Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
de136681 dcfd9788

+179 -98
+5 -2
pkgs/applications/audio/scream/default.nix
··· 1 { stdenv, lib, config, fetchFromGitHub, cmake, pkg-config 2 , alsaSupport ? stdenv.isLinux, alsa-lib 3 , pulseSupport ? config.pulseaudio or stdenv.isLinux, libpulseaudio 4 }: 5 6 stdenv.mkDerivation rec { 7 pname = "scream"; 8 - version = "3.6"; 9 10 src = fetchFromGitHub { 11 owner = "duncanthrax"; 12 repo = pname; 13 rev = version; 14 - sha256 = "01k2zhfb781gfj3apmcjqbm5m05m6pvnh7fb5k81zwvqibai000v"; 15 }; 16 17 buildInputs = lib.optional pulseSupport libpulseaudio 18 ++ lib.optional alsaSupport alsa-lib; 19 nativeBuildInputs = [ cmake pkg-config ]; 20 21 cmakeFlags = [ 22 "-DPULSEAUDIO_ENABLE=${if pulseSupport then "ON" else "OFF"}" 23 "-DALSA_ENABLE=${if alsaSupport then "ON" else "OFF"}" 24 ]; 25 26 cmakeDir = "../Receivers/unix";
··· 1 { stdenv, lib, config, fetchFromGitHub, cmake, pkg-config 2 , alsaSupport ? stdenv.isLinux, alsa-lib 3 , pulseSupport ? config.pulseaudio or stdenv.isLinux, libpulseaudio 4 + , jackSupport ? false, libjack2 5 }: 6 7 stdenv.mkDerivation rec { 8 pname = "scream"; 9 + version = "3.7"; 10 11 src = fetchFromGitHub { 12 owner = "duncanthrax"; 13 repo = pname; 14 rev = version; 15 + sha256 = "0d9abrw62cd08lcg4il415b7ap89iggbljvbl5jqv2y23il0pvyz"; 16 }; 17 18 buildInputs = lib.optional pulseSupport libpulseaudio 19 + ++ lib.optional jackSupport libjack2 20 ++ lib.optional alsaSupport alsa-lib; 21 nativeBuildInputs = [ cmake pkg-config ]; 22 23 cmakeFlags = [ 24 "-DPULSEAUDIO_ENABLE=${if pulseSupport then "ON" else "OFF"}" 25 "-DALSA_ENABLE=${if alsaSupport then "ON" else "OFF"}" 26 + "-DJACK_ENABLE=${if jackSupport then "ON" else "OFF"}" 27 ]; 28 29 cmakeDir = "../Receivers/unix";
+41
pkgs/applications/backup/restique/default.nix
···
··· 1 + { lib 2 + , mkDerivation 3 + , fetchFromGitea 4 + , cmake 5 + , libsecret 6 + , qtkeychain 7 + , restic 8 + }: 9 + 10 + mkDerivation rec { 11 + pname = "restique"; 12 + version = "unstable-2021-05-03"; 13 + 14 + src = fetchFromGitea { 15 + domain = "git.srcbox.net"; 16 + owner = "stefan"; 17 + repo = "restique"; 18 + rev = "f83ea63c2e2f2a41e845f54c7fe2c391a528a121"; 19 + sha256 = "0j1qihv7hd90xkfm4ksv74q6m7cq781fbdnc3l4spcd7h2p8lh0z"; 20 + }; 21 + 22 + nativeBuildInputs = [ 23 + cmake 24 + ]; 25 + 26 + buildInputs = [ 27 + libsecret 28 + qtkeychain 29 + ]; 30 + 31 + qtWrapperArgs = [ 32 + "--prefix" "PATH" ":" (lib.makeBinPath [ restic ]) 33 + ]; 34 + 35 + meta = with lib; { 36 + description = "Restic GUI for Desktop/Laptop Backups"; 37 + homepage = "https://git.srcbox.net/stefan/restique"; 38 + license = with licenses; [ gpl3Plus cc-by-sa-40 cc0 ]; 39 + maintainers = with maintainers; [ dotlambda ]; 40 + }; 41 + }
+2 -2
