lff33z847sdfjj8yaz98ylbnkbxlnsbflhj9xyfqrm"; 1086 1121 }) 1087 1122 (fetchNuGet { 1088 - name = "System.Xml.XPath.XmlDocument"; 1123 + name = "System.Xml.XPath"; 1089 1124 version = "4.3.0"; 1090 - sha256 = "1h9lh7qkp0lff33z847sdfjj8yaz98ylbnkbxlnsbflhj9xyfqrm"; 1125 + sha256 = "1cv2m0p70774a0sd1zxc8fm8jk3i5zk2bla3riqvi8gsm0r4kpci"; 1091 1126 }) 1092 1127 ]
-33
pkgs/misc/emulators/ryujinx/disable-updater.patch
··· 1 - diff --git a/Ryujinx/Program.cs b/Ryujinx/Program.cs 2 - index 29043bb8..d3973c7c 100644 3 - --- a/Ryujinx/Program.cs 4 - +++ b/Ryujinx/Program.cs 5 - @@ -54,9 +54,6 @@ namespace Ryujinx 6 - } 7 - } 8 - 9 - - // Delete backup files after updating. 10 - - Task.Run(Updater.CleanupUpdate); 11 - - 12 - Toolkit.Init(new ToolkitOptions 13 - { 14 - Backend = PlatformBackend.PreferNative 15 - @@ -146,11 +143,6 @@ namespace Ryujinx 16 - mainWindow.LoadApplication(launchPathArg); 17 - } 18 - 19 - - if (ConfigurationState.Instance.CheckUpdatesOnStart.Value && Updater.CanUpdate(false)) 20 - - { 21 - - _ = Updater.BeginParse(mainWindow, false); 22 - - } 23 - - 24 - Application.Run(); 25 - } 26 - 27 - @@ -200,4 +192,4 @@ namespace Ryujinx 28 - Logger.Shutdown(); 29 - } 30 - } 31 - -} 32 - \ No newline at end of file 33 - +}
-38
pkgs/misc/emulators/ryujinx/fetch-deps.sh
··· 1 - #!/usr/bin/env nix-shell 2 - #!nix-shell -i bash -p curl jq common-updater-scripts dotnet-sdk_5 3 - set -eo pipefail 4 - cd "$(dirname "${BASH_SOURCE[0]}")" 5 - 6 - deps_file="$(realpath "./deps.nix")" 7 - 8 - # Setup empty nuget package folder to force reinstall. 9 - mkdir ./nuget_tmp.packages 10 - cat >./nuget_tmp.config <<EOF 11 - <?xml version="1.0" encoding="utf-8"?> 12 - <configuration> 13 - <packageSources> 14 - <add key="nuget" value="https://api.nuget.org/v3/index.json" /> 15 - </packageSources> 16 - <config> 17 - <add key="globalPackagesFolder" value="$(realpath ./nuget_tmp.packages)" /> 18 - </config> 19 - </configuration> 20 - EOF 21 - 22 - dotnet restore Ryujinx.sln --configfile ./nuget_tmp.config 23 - 24 - echo "{ fetchNuGet }: [" >"$deps_file" 25 - while read pkg_spec; do 26 - { read pkg_name; read pkg_version; } < <( 27 - # Build version part should be ignored: `3.0.0-beta2.20059.3+77df2220` -> `3.0.0-beta2.20059.3` 28 - sed -nE 's/.*<id>([^<]*).*/\1/p; s/.*<version>([^<+]*).*/\1/p' "$pkg_spec") 29 - pkg_sha256="$(nix-hash --type sha256 --flat --base32 "$(dirname "$pkg_spec")"/*.nupkg)" 30 - cat >>"$deps_file" <<EOF 31 - (fetchNuGet { 32 - name = "$pkg_name"; 33 - version = "$pkg_version"; 34 - sha256 = "$pkg_sha256"; 35 - }) 36 - EOF 37 - done < <(find ./nuget_tmp.packages -name '*.nuspec' | sort) 38 - echo "]" >>"$deps_file"
+67
pkgs/misc/emulators/ryujinx/updater.sh
··· 1 + #! /usr/bin/env nix-shell 2 + #! nix-shell -i bash -p coreutils gnused curl common-updater-scripts nix-prefetch-git jq dotnet-sdk_5 3 + set -eo pipefail 4 + cd "$(dirname "${BASH_SOURCE[0]}")" 5 + 6 + deps_file="$(realpath "./deps.nix")" 7 + 8 + nix-prefetch-git https://github.com/ryujinx/ryujinx --quiet > repo_info 9 + new_hash="$(jq -r ".sha256" < repo_info)" 10 + new_rev="$(jq -r ".rev" < repo_info)" 11 + rm repo_info 12 + 13 + new_version="$( 14 + curl -s https://ci.appveyor.com/api/projects/gdkchan/ryujinx/branch/master \ 15 + | grep -Po '"version":.*?[^\\]",' \ 16 + | sed 's/"version":"\(.*\)",/\1/' 17 + )" 18 + old_version="$(sed -nE 's/\s*version = "(.*)".*/\1/p' ./default.nix)" 19 + 20 + if [[ "$new_version" == "$old_version" ]]; then 21 + echo "Already up to date! Doing nothing" 22 + exit 0 23 + fi 24 + 25 + cd ../../../.. 26 + update-source-version ryujinx "$new_version" "$new_hash" --rev="$new_rev" 27 + 28 + store_src="$(nix-build . -A ryujinx.src --no-out-link)" 29 + src="$(mktemp -d /tmp/ryujinx-src.XXX)" 30 + cp -rT "$store_src" "$src" 31 + chmod -R +w "$src" 32 + pushd "$src" 33 + 34 + # Setup empty nuget package folder to force reinstall. 35 + mkdir ./nuget_tmp.packages 36 + cat >./nuget_tmp.config <<EOF 37 + <?xml version="1.0" encoding="utf-8"?> 38 + <configuration> 39 + <packageSources> 40 + <add key="nuget" value="https://api.nuget.org/v3/index.json" /> 41 + </packageSources> 42 + <config> 43 + <add key="globalPackagesFolder" value="$(realpath ./nuget_tmp.packages)" /> 44 + </config> 45 + </configuration> 46 + EOF 47 + 48 + dotnet restore Ryujinx.sln --configfile ./nuget_tmp.config 49 + 50 + echo "{ fetchNuGet }: [" >"$deps_file" 51 + while read pkg_spec; do 52 + { read pkg_name; read pkg_version; } < <( 53 + # Build version part should be ignored: `3.0.0-beta2.20059.3+77df2220` -> `3.0.0-beta2.20059.3` 54 + sed -nE 's/.*<id>([^<]*).*/\1/p; s/.*<version>([^<+]*).*/\1/p' "$pkg_spec") 55 + pkg_sha256="$(nix-hash --type sha256 --flat --base32 "$(dirname "$pkg_spec")"/*.nupkg)" 56 + cat >>"$deps_file" <<EOF 57 + (fetchNuGet { 58 + name = "$pkg_name"; 59 + version = "$pkg_version"; 60 + sha256 = "$pkg_sha256"; 61 + }) 62 + EOF 63 + done < <(find ./nuget_tmp.packages -name '*.nuspec' | sort) 64 + echo "]" >>"$deps_file" 65 + 66 + popd 67 + rm -r "$src"
+2 -2
pkgs/misc/emulators/yuzu/base.nix
··· 1 1 { pname, version, src, branchName 2 2 , stdenv, lib, fetchFromGitHub, fetchpatch, wrapQtAppsHook 3 3 , cmake, pkg-config 4 - , libpulseaudio, libjack2, alsaLib, sndio, ecasound 4 + , libpulseaudio, libjack2, alsaLib, sndio 5 5 , vulkan-loader, vulkan-headers 6 6 , qtbase, qtwebengine, qttools 7 7 , nlohmann_json, rapidjson ··· 21 21 22 22 nativeBuildInputs = [ cmake pkg-config wrapQtAppsHook ]; 23 23 buildInputs = [ 24 - libpulseaudio libjack2 alsaLib sndio ecasound 24 + libpulseaudio libjack2 alsaLib sndio 25 25 vulkan-loader vulkan-headers 26 26 qtbase qtwebengine qttools 27 27 nlohmann_json rapidjson
+4 -4
pkgs/misc/emulators/yuzu/default.nix
··· 4 4 in { 5 5 mainline = libsForQt5.callPackage ./base.nix rec { 6 6 pname = "yuzu-mainline"; 7 - version = "546"; 7 + version = "576"; 8 8 branchName = branch; 9 9 src = fetchFromGitHub { 10 10 owner = "yuzu-emu"; 11 11 repo = "yuzu-mainline"; 12 12 rev = "mainline-0-${version}"; 13 - sha256 = "0d6cbhp877xyjac1flkyjf6g6igzmvjlk6gcph4m04i4zivb9kf2"; 13 + sha256 = "121pn3kmghpcf4pzs0mc8z3viyp32rzm7rssva7cdd5016z2648k"; 14 14 fetchSubmodules = true; 15 15 }; 16 16 }; 17 17 early-access = libsForQt5.callPackage ./base.nix rec { 18 18 pname = "yuzu-ea"; 19 - version = "1480"; 19 + version = "1536"; 20 20 branchName = branch; 21 21 src = fetchFromGitHub { 22 22 owner = "pineappleEA"; 23 23 repo = "pineapple-src"; 24 24 rev = "EA-${version}"; 25 - sha256 = "0flc5mckmnr9gj8f78nh9nys96inlkqk3rvpgbpl0mhcg6lmlb2g"; 25 + sha256 = "0smrx05xxr4b96i8bw6n6pynkl9r21ydfvpjdzxkr9amin20r54y"; 26 26 }; 27 27 }; 28 28 }.${branch}
+2 -2
pkgs/misc/lightspark/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, pkg-config, cmake, curl, zlib, ffmpeg_3, glew, pcre 2 - , rtmpdump, cairo, boost, SDL2, SDL2_mixer, libjpeg, pango, lzma, nasm 2 + , rtmpdump, cairo, boost, SDL2, SDL2_mixer, libjpeg, pango, xz, nasm 3 3 , llvm, glibmm 4 4 }: 5 5 ··· 22 22 23 23 buildInputs = [ 24 24 curl zlib ffmpeg_3 glew pcre rtmpdump cairo boost SDL2 SDL2_mixer libjpeg 25 - pango lzma nasm llvm glibmm 25 + pango xz nasm llvm glibmm 26 26 ]; 27 27 28 28 meta = with lib; {
+28
pkgs/misc/tmux-plugins/default.nix
··· 143 143 }; 144 144 }; 145 145 146 + extrakto = mkTmuxPlugin { 147 + pluginName = "extrakto"; 148 + version = "unstable-2021-04-04"; 149 + src = fetchFromGitHub { 150 + owner = "laktak"; 151 + repo = "extrakto"; 152 + rev = "de8ac3e8a9fa887382649784ed8cae81f5757f77"; 153 + sha256 = "0mkp9r6mipdm7408w7ls1vfn6i3hj19nmir2bvfcp12b69zlzc47"; 154 + }; 155 + nativeBuildInputs = [ pkgs.makeWrapper ]; 156 + postInstall = '' 157 + for f in extrakto.sh open.sh tmux-extrakto.sh; do 158 + wrapProgram $target/scripts/$f \ 159 + --prefix PATH : ${with pkgs; lib.makeBinPath ( 160 + [ pkgs.fzf pkgs.python3 pkgs.xclip ] 161 + )} 162 + done 163 + 164 + ''; 165 + meta = { 166 + homepage = "https://github.com/laktak/extrakto"; 167 + description = "Fuzzy find your text with fzf instead of selecting it by hand "; 168 + license = lib.licenses.mit; 169 + platforms = lib.platforms.unix; 170 + maintainers = with lib.maintainers; [ kidd ]; 171 + }; 172 + }; 173 + 146 174 fingers = mkTmuxPlugin rec { 147 175 pluginName = "fingers"; 148 176 rtpFilePath = "tmux-fingers.tmux";
+1
pkgs/misc/uboot/default.nix
··· 192 192 platforms = ["aarch64-linux"]; 193 193 license = lib.licenses.unfreeRedistributableFirmware; 194 194 }; 195 + BL31="${armTrustedFirmwareRK3399}/bl31.elf"; 195 196 filesToInstall = ["u-boot.itb" "idbloader.img"]; 196 197 postBuild = '' 197 198 ./tools/mkimage -n rk3399 -T rksd -d ${rkbin}/rk33/rk3399_ddr_800MHz_v1.24.bin idbloader.img
+3 -3
pkgs/os-specific/bsd/netbsd/default.nix
··· 1 - { stdenv, stdenvNoCC, fetchcvs, lib, groff, mandoc, zlib, yacc, flex 1 + { stdenv, stdenvNoCC, fetchcvs, lib, groff, mandoc, zlib, bison, flex 2 2 , writeText, buildPackages, splicePackages, symlinkJoin }: 3 3 4 4 let ··· 563 563 sha256 = "0630lbvz6v4ic13bfg8ccwfhqkgcv76bfdw9f36rfsnwfgpxqsmq"; 564 564 meta.platforms = lib.platforms.netbsd; 565 565 nativeBuildInputs = [ makeMinimal install mandoc groff flex 566 - yacc genassym gencat lorder tsort stat ]; 566 + bison genassym gencat lorder tsort stat ]; 567 567 extraPaths = [ sys.src ld_elf_so.src ]; 568 568 }; 569 569 ··· 587 587 librpcsvc.src libutil.src librt.src libcrypt.src ]; 588 588 buildInputs = [ buildPackages.netbsd.headers csu ]; 589 589 nativeBuildInputs = [ makeMinimal install mandoc groff flex 590 - yacc genassym gencat lorder tsort stat ]; 590 + bison genassym gencat lorder tsort stat ]; 591 591 NIX_CFLAGS_COMPILE = "-B${csu}/lib"; 592 592 meta.platforms = lib.platforms.netbsd; 593 593 SHLIBINSTALLDIR = "$(out)/lib";
+2 -2
pkgs/os-specific/darwin/apple-source-releases/adv_cmds/boot.nix
··· 1 - { lib, appleDerivation, fetchzip, bsdmake, perl, flex, yacc 1 + { lib, appleDerivation, fetchzip, bsdmake, perl, flex, bison 2 2 }: 3 3 4 4 # this derivation sucks ··· 16 16 }; 17 17 18 18 in appleDerivation { 19 - nativeBuildInputs = [ bsdmake perl yacc flex ]; 19 + nativeBuildInputs = [ bsdmake perl bison flex ]; 20 20 buildInputs = [ flex ]; 21 21 22 22 patchPhase = ''
+2 -2
pkgs/os-specific/darwin/apple-source-releases/bootstrap_cmds/default.nix
··· 1 - { lib, stdenv, appleDerivation, yacc, flex }: 1 + { lib, stdenv, appleDerivation, bison, flex }: 2 2 3 3 appleDerivation { 4 - nativeBuildInputs = [ yacc flex ]; 4 + nativeBuildInputs = [ bison flex ]; 5 5 6 6 buildPhase = '' 7 7 cd migcom.tproj
+2 -2
pkgs/os-specific/darwin/apple-source-releases/file_cmds/default.nix
··· 1 - { lib, appleDerivation, xcbuildHook, zlib, bzip2, lzma, ncurses, libutil }: 1 + { lib, appleDerivation, xcbuildHook, zlib, bzip2, xz, ncurses, libutil }: 2 2 3 3 appleDerivation { 4 4 nativeBuildInputs = [ xcbuildHook ]; 5 - buildInputs = [ zlib bzip2 lzma ncurses libutil ]; 5 + buildInputs = [ zlib bzip2 xz ncurses libutil ]; 6 6 7 7 # some commands not working: 8 8 # mtree: _simple.h not found
+3 -3
pkgs/os-specific/darwin/apple-source-releases/text_cmds/default.nix
··· 1 - { lib, appleDerivation, xcbuildHook, ncurses, bzip2, zlib, lzma }: 1 + { lib, appleDerivation, xcbuildHook, ncurses, bzip2, zlib, xz }: 2 2 3 3 appleDerivation { 4 4 nativeBuildInputs = [ xcbuildHook ]; 5 - buildInputs = [ ncurses bzip2 zlib lzma ]; 5 + buildInputs = [ ncurses bzip2 zlib xz ]; 6 6 7 7 # patches to use ncursees 8 8 # disables md5 9 9 patchPhase = '' 10 10 substituteInPlace text_cmds.xcodeproj/project.pbxproj \ 11 - --replace 'FC6C98FB149A94EB00DDCC47 /* libcurses.dylib */ = {isa = PBXFileReference; lastKnownFileType = "compiled.mach-o.dylib"; name = libcurses.dylib; path = /usr/lib/libcurses.dylib; sourceTree = "<absolute>"; };' 'FC6C98FB149A94EB00DDCC47 /* libncurses.dylib */ = {isa = PBXFileReference; lastKnownFileType = "compiled.mach-o.dylib"; name = libncurses.dylib; path = /usr/lib/libncurses.dylib; sourceTree = "<absolute>"; };' \ 11 + --replace 'FC6C98FB149A94EB00DDCC47 /* libcurses.dylib */ = {isa = PBXFileReference; lastKnownFileType = "compiled.mach-o.dylib"; name = libcurses.dylib; path = /usr/lib/libcurses.dylib; sourceTree = "<absolute>"; };' 'FC6C98FB149A94EB00DDCC47 /* libncurses.dylib */ = {isa = PBXFileReference; lastKnownFileType = "compiled.mach-o.dylib"; name = libncurses.dylib; path = /usr/lib/libncurses.dylib; sourceTree = "<absolute>"; };' \ 12 12 --replace 'FC7A7EB5149875E00086576A /* PBXTargetDependency */,' "" 13 13 ''; 14 14
+2 -2
pkgs/os-specific/linux/autofs/default.nix
··· 1 1 { lib, stdenv, fetchurl, flex, bison, linuxHeaders, libtirpc, mount, umount, nfs-utils, e2fsprogs 2 - , libxml2, kerberos, kmod, openldap, sssd, cyrus_sasl, openssl, rpcsvc-proto }: 2 + , libxml2, libkrb5, kmod, openldap, sssd, cyrus_sasl, openssl, rpcsvc-proto }: 3 3 4 4 let 5 5 version = "5.1.6"; ··· 36 36 #make install SUBDIRS="samples" # impure! 37 37 ''; 38 38 39 - buildInputs = [ linuxHeaders libtirpc libxml2 kerberos kmod openldap sssd 39 + buildInputs = [ linuxHeaders libtirpc libxml2 libkrb5 kmod openldap sssd 40 40 openssl cyrus_sasl rpcsvc-proto ]; 41 41 42 42 nativeBuildInputs = [ flex bison ];
+2 -2
pkgs/os-specific/linux/cifs-utils/default.nix
··· 1 1 { stdenv, lib, fetchurl, autoreconfHook, docutils, pkg-config 2 - , kerberos, keyutils, pam, talloc, python3 }: 2 + , libkrb5, keyutils, pam, talloc, python3 }: 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "cifs-utils"; ··· 12 12 13 13 nativeBuildInputs = [ autoreconfHook docutils pkg-config ]; 14 14 15 - buildInputs = [ kerberos keyutils pam talloc python3 ]; 15 + buildInputs = [ libkrb5 keyutils pam talloc python3 ]; 16 16 17 17 configureFlags = [ "ROOTSBINDIR=$(out)/sbin" ] ++ lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [ 18 18 # AC_FUNC_MALLOC is broken on cross builds.
+2 -2
pkgs/os-specific/linux/firmware/firmware-manager/default.nix
··· 1 - { rustPlatform, lib, fetchFromGitHub, lzma, pkg-config, openssl, dbus, glib, udev, cairo, pango, atk, gdk-pixbuf, gtk3, wrapGAppsHook }: 1 + { rustPlatform, lib, fetchFromGitHub, xz, pkg-config, openssl, dbus, glib, udev, cairo, pango, atk, gdk-pixbuf, gtk3, wrapGAppsHook }: 2 2 rustPlatform.buildRustPackage rec { 3 3 pname = "firmware-manager"; 4 4 version = "0.1.2"; ··· 12 12 13 13 nativeBuildInputs = [ pkg-config wrapGAppsHook ]; 14 14 15 - buildInputs = [ lzma openssl dbus glib udev cairo pango atk gdk-pixbuf gtk3 ]; 15 + buildInputs = [ xz openssl dbus glib udev cairo pango atk gdk-pixbuf gtk3 ]; 16 16 17 17 depsExtraArgs.postPatch = "make prefix='$(out)' toml-gen"; 18 18
+6 -6
pkgs/os-specific/linux/firmware/raspberrypi-wireless/default.nix
··· 2 2 3 3 stdenv.mkDerivation { 4 4 pname = "raspberrypi-wireless-firmware"; 5 - version = "2020-12-01"; 5 + version = "2021-01-28"; 6 6 7 7 srcs = [ 8 8 (fetchFromGitHub { 9 9 name = "bluez-firmware"; 10 10 owner = "RPi-Distro"; 11 11 repo = "bluez-firmware"; 12 - rev = "1e4ee0c05bae10002124b56c0e44bb9ac6581ddc"; 13 - sha256 = "10n6ibr3ra71f4hlvbpy8csjlgrapawxrr6jmijn470vkcqcpq27"; 12 + rev = "e7fd166981ab4bb9a36c2d1500205a078a35714d"; 13 + sha256 = "1dkg8mzn7n4afi50ibrda2s33nw2qj52jjjdv9w560q601gms47b"; 14 14 }) 15 15 (fetchFromGitHub { 16 16 name = "firmware-nonfree"; 17 17 owner = "RPi-Distro"; 18 18 repo = "firmware-nonfree"; 19 - rev = "b66ab26cebff689d0d3257f56912b9bb03c20567"; 20 - sha256 = "0cffgsp0w7vv7ylpymdddx0bl9dx3pl7snlh30p4rr9srmn8869f"; 19 + rev = "83938f78ca2d5a0ffe0c223bb96d72ccc7b71ca5"; 20 + sha256 = "1l4zz86y2hjyvdwjy75abyjwh3wqknd71y3vh1iw5nd0hws8ranp"; 21 21 }) 22 22 ]; 23 23 ··· 41 41 42 42 outputHashMode = "recursive"; 43 43 outputHashAlgo = "sha256"; 44 - outputHash = "17k9y499kjc4zv7ivnsfrgfibwj0ldr3sqdgia4dackbr70jfg2h"; 44 + outputHash = "0a54gyrq6jfxxvimaa4yjfiyfwf7wv58v0a32l74yrzyarr3ldby"; 45 45 46 46 meta = with lib; { 47 47 description = "Firmware for builtin Wifi/Bluetooth devices in the Raspberry Pi 3+ and Zero W";
+2 -2
pkgs/os-specific/linux/firmware/raspberrypi/default.nix
··· 3 3 stdenvNoCC.mkDerivation rec { 4 4 # NOTE: this should be updated with linux_rpi 5 5 pname = "raspberrypi-firmware"; 6 - version = "1.20201201"; 6 + version = "1.20210303"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "raspberrypi"; 10 10 repo = "firmware"; 11 11 rev = version; 12 - sha256 = "09yha3k72yqx29rwnv2j2zm73lzc4jgmcbmcc6yrl1i07x84lx3n"; 12 + sha256 = "0pgiw93hq4gfph5dnwbi8w59g0f7yhmagwzam971k529mh5yl86m"; 13 13 }; 14 14 15 15 installPhase = ''
+2 -2
pkgs/os-specific/linux/firmware/system76-firmware/default.nix
··· 1 - { rustPlatform, lib, fetchFromGitHub, lzma, pkg-config, openssl, dbus, efibootmgr, makeWrapper }: 1 + { rustPlatform, lib, fetchFromGitHub, xz, pkg-config, openssl, dbus, efibootmgr, makeWrapper }: 2 2 rustPlatform.buildRustPackage rec { 3 3 pname = "system76-firmware"; 4 4 # Check Makefile when updating, make sure postInstall matches make install ··· 13 13 14 14 nativeBuildInputs = [ pkg-config makeWrapper ]; 15 15 16 - buildInputs = [ lzma openssl dbus ]; 16 + buildInputs = [ xz openssl dbus ]; 17 17 18 18 cargoBuildFlags = [ "--workspace" ]; 19 19
+2 -2
pkgs/os-specific/linux/gogoclient/default.nix
··· 1 - {lib, stdenv, fetchurl, openssl, nettools, iproute, sysctl}: 1 + {lib, stdenv, fetchurl, openssl, nettools, iproute2, sysctl}: 2 2 3 3 let baseName = "gogoclient"; 4 4 version = "1.2"; ··· 29 29 substituteInPlace "$out/template/linux.sh" \ 30 30 --replace "/sbin/ifconfig" "${nettools}/bin/ifconfig" \ 31 31 --replace "/sbin/route" "${nettools}/bin/route" \ 32 - --replace "/sbin/ip" "${iproute}/sbin/ip" \ 32 + --replace "/sbin/ip" "${iproute2}/sbin/ip" \ 33 33 --replace "/sbin/sysctl" "${sysctl}/bin/sysctl" 34 34 sed -i -e 's/^.*Exec \$route -A.*$/& metric 128/' $out/template/linux.sh 35 35 '';
+2 -2
pkgs/os-specific/linux/hyperv-daemons/default.nix
··· 1 1 { stdenv, lib, python, kernel, makeWrapper, writeText 2 - , gawk, iproute }: 2 + , gawk, iproute2 }: 3 3 4 4 let 5 5 libexec = "libexec/hypervkvpd"; ··· 42 42 43 43 postFixup = '' 44 44 wrapProgram $out/bin/hv_kvp_daemon \ 45 - --prefix PATH : $out/bin:${lib.makeBinPath [ gawk iproute ]} 45 + --prefix PATH : $out/bin:${lib.makeBinPath [ gawk iproute2 ]} 46 46 ''; 47 47 }; 48 48
+2 -2
pkgs/os-specific/linux/iproute/mptcp.nix
··· 1 - { lib, iproute, fetchFromGitHub }: 1 + { lib, iproute2, fetchFromGitHub }: 2 2 3 - iproute.overrideAttrs (oa: rec { 3 + iproute2.overrideAttrs (oa: rec { 4 4 pname = "iproute_mptcp"; 5 5 version = "0.95"; 6 6
+2 -2
pkgs/os-specific/linux/ipsec-tools/default.nix
··· 1 - { lib, stdenv, fetchurl, fetchpatch, linuxHeaders, readline, openssl, flex, kerberos, pam }: 1 + { lib, stdenv, fetchurl, fetchpatch, linuxHeaders, readline, openssl, flex, libkrb5, pam }: 2 2 3 3 # TODO: These tools are supposed to work under NetBSD and FreeBSD as 4 4 # well, so I guess it's not appropriate to place this expression in ··· 14 14 sha256 = "0b9gfbz78k2nj0k7jdlm5kajig628ja9qm0z5yksiwz22s3v7dlf"; 15 15 }; 16 16 17 - buildInputs = [ readline openssl flex kerberos pam ]; 17 + buildInputs = [ readline openssl flex libkrb5 pam ]; 18 18 19 19 patches = [ 20 20 ./dont-create-localstatedir-during-install.patch
