Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)

Merge staging-next into staging

authored by

github-actions[bot] and committed by
GitHub
d0ec39b2 a39a7d95

+578 -199
+2 -11
nixos/doc/manual/development/running-nixos-tests-interactively.section.md
··· 5 5 6 6 ```ShellSession 7 7 $ nix-build nixos/tests/login.nix -A driverInteractive 8 - $ ./result/bin/nixos-test-driver 8 + $ ./result/bin/nixos-test-driver --interactive 9 9 starting VDE switch for network 1 10 10 > 11 11 ``` ··· 24 24 you to inspect the state of the VMs after the test (e.g. to debug the 25 25 test script). 26 26 27 - To just start and experiment with the VMs, run: 28 - 29 - ```ShellSession 30 - $ nix-build nixos/tests/login.nix -A driverInteractive 31 - $ ./result/bin/nixos-run-vms 32 - ``` 33 - 34 - The script `nixos-run-vms` starts the virtual machines defined by test. 35 - 36 27 You can re-use the VM states coming from a previous run by setting the 37 28 `--keep-vm-state` flag. 38 29 39 30 ```ShellSession 40 - $ ./result/bin/nixos-run-vms --keep-vm-state 31 + $ ./result/bin/nixos-test-driver --interactive --keep-vm-state 41 32 ``` 42 33 43 34 The machine state is stored in the `$TMPDIR/vm-state-machinename`
+2 -13
nixos/doc/manual/from_md/development/running-nixos-tests-interactively.section.xml
··· 6 6 </para> 7 7 <programlisting> 8 8 $ nix-build nixos/tests/login.nix -A driverInteractive 9 - $ ./result/bin/nixos-test-driver 9 + $ ./result/bin/nixos-test-driver --interactive 10 10 starting VDE switch for network 1 11 11 &gt; 12 12 </programlisting> ··· 26 26 the test (e.g. to debug the test script). 27 27 </para> 28 28 <para> 29 - To just start and experiment with the VMs, run: 30 - </para> 31 - <programlisting> 32 - $ nix-build nixos/tests/login.nix -A driverInteractive 33 - $ ./result/bin/nixos-run-vms 34 - </programlisting> 35 - <para> 36 - The script <literal>nixos-run-vms</literal> starts the virtual 37 - machines defined by test. 38 - </para> 39 - <para> 40 29 You can re-use the VM states coming from a previous run by setting 41 30 the <literal>--keep-vm-state</literal> flag. 42 31 </para> 43 32 <programlisting> 44 - $ ./result/bin/nixos-run-vms --keep-vm-state 33 + $ ./result/bin/nixos-test-driver --interactive --keep-vm-state 45 34 </programlisting> 46 35 <para> 47 36 The machine state is stored in the
+73 -28
nixos/lib/test-driver/test-driver.py
··· 24 24 import telnetlib 25 25 import tempfile 26 26 import time 27 - import traceback 28 27 import unicodedata 29 28 30 29 CHAR_TO_KEY = { ··· 930 929 machine.wait_for_shutdown() 931 930 932 931 933 - def test_script() -> None: 934 - exec(os.environ["testScript"]) 935 - 936 - 937 - def run_tests() -> None: 932 + def run_tests(interactive: bool = False) -> None: 938 933 global machines 939 - tests = os.environ.get("tests", None) 940 - if tests is not None: 941 - with log.nested("running the VM test script"): 942 - try: 943 - exec(tests, globals()) 944 - except Exception as e: 945 - eprint("error: ") 946 - traceback.print_exc() 947 - sys.exit(1) 934 + if interactive: 935 + ptpython.repl.embed(globals(), locals()) 948 936 else: 949 - ptpython.repl.embed(locals(), globals()) 950 - 951 - # TODO: Collect coverage data 952 - 953 - for machine in machines: 954 - if machine.is_up(): 955 - machine.execute("sync") 937 + test_script() 938 + # TODO: Collect coverage data 939 + for machine in machines: 940 + if machine.is_up(): 941 + machine.execute("sync") 956 942 957 943 958 944 def serial_stdout_on() -> None: ··· 965 951 log._print_serial_logs = False 966 952 967 953 954 + class EnvDefault(argparse.Action): 955 + """An argpars Action that takes values from the specified 956 + environment variable as the flags default value. 957 + """ 958 + 959 + def __init__(self, envvar, required=False, default=None, nargs=None, **kwargs): # type: ignore 960 + if not default and envvar: 961 + if envvar in os.environ: 962 + if nargs is not None and (nargs.isdigit() or nargs in ["*", "+"]): 963 + default = os.environ[envvar].split() 964 + else: 965 + default = os.environ[envvar] 966 + kwargs["help"] = ( 967 + kwargs["help"] + f" (default from environment: {default})" 968 + ) 969 + if required and default: 970 + required = False 971 + super(EnvDefault, self).__init__( 972 + default=default, required=required, nargs=nargs, **kwargs 973 + ) 974 + 975 + def __call__(self, parser, namespace, values, option_string=None): # type: ignore 976 + setattr(namespace, self.dest, values) 977 + 978 + 968 979 @contextmanager 969 980 def subtest(name: str) -> Iterator[None]: 970 981 with log.nested(name): ··· 986 997 help="re-use a VM state coming from a previous run", 987 998 action="store_true", 988 999 ) 989 - (cli_args, vm_scripts) = arg_parser.parse_known_args() 1000 + arg_parser.add_argument( 1001 + "-I", 1002 + "--interactive", 1003 + help="drop into a python repl and run the tests interactively", 1004 + action="store_true", 1005 + ) 1006 + arg_parser.add_argument( 1007 + "--start-scripts", 1008 + metavar="START-SCRIPT", 1009 + action=EnvDefault, 1010 + envvar="startScripts", 1011 + nargs="*", 1012 + help="start scripts for participating virtual machines", 1013 + ) 1014 + arg_parser.add_argument( 1015 + "--vlans", 1016 + metavar="VLAN", 1017 + action=EnvDefault, 1018 + envvar="vlans", 1019 + nargs="*", 1020 + help="vlans to span by the driver", 1021 + ) 1022 + arg_parser.add_argument( 1023 + "testscript", 1024 + action=EnvDefault, 1025 + envvar="testScript", 1026 + help="the test script to run", 1027 + type=pathlib.Path, 1028 + ) 1029 + 1030 + args = arg_parser.parse_args() 1031 + global test_script 1032 + 1033 + def test_script() -> None: 1034 + with