pkgs/applications/graphics/avocode/default.nix
··· 5 6 stdenv.mkDerivation rec { 7 pname = "avocode"; 8 - version = "4.14.3"; 9 10 src = fetchurl { 11 url = "https://media.avocode.com/download/avocode-app/${version}/avocode-${version}-linux.zip"; 12 - sha256 = "sha256-6OEgSnW96jufc/Z+B17ghtAbj9SLulue26ffKREGzbY="; 13 }; 14 15 libPath = lib.makeLibraryPath (with xorg; [
··· 5 6 stdenv.mkDerivation rec { 7 pname = "avocode"; 8 + version = "4.15.0"; 9 10 src = fetchurl { 11 url = "https://media.avocode.com/download/avocode-app/${version}/avocode-${version}-linux.zip"; 12 + sha256 = "sha256-Au1m7CfZkeOczcO/JvIzyVCp6Gn/nhSq0yJOdP8i+0w="; 13 }; 14 15 libPath = lib.makeLibraryPath (with xorg; [
+3 -3
pkgs/applications/misc/hugo/default.nix
··· 2 3 buildGoModule rec { 4 pname = "hugo"; 5 - version = "0.84.1"; 6 7 src = fetchFromGitHub { 8 owner = "gohugoio"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-ULZa0tepq00v2VHDR3+aYYvRfbxYKcjcltRgRmbVmRA="; 12 }; 13 14 - vendorSha256 = "sha256-jY/g92ON5OxjuZzPHJNduXYMgPU8/0ioAYvp4iqjGnU="; 15 16 doCheck = false; 17
··· 2 3 buildGoModule rec { 4 pname = "hugo"; 5 + version = "0.84.2"; 6 7 src = fetchFromGitHub { 8 owner = "gohugoio"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-NE4vXtczzcL5f0/aDYeGnleBwsDBTzojSaek/LzowFo="; 12 }; 13 14 + vendorSha256 = "sha256-ImXTOtN6kQL7Q8IBlmK7+i47cWtyZT0xcnQdCw3NvWM="; 15 16 doCheck = false; 17
+3 -3
pkgs/applications/misc/openring/default.nix
··· 2 3 buildGoModule rec { 4 pname = "openring"; 5 - version = "unstable-2021-04-03"; 6 7 src = fetchFromSourcehut { 8 owner = "~sircmpwn"; 9 repo = pname; 10 - rev = "f13edb5dfd882ce608d61cf6b6740650ce9d84a3"; 11 - sha256 = "sha256-Z65V77JZ9jCzBg7T2+d5Agxxd+MV2R7nYcLedYP5eOE="; 12 }; 13 14 vendorSha256 = "sha256-BbBTmkGyLrIWphXC+dBaHaVzHuXRZ+4N/Jt2k3nF7Z4=";
··· 2 3 buildGoModule rec { 4 pname = "openring"; 5 + version = "unstable-2021-06-28"; 6 7 src = fetchFromSourcehut { 8 owner = "~sircmpwn"; 9 repo = pname; 10 + rev = "e566294050776355ca0d3bfd7a1f6f70767cd08b"; 11 + sha256 = "sha256-h9Tout3KGiv6jbq9Ui3crb5NdTOHcn7BIy+aPoWG5sM="; 12 }; 13 14 vendorSha256 = "sha256-BbBTmkGyLrIWphXC+dBaHaVzHuXRZ+4N/Jt2k3nF7Z4=";
+2 -2
pkgs/applications/networking/cluster/k9s/default.nix
··· 2 3 buildGoModule rec { 4 pname = "k9s"; 5 - version = "0.24.10"; 6 7 src = fetchFromGitHub { 8 owner = "derailed"; 9 repo = "k9s"; 10 rev = "v${version}"; 11 - sha256 = "sha256-ImWIR112q59hyKHXBmb9W6eVvu4xr+U4+uh2ZGcXv1g="; 12 }; 13 14 buildFlagsArray = ''
··· 2 3 buildGoModule rec { 4 pname = "k9s"; 5 + version = "0.24.11"; 6 7 src = fetchFromGitHub { 8 owner = "derailed"; 9 repo = "k9s"; 10 rev = "v${version}"; 11 + sha256 = "sha256-UWY4r7pasFsmlRRKFANyxPIoNNuMPNg1gMXrAXEcqdw="; 12 }; 13 14 buildFlagsArray = ''
+2 -2
pkgs/applications/networking/ids/snort/default.nix