+37
pkgs/os-specific/linux/joycond/default.nix
··· 1 + { lib, stdenv, fetchFromGitHub, cmake, pkg-config, libevdev, udev }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "joycond"; 5 + version = "unstable-2021-03-27"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "DanielOgorchock"; 9 + repo = "joycond"; 10 + rev = "2d3f553060291f1bfee2e49fc2ca4a768b289df8"; 11 + sha256 = "0dpmwspll9ar3pxg9rgnh224934par8h8bixdz9i2pqqbc3dqib7"; 12 + }; 13 + 14 + nativeBuildInputs = [ cmake pkg-config ]; 15 + buildInputs = [ libevdev udev ]; 16 + 17 + # CMake has hardcoded install paths 18 + installPhase = '' 19 + mkdir -p $out/{bin,etc/{systemd/system,udev/rules.d},lib/modules-load.d} 20 + 21 + cp ./joycond $out/bin 22 + cp $src/udev/{89,72}-joycond.rules $out/etc/udev/rules.d 23 + cp $src/systemd/joycond.service $out/etc/systemd/system 24 + cp $src/systemd/joycond.conf $out/lib/modules-load.d 25 + 26 + substituteInPlace $out/etc/systemd/system/joycond.service --replace \ 27 + "ExecStart=/usr/bin/joycond" "ExecStart=$out/bin/joycond" 28 + ''; 29 + 30 + meta = with lib; { 31 + homepage = "https://github.com/DanielOgorchock/joycond"; 32 + description = "Userspace daemon to combine joy-cons from the hid-nintendo kernel driver"; 33 + license = licenses.gpl3Only; 34 + maintainers = [ maintainers.ivar ]; 35 + platforms = platforms.linux; 36 + }; 37 + }
+15 -15
pkgs/os-specific/linux/kernel/hardened/patches.json
··· 1 1 { 2 2 "4.14": { 3 3 "extra": "-hardened1", 4 - "name": "linux-hardened-4.14.227-hardened1.patch", 5 - "sha256": "0g8s91cvcxin95is7hhap5i8vkn4k3570s28vnz8mf0jrcgwdgfd", 6 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.14.227-hardened1/linux-hardened-4.14.227-hardened1.patch" 4 + "name": "linux-hardened-4.14.228-hardened1.patch", 5 + "sha256": "0pf3c98m2zlgxv9p10p7xw44f6mqnh8ac47jl1abz3yy3hiag0cd", 6 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.14.228-hardened1/linux-hardened-4.14.228-hardened1.patch" 7 7 }, 8 8 "4.19": { 9 9 "extra": "-hardened1", 10 - "name": "linux-hardened-4.19.183-hardened1.patch", 11 - "sha256": "1xi4fkvdvf1rjhrihi7im415x26hwmvhf3zrklm8hw2rmajdfrca", 12 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.183-hardened1/linux-hardened-4.19.183-hardened1.patch" 10 + "name": "linux-hardened-4.19.184-hardened1.patch", 11 + "sha256": "1828kkq05808mahkfb0387b1k5qp6pysy4mny1xgpwqdphpp1pq9", 12 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/4.19.184-hardened1/linux-hardened-4.19.184-hardened1.patch" 13 13 }, 14 14 "5.10": { 15 15 "extra": "-hardened1", 16 - "name": "linux-hardened-5.10.26-hardened1.patch", 17 - "sha256": "08f4yks3fjv5zi85zbxa3aqfllb6nbr58hm6kchd83l6rknnix4r", 18 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.10.26-hardened1/linux-hardened-5.10.26-hardened1.patch" 16 + "name": "linux-hardened-5.10.27-hardened1.patch", 17 + "sha256": "12pzv36p0pdaqqklwv6rpk15c1z1nz2syw1si24514p63v46wmhn", 18 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.10.27-hardened1/linux-hardened-5.10.27-hardened1.patch" 19 19 }, 20 20 "5.11": { 21 21 "extra": "-hardened1", 22 - "name": "linux-hardened-5.11.10-hardened1.patch", 23 - "sha256": "16083fvl5km751dps7mzjc2fl1qp9jqnyn7lg8jlfxc8w32bbxwv", 24 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.11.10-hardened1/linux-hardened-5.11.10-hardened1.patch" 22 + "name": "linux-hardened-5.11.11-hardened1.patch", 23 + "sha256": "0isq152z4h2kl3rviia9xlpsmdx331kx8p1x00jbf4gcw30amc78", 24 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.11.11-hardened1/linux-hardened-5.11.11-hardened1.patch" 25 25 }, 26 26 "5.4": { 27 27 "extra": "-hardened1", 28 - "name": "linux-hardened-5.4.108-hardened1.patch", 29 - "sha256": "1m208j0svysyn3m0acn10pd4wqjm203ampkhf1wimzpzs8wfasgj", 30 - "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.108-hardened1/linux-hardened-5.4.108-hardened1.patch" 28 + "name": "linux-hardened-5.4.109-hardened1.patch", 29 + "sha256": "19likbds74lzym969p6hbchlfii4qnsp8y4ryfkba1vv6hv51zzj", 30 + "url": "https://github.com/anthraxx/linux-hardened/releases/download/5.4.109-hardened1/linux-hardened-5.4.109-hardened1.patch" 31 31 } 32 32 }
+2 -2
pkgs/os-specific/linux/kernel/linux-4.14.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "4.14.227"; 6 + version = "4.14.228"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz"; 16 - sha256 = "1iz029v407xv81prrvg4gr2ql8hvm0mpj21x9picwv05pk2d68h7"; 16 + sha256 = "0nw1jf6x5a990n69aw2da4s4lc1c7mnwiwcda40bl2rkmd24s1qm"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-4.19.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "4.19.183"; 6 + version = "4.19.184"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz"; 16 - sha256 = "1xd5hjdjbsw7kpj9csgi8kk4ki3z46sqbiigjsr71psivxfxkkxs"; 16 + sha256 = "0z5pgal8775rf7pvpxq47dnghr42al2k9py0s9jl3js2wamgdyix"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-4.4.nix
··· 1 1 { buildPackages, fetchurl, perl, buildLinux, ... } @ args: 2 2 3 3 buildLinux (args // rec { 4 - version = "4.4.263"; 4 + version = "4.4.264"; 5 5 extraMeta.branch = "4.4"; 6 6 7 7 src = fetchurl { 8 8 url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz"; 9 - sha256 = "1qqh3n09pn87n6f7ain3am8k7j043vzm65qcvccq9as129y5w1a2"; 9 + sha256 = "1b0d735qnk0bcqn9gdsjqxhk8pkb3597ya9f34lv1vjfaqkkxk7l"; 10 10 }; 11 11 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-4.9.nix
··· 1 1 { buildPackages, fetchurl, perl, buildLinux, ... } @ args: 2 2 3 3 buildLinux (args // rec { 4 - version = "4.9.263"; 4 + version = "4.9.264"; 5 5 extraMeta.branch = "4.9"; 6 6 7 7 src = fetchurl { 8 8 url = "mirror://kernel/linux/kernel/v4.x/linux-${version}.tar.xz"; 9 - sha256 = "1dhmgyg6asqg1pmhnzqymwz4bm6gy8gi0n2gr794as38dhn2szwz"; 9 + sha256 = "1df2dv26c9z6zsdlqzbcc60f2pszh0hx1n94v65jswlb72a2mipc"; 10 10 }; 11 11 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.10.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "5.10.26"; 6 + version = "5.10.27"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "10hlc020imxxh71nvxhnnmd66bcxndfyi78v7wv7y5mcy4rjhlzw"; 16 + sha256 = "1nb95ll66kxiz702gs903n3gy5ialz8cin58l19rqaai55kck7fr"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.11.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "5.11.10"; 6 + version = "5.11.11"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "07fw48sy8p17jmm24x3rl99cwxiwhwjrxnmy3g542w9kzawaqwnk"; 16 + sha256 = "1fc3yl4srzla3cbihgnry0pqmgcc17zv0zlkk9zpx99371hpay0a"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-5.4.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "5.4.108"; 6 + version = "5.4.109"; 7 7 8 8 # modDirVersion needs to be x.y.z, will automatically add .0 if needed 9 9 modDirVersion = if (modDirVersionArg == null) then concatStringsSep "." (take 3 (splitVersion "${version}.0")) else modDirVersionArg; ··· 13 13 14 14 src = fetchurl { 15 15 url = "mirror://kernel/linux/kernel/v5.x/linux-${version}.tar.xz"; 16 - sha256 = "0wi1ql7brfsdzvwbxrxvg12zfm54lbdjvfzxk1l3xlqvq83sq4pj"; 16 + sha256 = "1vmpc6yrr2zm4m3naflwik5111jr8hy0mnyddwk31l0p4xbg8smc"; 17 17 }; 18 18 } // (args.argsOverride or {}))
+2 -2
pkgs/os-specific/linux/kernel/linux-lqx.nix
··· 1 1 { lib, fetchFromGitHub, buildLinux, linux_zen, ... } @ args: 2 2 3 3 let 4 - version = "5.11.8"; 4 + version = "5.11.11"; 5 5 suffix = "lqx1"; 6 6 in 7 7 ··· 14 14 owner = "zen-kernel"; 15 15 repo = "zen-kernel"; 16 16 rev = "v${version}-${suffix}"; 17 - sha256 = "1zvd74l6vb0rwrkwwh67i8l6ipin0p981vzdmiwpbpfzasbw59xk"; 17 + sha256 = "1wycqy0m6vjaa39rq7ngwr2qmksqfca27z1711nag7j68dk3ywak"; 18 18 }; 19 19 20 20 extraMeta = {
+11 -8
pkgs/os-specific/linux/kernel/linux-rpi.nix
··· 2 2 3 3 let 4 4 # NOTE: raspberrypifw & raspberryPiWirelessFirmware should be updated with this 5 - modDirVersion = "5.4.79"; 6 - tag = "1.20201201"; 5 + modDirVersion = "5.10.17"; 6 + tag = "1.20210303"; 7 7 in 8 8 lib.overrideDerivation (buildLinux (args // { 9 9 version = "${modDirVersion}-${tag}"; ··· 13 13 owner = "raspberrypi"; 14 14 repo = "linux"; 15 15 rev = "raspberrypi-kernel_${tag}-1"; 16 - sha256 = "093p5kh5f27djkhbcw371w079lhhihvg3s4by3wzsd40di4fcgn9"; 16 + sha256 = "0ffsllayl18ka4mgp4rdy9h0da5gy1n6g0kfvinvzdzabb5wzvrx"; 17 17 }; 18 18 19 19 defconfig = { ··· 23 23 "4" = "bcm2711_defconfig"; 24 24 }.${toString rpiVersion}; 25 25 26 - extraConfig = '' 27 - # ../drivers/pci/controller/pcie-altera.c:679:8: error: too few arguments to function 'devm_of_pci_get_host_bridge_resources' 28 - PCIE_ALTERA n 29 - ''; 30 - 31 26 features = { 32 27 efiBootStub = false; 33 28 } // (args.features or {}); 29 + 30 + extraConfig = '' 31 + # ../drivers/gpu/drm/ast/ast_mode.c:851:18: error: initialization of 'void (*)(struct drm_crtc *, struct drm_atomic_state *)' from incompatible pointer type 'void (*)(struct drm_crtc *, struct drm_crtc_state *)' [-Werror=incompatible-pointer-types] 32 + # 851 | .atomic_flush = ast_crtc_helper_atomic_flush, 33 + # | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~ 34 + # ../drivers/gpu/drm/ast/ast_mode.c:851:18: note: (near initialization for 'ast_crtc_helper_funcs.atomic_flush') 35 + DRM_AST n 36 + ''; 34 37 35 38 extraMeta = if (rpiVersion < 3) then { 36 39 platforms = with lib.platforms; [ arm ];
+2 -2
pkgs/os-specific/linux/kernel/linux-testing.nix
··· 3 3 with lib; 4 4 5 5 buildLinux (args // rec { 6 - version = "5.12-rc4"; 6 + version = "5.12-rc6"; 7 7 extraMeta.branch = "5.12"; 8 8 9 9 # modDirVersion needs to be x.y.z, will always add .0 ··· 11 11 12 12 src = fetchurl { 13 13 url = "https://git.kernel.org/torvalds/t/linux-${version}.tar.gz"; 14 - sha256 = "06i6xnfbyn522pj9zksx6ka01yxwv8dsrb2z517grv682sp8j70k"; 14 + sha256 = "0w0zk2byimdbcvn8myqaq0ab6lyd43493fnkv9a1407dimpxb03d"; 15 15 }; 16 16 17 17 # Should the testing kernels ever be built on Hydra?
+2 -2
pkgs/os-specific/linux/kernel/linux-zen.nix
··· 1 1 { lib, fetchFromGitHub, buildLinux, ... } @ args: 2 2 3 3 let 4 - version = "5.11.8"; 4 + version = "5.11.11"; 5 5 suffix = "zen1"; 6 6 in 7 7 ··· 14 14 owner = "zen-kernel"; 15 15 repo = "zen-kernel"; 16 16 rev = "v${version}-${suffix}"; 17 - sha256 = "1hb05shhqb6747m131sw30h36ak1m9bwzhfldjypn8phlfkflgkq"; 17 + sha256 = "0rldvgvdbsqvshrbv2g335qvwzk76l7rpnp9dwzsiv2qphrzxazi"; 18 18 }; 19 19 20 20 extraMeta = {
+2 -2
pkgs/os-specific/linux/libcgroup/default.nix
··· 1 - { lib, stdenv, fetchurl, fetchpatch, pam, yacc, flex }: 1 + { lib, stdenv, fetchurl, fetchpatch, pam, bison, flex }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "libcgroup"; ··· 9 9 sha256 = "0lgvyq37gq84sk30sg18admxaj0j0p5dq3bl6g74a1ppgvf8pqz4"; 10 10 }; 11 11 12 - buildInputs = [ pam yacc flex ]; 12 + buildInputs = [ pam bison flex ]; 13 13 14 14 patches = [ 15 15 (fetchpatch {
+26 -3
pkgs/os-specific/linux/macchanger/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, autoreconfHook, texinfo }: 1 + { lib, stdenv, fetchFromGitHub, fetchpatch, autoreconfHook, texinfo }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "macchanger"; ··· 11 11 sha256 = "1hypx6sxhd2b1nsxj314hpkhj7q4x9p2kfaaf20rjkkkig0nck9r"; 12 12 }; 13 13 14 + patches = [ 15 + (fetchpatch { 16 + url = "https://sources.debian.org/data/main/m/macchanger/1.7.0-5.3/debian/patches/02-fix_usage_message.patch"; 17 + sha256 = "0pxljmq0l0znylbhms09i19qwil74gm8gx3xx2ffx00dajaizj18"; 18 + }) 19 + (fetchpatch { 20 + url = "https://sources.debian.org/data/main/m/macchanger/1.7.0-5.3/debian/patches/06-update_OUI_list.patch"; 21 + sha256 = "04kbd784z9nwkjva5ckkvb0yb3pim9valb1viywn1yyh577d0y7w"; 22 + }) 23 + (fetchpatch { 24 + url = "https://sources.debian.org/data/main/m/macchanger/1.7.0-5.3/debian/patches/08-fix_random_MAC_choice.patch"; 25 + sha256 = "1vz3appxxsdf1imzrn57amazfwlbrvx6g78b6n88aqgwzy5dm34d"; 26 + }) 27 + (fetchpatch { 28 + url = "https://sources.debian.org/data/main/m/macchanger/1.7.0-5.3/debian/patches/check-random-device-read-errors.patch"; 29 + sha256 = "0pra6qnk39crjlidspg3l6hpaqiw43cypahx793l59mqn956cngc"; 30 + }) 31 + (fetchpatch { 32 + url = "https://sources.debian.org/data/main/m/macchanger/1.7.0-5.3/debian/patches/verify-changed-MAC.patch"; 33 + sha256 = "0vjhf2fnj1hlghjl821p6idrfc8hmd4lgps5lf1l68ylqvwjw0zj"; 34 + }) 35 + ]; 36 + 14 37 nativeBuildInputs = [ autoreconfHook texinfo ]; 15 38 16 39 outputs = [ "out" "info" ]; 17 40 18 41 meta = with lib; { 19 42 description = "A utility for viewing/manipulating the MAC address of network interfaces"; 20 - maintainers = with maintainers; [ joachifm ma27 ]; 43 + maintainers = with maintainers; [ joachifm ma27 dotlambda ]; 21 44 license = licenses.gpl2Plus; 22 - homepage = "https://www.gnu.org/software/macchanger"; 45 + homepage = "https://github.com/alobbs/macchanger"; 23 46 platforms = platforms.linux; 24 47 }; 25 48 }
+8 -2
pkgs/os-specific/linux/multipath-tools/default.nix
··· 1 - { lib, stdenv, fetchurl, pkg-config, perl, lvm2, libaio, gzip, readline, systemd, liburcu, json_c }: 1 + { lib, stdenv, fetchurl, pkg-config, perl, lvm2, libaio, gzip, readline, systemd, liburcu, json_c, kmod }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "multipath-tools"; ··· 16 16 ]; 17 17 18 18 postPatch = '' 19 - substituteInPlace libmultipath/Makefile --replace /usr/include/libdevmapper.h ${lib.getDev lvm2}/include/libdevmapper.h 19 + substituteInPlace libmultipath/Makefile \ 20 + --replace /usr/include/libdevmapper.h ${lib.getDev lvm2}/include/libdevmapper.h 21 + 22 + substituteInPlace multipathd/multipathd.service \ 23 + --replace /sbin/modprobe ${lib.getBin kmod}/sbin/modprobe \ 24 + --replace /sbin/multipathd "$out/bin/multipathd" 25 + 20 26 sed -i -re ' 21 27 s,^( *#define +DEFAULT_MULTIPATHDIR\>).*,\1 "'"$out/lib/multipath"'", 22 28 ' libmultipath/defaults.h
+6 -6
pkgs/os-specific/linux/nfs-utils/default.nix
··· 1 1 { stdenv, fetchurl, fetchpatch, lib, pkg-config, util-linux, libcap, libtirpc, libevent 2 - , sqlite, kerberos, kmod, libuuid, keyutils, lvm2, systemd, coreutils, tcp_wrappers 2 + , sqlite, libkrb5, kmod, libuuid, keyutils, lvm2, systemd, coreutils, tcp_wrappers 3 3 , python3, buildPackages, nixosTests, rpcsvc-proto 4 4 , enablePython ? true 5 5 }: ··· 25 25 26 26 buildInputs = [ 27 27 libtirpc libcap libevent sqlite lvm2 28 - libuuid keyutils kerberos tcp_wrappers 28 + libuuid keyutils libkrb5 tcp_wrappers 29 29 ] ++ lib.optional enablePython python3; 30 30 31 31 enableParallelBuilding = true; ··· 33 33 preConfigure = 34 34 '' 35 35 substituteInPlace configure \ 36 - --replace '$dir/include/gssapi' ${lib.getDev kerberos}/include/gssapi \ 37 - --replace '$dir/bin/krb5-config' ${lib.getDev kerberos}/bin/krb5-config 36 + --replace '$dir/include/gssapi' ${lib.getDev libkrb5}/include/gssapi \ 37 + --replace '$dir/bin/krb5-config' ${lib.getDev libkrb5}/bin/krb5-config 38 38 ''; 39 39 40 40 configureFlags = 41 41 [ "--enable-gss" 42 42 "--enable-svcgss" 43 43 "--with-statedir=/var/lib/nfs" 44 - "--with-krb5=${lib.getLib kerberos}" 44 + "--with-krb5=${lib.getLib libkrb5}" 45 45 "--with-systemd=${placeholder "out"}/etc/systemd/system" 46 46 "--enable-libmount-mount" 47 47 "--with-pluginpath=${placeholder "lib"}/lib/libnfsidmap" # this installs libnfsidmap ··· 106 106 # https://bugzilla.kernel.org/show_bug.cgi?id=203793 107 107 doCheck = false; 108 108 109 - disallowedReferences = [ (lib.getDev kerberos) ]; 109 + disallowedReferences = [ (lib.getDev libkrb5) ]; 110 110 111 111 passthru.tests = { 112 112 nfs3-simple = nixosTests.nfs3.simple;
+1 -1
pkgs/os-specific/linux/openvswitch/lts.nix
··· 1 1 { lib, stdenv, fetchurl, makeWrapper, pkg-config, util-linux, which 2 - , procps, libcap_ng, openssl, python2, iproute , perl 2 + , procps, libcap_ng, openssl, python2, perl 3 3 , automake, autoconf, libtool, kernel ? null }: 4 4 5 5 with lib;
+2 -2
pkgs/os-specific/linux/pam_krb5/default.nix
··· 1 - { lib, stdenv, fetchurl, pam, kerberos }: 1 + { lib, stdenv, fetchurl, pam, libkrb5 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "pam-krb5-4.10"; ··· 8 8 sha256 = "09wzxd5zrj5bzqpb01qf148npj5k8hmd2bx2ij1qsy40hdxqyq79"; 9 9 }; 10 10 11 - buildInputs = [ pam kerberos ]; 11 + buildInputs = [ pam libkrb5 ]; 12 12 13 13 meta = with lib; { 14 14 homepage = "https://www.eyrie.org/~eagle/software/pam-krb5/";
+2 -2
pkgs/os-specific/linux/pcmciautils/default.nix
··· 1 1 { config, lib, stdenv, fetchurl 2 - , yacc, flex 2 + , bison, flex 3 3 , sysfsutils, kmod, udev 4 4 , firmware ? config.pcmciaUtils.firmware or [] # Special pcmcia cards. 5 5 , configOpts ? config.pcmciaUtils.config or null # Special hardware (map memory & port & irq) ··· 14 14 sha256 = "0sfm3w2n73kl5w7gb1m6q8gy5k4rgwvzz79n6yhs9w3sag3ix8sk"; 15 15 }; 16 16 17 - buildInputs = [udev yacc sysfsutils kmod flex]; 17 + buildInputs = [udev bison sysfsutils kmod flex]; 18 18 19 19 patchPhase = '' 20 20 sed -i "
+2 -2
pkgs/os-specific/linux/pipework/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, makeWrapper 2 - , bridge-utils, iproute, lxc, openvswitch, docker, busybox, dhcpcd, dhcp 2 + , bridge-utils, iproute2, lxc, openvswitch, docker, busybox, dhcpcd, dhcp 3 3 }: 4 4 5 5 stdenv.mkDerivation { ··· 15 15 installPhase = '' 16 16 install -D pipework $out/bin/pipework 17 17 wrapProgram $out/bin/pipework --prefix PATH : \ 18 - ${lib.makeBinPath [ bridge-utils iproute lxc openvswitch docker busybox dhcpcd dhcp ]}; 18 + ${lib.makeBinPath [ bridge-utils iproute2 lxc openvswitch docker busybox dhcpcd dhcp ]}; 19 19 ''; 20 20 meta = with lib; { 21 21 description = "Software-Defined Networking tools for LXC";
+2 -2
pkgs/os-specific/linux/ply/default.nix
··· 1 - { lib, stdenv, kernel, fetchFromGitHub, autoreconfHook, yacc, flex, p7zip, rsync }: 1 + { lib, stdenv, kernel, fetchFromGitHub, autoreconfHook, bison, flex, p7zip, rsync }: 2 2 3 3 assert kernel != null -> lib.versionAtLeast kernel.version "4.0"; 4 4 ··· 7 7 in stdenv.mkDerivation { 8 8 pname = "ply"; 9 9 inherit version; 10 - nativeBuildInputs = [ autoreconfHook flex yacc p7zip rsync ]; 10 + nativeBuildInputs = [ autoreconfHook flex bison p7zip rsync ]; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "iovisor";
+4 -2
pkgs/os-specific/linux/power-profiles-daemon/default.nix
··· 15 15 , libxslt 16 16 , upower 17 17 , systemd 18 + , python3 18 19 }: 19 20 20 21 stdenv.mkDerivation rec { 21 22 pname = "power-profiles-daemon"; 22 - version = "0.1"; 23 + version = "0.8.1"; 23 24 24 25 outputs = [ "out" "devdoc" ]; 25 26 ··· 28 29 owner = "hadess"; 29 30 repo = "power-profiles-daemon"; 30 31 rev = version; 31 - sha256 = "012w3aryw5d43dr9jj5i6wy2a0n21jidr4ggs9ix7d4z9byr175w"; 32 + sha256 = "sha256-OnCUr7KWVPpYGDseBUcJD/PdOobvFnyNA97NhnKbTKY="; 32 33 }; 33 34 34 35 nativeBuildInputs = [ ··· 49 50 systemd 50 51 upower 51 52 glib 53 + (python3.withPackages (ps: with ps; [ ps.pygobject3 ])) # for cli tool 52 54 ]; 53 55 54 56 mesonFlags = [
+3 -4
pkgs/os-specific/linux/raspberrypi-eeprom/default.nix