log.nested("running the VM test script"): 1035 + exec(pathlib.Path(args.testscript).read_text(), globals()) 990 1036 991 1037 log = Logger() 992 1038 993 - vlan_nrs = list(dict.fromkeys(os.environ.get("VLANS", "").split())) 994 - vde_sockets = [create_vlan(v) for v in vlan_nrs] 1039 + vde_sockets = [create_vlan(v) for v in args.vlans] 995 1040 for nr, vde_socket, _, _ in vde_sockets: 996 1041 os.environ["QEMU_VDE_SOCKET_{}".format(nr)] = vde_socket 997 1042 998 1043 machines = [ 999 - create_machine({"startCommand": s, "keepVmState": cli_args.keep_vm_state}) 1000 - for s in vm_scripts 1044 + create_machine({"startCommand": s, "keepVmState": args.keep_vm_state}) 1045 + for s in args.start_scripts 1001 1046 ] 1002 1047 machine_eval = [ 1003 1048 "{0} = machines[{1}]".format(m.name, idx) for idx, m in enumerate(machines) ··· 1017 1062 log.close() 1018 1063 1019 1064 tic = time.time() 1020 - run_tests() 1065 + run_tests(args.interactive) 1021 1066 toc = time.time() 1022 1067 print("test script finished in {:.2f}s".format(toc - tic))
+12 -11
nixos/lib/testing-python.nix
··· 83 83 '' 84 84 mkdir -p $out 85 85 86 - LOGFILE=/dev/null tests='exec(os.environ["testScript"])' ${driver}/bin/nixos-test-driver 86 + # effectively mute the XMLLogger 87 + export LOGFILE=/dev/null 88 + 89 + ${driver}/bin/nixos-test-driver 87 90 ''; 88 91 89 92 passthru = driver.passthru // { ··· 166 169 '' 167 170 mkdir -p $out/bin 168 171 172 + vmStartScripts=($(for i in ${toString vms}; do echo $i/bin/run-*-vm; done)) 169 173 echo -n "$testScript" > $out/test-script 174 + ln -s ${testDriver}/bin/nixos-test-driver $out/bin/nixos-test-driver 175 + 170 176 ${lib.optionalString (!skipLint) '' 171 177 PYFLAKES_BUILTINS="$( 172 178 echo -n ${lib.escapeShellArg (lib.concatStringsSep "," nodeHostNames)}, ··· 174 180 )" ${python3Packages.pyflakes}/bin/pyflakes $out/test-script 175 181 ''} 176 182 177 - ln -s ${testDriver}/bin/nixos-test-driver $out/bin/ 178 - vms=($(for i in ${toString vms}; do echo $i/bin/run-*-vm; done)) 183 + # set defaults through environment 184 + # see: ./test-driver/test-driver.py argparse implementation 179 185 wrapProgram $out/bin/nixos-test-driver \ 180 - --add-flags "''${vms[*]}" \ 181 - --run "export testScript=\"\$(${coreutils}/bin/cat $out/test-script)\"" \ 182 - --set VLANS '${toString vlans}' 183 - ln -s ${testDriver}/bin/nixos-test-driver $out/bin/nixos-run-vms 184 - wrapProgram $out/bin/nixos-run-vms \ 185 - --add-flags "''${vms[*]}" \ 186 - --set tests 'start_all(); join_all();' \ 187 - --set VLANS '${toString vlans}' 186 + --set startScripts "''${vmStartScripts[*]}" \ 187 + --set testScript "$out/test-script" \ 188 + --set vlans '${toString vlans}' 188 189 ''); 189 190 190 191 # Make a full-blown test
+23
nixos/modules/services/web-apps/miniflux.nix
··· 98 98 EnvironmentFile = if cfg.adminCredentialsFile == null 99 99 then defaultCredentials 100 100 else cfg.adminCredentialsFile; 101 + # Hardening 102 + CapabilityBoundingSet = [ "" ]; 103 + DeviceAllow = [ "" ]; 104 + LockPersonality = true; 105 + MemoryDenyWriteExecute = true; 106 + PrivateDevices = true; 107 + PrivateUsers = true; 108 + ProcSubset = "pid"; 109 + ProtectClock = true; 110 + ProtectControlGroups = true; 111 + ProtectHome = true; 112 + ProtectHostname = true; 113 + ProtectKernelLogs = true; 114 + ProtectKernelModules = true; 115 + ProtectKernelTunables = true; 116 + ProtectProc = "invisible"; 117 + RestrictAddressFamilies = [ "AF_INET" "AF_INET6" ]; 118 + RestrictNamespaces = true; 119 + RestrictRealtime = true; 120 + RestrictSUIDSGID = true; 121 + SystemCallArchitectures = "native"; 122 + SystemCallFilter = [ "@system-service" "~@privileged" "~@resources" ]; 123 + UMask = "0077"; 101 124 }; 102 125 103 126 environment = cfg.config;
+7 -4
pkgs/applications/audio/cozy-audiobooks/default.nix
··· 8 8 , gtk3 9 9 , gst_all_1 10 10 , gobject-introspection 11 + , libhandy 11 12 , python3Packages 12 13 , file 13 14 , cairo 14 15 , gettext 15 16 , gnome 17 + , pantheon 16 18 }: 17 19 18 20 python3Packages.buildPythonApplication rec { ··· 20 22 format = "other"; # no setup.py 21 23 22 24 pname = "cozy"; 23 - version = "0.7.2"; 25 + version = "1.0.3"; 24 26 25 27 # Temporary fix 26 28 # See https://github.com/NixOS/nixpkgs/issues/57029 ··· 31 33 owner = "geigi"; 32 34 repo = pname; 33 35 rev = version; 34 - sha256 = "0fmbddi4ga0bppwg3rm3yjmf7jgqc6zfslmavnr1pglbzkjhy9fs"; 36 + sha256 = "0m0xiqpb87pwr3fhy0a4qxg67yjhwchcxj3x2anyy0li4inryxag"; 35 37 }; 36 38 37 39 nativeBuildInputs = [ ··· 47 49 cairo 48 50 gettext 49 51 gnome.adwaita-icon-theme 52 + libhandy 53 + pantheon.granite 50 54 ] ++ (with gst_all_1; [ 51 55 gstreamer 52 56 gst-plugins-good ··· 70 74 ]; 71 75 72 76 postPatch = '' 73 - chmod +x meson/post_install.py 74 - patchShebangs meson/post_install.py 77 + patchShebangs meson/*.py 75 78 ''; 76 79 77 80 postInstall = ''
-2
pkgs/applications/misc/audio/wavrsocvt/default.nix
··· 8 8 sha256 = "15qlvdfwbiclljj7075ycm78yzqahzrgl4ky8pymix5179acm05h"; 9 9 }; 10 10 11 - phases = [ "unpackPhase" "installPhase" ]; 12 - 13 11 unpackPhase = '' 14 12 tar -zxf $src 15 13 '';
+2 -1
pkgs/applications/misc/avrdudess/default.nix
··· 10 10 11 11 nativeBuildInputs = [ unzip ]; 12 12 13 - phases = [ "buildPhase" ]; 13 + dontUnpack = true; 14 + dontInstall = true; 14 15 15 16 buildPhase = '' 16 17 mkdir -p "$out/avrdudess"
+1 -1
pkgs/applications/misc/azuredatastudio/default.nix
··· 38 38 at-spi2-atk 39 39 ]; 40 40 41 - phases = "unpackPhase fixupPhase"; 41 + dontInstall = true; 42 42 43 43 # change this to azuredatastudio-insiders for insiders releases 44 44 edition = "azuredatastudio";
+1 -1
pkgs/applications/misc/emem/default.nix