··· 3 }: 4 5 stdenv.mkDerivation rec { 6 - version = "2.9.16.1"; 7 pname = "snort"; 8 9 src = fetchurl { 10 name = "${pname}-${version}.tar.gz"; 11 url = "https://snort.org/downloads/archive/snort/${pname}-${version}.tar.gz"; 12 - sha256 = "13lzvjli6kbsnkd7lf0rm71l2mnz38pxk76ia9yrjb6clfhlbb73"; 13 }; 14 15 nativeBuildInputs = [ makeWrapper ];
··· 3 }: 4 5 stdenv.mkDerivation rec { 6 + version = "2.9.18"; 7 pname = "snort"; 8 9 src = fetchurl { 10 name = "${pname}-${version}.tar.gz"; 11 url = "https://snort.org/downloads/archive/snort/${pname}-${version}.tar.gz"; 12 + sha256 = "0xrc7crchflfrk4x5dq5zx22zkmgcrbkww5r1pvkc3cyyr18cc6h"; 13 }; 14 15 nativeBuildInputs = [ makeWrapper ];
+19 -2
pkgs/applications/networking/instant-messengers/teams/default.nix
··· 13 , gawk 14 , xdg-utils 15 , systemd 16 , enableRectOverlay ? false }: 17 18 stdenv.mkDerivation rec { ··· 24 sha256 = "1kx4j837fd344zy90nl0j3r8cdvihy6i6gf56wd5n56zngx1fhjv"; 25 }; 26 27 - nativeBuildInputs = [ dpkg autoPatchelfHook wrapGAppsHook ]; 28 29 unpackCmd = "dpkg -x $curSrc ."; 30 ··· 40 ]; 41 42 preFixup = '' 43 - gappsWrapperArgs+=(--prefix PATH : "${coreutils}/bin:${gawk}/bin:${xdg-utils}/bin") 44 gappsWrapperArgs+=(--add-flags --disable-namespace-sandbox) 45 gappsWrapperArgs+=(--add-flags --disable-setuid-sandbox) 46 ''; 47 48 installPhase = '' 49 runHook preInstall
··· 13 , gawk 14 , xdg-utils 15 , systemd 16 + , nodePackages 17 , enableRectOverlay ? false }: 18 19 stdenv.mkDerivation rec { ··· 25 sha256 = "1kx4j837fd344zy90nl0j3r8cdvihy6i6gf56wd5n56zngx1fhjv"; 26 }; 27 28 + nativeBuildInputs = [ dpkg autoPatchelfHook wrapGAppsHook nodePackages.asar ]; 29 30 unpackCmd = "dpkg -x $curSrc ."; 31 ··· 41 ]; 42 43 preFixup = '' 44 + gappsWrapperArgs+=(--prefix PATH : "${coreutils}/bin:${gawk}/bin") 45 gappsWrapperArgs+=(--add-flags --disable-namespace-sandbox) 46 gappsWrapperArgs+=(--add-flags --disable-setuid-sandbox) 47 ''; 48 + 49 + 50 + buildPhase = '' 51 + runHook preBuild 52 + 53 + asar extract share/teams/resources/app.asar "$TMP/work" 54 + substituteInPlace $TMP/work/main.bundle.js \ 55 + --replace "/usr/share/pixmaps/" "$out/share/pixmaps" \ 56 + --replace "/usr/bin/xdg-mime" "${xdg-utils}/bin/xdg-mime" \ 57 + --replace "Exec=/usr/bin/" "Exec=" # Remove usage of absolute path in autostart. 58 + asar pack --unpack='{*.node,*.ftz,rect-overlay}' "$TMP/work" share/teams/resources/app.asar 59 + 60 + runHook postBuild 61 + ''; 62 + 63 + preferLocalBuild = true; 64 65 installPhase = '' 66 runHook preInstall
+15 -23
pkgs/development/libraries/mimalloc/default.nix