··· 3 3 }: 4 4 stdenvNoCC.mkDerivation { 5 5 pname = "raspberrypi-eeprom"; 6 - version = "2020-12-11"; 6 + version = "2021-03-18"; 7 7 8 8 src = fetchFromGitHub { 9 9 owner = "raspberrypi"; 10 10 repo = "rpi-eeprom"; 11 - rev = "54a9796abbee59067bff9da6b90c1014178f2c21"; 12 - sha256 = "0yp7bn444n6yisp4hiblrm00rrvrf213amzb4sh96mlb5nhxspqk"; 11 + rev = "ff27ccf69403b01e337fc4ee6e7ae75244028cce"; 12 + sha256 = "1q1vlld0xxh9zinf5g0qa6jw1dggq93br938mvrfx3nb2aviiwcj"; 13 13 }; 14 14 15 15 buildInputs = [ python3 ]; ··· 28 28 29 29 cp rpi-eeprom-config rpi-eeprom-update $out/bin 30 30 cp -r firmware/{beta,critical,old,stable} $out/share/rpi-eeprom 31 - cp -r firmware/vl805 $out/bin 32 31 ''; 33 32 34 33 fixupPhase = ''
+3 -3
pkgs/os-specific/linux/rdma-core/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, cmake, pkg-config, docutils 2 - , pandoc, ethtool, iproute, libnl, udev, python3, perl 3 - }: 2 + , pandoc, ethtool, iproute2, libnl, udev, python3, perl 3 + } : 4 4 5 5 let 6 6 version = "34.0"; ··· 17 17 }; 18 18 19 19 nativeBuildInputs = [ cmake pkg-config pandoc docutils ]; 20 - buildInputs = [ libnl ethtool iproute udev python3 perl ]; 20 + buildInputs = [ libnl ethtool iproute2 udev python3 perl ]; 21 21 22 22 cmakeFlags = [ 23 23 "-DCMAKE_INSTALL_RUNDIR=/run"
+2 -2
pkgs/os-specific/linux/sssd/default.nix
··· 1 1 { lib, stdenv, fetchurl, fetchpatch, glibc, augeas, dnsutils, c-ares, curl, 2 2 cyrus_sasl, ding-libs, libnl, libunistring, nss, samba, nfs-utils, doxygen, 3 3 python, python3, pam, popt, talloc, tdb, tevent, pkg-config, ldb, openldap, 4 - pcre, kerberos, cifs-utils, glib, keyutils, dbus, fakeroot, libxslt, libxml2, 4 + pcre, libkrb5, cifs-utils, glib, keyutils, dbus, fakeroot, libxslt, libxml2, 5 5 libuuid, ldap, systemd, nspr, check, cmocka, uid_wrapper, 6 6 nss_wrapper, ncurses, Po4a, http-parser, jansson, 7 7 docbook_xsl, docbook_xml_dtd_44, ··· 62 62 enableParallelBuilding = true; 63 63 buildInputs = [ augeas dnsutils c-ares curl cyrus_sasl ding-libs libnl libunistring nss 64 64 samba nfs-utils doxygen python python3 popt 65 - talloc tdb tevent pkg-config ldb pam openldap pcre kerberos 65 + talloc tdb tevent pkg-config ldb pam openldap pcre libkrb5 66 66 cifs-utils glib keyutils dbus fakeroot libxslt libxml2 67 67 libuuid ldap systemd nspr check cmocka uid_wrapper 68 68 nss_wrapper ncurses Po4a http-parser jansson ];
+7 -3
pkgs/os-specific/linux/trace-cmd/default.nix
··· 1 1 { lib, stdenv, fetchgit, asciidoc, docbook_xsl, libxslt }: 2 - stdenv.mkDerivation { 2 + stdenv.mkDerivation rec { 3 3 pname = "trace-cmd"; 4 - version = "2.9-dev"; 4 + version = "2.9.1"; 5 5 6 - src = fetchgit (import ./src.nix); 6 + src = fetchgit { 7 + url = "git://git.kernel.org/pub/scm/utils/trace-cmd/trace-cmd.git/"; 8 + rev = "trace-cmd-v${version}"; 9 + sha256 = "19c63a0qmcppm1456qf4k6a0d1agcvpa6jnbzrdcyc520yax6khw"; 10 + }; 7 11 8 12 patches = [ ./fix-Makefiles.patch ]; 9 13
+12 -12
pkgs/os-specific/linux/trace-cmd/fix-Makefiles.patch
··· 1 1 diff --git a/Makefile b/Makefile 2 - index bbdf15e..deb8ef7 100644 2 + index b034042..b8a06bc 100644 3 3 --- a/Makefile 4 4 +++ b/Makefile 5 - @@ -288,7 +288,7 @@ libtraceevent.a: $(LIBTRACEEVENT_STATIC) 6 - libtracecmd.a: $(LIBTRACECMD_STATIC) 7 - libtracecmd.so: $(LIBTRACECMD_SHARED) 5 + @@ -338,6 +338,7 @@ libtracefs.a: $(LIBTRACEFS_STATIC) 6 + libtracefs.so: $(LIBTRACEFS_SHARED) 8 7 9 - -libs: $(LIBTRACECMD_SHARED) $(LIBTRACEEVENT_SHARED) 10 - +libs: $(LIBTRACECMD_SHARED) $(LIBTRACEEVENT_SHARED) $(LIBTRACECMD_STATIC) $(LIBTRACEEVENT_STATIC) 8 + libs: $(LIBTRACECMD_SHARED) $(LIBTRACEEVENT_SHARED) $(LIBTRACEFS_SHARED) 9 + +libs: $(LIBTRACECMD_STATIC) $(LIBTRACEEVENT_STATIC) $(LIBTRACEFS_STATIC) 11 10 12 - plugins: force $(obj)/lib/traceevent/plugins/traceevent_plugin_dir $(obj)/lib/traceevent/plugins/trace_python_dir 13 - $(Q)$(MAKE) -C $(src)/lib/traceevent/plugins 14 - @@ -344,6 +344,8 @@ install_gui: install_cmd gui 15 - install_libs: libs 11 + test: force $(LIBTRACEEVENT_STATIC) $(LIBTRACEFS_STATIC) $(LIBTRACECMD_STATIC) 12 + ifneq ($(CUNIT_INSTALLED),1) 13 + @@ -414,6 +415,9 @@ install_libs: libs 16 14 $(Q)$(call do_install,$(LIBTRACECMD_SHARED),$(libdir_SQ)/trace-cmd) 17 15 $(Q)$(call do_install,$(LIBTRACEEVENT_SHARED),$(libdir_SQ)/traceevent) 16 + $(Q)$(call do_install,$(LIBTRACEFS_SHARED),$(libdir_SQ)/tracefs) 18 17 + $(Q)$(call do_install,$(LIBTRACECMD_STATIC),$(libdir_SQ)/trace-cmd) 19 18 + $(Q)$(call do_install,$(LIBTRACEEVENT_STATIC),$(libdir_SQ)/traceevent) 19 + + $(Q)$(call do_install,$(LIBTRACEFS_STATIC),$(libdir_SQ)/tracefs) 20 20 $(Q)$(call do_install,$(src)/include/traceevent/event-parse.h,$(includedir_SQ)/traceevent) 21 21 $(Q)$(call do_install,$(src)/include/traceevent/trace-seq.h,$(includedir_SQ)/traceevent) 22 22 $(Q)$(call do_install,$(src)/include/trace-cmd/trace-cmd.h,$(includedir_SQ)/trace-cmd) 23 23 diff --git a/kernel-shark/src/CMakeLists.txt b/kernel-shark/src/CMakeLists.txt 24 - index e20a030..7fce165 100644 24 + index 457c100..687e150 100644 25 25 --- a/kernel-shark/src/CMakeLists.txt 26 26 +++ b/kernel-shark/src/CMakeLists.txt 27 - @@ -93,7 +93,7 @@ if (Qt5Widgets_FOUND AND Qt5Network_FOUND) 27 + @@ -92,7 +92,7 @@ if (Qt5Widgets_FOUND AND Qt5Network_FOUND) 28 28 DESTINATION ${_INSTALL_PREFIX}/share/icons/${KS_APP_NAME}) 29 29 30 30 install(FILES "${KS_DIR}/org.freedesktop.kshark-record.policy"
+8 -3
pkgs/os-specific/linux/trace-cmd/kernelshark.nix
··· 1 1 { lib, mkDerivation, fetchgit, qtbase, cmake, asciidoc, docbook_xsl, json_c, mesa_glu, freeglut, trace-cmd, pkg-config }: 2 - mkDerivation { 2 + mkDerivation rec { 3 3 pname = "kernelshark"; 4 - version = "1.1.0"; 4 + version = "1.2"; 5 5 6 - src = fetchgit (import ./src.nix); 6 + src = fetchgit { 7 + url = "git://git.kernel.org/pub/scm/utils/trace-cmd/trace-cmd.git/"; 8 + rev = "kernelshark-v${version}"; 9 + sha256 = "0wzzm2imk9n94v96v6sbvbff6j47lz4qj0snhiyv3nj3slg0anvh"; 10 + }; 7 11 8 12 patches = [ ./fix-Makefiles.patch ]; 9 13 ··· 21 25 "-DTRACECMD_INCLUDE_DIR=${trace-cmd.dev}/include" 22 26 "-DTRACECMD_LIBRARY=${trace-cmd.lib}/lib/trace-cmd/libtracecmd.a" 23 27 "-DTRACEEVENT_LIBRARY=${trace-cmd.lib}/lib/traceevent/libtraceevent.a" 28 + "-DTRACEFS_LIBRARY=${trace-cmd.lib}/lib/tracefs/libtracefs.a" 24 29 ]; 25 30 26 31 preInstall = ''
-5
pkgs/os-specific/linux/trace-cmd/src.nix
··· 1 - { 2 - url = "git://git.kernel.org/pub/scm/utils/trace-cmd/trace-cmd.git/"; 3 - rev = "ab370b78b9278fe16657742d46cb95c0a65b47d5"; # branch: kernelshark-v1.1 4 - sha256 = "0qngwc4qgadrkwlwpz73f12prdkx94kl0bg7g9hib95ipvsdmk1c"; 5 - }
+3 -8
pkgs/os-specific/linux/xpadneo/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "xpadneo"; 5 - version = "0.8.4"; 5 + version = "0.9.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "atar-axis"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "113xa2mxs2hc4fpjdk3jhhchy81kli6jxdd6vib7zz61n10cjb85"; 11 + hash = "sha256-VUcS4OzvPj0o627ZWIOBqEAQJ4JuMCMjgaZoMkL/IHc="; 12 12 }; 13 13 14 14 setSourceRoot = '' 15 15 export sourceRoot=$(pwd)/source/hid-xpadneo/src 16 16 ''; 17 17 18 - postPatch = '' 19 - # Set kernel module version 20 - substituteInPlace hid-xpadneo.c \ 21 - --subst-var-by DO_NOT_CHANGE ${version} 22 - ''; 23 - 24 18 nativeBuildInputs = kernel.moduleBuildDependencies; 25 19 buildInputs = [ bluez ]; 26 20 ··· 28 22 "-C" 29 23 "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build" 30 24 "M=$(sourceRoot)" 25 + "VERSION=${version}" 31 26 ]; 32 27 33 28 buildFlags = [ "modules" ];
+2 -2
pkgs/os-specific/windows/cygwin-setup/default.nix
··· 1 1 { lib, stdenv, fetchcvs, autoconf, automake, libtool, flex, bison, pkg-config 2 - , zlib, bzip2, lzma, libgcrypt 2 + , zlib, bzip2, xz, libgcrypt 3 3 }: 4 4 5 5 with lib; ··· 24 24 buildInputs = map mkStatic (o.buildInputs or []); 25 25 propagatedBuildInputs = map mkStatic (o.propagatedBuildInputs or []); 26 26 }); 27 - in map mkStatic [ zlib bzip2 lzma libgcrypt ]; 27 + in map mkStatic [ zlib bzip2 xz libgcrypt ]; 28 28 29 29 configureFlags = [ "--disable-shared" ]; 30 30
+1 -1
pkgs/servers/home-assistant/appdaemon.nix
··· 82 82 description = "Sandboxed Python execution environment for writing automation apps for Home Assistant"; 83 83 homepage = "https://github.com/AppDaemon/appdaemon"; 84 84 license = licenses.mit; 85 - maintainers = with maintainers; [ peterhoeg dotlambda ]; 85 + maintainers = with maintainers; [ peterhoeg ]; 86 86 }; 87 87 }
+1 -1
pkgs/servers/home-assistant/cli.nix
··· 36 36 description = "Command-line tool for Home Assistant"; 37 37 homepage = "https://github.com/home-assistant/home-assistant-cli"; 38 38 license = licenses.asl20; 39 - maintainers = with maintainers; [ dotlambda ]; 39 + maintainers = with maintainers; [ ]; 40 40 }; 41 41 }
+1 -1
pkgs/servers/home-assistant/default.nix
··· 395 395 homepage = "https://home-assistant.io/"; 396 396 description = "Open source home automation that puts local control and privacy first"; 397 397 license = licenses.asl20; 398 - maintainers = with maintainers; [ dotlambda globin mic92 hexa ]; 398 + maintainers = with maintainers; [ globin mic92 hexa ]; 399 399 platforms = platforms.linux; 400 400 }; 401 401 }
+1 -1
pkgs/servers/home-assistant/frontend.nix
··· 21 21 description = "Polymer frontend for Home Assistant"; 22 22 homepage = "https://github.com/home-assistant/home-assistant-polymer"; 23 23 license = licenses.asl20; 24 - maintainers = with maintainers; [ dotlambda globin ]; 24 + maintainers = with maintainers; [ globin ]; 25 25 }; 26 26 }
+2 -2
pkgs/servers/http/apt-cacher-ng/default.nix
··· 5 5 , fetchurl 6 6 , fuse 7 7 , libevent 8 - , lzma 8 + , xz 9 9 , openssl 10 10 , pkg-config 11 11 , systemd ··· 23 23 }; 24 24 25 25 nativeBuildInputs = [ cmake doxygen pkg-config ]; 26 - buildInputs = [ bzip2 fuse libevent lzma openssl systemd tcp_wrappers zlib ]; 26 + buildInputs = [ bzip2 fuse libevent xz openssl systemd tcp_wrappers zlib ]; 27 27 28 28 meta = with lib; { 29 29 description = "A caching proxy specialized for linux distribution files";
+3 -3
pkgs/servers/http/nix-binary-cache/default.nix
··· 1 1 {lib, stdenv 2 2 , coreutils, findutils, nix, xz, bzip2, gnused, gnugrep, openssl 3 - , lighttpd, iproute }: 3 + , lighttpd, iproute2 }: 4 4 stdenv.mkDerivation rec { 5 5 version = "2014-06-29-1"; 6 6 pname = "nix-binary-cache"; ··· 21 21 --replace @gnugrep@ "${gnugrep}/bin" \ 22 22 --replace @openssl@ "${openssl.bin}/bin" \ 23 23 --replace @lighttpd@ "${lighttpd}/sbin" \ 24 - --replace @iproute@ "${iproute}/sbin" \ 24 + --replace @iproute@ "${iproute2}/sbin" \ 25 25 --replace "xXxXx" "xXxXx" 26 26 27 27 chmod a+x "$out/bin/nix-binary-cache.cgi" ··· 38 38 --replace @gnugrep@ "${gnugrep}/bin" \ 39 39 --replace @openssl@ "${openssl.bin}/bin" \ 40 40 --replace @lighttpd@ "${lighttpd}/sbin" \ 41 - --replace @iproute@ "${iproute}/sbin" \ 41 + --replace @iproute@ "${iproute2}/sbin" \ 42 42 --replace "xXxXx" "xXxXx" 43 43 44 44 chmod a+x "$out/bin/nix-binary-cache-start"
+2 -2
pkgs/servers/irc/ircd-hybrid/default.nix
··· 1 1 { lib, stdenv, fetchurl, openssl, zlib }: 2 2 3 3 stdenv.mkDerivation rec { 4 - name = "ircd-hybrid-8.2.35"; 4 + name = "ircd-hybrid-8.2.36"; 5 5 6 6 src = fetchurl { 7 7 url = "mirror://sourceforge/ircd-hybrid/${name}.tgz"; 8 - sha256 = "045wd3wa4i1hl7i4faksaj8l5r70ld55bggryaf1ml28ijwjwpca"; 8 + sha256 = "0sg4g0znl8ic8vklpy96z88gjksc165kl945a6fr1j4xc1bf8gcv"; 9 9 }; 10 10 11 11 buildInputs = [ openssl zlib ];
+2 -2
pkgs/servers/jackett/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "jackett"; 5 - version = "0.17.699"; 5 + version = "0.17.764"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/Jackett/Jackett/releases/download/v${version}/Jackett.Binaries.Mono.tar.gz"; 9 - sha256 = "sha256-dftllucRemUdZjYDLKPJ4XJ031OZpsW4bpJDuWPyses="; 9 + sha256 = "sha256-x6yjSshTK/dnEPZ/XACDuVpZi0tI1J8tQHBFFvFhCmg="; 10 10 }; 11 11 12 12 nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/servers/ldap/389/default.nix
··· 1 1 { lib, stdenv, fetchurl, fetchpatch, autoreconfHook, pkg-config, doxygen, perl, pam, nspr, nss, openldap 2 - , db, cyrus_sasl, svrcore, icu, net-snmp, kerberos, pcre, perlPackages, libevent, openssl, python3 2 + , db, cyrus_sasl, svrcore, icu, net-snmp, libkrb5, pcre, perlPackages, libevent, openssl, python3 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { ··· 14 14 nativeBuildInputs = [ autoreconfHook pkg-config doxygen ]; 15 15 buildInputs = [ 16 16 perl pam nspr nss openldap db cyrus_sasl svrcore icu 17 - net-snmp kerberos pcre libevent openssl python3 17 + net-snmp libkrb5 pcre libevent openssl python3 18 18 ] ++ (with perlPackages; [ MozillaLdap NetAddrIP DBFile ]); 19 19 20 20 patches = [
+2 -2
pkgs/servers/mail/mailman/default.nix
··· 6 6 7 7 buildPythonPackage rec { 8 8 pname = "mailman"; 9 - version = "3.3.1"; 9 + version = "3.3.4"; 10 10 disabled = !isPy3k; 11 11 12 12 src = fetchPypi { 13 13 inherit pname version; 14 - sha256 = "0idfiv48jjgc0jq4731094ddhraqq8bxnwmjk6sg5ask0jss9kxq"; 14 + sha256 = "01rx322b8mzcdj9xh4bjwnl0zis6n2wxd31rrij4cw3a2j03xpas"; 15 15 }; 16 16 17 17 propagatedBuildInputs = [
+2
pkgs/servers/mail/mailman/hyperkitty.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "HyperKitty"; 10 + # Note: Mailman core must be on the latest version before upgrading HyperKitty. 11 + # See: https://gitlab.com/mailman/postorius/-/issues/516#note_544571309 10 12 version = "1.3.3"; 11 13 disabled = !isPy3k; 12 14
+2
pkgs/servers/mail/mailman/postorius.nix
··· 4 4 5 5 buildPythonPackage rec { 6 6 pname = "postorius"; 7 + # Note: Mailman core must be on the latest version before upgrading Postorious. 8 + # See: https://gitlab.com/mailman/postorius/-/issues/516#note_544571309 7 9 version = "1.3.4"; 8 10 9 11 src = fetchPypi {
+2 -2
pkgs/servers/matterbridge/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "matterbridge"; 5 - version = "1.22.0"; 5 + version = "1.22.1"; 6 6 7 7 vendorSha256 = null; 8 8 ··· 10 10 11 11 src = fetchurl { 12 12 url = "https://github.com/42wim/matterbridge/archive/v${version}.tar.gz"; 13 - sha256 = "sha256-jwatqxQh4t4tgNiOEjS9vxIM+9XtnH8QNch887+xDnI="; 13 + sha256 = "sha256-yV805OWFNOxKIGd6t2kRcUzdB8xYWYHFK+W2u/QPTXg="; 14 14 }; 15 15 16 16 meta = with lib; {
+4 -4
pkgs/servers/monitoring/fusion-inventory/default.nix
··· 1 - { lib, perlPackages, nix, dmidecode, pciutils, usbutils, iproute, nettools 1 + { lib, perlPackages, nix, dmidecode, pciutils, usbutils, iproute2, nettools 2 2 , fetchFromGitHub, makeWrapper 3 3 }: 4 4 ··· 18 18 patchShebangs bin 19 19 20 20 substituteInPlace "lib/FusionInventory/Agent/Tools/Linux.pm" \ 21 - --replace /sbin/ip ${iproute}/sbin/ip 21 + --replace /sbin/ip ${iproute2}/sbin/ip 22 22 substituteInPlace "lib/FusionInventory/Agent/Task/Inventory/Linux/Networks.pm" \ 23 - --replace /sbin/ip ${iproute}/sbin/ip 23 + --replace /sbin/ip ${iproute2}/sbin/ip 24 24 ''; 25 25 26 26 buildTools = []; ··· 67 67 for cur in $out/bin/*; do 68 68 if [ -x "$cur" ]; then 69 69 sed -e "s|./lib|$out/lib|" -i "$cur" 70 - wrapProgram "$cur" --prefix PATH : ${lib.makeBinPath [nix dmidecode pciutils usbutils nettools iproute]} 70 + wrapProgram "$cur" --prefix PATH : ${lib.makeBinPath [nix dmidecode pciutils usbutils nettools iproute2]} 71 71 fi 72 72 done 73 73 '';
+13 -6
pkgs/servers/monitoring/loki/default.nix
··· 1 - { stdenv, lib, buildGoModule, fetchFromGitHub, makeWrapper, nixosTests, systemd 1 + { stdenv 2 + , lib 3 + , buildGoModule 4 + , fetchFromGitHub 5 + , makeWrapper 6 + , nixosTests 7 + , systemd 2 8 }: 3 9 4 10 buildGoModule rec { 5 - version = "2.2.0"; 11 + version = "2.2.1"; 6 12 pname = "grafana-loki"; 7 13 8 14 src = fetchFromGitHub { 9 15 rev = "v${version}"; 10 16 owner = "grafana"; 11 17 repo = "loki"; 12 - sha256 = "sha256-mEu9z3lhHSE0NMXXViX4OBbIiNba7/RPr+AFmIM77g4="; 18 + sha256 = "sha256-ujZD5GIgMewvEQW3Wnt0eHdMIFs77PkkEecgCDw9290="; 13 19 }; 14 20 15 21 vendorSha256 = null; ··· 32 38 33 39 passthru.tests = { inherit (nixosTests) loki; }; 34 40 35 - buildFlagsArray = let t = "github.com/grafana/loki/pkg/build"; in '' 36 - -ldflags=-s -w -X ${t}.Version=${version} -X ${t}.BuildUser=nix@nixpkgs -X ${t}.BuildDate=unknown -X ${t}.Branch=unknown -X ${t}.Revision=unknown 37 - ''; 41 + buildFlagsArray = let t = "github.com/grafana/loki/pkg/build"; in 42 + '' 43 + -ldflags=-s -w -X ${t}.Version=${version} -X ${t}.BuildUser=nix@nixpkgs -X ${t}.BuildDate=unknown -X ${t}.Branch=unknown -X ${t}.Revision=unknown 44 + ''; 38 45 39 46 doCheck = true; 40 47
+2 -2
pkgs/servers/monitoring/mackerel-agent/default.nix
··· 1 - { stdenv, lib, buildGoModule, fetchFromGitHub, makeWrapper, iproute, nettools }: 1 + { stdenv, lib, buildGoModule, fetchFromGitHub, makeWrapper, iproute2, nettools }: 2 2 3 3 buildGoModule rec { 4 4 pname = "mackerel-agent"; ··· 13 13 14 14 nativeBuildInputs = [ makeWrapper ]; 15 15 checkInputs = lib.optionals (!stdenv.isDarwin) [ nettools ]; 16 - buildInputs = lib.optionals (!stdenv.isDarwin) [ iproute ]; 16 + buildInputs = lib.optionals (!stdenv.isDarwin) [ iproute2 ]; 17 17 18 18 vendorSha256 = "sha256-yomxALecP+PycelOmwrteK/LoW7wsst7os+jcbF46Bs="; 19 19
+42
pkgs/servers/monitoring/prometheus/bitcoin-exporter.nix
··· 1 + { lib, fetchFromGitHub, fetchpatch, python3Packages }: 2 + 3 + python3Packages.buildPythonApplication rec { 4 + pname = "bitcoin-prometheus-exporter"; 5 + version = "0.5.0"; 6 + 7 + format = "other"; 8 + 9 + src = fetchFromGitHub { 10 + owner = "jvstein"; 11 + repo = pname; 12 + rev = "v${version}"; 13 + sha256 = "0l0j6dyb0vflh386z3g8srysay5sf47g5rg2f5xrkckv86rjr115"; 14 + }; 15 + 16 + patches = [ 17 + # remove after update to new release 18 + (fetchpatch { 19 + name = "configurable-listening-address.patch"; 20 + url = "https://patch-diff.githubusercontent.com/raw/jvstein/bitcoin-prometheus-exporter/pull/11.patch"; 21 + sha256 = "0a2l8aqgprc1d5k8yg1gisn6imh9hzg6j0irid3pjvp5i5dcnhyq"; 22 + }) 23 + ]; 24 + 25 + propagatedBuildInputs = with python3Packages; [ prometheus_client bitcoinlib riprova ]; 26 + 27 + installPhase = '' 28 + mkdir -p $out/bin 29 + cp bitcoind-monitor.py $out/bin/ 30 + 31 + mkdir -p $out/share/${pname} 32 + cp -r dashboard README.md $out/share/${pname}/ 33 + ''; 34 + 35 + meta = with lib; { 36 + description = "Prometheus exporter for Bitcoin Core nodes"; 37 + homepage = "https://github.com/jvstein/bitcoin-prometheus-exporter"; 38 + license = licenses.bsd3; 39 + maintainers = with maintainers; [ mmilata ]; 40 + platforms = platforms.all; 41 + }; 42 + }
+3 -3
pkgs/servers/monitoring/sensu-go/default.nix
··· 4 4 generic = { subPackages, pname, postInstall ? "" }: 5 5 buildGoModule rec { 6 6 inherit pname; 7 - version = "6.2.3"; 7 + version = "6.2.7"; 8 8 shortRev = "3a1ac58"; # for internal version info 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "sensu"; 12 12 repo = "sensu-go"; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-8+ibl2D8hSzFV+snJAxRNTiyYqCndUDGVCVKt2bkPlQ="; 14 + sha256 = "sha256-JPX7MfxdlI6jLHVybAR4xtd/IiVGDrhrYUSlXohhpGc="; 15 15 }; 16 16 17 17 inherit subPackages postInstall; 18 18 19 - vendorSha256 = "sha256-KykxKJxel4E5VB8QAkEpBBaA7hKfSnTDkJ9qlNEln80="; 19 + vendorSha256 = "sha256-bGQADjT9SMxZnWb3k7wVSsF7VWWuESBL/VDG76vj+Tk="; 20 20 21 21 doCheck = false; 22 22
+3 -3
pkgs/servers/monitoring/thanos/default.nix