··· 11 11 sha256 = "18x3s3jrph8k3pc75jgwkfqazygpsx93zjxx68zms58my17cybh1"; 12 12 }; 13 13 14 - phases = [ "buildPhase" "installPhase" ]; 14 + dontUnpack = true; 15 15 16 16 buildPhase = '' 17 17 mkdir -p $out/bin $out/share/java
-2
pkgs/applications/misc/ganttproject-bin/default.nix
··· 15 15 nativeBuildInputs = [ makeWrapper ]; 16 16 buildInputs = [ jre ]; 17 17 18 - phases = [ "unpackPhase" "installPhase" "fixupPhase" ]; 19 - 20 18 installPhase = let 21 19 22 20 desktopItem = makeDesktopItem {
+1 -1
pkgs/applications/misc/gollum/default.nix
··· 8 8 9 9 nativeBuildInputs = [ makeWrapper ]; 10 10 11 - phases = [ "installPhase" ]; 11 + dontUnpack = true; 12 12 13 13 installPhase = let 14 14 env = bundlerEnv {
+1 -1
pkgs/applications/misc/hello-unfree/default.nix
··· 4 4 pname = "example-unfree-package"; 5 5 version = "1.0"; 6 6 7 - phases = [ "installPhase" "fixupPhase" ]; 7 + dontUnpack = true; 8 8 9 9 installPhase = '' 10 10 mkdir -p $out/bin
-46
pkgs/applications/misc/rtv/default.nix
··· 1 - { lib, fetchFromGitHub, python3Packages }: 2 - 3 - with python3Packages; 4 - buildPythonApplication rec { 5 - version = "1.27.0"; 6 - pname = "rtv"; 7 - 8 - src = fetchFromGitHub { 9 - owner = "michael-lazar"; 10 - repo = "rtv"; 11 - rev = "v${version}"; 12 - sha256 = "1hw7xy2kjxq7y3wcibcz4l7zj8icvigialqr17l362xry0y17y5j"; 13 - }; 14 - 15 - # Tests try to access network 16 - doCheck = false; 17 - 18 - checkPhase = '' 19 - py.test 20 - ''; 21 - 22 - checkInputs = [ 23 - coverage 24 - coveralls 25 - docopt 26 - mock 27 - pylint 28 - pytest 29 - vcrpy 30 - ]; 31 - 32 - propagatedBuildInputs = [ 33 - beautifulsoup4 34 - decorator 35 - kitchen 36 - requests 37 - six 38 - ]; 39 - 40 - meta = with lib; { 41 - homepage = "https://github.com/michael-lazar/rtv"; 42 - description = "Browse Reddit from your Terminal"; 43 - license = licenses.mit; 44 - maintainers = with maintainers; [ matthiasbeyer wedens ]; 45 - }; 46 - }
+3 -2
pkgs/applications/misc/smos/default.nix
··· 4 4 }: 5 5 6 6 stdenv.mkDerivation rec { 7 - name = "smos-${version}"; 7 + pname = "smos"; 8 8 version = "0.1.0"; 9 9 10 10 src = fetchurl { ··· 12 12 sha256 = "sha256:07yavk7xl92yjwwjdig90yq421n8ldv4fjfw7izd4hfpzw849a12"; 13 13 }; 14 14 15 - phases = [ "unpackPhase" ]; 15 + dontInstall = true; 16 + 16 17 unpackCmd = "${unzip}/bin/unzip -d $out $curSrc"; 17 18 sourceRoot = "."; 18 19
+2 -2
pkgs/applications/networking/cloudflared/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "cloudflared"; 5 - version = "2021.7.4"; 5 + version = "2021.8.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "cloudflare"; 9 9 repo = "cloudflared"; 10 10 rev = version; 11 - sha256 = "sha256-3HK7QLUhU6MUayRYec4LP2BfbwEsvtjtCf++o1cQsQw="; 11 + sha256 = "sha256-92Uq7hSqfsiES6dSCw4cotfLJ8TLRRO6QPkwQ8iv124="; 12 12 }; 13 13 14 14 vendorSha256 = null;
+18 -6
pkgs/applications/office/pympress/default.nix
··· 1 1 { lib 2 + , stdenv 3 + , fetchpatch 2 4 , python3Packages 3 5 , wrapGAppsHook 4 6 , gtk3 5 7 , gobject-introspection 6 8 , libcanberra-gtk3 7 9 , poppler_gi 10 + , withGstreamer ? stdenv.isLinux 11 + , withVLC ? stdenv.isLinux 8 12 }: 9 13 10 14 python3Packages.buildPythonApplication rec { 11 15 pname = "pympress"; 12 - version = "1.5.1"; 16 + version = "1.6.3"; 13 17 14 18 src = python3Packages.fetchPypi { 15 19 inherit pname version; 16 - sha256 = "173d9scf2z29qg279jf33zcl7sgc3wp662fgpm943bn9667q18wf"; 20 + sha256 = "sha256-f+OjE0x/3yfJYHCLB+on7TT7MJ2vNu87SHRi67qFDCM="; 17 21 }; 18 22 23 + patches = [ 24 + # Should not be needed once v1.6.4 is released 25 + (fetchpatch { 26 + name = "fix-setuptools-version-parsing.patch"; 27 + url = "https://github.com/Cimbali/pympress/commit/474514d71396ac065e210fd846e07ed1139602d0.diff"; 28 + sha256 = "sha256-eiw54sjMrXrNrhtkAXxiSTatzoA0NDA03L+HpTDax58="; 29 + }) 30 + ]; 31 + 19 32 nativeBuildInputs = [ 20 33 wrapGAppsHook 21 34 ]; ··· 23 36 buildInputs = [ 24 37 gtk3 25 38 gobject-introspection 26 - libcanberra-gtk3 27 39 poppler_gi 28 - ]; 40 + ] ++ lib.optional withGstreamer libcanberra-gtk3; 29 41 30 42 propagatedBuildInputs = with python3Packages; [ 31 43 pycairo 32 44 pygobject3 33 - python-vlc 45 + setuptools 34 46 watchdog 35 - ]; 47 + ] ++ lib.optional withVLC python-vlc; 36 48 37 49 doCheck = false; # there are no tests 38 50
+37
pkgs/applications/science/chemistry/avogadro2/default.nix
··· 1 + { lib, stdenv, fetchFromGitHub, cmake, eigen, avogadrolibs, molequeue, hdf5 2 + , openbabel, qttools, wrapQtAppsHook 3 + }: 4 + 5 + stdenv.mkDerivation rec { 6 + pname = "avogadro2"; 7 + version = "1.94.0"; 8 + 9 + src = fetchFromGitHub { 10 + owner = "OpenChemistry"; 11 + repo = "avogadroapp"; 12 + rev = version; 13 + sha256 = "6RaiX23YUMfTYAuSighcLGGlJtqeydNgi3PWGF77Jp8="; 14 + }; 15 + 16 + nativeBuildInputs = [ cmake wrapQtAppsHook ]; 17 + 18 + buildInputs = [ 19 + avogadrolibs 20 + molequeue 21 + eigen 22 + hdf5 23 + qttools 24 + ]; 25 + 26 + propagatedBuildInputs = [ openbabel ]; 27 + 28 + qtWrapperArgs = [ "--prefix PATH : ${openbabel}/bin" ]; 29 + 30 + meta = with lib; { 31 + description = "Molecule editor and visualizer"; 32 + maintainers = with maintainers; [ sheepforce ]; 33 + homepage = "https://github.com/OpenChemistry/avogadroapp"; 34 + platforms = platforms.mesaPlatforms; 35 + license = licenses.bsd3; 36 + }; 37 + }
+5 -2
pkgs/applications/science/electronics/vhd2vl/default.nix
··· 4 4 , bison 5 5 , flex 6 6 , verilog 7 + , which 7 8 }: 8 9 9 10 stdenv.mkDerivation rec { ··· 29 30 nativeBuildInputs = [ 30 31 bison 31 32 flex 33 + which 32 34 ]; 33 35 34 36 buildInputs = [ ··· 36 38 ]; 37 39 38 40 installPhase = '' 39 - mkdir -p $out/bin 40 - cp src/vhd2vl $out/bin/ 41 + runHook preInstall 42 + install -D -m755 src/vhd2vl $out/bin/vdh2vl 43 + runHook postInstall 41 44 ''; 42 45 43 46 meta = with lib; {