··· 7 in 8 stdenv.mkDerivation rec { 9 pname = "mimalloc"; 10 - version = "2.0.0"; 11 12 src = fetchFromGitHub { 13 owner = "microsoft"; 14 repo = pname; 15 rev = "v${version}"; 16 - sha256 = "sha256-BMDCreY41CxJaPo9BdSRZlqh/YjtPC9aI/Zxt501e+0="; 17 }; 18 19 nativeBuildInputs = [ cmake ninja ]; 20 - cmakeFlags = lib.optional secureBuild [ "-DMI_SECURE=ON" ]; 21 22 postInstall = let 23 rel = lib.versions.majorMinor version; 24 in '' 25 - # first, install headers, that's easy 26 - mkdir -p $dev 27 - mv $out/lib/*/include $dev/include 28 29 - # move .a and .o files into place 30 find $out/lib 31 - mv $out/lib/mimalloc-${rel}/libmimalloc*.a $out/lib/libmimalloc.a 32 - mv $out/lib/mimalloc-${rel}/mimalloc*.o $out/lib/mimalloc.o 33 - 34 - '' + (if secureBuild then '' 35 - mv $out/lib/mimalloc-${rel}/libmimalloc-secure${soext}.${rel} $out/lib/libmimalloc-secure${soext}.${rel} 36 - ln -sfv $out/lib/libmimalloc-secure${soext}.${rel} $out/lib/libmimalloc-secure${soext} 37 - ln -sfv $out/lib/libmimalloc-secure${soext}.${rel} $out/lib/libmimalloc${soext} 38 - '' else '' 39 - mv $out/lib/mimalloc-${rel}/libmimalloc${soext}.${rel} $out/lib/libmimalloc${soext}.${rel} 40 - ln -sfv $out/lib/libmimalloc${soext}.${rel} $out/lib/libmimalloc${soext} 41 - '') + '' 42 - # remote duplicate dir. FIXME: try to fix the .cmake file distribution 43 - # so we can re-use it for dependencies... 44 - rm -rf $out/lib/mimalloc-${rel} 45 - ''; 46 47 outputs = [ "out" "dev" ]; 48 ··· 52 license = licenses.bsd2; 53 platforms = platforms.unix; 54 maintainers = with maintainers; [ thoughtpolice ]; 55 - badPlatforms = platforms.darwin; 56 }; 57 }
··· 7 in 8 stdenv.mkDerivation rec { 9 pname = "mimalloc"; 10 + version = "2.0.2"; 11 12 src = fetchFromGitHub { 13 owner = "microsoft"; 14 repo = pname; 15 rev = "v${version}"; 16 + sha256 = "sha256-n4FGld3bq6ZOSLTzXcVlucCGbQ5/eSFbijU0dfBD/T0="; 17 }; 18 19 nativeBuildInputs = [ cmake ninja ]; 20 + cmakeFlags = [ "-DMI_INSTALL_TOPLEVEL=ON" ] ++ lib.optional secureBuild [ "-DMI_SECURE=ON" ]; 21 22 postInstall = let 23 rel = lib.versions.majorMinor version; 24 + suffix = if stdenv.isLinux then "${soext}.${rel}" else ".${rel}${soext}"; 25 in '' 26 + # first, move headers and cmake files, that's easy 27 + mkdir -p $dev/lib 28 + mv $out/include $dev/include 29 + mv $out/cmake $dev/lib/ 30 31 find $out/lib 32 + '' + (lib.optionalString secureBuild '' 33 + # pretend we're normal mimalloc 34 + ln -sfv $out/lib/libmimalloc-secure${suffix} $out/lib/libmimalloc${suffix} 35 + ln -sfv $out/lib/libmimalloc-secure${suffix} $out/lib/libmimalloc${soext} 36 + ln -sfv $out/lib/libmimalloc-secure.a $out/lib/libmimalloc.a 37 + ln -sfv $out/lib/mimalloc-secure.o $out/lib/mimalloc.o 38 + ''); 39 40 outputs = [ "out" "dev" ]; 41 ··· 45 license = licenses.bsd2; 46 platforms = platforms.unix; 47 maintainers = with maintainers; [ thoughtpolice ]; 48 }; 49 }
+2 -2
pkgs/development/tools/esbuild/default.nix