··· 1 1 { lib, buildGoModule, fetchFromGitHub }: 2 2 buildGoModule rec { 3 3 pname = "thanos"; 4 - version = "0.18.0"; 4 + version = "0.19.0"; 5 5 6 6 src = fetchFromGitHub { 7 7 rev = "v${version}"; 8 8 owner = "thanos-io"; 9 9 repo = "thanos"; 10 - sha256 = "sha256-GJKTQGMmFJeUQn02GWP4KKpKdM8eT+VxDBDzST+5NXk="; 10 + sha256 = "sha256-FryVKOabokw2+RyD94QLVpC9ZGIHPuSXZf5H+eitj80="; 11 11 }; 12 12 13 - vendorSha256 = "sha256-s11iJFcJ1Ez6TkhCU3VD2ThU5/9otHz5rDF8z9ux79E="; 13 + vendorSha256 = "sha256-GBjPMZ6BwUOKywNf1Bc2WeA14qvKQ0R5gWvVxgO/7Lo="; 14 14 15 15 doCheck = false; 16 16
+29 -16
pkgs/servers/mqtt/mosquitto/default.nix
··· 1 - { stdenv, lib, fetchFromGitHub, cmake, docbook_xsl, libxslt 2 - , openssl, libuuid, libwebsockets_3_1, c-ares, libuv 3 - , systemd ? null, withSystemd ? stdenv.isLinux }: 1 + { stdenv 2 + , lib 3 + , fetchFromGitHub 4 + , cmake 5 + , docbook_xsl 6 + , libxslt 7 + , c-ares 8 + , cjson 9 + , libuuid 10 + , libuv 11 + , libwebsockets_3_1 12 + , openssl 13 + , withSystemd ? stdenv.isLinux 14 + , systemd 15 + }: 4 16 5 17 stdenv.mkDerivation rec { 6 18 pname = "mosquitto"; 7 - version = "1.6.12"; 19 + version = "2.0.10"; 8 20 9 21 src = fetchFromGitHub { 10 - owner = "eclipse"; 11 - repo = "mosquitto"; 12 - rev = "v${version}"; 13 - sha256 = "0y9jna2p7wg57vv2g6ls1dj6w89vaw828y9z1wb3vwz1yhvs35s8"; 22 + owner = "eclipse"; 23 + repo = pname; 24 + rev = "v${version}"; 25 + sha256 = "144vw7b9ja4lci4mplbxs048x9aixd9c3s7rg6wc1k31w099rb12"; 14 26 }; 15 27 16 28 postPatch = '' ··· 19 31 --replace http://docbook.sourceforge.net/release/xsl/current ${docbook_xsl}/share/xml/docbook-xsl 20 32 done 21 33 22 - for f in {lib,lib/cpp,src}/CMakeLists.txt ; do 23 - substituteInPlace $f --replace /sbin/ldconfig true 24 - done 25 - 26 34 # the manpages are not generated when using cmake 27 35 pushd man 28 36 make 29 37 popd 30 38 ''; 39 + 40 + nativeBuildInputs = [ cmake docbook_xsl libxslt ]; 31 41 32 42 buildInputs = [ 33 - openssl libuuid libwebsockets_3_1 c-ares libuv 43 + c-ares 44 + cjson 45 + libuuid 46 + libuv 47 + libwebsockets_3_1 48 + openssl 34 49 ] ++ lib.optional withSystemd systemd; 35 - 36 - nativeBuildInputs = [ cmake docbook_xsl libxslt ]; 37 50 38 51 cmakeFlags = [ 39 52 "-DWITH_THREADING=ON" ··· 41 54 ] ++ lib.optional withSystemd "-DWITH_SYSTEMD=ON"; 42 55 43 56 meta = with lib; { 44 - description = "An open source MQTT v3.1/3.1.1 broker"; 57 + description = "An open source MQTT v3.1/3.1.1/5.0 broker"; 45 58 homepage = "https://mosquitto.org/"; 46 59 license = licenses.epl10; 47 60 maintainers = with maintainers; [ peterhoeg ];
+2 -2
pkgs/servers/nats-server/default.nix
··· 4 4 5 5 buildGoPackage rec { 6 6 pname = "nats-server"; 7 - version = "2.2.0"; 7 + version = "2.2.1"; 8 8 9 9 goPackagePath = "github.com/nats-io/${pname}"; 10 10 ··· 12 12 rev = "v${version}"; 13 13 owner = "nats-io"; 14 14 repo = pname; 15 - sha256 = "sha256-CNCdJUug99a9yE8YxSk7/s1CIEYJd9n8Gahz+B3ZyjI="; 15 + sha256 = "sha256-LQ817nZrFkF1zdj2m2SQK58BqDbUPSnncSWR+Woi+Ao="; 16 16 }; 17 17 18 18 meta = {
+3 -3
pkgs/servers/openafs/1.8/default.nix
··· 1 1 { lib, stdenv, buildPackages, fetchurl, which, autoconf, automake, flex 2 - , yacc , glibc, perl, kerberos, libxslt, docbook_xsl, file 2 + , bison , glibc, perl, libkrb5, libxslt, docbook_xsl, file 3 3 , docbook_xml_dtd_43, libtool_2 4 4 , withDevdoc ? false, doxygen, dblatex # Extra developer documentation 5 5 , ncurses # Extra ncurses utilities. Needed for debugging and monitoring. ··· 16 16 17 17 depsBuildBuild = [ buildPackages.stdenv.cc ]; 18 18 nativeBuildInputs = [ autoconf automake flex libxslt libtool_2 perl 19 - which yacc ] ++ optionals withDevdoc [ doxygen dblatex ]; 19 + which bison ] ++ optionals withDevdoc [ doxygen dblatex ]; 20 20 21 - buildInputs = [ kerberos ncurses ]; 21 + buildInputs = [ libkrb5 ncurses ]; 22 22 23 23 patches = [ ./bosserver.patch ./cross-build.patch ] ++ optional (tsmbac != null) ./tsmbac.patch; 24 24
+4 -5
pkgs/servers/openafs/1.8/module.nix
··· 1 - { lib, stdenv, fetchurl, which, autoconf, automake, flex, yacc 2 - , kernel, glibc, perl, libtool_2, kerberos, fetchpatch }: 1 + { lib, stdenv, fetchurl, which, autoconf, automake, flex, bison 2 + , kernel, glibc, perl, libtool_2, libkrb5, fetchpatch }: 3 3 4 4 with (import ./srcs.nix { 5 5 inherit fetchurl; ··· 13 13 name = "openafs-${version}-${kernel.modDirVersion}"; 14 14 inherit version src; 15 15 16 - nativeBuildInputs = [ autoconf automake flex libtool_2 perl which yacc ] 16 + nativeBuildInputs = [ autoconf automake flex libtool_2 perl which bison ] 17 17 ++ kernel.moduleBuildDependencies; 18 18 19 - buildInputs = [ kerberos ]; 19 + buildInputs = [ libkrb5 ]; 20 20 21 21 patches = [ 22 22 # LINUX 5.8: Replace kernel_setsockopt with new funcs ··· 91 91 maintainers = [ maintainers.maggesi maintainers.spacefrogg ]; 92 92 broken = versionOlder kernel.version "3.18" || kernel.isHardened; 93 93 }; 94 - 95 94 }
+3 -3
pkgs/servers/openafs/1.9/default.nix
··· 1 1 { lib, stdenv, buildPackages, fetchurl, which, autoconf, automake, flex 2 - , yacc , glibc, perl, kerberos, libxslt, docbook_xsl, file 2 + , bison , glibc, perl, libkrb5, libxslt, docbook_xsl, file 3 3 , docbook_xml_dtd_43, libtool_2 4 4 , withDevdoc ? false, doxygen, dblatex # Extra developer documentation 5 5 , ncurses # Extra ncurses utilities. Needed for debugging and monitoring. ··· 16 16 17 17 depsBuildBuild = [ buildPackages.stdenv.cc ]; 18 18 nativeBuildInputs = [ autoconf automake flex libxslt libtool_2 perl 19 - which yacc ] ++ optionals withDevdoc [ doxygen dblatex ]; 19 + which bison ] ++ optionals withDevdoc [ doxygen dblatex ]; 20 20 21 - buildInputs = [ kerberos ncurses ]; 21 + buildInputs = [ libkrb5 ncurses ]; 22 22 23 23 patches = [ ./bosserver.patch ./cross-build.patch ] ++ optional (tsmbac != null) ./tsmbac.patch; 24 24
+4 -5
pkgs/servers/openafs/1.9/module.nix
··· 1 - { lib, stdenv, fetchurl, which, autoconf, automake, flex, yacc 2 - , kernel, glibc, perl, libtool_2, kerberos, fetchpatch }: 1 + { lib, stdenv, fetchurl, which, autoconf, automake, flex, bison 2 + , kernel, glibc, perl, libtool_2, libkrb5, fetchpatch }: 3 3 4 4 with (import ./srcs.nix { 5 5 inherit fetchurl; ··· 13 13 name = "openafs-${version}-${kernel.modDirVersion}"; 14 14 inherit version src; 15 15 16 - nativeBuildInputs = [ autoconf automake flex libtool_2 perl which yacc ] 16 + nativeBuildInputs = [ autoconf automake flex libtool_2 perl which bison ] 17 17 ++ kernel.moduleBuildDependencies; 18 18 19 - buildInputs = [ kerberos ]; 19 + buildInputs = [ libkrb5 ]; 20 20 21 21 patches = []; 22 22 ··· 60 60 maintainers = [ maintainers.maggesi maintainers.spacefrogg ]; 61 61 broken = versionOlder kernel.version "3.18" || kernel.isHardened; 62 62 }; 63 - 64 63 }
+2 -2
pkgs/servers/openbgpd/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, autoconf, automake, libtool, m4, yacc }: 1 + { lib, stdenv, fetchFromGitHub, autoconf, automake, libtool, m4, bison }: 2 2 3 3 let 4 4 openbsd_version = ··· 21 21 sha256 = "sha256-TKs6tt/SCWes6kYAGIrSShZgOLf7xKh26xG3Zk7wCCw="; 22 22 }; 23 23 24 - nativeBuildInputs = [ autoconf automake libtool m4 yacc ]; 24 + nativeBuildInputs = [ autoconf automake libtool m4 bison ]; 25 25 26 26 preConfigure = '' 27 27 mkdir ./openbsd
+2 -2
pkgs/servers/pim6sd/default.nix
··· 1 - { stdenv, fetchFromGitHub, lib, autoreconfHook, yacc, flex }: 1 + { stdenv, fetchFromGitHub, lib, autoreconfHook, bison, flex }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "pim6sd"; ··· 11 11 sha256 = "0x7dyark2mp9xqz9cnmmgaf0z143vxn2835clllpji4ylg77zdjw"; 12 12 }; 13 13 14 - nativeBuildInputs = [ autoreconfHook yacc flex ]; 14 + nativeBuildInputs = [ autoreconfHook bison flex ]; 15 15 16 16 meta = with lib; { 17 17 description = "PIM for IPv6 sparse mode daemon";
+3 -3
pkgs/servers/plex/raw.nix
··· 12 12 # server, and the FHS userenv and corresponding NixOS module should 13 13 # automatically pick up the changes. 14 14 stdenv.mkDerivation rec { 15 - version = "1.22.0.4163-d8c4875dd"; 15 + version = "1.22.1.4275-48e10484b"; 16 16 pname = "plexmediaserver"; 17 17 18 18 # Fetch the source 19 19 src = if stdenv.hostPlatform.system == "aarch64-linux" then fetchurl { 20 20 url = "https://downloads.plex.tv/plex-media-server-new/${version}/debian/plexmediaserver_${version}_arm64.deb"; 21 - sha256 = "16lwcimgnpxcyxbk4qwkqz5mzmizqfzihwqb41awc38qlfbjzh5g"; 21 + sha256 = "08x5ay0nvsdc2n584bw0vdqxh33wn0mlwyqciwgvwq873jn39j3z"; 22 22 } else fetchurl { 23 23 url = "https://downloads.plex.tv/plex-media-server-new/${version}/debian/plexmediaserver_${version}_amd64.deb"; 24 - sha256 = "0wvqrn7mycrx0rn4zkp6cr2mr59nfqh63czm0awsfpqc6hqggz8y"; 24 + sha256 = "1h5pkd7fzqlbvqv25cdppglw651yc3026hnyim5vy1s1s182paws"; 25 25 }; 26 26 27 27 outputs = [ "out" "basedb" ];
+3 -3
pkgs/servers/pounce/default.nix
··· 1 - { lib, stdenv, libressl, fetchzip, fetchpatch, pkg-config }: 1 + { lib, stdenv, libressl, fetchzip, pkg-config }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "pounce"; 5 - version = "2.1p1"; 5 + version = "2.3"; 6 6 7 7 src = fetchzip { 8 8 url = "https://git.causal.agency/pounce/snapshot/pounce-${version}.tar.gz"; 9 - sha256 = "1gphia45swj4ws6nrklqg1hvjrc6yw921v0pf29cvjhwrfl6dl0h"; 9 + sha256 = "0pk3kwr6k6dz2vdx1kyv7mhj756j4bwsmdlmjzhh8ghczjqp2s2x"; 10 10 }; 11 11 12 12 buildInputs = [ libressl ];
+3 -3
pkgs/servers/rtsp-simple-server/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "rtsp-simple-server"; 8 - version = "0.15.2"; 8 + version = "0.15.3"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "aler9"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-XuyE0gubkE08Qei30/q8fLdX8V7zBsbFsdaiqbXgeI4="; 14 + sha256 = "sha256-eY3XtGmHp7TM+lXC9tdd51x7sLuuZfBDJxTZ79Ye0Qs="; 15 15 }; 16 16 17 - vendorSha256 = "sha256-4R2gA9QwfyBNDasRuDawDFEmXu31yGuZUQZS6cZL3B0="; 17 + vendorSha256 = "sha256-SiWcOI1XxrwwTAzp8HC5zOO5e2oSWBMFRYsW2RwPA5I="; 18 18 19 19 # Tests need docker 20 20 doCheck = false;
+2 -2
pkgs/servers/sabnzbd/default.nix
··· 20 20 ]); 21 21 path = lib.makeBinPath [ par2cmdline unrar unzip p7zip ]; 22 22 in stdenv.mkDerivation rec { 23 - version = "3.2.0"; 23 + version = "3.2.1"; 24 24 pname = "sabnzbd"; 25 25 26 26 src = fetchFromGitHub { 27 27 owner = pname; 28 28 repo = pname; 29 29 rev = version; 30 - sha256 = "sha256-h+efFsyCqcMktKpKOqaHkfFdJKGAjvIOc6NmIyXnZDA="; 30 + sha256 = "sha256-y2uaXa2DPZHBLukAdwKTwXauaJHX5Uft35vsthzGwME="; 31 31 }; 32 32 33 33 nativeBuildInputs = [ makeWrapper ];
+2 -2
pkgs/servers/sickbeard/sickgear.nix
··· 4 4 pythonEnv = python2.withPackages(ps: with ps; [ cheetah ]); 5 5 in stdenv.mkDerivation rec { 6 6 pname = "sickgear"; 7 - version = "0.23.14"; 7 + version = "0.23.15"; 8 8 9 9 src = fetchFromGitHub { 10 10 owner = "SickGear"; 11 11 repo = "SickGear"; 12 12 rev = "release_${version}"; 13 - sha256 = "sha256-QhBdOXu+KizeSYHUbNflDaDpzjeEFaYkhY+K1MgLzzc="; 13 + sha256 = "sha256-xZ2SgYSEamh+Z64VKvIemqJLH/WjJHFji5qIameF5hM="; 14 14 }; 15 15 16 16 dontBuild = true;
+2 -2
pkgs/servers/tailscale/default.nix
··· 1 - { lib, buildGoModule, fetchFromGitHub, makeWrapper, iptables, iproute }: 1 + { lib, buildGoModule, fetchFromGitHub, makeWrapper, iptables, iproute2 }: 2 2 3 3 buildGoModule rec { 4 4 pname = "tailscale"; ··· 30 30 31 31 postInstall = '' 32 32 wrapProgram $out/bin/tailscaled --prefix PATH : ${ 33 - lib.makeBinPath [ iproute iptables ] 33 + lib.makeBinPath [ iproute2 iptables ] 34 34 } 35 35 sed -i -e "s#/usr/sbin#$out/bin#" -e "/^EnvironmentFile/d" ./cmd/tailscaled/tailscaled.service 36 36 install -D -m0444 -t $out/lib/systemd/system ./cmd/tailscaled/tailscaled.service
+2 -2
pkgs/servers/web-apps/wiki-js/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "wiki-js"; 5 - version = "2.5.197"; 5 + version = "2.5.201"; 6 6 7 7 src = fetchurl { 8 8 url = "https://github.com/Requarks/wiki/releases/download/${version}/${pname}.tar.gz"; 9 - sha256 = "sha256-0xM9BtQvSt5WkbKBri+KxB+Ghc4wgY8/TUgI6PCFmm0="; 9 + sha256 = "sha256-k2G+jUne/lq0dRJsIQpWlRFg1Nq92bM28YkawKOKlsI="; 10 10 }; 11 11 12 12 sourceRoot = ".";
+5 -5
pkgs/servers/zoneminder/default.nix
··· 1 1 { stdenv, lib, fetchFromGitHub, fetchurl, fetchpatch, substituteAll, cmake, makeWrapper, pkg-config 2 - , curl, ffmpeg_3, glib, libjpeg, libselinux, libsepol, mp4v2, libmysqlclient, mysql, pcre, perl, perlPackages 2 + , curl, ffmpeg_3, glib, libjpeg, libselinux, libsepol, mp4v2, libmysqlclient, mariadb, pcre, perl, perlPackages 3 3 , polkit, util-linuxMinimal, x264, zlib 4 4 , coreutils, procps, psmisc, nixosTests }: 5 5 ··· 122 122 done 123 123 124 124 substituteInPlace scripts/zmdbbackup.in \ 125 - --replace /usr/bin/mysqldump ${mysql.client}/bin/mysqldump 125 + --replace /usr/bin/mysqldump ${mariadb.client}/bin/mysqldump 126 126 127 127 substituteInPlace scripts/zmupdate.pl.in \ 128 - --replace "'mysql'" "'${mysql.client}/bin/mysql'" \ 129 - --replace "'mysqldump'" "'${mysql.client}/bin/mysqldump'" 128 + --replace "'mysql'" "'${mariadb.client}/bin/mysql'" \ 129 + --replace "'mysqldump'" "'${mariadb.client}/bin/mysqldump'" 130 130 131 131 for f in scripts/ZoneMinder/lib/ZoneMinder/Config.pm.in \ 132 132 scripts/zmupdate.pl.in \ ··· 147 147 ''; 148 148 149 149 buildInputs = [ 150 - curl ffmpeg_3 glib libjpeg libselinux libsepol mp4v2 libmysqlclient mysql.client pcre perl polkit x264 zlib 150 + curl ffmpeg_3 glib libjpeg libselinux libsepol mp4v2 libmysqlclient mariadb.client pcre perl polkit x264 zlib 151 151 util-linuxMinimal # for libmount 152 152 ] ++ (with perlPackages; [ 153 153 # build-time dependencies
+2 -2
pkgs/shells/es/default.nix
··· 1 - { lib, stdenv, fetchurl, readline, yacc }: 1 + { lib, stdenv, fetchurl, readline, bison }: 2 2 3 3 let 4 4 version = "0.9.1"; ··· 20 20 sourceRoot=. 21 21 ''; 22 22 23 - buildInputs = [ readline yacc ]; 23 + buildInputs = [ readline bison ]; 24 24 25 25 configureFlags = [ "--with-readline" ]; 26 26
+40
pkgs/shells/zsh/zsh-clipboard/clipboard.plugin.zsh
··· 1 + _cb-yank() { 2 + AA=$(clippaste 2>/dev/null) && CUTBUFFER="$AA" 3 + zle yank 4 + } 5 + _cb-kill-line() { 6 + zle kill-line 7 + printf "%s" "$CUTBUFFER" | clipcopy 2>/dev/null 8 + } 9 + _cb-kill-whole-line() { 10 + zle kill-whole-line 11 + printf "%s" "$CUTBUFFER" | clipcopy 2>/dev/null 12 + } 13 + _cb-kill-word() { 14 + zle kill-word 15 + printf "%s" "$CUTBUFFER" | clipcopy 2>/dev/null 16 + } 17 + _cb-backward-kill-word() { 18 + zle backward-kill-word 19 + printf "%s" "$CUTBUFFER" | clipcopy 2>/dev/null 20 + } 21 + _cb-copy-region-as-kill() { 22 + ## https://unix.stackexchange.com/questions/19947/ 23 + zle copy-region-as-kill 24 + zle set-mark-command -n -1 25 + printf "%s" "$CUTBUFFER" | clipcopy 2>/dev/null 26 + } 27 + 28 + zle -N _cb-yank 29 + zle -N _cb-kill-line 30 + zle -N _cb-kill-whole-line 31 + zle -N _cb-kill-word 32 + zle -N _cb-backward-kill-word 33 + zle -N _cb-copy-region-as-kill 34 + 35 + bindkey '^y' _cb-yank 36 + bindkey '^k' _cb-kill-line 37 + bindkey '^u' _cb-kill-whole-line 38 + bindkey '\ed' _cb-kill-word 39 + bindkey '\e^?' _cb-backward-kill-word 40 + bindkey '\ew' _cb-copy-region-as-kill
+27
pkgs/shells/zsh/zsh-clipboard/default.nix
··· 1 + { stdenv, lib }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "zsh-clipboard"; 5 + version = "1.0"; 6 + 7 + src = ./.; 8 + 9 + dontBuild = true; 10 + 11 + installPhase = '' 12 + install -D -m0444 -t $out/share/zsh/plugins/clipboard ./clipboard.plugin.zsh 13 + ''; 14 + 15 + meta = with lib; { 16 + description = "Ohmyzsh plugin that integrates kill-ring with system clipboard"; 17 + longDescription = '' 18 + Ohmyzsh plugin that integrates kill-ring with system clipboard. 19 + 20 + Key bindings for C-y, C-k, C-u, M-d, M-backspace and M-w are rebound. 21 + Behaviour of these keys should not be changed. 22 + ''; 23 + license = licenses.mit; 24 + maintainers = with maintainers; [ bb2020 ]; 25 + platforms = platforms.unix; 26 + }; 27 + }
+2 -2
pkgs/tools/admin/acme.sh/default.nix
··· 1 - { stdenv, lib, fetchFromGitHub, makeWrapper, curl, openssl, socat, iproute, unixtools, dnsutils }: 1 + { stdenv, lib, fetchFromGitHub, makeWrapper, curl, openssl, socat, iproute2, unixtools, dnsutils }: 2 2 stdenv.mkDerivation rec { 3 3 pname = "acme.sh"; 4 4 version = "2.8.8"; ··· 22 22 openssl 23 23 curl 24 24 dnsutils 25 - (if stdenv.isLinux then iproute else unixtools.netstat) 25 + (if stdenv.isLinux then iproute2 else unixtools.netstat) 26 26 ] 27 27 }" 28 28 '';
+2 -2
pkgs/tools/admin/exoscale-cli/default.nix
··· 2 2 3 3 buildGoPackage rec { 4 4 pname = "exoscale-cli"; 5 - version = "1.27.0"; 5 + version = "1.27.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "exoscale"; 9 9 repo = "cli"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-bKciwcYGETwVdUS4qdByHLWKt16PpBtTvW/dvuclIpA="; 11 + sha256 = "sha256-YaW7rTeVz2Mbnmp6ORsnALlyVxGnf8K73LXN/fmJMLk="; 12 12 }; 13 13 14 14 goPackagePath = "github.com/exoscale/cli";
+3 -3
pkgs/tools/admin/fioctl/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "fioctl"; 5 - version = "0.14.1"; 5 + version = "0.15"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "foundriesio"; 9 9 repo = "fioctl"; 10 10 rev = "v${version}"; 11 - sha256 = "1jbj2w2s78wcnrwyr80jyc11ipjysv5aab3486kphx8ysvvgcwfs"; 11 + sha256 = "0gmh32h9j6wpkdxxg7vj158lsaxq30x7hjsc9gwpip3bff278hw4"; 12 12 }; 13 13 14 - vendorSha256 = "1a3x6cv18f0n01f4ac1kprzmby8dphygnwsdl98pmzs3gqqnh284"; 14 + vendorSha256 = "170z5a1iwwcpz890nficqnz7rr7yzdxr5jx9pa7s31z17lr8kbz9"; 15 15 16 16 runVend = true; 17 17
+2 -2
pkgs/tools/admin/lxd/default.nix
··· 1 1 { lib, hwdata, pkg-config, lxc, buildGoPackage, fetchurl 2 2 , makeWrapper, acl, rsync, gnutar, xz, btrfs-progs, gzip, dnsmasq 3 - , squashfsTools, iproute, iptables, ebtables, iptables-nftables-compat, libcap 3 + , squashfsTools, iproute2, iptables, ebtables, iptables-nftables-compat, libcap 4 4 , libco-canonical, dqlite, raft-canonical, sqlite-replication, udev 5 5 , writeShellScriptBin, apparmor-profiles, apparmor-parser 6 6 , criu ··· 48 48 49 49 wrapProgram $out/bin/lxd --prefix PATH : ${lib.makeBinPath ( 50 50 networkPkgs 51 - ++ [ acl rsync gnutar xz btrfs-progs gzip dnsmasq squashfsTools iproute bash criu ] 51 + ++ [ acl rsync gnutar xz btrfs-progs gzip dnsmasq squashfsTools iproute2 bash criu ] 52 52 ++ [ (writeShellScriptBin "apparmor_parser" '' 53 53 exec '${apparmor-parser}/bin/apparmor_parser' -I '${apparmor-profiles}/etc/apparmor.d' "$@" 54 54 '') ]
+2 -2
pkgs/tools/archivers/fsarchiver/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config 2 - , zlib, bzip2, lzma, lzo, lz4, zstd, xz 2 + , zlib, bzip2, lzo, lz4, zstd, xz 3 3 , libgcrypt, e2fsprogs, util-linux, libgpgerror }: 4 4 5 5 let ··· 21 21 ]; 22 22 23 23 buildInputs = [ 24 - zlib bzip2 lzma lzo lz4 zstd xz 24 + zlib bzip2 xz lzo lz4 zstd xz 25 25 libgcrypt e2fsprogs util-linux libgpgerror 26 26 ]; 27 27
+2 -2
pkgs/tools/archivers/innoextract/default.nix
··· 1 1 { lib, stdenv, fetchurl, cmake, makeWrapper 2 - , boost, lzma 2 + , boost, xz 3 3 , withGog ? false, unar ? null }: 4 4 5 5 stdenv.mkDerivation rec { ··· 10 10 sha256 = "09l1z1nbl6ijqqwszdwch9mqr54qb7df0wp2sd77v17dq6gsci33"; 11 11 }; 12 12 13 - buildInputs = [ lzma boost ]; 13 + buildInputs = [ xz boost ]; 14 14 15 15 # Python is reported as missing during the build, however 16 16 # including Python does not change the output.