+18 -13
pkgs/applications/science/math/polymake/default.nix
··· 1 1 { lib, stdenv, fetchurl 2 - , ninja, libxml2, libxslt, readline, perl, gmp, mpfr, boost 2 + , perl, gmp, mpfr, flint, boost 3 3 , bliss, ppl, singular, cddlib, lrs, nauty 4 - , ant, openjdk 4 + , ninja, ant, openjdk 5 5 , perlPackages 6 6 , makeWrapper 7 7 }: 8 + 9 + # polymake compiles its own version of sympol and atint because we 10 + # don't have those packages. other missing optional dependencies: 11 + # javaview, libnormaliz, scip, soplex, jreality. 8 12 9 13 stdenv.mkDerivation rec { 10 14 pname = "polymake"; 11 - version = "3.2.rc4"; 15 + version = "4.4"; 12 16 13 17 src = fetchurl { 14 - url = "https://polymake.org/lib/exe/fetch.php/download/polymake-3.2r4.tar.bz2"; 15 - sha256 = "02jpkvy1cc6kc23vkn7nkndzr40fq1gkb3v257bwyi1h5d37fyqy"; 18 + # "The minimal version is a packager friendly version which omits 19 + # the bundled sources of cdd, lrs, libnormaliz, nauty and jReality." 20 + url = "https://polymake.org/lib/exe/fetch.php/download/polymake-${version}-minimal.tar.bz2"; 21 + sha256 = "sha256-2nF5F2xznI77pl2TslrxA8HLpw4fmzVnPOM8N3kOwJE="; 16 22 }; 17 23 18 24 buildInputs = [ 19 - libxml2 libxslt readline perl gmp mpfr boost 25 + perl gmp mpfr flint boost 20 26 bliss ppl singular cddlib lrs nauty 21 27 openjdk 22 - ] ++ 23 - (with perlPackages; [ 24 - XMLLibXML XMLLibXSLT XMLWriter TermReadLineGnu TermReadKey 28 + ] ++ (with perlPackages; [ 29 + JSON TermReadLineGnu TermReadKey XMLSAX 25 30 ]); 26 31 27 32 nativeBuildInputs = [ ··· 36 41 done 37 42 ''; 38 43 39 - meta = { 44 + meta = with lib; { 40 45 description = "Software for research in polyhedral geometry"; 41 - license = lib.licenses.gpl2 ; 42 - maintainers = [lib.maintainers.raskin]; 43 - platforms = lib.platforms.linux; 46 + license = licenses.gpl2Plus; 47 + maintainers = teams.sage.members; 48 + platforms = platforms.linux; 44 49 homepage = "https://www.polymake.org/doku.php"; 45 50 }; 46 51 }
+41
pkgs/data/fonts/vista-fonts-cht/default.nix
··· 1 + { lib, stdenvNoCC, fetchurl, cabextract }: 2 + 3 + stdenvNoCC.mkDerivation { 4 + pname = "vista-fonts-cht"; 5 + version = "1"; 6 + 7 + src = fetchurl { 8 + url = https://download.microsoft.com/download/7/6/b/76bd7a77-be02-47f3-8472-fa1de7eda62f/VistaFont_CHT.EXE; 9 + sha256 = "sha256-fSnbbxlMPzbhFSQyKxQaS5paiWji8njK7tS8Eppsj6g="; 10 + }; 11 + 12 + nativeBuildInputs = [ cabextract ]; 13 + 14 + unpackPhase = '' 15 + cabextract --lowercase --filter '*.TTF' $src 16 + ''; 17 + 18 + installPhase = '' 19 + mkdir -p $out/share/fonts/truetype 20 + cp *.ttf $out/share/fonts/truetype 21 + 22 + # Set up no-op font configs to override any aliases set up by 23 + # other packages. 24 + mkdir -p $out/etc/fonts/conf.d 25 + substitute ${./no-op.conf} $out/etc/fonts/conf.d/30-msjhenghei.conf \ 26 + --subst-var-by fontname "Microsoft JhengHei" 27 + ''; 28 + 29 + 30 + meta = with lib; { 31 + description = "TrueType fonts from Microsoft Windows Vista For Traditional Chinese (Microsoft JhengHei)"; 32 + homepage = "https://www.microsoft.com/typography/fonts/family.aspx"; 33 + license = licenses.unfree; 34 + maintainers = with maintainers; [ atkinschang ]; 35 + 36 + # Set a non-zero priority to allow easy overriding of the 37 + # fontconfig configuration files. 38 + priority = 5; 39 + platforms = platforms.all; 40 + }; 41 + }
+9
pkgs/data/fonts/vista-fonts-cht/no-op.conf
··· 1 + <?xml version="1.0" encoding="UTF-8"?> 2 + <!DOCTYPE fontconfig SYSTEM "urn:fontconfig:fonts.dtd"> 3 + <fontconfig> 4 + <!-- This configuation is intentionally left empty in order to 5 + override any other font package that may wish to set up an 6 + alias for the Microsoft @fontname@ font. If you actually do 7 + want to have the alias then please change the priority of that 8 + package; see the Nix manual page for nix-env for details. --> 9 + </fontconfig>
+2 -5
pkgs/desktops/pantheon/granite/default.nix
··· 46 46 wrapGAppsHook 47 47 ]; 48 48 49 - buildInputs = [ 49 + propagatedBuildInputs = [ 50 50 glib 51 + gsettings-desktop-schemas # is_clock_format_12h uses "org.gnome.desktop.interface clock-format" 51 52 gtk3 52 53 libgee 53 - ]; 54 - 55 - propagatedBuildInputs = [ 56 - gsettings-desktop-schemas # is_clock_format_12h uses "org.gnome.desktop.interface clock-format" 57 54 ]; 58 55 59 56 postPatch = ''
+2 -1
pkgs/development/interpreters/clojure/default.nix
··· 29 29 echo "Installing libs into $clojure_lib_dir" 30 30 install -Dm644 deps.edn "$clojure_lib_dir/deps.edn" 31 31 install -Dm644 example-deps.edn "$clojure_lib_dir/example-deps.edn" 32 + install -Dm644 tools.edn "$clojure_lib_dir/tools.edn" 32 33 install -Dm644 exec.jar "$clojure_lib_dir/libexec/exec.jar" 33 34 install -Dm644 clojure-tools-${version}.jar "$clojure_lib_dir/libexec/clojure-tools-${version}.jar" 34 35 ··· 48 49 49 50 doInstallCheck = true; 50 51 installCheckPhase = '' 51 - CLJ_CONFIG=$out CLJ_CACHE=$out/libexec $out/bin/clojure \ 52 + CLJ_CONFIG=$TMPDIR CLJ_CACHE=$TMPDIR/.clj_cache $out/bin/clojure \ 52 53 -Spath \ 53 54 -Sverbose \ 54 55 -Scp $out/libexec/clojure-tools-${version}.jar
+2 -2
pkgs/development/libraries/pugixml/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "pugixml"; 5 - version = "1.11.1"; 5 + version = "1.11.4"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "zeux"; 9 9 repo = "pugixml"; 10 10 rev = "v${version}"; 11 - sha256 = "0iwn627wynrqrwb2ddm38p6y6cpgcavgbkrrxwxa0d26m9v2avpr"; 11 + sha256 = "sha256-pXadPs2Dlht3BMNYDVxWZqnVv0umDgYVcqH5YVxr+uA="; 12 12 }; 13 13 14 14 outputs = if shared then [ "out" "dev" ] else [ "out" ];