··· 2 3 buildGoModule rec { 4 pname = "esbuild"; 5 - version = "0.12.9"; 6 7 src = fetchFromGitHub { 8 owner = "evanw"; 9 repo = "esbuild"; 10 rev = "v${version}"; 11 - sha256 = "sha256-MqwgdhgWIfYE0wO7fWQuC72tEwCVgL7qUbJlJ3APf4E="; 12 }; 13 14 vendorSha256 = "sha256-2ABWPqhK2Cf4ipQH7XvRrd+ZscJhYPc3SV2cGT0apdg=";
··· 2 3 buildGoModule rec { 4 pname = "esbuild"; 5 + version = "0.12.11"; 6 7 src = fetchFromGitHub { 8 owner = "evanw"; 9 repo = "esbuild"; 10 rev = "v${version}"; 11 + sha256 = "sha256-fn1PQZxZbizer226c9bI1kQ7/p8Z5PbdPiYv2ekll7U="; 12 }; 13 14 vendorSha256 = "sha256-2ABWPqhK2Cf4ipQH7XvRrd+ZscJhYPc3SV2cGT0apdg=";
+2 -2
pkgs/games/cbonsai/default.nix
··· 1 { stdenv, lib, fetchFromGitLab, ncurses, pkg-config, nix-update-script }: 2 3 stdenv.mkDerivation rec { 4 - version = "1.2.0"; 5 pname = "cbonsai"; 6 7 src = fetchFromGitLab { 8 owner = "jallbrit"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "sha256-j3RNCUxNyphZy5c7ZcKwyVbcYt7l6wiB+r7P3sWPFwA="; 12 }; 13 14 nativeBuildInputs = [ pkg-config ];
··· 1 { stdenv, lib, fetchFromGitLab, ncurses, pkg-config, nix-update-script }: 2 3 stdenv.mkDerivation rec { 4 + version = "1.2.1"; 5 pname = "cbonsai"; 6 7 src = fetchFromGitLab { 8 owner = "jallbrit"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "sha256-kofJqMoBsvHrV3XfIQbSYO7OWpN7UgvrSs3WX3IVAJs="; 12 }; 13 14 nativeBuildInputs = [ pkg-config ];
+12 -4
pkgs/games/gemrb/default.nix
··· 20 backend = 21 if (stdenv.isx86_32 || stdenv.isx86_64) then "OpenGL" else "GLES"; 22 23 in 24 stdenv.mkDerivation rec { 25 pname = "gemrb"; ··· 39 libGL 40 libiconv 41 libpng 42 - libvlc 43 libvorbis 44 openal 45 python2 46 zlib 47 - ]; 48 49 nativeBuildInputs = [ cmake ]; 50 51 - LIBVLC_INCLUDE_PATH = "${lib.getDev libvlc}/include"; 52 - LIBVLC_LIBRARY_PATH = "${lib.getLib libvlc}/lib"; 53 54 cmakeFlags = [ 55 # use the Mesa drivers for video on ARM (harmless on x86) 56 "-DDISABLE_VIDEOCORE=ON" 57 "-DLAYOUT=opt"
··· 20 backend = 21 if (stdenv.isx86_32 || stdenv.isx86_64) then "OpenGL" else "GLES"; 22 23 + withVLC = stdenv.isDarwin; 24 + 25 + inherit (lib) optional optionalString; 26 + 27 in 28 stdenv.mkDerivation rec { 29 pname = "gemrb"; ··· 43 libGL 44 libiconv 45 libpng 46 libvorbis 47 openal 48 python2 49 zlib 50 + ] 51 + ++ optional withVLC libvlc; 52 53 nativeBuildInputs = [ cmake ]; 54 55 + # libvlc isn't being detected properly as of 0.9.0, so set it 56 + LIBVLC_INCLUDE_PATH = optionalString withVLC "${lib.getDev libvlc}/include"; 57 + LIBVLC_LIBRARY_PATH = optionalString withVLC "${lib.getLib libvlc}/lib"; 58 59 cmakeFlags = [ 60 + "-DDATA_DIR=${placeholder "out"}/share/gemrb" 61 + "-DEXAMPLE_CONF_DIR=${placeholder "out"}/share/doc/gemrb/examples" 62 + "-DSYSCONF_DIR=/etc" 63 # use the Mesa drivers for video on ARM (harmless on x86) 64 "-DDISABLE_VIDEOCORE=ON" 65 "-DLAYOUT=opt"
+2 -2