+2 -2
pkgs/tools/archivers/p7zip/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "p7zip"; 5 - version = "17.03"; 5 + version = "17.04"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "szcnick"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "0zgpa90z5p30jbpqydiig1h8hn41c76n2x26rh8cc92xw72ni33d"; 11 + sha256 = "sha256-19F4hPV0nKVuFZNbOcXrcA1uW6Y3HQolaHVIYXGmh18="; 12 12 }; 13 13 14 14 # Default makefile is full of impurities on Darwin. The patch doesn't hurt Linux so I'm leaving it unconditional
+2 -2
pkgs/tools/backup/automysqlbackup/default.nix
··· 1 - { lib, stdenv, fetchurl, makeWrapper, mysql, mailutils, pbzip2, pigz, bzip2, gzip }: 1 + { lib, stdenv, fetchurl, makeWrapper, mariadb, mailutils, pbzip2, pigz, bzip2, gzip }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "automysqlbackup"; ··· 19 19 cp automysqlbackup $out/bin/ 20 20 cp automysqlbackup.conf $out/etc/ 21 21 22 - wrapProgram $out/bin/automysqlbackup --prefix PATH : ${lib.makeBinPath [ mysql mailutils pbzip2 pigz bzip2 gzip ]} 22 + wrapProgram $out/bin/automysqlbackup --prefix PATH : ${lib.makeBinPath [ mariadb mailutils pbzip2 pigz bzip2 gzip ]} 23 23 ''; 24 24 25 25 meta = with lib; {
+2 -2
pkgs/tools/backup/rdedup/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, rustPlatform, pkg-config, openssl, libsodium 2 - , llvmPackages, clang, lzma 2 + , llvmPackages, clang, xz 3 3 , Security }: 4 4 5 5 rustPlatform.buildRustPackage rec { ··· 20 20 ]; 21 21 22 22 nativeBuildInputs = [ pkg-config llvmPackages.libclang clang ]; 23 - buildInputs = [ openssl libsodium lzma ] 23 + buildInputs = [ openssl libsodium xz ] 24 24 ++ (lib.optional stdenv.isDarwin Security); 25 25 26 26 configurePhase = ''
+3 -3
pkgs/tools/bluetooth/blueman/default.nix
··· 1 1 { config, stdenv, lib, fetchurl, intltool, pkg-config, python3Packages, bluez, gtk3 2 - , obex_data_server, xdg-utils, dnsmasq, dhcp, libappindicator, iproute 2 + , obex_data_server, xdg-utils, dnsmasq, dhcp, libappindicator, iproute2 3 3 , gnome3, librsvg, wrapGAppsHook, gobject-introspection, autoreconfHook 4 4 , networkmanager, withPulseAudio ? config.pulseaudio or stdenv.isLinux, libpulseaudio, fetchpatch }: 5 5 6 6 let 7 7 pythonPackages = python3Packages; 8 - binPath = lib.makeBinPath [ xdg-utils dnsmasq dhcp iproute ]; 8 + binPath = lib.makeBinPath [ xdg-utils dnsmasq dhcp iproute2 ]; 9 9 10 10 in stdenv.mkDerivation rec { 11 11 pname = "blueman"; ··· 23 23 ]; 24 24 25 25 buildInputs = [ bluez gtk3 pythonPackages.python librsvg 26 - gnome3.adwaita-icon-theme iproute libappindicator networkmanager ] 26 + gnome3.adwaita-icon-theme iproute2 libappindicator networkmanager ] 27 27 ++ pythonPath 28 28 ++ lib.optional withPulseAudio libpulseaudio; 29 29
+2 -2
pkgs/tools/compression/pbzx/default.nix
··· 1 - {stdenv, lib, fetchFromGitHub, lzma, xar}: 1 + {stdenv, lib, fetchFromGitHub, xz, xar}: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "pbzx"; ··· 9 9 rev = "v${version}"; 10 10 sha256 = "0bwd7wmnhpz1n5p39mh6asfyccj4cm06hwigslcwbb3pdwmvxc90"; 11 11 }; 12 - buildInputs = [ lzma xar ]; 12 + buildInputs = [ xz xar ]; 13 13 buildPhase = '' 14 14 cc pbzx.c -llzma -lxar -o pbzx 15 15 '';
+2 -2
pkgs/tools/compression/pixz/default.nix
··· 1 1 { 2 2 lib, stdenv, fetchFromGitHub, autoconf, automake, libtool, pkg-config 3 3 , asciidoc, libxslt, libxml2, docbook_xml_dtd_45, docbook_xsl 4 - , libarchive, lzma 4 + , libarchive, xz 5 5 }: 6 6 stdenv.mkDerivation rec { 7 7 baseName = "pixz"; ··· 12 12 buildInputs = [ 13 13 autoconf automake libtool asciidoc libxslt libxml2 14 14 docbook_xml_dtd_45 docbook_xsl 15 - libarchive lzma 15 + libarchive xz 16 16 ]; 17 17 preBuild = '' 18 18 echo "XML_CATALOG_FILES='$XML_CATALOG_FILES'"
+2 -2
pkgs/tools/compression/pxz/default.nix
··· 1 - { lib, stdenv, fetchgit, xz, lzma }: 1 + { lib, stdenv, fetchgit, xz }: 2 2 3 3 let name = "pxz"; 4 4 version = "4.999.9beta+git"; ··· 12 12 sha256 = "0na2kw8cf0qd8l1aywlv9m3xrxnqlcwxfdwp3f7x9vxwqx3k32kc"; 13 13 }; 14 14 15 - buildInputs = [ lzma ]; 15 + buildInputs = [ xz ]; 16 16 17 17 patches = [ ./_SC_ARG_MAX.patch ]; 18 18
+2 -2
pkgs/tools/compression/xar/default.nix
··· 1 - { lib, stdenv, fetchurl, libxml2, lzma, openssl, zlib, bzip2, fts, autoconf }: 1 + { lib, stdenv, fetchurl, libxml2, xz, openssl, zlib, bzip2, fts, autoconf }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 version = "1.6.1"; ··· 9 9 sha256 = "0ghmsbs6xwg1092v7pjcibmk5wkyifwxw6ygp08gfz25d2chhipf"; 10 10 }; 11 11 12 - buildInputs = [ libxml2 lzma openssl zlib bzip2 fts autoconf ]; 12 + buildInputs = [ libxml2 xz openssl zlib bzip2 fts autoconf ]; 13 13 14 14 prePatch = '' 15 15 substituteInPlace configure.ac \
+2 -2
pkgs/tools/filesystems/irods/common.nix
··· 1 - { lib, stdenv, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp, boost, jansson, zeromq, openssl, pam, libiodbc, kerberos, gcc, libcxx, which, catch2 }: 1 + { lib, stdenv, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp, boost, jansson, zeromq, openssl, pam, libiodbc, libkrb5, gcc, libcxx, which, catch2 }: 2 2 3 3 # Common attributes of irods packages 4 4 5 5 { 6 6 nativeBuildInputs = [ autoconf automake cmake gnumake help2man texinfo which gcc ]; 7 - buildInputs = [ bzip2 zlib libtool cppzmq libarchive avro-cpp jansson zeromq openssl pam libiodbc kerberos boost libcxx catch2 ]; 7 + buildInputs = [ bzip2 zlib libtool cppzmq libarchive avro-cpp jansson zeromq openssl pam libiodbc libkrb5 boost libcxx catch2 ]; 8 8 9 9 cmakeFlags = [ 10 10 "-DIRODS_EXTERNALS_FULLPATH_CLANG=${stdenv.cc}"
+2 -2
pkgs/tools/filesystems/irods/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp_llvm, boost, jansson, zeromq, openssl , pam, libiodbc, kerberos, gcc, libcxx, which, catch2 }: 1 + { lib, stdenv, fetchFromGitHub, bzip2, zlib, autoconf, automake, cmake, gnumake, help2man , texinfo, libtool , cppzmq , libarchive, avro-cpp_llvm, boost, jansson, zeromq, openssl , pam, libiodbc, libkrb5, gcc, libcxx, which, catch2 }: 2 2 3 3 let 4 4 avro-cpp=avro-cpp_llvm; ··· 7 7 common = import ./common.nix { 8 8 inherit lib stdenv bzip2 zlib autoconf automake cmake gnumake 9 9 help2man texinfo libtool cppzmq libarchive jansson 10 - zeromq openssl pam libiodbc kerberos gcc libcxx 10 + zeromq openssl pam libiodbc libkrb5 gcc libcxx 11 11 boost avro-cpp which catch2; 12 12 }; 13 13 in rec {
+1 -2
pkgs/tools/filesystems/sasquatch/default.nix
··· 2 2 , fetchurl 3 3 , lz4 ? null 4 4 , lz4Support ? false 5 - , lzma 6 5 , lzo 7 6 , lib, stdenv 8 7 , xz ··· 28 27 sha256 = "1xpklm0y43nd9i6jw43y2xh5zvlmj9ar2rvknh0bh7kv8c95aq0d"; 29 28 }; 30 29 31 - buildInputs = [ lzma lzo xz zlib ] 30 + buildInputs = [ xz lzo xz zlib ] 32 31 ++ lib.optional lz4Support lz4; 33 32 34 33 patches = [ patch ];
+41
pkgs/tools/filesystems/supertag/default.nix
··· 1 + { lib, rustPlatform, fetchFromGitHub 2 + , clang, llvmPackages, pkg-config 3 + , dbus, fuse, sqlite 4 + }: 5 + 6 + rustPlatform.buildRustPackage rec { 7 + pname = "supertag"; 8 + version = "0.1.4"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "amoffat"; 12 + repo = pname; 13 + rev = "v${version}"; 14 + sha256 = "0jzm7pn38hlr96n0z8gqfsfdbw48y0nnbsgjdq7hpgwmcgvgqdam"; 15 + }; 16 + 17 + cargoSha256 = "1mzmp1jcxgn2swp52r9y7k09fk0z67i1qafzkkzlfxxd10vfr70v"; 18 + 19 + LIBCLANG_PATH = "${llvmPackages.libclang}/lib"; 20 + 21 + nativeBuildInputs = [ clang pkg-config ]; 22 + buildInputs = [ dbus fuse sqlite ]; 23 + 24 + # The test are requiring extended permissions. 25 + doCheck = false; 26 + 27 + meta = with lib; { 28 + description = "A tag-based filesystem"; 29 + longDescription = '' 30 + Supertag is a tag-based filesystem, written in Rust, for Linux and MacOS. 31 + It provides a tag-based view of your files by removing the hierarchy 32 + constraints typically imposed on files and folders. In other words, it 33 + allows you to think about your files not as objects stored in folders, but 34 + as objects that can be filtered by folders. 35 + ''; 36 + homepage = "https://github.com/amoffat/supertag"; 37 + license = licenses.agpl3Plus; 38 + platforms = [ "i686-linux" "x86_64-linux" ]; 39 + maintainers = with maintainers; [ oxzi ]; 40 + }; 41 + }
+2 -2
pkgs/tools/graphics/asymptote/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, fetchurl, fetchpatch 2 - , autoreconfHook, bison, glm, yacc, flex 2 + , autoreconfHook, bison, glm, flex 3 3 , freeglut, ghostscriptX, imagemagick, fftw 4 4 , boehmgc, libGLU, libGL, mesa, ncurses, readline, gsl, libsigsegv 5 5 , python3Packages ··· 31 31 autoreconfHook 32 32 bison 33 33 flex 34 - yacc 34 + bison 35 35 texinfo 36 36 ]; 37 37
+2 -2
pkgs/tools/graphics/graphviz/base.nix
··· 2 2 3 3 { lib, stdenv, fetchFromGitLab, autoreconfHook, pkg-config, cairo, expat, flex 4 4 , fontconfig, gd, gettext, gts, libdevil, libjpeg, libpng, libtool, pango 5 - , yacc, fetchpatch, xorg ? null, ApplicationServices }: 5 + , bison, fetchpatch, xorg ? null, ApplicationServices }: 6 6 7 7 let 8 8 inherit (lib) optional optionals optionalString; ··· 37 37 nativeBuildInputs = [ autoreconfHook pkg-config ]; 38 38 39 39 buildInputs = [ 40 - libpng libjpeg expat yacc libtool fontconfig gd gts libdevil flex pango 40 + libpng libjpeg expat bison libtool fontconfig gd gts libdevil flex pango 41 41 gettext 42 42 ] ++ optionals (xorg != null) (with xorg; [ libXrender libXaw libXpm ]) 43 43 ++ optionals (stdenv.isDarwin) [ ApplicationServices ];
+3 -10
pkgs/tools/misc/betterdiscordctl/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, fetchpatch }: 1 + { lib, stdenv, fetchFromGitHub }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "betterdiscordctl"; 5 - version = "1.7.0"; 5 + version = "1.7.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "bb010g"; 9 9 repo = "betterdiscordctl"; 10 10 rev = "v${version}"; 11 - sha256 = "0qpmm5l8jhm7k0kqblc0bnr9fl4b6z8iddhjar03bb4kqgr962fa"; 11 + sha256 = "12c3phcfwl4p2jfh22ihm57vxw4nq5kwqirb7y4gzc91swfh5yj1"; 12 12 }; 13 - 14 - patches = [ 15 - (fetchpatch { # Required till https://github.com/bb010g/betterdiscordctl/pull/67 is merged upstream. 16 - url = "https://github.com/bb010g/betterdiscordctl/pull/67/commits/f1c7170fc2626d9aec4d244977b5a73c401aa1d4.patch"; 17 - sha256 = "003zqd9ljb9h674sjwjvvdfs7q4cw0p1ydg3lax132vb4vz9k0zi"; 18 - }) 19 - ]; 20 13 21 14 preBuild = "sed -i 's/^nix=$/&yes/g;s/^DISABLE_UPGRADE=$/&yes/g' ./betterdiscordctl"; 22 15
+13
pkgs/tools/misc/empty/0.6-Makefile.patch
··· 1 + diff --git a/Makefile b/Makefile 2 + index 1fe4c41..2c69558 100644 3 + --- a/Makefile 4 + +++ b/Makefile 5 + @@ -16,7 +16,7 @@ LIBS = -lutil 6 + PREFIX = /usr/local 7 + 8 + all: 9 + - ${CC} ${CFLAGS} -Wall ${LIBS} -o empty empty.c 10 + + ${CC} ${CFLAGS} -Wall -o empty empty.c ${LIBS} 11 + 12 + FreeBSD: all 13 + NetBSD: all
+46
pkgs/tools/misc/empty/default.nix
··· 1 + { fetchzip, lib, stdenv, which }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "empty"; 5 + version = "0.6.21b"; 6 + 7 + src = fetchzip { 8 + url = "mirror://sourceforge/${pname}/${pname}/${pname}-${version}.tgz"; 9 + sha256 = "1rkixh2byr70pdxrwr4lj1ckh191rjny1m5xbjsa7nqw1fw6c2xs"; 10 + stripRoot = false; 11 + }; 12 + 13 + patches = [ 14 + ./0.6-Makefile.patch 15 + ]; 16 + 17 + nativeBuildInputs = [ which ]; 18 + 19 + makeFlags = [ "PREFIX=$(out)" ]; 20 + 21 + postPatch = '' 22 + rm empty 23 + ''; 24 + 25 + meta = with lib; { 26 + homepage = "http://empty.sourceforge.net"; 27 + description = "A simple tool to automate interactive terminal applications"; 28 + license = licenses.bsd3; 29 + platforms = platforms.all; 30 + longDescription = '' 31 + The empty utility provides an interface to execute and/or interact with 32 + processes under pseudo-terminal sessions (PTYs). This tool is definitely 33 + useful in programming of shell scripts designed to communicate with 34 + interactive programs like telnet, ssh, ftp, etc. In some cases empty can 35 + be the simplest replacement for TCL/expect or other similar programming 36 + tools because empty: 37 + 38 + - can be easily invoked directly from shell prompt or script 39 + - does not use TCL, Perl, PHP, Python or anything else as an underlying language 40 + - is written entirely in C 41 + - has small and simple source code 42 + - can easily be ported to almost all UNIX-like systems 43 + ''; 44 + maintainers = [ maintainers.djwf ]; 45 + }; 46 + }
+2 -2
pkgs/tools/misc/fwup/default.nix
··· 8 8 , libarchive 9 9 , libconfuse 10 10 , libsodium 11 - , lzma 11 + , xz 12 12 , zlib 13 13 , coreutils 14 14 , dosfstools ··· 42 42 libarchive 43 43 libconfuse 44 44 libsodium 45 - lzma 45 + xz 46 46 zlib 47 47 ] 48 48 ++ lib.optionals stdenv.isDarwin [
+23
pkgs/tools/misc/grit/default.nix
··· 1 + { lib, buildGoModule, fetchFromGitHub }: 2 + 3 + buildGoModule rec { 4 + pname = "grit"; 5 + version = "0.2.0"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "climech"; 9 + repo = "grit"; 10 + rev = "v${version}"; 11 + sha256 = "0v4i8xdf1pgkmwad5jb6n6s4rx48zk57wij0ppzg6zb725wy7r8a"; 12 + }; 13 + 14 + vendorSha256 = "0a1lqfn710fgvrvbimd92102fhjs1wa7r8i0l7s5m7jxks629hw8"; 15 + 16 + meta = with lib; { 17 + description = "A multitree-based personal task manager"; 18 + homepage = "https://github.com/climech/grit"; 19 + license = licenses.mit; 20 + platforms = platforms.unix; 21 + maintainers = [ maintainers.ivar ]; 22 + }; 23 + }
+3 -3
pkgs/tools/misc/mcfly/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "mcfly"; 5 - version = "0.5.5"; 5 + version = "0.5.6"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "cantino"; 9 9 repo = "mcfly"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-4slE/11N9L9Q45w/LF5rNkOZbADjY1n4NxdoNlXPdo8="; 11 + sha256 = "sha256-x2cED+WEc50RB8BxiDEm/XnauT1RqqGjSIdL5MMaFBY="; 12 12 }; 13 13 14 14 postInstall = '' ··· 20 20 install -Dm644 -t $out/share/mcfly mcfly.fish 21 21 ''; 22 22 23 - cargoSha256 = "sha256-MlhltJh+Z2GFHm+qCD8UDEvY+W8EprxVoBv/kj4v1Qc="; 23 + cargoSha256 = "sha256-JCV1cj+RncY/myVJTJ5fNkVqTITqGusA71tv7zGG9Uw="; 24 24 25 25 meta = with lib; { 26 26 homepage = "https://github.com/cantino/mcfly";
+2 -2
pkgs/tools/misc/osinfo-db-tools/default.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, meson, ninja, gettext, glib, libxml2, perl, python3 2 - , libxslt, libarchive, bzip2, lzma, json-glib, libsoup 2 + , libxslt, libarchive, bzip2, xz, json-glib, libsoup 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { ··· 12 12 }; 13 13 14 14 nativeBuildInputs = [ meson ninja pkg-config gettext perl python3 ]; 15 - buildInputs = [ glib json-glib libxml2 libxslt libarchive bzip2 lzma libsoup ]; 15 + buildInputs = [ glib json-glib libxml2 libxslt libarchive bzip2 xz libsoup ]; 16 16 17 17 meta = with lib; { 18 18 description = "Tools for managing the osinfo database";
+2 -2
pkgs/tools/misc/ostree/default.nix
··· 25 25 , libarchive 26 26 , libcap 27 27 , bzip2 28 - , yacc 28 + , bison 29 29 , libxslt 30 30 , docbook-xsl-nons 31 31 , docbook_xml_dtd_42 ··· 74 74 gobject-introspection 75 75 which 76 76 makeWrapper 77 - yacc 77 + bison 78 78 libxslt 79 79 docbook-xsl-nons 80 80 docbook_xml_dtd_42
+2 -2
pkgs/tools/misc/ovh-ttyrec/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "ovh-ttyrec"; 5 - version = "1.1.6.6"; 5 + version = "1.1.6.7"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "ovh"; 9 9 repo = "ovh-ttyrec"; 10 10 rev = "v${version}"; 11 - sha256 = "176g3k2pzw6zpvmcc2f8idn6vhlygf7lfzxvrhysav2izc5dd130"; 11 + sha256 = "sha256-OkSs0Cu79u53+fN57px48f6kJKuOJLjGUar+lLTdUJU="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ zstd ];
+7
pkgs/tools/misc/polar/Gemfile
··· 1 + source 'https://rubygems.org' 2 + 3 + gem 'google-protobuf' 4 + gem 'libusb' 5 + gem 'rubyserial' 6 + gem 'nokogiri' 7 +
+27
pkgs/tools/misc/polar/Gemfile.lock
··· 1 + GEM 2 + remote: https://rubygems.org/ 3 + specs: 4 + ffi (1.15.0) 5 + google-protobuf (3.15.6) 6 + libusb (0.6.4) 7 + ffi (~> 1.0) 8 + mini_portile2 (~> 2.1) 9 + mini_portile2 (2.5.0) 10 + nokogiri (1.11.2) 11 + mini_portile2 (~> 2.5.0) 12 + racc (~> 1.4) 13 + racc (1.5.2) 14 + rubyserial (0.6.0) 15 + ffi (~> 1.9, >= 1.9.3) 16 + 17 + PLATFORMS 18 + ruby 19 + 20 + DEPENDENCIES 21 + google-protobuf 22 + libusb 23 + nokogiri 24 + rubyserial 25 + 26 + BUNDLED WITH 27 + 2.1.4
+73
pkgs/tools/misc/polar/default.nix
··· 1 + { lib, stdenv, fetchFromGitHub, ruby, bundlerEnv }: 2 + let 3 + 4 + # To create Gemfile.lock and gemset.nix 5 + # > nix-shell -p bundix bundler zlib 6 + # > bundle install 7 + # > bundix 8 + gems = bundlerEnv { 9 + name = "polar-env"; 10 + inherit ruby; 11 + gemdir = ./.; 12 + }; 13 + 14 + in 15 + stdenv.mkDerivation rec { 16 + 17 + pname = "polar"; 18 + # The package has no releases so let's use the latest commit 19 + version = "unstable-2021-01-12"; 20 + 21 + src = fetchFromGitHub { 22 + owner = "cmaion"; 23 + repo = pname; 24 + rev = "be15f5f897f8a919dd639009873147dca2a9cea0"; 25 + sha256 = "0gqkqfrqnrsy6avg372xwqj22yz8g6r2hnzbw6197b1rf7zr1il7"; 26 + }; 27 + 28 + prePatch = '' 29 + for script in polar_* 30 + do 31 + substituteInPlace $script --replace "#{File.dirname(__FILE__)}/lib" "$out/lib/polar" 32 + done 33 + ''; 34 + buildInputs = [ gems ruby ]; 35 + 36 + # See: https://nixos.wiki/wiki/Packaging/Ruby 37 + # 38 + # Put library content under lib/polar and the raw scripts under share/polar. 39 + # Then, wrap the scripts so that they use the correct ruby environment and put 40 + # these wrapped executables under bin. 41 + installPhase = '' 42 + install -Dm644 -t $out/etc/udev/rules.d ./pkg/99-polar.rules 43 + mkdir -p $out/{bin,lib/polar,share/polar} 44 + cp -r lib/* $out/lib/polar/ 45 + for script in ./polar_* 46 + do 47 + raw="$out/share/polar/$script" 48 + bin="$out/bin/$script" 49 + cp "$script" "$raw" 50 + cat > $bin <<EOF 51 + #!/bin/sh -e 52 + exec ${gems}/bin/bundle exec ${ruby}/bin/ruby "$raw" "\$@" 53 + EOF 54 + chmod +x $bin 55 + done 56 + ''; 57 + 58 + meta = with lib; { 59 + description = "Command-line tools to interact with Polar watches"; 60 + longDescription = '' 61 + A set of command line tools written in Ruby to interact with Polar watches 62 + and decode raw data files. 63 + 64 + Udev rules can be added as: 65 + 66 + services.udev.packages = [ pkgs.polar ] 67 + ''; 68 + homepage = "https://github.com/cmaion/polar"; 69 + license = licenses.gpl3Only; 70 + maintainers = with maintainers; [ jluttine ]; 71 + platforms = platforms.linux; 72 + }; 73 + }
+75
pkgs/tools/misc/polar/gemset.nix
··· 1 + { 2 + ffi = { 3 + groups = ["default"]; 4 + platforms = []; 5 + source = { 6 + remotes = ["https://rubygems.org"]; 7 + sha256 = "0nq1fb3vbfylccwba64zblxy96qznxbys5900wd7gm9bpplmf432"; 8 + type = "gem"; 9 + }; 10 + version = "1.15.0"; 11 + }; 12 + google-protobuf = { 13 + groups = ["default"]; 14 + platforms = []; 15 + source = { 16 + remotes = ["https://rubygems.org"]; 17 + sha256 = "1ak5yqqhr04b4x0axzvpw1xzwmxmfcw0gf4r1ijixv15kidhsj3z"; 18 + type = "gem"; 19 + }; 20 + version = "3.15.6"; 21 + }; 22 + libusb = { 23 + dependencies = ["ffi" "mini_portile2"]; 24 + groups = ["default"]; 25 + platforms = []; 26 + source = { 27 + remotes = ["https://rubygems.org"]; 28 + sha256 = "005q4f3bi68yapza1vxamgwz2gpix2akci52s4yvr03hsxi137a6"; 29 + type = "gem"; 30 + }; 31 + version = "0.6.4"; 32 + }; 33 + mini_portile2 = { 34 + groups = ["default"]; 35 + platforms = []; 36 + source = { 37 + remotes = ["https://rubygems.org"]; 38 + sha256 = "1hdbpmamx8js53yk3h8cqy12kgv6ca06k0c9n3pxh6b6cjfs19x7"; 39 + type = "gem"; 40 + }; 41 + version = "2.5.0"; 42 + }; 43 + nokogiri = { 44 + dependencies = ["mini_portile2" "racc"]; 45 + groups = ["default"]; 46 + platforms = []; 47 + source = { 48 + remotes = ["https://rubygems.org"]; 49 + sha256 = "0b51df8fwadak075cvi17w0nch6qz1r66564qp29qwfj67j9qp0p"; 50 + type = "gem"; 51 + }; 52 + version = "1.11.2"; 53 + }; 54 + racc = { 55 + groups = ["default"]; 56 + platforms = []; 57 + source = { 58 + remotes = ["https://rubygems.org"]; 59 + sha256 = "178k7r0xn689spviqzhvazzvxfq6fyjldxb3ywjbgipbfi4s8j1g"; 60 + type = "gem"; 61 + }; 62 + version = "1.5.2"; 63 + }; 64 + rubyserial = { 65 + dependencies = ["ffi"]; 66 + groups = ["default"]; 67 + platforms = []; 68 + source = { 69 + remotes = ["https://rubygems.org"]; 70 + sha256 = "1vj5yan6srbvkf5vfp9d9b9z8wyygd0zxcy54c35yhkjl6kwd22q"; 71 + type = "gem"; 72 + }; 73 + version = "0.6.0"; 74 + }; 75 + }
+41
pkgs/tools/misc/qmk/default.nix
··· 1 + { lib 2 + , python3 3 + , fetchpatch 4 + }: 5 + 6 + python3.pkgs.buildPythonApplication rec { 7 + pname = "qmk"; 8 + version = "0.0.45"; 9 + 10 + src = python3.pkgs.fetchPypi { 11 + inherit pname version; 12 + sha256 = "43f297f36b21d68c34c5efa0ce1449dddb2e28753f80939cadf761ee7a2a0901"; 13 + }; 14 + 15 + patches = [ 16 + # https://github.com/qmk/qmk_cli/pull/48 17 + (fetchpatch { 18 + name = "remove-unused-install-requires.patch"; 19 + url = "https://github.com/qmk/qmk_cli/commit/75b6ada1feccfa5a9bc2bb07a4cc749ef40d02dd.patch"; 20 + sha256 = "0lwi1dz35p07vha5gwq2jxm5q49vm99ix4jyhd6g6ypqbq1qiwc8"; 21 + }) 22 + ]; 23 + 24 + nativeBuildInputs = with python3.pkgs; [ 25 + setuptools-scm 26 + ]; 27 + 28 + propagatedBuildInputs = with python3.pkgs; [ 29 + milc 30 + ]; 31 + 32 + # no tests implemented 33 + doCheck = false; 34 + 35 + meta = with lib; { 36 + description = "A program to help users work with QMK Firmware"; 37 + homepage = "https://github.com/qmk/qmk_cli"; 38 + license = licenses.mit; 39 + maintainers = with maintainers; [ bhipple ]; 40 + }; 41 + }
+2 -2
pkgs/tools/misc/svtplay-dl/default.nix
··· 4 4 let 5 5 6 6 inherit (python3Packages) 7 - python nose pycrypto pyyaml requests mock python-dateutil setuptools; 7 + python nose cryptography pyyaml requests mock python-dateutil setuptools; 8 8 9 9 in stdenv.mkDerivation rec { 10 10 pname = "svtplay-dl"; ··· 17 17 sha256 = "00pz5vv39qjsw67fdlj6942371lyvv368lc82z17nnh723ck54yy"; 18 18 }; 19 19 20 - pythonPaths = [ pycrypto pyyaml requests ]; 20 + pythonPaths = [ cryptography pyyaml requests ]; 21 21 buildInputs = [ python perl nose mock python-dateutil setuptools ] ++ pythonPaths; 22 22 nativeBuildInputs = [ gitMinimal zip makeWrapper ]; 23 23
+2 -2
pkgs/tools/misc/tz/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "tz"; 5 - version = "0.4"; 5 + version = "0.5"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "oz"; 9 9 repo = "tz"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-36nTau7xjABdeUOioHar28cuawFWW3DBaDH0YAvdufI="; 11 + sha256 = "sha256-OwjhV3n1B1yQTNYm4VOW500t0524g85YYiOAAu9yPeo="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-Soa87I7oMa34LjYKxNAz9Limi0kQ6JUtb/zI4G7yZnw=";
+3 -3
pkgs/tools/misc/uutils-coreutils/default.nix
··· 11 11 12 12 stdenv.mkDerivation rec { 13 13 pname = "uutils-coreutils"; 14 - version = "0.0.4"; 14 + version = "0.0.6"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "uutils"; 18 18 repo = "coreutils"; 19 19 rev = version; 20 - sha256 = "sha256-z5lDKJpFxXDCQq+0Da/63GGoUXacy5TSn+1gJiMvicc="; 20 + sha256 = "sha256-dnswE/DU2jCfxWW10Ctjw8woktwWZqyd3E9IuKkle1M="; 21 21 }; 22 22 23 23 postPatch = '' ··· 29 29 cargoDeps = rustPlatform.fetchCargoTarball { 30 30 inherit src; 31 31 name = "${pname}-${version}"; 32 - hash = "sha256-x/nn2JNe8x+I0G2Vbr2PZAHCghwLBDhKAhkHPQFeL0M="; 32 + hash = "sha256-92BHPSVIPZLn399AcaJJjRq2WkxzDm8knKN3FIdAxAA="; 33 33 }; 34 34 35 35 nativeBuildInputs = [ rustPlatform.cargoSetupHook sphinx ];