+68
pkgs/development/libraries/science/chemistry/avogadrolibs/default.nix
··· 1 + { lib, stdenv, fetchFromGitHub, cmake, zlib, eigen, libGL, doxygen, spglib 2 + , mmtf-cpp, glew, python3, libarchive, libmsym, msgpack, qttools, wrapQtAppsHook 3 + }: 4 + 5 + let 6 + pythonWP = python3.withPackages (p: with p; [ openbabel-bindings numpy ]); 7 + 8 + # Pure data repositories 9 + moleculesRepo = fetchFromGitHub { 10 + owner = "OpenChemistry"; 11 + repo = "molecules"; 12 + rev = "1.0.0"; 13 + sha256 = "guY6osnpv7Oqt+HE1BpIqL10POp+x8GAci2kY0bLmqg="; 14 + }; 15 + crystalsRepo = fetchFromGitHub { 16 + owner = "OpenChemistry"; 17 + repo = "crystals"; 18 + rev = "1.0.1"; 19 + sha256 = "sH/WuvLaYu6akOc3ssAKhnxD8KNoDxuafDSozHqJZC4="; 20 + }; 21 + 22 + in stdenv.mkDerivation rec { 23 + pname = "avogadrolibs"; 24 + version = "1.94.0"; 25 + 26 + src = fetchFromGitHub { 27 + owner = "OpenChemistry"; 28 + repo = pname; 29 + rev = version; 30 + sha256 = "6bChJhqrjOxeEWZBNToq3JExHPu7DUMsEHWBDe75zAo="; 31 + }; 32 + 33 + postUnpack = '' 34 + cp -r ${moleculesRepo} molecules 35 + cp -r ${crystalsRepo} crystals 36 + ''; 37 + 38 + nativeBuildInputs = [ 39 + cmake 40 + wrapQtAppsHook 41 + ]; 42 + 43 + buildInputs = [ 44 + eigen 45 + zlib 46 + libGL 47 + spglib 48 + mmtf-cpp 49 + glew 50 + libarchive 51 + libmsym 52 + msgpack 53 + qttools 54 + ]; 55 + 56 + postFixup = '' 57 + substituteInPlace $out/lib/cmake/${pname}/AvogadroLibsConfig.cmake \ 58 + --replace "''${AvogadroLibs_INSTALL_PREFIX}/$out" "''${AvogadroLibs_INSTALL_PREFIX}" 59 + ''; 60 + 61 + meta = with lib; { 62 + description = "Molecule editor and visualizer"; 63 + maintainers = with maintainers; [ sheepforce ]; 64 + homepage = "https://github.com/OpenChemistry/avogadrolibs"; 65 + platforms = platforms.linux; 66 + license = licenses.gpl2Only; 67 + }; 68 + }
+23
pkgs/development/libraries/science/chemistry/libmsym/default.nix
··· 1 + { stdenv, lib, fetchFromGitHub, cmake } : 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "libmsym"; 5 + version = "0.2.3"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "mcodev31"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256= "k+OEwrA/saupP/wX6Ii5My0vffiJ0X9xMCTrliMSMik="; 12 + }; 13 + 14 + nativeBuildInputs = [ cmake ]; 15 + 16 + meta = with lib; { 17 + description = " molecular point group symmetry lib"; 18 + homepage = "https://github.com/rcsb/mmtf-cpp"; 19 + license = licenses.mit; 20 + platforms = platforms.linux; 21 + maintainers = [ maintainers.sheepforce ]; 22 + }; 23 + }
+25
pkgs/development/libraries/science/chemistry/mmtf-cpp/default.nix
··· 1 + { stdenv, lib, fetchFromGitHub, cmake, msgpack } : 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "mmtf-cpp"; 5 + version = "1.0.0"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "rcsb"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256= "17ylramda69plf5w0v5hxbl4ggkdi5s15z55cv0pljl12yvyva8l"; 12 + }; 13 + 14 + nativeBuildInputs = [ cmake ]; 15 + 16 + buildInputs = [ msgpack ]; 17 + 18 + meta = with lib; { 19 + description = "A library of exchange-correlation functionals with arbitrary-order derivatives"; 20 + homepage = "https://github.com/rcsb/mmtf-cpp"; 21 + license = licenses.mit; 22 + platforms = platforms.linux; 23 + maintainers = [ maintainers.sheepforce ]; 24 + }; 25 + }
+33
pkgs/development/libraries/science/chemistry/molequeue/default.nix
··· 1 + { lib, stdenv, fetchFromGitHub, cmake, qttools, wrapQtAppsHook }: 2 + 3 + stdenv.mkDerivation rec { 4 + pname = "molequeue"; 5 + version = "0.9.0"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "OpenChemistry"; 9 + repo = pname; 10 + rev = version; 11 + sha256 = "+NoY8YVseFyBbxc3ttFWiQuHQyy1GN8zvV1jGFjmvLg="; 12 + }; 13 + 14 + nativeBuildInputs = [ 15 + cmake 16 + wrapQtAppsHook 17 + ]; 18 + 19 + buildInputs = [ qttools ]; 20 + 21 + postFixup = '' 22 + substituteInPlace $out/lib/cmake/molequeue/MoleQueueConfig.cmake \ 23 + --replace "''${MoleQueue_INSTALL_PREFIX}/$out" "''${MoleQueue_INSTALL_PREFIX}" 24 + ''; 25 + 26 + meta = with lib; { 27 + description = "Desktop integration of high performance computing resources"; 28 + maintainers = with maintainers; [ sheepforce ]; 29 + homepage = "https://github.com/OpenChemistry/molequeue"; 30 + platforms = platforms.linux; 31 + license = licenses.bsd3; 32 + }; 33 + }
+5 -4
pkgs/development/python-modules/awslambdaric/default.nix
··· 13 13 sha256 = "120qar8iaxj6dmnhjw1c40n2w06f1nyxy57dwh06xdiany698fg4"; 14 14 }; 15 15 16 + postPatch = '' 17 + substituteInPlace requirements/base.txt \ 18 + --replace 'simplejson==3' 'simplejson~=3' 19 + ''; 20 + 16 21 propagatedBuildInputs = [ simplejson ]; 17 22 18 23 nativeBuildInputs = [ autoconf automake cmake libtool perl ]; ··· 20 25 buildInputs = [ gcc ]; 21 26 22 27 dontUseCmakeConfigure = true; 23 - 24 - preBuild = '' 25 - substituteInPlace requirements/base.txt --replace 'simplejson==3' 'simplejson~=3' 26 - ''; 27 28 28 29 checkInputs = [ pytestCheckHook ]; 29 30
+5 -3
pkgs/development/python-modules/ignite/default.nix