pkgs/games/katago/default.nix
··· 33 34 in env.mkDerivation rec { 35 pname = "katago"; 36 - version = "1.8.2"; 37 githash = "b846bddd88fbc5353e4a93fa514f6cbf45358362"; 38 39 src = fetchFromGitHub { 40 owner = "lightvector"; 41 repo = "katago"; 42 rev = "v${version}"; 43 - sha256 = "sha256-kL+y2rsEiC5GGDlWrbzxlJvLxHDCuvVT6CDOlUtXpDk="; 44 }; 45 46 fakegit = writeShellScriptBin "git" "echo ${githash}";
··· 33 34 in env.mkDerivation rec { 35 pname = "katago"; 36 + version = "1.9.0"; 37 githash = "b846bddd88fbc5353e4a93fa514f6cbf45358362"; 38 39 src = fetchFromGitHub { 40 owner = "lightvector"; 41 repo = "katago"; 42 rev = "v${version}"; 43 + sha256 = "sha256-6J1UY05NweXLw8D4kOXG3KkCxJRsrQ9NBYWu2Xzu9JI="; 44 }; 45 46 fakegit = writeShellScriptBin "git" "echo ${githash}";
+26
pkgs/misc/emulators/gxemul/0001-fix-attributes.patch
···
··· 1 + diff -Naur gxemul-0.7.0-old/src/include/thirdparty/pcireg.h gxemul-0.7.0/src/include/thirdparty/pcireg.h 2 + --- gxemul-0.7.0-old/src/include/thirdparty/pcireg.h 2021-04-22 15:04:14.000000000 -0300 3 + +++ gxemul-0.7.0-new/src/include/thirdparty/pcireg.h 2021-06-28 18:41:13.063065322 -0300 4 + @@ -12,9 +12,6 @@ 5 + #undef __noreturn__ 6 + #endif 7 + 8 + -#define __attribute__(x) /* */ 9 + -#define __noreturn__ /* */ 10 + - 11 + /* 12 + * Copyright (c) 1995, 1996, 1999, 2000 13 + * Christopher G. Demetriou. All rights reserved. 14 + diff -Naur gxemul-0.7.0-old/src/include/thirdparty/sgi_arcbios.h gxemul-0.7.0/src/include/thirdparty/sgi_arcbios.h 15 + --- gxemul-0.7.0-old/src/include/thirdparty/sgi_arcbios.h 2021-04-22 15:04:14.000000000 -0300 16 + +++ gxemul-0.7.0-new/src/include/thirdparty/sgi_arcbios.h 2021-06-28 18:41:33.549981505 -0300 17 + @@ -14,9 +14,6 @@ 18 + #undef __noreturn__ 19 + #endif 20 + 21 + -#define __attribute__(x) /* */ 22 + -#define __noreturn__ /* */ 23 + - 24 + /* $NetBSD: arcbios.h,v 1.3 2001/12/06 14:59:02 rafal Exp $ */ 25 + 26 + /*-
+27 -15
pkgs/misc/emulators/gxemul/default.nix
··· 1 - { lib, stdenv, fetchurl }: 2 3 stdenv.mkDerivation rec { 4 pname = "gxemul"; 5 - version = "0.6.2"; 6 7 src = fetchurl { 8 - url = "http://gavare.se/gxemul/src/gxemul-${version}.tar.gz"; 9 - sha256 = "0iqmazfn7ss5n27m1a9n9nps3vzhag1phzb7qw0wgczycmwsq0x7"; 10 }; 11 12 - configurePhase = "./configure"; 13 14 - installPhase = '' 15 - mkdir -p {$out/bin,$out/share/${pname}-${version}} 16 - cp -r {doc,demos} $out/share/${pname}-${version} 17 - cp gxemul $out/bin 18 - cp -r ./man $out 19 ''; 20 21 meta = with lib; { ··· 24 longDescription = '' 25 GXemul is a framework for full-system computer architecture 26 emulation. Several real machines have been implemented within the 27 - framework, consisting of processors (ARM, MIPS, Motorola 88K, 28 - PowerPC, and SuperH) and surrounding hardware components such as 29 - framebuffers, interrupt controllers, busses, disk controllers, 30 - and serial controllers. The emulation is working well enough to 31 - allow several unmodified "guest" operating systems to run. 32 ''; 33 license = licenses.bsd3; 34 }; 35 }