+3 -3
pkgs/tools/misc/uwuify/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "uwuify"; 5 - version = "0.2.1"; 5 + version = "0.2.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "Daniel-Liu-c0deb0t"; 9 9 repo = "uwu"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-tPmLqgrWi7wDoMjMrxodKp4S0ICwV9Kp7Pa151rHho0="; 11 + sha256 = "sha256-MzXObbxccwEG7egmQMCdhUukGqZS+NgbYwZjTaqME7I="; 12 12 }; 13 13 14 - cargoSha256 = "sha256-HUP6OEvoGJ/BtAl+yuGzqEp1bsxfGAh0UJtXz9/ZiK8="; 14 + cargoSha256 = "sha256-iyoGLFIfHToOwqEb5lQ1nXR0W1gLOVMfvw39LX6ib+U="; 15 15 buildInputs = lib.optionals stdenv.isDarwin [ libiconv ]; 16 16 17 17 meta = with lib; {
+2 -2
pkgs/tools/misc/yle-dl/default.nix
··· 2 2 3 3 python3Packages.buildPythonApplication rec { 4 4 pname = "yle-dl"; 5 - version = "20201022"; 5 + version = "20210212"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "aajanki"; 9 9 repo = "yle-dl"; 10 10 rev = version; 11 - sha256 = "0p56pb3wxdzqgs4fsh4hn06xs0mgzgznqqr0bn2vkkkibnkr1asp"; 11 + sha256 = "sha256-0JnigYmslQ/7KsQAFg3AaWPAU/tD1lS7lF6OCcv/ze4="; 12 12 }; 13 13 14 14 propagatedBuildInputs = with python3Packages; [
+3 -3
pkgs/tools/networking/ddclient/default.nix
··· 1 - { lib, fetchurl, perlPackages, iproute, perl }: 1 + { lib, fetchurl, perlPackages, iproute2, perl }: 2 2 3 3 perlPackages.buildPerlPackage rec { 4 4 pname = "ddclient"; ··· 19 19 touch Makefile.PL 20 20 substituteInPlace ddclient \ 21 21 --replace 'in the output of ifconfig' 'in the output of ip addr show' \ 22 - --replace 'ifconfig -a' '${iproute}/sbin/ip addr show' \ 23 - --replace 'ifconfig $arg' '${iproute}/sbin/ip addr show $arg' \ 22 + --replace 'ifconfig -a' '${iproute2}/sbin/ip addr show' \ 23 + --replace 'ifconfig $arg' '${iproute2}/sbin/ip addr show $arg' \ 24 24 --replace '/usr/bin/perl' '${perl}/bin/perl' # Until we get the patchShebangs fixed (issue #55786) we need to patch this manually 25 25 ''; 26 26
+2 -2
pkgs/tools/networking/dhcp/default.nix
··· 1 - { stdenv, fetchurl, perl, file, nettools, iputils, iproute, makeWrapper 1 + { stdenv, fetchurl, perl, file, nettools, iputils, iproute2, makeWrapper 2 2 , coreutils, gnused, openldap ? null 3 3 , buildPackages, lib 4 4 }: ··· 59 59 60 60 cp client/scripts/linux $out/sbin/dhclient-script 61 61 substituteInPlace $out/sbin/dhclient-script \ 62 - --replace /sbin/ip ${iproute}/sbin/ip 62 + --replace /sbin/ip ${iproute2}/sbin/ip 63 63 wrapProgram "$out/sbin/dhclient-script" --prefix PATH : \ 64 64 "${nettools}/bin:${nettools}/sbin:${iputils}/bin:${coreutils}/bin:${gnused}/bin" 65 65 '';
+2 -2
pkgs/tools/networking/gobgp/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "gobgp"; 5 - version = "2.25.0"; 5 + version = "2.26.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "osrg"; 9 9 repo = "gobgp"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-/aezkwg/BVyNZQ9Vb6rz0OcD9kzjGRMxFvDeFtwr71Y="; 11 + sha256 = "sha256-sQmTIjBvCzd8ZXAayhPdRSRwBovH8BFRwazusSE52IE="; 12 12 }; 13 13 14 14 vendorSha256 = "sha256-PWm7XnO6LPaU8g8ymmqRkQv2KSX9kLv9RVaa000mrTY=";
+2 -2
pkgs/tools/networking/gvpe/default.nix
··· 1 - { lib, stdenv, fetchurl, openssl, gmp, zlib, iproute, nettools }: 1 + { lib, stdenv, fetchurl, openssl, gmp, zlib, iproute2, nettools }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "gvpe"; ··· 20 20 ]; 21 21 22 22 preBuild = '' 23 - sed -e 's@"/sbin/ifconfig.*"@"${iproute}/sbin/ip link set $IFNAME address $MAC mtu $MTU"@' -i src/device-linux.C 23 + sed -e 's@"/sbin/ifconfig.*"@"${iproute2}/sbin/ip link set $IFNAME address $MAC mtu $MTU"@' -i src/device-linux.C 24 24 sed -e 's@/sbin/ifconfig@${nettools}/sbin/ifconfig@g' -i src/device-*.C 25 25 ''; 26 26
+2 -2
pkgs/tools/networking/i2pd/default.nix
··· 9 9 10 10 stdenv.mkDerivation rec { 11 11 pname = "i2pd"; 12 - version = "2.36.0"; 12 + version = "2.37.0"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "PurpleI2P"; 16 16 repo = pname; 17 17 rev = version; 18 - sha256 = "sha256-f1ew2i/tgRdIAo/oOgFIFquKve+ImRzqoZqmlzfwpz8="; 18 + sha256 = "sha256-//ootg0RZR2vzO702jGXuJ5qGMO49GSG0Lw6dKzGGt8="; 19 19 }; 20 20 21 21 buildInputs = with lib; [ boost zlib openssl ]
+3 -3
pkgs/tools/networking/libreswan/default.nix
··· 1 1 { lib, stdenv, fetchurl, makeWrapper, 2 2 pkg-config, systemd, gmp, unbound, bison, flex, pam, libevent, libcap_ng, curl, nspr, 3 - bash, iproute, iptables, procps, coreutils, gnused, gawk, nss, which, python3, 3 + bash, iproute2, iptables, procps, coreutils, gnused, gawk, nss, which, python3, 4 4 docs ? false, xmlto, libselinux, ldns 5 5 }: 6 6 7 7 let 8 8 binPath = lib.makeBinPath [ 9 - bash iproute iptables procps coreutils gnused gawk nss.tools which python3 9 + bash iproute2 iptables procps coreutils gnused gawk nss.tools which python3 10 10 ]; 11 11 in 12 12 ··· 44 44 pkg-config 45 45 ]; 46 46 47 - buildInputs = [ bash iproute iptables systemd coreutils gnused gawk gmp unbound pam libevent 47 + buildInputs = [ bash iproute2 iptables systemd coreutils gnused gawk gmp unbound pam libevent 48 48 libcap_ng curl nspr nss python3 ldns ] 49 49 ++ lib.optional docs xmlto 50 50 ++ lib.optional stdenv.isLinux libselinux;
+1
pkgs/tools/networking/linkchecker/default.nix
··· 19 19 ConfigArgParse 20 20 argcomplete 21 21 beautifulsoup4 22 + pyopenssl 22 23 dnspython 23 24 pyxdg 24 25 requests
+2 -2
pkgs/tools/networking/maxscale/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, cmake, pkg-config, glibc 2 - , bison, curl, flex, gperftools, jansson, jemalloc, kerberos, lua, libmysqlclient 2 + , bison, curl, flex, gperftools, jansson, jemalloc, libkrb5, lua, libmysqlclient 3 3 , ncurses, openssl, pcre, pcre2, perl, rabbitmq-c, sqlite, tcl 4 4 , libaio, libedit, libtool, libui, libuuid, zlib 5 5 }: ··· 18 18 nativeBuildInputs = [ cmake pkg-config ]; 19 19 20 20 buildInputs = [ 21 - bison curl flex gperftools jansson jemalloc kerberos lua libmysqlclient 21 + bison curl flex gperftools jansson jemalloc libkrb5 lua libmysqlclient 22 22 ncurses openssl pcre pcre2 perl rabbitmq-c sqlite tcl 23 23 libaio libedit libtool libui libuuid zlib 24 24 ];
+2 -2
pkgs/tools/networking/miniupnpd/default.nix
··· 1 1 { stdenv, lib, fetchurl, iptables, libuuid, pkg-config 2 - , which, iproute, gnused, coreutils, gawk, makeWrapper 2 + , which, iproute2, gnused, coreutils, gawk, makeWrapper 3 3 }: 4 4 5 5 let 6 - scriptBinEnv = lib.makeBinPath [ which iproute iptables gnused coreutils gawk ]; 6 + scriptBinEnv = lib.makeBinPath [ which iproute2 iptables gnused coreutils gawk ]; 7 7 in 8 8 stdenv.mkDerivation rec { 9 9 name = "miniupnpd-2.1.20190502";
+2 -2
pkgs/tools/networking/miredo/default.nix
··· 1 - { lib, stdenv, fetchurl, nettools, iproute, judy }: 1 + { lib, stdenv, fetchurl, nettools, iproute2, judy }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 version = "1.2.6"; ··· 15 15 substituteInPlace misc/client-hook.bsd \ 16 16 --replace '/sbin/route' '${nettools}/bin/route' \ 17 17 --replace '/sbin/ifconfig' '${nettools}/bin/ifconfig' 18 - substituteInPlace misc/client-hook.iproute --replace '/sbin/ip' '${iproute}/bin/ip' 18 + substituteInPlace misc/client-hook.iproute --replace '/sbin/ip' '${iproute2}/bin/ip' 19 19 ''; 20 20 21 21 configureFlags = [ "--with-Judy" ];
+2 -2
pkgs/tools/networking/netboot/default.nix
··· 1 - { lib, stdenv, fetchurl, yacc, lzo, db4 }: 1 + { lib, stdenv, fetchurl, bison, lzo, db4 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "netboot-0.10.2"; ··· 7 7 sha256 = "09w09bvwgb0xzn8hjz5rhi3aibysdadbg693ahn8rylnqfq4hwg0"; 8 8 }; 9 9 10 - buildInputs = [ yacc lzo db4 ]; 10 + buildInputs = [ bison lzo db4 ]; 11 11 12 12 hardeningDisable = [ "format" ]; 13 13
+2 -2
pkgs/tools/networking/nfdump/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub 2 2 , autoconf, automake, libtool, pkg-config 3 - , bzip2, libpcap, flex, yacc }: 3 + , bzip2, libpcap, flex, bison }: 4 4 5 5 let version = "1.6.22"; in 6 6 ··· 15 15 sha256 = "14x2k85ard1kp99hhd90zsmvyw24g03m84rn13gb4grm9gjggzrj"; 16 16 }; 17 17 18 - nativeBuildInputs = [ autoconf automake flex libtool pkg-config yacc ]; 18 + nativeBuildInputs = [ autoconf automake flex libtool pkg-config bison ]; 19 19 buildInputs = [ bzip2 libpcap ]; 20 20 21 21 preConfigure = ''
+6 -6
pkgs/tools/networking/openssh/common.nix
··· 20 20 , pam 21 21 , etcDir ? null 22 22 , withKerberos ? true 23 - , kerberos 23 + , libkrb5 24 24 , libfido2 25 25 , withFIDO ? stdenv.hostPlatform.isUnix && !stdenv.hostPlatform.isMusl 26 26 , linkOpenssl ? true ··· 45 45 ''; 46 46 47 47 nativeBuildInputs = [ pkg-config ] 48 - # This is not the same as the kerberos from the inputs! pkgs.kerberos is 48 + # This is not the same as the libkrb5 from the inputs! pkgs.libkrb5 is 49 49 # needed here to access krb5-config in order to cross compile. See: 50 50 # https://github.com/NixOS/nixpkgs/pull/107606 51 - ++ optional withKerberos pkgs.kerberos 51 + ++ optional withKerberos pkgs.libkrb5 52 52 ++ extraNativeBuildInputs; 53 53 buildInputs = [ zlib openssl libedit ] 54 54 ++ optional withFIDO libfido2 55 - ++ optional withKerberos kerberos 55 + ++ optional withKerberos libkrb5 56 56 ++ optional stdenv.isLinux pam; 57 57 58 58 preConfigure = '' ··· 70 70 # Kerberos can be found either by krb5-config or by fall-back shell 71 71 # code in openssh's configure.ac. Neither of them support static 72 72 # build, but patching code for krb5-config is simpler, so to get it 73 - # into PATH, kerberos.dev is added into buildInputs. 73 + # into PATH, libkrb5.dev is added into buildInputs. 74 74 + optionalString stdenv.hostPlatform.isStatic '' 75 75 sed -i "s,PKGCONFIG --libs,PKGCONFIG --libs --static,g" configure 76 76 sed -i 's#KRB5CONF --libs`#KRB5CONF --libs` -lkrb5support -lkeyutils#g' configure ··· 89 89 (if stdenv.isLinux then "--with-pam" else "--without-pam") 90 90 ] ++ optional (etcDir != null) "--sysconfdir=${etcDir}" 91 91 ++ optional withFIDO "--with-security-key-builtin=yes" 92 - ++ optional withKerberos (assert kerberos != null; "--with-kerberos5=${kerberos}") 92 + ++ optional withKerberos (assert libkrb5 != null; "--with-kerberos5=${libkrb5}") 93 93 ++ optional stdenv.isDarwin "--disable-libutil" 94 94 ++ optional (!linkOpenssl) "--without-openssl"; 95 95
+4 -4
pkgs/tools/networking/openvpn/default.nix
··· 3 3 , pkg-config 4 4 , makeWrapper 5 5 , runtimeShell 6 - , iproute 6 + , iproute2 7 7 , lzo 8 8 , openssl 9 9 , pam ··· 40 40 41 41 buildInputs = [ lzo openssl ] 42 42 ++ optional stdenv.isLinux pam 43 - ++ optional withIpRoute iproute 43 + ++ optional withIpRoute iproute2 44 44 ++ optional useSystemd systemd 45 45 ++ optional pkcs11Support pkcs11helper; 46 46 47 47 configureFlags = optionals withIpRoute [ 48 48 "--enable-iproute2" 49 - "IPROUTE=${iproute}/sbin/ip" 49 + "IPROUTE=${iproute2}/sbin/ip" 50 50 ] 51 51 ++ optional useSystemd "--enable-systemd" 52 52 ++ optional pkcs11Support "--enable-pkcs11" ··· 60 60 '' + optionalString useSystemd '' 61 61 install -Dm555 ${update-resolved} $out/libexec/update-systemd-resolved 62 62 wrapProgram $out/libexec/update-systemd-resolved \ 63 - --prefix PATH : ${makeBinPath [ runtimeShell iproute systemd util-linux ]} 63 + --prefix PATH : ${makeBinPath [ runtimeShell iproute2 systemd util-linux ]} 64 64 ''; 65 65 66 66 enableParallelBuilding = true;
+2 -2
pkgs/tools/networking/openvpn/update-systemd-resolved.nix
··· 1 1 { lib, stdenv, fetchFromGitHub 2 2 , makeWrapper 3 - , iproute, systemd, coreutils, util-linux }: 3 + , iproute2, systemd, coreutils, util-linux }: 4 4 5 5 stdenv.mkDerivation rec { 6 6 pname = "update-systemd-resolved"; ··· 21 21 22 22 installPhase = '' 23 23 wrapProgram $out/libexec/openvpn/update-systemd-resolved \ 24 - --prefix PATH : ${lib.makeBinPath [ iproute systemd coreutils util-linux ]} 24 + --prefix PATH : ${lib.makeBinPath [ iproute2 systemd coreutils util-linux ]} 25 25 ''; 26 26 27 27 meta = with lib; {
+2 -2
pkgs/tools/networking/pptp/default.nix
··· 1 - { lib, stdenv, fetchurl, perl, ppp, iproute }: 1 + { lib, stdenv, fetchurl, perl, ppp, iproute2 }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "pptp"; ··· 14 14 ''; 15 15 16 16 preConfigure = '' 17 - makeFlagsArray=( IP=${iproute}/bin/ip PPPD=${ppp}/sbin/pppd \ 17 + makeFlagsArray=( IP=${iproute2}/bin/ip PPPD=${ppp}/sbin/pppd \ 18 18 BINDIR=$out/sbin MANDIR=$out/share/man/man8 \ 19 19 PPPDIR=$out/etc/ppp ) 20 20 '';
+2 -2
pkgs/tools/networking/saldl/default.nix
··· 14 14 15 15 stdenv.mkDerivation rec { 16 16 pname = "saldl"; 17 - version = "40"; 17 + version = "41"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = pname; 21 21 repo = pname; 22 22 rev = "v${version}"; 23 - sha256 = "19ajci5h5gdnrvwf0l7xy5s58z2di68rrvcmqpsmpp4lfr37rk2l"; 23 + sha256 = "sha256-PAX2MUyBWWU8kGkaeoCJteidgszh7ipwDJbrLXzVsn0="; 24 24 }; 25 25 26 26 nativeBuildInputs = [
+3 -3
pkgs/tools/networking/shorewall/default.nix
··· 3 3 , fetchurl 4 4 , gnugrep 5 5 , gnused 6 - , iproute 6 + , iproute2 7 7 , ipset 8 8 , iptables 9 9 , perl ··· 15 15 let 16 16 PATH = lib.concatStringsSep ":" 17 17 [ "${coreutils}/bin" 18 - "${iproute}/bin" 18 + "${iproute2}/bin" 19 19 "${iptables}/bin" 20 20 "${ipset}/bin" 21 21 "${ebtables}/bin" ··· 46 46 47 47 buildInputs = [ 48 48 coreutils 49 - iproute 49 + iproute2 50 50 ipset 51 51 iptables 52 52 ebtables
+2 -2
pkgs/tools/networking/snabb/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, bash, makeWrapper, git, mysql, diffutils, which, coreutils, procps, nettools 1 + { lib, stdenv, fetchFromGitHub, bash, makeWrapper, git, mariadb, diffutils, which, coreutils, procps, nettools 2 2 ,supportOpenstack ? true 3 3 }: 4 4 ··· 28 28 done 29 29 '' + optionalString supportOpenstack '' 30 30 # We need a way to pass $PATH to the scripts 31 - sed -i '2iexport PATH=${git}/bin:${mysql}/bin:${which}/bin:${procps}/bin:${coreutils}/bin' src/program/snabbnfv/neutron_sync_master/neutron_sync_master.sh.inc 31 + sed -i '2iexport PATH=${git}/bin:${mariadb}/bin:${which}/bin:${procps}/bin:${coreutils}/bin' src/program/snabbnfv/neutron_sync_master/neutron_sync_master.sh.inc 32 32 sed -i '2iexport PATH=${git}/bin:${coreutils}/bin:${diffutils}/bin:${nettools}/bin' src/program/snabbnfv/neutron_sync_agent/neutron_sync_agent.sh.inc 33 33 ''; 34 34
+2 -2
pkgs/tools/networking/vtun/default.nix
··· 1 - { lib, stdenv, fetchurl, fetchpatch, openssl, lzo, zlib, yacc, flex }: 1 + { lib, stdenv, fetchurl, fetchpatch, openssl, lzo, zlib, bison, flex }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 name = "vtun-3.0.4"; ··· 18 18 sed -i -e 's/-m 755//' -e 's/-o root -g 0//' Makefile.in 19 19 sed -i '/strip/d' Makefile.in 20 20 ''; 21 - buildInputs = [ lzo openssl zlib yacc flex ]; 21 + buildInputs = [ lzo openssl zlib bison flex ]; 22 22 23 23 configureFlags = [ 24 24 "--with-lzo-headers=${lzo}/include/lzo"
+2 -2
pkgs/tools/networking/wget2/default.nix
··· 17 17 , libhsts 18 18 , libidn2 19 19 , libpsl 20 - , lzma 20 + , xz 21 21 , nghttp2 22 22 , sslSupport ? true 23 23 , openssl ··· 58 58 59 59 nativeBuildInputs = [ autoreconfHook flex lzip pkg-config python3 texinfo ]; 60 60 61 - buildInputs = [ brotli bzip2 gpgme libhsts libidn2 libpsl lzma nghttp2 pcre2 zlib zstd ] 61 + buildInputs = [ brotli bzip2 gpgme libhsts libidn2 libpsl xz nghttp2 pcre2 zlib zstd ] 62 62 ++ lib.optional sslSupport openssl; 63 63 64 64 # TODO: include translation files
+2 -2
pkgs/tools/networking/wicd/default.nix
··· 1 1 { lib, stdenv, fetchurl, python2Packages 2 2 , wpa_supplicant, dhcp, dhcpcd, wirelesstools 3 - , nettools, openresolv, iproute, iputils }: 3 + , nettools, openresolv, iproute2, iputils }: 4 4 5 5 let 6 6 inherit (python2Packages) python pygobject2 dbus-python pyGtkGlade pycairo; ··· 36 36 37 37 substituteInPlace in/scripts=wicd.in --subst-var-by TEMPLATE-DEFAULT $out/share/other/dhclient.conf.template.default 38 38 39 - sed -i "2iexport PATH=${lib.makeBinPath [ python wpa_supplicant dhcpcd dhcp wirelesstools nettools nettools iputils openresolv iproute ]}\$\{PATH:+:\}\$PATH" in/scripts=wicd.in 39 + sed -i "2iexport PATH=${lib.makeBinPath [ python wpa_supplicant dhcpcd dhcp wirelesstools nettools nettools iputils openresolv iproute2 ]}\$\{PATH:+:\}\$PATH" in/scripts=wicd.in 40 40 sed -i "3iexport PYTHONPATH=$(toPythonPath $out):$(toPythonPath ${pygobject2}):$(toPythonPath ${dbus-python})\$\{PYTHONPATH:+:\}\$PYTHONPATH" in/scripts=wicd.in 41 41 sed -i "2iexport PATH=${python}/bin\$\{PATH:+:\}\$PATH" in/scripts=wicd-client.in 42 42 sed -i "3iexport PYTHONPATH=$(toPythonPath $out):$(toPythonPath ${pyGtkGlade})/gtk-2.0:$(toPythonPath ${pygobject2}):$(toPythonPath ${pygobject2})/gtk-2.0:$(toPythonPath ${pycairo}):$(toPythonPath ${dbus-python})\$\{PYTHONPATH:+:\}\$PYTHONPATH" in/scripts=wicd-client.in
+2 -2
pkgs/tools/networking/wireguard-tools/default.nix
··· 3 3 , fetchzip 4 4 , nixosTests 5 5 , iptables 6 - , iproute 6 + , iproute2 7 7 , makeWrapper 8 8 , openresolv 9 9 , procps ··· 38 38 --replace /usr/bin $out/bin 39 39 '' + lib.optionalString stdenv.isLinux '' 40 40 for f in $out/bin/*; do 41 - wrapProgram $f --prefix PATH : ${lib.makeBinPath [ procps iproute iptables openresolv ]} 41 + wrapProgram $f --prefix PATH : ${lib.makeBinPath [ procps iproute2 iptables openresolv ]} 42 42 done 43 43 '' + lib.optionalString stdenv.isDarwin '' 44 44 for f in $out/bin/*; do
+2 -2
pkgs/tools/networking/ytcc/default.nix
··· 2 2 3 3 python3Packages.buildPythonApplication rec { 4 4 pname = "ytcc"; 5 - version = "2.1.0"; 5 + version = "2.2.0"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "woefe"; 9 9 repo = "ytcc"; 10 10 rev = "v${version}"; 11 - sha256 = "04l5bfyq53r8803q24bfw49ji7jx8z9irhhh30cvq2va1ywwd4ww"; 11 + sha256 = "1rhnrmanad10zy2as9q5wjfjlk18f51vf801syyfgxvk0pdcsk6w"; 12 12 }; 13 13 14 14 nativeBuildInputs = [ gettext ];
+2 -2
pkgs/tools/networking/zerotierone/default.nix
··· 1 - { lib, stdenv, buildPackages, fetchFromGitHub, openssl, lzo, zlib, iproute, ronn }: 1 + { lib, stdenv, buildPackages, fetchFromGitHub, openssl, lzo, zlib, iproute2, ronn }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "zerotierone"; ··· 22 22 23 23 24 24 nativeBuildInputs = [ ronn ]; 25 - buildInputs = [ openssl lzo zlib iproute ]; 25 + buildInputs = [ openssl lzo zlib iproute2 ]; 26 26 27 27 enableParallelBuilding = true; 28 28
+25 -23
pkgs/tools/package-management/appimagekit/default.nix
··· 11 11 appimagekit_src = fetchFromGitHub { 12 12 owner = "AppImage"; 13 13 repo = "AppImageKit"; 14 - rev = "b0859501df61cde198b54a317c03b41dbafc98b1"; 15 - sha256 = "0qqg79jw9w9rs8c2w3lla4kz62ihafrf7jm370pp1dl8y2i81jzg"; 14 + rev = "8bbf694455d00f48d835f56afaa1dabcd9178ba6"; 15 + sha256 = "sha256-pqg+joomC5CI9WdKP/h/XKPsruMgZEaIOjPLOqnNPZw="; 16 + fetchSubmodules = true; 16 17 }; 17 18 18 - # squashfuse adapted to nix from cmake experession in "${appimagekit_src}/cmake/dependencies.cmake" 19 + # squashfuse adapted to nix from cmake experession in "${appimagekit_src}/lib/libappimage/cmake/dependencies.cmake" 19 20 appimagekit_squashfuse = squashfuse.overrideAttrs (attrs: rec { 20 - name = "squashfuse-${version}"; 21 - version = "20161009"; 21 + pname = "squashfuse"; 22 + version = "unstable-2016-10-09"; 22 23 23 24 src = fetchFromGitHub { 24 25 owner = "vasi"; 25 - repo = "squashfuse"; 26 - rev = "1f980303b89c779eabfd0a0fdd36d6a7a311bf92"; 27 - sha256 = "0lrw9ff8k15l34wjwyllw3i35hl0cms97jj2hpnr2q8ipgxpb5q5"; 26 + repo = pname; 27 + rev = "1f980303b89c779eabfd0a0fdd36d6a7a311bf92"; 28 + sha256 = "sha256-BZd1+7sRYZHthULKk3RlgMIy4uCUei45GbSEiZxLPFM="; 28 29 }; 29 30 30 31 patches = [ 31 - "${appimagekit_src}/squashfuse.patch" 32 - "${appimagekit_src}/squashfuse_dlopen.patch" 32 + "${appimagekit_src}/lib/libappimage/src/patches/squashfuse.patch" 33 + "${appimagekit_src}/lib/libappimage/src/patches/squashfuse_dlopen.patch" 33 34 ]; 34 35 35 36 postPatch = '' 36 - cp -v ${appimagekit_src}/squashfuse_dlopen.[hc] . 37 + cp -v ${appimagekit_src}/lib/libappimage/src/patches/squashfuse_dlopen.[hc] . 37 38 ''; 38 39 39 40 preConfigure = '' ··· 58 59 }); 59 60 60 61 in stdenv.mkDerivation rec { 61 - name = "appimagekit-20180727"; 62 + pname = "appimagekit"; 63 + version = "unstable-2020-12-31"; 62 64 63 65 src = appimagekit_src; 64 66 65 67 patches = [ ./nix.patch ]; 68 + 69 + postPatch = '' 70 + patchShebangs src/embed-magic-bytes-in-file.sh 71 + ''; 66 72 67 73 nativeBuildInputs = [ 68 74 pkg-config cmake autoconf automake libtool wget xxd 69 - desktop-file-utils 75 + desktop-file-utils makeWrapper 70 76 ]; 71 77 72 78 buildInputs = [ 73 - glib zlib cairo openssl fuse 74 - xz inotify-tools libarchive 75 - squashfsTools makeWrapper 79 + glib zlib cairo openssl fuse xz inotify-tools 80 + libarchive squashfsTools appimagekit_squashfuse 76 81 ]; 77 - 78 - postPatch = '' 79 - substituteInPlace src/appimagetool.c --replace "/usr/bin/file" "${file}/bin/file" 80 - ''; 81 82 82 83 preConfigure = '' 83 84 export HOME=$(pwd) ··· 87 88 "-DUSE_SYSTEM_XZ=ON" 88 89 "-DUSE_SYSTEM_SQUASHFUSE=ON" 89 90 "-DSQUASHFUSE=${appimagekit_squashfuse}" 90 - "-DUSE_SYSTEM_INOTIFY_TOOLS=ON" 91 91 "-DUSE_SYSTEM_LIBARCHIVE=ON" 92 92 "-DUSE_SYSTEM_GTEST=ON" 93 93 "-DUSE_SYSTEM_MKSQUASHFS=ON" 94 94 ]; 95 95 96 96 postInstall = '' 97 + mkdir -p $out/lib/appimagekit 97 98 cp "${squashfsTools}/bin/mksquashfs" "$out/lib/appimagekit/" 98 99 cp "${desktop-file-utils}/bin/desktop-file-validate" "$out/bin" 99 100 100 101 wrapProgram "$out/bin/appimagetool" \ 101 - --prefix PATH : "${lib.makeBinPath [ file gnupg ]}" 102 + --prefix PATH : "${lib.makeBinPath [ file gnupg ]}" \ 103 + --unset SOURCE_DATE_EPOCH 102 104 ''; 103 105 104 106 checkInputs = [ gtest ]; 105 - doCheck = false; # fails 1 out of 4 tests, I'm too lazy to debug why 106 107 107 108 # for debugging 108 109 passthru = { ··· 117 118 AppImages. 118 119 ''; 119 120 license = licenses.mit; 121 + maintainers = with maintainers; [ taeer ]; 120 122 homepage = src.meta.homepage; 121 123 platforms = platforms.linux; 122 124 };
+65 -157
pkgs/tools/package-management/appimagekit/nix.patch