··· 3 3 , fetchFromGitHub 4 4 , pytestCheckHook 5 5 , pytest-xdist 6 + , torchvision 6 7 , pythonOlder 7 8 , matplotlib 8 9 , mock ··· 14 15 15 16 buildPythonPackage rec { 16 17 pname = "ignite"; 17 - version = "0.4.5"; 18 + version = "0.4.6"; 18 19 19 20 src = fetchFromGitHub { 20 21 owner = "pytorch"; 21 22 repo = pname; 22 23 rev = "v${version}"; 23 - sha256 = "sha256-FGFpaqq7InwRqFmQTmXGpJEjRUB69ZN/l20l42L2BAA="; 24 + sha256 = "sha256-dlKGXjUUnyYmPDilo0LQg9OkSkBnMYNgzlFLIfI0T6I="; 24 25 }; 25 26 26 - checkInputs = [ pytestCheckHook matplotlib mock pytest-xdist ]; 27 + checkInputs = [ pytestCheckHook matplotlib mock pytest-xdist torchvision ]; 27 28 propagatedBuildInputs = [ pytorch scikit-learn tqdm pynvml ]; 28 29 29 30 # runs succesfully in 3.9, however, async isn't correctly closed so it will fail after test suite. ··· 38 39 "--ignore=tests/ignite/contrib/handlers/test_trains_logger.py" 39 40 "--ignore=tests/ignite/metrics/nlp/test_bleu.py" 40 41 "--ignore=tests/ignite/metrics/nlp/test_rouge.py" 42 + "--ignore=tests/ignite/metrics/gan" # requires pytorch_fid; tries to download model to $HOME 41 43 "--ignore=tests/ignite/metrics/test_dill.py" 42 44 "--ignore=tests/ignite/metrics/test_psnr.py" 43 45 "--ignore=tests/ignite/metrics/test_ssim.py"
+2 -2
pkgs/development/python-modules/pynvml/default.nix
··· 7 7 8 8 buildPythonPackage rec { 9 9 pname = "pynvml"; 10 - version = "8.0.4"; 10 + version = "11.0.0"; 11 11 disabled = pythonOlder "3.6"; 12 12 13 13 src = fetchPypi { 14 14 inherit pname version; 15 - sha256 = "0pfykj1amqh1rixp90rg85v1nj6qmx89fahqr6ii4zlcckffmm68"; 15 + sha256 = "sha256-1fxKItNVtAw0HWugqoiKLU0iUxd9JDkA+EAbfmyssbs="; 16 16 }; 17 17 18 18 propagatedBuildInputs = [ cudatoolkit ];
+3 -4
pkgs/development/python-modules/threadpoolctl/default.nix
··· 4 4 , fetchFromGitHub 5 5 , flit 6 6 , pytestCheckHook 7 - , pytest-cov 8 7 , numpy 9 8 , scipy 10 9 }: 11 10 12 11 buildPythonPackage rec { 13 12 pname = "threadpoolctl"; 14 - version = "2.1.0"; 13 + version = "2.2.0"; 15 14 16 15 disabled = isPy27; 17 16 format = "flit"; ··· 20 19 owner = "joblib"; 21 20 repo = pname; 22 21 rev = version; 23 - sha256 = "0sl6mp3b2gb0dvqkhnkmrp2g3r5c7clyyyxzq44xih6sw1pgx9df"; 22 + sha256 = "7UUjbX1IpXtUAgN48Db43Zr1u360UETSUnIHD6rQRLs="; 24 23 }; 25 24 26 - checkInputs = [ pytestCheckHook pytest-cov numpy scipy ]; 25 + checkInputs = [ pytestCheckHook numpy scipy ]; 27 26 28 27 meta = with lib; { 29 28 homepage = "https://github.com/joblib/threadpoolctl";
+3 -1
pkgs/development/python-modules/xml-marshaller/default.nix
··· 10 10 version = "1.0.2"; 11 11 12 12 src = fetchPypi { 13 - inherit version; 14 13 pname = "xml_marshaller"; 14 + inherit version; 15 15 sha256 = "sha256-QvBALLDD8o5nZQ5Z4bembhadK6jcydWKQpJaSmGqqJM="; 16 16 }; 17 17 18 18 propagatedBuildInputs = [ lxml six ]; 19 + 20 + pythonImportsCheck = [ "xml_marshaller" ]; 19 21 20 22 meta = with lib; { 21 23 description = "This module allows one to marshal simple Python data types into a custom XML format.";
+5
pkgs/development/tools/kind/default.nix
··· 13 13 sha256 = "sha256-pjg52ONseKNw06EOBzD6Elge+Cz+C3llPvjJPHkn1cw="; 14 14 }; 15 15 16 + patches = [ 17 + # fix kernel module path used by kind 18 + ./kernel-module-path.patch 19 + ]; 20 + 16 21 vendorSha256 = "sha256-HiVdekSZrC/RkMSvcwm1mv6AE4bA5kayUsMdVCbckiE="; 17 22 18 23 doCheck = false;
+47
pkgs/development/tools/kind/kernel-module-path.patch
··· 1 + diff --git a/pkg/cluster/internal/providers/common/getmodules.go b/pkg/cluster/internal/providers/common/getmodules.go 2 + new file mode 100644 3 + index 00000000..f42a883d 4 + --- /dev/null 5 + +++ b/pkg/cluster/internal/providers/common/getmodules.go 6 + @@ -0,0 +1,15 @@ 7 + +package common 8 + + 9 + +import "os" 10 + + 11 + +const ( 12 + + fhsKernalModulePath = "/lib/modules" 13 + + nixKernalModulePath = "/run/booted-system/kernel-modules/lib" 14 + +) 15 + + 16 + +func GetKernelModulePath() string { 17 + + if _, err := os.Stat(nixKernalModulePath); !os.IsNotExist(err) { 18 + + return nixKernalModulePath 19 + + } 20 + + return fhsKernalModulePath 21 + +} 22 + diff --git a/pkg/cluster/internal/providers/docker/provision.go b/pkg/cluster/internal/providers/docker/provision.go 23 + index 50161861..86d5b7b6 100644 24 + --- a/pkg/cluster/internal/providers/docker/provision.go 25 + +++ b/pkg/cluster/internal/providers/docker/provision.go 26 + @@ -242,7 +242,7 @@ func runArgsForNode(node *config.Node, clusterIPFamily config.ClusterIPFamily, n 27 + // (please don't depend on doing this though!) 28 + "--volume", "/var", 29 + // some k8s things want to read /lib/modules 30 + - "--volume", "/lib/modules:/lib/modules:ro", 31 + + "--volume", fmt.Sprintf("%s:/lib/modules:ro", common.GetKernelModulePath()), 32 + }, 33 + args..., 34 + ) 35 + diff --git a/pkg/cluster/internal/providers/podman/provision.go b/pkg/cluster/internal/providers/podman/provision.go 36 + index 51dce486..3bc36b42 100644 37 + --- a/pkg/cluster/internal/providers/podman/provision.go 38 + +++ b/pkg/cluster/internal/providers/podman/provision.go 39 + @@ -205,7 +205,7 @@ func runArgsForNode(node *config.Node, clusterIPFamily config.ClusterIPFamily, n 40 + // dev: devices on the volume will be able to be used by processes within the container 41 + "--volume", fmt.Sprintf("%s:/var:suid,exec,dev", varVolume), 42 + // some k8s things want to read /lib/modules 43 + - "--volume", "/lib/modules:/lib/modules:ro", 44 + + "--volume", fmt.Sprintf("%s:/lib/modules:ro", common.GetKernelModulePath()), 45 + }, 46 + args..., 47 + )
+22 -7
pkgs/development/tools/misc/teensy-loader-cli/default.nix