··· 1 + { lib 2 + , stdenv 3 + , fetchurl 4 + , libX11 5 + }: 6 7 stdenv.mkDerivation rec { 8 pname = "gxemul"; 9 + version = "0.7.0"; 10 11 src = fetchurl { 12 + url = "http://gavare.se/gxemul/src/${pname}-${version}.tar.gz"; 13 + sha256 = "sha256-ecRDfG+MqQT0bTOsNgYqZf3PSpKiSEeOQIqxEpXPjoM="; 14 }; 15 16 + buildInputs = [ 17 + libX11 18 + ]; 19 20 + patches = [ 21 + # Fix compilation; remove when next release arrives 22 + ./0001-fix-attributes.patch 23 + ]; 24 + 25 + dontAddPrefix = true; 26 + 27 + preConfigure = '' 28 + export PREFIX=${placeholder "out"} 29 ''; 30 31 meta = with lib; { ··· 34 longDescription = '' 35 GXemul is a framework for full-system computer architecture 36 emulation. Several real machines have been implemented within the 37 + framework, consisting of processors (ARM, MIPS, Motorola 88K, PowerPC, and 38 + SuperH) and surrounding hardware components such as framebuffers, 39 + interrupt controllers, busses, disk controllers, and serial 40 + controllers. The emulation is working well enough to allow several 41 + unmodified "guest" operating systems to run. 42 ''; 43 license = licenses.bsd3; 44 + maintainers = with maintainers; [ AndersonTorres ]; 45 + platforms = platforms.unix; 46 }; 47 }
+3 -3
pkgs/servers/imgproxy/default.nix
··· 3 4 buildGoModule rec { 5 pname = "imgproxy"; 6 - version = "2.16.4"; 7 8 src = fetchFromGitHub { 9 owner = pname; 10 repo = pname; 11 - sha256 = "sha256-25oOGkTc19PHlU0Va7IPKrvGK9pDrGqKZa6qNFMVphQ="; 12 rev = "v${version}"; 13 }; 14 15 - vendorSha256 = "sha256-y8cXe4+jTLnM7K+na2VHGXkPgZjFYdgtDd14D8KiCas="; 16 17 doCheck = false; 18
··· 3 4 buildGoModule rec { 5 pname = "imgproxy"; 6 + version = "2.16.5"; 7 8 src = fetchFromGitHub { 9 owner = pname; 10 repo = pname; 11 + sha256 = "sha256-CLmnc33mVvm7CR0Qv4zsLiQ/jyRIkr1N53mMfD3flNM="; 12 rev = "v${version}"; 13 }; 14 15 + vendorSha256 = "sha256-aV+A2duS13Zi9IPa7bd/tBe5NzmUhKYsXzvluuIFc+I="; 16 17 doCheck = false; 18
+2 -2
pkgs/tools/bluetooth/blueberry/default.nix
··· 14 15 stdenv.mkDerivation rec { 16 pname = "blueberry"; 17 - version = "1.4.3"; 18 19 src = fetchFromGitHub { 20 owner = "linuxmint"; 21 repo = pname; 22 rev = version; 23 - sha256 = "sha256-UkF50AIFKkvjUHJiemR0Hj5ECZeHQU6beIw2TGrOlbk="; 24 }; 25 26 nativeBuildInputs = [
··· 14 15 stdenv.mkDerivation rec { 16 pname = "blueberry"; 17 + version = "1.4.4"; 18 19 src = fetchFromGitHub { 20 owner = "linuxmint"; 21 repo = pname; 22 rev = version; 23 + sha256 = "sha256-dz0uGesyuQVXI7aEONCeOsa2vVw5yuStSFPnrqv2VcM="; 24 }; 25 26 nativeBuildInputs = [