··· 1 - diff --git a/cmake/dependencies.cmake b/cmake/dependencies.cmake 2 - index ea133a3..916606c 100644 3 - --- a/cmake/dependencies.cmake 4 - +++ b/cmake/dependencies.cmake 5 - @@ -224,21 +224,23 @@ if(NOT USE_SYSTEM_XZ) 6 - LIBRARY_DIRS <INSTALL_DIR>/lib/ 7 - LIBRARIES "<INSTALL_DIR>/lib/liblzma.a" 8 - INCLUDE_DIRS "<SOURCE_DIR>/src/liblzma/api/" 1 + Submodule lib/libappimage contains modified content 2 + diff --git a/lib/libappimage/cmake/dependencies.cmake b/lib/libappimage/cmake/dependencies.cmake 3 + index 8d96484..c7b17a1 100644 4 + --- a/lib/libappimage/cmake/dependencies.cmake 5 + +++ b/lib/libappimage/cmake/dependencies.cmake 6 + @@ -91,9 +91,18 @@ if(NOT USE_SYSTEM_SQUASHFUSE) 7 + INCLUDE_DIRS "<SOURCE_DIR>" 9 8 ) 10 9 else() 11 - message(STATUS "Using system xz") 12 - 13 - import_pkgconfig_target(TARGET_NAME xz PKGCONFIG_TARGET liblzma STATIC) 14 - endif() 15 - 16 - +set(USE_SYSTEM_SQUASHFUSE OFF CACHE BOOL "Use system squashfuse instead of building our own") 17 - 18 - +if(NOT USE_SYSTEM_SQUASHFUSE) 19 - # as distros don't provide suitable squashfuse and squashfs-tools, those dependencies are bundled in, can, and should 20 - # be used from this repository 21 - # TODO: implement out-of-source builds for squashfuse, as for the other dependencies 22 - configure_file( 23 - ${CMAKE_CURRENT_SOURCE_DIR}/src/patch-squashfuse.sh.in 24 - ${CMAKE_CURRENT_BINARY_DIR}/patch-squashfuse.sh 25 - @ONLY 26 - ) 27 - 28 - ExternalProject_Add(squashfuse-EXTERNAL 29 - @@ -259,20 +261,34 @@ ExternalProject_Add(squashfuse-EXTERNAL 30 - BUILD_IN_SOURCE ON 31 - INSTALL_COMMAND ${MAKE} install 32 - ) 33 - 34 - import_external_project( 35 - TARGET_NAME squashfuse 36 - EXT_PROJECT_NAME squashfuse-EXTERNAL 37 - LIBRARIES "<SOURCE_DIR>/.libs/libsquashfuse.a;<SOURCE_DIR>/.libs/libsquashfuse_ll.a;<SOURCE_DIR>/.libs/libfuseprivate.a" 38 - INCLUDE_DIRS "<SOURCE_DIR>" 39 - ) 40 - +else() 10 + - message(STATUS "Using system squashfuse") 41 11 + message(STATUS "Using system squashfsfuse from ${SQUASHFUSE}") 42 - + 43 - + add_library(squashfuse INTERFACE IMPORTED GLOBAL) 12 + 13 + - import_pkgconfig_target(TARGET_NAME libsquashfuse PKGCONFIG_TARGET squashfuse) 14 + + add_library(libsquashfuse INTERFACE IMPORTED GLOBAL) 44 15 + 45 16 + set(squashfuse_INCLUDE_DIRS "${SQUASHFUSE}/include") 46 17 + set(squashfuse_LIBRARIES "${SQUASHFUSE}/lib/libsquashfuse.a;${SQUASHFUSE}/lib/libsquashfuse_ll.a;${SQUASHFUSE}/lib/libfuseprivate.a") 47 18 + 48 19 + set_property( 49 - + TARGET squashfuse 20 + + TARGET libsquashfuse 50 21 + PROPERTY INTERFACE_LINK_LIBRARIES ${squashfuse_LIBRARIES} 51 22 + ) 52 23 + include_directories(${squashfuse_INCLUDE_DIRS}) 53 - +endif() 54 - 55 - 56 - set(USE_SYSTEM_INOTIFY_TOOLS OFF CACHE BOOL "Use system libinotifytools instead of building our own") 57 - 58 - if(NOT USE_SYSTEM_INOTIFY_TOOLS) 59 - message(STATUS "Downloading and building inotify-tools") 60 - 61 - # TODO: build out of source 62 - ExternalProject_Add(inotify-tools-EXTERNAL 63 - URL https://github.com/downloads/rvoicilas/inotify-tools/inotify-tools-3.14.tar.gz 64 - @@ -345,20 +361,23 @@ if(NOT USE_SYSTEM_GTEST) 65 - INCLUDE_DIRS "<INSTALL_DIR>/include/" 66 - ) 67 - else() 68 - message(STATUS "Using system GTest") 69 - 70 - import_find_pkg_target(gtest GTest GTEST) 71 - endif() 72 24 endif() 73 - 74 - 75 - +set(USE_SYSTEM_MKSQUASHFS OFF CACHE BOOL "Use system mksquashfs instead of downloading and building our own") 76 - + 77 - +if(NOT USE_SYSTEM_MKSQUASHFS) 78 - # TODO: allow using system wide mksquashfs 79 - set(mksquashfs_cflags "-DXZ_SUPPORT ${CFLAGS}") 80 - 81 - if(xz_LIBRARIES MATCHES "\\.a$") 82 - set(mksquashfs_ldflags "${xz_LIBRARIES}") 83 - else() 84 - set(mksquashfs_ldflags "-l${xz_LIBRARIES}") 85 - endif() 86 - 87 - if(xz_INCLUDE_DIRS) 88 - @@ -385,20 +404,25 @@ ExternalProject_Add(mksquashfs 89 - INSTALL_COMMAND ${MAKE} -C squashfs-tools/ install INSTALL_DIR=<INSTALL_DIR> 90 - ) 91 - 92 - ExternalProject_Get_Property(mksquashfs INSTALL_DIR) 93 - set(mksquashfs_INSTALL_DIR "${INSTALL_DIR}") 94 - mark_as_advanced(mksquashfs_INSTALL_DIR) 95 - 96 - # for later use when packaging as an AppImage 97 - set(mksquashfs_BINARY "${mksquashfs_INSTALL_DIR}/mksquashfs") 98 - mark_as_advanced(mksquashfs_BINARY) 99 - +else() 100 - + message(STATUS "Using system mksquashfs") 101 - + 102 - + set(mksquashfs_BINARY "mksquashfs") 103 - +endif() 104 - 105 - 106 - #### build dependency configuration #### 107 - 108 - # only have to build custom xz when not using system libxz 109 - if(TARGET xz-EXTERNAL) 110 - if(TARGET squashfuse-EXTERNAL) 111 - ExternalProject_Add_StepDependencies(squashfuse-EXTERNAL configure xz-EXTERNAL) 112 - endif() 113 - if(TARGET mksquashfs) 114 - diff --git a/src/CMakeLists.txt b/src/CMakeLists.txt 115 - index 3f25442..974ed0e 100644 116 - --- a/src/CMakeLists.txt 117 - +++ b/src/CMakeLists.txt 118 - @@ -197,27 +197,27 @@ target_include_directories(digest_md5 119 - 120 - target_link_libraries(digest_md5 121 - PRIVATE 122 - libglib 123 - ) 124 - 125 - 126 - # install binaries 127 - if(AUXILIARY_FILES_DESTINATION) 128 - install( 129 - - PROGRAMS ${mksquashfs_INSTALL_DIR}/mksquashfs ${CMAKE_CURRENT_BINARY_DIR}/runtime 130 - + PROGRAMS ${CMAKE_CURRENT_BINARY_DIR}/runtime 131 - DESTINATION ${AUXILIARY_FILES_DESTINATION} 132 - COMPONENT applications 133 - ) 134 - else() 135 - install( 136 - - PROGRAMS ${mksquashfs_INSTALL_DIR}/mksquashfs ${CMAKE_CURRENT_BINARY_DIR}/runtime 137 - + PROGRAMS ${CMAKE_CURRENT_BINARY_DIR}/runtime 138 - DESTINATION bin 139 - COMPONENT applications 140 - ) 141 - endif() 142 - 143 - install( 144 - TARGETS AppRun appimagetool digest validate 145 - RUNTIME DESTINATION bin COMPONENT applications 146 - LIBRARY DESTINATION lib COMPONENT applications 147 - ARCHIVE DESTINATION lib/static COMPONENT applications 148 - diff --git a/src/shared.c b/src/shared.c 149 - index cf5fd5c..4f48dbc 100644 150 - --- a/src/shared.c 151 - +++ b/src/shared.c 152 - @@ -34,21 +34,21 @@ 25 + 26 + 27 + diff --git a/src/appimagetool.c b/src/appimagetool.c 28 + index 6b37419..23425e7 100644 29 + --- a/src/appimagetool.c 30 + +++ b/src/appimagetool.c 31 + @@ -38,7 +38,7 @@ 32 + #include <argp.h> 33 + 34 + #include <fcntl.h> 35 + -#include "squashfuse.h" 36 + +#include <squashfuse.h> 37 + 38 + #include <sys/types.h> 153 39 #include <sys/stat.h> 40 + @@ -96,7 +96,7 @@ static void die(const char *msg) { 41 + } 42 + 43 + /* Function that prints the contents of a squashfs file 44 + -* using libsquashfuse (#include "squashfuse.h") */ 45 + +* using libsquashfuse (#include <squashfuse.h>) */ 46 + int sfs_ls(char* image) { 47 + sqfs_err err = SQFS_OK; 48 + sqfs_traverse trv; 49 + diff --git a/src/appimagetoolnoglib.c b/src/appimagetoolnoglib.c 50 + index f900e76..ffa87f8 100644 51 + --- a/src/appimagetoolnoglib.c 52 + +++ b/src/appimagetoolnoglib.c 53 + @@ -3,7 +3,7 @@ 54 + 55 + #include <stdlib.h> 56 + #include <fcntl.h> 57 + -#include "squashfuse.h" 58 + +#include <squashfuse.h> 59 + 154 60 #include <sys/types.h> 155 - #include <dirent.h> 156 - #include <errno.h> 157 - 158 - #include <glib.h> 159 - #include <glib/gprintf.h> 160 - #include <glib/gstdio.h> 161 - #include <gio/gio.h> 162 - 61 + #include <sys/stat.h> 62 + @@ -118,7 +118,7 @@ int is_regular_file(const char *path) 63 + } 64 + 65 + /* Function that prints the contents of a squashfs file 66 + - * using libsquashfuse (#include "squashfuse.h") */ 67 + + * using libsquashfuse (#include <squashfuse.h>) */ 68 + int sfs_ls(char* image) { 69 + sqfs_err err = SQFS_OK; 70 + sqfs_traverse trv; 71 + diff --git a/src/runtime.c b/src/runtime.c 72 + index bada3af..70a642b 100644 73 + --- a/src/runtime.c 74 + +++ b/src/runtime.c 75 + @@ -29,7 +29,7 @@ 76 + 77 + #define _GNU_SOURCE 78 + 163 79 -#include "squashfuse.h" 164 80 +#include <squashfuse.h> 165 81 #include <squashfs_fs.h> 166 - #include "getsection.h" 167 - #include "elf.h" 168 - 169 - #include "xdg-basedir.h" 170 - 171 - // own header 172 - #include "shared.h" 173 - 174 - #if HAVE_LIBARCHIVE3 == 1 // CentOS 82 + #include <nonstd.h>
+2 -2
pkgs/tools/package-management/apt/default.nix
··· 1 1 { stdenv, lib, fetchurl, pkg-config, cmake, perlPackages, curl, gtest 2 - , gnutls, libtasn1, lzma, bzip2, lz4, zstd, libseccomp, udev 2 + , gnutls, libtasn1, xz, bzip2, lz4, zstd, libseccomp, udev 3 3 , db, dpkg, libxslt, docbook_xsl, docbook_xml_dtd_45 4 4 5 5 # used when WITH_DOC=ON ··· 26 26 nativeBuildInputs = [ pkg-config cmake gtest libxslt.bin ]; 27 27 28 28 buildInputs = [ 29 - perlPackages.perl curl gnutls libtasn1 lzma bzip2 lz4 zstd libseccomp udev db dpkg 29 + perlPackages.perl curl gnutls libtasn1 xz bzip2 lz4 zstd libseccomp udev db dpkg 30 30 ] ++ lib.optionals withDocs [ 31 31 doxygen perlPackages.Po4a w3m docbook_xml_dtd_45 32 32 ] ++ lib.optionals withNLS [
+2 -2
pkgs/tools/package-management/nix/default.nix
··· 16 16 , jq, libarchive, libcpuid 17 17 , lowdown, mdbook 18 18 # Used by tests 19 - , gmock 19 + , gtest 20 20 , busybox-sandbox-shell 21 21 , storeDir 22 22 , stateDir ··· 56 56 ] 57 57 ++ lib.optionals stdenv.isDarwin [ Security ] 58 58 ++ lib.optional (stdenv.isLinux || stdenv.isDarwin) libsodium 59 - ++ lib.optionals is24 [ libarchive gmock lowdown ] 59 + ++ lib.optionals is24 [ libarchive gtest lowdown ] 60 60 ++ lib.optional (is24 && stdenv.isx86_64) libcpuid 61 61 ++ lib.optional withLibseccomp libseccomp 62 62 ++ lib.optional withAWS
+2 -2
pkgs/tools/package-management/opkg/default.nix
··· 1 - { lib, stdenv, fetchurl, pkg-config, curl, gpgme, libarchive, bzip2, lzma, attr, acl, libxml2 1 + { lib, stdenv, fetchurl, pkg-config, curl, gpgme, libarchive, bzip2, xz, attr, acl, libxml2 2 2 , autoreconfHook }: 3 3 4 4 stdenv.mkDerivation rec { ··· 10 10 }; 11 11 12 12 nativeBuildInputs = [ pkg-config autoreconfHook ]; 13 - buildInputs = [ curl gpgme libarchive bzip2 lzma attr acl libxml2 ]; 13 + buildInputs = [ curl gpgme libarchive bzip2 xz attr acl libxml2 ]; 14 14 15 15 meta = with lib; { 16 16 description = "A lightweight package management system based upon ipkg";
+2 -2
pkgs/tools/package-management/pacman/default.nix
··· 1 1 { stdenv, lib, fetchurl, pkg-config, m4, perl, libarchive, openssl, zlib, bzip2, 2 - lzma, curl, runtimeShell }: 2 + xz, curl, runtimeShell }: 3 3 4 4 stdenv.mkDerivation rec { 5 5 pname = "pacman"; ··· 24 24 installFlags = [ "sysconfdir=${placeholder "out"}/etc" ]; 25 25 26 26 nativeBuildInputs = [ pkg-config m4 ]; 27 - buildInputs = [ curl perl libarchive openssl zlib bzip2 lzma ]; 27 + buildInputs = [ curl perl libarchive openssl zlib bzip2 xz ]; 28 28 29 29 postFixup = '' 30 30 substituteInPlace $out/bin/repo-add \
+2 -2
pkgs/tools/security/enpass/default.nix
··· 2 2 , glib, libGLU, libGL, libpulseaudio, zlib, dbus, fontconfig, freetype 3 3 , gtk3, pango 4 4 , makeWrapper , python2Packages, lib 5 - , lsof, curl, libuuid, cups, mesa, lzma, libxkbcommon 5 + , lsof, curl, libuuid, cups, mesa, xz, libxkbcommon 6 6 }: 7 7 8 8 let ··· 38 38 curl 39 39 libuuid 40 40 cups 41 - lzma 41 + xz 42 42 libxkbcommon 43 43 ]); 44 44 package = stdenv.mkDerivation {
+2 -2
pkgs/tools/security/john/default.nix
··· 1 - { lib, stdenv, fetchurl, openssl, nss, nspr, kerberos, gmp, zlib, libpcap, re2 1 + { lib, stdenv, fetchurl, openssl, nss, nspr, libkrb5, gmp, zlib, libpcap, re2 2 2 , gcc, python3Packages, perl, perlPackages, makeWrapper 3 3 }: 4 4 ··· 36 36 "--with-systemwide" 37 37 ]; 38 38 39 - buildInputs = [ openssl nss nspr kerberos gmp zlib libpcap re2 ]; 39 + buildInputs = [ openssl nss nspr libkrb5 gmp zlib libpcap re2 ]; 40 40 nativeBuildInputs = [ gcc python3Packages.wrapPython perl makeWrapper ]; 41 41 propagatedBuildInputs = (with python3Packages; [ dpkt scapy lxml ]) ++ # For pcap2john.py 42 42 (with perlPackages; [ DigestMD4 DigestSHA1 GetoptLong # For pass_gen.pl
+2 -2
pkgs/tools/security/nuclei/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "nuclei"; 8 - version = "2.3.3"; 8 + version = "2.3.4"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "projectdiscovery"; 12 12 repo = pname; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-6Y93Buxq9HIqeXY92xq5KjSn2nn+u05bKGNNi/myeSo="; 14 + sha256 = "sha256-qjbr3kTgIFdxyzRwSvWyh5krrlzD8i1nMeoLZYSbr6g="; 15 15 }; 16 16 17 17 vendorSha256 = "sha256-qmuua7HXnwuy24CSqHKALqNDmXBvSIXYTVu3kaGVoeU=";
+3 -3
pkgs/tools/security/pwncat/default.nix
··· 5 5 6 6 buildPythonApplication rec { 7 7 pname = "pwncat"; 8 - version = "0.1.0"; 8 + version = "0.1.1"; 9 9 10 10 src = fetchPypi { 11 11 inherit pname version; 12 - sha256 = "0sfdqphs0v3lj3vffda4w05r6sqir7qafa8lmlh0wr921wyiqwag"; 12 + sha256 = "62e625e9061f037cfca7b7455a4f7db4213c1d1302e73d4c475c63f924f1805f"; 13 13 }; 14 14 15 15 # Tests requires to start containers 16 16 doCheck = false; 17 17 18 18 meta = with lib; { 19 - description = " TCP/UDP communication suite"; 19 + description = "TCP/UDP communication suite"; 20 20 homepage = "https://pwncat.org/"; 21 21 license = with licenses; [ mit ]; 22 22 maintainers = with maintainers; [ fab ];
+2 -2
pkgs/tools/security/sshguard/default.nix
··· 1 - { lib, stdenv, fetchurl, autoreconfHook, yacc, flex}: 1 + { lib, stdenv, fetchurl, autoreconfHook, bison, flex}: 2 2 3 3 stdenv.mkDerivation rec { 4 4 version = "2.4.1"; ··· 11 11 12 12 doCheck = true; 13 13 14 - nativeBuildInputs = [ autoreconfHook yacc flex ]; 14 + nativeBuildInputs = [ autoreconfHook bison flex ]; 15 15 16 16 configureFlags = [ "--sysconfdir=/etc" ]; 17 17
+2 -2
pkgs/tools/security/teler/default.nix
··· 5 5 6 6 buildGoModule rec { 7 7 pname = "teler"; 8 - version = "1.2.1"; 8 + version = "1.2.2"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "kitabisa"; 12 12 repo = "teler"; 13 13 rev = "v${version}"; 14 - sha256 = "sha256-lExZWFj0PQFUBJgfhahF8PfYaOndRxKyVHoMlubmEpc="; 14 + sha256 = "sha256-i4106PtoCJt5CY9ahczZYe9GufBkaZS+9Peh0IY9r1M="; 15 15 }; 16 16 17 17 vendorSha256 = "sha256-TQjwPem+RMuoF5T02CL/CTvBS6W7Q786gTvYUFIvxjE=";
+2 -2
pkgs/tools/security/tor/default.nix
··· 1 1 { lib, stdenv, fetchurl, pkg-config, libevent, openssl, zlib, torsocks 2 - , libseccomp, systemd, libcap, lzma, zstd, scrypt, nixosTests 2 + , libseccomp, systemd, libcap, xz, zstd, scrypt, nixosTests 3 3 , writeShellScript 4 4 5 5 # for update.nix ··· 40 40 outputs = [ "out" "geoip" ]; 41 41 42 42 nativeBuildInputs = [ pkg-config ]; 43 - buildInputs = [ libevent openssl zlib lzma zstd scrypt ] ++ 43 + buildInputs = [ libevent openssl zlib xz zstd scrypt ] ++ 44 44 lib.optionals stdenv.isLinux [ libseccomp systemd libcap ]; 45 45 46 46 patches = [ ./disable-monotonic-timer-tests.patch ];
+2
pkgs/tools/security/zsteg/Gemfile
··· 1 + source 'https://rubygems.org' 2 + gem 'zsteg'
+19
pkgs/tools/security/zsteg/Gemfile.lock
··· 1 + GEM 2 + remote: https://rubygems.org/ 3 + specs: 4 + iostruct (0.0.4) 5 + rainbow (3.0.0) 6 + zpng (0.3.1) 7 + rainbow 8 + zsteg (0.2.2) 9 + iostruct 10 + zpng (>= 0.3.1) 11 + 12 + PLATFORMS 13 + ruby 14 + 15 + DEPENDENCIES 16 + zsteg 17 + 18 + BUNDLED WITH 19 + 2.1.4
+16
pkgs/tools/security/zsteg/default.nix
··· 1 + { lib, bundlerApp }: 2 + 3 + bundlerApp { 4 + pname = "zsteg"; 5 + 6 + gemdir = ./.; 7 + 8 + exes = [ "zsteg" ]; 9 + 10 + meta = with lib; { 11 + description = "Detect stegano-hidden data in PNG & BMP."; 12 + homepage = "http://zed.0xff.me/"; 13 + license = licenses.mit; 14 + maintainers = with maintainers; [ applePrincess ]; 15 + }; 16 + }
+44
pkgs/tools/security/zsteg/gemset.nix
··· 1 + { 2 + iostruct = { 3 + groups = ["default"]; 4 + platforms = []; 5 + source = { 6 + remotes = ["https://rubygems.org"]; 7 + sha256 = "0kwp6ryis32j3z7myw8g7v1yszwrwyl04g2c7flr42pwxga1afxc"; 8 + type = "gem"; 9 + }; 10 + version = "0.0.4"; 11 + }; 12 + rainbow = { 13 + groups = ["default"]; 14 + platforms = []; 15 + source = { 16 + remotes = ["https://rubygems.org"]; 17 + sha256 = "0bb2fpjspydr6x0s8pn1pqkzmxszvkfapv0p4627mywl7ky4zkhk"; 18 + type = "gem"; 19 + }; 20 + version = "3.0.0"; 21 + }; 22 + zpng = { 23 + dependencies = ["rainbow"]; 24 + groups = ["default"]; 25 + platforms = []; 26 + source = { 27 + remotes = ["https://rubygems.org"]; 28 + sha256 = "0ciyab7qxqsxjhfvr6rbpdzg655fi1zygqg9sd9m6wmgc037dj74"; 29 + type = "gem"; 30 + }; 31 + version = "0.3.1"; 32 + }; 33 + zsteg = { 34 + dependencies = ["iostruct" "zpng"]; 35 + groups = ["default"]; 36 + platforms = []; 37 + source = { 38 + remotes = ["https://rubygems.org"]; 39 + sha256 = "1mwajlsgs27449n2yf2f9hz8g46qv9bz9f58i9cz1jg58spvpxpk"; 40 + type = "gem"; 41 + }; 42 + version = "0.2.2"; 43 + }; 44 + }
+2 -2
pkgs/tools/system/inxi/default.nix
··· 2 2 , ps, dnsutils # dig is recommended for multiple categories 3 3 , withRecommends ? false # Install (almost) all recommended tools (see --recommends) 4 4 , withRecommendedSystemPrograms ? withRecommends, util-linuxMinimal, dmidecode 5 - , file, hddtemp, iproute, ipmitool, usbutils, kmod, lm_sensors, smartmontools 5 + , file, hddtemp, iproute2, ipmitool, usbutils, kmod, lm_sensors, smartmontools 6 6 , binutils, tree, upower, pciutils 7 7 , withRecommendedDisplayInformationPrograms ? withRecommends, glxinfo, xorg 8 8 }: ··· 11 11 prefixPath = programs: 12 12 "--prefix PATH ':' '${lib.makeBinPath programs}'"; 13 13 recommendedSystemPrograms = lib.optionals withRecommendedSystemPrograms [ 14 - util-linuxMinimal dmidecode file hddtemp iproute ipmitool usbutils kmod 14 + util-linuxMinimal dmidecode file hddtemp iproute2 ipmitool usbutils kmod 15 15 lm_sensors smartmontools binutils tree upower pciutils 16 16 ]; 17 17 recommendedDisplayInformationPrograms = lib.optionals
+25
pkgs/tools/system/nats-top/default.nix
··· 1 + { lib 2 + , buildGoModule 3 + , fetchFromGitHub 4 + }: 5 + 6 + buildGoModule rec { 7 + pname = "nats-top"; 8 + version = "0.4.0"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "nats-io"; 12 + repo = pname; 13 + rev = "v${version}"; 14 + sha256 = "0b1hpnq8m1xfrn58ammmnx6lmhk319m8z4xjxgckz7wvy2fbzw0n"; 15 + }; 16 + 17 + vendorSha256 = "1a48p9gx5zdc340ma6cqakhi6f3lw9b0kz2597j1jcsk2qb7s581"; 18 + 19 + meta = with lib; { 20 + description = "top-like tool for monitoring NATS servers"; 21 + homepage = "https://github.com/nats-io/nats-top"; 22 + license = with licenses; [ mit ]; 23 + maintainers = with maintainers; [ fab ]; 24 + }; 25 + }
+25
pkgs/tools/system/natscli/default.nix
··· 1 + { lib 2 + , buildGoModule 3 + , fetchFromGitHub 4 + }: 5 + 6 + buildGoModule rec { 7 + pname = "natscli"; 8 + version = "0.0.22"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "nats-io"; 12 + repo = pname; 13 + rev = version; 14 + sha256 = "1qc6lpgl878kc316z10x59px6jyfzdwsj7fdr8k4ayln0lplvbq3"; 15 + }; 16 + 17 + vendorSha256 = "1a9d7hqj43qdh0h7pc5wckqshi8lacf6m2107wymzzz62j1msy26"; 18 + 19 + meta = with lib; { 20 + description = "NATS Command Line Interface"; 21 + homepage = "https://github.com/nats-io/natscli"; 22 + license = with licenses; [ asl20 ]; 23 + maintainers = with maintainers; [ fab ]; 24 + }; 25 + }
+25
pkgs/tools/system/nkeys/default.nix
··· 1 + { lib 2 + , buildGoModule 3 + , fetchFromGitHub 4 + }: 5 + 6 + buildGoModule rec { 7 + pname = "nkeys"; 8 + version = "0.3.0"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "nats-io"; 12 + repo = pname; 13 + rev = "v${version}"; 14 + sha256 = "06wbmb3cxjrcfvgfbn6rdfzb4pfaaw11bnvl1r4kig4ag22qcz7b"; 15 + }; 16 + 17 + vendorSha256 = "0kiqlw2411x5c1pamq3mn5wcm8mdn91avwg8xh2a7sy3kqw5d26d"; 18 + 19 + meta = with lib; { 20 + description = "Public-key signature system for NATS"; 21 + homepage = "https://github.com/nats-io/nkeys"; 22 + license = with licenses; [ mit ]; 23 + maintainers = with maintainers; [ fab ]; 24 + }; 25 + }
+2 -2
pkgs/tools/system/syslog-ng-incubator/default.nix
··· 1 1 { lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, glib, syslogng 2 - , eventlog, perl, python, yacc, protobufc, libivykis, libcap, czmq 2 + , eventlog, perl, python, bison, protobufc, libivykis, libcap, czmq 3 3 }: 4 4 5 5 stdenv.mkDerivation rec { ··· 13 13 sha256 = "17y85cqcyfbp882gaii731cvz5bg1s8rgda271jh6kgnrz5rbd4s"; 14 14 }; 15 15 16 - nativeBuildInputs = [ pkg-config autoreconfHook yacc ]; 16 + nativeBuildInputs = [ pkg-config autoreconfHook bison ]; 17 17 18 18 buildInputs = [ 19 19 glib syslogng eventlog perl python protobufc libivykis libcap czmq
+2 -2
pkgs/tools/system/thermald/default.nix
··· 10 10 , libevdev 11 11 , libtool 12 12 , libxml2 13 - , lzma 13 + , xz 14 14 , pkg-config 15 15 , lib, stdenv 16 16 , upower ··· 45 45 dbus-glib 46 46 libevdev 47 47 libxml2 48 - lzma 48 + xz 49 49 upower 50 50 ]; 51 51
+2 -2
pkgs/tools/system/vboot_reference/default.nix
··· 1 - { lib, stdenv, fetchFromGitiles, pkg-config, libuuid, openssl, libyaml, lzma }: 1 + { lib, stdenv, fetchFromGitiles, pkg-config, libuuid, openssl, libyaml, xz }: 2 2 3 3 stdenv.mkDerivation rec { 4 4 version = "20180311"; ··· 13 13 }; 14 14 15 15 nativeBuildInputs = [ pkg-config ]; 16 - buildInputs = [ openssl libuuid libyaml lzma ]; 16 + buildInputs = [ openssl libuuid libyaml xz ]; 17 17 18 18 enableParallelBuilding = true; 19 19
+10
pkgs/tools/text/gpt2tc/0001-add-python-shebang.patch
··· 1 + diff --git a/gpt2convert.py b/gpt2convert.py 2 + index 34ca909..6e6cac5 100644 3 + --- a/gpt2convert.py 4 + +++ b/gpt2convert.py 5 + @@ -1,3 +1,5 @@ 6 + +#!/usr/bin/env python3 7 + + 8 + import sys 9 + import tensorflow as tf 10 + import numpy as np
+11
pkgs/tools/text/gpt2tc/0002-fix-download-url.patch
··· 1 + diff --git a/download_model.sh b/download_model.sh 2 + index 9cb401f..ad1dc62 100755 3 + --- a/download_model.sh 4 + +++ b/download_model.sh 5 + @@ -13,5 +13,5 @@ mkdir -p models/$model 6 + for filename in checkpoint encoder.json hparams.json model.ckpt.data-00000-of-00001 model.ckpt.index model.ckpt.meta vocab.bpe; do 7 + fetch=$model/$filename 8 + echo "Fetching $fetch" 9 + - curl --output models/$fetch https://storage.googleapis.com/gpt-2/models/$fetch 10 + + curl --output models/$fetch https://openaipublic.blob.core.windows.net/gpt-2/models/$fetch 11 + done
+47
pkgs/tools/text/gpt2tc/default.nix
··· 1 + { lib, stdenv, fetchurl, autoPatchelfHook, python3 }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "gpt2tc"; 5 + version = "2020-12-30"; 6 + 7 + src = fetchurl { 8 + url = "https://bellard.org/nncp/gpt2tc-${version}.tar.gz"; 9 + hash = "sha256-KFcl7E6iGx50JaJI1jwzKAdkrkbNngPbrEA/ZSyG+uY="; 10 + }; 11 + 12 + patches = [ 13 + # Add a shebang to the python script so that nix detects it as such and 14 + # wraps it properly. Otherwise, it runs in shell and freezes the system. 15 + ./0001-add-python-shebang.patch 16 + 17 + # Update the source URL for the models because the old one is down. 18 + ./0002-fix-download-url.patch 19 + ]; 20 + 21 + nativeBuildInputs = [ autoPatchelfHook ]; 22 + 23 + buildInputs = [ 24 + (python3.withPackages (p: with p; [ numpy tensorflow ])) 25 + ]; 26 + 27 + dontBuild = true; 28 + 29 + installPhase = '' 30 + runHook preInstall 31 + 32 + install -D -m755 -t $out/bin gpt2tc 33 + install -T -m755 download_model.sh $out/bin/gpt2-download-model 34 + install -T -m755 gpt2convert.py $out/bin/gpt2-convert 35 + install -D -m644 -t $out/share/gpt2tc readme.txt gpt2vocab.txt Changelog 36 + 37 + runHook postInstall 38 + ''; 39 + 40 + meta = with lib; { 41 + description = "Text completion and compression using GPT-2"; 42 + homepage = "https://bellard.org/nncp/gpt2tc.html"; 43 + license = licenses.unfree; 44 + platforms = [ "x86_64-linux" ]; 45 + maintainers = with maintainers; [ anna328p ]; 46 + }; 47 + }
+2 -2
pkgs/tools/text/html-tidy/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "html-tidy"; 5 - version = "5.6.0"; 5 + version = "5.7.28"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "htacg"; 9 9 repo = "tidy-html5"; 10 10 rev = version; 11 - sha256 = "0w175c5d1babq0w1zzdzw9gl6iqbgyq58v8587s7srp05y3hwy9k"; 11 + sha256 = "sha256-Tny53PtaQWAMAEjqw4tKnmGURfZhhwFQNCJr9jjWZQY="; 12 12 }; 13 13 14 14 nativeBuildInputs = [ cmake libxslt/*manpage*/ ];
+2 -2
pkgs/tools/text/silver-searcher/default.nix
··· 1 - {lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, pcre, zlib, lzma}: 1 + {lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, pcre, zlib, xz}: 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "silver-searcher"; ··· 16 16 NIX_LDFLAGS = lib.optionalString stdenv.isLinux "-lgcc_s"; 17 17 18 18 nativeBuildInputs = [ autoreconfHook pkg-config ]; 19 - buildInputs = [ pcre zlib lzma ]; 19 + buildInputs = [ pcre zlib xz ]; 20 20 21 21 meta = with lib; { 22 22 homepage = "https://github.com/ggreer/the_silver_searcher/";