··· 1 - { lib, stdenv, fetchFromGitHub, go-md2man, installShellFiles, libusb-compat-0_1 }: 1 + { stdenv 2 + , lib 3 + , fetchFromGitHub 4 + , go-md2man 5 + , installShellFiles 6 + , libusb-compat-0_1 7 + }: 2 8 3 9 stdenv.mkDerivation rec { 4 10 pname = "teensy-loader-cli"; 5 - version = "2.1.20191110"; 11 + version = "2.1+unstable=2021-04-10"; 6 12 7 13 src = fetchFromGitHub { 8 14 owner = "PaulStoffregen"; 9 15 repo = "teensy_loader_cli"; 10 - rev = "e98b5065cdb9f04aa4dde3f2e6e6e6f12dd97592"; 11 - sha256 = "1yx8vsh6b29pqr4zb6sx47429i9x51hj9psn8zksfz75j5ivfd5i"; 16 + rev = "9dbbfa3b367b6c37e91e8a42dae3c6edfceccc4d"; 17 + sha256 = "lQ1XtaWPr6nvE8NArD1980QVOH6NggO3FlfsntUjY7s="; 12 18 }; 13 19 14 - buildInputs = [ libusb-compat-0_1 ]; 20 + nativeBuildInputs = [ 21 + go-md2man 22 + installShellFiles 23 + ]; 15 24 16 - nativeBuildInputs = [ go-md2man installShellFiles ]; 25 + buildInputs = [ 26 + libusb-compat-0_1 27 + ]; 17 28 18 29 installPhase = '' 30 + runHook preInstall 31 + 19 32 install -Dm555 teensy_loader_cli $out/bin/teensy-loader-cli 20 33 install -Dm444 -t $out/share/doc/${pname} *.md *.txt 21 34 go-md2man -in README.md -out ${pname}.1 22 35 installManPage *.1 36 + 37 + runHook postInstall 23 38 ''; 24 39 25 40 meta = with lib; { 26 41 description = "Firmware uploader for the Teensy microcontroller boards"; 27 42 homepage = "https://www.pjrc.com/teensy/"; 28 - license = licenses.gpl3; 43 + license = licenses.gpl3Only; 29 44 platforms = platforms.unix; 30 45 }; 31 46 }
+2
pkgs/development/tools/parsing/tree-sitter/grammars/default.nix
··· 3 3 tree-sitter-bash = (builtins.fromJSON (builtins.readFile ./tree-sitter-bash.json)); 4 4 tree-sitter-c = (builtins.fromJSON (builtins.readFile ./tree-sitter-c.json)); 5 5 tree-sitter-c-sharp = (builtins.fromJSON (builtins.readFile ./tree-sitter-c-sharp.json)); 6 + tree-sitter-comment = (builtins.fromJSON (builtins.readFile ./tree-sitter-comment.json)); 6 7 tree-sitter-cpp = (builtins.fromJSON (builtins.readFile ./tree-sitter-cpp.json)); 7 8 tree-sitter-css = (builtins.fromJSON (builtins.readFile ./tree-sitter-css.json)); 8 9 tree-sitter-embedded-template = (builtins.fromJSON (builtins.readFile ./tree-sitter-embedded-template.json)); 9 10 tree-sitter-fennel = (builtins.fromJSON (builtins.readFile ./tree-sitter-fennel.json)); 11 + tree-sitter-fish = (builtins.fromJSON (builtins.readFile ./tree-sitter-fish.json)); 10 12 tree-sitter-fluent = (builtins.fromJSON (builtins.readFile ./tree-sitter-fluent.json)); 11 13 tree-sitter-go = (builtins.fromJSON (builtins.readFile ./tree-sitter-go.json)); 12 14 tree-sitter-haskell = (builtins.fromJSON (builtins.readFile ./tree-sitter-haskell.json));
+10
pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-comment.json
··· 1 + { 2 + "url": "https://github.com/stsewd/tree-sitter-comment", 3 + "rev": "894b61d68a31d93c33ed48dcc7f427174b440abe", 4 + "date": "2021-04-27T15:25:48-05:00", 5 + "path": "/nix/store/w0yz9imzi33glwk6ilm0jqipcyzl8hgm-tree-sitter-comment", 6 + "sha256": "1vfayzzcv6lj63pgcxr8f7rcd81jkgnfdlmhs39i7w3m0s6dv1qg", 7 + "fetchSubmodules": false, 8 + "deepClone": false, 9 + "leaveDotGit": false 10 + }
+10
pkgs/development/tools/parsing/tree-sitter/grammars/tree-sitter-fish.json
··· 1 + { 2 + "url": "https://github.com/ram02z/tree-sitter-fish", 3 + "rev": "db7139393e50765520618fa469f41dfbb0b3822b", 4 + "date": "2021-07-06T21:05:19+02:00", 5 + "path": "/nix/store/k67b4bn67zd3dj9yg0q7jywy3vnkv8gw-tree-sitter-fish", 6 + "sha256": "09l5myivlq3z53nqlx8x8c45sww2k7vmjp8z0rvwzv08rnym0fah", 7 + "fetchSubmodules": false, 8 + "deepClone": false, 9 + "leaveDotGit": false 10 + }
+8
pkgs/development/tools/parsing/tree-sitter/update.nix
··· 70 70 # If you need a grammar that already exists in the official orga, 71 71 # make sure to give it a different name. 72 72 otherGrammars = { 73 + "tree-sitter-comment" = { 74 + orga = "stsewd"; 75 + repo = "tree-sitter-comment"; 76 + }; 73 77 "tree-sitter-nix" = { 74 78 orga = "cstrahan"; 75 79 repo = "tree-sitter-nix"; ··· 105 109 "tree-sitter-zig" = { 106 110 orga = "GrayJack"; 107 111 repo = "tree-sitter-zig"; 112 + }; 113 + "tree-sitter-fish" = { 114 + orga = "ram02z"; 115 + repo = "tree-sitter-fish"; 108 116 }; 109 117 }; 110 118
+2 -2
pkgs/development/tools/yarn/default.nix
··· 2 2 3 3 stdenv.mkDerivation rec { 4 4 pname = "yarn"; 5 - version = "1.22.10"; 5 + version = "1.22.11"; 6 6 7 7 src = fetchzip { 8 8 url = "https://github.com/yarnpkg/yarn/releases/download/v${version}/yarn-v${version}.tar.gz"; 9 - sha256 = "0pdimll8lhsnqfafhdaxd6h6mgxhj1c7h56r111cmxhzw462y3mr"; 9 + sha256 = "0gmk46b9gd6q0zi3a2adgf8c1y05c2lf34k5wrw7alnlwy8iqvvp"; 10 10 }; 11 11 12 12 buildInputs = [ nodejs ];
+5 -5
pkgs/misc/emulators/wine/sources.nix
··· 44 44 45 45 unstable = fetchurl rec { 46 46 # NOTE: Don't forget to change the SHA256 for staging as well. 47 - version = "6.13"; 47 + version = "6.14"; 48 48 url = "https://dl.winehq.org/wine/source/6.x/wine-${version}.tar.xz"; 49 - sha256 = "sha256-4DohoBHUXSrp8iIED7dpC5cVY3bnQx+GHyAHPq8k8oo="; 49 + sha256 = "sha256-ZLRxk5lDvAjjUQJ9tvvCRlwTllCjv/65Flf/DujCUgI="; 50 50 inherit (stable) gecko32 gecko64; 51 51 52 52 ## see http://wiki.winehq.org/Mono 53 53 mono = fetchurl rec { 54 - version = "6.2.0"; 54 + version = "6.3.0"; 55 55 url = "https://dl.winehq.org/wine/wine-mono/${version}/wine-mono-${version}-x86.msi"; 56 - sha256 = "sha256-zY1TUT2DV7KHama6sIllTvmUH0LvaQ+1VcZJP1OB28o="; 56 + sha256 = "sha256-pfAtMqAoNpKkpiX1Qc+7tFGIMShHTFyANiOFMXzQmfA="; 57 57 }; 58 58 59 59 patches = [ ··· 65 65 staging = fetchFromGitHub rec { 66 66 # https://github.com/wine-staging/wine-staging/releases 67 67 inherit (unstable) version; 68 - sha256 = "sha256-3IpO+eQ/+DiQZH6en5Q/p+j441LDvjn4i9Ex7PY8KCk="; 68 + sha256 = "sha256-yzpRWNx/e3BDCh1dyf8VdjLgvu6yZ/CXre/cb1roaVs="; 69 69 owner = "wine-staging"; 70 70 repo = "wine-staging"; 71 71 rev = "v${version}";
+3
pkgs/tools/misc/etcher/default.nix
··· 59 59 cp -a usr/share/* $out/share 60 60 cp -a opt/balenaEtcher/{locales,resources} $out/share/${pname} 61 61 62 + substituteInPlace $out/share/applications/balena-etcher-electron.desktop \ 63 + --replace /opt/balenaEtcher/balena-etcher-electron ${pname} 64 + 62 65 runHook postInstall 63 66 ''; 64 67
+2 -2
pkgs/tools/networking/dnsproxy/default.nix