+9 -29
pkgs/tools/typesetting/tex/texlive/default.nix
··· 160 "https://texlive.info/tlnet-archive/${snapshot.year}/${snapshot.month}/${snapshot.day}/tlnet/archive" 161 ]; 162 163 - src = fetchurl { inherit urls sha512; }; 164 - 165 - passthru = { 166 - inherit pname tlType version; 167 - } // lib.optionalAttrs (sha512 != "") { inherit src; }; 168 - unpackCmd = file: '' 169 - tar -xf ${file} \ 170 - '--strip-components=${toString stripPrefix}' \ 171 - -C "$out" --anchored --exclude=tlpkg --keep-old-files 172 - '' + postUnpack; 173 - 174 - in if sha512 == "" then 175 - # hash stripped from pkgs.nix to save space -> fetch&unpack in a single step 176 - # currently unused as we prefer to keep the sha512 hashes for reproducibility 177 - fetchurl { 178 - inherit urls; 179 - sha1 = if fixedHash == null then throw "TeX Live package ${tlName} is missing hash!" 180 - else fixedHash; 181 - name = tlName; 182 - recursiveHash = true; 183 - downloadToTemp = true; 184 - postFetch = ''mkdir "$out";'' + unpackCmd "$downloadedFile"; 185 - # TODO: perhaps override preferHashedMirrors and allowSubstitutes 186 - } 187 - // passthru 188 - 189 - else runCommand "texlive-${tlName}" 190 ( { 191 - inherit passthru; 192 } // lib.optionalAttrs (fixedHash != null) { 193 outputHash = fixedHash; 194 outputHashAlgo = "sha1"; ··· 197 ) 198 ( '' 199 mkdir "$out" 200 - '' + unpackCmd "'${src}'" 201 ); 202 203 # combine a set of TL packages into a single TL meta-package
··· 160 "https://texlive.info/tlnet-archive/${snapshot.year}/${snapshot.month}/${snapshot.day}/tlnet/archive" 161 ]; 162 163 + in runCommand "texlive-${tlName}" 164 ( { 165 + src = fetchurl { inherit urls sha512; }; 166 + inherit stripPrefix; 167 + # metadata for texlive.combine 168 + passthru = { inherit pname tlType version; }; 169 } // lib.optionalAttrs (fixedHash != null) { 170 outputHash = fixedHash; 171 outputHashAlgo = "sha1"; ··· 174 ) 175 ( '' 176 mkdir "$out" 177 + tar -xf "$src" \ 178 + --strip-components="$stripPrefix" \ 179 + -C "$out" --anchored --exclude=tlpkg --keep-old-files 180 + '' + postUnpack 181 ); 182 183 # combine a set of TL packages into a single TL meta-package
+2
pkgs/top-level/all-packages.nix
··· 26584 26585 remotebox = callPackage ../applications/virtualization/remotebox { }; 26586 26587 retroshare = libsForQt5.callPackage ../applications/networking/p2p/retroshare { }; 26588 26589 rgp = libsForQt5.callPackage ../development/tools/rgp { };
··· 26584 26585 remotebox = callPackage ../applications/virtualization/remotebox { }; 26586 26587 + restique = libsForQt5.callPackage ../applications/backup/restique { }; 26588 + 26589 retroshare = libsForQt5.callPackage ../applications/networking/p2p/retroshare { }; 26590 26591 rgp = libsForQt5.callPackage ../development/tools/rgp { };