+2 -2
pkgs/tools/text/zimwriterfs/default.nix
··· 9 9 , file 10 10 , icu 11 11 , gumbo 12 - , lzma 12 + , xz 13 13 , xapian 14 14 , zimlib 15 15 , zlib ··· 27 27 }; 28 28 29 29 nativeBuildInputs = [ automake autoconf libtool pkg-config ]; 30 - buildInputs = [ file icu gumbo lzma zimlib zlib xapian ]; 30 + buildInputs = [ file icu gumbo xz zimlib zlib xapian ]; 31 31 setSourceRoot = '' 32 32 sourceRoot=$(echo */zimwriterfs) 33 33 '';
+27
pkgs/tools/typesetting/tex/tex-match/default.nix
··· 1 + { rustPlatform, fetchFromGitHub, gtk3, pkg-config, glib, lib }: 2 + 3 + rustPlatform.buildRustPackage rec { 4 + pname = "tex-match"; 5 + version = "1.2.0"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "zoeyfyi"; 9 + repo = "TeX-Match"; 10 + rev = "v${version}"; 11 + sha256 = "1yb81j7mbqqb8jcn78dx4ydp7ncbzvaczkli6cqay5jf5j6dbk1z"; 12 + }; 13 + 14 + nativeBuildInputs = [ pkg-config glib ]; 15 + 16 + buildInputs = [ gtk3 ]; 17 + 18 + cargoSha256 = "1sm2fd3dhs59rvmfjzrfz0qwqzyc9dllb8ph0wc2x0r3px16c71x"; 19 + 20 + meta = with lib; { 21 + description = "Search through over 1000 different LaTeX symbols by sketching. A desktop version of detexify"; 22 + homepage = "https://tex-match.zoey.fyi/"; 23 + license = licenses.mit; 24 + maintainers = [ maintainers.bootstrap-prime ]; 25 + platforms = platforms.linux; 26 + }; 27 + }
+3 -4
pkgs/tools/virtualization/google-compute-engine/default.nix
··· 1 1 { lib 2 2 , fetchFromGitHub 3 - , buildPythonApplication 3 + , buildPythonPackage 4 4 , bash 5 5 , bashInteractive 6 6 , systemd ··· 10 10 , distro 11 11 }: 12 12 13 - buildPythonApplication rec { 13 + buildPythonPackage rec { 14 14 pname = "google-compute-engine"; 15 15 version = "20190124"; 16 - namePrefix = ""; 17 16 18 17 src = fetchFromGitHub { 19 18 owner = "GoogleCloudPlatform"; ··· 24 23 25 24 buildInputs = [ bash ]; 26 25 propagatedBuildInputs = [ boto setuptools distro ]; 27 - 28 26 29 27 postPatch = '' 30 28 for file in $(find google_compute_engine -type f); do ··· 54 52 ''; 55 53 56 54 doCheck = false; 55 + pythonImportsCheck = [ "google_compute_engine" ]; 57 56 58 57 meta = with lib; { 59 58 description = "Google Compute Engine tools and services";
+9
pkgs/top-level/aliases.nix
··· 269 269 gnustep-make = gnustep.make; # added 2016-7-6 270 270 gnupg20 = throw "gnupg20 has been removed from nixpkgs as upstream dropped support on 2017-12-31";# added 2020-07-12 271 271 gnuvd = throw "gnuvd was removed because the backend service is missing"; # added 2020-01-14 272 + gmock = gtest; # moved from top-level 2021-03-14 272 273 go_1_12 = throw "go_1_12 has been removed"; # added 2020-04-26 273 274 go-pup = pup; # added 2017-12-19 274 275 gobby5 = gobby; # added 2021-02-01 ··· 310 311 infiniband-diags = rdma-core; # added 2019-08-09 311 312 inotifyTools = inotify-tools; 312 313 inter-ui = inter; # added 2021-03-27 314 + iproute = iproute2; # moved from top-level 2021-03-14 313 315 i-score = throw "i-score has been removed: abandoned upstream."; # added 2020-11-21 316 + jack2Full = jack2; # moved from top-level 2021-03-14 314 317 jamomacore = throw "jamomacore has been removed: abandoned upstream."; # added 2020-11-21 315 318 jbidwatcher = throw "jbidwatcher was discontinued in march 2021"; # added 2021-03-15 316 319 jbuilder = dune_1; # added 2018-09-09 ··· 335 338 kicad-with-packages3d = kicad; # added 2019-11-25 336 339 kindlegen = throw "kindlegen has been removed from nixpkgs, as it's abandoned and no longer available for download."; # 2021-03-09 337 340 krename-qt5 = krename; # added 2017-02-18 341 + kerberos = libkrb5; # moved from top-level 2021-03-14 338 342 keymon = throw "keymon has been removed from nixpkgs, as it's abandoned and archived."; # 2019-12-10 339 343 kvm = qemu_kvm; # added 2018-04-25 340 344 latinmodern-math = lmmath; ··· 395 399 lua5_expat = luaPackages.luaexpat; # added 2017-05-02 396 400 lua5_sec = luaPackages.luasec; # added 2017-05-02 397 401 lxappearance-gtk3 = throw "lxappearance-gtk3 has been removed. Use lxappearance instead, which now defaults to Gtk3"; # added 2020-06-03 402 + lzma = xz; # moved from top-level 2021-03-14 398 403 m3d-linux = m33-linux; # added 2016-08-13 399 404 man_db = man-db; # added 2016-05 400 405 manpages = man-pages; # added 2015-12-06 401 406 marathon = throw "marathon has been removed from nixpkgs, as it's unmaintained"; # added 2020-08-15 407 + mysql = mariadb; # moved from top-level 2021-03-14 402 408 mariadb-client = hiPrio mariadb.client; #added 2019.07.28 403 409 matcha = throw "matcha was renamed to matcha-gtk-theme"; # added 2020-05-09 404 410 mathics = throw "mathics has been removed from nixpkgs, as it's unmaintained"; # added 2020-08-15 ··· 825 831 xlibs = xorg; # added 2015-09 826 832 xpraGtk3 = xpra; # added 2018-09-13 827 833 xv = xxv; # added 2020-02-22 834 + yacc = bison; # moved from top-level 2021-03-14 828 835 youtubeDL = youtube-dl; # added 2014-10-26 829 836 ytop = throw "ytop has been abandoned by upstream. Consider switching to bottom instead"; 830 837 yubikey-neo-manager = throw "yubikey-neo-manager has been removed because it was broken. Use yubikey-manager-qt instead."; # added 2021-03-08 831 838 yuzu = yuzu-mainline; # added 2021-01-25 832 839 zimreader = throw "zimreader has been removed from nixpkgs as it has been replaced by kiwix-serve and stopped working with modern zimlib versions."; # added 2021-03-28 833 840 zdfmediathk = mediathekview; # added 2019-01-19 841 + 834 842 gnome_user_docs = gnome-user-docs; # added 2019-11-20 835 843 # spidermonkey is not ABI upwards-ompatible, so only allow this for nix-shell 836 844 spidermonkey = spidermonkey_78; # added 2020-10-09 ··· 983 991 plasma-vault 984 992 plasma-workspace plasma-workspace-wallpapers 985 993 polkit-kde-agent powerdevil 994 + qqc2-breeze-style 986 995 sddm-kcm systemsettings 987 996 xdg-desktop-portal-kde 988 997 ;
+68 -17
pkgs/top-level/all-packages.nix
··· 2487 2487 2488 2488 go-chromecast = callPackage ../applications/video/go-chromecast { }; 2489 2489 2490 + go-containerregistry = callPackage ../development/tools/go-containerregistry { }; 2491 + 2490 2492 go-rice = callPackage ../tools/misc/go.rice {}; 2491 2493 2492 2494 go-2fa = callPackage ../tools/security/2fa {}; ··· 2568 2570 2569 2571 gringo = callPackage ../tools/misc/gringo { }; 2570 2572 2573 + grit = callPackage ../tools/misc/grit { }; 2574 + 2571 2575 grobi = callPackage ../tools/X11/grobi { }; 2572 2576 2573 2577 gscan2pdf = callPackage ../applications/graphics/gscan2pdf { }; ··· 2629 2633 jellyfin-mpv-shim = python3Packages.callPackage ../applications/video/jellyfin-mpv-shim { }; 2630 2634 2631 2635 jotta-cli = callPackage ../applications/misc/jotta-cli { }; 2636 + 2637 + joycond = callPackage ../os-specific/linux/joycond { }; 2632 2638 2633 2639 jwt-cli = callPackage ../tools/security/jwt-cli { 2634 2640 inherit (darwin.apple_sdk.frameworks) Security; ··· 4085 4091 4086 4092 wrangler = callPackage ../development/tools/wrangler { 4087 4093 inherit (darwin.apple_sdk.frameworks) CoreFoundation CoreServices Security; 4088 - inherit (darwin) libiconv; 4089 4094 }; 4090 4095 4091 4096 wsl-open = callPackage ../tools/misc/wsl-open { }; ··· 4174 4179 embree2 = callPackage ../development/libraries/embree/2.x.nix { }; 4175 4180 4176 4181 emem = callPackage ../applications/misc/emem { }; 4182 + 4183 + empty = callPackage ../tools/misc/empty { }; 4177 4184 4178 4185 emulsion = callPackage ../applications/graphics/emulsion { 4179 4186 inherit (darwin.apple_sdk.frameworks) AppKit CoreGraphics CoreServices Foundation OpenGL; ··· 5051 5058 gpart = callPackage ../tools/filesystems/gpart { }; 5052 5059 5053 5060 gparted = callPackage ../tools/misc/gparted { }; 5061 + 5062 + gpt2tc = callPackage ../tools/text/gpt2tc { }; 5054 5063 5055 5064 ldmtool = callPackage ../tools/misc/ldmtool { }; 5056 5065 ··· 5178 5187 gt5 = callPackage ../tools/system/gt5 { }; 5179 5188 5180 5189 gtest = callPackage ../development/libraries/gtest { }; 5181 - gmock = gtest; # TODO: move to aliases.nix 5182 5190 5183 5191 gbenchmark = callPackage ../development/libraries/gbenchmark {}; 5184 5192 ··· 6046 6054 pythonPackages = python3Packages; 6047 6055 }; 6048 6056 6057 + nats-top = callPackage ../tools/system/nats-top { }; 6058 + 6059 + natscli = callPackage ../tools/system/natscli { }; 6060 + 6049 6061 nbench = callPackage ../tools/misc/nbench { }; 6050 6062 6051 6063 ncrack = callPackage ../tools/security/ncrack { }; ··· 6063 6075 6064 6076 netsniff-ng = callPackage ../tools/networking/netsniff-ng { }; 6065 6077 6078 + nkeys = callPackage ../tools/system/nkeys { }; 6079 + 6066 6080 nyxt = callPackage ../applications/networking/browsers/nyxt { }; 6067 6081 6068 6082 nfpm = callPackage ../tools/package-management/nfpm { }; ··· 6348 6362 luxcorerender = callPackage ../tools/graphics/luxcorerender { }; 6349 6363 6350 6364 xz = callPackage ../tools/compression/xz { }; 6351 - lzma = xz; # TODO: move to aliases.nix 6352 6365 6353 6366 lz4 = callPackage ../tools/compression/lz4 { }; 6354 6367 ··· 7671 7684 7672 7685 qjoypad = callPackage ../tools/misc/qjoypad { }; 7673 7686 7687 + qmk = callPackage ../tools/misc/qmk { }; 7688 + 7674 7689 qosmic = libsForQt5.callPackage ../applications/graphics/qosmic { }; 7675 7690 7676 7691 qownnotes = libsForQt514.callPackage ../applications/office/qownnotes { }; ··· 8410 8425 8411 8426 super = callPackage ../tools/security/super { }; 8412 8427 8428 + supertag = callPackage ../tools/filesystems/supertag { }; 8429 + 8413 8430 supertux-editor = callPackage ../applications/editors/supertux-editor { }; 8414 8431 8415 8432 svgbob = callPackage ../tools/graphics/svgbob { }; ··· 8620 8637 textadept11 = callPackage ../applications/editors/textadept/11 { }; 8621 8638 8622 8639 texworks = libsForQt5.callPackage ../applications/editors/texworks { }; 8640 + 8641 + tex-match = callPackage ../tools/typesetting/tex/tex-match { }; 8623 8642 8624 8643 thc-hydra = callPackage ../tools/security/thc-hydra { }; 8625 8644 ··· 9642 9661 zsh-autopair = callPackage ../shells/zsh/zsh-autopair { }; 9643 9662 9644 9663 zsh-bd = callPackage ../shells/zsh/zsh-bd { }; 9664 + 9665 + zsh-clipboard = callPackage ../shells/zsh/zsh-clipboard { }; 9645 9666 9646 9667 zsh-git-prompt = callPackage ../shells/zsh/zsh-git-prompt { }; 9647 9668 ··· 12260 12281 }); 12261 12282 12262 12283 bison = callPackage ../development/tools/parsing/bison { }; 12263 - yacc = bison; # TODO: move to aliases.nix 12264 12284 12265 12285 # Ruby fails to build with current bison 12266 12286 bison_3_5 = pkgs.bison.overrideAttrs (oldAttrs: rec { ··· 13085 13105 }; 13086 13106 })); 13087 13107 13108 + polar = callPackage ../tools/misc/polar { }; 13109 + 13088 13110 inherit (nodePackages) postcss-cli; 13089 13111 13090 13112 postiats-utilities = callPackage ../development/tools/postiats-utilities {}; ··· 13919 13941 cypress = callPackage ../development/web/cypress { }; 13920 13942 13921 13943 cyrus_sasl = callPackage ../development/libraries/cyrus-sasl { 13922 - kerberos = if stdenv.isFreeBSD then libheimdal else kerberos; 13944 + libkrb5 = if stdenv.isFreeBSD then libheimdal else libkrb5; 13923 13945 }; 13924 13946 13925 13947 # Make bdb5 the default as it is the last release under the custom ··· 14887 14909 iso-flags = callPackage ../data/icons/iso-flags { }; 14888 14910 14889 14911 ispc = callPackage ../development/compilers/ispc { 14890 - stdenv = llvmPackages_10.stdenv; 14891 - llvmPackages = llvmPackages_10; 14912 + stdenv = llvmPackages_11.stdenv; 14913 + llvmPackages = llvmPackages_11; 14892 14914 }; 14893 14915 14894 14916 isso = callPackage ../servers/isso { }; ··· 14959 14981 }; 14960 14982 krb5Full = krb5; 14961 14983 libkrb5 = krb5.override { type = "lib"; }; 14962 - kerberos = libkrb5; # TODO: move to aliases.nix 14963 14984 14964 14985 l-smash = callPackage ../development/libraries/l-smash { 14965 14986 stdenv = gccStdenv; ··· 15255 15276 15256 15277 libdmtx = callPackage ../development/libraries/libdmtx { }; 15257 15278 15279 + libdmapsharing = callPackage ../development/libraries/libdmapsharing { }; 15280 + 15258 15281 libdnet = callPackage ../development/libraries/libdnet { }; 15259 15282 15260 15283 libdnf = callPackage ../tools/package-management/libdnf { }; ··· 15872 15895 libpcap = callPackage ../development/libraries/libpcap { }; 15873 15896 15874 15897 libpeas = callPackage ../development/libraries/libpeas { }; 15898 + 15899 + libpg_query = callPackage ../development/libraries/libpg_query { }; 15875 15900 15876 15901 libpipeline = callPackage ../development/libraries/libpipeline { }; 15877 15902 ··· 16741 16766 pkcs11helper = callPackage ../development/libraries/pkcs11helper { }; 16742 16767 16743 16768 pkgdiff = callPackage ../tools/misc/pkgdiff { }; 16769 + 16770 + place-cursor-at = haskell.lib.justStaticExecutables haskellPackages.place-cursor-at; 16744 16771 16745 16772 plib = callPackage ../development/libraries/plib { }; 16746 16773 ··· 18123 18150 18124 18151 ### SERVERS 18125 18152 18126 - _389-ds-base = callPackage ../servers/ldap/389 { 18127 - kerberos = libkrb5; 18128 - }; 18153 + _389-ds-base = callPackage ../servers/ldap/389 { }; 18129 18154 18130 18155 adguardhome = callPackage ../servers/adguardhome {}; 18131 18156 ··· 18707 18732 inherit (darwin) cctools; 18708 18733 inherit (pkgs.darwin.apple_sdk.frameworks) CoreServices; 18709 18734 }; 18710 - mysql = mariadb; # TODO: move to aliases.nix 18711 18735 18712 18736 mongodb = hiPrio mongodb-3_4; 18713 18737 ··· 18867 18891 prometheus-aws-s3-exporter = callPackage ../servers/monitoring/prometheus/aws-s3-exporter.nix { }; 18868 18892 prometheus-bind-exporter = callPackage ../servers/monitoring/prometheus/bind-exporter.nix { }; 18869 18893 prometheus-bird-exporter = callPackage ../servers/monitoring/prometheus/bird-exporter.nix { }; 18894 + prometheus-bitcoin-exporter = callPackage ../servers/monitoring/prometheus/bitcoin-exporter.nix { }; 18870 18895 prometheus-blackbox-exporter = callPackage ../servers/monitoring/prometheus/blackbox-exporter.nix { }; 18871 18896 prometheus-collectd-exporter = callPackage ../servers/monitoring/prometheus/collectd-exporter.nix { }; 18872 18897 prometheus-consul-exporter = callPackage ../servers/monitoring/prometheus/consul-exporter.nix { }; ··· 19237 19262 19238 19263 alsaPluginWrapper = callPackage ../os-specific/linux/alsa-plugins/wrapper.nix { }; 19239 19264 19240 - alsaUtils = callPackage ../os-specific/linux/alsa-utils { }; 19265 + alsaUtils = callPackage ../os-specific/linux/alsa-utils { 19266 + fftw = fftwFloat; 19267 + }; 19241 19268 alsaOss = callPackage ../os-specific/linux/alsa-oss { }; 19242 19269 alsaTools = callPackage ../os-specific/linux/alsa-tools { }; 19243 19270 ··· 19506 19533 iotop = callPackage ../os-specific/linux/iotop { }; 19507 19534 19508 19535 iproute2 = callPackage ../os-specific/linux/iproute { }; 19509 - iproute = iproute2; # Alias added 2020-11-15 (TODO: deprecate and move to pkgs/top-level/aliases.nix) 19510 19536 19511 19537 iproute_mptcp = callPackage ../os-specific/linux/iproute/mptcp.nix { }; 19512 19538 ··· 21389 21415 21390 21416 shades-of-gray-theme = callPackage ../data/themes/shades-of-gray { }; 21391 21417 21418 + sjasmplus = callPackage ../development/compilers/sjasmplus { }; 21419 + 21392 21420 skeu = callPackage ../data/themes/skeu { }; 21393 21421 21394 21422 sweet = callPackage ../data/themes/sweet { }; ··· 23088 23116 jdk = callPackage ../development/compilers/jetbrains-jdk { }; 23089 23117 }); 23090 23118 23119 + jmusicbot = callPackage ../applications/audio/jmusicbot { }; 23120 + 23091 23121 libquvi = callPackage ../applications/video/quvi/library.nix { }; 23092 23122 23093 23123 librespot = callPackage ../applications/audio/librespot { ··· 23441 23471 swaybg = callPackage ../applications/window-managers/sway/bg.nix { }; 23442 23472 swayidle = callPackage ../applications/window-managers/sway/idle.nix { }; 23443 23473 swaylock = callPackage ../applications/window-managers/sway/lock.nix { }; 23474 + swaywsr = callPackage ../applications/window-managers/sway/wsr.nix { }; 23444 23475 sway-contrib = recurseIntoAttrs (callPackages ../applications/window-managers/sway/contrib.nix { }); 23445 23476 23446 23477 swaylock-fancy = callPackage ../applications/window-managers/sway/lock-fancy.nix { }; ··· 23513 23544 23514 23545 i3status-rust = callPackage ../applications/window-managers/i3/status-rust.nix { }; 23515 23546 23547 + i3wsr = callPackage ../applications/window-managers/i3/wsr.nix { }; 23548 + 23516 23549 i3-wk-switch = callPackage ../applications/window-managers/i3/wk-switch.nix { }; 23517 23550 23518 23551 waybox = callPackage ../applications/window-managers/waybox { }; ··· 24183 24216 melonDS = libsForQt5.callPackage ../misc/emulators/melonDS { }; 24184 24217 24185 24218 meme = callPackage ../applications/graphics/meme { }; 24219 + 24220 + meme-suite = callPackage ../applications/science/biology/meme-suite { }; 24186 24221 24187 24222 # Needs qtwebkit which is broken on qt5.15 24188 24223 mendeley = libsForQt514.callPackage ../applications/office/mendeley { ··· 26938 26973 26939 26974 zscroll = callPackage ../applications/misc/zscroll {}; 26940 26975 26976 + zsteg = callPackage ../tools/security/zsteg { }; 26977 + 26941 26978 zynaddsubfx = zyn-fusion; 26942 26979 26943 26980 zynaddsubfx-fltk = callPackage ../applications/audio/zynaddsubfx { ··· 28017 28054 28018 28055 warsow = callPackage ../games/warsow { }; 28019 28056 28020 - warzone2100 = libsForQt5.callPackage ../games/warzone2100 { }; 28057 + warzone2100 = callPackage ../games/warzone2100 { }; 28021 28058 28022 28059 wesnoth = callPackage ../games/wesnoth { 28023 28060 inherit (darwin.apple_sdk.frameworks) Cocoa Foundation; ··· 28247 28284 molden = callPackage ../applications/science/chemistry/molden { }; 28248 28285 28249 28286 octopus = callPackage ../applications/science/chemistry/octopus { }; 28287 + 28288 + openlp = libsForQt5.callPackage ../applications/misc/openlp { }; 28289 + openlpFull = appendToName "full" (openlp.override { 28290 + pdfSupport = true; 28291 + presentationSupport = true; 28292 + vlcSupport = true; 28293 + gstreamerSupport = true; 28294 + }); 28250 28295 28251 28296 openmolcas = callPackage ../applications/science/chemistry/openmolcas { }; 28252 28297 ··· 29509 29554 inherit (darwin.apple_sdk.frameworks) AudioUnit CoreAudio Accelerate; 29510 29555 inherit (darwin) libobjc; 29511 29556 }; 29557 + 29512 29558 libjack2 = jack2.override { prefix = "lib"; }; 29513 - jack2Full = jack2; # TODO: move to aliases.nix 29514 29559 29515 29560 j2cli = with python3Packages; toPythonApplication j2cli; 29516 29561 ··· 29844 29889 mnemonicode = callPackage ../misc/mnemonicode { }; 29845 29890 29846 29891 mysql-workbench = callPackage ../applications/misc/mysql-workbench (let mysql = mysql57; in { 29847 - gdal = gdal.override {libmysqlclient = mysql // {lib = {dev = mysql;};};}; 29892 + gdal = gdal.override { 29893 + libmysqlclient = mysql // { 29894 + lib = { dev = mysql; } 29895 + ;} 29896 + ;}; 29848 29897 mysql = mysql; 29849 29898 pcre = pcre-cpp; 29850 29899 jre = jre8; # TODO: remove override https://github.com/NixOS/nixpkgs/pull/89731 ··· 30575 30624 openfst = callPackage ../development/libraries/openfst {}; 30576 30625 30577 30626 opengrm-ngram = callPackage ../development/libraries/opengrm-ngram {}; 30627 + 30628 + openring = callPackage ../applications/misc/openring { }; 30578 30629 30579 30630 phonetisaurus = callPackage ../development/libraries/phonetisaurus {}; 30580 30631
+1 -1
pkgs/top-level/lua-packages.nix
··· 8 8 { fetchurl, stdenv, lua, unzip, pkg-config 9 9 , pcre, oniguruma, gnulib, tre, glibc, sqlite, openssl, expat 10 10 , autoreconfHook, gnum4 11 - , mysql, postgresql, cyrus_sasl 11 + , postgresql, cyrus_sasl 12 12 , fetchFromGitHub, which, writeText 13 13 , pkgs 14 14 , lib
+2
pkgs/top-level/ocaml-packages.nix
··· 930 930 931 931 parse-argv = callPackage ../development/ocaml-modules/parse-argv { }; 932 932 933 + pbkdf = callPackage ../development/ocaml-modules/pbkdf { }; 934 + 933 935 pcap-format = callPackage ../development/ocaml-modules/pcap-format { }; 934 936 935 937 pecu = callPackage ../development/ocaml-modules/pecu { };
+5 -8
pkgs/top-level/perl-packages.nix
··· 15114 15114 15115 15115 NetCIDRLite = buildPerlPackage { 15116 15116 pname = "Net-CIDR-Lite"; 15117 - version = "0.21"; 15117 + version = "0.22"; 15118 15118 src = fetchurl { 15119 - url = "mirror://cpan/authors/id/D/DO/DOUGW/Net-CIDR-Lite-0.21.tar.gz"; 15120 - sha256 = "cfa125e8a2aef9259bc3a44e07cbdfb7894b64d22e7c0cee92aee2f5c7915093"; 15119 + url = "mirror://cpan/authors/id/S/ST/STIGTSP/Net-CIDR-Lite-0.22.tar.gz"; 15120 + sha256 = "05w57db2lx4djb4vixzdr6qgrzyzkk047nl812g7nq8s6k5xh5s3"; 15121 15121 }; 15122 - patches = [ 15123 - # Fix for security issue: prevent leading zeroes in ipv4 octets 15124 - # https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/ 15125 - ../development/perl-modules/Net-CIDR-Lite-prevent-leading-zeroes-ipv4.patch 15126 - ]; 15127 15122 meta = { 15128 15123 description = "Perl extension for merging IPv4 or IPv6 CIDR addresses"; 15124 + license = with lib.licenses; [ artistic1 gpl1Plus ]; 15125 + maintainers = [ maintainers.sgo ]; 15129 15126 }; 15130 15127 }; 15131 15128
+7 -4
pkgs/top-level/python-packages.nix
··· 1489 1489 1490 1490 conda = callPackage ../development/python-modules/conda { }; 1491 1491 1492 - ConfigArgParse = callPackage ../development/python-modules/configargparse { }; 1492 + ConfigArgParse = self.configargparse; # added 2021-03-18 1493 + configargparse = callPackage ../development/python-modules/configargparse { }; 1493 1494 1494 1495 configobj = callPackage ../development/python-modules/configobj { }; 1495 1496 ··· 2033 2034 doctest-ignore-unicode = callPackage ../development/python-modules/doctest-ignore-unicode { }; 2034 2035 2035 2036 docutils = callPackage ../development/python-modules/docutils { }; 2037 + 2038 + docx2python = callPackage ../development/python-modules/docx2python { }; 2036 2039 2037 2040 dodgy = callPackage ../development/python-modules/dodgy { }; 2038 2041 ··· 3662 3665 3663 3666 keras-preprocessing = callPackage ../development/python-modules/keras-preprocessing { }; 3664 3667 3665 - kerberos = callPackage ../development/python-modules/kerberos { 3666 - inherit (pkgs) kerberos; 3667 - }; 3668 + kerberos = callPackage ../development/python-modules/kerberos { }; 3668 3669 3669 3670 keyring = if isPy3k then 3670 3671 callPackage ../development/python-modules/keyring { } ··· 7293 7294 rig = callPackage ../development/python-modules/rig { }; 7294 7295 7295 7296 ring-doorbell = callPackage ../development/python-modules/ring-doorbell { }; 7297 + 7298 + riprova = callPackage ../development/python-modules/riprova { }; 7296 7299 7297 7300 ripser = callPackage ../development/python-modules/ripser { }; 7298 7301
+1 -1
pkgs/top-level/release-small.nix
··· 93 93 ltrace = linux; 94 94 lvm2 = linux; 95 95 lynx = linux; 96 - lzma = linux; 96 + xz = linux; 97 97 man = linux; 98 98 man-pages = linux; 99 99 mc = all;