··· 2 2 3 3 buildGoModule rec { 4 4 pname = "dnsproxy"; 5 - version = "0.39.1"; 5 + version = "0.39.2"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "AdguardTeam"; 9 9 repo = pname; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-3ixWiY7gJaavJw3WuK3aTYE6lb328VgWSPCuf5PN8Ds="; 11 + sha256 = "sha256-FuPNWoLsqPvz4J+ymfEKBjPmLlxwDUp/196REDnGPmQ="; 12 12 }; 13 13 14 14 vendorSha256 = null;
+12 -4
pkgs/tools/package-management/nix-simple-deploy/default.nix
··· 1 - { lib, fetchFromGitHub, rustPlatform }: 1 + { lib, fetchFromGitHub, rustPlatform, makeWrapper, openssh, nix-serve }: 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "nix-simple-deploy"; 5 - version = "0.1.1"; 5 + version = "0.2.1"; 6 6 7 7 src = fetchFromGitHub { 8 8 owner = "misuzu"; 9 9 repo = pname; 10 10 rev = version; 11 - sha256 = "12g0sbgs2dfnk0agp1kagfi1yhk26ga98zygxxrjhjxrqb2n5w80"; 11 + sha256 = "0vkgs3ffb5vdzhrqdnd54vbi36vrgd3408zvjn0rmqlnwi3wwhnk"; 12 12 }; 13 13 14 - cargoSha256 = "1wp8wdv25j8ybq2j04z3nl4yc95wkj5h740lzpyps08yaxj8bncr"; 14 + cargoSha256 = "0z4d4cazl6qvigyqzdayxqfjc1ki1rhrpm76agc8lkrxrvhyay2h"; 15 + 16 + nativeBuildInputs = [ makeWrapper ]; 17 + 18 + postInstall = '' 19 + wrapProgram "$out/bin/nix-simple-deploy" \ 20 + --prefix PATH : "${lib.makeBinPath [ openssh nix-serve ]}" 21 + ''; 15 22 16 23 meta = with lib; { 17 24 description = "Deploy software or an entire NixOS system configuration to another NixOS system"; 18 25 homepage = "https://github.com/misuzu/nix-simple-deploy"; 26 + platforms = platforms.unix; 19 27 license = with licenses; [ asl20 /* OR */ mit ]; 20 28 maintainers = with maintainers; [ misuzu ]; 21 29 };
+5 -5
pkgs/tools/text/mdbook/default.nix
··· 2 2 3 3 rustPlatform.buildRustPackage rec { 4 4 pname = "mdbook"; 5 - version = "0.4.10"; 5 + version = "0.4.12"; 6 6 7 7 src = fetchFromGitHub { 8 - owner = "rust-lang-nursery"; 8 + owner = "rust-lang"; 9 9 repo = "mdBook"; 10 10 rev = "v${version}"; 11 - sha256 = "sha256-1Ddy/kb2Q7P+tzyEr3EC3qWm6MGSsDL3/vnPJLAm/J0="; 11 + sha256 = "sha256-2lxotwL3Dc9jRA12iKO5zotO80pa+RfUZucyDRgFOsI="; 12 12 }; 13 13 14 - cargoSha256 = "sha256-x2BwnvEwTqz378aDE7OHWuEwNEsUnRudLq7sUJjHRpA="; 14 + cargoSha256 = "sha256-TNd4pj4qSKgmmVtSCSKFCxNtv96xD7+24BPsLXPgiEI="; 15 15 16 16 buildInputs = lib.optionals stdenv.isDarwin [ CoreServices ]; 17 17 18 18 meta = with lib; { 19 19 description = "Create books from MarkDown"; 20 - homepage = "https://github.com/rust-lang-nursery/mdbook"; 20 + homepage = "https://github.com/rust-lang/mdBook"; 21 21 license = [ licenses.mpl20 ]; 22 22 maintainers = [ maintainers.havvy ]; 23 23 };
+1
pkgs/top-level/aliases.nix
··· 709 709 redkite = throw "redkite was archived by upstream"; # added 2021-04-12 710 710 rkt = throw "rkt was archived by upstream"; # added 2020-05-16 711 711 rpiboot-unstable = rpiboot; # added 2021-07-30 712 + rtv = throw "rtv was archived by upstream. Consider using tuir, an actively maintained fork"; # added 2021-08-08 712 713 ruby_2_0_0 = throw "ruby_2_0_0 was deprecated on 2018-02-13: use a newer version of ruby"; 713 714 ruby_2_1_0 = throw "ruby_2_1_0 was deprecated on 2018-02-13: use a newer version of ruby"; 714 715 ruby_2_2_9 = throw "ruby_2_2_9 was deprecated on 2018-02-13: use a newer version of ruby";
+13 -5
pkgs/top-level/all-packages.nix
··· 6844 6844 6845 6845 libmesode = callPackage ../development/libraries/libmesode {}; 6846 6846 6847 + libmsym = callPackage ../development/libraries/science/chemistry/libmsym { }; 6848 + 6847 6849 libnabo = callPackage ../development/libraries/libnabo { }; 6848 6850 6849 6851 libngspice = callPackage ../development/libraries/libngspice { }; ··· 14081 14083 mkcert = callPackage ../development/tools/misc/mkcert { }; 14082 14084 14083 14085 mkdocs = callPackage ../development/tools/documentation/mkdocs { }; 14086 + 14087 + mmtf-cpp = callPackage ../development/libraries/science/chemistry/mmtf-cpp { }; 14084 14088 14085 14089 mockgen = callPackage ../development/tools/mockgen { }; 14086 14090 ··· 23102 23106 23103 23107 vistafonts-chs = callPackage ../data/fonts/vista-fonts-chs { }; 23104 23108 23109 + vistafonts-cht = callPackage ../data/fonts/vista-fonts-cht { }; 23110 + 23105 23111 vollkorn = callPackage ../data/fonts/vollkorn { }; 23106 23112 23107 23113 weather-icons = callPackage ../data/fonts/weather-icons { }; ··· 26757 26763 26758 26764 polylith = callPackage ../development/tools/misc/polylith { }; 26759 26765 26760 - polymake = callPackage ../applications/science/math/polymake { 26761 - openjdk = openjdk8; # TODO: remove override https://github.com/NixOS/nixpkgs/pull/89731 26762 - }; 26766 + polymake = callPackage ../applications/science/math/polymake { }; 26763 26767 26764 26768 pond = callPackage ../applications/networking/instant-messengers/pond { }; 26765 26769 ··· 27098 27102 # librtlsdr is a friendly fork with additional features 27099 27103 rtl-sdr = callPackage ../applications/radio/rtl-sdr { }; 27100 27104 librtlsdr = callPackage ../development/libraries/librtlsdr { }; 27101 - 27102 - rtv = callPackage ../applications/misc/rtv { }; 27103 27105 27104 27106 rubyripper = callPackage ../applications/audio/rubyripper {}; 27105 27107 ··· 30084 30086 openbabel = openbabel2; 30085 30087 eigen = eigen2; 30086 30088 }; 30089 + 30090 + avogadrolibs = libsForQt5.callPackage ../development/libraries/science/chemistry/avogadrolibs { }; 30091 + 30092 + molequeue = libsForQt5.callPackage ../development/libraries/science/chemistry/molequeue { }; 30093 + 30094 + avogadro2 = libsForQt5.callPackage ../applications/science/chemistry/avogadro2 { }; 30087 30095 30088 30096 chemtool = callPackage ../applications/science/chemistry/chemtool { }; 30089 30097